Evaluation of Collision Resolution Methods Using Asymptotic Analysis

Ahmed Dalhatu Yusuf, S. Abdullahi, Moussa Mahamat Boukar, Salisu Ibrahim Yusuf
{"title":"Evaluation of Collision Resolution Methods Using Asymptotic Analysis","authors":"Ahmed Dalhatu Yusuf, S. Abdullahi, Moussa Mahamat Boukar, Salisu Ibrahim Yusuf","doi":"10.1109/icecco53203.2021.9663778","DOIUrl":null,"url":null,"abstract":"The basic idea of hashing is to use a hash function h(k) to reduce a giant universe to a reasonably small table such that U = {0, 1, .., |U | − 1} → T {0, 1, …, |T | − 1} with Prh{h(key) → T } = 1/|K| which is independent of h(y) for all x y ∈ U. Hashing has been an efficient implicit and explicit search technique for retrieving an element from a collection for many years. Collision is inevitable in a high load factor environment, thus several algorithms for resolving collision to find an alternative slot for a key x in a hash table have been presented. One of the important property of these algorithms is running time complexity. Here, we analysed the performance of these algorithms based on runtime analysis for retrieving and inserting a key using asymptotic analysis. We discovered that many of these algorithms have a non constant insertion and retrieval time. Furthermore, only one algorithm was discovered to have an exact constant time for both lookup and insertion of any arbitrary key into a hash table.","PeriodicalId":331369,"journal":{"name":"2021 16th International Conference on Electronics Computer and Computation (ICECCO)","volume":"300 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 16th International Conference on Electronics Computer and Computation (ICECCO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icecco53203.2021.9663778","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The basic idea of hashing is to use a hash function h(k) to reduce a giant universe to a reasonably small table such that U = {0, 1, .., |U | − 1} → T {0, 1, …, |T | − 1} with Prh{h(key) → T } = 1/|K| which is independent of h(y) for all x y ∈ U. Hashing has been an efficient implicit and explicit search technique for retrieving an element from a collection for many years. Collision is inevitable in a high load factor environment, thus several algorithms for resolving collision to find an alternative slot for a key x in a hash table have been presented. One of the important property of these algorithms is running time complexity. Here, we analysed the performance of these algorithms based on runtime analysis for retrieving and inserting a key using asymptotic analysis. We discovered that many of these algorithms have a non constant insertion and retrieval time. Furthermore, only one algorithm was discovered to have an exact constant time for both lookup and insertion of any arbitrary key into a hash table.
用渐近分析评价碰撞解决方法
哈希的基本思想是使用哈希函数h(k)将一个巨大的宇宙缩小到一个相当小的表,这样U ={0,1,…, |U |−1}→T{0,1,…,|T |−1}with Prh{h(key)→T} = 1/|K|对于所有x y∈U,它与h(y)无关。哈希算法多年来一直是一种有效的隐式和显式搜索技术,用于从集合中检索元素。在高负载因子环境中,冲突是不可避免的,因此提出了几种解决冲突的算法,以便在哈希表中为键x找到替代槽。这些算法的一个重要特性是运行时间复杂度。在这里,我们分析了基于运行时分析的这些算法的性能,用于使用渐近分析检索和插入键。我们发现许多算法的插入和检索时间都是非恒定的。此外,发现只有一种算法在查找和向哈希表插入任意键时具有精确的常数时间。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信