Preferred Language
Articles
/
jcoeduw-1054
IMPLEMENTATION OF THE SKIP LIST DATA STRUCTURE WITH IT'S UPDATE OPERATIONS
...Show More Authors

A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 31 2020
Journal Name
Iraqi Geological Journal
ESTIMATION OF SHEAR WAVE VELOCITY FROM WIRELINE LOGS DATA FOR AMARA OILFIELD, MISHRIF FORMATION, SOUTHERN IRAQ
...Show More Authors

Shear wave velocity is an important feature in the seismic exploration that could be utilized in reservoir development strategy and characterization. Its vital applications in petrophysics, seismic, and geomechanics to predict rock elastic and inelastic properties are essential elements of good stability and fracturing orientation, identification of matrix mineral and gas-bearing formations. However, the shear wave velocity that is usually obtained from core analysis which is an expensive and time-consuming process and dipole sonic imager tool is not commonly available in all wells. In this study, a statistical method is presented to predict shear wave velocity from wireline log data. The model concentrated to predict shear wave velocity fr

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Tue Oct 08 2002
Journal Name
Iraqi Journal Of Laser
Design Considerations of Laser Source in a Ring Network Based on Fiber Distributed Data Interface (FDDI)
...Show More Authors

This work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2009
Journal Name
Iraqi Postgraduate Medical Journal
Ventral Penile Papillae as a New Anatomical Structure: A Clinical-Epidemiological Study Among Iraqi Male
...Show More Authors

KE Sharquie, JR Al-Rawi, AA Noaimi, MM Jabir, Iraqi Postgraduate Medical Journal, 2009

View Publication
Publication Date
Thu Oct 01 2009
Journal Name
Journal
Ventral penile papillae as a new anatomical structure: a clinical-epidemiological study among Iraqi males
...Show More Authors

S Khalifa E, AR Jamal R, N Adil A, J Munqithe M…, 2009

View Publication
Publication Date
Wed Apr 25 2018
Journal Name
Oriental Journal Of Chemistry
Diagnosis, Structure, and In vitro Antimicrobial and Antifungal Evaluation of some Amino benzoic acids, derived Ligand Schiff base and their Mixed Complexes with Cu(II), Hg(II), Mn(II), Ni(II) and Co(II)
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Apr 25 2018
Journal Name
Oriental Journal Of Chemistry
Diagnosis, Structure, and In vitro Antimicrobial and Antifungal Evaluation of some Amino benzoic acids, derived Ligand Schiff base and their Mixed Complexes with Cu(II), Hg(II), Mn(II), Ni(II) and Co(II)
...Show More Authors

Innovative various Schiff bases and their Co(II), Ni(II) and Cu(II) and Hg(II)  compounds made by the condensation of 4-amino antipyrine with derived aminobenzoic acid (2-aminobenzoic acid, 3-aminobenzoic acid, and 4-aminobenzoic acid ) have been prepared by conventional approaches. These complexes were described by magnetic sensibility analysis, FT-IR spectra, and molar-conductance and elemental analysis. Analytical values appeared which the mixed-ligand complexes presented ratio about 2:1 (ligand: metal) with the chelation 4 or 6. The prepared compounds offered a good effect on the organisms; bacteria Staphylococcus-aurous, Escherichia-coli and fungi C. albicans, A. niger. Also, the biological products signalize which the mixed compl

... Show More
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Geological Journal
Integrated Core and Log Data to Determine the Reservoir Flow Unit and Rock Facies for Mishrif Formation in South Eastern Iraq
...Show More Authors

This work represents study the rock facies and flow unit classification for the Mishrif carbonate reservoir in Buzurgan oil Field, which located n the south eastern Iraq, using wire line logs, core samples and petrophysical data (log porosity and core permeability). Hydraulic flow units were identified using flow zone indicator approach and assessed within each rock type to reach better understanding of the controlling role of pore types and geometry in reservoir quality variations. Additionally, distribution of sedimentary facies and Rock Fabric Number along with porosity and permeability was analyzed in three wells (BU-1, BU-2, and BU-3). The interactive Petrophysics - IP software is used to assess the rock fabric number, flow zon

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Wed Sep 23 2020
Journal Name
Artificial Intelligence Research
Hybrid approaches to feature subset selection for data classification in high-dimensional feature space
...Show More Authors

This paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe

... Show More
View Publication
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I Article Sidebar
...Show More Authors

n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref