Thrust blocks and restraint joints are the two most popular methods of counteracting the thrust force that generated at pipe fittings (bends, Tee, wye, reducers, dead ends, etc…). Both systems perform the same function, which is to prevent the joints from separating from the pipes. The aim of the study is to review previous studies and scientific theories related to the study and design of thrust blocks and restraint joints to study the behavior of both systems under thrust force and to study the factors and variables that affect the behavior of these systems. The behavior of both systems must be studied because they cannot be abandoned, as each system has conditions whose use is more feasible, scientific, and economical. The use of thrust blocks is usually more economical. Still, in many cases, its use is not appropriate, as it is required to wait for the result of the compressive strength test of the concrete. It is required to close the pipe trench as soon as possible; thus, this affects the safety of workers. Or there are future excavation works that may harm the stability of the block, and when the pipe diameter is large, we need a large amount of concrete which affects the economic aspect of the work. For this, the alternative system (restraint joint) must be studied. The main result of the research is that each system provides the opposite force against thrust force with a different mechanism from the other depending on the properties of the soil.
Research Summary
... Show MoreThe current research dealt with contrastive structures and the culture of reception in the design of interior spaces as embodying a rhetorical aspect that reveals formal values related to the meanings of beauty through the mechanisms of symbolism and interpretation that drives mental behavior and is in harmony with intellectual data and its performance function.
Hence, the research in the first chapter dealt with the research problem, the need for it, and the extent of the necessity that calls for studying contrastive structures in interior design and architecture, and touching and searching for what is the paradox and its representations for the recipient, in which the interior designer plays an active role in presenting the best cre
In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreAssessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,
... Show MoreThis paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More