Promoting the production of industrially important aromatic chloroamines over transition-metal nitrides catalysts has emerged as a prominent theme in catalysis. This contribution provides an insight into the reduction mechanism of p-chloronitrobenzene (p-CNB) to p-chloroaniline (p-CAN) over the γ-Mo2N(111) surface by means of density functional theory calculations. The adsorption energies of various molecularly adsorbed modes of p-CNB were computed. Our findings display that, p-CNB prefers to be adsorbed over two distinct adsorption sites, namely, Mo-hollow face-centered cubic (fcc) and N-hollow hexagonal close-packed (hcp) sites with adsorption energies of −32.1 and −38.5 kcal/mol, respectively. We establish that the activation of nitro group proceeds through direct pathway along with formation of several reaction intermediates. Most of these intermediaries reside in a significant well-depth in reference to the entrance channel. Central to the constructed mechanism is H-transfer steps from fcc and hcp hollow sites to the NO/–NH groups through modest reaction barriers. Our computed rate constant for the conversion of p-CNB correlates very well with the experimental finding (0.018 versus 0.033 s–1 at ∼500 K). Plotted species profiles via a simplified kinetics model confirms the experimentally reported high selectivity toward the formation of p-CAN at relatively low temperatures. It is hoped that thermokinetics parameters and mechanistic pathways provided herein will afford a molecular level understanding for γ-Mo2N-mediated conversion of halogenated nitrobenzenes into their corresponding nitroanilines; a process that entails significant industrial applications.
Computer programs are one of the most prominent features of technical progress in the field of information technology, which has raised many new issues that have not existed since the mid-twentieth century. and controls on the use of these programs by third parties, Controversy still exists about the legal nature of computer programs between those who believe that they are subject to the laws of patents and industrial property, and those who believe that they are subject to the laws of copyright protection and literary and artistic property, and the resulting difference in the scope of protection and rights established according to the legal system adopted in the application. This study comes to shed light on the legal nature of computer
... Show Moredrosophila larvare of diffrent speces were subjected to this in order study the structure of cephalopharyngeal armature and mouth more hooks dentition the lines number among
The reclamation of makeup water is studied in terms of breakthrough time (i.e., the leakage of the cations). Makeup water was subjected to lab-scale ion exchangers of two types: strong acid cation and weak base anion exchanger. The experimental investigation was directed to study the ion exchanger performance in terms of four different parameters (i.e., copper concentration, total dissolved solids (TDS), feed rate and bed depth). Box-Wilson composite rotatable design was adopted in designing the experiments. Breakthrough times of the effluent stream are measured in terms of copper concentration of 2 to 25 ppm, TDS concentration of 250 to 1250 ppm, feed rate of 0.38 to 5.34 l/h and bed depth of 5 to 70 cm. Simulation the effect of the stu
... Show MoreIn this paper, we discuss the difference between classical and nonclassical symmetries. In addition, we found the non-classical symmetry of the Benjamin Bona Mahony Equation (BBM). Finally, we found a new exact solution to a Benjamin Bona Mahony Equation (BBM) using nonclassical symmetry.
The research deals with a new type of high-performance concrete with improved physical properties, which was prepared by using metal additives minutes (Metakaolin) and by studing their impact on the properties of mortar and concrete high-performance through destructive and non destructive tests. This type of concrete is used broadly in public buildings and in other structures . The research involved a number of experiments such as finding the activity index of burned at a temperature of 750 º C according to the standard ( ASTM C-311/03), as well as casting models for the cubic mortar mixtures and concrete containers at different rates of metakaolin ranging between (5% - 20%) as an added part to the cement mix to get a high- compressive
... Show MoreWater/oil emulsion is considered as the most refractory mixture to separate because of the interference of the two immiscible liquids, water and oil. This research presents a study of dewatering of water / kerosene emulsion using hydrocyclone. The effects of factors such as: feed flow rate (3, 5, 7, 9, and 11 L/min), inlet water concentration of the emulsion (5%, 7.5%, 10%, 12.5%, and 15% by volume), and split ratio (0.1, 0.3, 0.5, 0.7, and 0.9) on the separation efficiency and pressure drop were studied. Dimensional analysis using Pi theorem was applied for the first time to model the hydrocyclone based on the experimental data. It was shown that the maximum separation efficiency; at split ratio 0.1, was 94.3% at 10% co
... Show MoreThe research addressed the problem of widows that increased recently enormously. The researcher also referred to the perspective of Islam that gave a significant attention for both widows and orphans as powerless groups. Some straightforward example were presented to reflect the actual difficulties that encounter these groups as well as the author proposed number of appropriate ways that mitigate their psychological and physical sufferings such as: the provision of convenience jobs, and the legislation of rule that save their rights. Moreover, the researcher addressed the importance of marrying widows and what these challenges that encounter polygamy in Arab societies, the advantages and disadvantages of polygamy, and discussing all the
... Show MoreThe security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide
... Show MoreA mathematical model and associated computer program were developed to simulate the steady state operation of wiped film evaporators for the concentration of glycerol-water solution. In this model, various assumptions were made to facilitate the mathematical model of the wiped film evaporator. The fundamental phenomena described were: sensible heating of the solution and vaporization of water. Physical property data were coded into the computer program, which performs the calculations of this model. Randomly selected experiments were carried out in a small scale wiped film evaporator from ALVAL COMPANY, using different concentrations of the glycerol solution (10, 30 and 50 Wt. %) for different feed rates (30, 50, 80, 100 and 120 l/h) and
... Show More