08-28-2012
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
cat test.ksh
#!/usr/bin/ksh
VAR="Dear Friends \n How are you? \n Have a nice day \n"
export VAR
echo "Inside test.ksh";
./test.pl
cat test.pl
#!/usr/bin/perl
print "Inside test.pl \n";
print "$VAR";
Output:
./test.ksh
Inside test.ksh
Inside test.plWhat I want to achieve is, I... (1 Reply)
Discussion started by: dahlia84
1 Replies
2. Shell Programming and Scripting
I'm looking at a line in a script:
&& DRROOT="/dir1" || DRROOT="/dir2" I'm trying to understand it.
Is there a "-d" command and is it seeing if /dir1 exists and, if so, set an environment variable named DRROOT to "/dir1", else set DRROOT to "/dir2" ?
Thanks,
-dog
---------- Post... (0 Replies)
Discussion started by: landog
0 Replies
3. Shell Programming and Scripting
hello everyone,
I have file with de-limited values in random order shown below, where C1V0 represents column1 value1,
C2V0 represents column2 value 2, and so on.
Column0 is a constant value which i didn't represent in the sample input format.
Column1 is a numeric column.
Column2 is a... (0 Replies)
Discussion started by: angie1234
0 Replies
4. Programming
this is my code to try and prinnt out a deck of cards. the print function worked when used inside main without being a function but now i cant get it to work as a function probably since i dont know how to pass a struct array in c. I gave it a shot but i keep getting an assortment of errors. The... (0 Replies)
Discussion started by: bjhum33
0 Replies
5. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
I am trying to encrypt the p-array. The first element will print correctly once returned from my encrypt... (2 Replies)
Discussion started by: robin_simple
2 Replies
6. UNIX for Dummies Questions & Answers
Hi!
(I guess this could of gone into the scripting forum, but Unix for Dummies seemed more appropriate. Please note that I am not in school, so Homework doesn't seem appropriate either. You guys can let me know if you think otherwise.)
I am following an exercise in a book on ksh scripting which... (2 Replies)
Discussion started by: sudon't
2 Replies
7. UNIX for Dummies Questions & Answers
I am trying to find an example for reading an array instead of reading a file and send out an email in ksh. Can you please help is that possible?
Algorithm
#!/bin/ksh
i=0
set -A ARR
if
then
let i=$
ARR="A does n't match with B"
fi
if
then
let i=$
ARR="P does n't match with Q"... (11 Replies)
Discussion started by: Ariean
11 Replies
8. Solaris
I have two T2000 servers connected to sun storage array StorEdge 3310 as follows:
CH0 connected to SNGL BUS CONF
CH1 connected to HOST1
CH2 open
CH3 connected to HOST2
DUAL BUS CONF open
I have created some luns which I can mount and use on HOST1 but from HOST2 I cant see them
... (3 Replies)
Discussion started by: aliyesami
3 Replies
9. Shell Programming and Scripting
Hi All,
I am writing a script where the first 5 parameters are mandatory but the script should be able to handle a maximum of 9 parameters (with the remainig 4 optional)
I would like to load all parameters from 5th parameter positioninto an array.
the piece of code I am writing for this:... (0 Replies)
Discussion started by: snailrider
0 Replies
10. UNIX for Dummies Questions & Answers
Can any one please tell me where the error in below script. Output is not as per my requirement. if condition not comparing the result of record count of a file with 1. where is the pbm in my script? Appreciate your help..
#!/bin/ksh
#Module-
#Summary- To move the file to direcotries if... (9 Replies)
Discussion started by: shivadanam
9 Replies
CMPH(1) User Commands CMPH(1)
NAME
cmph - minimum perfect hashing tool
SYNOPSIS
cmph [-v] [-h] [-V] [-k nkeys] [-f hash_function] [-g [-c value][-s seed] ] [-a algorithm] [-M memory_in_MB] [-b BRZ_parameter] [-d
tmp_dir] [-m file.mph] keysfile
DESCRIPTION
Command line tool to generate and query minimal perfect hash functions.
Please refer to http://cmph.sf.net for full documentation.
-h Print an help message
-c This value determines: the number of vertices in the graph for the algorithms BMZ and CHM; the number of bits per key required in
the FCH algorithm
-a Algorithm. Valid values are: bmz, bmz8, chm, brz, fch
-f hash function (may be used multiple times). valid values are: djb2, fnv, jenkins, sdbm
-V Print version number and exit
-v Increase verbosity (may be used multiple times)
-k Number of keys
-g Generation mode
-s Random seed
-m Minimum perfect hash function file
-M Main memory availability (in MB)
-d Temporary directory used in brz algorithm
-b Parameter of BRZ algorithm to make the maximal number of keys in a bucket lower than 256
keysfile
Line separated file with keys
EXAMPLE
$ # Using the default algorithm (chm) for constructing a mphf
$ # for keys in file keys_file. Lines in keys_file _must_ be unique.
$ ./cmph -v -g keys_file
$ # Query id of keys in the file keys_query
$ ./cmph -v -m keys_file.mph keys_query
AUTHOR
This manual page was written by Enrico Tassi <gareuselesinge@users.sourceforge.net>, for the Debian project (but may be used by others).
cmph 0.6 October 2007 CMPH(1)