The objectives of the study were to identify the incidence rate and characteristics of adverse drug events (ADEs) in nursing homes (NHs) using the ADE trigger tool and to evaluate the relationships between resident and facility work system factors and incidence of ADEs using the System Engineering Initiative for Patient Safety (SEIPS) model. The study used 2 observational quantitative methods, retrospective resident chart extraction, and surveys. The participating staff included Directors of nursing, registered nurses, certified nurse assistants (CNAs). Data were collected from fall 2016 to spring 2017 from 11 NHs in 9 cities in Iowa. Binary logistic regression with generalized estimated equations was used to measure the association between ADE incidence and resident and facility characteristics. We extracted data from 755 medical charts and conducted 33 staff surveys. There were 6.13 ADEs per 100 residents per month. More than half were fall‐related (51.1%), and half of those were due to hypotension. Regression analysis revealed significant associations between ADEs and opioid analgesics, psychotropic medications, warfarin, skilled care, consultant pharmacist accessibility, nurse‐physician collaboration, CNA vital sign assessment skills, number of physician visits, nurse workload, and use of electronic health records. Five resident characteristics (skilled care, dementia, use of opioids, warfarin, psychotropics) and variables from 5 domains of the facility work system (organization, task, environment, person, technology) had significant associations with ADE incidence. The SEIPS model successfully identified work system factors influencing ADEs in NHs.
The rapid and enormous growth of the Internet of Things, as well as its widespread adoption, has resulted in the production of massive quantities of data that must be processed and sent to the cloud, but the delay in processing the data and the time it takes to send it to the cloud has resulted in the emergence of fog, a new generation of cloud in which the fog serves as an extension of cloud services at the edge of the network, reducing latency and traffic. The distribution of computational resources to minimize makespan and running costs is one of the disadvantages of fog computing. This paper provides a new approach for improving the task scheduling problem in a Cloud-Fog environme
Construction is a hazardous industry with a high number of injuries. Prior research found that many industry injuries can be prevented by implementing an effective safety plan if prepared and maintained by qualified safety personnel. However, there are no specific guidelines on how to select qualified construction safety personnel and what criteria should be used to select an individual for a safety position in the United States (US) construction industry. To fill this gap in knowledge, the study goal was to identify the desired qualifications of safety personnel in the US construction industry. To achieve the study goal, the Delphi technique was used as the main methodology for determining the desired qualifications for constructio
... Show MoreTarget tracking is a significant application of wireless sensor networks (WSNs) in which deployment of self-organizing and energy efficient algorithms is required. The tracking accuracy increases as more sensor nodes are activated around the target but more energy is consumed. Thus, in this study, we focus on limiting the number of sensors by forming an ad-hoc network that operates autonomously. This will reduce the energy consumption and prolong the sensor network lifetime. In this paper, we propose a fully distributed algorithm, an Endocrine inspired Sensor Activation Mechanism for multi target-tracking (ESAM) which reflecting the properties of real life sensor activation system based on the information circulating principle in the endocr
... Show MoreA numerical investigation of mixed convection in a horizontal annulus filled with auniform fluid-saturated porous medium in the presence of internal heat generation is carried out.The inner cylinder is heated while the outer cylinder is cooled. The forced flow is induced by thecold outer cylinder rotating at a constant angular velocity. The flow field is modeled using ageneralized form of the momentum equation that accounts for the presence of porous mediumviscous, Darcian and inertial effects. Discretization of the governing equations is achieved usinga finite difference method. Comparisons with previous works are performed and the results showgood agreement. The effects of pertinent parameters such as the Richardson number and internalRay
... Show MoreObjective: The aim of this work was to detect terpenes other than boswellic acid derivatives in olibanum of Boswellia Serrata found in Iraq. Methods: The olibanum of Boswellia Serrata was macerated in methanol for one day, then filtration. Filter at was concentrated till reddish brown syrupy residue was gained, (3%) potassium hydroxide was added till basification. This basic solution was stirred continuously until a uniform emulsion was formed, then extracted with chloroform in a separatory funnel; the chloroform fraction was analyzed by GC /MS spectrometry. Results: GC /MS analysis reveal the presence of terpenes and non-terpenes constituents. Conclusion: Most of the detected terpenes were sesquiterpenes and the least one was di-terpenes.
Amino acids are the basic building block for peptides and proteins. They are raw materials for generating hormones, purines, pyrimidines and vitamins. Amino acids also provide the body with energy through their carbon structures. The study analyzed the amino acid in the kidneys of the albino mice embryo at 17 and 19 gestation days, using a high-performance liquid chromatography device (HPLC). Samples were obtained after removing them from the embryo and placing them in an ice bath to prevent cell lysis and acid loss. The study found 18 amino acids in the kidneys of the albino mice embryo. They are Asparagine (Asn), Glutamine (Glu), Serine (Ser), Glycine (Gly), Threonine (Thr), Histidine (His), Cysteine (Cys), Alanine (Ala), Proline
... Show MoreAbstract :-
The aim of the research is to explain the role of quality costs their importance and their classification, and to clarify the most important tools that help to reduce costs.
In order to achieve the objective of the research and test hypotheses adopted the descriptive approach, as well as the adoption of the analytical approach in the study of applied data has been relied upon in providing data on the financial and production reports of the research sample company, the data were used to study and analyze financial and productivity reports . A number of conclusions have been reached the most important being the following
... Show More
Praise be to God who has guided us, and we would not have been guided had it not been for the guidance of God Almighty. The life of the Commander of the Faithful, Imam Ali bin Abi Talib, peace be upon him, represented the highest meanings of sacrifice, redemption, courage, heroism, patience, altruism, and truth, which were embodied in his unique personality, whose counterpart is rare, if not unparalleled in history. Except for the person of the Holy Prophet Muhammad (may God bless him and his family and grant them peace). In this research, we have presented pictures from the life of Imam Ali bin Abi Talib (peace be upon him), as we have clarified his life, upbringing, conversion to Islam and his ma
... Show MoreThe sale of facial features is a new modern contractual development that resulted from the fast transformations in technology, leading to legal, and ethical obligations. As the need rises for human faces to be used in robots, especially in relation to industries that necessitate direct human interaction, like hospitality and retail, the potential of Artificial Intelligence (AI) generated hyper realistic facial images poses legal and cybersecurity challenges. This paper examines the legal terrain that has developed in the sale of real and AI generated human facial features, and specifically the risks of identity fraud, data misuse and privacy violations. Deep learning (DL) algorithms are analyzed for their ability to detect AI genera
... Show More