Objective: To identify the role and importance of the clinical pharmacist in the Emergency Department on prevent
or reduced the medication error.
Methodology: We collected the medical file of 3400 patients, 1400 patient's file in (A) hospital, and 1000 patient's
file in each of (B and C) hospital, who admitted to the ED, at primary weekdays between 8 am to 2 pm, and
recorded all the intervention made by clinical pharmacist through an active search in clinical charts, with analysis
of the daily medical prescription. The potential severity of harm of the medication error judged by two reviewers,
a permanent emergency physician, and clinical pharmacist based on the National Coordinating Council (NCC) of
Medication Error Reporting and Prevention error classification system.
Results: Four of intervention that have the greatest incidence which represent the majority of the cases, and they
were related to: dosage 500 (38.7%), route of administration 300 (23.2%), frequency 100 (7.7%), and
incompatibility 120 (9.3%). The severity of medication errors that was judged as potentially life threatening (67;
5.1%), serious (135; 10.4%), significant (634; 49.1%), and insignificant (454; 35.1%). The acceptance to the
presence and intervention of pharmacist was as follow: senior physicians 75%, permanent physicians 20%, resident
physicians 77%, and nurses 30%.
Recommendation: Hospitals should contemplate assigning well-trained knowledgeable, efficient and skilled ED
clinical pharmacists to prospectively review medication orders whenever clinically possible. It is also recommended
that each hospital performs acquainted analysis of medication errors occurring in its ED, in order to determine
their origin and then establish the necessary ED-based clinical pharmacy services. The sets of actions needed to
provide such services, as well as the skills, which their ED pharmacists must possess or acquire in order to be
capable of producing desired outcomes
order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
Widespread use of antihypertensive agents in clinical practice necessitates the knowledge of their pleiotropic effects. At the present time there are no sufficient evidences of positive effect of these medications on bone coming from randomized controlled trials; knowledge of additional effects of those drugs on the bone metabolism will allow doctors to choose optimal treatment of hypertension, taking into account the state of bone tissue. At the same time it will also allow to prevent osteoporosis in patients having osteoporosis risk factors or initial signs of bone loss.
Ten elderly hypertensive women age > 60 years old (64.2±3.6) treated with captopril for a 5-6 years ago while they attending Al Yarmouk Teaching Hospital i
... Show MoreWater provision is sensitive to climate change, and agricultural production and food supply are sensitive to water availability. Water scarcity affects food security and agricultural economic development through changes in agricultural production and changes in the composition of produced goods. Recent droughts also led to a decrease in the volume of water allocated to agriculture, which led to a decrease in total agricultural production and exports, and this has subsequent impacts on food security and economic development. The research aimed to measure the impact of water scarcity on agricultural economic development for the period 1990-2022. The research included three behavioral equations with three endogenous variables: the cult
... Show MoreThe study aimed to determine the effect of the flipped learning model in improving the acquisition of the overhand serve skill in volleyball among second-year students at the College of Physical Education and Sport Sciences, University of Baghdad, for the academic year 2024/2025. The study used an experimental design with a control group and pre-post testing, on a purposive sample consisting of 12 students. The model relied on watching short videos before class via the SGS application, and practical application in class at a rate of three sessions per week. The results showed a significant improvement in performance, as the calculated value (t = 5.356) exceeded the tabulated value (2.042) at a significance level of 0.05. The percentage of s
... Show MoreIn this work an approach has been developed to investigate the influence of surface roughness on thermohydrodynamic performance in aligned and misaligned journal bearings by considering an average flow model and deriving the shear flow factor for various roughness configurations, similar to the pressure flow factor. An average Reynolds equation for rough surfaces is defined in term of pressure and shear flow factors, which can be obtained by numerical flow simulation, though the use of measured or numerically generated rough surfaces. Reynolds, heat conduction and energy equations are solved simultaneously by using a suitable numerical technique (Finite Difference Method) to obtain the pressure and temperature di
... Show MoreUnderstanding energy metabolism and intracellular energy transmission requires knowledge of the function and structure of the mitochondria. Issues with mitochondrial morphology, structure, and function are the most prevalent symptoms. They can damage organs such as the heart, brain, and muscle due to a variety of factors, such as oxidative damage, incorrect metabolism of energy, or genetic conditions. The control of cell metabolism and physiology depends on functional connections between mitochondrial and biological surroundings. Therefore, it is essential to research mitochondria in situ or in vivo without isolating them from their surrounding biological environment. Finding and spotting abnormal alterations in mitochondria is the
... Show More
Anadrol (oxymetholone) is an active androgenic anabolic steroid that has been clinically studied in numerous diseases since the 1960s. It is used in the treatment of anemia and the replacement of male sex steroids. Unfortunately, in attempts to improve physical performance, Anadrol could be misused by athletes, that can lead to poisoning contributes to hepatotoxicity.
The aim of this study was to investigate the impact of anadrol on the liver function in rat model, via assessment of liver enzymes and histopathological study.
A forty male rats, weights about (200-300 gm), aged 8-12 weeks, after acclimatization, the rats were randomly divided into four groups (10 rats in each group) as follow: control group (in w
... Show MoreAbstract.The goal of this article is to find the CEO of Iraqi companies that use strategic planning and determine if they are capable of diagnosing the traits of strategic planning systems that improve these companies' capacity to successfully address crisis-related needs. The capacity of the company to successfully react to crisis needs and demands is enhanced by the use of strategic planning, according to a review of data from 64 enterprises utilizing statistical analysis. Furthermore, top and division or unit managers must be involved and committed for strategic planning to be successful. It also has to be planned with an external orientation and get more than just lip service from top and unit or division level managers. In other words,
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More