Computer Networking: A Top-Down Approach (7th Edition)
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Bartleby Related Questions Icon
Related questions
Question
Need help with this Java problem: Note: Please only use these classes/methods to solve the problem: Math, String, StringBuilder, Double (or anyprimitive wrapper class), any helper class you create yourself
Transcribed Image Text:// 1 peak in the data
double []
= {1.1, 2.2, 3.1, 4.2, 2.3};
double ] [] peaksi = A1Q2.peaks (data1, 0.0001);
== { {4.2}, {3.0} }
datal
// assert: peaks1
// 2 peaks in the data
= {1.1, 2.2, 1.1, 2.2, 3.3};
A1Q2. peaks (data2, 0.00001);
== { {2.2, 3.3}, (1.0, 4.0} }
double []
data2
double [) 0 peaka2
// assert: peaks2
// NO peaks int the data
double [] data3 = {0.3, 1.1, 2.2, 2.2, 2.2, 1.1, 0.2};
double[] [] peaks3 = A1Q2.peaks (data3, 0.00001);
// assert: peaka3
{ 0, 0 }
=3D
Note that we are not considering what might be described as plateaus in the data. A plateau occurs
when a local maximum value is repeated one or more times consecutively (the dataset data3 from
above has a plateau with value 2.2 that spans index values 2-4, inclusive).
Transcribed Image Text:When analyzing data, such as the output of the rolling average method from the previous problem, it
is sometimes useful to identify where the (local) maximum valucs are located. We'll call these max-
imal values peaks in the data. More formally, if we have a sequence of numbers do, d1, d2, ..., dn-1,
the peaks are identified as follows:
1. do is a peak if do > dı,
2. dn-1 is a peak if d,-2 < d,-1,
3. for any 1<i<n- 2, d; is a peak if d;-1 < d; and d; > di+1
In the provided A1Q2.java file, you will complete the peaks () method which finds all peak
values (and their positions) in a given array of numbers.
public static double[] [] peaks (double [] data, double epsilon)
The input parameter data stores the data that we are looking for peaks in and epsilon is uscd
as a tolerance value for floating point mumber equality. Because of the representational crror of
floating point mumbers, we should never try to check if two floating point mımbers are the samc.
Instcad, we consider two floating point numbers to be the same mumber if they are close enough to
cach other. In particular, two numbers r and y are considered equal if and only if |r – y| < epsilon.
While not necessary, it is highly recommended that you create and use a static helper function (in
the same A1Q2 class) to determine if two floating point numbers are considered equal for a given
epsilon. You must not use equals (), compareTo () or compare () from the Double class for this.
The method returns an array containing exactly two (2) arrays of doubles. The first array holds
all the peak values and the second array holds the index positions of those pcaks. For example,
Expert Solution
Check MarkThis question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
bartleby
Step by stepSolved in 2 steps with 2 images
Knowledge Booster
Background pattern image
Similar questions
- QUICKLY please. Thank you. Please answer in python quickly Below is code that defines a Quadrilateral class (a shape with four sides), which has four floating point instance variables that correspond to the four side lengths: import math class Quadrilateral: def __init__(self,a,b,c,d): self.a = a self.b = b self.c = c self.d = d def perimeter(self): return self.a + self.b + self.c + self.d def area(self): print("Not enough information") def __lt__(self, other): return self.perimeter() < other.perimeter() Define a Rectangle class that inherits from Quadrilateral, with the following methods: __init__(self, length, width): Override the __init__ method so that the Rectangle constructor only takes in two floating point numbers. Your constructor for Rectangle should only consist of a call to Quadrilateral’s constructor: don’t define any new instance variables. Override the area method to...arrow_forwardJavaarrow_forwardPROBLEM STATEMENT: Return the longest String! public class LongestString{public static String solution(String firstWord, String secondWord){// ↓↓↓↓ your code goes here ↓↓↓↓return null;}} Can you help me with this Java Questionarrow_forward
