Background There is an increasing need for pharmacists to incorporate more patient care targeting. Consequently, the productivity of pharmacy programs can be enhanced by evaluating the advantages and disadvantages of pharmacy curriculum. Objectives To assess the beliefs, perceptions, and challenges of the College of Pharmacy –The University of Baghdad PharmD graduates regarding the PharmD program. Method Qualitative research methodology was implemented. Graduate PharmD candidates were interviewed either inperson or via telephone. The interviews were conducted in a semi-structured format, utilizing a predetermined interview guide that included open-ended questions. Thematic analysis was implemented to analyze the data. Results A total of 21 in-depth interviews were conducted. The participants commonly expressed that the program significantly enhances their clinical proficiency, particularly in hospital settings. Valuable clinical skills were acquired through college scientific activities during courses. The participants advocated for the implementation of more scientific activities to enhance the quality of education and endorsed the use of OSCE exam methodologies for all final exams. Their clinical abilities were enhanced by the hospital training course they completed during their senior year. Their clinical knowledge is enhanced through daily interaction with clinical pharmacists. The primary method of enhancing hospital training is through the development of trainer skills. The primary obstacles include the difficulty of the test, the distribution of subjects irregularly, and the intensive summer lectures. Conclusion The PharmD program effectively prepared the graduate pharmacist for future employment in community pharmacies or hospitals by enhancing their clinical practice abilities. Nevertheless, there is a necessity to enhance the course by reducing the number of non-clinical subjects, enhancing the trainer’s training capabilities, and increasing the variety of scientific activities.
Radiation treatment has long been the conventional approach for treating nasopharyngeal cancer (NPC) tumors due to its anatomic features, biological characteristics, and radiosensitivity. The most common treatment for nasopharyngeal carcinoma is radiotherapy. This study aimed to assess the better quality of radiotherapy treatment techniques using intensity-modulated radiotherapy (IMRT) and volumetric-modulated arc therapy (VMAT). The VMAT and IMRT are comparative techniques. Forty patients with nasopharyngeal carcinoma and forwarded for radiotherapy were treated with both advanced techniques, IMRT and VMAT, using eclipse software from Varian. The x-ray energy was set at 6 MV. The total prescribed dose was 70 Gy. The results show that the
... Show MoreThe main function of a power system is to supply the customer load demands as economically as possible. Risk criterion is the probability of not meeting the load. This paper presents a methodology to assess probabilistic risk criteria of Al-Qudus plant before and after expansion; as this plant consists of ten generating units presently and the Ministry Of Electricity (MOE) is intending to compact four units to it in order to improve the performance of Iraqi power system especially at Baghdad region. The assessment is calculated by a program using Matlab programming language; version 7.6. Results show that the planned risk is (0.003095) that is (35 times) less than that in the present plant risk; (0.1091); which represents respectable imp
... Show MoreBackground: Recurrent aphthous ulceration (RAU) is an inflammatory condition of unknown etiology characterized by painful recurrent (single or multiple) ulcerations of the oral mucosa. It is one of the most common and poorly understood mucosal disorders. It occurs more frequently in times of stress. Local and systemic conditions, genetic, immunologic, microbial factors, and oxidative stress may play a role in the pathogenesis of RAU. The objective of this study was to evaluate the free radical metabolism and antioxidant activity of RAU patients treated by lavender or flax oil paint.
Materials and Methods: Sixty-six RAU patients were enroll
... Show MoreA new class of biologically active nanocomposites and modified polymers based on poly (vinyl alcohol) (PVA) with some organic compounds [II, IV, V and VI] were synthesized using silver nanoparticles (Ag-NPs). All compounds were synthesized using nucleophilic substitution interactions and characterized by FTIR, DSC and TGA. The biological activity of the modified polymers was evaluated against: gram (+) (staphylococcus aureus) and gram (-): (Es cherichia coli bacteria). Antimicrobial films are developed based on modified poly (vinyl alcohol) MPVA and Ag-NPs nanoparticles. The nanocomposites and modified polymers showed better antibacterial activities against Escherichia coli (Gram negative) than against Staphyloc
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables