Background: The roles of AI in the academic community continue to grow, especially in the enhancement of learning outcomes and the improvement of writing quality and efficiency. Objectives: To explore in depth the experience of senior pharmacy students in using artificial intelligence for academic purposes. Methods: This qualitative study included face-to-face individual interviews with senior pharmacy students from March to May 2023 using a pre-planned interview guide of open-ended questions. All interviews were audio-recorded. Thematic analysis was used to analyze the data. Results: The results were obtained from 15 in-depth face-to-face interviews with senior pharmacy students (5th and 4th years). Eight participants were male, and seven
... Show MoreBackground: The roles of AI in the academic community continue to grow, especially in the enhancement of learning outcomes and the improvement of writing quality and efficiency. Objectives: To explore in depth the experience of senior pharmacy students in using artificial intelligence for academic purposes. Methods: This qualitative study included face-to-face individual interviews with senior pharmacy students from March to May 2023 using a pre-planned interview guide of open-ended questions. All interviews were audio-recorded. Thematic analysis was used to analyze the data. Results: The results were obtained from 15 in-depth face-to-face interviews with senior pharmacy students (5th and 4th years). Eight participants were male, an
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Psidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThree types of zeolite A were prepared from Iraqi kaoline which are 3A, 4A and 5A by ion exchange method .They were characterized by XRD and atomic absorption techniques .They were used as adsorbents to examine their applicability for H2S adsorption .The adsorption process was performed in a static form and constant volume system which constructed from stainless steel .The effect of zeolite type and temperature on the adsorption properties of H2S at -5 , 25 and 55 oC was studied .The zeolite type 5A has the highest adsorption value (79.384 µmol/g ) and the three types may be arranged in a sequence toward H2S adsorption as 5 A> 4A>3A .The amount of H2S adsorbed increased as temperature decreased from 55 to -5 for all samples. Langmuir , Fre
... Show MoreIn spite of the disappearing of a clear uniform textbook for teaching ESP at different departments and different colleges in both scientific and humanistic studies, the practitioners at those departments and colleges have to teach translation as one of the important requirements to pass the English language exam. The lack of defined translation activities is a noticeable problem therefore; the problem of teaching translation is diagnosed in that the students lack the ability to comprehend the text in English language and other translation knowledge and skills.
The study aims to suggest a translation strategy and then find out the effect of the translation strategy on ESP learners’ achievement in translation. A sample of 50 stud
... Show MoreThe impact of management control systems (MCS) on organizations performance empirical research has been the subject of numerous studies during the past decade in developed and emerging economies. In the contemporary competitive, complex and changing global business environment, firms are being challenged to adopt business models that enable them to address the strategic uncertainties and risks they face in their business environments. The main issue of this study is that management accounting researchers argue that one of the ways firms can continually rejuvenate themselves to survive and succeed in these complex and uncertain environments is to understand the role of management control systems in Formulating a b
... Show More