Thrust blocks and restraint joints are the two most popular methods of counteracting the thrust force that generated at pipe fittings (bends, Tee, wye, reducers, dead ends, etc…). Both systems perform the same function, which is to prevent the joints from separating from the pipes. The aim of the study is to review previous studies and scientific theories related to the study and design of thrust blocks and restraint joints to study the behavior of both systems under thrust force and to study the factors and variables that affect the behavior of these systems. The behavior of both systems must be studied because they cannot be abandoned, as each system has conditions whose use is more feasible, scientific, and economical. The use of thrust blocks is usually more economical. Still, in many cases, its use is not appropriate, as it is required to wait for the result of the compressive strength test of the concrete. It is required to close the pipe trench as soon as possible; thus, this affects the safety of workers. Or there are future excavation works that may harm the stability of the block, and when the pipe diameter is large, we need a large amount of concrete which affects the economic aspect of the work. For this, the alternative system (restraint joint) must be studied. The main result of the research is that each system provides the opposite force against thrust force with a different mechanism from the other depending on the properties of the soil.
Praise be to Allah , the Lord of Heavens , Who revealed His Scripture in plain Arabic, and prayers and peace be upon the Master of all creatures and the chosen one , Muhammad (PBUH).Pushkin was known as a poet in Russia, the sun of its poetry that set, the father of the Russian literature and the founder of its literary language. When he published his poems, trying to express his inner poetic feelings and creative visions, he presented them with creativity and special touch. The reason behind the selection of Pushkin as the subject of this study is that he was affected by Islam and Arabs. For the purpose of this study, the dissertation has been divided into introduction and three chapters; each chapter includes two topics. In the introdu
... Show MoreAl-Yusifia river was assessed at three sampling stations with study period from Autumn 2010 to the end of Summer 2011. The present investigation was carried out on diversity of fungi and bacteria from Al-Yusifia river, Baghdad city. During the study, a total of 12 fungal genus and 6 bacterial genus were isolated during the year seasons. The dominant fungus at the three stations were Penicillium sp., then Rhizopus and Trichophyton megninii while the dominant bacteria was Escherichia coli and Klebsiella sp.
The higher
... Show MoreIn this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests
... Show MoreThe corrosion behavior of low carbon steel in washing water of crude oil solution has been studied potentiostatically at five temperatures in the range ( 303 –343 )K, at pH ( 4 ) and at pH (4,6,7,9,11 ) at (343K)..The corrosion potential shifted to more negative values with increasing temperature and the corrosion current density increased with increasing temperature, the corrosion current density (icorr) decreased with increasing pH in the rang ( 4 – 7 ) and it increased with increasing pH in the rang ( 9 – 11 ) at ( 343 K ), while the corrosion potential generally variation with increasing pH in the rang (4-11)at(343K. From the general results for this study can be seen that thermodynamic and kinetic function were
... Show MoreThis study seeks to address the impact of marketing knowledge dimensions (product, price, promotion, distribution) on the organizational performance in relation to a number of variables which are (efficiency, effectiveness, market share, customer satisfaction), and seeks to reveal the role of marketing knowledge in organizational performance.
In order to achieve the objective of the study the researcher has adopted a hypothetical model that reflects the logical relationships between the variables of the study. In order to reveal the nature of these relationships, several hypotheses have been presented as tentative solutions and this study seeks to verify the validity of these hypotheses.
... Show MoreThis paper deals the prediction of the process of random spatial data of two properties, the first is called Primary variables and the second is called secondary variables , the method that were used in the prediction process for this type of data is technique Co-kriging , the method is usually used when the number of primary variables meant to predict for one of its elements is measured in a particular location a few (because of the cost or difficulty of obtaining them) compare with secondary variable which is the number of elements are available and highly correlated with primary variables, as was the&nbs
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreAutorías: Hadeer Idan Ghanim, Ishraq Mahmood. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 3, 2021. Artículo de Revista en Dialnet.
This study showed that the lens in baloot muluki fish Chondrostoma regium is transparent, spherical shape, and solid in textures, while in the tree frog Hyla arborea savignyi, freshwater turtles Clemmys caspia caspia, white–eared bulbul Pycnonotus leucotis and brown rat Rattus norvegicus are transparent, soft and biconvex, it is very soft in white–eared bulbul. There are many significant differences have been recorded between the average weight lens and the total concentration of the protein in the lens all studied animals. Electrical migration process for lens proteins showed that there is one bundle of crystalline –? and one bundle also crystalline–? in all studied species, either crystalline–? may represent one bundle character
... Show More