Regular Expressions. Chapter 11. Python for Informatics: Exploring Information
|
|
|
- Liliana Goodwin
- 9 years ago
- Views:
Transcription
1 Regular Expressions Chapter 11 Python for Informatics: Exploring Information
2 Regular Expressions In computing, a regular expression, also referred to as regex or regexp, provides a concise and flexible means for matching strings of text, such as particular characters, words, or patterns of characters. A regular expression is written in a formal language that can be interpreted by a regular expression processor.
3 Regular Expressions Really clever wild card expressions for matching and parsing strings
4 Really smart "Find" or "Search"
5 Understanding Regular Expressions Very powerful and quite cryptic Fun once you understand them Regular expressions are a language unto themselves A language of marker characters - programming with characters It is kind of an old school language - compact
6
7 Regular Expression Quick Guide ^ Matches the beginning of a line $ Matches the end of the line. Matches any character \s Matches whitespace \S Matches any non-whitespace character * Repeats a character zero or more times *? Repeats a character zero or more times (non-greedy) + Repeats a character one or more times +? Repeats a character one or more times (non-greedy) [aeiou] Matches a single character in the listed set [^XYZ] Matches a single character not in the listed set [a-z0-9] The set of characters can include a range ( Indicates where string extraction is to start ) Indicates where string extraction is to end
8 The Regular Expression Module Before you can use regular expressions in your program, you must import the library using "import re" You can use re.search() to see if a string matches a regular expression, similar to using the find() method for strings You can use re.findall() extract portions of a string that match your regular expression similar to a combination of find() and slicing: var[5:10]
9 Using re.search() like find() hand = open('mbox-short.txt') for line in hand: line = line.rstrip() if line.find('from:') >= 0: print line import re hand = open('mbox-short.txt') for line in hand: line = line.rstrip() if re.search('from:', line) : print line
10 Using re.search() like startswith() hand = open('mbox-short.txt') for line in hand: line = line.rstrip() if line.startswith('from:') : print line import re hand = open('mbox-short.txt') for line in hand: line = line.rstrip() if re.search('^from:', line) : print line We fine-tune what is matched by adding special characters to the string
11 Wild-Card Characters The dot character matches any character If you add the asterisk character, the character is any number of times X-Sieve: CMU Sieve 2.3 X-DSPAM-Result: Innocent X-DSPAM-Confidence: X-Content-Type-Message-Body: text/plain ^X.*:
12 Wild-Card Characters The dot character matches any character If you add the asterisk character, the character is any number of times Match the start of the line X-Sieve: CMU Sieve 2.3 X-DSPAM-Result: Innocent X-DSPAM-Confidence: X-Content-Type-Message-Body: text/plain ^X.*: Many times Match any character
13 Fine-Tuning Your Match Depending on how clean your data is and the purpose of your application, you may want to narrow your match down a bit X-Sieve: CMU Sieve 2.3 X-DSPAM-Result: Innocent X-Plane is behind schedule: two weeks Match the start of the line Many times ^X.*: Match any character
14 Fine-Tuning Your Match Depending on how clean your data is and the purpose of your application, you may want to narrow your match down a bit X-Sieve: CMU Sieve 2.3 X-DSPAM-Result: Innocent X-Plane is behind schedule: two weeks Match the start of the line One or more times ^X-\S+: Match any non-whitespace character
15 Matching and Extracting Data The re.search() returns a True/False depending on whether the string matches the regular expression If we actually want the matching strings to be extracted, we use re. findall() [0-9]+ One or more digits >>> import re >>> x = 'My 2 favorite numbers are 19 and 42' >>> y = re.findall('[0-9]+',x) >>> print y ['2', '19', '42']
16 Matching and Extracting Data When we use re.findall(), it returns a list of zero or more sub-strings that match the regular expression >>> import re >>> x = 'My 2 favorite numbers are 19 and 42' >>> y = re.findall('[0-9]+',x) >>> print y ['2', '19', '42'] >>> y = re.findall('[aeiou]+',x) >>> print y []
17 Warning: Greedy Matching The repeat characters (* and +) push outward in both directions (greedy) to match the largest possible string >>> import re >>> x = 'From: Using the : character' >>> y = re.findall('^f.+:', x) >>> print y ['From: Using the :'] ^F.+: One or more characters Why not 'From:'? First character in the match is an F Last character in the match is a :
18 Non-Greedy Matching Not all regular expression repeat codes are greedy! If you add a? character, the + and * chill out a bit... >>> import re >>> x = 'From: Using the : character' >>> y = re.findall('^f.+?:', x) >>> print y ['From:'] ^F.+?: One or more characters but not greedy First character in the match is an F Last character in the match is a :
19 Fine-Tuning String Extraction You can refine the match for re.findall() and separately determine which portion of the match is to be extracted by using parentheses From Sat Jan 5 09:14: >>> y = re.findall('\s+@\s+',x) >>> print y ['[email protected]'] \S+@\S+ At least one non-whitespace character
20 Fine-Tuning String Extraction Parentheses are not part of the match - but they tell where to start and stop what string to extract From [email protected] Sat Jan 5 09:14: >>> y = re.findall('\s+@\s+',x) >>> print y ['[email protected]'] >>> y = re.findall('^from:.*? (\S+@\S+)',x) >>> print y ['[email protected]'] ^From:(\S+@\S+)
21 21 31 From Sat Jan 5 09:14: >>> data = 'From [email protected] Sat Jan 5 09:14: ' >>> atpos = data.find('@') >>> print atpos 21 >>> sppos = data.find(' ',atpos) >>> print sppos Extracting a host 31 >>> host = data[atpos+1 : sppos] name - using find >>> print host and string slicing uct.ac.za
22 The Double Split Pattern Sometimes we split a line one way, and then grab one of the pieces of the line and split that piece again From [email protected] Sat Jan 5 09:14: words = line.split() = words[1] pieces = .split('@') print pieces[1] [email protected] ['stephen.marquard', 'uct.ac.za'] 'uct.ac.za'
23 The Regex Version From Sat Jan 5 09:14: import re lin = 'From [email protected] Sat Jan 5 09:14: ' y = re.findall('@([^ ]*)',lin) print y ['uct.ac.za'] '@([^ ]*)' Look through the string until you find an at sign
24 The Regex Version From Sat Jan 5 09:14: import re lin = 'From [email protected] Sat Jan 5 09:14: ' y = re.findall('@([^ ]*)',lin) print y ['uct.ac.za'] '@([^ ]*)' Match non-blank character Match many of them
25 The Regex Version From Sat Jan 5 09:14: import re lin = 'From [email protected] Sat Jan 5 09:14: ' y = re.findall('@([^ ]*)',lin) print y ['uct.ac.za'] '@([^ ]*)' Extract the non-blank characters
26 Even Cooler Regex Version From Sat Jan 5 09:14: import re lin = 'From [email protected] Sat Jan 5 09:14: ' y = re.findall('^from.*@([^ ]*)',lin) print y ['uct.ac.za'] '^From.*@([^ ]*)' Starting at the beginning of the line, look for the string 'From '
27 Even Cooler Regex Version From Sat Jan 5 09:14: import re lin = 'From [email protected] Sat Jan 5 09:14: ' y = re.findall('^from.*@([^ ]*)',lin) print y ['uct.ac.za'] '^From.*@([^ ]*)' Skip a bunch of characters, looking for an at sign
28 Even Cooler Regex Version From Sat Jan 5 09:14: import re lin = 'From [email protected] Sat Jan 5 09:14: ' y = re.findall('^from.*@([^ ]*)',lin) print y ['uct.ac.za'] '^From.*@([^ ]*)' Start extracting
29 Even Cooler Regex Version From Sat Jan 5 09:14: import re lin = 'From [email protected] Sat Jan 5 09:14: ' y = re.findall('^from.*@([^ ]*)',lin) print y ['uct.ac.za'] '^From.*@([^ ]*)' Match non-blank character Match many of them
30 Even Cooler Regex Version From Sat Jan 5 09:14: import re lin = 'From [email protected] Sat Jan 5 09:14: ' y = re.findall('^from.*@([^ ]*)',lin) print y ['uct.ac.za'] '^From.*@([^ ]*)' Stop extracting
31 Spam Confidence import re hand = open('mbox-short.txt') numlist = list() for line in hand: line = line.rstrip() stuff = re.findall('^x-dspam-confidence: ([0-9.]+)', line) if len(stuff)!= 1 : continue num = float(stuff[0]) numlist.append(num) print 'Maximum:', max(numlist) X-DSPAM-Confidence: python ds.py Maximum:
32 Escape Character If you want a special regular expression character to just behave normally (most of the time) you prefix it with '\' At least one >>> import re >>> x = 'We just received $10.00 for cookies.' >>> y = re.findall('\$[0-9.]+',x) >>> print y ['$10.00'] \$[0-9.]+ or more A real dollar sign A digit or period
33 Summary Regular expressions are a cryptic but powerful language for matching strings and extracting elements from those strings Regular expressions have special characters that indicate intent
34 Acknowledgements / Contributions These slides are Copyright Charles R. Severance (www. dr-chuck.com) of the University of Michigan School of Information and open.umich.edu and made available under a Creative Commons Attribution 4.0 License. Please maintain this last slide in all copies of the document to comply with the attribution requirements of the license. If you make a change, feel free to add your name and organization to the list of contributors on this page as you republish the materials.... Initial Development: Charles Severance, University of Michigan School of Information Insert new Contributors and Translations here
Regular Expressions Overview Suppose you needed to find a specific IPv4 address in a bunch of files? This is easy to do; you just specify the IP
Regular Expressions Overview Suppose you needed to find a specific IPv4 address in a bunch of files? This is easy to do; you just specify the IP address as a string and do a search. But, what if you didn
University Convocation. IT 3203 Introduction to Web Development. Pattern Matching. Why Match Patterns? The Search Method. The Replace Method
IT 3203 Introduction to Web Development Regular Expressions October 12 Notice: This session is being recorded. Copyright 2007 by Bob Brown University Convocation Tuesday, October 13, 11:00 AM 12:15 PM
Lecture 18 Regular Expressions
Lecture 18 Regular Expressions Many of today s web applications require matching patterns in a text document to look for specific information. A good example is parsing a html file to extract tags
Python Lists and Loops
WEEK THREE Python Lists and Loops You ve made it to Week 3, well done! Most programs need to keep track of a list (or collection) of things (e.g. names) at one time or another, and this week we ll show
Python Loops and String Manipulation
WEEK TWO Python Loops and String Manipulation Last week, we showed you some basic Python programming and gave you some intriguing problems to solve. But it is hard to do anything really exciting until
Relational Databases and SQLite
Relational Databases and SQLite Charles Severance Python for Informatics: Exploring Information www.pythonlearn.com SQLite Browser http://sqlitebrowser.org/ Relational Databases Relational databases model
A Python Tour: Just a Brief Introduction CS 303e: Elements of Computers and Programming
A Python Tour: Just a Brief Introduction CS 303e: Elements of Computers and Programming "The only way to learn a new programming language is by writing programs in it." -- B. Kernighan and D. Ritchie "Computers
Regular Expression. n What is Regex? n Meta characters. n Pattern matching. n Functions in re module. n Usage of regex object. n String substitution
Regular Expression n What is Regex? n Meta characters n Pattern matching n Functions in re module n Usage of regex object n String substitution What is regular expression? n String search n (e.g.) Find
NiCE Log File Management Pack. for. System Center Operations Manager 2012. Quick Start Guide
NiCE Log File Management Pack for System Center Operations Manager 2012 Version 1.30 March 2015 Quick Start Guide Legal Notices NiCE IT Management Solutions GmbH makes no warranty of any kind with regard
CS 1133, LAB 2: FUNCTIONS AND TESTING http://www.cs.cornell.edu/courses/cs1133/2015fa/labs/lab02.pdf
CS 1133, LAB 2: FUNCTIONS AND TESTING http://www.cs.cornell.edu/courses/cs1133/2015fa/labs/lab02.pdf First Name: Last Name: NetID: The purpose of this lab is to help you to better understand functions:
Programming Languages CIS 443
Course Objectives Programming Languages CIS 443 0.1 Lexical analysis Syntax Semantics Functional programming Variable lifetime and scoping Parameter passing Object-oriented programming Continuations Exception
Selecting Features by Attributes in ArcGIS Using the Query Builder
Helping Organizations Succeed with GIS www.junipergis.com Bend, OR 97702 Ph: 541-389-6225 Fax: 541-389-6263 Selecting Features by Attributes in ArcGIS Using the Query Builder ESRI provides an easy to use
Custom Linetypes (.LIN)
Custom Linetypes (.LIN) AutoCAD provides the ability to create custom linetypes or to adjust the linetypes supplied with the system during installation. Linetypes in AutoCAD can be classified into two
Exercise 4 Learning Python language fundamentals
Exercise 4 Learning Python language fundamentals Work with numbers Python can be used as a powerful calculator. Practicing math calculations in Python will help you not only perform these tasks, but also
Utility Software II lab 1 Jacek Wiślicki, [email protected] original material by Hubert Kołodziejski
MS ACCESS - INTRODUCTION MS Access is an example of a relational database. It allows to build and maintain small and medium-sized databases and to supply them with a graphical user interface. The aim of
Form Validation. Server-side Web Development and Programming. What to Validate. Error Prevention. Lecture 7: Input Validation and Error Handling
Form Validation Server-side Web Development and Programming Lecture 7: Input Validation and Error Handling Detecting user error Invalid form information Inconsistencies of forms to other entities Enter
Regular Expression Searching
Regular Expression Searching Regular expressions allow forensics analysts to search through large quantities of text information for patterns of data such as the following: Telephone Numbers Social Security
University of Hull Department of Computer Science. Wrestling with Python Week 01 Playing with Python
Introduction Welcome to our Python sessions. University of Hull Department of Computer Science Wrestling with Python Week 01 Playing with Python Vsn. 1.0 Rob Miles 2013 Please follow the instructions carefully.
Regular Expression Syntax
1 of 5 12/22/2014 9:55 AM EmEditor Home - EmEditor Help - How to - Search Regular Expression Syntax EmEditor regular expression syntax is based on Perl regular expression syntax. Literals All characters
PYTHON Basics http://hetland.org/writing/instant-hacking.html
CWCS Workshop May 2009 PYTHON Basics http://hetland.org/writing/instant-hacking.html Python is an easy to learn, modern, interpreted, object-oriented programming language. It was designed to be as simple
6.170 Tutorial 3 - Ruby Basics
6.170 Tutorial 3 - Ruby Basics Prerequisites 1. Have Ruby installed on your computer a. If you use Mac/Linux, Ruby should already be preinstalled on your machine. b. If you have a Windows Machine, you
Python Programming: An Introduction to Computer Science
Python Programming: An Introduction to Computer Science Sequences: Strings and Lists Python Programming, 2/e 1 Objectives To understand the string data type and how strings are represented in the computer.
Chapter 9: Building Bigger Programs
Chapter 9: Building Bigger Programs How to Design Larger Programs Building something larger requires good software engineering. Design Top- down: Start from requirements, then identify the pieces to write,
3-17 15-25 5 15-10 25 3-2 5 0. 1b) since the remainder is 0 I need to factor the numerator. Synthetic division tells me this is true
Section 5.2 solutions #1-10: a) Perform the division using synthetic division. b) if the remainder is 0 use the result to completely factor the dividend (this is the numerator or the polynomial to the
Udacity cs101: Building a Search Engine. Extracting a Link
Udacity cs101: Building a Search Engine Unit 1: How to get started: your first program Extracting a Link Introducing the Web Crawler (Video: Web Crawler)... 2 Quiz (Video: First Quiz)...2 Programming (Video:
Python Objects. Charles Severance www.pythonlearn.com. http://en.wikipedia.org/wiki/object-oriented_programming
Python Objects Charles Severance www.pythonlearn.com http://en.wikipedia.org/wiki/object-oriented_programming Warning This lecture is very much about definitions and mechanics for objects This lecture
grep, awk and sed three VERY useful command-line utilities Matt Probert, Uni of York grep = global regular expression print
grep, awk and sed three VERY useful command-line utilities Matt Probert, Uni of York grep = global regular expression print In the simplest terms, grep (global regular expression print) will search input
University of Toronto Department of Electrical and Computer Engineering. Midterm Examination. CSC467 Compilers and Interpreters Fall Semester, 2005
University of Toronto Department of Electrical and Computer Engineering Midterm Examination CSC467 Compilers and Interpreters Fall Semester, 2005 Time and date: TBA Location: TBA Print your name and ID
Microsoft Office 2010: Access 2010, Excel 2010, Lync 2010 learning assets
Microsoft Office 2010: Access 2010, Excel 2010, Lync 2010 learning assets Simply type the id# in the search mechanism of ACS Skills Online to access the learning assets outlined below. Titles Microsoft
monoseq Documentation
monoseq Documentation Release 1.2.1 Martijn Vermaat July 16, 2015 Contents 1 User documentation 3 1.1 Installation................................................ 3 1.2 User guide................................................
Library Intro AC800M
Library Intro AC800M Connecting Libraries Standard Custom Prepare Connect Application Library Data Types Blocks Modules Library Intro AC800M Connecting Libraries Standard Custom Prepare Connect Application
ESET NOD32 Antivirus for IBM Lotus Domino. Installation
ESET NOD32 Antivirus for IBM Lotus Domino Installation Copyright ESET, spol. s r. o. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means electronic
Compilers Lexical Analysis
Compilers Lexical Analysis SITE : http://www.info.univ-tours.fr/ mirian/ TLC - Mírian Halfeld-Ferrari p. 1/3 The Role of the Lexical Analyzer The first phase of a compiler. Lexical analysis : process of
Eventia Log Parsing Editor 1.0 Administration Guide
Eventia Log Parsing Editor 1.0 Administration Guide Revised: November 28, 2007 In This Document Overview page 2 Installation and Supported Platforms page 4 Menus and Main Window page 5 Creating Parsing
Outline Basic concepts of Python language
Data structures: lists, tuples, sets, dictionaries Basic data types Examples: int: 12, 0, -2 float: 1.02, -2.4e2, 1.5e-3 complex: 3+4j bool: True, False string: "Test string" Conversion between types int(-2.8)
Kiwi Log Viewer. A Freeware Log Viewer for Windows. by SolarWinds, Inc.
Kiwi Log Viewer A Freeware Log Viewer for Windows by SolarWinds, Inc. Kiwi Log Viewer displays text based log files in a tabular format. Only a small section of the file is read from disk at a time which
Lecture 2, Introduction to Python. Python Programming Language
BINF 3360, Introduction to Computational Biology Lecture 2, Introduction to Python Young-Rae Cho Associate Professor Department of Computer Science Baylor University Python Programming Language Script
Learn Perl by Example - Perl Handbook for Beginners - Basics of Perl Scripting Language
Learn Perl by Example - Perl Handbook for Beginners - Basics of Perl Scripting Language www.freebsdonline.com Copyright 2006-2008 www.freebsdonline.com 2008/01/29 This course is about Perl Programming
Name: Class: Date: 9. The compiler ignores all comments they are there strictly for the convenience of anyone reading the program.
Name: Class: Date: Exam #1 - Prep True/False Indicate whether the statement is true or false. 1. Programming is the process of writing a computer program in a language that the computer can respond to
Regular Expressions. The Complete Tutorial. Jan Goyvaerts
Regular Expressions The Complete Tutorial Jan Goyvaerts Regular Expressions: The Complete Tutorial Jan Goyvaerts Copyright 2006, 2007 Jan Goyvaerts. All rights reserved. Last updated July 2007. No part
Computational Mathematics with Python
Computational Mathematics with Python Basics Claus Führer, Jan Erik Solem, Olivier Verdier Spring 2010 Claus Führer, Jan Erik Solem, Olivier Verdier Computational Mathematics with Python Spring 2010 1
Crochet Pattern Autumn Girls Design by K. Godinez
1 Crochet Pattern Autumn Girls Design by K. Godinez 2 Material: crochet hook size 2. Catania wool from Schachenmayr in the colors white, purple, ecru, brown for the doll and different colors for the clothes
Java String Methods in Print Templates
Java String Methods in Print Templates Print templates in Millennium/Sierra provide a great deal of flexibility in printed output and notices, both in terms of layout and in the ability to combine and
Comp 248 Introduction to Programming
Comp 248 Introduction to Programming Chapter 2 - Console Input & Output Dr. Aiman Hanna Department of Computer Science & Software Engineering Concordia University, Montreal, Canada These slides has been
ELFRING FONTS UPC BAR CODES
ELFRING FONTS UPC BAR CODES This package includes five UPC-A and five UPC-E bar code fonts in both TrueType and PostScript formats, a Windows utility, BarUPC, which helps you make bar codes, and Visual
Lesson 1: Comparison of Population Means Part c: Comparison of Two- Means
Lesson : Comparison of Population Means Part c: Comparison of Two- Means Welcome to lesson c. This third lesson of lesson will discuss hypothesis testing for two independent means. Steps in Hypothesis
Advanced PostgreSQL SQL Injection and Filter Bypass Techniques
Advanced PostgreSQL SQL Injection and Filter Bypass Techniques INFIGO-TD TD-200 2009-04 2009-06 06-17 Leon Juranić [email protected] INFIGO IS. All rights reserved. This document contains information
Introduction to Python
WEEK ONE Introduction to Python Python is such a simple language to learn that we can throw away the manual and start with an example. Traditionally, the first program to write in any programming language
PIC 10A. Lecture 7: Graphics II and intro to the if statement
PIC 10A Lecture 7: Graphics II and intro to the if statement Setting up a coordinate system By default the viewing window has a coordinate system already set up for you 10-10 10-10 The origin is in the
A Lex Tutorial. Victor Eijkhout. July 2004. 1 Introduction. 2 Structure of a lex file
A Lex Tutorial Victor Eijkhout July 2004 1 Introduction The unix utility lex parses a file of characters. It uses regular expression matching; typically it is used to tokenize the contents of the file.
Introduction to Python for Text Analysis
Introduction to Python for Text Analysis Jennifer Pan Institute for Quantitative Social Science Harvard University (Political Science Methods Workshop, February 21 2014) *Much credit to Andy Hall and Learning
Chapter 3 Writing Simple Programs. What Is Programming? Internet. Witin the web server we set lots and lots of requests which we need to respond to
Chapter 3 Writing Simple Programs Charles Severance Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution 3.0 License. http://creativecommons.org/licenses/by/3.0/.
w e p r o t e c t d i g i t a l w o r l d s ESET NOD32 Antivirus for IBM Lotus Domino Installation
w e p r o t e c t d i g i t a l w o r l d s ESET NOD32 Antivirus for IBM Lotus Domino Installation Copyright ESET, spol. s r. o. All rights reserved. No part of this document may be reproduced or transmitted
#mstrworld. No Data Left behind: 20+ new data sources with new data preparation in MicroStrategy 10
No Data Left behind: 20+ new data sources with new data preparation in MicroStrategy 10 MicroStrategy Analytics Agenda Product Workflows Different Data Import Processes Product Demonstrations Data Preparation
Microsoft Access 3: Understanding and Creating Queries
Microsoft Access 3: Understanding and Creating Queries In Access Level 2, we learned how to perform basic data retrievals by using Search & Replace functions and Sort & Filter functions. For more complex
3 Improving the Crab more sophisticated programming
3 Improving the Crab more sophisticated programming topics: concepts: random behavior, keyboard control, sound dot notation, random numbers, defining methods, comments In the previous chapter, we looked
Who Are You Online? LESSON PLAN UNIT 2. Essential Question How do you present yourself to the world online and offline?
