A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.
In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show MoreThe fish assemblage structure in Al-Huwaizah marsh, southern of Iraq was assessed. Fish samples collected monthly by different fishing means from period December 2017 to November 2018. A total of 28959 individual of fish belonging to 9 families and 19 species were collected, 11 of them of native species and 8 of alien
species. The numerical dominance index value (D3) of the highest three abundant species comprised 74.26% of the total fish caught, included Planiliza abu (Al-Keshny) 38.2% ; Coptodon zilli (Tilapia red abdomen) 29.41% and Carassius auratus (Prussian carp) 6.65%. The total weight of fish caught 2,190,680 tan, highest weight 312,242kg achieved in July, while lowest weight 41,590 kg found in&nb
The study has used Geographic Information Systems (GIS) data and Arc GIS software, to produce a new map. This map contains a spatial database of the newly constructed buildings, in the area of water resources engineering college, and using the above tool for updating contains the college in any time, also the map and browse all buildings individually or in clustered, for example, browsing geometric data, statistical data and the plans of drawings, and make any necessary changes to these sectors immediately, or in the future, like the expansion of the study halls by constructed a new floor, or add supplements, prepare any electrical to any building, and anything else. The paper also, updates the old Google Earth image, f
... Show MoreDialogue is one of the most important means of calling to the Creator, as it is one of the scientific and verbal activities carried out by a group of interlocutors to present ideas they believe in, and evidence and proofs that express their views and demonstrate the reason for their belief in them, In order to arrive at the truth or a radical solution to a specific problem, so the interlocutor should pay attention to this science, study it and its etiquette, because the purposeful dialogue requires that the funniest of them be the most knowledgeable and knowledgeable about the axis of the hadith, and the funniest must also be able to be convinced of the rule of difference of opinion that does not spoil the issue of friendly They must also c
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreThe pioneer contributions included a sign for Iraqi Bryoflora were those of (Juratzka &
Milde) and Schiffner published at the end of the 19th century i.e. (1870 & 1897) respectively.
However, throughout the whole next century, the 20th, only few papers, by different authors,
have been published separately. They are Schiffner (1913); Handel-Mazzetti (1914); Froelich
(1959); Vondracek (1962 & 1965); Agnew &Townsend (1970); Agnew ( 1973 ) ; Agnew&
Vondracek (1975); Long (1979); Al-Ni’ma (1994). The most comprehensive work among
them was the “Moss Flora of Iraq” by Agnew & Vondracek (1975). It included a description
of 54 genera and 145 species with an identification key in addition to notes
Big data analysis is essential for modern applications in areas such as healthcare, assistive technology, intelligent transportation, environment and climate monitoring. Traditional algorithms in data mining and machine learning do not scale well with data size. Mining and learning from big data need time and memory efficient techniques, albeit the cost of possible loss in accuracy. We have developed a data aggregation structure to summarize data with large number of instances and data generated from multiple data sources. Data are aggregated at multiple resolutions and resolution provides a trade-off between efficiency and accuracy. The structure is built once, updated incrementally, and serves as a common data input for multiple mining an
... Show More