A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.
In this paper we present the first ever measured experimental electron momentum density of Cu2Sb at an intermediate resolution (0.6 a.u.) using 59.54 keV 241Am Compton spectrometer. The measurements are compared with the theoretical Compton profiles using density function theory (DFT) within a linear combination of an atomic orbitals (LCAO) method. In DFT calculation, Perdew-Burke-Ernzerhof (PBE) scheme is employed to treat correlation whereas exchange is included by following the Becke scheme. It is seen that various approximations within LCAO-DFT show relatively better agreement with the experimental Compton data. Ionic model calculations for a number of configurations (Cu+x/2)2(Sb-x) (0.0≤x≤2.0) are also performed utilizing free a
... Show MoreThis research attempts to investigate narrative structure in oral narrative particularly in Oprah's Show from a sociolinguistic viewpoint. Narrative is said to be universal in the sense that it is found in all times and places. There is no society or culture without narrative. Oral narrative is organized in a specific order. The research aims at studying and analyzing this order. In addition to that, it highlights the importance of narrative in conveying some moral messages to people who are listening to the story. The study is divided into two parts; theoretical and practical. The theoretical part draws on presenting a survey of literature which includes definitions and explanations of some related terms. The practical part is concerned
... Show MoreThe study is devoted to both static and earthquake response analysis of retaining structures acted upon by lateral earth pressure. Two main approaches were implemented in the analysis, namely, the Mononobe-Okabe analytical method and the numerical Finite element procedure as provided in the ready software ABAQUS with explicit dynamic method. A basic case study considered in the present work is the bridge approach retaining walls as a part of AL-Jadiriya bridge intersection to obtain the effects of the backfill and the ground water on the retaining wall response including displacement of the retaining structure in addition to the behavior of the fill material. Parametric studies were carried out to evaluate the effects of several factors
... Show MoreThe ground state proton, neutron and matter densities, the corresponding rms radii and charge form factors of a dripline nuclei 6He, 11Li, 12Be and 14Be have been studied via a three–body model of (Core + n + n). The core–neutron interaction takes the form of Woods-Saxon (WS) potential. The two valence neutrons of 6He, 11Li and 12Be interact by the realistic interaction of ZBMII while those of 14Be interact via the realistic interaction of VPNP. The core and valence (halo) density distributions are described by the single-particle wave functions of the WS potential. The calculated results are discussed and compared with the experimental data. The long tail performance is clearly noticed in the calculated neutron and matter density distr
... Show MoreInformation hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key
... Show MoreIn this study, the mobile phone traces concern an ephemeral event which represents important densities of people. This research aims to study city pulse and human mobility evolution that would be arise during specific event (Armada festival), by modelling and simulating human mobility of the observed region, depending on CDRs (Call Detail Records) data. The most pivot questions of this research are: Why human mobility studied? What are the human life patterns in the observed region inside Rouen city during Armada festival? How life patterns and individuals' mobility could be extracted for this region from mobile DB (CDRs)? The radius of gyration parameter has been applied to elaborate human life patterns with regards to (work, off) days for
... Show MoreData hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show MoreIn this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show MoreBlockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships between data points to draw meaningful conclusions. The field of data analytics in Blockchain is relatively new, and few studies have been conducted to examine the challenges involved in Blockchain data analytics. This article presents a systematic analysis of how data analytics affects Blockchain performance, with the aim of investigating the current state of Blockchain-based data analytics techniques in research fields and
... Show More