Assignment title: Information


COMP20003 Algorithms and Data Structures Second (Spring) Semester 2016 [Assignment 1] YELP Database as a Binary Search Tree Handed out: Friday, 26 of August Due: 12:00 Noon, Monday, 12 of September Purpose The purpose of this assignment is for you to: • Increase your proficiency in C programming, your dexterity with dynamic memory allocation and your understanding of linked data structures, through programming a dictionary. • Increase your understanding of how computational complexity can affect the performance of an algorithm by conducting orderly experiments with your program and comparing the results of your experimentation with theory. • Increase your proficiency in using UNIX utilities. Background A dictionary is an abstract data type that stores and supports lookup of key, value pairs. For example, in a telephone directory, the (string) key is a person or company name, and the value is the phone number. In a student record lookup, the key would be a student ID number and the value would be a complex structure containing all the other information about the student. A dictionary can be implemented in C using a number of underlying data structures. Any implementation must support the operations: makedict a new dictionary; insert a new item (key, value pair) into a dictionary; search for a key in the dictionary, and return the associated value. Most dictionaries will also support the operation delete an item. Your task In this assignment, you will create a simplified UNIX yelp.com (local business directory) as a concrete instance of a dictionary, and will use it to look up information about a specific business name, such as full address or opening times. There are two stages in this project. In each stage you will code a dictionary in the C programming language. A binary search tree will be the underlying data structure for both stages. In this assignment the search keys are not guaranteed to be unique. In this assignment we use variants of the binary search tree designed to handle duplicates, i.e. by either dividing nodes using <= >, or by using < > and a linked list for items with same key. You will use a Makefile to direct the compilation of two separate executable programs, one for Stage 1 and one for Stage 2, each of which uses a different variant of the binary search tree. In both stages of the assignment, you will insert records into the dictionary from a file. You will then look up and output the records (business) contained by the dictionary, counting and outputting the number of key comparisons used in the search. 1You will report on the number of key comparisons used for search, compare the number of key comparisons used by each stage, and analyse what would have been expected theoretically. The report should cover each file used to initialize the dictionary. You are not required to implement the delete functionality. Stage 1 (7 marks) In Stage 1 of this assignment, your Makefile will direct the compilation to produce an executable program called yelp1. The program yelp1 takes two command line arguments: the first argument is the name of the data file used to build the dictionary; the second argument is the name of the output file, containing the data located in the searches. The file consists of an unspecified number of records, one per line, where the format of each record is: The field is an alphabetic string of varying length, containing the name of the business or the user. You may assume that this field contains no more than 64 characters. The field is a string containing all the data collected about the business or the user. Although the average size of this field is around 430 characters, the maximum size of this field can be 1,465 characters. Each field is separated by a semicolon ",". It is a standard csv format where the delimiter used is a comma. The dictionary key consists of the field. The is the information sought during lookup. For the purposes of this assignment, you may assume that the input data is well-formatted, that the input file is not empty, and that the maximum length of an input record is 1,465 characters. This number could help you fixing a reading buffer size. In this first stage of the assignment, you will: • Construct a binary search tree to store the information contained in the file specified in the command line argument. Each record should be stored in a separate Node. • Search the binary search tree for records, based on their keys. The keys are read in from stdin, i.e. from the screen. For testing, it is often convenient to create a file of keys to be searched, one per line, and redirect the input from this file. Use the UNIX operator < for redirecting input from a file. • Examples of use: – yelp1 datafile outputfile then type in keys; or – yelp1 datafile outputfile < keyfile • Your program will look up each key and output the information (the data found) to the output file specified by the second command line parameter. If the key is not found in the tree, you must output the word NOTFOUND. The number of key comparisons performed during both successful and unsuccessful lookups have to be written to stdout. • Remember that the entries in the file do not necessarily have unique keys. Your search must locate all keys matching the search key, and output all the data found. In Stage 1 of the assignment you will locate the duplicates by continuing your search until you reach a leaf node, regardless of whether or not you have already found a match or matches. 2• Example output: – output file (information): Mr Hoagie −− > city: Dravosburg || review count: 4 || name: Mr Hoagie || type: business || full address: 4734 Lebanon Church Rd Dravosburg PA 15034 || hours: Tuesday close 21 00 open 11 00 Friday close 21 00 open 11 00 Monday close 21 00 open 11 00 Wednesday close 21 00 open 11 00 Thursday close 21 00 open 11 00 || state: PA || longitude: 79 9007057 || stars: 4 5 || latitude: 40 3543266 || attributes: Take out True Drive Thru False Outdoor Seating False Caters False Noise Level average Parking garage False street False validated False lot False valet False Delivery False Attire casual Has TV False Price Range 1 Good For dessert False latenight False lunch False dinner False breakfast False brunch False Takes Reservations False Ambience romantic False intimate False classy False hipster False divey False touristy False trendy False upscale False casual False Waiter Service False Accepts Credit Cards True Good for Kids True Good For Groups True Alcohol none || open: True || categories: Fast Food Restaurants || Yishan −− > yelping since: 2004 10 || votes: funny 44 useful 48 cool 19 || name: Yishan || type: user || compliments: cute 2 funny 1 plain 1 writer 1 note 1 cool 1 more 1 || fans: 8 || average stars: 3 82 || review count: 45 || Nir Lipo Hotel −− > NOTFOUND – stdout (comparisons): Mr Hoagie −− > 423 Spicy Tang −− > 230 Nir Lipo Hotel −− > 401 Note that the key is output to both the file and to stdout, for identification purposes. Also note that the number of comparisons is only output at the end of the search, so there is only one number for key comparisons per key, even when multiple records have been located for that key. The format need not be exactly as above. Variations in whitespace/tabs are permitted. Stage 2 (2 marks) In Stage 2, you will code a dictionary where all the duplicate keys in the dictionary are returned, as previously, and additionally where the search is more efficient than in Stage 1. Input and output are as for Stage 1, with the information or NOTFOUND written to a file and the number of comparisons made during the search written to stdout. In Stage 2, however, you will structure your tree so that once a key is found, all duplicate keys can be found without further key comparisons. Note that comparing a key to NULL is not a full (costly) key comparison, and is not counted as a key comparison in Stage 2 of this assignment when building the report. Experimentation (4 marks) You will run various files through your program to test its accuracy and also to examine the number of key comparisons used when searching different files. You will report on the key comparisons used 3by your Stage 1 dictionary yelp1 for various data inputs and the key comparisons used by your Stage 2 dictionary yelp2 for various data inputs too. You will compare these results with each other and, importantly with what you expected based on theory (big-O). Your experimentation should be systematic, varying the size and characteristics of the files you use (e.g. sorted, random, duplicates, etc.), and observing how the number of key comparisons varies. Repeating a test case with different keys and taking the average can be useful. Some useful UNIX commands for creating test files with different characteristics include sort, sort -R (man sort for more information on the -R option), and shuf. You can randomize your input data and pick the first x keys as the lookup keywords. If you use only keyboard input for searches, it is unlikely that you will be able to generate enough data to analyze your results. You should familiarize yourself with the powerful UNIX facilities for redirecting standard input (stdin) and standard output (stdout). You might also find it useful to familiarize yourself with UNIX pipes '|' and possibly also