Promoting the production of industrially important aromatic chloroamines over transition-metal nitrides catalysts has emerged as a prominent theme in catalysis. This contribution provides an insight into the reduction mechanism of p-chloronitrobenzene (p-CNB) to p-chloroaniline (p-CAN) over the γ-Mo2N(111) surface by means of density functional theory calculations. The adsorption energies of various molecularly adsorbed modes of p-CNB were computed. Our findings display that, p-CNB prefers to be adsorbed over two distinct adsorption sites, namely, Mo-hollow face-centered cubic (fcc) and N-hollow hexagonal close-packed (hcp) sites with adsorption energies of −32.1 and −38.5 kcal/mol, respectively. We establish that the activation of nitro group proceeds through direct pathway along with formation of several reaction intermediates. Most of these intermediaries reside in a significant well-depth in reference to the entrance channel. Central to the constructed mechanism is H-transfer steps from fcc and hcp hollow sites to the NO/–NH groups through modest reaction barriers. Our computed rate constant for the conversion of p-CNB correlates very well with the experimental finding (0.018 versus 0.033 s–1 at ∼500 K). Plotted species profiles via a simplified kinetics model confirms the experimentally reported high selectivity toward the formation of p-CAN at relatively low temperatures. It is hoped that thermokinetics parameters and mechanistic pathways provided herein will afford a molecular level understanding for γ-Mo2N-mediated conversion of halogenated nitrobenzenes into their corresponding nitroanilines; a process that entails significant industrial applications.
The research amid to find out the extent of Iraqi oil companies commitment to implement internal control procedures in accordance with the updated COSO framework. As the research problem was represented in the fact that many of the internal control procedures applied in the Iraqi oil companies are incompatible with most modern international frameworks for internal control, including the integrated COSO framework, issued by the Committee of Sponsoring Organizations of the Tradeway Committee. The research followed the quantitative approach to handling and analysing data by designing a checklist to represent the research tool for collecting data. The study population was represented in the Iraqi oil companies, while the study sample
... Show MoreAgricultural lands have great importance in people's lives, and their exploitation has a great impact on strengthening the national economy. Therefore, countries have given great importance to this sector, and because of the importance of this sector, the state has given large areas of these lands to the farmers to invest in agriculture, and among these farmers are those who died and left behind children who took up crafts. Agriculture, for fear that these agricultural lands would be abandoned and turned into waste lands, a land system was introduced called (regular distribu- tion), which corresponds to (legitimate inheritance). Under this system, these lands were trans- ferred to the children of farmers who died so that the process of inve
... Show MoreElectro coagulation treatment was used for zinc removal from electroplating wastewater of the State Company for Electrical Industries . This wastewater, here consists zinc ions with maximum concentration in solution of 90 ppm .
The parameters that influenced the wastewater treatment are: current density in the range 1-1.4 mA/cm2, pH in the range 5-10, temperature in the range 25-45°C and time in the range 10-180 minute.
The research is a laboratory experimental type using batch system for electrical process with direct current. The cell comprised of aluminum electrode as anode and stainless steel electrode as cathode. Thirty experiments and one hundred fifty sample lab tests were carried out in this research
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja