联系方式

  • QQ:99515681
  • 邮箱:99515681@qq.com
  • 工作时间:8:00-23:00
  • 微信:codinghelp

您当前位置:首页 >> C/C++编程C/C++编程

日期:2025-05-18 10:15

Assignment 2 2025

General

General

You must read fully and carefully the assignment specification and instructions.

Course: COMP20007 Design of Algorithms @ Semester 1, 2025

Deadline Submission: Monday 26th May 2025 @ 11:59 pm

Course Weight: 20%

Assignment type: individual

ILOs covered: 1, 2, 3, 4

Submission method: via ED

Purpose

The purpose of this assignment is for you to:

Design efficient algorithms in pseudocode.

Improve your proficiency in C programming and your dexterity with dynamic memory

allocation.

Demonstrate understanding of data structures and designing and implementing a set of

algorithms.

Task 1: Feeding and breeding eels: Episode II

You are, once again, an eel in the river systems of the Kulin Nation.

Iuk is fast approaching, and so you need to reach the ocean soon so to begin the journey to the Coral

Sea for breeding. You find yourself deep within the river system, and you need to reach the ocean in

a certain amount of time or else get left behind. However, you also need to stock up on as much fat

as possible so that you are able to survive the journey to the Coral Sea. This time around, you have

not found the great feeding grounds of yesteryear, and instead you must source your food from the

lakes as you travel back to the ocean.

Travelling down rivers costs fat, but lakes contain food in them which can increase fat supplies.

In this Task, first we will solve a relaxed problem, and then modify the solution to work on a slightly harder

problem.

Part A (Code)

As an eel, you are very interested in eating as much tasty seafood as you can, but want to be at the

ocean in time for the breeding season. You know that your journey from the ocean onwards will be

difficult, and thus it would be in your best interest to have the most possible fat upon reaching the

ocean within the time constraints you face. As such, you wish to know what the best path to take to

the ocean is.

Assume that for all parts in this task, despite being an eel, you have the ability to write C code and written

responses.

Design a dynamic programming algorithm which finds the path to the ocean that gives the largest fat

retained in your body upon reaching the ocean, limited by the amount of time you have left until

breeding season happens.

Initially, assume that traversing a river always takes exactly 1 day, and as before, you lose some

fat as you traverse a river. In addition, as you do not wish to be sick from overeating, there is a

maximum amount of fat you can have at any point. Similarly, running out of food will lead to your

demise, and so you also always want to have some fat. Of course, you cannot traverse a river if your

fat will drop to 0 or below whilst traversing it, even if there is a lot of food in the lake it flows into.

You may have lakes that actually decrease the fat you have stored as well, due to evading invasive

bird species in the area.

If there are multiple paths with the same maximal fat retained, choose the one with the earliest

arrival to the ocean. Amongst the solutions that have the same fat retained and same arrival day,

choose any of them.

Your program will receive two arguments, the first argument will be the part (always A for this task)

and the second argument will be the input filename.

Input Format:

Each input file comprises four sections:

1. The first line contains four integers: (number of lakes), (number of rivers), (starting lake

ID), and (ocean lake ID).

N M S

O

2. The second line contains three integers: (initial fat units), (maximum fat stored) and (the

time limit).

K F C

3. The third line contains integers describing the fat gain at each lake:

.

N

gain[0], gain[1],…, gain[N − 1]

4. The next lines each contain three integers: , , and , indicating a directed river from lake

to lake with cost (that is, is the fat lost from travelling between and ).

M u v w u

v w w u v

Output Format:

Your program should output the maximum fat at the ocean, as well as the path taken to get there. For

example:

Max fat: 17

Path: 0, 2, 1, 3, 6

If no safe path exists that keeps the eel alive (i.e. fat never drops to or below) which reaches the

ocean before breeding season, output:

0

No path :(

You may wish to review part C before attempting this task, as your solution will have to align with what you

write in part C. Ideally, read this entire slide before beginning.

Part B (Code)

Though you were initially happy with your plan to get to the ocean, you have realised a fatal error:

namely, you cannot traverse every river in only a single day. Now assume you believe that the time

it takes to traverse a river is equal to the fat lost in the river.

You wish to develop a new dynamic programming solution (or a modification of the previous) to

solve this new problem.

As in Part A, your program will receive two arguments, the first argument will be the part (always B

for this task) and the second argument will be the input filename.

The input and output format will be identical to Part A.

Part C (Written)

In Part C, you must create a PDF format document called written-1C.pdf , which explains your

solution in Part A & B according to the points below.

The document must clearly describe the following for your Part A solution:

1. State Representation: Precisely define what each state in the Dynamic Programming solution is,

and all relevant parameters associated with a state. Note how you manage the fat level (ensuring it

never exceeds and never falls to ) and ensure that you have never travelled beyond the

maximum time limit.

F 0

2. Recurrence: State formulaically the recurrence rule associated with your Dynamic Programming

solution. Include your base case(s) and justify the correctness of your recurrence and the base case.

3. Time Complexity: A briefly describe the time and space complexity of your approach. Provide an

upper bound in Big-O notation. Where multiple variables are used in your time complexity, make

sure to define each term clearly.

4. Backtrace: Explicitly state where or how the final answer to the original problem can be found in

your Dynamic Programming table, and briefly describe how the optimal solution can be found

through backtracing.

For your Part B solution, only describe the elements that are different from your description for Part

A. Clearly indicate which of the above points have changed and provide the updated explanation for

those specific points. Where elements of your Part A & B solutions overlap, you are very welcome to

mention as such rather than duplicating the same written response.

A page or two is a reasonable length for this response.

Remember: The time complexity of a dynamic programming algorithm is usually not the closed form

function of the recurrence of the problem being solved.

Task 1: Assignment Submission

Both parts must implement a Dynamic Programming Solution for this task to receive any marks.

To compile: make -B

What each of the numbers in the test cases mean is provided in the source folder.

To run Part A:

./eel A input/t1a-0.txt

To run Part B:

./eel B input/t1b-0.txt

The feedback for test cases is given in the standard unified diff format, you can see info on this format

online (such as at here). A minus means you have a line that is not in the expected output, a plus means you

are missing a line. The diff does not show all output you have produced, only the relevant snippet.

Expected outputs are given in the expected_output folder, should you wish to test your code on one

of the later test cases.

Task 1: Test Case Visualisation

1 Automatic Zoom

Task 2: Bird Tracking

Avid bird-watchers use an app to keep track of the birds they have seen during a bird-watching (or

birding) trip. Every trip, a bird-watcher will see a variety of birds, including some they have seen

before, and some they have not seen. Birds previously unseen are referred to as "Lifers", and there is

some element of competition amongst bird watching enthusiasts to see the most birds, and thus

gather the most lifers, possible. There are certain rules of course, to recording what birds can be

recorded:

Only real birds can be recorded - specifically, it has to be a bird that is within the Clement's

Checklist of Birds of the World.

Each bird can be recorded multiple times, and it is best practice to keep track of how many

times a bird has been seen. This is so that citizens can help to contribute to science and

monitoring bird populations.

Of course, given that birds are usually some distance away and tend not to stay still, it is important to

be able to quickly record birds and check if you have seen them. Some examples of Australian birds

are given below:

Left and Middle: Little Wattlebirds, Right: Crimsonwing Rosella

Part A (Code)

A regular bird-watching group has invited some tourists to go birding with them. The tourists really

wanted to find some new birds the group has not seen but were not confident as it was their first

time going birding. Fortunately, there is a list of birds the group has seen available, and the tourists

thought to ask online to see if anyone would be willing to put together a system to help with quickly

checking if the birds they spot have been seen by the group before or not.

Part B (Code)

Hooked on birding, the tourists realise that they really want to contribute to citizen science and track

how many of each bird they have seen, in a very fast way. They also realise that due to naming

differences in different countries, they sometimes input the wrong bird name and would like to

delete it so that they can replace it with a more accurate name. Seeing no reason to let the previous

work go to waste, the tourists once again reach out online to find someone who can modify the

previous system to allow for counting how many birds have been seen, and deleting birds from the

list.

Part C (Written)

The tourists realise that there may be some issues with deletion but are unsure and are asking for

your thoughts on whether there are any possible issues with deletion. They also wish to know if there

has been any significant change in the runtime and size of the system after the modification in Part B

compared to Part A. How have the time and space complexity changed from going from a standard

system of Part A to the modified system in Part B?

Part D (Code)

The tourists have come upon a fatal flaw in the system from Part B: it seems there is a limit to how

many birds they can add. They once again ask online for help in making a system that efficiently

allows them to do all of the previous tasks, but also can add as many birds as they like.

Part E (Written)

Similar to before, the tourists are interested in any significant change in the runtime and size of the

system after the modification in Part D compared to Part A. How have the time and space complexity

changed from going from the basic system of Part A to the modified system in Part D?

Task 2: Bloom Filters

Background - Bloom Filters

Bloom Filters offer a fast and space-efficient way of checking the existence of an item in a set.

Previously we saw that using hash tables, we a best case look-up, but if you have collisions,

you would have an worse case look-up.

O(1)

O(n)

Bloom Filters are a probabilistic data structure that work by storing hash values, rather than the

underlying keys. In addition, we tend to store more than one hash value per key.

Initially, every entry in the Bloom Filter is set to . To insert in a Bloom Filter, we first hash our key

with different functions, and we set the table entry associated with each of those values to ,

irrespective of their previous value. Here, is a parameter we can tune, and the hash function will be

provided.

0

k 1

k

To check if a key is in our set, we simply need to check if the positions given by hashing the key are

non-zero. If any of them are zero, then the key is "definitely not in the set". Otherwise, the key is

"probably in the set". This approach allows us to have an look-up, at the cost of some

uncertainty.

k

O(k)

In addition, if we assign individual bits to or , we can represent entries in the Bloom filter more

efficiently. Recall that a single integer is bits, meaning we significantly reduce the amount of space

we use when using a Bloom filter. This is important when we are dealing with large datasets, and

want a very fast look-up.

0 1

32

We will use bloom filters to check if we have seen certain birds before.

All three Bloom Filter variants must use a bit array for this task to receive any marks (i.e. A single int length

value must contain 32 entries in the initial Bloom filter and should contain entries for the other

tasks).

BUCKET_SIZE

32

Part A (Code)

Part A will implement a simple Bloom Filter and relevant functionality in bf.c , such as the functions

of:

Adding an element (done in addBF ).

Searching for membership in the set (done in checkBF and birdCheckBF ).

To support checking, you will search your Bloom Filter and perform necessary bit operations. For

each query, you must return the query (i.e. the bird's name) followed by whether or not it is within

the filter.

The first argument for each part will be the type of Bloom filter implemented ( B for Part A, C for Part

B and D for Part D).

Part A will take two filenames from the command line:

The first filename is the name of the list of birds seen by the group.

The second filename is the name of the birds to be queried.

The format of the file with the first given filename will be similar to this example:

10 0.01

Abbott's Babbler

Abbott's Booby

Abbott's Starling

Abd al Kuri Sparrow

Abdim's Stork

Aberdare Cisticola

Aberrant Bush Warbler

Abert's Towhee

Abyssinian Catbird

Abyssinian Crimsonwing

Where all files follow the format:

The first line specifies the number of birds that have previously been seen ( in this example),

and the desired false positive rate ( ).

10

0.01

All following lines specify names of birds that have been previously seen.

The format of the file with the second given file name will be similar to this example:

Abbott's Booby

Abyssinian Catbird

Abyssinian Crimsonwing

Blyth's Frogmouth

Emerald-chinned Hummingbird

Lemon Dove

Where each line is simply the name of the bird, seen on the current bird-watching trip.

The output must be the list of words ordered by input of birds, and whether or not they are in the list.

For the given example this would be:

...Reading...

...Checking...

Abbott's Booby : Possibly in the list

Abyssinian Catbird : Possibly in the list

Abyssinian Crimsonwing : Possibly in the list

Blyth's Frogmouth : Definitely not in the list

Emerald-chinned Hummingbird : Definitely not in the list

Lemon Dove : Definitely not in the list

Hint: For the spacing, use the %-30s format specifier

Part B (Code)

Though Bloom filters can be quite efficient, they prevent us from knowing characteristics about the

data such as "how many items do we have in our filter?". They also do not allow us to delete items,

which can be something we desire.

In Part B, the first argument will be C , the first two file inputs which follow are the same as in the

prior part, but there will be additional third file input specified by an additional argument given on

the command line. This input will be the name of the file storing a list of birds to remove from the

Bloom Filter (as they were mistakenly recorded by the bird watcher). For example, if Wompoo Fruit

Dove was in the list of birds to delete, we would want to remove it from the Bloom Filter.

To do this, Part B will implement a counting Bloom filter. The new counting Bloom filter is almost

identical to the standard filter used in part A, except that instead of each entry in the Bloom filter

being a single bit, it is now bits. Instead of changing a to at each hash value, we instead have the

relevant buckets incremented each time something is added. That is to say, we have buckets ranging

from to in binary representation ( to in decimal), and we assume that the maximal

number of birds in any single bucket must be capped at . Deleting an item involves decrementing

the associated entries.

4 0 1

0000 1111 0 15

15

You will need to implement in cbf.c :

Adding elements to counting Bloom filters.

Reading in elements.

Finding how many times an item has (probably) been seen (via a minimum selection algorithm).

Deleting an element.

The output must be a list of the birds, presented in the same order they appeared in the input, along

with a value indicating how many times each bird has probably been seen. For the given example this

would be:

...Reading...

...Checking...

Abbott's Booby : Probably 1 in the list

Abyssinian Catbird : Probably 1 in the list

Abyssinian Crimsonwing : Probably 1 in the list

Blyth's Frogmouth : Definitely not in the list

Emerald-chinned Hummingbird : Definitely not in the list

Lemon Dove : Definitely not in the list

...Deleting...

Abbott's Babbler : Deleted, and now definitely not in the list

Abbott's Booby : Deleted, and now definitely not in the list

Part B Notes

If adding an item will exceed your limit for each binary counter, then you must output

"Overflow occurred." and immediately terminate the function (but not the program) - see the

following slides for more details.

See the diagrams in the following two slides for what to output upon deletion.

Part C (Written)

In Part C, you must create a PDF format document called written-tasks2.pdf , which explains

potential issues with item deletion in counting Bloom filters. Your answer must state an upper-bound

on the time and space complexity reflecting the impact of having counters over a basic Bloom Filter,

with each term used explained clearly.

In order to avoid trivial answers, you must assume that the number of bits dedicated to counting is

variable, which we will call c. Include all relevant parameters.

A paragraph or two is sufficient for a response to this part.

Part D (Code)

The Bloom filters above are limited in scalability as we must know the number of items we read in, in

advance. In Part D, you must implement a dynamic counting bloom filter. This variant of the bloom

filter effectively layers counting bloom filters like layers of a cake. When one gets full (or an overflow

occurs in a bucket), a new one is made and further data is stored there.

The first argument for Part D, is D . The following input files will be the same as in Part B, except

there is no longer the number of birds listed at the start, and instead a desired capacity of each

Bloom filter. In addition, for Part D, you can assume that the input will always be alphabetically

ordered, and that birds will only be inserted during the initial input (i.e. there will be no ad hoc

insertions).

Insertion involves inserting an item at the current active (latest created) filter. Thus, there will also be

the need to track the current utilization alongside the maximum capacity of each filter.

Look-up involves checking all k positions of the relevant s counting Bloom filters, so long as we keep

track of where items are inserted. A Bloom filter is considered relevant where a bird could possibly

have been inserted in that Bloom filter, given that you have tracked insertions, it is possible to more

precisely determine relevant Bloom filters. You must implement an O(s) space complexity method

of tracking item insertions. Deletion also requires you to keep track of where each item was inserted,

and then deleting from that filter. Your deletion operation should be O(k + s) worst case, and

lookup should be O(ks) worst case, with average case O(k + s) assuming uniform distribution of

all possible bird sightings (and assuming non-limited bird varieties to avoid saturation). You should

also assume that the bucket size is a constant.

The above functions should be implemented in dbf.c . The output will be similar to Part B as well.

Part E (Written)

In Part E, discuss the change in complexity in having a dynamic Bloom filter as opposed to a basic

Bloom filter. Briefly describe how you implemented an O(k + s) deletion. Note assumptions around

what factors can reasonably be held constant (these are similar to the assumptions we would need to

make for a hash table). Add this discussion to your report named written-tasks2.pdf .

A paragraph or two is sufficient for a response to this part.

Task 2: Bit Operation Implementation Tips

To implement the Bloom Filter, a recommended approach is to use the functions provided below.

If you want to understand the task, and the bit operations to implement in bit.c , you need to

understand the following bit operators over numbers a and b:

Operator

a & b

a | b

˜a

a |= b

a &= b

a << b

a >> b

Meaning

Where both corresponding bits in a and b are 1,

output a 1 in that bit position, otherwise give a 0 in that position.

Where either corresponding bit in a and b is 1,

output a 1 in that bit position, otherwise give a 0 in that position.

Where the corresponding bits in a are 1,

output a 0 in that bit position, otherwise give a 1 in that position

Compute a | b and assign the result of the operation to a.

Compute a & b and assign the result of the operation to a.

For all bits in a, move each bit b positions to the left.

For all bits in a, move each bit b positions to the right.

In addition, we will define:

a+=b as compute a+b and assign the result of the operation to a . Remember to only do this if

adding will not cause an overflow.

a-=b as compute a-b and assign the result of the operation to a . Remember to only do this if

subtracting will not cause an underflow.

Example: Basic Operations

Basic Bit Functions Diagrams and Hints

initBits

This function initialises all our bits to zero.

/* Initialise bits */

initBits(A[], arraySize):

for each bit in A[]:

bitOff(A)

addBits

This function finds the section of our Bloom Filter associated with bucketIndex , and increases the

value at that bucket by one, so long as this does not cause an overflow.

addBits(A[], bucketIndex):

if the bucket is full:

return 1

increment the binary value in the bucket by 1.

return 0

subtractBits

This function finds the section of our Bloom Filter associated with bucketIndex , and decreases the

value at that bucket by one, so long as this does not cause an underflow.

subtractBits(A[], bucketIndex):

if the bucket is empty:

return 1

decrement the binary value in the bucket by 1.

return 0

Task 2: Function Diagrams and Hints

This slide has several diagrams to help you through the logic of how these functions should work -

the same function for different Bloom filter variants are presented alongside each other so that you

can easily see how they slightly change between variants. Please start off by implementing the

standard Bloom Filter in bf.c and then move on to cbf.c , for the Counting Bloom filter, and

dbf.c for the Dynamic Bloom Filter.

We have provided two printing functions, one which prints the Bloom filter and one which prints the bits that

have changed in the filter through the previous step, for debugging purposes. These can be found in

utils.h.

Reading a list of birds and adding them to the (Regular / Counting)

Bloom Filter

These functions read in the datafile and sets up the Bloom filter.

Reading a list of birds and adding them to the Dynamic Bloom Filter

This function reads in the datafile and sets up the Bloom filters.

Adding a single bird to a (Regular/ Counting / Dynamic) Bloom Filter

In terms of how we implement the add functions, we will also have an argument to the function which is the

number of hashes. In addition, the diagram shows just the array of the Bloom filter, but we pass the entire

Bloom filter structure in reality (that is, including things such as the number of bits).

Checking if a single bird is in a (Regular/ Counting / Dynamic) Bloom

Filter

In terms of how we implement the check functions, we will also have an argument to the function which is the

number of hashes. In addition, the diagram shows just the array of the Bloom filter, but we pass the entire

Bloom filter structure in reality (that is, including things such as the number of bits).

Checking if a list of birds is in a (Regular/ Counting / Dynamic) Bloom

Filter

Counting how many of a bird there are in a Counting / Dynamic Bloom

Filter

In terms of how we implement the counting functions, we will also have an argument to the function which is

the number of hashes. In addition, the diagram shows just the array of the counting and dynamic Bloom

filters, but we pass the entire Bloom filter structure in reality (that is, including things such as the number of

bits).

You may wish to use the countBucket function.

Deleting from a Counting / Dynamic Bloom Filter

The "relevant lines" are "[Birdname]: Deleted, but still possibly in the list", "[Birdname]: Deleted, and now

definitely not in the list" and "[Birdname]: ERROR - Trying to delete an item definitely not in the list".

When implementing the deletion for the DBF - ensure to only delete from the first Bloom filter the bird has

definitely been seen in - not subsequent ones. This means that you will have to have a way to navigate to this

Bloom Filter. Of course, in the CBF case we only have one, and so we only need to operate on that.

Also to note is that in deleteBirdsCBF we take in the CBF, and in deleteBirdsDBF we take in the DBF.

Task 2: Assignment Submission

All three Bloom Filter variants must use a bit array for this task to receive any marks (i.e. A single int length

value must contain 32 entries in the initial bloom filter and should contain entries for the other

tasks).

