Generation X

Results: 478



#Item
451Scientific method / X-ray computed tomography / Tomography / Microscopy / X-ray microscope / Voxel / Small-angle X-ray scattering / Imaging / Optics / Medical imaging

Computed Tomography is a well established technology in a wide field of different applications. The newest generation of micro CT’s is able to image small voxel sizes in the sub-micrometer range, however, physical fact

Add to Reading List

Source URL: ssom.ch

Language: English - Date: 2014-04-15 11:27:33
452X-ray computed tomography / Neuroimaging / Hand luggage / Airport security / Tomography / 3D modeling / Iterative reconstruction / Single-photon emission computed tomography / Medicine / Medical imaging / Medical physics

Radon Transform based Automatic Metal Artefacts Generation for 3D Threat Image Projection Najla Megherbi, Toby P. Breckon, Greg T. Flitton, Andre Mouton

Add to Reading List

Source URL: breckon.eu

Language: English - Date: 2013-08-20 07:39:44
453Arts / Canadian art / Epistolary novels / Literature / Douglas Coupland / Generation X: Tales for an Accelerated Culture

life experience

Add to Reading List

Source URL: qualex.ca

Language: English - Date: 2013-09-12 17:13:56
454Microtechnology / Photolithography / X-ray lithography / Electron beam lithography / Lithography / Resist / Photoresist / Next-generation lithography / Nanolithography / Materials science / Technology / Semiconductor device fabrication

Microsoft PowerPoint - Electron-Beam and X-Ray Lithography.ppt

Add to Reading List

Source URL: www.ece.umd.edu

Language: English - Date: 2007-12-07 18:05:09
455Identification / Information / ISO standards / Universal identifiers / Universally unique identifier / Globally unique identifier / Abstract Syntax Notation One / X.400 / ITU-T / OSI protocols / Computing / Identifiers

ITU-T Rec. X[removed]Information technology - Open Systems Interconnection - Procedures for the operation of OSI Registration Authorities: Generation and registration of Universally Unique Identifiers (UUIDs) and their use as ASN.1 Object ...

Add to Reading List

Source URL: www.itu.int

Language: English - Date: 2006-03-31 07:48:22
4563D computer graphics / Numerical analysis / Biomedical engineering / Computing / Software / ScanIP / 3D modeling / X-ray computed tomography / Volume mesh / Computer graphics / Mesh generation / 3D graphics software

Simpleware: From 3D image to mesh in minutes Emma AC Johnson, Communications Officer and Dr Philippe G. Young, Managing Director, Simpleware Ltd.

Add to Reading List

Source URL: www.csar.cfs.ac.uk

Language: English - Date: 2005-12-13 09:56:58
457Anatomy / Physical attractiveness / Design for X / MakeHuman / Ergonomics / BWH / Model / Waist / 3D modeling / Human body / Software / Body shape

Dorien Van Deun, Automatic personalized models Automatic Generation of Personalized Human Models

Add to Reading List

Source URL: media.univ-lyon1.fr

Language: English - Date: 2011-05-06 07:57:00
458Public economics / Generation Y / Baby boomer / Generation X / Generation / Youth culture / Intergenerationality / Strauss-Howe generational theory / Demographics / Demography / Population

McCrindle Research The ABC of XYZ: Generational Diversity at Work A paper by Mark McCrindle, McCrindle Research Pty Ltd

Add to Reading List

Source URL: www.quayappointments.com.au

Language: English - Date: 2004-02-11 09:00:00
459Fight Club / Chuck Palahniuk / Invisible Monsters / Haunted / Lullaby / Diary / Narrator / Brad Pitt / Generation X: Tales for an Accelerated Culture / Literature / Fiction / Cacophony Society

The Fiction of Self-destruction: Chuck Palahniuk, Closet Moralist

Add to Reading List

Source URL: www.stirrings-still.org

Language: English - Date: 2006-01-24 16:21:39
460Cryptographic protocols / Diffie–Hellman key exchange / Key generation / Digital signature / RSA / Key / X.509 / Cipher / Elliptic curve Diffie–Hellman / Cryptography / Public-key cryptography / Key management

Public Key Cryptography - Applications Algorithms and Mathematical Explanations Public Key Cryptography

Add to Reading List

Source URL: www.infosecwriters.com

Language: English - Date: 2007-06-12 10:38:53
UPDATE