Results 211 to 220 of about 77,805 (280)
Some of the next articles are maybe not open access.
Suvremeni promet, 2011
Discussing the issue of self-radicalization and home grown terrorism, I hold that there are two open questions: why and how does this happen? To the question why- the competent people to give answer are sociologists, communicologists, politologs and others, while to the question how this can be carried out in modern world, the answer should be given by
openaire
Discussing the issue of self-radicalization and home grown terrorism, I hold that there are two open questions: why and how does this happen? To the question why- the competent people to give answer are sociologists, communicologists, politologs and others, while to the question how this can be carried out in modern world, the answer should be given by
openaire
Three-Element MIMO Antenna System With Pattern and Polarization Diversity for WLAN Applications
IEEE Antennas and Wireless Propagation Letters, 2017Yashika Sharma +3 more
semanticscholar +1 more source
A Reconfigurable Filtering Antenna With Integrated Bandpass Filters for UWB/WLAN Applications
IEEE Transactions on Antennas and Propagation, 2018Jingya Deng +3 more
semanticscholar +1 more source
A Fully Integrated Shark-Fin Antenna for MIMO-LTE, GPS, WLAN, and WAVE Applications
IEEE Antennas and Wireless Propagation Letters, 2018Oh-Yun Kwon, R. Song, Byung-sung Kim
semanticscholar +1 more source
Dual-band MIMO dielectric resonator antenna for WiMAX/WLAN applications
, 2017A. Khan +5 more
semanticscholar +1 more source
IEEE Antennas and Wireless Propagation Letters, 2017
Jingya Deng +3 more
semanticscholar +1 more source
Jingya Deng +3 more
semanticscholar +1 more source
A multiband antenna loaded with metamaterial and slots for GPS/WLAN/WiMAX applications
, 2018T. Ali +3 more
semanticscholar +1 more source
2009
In a wired local area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN.
openaire +1 more source
In a wired local area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN.
openaire +1 more source

