Big Java, Binder Ready Version: Early Objects
Big Java, Binder Ready Version: Early Objects
6th Edition
ISBN: 9781119056447
Author: Cay S. Horstmann
Publisher: WILEY
Question
Book Icon
Chapter 16, Problem 16PP
Program Plan Intro

To implement a hash table with double hashing

Program plan:

  • In a file “HashSet.java”, import necessary package, and create a class “HashSet”,
    • Declare the array of “Object” type.
    • Declare the necessary variable.
    • Define the constructor to create a hash table.
      • Create an array and set the current size to “0”.
    • Define the method “toString()” that returns the string representation of array.
    • Define the method “hash2()” that returns the hard-coded queue for the problem.
    • Define the method “contains()”,
      • Assign the hash code.
      • Check the condition,
        • If it is true, returns true.
          • Create a loop,
            • Compute the probe.
            • Check the condition,
              • If it is true, returns true.
            • Check whether the bucket value contains null,
              • If it is true, returns false.
          • Returns false.
    • Define the method “getHashCode()”,
      • Assign the hash code.
      • Check whether the value is less than “0”,
        • If it is true, assign the negative value.
          • Update the hash value.
          • Return the hash code.
    • Define the method “add()”
      • Check whether there is a room before probing,
        • If it is true, call the method “resizeTable()()”.
          • Assign the hash code returned from the method “getHashCode()”.
          • Check whether the has value is a null,
            • If it is true, assign the object properties.
          • Otherwise, execute a loop,
            • Compute the quadratic probe.
            • Check whether the bucket contains null value,
              • If it is true, assign the object properties.
              • Use break statement.
            • Otherwise, Check the condition,
              • Returns false.
          • Increment the current size.
          • Returns true.
    • Define the method “remove()” to remove the object from the set,
      • Get the hash code.
      • Set the position to “-1”.
      • Check the condition,
        • If it is true, assign the hash code to position.
          • Create a loop,
            • Compute the probe.
            • Check the condition, set the new position.
          • Check whether the position value is “-1”,
            • If it is true, returns false.
          • If the item found, find the last item in the rest of the probing sequence.
          • Create a loop,
            • Compute the probe.
            • Check whether the current bucket value contains null,
              • If it is true, use break.
            • Otherwise, check the condition,
              • If it is true, assign the current value to as last index.
          • Check whether the last index is “-1”,
            • If it is true, assign the null value and decrement the size.
          • Otherwise, assign the last index value to the current position.
          • Assign null value to last index.
          • Create a loop to rehash the table,
            • Compute the probe.
            • Check the condition,
              • If it is true, break the loop.
            • Assign the current bucket value to object.
            • Assign null value to bucket.
            • Decrement current size.
            • Call the method “add()”.
          • Returns true.
    • Define the method “iterator()” that returns an iterator that traverses the elements of the set.
    • Define the method “size()” to return the size.
    • Define the method “resizeTable()”,
      • Create an object.
      • Copy the bucket to the object array.
      • Assign the value to the bucket.
      • Set the current size to “0”.
      • Create a loop,
        • Check the condition,
          • If it is true, call the method “add()”.
    • Create a class “HashSetIterator”,
      • Declare the variable to denote bucket index.
      • Define the constructor that creates a hash set iterator that points to the first element of the hash set.
      • Define the method “hasNext ()”,
        • Create a loop,
          • Check the condition,
            • Returns true.
        • Returns false.
      • Define the method “next ()”,
        • Execute the statement without checking the condition,
          • Increment the index.
          • Check the condition,
            • If it is true, create an object for “NoSuchElementException”.
        • Check whether the current bucket value contains null,
          • Return the value.
      • Define the method “remove()”,
        • Throw an exception “UnsupportedOperationException”.
  • In a file “HashSetTest.java”, create a class “HashSetTest”,
    • Define the method “main()”,
      • Create an object for “HashSet”.
      • Add the name “Harry” into the set.
      • Add the name “Romeo” into the set.
      • Add the name “Susannah” into the set.
      • Add the name “Sarah” into the set.
      • Add the name “Adam” into the set.
      • Add the name “Larry” into the set.
      • Print the set.
      • Print the expected output.
      • Remove “Susannah” from the set.
      • Print the set and expected result.
      • Check whether “Adam” is in the set and print the result.
      • Print the expected result.

Blurred answer
Students have asked these similar questions
Objective: 1. Implement a custom Vector class in C++ that manages dynamic memory efficiently. 2. Demonstrate an understanding of the Big Five by managing deep copies, move semantics, and resource cleanup. 3. Explore the performance trade-offs between heap and stack allocation. Task Description: Part 1: Custom Vector Implementation 1. Create a Vector class that manages a dynamically allocated array. 。 Member Variables: ° T✶ data; // Dynamically allocated array for storage. std::size_t size; // Number of elements currently in the vector. std::size_t capacity; // Maximum number of elements before reallocation is required. 2. Implement the following core member functions: Default Constructor: Initialize an empty vector with no allocated storage. 。 Destructor: Free any dynamically allocated memory. 。 Copy Constructor: Perform a deep copy of the data array. 。 Copy Assignment Operator: Free existing resources and perform a deep copy. Move Constructor: Transfer ownership of the data array…
2.68♦♦ Write code for a function with the following prototype: * Mask with least signficant n bits set to 1 * Examples: n = 6 -> 0x3F, n = 17-> 0x1FFFF * Assume 1 <= n <= w int lower_one_mask (int n); Your function should follow the bit-level integer coding rules Be careful of the case n = W.
Hi-Volt Components You are the IT manager at Hi-Voltage Components, a medium-sized firm that makes specialized circuit boards. Hi-Voltage's largest customer, Green Industries, recently installed a computerized purchasing sys- tem. If Hi-Voltage connects to the purchasing system, Green Industries will be able to submit purchase orders electronically. Although Hi-Voltage has a computerized accounting system, that system is not capable of handling EDI. Tasks 1. What options does Hi-Voltage have for developing a system to connect with Green Industries' pur- chasing system? 2. What terms or concepts describe the proposed computer-to-computer relationship between Hi-Voltage and Green Industries? why not? 3. Would Hi-Voltage's proposed new system be a transaction processing system? Why or 4. Before Hi-Voltage makes a final decision, should the company consider an ERP system? Why or why not?

Chapter 16 Solutions

Big Java, Binder Ready Version: Early Objects

Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education