Vigenère cipher: Difference between revisions

From formulasearchengine
Jump to navigation Jump to search
en>Soham
m Reverted 3 edits by 91.62.255.201 identified as test/vandalism using STiki
en>Jc3s5h
m Reverted edits by 39.55.12.16 (talk) to last version by Bender235
Line 1: Line 1:
{{Infobox data structure
By purchasing among CCTV42 camera systems you is going to be significantly reducing the risk of intruders getting the opportunity to target your home. While we utilized to use a Video Tape to record movies, DVR works with all the help of a hard drive recorder (HDR). Cctv dvr network backup DVRs usually form part of the deals that you  best wireless outdoor security camera just order, however you also have the choice to [http://hihume.ru/7_Ridiculously_Simple_Ways_To_Improve_Your_Comcast_Pda buy premium] products from retailers.<br><br>
|name=Binary Heap
|type=tree
|
<!-- NOTE:
    Base of logarithms doesn't matter in big O notation. O(log n) is the same as O(lg n) or O(ln n) or O(log_2 n). A change of base is just a constant factor. So don't change these O(log n) complexities to O(lg n) or something else just to indicate a base-2 log. The base doesn't matter.
-->
|space_avg=O(n)
|space_worst=O(n)
|search_avg=Not supported
|search_worst=Not supported
|insert_avg=O(1)
|insert_worst=O(log n)
|delete_avg=O(log n)
|delete_worst=O(log n)
|peek_avg=O(1)
|peek_worst=O(1)
}}
[[File:Max-Heap.svg|thumb|right|240px|Example of a complete binary max heap]]
[[File:Min-heap.png|thumb|right|240px|Example of a complete binary min heap]]
A '''binary heap''' is a [[heap (data structure)|heap]] [[data structure]] created using a [[binary tree]]. It can be seen as a binary tree with two additional constraints:


;Shape property: The tree is a ''[[Complete Binary Tree|complete binary tree]]''; that is, all levels of the tree, except possibly the last one (deepest) are fully filled, and, if the last level of the tree is not complete, the nodes of that level are filled from left to right.
CCTV Camera Pros can be a direct supplier of security camera systems, business and home surveillance systems, and CCTV equipment (Closed [http://Wiki.vicecityandnetwork.com/index.php?title=Best_Samsung_Sme_2220_Dvr_Security_System_Tips_You_Will_Read_This_Year Circuit] Television). You'll  cms dvr software for mac require consideration for DVR method when you will require top, so purchasing 4 channel DVR or 16 channel recorder could be a predicament.<br><br>Therefore, an intelligent usage of appropriate keywords and attractive 's all an inevitable  outside wireless security camera requirement on your article. In order to obtain noticed you must stand apart through the crowd. Linux based cctv dvr software [http://t23.intelliad.de/index.php?redirect=http%3A//cctvdvrreviews.com cheap outdoor security cameras wireless] To secure your academic future it is quite necessary that you best buy dvr simply know some creative writing ideas for the kids and ensure they do practice it. The goal of writing a satire essay is usually to provide the various readers with a fun, sony dvr humourous and somewhat sarcastic read, while staying with facts.
;Heap property: All nodes are ''either ''[greater than or equal to] ''or ''[less than or equal to] each of its children, according to a comparison [[predicate (mathematical logic)|predicate]] defined for the heap.
 
Heaps with a mathematical "greater than or equal to" (≥) comparison predicate are called ''max-heaps''; those with a mathematical "less than or equal to" (≤) comparison predicate are called ''min-heaps''.  Min-heaps are often used to implement [[priority queue]]s.<ref>{{cite web
|url=http://docs.python.org/library/heapq.html
|title=heapq – Heap queue algorithm
|work=Python Standard Library
}}</ref><ref>{{cite web
|url=http://download.oracle.com/javase/6/docs/api/java/util/PriorityQueue.html
|title=Class PriorityQueue
|work=Java™ Platform Standard Ed. 6
}}</ref>
 
Since the ordering of siblings in a heap is not specified by the heap property, a single node's two children can be freely interchanged unless doing so violates the shape property (compare with [[treap]]).
 
The binary heap is a special case of the [[d-ary heap]] in which d = 2.
 
