Thrust blocks and restraint joints are the two most popular methods of counteracting the thrust force that generated at pipe fittings (bends, Tee, wye, reducers, dead ends, etc…). Both systems perform the same function, which is to prevent the joints from separating from the pipes. The aim of the study is to review previous studies and scientific theories related to the study and design of thrust blocks and restraint joints to study the behavior of both systems under thrust force and to study the factors and variables that affect the behavior of these systems. The behavior of both systems must be studied because they cannot be abandoned, as each system has conditions whose use is more feasible, scientific, and economic
... Show MoreA total of 72 specimens of the wild jungle cat Felis chaus furax De Winton, 1898 were
examined for the purpose of this study. The results show that 55.6% of the sample harbored
either single or mixed infections with ecto- and/ or endoparasites. The mode of infection
shows that only four specimens( 5.6% of the total sample) acquire single infections, the
double infections comprise 15.3%, the triple infections comprised 33.3%, while the
quadruplicate infections comprised 1.4%.
The systematic list of the parasites included six ectoparasites: Ctenocephalides felis (insect),
Sarcoptes scabiei (mite), Haemaphysalis adleri, Rhipicephalus leporis, Rhipicephalus
turanicus and Hyalomma anatolicum excavatum (ticks) and seven
The research aimed to prepare a psychological counseling program for the coaches of the Sports Care Center in the gymnasium, and to learn about the impact of the psychological counseling program in reducing irrational ideas and causal attribution of the coaches of the Sports Talent Care Center in the gymnasium, to assume that there are statistically significant differences between the results of the tribal and posttests of the research group Experimental in the scale of irrational ideas, and there are statistically significant differences between the results of the tribal and posttests of the experimental research group in the scale of the causal attribution scale, The experimental approach was adopted by designing one experimental
... Show MoreIn petroleum industry, the early knowledge of “pore pressure gradient” is the basis in well design and the extraction of these information is more direct when the pore pressure gradient is equal to normal gradient; however, this matter will be more complex if it deviate from that limit which is called “abnormal pore pressure”, if this variable does not put in consideration, then many drilling problems will occur might lead to entire hole loss. To estimate the pore pressure gradient there are several methods, in this study; Eaton method’s is selected to extract the underground pressure program using drilling data (normalized rate of penetration) and logs data (sonic and density log). The results shows that an abnormal high press
... Show MoreThe study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The ro
... Show MoreThe ritual is a Sunnah between the two prostrations, not as some of the worshipers do, where he made it in the last tashahhud when the tasleematin, and it may be in the last tashahhud.
The assumption is Sunnah and most of the scholars say that in the middle tashahhud session as we have shown through research.
The Turks are Sunnah as well, and it is at the end of the prayer, whether it is double, triple or quadruple, whether it is naval or NAFTA, whether it is urban or travel, which is the view of most scholars from the three imams and others.
If we say weighting, say the audience of the three imams (Malik, Shafi'i, and Ahmad) is the most correct, and it is also the son of values, and if we say the choice is as Ibn Rushd said: by
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreThis research was carried out in quail in the laboratory of histopathology diseases during four months. The objectives of this study was to detecting the effects of the addition of the alcohol extract of ginger to ovary tissue of quail. The two groups of birds were in almost similar weights and were placed in cages. Each group consisted of 8 quails. The first group (control group) fed on regular feeding without adding alcoholic extract of ginger. The second group (treated group) fed on the same normal food after adding the alcohol extract of ginger at a concentration of 300 mg / kg. The results indicated that ginger have positive effects on folliculogenesis.