String.Scanandextract()

Total Page:16

File Type:pdf, Size:1020Kb

String.Scanandextract() PowerView Function Reference TRACE32 Online Help TRACE32 Directory TRACE32 Index TRACE32 Documents ...................................................................................................................... PRACTICE Script Language ......................................................................................................... TRACE32 Functions ................................................................................................................... PowerView Function Reference ............................................................................................. 1 History ................................................................................................................................... 9 In This Document ................................................................................................................. 10 AREA Functions ................................................................................................................... 11 In This Section 11 AREA.COUNT() Number of existing message areas 11 AREA.EXIST() Check if message area exists 11 AREA.LINE() Extract line from message area 12 AREA.MAXCOUNT() Maximal number of message areas 12 AREA.NAME() Names of existing message areas 13 AREA.SELECTed() Name of active message area 13 AREA.SIZE.COLUMNS() Columns of a message area 14 AREA.SIZE.LINES() Lines of a message area 14 CLOCK Functions ................................................................................................................ 14 CONFIG Function ................................................................................................................. 15 CONFIG.SCREEN() Check if screen output is switched on 15 CONVert Functions .............................................................................................................. 16 In This Section 16 CONVert.ADDRESSTODUALPORT() Dualport access class 16 CONVert.ADDRESSTONONSECURE() Non-secure access class 17 CONVert.ADDRESSTOSECURE() Secure access class 17 CONvert.BOOLTOINT() Boolean to integer 18 CONVert.CHAR() Integer to ASCII character 18 CONVert.FLOATTOINT() Float to integer 19 CONVert.HEXTOINT() Hex to integer 19 CONVert.INTTOBOOL() Integer to boolean 20 CONVert.INTTOFLOAT() Integer to floating point value 20 CONVert.INTTOHEX() Integer to hex 21 CONVert.INTTOMASK() Compose bit-mask from integer value and mask 21 CONVert.MASKMTOINT() Bits set to don't-care in given bit-mask 22 ©1989-2021 Lauterbach GmbH PowerView Function Reference 1 CONVert.MASKTOINT() Bits set to 1 in given bit-mask 23 CONVert.OCTaltoint() Octal to decimal 23 CONVert.SignedByte() 1 byte to 8 bytes 24 CONVert.SignedLong() 4 bytes to 8 bytes 24 CONVert.SignedWord() 2 bytes to 8 bytes 25 CONVert.TIMEMSTOINT() Time to milliseconds 25 CONVert.TIMENSTOINT() Time to nanoseconds 26 CONVert.TIMERAWTOINT() Time to TRACE32 timer ticks 26 CONVert.TIMESTOINT() Time to seconds 26 CONVert.TIMEUSTOINT() Time to microseconds 27 CONVert.TOLOWER() String to lower case 28 CONVert.TOUPPER() String to upper case 28 DATE Functions ................................................................................................................... 29 In This Section 29 DATE.DATE() Current date 29 DATE.DAY() Today’s date 29 DATE.MakeUnixTime() Date to Unix timestamp 30 DATE.MONTH() Number of current month 31 DATE.SECONDS() Seconds since midnight 31 DATE.TIME() Current time 31 DATE.TimeZone() Time zone identifier and hh:mm:ss 32 DATE.UnixTime() Seconds since Jan 1970 32 DATE.UnixTimeUS() Microseconds since Jan 1970 32 DATE.utcOffset() Offset of current local time to UTC 33 DATE.YEAR() Current year 33 DIALOG Functions ............................................................................................................... 34 In This Section 34 DIALOG.BOOLEAN() Current boolean value of checkbox 34 DIALOG.EXIST() Existence of dialog element 35 DIALOG.STRing() Current string value of dialog element, e.g. EDIT box 36 DIALOG.STRing2() Comma-separated list of values, e.g. from LISTBOX 37 ERROR Functions ................................................................................................................ 38 In This Section 38 ERROR.CMDLINE() Erroneous command 38 ERROR.FIRSTID() ID of first error 38 ERROR.ID() ID of last error message 39 ERROR.MESSAGE() Error text 40 ERROR.OCCURRED() Error status 40 ERROR.POSITION() Error position 40 EVAL Functions .................................................................................................................... 41 In This Section 41 EVAL() Value of expression evaluated with Eval command 41 ©1989-2021 Lauterbach GmbH PowerView Function Reference 2 EVAL.STRing() String composed by expression evaluated with Eval cmd. 41 EVAL.TIme() Value of time evaluated with Eval command 41 EVAL.TYPE() Type of expression evaluated with Eval command 42 FALSE Function ................................................................................................................... 43 FALSE() Boolean expression 43 FILE Functions ..................................................................................................................... 44 In This Section 44 __FILE__() Directory of current PRACTICE script 44 __LINE__() Number of script line to be executed next 44 FILE.EOF() Check if end of read-in file has been reached 44 FILE.EOFLASTREAD() Check if last read from file reached the end of the file 45 FILE.EXIST() Check if file exists 46 FILE.OPEN() Check if file is open 46 FILE.SUM() Get checksum from a file 46 FILE.TYPE() File type of loaded file 47 FORMAT Functions .............................................................................................................. 48 In This Section 48 FORMAT.BINary() Numeric to binary value (leading spaces) 48 FORMAT.CHAR() Numeric to ASCII character (fixed length) 49 FORMAT.Decimal() Numeric to string (leading spaces) 50 FORMAT.DecimalU() Numeric to unsigned decimal as string (leading spaces) 51 FORMAT.DecimalUZ() Numeric to unsigned decimal as string (leading zeros) 52 FORMAT.FLOAT() Floating point value to string 53 FORMAT.HEX() Numeric to hex (leading zeros) 54 FORMAT.STRing() Output string with fixed length 55 FORMAT.TIME() Time to string (leading spaces) 56 FORMAT.UDECIMAL() Refer to FORMAT.DecimalU() 56 FORMAT.UDECIMALZ() Refer to FORMAT.DecimalUZ() 57 FORMAT.UnixTime() Format Unix timestamps 57 FOUND Functions ................................................................................................................ 61 In This Section 61 FOUND() TRUE() if search item was found 61 FOUND.COUNT() Number of occurrences found 62 GDB Function (TRACE32 as GDB Back-End) .................................................................... 63 GDB.PORT() Port number for communication via GDB interface 63 HELP Function ...................................................................................................................... 64 HELP.MESSAGE() Help search item 64 HOST Functions ................................................................................................................... 65 HOSTID() Host ID 65 HOSTIP() Host IP address 65 IFCONFIG and IFTEST Functions ....................................................................................... 66 ©1989-2021 Lauterbach GmbH PowerView Function Reference 3 In This Section 66 IFCONFIG.COLLISIONS() Collisions since start-up 66 IFCONFIG.CONFIGURATION() Connection type 67 IFCONFIG.DEVICENAME() Name of TRACE32 device 67 IFCONFIG.ERRORS() Errors since start-up 67 IFCONFIG.ETHernetADDRESS() MAC address of TRACE32 device 67 IFCONFIG.IPADDRESS() IP address of TRACE32 device 68 IFCONFIG.RESYNCS() Resyncs since start-up 68 IFCONFIG.RETRIES() Retries since start-up 68 IFTEST.DOWNLOAD() Download in KByte/sec 69 IFTEST.LATENCY() Latency in microseconds 69 IFTEST.UPLOAD() Upload in KByte/sec 69 InterCom Functions ............................................................................................................. 70 In This Section 70 InterCom.GetGlobalMacro() Exchange strings between PowerView instances 70 InterCom.GetPracticeState() PRACTICE run-state on other instance 71 InterCom.NAME() InterCom name of this TRACE32 instance 71 InterCom.PING() Check if ping is successful 72 InterCom.PODPORT() Port number of any TRACE32 instance 73 InterCom.PODPORTNAME() InterCom name of any TRACE32 instance 74 InterCom.PODPORTNUMBER() Number of TRACE32 instances 75 InterCom.PORT() Port number of this TRACE32 instance 76 LICENSE Functions .............................................................................................................. 77 In This Section 77 LICENSE.DATE() Expiration date of maintenance contract 77 LICENSE.FAMILY() Name of the CPU family license 77 LICENSE.FEATURES() List of features licensed 78 LICENSE.getINDEX() Index of maintenance contract 78 LICENSE.GRANTED() License state 79 LICENSE.HAVEFEATURE() Checks if license is stored in debugger hardware 79 LICENSE.MSERIAL() Serial number of the maintenance contract 80 LICENSE.MULTICORE() Check if multicore debugging is licensed 80 LICENSE.RequiredForCPU() License required for selected CPU 80 LICENSE.SERIAL() Serial number of debug cable 81 LOG Function ....................................................................................................................... 82 LOG.DO.FILE() Get log file used by LOG.DO 82 Mathematical Functions ...................................................................................................... 83 In This Section 83 math.ABS() Absolute value of decimal
Recommended publications
  • At—At, Batch—Execute Commands at a Later Time
    at—at, batch—execute commands at a later time at [–csm] [–f script] [–qqueue] time [date] [+ increment] at –l [ job...] at –r job... batch at and batch read commands from standard input to be executed at a later time. at allows you to specify when the commands should be executed, while jobs queued with batch will execute when system load level permits. Executes commands read from stdin or a file at some later time. Unless redirected, the output is mailed to the user. Example A.1 1 at 6:30am Dec 12 < program 2 at noon tomorrow < program 3 at 1945 pm August 9 < program 4 at now + 3 hours < program 5 at 8:30am Jan 4 < program 6 at -r 83883555320.a EXPLANATION 1. At 6:30 in the morning on December 12th, start the job. 2. At noon tomorrow start the job. 3. At 7:45 in the evening on August 9th, start the job. 4. In three hours start the job. 5. At 8:30 in the morning of January 4th, start the job. 6. Removes previously scheduled job 83883555320.a. awk—pattern scanning and processing language awk [ –fprogram–file ] [ –Fc ] [ prog ] [ parameters ] [ filename...] awk scans each input filename for lines that match any of a set of patterns specified in prog. Example A.2 1 awk '{print $1, $2}' file 2 awk '/John/{print $3, $4}' file 3 awk -F: '{print $3}' /etc/passwd 4 date | awk '{print $6}' EXPLANATION 1. Prints the first two fields of file where fields are separated by whitespace. 2. Prints fields 3 and 4 if the pattern John is found.
    [Show full text]
  • Application for a Certificate of Eligibility to Employ Child Performers
    Division of Labor Standards Permit and Certificate Unit Harriman State Office Campus Building 12, Room 185B Albany, NY 12240 www.labor.ny.gov Application for a Certificate of Eligibility to Employ Child Performers A. Submission Instructions A Certificate of Eligibility to Employ Child Performers must be obtained prior to employing any child performer. Certificates are renew able every three (3) years. To obtain or renew a certificate: • Complete Parts B, C, D and E of this application. • Attach proof of New York State Workers’ Compensation and Disability Insurance. o If you currently have employees in New York, you must provide proof of coverage for those New York State w orkers by attaching copies of Form C-105.2 and DB-120.1, obtainable from your insurance carrier. o If you are currently exempt from this requirement, complete Form CE-200 attesting that you are not required to obtain New York State Workers’ Compensation and Disability Insurance Coverage. Information on and copies of this form are available from any district office of the Workers’ Compensation Board or from their w ebsite at w ww.wcb.ny.gov, Click on “WC/DB Exemptions,” then click on “Request for WC/DB Exemptions.” • Attach a check for the correct amount from Section D, made payable to the Commissioner of Labor. • Sign and mail this completed application and all required documents to the address listed above. If you have any questions, call (518) 457-1942, email [email protected] or visit the Department’s w ebsite at w ww.labor.ny.gov B. Type of Request (check one) New Renew al Current certificate number _______________________________________________ Are you seeking this certificate to employ child models? Yes No C.
    [Show full text]
  • Unix Introduction
    Unix introduction Mikhail Dozmorov Summer 2018 Mikhail Dozmorov Unix introduction Summer 2018 1 / 37 What is Unix Unix is a family of operating systems and environments that exploits the power of linguistic abstractions to perform tasks Unix is not an acronym; it is a pun on “Multics”. Multics was a large multi-user operating system that was being developed at Bell Labs shortly before Unix was created in the early ’70s. Brian Kernighan is credited with the name. All computational genomics is done in Unix http://www.read.seas.harvard.edu/~kohler/class/aosref/ritchie84evolution.pdfMikhail Dozmorov Unix introduction Summer 2018 2 / 37 History of Unix Initial file system, command interpreter (shell), and process management started by Ken Thompson File system and further development from Dennis Ritchie, as well as Doug McIlroy and Joe Ossanna Vast array of simple, dependable tools that each do one simple task Ken Thompson (sitting) and Dennis Ritchie working together at a PDP-11 Mikhail Dozmorov Unix introduction Summer 2018 3 / 37 Philosophy of Unix Vast array of simple, dependable tools Each do one simple task, and do it really well By combining these tools, one can conduct rather sophisticated analyses The Linux help philosophy: “RTFM” (Read the Fine Manual) Mikhail Dozmorov Unix introduction Summer 2018 4 / 37 Know your Unix Unix users spend a lot of time at the command line In Unix, a word is worth a thousand mouse clicks Mikhail Dozmorov Unix introduction Summer 2018 5 / 37 Unix systems Three common types of laptop/desktop operating systems: Windows, Mac, Linux. Mac and Linux are both Unix-like! What that means for us: Unix-like operating systems are equipped with “shells”" that provide a command line user interface.
    [Show full text]
  • Program #6: Word Count
    CSc 227 — Program Design and Development Spring 2014 (McCann) http://www.cs.arizona.edu/classes/cs227/spring14/ Program #6: Word Count Due Date: March 11 th, 2014, at 9:00 p.m. MST Overview: The UNIX operating system (and its variants, of which Linux is one) includes quite a few useful utility programs. One of those is wc, which is short for Word Count. The purpose of wc is to give users an easy way to determine the size of a text file in terms of the number of lines, words, and bytes it contains. (It can do a bit more, but that’s all of the functionality that we are concerned with for this assignment.) Counting lines is done by looking for “end of line” characters (\n (ASCII 10) for UNIX text files, or the pair \r\n (ASCII 13 and 10) for Windows/DOS text files). Counting words is also straight–forward: Any sequence of characters not interrupted by “whitespace” (spaces, tabs, end–of–line characters) is a word. Of course, whitespace characters are characters, and need to be counted as such. A problem with wc is that it generates a very minimal output format. Here’s an example of what wc produces on a Linux system when asked to count the content of a pair of files; we can do better! $ wc prog6a.dat prog6b.dat 2 6 38 prog6a.dat 32 321 1883 prog6b.dat 34 327 1921 total Assignment: Write a Java program (completely documented according to the class documentation guidelines, of course) that counts lines, words, and bytes (characters) of text files.
    [Show full text]
  • Configuring UNIX-Specific Settings: Creating Symbolic Links : Snap
    Configuring UNIX-specific settings: Creating symbolic links Snap Creator Framework NetApp September 23, 2021 This PDF was generated from https://docs.netapp.com/us-en/snap-creator- framework/installation/task_creating_symbolic_links_for_domino_plug_in_on_linux_and_solaris_hosts.ht ml on September 23, 2021. Always check docs.netapp.com for the latest. Table of Contents Configuring UNIX-specific settings: Creating symbolic links . 1 Creating symbolic links for the Domino plug-in on Linux and Solaris hosts. 1 Creating symbolic links for the Domino plug-in on AIX hosts. 2 Configuring UNIX-specific settings: Creating symbolic links If you are going to install the Snap Creator Agent on a UNIX operating system (AIX, Linux, and Solaris), for the IBM Domino plug-in to work properly, three symbolic links (symlinks) must be created to link to Domino’s shared object files. Installation procedures vary slightly depending on the operating system. Refer to the appropriate procedure for your operating system. Domino does not support the HP-UX operating system. Creating symbolic links for the Domino plug-in on Linux and Solaris hosts You need to perform this procedure if you want to create symbolic links for the Domino plug-in on Linux and Solaris hosts. You should not copy and paste commands directly from this document; errors (such as incorrectly transferred characters caused by line breaks and hard returns) might result. Copy and paste the commands into a text editor, verify the commands, and then enter them in the CLI console. The paths provided in the following steps refer to the 32-bit systems; 64-bit systems must create simlinks to /usr/lib64 instead of /usr/lib.
