A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.
In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show MoreThe fish assemblage structure in Al-Huwaizah marsh, southern of Iraq was assessed. Fish samples collected monthly by different fishing means from period December 2017 to November 2018. A total of 28959 individual of fish belonging to 9 families and 19 species were collected, 11 of them of native species and 8 of alien
species. The numerical dominance index value (D3) of the highest three abundant species comprised 74.26% of the total fish caught, included Planiliza abu (Al-Keshny) 38.2% ; Coptodon zilli (Tilapia red abdomen) 29.41% and Carassius auratus (Prussian carp) 6.65%. The total weight of fish caught 2,190,680 tan, highest weight 312,242kg achieved in July, while lowest weight 41,590 kg found in&nb
The study has used Geographic Information Systems (GIS) data and Arc GIS software, to produce a new map. This map contains a spatial database of the newly constructed buildings, in the area of water resources engineering college, and using the above tool for updating contains the college in any time, also the map and browse all buildings individually or in clustered, for example, browsing geometric data, statistical data and the plans of drawings, and make any necessary changes to these sectors immediately, or in the future, like the expansion of the study halls by constructed a new floor, or add supplements, prepare any electrical to any building, and anything else. The paper also, updates the old Google Earth image, f
... Show MoreDialogue is one of the most important means of calling to the Creator, as it is one of the scientific and verbal activities carried out by a group of interlocutors to present ideas they believe in, and evidence and proofs that express their views and demonstrate the reason for their belief in them, In order to arrive at the truth or a radical solution to a specific problem, so the interlocutor should pay attention to this science, study it and its etiquette, because the purposeful dialogue requires that the funniest of them be the most knowledgeable and knowledgeable about the axis of the hadith, and the funniest must also be able to be convinced of the rule of difference of opinion that does not spoil the issue of friendly They must also c
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreIncreasing Mobile Device on Cloud Technology will dominate the various industries. Cloud has different data storage and data protecting techniques that based on Data User (DU) and industry’s needs. In this paper, an efficient way of managing user data sharing via Mobile Agent (MA) also called Mobile Proxy (MP) is proposed. The role of Mobile Agent Authorize User to collect the data from Cloud like Proxy and supply data to another Client due to this missing of cloud data is not possible. Instead of access data for all clients, the proxy hold required data and share the customer because of this network reliability, Network Bandwidth, User Congestion, Data Security. Also, this proposed scheme have more functionality like Cloud Authen
... Show More