BACKGROUND: Hospital training courses for pharmacy students were required to prepare students to meet the challenges of real-world hospital work. AIM: Because there have been few studies on the efficacy of such courses, we aimed to recognize recent graduates’ perceptions, benefits, and factors influencing the quality of hospital training courses for pharmacy students. METHODS: A qualitative study using a phenomenology approach was conducted in 2022 and included several hospitals in Baghdad, Iraq, using in-depth face-to-face individual-based semi-structured interviews. Until saturation, a convenient sample of recently graduated pharmacists was included. The obtained data were analyzed using a thematic content analysis approach. RESULTS: A total of 40 recently graduated pharmacists participated in this study. Twenty-two participants took the hospital training course by direct attendance, while eighteen received the course online. A higher proportion of pharmacists stated that the hospital training course was beneficial and effective. The information obtained in the course is adequate in the direct attendance group, while those in the online group are inadequate. The teaching staff was the most influential factor influencing educational quality. The stress of studying during the training course hampered approximately 40% of the participants. CONCLUSION: The hospital training course effectively prepared the graduate pharmacist for future work in hospitals. On the other hand, the online training course was insufficient and only provided students with theoretical, repetitive information with no practical engagement. Still, there is a need to improve the course in terms of lengthening the course, reducing crowding, and expanding the role of the teaching staff.
Abstract
This work involves studying the effect of adding some selective organic component mixture on corrosion behavior of pure Al and its alloys in condensed synthetic automotive solution (CSAS) at room temperature. This mixture indicates the increasing of octane number in previous study and in this study show the increasing in corrosion resistance through the decreasing in corrosion rate values.
Electrochemical measurements were carried out by potentiostat at 3 mV/sec to estimate the corrosion parameters using Tafel extrapolation method, in addition to cyclic polarization test to know the pitting susceptibility of materials in tested medium.
The cathodic Tafel slope
... Show MoreObjective(s): To determine the impact of instructional intervention program upon psychological health status for
women who undergo chemotherapy after mastectomy
Methodology: The sample consisted of (100) women, (50) considered as study group, and another (50) the control
group. A pre test was done for both groups (study and control), and then the study samples were exposed to an
instructional intervention and three-dimensional post tests and the length of time between each test 21 days in
the Institute and Hospital of Radiation and Nuclear Medicine. The questionnaire composed of three parts, first,
demographic information; include (age, educational level, type of family, occupation, marital status, and adequacy
of mo
This paper presents a method to organize memory chips when they are used to build memory systems that have word size wider than 8-bit. Most memory chips have 8-bit word size. When the memory system has to be built from several memory chips of various sizes, this method gives all possible organizations of these chips in the memory system. This paper also suggests a precise definition of the term “memory bank” that is usually used in memory systems. Finally, an illustrative design problem was taken to illustrate the presented method practically.
By optimizing the efficiency of a modular simulation model of the PV module structure by genetic algorithm, under several weather conditions, as a portion of recognizing the ideal plan of a Near Zero Energy Household (NZEH), an ideal life cycle cost can be performed. The optimum design from combinations of NZEH-variable designs, are construction positioning, window-to-wall proportion, and glazing categories, which will help maximize the energy created by photovoltaic panels. Comprehensive simulation technique and modeling are utilized in the solar module I-V and for P-V output power. Both of them are constructed on the famous five-parameter model. In addition, the efficiency of the PV panel is established by the genetic algorithm
... Show More
The complete genome sequence of bacteriophage VPUSM 8 against O1 El Tor Inaba
Fluconazole was used to test the susceptibility of Candida albicans isolated from different clinical samples, and to detect mutations in ERG11 gene, and their relationship to fluconazole resistance. Forty-eight isolates of Candida albicans were tested for susceptibility using the disc diffusion method (M-44). ERG11 genes of six isolates were amplified (four resistant, two susceptible) and sequenced. The sequenced genes were analyzed to detect the mutations. Out of 48 isolates of Candida albicans, 4 (8%) were resistant to fluconazole. Sixteen-point mutations were detected included 13 silent mutations, and three missense mutations. The mutations of A945C (E266D) and G1609A (V488I) were found only in susceptible Candida albicans isolates, whil
... Show MoreRate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal. The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in
... Show MoreObjectives: The aim of this study to assess instructional labor support behaviors among laboring
women in teaching hospitals in Hilla city.
Methodology: A descriptive analytic study was concluded to select a sample purposely of one hundred
multipara laboring women in maternity hospital in Hilla city and data was collected through
questionnaire form during February (1
st to March 30th) 2014. A descriptive statistical method was used
to analyze the data.
Results: The result showed that the highest percentage of study sample was at age (20-24) years, most
of them was house wife, more than third graduate from primary school, and more than half of them
lived in rural area, (86%) of study sample delivered normal deli
Excessive water production is a persistent challenge in oil and gas wells, with polymer and gel solutions commonly employed for water control. This study investigates the rheological behaviour of cross-linked polyacrylamide gels and their impact on water shutoff treatment in gas wells. Rheological measurements, coreflooding experiments using Berea sandstone samples, and micromodel flow visualizations were conducted to evaluate gel performance. Results showed that during water injection, the water residual resistance factor ( Frrw ) decreases with increasing flow rates, mainly due to gel shear thinning behaviour and reduced residual gas saturation. Higher polymer concentrations in the gel enhance water permeability reduction. In contrast, un
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More