Siddh Ds
Siddh Ds
Data Structures
(3130702)
Bachelor of Engineering in
Information and Communication Technology
[Semester - 3]
Enrolment No 230170132038
Name Patel siddh sunilkumar
Branch DATA SCIENCE
Academic Term 2024
Institute Name VISHWAKARMA GOVERNMENT
ENGINEERING COLLEGE
CERTIFICATE
230170146053 of B.E. Semester - III from data science of this Institute (GTU Code:
017) has satisfactorily completed the Practical work for the subject Data structure
Date: ___________
Preface
Main motto of any laboratory/practical/field work is for enhancing required skills as well as
creating ability amongst students to solve real time problem by developing relevant competencies
in psychomotor domain. By keeping in view, GTU has designed competency focused outcome-
based curriculum for engineering degree programs where sufficient weightage is given to
practical work. It shows importance of enhancement of skills amongst the students and it pays
attention to utilize every second of time allotted for practical amongst students, instructors and
faculty members to achieve relevant outcomes by performing the experiments rather than having
merely study type experiments. It is must for effective implementation of competency focused
outcome-based curriculum that every practical is keenly designed to serve as a tool to develop
and enhance relevant competency required by the various industry among every student. These
psychomotor skills are very difficult to develop through traditional chalk and board content
delivery method in the classroom. Accordingly, this lab manual is designed to focus on the
industry defined relevant outcomes, rather than old practice of conducting practical to prove
concept and theory.
By using this lab manual students can go through the relevant theory and procedure in advance
before the actual performance which creates an interest and students can have basic idea prior to
performance. This in turn enhances pre-determined outcomes amongst students. Each experiment
in this manual begins with competency, industry relevant skills, course outcomes as well as
practical outcomes (objectives). The students will also achieve safety and necessary precautions
to be taken while performing practical.
This manual also provides guidelines to faculty members to facilitate student centric lab activities
through each experiment by arranging and managing necessary resources in order that the
students follow the procedures with required safety and necessary precautions to achieve the
outcomes. It also gives an idea that how students will be assessed by providing rubrics.
Data Structures is a core course in all computer science undergraduate curricula. The course is
the basis for understanding several data structures and also algorithms that operate on them. The
course forms the foundation for almost all computer science subjects: compilers, operating
systems, databases, AI and software engineering. The course comes with a lab in most universities
in India. The associated lab in university curricula focuses on implementation of algorithms
operating on the data structures, i.e., coding programs on the data structures and algorithms.
Data Structure (3130702) 230170146053
DTE’s Vision
Institute’s Vision
To create an ecosystem for proliferation of socially responsible and technically sound engineers,
innovators and entrepreneurs.
Institute’s Mission
Department’s Vision
To equip students with the necessary skills in data science to become proficient professionals
capable of leveraging technology to deliver effective and sustainable solutions for real-world
challenges.
Department’s Mission
• To cultivate highly skilled data scientists who excel in technical proficiency while embodying
social responsibility.
• To establish state-of-the-art academic infrastructure and advanced facilities, dedicated to
providing comprehensive training in the field of data science for students.
• To foster collaborations with industry, government bodies, and research & development
institutes, aiming to enhance the professional growth of faculty and students.
• To leverage data science techniques to address challenges and solve problems pertinent to
both industry and society.
• To create an environment that supports both research and entrepreneurship.
Data Structure (3130702) 230170146053
• Basic knowledge of Engineering including software and hardware which helps data scientist
to collect and preprocess data based on problem domain.
• Possess technical and research skill to solve problems faced by industry and society using
data science techniques.
• Acquire basic engineering, design, analysis, implementation and testing skills which help
them to solve real life problem of industry and society.
• Shows professionalism in the field of data science by acquiring skills for research,
entrepreneurship and higher study.
• To be employable by keeping pace with frequently changing technology using lifelong
learning skill.
• To showcase professionalism at workplace and social life by being supportive and having
legal and ethical responsibilities.
Data Structure (3130702) 230170146053
Sr. CO CO CO CO CO
Practical Outcome/Title of experiment
No. 1 2 3 4 5
2. Queue
6. Tree
7. Graph
8. Searching
9. Sorting
The following industry relevant competencies are expected to be developed in the student by
undertaking the practical work of this laboratory.
1. Will be able to classify data structures and identify storage representation of primitive
and non-primitive data structures
2. Will be able to implement various operations on Stack, Queue, Link list, Tree, Graph,
Hashing and File operations.
3. Will be able to understand need of sorting and searching for various applications
4. Will be able to apply various data structure to design real time applications in efficient
manner.
1. Teacher should provide the guideline with demonstration of practical to the students
with all features.
2. Teacher shall explain basic concepts/theory related to the experiment to the students before
starting of each practical
3. Involve all the students in performance of each experiment.
4. Teacher is expected to share the skills and competencies to be developed in the
students and ensure that the respective skills and competencies are developed in the
students after the completion of the experimentation.
5. Teachers should give opportunity to students for hands-on experience after the
demonstration.
6. Teacher may provide additional knowledge and skills to the students even though not
covered in the manual but are expected from the students by concerned industry.
7. Give practical assignment and assess the performance of students based on task
assigned to check whether it is as per the instructions or not.
8. Teacher is expected to refer complete curriculum of the course and follow the
guidelines for implementation.
1. Students are expected to carefully listen to all the theory classes delivered by the faculty
members and understand the COs, content of the course, teaching and examination scheme,
skill set to be developed etc.
2. Students will have to perform experiments on computer system on which C/C++ compiler
is installed to execute programs of data structure.
3. Students should develop programs and execute all the programs using C/C++ compiler.
Students have to show output of each program in their practical file.
4. Students are instructed to submit practical list as per given sample list shown on next page.
5. Student should develop a habit of submitting the experimentation work as per the schedule
and s/he should be well prepared for the same.
Data Structure (3130702) 230170146053
Common Safety Instructions
Index
(Progressive Assessment Sheet)
Date
Date of Assessme Sign. of
Sr. Page of Remar
No.
Objective(s) of Experiment submiss nt Teacher
No. perfor ks
ion Marks with date
mance
8. Searching
8.1 Write a program to implement Linear
Search.
8.2 Write a program to implement Binary
Search.
8.3 Identify widely used application which use
Searching technique for implementation of
its important feature.
9. Sorting
9.1 Write a program to implement Quick Sort
9.2 Write a program to implement Merge Sort
9.3 Write a program to implement Bubble Sort
9.4 Identify widely used application which use
Sorting technique for implementation of its
important feature.
10. Hashing and File Structure
10.1Write a program to create hash table and
handle the collision using linear probing.
10.2Write a program to demonstrate the file
primitives such as fopen, fclose, fprintf.
10.3Identify widely used application which use
Hashing technique for implementation of
its important feature.
Total
Data Structure (3130702) 230170146053
Experiment No – 1
AIM: Classification of Data Structure and Stack
Date:31/7/24
Theory:
Data Structure
Data structures are a fundamental concept in computer science that enable efficient storage and
manipulation of data. They are used to organize and store data in a manner that allows for optimal
performance of algorithms. The selection of a suitable data structure begins with the choice of an
abstract data type, which defines the operations that can be performed on the data. Well-designed
data structures can perform a wide range of critical operations while using minimal resources such
as execution time and memory space. In essence, data structure introduction refers to the
arrangement of data in a computer's memory in a way that enables rapid access by the processor for
the required calculations.
Stack
A stack is a data structure that follows the last-in first-out (LIFO) principle, meaning that objects
are inserted and removed from the container in a particular order. In pushdown stacks, only two
Page No
Data Structure (3130702) 230170146053
operations are allowed: pushing an item onto the stack, and popping an item off the top of the stack.
Access to the stack is limited, as elements can only be added and removed from the top. When an
item is pushed onto the stack, it becomes the new top item. Conversely, when an item is popped off
the stack, it is removed from the top.
To illustrate this concept, consider a stack of books. Just as you can only remove the top book, you
can only add a new book to the top of the stack. A stack can also have a limited capacity. If the
stack is already full and there is no space to add a new item, it is said to be in an overflow state. On
the other hand, if the stack is empty and an item is removed, it is in an underflow state, meaning
that no items are present in the stack to be removed.
A stack is an abstract data structure that operates on the LIFO principle, where the last item added
is the first item to be removed. Items can be inserted and deleted at one end called the top, creating
a structure that resembles a closed tube on one side.
(1) PUSH
(2) POP
Page No
Data Structure (3130702) 230170146053
1. Primitive data structures: Primitive data structures are simple data structures
constructed using the standard data types of a computer language. Examples of primitive
data structures include variables, arrays, pointers, structures, unions, and more. These
structures are used to build more complex data structures
Linear data structures are arranged as a continuous set of data elements in the memory
and can be constructed using array data types. In linear data structures, the adjacency
relationship between data elements is maintained.
✓ Add an element
✓ Delete an element
✓ Traverse
✓ Sort the list of elements
✓ Search for a data element
✓ Stack
✓ Queue
✓ Tables
✓ List
✓ Linked Lists.
Page No
Data Structure (3130702) 230170146053
Non-linear data structures are not arranged in a continuous manner and include data
structures such as trees and graphs. These structures can be used to represent complex
relationships between data elements.
✓ Add elements
✓ Delete elements
✓ Display the elements
✓ Sort the list of elements
✓ Search for a data element
✓ Tree
✓ Decision tree
✓ Graph
✓ Forest
1.2 Implement a program for stack that performs following operations using array.
(a) PUSH (b) POP (c) PEEP (d) CHANGE (e) DISPLAY
Program:
#include<stdio.h>
#define size 5
struct stack
{
int a[size],top;
int temp[size];
}s;
void push()
{
int value;
printf(" Enter value to be pushed: ");
scanf("%d", &value);
s.top = s.top + 1;
s.a[s.top] = value;
}
Page No
Data Structure (3130702) 230170146053
void pop()
{
printf(" Popped element is %d\n", s.a[s.top]);
s.top = s.top - 1;
}
void peep()
{
printf(" The value at top position is : %d\n", s.a[s.top]);
}
void display()
{
int i;
printf(" The stack contains: ");
for(i=s.top; i>=0; i--)
{
printf("\t%d", s.a[i]);
}
printf("\n");
}
void main()
{
s.top = -1;
int choice, index, new_element;
do
{
printf("\n STACK IMPLEMENTATION PROGRAM");
Page No
Data Structure (3130702) 230170146053
printf("\n 1. PUSH 2. POP 3. PEEP 4. CHANGE 5. DISPLAY 0. EXIT\n");
printf("\n Enter your choice: ");
scanf("%d", &choice);
switch(choice)
{
case 1:
if(s.top == size-1)
{
printf("\tSTACK OVERFLOW\n");
}
else
{
push();
}
break;
case 2:
if(s.top == -1)
{
printf("\tSTACK UNDERFLOW\n");
}
else
{
pop();
}
break;
case 3:
if(s.top == -1)
{
printf("\tStack is empty.\n");
}
else
{
peep();
}
break;
case 4:
printf(" Enter index no : ");
scanf("%d",&index);
if(index<0 || index>s.top)
{
printf("\tINVALID INDEX NUMBER\n");
}
else
{
printf(" Enter new element: ");
Page No
Data Structure (3130702) 230170146053
scanf("%d", &new_element);
change(index, new_element);
}
break;
case 5:
if(s.top == -1)
{
printf("\t Stack is empty.\n");
}
else
{
display();
}
break;
case 0:
printf("\tEND OF PROGRAM");
break;
default :
printf("\tINVALID CHOICE\n");
}
} while(choice != 0);
Output:
Stack Operations:
1. PUSH 2. POP 3. PEEP 4. CHANGE 5. DISPLAY 6. EXIT
Enter your choice: 1
Enter the value to push: 711
Pushed 711
Stack Operations:
1. PUSH 2. POP 3. PEEP 4. CHANGE 5. DISPLAY 6. EXIT
Enter your choice: 1
Enter the value to push: 53
Pushed 53
Stack Operations:
1. PUSH 2. POP 3. PEEP 4. CHANGE 5. DISPLAY 6. EXIT
Enter your choice: 1
Enter the value to push: 1205
Pushed 1205
Stack Operations:
Page No
Data Structure (3130702) 230170146053
1. PUSH 2. POP 3. PEEP 4. CHANGE 5. DISPLAY 6. EXIT
Enter your choice: 2
Popped 1205
Stack Operations:
1. PUSH 2. POP 3. PEEP 4. CHANGE 5. DISPLAY 6. EXIT
Enter your choice: 3
Top element is: 53
Stack Operations:
1. PUSH 2. POP 3. PEEP 4. CHANGE 5. DISPLAY 6. EXIT
Enter your choice: 4
Enter the position to change: 2
Enter the new value: 1205
Changed element at position 2 to 1205
Stack Operations:
1. PUSH 2. POP 3. PEEP 4. CHANGE 5. DISPLAY 6. EXIT
Enter your choice: 5
Stack elements are: 711 1205
Stack Operations:
1. PUSH 2. POP 3. PEEP 4. CHANGE 5. DISPLAY 6. EXIT
Enter your choice: 6
1.3 Implement a program to convert infix notation to postfix notation using stack.
Program:
#include <stdio.h>
#include <stdlib.h>
#include <conio.h>
#include <ctype.h>
#include <string.h>
#define MAX 20
char st[MAX];
int top=-1;
void push(char st[], char);
char pop(char st[]);
void InfixtoPostfix(char source[], char target[]);
int getPriority(char);
int main()
{
Page No
Data Structure (3130702) 230170146053
char infix[100], postfix[100];
printf("\n Enter any infix expression : ");
scanf("%s",infix);
strcpy(postfix, "");
InfixtoPostfix(infix, postfix);
printf("\n The corresponding postfix expression is : ");
puts(postfix);
getch();
return 0;
}
Page No
Data Structure (3130702) 230170146053
{
while( (top!=-1) && (st[top]!= '(') && (getPriority(st[top]) >= getPriority(source[i])))
{
target[j] = pop(st);
j++;
}
push(st, source[i]);
i++;
}
else
{
printf("\n INCORRECT ELEMENT IN EXPRESSION");exit(1);
}
}
while((top!=-1) && (st[top]!='('))
{
target[j] = pop(st);
j++;
}
target[j]='\0';
}
Page No
Data Structure (3130702) 230170146053
{
printf("\n STACK UNDERFLOW");
}
else
{
val=st[top];
top--;
}
return val;
}
Output:
Program:
#include <stdio.h>
void main()
{
int n;
printf("\n Enter the number of rings: ");
scanf("%d", &n);
move(n,'A', 'C', 'B');
}
void move(int n, char source, char dest, char spare)
{
if (n==1)
printf("\n Move from %c to %c",source,dest);
else
{
move(n-1, source, spare, dest);
move(1, source, dest, spare);
move(n-1, spare, dest, source);
}
}
Page No
Data Structure (3130702) 230170146053
Output:
1.5 Identify widely used application which use stack data structure for implementation of its
important feature.
Stack Applications:
1. Stack is used by compilers to check for balancing of parentheses, brackets and braces.
2. Stack is used to evaluate a postfix expression.
3. Stack is used to convert an infix expression into postfix/prefix form.
4. In recursion, all intermediate arguments and return values are stored on the processor’s
stack.
5. During a function call the return address and arguments are pushed onto a stack and on
return they are popped off.
6. Depth first search uses a stack data structure to find an element from a graph.
Observations:
Conclusion:
Quiz:
Suggested Reference:
Marks
Page No
Data Structure (3130702) 230170146053
Experiment No: 2
AIM : Queue
2.1 Write a program to implement QUEUE using arrays that performs following
operations (a)INSERT (b) DELETE (c) DISPLAY
2.2 Write a program to implement Circular Queue using arrays that performs following
operations. (a) INSERT (b) DELETE (c) DISPLAY
2.3 Identify widely used application which uses Queue data structure for implementation
of its important feature.
Date: 7/8/24
Competency and Practical Skills: Logic building and programming
Theory:
Queue
A queue is a data structure that follows the First In, First Out (FIFO) principle. It is a special type
of list where items are inserted at the rear and deleted from the front end. Queues can be compared
to real-world scenarios, such as people waiting in line at a bank.
✓ Queue
✓ Circular Queue
✓ D-Queue
✓ Priority Queue
Page No
Data Structure (3130702) 230170146053
2.1 Write a program to implement QUEUE using arrays that performs following
operations. (a)INSERT (b) DELETE (c) DISPLAY
Program:
#include <stdio.h>
#include <stdlib.h>
#define MAX 5
struct Queue {
int items[MAX];
int front;
int rear;
};
Page No
Data Structure (3130702) 230170146053
int main() {
struct Queue* q = createQueue();
int choice, value;
while (1) {
printf("\nQueue Operations: \n");
printf("1. INSERT\n2. DELETE\n3. DISPLAY\n4. EXIT\n");
printf("Enter your choice: ");
scanf("%d", &choice);
switch (choice) {
case 1:
printf("Enter the value to insert: ");
scanf("%d", &value);
insert(q, value);
break;
case 2:
delete(q);
break;
case 3:
Page No
Data Structure (3130702) 230170146053
display(q);
break;
case 4:
exit(0);
default:
printf("Invalid choice! Please enter a valid option.\n");
}
}
return 0;
}
Output:
Page No
Data Structure (3130702) 230170146053
2.2 Write a program to implement Circular Queue using arrays that performs following
operations. (a) INSERT (b) DELETE (c) DISPLAY
Program:
#include <stdio.h>
#include <stdlib.h>
#define MAX 5
struct CircularQueue
{
int items[MAX];
int front;
int rear;
};
cq->front = -1;
cq->rear = -1;
}
else
{
cq->front = (cq->front + 1) % MAX;
}
}
}
Page No
Data Structure (3130702) 230170146053
}
else
{
int i = cq->front;
printf("Circular Queue elements are: ");
while (1)
{
printf("%d ", cq->items[i]);
if (i == cq->rear)
break;
i = (i + 1) % MAX;
}
printf("\n");
}
}
int main()
{
struct CircularQueue *cq = createQueue();
int choice, value;
while (1)
{
printf("\nCircular Queue Operations: \n");
printf("1. INSERT\n2. DELETE\n3. DISPLAY\n4. EXIT\n");
printf("Enter your choice: ");
scanf("%d", &choice);
switch (choice)
{
case 1:
printf("Enter the value to insert: ");
scanf("%d", &value);
insert(cq, value);
break;
case 2:
delete (cq);
break;
case 3:
display(cq);
break;
case 4:
exit(0);
default:
printf("Invalid choice! Please enter a valid option.\n");
}
Page No
Data Structure (3130702) 230170146053
}
return 0;
}
Output:
Page No
Data Structure (3130702) 230170146053
2.3 Identify widely used application which uses Queue data structure for implementation
of its important feature.
1. Email Services: Many email services use Queues for managing the delivery of emails, ensuring they
are sent and received in the correct order.
2. Print Job Queues: Printers and print servers use Queues to manage print jobs in a first come, first-
served manner.
3. Web Servers: Web servers often use Queues to handle incoming HTTP requests from clients,
ensuring fair and efficient processing.
4. Operating Systems: Operating systems use Queues for scheduling tasks and managing various
system processes.
5. Customer Support Systems: Customer support applications use Queues to manage incoming
support tickets, assigning them to available agents or support teams.
6. Ride-Sharing Apps: Ride-sharing apps like Uber and Lyft use Queues to match drivers with riders
based on location and availability.
7. Online Retailers: E-commerce websites use Queues to manage order processing, ensuring that
orders are fulfilled in the order they are received.
8. Banking Systems: Banks use Queues for managing customer transactions, such as withdrawals and
deposits, in an organized and secure manner.
9. Traffic Management Systems: Traffic management systems use Queues to control the f low of
vehicles at intersections, toll booths, and parking lots.
10. Social Media Platforms: Social media platforms like Twitter may use Queues to handle real- time
updates and notifications to users.
Page No
Data Structure (3130702) 230170146053
These applications and systems use Queue data structures to efficiently manage tasks, requests, and
events in various domains.
Observations:
Conclusion:
Quiz:
Suggested Reference:
Marks
Page No
Data Structure (3130702) 230170146053
Experiment No: 3
3.1 Write a menu driven program to implement following operations on the singly linked
list.
(a) Insert a node at the front of the linked list.
(b) Insert a node at the end of the linked list.
(c) Insert a node such that linked list is in ascending order. (According to INFO field)
(d) Delete a first node of the linked list.
(e) Delete a node before specified position.
(f) Delete a node after specified position.
3.2 Write a program to implement stack using linked list
3.3 Write a program to implement queue using linked list.
Date: 14/8/24
Theory:
A linked list is a type of data structure that stores a collection of non-sequential data items. Unlike
arrays, linked lists are dynamic and their size can be changed during program execution. Each data
item in a linked list has a pointer that holds the memory address of the next data item in the list. The
data items in a linked list may not be stored in consecutive memory locations, but their pointers
make it easy to access them in any order.
A singly linked list, also known as a linear linked list, is a type of linked list in which all nodes are
connected together sequentially. Each node in a singly linked list contains data and a pointer to the
Page No
Data Structure (3130702) 230170146053
next node. The last node's pointer is set to null. The limitation of a singly linked list is that it can
only be traversed in one direction, in a forward direction.
✓ Insert
- Insert at first position
- Insert at last position
- Insert into ordered list
✓ Delete
✓ Traverse list (Print list)
✓ Copy linked list
3.1 Write a menu driven program to implement following operations on the singly linked
list.
(a) Insert a node at the front of the linked list.
(b) Insert a node at the end of the linked list.
(c) Insert a node such that linked list is in ascending order.(According to INFO field)
(d) Delete a first node of the linked list.
(e) Delete a node before specified position.
(f) Delete a node after specified position.
Program:
#include <stdio.h>
#include <stdlib.h>
Page No
Data Structure (3130702) 230170146053
void insertAtEnd(int value) {
struct Node* newNode = (struct Node*)malloc(sizeof(struct Node));
newNode->data = value;
newNode->next = NULL;
if (head == NULL) {
head = newNode;
} else {
struct Node* temp = head;
while (temp->next != NULL) {
temp = temp->next;
}
temp->next = newNode;
}
printf("%d inserted at the end.\n", value);
}
Page No
Data Structure (3130702) 230170146053
printf("%d deleted from the front.\n", temp->data);
free(temp);
}
Page No
Data Structure (3130702) 230170146053
printf("%d deleted after position %d.\n", delNode->data, position);
free(delNode);
}
}
while (1) {
printf("\nLinked List Operations:\n");
printf("1. Insert at front\n");
printf("2. Insert at end\n");
printf("3. Insert in ascending order\n");
printf("4. Delete first node\n");
printf("5. Delete node before specified position\n");
printf("6. Delete node after specified position\n");
printf("7. Display linked list\n");
printf("8. Exit\n");
printf("Enter your choice: ");
scanf("%d", &choice);
switch (choice) {
case 1:
printf("Enter value to insert at front: ");
scanf("%d", &value);
insertAtFront(value);
break;
case 2:
printf("Enter value to insert at end: ");
Page No
Data Structure (3130702) 230170146053
scanf("%d", &value);
insertAtEnd(value);
break;
case 3:
printf("Enter value to insert in ascending order: ");
scanf("%d", &value);
insertInAscendingOrder(value);
break;
case 4:
deleteFirstNode();
break;
case 5:
printf("Enter position before which to delete: ");
scanf("%d", &position);
deleteBeforePosition(position);
break;
case 6:
printf("Enter position after which to delete: ");
scanf("%d", &position);
deleteAfterPosition(position);
break;
case 7:
display();
break;
case 8:
exit(0);
default:
printf("Invalid choice, please try again.\n");
}
}
return 0;
}
Output:
Page No
Data Structure (3130702) 230170146053
Page No
Data Structure (3130702) 230170146053
Page No
Data Structure (3130702) 230170146053
2. Insert at end
3. Insert in ascending order
4. Delete first node
5. Delete node before specified position
6. Delete node after specified position
7. Display linked list
8. Exit
Enter your choice: 7
Linked list: 15 -> NULL
Program:
#include <stdio.h>
#include <stdlib.h>
Page No
Data Structure (3130702) 230170146053
newNode->data = value;
newNode->next = top;
top = newNode;
printf("%d pushed onto the stack.\n", value);
}
Page No
Data Structure (3130702) 230170146053
while (1) {
printf("\nStack Operations using Linked List:\n");
printf("1. Push\n");
printf("2. Pop\n");
printf("3. Display\n");
printf("4. Exit\n");
switch (choice) {
case 1:
printf("Enter value to push: ");
scanf("%d", &value);
push(value);
break;
case 2:
pop();
break;
case 3:
display();
break;
case 4:
exit(0);
default:
printf("Invalid choice! Please try again.\n");
}
}
return 0;
}
Output:
Page No
Data Structure (3130702) 230170146053
2. Pop
3. Display
4. Exit
Enter your choice: 1
Enter value to push: 53
53 pushed onto the stack.
