Gas hydrate formation is considered one of the major problems facing the oil and gas industry as it poses a significant threat to the production, transportation and processing of natural gas. These solid structures can nucleate and agglomerate gradually so that a large cluster of hydrate is formed, which can clog flow lines, chokes, valves, and other production facilities. Thus, an accurate predictive model is necessary for designing natural gas production systems at safe operating conditions and mitigating the issues induced by the formation of hydrates. In this context, a thermodynamic model for gas hydrate equilibrium conditions and cage occupancies of N2 + CH4 and N2 + CO4 gas mixtures at different compositions is proposed. The van der Waals-Platteeuw thermodynamic theory coupled with the Peng-Robinson equation of state and Langmuir adsorption model are employed in the proposed model. The experimental measurements generated using a cryogenic sapphire cell for the pressure and temperature ranges of (5-25) MPa and (275.5-292.95) K, respectively, were used to evaluate the accuracy of this model. The resulting data show that increasing nitrogen mole percentage in the gas mixtures results in decreasing of equilibrium hydrate temperatures. The deviations between the experimental and predictions are discussed. Furthermore, the cage occupancies for the gas mixtures in hydrate have been evaluated. The results demonstrate an increase in the cage occupancy for both the small and large cavities with pressure.
This study uses the performance of the discretionary estimation models by using a sample of listed companies in the Netherlands and Germany. The actual accounting framework provides a wide opportunity for managers to influence data in financial reporting. The corporate reporting strategy, the way managers use their discretionary accounting, has a significant effect on the company's financial reporting. The authors contribute to the literature through enhancement to these models to accomplish better effects of identifying earnings management as well as to present evidence that is particular to the Dutch and German setting.
For this, we followed the methodology of Dechow, Sloan, and Sweeney (1995) and Chan
... Show MoreAbstract
Value Added Tax (VAT) is one of the most important types of indirect taxes because of its advantages in achieving financial, economic and financial objectives. The introduction of VAT is part of the reform of the structure of the Lebanese public tax system aimed at reducing the fiscal deficit and resulting inflation, which still lacks a general consumption tax. There is also an urgent need to increase treasury revenues , Because of its broad tax base, as it imposes on the consumption of locally produced and imported goods, in addition to the role played by this tax in support of the local product &nbs
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
Overall enthalpy and entropy of complex formation were calculated from stability constant measurements at different tempreture also experimental results
The effects of reinforcing polymers with glass and graphite particles on enhancing their flexural properties are investigated. Five composites were fabricated using the same polymer matrix material with different volume fractions of reinforcement particles. They comprise glass particles and graphite particles each having volume fractions of 20% and 30% as well as a hybrid composite having 10% glass and 10% graphite. Three-point bending tests using a Universal Testing Machine were carried out on specimens of the above mentioned composites, as well as specimens of the polymer matrix material to determine their flexural properties. The experimental test results indicate that the flexural stiffness of all the composites wer
... Show MoreThe search for wealth and money is a matter of ethics in the Islamic economy
God Almighty said: "We have honored the sons of Adam (and ridiculed the universe and what he said) mocked you
He said, "He who created you from the earth."
And he commanded you, and he said to him, "He who made you."
Land, and the amount of Rezko and
He said: "You love the money with great love."
And then guide him by exaggerating the ethics of Islam and its legislation in Tamkak and not exceeding it.
In order to darken the doors of inflation with wealth Vakar
And the hereafter and achieve satisfaction and fairness in all actions
To ensure that society has a right not to harm others and to abuse the interests of the economy
Is
The issue of communication and communication is receiving increasing attention in both contemporary studies and educational literature, and these studies emphasize the importance of studying communication within the classroom, which inevitably applies to the importance of relationships and tensions in the field of teaching art in particular because it is an emotional field that provides an opportunity for communication competencies and skills to be prominent and take Its wide scope, both among the students themselves and between teachers and students. The means of communication are the vessel in which the cultural relations and the commonalities between people revolve. The process of building relationships between students depends in man
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More