General Trees. Tree Traversal Algorithms. Binary Trees. 2 CPSC 3200 University of Tennessee at Chattanooga – Summer 2013 © 2010 Goodrich, Tamassia.

Slides:



Advertisements
Similar presentations
Trees and Binary Trees Become Rich Force Others to be Poor Rob Banks
Advertisements

Trees1 More on Trees University Fac. of Sci. & Eng. Bus. School Law School CS Dept. EE Dept. Math. Dept.
Data Structures Lecture 6 Fang Yu Department of Management Information Systems National Chengchi University Fall 2010.
Trees Briana B. Morrison Adapted from Alan Eugenio.
1 prepared from lecture material © 2004 Goodrich & Tamassia COMMONWEALTH OF AUSTRALIA Copyright Regulations 1969 WARNING This material.
© 2004 Goodrich, Tamassia Binary Search Trees   
© 2004 Goodrich, Tamassia Trees1 Make Money Fast! Stock Fraud Ponzi Scheme Bank Robbery.
Binary Search Trees1 Part-F1 Binary Search Trees   
© 2004 Goodrich, Tamassia Priority Queues1 Heaps: Tree-based Implementation of a Priority Queue.
© 2004 Goodrich, Tamassia Trees1 Chapter 7 Trees Make Money Fast! Stock Fraud Ponzi Scheme Bank Robbery.
Trees1 Recursion Recursion is a concept of defining a method that makes a call to itself.
Chapter 7: Trees Objectives:
© 2004 Goodrich, Tamassia Trees1 Lecture 04 Trees Topics Trees Binary Trees Binary Search trees.
Elementary Data Structures Stacks, Queues, & Lists Amortized analysis Trees.
1 Chapter 7 Trees. 2 What is a Tree In computer science, a tree is an abstract model of a hierarchical structure A tree consists of nodes with a parent-child.
© 2004 Goodrich, Tamassia Trees1 this is a tree. © 2004 Goodrich, Tamassia Trees2 What is a Tree? In computer science, a tree is an abstract model of.
Trees COMP53 Oct 31, What is a Tree? A tree is an abstract model of a hierarchical structure A tree consists of nodes with a parent-child relation.
Trees1 Part-C Trees Make Money Fast! Stock Fraud Ponzi Scheme Bank Robbery.
Trees Chapter 8.
Trees.
Make Money Fast! Stock Fraud Apply shortcuts Bank Robbery Just For Laughs Trees This one is cool eITnotes.com For more notes and topics visit:
Trees CSCI 3333 Data Structures. Acknowledgement  Dr. Bun Yue  Mr. Charles Moen  Dr. Wei Ding  Ms. Krishani Abeysekera  Dr. Michael Goodrich  Dr.
Chapter 7:Trees Nancy Amato Parasol Lab, Dept. CSE, Texas A&M University Acknowledgement: These slides are adapted from slides provided with Data Structures.
Saturday, 04 Apr 2010 University of Palestine Computer Science II Trees.
Trees 4/23/2017 Trees.
© 2004 Goodrich, Tamassia Trees1 Text Book: M. T. Goodrich and R. Tamassia, "Data Structures and Algorithms in Java," 4th edition, 2006, Wiley & Sons,
Binary Search Trees (10.1) CSE 2011 Winter November 2015.
© 2004 Goodrich, Tamassia Binary Search Trees1 CSC 212 Lecture 18: Binary and AVL Trees.
Trees by Dr. Bun Yue Professor of Computer Science CSCI 3333 Data Structures.
1 Binary Trees (7.3) CSE 2011 Winter November 2015.
Trees1 Make Money Fast! Stock Fraud Ponzi Scheme Bank Robbery © 2010 Goodrich, Tamassia.
Lecture11: Tree I Bohyung Han CSE, POSTECH CSED233: Data Structures (2014F)
Trees1 Make Money Fast! Stock Fraud Ponzi Scheme Bank Robbery © 2010 Goodrich, Tamassia.
Trees1 Make Money Fast! Stock Fraud Ponzi Scheme Bank Robbery © 2013 Goodrich, Tamassia, Goldwasser.
CH 7. TREES ACKNOWLEDGEMENT: THESE SLIDES ARE ADAPTED FROM SLIDES PROVIDED WITH DATA STRUCTURES AND ALGORITHMS IN C++, GOODRICH, TAMASSIA AND MOUNT (WILEY.
24 January Trees CSE 2011 Winter Trees Linear access time of linked lists is prohibitive  Does there exist any simple data structure for.
CH 7 : TREE ACKNOWLEDGEMENT: THESE SLIDES ARE ADAPTED FROM SLIDES PROVIDED WITH DATA STRUCTURES AND ALGORITHMS IN C++, GOODRICH, TAMASSIA AND MOUNT (WILEY.
Trees1 Make Money Fast! Stock Fraud Ponzi Scheme Bank Robbery © 2010 Goodrich, Tamassia.
© 2004 Goodrich, Tamassia Trees1 Make Money Fast! Stock Fraud Ponzi Scheme Bank Robbery.
TREE Ahsan Ahmed College of Computer and Information Science Majma’ah University 1.
1 COMP9024: Data Structures and Algorithms Week Five: Trees Hui Wu Session 1, 2015
© 2004 Goodrich, Tamassia BINARY SEARCH TREES Binary Search Trees   
What is a Tree? Formally, we define a tree T as a set of nodes storing elements such that the nodes have a parent-child relationship, that satisfies the.
Trees Make Money Fast! Stock Fraud Ponzi Scheme Bank Robbery
Trees 5/2/2018 Presentation for use with the textbook Data Structures and Algorithms in Java, 6th edition, by M. T. Goodrich, R. Tamassia, and M. H. Goldwasser,
Trees 5/10/2018 Presentation for use with the textbook Data Structures and Algorithms in Java, 6th edition, by M. T. Goodrich, R. Tamassia, and M. H. Goldwasser,
Searching (and into Trees)
Binary Search Trees < > = © 2010 Goodrich, Tamassia
Binary Search Trees < > =
Trees Make Money Fast! Stock Fraud Ponzi Scheme Bank Robbery
Trees Make Money Fast! Stock Fraud Ponzi Scheme Bank Robbery Trees
Chapter 10 Search Trees 10.1 Binary Search Trees Search Trees
Trees 二○一八年八月二十六日 Part-C Trees Trees.
Chapter 10.1 Binary Search Trees
Trees Chuan-Ming Liu Computer Science & Information Engineering
Binary Search Trees < > = Binary Search Trees
© 2013 Goodrich, Tamassia, Goldwasser
Trees 9/21/2018 9:58 PM Trees this is a tree Trees.
Trees Make Money Fast! Stock Fraud Ponzi Scheme Bank Robbery
Trees Make Money Fast! Stock Fraud Ponzi Scheme Bank Robbery
Trees Make Money Fast! Stock Fraud Ponzi Scheme Bank Robbery
Binary Search Trees < > = © 2010 Goodrich, Tamassia
Binary Search Trees < > = Binary Search Trees
Week nine-ten: Trees Trees.
Trees Make Money Fast! Stock Fraud Ponzi Scheme Bank Robbery Trees
Trees "A tree may grow a thousand feet tall, but its leaves will return to its roots." -Chinese Proverb CLRS, Section 10.4.
Trees Palestine Gaza West Bank 48 Stolen Land Trees Trees
Copyright © Aiman Hanna All rights reserved
CS210- Lecture 9 June 20, 2005 Announcements
Trees Make Money Fast! Stock Fraud Ponzi Scheme Bank Robbery
Presentation transcript:

General Trees. Tree Traversal Algorithms. Binary Trees. 2 CPSC 3200 University of Tennessee at Chattanooga – Summer 2013 © 2010 Goodrich, Tamassia

In computer science, a tree is an abstract model of a hierarchical structure. A tree consists of nodes with a parent-child relation. Applications: Organization charts. File systems. Programming environments. Computers”R”Us SalesR&DManufacturing LaptopsDesktops US International EuropeAsiaCanada CPSC 3200 University of Tennessee at Chattanooga – Summer © 2010 Goodrich, Tamassia

Subtree Root: node without parent (A) Internal node: node with at least one child (A, B, C, F) External node (a.k.a. leaf ): node without children (E, I, J, K, G, H, D) Ancestors of a node: parent, grandparent, grand-grandparent, etc. Depth of a node: number of ancestors Height of a tree: maximum depth of any node (3) Descendant of a node: child, grandchild, grand-grandchild, etc. A B DC GH E F IJ K Subtree: tree consisting of a node and its descendants. CPSC 3200 University of Tennessee at Chattanooga – Summer © 2010 Goodrich, Tamassia

edge of tree T is a pair of nodes (u,v) such that u is the parent of v, or vice versa. Path of T is a sequence of nodes such that any two consecutive nodes in the sequence form an edge. A tree is ordered if there is a linear ordering defined for the children of each node CPSC 3200 University of Tennessee at Chattanooga – Summer © 2010 Goodrich, Tamassia

We use positions (nodes) to abstract nodes. getElement( ): Return the object stored at this position. Generic methods: integer getSize( ) boolean isEmpty( ) Iterator iterator( ) Iterable positions( ) Accessor methods: position getRoot( ) position getThisParent(p) Iterable children(p) Query methods: boolean isInternal(p) boolean isExternal(p) boolean isRoot(p) Update method: element replace (p, o) Additional update methods may be defined by data structures implementing the Tree ADT. CPSC 3200 University of Tennessee at Chattanooga – Summer © 2010 Goodrich, Tamassia

CPSC 3200 University of Tennessee at Chattanooga – Summer © 2010 Goodrich, Tamassia

Let v be a node of a tree T. The depth of v is the number of ancestors of v, excluding v itself. If v is the root, then the depth of v is 0 Otherwise, the depth of v is one plus the depth of the parent of v. The running time of algorithm depth(T, v) is O(d v ), where d v denotes the depth of the node v in the tree T. CPSC 3200 University of Tennessee at Chattanooga – Summer Algorithm depth(T, v): if v is the root of T then return 0 else return 1+depth(T, w), where w is the parent of v in T © 2010 Goodrich, Tamassia

A tree is a data structure which stores elements in parent- child relationship. A BC D E F GH Root node Internal nodes Leaf nodes (External nodes) Siblings CPSC 3200 University of Tennessee at Chattanooga – Summer

Depth: the number of ancestors of that node (excluding itself). Height: the maximum depth of an external node of the tree/subtree. A BC D E F GH I Depth(D) = ?Depth(D) = 1 Depth(D) = 2 Depth(I) = ? Depth(I) = 3 Height = MAX[ Depth(A), Depth(B), Depth(C), Depth(D), Depth(E), Depth(F), Depth(G), Depth(H), Depth(I) ] Height = MAX[ 0, 1, 1, 2, 2, 2, 2, 2, 3 ] = 3 CPSC 3200 University of Tennessee at Chattanooga – Summer

The height of a node v in a tree T is can be calculated using the depth algorithm. algorithm height1 runs in O(n 2 ) time CPSC 3200 University of Tennessee at Chattanooga – Summer Algorithm height1(T): h ← 0 for each vertex v in T do if v is an external node in T then h ← max(h, depth(T, v)) return h © 2010 Goodrich, Tamassia

The height of a node v in a tree T is also defined recursively: If v is an external node, then the height of v is 0 Otherwise, the height of v is one plus the maximum height of a child of v. algorithm height1 runs in O(n) time CPSC 3200 University of Tennessee at Chattanooga – Summer Algorithm height2(T, v): if v is an external node in T then return 0 else h ← 0 for each child w of v in T do h ← max(h, height2(T, w)) return 1+h © 2010 Goodrich, Tamassia

A traversal visits the nodes of a tree in a systematic manner. In a preorder traversal, a node is visited before its descendants. Application: print a structured document. Make Money Fast! 1. MotivationsReferences2. Methods 2.1 Stock Fraud 2.2 Ponzi Scheme 1.1 Greed1.2 Avidity 2.3 Bank Robbery Algorithm preOrder(v) visit(v) for each child w of v preorder (w) CPSC 3200 University of Tennessee at Chattanooga – Summer © 2010 Goodrich, Tamassia

In a postorder traversal, a node is visited after its descendants. Application: compute space used by files in a directory and its subdirectories. Algorithm postOrder(v) for each child w of v postOrder (w) visit(v) cs16/ homeworks/ todo.txt 1K programs/ DDR.java 10K Stocks.java 25K h1c.doc 3K h1nc.doc 2K Robot.java 20K CPSC 3200 University of Tennessee at Chattanooga – Summer © 2010 Goodrich, Tamassia

The order in which the nodes are visited during a tree traversal can be easily determined by imagining there is a “flag” attached to each node, as follows: To traverse the tree, collect the flags: preorderinorderpostorder A BC DEFG A BC DEFG A BC DEFG A B D E C F G D B E A F C G D E B F G C A CPSC 3200 University of Tennessee at Chattanooga – Summer

The other traversals are the reverse of these three standard ones That is, the right subtree is traversed before the left subtree is traversed Reverse preorder: root, right subtree, left subtree. Reverse inorder: right subtree, root, left subtree. Reverse postorder: right subtree, left subtree, root. CPSC 3200 University of Tennessee at Chattanooga – Summer

A binary tree is a tree with the following properties: Each internal node has at most two children (exactly two for proper binary trees). The children of a node are an ordered pair. We call the children of an internal node left child and right child. Alternative recursive definition: a binary tree is either a tree consisting of a single node, or a tree whose root has an ordered pair of children, each of which is a binary tree. A B C FG D E H I Applications: arithmetic expressions. decision processes. searching. CPSC 3200 University of Tennessee at Chattanooga – Summer © 2010 Goodrich, Tamassia

A binary tree is balanced if every level above the lowest is “full” (contains 2 h nodes) In most applications, a reasonably balanced binary tree is desirable. a bc defg hij A balanced binary tree a b c d e f gh ij An unbalanced binary tree CPSC 3200 University of Tennessee at Chattanooga – Summer

Binary tree associated with a decision process internal nodes: questions with yes/no answer external nodes: decisions Example: dining decision Want a fast meal? How about coffee?On expense account? StarbucksSpike’sAl FornoCafé Paragon Yes No YesNoYesNo CPSC 3200 University of Tennessee at Chattanooga – Summer © 2010 Goodrich, Tamassia

Binary tree associated with an arithmetic expression internal nodes: operators external nodes: operands Example: arithmetic expression tree for the expression (2  ( a  1)  (3  b))    2 a1 3b CPSC 3200 University of Tennessee at Chattanooga – Summer © 2010 Goodrich, Tamassia

Is a binary tree where the number of external nodes is 1 more than the number of internal nodes. CPSC 3200 University of Tennessee at Chattanooga – Summer

Is a binary tree where the number of external nodes is 1 more than the number of internal nodes. A BC D Internal nodes = 2 External nodes = 2 CPSC 3200 University of Tennessee at Chattanooga – Summer

Is a binary tree where the number of external nodes is 1 more than the number of internal nodes. A BC D Internal nodes = 2 External nodes = 3 E CPSC 3200 University of Tennessee at Chattanooga – Summer

Is a binary tree where the number of external nodes is 1 more than the number of internal nodes. A BC D Internal nodes = 3 External nodes = 3 EF CPSC 3200 University of Tennessee at Chattanooga – Summer

Is a binary tree where the number of external nodes is 1 more than the number of internal nodes. A BC D Internal nodes = 3 External nodes = 4 E F G CPSC 3200 University of Tennessee at Chattanooga – Summer

Worst case: The tree having the minimum number of external and internal nodes. Best case: The tree having the maximum number of external and internal nodes. 1. The number of external nodes is at least h+1 and at most 2 h Ex: h = 3 External nodes = 3+1 = 4 External nodes = 2 3 = 8 CPSC 3200 University of Tennessee at Chattanooga – Summer

2. The number of internal nodes is at least h and at most 2 h -1 Ex: h = 3 Worst case: The tree having the minimum number of external and internal nodes. Best case: The tree having the maximum number of external and internal nodes. Internal nodes = 3 Internal nodes = =7 CPSC 3200 University of Tennessee at Chattanooga – Summer

3. The number of nodes is at least 2h+1 and at most 2 h+1 -1 Ex: h = 3 Internal nodes = 3 External nodes = Internal + External = 2*3 +1 = 7 Internal nodes = 7 External nodes = Internal + External = – 1 = 15 CPSC 3200 University of Tennessee at Chattanooga – Summer

4. The height is at least log(n+1)-1 and at most (n-1)/2 Number of nodes = 7 h = 3 Number of nodes = 15 h = 3 CPSC 3200 University of Tennessee at Chattanooga – Summer

The BinaryTree ADT extends the Tree ADT, i.e., it inherits all the methods of the Tree ADT. Additional methods: position getThisLeft(p) position getThisRightight(p) boolean hasLeft(p) boolean hasRight(p) Update methods may be defined by data structures implementing the BinaryTree ADT. CPSC 3200 University of Tennessee at Chattanooga – Summer © 2010 Goodrich, Tamassia

A node is represented by an object storing Element Parent node Left child node Right child node Node objects implement the Position ADT B D A CE   BADCE  CPSC 3200 University of Tennessee at Chattanooga – Summer © 2010 Goodrich, Tamassia

CPSC 3200 University of Tennessee at Chattanooga – Summer © 2010 Goodrich, Tamassia

addRoot(e): Create and return a new node r storing element e and make r the root of the tree; an error occurs if the tree is not empty. insertLeft(v, e): Create and return a new node w storing element e, add w as the the left child of v and return w; an error occurs if v already has a left child. insertRight(v,e): Create and return a new node z storing element e, add z as the the right child of v and return z; an error occurs if v already has a right child. remove(v): Remove node v, replace it with its child, if any, and return the element stored at v; an error occurs if v has two children. attach(v, T1, T2): Attach T1 and T2, respectively, as the left and right subtrees of the external node v; an error condition occurs ifv is not external. CPSC 3200 University of Tennessee at Chattanooga – Summer © 2010 Goodrich, Tamassia

