Abstract Portable communication devices such as WLAN, WiMAX, LTE, ISM, and 5G utilize one or more of the triple bands at (2.32.7 GHz,3.4–3.6GHz,and5–6GHz)andsufferfromtheeffectofmultipathproblemsbecausetheyareusedinurbanregions.To date, no one has performed a review of the antennas used for these types of wireless communications. This study reviewed two types of microstrip antennas (slot and fractal) that have been reported by researchers (as a single element) using a survey that included the evaluation of several important specifications of the antennas in previous research, such as operating bandwidth, gain, efficiency, axial ratio bandwidth (ARBW), and size. The weaknesses in the design of all antennas were carefully identified to determine the most important challenges in the design of these antennas and name the most important limits in the design to be overcome in future research. This study also indicated some antennas that have circular polarization characteristics, the techniques used to generate the circular polarization characteristics, and the challenges. Finally, several suggestions as a guideline for antenna design and future work in designing antennas for Wi-Fi, LTE, and WiMAX communications, according to the market demands, and methods for overcoming the identified limits are presented.
This narrative review focused on research investigating the impact of loneliness on the prevalence of dementia and its relationship with other risk factors. A comprehensive and rigorous search was conducted using a variety of scientific databases with specific keywords to identify all prior studies that examined the correlation between dementia and loneliness. The inquiry was confined to articles published in English from January 2017 to March 2024. The narrative review identified a consensus regarding the role of loneliness in enhancing the risk of all‐cause dementia, with a particular emphasis on the subjective perception of loneliness. This phenomenon may be caused by the sensations of exclusion, discrimination, and alienation that are
... Show Moreتعد مراجعة النظير واحدة من الأســاليب الحديثة فــي مجال الرقابة والتدقيق ونشــأة كأداة لقياس مــدى فاعليــة الرقابــة علــى الجــودة هو لبنة أساسية في إدارة الجودة الشاملة ووسيلة لتحســين أدوات الرقابــة المعمول بها، وللتحقق من مدى الانسجام بين المعايير الدولية للأجهزة العليا للرقابة المالية والمحاسبة والاجراءات المعمول بها من قبل الاجهزة العليا للرقابة وعليه فأن مراجعة النظير أداة تستخدم ف
... Show MoreCurrently, there is an intensive development of bipedal walking robots. The most known solutions are based on the use of the principles of human gait created in nature during evolution. Modernbipedal robots are also based on the locomotion manners of birds. This review presents the current state of the art of bipedal walking robots based on natural bipedal movements (human and bird) as well as on innovative synthetic solutions. Firstly, an overview of the scientific analysis of human gait is provided as a basis for the design of bipedal robots. The full human gait cycle that consists of two main phases is analysed and the attention is paid to the problem of balance and stability, especially in the single support phase when the biped
... Show MoreThis work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreIn the present article, we implement the new iterative method proposed by Daftardar-Gejji and Jafari (NIM) [V. Daftardar-Gejji, H. Jafari, An iterative method for solving nonlinear functional equations, J. Math. Anal. Appl. 316 (2006) 753-763] to solve two problems; the first one is the problem of spread of a non-fatal disease in a population which is assumed to have constant size over the period of the epidemic, and the other one is the problem of the prey and predator. The results demonstrate that the method has many merits such as being derivative-free, overcome the difficulty arising in calculating Adomian polynomials to handle the nonlinear terms in Adomian Decomposition Method (ADM), does not require to calculate Lagrange multiplier a
... Show More