Show the postfix expressions

Assignment Help Data Structure & Algorithms
Reference no: EM13192086

An infix expression is one in which operators are located between their operands. This is how we are accustomed to writing expressions in standard mathematical notation. In postfix notation, the operator immediately follows its operands. Examples of infix expressions are:

One advantage of postfix is that unlike infix, no parentheses are necessary. Another advantage is that postfix expressions are easily evaluated using a stack.

This project will require you to create a Java program that will take an input file consisting of several lines of infix notation mathematical calculations, convert them to postfix notation (using the first algorithm in Part1), and evaluate them (using the second algorithm in Part2). The results of the calculations will then be printed to an output file. This project will build on your array and linked list implementations, using them to create your own implementations of stacks and queues for each of the algorithms.

This part will use both a stack and queue in order to convert expressions from infix to postfix notation.

The stack and queue will be implemented by you, using your linked list implementation from labs.

For this part, you will need to maintain two queues and one stack:

- A stack for conversion ‎ Infix to Postfix ‎ (Using Array Implementation)
- A queue for accumulation the digits of the operand (NumQueue) (Using Array Implementation)
- A queue to store the Postfix notation (PostQueue) (Using Linked list Implementation)

Each value will be read from the input line, and dealt with in the following manner:

1. When an operand is read, add it into( NumQueue)

2. When an operator is read

- Convert (NumQueue) into a single floating number, add it into(PostQueue) immediately

- Pop the stack elements and add them to the queue (PostQueue) one by one until the top of the stack has an element of lower precedence

- Then push it into stack.

- When a close-parenthesis [‘)'] is found, pop all the stack elements and add them to the queue (PostQueue) one by one until an open-parenthesis [‘(‘] is found

- When we reach the end of input, pop everything that remains on the stack and add to the queue (PostQueue) one by one.

- Notes : [‘)'] has the lowest precedence when in the stack but has the highest precedence when in the input

When finished converting one statement into a queue in postfix notation, pass the queue (PostQueue) to the next step - the postfix expression evaluator.

Reference no: EM13192086

Questions Cloud

Illustrate this in a vector diagram : A ship travels 200km west from port and then 240km due south before it is disabled. Illustrate this in a vector diagram. Usa trigonometry to find the course that a rescue ship must take from port in order to reach the disabled ship.
Depict the structure of the product that is formed : Draw the structure of the product that is formed when the compound shown below undergoes an elimination reaction with NaOCH3
Find the surface area of the pool : the length of a rectangular pool is 6 meters less than twice the width. if the pool's perimeter is 126 meters, find the surface area of the pool.
What is the variable cost of producing 40 units of output : (c) What is the variable cost of producing 40 units of output (d) How many units of the variable input should be used to maximize profits (e) What are your maximum profits (f) Over what range of variable input usage do increasing marginal returns exi..
Show the postfix expressions : An infix expression is one in which operators are located between their operands - Pop the stack elements and add them to the queue (PostQueue) one by one until the top of the stack has an element of lower precedence
Find the force against the end : A trough full of water has vertical ends in the shape of an isosceles triangle 5m across the top and 2m deep. Find the force against the end.
Compute the concentration in the units of molality : A solution is made witmlh 20.2ml of CH3OH ( density= 0.782g/ml), dissolved in 100.ml of water (density = 1.00 g/ml). Calculate the concentration in the units of:
How much will the fencing cost : A fence is being built to enclose a backyard. The yard is 150 ft wide by 325 ft long. The back of the house will act as on side of the fence. Fencing sells for 13.00 dollars per ft. How much will the fencing cost?
Calculate point price elasticity of demand for solis product : (b) What is the maximum total revenue per year that Solis can obtain from sales of its product (Give the exact dollar amount and show how you determined it.) (c) Calculate the point price elasticity of demand for Solis product when Q=50000. Is the..

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Model of online music sharing

Since Napster is going out of business, you have decided to begin your own on line music sharing site. You will give individual music documents at your site.

  Implement algorithm for evaluation of arithmetic expression

Implement the following algorithm for the evaluation of arithmetic expressions. Each operator has a precedence. The + and - operators have the lowest precedence.

  Created a linked list class

created a linkedlist class

  Write algorithm segment for locating nth successor of item

Write an algorithm or code segment for locating the nth successor of an item in a circlar linked list (the nth item that follows the given item in the list).

  Question about designing a database

As we start designing a database for implementation should we use the latest and greatest technology? Does the user need a flat-file or object-oriented database?

  Draw a red-black tree

Draw a red-black tree for the following values inserted in this order. Illustrate each operation that occurs: w k o s y t p r

  Analyze the time-space complexity of algorithms

How a vEB tree can be used to support these three operations and analyze the time/space complexity of your algorithms.

  Threat model to describe risk of attack vector

Construct a simple threat model that describes the risk this represents: attacker(s), attack vector, vulnerability, assets, and likelihood of occurrence, likely impact, and plausible mitigations.

  Determine complete list of nodes which ancestor

Let the following tree: tree a. Determine the children of Q? b. What is the complete list of nodes which have D as ancestor? c. Determine the height of this tree (as height is defined in text)?

  Modify bellman ford algorithm to find negative weight cycle

Demonstrate how to modify the Bellman Ford algorithm to find and print a negative weight cycle in a weighted directed graph G if one exists.

  Write adjacency-list representation for complete binary tree

Provide the adjacency-list representation for complete binary tree on 7 vertices. Provide the equivalent adjacency - matrix representation. Suppose that vertices are numbered from 1 to 7 as in binary heap?

  What is the probability

Suppose that the probability than an incoming email is a spam is p(S), that the probability that the word "w" occurs in the subject line of the spam is p(w), and that q(w) is the probability that the word "w" occurs in the subject line of an email th..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd