Preferred Language
Articles
/
jcoeduw-1054
IMPLEMENTATION OF THE SKIP LIST DATA STRUCTURE WITH IT'S UPDATE OPERATIONS
...Show More Authors

A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Listening Comprehension Problems with English lectures
...Show More Authors

The purpose of this study is to investigate learners' listening comprehension problems with Englishlectures. The study was guided by research question (What are the listening comprehension problems learners have with lectures in English).Furthermore; the main significant goal were declared through conducting this study, as well as providing some procedures of distribution the questionnaire of the study.Moreover, it presents several definitions of listening. This study definitely depends on questionnaire instrument to gathering the required data. The participants of the study were 30 learners completed their secondary school and joined at the college. Based on the findings among the five factors (text, speaker, task, environment, and list

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 11 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Factors associated with complications during pregnancy
...Show More Authors

Objective (s): To determine factors associated with the pregnancy complications (Maternal age, education,
obstetrical history, gravidity, birth space interval, and smoking).
Methodology: A cross-sectional study conducted at Al- washash & Bab-almoadham primary health care
centers. The sample was (non probability convenient sample) which included (550) pregnant women. The
study started from 1st April 2014 to 1
st of April 2015. The data was collected by direct interview using
special questionnaire to obtain socio-demographic information.
Results: the result shows that mean age of the subjects was 26.5± 4.39 years, 57.8% were housewives, the
sample included 103 premature uterine contractions, 98 pregnancy induce

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Bitcoin Prediction with a hybrid model
...Show More Authors

. In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction a

... Show More
View Publication
Scopus (10)
Scopus Crossref
Publication Date
Tue Jun 07 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Financial Fraud and Corruption with Examples
...Show More Authors

He mentioned in this article the main types of corruption, which are political, moral, financial and administrative. Others may add other types of corruption, such as religious, scientific, media, informational and statistical corruption. At the global level, the focus is largely on financial corruption, although other types of corruption are no less bad than it. Financial corruption can be defined as all financial deviations in violation of general laws or the provisions of regulations, legislation, and procedures regulating the work of the state, private institutions and individuals and applied in state institutions and the private sector in general and inconsistent with the controls and instructions of financial control.

In th

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 25 2022
Journal Name
International Journal Of Drug Delivery Technology
Assessment of Serum Levels of the WNT Pathway Antagonist (Dickkopf-1) in a Sample of Type 2 Diabetic Patients with Retinopathy using Two Groups of Antidiabetics
...Show More Authors

Objectives: Dickkopf-1 (DKK-1) is WNT/b-catenin pathway antagonist which plays a detrimental role in the development of diabetic retinopathy (DR). This research aimed to assess serum DKK-1 levels in diabetic patients who have and have not developed DR and, compare them with the control subjects finding out whether we can use it as an indicator for DR early diagnosis and to find out which one of the widely used two groups of antidiabetic treatments had the greater effect on this biomarker and hence on the progression of DR. Methods: The study participants were divided into two subgroups: First, 70 patients (36 male, 34 female) with type 2 diabetes mellitus, among them 35 patients diagnosed with DR and 35 with no evidence of DR, and s

... Show More
Scopus (2)
Scopus Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
Study ABO/Rh system with Endothelial Inflammatory Factors in Iraqi Arab Female with Diabetes Mellitus Type II
...Show More Authors

Diabetes mellitus type II is a disorder of metabolism and complex diseases affected by genetic environmental factors and associated with inflammation. The symptoms of type II diabetes develop gradually, which are associated with increased blood concentration of marker of the endothelial inflammatory factors. The expression of adhesion molecules, including E-selectin, intracellular adhesion molecule-1(ICAM-1) and vascular cell adhesion molecule-1 (VCAM-1) on the surface of vascular endothelial cells to help leukocyte stick to other surrounding tissues. Many researchers have made attempts to determine the significance of particular ABO phenotype for the susceptibility to diseases. Many reports show a strong association with the ABO blood grou

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Study ABO / Rh Systems with IL-18 & IL-33 in Iraqi Patients with Diabetes Mellitus Type II
...Show More Authors

Type 2 diabetes mellitus (DM) is a group of metabolic disorder disease. The inflammatory markers act as a new risk factor for development of type 2 diabetes with a possible association with ABO/Rh blood groups. Human ABO genes are located on chromosome 9q34.1-q34.2. The aim of this study was to investigate the possible association between inflammatory markers, interleukin (IL) -18 and IL-33 in type 2DM and ABO blood groups. Sixty four patients with newly diagnosed type2 DM and control group consist of twenty healthy Iraqi individual. Laboratory test were include ABO blood groups using standard serological procedures and detection IL-18 and IL-33 in serum by ELISA kits. The Present data showed a significant increase i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jul 22 2025
Journal Name
Journal Of Administration And Economics
Bayesian Method in Classification Regression Tree to estimate nonparametric additive model compared with Logistic Model with Application
...Show More Authors

The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
An Evolutionary Algorithm With Heuristic Operator for Detecting Protein Complexes in Protein Interaction Networks With Negative Controls
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref