In Iraq, because of the dramatic turnovers facing the country for three decades, pharmacists continue to experience significant professional challenges in both the public and private sectors. The present study aimed to explore the professional challenges and obstacles facing Iraqi pharmacists working in public hospitals. This qualitative study included face-to-face semi-structured interviews with open-ended questions with hospital pharmacists. The participants were selected purposefully (with ≥ 3 years of experience) to work at governmental hospitals in Karbala province between December 2022 and April 2023. The audio-recording interviews were scripted. Thematic analyses were used to generate themes and subthemes from the interviews. Thirty-two pharmacists participated in this study. The study found that there are many challenges facing Iraqi pharmacists in hospitals. Some of which are related to the pharmacists themselves, such as suboptimal competency with an overwhelming number of pharmacists in each hospital, while the others are related to suboptimal organizational conditions, such as inadequate interdisciplinary collaboration, an unfriendly hospital environment as patients' confrontation, unequal task distributions, and inadequate technology and tools. According to the study findings, greater emphasis should be placed on improving multidisciplinary teamwork, pharmacist competency, the pharmacists' role in hospitals and securing the supply of essential medicines. Most participants recommend enhancing quality over quantity of pharmacists in addition to finding areas and horizons to benefit from these large numbers of pharmacists. Keywords: Iraqi pharmacists, hospital pharmacists, challenges, obstacles, Qualitative study.
Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreResearchers dream of developing autonomous humanoid robots which behave/walk like a human being. Biped robots, although complex, have the greatest potential for use in human-centred environments such as the home or office. Studying biped robots is also important for understanding human locomotion and improving control strategies for prosthetic and orthotic limbs. Control systems of humans walking in cluttered environments are complex, however, and may involve multiple local controllers and commands from the cerebellum. Although biped robots have been of interest over the last four decades, no unified stability/balance criterion adopted for stabilization of miscellaneous walking/running modes of biped
Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe provision of safe water for people is a human right; historically, a major number of people depend on groundwater as a source of water for their needs, such as agricultural, industrial or human activities. Water resources have recently been affected by organic and/or inorganic contaminants as a result of population growth and increased anthropogenic activity, soil leaching and pollution. Water resource remediation has become a serious environmental concern, since it has a direct impact on many aspects of people’s lives. For decades, the pump-and-treat method has been considered the predominant treatment process for the remediation of contaminated groundwater with organic and inorganic contaminants. On the other side, this tech
... Show MoreGreen nanotechnology is a thrilling and rising place of technology and generation that bracesthe ideas of inexperienced chemistry with ability advantages for sustainability, protection, andthe general protection from the race human. The inexperienced chemistry method introduces aproper technique for the production, processing, and alertness of much less dangerous chemicalsubstances to lessen threats to human fitness and the environment. The technique calls for inintensity expertise of the uncooked materials, particularly in phrases in their creation intonanomaterials and the resultant bioactivities that pose very few dangerous outcomes for peopleand the environment. In the twenty-first century, nanotechnology has become a systematic
... Show MorePoetic objects may go towards a specific purpose and dissolve and interact with them to produce
A purpose characterized by the title but belongs to the U from afar.
The yarn goes towards praise with a purely horizontal relationship that mentions virtues but crowns them towards women.
In lamentation remember the virtues but crown them towards the dead.
In wisdom remember the virtues but crown them towards time.
In the description remember the virtues but crown them towards nature. All objects are inline
Horizontal We will prove this in the axes of research has required the plan to be a blind, five
The preamble, a brief overview of the life of Dabal All Khuzaie and the works and poets of the first axis
The direction
The virtual decomposition control (VDC) is an efficient tool suitable to deal with the full-dynamics-based control problem of complex robots. However, the regressor-based adaptive control used by VDC to control every subsystem and to estimate the unknown parameters demands specific knowledge about the system physics. Therefore, in this paper, we focus on reorganizing the equation of the VDC for a serial chain manipulator using the adaptive function approximation technique (FAT) without needing specific system physics. The dynamic matrices of the dynamic equation of every subsystem (e.g. link and joint) are approximated by orthogonal functions due to the minimum approximation errors produced. The contr