Catalytic reduction is considered an effective approach for the reduction of toxic organic pollutants from the environment, but finding an active catalyst is still a big challenge. Herein, Ag decorated CeO2 catalyst was synthesized through polyol reduction method and applied for catalytic reduction (conversion) of 4-nitrophenol (4-NP) to 4-aminophenol (4-AP). The Ag decorated CeO2 catalyst displayed an outstanding reduction activity with 99% conversion of 4-NP in 5 min with a 0.61 min−1 reaction rate (k). A number of structural characterization techniques were executed to investigate the influence of Ag on CeO2 and its effect on the catalytic conversion of 4-NP. The outstanding catalytic performances of the Ag-CeO2 catalyst can be assigned to strong synergistic interaction of Ag with CeO2 that prevents the aggregation of Ag species and also, helps in the exposure of more surface active metallic Ag0. In addition, the Ag-CeO2 catalyst shown remarkable durability up to several (five) repeated rounds, certifying its everyday applicability.
Abstract
The hydrometallurgical method was used to platinum and palladium leaching with aqua regia solution (3HCl: HNO3). The leaching experiments were designed to obtain the optimum conditions by using Taguchi method with 16 experiments at three different factors (time, temperature and solid to liquid ratio), and each factor has four different levels. In this study, leaching the powder sample of catalytic converter that contains platinum and palladium was conducted on the basis of the formation of chloro complexes platinum and palladium (PtCl62-, PdCl42-) with different concentrations in the acidic solution. The optimum condi
... Show MoreSilver nanoparticles (Ag-NPs) have been prepared using the electro-chemical
method. The experimental setup of this technique consist of two electrodes of pure
silver (99.2 %), the applied voltage on the electrodes is 20 V and the current through
the colloidal was about 0.4 Amp. The silver nanoparticles crystallization has been
studied; the crystalline structure appears Face center Cubic. The optical properties of
silver nanoparticles are strongly affected by the Local Surface Plasmon Resonance
(LSPR). The wavelength of maximum absorption band for an Ag NPs have a range
(~350nm-550nm).
In order to scrutinize the impact of the decoration of Sc upon the sensing performance of an XN nanotube (X = Al or Ga, and XNNT) in detecting sarin (SN), the density functionals M06-2X, τ-HCTHhyb, and B3LYP were utilized. The interaction of the pristine XNNT with SN was a physical adsorption with the sensing response (SR) of approximately 5.4. Decoration of the Sc metal into the surface of the AlN and GaN led to an increase in the adsorption energy of SN from −3.4 to −18.9, and −3.8 to −20.1 kcal/mol, respectively. Also, there was a significant increase in the corresponding SR to 38.0 and 100.5, the sensitivity of metal decorated XNNT (metal@XNNT) is increased. So, we found that Sc-decorating more increases the sensitivity of GaNN
... Show MoreA new nano-sized NiMo/TiO2-γ-Al2O3 was prepared as a Hydrodesulphurization catalyst for Iraqi gas oil with sulfur content of 8980 ppm, supplied from Al-Dura Refinery. Sol-gel method was used to prepare TiO2- γ-Al2O3 nano catalyst support with 64% TiO2, 32% Al2O3, Ni-Mo/TiO-γ-Al2O3 catalyst was prepared under vacuum impregnation conditions to loading metals with percentage 3.8 wt.% and 14 wt.% for nickel and molybdenum respectively while the percentage for alumina, and titanium became 21.7, and 58.61 respectively. The synthesized TiO2- γ-Al2O3 nanocomposites and Ni-Mo /TiO2
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreIn modern times face recognition is one of the vital sides for computer vision. This is due to many reasons involving availability and accessibility of technologies and commercial applications. Face recognition in a brief statement is robotically recognizing a person from an image or video frame. In this paper, an efficient face recognition algorithm is proposed based on the benefit of wavelet decomposition to extract the most important and distractive features for the face and Eigen face method to classify faces according to the minimum distance with feature vectors. Faces94 data base is used to test the method. An excellent recognition with minimum computation time is obtained with accuracy reaches to 100% and recognition time decrease
... Show MoreThe goal of this paper is to expose a new numerical method for solving initial value time-lag of delay differential equations by employing a high order improving formula of Euler method known as third order Euler method. Stability condition is discussed in detail for the proposed technique. Finally some examples are illustrated to verify the validity, efficiency and accuracy of the method.
The control of prostheses and their complexities is one of the greatest challenges limiting wide amputees’ use of upper limb prostheses. The main challenges include the difficulty of extracting signals for controlling the prostheses, limited number of degrees of freedom (DoF), and cost-prohibitive for complex controlling systems. In this study, a real-time hybrid control system, based on electromyography (EMG) and voice commands (VC) is designed to render the prosthesis more dexterous with the ability to accomplish amputee’s daily activities proficiently. The voice and EMG systems were combined in three proposed hybrid strategies, each strategy had different number of movements depending on the combination protocol between voic
... Show More