Page No
Data Structure (3130702) 230170146053
4. Exit
Enter your choice: 4
Program:
#include <stdio.h>
#include <stdlib.h>
if (rear == NULL) {
// If the queue is empty, both front and rear point to the new node
front = rear = newNode;
} else {
// Insert the new node at the end and update rear
rear->next = newNode;
rear = newNode;
}
printf("%d enqueued to the queue.\n", value);
}
Page No
Data Structure (3130702) 230170146053
// Function to dequeue an element from the queue
void dequeue() {
if (front == NULL) {
printf("Queue underflow\n");
return;
}
if (front == NULL) {
rear = NULL; // If the queue becomes empty, set rear to NULL as well
}
free(temp);
}
while (1) {
printf("\nQueue Operations using Linked List:\n");
printf("1. Enqueue\n");
printf("2. Dequeue\n");
printf("3. Display\n");
printf("4. Exit\n");
Page No
Data Structure (3130702) 230170146053
printf("Enter your choice: ");
scanf("%d", &choice);
switch (choice) {
case 1:
printf("Enter value to enqueue: ");
scanf("%d", &value);
enqueue(value);
break;
case 2:
dequeue();
break;
case 3:
display();
break;
case 4:
exit(0);
default:
printf("Invalid choice! Please try again.\n");
}
}
return 0;
}
Output:
Page No
Data Structure (3130702) 230170146053
2. Dequeue
Page No
Data Structure (3130702) 230170146053
3. Display
4. Exit
Enter your choice: 4
Observations:
A linked list is a collection of “nodes” connected together via links. These nodes consist of the
data to be stored and a pointer to the address of the next node within the linked list.
Conclusion:
Linked list can be used to implement stacks, queues, and other abstract data types.In the case
of arrays, the size is limited to the definition, but in linked lists, there is no defined size.
Quiz:
(1) Which are the operations on singly link list?
(2) State the limitation of singly link list
(3) Compare array and singly link list
Suggested Reference:
Marks
Page No
Data Structure (3130702) 230170146053
Experiment No: 4
4.1 Write a program to implement following operations on the doubly linked list.
(a) Insert a node at the front of the linked list.
(b) Insert a node at the end of the linked list.
(c) Delete a last node of the linked list.
(d) Delete a node before specified position.
Date: 21/8/24
Theory:
A doubly linked list is a data structure where each node contains data and two pointers - one to point
to the previous node (LPTR) and another to point to the next node (RPTR). The main advantage of
a doubly linked list is that we can traverse it in any direction, either forward or backward. Another
advantage is that we can delete a node with ease since we have pointers to both the previous and
next nodes. In contrast, a node on a singly linked list cannot be removed unless we have a pointer
to its predecessor. However, the drawback of a doubly linked list is that it requires more memory
than a singly linked list since we need an extra pointer to point to the previous node. In the image,
L and R denote the leftmost and rightmost nodes in the list, respectively. The left link of the L node
and the right link of the R node are both NULL, indicating the end of the list for each direction.
✓ Insert
- Insert at first position
Page No
Data Structure (3130702) 230170146053
- Insert at last position
- Insert into ordered list
✓ Delete
✓ Traverse list (Print list)
✓ Copy linked list
4.1 Write a program to implement following operations on the doubly linked list.
(a) Insert a node at the front of the linked list.
(b) Insert a node at the end of the linked list.
(c) Delete a last node of the linked list.
(d) Delete a node before specified position.
Program:
#include <stdio.h>
#include <stdlib.h>
// If the list is not empty, set the previous head's previous pointer to the new node
if (head != NULL) {
head->prev = newNode;
}
Page No
Data Structure (3130702) 230170146053
}
while (1) {
printf("\nDoubly Linked List Operations:\n");
printf("1. Insert at front\n");
printf("2. Display list\n");
printf("3. Exit\n");
printf("Enter your choice: ");
scanf("%d", &choice);
switch (choice) {
case 1:
printf("Enter value to insert at front: ");
scanf("%d", &value);
insertAtFront(value);
break;
case 2:
display();
break;
case 3:
exit(0);
default:
printf("Invalid choice! Please try again.\n");
}
}
return 0;
Page No
Data Structure (3130702) 230170146053
}
Output:
Program:
#include <stdio.h>
#include <stdlib.h>
Page No
Data Structure (3130702) 230170146053
struct Node {
int data;
struct Node* prev;
Page No
Data Structure (3130702) 230170146053
}
printf("NULL\n");
}
while (1) {
printf("\nDoubly Linked List Operations:\n");
printf("1. Insert at end\n");
printf("2. Display list\n");
printf("3. Exit\n");
printf("Enter your choice: ");
scanf("%d", &choice);
switch (choice) {
case 1:
printf("Enter value to insert at end: ");
scanf("%d", &value);
insertAtEnd(value);
break;
case 2:
display();
break;
case 3:
exit(0);
default:
printf("Invalid choice! Please try again.\n");
}
}
return 0;
}
Output:
Page No
Data Structure (3130702) 230170146053
3. Exit
Enter your choice: 1
Enter value to insert at end: 711
711 inserted at the end of the list.
Program:
#include <stdio.h>
#include <stdlib.h>
Page No
Data Structure (3130702) 230170146053
struct Node* next;
};
Page No
Data Structure (3130702) 230170146053
printf("%d <-> ", temp->data);
temp = temp->next;
}
printf("NULL\n");
}
// Function to insert a node at the end of the doubly linked list (for testing purposes)
void insertAtEnd(int value) {
struct Node* newNode = (struct Node*)malloc(sizeof(struct Node));
newNode->data = value;
newNode->next = NULL;
if (head == NULL) {
newNode->prev = NULL;
head = newNode;
} else {
struct Node* temp = head;
while (temp->next != NULL) {
temp = temp->next;
}
temp->next = newNode;
newNode->prev = temp;
}
while (1) {
printf("\nDoubly Linked List Operations:\n");
printf("1. Insert at end\n");
printf("2. Delete last node\n");
printf("3. Display list\n");
printf("4. Exit\n");
printf("Enter your choice: ");
scanf("%d", &choice);
switch (choice) {
case 1:
printf("Enter value to insert at end: ");
scanf("%d", &value);
insertAtEnd(value);
Page No
Data Structure (3130702) 230170146053
break;
case 2:
deleteLastNode();
break;
case 3:
display();
break;
case 4:
exit(0);
default:
printf("Invalid choice! Please try again.\n");
}
}
return 0;
}
Output:
Page No
Data Structure (3130702) 230170146053
Doubly Linked List Operations:
1. Insert at end
2. Delete last node
3. Display list
4. Exit
Enter your choice: 2
Last node deleted.
Program:
#include <stdio.h>
#include <stdlib.h>
Page No
Data Structure (3130702) 230170146053
// Function to insert a node at the end of the doubly linked list (for testing)
void insertAtEnd(int value) {
struct Node* newNode = (struct Node*)malloc(sizeof(struct Node));
newNode->data = value;
newNode->next = NULL;
if (head == NULL) {
newNode->prev = NULL;
head = newNode;
} else {
struct Node* temp = head;
while (temp->next != NULL) {
temp = temp->next;
}
temp->next = newNode;
newNode->prev = temp;
}
// Function to delete a node before the specified position in the doubly linked list
void deleteBeforePosition(int position) {
if (head == NULL || position <= 1) {
printf("Invalid position or list is empty.\n");
return;
}
Page No
Data Structure (3130702) 230170146053
nodeToDelete->prev->next = temp;
} else {
head = temp; // Handle the case where the node before the position is the head
}
temp->prev = nodeToDelete->prev;
while (1) {
printf("\nDoubly Linked List Operations:\n");
printf("1. Insert at end\n");
printf("2. Delete node before specified position\n");
printf("3. Display list\n");
printf("4. Exit\n");
printf("Enter your choice: ");
scanf("%d", &choice);
switch (choice) {
case 1:
printf("Enter value to insert at end: ");
scanf("%d", &value);
insertAtEnd(value);
Page No
Data Structure (3130702) 230170146053
break;
case 2:
printf("Enter position: ");
scanf("%d", &position);
deleteBeforePosition(position);
break;
case 3:
display();
break;
case 4:
exit(0);
default:
printf("Invalid choice! Please try again.\n");
}
}
return 0;
}
Output:
Page No
Data Structure (3130702) 230170146053
Enter your choice: 1
Enter value to insert at end: 1205
1205 inserted at the end of the list.
Observations:
Page No
Data Structure (3130702) 230170146053
3. Display list
4. Exit
Enter your choice: 1
Enter value to insert at end: 711
711 inserted at the end of the list.
Page No
Data Structure (3130702) 230170146053
4. Exit
Enter your choice: 3
Doubly Linked List: 711 <-> 1205 <-> NULL
Conclusion:
Doubly linked lists provide efficiency in insertion, deletion, and many other operations due to
the presence of previous and next pointers.
Quiz:
(1) Explain structure of a node of doubly link list
(2) Which is the main advantage of doubly link list?
(3) What is the drawback of doubly link list?
Suggested Reference:
Marks
Page No
Data Structure (3130702) 230170146053
Experiment No: 5
5.1 Write a program to implement following operations on the circular linked list.
(a) Insert a node at the end of the linked list.
(b) Insert a node before specified position.
(c) Delete a first node of the linked list.
(d) Delete a node after specified position.
5.2 Identify widely used application which uses linked list for implementation of its
important feature.
Date: / / 2024
Theory:
A circular linked list is similar to a singly linked list, except that the last node points to the first
node, creating a circular arrangement of nodes. Unlike a singly linked list, it does not contain null
pointers. Traversal can only be done in one direction, i.e., the forward direction. The biggest
advantage of a circular linked list is that it saves time when we want to go from the last node to the
first node because it directly points to the first node. A good example of an application where a
circular linked list can be used is a time-sharing problem that can be solved by the operating system.
✓ Insert
- Insert at first position
- Insert at last position
Page No
Data Structure (3130702) 230170146053
- Insert into ordered list
✓ Delete
✓ Traverse list (Print list)
5.1 Write a program to implement following operations on the circular linked list.
(a) Insert a node at the end of the linked list.
(b) Insert a node before specified position.
(c) Delete a first node of the linked list.
(d) Delete a node after specified position.
Program:
#include <stdio.h>
#include <stdlib.h>
struct Node {
int data;
struct Node* next;
};
new_node->data = data;
new_node->next = *head_ref; // Set new node's next to the head (circular nature)
if (*head_ref == NULL) {
*head_ref = new_node;
new_node->next = new_node; // Circular reference
} else {
while (temp->next != *head_ref) {
temp = temp->next;
}
temp->next = new_node;
new_node->next = *head_ref;
}
}
if (head == NULL) {
printf("List is empty\n");
Page No
Data Structure (3130702) 230170146053
return;
}
do {
printf("%d -> ", temp->data);
temp = temp->next;
} while (temp != head);
printf("(head)\n");
}
int main() {
struct Node* head = NULL;
insert_at_end(&head, 10);
insert_at_end(&head, 20);
insert_at_end(&head, 30);
insert_at_end(&head, 40);
return 0;
}
Output:
Program:
#include <stdio.h>
#include <stdlib.h>
struct Node {
int data;
struct Node* next;
};
Page No
Data Structure (3130702) 230170146053
}
if (*head == NULL) {
*head = newNode;
newNode->next = *head;
} else {
struct Node* temp = *head;
temp->next = newNode;
newNode->next = *head;
}
}
if (position == 1) {
struct Node* temp = *head;
newNode->next = *head;
temp->next = newNode;
*head = newNode;
return;
}
Page No
Data Structure (3130702) 230170146053
temp = temp->next;
count++;
}
newNode->next = temp->next;
temp->next = newNode;
}
do {
printf("%d -> ", temp->data);
temp = temp->next;
} while (temp != head);
printf("(head)\n");
}
int main() {
struct Node* head = NULL;
insertAtEnd(&head, 10);
insertAtEnd(&head, 20);
insertAtEnd(&head, 30);
insertAtEnd(&head, 40);
Page No
Data Structure (3130702) 230170146053
insertBeforePosition(&head, 5, 1);
printf("After inserting 5 before position 1: ");
display(head);
return 0;
}
Output:
Program:
#include <stdio.h>
#include <stdlib.h>
struct Node {
int data;
struct Node* next;
};
if (*head == NULL) {
*head = newNode;
newNode->next = *head;
} else {
struct Node* temp = *head;
Page No
Data Structure (3130702) 230170146053
while (temp->next != *head) {
temp = temp->next;
}
temp->next = newNode;
newNode->next = *head;
}
}
if ((*head)->next == *head) {
free(*head);
*head = NULL;
return;
}
do {
printf("%d -> ", temp->data);
temp = temp->next;
} while (temp != head);
Page No
Data Structure (3130702) 230170146053
printf("(head)\n");
}
int main() {
struct Node* head = NULL;
insertAtEnd(&head, 10);
insertAtEnd(&head, 20);
insertAtEnd(&head, 30);
insertAtEnd(&head, 40);
deleteFirstNode(&head);
printf("After deleting first node: ");
display(head);
deleteFirstNode(&head);
printf("After deleting first node again: ");
display(head);
return 0;
}
Output:
Program:
#include <stdio.h>
#include <stdlib.h>
struct Node {
int data;
struct Node* next;
};
Page No
Data Structure (3130702) 230170146053
newNode->data = data;
newNode->next = NULL;
return newNode;
}
if (*head == NULL) {
*head = newNode;
newNode->next = *head;
} else {
struct Node* temp = *head;
temp->next = newNode;
newNode->next = *head;
}
}
if ((*head)->next == *head) {
printf("There is only one node in the list.\n");
return;
}
int count = 1;
if (temp->next == *head) {
printf("Position out of bounds.\n");
return;
Page No
Data Structure (3130702) 230170146053
}
if (toDelete == *head) {
struct Node* last = *head;
*head = (*head)->next;
last->next = *head;
} else {
temp->next = toDelete->next;
}
free(toDelete);
}
do {
printf("%d -> ", temp->data);
temp = temp->next;
} while (temp != head);
printf("(head)\n");
}
int main() {
struct Node* head = NULL;
insertAtEnd(&head, 10);
insertAtEnd(&head, 20);
insertAtEnd(&head, 30);
insertAtEnd(&head, 40);
insertAtEnd(&head, 50);
Page No
Data Structure (3130702) 230170146053
printf("Original List: ");
display(head);
deleteNodeAfterPosition(&head, 2);
printf("After deleting node after position 2: ");
display(head);
deleteNodeAfterPosition(&head, 4);
printf("After deleting node after position 4: ");
display(head);
return 0;
}
Output:
5.2 Identify widely used application which uses linked list for implementation of its
important feature.
a) Dynamic Memory Allocation:
• Linked lists are used in memory management systems to keep track of free and
allocated memory blocks. They allow efficient allocation and deallocation of memory.
b) Data Structures:
• More complex data structures, such as stacks, queues, and hash tables, often use linked
lists as their underlying implementation due to their dynamic size and ease of
insertion/deletion.
c) Undo Functionality in Software Applications:
• Many text editors and applications implement an undo feature using linked lists, where
each node represents a state of the document, allowing users to traverse back through
previous states.
d) Browser History Management:
• Web browsers use linked lists to maintain a history of visited pages, allowing users to
navigate back and forth through their browsing history efficiently.
e) Implementation of Adjacency List in Graphs:
• Linked lists are commonly used to represent graphs using adjacency lists, enabling
efficient storage and traversal of graph data structures.
f) Music and Video Playlists:
• Media players often implement playlists as linked lists, allowing users to easily add,
remove, or reorder songs and videos.
g) Real-Time Applications:
• In systems requiring real-time data handling, such as task scheduling, linked lists
provide a flexible way to manage and prioritize tasks dynamically.
Page No
Data Structure (3130702) 230170146053
h) Polynomial Arithmetic:
• Linked lists can efficiently represent polynomials, where each node corresponds to a
term, allowing for easy addition, subtraction, and multiplication of polynomials.
Observations:
Dynamic Sizing
Efficiency
Flexibility
Memory Usage
Conclusion:
Linked lists are widely used in various applications due to their flexibility, dynamic sizing,
and efficient memory management capabilities. They form the backbone of many essential data
structures and features in modern software applications, such as dynamic memory allocation,
undo functionality, and browser history management.
Quiz:
Suggested Reference:
Marks
Page No
Data Structure (3130702) 230170146053
Experiment No: 6
AIM : Tree
Date: / / 2024
Theory:
A binary search tree is a binary tree in which each node possessed a key that satisfy the
following conditions
1. All key (if any) in the left sub tree of the root precedes the key in the root.
2. The key in the root precedes all key (if any) in the right sub tree.
3. The left and right sub tree sub trees of the root are again search trees.
Operations on tree
The most common operations performed on tree structure are that of traversal. This is a procedure
by which each node in the tree is processed exactly once in a systematic manner.
1. Pre-order Traversal
Page No
Data Structure (3130702) 230170146053
2. In-order Traversal
3. Post-order Traversal
Pre-order
In-order
Post-order
Program:
#include <stdio.h>
#include <stdlib.h>
struct Node {
int data;
struct Node* left;
struct Node* right;
};
if (root == NULL) {
return createNode(data);
}
if (data < root->data) {
root->left = insertNode(root->left, data);
} else if (data > root->data) {
root->right = insertNode(root->right, data);
}
return root;
}
int main() {
struct Node* root = NULL;
int n, value;
return 0;
}
Output:
Page No
Data Structure (3130702) 230170146053
6.2 Implement recursive tree traversing methods in-order, preorder and post-order
traversal.
Program:
#include <stdio.h>
#include <stdlib.h>
struct Node {
int data;
struct Node* left;
struct Node* right;
};
int main() {
struct Node* root = NULL;
int n, value;
Page No
Data Structure (3130702) 230170146053
postorderTraversal(root);
printf("\n");
return 0;
}
Output:
In-order Traversal: 20 30 40 50 70
Pre-order Traversal: 50 30 20 40 70
Post-order Traversal: 20 40 30 70 50
6.3 Identify widely used applications which use Tree data structure for implementation
of its important feature.
Observations:
Page No
Data Structure (3130702) 230170146053
Efficiency
Flexibility
Scalability
Hierarchical Nature
Application-specific Optimizations
Conclusion:
Tree data structures play a crucial role in the implementation of many widely used
applications due to their efficiency, flexibility, and hierarchical nature. From databases and file
systems to networking and artificial intelligence, trees provide a foundation for efficient data
organization, retrieval, and manipulation. The versatility of trees enables them to be used in a
variety of fields, from search engines that utilize tries for auto-completion to machine learning
algorithms that rely on decision trees for classification and decision-making tasks. The ability of
trees to scale and adapt to different data types makes them indispensable in modern computing.
Quiz:
Suggested Reference:
Marks
Page No
Data Structure (3130702) 230170146053
Experiment No: 7
AIM : Graph
Date:
Theory:
Graph:
A graph G can be defined as a non-empty set of vertices or nodes (V) and a set of edges (E) that
represents the relationship or connection between those nodes. The edges can be defined as a
mapping from E to pairs of elements of V. A graph can be represented as G = (V, E), where V
represents the set of nodes and E represents the set of edges. Each edge of the graph G can be
associated with a pair of nodes of the graph. If an edge X belongs to E and is associated with a pair
of nodes (u, v), where u and v belong to V, then we say that edge X connects node u and node v.
DFS is a graph traversal algorithm that is similar to the preorder traversal of a tree. The traversal
can start from any vertex vi of the graph. Initially, the vertex vi is visited, and then all the adjacent
vertices to vi are traversed recursively using DFS. As a graph can have cycles, we need to avoid
revisiting a node. To achieve this, when a vertex V is visited, it is marked as visited and should not
be selected for traversal again.
Page No
Data Structure (3130702) 230170146053
• Breadth First Search (BFS) starts from a vertex v0 and marks it as visited. Then, all the
vertices adjacent to v0 are visited next.
• Let the vertices adjacent to v0 be v1, v2, v3, and v4. These vertices are marked as visited.
• All unvisited vertices adjacent to v1, v2, v3, and v4 are visited next.
• The above process continues until all vertices are visited.
• The algorithm for BFS maintains a list of vertices that have been visited but not explored
for adjacent vertices. This list is stored in a queue.
• The queue initially contains the starting vertex.
• In each iteration, a vertex is removed from the queue, and its adjacent vertices, which have
not been visited yet, are added to the queue.
• The algorithm terminates when the queue becomes empty.
Program:
#include <stdio.h>
#include <stdlib.h>
struct Node {
int vertex;
struct Node* next;
};
struct Graph {
int numVertices;
struct Node** adjLists;
int* visited;
};
struct Node* createNode(int v) {
struct Node* newNode = (struct Node*)malloc(sizeof(struct Node));
newNode->vertex = v;
newNode->next = NULL;
return newNode;
}
int i;
for (i = 0; i < vertices; i++) {
graph->adjLists[i] = NULL;
graph->visited[i] = 0;
}
return graph;
}
void addEdge(struct Graph* graph, int src, int dest) {
struct Node* newNode = createNode(dest);
newNode->next = graph->adjLists[src];
graph->adjLists[src] = newNode;
newNode = createNode(src);
newNode->next = graph->adjLists[dest];
graph->adjLists[dest] = newNode;
}
graph->visited[startVertex] = 1;
queue[++rear] = startVertex;
while (temp) {
int adjVertex = temp->vertex;
if (graph->visited[adjVertex] == 0) {
queue[++rear] = adjVertex;
graph->visited[adjVertex] = 1;
}
temp = temp->next;
}
}
printf("\n");
Page No
Data Structure (3130702) 230170146053
}
// DFS algorithm
void DFS(struct Graph* graph, int vertex) {
struct Node* adjList = graph->adjLists[vertex];
struct Node* temp = adjList;
graph->visited[vertex] = 1;
printf("%d ", vertex);
if (graph->visited[connectedVertex] == 0) {
DFS(graph, connectedVertex);
}
temp = temp->next;
}
}
int main() {
struct Graph* graph = createGraph(6);
addEdge(graph, 0, 1);
addEdge(graph, 0, 2);
addEdge(graph, 1, 2);
addEdge(graph, 1, 3);
addEdge(graph, 2, 4);
addEdge(graph, 3, 4);
addEdge(graph, 3, 5);
BFS(graph, 0);
DFS
resetVisited(graph);
Page No
Data Structure (3130702) 230170146053
return 0;
}
Output:
BFS Traversal: 0 1 2 3 4 5
DFS Traversal: 0 1 3 4 5 2
7.2 Identify widely used applications which use graphs data structure for implementation
of its important feature.
1) Social Networks
• Feature: Graph algorithms are used for finding mutual friends, recommending new
connections, and identifying communities within the network.
• Example: Facebook’s “People You May Know” feature is built on graph traversal
algorithms to recommend friends based on mutual connections.
2) Google Maps and GPS Navigation Systems
• Feature: Graph algorithms like Dijkstra's and A* are used to find the shortest path
between locations.
• Example: Google Maps uses graph data structures to calculate the quickest route,
taking into account factors like distance, traffic, and alternate routes.
3) Recommendation Systems
• Feature: These systems use collaborative filtering and content-based filtering
techniques, where users and products are represented as nodes and interactions (e.g.,
purchases, ratings) as edges.
• Example: Netflix recommends movies to users based on their viewing history and the
preferences of similar users, all of which is modeled using a graph.
4) Web Page Ranking (Google's PageRank)
• Feature: Google’s PageRank algorithm is based on graph traversal to rank the
importance of web pages based on their inbound and outbound links.
• Example: PageRank uses the graph structure of the web to determine which pages are
more relevant to a given search query.
5) Computer Networks (Routing Algorithms)
• Feature: Routing algorithms like Open Shortest Path First (OSPF) and Border
Gateway Protocol (BGP) use graphs to find optimal paths for data transmission.
• Example: Routers use graph algorithms to efficiently forward data packets across the
internet by finding the shortest or least congested path.
6) Artificial Intelligence (AI) and Machine Learning (ML)
• Feature: Graph Neural Networks (GNN) and knowledge graphs help in tasks like
natural language processing, recommendation systems, and fraud detection.
• Example: Knowledge graphs are used in semantic search engines like Google Search
to understand user queries in a more meaningful way by connecting related concepts.
7) Transport and Logistics
• Feature: Graph algorithms are used for vehicle routing problems, minimizing costs
and delivery time.
• Example: Amazon uses graph-based optimization to deliver packages efficiently by
Page No
Data Structure (3130702) 230170146053
reducing travel time and fuel consumption.
8) Compiler Design
• Feature: Data-flow analysis, dead code elimination, and instruction scheduling are
graph-based features in modern compilers.
• Example: Compilers build a control flow graph (CFG) to optimize code execution
paths and detect possible optimizations.
Observations:
Complex Relationships
Optimization
Scalability
Flexibility
AI Integration
Conclusion:
Graphs are a foundational data structure in computer science, with applications spanning
across various domains, from social networks to AI. They are invaluable in any scenario where
relationships between data points must be modeled, analyzed, and optimized.
Quiz:
Suggested Reference:
Page No
Data Structure (3130702) 230170146053
(2) (2) (2)
Avg. Good Avg. Good Avg. Good Avg. Good Avg. Good
(1) (2) (1) (2) (1) (2) (1) (2) (1) (2)
Marks
Page No
Data Structure (3130702) 230170146053
Experiment No: 8
AIM : Searching
Date: / /2024
Theory:
Linear/Sequential Search
• Linear search, also known as sequential search, is a technique used in computer science to
find a specific value in a list by sequentially checking each of its elements one at a time until
the desired one is found.
• It is the simplest search algorithm and a form of brute-force search. Its worst-case cost is
proportional to the number of elements in the list.
Binary Search
• If we have an array that is sorted, we can use a much more efficient algorithm called Binary
Search.
• In Binary Search, we divide the array into two equal halves and compare the middle element
with the search element.
• If the middle element is equal to the search element, we have found the element and return
its index; otherwise, if the middle element is less than the search element, we look at the
right part of the array, and if the middle element is greater than the search element, we
Page No
Data Structure (3130702) 230170146053
Program:
#include <stdio.h>
int main() {
int n, target, result;
int arr[n];
if (result != -1) {
printf("Element found at index %d\n", result);
} else {
printf("Element not found in the array\n");
}
return 0;
}
Page No
Data Structure (3130702) 230170146053
Output:
Program:
#include <stdio.h>
if (arr[mid] == target) {
return mid; // Return the index if the target is found
}
else {
right = mid - 1;
}
}
return -1;
}
int main() {
int n, target, result;
int arr[n];
Page No
Data Structure (3130702) 230170146053
if (result != -1) {
printf("Element found at index %d\n", result);
} else {
printf("Element not found in the array\n");
}
return 0;
}
Output:
8.3 Identify widely used applications which use Searching technique for implementation
of its important feature.
a) Databases:
Linear search may be used for unsorted data or small datasets where the overhead of
sorting is unnecessary.
b) Search Engines:
• Search engines such as Google employ advanced search algorithms that build upon the
basic principles of search. Binary search is often used in sorting and retrieval, while
more complex algorithms like inverted indexing and ranking systems enhance the
search process.
c) File Systems:
• Hash-based searching is also employed in modern systems to enhance the speed of file
access.
d) Internet Routing Protocols:
• Networking protocols such as OSPF (Open Shortest Path First) use search techniques
Page No
Data Structure (3130702) 230170146053
to find the shortest path in routing tables. Binary search techniques, among others, are
used to optimize routing decisions in hierarchical networks.
e) Library Systems:
• In library management systems, books are stored in sorted order (by author, title, or
category). Binary search is used to efficiently search for a book among millions of
entries.
f) Spell Checkers and Auto-Correct:
• Spell-check and auto-correct algorithms use searching techniques like trie-based
search and binary search to quickly look up words in dictionaries or suggest
corrections for misspelled words.
g) Gaming:
• Games with large environments or inventories use searching techniques to locate
items, objects, or paths. For example, games with inventories use search techniques to
manage item retrieval or player movement optimization using pathfinding algorithms.
h) Artificial Intelligence:
• In AI, search algorithms are used to explore decision trees, optimize pathfinding, and
retrieve relevant data. For instance, binary search is applied in various AI algorithms
to optimize performance.
i) E-commerce Websites:
• E-commerce platforms like Amazon use binary search and other advanced algorithms
to sort and search through large catalogs of products. When a user searches for an
item, the platform uses searching techniques to efficiently match queries to product
entries.
Observations:
Efficiency
Scalability
Flexibility
Applicability
Conclusion:
Searching techniques are fundamental to many widely used applications, from databases and
search engines to file systems and e-commerce platforms. Their efficiency and scalability
make them indispensable in environments where data retrieval is crucial. While linear search
is simple and effective for small, unsorted datasets, binary search is preferred for larger,
sorted datasets due to its logarithmic efficiency. In addition to basic searching, advanced
algorithms that build on these techniques are employed to handle large-scale data, complex
queries, and real-time systems. As technology evolves, searching techniques continue to play
a key role in optimizing performance and improving user experience in various applications.
Quiz:
Page No
Data Structure (3130702) 230170146053
(2) Differentiate sequential search and binary search
(3) Which are the applications of binary search algorithm?
Suggested Reference:
Marks
Page No
Data Structure (3130702) 230170146053
Experiment No: 9
AIM : Sorting
Date: / /2024
Theory:
Bubble sort
Bubble sort, also known as sinking sort, is a comparison-based sorting algorithm. It works by
repeatedly scanning through the list to be sorted, comparing adjacent elements and swapping them
if they are not in the correct order. In each pass through the list, the largest element bubbles up to
the top. The algorithm repeats these processes until no more swaps are needed, indicating that the
list is sorted. Although it is simple to understand and implement, bubble sort has a worst-case and
average time complexity of O(n^2), making it too slow for large inputs. Insertion sort is a more
efficient alternative for small lists.
Merge Sort
• The merge sort algorithm is based on the classical divide-and-conquer paradigm. It operates
as follows:
Page No
Data Structure (3130702) 230170146053
▪ DIVIDE: Partition the n-element sequence to be sorted into two sub sequences of
n/2 elements each.
▪ CONQUER: Sort the two sub sequences recursively using the merge sort.
▪ COMBINE: Merge the two sorted sub sequences of size n/2 each to produce the
sorted sequence consisting of n elements.
Quick Sort
Quicksort is currently the fastest known sorting algorithm and often the most practical choice for
sorting, with an average expected running time of O(n log(n)). Its operation consists of the following
steps:
• Pick an element from the array, known as a pivot.
• Reorder the array so that all elements with values less than the pivot are placed before it,
while all elements with values greater than the pivot come after it (elements with equal
values can go either way). This operation is called partitioning, and at the end of it, the pivot
is in its final position.
• Recursively apply the above steps to the sub-arrays of elements with smaller and greater
values, respectively. Quicksort, like merge sort, is a divide-and-conquer recursive
algorithm.