- Q: What's a better way to write this? (C#) public string SomeMethod(string OriginalZip) { string zip = "Zip Not Available"; zip = GetZip(zip, OriginalZip); return zip; } private static string GetZip(string zip, string OriginalZip) { int zipLength = (OriginalZip.HasValue) ? OriginalZip.Value.ToString().Length: 0; int NumOf Leading Zeroes = (zipLength> O && zipLength < 5) ? 5 - zipLength: 0; if (OriginalZip.HasValue) { i++) } zip = OriginalZip.Value.ToString(); for (int i = 0; i < NumOf Leading Zeroes; { } zip = "0" + zip; } return zip;arrow_forwardJava true or false: The method public boolean simpleMethod() { return true; } is a valid mutator?arrow_forwardRandom Numbers: Most computer programs do the same thing every time they run; programs like that are called deterministic. Usually, determinism is a good thing, since we expect the same calculation to yield the same result. But for some applications, we want the computer to be unpredictable. Games are an obvious example, but there are many others, like scientific simulations. We have already seen java.util.Random, which generates pseudorandom numbers. The method nextInt takes an integer argument, n, and returns a random integer between 0 and n - 1. Assignment: For this assignment you will write a program in java to simulate a guessing game. Your program will generate a random number in a certain range (let the user define the range) and ask the user to guess what number it is. Give the user a certain number of tries while you narrow down the possibilities. For example, let's say the number generated is 67 and the user has 5 tries, this could be your program's output: This is a guessing...arrow_forward
- Please help me with these errors in java. Errors below public class Student { //student related variables //for reading the student information String studName; int studNum; String coursesTaken; float midtermMarks; float finalTermMarks; String teachComments; float finalAvgWthCreEar; //setters and getters methods to the above fields /** * @return the studName */ public String getStudName() { return studName; } /** * @return the studNum */ public int getStudNum() { return studNum; } /** * @return the coursesTaken */ public String getCoursesTaken() { return coursesTaken; } /** * @return the midtermMarks */ public float getMidtermMarks() { return midtermMarks; } /** * @return the finalTermMarks */ public float getFinalTermMarks() { return finalTermMarks; } /** * @return the teachComments */ public String getTeachComments() { return teachComments; } /** * @return the finalAvgWthCreEar */ public float...arrow_forwardRandom Numbers: Most computer programs do the same thing every time they run; programs like that are called deterministic. Usually, determinism is a good thing, since we expect the same calculation to yield the same result. But for some applications, we want the computer to be unpredictable. Games are an obvious example, but there are many others, like scientific simulations. We have already seen java.util.Random, which generates pseudorandom numbers. The method nextint takes an integer argument, n, and returns a random integer between 0 and n - 1. Assignment For this assignment you will write a program in java to simulate a guessing game. Your program will generate a random number in a certain range (let the user define the range) and ask the user to guess what number it is. Give the user a certain number of tries while you narrow down the possibilities. For example, let's say the number generated is 67 and the user has 5 tries, this could be your program's output: This is a guessing...arrow_forwardUnderstanding ifStatements Summary In this lab, you complete a prewritten Java program for a carpenter who creates personalized house signs. The program is supposed to compute the price of any sign a customer orders, based on the following facts: The charge for all signs is a minimum of 35ドル.00. The first five letters or numbers are included in the minimum charge; there is a 4ドル charge for each additional character. If the sign is made of oak, add 20ドル.00. No charge is added for pine. Black or white characters are included in the minimum charge; there is an additional 15ドル charge for gold-leaf lettering. Instructions 1. Ensure the file named HouseSign.java is open. 2. You need to declare variables for the following, and initialize them where specified: A variable for the cost of the sign initialized to 0.00 (charge). A variable for the number of characters initialized to 8 (numChars). A variable for the color of the characters initialized to "gold" (color). A variable for the...arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Text book imageComputer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONText book imageComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceText book imageNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Text book imageConcepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningText book imagePrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationText book imageSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY
Text book image
Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON
Text book image
Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science
Text book image
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning
Text book image
Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning
Text book image
Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education
Text book image
Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY