SlideShare uma empresa Scribd logo
1 de 21
Regular Expressions

   How do they work
Several important Facts
1. Everything in computing was discovered in
one form or another in the 70-80’s and was
probably thought about during the 60’s.
2. The easiest way to become a great computer
engineer in the 80’s was to work for Bell Labs
and have a beard.
Back to the subject at hand
What are regular expressions?
From Wikipedia:
In computing, a regular expression provides a
concise and flexible means to "match" (specify
and recognize) strings of text, such as particular
characters, words, or patterns of characters.
Common abbreviations for "regular expression"
include regex and regexp.
Why do we need regular expressions
         (in programming)
Many reasons but most of them are in their base
finding strings in text .
Preferably without reading it

^(?("")(""[^""]+?""@)|(([0-9a-z]((.(?!.))|[-
!#$%&'*+/=?^`{}|~w])*)(?<=[0-9a-
z])@))(?([)([(d{1,3}.){3}d{1,3}])|(([0-9a-z][-
w]*[0-9a-z]*.)+[a-z0-9]{2,17}))$

^(?=.*[^a-zA-Z])(?=.*[a-z])(?=.*[A-Z])S{8,}$
Regular Expressions Syntax
            meta characters
 Grouping
     . – match any other character
     [ ] – grouping, match single character that is inside the group
     [^ ] – grouping, match single character that is not inside the group
     ( ) – sub expression, in Perl can be recalled later from special variables
 Quantifier
     {m,n} –specifies that the character/sub expression before need to be matched
      at least m times and no more than n times
     * - derived from Kleene star in formal logic, matches 0 or more amount of the
      character before it.
     ? –matches zero or one of the preceding elements
     + - derived from Kleene cross in formal logic, matches 1 or more of the
      character before it.
 Location
     ^ - Marking start of line
     $ - Marking end of line
Regular Expressions Syntax
               Character groups
 [:alpha:] - Any alphabetical character - [A-Za-z]
 [:alnum:] - Any alphanumeric character - [A-Za-z0-9]
 [:ascii:] - Any character in the ASCII character set.[:blank:] - A GNU
  extension, equal to a space or a horizontal tab ("t")
 [:cntrl:] - Any control character
 [:digit:] - Any decimal digit - [0-9], equivalent to "d“
 [:graph:] - Any printable character, excluding a space
 [:lower:] - Any lowercase character - [a-z]
 [:print:] - Any printable character, including a space
 [:punct:] - Any graphical character excluding "word" characters
 [:space:] - Any whitespace character. "s" plus the vertical tab ("cK")
 [:upper:] - Any uppercase character - [A-Z]
 [:word:] - A Perl extension - [A-Za-z0-9_], equivalent to "w“
 [:xdigit:] - Any hexadecimal digit - [0-9a-fA-F].
What is a regular expression engine
A regular expression engine is a program that takes
a set of constraints specified in a mini-
language, and then applies those constraints to a
target string, and determines whether or not the
string satisfies the constraints.

In less grandiose terms, the first part of the job is to
turn a pattern into something the computer can
efficiently use to find the matching point in the
string, and the second part is performing the search
itself.
Famous Regex Engines
Part 2
How the Perl Regex engine works
• Unlike the army only two steps
  – Compilation
     • Parsing (Size, Construction)
     • Peep-hole optimization and analysis
  – Execution
     • Start position and no-match optimizations
     • Program execution
DFA
DFA
NFA
 Equal in strength to DFA
            Smaller in size
Ken Thompson
Thompson NFA method
• In 1968 Thompson wrote an article on how to
  convert a regular expression to still unnamed
  automata (NFA)
• The article included code to explain the point
Thompson NFA method
1. Check the regex and inject . For concat action
a(b|c)*d
2. Convert to reverse polish notation
abc|*.d.
Thompson NFA method cont.
Check single character

                                      OR
        char

                                      exp
                                      exp
                  Kleene star


                                exp
Thompson NFA method cont.
• 3.Build the NFA

                        B
       A
                        C


                    D
Problems for regex
• NLP

• Unicode vs. ASCII
Some examples of Regex
• ([^s]+(.(?i)(jpg|png|gif|bmp))$)
   – Match file with specific extentions
• ^(https?://)?([da-z.-]+).([a-z.]{2,6})([/w
  .-]*)*/?$
   – Match URL
• /^#?([a-f0-9]{6}|[a-f0-9]{3})$/
   – Match a hex value
• [ -~]
   – An interesting one.

Mais conteúdo relacionado

Mais procurados

Regular expressions
Regular expressionsRegular expressions
Regular expressions
Raj Gupta
 
Regex Presentation
Regex PresentationRegex Presentation
Regex Presentation
arnolambert
 

Mais procurados (20)

Regular expression
Regular expressionRegular expression
Regular expression
 
Regular expressions
Regular expressionsRegular expressions
Regular expressions
 
Regular expressions in Python
Regular expressions in PythonRegular expressions in Python
Regular expressions in Python
 
Textpad and Regular Expressions
Textpad and Regular ExpressionsTextpad and Regular Expressions
Textpad and Regular Expressions
 
Regular expressions
Regular expressionsRegular expressions
Regular expressions
 
Ajax ppt - 32 slides
Ajax ppt - 32 slidesAjax ppt - 32 slides
Ajax ppt - 32 slides
 
3.2 javascript regex
3.2 javascript regex3.2 javascript regex
3.2 javascript regex
 
MYSQL - PHP Database Connectivity
MYSQL - PHP Database ConnectivityMYSQL - PHP Database Connectivity
MYSQL - PHP Database Connectivity
 
Regex Presentation
Regex PresentationRegex Presentation
Regex Presentation
 
CSS Transitions, Transforms, Animations
CSS Transitions, Transforms, Animations CSS Transitions, Transforms, Animations
CSS Transitions, Transforms, Animations
 
Regular expression
Regular expressionRegular expression
Regular expression
 
Regular Languages
Regular LanguagesRegular Languages
Regular Languages
 
Introduction to Regular Expressions
Introduction to Regular ExpressionsIntroduction to Regular Expressions
Introduction to Regular Expressions
 
Lecture 02 lexical analysis
Lecture 02 lexical analysisLecture 02 lexical analysis
Lecture 02 lexical analysis
 
Javascript
JavascriptJavascript
Javascript
 
Webinar : P, NP, NP-Hard , NP - Complete problems
Webinar : P, NP, NP-Hard , NP - Complete problems Webinar : P, NP, NP-Hard , NP - Complete problems
Webinar : P, NP, NP-Hard , NP - Complete problems
 
Parsing
ParsingParsing
Parsing
 
Automata theory -RE to NFA-ε
Automata theory -RE to  NFA-εAutomata theory -RE to  NFA-ε
Automata theory -RE to NFA-ε
 
Binary Search Tree and Heap in Prolog
Binary Search Tree and Heap in PrologBinary Search Tree and Heap in Prolog
Binary Search Tree and Heap in Prolog
 
Regular expression in javascript
Regular expression in javascriptRegular expression in javascript
Regular expression in javascript
 

Destaque

Destaque (15)

Lecture: Regular Expressions and Regular Languages
Lecture: Regular Expressions and Regular LanguagesLecture: Regular Expressions and Regular Languages
Lecture: Regular Expressions and Regular Languages
 
Overlay automata and algorithms for fast and scalable regular expression matc...
Overlay automata and algorithms for fast and scalable regular expression matc...Overlay automata and algorithms for fast and scalable regular expression matc...
Overlay automata and algorithms for fast and scalable regular expression matc...
 
Regular Expressions
Regular ExpressionsRegular Expressions
Regular Expressions
 
Tests
TestsTests
Tests
 
Lecture2 B
Lecture2 BLecture2 B
Lecture2 B
 
Lecture 03 lexical analysis
Lecture 03 lexical analysisLecture 03 lexical analysis
Lecture 03 lexical analysis
 
Finite Automata
Finite AutomataFinite Automata
Finite Automata
 
Regular expression with DFA
Regular expression with DFARegular expression with DFA
Regular expression with DFA
 
Field Extractions: Making Regex Your Buddy
Field Extractions: Making Regex Your BuddyField Extractions: Making Regex Your Buddy
Field Extractions: Making Regex Your Buddy
 
Theory of computing pdf
Theory of computing pdfTheory of computing pdf
Theory of computing pdf
 
Finite State Automata
Finite State AutomataFinite State Automata
Finite State Automata
 
Optimization of dfa
Optimization of dfaOptimization of dfa
Optimization of dfa
 
Lec 3 ---- dfa
Lec 3  ---- dfaLec 3  ---- dfa
Lec 3 ---- dfa
 
Regular language and Regular expression
Regular language and Regular expressionRegular language and Regular expression
Regular language and Regular expression
 
Finite Automata
Finite AutomataFinite Automata
Finite Automata
 

Semelhante a Regular expressions

Learning notes of r for python programmer (Temp1)
Learning notes of r for python programmer (Temp1)Learning notes of r for python programmer (Temp1)
Learning notes of r for python programmer (Temp1)
Chia-Chi Chang
 
Regular Expressions and You
Regular Expressions and YouRegular Expressions and You
Regular Expressions and You
James Armes
 
Regular Expressions grep and egrep
Regular Expressions grep and egrepRegular Expressions grep and egrep
Regular Expressions grep and egrep
Tri Truong
 
Ejercicios de estilo en la programación
Ejercicios de estilo en la programaciónEjercicios de estilo en la programación
Ejercicios de estilo en la programación
Software Guru
 

Semelhante a Regular expressions (20)

Introduction To Regex in Lasso 8.5
Introduction To Regex in Lasso 8.5Introduction To Regex in Lasso 8.5
Introduction To Regex in Lasso 8.5
 
Regular expressions and php
Regular expressions and phpRegular expressions and php
Regular expressions and php
 
Learning notes of r for python programmer (Temp1)
Learning notes of r for python programmer (Temp1)Learning notes of r for python programmer (Temp1)
Learning notes of r for python programmer (Temp1)
 
Quick start reg ex
Quick start reg exQuick start reg ex
Quick start reg ex
 
Course 102: Lecture 13: Regular Expressions
Course 102: Lecture 13: Regular Expressions Course 102: Lecture 13: Regular Expressions
Course 102: Lecture 13: Regular Expressions
 
Regular Expressions 2007
Regular Expressions 2007Regular Expressions 2007
Regular Expressions 2007
 
Regular Expressions and You
Regular Expressions and YouRegular Expressions and You
Regular Expressions and You
 
Regular Expressions grep and egrep
Regular Expressions grep and egrepRegular Expressions grep and egrep
Regular Expressions grep and egrep
 
Unit I - 1R introduction to R program.pptx
Unit I - 1R introduction to R program.pptxUnit I - 1R introduction to R program.pptx
Unit I - 1R introduction to R program.pptx
 
P3 2018 python_regexes
P3 2018 python_regexesP3 2018 python_regexes
P3 2018 python_regexes
 
2.regular expressions
2.regular expressions2.regular expressions
2.regular expressions
 
Lexicalanalyzer
LexicalanalyzerLexicalanalyzer
Lexicalanalyzer
 
Lexicalanalyzer
LexicalanalyzerLexicalanalyzer
Lexicalanalyzer
 
P3 2017 python_regexes
P3 2017 python_regexesP3 2017 python_regexes
P3 2017 python_regexes
 
Regular expression for everyone
Regular expression for everyoneRegular expression for everyone
Regular expression for everyone
 
Bioinformatica p2-p3-introduction
Bioinformatica p2-p3-introductionBioinformatica p2-p3-introduction
Bioinformatica p2-p3-introduction
 
Handling of character strings C programming
Handling of character strings C programmingHandling of character strings C programming
Handling of character strings C programming
 
Using Regular Expressions and Staying Sane
Using Regular Expressions and Staying SaneUsing Regular Expressions and Staying Sane
Using Regular Expressions and Staying Sane
 
Ejercicios de estilo en la programación
Ejercicios de estilo en la programaciónEjercicios de estilo en la programación
Ejercicios de estilo en la programación
 
0-Slot21-22-Strings.pdf
0-Slot21-22-Strings.pdf0-Slot21-22-Strings.pdf
0-Slot21-22-Strings.pdf
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

