Background: Hemoglobin A1c (HbA1c) is a widely used test for glycemic control. It is done for chronic kidney disease (CKD) patients. Renal disease is accompanied by thyroid abnormalities, which affect HbA1c, especially in those taking erythropoiesis-stimulating agents (ESAs). We aimed to find the effect of thyroid dysfunction on HbA1c in hemodialysis patients taking ESAs and those who do not. Materials and Method: Fifty six patients were included in this study, which was done between September 2017 and June 2018, in Baghdad Teaching Hospital. Thyroid stimulating hormone, free T3, free T4 and HbA1c measurements were done. The patients were divided into 2 groups; those who took ESAs and those who did not, then they were subdivided into those with hypothyroidism and hyperthyroidism according to the Body mass index (BMI). www.IndianJournals.com Members Copy, Not for Commercial Sale Downloaded From IP - 180.151.4.186 on dated 20-Jan-2020 Results: Comparing HbA1c levels in hemodialysis patients taking ESAs and those who did not, showed no significant difference (5.79 ± 1.91 vs. 6.19 ± 1.64, P=0.09). The difference was also not significant in both hypothyroid and hyperthyroid patients in both high and low BMI patients. The only significant difference in HbA1c was between hyperthyroid and hypothyroid patients in those not taking ESAs, and having low BMI (4.97 ± 1.36 and 7.51 ± 0.87 respectively, P=0.02). conclusion: There is no significant influence of thyroid hormone changes on HbA1c levels in hemodialysis patients taking and not taking ESAs.
The relation between faithful, finitely generated, separated acts and the one-to-one operators was investigated, and the associated S-act of coshT and its attributes have been examined. In this paper, we proved for any bounded Linear operators T, VcoshT is faithful and separated S-act, and if a Banach space V is finite-dimensional, VcoshT is infinitely generated.
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreVol. 6, Issue 1 (2025)
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreTolerance and its impact on building society
For the graph , the behavior associated with to the majority of the graphical properties of this graph is covered in this article. The reflection of the capabilities of on the Ly constructions is one of the key ideas addressed throughout this paper. For instance, by this technique we can comprehend the mechanism via which groups of relatively tiny structure are exist within Ly.
Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreUnderstanding the compatibility between spider silk and conducting materials is essential to advance the use of spider silk in electronic applications. Spider silk is tough, but becomes soft when exposed to water. Here we report a strong affinity of amine-functionalised multi-walled carbon nanotubes for spider silk, with coating assisted by a water and mechanical shear method. The nanotubes adhere uniformly and bond to the silk fibre surface to produce tough, custom-shaped, flexible and electrically conducting fibres after drying and contraction. The conductivity of coated silk fibres is reversibly sensitive to strain and humidity, leading to proof-of-concept sensor and actuator demonstrations.