A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.
Bipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv
... Show MoreThe Iraqi marshes are considered the most extensive wetland ecosystem in the Middle East and are located in the middle and lower basin of the Tigris and Euphrates Rivers which create a wetlands network and comprise some shallow freshwater lakes that seasonally swamped floodplains. Al-Hawizeh marsh is a major marsh located east of Tigris River south of Iraq. This study aims to assess water quality through water quality index (WQI) and predict Total Dissolved Solids (TDS) concentrations in Al-Hawizeh marsh based on artificial neural network (ANN). Results showed that the WQI was more than 300 for years 2013 and 2014 (Water is unsuitable for drinking) and decreased within the range 200-300 in years 2015 and 2016 (Very poor water). The develope
... Show MoreBackground: Oncogenesis in the oral cavity is widely believed to result from cumulative genetic alterations that cause a transformation of the mucosa from normal to dysplastic to invasive carcinoma. The p16 gene produces p16 protein, which in turn inhibits phosphorylation of retinoblastoma (Rb), p16 play a significant role in early carcinogenesis. A number of epidermal growth factor receptor (EGFR) family, HER2/neu, has received much attention because of its therapeutic implications. The aims of the study were to evaluate and compare the immunohistochemical expression of the cell cycle protein P16 INK4a and c-erbB2 (HER2/neu) in NOM, OED, and OSCC. Correlate both marker expression with each other as well as with various clinicopathological
... Show MoreBackground: In Iraqi communities, the workers considered the largest population groups, so increasing their dental education by increasing the care for their dental health knowledge and behavior is very important, the present study was aimed to evaluate the gingival health and oral hygiene in relation to knowledge and behavior among a group of a workers selected randomly from Al Fedaa company in Baghdad city. Materials and methods: A sample of 110 workers (65 men and 45 women) included in this study, a questionnaire used to evaluate their oral health knowledge and behavior. The gingival health condition of the workers was examined by using Loe and Silness index (1963), Silness and Loe index (1964) was used to asses plaque quantity, and Ramf
... Show MoreObjectives: The aim of the study is to evaluate the information of caregivers concerned emergency care for the elderly and to identify the relationship between caregiver information and their educational level, years of service and training courses. Methodology: A quasi-experimental study was conducted in the Geriatric Care Home in Baghdad City (the governmental and private geriatric care home ) for the period from October, 14th , 2018 to March, 20th , 2019 to find the effectiveness of the instructional program on caregivers knowledge about emergency care for the elderly.. A purposive sample (non-probability) was consisting of (30) males and females caregivers, the sample was selected from geriatric care home in Baghdad city .To implemen
... Show MoreAim: to determine the effectiveness of women's self-care instructions on their post cesarean section care in Baghdad
teaching hospital.
Methodology: The present study used quasi-experimental study design in maternity words in Baghdad teaching
hospital. The sample was collected and follow up for the period (15) January 2014 until 15 May 2014 Nonprobability
(purposive sample) of (100) women post cesarean section divided in to two groups (50) women post
cesarean section considered as a study group, and another (50) women post cesarean section considered as the
control one, A questionnaire designed as a tool to collect data fit the purpose of the study a questionnaire include
demographic variables, Reproductive variables
We aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show More