Priority Queues & Heaps

Similar documents
Priority Queues & Heaps

Priority Queues & Heaps

Midterm Review. EECS 2011 Prof. J. Elder - 1 -

Midterm Review. EECS 2011 Prof. J. Elder - 1 -

Comparison Sorts. EECS 2011 Prof. J. Elder - 1 -

Search Trees. Chapter 10. CSE 2011 Prof. J. Elder Last Updated: :51 PM

Maps and Hash Tables. EECS 2011 Prof. J. Elder - 1 -

Maps, Hash Tables and Dictionaries

ECE250: Algorithms and Data Structures Trees

COMP : DATA STRUCTURES 2/27/14. Are binary trees satisfying two additional properties:

Chapter 8: Recursion

CS 5523: Operating Systems

File Systems: Fundamentals

TAFTW (Take Aways for the Week) APT Quiz and Markov Overview. Comparing objects and tradeoffs. From Comparable to TreeMap/Sort

Event Based Sequential Program Development: Application to Constructing a Pointer Program

Voting. Suppose that the outcome is determined by the mean of all voter s positions.

Uninformed search. Lirong Xia

Estimating the Margin of Victory for Instant-Runoff Voting

A Calculus for End-to-end Statistical Service Guarantees

Notes for Session 7 Basic Voting Theory and Arrow s Theorem

Mathematics and Social Choice Theory. Topic 4 Voting methods with more than 2 alternatives. 4.1 Social choice procedures

Contents. Bibliography 121. Index 123

Chapter 10. The Manipulability of Voting Systems. For All Practical Purposes: Effective Teaching. Chapter Briefing

Dictatorships Are Not the Only Option: An Exploration of Voting Theory

Optimization Strategies

1 Aggregating Preferences

Complexity of Manipulating Elections with Few Candidates

Title: Solving Problems by Searching AIMA: Chapter 3 (Sections 3.1, 3.2 and 3.3)

Lecture 7 A Special Class of TU games: Voting Games

MATH4999 Capstone Projects in Mathematics and Economics Topic 3 Voting methods and social choice theory

A constraint based dependancy parser for Sanskrit

HASHGRAPH CONSENSUS: DETAILED EXAMPLES

Constraint satisfaction problems. Lirong Xia

Minimum Spanning Tree Union-Find Data Structure. Feb 28, 2018 CSCI211 - Sprenkle. Comcast wants to lay cable in a neighborhood. Neighborhood Layout

Randomized Pursuit-Evasion in Graphs

Social welfare functions

Subreddit Recommendations within Reddit Communities

Analyzing proofs Introduction to problem solving. Wiki: Everyone log in okay? Decide on either using a blog or wiki-style journal?

Manipulating Two Stage Voting Rules

Text UI. Data Store Ø Example of a backend to a real Could add a different user interface. Good judgment comes from experience

c M. J. Wooldridge, used by permission/updated by Simon Parsons, Spring

Connecting Voting Theory and Graph Theory

Safe Votes, Sincere Votes, and Strategizing

Lecture 11. Voting. Outline

: It is mathematically impossible for a democratic voting method to satisfy all of the fairness criteria was proven in 1949.

(67686) Mathematical Foundations of AI June 18, Lecture 6

Act means the Municipal Elections Act, 1996, c. 32 as amended;

Mathematical Thinking. Chapter 9 Voting Systems

Title: Adverserial Search AIMA: Chapter 5 (Sections 5.1, 5.2 and 5.3)

Agenda trees and sincere voting: a response to Schwartz

Lecture 6 Cryptographic Hash Functions

arxiv: v2 [math.ho] 12 Oct 2018

A New Method of the Single Transferable Vote and its Axiomatic Justification

Voting Criteria April

Many Social Choice Rules

Proving correctness of Stable Matching algorithm Analyzing algorithms Asymptotic running times

Electrical Engineering and Computer Science Department

arxiv: v1 [cs.gt] 11 Jul 2018

Cluster Analysis. (see also: Segmentation)

CS 5523 Operating Systems: Synchronization in Distributed Systems

VOTING DYNAMICS IN INNOVATION SYSTEMS

CS 4407 Algorithms Greedy Algorithms and Minimum Spanning Trees

Support Vector Machines

Estimating the Margin of Victory for an IRV Election Part 1 by David Cary November 6, 2010

Introduction to Game Theory. Lirong Xia

Supreme Court of Florida

Randomized Pursuit-Evasion in Graphs

Computational Social Choice: Spring 2007

Fall 2016 COP 3223H Program #5: Election Season Nears an End Due date: Please consult WebCourses for your section

Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP

The Manipulability of Voting Systems. Check off these skills when you feel that you have mastered them.

MATH 1340 Mathematics & Politics

Arrow s Impossibility Theorem on Social Choice Systems

Manipulating Two Stage Voting Rules

Voting on combinatorial domains. LAMSADE, CNRS Université Paris-Dauphine. FET-11, session on Computational Social Choice

Bribery in voting with CP-nets

SMART MOTION C A T A L O G 2009:1

Federated Decision Making

How hard is it to control sequential elections via the agenda?

NEW YORK CITY COLLEGE OF TECHNOLOGY The City University of New York

Hat problem on a graph

A representation theorem for minmax regret policies

Computational Social Choice: Spring 2017

Hoboken Public Schools. Project Lead The Way Curriculum Grade 8

AGENDAS AND SINCERITY: A SECOND RESPONSE TO SCHWARTZ

Introduction to Computational Social Choice. Yann Chevaleyre. LAMSADE, Université Paris-Dauphine

Math of Election APPORTIONMENT

SOCIAL CHOICES (Voting Methods) THE PROBLEM. Social Choice and Voting. Terminologies

Data 100. Lecture 9: Scraping Web Technologies. Slides by: Joseph E. Gonzalez, Deb Nolan

A Bloom Filter Based Scalable Data Integrity Check Tool for Large-scale Dataset

Agendas and sincerity: a second response to Schwartz

Designing police patrol districts on street network

CS269I: Incentives in Computer Science Lecture #4: Voting, Machine Learning, and Participatory Democracy

The Australian Society for Operations Research

Political Districting for Elections to the German Bundestag: An Optimization-Based Multi-Stage Heuristic Respecting Administrative Boundaries

COULD SIMULATION OPTIMIZATION HAVE PREVENTED 2012 CENTRAL FLORIDA ELECTION LINES?

Chapter 11. Weighted Voting Systems. For All Practical Purposes: Effective Teaching

Chapter 9: Social Choice: The Impossible Dream

Homework 7 Answers PS 30 November 2013

A Geometric and Combinatorial Interpretation of Weighted Games

Transcription:

Priority Queues & Heaps - 1 -

Outline Ø The Priority Queue ADT Ø Total orderings, the Comparable Interface and the Comparator Class Ø Heaps Ø Adaptable Priority Queues - 2 -

Outcomes Ø By understanding this lecture, you should be able to: q Explain and design a priority queue ADT q Describe suitable applications for priority queues q Design and implement a heap q Analyze the run time of a heap q Identify advantages of and suitable applications for heaps q Design and implement an efficient adaptable priority queue ADT using location-aware entries q Identify suitable applications for an adaptable priority queue - 3 -

Outline Ø The Priority Queue ADT Ø Total orderings, the Comparable Interface and the Comparator Class Ø Heaps Ø Adaptable Priority Queues - 4 -

Priority Queue ADT Ø A priority queue stores a collection of entries Ø Each entry is a pair (key, value) Ø Entries with smaller keys have higher priority. Ø Main methods of the Priority Queue ADT q insert(k, v) inserts an entry with key k and value v q removemin() removes and returns the entry with smallest key Ø Additional methods q min() returns, but does not remove, an entry with smallest key q size(), isempty() Ø Applications: q Process scheduling q Standby flyers - 5 -

The Java Collections Framework (Ordered Data Types) Interface Abstract Class Class Iterable Collection Queue Abstract Collection List Deque Abstract Queue Abstract List Array Deque Priority Queue Abstract Sequential List Array List Vector Stack Linked List - 6 -

The Priority Queue Class Ø Based on priority min-heap Ø Elements are prioritized based either on q natural order q a comparator, passed to the constructor. Ø Provides an iterator Priority Queue ADT (Textbook) insert(k,v) removemin() min() PriorityQueue Class (java.util) add(new SimpleEntry(k,v)) remove() peek() - 7 -

