国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看

合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務(wù)合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務(wù)合肥法律

CPT204代寫(xiě)、代做Java設(shè)計(jì)程序

時(shí)間:2024-05-11  來(lái)源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯(cuò)



CPT204-2**4 Coursework 3 Task Sheet
Overview
Coursework 3 (CW3) is the final coursework component of the course this semester.
It contributes to 40% of your final marks.
You will form a team of two with your friend and apply object-oriented principles and
advanced data structures you have learned throughout the semester to create
intelligent game-playing characters. You will be tasked with writing a report and
creating a video presentation to demonstrate your problem-solving and testing skills,
as well as your understanding of object-oriented concepts.
You are required to submit the following files: Java codes in a ZIP file, a Word and PDF
report, an MP4 video, and a PowerPoint (PPT) presentation used in the video.
Timeline
Week 10, Friday, CW3 is released
May 3, 2024, 13:00 CST (This task sheet, skeleton codes, sample test cases)
Week 13, Sunday, CW3 Java source code files, video files (MP4, PPT),
May 26, 2024, 23:59 CST and report files (Word, PDF) are due
Late Submission Period 5% lateness penalty per-day
Max 5 days (Monday-Friday)
Reading Week, Friday, End of Late Submission Period
May 31, 2024, 23:59 CST No submissions are accepted thereafter
Outline
The remainder of the task sheet will outline the game rules, provide detailed
specifications of the tasks, and specify the deliverables you are required to submit.
Additionally, there is a marking rubric provided to guide you in achieving the best
possible outcome.
2
Coursework 3 – Intelligent Rogue Chars
Intelligent game-playing characters have been used in the game industry to harness
the power of graph algorithms to navigate complex virtual environments, strategically
analyzing interconnected nodes and edges to optimize their movements and decisionmaking processes. By leveraging graph traversal techniques such as breadth-first
search (BFS) and depth-first search (DFS), these characters can efficiently explore vast
game worlds, identify optimal paths, and anticipate opponent movements.
In this coursework, you will use graph algorithms you have learned in Lecture 10 to
develop an effective approach to track and intercept a moving opponent in a
(simplified version of the) 2D Game called Rogue. You will also create a viable plan to
evade interception from said opponent.
Rogue
The game Rogue was created by Michael Toy and Glen Wichman, who, while
experimenting with Ken Arnold's C library named curses in the late 1970s, designed a
graphical adventure game shown below.
In 1984, CMU graduate students developed Rog-o-matic, an automated Rogue player,
which became the highest-rated player. Rog-o-matic's algorithm prioritized avoiding
monster encounters to facilitate health regeneration, posing an intriguing graph
search challenge, which inspired this coursework.
3
Rules of the Game
The game of Rogue is played on an N-by-N grid that represents the dungeon. The two
players are a rogue and a monster. The rogue is represented with the character @.
The monster is represented by an uppercase letter A through Z.
The monster and rogue take turns making moves, with the monster going first. If the
monster intercepts the rogue (i.e., occupies the same site), then the monster kills the
rogue, and the game ends. In each turn, a player either remains stationary or moves
to an adjacent site.
There are three types of sites:
1. Rooms represented by .
2. Corridors represented by +
3. Walls represented by (a space)
The movement rules are:
 If a player is in a room site, then they can move to an adjacent room site in one
of the 8 compass directions (N, E, S, W, NW, NE, SW, SE) or a corridor site in
one of the 4 directions (N, E, S, W).
 If a player is in a corridor site, then they can move to an adjacent room or
corridor site in one of the 4 directions (N, E, S, W).
 The walls are impenetrable.
Consider the following two dungeons.

In the first dungeon above, the rogue can avoid the monster I indefinitely by moving
N and running around the corridor.
In the second dungeon, the monster A can use the diagonal moves to trap the rogue
in a corner.
4
Monster's Strategy
The monster is tenacious and its sole mission is to chase and intercept the rogue. A
natural strategy for the monster is to always take one step toward the rogue. In terms
of the underlying graph, this means that the monster should compute a shortest path
between itself and the rogue, and take one step along such a path. This strategy is not
necessarily optimal, since there may be ties, and taking a step along one shortest path
may be better than taking a step along another shortest path.
Consider the following two dungeons.

In the first dungeon above, monster B's only optimal strategy is to take a step in the
NE direction. Moving N or E would enable the rogue to make a mad dash for the
opposite corridor entrance.
In the second dungeon, the monster C can guarantee to intercept the rogue by first
moving E.
Your first task is to implement an effective strategy for the monster. To implement
the monster's strategy, you may want to consider using BFS.
5
Rogue's Strategy
The rogue's goal is to avoid the monster for as long as possible. A naive strategy is to
move to an adjacent site that is as far as possible from the monster's current location.
That strategy is not necessarily optimal.
Consider the following two dungeons.

