This paper is concerned with the blow-up solutions of a system of two reaction-diffusion equations coupled in both equations and boundary conditions. In order to understand how the reaction terms and the boundary terms affect the blow-up properties, the lower and upper blow-up rate estimates are derived. Moreover, the blow-up set under some restricted assumptions is studied.
A theoretical and experimental investigation was carried out to study the behavior of a two-phase closed thermosyphon loop (TPCTL) during steady-state operation using different working fluids. Three working fluids were investigated, i.e., distilled water, methanol, and ethanol. The TPCTL was constructed from an evaporator, condenser, and two pipelines (riser and downcomer). The driving force is the difference in pressure between the evaporator and condenser sections and the fluid returns to the heating section by gravity. In this study, the significant parameters used in the experiments were filling ratios (FR%) of 50%, 75%, and 100% and heat-input range at the evaporator section of 215-860.2 W. When the loop reached to
... Show MoreAbstract:
Borago officinalis is highly interesting amongst nutritional and medical source relate to its high composition of some useful phytochemical compound. It is great plants with bright blue star-shaped flowers present in most world regions and usually known as borage. The Borago phytochemical analysis showed the presence of alkaloids, tannins, flavonoids, phenolic acids, essential oil, vitamins and others. Borage is cultivated all over the world and used in traditional medicine as a demulcent, diuretic, emollient, tonic, expectorant, for the treatment of coughs, inflammation and swelling, and other diseases. In herbal medicine, Borage seed oil (BSO) has been utilized for many progressive illnesse
... Show MoreSecured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
