首页
网站开发
桌面应用
管理软件
微信开发
App开发
嵌入式软件
工具软件
数据采集与分析
其他
首页
>
> 详细
代做00301J 、Java设计编程代写
项目预算:
开发周期:
发布时间:
要求地区:
Data Structures and Algorithms Hash Tables
CRICOS Provide Code: 00301J Page 1 of 3
Note:
• hashArray stores the key, value and state (used, free, or previously-used)
of every hashEntry.
We must store both the key and value since we need to check hashArray
to tell if there is a collision and we should keep probing until we find the
right key.
• put(), hasKey() and get() must take the passed-in key and call hash() to
convert the key into an integer. This integer is then used as the index for
hashArray.
• Java Students: If you use a private inner class for DSAHashEntry, then
put(DSAHashEntry will need to be private, otherwise it will be public.
• There are many hash functions in existence, but all hash functions must
be repeatable (i.e., the same key will always give the same index). A good
hash function is fast and will distribute keys evenly inside hashArray.
Hash Tables
Updated: 21st
July, 2023
Aims
• To implement a hash table.
• To make the above hash table automatically resize.
• To save the hash table and reload it from a file.
Before the Practical
• Read this practical sheet fully before starting.
Activities
g
1. Hash Table Implementation
Following the lecture slides as a guide, Create DSAHashTable class and a companion
class called DSAHashEntry to implement a hash table with a simple hash function. Use
linear probing first since it’s easier to think about, then convert to double-hashing.
Assume the keys are strings and the values are Objects.
Data Structures and Algorithms Hash Tables
CRICOS Provide Code: 00301J Page 2 of 3
Note:
• Of course, the latter depends on the distribution of the keys as well, so it’s
not easy to say what a good hash function will be without knowing the
keys.
For the purpose of this practical, just use one of the hash functions from
the lecture notes.
• Use linear probing or double-hashing to handle collisions when inserting.
• hasKey(), get() and remove() will need to use the same approach since
they also need to find the right item.
It’s probably a good idea to try make a private find() method that does
the probing for these three functions and returns the index to use. Use the
DSAHashEntry state to tell you when to stop probing.
• Be aware that remove() with probing methods adds the problem that it
can break probing unless additional measures are taken.
– In particular, say we added Key1, then Key2 which collides with
Key1, so we linearly probe and add Key2 to the next entry.
If we remove Key1, later attempts to get Key2 will fail because Key2
maps to where Key1 used to be.
Since it is now null, probing will abort and imply that Key2 doesn’t
exist.
– The solution is to use the state filed in DSAHashEntry that tracks
whether the entry has been used before or not.
2. Resizing a Hash Table
Modify your DSAHashTable to allow it to resize. There are various ways to determine
when to and how to resize a hash table.
The simplest way to determine when is to set an upper and lower threshold value
for the load factor. When the number of elements is outside of this, the put() or
remove() methods should call resize(size) automatically.
• Remember, this will be computationally expensive (what is it it in Big-O?), so it is
important not to set the threshold too low. Also, collisions occur more frequently
at higher load factors, thus it is equally important to not set the threshold too
high. Do some research to find "good" values.
A simple way to resize is to create a new array, then iterate over hashArray (ignoring
unused and previously used slots) and re-hashing (using put().
• To select a suitable size for the new array, you can either use a "look up" table of
suitable primes or re-calculate a new prime after doubling/halving the previous
size.
Test your resize functionality with a small hash table size, just so you know it will
work when you increase the size of the table. Data Structures and Algorithms Hash Tables
CRICOS Provide Code: 00301J Page 3 of 3
3. File I/O
To truly test your hash table implementation, you will need a large dataset. Read in
the RandomNames7000.csv as input to insert values into your hash table. There are some
duplicates in the file, so your program should be able to handle them.
It is also useful to be able to save the hash table. The save order is not important,
so just iterate through the keys and values in the order they are stored in the hash
table and write it to a .csv.
Submission Deliverable
• Your code are due 2 weeks from your current tutorial session.
– You will demonstrate your work to your tutors during that session
– If you have completed the practical earlier, you can demonstrate your work
during the next session
• You must submit your code and any test data that you have been using electronically
via Blackboard under the Assessments section before your demonstration.
– Java students, please do not submit the *.class files
Marking Guide
Your submission will be marked as follows:
• [6] Your DSAHashTable and DSAHashEntry are implemented correctly.
• [4] Your hash function is well thought out and properly implemented.
This means that it meets at least the first three criteria of a good hash function and
you can argue that it at least partially meets the last.
• [5] Your hash table resizes as you put and remove hash entries.
• [5] You can read in and save .csv files.
End of Worksheet
软件开发、广告设计客服
QQ:99515681
邮箱:99515681@qq.com
工作时间:8:00-23:00
微信:codinghelp
热点项目
更多
urba6006代写、java/c++编程语...
2024-12-26
代做program、代写python编程语...
2024-12-26
代写dts207tc、sql编程语言代做
2024-12-25
cs209a代做、java程序设计代写
2024-12-25
cs305程序代做、代写python程序...
2024-12-25
代写csc1001、代做python设计程...
2024-12-24
代写practice test preparatio...
2024-12-24
代写bre2031 – environmental...
2024-12-24
代写ece5550: applied kalman ...
2024-12-24
代做conmgnt 7049 – measurem...
2024-12-24
代写ece3700j introduction to...
2024-12-24
代做adad9311 designing the e...
2024-12-24
代做comp5618 - applied cyber...
2024-12-24
热点标签
mktg2509
csci 2600
38170
lng302
csse3010
phas3226
77938
arch1162
engn4536/engn6536
acx5903
comp151101
phl245
cse12
comp9312
stat3016/6016
phas0038
comp2140
6qqmb312
xjco3011
rest0005
ematm0051
5qqmn219
lubs5062m
eee8155
cege0100
eap033
artd1109
mat246
etc3430
ecmm462
mis102
inft6800
ddes9903
comp6521
comp9517
comp3331/9331
comp4337
comp6008
comp9414
bu.231.790.81
man00150m
csb352h
math1041
eengm4100
isys1002
08
6057cem
mktg3504
mthm036
mtrx1701
mth3241
eeee3086
cmp-7038b
cmp-7000a
ints4010
econ2151
infs5710
fins5516
fin3309
fins5510
gsoe9340
math2007
math2036
soee5010
mark3088
infs3605
elec9714
comp2271
ma214
comp2211
infs3604
600426
sit254
acct3091
bbt405
msin0116
com107/com113
mark5826
sit120
comp9021
eco2101
eeen40700
cs253
ece3114
ecmm447
chns3000
math377
itd102
comp9444
comp(2041|9044)
econ0060
econ7230
mgt001371
ecs-323
cs6250
mgdi60012
mdia2012
comm221001
comm5000
ma1008
engl642
econ241
com333
math367
mis201
nbs-7041x
meek16104
econ2003
comm1190
mbas902
comp-1027
dpst1091
comp7315
eppd1033
m06
ee3025
msci231
bb113/bbs1063
fc709
comp3425
comp9417
econ42915
cb9101
math1102e
chme0017
fc307
mkt60104
5522usst
litr1-uc6201.200
ee1102
cosc2803
math39512
omp9727
int2067/int5051
bsb151
mgt253
fc021
babs2202
mis2002s
phya21
18-213
cege0012
mdia1002
math38032
mech5125
07
cisc102
mgx3110
cs240
11175
fin3020s
eco3420
ictten622
comp9727
cpt111
de114102d
mgm320h5s
bafi1019
math21112
efim20036
mn-3503
fins5568
110.807
bcpm000028
info6030
bma0092
bcpm0054
math20212
ce335
cs365
cenv6141
ftec5580
math2010
ec3450
comm1170
ecmt1010
csci-ua.0480-003
econ12-200
ib3960
ectb60h3f
cs247—assignment
tk3163
ics3u
ib3j80
comp20008
comp9334
eppd1063
acct2343
cct109
isys1055/3412
math350-real
math2014
eec180
stat141b
econ2101
msinm014/msing014/msing014b
fit2004
comp643
bu1002
cm2030
联系我们
- QQ: 9951568
© 2021
www.rj363.com
软件定制开发网!