Outline Ø The Priority Queue ADT Ø Total orderings, the Comparable Interface and the Comparator Class Ø Heaps Ø Adaptable Priority Queues - 8 -

Total Order Relations Ø Keys in a priority queue can be arbitrary objects on which an order is defined Ø Two distinct entries in a priority queue can have the same key Ø Mathematical concept of total order relation q Reflexive property: x x q Antisymmetric property: x y y x à x = y q Transitive property: x y y z à x z - 9 -

Entry ADT Ø An entry in a priority queue is simply a keyvalue pair Ø Methods: q getkey(): returns the key for this entry q getvalue(): returns the value for this entry Ø As a Java interface: /** * Interface for a key-value * pair entry **/ public interface Entry { public K getkey();; public V getvalue();; } - 10 -

The Comparable Interface Ø Part of the Collections Framework in java.util. Ø Imposes a total ordering on the objects of a class that implements it. Ø Objects can be compared using the compareto method. Ø obj1.compareto(obj2) returns q Negative integer if obj1 < obj2 q Positive integer if obj1 > obj2 q 0 if obj1 = obj2-11 -

Alternative: Comparator ADT Ø A comparator encapsulates the action of comparing two objects according to a given total order relation Ø A generic priority queue uses an auxiliary comparator Ø The comparator is external to the keys being compared Ø When the priority queue needs to compare two keys, it uses its comparator Ø The primary method of the Comparator ADT: q compare(a, b): ² Returns an integer i such that v i < 0 if a < b v i = 0 if a = b v i > 0 if a > b v an error occurs if a and b cannot be compared. - 12 -

Example Comparator /** Comparator for 2D points under the standard lexicographic order. */ public class Lexicographic implements Comparator { } } int xa, ya, xb, yb;; public int compare(object a, Object b) throws ClassCastException { xa = ((Point2D) a).getx();; ya = ((Point2D) a).gety();; xb = ((Point2D) b).getx();; yb = ((Point2D) b).gety();; if (xa!= xb) else return (xa - xb);; return (ya - yb);; /** Class representing a point in the plane with integer coordinates */ public class Point2D { } } protected int xc, yc;; // coordinates public Point2D(int x, int y) { xc = x;; yc = y;; public int getx() { } return xc;; public int gety() { } return yc;; - 13 -

Sequence-based Priority Queue Ø Implementation with an unsorted list Ø Implementation with a sorted list 4 5 2 3 1 1 2 3 4 5 Ø Performance: q insert takes O(1) time since we can insert the item at the beginning or end of the sequence q removemin and min take O(n) time since we have to traverse the entire sequence to find the smallest key Ø Performance: q insert takes O(n) time since we have to find the right place to insert the item q removemin and min take O(1) time, since the smallest key is at the beginning Is this tradeoff inevitable? - 14 -

Outline Ø The Priority Queue ADT Ø Total orderings, the Comparable Interface and the Comparator Class Ø Heaps Ø Adaptable Priority Queues - 15 -

Heaps Ø Goal: q O(log n) insertion q O(log n) removal Ø Remember that O(log n) is almost as good as O(1)! q e.g., n = 1,000,000,000 à log n 30 Ø There are min heaps and max heaps. We will assume min heaps. - 16 -

Min Heaps Ø A min heap is a binary tree storing keys at its nodes and satisfying the following properties: q Heap-order: for every internal node v other than the root ² key(v) key(parent(v)) q Complete binary tree: let h be the height of the heap ² for i = 0,, h - 1, there are 2 i nodes of depth i ² at depth h - 1 v the internal nodes are to the left of the external nodes v Only the rightmost internal node may have a single child 2 5 6 9 7-17 - q The last node of a heap is the rightmost node of depth h

Height of a Heap Ø Theorem: A heap storing n keys has height O(log n) Proof: (we apply the complete binary tree property) q Let h be the height of a heap storing n keys q Since there are 2 i keys at depth i = 0,, h - 1 and at least one key at depth h, we have n 1 + 2 + 4 + + 2 h- 1 + 1 q Thus, n 2 h, i.e., h log n depth 0 1 h- 1 h keys 1 2 2 h- 1 1-18 -

Heaps and Priority Queues Ø We can use a heap to implement a priority queue Ø We store a (key, element) item at each node Ø We keep track of the position of the last node Ø For simplicity, we will typically show only the keys in the pictures (2, Sue) (5, Pat) (6, Mark) (9, Jeff) (7, Anna) - 19 -

