Write a detailed algorithm for the ancient chinese game

Assignment Help Computer Networking
Reference no: EM131990327

Fundamentals of Operating Systems and Programming 

Write an Algorithm/ flowchart and then convert it to a java program for given game of NIM

Purpose of the assessment (with ULO Mapping) This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

c. Apply principles of abstraction and problem solving in an object-oriented programming language

d. Apply knowledge of programming constructs in developing computer programs

e. Create programs based on incremental development processes of designing, coding, testing and debugging.

Assignment Specification

Write a detailed algorithm and a program that plays the ancient Chinese game of NIM. Actually, this is a simplified version of the game. In this game, the person who runs your program will be one of the two human players, your program will be a simple Artificial Intelligence (AI) that will serve as the other player, as well as provide the narrative for the game and keep score, invite a friend to be the third player. Your program must keep score impartially while participating in the game, but this is not a difficult task for the computer.

Rules of the Game:

- Number of participating Players: 2 students and 1 computer

- The player who goes first shall define the number of stones in the pile. The number must be between 30 to 50.

- Each player then removes some number (between 1 to 3) of stones from the pile in turn until one player removes the final stone.

- The player who goes first:

I. Provides the number of stones to be placed in the pile,

ii.Removes the first set of 1 to 3 stones

- Other player removes a set of 1 to 3 stones

- The players then take turns(iteration) until the final stone is removed.

- The player who removes the final stone is the winner (student player 1, student player 2 and the computer).

The program must perform the following:
- Use the System I/O (print (), or println()) to introduce and describe the game, Computer shall introduce itself as the AI player, and prompt the human players for his or her names along with MIT Ids.

- The program must use a Scanner object to receive the inputted response.

- The response must be assigned to a properly typed variable.

- Uses printf() to display a greeting to the human player that incorporates the name provided in response to the prompt: Welcome <user's name> to the game of Taking Stones.4 marks

- The user's name must be output in proper name case (i.e., mixed case starting with upper case for the first letter) regardless of the case the user types in.4 marks

- The users shall input the number of stones to be picked either by using a standard random number generator function or may input according to their own strategy but the number should be less than or equal to three (3).

o Java has two ways to generate random numbers
- Math. Random method from the Java API Math
- java.util.random Class and the appropriate method from that class, to generate this number for the human player

- The program must reject and display a valid message if the number of stones to be removed are either less than one(1) or more than three(3) students and remind them the game constrains.

- Prompt that player to re-enter an appropriate number.

- Your program should have the computer use the optimal playing strategy. The optimal strategy is as follows: Divide the remaining number of stones by three. If the remainder is zero, then two stones are removed, or else one stone is removed. For example, if the remaining number of stones is nine or fifteen, then two stones are removed; if the remaining number of stones is eight or ten, then one stone is removed.

- Both the human players shall have their own strategies to play.

- When one of the player has won a game, the program must output a congratulatory message naming the winner along with ID.

- Your program should allow the users to play additional games of NIM as long as he/she enters a "y" or "yes" (lowercase or uppercase) in response to a "Do you want to play again?" prompt.

Verified Expert

In this assignment we have studied java application and develop nim game which is Chinese game. In this assignment there are 3 player .1 is computer and 2 are human who pick the stone randomly from number of given stone.

Reference no: EM131990327

Questions Cloud

What you have learned from your readings : This week you were introduced to environmental science. With some of your background knowledge, and what you have learned from your readings.
What should happen to the prosecutor : You also know that if you tell the judge what you have heard, it will probably result in a mistrial. What would you do?
Assume that the yield on investments : Assume that the yield on investments is 7.2% per year, today's estimated college costs of $21,000 and it is increasing at 3% per year,
Discuss the applicability of the employment-at-will doctrine : In your own words, define employment-at-will. Why did this doctrine become viewed as harsh, immoral, or unfair, from an employee's perspective?
Write a detailed algorithm for the ancient chinese game : MN404 - Fundamentals of Operating Systems and Programming - Apply principles of abstraction and problem solving in an object-oriented programming language
What are the key leadership competencies : What are the key leadership competencies that will be needed in leaders by 2020? Why are they important? What are the most significant leadership trends?
What procedures should be considered for detective controls : What are the benefits of a comprehensive control program? If you were advising this corporation, what would be the specific benefits for it?
What must be the market risk of the stock : If Treasury bills yield 5%, and investors believe that the stock offers a satisfactory expected return, what must be the market risk of the stock?
What attitude do most utilitarians take toward moral rules : What attitude do most utilitarians take toward moral rules? According to Kant, which types of actions done by human beings have moral worth?

Reviews

len1990327

5/21/2018 1:55:45 AM

Grades HD>80% DI (70-79%) CR (60-60%) P (50% - 59%) F (<50%) Task Optimal Algorithm devised (logic used) taking into considerations all possible end conditions as defined. Flawless Code implemented for the devised algorithm without and gap between the algorithm and the program. Relevant Algorithm devised (logic used) taking into considerations all possible end conditions. Flawless Code implemented Generally relevant Algorithm devised (logic used) taking into considerations most of the end conditions. Flawless Code implemented. Some relevance in the algorithm and few conditions are considered. The logic used is not relevant.

len1990327

5/21/2018 1:55:29 AM

Draft copy submission in week 10 Students who fail to submit draft copies of both the algorithm and the program shall lose marks. 6 Demonstration and Viva Tutor will see the outputs and assess your understanding of work done for this assignment in the laboratory class. This will be done during Week-11 laboratoryclass. Please Note: In case the student remains absent during week 11 for demonstration and viva without prior permission for special consideration through AMS, he /she may lose Demo and Viva marks. 10 Total 100

len1990327

5/21/2018 1:55:23 AM

Section to be included in the report Description of the section Marks Algorithm Program All the minute details have to be addressed in the algorithm Error free, well commented java program reflecting each line of the algorithm. 42 42 Following points to be considered: Include appropriate import statements Include a comment at the beginning of your program with basic information and a description of the program Your code should be properly indented Give meaningful names to variables and classes in your code. Correct use of programming structures Your program compiles successfully without any errors Your program is interactive and gives correct output. Your program should follow all the rules mentioned above. Sufficient test cases considering all the requirements must be provided with valid and invalid inputs.

len1990327

5/21/2018 1:55:18 AM

please read every detail carefully for this assignment. I have a need for the draft before the final solution. Due Date Week10 – Draft copy of the algorithm and java program to be submitted. Week 11 – Submission of final copy of the assignment. Demonstration during laboratory class (week 11) Submission Guidelines • All work must be submitted on Moodle by the due date along with the completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using IEEE referencing style. • Algorithm/flow chart to be submitted in a word doc1. • Draft copy and final version of the program to be submitted in a word doc2 and doc3 respectively. • Both file names must have student Id as part of the file names. • Students must ensure before submission of final version of the assignment that the similarity percentage as computed by Turnitin has to be less than 10%.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd