Promoting the production of industrially important aromatic chloroamines over transition-metal nitrides catalysts has emerged as a prominent theme in catalysis. This contribution provides an insight into the reduction mechanism of p-chloronitrobenzene (p-CNB) to p-chloroaniline (p-CAN) over the γ-Mo2N(111) surface by means of density functional theory calculations. The adsorption energies of various molecularly adsorbed modes of p-CNB were computed. Our findings display that, p-CNB prefers to be adsorbed over two distinct adsorption sites, namely, Mo-hollow face-centered cubic (fcc) and N-hollow hexagonal close-packed (hcp) sites with adsorption energies of −32.1 and −38.5 kcal/mol, respectively. We establish that the activation of nitro group proceeds through direct pathway along with formation of several reaction intermediates. Most of these intermediaries reside in a significant well-depth in reference to the entrance channel. Central to the constructed mechanism is H-transfer steps from fcc and hcp hollow sites to the NO/–NH groups through modest reaction barriers. Our computed rate constant for the conversion of p-CNB correlates very well with the experimental finding (0.018 versus 0.033 s–1 at ∼500 K). Plotted species profiles via a simplified kinetics model confirms the experimentally reported high selectivity toward the formation of p-CAN at relatively low temperatures. It is hoped that thermokinetics parameters and mechanistic pathways provided herein will afford a molecular level understanding for γ-Mo2N-mediated conversion of halogenated nitrobenzenes into their corresponding nitroanilines; a process that entails significant industrial applications.
The media, especially the satellite channels in our time, are one of the most important pillars of daily life, public and private, for society and people, and are considered by sociologists and sociologists as one of the most important factors of social upbringing and the most important, as a result of the technological and technological development of the media as well as increasing their numbers and vertical and horizontal expansion locally, As well as entering into the lives of individuals and people and leading them to important sites within their interests and preferences, not to mention the long time spent exposure to those media and benefit from the programs offered or broadcast. , The problem of this research is that there is a l
... Show MoreAbstract search seeks to clarify the role and the importance of financial and fiscal policy adopted by the Iraqi Government during the years (2015 – 2018) to meet federal public deficit, as the Iraqi economy to shocks from falling global oil prices and terrorist attack ISIS, so the State budget suffered from a severe lack of income as a result of its reliance on revenues from selling crude oil and in return the high proportion of public expenditures. Especially military to counter these attacks that by studying the results of the implementation of budgets and analysis and statement Causes of disabilities and assessment of these policies and procedures imposed by the International Monetary Fund. the research aims to show how increased g
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja
Four samples were collected from the wastewater of State Battery Manufacturing Company (SBMC); Babylon 2 factory in AL-Waziriya district, as triplicates. Physical and chemical measurements were carried out such as temperature, pH, Lead concentrations and their ranges were: (19.5-34.5) °C, (6.1-6.4) and (4.5-6.5) mg/L, respectively. Six dominant Bacillus spp. isolates were isolated from these samples; namely, Bacillus subtilis N1, Bacillus subtilis N2, Bacillus subtilis N3, Bacillus cereus N4, Bacillus cereus N5 , Bacillus cereus N6. These isolates were capable of removing Lead from aqueous solutions in a capacity reached 27.6 ± 1.4, 10.1 ± 1.7, 74.5 ± 0.7, 8.93 ± 2.8, 8.1 ± 3.5, 1.6± 0.7 mg/L, respectively. Whereas cell walls,
... Show MoreMany undergraduate learners at English departments who study English as a foreign language are unable to speak and use language correctly in their post -graduate careers. This problem can be attributed to certain difficulties, which they faced throughout their education years that hinder their endeavors to learn. Therefore, this study aims to discover the main difficulties faced by EFL students in language learning and test the difficulty variable according to gender and college variables then find suitable solutions for enhancing learning. A questionnaire with 15 items and 5 scales were used to help in discovering the difficulties. The questionnaire was distributed to the selected sample of study which consists of 90 (male and female) stud
... Show MoreMicroorganisms have an active role in biotechnology for example yeasts, especially in some genus like Saccharomyces, Pichia, and Candida. C.tropicalis one of the most important species of Candida and despite it is one of the causative agents of candidiasis but it has a major role in the production of many chemical compounds. C.tropicalis in the previous study was isolated from sheep dung and morphologically and molecularly classified the result of sequencing was elucidate 100% similarity between the studied isolate and other isolates inserted in DNA Data Bank of Japan DDBJ, physiologically this isolate tolerated 6% ethanol concentration in broth media with the ability to the pro
... Show MoreAudio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some
... Show More