    [Show full text]
  • System Calls and I/O
    System Calls and I/O CS 241 January 27, 2012 Copyright ©: University of Illinois CS 241 Staff 1 This lecture Goals Get you familiar with necessary basic system & I/O calls to do programming Things covered in this lecture Basic file system calls I/O calls Signals Note: we will come back later to discuss the above things at the concept level Copyright ©: University of Illinois CS 241 Staff 2 System Calls versus Function Calls? Copyright ©: University of Illinois CS 241 Staff 3 System Calls versus Function Calls Function Call Process fnCall() Caller and callee are in the same Process - Same user - Same “domain of trust” Copyright ©: University of Illinois CS 241 Staff 4 System Calls versus Function Calls Function Call System Call Process Process fnCall() sysCall() OS Caller and callee are in the same Process - Same user - OS is trusted; user is not. - Same “domain of trust” - OS has super-privileges; user does not - Must take measures to prevent abuse Copyright ©: University of Illinois CS 241 Staff 5 System Calls System Calls A request to the operating system to perform some activity System calls are expensive The system needs to perform many things before executing a system call The computer (hardware) saves its state The OS code takes control of the CPU, privileges are updated. The OS examines the call parameters The OS performs the requested function The OS saves its state (and call results) The OS returns control of the CPU to the caller Copyright ©: University of Illinois CS 241 Staff 6 Steps for Making a System Call
    [Show full text]
  • Installation Guide LS Nav 2018 (11.0) Contents
    LS Nav 2018 (11.0) Installation Guide © 2018 LS Retail ehf. All rights reserved. All trademarks belong to their respective holders. ii Installation Guide LS Nav 2018 (11.0) Contents Contents Installation Guide LS Nav 1 Files in This Version 1 LS Nav Setup File 1 Demonstration Database Backup 1 Documentation 1 Objects 2 Objects \ Uninstall 2 Objects \ Upgrade 2 Objects \ Auto Test 2 Online Help 2 Setup \ LS Nav Rapid Installer 2 Setup \ LS Nav Rapid Start 2 Setup \ LS Nav Toolbox 2 Setup \ LS Printing Station 2 Setup 2 Installation 2 Prerequisites 2 Microsoft Dynamics NAV Application Objects Added or Modified by LS Nav 3 Installing LS Nav in a New Database 4 Installing LS Nav in an Existing Database 4 Uninstall 5 Uninstall the LS Nav xx.x Client Components 5 Uninstall the LS Nav xx.x Service Components 5 Uninstall LS Nav from a Microsoft Dynamics NAV Database 5 Database Compilation 6 System Requirements 6 Security Hardening Guide for LS Nav 7 Clear Data Tables That Are Not Included in the Customer’s License 7 Online Help Installation 7 Installation Guide LS Nav 2018 (11.0) iii Contents Local Setup 8 Remote Setup 8 Older Documents 9 Toolbox Installation 10 See Also 10 Installing the Toolbox 10 Client Components Installer 11 Service Components Installer 12 Install Options (Silent Install) 13 Installing Into a Database (Control Add-Ins Table) 14 Web POS Installation 16 See Also (topics in LS Nav Online Help) 17 Installing Microsoft Dynamics NAV for Web POS 17 Importing Control Add-in for Web POS 17 Web POS in Full-Screen Mode 18 LS Nav Auto Tests 18 Prerequisites 18 Installation 19 Objects needed 19 Running 19 1.
    [Show full text]
  • Version 7.8-Systemd
    Linux From Scratch Version 7.8-systemd Created by Gerard Beekmans Edited by Douglas R. Reno Linux From Scratch: Version 7.8-systemd by Created by Gerard Beekmans and Edited by Douglas R. Reno Copyright © 1999-2015 Gerard Beekmans Copyright © 1999-2015, Gerard Beekmans All rights reserved. This book is licensed under a Creative Commons License. Computer instructions may be extracted from the book under the MIT License. Linux® is a registered trademark of Linus Torvalds. Linux From Scratch - Version 7.8-systemd Table of Contents Preface .......................................................................................................................................................................... vii i. Foreword ............................................................................................................................................................. vii ii. Audience ............................................................................................................................................................ vii iii. LFS Target Architectures ................................................................................................................................ viii iv. LFS and Standards ............................................................................................................................................ ix v. Rationale for Packages in the Book .................................................................................................................... x vi. Prerequisites
    [Show full text]
  • ECOGEO Workshop 2: Introduction to Env 'Omics
    ECOGEO Workshop 2: Introduction to Env ‘Omics Unix and Bioinformatics Ben Tully (USC); Ken Youens-Clark (UA) Unix Commands pwd rm grep tail install ls ‘>’ sed cut cd cat nano top mkdir ‘<’ history screen touch ‘|’ $PATH ssh cp sort less df mv uniq head rsync/scp Unix Command Line 1. Open Terminal window Unix Command Line 2. Open Chrome and navigate to Unix tutorial at Protocols.io 3. Group: ECOGEO 4. Protocol: ECOGEO Workshop 2: Unix Module ! This will allow you to copy, paste Unix scripts into terminal window ! ECOGEO Protocols.io for making copy, paste easier Unix Command Line $ ls ls - lists items in the current directory Many commands have additional options that can be set by a ‘-’ $ ls -a Unix Command Line $ ls -a lists all files/directories, including hidden files ‘.’ $ ls -l lists the long format File Permissions | # Link | User | Group | Size | Last modified $ ls -lt lists the long format, but ordered by date last modified Unix Command Line Unix Command Line $ cd ecogeo/ cd - change directory List the contents of the current directory Move into the directory called unix List contents $ pwd pwd - present working directory Unix Command Line /home/c-debi/ecogeo/unix When were we in the directory home? Or c-debi? Or ecogeo? $ cd / Navigates to root directory List contents of root directory This where everything is stored in the computer All the commands we are running live in /bin Unix Command Line / root bin sys home mnt usr c-debi BioinfPrograms cdebi Desktop Downloads ecogeo unix assembly annotation etc Typical Unix Layout Unix Command Line Change directory to home Change directory to c-debi Change directory to ecogeo Change directory to unix List contents Change directory to data Change directory to root Unix Command Line Change directory to unix/data in one step $ cd /home/c-debi/ecogeo/unix/data Tab can be used to auto complete names $ cd .
    [Show full text]
  • Spirent Testcenter Automation Validating the Environment and Configuring the System Variables – an Overview
    Spirent TestCenter Automation Validating the environment and configuring the system variables – an overview August 10 2016 SRE Chicago Vijay Muthucumarasamy Principle Field Service Engineer Spirent Communications PROPRIETARY AND CONFIDENTIAL 1 Agenda Spirent Automation and Supported Platforms Operating System and Validation Environment Set up and Verification • TCL • Python • Perl Lab Server HLTAPI Command Sequencer Q & A Spirent Communications PROPRIETARY AND CONFIDENTIAL 2 Supported OS and API 1. Multi-threaded 2. If you are using Avalanche on Spirent TestCenter, Windows 2008 server is not officially supported at this time. 3. Running as a 32-bit application 4. Requires LabServer 5. Requires openssh-client package **** PLEASE Check the release notes for updated information Spirent Communications PROPRIETARY AND CONFIDENTIAL 3 Spirent API Packages for Linux Environment Spirent Communications PROPRIETARY AND CONFIDENTIAL 4 Verify and Validate the OS & API Before install the STC installation packages • Verify the Operating System - Kernel - CPU - Memory - Validate the requirement : Check the Spirent TestCenter releases and verify Spirent requirements • Verify the API (TCL/Python/Perl) - Release version - Whether 32/64 bit platform - Whether need a Spirent Lab Server - Validate the requirement : Check the Spirent TestCenter releases and verify Spirent requirements Spirent Communications PROPRIETARY AND CONFIDENTIAL 5 Operating System and Validation Verify Kernel version • CentOS/RedHat/Ubuntu - cat /etc/issue - cat /etc/redhat-release
    [Show full text]
  • Debates in the Digital Humanities This Page Intentionally Left Blank DEBATES in the DIGITAL HUMANITIES
    debates in the digital humanities This page intentionally left blank DEBATES IN THE DIGITAL HUMANITIES Matthew K. Gold editor University of Minnesota Press Minneapolis London Chapter 1 was previously published as “What Is Digital Humanities and What’s It Doing in English Departments?” ADE Bulletin, no. 150 (2010): 55– 61. Chap- ter 2 was previously published as “The Humanities, Done Digitally,” The Chron- icle of Higher Education, May 8, 2011. Chapter 17 was previously published as “You Work at Brown. What Do You Teach?” in #alt- academy, Bethany Nowviskie, ed. (New York: MediaCommons, 2011). Chapter 28 was previously published as “Humanities 2.0: Promises, Perils, Predictions,” PMLA 123, no. 3 (May 2008): 707– 17. Copyright 2012 by the Regents of the University of Minnesota all rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Published by the University of Minnesota Press 111 Third Avenue South, Suite 290 Minneapolis, MN 55401- 2520 http://www.upress.umn.edu library of congress cataloging-in-publication data Debates in the digital humanities / [edited by] Matthew K. Gold. ISBN 978-0-8166-7794-8 (hardback)—ISBN 978-0-8166-7795-5 (pb) 1. Humanities—Study and teaching (Higher)—Data processing. 2. Humanities —Technological innovations. 3. Digital media. I. Gold, Matthew K.. AZ182.D44 2012 001.3071—dc23 2011044236 Printed in the United States of America on acid- free paper The University of Minnesota is an equal- opportunity educator and employer.
    [Show full text]
  • Praat Scripting Tutorial
    Praat Scripting Tutorial Eleanor Chodroff Newcastle University July 2019 Praat Acoustic analysis program Best known for its ability to: Visualize, label, and segment audio files Perform spectral and temporal analyses Synthesize and manipulate speech Praat Scripting Praat: not only a program, but also a language Why do I want to know Praat the language? AUTOMATE ALL THE THINGS Praat Scripting Why can’t I just modify others’ scripts? Honestly: power, flexibility, control Insert: all the gifs of ‘you can do it’ and ‘you got this’ and thumbs up Praat Scripting Goals ~*~Script first for yourself, then for others~*~ • Write Praat scripts quickly, effectively, and “from scratch” • Learn syntax and structure of the language • Handle various input/output combinations Tutorial Overview 1) Praat: Big Picture 2) Getting started 3) Basic syntax 4) Script types + Practice • Wav files • Measurements • TextGrids • Other? Praat: Big Picture 1) Similar to other languages you may (or may not) have used before • String and numeric variables • For-loops, if else statements, while loops • Regular expression matching • Interpreted language (not compiled) Praat: Big Picture 2) Almost everything is a mouse click! i.e., Praat is a GUI scripting language GUI = Graphical User Interface, i.e., the Objects window If you ever get lost while writing a Praat script, click through the steps using the GUI Getting Started Open a Praat script From the toolbar, select Praat à New Praat script Save immediately! Save frequently! Script Goals and Input/Output • Consider what
    [Show full text]