Mobile Communications- Network Architecture and Functionality | Mobile Communications- Network Architecture and Functionality | |
Mobile IP and Patch Antennas | Mobile IP and Patch Antennas | |
Mobile IPv4 v6 | Mobile IPv4 and v6 | |
Mobile Network Challenges | Mobile Network Challegnes | |
Mobile evolution 5G (B6,D4,F1) | Mobile Systems, LTE and beyond | |
Mobile network security | Mobile network security | |
Mobile network security S11 | Mobile network security S11 | |
Mobility and Handover in mobile systems | Mobility & Handover in mobile systems | |
Mobility in heterogeneous networks (E1) | Mobility heterogeneous networks (E1) | |
Modelling your own ontology - 2013 | Modelling your own ontology | |
More info to come .... | more info to come .... | |
Multiple Access | Multiple Access | |
Near Field Communication,Bluetooth, ZigBee and ANT+ | Near Field Communication, Bluetooth, ZigBee & ANT+ | |
Pellets-based reasoning | Pellets-based reasoning | |
Pellets-based reasoning II | Pellets-based reasoning II | |
Policies and Semantic Web Rules in Practise | Policies and Semantic Web Rules in Practise | |
Prepare for Reasoning with SWRL | Prepare for Reasoning with SWRL | |
Project Presentation | Project Presentation - 2 | |
Project Presentations - 1 | Project Presentations - 1 | |
Propagation Characteristics of Wireless Channel-I | Propagation Characteristics of Wireless Channel-I | |
Propagation Characteristics of Wireless Channel-II | Propagation Characteristics of Wireless Channel-II | |
Propagation Characteristics of Wireless Channels | Propagation Characteristics of Wireless Channels | |
Propagation Models and Free Internet | Propagation Models and Free Internet | |
Protocol security | Protocol security | |
Public Holidays | Public Holidays | |
Public-key cryptography | Public-key cryptography | |
Radio propagation and free space attenuation | Radio propagation - II | |
Radio propagation equation (A4,B1) | Radio propagation for mobile and wireless communications | |
RecentPages | | |
Refarming and the challenges of Mobile Communications | Refarming and other challenges for Mobile Communications | |
Regional Hydrogen Strategy Akershus | Regional Hydrogen Strategy Akershus | |
Rehearsal of lectures | Rehearsal of lectures | |
Rehearsel of lectures - learning outcomes | Rehearsal of lectures - learning outcomes | |
Repetition and Walk Through on the course including Exam guidance | Repetition and Walk Through on the course including Exam guidance | |
Reserved day for Exam UNIK4700/UNIK9700 | Reserved Date for Exam UNIK4700h17 | |
Running SWRL rules on your ontology | Running SWRL rules on your ontology | |
SDN and NFV: The enablers for elastic networks - Guest Lecture | SDN and NFV: The enablers for elastic networks - Guest Lecture | |
SOA and Web services security | SOA and Web services security | |
Self study: Draw ontologies and rules | Self study: Draw ontologies and rules | |
Semantic Technologies | | |
Semantic Web Rule Language | Semantic Web Rule Language | |
Semantics in mobile networks | Semantics in mobile networks | |
Small Cells and HetNets | Small Cells and HetNets | |
Small Cells and HetNets / Mobile Broadband II | Small Cells and HetNets / Mobile Broadband II | |
Solar Cells | Solar Cells | |
Spectrum Management | Spectrum Management | |
Student seminar 2015 | Student seminar 2015 | |
Student's Seminar | Student's Seminar | |
Student's Seminar-2013 | Student's Seminar-2013 | |
Symmetric encryption and message confidentiality | Symmetric encryption and message confidentiality | |