Understanding the compatibility between spider silk and conducting materials is essential to advance the use of spider silk in electronic applications. Spider silk is tough, but becomes soft when exposed to water. Here we report a strong affinity of amine-functionalised multi-walled carbon nanotubes for spider silk, with coating assisted by a water and mechanical shear method. The nanotubes adhere uniformly and bond to the silk fibre surface to produce tough, custom-shaped, flexible and electrically conducting fibres after drying and contraction. The conductivity of coated silk fibres is reversibly sensitive to strain and humidity, leading to proof-of-concept sensor and actuator demonstrations.
Educational of the mind is a weapon to a different knowledges which
benefit in ife and developed the mind in many field and practice him in a
regular form in a right thinking and practice sense on exactly recognizing and
conception things which is senses and regulating the memory and providing
with benefit information which fit to minded of person,the present research
aimed at answering the following two questions:
1-Does the concept of mind differ with age?
2-Does the recognition on function of mind developed with development of
age?
The research population consisted of the children in the primary schools
of Baghdad/center,and the students of the Education for woman
college/Baghdad university for the age
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreBackground: The presence of cancer has a profound psychological impact on the quality of life of patients and their families, on family and social relationships, and on role functioning.
Aim of the study: Assess the impact of childhood cancer on patients and their families.
Subjects and methods: A Prospective questionnaire-based study, for 151 patients, had malignancy identified by tumor registry of Children Welfare Teaching Hospital. The information was taken from the parent(s) in the presence of the patient who sometimes answered some questions during the interview.
Result: There was an interview with 151 families of children with cancer in t
... Show Moren this work, the effect of gamma rays on blood thinning drugs was studied using the drug (Aspirin), where gamma rays were spread with the drug using a radioactive source (Co60), and 15,000 grams of Aspirin were placed in the device (gamma chamber 900). The drug was subjected to different irradiation doses (5 KGy, 10 KGy, 15 KGy) and the amount of absorption of the drug was observed in the gamma for different doses and the study of x-rays. After confirming the absorption of the drug to radiation, the effect of the drug on blood thinning was calculated using the rat model and compared with the same drug and the same dose but without exposing the drug to radiation and comparing all results with the control group. The way drugs absorbed radiati
... Show MoreConstruction joints are stopping places in the process of placing concrete, and they are required because in many structures it is impractical to place concrete in one continuous operation. The amount of concrete that can be placed at one time is governed by the batching and mixing capacity and by the strength of the formwork. A good construction joint should provide adequate flexural and shear continuity through the interface.
In this study, the effect of location of construction joints on the performance of reinforced concrete structural elements is experimentally investigated.
Nineteen beam specimens with dimensions of 200×200×950 mm were tested. The variables investigated are the location of the construction joints
... Show MoreA laboratory experiment was carried out according to a completely randomized design with four repetitions on the seeds resulting from a field experiment applied for the two seasons, 2020 and 2021, to find out the effect of the cultivars (Ambar 33, Yasamin, Dijlah, Ambar Al-Baraka and Furat 1) and the harvest dates (at physiological maturity and after 7 and 14, 21 and 28 days of physiological maturity) on the vigour of rice seeds. The results showed the superiority of the seeds of the cultivar Anbar Al-Baraka at first and final counting, dry weight of the seedling, seedling vigor index and electrical conductivity, and the superiority of the seeds of Dijla cultivar at accelerated aging test and cold test without significant difference with th
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThis study focused on extracting the outer membrane nanovesicles (OMVs) from Escherichia coli BE2 (EC- OMVs) by ultracentrifugation, and the yield was 2.3mg/ml. This was followed by purification with gel filtration chromatography using Sephadex G-150, which was 2mg/ml. The morphology and size of purified EC-OMVs were confirmed by transmission electron microscopy (TEM) at 40-200 nm. The nature of functional groups in the vesicle vesicle was determined by Fourier transforms infrared spectroscopy (FT-IR) analysis. The antitumor activity of EC-OMVs was conducted in vitro by MTT assay in human ovarian (OV33) cancer cell line at 24,48 and 96hrs. The cytotoxicity test showed high susceptibility to the vesicles in ovarian compared to normal
... Show MoreThe significant shift in the Fine Arts, who led the avant-garde movements and creative which appeared in the modern, specifically in the mid-nineteenth century and early twentieth century era path, embodied in a clear show of new aesthetic value rejects traditional methods put in shape and color qualities She described the movements subjectivity or no formal, was intended to determine the direct function of expression and speech language in the visual arts away from the representation and simulation of reality was accompanied by the appearance of those fine movements directed towards a global approach to design carries features and clear in its organizations formalism of the most important move away from the symmetry and the adoption of
... Show More