Preferred Language
Articles
/
bijps-977
The Prevalence of Potentially Inappropriate Prescribing in Geriatric Patients with Psychiatric Disorders in Iraq
...Show More Authors

Potentially inappropriate prescribing is the prescribing of a medication that may cause more harm than benefit, the elderly population aged 65 years or older is more prone to potentially inappropriate prescribing because of alterations in their physiology, pharmacokinetics, and pharmacodynamics as well as polypharmacy and comorbidities, Beers list is a screening tool that help doctors to detect potentially inappropriate prescribing in geriatric patients and is designed to solve this problem, the aim of this study is to measure the prevalence of potentially inappropriate prescribing among psychiatric patients using the Beers criteria as an assessment tool and find the relationship between duration of hospitalization, comorbidities and polypharmacy with potentially inappropriate prescribing in elderly.

This cross-sectional study was carried out using electronic medical records in Ibn Rushud psychiatry and addiction hospital in Baghdad and 369 patients were included. The mean age of the patients was (68.59 ± 3.75 years) and 177 (48%) of them had comorbidities, 100 (27.1%) of them had polypharmacy and 17 (4.6%) stayed in the hospital for more than 3 weeks, the most used drug classes were antipsychotics in (39.9%) of patients and benzodiazepines in (17.6%) of patients.

The prevalence of potentially inappropriate prescribing according to Beers criteria was found to be 74.3% among study patients, the most prevalent inappropriately used drug class was benzodiazepines, and there was a significant association between the prescribing of a potentially inappropriate medication with gender (p=0.018), with comorbidities (p=0.022), and a very significant association with polypharmacy (p<0.001)

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jul 30 2024
Journal Name
Iraqi Journal Of Science
N-Acetyl Cysteine-Cadmium Telluride NAC-CdTe QDs for Detecting the Damaged DNA in Cancerous Diseases
...Show More Authors

In this study water-soluble N-Acetyl Cysteine Capped-Cadmium Telluride QDs (NAC/CdTe nanocrystals) using N-acetyl cysteine as a stabilizer were prepared to investigate the utility of quantum dots (QDs) in distinguishing damaged DNA, (extracted from blood samples of leukaemia patients), from intact DNA (extracted from blood samples of healthy individuals) to be used for biosensing application. Based on the optical characterization of the prepared QDs, the XRD results revealed the formation of the NAC-CdTe-QDs with a grain size of 7.1nm. Whereas, the SEM test showed that the spherical size of the NAC-CdTe-QDs lies within 11~33nm. NAC-CdTe-QDs have superior PL emission properties at of 550nm and UV-Vis absorption peak at 300nm. The energy gap

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Results In Engineering
Nanomaterials in asphalt cement: exploring their single and combined effects on the physical and rheological properties
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication
Crossref
Publication Date
Sun Apr 01 2007
Journal Name
Journal Of Engineering
CURVATURE DUCTILITYOF REINFORCED CONCRETE BEAMSECTIONS STIFFENED WITH STEEL PLATES
...Show More Authors

Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
TV planning and ways to deal with space developments
...Show More Authors

The quote of a Canadian communication scientist (Marshall McLuhan) (“The world has become an electronic village”) has become an archaic information compared to the great and rapid development of communication in the last two decades of the 20th century and what will happen later in the 21st century, to the extent that the world is called, thanks to the internet, a “Small screen” and this fact is a sign of the great progress that has been made in this field. As for the other statement of the Canadian communication scientist mentioned before “the medium itself, is the message”, it has been renewed and developed in its meaning and it’s purpose. Each new technical development in the means of communication necessarily means a me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 16 2022
Journal Name
Journal Of Educational And Psychological Researches
Agreeableness and Its Relation with Orientation towards Voluntary Work
...Show More Authors

 

The current study aims to identify agreeableness and orientation towards voluntary work of officials in public facilities, as well as to identify the nature of the correlation between agreeableness and orientation towards voluntary work of officials in public facilities. To achieve the aims of the research, the researchers designed the agreeableness scale, which consists of (28) items in its final form. The researchers also built a scale of orientation towards voluntary work, which consists of (29) items in its final form. Psychometric properties of validity and reliability of the two scales were extracted in various ways. The researcher applied the two scales on a sample of (400) officials, the results indicated that the

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Remorse And Its Relationship With Conscientiousness Among University Students
...Show More Authors

Situational regret and its relation to the vitality of conscience among university students The research seeks to identify situational regret and its relation to the vitality of conscience among university students, identify the significant differences in regard with students’ gender, and identify if there is a correlation between situational regret and the vitality of conscience. To do this, two scales were adopted; one to measure situational regret consisted of (31) items, which was designed by (Al-badrani, 2006), besides, costa and macrys’ (1992) scale that translated in Arabic language by (Al-qaisy, 2013). It composed of (35) items. Total of (120) male and female students were collected from three-different colleges (science, art

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Tracked Robot Control with Hand Gesture Based on MediaPipe
...Show More Authors

Hand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref