Response to “Comment on ‘Proposed model for calculating the standard formation enthalpy of binary transition-metal systems’ ” [Appl. Phys. Lett. 86, 216103 (2005)]
نویسندگان
چکیده
منابع مشابه
investigating the feasibility of a proposed model for geometric design of deployable arch structures
deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...
Reply to : “ Comment on : ‘ Chiral anomalies and rooted staggered fermions ’ [ Phys . Lett . B 649 ( 2007
I respond to the Bernard et al. comment on my Letter “Chiral anomalies and rooted staggered fermions”. © 2007 Published by Elsevier B.V. In their comment on my Letter “Chiral anomalies and rooted staggered fermions” [1], Bernard, Golterman, Shamir, and Sharpe [2] do not address the main point that the chiral symmetry group for the rooted theory has a higher rank than the target theory. This imm...
متن کاملComment on ‘ ‘ Quantum waveguide array generator for performing Fourier transforms : Alternate route to quantum computing ’ ’ † Appl . Phys . Lett . 79 , 2823 „ 2001
In their letter Akis and Ferry propose a quantum waveguide array approach for performing quantum Fourier transforms ~QFTs!. The waveguide produces 2 waves at its output with controllable relative phases; n is the number of binary splits of the input wave. The interference pattern from these waves is recorded and implements a Fourier transform. The authors claim that their waveguide approach is ...
متن کامل8 Comment on “ Exposed - Key Weakness of αη ” [ Phys . Lett . A 370
We show that the claim of insecurity of the Y-00 (or αη) cryptosystem made by C. Ahn and K. Birnbaum in Phys. Lett. A 370 (2007) 131-135 even under ciphertextonly heterodyne attack, as well as the unfavorable security comparison between αη and an additive stream cipher for all kinds of attacks, is based on invalid extrapolations of Shannon’s random cipher analysis to two concrete ciphers. We ge...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied Physics Letters
سال: 2005
ISSN: 0003-6951,1077-3118
DOI: 10.1063/1.1939080