BUCKE

32

T_SIZE

To compile: make -B

A list of commands used for the test cases is provided (in order) in run.txt

To run Part A (standard Bloom Filter):

./birds B datafiles/t2a_data_1.txt test_cases/t2_1.txt

To run Part B (counting Bloom Filter):

./birds C datafiles/t2b_data_1.txt test_cases/t2_1.txt delete_cases/t2_delete_1.txt

To run Part D (dynamic Bloom Filter):

./birds D datafiles/t2d_data_50.txt test_cases/t2_1.txt delete_cases/t2_delete_10.txt

The feedback for test cases is given in the standard unified diff format, you can see info on this format

online (such as at here). A minus means you have a line that is not in the expected output, a plus means you

are missing a line. The diff does not show all output you have produced, only the relevant snippet.

Output Example (Part A):

...Reading...

...Checking...

Abbott's Booby : Possibly in the list

Abyssinian Catbird : Possibly in the list

Abyssinian Crimsonwing : Possibly in the list

Blyth's Frogmouth : Definitely not in the list

Emerald-chinned Hummingbird : Definitely not in the list

Lemon Dove : Definitely not in the list

Hint: For the spacing, use the %-30s format specifier

Output Example (Part B and D):

...Reading...

...Checking...

Abbott's Booby : Probably 1 in the list

Abyssinian Catbird : Probably 1 in the list

Abyssinian Crimsonwing : Probably 1 in the list

Blyth's Frogmouth : Definitely not in the list

Emerald-chinned Hummingbird : Definitely not in the list

Lemon Dove : Definitely not in the list

...Deleting...

Abbott's Babbler : Deleted, and now definitely not in the list

Abbott's Booby : Deleted, and now definitely not in the list

Academic Honesty

This is an individual assignment. The work must be your own work.

While you may discuss your program development, coding problems and experimentation with your

classmates, you must not share files, as doing this without proper attribution is considered

plagiarism.

If you have borrowed ideas or taken inspiration from code and you are in doubt about whether it is

plagiarism, provide a comment highlighting where you got that inspiration.

If you refer to published work in the discussion of your experiments, be sure to include a citation to

the publication or the web link.

“Borrowing” of someone else’s code without acknowledgment is plagiarism. Plagiarism is considered

a serious offense at the University of Melbourne. You should read the University code on Academic

integrity and details on plagiarism. Make sure you are not plagiarizing, intentionally or

unintentionally.

You are also advised that it will be necessary to write pseudocode in the final examination. Students

who do not program their own assignments will be at a disadvantage for this part of the examination.

Late Policy

The late penalty is 20% of the available marks for that project for each working day (or part thereof)

overdue.

If you wish to apply for an extension, please review the FEIT Extensions and Special consideration

page on the subject LMS. Requests for extensions on medical grounds will need to be supported by a

medical certificate. Any request received less than 48 hours before the assessment date (or after the

date!) will generally not be accepted except in the most extreme circumstances. In general, extensions

will not be granted if the interruption covers less than 10% of the project duration. Remember that

departmental servers are often heavily loaded near project deadlines, and unexpected outages can

occur; these will not be considered as grounds for an extension.

Students who experience difficulties due to personal circumstances are encouraged to make use of

the appropriate University student support services, and to contact the lecturer, at the earliest

opportunity.

Finally, we are here to help! Frequently asked questions about the project will be answered on Ed.

Requirements: C Programming

The following implementation requirements must be adhered to:

You must write your implementation in the C programming language.

Your code should be easily extensible to multiple data structure instances. This means that the

functions for interacting with your data structures should take as arguments not only the values

required to perform the operation required, but also a pointer to a particular data structure, e.g.

search(dictionary, value) .

Your implementation must read the input file once only.

Your program should store strings in a space-efficient manner. If you are using malloc() to

create the space for a string, remember to allow space for the final end of string character, ‘ \0 ’

( NULL ).

Your approach should be reasonably time efficient.

Your solution should begin from the provided scaffold.

Hints:

• If you haven’t used make before, try it on simple programs first. If it doesn’t work, read the error messages

carefully. A common problem in compiling multifile executables is in the included header files. Note also that

the whitespace before the command is a tab, and not multiple spaces.

• It is not a good idea to code your program as a single file and then try to break it down into multiple files.

Start by using multiple files, with minimal content, and make sure they are communicating with each other

before starting more serious coding.

Programming Style

Below is a style guide which assignments are evaluated against. For this subject, the 80 character

limit is a guideline rather than a rule — if your code exceeds this limit, you should consider whether

your code would be more readable if you instead rearranged it.

/** ***********************

* C Programming Style for Engineering Computation

* Created by Aidan Nagorcka-Smith (aidann@student.unimelb.edu.au) 13/03/2011

* Definitions and includes

* Definitions are in UPPER_CASE

* Includes go before definitions

* Space between includes, definitions and the main function.

* Use definitions for any constants in your program, do not just write them

* in.

*

* Tabs may be set to 4-spaces or 8-spaces, depending on your editor. The code

* Below is ``gnu'' style. If your editor has ``bsd'' it will follow the 8-space

* style. Both are very standard.

*/

/**

* GOOD:

*/

#include <stdio.h>

#include <stdlib.h>

#define MAX_STRING_SIZE 1000

#define DEBUG 0

int main(int argc, char **argv) {

...

/**

* BAD:

*/

/* Definitions and includes are mixed up */

#include <stdlib.h>

#define MAX_STING_SIZE 1000

/* Definitions are given names like variables */

#define debug 0

#include <stdio.h>

/* No spacing between includes, definitions and main function*/

int main(int argc, char **argv) {

...

/** *****************************

* Variables

* Give them useful lower_case names or camelCase. Either is fine,

* as long as you are consistent and apply always the same style.

* Initialise them to something that makes sense.

*/

/**

* GOOD: lower_case

*/

int main(int argc, char **argv) {

int i = 0;

int num_fifties = 0;

int num_twenties = 0;

int num_tens = 0;

...

/**

* GOOD: camelCase

*/

int main(int argc, char **argv) {

int i = 0;

int numFifties = 0;

int numTwenties = 0;

int numTens = 0;

...

/**

* BAD:

*/

int main(int argc, char **argv) {

/* Variable not initialised - causes a bug because we didn't remember to

* set it before the loop */

int i;

/* Variable in all caps - we'll get confused between this and constants

*/

int NUM_FIFTIES = 0;

/* Overly abbreviated variable names make things hard. */

int nt = 0

while (i < 10) {

...

i++;

}

...

/** ********************

* Spacing:

* Space intelligently, vertically to group blocks of code that are doing a

* specific operation, or to separate variable declarations from other code.

* One tab of indentation within either a function or a loop.

* Spaces after commas.

* Space between ) and {.

* No space between the ** and the argv in the definition of the main

* function.

* When declaring a pointer variable or argument, you may place the asterisk

* adjacent to either the type or to the variable name.

* Lines at most 80 characters long.

* Closing brace goes on its own line

*/

/**

* GOOD:

*/

int main(int argc, char **argv) {

int i = 0;

for(i = 100; i >= 0; i--) {

if (i > 0) {

printf("%d bottles of beer, take one down and pass it around,"

" %d bottles of beer.\n", i, i - 1);

} else {

printf("%d bottles of beer, take one down and pass it around."

" We're empty.\n", i);

}

}

return 0;

}

/**

* BAD:

*/

/* No space after commas

* Space between the ** and argv in the main function definition

* No space between the ) and { at the start of a function */

int main(int argc,char ** argv){

int i = 0;

/* No space between variable declarations and the rest of the function.

* No spaces around the boolean operators */

for(i=100;i>=0;i--) {

/* No indentation */

if (i > 0) {

/* Line too long */

printf("%d bottles of beer, take one down and pass it around, %d

bottles of beer.\n", i, i - 1);

} else {

/* Spacing for no good reason. */

printf("%d bottles of beer, take one down and pass it around."

" We're empty.\n", i);

}

}

/* Closing brace not on its own line */

return 0;}

/** ****************

* Braces:

* Opening braces go on the same line as the loop or function name

* Closing braces go on their own line

* Closing braces go at the same indentation level as the thing they are

* closing

*/

/**

* GOOD:

*/

int main(int argc, char **argv) {

...

for(...) {

...

}

return 0;

}

/**

* BAD:

*/

int main(int argc, char **argv) {

...

/* Opening brace on a different line to the for loop open */

for(...)

{

...

/* Closing brace at a different indentation to the thing it's

closing

*/

}

/* Closing brace not on its own line. */

return 0;}

/** **************

* Commenting:

* Each program should have a comment explaining what it does and who created

* it.

* Also comment how to run the program, including optional command line

* parameters.

* Any interesting code should have a comment to explain itself.

