A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.
BACKGROUND: The number of coronavirus disease-19 (COVID-19) positive patients and fatalities keeps rising. It is important to recognize risk factors for severe outcomes. Evidence linking vitamin D deficiency and the severity of COVID-19 is tangential but substantial – relating to race, obesity, and institutionalization. OBJECTIVE: This study aims to examine the function of vitamin D and nutritional defense against infections such as COVID-19, which is the goal of this research. METHODS: This study includes observational cohort, cross-sectional, and case-control studies that estimated variances in serum levels of vitamin D among patients with mild or severe forms of COVID-19, and in patients who died or were discharged from hospit
... Show MoreA hydraulic platform was manufactured to serve palm trees and to enhance palm tree services, with a height of 12 meters, by the General Company for Hydraulic Industries, one of the Ministry of Industry's formations. This platform was tested in the field after being manufactured according to a randomized complete block design using split-split plots with three factors. The first factor represented the shape of the orchard land, with two levels (flat land and uneven land), serving as the main plots. The second factor had three levels representing palm tree heights (4, 8, and 12 meters), which served as the sub-plots. The third factor was the palm tree services, represented at three levels (pruning, pollination, and harvesting), with each trea
... Show MoreThis study was (the reality of beekeeping in Iraq and ways of developing them) as a research project in the branch of production is important branches of the productivity of the agricultural sector in Iraq, and the importance of this section, productive (beekeeping) for the agricultural sector in his contribution to increase the vegetable production and improve the quality and the various Classes of types, through its active role in the pollination of plants and indirectly (when the bees to move between plants to collect nectar and pollen grains), which contributes to reduce the losses in plant production and raise the rate of productivity per donum of various agricultural crops.
On the other hand play a
... Show MoreCopper electrodeposition by electrorefining process in acidic sulfate media contains 40 g/l of cupric ions and 160 g/l of sulfuric acid was achieved to study the influence of the operating parameters on cathode purity, surface morphology, deposition rate, current efficiency and power consumption. These operating parameters and there ranges are: current density 200, 300 and 400 A/m2, electrolyte temperature 35, 50 and 65 oC, electrodes spacing 15, 30 and 45 mm and electrolyte residence time 6, 4 and 2 h were utilized. XRF, SEM and EDX analyses were attained to clarify the properties of the produced cathode.
Commercial fish catch in the Iraqi marine waters from December 2018 to December 2019 was investigated. The study is based on three stations: the first station is located at the Shatt Al-Arab estuary, the second represents the area between the Shatt Al-Arab Estuary and open marine waters, and the third is associated with the Iraqi territorial marine waters. The total weight of the catch was 1881 kg, represented by 500, 654, and 727 kg in the first, second and third stations respectively. The third station was the highest with a majority of the family Sciaenidae by 464 kg, while the lowest was the family Scombridae by 0.5 kg. The total number of species included 37 species, belonging to 27 genera, 19 families, and 6 orders, the largest ord
... Show MoreLymphoma is a cancer arising from B or T lymphocytes that are central immune system components. It is one of the three most common cancers encountered in the canine; lymphoma affects middle-aged to older dogs and usually stems from lymphatic tissues, such as lymph nodes, lymphoid tissue, or spleen. Despite the advance in the management of canine lymphoma, a better understanding of the subtype and tumor aggressiveness is still crucial for improved clinical diagnosis to differentiate malignancy from hyperplastic conditions and to improve decision-making around treating and what treatment type to use. This study aimed to evaluate a potential novel biomarker related to iron metabolism,
... Show MoreThis study investigates the influence of Strategic Consensus (SC) on Organizational Performance (OP), with Strategic Alignment (SA) serving as a mediating variable, within private academic institutions in Iraq. The research utilized scales developed to measure each variable: SC, OP, and SA, all of which are unidimensional. The sample comprised 131 senior participants, including deans and faculty council members, with questionnaires distributed across three institutions: Dijla University College (35 respondents), Baghdad College of Economic Sciences (31 respondents), and the University of Uruk (65 respondents). Data analysis employed various statistical techniques, including normality testing, confirmatory factor analysis, descriptive statis
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More