Project 1 General Approach.

Slides:



Advertisements
Similar presentations
Repeated Addition Or Adding up.
Advertisements

The Conclusion Paragraph
Tr. translate characters - standard input. tr x y < namesAndNumbers.txt translated from x to y in file namesAndNumbers.txt tr can be used to produce more.
Designing Algorithms Csci 107 Lecture 4. Outline Last time Computing 1+2+…+n Adding 2 n-digit numbers Today: More algorithms Sequential search Variations.
Project topics Projects are due till the end of May Choose one of these topics or think of something else you’d like to code and send me the details (so.
 *, ? And [ …] . Any single character  ^ beginning of a line  $ end of the line.
1 Lab Session-3 CSIT221 Spring 2003 b Group Worksheet 3 Exercise (Demo Required) b No new lab demo will be assigned to allow you to focus on HW#1.
Designing Algorithms Csci 107 Lecture 4.
CS 497C – Introduction to UNIX Lecture 23: - Simple Filters Chin-Chih Chang
Strings Edward J. Biebel. Strings Strings are fundamental part of all computing languages. At the basic level, they are just a data structure that can.
Grep, comm, and uniq. The grep Command The grep command allows a user to search for specific text inside a file. The grep command will find all occurrences.
1 Scanning Tokens. 2 Tokens When a Scanner reads input, it separates it into “tokens”  … at least when using methods like nextInt()  nextInt() takes.
UNIX Filters.
Filters using Regular Expressions grep: Searching a Pattern.
Linux Tools. Tar tar – (Tape Archive). This is a tool for archiving files and directory hierarchies. tar output can be sent to stdout using the – file.
Chapter 10: Working with Large Data Spreadsheet-Based Decision Support Systems Prof. Name Position (123) University Name.
Computer Programming for Biologists Class 5 Nov 20 st, 2014 Karsten Hokamp
CPSC 388 – Compiler Design and Construction Scanners – JLex Scanner Generator.
Agenda Regular Expressions (Appendix A in Text) –Definition / Purpose –Commands that Use Regular Expressions –Using Regular Expressions –Using the Replacement.
Computer Programming TCP1224 Chapter 13 Sequential File Access.
Unix Environment Input Output 2  List Content (ls) ◦ ls (list current directory) ◦ ls –all (include hidden files/folders)  Make directory (mkdir) ◦
 for loop  while loop  do-while loop for (begin point; end point ; incrementation ) { //statements to be repeated }
Homework #4: Operator Overloading and Strings By J. H. Wang Apr. 17, 2009.
Files in Python Output techniques. Outputting to a file There are two ways to do this in Python – print (more familiar, more flexible) – write (more restrictive)
Importing Data to Excel. Suppose you have a delimited* text file and you need to bring it into Excel. Follow these steps… *Delimited means text separated.
Our World- Unit 1: Mapping Types of Questions 1. Literal Book page 17: Examples How old are you? When is your birthday? What’s your name? Examples: Book.
Browse Index Keyword Index Browse Index – 1xx, 24x, 6xx, 7xx Keyword Index – 1xx, 2xx, 6xx, 7xx, plus 5xx.
CSC 352– Unix Programming, Spring 2015 February 2015 Unix Filters.
Files in Python The Basics. Why use Files? Very small amounts of data – just hardcode them into the program A few pieces of data – ask the user to input.
1 CSE 2337 Chapter 7 Organizing Data. 2 Overview Import unstructured data Concatenation Parse Create Excel Lists.
Review: A Computational View Programming language common concepts: 1. sequence of instructions -> order of operations important 2. conditional structures.
Awk 2 – more awk. AWK INVOCATION AND OPERATION the "-F" option allows changing Awk's "field separator" character. Awk regards each line of input data.
Examples of using Grapacc
Topics discussed in this section:
Tutorial On Lex & Yacc.
Vi Editor.
String Processing.
Scrolling text repeating until end of slide.
W Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
Structured Programming (Top Down Step Refinement)
My Penguin Math Book By:
Poster Title Researchers’ Names Company or Institution
BUTTERFLY EFFECT DIAGRAM
Using files Taken from notes by Dr. Neil Moore
B Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
A poorly named Curt Hill utility program
H Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
B Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
W Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
Word Map Word Maps are DUE on Friday.
Atelier Progress Report
H Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
W Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
Year 2 Spring Term Week 3 Lesson 5
C Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
W Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
String Processing.
YOUR text YOUR text YOUR text YOUR text
My Penguin Math Book By:
Year 2 Spring Term Week 3 Lesson 5
Similarities Differences
IT Solutions for Administrators - Databases
Regular Expressions and Lexical Analysis
Topics discussed in this section:
W Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
W Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
Introduction to Computer Science
Chapter 13 Control Structures
H Customize this banner with your own message! Select the letter and add your own text. Use one character per slide.
Finding the maximum matching of a bipartite graph
Presentation transcript:

Project 1 General Approach

General Approach Input text file Create a Text object Using the Text object with its List of Tokens

DistinctWordList For each token that is not a delimiter, create a DistinctWord Search DistinctWordList to see if it is present If not, add it to the DistinctWordList If so, increment its count

SentenceList Search List of Tokens for any of .?! Everything up to and including first match is a sentence Starting with Token after the first .?!, repeat the process

ParaGraphList Similar to SentenceList but look for consecutive “newline” characters