It is easy to see that that strategy may lead to a quick and unnecessary death, as in
the second dungeon above where the rogue can avoid the monster J by moving SE.
Another potentially deadly strategy would be to go to the nearest corridor. To avoid
the monster F in the first dungeon, the rogue must move towards a northern corridor
instead.
A more effective strategy is to identify a sequence of adjacent corridor and room sites
which the rogue can run around in circles forever, thereby avoiding the monster
indefinitely. This involves identifying and following certain cycles in the underlying
graph. Of course, such cycles may not always exist, in which case your goal is to survive
for as long as possible. To implement the rogue's strategy, you may want to use both
BFS and DFS.
6
Implementation and Specification
In this section, you will discover the expected details regarding the implementation
and specifications of the Rogue game, which you are required to adhere to.
Dungeon File Input Format
The input dungeon consists of an integer N, followed by N rows of 2N characters
each. For example:

A room is a contiguous rectangular block of room sites. Rooms may not connect
directly with each other. That is, any path from one room to another will use at least
one corridor site.
There will be exactly one monster and one rogue, and each will start in some room
site.
You will be given 18 dungeon files to test your code with.
You may create your own dungeon files (explain the novelty in your report/video!).
In the rubric subsection below, you are required to show the correctness and the
performance of your rogue and monster on at least 5 non-trivial dungeons in total.
Game of Rogue Specification
We will provide some files that are already completed as the game infrastructure.
There are two files to complete: Monster.java and Rogue.java, for which some
skeleton code is provided.
The given files are only for a quick start: you should modify the files so your program
exhibits more object-oriented programming principles!
7
The following is the interface of Monster.java :
public Monster(Game g) // create a new monster playing game g
public Site move() // return adjacent site to which it moves
And the analogous program Rogue.java:
public Rogue(Game g) // create a new rogue playing a game g
public Site move() // return adjacent site to which it moves
The move() method should implement the move of the monster/rogue as specified
by the strategy that you have created.
Game.java reads in the dungeon from standard input and does the game playing and
refereeing. It has three primary interface functions that will be needed by
Rogue.java and Monster.java.
public Site getMonsterSite() // return site occupied by monster
public Site getRogueSite() // return site occupied by rogue
public Dungeon getDungeon() // return the dungeon
Dungeon.java represents an N-by-N dungeon.
public boolean isLegalMove(Site v, Site w) // is moving from site v
 to w legal?
public boolean isCorridor(Site v) // is site v a corridor site?
public boolean isRoom(Site v) // is site v a room site?
public int size() // return N = dim of dungeon
In.java is a library from Algorithms optional textbook to read in data from various
sources. You will have to create your own input library for your CW3 program.
Site.java is a data type that represents a location site in the N-by-N dungeon.
public Site(int i, int j) // create new Site for location (i, j)
public int i() // get i coordinate
public int j() // get j coordinate
public int manhattan(Site w) // return Manhattan distance
 from invoking site to w
public boolean equals(Site w) // is invoking site equal to w?
If you have two sites located at coordinates (i1, j1) and (i2, j2), then the Manhattan
distance between the two sites is |i1 - i2| + |j1 - j2|. This represents the length you
have to travel, assuming you can only move horizontally and vertically.
You should modify the files or create other Java files, so your final program exhibits
more object-oriented programming principles. Finally, you must only use libraries
that are covered in CPT204 (including in Liang textbook). Violating this by using
libraries that are not covered in CPT204 will result in an automatic total mark of 0.
8
Deliverables
In this section, you will find the details regarding the files that you are required to
submit, and the report and video specifications.
Submission Requirements
You are required to submit:
1) The Rogue.java and Monster.java source code Java files, as well as any other
auxiliary Java files and the dungeon filesthat you selected/created in your project,
altogether combined in a ZIP file.
2) Your report, in both Word and PDF format (2 separate files).
3) The PPT of your video presentation.
4) The video recording of your presentation in a MP4 file.
The submission deadline is Sunday, May 26, 2024, at 23:59 CST.
You may submit late, with a maximum grace period of 5 days, during which a 5%
lateness penalty will be applied for each late day. Therefore, after Friday, May 31,
2024, at 23:59 CST, no submissions will be accepted.
Report Requirements
Write a report satisfying the following criteria:
1. The purpose of your report is to explain your code, algorithms, algorithm
analysis, and OOP elements in well-detailed manner.
2. Your report must consist of exactly 6 Chapters:
Chapter 1 – Object-oriented Principles
 (you may add subchapters here)
Chapter 2 – Monster Algorithm
Chapter 3 – Rogue Algorithm
Chapter 4 – Monster Algorithm Analysis
Chapter 5 – Rogue Algorithm Analysis
Chapter 6 – My Java Code
For more details on the contents of each section, you should refer to the
Rubric on page 11.
9
