Thrust blocks and restraint joints are the two most popular methods of counteracting the thrust force that generated at pipe fittings (bends, Tee, wye, reducers, dead ends, etc…). Both systems perform the same function, which is to prevent the joints from separating from the pipes. The aim of the study is to review previous studies and scientific theories related to the study and design of thrust blocks and restraint joints to study the behavior of both systems under thrust force and to study the factors and variables that affect the behavior of these systems. The behavior of both systems must be studied because they cannot be abandoned, as each system has conditions whose use is more feasible, scientific, and economical. The use of thrust blocks is usually more economical. Still, in many cases, its use is not appropriate, as it is required to wait for the result of the compressive strength test of the concrete. It is required to close the pipe trench as soon as possible; thus, this affects the safety of workers. Or there are future excavation works that may harm the stability of the block, and when the pipe diameter is large, we need a large amount of concrete which affects the economic aspect of the work. For this, the alternative system (restraint joint) must be studied. The main result of the research is that each system provides the opposite force against thrust force with a different mechanism from the other depending on the properties of the soil.
The radio drama is considered to be one of the arts that is discovered after a long period of theater's discovery. Initially , it was the broad framework of the theater's work when radio was broadcasting the shows on the huge theaters. This beginning encouraged many of the radio specialists to correlate plays with radio and make a novice and distinctive type of art. Thus, radio drama made its first step including the following ( plays, short and long series drama as well as other types of radio arts). Because of the above mentioned , the researcher is stimulating to study directing techniques to process the radio drama script ( Khata'a play as a sample).
The first chapter deals with the
... Show MoreThis paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward
... Show MoreAssessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThe research aimed to shed light on the impact of international Accounting Standard No (21) on tax obstacles represented by (tax evasion, double taxation) The financial statements of a group of banks operating in the private sector were relied upon to know the impact of the standard on tax obstacles, as well as knowing the amount of amounts, The researcher relied on the method of financial analysis of that data, which was obtained from the website of the Securities Commission, and conducted personal interviews with a number of university professors, chartered accountants, financial experts, banks, and the General Authority for Taxes to benefit from their
... Show Moreالمواقف افي الدول العربية قراءة تحليلية في مواقف لدولية من التغيير (الولايات المتحدة - الاتحاد الاوروبي - روسيا)