A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.
Here we determined the structure of a cold active family IV esterase (EstN7) cloned
Objective: evaluation of Acute Flaccid Paralysis Surveillance (AFP) System's Structure at Al-Russafa Health directorate in Baghdad City. Methodology: descriptive study using evaluation approach conducted to measure the efficiency of AFP Surveillance System structure for period from November 27th 2014 to June 30th 2015. The study adopted the non-probability multi-stage sampling approach. As nineteen health facilities under surveillance are chosen and interview is conducted with a total of 50 health worker how are involved in the AFP Surveillance System. The data are gathered from sample by using question
2,2'-(1-(3,4-bis(carboxydichloromethoxy)-5-oxo-2,5-dihydrofuran-2-yl)ethane-1,2-diyl)bis(oxy)bis(2,2-dichloroacetic acid) a derivative of L-ascorbic acid was prepared by reaction of L-ascorbic acid with trichloroacetic acid (1:4) ratio, in the presence of potassium hydroxide. A series of new metal complexes of this ligand were prepared by a reaction with the chlorides of Cd(II), Co(II), Ni(II), Cu(II) and Zn(II). The new ligand and its complexes were identified by C.H.N., IR, UV-visible spectra, Thermogravimetric analysis (TGA), as well as 1H, 13C-NMR and Mass spectra for ligand L. The complexes were also identified by molar conductance, atomic absorption, magnetic susceptibility and X-ray diffraction for Cu (II) complex. FT-IR spectra
... Show MoreIn this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the
... Show MoreData centric techniques, like data aggregation via modified algorithm based on fuzzy clustering algorithm with voronoi diagram which is called modified Voronoi Fuzzy Clustering Algorithm (VFCA) is presented in this paper. In the modified algorithm, the sensed area divided into number of voronoi cells by applying voronoi diagram, these cells are clustered by a fuzzy C-means method (FCM) to reduce the transmission distance. Then an appropriate cluster head (CH) for each cluster is elected. Three parameters are used for this election process, the energy, distance between CH and its neighbor sensors and packet loss values. Furthermore, data aggregation is employed in each CH to reduce the amount of data transmission which le
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreThe influx of data in bioinformatics is primarily in the form of DNA, RNA, and protein sequences. This condition places a significant burden on scientists and computers. Some genomics studies depend on clustering techniques to group similarly expressed genes into one cluster. Clustering is a type of unsupervised learning that can be used to divide unknown cluster data into clusters. The k-means and fuzzy c-means (FCM) algorithms are examples of algorithms that can be used for clustering. Consequently, clustering is a common approach that divides an input space into several homogeneous zones; it can be achieved using a variety of algorithms. This study used three models to cluster a brain tumor dataset. The first model uses FCM, whic
... Show MoreThe seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.