Advanced Graphics - Periodic Table Sample

This sample demonstrates many different methods of painting directly to a form to and creating 'clickable' regions. The project draws the Periodic Table and all associated properties with each element.



Click here for a larger image.

On top you find the Table of Mendeliev (of Mendeljef), beneath, the properties of the current selected element (inverted box in the table).

You can select a chemical element:

  • using the cursor keys
  • by clicking the element in the table
  • using the popup-menu item : Go to element
  • by clicking then Go to element button (binoculars)

The Presented Properties

Average atomic mass IonCharge Oxidationnumber
Covalent radii ( E ) Electro-negativity 1st Ionisation potential ( in eV )
Density ( 10e3 . kg / m3 ) Specific gravition Specific heat ( Joule / g .0C )
Evaporation heat Boiling point ( 0C ) Melting point ( 0C )
Fusion heat Heat conduction Electric conduction

When you click one of these properties, they will be presented graphically in the table.>p

Oxidate Trap

picture

Meaning

  • 2 - acid oxide
  • 8, 5 - predominantly acid amphoteric
  • 3, 7 - amphoteric
  • 9, 4 - predominantly basic amphoteric
  • 1 - basic oxide
  • 6 - state doesn't exist, is onstable or badly defined
  • * - approximate stoechimetry of the oxide
  • ( ) - are rare

Download Zipped Project File (26k)



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Nowadays, organizations can't afford to operate without an email security strategy. The threat landscape is constantly changing with new threats appearing every day. This white paper looks at email security in small and medium businesses (SMBs), the solutions available and what features SMBs cannot do without.

  • Live Event Date: May 13, 2105 @ 1:00 p.m. ET / 10:00 a.m. PT Your data is a valuable asset that can quickly transform into a liability when breached. Organizations often become hung up on combating external breaches, while the insider threat doesn't get the attention it deserves. To manage both external and internal threats, new approaches to security are required, particularly in regards to authorized internal users who have legitimate access to sensitive information. Join TITUS and a guest speaker from …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date