Rare earth metal oxides (REMOs) have gained considerable attention in recent years owing to their distinctive properties and potential applications in electronic devices and catalysts. Particularly, cerium dioxide (CeO2), also known as ceria, has emerged as an interesting material in a wide variety of industrial, technological, and medical applications. Ceria can be synthesized with various morphologies, including rods, cubes, wires, tubes, and spheres. This comprehensive review offers valuable perceptions into the crystal structure, fundamental properties, and reaction mechanisms that govern the well-established surface-assisted reactions over ceria. The activity, selectivity, and stability of ceria, either as a stand-alone catalyst or as supports for other metals, are frequently ascribed to its strong interactions with the adsorbates and its facile redox cycle. Doping of ceria with transition metals is a common strategy to modify the characteristics and to fine-tune its reactive properties. DFT-derived chemical mechanisms are surveyed and presented in light of pertinent experimental findings. Finally, the effect of surface termination on catalysis by ceria is also highlighted.
Linear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of models that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we dealt with the post optimality solution, or what is known as sensitivity analysis, using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model that will chan
... Show MoreMedia and communication's research are varied in accordance to research approaches' variety which seeks to reach convergent social, psycholo
... Show MoreThe present work aimed to study effect of (N749 & N3) dyes on TiO2 optical and electrical properties for optoelectronic application. The TiO2 paste prepared by using a doctor blade method. The samples were UV-VIS specterophometricall analyzes of TiO2 before and after immersed in dyes (N749 & N3). The results showed absorption spectra shift toward the visible region due to the adsorption of dye molecules on the surface of oxide nanoparticles. It is seen that the Eg determined to give a value of 3.3eV for TiO2 before immersing in dyes, and immersing in dyes (N749 & N3) are (1.4 &1.6 eV) respectively. The structural properties (XRD), (FTIR) and (SEM) for the sample prepared were investigated and (J-V) characteristics was stu
... Show MoreThe Mannich base ligand was synthesized in an ethanol medium through a condensation reaction of 2-mercaptobenzimidazole and ciprofloxacin at room temperature. Subsequently, several metal complexes of this ligand were prepared. To characterize both the base ligand and the metal complexes, various techniques were employed, including elemental analysis, FT-IR spectroscopy, UV-Vis spectroscopy, molar conductivity measurements, magnetic moment determination, and melting point analysis. The results were shown that the metal complexes formed have the formula [Cr(L)2Cl2] Cl.H2O and [Rh(L)2(H2O)2] Cl3.H2O, where L= mannich base ligand. Based on spectroscopic analytical, coordination with metal ions involves the 'N' donor atom of mannich base
... Show MoreElectro-kinetic remediation technology is one of the developing technologies that offer great promise for the cleanup of soils contaminated with heavy metals. A numerical model was formulated to simulate copper (Cu) transport under an electric field using one-dimensional diffusion-advection equations describing the contaminant transport driven by chemical and electrical gradients in soil during the electro-kinetic remediation as a function of time and space. This model included complex physicochemical factors affecting the transport phenomena, such as soil pH value, aqueous phase reaction, adsorption, and precipitation. One-dimensional finitedifference computer program successfully predicted meaningful values for soil pH profiles and Cu
... Show MoreThis work is aiming to study and compare the removal of lead (II) from simulated wastewater by activated carbon and bentonite as adsorbents with particle size of 0.32-0.5 mm. A mathematical model was applied to describe the mass transfer kinetic.
The batch experiments were carried out to determine the adsorption isotherm constants for each adsorbent, and five isotherm models were tested to choose the best fit model for the experimental data. The pore, surface diffusion coefficients and mass transfer coefficient were found by fitting the experimental data to a theoretical model. Partial differential equations were used to describe the adsorption in the bulk and solid phases. These equations were simplified and the
... Show MoreCommercial graphite (CGT) powder was used as an adsorbent surface for cationic dye, Janus green (JG), from aqueous solutions. This study aims to highlight the practical significance of using inexpensive CGT as an efficient adsorbent for the removal of JG dye from industrial wastewater. CGT was characterized by Fourier transform infrared spectroscopy, scanning electron microscopy, and X-ray diffraction. The adsorption process was investigated by examining parameters like the weight of the adsorbent, contact time, and temperature. Pseudo-second-order kinetic (PSO), pseudo-first-order, and intraparticle diffusion were used for analyzing the kinetic data. JG dye's adsorption kinetics fit the PSO kinetic model well (R2= 0.999). Furthermo
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More