• The basic divide-and-conquer process for sorting a sub array is given in the following three
easy steps:
▪ Divide
▪ Conquer
▪ Combine
Program:
#include <stdio.h>
Page No
Data Structure (3130702) 230170146053
}
swap(&arr[i + 1], &arr[high]); // Swap pivot with the element at index i+1
return (i + 1); // Return the partition index
}
int main() {
int n;
int arr[n];
quickSort(arr, 0, n - 1);
return 0;
}
Page No
Data Structure (3130702) 230170146053
Output:
Program:
#include <stdio.h>
int main() {
int n;
int arr[n];
Page No
Data Structure (3130702) 230170146053
mergeSort(arr, 0, n - 1);
return 0;
}
Output:
Program:
#include <stdio.h>
void bubbleSort(int arr[], int n) {
int i, j, temp;
int swapped;
Page No
Data Structure (3130702) 230170146053
printf("%d ", arr[i]);
}
printf("\n");
}
int main() {
int n;
int arr[n];
return 0;
}
Output:
9.4 Identify widely used applications which use Sorting technique for implementation
of its important feature.
Page No
Data Structure (3130702) 230170146053
metrics (likes, shares, comments) to prioritize content that is likely to interest users.
e) Data Analytics and Reporting:
• Sorting is essential in data analysis tools for organizing datasets, making it easier to
identify trends, averages, or outliers. Reports often present data sorted by specific
metrics for clarity.
f) Computer Graphics:
• In rendering processes, sorting techniques are used to handle overlapping objects and
manage depth ordering, ensuring proper rendering of scenes.
g) Machine Learning and Data Preprocessing:
• Many machine learning algorithms require sorted data for training models effectively,
particularly in decision tree algorithms and when calculating nearest neighbors.
h) Library Management Systems:
• Libraries use sorting to organize books by title, author, or genre, facilitating easier
search and retrieval for patrons.
i) Networking:
• Networking applications often need to sort routing tables and manage connections
based on various criteria, such as latency or bandwidth.
Observations:
• Efficiency
• Scalability
• Usability
• Versatility
Conclusion:
Sorting techniques play a vital role in many widely used applications, enhancing
performance, usability, and efficiency. From database management and e-commerce platforms
to data analysis and machine learning, the ability to organize data effectively is crucial for
modern software systems.
Quiz:
Suggested Reference:
Page No
Data Structure (3130702) 230170146053
4. http://www.geeksforgeeks.org/data-structures/
5. http://www.coursera.org/specializations/data-structures-algorithms
Marks
Page No
Data Structure (3130702) 230170146053
Experiment No: 10
10.1 Write a program to create hash table and handle the collision using linear probing.
10.2 Write a program to demonstrate the file primitives such as fopen, fclose, fprintf.
10.3 Identify widely used applications which use Hashing technique for implementation of
its important feature.
Date:
Theory:
Hashing
Hashing is a method used to map a large number of data items to a smaller table by utilizing a
hashing function. This technique transforms a range of key values into a range of indexes of an
array.There are two different forms of hashing.
1. Open hashing or external hashing: Open or external hashing, allows records to be stored
in unlimited space (could be a hard disk). It places no limitation on the size of the tables.
2. Close hashing or internal hashing: Closed or internal hashing, uses a fixed space for
storage and thus limits the size of hash table.
Hashing Functions
Page No
Data Structure (3130702) 230170146053
Different hashing functions
1. Division-Method
2. Folding Method
3. Algebraic Coding
4. Multiplicative Hashing
5. Digit Analysis
6. Mid-square Methods
7. Length Dependent Method
File
In computing, a file is a group of records, where each record comprises one or more fields that have
the same sequence. Typically, each field has a predetermined length.
1. Sequential files
2. Direct files
3. Index files
4. Indexed Sequential files
5. Relative files
1. Creation
2. Insertion
3. Deletion
4. Updation
5. Reading
6. Searching
Page No
Data Structure (3130702) 230170146053
10.1 Write a program to create hash table and handle the collision using linear probing.
Program:
#include <stdio.h>
#include <stdlib.h>
#define TABLE_SIZE 10
struct HashTableEntry {
int key;
int value;
};
table[index].key = key;
table[index].value = value;
}
int main() {
struct HashTableEntry hashTable[TABLE_SIZE];
initializeTable(hashTable);
switch (choice) {
case 1:
printf("Enter key: ");
scanf("%d", &key);
printf("Enter value: ");
scanf("%d", &value);
insert(hashTable, key, value);
break;
case 2:
printf("Enter key to search: ");
scanf("%d", &key);
Page No
Data Structure (3130702) 230170146053
value = search(hashTable, key);
if (value != -1) {
printf("Key found with value: %d\n", value);
} else {
printf("Key not found!\n");
}
break;
case 3:
displayTable(hashTable);
break;
case 4:
exit(0);
default:
printf("Invalid choice!\n");
}
}
return 0;
}
Output:
1. Insert
2. Search
3. Display
4. Exit
Enter your choice: 1
Enter key: 12
Enter value: 100
1. Insert
2. Search
3. Display
4. Exit
Enter your choice: 1
Enter key: 22
Enter value: 200
1. Insert
2. Search
3. Display
4. Exit
Enter your choice: 3
Page No
Data Structure (3130702) 230170146053
Index Key Value
0 -- --
1 -- --
2 -- --
3 12 100
4 22 200
5 -- --
6 -- --
7 -- --
8 -- --
9 -- --
1. Insert
2. Search
3. Display
4. Exit
Enter your choice: 2
Enter key to search: 12
Key found with value: 100
10.2 Write a program to demonstrate the file primitives such as fopen, fclose, fprintf.
Program:
#include <stdio.h>
#include <stdlib.h>
int main() {
FILE *filePtr;
if (filePtr == NULL) {
printf("Error! Could not open file.\n");
exit(1); // Exit if fopen() failed
}
fclose(filePtr);
Page No
Data Structure (3130702) 230170146053
printf("Data successfully written to 'example.txt'.\n");
return 0;
}
Output:
10.3 Identify widely used applications which use Hashing technique for implementation of
its important feature.
1) Databases
• Application: Hashing is used in database indexing to quickly retrieve data without
scanning entire tables.
• Feature: Hash tables are used to index rows for fast lookups, especially in large
datasets.
2) Cryptography
• Application: Hash functions are a cornerstone of cryptography, where they are used
to ensure data integrity and generate digital signatures.
• Feature: Cryptographic hash functions (e.g., SHA-256, MD5) create fixed-length
outputs that are virtually unique, even for slightly different inputs.
3) Password Storage
• Application: Hashing is widely used to securely store user passwords in databases.
• Feature: Passwords are hashed before storage so that even if a database is
compromised, attackers cannot easily recover the original passwords.
4) Caching Systems
• Application: Hashing is used in caching systems like Redis and Memcached to store
and retrieve frequently used data quickly.
• Feature: Hashing allows mapping of cached objects to specific keys for rapid access,
reducing the load on primary data stores.
5) Compiler Design
• Application: Compilers use hashing for symbol tables, which store identifiers such as
variable names and function names for fast lookups.
• Feature: A hash table allows quick access to variables and functions when compiling
the code, improving the speed of the compilation process.
6) Data Deduplication
• Application: Hashing is used in data deduplication to identify and eliminate duplicate
files or blocks of data.
• Feature: Hashes of files or blocks are compared, and if two hashes match, the system
identifies the data as a duplicate.
7) Load Balancing
• Application: Hashing is used in load balancing algorithms to distribute tasks or
requests evenly across multiple servers.
• Feature: Consistent hashing ensures that requests for a specific resource are always
directed to the same server, optimizing resource usage.
8) File Systems
Page No
Data Structure (3130702) 230170146053
• Application: File systems use hashing to locate file blocks and manage directories
efficiently.
• Feature: A hash table can map file names or file blocks to their locations on disk for
faster file access.
9) Blockchain and Cryptocurrency
• Application: Hashing is essential for verifying transactions and securing data in
blockchain and cryptocurrencies like Bitcoin and Ethereum.
• Feature: Hashing ensures that each block of data in the blockchain is uniquely
identified and secure, making it resistant to tampering.
Observations:
Efficiency
Security
Scalability
Storage Optimization
Robustness
Conclusion:
Quiz:
Suggested Reference:
Page No
Data Structure (3130702) 230170146053
Rubric-wise marks obtained:
Marks
Page No