Report of Bootcamp On Advance Data Structures - TY B Div
Report of Bootcamp On Advance Data Structures - TY B Div
9922963537
About Speaker:
Dr. Ajitkumar S. Shitole completed Ph.D. in Computer Science Engineering from Amity
University Maharashtra, Mumbai. He has published more than 25 research papers in various
International / National Journals / Conferences. His area of interest is Data Mining, Machine
Learning, and Algorithms. Currently,he is working as an Associate Professor in Computer
Engineering Department at I2IT Hinjawadi, Pune. He has published two books titled "Design
and Analysis of Algorithms" for SPPU and BATU. He is having more than 20 years of
teaching experience
Day:Monday Date: 10-03-2025
Session : 1
1. Hash Functions
A hash function converts input data (keys) into a fixed-size numerical value, called a
hash code. A good hash function ensures uniform distribution to avoid collisions.
Collisions occur when two keys generate the same hash value. Common techniques to
handle collisions include:
A) Chaining: Uses linked lists to store multiple values at the same index.
B) Open Addressing: Finds alternative locations within the hash table (e.g., linear
probing, quadratic probing, and double hashing).
3. Applications of Hashing
Singly Linked List: Each node has a single pointer to the next node.
Doubly Linked List: Each node has two pointers, one pointing to the next node and
another to the previous node.
Circular Linked List: The last node links back to the first node, forming a loop.
The session concluded with a discussion on the advantages of binary trees in handling
hierarchical data. The speaker emphasized their significance in improving search
efficiency and memory utilization, making them essential in various computing
applications.
Glimpses of Day1 (10/03/2025)
1. Introduction
The session covered the concept of graphs, a fundamental data structure used to
represent relationships between objects. The speaker explained that graphs consist of
vertices (nodes) and edges (connections), which can be directed or undirected. The
importance of graphs in various applications, such as networking, social media, and
route optimization, was also highlighted.
2. Types of Graphs
During the session, the speaker discussed different types of graphs, including:
Weighted Graph: A graph where edges have weights representing costs or distances.
Connected Graph: A graph where there is at least one path between any two vertices.
Disconnected Graph: A graph where some vertices do not have a connecting path.
3. Graph Representation
Adjacency Matrix: A 2D array where rows and columns represent vertices, and values
indicate edge presence.
Adjacency List: A collection of lists where each vertex has a list of adjacent vertices.
Edge List: A list of all edges in the graph, specifying the start and end vertices.
The session focused on two primary traversal techniques used for exploring graphs:
Breadth-First Search (BFS): A level-wise traversal that uses a queue to explore all
neighbors of a vertex before moving deeper.
Depth-First Search (DFS): A recursive or stack-based traversal method that explores
as far as possible along one branch before backtracking.
6. Applications of Graphs
The session concluded with a discussion on how graphs and their traversal techniques
are crucial in solving real-world problems efficiently. The speaker emphasized the
importance of choosing the appropriate traversal method based on the problem
requirements.