Chlorinated volatile organic compounds (CVOCs) are toxic chemical entities emitted invariably from stationary thermal operations when a trace of chlorine is present. Replacing the high-temperature destruction operations of these compounds with catalytic oxidation has led to the formulation of various potent metal oxides catalysts; among them are ceria-based materials. Guided by recent experimental measurements, this study theoretically investigates the initial steps operating in the interactions of ceria surface CeO2(111) with three CVOC model compounds, namely chloroethene (CE), chloroethane (CA) and chlorobenzene (CB). We find that, the CeO2(111) surface mediates fission of the carbon–chlorine bonds in the CE, CA and CB molecules via modest reaction barriers. As a result of localization of excess electrons left behind after creation of oxygen vacancies, analogous fission over an oxygen vacant surface systematically necessitates lower energy barriers. Dehydrochlorination of CE and CA molecules preferentially proceeds via a dissociative addition route; however, subsequent desorption of vinyl and ethyl moieties requires less energy than surface assisted β C–H bond breakage. The profound stability of hydrocarbon species on the surface contributes to the observed deactivation of ceria at temperatures as low as 580 K under pyrolytic conditions. Adsorption of an oxygen molecule at an oxygen vacant site initiates decomposition of the adsorbed phenyl moiety. Likewise, adsorbed surface hydroxyl groups serve as the hydrogen source in the observed conversion of CB into benzene. A plausible mechanism for the formation of 1,4-dichlorobenzene incorporates abstraction of a para hydrogen in the CB molecule by an O− surface anion followed by chlorine transfer from the surface. Plotted conversion–temperature profiles via a simplified kinetic model against corresponding experimental profiles exhibit a reasonable agreement. The results from this study could be useful in the ongoing efforts to improve ceria's catalytic capacity for destroying CVOCs.
In this work, the synergistic effect of chlorinated rubber (additive I),with zeolite 3A (additive II), zeolite 4A (additive III), and zeolite 5A (additive IV) in (1:1) weight percentage, on the flammability for unsaturated polyester resin was studied in the weight ratios for (3,7,10,13&15%) by preparing films of (130×130×3) mm in diameters. Three standard test methods used to measure were the flame retardation which are; ASTM: D-2863, ASTM: D- 635& ASTM: D-3014. Results obtained from these tests indicated that all of the additives were effective additive IV has the highest efficiency as a flame retardant.
The aim of this study was to investigate the genetic diversity and markers associated with salinity tolerance in three genotypes of wheat created for salt tolerance by plant breeding program, as well as two Iraqi varieties using random amplified polymorphic cDNA (RAPD-PCR) with eight primers were used. The results of RAPD marker revealed that there are genetic variations in several particular segments of various sizes between the selected genotypes and the local varieties with more genetic variation except for (OPG-09) did not appear any band with the selected genotypes and local cultivars. The results of the phylogenetic tree analysis (cluster) based on the presence or absence of DNA amplified for each primer were used to
... Show MoreThe work involves synthesis of new quinolin-2-one Schiff bases (XIII)a,b and (XIV)a,b, pyrazoles (XI)a,b and pyrazolines (XII)a,b derivatives containing isoxazoline or pyrimidine cycle starting with chalcones. 3-Aminoacetophenone was reacted with 4-bromobenzaldehyde or 4-N,N-dimethyl aminobenzaldehyde in basic medium to give chalcones (I)a,b by Claisen-Schemidt reaction. These chalcons were reacted with hydroxylamine hydrochloride or with thiourea in basic medium to form isoxazolines (II)a,b or pyrimidine-2-thion (III)a,b ,respectively.Also the pyrimidine-2-thiones (III)a,b and isoxazolines (II)a,b reacted with 4-or 3-substituted benzaldehyde and coumarin to form Schiff bases (IV)a-f (V)a-f and quinoline derivatives (VII)a-d(VIII)a-d, re
... Show MoreThis paper presents an analysis solution for systems of partial differential equations using a new modification of the decomposition method to overcome the computational difficulties. Convergence of series solution was discussed with two illustrated examples, and the method showed a high-precision, being a fast approach to solve the non-linear system of PDEs with initial conditions. There is no need to convert the nonlinear terms into the linear ones due to the Adomian polynomials. The method does not require any discretization or assumption for a small parameter to be present in the problem. The steps of the suggested method are easily implemented, with high accuracy and rapid convergence to the exact solution,
... Show MoreWere collected three types of medicinal plants from their natural habitat after Astkhalasalziot volatile manner steam distillation and determine the quality and quantity of vehicles chemical for each of the oils obtained using a technique JC discouraged when you merge oily thyme and lemon grass against bacteria either when using oils in three did not have a different effect
The study is conducted to investigate the effect of volatile oil extracted from the yellow peel of C. grandis fruits (Sindi) on growth of three bacterial species isolated from food samples , as well as A. flavus , and to check the possibility of using the volatile oils of this plant as a food preservative . Results showed a variation in the sensitivity of the bacterial isolates against the volatile oil which showed inhibitory effect on the growth of S. enteritidis and S. aureus with the increasing concentration of the volatile oils used in this studys , MIC for both bacteria was (0.12 , 1)% (v:v) respectively. Whereas , P. aeruginosa showed complete resistance to all trea
... Show MoreHiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show MoreIn this paper, a method based on modified adomian decomposition method for solving Seventh order integro-differential equations (MADM). The distinctive feature of the method is that it can be used to find the analytic solution without transformation of boundary value problems. To test the efficiency of the method presented two examples are solved by proposed method.
Elzaki Transform Adomian decomposition technique (ETADM), which an elegant combine, has been employed in this work to solve non-linear Riccati matrix differential equations. Solutions are presented to demonstrate the relevance of the current approach. With the use of figures, the results of the proposed strategy are displayed and evaluated. It is demonstrated that the suggested approach is effective, dependable, and simple to apply to a range of related scientific and technical problems.
<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show More