首页
网站开发
桌面应用
管理软件
微信开发
App开发
嵌入式软件
工具软件
数据采集与分析
其他
首页
>
> 详细
CHC5223代做、java语言编程代写
项目预算:
开发周期:
发布时间:
要求地区:
CHC5223 Data Structures and Algorithms 2023–2024 Semester 2
1 of 4
Assignment 1
Value 40% of Coursework
Individual work
Learning outcomes
Students will be able to understand:
1.1 Data structures
1.2 The applications of data structures
1.3 Object-oriented programming concepts
1.4 Methods for program testing
Students will have acquired skills in:
2.1 Data abstraction
2.2 The use of data structures
2.3 Programming at a more advanced level in a high-level object-oriented language
2.4 Program testing and documentation
Students will have acquired skills in:
3.1 Self-management
3.2 Learning
3.3 Communication
3.4 Problem solving
3.5 Information technology
Submission requirements
The assignment submitted should be compressed into a .zip file, the following files should be
contained in the compressed file:
• a report as a Microsoft Word document containing the code of all your classes.
filename format: student ID+CHC5223_CW1_Report.docx
• a .zip file containing the project: the runnable jar file (if available) and all the program’s
source code (.java).
filename format: student ID+CHC5223_ CW1_Files.zip
General requirements
All your programming must conform to “Java Conventions and Programming Guidelines” – see
module Moodle site.
You must paste the key source code of your implementation into your report, as text or as
screenshots.
Introduction
The topics of this assignment are array, linked list, and hash table. The objective of this
assignment is to develop a hash table data structure utilizing a double-linked list as the
underlying mechanism.
Requirements
Basic rules
You must create one executable project after completing all tasks.
One Java class should be defined in one .java file respectively.
CHC5223 Data Structures and Algorithms 2023–2024 Semester 2
2 of 4
In the report, the source code of each task, together with the corresponding explanation, should
be presented separately.
Failure to comply with these rules will result in zero marks.
Task 1
You must design and implement a doubly linked list without using any existing implementation
in Java.
➢ The double-linked list should be a generic data structure that can store elements of string
data type.
➢ You must create a Node class that represents each element in the doubled-linked list.
➢ You must create a LinkedList class that represents a doubly linked list which should include
methods for inserting, deleting, accessing specific elements, checking empty, returning size,
and other operations you want to implement.
➢ The insertion operation should be done at the front of the list.
➢ The implementation should include error handling to handle errors such as deleting
elements from an empty list and accessing out-of-bounds.
5 marks
You must give clear rationales and detailed explanations of your design and implementation in
the report.
5 marks
Task 2
You must design and implement a hash table based on a Java array (not any array list or existing
implementation from the Java library) and achieve the collision solution by using the linear
probing way.
➢ You must create a LinearProbingHashTable class that represents a hash table by using the
linear probing way for collision resolution. The initial capacity of the array should not
exceed 20.
➢ You must devise a hash function that can work well for string-type data. The hash function
devised should minimize the occurrence of collisions. You must not use the Java built-in
hashCode method, though you can experiment with it.
➢ The implementation can handle errors such as null keys or keys with unexpected formats.
➢ The implementation should include methods for inserting, searching, deleting, and
accessing key-value pairs.
➢ The implementation of the inserting operation can resize the table efficiently according to
the strategy you design if the hash table is too full.
➢ The implementation of the deleting operation can handle the situation when the key is not
found.
➢ The implementation can keep track of the load factor of the hash table and display it after
each insertion or deletion.
➢ The implementation of the searching operation can search for the key and return the
corresponding value if the key is found.
5 marks
You must give clear rationales and detailed explanations of your design and implementation in
the report.
CHC5223 Data Structures and Algorithms 2023–2024 Semester 2
3 of 4
5 marks
Task 3
You must design and implement a hash table based on the linked list and achieve the collision
solution by using the separate chaining way.
➢ You must create a ChainingHashTable class that represents a hash table by using the
separate chaining way for collision resolution.
➢ You must use the doubly linked list devised in task 1 to implement the separate chaining
way. The capacity of the linked list of separate chaining should not exceed 8.
➢ You must devise a hash function that can work well for string-type data. The hashing
strategy of the hash function should be designed differently from that of task 2 and should
minimize the occurrence of collisions. You must not use the Java built-in hashCode method,
though you can experiment with it.
➢ The implementation can handle errors such as null keys or keys with unexpected formats.
➢ The implementation should include methods for inserting, searching, deleting, and
accessing key-value pairs, as well as determining load factor.
➢ The implementation of the inserting operation can resize the table efficiently if the hash
table is too full.
➢ The implementation of the deleting operation can handle the situation when the key is not
found.
➢ The implementation can keep track of the load factor of the hash table and display it after
each insertion or deletion.
➢ The implementation of the searching operation can search for the key and return the
corresponding value if the key is found.
➢ The implementation of the hash table can resize the table capacity according to the
strategy you designed.
5 marks
You must give clear rationales and detailed explanations of your design and implementation in
the report.
5 marks
Task 4
You must implement a main program that engages objects of both the LinearProbingHashTable
class and the ChainingHashTable class.
➢ You must design a set of test cases to evaluate the functionality and correctness of two
different hash tables.
• Set the capacity of the hash table to a small value so that collisions are easy to occur.
• Verify that each of the hash functions is working well.
• Verify that each of the implemented methods is working correctly.
• Verify that the implementations of the Linear Probing way and Separate Chaining way
for collision solutions are working effectively.
➢ The inner structure of the generated hash tables should be clearly illustrated as the
executed result of the program.
4 marks
CHC5223 Data Structures and Algorithms 2023–2024 Semester 2
4 of 4
You must give clear rationales and detailed explanations of your design and implementation in
the report.
➢ Demonstrate the executed result of the program, including the generated hash table and
corresponding test data.
➢ Contrast and analyze the two hash tables generated based on the same set of test cases
given.
➢ Contrast and analyze the difference between the two hash functions you devised based on
the same set of test cases given.
➢ Give a rationale and detailed analysis of the effects of two different strategies of collision
solution.
6 marks
total 40 marks
Relevant quotation
“There are two ways of constructing a software design: One way is to make it so simple that
there are obviously no deficiencies, and the other way is to make it so complicated that there are
no obvious deficiencies. The first method is far more difficult.”
Professor Sir Tony Hoare
1980 Turing Award Lecture; Communications of the ACM 24 (2), (February 1981): pp. 75-83
Please try to do this the first way.
Obtaining help
It is encouraged to request further clarification on what is required for this assignment. Please
try to do this during normal contact time and avoid asking for such help in the last week before
the deadline.
You can discuss the requirements and the material covered in the assignment with others but
what you create must be all your own work. Be careful to avoid collusion.
Declare in your report any help you have received other than that from the module teaching
team.
Feedback
In addition to the written feedback that we aim to provide within the normal interval, you will be
able to obtain fast, brief, verbal formative feedback and help on correcting your work at your
practical classes.
软件开发、广告设计客服
QQ:99515681
邮箱:99515681@qq.com
工作时间:8:00-23:00
微信:codinghelp
热点项目
更多
代做ceng0013 design of a pro...
2024-11-13
代做mech4880 refrigeration a...
2024-11-13
代做mcd1350: media studies a...
2024-11-13
代写fint b338f (autumn 2024)...
2024-11-13
代做engd3000 design of tunab...
2024-11-13
代做n1611 financial economet...
2024-11-13
代做econ 2331: economic and ...
2024-11-13
代做cs770/870 assignment 8代...
2024-11-13
代写amath 481/581 autumn qua...
2024-11-13
代做ccc8013 the process of s...
2024-11-13
代写csit040 – modern comput...
2024-11-13
代写econ 2070: introduc2on t...
2024-11-13
代写cct260, project 2 person...
2024-11-13
热点标签
mktg2509
csci 2600
38170
lng302
csse3010
phas3226
77938
arch1162
engn4536/engn6536
acx5903
comp151101
phl245
cse12
comp9312
stat3016/6016
phas0038
comp2140
6qqmb312
xjco3011
rest0005
ematm0051
5qqmn219
lubs5062m
eee8155
cege0100
eap033
artd1109
mat246
etc3430
ecmm462
mis102
inft6800
ddes9903
comp6521
comp9517
comp3331/9331
comp4337
comp6008
comp9414
bu.231.790.81
man00150m
csb352h
math1041
eengm4100
isys1002
08
6057cem
mktg3504
mthm036
mtrx1701
mth3241
eeee3086
cmp-7038b
cmp-7000a
ints4010
econ2151
infs5710
fins5516
fin3309
fins5510
gsoe9340
math2007
math2036
soee5010
mark3088
infs3605
elec9714
comp2271
ma214
comp2211
infs3604
600426
sit254
acct3091
bbt405
msin0116
com107/com113
mark5826
sit120
comp9021
eco2101
eeen40700
cs253
ece3114
ecmm447
chns3000
math377
itd102
comp9444
comp(2041|9044)
econ0060
econ7230
mgt001371
ecs-323
cs6250
mgdi60012
mdia2012
comm221001
comm5000
ma1008
engl642
econ241
com333
math367
mis201
nbs-7041x
meek16104
econ2003
comm1190
mbas902
comp-1027
dpst1091
comp7315
eppd1033
m06
ee3025
msci231
bb113/bbs1063
fc709
comp3425
comp9417
econ42915
cb9101
math1102e
chme0017
fc307
mkt60104
5522usst
litr1-uc6201.200
ee1102
cosc2803
math39512
omp9727
int2067/int5051
bsb151
mgt253
fc021
babs2202
mis2002s
phya21
18-213
cege0012
mdia1002
math38032
mech5125
07
cisc102
mgx3110
cs240
11175
fin3020s
eco3420
ictten622
comp9727
cpt111
de114102d
mgm320h5s
bafi1019
math21112
efim20036
mn-3503
fins5568
110.807
bcpm000028
info6030
bma0092
bcpm0054
math20212
ce335
cs365
cenv6141
ftec5580
math2010
ec3450
comm1170
ecmt1010
csci-ua.0480-003
econ12-200
ib3960
ectb60h3f
cs247—assignment
tk3163
ics3u
ib3j80
comp20008
comp9334
eppd1063
acct2343
cct109
isys1055/3412
math350-real
math2014
eec180
stat141b
econ2101
msinm014/msing014/msing014b
fit2004
comp643
bu1002
cm2030
联系我们
- QQ: 9951568
© 2021
www.rj363.com
软件定制开发网!