What is the current value of the tables load factor

Assignment Help Data Structure & Algorithms
Reference no: EM131280902

Question 1

Assume the utilization of linear probing for hash-tables. To enhance the complexity of the operations performed on the table, a special AVAILABLE object is used. Assuming that all keys are positive integers, the following two techniques were suggested in order to enhance complexity:

i) In case an entry is removed, instead of marking its location as AVAILABLE, indicate the key as the negative value of the removed key (i.e. if the removed key was 16, indicate the key as -16). Searching for an entry with the removed key would then terminate once a negative value of the key is found (instead of continuing to search if AVAILABLE is used).

ii) Instead of using AVAILABLE, find a key in the table that should have been placed in the location of the removed entry, then place that key (the entire entry of course) in that location (instead of setting the location as AVAILABLE). The motive is to find the key faster since it now in its hashed location. This would also avoid the dependence on the AVAILABLE object.

Will either of these proposal have an advantage of the achieved complexity? You should analyze both time-complexity and space-complexity. Additionally, will any of these approaches result in misbehaviors (in terms of functionalities)? If so, explain clearly through illustrative examples.

Question 2

To reduce the maximum number of collisions in the hash table described in Question 6 above, someone proposed the use of a larger array of 15 elements (that is roughly 15% bigger) and of course modifying the hash function to: h(k)=k mod 15. The idea was to reduce the load factor and hence the number of collisions.

Does this proposal hold any validity to it? If yes, indicate why such modifications would actually reduce the number of collisions. If no, indicate clearly the reasons you believe/think that such proposal is senseless.

Question 3

Assume an open addressing hash table implementation, where the size of the array N = 19, and that double hashing is performed for collision handling. The second hash function is defined as:
d(k) = q - k mod q,

where k is the key being inserted in the table and the prime number q is = 11. Use simple modular operation (k mod N) for the first hash function.
i) Show the content of the table after performing the following operations, in order:
put(38), put(15), put(43), put(22), put(71), put(8), put(28), put(37), put(19).
ii) What is the size of the longest cluster caused by the above insertions?
iii) What is the number of occurred collisions as a result of the above operations?
iv) What is the current value of the table′s load factor?

Reference no: EM131280902

Questions Cloud

Equal employment opportunity and affirmative action : Assume that you are the director of diversity for Coca-Cola Corporation, and you are going to be speaking at a meeting of the senior executive team to discuss a new diversity initiative. The CEO asks if this is in response to recent EEOC lawsuits. co..
Sketch a temperature-entropy diagram for this flow : For maximum flow, determine the values of static temperature, static pressure, stagnation temperature, stagnation pressure, and flow velocity at the inlet [section (1)] and exit [section (2)] of the constant area duct. Sketch a temperature-entropy..
Briefly describe one of the videos viewed : Watch at least two videos, briefly describe one of the videos viewed, and provide a summary of information the video contained and how it fits in with this unit.
Identify the non statutory labor exemption : Identify the "non-statutory labor exemption" and explain its significance.- Did the non-statutory labor exemption from the antitrust laws expire upon the parties reaching bargaining impasse?
What is the current value of the tables load factor : COMP 352: Data Structure and Algorithms - To enhance the complexity of the operations performed on the table, a special AVAILABLE object is used. Assuming that all keys are positive integers, the following two techniques were suggested in order to ..
The rise of the robots : Knowing the book "The Rise of the Robots' by Martin Ford, do you think robots will bring about a change in the world on a scale similar to that of the steam engine, electricity or the internet? What do the rise of the robots mean for you as a worker ..
Natural rate of unemployment appropriate : What is the real wage? Suppose the mark-up increases to 10%. What happens to the naturalrate of unemployment for the same reservation wage? Is the word "natural" in the natural rate of unemploymentappropriate? Why or why not? Describe in less than 5 ..
What three early common law doctrines were applied : What three early common law doctrines were applied to labor organizations?- What is the present status of the so-called yellow-dog contract?
Discuss your views and current debates on globalization : Evaluate your experiences with strategy as it relates to globalization. Discuss your views and current debates on globalization. For example, discuss how globalization leads to instability and causes lower wages, or discuss how employment practices a..

Reviews

len1280902

11/18/2016 1:29:19 AM

Both the written part and the programming part must be done individually or by team of max 2 students. Submit all your answers to written questions in PDF (no scans of handwriting) or text formats only. Please be concise and brief (less than ¼ of a page for each question) in your answers. For the Java programs, you must submit the source files together with the compiled executables. The solutions to all the questions should be zipped together into one .zip or .tar.gz file and submitted via EAS. You may upload at most one file to EAS. For the programming component, you must make sure that you upload the assignment to the correct directory of Assignment 3 using EAS. Assignments uploaded to the wrong directory will be discarded and no resubmission will be allowed. You will need to submit both the pseudo code and the Java program, together with your experimental results. Keep in mind that Java code is not pseudo code.

len1280902

11/18/2016 1:28:25 AM

I need help with the programming question which is the last one along with questions 6,8 and 9 in the first part. let me know if this is possible. Give reasons to support your statements. Write your initial response in approximately 200 words. Apply APA standards to citation of sources.

Write a Review

Data Structure & Algorithms Questions & Answers

  Conceptual model entity relationship diagram

Assume you are asked you to create a new entity-relationship diagram for a corporation for a customized shipment tracking system.

  Coefficients of algorithm and negative coefficient mean

How could you utilize the larger grid size and longer time step? Write down the coefficients of your algorithm? What would negative coefficient mean?

  How the steps are performed by this algorithm

Consider the following algorithm (known as Horner's rule) to evaluate f(x) = summation from i=0 to N of aix^i.

  For no-edge weights in the graph

And all you can find (out of the still-eligible distances) is an infinity for the minimum. So... "emergency exit" case out of the while loop (which isn''t in the pseudocode algorithm).

  Algorithm to concatenate string in single binary search tree

Create algorithm which concatenates T1 and T2 into single binary search tree. Worst case running time must be O(h).

  Sql statements

Suppose that the tables T1 and T2 have a 1:1 relationship. Suppose that T2 has the foreign key. Demonstrate the SQL statements necessary to move the foreign key to T1.

  Block diagram for medical center of devry ed system

Block Diagram for Medical Center of DeVry ED System-When a patient arrives at the ED (emergency department) of the Medical Center of DeVry, demographic and insurance information is obtained

  Create a program that reads product number and prices

The Rinky Dooflingy Corporation produces different kinds of doofingies, each identified b a product number. Create a program that reads product number and rates and stores these values in two arrays,

  Describe and analyze algorithms for each of the functions

Describe an efficient algorithm for computing A⊕B, which is the set of elements that are in A or B, but not in both.

  Describe the base case of a recursive algorithm

Which of the following statements could describe the base case of a recursive algorithm? You are using a language that does not support recursion. What data structure would you use to traverse a binary search tree in order

  Using big-o notation state the runtime for this algorithm

1 consider searching algorithms on the following array of datanbsp22 21 9 4 16 2 10 14 20 31 26 19 17 28 8

  Write a script that checks the day of the week

Write a script that checks the day of the week, and takes one of two actions depending on the day. If the day is Monday through Friday, print the name of the day.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd