The objectives of the study were to identify the incidence rate and characteristics of adverse drug events (ADEs) in nursing homes (NHs) using the ADE trigger tool and to evaluate the relationships between resident and facility work system factors and incidence of ADEs using the System Engineering Initiative for Patient Safety (SEIPS) model. The study used 2 observational quantitative methods, retrospective resident chart extraction, and surveys. The participating staff included Directors of nursing, registered nurses, certified nurse assistants (CNAs). Data were collected from fall 2016 to spring 2017 from 11 NHs in 9 cities in Iowa. Binary logistic regression with generalized estimated equations was used to measure the association between ADE incidence and resident and facility characteristics. We extracted data from 755 medical charts and conducted 33 staff surveys. There were 6.13 ADEs per 100 residents per month. More than half were fall‐related (51.1%), and half of those were due to hypotension. Regression analysis revealed significant associations between ADEs and opioid analgesics, psychotropic medications, warfarin, skilled care, consultant pharmacist accessibility, nurse‐physician collaboration, CNA vital sign assessment skills, number of physician visits, nurse workload, and use of electronic health records. Five resident characteristics (skilled care, dementia, use of opioids, warfarin, psychotropics) and variables from 5 domains of the facility work system (organization, task, environment, person, technology) had significant associations with ADE incidence. The SEIPS model successfully identified work system factors influencing ADEs in NHs.
Face Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to d
... Show MoreThis paper deals with social responsibility visible to the media and the role they play in spreading the culture of environmental protection, and make research on a sample of the University of Baghdad consisting students from 150 students, male and female were distributed questionnaire form on the sample to obtain the required information has been questionnaire included axes distributed questions achieve the objectives of the search, and after the form data were analyzed using statistical program spss results show that the visual media and its role in spreading the culture of environmental protection form averages arithmetic high, indicating a rise in the influence of th
... Show MoreLeft bundle branch block (LBBB) is a common finding in electrocardiography, there are many causes of LBBB.
The aim of this study is to discuss the true prevalence of coronary artery disease (CAD) in patients with LBBB and associated risk factors in the form of hypertension and diabetes mellitus.
Patients with LBBB were admitted to the Iraqi heart center for cardiac disea
Increasing interest in planning at the level of government units as a means to manage the physical and human resources, direct and invest in areas that would include an increase in the economies of the general government units that are part of the general economics of the state.The research problem lies in the introduction of the factors influencing the ongoing expenses that adversely affect the financial planning process at the level of the Ministry of Health Planning, which affects the quality of services provided to citizens, so I sought the researchers to study the reality of financial planning in some of the Ministry of Health and health departments through the analysis of current budgets and diagnose deviations in the implementatio
... Show MoreObjective: Evaluation of women's knowledge about risk factors and early detection of breast cancer at
Ibn Rushd college of education in Baghdad University.
Methodology: The study sample included (184) women in the Ibn Rushd College / University of
Baghdad, whose age ranged between (17-58) years. Data were collected through a structured
questionnaire prepared by the National Cancer Research Center which were answered during a scientific
symposium about breast cancer. The score was calculated by correcting the results of the answer, giving
one score for each correct answer and then estimating the level of knowledge and inputting all data in a
statistical program.
Results: The results showed limited level of women's
The goals of endodontic preparation were to shape and clean the space of the root canal and remove microorganisms, affected dentin and pulp, the apical foramen and the canal curve should be protected from being transported during endodontic canal preparation. The aim of this study was to evaluate the curve straightening of curved root canals and apical transportation after preparation with four rotary systems. Forty mesial roots of the lower 1st molars teeth only the mesiobuccal canals were used, these roots were immersed into cold clear acrylic , the teeth roots divided into four groups according to rotary system used for preparation of the canals (ten roots for each group):. group I: ProTaper Next rotary system, group II: IRaCe Plus rotar
... Show MoreAchieving a connection between sustainability processes and environmental protection, or what is known as sustainable development, requires paying more attention to environmental and sustainability issues for various projects and their effects on environmental problems. It involves determining the most appropriate ways to deal with them within pillars of sustainability (environmental, social, economic, and natural resources. As cement is a fundamental component of industrial services and construction in cities, it has a direct and significant interaction with the development process, making it one of the most important industries in Iraq. Because of the clinker particles and combustio
The paper presents an annotated checklist of the Salticidae of Armenia. This study was carried out in 2019-2020 in order to provide an inventory of the Salticidae fauna. Thirteen species are reported for the Armenian fauna for the first time: Afraflacilla epiblemoides (Chyzer, 1891); Aelurillus v-insignitus (Clerck, 1757); Asianellus festivus (C. L. Koch, 1834); Heliophanus dubius C. L. Koch, 1835; Heliophanus kochii Simon, 1868; Heliophanus tribulosus Simon, 1868; Heliophanus curvidens (O. Pickard-Cambridge, 1872); Macaroeris nidicolens (Walckenaer, 1802); Pellenes diagonalis (Simon, 1868); Pellenes geniculatus (Simon, 1868); Pellenes seriatus (Thorell, 1875); Pellenes tripunctatus (Walckenaer, 1802) and Phlegra fasciata (Hahn, 1826).
... Show MoreTrajectory tracking and vibration suppression are essential objectives in a flexible joint manipulator control. The flexible joint manipulator is an under-actuated system, in which the number of control actions is less than the degree of freedom to be controlled. It is very challenging to control the underactuated nonlinear system with two degree of freedom. This paper presents a hierarchical sliding mode control (HSMC) for a rotary flexible joint manipulator (RFJM). Firstly, the rotary flexible joint manipulator is modeled by two subsystems. Secondly, the sliding surfaces for both subsystems are constructed. Finally, the control action is designed based on the Lyapunov function. Computer simulation results demonstrate the effectiveness of
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More