3. You must include all your code in Chapter 6 as a text, copy paste each source
file content into the report.
You must not use screenshots in Chapter 6.
Using screenshot in Chapter 6 will result in an automatic total marks of 0.
(you may use screenshot in other chapters)
4. Write your report using Word with the following setting:
Font Calibri, Font Size 12, Line Spacing 1.5, Normal Margins.
The page limit is a maximum of 20 pages, not including Chapter 6.
5. Consider using images and diagrams to improve the readability of your
report. Please refer to the rubric in the following subsection.
6. Save your Word document as a PDF.
Submit to Learning Mall Assignment Box both the Word document file and
the PDF file.
Video Requirements
Create a PPT presentation and video explanation using the PPT satisfying the following
requirements:
1. The purpose of your video presentation is to explain your code, algorithms,
and OOP design in a succinct manner.
2. You can use any template for your PPT, not limited to the XJLTU standard
theme.
3. The length of the video must be less than or equal to 8 minutes.
Violating the video length requirements will result in a total marks of 0 for
your coursework mark.
4. Your video must display your face and include your audio for the purpose of
authenticity verification.
Do not use English audio translation software to narrate your video.
Violating the requirement to show your face and use your voice will result in
a total marks of 0 for your coursework.
5. The clarity of the presentation will be graded. Please refer to the rubric in the
next subsection.
10
6. Submit to Learning Mall Assignment Box both:
a. The video file in MP4 format,
b. The PPT file you used to create a video.
Equal Contribution Requirements
In adherence to academic integrity and fairness, it is imperative that both team
members contribute equally to the completion of the coursework:
1. Each member should actively participate in the development process,
ensuring a balanced distribution of workload and responsibilities.
For example, one team member may mostly undertake the coding of the
rogue character while the other focuses on the monster character, and they
may divide tasks such as testing, documentation, report writing, and
presentation preparation equitably.
2. Both team members must show their faces in the video, one at a time.
3. Should there be any concerns regarding unequal contributions, team
members are encouraged to notify the module leader promptly to facilitate
appropriate assessment and marking decisions, to ensure transparency and
accountability.
11
Rubric
Criteria Description Marks
Object-Oriented
Principles
Evaluation of the effective use of object-oriented
principles (encapsulation, inheritance, polymorphism,
abstraction) in the overall Java program solution.
25
Code Clarity and
Readability
Assessment of code clarity, organization, and readability.
Includes appropriate variable naming, comments,
documentation, and code structure.
5
Monster and Rogue
Demo
Evaluation of the correctness and optimality/suboptimality of your Monster and Rogue algorithms. Write
in report, and show demo and argue in video on at least 5
non-trivial dungeon files in total for both Monster and
Rogue characters. Justify your strategies, explaining their
strengths and also weaknesses.
20
Monster Algorithm
Analysis
Examination of how graphs algorithms are implemented
in your Monster Algorithm, and their efficiency analysis.
15
Rogue Algorithm
Analysis
Examination of how graphs algorithms are implemented
in your Rogue Algorithm, and their efficiency analysis.
15
Report Clarity,
Structure and
Presentation
Assessment of the report's clarity, structure, organization,
visual elements, and overall quality of writing. Includes
language use and presentation of data structure usages.
10
Video & PPT Clarity,
Delivery and
Engagement
Assessment of the video presentation's delivery, clarity
and engagement. Includes speaking clarity, engagement
with the audience, and visual elements in demonstrating
the execution of the software.
10
Total Marks 100
Show that you satisfy all the rubric components in both your report and video!
Please note again that using libraries not covered in CPT204; using screenshots or not
including all your codes in Chapter 6 of the report; or submitting a video of length longer
than 8 minutes or without your face/voice will result in an automatic total marks of 0.
12
Acknowledgement
This coursework is adopted from an assignment from the Algorithms (an optional
Textbook of this course) with thanks to Robert Sedgewick, Kevin Wayne, and Andrew
Appel.
Academic Integrity
1. Plagiarism, e.g. copying materials from other sources without proper
acknowledgement, copying, or collusion are serious academic offences.
Plagiarism, copying, collusion, using or consulting unauthorized materials
(including code sharing forum, and generative AI tools including, but not limited
to, ChatGPT) will not be tolerated and will be dealt with in accordance with the
University Code of Practice on Academic Integrity.
2. In some cases, individual students may be invited to explain parts of their code
in person, and if they fail to demonstrate an understanding of the code, no
credit will be given for that part.
3. In more severe cases, the suspected violation will be directly reported to the
Exam Officer for further investigation and, if confirmed, will be permanently
recorded in the offender student's official academic transcript.
Please read: https://academicpolicy.xjtlu.edu.cn/article.php?id=98
Question Forum
If you have questions regarding Coursework 3, please post your questions in CW3
請(qǐng)加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp






 

掃一掃在手機(jī)打開(kāi)當(dāng)前頁(yè)
  • 上一篇:代寫(xiě)COMP282、代做C++設(shè)計(jì)程序
  • 下一篇:CS1083代做、代寫(xiě)Java編程語(yǔ)言
  • 無(wú)相關(guān)信息
    合肥生活資訊

    合肥圖文信息
    流體仿真外包多少錢(qián)_專業(yè)CFD分析代做_友商科技CAE仿真
    流體仿真外包多少錢(qián)_專業(yè)CFD分析代做_友商科
    CAE仿真分析代做公司 CFD流體仿真服務(wù) 管路流場(chǎng)仿真外包
    CAE仿真分析代做公司 CFD流體仿真服務(wù) 管路
    流體CFD仿真分析_代做咨詢服務(wù)_Fluent 仿真技術(shù)服務(wù)
    流體CFD仿真分析_代做咨詢服務(wù)_Fluent 仿真
    結(jié)構(gòu)仿真分析服務(wù)_CAE代做咨詢外包_剛強(qiáng)度疲勞振動(dòng)
    結(jié)構(gòu)仿真分析服務(wù)_CAE代做咨詢外包_剛強(qiáng)度疲
    流體cfd仿真分析服務(wù) 7類仿真分析代做服務(wù)40個(gè)行業(yè)
    流體cfd仿真分析服務(wù) 7類仿真分析代做服務(wù)4
    超全面的拼多多電商運(yùn)營(yíng)技巧,多多開(kāi)團(tuán)助手,多多出評(píng)軟件徽y1698861
    超全面的拼多多電商運(yùn)營(yíng)技巧,多多開(kāi)團(tuán)助手
    CAE有限元仿真分析團(tuán)隊(duì),2026仿真代做咨詢服務(wù)平臺(tái)
    CAE有限元仿真分析團(tuán)隊(duì),2026仿真代做咨詢服
    釘釘簽到打卡位置修改神器,2026怎么修改定位在范圍內(nèi)
    釘釘簽到打卡位置修改神器,2026怎么修改定
  • 短信驗(yàn)證碼 寵物飼養(yǎng) 十大衛(wèi)浴品牌排行 suno 豆包網(wǎng)頁(yè)版入口 wps 目錄網(wǎng) 排行網(wǎng)

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
    ICP備06013414號(hào)-3 公安備 42010502001045

    国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看
    欧美成人午夜剧场免费观看| 日韩一区二区高清视频| 国产美女99p| 国内精品久久久久久| 日韩av一二三四区| 日韩免费在线观看视频| 日韩女优中文字幕| 欧美日韩系列| 激情视频在线观看一区二区三区| 欧美牲交a欧美牲交aⅴ免费下载| 日本免费在线精品| 热久久美女精品天天吊色| 日韩精品综合在线| 狠狠色狠狠色综合人人| 国产在线一区二区三区| 狠狠爱一区二区三区| 国产综合 伊人色| 国产精品一区二区久久精品| 99视频精品免费| 成人欧美一区二区三区黑人免费| 97色伦亚洲国产| 久久久中精品2020中文| 久久96国产精品久久99软件| 久久精品视频网站| 久久亚洲成人精品| 亚洲一区国产精品| 日韩视频免费在线播放| 欧美日韩一区二区三区在线观看免 | 青青草精品视频在线| 欧美日韩在线观看一区| 国产男女激情视频| 国产精品com| 国产精品久久久久久久美男| 一区二区视频国产| 日本精品久久中文字幕佐佐木| 激情一区二区三区| 99久久国产宗和精品1上映 | 亚洲精品一区二区三区樱花| 日韩资源av在线| 黄黄视频在线观看| 91精品国产综合久久久久久久久| 国产成人亚洲欧美| 不卡伊人av在线播放| 亚洲 中文字幕 日韩 无码| 欧美一区免费视频| 99久re热视频精品98| 久久精品2019中文字幕| 亚洲尤物视频网| 男女猛烈激情xx00免费视频| 久久久在线视频| 精品久久久久久亚洲| 日本欧美色综合网站免费| 免费毛片一区二区三区久久久| 91极品视频在线| 久久中文字幕在线视频| 日韩视频在线视频| 91久久精品在线| 精品毛片久久久久久| 日韩精品一区二区三区四| 超碰成人在线免费观看| 国产精品日本一区二区| 日本网站免费在线观看| av一区二区在线看| 欧美激情精品久久久久久蜜臀| 欧美性受xxxx黑人猛交88| 91精品91久久久久久| 九色成人免费视频| 欧美久久综合性欧美| 久久这里精品国产99丫e6| 欧美精品www| 国精产品一区一区三区视频| 国产精品视频专区| 欧美亚洲另类制服自拍| 国产成人av影视| 三区精品视频观看| 久久综合九色综合网站| 亚洲第一综合网站| 99视频日韩| 亚洲天堂第一区| 国产精品一区专区欧美日韩| 精品国产一区二区三区麻豆小说| 欧美视频观看一区| 久久99精品久久久久久久久久| 午夜精品一区二区三区在线观看| 97碰在线观看| 亚洲国产欧美一区二区三区不卡 | 欧美成人一区二区三区电影| 精品欧美日韩| 日韩在线视频观看| 欧美影院在线播放| 久久精品男人天堂| 日韩免费电影一区二区三区| 深夜福利日韩在线看| 青青在线视频免费| 久久精品人人做人人爽电影| 熟女少妇在线视频播放| 久久久久久99| 热久久精品国产| 国产精品日韩欧美大师| 蜜桃成人在线| 欧美激情小视频| 99精品免费在线观看| 亚洲mm色国产网站| 国产二级片在线观看| 日韩视频精品| 国产精品免费一区二区| 国产欧美日韩视频一区二区三区| 又粗又黑又大的吊av| 久久久免费观看| 日本国产中文字幕| 久久精品视频免费播放| 国产日韩一区二区三区| 亚洲综合五月天| 国产爆乳无码一区二区麻豆| 欧美日韩精品不卡| 欧美成人精品一区二区| 国产精品99久久久久久久| 日韩精品另类天天更新| 国产精品久久精品国产| av网站在线观看不卡| 午夜精品亚洲一区二区三区嫩草| 久久国产精品 国产精品| 欧美视频在线观看网站| 欧美日本亚洲视频| 久久久免费精品| 欧美国产一区二区在线| 欧美成年人视频网站| 91精品中文在线| 欧美精品一区二区三区免费播放| 九九精品在线视频| 久久人人爽国产| 国产在线一区二区三区欧美| 亚洲一区二区三区精品在线观看| 日韩在线国产精品| 不卡中文字幕在线| 欧美久久久久久一卡四| 亚洲一区二区三区四区视频| 久久精品小视频| 91精品国产91久久久久久| 欧美精品一区二区三区在线看午夜| 精品国产一区二区三区麻豆小说 | 国产最新免费视频| 天堂精品视频| 久99久在线视频| 日韩在线观看精品| 99在线影院| 韩国福利视频一区| 日本一区高清不卡| 在线观看日本一区| 久久中文字幕视频| 久久精品xxx| 国产精品一区二区三区免费| 欧美性大战久久久久| 午夜肉伦伦影院| 久久99久久99精品中文字幕| 国产精品视频自拍| 久久99精品久久久久久久青青日本| 高清欧美性猛交xxxx| 黄色大片在线免费看| 日本久久久久久久久久久| 亚洲最新免费视频| 美女av一区二区| 国产精品久久成人免费观看| 视频在线观看99| 国产成人avxxxxx在线看| 成人免费91在线看| 国产女主播av| 国产日韩中文在线| 黄色a级片免费看| 欧美成人精品欧美一级乱| 日韩欧美黄色大片| 日日夜夜精品网站| 亚洲精品欧洲精品| 亚洲一区二区在线播放| 亚洲综合精品伊人久久| 宅男一区二区三区| 欧美极品在线播放| 中文字幕人成一区| 最新国产精品久久| 尤物av无码色av无码| 精品国产乱码一区二区三区四区| 国产精品久久久影院| 久久久精品电影| 精品国产一区二区在线| 日韩在线精品视频| 久久福利电影| 久久久久久久爱| 国产成人精品在线视频| 深夜福利日韩在线看| 久久久国产精品视频| 久久综合伊人77777尤物| 久久精品成人动漫| 国产精品成人av性教育| 九九精品在线观看| 亚洲综合欧美日韩| 日本中文字幕成人| 日本一级淫片演员| 欧美久久久久久久| 国产视频观看一区| www.av中文字幕|