Repository eprint
نویسندگان
چکیده
The Avogadro constant has been determined by atom counting in two enriched 28Si spheres. Atoms were counted by exploiting their ordered arrangement in the spheres and calculating the ratio between sphere and the unit cell volumes. This paper describes how the values of the sphere lattice-parameters and, consequently, their unit-cell volumes, were obtained. PACS numbers: 06.20.-f, 06.20.Jr, 07.05.Kf
منابع مشابه
Eprints and the Open Archives Initiative
The Open Archives Initiative (OAI) was created as a practical way to promote interoperability between eprint repositories. Although the scope of the OAI has been broadened, eprint repositories still represent a significant fraction of OAI data providers. In this article I present a brief survey of OAI eprint repositories, and of services using metadata harvested from eprint repositories using t...
متن کاملEprint archives through open citation linking (the OpCit project)
The Los Alamos Eprint Archive (LANL) is a public repository for a growing proportion of the current research literature in physics. The Open Citationlinking Project (OpCit) is making this resource still more powerful and useful for its current physicist users by connecting each paper to each paper it cites; this can be extended to all the rest of the disciplines in other open archives designed ...
متن کاملThe Webometric Status of Iran Medical Sciences Universities with Emphasis on Scientific Repositories
Aim: Webometric is the quantitative study of production aspects and use of information resources, structures on the Web. This study aimed to evaluate and rank the websites of Iran medical sciences' universities with an emphasis on scientific repository.Method: 48 websites of Iran medical sciences universities were surveyed. They were studied on 23 March 2017 to 28 March 2017 using webomet...
متن کاملA Constructive Approach to Functional Encryption
Functional encryption is an important generalization of several types of encryption such as publickey, identity-based, and attribute-based encryption. Numerous different security definitions for functional encryption have been proposed, most of them being rather complex and involving several algorithms. Many of these definitions differ in details such as which algorithm has oracle access to whi...
متن کاملFormal Notions of Anonymity for Peer-to-peer Networks
Providing anonymity support for peer-to-peer (P2P) overlay networks is critical. Otherwise, potential privacy attacks (e.g., network address traceback) may deter a storage source from providing the needed data. In this paper we use this practical application scenario to verify our observation that network-based anonymity can be modeled as a complexity based cryptographic problem. We show that, ...
متن کامل