Binary trees are excellent data structures for searching large amounts of information. When used to facilitate searches, a binary tree is called a binary search tree. CPSC 3200 University of Tennessee at Chattanooga – Summer

A binary search tree (BST) is a binary tree in which: Elements in left subtree are smaller than the current node. Elements in right subtree are greater than the current node CPSC 3200 University of Tennessee at Chattanooga – Summer

There are three common methods for traversing a binary tree and processing the value of each node: Pre-order In-order Post-order Each of these methods is best implemented as a recursive function. CPSC 3200 University of Tennessee at Chattanooga – Summer

Pre-order: Node  Left  Right A BC DE FG ABDECFG CPSC 3200 University of Tennessee at Chattanooga – Summer

Insert the following items into a binary search tree. 50, 25, 75, 12, 30, 67, 88, 6, 13, 65, 68 Draw the binary tree and print the items using Pre-order traversal. CPSC 3200 University of Tennessee at Chattanooga – Summer

In-order: Left  Node  Right A BC DE FG DBEAFCG CPSC 3200 University of Tennessee at Chattanooga – Summer

From the previous exercise, print the tree’s nodes using In- order traversal CPSC 3200 University of Tennessee at Chattanooga – Summer

Post-order: Left  Right  Node A BC DE FG DEBFGCA CPSC 3200 University of Tennessee at Chattanooga – Summer

From the previous exercise, print the tree’s nodes using Post- order traversal CPSC 3200 University of Tennessee at Chattanooga – Summer

In an inorder traversal a node is visited after its left subtree and before its right subtree Application: draw a binary tree x(v) = inorder rank of v y(v) = depth of v Algorithm inOrder(v) if hasLeft (v) inOrder (left (v)) visit(v) if hasRight (v) inOrder (right (v)) CPSC 3200 University of Tennessee at Chattanooga – Summer © 2010 Goodrich, Tamassia

After deleting an item, the resulting binary tree must be a binary search tree. 1.Find the node to be deleted. 2.Delete the node from the tree. CPSC 3200 University of Tennessee at Chattanooga – Summer

The node to be deleted has no left and right subtree (the node to be deleted is a leaf) delete(30) CPSC 3200 University of Tennessee at Chattanooga – Summer

The node to be deleted has no left subtree (the left subtree is empty but it has a nonempty right subtree) delete(30) CPSC 3200 University of Tennessee at Chattanooga – Summer

The node to be deleted has no right subtree (the right subtree is empty but it has a nonempty left subtree) delete(80) CPSC 3200 University of Tennessee at Chattanooga – Summer

The node to be deleted has nonempty left and right subtree delete(70) 79 CPSC 3200 University of Tennessee at Chattanooga – Summer

The node to be deleted has nonempty left and right subtree delete(70) 67 CPSC 3200 University of Tennessee at Chattanooga – Summer

50 Binary search can perform operations get, floorEntry and ceilingEntry on an ordered map implemented by means of an array-based sequence, sorted by key similar to the high-low game at each step, the number of candidate items is halved terminates after O(log n) steps Example: find(7) m l h m l h m l h l  m  h CPSC 3200 University of Tennessee at Chattanooga – Summer 2013 © 2010 Goodrich, Tamassia

51 A binary search tree is a binary tree storing keys (or key-value entries) at its internal nodes and satisfying the following property: Let u, v, and w be three nodes such that u is in the left subtree of v and w is in the right subtree of v. We have key(u)  key(v)  key(w) External nodes do not store items. An inorder traversal of a binary search trees visits the keys in increasing order CPSC 3200 University of Tennessee at Chattanooga – Summer 2013 © 2010 Goodrich, Tamassia

52 To search for a key k, we trace a downward path starting at the root. The next node visited depends on the comparison of k with the key of the current node. If we reach a leaf, the key is not found. Example: get(4): Call TreeSearch(4,root) Algorithm TreeSearch(k, v) if T.isExternal (v) return v if k < key(v) return TreeSearch(k, T.left(v)) else if k = key(v) return v else { k > key(v) } return TreeSearch(k, T.right(v))    CPSC 3200 University of Tennessee at Chattanooga – Summer 2013 © 2010 Goodrich, Tamassia

CPSC 3200 University of Tennessee at Chattanooga – Summer