Objective: To measure the effect of the pharmacist-led medication reconciliation service before hospital discharge on preventing potential medication errors. Methods: This behavioral interventional study took place in a public teaching hospital in Iraq between December 2022 and January 2023. It included inpatients who were taking four or more medications upon discharge from the internal medicine ward and the cardiac care unit. The researcher provided the patients with a medication reconciliation form and reconciliation form (including medication regimen and pharmacist instructions) before discharging them home. Any discrepancies between the patients’ understanding and the actual medication recommendations prescribed by the physician were identified and solved. Results: Fifty inpatients received a pharmacist-led medication reconciliation review before hospital discharge. Out of 50 patients, 44% had a clear understanding of their medications before the intervention. In contrast, 56% of the patients had at least one potential medication error before the reconciliation, which was addressed by the pharmacist's intervention. Approximately two-thirds (89.4%) of the potential medication errors were clinically significant, and 5.3% of these errors were serious. The most frequent potential error that prevented this was duplication (31.5%) (the patient was about to duplicate the same medication from different manufacturers or different medications from the same pharmacological class). Conclusion: Lack of medication reconciliation can cause significant medication errors, which might be serious and cause harm to patients. This study has the potential to shape policies and practices that prioritize medication safety and optimize patient outcomes during transitions of care.
Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show MoreA Multiple System Biometric System Based on ECG Data
Visible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreDBN Rashid, International Journal of English Linguistics, 2019 - Cited by 2
The research dealt with the issue of strategic information systems and its impact on the global marketing channel. As the research aims to know the strategic information systems used in the cement company. Which support the senior management in supporting decisions taken in the process of global orientation and moving to foreign markets by choosing the marketing channel that will suit the company. Product and competition with it. With other companies' products. The problem of the study focused on how to move to global markets, and any marketing channel that can be followed to move the cement product globally, what are the strategic information systems used in the company and how will it contribute to supporting senior management dec
... Show More