This paper is concerned with the blow-up solutions of a system of two reaction-diffusion equations coupled in both equations and boundary conditions. In order to understand how the reaction terms and the boundary terms affect the blow-up properties, the lower and upper blow-up rate estimates are derived. Moreover, the blow-up set under some restricted assumptions is studied.
The verbal formula // i3-gal2 //is a commonly form in the written Sumerian economic texts, starting from the early dynastic period (2900-2372 BC), ending with the Ur III dynasty (2112-2004 BC). This formula has appeared either without infixes, or accompanied by infixes like / in-da-gal2/, corresponded in Akkadian the formula: ibaššu ,which is means "to found, to Storage ", As to the formula / da / come to indicate "to found with, to storage with--).
The present study aims to identify the extent to which biology book of sixth grade achieves the basic scientific aspects in light of its scientific objectives. To achieve this goal, the researcher needed to build two questionnaires to evaluate the biology book for sixth-grade. To answer the questions of the study, the researcher used the following statistical methods : the weighted average, and percentages; and to identify the extent to match the perspective of teachers of the material with the perspective of a researcher in each paragraph of the questionnaire as well as the degree of severity of each paragraph in the book neighborhoods sixth-grade has reached Aalbagesh to several of the most important results: 1. All the teachers were w
... Show MoreThe progress that happened in Andalusia civilization was affected by Arabic through taking care of agriculture by entering of new kinds of planets that were more important as political sides which led to prominence new kinds of food transported to Europe that had showed a real reflect of how chat of civilization among people who had lived in various ages until now
تعد ظاهرة الارهاب المتزايدة في العالم من اخطر اشكال التهديدات الامنية التي تواجة الدول لانها تستهدف في جانب مهم منها امن واستقرارومستقبل مجتمعاتها لاسيما اذا جمع الفعل الارهابي بين مطامع واهداف القوى الخارجية التي لا تريد استخدام ادواتها المباشرة وانما بالاعتماد على محركات في خلق الازمات داخل الدول المستهدفة
... Show MoreSix isolates of A. pullulans were collected from many sources including Hibiscus sabdariffa (Roselle), old Roofs of houses and bathroom surface that referred as Ap ros1, Ap or2, 3, 4 and Ap bs5, 6 respectively, all these isolates were identified based on morphological characteristics and nutritional physiology profiles, all were able to utilize various carbon and nitrogen sources such as glucose, xylose, sucrose, maltose, ammonium sulfate, ammonium nitrate and ammonium chloride, also they showed positive test for starch and amylase, while α-cellulose, ethanol, and methanol were could not be ass
... Show MoreMangrove landscaping in the Segara Anakan Lagoon (SAL) is an adaptation pattern of mangrove ecosystems to live and grow in unstable areas. This research aimed to develop a mangrove landscape to mitigate the impacts of ocean waves, currents, and inundation due to climate change. The study was conducted in SAL and Cilacap Coast (CC) using the environmental properties and climate change data. The data obtained were analyzed using mapping and trendline analyses. The results showed that mangrove landscaping in Segara Anakan had four zones with Nypa frutican, Rhizophora styllosa, Aegiceras corniculatum, Rhizophora apiculata, Avicennia marina, Sonneratia alba identified as the best adaptation of mangrove species. Climate change give a high impa
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreThe objective of the present study is to determine the effect of Kaolin as a fuel oil additive to minimize the fireside corrosion of superheater boiler tubes of ASTM designation (A213-T22) by increasing the melting point of the formed slag on the outside tubes surface, through the formation of new compounds with protective properties to the metal surface. The study included measuring corrosion rates at different temperatures with and without additive use with various periods of time, through crucible test method and weight loss technique.
A mathematical model represents the relation between corrosion rate and the studied variables, is obtained using statistical regression analysis. Using this model,
... Show MoreDust samples have been collected from three areas in Baghdad during dust storm occurred in 18th of June 2009 to characterize elemental particle size and composition by different techniques. The x-ray diffraction detected six minerals those are calcite, and quartz, present as a major components, dolomite, kaolinite, gypsum and plagioclase present as miner components .EDX detected some normal elements presented in local soil except traces of lead , nickel, and chromium. The particle size analysis by a set of sieves have revealed that the majority particle distribution was between (32 and 45)μm . To isolate the aerosol size, PM10 buoyancy method of powder in water showed a signifying amounts of particulate size .Scheerer’s method was app
... Show More