Late-model Ionic Clusters of KNO3 and Their Configurations

来源 :高等学校化学研究(英文版) | 被引量 : 0次 | 上传用户:frog_t
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Late-model ionic clusters of KNO3 were formed under the conditions of electrospray ionization. A series of peaks of the ionic clusters could be observed in the electrospray ionization mass spectra(ESIMS). The general formulae of the ionic clusters were deduced to be K+(KNO3)n and NO-3(KNO3)m. By referring to the crystal structure of KNO3, the possible configurations of these new typical ionic clusters were speculated based on the calculated data by means of the Gaussian-94x computer program.
其他文献
In this work, the excited states of the title compounds are calculated by using time- dependent density functional theory (TDDFT).Firstly, the variation of the
We calculate one-loop R-parity-violating coupling corrections to the processes H- → Tv-τ and H- → bt-.We find that the corrections to the H- →τv-τ decay m
Polyethersulfone membranes were prepared from quaternary systems containing N,N-dimethylacetamide (DMAc) as solvent, polyvinylpyrrolidone (PVP) as constant addi
首先列出若干Stokes和anti-Stokes位移不对称的事例,并在此基础上指出,如果将anti-Stokes散射严格定义为Stokes散射的时间反演行为,则对于初态或末态具有Kramers简并的体系,
Sub-micron sized phenolic epoxy resin waterborne particles were prepared by phase inversion emulsification.Micro-phase separation occurred during the curing pro
Using time-dependent compressible laminar Navier-Stokes equations with a finite volume method incorporating a third-order-accurate discretization scheme, the fl
Electronic spectra of substituted triphenylamines are investigated in this paper by time dependent perturbation theory and ZINDO/1-CI calculation.
A superoxide dismutase(SOD) was purified to homogeneity from fresh camellia pollen by means of ammonium sulfate precipitation and column chromatography with DEA
An experimental system of De-NO with plasma-catalyst(Cu zeolite) was established to investigate the differences between DeNO with plasma-catalyst and De-NO only
Secure computing paradigms impose new architectural challenges for general-purpose processors. Cryptographic processing is needed for secure communications, sto