Wolverine-style self-healing, stretchable material developed

December 27, 2016

Los Angeles, Dec 27: Scientists have developed a transparent, self-healing, highly stretchable conductive material that can be electrically activated to power artificial muscles and used to improve batteries, electronic devices and robots.

wolverine

The low-cost, easy to produce soft rubber-like material can stretch 50 times its original length, researchers said. After being cut, it can completely re-attach, or heal, in 24 hours at room temperature. In fact, after only five minutes of healing the material can be stretched two times its original length, they said.

The findings from researchers, including those from University of California, Riverside in the US, represent the first time scientists have created an ionic conductor -materials that ions can flow through, that is transparent, mechanically stretchable and self-healing.

The material could give robots the ability to self-heal after mechanical failure; extend the lifetime of lithium ion batteries used in electronics and electric cars and improve biosensors used in the medical field and environmental monitoring.

“Creating a material with all these properties has been a puzzle for years. We did that and now are just beginning to explore the applications,” said Chao Wang, assistant professor at University of California.

Self-healing materials repair damage caused by wear and extend the lifetime, and lower the cost, of materials and devices. Wang was inspired by Wolverine, the comic book character who has the ability to self-heal.

Ionic conductors are a class of materials with key roles in energy storage, solar energy conversion, sensors and electronic devices. Conventionally, self-healing polymers make use of non-covalent bonds, which creates a problem because those bonds are affected by electrochemical reactions that degrade the performance of the materials.

Wang helped solve that problem by using a mechanism called ion-dipole interactions, which are forces between charged ions and polar molecules that are highly stable under electrochemical conditions. He combined a polar, stretchable polymer with a mobile, high-ionic-strength salt to create the material with the properties the researchers were seeking.

Researchers at the University of Colorado, Boulder in the US demonstrated that the material could be used to power a so-called artificial muscle, also called dielectric elastomer actuator.

The research was published in the journal Advanced Material.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 3,2020

Giving each and every app access to personal information stored on Android smartphones such as your contacts, call history, SMS and photos may put you in trouble as bad actors can easily use these access to spy on you, send spam messages and make calls anywhere at your expense or even sign you up for a premium "service", researchers from cybersecurity firm Kaspersky have warned.

But one can restrict access to such information as Android lets you configure app permissions. 

Giving an app any of these permissions generally means that from now on it can obtain information of this type and upload it to the Cloud without asking your explicit consent for whatever it intends to do with your data.

Therefore, security researchers recommend one should think twice before granting permissions to apps, especially if they are not needed for the app to work. 

For example, most games have no need to access your contacts or camera, messengers do not really need to know your location, and some trendy filter for the camera can probably survive without your call history, Kaspersky said. 

While decision to give permission is yours, the fewer access you hand out, the more intact your data will be.

Here's what you should know to protect your data.

SMS: An app with permission to send and receive SMS, MMS, and WAP (Wireless Application Protocol) push messages, as well as view messages in the smartphone memory will be able to read all of your SMS correspondence, including messages with one-time codes for online banking and confirming transactions.

Using this permission, the app can also send spam messages in your name (and at your expense) to all your friends. Or sign you up for a premium "service." You can see and conrol which apps have these rights by going to the settings of your phone.

Calendar: With permission to view, delete, modify, and add events in the calendar, prying eyes can find out what you have done and what you are doing today and in the future. Spyware loves this permission.

Camera: Permission to access the camera is necessary for the app to take photos and record video. But apps with this permission can take a photo or record a video at any moment and without warning. Attackers armed with embarrassing images and other dirt on you can make life a misery, according to Kaspersky.

Contacts: With permission to read, change, and add contacts in your address book, and access the list of accounts registered in the smartphone, an app can send your entire address book to its server. Even legitimate services have been found to abuse this permission, never mind scammers and spammers, for whom it is a windfall.

This permission also grants access to the list of app accounts on the device, including Google, Facebook, and many other services.

Phone: Giving access to your phone means permission to view and modify call history, obtain your phone number, cellular network data, and the status of outgoing calls, add voicemail, access IP telephony services, view numbers being called with the ability to end the call or redirect it to another number and call any number.

This permission basically lets the app do anything it likes with voice communication. It can find out who you called and when or prevent you from making calls (to a particular number or in general) by constantly terminating calls. 

It can eavesdrop on your conversations or, of course, make calls anywhere at your expense, including to pay-through-the-nose numbers, Kaspersky warned.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 10,2020

US dictionary Merriam-Webster will update the meaning of the word "racism" after being contacted by a Missouri black woman, who claimed the current definition fell short of including the systematic oppression of people of colour, according to media reports.

"A revision to the entry for racism is now being drafted to be added to the dictionary soon, and we are also planning to revise the entries of other words that are related to racism or have racial connotations," according to a statement of the 189-year-old dictionary shared by Kennedy Mitchum, a recent graduate of Drake University in Iowa, on her Facebook.

Mitchum, 22, emailed the dictionary last month, following the death of African American George Floyd in the custody of four Minneapolis police officers, Xinhua news agency reported.

"I kept having to tell them that definition is not representative of what is actually happening in the world," Mitchum told CNN. "The way that racism occurs in real life is not just prejudice, it's the systemic racism that is happening for a lot of black Americans."

Merriam-Webster's first definition of racism is "a belief that race is the primary determinant of human traits and capacities and that racial differences produce an inherent superiority of a particular race."

"It's not just disliking someone because of their race," Mitchum wrote in a Facebook post on Friday. "This current fight we are in is evidence of that, lives are at stake because of the systems of oppression that go hand-in-hand with racism."

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 20,2020

Washington D.C., Jan 20: An American bride asked for money from her invitees so that they can be on the 'exclusive guest list'.

Weddings can be surely expensive. But is it feasible for one to charge the guests to make up for the expenses?

According to Fox News, that is exactly what happened in a recent American wedding. A 19-year-old shared on Reddit that her cousin was getting married on Sunday and announced that she would charge 50 dollars to those who wanted to attend her wedding.

"She said that they can Venmo her money so there won't be no [sic] problems and everyone who paid will be added onto the 'exclusive guest list' which basically means you won't have to wait in line while other guests pay," wrote the user named DaintySheep.

While she refused to pay for entry into her cousin's wedding the bride-to-be contacted the elders in the family which ended up in an embarrassing situation.

"She wanted to get the money she spent on her special day back. I told her I wouldn't be able to come because this was outrageous and that I wish her well on her special day. She contacted my aunt and my aunt called me cheap and rude. My parents offered to pay for my entry, but I refused," continued the disheartened girl.

While in almost every nook and cranny of the world gifting the bride-groom with money is a tradition, asking for money from friends and family to replenish the money spent on a wedding is can be said to be a rare scenario.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.