Translate infix mathematical expression into postfix express

Assignment Help Basic Computer Science
Reference no: EM13159273

Write a program in java to translate infix mathematical expression into postfix expression and a program to evaluate the posfix expression. There should be three separate progams. use stack data abstraction and class implementation. The program has three verions. The first version uses array implementation, the second version uses linked lsit, and the third one uses double linked list stack implementation in the abstraction. First read and output data using std. then use the files. Use the stds only for the first version.

Please explain how you did each version and write lots of comments (to expalin what you do in the code). The expression can have the following; +,-,*,/,(,), and the program has to beable to do more than just single digits convertion and evaluation.

 

 

Reference no: EM13159273

Questions Cloud

What is the rate of consumption of s2o8^2- : If 2 x 10-4 moles of S2O8 ^2- in 50 mL of solution is consumed in 188 seconds, what is the rate of consumption of S2O8^2-?
Which animals have three chambers in the heart? : Which animals have three chambers in the heart?
How has the recent increase in the price of a barrel of oil : How has the recent increase in the price of a barrel of oil affected the prices of bicycles, cars and airplane fares?
What fraction of employees cost more for dental expenses : Estimate the percent that did not have any dental expense. What was the cost for the 10 percent of employees who incurred the highest dental expense?
Translate infix mathematical expression into postfix express : Write a program in java to translate infix mathematical expression into postfix expression and a program to evaluate the posfix expression. There should be three separate progams. use stack data abstraction and class implementation.
Concept of economic specialization : Explain the concept of economic specialization and the important reasons why a country would need to utilize this unique concept?
What are the main components of the broken windows theory : What are the main components of the broken windows theory? Explain. ?How do you think the broken windows theory served as an introduction to community-oriented policing? Explain. ?Do you think that this theory is still significant to community-orient..
Which of the following is not true of spermatogenesis : Which of the following is not true of spermatogenesis?
The drink machine should have a supply : When the applet starts, the drink machine should have a supply of 20 of each of the drinks. The applet should have a text field where the user can enter the amount of money he or she is giving the machine. The user can then click on a button to selec..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Approach appropriate for company forefront of technology

However, adopting a secondary approach where others adopt early and a firm learns from their mistakes is often a viable strategy. When is each approach most appropriate and why?

  In-house development and packaged solution for r-way system

Should R/Way's new system be based on file-server or client/server architecture? Why? What would be the pros and cons of selecting in-house development versus a packaged solution for the R/Way system?

  Write guide for the organization

Write a 2-3 page report recommending style manual and/or technical/legal writing guide for the organization to use and describe the reasons for your recommendations.

  Design patterns in today-s development environments

In System Analysis and Design: Design Patterns - How widely used are design patterns in today's development environments?

  Project in designated area of coastal zone is significant

Have you contacted State Historic Preservation Office (SHPO) to see if the project is in designated area of coastal zone which is significant to the study, understanding, or illustration of national, state.

  Determine companies which specialize in computer forensics

What needs clarified? it's plainly stated use google to find 3 companies which specialize in computer forensics of those 3 companies write 2 or 3 paragraphs comparing what each company does.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Relative risk comes form inside the organisation

Write a report on relative risk that comes form inside organisation as opposed to risk which comes from external sources.

  Explain what occurs if instruction going through pipeline-lb

Consider processor with six stages: IF(instruction fetch), DA(instruction decode), CO(calculate operands addresses), FO(fetch operands), EX(instruction execution), WB(write results). Explain briefly what occurs in each stage when instruction going ..

  What rc key value leave state vector during initialization

What RC4 key value will leave state vector, S unchanged during initialization? That is after the initial permutation of S, the entries of S will be equal to the values.

  Explain one technological device

Explain one technological device in 350 to 700 words. Include the following:When did it come (or will it potentially come) into existence? What scientific or technological reasoning explains how this potential will be (or can be) be reached in t..

  Computer will ever be developed which can think like human

Do you think a computer will ever be developed which can think like human? Write down the ethical implications of creating such a computer?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd