New Schiff-base ligands bearing tetrazole moiety and their polymeric metal complexes with Co(II), Ni(II) and Cd(II) ions are reported. Ligands were prepared in a multiple-step reaction. The reaction of sodium 2,6- diformylphenolate and cyclohexane-1,3-dione with 5-amino-2-fluorobenzonitrile resulted in the isolation of two precursors sodium 2,6-bis((E)-(3-cyano-4-fluorophenylimino)methyl)-4-methylphenolate 1 and 5,5'- (1E,1'E)-cyclohexane-1,3-diylidenebis- (azan-1-yl-1-ylidene)bis(2-fluorobenzonitrile) 2, respectively. The reaction of precursors with azide gave the required ligands; sodium 2,6-bis((E)-(4-fluoro-3-(1H-tetrazol-5- yl)phenylimino)methyl)-4-methylphenolate (NaL) and (N, N'E, N, N'E)-N, N'-(cyclohexane-1,3-diylidene)bis(4- fluoro-3-(1H-tetrazol-5-yl)aniline) (L1). The reaction of these ligands with the appropriate metal ions gave polymeric metal complexes of the formulae {[M2(L)]Cl}n and [M(L1)Cl2]n (where M = Co(II), Ni(II) and Cd(II)). A range of techniques were used to confirm the entity of ligands and their complexes. The formation of ligands and mode of complexation and geometrical structure of the title polymeric complexes were verified using FTIR, electronic spectra, NMR, ESMS, magnetic susceptibility, micro-elemental analysis, metal content, chloride content and conductance. The analytical and spectroscopic data indicated the formation of four-coordinate complexes, with a tetrahedral geometry for Co(II) and Cd(II), and square planer for Ni(II) in L- and L1 complexes. Biological evaluation of ligands and their polymeric complexes against gram-positive bacteria (G+), Bacillus stubtili, Staphylococcus aureus, and gram-negative bacteria (G-), Escherichia coli and Pseudomonas aeruginosa, showed ligands and their polymeric metal complexes have a good effect on the screened bacteria.
A ‘locking-bolt’ demountable shear connector (LBDSC) is proposed to facilitate the deconstruction and reuse of steel-concrete composite structures, in line with achieving a more sustainable construction design paradigm. The LBDSC is comprised of a grout-filled steel tube and a geometrically compatible partially threaded bolt. The latter has a geometry that ‘locks’ the bolt in compatible holes predrilled on the steel flange and eliminates initial slip and construction tolerance issues. The structural behaviour of the LBDSC is evaluated through nine pushout tests using a horizontal test setup. The effects of the tube thickness, strength of concrete slab, and strength of infilled grout on the shear resistance, initial stiffness, and du
... Show MoreTo determine the abilities of salivary E‐cadherin to differentiate between periodontal health and periodontitis and to discriminate grades of periodontitis.
E‐cadherin is the main protein responsible for maintaining the integrity of epithelial‐barrier function. Disintegration of this protein is one of the events associated with the destructive forms of periodontal disease leading to increase concentration of E‐cadherin in the oral biofluids.
A total of 63 patients with periodontitis (case) and 35
Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreThe need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone with a slun
... Show MoreGingival crevicular fluid (GCF) may reflect the events associated with orthodontic tooth movement. Attempts have been conducted to identify biomarkers reflecting optimum orthodontic force, unwanted sequallea (i.e. root resorption) and accelerated tooth movement. The aim of the present study is to find out a standardized GCF collection, storage and total protein extraction method from apparently healthy gingival sites with orthodontics that is compatible with further high-throughput proteomics. Eighteen patients who required extractions of both maxillary first premolars were recruited in this study. These teeth were randomly assigned to either heavy (225g) or light force (25g), and their site specific GCF was collected at baseline and aft
... Show MoreTo investigate the prevalence of true periodontal chief complaints (CC) and the factors affecting their reporting by patients with periodontal diseases (PD).
This cross‐sectional study was based on retrospective analysis of available periodontal records. Different personal and demographic variables were obtained from these records including CC, age, gender, working status, past medical/dental history, smoking status and diagnosis. In addition, clinical parameters of plaque index, gingival index, probing pocket depth (PPD), and number of missing teeth. Periodontal CC were r
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More