Abstract Portable communication devices such as WLAN, WiMAX, LTE, ISM, and 5G utilize one or more of the triple bands at (2.32.7 GHz,3.4–3.6GHz,and5–6GHz)andsufferfromtheeffectofmultipathproblemsbecausetheyareusedinurbanregions.To date, no one has performed a review of the antennas used for these types of wireless communications. This study reviewed two types of microstrip antennas (slot and fractal) that have been reported by researchers (as a single element) using a survey that included the evaluation of several important specifications of the antennas in previous research, such as operating bandwidth, gain, efficiency, axial ratio bandwidth (ARBW), and size. The weaknesses in the design of all antennas were carefully identified to determine the most important challenges in the design of these antennas and name the most important limits in the design to be overcome in future research. This study also indicated some antennas that have circular polarization characteristics, the techniques used to generate the circular polarization characteristics, and the challenges. Finally, several suggestions as a guideline for antenna design and future work in designing antennas for Wi-Fi, LTE, and WiMAX communications, according to the market demands, and methods for overcoming the identified limits are presented.
In the age of information and communication revolution, education as one of life aspects has influenced with that revolution by integrating technology in education, which have become as an important learning tools of the whole educational process . Technology, when used appropriately, can help make science classroom a site of active learning and critical thinking, furthering student inquiry and connections with different materials. It is necessary to develop human rights education programs and materials for discretionary and extracurricular activities as it provide them with the skills and tools so that they are empowered to take action to realize their rights. Human rights education is a critical means of instilling the knowledge، skil
... Show MoreBACKGROUND: Femoral shaft fracture is a common fracture in pediatric age group reaching 62% of all fracture shaft femur in children in spite of rapid union rate and successful conservative treatment but some cases need surgical intervention and one of the methods using plate and screw by the lateral approach. AIM: This study aims to compare functional outcome fixation of mid-shaft femur fracture in children by plate and screws between (subvastus lateralis and transvastus lateralis) regarding infection, union, and limitation of knee movement. PATIENT AND METHOD: The study was done on 30 children who had diaphyseal fracture femur in Al-Kindy Teaching Hospital in period (April 2018–April 2020) with 6 months follow-up, and the pa
... Show MoreBackground: Repeated teenage pregnancy is a major burden on the healthcare system worldwide. Objective: We aimed to compare teenagers with their first and third pregnancies and to evaluate the likelihood of neonatal complications. Materials and Methods: This cross-sectional study was performed on female teenagers (aged ≤ 19 yr) with singleton pregnancies. The subjects (n = 298) were screened over 12 months. Ninety-six women were excluded, based on the exclusion criteria. The remaining subjects (n = 202) were divided into two groups: teenagers with first pregnancy (n = 96) and teenagers with third pregnancy (n = 47). The subjects were observed throughout pregnancy and delivery. The final sample size of the first and thi
... Show MoreThe objective of this study is to attempt to provide a quantitative analysis to the causes of unemployment in Iraq and its mechanisms of generation, as well as a review of the most important types of both visible and invisible unemployment, and an attempt to measure the disguised unemployment and analyze the causes. The problem of the research lies in the fact that the Iraqi Economy has been suffered for a long time although its characterized by abundant physical and natural resources, from the existence of the phenomenon of unemployment in the previous two types. Causing a lot of economic problems, represented by the great waste of resources and
... Show MoreAbstract:
Viral marketing has become one of the modern strategies adopted by organizations in the marketing of products and services. The idea of viral marketing focuses on the social relations between individuals and groups. As a result of the technological development, most organizations have resorted to using the Internet and its applications and social media to market and promote their products. To reach the largest number of consumers to display their products and services in many ways, including text, audio, visual or video and thus affect the behavior of the consumer.
The problem of the study was the following question (do viral marketing technologies have an impact on consumer behavior?)
... Show MoreThe study aims to find out the extent to which several Iraqi institutional accreditation standards (governance and administration, scientific research, curricula) are applied in two public universities (Baghdad and Middle Technical University) and two private universities (Uruk and Al-Mansour College) by diagnosing strengths and weaknesses and proposing a mechanism and procedures to help educational institution aims to reduce or eliminate the gap. The study stems from the extent of application of several Iraqi institutional accreditation standards represented as it was worked on through observation and field coexistence to reach scientific and practical facts. The method of case study and comparison betwe
... Show MoreAbstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show More