Medication safety is an important part of the comprehensive patient safety term. Medication safety is gaining more attention as the World Health Organization set the goal of decreasing medication harm by (50%) for the next 5 years when launching the third global challenge. Studying medication safety in the risk groups such as young ages, children are crucial to learn more about the effect of medicines in this risk group since they are not included in the clinical trials. Adverse drug reaction is defined as any harm resulted from the drug itself during medical process journey, while medication errors are any harm resulted from the treatment process rather than the drug or it is the result of the failure in a step of the treatment process and by that it came clear that adverse drug reaction in non-preventable event while medication error is preventable one. The objectives of this study are to find the preventable medication errors from the Iraqi database of Adverse drug events in ages from neonatal to adolescent age. This study is a retrospective descriptive study conducted using the Iraqi pharmacovigilance center database. The study included reports that were received by the Iraqi pharmacovigilance center from 1st of January 2014 until the 1st of January 2020. In this study, the total number of reports included was 2344. The type of medication involved, type of adverse event, type of error and
The importance of the study, which is how to use these exercises with the device in rehabilitating the flabby muscles after childbirth, which is a problem found in our society and in need of high education on it because the form of exercises does not need places designated for training such as halls or fitness halls, especially since the social woman has limited movement in which we see the responses Physiology in different ways, the woman’s body is not only subject to the day’s need for work or the need to complete hours of physical training, but she has feminist components that she must overcome, whether it is physiological or otherwise.The research sample was determined by the intentional method available from women whose age
... Show MoreRecently, wireless charging based RF harvesting has interfered our lives [1] significantly through the different applications including biomedical, military, IoT, RF energy harvesting, IT-care, and RFID technologies. Wirelessly powered low energy devices become significantly essential for a wide spectrum of sensing applications [1]. Such devices require for low energy resources from sunlight, mechanical vibration, thermal gradients, convection flows or other forms of harvestable energy [2]. One of the emerging power extraction resources based on passive devices is harvesting radio frequency (RF) signals powers [3]–[5]. Such applications need devices that can be organized in very large numbers, so, making separate node battery impractical.
... Show MoreThe aim of advancements in technologies is to increase scientific development and get the overall human satisfaction and comfortability. One of the active research area in recent years that addresses the above mentioned issues, is the integration of radio frequency identification (RFID) technology into network-based systems. Even though, RFID is considered as a promising technology, it has some bleeding points. This paper identifies seven intertwined deficiencies, namely: remote setting, scalability, power saving, remote and concurrent tracking, reusability, automation, and continuity in work. This paper proposes the construction of a general purpose infrastructure for RFID-based applications (IRFID) to tackle these deficiencies. Finally
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreThis paper explores a fuzzy-logic based speed controller of an interior permanent magnet synchronous motor (IPMSM) drive based on vector control. PI controllers were mostly used in a speed control loop based field oriented control of an IPMSM. The fundamentals of fuzzy logic algorithms as related to drive control applications are illustrated. A complete comparison between two tuning algorithms of the classical PI controller and the fuzzy PI controller is explained. A simplified fuzzy logic controller (FLC) for the IPMSM drive has been found to maintain high performance standards with a much simpler and less computation implementation. The Matlab simulink results have been given for different mechanical operating conditions. The simulated
... Show MoreAbstract
The current research aims to testing the impact of leadership styles (autocratic, democratic) in crises management (Making decision response, communications and information flows, Mobilization of resources) through strategic planning (Mission, objectives, and environmental analysis, and strategic choice) among managers of the Iraqi Ministry of electricity. Questionnaire has been adopted as a tool in data and information relating to research, as it had prepared on the basis of number of scales and finished using the included Likert quintet, which has been subjected to standards of validity and reliability and distributed to a sample consisting of (96) managers at the three departments of Min
... Show More