Promoting the production of industrially important aromatic chloroamines over transition-metal nitrides catalysts has emerged as a prominent theme in catalysis. This contribution provides an insight into the reduction mechanism of p-chloronitrobenzene (p-CNB) to p-chloroaniline (p-CAN) over the γ-Mo2N(111) surface by means of density functional theory calculations. The adsorption energies of various molecularly adsorbed modes of p-CNB were computed. Our findings display that, p-CNB prefers to be adsorbed over two distinct adsorption sites, namely, Mo-hollow face-centered cubic (fcc) and N-hollow hexagonal close-packed (hcp) sites with adsorption energies of −32.1 and −38.5 kcal/mol, respectively. We establish that the activation of nitro group proceeds through direct pathway along with formation of several reaction intermediates. Most of these intermediaries reside in a significant well-depth in reference to the entrance channel. Central to the constructed mechanism is H-transfer steps from fcc and hcp hollow sites to the NO/–NH groups through modest reaction barriers. Our computed rate constant for the conversion of p-CNB correlates very well with the experimental finding (0.018 versus 0.033 s–1 at ∼500 K). Plotted species profiles via a simplified kinetics model confirms the experimentally reported high selectivity toward the formation of p-CAN at relatively low temperatures. It is hoped that thermokinetics parameters and mechanistic pathways provided herein will afford a molecular level understanding for γ-Mo2N-mediated conversion of halogenated nitrobenzenes into their corresponding nitroanilines; a process that entails significant industrial applications.
Diyala Governorate was recently exposed to high flood waves discharged from Hemrin Dam. Since the dam was at its full capacity during the flood period, these waves were discharged to the Diyala River. Because of the reduction in Diyala River capacity to 750m3/s, the cities and villages on both sides of the river banks were inundated. Thus, the study's objective is to design a flood escape out of the Diyala River, to discharge the flood wave through it. The flood escape simulation was done by using HEC- RAS software. Two hundred twenty-three cross sections for the escape and 30 cross-sections of the Diyala River were used as geometric data. Depending on the geological formation that the escape passed t
... Show Moreنشاطات فرع الدراسات الدولية
The energy level scheme of 188Os has been established on the basis of
y-y coincidence measurements. Ge (Li) and HPGe detectors were
employed to study the gamma spectra produced in the -decay of 188Re to
188Os. Fourteen new transitions and four new levels at 1660, 1871, 1948
188and 2034 keV are suggested. Relative intensities from singles
measurements, branching ratios and loft values were calculated and
multipolarities, spins and parities deduced
The present work covers the analytical design process of three dimensional (3-D) hip joint prosthesis with numerical fatigue stress analysis. The analytical generation equations describing the different stem constructive parts (ball, neck, tour, cone, lower ball) have been presented to reform the stem model in a mathematical feature. The generated surface has been introduced to FE solver (Ansys version 11) in order to simulate the induced dynamic stresses and investigate the effect of every design parameter (ball radius, angle of neck, radius of neck, neck ratio, main tour radius, and outer tour radius) on the max. equivalent stresses for hip prosthesis made from titanium alloy. The dynamic loading case has been studied to a stumbling ca
... Show MoreIn this study, flow-based routing model is investigated. The aim of this study is to increase scalability of flow control, routing and network resources solutions, as well as to improve Quality of Service and performance of the whole system. A method of hierarchical routing is proposed. The goal coordination method alsoused in this paper. Two routing models (model with quadratic objective function and model with traffic engineering) were fully analyzed. The basic functions of the hierarchical routing model levels based on goal coordination method were addressed Both models’ convergence is also explained. The dependence of the coordination iterations number on the packet flow rates for both models is graphically shown. The results shows
... Show MoreThe research is concerned with the problems of knowledge purification of kindergarten children by verifying its aims, identifying of knowledge purification among the first level of kindergarten children and the second level of kindergarten children, and the differences between the males and females in the variable of knowledge purification. The research community included the children in the state and private kindergartens in Baghdad governorate, on its two sides, Karkh and Rusafa, for the six districts for the academic year 2022-2023. After making the knowledge purification test according to the scientific steps of test constructions, the test has been presented to a group of experts specialized in the field of kindergarten to ascertain
... Show MoreThe objective behind this work was to find out the bacteriological profile of post burn infections in wound. The study was carried out from December 2010 to February 2011 at the Burns Unit of Al –Kindy Hospital and Al-Yarmook Hospital in Baghdad. Sixty burn patients have been investigated for bacterial profile of burn wound infections. Specimens were collected in the form of wound swabs. The organisms were isolated and identified by standard microbiological methods. Antimicrobial susceptibility test has been done by ATB-PSE5 kit(BioMereiux). Pseudomonas aeruginosa 35(58.3 %) was found to be the most common isolate followed by Klebsiella pneumonae 10(16.6%), Staphylococcus aureus 7(10%). ,E.coli 3(5%), Proteus merabilis 1(1.6 %), others 2
... Show MoreEssentilas of Atmospheric Sciences - ISBNiraq.org
Identification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognit
... Show More