Insertion into a Heap Ø Method insert of the priority queue ADT involves inserting a new entry with key k into the heap 5 2 z 6 Ø The insertion algorithm consists of two steps q Store the new entry at the next available location 9 7 2 new node q Restore the heap-order property 5 9 7 1 6-20 -

Upheap Ø After the insertion of a new key k, the heap-order property may be violated Ø Algorithm upheap restores the heap-order property by swapping k along an upward path from the insertion node Ø Upheap terminates when the key k reaches the root or a node whose parent has a key smaller than or equal to k Ø Since a heap has height O(log n), upheap runs in O(log n) time 2 1 5 1 5 2 9 7 6 9 7 6-21 -

Removal from a Heap Ø Method removemin of the priority queue ADT corresponds to the removal of the root key from the heap Ø The removal algorithm consists of three steps q Replace the root key with the key of the last node w q Remove w q Restore the heap-order property 9 5 5 7 w w 7 2 6 last node 6 9 new last node - 22 -

Downheap Ø After replacing the root key with the key k of the last node, the heap-order property may be violated Ø Algorithm downheap restores the heap-order property by swapping key k along a downward path from the root Ø Note that there are, in general, many possible downward paths which one do we choose??? 7 5 w 6 9-23 -

Downheap Ø We select the downward path through the minimum-key nodes. Ø Downheap terminates when key k reaches a leaf or a node whose children have keys greater than or equal to k Ø Since a heap has height O(log n), downheap runs in O(log n) time 7 5 5 w 6 7 w 6 9 9-24 -

Array-based Heap Implementation Ø Since a heap is a binary tree, we can represent a heap with n keys by means of an array of length n + 1 Ø Links between nodes are not explicitly stored Ø The cell at rank 0 is not used 5 2 6 Ø The root is stored at rank 1. Ø For the node at rank i q the left child is at rank 2i q the right child is at rank 2i + 1 q the parent is at rank floor(i/2) q if 2i + 1 > n, the node has no right child q if 2i > n, the node is a leaf 9 0 7 2 5 6 9 7 1 2 3 4 5-25 -

End of Lecture Feb 6, 2018-26 -

Constructing a Heap Ø A heap can be constructed by iteratively inserting entries: example. Ø What is the running time? T(n) n i=1 logi θ ( nlogn). Ø Can we do better? Ø Yes if all of the key-value pairs are given in advance. - 27 -

Bottom-up Heap Construction Ø We can construct a heap storing n keys using a bottom-up construction with log n phases 2 i - 1 2 i - 1 Ø For simplicity, assume that n = 2 h+1-1. Ø In phase i, each pair of heaps with 2 i -1 keys are merged with an additional node into a heap with 2 i+1-1 keys 2 i+1-1 - 28 -

Merging Two Heaps Ø We are given two heaps and a new key k 8 3 5 4 2 6 Ø We create a new heap with the root node storing k and with the two heaps as subtrees 8 3 5 7 4 2 6 Ø We perform downheap to restore the heaporder property 3 2 4 8 5 7 6-29 -

Example (15 entries) Phase 1. (n+1)/2 heaps of size 1 16 15 4 12 6 7 23 20 25 5 11 27 16 15 4 12 6 7 23 20-30 -

Example (contd.) Phase 2. (n+1)/4 heaps of size 3 25 5 11 27 16 15 4 12 6 9 23 20 15 4 6 20 16 25 5 12 11 9 23 27-31 -

Example (contd.) Phase 3. (n+1)/8 heaps of size 7 7 8 15 4 6 20 16 25 5 12 11 9 23 27 4 6 15 5 8 20 16 25 7 12 11 9 23 27-32 -

Example (end) Phase 4. (n+1)/16 heaps of size 15 10 4 6 15 5 8 20 16 25 7 12 11 9 23 27 4 5 6 15 7 8 20 16 25 10 12 11 9 23 27-33 -

Bottom-Up Heap Construction Analysis Ø Ø Ø In the worst case, each added node gets downheaped to the bottom of the heap. We analyze the run time by considering the total length of these downward paths through the binary tree as it is constructed. For convenience, we can assume that each path first goes right and then repeatedly goes left until the bottom of the heap (this path may differ from the actual downheap path, but this will not change the run time) - 34 -

Analysis Ø Ø Ø Ø Ø Each internal node originates at most one downheap path, of the form RLL L. A node s path will never intersect a path originated by one if its children as it will be going L as the child goes R. Since each node is traversed by at most two paths, the total length of the paths is O(n) Thus, bottom-up heap construction runs in O(n) time Bottom-up heap construction is faster than n successive insertions (O(nlogn)). - 35 -

Bottom-Up Heap Construction Ø Uses downheap to reorganize the tree from bottom to top to make it a heap. Ø Can be written concisely in either recursive or iterative form. - 36 -

Loop Invariants Ø Loop Invariant (LI): An assertion about the current state useful for designing, analyzing and proving the correctness of iterative algorithms. - 37 -

Iterative MakeHeap MakeHeap(A,n) <pre-cond>:a[1 n] is a complete binary tree <post-cond>:a[1 n] is a heap for i n / 2 downto 1 < LI >: All subtrees rooted at i + 1 n are heaps DownHeap(A,i,n) - 38 -

Recursive MakeHeap Get help from friends - 39 -

Recursive MakeHeap MakeHeap(A,i,n) Invoke as MakeHeap (A, 1, n) <pre-cond>:a[i n] is a complete binary tree <post-cond>:the subtree rooted at i is a heap if i n / 4 then MakeHeap(A,LEFT (i),n) MakeHeap(A,RIGHT (i),n) Downheap(A,i,n) i ê ë n/4 ú û is grandparent of n ê ë n/2 ú û is parent of n n Iterative and recursive methods perform exactly the same downheaps but in a different order. Thus both constructions methods are O(n). - 40 -

Iterative vs Recursive MakeHeap Ø Recursive and Iterative MakeHeap do essentially the same thing: Heapify from bottom to top. Ø Difference: q Recursive is depth-first q Iterative is breadth-first - 41 -

Outline Ø The Priority Queue ADT Ø Total orderings, the Comparable Interface and the Comparator Class Ø Heaps Ø Adaptable Priority Queues - 42 -

Recall the Entry and Priority Queue ADTs Ø An entry stores a (key, value) pair within a data structure Ø Methods of the entry ADT: q getkey(): returns the key associated with this entry q getvalue(): returns the value paired with the key associated with this entry Ø Priority Queue ADT: q insert(k, v) inserts an entry with key k and value v q removemin() removes and returns the entry with smallest key q min() returns, but does not remove, an entry with smallest key q size(), isempty() - 43 -

Finding an entry in a heap by key Ø Note that we have not specified any methods for removing or updating an entry with a specified key. Ø These operations require that we first find the entry. Ø In general, this is an O(n) operation: in the worst case, the whole tree must be explored. - 44 -

Motivating Example Ø Suppose we have an online trading system where orders to purchase and sell a given stock are stored in two priority queues (one for sell orders and one for buy orders) as (p,s) entries: q The key, p, of an order is the price q The value, s, for an entry is the number of shares q A buy order (p b,s b ) is executed when a sell order (p s,s s ) with price p s < p b is added (the execution is complete if s s > s b ) q A sell order (p s, s s ) is executed when a buy order (p b, s b ) with price p b > p s is added (the execution is complete if s b > s s ) Ø What if someone wishes to cancel their order before it executes? Ø What if someone wishes to update the price or number of shares for their order? - 45 -

Additional Methods of the Adaptable Priority Queue ADT Ø remove(e): Remove from P and return entry e. Ø replacekey(e,k): Replace key with k and return the old key. Ø replacevalue(e,v): Replace value with v and return the old value. - 46 -

Example Operation Output P insert(5,a) e 1 (5,A) insert(3,b) e 2 (3,B),(5,A) insert(7,c) e 3 (3,B),(5,A),(7,C) min() e 2 (3,B),(5,A),(7,C) key(e 2 ) 3 (3,B),(5,A),(7,C) remove(e 1 ) e 1 (3,B),(7,C) replacekey(e 2,9) 3 (7,C),(9,B) replacevalue(e 3,D) C (7,D),(9,B) remove(e 2 ) e 2 (7,D) - 47 -

