Big Java, Binder Ready Version: Early Objects
Big Java, Binder Ready Version: Early Objects
6th Edition
ISBN: 9781119056447
Author: Cay S. Horstmann
Publisher: WILEY
Question
Book Icon
Chapter 16, Problem 15PP
Program Plan Intro

To implement a hash table with quadratic probing

Program plan:

  • In a file “HashSet.java”, import necessary package, and create a class “HashSet”,
    • Declare the array of “Object” type.
    • Declare the necessary variable.
    • Define the constructor to create a hash table.
      • Create an array and set the current size to “0”.
    • Define the method “toString()” that returns the string representation of array.
    • Define the method “contains()”,
      • Assign the hash code.
      • Check the condition,
        • If it is true, returns true.
          • Create a loop,
            • Compute the probe.
            • Check the condition,
              • If it is true, returns true.
            • Check whether the bucket value contains null,
              • If it is true, returns false.
          • Returns false.
    • Define the method “getHashCode()”,
      • Assign the hash code.
      • Check whether the value is less than “0”,
        • If it is true, assign the negative value.
          • Update the hash value.
          • Return the hash code.
    • Define the method “add()”
      • Check whether there is a room before probing,
        • If it is true, call the method “resizeTable()()”.
          • Assign the hash code returned from the method “getHashCode()”.
          • Check whether the has value is a null,
            • If it is true, assign the object properties.
          • Otherwise, execute a loop,
            • Compute the quadratic probe.
            • Check whether the bucket contains null value,
              • If it is true, assign the object properties.
              • Use break statement.
            • Otherwise, Check the condition,
              • Returns false.
          • Increment the current size.
          • Returns true.
    • Define the method “remove()” to remove the object from the set,
      • Get the hash code.
      • Set the position to “-1”.
      • Check the condition,
        • If it is true, assign the hash code to position.
          • Create a loop,
            • Compute the probe.
            • Check the condition, set the new position.
          • Check whether the position value is “-1”,
            • If it is true, returns false.
          • If the item found, find the last item in the rest of the probing sequence.
          • Create a loop,
            • Compute the probe.
            • Check whether the current bucket value contains null,
              • If it is true, use break.
            • Otherwise, check the condition,
              • If it is true, assign the current value to as last index.
          • Check whether the last sequence is “-1”,
            • If it is true, assign the null value and decrement the size.
          • Otherwise, assign the last index value to the current position.
          • Assign null value to last index.
          • Create a loop to rehash the table,
            • Check the condition,
              • Continue to skip nulls.
            • Assign the current bucket value to object.
            • Assign null value to bucket.
            • Decrement current size.
            • Call the method “add()”.
          • Returns true.
    • Create a class “HashSetIterator”,
      • Declare the variable to denote bucket index.
      • Define the constructor that create a hash set iterator that points to the first element of the hash set.
      • Define the method “hasNext ()”,
        • Create a loop,
          • Check the condition,
            • Returns true.
        • Returns false.
    • Define the method “size()” to return the size.
    • Define the method “next ()”,
      • Execute the statement without checking the condition,
        • Increment the index.
        • Check the condition,
          • If it is true, create an object for “NoSuchElementException”.
      • Check whether the current bucket value contains null,
      • Return the value.
    • Define the method “remove()”,
      • Throw an exception “UnsupportedOperationException”.
  • In a file “HashSetTest.java”, create a class “HashSetTest”,
    • Define the method “main()”,
      • Create an object for “HashSet”.
      • Add the name “James” into the set.
      • Add the name “David” into the set.
      • Add the name “John” into the set.
      • Add the name “Kean” into the set.
      • Add the name “Juliet” into the set.
      • Add the name “Lilly” into the set.
      • Print the object properties.
      • Print the expected output.
      • Initialize the array.
      • Iterate over the names,
        • Print the actual and expected output.
      • Remove the name “John” from the set.
      • Print the set and expected output.

Blurred answer
Students have asked these similar questions
Please do not use any AI tools to solve this question. I need a fully manual, step-by-step solution with clear explanations, as if it were done by a human tutor. No AI-generated responses, please.
Obtain the MUX design for the function F(X,Y,Z) = (0,3,4,7) using an off-the-shelf MUX with an active low strobe input (E).
I cannot program smart home automation rules from my device using a computer or phone, and I would like to know how to properly connect devices such as switches and sensors together ? Cisco Packet Tracer 1. Smart Home Automation:o Connect a temperature sensor and a fan to a home gateway.o Configure the home gateway so that the fan is activated when the temperature exceedsa set threshold (e.g., 30°C).2. WiFi Network Configuration:o Set up a wireless LAN with a unique SSID.o Enable WPA2 encryption to secure the WiFi network.o Implement MAC address filtering to allow only specific clients to connect.3. WLC Configuration:o Deploy at least two wireless access points connected to a Wireless LAN Controller(WLC).o Configure the WLC to manage the APs, broadcast the configured SSID, and applyconsistent security settings across all APs.

Chapter 16 Solutions

Big Java, Binder Ready Version: Early Objects

Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education