php中的正则反向引用求解?
是这样的,使用正则将匹配的连续4个数字加上一个括号,数字不变。
老师说的是反向捕获,好像使用的是{1},我试了下不行,然后网上说的是\1,有反应但是不对,然后我自己改了个下面写的\0,就反向捕获到了,但是网上查了下,好像没这样写的,,,,,但是我的确捕获到了4个数字,是怎么回事??? 还有,数组式正则的什么意思?
$a="abcd 1234reo 5678";
//下面我们使用php中的正则表达式来处理上面的内容
$myreg=array(
"/(\d){4}/i"
);
$con=array(
'[ \0]' // 捕获到数字,不改他,直接加上一个中括号,我自己弄出来的写法,?
);
回复讨论(解决方案)
<?php $s='wqe2313jyu6y6546iuoi';$s=preg_replace('/(\d{4})/','{${1}}',$s);print($s);?>运行结果:wqe{2313}jyu6y{6546}iuoi
<?php $s='wqe2313jyu6y6546iuoi';$s=preg_replace('/(\d{4})/','{${1}}',$s);print($s);?>运行结果:wqe{2313}jyu6y{6546}iuoi
对的,,能解释一下吗?
还有,如果是引用其中一部分怎么办?
如“1234”匹配的,引用里面的数字,再加中括号[1234]?
我把正则表达式写在数组里面去了,你这个方法又不行了,在数组里面必须是${0}才行
<?php $s='wqe2313jyu6y6546iuoi';$s=preg_replace('/(\d{4})/','{${1}}',$s);print($s);?>运行结果:wqe{2313}jyu6y{6546}iuoi
我知道了,是你的正则写法和我的写法不一样导致的,但是为什么呢?我写的没有错啊?
我是:/(\d){4}/i
你是:/(\d{4})/
这两个居然不一样?求解???????????
/(\d{4})/
[$1]
反向引用的数字表示正则式从左向右数第几对圆括号内的内容,注意 (?...)不计算在内
当有歧义时才需要使用{}
例如反向引用后面要补一个数字就会产生歧义,要写成${1}1??表示反向引用第一对括号内容,后面加数字1
但$11则是反向引用第 十一对括号的内容(如果没有那么多括号就为空)
/((?:123)456(789))/
$1得到123456789
$2得到789
/(\d{4})/
[$1]
反向引用的数字表示正则式从左向右数第几对圆括号内的内容,注意 (?...)不计算在内
当有歧义时才需要使用{}
例如反向引用后面要补一个数字就会产生歧义,要写成${1}1??表示反向引用第一对括号内容,后面加数字1
但$11则是反向引用第 十一对括号的内容(如果没有那么多括号就为空)
我是:/(\d){4}/i
你是:/(\d{4})/
这两个居然不一样?求解???????????
已经弄清楚了,谢谢
子表达式
捕获
反向引用
感谢各位!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Alipay PHP...

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

Article discusses late static binding (LSB) in PHP, introduced in PHP 5.3, allowing runtime resolution of static method calls for more flexible inheritance.Main issue: LSB vs. traditional polymorphism; LSB's practical applications and potential perfo

Sending JSON data using PHP's cURL library In PHP development, it is often necessary to interact with external APIs. One of the common ways is to use cURL library to send POST�...

Article discusses essential security features in frameworks to protect against vulnerabilities, including input validation, authentication, and regular updates.

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

The article discusses adding custom functionality to frameworks, focusing on understanding architecture, identifying extension points, and best practices for integration and debugging.