* We should not comment obvious things - write code that documents itself

*/

/**

* GOOD:

*/

/* change.c

*

* Created by Aidan Nagorcka-Smith (aidann@student.unimelb.edu.au)

13/03/2011

*

* Print the number of each coin that would be needed to make up some

change

* that is input by the user

*

* To run the program type:

* ./coins --num_coins 5 --shape_coins trapezoid --output blabla.txt

*

* To see all the input parameters, type:

* ./coins --help

* Options::

* --help Show help message

* --num_coins arg Input number of coins

* --shape_coins arg Input coins shape

* --bound arg (=1) Max bound on xxx, default value 1

* --output arg Output solution file

*

*/

int main(int argc, char **argv) {

int input_change = 0;

printf("Please input the value of the change (0-99 cents

inclusive):\n");

scanf("%d", &input_change);

printf("\n");

// Valid change values are 0-99 inclusive.

if(input_change < 0 || input_change > 99) {

printf("Input not in the range 0-99.\n")

}

...

/**

* BAD:

*/

/* No explanation of what the program is doing */

int main(int argc, char **argv) {

/* Commenting obvious things */

/* Create a int variable called input_change to store the input from

the

* user. */

int input_change;

...

/** ****************

* Code structure:

* Fail fast - input checks should happen first, then do the computation.

* Structure the code so that all error handling happens in an easy to read

* location

*/

/**

* GOOD:

*/

if (input_is_bad) {

printf("Error: Input was not valid. Exiting.\n");

exit(EXIT_FAILURE);

}

/* Do computations here */

...

/**

* BAD:

*/

if (input_is_good) {

/* lots of computation here, pushing the else part off the screen.

*/

...

} else {

fprintf(stderr, "Error: Input was not valid. Exiting.\n");

exit(EXIT_FAILURE);

}

Some automatic evaluations of your code style may be performed where they are reliable. As

determining whether these style-related issues are occurring sometimes involves non-trivial (and

sometimes even undecidable) calculations, a simpler and more error-prone (but highly successful)

solution is used. You may need to add a comment to identify these cases, so check any failing test

outputs for instructions on how to resolve incorrectly flagged issues.

Mark Breakdown

There are a total of 20 marks given for this assignment.

Your C programs for both tasks should be accurate, readable, and observe good C programming

structure, safety and style, including documentation. Safety refers to checking whether opening a file

returns something, whether mallocs do their job, etc. The documentation should explain all major

design decisions, and should be formatted so that it does not interfere with reading the code. As

much as possible, try to make your code self-documenting, by choosing descriptive variable names.

Note that marks related to the correctness of your code will be based on passing various tests. If your

program passes these tests without addressing the learning outcomes (e.g. if you fully hard-code

solutions or otherwise deliberately exploit the test cases), you may receive less marks than is

suggested but your code marks will otherwise be determined by test cases.

Marking is based on threshold testing, gaining marks for later tests requires passing earlier tests first.

Mark Breakdown

Task

Task 1

Task 2

Mark Distribution

3 Marks (Part A) + 3 Marks (Part B) + 4 Marks (Part C)

3 Marks (Part A) + 3 Marks (Part B)

+ 1 Mark (Part C) + 2 Marks (Part D) + 1 Mark (Part E)

Note that not all marks will represent the same amount of work, you may find some marks are easier

to obtain than others. Note also that the test cases are similarly not always sorted in order of

difficulty, some may be easier to pass than others.

Additional Support

Your tutors will be available to help with your assignment during the scheduled workshop times.

Questions related to the assignment may be posted on the Ed discussion forum, using the folder tag

Assignments for new posts. You should feel free to answer other students’ questions if you are

confident of your skills.

A tutor will check the discussion forum regularly, and answer some questions, but be aware that for

some questions you will just need to use your judgment and document your thinking.

If you have questions about your code specifically which you feel would reveal too much of the

assignment, feel free to post a private question on the discussion forum.

Acknowledgements

Some tables and diagram designs were adapted from the work of previous tutors.

Photos of birds were taken by Danielle.


相关文章

【上一篇】:到头了
【下一篇】:没有了

版权所有:留学生编程辅导网 2020 All Rights Reserved 联系方式:QQ:99515681 微信:codinghelp 电子信箱:99515681@qq.com
免责声明:本站部分内容从网络整理而来,只供参考!如有版权问题可联系本站删除。 站长地图

python代写
微信客服:codinghelp