Locating Entries Ø In order to implement the operations remove(e), replacekey(e,k), and replacevalue(e,v), we need a fast way of locating an entry e in a priority queue. Ø We can always just search the entire data structure to find an entry e, but this takes O(n) time. Ø Using location-aware entries, this can be reduced to O(1) time. - 48 -

Location-Aware Entries Ø A location-aware entry identifies and tracks the location of its (key, value) object within a data structure - 49 -

List Implementation Ø A location-aware list entry is an object storing q key q value q position (or rank) of the item in the list Ø In turn, the position (or array cell) stores the entry Ø Back pointers (or ranks) are updated during swaps header nodes/positions trailer 2 c 4 a 5 d 8 b - 50 - entries

Heap Implementation Ø A location-aware heap entry is an object storing q key 2 d q value q position of the entry in the underlying heap Ø In turn, each heap position stores an entry Ø Back pointers are updated during entry swaps 4 a 6 b 8 g 5 e 9 c - 51 -

Performance with Location-Aware Entries Ø Times better than those achievable without location-aware entries are highlighted in red: Method Unsorted List Sorted List Heap size, isempty O(1) O(1) O(1) insert O(1) O(n) O(log n) min O(n) O(1) O(1) removemin O(n) O(1) O(log n) remove O(1) O(1) O(log n) replacekey O(1) O(n) O(log n) replacevalue O(1) O(1) O(1) - 52 -

A2Q2: Emergency Ward Triage Ø Patients are normally seen by priority. Ø However patients that have waited longer than maxwaittime are seen next. Ø Selecting the next patient thus involves comparing both priorities and wait times. Let p1, p2 be patients t1, t2 be times Comparator Patient Priority Comparator compare(p1,p2) Time Comparator compare(t1,t2) Patient Time Comparator compare(p1,p2) - 53 -

A2Q2: Emergency Ward Triage Ø To support this requirement, we use two priority queues, one for priority and one for arrival time. Ø Each is implemented as an array-based min-heap. priorityheap 1 timeheap 7:00 5 2 8:00 12:00 9 7 6 13:00 14:00 13:15-54 -

A2Q2: Emergency Ward Triage Ø When a patient is selected, they must be removed from both queues. Ø If selected by priority, this requires an O(n) search through the time queue. Ø If selected by time, this requires an O(n) search through the priority queue. priorityheap 1 timeheap 7:00 5 2 8:00 12:00 9 7 6 13:00 14:00 13:15-55 -

A2Q2: Emergency Ward Triage Ø This O(n) search can be avoided using location-aware entries that cross-reference the two queues. Patient id 3 priority 2 arrivaltime 12:00 prioritypos timepos priorityheap 1 timeheap 7:00 5 2 8:00 12:00 9 7 6 13:00 14:00 13:15-56 -

A2Q2: Emergency Ward Triage Ø Whenever the location of an entry within one of the heaps changes, the corresponding location field in the entry must be updated. q offer(e) q remove(p) q poll() q swap(p1, p2) Patient id 3 priority 2 arrivaltime 12:00 prioritypos timepos priorityheap 1 timeheap 7:00 5 2 8:00 12:00 9 7 6 13:00 14:00 13:15-57 -

APQ Class Ø We base our adaptable priority queue (APQ) class on the java.util PriorityQueue design Let k be a key v be a value e be an entry p be a position Adaptable Priority Queue ADT (Textbook) insert(k,v) removemin() min() remove(e) APQ Class offer(e) poll() peek() remove(p) - 58 -

A2Q2: Emergency Ward Triage Ø To facilitate manipulation of entry positions, we introduce a Locator interface that is specialized into q PatientPriorityLocator q PatientTimeLocator Ø These provide two methods, get(p) and set(p), that allow the position of a patient p in the queue to be accessed and updated. Locator Patient Priority Locator Patient Time Locator - 59 -

Outline Ø The Priority Queue class of the Java Collections Framework Ø Total orderings, the Comparable Interface and the Comparator Class Ø Heaps Ø Adaptable Priority Queues - 60 -

Outcomes Ø By understanding this lecture, you should be able to: q Explain and design a priority queue ADT q Describe suitable applications for priority queues q Design and implement a heap q Analyze the run time of a heap q Identify advantages of and suitable applications for heaps q Design and implement an efficient adaptable priority queue ADT using location-aware entries q Identify suitable applications for an adaptable priority queue - 61 -