Why do collisions occur when hashing
This results in the following table:
The greatly simplified example illustrates the method used. Elements that have the same hash value are simply linked to form a list. The numbers in the first row reflect the hash value of the respective list. The circle at the beginning of each list represents the head of the corresponding list, the black point the end of the list, which refers to the implementation.
The following code example (Sedgewick) shows how a set of M lists with M list headers can be initialized:
Now we have learned a method to avoid collisions. So far so good, but every coin has two sides, including this one. Let us assume that the initial estimate of the effort required for the key to be expected was not very good, or that a large number of collisions occur despite a supposedly good hash procedure. As a result, some of the lists in our table would grow to a size that would severely limit the performance of a sequential search and could only be solved by a complex expansion of the table and redistributing the elements.
An example of a problematic application is the implementation of a telephone book, the data records of which are stored in linked lists by means of hashing. What is the problem? Now, if we look at the distribution of names, we find that (in a larger city there are thousands of surnames that begin with the letter S, but in comparison there are very few that begin with the letters Q, X, or Start Y. As a result, despite a good algorithm, frequent collisions occur, which affect the length of the lists. An antidote would be to increase the available storage space by increasing the number of table spaces M.. The following explanation describes another method of avoiding collisions and making full use of the space in the table.
As described at the beginning, even a very good hash alrogithm can hardly prevent collisions from occurring, even if the number of table spaces available M. is much larger than the number of keys N. Another method to avoid collisions that have arisen is called open addressing. It means that if two keys collide, the colliding element is simply saved in another free space in the table. Would M.=N so each table space would contain exactly one key at the end. But beware: M. must be a prime number! The variant of the open addressingwhich will now be described is called linear probing or linear debugging. To clarify the method of operation, we use our previous example again, with the difference that instead of is. There are only 15 keys, but there and must be a prime number at the same time, the choice fell on 17.
The following table is created with the help of linear probing:
How does this distribution come about?
Basically, the procedure is very simple: The keys calculated above are entered in the table according to their hash values. If a collision occurs, i.e. a table space is already occupied by a key, this is simply mapped to the next free space. This is already the case at the beginning of the table. The keys v and e have the same hash value. v is mapped to position 5 as normal. Should now the key e are mapped, we find that this space in the table is already occupied, so we look for the next free space. This is right next door, i.e. at position 6. The key is now there e filed. The next collision we encounter is with the next e. When it first appeared, place 5 in the table was already occupied, the next free place was at place 6. However, this is already occupied, which is why this key is mapped to table place 7. We go through the places one after the other until a free one is found. When the table ends, the search for a free space begins again at the beginning of the table. The goal, namely the even distribution of the keys, was achieved.
The disadvantage of linear debugging is the often long search time when the table begins to fill. If there are many collisions, all successor positions must be examined accordingly during the search in order to find the correct key, and those that have a completely different hash value must also be examined. However, there is a way to avoid this: Double hashing.
Basically works Double hashing according to the absolutely same principle as that Linear probing. The difference is that a second hash function is used to define a fixed sequence according to which the following table spaces are tested for the key sought. In other words: In the event of a collision, the exact following places are not searched, but a test sequence is established with certain intervals. (Which of course also applies to the mapping of the values on the table.) We remember: The first hash function was The second hash function should in this case read (Sedgewick). The calculation causes only the last three bits of k be used. Some may now wonder why. Take, for example, the letter R, which occupies the 18th position in the alphabet. Expressed in binary (to five bit positions) this results in 10010. The last three bits of this converted into a decimal value result in the value 2. Subtracted from 8 you get 6, which corresponds to the result that the pocket calculator would also produce if one typed.
Be given and . Also the keys that we used before.
This leads to the following table:
This table is also fairly easy to understand if you look at the calculated hash values. The first hash value of each key is used to determine the actual table space, while the second value is used for collision handling. The first collision occurs with the key e because it has the same hash value as before v. In the case of linear probing would e now simply mapped to the next free space. In this case, the second hash value is used to take a certain number of steps in order to use the table space thus determined. In our example, the second value is 3, i.e. e is mapped exactly 3 places further back on the table, i.e. at place 8. If this place were already occupied by another key, a table place that is exactly 3 steps behind would be examined again. If you come across the end of the table, you start the search again from the beginning. The same process is now carried out for all other keys, the first hash value always specifying the table position and the second hash value the step distance that you have to take if this is already occupied.
Next page Up Previous page Contents
Next page:Calculation of the uniform distribution Upwards:Hashing Previous page:Calculation and working method & nbsp content
- Are you making a youtube channel
- Will you protect your religion
- Damaged wireless phone chargers
- What is the Kota stone waterproofing
- Which social networks are popular
- What is your favorite song Top 5
- What are you waiting for in India
- Why are most teachers in India unhappy
- Great white sharks are good to eat
- Which subject is very interesting to study
- How do big projects come about
- How do I become a presenter
- Why are passport photos black and white
- Are all Mercedes and BMW luxurious
- Uses Google Hangouts data
- Where do companies spend their money?
- How do you find or define peace
- Scales SQLite
- Tonality was invented together with counterpoint
- How engine works
- Where can I find jobs in Bangalore
- It was a good decision to have children
- What is cardiac arrest
- How do fish eat without swallowing water