


Technology changes life - movie directory verification tool (php)_PHP tutorial
In this era of overflowing harmony, it is not easy to download a movie, so I developed the habit of collecting movies. Two 1T hard drives have a collection of nearly 600 movies. After knowing this, many colleagues and friends started asking for help. I borrowed the hard drive to copy the movie, so the problem came...
Because there is no hard drive lock, I can't control whether they "tamper with" the hard drive, such as cutting or deleting by mistake. Although I have a special txt file that records the movie directory, as follows
But checking them one by one not only wastes time, but also causes fatigue and leads to missed readings. In this case, why not use my professional skills to realize my needs and just do it.
First, I need to read the movie directory from the txt file and save it as a php array
$fp = fopen('D:movieList.txt','r');
for($i=0; $i<562; $i++){
$arr[] = trim(substr(fgets($fp),4));
}
fclose($fp);
Among them, 562 is the number of lines in the txt file, because I only store one line for each movie. Because the first 4 characters in the storage directory are the video definition types, including DVD, BD and MKV, I use substr(fgets($fp),4) to remove the first 4 characters, and then use trim to remove the leading and trailing spaces, like this The film title finally stored in the array does not contain any other characters.
The next thing to do is to read the movie directory under the mobile hard disk. What I am looking for here is a function that reads the file name under the folder online
function myreaddir($dir){
$handle = opendir($dir);
$i = 0;
While($file=readdir($handle)){
If(($file != ". ")&&($file != ".. ")){
$list[$i] = $file;
$i = $i+1;
}
}
closedir($handle);
Return $list;
}
$movie = myreaddir("I:movies");
This method has a flaw, that is, it cannot read files under sub-files, but it is enough for me. If you are interested, you can expand on this basis.
Then comes the verification process
foreach($arr as $v){
$f = false;
foreach($movie as $vv){
If(strstr($vv,$v)!=""){
$f = true;
}
}
If(!$f){
echo $v."
";
}
}
The core method of verification is to determine whether string A contains string B, that is, whether the movie file name contains the title in the movie directory. If it does not, output it.
After testing, the accuracy rate is basically 80%, but there is a bug. For example, there is a movie called "Chainsaw" in my movie directory, but there is no "Chainsaw 1024*768.rmvb" in my folder, and there is a movie called " "Chainsaw 1024*768.rmvb", the program will pass.
The only solution is to record the complete file name when recording the movie directory. Don't just record "Chainsaw", but record "Chainsaw 1024*768", or simply record the file format, so that During verification, string comparison can be performed directly.
If there is a better solution, please let me know.
Original address: http://www.cnblogs.com/hooray/archive/2011/10/30/2228990.html

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

The network configuration of the Debian system is mainly implemented through the /etc/network/interfaces file, which defines network interface parameters, such as IP address, gateway, and DNS server. Debian systems usually use ifup and ifdown commands to start and stop network interfaces. By modifying the ifeline in the interfaces file, you can set a static IP or use DHCP to dynamically obtain the IP address. It should be noted that Debian12 and subsequent versions no longer use NetworkManager by default, so other command-line tools, such as IP commands, may be required to manage network interfaces. You can edit /etc/netwo

To strengthen the security of Oracle database on the Debian system, it requires many aspects to start. The following steps provide a framework for secure configuration: 1. Oracle database installation and initial configuration system preparation: Ensure that the Debian system has been updated to the latest version, the network configuration is correct, and all required software packages are installed. It is recommended to refer to official documents or reliable third-party resources for installation. Users and Groups: Create a dedicated Oracle user group (such as oinstall, dba, backupdba) and set appropriate permissions for it. 2. Security restrictions set resource restrictions: Edit /etc/security/limits.d/30-oracle.conf

Mastering Debian system log monitoring is the key to efficient operation and maintenance. It can help you understand the system's operating conditions in a timely manner, quickly locate faults, and optimize system performance. This article will introduce several commonly used monitoring methods and tools. Monitoring system resources with the sysstat toolkit The sysstat toolkit provides a series of powerful command line tools for collecting, analyzing and reporting various system resource metrics, including CPU load, memory usage, disk I/O, network throughput, etc. The main tools include: sar: a comprehensive system resource statistics tool, covering CPU, memory, disk, network, etc. iostat: disk and CPU statistics. mpstat: Statistics of multi-core CPUs. pidsta

To improve the performance of DebianHadoop cluster, we need to start from hardware, software, resource management and performance tuning. The following are some key optimization strategies and suggestions: 1. Select hardware and system configurations carefully to select hardware configurations: Select the appropriate CPU, memory and storage devices according to actual application scenarios. SSD accelerated I/O: Use solid state hard drives (SSDs) as much as possible to improve I/O operation speed. Memory expansion: Allocate sufficient memory to NameNode and DataNode nodes to cope with larger data processing and tasks. 2. Software configuration optimization Hadoop configuration file adjustment: core-site.xml: Configure HDFS default file system

What are the magic methods of PHP? PHP's magic methods include: 1.\_\_construct, used to initialize objects; 2.\_\_destruct, used to clean up resources; 3.\_\_call, handle non-existent method calls; 4.\_\_get, implement dynamic attribute access; 5.\_\_set, implement dynamic attribute settings. These methods are automatically called in certain situations, improving code flexibility and efficiency.

Experience the convenience of Flutter hot reloading on the Debian system, just follow the steps below: Install FlutterSDK: First, you need to install FlutterSDK on the Debian system. Visit Flutter official website to download the latest stable version of SDK and decompress to the specified directory (for example, ~/flutter). After that, add Flutter's bin directory to the system PATH environment variable. Edit the ~/.bashrc or ~/.profile file, add the following code: exportPATH="$PATH:~/flutter/bin" Save the file and execute source~/.bas

Which libraries in Go are developed by large companies or well-known open source projects? When programming in Go, developers often encounter some common needs, ...
