<samp id="e4iaa"><tbody id="e4iaa"></tbody></samp>
<ul id="e4iaa"></ul>
<blockquote id="e4iaa"><tfoot id="e4iaa"></tfoot></blockquote>
    • <samp id="e4iaa"><tbody id="e4iaa"></tbody></samp>
      <ul id="e4iaa"></ul>
      <samp id="e4iaa"><tbody id="e4iaa"></tbody></samp><ul id="e4iaa"></ul>
      <ul id="e4iaa"></ul>
      <th id="e4iaa"><menu id="e4iaa"></menu></th>

      CHC5223代寫、Java/c++編程設計代做

      時間:2024-03-30  來源:  作者: 我要糾錯



      CHC5223 Data Structures and Algorithms 2023–2024 Semester 2
      1 of 4
      Assignment 1
      Value 40% of Coursework
      Individual work
      Learning outcomes
      Students will be able to understand:
      1.1 Data structures
      1.2 The applications of data structures
      1.3 Object-oriented programming concepts
      1.4 Methods for program testing
      Students will have acquired skills in:
      2.1 Data abstraction
      2.2 The use of data structures
      2.3 Programming at a more advanced level in a high-level object-oriented language
      2.4 Program testing and documentation
      Students will have acquired skills in:
      3.1 Self-management
      3.2 Learning
      3.3 Communication
      3.4 Problem solving
      3.5 Information technology
      Submission requirements
      The assignment submitted should be compressed into a .zip file, the following files should be
      contained in the compressed file:
      • a report as a Microsoft Word document containing the code of all your classes.
      filename format: student ID+CHC5223_CW1_Report.docx
      • a .zip file containing the project: the runnable jar file (if available) and all the program’s
      source code (.java).
      filename format: student ID+CHC5223_ CW1_Files.zip
      General requirements
      All your programming must conform to “Java Conventions and Programming Guidelines” – see
      module Moodle site.
      You must paste the key source code of your implementation into your report, as text or as
      screenshots.
      Introduction
      The topics of this assignment are array, linked list, and hash table. The objective of this
      assignment is to develop a hash table data structure utilizing a double-linked list as the
      underlying mechanism.
      Requirements
      Basic rules
      You must create one executable project after completing all tasks.
      One Java class should be defined in one .java file respectively.
      CHC5223 Data Structures and Algorithms 2023–2024 Semester 2
      2 of 4
      In the report, the source code of each task, together with the corresponding explanation, should
      be presented separately.
      Failure to comply with these rules will result in zero marks.
      Task 1
      You must design and implement a doubly linked list without using any existing implementation
      in Java.
      ➢ The double-linked list should be a generic data structure that can store elements of string
      data type.
      ➢ You must create a Node class that represents each element in the doubled-linked list.
      ➢ You must create a LinkedList class that represents a doubly linked list which should include
      methods for inserting, deleting, accessing specific elements, checking empty, returning size,
      and other operations you want to implement.
      ➢ The insertion operation should be done at the front of the list.
      ➢ The implementation should include error handling to handle errors such as deleting
      elements from an empty list and accessing out-of-bounds.
       5 marks
      You must give clear rationales and detailed explanations of your design and implementation in
      the report.
      5 marks
      Task 2
      You must design and implement a hash table based on a Java array (not any array list or existing
      implementation from the Java library) and achieve the collision solution by using the linear
      probing way.
      ➢ You must create a LinearProbingHashTable class that represents a hash table by using the
      linear probing way for collision resolution. The initial capacity of the array should not
      exceed 20.
      ➢ You must devise a hash function that can work well for string-type data. The hash function
      devised should minimize the occurrence of collisions. You must not use the Java built-in
      hashCode method, though you can experiment with it.
      ➢ The implementation can handle errors such as null keys or keys with unexpected formats.
      ➢ The implementation should include methods for inserting, searching, deleting, and
      accessing key-value pairs.
      ➢ The implementation of the inserting operation can resize the table efficiently according to
      the strategy you design if the hash table is too full.
      ➢ The implementation of the deleting operation can handle the situation when the key is not
      found.
      ➢ The implementation can keep track of the load factor of the hash table and display it after
      each insertion or deletion.
      ➢ The implementation of the searching operation can search for the key and return the
      corresponding value if the key is found.
      5 marks
      You must give clear rationales and detailed explanations of your design and implementation in
      the report.
      CHC5223 Data Structures and Algorithms 2023–2024 Semester 2
      3 of 4
      5 marks
      Task 3
      You must design and implement a hash table based on the linked list and achieve the collision
      solution by using the separate chaining way.
      ➢ You must create a ChainingHashTable class that represents a hash table by using the
      separate chaining way for collision resolution.
      ➢ You must use the doubly linked list devised in task 1 to implement the separate chaining
      way. The capacity of the linked list of separate chaining should not exceed 8.
      ➢ You must devise a hash function that can work well for string-type data. The hashing
      strategy of the hash function should be designed differently from that of task 2 and should
      minimize the occurrence of collisions. You must not use the Java built-in hashCode method,
      though you can experiment with it.
      ➢ The implementation can handle errors such as null keys or keys with unexpected formats.
      ➢ The implementation should include methods for inserting, searching, deleting, and
      accessing key-value pairs, as well as determining load factor.
      ➢ The implementation of the inserting operation can resize the table efficiently if the hash
      table is too full.
      ➢ The implementation of the deleting operation can handle the situation when the key is not
      found.
      ➢ The implementation can keep track of the load factor of the hash table and display it after
      each insertion or deletion.
      ➢ The implementation of the searching operation can search for the key and return the
      corresponding value if the key is found.
      ➢ The implementation of the hash table can resize the table capacity according to the
      strategy you designed.
      5 marks
      You must give clear rationales and detailed explanations of your design and implementation in
      the report.
      5 marks
      Task 4
      You must implement a main program that engages objects of both the LinearProbingHashTable
      class and the ChainingHashTable class.
      ➢ You must design a set of test cases to evaluate the functionality and correctness of two
      different hash tables.
      • Set the capacity of the hash table to a small value so that collisions are easy to occur.
      • Verify that each of the hash functions is working well.
      • Verify that each of the implemented methods is working correctly.
      • Verify that the implementations of the Linear Probing way and Separate Chaining way
      for collision solutions are working effectively.
      ➢ The inner structure of the generated hash tables should be clearly illustrated as the
      executed result of the program.
      4 marks
      CHC5223 Data Structures and Algorithms 2023–2024 Semester 2
      4 of 4
      You must give clear rationales and detailed explanations of your design and implementation in
      the report.
      ➢ Demonstrate the executed result of the program, including the generated hash table and
      corresponding test data.
      ➢ Contrast and analyze the two hash tables generated based on the same set of test cases
      given.
      ➢ Contrast and analyze the difference between the two hash functions you devised based on
      the same set of test cases given.
      ➢ Give a rationale and detailed analysis of the effects of two different strategies of collision
      solution.
      6 marks
      total 40 marks
      Relevant quotation
      “There are two ways of constructing a software design: One way is to make it so simple that
      there are obviously no deficiencies, and the other way is to make it so complicated that there are
      no obvious deficiencies. The first method is far more difficult.”
      Professor Sir Tony Hoare
      1980 Turing Award Lecture; Communications of the ACM 24 (2), (February 1981): pp. 75-83
      Please try to do this the first way.
      Obtaining help
      It is encouraged to request further clarification on what is required for this assignment. Please
      try to do this during normal contact time and avoid asking for such help in the last week before
      the deadline.
      You can discuss the requirements and the material covered in the assignment with others but
      what you create must be all your own work. Be careful to avoid collusion.
      Declare in your report any help you have received other than that from the module teaching
      team.
      Feedback
      In addition to the written feedback that we aim to provide within the normal interval, you will be
      able to obtain fast, brief, verbal formative feedback and help on correcting your work at your
      practical classes. 

      請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

      標簽:

      掃一掃在手機打開當前頁
    • 上一篇:代寫COMP3331、代做C++, Java/Python編程設計
    • 下一篇:JC3509編程代做、代寫Python程序設計
    • 無相關信息
      昆明生活資訊

      昆明圖文信息
      蝴蝶泉(4A)-大理旅游
      蝴蝶泉(4A)-大理旅游
      油炸竹蟲
      油炸竹蟲
      酸筍煮魚(雞)
      酸筍煮魚(雞)
      竹筒飯
      竹筒飯
      香茅草烤魚
      香茅草烤魚
      檸檬烤魚
      檸檬烤魚
      昆明西山國家級風景名勝區
      昆明西山國家級風景名勝區
      昆明旅游索道攻略
      昆明旅游索道攻略
    • 幣安app官網下載 幣安app官網下載

      關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

      Copyright © 2023 kmw.cc Inc. All Rights Reserved. 昆明網 版權所有
      ICP備06013414號-3 公安備 42010502001045

      主站蜘蛛池模板: 亚洲精品无码你懂的| 精品无人区无码乱码毛片国产| 亚洲Aⅴ无码一区二区二三区软件| 亚洲一区二区三区无码中文字幕| 国模无码人体一区二区| 无码午夜人妻一区二区不卡视频| 无码人妻精品一区二区三区99仓本| 亚洲av无码专区亚洲av不卡| 色窝窝无码一区二区三区| 亚洲av无码日韩av无码网站冲| 东京热av人妻无码专区| 蜜芽亚洲av无码一区二区三区| 亚洲av无码成人影院一区| 暴力强奷在线播放无码| 国产成人无码AV在线播放无广告| 亚洲2022国产成人精品无码区| 国产日韩精品中文字无码| 国模无码一区二区三区| 无码人妻丰满熟妇啪啪网站| 日韩精品无码人成视频手机| 亚洲中文字幕无码专区| 亚洲av午夜国产精品无码中文字| 亚洲∧v久久久无码精品| 亚洲真人无码永久在线观看| 免费看又黄又无码的网站| 东京热av人妻无码专区| 青春草无码精品视频在线观| 无码h黄肉3d动漫在线观看| 无码人妻丰满熟妇区BBBBXXXX | 亚洲日韩VA无码中文字幕| 亚洲AV无码专区在线观看成人| 亚洲成A∨人片在线观看无码| 亚洲欧洲av综合色无码 | 国精无码欧精品亚洲一区| 潮喷大喷水系列无码久久精品| 四虎成人精品国产永久免费无码| 无码国产亚洲日韩国精品视频一区二区三区 | 国产亚洲精品无码专区| 狠狠噜天天噜日日噜无码| 国内精品人妻无码久久久影院导航| 国产免费黄色无码视频|