Background: The roles of AI in the academic community continue to grow, especially in the enhancement of learning outcomes and the improvement of writing quality and efficiency. Objectives: To explore in depth the experience of senior pharmacy students in using artificial intelligence for academic purposes. Methods: This qualitative study included face-to-face individual interviews with senior pharmacy students from March to May 2023 using a pre-planned interview guide of open-ended questions. All interviews were audio-recorded. Thematic analysis was used to analyze the data. Results: The results were obtained from 15 in-depth face-to-face interviews with senior pharmacy students (5th and 4th years). Eight participants were male, and seven
... Show MoreObjectives. This study was carried out to quantitatively evaluate and compare the sealing ability of Endoflas by using differentobturation techniques. Materials and Methods. After 42 extracted primary maxillary incisors and canines were decoronated, theircanals were instrumented with K files of size ranging from #15 to #50. In accordance with the obturation technique, the sampleswere divided into three experimental groups, namely, group I: endodontic pressure syringe, group II: modified disposable syringe,and group III: reamer technique, and two control groups. Dye extraction method was used for leakage evaluation. Data wereanalyzed using one-way ANOVA and Dunnett’s T3 post hoc tests. The level of significance was set at p<0:05. Results.
... Show MoreCervical carcinoma represent the second predominant cancer in female and there is a strong correlation between cervical cancer and the infection with high-risk types of HPV and expression the viral oncogenes. EMT is viewed as a vital advance in carcinoma development and ensuing metastasis. To evaluate correlation between the expression of Twist and HPV16 infection in a group of Iraqi patients with cervical carcinoma. A total of forty paraffin blocks included in this study which were divided into 30 sample of cervical cancer infected with HPV16and 10 sample of normal cervical tissues. The samples were subjected to immunohistochemical technique using Anti-Twist2 polyclonal antibody. The obtained data from this study indicate that majority of
... Show MoreBackground: Implant stability is a mandatory factor for dental implant (DI) osseointegration and long-term success. The aim of this study was to evaluate the effect of implant length, diameter, and recipient jaw on the pre- and post-functional loading stability. Materials and methods: This study included 17 healthy patients with an age range of 24-61 years. Twenty-two DI were inserted into healed extraction sockets to replace missing tooth/ teeth in premolar and molar regions in upper and lower jaws. Implant stability was measured for each implant and was recorded as implant stability quotient (ISQ) immediately (ISQ0), and at 8 (ISQ8) and 12 (ISQ12) weeks postoperatively, as well as post-functional loading (ISQPFL). The pattern of implant
... Show MoreAbstract Daily dressing changes cause distress and pain for victims of burn injuries. The study aimed to determine the effect of music in reducing the pain and anxiety of thermally burned children during routine dressing changes. This quantitative study employed a randomized controlled trial design. The participants comprised 80 children at the Specialized Burns Hospital, in Baghdad, Iraq who were divided into two groups. The intervention group were exposed to three generic musical pieces (children’s music, nature sounds, and classical music) for 10-15 minutes. The researchers used the Objective Pain Scale, State-Trait Anxiety Inventory, and physiological parameters to measure the children’s responses immediately before the dressing cha
... Show MoreBackground: Insufficient sleep due to excessive media use is linked to decrease physical activity, poor nutrition, obesity, and decreased overall health-related quality of life.
Objectives: To assess the effect of using the internet and social media on the sleep of 4th-stage secondary school students.
Subjects and Methods: Cross-sectional study with the analytic element; for 500 secondary school students, obtained by choosing two schools randomly from each of the six educational directorates, by using a structured questionnaire.
Result: Secondary scho
... Show More
The increase in military spending has become a feature of the times for many countries, including China. They have sought to increase their defence spending, not with the aim of domination and possession, but rather to protect their economic interests and to secure their foreign trade. The research aims to identify the impact of military spending by studying the nature of defence spending and its role in providing security. And stability and facilitating foreign investment in it, as well as storming the military industry, securing some humanitarian supplies, and participating in a variety of public works that can be used in the civil and military fields, and the aim of the research is to id
... Show MoreIn this work we prepared some schiff bases by condensation urea and benzaldehyde or its derevative ( bromo benzaldehyde or hydroxy benzaldehyde ) as ( 1 : 1 ) mole ( urea : benzaldehyde or its substitution ) to prepare compounds ( A1 , B1 , C1 , D1 , E1 , F1 , G1 ) and ( 1 : 2 ) mole ( urea : benzaldehyde or its substitution ) to prepare compounds ( A2 , B2 , C2 , D2 , E1 , F2 , G2 ) . The prepared compounds identified spectroscopic by infrared spectroscopy FT-IR and Thin layer chromotography T.L.C . The force constant calculated from the wave number for the carbonyl stretching from FT-IR chart and by using the following equation K = 4?2C2?'2? The change in double bond order for carbonyl deteremined in according with some past re
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show More