Question

In: Other

Do some research on a specific application of chemical atalysts that you find particularly interesting. Present...

Do some research on a specific application of chemical atalysts that you find particularly interesting. Present a summary in your own words to the class (150 or more words), making sure your posting contains the following:

How did you learn about this application?

Why did you choose it?

What did you learn from your research?

Solutions

Expert Solution

Specific Application of chemical catalysts that I find particularly interesting is a "Heterogeneous Catalyst named Metal (Manganese) loaded Nitrogen doped Carbon based electro-catalysts for oxygen reduction reaction (ORR) for Hydrogen Fuel cells"

How did you learn about this application?

Due to very extensive on-going research on hydrogen based fuel cells to meet current energy demand for portable and transport applications, there is high demand for lower cost, stable and active electr-catalysts for oxygen reduction reaction (ORR), which is one of the reactions of fuel cell. Pt/C is the conventional catalyst being used but its very expensive with less availability.

Why did you choose it?

I chose Mn as metal for loading as Mn has very high affinity for ORR as well as it is abundantly available and not very expensive. On the other hand compaed to conventional Platinum based electro-catalysts Mn loaded nitrogen doped carbon demonstrated lower overpotential and thereby high activity of ORR. The Mn is further loaded on Nitrogen doped carbon which acts as a support for diffusion as well as reaction.

What did you learn from your research?

From my obsrvation, I noticed that Nitrogen doped carbon not only enhances the active sites for ORR due to high electronic concentration but also improves the stability and durability in acidic and alkaline environments.


Related Solutions

What specific concepts from below do you find the most interesting and/or impactful to Cybersecurity?
  What specific concepts from below do you find the most interesting and/or impactful to Cybersecurity? Explain the concept thoroughly, explain your position (e.g. why is it impactful to the field of Cybersecurity and/or so interesting to you) and provide several examples that support your argument. Encapsulation Denial of service / distributed Integrity checking For protecting authentication data
What specific concepts from below do you find the most interesting and/or impactful to Cybersecurity?
  What specific concepts from below do you find the most interesting and/or impactful to Cybersecurity? Explain the concept thoroughly, explain your position (e.g. why is it impactful to the field of Cybersecurity and/or so interesting to you) and provide several examples that support your argument. Encapsulation Denial of service / distributed Integrity checking For protecting authentication data
Identify an application for the mathematical tools you learned this week that you find interesting or...
Identify an application for the mathematical tools you learned this week that you find interesting or important. State why you find it interesting and/or important. Explain your strategy for converting the specifics of the application to a format that can be solved using the mathematical tools you learned this week. Solve the application. If you use an excel spreadsheet in your solution, attach it to your post. If not, provide a detailed explanation of your solution steps. Explain your strategy...
What specific concepts from the ones listed below do you find the most interesting and/or impactful...
What specific concepts from the ones listed below do you find the most interesting and/or impactful to Cybersecurity? Explain the concept thoroughly, explain your position (e.g. why is it impactful to the field of Cybersecurity and/or so interesting to you) and provide several examples that support your argument. Applications of Cryptography and PKI Trust relationships Password guessing / cracking Public Key Infrastructure Certificates Key Management (creation, exchange/distribution) Common Cryptographic Protocols Types of Attacks (brute force, chosen plaintext, known plaintext, differential...
What specific concepts from the ones listed below do you find the most interesting and/or impactful...
What specific concepts from the ones listed below do you find the most interesting and/or impactful to Cybersecurity? Explain the concept thoroughly, explain your position (e.g. why is it impactful to the field of Cybersecurity and/or so interesting to you) and provide several examples that support your argument. Applications of Cryptography and PKI Trust relationships Password guessing / cracking Public Key Infrastructure Certificates Key Management (creation, exchange/distribution) Common Cryptographic Protocols Types of Attacks (brute force, chosen plaintext, known plaintext, differential...
What specific concepts from below do you find the most interesting and/or impactful to Cybersecurity? Explain...
What specific concepts from below do you find the most interesting and/or impactful to Cybersecurity? Explain the concept thoroughly, explain your position (e.g. why is it impactful to the field of Cybersecurity and/or so interesting to you) and provide several examples that support your argument. Threats and Adversaries (threat actors, malware, natural phenomena) Common Attacks Malicious activity detection / forms of attack Appropriate Countermeasures Legal issues Attack Timing (within x minutes of being attached to the net) Covert Channels Social...
Do some research on your externality, find something specific and recent to address. For instance, "environmental...
Do some research on your externality, find something specific and recent to address. For instance, "environmental pollution" or "education" are too broad. Noise pollution due to fireworks on 4th of July or the measles outbreak/vaccine are more specific topics. Describe the externality, identify whether it is positive or negative, and explain why.   Relate your externality to the following concepts (include graphs) Describe the effect on the market using relevant MB, MC, MSB, and MSC curves. Use arrows to indicate direction....
What are some of the features about Word that you find interesting? What are some of...
What are some of the features about Word that you find interesting? What are some of the features that you find frustrating? How could Microsoft Word help you in your career? Are there any other word processing tools that you use in your daily life (e.g. Google Docs)?
You do some research and find that a census of Ireland in the 1910s found 65...
You do some research and find that a census of Ireland in the 1910s found 65 individuals afflicted with cystic fibrosis out of 100,000 people. You want to investigate whether the gene involved in cystic fibrosis is under Hardy-Weinberg equilibrium. To do this, you use the frequencies observed in the present to determine the expected number of individuals in each class in the 1910 study. Frequencies observed in the present: p=.97 , q=.03 Fill in the following table (2 points):...
Research Question what are some ethical issues present in the Sherman article titled "The specific deterrent...
Research Question what are some ethical issues present in the Sherman article titled "The specific deterrent effects for arrests for domestic assault" and How did Sherman argue that it was not a problem for the study.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT