合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務(wù)合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務(wù)合肥法律

        代做00301J 、Java設(shè)計(jì)編程代寫
        代做00301J 、Java設(shè)計(jì)編程代寫

        時間:2024-10-09  來源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯



        Data Structures and Algorithms Hash Tables 
        CRICOS Provide Code: 00301J Page 1 of 3 
         
        Note: 
        • hashArray stores the key, value and state (used, free, or previously-used) 
        of every hashEntry. 
        We must store both the key and value since we need to check hashArray 
        to tell if there is a collision and we should keep probing until we find the 
        right key. 
        • put(), hasKey() and get() must take the passed-in key and call hash() to 
        convert the key into an integer. This integer is then used as the index for 
        hashArray. 
        • Java Students: If you use a private inner class for DSAHashEntry, then 
        put(DSAHashEntry will need to be private, otherwise it will be public. 
        • There are many hash functions in existence, but all hash functions must 
        be repeatable (i.e., the same key will always give the same index). A good 
        hash function is fast and will distribute keys evenly inside hashArray. 
        Hash Tables 
         
        Updated: 21st 
        July, 2023 
         
        Aims 
        • To implement a hash table. 
        • To make the above hash table automatically resize. 
        • To save the hash table and reload it from a file. 
         
        Before the Practical 
        • Read this practical sheet fully before starting. 
         
        Activities 

        1. Hash Table Implementation 
        Following the lecture slides as a guide, Create DSAHashTable class and a companion 
        class called DSAHashEntry to implement a hash table with a simple hash function. Use 
        linear probing first since it’s easier to think about, then convert to double-hashing. 
        Assume the keys are strings and the values are Objects. 
         Data Structures and Algorithms Hash Tables 
        CRICOS Provide Code: 00301J Page 2 of 3  
         
        Note: 
        • Of course, the latter depends on the distribution of the keys as well, so it’s 
        not easy to say what a good hash function will be without knowing the 
        keys. 
        For the purpose of this practical, just use one of the hash functions from 
        the lecture notes. 
        • Use linear probing or double-hashing to handle collisions when inserting. 
        • hasKey(), get() and remove() will need to use the same approach since 
        they also need to find the right item. 
        It’s probably a good idea to try make a private find() method that does 
        the probing for these three functions and returns the index to use. Use the 
        DSAHashEntry state to tell you when to stop probing. 
        • Be aware that remove() with probing methods adds the problem that it 
        can break probing unless additional measures are taken. 
        – In particular, say we added Key1, then Key2 which collides with 
        Key1, so we linearly probe and add Key2 to the next entry. 
        If we remove Key1, later attempts to get Key2 will fail because Key2 
        maps to where Key1 used to be. 
        Since it is now null, probing will abort and imply that Key2 doesn’t 
        exist. 
        – The solution is to use the state filed in DSAHashEntry that tracks 
        whether the entry has been used before or not. 
         
        2. Resizing a Hash Table 
        Modify your DSAHashTable to allow it to resize. There are various ways to determine 
        when to and how to resize a hash table. 
         
        The simplest way to determine when is to set an upper and lower threshold value 
        for the load factor. When the number of elements is outside of this, the put() or 
        remove() methods should call resize(size) automatically. 
        • Remember, this will be computationally expensive (what is it it in Big-O?), so it is 
        important not to set the threshold too low. Also, collisions occur more frequently 
        at higher load factors, thus it is equally important to not set the threshold too 
        high. Do some research to find "good" values. 
        A simple way to resize is to create a new array, then iterate over hashArray (ignoring 
        unused and previously used slots) and re-hashing (using put(). 
        • To select a suitable size for the new array, you can either use a "look up" table of 
        suitable primes or re-calculate a new prime after doubling/halving the previous 
        size. 
        Test your resize functionality with a small hash table size, just so you know it will 
        work when you increase the size of the table. Data Structures and Algorithms Hash Tables 
        CRICOS Provide Code: 00301J Page 3 of 3 
         
         
        3. File I/O 
        To truly test your hash table implementation, you will need a large dataset. Read in 
        the RandomNames7000.csv as input to insert values into your hash table. There are some 
        duplicates in the file, so your program should be able to handle them. 
         
        It is also useful to be able to save the hash table. The save order is not important, 
        so just iterate through the keys and values in the order they are stored in the hash 
        table and write it to a .csv. 
         
        Submission Deliverable 
        • Your code are due 2 weeks from your current tutorial session. 
        – You will demonstrate your work to your tutors during that session 
        – If you have completed the practical earlier, you can demonstrate your work 
        during the next session 
        • You must submit your code and any test data that you have been using electronically
        via Blackboard under the Assessments section before your demonstration. 
        – Java students, please do not submit the *.class files 
         
        Marking Guide 
        Your submission will be marked as follows: 
        • [6] Your DSAHashTable and DSAHashEntry are implemented correctly. 
        • [4] Your hash function is well thought out and properly implemented. 
        This means that it meets at least the first three criteria of a good hash function and 
        you can argue that it at least partially meets the last. 
        • [5] Your hash table resizes as you put and remove hash entries. 
        • [5] You can read in and save .csv files. 
        End of Worksheet 

        請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp

        掃一掃在手機(jī)打開當(dāng)前頁
      1. 上一篇:中弘瑞澤_北京要賬公司_助您解決債務(wù)糾紛問題!
      2. 下一篇:代做CITS2002、C/C++語言程序代寫
      3. 無相關(guān)信息
        合肥生活資訊

        合肥圖文信息
        急尋熱仿真分析?代做熱仿真服務(wù)+熱設(shè)計(jì)優(yōu)化
        急尋熱仿真分析?代做熱仿真服務(wù)+熱設(shè)計(jì)優(yōu)化
        出評 開團(tuán)工具
        出評 開團(tuán)工具
        挖掘機(jī)濾芯提升發(fā)動機(jī)性能
        挖掘機(jī)濾芯提升發(fā)動機(jī)性能
        海信羅馬假日洗衣機(jī)亮相AWE  復(fù)古美學(xué)與現(xiàn)代科技完美結(jié)合
        海信羅馬假日洗衣機(jī)亮相AWE 復(fù)古美學(xué)與現(xiàn)代
        合肥機(jī)場巴士4號線
        合肥機(jī)場巴士4號線
        合肥機(jī)場巴士3號線
        合肥機(jī)場巴士3號線
        合肥機(jī)場巴士2號線
        合肥機(jī)場巴士2號線
        合肥機(jī)場巴士1號線
        合肥機(jī)場巴士1號線
      4. 短信驗(yàn)證碼 酒店vi設(shè)計(jì) NBA直播 幣安下載

        關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

        Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
        ICP備06013414號-3 公安備 42010502001045

        主站蜘蛛池模板: 国产福利精品一区二区| 一区高清大胆人体| 乱子伦一区二区三区| 无码精品不卡一区二区三区| 伊人色综合网一区二区三区| 中文字幕一区二区三区在线播放| 亚洲国产成人久久一区二区三区| 国产综合一区二区在线观看| 国产婷婷色一区二区三区深爱网| 亚洲一区精彩视频| 亚洲国产美国国产综合一区二区 | 成人h动漫精品一区二区无码| 国产伦一区二区三区高清| 国偷自产视频一区二区久| 综合无码一区二区三区四区五区| 熟女精品视频一区二区三区| 一区二区三区国产| 日本在线一区二区| 日韩人妻无码一区二区三区综合部 | 日韩精品一区二区三区国语自制 | 免费一区二区三区四区五区| 一本一道波多野结衣AV一区| www亚洲精品少妇裸乳一区二区| 无码人妻精品一区二区三区99性| 久久人妻内射无码一区三区| 亚洲AV无码一区东京热| 一区二区三区福利视频免费观看| 日韩精品无码一区二区视频| 日本一区二区在线| 精品人妻AV一区二区三区| 日韩一区二区视频在线观看 | 麻豆AV天堂一区二区香蕉| 熟妇人妻一区二区三区四区| 国产精品女同一区二区久久| 中文字幕一区二区三区在线播放 | 国产一区二区三区日韩精品| 亚洲成人一区二区| 国产AV一区二区三区无码野战| 久久久久人妻精品一区蜜桃| 97久久精品无码一区二区天美| 女女同性一区二区三区四区|