Preferred Language
Articles
/
bijps-484
Acquired Error in using Antibiotic for Surgery Patients in Iraqi Hospitals
...Show More Authors

The use of antibiotics (AB) in surgery focused in either treating established infection or to prevent suspected post-operative infection. Inappropriate use of antibiotic for treatment of patients with common infections is a major problem worldwide, with great implications with regards to cost of treatment and development of resistance to the antimicrobial agent. Moreover, antibiotics may often be dispensed without a clear clinical indication. This study was conducted to estimate the medication errors in using antibiotic for surgery patients which may effect their wound healing. A 260 patients with clean-contaminated and contaminated surgery were included from two teaching hospitals, 160 patient from Medical city hospital and 100 from Al-kadhimiya hospital, 86% were female and 32% were male, their age range was 40 +/- 15. The study shows that there are medication errors related to different causes: firstly, medical team error which include the nurse (70.9%) and the physician which include 1) delay in  patient follow up after operation(5.9%) ,  2) changing the AB without doing culture and sensitivity test (48.8%), and incomplete prescription order(13.1%).  second:  ordering error which include: 1) the absent of original source of AB (44.5%), 2) Error in availability of the chosen AB (74.8%), and third: error related to the patient itself include 1) socioeconomic situation (14.5%), 2) educational state (54.3%), finally error related to increase cost in dispensing more than one AB needed (80.1%), although the healing was (63.6 %), delay in response (25%) and complicated wound infection (5%), significant results were arrange nurse error and poor drug availability. In conclusion:  medication errors are still common problem in our hospitals, which are mostly related to medical team and the pharmacists should give more effort to avoid these errors.   

Key wards: Acquired error, Antibiotic, Surgery patients.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 27 2020
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Health Promotion Program for the Prevention of Epidemics at Primary Health Care Centers in Baghdad City: Comparative Study
...Show More Authors

Objective(s): To evaluate and compare between Health Promotion Program for the Prevention of Epidemics at Primary Health Care Centers in Baghdad City.

Methodology: A descriptive study, using the evaluation and comparative approaches, is conducted to evaluate health promotion program for the prevention of epidemics at primary health care centers in baghdad city from October 15th  2019 through March 1st 2020. A purposive, non-probability, sample of (42) health promotion unit officers were recruited from the same number of primary health care centers which were divided into (14) main, (14) sub and (14) family medicine primary health care centers i

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Molecular Liquids
Corrosion inhibition behavior of expired diclofenac Sodium drug for Al 6061 alloy in aqueous media: Electrochemical, morphological, and theoretical investigations
...Show More Authors

The behavior corrosion inhibition of aluminum alloy (Al6061) in acidic (0.1 M HCl) and saline (3.5% NaCl) solutions was investigated in the absence and the presence of expired diclofenac sodium drug (DSD) as a corrosion inhibitor. The influence of temperature and was studied using electrochemical techniques. In addition, scanning electron microscopy (SEM) was used to study the surface morphology. The results showed that DSD acted as a powerful inhibitor in acidic solutions, while a moderate influence was observed with saline one. Maximum inhibition efficiency was 99.99 and 83.32% in acidic and saline solutions at 150 ppm of DSD, respectively. Corrosion current density that obtained using electrochemical technique was increased with temperat

... Show More
View Publication
Scopus (45)
Crossref (41)
Scopus Clarivate Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Assessment the Genotoxic Potential of Fluoxetine and Amitriptyline at Maximum Therapeutic Doses for Four-Week Treatment in Experimental Male Rats
...Show More Authors

Abstract

At any moment, the continuous usage of medications can accompanied by DNA damage and the accumulation of such damages can cause serious consequences. Antidepressants are long-term used drugs and the incidence of their genotoxic impacts cannot be excluded. Therefore, this work was designed to investigate the possible genotoxic effects of the commonly used antidepressants (fluoxetine and amitriptyline) in adult male rats.

Detection of DNA damage in individual cells was assessed by comet and micronucleus assays in three different cell populations i.e. liver, testis and bone marrow tissues of 24 swiss albino adult male rats. The animals were randomly allocated into three groups of 8 rats ea

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Annals Of Maxillofacial Surgery
The use of screw retained hybrid arch bar for maxillomandibular fixation in the treatment of mandibular fractures: A comparative study
...Show More Authors

Introduction: The use of screw-retained hybrid arch bars (HABs) is a relatively recent development in the treatment of mandibular fractures. The purpose of this study is to compare the clinical outcome between HAB and the conventional Erich arch bar (EAB) in the closed treatment of mandibular fractures. Materials and methods: This study included 18 patients who were treated for mandibular fractures with maxillomandibular fixation (MMF), patients were randomly assigned into a control group (n = 10) in which EAB was used and study group (n = 8) in which HAB was used. The outcome variables were time required for application and removal, gingival inflammation scores, postoperative complications, and incidence of wire-stick injury or gloves perf

... Show More
View Publication
Scopus (8)
Crossref (10)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of operational efficiency on some financial indicators according to the CAMEL model of banking financial stability: An applied research on a sample of Iraqi private banks for the period 2010-2020
...Show More Authors

Abstract

          The research aims to determine the nature of the Iraqi market in terms of banking financial stability and the extent impact of the operational efficiency on it, Accordingly, chosen 15 relational banks were chosen as an intentional sample that could represent the Iraqi banking system for the period 2010-2020. The operational efficiency variable was measured according to the data envelope model, and banking financial stability used  CAMELS model which includes five indicators (capital adequacy, asset quality, management quality, profitability, and liquidity), so for testing the research hypotheses used the random regression model by adopting the S

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Using Neural Network with Speaker Applications
...Show More Authors

In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Reinforce organizational communication using Information Technology
...Show More Authors
Abstract<p>The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref