Write algorithm so that it only works with primitive data

Assignment Help Data Structure & Algorithms
Reference no: EM131299910

Assignment

public int binarySearch(Comparable[] objArray, Comparable searchObj)

{

int low = 0;

int high = objArray.length - 1;

int mid = 0;

while (low <= high)

{

mid = (low + high) / 2;

if (objArray[mid].compareTo(searchObj) 0)

{

high = mid - 1;

}

else

{

return mid;

}

}

return -1;

}

Modify this code so:

1. The algorithm returns an index where a specified item should be inserted such that them ordering of all items will be preserved after the insertion has occurred. Note that we are not concerned here with performing the actual insertion, only with returning the insertion point.

2. The algorithm should always return a non-negative integer regardless of whether or not the item to be inserted is already in the array. Again, since we are not concerned with performing the actual insertion, it is acceptable for the algorithm to return an index that is greater than the current length of the array. It will be assumed that some other method will handle any array resizing and item shifting. In other words, assume someone else will be writing an insert method that is responsible for actually inserting items into an array. This method would call your modified binarySearch algorithm to get the correct insertion index, and then insert the item.

3. Your algorithm must use Comparable objects. Do not write the algorithm so that it only works with primitive data values such as int or double. If you want to use integers or primitive data, use the built-in wrapper classes (Integer, Double, Long, Float, Character, Byte, etc.). These wrapper classes already implement the Comparable interface, so they are Comparable objects. Java's autoboxing feature will automatically convert a primitive data value to the appropriate wrapper type, eliminating the hassle of manually instantiating wrapper objects. For example, you can create an array of Integer objects by typing:

Integer[] intArray = {1, 2, 3, 4, 5, 6};.

(One cautionary note: keep in mind that characters and character strings are compared using ASCII codes, which means, for example, that an upper case ‘Z' is considered to be less than a lower case ‘a'.)

Reference no: EM131299910

Questions Cloud

Why the testing of software products is of great importance : Compare and contrast at least three different software development methods. Explain why the testing of software products is of great importance.
What is maximum value for which share can be expected : If the market requires a 12 percent rate of return on a stock of this risk and maturity, what is the maximum value for which this share can be expected to trade?
How does the fed monetary policy affect economic conditions : Impact of Monetary Policy How does the Fed's monetary policy affect economic conditions? Fed Control Why may the Fed have difficulty controlling the economy in the manner desired? Be specific
Describe attribute minimization : Describe attribute minimization. Explain what would happen if you tried to validate a page containing instances of attribute minimization. Propose a solution to this problem.
Write algorithm so that it only works with primitive data : Your algorithm must use Comparable objects. Do not write the algorithm so that it only works with primitive data values such as int or double.
Problem regarding the data controls : You learned in your readings that there are a variety of data controls and data source controls. That can be confusing to beginners. Data source controls manage the connection and command and data controls help manage presenting the content.
Fin102 assignment-global financial crisis : The Global Financial Crisis is the most significant worldwide economic catastrophe since the Great Depression of 1929; sub-prime mortgage crisis is an example of financial crisis that affected global financial market worldwide. What are other example..
What is the purpose of your mission trip : MAT-144 Mission Project. What is the purpose of your mission trip? In general, mission trips fall into three categories - providing aid in the form of supplies, providing education, and providing services such as medical clinics and building house..
What rate of return should jacobs require on a project : What rate of return should Jacobs require on a project of average risk?- If a new venture is expected to have a beta of 1.6, what rate of return should Jacobs demand on this project?

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Algorithm for finding smallest element in unsorted array

Consider the following algorithm for finding the smallest element in an unsorted array: RANDOMMIN(A[1 .. n]). What is the exact expected number of executions of line ( )?

  Data array a has data series from 1000000 to 1 with step

data array a has data series from 1000000 to 1 with step size 1 which is in perfect decreasing order.data array b has

  Prove that g has a unique minimum spanning tree

Suppose you are given a connected graph G, with edge costs that are all distinct. Prove that G has a unique minimum spanning tree

  Create a binary search tree

Create a Binary Search Tree

  Design and implement a program based on a greedy algorithm

Design and implement a program based on a greedy algorithm to solve the Minimal Spanning Tree (MST) problem; Choose and implement appropriate data structures for the algorithm; Analyse the efficiency of different implementations of the algorithm in c..

  Decision tree learninga describe the main steps in the

decision tree learninga describe the main steps in the basic decision tree learning algorithm. the table below contains

  Algorithm to recognize substrings which form numbers

Given the string of numbers, recognize all the substrings which form numbers which are divisible by 3. For instance, applying algorithm on the string.

  Explain the fundamental concepts of cryptographic algorithms

Explain the fundamental concepts of cryptographic algorithms. Examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.

  Question 1nbsplist and describe the four steps in polyas

question 1nbsplist and describe the four steps in polyas how to solve it listquestion 2nbsplist the three phases of the

  Find all the cut-vertices and cut-edges in the given graph

Find all possible isomorphism types of the given kind of simple graph? Draw a forest having ten vertices, seven edges, and three components? Find all the cut-vertices and cut-edges in this graph below?

  High bandwidth network for the multimedia team

Assume you have been assigned to build a network for a multimedia development company that currently uses a 10-Mbps Ethernet network. The corporation requires a high bandwidth network for multimedia team.

  Determine the edge connectivity of an undirected multigraph

Give a polynomial-time algorithm for this decision problem - determine the edge connectivity of an undirected multigraph

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd