226 research outputs found

    Crystal structure of 2-[(4-bromobenzyl)thio]-5-(5-bromothiophen-2-yl)-1,3,4-oxadiazole, C<sub>13</sub>H<sub>8</sub>Br<sub>2</sub>N<sub>2</sub>OS<sub>2</sub>

    Get PDF
    C13H8Br2N2OS2, monoclinic, Pc (no. 7), a = 13.4050(4) angstrom, b = 4.7716(1) angstrom, c = 11.7303(4) angstrom, beta = 105.885( 3)degrees, V = 721.66(4) angstrom(3), Z = 2, R-gt(F) = 0.0294, wR(ref) (F-2 = 0.0808, T = 160K

    3-(Adamantan-1-yl)-4-(prop-2-en-1-yl)-1H-1,2,4-triazole-5(4H)-thione

    Get PDF
    The title mol­ecule, C15H21N3S, exists as the thione tautomer in the solid state. The 1,2,4-triazole ring is almost planar (r.m.s. deviation = 0.004 Å) and the prop-2-en-1-yl chain is close to being perpendicular to this plane [C—N—C—C torsion angle = 77.1 (5)°]. In the crystal, centrosymmetric dimeric aggregates are formed by pairs of N—H⋯S hydrogen bonds as parts of eight-membered (⋯HNCS)2 synthons. These are connected into layers parallel to (101) via C—H⋯π inter­actions, where the π-system is the triazole ring. The investigated sample was a nonmerohedral twin; the refined domain ratio was 0.655 (4):0.345 (4)

    3-(Adamantan-1-yl)-1-[(4-ethyl­piperazin-1-yl)meth­yl]-4-[(E)-(4-hy­droxy­benzyl­idene)amino]-1H-1,2,4-triazole-5(4H)-thione

    Get PDF
    In the title thione, C26H36N6OS, the 1,2,4-triazole ring is planar (r.m.s. deviation = 0.020 Å) and the benzene ring is twisted out of this plane [dihedral angle = 62.35 (12)°]. Supra­molecular zigzag chains feature in the crystal packing. These are sustained by O—H⋯N(piperazine) hydrogen bonds, and are connected into the three-dimensional crystal structure by C—H⋯S and C—H⋯O inter­actions. The crystal studied was a racemic twin

    3-(Adamantan-1-yl)-1-[(4-benzyl­piperazin-1-yl)meth­yl]-4-[(E)-(2-hy­droxy­benzyl­idene)amino]-1H-1,2,4-triazole-5(4H)-thione

    Get PDF
    In the title compound, C31H38N6OS, the conformation about the N=C [1.285 (2) Å] imine bond is E. The piperazine ring has a chair conformation and occupies a position almost perpendicular to the plane through the triazole ring; the benzene ring forms a dihedral angle of 31.95 (10)° with the triazole ring. Overall, the mol­ecule has the shape of a flattened bowl. The hy­droxy group is disordered over two positions. The major component has a site-occupancy factor of 0.762 (3) and forms an intra­molecular O—H⋯N(imine) bond to close an S(6) loop. The minor component of the disordered hy­droxy group forms an O—H⋯N(piperazine) hydrogen bond. These, along with C—H⋯S and C—H⋯N inter­actions, link mol­ecules into a three-dimensional architecture

    3-(Adamantan-1-yl)-4-methyl-1-[(4-phenyl­piperazin-1-yl)meth­yl]-1H-1,2,4-triazole-5(4H)-thione dichloro­methane hemisolvate

    Get PDF
    The asymmetric unit of the title dichloro­methane hemisolvate, C24H33N5S·0.5CH2Cl2, comprises an adamantan­yl/triazole derivative and half a CH2Cl2 mol­ecule of crystallization; the latter is disordered about a twofold axis of symmetry. The piperazine ring has a chair conformation and the two N-bound substituents occupy equatorial positions. The piperazine residue is almost normal to the triazole ring [N—N—C—N torsion angle = −79.9 (3)°] so that to a first approximation, the mol­ecule has an L-shape. Linear supra­molecular chains parallel to [001] are formed via C—H⋯S inter­actions. Two such chains are linked into a double chain via C—H⋯Cl inter­actions involving the disordered CH2Cl2 mol­ecules of solvation

    A Protocol for the Secure Linking of Registries for HPV Surveillance

    Get PDF
    In order to monitor the effectiveness of HPV vaccination in Canada the linkage of multiple data registries may be required. These registries may not always be managed by the same organization and, furthermore, privacy legislation or practices may restrict any data linkages of records that can actually be done among registries. The objective of this study was to develop a secure protocol for linking data from different registries and to allow on-going monitoring of HPV vaccine effectiveness.A secure linking protocol, using commutative hash functions and secure multi-party computation techniques was developed. This protocol allows for the exact matching of records among registries and the computation of statistics on the linked data while meeting five practical requirements to ensure patient confidentiality and privacy. The statistics considered were: odds ratio and its confidence interval, chi-square test, and relative risk and its confidence interval. Additional statistics on contingency tables, such as other measures of association, can be added using the same principles presented. The computation time performance of this protocol was evaluated.The protocol has acceptable computation time and scales linearly with the size of the data set and the size of the contingency table. The worse case computation time for up to 100,000 patients returned by each query and a 16 cell contingency table is less than 4 hours for basic statistics, and the best case is under 3 hours.A computationally practical protocol for the secure linking of data from multiple registries has been demonstrated in the context of HPV vaccine initiative impact assessment. The basic protocol can be generalized to the surveillance of other conditions, diseases, or vaccination programs

    Melhoria da qualidade de filetes de tilápia do Nilo congelados com óleo de alecrim e tomilho

    Get PDF
    The food industry and the frozen fish sector in particular have benefitted greatly from advancements in food processing technologies. This study investigated the effect of adding natural antioxidants such as rosemary and thyme oil to frozen fillets of Nile tilapia (Oreochromis niloticus) in order to preserve their quality for consumers. Fillets were treated with rosemary and thyme at two concentrations (1% and 1.5%) and then were stored at 4°C. Samples were analyzed over 4 days for bacteriological (aerobic plate count, psychotropic count, and coliform count), chemical (determination of pH, thiobarbituric acid reactive substances-TBARS, and total volatile base nitrogen-TVB-N), and sensory quality examination (color, texture, and odor). Significant differences (P < 0.05) were observed among different groups in terms of aerobic plate count, psychotropic count, and coliform count during the storage. Moreover, pH, TVB-N, and TBARS mean values in the treated groups were lower than those in the untreated group. The best sensory quality was obtained at the highest concentrations (1.5%) of thyme and rosemary oil

    3-(Adamantan-1-yl)-4-[( E

    Get PDF

    Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation

    Get PDF
    Background Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results. However, duplicate records in a distributed dataset may lead to incorrect statistical results. Therefore, to increase the accuracy of the statistical analysis of a distributed dataset, secure deduplication is an important preprocessing step. Methods We designed a secure protocol for the deduplication of horizontally partitioned datasets with deterministic record linkage algorithms. We provided a formal security analysis of the protocol in the presence of semi-honest adversaries. The protocol was implemented and deployed across three microbiology laboratories located in Norway, and we ran experiments on the datasets in which the number of records for each laboratory varied. Experiments were also performed on simulated microbiology datasets and data custodians connected through a local area network. Results The security analysis demonstrated that the protocol protects the privacy of individuals and data custodians under a semi-honest adversarial model. More precisely, the protocol remains secure with the collusion of up to N − 2 corrupt data custodians. The total runtime for the protocol scales linearly with the addition of data custodians and records. One million simulated records distributed across 20 data custodians were deduplicated within 45 s. The experimental results showed that the protocol is more efficient and scalable than previous protocols for the same problem. Conclusions The proposed deduplication protocol is efficient and scalable for practical uses while protecting the privacy of patients and data custodians

    A Systematic Review of Re-Identification Attacks on Health Data

    Get PDF
    Privacy legislation in most jurisdictions allows the disclosure of health data for secondary purposes without patient consent if it is de-identified. Some recent articles in the medical, legal, and computer science literature have argued that de-identification methods do not provide sufficient protection because they are easy to reverse. Should this be the case, it would have significant and important implications on how health information is disclosed, including: (a) potentially limiting its availability for secondary purposes such as research, and (b) resulting in more identifiable health information being disclosed. Our objectives in this systematic review were to: (a) characterize known re-identification attacks on health data and contrast that to re-identification attacks on other kinds of data, (b) compute the overall proportion of records that have been correctly re-identified in these attacks, and (c) assess whether these demonstrate weaknesses in current de-identification methods.Searches were conducted in IEEE Xplore, ACM Digital Library, and PubMed. After screening, fourteen eligible articles representing distinct attacks were identified. On average, approximately a quarter of the records were re-identified across all studies (0.26 with 95% CI 0.046-0.478) and 0.34 for attacks on health data (95% CI 0-0.744). There was considerable uncertainty around the proportions as evidenced by the wide confidence intervals, and the mean proportion of records re-identified was sensitive to unpublished studies. Two of fourteen attacks were performed with data that was de-identified using existing standards. Only one of these attacks was on health data, which resulted in a success rate of 0.00013.The current evidence shows a high re-identification rate but is dominated by small-scale studies on data that was not de-identified according to existing standards. This evidence is insufficient to draw conclusions about the efficacy of de-identification methods
    corecore