1,413 research outputs found

    1,3-Bis{[5-(pyridin-2-yl)-1,3,4-oxadiazol-2-yl]sulfan­yl}propan-2-one

    Get PDF
    In the distorted W-shaped mol­ecule of the title compound, C17H12N6O3S2, a twofold axis passes through the carbonyl group. The mol­ecules stack in the crystal through π–π inter­actions [centroid—centroid distance = 3.883 Å] and weak C—H⋯N hydrogen-bonding inter­actions, forming a three-dimensional architecture

    catena-Poly[[diaqua­nickel(II)]-bis­(μ-2-{[5-(pyridin-4-yl)-1,3,4-oxadiazol-2-yl]sulfan­yl}acetato)]

    Get PDF
    In the title compound, [Ni(C9H6N3O3S)2(H2O)2]n, the NiII atom, located on an inversion center, is ligated in an octa­hedral geometry by two carboxyl­ate O atoms from two 2-{[5-(pyridin-4-yl)-1,3,4-oxadiazol-2-yl]sulfan­yl}acetate (L) ligands and two O atoms from water mol­ecules in the equatorial plane, and two pyridine N atoms from other two L ligands at the apical sites. Two L ligands bridge pairs of metal atoms in an anti­parallel manner, forming centrosymmetric dinuclear quasi-recta­ngular units which are linked into infinite double-stranded chains parallel to [100]. O—H⋯O hydrogen bonds between the coordinating water mol­ecules and the carboxyl­ate groups of the L ligand as well as interchain S⋯N inter­actions [2.726 (2)–3.363 (2) Å] lead to the formation of a layer structure parallel to (001)

    Strings And Colorings Of Topological Coding Towards Asymmetric Topology Cryptography

    Full text link
    We, for anti-quantum computing, will discuss various number-based strings, such as number-based super-strings, parameterized strings, set-based strings, graph-based strings, integer-partitioned and integer-decomposed strings, Hanzi-based strings, as well as algebraic operations based on number-based strings. Moreover, we introduce number-based string-colorings, magic-constraint colorings, and vector-colorings and set-colorings related with strings. For the technique of encrypting the entire network at once, we propose graphic lattices related with number-based strings, Hanzi-graphic lattices, string groups, all-tree-graphic lattices. We study some topics of asymmetric topology cryptography, such as topological signatures, Key-pair graphs, Key-pair strings, one-encryption one-time and self-certification algorithms. Part of topological techniques and algorithms introduced here are closely related with NP-complete problems or NP-hard problems.Comment: Asymmetric topology encryption is a new topic of topological coding towards the certificateless public key cryptograph

    Traumatic irreducible dislocation of the fifth metatarsophalangeal joint in pediatrics: case report and clinical experience

    Get PDF
    Dislocation of the metatarsophalangeal joint (MTPJ) by trauma commonly occurs in adults. Most dislocations of the MTPJ could be reduced by closed reduction. However, isolated traumatic irreducible dislocation of the fifth MTPJ is an extremely rare injury, particularly in children. We report the case of a 10-year-old boy with irreducible dislocation of the fifth MTPJ who presented with a dorsiflexion injury of the right foot 1 year previously. Closed reduction was attempted but failed. Computed tomography showed the dorsolateral dislocation of the fifth MTPJ. We performed an open reduction and metatarsal bone osteotomy, with a short osteotomy at approximately 0.8 cm. The osteotomy was adjusted to a reduction of the MTPJ and fixation by a lock compression plate. The distal growth plate in the metatarsal bone was protected to avoid pre-closure of the growth plate. There were no instances of dislocation or signs of avascular necrosis of the head of the metatarsal bone. The results of this study demonstrated that open reduction and metatarsal bone osteotomy could be an optional treatment for irreducible dislocation of the fifth MTPJ in children. We should pay more attention to the distal growth plate in the metatarsal bone to avoid pre-closure of the growth plate

    Comparison of preprocessing methods and storage times for touch DNA samples

    Get PDF
    Aim To select appropriate preprocessing methods for different substrates by comparing the effects of four different preprocessing methods on touch DNA samples and to determine the effect of various storage times on the results of touch DNA sample analysis. Method Hand touch DNA samples were used to investigate the detection and inspection results of DNA on different substrates. Four preprocessing methods, including the direct cutting method, stubbing procedure, double swab technique, and vacuum cleaner method, were used in this study. DNA was extracted from mock samples with four different preprocessing methods. The best preprocess protocol determined from the study was further used to compare performance after various storage times. DNA extracted from all samples was quantified and amplified using standard procedures. Results The amounts of DNA and the number of alleles detected on the porous substrates were greater than those on the non-porous substrates. The performances of the four preprocessing methods varied with different substrates. The direct cutting method displayed advantages for porous substrates, and the vacuum cleaner method was advantageous for non-porous substrates. No significant degradation trend was observed as the storage times increased. Conclusion Different substrates require the use of different preprocessing method in order to obtain the highest DNA amount and allele number from touch DNA samples. This study provides a theoretical basis for explorations of touch DNA samples and may be used as a reference when dealing with touch DNA samples in case work
    corecore