Binary TreesBinary Trees36

  1. 1Preorder Traversal of a Binary Tree using Recursion
  2. 2Preorder Traversal of a Binary Tree using Iteration
  3. 3Postorder Traversal of a Binary Tree Using Recursion
  4. 4Postorder Traversal of a Binary Tree using Iteration
  5. 5Level Order Traversal of a Binary Tree using Recursion
  6. 6Level Order Traversal of a Binary Tree using Iteration
  7. 7Reverse Level Order Traversal of a Binary Tree using Iteration
  8. 8Reverse Level Order Traversal of a Binary Tree using Recursion
  9. 9Find Height of a Binary Tree
  10. 10Find Diameter of a Binary Tree
  11. 11Find Mirror of a Binary Tree - Todo
  12. 12Inorder Traversal of a Binary Tree using Recursion
  13. 13Inorder Traversal of a Binary Tree using Iteration
  14. 14Left View of a Binary Tree
  15. 15Right View of a Binary Tree
  16. 16Top View of a Binary Tree
  17. 17Bottom View of a Binary Tree
  18. 18Zigzag Traversal of a Binary Tree
  19. 19Check if a Binary Tree is Balanced
  20. 20Diagonal Traversal of a Binary Tree
  21. 21Boundary Traversal of a Binary Tree
  22. 22Construct a Binary Tree from a String with Bracket Representation
  23. 23Convert a Binary Tree into a Doubly Linked List
  24. 24Convert a Binary Tree into a Sum Tree
  25. 25Find Minimum Swaps Required to Convert a Binary Tree into a BST
  26. 26Check if a Binary Tree is a Sum Tree
  27. 27Check if All Leaf Nodes are at the Same Level in a Binary Tree
  28. 28Lowest Common Ancestor (LCA) in a Binary Tree
  29. 29Solve the Tree Isomorphism Problem
  30. 30Check if a Binary Tree Contains Duplicate Subtrees of Size 2 or More
  31. 31Check if Two Binary Trees are Mirror Images
  32. 32Calculate the Sum of Nodes on the Longest Path from Root to Leaf in a Binary Tree
  33. 33Print All Paths in a Binary Tree with a Given Sum
  34. 34Find the Distance Between Two Nodes in a Binary Tree
  35. 35Find the kth Ancestor of a Node in a Binary Tree
  36. 36Find All Duplicate Subtrees in a Binary Tree

Hashing Technique in DSA | Basics, Applications & Pseudocode



Hashing in a Nutshell

What is Hashing Technique?

Hashing is a technique used to convert a given input into a fixed-size value (called a hash code or hash value) using a function known as a hash function. The result of the hash function is typically used as an index to store the data in an array-like data structure (commonly a hash table).

Hashing allows us to perform operations like search, insert, and delete in O(1) average time, making it one of the most powerful techniques in data structure design and algorithmic problem solving.

How Hashing Works

  1. Use a hash function to convert the key into an index.
  2. Store the value at that index in a hash table.
  3. If two keys hash to the same index, resolve the collision using a method like chaining or open addressing.

Pseudocode

// Basic Hash Table Insertion using Chaining
function insert(key, value):
    index = hashFunction(key)
    if hashTable[index] is empty:
        hashTable[index] = new list
    hashTable[index].append((key, value))

// Search for a value
function search(key):
    index = hashFunction(key)
    for (k, v) in hashTable[index]:
        if k == key:
            return v
    return null

Hash Function

A hash function is used to map a large set of possible keys to a smaller range of indices. A good hash function should:

Example: For strings, a simple hash function might be:

function hashFunction(key):
    hash = 0
    for char in key:
        hash = (hash * 31 + ASCII(char)) % TABLE_SIZE
    return hash

Collision Resolution Techniques

Since multiple keys can hash to the same index, collisions must be handled. Common strategies include:

1. Chaining

2. Open Addressing

Applications of Hashing

Example: Frequency Counter

Given an array of integers, count how many times each number appears:

function countFrequency(arr):
    freq = {}
    for num in arr:
        if num in freq:
            freq[num] += 1
        else:
            freq[num] = 1
    return freq

Time and Space Complexity

When to Use Hashing

Advantages and Disadvantages of Hashing

Advantages

Disadvantages

Conclusion

Hashing is a powerful technique widely used in software engineering, data structures, and system design. Its ability to perform operations in constant time makes it ideal for performance-critical applications. However, careful attention must be given to collision handling and hash function design to maintain efficiency.



Welcome to ProgramGuru

Sign up to start your journey with us

Support ProgramGuru.org

You can support this website with a contribution of your choice.

When making a contribution, mention your name, and programguru.org in the message. Your name shall be displayed in the sponsors list.

PayPal

UPI

PhonePe QR

MALLIKARJUNA M