A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.
The current world is observing huge developments in presenting the opportunity for organizations and administrative units to use information and communication technology and their adoption by administrative work due to its importance in the achievement of work with higher efficiency, speed, and facility of communication with all individuals and companies using various means of communication Depending on the Internet networks. Therefore, the research dealt with the study of electronic systems designed and adopted in the creation or construction of a database for archiving data, which is the main method in organizations and administrative units in developed countries. Where this system works to convert documents, and manual processes and t
... Show MoreThe Skyrme–Hartree–Fock (SHF) method with the Skyrme
parameters; SKxtb, SGII, SKO, SKxs15, SKxs20 and SKxs25 have
been used to investigate the ground state properties of some 2s-1d
shell nuclei with Z=N (namely; 20Ne, 24Mg, 28Si and 32S) such as, the
charge, proton and matter densities, the corresponding root mean
square (rms) radii, neutron skin thickness, elastic electron scattering
form factors and the binding energy per nucleon. The calculated
results have been discussed and compared with the available
experimental data.
Polyaniline Multi walled Carbon nanotubes (PANI/MWCNTs) nanocomposite thin films have been prepared by non-equilibrium atmospheric pressure plasma jet on glass substrate with different weight percentage of MWCNTs 1, 2, 3, 4%. The diameter of the MWCNTs was in the range of 8-55 nm and length - - 55 55 μm. the nanocomposite thin films were characterized by UV-VIS, XRD, FTIR, and SEM. The optical studies show that the energy band gap of PANI/MWCNTs nanocomposites thin films will be different according to the MWCNTs polyaniline concentration. The XRD pattern indicates that the synthesized PANI/MWCNTs nanocomposite is amorphous. FTIR reveals the presence of MWCNTs nanoparticle embedded into polyaniline. SEM surface images show that the MWCNT
... Show MoreThis work is devoted to study the properties of the ground states such as the root-mean square ( ) proton, charge, neutron and matter radii, nuclear density distributions and elastic electron scattering charge form factors for Carbon Isotopes (9C, 12C, 13C, 15C, 16C, 17C, 19C and 22C). The calculations are based on two approaches; the first is by applying the transformed harmonic-oscillator (THO) wavefunctions in local scale transformation (LST) to all nuclear subshells for only 9C, 12C, 13C and 22C. In the second approach, the 9C, 15C, 16C, 17C and 19C isotopes are studied by dividing the whole nuclear system into two parts; the first is the compact core part and the second is the halo part. The core and halo parts are studied using the
... Show MoreImpressed current cathodic protection controlled by computer gives the ideal solution to the changes in environmental factors and long term coating degradation. The protection potential distribution achieved and the current demand on the anode can be regulated to protection criteria, to achieve the effective protection for the system.
In this paper, cathodic protection problem of above ground steel storage tank was investigated by an impressed current of cathodic protection with controlled potential of electrical system to manage the variation in soil resistivity. Corrosion controller has been implemented for above ground tank in LabView where tank's bottom potential to soil was manipulated to the desired set poi
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreThis paper addresses the nature of Spatial Data Infrastructure (SDI), considered as one of the most important concepts to ensure effective functioning in a modern society. It comprises a set of continually developing methods and procedures providing the geospatial base supporting a country’s governmental, environmental, economic, and social activities. In general, the SDI framework consists of the integration of various elements including standards, policies, networks, data, and end users and application areas. The transformation of previously paper-based map data into a digital format, the emergence of GIS, and the Internet and a host of online applications (e.g., environmental impact analysis, navigation, applications of VGI dat
... Show MoreThe transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show More