LESSON PLAN Who Are You Online? UNIT 2 Essential Question How do you present yourself to the world online and offline? Lesson Overview Students explore how they and others represent themselves online,
Basics of I/O Streams and File I/O
Basics of This is like a cheat sheet for file I/O in C++. It summarizes the steps you must take to do basic I/O to and from files, with only a tiny bit of explanation. It is not a replacement for reading
Bottom-Up Parsing. An Introductory Example
Bottom-Up Parsing Bottom-up parsing is more general than top-down parsing Just as efficient Builds on ideas in top-down parsing Bottom-up is the preferred method in practice Reading: Section 4.5 An Introductory
CS106A, Stanford Handout #38. Strings and Chars
CS106A, Stanford Handout #38 Fall, 2004-05 Nick Parlante Strings and Chars The char type (pronounced "car") represents a single character. A char literal value can be written in the code using single quotes
Version 2.5.0 22 August 2016
Version 2.5.0 22 August 2016 Published by Just Great Software Co. Ltd. Copyright 2009 2016 Jan Goyvaerts. All rights reserved. RegexMagic and Just Great Software are trademarks of Jan Goyvaerts i Table
Regular Expressions. General Concepts About Regular Expressions
Regular Expressions This appendix explains regular expressions and how to use them in Cisco IOS software commands. It also provides details for composing regular expressions. This appendix has the following
Getting Started with the new VWO
Getting Started with the new VWO TABLE OF CONTENTS What s new in the new VWO... 3 Where to locate features in new VWO... 5 Steps to create a new Campaign... 18 Step # 1: Enter Campaign URLs... 19 Step
Introduction to Microsoft Word
Introduction to Microsoft Word Setting up project gallery toolbars formatting palette opening saving Writing and formatting margins layout headers and footers text color basic formatting special characters
BACKSCATTER PROTECTION AGENT Version 1.1 documentation
BACKSCATTER PROTECTION AGENT Version 1.1 documentation Revision 1.3 (for ORF version 5.0) Date June 3, 2012 INTRODUCTION What is backscatter? Backscatter (or reverse NDR ) attacks occur when a spammer
We will learn the Python programming language. Why? Because it is easy to learn and many people write programs in Python so we can share.
LING115 Lecture Note Session #4 Python (1) 1. Introduction As we have seen in previous sessions, we can use Linux shell commands to do simple text processing. We now know, for example, how to count words.
Introduction to Learning & Decision Trees
Artificial Intelligence: Representation and Problem Solving 5-38 April 0, 2007 Introduction to Learning & Decision Trees Learning and Decision Trees to learning What is learning? - more than just memorizing
Getting started with the Asset Import Converter. Overview. Resources to help you
Getting started with the Asset Import Converter Overview While you can manually enter asset information in the Catalog, you can also import asset data in the XML (extensible markup language) file format.
Computational Mathematics with Python
Boolean Arrays Classes Computational Mathematics with Python Basics Olivier Verdier and Claus Führer 2009-03-24 Olivier Verdier and Claus Führer Computational Mathematics with Python 2009-03-24 1 / 40
CS 2112 Spring 2014. 0 Instructions. Assignment 3 Data Structures and Web Filtering. 0.1 Grading. 0.2 Partners. 0.3 Restrictions
CS 2112 Spring 2014 Assignment 3 Data Structures and Web Filtering Due: March 4, 2014 11:59 PM Implementing spam blacklists and web filters requires matching candidate domain names and URLs very rapidly
VMware vcenter Log Insight User's Guide
VMware vcenter Log Insight User's Guide vcenter Log Insight 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
Hypercosm. Studio. www.hypercosm.com
Hypercosm Studio www.hypercosm.com Hypercosm Studio Guide 3 Revision: November 2005 Copyright 2005 Hypercosm LLC All rights reserved. Hypercosm, OMAR, Hypercosm 3D Player, and Hypercosm Studio are trademarks
600-152 People Data and the Web Forms and CGI CGI. Facilitating interactive web applications
CGI Facilitating interactive web applications Outline In Informatics 1, worksheet 7 says You will learn more about CGI and forms if you enroll in Informatics 2. Now we make good on that promise. First
Programming Tricks For Reducing Storage And Work Space Curtis A. Smith, Defense Contract Audit Agency, La Mirada, CA.
Paper 23-27 Programming Tricks For Reducing Storage And Work Space Curtis A. Smith, Defense Contract Audit Agency, La Mirada, CA. ABSTRACT Have you ever had trouble getting a SAS job to complete, although
Viewing Web Pages In Python. Charles Severance - www.dr-chuck.com
Viewing Web Pages In Python Charles Severance - www.dr-chuck.com What is Web Scraping? When a program or script pretends to be a browser and retrieves web pages, looks at those web pages, extracts information
X1 Professional Client
X1 Professional Client What Will X1 Do For Me? X1 instantly locates any word in any email message, attachment, file or Outlook contact on your PC. Most search applications require you to type a search,
TCP/IP Addressing and Subnetting. an excerpt from: A Technical Introduction to TCP/IP Internals. Presentation Copyright 1995 TGV Software, Inc.
TCP/IP Addressing and Subnetting an excerpt from: A Technical Introduction to TCP/IP Internals Presentation Copyright 1995 TGV Software, Inc. IP Addressing Roadmap Format of IP Addresses Traditional Class
Security implications of the Internet transition to IPv6
Security implications of the Internet transition to IPv6 Eric VYNCKE Cisco Session ID: ASEC-209 Session Classification: Intermediate Agenda There is no place for doubts: IPv6 is there Impact in the Data
Principles of Database Management Systems. Overview. Principles of Data Layout. Topic for today. "Executive Summary": here.
Topic for today Principles of Database Management Systems Pekka Kilpeläinen (after Stanford CS245 slide originals by Hector Garcia-Molina, Jeff Ullman and Jennifer Widom) How to represent data on disk
Save Actions User Guide
Microsoft Dynamics CRM for Sitecore 6.6-8.0 Save Actions User Guide Rev: 2015-04-15 Microsoft Dynamics CRM for Sitecore 6.6-8.0 Save Actions User Guide A practical guide to using Microsoft Dynamics CRM
25 Tips for Creating Effective Load Test Scripts using Oracle Load Testing for E-Business Suite and Fusion Applications.
25 Tips for Creating Effective Load Test Scripts using Oracle Load Testing for E-Business Suite and Fusion Applications. O R A C L E W H I T E P A P E R S E P T E M B E R 2 0 1 4 Table of Contents Product
Format 999-99-9999 OCR ICR. ID Protect From Vanguard Systems, Inc.
OCR/ICR 12 3-45. 76 79 12 3-45-7679 OCR Format 999-99-9999 Valid? Image Correction and Syntax search ICR 12 3-45. 76 79 12 3-45-76 79 Export Cancel ID Protect From Vanguard Systems, Inc. Integrated with
Simple SEO Success. Google Analytics & Google Webmaster Tools
Google Analytics & Google Webmaster Tools In this module we are going to be looking at 2 free tools and why they are essential when running any online business website. First of all you need to ensure
A GIRL SCOUT YEAR. If the answer is YES, we want to do all the activities an earn the A Girl Scout Year patch, put the date you decided here:
A GIRL SCOUT YEAR Dear Girl Scouts, Are you ready for a year of fun, friendship and adventure? Do you want to learn how to do new things and be a leader in your community? Then let s get started! Every
Essential SharePoint Search Hints for 2010 and Beyond
Essential SharePoint Search Hints for 2010 and Beyond The purpose of this paper is to provide some helpful hints for creating search queries that will improve your odds of getting the results you want.
Tabletop Hopscotch Learn about online safety with this fun game
Tabletop Hopscotch Learn about online safety with this fun game Girls learn the importance of online safety, when they participate in this hopping fun game! Tips for safe online marketing of Girl Scout
Excel: Introduction to Formulas
Excel: Introduction to Formulas Table of Contents Formulas Arithmetic & Comparison Operators... 2 Text Concatenation... 2 Operator Precedence... 2 UPPER, LOWER, PROPER and TRIM... 3 & (Ampersand)... 4
Unix Shell Scripts. Contents. 1 Introduction. Norman Matloff. July 30, 2008. 1 Introduction 1. 2 Invoking Shell Scripts 2
Unix Shell Scripts Norman Matloff July 30, 2008 Contents 1 Introduction 1 2 Invoking Shell Scripts 2 2.1 Direct Interpretation....................................... 2 2.2 Indirect Interpretation......................................
Email Data Protection. Administrator Guide
Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,
Real SQL Programming 1
Real 1 We have seen only how SQL is used at the generic query interface an environment where we sit at a terminal and ask queries of a database. Reality is almost always different: conventional programs
K-1 Common Core Writing Santa Fe Public Schools Presented by: Sheryl White
K-1 Common Core Writing Santa Fe Public Schools Presented by: Sheryl White Session Objectives Review expectations in Common Core Writing Gain ideas for teaching opinion writing Collaborate and articulate
