Issue 76, 2016

Activation energies and information entropies of helium penetration through fullerene walls. Insights into the formation of endofullerenes nX@C60/70 (n = 1 and 2) from the information entropy approach

Abstract

In the present study, we calculate the activation barriers and information entropies of helium penetration into the C60 and C70 fullerenes resulting in the singly and doubly filled endofullerenes Hen@C60/70 (n = 1 and 2). The activation barriers of hexagon penetration of C60 and C70 are very high (∼900 kJ mol−1) and they slightly increase for the second insertion as compared to the first step. The activation parameters are linearly correlated with the squares of the penetrated hexagons. This allows the proposal that the other fullerene cages should reveal almost the same penetrability because the size of the hexagons do not significantly vary from one fullerene to another. We have found that the experimental ratios of the yields of He@C60/70 and He2@C60/70 (and the other related endofullerenes Nen@C70, (H2)n@C70, and NHe@C60/70) may be qualitatively described in terms of the information entropy approach using the respective changes in information entropy upon the formation of singly and doubly filled endofullerenes. This approach stresses the probabilistic nature of the penetration processes and may be used for qualitative prediction of the expected yields of endofullerenes with two encapsulated species.

Graphical abstract: Activation energies and information entropies of helium penetration through fullerene walls. Insights into the formation of endofullerenes nX@C60/70 (n = 1 and 2) from the information entropy approach

Supplementary files

Article information

Article type
Paper
Submitted
11 May 2016
Accepted
25 Jun 2016
First published
06 Jul 2016
This article is Open Access
Creative Commons BY-NC license

RSC Adv., 2016,6, 72230-72237

Activation energies and information entropies of helium penetration through fullerene walls. Insights into the formation of endofullerenes nX@C60/70 (n = 1 and 2) from the information entropy approach

D. Sh. Sabirov, A. O. Terentyev and V. I. Sokolov, RSC Adv., 2016, 6, 72230 DOI: 10.1039/C6RA12228K

This article is licensed under a Creative Commons Attribution-NonCommercial 3.0 Unported Licence. You can use material from this article in other publications, without requesting further permission from the RSC, provided that the correct acknowledgement is given and it is not used for commercial purposes.

To request permission to reproduce material from this article in a commercial publication, please go to the Copyright Clearance Center request page.

If you are an author contributing to an RSC publication, you do not need to request permission provided correct acknowledgement is given.

If you are the author of this article, you do not need to request permission to reproduce figures and diagrams provided correct acknowledgement is given. If you want to reproduce the whole article in a third-party commercial publication (excluding your thesis/dissertation for which permission is not required) please go to the Copyright Clearance Center request page.

Read more about how to correctly acknowledge RSC content.

Social activity

Spotlight

Advertisements