Ghostwriting JAVA data structure courses, ghostwriting JAVA homework programs

Ghost writing JAVA data structure course, ghost writing JAVA homework program
data structure course

Design questions (please choose two questions from the following questions to complete, of which the first question is required.)

1. Huffman encoding and decoding (required)
Count the usage frequency of characters in a text file (composed of English letters), establish the corresponding Huffman tree, design the Huffman encoding and decoding scheme, and calculate the compression Compare.

2. Comprehensive query of bus stops The
graph structure is used to save the site data of more than 3 public transport lines in Guangzhou, provide multiple routes and transfer schemes with designated starting and ending points, and calculate the shortest route.
3. Spelling Check
Prepare an English thesaurus, check the spelling of a specified text, and find and point out the misspelled words. It is required to establish various lookup tables (order, index, binary search tree and hash table) for the thesaurus, and analyze the lookup efficiency of different lookup tables.

 

Course requirementsCourse
design requirements and data
1. Problem analysis and task definition:
According to the requirements of the design topic, fully analyze and understand the problem, and clarify what the problem requires? What are the restrictions?
2. Logic design:
Define the corresponding data types for the operation objects involved in the problem description, divide the modules according to the principle of centering on the data structure, and define the main program module and various abstract data types. The result of the logic design should write the definition of each abstract data type (including the description of the data structure and the function description of each basic operation), the algorithm of each main module, and draw the call relationship between the modules;
3. Detailed Design:
Define the corresponding storage structure and write out the pseudocode algorithm of each function. In this process, the system functions should be comprehensively considered to make the system structure clear, reasonable, simple and easy to debug. The implementation of abstract data types should be as data encapsulated as possible, and the specifications of basic operations should be as clear and specific as possible. The result of the detailed design is to further refine the data structure and basic operations, write the type definition of the data storage structure, and write the algorithm framework in the form of functions;
4. Program coding:
The result of the detailed design is further refined into the program design language program. At the same time, some annotations and assertions are added to make the logical concepts in the program clear;
5. Program debugging and testing:
It is carried out from the bottom up and divided into modules, that is, the low-level functions are debugged first. Be able to master various functions of debugging tools, design test data to identify doubts, and modify the program to confirm it or bypass it. After the debugging is correct, carefully organize the source program and its comments to form a well-formed and styled source program list and results;


Submitting relevant content
The content required to be submitted must consist of the following four parts, none of which are indispensable.
1. Submit source programs: All source programs developed by students according to the specific requirements of the course design (should be placed in a folder);
2. Description file of the submitted program: (Saved in .txt) The description file should indicate the directory where the submitted program is located, the main program file name of the submitted program, and if it needs to be installed, the installation and use instructions of the program must be provided;
3 . Course design report: (saved in a word document, the file name should be named according to "Name-Student ID-Course Design Report", for example, the file name is "Zhangsan-001-Course Design Report".doc)
It includes:
a) Questions And functional analysis:
In this part, the functional requirements of each module are described.
b) The detailed design
describes the algorithm design description of each part (it can be a flowchart describing the algorithm), and the storage structure design description used in each program. (If you specify a storage structure, please write the definition of the storage structure).
c) The program realizes
the source program of each algorithm. There must be a corresponding source program for each function, and the source program should be written according to the rules of writing programs. The structure should be clear, the key variables of key functions, and clear program comments should be added to key function parts.
d) Debug and analyze
the test data, the results of the test output, the time complexity analysis, and the thinking of the problems in the design and debugging of each module (what are the problems? How to solve the problems?), and the improvement ideas of the algorithm.
4. Course design summary: (Saved in word document) The summary can include: the harvest of the course design process, the problems encountered, the thinking of the problem-solving process, the thinking of the program debugging ability, the thinking of the data structure course , In the course design process, the understanding of the "Data Structure" course, etc.;


Standardization requirements for the design and debugging process
1. There must be an analysis and design process of data structures and algorithms.
The data storage structure to solve this problem should be analyzed and designed according to the meaning of the question. The algorithm for this problem, describing the algorithm can use pseudocode, performing algorithm analysis to indicate the time complexity of the key algorithm.
Give one or more sets of test data to realize the function. After the program is debugged, the test results will be listed according to the test data.
Can propose algorithm improvement schemes and compare the advantages and disadvantages of different algorithms.
If the program can not run normally, write out the problems encountered in the implementation of this algorithm and the improvement method;
2. There is a corresponding source program The source
program should be written according to the rules of writing programs. The structure should be clear, the key variables of key functions, and clear program comments should be added to key function parts.
The program can run, there must be basic fault tolerance. Try to avoid an infinite loop when there is an operation error;
3. The main program provided at the end can have a main window like an application system, and call each function module required to be completed in the course design through the main menu and hierarchical menu, and can return to the main program after calling. menu, continue to select other functions to select other functions http://www.daixie0.com/contents/9/1260.html

 

The core members of the team mainly include Silicon Valley engineers, BAT front-line engineers, top 5 master and doctoral students in China, and are proficient in German and English! Our main business scope is to do programming assignments, course design and so on.

 

Our field of direction: window programming, numerical algorithm, AI, artificial intelligence, financial statistics, econometric analysis, big data, network programming, WEB programming, communication programming, game programming, multimedia linux, plug-in programming program, API, image processing, embedded/MCU database programming, console process and thread, network security, assembly language hardware Programming software design engineering standards and regulations. The ghostwriting and ghostwriting programming languages ​​or tools include but are not limited to the following:

C/C++/C# ghostwriting

Java ghostwriting

IT ghostwriting

Python ghostwriting

Tutored programming assignments

Matlab ghostwriting

Haskell ghostwriting

Processing ghostwriting

Building a Linux environment

Rust ghostwriting

Data Structure Assginment

MIPS ghostwriting

Machine Learning homework ghostwriting

Oracle/SQL/PostgreSQL/Pig database ghostwriting/doing/coaching

web development, website development, website work

ASP.NET website development

Finance Insurance Statistics Statistics, Regression, Iteration

Prolog ghostwriting

Computer Computational method

 

Because professional, so trustworthy. If necessary, please add QQ: 99515681 or email: [email protected]

WeChat: codinghelp

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=324653111&siteId=291194637