Understanding the compatibility between spider silk and conducting materials is essential to advance the use of spider silk in electronic applications. Spider silk is tough, but becomes soft when exposed to water. Here we report a strong affinity of amine-functionalised multi-walled carbon nanotubes for spider silk, with coating assisted by a water and mechanical shear method. The nanotubes adhere uniformly and bond to the silk fibre surface to produce tough, custom-shaped, flexible and electrically conducting fibres after drying and contraction. The conductivity of coated silk fibres is reversibly sensitive to strain and humidity, leading to proof-of-concept sensor and actuator demonstrations.
The primary aim of this study was to find out the effect of a training program on the development of physical abilities in football goalkeepers. The current study was conducted on goalkeepers of the Academy of Espanyol Sports Club in the premises of Haifa Sports Club Stadium. The study was completed by the researchers within the timeline of May 2021 to August 2021. A total of 7 goalkeepers falling within the age group of 15-17 years were recruited as the sample participants for the study. Out of 7 goalkeepers, 5 goalkeepers were included in the primary experiment and 2 of them were excluded. The training program applied had a positive effect on the development of physical abilities in the football goalkeepers of the sa
... Show More
This research aims to understand complexity management and its impact on the use of the dynamic capabilities of a sample of private colleges. Private colleges are currently facing many crises, changes, unrest and high competitive pressures. Which is sometimes difficult or even impossible to predict. The recruitment of dynamic capabilities is also one of the challenges facing senior management at private colleges to help them survive and survive. Thus, the problem of research was (there is a clear insufficiency of interest in Complexity Management and trying to employ it in improving the dynamic capabilities of Colleges that have been discussed?). A group of private colleges was selected as a
... Show MoreBackground: Mental health is integrated into PHC as a strategy of WHO to fill the gap in mental health treatment. Part of this strategy needs a level of task shifting so that mental health care is provided by different level of PHC workers and not only specialists such as psychiatrists and psychologists.
Objectives: To assess the knowledge and attitudes of family doctors regarding the provision of psychological health in PHCC and if there is an association between the certificates of these family doctors and their Knowledge and attitudes to psychological health.
Subjects and Methods: A cross-sectional descriptive study with analytic elements was conducted in 8 famil
... Show Morebeen taken at room temperature down to liquid nitrogen temperature (77K). Polar and nonpolar solvents have been used to study the solvent effect on the absorption and fluorescence spectra of solute molecules. Some of the spectroscopic parameters have been determined as functions of solvent polarity and temperature. The results indicate that the band width FWHM increases with increasing the solvent polarity and temperature, while the peak emission cross section decreases with increasing of solvent polarity and decreases with increasing the temperatures. Clear vibrational structure spectra of benzoanthracene molecules have been observed in Nonane and Hexane solvents at 77K.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreBackground. After tooth extraction, alveolar bone resorption is inevitable. This clinical phenomenon challenges dental surgeons aiming to restore esthetic and function. Alveolar ridge preservation can be applied to minimize dimensional changes with a new socket grafting material, an autogenous dentin graft, produced by mechanically and chemically processing natural teeth. This study assessed the safety and efficacy of using autogenous dentin biomaterial in alveolar ridge preservation. Materials and Methods. Patients with nonrestorable maxillary anterior teeth bounded by natural sound teeth were included in this study. After a detailed clinical and tomographic examination, eligible participants were randomly allocated into two groups
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThe stress – strength model is one of the models that are used to compute reliability. In this paper, we derived mathematical formulas for the reliability of the stress – strength model that follows Rayleigh Pareto (Rayl. – Par) distribution. Here, the model has a single component, where strength Y is subjected to a stress X, represented by moment, reliability function, restricted behavior, and ordering statistics. Some estimation methods were used, which are the maximum likelihood, ordinary least squares, and two shrinkage methods, in addition to a newly suggested method for weighting the contraction. The performance of these estimates was studied empirically by using simulation experimentation that could give more varieties for d
... Show MoreThe adsorption of Malonic acid, Succinic acid, Adipic acid, and Azelaic acid from their aqueous solutions on zinc oxide surface were investigated. The adsorption efficiency was investigated using various factors such as adsorbent amount, contact time, initial concentration, and temperature. Optimum conditions for acids removal from its aqueous solutions were found to be adsorbent dose (0.2 g), equilibrium contact time (40 minutes), initial acids concentration (0.005 M). Variation of temperature as a function of adsorption efficiency showed that increasing the temperature would result in decreasing the adsorption ability. Kinetic modeling by applying the pseudo-second order model can provide a better fit of the data with a greater correla
... Show MoreIn data mining and machine learning methods, it is traditionally assumed that training data, test data, and the data that will be processed in the future, should have the same feature space distribution. This is a condition that will not happen in the real world. In order to overcome this challenge, domain adaptation-based methods are used. One of the existing challenges in domain adaptation-based methods is to select the most efficient features so that they can also show the most efficiency in the destination database. In this paper, a new feature selection method based on deep reinforcement learning is proposed. In the proposed method, in order to select the best and most appropriate features, the essential policies
... Show More