the UNIX program awk for processing structured output. For example, if you pipe your output into echo ''abc:def'' | awk -F ':' 'fprint $1g', you will output only the first column (abc). In the example, -F specifies the delimiter. Instead of using echo you can use cat filename.csv | awk -F ';' 'fprint $1g' which will print only the first column of the filename.csv file. You can build up a file of numbers of key comparisons using the shell append operator >>, e.x. your command >> file to append to. You will write up your findings and submit your results separately through the Turnitin system. You will compare your results with the two dictionary implementations (stage1 and stage2) and also compare these results to what you know about the theory of binary search trees. Tables and graphs are useful presentation methods. Select only informative data; more is not always better. You should present your findings clearly, in light of what you know about the data structures used in your programs and in light of their known computational complexity. You may find that your results are what you expected, based on theory. Alternatively, you may find your results do not agree with theory. In either case, you should state what you expected from the theory, and if there is a discrepancy you should suggest possible reasons. You might want to discuss space-time trade-offs, if this is appropriate to your code and data. You are not constrained to any particular structure in this report, but a useful way to present your findings might be: • Introduction: Summary of data structures and inputs. • Stage 1 and Stage 2: – Data (number of key comparisons) – Comparison of the two stages – Comparison with theory • Discussion Implementation Requirements The following implementation requirements must be adhered to: • You must code your dictionary in the C programming language. 4• You must code your dictionary in a modular way, so that your dictionary implementation could be used in another program without extensive rewriting or copying. This means that the dictionary operations are kept together in a separate .c file, with its own header (.h) file, separate from the main program. The main.c of stage1 can perfectly be the same main for stage2, in terms of dictionary operations. • Your code should be easily extensible to allow for multiple dictionaries. This means that the functions for insertion, search, and deletion take as arguments not only the item being inserted or a key for searching and deleting, but also a pointer to a particular dictionary, e.g. insert(dict, item). • In each stage, you must read the input file once only. • Your program should store strings in a space-efficient manner. If you are using malloc() to create the space for a string, remember to allow space for the final end of string 'n0' (NULL). • A Makefile is not provided for you. The Makefile should direct the compilation of two separate programs: yelp1 and yelp2. To use the Makefile, make sure is in the same directory of your code, and type make yelp1 to make the dictionary for Stage 1 and make yelp2 to make the dictionary for Stage 2. You must submit your makefile with your assignment. Hint: If you havent used make before, try it on simple programs first. If it doesnt work, read the error messages carefully. A common problem in compiling multifile executables is in the included header files. Note also that the whitespace before the command is a tab, and not multiple spaces. It is not a good idea to code your program as a single file and then try to break it down into multiple files. Start by using multiple files, with minimal content, and make sure they are communicating with each other before starting more serious coding. Data The data files are provided at /home/subjects/comp20003/assg1/datafiles/ which can be reached via connection to the engineering university server hosts nutmeg.eng.unimelb.edu.au or dimefox.eng.unimelb.edu.au. You can copy the datafiles using scp or sftp commands, e.x. scp your username@host:path to file local path or use sftp instead. The data format is, as specified above: No attempt has been made to remove or prevent duplicate keys to each original file. Similarly, no attempt has been made to seed the file with duplicate keys. Our script only formatted the data correctly making sure it complies with a csv standard specification, and that "," is only used as a delimiter. The file alternative x.csv files have suffered some transformations. Business Database contains roughly 80,000 records, and User Database contains 560,000. Exact figures are not given to discourage static memory allocation. Resources: Programming Style (2 Marks) Two locally-written papers containing useful guidelines on coding style and structure can be found on the LMS Resources ! Project Coding Guidelines, by Peter Schachte, and below and adapted version of the LMS Resources ! C Programming Style, written for Engineering Computation COMP20005 by Aidan Nagorcka-Smith. Be aware that your programming style will be judged with 2 marks. 51 /** *********************** 2 * C Programming S t y l e fo r Engineering Computation 3 * Created by Aidan Nagorcka−Smith ( aidann@student . unimelb . edu . au) 13/03/2011 4 * D e f i n i t i o n s and includes 5 * D e f i n i t i o n s are in UPPER CASE 6 * Includes go before d e f i n i t i o n s 7 * Space between includes , d e f i n i t i o n s and the main function . 8 * Use d e f i n i t i o n s fo r any constants in your program , do not j u s t write them 9 * in . 10 * 11 * Tabs may be s e t to 4−spaces or 8−spaces , depending on your e d i t o r . The code 12 * Below i s ``gnu ' ' s t y l e . I f your e d i t o r has ``bsd ' ' i t w i l l follow the 8−space 13 * s t y l e . Both are very standard . 14 */ 15 16 /** 17 * GOOD: 18 */ 19 20 #include 21 #include 22 #define MAX STRING SIZE 1000 23 #define DEBUG 0 24 i n t main( i n t argc , char **argv) f 25 . . . 26 27 /** 28 * BAD: 29 */ 30 31 /* D e f i n i t i o n s and includes are mixed up */ 32 #include 33 #define MAX STING SIZE 1000 34 /* D e f i n i t i o n s are given names l i k e v a r i a b l e s */ 35 #define debug 0 36 #include 37 /* No spacing between includes , d e f i n i t i o n s and main function */ 38 i n t main( i n t argc , char **argv) f 39 . . . 40 41 /** ***************************** 42 * Va ri abl es 43 * Give them useful lower case names or camelCase . Either i s fine , 44 * as long as you are c o n s i s t e n t and apply always the same s t y l e . 45 * I n i t i a l i s e them to something that makes sense . 46 */ 47 48 /** 49 * GOOD: lower case 50 */ 51 52 i n t main( i n t argc , char **argv) f 53 54 i n t i = 0; 55 i n t num_fifties = 0; 56 i n t num_twenties = 0; 57 i n t num_tens = 0; 58 59 . . . 60 /** 61 * GOOD: camelCase 62 */ 63 64 i n t main( i n t argc , char **argv) f 65 666 i n t i = 0; 67 i n t numFifties = 0; 68 i n t numTwenties = 0; 69 i n t numTens = 0; 70 71 . . . 72 /** 73 * BAD: 74 */ 75 76 i n t main( i n t argc , char **argv) f 77 78 /* Variable not i n i t i a l i s e d − causes a bug because we didn ' t remember to 79 * s e t i t before the loop */ 80 i n t i ; 81 /* Variable in a l l caps − we ' l l get confused between t h i s and constants 82 */ 83 i n t NUM_FIFTIES = 0; 84 /* Overly abbreviated v a r i a b l e names make things hard . */ 85 i n t nt = 0 86 87 while (i < 10) f 88 . . . 89 i++; 90 g 91 92 . . . 93 94 /** ******************** 95 * Spacing : 96 * Space i n t e l l i g e n t l y , v e r t i c a l l y to group blocks of code that are doing a 97 * s p e c i f i c operation , or to separate v a r i a b l e d e c l a r a t i o n s from other code . 98 * One tab of indentation within e i t h e r a function or a loop . 99 * Spaces a f t e r commas . 100 * Space between ) and f. 101 * No space between the ** and the argv in the d e f i n i t i o n of the main 102 * function . 103 * When declaring a pointer v a r i a b l e or argument , you may place the a s t e r i s k 104 * adjacent to e i t h e r the type or to the v a r i a b l e name . 105 * Lines at most 80 c h a r a c t e r s long . 106 * Closing brace goes on i t s own l i n e 107 */ 108 109 /** 110 * GOOD: 111 */ 112 113 i n t main( i n t argc , char **argv) f 114 115 i n t i = 0; 116 117 fo r (i = 100; i >= 0; i−−) f 118 i f (i > 0) f 119 printf( "%d b o t t l e s of beer , take one down and pass i t around , " 120 " %d b o t t l e s of beer . n n" , i , i − 1) ; 121 g e l s e f 122 printf( "%d b o t t l e s of beer , take one down and pass i t around . " 123 " We ' re empty . n n" , i) ; 124 g 125 g 126 127 return 0; 128 g 129 130 /** 131 * BAD: 7132 */ 133 134 /* No space a f t e r commas 135 * Space between the ** and argv in the main function d e f i n i t i o n 136 * No space between the ) and f at the s t a r t of a function */ 137 i n t main( i n t argc , char ** argv) f 138 i n t i = 0; 139 /* No space between v a r i a b l e d e c l a r a t i o n s and the r e s t of the function . 140 * No spaces around the boolean operators */ 141 fo r (i=100;i>=0;i−−) f 142 /* No indentation */ 143 i f (i > 0) f 144 /* Line too long */ 145 printf( "%d b o t t l e s of beer , take one down and pass i t around , %d 146 b o t t l e s of beer . n n" , i , i − 1) ; 147 g e l s e f 148 /* Spacing f or no good reason . */ 149 150 printf( "%d b o t t l e s of beer , take one down and pass i t around . " 151 " We ' re empty . n n" , i) ; 152 153 g 154 g 155 /* Closing brace not on i t s own l i n e */ 156 return 0;g 157 158 /** **************** 159 * Braces : 160 * Opening braces go on the same l i n e as the loop or function name 161 * Closing braces go on t h e i r own l i n e 162 * Closing braces go at the same indentation l e v e l as the thing they are 163 * c l o s i n g 164 */ 165 166 /** 167 * GOOD: 168 */ 169 170 i n t main( i n t argc , char **argv) f 171 172 . . . 173 174 fo r ( . . . ) f 175 . . . 176 g 177 178 return 0; 179 g 180 181 /** 182 * BAD: 183 */ 184 185 i n t main( i n t argc , char **argv) f 186 187 . . . 188 189 /* Opening brace on a d i f f e r e n t l i n e to the fo r loop open */ 190 fo r ( . . . ) 191 f 192 . . . 193 /* Closing brace at a d i f f e r e n t indentation to the thing i t ' s 194 c l o s i n g 195 */ 196 g 197 8198 /* Closing brace not on i t s own l i n e . */ 199 return 0;g 200 201 /** ************** 202 * Commenting : 203 * Each program should have a comment explaining what i t does and who created 204 * i t . 205 * Also comment how to run the program , including optional command l i n e 206 * parameters . 207 * Any i n t e r e s t i n g code should have a comment to explain i t s e l f . 208 * We should not comment obvious things − write code that documents i t s e l f 209 */ 210 211 /** 212 * GOOD: 213 */ 214 215 /* change . c 216 * 217 * Created by Aidan Nagorcka−Smith ( aidann@student . unimelb . edu . au) 218 13/03/2011 219 * 220 * P r i n t the number of each coin that would be needed to make up some 221 change 222 * that i s input by the user 223 * 224 * To run the program type : 225 * . / coins −−num coins 5 −−shape coins trapezoid −−output blabla . t x t 226 * 227 * To see a l l the input parameters , type : 228 * . / coins −−help 229 * Options : : 230 * −−help Show help message 231 * −−num coins arg Input number of coins 232 * −−shape coins arg Input coins shape 233 * −−bound arg (=1) Max bound on xxx , d e f a u l t value 1 234 * −−output arg Output s o l u t i o n f i l e 235 * 236 */ 237 238 i n t main( i n t argc , char **argv) f 239 240 i n t input_change = 0; 241 242 printf( " Please input the value of the change (0−99 cents 243 i n c l u s i v e ) :n n" ) ; 244 scanf( "%d" , &input_change) ; 245 printf( " nn" ) ; 246 247 // Valid change values are 0−99 i n c l u s i v e . 248 i f (input_change < 0 j j input_change > 99) f 249 printf( " Input not in the range 0−99.nn" ) 250 g 251 252 . . . 253 254 /** 255 * BAD: 256 */ 257 258 /* No explanation of what the program i s doing */ 259 i n t main( i n t argc , char **argv) f 260 261 /* Commenting obvious things */ 262 /* Create a i n t v a r i a b l e c a l l e d input change to s t o r e the input from 263 the 9264 * user . */ 265 i n t input_change ; 266 267 . . . 268 269 /** **************** 270 * Code s t r u c t u r e : 271 * F a i l f a s t − input checks should happen f i r s t , then do the computation . 272 * Structure the code so that a l l error handling happens in an easy to read 273 * l o c a t i o n 274 */ 275 276 /** 277 * GOOD: 278 */ 279 i f (input_is_bad) f 280 printf( " Error : Input was not v a l i d . E x i t i n g .n n" ) ; 281 exit(EXIT_FAILURE) ; 282 g 283 284 /* Do computations here */ 285 . . . 286 287 /** 288 * BAD: 289 */ 290 291 i f (input_is_good) f 292 /* l o t s of computation here , pushing the e l s e part o f f the screen . 293 */ 294 . . . 295 g e l s e f 296 fprintf(stderr , " Error : Input was not v a l i d . E x i t i n g .n n" ) ; 297 exit(EXIT_FAILURE) ; 298 g Additional Support Your tutors will be available to help with your assignment during the scheduled workshop times. There is also a Discussion Forum entitled Assignment 1 on the LMS, which you can use to post questions and answers. You should feel free to answer other students' questions if you are confident of your skills. A tutor will check the Discussion Forum regularly, and answer some questions, but be aware that for some questions you will just need to use your judgment and document your thinking. For example, a question like, How much data should I use for the experiments?, will not be answered; you must try out different data and see what makes sense. In this subject, we support MobaXterm for ssh to the CIS machines nutmeg.eng.unimelb.edu.au and dimefox.eng.unimelb.edu.au, the excellent editor built into MobaXterm, and gcc on the department machines. While you are free to use the platform and editor of your choice, these are the only tools you can "expect" help with from the staff in this subject. We'll always do our best to help you learn. Your final program must compile and run on the department machines. Submission You will need to make two submissions for this assignment: • Your C code files (including your Makefile) will be submitted through the LMS page for this subject: Assignments ! Assignment 1 ! Assignment 1: Code. 10• Your experiments report file will be submitted through the LMS page for this subject: Assignments ! Assignment 1 ! Assignment 1: Experimentation. This file can be of any format, e.g. .pdf, text or other. Program files submitted (Code) Submit the program files for your assignment and your Makefile. If you wish to submit any scripts or code used to generate input data, you may, although this is not required. Just be sure to submit all your files at the same time. Your programs must compile and run correctly on the CIS machines. You may have developed your program in another environment, but it still must run on the department machines at submission time. For this reason, and because there are often small, but significant, differences between compilers, it is suggested that if you are working in a different environment, you upload and test your code on the department machines at reasonably frequent intervals. A common reason for programs not to compile is that a file has been inadvertently omitted from the submission. Please check your submission, and resubmit all files if necessary. Experiment file submitted using Turnitin As noted above, your experimental work will be submitted through the LMS, via the Turnitin system. Go to the LMS page for this subject: Assignments ! Assignment 1 ! Assignment 1 Experiments Submission and follow the prompts. Your file can be in any format. Plain text or .pdf are recommended, but other formats will be accepted. It is expected that your experimental work will be in a single file, but multiple files can be accepted. Add your username to the top of your experiments file. Please do not submit large data files. No need to query every key on the dictionary. Assessment There are a total of 15 marks given for this assignment, 7 marks for Stage 1, 2 marks for Stage 2, and 4 marks for the separately submitted Experimentation Stage. 2 marks will be given based on your C programming style. Your C program will be marked on the basis of accuracy, readability, and good C programming structure, safety and style, including documentation. Safety refers to checking whether opening a file returns something, whether mallocs do their job, etc. The documentation should explain all major design decisions, and should be formatted so that it does not interfere with reading the code. As much as possible, try to make your code self-documenting, by choosing descriptive variable names. Your experimentation will be marked on the basis of orderliness and thoroughness of experimentation, comparison of your results with theory, and thoughtful discussion. Plagiarism This is an individual assignment. The work must be your own. 11While you may discuss your program development, coding problems and experimentation with your classmates, you must not share files, as this is considered plagiarism. If you refer to published work in the discussion of your experiments, be sure to include a citation to the publication or the web link. Borrowing of someone elses code without acknowledgment is plagiarism. Plagiarism is considered a serious offense at the University of Melbourne. You should read the University code on Academic honesty and details on plagiarism. Make sure you are not plagiarizing, intentionally or unintentionally. You are also advised that there will be a C programming component (on paper, not on a computer) on the final examination. Students who do not program their own assignments will be at a disadvantage for this part of the examination. Administrative issues When is late? What do I do if I am late? The due date and time are printed on the front of this document. The lateness policy is on the handout provided at the first lecture and also available on the subject LMS page. If you decide to make a late submission, you should send an email directly to the lecturer as soon as possible and he will provide instructions for making a late submission. What are the marks and the marking criteria Recall that this project is worth 15% of your final score. There is also a hurdle requirement: you must earn at least 15 marks out of a subtotal of 30 for the projects to pass this subject. Finally Despite all these stern words, we are here to help! There is information about getting help in this subject on the LMS pages. Frequently asked questions about the project will be answered in the LMS discussion group. NL, August 25, 2016 12