== Heap operations ==
Both the insert and remove operations modify the heap to conform to the shape property first, by adding or removing from the end of the heap. Then the heap property is restored by traversing up or down the heap. Both operations take O(log ''n'') time.
 
=== Insert ===
To add an element to a heap we must perform an ''up-heap'' operation (also known as ''bubble-up'', ''percolate-up'', ''sift-up'', ''trickle up'', ''heapify-up'', or ''cascade-up''), by following this algorithm:
 
#Add the element to the bottom level of the heap.
#Compare the added element with its parent; if they are in the correct order, stop.
#If not, swap the element with its parent and return to the previous step.
 
The number of operations required is dependent on the number of levels the new element must rise to satisfy the heap property, thus the insertion operation has a time complexity of O(log ''n''). However, in 1974, Thomas Porter and Istvan Simon proved that the function for the average number of levels an inserted node moves up is upper bounded by the constant 1.6067.<ref>{{cite web|title=Random Insertion into a Priority Queue Structure|url=ftp://reports.stanford.edu/pub/cstr/reports/cs/tr/74/460/CS-TR-74-460.pdf|work=Stanford University Reports|publisher=Stanford University|accessdate=31 January 2014|author=Thomas Porter|coauthors=Istvan Simon|page=13|year=1974}}</ref> The average number of operations required for an insertion into a binary heap is 2.6067 since one additional comparison is made that does not result in the inserted node moving up a level. Thus, on average, binary heap insertion has a constant, O(1), time complexity.  Intuitively, this makes sense since approximately 50% of the elements are leaves and approximately 75% of the elements are in the bottom two levels, it is likely that the new element to be inserted will only move a few levels upwards to maintain the heap.
 
As an example of binary heap insertion, say we have a max-heap
 
::[[File:Heap add step1.svg|150px]]
 
and we want to add the number 15 to the heap. We first place the 15 in the position marked by the X. However, the heap property is violated since 15 is greater than 8, so we need to swap the 15 and the 8. So, we have the heap looking as follows after the first swap:
 
::[[File:Heap add step2.svg|150px]]
 
However the heap property is still violated since 15 is greater than 11, so we need to swap again:
 
::[[File:Heap add step3.svg|150px]]
 
which is a valid max-heap. There is no need to check the children after this. Before we placed 15 on X, the heap was valid, meaning 11 is greater than 5. If 15 is greater than 11, and 11 is greater than 5, then 15 must be greater than 5, because of the [[transitive relation]].
 
=== Delete ===
The procedure for deleting the root from the heap (effectively extracting the maximum element in a max-heap or the minimum element in a min-heap) and restoring the properties is called ''down-heap'' (also known as ''bubble-down'', ''percolate-down'', ''sift-down'', ''trickle down'', ''heapify-down'', ''cascade-down'' and ''extract-min/max'').
 
#Replace the root of the heap with the last element on the last level.
#Compare the new root with its children; if they are in the correct order, stop.
#If not, swap the element with one of its children and return to the previous step. (Swap with its smaller child in a min-heap and its larger child in a max-heap.)
 
So, if we have the same max-heap as before
 
::[[File:Heap delete step0.svg|150px]]
 
We remove the 11 and replace it with the 4.
 
::[[File:Heap remove step1.svg|150px]]
 
Now the heap property is violated since 8 is greater than 4. In this case, swapping the two elements, 4 and 8, is enough to restore the heap property and we need not swap elements further:
 
::[[File:Heap remove step2.svg|150px]]
 
The downward-moving node is swapped with the ''larger'' of its children in a max-heap (in a min-heap it would be swapped with its smaller child), until it satisfies the heap property in its new position. This functionality is achieved by the '''Max-Heapify''' function as defined below in [[pseudocode]] for an [[Array data structure|array]]-backed heap ''A'' of length ''heap_length''[''A''].  Note that "A" is indexed starting at 1, not 0 as is common in many real programming languages.
 
'''Max-Heapify'''<ref name="CLRS">{{Citation | last1= Cormen | first1=T. H. | last2=al. | lastauthoramp=yes | title=Introduction to Algorithms | publisher=The MIT Press | place=Cambridge, Massachusetts | edition=2nd | year=2001 | isbn=0-07-013151-1}}</ref> (''A'', ''i''):<br/>
{{pad|2em}}''left'' ← 2''i''<br/>
{{pad|2em}}''right'' ← 2''i'' + 1<br/>
{{pad|2em}}''largest'' ← ''i''<br/>
{{pad|2em}}'''if''' ''left'' ≤ ''heap_length''[''A''] '''and''' ''A''[''left''] > A[''largest''] '''then''':<br/>
{{pad|4em}}''largest'' ← ''left''<br/>
{{pad|2em}}'''if''' ''right'' ≤ ''heap_length''[''A''] '''and''' ''A''[''right''] > ''A''[''largest''] '''then''':<br/>
{{pad|4em}}''largest'' ← ''right''<br/>
{{pad|2em}}'''if''' ''largest'' ≠ ''i'' '''then''':<br/>
{{pad|4em}}'''swap''' ''A[''i''] ↔ ''A''[''largest'']<br/>
{{pad|4em}}Max-Heapify(''A'', ''largest'')
 
For the above algorithm to correctly re-heapify the array, the node at index ''i'' and its two direct children must violate the heap property. If they do not, the algorithm will fall through with no change to the array. The down-heap operation (without the preceding swap) can also be used to modify the value of the root, even when an element is not being deleted.
 
In the worst case, the new root has to be swapped with its child on each level until it reaches the bottom level of the heap, meaning that the delete operation has a time complexity relative to the height of the tree, or O(log ''n'').
 
==Building a heap==
A heap could be built by successive insertions. This approach requires <math>O(n \log n)</math> time because each insertion takes <math>O(\log n)</math> time and there are <math>n</math> elements. However this is not the optimal method. The optimal method starts by arbitrarily putting the elements on a binary tree, respecting the shape property (the tree could be represented by an array, see below). Then starting from the lowest level and moving upwards, shift the root of each subtree downward as in the deletion algorithm until the heap property is restored. More specifically if all the subtrees starting at some height <math>h</math> (measured from the bottom) have already been "heapified", the trees at height <math>h+1</math> can be heapified by sending their root down along the path of maximum valued children when building a max-heap, or minimum valued children when building a min-heap. This process takes <math>O(h)</math> operations (swaps) per node. In this method most of the heapification takes place in the lower levels. Since the height of the heap is <math> \left\lfloor \lg (n) \right\rfloor</math>, the number of nodes at height <math>h</math> is <math>\le \left\lceil 2^{\left(\lg n - h\right) - 1} \right\rceil = \left\lceil \frac{2^{\lg n}}{2^{h+1}}\right\rceil = \left\lceil\frac{n}{2^{h+1}}\right\rceil</math>. Therefore, the cost of heapifying all subtrees is:
 
:<math>
\begin{align}
\sum_{h=0}^{\lceil \lg n \rceil} \frac{n}{2^{h+1}}O(h) & =
O\left(n\sum_{h=0}^{\lceil \lg n \rceil} \frac{h}{2^{h + 1}}\right) \\
& \le O\left(n\sum_{h=0}^{\infty} \frac{h}{2^h}\right) \\
& = O(n)
 
\end{align}
</math>
 
This uses the fact that the given infinite [[series (mathematics)|series]] ''h'' / 2<sup>''h''</sup> [[Convergent series|converges]] to 2.
 
The exact value of the above (the worst-case number of comparisons during the heap construction) is known to be equal to:
 
:<math> 2 n - 2 s_2 (n) - e_2 (n) </math>,<ref>{{citation
| last1 = Suchenek | first1 = Marek A.
| title = Elementary Yet Precise Worst-Case Analysis of Floyd's Heap-Construction Program
| doi = 10.3233/FI-2012-751
| pages = 75–92
| publisher = IOS Press
| journal = Fundamenta Informaticae
| volume = 120
| issue = 1
| year = 2012
| url = http://www.deepdyve.com/lp/ios-press/elementary-yet-precise-worst-case-analysis-of-floyd-s-heap-50NW30HMxU}}.</ref>
where s<sub>2</sub>(n) is the sum of all digits of the binary representation of n and e<sub>2</sub>(n) is the exponent of 2 in the prime factorization of n.
 
The '''Build-Max-Heap''' function that follows, converts an array ''A'' which stores a complete
binary tree with n nodes to a max-heap by repeatedly using '''Max-Heapify''' in a bottom up manner.
It is based on the observation that the array elements indexed by
''[[floor function|floor]]''(n/2) + 1, ''floor''(n/2) + 2, ..., n
are all leaves for the tree, thus each is a one-element heap. '''Build-Max-Heap''' runs
'''Max-Heapify''' on each of the remaining tree nodes.
 
'''Build-Max-Heap'''<ref name="CLRS"/> (''A''):<br/>
{{pad|2em}}''heap_length''[''A''] ← ''length''[''A'']<br/>
{{pad|2em}}'''for''' ''i'' ← ''floor''(''length''[''A'']/2) '''downto''' 1 '''do'''<br/>
{{pad|4em}}'''Max-Heapify'''(''A'', ''i'')
 
== Heap implementation ==<!-- This section is linked from [[Heapsort]] -->
[[File:Binary tree in array.svg|300px|right|frame|A small complete binary tree stored in an array]]
[[File:Binary Heap with Array Implementation.JPG|400px|thumb|right|Comparison between a binary heap and an array implementation.]]
 
Heaps are commonly implemented with an [[Array data structure|array]]. Any binary tree can be stored in an array, but because a heap is always an almost complete binary tree, it can be stored compactly. No space is required for [[pointer (computer programming)|pointer]]s; instead, the parent and children of each node can be found by arithmetic on array indices. These properties make this heap implementation a simple example of an [[implicit data structure]] or [[Binary tree#Ahnentafel list|Ahnentafel list]]. Details depend on the root position, which in turn may depend on constraints of a [[programming language]] used for implementation, or programmer preference. Specifically, sometimes the root is placed at index 1, sacrificing space in order to simplify arithmetic. The ''[[Peek (data type operation)|peek]]'' operation (''find-min'' or ''find-max'') simply returns the value of the root, and is thus O(1).
 
Let ''n'' be the number of elements in the heap and ''i'' be an arbitrary valid index of the array storing the heap. If the tree root is at index 0, with valid indices 0 through ''n − ''1, then each element ''a'' at index ''i'' has
* children at indices 2''i ''+ 1 and 2''i ''+ 2
* its parent ⌊(''i ''&minus; 1) ∕ 2⌋ where ⌊…⌋ is the [[floor function]].
Alternatively, if the tree root is at index 1, with valid indices 1 through ''n'', then each element ''a'' at index ''i'' has
* children at indices 2''i'' and 2''i ''+1
* its parent at index ⌊''i ∕'' 2⌋.
 
This implementation is used in the [[heapsort]] algorithm, where it allows the space in the input array to be reused to store the heap (i.e. the algorithm is done [[In-place algorithm|in-place]]). The implementation is also useful for use as a [[Priority queue]] where use of a [[dynamic array]] allows insertion of an unbounded number of items.
 
The upheap/downheap operations can then be stated in terms of an array as follows: suppose that the heap property holds for the indices ''b'', ''b''+1, ..., ''e''. The sift-down function extends the heap property to ''b''−1, ''b'', ''b''+1, ..., ''e''.
Only index ''i'' = ''b''−1 can violate the heap property.
Let ''j'' be the index of the largest child of ''a''[''i''] (for a max-heap, or the smallest child for a min-heap) within the range ''b'', ..., ''e''.
(If no such index exists because 2''i'' > ''e'' then the heap property holds for the newly extended range and nothing needs to be done.)
By swapping the values ''a''[''i''] and ''a''[''j''] the heap property for position ''i'' is established.
At this point, the only problem is that the heap property might not hold for index ''j''.
The sift-down function is applied [[tail recursion|tail-recursively]] to index ''j'' until the heap property is established for all elements.
 
The sift-down function is fast. In each step it only needs two comparisons and  one swap. The index value where it is working doubles in each iteration, so that at most log<sub>2</sub> ''e'' steps are required.
 
For big heaps and using [[virtual memory]], storing elements in an array according to the above scheme is inefficient: (almost) every level is in a different [[Page (computer memory)|page]].  [[B-heap]]s are binary heaps that keep subtrees in a single page, reducing the number of pages accessed by up to a factor of ten.<ref>
Poul-Henning Kamp.
[http://queue.acm.org/detail.cfm?id=1814327 "You're Doing It Wrong"].
ACM Queue.
June 11, 2010.
</ref>
 
The operation of merging two binary heaps takes Θ(''n'') for equal-sized heaps. The best you can do is (in case of array implementation) simply concatenating the two heap arrays and build a heap of the result.<ref>
Chris L. Kuszmaul.
[http://nist.gov/dads/HTML/binaryheap.html "binary heap"].
Dictionary of Algorithms and Data Structures, Paul E. Black, ed., U.S. National Institute of Standards and Technology. 16 November 2009.
</ref> A heap on ''n'' elements can be merged with a heap on ''k'' elements using O(log ''n'' log ''k'') key comparisons, or, in case of a pointer-based implementation, in O(log ''n'' log ''k'') time.<ref>J.-R. Sack and  T. Strothotte
[http://www.springerlink.com/content/k24440h5076w013q/ "An Algorithm for Merging Heaps"],
Acta Informatica 22, 171-186 (1985).</ref> An algorithm for splitting a heap on ''n'' elements into two heaps on ''k'' and ''n-k'' elements, respectively, based on a new view
of heaps as an ordered collections of subheaps was presented in.<ref>. J.-R. Sack and T. Strothotte
[http://www.sciencedirect.com/science/article/pii/089054019090026E "A characterization of heaps and its applications"]
Information and Computation
Volume 86, Issue 1, May 1990, Pages 69–86.</ref> The algorithm requires  O(log ''n'' * log ''n'')  comparisons. The view  also presents a new and conceptually simple algorithm for merging heaps. When merging is a common task, a different heap implementation is recommended, such as  [[binomial heap]]s, which can be merged in O(log ''n'').
 
Additionally, a binary heap can be implemented with a traditional binary tree data structure, but there is an issue with finding the adjacent element on the last level on the binary heap when adding an element. This element can be determined algorithmically or by adding extra data to the nodes, called "threading" the tree—instead of merely storing references to the children, we store the [[inorder]] successor of the node as well.
 
It is possible to modify the heap structure to allow extraction of both the smallest and largest element in  [[Big O notation|<math>O</math>]]<math>(\log n)</math> time.<ref name="sym">{{cite web
| url = http://cg.scs.carleton.ca/~morin/teaching/5408/refs/minmax.pdf
| author = Atkinson, M.D., [[Jörg-Rüdiger Sack|J.-R. Sack]], N. Santoro, and T. Strothotte
| title = Min-max heaps and generalized priority queues.
| publisher = Programming techniques and Data structures. Comm. ACM, 29(10): 996–1000
| date = 1 October 1986
}}</ref>  To do this, the rows alternate between min heap and max heap. The algorithms are roughly the same, but, in each step, one must consider the alternating rows with alternating comparisons.  The performance is roughly the same as a normal single direction heap. This idea can be generalised to a min-max-median heap.
 
== Derivation of index equations ==
In an array-based heap, the children and parent of a node can be located via simple arithmetic on the node's index. This section derives the relevant equations for heaps with their root at index 0, with additional notes on heaps with their root at index 1.
 
To avoid confusion, we'll define the '''level''' of a node as its distance from the root, such that the root itself occupies level 0.
 
=== Child nodes ===
 
For a general node located at index <math>i</math> (beginning from 0), we will first derive the index of its right child, <math>\text{right} = 2i + 2</math>.
 
Let node <math>i</math> be located in level <math>L</math>, and note that any level <math>l</math> contains exactly <math>2^l</math> nodes. Furthermore, there are exactly <math>2^{l + 1} - 1</math> nodes contained in the layers up to and including layer <math>l</math> (think of binary arithmetic; 0111...111 = 1000...000 - 1). Because the root is stored at 0, the <math>k</math>th node will be stored at index <math>(k - 1)</math>. Putting these observations together yields the following expression for the '''index of the last node in layer l'''.
 
::<math>\text{last}(l) = (2^{l + 1} - 1) - 1 = 2^{l + 1} - 2</math>
 
Let there be <math>j</math> nodes after node <math>i</math> in layer L, such that
 
::<math>\begin{alignat}{2}
i = & \quad \text{last}(L) - j\\
  = & \quad (2^{L + 1} -2) - j\\
\end{alignat}
</math>
 
Each of these <math>j</math> nodes must have exactly 2 children, so there must be <math>2j</math> nodes separating <math>i</math>'s right child from the end of its layer (<math>L + 1</math>).
 
::<math>\begin{alignat}{2}
\text{right} = & \quad \text{last(L + 1)} -2j\\
            = & \quad (2^{L + 2} -2) -2j\\
            = & \quad 2(2^{L + 1} -2 -j) + 2\\
            = & \quad 2i + 2
\end{alignat}
</math>
 
As required.
 
Noting that the left child of any node is always 1 place before its right child, we get <math>\text{left} = 2i + 1</math>.
 
If the root is located at index 1 instead of 0, the last node in each level is instead at index <math>2^{l + 1} - 1</math>. Using this throughout yields <math>\text{left} = 2i</math> and <math>\text{right} = 2i + 1</math> for heaps with their root at 1.
 
=== Parent node ===
 
Every node is either the left or right child of its parent, so we know that either of the following is true.
 
# <math>i = 2 \times (\text{parent}) + 1</math>
# <math>i = 2 \times (\text{parent}) + 2</math>
 
Hence,
::<math>\text{parent} = \frac{i - 1}{2} \textbf{ or } \frac{i - 2}{2}</math>
 
Now consider the expression <math>\left\lfloor \dfrac{i - 1}{2} \right\rfloor</math>.
 
If node <math>i</math> is a left child, this gives the result immediately, however, it also gives the correct result if node <math>i</math> is a right child. In this case, <math>(i - 2)</math> must be even, and hence <math>(i - 1)</math> must be odd.
 
::<math>\begin{alignat}{2}
\left\lfloor \dfrac{i - 1}{2} \right\rfloor = & \quad \left\lfloor \dfrac{i - 2}{2} + \dfrac{1}{2} \right\rfloor\\
= & \quad \frac{i - 2}{2}\\
= & \quad \text{parent}
\end{alignat}
</math>
 
Therefore, irrespective of whether a node is a left or right child, its parent can be found by the expression:
 
::<math>\text{parent} = \left\lfloor \dfrac{i - 1}{2} \right\rfloor</math>
 
==See also==
* [[Heap (data structure)|Heap]]
* [[Heapsort]]
 
==Notes==
{{notelist}}
 
==References==
{{reflist}}
 
==External links==
*[http://people.ksp.sk/~kuko/bak/index.html Binary Heap Applet] by Kubo Kovac
*[http://www.policyalmanac.org/games/binaryHeaps.htm Using Binary Heaps in A* Pathfinding]
*[http://opendatastructures.org/versions/edition-0.1e/ods-java/10_1_BinaryHeap_Implicit_Bi.html Open Data Structures - Section 10.1 - BinaryHeap: An Implicit Binary Tree]
 
{{Data structures}}
 
{{DEFAULTSORT:Binary Heap}}
[[Category:Heaps (data structures)]]

Revision as of 19:03, 6 February 2014

By purchasing among CCTV42 camera systems you is going to be significantly reducing the risk of intruders getting the opportunity to target your home. While we utilized to use a Video Tape to record movies, DVR works with all the help of a hard drive recorder (HDR). Cctv dvr network backup DVRs usually form part of the deals that you best wireless outdoor security camera just order, however you also have the choice to buy premium products from retailers.

CCTV Camera Pros can be a direct supplier of security camera systems, business and home surveillance systems, and CCTV equipment (Closed Circuit Television). You'll cms dvr software for mac require consideration for DVR method when you will require top, so purchasing 4 channel DVR or 16 channel recorder could be a predicament.

Therefore, an intelligent usage of appropriate keywords and attractive 's all an inevitable outside wireless security camera requirement on your article. In order to obtain noticed you must stand apart through the crowd. Linux based cctv dvr software cheap outdoor security cameras wireless To secure your academic future it is quite necessary that you best buy dvr simply know some creative writing ideas for the kids and ensure they do practice it. The goal of writing a satire essay is usually to provide the various readers with a fun, sony dvr humourous and somewhat sarcastic read, while staying with facts.