In Iraq, because of the dramatic turnovers facing the country for three decades, pharmacists continue to experience significant professional challenges in both the public and private sectors. The present study aimed to explore the professional challenges and obstacles facing Iraqi pharmacists working in public hospitals. This qualitative study included face-to-face semi-structured interviews with open-ended questions with hospital pharmacists. The participants were selected purposefully (with ≥ 3 years of experience) to work at governmental hospitals in Karbala province between December 2022 and April 2023. The audio-recording interviews were scripted. Thematic analyses were used to generate themes and subthemes from the interviews. Thirty-two pharmacists participated in this study. The study found that there are many challenges facing Iraqi pharmacists in hospitals. Some of which are related to the pharmacists themselves, such as suboptimal competency with an overwhelming number of pharmacists in each hospital, while the others are related to suboptimal organizational conditions, such as inadequate interdisciplinary collaboration, an unfriendly hospital environment as patients' confrontation, unequal task distributions, and inadequate technology and tools. According to the study findings, greater emphasis should be placed on improving multidisciplinary teamwork, pharmacist competency, the pharmacists' role in hospitals and securing the supply of essential medicines. Most participants recommend enhancing quality over quantity of pharmacists in addition to finding areas and horizons to benefit from these large numbers of pharmacists. Keywords: Iraqi pharmacists, hospital pharmacists, challenges, obstacles, Qualitative study.
Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreIn this work, two cone-inverted cylindrical and cross-hybrid dielectric resonator antennas are stacked and excited by the coaxial probe method with an operating standard resonant frequency of 5.438 GHz. A drawback of these standard Dielectric Resonator Antennas (DRAs) is their narrow bandwidth. For good antenna performance, a stacked DR geometry and a thick dielectric substrate having a low dielectric constant are desired since this provides large bandwidth, better radiation power, reduces conductor loss and nonappearance of surface waves. Many approaches, such as changing the shape of the dielectric resonator, have been used to enhance bandwidth. Using DRA, having the lowest dielectric constant, increases the bandwidth and the electroma
... Show MoreIn this research, the removal of cadmium (Cd) from simulated wastewater was investigated by using a fixed bed bio-electrochemical reactor. The effects of the main controlling factors on the performance of the removal process such as applied cell voltage, initial Cd concentration, pH of the catholyte, and the mesh number of the cathode were investigated. The results showed that the applied cell voltage had the main impact on the removal efficiency of cadmium where increasing the applied voltage led to higher removal efficiency. Meanwhile increasing the applied voltage was found to be given lower current efficiency and higher energy consumption. No significant effect of initial Cd concentration on the removal efficiency of cadmium b
... Show MoreMicrofinance Institutions (MFIs) offers small loans with easy repayment system and till now these institutions have served millions of needy people around the globe. This study highlights the hurdles influence the smooth working and growth of Microfinance institution in Egypt. The structured interviews were conducted from the top and mid-level managers of MFI's. This study revealed that interest rate, political and economic conditions, corruption, customer outreach, competition and technology are the important elements for MFI's success. It is evident that lack of use of technology and less importance drawn on customer outreach programs are the main challenges of MFI's in Egypt. This study provides a roadmap for practitioners and strategic
... Show MoreLocking of the knee is a one of the commonest orthopedic outpatient presentation. This patient usually need magnetic resonance imaging (MRI) when there is suspected lesion in the soft tissue clinically. Meniscal tears is the first differential diagnosis when accompany with painful knee. (1, 2)Giant cell tumor (GCT) is benign a localized nodular tenosynovitis often occur in the tendon sheath , Mostly involve the hand tendons in middle age group between 30 and 50 years old , female affect more than male.(3,4) The WHO defines two well-known kinds of giant cell tumor: (1) pigmented villonodular synovitis ( generalized type), which mainly involve the joints of the lower limb and (2) giant cell tumor of the tendon sheath ( localized type)
... Show MoreSo I present in the hands of the honorable reader what God Almighty has made easy for me in terms of what I dealt with in the rule (the principle of permissive things) and what branches from it and what is related to it.
This research was divided into an introduction, a preface, three demands, and a conclusion.
The preamble is to explain the meaning of the rule in language and terminology and the definition of the legal rule and what is related to it. The first requirement is to explain the rule that we have in our hands and the words related to its text - and is it a fundamentalist or jurisprudential rule? .
As for the second requirement - in the difference of scholars and their opinions in whether the origin of things is permi
Language as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit
... Show More
The human intellect and his ability to complex thinking is a characteristic that Allah has given him above all his creatures. Islam came to encourage the utilization of the mind by thought, contemplation and consideration of the kingdom of Allah, His signs and religion, and He gave us a set of legislation that preserves the mind and protects it from falling into error or deviation.
This research deals with one of the most important components of civilizations in general and Islamic civilization in particular, which is thinking and what is related to it. It is an essential and influential component in man's dealing with life around him and the for
... Show More