MAGNETICALLY INDUCED IRON-CATALYZED HYDRODEOXYGENATION OF BENZYLIC ESTERS AND POLYESTERS

23 June 2025, Version 1
This content is a preprint and has not undergone peer review at the time of posting.

Abstract

The selective hydrodeoxygenation of benzylic esters with molecular hydrogen (H2) provides a synthetic approach to methyl-substituted aromatic compounds used widely as intermediates and products in the chemical and pharmaceutical industries in accordance with green chemistry principles. In particular, it can open novel pathways for the use of biomass-derived substrates or waste plastics as chemical feedstocks. We present here an efficient catalytic approach focusing on the use of magnetic induction to activate earth abundant iron in form of iron carbide nanoparticles (ICNPs), allowing the reaction to proceed at pressures of only 3 bar of H2. The activity of the ICNPs responds in real time to on/off switches of the alternating current magnetic field (ACMF, 350 kHz, 70 mT) mimicking the use of intermittent renewable electricity, and the magnetic properties of the ICNPs allow for their easy separation and reuse. The reaction proceeds with higher yield and selectivities at global temperatures more than 130°C below thermal activation leading to at least four times higher energy efficiency. The method was successfully applied to a range of synthetic targets and to the selective depolymerization of real polyester (PET) products.

Keywords

Hydrodeoxygenation
esters
PET
iron carbide
magnetic induction

Supplementary materials

Title
Description
Actions
Title
Supporting information file
Description
Materials and Methods, Supplementary Text, Figures S1 to S12, Schemes S1 to S19, Tables S1 to S7
Actions

Comments

Comments are not moderated before they are posted, but they can be removed by the site moderators if they are found to be in contravention of our Commenting Policy [opens in a new tab] - please read this policy before you post. Comments should be used for scholarly discussion of the content in question. You can find more information about how to use the commenting feature here [opens in a new tab] .
This site is protected by reCAPTCHA and the Google Privacy Policy [opens in a new tab] and Terms of Service [opens in a new tab] apply.
Comment number 2, Brad: Jun 23, 2025, 18:15

Cybersecurity experts may ethically monitor social media and mobile devices in limited circumstances to protect individuals from threats, exploitation, or to aid criminal investigations, and to safeguard organizations by preventing data loss, ensuring regulatory compliance, responding to incidents, or combating malware. Monitoring can also enhance public safety through threat intelligence or fighting serious cybercrime. However, such actions are only ethical with strict safeguards, including explicit consent, transparency, proportionality in data collection, data minimization, secure storage, legal compliance, and robust oversight. Without these, monitoring risks becoming unethical and may infringe on privacy or legal boundaries. Guard Your Digital World With Innovative Tech! Do you require social media access, a phone hack, email breach or website security fix? OR Do you simply wish to recover lost crypto funds, detect/track a location or carry out data alterations? Our Elite cybersecurity services cover everything from result upgrades to clearing debts and fixing credit. For Unparalleled security and reliable results, choose the best in the business. For further assistance, contact [email protected] or +1 862-660-2702 or Telegram: cyberhelpdesk00

Comment number 1, Brad: Jun 23, 2025, 18:15

Cybersecurity experts may ethically monitor social media and mobile devices in limited circumstances to protect individuals from threats, exploitation, or to aid criminal investigations, and to safeguard organizations by preventing data loss, ensuring regulatory compliance, responding to incidents, or combating malware. Monitoring can also enhance public safety through threat intelligence or fighting serious cybercrime. However, such actions are only ethical with strict safeguards, including explicit consent, transparency, proportionality in data collection, data minimization, secure storage, legal compliance, and robust oversight. Without these, monitoring risks becoming unethical and may infringe on privacy or legal boundaries. Guard Your Digital World With Innovative Tech! Do you require social media access, a phone hack, email breach or website security fix? OR Do you simply wish to recover lost crypto funds, detect/track a location or carry out data alterations? Our Elite cybersecurity services cover everything from result upgrades to clearing debts and fixing credit. For Unparalleled security and reliable results, choose the best in the business. For further assistance, contact [email protected] or +1 862-660-2702 or Telegram: cyberhelpdesk00