A fixed firefighting system is a key component of fire safeguarding and reducing fire danger. It is installed as a permanent component in a structure to protect the entire or a portion of the building and its contents. The study aims to review the previous studies that deal with the evaluation of fire safety measures and their use in resolving problems associated with fire threats in buildings. For this reason, a number of previous studies in this field were reviewed compared with the NFPA code. The findings revealed that regulatory developments over the last several decades had created an atmosphere conducive to innovation. This has resulted in a growth in the number of fixed firefighting system types now obtainable. These solutions provide substantial distinction in terms of performance and hence safety. Not only is the availability of different fire risk alleviation systems important, but so is the election of the most convenient solution for the job. This is typically seen inside regulatory procedures and basics of thumb or heuristics and depends on the knowledge and expertise of divergent specialists. When several perceived danger and results thresholds are surpassed, fixed firefighting systems are frequently included as extra fire protection and resilience measures
Variation in DNA, and genes to a lesser or greater extent, can play an important role in most diseases; that is because this variation in will reflect and affect the function of DNA, and genes (combined genes and DNA or separately). This can be affected by environment, life style, as well as the inheriting from parents and previous generations. All these factors can contribute in human diseases. There are different alterations in genes, like imbalance and inequality in chromosomes, disorder in gene (deficiency in gene, which could be complex or single disorder), and cancer. In the last decades, scientists were focus on medicine and genetics; they pay an extensive attention to reach better understanding about diseases and their cause
... Show MoreThe study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a
... Show MoreEfficient operations and output of outstanding quality distinguish superior manufacturing sectors. The manufacturing process production of bending sheet metal is a form of fabrication in the industry of manufacture in which the plate is bent using punches and dies to the angle of the work design. Product quality is influenced by plate material selection, which includes thickness, type, dimensions, and material. Because no prior research has concentrated on this methodology, this research aims to determine V-bending capacity limits utilizing the press bending method. The inquiry employed finite element analysis (FEA), along with Solidworks was the tool of choice to develop drawings of design and simulations. The ASTM E290
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreAZ Khalaf, M kassim Haidir, LK Jasim, Iraqi Journal of Science, 2012
Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other. In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect
... Show MoreAbstract
The research aims to stand on the practice of operations management of solid waste in the city of Hilla, carried out by the mayor of Hilla Directorate - solid and the environment Waste Division, through field visits and personal interview to officials of the municipal departments and units of its data collection and information related to solid waste, and assess the current status of the processes of collection and transport waste through the questionnaire that had been prepared for citizens and employees, the search reach a set of conclusions was the most important, operations carried out by the municipality of Hilla Directorate only limited to two (collection, transportation and disposal of wa
... Show MoreUrban expansion and its environmental and safety effects are one of the critical information needed for future development planning, safety considerations and environmental management. This work used two methods to monitor urban expansion and it's environmental and safety effects, the first is based on Google Maps for the years 2002 and 2010, and the second was the usage of spatial videos for the year 2013. Although the usage of satellite images is critical to know and investigate the general situation and the total effects of the expansion on a large piece of area, but the Spatial videos do a very detailed fine scale investigation, site conditions regarding both environmental and safety cannot be easily distinguished fr
... Show More