首页 > 最新文献

Eurasian Journal of Analytical Chemistry最新文献

英文 中文
DFT Study of Intermolecular Proton Exchange with Some Derivatives of Benzoic Acids 苯甲酸衍生物分子间质子交换的DFT研究
Pub Date : 2023-01-01 DOI: 10.31489/2959-0663/3-23-14
A. Kurmanova, F. Abilkanova, I. Pustolaikina, Sergey N. Nikolskiy
A theoretical study of proton transfer dynamics in complexes of some substituted benzoic acids with 3,6-di-tert-butyl-2-hydroxyphenoxyl (DTBPO) radical is presented. To elucidate the transfer mechanism, reaction pathways for various complexes of benzoic acid derivatives with DTBPO were modeled. The calculations were performed by the DFT method at the UB3LYP/6-31G+(d, p) level of theory using QST3, IRC proce-dures, in vacuum and toluene medium (PCM solvation model). Geometric and kinetic parameters of com-plexes with o-, p-, and m-isomers of nitrobenzoic and chlorobenzoic acids were calculated. Theoretically es-timated activation barrier of 29-30 kJ/mol turned out to be approximately 30 % higher than the previously ob-tained experimental data. It was noted that in the case of o-isomers of aromatic acids the coplanarity of the transition state structure is violated, in contrast to the initial state. This leads to a change in the proton transfer mechanism. The dynamics of charge distribution, dipole moment and electrostatic potential in the studied complexes were analyzed. Based on the calculated data, it was shown that the studied intermolecular proton exchange process occurs throughout Hydrogen Atom Transfer (HAT), and not throughout Proton-Coupled Electron Transfer (PCET) mechanism.
本文对一些取代苯甲酸与3,6-二叔丁基-2-羟基苯氧基(DTBPO)自由基配合物的质子转移动力学进行了理论研究。为了阐明转移机理,模拟了苯甲酸衍生物与二叔丁基苯甲酸络合物的反应途径。在真空和甲苯介质(PCM溶剂化模型)中,采用QST3, IRC程序,在UB3LYP/6-31G+(d, p)理论水平上的DFT方法进行计算。计算了硝基苯甲酸和氯苯甲酸的o-、p-和m-异构体配合物的几何参数和动力学参数。理论上估计的活化势垒为29-30 kJ/mol,比先前得到的实验数据高出约30%。我们注意到,在芳香酸的o型异构体的情况下,与初始状态相反,过渡态结构的共平面性被破坏了。这导致质子转移机制的改变。分析了所研究配合物中的电荷分布、偶极矩和静电势的动力学。计算结果表明,所研究的分子间质子交换过程发生在整个氢原子转移(HAT)过程,而不是整个质子耦合电子转移(PCET)过程。
{"title":"DFT Study of Intermolecular Proton Exchange with Some Derivatives of Benzoic Acids","authors":"A. Kurmanova, F. Abilkanova, I. Pustolaikina, Sergey N. Nikolskiy","doi":"10.31489/2959-0663/3-23-14","DOIUrl":"https://doi.org/10.31489/2959-0663/3-23-14","url":null,"abstract":"A theoretical study of proton transfer dynamics in complexes of some substituted benzoic acids with 3,6-di-tert-butyl-2-hydroxyphenoxyl (DTBPO) radical is presented. To elucidate the transfer mechanism, reaction pathways for various complexes of benzoic acid derivatives with DTBPO were modeled. The calculations were performed by the DFT method at the UB3LYP/6-31G+(d, p) level of theory using QST3, IRC proce-dures, in vacuum and toluene medium (PCM solvation model). Geometric and kinetic parameters of com-plexes with o-, p-, and m-isomers of nitrobenzoic and chlorobenzoic acids were calculated. Theoretically es-timated activation barrier of 29-30 kJ/mol turned out to be approximately 30 % higher than the previously ob-tained experimental data. It was noted that in the case of o-isomers of aromatic acids the coplanarity of the transition state structure is violated, in contrast to the initial state. This leads to a change in the proton transfer mechanism. The dynamics of charge distribution, dipole moment and electrostatic potential in the studied complexes were analyzed. Based on the calculated data, it was shown that the studied intermolecular proton exchange process occurs throughout Hydrogen Atom Transfer (HAT), and not throughout Proton-Coupled Electron Transfer (PCET) mechanism.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"230 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89033110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simple and Efficient Method for One Pot Multicomponent Synthesis of 3,4-Dihydropyrimidin-2-(1H)-One Derivatives Catalyzed by Organocatalyst: Benzoic Acid 苯甲酸催化一锅多组分合成3,4-二氢嘧啶-2-(1H)- 1衍生物的简单高效方法
Pub Date : 2023-01-01 DOI: 10.31489/2959-0663/1-23-8
Venkatesh B. Gopula, Mohsin K. Pathan
The Biginelli reaction is one the useful multicomponent reactions and a very appropriate reaction for the synthesis of 3,4-dihydropyrimidin-2(1H)-ones derivatives. These 3,4-dihydropyrimidin-2(1H)-ones have biological and pharmacological properties which makes them a very important class of medicinal chemistry. Although they are an important class of medicinal chemistry, the syntheses of these compounds have been catalyzed by large number of strong Bronsted acids and Lewis acids under thermal conditions. Small organic molecules, organocatalysts, have been used as catalysts for the Biginelli reaction in a small number as compared to Bronsted acids and Lewis acid. Benzoic acid, which is a small organic molecule, although an acid, has never been tested for the synthesis of 3,4-dihydropyrimidin-2(1H)-ones. Benzoic acid is an inexpensive, non-toxic molecule, it has been successfully tested here as a catalyst for the one-pot three component synthesis of 3,4-dihydropyrimidin-2-(1H)-one derivatives via Biginelli reaction between β-keto ester, a variety of aromatic aldehydes and urea or thiourea under thermal conditions using 20 mol% benzoic acid in acetonitrile solvent refluxed for 12 h to give good to high yields. This synthetic method includes inexpensive, non-toxic, easily available benzoic acid as a catalyst and is carried out in a simple operational procedure.
Biginelli反应是一种有用的多组分反应,是合成3,4-二氢嘧啶-2(1H)- 1衍生物的非常合适的反应。这些3,4-二氢嘧啶-2(1H)- 1具有生物学和药理学性质,使它们成为一类非常重要的药物化学。虽然它们是一类重要的药物化学,但在热条件下,这些化合物的合成是由大量强布朗斯特德酸和路易斯酸催化的。与Bronsted酸和Lewis酸相比,较小的有机分子,即有机催化剂,被用作Biginelli反应的催化剂的数量较少。苯甲酸虽然是一种酸,但它是一种小的有机分子,从未被测试用于合成3,4-二氢嘧啶-2(1H)- 1。苯甲酸是一种廉价、无毒的分子,本实验成功地用20 mol%苯甲酸在乙腈溶剂中回流12 h,在热条件下通过β-酮酯、多种芳醛和尿素或硫脲的Biginelli反应,一锅三组分合成了3,4-二氢嘧啶-2-(1H)- 1衍生物,并取得了良好的产率。该合成方法以廉价、无毒、易得的苯甲酸为催化剂,操作步骤简单。
{"title":"Simple and Efficient Method for One Pot Multicomponent Synthesis of 3,4-Dihydropyrimidin-2-(1H)-One Derivatives Catalyzed by Organocatalyst: Benzoic Acid","authors":"Venkatesh B. Gopula, Mohsin K. Pathan","doi":"10.31489/2959-0663/1-23-8","DOIUrl":"https://doi.org/10.31489/2959-0663/1-23-8","url":null,"abstract":"The Biginelli reaction is one the useful multicomponent reactions and a very appropriate reaction for the synthesis of 3,4-dihydropyrimidin-2(1H)-ones derivatives. These 3,4-dihydropyrimidin-2(1H)-ones have biological and pharmacological properties which makes them a very important class of medicinal chemistry. Although they are an important class of medicinal chemistry, the syntheses of these compounds have been catalyzed by large number of strong Bronsted acids and Lewis acids under thermal conditions. Small organic molecules, organocatalysts, have been used as catalysts for the Biginelli reaction in a small number as compared to Bronsted acids and Lewis acid. Benzoic acid, which is a small organic molecule, although an acid, has never been tested for the synthesis of 3,4-dihydropyrimidin-2(1H)-ones. Benzoic acid is an inexpensive, non-toxic molecule, it has been successfully tested here as a catalyst for the one-pot three component synthesis of 3,4-dihydropyrimidin-2-(1H)-one derivatives via Biginelli reaction between β-keto ester, a variety of aromatic aldehydes and urea or thiourea under thermal conditions using 20 mol% benzoic acid in acetonitrile solvent refluxed for 12 h to give good to high yields. This synthetic method includes inexpensive, non-toxic, easily available benzoic acid as a catalyst and is carried out in a simple operational procedure.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"206 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81581056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Water Marking and its Application in Various Media Types 数字水印及其在各种媒体中的应用
Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018256
K. Sivaraman, G. Kavitha
{"title":"Digital Water Marking and its Application in Various Media Types","authors":"K. Sivaraman, G. Kavitha","doi":"10.29333/EJAC/2018256","DOIUrl":"https://doi.org/10.29333/EJAC/2018256","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"42 1","pages":"952-957"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75421311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote Power Monitoring, Computing and Controlling through GSM Network 基于GSM网络的远程电力监测、计算与控制
Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018243
G. Michael, R. Kavitha
{"title":"Remote Power Monitoring, Computing and Controlling through GSM Network","authors":"G. Michael, R. Kavitha","doi":"10.29333/EJAC/2018243","DOIUrl":"https://doi.org/10.29333/EJAC/2018243","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"136 1","pages":"877-884"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76380941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Error Detection and Correction Using Chinese Remainder Theorem in CDMA 基于中国剩余定理的CDMA错误检测与校正
Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018242
K. Subbulakshmi.
In communication systems corruption of data and hacking of data is unavoidable. These are the major problems we are facing in communication system. This project presents an enhanced multiple error detection and correction scheme based on the Redundant Residue Number System (RRNS). RRNS is often used in parallel processing environments because of its ability to increase the robustness of information passing between the processors. The proposed multiple error correction scheme utilizes the Chinese Remainder Theorem (CRT) together with a novel algorithm that significantly simplifies the error correcting process for integers. This enhanced scheme is compared with the existing method and this enhanced scheme is used in the CDMA application.
在通信系统中,数据损坏和数据黑客攻击是不可避免的。这些都是我们在通信系统中面临的主要问题。本课题提出了一种基于冗余剩余数系统(RRNS)的改进型多重错误检测与纠错方案。RRNS通常用于并行处理环境,因为它能够增加处理器之间传递信息的鲁棒性。提出的多重纠错方案利用了中国剩余定理(CRT)和一种新的算法,大大简化了整数的纠错过程。将该增强方案与现有方法进行了比较,并将其应用于CDMA中。
{"title":"Error Detection and Correction Using Chinese Remainder Theorem in CDMA","authors":"K. Subbulakshmi.","doi":"10.29333/EJAC/2018242","DOIUrl":"https://doi.org/10.29333/EJAC/2018242","url":null,"abstract":"In communication systems corruption of data and hacking of data is unavoidable. These are the major problems we are facing in communication system. This project presents an enhanced multiple error detection and correction scheme based on the Redundant Residue Number System (RRNS). RRNS is often used in parallel processing environments because of its ability to increase the robustness of information passing between the processors. The proposed multiple error correction scheme utilizes the Chinese Remainder Theorem (CRT) together with a novel algorithm that significantly simplifies the error correcting process for integers. This enhanced scheme is compared with the existing method and this enhanced scheme is used in the CDMA application.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"204 1","pages":"871-876"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77879169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Methodology for the Construction of Public-Private Key Pairs 一种构造公私密钥对的方法
Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018262
Kaliyamurthie K.P, R. Udayakumar
Event-driven information and A* search have garnered improbable interest from both steganographers and system administrators in the last several years. In fact, few futurists would disagree with the visualization of neural networks, which embodies the confirmed principles of theory. Jayet, our new heuristic for heterogeneous theory, is the solution to all of these problems.
在过去的几年里,事件驱动信息和A*搜索已经引起了隐写者和系统管理员不可思议的兴趣。事实上,几乎没有未来学家会不同意神经网络的可视化,因为它体现了理论的确定原则。Jayet,我们异质理论的新启发式,是所有这些问题的解决方案。
{"title":"A Methodology for the Construction of Public-Private Key Pairs","authors":"Kaliyamurthie K.P, R. Udayakumar","doi":"10.29333/EJAC/2018262","DOIUrl":"https://doi.org/10.29333/EJAC/2018262","url":null,"abstract":"Event-driven information and A* search have garnered improbable interest from both steganographers and system administrators in the last several years. In fact, few futurists would disagree with the visualization of neural networks, which embodies the confirmed principles of theory. Jayet, our new heuristic for heterogeneous theory, is the solution to all of these problems.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"26 1","pages":"992-998"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84134179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Using Big Data 大数据安全
Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018248
D. Jeyapriya, S. Theivasigamani
{"title":"Security Using Big Data","authors":"D. Jeyapriya, S. Theivasigamani","doi":"10.29333/EJAC/2018248","DOIUrl":"https://doi.org/10.29333/EJAC/2018248","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"10 1","pages":"913-917"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78598507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bank Management System 银行管理系统
Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018229
C. Geetha, Sri kanth, Saikat Kumar
{"title":"Bank Management System","authors":"C. Geetha, Sri kanth, Saikat Kumar","doi":"10.29333/EJAC/2018229","DOIUrl":"https://doi.org/10.29333/EJAC/2018229","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"35 1","pages":"783-787"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76739872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Architecting Thin Clients Using Scalable Archetypes 使用可伸缩原型构建瘦客户端
Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018261
Kaliyamurthie K.P, R. Udayakumar
Rasterization must work [9]. Given the current status of electronic modalities, electrical engineers particularly desire the simsulation of erasure coding, which embodies the essential principles of operating systems. Our focus in this paper is not on whether the well-known psychoacoustic algorithm for the understanding of IPv6 [7] is Turing complete, but rather on presenting an analysis of systems (OilyDab) [9].
栅格化必须工作[9]。考虑到电子模态的现状,电气工程师特别希望模拟擦除编码,它体现了操作系统的基本原则。我们在本文中关注的重点不是用于理解IPv6的著名心理声学算法[7]是否图灵完备,而是对系统进行分析(OilyDab)[9]。
{"title":"Architecting Thin Clients Using Scalable Archetypes","authors":"Kaliyamurthie K.P, R. Udayakumar","doi":"10.29333/EJAC/2018261","DOIUrl":"https://doi.org/10.29333/EJAC/2018261","url":null,"abstract":"Rasterization must work [9]. Given the current status of electronic modalities, electrical engineers particularly desire the simsulation of erasure coding, which embodies the essential principles of operating systems. Our focus in this paper is not on whether the well-known psychoacoustic algorithm for the understanding of IPv6 [7] is Turing complete, but rather on presenting an analysis of systems (OilyDab) [9].","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"44 1","pages":"985-991"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73843909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Malicious Attacks in Mobile Ad Hoc Networks (MANET) 移动自组网(MANET)中的恶意攻击检测
Pub Date : 2019-11-26 DOI: 10.29333/EJAC/2018244
G. Michael, R. Kavitha
The highest security issue that is faced in current scenario in MANET is infrastructure centralization. The task routing and forwarding is achieved to the max only when the there is excellent cooperation among the participating nodes. By selfish act of few nodes, the process of forwarding is interrupted for reasons like saving the battery power. Malicious activities like Denial of Service (DoS) raise a security threat to MANET. Research and analysis of various security attacks is the focal point of this project. In this system DSR Protocol is extended with a feature of “node friendship“, which creates smooth cooperation in an adhoc environment. Based on the above work the concept of grey hole attack can be detected and eliminated.
在当前场景中,MANET面临的最高安全问题是基础设施集中化。只有当参与节点之间有良好的协作时,才能最大限度地实现任务路由转发。由于少数节点的自私行为,转发过程因节省电池电量等原因被中断。像拒绝服务(DoS)这样的恶意活动会给MANET带来安全威胁。研究和分析各种安全攻击是本项目的重点。该系统对DSR协议进行了扩展,增加了“节点友谊”的特性,在特殊环境下实现了顺畅的协作。在此基础上,实现了灰洞攻击的检测和消除。
{"title":"Detection of Malicious Attacks in Mobile Ad Hoc Networks (MANET)","authors":"G. Michael, R. Kavitha","doi":"10.29333/EJAC/2018244","DOIUrl":"https://doi.org/10.29333/EJAC/2018244","url":null,"abstract":"The highest security issue that is faced in current scenario in MANET is infrastructure centralization. The task routing and forwarding is achieved to the max only when the there is excellent cooperation among the participating nodes. By selfish act of few nodes, the process of forwarding is interrupted for reasons like saving the battery power. Malicious activities like Denial of Service (DoS) raise a security threat to MANET. Research and analysis of various security attacks is the focal point of this project. In this system DSR Protocol is extended with a feature of “node friendship“, which creates smooth cooperation in an adhoc environment. Based on the above work the concept of grey hole attack can be detected and eliminated.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"6 1","pages":"885-894"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74955606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Eurasian Journal of Analytical Chemistry
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1