1 / 31

Some H ashing Techniques

Some H ashing Techniques. (used to randomize the relative addresses). Some Hashing Techniques. Prime Number Division Remainder Method Digit Extraction Folding Radix Conversion Mid-Square. Some Hashing Techniques. Prime Number Division Remainder Method Digit Extraction Folding

edison
Download Presentation

Some H ashing Techniques

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Some Hashing Techniques (used to randomize the relative addresses) Prepared by Perla P. Cosme

  2. Some Hashing Techniques • Prime Number Division Remainder Method • Digit Extraction • Folding • Radix Conversion • Mid-Square Prepared by Perla P. Cosme

  3. Some Hashing Techniques • Prime Number Division Remainder Method • Digit Extraction • Folding • Radix Conversion • Mid-Square Prepared by Perla P. Cosme

  4. Prime Number Division Remainder Method • Similar with % (modulo or mod) function or the integer division remainder method • The key of the record is used to apply the hash function where x = primary key of the record % = mod function PN = prime number h(x) = x % PN Prepared by Perla P. Cosme

  5. Some notes to ponder • Why do we use the modulo function when we can choose any user-defined function? • Why would we choose a prime number when we can choose any positive integer no.? • Is the hash function given as h(x) = x % PN, the only function we can use? Prepared by Perla P. Cosme

  6. Prime Number Division Remainder Method Notes: • Choose PN such that it is the largest among the prime numbers based from the relative positions. Why? • Relative positions are pre-defined by the operating system (OS). But for purposes of illustration, we shall adopt in our class that our relative position could be any of the form 0..(N-1) positions. Prepared by Perla P. Cosme

  7. Just a simple mental exercise ... Question: If the relative positions are labelled as 1..10, what would be the best choice for a prime number? Justify your answer. Prepared by Perla P. Cosme

  8. Another simple mental exercise ... Question: If the relative positions are labelled as 1..99, what would be the best choice for a prime number? Justify your answer. Prepared by Perla P. Cosme

  9. Let’s try this ... Assuming that there are 100 relative positions labeled as 0..99, and suppose we have the following key values: 24964, 25936, 32179, 39652, 40851, 53455, 53758, 54603, 63388, 81347 Questions: • Find the relative positions of these records using the hashing strategy called prime number division remainder method. • Determine the number of synonyms, if any. Prepared by Perla P. Cosme

  10. Answer Prepared by Perla P. Cosme

  11. Some Hashing Techniques • Prime Number Division Remainder Method • Digit Extraction • Folding • Radix Conversion • Mid-Square Prepared by Perla P. Cosme

  12. Digit Extraction This technique is advisable to use if and only if you have a prior knowledge in the distribution or placement of digits within the record’s primary key. Why? Prepared by Perla P. Cosme

  13. Digit Extraction Algorithm: • Lay all the primary keys of all records to be placed within the relative positions. • By cross examination, choose the positions or columns of digits to be extracted. • The relative position of the record is the concatenated digits from the chosen columns. Prepared by Perla P. Cosme

  14. Let’s try this ... Assuming that there are 100 relative positions labeled as 0..99, and suppose we have the following key values: 24964, 25936, 32179, 39652, 40851, 53455, 53758, 54603, 63388, 81347 Questions: • Find the relative positions of these records using the hashing strategy called digit extraction. Let us choose the positions of the chosen digits as the 5thand3rd. • Determine the number of synonyms, if any. Prepared by Perla P. Cosme

  15. Answer Prepared by Perla P. Cosme

  16. Some Hashing Techniques • Prime Number Division Remainder Method • Digit Extraction • Folding • Radix Conversion • Mid-Square Prepared by Perla P. Cosme

  17. Folding Algo: • Consider the key values as a sequence of digits. • By “folding” the sequence of digits, we end up as if we divide the digits into 2. • Add up the digits such that the first half of the digits becomes the first addend while the second half is composed of the digits belonging to the other half. Prepared by Perla P. Cosme

  18. Let’s try this ... Assuming that there are 100 relative positions labeled as 0..99, and suppose we have the following key values: 24964, 25936, 32179, 39652, 40851, 53455, 53758, 54603, 63388, 81347 Questions: • Find the relative positions of these records using the hashing strategies called folding. Let us assume that the demarcation line (or where the folding is made) is after the 3rd digit. • Determine the number of synonyms, if any. Prepared by Perla P. Cosme

  19. Answer Prepared by Perla P. Cosme

  20. Some Hashing Techniques • Prime Number Division Remainder Method • Digit Extraction • Folding • Radix Conversion • Mid-Square Prepared by Perla P. Cosme

  21. Radix Conversion Algorithm: (similar with conversion from one number system to another number system) • With each digit in the primary key, multiply each digit by powers of the chosen base number (or radix). The exponent must start from 0, and it increases as the number of digits increases. • Take the sum of all the products. • The last 2 digits of the computed sum is the relative address. Prepared by Perla P. Cosme

  22. Example Assume that our radix is 8. The octal number 12345, when converted to its base 10 will be computed as follows: 123458 = __________10 Prepared by Perla P. Cosme

  23. Let’s try this ... Assuming that there are 100 relative positions labeled as 0..99, and suppose we have the following key values: 24964, 25936, 32179, 39652, 40851, 53455, 53758, 54603, 63388, 81347 Questions: • Find the relative positions of these records using the hashing strategies called radix conversion. Let us assume that the radix is base 12. • Determine the number of synonyms, if any. Prepared by Perla P. Cosme

  24. Answer Prepared by Perla P. Cosme

  25. Some Hashing Techniques • Prime Number Division Remainder Method • Digit Extraction • Folding • Radix Conversion • Mid-Square Prepared by Perla P. Cosme

  26. Mid-Square Algorithm: As the name implies, the randomization is done by taking the middle digits, then, square the middle values. The result is the relative address of the record. Prepared by Perla P. Cosme

  27. Point of Order If the relative positions ranges from 0..99, then take the last 2 digits of the result as the relative address of the record. Questions: • Why do we take the last 2 digits of the result as the relative address of the record – why not the first 2 digits or the middle digits, etc.? • If the relative positions are labelled as 0..999, which digits of the result (of mid-square operation) is considered as the relative address? Why? Prepared by Perla P. Cosme

  28. Notes to Ponder • It is not advisable to get only one digit as the middle number. Why? • If the number of digits in the key value is even, which digit positions are considered as the middle digits? Why? Prepared by Perla P. Cosme

  29. Let’s try this ... Assuming that there are 100 relative positions labeled as 0..99, and suppose we have the following key values: 24964, 25936, 32179, 39652, 40851, 53455, 53758, 54603, 63388, 81347 Questions: • Find the relative positions of these records using the hashing strategies called mid-square. Let us take the 2nd up to 4thdigits as our middle values. • Determine the number of synonyms, if any. Prepared by Perla P. Cosme

  30. Answer Prepared by Perla P. Cosme

  31. That ends our discussion on the different hashing techniques. Are there questions????? Coming up next … rehashing techniques Prepared by Perla P. Cosme

More Related