Skip to content

Commit 3d6e461

Browse files
Adding Bloom Filter explanation (#140)
* adding bloom filter explenation * Apply suggestions from code review Co-authored-by: David Leal <halfpacho@gmail.com> * fixing typo * adding video Co-authored-by: David Leal <halfpacho@gmail.com>
1 parent eba4aa8 commit 3d6e461

File tree

1 file changed

+128
-0
lines changed

1 file changed

+128
-0
lines changed
Lines changed: 128 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,128 @@
1+
# Bloom Filter
2+
3+
Bloom Filters are one of a class of probabilistic data structures. The Bloom Filter uses hashes and probability to determine whether a particular item is present in a set. It can do so in constant time: O(1) and sub-linear space, though technically still O(n). An important feature of a Bloom Filter is that it is guaranteed never to provide a false negative, saying an element isn't present when it is. However, it has a probability (based on the tuning of its parameters) of providing a false positive, saying an element is present when it is not. The Bloom Filter uses a multi-hash scheme. On insertion, the inserted object is run through each hash, which produces a slot number. That slot number is flipped to 1 in the bit array. During a presence check, the object is run through the same set of hashes, and if each corresponding slot is 1, the filter reports the object has been added. If any of them are 0, it reports that the object has not been added. The hashes must be deterministic and uniformly distributed over the slots for the Bloom filter to operate effectively.
4+
5+
## Complexity
6+
7+
| Operation | Average |
8+
|-----------|---------|
9+
| Initialize| O(1) |
10+
| Insertion | O(1) |
11+
| Query | O(1) |
12+
| Space | O(n) |
13+
14+
## Steps
15+
16+
### Initialization
17+
18+
1. Bloom Filter is Initialized, with a number of hash functions that will be run against it (henceforth known as `k`), and with an array of bits of size `M` with each bit set to 0. There are 3 distinct schemes to tune these parameters.
19+
1. `M` and `k` are explicitly set by the user
20+
2. `k` and `M` are calculated based off the expected number of elements to minimize false positives.
21+
3. `k` and `M` are calculated based off a desired error rate.
22+
23+
### Insertion
24+
25+
1. Object is run through `k` hashes
26+
2. For each result of the hash `n` determine the slot within the filter `m` by calculating `n % M = m`
27+
3. Set slot `m` within the filter to 1
28+
29+
### Query
30+
31+
1. Object is run through `k` hashes
32+
2. For each result of the hash `n` determine the slot within the filter `m` by calculating `n % M = m`
33+
3. Check slot `m`, if `m` is set to 0 return false
34+
4. Return true
35+
36+
## Example
37+
38+
### Initialize
39+
40+
As an example, let us look at a Bloom Filter of Strings, we will initialize the Bloom Filter with 10 slots an we will use 3 hashes
41+
42+
|slot |0|1|2|3|4|5|6|7|8|9|
43+
|-----|-|-|-|-|-|-|-|-|-|-|
44+
|state|0|0|0|0|0|0|0|0|0|0|
45+
46+
### Insert
47+
48+
Let's try to insert `foo`, we will run `foo` through our three hash functions
49+
50+
```text
51+
h1(foo) = 2
52+
h2(foo) = 5
53+
h3(foo) = 6
54+
```
55+
56+
With hashes run, we will flip the corresponding bits to 1
57+
58+
|slot |0|1|2|3|4|5|6|7|8|9|
59+
|-----|-|-|-|-|-|-|-|-|-|-|
60+
|state|0|0|1|0|0|1|1|0|0|0|
61+
62+
### Query
63+
64+
#### Query bar
65+
66+
Let's first try querying `bar`, to query `bar` we run `bar` through our three hash functions:
67+
68+
```text
69+
h1(bar) = 3
70+
h2(bar) = 4
71+
h3(bar) = 6
72+
```
73+
74+
If we look at our bit array, bits 3 and 4 are both not set, if even just 1 bit is not set, we return false, so in this case we return false. `bar` has not been added
75+
76+
#### Query foo
77+
78+
Let's now try to query `foo`, when we run `foo` through our hashes we get:
79+
80+
```text
81+
h1(foo) = 2
82+
h2(foo) = 5
83+
h3(foo) = 6
84+
```
85+
86+
Of course, since we already inserted foo, our table has each of the three bits our hashes produced set to 1, so we return true, `foo` is present
87+
88+
### False Positive
89+
90+
Let's say we inserted `bar` and the current state of our table is:
91+
92+
|slot |0|1|2|3|4|5|6|7|8|9|
93+
|-----|-|-|-|-|-|-|-|-|-|-|
94+
|state|0|0|1|1|1|1|1|0|0|0|
95+
96+
Let's now query `baz`, when we run baz through our hash functions we get:
97+
98+
```text
99+
h1(baz) = 3
100+
h2(baz) = 5
101+
h3(baz) = 6
102+
```
103+
104+
Notice that this does not match either the result of `foo` or `bar`, however because slots 3, 5, and 6 are already set, we report true, that baz is in the set, and therefore produce a false positive.
105+
106+
## Advantage Over HashSets
107+
108+
* Significantly more space-efficient, Both are technically O(n) space complexity, but since bloom filters will only take up several bits per item, hash sets must hold the entire item.
109+
* Presence checks are guaranteed to be O(1) for Bloom Filters, for HashSets, the average is O(1), but worst case is O(n)
110+
111+
## Disadvantage v.s. Hash Sets
112+
113+
* Bloom Filters can report false positives. Optimally there should be about a 1% false-positive rate.
114+
* Bloom Filters do not store the objects inserted into it, so you cannot recover items inserted.
115+
116+
## Optimizing
117+
118+
The probability of false positives increases with the probability of hash collisions within the filter. However, you can optimize the number of collisions if you have some sense of the cardinality of your set ahead of time. You can do this by optimizing `k` and `M`, `M` should be ~ 8-10 bits per expected item, and `k` should be `(M/n) * ln2`.
119+
120+
## Examples
121+
122+
Implementations of the Bloom Filter are available for:
123+
124+
* [C#](https://github.com/TheAlgorithms/C-Sharp/blob/master/DataStructures/Probabilistic/BloomFilter.cs)
125+
126+
## Video Explainer
127+
128+
[Video Explainer by Narendra L](https://www.youtube.com/watch?v=Bay3X9PAX5k)

0 commit comments

Comments
 (0)