Regular expressions

  • 1. Regular Expressions How do they work
  • 2. Several important Facts 1. Everything in computing was discovered in one form or another in the 70-80’s and was probably thought about during the 60’s. 2. The easiest way to become a great computer engineer in the 80’s was to work for Bell Labs and have a beard.
  • 3. Back to the subject at hand
  • 4. What are regular expressions? From Wikipedia: In computing, a regular expression provides a concise and flexible means to "match" (specify and recognize) strings of text, such as particular characters, words, or patterns of characters. Common abbreviations for "regular expression" include regex and regexp.
  • 5. Why do we need regular expressions (in programming) Many reasons but most of them are in their base finding strings in text . Preferably without reading it ^(?("")(""[^""]+?""@)|(([0-9a-z]((.(?!.))|[- !#$%&'*+/=?^`{}|~w])*)(?<=[0-9a- z])@))(?([)([(d{1,3}.){3}d{1,3}])|(([0-9a-z][- w]*[0-9a-z]*.)+[a-z0-9]{2,17}))$ ^(?=.*[^a-zA-Z])(?=.*[a-z])(?=.*[A-Z])S{8,}$
  • 6. Regular Expressions Syntax meta characters  Grouping  . – match any other character  [ ] – grouping, match single character that is inside the group  [^ ] – grouping, match single character that is not inside the group  ( ) – sub expression, in Perl can be recalled later from special variables  Quantifier  {m,n} –specifies that the character/sub expression before need to be matched at least m times and no more than n times  * - derived from Kleene star in formal logic, matches 0 or more amount of the character before it.  ? –matches zero or one of the preceding elements  + - derived from Kleene cross in formal logic, matches 1 or more of the character before it.  Location  ^ - Marking start of line  $ - Marking end of line
  • 7. Regular Expressions Syntax Character groups  [:alpha:] - Any alphabetical character - [A-Za-z]  [:alnum:] - Any alphanumeric character - [A-Za-z0-9]  [:ascii:] - Any character in the ASCII character set.[:blank:] - A GNU extension, equal to a space or a horizontal tab ("t")  [:cntrl:] - Any control character  [:digit:] - Any decimal digit - [0-9], equivalent to "d“  [:graph:] - Any printable character, excluding a space  [:lower:] - Any lowercase character - [a-z]  [:print:] - Any printable character, including a space  [:punct:] - Any graphical character excluding "word" characters  [:space:] - Any whitespace character. "s" plus the vertical tab ("cK")  [:upper:] - Any uppercase character - [A-Z]  [:word:] - A Perl extension - [A-Za-z0-9_], equivalent to "w“  [:xdigit:] - Any hexadecimal digit - [0-9a-fA-F].
  • 8. What is a regular expression engine A regular expression engine is a program that takes a set of constraints specified in a mini- language, and then applies those constraints to a target string, and determines whether or not the string satisfies the constraints. In less grandiose terms, the first part of the job is to turn a pattern into something the computer can efficiently use to find the matching point in the string, and the second part is performing the search itself.
  • 11. How the Perl Regex engine works • Unlike the army only two steps – Compilation • Parsing (Size, Construction) • Peep-hole optimization and analysis – Execution • Start position and no-match optimizations • Program execution
  • 12. DFA
  • 13. DFA
  • 14. NFA Equal in strength to DFA Smaller in size
  • 16. Thompson NFA method • In 1968 Thompson wrote an article on how to convert a regular expression to still unnamed automata (NFA) • The article included code to explain the point
  • 17. Thompson NFA method 1. Check the regex and inject . For concat action a(b|c)*d 2. Convert to reverse polish notation abc|*.d.
  • 18. Thompson NFA method cont. Check single character OR char exp exp Kleene star exp
  • 19. Thompson NFA method cont. • 3.Build the NFA B A C D
  • 20. Problems for regex • NLP • Unicode vs. ASCII
  • 21. Some examples of Regex • ([^s]+(.(?i)(jpg|png|gif|bmp))$) – Match file with specific extentions • ^(https?://)?([da-z.-]+).([a-z.]{2,6})([/w .-]*)*/?$ – Match URL • /^#?([a-f0-9]{6}|[a-f0-9]{3})$/ – Match a hex value • [ -~] – An interesting one.

Notas do Editor

  1. Where they worked on MULTICS which later became unix
  2. From XKCD
  3. The first is for email from MSDN the second is for a password of 8 characters with atleast one lowercase upper case and other symbol
  4. This is from the POSIX specification
  5. Again those are the POSIX groups which are not implemented everywhere the examples are for Perl regex
  6. Camel for Perl, Japaneas for Onigurama (Devil Chariot), Henry Spencers picture, PCRE logo, google for RE2 and a gnu for the GNU REGEX
  7. In compiler theory, peephole optimization is a kind of optimization performed over a very small set of instructions in a segment of generated code. The set is called a &quot;peephole&quot; or a &quot;window&quot;. It works by recognising sets of instructions that can be replaced by shorter or faster set of instructions.The execution is including other algorithms like Bayer-Moore and other ways to shorten execution timeFunctions – compilationReg() for parsingReg_branch() Reg_piece()Reg_atom()Reg_tail()Study_chunk() for optimizationFunctions – ExecutionRe_intuit_start() – for starting locationsReg_try()Regmatch()
  8. Not the department of foreign affairs
  9. Accepts the language of all numbers ends with 10 or 01
  10. NFA’s transition table for the regex (l|e)*n?(i|e)el*
  11. Thompson on the left and ritchy on the rightThompson invented B helped inventing CAlso created worked on QED and ed, and invented regular expressionsHelped develop utf8 and the go language
  12. The original article included algol code for the IBM mainframe and was implanted in QED editor
  13. Reverse polish notation is used to remove ambiguity and make it easier to work with stack
  14. Natural language processing is becoming common due to computer speed and massive amounts of data, using statistical tools.UNICODE VS ASCII is a problem for developer due to characters that might be cought as the same while being different
  15. Notice it doesn’t use the xdigit which is not supported in all engines