There are many methods of searching large amount of data to find one particular piece of information. Such as find name of person in record of mobile. Certain methods of organizing data make the search process more efficient the objective of these methods is to find the element with least cost (least time). Binary search algorithm is faster than sequential and other commonly used search algorithms. This research develops binary search algorithm by using new structure called Triple, structure in this structure data are represented as triple. It consists of three locations (1-Top, 2-Left, and 3-Right) Binary search algorithm divide the search interval in half, this process makes the maximum number of comparisons (Average case complexity of Search) is O(log2 n) (pronounce this "big-Oh-n" or "the order of magnitude"), if we search in a list consists of (N) elements. In this research the number of comparison is reduced to triple by using Triple structure, this process makes the maximum number of comparisons is O(log2 (n)/3+1) if we search key in list consist of (N) elements.
This research set to indicate the role of the opportunity cost in the overall economic development (human and social development) by selecting the most appropriate alternative for the growth of the country in exchange for sacrificing profit limits to achieve this growth and development of the country, especially in the present circumstances of the country and after studying the reality of the economic case for him, as the problem lies with don't selecting the best alternative that enhances the gross domestic product, which extends to promote overall economic development and revive the industrial and agricultural sectors, productivity is more like Impotent, versus sacrifice alternative consumption may bring more financially lucrative than
... Show Moreتشهد بیئة الأعمال المعاصرة جملة من التغیرات والتطورات التكنولوجیة وتزایداً في حدةالمنافسة، وأتساع الفجوة بین العاملین والإدارة ، وقدرة الإدارة على التمییز بین الموظفین، والمشاركة فيإتخاذ القرارات، الامر الذي یلقي على عاتق شركة التأمین إجراء التغییر التنظیمي لتحقیق تطور فيالخدمات التأمینیة التي تقدمها للجمهور من تنوع التغطیات التأمینیة )الوثائق( والسرعة في تسویةالتعویضات وغیرها من الانشطة التي تمارسه
... Show MorePushover analysis is an efficient method for the seismic evaluation of buildings under severe earthquakes. This paper aims to develop and verify the pushover analysis methodology for reinforced concrete frames. This technique depends on a nonlinear representation of the structure by using SAP2000 software. The properties of plastic hinges will be defined by generating the moment-curvature analysis for all the frame sections (beams and columns). The verification of the technique above was compared with the previous study for two-dimensional frames (4-and 7-story frames). The former study leaned on automatic identification of positive and negative moments, where the concrete sections and steel reinforcement quantities the
... Show MoreSensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show MoreIraq is one of the most important countries in the world that has received its share of terrorist acts by the terrorist organization the Islamic State of Iraq and al-Sham (ISIS), which has caused instability, especially during the period of ISIS's control of seven Iraqi provinces (2014-2017). This stage has caused a decline in the levels of human and economic development and its inconsistency with the capabilities and needs of the Iraqi population. Therefore, this study aims to investigate the hypothesis that there is a close relationship between the decline in development in Iraq and the brutal practices of ISIS that it committed during his period of control over many Iraqi cities and regions. This study used several method
... Show More
The objective of this study is to measure the impact of financial development on economic growth in Iraq over the period (2004-2018) by applying a fully corrected square model (FMOLS) Whereas, a set of variables represented by (credit-to-private ratio of GDP, the ratio of money supply in the broad sense of GDP, percentage of bank deposits from GDP) were chosen as indicators for measuring financial development and GDP to measure economic growth.
Major tests have been carried out, such as the stability test (Unite Root Test), the integration test (Cointegration). Results of the study showed that there
... Show MoreObjective The incidence of rhythm and conduction abnormalities during acute myocardial infarction may approaches 100%; most are seen during the pre-hospital and coronary care unit phases, leading to deleterious effect on morbidity and mortality, this study conducted to find important persistent dysrhythmia found during CCU admission of acute myocardial infarction patients.Method A retrospective observational study of 553 patients who were admitted to the Coronary Care Unit of Alkindy Teaching Hospital during Year 2011 with diagnosis of acute myocardial infarction, Information and data extracted from case sheets and associated 12 leads daily ECGsResults only 25% of our patients had dysrhythmia on examining the present 12 leads ECGs , the
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper