Objective: To measure the effect of the pharmacist-led medication reconciliation service before hospital discharge on preventing potential medication errors. Methods: This behavioral interventional study took place in a public teaching hospital in Iraq between December 2022 and January 2023. It included inpatients who were taking four or more medications upon discharge from the internal medicine ward and the cardiac care unit. The researcher provided the patients with a medication reconciliation form and reconciliation form (including medication regimen and pharmacist instructions) before discharging them home. Any discrepancies between the patients’ understanding and the actual medication recommendations prescribed by the physician were identified and solved. Results: Fifty inpatients received a pharmacist-led medication reconciliation review before hospital discharge. Out of 50 patients, 44% had a clear understanding of their medications before the intervention. In contrast, 56% of the patients had at least one potential medication error before the reconciliation, which was addressed by the pharmacist's intervention. Approximately two-thirds (89.4%) of the potential medication errors were clinically significant, and 5.3% of these errors were serious. The most frequent potential error that prevented this was duplication (31.5%) (the patient was about to duplicate the same medication from different manufacturers or different medications from the same pharmacological class). Conclusion: Lack of medication reconciliation can cause significant medication errors, which might be serious and cause harm to patients. This study has the potential to shape policies and practices that prioritize medication safety and optimize patient outcomes during transitions of care.
This work studies the impact of input machining parameters of Electrical Discharge Machining (EDM) on the machining process performance. Tool steel O1 was selected as the workpiece material, copper as the electrode material, and kerosene as the dielectric medium. Experimental runs have been carried out with a Design of Experiment (DOE) technique. Twenty tests are accomplished with the current range of (18 to 24 Ampere), a pulse duration range of (150 to 200 µs), and a pulse-off time range of (25 to 75 µs). Based upon the experimental study's output results, the EDM parameter's effect (voltage of power supply, discharge current, pulse duration, and pulse pause interval) on the responses of the process represented by sur
... Show MoreThe business process re-engineering is one of the popular concepts at this time because its provide a radical solution for the problems that companies faces. This method appeared because the changes of competition and costumers 'desires at the two last decades. The markets become wider because of the globalization so the companies must change its way to stay a life.
The research aim is to concentrate on the BPR because it's a philosophy aims to re-organize the company's business process to achieve the competitive advantage, the research also aims to a plicate the BPR using cost management technique in the State Company of Vegetable Oils Industry.
&nb
... Show MoreIn this paper we have dealt with the word " בַּיִת" in the Book of Joshua because it makes one of those that highly employed the word בַּיִת" " in the Old Testament. The Book of Joshua comes sixth in the order of tanakh wich was written by Joshua son of Noon in Palestine during the fifteenth century B.C. and it covers a three-decade era extending from the death of Moses til the death of Joshua son of Noon.
The word " בַּיִת " in this paper refers to the place, where expressions are made by a noun modified by a noun . The modifier is"" בַּיִת , and the modified is another noun. Herein, we
... Show MoreIt is no secret for those concerned with language concerns that the issue of figurative feminization is one of the issues that does not follow a grammatical rule governed by the fact that the subject of knowledge of this is due to hearing as indicated by linguistic references and lexicons.This research opts to find out the origin of the feminization of the word sun in the Arabic language and in light of what some language specialists have argued that the origin of figurative feminization was due to non-linguistic motives related to religious and metaphysical beliefs, and that it was memory preserved in light of the linguistic heritage.The research concluded that the feminization of the sun goes back to what settled in their minds, which
... Show MoreThe aim of the research is to identify both the re-engineering of management processes and the strategic decision-making process in the research community and determine the nature of the correlation between the two variables and know the relationship between them to achieve the research goal. The researcher used a descriptive and analytical method. The research community consists of a group of professors and staff of the College of Education affiliated to the University of Mustansiriya in Baghdad, which their number were (45), the researcher has distributed the forms to all members of the sample, only (3) forms were excluded for invalidity and thus the number of forms approved in the analysis were (42) forms. The rese
... Show MoreThe present paper investigates the role of fear and predator dependent refuge in the prey-predator system. The system describes the interaction between prey and a stage structure of predator that incorporates Holling II functional response. The predator splits into two compartments immature (juvenile) and mature (adult). The mature predators can hunt and reproduce but this capability is not found in the immature predators, the immature depend on their parents. The growth rate of prey decreases due to the existence of mature predators. The existence, uniqueness, and boundedness of the solution of the system are investigated. Three equilibrium points of the system are determined. The local stability of the system is studied. The global stabil
... Show MoreCryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis
Objectives: The study aims to assess some of the contributing factors to abdominal postoperative wound infection and
to find out the relationship between postoperative wound infections and some socio-demographic characteristics such as
age, gender, level of education, occupation and residential area.
Methodology: A descriptive study was carried out in Sulaimani Teaching Hospital (Kurdistan Region). The study has
started from January 15th up to October 31th, 2009. To achieve the study objectives, a purposive "non probability"
sample of (100) patients who have abdominal postoperative wound infection, Adult female and male patients who were
admitted to Sulaimani Teaching Hospital was selected.
The data were collected th
Background: Diabetes mellitus is a metabolic disorder affecting people worldwide, which require constant monitoring of their glucose levels. Commonly employed procedures include collection of blood or urine samples causing discomfort to the patients. Necessity arises to find alternative non invasive technique is required to monitor glucose levels. Saliva is one of most abundant secretions in the human body and its collection is easy, noninvasive and painless technique. Objective: The aim of this study was to determine the efficacy of saliva as a diagnostic tool by study the correlation between blood and salivary glucose levels and glycosylated hemoglobin (HbA1c%) in diabetes and non diabetes, and the comparison of salivary glucose level
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More