Objective: To measure the effect of the pharmacist-led medication reconciliation service before hospital discharge on preventing potential medication errors. Methods: This behavioral interventional study took place in a public teaching hospital in Iraq between December 2022 and January 2023. It included inpatients who were taking four or more medications upon discharge from the internal medicine ward and the cardiac care unit. The researcher provided the patients with a medication reconciliation form and reconciliation form (including medication regimen and pharmacist instructions) before discharging them home. Any discrepancies between the patients’ understanding and the actual medication recommendations prescribed by the physician were identified and solved. Results: Fifty inpatients received a pharmacist-led medication reconciliation review before hospital discharge. Out of 50 patients, 44% had a clear understanding of their medications before the intervention. In contrast, 56% of the patients had at least one potential medication error before the reconciliation, which was addressed by the pharmacist's intervention. Approximately two-thirds (89.4%) of the potential medication errors were clinically significant, and 5.3% of these errors were serious. The most frequent potential error that prevented this was duplication (31.5%) (the patient was about to duplicate the same medication from different manufacturers or different medications from the same pharmacological class). Conclusion: Lack of medication reconciliation can cause significant medication errors, which might be serious and cause harm to patients. This study has the potential to shape policies and practices that prioritize medication safety and optimize patient outcomes during transitions of care.
The oil and gas industry relies heavily on IT innovations to manage business processes, but the exponential generation of data has led to concerns about processing big data, generating valuable insights, and making timely decisions. Many companies have adopted Big Data Analytics (BDA) solutions to address these challenges. However, determining the adoption of BDA solutions requires a thorough understanding of the contextual factors influencing these decisions. This research explores these factors using a new Technology-Organisation-Environment (TOE) framework, presenting technological, organisational, and environmental factors. The study used a Delphi research method and seven heterogeneous panelists from an Oman oil and gas company
... Show MoreThe study of the tendencies of scientific research in specialized journalism through the three specialized levels, specifically the third level. It is referred to be a monthly, quarterly or annual magazine that follows the publication of the researches for new studies which have come to in every specialization. it is directed to the highly educated and is almost an alternative book. Thus, the subject is specialized and the audience is specialized.
The study aims in both its survey and field section at knowing the type of researches and their classification and the form, gender and the use of foreign sources and their scientific tank and the geographical position in addition to knowing the opinions of researchers and their satisfa
... Show MoreThis study examined the imperative construction: the command, the interrogative, the prohibition, the call, and the wish. In the Diwan of Al-Shamakh bin Dirar; where the poetic verses were monitored in each of the topics of the student's creation, and the rhetorical meanings that he came out with. What is new in this study is that it is the first to study the demanded composition in the poetry of a glorious poet, Al-Shammakh bin Dirar Al-Dhubyani. As his poetry did not receive such a study, it sought to employ what was written by rhetoric scholars, in an attempt to explore the demanded composition in the poetry of Al-Shamakh. The study adopted the descriptive analytical approach, which is based on counting the number of times the poet us
... Show MoreThe current research aims to verify the role of strategic intelligence as an explanatory variable in organizational success as a respondent variable in the colleges of the University of Fallujah, the research community. (Dean, Associate Dean, Section Head, Division Officer, Unit Officer), The researcher used the questionnaire as the main tool to collect data that included (50) items, in addition to using personal interviews and field observations as aids in data collection. The researcher relied on statistical programs (SPSS V.25; Excel V (16) In the treatment and analysis of data through the use of the most appropriate statistical methods (arithmetic mean, standard deviation, difference coefficient, determinatio
... Show MoreBackground: One of the major problems in endodontics is micro-leakage of root canal fillings which might contribute to the failure of endodontic treatment. To avoid this problem, a variety of sealers have been tested. The objective of this, in vitro, study was to evaluate the shear bond strength of four resin based sealers (AH plus, silver free AH26, RealSeal SE and Perma Evolution permanent root canal filling material) to dentin. Materials and Methods: Forty non-carious extracted lower premolars were used. The 2mm of the occlusal surfaces of teeth were sectioned, to expose the dentin surface. The exposed dentin surfaces of teeth were washed with 5ml of 2.5% NaOCl solution followed by 5ml of 17 % EDTA then rinsed by deionized water to remov
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables