Background There is an increasing need for pharmacists to incorporate more patient care targeting. Consequently, the productivity of pharmacy programs can be enhanced by evaluating the advantages and disadvantages of pharmacy curriculum. Objectives To assess the beliefs, perceptions, and challenges of the College of Pharmacy –The University of Baghdad PharmD graduates regarding the PharmD program. Method Qualitative research methodology was implemented. Graduate PharmD candidates were interviewed either inperson or via telephone. The interviews were conducted in a semi-structured format, utilizing a predetermined interview guide that included open-ended questions. Thematic analysis was implemented to analyze the data. Results A total of 21 in-depth interviews were conducted. The participants commonly expressed that the program significantly enhances their clinical proficiency, particularly in hospital settings. Valuable clinical skills were acquired through college scientific activities during courses. The participants advocated for the implementation of more scientific activities to enhance the quality of education and endorsed the use of OSCE exam methodologies for all final exams. Their clinical abilities were enhanced by the hospital training course they completed during their senior year. Their clinical knowledge is enhanced through daily interaction with clinical pharmacists. The primary method of enhancing hospital training is through the development of trainer skills. The primary obstacles include the difficulty of the test, the distribution of subjects irregularly, and the intensive summer lectures. Conclusion The PharmD program effectively prepared the graduate pharmacist for future employment in community pharmacies or hospitals by enhancing their clinical practice abilities. Nevertheless, there is a necessity to enhance the course by reducing the number of non-clinical subjects, enhancing the trainer’s training capabilities, and increasing the variety of scientific activities.
Abstract
The net profit reported in the annual financial statements of the companies listed in the financial markets, is considered one of the Sources of information relied upon by users of accounting information in making their investment decisions. At the same time be relied upon in calculating the bonus (Incentives) granted to management, therefore the management of companies to manipulate those numbers in order to increase those bonuses associated to earnings, This practices are called earnings management practices. the manipulation in the figures of earnings by management will mislead the users of financial statements who depend on reported earnings in their deci
... Show MoreThe present work aimed to make a comparative investigation between three different ionospheric models: IRI-2020, ASAPS and VOACAP. The purpose of the comparative study is to investigate the compatibility of predicting the Maximum Usable Frequency parameter (MUF) over mid-latitude region during the severe geomagnetic storm on 17 March 2015. Three stations distributed in the mid-latitudes were selected for study; these are (Athens (23.50o E, 38.00o N), Jeju (124.53o E, 33.6o N) and Pt. Arguello (239.50o W, 34.80o N). The daily MUF outcomes were calculated using the tested models for the three adopted sites, for a span of five-day (the day of the event and two days preceding and following the event day). The calculated datasets were co
... Show MoreModeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show MorePollutants generation is strongly dependant on the firing temperature and reaction rates of the gaseous reactants in the gas turbine combustion chamber. An experimental study is conducted on a two-shaft T200D micro-gas turbine engine in order to evaluate the impact of injecting ethanol directly into the compressor inlet air on the exhaust emissions. The study is carried out in constant speed and constant load engine tests. Generally, the results showed that when ethanol was added in a concentration of 20% by volume of fuel flow; NOx emission was reduced by the half, while CO and UHC emissions were almost doubled with respect to their levels when burning conventional LPG fuel alone.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
The image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o
... Show More