identifier
stringlengths
11
32
pdf_url
stringlengths
17
4.62k
lang
stringclasses
120 values
error
stringclasses
1 value
title
stringlengths
2
500
source_name
stringlengths
1
435
publication_year
float64
1.9k
2.02k
license
stringclasses
3 values
word_count
int64
0
1.64M
text
stringlengths
1
9.75M
https://openalex.org/W2809072644
https://www.rrh.org.au/journal/download/pdf/89/
English
null
Factors influencing student nurses in their choice of a rural clinical placement site
Rural and remote health
2,001
cc-by
4,143
O R I G I N A L R E S E A R C H Factors influencing student nurses in their choice of a rural clinical placement site S Smith, H Edwards, M Courtney, K Finlayson S Smith, H Edwards, M Courtney, K Finlayson Centre for Nursing Research, Queensland University of Technology, Austral Centre for Nursing Research, Queensland University of Technology, Australia Smith S, Edwards H, Courtney M, Finlayson K Factors influencing student nurses in their choice of a rural clinical placement site Rural and Remote Health 1 (online), 2001: no 89 Available from: http://rrh.deakin.edu.au A B S T R A C T Rural health and government bodies have identified the need for greater numbers of health professionals in rural and remote health care settings. Providing students with the opportunity to experience a rural clinical placement has been suggested as one strategy for future health professionals to gain familiarity with the rural workplace and an awareness of the employment opportunities available in these areas. Although substantial numbers of student nurses have participated in a rural undergraduate clinical placement program at Queensland University of Technology since 1996, available places remain unfilled. This study aimed to investigate the factors influencing student nurses in their choice of a rural or metropolitan clinical placement. This study utilised a descriptive survey design. All final year Bachelor of Nursing students in 2000 (n = 212) were included in the sample, with a 65% response rate for the pre-test (n = 137). Findings demonstrated that possession of a rural background, previous work experience in a rural community and family, financial and/or employment commitments all influenced students’ choice of undertaking a rural clinical placement. settings. This is despite a need for greater numbers of health professionals in rural and remote areas being repeatedly identified by rural health and government peak bodies, the National Rural Health Alliance and the Australian Health © S Smith, H Edwards, M Courtney, K Finlayson, 2001. A licence to publish this material has been given to Deakin University http://rrh deakin edu au/ 1 © S Smith, H Edwards, M Courtney, K Finlayson, 2001. A licence to publish this material has been given to Deakin University http://rrh.deakin.edu.au/ 1 Department Healthy Horizons Policy1. Previous studies suggest that familiarity with the workplace is a positive influence on future work intentions2,3. However, a recent national survey of Australian rural nurses found only 8% had experienced any fieldwork in rural practice during their training4. This study is part of a larger project which aimed to provide evidence that student nurses who experience rural and remote health care settings during their studies are more likely to be recruited in their graduate year to rural settings. isolation, cultural differences, communication and information and documentation regarding the clinical venues. Students could access the information database on any of the clinical venues which provided them with details about travel options to the venue and within the town, accommodation availability, sporting events and other activities as well as tourist information. Collaboration with the clinical venue staff encouraged appropriate support for the students and preceptors through discussion of clinical site needs and the provision of guidelines for facilitation. A number of difficulties associated with rural clinical placements have been identified in the literature. Nominated restraints include family or carer responsibilities, the commitments associated with part-time employment, the financial burden and transport worries5,6. Concerns have been raised about the type of clinical experience available and distance from professional resources5,6. A study of rural placements in Georgia, USA, found that while some students believed they wouldn't obtain quality work experience, others worried about the level of independence or self- direction needed in a rural setting5. Social isolation and a lack of recreation facilities have also been reported as barriers to rural clinical placements6,7. Anecdotal evidence indicates rural placements have a positive effect in raising awareness of the advantages of rural practice as a registered nurse. Although substantial numbers of student nurses have successfully undertaken a rural placement, available places go unfilled. To gain an understanding of the characteristics of students who select a rural placement, it was important to obtain information on factors influencing their choice of a rural or metropolitan clinical placement setting. It is hoped this information will lead to the development of successful recruitment strategies for graduate nurses in rural and remote areas. Introduction and Background There is a paucity of literature in the area of recruitment strategies for graduate nurses in rural and remote health care © S Smith, H Edwards, M Courtney, K Finlayson, 2001. A licence to publish this material has been given to Deakin University http://rrh.deakin.edu.au/ 1 1 © S Smith, H Edwards, M Courtney, K Finlayson, 2001. A licence to publish this material has been given to Deakin University http://rrh.deakin.edu.au/ 2 Data analysis 4. Did the choice of a region of placement have any relationship with other demographic factors? Quantitative data were analysed using an SPSS database. Frequency distributions, Chi-square analysis (for nominal data) and ANOVA (for interval data) were used to describe differences between the characteristics of students choosing a rural or remote placement and students choosing a metropolitan placement. Design Characteristics of students who chose a rural placement Thirty (22%) of the 137 students who responded chose a rural setting for their clinical placement. This study utilised a descriptive survey design to collect pre- test data. A quasi-experimental pre-post test design was used for the larger project. • Previous experience of a rural lifestyle • Previous experience of a rural lifestyle Of the 58 students who had lived previously in a rural community, 19 (33%) chose a rural clinical placement and 39 (67%) chose a metropolitan setting. However, of the group of 30 students who chose a rural clinical placement, 19 (63%) had lived previously in a rural area. The proportion of rural clinical placement students who had lived previously in a rural area (63%) was significantly higher than the proportion of metropolitan clinical placement students who had lived previously in a rural area (37%), (c2 = 6.877, df = 2, p = 0.028). 2. Did the number of years lived in a rural area have any impact on the choice of region of placement? commencement of clinical placements. Participants completed the questionnaire during the session and returned it anonymously to the researcher. 3. Did the choice of a region of placement have any relationship with having worked previously in a rural area? Ethical approval for the study was obtained from QUT Human Research Ethics Committee. Instrument A questionnaire consisting of 24 items was developed by the researchers and contained a combination of open7 and closed8 questions. The questions related to demographics, previous experience of a rural lifestyle, previous work experience and issues of importance regarding the clinical placement experience. Piloting of the questionnaire was conducted prior to commencement of the study. • Length of time lived in a rural community • Length of time lived in a rural community Of the students who had lived previously in a rural area and chose a rural clinical placement: 17% (n = 3) had lived in a rural community for less than 5 years, 39% (n = 7) had lived in a rural community for 6 - 10 years, Aims All final year nursing students at Queensland University of Technology (QUT) are encouraged to select a placement of interest in first semester of their final year. The motivation of students to try something different is encouraged after two years of clinical placement in metropolitan clinical venues. Some students select to go overseas, others rural or remote and many stay within the usual confines of the metropolitan setting for a number of reasons. This study was part of a larger research project, of which the aims were to: • Evaluate the effectiveness of the Clinical Placement Support Scheme for final year Bachelor of Nursing students as a recruitment strategy for rural and remote health care services; and • Develop an increasing awareness in final year nursing students of the employment opportunities available for new graduates in rural and remote areas. Since 1996, a rural undergraduate clinical placement program has been available to student nurses at QUT. The Rural Clinical Support Scheme was comprised of a rural placement grant that assisted students with the cost of travel. The granting model was based on the number of kilometres from Brisbane, the State's capital city, and the funding ranged from $100 to $200 per student. Students were provided with a pre-briefing session prior to placement which addressed a number of important issues such as The following research questions were explored in this study: The following research questions were explored in this study: 1. Did previous experience of living in a rural community have any impact on the choice of region of placement? 2 Population and sample The population under study consisted of all final year Bachelor of Nursing students at Queensland University of Technology who undertook a clinical placement in 2000 (n = 212). One hundred and thirty-seven questionnaires were returned in the pre-test (response rate 65%). © S Smith, H Edwards, M Courtney, K Finlayson, 2001. A licence to publish this material has been given to Deakin University http://rrh.deakin.edu.au/ 3 • Financial/employment considerations • Financial/employment considerations • Financial/employment considerations Thirty- one students (28%) from the total student sample had applied for a rural scholarship, either from Queensland University of Technology, Royal College of Nursing Australia or Queensland Health. Major issues influencing application for a scholarship were financial reasons (42%) and the opportunity to gain diversity in clinical experience (33%). Reasons identified for not applying for a scholarship included financial/employment obligations in the local area (31%) and a lack of interest in working in a rural area (33%). • Financial/employment considerations Thirty- one students (28%) from the total student sample had applied for a rural scholarship, either from Queensland University of Technology, Royal College of Nursing Australia or Queensland Health. Major issues influencing application for a scholarship were financial reasons (42%) and the opportunity to gain diversity in clinical experience (33%). Reasons identified for not applying for a scholarship included financial/employment obligations in the local area (31%) and a lack of interest in working in a rural area (33%). Procedure 44% (n = 8) had lived in a rural community for more than 10 years. Pre-test questionnaires were distributed to participants at a prebriefing session held at the university one week prior to (One student did not respond to this question.) © S Smith, H Edwards, M Courtney, K Finlayson, 2001. A licence to publish this material has been given to Deakin University http://rrh.deakin.edu.au/ 3 3 © S Smith, H Edwards, M Courtney, K Finlayson, 2001. A licence to publish this material has been given to Deakin University http://rrh.deakin.edu.au/ 4 In comparison, of the students who had lived previously in a rural area but chose a metropolitan placement: higher than students undertaking a rural placement (Rural students: M = 3.45, SD = 1.27; Metropolitan students: M = 4.03, SD = 1.12; F = 5.77, df = 1, p=0.018). 41% (n = 16) had lived in a rural community for less than 5 years, 31% (n = 12) had lived in a rural community for 6 – 10 years, • Home and family considerations • Home and family considerations Family issues were nominated by 57% of students as a reason for not considering future employment in a rural setting and by 24% of students as a reason for not applying for a scholarship to undertake a rural clinical placement. Students who had chosen a metropolitan placement rated the importance of family responsibilities significantly higher than students who selected a rural placement (Rural students: M = 3.55, SD = 1.38; Metropolitan students: M = 4.26, SD = 1.03; F = 9.292, df = 1, p = 0.003). Rural placement students also rated the provision of appropriate living conditions significantly higher than metropolitan placement students (Rural students: M = 3.88, SD = 1.03; Metropolitan students: M = 3.03, SD = 1.18; F = 11.02, df = 1, p = 0.001). 28% (n = 11) had lived in a rural community for more than 10 years. • Worked previously in a rural community Of the 32 students who had worked previously in a rural community, 11 (34%) chose a rural clinical placement, while 21 (66%) chose a metropolitan placement. However, 37% of the students who chose a rural clinical placement had worked previously in a rural community, compared to 20% of the students who chose a metropolitan setting, a significantly higher difference (c2 = 5.873, df = 2, p = 0.048). • Worked previously in a rural community Of the 32 students who had worked previously in a rural community, 11 (34%) chose a rural clinical placement, while 21 (66%) chose a metropolitan placement. while 21 (66%) chose a metropolitan placement. However, 37% of the students who chose a rural clinical placement had worked previously in a rural community, compared to 20% of the students who chose a metropolitan setting, a significantly higher difference (c2 = 5.873, df = 2, p = 0.048). licence to publish this material has been given to Deakin University © S Smith, H Edwards, M Courtney, K Finlayson, 2001. A licence to publish this material has been given to Deakin University http://rrh deakin edu au/ 4 Characteristics of students who chose a rural placement © S Smith, H Edwards, M Courtney, K Finlayson, 2001. A licence to publish this material has been given to Deakin University http://rrh.deakin.edu.au/ 5 Characteristics of students who chose a rural placement • Rural background Possession of a rural background has been identified in previous studies as being positively associated with future employment in country areas9-13. It was interesting that of the 58 students who had lived previously in a rural community, only 19 (33%) chose a rural clinical placement setting. However, the proportion of rural clinical placement students who had lived previously in a rural area (63%) was still significantly higher than the proportion of metropolitan clinical placement students who had lived previously in a rural area (37%). A survey of Victorian rural nurses supports these findings, with 67% of the nurses reporting they had spent most of their childhood in a rural area11. These participants indicated that rural background and y g p when considering recruitment to a rural area. It has been suggested that universities need to recruit greater numbers of students with rural backgrounds to the health care professions in order to take advantage of this trend14, and recent government initiatives aim to encourage this idea15. • Length of time in a rural community When examining the number of years lived previously in a rural community, the data suggested that the longer a student had lived previously in a rural community, the more likely they were to choose a rural placement. Forty-four percent of the students who had lived in a rural community and chose a rural placement had lived in a rural area for over ten years. In contrast, 41% of students who had lived previously in a rural area and chose a metropolitan placement had lived in a rural area • Rural background Possession of a rural background has been identified in previous studies as being positively associated with future employment in country areas9-13. It was interesting that of the 58 students who had lived previously in a rural community, only 19 (33%) chose a rural clinical placement setting. However, the proportion of rural clinical placement students who had lived previously in a rural area (63%) was still significantly higher than the proportion of metropolitan clinical placement students who had lived previously in a rural area (37%). Table 1: Demographic characteristics of final year Bachelor of Nursing student lifestyle issues were among the most important factors when considering recruitment to a rural area. It has been suggested that universities need to recruit greater numbers of students with rural backgrounds to the health care professions in order to take advantage of this trend14, and recent government initiatives aim to encourage this idea15. lifestyle issues were among the most important factors when considering recruitment to a rural area. It has been suggested that universities need to recruit greater numbers of students with rural backgrounds to the health care professions in order to take advantage of this trend14, and recent government initiatives aim to encourage this idea15. © S Smith, H Edwards, M Courtney, K Finlayson, 2001. A licence to publish this material has been given to Deakin University http://rrh.deakin.edu.au/ 5 Discussion The demographic information obtained in this study had implications on the students' choice of clinical practice site. Over half of the student sample were aged >24yrs, with 31% aged 24 - 34 years and 20% aged >35 years. In fact, only around one-third of nursing students currently enrolled at QUT are recent school leavers, while approximately two thirds are mature age students. The high proportion of mature age students at QUT is not an isolated case, as Queensland Tertiary Admissions Centre's figures show, many South-East Queensland universities have a similar proportion of mature age nursing students. The high level of family, carer, financial and employment commitments identified in this study reflects the mature age of the group and the strong ties many students have to the local area. Respondents were asked to rate the importance of issues regarding their clinical placement experience on a scale from 1 to 5, from 'not at all important' to 'extremely important'. Analysis of results (using ANOVA) found rural students rated the importance of support for costs associated with placement significantly higher than students undertaking a metropolitan placement (Rural students: M = 3.97, SD = 1.02; Metropolitan students: M = 3.25, SD = 1.44; F = 6.125, df = 1, p= 0.015), while metropolitan students rated the importance of maintaining work commitments significantly 4 © S Smith, H Edwards, M Courtney, K Finlayson, 2001. A licence to publish this material has been given to Deakin University http://rrh deakin edu au/ 5 • Worked previously in a rural community There was a significantly higher proportion of students who had worked previously in a rural community and chose a rural clinical placement than those who had worked previously in a rural community and chose a metropolitan clinical placement. This trend could be linked to the positive association between familiarity with the work environment and subsequent employment noted by Glover, Clare, Longston and De Bellis3 and Collins, Hilde and Shriver2. Providing students with some work experience in a rural area may encourage greater familiarity with possible employment settings. The nursing graduates surveyed by Collins et al.2 felt their site of clinical practice was an important influence on their choice of employment, with 28% beginning their careers in the same workplace. Acknowledgements Funding for this research project was received from a Queensland University of Technology Scholarship in the Professions Grant. We would like to thank Ms Rekha Sharma for her assistance in the analysis of data for this project, and also the members of the Reference Committee for their valuable contribution. Conclusion This study supports earlier research demonstrating that students who have previously lived and/or worked in a rural area are more likely to choose a rural setting for clinical placements or postgraduate employment. However, considering nearly half of the students who choose a rural placement had no previous experience of a rural lifestyle, the value of rural clinical placements as a method of increasing awareness of employment opportunities in the rural setting is considerable. Family, financial and employment commitments were also found to influence students’ choice of undertaking a rural clinical placement. These factors should be considered in the development of recruitment and retention strategies for health professionals to rural areas. • Financial and family considerations A considerable number of students indicated family (24%), financial or employment (31%) commitments influenced their choice of a clinical placement site. Students who chose a metropolitan clinical placement rated the importance of maintaining work commitments and family responsibilities significantly higher than students selecting a rural area for their placement, while provision of financial support for costs associated with the placement and appropriate accommodation was significantly more important to the rural clinical placement students. for less than five years (28% for more than ten years). However, the numbers involved were too small to detect any statistically significant differences. recruitment to a rural location. Providing infrastructure for the needs of nursing students' family obligations, such as the availability of employment opportunities, education facilities and social support for carers, are thus of vital importance when considering recruitment strategies for health professionals to rural areas. Characteristics of students who chose a rural placement A survey of Victorian rural nurses supports these findings, with 67% of the nurses reporting they had spent most of their childhood in a rural area11. These participants indicated that rural background and • Length of time in a rural community • Length of time in a rural community When examining the number of years lived previously in a rural community, the data suggested that the longer a student had lived previously in a rural community, the more likely they were to choose a rural placement. Forty-four percent of the students who had lived in a rural community and chose a rural placement had lived in a rural area for over ten years. In contrast, 41% of students who had lived previously in a rural area and chose a metropolitan placement had lived in a rural area 5 © S Smith, H Edwards, M Courtney, K Finlayson, 2001. A licence to publish this material has been given to Deakin University http://rrh.deakin.edu.au/ 6 2. Collins P, Hilde E, Shriver C. Recruiting factors: Rural and urban settings. Nursing Management 1993; 24(4): 97-8. © S Smith, H Edwards, M Courtney, K Finlayson, 2001. A licence to publish this material has been given to Deakin University http://rrh deakin edu au/ 6 References Similar concerns have been identified in recruitment literature. In 1999, a national survey of rural Australian nurses reported that 'self, family or friends live in the area' and 'marriage commitments or family' were listed in the top four most frequent responses to essential factors influencing original recruitment to rural nursing4. Duffy, Siegloff and McGrail11 reported Victorian rural nurses indicated their partner's employment was the most important factor in 1. Healthy Horizons. Healthy Horizons: A framework for improving the health of rural, regional and remote Australians: National Rural Health Policy Forum and the National Rural Health Alliance, 1999. 2. Collins P, Hilde E, Shriver C. Recruiting factors: Rural and urban settings. Nursing Management 1993; 24(4): 97-8. © S Smith, H Edwards, M Courtney, K Finlayson, 2001. A licence to publish this material has been given to Deakin University http://rrh.deakin.edu.au/ 6 6 © S Smith, H Edwards, M Courtney, K Finlayson, 2001. A licence to publish this material has been given to Deakin University http://rrh.deakin.edu.au/ 7 10. Huntley B. Factors influencing recruitment and retention: Why RNs work in rural and remote area hospitals. The Australian Journal of Advanced Nursing 1995; 12(2): 14-19. 10. Huntley B. Factors influencing recruitment and retention: Why RNs work in rural and remote area hospitals. The Australian Journal of Advanced Nursing 1995; 12(2): 14-19. 3. Glover P, Clare J, Longston D, De Bellis A. Should I take my first offer? A graduate survey. Australian Journal of Advanced Nursing 1998; 15(2): 17-25. 4. Stephenson J, Blue I, Petkov J. A National Survey of Australian Rural Nurses. Whyalla Norrie, South Australia: The Association for Australian Rural Nurses Inc., 1999. 11. Duffy E, Siegloff LH, Siegloff LMF, McGrail M. Victorian Rural Nurse Project: Workforce Database Final Report - December 1999. Traralgon, Victoria: Monash University Centre for Rural Health, 2000. 5. McDonough JE, Lambert VA, Billue JS. A rural nursing practicum: Making it work. Nurse Educator 1992; 17(4): 30-34. 12. Rabinowitz HK, Diamond JJ, Hojat M, Hazelwood CE. Demographic, educational and economic factors related to recruitment and retention of physicians in rural Pennsylvania.' Journal of Rural Health 1999; 15(2): 210-1. 6. Barney T, Russell M, Clark M. Evaluation of the provision of fieldwork training through a rural student unit. Australian Journal of Rural Health 1998; 6: 202-07. 13. Wood D. Effects of educational focus on a graduate nurse's initial choice of practice area. Journal of Professional Nursing 1998; 14(4): 214-9. 7. Mitchell R. Perceived inhibitors to rural practice among physiotherapy students. Australian Journal of Physiotherapy 1996; 42(1): 47-52. 14. Hays RB, Acklin F, Chan P. et al. The University of Sydney Rural Careers Project. The Australian Journal of Rural Health 1993; 1(3): 23-25. 8. Queensland Tertiary Admissions Centre 2001. Queensland. 9. Easterbrook M, Godwin M, Wilson R. et al. Rural background and clinical rural rotations during medical training: Effect on practice location. Canadian Medical Association Journal 1999; 160(8): 1159-64. 15. National Rural Health Alliance. 8 June, 'Budget 2001' (Media Release, 22 May 2001). National Rural Health Alliance e-forum, Retrieved from http://www.ruralhealth.org.au/22501.htm 7
https://openalex.org/W4386436837
https://zenodo.org/record/8317268/files/AJUV_Dossier_BERTOLOTTI.pdf
es
De la prueba incorporada a la causa, tenemos que estamos en presencia de una persona transexual. Un análisis del modelo patologizador para el reconocimiento de la identidad de género en la jurisprudencia de Córdoba
Zenodo (CERN European Organization for Nuclear Research)
2,023
cc-by
11,143
Revista Argumentos (ISSN: 2525-0469) Núm. 16 2023, pp. 155-176 Sección: Dossier Centro de Perfeccionamiento Ricardo C. Núñez [En Línea] http://revistaargumentos.justiciacordoba.gob.ar/ _____________________________________________________________________ De la prueba incorporada a la causa, tenemos que estamos en presencia de una persona transexual. Un análisis del modelo patologizador para el reconocimiento de la identidad de género en la jurisprudencia de Córdoba Martín D. E. Bertolotti* Resumen: En 2009, MV demandó judicialmente el reconocimiento de su identidad de género autopercibida. En 2011 un tribunal de Córdoba, luego de testimonios y una serie de pericias de todo tipo, hizo lugar a su derecho. Esto fue solo el comienzo de un largo proceso, que llevaría hasta 2018, para lograr el acceso de MV a derechos básicos como la justicia, la salud o la identidad, aun con una sentencia favorable y con una nueva ley de identidad de género vigente. El presente trabajo aborda en una primera parte los diferentes paradigmas o modelos de gestión legal del reconocimiento de la identidad de género: modelo patologizador, modelo de derechos humanos y modelo mixto. Luego, se enfoca en el marco normativo argentino posterior a la sanción de la Ley de Identidad de Género que receptó el modelo de derechos humanos. En la segunda parte, se analiza el caso de MV resuelto en 2011, antes de la Ley de Identidad de Género, y que constituye un ejemplo del paradigma patologizador. Asimismo, se analiza la ejecución de sentencia de ese fallo donde se evidencian prácticas del modelo patologizador aun cuando la nueva ley ya estaba vigente. Palabras claves: Identidad de género, Modelo patologizador, Modelo de derechos humanos, Ley 26.743, Prácticas institucionales Abstract: In 2009, MV sued in court for recognition of his self-perceived gender identity. In 2011, a court in Córdoba, after testimonies and a series of expert opinions of all kinds, made room for his right. This was just the beginning of a long process that would take until 2018, to achieve MV access to basic rights such as justice, health or identity, even with a favorable sentence and with a new gender identity law in force. This paper addresses in a first part the different paradigms or models of legal management of the recognition of gender identity: pathologizing model, human rights model and mixed model. It focuses on the Argentine regulatory framework after the enactment of the gender identity law that receives the human rights model. In the second part, the case of MV resolved in 2011, before the gender identity law, is analyzed. This case is an example of the pathologizing paradigm. Likewise, the execution of the sentence of that ruling is analyzed, which shows that the pathologizing practices prevailed over the enactment of the new regulation. Keywords: Gender identity, Pathologizing model, Human rights model, 26,743 Act, Institutional practices _______________________ * El autor agradece a María Alejandra Reinatto, Marisa Fassi, Wilfrido Pérez y a todo el equipo de la Oficina de Derechos Humanos y Justicia del Poder Judicial de la Provincia de Córdoba por su apoyo y colaboración en la producción de este trabajo. Doctorando en Ciencia Política (Université du Québec à Montréal), Magister en Relaciones Internacionales (Centro de Estudios Avanzados. Universidad Nacional de Córdoba [UNC]). Abogado (UNC). Adscripto a la cátedra C Derecho Internacional Público (UNC). Investigador Junior en Équipe de recherche sur l’inclusion et la gouvernance en Amérique Latine ERIGAL. Pasante de Investigación Chaire de recherche sur la diversité sexuelle et la pluralité des genres (Université du Québec à Montréal). Auxiliar en la Oficina de Derechos Humanos y Justicia del Poder Judicial de Córdoba. Integrante del equipo de investigación AJuV (Poder Judicial de la Provincia de Córdoba). Correo: mbertolotti@justiciacordoba.gob.ar bertolotti.martin@courrier.uqam.ca ORCID 0009-0001-2738-0424 155 Es de esperar que, con el tiempo y el avance de los conocimientos científicos, más la humanización de la ciencia y de la sociedad, no se llegue a estos extremos, que una persona tenga que soportar tanto y tantos años para lograr una reivindicación tan justa y humana. Extracto de la pericia médica (Sentencia 482, 2011, p. 28) Introducción La frase que titula este artículo se encuentra en la página 30 de la Sentencia 482 del año 2011 en autos “MDCV - Ordinario - Otros - Expte.: 1679035/36”, dictada luego de la producción de informes psicológicos, testimoniales, una pericia médica, una pericia psiquiátrica y una pericia psicológica entre otros medios de prueba. Esta fue la realidad que tuvo que enfrentar MV para lograr el reconocimiento y rectificación de su identidad. El caso que se analiza en este artículo es revelador por varias razones, pero principalmente por su ubicación temporal. El procedimiento ante la justicia civil y comercial iniciado en mayo de 2009 obtuvo sentencia en septiembre de 2011, es decir antes de la sanción de la Ley de Identidad de Género 26.743 (9 de mayo de 2012), la que, como se abordará, hubiera evitado la judicialización de la situación. Por otra parte, la ejecución de la sentencia obtenida se extendió hasta 2018, es decir con la Ley de Identidad de Género ya vigente. No obstante, la sanción de la ley no evitó una multitud de prácticas patologizantes que MV debió enfrentar para tener un efectivo acceso a justicia y a otros derechos básicos. Los objetivos de este trabajo son, por un lado, explicar los diferentes paradigmas o modelos de gestión legal para el reconocimiento del derecho a la identidad de género, y en particular el modelo seguido por la legislación argentina. Asimismo, mediante el análisis del caso mencionado previamente, se buscará mostrar la aplicación del paradigma patologizador por parte de la justicia de Córdoba antes de la sanción de la Ley de Identidad de Género 26.743, y demostrar cómo las prácticas institucionales patologizadoras perpetuaron este modelo aún después de la sanción de la ley, restringiendo el acceso a justicia y a otros derechos de las personas trans, como un ejemplo de lo que Georgina Waylen (2014) llama el aspecto informal de las instituciones. Para la elaboración de este trabajo, en primer lugar, se realizó una revisión de literatura y un análisis de la normativa nacional y comparada. Posteriormente se tomó el fallo que resolvió en 2011 el caso de MV y se extrajeron los argumentos que integraron el razonamiento del tribunal, los que fueron analizados en base a los diferentes paradigmas o modelos de gestión legal del reconocimiento de la identidad de género previamente identificados. Finalmente, para poder analizar las prácticas institucionales posteriores a la resolución judicial se realizó un análisis documental del expediente llevado adelante por la Oficina de Derechos Humanos y Justicia del Poder Judicial de Córdoba para la ejecución de sentencia, y asimismo se realizó una entrevista semidirigida a la encargada de este caso en la oficina mencionada. El artículo se divide en dos partes para su mejor comprensión. La primera está destinada a la explicación de los modelos de gestión legal para el reconocimiento del 156 derecho a la identidad de género y el marco normativo argentino. La segunda parte aborda el caso MDCV – Ordinario – Otros – Expte.: 1679035/36 divido en dos momentos. Primero el procedimiento judicial hasta la sentencia y luego el proceso de ejecución de sentencia o de efectivización de derechos. PRIMERA PARTE A. Paradigmas o modelos para el reconocimiento de la identidad de género Como bien señala Emiliano Litardo (2018), a nivel internacional existen al menos tres modelos de gestión legal para el reconocimiento del derecho a la identidad de género: el modelo patologizador, el modelo de derechos humanos y el modelo intermedio o mixto. El modelo patologizador se sostiene en una concepción binaria del género (varón-mujer) en la cual existen cuerpos sexuados, cuyo sexo se asigna al momento del nacimiento en base a criterios médicos principalmente sobre los genitales externos. En este sistema determinista, a una persona con una cierta genitalidad se le asigna un sexo y se espera que se identifique y comporte en base a normas sociales de género esperadas para ese sexo. Por lo tanto, todas aquellas identidades y corporalidades que no se encuadren en esta predeterminación serán consideradas patológicas. Así, serán, en primer lugar, sometidas a pruebas médicas, psicológicas y psiquiátricas para demostrar su existencia y, en segundo lugar, sometidas a la tutela del sistema judicial que autorizará el “reajuste” o la “corrección” de la identidad legalmente reconocida de la persona o de su corporalidad. Este modelo puede estar positivizado en una ley, como por ejemplo la ley española de 2007.1 Dicha ley, en su artículo 4, establecía como requisitos el diagnostico de disforia de género mediante informe de médico o psicólogo clínico y un tratamiento médico durante al menos dos años para acomodar las características físicas de la persona a las correspondientes al sexo reclamado. Asimismo, la ausencia de legislación lleva generalmente a la aplicación de este modelo, como era la situación en Argentina hasta el año 2012, lo que se ilustrará más adelante mediante el caso de MV. El modelo de derechos humanos, en cambio, se funda en la autopercepción de la identidad de género, la autonomía de la voluntad y el derecho al libre desarrollo de la personalidad. En este modelo, el género es una cuestión declarativa y no es un atributo de un cuerpo sexuado. El libre desarrollo de la personalidad nos habla de la posibilidad de cada persona de elegir su propio plan de vida y de la ausencia de injerencia externa en este. Este modelo reconoce por lo tanto que existe una amplia diversidad de géneros y que ninguna identidad es patológica. Por todo esto, rechaza el sometimiento de la persona a toda prueba psicológica, psiquiátrica o médica de cualquier tipo. Es importante remarcar que este modelo no solo no requiere de las pruebas mencionadas, sino que tampoco obliga a la persona a someterse a cirugías o 1 Esta ley de 2007 fue remplazada por la Ley 4/2023, del 28 de febrero de 2023, para la igualdad real y efectiva de las personas trans y para la garantía de los derechos de las personas LGTBI. Con la nueva ley, España adoptó un modelo de derechos humanos de gestión legal para el reconocimiento del derecho a la identidad de género. 157 tratamientos médicos para el reconocimiento de su identidad de género. Así, este modelo armoniza el derecho a la identidad de la persona con el goce de otros derechos como la vida privada y la integridad. Así lo ha entendido la Corte Interamericana de Derechos Humanos en la Opinión Consultiva 24/17: el procedimiento de solicitud de cambio de nombre, adecuación de la imagen y rectificación de la referencia al sexo o género, en los registros y documentos de identidad, no podrá requerir que se lleven a cabo intervenciones quirúrgicas totales o parciales ni terapias hormonales, esterilizaciones o modificaciones corporales para sustentar el requerimiento, para otorgar lo solicitado o para probar la identidad de género que motiva dicho procedimiento, por cuanto podría ser contrario al derecho a la integridad personal contenido en el artículo 5.1 y 5.2 de la Convención Americana. En efecto, someter el reconocimiento de la identidad de género de una persona trans a una operación quirúrgica o a un tratamiento de esterilización que no desea, implicaría condicionar el pleno ejercicio de varios derechos, entre ellos, a la vida privada (artículo 11.2 de la Convención), a escoger libremente las opciones y circunstancias que le dan sentido a su existencia (artículo 7 de la Convención), y conllevaría a la renuncia del goce pleno y efectivo de su derecho a la integridad personal. (OC 24/17 Corte IDH, párrafo 146) Un tercer modelo es el llamado modelo mixto. La legislación de Ecuador (Ley orgánica de gestión de la identidad y datos civiles de 2015), de Uruguay (Ley 18.620 “Regulación del derecho a la identidad de género, cambio de nombre y sexo registral” de 2009) y de Chile (Ley 21.120 “Reconoce y da protección al derecho a la identidad de género” de 2018) son ejemplos de este modelo. Las legislaciones mencionadas de Uruguay y Ecuador reconocen la autopercepción del género, pero agravan los requisitos estableciendo procedimientos judiciales, exigiendo la permanencia y estabilidad de dos años en la identidad autopercibida y pruebas testimoniales de tal vivencia (Litardo, 2018). En 2018, Uruguay sancionó la Ley Integral para Personas Trans 19.684, mediante la cual se optó –entre otras medidas favorables– por un procedimiento administrativo, y se dejó de exigir un informe técnico de un equipo multidisciplinario y especializado en identidad de género y diversidad, así como también se eliminó el requisito de presentar testigos. Con esta modificación a la norma el país se encuadra en el modelo de derechos humanos. La ley chilena de 2018, si bien reconoce la autodeterminación del género, restringe el concepto de identidad de género a “la convicción personal e interna de ser hombre o mujer, tal como la persona se percibe a sí misma, la cual puede corresponder o no con el sexo y nombre verificados en el acta de inscripción del nacimiento (cursivas agregadas)” (Ley 21.120, art. 1, párr. 2). Establece que nunca podrán exigirse tratamientos médicos o cirugías, pero solicita la declaración de dos testigos. Para el caso de personas menores de edad establece un procedimiento judicial en el cual está prevista expresamente una serie de informes psicológicos y psicosociales. La ley 158 establecía que las personas casadas debían realizar el trámite de manera judicial y su aprobación disolvía el vínculo matrimonial. Esta diferenciación para las personas casadas fue modificada en 2021 con la sanción de la Ley 21.400 de matrimonio entre personas del mismo sexo. B. La Ley 26.743 de identidad de género Hasta 2012 no existía en Argentina ninguna disposición legal que permitiera la modificación del género en los registros o en la documentación personal, ni el acceso a tratamientos médicos de ningún tipo para la adecuación del cuerpo a la identidad autopercibida. El modelo patologizador se desarrollaba mediante la jurisprudencia de los tribunales, mientras que las disposiciones normativas existentes eran criminalizadoras, como los códigos de faltas,2 o prohibitivas, como la ley de ejercicio de la medicina. La Ley 17.132 de ejercicio de la medicina, en su art. 19 inc. 4, expresamente prohibía “llevar a cabo intervenciones quirúrgicas que modifiquen el sexo del enfermo, salvo que sean efectuadas con posterioridad a una autorización judicial (cursivas agregadas)”. Como lo señala Mauro Cabral (2003), la dificultad para obtener autorizaciones judiciales para realizarse cirugías destinadas a modificar los genitales y la ausencia de servicios especializados en cirugías de reconstrucción genital en Argentina llevaban a muchas personas trans a migrar a Chile para acceder a estas. Anahí Farji Neer (2015) señala que a partir de 1995 se presentaron diferentes proyectos de ley para regular los procesos de cambio de nombre y sexo legal, pero que ninguno fue discutido hasta 2011. La autora atribuye el tratamiento de la ley a una reconfiguración en el vínculo entre el Estado y los colectivos sexo-políticos locales y la sanción previa de la Ley 26.618 de “matrimonio igualitario” en 2010. La Ley de Identidad de Género 26.743, sancionada el 9 de mayo de 2012, reconoce que toda persona tiene derecho al reconocimiento de su identidad de género, al libre desarrollo de su personalidad conforme a su identidad de género y a ser tratada de acuerdo con su identidad de género y, en particular, a ser identificada de ese modo en los instrumentos que acreditan su identidad (nombre de pila, imagen y sexo registrado). La propia ley brinda un concepto amplio de identidad de género, la que se entiende como la vivencia interna e individual del género tal como cada persona la siente, que puede corresponder o no con el sexo asignado al momento del nacimiento, incluyendo la vivencia personal del cuerpo (Ley 26.743, art. 2). La identidad de género, a diferencia de lo que ocurre, por ejemplo, en la ley chilena ya mencionada, no se circunscribe al binomio varón-mujer. Asimismo, la ley establece un procedimiento administrativo ante el Registro Nacional de las Personas basado en la mera declaración de la persona interesada y expresamente establece que en ningún caso será requisito 2 Los códigos de faltas provinciales persiguieron a las personas trans de manera explícita hasta bien entrados los años 2000. Asimismo, según la Federación Argentina LGBT hay también artículos de códigos contravencionales “menos explícitos” que realizan alusiones indirectas o contienen figuras que son utilizadas para perseguir y detener a gays, lesbianas, bisexuales y personas trans (Federación Argentina LGBT, 2008). En Córdoba, la discriminación más flagrante de los códigos de faltas todavía acarrea problemas para las personas trans, como fue el caso de detención de la activista trans Ivanna Aguilera en abril de 2021 por parte de la Policía de Córdoba por una orden de captura del año 1988 en virtud del art 19 del entonces código de faltas por “no llevar vestimenta acorde al género”. Si bien ese artículo fue derogado en 1994, la orden de captura seguía vigente (Pizzarro, 2021). 159 acreditar intervención quirúrgica por reasignación genital total o parcial, ni acreditar terapias hormonales u otro tratamiento psicológico o médico (art. 4). Es decir, la ley se enmarca expresamente en el modelo de derechos humanos. Eleonora Lamm se refiere de la siguiente manera: Esta ley significó el paso del paradigma médico psiquiátrico al de los derechos humanos, de modo que esta ley, la más liberal del globo y ejemplo a nivel mundial, se funda en dos decisiones de política legislativa centrales: 1) se permite el cambio de género en el registro civil sin necesidad de acreditar ningún requisito, expresamente se manifiesta la no necesidad previa de modificación corporal alguna ni certificación de ningún tipo y 2) la autoridad pública que interviene es administrativa (registro civil) y no judicial. Se trata de dos consideraciones claves para poner fin a la patologización y estigmatización. (Lamm, 2018, p. 238) La ley establece que el registro civil de la jurisdicción donde fue asentada el acta de nacimiento deberá emitir una nueva partida con los cambios realizados. Para garantizar la confidencialidad del trámite, y evitar eventuales tratos discriminatorios, en la nueva partida no puede haber ninguna alusión a que hubo un cambio en virtud de la identidad de género y el acta original solo será accesible para la persona titular y quienes tengan su expresa autorización de esta o de autoridad judicial. El nuevo DNI mantendrá el número original. La ley garantiza también el acceso a intervenciones quirúrgicas totales y parciales y/o tratamientos integrales hormonales de adecuación corporal, sin necesidad de requerir autorización judicial o administrativa, y expresamente deroga el ya mencionado art. 19 inc. 4 de la ley de ejercicio de la medicina. Para el acceso a los tratamientos integrales hormonales, no será necesario acreditar la voluntad en la intervención quirúrgica de reasignación genital total o parcial, bastando el consentimiento informado. La ley también trajo una solución al debate sobre el acceso a los tratamientos y cirugías en base a criterios diagnósticos. La American Psychiatric Association en las diferentes versiones de su Manual diagnóstico y estadístico de los trastornos mentales (conocido como DSM, por su sigla en inglés) fue modificando la manera de abordar la situación de las personas trans. En su versión más primitiva el manual hablaba de “transexualismo” como un “trastorno de la identidad de género”. En la versión actual del manual (quinta edición, 2014) se aborda como “disforia de género”, poniendo el foco no en la identidad sino en la angustia que la persona puede sentir cuando su identidad no corresponde con el sexo asignado al nacer. Por su parte, la Clasificación Internacional de Enfermedades de la Organización Mundial de la Salud en su onceava edición ha eliminado de la lista de trastornos mentales a la transexualidad y al travestismo, aunque ha creado el diagnóstico de discordancia de género dentro de la categoría “condiciones relacionadas con la salud sexual”. Mantener estos diagnósticos continúa siendo patologizar la identidad de género y existen hoy diferentes campañas 160 que buscan erradicarlos finalmente.3 Uno de los argumentos utilizados para mantener estas figuras es que ello permite que cirugías y tratamientos sean cubiertos por el sistema de salud. La técnica legislativa de la Ley 26.743 resuelve este debate al incluir estas prestaciones expresamente en el Plan Médico Obligatorio (Ley 26.743, art. 11), no solo sobre la base del derecho a la salud (entendido de manera integral), sino también sobre la base del libre desarrollo de la personalidad. Asimismo, la ley establece que el nombre de pila y el género autopercibido deben ser utilizados al solo requerimiento de la persona interesada, aun cuando el cambio registral no se haya realizado formalmente; mostrando que la rectificación registral no tiene un carácter constitutivo. C. Reconocimiento de la identidad de género de niñas, niños y adolescentes La Ley de Identidad de Género establece que la solicitud de cambio registral, de nombre y de imagen debe ser realizada a través de los representantes legales de la persona menor de edad y con el expreso consentimiento de esta. Se deberán tener en cuenta los principios de capacidad progresiva e interés superior. Asimismo, establece que el trámite será siempre administrativo, salvo cuando: • Se niegue o sea imposible obtener el consentimiento de representantes legales. En cuyo caso se debe recurrir vía sumarísima a la justicia (art. 5). • En los casos de intervenciones quirúrgicas a personas menores de edad se necesita autorización judicial, esta deberá expedirse en un plazo no mayor a 60 días desde la solicitud (art. 11). Sin embargo, tres años después de la sanción de la Ley 26.743, Argentina sancionó un nuevo Código Civil y Comercial (CCyC) lo que hace necesario armonizar ambas normas. El art. 26 del CCyC establece que se presume que adolescentes entre 13 y 16 años tienen aptitud para decidir por sí respecto de aquellos tratamientos que no resultan invasivos, ni comprometen su estado de salud o provoquen un riesgo grave en su vida o integridad física. Cuando esos tratamientos no tienen estas características deben prestar el consentimiento informado con la asistencia de sus progenitores. A partir de los 16 años las personas adolescentes son consideradas como adultas para las decisiones atinentes al cuidado de su cuerpo. En el año 2015, la Secretaría de Salud Comunitaria del Ministerio de Salud emitió la Res. 65/2015 justamente sobre esta armonización. En primer lugar, la resolución establece que todas las prácticas previstas en la Ley de Identidad de Género deben entenderse como constitutivas del cuidado del propio cuerpo. De la resolución puede extraerse que, para las personas menores de 13 años de edad, debe seguirse lo dispuesto por la Ley de Identidad de Género, es decir toda solicitud debe ser realizada a través de representantes legales y con el expreso consentimiento de la persona menor de edad. El trámite será siempre administrativo, salvo cuando se niegue o sea imposible obtener el consentimiento de representantes legales o cuando se trate de intervenciones quirúrgicas. 3 Como por ejemplo de la campaña Stop Trans Pathologization creada en España en el año 2007 (Farji Neer, 2015, p. 363). 161 Para las personas de entre 13 y 16 años de edad, la regla varía según el tipo de intervención. Las prácticas no invasivas podrán solicitarse por sí mismas, mientras las prácticas como intervenciones quirúrgicas deberán solicitarse únicamente con la asistencia de personas que ejerzan el rol de cuidado y acompañen el proceso. Las personas a partir de los 16 años son consideradas como adultas (art. 26 CCyC), por lo cual para la realización de trámites y prácticas (tratamientos y cirugías) relativas a la identidad de género deben cumplir solamente los requisitos previstos para las personas adultas. D. Ampliación del reconocimiento de la identidad de género después de la Ley 26.743 Según datos del Registro Nacional de las Personas (RENAPER), hasta el 31 de marzo de 2022 unas 12.655 personas habían rectificado su información registral en base a su identidad de género (RENAPER, 2022). Si bien, como se mencionó anteriormente, la Ley 26.743 no se circunscribe al binomio varón-mujer. Hasta julio de 2021, en la práctica el sistema siguió siendo binario. Una persona podía corregir sus documentos y rectificar su partida de nacimiento conforme a su autopercepción, pero el RENAPER reconocía como únicas opciones los marcadores de sexo masculino y femenino, lo que distaba de ser la vivencia del género tal como cada persona la siente. En 2018, la Dirección de Registro Civil de la Provincia de Mendoza mediante la Resolución 420/2018 en base al artículo 2 de la Ley 26.743 hizo lugar, luego de un dictamen de la Subdirección de Derechos Humanos de la Corte Suprema de Justicia de Mendoza, a la solicitud de dos personas que requirieron el reconocimiento legal de su identidad de género autopercibida y la correspondiente rectificación registral, y solicitaron de manera expresa que en su partida de nacimiento no se consigne sexo alguno (Gobierno de Mendoza, 2018; De la Rosa, 2021). En 2019, un fallo del Juzgado de Familia y Minoridad de Tierra del Fuego, a cargo del juez Alejandro Ferreto, resolvió el amparo de S.L.S.B. reconociendo su identidad “no binario-igualitario”. La medida se extendió también al hijo de S.L.S.B. ya que el juez ordenó rectificar el acta de nacimiento de este para que en el campo destinado a sus progenitores se reemplace por el nombre actual de S.L.S.B. (Arias, 2019). En 2020, por vía administrativa en la provincia de Misiones, L.L. logró el reconocimiento de su identidad no binaria y el otorgamiento de una nueva partida de nacimiento rectificada. Según la Asociación Todes con DNI, avances como estos se dieron en diferentes provincias de Argentina (Ojeda, 2020). En 2019, el Juzgado Nacional en lo Civil N.º 7 a cargo de la jueza Myriam Cataldi ordenó la rectificación registral de Lara Bertolini reconociendo su identidad de género como “feminidad travesti”. Sin embargo, el juzgamiento fue revertido por la Sala G de la Cámara Nacional de Apelaciones (Agencia Presentes, 2019). El fallo de primera instancia no solo reconoció el avance de derechos en la materia sino también el dinamismo conceptual: Ahora bien, no podemos dejar de resaltar que la Ley 26.743 se sancionó en el año 2012, es decir con anterioridad a la entrada en vigencia del Código Civil y Comercial de la Nación 162 (CCyC) en el 2015, y desde entonces, afortunadamente, mucha agua ha pasado bajo el puente y mucho se ha avanzado en el reconocimiento de derechos. El camino en este campo se fue abriendo progresivamente, reflejándose en la evolución de ciertos conceptos, -como veremos más adelante- los que fueron interpretados ampliamente en el reciente caso del Registro Provincial de Mendoza, en su Resolución Nro. 420, que marcó, sin dudas, la ruptura de la concepción binaria del género. (Bertolini, Lara María c/ Ministerio del Interior OP y V s/Información Sumaria, 2019, p. 4) Algunos organismos también reconocieron mediante resoluciones administrativas designaciones no binarias en términos de sexo/género, como por ejemplo la Resolución General Conjunta 5007/2021 AFIP y ANSES que establece que para los numero de CUIL y otros se utilizara 20, 23, 24 o 27 de forma aleatoria, genérica y no binaria en términos de sexo/género. Este camino condujo a que finalmente en julio de 2021 a partir del Decreto Presidencial N.º 476/21 se permitiera al RENAPER a emitir documentos con el marcador de sexo: X. Artículo 2º.- Determínase que las nomenclaturas a utilizarse en los Documentos Nacionales de Identidad y en los Pasaportes Ordinarios para argentinos en el campo referido al “sexo” podrán ser “F” -Femenino-, “M” - Masculino- o “X”. Esta última se consignará, de conformidad con lo establecido en el artículo 4° del presente decreto, en aquellos supuestos de personas nacionales cuyas partidas de nacimiento sean rectificadas en el marco de la Ley N° 26.743, cualquiera sea la opción consignada en la categoría “sexo”, siempre que no sea “F” -Femenino- o “M” -Masculino-, o bien si el “sexo” no se hubiere consignado (Dto. 476/21, art. 2) Artículo 4º.- A los fines del presente decreto, la nomenclatura “X” en el campo “sexo” comprenderá las siguientes acepciones: no binaria, indeterminada, no especificada, indefinida, no informada, autopercibida, no consignada; u otra acepción con la que pudiera identificarse la persona que no se sienta comprendida en el binomio masculino/femenino (Dto. 476/21, art. 4) El Decreto 476/21 integra y completa a la Ley de Identidad de Género 26.743. Sin embargo, existen críticas sobre la utilización de la X en DNI y pasaportes, atento a que esta no representa acabadamente el abanico de posibilidades identitarias y sigue jerarquizando el binomio masculino (M) femenino (F). El decreto reconoce la posibilidad de optar en los documentos de identificación personal por “F” –Femenino–, “M” –Masculino– o “X”. De esta manera, crea estas categorías rígidas en la que la X abarca diferentes identidades que no quedan representadas en igualdad de condiciones que F y M. Algunas organizaciones 4 4 Como por ejemplo la organización Todes con DNI: todescondni.com 163 propusieron formas más igualitarias para reconocer del abanico de identidades, como por ejemplo colocar un campo abierto a completar con la palabra más acorde a la identidad propia. Asimismo, el propio decreto señala que la X es para las personas que “no se sienta[n]comprendida[s] en el binomio masculino/femenino” por lo cual es una categoría residual a este binomio. Finalmente, cabe decir que tanto la Ley 26.743 como el Decreto 476/21 reconocen la posibilidad del cambio de las partidas de nacimiento y de los documentos de identidad, pero no reconocen la posibilidad de que las personas recién nacidas sean inscriptas con una opción diferente al femenino o masculino, por lo cual en la práctica “M o F” seguirá siendo la regla y “X” la excepción. SEGUNDA PARTE A. Caso MDCV: el proceso judicial 2009-2011 El 26 de mayo de 2009, MV, una persona de sesenta y dos años a la que se le había asignado el sexo femenino al momento de nacer, interpuso una demanda ante un juzgado de primera instancia con competencia en lo civil y comercial de la ciudad de Córdoba. El objeto de la demanda según surge de la relación de la causa era “que se autorice la intervención quirúrgica para adecuar órganos genitales; se modifique la partida de nacimiento con cambio de nombre de pila y sexo; se expida un nuevo DNI que acredite su condición de varón” (Sentencia 482, 2011, p. 2). El relato de MV está cargado de diferentes procesos de exclusión. Entre ellos destacan problemas de conducta al inicio de la etapa escolar fundados en su rechazo a la vestimenta y normas de comportamiento pensadas para un género que no era el propio, el abandono de la escuela secundaria “porque no soportaba más la situación de vestirse como no lo sentía” y la exclusión laboral por no poder tener nunca un trabajo formal al no poder presentar documentación con su nombre y género autopercibido. En la relación de los hechos, el actor manifestó haber visitado desde niño a diferentes profesionales médicos y psicólogos e incluso que a la edad de 14 años uno de estos le recomendó operarse y solicitar el cambio de DNI. La postura tomada por el tribunal fue que el actor debía demostrar que era una persona trans. Su declaración no era suficiente. El relato de su vivencia no era suficiente. Incluso su apariencia, la que parecía suficiente para los peritos médicos, tampoco bastaba. Por lo tanto, el tribunal se valió de una serie de medios probatorios. En primer lugar, un informe aportado por el actor de un psicoterapeuta especializado en sexología clínica. Luego, tres informes periciales oficiales: una pericia médica, una pericia psiquiátrica y una pericia psicológica. Finalmente, declaraciones testimoniales. Las pruebas médicas apuntaban a confirmar un diagnóstico patológico. Por su parte, la prueba testimonial buscaba demostrar una cierta permanencia en el tiempo, confirmar una idea de perdurabilidad e irreversibilidad. La importancia de la prueba era categórica para el tribunal, el que escribe “de la prueba incorporada a la causa, tenemos que estamos en presencia de una persona transexual” (Sentencia 482, 2011, p. 30) 164 Entre los razonamientos expuestos por el tribunal sobresale el determinismo biológico, la diagnosis, la irreversibilidad, el sufrimiento y el derecho a la vida y la salud. Determinismo biológico: el tribunal considera necesario en primer lugar definir “al transexual”. Para ello, toma una definición de Carlos Fernández Sessarego según la cual una persona trans es aquella que “no obstante pertenecer biológicamente y desde su nacimiento a un sexo, con el que aparece inscripto en el registro civil, siente y vive como si fuera del sexo opuesto” (Sentencia 482, 2011, p. 30). De la definición surge, en primer lugar, el determinismo biológico. La persona pertenece a un determinado sexo como una realidad incuestionable. No se menciona que es una mirada externa (médica) basada en la genitalidad la que asigna un cierto sexo a la persona. En segundo lugar, la persona “siente y vive como si fuera del “sexo opuesto”. Lo que da la idea de que no solo existe un determinismo biológico, sino que ese determinismo es binario, un sexo opuesto al otro, en este caso mujer-varón. Diagnosis: “de los informes periciales, surge que el diagnóstico del solicitante es transexual. Dicho diagnóstico es categórico” (Sentencia 482, 2011, p. 31). Es decir, según el tribunal la persona tiene una condición patológica, la que una vez diagnosticada permitirá de alguna manera curarla. Este análisis deductivo queda explicitado en otro pasaje de la sentencia: “además, sin duda que la intervención quirúrgica permitirá al peticionante lograr un equilibrio entre soma y psiquis, permitiéndole, gozar de una vida sexual y de relación, lo más normal posible” (Sentencia 482, 2011, p. 32). Así, el tribunal autoriza la intervención quirúrgica para curar esta patología y permitirle al peticionante una “vida normal”. Como se mencionó en la primera parte de este artículo, el modelo patologizador conjuga el discurso médico (diagnóstico) con el discurso jurídico (autorización judicial). Algunos de los diagnósticos receptados en la sentencia, provenientes de las múltiples pruebas médicas son: • Informe de especialista en sexología clínica: “De dicho informe surge que, [el especialista] ha evaluado a MDCV, luego de varias entrevistas, determinando el diagnóstico del mismo en disforia de género. Asimismo, realiza el marco conceptual de disforia de género, estableciendo que son sinónimos de transexualismo, transgenerismo, síndrome Harry Benjamín” (Sentencia 482, 2011, pp. 23-24). • Pericia médica: “La impresión clínica que se recoge durante toda la entrevista y en el examen pericial, es de que los genitales externos que presenta el actor no coinciden con su condición antropológica masculina” (Sentencia 482, 2011, p. 27). • Pericia psiquiátrica “El examinado padece de un síndrome transexual, pertenece a un género o identidad sexual masculino” (Sentencia 482, 2011, p. 28). Irreversibilidad: en el informe emitido por el psicoterapeuta del actor puede leerse “la transexualidad es el sentimiento irreversible de pertenecer al sexo contrario al legalmente establecido” (Sentencia 482, 2011, p. 24). Asimismo, en la causa se receptaron dos testimonios. El primero de una familiar del actor que dijo conocerlo desde que nació y el segundo del psicoterapeuta que trató al actor previamente al inicio del procedimiento judicial. El primer testimonio se orientó a demostrar que el actor desde niño siempre se identificó con todo lo asociado al género masculino (ropa, 165 juegos, etc.). En la transcripción del segundo testimonio se advierte una pregunta del tribunal sobre la posibilidad de reversión de la identidad del actor, a lo que el testigo especialista respondió “habiéndose adquirido la constancia de identidad genérica no hay hasta el momento ninguna posibilidad de que pueda revertirse”. Previamente el testigo había afirmado que la identidad de género se comienza a construir alrededor del año y medio de edad y que una vez construido “se cierra a cal y canto” (Sentencia 482, 2011, p. 26). El perito psiquiatra luego de diagnosticar “síndrome transexual” refirió que las características psíquicas asociadas a este son irreversibles y que no existe la posibilidad de que el actor pueda vivir de otro modo y que su decisión no responde a un impulso sino a algo “sostenido y anhelado desde hace muchos años” (Sentencia 482, 2011, p. 29). Sufrimiento: un razonamiento que surge en diferentes oportunidades a lo largo del fallo es que las personas trans sufren por estar “atrapadas en un cuerpo equivocado”. No solamente este razonamiento va de la mano con los ya nombrados, en cuanto la consideración de tratamientos médicos y cirugías como una forma de “corregir” el cuerpo o “curar” una patología. Sino que, además, se asocia de una manera determinante la identidad con la corporalidad. Al margen de que en el caso concreto el actor solicitaba la realización de intervenciones quirúrgicas, el marco conceptual general elimina cualquier posibilidad de que una persona pueda tener una identidad masculina sin modificar su corporalidad. Las cirugías son necesarias para “liberar” a la persona de ese cuerpo que le es ajeno. Así, nuevamente se vuelve al determinismo: identidad masculina = pene y no mamas (necesita hormonas, faloplastia, mastectomía); identidad femenina = vagina y mamas (necesita hormonas, vaginoplastia, mamoplastia). Esto se ejemplifica con el siguiente extracto: La transexualidad, ha sido descripta por Matilde Zavala de González, como aquella en la que se perciben atrapadas en un cuerpo que no sienten como propio […] Estamos en definitiva ante una persona que se encuentra atrapada en un cuerpo que tiene un sexo distinto al que siente, el cual rechaza (Sentencia 482, 2011, p. 31). Derecho a la vida y a la salud: tratar a la persona trans como alguien que sufre, que está atrapada en cuerpo extraño, que su identidad es por lo tanto patologizada y que necesita del sistema judicial y del sistema médico para poder corregir esta situación y lograr una vida “lo más normal posible” lleva a que el fundamento central del fallo descanse sobre el derecho a la salud, el cual relaciona íntimamente con el derecho a la vida. El derecho a la preservación a la salud, comprendido, como se dijo dentro del derecho a la vida, debe ser garantizado en forma impostergable por la autoridad pública con acciones positivas, sin perjuicio de las obligaciones que deban asumir en su cumplimiento las jurisdicciones locales, las obras sociales o las entidades de la llamada medicina prepaga. (Sentencia 482, 2011, p. 20). 166 El tribunal al abordar el derecho a la salud como fundamento del fallo entendió que este se completa con otras garantías como la intimidad personal, la propia imagen y la dignidad personal. Asimismo, aun fundándose en criterios médicos ya mencionados, reconoce que “el derecho a la identidad de género y orientación sexual” involucra una serie de derechos fundamentales. Además, existen otras garantías constitucionales que coadyuvan y completan el derecho a la salud en su más amplia significación como el art. 33 CN que protege el derecho a la intimidad personal y a la propia imagen (art. 19 CN), así como a la dignidad personal (ar. 33 CN). Si bien como hemos analizado no existe una normativa precisa para el caso, hemos visto que el derecho a la identidad de género y orientación sexual, por su contenido personalísimo, involucra toda una serie de derechos fundamentales como se dijo, el derecho a la dignidad personal, a la libertad, a la personalidad, a la no discriminación, a la vida privada, a la salud, a trabajar, al proyecto de vida, a una adecuada calidad de vida etc. (Sentencia 482, 2011, p. 22). El procedimiento judicial finalizó mediante la Sentencia 482 de fecha 16 de septiembre de 2011. El objeto de este análisis no es hacer un juicio de valor del fallo del Tribunal Civil y Comercial, sino exponer la materialización del modelo patologizador en la jurisprudencia. Lo resuelto por el fallo en el caso concreto fue favorable al actor e hizo lugar a todas sus legítimas pretensiones. Al momento de fallar el tribunal hizo una revisión de los diferentes procesos de exclusión (escolar, laboral, familiar, social) vividos por el actor, y en una suerte de reivindicación de la voluntad de este, agrega que “el peticionante es consciente de los efectos que la cirugía le provocará y ha elegido libremente este camino. Por lo tanto, en base a la decisión adoptada por el actor, el derecho no puede dejar de darle una respuesta favorable a su pretensión” (Sentencia 482, 2011, p. 34). El tribunal autorizó la intervención quirúrgica. Ordenó inmovilizar el acta de nacimiento original y emitir una nueva partida y un nuevo DNI. Si bien ordenó al registro civil abstenerse de expedir el acta inmovilizada, hizo una excepción para casos de matrimonio y adopción. En esos casos, el Registro debía informar fehacientemente a la futura persona contrayente de la situación del actor –lo que recuerda a lo mencionado previamente sobre la ley de identidad de género chilena– y al juez o autoridad competente en casos de adopción. La Ley de Identidad de Género 26.743 expresamente recepta la confidencialidad sobre la rectificación registral (art. 6 y 9), lo mismo ha receptado, por ejemplo, la nueva ley española de 2023. La Corte Interamericana de Derechos Humanos ha seguido la misma tesitura en la OC-24/17 sosteniendo que la publicidad no deseada sobre un cambio de identidad de género puede poner a la persona en una situación de mayor vulnerabilidad a diversos actos de discriminación en su contra, en su honor o en su reputación y puede ser un obstáculo para el ejercicio de otros derechos humanos (párr. 135). Los tres ejemplos forman parte del modelo o paradigma de derechos humanos. 167 Ahora bien, en el fallo que estudiamos vemos que se adopta un modelo mixto. Por regla general, el tribunal resolvió que el registro civil debe abstenerse de expedir el acta de nacimiento original, pero ha hecho dos excepciones: matrimonios y adopciones donde el mismo registro civil (no dice a pedido de parte) deberá informar fehacientemente a la persona contrayente o al juez competente. ¿Cómo se explican estas excepciones? Son ejemplos del modelo patologizador. Este modelo entiende que la desjudicialización y la posibilidad de modificar los registros van en contra del orden público. Este enfoque critica que sea la “voluntad no comprobada” de la persona, es decir, no comprobada por una autoridad externa médica o judicial la que prime a la hora de definir su identidad y su plan de vida. Esta situación, en el caso del matrimonio, induciría categóricamente al error, como vicio del consentimiento, de la otra persona contrayente (García de Solavagione et al., 2013). Este enfoque no esconde su paternalismo al referirse a la “protección del contrayente de buena fe” y somete a la persona no solo a la injerencia externa sobre su identidad, sino también a la elección de su propio plan de vida a un supuesto “bien social” protegido por el orden público. Esta postura privilegia un modelo de familia formado por personas cis-género (no trans), descrinando los demás modelos de familia (a los que patologiza) presuponiendo que la persona que se case con una persona trans estaría incurriendo, salvo prueba en contrario, en el error como vicio del consentimiento. Y, asimismo, que las personas adoptantes trans deben quedar en una categoría residual frente a las adoptantes cis-género. B. Caso MDCV: La ejecución de sentencia 2012-2018 La obtención de una sentencia favorable a las pretensiones del actor, aun luego de todo el sometimiento a pruebas médicas patologizantes, fue el primer paso para la obtención del reconocimiento de su identidad por parte del Estado y de la materialización de sus derechos. El primer paso porque, como se expondrá a continuación, lograr la ejecución de la sentencia no estuvo libre de desafíos y llevó más tiempo que el trámite judicial. En esta oportunidad el actor recurrió nuevamente al poder judicial, a través de la Oficina de Derechos Humanos y Justicia, no ya para obtener una autorización, sino para conseguir un acompañamiento que permitiría llevar a la práctica la sentencia obtenida en 2011. Cabe mencionar que casi la totalidad del proceso para lograr la ejecución de la sentencia se desarrolló con la Ley de Identidad de Género 26.743 ya vigente. Esta situación nos lleva a cuestionarnos también el cambio institucional que implicó esta ley en la práctica. Georgina Waylen (2014) aborda el cambio institucional en materia de género, haciendo hincapié tanto en los aspectos formales de las instituciones (por ejemplo, las leyes) como en el aspecto informal de estas (por ejemplo, las prácticas). La autora reconoce que el aspecto informal es el más difícil de visualizar y que es justamente este aspecto el que puede facilitar o subvertir el cambio institucional impulsado mediante modificaciones formales. Desde el punto de vista formal, autores como Mahoney y Thelen (2010) identifican diferentes mecanismos de cambio institucional: desplazamiento, 168 superposición, deriva y conversión. Se trata de desplazamiento cuando se crea una nueva institución que reemplaza a las anteriores y es producto de una exitosa presión por parte de los actores que impulsaron la nueva institución. Es este mecanismo el que nos interesa en nuestro caso. La Ley de Identidad de Género 26.743 fue una nueva institución que implantó un nuevo modelo de derechos humanos y desplazó al anterior modelo patologizador. Ahora bien, la ley fue sancionada en 2012 pero a MV le llevó hasta 2018 acceder realmente a sus derechos, con innumerables prácticas patologizantes en el transcurso, aun teniendo una sentencia favorable y el acompañamiento de la Oficina de Derechos Humanos y Justicia del Poder Judicial. Waylen explica esta situación desde el institucionalismo histórico, según el cual las instituciones no son ni neutrales, ni cohesivas, ni tampoco coherentes; sino que son el resultado de una lucha de poder. Una lucha en la cual los diseñadores del cambio institucional (activistas y legisladores que impulsaron y votaron la Ley 26.743) no son sus implementadores (en nuestro caso, principalmente el sistema de salud). Este aspecto informal, estas prácticas institucionales subvirtieron –y subvierten– el cambio institucional que trajo la ley permitiendo que los criterios médicos patologizantes –como ejercicio del poder de la autoridad médica– se perpetuaran en el tiempo, generando que el modelo de derechos humanos en la práctica no fuera tal. Según Waylen (2014) este aspecto informal es muy difícil de descubrir y requiere de métodos específicos. Para intentar descubrirlo, en nuestro caso particular, nos hemos valido del análisis documental del expediente llevado por la Oficina de Derechos Humanos y Justicia, donde se describen las diferentes intervenciones y prácticas realizadas, al mismo tiempo que se adjuntan copias y transcripciones de las comunicaciones entre los diferentes actores. Asimismo, se entrevistó a la persona encargada del caso –quien acompañó muy de cerca a MV– para dilucidar aún más estos aspectos informales. El primer acercamiento de MV con la Oficina de Derechos Humanos fue el 9 de abril de 2012, un mes antes de la sanción de la Ley de Identidad de Género. El primer motivo fue lograr la ejecución de la primera parte de la sentencia de 2011: la obtención de un DNI con la adecuación de su nombre y su marcador de sexo. La actuación de la Oficina logró que en poco más de un mes el actor tuviera un nuevo DNI en ese momento con nuevo número, a diferencia de lo que hoy prescribe la ley. Este primer logro no parece significativo teniendo en cuenta que MV contaba con una sentencia firme a su favor, sin embargo, para la encargada de su caso fue el primer paso para la construcción de una relación de confianza que se mantuvo durante los siguientes seis años: “eso [obtención del DNI] a él lo habilita y le da cierto nivel de confianza como para seguir adelante con alguna otra transformación” (Entrevista M.A.R., 2022). Las acciones desarrolladas desde la Oficina de Derechos Humanos y Justicia se orientaron no solamente a lograr la plena ejecución de la sentencia del Juzgado Civil y Comercial, sino también a lograr una mejora integral de la calidad de vida de MV quien estaba atravesado por múltiples vulnerabilidades. Así, las acciones se orientaron a la obtención de un nuevo DNI, a la adecuación quirúrgica de sus genitales (mastectomía y faloplastia) pero también a la obtención de una jubilación, una obra social y a fortalecer sus vínculos sociales. Cada uno de estos logros no estuvo desprovisto de dificultades en un periodo que se extendió entre abril de 2012 y mayo de 2018. 169 Luego del DNI, el siguiente paso fue la realización de la mastectomía o extirpación quirúrgica de las mamas. El 18 de abril de 2012 se envió una nota para “realizar una intervención quirúrgica de reasignación de órganos” a un reconocido centro público de salud de la ciudad de Córdoba con amplia trayectoria en cirugías plásticas y estéticas. Luego de la primera entrevista, en foja 5 del expediente de la Oficina de Derechos Humanos y Justicia, puede leerse que “mediando a) autorización del jefe de servicio, b) la realización de estudios prequirúrgicos -incluido examen psiquiátrico- y que todo se encuentre en condiciones, c) que el servicio no se encuentre sobrepasado de pacientes, allí podría llevarse a cabo solo la mastectomía (Oficina de Derechos Humanos y Justicia, 2012-2018, p. 5). Vemos ya desde el inicio los aspectos informales señalados por Waylen (2014). Aunque la nueva ley adopta un enfoque basado en la autonomía de la voluntad y expresamente rechaza las pruebas psiquiátricas, el derecho de MV se subordina al poder médico que exige la prueba como condición prequirúrgica. No bastando con ello, somete el derecho de MV lisa y llanamente a la “autorización del jefe del servicio” y como para que no queden dudas de que el reclamo del actor es de segunda categoría, lo condicionan a “que el servicio no se encuentre sobrepasado de pacientes”. Cabe decir que en la nota y en la entrevista expresamente se había aclarado que la intervención quirúrgica era ordenada por una sentencia firme, para la cual ya se habían realizado las pericias enunciadas anteriormente. Sin embargo, esta no fue la única conducta patologizante por parte del centro de salud: Yo lo acompaño, entramos a una sala donde había de siete a diez personas médicas y médicos, MV y yo, donde a MV se lo intenta someter a una serie de preguntas […] ¿Y usted en qué grado se siente hombre? ¿Y usted qué órganos tiene que se está tapando? Bueno, esa fue la última pregunta, yo dije: listo. Porque aparte preguntaba uno y antes que MV contestara preguntaba otro y aparte el lenguaje gestual que yo advertía se miraban entre ellos y lo miraban a MV una invasión a nivel de lenguaje gestual horrorosa […] ahí fue donde yo dije discúlpenme yo sé que ustedes tienen que tener en su poder los estudios y demás, esto se trata de un primer paso y ustedes tienen todos los elementos por escrito y los estudios por escrito. En ese momento ocurre algo que a mí me paralizó y paralizó a todos los médicos que fue que MV se paró y llorando se abrió la camisa. Yo ahí me le abalancé, le cerré la camisa. Les dije señores, esta charla la seguimos en otro momento, esta persona no se merece esto. (Entrevista M.A.R., 2022) La fecha original de la mastectomía fue reprogramada para que MV presente unos exámenes prequirúrgicos actualizados. Con fecha 29 de agosto de 2012 –ya en vigencia la Ley de Identidad de Género– expresamente le exigieron nuevos aptos psiquiátricos y psicológicos, pese a la reiteración por parte de la Oficina de Derechos Humanos y Justicia de que se trataba de una sentencia firme y que ya se habían realizado ese tipo de pericias. La mastectomía se realizó finalmente en diciembre de 170 2012, es decir, aproximadamente ocho meses después de la primera entrevista con el centro de salud. Luego de su recuperación, MV reunió los documentos necesarios para iniciar sus trámites jubilatorios. Como se expuso previamente, MV nunca tuvo un trabajo registrado debido a la imposibilidad de presentar documentos que representaran su verdadera identidad. A las necesidades de cualquier persona de su edad se sumaba que las cirugías previstas implican largos postoperatorios durante los cuales se vería imposibilitado de trabajar y así obtener los ingresos necesarios para su subsistencia. Con la intervención de la Oficina de Derechos Humanos y Justicia se logró que la ANSES le otorgara el beneficio jubilatorio mediante el sistema de moratorias para trabajadores informales o planes de inclusión previsional (PIP). Una iniciativa que permitió que muchos trabajadores y trabajadoras que, como MV, habían trabajado sin registración accedan a la jubilación (Corsiglia, 2018). MV obtuvo el beneficio el 6 de mayo de 2014 a poco más de un año de haber iniciado el trámite. El recorrido de MV para lograr la ejecución de la sentencia de 2011 fue arduo. La falta de confianza del actor en las instituciones –las que históricamente lo habían excluido como la escuela, el mercado formal de trabajo, los servicios de salud, el Estado en general– se vio reforzada por actitudes como la del equipo médico relatada anteriormente, sumado a resultados físicos desalentadores –la mastectomía implicó otras cirugías posteriores de reconstrucción–, y el desgaste producido por una serie de estudios médicos y psicológicos que lo acompañaron durante todo el proceso. Esto implicó la necesidad de un apoyo emocional. De todos los objetivos planteados, la faloplastia, a cargo de otro centro de salud, el Hospital de Clínicas, fue el que produjo una mayor patologización del actor y registró las mayores dilaciones. Según el expediente, el trámite que oficialmente dio inicio al recorrido para la realización de esta cirugía fue realizado el 3 de diciembre de 2013. El proceso estuvo cargado de dilaciones, estudios médicos que excedían los estudios prequirúrgicos rutinarios y la imposición de una terapia psicológica a cargo de una profesional asociada al equipo que realizaría la cirugía. Estudios que muchas veces fueron realizados ad honorem por la intermediación de la Oficina de Derechos Humanos y Justicia atento a la vulnerabilidad económica del actor y la ausencia de obra social al inicio del trámite. Del expediente surgen también las constantes reprogramaciones de la fecha de la cirugía que aparejaban la nueva realización de estos estudios. Durante los tres últimos años antes de la cirugía el médico le hacía hacer todos los estudios, le hacía tomar hormonas que no le hacían falta porque MV era un hombre, le hacían los chequeos y todo porque ya llegaba la cirugía en noviembre y en octubre le decía no, vamos a tener que pasarlo. Entonces volvíamos a empezar al año siguiente con todo lo que significaba para él volver a la psicóloga volver a hacer los estudios. Bueno, va a ser en diciembre y en diciembre decían, no. Ahí es donde yo intervengo y pido una entrevista con [el médico] y le planteo ¿doctor por qué usted está haciendo esto con este ser humano? llevamos dos años y le llevé la carpeta […] usted lo manda al psicólogo, pero no está 171 viendo lo que usted y su equipo le están ocasionando. (Entrevista M.A.R., 2022) Finalmente, luego de aproximadamente tres años de gestiones en el Hospital de Clínicas, le informaron que la faloplastia no podía realizarse por cuestiones internas del centro de salud y la disolución del equipo encargado de hacerlo. Cabe aclarar que, por un lado, se han encontrado grandes resistencias por parte de profesionales de la salud para llevar a cabo el efectivo cumplimiento de lo dispuesto por el tribunal. Esto ha ocasionado -y de hecho sigue haciendo-, interminables recorridos y esperas en las instituciones, sin que fueran comprendidas las delicadas circunstancias psicofísicas y emocionales del Sr. MV sobre el cual -agravando su condición de vulnerabilidad ya descripta- se suma su edad, corriendo el riesgo de que cuando por fin obtenga las respuestas institucionales, estas no sean ya las adecuadas o lo que es peor las posibles. Por otro costado, también ha intervenido en el retraso de las intervenciones, los inconvenientes que devienen de la carencia de profesionales especializados en este tipo de cirugías, sumados a aquellos que derivan de la falta de insumos -de todo tipo- o de turnos disponibles en los Hospitales. (Oficina de Derechos Humanos y Justicia, 2012-2018, pp. 23-24) Resistencia por parte de profesionales de la salud, el paso del tiempo y la suspensión del goce de derechos fundamentales como lo son el acceso a la salud y el reconocimiento de la identidad, así como la falta de profesionales idóneos e insumos son apenas los puntos más sobresalientes de esta realidad. Así, ante la imposibilidad de realizar la cirugía en Córdoba se comenzaron las gestiones en el único centro de salud público del país en aquel momento para dar respuesta a estas situaciones ubicado en La Plata. La recepción por parte del equipo médico de La Plata fue calificada como buena por parte del personal judicial que acompañaba a MV. Sin embargo, a los desafíos ya conocidos se planteaban nuevos. Entre los primeros estaba la carencia de profesionales formados para realizar este tipo de cirugías lo que se traducía en un tiempo de espera elevado. Entre los nuevos desafíos destacaban el costo del traslado hasta La Plata y el acompañamiento de MV en su postoperatorio. Este último punto fue de especial atención para la Oficina de Derechos Humanos y Justicia quien en reiteradas oportunidades señaló entre las vulnerabilidades del actor la ausencia de redes de apoyo y vínculos sólidos. El rechazo por parte de la familia de origen, así como la marginación educativa y laboral son realidades que afectan a muchas personas trans (Berkins y Fernández, 2005; Ministerio Público de la Defensa de la Ciudad Autónoma de Buenos Aires, 2017). Para lograr conseguir a alguien que acompañe a MV en su estancia en La Plata, la Oficina realizó un trabajo conjunto con la entonces Coordinación Nacional de Diversidad Sexual. Así, finalmente MV logró la realización de la cirugía en mayo de 2018 en La Plata, aproximadamente cuatro años y medio después de la primera entrevista con ese 172 objetivo en el Hospital de Clínicas y nueve años después de que inició el proceso ante el Juzgado Civil y Comercial. Esto es solo un resumen de los puntos más sobresalientes del camino recorrido por MV para lograr ejercer sus derechos, incluso cuando estos habían sido reconocidos por una sentencia firme y cuando en el camino una ley nacional había cambiado el paradigma sobre el reconocimiento de la identidad de género. Antes de finalizar es importante también tener en cuenta las interseccionalidades (Crenshaw, 2017) de MV, las cuales se retroalimentan y quedan muy patentes en el expediente. Solo a modo de ejemplo surge del caso la vulnerabilidad económica del actor (a causa de las lógicas de exclusión ya mencionadas) lo que sumado al desamparo familiar y afectivo lo llevaban a vivir en una pensión donde había sufrido varios robos. MV no tenía donde dejar las prótesis, fíjate el nivel de vulnerabilidad, él vivía en una pensión donde cada dos por tres entraban y le robaban cosas. Entonces yo me llevé las prótesis a mi escritorio… él me entregó toda la documentación que él tenía de su infancia y demás porque no tenía donde guardarla… un entrecruzamiento de vulnerabilidades donde esta gran batalla fue la batalla de su vida. (Entrevista M.A.R., 2022) Entre las múltiples vulnerabilidades de MV se encontraba su edad. Él tenía 62 años al momento de entablar la demanda y 71 años cuando le practicaron la última cirugía. A lo largo del expediente puede verse como la cuestión de la edad era utilizada para cuestionar la validez de su reclamo. porque [el médico] aparte me decía tengo gente muy joven, que lo requiere más. Entonces yo ahí le decía ¿cuál es la medida de la dignidad? Porque una persona no logra constituirse en su dignidad por las razones que sea cuál es la medida que usted pone para la dignidad ¿una cuestión cronológica? […] No importa si tiene sesenta, setenta u ochenta años, está en condiciones físicas, psicológicas y psíquicas ¡vamos para adelante! no es usted quien tiene que establecer ese límite porque acá se trata de la dignidad de un ser humano ¿usted va a poner la medida de la dignidad? (Entrevista M.A.R., 2022) Cabe mencionar que como señala el Protocolo de acceso a justicia para personas mayores del Poder Judicial de Córdoba, la edad cronológica no es una pauta objetiva para adoptar medidas de protección o para restringir derechos (2020, p. 15). Conclusión La historia relatada en estas páginas es una historia de transición. Una transición desde el olvido y la persecución estatal hacia el reconocimiento de la dignidad humana. Una transición desde un modelo patologizador a un modelo de derechos humanos. Una transición hacia una sociedad más justa que respete el plan de vida de 173 cada persona y que valore las vivencias de cada una por sobre la injerencia de voluntades externas. Para contar esta historia se ha optado, en una primera parte, por dar un panorama normativo, en el que se ha desarrollado el marco legal argentino, su evolución y se han explicado algunos ejemplos a nivel de derecho comparado. La diferencia entre el paradigma patologizador y el paradigma de derechos humanos ha explicado cada ejemplo. En una segunda parte, nos hemos adentrado en el caso de MV, por un lado, para mostrar cómo era el razonamiento judicial anterior a la sanción de la Ley 26.743 y del cambio de paradigma. El fallo del Juzgado Civil y Comercial se apoya en testimonios y diferentes pruebas médicas y psicológicas. El razonamiento del tribunal construye un “sujeto transexual” al que entiende como un sujeto que sufre, que está “atrapado” en un cuerpo que no siente propio, que ese cuerpo es del “sexo opuesto” (binario) y que esta es una condición irreversible. Por tal, la finalidad del fallo es liberar y sanar a esta persona para que lleve “una vida lo más normal posible”. En 2012, Argentina sancionó la Ley de Identidad de Género 26.743, que adoptó un modelo completamente opuesto al reflejado en el fallo. La identidad de género es entendida como la vivencia del género tal como cada persona la siente, lo que implica que el abanico de posibilidades es enorme. Se reconoce el derecho al libre desarrollo de la personalidad y la autonomía para elegir el propio plan de vida sin injerencias externas y se prohíben las pruebas médicas y psicológicas para el reconocimiento de la identidad de género. Este cambio de modelo o paradigma, sin embargo, tiene algunos matices. El caso de MV muestra como las prácticas patologizantes se extendieron ya con la Ley de Identidad de Género vigente y como eran ejercidas sin miramientos por diferentes –no todos– actores médicos. Es lo que Waylen (2014) llama del aspecto informal de las instituciones que subvierte el cambio institucional que en nuestro caso trajo la Ley 26.743. El ejercicio del poder dentro de las instituciones siguió –y sigue– en la práctica subordinando la identidad de las personas a injerencias externas. Tener en cuenta este aspecto informal es sumamente relevante en Estados como Argentina, donde a simple vista el marco normativo parece sumamente abierto y receptivo. Por un lado, tenemos una avanzada legislación en materia de identidad de género (Ley 26.743), la posibilidad de tener marcadores de género fuera del binomio M/F en los documentos de identidad (Dto. 476/21) una ley de inclusión laboral trans (27.636) y, sin embargo, acceder a prácticas médicas, a la salud integral, al trabajo formal o a una vida libre de violencia está lejos de ser una realidad de las personas trans en Argentina. Es en este punto que debe ponerse atención ahora para garantizar el acceso a justicia de las personas trans en particular, y LGBTIQ+ en general. Se hace necesario advertir cuáles son las prácticas institucionales, cotidianas, no escritas que subvierten la legislación vigente y restringen el acceso a justicia y a otros derechos básicos. Esto marca la necesidad de adoptar otras estrategias de control, de capacitación y sensibilización, así como protocolos de actuación institucionales que acompañen a las reformas legislativas para que estas no se conviertan en letra muerta. 174 Bibliografía Agencia Presentes. (2019, 1 de marzo). Por primera vez, un documento de identidad dirá «femineidad travesti». Presentes. Periodismo de Género. https://agenciapresentes.org/2019/03/01/porprimera-vez-un-documento-de-identidad-dira-femeinidad-travesti/ American Psychiatric Association. (2014). DSM-5: Manual diagnóstico y estadístico de los trastornos mentales. Editorial Médica Panamericana. Arias, M. (2019, 17 de diciembre). Ushuaia: la Justicia ordenó que se confeccione un DNI "no-binarioigualitario". La Nación. https://www.lanacion.com.ar/sociedad/ushuaia-justicia-ordeno-seconfeccione-dni-no-binario-igualitario-nid2316665/ Berkins, L. y Fernández, J. (2005). La gesta del nombre propio. Informe sobre la situación de la comunidad travesti en la Argentina. Asociación Madres de Plaza de Mayo. Bertolini, Lara María c/ Ministerio del Interior OP y V s/Información Sumaria, 48756/2018 (Juzgado Nacional en lo Civil N.º 7 01 de marzo de 2019). Cabral, M. (2003). Ciudadanía (trans) sexual. Proyecto sexualidades, salud y derechos humanos en América Latina. Corsiglia, L. (2018). Las mujeres, el derecho a la jubilación y las disputas en torno a los sentidos de los legítimo. Revista Escenarios, 28, 1-14. Crenshaw, K. (2017). On intersectionality: Essential writings. The New Press. De la Rosa, I. (2021, 21 de julio). La historia de Gero Caro, la primera persona de Mendoza en recibir su DNI no binario. Los Andes. https://www.losandes.com.ar/sociedad/la-historia-de-gero-caro-laprimera-persona-de-mendoza-en-recibir-su-dni-no-binario/ Farji Neer, A. (2015). Cuerpo, derechos y salud integral: Análisis de los debates parlamentarios de las leyes de Identidad de Género y Fertilización Asistida (Argentina, 2011-2013). Salud Colectiva, 11, 351-365. Federación Argentina LGBT. (2008). Informe sobre códigos contravencionales y de faltas de las provincias de la República Argentina y la Ciudad Autónoma de Buenos Aires en relación con la discriminación y la represión a gays, lesbianas, bisexuales y trans. García de Solavagione, A., Moisset de Espanés, L., Palmero, J. C., Méndez Costa, M. J. y Trigo Represas, F. (2013). El estatuto de los vicios del consentimiento matrimonial y la contradicción con las leyes relativas a la identidad de género. Gobierno de Mendoza. (2018, 2 de noviembre). Solicitud de partida de nacimiento sin consignación de sexo dentro del marco de la Ley de Identidad de Género 26743. Prensa del Gobierno de Mendoza. https://www.mendoza.gov.ar/prensa/solicitud-de-partida-de-nacimiento-sin-consignacion-desexo-dentro-del-marco-de-la-ley-de-identidad-de-genero-lig-26-743/ Lamm, E. (2018). Identidad de género. Sobre la incoherencia legal de exigir el sexo como categoría jurídica. Actualidad Jurídica Iberoamericana, 8, 230-278. Litardo, E. (2018). La identidad de género en América: aproximaciones para una teoría democrática del género. Sistemas judiciales: una perspectiva sobre la administración de justicia, 18(22), 45-66. Mahoney, J. y Thelen, K. (Eds.) (2010). Explaining institutional change: Ambiguity, agency, and power. Cambridge University Press. Ministerio Público de la Defensa de la Ciudad Autónoma de Buenos Aires. (2017). La revolución de las mariposas. A diez años de La Gesta del Nombre Propio. https://www.mpdefensa.gob.ar/sites/default/files/la_revolucion_de_las_mariposas.pdf Oficina de Derechos Humanos y Justicia 2012-2018. Expediente Oficina de Derechos Humanos y Justicia, MV 04-2012. Ojeda, C. (2020, 26 de febrero). Es no binarie, cambió su partida y lucha por su DNI. Presentes. Periodismo de Género. https://agenciapresentes.org/2020/02/26/es-no-binarie-cambio-supartida-y-lucha-por-su-dni/ 175 Pizzarro, O. (2021, 14 de abril). Abuso policial. Detención discriminatoria por parte de la policía de Córdoba. La Izquierda Diario. https://www.laizquierdadiario.com/Detencion-discriminatoria-porparte-de-la-policia-de-Cordoba Poder Judicial de la Provincia de Córdoba. (2020). Protocolo de actuación para el acceso a justicia para personas mayores. Córdoba. Registro Nacional de las Personas. (2022). A 10 años de la Ley de Identidad de Género, más de 12 mil personas cambiaron su identidad autopercibida en el DNI. https://www.argentina.gob.ar/noticias/10-anos-de-la-ley-de-identidad-de-genero-mas-de-12mil-personas-cambiaron-su-identidad Sentencia 482, 5094686 - MDCV - ORDINARIO - OTROS (JUZG 1A INST CIV COM 6A NOM 16 de septiembre de 2011). Waylen, G. (2014). Informal institutions, institutional change, and gender equality. Political Research Quarterly, 67(1), 212-223. DOI: 10.5281/zenodo.8317268 176
https://openalex.org/W2804478446
https://digital.csic.es/bitstream/10261/189042/1/document.pdf
English
null
Effect of copper-enriched layers on localized corrosion of aluminium-copper alloys
Revista Facultad de Ingeniería/Revista Facultad de Ingeniería
2,018
cc-by
5,021
Abstract Copper-enriched layers were developed onto aluminum-copper alloys using alkaline etching in sodium hydroxide, for both, sputter deposited and bulk conditions. Enriched alloys were evaluated by potentiodynamic polarization in sodium chloride solution in order to determine the effect of the enriched layers on the pitting potential of the alloys. Rutherford backscattering spectroscopy was employed to quantify the enrichments and their locations just beneath the alumina-based oxides remaining from the etching. For the sputter deposited aluminum-copper alloys, the results show some scattering of the pitting potential data, and no correlation between pitting potential and the alloy enriched layer. In the case of bulk Al-2wt.%Cu alloy, with the copper in solid-solution, the pitting potential increased for the enriched specimens, indicating also a different pit morphology, with respect to the non-enriched alloy. Keywords: aluminium-copper alloys; anodizing; copper enrichment; pitting. Efeito das camadas de enriquecimento de cobre sobre corrosão localizada em ligas alumínio-cobre Efeito das camadas de enriquecimento de cobre sobre corrosão localizada em ligas alumínio-cobre María Ángeles Arenas-Vara* Peter Skeldon** Sandra Judith García-Vergara*** Fecha de recepción: 17 de enero de 2018 Fecha de aprobación: 6 de abril de 2018 * Ph.D. Centro Nacional de Investigaciones Metalúrgicas – CENIM (Madrid, España). geles@cenim.csic.es. ** Ph.D. University of Manchester (Manchester, Reino Unido). peter.skeldon@manchester.ac.uk. *** Ph.D. Universidad Industrial de Santander (Bucaramanga-Santander, Colombia). sagarver@uis.edu.co. ORCID: 0000-0002-4480-6255. Resumen Fueron desarrolladas capas de enriquecimiento de cobre mediante ataque alcalino en hidróxido de sodio sobre aleaciones aluminio-cobre. Se usaron aleaciones tanto depositadas por pulverización catódica, como vaciadas convencionalmente. Las aleaciones con las capas de enriquecimiento de cobre fueron estudiadas mediante polarización potenciodinámica en una solución de cloruro de sodio, para poder determinar si existe alguna correlación entre las capas de enriquecimiento de cobre y el potencial de picadura de las aleaciones. Los resultados no son concluyentes en el caso de las aleaciones depositadas por pulverización catódica; sin embargo, en el caso de la aleación en condición de vaciado, con el cobre en solución sólida, el potencial de picadura aumenta por la presencia de la capa de enriquecimiento, mostrando además una morfología diferente. Palabras clave: aleaciones aluminio-cobre; anodizado; enriquecimiento de cobre; potencial de * Ph.D. Centro Nacional de Investigaciones Metalúrgicas – CENIM (Madrid, España). geles@cenim.csic.es. ** Ph.D. University of Manchester (Manchester, Reino Unido). peter.skeldon@manchester.ac.uk. *** Ph.D. Universidad Industrial de Santander (Bucaramanga-Santander, Colombia). sagarver@uis.edu.co. ORCID: 0000-0002-4480-6255. Revista Facultad de Ingeniería (Rev. Fac. Ing.) Vol. 27 (48), pp. 7-15. Mayo-Agosto, 2018. Tunja-Boyacá, Colombia ISSN Impreso 0121-1129, ISSN Online 2357-5328, DOI: http://doi.org/10.19053/01211129.v27.n48.2018.8016 7 Effect of copper-enriched layers on localized corrosion of aluminium-copper alloys Revista Facultad de Ingeniería (Rev. Fac. Ing.) Vol. 27 (48), pp. 7-15. Mayo-Agosto, 2018. Tunja-Boyacá, Colombia. Para citar este artículo: M. A. Arenas-Vara, P. Skeldon, and S. J. García-Vergara, “Effect of copper-enriched layers on localized corrosion of aluminium-copper alloys,” Revista Facultad de Ingeniería, vol. 27 (48), pp. 7-15, may. 2018. A. Sample preparation and characterization Layers of Al-0.95at.%Cu alloy were prepared using an Atom Tech Ltd magnetron sputtering system with separate 99.999% aluminium and 99.95% copper targets. The alloy was deposited onto electropolished high purity aluminium substrates. The chamber was firstly evacuated to 6×10-7 mbar, and then deposition was carried out in 99.998% argon at 5.5 ×10-3 mbar. The substrates were attached to a large copper disk, whose temperature increased to 305 K during deposition of the alloys. Another set of experiments was carried out using heat-treated Al-2wt.%Cu alloy, with the copper in solid solution. Specimens of the alloy were heated to 550 °C for 3 h and then quenched in water. Rectangular pieces of the alloy were mounted in standard 00 size BEEM capsules, which were then filled with an epoxy resin. The filled capsule was cured in an oven at 60 °C for 48 h. Following the procedure used to prepare the samples for TEM by ultramicrotomy, the hardened resin blocks containing the specimens were trimmed using a glass knife in a Leica Ultracut UCT ultramicrotome. The final area was about 0.20 cm2. This procedure was used to avoid inclusions or contamination by the normal polishing procedures. A high purity aluminum specimen was also prepared using the previous procedure. In almost all applications of aluminum alloys, the fabricated alloys are pretreated and surface finished, thereby providing a functionalized surface. Etching, chemical polishing, acid picking, electropolished and anodized pretreatments of copper containing aluminum alloys normally results in the formation of a thin layer of alloy, about 2 to 4 nm thick and highly enriched in copper, immediately beneath the residual or anodic alumina film due to the less negative Gibbs free energy per equivalent for formation of copper oxide compared with that of alumina [3-6]. Further, for anodic oxidation of the alloys, once a steady enrichment of about 40 at% Cu, equivalent to about 5.4×1019 Cu atoms m-2, is achieved, oxidation of copper proceeds and copper species are incorporated into the film at the alloy/film interface, in the alloy proportions [6]. The presence of copper in the anodic film leads to the generation of oxygen gas within the anodic films, resulting in oxygen gas containing bubbles at high pressure, consequently, introducing lateral porosity to the porous anodic films formed on copper-containing aluminum alloys [7]. Resumo Foram desenvolvidas camadas de enriquecimento de cobre mediante ataque alcalino em hidróxido de sódio sobre ligas alumínio-cobre. Usaram-se ligas tanto depositadas por pulverização catódica, como esvaziadas convencionalmente. As ligas com as camadas de enriquecimento de cobre foram estudadas mediante polarização potenciodinâmica em uma solução de cloreto de sódio, para poder determinar se existe alguma correlação entre as camadas de enriquecimento de cobre e o potencial de picadura das ligas. Os resultados não são concluintes no caso das ligas depositadas por pulverização catódica; porém, no caso da liga em condição de esvaziado, com o cobre em solução sólida, o potencial de picadura aumenta pela presença da camada de enriquecimento, mostrando além disso, uma morfologia diferente. Palavras chave: ligas alumínio-cobre; anodizado; enriquecimento de cobre; potencial de picadura. Para citar este artículo: Para citar este artículo: M. A. Arenas-Vara, P. Skeldon, and S. J. García-Vergara, “Effect of copper-enriched layers on localized corrosion of aluminium-copper alloys,” Revista Facultad de Ingeniería, vol. 27 (48), pp. 7-15, may. 2018. 8 María Ángeles Arenas-Vara - Peter Skeldon - Sandra Judith García-Vergara I. Introduction correlation between the enriched alloy layer and the pitting potential of aluminium copper alloys. Aluminum-copper alloys are widely used in aerospace and automotive industries due to their high strength to weight ratio and damage tolerance. These properties result from alloying with copper as the principal alloying element and appropriate thermomechanical processing. However, copper also has significant influence on the corrosion behaviour of the alloys. Copper-containing intermetallic particles often form microgalvanic couples with the surrounding alloy, consequently, increasing the susceptibility of the alloys to localized attack [1, 2]. A. Enrichment of copper developed by alkaline etching Specimens of freshly deposited and anodic etched alloy were sectioned to a nominal thickness of ~10 nm by ultramicrotomy and examined by Transmission electron microscopy TEM using a JEOL FX 200 II instrument. Table 1 lists the enrichments of copper from RBS and the expected amount of copper in the enriched layer generated in the Al-0.95at.%Cu alloy by alkaline etching in sodium hydroxide for 12 to 75 s. The average compositions of the copper enriched layer are also given assuming a layer of 2 nm in thickness with a weighted average of the atomic densities of aluminium and copper. Only for the longest time does copper oxidize during etching. The atomic density of the outer layer film material used in the simulations was 0.92 ´ 1023 atoms cm-3, corresponding to that of anodic alumina of density 3.1 g cm-3. The RBS analysis shows that the copper enrichment increases as the time of anodic etching increases. A. Sample preparation and characterization The copper-enriched layer were generated, for both type of samples, by anodic etching at a constant current density of 5 mA cm-2 in 0.1 M sodium hydroxide solution at 293 K by different times. Individual specimens were then connected, as the anode, to the power supply (METRONIX 6911 DC) and a stainless- steel sheet was connected as a cathode. The voltage- time responses of the anodic etching were recorded on a PC, with a PICOLOG recorder program. After the anodic etching, the specimens were quickly rinsed with deionized water and dried in cool air stream. The specimens were then immersed for 30 s in 15% nitric acid, to remove any smut layer, rinsed with deionized water and dried in a cool air stream. Many studies have been devoted to the electrochemical behaviour of aluminium alloys in sodium chloride solutions [1-3]. All these studies reveal that the exposure of aluminium alloys to chloride ions results in localized corrosion (pitting corrosion). Pitting is the most common form of corrosion for aluminium and its alloys. Of the common electrochemical testing methods, potentiodynamic polarisation allows determining pitting susceptibility by revealing the pitting potential (Ep). Features like, inclusions, intermetallic particles (coarse or fine), surface roughness and electrochemical potential are factors that influence the nucleation and growth of metastable pits [8]. The aim of this paper is to study if there is a The composition of the sputter deposited alloy and the specimens with the copper enriched layers were determined by Rutherford backscattering Revista Facultad de Ingeniería (Rev. Fac. Ing.) Vol. 27 (48), pp. 7-15. Mayo-Agosto, 2018. Tunja-Boyacá, Colombia. 9 Effect of copper-enriched layers on localized corrosion of aluminium-copper alloys saturated calomel reference electrode (SCE). The data were recorded using a potentiostat-galvanostat EG&G 264, Solartron connected to a computer, using the Corr software. spectroscopy (RBS) [9], using 2.00-2.5 MeV He+ ions produced by the 2.5 MeV Van de Graaff accelerator of the University of Paris. The beam current and the bean diameter were 60 nA and 0.5 mm, respectively, with the beam incident normal to the specimen surface. The scattered particles were detected at 165° to the direction of the incident bean. The data were interpreted using the RUMP program [10]. III. Results B. Corrosion test Further, the curves suggest an slightly in- creased corrosion current density (icorr) of 3.5 ´ 10-7 A cm-2 following 43 s of etching, when the enrichment is about 4.5 ´ 1015 Cu atoms cm-2 compare with the non-enriched alloy. The current density subsequently increases due to pitting. However, identification of the pitting potential (Ep) was hindered by absence of a clearly defined change in behaviour, which may relate to the use of thin alloy layers. Ep is here considered as the potential at which the current starts to increase rapidly above the background passive current [11]. Generally, the Al-Cu alloy appears to disclose an in- crease in the pitting potential in comparison with that of aluminium. This behaviour is in general agreement with previous work [12]. -1065 mV for the as-deposited alloy, -972 mV and -896 mV following 12 and 43 s of alkaline etching, respectively. Further, the curves suggest an slightly in- creased corrosion current density (icorr) of 3.5 ´ 10-7 A cm-2 following 43 s of etching, when the enrichment is about 4.5 ´ 1015 Cu atoms cm-2 compare with the non-enriched alloy. The current density subsequently increases due to pitting. However, identification of the pitting potential (Ep) was hindered by absence of a clearly defined change in behaviour, which may relate to the use of thin alloy layers. Ep is here considered as the potential at which the current starts to increase rapidly above the background passive current [11]. Generally, the Al-Cu alloy appears to disclose an in- crease in the pitting potential in comparison with that of aluminium. This behaviour is in general agreement with previous work [12]. Revista Facultad de Ingeniería (Rev. Fac. Ing.) Vol. 27 (48), pp. 7-15. Mayo-Agosto, 2018. Tunja-Boyacá, Colombia. B. Corrosion test Potentiodynamic polarization curves of the aluminium- copper alloys, enriched aluminium-copper alloys and high purity aluminium were recorded in de-aerated 0.1 M sodium chloride solution at 293 K at a scan rate of 0.2 mV s-1. The working area, defined with Lacomite, was about 0.2-1.0 cm2, for the sputter deposited and bulk alloys, respectively. A three-electrode cell was employed, with a platinum counter electrode and a Table 1 Results of RBS analyses of Al-0.95at.% Cu alloy after etching at 5 mA cm-2 in 0.1 M sodium hydroxide solution at 293 K Time of etching (s) Enrichment in alloy (Cu atoms cm-2) Average composition of enriched layer (at.%Cu) RBS Expected 12 1.2 x 1015 1.2 x 1015 10 22 2.1 x 1015 2.1 x 1015 18 43 4.5 x 1015 4.6 x 1015 37 75 6.5 x 1015 7.9 x 1015 55 Table 1 Results of RBS analyses of Al-0.95at.% Cu alloy after etching sodium hydroxide solution at 293 K to within ~ 8 nm, which are usual for the sputtering conditions. In the presented example, etching for 75 s reduced the alloy thickness by 148 nm, in reasonable agreement with the calculated reduction of 132 nm from the time of etching. to within ~ 8 nm, which are usual for the sputtering conditions. In the presented example, etching for 75 s reduced the alloy thickness by 148 nm, in reasonable agreement with the calculated reduction of 132 nm from the time of etching. Figure 1 shows typical transmission electron micro- graphs of the Al-0.95at.%Cu alloy following deposi- tion and after 75 s of etching in sodium hydroxide. The alloy is columnar-grained, with a typical grain width of ~ 40 nm, and the selected surface was locally flat Revista Facultad de Ingeniería (Rev. Fac. Ing.) Vol. 27 (48), pp. 7-15. Mayo-Agosto, 2018. Tunja-Boyacá, Colombia. 10 María Ángeles Arenas-Vara - Peter Skeldon - Sandra Judith García-Vergara Fig. 1. Transmission electron micrographs of the Al-0.95at.%Cu alloy following (a) deposition and (b) etching for 75 s at 5 mA cm-2 in 0.1 M sodium hydroxide solution at 293 K. Fig. 1. Transmission electron micrographs of the Al-0.95at.%Cu alloy following (a) deposition and (b) etching for 75 s at 5 mA cm-2 in 0.1 M sodium hydroxide solution at 293 K. -1065 mV for the as-deposited alloy, -972 mV and -896 mV following 12 and 43 s of alkaline etching, respectively. B. Potentiodynamic polarization behaviour in sodium chloride solution 1) Sputtering-deposited Al-0.95at.%Cu alloy. Figure 2 shows the potentiodynamic polarization curves of Al-0.95at.%Cu alloy in de-aerated sodium chloride solution at 298 K, following alkaline etching. Indi- vidual specimens were immersed for 120 min prior to polarization. The potential was scanned at 0.2 mV s-1 starting at about 200 mV below the corrosion potential. The cathodic current density, due to decomposition of the water, does not show significant changes with the alloy enrichment, exhibiting values of 0.01–0.02 mA cm-2. The corrosion potential increases as the etching time increases, due to the presence of the copper-en- riched alloy layer, being the corrosion values about 11 Effect of copper-enriched layers on localized corrosion of aluminium-copper alloys Fig. 2. Potentiodynamic polarization curves, measured at a scan rate of 0.2 mV s-1, for Al-0.95at.%Cu alloy in de- aerated 0.1 M sodium chloride solution at 293 K. The curves were measured for the as-deposited alloy, and following etching of the alloy for 12 and 43 s at 5 mA cm-2 in 0.1 M sodium hydroxide solution at 293 K. Fig. 2. Potentiodynamic polarization curves, measured at a scan rate of 0.2 mV s-1, for Al-0.95at.%Cu alloy in de- aerated 0.1 M sodium chloride solution at 293 K. The curves were measured for the as-deposited alloy, and following etching of the alloy for 12 and 43 s at 5 mA cm-2 in 0.1 M sodium hydroxide solution at 293 K. Then, considering the results for the sputtering-depos- ited Al-0.95at.%Cu alloy in which copper does not oxidize, there is an increase in the corrosion potential by about 160 mV vs. SCE with enrichment by 4.5 ´ 1015 Cu atoms cm-2. The influence of the enriched al- loy layer on the free corrosion potential of aluminium alloys has been reported previously [13]. The present results confirm the key role of the copper enrichment in determining the corrosion potential of aluminium alloys. Further, the cathodic current density increases in the presence of the enriched alloy layer, suggest- ing changes in the cathodic kinetics. The pitting po- tential, however, is not well defined, probably due to the relatively low thickness of the initial alloy layers, which is further reduced by the anodic etching in sodi- um hydroxide solution. B. Potentiodynamic polarization behaviour in sodium chloride solution Although the thin layers have the advantage that surface preparation is not required prior to anodic etching, unlike bulk alloys that require mechanical treatment to generate a non-enriched ini- tial surface, this is offer by their low thickness. Figure 3. The polarization curve of high pure alumin- ium is also included for comparison. The curves dis- play a positive shift of the corrosion potential, as the enrichment of copper increases; however, the magni- tude is smaller compared with that observed in Figure 2, for sputtering-deposited aluminium-copper alloy. The anodic region of Al-Cu specimens presents pas- sive current densities in the range typically between 0.3–6 mA cm2, with pitting subsequently commencing at potentials of about -600 mV vs. SCE. Pure alumini- um exhibits a passive current density of about 0.4 mA cm-2 and a pitting potential of about -689 mV vs. SCE. After this point, the current density increases rapidly due to the pitting corrosion. Compared with the pre- vious results for the sputtering-deposited alloy, the pitting potential is clearly distinguished for the bulk alloy. Further, measurements performed in triplicate for each specimen, show a very good reproducibility. The enrichment measured by RBS reveals a level of about 4.0 ´ 1015 Cu atoms cm-2 after 41 s of etching. However, no particular difference in the pitting poten- tial is displayed between specimens in the as-received and alkaline-etched conditions, except for the possibly formation of metastable pits on the specimen in the as-received condition. Figure 3. The polarization curve of high pure alumin- ium is also included for comparison. The curves dis- play a positive shift of the corrosion potential, as the enrichment of copper increases; however, the magni- tude is smaller compared with that observed in Figure 2, for sputtering-deposited aluminium-copper alloy. The anodic region of Al-Cu specimens presents pas- sive current densities in the range typically between 0.3–6 mA cm2, with pitting subsequently commencing at potentials of about -600 mV vs. SCE. Pure alumini- um exhibits a passive current density of about 0.4 mA cm-2 and a pitting potential of about -689 mV vs. SCE. After this point, the current density increases rapidly due to the pitting corrosion. Compared with the pre- vious results for the sputtering-deposited alloy, the pitting potential is clearly distinguished for the bulk alloy. Further, measurements performed in triplicate for each specimen, show a very good reproducibility. B. Potentiodynamic polarization behaviour in sodium chloride solution The enrichment measured by RBS reveals a level of about 4.0 ´ 1015 Cu atoms cm-2 after 41 s of etching. However, no particular difference in the pitting poten- tial is displayed between specimens in the as-received and alkaline-etched conditions, except for the possibly formation of metastable pits on the specimen in the as-received condition. 2) Bulk aluminium-copper alloy. The potentiodynam- ic polarization curves of the bulk Al-2wt.%Cu alloy, in both the as-received and alkaline-etched conditions, in de-aerated sodium chloride solution is presented in Revista Facultad de Ingeniería (Rev. Fac. Ing.) Vol. 27 (48), pp. 7-15. Mayo-Agosto, 2018. Tunja-Boyacá, Colombia. 12 María Ángeles Arenas-Vara - Peter Skeldon - Sandra Judith García-Vergara Fig. 3. Potentiodynamic polarization curves, measured at a scan rate of 0.2 mV s-1, for Al-2wt.%Cu alloy in de- aerated 0.1 M sodium chloride solution at 293 K. The curves were measured for high pure aluminium, for as-received Al-2wt.%Cu alloy, and following etching of the alloy for 41 s at 5 mA cm-2 in 0.1 M sodium hydroxide solution at 293 K. Fig. 3. Potentiodynamic polarization curves, measured at a scan rate of 0.2 mV s-1, for Al-2wt.%Cu alloy in de- aerated 0.1 M sodium chloride solution at 293 K. The curves were measured for high pure aluminium, for as-received Al-2wt.%Cu alloy, and following etching of the alloy for 41 s at 5 mA cm-2 in 0.1 M sodium hydroxide solution at 293 K. Pitting corrosion is considered to be one of the princi- pal mechanisms for damage of high-strength alumin- ium alloys. Pitting corrosion occurs in the presence of aggressive anionic species, and chloride ions are usually, although not always, the cause. Chloride is an anion of a strong acid, and many metal cations exhib- it considerable solubility in chloride solutions [12]. A critical factor in pitting corrosion is that the phenom- enon is considered to be autocatalytic in nature; once a pit starts to grow, the conditions developed are such that further pit growth is promoted. The resistance to pitting for pure metals is usually measured in terms of the pitting potential, Ep, which characterizes the elec- trochemical stability of the passive film [14]. pitting potential was increased by about 200 mV as the concentration of copper increased to 5 wt.%, with respect to aluminium. B. Potentiodynamic polarization behaviour in sodium chloride solution Enrichment of the alloying ele- ments at the alloy/alumina film interface in aluminium alloys has been observed as a consequence of several surface treatments, including electropolishing [17]. Accordingly, the enrichment of copper was present in the specimens examined by Galvele et al., and the observation regarding an improved resistance to pit- ting corrosion could reflect on the influence of this en- riched alloy layer. Following their observations, a pos- itive effect of the enriched alloy layer was expected in the present study. The pitting potential of the bulk alu- minium-copper alloy increases in about 100 mV com- pared with aluminium. However, the potentiodynam- ic polarization curves show that the pitting potential for the specimens in as-received and alkaline etched conditions, exhibits approximately the same value around -600 mV vs. SCE. The thickness of enriched alloy layer is about 2–2.5 nm and the layer is probably consisted of copper-rich clusters, which are of size of the order of nanometres. Pits can penetrate the alloys in a fraction of seconds, and the effect of the enriched alloy layer cannot be detected. From the present obser- vations, it is possible to conclude that the enrichment of copper in the alloy is not a key factor in the pitting corrosion of aluminium alloys. On the other hand, pits A better approach to understanding the effect of the alloy enrichment on the pitting potential was achieved using a bulk Al-2wt.%Cu alloy. Since the aluminium is a reactive metal, the homogeneous addition of al- most any metal (except magnesium and zinc) to al- uminium results in an increase in pitting potential, provided that the structure remains single phase [15, 16]. Galvele et. al. reported that the pitting potential of aluminium-copper alloys increased with copper con- centration as long as copper was in solid solution [12]. They examined electropolished aluminium-copper al- loys with copper content between 1 to 33 wt.%. The Revista Facultad de Ingeniería (Rev. Fac. Ing.) Vol. 27 (48), pp. 7-15. Mayo-Agosto, 2018. Tunja-Boyacá, Colombia. 13 Effect of copper-enriched layers on localized corrosion of aluminium-copper alloys in aluminium alloys are typically associated with in- termetallic particles [18, 19]. For aluminium-copper alloys, the presence of the intermetallic q-phase (Al- 2Cu) reduces the resistance to pitting at levels similar to those achieved in aluminium alloyed with little cop- per [20]. B. Potentiodynamic polarization behaviour in sodium chloride solution In the commercial alloys, pitting corrosion is normally associated with the presence of two constitu- ent particles, Al-Cu-Mn-Fe and Al-Cu-Mg containing particles [21]. Recently it was found that intergranular corrosion occurs first and crystallographic pitting ini- tiates from the crevice wall behind the intergranular corrosion front of aluminium-copper alloys exposed to chloride solutions. Due to copper enrichment along the pit walls, the crystallographic pits in the AA2024 alloy are characterized with relatively irregular pit walls on a much finer dimension compared to the well-defined half-cube shape crystallographic pits in pure aluminium [22]. The present results confirm the influence of the enrichment of the alloying elements in the corrosion behaviour of surface-treated aluminium alloys. Also, they suggested that further investigation is necessary to clarify the behaviour of alloy enriched aluminium alloys in chloride solutions. Electrochem. Soc., vol. 161, pp. C535-C543, Dec. 2014. DOI: https://doi.org/10.1149/2.0361412jes. [2] [2] N. Birbilis, and R. G. Buchheit, “Electrochemical Characteristics of Intermetallic Phases in Aluminum Alloys,” J. Electrochem. Soc., vol. 152, pp. B140-B151, Apr. 2015. DOI: https://doi. org/10.1149/1.1869984. [3] [3] H. H. Strehblow, and C. J. Doherty, “Examination of aluminum copper films during anodic oxidation,” J. Electrochem. Soc., vol. 125, pp. 30–33, Jan. 1978. DOI h //d i /10 1149/1 2131392 DOI: https://doi.org/10.1149/1.2131392. [4] [4] M. A. Paez, T. M. Foong, C.T. Ni, G.E. Thompson, K. Shimizu, H. Habazaki, P. Skeldon, and G.C. Wood, “Barrier-type anodic film formation on an Al- 3.5 wt% Cu alloy,” Corros. Sci., vol. 38 (1), pp. 59- 72, Jan.1996. [5] [5] X. Zhou, H. Habazaki, K. Shimizu, P. Skeldon, G.E. Thompson, and G.C. Wood, “Copper enrichment in Al–Cu alloys due to electropolishing and anodic oxidation,” Thin Solid Films, vol. 293 (1-2), pp. 327– 332, Jan. 1997. DOI: https://doi.org/10.1016/S0040- 6090(96)09117-1. [6] Y. Liu, E. A. Sultan, E. V. Koroleva, P. Skeldon, G. E. Thompson, X. Zhou, K. Shimizu, and H. Habazaki, “Grain orientation effects on copper enrichment and oxygen generation during anodizing of an Al-1 at.% Cu alloy,” Corros. Sci., vol 45(4), pp. 789–797, Apr. 2003. DOI: https://doi.org/10.1016/S0010- 938X(02)00126-9. IV. Conclusions [7] Y. Ma, X. Zhou, G. E. Thompson, M. Curioni, T. Hashimoto, P. Skeldon, P. Thomson, and M. Fowles, “Anodic film formation on AA 2099-T8 aluminium alloy in tartaric-sulphuric acid,” J. Electrochem. Soc., vol. 158 (2), pp. C17–C22, Feb. 2011. DOI: https:// doi.org/10.1149/1.3523262. The corrosion potential of an alkaline-etched, sol- id-solution Al-0.95at.%Cu alloy or bulk Al-2wt.%Cu, in de-aerated sodium chloride solution moves to more noble values as the level of copper enrichment in the alloy increases. The latter is determined by the extent of prior etching. The potential shift is more relevant for Al-0.95at.%Cu alloy after etching, about 160 mV as the enrichment rises to 4.5 ´ 1015 copper atoms cm-2. Additionally, the absence of a clearly defined pitting potential of the sputtering deposited aluminium-cop- per alloys is related to the thickness of the alloy lay- ers, suggesting that pit penetration of the alloy layers is very fast, and that the influences of the aluminium substrate cannot be avoided. Finally, the copper-en- riched layer did not show a significant effect on the pitting potential, either in the as-deposited alloy or in the bulk alloy, suggesting that it is not a critical factor determining the resistance to pitting. [8] [8] R. K. Gupta, N. L. Sukiman, M. K. Cavanaugh, B. R. W. Hinton, C. R. Hutchinson, and N. Birbilis, “Metastable pitting characteristics of aluminium alloys measured using current transients during potentiostatic polarization,” Electrochim. Acta, vol. 66, pp. 245–254. Apr. 2012. DOI: https://doi. org/10.1016/j.electacta.2012.01.090. [9] [9] J. Pierrière, “Rutherford backscattering spectrometry,” Vacuum, vol. 37 (5-6), pp. 429-432, May. 1987. DOI: https://doi.org/10.1016/0042- 207X(87)90327-7. [10] L. R. Doolittle, “Algorithms for the rapid simulation of Rutherford backscattering spectra,” Nucl. Instrum. Meth.B, vol. 9(1), pp. 344-351, Jun. 1985. DOI: https://doi.org/10.1016/0168-583X(85)90762-1. p g ( ) [11] G. S. Frankel, J. R. Scully, and C. V. Jahnes, “Repassivation of Pits in Aluminum Thin Films,” J. Electrochem. Soc., vol. 143 (6), pp. 1834-1840, Jun. 1996. DOI: https://doi.org/10.1149/1.1836912. References [1] M. K. Cavanaugha, J.-C. Lia, N. Birbilis, and R. G. Buchheit, “Electrochemical Characterization of Intermetallic Phases Common to Aluminum Alloys as a Function of Solution Temperature,” J. [12] J. R. Galvele, “Transport processes in passivity breakdown—II. Full hydrolysis of the metal ions,” Revista Facultad de Ingeniería (Rev. Fac. Ing.) Vol. 27 (48), pp. 7-15. Mayo-Agosto, 2018. Tunja-Boyacá, Colombia. 14 María Ángeles Arenas-Vara - Peter Skeldon - Sandra Judith García-Vergara [18] G. D. Davis, B. A. Shaw, B. J. Rees, and C. A. Pecile, “Electrochemical behavior and surface chemistry of non-equilibrium aluminum–tantalum alloys: Solute- rich interphase mechanisms,” Surf. Int. Anal., vol. 23 (9), pp. 609-617, Aug. 1995. DOI: https://doi. org/10.1002/sia.740230906. Corros. Sci., vol. 21 (8), pp. 551-579, Aug. 1981. DOI: https://doi.org/10.1016/0010-938X(81)90009-3. Corros. Sci., vol. 21 (8), pp. 551-579, Aug. 1981. DOI: https://doi.org/10.1016/0010-938X(81)90009-3. [13] [13] S. Garcia-Vergara, F. Colin, P. Skeldon, G. E. Thompson, P. Bailey, T. C. Q. Noakes, H. Habazaki, and K. Shimizu, “Effect of Copper Enrichment on the Electrochemical Potential of Binary Al-Cu Alloys,” J. Electrochem. Soc., vol. 151 (1), pp. B16-B21, Jan. 2004. DOI: https://doi.org/10.1149/1.1627343. [19] [19] G. S. Frankel, R. C. Newman, C. V. Jahnes, and M. A. Russak, “On the Pitting Resistance of Sputter- Deposited Aluminum Alloys,” J. Electrochem. Soc., vol. 140 (8), pp. 2192-2197, Aug. 1993. DOI: https:// doi.org/10.1149/1.2220794. [14] A. Broli, and H. Holtan, “Use of potentiokinetic methods for the determination of characteristic potentials for pitting corrosion of aluminium in a deaerated solution of 3%NaCl,” Corros. Sci., vol. 13(4), pp. 237-246, Apr. 1973. DOI: https://doi. org/10.1016/0010-938X(73)90002-4.i g [20] M. M. Lohrengel, “Thin anodic oxide layers on aluminium and other valve metals: high field regime,” Mat. Sci. Eng. R, vol. 11(6), pp. 243-294, Dec. 1993. DOI: https://doi.org/10.1016/0927- 796X(93)90005-N. g [15] G. S. Frankel, “The growth of 2-D pits in thin film aluminium,” Corros. Sci., vol. 30 (12), pp. 1203- 1218, Dec. 1990. DOI: https://doi.org/10.1016/0010- 938X(90)90199-F. [21] X. Zhou, C. Luo, T. Hashimoto, A.E. Hughes, and G.E. Thompson, “Study of localized corrosion in AA2024 aluminium alloy using electron tomography,” Corros. Sci., vol. 58, pp. 299-306, May. 2012. DOI: https://doi.org/10.1016/j.corsci.2012.02.001. [16] G. S. Frankel, M. A. Russak, C. V. Jahnes, M. Mirzamaani, and V. A. Brusic, “Pitting of Sputtered Aluminum Alloy Thin Films,” J. Electrochem. Soc., vol. 136(4), pp.1243-1244, Apr. 1989. DOI: https:// doi.org/10.1149/1.2096864. [22] X. Zhang, X. Zhou, T. Hashimoto, and B. Revista Facultad de Ingeniería (Rev. Fac. Ing.) Vol. 27 (48), pp. 7-15. Mayo-Agosto, 2018. Tunja-Boyacá, Colombia. References Liu, “Localized corrosion in AA2024-T351 aluminium alloy: Transition from intergranular corrosion to crystallographic pitting,” Mat. Characterization, vol. 130, pp. 230-236, Aug. 2017. DOI: https://doi. org/10.1016/j.matchar.2017.06.022. g [17] X. Zhou, H. Habazaki, K. Shimizu, P. Skeldon, G. E. Thompson, and G. C. Wood, “Enrichment-dependent anodic oxidation of Zinc in Al-Zn Alloys,” Corros. Sci., vol. 38 (9), pp. 1563-1577, Sep. 1996. 15
https://openalex.org/W2262219816
https://journals.iucr.org/e/issues/2010/04/00/hb5376/hb5376.pdf
English
null
<i>tert</i>-Butyl<i>N</i>-[(<i>S</i>)-1-hydrazinecarbonyl-2-hydroxyethyl]carbamate
Acta crystallographica. Section E
2,010
cc-by
3,480
Alessandra C. Pinheiro,a Marcus V. N. de Souza,b Solange M. S. V. Wardell,c James L. Wardelld‡ and Edward R. T. Tiekinke* aInstituto de Tecnologia em Farmacos, Fundac¸a˜o Oswaldo Cruz (FIOCRUZ), FarManguinhos, Rua Sizenando Nabuco, 100, Manguinhos, 21041-250 Rio de Janeiro, RJ, Brazil, bInstituto de Tecnologia em Farmacos, Fundac¸a˜o Oswaldo Cruz (FIOCRUZ), FarManguinhos, Rua Sizenando Nabuco, 100, Manguinhos, 21041-250 Rio de Janeiro, RJ, Brazil, cCHEMSOL, 1 Harcourt Road, Aberdeen AB15 5NY, Scotland, dCentro de Desenvolvimento Tecnolo´gico em Sau´de (CDTS), Fundac¸a˜o Oswaldo Cruz (FIOCRUZ), Casa Amarela, Campus de Manguinhos, Av. Brasil 4365, 21040-900 Rio de Janeiro, RJ, Brazil, and eDepartment of Chemistry, University of Malaya, 50603 Kuala Lumpur, Malaysia Table 1 Hydrogen-bond geometry (A˚ , ). D—H  A D—H H  A D  A D—H  A O2—H1o  N1i 0.84 (3) 1.94 (3) 2.776 (4) 174 (5) N1—H1n  O2i 0.91 (3) 2.24 (3) 3.121 (4) 162 (4) N1—H2n  O1ii 0.91 (1) 2.29 (2) 3.070 (4) 144 (3) N2—H3n  O1iii 0.88 (2) 2.18 (2) 2.985 (4) 152 (3) N3—H4n  O3iv 0.88 (1) 2.02 (1) 2.892 (4) 172 (3) Symmetry codes: (i) x; y þ 1 2; z þ 1; (ii) x þ 1; y  1 2; z þ 1; (iii) x; y  1; z; (iv) x; y þ 1; z. Correspondence e-mail: edward.tiekink@gmail.com Received 25 March 2010; accepted 25 March 2010 Key indicators: single-crystal X-ray study; T = 120 K; mean (C–C) = 0.004 A˚; R factor = 0.046; wR factor = 0.149; data-to-parameter ratio = 9.3. In the title compound, C8H17N3O4, the dihedral angle between the hydrazinecarbonyl and carbamate groups is 44.94 (12), and the carbonyl groups are anti to each other. In the crystal, the hydroxy group forms an O—H  Na (a = amine) hydrogen bond and each of the four N—H atoms forms an N—H  O hydrogen bond; the hydrazinecarbonyl O atom accepts two such bonds. This results in two-dimensional arrays in the ab plane, mediated by the hydrogen bonding, sandwiched by tert- butyl groups. Data collection: COLLECT (Hooft, 1998); cell refinement: DENZO (Otwinowski & Minor, 1997) and COLLECT; data reduc- tion: DENZO and COLLECT; program(s) used to solve structure: SHELXS97 (Sheldrick, 2008); program(s) used to refine structure: SHELXL97 (Sheldrick, 2008); molecular graphics: ORTEP-3 (Farrugia, 1997) and DIAMOND (Brandenburg, 2006); software used to prepare material for publication: publCIF (Westrip, 2010). The use of the EPSRC X-ray crystallographic service at the University of Southampton, England, and the valuable assis- tance of the staff there is gratefully acknowledged. organic compounds b = 5.0074 (4) A˚ c = 16.2388 (15) A˚  = 94.483 (5) V = 561.57 (8) A˚ 3 Z = 2 Mo K radiation  = 0.10 mm1 T = 120 K 0.26  0.14  0.03 mm Data collection Nonius KappaCCD diffractometer Absorption correction: multi-scan (SADABS; Sheldrick, 2007) Tmin = 0.616, Tmax = 0.746 6687 measured reflections 1428 independent reflections 1168 reflections with I > 2(I) Rint = 0.062 Refinement R[F 2 > 2(F 2)] = 0.046 wR(F 2) = 0.149 S = 1.23 1428 reflections 154 parameters 6 restraints H atoms treated by a mixture of independent and constrained refinement max = 0.30 e A˚ 3 min = 0.34 e A˚ 3 Table 1 Hydrogen-bond geometry (A˚ , ). D—H  A D—H H  A D  A D—H  A O2—H1o  N1i 0.84 (3) 1.94 (3) 2.776 (4) 174 (5) N1—H1n  O2i 0.91 (3) 2.24 (3) 3.121 (4) 162 (4) N1—H2n  O1ii 0.91 (1) 2.29 (2) 3.070 (4) 144 (3) N2—H3n  O1iii 0.88 (2) 2.18 (2) 2.985 (4) 152 (3) N3—H4n  O3iv 0.88 (1) 2.02 (1) 2.892 (4) 172 (3) Symmetry codes: (i) x; y þ 1 2; z þ 1; (ii) x þ 1; y  1 2; z þ 1; (iii) x; y  1; z; (iv) x; y þ 1; z. Data collection: COLLECT (Hooft, 1998); cell refinement: DENZO (Otwinowski & Minor, 1997) and COLLECT; data reduc- Acta Crystallographica Section E Structure Reports Online ISSN 1600-5368 Acta Crystallographica Section E Structure Reports Online ISSN 1600-5368 Mo K radiation  = 0.10 mm1 T = 120 K 0.26  0.14  0.03 mm  = 94.483 (5) V = 561.57 (8) A˚ 3 Z = 2 T = 120 K 0.26  0.14  0.03 mm Data collection Nonius KappaCCD diffractometer Absorption correction: multi-scan (SADABS; Sheldrick, 2007) Tmin = 0.616, Tmax = 0.746 6687 measured reflections 1428 independent reflections 1168 reflections with I > 2(I) Rint = 0.062 Refinement R[F 2 > 2(F 2)] = 0.046 wR(F 2) = 0.149 S = 1.23 1428 reflections 154 parameters 6 restraints H atoms treated by a mixture of independent and constrained refinement max = 0.30 e A˚ 3 min = 0.34 e A˚ 3 Alessandra C. Pinheiro,a Marcus V. N. de Souza,b Solange M. S. V. Wardell,c James L. Wardelld‡ and Edward R. T. Tiekinke* JLW acknowledges support from CAPES and FAPEMIG (Brazil). Related literature For background to the use of serinyl compounds as potential anti-tuberculosis agents, see: Pinheiro et al. (2007). Experimental Crystal data C8H17N3O4 Mr = 219.25 Monoclinic, P21 a = 6.9274 (5) A˚ Brandenburg, K. (2006). DIAMOND. Crystal Impact GbR, Bonn, Germany. Farrugia, L. J. (1997). J. Appl. Cryst. 30, 565. Hooft, R. W. W. (1998). COLLECT. Nonius BV, Delft, The Netherlands. Otwinowski, Z. & Minor, W. (1997). Methods in Enzymology, Vol. 276, Macromolecular Crystallography, Part A, edited by C. W. Carter Jr & R. M. Sweet, pp. 307–326. New York: Academic Press. Pinheiro, A. C., Kaiser, C. R., Lourenc¸o, M. C. S., de Souza, M. V. N., Wardell, S. M. S. V. & Wardell, J. L. (2007). J. Chem. Res. pp. 180–184. Sheldrick, G. M. (2007). SADABS. Bruker AXS Inc., Madison, Wisconsin, USA. Sheldrick, G. M. (2008). Acta Cryst. A64, 112–122. Supplementary data and figures for this paper are available from the IUCr electronic archives (Reference: HB5376). tert-Butyl N-[(S)-1-hydrazinecarbonyl-2- hydroxyethyl]carbamate Alessandra C. Pinheiro,a Marcus V. N. de Souza,b Solange M. S. V. Wardell,c James L. Wardelld‡ and Edward R. T. Tiekinke* S1. Comment Continuing our interests in serinyl compounds as potential anti-tuberculosis agents (Pinheiro et al., 2007), we have prepared the title compound, tert-butyl N-[1(S)-1-(hydrazinecarbonyl)-2-hydroxyethyl]carbamate (I) from L-serine methyl ester hydrochloride, as a precursor of a series of tert-butyl N-(2-hydroxy-1-(S)-{N′-[(1E)-(2-aryl)methylidene]- hydrazinecarbonyl}ethyl)carbamates. We now report the syntheses and structure of (I). The molecular structure of (I), Fig. 1, is twisted with the dihedral angle formed between the least-squares planes through the hydrazinecarbonyl (r.m.s. deviation = 0.0045 Å) and carbamate (r.m.s. deviation = 0.021 Å) residues being 44.94 (12) °. The carbonyl-O1 and O3 atoms lie to opposite sides of the molecule as seen in the pseudo O1–C1···C4–O3 torsion angle of -176.7 (3) °. Finally, each of the N–H groups is anti to the adjacent carbonyl so that the N–H groups, too, lie to opposite sides of the molecule. Although the absolute structure could not be determined experimentally, the assignment of the S-configuration at the C2 atom is based on the starting reagents. There are five acidic H atoms in the structure, and each of these forms a significant hydrogen bonding interaction, Table 1. The hydroxyl-O2–H forms an O– H···N bond with the amino-N1 atom. The carbonyl-O1 atom accepts two N–H hydrogen bonds, one from the amino-N1 atom and the other from the hydrazine-N2. The second amino-N1–H atom forms a hydrogen bond with the hydroxyl-O2 atom, and, finally, the carbamate-N3–H interacts with the O3-carbonyl atom. The hydrogen bonds cooperate with each other to form a 2-D array in the ab plane, Fig. 2, and these stack along the c axis being sandwiched by the t-butyl groups, Fig. 3. Fig. 3. Fig. 3. tert-Butyl N-[(S)-1-hydrazinecarbonyl-2-hydroxyethyl]carbamate Alessandra C. Pinheiro, Marcus V. N. de Souza, Solange M. S. V. Wardell, James L. Wardell and Edward R. T. Tiekink S2. Experimental To a stirred ethanol solution (10 ml) of methyl (2S)-2-[(tert-butoxycarbonyl)amino]-3-hydroxypropanoate (0.3 g, 1.37 mmol), obtained from L-serine methyl ester hydrochloride and (BOC)2O, at room temperature was added N2H4.H2O (80%, 5.5 mmol). The reaction mixture was stirred for 24 hours at room temperature and concentrated under reduced pressure. The residue was columned chromatographed on silica gel using a gradient of 0 to 5% chloroform in methanol, affording the title compound as a white solid in 70% yield. The crystals used in the structural study were grown from EtOH solution, m. pt. 403–404 K. 1H NMR (500 MHz, DMSO-d6) δ (ppm): 9.02 (1H, s, NHNH2), 6.58 (1H, d, J = 8.2, NHCH), 4.81 (1H, t, J = 5.6, OH), 4.19 (2H, s, NHNH2), 3.93 (1H, m, CH), 3.60–3.40 (2H, m, CH2OH), 1.37 (9H, s, (CH3)3C). 13C NMR (125 MHz, DMSO-d6) δ (ppm): 169.7 (COCH), 155.1 (COO), 78.1 ((CH3)3C), 61.9 (CH2OH), 55.5 (CH), 28.2 ((CH3)3C). IR (cm-1, KBr): 3281 (O—H), 1699 (COCH), 1668 (COO). EM/ESI (m/z [M—H]-): 218.1. Experimental Experimental Monoclinic, P21 a = 6.9274 (5) A˚ Sheldrick, G. M. (2008). Acta Cryst. A64, 112–122. Westrip, S. P. (2010). publCIF. In preparation. ‡ Additional correspondence author, e-mail: j.wardell@abdn.ac.uk. o994 Pinheiro et al. Acta Cryst. (2010). E66, o994 doi:10.1107/S1600536810011438 supporting information Acta Cryst. (2010). E66, o994 [doi:10.1107/S1600536810011438] Acta Cryst. (2010). E66, o994 [doi:10.1107/S1600536810011438] Acta Cryst. (2010). E66, o994 [doi:10.1107/S1600536810011438] Acta Cryst. (2010). E66, o994 [doi:10.1107/S1600536810011438] supporting information Uiso(H) = 1.5Ueq(O). The N-bound H atoms were treated similarly with N–H = 0.880±0.001 and 0.910±0.001 Å, and with Uiso(H) = 1.2Ueq(N). In the absence of significant anomalous scattering effects, 1067 Friedel pairs were averaged in the final refinement. Figure 1 The molecular structure of (I) showing displacement ellipsoids at the 50% probability level. S3. Refinement The C-bound H atoms were geometrically placed (C–H = 0.98–1.00 Å) and refined as riding with Uiso(H) = 1.2-1.5Ueq(parent atom). The O-bound H atom was refined with the distance restraint O–H = 0.840±0.001, and with sup-1 Acta Cryst. (2010). E66, o994 supporting information Figure 1 Figure 1 The molecular structure of (I) showing displacement ellipsoids at the 50% probability level. g The molecular structure of (I) showing displacement ellipsoids at the 50% probability level. g The molecular structure of (I) showing displacement ellipsoids at the 50% probability level. sup-2 Acta Cryst. (2010). E66, o994 supporting information Figure 2 A view of a supramolecular array in (I) in the ab plane. The O–H···N and N–H···O hydrogen bonding interactions are shown as orange and blue dashed lines, respectively. Colour code: O, red; N, blue; C, grey; and H, green. Figure 2 Figure 2 g A view of a supramolecular array in (I) in the ab plane. The O–H···N and N–H···O hydrogen bonding interactions are shown as orange and blue dashed lines, respectively. Colour code: O, red; N, blue; C, grey; and H, green. g A view of a supramolecular array in (I) in the ab plane. The O–H···N and N–H···O hydrogen bonding interactions are shown as orange and blue dashed lines, respectively. Colour code: O, red; N, blue; C, grey; and H, green. sup-3 Acta Cryst. (2010). E66, o994 supporting information e 3 w of the crystal packing in (I) in projection down the b axis, showing the stacking of layers. The O–H···N and N– Figure 3 g A view of the crystal packing in (I) in projection down the b axis, showing the stacking of layers. The O–H···N and N– H···O hydrogen bonding interactions are shown as orange and blue dashed lines, respectively. Colour code: O, red; N, blue; C, grey; and H, green. tert-Butyl N-[(S)-1-hydrazinecarbonyl-2-hydroxyethyl]carbamate sup 4 A t C t (2010) E66 994 Crystal data C8H17N3O4 Mr = 219.25 Monoclinic, P21 Hall symbol: P 2yb a = 6.9274 (5) Å b = 5.0074 (4) Å c = 16.2388 (15) Å β = 94.483 (5)° V = 561.57 (8) Å3 Z = 2 F(000) = 236 Dx = 1.297 Mg m−3 Mo Kα radiation, λ = 0.71073 Å Cell parameters from 10838 reflections Crystal data C8H17N3O4 Mr = 219.25 Monoclinic, P21 Hall symbol: P 2yb a = 6.9274 (5) Å b = 5.0074 (4) Å c = 16.2388 (15) Å β = 94.483 (5)° V = 561.57 (8) Å3 Z = 2 F(000) = 236 Dx = 1.297 Mg m−3 Mo Kα radiation, λ = 0.71073 Å Cell parameters from 10838 reflections sup-4 Acta Cryst. (2010). E66, o994 supporting information θ = 2.9–27.5° µ = 0.10 mm−1 T = 120 K Data collection Nonius KappaCCD diffractometer Radiation source: Enraf–Nonius FR591 rotating anode 10 cm confocal mirrors monochromator Detector resolution: 9.091 pixels mm-1 φ and ω scans Absorption correction: multi-scan (SADABS; Sheldrick, 2007) Refinement Refinement on F2 Least-squares matrix: full R[F2 > 2σ(F2)] = 0.046 wR(F2) = 0.149 S = 1.23 1428 reflections 154 parameters 6 restraints Primary atom site location: structure-invariant direct methods Plate, colourless 0.26 × 0.14 × 0.03 mm Plate, colourless 0.26 × 0.14 × 0.03 mm Tmin = 0.616, Tmax = 0.746 6687 measured reflections 1428 independent reflections 1168 reflections with I > 2σ(I) Rint = 0.062 θmax = 27.5°, θmin = 3.0° h = −8→8 k = −6→6 l = −21→18 Secondary atom site location: difference Fourier map Hydrogen site location: inferred from neighbouring sites H atoms treated by a mixture of independent and constrained refinement w = 1/[σ2(Fo2) + (0.0838P)2] where P = (Fo2 + 2Fc2)/3 (Δ/σ)max = 0.001 Δρmax = 0.30 e Å−3 Δρmin = −0.34 e Å−3 Absolute structure: nd H atoms treated by a mixture of independent and constrained refinement w = 1/[σ2(Fo2) + (0.0838P)2] where P = (Fo2 + 2Fc2)/3 (Δ/σ)max = 0.001 Δρmax = 0.30 e Å−3 Δρmin = −0.34 e Å−3 Absolute structure: nd Acta Cryst. (2010). E66, o994 Special details Geometry. All s.u.'s (except the s.u. in the dihedral angle between two l.s. planes) are estimated using the full covariance matrix. The cell s.u.'s are taken into account individually in the estimation of s.u.'s in distances, angles and torsion angles; correlations between s.u.'s in cell parameters are only used when they are defined by crystal symmetry. An approximate (isotropic) treatment of cell s.u.'s is used for estimating s.u.'s involving l.s. planes. Refinement. Refinement of F2 against ALL reflections. The weighted R-factor wR and goodness of fit S are based on F2, conventional R-factors R are based on F, with F set to zero for negative F2. The threshold expression of F2 > 2σ(F2) is used only for calculating R-factors(gt) etc. and is not relevant to the choice of reflections for refinement. R-factors based on F2 are statistically about twice as large as those based on F, and R- factors based on ALL data will be even larger. Fractional atomic coordinates and isotropic or equivalent isotropic displacement parameters (Å2) x y z Uiso*/Ueq O1 0.2906 (3) 0.6236 (5) 0.55336 (15) 0.0226 (6) O2 −0.0983 (3) 0.3069 (5) 0.64307 (16) 0.0245 (6) H1O −0.149 (6) 0.452 (5) 0.627 (3) 0.037* O3 0.4633 (4) −0.1207 (6) 0.74118 (17) 0.0298 (7) O4 0.6317 (3) 0.2100 (5) 0.81155 (14) 0.0223 (6) N1 0.2779 (4) 0.2663 (6) 0.42051 (18) 0.0223 (7) H1N 0.205 (5) 0.414 (5) 0.409 (3) 0.027* H2N 0.4053 (15) 0.288 (9) 0.412 (2) 0.027* N2 0.2663 (4) 0.1984 (5) 0.50498 (18) 0.0198 (6) H3N 0.230 (5) 0.033 (3) 0.513 (2) 0.024* N3 0.4237 (4) 0.3155 (5) 0.70510 (18) 0.0207 (6) l atomic coordinates and isotropic or equivalent isotropic displacement parameters (Å2) Fractional atomic coordinates and isotropic or equivalent isotropic displacement parameters (Å2) x y z Uiso*/Ueq sup-5 Acta Cryst. (2010). E66, o994 supporting information supporting information supporting information H4N 0.429 (6) 0.485 (2) 0.720 (2) 0.025* C1 0.2715 (4) 0.3813 (8) 0.5650 (2) 0.0181 (7) C2 0.2480 (4) 0.2659 (8) 0.65093 (19) 0.0182 (7) H2 0.2267 0.0688 0.6460 0.022* C3 0.0743 (2) 0.3924 (5) 0.68777 (11) 0.0213 (7) H3A 0.0723 0.3398 0.7465 0.026* H3B 0.0842 0.5894 0.6852 0.026* C4 0.5023 (2) 0.1141 (5) 0.75191 (11) 0.0193 (7) C5 0.7406 (2) 0.0190 (5) 0.86737 (11) 0.0218 (7) C6 0.8669 (2) 0.2032 (5) 0.92338 (11) 0.0317 (9) H6A 0.9567 0.3001 0.8904 0.047* H6B 0.9406 0.0969 0.9657 0.047* H6C 0.7847 0.3310 0.9501 0.047* C7 0.6005 (6) −0.1336 (9) 0.9179 (2) 0.0300 (8) H7A 0.5109 −0.0078 0.9411 0.045* H7B 0.6735 −0.2291 0.9629 0.045* H7C 0.5272 −0.2620 0.8823 0.045* C8 0.8656 (5) −0.1602 (7) 0.8176 (2) 0.0246 (8) H8A 0.7860 −0.3046 0.7922 0.037* H8B 0.9705 −0.2366 0.8542 0.037* H8C 0.9207 −0.0549 0.7743 0.037* Atomic displacement parameters (Å2) U11 U22 U33 U12 U13 U23 O1 0.0269 (12) 0.0135 (13) 0.0271 (14) −0.0025 (11) −0.0007 (10) 0.0009 (10) O2 0.0192 (12) 0.0197 (14) 0.0342 (14) 0.0009 (10) −0.0008 (10) 0.0023 (11) O3 0.0372 (13) 0.0126 (13) 0.0370 (15) −0.0006 (12) −0.0138 (11) 0.0009 (11) O4 0.0314 (12) 0.0113 (12) 0.0230 (12) 0.0012 (10) −0.0066 (10) 0.0013 (10) N1 0.0214 (14) 0.0213 (17) 0.0241 (15) −0.0002 (12) 0.0013 (12) −0.0001 (13) N2 0.0235 (14) 0.0133 (13) 0.0225 (15) −0.0017 (12) 0.0015 (11) 0.0000 (13) N3 0.0231 (13) 0.0110 (14) 0.0272 (15) −0.0018 (12) −0.0031 (12) −0.0014 (13) C1 0.0143 (13) 0.0129 (16) 0.0266 (18) 0.0004 (13) −0.0010 (12) 0.0017 (15) C2 0.0182 (15) 0.0140 (17) 0.0215 (17) −0.0020 (13) −0.0032 (13) −0.0013 (13) C3 0.0225 (15) 0.0165 (16) 0.0252 (17) −0.0019 (15) 0.0030 (13) −0.0005 (14) C4 0.0212 (15) 0.0121 (17) 0.0243 (18) −0.0008 (14) −0.0001 (13) 0.0004 (13) C5 0.0291 (18) 0.0122 (16) 0.0231 (18) 0.0020 (15) −0.0036 (14) 0.0027 (14) C6 0.042 (2) 0.0165 (18) 0.033 (2) 0.0034 (17) −0.0155 (17) −0.0002 (17) C7 0.0403 (19) 0.022 (2) 0.028 (2) 0.0061 (18) 0.0032 (16) 0.0026 (16) C8 0.0285 (16) 0.0156 (19) 0.0296 (19) 0.0021 (15) 0.0011 (14) 0.0029 (15) Geometric parameters (Å, º) O1—C1 1.236 (4) C2—H2 1.0000 O2—C3 1.416 (3) C3—H3A 0.9900 O2—H1O 0.84 (3) C3—H3B 0.9900 O3—C4 1.216 (3) C5—C8 1.523 (4) O4—C4 1.355 (3) C5—C6 1.523 (3) Geometric parameters (Å, º) O1—C1 1.236 (4) C2—H2 1.0000 O2—C3 1.416 (3) C3—H3A 0.9900 O2—H1O 0.84 (3) C3—H3B 0.9900 O3—C4 1.216 (3) C5—C8 1.523 (4) O4—C4 1.355 (3) C5—C6 1.523 (3) sup-6 supporting information O4—C5 1.482 (3) C5—C7 1.525 (4) N1—N2 1.421 (4) C6—H6A 0.9800 N1—H1N 0.91 (3) C6—H6B 0.9800 N1—H2N 0.911 (13) C6—H6C 0.9800 N2—C1 1.336 (5) C7—H7A 0.9800 N2—H3N 0.878 (18) C7—H7B 0.9800 N3—C4 1.352 (3) C7—H7C 0.9800 N3—C2 1.466 (4) C8—H8A 0.9800 N3—H4N 0.883 (14) C8—H8B 0.9800 C1—C2 1.531 (5) C8—H8C 0.9800 C2—C3 1.523 (4) C3—O2—H1O 102 (3) O3—C4—O4 124.9 (2) C4—O4—C5 119.0 (2) N3—C4—O4 110.6 (2) N2—N1—H1N 109 (3) O4—C5—C8 109.80 (19) N2—N1—H2N 107 (2) O4—C5—C6 102.46 (12) H1N—N1—H2N 114 (4) C8—C5—C6 110.49 (15) C1—N2—N1 122.7 (3) O4—C5—C7 109.8 (2) C1—N2—H3N 122 (3) C8—C5—C7 113.7 (2) N1—N2—H3N 114 (3) C6—C5—C7 109.99 (17) C4—N3—C2 119.3 (3) C5—C6—H6A 109.5 C4—N3—H4N 124 (3) C5—C6—H6B 109.5 C2—N3—H4N 110 (3) H6A—C6—H6B 109.5 O1—C1—N2 123.9 (3) C5—C6—H6C 109.5 O1—C1—C2 122.0 (3) H6A—C6—H6C 109.5 N2—C1—C2 114.0 (3) H6B—C6—H6C 109.5 N3—C2—C3 109.8 (2) C5—C7—H7A 109.5 N3—C2—C1 109.9 (3) C5—C7—H7B 109.5 C3—C2—C1 110.2 (2) H7A—C7—H7B 109.5 N3—C2—H2 109.0 C5—C7—H7C 109.5 C3—C2—H2 109.0 H7A—C7—H7C 109.5 C1—C2—H2 109.0 H7B—C7—H7C 109.5 O2—C3—C2 109.54 (19) C5—C8—H8A 109.5 O2—C3—H3A 109.8 C5—C8—H8B 109.5 C2—C3—H3A 109.8 H8A—C8—H8B 109.5 O2—C3—H3B 109.8 C5—C8—H8C 109.5 C2—C3—H3B 109.8 H8A—C8—H8C 109.5 H3A—C3—H3B 108.2 H8B—C8—H8C 109.5 O3—C4—N3 124.4 (2) N3—H4N 0.883 (14) C8—H8B 0.9800 C1—C2 1.531 (5) C8—H8C 0.9800 C2—C3 1.523 (4) C3—O2—H1O 102 (3) O3—C4—O4 124.9 (2) C4—O4—C5 119.0 (2) N3—C4—O4 110.6 (2) N2—N1—H1N 109 (3) O4—C5—C8 109.80 (19) N2—N1—H2N 107 (2) O4—C5—C6 102.46 (12) H1N—N1—H2N 114 (4) C8—C5—C6 110.49 (15) C1—N2—N1 122.7 (3) O4—C5—C7 109.8 (2) C1—N2—H3N 122 (3) C8—C5—C7 113.7 (2) N1—N2—H3N 114 (3) C6—C5—C7 109.99 (17) C4—N3—C2 119.3 (3) C5—C6—H6A 109.5 C4—N3—H4N 124 (3) C5—C6—H6B 109.5 C2—N3—H4N 110 (3) H6A—C6—H6B 109.5 O1—C1—N2 123.9 (3) C5—C6—H6C 109.5 O1—C1—C2 122.0 (3) H6A—C6—H6C 109.5 N2—C1—C2 114.0 (3) H6B—C6—H6C 109.5 N3—C2—C3 109.8 (2) C5—C7—H7A 109.5 N3—C2—C1 109.9 (3) C5—C7—H7B 109.5 C3—C2—C1 110.2 (2) H7A—C7—H7B 109.5 N3—C2—H2 109.0 C5—C7—H7C 109.5 C3—C2—H2 109.0 H7A—C7—H7C 109.5 C1—C2—H2 109.0 H7B—C7—H7C 109.5 O2—C3—C2 109.54 (19) C5—C8—H8A 109.5 O2—C3—H3A 109.8 C5—C8—H8B 109.5 C2—C3—H3A 109.8 H8A—C8—H8B 109.5 O2—C3—H3B 109.8 C5—C8—H8C 109.5 C2—C3—H3B 109.8 H8A—C8—H8C 109.5 H3A—C3—H3B 108.2 H8B—C8—H8C 109.5 O3—C4—N3 124.4 (2) Hydrogen-bond geometry (Å, º) D—H···A D—H H···A D···A D—H···A O2—H1o···N1i 0.84 (3) 1.94 (3) 2.776 (4) 174 (5) N1—H1n···O2i 0.91 (3) 2.24 (3) 3.121 (4) 162 (4) N1—H2n···O1ii 0.91 (1) 2.29 (2) 3.070 (4) 144 (3) Hydrogen-bond geometry (Å, º) D—H···A D—H H···A D···A D—H···A O2—H1o···N1i 0.84 (3) 1.94 (3) 2.776 (4) 174 (5) N1—H1n···O2i 0.91 (3) 2.24 (3) 3.121 (4) 162 (4) N1—H2n···O1ii 0.91 (1) 2.29 (2) 3.070 (4) 144 (3) sup-7 Acta Cryst. supporting information (2010). E66, o994 supporting information N2—H3n···O1iii 0.88 (2) 2.18 (2) 2.985 (4) 152 (3) N3—H4n···O3iv 0.88 (1) 2.02 (1) 2.892 (4) 172 (3) Symmetry codes: (i) −x, y+1/2, −z+1; (ii) −x+1, y−1/2, −z+1; (iii) x, y−1, z; (iv) x, y+1, z. supporting information N2—H3n···O1iii 0.88 (2) 2.18 (2) 2.985 (4) 152 (3) N3—H4n···O3iv 0.88 (1) 2.02 (1) 2.892 (4) 172 (3) Symmetry codes: (i) −x, y+1/2, −z+1; (ii) −x+1, y−1/2, −z+1; (iii) x, y−1, z; (iv) x, y+1, z. N2—H3n···O1iii N3—H4n···O3iv Symmetry codes: (i) −x, y+1/2, −z+1; (ii) −x+1, y−1/2, −z+1; (iii) x, y−1, z; (iv) x, y+1, z. sup-8 Acta Cryst. (2010). E66, o994
https://openalex.org/W4285381934
https://usv.ro/fisiere_utilizator/file/fefs/revista/vol_XIV_issue_1/20.%20QUALITY_OF_LIFE_IN_WOMEN_WITH_POSTMENOPAUSAL_OSTEOPOROSIS_DURING_THE_SARS-CoV-2_PANDEMIC_Holubiac_Iulian_%C8%98tefan.pdf
English
null
Quality of life in women with postmenopausal osteoporosis during the Sars-Cov-2 pandemic
Annals of the "Ştefan cel Mare" University. Physical Education and Sport Section. The Science and Art of Movement
2,021
cc-by-sa
2,017
Abstract Osteoporosis can affect the quality of life in women who suffer from this condition. The aim of the article was to observe the dynamics of quality of life from year to year among women with postmenopausal osteoporosis. Subjects included in the study completed the QUALEFFO- 41 questionnaire, a questionnaire specifically designed to measure quality of life. At the end of the study, worsening of the quality of life was observed in all areas covered by the QUALEFFO-41 questionnaire. Keywords: osteoporosis, quality of life, QUALEFFO-41, bone density Keywords: osteoporosis, quality of life, QUALEFFO-41, bone density Introduction Osteoporosis negatively affects patients' quality of life, by limiting their daily activities and independence. Chronic pain generated by osteoporosis can lead to anxiety, depression, frustration and social isolation. Back pain as a consequence of vertebral fractures has a significant impact on osteoporotic patients [11], [15], [8], [3], [17]. These pains to a greater or lesser extent hinder patients' ability to carry out their daily activities [20], [14]. Patients with back pain are sometimes unable to work [16], are limited in their social and recreational activities [9] and are emotionally stressed. The high number and severity of vertebral and hip fractures is associated with decreased quality of life [3], [17]. There are studies that confirm the need to exercise to improve the quality of life in people with osteoporosis [18], [2]; exercise plays an important role in improving cognitive function and mental health in the people concerned [19], [21], [4], [1], [7], [12], [13], [5], [6] increasing patients' confidence that they can independently perform daily tasks [22]. Methods QUALITY OF LIFE IN WOMEN WITH POSTMENOPAUSAL OSTEOPOROSIS DURING THE SARS-CoV-2 PANDEMIC Holubiac Iulian Ștefan Stefan cel Mare University of Suceava, Romania THE ANNALS OF THE "STEFAN CEL MARE" UNIVERSITY ISSN – 1844 – 9131, eISSN 2601 – 341X Volum XIV issue 1/ 2021 THE ANNALS OF THE "STEFAN CEL MARE" UNIVERSITY ISSN – 1844 – 9131, eISSN 2601 – 341X Volum XIV issue 1/ 2021 THE ANNALS OF THE "STEFAN CEL MARE" UNIVERSITY ISSN – 1844 – 9131, eISSN 2601 – 341X Volum XIV issue 1/ 2021 THE ANNALS OF THE "STEFAN CEL MARE" UNIVERSITY ISSN – 1844 – 9131, eISSN 2601 – 341X Volum XIV issue 1/ 2021 postmenopausal osteoporosis. Thirty women with osteopenia / osteoporosis (53.8 ± 3.9 years) were included in the study. A questionnaire for quality of life assessment (QUALEFFO-41) was applied to them before the outbreak of the pandemic and after the relaxation of emergencies. A score as low as possible on the QUALEFFO-41 test represents a better quality of life, while a high result represents a lower quality of life. Subjects did not participate in any exercise program during this period. The results obtained were interpreted using the SPSS program (v. 26). The Shapiro-Wilk test was performed for data distribution, and non-parametric Wilcoxon test was performed to compare the initial and final results. This questionnaire includes 41 questions, including six visual scales, covering the areas: pain, daily activities, activities carried out around the household, mobility, social activities, perception of general health and mental function. Methods The aim of the article is to highlight the effects of sedentary lifestyle on the quality of life in women with osteopenia / 146 Results and discussions For the pain domain, subjects experienced a worsening (Δ% = 32.07%) at the end of the study (M = 52.17, SD = 19.42), compared to the initial test (M = 39.50, SD = 18.54), the nonparametric Wilcoxon test showing that the difference is statistically insignificant, Z = -2.57, p = .010, r = 0.47. Also statistically significant was the difference observed for the ADL domain, where there was a worsening of 32.61 percent at the end of the study (12.71 ± 5.56) compared to the initial testing (9.58 ± 4.26), Z = -2.87, p = .004, r = 0.52. Table 1. Baseline and Post-Testing Results For QUALEFFO-41 Pre Post p ES Pain 39.50±18.54 52.17±19.42 .010 0.47 Activities of Daily Living 9.58±4.26 12.71±5.56 .004 0.52 Jobs Around the House 11.17±10.14 12.83±10.06 .013 0.45 Mobility 10.30±3.57 11.58±4.16 .017 0.52 Table 1. Baseline and Post-Testing Results For QUALEFFO-41 147 THE ANNALS OF THE "STEFAN CEL MARE" UNIVERSITY ISSN – 1844 – 9131, eISSN 2601 – 341X Volum XIV issue 1/ 2021 Leisure, Social Activities 58.42±6.06 62.84±4.91 .001 0.65 General Health Perception 45.83±16.63 58.89±8.74 .001 0.62 Mental Function 35.74±10.69 44.44±8.38 .001 0.64 Note. Results and represented as mean and standard deviation (±); ES = effect size. THE ANNALS OF THE "STEFAN CEL MARE" UNIVERSITY ISSN – 1844 – 9131, eISSN 2601 – 341X Volum XIV issue 1/ 2021 nonparametric Wilcoxon test showing that the difference is statistically significant, Z = -3.48, p < .001, r = 0.64. Conclusion In conclusion, the lack of exercise during the pandemic has greatly influenced the quality of life in patients with osteopenia / postmenopausal osteoporosis. THE ANNALS OF THE "STEFAN CEL MARE" UNIVERSITY ISSN – 1844 – 9131, eISSN 2601 – 341X Volum XIV issue 1/ 2021 Leisure, Social Activities 58.42±6.06 62.84±4.91 .001 0.65 General Health Perception 45.83±16.63 58.89±8.74 .001 0.62 Mental Function 35.74±10.69 44.44±8.38 .001 0.64 Note. Results and represented as mean and standard deviation (±); ES = effect size. Note. Results and represented as mean and standard deviation (±); ES = effect size. For Jobs Around the House domain, subjects recorded a 14.93 percent higher score after one year (12.83 ± 10.06) compared to the initial time (11.17 ± 10.14), Z = -2.49, p = .013, r = 0.45. p For the mobility field, the subjects registered a higher average at the final testing (M = 11.58, SD = 4.16) compared to the initial testing (M = 10.30, SD = 3.57), being an increase of 12.43%, the difference being statistically significant , Z = -2.83, p = .017, r = 0.52. And in the field of social activities, the subjects registered an increase of 7.58% at the end of the study (M = 62.84, SD = 4.91) compared to the initial testing (M = 58.42, SD = 6.06), the difference being statistically significant, Z = -3.56, p < .001, r = 0.65. Also, in the general health field, the subjects registered a statistically significant increase (Δ% = 28.49%), Z = -3.39, p = .001, r = 0.62. Figure 1. Pre and post-test results with a 95% confidence interval for the variables of the quality of life assessment questionnaire; The symbol (*) indicates intra-group difference (p < .05); The symbol (†) indicates intra-group difference (p < .001). Figure 1. Pre and post-test results with a 95% confidence interval for the variables of the quality of life assessment questionnaire; The symbol (*) indicates intra-group difference (p < .05); The symbol (†) indicates intra-group difference (p < .001). In the last domain (mental function), subjects experienced a worsening (Δ% = 24.35%) at the end of the study (M = 44.44, SD = 8.38) compared to the initial test (M = 35.74, SD = 10.69), the 148 THE ANNALS OF THE "STEFAN CEL MARE" UNIVERSITY ISSN – 1844 – 9131, eISSN 2601 – 341X Volum XIV issue 1/ 2021 nonparametric Wilcoxon test showing that the difference is statistically significant, Z = -3.48, p < .001, r = 0.64. nonparametric Wilcoxon test showing that the difference is statistically significant, Z = -3.48, p < .001, r = 0.64. References: [1] Ainsworth, B., Sternfeld, B., Slattery, M., Daguise, V., & Zahm, S. (1998). Physical activity and breast cancer: evaluation of physical activity assessment methods. Cancer, 83(3), 611-620. [2] Bonaiuti, D., Arioli, G., Diana, G., Franchignoni, F., Giustini, A., Monticone, M., . . . Maini, M. (2005). SIMFER rehabilitation treatment guidelines in postmenopausal and senile osteoporosis. Europa Medicophysica, 41(4), 315-337. [3] Boonen, S., Autier, P., Barette, M., Vanderschueren, D., Lips, P., & Haentjens, P. (2004). Functional outcome and quality of life following hip fracture in elderly women: a prospective controlled study. Osteoporosis International, 15(2), 87-94. y [4] Chlebowski, R. (2013). Nutrition and physical activity influence on breast cancer incidence and outcome. Breast, 22(2), S30-S37. [5] Curl, W. W. (2000). Aging and exercise: are they compatible in women? Clinical Orthopaedics and Related Research, 372, 151- 158. [6] DiPietro, L. (2001). Physical Activity in Aging: Changes in Patterns and Their Relationship to Health and Function. The Journals of Gerontology, 56(2), 13-22. [7] Eriksen, W., & Bruusgaard, D. (2004). Do physical leisure time activities prevent fatigue? A 15 month prospective study of nurses`aides. British Journal of Sports Medicine, 38(3), 331-336. [8] Fink, H. A., Ensrud, K. E., Nelson, D. B., Kerani, R. P., Schreiner, P. J., Zhao, Y., . . . Nevitt, M. C. (2003). Disability after clinical fracture in postmenopausal women with low bone density: the fracture intervention trial (FIT). Osteoporosis International, 14(1), 69-76. [9] Follick, M. J., Smith, T. W., & Ahern, D. K. (1985). The sickness impact profile: a global measure of disability in chronic low back pain. Pain, 21(1), 67-76. 149 THE ANNALS OF THE "STEFAN CEL MARE" UNIVERSITY ISSN – 1844 – 9131, eISSN 2601 – 341X Volum XIV issue 1/ 2021 THE ANNALS OF THE "STEFAN CEL MARE" UNIVERSITY ISSN – 1844 – 9131, eISSN 2601 – 341X Volum XIV issue 1/ 2021 [10] Gold, D. T., Stegmaier, K., Bales, C. W., Lyles, K. W., Westlund, R. E., & Drezner, M. K. (2009). Psychosocial Functioning and Osteoporosis in Late Life: Results of a Multidisciplinary Intervention. Journal of Womes's Health, 2(2), 149-155. [11] Hallberg, I., Rosenqvist, A. M., Kartous, L., Lofman, O., Wahlstrom, O., & Toss, G. (2004). Health-related quality of life after osteoporotic fractures. Osteoporosis International, 15(10), 834-841. [12] King, A., Oman, R., Brassington, G., Bliwise, D., & Haskell, W. (1997). Moderate-intensity exercise and self-rated quality of sleep in older adults. A randomized controlled trial. JAMA, 277(1), 32- 37. [13] McMurray, R., Ainsworth, B., Harrell, J., Griggs, T., & Williams, O. (1998). Is physical activity or aerobic power more influential on reducing cardiovascular disease risk factors? Medicine and Science in Sports and Exercise, 30(10), 1521-1529. [14] Nevitt, M. C., Ettinger, B., Black, D. M., Stone, K., Jamal, S. A., Ensrud, K., . . . Cummings, S. R. (1998). The Association of Radiographically Detected Vertebral Fractures with Back Pain and Function: A Prospective Study. Annals of Internal Medicine, 128(10), 793-800. [15] Oleksik, A. M., Ewing, S., Shen, W., Schoor, N. M., & Lips, P. (2005). Impact of incident vertebral fractures on health related quality of life (HRQOL) in postmenopausal women with prevalent vertebral fractures. Osteoporosis International, 16(8), 861-870. [16] Painter, J. R., Seres, J. L., & Newman, R. I. (1980). Assessing benefits of the pain center: Why some patients regress. Pain, 8(1), 101-113. [17] Papaioannou, A., Kennedy, C. C., Ioannidis, G., Sawka, A., Hopman, W. M., Pickard, L., . . . Adachi, J. D. (2009). The impact of incident fractures on health-related quality of life: 5 years of data from the Canadian Multicentre Osteoporosis Study. Osteoporosis International, 20(5), 703-714. [18] Papaioannou, A., Morin, S., Cheung, A. M., Atkinson, S., Brown, J. P., Feldman, S., . . . Leslie, W. D. (2010). 2010 clinical practice guidelines for the diagnosis and management of osteoporosis in Canada: summary. CMAJ, 182(17), 1864-1873. [19] Pines, A. (2009). Lifestyle and diet in postmenopausal women. Climacteric: The Journal of the International Menopause Society, 12(1), 62-65. 150 THE ANNALS OF THE "STEFAN CEL MARE" UNIVERSITY ISSN – 1844 – 9131, eISSN 2601 – 341X Volum XIV issue 1/ 2021 THE ANNALS OF THE "STEFAN CEL MARE" UNIVERSITY ISSN – 1844 – 9131, eISSN 2601 – 341X Volum XIV issue 1/ 2021 [20] Silverman, S. L., Minshall, M. E., Shen, W., Harper, K. D., & Xie, S. (2001). The relationship of health-related quality of life to prevalent and incident vertebral fractures in postmenopausal women with osteoporosis: results from the Multiple Outcomes of Raloxifene Evaluation Study. Arthritis & Rheumatology, 44(11), 2611-2619. [21] Takacs, J. (2014). Regular physical activity and mental health. The role of exercise in prevention and intervention of depressive disorders. Psychiatria Hungarica, 29(4), 386-397. [22] Villiers, T. d., Gass, M., Haines, C., Hall, J., Lobo, R., Pierroz, D., & Rees, M. (2013). Global Consensus Statement on menopausal hormone therapy. Maturitas, 74(4), 391-392. 151 151
https://openalex.org/W2044031753
https://europepmc.org/articles/pmc4409416?pdf=render
English
null
Polyandry in dragon lizards: inbred paternal genotypes sire fewer offspring
Ecology and evolution
2,015
cc-by
5,455
ª 2015 The Authors. Ecology and Evolution published by John Wiley & Sons Ltd. This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited. doi: 10.1002/ece3.1447 males or males with good genes (Tregenza and Wedell 2002; Bretman et al. 2009). But both experimental research and empirical research have shown that not all polyandrous females bias paternity against their relatives following copulation (e.g., lemon shark (Negaprion brevi- rostris), Feldheim et al. 2004; common shrews (Sorex araneus), Stockley 1997; and black field crickets, (Teleogryllus commodus), Jennions et al. 2004). Avoiding breeding with a close relative may therefore be unneces- sary if there is no cost. However, when breeding with close relatives imposes fitness costs (Keller 1998; Baer and Schmid-Hempel 1999; Frere et al. 2010; Walling et al. 2011; Nielsen et al. 2012), females may also be able to minimize inbreeding depression by biasing paternity Polyandry in dragon lizards: inbred paternal genotypes si fewer offspring Celine H. Frere1, Dani Chandrasoma2 & Martin J. Whiting2 1GeneCology Research Centre, University of the Sunshine Coast, Maroochydore DC, Sunshine Coast, Queensland 4558, Australia 2Department of Biological Sciences, Macquarie University, Sydney, New South Wales 2109, Australia Correspondence Correspondence Celine H. Frere, GeneCology Research Centre, University of the Sunshine Coast, Maroochydore DC, Qld 4558, Australia. Tel: +61 423 312 893; Fax: +61 7 5430 2881; Fax: +61 7 5430 2881; E-mail: cfrere@usc.edu.au Funding Information Permission to work in LNP was granted by the New South Wales Office of the Environment and Heritage (Scientific licence number S13165), and procedures were approved by the Macquarie University Animal Ethics Committee (ARA2010/35). This work was funded by Macquarie. Received: 3 November 2014; Revised: 1 February 2015; Accepted: 8 February 2015 Received: 3 November 2014; Revised: 1 February 2015; Accepted: 8 February 2015 Received: 3 November 2014; Revised: 1 Received: 3 November 2014; Revised: 1 February 2015; Accepted: 8 February 2015 Ecology and Evolution 2015; 5(8): 1686– 1692 Ecology and Evolution 2015; 5(8): 1686– 1692 doi: 10.1002/ece3.1447 Keywords Cryptic female choice, genetic benefits, genotype reconstruction, GERUD, inbreeding, polyandry, reptile, sexual selection, sperm competition. Multiple mating in female animals is something of a paradox because it can either be risky (e.g., higher probability of disease transmission, social costs) or provide substantial fitness benefits (e.g., genetic bet hedging whereby the likeli- hood of reproductive failure is lowered). The genetic relatedness of parental units, particularly in lizards, has rarely been studied in the wild. Here, we examined levels of multiple paternity in Australia’s largest agamid lizard, the eastern water dragon (Intellagama lesueurii), and determined whether male reproductive success is best explained by its heterozygosity coefficient or the extent to which it is related to the mother. Female polyandry was the norm: 2/ 22 clutches (9.2%) were sired by three or more fathers, 17/22 (77.2%) were sired by two fathers, and only 3/22 (13.6%) clutches were sired by one father. Moreover, we reconstructed the paternal genotypes for 18 known mother–off- spring clutches and found no evidence that females were favoring less related males or that less related males had higher fitness. However, males with greater heterozygosity sired more offspring. While the postcopulatory mechanisms underlying this pattern are not understood, female water dragons likely repre- sent another example of reproduction through cryptic means (sperm selection/ sperm competition) in a lizard, and through which they may ameliorate the effects of male-driven precopulatory sexual selection. Introduction Over the past four decades, experimental and empirical research has generated a large body of evidence for the genetic benefits of polyandry (Baer and Schmid-Hempel 1999; Fisher et al. 2006; Eizaguirre et al. 2007; Klemme et al. 2008; Gowaty et al. 2010). From these studies, we have learnt that when females mate with multiple males, it may increase their fitness (Tregenza and Wedell 1998; Fisher and Lara 1999; Byrne and Whiting 2008) and that of their offspring (Klemme et al. 2008; Firman 2011). An adaptive but largely untested explanation for polyandry is that females minimize inbreeding depression by biasing fertilization toward sperm from genetically compatible 1686 C. H. Frere et al. Polyandry in Dragon Lizards toward more heterozygous males. This hypothesis requires testing across a broad spectrum of taxa. display elaborate mating and social behaviors. Males dis- play alternative mating tactics (ARTs), switching between either aggressively defending a territory or adopting satel- lite behavior (Baird et al. 2012). They are also highly social and show nonrandom patterns of association within and between sexes that are independent of relatedness (Strick- land et al. 2014). The strongest bonds are found between females although males do form strong associations with females and both sexes at times avoid members of the same and opposite sex (Strickland et al. 2014). Female polyandry in reptiles is particularly common, yet our understanding of its potential benefits remains limited (Uller 2008; Uller and Olsson 2008; Keogh et al. 2013). Typically, females that mate with multiple males stand to gain either direct or indirect benefits, although there is currently no evidence for direct benefits in lizards (Uller and Olsson 2008). Additionally, most reptiles lack parental care and, as such, benefits of female polyandry are believed to have evolved as a mechanism to minimize inbreeding, minimize genetic incompatibility, and maximize the genetic quality and/or diversity of mates (Uller and Olsson 2008). While a few reptilian studies have shown that mul- tiple mating enhances female fitness (Madsen et al. 1992; Olsson et al. 1994; Eizaguirre et al. 2007; Noble et al. 2013), only one study thus far has shown that male siring success correlated with the extent of genetic relatedness to the mother (Olsson et al. 1996). In the European sand liz- ard, females are promiscuous and mate with males as they encounter them. Introduction Because of the obvious risks of mating with a relative, especially given that relatedness may increase with spatial proximity, females are able to dis- criminate sperm and bias fertilization toward less closely related males (Olsson et al. 1994, 2004). Study system The eastern water dragon is a long-lived, large, semi-aqua- tic diurnal agamid lizard native to the east coast of Austra- lia (Thompson 1993). They often retreat to water when threatened and either sleep submerged up to their necks or on branches overhanging water (Courtice 1981; Thompson 1993). Males are larger (snout-vent length) than females, have relatively larger heads, and are conspicuously red ventrally, beginning in the neck region and including the limbs (Cuervo and Shine 2007). Eastern water dragons Study site We studied water dragons in Lane Cove National Park (LNP), which is situated in a bushland valley in northern metropolitan Sydney, Australia. The Lane Cove River courses through LNP and most water dragons occur within close proximity of the shoreline. The vegetation in the park consists mainly of casurina (Casurina glauca) woodlands along the riverbanks, isolated patches of Syd- ney blue gum (Eucalyptus saligna) forest, or areas con- taining a combination of blackbutt (E. pilularis), turpentine (Syncarpia glomulifera), and blue gum. The riverbank varies from densely vegetated to open, cleared areas consisting of wood chips and logs. We conducted fieldwork along 2 km of river in LNP (beginning: 33°47029.54″S, 151° 9020.40″E, end: 33°47012.84″S, long: 151° 8053.20″E) from September 2010 to January 2012. Males establish territories along the riverbank, which is typically in close proximity to walking trails or picnic areas; consequently, they were accustomed to humans and allowed relatively close approach (ca. 2–10 m). Evolutionary theory predicts that females should favor males that are more distantly related and therefore either genetically dissimilar or genetically more compatible (e.g., (Slatyer et al. 2012). Unfortunately, very few studies have examined the link between parental relatedness and fitness in polyandrous systems. This is particularly true for lizards: With the exception of the sand lizard (Lacerta agi- lis), we have a remarkably poor understanding of repro- ductive success as a simple function of genetic relatedness between parents. Here, we investigated the extent of mul- tiple paternity in the eastern water dragon (Intellagama lesueurii) and examined whether male siring success cor- related with (1) its heterozygosity coefficient and/or (2) its extent of relatedness to the mother. Sample collection We collected blood samples from the caudal veins of 143 adult eastern water dragons and tail samples (ca. 3– 5 mm) from 169 offspring from 22 clutches. (Eastern water dragons have tails that are much longer than the body and are particularly thin in babies. Tail tips are frag- ile and break naturally as they grow.) Mothers were known for 18 clutches because we brought late-term gravid females into captivity and kept them in outdoor enclosures until they gave birth. The eggs were then incu- bated in the laboratory in damp river sand within plastic containers and checked daily. Blood sample was stored in 90% ethanol, and tail samples were stored in 75% etha- nol. Adults were caught by noosing or by hand. Microsatellite analysis We extracted DNA from tissue and blood samples using QIAGEN DNeasy extraction kit l (Qiagen, Shanghai, 1687 1687 ª 2015 The Authors. Ecology and Evolution published by John Wiley & Sons Ltd. C. H. Frere et al. Polyandry in Dragon Lizards China). Adults and offspring genotypes were obtained using nine microsatellite loci developed for eastern water dragons (Frere et al. 2011; : EWD6, 15, 16, 24, 34, 46, 51, 62 and 69). PCR amplification procedures and conditions also followed Frere et al. (2011). All loci were found to be in Hardy–Weinberg equilibrium (HWE), and no link- age disequilibrium was detected. Loci were examined for patterns consistent with null alleles using Microchecker (The University of Hull, Hull, UK) (Frere et al. 2011), and no loci had null alleles. of parental relatedness and heterozygosity should not apply given that paternal genotypes used in this study were not identified using paternity analyses (Wang 2010) but were reconstructed using the maternal and offspring genotypes as described above. This allowed us to test whether the degree of parental genetic relatedness and paternal inbreeding had an impact on who sired the most offspring within a clutch. Male reproductive success (Rs) was measure by the number of sired offspring divided by clutch size. We investigated the relationship between Rs and the degree of parental genetic relatedness and pater- nal inbreeding fitting a generalized linear model (GLM) using a binomial distribution. To account for heterogene- ity, we weighted the model by clutch size. Assessing multiple paternity using paternal genotype reconstruction To test for multiple paternity across our 22 clutches (18 with known mothers and 5 with unknown mothers), we used the program GERUD2.0 (Jones 2005). The exclusion probabilities for all nine microsatellites can be found in Table 1. GERUD2.0 determines the minimum number of father combinations to explain a given array of mother– offspring and ranks them by calculating their relative probabilities using patterns of Mendelian segregation and genotype frequencies measured from the population (in our case n = 143 adults). Using the most likely minimum-father combination, Gerud2.0 was used to reconstruct the paternal genotypes for the 18 known mother–offspring clutches. In addition, we investigated whether the probability of encounters between close paternal and maternal kin increased with geographic proximity. This is because we hypothesized that if females have high chances of encoun- tering close kin of the opposite sex, then this may influ- ence the evolution of inbreeding avoidance mechanisms. We examined this possibility by investigating whether geographic proximity measured by the distance between captured locations correlated with pairwise relatedness measures calculated as above. ª 2015 The Authors. Ecology and Evolution published by John Wiley & Sons Ltd. 688 ª 2015 The Authors. Ecology and Evolution publishe Discussion Figure 1. Significant relationship between males’ reproductive success (Rs) and their inbreeding coefficient (F). Rs was measured by dividing the number of sired offspring by the size of the clutch. Significance was assessed using GLM with binomial distribution. In this analysis, only clutches with known mothers were used (n = 18). From these, we used GERUD 2.0 to deduct the paternal genotype. When GERUD 2.0 assigned multiple sires to a clutch, we used the most likely minimum-father combination to assign paternal genotypes to clutch (see Table 2 for exclusion probabilities). Figure 1. Significant relationship between males’ reproductive success (Rs) and their inbreeding coefficient (F). Rs was measured by dividing the number of sired offspring by the size of the clutch. Significance was assessed using GLM with binomial distribution. In this analysis, only clutches with known mothers were used (n = 18). From these, we used GERUD 2.0 to deduct the paternal genotype. When GERUD 2.0 assigned multiple sires to a clutch, we used the most likely minimum-father combination to assign paternal genotypes to clutch (see Table 2 for exclusion probabilities). Here, we present evidence that polyandrous female east- ern water dragons bias fertilization toward sperm from more heterozygous males rather than less genetically related males. This is consistent with findings from other systems such as splendid fairy-wrens (Malurus splendens) (Keith et al. 2005), sand lizards (Olsson et al. 1996), and eastern chipmunks (Tamias striatus) (Bergeron et al. 2011). Female mate choice for more heterozygous males Table 2. Presence of multiple paternity in the 22 clutches of eastern water dragons measured using GERUD 2.0. Statistical analysis When GERUD 2.0 assigned multiple sires to a clutch, we used the most likely minimum-father combination to assign paternal genotypes to clutch (see Table 2 for exclusion probabilities). Statistical analysis Paternal genotype reconstruction analysis conducted in GERUD2.0 (exclusion probability over all loci = 0.99, see Table 1) allowed us to find strong evidence for multiple paternity in eastern water dragons with 13.6% (3/22) of clutches sired by a minimum of one father, 77.2% (17/ 22) of clutches sired by a minimum of two fathers, and 9.2% (2/22) of clutches sired by a minimum of three fathers (see Table 2 for details). We used the maternal and reconstructed paternal geno- types in COANCESTRY (V1.0.1.1) (Wang 2011) to mea- sure relatedness estimates between the maternal and paternal genotypes using Wang (Wang 2002) and the degree of paternal inbreeding coefficient (F) using Ritland (Ritland 1996). Here, the biases introduced when the same markers are used to assign paternity and estimates Table 1. Measures of genetic diversity of the nine microsatellite loci derived from the 143 adults used in this study. All loci were found to be in Hardy–Weinberg equilibrium, and no linkage disequilibrium was detected. Locus Number of Alleles Observed Heterozygosity Expected Heterozygosity Exclusion Probability EWD 34 12 0.826 0.831 0.67 EWD 6 4 0.470 0.461 0.25 EWD 15 6 0.134 0.133 0.06 EWD 16 10 0.772 0.789 0.62 EWD 24 13 0.792 0.847 0.70 EWD 46 4 0.591 0.653 0.40 EWD 51 9 0.805 0.744 0.52 EWD 62 20 0.836 0.841 0.78 EWD 69 15 0.852 0.858 0.72 Over all loci 93 0.675 0.693 0.99 versity of the nine microsatellite loci derived from the 143 adults used in this study. All loci were found to be in no linkage disequilibrium was detected. Table 1. Measures of genetic diversity of the nine microsatellite loci derived from the 143 adults used in this study. All lo Hardy–Weinberg equilibrium, and no linkage disequilibrium was detected. ª 2015 The Authors. Ecology and Evolution published by John Wiley & Sons Ltd. 1688 C. H. Frere et al. Polyandry in Dragon Lizards 0 1 2 3 4 5 0.2 0.4 0.6 0.8 1.0 Inbreeding coefficient (F) Males reproductive success (Rs) Figure 1. Significant relationship between males’ reproductive success (Rs) and their inbreeding coefficient (F). Rs was measured by dividing the number of sired offspring by the size of the clutch. Significance was assessed using GLM with binomial distribution. In this analysis, only clutches with known mothers were used (n = 18). From these, we used GERUD 2.0 to deduct the paternal genotype. The relationship between male reproductive success and heterozygosity, partner relatedness, and spatial overlap 0 1 2 3 4 5 0.2 0.4 0.6 0.8 1.0 Inbreeding coefficient (F) Males reproductive success (Rs) We found a male’s reproductive success (number of sired offspring/clutch size) significantly correlated with their inbreeding coefficient (GLM with binomial distribution: average effect = 0.3402, SE = 0.11, z-value = 3.068, P = 0.002). The more heterozygous males were, the more the offspring they sired (Fig. 1). However, we did not find that males who sired the most offspring within a clutch were more distantly related to the females than males who sired fewer offspring. The extent of genetic similarity between male and female dragons was unrelated to spatial proximity at LNP based on capture locations (Fig. 2). Inbreeding coefficient (F) nd Evolution published by John Wiley & Sons Ltd. 1689 ª 2015 The Authors. Ecology and Evolution published by John Wiley & Sons Ltd. 1689 Discussion For example, a series of mating experiments in the promiscuous skink Eulamprus heatwolei found no evidence for indirect benefits and the most parsimonious explanation for polyandry was high male encounter rates coupled with low mating costs for females (Keogh et al. 2013), an hypothesis highlighted in a recent review of multiple mating in reptiles (Uller and Olsson 2008). Eastern water dragons can occur at high densities, and mate encounter rates are high. For example, at Roma Street Parkland, there is a population in excess of 580 animals and females may overlap with up to 42 males (Gardiner et al. 2014). However, multiple matings as a consequence of frequent encounters may not be the only model that best explains water dragon mating dynamics because males control space and, as a result, females may be able to avoid particular males by closely associating with the dominant male. Furthermore, this model implies a low costs to reproduction which is likely not the case given the biased paternity we detected. Nev- ertheless, females may still be susceptible to coercion and ultimately, copulations that they may not favor. The suc- cess of males with higher levels of heterozygosity may be a result of two possible postcopulatory mechanisms of sexual selection. First, females may be capable of sperm selection and cryptically favor the sperm of more hetero- zygous males. Second, the sperm of more heterozygous males may fare better during sperm competition if sperm competition correlates with particular male genotypes that are also less heterozygous. This pattern is different to sand lizards, in which females favored less related males and this could be due to the differing probabilities of encountering kin in the two systems (high in sand lizards, low in water dragons). While the exact mechanisms driv- ing fertilization success remains elusive, our results are consistent with an indirect benefits model of sexual selec- tion via multiple mating. I E d i i Figure 2. No evidence for a relationship between geographic proximity and relatedness between male and female eastern water dragons at Lane Cove National Park (LNP, females = 64, males = 79). has, however, been documented in birds such as the lek- king wire-tailed manakin (Pipra filicauda) (Ryder et al. 2009) and the cooperatively breeding white-browed spar- row weaver (Plocepasser mahali) (Harrison et al. 2013). Our study, however, provides the first evidence for female bias fertilization toward more heterozygous males in liz- ards. Discussion Family Known mother Brood size Number of fathers Number of offspring sired by father 1 Number of offspring sired by father 2 Number of offspring sired by father 3 B1_1 Yes 8 2 6 2 B1_12 Yes 7 3 3 2 2 B1_14 Yes 11 2 9 2 B1_17 Yes 5 2 3 2 B1_18 Yes 8 2 6 2 B1_19 Yes 11 2 9 2 B1_2 Yes 9 2 7 2 B1_21 Yes 8 2 5 3 B1_24 Yes 9 1 9 B1_25 Yes 10 2 7 3 B1_26 Yes 13 2 8 5 B1_27 Yes 13 2 8 5 B1_4 Yes 7 2 6 1 B1_5 Yes 9 2 8 1 B1_8 Yes 8 2 6 2 B2_15 Yes 8 2 4 4 B2_17 Yes 4 1 4 B2_21 Yes 8 1 8 B1_10 No 8 3 3 2 3 B1_13 No 5 2 3 2 B1_15 No 5 2 3 2 B1_20 No 4 2 3 1 Table 2. Presence of multiple paternity in the 22 clutches of eastern water dragons measured using GERUD 2.0. ª 2015 The Authors. Ecology and Evolution published by John Wiley & Sons Ltd. 1689 C. H. Frere et al. Polyandry in Dragon Lizards –0.5 –0.4 –0.3 –0.2 –0.1 0 0.1 0.2 0.3 0.4 0.5 0 5 10 15 20 25 30 35 40 45 50 55 60 65 Relatedness (R) Geographic proximity (m) Figure 2. No evidence for a relationship between geographic proximity and relatedness between male and female eastern water dragons at Lane Cove National Park (LNP, females = 64, males = 79). –0.5 –0.4 –0.3 –0.2 –0.1 0 0.1 0.2 0.3 0.4 0.5 0 5 10 15 20 25 30 35 40 45 50 55 60 65 Relatedness (R) Geographic proximity (m) wire-tailed manakin, Ryder et al. 2009). While heterozy- gosity has been hypothesized as a plausible umbrella mechanism for the evolution of female polyandry (Ru- benstein 2007; Taylor et al. 2014), the benefits of multiple mating in lizards have been difficult to establish (Uller and Olsson 2008; Keogh et al. 2013). First, very few lizard species provide obvious parental care beyond simple par- ent–offspring associations (While et al. 2014), precluding direct benefits beyond ejaculate products (Uller and Ols- son 2008). Indirect benefits such as good genes have like- wise been difficult to establish. ª 2015 The Authors. Ecology and Evolution published by John Wiley & Sons Ltd. Discussion There may be several reasons why we did not find a correlation between male reproductive success and paren- tal relatedness. First, it may be that mating with close rel- atives does not incur major fitness costs (e.g., naked mole rat Heterocephalus glaber, Reeve et al. 1990) and, as such, avoiding breeding with a close relative may be unneces- sary. Second, and in contrast to species with extended kinship (e.g., elephants, Archie et al. 2007), there may be no need for mechanisms to avoid inbreeding because the probability of encountering kin within close geographic proximity is low. While the probability of encountering close relatives within our study population is unknown, we expect it to be lower than species with extended family groups. Indeed, neither geographic proximity (our study) nor social preferences (see Strickland et al. 2014) correlate with relatedness. While further work is required to assess the extent (if any) of inbreeding depression in this spe- cies/population (Balloux et al. 2004), mechanisms to avoid inbreeding are only expected to evolve when the cost of tolerating inbreeding exceeds that of avoiding it (Waser et al. 1986). By favoring more heterozygous males, female eastern water dragons might simply seek to gain maximum genetic benefits from polyandry. Heterozygosity has been, for instance, linked to greater disease resistance (Reid et al. 2007) and increased reproductive success (e.g., Ryder et al. 2009) and as such may be used as a proxy for the genetic quality of mates (e.g., the lekking In summary, Eastern water dragons experience intense precopulatory sexual selection in the form of male–male combat (Baird et al. 2012) and sexual coercion (pers. obs.). While sexual coercion by male water dragons may limit a female’s precopulatory mate choice, we provide evidence that postcopulatory mechanisms of sexual selec- tion are rife and may help level the sexual conflict playing 1690 C. H. Frere et al. Polyandry in Dragon Lizards field. While we cannot be sure that the mechanism is sperm selection per se, as opposed to sperm competition, the outcome is the same and is likely to be adaptive although this requires future testing. Cuervo, J., and R. Shine. 2007. Hues of a dragon’s belly: morphological correlates of ventral coloration in water dragons. J. Zool. 273:298–304. Eizaguirre, C., D. Laloi, M. Massot, M. Richard, P. Federici, and J. Clobert. 2007. Condition dependence of reproductive strategy and the benefits of polyandry in a viviparous lizard. Proc. R. References Frere, C. H., P. J. Prentis, T. Ezaz, and A. Georges. 2011. Isolation and characterisation of novel microsatellite and mitochondrial DNA markers for the Eastern Water Dragon (Physignathus lesueurii). Conserv. Genet. Resour. 4:1–4. Archie, E. A., J. A. Hollister-Smith, J. H. Poole, P. C. Lee, C. J. Moss, J. E. Maldonado, et al. 2007. Behavioural inbreeding avoidance in wild African elephants. Mol. Ecol. 16:4138– 4148. Gardiner, R., E. Doran, K. Strickland, and C. H. Frere. 2014. A face in the crowd: a non-invasive and cost effective photo-identification methodology to understand the fine scale movement of eastern water dragons. PLoS One 9: e9699. Baer, B., and P. Schmid-Hempel. 1999. Experimental variation in polyandry affects parasite loads and fitness in a bumble- bee. Nature 397:151–154. Baird, T. A., T. D. Baird, and R. Shine. 2012. Aggressive transition between alternative male social tactics in a long- lived Australian dragon (Physignathus lesueurii) living at high density. PLoS One 7:e41819. Gowaty, P. A., Y.-K. Kimd, J. Rawlingsd, and W. W. Andersond. 2010. Polyandry increases offspring viability and mother productivity but does not decrease mother survival in Drosophila pseudoobscura. Proc. Natl Acad. Sci. USA 107:13771–13776. Balloux, F., W. Amos, and T. Coulson. 2004. Does heterozygosity estimate inbreeding in real populations? Mol. Ecol. 13:3021–3031. Harrison, X. A., J. E. York, D. L. Cram, and A. J. Young. 2013. Extra-group mating increases inbreeding risk in a cooperatively breeding bird. Mol. Ecol. 22:5700–5715. Bergeron, P., D. Reale, M. M. Humphries, and D. Garant. 2011. Evidence of multiple paternity and mate selection for inbreeding avoidance in wild eastern chipmunks. J. Evol. Biol. 24:1685–1694. Jennions, M. D., J. Hunt, R. Graham, and R. Brooks. 2004. No evidence for inbreeding avoidance through postcopulatory mechanisms in the black field cricket, Teleogryllus commondus. Evolution 58:2472–2477. Bretman, A., D. Newcombe, and T. O. M. Tregenza. 2009. Promiscuous females avoid inbreeding by controlling sperm storage. Mol. Ecol. 18:3340–3345. Jones, A. 2005. GERUD 2.0: a computer program for the reconstruction of parental genotypes from half-sib progeny arrays with known or unknown parents. Mol. Ecol. Notes 5:708–711. Byrne, P. G., and M. J. Whiting. 2008. Simultaneous polyandry increases fertilization success in an African foam- nesting treefrog. Anim. Behav. 76:1157–1164. Courtice, G. 1981. The effect of temperature on bimodal gas exchange and the respiratory exchange ratio in the water dragon, Physignathus lesueurii. Comp. Biochem. Physiol. Part A 68:437–441. Keith, A. T., M. S. Webster, E. M. Tuttle, and S. Discussion Soc. B Biol. Sci. 274:425–430. Acknowledgments Permission to work in LNP was granted by the New South Wales Office of the Environment and Heritage (Scientific licence number S13165), and procedures were approved by the Macquarie University Animal Ethics Committee (ARA2010/35). We thank Julie McInnes (Wildlife Licensing and Management Unit) and Andrew Duffy (Lane Cove National Park) for very helpful support during this project. For excellent assistance in the field, we thank Daniel Noble, Danny Boerrigter, Ferdy Timmer- man, Martin Rossmanith, Katharina Hinz, and Sean Doo- dy. This work was funded by Macquarie and Queensland University. Feldheim, K. A., S. H. Gruber, and M. V. Ashley. 2004. Reconstruction of parental microsatellite genotypes reveals female polyandry and philopatry in the lemon shark, Negaprion brevirostris. Evolution 58:2332–2342. Negaprion brevirostris. Evolution 58:2332–2342. Firman, R. C. 2011. Polyandrous females benefit by producing sons that achieve high reproductive success in a competitive environment. Proc. R. Soc. B Biol. Sci. 278:2823–2831. Fisher, D., and M. Lara. 1999. Effects of body size and home range on the access to mates paternity of male bridled nailtail wallabies. Anim. Behav. 58:121–130. Fisher, D. O., M. C. Double, S. P. Blomberg, M. D. Jennions, and A. Cockburn. 2006. Post-mating sexual selection increases lifetime fitness of polyandrous females in the wild. Nature 444:89–92. Conflict of Interest Frere, C. H., M. Kr€utzen, A. M. Kopps, J. Mann, and W. B. Sherwin. 2010. Too close to home: inbreeding avoidance or tolerance in wild bottlenose dolphins (Tursiops sp.)? Proc. R. Soc. Lond. Biol. Sci. 277:2667–2673. None declared. References Pruett-Jones. 2005. Genetic similarity of social mates predicts the level of extrapair paternity in splendid fairy-wrens. Anim. Behav. 70:945–955. 1691 ª 2015 The Authors. Ecology and Evolution published by John Wiley & Sons Ltd. Polyandry in Dragon Lizards C. H. Frere et al. Keller, L. 1998. Inbreeding and its fitness effects in an insular population of song sparrows (Melospiza melodia). Evolution 52:240–250. correlates of male mating success in a lek-breeding bird. Proc. R. Soc. B Biol. Sci. 276:2377–2384. Slatyer, R. A., B. S. Mautz, P. R. Y. Backwell, and M. D. Jennions. 2012. Estimating genetic benefits of polyandry from experimental studies: a meta-analysis. Biol. Rev. 87:1–33. Keogh, J. S., K. D. L. Umbers, E. Wilson, J. Stapley, and M. J. Whiting. 2013. Influence of alternate reproductive tactics and pre- and postcopulatory sexual selection on paternity and offspring performance in a lizard. Behav. Ecol. Sociobiol. 67:629–638. Stockley, P.. 1997. No evidence of sperm selection by female common shrews. Proc. R. Soc. Lond. B Biol. Sci. 264:1497–1500. Strickland, K., R. Gardiner, A. Schultz, and C. H. Frere. 2014. The social life of eastern water dragons: sex differences, spatial overlap and genetic relatedness. Anim. Behav. 97:53–61. Klemme, I., H. Yl€onen, and J. A. Eccard. 2008. Long-term fitness benefits of polyandry in a small mammal, the bank vole Clethrionomys glareolus. Proc. R. Soc. B Biol. Sci. 275:1095–1100. Madsen, T., R. Shine, J. Loman, and T. Hakansson. 1992. Why do female adders copulate so frequently? Nature 355:440–441. Taylor, M. L., T. A. R. Price, and N. Wedell. 2014. Polyandry in nature: a global analysis. Trends Ecol. Evol. 29:376–383. Thompson, M.. 1993. Estimate of the population structure of the eastern water dragon, Physignathus lesueurii (Reptilia: Agamidae), along riverside habitat. Wildl. Res. 20:613–619. Nielsen, J. F., S. English, W. P. Goodall-Copestake, J. Wang, C. A. Walling, A. W. Bateman, et al. 2012. Inbreeding and inbreeding depression of early life traits in a cooperative mammal. Mol. Ecol. 21:2788–2804. Tregenza, T., and N. Wedell. 1998. Benefits of multiple mates in the cricket Gryllus bimaculatus. Evolution 52:1726–1730. Noble, D. W. A., J. S. Keogh, and M. J. Whiting. 2013. Multiple mating in a lizard increases fecundity but provides no evidence for genetic benefits. Behav. Ecol. 24:1128–1137. Tregenza, T., and N. Wedell. 2002. Polyandrous females avoid costs of inbreeding. Nature 415:71–73. Olsson, M., T. Madsen, R. Shine, A. Gullberg, and H. Tegelstrom. 1994. Rewards of promiscuity. Nature 372:230. Uller, T. 2008. ª 2015 The Authors. Ecology and Evolution published by John Wiley & Sons Ltd. References Developmental plasticity and the evolution of parental effects. Trends Ecol. Evol. 23:432–438. Olsson, M., R. Shine, T. Madsen, A. Gullberg, and H. Tegelstrom. 1996. Sperm selection by females. Nature 383:585. Uller, T., and M. Olsson. 2008. Multiple paternity in reptiles: patterns and processes. Mol. Ecol. 17:2566–2580. Olsson, M., T. Madsen, B. Ujvari, and E. Wapstra. 2004. Fecundity and MHC affects ejaculation tactics and paternity bias in sand lizards. Evolution 58:906–909. Walling, C. A., D. H. Nussey, A. Morris, T. H. Clutton- Brock, L. E. B. Kruuk, and J. M. Pemberton. 2011. Inbreeding depression in red deer calves. BMC Evol. Biol. 11:318–331. Reeve, H. K., D. F. Westnet, W. A. Noon, P. W. Sherman, and C. F. Aquadro. 1990. DNA ‘fingerprinting’ reveals high levels of inbreeding in colonies of eusocial naked mole-rat. Proc. Natl Acad. Sci. USA 87:2496–2500. Wang, J. 2002. An estimator for pairwise relatedness using molecular markers. Genetics 160:1203–1215. Wang, J. 2010. Do marker-based paternity assignments favour heterozygous and unrelated males? Mol. Ecol. 19:1898–1913. Reid, J. M., P. Arcese, L. F. Keller, K. H. Elliott, L. Sampson, and D. Hasselquist. 2007. Inbreeding effects on immune response in free-living song sparrows (Melospiza melodia). Wang, J. 2011. COANCESTRY: a program for simulating, estimating and analysing relatedness and inbreeding coefficients. Mol. Ecol. Resour. 11:141–145. Ritland, K. 1996. Estimators for pairwise relatedness and individual inbreeding coefficients. Genet. Res. 67:175–185. Rubenstein, D. R. 2007. Female extrapair mate choice in a cooperative breeder: trading sex for help and increasing offspring heterozygosity. Proc. R. Soc. B Biol. Sci. 274: 1895–1903. Waser, P. M., S. N. Austad, and B. Keanne. 1986. When should animals tolerate inbreeding. Am. Nat. 128:529–537. Waser, P. M., S. N. Austad, and B. Keanne. 1986. When should animals tolerate inbreeding. Am. Nat. 128:529–537. While, G. M., B. Halliwell, and T. Uller. 2014. Reproductive Biology and Phylogeny of Lizards and Tuatara in J. L. Rheubert, D. S. Siegel, S. E. Trauth, eds. The evolutionary ecology of parental care in lizards. CRC Press, 590–619. While, G. M., B. Halliwell, and T. Uller. 2014. Reproductive Biology and Phylogeny of Lizards and Tuatara in J. L. Rheubert, D. S. Siegel, S. E. Trauth, eds. The evolutionary ecology of parental care in lizards. CRC Press, 590–619. Ryder, T. B., P. G. Parker, J. G. Blake, and B. A. Loiselle. 2009. It takes two to tango: reproductive skew and social 1692 ª 2015 The Authors. References Ecology and Evolution published by John Wiley & Sons Ltd.
https://openalex.org/W4288069746
https://liu.diva-portal.org/smash/get/diva2:1689630/FULLTEXT01
English
null
Protein-based luminescent aerogels with elastic properties
Green chemistry letters and reviews
2,022
cc-by
6,814
Green Chemistry Letters and Reviews Green Chemistry Letters and Reviews ISSN: (Print) (Online) Journal homepage: https://www.tandfonline.com/loi/tgcl20 Full Terms & Conditions of access and use can be found at https://www.tandfonline.com/action/journalInformation?journalCode=tgcl20 GREEN CHEMISTRY LETTERS AND REVIEWS 2022, VOL. 15, NO. 3, 508–518 https://doi.org/10.1080/17518253.2022.2102941 GREEN CHEMISTRY LETTERS AND REVIEWS 2022, VOL. 15, NO. 3, 508–518 https://doi.org/10.1080/17518253.2022.2102941 ABSTRACT ABSTRACT Gelatin is a famous gel-forming proteinaceous material with excellent hydrogelation properties. Herein, we report that protein nanofibrils (PNFs) can be employed to form hybrids with gelatin that can be converted to aerogels with attractive mechanical properties. Moreover, we are able to influence the gelation behavior of PNFs by mechanochemical processing. A combination of mechanochemistry and aqueous self-assembly is employed to prepare PNFs functionalized with hydrophobic dyes. These materials are then mixed with gelatin and converted into aerogels by freeze drying. We find that PNFs functionalized with PNFs lead to the formation of aerogels with more robust mechanical properties. Mechanochemical methodology as a green and scalable method can thus be employed for influencing the properties of protein-based aerogels. This represents a new and highly flexible and novel strategy for tuning both properties and functionality of protein materials. This work opens a simple and feasible way to produce nontoxic and biodegradable aerogel materials with favorable mechanical strength. © 2022 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. CONTACT Niclas Solin niclas.solin@liu.se Department of Physics, Chemistry, and Biology, Biomolecular and Organic Electronics, Linköping University, Linköping 581 83, Sweden Supplemental data for this article can be accessed online at https://doi.org/10.1080/17518253.2022.2102941 Protein-based luminescent aerogels with elastic properties Yusheng Yuan and Niclas Solin Department of Physics, Chemistry, and Biology, Biomolecular and Organic Electronics, Linköping University, Linköping, Sweden ARTICLE HISTORY Received 2 May 2022 Accepted 14 July 2022 KEYWORDS Self-assembly; protein fibrils; gelatin; elastic aerogel; mechanochemistry Yusheng Yuan & Niclas Solin Yusheng Yuan & Niclas Solin To cite this article: Yusheng Yuan & Niclas Solin (2022) Protein-based luminescent aerogels with elastic properties, Green Chemistry Letters and Reviews, 15:3, 508-518, DOI: 10.1080/17518253.2022.2102941 To link to this article: https://doi.org/10.1080/17518253.2022.2102941 © 2022 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group View supplementary material Published online: 27 Jul 2022. Submit your article to this journal Article views: 430 View related articles View Crossmark data 1. Introduction Mechanochemical methodology can accordingly be employed to tune and valorize various renewable protein materials—the hydrophobic mol- ecule/material may modify the physical properties of a protein while simultaneously valorizing the material by providing extra function. Herein we investigate if this methodology can be employed to influence the proper- ties of gelatin: PNF hydrogels and aerogels. aerogels include ultra-low-density, low optical index of refraction, low thermal conductivity, and low propa- gation speed of sound, and aerogels are investigated for a range of different applications, including as materials for energy storage and conversion (15–17), sensors (18, 19), catalyst supports (20, 21), and environ- mental remediation materials (22, 23). Aerogels have been formed from a wide range of materials including Kevlar (24, 25) and bio-based materials (26–28). Many of the developed aerogels employ polymers ultimately derived from petroleum (13). In recent years, there has been an increased interest in developing aero- gels derived from biopolymers such as proteins or poly- saccharides. However, the resulting aerogels will often be brittle, and it is hence important to develop method- ology that can influence the mechanical properties of such materials. There are few reports presenting mechanically flexible gelatin-based aerogels (29). It was demonstrated that chemical vapor deposition treatment with silanes resulted in flexible aerogels (9, 30). More- over, Ti3C2Tx MXene/ gelatin nanocomposite aerogel formed for electromagnetic absorption (31). In addition, aerogels which gelatin cross-linked with polyvinyl alcohol to enhance the properties of compression and flame retardancy (32). An interesting type of material for modification of the properties of gelatin aerogels is protein nanofibrils (PNFs) (33–35). PNFs can be formed by self-assembly in vitro from a wide range of proteins. PNFs are high aspect ratio particles with a typical diam- eter of 5–10 nm and lengths in the μm range. PNFs are related to amyloid fibrils—a type of structure formed in vivo that can have both detrimental and beneficial effects on the organism (36, 37). PNFs have been inves- tigated regarding applications in different areas and applications, including LEDs (38, 39), sensors (40–42), and drug delivery (43, 44). A recent example of the use of functional amyloid in materials science is the demon- stration that genetically modified Escherichia coli (E. coli.) bacteria produced curli (a functional amyloid) contain- ing biofilms that could be processed into bioplastics (45). PNFs have also been converted into various types of aerogels (46). 1. Introduction been widely used in the pharmaceutical, food, cosmetic, and photographic industries because of its biodegrad- ability, biocompatibility, and non-immunogenicity (6–9). Gelatin can easily dissolve in water and form a physical thermally reversible hydrogel at low tempera- ture. However, the preparation of dry gelatin-based materials is challenging due to the brittleness of dry gelatin (10). This is unfortunate as hydrogels are gener- ally considered as attractive precursors for aerogels (11–13). A common way to convert a hydrogel into an aerogel involves freeze drying (14). The sample is first frozen and water is then removed at reduced pressure. During the freezing step, ice formation will lead to defor- mations of the gel network, which can present a problem, but also an opportunity for tuning of aerogel structure and porosity. The unique properties of An important research topic is the replacement of materials derived from petroleum with materials obtain- able from renewable sources (1). Many proteins or protein-derived materials are formed as side products from industrial processes and are hence potential candi- dates for renewable raw materials (2–5). Proteins are extremely complex and have a rich supramolecular chemistry providing interesting opportunities when fab- ricating materials. Examples of such valuable character- istics employed in the present study are the ability of protein to self-assemble into fibrils and tendencies of proteins or protein-derived materials to form gels. Gelatin is a low cost and widespread proteinaceous material—famous for its gel-forming capacity—which is derived from skin, tendons, and bone. Gelatin has GREEN CHEMISTRY LETTERS AND REVIEWS 509 is formed. Due to the hydrophobic effect the dye will stay associated with the protein during PNF formation, the end result being an aqueous dispersion of PNFs functionalized with the hydrophobic dye (38, 39, 43, 50–55). We have reported that such functionalized PNFs have an increased tendency to aggregate, for example by forming films at the air–water interface or forming abnormally large protein-spherulites (52, 56). The functionalization PNFs by hydrophobic dyes accord- ingly presents a convenient way to modify the colloidal properties of PNF dispersions. The methodology thus presents opportunities to modify the properties of protein materials in a cost effective and green way— mill the protein with a hydrophobic molecule/material and then expose the protein to conditions that promote self-assembly of the protein into PNFs. The presence of the hydrophobic molecule/material may then influence the properties of the resulting macro- scopic materials. 1. Introduction y As a model protein, we employ hen egg white lyso- zyme (HEWL). As hydrophobic dye component, we investigate the luminescent dyes (2-butyl-6-(butyla- mino)-1H-benz[de]isoquinoline-1,3(2H)-dione, abbre- viated as F555); Fluorescent brighter 378 (F378); and 4-(dicyanomethylene)-2-methyl-6-(4-dimethylaminos- tyryl)-4H-pyran (DCM). The functionalized lysozyme protein nanofibrils (LPNFs) are labeled as F555@LPNF, F378@LPNF and DCM@LPNF. Of these different materials, the F555@LPNF material gives aerogels with the most attractive mechanical properties and our study therefore focus on the properties of the F555@LPNF system; however, for comparison, we also provide selected information for the gels derived from the F378@LPNF and DCM@LPNF systems. A sche- matic illustration of the materials preparation is shown in Figure 1 using F555 as an example. Briefly, F555@LPNF and gelatin dispersions/solutions are mixed by stirring while heated. The resulting mixture is allowed to cool which results in the formation of a hydrogel. Next, the hydrogels are converted into aero- gels by a freeze-drying process. We find that the pres- ence of hydrophobic dyes results in improved mechanical properties of the resulting aerogels. The fabricated F555@LPNF gel-based fluorescent aerogel retains the typical features such as the amyloid fibrils-based aerogels with lightweight (about As PNFs are built up by self-assembly their properties can be influenced by modifying the protein building block. There are many different methods for modifi- cation of proteins, for example being based on synthetic biology or click chemistry (47, 48). From a sustainability perspective methodology based on mechanochemistry, (49) should be considered. We have developed an alternative methodology for protein functionalization/ valorization based on mechanochemistry. By co-grind- ing of a protein, capable of self-assembly into PNFs, with hydrophobic dyes, a water-soluble hybrid material 510 Y. YUAN AND N. SOLIN Figure 1. Schematic illustration of aerogel-based formed from gelatin and LPNFs or F555@LPNFs. Figure 1. Schematic illustration of aerogel-based formed from gelatin and LPNFs or F555@LPNFs. 0.02 g·cm–3), high porosity (>93%), and specific surface area (>20 m2 g–1), and also exhibits the additional characteristic of shape recoverability. treated by the procedure described above in order to obtain lysozyme fibrils (2% LPNF, w/v). 2.1. Materials Atomic force microscopy (AFM) measurements were obtained using a digital instruments dimension 3100 atomic force microscope. The initial reaction mixtures (LPNF, F555@LPNF, F378@LPNF, and DCM@LPNF) were diluted 100 times prior to applying to clean silica sub- strates (washed with TL-1 solution at 120°C for 20 min, Ammonia:H2O2:H2O = 1:1:5) and left to dry for 1 min. Excess fluid was removed by applying a nitrogen gas flow. The length distribution of PNFs was determined with the help of ImageJ software by counting 100 PNFs that were plotted as a histogram. (2-butyl-6-(butylamino)-1H-benzo[de]isoquinoline-1,3 (2H)-dione) (Fluorol 555, F555) was obtained from Exciton (Dayton, OH). 4-(dicyanomethylene)-2-methyl- 6-(4-dimethylaminostyryl)-4H-pyran (DCM) and Fluor- escent brighter 378 were obtained from TCl. HEWL and HCl (1M) were purchased from Sigma-Aldrich. Gelatin (GEL, Sinopharm Chemical Reagent Co., Ltd). All chemi- cals were used as received without further purification, and deionized water (18.2 Ω) was used throughout. 2.3. AFM characterization of LPNFs and functionalized LPNFs 2. Materials and methods 2. Materials and methods GREEN CHEMISTRY LETTERS AND REVIEWS GREEN CHEMISTRY LETTERS AND REVIEWS 511 in different ratios (while ensuring that the total amount of protein equaled 40 mg), then the mixture was stirred for 3 min at 60°C. The resulting mixture was maintained at 4°C for at least 2 h, forming emulsion-gels. F555@LPNF:GEL-x hydrogels were also prepared by mixing F555@LPNF dispersions and gelatin solutions in different ratios. in different ratios (while ensuring that the total amount of protein equaled 40 mg), then the mixture was stirred for 3 min at 60°C. The resulting mixture was maintained at 4°C for at least 2 h, forming emulsion-gels. F555@LPNF:GEL-x hydrogels were also prepared by mixing F555@LPNF dispersions and gelatin solutions in different ratios. The micro-structures of the aerogels were imaged by scanning electron microscopy (SEM, Zeiss Sigma 300 VP, Germany) at an accelerating voltage of 2 kV, and the aerogels were cut with a scissor in the horizontal and vertical direction. After that the aerogels were sputter coated with Pt for 10 s at high vacuum (10−5 Pa), in order to avoid charge-up effects during scanning elec- tron microscope (SEM) imaging. The resulting hydrogels (both LPNF:Gel and F555@LPNF:Gel) were placed on a steel plate containing with liquid nitrogen to directly freeze the hydrogels and were then dried under reduced pressure for 48 h to obtain the aerogels. 2.7. Young’s modulus of LPNF:GEL aerogels The characterization of Young’s modulus of LPNF matrix aerogels was performed by adding different weight on the aerogels and observing the deformation. The stress s was calculated by the equation: 2.5. Rheology of LPNF:GEL hydrogels Rheological tests were performed using a TA HR-2 rhe- ometer equipped with 20 mm parallel stainless-steel plates. Rheological frequency sweeps from 0.1 to 100 Hz were performed with a shear strain of 1% in the parallel plate geometry at oscillatory rheology measurements. Rheological amplitude sweeps from 0.1% to 10,000% were assessed with a fixed oscillatory frequency of 1 Hz. All samples were run in at least duplicates. s = F A where F is the applied weight on the aerogel and A is the contact area. The deformation of the aerogel at a given stress was measured and the strain calculated. The Young’s modulus was then obtained from the slope of a plot of stress against strain. where F is the applied weight on the aerogel and A is the contact area. The deformation of the aerogel at a given stress was measured and the strain calculated. The Young’s modulus was then obtained from the slope of a plot of stress against strain. 3. Results and discussion 3. Results and discussion (3) 2.4. Preparation of LPNF:GEL hydrogels and aerogels The dye (one of F555, F378, or DCM) (1 mg) and HEWL (100 mg) were ground with ceramic mortar and pestle for 10 min. The resulting mixture was dissolved in 5 mL 25 mM hydrochloric acid followed by filtration through a 0.45 μm Polyethersulfone filter. The resulting dis- persion was heated at 80°C with magnetic stirring at 1000 rpm for 24 h to obtain F555@Lysozyme protein fibrils (F555@LPNF). For comparison, the pure HEWL (100 mg) without F555 was ground for 10 min and Solutions of gelatin (GEL) in water (2% w/v) was pre- pared by dissolving 0.4 g gelatin in 20 ml deionized water, and the mixture was stirred for 1 h at 60°C until the gelatin was completely dissolved. LPNF:GEL hydro- gels named as LPNF:Gel-x (x represents the mass ratio of LPNF to gelatin, x = 2, 1.5, 1, 0.5, corresponding to ratios of 2:1, 1.5:1, 1:1, 0.5:1, respectively) were obtained by mixing the 2% LPNF solution and 2% gelatin solution 2.6. Porosity, specific surface area, and microstructure of LPNF:GEL aerogels A thermogravimetric analysis (TGA) instrument (Mettler Toledo) was used to evaluate the thermal properties of aerogel. The measurements were performed in the range of 30–900°C with a heating rate of 10°C/min in 900 μL alumina crucibles under nitrogen gas flow (N2 flow rate is 25 mL min−1). Before starting the measure- ments, the aerogel was kept at 100°C for 30 min to elim- inate adsorbed water. Furthermore, to estimate the residue content of the aerogel, it was maintained at 900°C at isothermal conditions for 30 min. The porosity of the obtained aerogels was calculated according to the following equation Porosity (%) = 1 −raerogel rs (1) (1) ρaerogel and ρs represent the apparent density and skel- etal density, respectively, of the aerogel, which can be calculated by the following equations raerogel = m V (2) rs = 1 rP (3) (2) 3.1. Morphology of LPNFs If the F555@LPNF:GEL-0.5, F378@LPNF:GEL-0.5 and On the other hand, for the samples functionalized with hydrophobic dyes, they tend to form gels also at a higher fibril to gelatin ratio. F555@LPNF samples form gels at the F555@LPNF:GEL ratio of 1.5:1. However, during preliminary tests of the properties of the aerogels obtainable from the different compositions (see below for further discussion of aerogel formation and struc- ture), it was found that a too high PNF ratio led to brittle samples. Therefore, the LPNF:GEL ratio of 0.5:1 (abbreviated as LPNF:GEL-0.5) was chosen for investi- gations involving aerogels (Figure 3(c)). In preliminary tests of the mechanical properties of the resulting aero- gels, a dramatic difference was found between aerogels made from LPNFs and aerogels made from LPNFs functionalized with hydrophobic dyes. All aerogels can withstand modest deformations but if the LPNF:GEL- 0.5 aerogel is compressed to about 50% of its original length cracks start to form, and if compressed to about 75% the sample shatters (Figure 3(e)). If the F555@LPNF:GEL-0.5, F378@LPNF:GEL-0.5 and sample shows a distribution shifted towards longer lengths, with the most common length being about 1.5 μm, meaning that F555 functionalized fibrils tend to be longer than pure LPNFs. The length distributions of F378@LPNF and DCM@LPNF is more similar to that of the LPNF sample, with the most common length being about 1 μm (Figure S1, supporting information). 3.1. Morphology of LPNFs In order to characterize the length distribution of func- tionalized PNFs and normal PNFs (without hydrophobic dye), samples were prepared in an identical way (heating at 80°C with magnetic stirring at 1000 rpm for 24 h). Samples were then drop-casted onto substrates and AFM micrographs were recorded. The morphology of unmodified LPNFs as well as LPNFs functionalized with dyes (F555@LPNF, F378@LPNF, and DCM@LPNF) was investigated by AFM. As shown in Figure 2, the LPNF and F555@LPNF samples both have PNFs with lengths varying between 0.5 and 4 μm. The most common length of LPNF is about 1 μm, whereas the F555@LPNF where m and V are the weight and volume, respectively, of the fluorescent aerogel. ρP represents the density of protein which was assumed to be 1.35 g cm–3 (57). The specific surface area of aerogels was measured at the relative pressure of P/Po = 0.995 by the Brunauer– Emmett–Teller (BET) method on a specific surface and pore analyzer (Micromeritics ASAP 2020). The nitrogen isothermal adsorption and desorption volumes were measured at −196°C with samples outgassed at 180°C for 5 h. The pore size distribution was calculated from the adsorption isotherm using the Barrett–Joyner– Halenda method (58). 512 Y. YUAN AND N. SOLIN Figure 2. AFM micrographs (a–b) and fibril length distribution (c–d) of LPNF and F555@LPNF. Figure 2. AFM micrographs (a–b) and fibril length distribution (c–d) of LPNF and F555@LPNF. On the other hand, for the samples functionalized with hydrophobic dyes, they tend to form gels also at a higher fibril to gelatin ratio. F555@LPNF samples form gels at the F555@LPNF:GEL ratio of 1.5:1. However, during preliminary tests of the properties of the aerogels obtainable from the different compositions (see below for further discussion of aerogel formation and struc- ture), it was found that a too high PNF ratio led to brittle samples. Therefore, the LPNF:GEL ratio of 0.5:1 (abbreviated as LPNF:GEL-0.5) was chosen for investi- gations involving aerogels (Figure 3(c)). In preliminary tests of the mechanical properties of the resulting aero- gels, a dramatic difference was found between aerogels made from LPNFs and aerogels made from LPNFs functionalized with hydrophobic dyes. All aerogels can withstand modest deformations but if the LPNF:GEL- 0.5 aerogel is compressed to about 50% of its original length cracks start to form, and if compressed to about 75% the sample shatters (Figure 3(e)). 3.3. Rheological characterization of LPNF:GEL hydrogels Rheological measurements were performed in order to evaluate the mechanical properties of the LPNF:gelatin gels and the F555@LPNF:gelatin gels. Frequency sweep tests are widely used to obtain information about the stability of the gel networks and to verify if their struc- tures correspond to the rheological definition of a gel. The storage (G′) and loss modulus (G′′) of a viscoelastic material, representing the deformation energy stored and dissipated during the shear process, respectively, were measured. Frequency sweep, measurements were carried out at different oscillation frequencies with a constant oscillation amplitude (1%) and temperature (25°C). Within the angular frequency of 0.1–100 rad s−1, the value of the storage modulus (G′) is greater than the loss modulus (G′′) for both the F555@LPNF and LPNF hydrogel, indicating the formation of an elastic solid-like hydrogel (Figure 4). Interestingly, the stiffness of F555@LPNF hydrogel was about 10 times higher than that of pure LPNF hydrogel at the ratio of 2:1, and four times and two times higher for the 1.5:1 and 1:1 ratio separately. For the 0.5:1 ratio sample, the difference is small with a slightly higher stiffness for the F555@LPNF sample. PNFs can accordingly be employed to influence the mechanical properties of the hydrogels. The density of aerogels with a different amount of LPNF is shown in Figure 7(a). The densities are 0.022 g cm−3 for the gelatin aerogel and 0.023 g cm−3 for LPNF:GEL-0.5 and 0.024, 0.025, and 0.026 g cm−3 for F378@LPNF:GEL-0.5, F555@LPNF:GEL-0.5, and DCM @LPNF:GEL-0.5 aerogels, respectively. The density of the aerogels incorporating various types and amounts of LPNF display only slight variations. The reason for the lower densities of gels incorporating LPNF is due to smaller volume shrinkage than for the GEL sample. The aerogels incorporating LPNF have a high porosity—up to 93% for the LPNF:GEL-0.5 and F555@LPNF:GEL0.5. In Figure 7(b) is shown photos of the different aerogels under ambient light and under UV-light (365 nm), demonstrating the gels have fluorescent properties. In addition, strain sweep experiments were performed to determine the linear viscoelastic regime of the hydro- gels (Figure 5). The breakage strain of the LPNF:GEL hydrogels increased from 235% to 553% by decreasing the ratio of LPNF to gelatin from 2:1 to 0.5:1. Interestingly, for the F555@LPNF:GEL hydrogels, the breakage strain increased from 29% to 221% when the PNF:GEL ratio was decreased from 2:1 to 0.5:1. 3.2. Initial tests of gelation and aerogel properties In the description below, the composite aerogels are coded as LPNF:GEL-x (where x is the mass ratio between LPNF (or dye@LPNF) and gelatin—the sample with a LPNF:GEL ratio of 0.5:1 is accordingly labeled as LPNF:GEL-0.5) and key parameters are summarized in Table 1. In order to convert the hydrogels into aerogels, we employed freeze drying. The samples were first frozen by immersing the sample liquid nitrogen, and water was then removed under reduced pressure, result- ing in free standing aerogels. In Figure 6 is shown the SEM images of aerogels formed from gelatin, LPNF: GEL-0.5 as well as F555@LPNF:GEL-0.5 samples. The gelatin aerogel is built up from large flake-like structures (Figure 6(a)). In the LPNF:GEL-0.5 sample there is still a flake-like morphology but with some porosity. The mor- phology of the F555@LPNF:GEL-0.5 is dramatically different with a relatively uniform and compact network with highly porous structures (Figure 6(c)). SEM images of the F378@LPNF:GEL-0.5 and DCM@LPNF:GEL-0.5 samples are shown in the support- ing information (Figure S2), and in both cases, a flake- like morphology is observed but with much smaller dimensions than for the LPNF:GEL-0.5 sample. 3.2. Initial tests of gelation and aerogel properties To determine a suitable ratio between LPNF (and dye@LPNF) and gelatin, the two components were mixed at different ratios and the sol-to-gel transition of LPNF:GEL was examined by the test tube inversion method (Figure 3(a,b)). Note that for the samples in Figure 3(a,b), the total amount of protein is always 40 mg, and the x:y ratio indicates the LPNF:GEL ratio. The mixtures employing unmodified LPNFs tend to form a gel when the LPNF:GEL ratio of is close to 1:1. Figure 3. (a–b) Photographs of samples of LPNF (or F555@LPNF) and gelatin mixed in different ratios. (c) Photographs of aerogels formed from LPNF:GEL-0.5 and F555@LPNF:GEL-0.5. (d) Compression behavior of the F555@LPNF:GEL-0.5 aerogel. (e) Deformation behavior of LPNF:GEL-0.5 and dyes@LPNF:GEL-0.5 aerogels. GREEN CHEMISTRY LETTERS AND REVIEWS 513 GREEN CHEMISTRY LETTERS AND REVIEWS 513 513 Figure 3. (a–b) Photographs of samples of LPNF (or F555@LPNF) and gelatin mixed in different ratios. (c) Photographs of aerogels formed from LPNF:GEL-0.5 and F555@LPNF:GEL-0.5. (d) Compression behavior of the F555@LPNF:GEL-0.5 aerogel. (e) Deformation behavior of LPNF:GEL-0.5 and dyes@LPNF:GEL-0.5 aerogels. Figure 3. (a–b) Photographs of samples of LPNF (or F555@LPNF) and gelatin mixed in different ratios. (c) Photographs of aerogels formed from LPNF:GEL-0.5 and F555@LPNF:GEL-0.5. (d) Compression behavior of the F555@LPNF:GEL-0.5 aerogel. (e) Deformation behavior of LPNF:GEL-0.5 and dyes@LPNF:GEL-0.5 aerogels. Figure 3. (a–b) Photographs of samples of LPNF (or F555@LPNF) and gelatin mixed in different ratios. (c) Photographs of aerogels formed from LPNF:GEL-0.5 and F555@LPNF:GEL-0.5. (d) Compression behavior of the F555@LPNF:GEL-0.5 aerogel. (e) Deformation behavior of LPNF:GEL-0.5 and dyes@LPNF:GEL-0.5 aerogels. Figure 4. Rheological measurements of dynamic frequency sweep of the LPNF:GEL (a) and F555@LPNF:GEL (b) co-assembled gels at a strain of 1% over a range of 0.1–100 Hz. Figure 4. Rheological measurements of dynamic frequency sweep of the LPNF:GEL (a) and F555@LPNF:GEL (b) co-assembled gels at a strain of 1% over a range of 0.1–100 Hz. Y. YUAN AND N. SOLIN 514 3.4. Porosity, specific surface area, and microstructure of LPNF:GEL aerogels DCM@LPNF:GEL-0.5 are compressed to 50% of their orig- inal length and the force is removed, the aerogels will revert to their original shape (Figure 3(d)). However, if compressed above about 75%, they will undergo a permanent deformation, but without breakage (Figure 3(e)). 3.3. Rheological characterization of LPNF:GEL hydrogels The breakage strain of the F555@LPNF:GEL hydrogels exhibited lower value compared to the LPNF:GEL samples indicating F555 doping increased the mechanical properties of the hydro- gels. This behavior may indicate that the F555@LPNF:GEL co-assembled structures are likely more rigid and hence unable to withstand higher strain values. The difference in modulus values indicated different networks of micro/nanostructures inside the gels, potentially influen- cing their mechanical properties (59). The surface area and pore volume of the aerogels were investigated by N2 adsorption−desorption iso- therm analysis by using the BET method. As shown in Figure 7(c), the gelatin aerogel had a specific surface area of 6.7 m2 g−1, and for LPNF functionalized with F555 (F555@LPNF), it increased to 22.36 m2 g−1. Further- more, the specific surface area of F378@LPNF:GEL-0.5 and DCM@LPNF:GEL-0.5 aerogels were 14.59 and 18.37 m2 g−1, respectively. The average pore diameters of gelatin, F378@LPNF:GEL-0.5, DCM@LPNF:GEL-0.5, and F555@LPNF: GEL-0.5 aerogels were 377, 336, 312, and 349 nm, respectively. GREEN CHEMISTRY LETTERS AND REVIEWS 515 Figure 5. Rheological measurements of dynamic strain sweep of the LPNF gel (a) and F555@LPNF (b) co-assembled gels at a constant frequency of 1 Hz over a strain range of 0.1–10,000%. Figure 5. Rheological measurements of dynamic strain sweep of the LPNF gel (a) and F555@LPNF (b) co-assembled gels at a constant frequency of 1 Hz over a strain range of 0.1–10,000%. Table 1. Comparative results aerogels. Sample Density Pore diameter BET surface area Young’s modulus TOnset Tp (g cm−3) (nm) (m2 g−1) (kPa) (°C) (°C) GEL 0.022 377 6.7 Not given 265 310 LPNF:GEL-0.5 0.023 Not given Not given 3.27 262 306 F555@LPNF:GEL-0.5 0.025 336 22.63 2.94 257 295 F378@LPNF:GEL-0.5 0.024 312 14.59 3.53 282 324 DCM@LPNF:GEL-0.5 0.026 349 18.37 3.28 276 319 Table 1. Comparative results aerogels. in Table 1 (DTG curves were shown in supporting infor- mation, Figure S3). We further investigated the thermal stability by storing the different samples at 200°C under air atmosphere for 24 h (See supporting information in Figure S4). This leads to an obvious discoloration but the aerogels containing LPNFs are able to retain their shape, showinga superior stability to temperature-induced defor- mation than many commercial-grade petroleum-based Thethermalstabilityoftheaerogelswasinvestigatedby TGA. As show in Figure 7(d), pristine gelatin and gelatin with protein matrix aerogels gave <10% weight loss at the beginning up to 100°C which can be attributed to loss of water. 3.3. Rheological characterization of LPNF:GEL hydrogels The LPNF:GEL-0.5 aerogel and F555@LPNF: Gel-0.5aerogelstartedtolosemassatabout270°C,indicat- ing a high thermal stability. The onset temperature (Tonset) and peak temperature (Tp) of different materials are listed Figure 6. SEM images of aerogels. (a–c) Top-view of gelatin (a) LPNF:GEL-0.5 (b) F555@LPNF:GEL-0.5 (c) aerogels. (d–f) Cross-section of gelatin (d) LPNF:GEL-0.5 (e) F555@LPNF:GEL-0.5 (f) aerogels, scale bar is 10 μm. Figure 6. SEM images of aerogels. (a–c) Top-view of gelatin (a) LPNF:GEL-0.5 (b) F555@LPNF:GEL-0.5 (c) aerogels. (d–f) Cross-section of gelatin (d) LPNF:GEL-0.5 (e) F555@LPNF:GEL-0.5 (f) aerogels, scale bar is 10 μm. 516 Y. YUAN AND N. SOLIN Figure 7. (a) Density of the aerogels with the different ratio of LPNF or Dyes@LPNF (F555, F378, DCM) and gelatin. (b) Photos of aero- gels under UV light (365 nm) and ambient light samples. (c) Nitrogen gas absorption–desorption curve of gelatin and LPNF matrix aerogels. (d) TGA curves of amyloid fibril aerogel under nitrogen atmospheres. The residue obtained after the complete decompo- sition is remaining salts in the system. Figure 7. (a) Density of the aerogels with the different ratio of LPNF or Dyes@LPNF (F555, F378, DCM) and gelatin. (b) Photos of aero- gels under UV light (365 nm) and ambient light samples. (c) Nitrogen gas absorption–desorption curve of gelatin and LPNF matrix aerogels. (d) TGA curves of amyloid fibril aerogel under nitrogen atmospheres. The residue obtained after the complete decompo- sition is remaining salts in the system. thermoplastic foams that collapsed/melted after being subjected to a temperature of 150°C (60). References [16] Xiong, C.; Zou, Y.; Peng, Z.; Zhong, W. Synthesis of Morphology-Tunable Electroactive Biomass/Graphene Composites Using Metal Ions for Supercapacitors. Nanoscale 2019, 11, 7304–7316. [1] Tang, X.Z.; Kumar, P.; Alavi, S.; Sandeep, K.P. Recent Advances in Biopolymers and Biopolymer-based Nanocomposites for Food Packaging Materials. Crit. Rev. Food Sci. 2012, 52, 426–442. [17] Wang, D.C.; Yu, H.Y.; Qi, D.; Ramasamy, M.; Yao, J.; Tang, F.; Tam, K.M.C.; Ni, Q. Supramolecular Self-Assembly of 3D Conductive Cellulose Nanofiber Aerogels for Flexible Supercapacitors and Ultrasensitive Sensors. ACS Appl. Mater. Interfaces 2019, 11, 24435–24446. [2] Gautam, S.; Sharma, B.; Jain, P. Green Natural Protein Isolate Based Composites and Nanocomposites: A Review. Polym. Test 2021, 99, 106626. [3] Jafarzadeh, S.; Forough, M.; Amjadi, S.; Javan Kouzegaran, V.; Almasi, H.; Garavand, F.; Zargar, M. Plant Protein-Based Nanocomposite Films: A Review on the Used Nanomaterials, Characteristics, and Food Packaging Applications. Crit. Rev. Food Sci. 2022. doi:10.1080/ 10408398.2022.2070721 [18] Xiao, Z.; Zhou, W.; Zhang, N.; Zhang, Q.; Xia, X.; Gu, X.; Wang, Y.; Xie, S. All-Carbon Pressure Sensors with High Performance and Excellent Chemical Resistance. Small 2019, 15, 1804779. [19] Yang, L.; Liu, Y.; Filipe, C.D.; Ljubic, D.; Luo, Y.; Zhu, H.; Yan, J.; Zhu, S. Development of a Highly Sensitive, Broad- Range Hierarchically Structured Reduced Graphene Oxide/PolyHIPE Foam for Pressure Sensing. ACS Appl. Mater. Interfaces 2019, 11, 4318–4327. [4] Mihalca, V.; Kerezsi, A.D.; Weber, A.; Gruber-Traub, C.; Schmucker, J.; Vodnar, D.C.; Dulf, F.V.; Socaci, S.A.; Fărcaș, A.; Mureșan, C.I.; Suharoschi, R.; Pop, O.L. Protein-based Films and Coatings for Food Industry Applications. Polymers (Basel) 2021, 13, 769. [20] Qiu, J.; Fan, P.; Yue, C.; Liu, F.; Li, A. Multi-networked Nanofibrous Aerogel Supported by Heterojunction Photocatalysts with Excellent Dispersion and Stability for Photocatalysis. J. Mater. Chem. A. 2019, 7, 7053–7064. [5] Giaveri, S.; Schmitt, A.M.; Roset Julia, L.; Scamarcio, V.; Murello, A.; Cheng, S.; Menin, L.; Ortiz, D.; Patiny, L.; Bolisetty, S. et al. Nature-inspired Circular-economy Recycling for Proteins: Proof of Concept. Adv. Mater. 2021, 33, 2104581. [21] Wu, Z.S.; Yang, S.; Sun, Y.; Parvez, K.; Feng, X.; Müllen, K. 3D Nitrogen-Doped Graphene Aerogel-Supported Fe3O4 Nanoparticles as Efficient Electrocatalysts for the Oxygen Reduction Reaction. J. Am. Chem. Soc. 2012, 134, 9082–9085. [6] Douglas, S.J.; Davis, S.S.; Illum, L. Nanoparticles in Drug Delivery. Crit. Rev. Ther. Drug Carrier Syst. 1987, 3, 233– 261. [22] Feng, Z.Q.; Wu, F.; Jin, L.; Wang, T.; Dong, W.; Zheng, J. 4. Conclusion Herein, we have developed an all protein-based aerogel with favorable mechanical properties in a green and sus- tainable method by mechanochemistry. The properties of the aerogels can be adjusted by varying the relative ratio of PNFs and gelatin. The properties of PNFs can in turn be influenced by mechanochemical functionalization with hydrophobic dyes (dye@PNF). Aerogels prepared from gelatin and dye@PNF materials have better mechan- ical properties than aerogels prepared from gelatin and unmodified PNFs. These protein-based aerogels are pre- pared from edible components and may therefore find applications related to e.g. food science. In addition, as the aerogels are functionalized with luminescent mol- ecules, they may find applications as e.g. sensors or photo- nic materials. Herein, we have developed an all protein-based aerogel with favorable mechanical properties in a green and sus- tainable method by mechanochemistry. The properties of the aerogels can be adjusted by varying the relative ratio of PNFs and gelatin. The properties of PNFs can in turn be influenced by mechanochemical functionalization with hydrophobic dyes (dye@PNF). Aerogels prepared from gelatin and dye@PNF materials have better mechan- ical properties than aerogels prepared from gelatin and unmodified PNFs. These protein-based aerogels are pre- pared from edible components and may therefore find applications related to e.g. food science. In addition, as the aerogels are functionalized with luminescent mol- ecules, they may find applications as e.g. sensors or photo- nic materials. The pure gelatin aerogel is hard and we were not able to determine the Young’s modulus. The LPNF:GEL-0.5 aerogel has a Young’s modulus of 3.27 kPa. For aerogels obtained by mixing gelatin with LPNFs functionalized with the different dyes (F555, F378 and DCM), the Young’s modulus were 2.94 kPa (F555@LPNF:GEL-0.5), 3.53 kPa (F378@LPNF:GEL-0.5), and 3.28 kPa (DCM@LPNF:GEL-0.5) The Young’s modulus, pore size and specific surface area as well as density for the different aerogels are summarized in Table 1. LPNFs accordingly present an interesting material for tuning the properties of gelatin-derived aerogels. The mechanochemical processing provides an additional parameter to tune the properties of the aerogels. For the systems examined herein, the employment of different dye@LPNF materials allows the formation of mechanically more robust aerogels that in contrast to aerogels incorporating LPNF (without dyes) do not undergo fracturing at large deformations. Acknowledgements We acknowledge Daniel Aili and the Laboratory of Molecular Materials at IFM, LiU for access to their rheometer. No potential conflict of interest was reported by the author(s). [14] Nyström, G.; Fong, W.K.; Mezzenga, R. Ice-Templated and Cross-Linked Amyloid Fibril Aerogel Scaffolds for Cell Growth. Biomacromolecules 2017, 18, 2858–2865. Funding [15] Wang, S.; Wang, R.; Zhao, Q.; Ren, L.; Wen, J.; Chang, J.; Fang, X.; Hu, N.; Xu, C. Freeze-Drying Induced Self- Assembly Approach for Scalable Constructing MoS2/ Graphene Hybrid Aerogels for Lithium-Ion Batteries. J. Colloid Interface Sci. 2019, 544, 37–45. Y. Y. acknowledges financial support from the China Scholar- ship Council. Disclosure statement No potential conflict of interest was reported by the author(s). 4. Conclusion GREEN CHEMISTRY LETTERS AND REVIEWS 517 Structural Design: Functional Tailoring, Resource- Efficient Applications and Sustainability Analysis. Prog. Mater. Sci. 2022, 125, 100915. Disclosure statement References Graphene Nanofibrous Foam Designed as an Efficient Oil Absorbent. Ind. Eng. Chem. Res. 2019, 58, 3000–3008. [7] Kim, H.W.; Kim, H.E.; Salih, V. Stimulation of Osteoblast Responses to Biomimetic Nanocomposites of Gelatin- Hydroxyapatite for Tissue Engineering Scaffolds. Biomaterials 2005, 26, 5221–5230. [23] Lin, Y.Z.; Zhong, L.B.; Dou, S.; Shao, Z.D.; Liu, Q.; Zheng, Y.M. Facile Synthesis of Electrospun Carbon Nanofiber/ Graphene Oxide Composite Aerogels for High Efficiency Oils Absorption. Environ. Int. 2019, 128, 37–45. [8] Liu, Y.; Chan-Park, M.B. Hydrogel Based on Interpenetrating Polymer Networks of Dextran and Gelatin for Vascular Tissue Engineering. Biomaterials 2009, 30, 196–207. [24] Liu, Z.; Lyu, J.; Fang, D.; Zhang, X. Nanofibrous Kevlar Aerogel Threads for Thermal Insulation in Harsh Environments. ACS Nano. 2019, 13, 5703–5711. [9] Wang, J.; Zhao, D.; Shang, K.; Wang, Y.T.; Ye, D.D.; Kang, A.H.; Liao, W.; Wang, Y.Z. Ultrasoft Gelatin Aerogels for Oil Contaminant Removal. J. Mater. Chem. A. 2016, 4, 9381–9389. [25] Cheng, B.; Wu, P. Scalable Fabrication of Kevlar/Ti3C2Tx MXene Intelligent Wearable Fabrics with Multiple Sensory Capabilities. ACS Nano. 2021, 15, 8676–8685. [10] Kozlov, P.V.; Burdygina, G.I. The Structure and Properties of Solid Gelatin and the Principles of Their Modification. Polymer 1983, 24, 651–666. [26] Si, Y.; Wang, X.; Dou, L.; Yu, J.; Ding, B. Ultralight and Fire- Resistant Ceramic Nanofibrous Aerogels with Temperature-Invariant Superelasticity. Sci. Adv. 2018, 4, 8925. [11] Zhao, S.; Malfait, W.J.; Guerrero-Alburquerque, N.; Koebel, M.M.; Nyström, G. Biopolymer Aerogels and Foams: Chemistry, Properties, and Applications. Angew. Chem. Int. Ed. 2018, 57, 7580–7608. [27] Song, J.; Chen, C.; Yang, Z.; Kuang, Y.; Li, T.; Li, Y.; Huang, H.; Kierzewski, I.; Liu, B.; He, S. et al. Highly Compressible, Anisotropic Aerogel with Aligned Cellulose Nanofibers. ACS Nano. 2018, 12, 140–147. [12] Qian, Z.; Wang, Z.; Zhao, N.; Xu, J. Aerogels Derived from Polymer Nanofibers and Their Applications. Macromol. Rapid Commun. 2018, 39, 1700724. [28] Li, Y.Q.; Samad, Y.A.; Polychronopoulou, K.; Liao, K. Lightweight and Highly Conductive Aerogel-Like [13] Wei, G.; Zhang, J.; Usuelli, M.; Zhang, X.; Liu, B.; Mezzenga, R. Biomass vs Inorganic and Plastic-Based Aerogels: Y. YUAN AND N. SOLIN 518 Amyloid Nanostructure; Amyloid Hydrogels as Drug Delivery Vehicles. Chem. Commun. 2013, 49, 5082– 5084. Carbon from Sugarcane with Superior Mechanical and EMI Shielding Properties. ACS Sustainable Chem. Eng. 2015, 3, 1419–1427. [45] [29] Rigueto, C.V.T.; Nazari, M.T.; Massuda, L.Á.; Ostwald, B.E.P.; Piccin, J.S.; Dettmer, A. References Production and Environmental Applications of Gelatin-Based Composite Adsorbents for Contaminants Removal: A Review. Environ. Chem. Lett. 2021, 19, 2465–2486. [45] Duraj-Thatte, A.M.; Manjula-Basavanna, A.; Courchesne, N.M.D.; Cannici, G.I.; Sánchez-Ferrer, A.; Frank, B.P.; van’t Hag, L.; Cotts, S.K.; Fairbrother, D.H.; Mezzenga, R.; Joshi, N.S. Water-Processable, Biodegradable and Coatable Aquaplastic from Engineered Biofilms. Nat. Chem. Biol. 2021, 17, 732–738. [30] Li, S.L.; Wang, J.; Zhao, H.B.; Cheng, J.B.; Zhang, A.N.; Wang, T.; Cao, M.; Fu, T.; Wang, Y.Z. Ultralight Biomass Aerogels with Multifunctionality and Superelasticity Under Extreme Conditions. ACS Appl. Mater. Interfaces 2021, 13, 59231–59242. [46] Nyström, G.; Fernández-Ronco, M.P.; Bolisetty, S.; Mazzotti, M.; Mezzenga, R. Amyloid Templated Gold Aerogels. Adv. Mater. 2016, 28, 472–478. [47] Altamura, L.; Horvath, C.; Rengaraj, S.; Rongier, A.; Elouarzaki, K.; Gondran, C.; Maçon, A.L.; Vendrely, C.; Bouchiat, V.; Fontecave, M. et al. A Synthetic Redox Biofilm Made from Metalloprotein–Prion Domain Chimera Nanowires. Nat. Chem. 2017, 9, 157–163. [31] Yang,M.;Yuan,Y.;Li,Y.;Sun,X.;Wang,S.;Liang,L.;Ning,Y.;Li, J.; Yin, W.; Li, Y. Anisotropic Electromagnetic Absorption of Aligned Ti3C2Tx MXene/Gelatin Nanocomposite Aerogels. ACS Appl. Mater. Interfaces 2020, 12, 33128–33138. [48] Guttenplan, A.P.; Young, L.J.; Matak-Vinkovic, D.; Kaminski, C.F.; Knowles, T.P.; Itzhaki, L.S. Nanoscale Click-Reactive Scaffolds from Peptide Self-Assembly. J. Nanobiotechnol. 2017, 15, 1–8. [32] Wang, Y.T.; Zhao, H.B.; Degracia, K.; Han, L.X.; Sun, H.; Sun, M.; Wang, Y.Z.; Schiraldi, D.A. Green Approach to Improving the Strength and Flame Retardancy of Poly (Vinyl Alcohol)/Clay Aerogels: Incorporating Biobased Gelatin. ACS Appl. Mater. Interfaces 2017, 9, 42258–42265. [49] Friščić, T.; Mottillo, C.; Titi, H.M. Mechanochemistry for Synthesis. Angew. Chem. Int. Ed. 2020, 132, 1030–1041. [33] Lendel, C.; Solin, N. Protein Nanofibrils and Their Use as Building Blocks of Sustainable Materials. RSC Adv. 2021, 11, 39188–39215. [50] Rizzo, A.; Inganäs, O.; Solin, N. Preparation of Phosphorescent Amyloid-Like Protein Fibrils. Chem-Eur. J. 2010, 16, 4190–4195. [34] Knowles, T.P.; Mezzenga, R. Amyloid Fibrils as Building Blocks for Natural and Artificial Functional Materials. Adv. Mater. 2016, 28, 6546–6561. [51] Bäcklund, F.G.; Wigenius, J.; Westerlund, F.; Inganäs, O.; Solin, N. Amyloid Fibrils as Dispersing Agents for Oligothiophenes: Control of Photophysical Properties Through Nanoscale Templating and Flow Induced Fibril Alignment. J. Mater. Chem. C. 2014, 2, 7811–7822. [35] Ke, P.C.; Zhou, R.; Serpell, L.C.; Riek, R.; Knowles, T.P.; Lashuel, H.A.; Gazit, E.; Hamley, I.W.; Davis, T.P.; Fändrich, M. et al. Half a Century of Amyloids: Past, Present and Future. Chem. Soc. Rev. 2020, 49, 5473–5509. [52] Bäcklund, F.G.; Pallbo, J.; Solin, N. References Controlling Amyloid Fibril Formation by Partial Stirring. Biopolymers 2016, 105, 249–259. [36] Knowles, T.P.; Vendruscolo, M.; Dobson, C.M. The Amyloid State and Its Association with Protein Misfolding Diseases. Nat. Rev. Mol. Cell Bio. 2014, 15, 384–396. [53] Bäcklund, F.G.; Solin, N. Development and Application of Methodology for Rapid Screening of Potential Amyloid Probes. ACS Comb. Sci. 2014, 16, 721–729. [37] Chiti, F.; Dobson, C.M. Protein Misfolding, Functional Amyloid, and Human Disease. Annu. Rev. Biochem. 2006, 75, 333–366. [54] Wang, L.; Solin, N. Preparation of Functionalized Protein Materials Assisted by Mechanochemistry. J. Mater. Sci. 2018, 53, 13719–13732. [38] Rizzo, A.; Solin, N.; Lindgren, L.J.; Andersson, M.R.; Inganas, O. White Light with Phosphorescent Protein Fibrils in OLEDs. Nano Lett. 2010, 10, 2225–2230. [55] Bäcklund, F.G.; Solin, N. Tuning the Aqueous Self- Assembly Process of Insulin by a Hydrophobic Additive. RSC Adv. 2015, 5, 92254–92262. [39] Yuan, Y.; Solin, N. Mechanochemical Preparation and Self- Assembly of Protein: Dye Hybrids for White Luminescence. ACS Appl. Poly. Mater. 2021, 3, 4825–4836. [56] Wang, L.; Bäcklund, F.G.; Yuan, Y.; Nagamani, S.; Hanczyc, P.; Sznitko, L.; Solin, N. Air–Water Interface Assembly of Protein Nanofibrils Promoted by Hydrophobic Additives. ACS Sustainable Chem. Eng. 2021, 9, 9289–9299. [40] Hu, J.; Wang, L.; Zhang, X.; Yu, W.; Gao, H.W.; Solin, N.; Hu, Z.; Uvdal, K. Selective Colorimetric Detection of Copper (II) by a Protein-Based Nanoprobe. Spectrochim. Acta A. 2021, 252, 119462. [57] Fischer, H.; Polikarpov, I.; Craievich, A.F. Average Protein Density Is a Molecular-Weight-Dependent Function. Protein Sci. 2004, 13, 2825–2828. [41] Han, Y.; Cao, Y.; Bolisetty, S.; Tian, T.; Handschin, S.; Lu, C.; Mezzenga, R. Amyloid Fibril-Templated High- Performance Conductive Aerogels with Sensing Properties. Small 2020, 16, 2004932. [58] Kruk, M.; Jaroniec, M.; Sayari, A. Application of Large Pore MCM-41 Molecular Sieves to Improve Pore Size Analysis Using Nitrogen Adsorption Measurements. Langmuir 1997, 13, 6267–6273. p [42] Yuan Y.; Solin N. Protein-Based Flexible Conductive Aerogels for Piezoresistive Pressure Sensors. ACS Appl. Bio Mater. 2022, 5, 3360–3370. doi:10.1021/acsabm.2c00348 [59] Colquhoun, C.; Draper, E.R.; Schweins, R.; Marcello, M.; Vadukul, D.; Serpell, L.C.; Adams, D.J. Controlling the Network Type in Self-Assembled Dipeptide Hydrogels. Soft. Matter. 2017, 13, 1914–1919. [43] Yuan, Y.; Wang, L.; Porcheddu, A.; Colacino, E.; Solin, N. Mechanochemical Preparation of Protein: Hydantoin Hybrids and Their Release Properties. Chem. Sus. Chem. 2022, 15, e202102097. [60] Ye, X.; Capezza, A.J.; Xiao, X.; Lendel, C.; Hedenqvist, M.S.; Kessler, V.G.; Olsson, R.T. References Protein Nanofibrils and Their Hydrogel Formation with Metal Ions. ACS Nano. 2021, 15, 5341–5354. [44] Mains, J.; Lamprou, D.A.; McIntosh, L.; Oswald, I.D.; Urquhart, A.J. Beta-Adrenoceptor Antagonists Affect
https://openalex.org/W2162540985
https://hal.inrae.fr/hal-02646428/document
English
null
Repertoire of Escherichia coli agonists sensed by innate immunity receptors of the bovine udder and mammary epithelial cells
Veterinary research
2,012
cc-by
7,609
Adeline Porcherie, Patricia Cunha, Angélina Trotereau, Perrine Roussel, Florence Gilbert, Pascal P. Rainard, Pierre Germon Adeline Porcherie, Patricia Cunha, Angélina Trotereau, Perrine Roussel, Florence Gilbert, Pascal P. Rainard, Pierre Germon To cite this version: Adeline Porcherie, Patricia Cunha, Angélina Trotereau, Perrine Roussel, Florence Gilbert, et al.. Repertoire of Escherichia coli agonists sensed by innate immunity receptors of the bovine udder and mammary epithelial cells. Veterinary Research, 2012, 43, pp.14. ￿10.1186/1297-9716-43-14￿. ￿hal- 02646428￿ Distributed under a Creative Commons Attribution 4.0 International License © 2012 Porcherie et al; BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Repertoire of Escherichia coli agonists sensed by innate immunity receptors of the bovine udder and mammary epithelial cells Adeline Porcherie1,2, Patricia Cunha1,2, Angelina Trotereau1,2, Perrine Roussel1,2, Florence B Gilbert1,2, Pascal Rainard1,2 and Pierre Germon1,2* Abstract Escherichia coli is a frequent cause of clinical mastitis in dairy cows. It has been shown that a prompt response of the mammary gland after E. coli entry into the lumen of the gland is required to control the infection, which means that the early detection of bacteria is of prime importance. Yet, apart from lipopolysaccharide (LPS), little is known of the bacterial components which are detected by the mammary innate immune system. We investigated the repertoire of potential bacterial agonists sensed by the udder and bovine mammary epithelial cells (bMEC) during E. coli mastitis by using purified or synthetic molecular surrogates of bacterial agonists of identified pattern-recognition receptors (PRRs). The production of CXCL8 and the influx of leucocytes in milk were the readouts of reactivity of stimulated cultured bMEC and challenged udders, respectively. Quantitative PCR revealed that bMEC in culture expressed the nucleotide oligomerization domain receptors NOD1 and NOD2, along with the Toll-like receptors TLR1, TLR2, TLR4, and TLR6, but hardly TLR5. In line with expression data, bMEC proved to react to the cognate agonists C12-iE-DAP (NOD1), Pam3CSK4 (TLR1/2), Pam2CSK4 (TLR2/ 6), pure LPS (TLR4), but not to flagellin (TLR5). As the udder reactivity to NOD1 and TLR5 agonists has never been reported, we tested whether the mammary gland reacted to intramammary infusion of C12-iE-DAP or flagellin. The udder reacted to C12-iE-DAP, but not to flagellin, in line with the reactivity of bMEC. These results extend our knowledge of the reactivity of the bovine mammary gland to bacterial agonists of the innate immune system, and suggest that E. coli can be recognized by several PRRs including NOD1, but unexpectedly not by TLR5. The way the mammary gland senses E. coli is likely to shape the innate immune response and finally the outcome of E. coli mastitis. CXCL8 and C5a and the proinflammatory cytokines IL-1ß, IL-6 and TNFa [6,7]. * Correspondence: Pierre.germon@tours.inra.fr 1INRA, UMR 1282 Infectiologie et Santé Publique, F-37380 Nouzilly, France Full list of author information is available at the end of the article HAL Id: hal-02646428 https://hal.inrae.fr/hal-02646428v1 Submitted on 29 May 2020 L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés. HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci- entific research documents, whether they are pub- lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. Distributed under a Creative Commons Attribution 4.0 International License Porcherie et al. Veterinary Research 2012, 43:14 http://www.veterinaryresearch.org/content/43/1/14 Porcherie et al. Veterinary Research 2012, 43:14 VETERINARY RESEARCH VETERINARY RESEARCH RESEARCH Open Access Repertoire of Escherichia coli agonists sensed by innate immunity receptors of the bovine udder and mammary epithelial cells Experimentally induced mastitis Healthy mid-lactating Holstein cows of the experimental herd of the Institute at Nouzilly were selected on the basis of an absence of detectable bacterial growth from two weekly consecutive aseptically collected milk sam- ples in their four mammary quarters and less than 100 000 cells/mL in milk. The cows were in their sec- ond or third lactation and between 2 and 6 months in lactation; they were milked twice a day, at 0800 and 1600 h. The use and care of the cows in this study were approved by the Regional Committee of Ethics for Ani- mal Experimentation (CREEA) (approval CL2007-47). At time zero, five cows received in the lumen of quar- ters through the teat canal either 0.5 mL RPMI 1640 medium (Gibco), C12-iE-DAP (10 μg), Tri-DAP (50 μg). The fourth quarter was left untreated. A second group of five cows received, at time zero, either 0.5 mL RPMI 1640 medium (Gibco) or purified flagellin (5, 1 or 0.1 μg). The infused quarters and the control quarter were aseptically sampled just before the morning milk- ing, and infusion was carried out within 30 min post milking. The quarters were then sampled at 4, 8, 12, 24, 32, 48 and, in the case of NOD1 agonists, 72 h post infusion (hpi). Cells in milk were counted with an auto- mated cell counter (Fossomatic model90; Foss Food Technology, Hillerod, Denmark) as described previously [26]. The occurrence of new infections in the quarters under experiment was verified by plating milk samples onto blood agar plates. Results from quarters infected during the experiment were discarded leading to the removal of results from one quarter in the control group of the each experiment, one quarter infused with C12-iE-DAP and one infused with flagellin (1 μg). Of these agonists that trigger inflammation of the udder, only LPS and MDP can be produced by E. coli strains and contribute to the inflammation observed during bovine mastitis. Yet, E. coli can also produce other agonists that can contribute to this inflammation by triggering TLR2 or other PRR such as TLR5 or NOD1. Actually, lipoproteins from the E. coli envelope can be detected by the TLR2 receptor in combination with either TLR1 (for tri-acylated lipoproteins) or TLR6 (for di-acylated lipoproteins) [14]. In addition, TLR5 was shown to recognize flagellin, the major constituent of flagella [19]. Reagents C12-iE-DAP (C12-D-g-Glu-mDAP), Tri-DAP (L-Ala-g- D-Glu-mDAP), synthetic diacylated (Pam2CSK4) and triacylated (Pam3CSK4) lipopeptide, ultra pure LPS from E. coli K-12, bacterial flagellin from S. enterica ser- ovar Typhimurium were obtained lyophilized from Invi- voGen (Invivogen, France). Homologues of human TLR receptors 1-10 have been identified in bovine and were shown to be expressed at different levels in the skin [15,16]. In the udder, the expression of TLR2, TLR4 and NOD2 has been demon- strated by several laboratories [17,18]. In agreement with the expression of these receptors, infusion of puri- fied bacterial compounds recognized by these PRR lead to an inflammation of the udder mimicking the initial response to experimental infections with live bacteria. For example, infusion of LTA, muramyl-dipeptide (MDP) and LPS have already been shown to induce a neutrophil recruitment and to provoke symptoms simi- lar, yet not identical, to those caused by live bacteria [1,18]. Most importantly, it seems that these bacterial agonists can act synergistically and increase the response of the udder [18]. Agonists were made soluble in sterile pyrogen-free water and then diluted in cell culture medium. Experimentally induced mastitis In human, NOD1 recognizes peptidoglycan fragments composed of gamma-D-gluta- myl-meso-diaminopimelic acid (iE-DAP) or N-acetylmura- myl-L-alanyl-g-D-glutamyl- meso-diaminopimelic acid (mur-TriDAP) [20]. Recognition of both flagellin and peptidoglycan frag- ments is an important issue given the role these MAMPs can play during an infection. Indeed, flagellin is a major player in the recognition of mucosal pathogens [19]. NOD1 has also been demonstrated as an important med- iator in controlling infections by, for example, Listeria monocytogenes, Helicobacter pylori or entero-invasive E. coli [21-23]. Furthermore, it was recently shown that NOD1 could play a role in the maturation of the immune system and that its stimulation could modify the response of the host in a case of neutrophilic inflammation [24,25]. In order to better characterize how E. coli is recog- nized by bMEC, we investigated the repertoire of E. coli MAMPs that could be recognized by bMEC. MAMPs tested are known agonists of different innate immune receptors such as TLR2/TLR1 or TLR2/TLR6 heterodi- mers, TLR4, TLR5, NOD1 and NOD2. Recognition of both flagellin and peptidoglycan frag- ments is an important issue given the role these MAMPs can play during an infection. Indeed, flagellin is a major player in the recognition of mucosal pathogens [19]. NOD1 has also been demonstrated as an important med- iator in controlling infections by, for example, Listeria monocytogenes, Helicobacter pylori or entero-invasive E. coli [21-23]. Furthermore, it was recently shown that NOD1 could play a role in the maturation of the immune system and that its stimulation could modify the response of the host in a case of neutrophilic inflammation [24,25]. Introduction Mastitis is an important pathology in the dairy industry, both in terms of economic impact and animal health. Escherichia coli is among the major mastitis pathogens responsible for clinical mastitis in cows [1-4]. The infec- tion is initiated by the entry of the bacteria through the teat canal and, after a short incubation period, is charac- terized by an important inflammatory response and an important influx of neutrophils into the udder [1,5]. A contribution of Mammary Epithelial Cells (MEC) to the production of these different mediators has been suggested by different authors [8-11]. Indeed, the incu- bation of primary cell cultures of bovine Mammary Epithelial Cells (bMEC) obtained from healthy animals with bacteria, either E. coli or S. aureus, induces a strong response [11-13]. Initiation of the inflammation is accompanied by the production in milk of several molecules in the early stages of infection such as the neutrophil chemo-attractants Recognition of bacteria by host cells, for example macrophages, dendritic cells or epithelial cells, relies upon so called Pattern Recognition Receptors (PRR) [14]. Such receptors belong to three different families namely the Toll-like (TLR), NOD-like (NLR) and RIG- 1-like (RLR) receptors. Each of these receptors * Correspondence: Pierre.germon@tours.inra.fr 1INRA, UMR 1282 Infectiologie et Santé Publique, F-37380 Nouzilly, France Full list of author information is available at the end of the article Page 2 of 8 Porcherie et al. Veterinary Research 2012, 43:14 http://www.veterinaryresearch.org/content/43/1/14 Page 2 of 8 Porcherie et al. Veterinary Research 2012, 43:14 http://www.veterinaryresearch.org/content/43/1/14 Materials and methods Reagents recognizes a set of bacterial motifs or Microbe Asso- ciated Molecular Patterns (MAMPs). For example, TLR4, TLR2 and TLR5 are respectively involved in sensing lipopolysaccharide (LPS), lipoteichoic acid (LTA) (and lipoproteins) and flagellin [14]. Quantification of CXCL8 by ELISA Statistical analyses of the concentrations of CXCL8 or SCC in milk were performed with the nonparametric Friedman test. Comparisons of CXCL8 concentrations in bMEC supernatants were done using the Kruskal and Wallis test followed by multiple comparisons with a Bonferoni correction. A P value < 0.05 was considered significant. CXCL8 concentrations were measured in skim milk by ELISA as described [11,28]. The lowest limit of detec- tion and level of quantification in milk were 0.01 and 0.03 ng/mL for CXCL8, respectively. Culture and stimulation of bMEC bMEC were isolated from five lactating cows as previously described and cryopreserved in liquid nitrogen [10]. Cells were used at their third passage and cultivated as described [27]. Briefly, cells were seeded into 24-well tissue culture plates at a density of 105 cells/well and cultured until con- fluence in a growth medium made up of D-MEM-F12 advanced medium with 2 mM L-glutamine, 20 mM HEPES, 50 μg/mL IGF-1, 10 μg/mL FGF, 10 μg/mL EGF and 1 μg/mL hydrocortisone as additives. The growth medium was then replaced with stimulation medium made up of Advanced D-MEM-F12 medium with 2 mM L-gluta- mine, 20 mM HEPES, and 4 ng/mL hydrocortisone as additives. Stimulations with bacterial agonists were carried Reverse transcription and qPCR analysis Reverse transcription and qPCR analysis Total RNA was extracted from bMEC by using the NucleoSpin RNA II extraction kit (Macherey-Nagel, Düren, Germany), and the residual genomic DNA was removed by using DNase digestion with RNase-free DNase (Macherey-Nagel). The total RNA quantity and quality were assessed by using a NanoDrop spectrophot- ometer (NanoDrop Technologies, Wilmington, DE, Porcherie et al. Veterinary Research 2012, 43:14 http://www.veterinaryresearch.org/content/43/1/14 Page 3 of 8 Page 3 of 8 Porcherie et al. Veterinary Research 2012, 43:14 http://www.veterinaryresearch.org/content/43/1/14 out 16-24 h later. The medium was removed, and agonists (uLPS, C12-iE-DAP, Pam2CSK4, Pam3CSK4, flagellin) were added at the desired concentration in 1 mL of stimu- lation medium. Control wells were treated with stimulation medium only. 5 h after exposure to the MAMP, culture medium was aspirated and stored at -20°C. USA). Total RNA (1 μg) was then reverse transcribed to cDNA using random hexamers and SuperScript RT III (Invitrogen) according to the manufacturer’s instructions. Diluted cDNA samples were stored at 4°C until use. Pri- mers used in this study are listed in Table 1. Relative quantities of gene transcripts were measured as described previously [27]. USA). Total RNA (1 μg) was then reverse transcribed to cDNA using random hexamers and SuperScript RT III (Invitrogen) according to the manufacturer’s instructions. Diluted cDNA samples were stored at 4°C until use. Pri- mers used in this study are listed in Table 1. Relative quantities of gene transcripts were measured as described previously [27]. Multiple PRRs are expressed by bMEC In a first attempt to characterize the repertoire of bacter- ial agonists recognized by the bovine udder, we investi- gated the expression of different Pattern Recognition Receptors (PRR) by RT-qPCR. PRR investigated are those homologous to mammalian receptors involved in recog- nition of LPS (TLR4), peptidoglycan (NOD1 and NOD2), lipoproteins (TLR2, TLR1 and TLR6) and flagellin (TLR5). Expression of all these PRRs was observed in the bMEC preparations isolated from the five different cows (Figure 1). Yet, expression of TLR5 was found to be Table 1 List of primers used in this study Gene Primer ID Primer sequence Size of amplicon Annealing temperature (°C) 18S 18sF CGGGGAGGTAGTGACGAAA 196 bp 62 18sR CCGCTCCCAAGATCCAACTA ACTB ACTB f ACGGGCAGGTCATCACCATC 166 bp 64 ACTB r AGCACCGTGTTGGCGTAGAG PPIA PPIA Fq TCCGGGATTTATGTGCCAGGG 206 bp 66 PPIA Rq GCTTGCCATCCAACCACTCAG TLR1 TLR1 Fq ACCCTACTCTGAACCTCAAG 142 bp 62 TLR1 Rq GACTGCACACTGGATTTCTG TLR2 TLR2 Fq ACTGGGTGGAGAACCTCATGGTCC 307 bp 62 TLR2 Rq ATCTTCCGCAGCTTACAGAAGC TLR4 TLR4 F2q GCATGGAGCTGAATCTCTAC 238 bp 62 TLR4 R2q CAGGCTAAACTCTGGATAGG TLR5 TLR5 Fq TTCCTGCAACCTCACCCAAG 192 bp 62 TLR5 Rq CTGAGATTGGGCAGGTTTCG TLR6 TLR6 Fq CTCCGGGAGATAGTCACTTC 297 bp 62 TLR6 Rq GGCCCTGGATTCTATTATGG NOD1 NOD1 F2q TGGTCACTCACATCCGAAAC 218 bp 62 NOD1 F2q AGGCCTGAGATCCACATAAG NOD2 NOD2-f CCCAGGGGCTCAGAACTAACA 238 bp 62 NOD2-r CCTTCATCCTGGACGTGGTTC Table 1 List of primers used in this study Porcherie et al. Veterinary Research 2012, 43:14 http://www.veterinaryresearch.org/content/43/1/14 Page 4 of 8 Figure 1 Expression of PRR by bMEC. Quantitative RT-PCR was performed on RNA obtained from bMEC isolated from 5 different cows. ΔCt values (Ct target–Ct for ß-actin gene) for each bMEC are represented on the graph. PCR efficiency was above 90% for all genes and Ct were obtained for an identical fluorescence threshold for all genes. peptidoglycan fragments and lipoproteins, we investi- gated whether this was correlated to response to these compounds. Our results demonstrate that the NOD1 agonist C12-iE-DAP induces the production of CXCL8 in a dose dependent manner starting at 100 ng/mL C12-iE-DAP (Figure 2). bMEC also responded to Pam3CSK4 and Pam2CSK4, two lipoprotein analogs respectively agonists of the heterodimer receptors TLR1/2 and TLR2/6 (Figure 2). Interestingly, a strong response was observed with as little as 10 ng/mL of Pam2CSK4 and this response was not increased when using 100 ng/mL or 1000 ng/mL concentrations. Multiple PRRs are expressed by bMEC Con- sistent with the low transcription of TLR5 by bMEC, these cells failed to respond to flagellin in a significant manner: indeed, even at a high concentration (1000 ng/ mL), a very low production of CXCL8 was observed (Figure 2). much lower than that for other TLRs: indeed, although the PCR efficiencies were similar for all genes analyzed (above 90%), the ΔCt value for TLR5 was on average between 3 and 9 cycles above that of other genes. On the contrary, TLR4 and NOD1 were the most highly expressed receptors. Altogether, these results indicate that, in addition to LPS, bMEC are able to sense and respond to TLR2, NOD1 and NOD 2 agonists but not to TLR5 agonists. The response of the udder to bacterial agonists mimics that of bMEC bMEC respond to stimulation by LPS, peptidoglycan fragments but not flagellin bMEC respond to stimulation by LPS, peptidoglycan fragments but not flagellin Twenty-four hours prior to stimulation, the culture medium was replaced by stimulation medium. Cells were incubated in the presence of different purified agonists at the indicated concentrations. CXCL8 concentration in the supernatant was measured by ELISA 5 h after initiation of the stimulation. Data are median values and interquartile ranges. *statistical significance (P < 0.05) of values from stimulated versus unstimulated bMEC. Figure 2 CXCL8 secretion by bMEC after stimulation with different bacterial agonists. bMEC from five different cows were seeded in 24-well plates at a concentration of 105 cells/well. Twenty-four hours prior to stimulation, the culture medium was replaced by stimulation medium. Cells were incubated in the presence of different purified agonists at the indicated concentrations. CXCL8 concentration in the supernatant was measured by ELISA 5 h after initiation of the stimulation. Data are median values and interquartile ranges. *statistical significance (P < 0.05) of values from stimulated versus unstimulated bMEC. bMEC respond to stimulation by LPS, peptidoglycan fragments but not flagellin Among the above tested agonists, Pam2CSK4 and Pam3CSK4 are supposed to act through stimulation of TLR2, a receptor that is known to be both expressed in vivo at the surface of mammary epithelial cells and functional as demonstrated by intramammary infusion of LTA [11,17]. We therefore focused our in ubero stu- dies on receptors whose activation had never been stu- died previously in the cow. To investigate whether these transcription results trans- lated into functional differences we investigated the response of bMEC to the different agonists recognized by these PRRs. Results obtained confirmed previous stu- dies showing that bMEC respond to stimulation by ago- nists such as LPS, MDP or LTA by the production of CXCL8 (Figure 2 and data not shown) [18]. As all bMEC used in this study also express receptors for We therefore tested the capacity of TLR5 and NOD1 agonists to induce inflammation when infused in the udder. C12-iE-DAP was infused in the mammary gland of 5 cows and we monitored the somatic cell count (Figure 3a) as well as the CXCL8 production in milk (Figure 3b). Our results clearly establish that this agonist induced cellular recruitment and CXCL8 production. Increased SCC com- pared to the control quarter was observed as early as 12 hpi. On the contrary, the use of another NOD1 agonist, Tri-DAP, failed to induce both a significant cellular recruit- ment and CXCL8 production in milk. Figure 2 CXCL8 secretion by bMEC after stimulation with different bacterial agonists. bMEC from five different cows were seeded in 24-well plates at a concentration of 105 cells/well. Twenty-four hours prior to stimulation, the culture medium was replaced by stimulation medium. Cells were incubated in the presence of different purified agonists at the indicated concentrations. CXCL8 concentration in the supernatant was measured by ELISA 5 h after initiation of the stimulation. Data are median values and interquartile ranges. *statistical significance (P < 0.05) of values from stimulated versus unstimulated bMEC. Flagellin was infused in the udder of 5 cows at three different doses, up to 5 μg: in all cases, no significant cellular recruitment was observed, consistent with the lack of TLR5 expression and response of bMEC to fla- gellin (Figure 4). Figure 2 CXCL8 secretion by bMEC after stimulation with different bacterial agonists. bMEC from five different cows were seeded in 24-well plates at a concentration of 105 cells/well. Discussion SCC and CXCL8 were quantified in milk 4, 8, 12, 24, 32, 48 h post-infusion. Data are median values and interquartile ranges. *statistical significance (P < 0.05) of values before and after treatment. Figure 4 Somatic cell counts (SCC) in quarters infused with flagellin 0.1 μg (☐), flagellin 1 μg (△); flagellin 5 μg (×) or control quarter (◊). Purified agonists were infused into the udder of five different cows. SCC and CXCL8 were quantified in milk 4, 8, 12, 24, 32, 48 h post-infusion. Data are median values and interquartile ranges. *statistical significance (P < 0.05) of values before and after treatment. Figure 4 Somatic cell counts (SCC) in quarters infused with flagellin 0.1 μg (☐), flagellin 1 μg (△); flagellin 5 μg (×) or control quarter (◊). Purified agonists were infused into the udder of five different cows. SCC and CXCL8 were quantified in milk 4, 8, 12, 24, 32, 48 h post-infusion. Data are median values and interquartile ranges. *statistical significance (P < 0.05) of values before and after treatment. from a role in triggering the innate immune response, activation of NOD1 could also contribute to a more effi- cient reduction of the pathogen load by neutrophils as was shown in other infections [29]. Yet, we only observed inflammation of the udder with C12-iE-DAP and not with Tri-DAP. The major difference between these two agonists is that C12-iE-DAP is rendered membrane permeable by a lipophylic moiety which allows the molecule to better enter the host cell and activate NOD1 [30]. Indeed, the NOD1 receptor is cyto- plasmic and its activation requires that the agonist is transported into the host cell [31]. Figure 3 A–Somatic cell counts (SCC) in quarters infused with C12-iE-DAP 10 μg (☐) Tri-DAP 50 μg (△) or control quarter (◊) Figure 3 A–Somatic cell counts (SCC) in quarters infused with C12-iE-DAP 10 μg (☐), Tri-DAP 50 μg (△) or control quarter (◊). B–CXCL8 concentration in milk from quarters infused with C12-iE- DAP 10 μg (☐), Tri-DAP 50 μg (△) or control quarter (◊). Purified agonists were infused into the udder of five different cows. SCC and CXCL8 were quantified in milk 4, 8, 12, 24, 32, 48 h post-infusion. Data are median values and interquartile ranges. *statistical significance (P < 0.05) of values before and after treatment. Discussion μg ( ), μg ( ) q ( ) B–CXCL8 concentration in milk from quarters infused with C12-iE- DAP 10 μg (☐), Tri-DAP 50 μg (△) or control quarter (◊). Purified agonists were infused into the udder of five different cows. SCC and CXCL8 were quantified in milk 4, 8, 12, 24, 32, 48 h post-infusion. Data are median values and interquartile ranges. *statistical significance (P < 0.05) of values before and after treatment. The failure to induce inflammation of the udder with Tri-DAP is therefore likely to result from the lack of access of this agonist to the cytoplasm of host cells. Nevertheless, during the course of mastitis, it is possible that peptidoglycan fragments recognized by NOD1 can reach the cytoplasm of bovine cells following invasion of epithelial cells by E. coli. Indeed, invasion of mammary epithelial cells has been described for some strains of E. coli involved in recurrent mastitis cases [32]. Further- more, expression of membrane transporters under parti- cular circumstances like inflammation could transport peptidoglycan fragments, as was shown for MDP, a NOD2 agonist [18,33]. several studies that showed that these cells were able to respond to different bacterial stimuli. In this study we investigated in more details the bacterial compounds that could be recognized by bMEC and whether these compounds were able to induce inflammation when infused into the udder. By a combination of transcrip- tion data, in vitro stimulation of bMEC and in ubero experiments we confirmed previous studies and showed for the first time that NOD1 could play a role in bovine mastitis while, on the contrary, TLR5 is not likely to be an important contributor to the inflammation of the udder. Most interestingly, we demonstrated that the TLR5 gene was only weakly transcribed and, consistently, that bacterial flagellin was not recognized by bMEC and did not induce inflammation of the udder. The failure of purified flagellin to induce inflammation of the udder was not expected since it is considered an important target of mucosal immunity [34]. Although the flagellin used in this study was purified from S. enterica serovar More precisely, our results show for the first time that peptidoglycan fragments known to activate the NOD1 receptor in other mammals could be recognized by bMEC and are able to induce inflammation in ubero. This result is all the more important given the multiple activities that the NOD1 receptor is likely to play. Discussion This study was undertaken in order to understand how E. coli can be sensed by the mammary gland and to bet- ter characterize the potential contribution of bMEC to the inflammation of the udder. The role of bMEC in initiating the inflammation has been suggested by Porcherie et al. Veterinary Research 2012, 43:14 http://www.veterinaryresearch.org/content/43/1/14 Page 5 of 8 Figure 3 A–Somatic cell counts (SCC) in quarters infused with C12-iE-DAP 10 μg (☐), Tri-DAP 50 μg (△) or control quarter (◊). B–CXCL8 concentration in milk from quarters infused with C12-iE- DAP 10 μg (☐), Tri-DAP 50 μg (△) or control quarter (◊). Purified agonists were infused into the udder of five different cows. SCC and CXCL8 were quantified in milk 4, 8, 12, 24, 32, 48 h post-infusion. Data are median values and interquartile ranges. *statistical significance (P < 0.05) of values before and after treatment. from a role in triggering the innate immune response activation of NOD1 could also contribute to a more effi cient reduction of the pathogen load by neutrophils a was shown in other infections [29]. Yet, we only observed inflammation of the udder with C12-iE-DAP and not with Tri-DAP. The major difference between these two agonists is that C12-iE-DAP is rendered membrane permeable by a lipophylic moiety which allows the molecule to better enter the host cell and activate NOD1 [30]. Indeed, the NOD1 receptor is cyto plasmic and its activation requires that the agonist i transported into the host cell [31]. The failure to induce inflammation of the udder with T i DAP i h f lik l l f h l k Figure 3 A–Somatic cell counts (SCC) in quarters infused with C12-iE-DAP 10 μg (☐), Tri-DAP 50 μg (△) or control quarter (◊). B–CXCL8 concentration in milk from quarters infused with C12-iE- DAP 10 μg (☐), Tri-DAP 50 μg (△) or control quarter (◊). Purified agonists were infused into the udder of five different cows. SCC and CXCL8 were quantified in milk 4, 8, 12, 24, 32, 48 h post-infusion. Data are median values and interquartile ranges. *statistical significance (P < 0.05) of values before and after treatment. Figure 4 Somatic cell counts (SCC) in quarters infused with flagellin 0.1 μg (☐), flagellin 1 μg (△); flagellin 5 μg (×) or control quarter (◊). Purified agonists were infused into the udder of five different cows. Discussion Apart Page 6 of 8 Porcherie et al. Veterinary Research 2012, 43:14 http://www.veterinaryresearch.org/content/43/1/14 Regarding the specificity of bovine PRRs, one should bear in mind that the specificity of these receptors might not be strictly identical to that of human/mouse PRRs, as reviewed by Werling et al. [40]. These authors actually state that bovine TLR1/TLR2 heterodimers could sense both Pam2CSK4 and Pam3CSK4. Concerning TLR5, stu- dies with Salmonella Typhimurium flagellin indicated that it could activate bovine TLR5 expressing macrophages [41]. The specificities of bovine NOD1 and NOD2 recep- tors have not been characterized so far. Typhimurium, it is known to activate most mammalian TLR5 receptors. Furthermore, the region of flagellin recognized by TLR5 is located in one of the two con- served regions of flagellin and is present both in Salmo- nella Typhimurium and E. coli flagellin [19,35]. It is therefore likely that, as for Salmonella Typhimurium fla- gellin, E. coli flagellin will not be detected by bMEC and does not contribute to the inflammation of the udder during E. coli mastitis. Still, it is possible that TLR5 contributes to the response of the host when the infection worsens. In other pathologies, stimulation of TLR5 in epithelial cells is pre- cluded by the basolateral localization of TLR5 and only occurs as a consequence of tissue damage whereby flagel- lin gets in contact with TLR5 receptors [36]. This situa- tion is often the result of invasive pathogens and, in some instances, could occur in severe E. coli mastitis cases. One could also speculate that expression of TLR5 could be induced upon activation of other PRRs. Aside from detection by TLR5, flagellin, when translocated to the cytoplasm of the host cell, is also known to activate the inflammasome through stimulation of NLRC4 (also called IPAF) [37]. However, the contribution of this path- way to the response of the host to flagellin is still under debate [34]. The udder unresponsiveness to flagellin also suggests that milk macrophages were either too few or not reactive enough to set up inflammation. Investigations described in this manuscript were obtained with purified agonists used alone. Our recent results with MDP and LTA indicate that agonists can act synergistically. Because a bacterium expresses several MAMPs at a time such a synergy is likely to best mimic what bMEC are exposed to during E. coli mastitis. Discussion Synergy between MAMPs has already been observed in other mod- els: in mice, for example, inoculation of LPS after an MDP treatment increases the immune response [42]. Synergy has also been observed with human monocytes and den- dritic cells [43]. Our preliminary data indicate that such a synergy may exist in ubero between LPS and MDP (data not shown). The relevance of these potential synergies is important in that it is likely to improve the recognition of an udder pathogen and lead to an early response of the host, which impacts the outcome of infection. A corollary would be to study how different E. coli strains stimulate each of these different PRRs. Because our results were obtained with purified generic compounds, they do not necessarily reflect the full diversity of E. coli MAMPs that can be recognized. Indeed, the E. coli species is very diverse: recent genomic studies have shown that of the 4500-5000 genes that one E. coli strain might contain only approx. 1800 genes are found in all E. coli strains [44]. Mastitis E. coli isolates has only been incompletely characterized. The presence of different genes character- ized as virulence factors in other E. coli pathotypes has been investigated by several authors but none has been shown to be highly prevalent in mastitis E. coli strains. Recently, a preliminary study showed that the prototypical E. coli mastitis strain P4 contains several unique regions [45]. Although no potential virulence genes have been identified as specific of mastitis E. coli strains, the way E. coli stimulates the host cells might play a role in the inflammation of the udder. Altogether, the above results support the idea that flagel- lin is not a critical motif for the early detection of E. coli in the healthy udder, neither through the activation of TLR5 nor that of NLRC4. Interestingly, proteomic analysis of the mastitis E. coli strain P4 have shown that expression of fla- gellin is decreased when bacteria are grown in milk com- pared to conventional laboratory growth medium [38]. Our results also show that bMEC are also able to sense the presence of lipoproteins through the TLR1/2 and TLR2/6 heterodimers. Both agonists used in this study induced a significant response of bMEC, Pam2CSK4 being more potent than Pam3CSK4 at inducing CXCL8 secretion by bMEC. Authors’ contributions PRa and FBG conceived the study and participated in its design and coordination; PRa, FBG, AT and PC carried out collection and analysis of milk samples. AP, PG and PC performed and analyzed stimulation of bMEC and expression of PRR data. PG wrote the manuscript. AP, FBG, PRo and PRa helped writing the final version of the manuscript. All authors read and approved the final manuscript. 19. Ramos HC, Rumbo M, Sirard JC: Bacterial flagellins: mediators of pathogenicity and host immune responses in mucosa. Trends Microbiol 2004, 12:509-517. 20. Chaput C, Boneca IG: Peptidoglycan detection by mammals and flies. Microbes Infect 2007, 9:637-647. 20. Chaput C, Boneca IG: Peptidoglycan detection by mammals and flies. Microbes Infect 2007, 9:637-647. Author details 1 1INRA, UMR 1282 Infectiologie et Santé Publique, F-37380 Nouzilly, France. 2Université François Rabelais, UMR 1282, Tours, France. 18. Bougarn S, Cunha P, Harmache A, Fromageau A, Gilbert FB, Rainard P: Muramyl dipeptide synergizes with Staphylococcus aureu lipoteichoic acid to recruit neutrophils in the mammary gland and to stimulate mammary epithelial cells. Clin Vaccine Immunol 2010, 17:1797-1809. Acknowledgements l g P. Roussel is recipient of a grant from the « Microbiology and Food Chain » and « Animal Health » divisions of INRA. This project was funded in part by Pfizer AH. 16. Menzies M, Ingham A: Identification and expression of Toll-like receptors 1-10 in selected bovine and ovine tissues. Vet Immunol Immunopathol 2006, 109:23-30. 16. Menzies M, Ingham A: Identification and expression of Toll-like receptors 1-10 in selected bovine and ovine tissues. Vet Immunol Immunopathol 2006, 109:23-30. 17. Petzl W, Zerbe H, Gunther J, Yang W, Seyfert HM, Nurnberg G, Schuberth HJ: Escherichia col, but not Staphylococcus aureu triggers an early increased expression of factors contributing to the innate immune defense in the udder of the cow. Vet Res 2008, 39:18. Discussion Jungi TW, Farhat K, Burgener IA, Werling D: Toll-like receptors in domestic animals. Cell Tissue Res 2011, 343:107-120. 15. Jungi TW, Farhat K, Burgener IA, Werling D: Toll-like receptors in domestic animals. Cell Tissue Res 2011, 343:107-120. References 1. Burvenich C, Van Merris V, Mehrzad J, Diez-Fraile A, Duchateau L: Severity of E. col mastitis is mainly determined by cow factors. Vet Res 2003, 34:521-564. 23. Viala J, Chaput C, Boneca IG, Cardona A, Girardin SE, Moran AP, Athman R, Memet S, Huerre MR, Coyle AJ, DiStefano PS, Sansonetti PJ, Labigne A, Bertin J, Philpott DJ, Ferrero RL: Nod1 responds to peptidoglycan delivered by the Helicobacter pylori ca pathogenicity island. Nat Immunol 2004, 5:1166-1174. 2. Botrel MA, Haenni M, Morignat E, Sulpice P, Madec JY, Calavas D: Distribution and antimicrobial resistance of clinical and subclinical mastitis pathogens in dairy cows in Rhone-Alpes, France. Foodborne Pathog Dis 2010, 7:479-487. 2. Botrel MA, Haenni M, Morignat E, Sulpice P, Madec JY, Calavas D: Distribution and antimicrobial resistance of clinical and subclinical mastitis pathogens in dairy cows in Rhone-Alpes, France. Foodborne Pathog Dis 2010, 7:479-487. 24. Bouskra D, Brezillon C, Berard M, Werts C, Varona R, Boneca IG, Eberl G: Lymphoid tissue genesis induced by commensals through NOD1 regulates intestinal homeostasis. Nature 2008, 456:507-510. 3. Bradley AJ, Leach KA, Breen JE, Green LE, Green MJ: Survey of the incidence and aetiology of mastitis on dairy farms in England and Wales. Vet Rec 2007, 160:253-257. 25. Clarke TB, Davis KM, Lysenko ES, Zhou AY, Yu Y, Weiser JN: Recognition of peptidoglycan from the microbiota by Nod1 enhances systemic innate immunity. Nat Med 2010, 16:228-231. 4. Kalmus P, Aasmae B, Karssin A, Orro T, Kask K: Udder pathogens and their resistance to antimicrobial agents in dairy cows in Estonia. Acta Vet Scand 2011, 53:4. 4. Kalmus P, Aasmae B, Karssin A, Orro T, Kask K: Udder pathogens and their resistance to antimicrobial agents in dairy cows in Estonia. Acta Vet Scand 2011, 53:4. 26. Bannerman DD, Paape MJ, Lee JW, Zhao X, Hope JC, Rainard P: Escherichia col and Staphylococcus aureu elicit differential innate immune responses following intramammary infection. Clin Diagn Lab Immunol 2004, 11:463-472. 5. Vangroenweghe F, Rainard P, Paape M, Duchateau L, Burvenich C: Increase of Escherichia col inoculum doses induces faster innate immune response in primiparous cows. J Dairy Sci 2004, 87:4132-4144. 5. Vangroenweghe F, Rainard P, Paape M, Duchateau L, Burvenich C: Increase of Escherichia col inoculum doses induces faster innate immune response in primiparous cows. J Dairy Sci 2004, 87:4132-4144. 6. Competing interests Th h d l h 21. Kim JG, Lee SJ, Kagnoff MF: Nod1 is an essential signal transducer in intestinal epithelial cells infected with bacteria that avoid recognition by toll-like receptors. Infect Immun 2004, 72:1487-1495. The authors declare that they have no competing interests. The authors declare that they have no competing interests. The authors declare that they have no competing interests. Received: 5 October 2011 Accepted: 13 February 2012 Published: 13 February 2012 Received: 5 October 2011 Accepted: 13 February 2012 Published: 13 February 2012 Received: 5 October 2011 Accepted: 13 February 2012 Published: 13 February 2012 22. Mosa A, Trumstedt C, Eriksson E, Soehnlein O, Heuts F, Janik K, Klos A, Dittrich-Breiholz O, Kracht M, Hidmark A, Wigzell H, Rottenberg ME: Nonhematopoietic cells control the outcome of infection with Listeria monocytogene in a nucleotide oligomerization domain 1-dependent manner. Infect Immun 2009, 77:2908-2918. Discussion Such results are not surprising since expression of the TLR2 receptor has already been shown in bMEC and was increased in infected udders [8,17]. In addition, infusion of the TLR2 agonist LTA in the udder of cows was shown to induce inflammation [18]. A new finding of this study is that bMEC reacted strongly to much lower concentrations of Pam2CSK4 than to Pam3CSK4. This higher reactivity is in line with the higher expression of TLR6 compared to TLR1 by bMEC. Nevertheless, although di-acyl lipoproteins can be found in E. coli, most E. coli lipoproteins are tri-acylated pro- teins [39]. It is therefore likely that the response of bMEC to Pam3CSK4 resembles most to that induced by E. coli lipoproteins. In conclusion, bMEC are equipped with innate immu- nity receptors that allow them to sense several E. coli MAMPs. Overall, expression of PRRs as expressed by qPCR mirrored the reactivity of bMEC as assessed by the production of CXCL8, and the results obtained in bMEC in vitro were in good agreement with the in ubero studies. Such findings are in line with the concept that bMEC are key players in initiating neutrophil inflammation during Page 7 of 8 Page 7 of 8 Porcherie et al. Veterinary Research 2012, 43:14 http://www.veterinaryresearch.org/content/43/1/14 Porcherie et al. Veterinary Research 2012, 43:14 http://www.veterinaryresearch.org/content/43/1/14 11. Rainard P, Fromageau A, Cunha P, Gilbert FB: Staphylococcus aureu lipoteichoic acid triggers inflammation in the lactating bovine mammary gland. Vet Res 2008, 39:52. E. coli mastitis. Recognition of several MAMPs at a time could contribute to the onset of an early response of the cow after infection by E. coli. These results pave the way to a better understanding of the early steps of the inflam- mation triggered by E. coli entrance into the udder. The precise contribution of the different PRR to this response is now necessary and deserves further studies. 12. Rinaldi M, Li RW, Capuco AV: Mastitis associated transcriptomic disruptions in cattle. Vet Immunol Immunopathol 2010, 138:267-279. 13. Gunther J, Koczan D, Yang W, Nurnberg G, Repsilber D, Schuberth HJ, Park Z, Maqbool N, Molenaar A, Seyfert HM: Assessment of the immune capacity of mammary epithelial cells: comparison with mammary tissue after challenge with Escherichia col. Vet Res 2009, 40:31. 14. Kumar H, Kawai T, Akira S: Pathogen recognition by the innate immune system. Int Rev Immunol 2011, 30:16-34. 15. Porcherie et al. Veterinary Research 2012, 43:14 http://www.veterinaryresearch.org/content/43/1/14 32. Dogan B, Klaessig S, Rishniw M, Almeida RA, Oliver SP, Simpson K, Schukken YH: Adherent and invasive Escherichia col are associated with persistent bovine mastitis. Vet Microbiol 2006, 116:270-282. 32. Dogan B, Klaessig S, Rishniw M, Almeida RA, Oliver SP, Simpson 33. Vavricka SR, Musch MW, Chang JE, Nakagawa Y, Phanvijhitsiri K, Waypa TS, Merlin D, Schneewind O, Chang EB: hPepT1 transports muramyl dipeptide, activating NF-kappaB and stimulating IL-8 secretion in human colonic Caco2/bbe cells. Gastroenterology 2004, 127:1401-1409. 34. Vijay-Kumar M, Gewirtz AT: Flagellin: key target of mucosal innate immunity. Mucosal Immunol 2009, 2:197-205. 35. Jacchieri SG, Torquato R, Brentani RR: Structural study of binding of flagellin by Toll-like receptor 5. J Bacteriol 2003, 185:4243-4247. 35. Jacchieri SG, Torquato R, Brentani RR: Structural study of binding of flagellin by Toll-like receptor 5. J Bacteriol 2003, 185:4243-4247. 36. Rhee SH, Im E, Riegler M, Kokkotou E, O’Brien M, Pothoulakis C: Pathophysiological role of Toll-like receptor 5 engagement by bacterial flagellin in colonic inflammation. Proc Natl Acad Sci USA 2005, 102:13610-13615. 37. Miao EA, Andersen-Nissen E, Warren SE, Aderem A: TLR5 and Ipaf: dual sensors of bacterial flagellin in the innate immune system. Semin Immunopathol 2007, 29:275-288. p 38. Lippolis JD, Bayles DO, Reinhardt TA: Proteomic changes in Escherichia col when grown in fresh milk versus laboratory media. J Proteome Res 2009, 8:149-158. 39. Kovacs-Simon A, Titball RW, Michell SL: Lipoproteins of bacterial pathogens. Infect Immun 2011, 79:548-561. 39. Kovacs-Simon A, Titball RW, Michell SL: Lipoproteins of bacterial pathogens. Infect Immun 2011, 79:548-561. 40. Werling D, Jann OC, Offord V, Glass EJ, Coffey TJ: Variation matters: TLR structure and species-specific pathogen recognition. Trends Immunol 2009, 30:124-130. 41. Metcalfe HJ, Best A, Kanellos T, La Ragione RM, Werling D: Flagellin expression enhances Salmonell accumulation in TLR5-positive macrophages. Dev Comp Immunol 2010, 34:797-804. 42. Shikama Y, Kuroishi T, Nagai Y, Iwakura Y, Shimauchi H, Takada H, Sugawara S, Endo Y: Muramyldipeptide augments the actions of lipopolysaccharide in mice by stimulating macrophages to produce pro- IL-1ß and by down-regulation of suppressor of cytokine signaling 1 (SOCS1). Innate Immun 2011, 17:3-15. 43. Fritz JH, Girardin SE, Fitting C, Werts C, Mengin-Lecreulx D, Caroff M, Cavaillon JM, Philpott DJ, Adib-Conquy M: Synergistic stimulation of human monocytes and dendritic cells by Toll-like receptor 4 and NOD1- and NOD2-activating agonists. Eur J Immunol 2005, 35:2459-2470. 44. References Shuster DE, Kehrli ME Jr, Rainard P, Paape M: Complement fragment C5a and inflammatory cytokines in neutrophil recruitment during intramammary infection with Escherichia col. Infect Immun 1997, 65:3286-3292. 6. Shuster DE, Kehrli ME Jr, Rainard P, Paape M: Complement fragment C5a and inflammatory cytokines in neutrophil recruitment during intramammary infection with Escherichia col. Infect Immun 1997, 65:3286-3292. 27. Bougarn S, Cunha P, Gilbert FB, Meurens F, Rainard P: Technical note: validation of candidate reference genes for normalization of quantitative PCR in bovine mammary epithelial cells responding to inflammatory stimuli. J Dairy Sci 2011, 94:2425-2430. 7. Riollet C, Rainard P, Poutrel B: Differential induction of complement fragment C5a and inflammatory cytokines during intramammary infections with Escherichia col and Staphylococcus aureu. Clin Diagn Lab Immunol 2000, 7:161-167. 28. Rainard P: Consequences of interference of milk with chemoattractants for enzyme-linked immunosorbent assay quantifications. Clin Vaccine Immunol 2010, 17:848-852. 29. Lysenko ES, Clarke TB, Shchepetov M, Ratner AJ, Roper DI, Dowson CG, Weiser JN: Nod1 signaling overcomes resistance of S. pneumoniae to opsonophagocytic killing. PLoS Pathog 2007, 3:e118. 8. Goldammer T, Zerbe H, Molenaar A, Schuberth HJ, Brunner RM, Kata SR, Seyfert HM: Mastitis increases mammary mRNA abundance of beta- defensin 5, toll-like-receptor 2 (TLR2), and TLR4 but not TLR9 in cattle. Clin Diagn Lab Immunol 2004, 11:174-185. 30. Masumoto J, Yang K, Varambally S, Hasegawa M, Tomlins SA, Qiu S, Fujimoto Y, Kawasaki A, Foster SJ, Horie Y, Mak TW, Núñez G, Chinnaiyan AM, Fukase K, Inohara N: Nod1 acts as an intracellular receptor to stimulate chemokine production and neutrophil recruitment in vivo. J Exp Med 2006, 203:203-213. 9. Strandberg Y, Gray C, Vuocolo T, Donaldson L, Broadway M, Tellam R: Lipopolysaccharide and lipoteichoic acid induce different innate immune responses in bovine mammary epithelial cells. Cytokine 2005, 31:72-86. 31. Girardin SE, Boneca IG, Carneiro LA, Antignac A, Jehanno M, Viala J, Tedin K, Taha MK, Labigne A, Zahringer U, Coyle AJ, DiStefano PS, Bertin J, Sansonetti PJ, Philpott DJ: Nod1 detects a unique muropeptide from gram-negative bacterial peptidoglycan. Science 2003, 300:1584-1587. 10. Lahouassa H, Moussay E, Rainard P, Riollet C: Differential cytokine and chemokine responses of bovine mammary epithelial cells to Staphylococcus aureu and Escherichia col. Cytokine 2007, 38:12-21. Page 8 of 8 Page 8 of 8 Porcherie et al. Veterinary Research 2012, 43:14 http://www.veterinaryresearch.org/content/43/1/14 doi:10.1186/1297-9716-43-14 Cite this article as: Porcherie et al.: Repertoire of Escherichia coli agonists sensed by innate immunity receptors of the bovine udder and mammary epithelial cells. Veterinary Research 2012 43:14. Porcherie et al. Veterinary Research 2012, 43:14 http://www.veterinaryresearch.org/content/43/1/14 Touchon M, Hoede C, Tenaillon O, Barbe V, Baeriswyl S, Bidet P, Bingen E, Bonacorsi S, Bouchier C, Bouvet O, Calteau A, Chiapello H, Clermont O, Cruveiller S, Danchin A, Diard M, Dossat C, Karoui ME, Frapy E, Garry L, Ghigo JM, Gilles AM, Johnson J, Le Bouguénec C, Lescat M, Mangenot S, Martinez-Jéhanne V, Matic I, Nassif X, Oztas S, et al: Organised genome dynamics in the Escherichia col species results in highly diverse adaptive paths. PLoS Genet 2009, 5:e1000344. 45. Dufour D, Germon P, Brusseaux E, Le Roux Y, Dary A: First evidence of the presence of genomic islands in Escherichia col P4, a mammary pathogen frequently used to induce experimental mastitis. J Dairy Sci 2011, 94:2779-2793. doi:10.1186/1297-9716-43-14 Cite this article as: Porcherie et al.: Repertoire of Escherichia coli agonists sensed by innate immunity receptors of the bovine udder and mammary epithelial cells. Veterinary Research 2012 43:14. doi:10.1186/1297-9716-43-14 Cite this article as: Porcherie et al.: Repertoire of Escherichia coli agonists sensed by innate immunity receptors of the bovine udder and mammary epithelial cells. Veterinary Research 2012 43:14. doi:10.1186/1297-9716-43-14 Cite this article as: Porcherie et al.: Repertoire of Escherichia coli agonists sensed by innate immunity receptors of the bovine udder and mammary epithelial cells. Veterinary Research 2012 43:14. Submit your next manuscript to BioMed Central and take full advantage of: • Convenient online submission • Thorough peer review • No space constraints or color figure charges • Immediate publication on acceptance • Inclusion in PubMed, CAS, Scopus and Google Scholar • Research which is freely available for redistribution Submit your manuscript at www.biomedcentral.com/submit Submit your next manuscript to BioMed Central and take full advantage of: Submit your next manuscript to BioMed Central and take full advantage of: • Convenient online submission
https://openalex.org/W3214222039
https://journals.ajsrp.com/index.php/jis/article/download/3830/3625
Arabic
null
loyalty in the Holy Quran: الولاء في القرآن الكريم
Mağallaẗ al-ʻulūm al-islāmiyyaẗ
2,021
cc-by
19,160
وزارة ا ألوقاف والشؤون واملقدسات اإلسالمية|| األردن املستخلص :تناول ت هذه الدراسة موضوع الوالء في القرآن الكريم ،ملا له من أهمية بالغة في عقيدة املسلم ،وما يترتب عليها من أثر ، وملَّا كان هذا الوالء يتناول أصنافًا عديدة ،تفاوت كثير من الناس في مشروعيتها ، أو في التوسع فيها دون ضوابط ، هدفت هذه الدراسة إلى بيان معنى الوالء وأنواعه في القرآن الكريم ،ومعرفة أهم مظاهره ، .والضوابط التي رسمها القرآن الكريم لكل نوع من هذه األنواع واتبع الباحث لتحقيق هذه األهداف :(املنهج االستقرائي) لجمع واستقراء لفظة الوالء في القرآن الك ريم ، واملنهج (التحليلي) لبيان معنى هذه اللفظة من خالل سياقها في القرآن ، .واملنهج (االستنباطي) الستنباط دالالت هذه اللفظة من خالل السياق القرآني وتوصلت هذه الدراسة إلى بعض النتائج كان من أهمها : قد يكون الوالء لغير هللا بمفهومه الدنيوي ، وال يكون بمعناه.املطلق إال هلل تعالى الكلمات املفتاحية :الوالء ،القرآن ،مظاهر ،ضوابط. Journal of Islamic Sciences Volume (4), Issue (2): 30 Jun 2021 P: 17 - 34 ISSN: 2664-4347 مجلة العلوم اإلسالمية ( املجلد4) ، ( العدد2) : 30 يونيو2021م ص : 17 - 34 loyalty in the Holy Quran Salama Awad Al-Hosan Ministry of Endowments and Islamic Affairs and Holy Places || Jordan Journal of Islamic Sciences Volume (4), Issue (2): 30 Jun 2021 P: 17 - 34 ISSN: 2664-4347 مجلة العلوم اإلسالمية ( املجلد4) ، ( العدد2) : 30 يونيو2021م ص : 17 - 34 loyalty in the Holy Quran Salama Awad Al-Hosan Ministry of Endowments and Islamic Affairs and Holy Places || Jordan Journal of Islamic Sciences Volume (4), Issue (2): 30 Jun 2021 P: 17 - 34 ISSN: 2664-4347 مجلة العلوم اإلسالمية ( املجلد4) ، ( العدد2) : 30 يونيو2021م ص : 17 - 34 مجلة العلوم اإلسالمية ( املجلد4) ، ( العدد2) : 30 يونيو2021م ص : 17 - 34 Journal of Islamic Sciences Volume (4), Issue (2): 30 Jun 2021 P: 17 - 34 ISSN: 2664-4347 سالمه عوض الحصان سالمه عوض الحصان مقدمة. الحمد هلل الذي نزّل القرآن على رسوله-  - تبياناً لكل ش يء ،قال تعالى : ﴿ ِّونَزَّلْنَا عَلَيْكَ الْكِ تَابَ تِبْيَاناً لِّكُل َش َ يْءٍ وَهُ دً ى وَرَ حْ مَ ةً وَبُشْ رَى لِلْمُسْ لِمِين﴾ :[النحل89 ] ،والصالة والسالم على الهادي البشير سيدنا محمد-  - وعلى آله وصحبه أجمعين وبعد : فإن القرآن الكريم كتاب هللا تعالى الذي ال تنقض ي عجائبه وأسراره ،وال تنتهي إلى حدٍ كنوزه وعلومه ، وهو املنهاج الذي يزيل ما غم على قلوب البشر ،وما أشكل على عقولهم ، وملا أشكل على الناس حقيقة الوالء ، كان ال بد Salama Awad Al-Hosan Abstract: This study deals with the issue of loyalty in the Holy Quran. Because of its great importance in the Muslim faith and the impact it entails, and since this loyalty deals with many types, many people differed in its legitimacy, or expanded without restrictions, this study aimed to clarify the meaning and types of loyalty in the Holy Qur’an, and to know its most important aspects and the controls set by the Holy Quran for each of these types. To achieve these goals, the researcher followed: (the inductive approach) to collect and extrapolate the word loyalty in the Noble Qur’an, the (analytical) method to clarify the meaning of this word through its context in the Qur’an, and the (deductive) approach to derive the connotations of this word through the Qur’an context. And this study reached some results, the most important of which are: that loyalty may be to someone other than God in its worldly sense, and it may only be in its absolute meaning to God Almighty. Keywords: Loyalty, The Quran, Appearances, Regulations. الوالء في القرآن الكريم سالمه عوض الحصان وزارة ا ألوقاف والشؤون واملقدسات اإلسالمية|| األردن الوالء في القرآن الكريم سالمه عوض الحصان وزارة ا ألوقاف والشؤون واملقدسات اإلسالمية|| األردن أهمية الدراسة تكمن أهمية هذه الدراسة في : 1- أن هذا املوضوع قد تأوله كثير من الناس ،فمنهم من بالغ في تأويله ومنهم من تساهل ، فجرد الوالء من .ضوابطه وقيوده تكمن أهمية هذه الدراسة في : 1- أن هذا املوضوع قد تأوله كثير من الناس ،فمنهم من بالغ في تأويله ومنهم من تساهل ،فجرد الوال .ضوابطه وقيوده 1- أن هذا املوضوع قد تأوله كثير من الناس ،فمنهم من بالغ في تأويله ومنهم من تساهل ، فجرد الوالء من .ضوابطه وقيوده 2- .اللبس الحاصل عند كثير من الناس بين الوالء والتعايش السلمي وخاصة مع غير املسلم لذا كان ال بد من : 2- .اللبس الحاصل عند كثير من الناس بين الوالء والتعايش السلمي وخاصة مع غير املسلم لذا كان ال بد من : أ- جمع اآليات التي حملت هذا املعنى ،للوصول إلى الهدف املنشود من الدراسة ، وهو بيان وجوه ومظاهر .الوالء في القرآن الكريم أ- جمع اآليات التي حملت هذا املعنى ،للوصول إلى الهدف املنشود من الدراسة ، وهو بيان وجوه ومظاهر .الوالء في القرآن الكريم أ- جمع اآليات التي حملت هذا املعنى ،للوصول إلى الهدف املنشود من الدراسة ، وهو بيان وجوه ومظاهر .الوالء في القرآن الكريم ب- مناقشة وجوه ومظاهر الوالء في القرآن الكريم مناقشة علمية ، للوصول إلى معنى واضح كل الوضوح للوالء .وضوابطه ب- مناقشة وجوه ومظاهر الوالء في القرآن الكريم مناقشة علمية ، للوصول إلى معنى واضح كل الوضوح للوالء .وضوابطه أهداف الدراسة أهداف الدراسة تهدف هذه الدراسة إلى تحقيق األهداف اآلتية : 1- .معرفة املعنى املراد من لفظة الوالء في القرآن الكريم 2- .معرفة أنواع الوالء في القرآن الكريم 3- .بيان مظاهر الوالء 4- بيان ومعرفة ضوابط الوالء في القرآن الكريم. 4- بيان ومعرفة ضوابط الوالء في القرآن الكريم. 4- بيان ومعرفة ضوابط الوالء في القرآن الكريم. //www.ajsrp.com : https : Available at //www.ajsrp.com : https : Available at //www.ajsrp.com : https : Available at ( 17 ) المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م لنا من الرجوع إلى الكالم الفصل في هذا األمر من القرآن الكريم ، ( فقد وردت مادة يول ) في القرآن في مواطن كثيرة ، .لذا جاء هذا البحث لدراستها دراسة موضوعية لنا من الرجوع إلى الكالم الفصل في هذا األمر من القرآن الكريم ، ( فقد وردت مادة يول ) في القرآن في مواطن كثيرة ، .لذا جاء هذا البحث لدراستها دراسة موضوعية مشكلة الدراسة وأسئلتها ملّا كان موضوع الوالء من املوضوعات التي أشك ل على الناس حدودها وضوابطها ، كان من األهمية أن نبحث في املواضع التي جاءت متضمنة مادة هذه اللفظة لتجيب عن األسئلة اآلتية : 1- .ما املقصود بالوالء في القرآن الكريم 2- ما أنواع الوالء التي أشار إليها القرآن الكريم؟ 3- ما مظاهر الوالء في القرآن الكريم؟ 4- ما ضوابط الوالء التي أقرها القرآن الكريم؟ أهداف الدراسة تهدف هذه الدراسة إلى تحقيق األهداف اآلتية : 1- .معرفة املعنى املراد من لفظة الوالء في القرآن الكريم 2- .معرفة أنواع الوالء في القرآن الكريم 3- .بيان مظاهر الوالء المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م سميح الكراسنه وآخرون 2- كتاب " مفهوم الوالء والبراء في القرآن والسنة " علي بن نايف الشحود 3- كتاب " الوالء والبراء " محمد بن سعيد القحطاني 4- مقاالت في مفهوم الوالء ، .والبراء وبعد االطالع على هذه املؤلفات تبين أن جميع هذه املؤلفا ت لم تتناول املوضوع بدراسة علمية شاملة من خالل جميع مواضعها في القرآن الكريم ، فبحث االنتماء والوالء الوطني في القرآن والسنة كان تركيزه منصباً على .االنتماء والوالء الوطني مركزاً على الجانب التربوي في ذلك وأما كتاب الوالء والبراء لعلي بن نايف الشحود ،فكان ت ركيزه على تحديد الوالء هلل تعالى والبراءة من الكافرين واملنافقين ،دون أن يتعرض لآليات ودالالتها في بيان الوالء وأنواعه ،وكذلك فعل القحطاني ، وكذلك املقاالت .التي لم ترتقي إلى املستوى الذي تحاكي فيه أسلوب القرآن ومنهجه في عرض الوالء في القرآن وبعد االطالع على هذه املؤلفات تبين أن جميع هذه املؤلفا ت لم تتناول املوضوع بدراسة علمية شاملة من خالل جميع مواضعها في القرآن الكريم ، فبحث االنتماء والوالء الوطني في القرآن والسنة كان تركيزه منصباً على .االنتماء والوالء الوطني مركزاً على الجانب التربوي في ذلك اا وأما كتاب الوالء والبراء لعلي بن نايف الشحود ،فكان ت ركيزه على تحديد الوالء هلل تعالى والبراءة من الكافرين واملنافقين ،دون أن يتعرض لآليات ودالالتها في بيان الوالء وأنواعه ،وكذلك فعل القحطاني ، وكذلك املقاالت .التي لم ترتقي إلى املستوى الذي تحاكي فيه أسلوب القرآن ومنهجه في عرض الوالء في القرآن منهجية الدراسة: ويقوم منهج البحث على ما يلي : 1- )املنهج االستقرائي من خالل تتبع جميع اآليات التي ورد بها لفظة مادة (ولى ، ومن ثم االكتفاء باآليات التي .تخدم املوضوعات ذات الصلة بالدراسة 2- املنهج التحليلي من خالل النظر في تفاسير املتقدمين واملتأخرين والوصول إلى ما تبرزه هذه النصوص في خدمة .موضوع الدراسة مااا 1- )املنهج االستقرائي من خالل تتبع جميع اآليات التي ورد بها لفظة مادة (ولى ، ومن ثم االكتفاء باآليات التي .تخدم املوضوعات ذات الصلة بالدراسة 2- املنهج التحليلي من خالل النظر في تفاسير املتقدمين واملتأخرين والوصول إلى ما تبرزه هذه النصوص في خدمة .موضوع الدراسة م م 2- املنهج التحليلي من خالل النظر في تفاسير املتقدمين واملتأخرين والوصول إلى ما تبرزه هذه النصوص في خدمة .موضوع الدراسة 3- املنهج االستنباطي الستنباط الضوابط التي تحدد أنواع الوالء ومظاهره وحدوده ،وما هو مباح وما هو مح المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م 1- بحث االنتماء والوالء الوطني في الكتاب والسنة النبوية د. سميح الكراسنه وآخرون 2- كتاب " مفهوم الوالء والبراء في القرآن والسنة " علي بن نايف الشحود 3- كتاب " الوالء والبراء " محمد بن سعيد القحطاني 1- بحث االنتماء والوالء الوطني في الكتاب والسنة النبوية د. حدود البحث : حدود البحث : تعالج هذه الدراسة موضوع الوالء في القرآن الك ريم ، (من خالل تتبع مادة يول ) في القرآن الكريم ، ومن ثم .االستعانة بكتب اللغة والتفسير والعقيدة والحديث الشريف ر بعد البحث واالطالع في الدراسات السابقة التي تناولت املوضوع ، لم يجد الباحث حسب اطالعه إال الدراسات اآلتية : الوالء في القرآن الكريم ( 18 ) الحصان ( 18 ) الوالء في القرآن الكريم تمهيد : بداية وقبل الشروع في املوضوع يجب أن نقدم للموضوع بتعريف ملفهوم الوالء في اللغة واالصطالح ، حتى تكون الدراسة مبنية على منهج واضح ال تختلط فيه املفاهيم وال تتعارض مع مفاهيم أخرى ت خرج الدراسة عن .مسارها الصحيح أوالا :مفهوم الوالء لغة : والوالء ال يكون باإلكراه؛ ألن األصل فيه مشاعر وجدانية تتحرك بدافع املحبة ، فمن ال يحب ال يخلص وال يناصر؛ لذلك جعل هللا تعالى املؤم نين بعضهم أولياء بعض ،قال تعالى﴿ : ٍوَاملْ ُؤْمِنُونَ وَاملْ ُؤْمِنَاتُ بَعْضُهُمْ أَوْلِيَاء بَعْض َيَأْمُ رُونَ بِاملْ َعْرُوفِ وَيَنْهَوْنَ عَنِ املْ ُنكَ رِ وَيُقِيمُ ونَ الصَّالَةَ وَيُؤْتُونَ الزَّكَاةَ وَيُطِ يعُونَ اللّهَ و ُرَ سُ ولَهُ أُوْلَـئِكَ سَ يَرْحَ مُه َّمُ اللّهُ إِن ٌاللّهَ عَزِيزٌ حَ كِ يم﴾ [التوبة : 71 ]؛ وسبب هذه الوالية ألن ديدنهم املحبة والتناصح والتراحم واألمر باملعروف والنهي عن .املنكر الوالء لغةا :يأتي تعريف الوالء بمعانٍ متقاربة منها : ُ"[ولى] الوَ لي : القربُ والدنو ،يقال :تباعد بعد ولى ، و" وكل َمما يَليك ، "أي مما يقاربك( 1 ( ) 2) ،وكذلك تأتي بمعنى :والء "محبَّة وصداقة ، معاهدة"والء( 3) ، ومنها الولي الذي يأتي بمعنى :"الصَّدِ يق والنَّصِ ير ،قال ابْنُ األَعرابي( 4) : الوِلي التَّابِعُ املْ ُحِ ب. ُ.. واملُواالة :ضِ دّ املُعاداة ، والوَ لي : "ِّضِ د الْعَدُ و( 5). والولي من أسماء هللا تعالى ويأتي بمعنى : ُ"الناصِ ر ، َوَقِيل : ِ ّاملُ َتَوَ ل ي ألُمور الْعَالَمِ وَالْ خَ الَ ئِقِ القائمُ بِهَا ، ْوَمِن َّأَسمائه عَزَّ وَجَ ل :الْوَالِي ،وَهُ وَ مالِكُ األَشياء جَ مِيعِهَا املُتَصَرِّفُ فِيهَا ،قَالَ ابْنُ األَثير( 6) : وكأَن الوِالية تُشعر بالتَّدْ بير والقُ درة والفِعل ، َوَمَ ا لَمْ يَجْ تَمِعْ ذَلِك"فِيهَا لَمْ يَنْطَلِقْ عَلَيْهِ اسْ مُ الْوَالِي( 7) ،والوالية :" بالكسر :السلطان. والوَالية : النصرة ،يقال :هم على والية ، " أي مجتمعون في النصرة( 8). ا م ي ي ويتضح من التعريفات السابقة أن الوالء هو النصرة والصداقة واملحبة والقرب والدنو ، ويصح بمفهومه السابق على الخ الق واملخلوق ،غير أن الوالء ال يكون مطلقاً إال هلل تعالى؛ ألنه مالك األشياء كلها وهو متولي تدبيرها ، ومن معرفة اسم هللا تعالى (الولي) يتبين لنا صفات الولي الحق وهي : .التدبير والقدرة والفعل كما قال ابن األثير ثانياا : الوالء اصطالحاا :"هو مشاعر الفرد وأحاسيسه "اإليجابية باملحبة والنصرة تجاه موضوع معين( 9) ، وبما أن الوالء مشاعر وأحاسيس فالبد من أن تكون هنالك عالقة قوية انتمائية بين الفرد والطرف االخر ، تحرك مشاعر الفرد وتدفعه إلى إخالص الوالء بقناعة تامة للطرف اآلخر ،ويظهر ذلك في قوله تعالى : ﴿ ْقُلْ إِن كُ نتُم َتُحِ ب ون ٌاللّهَ فَاتَّبِعُونِي يُحْ بِبْكُ مُ اللّهُ وَيَغْفِرْ لَكُ مْ ذُنُوبَكُ مْ وَاللّهُ غَفُ ورٌ رَّحِ يم﴾ [آل عمران : 31 ] . أوالا :مفهوم الوالء لغة : اا الوالء لغةا :يأتي تعريف الوالء بمعانٍ متقاربة منها : ُ"[ولى] الوَ لي : القربُ والدنو ،يقال :تباعد بعد ولى ، و" وكل َمما يَليك ، "أي مما يقاربك( 1 ( ) 2) ،وكذلك تأتي بمعنى :والء "محبَّة وصداقة ، معاهدة"والء( 3) ، ومنها الولي الذي يأتي بمعنى :"الصَّدِ يق والنَّصِ ير ،قال ابْنُ األَعرابي( 4) : الوِلي التَّابِعُ املْ ُحِ ب. ُ.. واملُواالة :ضِ دّ املُعاداة ، والوَ لي : "ِّضِ د الْعَدُ و( 5). والولي من أسماء هللا تعالى ويأتي بمعنى : ُ"الناصِ ر ، َوَقِيل : ِ ّاملُ َتَوَ ل ي ألُمور الْعَالَمِ وَالْ خَ الَ ئِقِ القائمُ بِهَا ، ْوَمِن َّأَسمائه عَزَّ وَجَ ل :الْوَالِي ،وَهُ وَ مالِكُ األَشياء جَ مِيعِهَا املُتَصَرِّفُ فِيهَا ،قَالَ ابْنُ األَثير( 6) : وكأَن الوِالية تُشعر بالتَّدْ بير والقُ درة والفِعل ، َوَمَ ا لَمْ يَجْ تَمِعْ ذَلِك"فِيهَا لَمْ يَنْطَلِقْ عَلَيْهِ اسْ مُ الْوَالِي( 7) ،والوالية :" بالكسر :السلطان. والوَالية : النصرة ،يقال :هم على والية ، " أي مجتمعون في النصرة( 8). ويتضح من التعريفات السابقة أن الوالء هو النصرة والصداقة واملحبة والقرب والدنو ، ويصح بمفهومه السابق على الخ الق واملخلوق ،غير أن الوالء ال يكون مطلقاً إال هلل تعالى؛ ألنه مالك األشياء كلها وهو متولي تدبيرها ، ومن معرفة اسم هللا تعالى (الولي) يتبين لنا صفات الولي الحق وهي : .التدبير والقدرة والفعل كما قال ابن األثير ثانياا : الوالء اصطالحاا :"هو مشاعر الفرد وأحاسيسه "اإليجابية باملحبة والنصرة تجاه موضوع معين( 9) ، وبما أن الوالء مشاعر وأحاسيس فالبد من أن تكون هنالك عالقة قوية انتمائية بين الفرد والطرف االخر ، تحرك مشاعر الفرد وتدفعه إلى إخالص الوالء بقناعة تامة للطرف اآلخر ،ويظهر ذلك في قوله تعالى : ﴿ ْقُلْ إِن كُ نتُم َتُحِ ب ون ٌاللّهَ فَاتَّبِعُونِي يُحْ بِبْكُ مُ اللّهُ وَيَغْفِرْ لَكُ مْ ذُنُوبَكُ مْ وَاللّهُ غَفُ ورٌ رَّحِ يم﴾ [آل عمران : 31 ] . (1) الفارابي ،الصحاح تاج اللغة وصحاح العربية ،ج :6 ،ص : 2528 . خطَّة البحث : اشتمل هذا البحث على مقدمة و تمهيد ومبحثين وخاتمة ،على النحو اآلتي :  :املقدمة .وتضمنت ما سبق  تمهيد : .ًويشمل تعريف الوالء لغة واصطالحا  املبحث األول : الوالء الديني  املطلب األول :الوالء هلل تعالى.  املطلب الثاني :مظاهر الوالء هلل تعالى وثمراته  املطلب الثالث : الوالء للنبي-  -  املبحث الثاني : الوالء الدنيوي  املطلب األول : .الوالء بين املؤمنين  املطلب الثاني : .الوالء لألسرة والقبيلة  املطلب الثالث : .الوالء لولي األمر  املطلب الرابع : .الوالء املحرم  .الخاتمة: أهم النتائج، التوصيات واملقترحات وهللا اسأل أن يكون هذا العمل خالصاً لوجهه الكريم وأن يتقبله وأن ينفع به ، .وصلى هللا على سيدنا محمد وعلى آله وصحبه أجمعين مب ربع امرم و  .الخاتمة: أهم النتائج، التوصيات واملقترحات وهللا اسأل أن يكون هذا العمل خالصاً لوجهه الكريم وأن يتقبله وأن ينفع به ، .وصلى هللا على سيدنا محمد وعلى آله وصحبه أجمعين ( 19 ) الوالء في القرآن الكريم الحصان الحصان المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م تمهيد : (1) الفارابي ،الصحاح تاج اللغة وصحاح العربية ،ج :6 ،ص : 2528 . (2) عمر ،بمساعدة فريق عمل ،معجم اللغة العربية املعاصرة ،ج :3 ،ص : 2498 . (3) هو أبو عبد الله محمد بن زياد املعروف بابن اإلعرابي ،من أكابر أئمة اللغة ، (ت : 231 هـ). ينظر- األنباري ، نزهة األلباء في طبقات األدباء ،ص : 119 - 122 . (4) أحمد ،معجم اللغة العربية املعاصرة ،ج : 15 ،ص : 411 . (5) محمد بن محمد بن عبد الكريم بن عبد الواحد الشيباني املعروف بابن األثير(ت : 630 )هـ ،ينظر _ ابن األثير ، أسد الغابة في معرفة الصحابة ،ص :8. (6) ينظر- ابن منظور ،لسان العرب ،ج : 15 ،ص : 407 . (7) الفارابي ،الصحاح تاج اللغة وصحاح العربية ،ج :3 ،ص : 2530 . (8) السرحان ،الوالء واالنتماء لدى الشباب األردني وأثره في بناء الشخصية ،ص : 41 . (9) الشنقيطي ،أضواء البيان في إيضاح القرآن بالقرآن ،ج :2 ،ص : 42 . (2) عمر ،بمساعدة فريق عمل ،معجم اللغة العربية املعاصرة ،ج :3 ،ص : 2498 . (3) هو أبو عبد الله محمد بن زياد املعروف بابن اإلعرابي ،من أكابر أئمة اللغة ، (ت : 231 هـ). ينظر- األنباري ، نزهة األلباء في طبقات األدباء ،ص : 119 - 122 . املبحث األول :ال والء هلل تعالى وللنبي-  -. أملها والوالء في القرآن الكريم ظهر في أبرز مالمحه عندما بيّن هللا تعالى أن الوالء الحقيقي هو عهد ما بينه وبين عباده ، ًأخذه منهم أزال ،قال تعالى﴿ : وَإِذْ أَخَ ذَ رَب كَ مِن بَنِ ي آدَمَ مِن ظُهُورِهِ مْ ذُرِّيَّتَهُمْ وَأَشْ هَدَ هُ مْ عَلَ ى ُأَنفُ سِ هِمْ أَلَسْ ت َبِرَبِّكُ مْ قَالُواْ بَلَ ى شَ هِدْ نَا أَن تَقُ ولُواْ يَوْمَ الْقِيَامَ ةِ إِنَّا كُ نَّا عَنْ هَ ذَ ا غَافِلِين﴾ [األعراف : 172 ] ، ومعنى إشهادهم على أنفسهم "إنما هو بما نصب لهم من األدلة القاطعة بأنه ربهم املستحق منهم ألن يعبدوه وحده ، وعليه)فمعنى (قالوا بلى ،أي : " قالوا ذلك بلسان حالهم لظهور األدلة عليه ، ًفهذا العهد ملزم للناس جميعا ، إال أن منهم من كان إقراره بهذا العهد ًطوعاً ومنهم من كان كرها– النفاق- .؛ لذلك نجد أن كثيرًا من الناس تنكروا لهذا العهد وسوف أبين الوالء هلل تعالى ولرسوله الك ريم وفق املطالب اآلتية : املطلب األول : .الوالء هلل تعالى والوالء هلل تعالى يكون باإليمان في ألوهيته وربوبيته وأسمائه وصفاته ، وقد أولى القرآن الكريم قضية الوالء هلل جل العناية؛ ألنها أساس العقيدة الصحيحة ،فال إسالم وال إيمان من غير والء مطلق هلل تعالى ،فإذا كانت الوالية استحقاقاً؛ فاهلل تعالى هو املستحق فله الحاكمية والسلطان املطلق الذي ال يقهر ،قال تعالى﴿ : ًقُلْ أَغَيْرَ اللّهِ أَبْغِ ي رَبّا ِوَهُ وَ رَب كُلِّ ش َ يْءٍ وَالَ تَكْ سِ بُ كُل نَفْ سٍ إِالَّ عَلَيْهَا وَالَ تَزِرُ وَازِرَ ةٌ وِزْ رَ أُخْ رَى ثُمَّ إ ِلَى رَبِّكُ م مَّ رْجِ عُكُ مْ فَيُنَبِّئُكُ م بِمَا كُ نتُمْ فِيه َتَخْ تَلِفُ ون﴾ [األنعام : 164 .] أ والنقل والعقل يحكم بأن الوالء املطلق هلل وحده ، فكيف تنصرف العقول عن الوالء ملن فطر السموات واألرض ،وتكفل بأسباب ديمومة الكائنات في هذه األرض ،إلى من ال يملك من أس ًباب الدنيا شيئا ،قال تعالى﴿ : ْقُل ْأَغَيْرَ اللّهِ أَتَّخِ ذُ وَلِيّاً فَاطِ رِ السَّ مَاوَاتِ وَاألَرْضِ وَهُ وَ يُطْعِمُ وَالَ يُطْعَمُ قُلْ إِنِّيَ أُمِرْتُ أَن َأَكُونَ أَوَّلَ مَنْ أَسْ لَمَ وَالَ تَكُونَنَّ مِن َاملْ ُشْ رِكَ ين﴾ [األنعام : 14 ]"أي منطق يسمح بأن يتخذ غير هللا وليا؟ إن كان يتواله لينصره ويعينه ، فاهلل هو فاطر السماوات واألرض ،فله السلطان في السماوات واألرض ،وإن كان يتواله ليرزقه ويطعمه ، فاهلل هو الرازق املطعم ملن في السماوات ومن في األرض ،ففيم الوالء لغير صاحب السلطان الرزاق؟"( 10 ). (10) قطب ،في ظالل القرآن ،ج :2 ،ص : 1054 . المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م ًثالثا :ورود لفظ الوالء في القرآن الكريم : ٍورد لفظ مادة (ولى) في القرآن الكريم صراحة في أكثر من تسعة وسبعين موضعًا، بصيغٍ مختلفة ،جاءت تفيد املحبة والنصرة في أكثر من ستةٍ وأربعين موضعًا ، وبمعنى الحفيظ واملانع في أكثر من ثالثة عشر موضعًا ،وبمعنى األرباب واألصنام وما يعبد من دون هللا في تسعة مواضع تقريبًا ، وبمعنى األتباع واألعوان واألقران في أربعة مواضع ،وبمعنى االبن وال وريث والقريب في تسعة مواضع ، وجاءت هذه الصيغ للتأكيد على هذا املعنى من خالل عدة محاور ،من أهمها :إثبات الوالية املطلقة هلل تعالى ،كقوله تعالى﴾ : أَمِ اتَّخَ ذُ وا َ مِنْ دُونِهِ أَوْلِيَاءَ فَاللَّهُ هُ وَ الْوَ لِي وَهُ وَ يُحْ يِ املْ َوْتَى وَهُ وَ عَلَ ى كُلِّ ش ٌيْءٍ قَدِ ير﴿[الشورى :9 .] وجاءت معاني هذه اللفظة تلميحً ا في القرآن الكريم في أكثر من ثمانية عشر موضعًا ، حيث جاءت بمعنى املحبة والنصرة في أربعة عشر موضعًا ،وبمعنى األرباب في موضعين ،وبمعنى الحفيظ في موضعٍ واحد ، وبمعنى العهد .في موضعٍ واحد أوالا :مفهوم الوالء لغة : ﴾ والوالء ال يكون باإلكراه؛ ألن األصل فيه مشاعر وجدانية تتحرك بدافع املحبة ، فمن ال يحب ال يخلص وال يناصر؛ لذلك جعل هللا تعالى املؤم نين بعضهم أولياء بعض ،قال تعالى﴿ : ٍوَاملْ ُؤْمِنُونَ وَاملْ ُؤْمِنَاتُ بَعْضُهُمْ أَوْلِيَاء بَعْض َيَأْمُ رُونَ بِاملْ َعْرُوفِ وَيَنْهَوْنَ عَنِ املْ ُنكَ رِ وَيُقِيمُ ونَ الصَّالَةَ وَيُؤْتُونَ الزَّكَاةَ وَيُطِ يعُونَ اللّهَ و ُرَ سُ ولَهُ أُوْلَـئِكَ سَ يَرْحَ مُه َّمُ اللّهُ إِن ٌاللّهَ عَزِيزٌ حَ كِ يم﴾ [التوبة : 71 ]؛ وسبب هذه الوالية ألن ديدنهم املحبة والتناصح والتراحم واألمر باملعروف والنهي عن .املنكر (1) الفارابي ،الصحاح تاج اللغة وصحاح العربية ،ج :6 ،ص : 2528 . (2) عمر ،بمساعدة فريق عمل ،معجم اللغة العربية املعاصرة ،ج :3 ،ص : 2498 . (3) هو أبو عبد الله محمد بن زياد املعروف بابن اإلعرابي ،من أكابر أئمة اللغة ، (ت : 231 هـ). ينظر- األنباري ، نزهة األلباء في طبقات األدباء ،ص : 119 - 122 . أ (4) أحمد ،معجم اللغة العربية املعاصرة ،ج : 15 ،ص : 411 . أ (4) أحمد ،معجم اللغة العربية املعاصرة ،ج : 15 ،ص : 411 . م (5) محمد بن محمد بن عبد الكريم بن عبد الواحد الشيباني املعروف بابن األثير(ت : 630 )هـ ،ينظر _ ابن األثير ، أسد الغابة في معرفة الصحابة ص:8 (9) الشنقيطي ،أضواء البيان في إيضاح القرآن بالقرآن ،ج :2 ،ص : 42 . الوالء في القرآن الكريم الوالء في القرآن الكريم ( 20 ) الحصان الحصان (10) قطب ،في ظالل القرآن ،ج :2 ،ص : 1054 . (11) البخاري ، صحيح البخاري ،كتاب :التوحيد ،باب : ِمَ ا جَ اءَ فِي دُعَاء النَّبِ يِّ صَلَّ ى هللاُ عَلَيْهِ وَسَ لَّمَ أُمَّ تَهُ إِلَى تَوْحِ يدِ اللَّهِ تَبَارَكَ وَتَعَالَى ،ج : 9 ،ص : 114 ،رقم : 7373 . (12) البقرة : 257 / األعراف :3 - 196 / هود : 113 / يوسف : 101 . (13) البيضاوي ،أنوار التنزيل وأسرار التأويل ،ج :2 ،ص : 132 . (14) البقاعي ، نظم الدرر في تناسب اآليات والسور ،ج :6 ،ص : 193 . (15) السعدي ،تيسير الكريم الرحمن ،ص631 . املبحث األول :ال والء هلل تعالى وللنبي-  -. ق هم﴿ز يؤو﴾اق إ إ ثم كانت الحجة على من نقض امليثاق الذي قطعه مع هللا وهو في عالم الذر ، ببيان حال من اتخذ من دون هللا أولياء ،فقال تعالى﴿ :مَثَلُ الَّذِ ينَ اتَّخَ ذُ وا مِن دُونِ اللَّهِ أَوْلِيَاء كَ مَثَلِ ا ُلْعَنكَ بُوتِ اتَّخَ ذَ تْ بَيْتاً وَإِنَّ أَوْهَ نَ الْبُيُوتِ لَبَيْت َالْعَنكَ بُوتِ لَوْ كَانُوا يَعْلَمُ ون﴾ [العنكبوت : 41 ] ، وهنا يمثل هللا تعالى حال من اتخذ أولياء من دون هللا يرجون نفعهم ونصرهم ،" هذا مثل ضربه هللا ملن عبد معه غيره ، َّيقصد به التعزز والت قَ وِّي والنفع ،وأن األمر بخالف مقصوده ، فإن مثله كمثل العنكبوت ،اتخذت بيتا يقيها من الحر والبرد واآلفات﴿ ، ِوَإِنَّ أَوْهَ نَ الْبُيُوت﴾ أضعفها وأوهاها﴿ ُلَبَيْت ِالْعَنْكَ بُوت﴾ فالعنكبوت من الحيوانات الضعيفة ،وبيتها من أضعف البيوت ،فما ازدادت باتخاذه إال ضعف ا ، كذلك هؤالء الذين يتخذون من دونه أولياء ،فقراء عاجزون من جميع الوجوه ، وحين اتخذوا األولياء من دونه يتعززون بهم ويستنصرونهم ،ازدادوا ضعفا إلى ضعفهم ، "ووهنا إلى وهنهم( 15 ). املبحث األول :ال والء هلل تعالى وللنبي-  -. ِأَشَ د حُ بّاً لِّلّه﴾ [البقرة : 165 ] ؛ لذلك عبّر هللا تعالى عن التزام املؤمنين باملحبة الصادقة والعزيمة القوية بأنهم أشد حباً هلل وذلك باتباع أوامره ونواهيه ، واملحبة تقتض ي الطاعة ، .فعلى قدر املحبة تكون الطاعة أما النصرة فتتمثل بعد االمتثال والطاعة بتحقيق التوحيد الخالص هلل تعالى ،فعن معاذ بن جبل-  - قال : قال النبي-  - :"يا معاذ أتدري ما حق هللا على العباد؟ ،قال :هللا ورسوله أعلم ،قال :أن يعبدوه وال يشركوا به شيئا ، أتدري ما حق م عل ه؟ قال:هللا ور وله أعلم قال:أن ال يعذ م"( 11 )وتكون بنش تعال ه الت أنزل إل النا ِأَشَ د حُ بّاً لِّلّه﴾ [البقرة : 165 ] ؛ لذلك عبّر هللا تعالى عن التزام املؤمنين باملحبة الصادقة والعزيمة القوية بأنهم أشد حباً هلل وذلك باتباع أوامره ونواهيه ، واملحبة تقتض ي الطاعة ، .فعلى قدر املحبة تكون الطاعة أما النصرة فتتمثل بعد االمتثال والطاعة بتحقيق التوحيد الخالص هلل تعالى ،فعن معاذ بن جبل-  - قال : قال النبي-  - :"يا معاذ أتدري ما حق هللا على العباد؟ ،قال :هللا ورسوله أعلم ،قال :أن يعبدوه وال يشركوا به شيئا ، أتدري ما حقهم عليه؟ ،قال :هللا ورسوله أعلم ،قال :أن ال يعذبهم"( 11 ) ، وتكون بنشر تعاليمه التي أنزل إلى الناس كافة ،والدفاع عن هذا الدين بكل الوسائل املشروعة ،وحماية املقدسات ،ونشر القيم اإلسالمية السامية ، وتحقيق العدل واألمان ،قال تعالى﴿ : َيَا أَي هَا الَّذِ ين ْآمَ نُوا إِن تَنصُرُوا اللَّهَ يَنصُرْكُ مْ وَيُثَبِّتْ أَقْدَ امَ كُ م﴾ [محمد :7]. أ وقد أثبت هللا تعالى لنفسه الوالية املطلقة في كتابه العزيز ، ونفاها عمن سواه في مواطن كثيرة من القرآن( 12 ) ، ثم بين ملن تكون له الوالية بعده– جل جالله- من عباده ،قال تعالى﴿ : َّإِن َمَا وَلِي كُ مُ اللّهُ وَرَ سُ ولُهُ وَالَّذِ ين َآمَ نُواْ الَّذِ ينَ يُقِيمُ ونَ الصَّالَةَ وَيُؤْتُونَ الزَّكَاةَ وَهُ مْ رَاكِ عُون﴾ [املائدة : 55 ] ،وفي إفراد لفظة (وليكم) إشارة "للتنبيه على أن الوالية هلل سبحانه وتعالى على األصالة ، ولرسوله-  - وللمؤمنين على ا"لتبع( 13 ) ،فبين أن الوالية أصالة هلل تعالى ، ثم للنبي-  - على التبع ،ثم الذين امنوا ،وتعرض لصفاتهم التي استحقوا بموجبها الوالية ،فقال تعالى﴿ : والذين آمنوا﴾ أي :"أوجدوا اإليمان وأقروا به ،ثم وصفهم بما يصدق دعواهم اإليمان فقال﴿ :والذين يقيمون الصالة﴾ أي تمكيناً لصلتهم بالخالق﴿ويؤتون الزكاة﴾ "إحساناً إلى الخالئق( 14 ) . املبحث األول :ال والء هلل تعالى وللنبي-  -. وال يكمن الوهن ببناء البيت من النسيج فقط ،بل يتعدى ذلك إلى ما هو أبعد من ذلك ، فوهن البيت هنا تكمن في الضعف في فساد العالقة بين أنثى العنكبوت وذكرها ، ففي خضوع ذكر العنكبوت لألنثى وامتثاله لها جعل منه لقمة سائغة لألنثى ،وهذا ما أظهره العلم الحديث ،حيث قال أستاذ في علم الحشرات ، ِفي كُلِّيةِ العلومِ في جامعة ِالقاهرةِ في بعض كتبه العلميّة :"إنّ في قوله تعالى﴿ : ًكَ مَ ثَلِ العنكبوت اتخذت بَيْتا﴾ إعجازاً علميّاً؛ حيث إنّ التي تبني البيتَ هي األنثى ، ِفجاءت تاءُ التأنيثِ في قوله﴿ : ًكَ مَ ثَلِ العنكبوت اتخذت بَيْتا﴾ َاألنثى هي التي تغزِلُ البيت ، وهي التي ِتُرغِّبُ الذَّ كَ رَ في الدخولِ إلى البيت ،حيث ت ٍقومُ أمامه بحركاتٍ مُ غرية ، ِوتُسمِعُه بعضَ األلحانِ الطنّانة ، فيأوي إلى بيتِها ،وبعدَ التلقيحِ تأكلُه إنْ لم يفرّ ويهرب ،وتفترسُ ه ،وتأكلُ أوالدَها من بعدُ إنْ لم يفرّوا ، ًويأكلُ بعضُ أوالدِ ها بعضا ، ثم كانت الحجة على من نقض امليثاق الذي قطعه مع هللا وهو في عالم الذر ، ببيان حال من اتخذ من دون هللا أولياء ،فقال تعالى﴿ :مَثَلُ الَّذِ ينَ اتَّخَ ذُ وا مِن دُونِ اللَّهِ أَوْلِيَاء كَ مَثَلِ ا ُلْعَنكَ بُوتِ اتَّخَ ذَ تْ بَيْتاً وَإِنَّ أَوْهَ نَ الْبُيُوتِ لَبَيْت َالْعَنكَ بُوتِ لَوْ كَانُوا يَعْلَمُ ون﴾ [العنكبوت : 41 ] ، وهنا يمثل هللا تعالى حال من اتخذ أولياء من دون هللا يرجون نفعهم ونصرهم ،" هذا مثل ضربه هللا ملن عبد معه غيره ، َّيقصد به التعزز والت قَ وِّي والنفع ،وأن األمر بخالف مقصوده ، فإن مثله كمثل العنكبوت ،اتخذت بيتا يقيها من الحر والبرد واآلفات﴿ ، ِوَإِنَّ أَوْهَ نَ الْبُيُوت﴾ أضعفها وأوهاها﴿ ُلَبَيْت ِالْعَنْكَ بُوت﴾ فالعنكبوت من الحيوانات الضعيفة ،وبيتها من أضعف البيوت ،فما ازدادت باتخاذه إال ضعف ا ، كذلك هؤالء الذين يتخذون من دونه أولياء ،فقراء عاجزون من جميع الوجوه ، وحين اتخذوا األولياء من دونه يتعززون بهم ( 15 ) صرو هم وي إ ى ض هم و ض ز إ ى و هم وو وال يكمن الوهن ببناء البيت من النسيج فقط ،بل يتعدى ذلك إلى ما هو أبعد من ذلك ، فوهن البيت هنا تكمن في الضعف في فساد العالقة بين أنثى العنكبوت وذكرها ، ففي خضوع ذكر العنكبوت لألنثى وامتثاله لها جعل منه لقمة سائغة لألنثى ،وهذا ما أظهره العلم الحديث ،حيث قال أستاذ في علم الحشرات ، ِفي كُلِّيةِ العلومِ في جامعة ِالقاهرةِ في بعض كتبه العلميّة :"إنّ في قوله تعالى﴿ : ًكَ مَ ثَلِ العنكبوت اتخذت بَيْتا﴾ إعجازاً علميّاً؛ حيث إنّ التي تبني البيتَ هي األنثى ، ِفجاءت تاءُ التأنيثِ في قوله﴿ : ًكَ مَ ثَلِ العنكبوت اتخذت بَيْتا﴾ َاألنثى هي التي تغزِلُ البيت ، وهي التي ِتُرغِّبُ الذَّ كَ رَ في الدخولِ إلى البيت ،حيث ت ٍقومُ أمامه بحركاتٍ مُ غرية ، ِوتُسمِعُه بعضَ األلحانِ الطنّانة ، فيأوي إلى بيتِها ،وبعدَ التلقيحِ تأكلُه إنْ لم يفرّ ويهرب ،وتفترسُ ه ،وتأكلُ أوالدَها من بعدُ إنْ لم يفرّوا ، ًويأكلُ بعضُ أوالدِ ها بعضا ، (11) البخاري ، صحيح البخاري ،كتاب :التوحيد ،باب : ِمَ ا جَ اءَ فِي دُعَاء النَّبِ يِّ صَلَّ ى هللاُ عَلَيْهِ وَسَ لَّمَ أُمَّ تَهُ إِلَى تَوْحِ يدِ اللَّهِ تَبَارَكَ وَتَعَالَى ،ج : 9 ،ص : 114 ،رقم : 7373 . املبحث األول :ال والء هلل تعالى وللنبي-  -. وإذا كان الوالء يعني املحبة والنصرة؛ فإن محبة هللا تعالى هي الغاية التي يجد من أجلها املجدون ، ويتهجد من أجلها املتهجدون ،واملحبة هي اإلتباع واالستسالم واالنقياد الصادق ملا أمر أو نهى ، وكل ما خالف ذلك هو من قبيل صرف الوالء لغير هللا لقوله تعالى﴿ :وَمِنَ النَّاسِ مَ ن ْيَتَّخِ ذُ مِن دُونِ اللّهِ أَندَ اداً يُحِ ب ونَهُمْ كَ حُ بِّ اللّهِ وَالَّذِ ينَ آمَنُوا والنقل والعقل يحكم بأن الوالء املطلق هلل وحده ، فكيف تنصرف العقول عن الوالء ملن فطر السموات واألرض ،وتكفل بأسباب ديمومة الكائنات في هذه األرض ،إلى من ال يملك من أس ًباب الدنيا شيئا ،قال تعالى﴿ : ْقُل ْأَغَيْرَ اللّهِ أَتَّخِ ذُ وَلِيّاً فَاطِ رِ السَّ مَاوَاتِ وَاألَرْضِ وَهُ وَ يُطْعِمُ وَالَ يُطْعَمُ قُلْ إِنِّيَ أُمِرْتُ أَن َأَكُونَ أَوَّلَ مَنْ أَسْ لَمَ وَالَ تَكُونَنَّ مِن َاملْ ُشْ رِكَ ين﴾ [األنعام : 14 ]"أي منطق يسمح بأن يتخذ غير هللا وليا؟ إن كان يتواله لينصره ويعينه ، فاهلل هو فاطر السماوات واألرض ،فله السلطان في السماوات واألرض ،وإن كان يتواله ليرزقه ويطعمه ، فاهلل هو الرازق املطعم ملن في السماوات ومن في األرض ،ففيم الوالء لغير صاحب السلطان الرزاق؟"( 10 ). وإذا كان الوالء يعني املحبة والنصرة؛ فإن محبة هللا تعالى هي الغاية التي يجد من أجلها املجدون ، ويتهجد من أجلها املتهجدون ،واملحبة هي اإلتباع واالستسالم واالنقياد الصادق ملا أمر أو نهى ، وكل ما خالف ذلك هو من قبيل صرف الوالء لغير هللا لقوله تعالى﴿ :وَمِنَ النَّاسِ مَ ن ْيَتَّخِ ذُ مِن دُونِ اللّهِ أَندَ اداً يُحِ ب ونَهُمْ كَ حُ بِّ اللّهِ وَالَّذِ ينَ آمَنُوا (10) قطب ،في ظالل القرآن ،ج :2 ،ص : 1054 . (15) السعدي ،تيسير الكريم الرحمن ،ص631 . املبحث األول :ال والء هلل تعالى وللنبي-  -. ( 21 ) الوالء في القرآن الكريم الوالء في القرآن الكريم الوالء في القرآن الكريم الحصان المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م ِأَشَ د حُ بّاً لِّلّه﴾ [البقرة : 165 ] ؛ لذلك عبّر هللا تعالى عن التزام املؤمنين باملحبة الصادقة والعزيمة القوية بأنهم أشد حباً هلل وذلك باتباع أوامره ونواهيه ، واملحبة تقتض ي الطاعة ، .فعلى قدر املحبة تكون الطاعة أما النصرة فتتمثل بعد االمتثال والطاعة بتحقيق التوحيد الخالص هلل تعالى ،فعن معاذ بن جبل-  - قال : قال النبي-  - :"يا معاذ أتدري ما حق هللا على العباد؟ ،قال :هللا ورسوله أعلم ،قال :أن يعبدوه وال يشركوا به شيئا ، أتدري ما حقهم عليه؟ ،قال :هللا ورسوله أعلم ،قال :أن ال يعذبهم"( 11 ) ، وتكون بنشر تعاليمه التي أنزل إلى الناس كافة ،والدفاع عن هذا الدين بكل الوسائل املشروعة ،وحماية املقدسات ،ونشر القيم اإلسالمية السامية ، وتحقيق العدل واألمان ،قال تعالى﴿ : َيَا أَي هَا الَّذِ ين ْآمَ نُوا إِن تَنصُرُوا اللَّهَ يَنصُرْكُ مْ وَيُثَبِّتْ أَقْدَ امَ كُ م﴾ [محمد :7]. وقد أثبت هللا تعالى لنفسه الوالية املطلقة في كتابه العزيز ، ونفاها عمن سواه في مواطن كثيرة من القرآن( 12 ) ، ثم بين ملن تكون له الوالية بعده– جل جالله- من عباده ،قال تعالى﴿ : َّإِن َمَا وَلِي كُ مُ اللّهُ وَرَ سُ ولُهُ وَالَّذِ ين َآمَ نُواْ الَّذِ ينَ يُقِيمُ ونَ الصَّالَةَ وَيُؤْتُونَ الزَّكَاةَ وَهُ مْ رَاكِ عُون﴾ [املائدة : 55 ] ،وفي إفراد لفظة (وليكم) إشارة "للتنبيه على أن الوالية هلل سبحانه وتعالى على األصالة ، ولرسوله-  - وللمؤمنين على ا"لتبع( 13 ) ،فبين أن الوالية أصالة هلل تعالى ، ثم للنبي-  - على التبع ،ثم الذين امنوا ،وتعرض لصفاتهم التي استحقوا بموجبها الوالية ،فقال تعالى﴿ : والذين آمنوا﴾ أي :"أوجدوا اإليمان وأقروا به ،ثم وصفهم بما يصدق دعواهم اإليمان فقال﴿ :والذين يقيمون الصالة﴾ أي تمكيناً لصلتهم بالخالق﴿ويؤتون الزكاة﴾ "إحساناً إلى الخالئق( 14 ) . (16) النابلس ي ،موسوعة اإلعجاز العلمي في القرآن والسنة ،ج2 ،ص234 . (17) الزمخشري ،الكشاف عن حقائق غوامض التنزيل ،ج :4 ،ص : 514 . (18) الطبري ،جامع البيان في تأويل القرآن ،ج : 13 ،ص : 323 . املبحث األول :ال والء هلل تعالى وللنبي-  -. فال والية محبة أو نصرة ملن حادّ هللا ورسوله ،مهما بلغت درجة القرابة أو تزايدت أواصر املحبة ، فاملحبة في هللا والبغض في هللا ،قال تعالى﴿ : ِالَ تَجِ دُ قَوْماً يُؤْمِنُونَ بِاللَّه وَالْيَوْمِ اآلْ خِ رِ يُوَاد ونَ مَ نْ حَ ادَّ اللَّهَ وَرَ سُ ولَهُ وَلَوْ كَانُوا ِيمَ انَ وَأَيَّدَ هُ م آبَاءهُ مْ أَوْ أَبْنَاءهُ مْ أَوْ إِخْ وَانَهُمْ أَوْ عَشِ يرَتَهُمْ أُوْلَئِكَ كَ تَبَ فِي قُلُوبِهِمُ اإلْ ُبِرُوحٍ مِّنْه﴾ [املجادلة : 22 ] ، فاملؤمن الحق ال يو الي من أعلن العداء هلل تعالى مهما بلغت درجة القرابة ، فكل صلة ووشيجة ال تقوم على أساس محبة هللا .تعالى فهي منبوذة مذمومة ومثال ذلك تبرؤ األنبياء من والية غير هللا تعالى ،وها هو النبي-  - يتبرأ من والية الكفار واملشركين ، قال تعالى﴿ : َّإِنَّ وَلِيِّـيَ اللّهُ ال َذِ ي نَزَّلَ الْكِ تَابَ وَهُ وَ يَتَوَ لَّى الصَّالِ حِ ين﴾ [األعراف : 196 ] ، أي أن "نصيري ومعيني وظهيري عليكم (هللا الذي نزل الكتاب) عليّ بالحق ، "وهو الذي يتولى من صلح عمله بطاعته من خلقه( 18 ) ، مبيناً لهم في ذات الوقت عجز من يتولونهم من األوثان وغيرها ،قال تعال ى﴿ : ْوَالَّذِ ينَ تَدْ عُونَ مِن دُونِهِ الَ يَسْ تَطِ يعُونَ نَصْرَكُ مْ وَال أَنفُ سَ هُم َيَنْصُرُون﴾ [األعراف : 197 ] ،فإذا كان لكم من دون هللا أولياء ، فهل يستطيعون نفعكم أو دفع البالء عنكم؟ كال "ال يستطيعون نصركم ،وال هم مع عجزهم عن نصرتكم يقدرون على نصرة أنفس هم ، فأي هذين أولى بالعبادة وأحق 1- التبرؤ من كل ش يء يخالف الوالء هلل تعالى ، والبراءة من الشرك واإلقرار بوحدانية هللا تعالى من أوليات الوالء هلل ،فال محبة ملن ال يقر بوحدانية هللا تعالى ،وال نصرة ملن عادى هللا ورسوله ،قال تعالى﴿ : ٌقَدْ كَانَتْ لَكُ مْ أُسْ وَة حَ سَ نَةٌ فِي إِبْرَاهِ يمَ وَالَّذِ ينَ مَ عَهُ إِذْ قَالُوا لِقَ وْمِهِمْ إِنَّا بُرَاء مِنكُ مْ وَمِمَّ ا تَعْبُدُ ونَ مِن دُو نِ اللَّهِ كَ فَ رْنَا بِكُ مْ وَبَدَ ا بَيْنَنَا ُوَبَيْنَكُ مُ الْعَدَ اوَةُ وَالْبَغْضَاء أَبَداً حَ تَّى تُؤْمِنُوا بِاللَّهِ وَحْ دَ ه... ﴾ [املمتحنة : 4] ، وقد صرحوا "بأن سبب عداوتهم وبغضائهم ليس إال كفرهم باهلل ،وما دام هذا السبب قائمًا كانت العداوة قائمة ، حتى إن أزالوه وآمنوا باهلل وحده انقلبت العداوة مواالة ، "والبغضاء محبة( 17 ). املبحث األول :ال والء هلل تعالى وللنبي-  -. (11) البخاري ، صحيح البخاري ،كتاب :التوحيد ،باب : ِمَ ا جَ اءَ فِي دُعَاء النَّبِ يِّ صَلَّ ى هللاُ عَلَيْهِ وَسَ لَّمَ أُمَّ تَهُ إِلَى تَوْحِ يدِ اللَّهِ تَبَارَكَ الوالء في القرآن الكريم الوالء في القرآن الكريم الوالء في القرآن الكريم ( 22 ) الحصان الحصان الحصان المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م فضعفُ بيتِ العنكبوت إضافة إلى ضعفِ بنيتِه ،هو ضعيف في عال ِقاتِه الداخلية ، ٍوقد يُجمعُ الضَّعفانِ في ضعف " ٍواحد( 16 ). َ فضعفُ بيتِ العنكبوت إضافة إلى ضعفِ بنيتِه ،هو ضعيف في عال ِقاتِه الداخلية ، ٍوقد يُجمعُ الضَّعفانِ في ضعف " ٍواحد( 16 ). املبحث األول :ال والء هلل تعالى وللنبي-  -. َ وهذا هو حال من يتخذ من دون هللا وليًا فيركن إليه ، فقد شبَّه هللا تعالى حال هؤالء بحال وهاء بيت العنكبوت من عدم وفاء األنثى لزوجها وأسرتها ،وهذا ما عبَّر عنه هللا تعالى بقوله : ﴿ َوَمِنَ النَّاسِ مَ نْ ي ِتَّخِ ذُ مِنْ دُون اللَّهِ أَنْدَ ادًا يُحِ ب ونَهُمْ كَ حُ بِّ اللَّهِ وَالَّذِ ينَ آمَ نُوا أَشَ د حُ بًّا لِلَّهِ وَلَوْ يَرَى الَّذِ ينَ ظَلَمُ وا إِذْ يَرَوْ نَ الْعَذَ ابَ أَنَّ الْقُ وَّةَ لِلَّهِ جَ مِيعًا ( ِوَأَنَّ اللَّهَ شَ دِ يدُ الْعَذَ اب165 َّ) إِذْ تَبَر( ُأَ الَّذِ ينَ ات بِعُوا مِنَ الَّذِ ينَ اتَّبَعُوا وَرَ أَوُا الْعَذَ ابَ وَتَقَ طَّعَتْ بِهِمُ األْ َسْ بَاب166 َ) وَقَال ْالَّذِ ينَ اتَّبَعُوا لَوْ أَنَّ لَنَا كَ رَّةً فَنَتَبَرَّأَ مِنْهُمْ كَ مَا تَبَرَّ ءُوا مِنَّا كَ ذَ لِكَ يُرِيهِمُ اللَّهُ أَع َمَالَهُمْ ح َسَ رَاتٍ عَلَيْهِمْ وَمَ ا هُ مْ بِخَ ارِجِ ينَ مِن ِالنَّار﴾[البقرة : 165 - 166 ] ثم يبين هللا تعالى أن الولي الحق هو القادر الذي يحيي املوتى وهو على كل ش يء قدير ، ال يعجزه ش يء في السموات واألرض ،قال تعالى﴿ : َأَمِ اتَّخَ ذُ وا مِن دُونِهِ أَوْلِيَاء فَاللَّهُ هُ و ٌالْوَ لِي وَهُ وَ يُحْ يِ ي املَوْتَى وَهُ وَ عَلَ ى كُلِّ ش َ يْءٍ قَدِ ير﴾ [الشورى :9 .] املطلب الثاني :مظاهر الوالء هلل تعالى وثمراته ومن مظاهر الوالء هلل تعالى ما يأتي : 1- التبرؤ من كل ش يء يخالف الوالء هلل تعالى ، والبراءة من الشرك واإلقرار بوحدانية هللا تعالى من أوليات الوالء هلل ،فال محبة ملن ال يقر بوحدانية هللا تعالى ،وال نصرة ملن عادى هللا ورسوله ،قال تعالى﴿ : ٌقَدْ كَانَتْ لَكُ مْ أُسْ وَة حَ سَ نَةٌ فِي إِبْرَاهِ يمَ وَالَّذِ ينَ مَ عَهُ إِذْ قَالُوا لِقَ وْمِهِمْ إِنَّا بُرَاء مِنكُ مْ وَمِمَّ ا تَعْبُدُ ونَ مِن دُو نِ اللَّهِ كَ فَ رْنَا بِكُ مْ وَبَدَ ا بَيْنَنَا ُوَبَيْنَكُ مُ الْعَدَ اوَةُ وَالْبَغْضَاء أَبَداً حَ تَّى تُؤْمِنُوا بِاللَّهِ وَحْ دَ ه... ﴾ [املمتحنة : 4] ، وقد صرحوا "بأن سبب عداوتهم وبغضائهم ليس إال كفرهم باهلل ،وما دام هذا السبب قائمًا كانت العداوة قائمة ، حتى إن أزالوه وآمنوا باهلل وحده انقلبت العداوة مواالة ، "والبغضاء محبة( 17 ). املبحث األول :ال والء هلل تعالى وللنبي-  -. فال والية محبة أو نصرة ملن حادّ هللا ورسوله ،مهما بلغت درجة القرابة أو تزايدت أواصر املحبة ، فاملحبة في هللا والبغض في هللا ،قال تعالى﴿ : ِالَ تَجِ دُ قَوْماً يُؤْمِنُونَ بِاللَّه وَالْيَوْمِ اآلْ خِ رِ يُوَاد ونَ مَ نْ حَ ادَّ اللَّهَ وَرَ سُ ولَهُ وَلَوْ كَانُوا ِيمَ انَ وَأَيَّدَ هُ م آبَاءهُ مْ أَوْ أَبْنَاءهُ مْ أَوْ إِخْ وَانَهُمْ أَوْ عَشِ يرَتَهُمْ أُوْلَئِكَ كَ تَبَ فِي قُلُوبِهِمُ اإلْ ُبِرُوحٍ مِّنْه﴾ [املجادلة : 22 ] ، فاملؤمن الحق ال يو الي من أعلن العداء هلل تعالى مهما بلغت درجة القرابة ، فكل صلة ووشيجة ال تقوم على أساس محبة هللا .تعالى فهي منبوذة مذمومة امأاهلل املطلب الثاني :مظاهر الوالء هلل تعالى وثمراته ومن مظاهر الوالء هلل تعالى ما يأتي : 1- التبرؤ من كل ش يء يخالف الوالء هلل تعالى ، والبراءة من الشرك واإلقرار بوحدانية هللا تعالى من أوليات الوالء هلل ،فال محبة ملن ال يقر بوحدانية هللا تعالى ،وال نصرة ملن عادى هللا ورسوله ،قال تعالى﴿ : ٌقَدْ كَانَتْ لَكُ مْ أُسْ وَة حَ سَ نَةٌ فِي إِبْرَاهِ يمَ وَالَّذِ ينَ مَ عَهُ إِذْ قَالُوا لِقَ وْمِهِمْ إِنَّا بُرَاء مِنكُ مْ وَمِمَّ ا تَعْبُدُ ونَ مِن دُو نِ اللَّهِ كَ فَ رْنَا بِكُ مْ وَبَدَ ا بَيْنَنَا ُوَبَيْنَكُ مُ الْعَدَ اوَةُ وَالْبَغْضَاء أَبَداً حَ تَّى تُؤْمِنُوا بِاللَّهِ وَحْ دَ ه... ﴾ [املمتحنة : 4] ، وقد صرحوا "بأن سبب عداوتهم وبغضائهم ليس إال كفرهم باهلل ،وما دام هذا السبب قائمًا كانت العداوة قائمة ، حتى إن أزالوه وآمنوا باهلل وحده انقلبت العداوة مواالة ، "والبغضاء محبة( 17 ). املبحث األول :ال والء هلل تعالى وللنبي-  -. ا فال والية محبة أو نصرة ملن حادّ هللا ورسوله ،مهما بلغت درجة القرابة أو تزايدت أواصر املحبة ، فاملحبة في هللا والبغض في هللا ،قال تعالى﴿ : ِالَ تَجِ دُ قَوْماً يُؤْمِنُونَ بِاللَّه وَالْيَوْمِ اآلْ خِ رِ يُوَاد ونَ مَ نْ حَ ادَّ اللَّهَ وَرَ سُ ولَهُ وَلَوْ كَانُوا ِيمَ انَ وَأَيَّدَ هُ م آبَاءهُ مْ أَوْ أَبْنَاءهُ مْ أَوْ إِخْ وَانَهُمْ أَوْ عَشِ يرَتَهُمْ أُوْلَئِكَ كَ تَبَ فِي قُلُوبِهِمُ اإلْ ُبِرُوحٍ مِّنْه﴾ [املجادلة : 22 ] ، فاملؤمن الحق ال يو الي من أعلن العداء هلل تعالى مهما بلغت درجة القرابة ، فكل صلة ووشيجة ال تقوم على أساس محبة هللا .تعالى فهي منبوذة مذمومة ومثال ذلك تبرؤ األنبياء من والية غير هللا تعالى ،وها هو النبي-  - يتبرأ من والية الكفار واملشركين ، قال تعالى﴿ : َّإِنَّ وَلِيِّـيَ اللّهُ ال َذِ ي نَزَّلَ الْكِ تَابَ وَهُ وَ يَتَوَ لَّى الصَّالِ حِ ين﴾ [األعراف : 196 ] ، أي أن "نصيري ومعيني وظهيري عليكم (هللا الذي نزل الكتاب) عليّ بالحق ، "وهو الذي يتولى من صلح عمله بطاعته من خلقه( 18 ) ، مبيناً لهم في ذات الوقت عجز من يتولونهم من األوثان وغيرها ،قال تعال ى﴿ : ْوَالَّذِ ينَ تَدْ عُونَ مِن دُونِهِ الَ يَسْ تَطِ يعُونَ نَصْرَكُ مْ وَال أَنفُ سَ هُم َيَنْصُرُون﴾ [األعراف : 197 ] ،فإذا كان لكم من دون هللا أولياء ، فهل يستطيعون نفعكم أو دفع البالء عنكم؟ كال "ال يستطيعون نصركم ،وال هم مع عجزهم عن نصرتكم يقدرون على نصرة أنفس هم ، فأي هذين أولى بالعبادة وأحق (16) النابلس ي ،موسوعة اإلعجاز العلمي في القرآن والسنة ،ج2 ،ص234 . (17) الزمخشري ،الكشاف عن حقائق غوامض التنزيل ،ج :4 ،ص : 514 . (18) الطبري ،جامع البيان في تأويل القرآن ،ج : 13 ،ص : 323 . الوالء في القرآن الكريم ( 23 ) الحصان المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م باأللوهة؟ أمن ينصر وليه ويمنع نفسه ممن أراده ، أم من ال يستطيع نصر وليه ويعجز عن منع نفسه ممن أراده وبَغاه بمكروه(" 19 ). املبحث األول :ال والء هلل تعالى وللنبي-  -. 2- الطاعة :والوالء يكون بالقول والعمل ، فمن أعلن الوالء هلل وجب عليه أن يعبر عن ذلك بالتزام طاعة هللا تعالى فيما أمر أو نهى وتحكيم كتابه ،وهذه الطاعة إلزامية لقوله تعالى﴿ : ْيَا أَي هَا الَّذِ ينَ آمَ نُواْ أَطِ يعُواْ اللّهَ وَأَطِ يعُوا ُالرَّسُ ولَ وَأُوْ لِي األَمْرِ مِنكُ مْ فَإِن تَنَازَعْتُمْ فِي ش َ يْءٍ فَرُد وهُ إِلَى اللّهِ وَالرَّسُ ولِ إِن كُ نتُمْ تُؤْمِن َون َبِاللّهِ وَالْيَوْمِ اآلخِ رِ ذَلِك ًخَ يْرٌ وَأَحْ سَ نُ تَأْوِيال﴾ [النساء : 59 ] ،وطاعة هللا تعالى تتمثل في إقامة شعائره وفرائضه التي فرضها ، فتحقيق العبادات له تعالى هي من مضامين الطاعة ،فإقامة الصالة وإيتاء الزكاة وصوم رمضان وحج البيت ، واالبتعاد عما حرّم م ن الفواحش ،وتنفيذ أوامره وإن خالفت هوى النفس ،فقد ضرب لنا إبراهيم-  - أروع صور الطاعة في االمتثال ألمر هللا تعالى بذبح ابنه ،قال تعالى﴿ : فَلَمَّ ا بَلَغَ مَ عَهُ السَّ عْيَ قَالَ يَا بُنَيَّ إِنِّي أَرَى فِي املْ َنَامِ أَنِّي َأَذْبَحُ كَ فَانظُرْ مَ اذَا تَرَى ق َالَ يَا أَبَتِ افْعَلْ مَا تُؤْمَرُ سَ تَجِ دُ نِي إِن شَ اء اللَّهُ مِنَ الصَّابِرِين﴾ [الصافات : 102 ] ، فكان الجواب من ابنه :أن يا أبتي أمر هللا أولى بالنفاذ "إنه يتلقى األمر ال في طاعة واستسالم فحسب ، ولكن في رض ى كذلك وفي يقين (يا أبت) في مودة وقربى ،(افعل م)ا تؤمر... (19) الطبري ،املصدر السابق ،ج : 13 ،ص : 323 . (20) قطب ،في ظالل القرآن ،ج :5 ،ص : 2995 . (21) ابن عطية ،املحرر الوجيز في تفسير الكتاب العزيز ،ج :1 ،ص : 422 . ا (21) ابن عطية ،املحرر الوجيز في تفسير الكتاب العزيز ،ج :1 ،ص : 422 . (19) الطبري ،املصدر السابق ،ج : 13 ،ص : 323 . (20) قطب ،في ظالل القرآن ،ج :5 ،ص : 2995 . (21) ابن عطية ،املحرر الوجيز في تفسير الكتاب العزيز ،ج :1 ،ص : 422 . (19) الطبري ،املصدر السابق ،ج : 13 ،ص : 323 . املبحث األول :ال والء هلل تعالى وللنبي-  -. فهو يحس ما أحسه من قبل قلب أبيه ، يحس أن الرؤيا إشارة ،وأن اإلشارة أمر ثم هو األدب مع هللا ، ومعرفة حدود قدرته وطاقته في االحتمال واالستعانة بربه على ضعفه ونسبة الفضل إليه في إعانته على التضحية ،ومساعدته على الطاعة﴾ : ستجدني إن شاء هللا من الصابرين"﴿ ( 20 ) ، .ًهذا هو الوالء الحق هلل تعالى في أروع صوره امتثاال واحتسابا ﴿ا يلها 3- الدفاع عن الدين :ويكون بإبراز الصورة الحقيقية املشرقة لهذا الدين الحنيف ، إحقاقاً للحق وتنفيذً ا ألمر هللا تعالى في إيصال هذه الدعوة إلى جميع الناس ،بالطريقة التي أراد هللا تعالى ،من الحكمة واملوعظة الحسنة واللين واملجادلة بالتي هي أحسن ،قال تعالى﴿ : َادْعُ إِلِى سَ بِيلِ رَبِّكَ بِالْ حِ كْ مَةِ وَاملْ َوْعِظَةِ الْ حَ سَ نَةِ وَجَ ادِ لْهُم بِالَّتِ ي هِ ي َأَحْ سَ نُ إِنَّ رَبَّكَ هُ وَ أَعْلَمُ بِمَن ضَلَّ عَن سَ بِيلِهِ وَهُ وَ أَعْلَمُ بِاملْ ُهْت َدِ ين﴾ [النحل : 125 .] ويتضمن الدفاع أن ننتصر لدين هللا تعالى من الطغاة والبغاة ، سواء كانوا ممن ينتمون لهذا الدين أو من غيرهم؛ ألن من واجب األمة الدفاع عن هذا الدين ومقدساته ، واالنتصار للمسلمين الذين اضطهدوا في مشارق األرض ومغاربها؛ حتى ال يفتنوا في دينهم ،ق ال تعالى﴿ : َوَقَاتِلُوهُ مْ حَ تَّى الَ تَكُونَ فِتْنَةٌ وَيَكُونَ الدِّ ينُ كُل هُ لِلّه فَإِنِ انتَهَوْاْ فَإِنَّ اللّه ٌبِمَ ا يَعْمَ لُونَ بَصِ ير﴾ [األنفال : 39 .] .ثمرات الوالء هلل تعالى 1- محبة هللا تعالى : وهي الغاية التي يسعى إليها من عرف هللا تعالى حق املعرفة ، فتحصل محبة هللا تعالى لعبده عندما يخلص الوالء له ، ًوينقاد ألمره رهباً ورغبا ، وتظهر عالمات محبة هللا تعالى للعبد "أن يرى العبد مهديًا مسددًا ذا قبول في األرض ، "فلطف هللا بالعبد ورحمته إياه هي ثمرة محبته( 21 ) ،قال تعالى﴿ : ُيَا أَي هَا الَّذِ ينَ آمَن ْوا َمَ ن يَرْتَدَّ مِنكُ مْ عَن دِ ينِهِ فَسَ وْفَ يَأْتِي اللّهُ بِقَ وْمٍ يُحِ ب هُمْ وَيُحِ ب ونَهُ أَذِ لَّةٍ عَلَ ى املْ ُؤْمِنِين َأَعِزَّةٍ عَلَ ى الْكَافِرِينَ يُجَ اهِ دُ ون َفِي سَ بِيلِ اللّهِ وَالَ يَخَ افُونَ لَوْمَةَ آلئِمٍ ذَلِكَ فَضْلُ اللّهِ يُؤْتِيهِ م ٌن يَشَ اءُ وَاللّهُ وَاسِ عٌ عَلِيم﴾ [املائدة : 54 ] ، وهذه اآلية تحذير من هللا تعالى للمؤمنين من الوقوع في شرك االفتتان عن الدين ،بأن هؤالء ال وزن لهم عند هللا تعالى ، لذا (21) ابن عطية ،املحرر الوجيز في تفسير الكتاب العزيز ،ج :1 ،ص : 422 . (22) رضا ، )تفسير القرآن الحكيم (تفسير املنار ،ج :5 ،ص : 376 . (23) ينظر- السعدي ،تيسير الكريم الرحمن في تفسير كالم املنان ،ج :1 ،ص : 236 . (24) البخاري ، صحيح البخاري ،كتاب اإليمان ، ِبَابُ حَ الَوَةِ اإلِيمَ ان ،ج :1 ،ص : 12 ،رقم : 16 . (25) السعدي ،تيسير الكريم الرحمن في تفسير كالم املنان ،ج :1 ،ص : 659 . المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م 3- حصول السعادة : ومن ثمار الو الء املطلق هلل تعالى أن يشعر املوالي هلل تعالى بالرضا والطمأنينة والسعادة؛ ألنه أعلن الوالية الحقة الخالصة هلل تعالى فعن أنس بن مالك-  -عن النبي-  - قال : "ثالث من كن فيه وجد حالوة اإليمان :أن يكون هللا ورسوله أحب إليه مما سواهما ، وأن يحب املرء ال يحبه إال لله ، وأن يكره أن يعود في الكفر "كما يكره أن يقذف في النار( 24 ). المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م يستبدلهم بمن هم أعز عليه منهم ،يدافعون عن دينه ألنهم يحبون هللا تعالى ويحبهم فكتب لهم ا لعزة والكرامة ، وقد تحقق هذا في زمن خالفة أبي بكر الصديق-  - عندما حاولت فيه فئة ضالة أن تفرق بين أركان اإلسالم وقواعده ،وتبث جذور الفتنة بين املسلمين بعد وفاة النبي-  - ، وهذه اآلية وإن كانت قد تحققت في أبي بكر والصحابة الذين قاتلوا معه املرتدين ، إال أنها تنطبق في كل زمان أوجد هللا تعالى فئة صابرة على الحق ، مدافعة عنه ،غايتهم في ذلك محبة هللا تعالى ورسوله-  -. المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م 2- العزة والغلبة : ًإن من استجار باهلل ولجأ إليه ال يضره بعد ذلك شيئا ،ألن هللا هو املعز وهو املذل ، وهو القادر على كل ش يء ،فال تقهره قوة وال يمنعه مانع ،ق ال تعالى﴿ : َالَّذِ ينَ يَتَّخِ ذُ ونَ الْكَافِرِينَ أَوْلِيَاء مِن دُونِ املْ ُؤْمِنِين ًأَيَبْتَغُونَ عِندَ هُ مُ الْعِزَّةَ فَإِنَّ العِزَّةَ لِلّهِ جَ مِيعا﴾ [النساء : 139 ] ، وليس أعجب ممن يوالي أعداء هللا ويبتغي عندهم العزة ،وقد سلبت منهم ، وهنا "استفهام تقريع و توبيخ ، إن كانوا يبتغون عندهم العزة وهي املنعة والغلبة ورفعة القدر فإن العزة هلل جميعًا ،فهو يؤتيها من يشاء ، فكان عليهم أن يطلبوها منه بصدق اإليمان والسير على سنته تعالى واتباع هداية وحيه الذي يرشدهم إلى طرقها ، "ويبين أسبابها( 22 ) ، فو هللا لن ينالهم إال الخزي والذل الذي .استمرأته نفوسهم الضعيفة َ فالذين يبتغون العزة من هللا تعالى سينالون العزة ،وسيكون لهم الغلبة ،قال تعالى﴿ : َوَمَ ن يَتَوَلَّ اللّه َوَرَ سُ ولَهُ وَالَّذِ ينَ آمَ نُواْ فَإِنَّ حِ زْبَ اللّهِ هُ مُ الْغَالِبُون﴾ [املائدة : 56 ] ، وهنا اضاف هللا تعالى هذا الحزب "إضافة عبودية ووالية ، "وحزبه هم الغالبون الذين لهم العاقبة في الدنيا واآلخرة( 23 ) ، وفي تذييل اآلية بما جاء بها من املؤكدات بشرى .من هللا تعالى ألوليائه بأنهم منصورون ال محالة وإن استبطأت نفوسهم ذلك فالذين يبتغون العزة من هللا تعالى سينالون العزة ،وسيكون لهم الغلبة ،قال تعالى﴿ : َوَمَ ن يَتَوَلَّ اللّه َوَرَ سُ ولَهُ وَالَّذِ ينَ آمَ نُواْ فَإِنَّ حِ زْبَ اللّهِ هُ مُ الْغَالِبُون﴾ [املائدة : 56 ] ، وهنا اضاف هللا تعالى هذا الحزب "إضافة عبودية ووالية ، "وحزبه هم الغالبون الذين لهم العاقبة في الدنيا واآلخرة( 23 ) ، وفي تذييل اآلية بما جاء بها من املؤكدات بشرى .من هللا تعالى ألوليائه بأنهم منصورون ال محالة وإن استبطأت نفوسهم ذلك 3- حصول السعادة : ومن ثمار الو الء املطلق هلل تعالى أن يشعر املوالي هلل تعالى بالرضا والطمأنينة والسعادة؛ ألنه أعلن الوالية الحقة الخالصة هلل تعالى فعن أنس بن مالك-  -عن النبي-  - قال : "ثالث من كن فيه وجد حالوة اإليمان :أن يكون هللا ورسوله أحب إليه مما سواهما ، وأن يحب املرء ال يحبه إال لله ، وأن يكره أن يعود في الكفر "كما يكره أن يقذف في النار( 24 ). املبحث األول :ال والء هلل تعالى وللنبي-  -. (21) ابن عطية ،املحرر الوجيز في تفسير الكتاب العزيز ،ج :1 ،ص : 422 . الوالء في القرآن الكريم الوالء في القرآن الكريم ( 24 ) الحصان (26) مسلم ،صحيح مسلم ،تحقيق :محمد فؤاد عبد الباقي ،( دار إحياء التراث العربي– )بيروت ،كتاب اإليمان ، ِبَابُ وُجُ وبِ مَ حَ بَّةِ رَسُ ول ِهللاِ صلَّ ى هللا عَلَيْهِ وَسَ لَّمَ أَكْ ثَرَ مِنَ األْ َهْ لِ وَالْوَلَد ، َوَالْوَالِدِ والنَّاسِ أجْ مَ عِين ، َ ِْيمَ انِ عَلَ ى مَنْ لمْ يُحِ بَّهُ هَ ذِ هِ امل وَإِطْالَ قِ عَدَ مِ اإلْ َحَ بَّة ،ج : 1 ، ص67 ،رقم : 44 . ( 27 ) البخاري ، صحيح البخاري ، كتاب األيمان والنذور ، ٌبَاب : َكَ يْفَ كَانَتْ يَمِينُ النَّبِ يِّ صَلَّ ى هللاُ عَلَيْهِ وَسَ لَّم ،ج :8 ،ص129 ،رقم : 6632 . ( 28 ) ابن عاشور ،التحرير والتنوير ،ج : 5 ،ص : 97 . ( 29 ) الخازن ، لباب التأويل في معاني التنزيل ،ج :4 ،ص : 176 . ( 30 ) أبن حنبل ،مسند اإلمام أحمد بن حنبل ،مسند النساء ،مُ سْ نَدُ الصّ ِ دِّ يقَ ةِ عَائِشَ ةَ بِنْتِ الصّ ِ دِّ يقِ رَض ِ يَ هللاُ عَنْهَا ،ج : 41 ،ص : 148 ، رقم : 24601 . املطلب الثالث :الوالء للنبي-  - . ًومن مظاهر محبته أيضا ،توقيره وتبجيله ،قال تعالى﴿ : ِيَا أَي هَا الَّذِ ينَ آمَ نُوا الَ تَرْفَعُوا أَصْوَاتَكُ مْ فَوْقَ صَوْت َالنَّبِ يِّ وَالَ تَجْ هَرُوا لَهُ بِالْقَ وْلِ كَ جَ هْرِ بَعْضِ كُ مْ لِبَعْضٍ أَن تَحْ بَطَ أَعْمَ الُكُ مْ وَأَنتُمْ ال َتَشْ عُرُون﴾ [الحجرات :2] ، وذلك حتى في رفع الصوت في حضرة النبي-  - والتأدب في مخاطبته ، لذلك جاء األمر اإللهي "أن يبجلوه ويفخموه ويعظموه وال "يرفعوا أصواتهم عنده وال ينادوه كما ينادي بعضهم بعضا فيقول يا محمد بل يقولون يا رسول هللا يا نبي( 29 ). ومن مظاهر محبة النبي-  - أيضاً االقتداء به في كل حركاته وسكناته ، وخاصة في الجانب التشريعي لقوله تعالى﴿ : َِ َن كَانَ يَرْجُ و اللَّهَ وَالْيَوْمَ اآلْ خِ رَ وَذَكَ رَ اللَّه لَقَ دْ كَانَ لَكُ مْ فِي رَسُ ولِ اللَّهِ أُسْ وَةٌ حَ سَ نَةٌ ملّ ًكَ ثِيرا﴾ [األحزاب : 21 ] ، وهذا التأس ي واالقت داء به ألنه كان يمثل الجانب العملي للقرآن الكريم كما جاء في حديث أم املؤمنين عائشة عندما سُ ئلت عن خلق النبي-  - قالت :"كان خلقه القرآن.".. املطلب الثالث :الوالء للنبي-  - . ( 30 ) ؛ وألن االقتداء به هو الطريق املوصل إلى الجنة "ألنه حكم وهذا عمر بن الخطاب-  - يبين للنبي-  - مدى محبته له ،إال أنه تفاجأ من رد النبي-  - الذي بيّن أن الوالء الحقيقي واملحبة الصادقة له ال تكون إال إذا بلغت مبلغاً يتجاوز حدود محبة النفس ،فعن عبد هللا بن هشام ، قال :"كنا مع النبي-  - وهو آخذ بيد عمر بن الخطاب ،فقال له عمر :يا رسول هللا ، ألنت أحب إلي من كل ش يء إال من نفس ي ،فقال النبي-  - :ال ،والذي نفس ي بيده ،حتى أكون أحب إليك من نفسك ،فقال له ع مر :فإنه اآلن ،وهللا ، ألنت أحب إلي من نفس ي ،فقال النبي-  - : "اآلن يا عمر( 27 ) ، فما كان من عمر إال أن انخلع من محبة نفسه وآثر محبة النبي-  - .؛ ألنه أولى باملؤمنين من أنفسهم ومن مظاهر محبة النبي-  - إتباعه فيما أمر أو نهى؛ ألن اتباع النبي هو اتباع هلل تعالى ،قال تعالى﴿ : قُلْ إِن ٌكُ نتُمْ تُحِ ب ونَ اللّهَ فَاتَّبِعُونِي يُحْ بِبْكُ مُ اللّهُ وَيَغْفِرْ لَكُ مْ ذُنُوبَكُ مْ وَاللّهُ غَفُ ورٌ رَّحِ يم﴾ [آل عمران : 31 ] ، وطاعته فيما يبلغ عن ربه تعالى؛ ألنه ال ينطق عن الهوى؛ بل هو وحيٌ من هللا تعالى ،وطاعته واجبة لقوله تعالى﴿ : َقُلْ أَطِ يعُواْ اللّه َوَالرَّسُ ولَ فإِن تَوَلَّوْاْ فَإِنَّ اللّهَ الَ يُحِ ب الْكَافِرِين﴾ [آل عمران : 32 ] ،وقوله تعالى﴿ : وَأَطِ يعُوا اللَّهَ وَأَطِ يعُوا الرَّسُ ولَ فَإِن ُتَوَلَّيْتُمْ فَإِنَّمَ ا عَلَ ى رَسُ ولِنَا الْبَالَ غُ املْ ُبِين﴾ [التغابن : 12 ]، وجاء التأكيد بطاعة الرسول بعد طاعة هللا تعالى "لينبه على وجوب طاعته فيما يأمر به ، ولو كان أمره غير مقترن بقرائن تبليغ الوحي لئال يتوهم السامع أن طاعة الرسول املأمور بها ترجع إلى طاعة هللا فيما يبلغه عن هللا دون ما يأمر به في غير التشريع ،فإن امتثال أمره ك"له خير( 28 ). ( 30 ) أبن حنبل ،مسند اإلمام أحمد بن حنبل ،مسند النساء ،مُ سْ نَدُ الصّ ِ دِّ يقَ ةِ عَائِشَ ةَ بِنْتِ الصّ ِ دِّ يقِ رَض ِ يَ هللاُ عَنْهَا ،ج : 41 ،ص : 148 ، رقم : 24601 . املطلب الثالث :الوالء للنبي-  - . ًومن مظاهر محبته أيضا ،توقيره وتبجيله ،قال تعالى﴿ : ِيَا أَي هَا الَّذِ ينَ آمَ نُوا الَ تَرْفَعُوا أَصْوَاتَكُ مْ فَوْقَ صَوْت َالنَّبِ يِّ وَالَ تَجْ هَرُوا لَهُ بِالْقَ وْلِ كَ جَ هْرِ بَعْضِ كُ مْ لِبَعْضٍ أَن تَحْ بَطَ أَعْمَ الُكُ مْ وَأَنتُمْ ال َتَشْ عُرُون﴾ [الحجرات :2] ، وذلك حتى في رفع الصوت في حضرة النبي-  - والتأدب في مخاطبته ، لذلك جاء األمر اإللهي "أن يبجلوه ويفخموه ويعظموه وال "يرفعوا أصواتهم عنده وال ينادوه كما ينادي بعضهم بعضا فيقول يا محمد بل يقولون يا رسول هللا يا نبي( 29 ). ومن مظاهر محبة النبي-  - أيضاً االقتداء به في كل حركاته وسكناته ، وخاصة في الجانب التشريعي لقوله تعالى﴿ : َِ َن كَانَ يَرْجُ و اللَّهَ وَالْيَوْمَ اآلْ خِ رَ وَذَكَ رَ اللَّه لَقَ دْ كَانَ لَكُ مْ فِي رَسُ ولِ اللَّهِ أُسْ وَةٌ حَ سَ نَةٌ ملّ ًكَ ثِيرا﴾ [األحزاب : 21 ] ، وهذا التأس ي واالقت داء به ألنه كان يمثل الجانب العملي للقرآن الكريم كما جاء في حديث أم املؤمنين عائشة عندما سُ ئلت عن خلق النبي-  - قالت :"كان خلقه القرآن.".. ( 30 ) ؛ وألن االقتداء به هو الطريق املوصل إلى الجنة "ألنه حكم ومن مظاهر محبة النبي-  - إتباعه فيما أمر أو نهى؛ ألن اتباع النبي هو اتباع هلل تعالى ،قال تعالى﴿ : قُلْ إِن ٌكُ نتُمْ تُحِ ب ونَ اللّهَ فَاتَّبِعُونِي يُحْ بِبْكُ مُ اللّهُ وَيَغْفِرْ لَكُ مْ ذُنُوبَكُ مْ وَاللّهُ غَفُ ورٌ رَّحِ يم﴾ [آل عمران : 31 ] ، وطاعته فيما يبلغ عن ربه تعالى؛ ألنه ال ينطق عن الهوى؛ بل هو وحيٌ من هللا تعالى ،وطاعته واجبة لقوله تعالى﴿ : َقُلْ أَطِ يعُواْ اللّه َوَالرَّسُ ولَ فإِن تَوَلَّوْاْ فَإِنَّ اللّهَ الَ يُحِ ب الْكَافِرِين﴾ [آل عمران : 32 ] ،وقوله تعالى﴿ : وَأَطِ يعُوا اللَّهَ وَأَطِ يعُوا الرَّسُ ولَ فَإِن ُتَوَلَّيْتُمْ فَإِنَّمَ ا عَلَ ى رَسُ ولِنَا الْبَالَ غُ املْ ُبِين﴾ [التغابن : 12 ]، وجاء التأكيد بطاعة الرسول بعد طاعة هللا تعالى "لينبه على وجوب طاعته فيما يأمر به ، ولو كان أمره غير مقترن بقرائن تبليغ الوحي لئال يتوهم السامع أن طاعة الرسول املأمور بها ترجع إلى طاعة هللا فيما يبلغه عن هللا دون ما يأمر به في غير التشريع ،فإن امتثال أمره ك"له خير( 28 ). املطلب الثالث :الوالء للنبي-  - . ما والوالء للنبي-  - من لوازم شهادة التوحيد ،التي بها ينتقل اإلنسان من حالة الكفر إلى نور اإليمان ، ووالية النبي-  -حق ،فهو أولى بنا من أنفسنا لقوله تعالى﴿ : النَّبِ ي ... ْأَوْ لَى بِاملْ ُؤْمِنِينَ مِنْ أَنفُ سِ هِم﴾ [األحزاب : 6 ] وهذه األحقية في الوالية قدمت على والية النفس "ألنه-  - بذل لهم من النصح ،والشفقة ،والرأفة ،ما كان به أرحم الخلق ، وأرأفهم ،فرسول هللا أعظم الخلق مِنَّةً عليهم من كل أحد ،فإنه لم يصل إليهم مثقال ذرة من الخير ، وال اندفع عنهم مثقال ذرة من الشر ، "إال على يديه وبسببه( 25 ). الوالء في القرآن الكريم ( 25 ) الحصان المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م ومن مظاهر الوالء للنبي-  - 1- محبته :ومحبة النبي-  - واجبة على كل مسلم ، وهي ليست كمحبتنا ألنفسنا أو أوالدنا أو آباءنا أو محبتنا لرغبات النفس؛ بل هي محبة من نوع آخر ال يساويها وال يدانيها محبة لقوله-  - :" ِالَ يُؤْمِنُ أَحَ دُ كُ مْ حَ تَّى أَكُونَ أَحَ بَّ إِلَيْه " َمِنْ وَلَدِ هِ وَوَ الِدِ هِ وَالنَّاسِ أَجْ مَ عِين( 26 ). النفس؛ بل هي محبة من نوع آخر ال يساويها وال يدانيها محبة لقوله-  - :" ِالَ يُؤْمِنُ أَحَ دُ كُ مْ حَ تَّى أَكُونَ أَحَ بَّ إِلَيْه " َمِنْ وَلَدِ هِ وَوَ الِدِ هِ وَالنَّاسِ أَجْ مَ عِين( 26 ). املطلب الثالث :الوالء للنبي-  - . وهذا عمر بن الخطاب-  - يبين للنبي-  - مدى محبته له ،إال أنه تفاجأ من رد النبي-  - الذي بيّن أن الوالء الحقيقي واملحبة الصادقة له ال تكون إال إذا بلغت مبلغاً يتجاوز حدود محبة النفس ،فعن عبد هللا بن هشام ، قال :"كنا مع النبي-  - وهو آخذ بيد عمر بن الخطاب ،فقال له عمر :يا رسول هللا ، ألنت أحب إلي من كل ش يء إال من نفس ي ،فقال النبي-  - :ال ،والذي نفس ي بيده ،حتى أكون أحب إليك من نفسك ،فقال له ع مر :فإنه اآلن ،وهللا ، ألنت أحب إلي من نفس ي ،فقال النبي-  - : "اآلن يا عمر( 27 ) ، فما كان من عمر إال أن انخلع من محبة نفسه وآثر محبة النبي-  - .؛ ألنه أولى باملؤمنين من أنفسهم ومن مظاهر محبة النبي-  - إتباعه فيما أمر أو نهى؛ ألن اتباع النبي هو اتباع هلل تعالى ،قال تعالى﴿ : قُلْ إِن ٌكُ نتُمْ تُحِ ب ونَ اللّهَ فَاتَّبِعُونِي يُحْ بِبْكُ مُ اللّهُ وَيَغْفِرْ لَكُ مْ ذُنُوبَكُ مْ وَاللّهُ غَفُ ورٌ رَّحِ يم﴾ [آل عمران : 31 ] ، وطاعته فيما يبلغ عن ربه تعالى؛ ألنه ال ينطق عن الهوى؛ بل هو وحيٌ من هللا تعالى ،وطاعته واجبة لقوله تعالى﴿ : َقُلْ أَطِ يعُواْ اللّه َوَالرَّسُ ولَ فإِن تَوَلَّوْاْ فَإِنَّ اللّهَ الَ يُحِ ب الْكَافِرِين﴾ [آل عمران : 32 ] ،وقوله تعالى﴿ : وَأَطِ يعُوا اللَّهَ وَأَطِ يعُوا الرَّسُ ولَ فَإِن ُتَوَلَّيْتُمْ فَإِنَّمَ ا عَلَ ى رَسُ ولِنَا الْبَالَ غُ املْ ُبِين﴾ [التغابن : 12 ]، وجاء التأكيد بطاعة الرسول بعد طاعة هللا تعالى "لينبه على وجوب طاعته فيما يأمر به ، ولو كان أمره غير مقترن بقرائن تبليغ الوحي لئال يتوهم السامع أن طاعة الرسول املأمور بها ترجع إلى طاعة هللا فيما يبلغه عن هللا دون ما يأمر به في غير التشريع ،فإن امتثال أمره ك"له خير( 28 ). ( 31 ) الشاطبي ،االعتصام ،ج :2 ،ص : 854 . ( 32 ) ابن ماجة ،سنن ابن ماجه ،ج :1 ،ص : 16 ،رقم : 43. صححه األلباني في سلسلة األحاديث الصحيحة وش يء من فقهها وفوائدها ،ج : 2 ،ص : 610 ،رقم : 937 . ( 33 ) البخاري ، صحيح البخاري ،كتاب حديث األنبياء ، َبَابُ مَ ا ذُكِ رَ عَنْ بَنِ ي إِسْ رَائِيل ،ج :4 ،ص : 170 ،رقم : 3461 . ( 34 ) أبو داود ،سنن أبي داود ،ج :3 ،ص : 322 ،رقم : 3660). صححه األلباني في صحيح الجامع الصغير وزياداته ،ج :2 ،ص : 1145 ،رقم : 2309 . ( 35 ) البغوي ،معالم التنزيل ،ج :7 ،ص : 341 . ( 36 ) البخاري ، صحيح البخاري ،كتاب اإليمان ،باب : َِخِ يهِ مَ ا يُحِ ب لِنَفْ سِ ه مِنَ اإلِيمَ انِ أَنْ يُحِ بَّ ألِ ،ج : 1 ،ص : 12 ،رقم : 13 .مسلم ، صحيح مسلم ،كتاب اإليمان ،باب :الدليل على أن من خصال اإليمان أن يحب ألخيه املسلم ما يحب لنفسه من الخير ،ج : 1ص : 67 ،رقم : 45 . المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م الوحي على نفسه ،حتى صار في علمه وعمله على وفقه ، فكان الوحي ًحاكمً ا وافقً ا قائال ، وكان هو عليه الصالة والسالم "مذعنًا ملبيًا نداءه واقفً ا عند حكمه( 31 ). َ الوحي على نفسه ،حتى صار في علمه وعمله على وفقه ، فكان الوحي ًحاكمً ا وافقً ا قائال ، وكان هو عليه الصالة والسالم "مذعنًا ملبيًا نداءه واقفً ا عند حكمه( 31 ). َ 2- نصرته :ونصرة النبي-  - واجبة على كل مسلم لقوله تعالى﴿ : ُإِالَّ تَنصُرُوهُ فَقَ دْ نَصَرَهُ اللّه... ﴾ [التوبة : 40 ] ، وتكون نصرة النبي-  - بالدفاع عن سنته والتمسك بها ،فعن العرباض بن سارية ،قال : "وعظنا رسول هللا-  - موعظة ذرفت منها العيون ،ووجلت منها القلوب ،فقلنا :يا رسول هللا ،إن هذه ملوعظة مودع ، فماذا تعهد إلينا؟ قال :قد تركتكم على البيضاء ليلها كنهارها ،ال يزيغ عنها بعدي إال هالك ،من يعش منكم فسيرى اختالفا كثيرا ، فعل يكم بما عرفتم من سنتي ،وسنة الخلفاء الراشدين املهديين ، "عضوا عليها بالنواجذ( 32 ) ، نشر دعوته إلى الناس كافة لقوله-  - : ""بلغوا عني ولو آية( 33 ) ، وقد أثنى النبي-  - على من قام بتبليغ رسالته على أكمل وجه فقال-  - "نَضَّرَ اللَّهُ امْ رَأً سَ مِعَ مِنَّا حَ دِ يثًا ، ُفَحَ فِظَهُ حَ تَّى يُبَلِّغَه ، ُفَرُبَّ حَ امِلِ فِقْ هٍ إِلَى مَ نْ هُ وَ أَفْقَ هُ مِنْه ، ِوَرُ بَّ حَ امِل " ٍفِقْ هٍ لَيْسَ بِفَ قِيه( 34 ). املبحث الثاني : الوالء الدنيوي وهذه الوجوه من الوالء منها ما هو موافق لضوابط الشرع ،ومتى خرج عن هذه الضوابط أصبح هذا الوالء ًمذموما ،وقد يصل حكمه إلى التحريم ،ومنه ما هو مذموم وحكمه التحريم ،وال بد له من توبة نصوح ، وهذه الوجوه ندرسها وفق املطالب اآلتية : املطلب األول : .الوالء بين املؤمنين أمما والوالء بين املؤمنين له أصوله في الشريعة اإلسالمية ،قال تعالى﴿ : َوَاملْ ُؤْمِنُون ٍوَاملْ ُؤْمِنَاتُ بَعْضُهُمْ أَوْلِيَاء بَعْض َيَأْمُ رُونَ بِاملْ َعْرُوفِ وَيَنْهَوْنَ عَنِ املْ ُنكَ رِ وَيُقِيمُ ونَ الصَّالَةَ وَيُؤْتُونَ الزَّكَاةَ وَيُطِ يعُونَ اللّهَ و َّرَ سُ ولَهُ أُوْلَـئِكَ سَ يَرْحَ مُهُمُ اللّهُ إِن ٌاللّهَ عَزِيزٌ حَ كِ يم﴾ [الحجرات : 10 ] ، وهذه األخوة هي أخوة في الدين والوالية كما قال البغوي- رحمه هللا تعالى-( 35 ) ، وهذه املواالة لها ركنان ،هما :املحبة والنصرة ، والنصوص الشرعية أكثرت من ذكر هذه الوالية ملا لها من أثر في وحدة األمة اإلسالمية ،ففي جانب املحبة وبعد أن بيّن أن املؤمنين إخوة ،جع ل هذه املحبة جزء من كمال اإليمان لقول النبي-  - : ْ"الَ يُؤْمِنُ أَحَ دُ كُ م ، " َِخِ يهِ مَ ا يُحِ ب لِنَفْ سِ ه حَ تَّى يُحِ بَّ ألِ( 36 ) ،وهذه املحبة تقتض ي عدم ظلمه واحتقاره وغيبته ، وستره وأن يكون في حاجة أخيه لقوله-  - : َ"املُسْ لِمُ أَخُ و املُسْ لِمِ الَ يَظْلِمُ هُ و ُالَ يُسْ لِمُ ه ، َوَمَنْ كَانَ فِي حَ اجَ ةِ أَخِ يهِ كَان ِاللَّهُ فِي حَ اجَ تِه ، ًوَمَنْ فَرَّجَ عَنْ مُسْ لِمٍ كُ رْبَة ، ِفَرَّجَ اللَّهُ عَنْهُ كُ رْبَةً مِنْ كُ رُبَاتِ يَوْمِ القِيَامَ ة ، َوَمَنْ سَ تَرَ مُ سْ لِمًا سَ تَرَهُ اللَّهُ يَوْم ( 31 ) الشاطبي ،االعتصام ،ج :2 ،ص : 854 . ( 32 ) ابن ماجة ،سنن ابن ماجه ،ج :1 ،ص : 16 ،رقم : 43. صححه األلباني في سلسلة األحاديث الصحيحة وش يء من فقهها وفوائدها ،ج : 2 ،ص : 610 ،رقم : 937 . ( 33 ) البخاري ، صحيح البخاري ،كتاب حديث األنبياء ، َبَابُ مَ ا ذُكِ رَ عَنْ بَنِ ي إِسْ رَائِيل ،ج :4 ،ص : 170 ،رقم : 3461 . ( 34 ) أبو داود ،سنن أبي داود ،ج :3 ،ص : 322 ،رقم : 3660). صححه األلباني في صحيح الجامع الصغير وزياداته ،ج :2 ،ص : 1145 ،رقم : 2309 . ( 35 ) البغوي ،معالم التنزيل ،ج :7 ،ص : 341 . ( 32 ) ابن ماجة ،سنن ابن ماجه ،ج :1 ،ص : 16 ،رقم : 43. صححه األلباني في سلسلة األحاديث الصحيحة وش يء من فقهها وفوائدها ،ج : 2 ،ص : 610 ،رقم : 937 . ( 31 ) الشاطبي ،االعتصام ،ج :2 ،ص : 854 . املطلب الثالث :الوالء للنبي-  - . ًأ﴿َ َ ُ َأ َ َا آ ُ َّ أَ (26) مسلم ،صحيح مسلم ،تحقيق :محمد فؤاد عبد الباقي ،( دار إحياء التراث العربي– )بيروت ،كتاب اإليمان ، ِبَابُ وُجُ وبِ مَ حَ بَّةِ رَسُ ول ِهللاِ صلَّ ى هللا عَلَيْهِ وَسَ لَّمَ أَكْ ثَرَ مِنَ األْ َهْ لِ وَالْوَلَد ، َوَالْوَالِدِ والنَّاسِ أجْ مَ عِين ، َ ِْيمَ انِ عَلَ ى مَنْ لمْ يُحِ بَّهُ هَ ذِ هِ امل وَإِطْالَ قِ عَدَ مِ اإلْ َحَ بَّة ،ج : 1 ، ص67 ،رقم : 44 . َََ ( 30 ) أبن حنبل ،مسند اإلمام أحمد بن حنبل ،مسند النساء ،مُ سْ نَدُ الصّ ِ دِّ يقَ ةِ عَائِشَ ةَ بِنْتِ الصّ ِ دِّ يقِ رَض ِ يَ هللاُ عَنْهَا ،ج : 41 ،ص : 148 ، رقم : 24601 . الوالء في القرآن الكريم ( 26 ) الحصان المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م " ِالقِيَامَ ة( 37 ) ،وإبدا ء املشورة والنصح له ملا فيه الخير والرشاد لقوله-  - ""وإذا استنصحك فانصح له( 38 ) ، وكذلك من مظاهر املحبة الدعاء ألخيه املؤمن بظاهر الغيب لقوله تعالى﴿ : وَالَّذِ ينَ جَ اؤُوا مِن بَعْدِ هِ مْ يَقُ ولُونَ رَبَّنَا اغْفِرْ لَنَا وَإلِ ِخْ وَانِنَا الَّذِ ينَ سَ بَقُ ونَا ٌِيمَانِ وَالَ تَجْ عَلْ فِي قُلُوبِنَا غِالًّ لِّلَّذِ ينَ آمَنُوا رَبَّنَا إِنَّكَ رَؤُ وفٌ رَّحِ يم بِاإلْ﴾ [الحشر : 10 ]. وأما النصرة للمؤمن فتكون أوالً في دينه إذا احتاج إلى مناصرة ،قال تعالى : ﴿ ِوَإِنِ اسْ تَنصَرُوكُ مْ فِي الدِّ ين َّفَعَلَيْكُ مُ النَّصْرُ إِال ٌعَلَ ى قَوْمٍ بَيْنَكُ مْ وَبَيْنَهُم مِّيثَاقٌ وَاللّهُ بِمَ ا تَعْمَلُونَ بَصِ ير﴾ [األنفال : 72 ] وكذلك تكون النصرة بإرشاده إلى طريق الحق وردعه عن طريق الباطل لقوله-  - : ""انْصُرْ أَخَ اكَ ظَاملِ ًا أَوْ مَ ظْلُومً ا ،قَالُوا : ِيَا رَسُ ولَ اللَّه ، ُهَ ذَ ا نَنْصُر ُه مَ ظْلُومً ا ، َفَكَ يْفَ نَنْصُرُهُ ظَاملِ ًا؟ قَال : ِتَأْخُ ذُ فَوْقَ يَدَ يْه( 39 ) ،وتقتض ي أيضًا الذب عن عرضه عند الوقوع في عرضه : ْ"مَن "ِذَبَّ عَنْ عِرْضِ أَخِ يه بِاملْ َغِيبِ كَانَ حَ قًّ ا عَلَ ى هللاِ عَزَّ وَجَ لَّ أَنْ يَعْتِقَ هُ مِنَ النَّار( 40 ). المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م املطلب الثاني : الوالء لألسرة والقبيلة واألسرة هي الركن األساس لبناء املجتمع ،وهي اللبنة التي يقوم عليها تكوين شخصية الفرد ، ومن ثم بناء الحضارات ،وملا لها من أثر كبير في تقرير الغاية التي خلق من أجلها اإلنسان ، فقد أعطت الشريعة اإلسالمية أهمية بارزة لألسرة ، فجعلت النصوص التي تنظم شؤون األسرة نصوصاً تفصيلية ، تعالج جميع املشكالت التي قد تؤثر على .جو األسرة من محبة وألفة وتناصر وتناصح والقرآن يبين القيمة الحقيقية لألسرة من خالل األساس الذي تقوم عليه من السكينة والطمأنينة واملودة والرحمة ،قال تعالى﴿ : َوَمِنْ آيَاتِهِ أ نْ خَ لَقَ لَكُ م مِّنْ أَنفُ سِ كُ مْ أَزْوَ اجاً لِّتَسْ كُ نُوا إِلَيْهَا وَجَ عَلَ بَيْنَكُ م مَّ وَدَّةً وَرَ حْ مَ ةً إِنَّ فِي َذَلِكَ آلَ يَاتٍ لِّقَ وْمٍ يَتَفَ كَّ رُون﴾ [الروم : 21 ] ،وكذلك يبين إن أولى الناس بالوالء بعد هللا تعالى ورسوله هما الوالدان ، وأكثر من ذك ر فضلهما( 41 ) ،ومنها قوله تعالى﴿ : َوَقَض َ ى رَب كَ أَالَّ تَعْبُدُ واْ إِالَّ إِيَّاهُ وَبِالْوَالِدَ يْنِ إِحْ سَ اناً إِمَّا يَبْلُغَنَّ عِندَ كَ الْكِ بَر ًأَحَ دُ هُ مَا أَوْ كِ الَهُ مَا فَالَ تَقُ ل لَّهُمَا أُفٍّ وَالَ تَنْهَرْهُ مَ ا وَقُل لَّهُمَا قَوْالً كَ رِيما﴾ [اإلسراء : 23 ] ، والسبب في أن هللا تعالى قرن عبادته ببر الوالدين يعود إلى أن "السبب الحقيقي لوجود اإلنسان هو تخليق هللا تعالى وإيجاده ، والسبب الظاهري هو األبوان ،فأمر بتعظيم السبب الحقيقي ، "ثم أتبعه باألمر بتعظيم السبب الظاهري( 42 ) ،وجاءت السنة النبوية مؤك دة لنصوص القرآن التي تحث على املواالة بين أفراد األسرة فقال-  - : َِهْ لِه "خَ يْرُكُ مْ خَ يْرُكُ مْ ألِ ، "َهْ لِ ي وَأَنَا مِنْ خَ يْرِكُ مْ ألِ( 43 ). ( 37 ) البخاري ، صحيح البخاري ،املصدر السابق ،كتاب املظالم والغصب ،باب : ُالَ يَظْلِمُ املُسْ لِمُ املُسْ لِمَ وَالَ يُسْ لِمُه ،ج : 3 ،ص : 128 ،رقم : 2442 . املطلب األول : .الوالء بين املؤمنين ( 36 ) البخاري ، صحيح البخاري ،كتاب اإليمان ،باب : َِخِ يهِ مَ ا يُحِ ب لِنَفْ سِ ه مِنَ اإلِيمَ انِ أَنْ يُحِ بَّ ألِ ،ج : 1 ،ص : 12 ،رقم : 13 .مسلم ، صحيح مسلم ،كتاب اإليمان ،باب :الدليل على أن من خصال اإليمان أن يحب ألخيه املسلم ما يحب لنفسه من الخير ،ج : 1ص : 67 ،رقم : 45 . ( 33 ) البخاري ، صحيح البخاري ،كتاب حديث األنبياء ، َبَابُ مَ ا ذُكِ رَ عَنْ بَنِ ي إِسْ رَائِيل ،ج :4 ،ص : 170 ،رقم : 3461 . ( 33 ) البخاري ، صحيح البخاري ،كتاب حديث األنبياء ، َبَابُ مَ ا ذُكِ رَ عَنْ بَنِ ي إِسْ رَائِيل ،ج :4 ،ص : 170 ،رقم : 3461 . ( 34 ) أبو داود ،سنن أبي داود ،ج :3 ،ص : 322 ،رقم : 3660). صححه األلباني في صحيح الجامع الصغير وزياداته ،ج :2 ،ص : 1145 ،رقم : 2309 . وي م ج ص ( 36 ) البخاري ، صحيح البخاري ،كتاب اإليمان ،باب : َِخِ يهِ مَ ا يُحِ ب لِنَفْ سِ ه مِنَ اإلِيمَ انِ أَنْ يُحِ بَّ ألِ ،ج : 1 ،ص : 12 ،رقم : 13 .مسلم ، صحيح مسلم ،كتاب اإليمان ،باب :الدليل على أن من خصال اإليمان أن يحب ألخيه املسلم ما يحب لنفسه من الخير ،ج : 1ص : 67 ،رقم : 45 . الوالء في القرآن الكريم ( 27 ) الحصان ( 27 ) الوالء في القرآن الكريم الحصان الحصان المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م ق آ فا ( 44 ) أبو حيان ،البحر املحيط في التفسير ،ج :8 ،ص : 414 . ( 45 ) البخاري ، صحيح البخاري ،مصدر سابق ،كتاب األدب ، ِبَابُ صِ لَةِ الوَالِدِ املُشْ رِك ،ج :8 ،ص :4 ،رقم : 5978 . ( (46الواحدي ،أسباب النزول ،ص : 424. رواه الحاكم في صحيحه ،قال محققه : وأصل القصة ثابت في الصحيحين وغيرهما دون ذكر .اآلية ( 47 ) البخاري ، صحيح البخاري ،مصدر سابق ،كتاب األدب ،بَابُ تُبَل الرَّحِ مُ بِبَالَلِهَا ،ج :8 ،ص :6 ،رقم : 5990 . ( 44 ) أبو حيان ،البحر املحيط في التفسير ،ج :8 ،ص : 414 . ( 45 ) البخاري ، صحيح البخاري ،مصدر سابق ،كتاب األدب ، ِبَابُ صِ لَةِ الوَالِدِ املُشْ رِك ،ج :8 ،ص :4 ،رقم : 5978 . ( (46الواحدي ،أسباب النزول ،ص : 424. رواه الحاكم في صحيحه ،قال محققه : وأصل القصة ثابت في الصحيحين وغيرهما دون ذكر .اآلية َاأ ُ المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م أما والية اآلباء لألبناء فال تختلف في جوهرها عن والية األبناء لآلباء ، وقد أوجز هللا تعالى لنا حكم والية األبناء الخارجين عن عقيدة التوحيد في قوله تعالى : ﴿ َّوَنَادَى نُوحٌ ر بَّهُ فَقَ الَ رَبِّ إِنَّ ابُنِ ي مِنْ أَهْ لِ ي وَإِنَّ وَعْدَ كَ الْ حَ ق َوَأَنتَ أَحْ كَ مُ الْ حَ اكِ مِين ﴿ 45 ﴾ ِّقَالَ يَا نُوحُ إِنَّهُ لَيْسَ مِنْ أَهْ لِكَ إِنَّهُ عَمَ لٌ غَيْرُ صَالِ حٍ فَالَ تَسْ أَلْنِ مَ ا لَيْسَ لَكَ بِهِ عِلْمٌ إِن ي َأَعِظُكَ أَن تَكُونَ مِنَ الْ جَ اهِ لِين﴾ [هود : 45 – 46 ]. ِ ِ ِ ِ﴾ وال ينفك القرآن من التحذير من والية غير هللا تعالى ، مذكراً بأن الوالء الخالص هو هلل تعالى وحده ، لا ينازعه في ذلك أحد ،قال تعالى﴿ : ِيَا أَي هَا الَّذِ ينَ آمَ نُواْ الَ تَتَّخِ ذُ واْ آبَاءكُ مْ وَإِخْ وَانَكُ مْ أَوْلِيَاء إَنِ اسْ تَحَ ب واْ الْكُ فْ رَ عَلَ ى اإل ِيمَان َوَمَ ن يَتَوَلَّهُم مِّنكُ مْ فَأُوْلَـئِكَ هُ مُ الظَّاملِ ُون﴾ [ا لتوبة : 23 ]؛ لذلك تبرأ النبي-  - من والية النسب والقرابة ، التي بنيت على أصول حمية الجاهلية األولى ،ليعلن الوالء هلل تعالى ولعباده الذين ارتض ى ،وجاء ذلك في حديث عمرو بن العاص-  - قال : "سمعت النبي-  - جهارًا غير سر يقول : " " إن آل أبى- قال عمرو في كتاب محمد ب ن جعفر بياض- ليسوا بأوليائي ،إنما وليي هللا وصالح املؤمنين ، "ولكن لهم رحم أبلها بباللها( 47 ). المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م ًولم يترك اإلسالم هذا الوالء مطلقا ،بل جعل له ضوابط تبين كيفية هذه العالقة ، فجعل الوالء بين االبن ًووالديه يقوم أساسا على سالمة العقيدة؛ ولكن إذا تعذر ذلك أبقى على والء املحبة دون النصرة امتثاالً ألمر هللا تعالى﴿ : ًوَإِن جَ اهَ دَ اكَ عَلى أَن تُشْ رِكَ بِي مَ ا لَيْسَ لَكَ بِهِ عِلْمٌ فَالَ تُطِ عْهُمَ ا وَصَاحِ بْهُمَ ا فِي الد نْيَا مَ عْرُوفا ْوَاتَّبِعْ سَ بِيلَ مَن ِأَنَابَ إ َلَيَّ ثُمَّ إِلَيَّ مَ رْجِ عُكُ مْ فَأُنَبِّئُكُ م بِمَ ا كُ نتُمْ تَعْمَ لُون﴾ [لقمان : 15 ] ، واملصاحبة في الدنيا تعني البر فيما أمر هللا تعالى ( 37 ) البخاري ، صحيح البخاري ،املصدر السابق ،كتاب املظالم والغصب ،باب : ُالَ يَظْلِمُ املُسْ لِمُ املُسْ لِمَ وَالَ يُسْ لِمُه ،ج : 3 ،ص : 128 ،رقم : 2442 . ( 38 ) مسلم ،صحيح مسلم ،املصدر السابق ،كتاب السالم ،باب من حق املسلم للمسلم رد السالم ،ج :4 ،ص : 1704 رقم : 2162 . ( 39 ) البخاري ، صحيح البخاري ،املصدر سابق ،كتاب املظالم والغصب ،بَاب :أَعِنْ أَخَ اكَ ظَاملِ ًا أَوْ مَ ظْلُومً ا ،ج :3 ،ص : 128 ،رقم : 2443 . ( 40 ) الطبراني ،املعجم الكبير ،مسند النساء ،باب :األلف : ِأَسْ مَ اءُ بِنْتُ يَزِيدَ بْنِ السَّ كَ نِ األْ َنْصَارِيَّة ،ج : 24 ،ص : 176 ،رقم : 443 . صححه األلباني في صحيح الجامع الصغير وزياداته ،ج :2 ،ص : 1071 ،رقم : 6240 . ( 43 ) ابن حبان (املتوفى : 354 )هـ ،صحيح ابن حبان بترتيب ابن بلبان ،ج : 9 ،ص : 401 ،رقم : 4186 . صححه األلباني في سلسلة األحاديث الصحيحة وش يء من فقهها وفوائدها ،ج :1 ،ص : 575 ،رقم : 285 . الوالء في القرآن الكريم الوالء في القرآن الكريم الحصان الحصان ( 28 ) المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م لهما "وهو إطعامهما وكسوتهما وعدم جفائهما وانتهارهما ،وعيادتهما إذا مرضا ، "ومواراتهما إذا ماتا( 44 ) ، وقد ورد في الحديث الصحيح أن أسماء بنت أبي بكر قالت :"أتتني أمي راغبة ،في عهد النبي-  - ،فسألت النبي - :آصلها؟ قال : "نعم( 45 ). المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م والوالء للقبيلة والعشيرة ضرورة ال غنى عنها ، تأبى املروءة أن تتنصل منها وها هم قوم شعيب عزّ عليهم قومهم من التعرض له ،قال تعالى﴿ : قَالُواْ يَا شُ عَيْبُ مَ ا َنَفْ قَ هُ كَ ثِيراً مِّمَّ ا تَقُ ولُ وَإِنَّا لَنَرَاكَ فِينَا ضَعِيفاً وَلَوْالَ رَهْ طُك ٍلَرَجَ مْ نَاكَ وَمَا أَنتَ عَلَيْنَا بِعَزِيز﴾ [هود : 91 ] ، وكذلك انحياز بنو هاشم مسلمهم وكافرهم مع النبي وأبي طالب في شعب مكة بعد محاصرة اهل مكة لهم ،فأحق الناس بمحبة ون صرة الرجل هم قومه؛ لذلك كان األمر اإللهي للنبي-  - أن يبدأ دعوته بقومه ،قال تعالى﴿ : َوَأَنذِ رْ عَشِ يرَتَكَ األْ َقْرَبِين﴾ [الشعراء : 214 ] ،فقد روى أبو هريرة-  - أنه ملا نزلت هذه اآلية ، قال رسول هللا-  - :"يا معشر قريش ،اشتروا أنفسكم من هللا ،ال أغني عنكم من هللا شيئا ، يا بني عبد وال ينفك القرآن من التحذير من والية غير هللا تعالى ، مذكراً بأن الوالء الخالص هو هلل تعالى وحده ، لا ينازعه في ذلك أحد ،قال تعالى﴿ : ِيَا أَي هَا الَّذِ ينَ آمَ نُواْ الَ تَتَّخِ ذُ واْ آبَاءكُ مْ وَإِخْ وَانَكُ مْ أَوْلِيَاء إَنِ اسْ تَحَ ب واْ الْكُ فْ رَ عَلَ ى اإل ِيمَان َوَمَ ن يَتَوَلَّهُم مِّنكُ مْ فَأُوْلَـئِكَ هُ مُ الظَّاملِ ُون﴾ [ا لتوبة : 23 ]؛ لذلك تبرأ النبي-  - من والية النسب والقرابة ، التي بنيت على أصول حمية الجاهلية األولى ،ليعلن الوالء هلل تعالى ولعباده الذين ارتض ى ،وجاء ذلك في حديث عمرو بن العاص-  - قال : "سمعت النبي-  - جهارًا غير سر يقول : " " إن آل أبى- قال عمرو في كتاب محمد ب ن جعفر بياض- ليسوا بأوليائي ،إنما وليي هللا وصالح املؤمنين ، "ولكن لهم رحم أبلها بباللها( 47 ). المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م أمّ ا إذا ترتب على اختالف العقيدة العداوة هلل ولرسوله وللمسلمين ،فعندئذٍ تحرم املوالة لقوله تعالى : ﴿ إِنَّمَا ْيَنْهَاكُ مُ اللَّهُ عَنِ الَّذِ ينَ قَاتَلُوكُ مْ فِي الدِّ ينِ وَأَخْ رَجُ وكُ مْ مِنْ دِ يَارِكُ مْ وَظَاهَ رُوا عَلَ ى إِخْ رَاجِ كُ م ْأَنْ تَوَلَّوْهُ مْ وَمَنْ يَتَوَلَّهُم َفَأُولَئِكَ هُ مُ الظَّاملِ ُون﴾[املمتحنة :9] وال شك أن اإلسالم ما جاء ليقطع وشائج األرحام والقرابة ، بل دعا إلى املحافظة عليها وإن اختلفت العقيدة مالم يتبع ذلك عداوة هللا تعالى ولرسوله وللمسلمين ،فقال تعالى : ﴿ ْالَ يَنْهَاكُ مُ اللَّهُ عَنِ الَّذِ ينَ لَمْ يُقَ اتِلُوكُ مْ فِي الدِّ ينِ وَلَم َيُخْ رِجُ وكُ مْ مِنْ دِ يَارِكُ مْ أَنْ تَبَر وهُ مْ وَتُقْ سِ طُوا إِلَيْهِمْ إِنَّ اللَّهَ يُحِ ب املْ ُقْ سِ طِ ين﴾ [املمتحنة : 8] ، فعن عامر بن عبد هللا بن الزبير ،عن أبي ه قال :" قدمت قتيلة بنت عبد العزى على ابنتها أسماء بنت أبي بكر بهدايا :ضباب وسمن وأقط ، فلم تقبل هداياها ولم تدخلها منزلها ، فسألت لها عائشة النبي- صلى هللا عليه وسلم- عن ذلك ،فقال﴿ : ال ينهاكم هللا عن الذين لم يقاتلوكم في الدين﴾ اآلية. فأدخلتها منزلها وقبل"ت منها هداياها( 46 ) . أمّ ا إذا ترتب على اختالف العقيدة العداوة هلل ولرسوله وللمسلمين ،فعندئذٍ تحرم املوالة لقوله تعالى : ﴿ إِنَّمَا ْيَنْهَاكُ مُ اللَّهُ عَنِ الَّذِ ينَ قَاتَلُوكُ مْ فِي الدِّ ينِ وَأَخْ رَجُ وكُ مْ مِنْ دِ يَارِكُ مْ وَظَاهَ رُوا عَلَ ى إِخْ رَاجِ كُ م ْأَنْ تَوَلَّوْهُ مْ وَمَنْ يَتَوَلَّهُم َفَأُولَئِكَ هُ مُ الظَّاملِ ُون﴾[املمتحنة :9] أما والية اآلباء لألبناء فال تختلف في جوهرها عن والية األبناء لآلباء ، وقد أوجز هللا تعالى لنا حكم والية األبناء الخارجين عن عقيدة التوحيد في قوله تعالى : ﴿ َّوَنَادَى نُوحٌ ر بَّهُ فَقَ الَ رَبِّ إِنَّ ابُنِ ي مِنْ أَهْ لِ ي وَإِنَّ وَعْدَ كَ الْ حَ ق َوَأَنتَ أَحْ كَ مُ الْ حَ اكِ مِين ﴿ 45 ﴾ ِّقَالَ يَا نُوحُ إِنَّهُ لَيْسَ مِنْ أَهْ لِكَ إِنَّهُ عَمَ لٌ غَيْرُ صَالِ حٍ فَالَ تَسْ أَلْنِ مَ ا لَيْسَ لَكَ بِهِ عِلْمٌ إِن ي َأَعِظُكَ أَن تَكُونَ مِنَ الْ جَ اهِ لِين﴾ [هود : 45 – 46 ]. المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م لهما "وهو إطعامهما وكسوتهما وعدم جفائهما وانتهارهما ،وعيادتهما إذا مرضا ، "ومواراتهما إذا ماتا( 44 ) ، وقد ورد في الحديث الصحيح أن أسماء بنت أبي بكر قالت :"أتتني أمي راغبة ،في عهد النبي-  - ،فسألت النبي - :آصلها؟ قال : "نعم( 45 ). وال شك أن اإلسالم ما جاء ليقطع وشائج األرحام والقرابة ، بل دعا إلى املحافظة عليها وإن اختلفت العقيدة مالم يتبع ذلك عداوة هللا تعالى ولرسوله وللمسلمين ،فقال تعالى : ﴿ ْالَ يَنْهَاكُ مُ اللَّهُ عَنِ الَّذِ ينَ لَمْ يُقَ اتِلُوكُ مْ فِي الدِّ ينِ وَلَم َيُخْ رِجُ وكُ مْ مِنْ دِ يَارِكُ مْ أَنْ تَبَر وهُ مْ وَتُقْ سِ طُوا إِلَيْهِمْ إِنَّ اللَّهَ يُحِ ب املْ ُقْ سِ طِ ين﴾ [املمتحنة : 8] ، فعن عامر بن عبد هللا بن الزبير ،عن أبي ه قال :" قدمت قتيلة بنت عبد العزى على ابنتها أسماء بنت أبي بكر بهدايا :ضباب وسمن وأقط ، فلم تقبل هداياها ولم تدخلها منزلها ، فسألت لها عائشة النبي- صلى هللا عليه وسلم- عن ذلك ،فقال﴿ : ال ينهاكم هللا عن الذين لم يقاتلوكم في الدين﴾ اآلية. فأدخلتها منزلها وقبل"ت منها هداياها( 46 ) . َ وال شك أن اإلسالم ما جاء ليقطع وشائج األرحام والقرابة ، بل دعا إلى املحافظة عليها وإن اختلفت العقيدة مالم يتبع ذلك عداوة هللا تعالى ولرسوله وللمسلمين ،فقال تعالى : ﴿ ْالَ يَنْهَاكُ مُ اللَّهُ عَنِ الَّذِ ينَ لَمْ يُقَ اتِلُوكُ مْ فِي الدِّ ينِ وَلَم َيُخْ رِجُ وكُ مْ مِنْ دِ يَارِكُ مْ أَنْ تَبَر وهُ مْ وَتُقْ سِ طُوا إِلَيْهِمْ إِنَّ اللَّهَ يُحِ ب املْ ُقْ سِ طِ ين﴾ [املمتحنة : 8] ، فعن عامر بن عبد هللا بن الزبير ،عن أبي ه قال :" قدمت قتيلة بنت عبد العزى على ابنتها أسماء بنت أبي بكر بهدايا :ضباب وسمن وأقط ، فلم تقبل هداياها ولم تدخلها منزلها ، فسألت لها عائشة النبي- صلى هللا عليه وسلم- عن ذلك ،فقال﴿ : ال ينهاكم هللا عن الذين لم يقاتلوكم في الدين﴾ اآلية. فأدخلتها منزلها وقبل"ت منها هداياها( 46 ) . املطلب الثالث : الوالء لولي األمر أم ي يم وجعل اإلسالم للعالقة بين الحاكم واملحكوم ضوابط منها :ال طاعة مطلقة إال هلل تعالى ، فطاعة والة األمر مرتبطة بطاعتهم هلل تعالى ،لقوله-  - :"ال طاعة ملخلوق في معصية هللا عز وجل"( 52 ) ،فمن أطاع هللا تعا لى وجبت طاعته ومن عصاه فال سمع وال طاعة له ،ومن األدلة على وجوب طاعة والة األمر في غير معصية ،قوله-  - : "من أطاعني فقد أطاع هللا ،ومن عصاني فقد عص ى هللا ،ومن أطاع أميري فقد أطاعني ، "ومن عص ى أميري فقد عصاني( 53 ). 53 ) ومن هذه الضوابط أيضًا عدم الخروج على والة األم ر إال إذا ظهر منهم الكفر الصريح ، ويخرج من ذلك تقصيرهم في بعض األمور التي ال حول لهم بها وال قوة ،لقوله-  - : ُ"وَأَنْ الَ نُنَازِعَ األَمْ رَ أَهْ لَه ،إِالَّ أَنْ تَرَوْ ا كُ فْ رًا بَوَاحً ا ، " ٌعِنْدَ كُ مْ مِنَ اللَّهِ فِيهِ بُرْهَ ان( 54 ). ولهم حق النصيحة بالحسنى ،فالحاكم يحتاج إلى من يعينه في الحق ،ال من يزين له الباطل ، فإذا سكت الناس عن النصيحة تركوا الحكام للبطانة الفاسدة، ًيعيثون في األمة فسادا،والنصيحة لهم واجبة لحديث تميم ومن هذه الضوابط أيضًا عدم الخروج على والة األم ر إال إذا ظهر منهم الكفر الصريح ، ويخرج من ذلك تقصيرهم في بعض األمور التي ال حول لهم بها وال قوة ،لقوله-  - : ُ"وَأَنْ الَ نُنَازِعَ األَمْ رَ أَهْ لَه ،إِالَّ أَنْ تَرَوْ ا كُ فْ رًا بَوَاحً ا ، " ٌعِنْدَ كُ مْ مِنَ اللَّهِ فِيهِ بُرْهَ ان( 54 ). أاا تقصيرهم في بعض األمور التي ال حول لهم بها وال قوة ،لقوله-  - : ُ"وَأَنْ الَ نُنَازِعَ األَمْ رَ أَهْ لَه ،إِالَّ أَنْ تَرَوْ ا كُ فْ رًا بَوَاحً ا ، " ٌعِنْدَ كُ مْ مِنَ اللَّهِ فِيهِ بُرْهَ ان( 54 ). ولهم حق النصيحة بالحسنى ،فالحاكم يحتاج إلى من يعينه في الحق ،ال من يزين له الباطل ، فإذا سكت الناس عن النصيحة تركوا الحكام للبطانة الفاسدة ، ًيعيثون في األمة فسادا ، والنصيحة لهم واجبة لحديث تميم الداري أن النبي-  - قال :"الدين النصيحة ،قلنا :ملن؟ قال :هلل ولكتابه ولرسوله وألئمة امل"سلمين وعامتهم( 55 ) . المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م املطلب ،ال أغني عنكم من هللا شيئا ،يا عباس بن عبد املطلب ،ال أغني عنك من هللا شيئا ،يا صفية عمة رسول هللا ، ال أغني عنك من هللا شيئا ،يا فاطمة بنت رسول هللا ، "سليني بما شئت ال أغني عنك من هللا شيئا( 48 ). كذلك نصرتهم في كل عمل يدعو إلى الفضيلة وينهى عن الرذيلة كما نصر النبي-  - قبيلته قريش في حلف الفضول ،الذي يدعوا إلى نصرة املظلوم وردع الظالم فقال-  - : "لقد شهدت في دار عبد هللا بن جدعان حلفا ما "أحب أن لي به حمر النعم ولو أدعى به في اإلسالم ألجبت( 49 ) ،هكذا تكون نصرة القبيلة أن ترتقي بها ف ي معالي األخالق والفضيلة ،واالبتعاد عن عصبية الجاهلية املقيتة قال-  - :"قد أذهب هللا عنكم عُبيّة الجاهلية وفخرَها باآلباء ، ّمؤمن تقي ، ّوفاجر شقي ، "والناس بنو آدم وآدم من تراب( 50 ). ( 48 ) مسلم ،صحيح مسلم ،كتاب اإليمان ،باب في قوله تعالى :{وأنذر عشيرتك األقربين} [الشعراء : 214 ] ،ج :1 ،ص : 192 ،رقم : 206 . ( 49 ) ابن هشام ،السيرة النبوية البن هشام ،ج :1 ،ص : 134 . ( 50 ) الترمذي ،سنن الترمذي ،أبواب املناقب ،باب ،ج :5 ،ص : 735 ،رقم : 3956 . ( 51 ) ابن عاشور ،التحرير والتنوير ،ج : 5 ،ص : 96 . ( 52 ) ابن حنبل ،مسند اإلمام أحمد بن حنبل ،مصدر سابق ،مسند علي بن أبي طالب ،ج :2 ،ص : 67 ،رقم : 1094 . ( 53 ) البخاري ، صحيح البخاري ،مصدر سابق ،كتاب األحكام ،باب :بَابُ قَوْلِ اللَّهِ تَعَالَى و }ْ{أَطِ يعُوا اللَّهَ وَأَطِ يعُوا الرَّسُ ولَ وَأُولِي األَمْ رِ مِنْكُ م [النساء : 59 ] ،ج :9 ،ص : 61 ،رقم : 7137 . ( 54 ) البخاري ،املصدر السابق ،كتاب الفتن ،باب : ِّبَابُ قَوْلِ النَّبِ ي ﷺ :« َسَ تَرَ وْ ن بَعْدِ ي أُمُ ورً ا تُنْكِ رُونَهَا» ،ج :9 ،ص : 47 ،رقم : 7056 . ( 55 ) مسلم ،صحيح مسلم ،مصدر سابق ،كتاب اإليمان ،باب بيان أن الدين النصيحة ،ج1 ،ص74 ،رقم : 55 . المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م والوالء للقبيلة والعشيرة ضرورة ال غنى عنها ، تأبى املروءة أن تتنصل منها وها هم قوم شعيب عزّ عليهم قومهم من التعرض له ،قال تعالى﴿ : قَالُواْ يَا شُ عَيْبُ مَ ا َنَفْ قَ هُ كَ ثِيراً مِّمَّ ا تَقُ ولُ وَإِنَّا لَنَرَاكَ فِينَا ضَعِيفاً وَلَوْالَ رَهْ طُك ٍلَرَجَ مْ نَاكَ وَمَا أَنتَ عَلَيْنَا بِعَزِيز﴾ [هود : 91 ] ، وكذلك انحياز بنو هاشم مسلمهم وكافرهم مع النبي وأبي طالب في شعب مكة بعد محاصرة اهل مكة لهم ،فأحق الناس بمحبة ون صرة الرجل هم قومه؛ لذلك كان األمر اإللهي للنبي-  - أن يبدأ دعوته بقومه ،قال تعالى﴿ : َوَأَنذِ رْ عَشِ يرَتَكَ األْ َقْرَبِين﴾ [الشعراء : 214 ] ،فقد روى أبو هريرة-  - أنه ملا نزلت هذه اآلية ، قال رسول هللا-  - :"يا معشر قريش ،اشتروا أنفسكم من هللا ،ال أغني عنكم من هللا شيئا ، يا بني عبد ( 29 ) الوالء في القرآن الكريم الوالء في القرآن الكريم الحصان املطلب الثالث : الوالء لولي األمر مأ يا ومن صور الوالء التي أشار إليها القرآن ،الوال ء لولي األمر لقوله تعالى﴿ : َيَا أَي هَا الَّذِ ينَ آمَ نُواْ أَطِ يعُواْ اللّه ُوَأَطِ يعُواْ الرَّسُ ولَ وَأُوْ لِي األَمْ رِ مِنكُ مْ فَإِن تَنَازَعْتُمْ فِي ش َ يْءٍ فَرُد وهُ إِلَى اللّهِ وَالرَّسُ ولِ إِن ك ِنتُمْ تُؤْمِنُونَ بِاللّهِ وَالْيَوْمِ اآلخِ ر َذَلِك ًخَ يْرٌ وَأَحْ سَ نُ تَأْوِيال﴾ [النساء : 59 ] ،وطاعة ولي األمر واجبة مالم يحكم بغير ما أنزل هللا تعالى ، فإذا ما أقام حكم الله ، وأقام العدل فله حق الطاعة "فطاعة الرسول تشتمل على احترام العدل املشرع لهم وعلى تنفيذه ، وطاعة والة األمور تنفيذ للعدل ، وأشار بهذا"التعقيب إلى أن الطاعة املأمور بها هي الطاعة في املعروف( 51 ). مأا ومن صور الوالء التي أشار إليها القرآن ،الوال ء لولي األمر لقوله تعالى﴿ : َيَا أَي هَا الَّذِ ينَ آمَ نُواْ أَطِ يعُواْ اللّه ُوَأَطِ يعُواْ الرَّسُ ولَ وَأُوْ لِي األَمْ رِ مِنكُ مْ فَإِن تَنَازَعْتُمْ فِي ش َ يْءٍ فَرُد وهُ إِلَى اللّهِ وَالرَّسُ ولِ إِن ك ِنتُمْ تُؤْمِنُونَ بِاللّهِ وَالْيَوْمِ اآلخِ ر َذَلِك ًخَ يْرٌ وَأَحْ سَ نُ تَأْوِيال﴾ [النساء : 59 ] ،وطاعة ولي األمر واجبة مالم يحكم بغير ما أنزل هللا تعالى ، فإذا ما أقام حكم الله ، وأقام العدل فله حق الطاعة "فطاعة الرسول تشتمل على احترام العدل املشرع لهم وعلى تنفيذه ، وطاعة والة األمور تنفيذ للعدل ، وأشار بهذا"التعقيب إلى أن الطاعة املأمور بها هي الطاعة في املعروف( 51 ). وجعل اإلسالم للعالقة بين الحاكم واملحكوم ضوابط منها :ال طاعة مطلقة إال هلل تعالى ، فطاعة والة األمر مرتبطة بطاعتهم هلل تعالى ،لقوله-  - :"ال طاعة ملخلوق في معصية هللا عز وجل"( 52 ) ،فمن أطاع هللا تعا لى وجبت طاعته ومن عصاه فال سمع وال طاعة له ،ومن األدلة على وجوب طاعة والة األمر في غير معصية ،قوله-  - : "من أطاعني فقد أطاع هللا ،ومن عصاني فقد عص ى هللا ،ومن أطاع أميري فقد أطاعني ، "ومن عص ى أميري فقد عصاني( 53 ). ا ( 50 ) الترمذي ،سنن الترمذي ،أبواب املناقب ،باب ،ج :5 ،ص : 735 ،رقم : 3956 . ( 48 ) مسلم ،صحيح مسلم ،كتاب اإليمان ،باب في قوله تعالى :{وأنذر عشيرتك األقربين} [الشعراء : 214 ] ،ج :1 ،ص : 192 ،رقم : 206 . ( 49 ) ابن هشام ،السيرة النبوية البن هشام ،ج :1 ،ص : 134 . ( 56 ) قطب ،في ظالل القرآن ،مرجع سابق ،ج :2 ،ص : 909 . ( (57 الطبري ،جامع البيان في تأويل القرآن ،ج : 20 ،ص : 439 . املطلب الثالث : الوالء لولي األمر ولهم حق النصيحة بالحسنى ،فالحاكم يحتاج إلى من يعينه في الحق ،ال من يزين له الباطل ، فإذا سكت الناس عن النصيحة تركوا الحكام للبطانة الفاسدة ، ًيعيثون في األمة فسادا ، والنصيحة لهم واجبة لحديث تميم الداري أن النبي-  - قال :"الدين النصيحة ،قلنا :ملن؟ قال :هلل ولكتابه ولرسوله وألئمة امل"سلمين وعامتهم( 55 ) . ( 48 ) مسلم ،صحيح مسلم ،كتاب اإليمان ،باب في قوله تعالى :{وأنذر عشيرتك األقربين} [الشعراء : 214 ] ،ج :1 ،ص : 192 ،رقم : 206 . ( 49 ) ابن هشام ،السيرة النبوية البن هشام ،ج :1 ،ص : 134 . ا ( 50 ) الترمذي ،سنن الترمذي ،أبواب املناقب ،باب ،ج :5 ،ص : 735 ،رقم : 3956 . إ ( 53 ) البخاري ، صحيح البخاري ،مصدر سابق ،كتاب األحكام ،باب :بَابُ قَوْلِ اللَّهِ تَعَالَى و }ْ{أَطِ يعُوا اللَّهَ وَأَطِ يعُوا الرَّسُ ولَ وَأُولِي األَمْ رِ مِنْكُ م [النساء : 59 ] ،ج :9 ،ص : 61 ،رقم : 7137 . َ ( 54 ) البخاري ،املصدر السابق ،كتاب الفتن ،باب : ِّبَابُ قَوْلِ النَّبِ ي ﷺ :« َسَ تَرَ وْ ن بَعْدِ ي أُمُ ورً ا تُنْكِ رُونَهَا» ،ج :9 ،ص : 47 ،رقم : 7056 . ( 55 ) مسلم ،صحيح مسلم ،مصدر سابق ،كتاب اإليمان ،باب بيان أن الدين النصيحة ،ج1 ،ص74 ،رقم : 55 . ( 30 ) الوالء في القرآن الكريم الحصان الحصان المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م املطلب الرابع :الوالء املحرم مما وهذا الوالء محرم قطعاً ألنه يخرج صاحبه من امللة ، ملخالفته النهي الصريح بعدم مواالة أعداء هللا تعالى ومن هؤالء : ََ وهذا الوالء محرم قطعاً ألنه يخرج صاحبه من امللة ، ملخالفته النهي الصريح بعدم مواالة أعداء هللا تعالى ومن هؤالء : ََ ومن هؤالء : أوالا :الكافرين وعلى رأسهم اليهود والنصارى لقوله تعالى في حق الكافرين﴿ : َيَا أَي هَا الَّذِ ين ْآمَ نُواْ الَ تَتَّخِ ذُ وا ًالْكَافِرِينَ أَوْلِيَاء مِن دُونِ املْ ُؤْمِنِينَ أَتُرِيدُ ونَ أَن تَجْ عَلُواْ لِلّهِ عَلَيْكُ مْ سُ لْطَاناً م بِينا﴾ [النساء : 144 ] ، وهنا النهي صريح عن مواالة الكافرين ،لكن ما املقصود باملواالة هنا؟ هل هي مواالتهم في دينهم؟ أم ف ي محبتهم ومناصرتهم؟ يقول قطب : "إنها تعني التناصر والتحالف معهم ،وال تتعلق بمعنى اتباعهم في دينهم ، فبعيد جدً ا أن يكون بين املسلمين من يميل إلى اتباع اليهود والنصارى في الدين ، "إنما هو والء التحالف والتناصر( 56 ). وقد بين هللا تعالى أن ال مواالة للكافرين ومنهم اليهود والنصارى ،إنما مواالتهم بينهم ، وقد حذّ ر من عدم االنتهاء عن ذلك بأن عواقبه وخيمة ،قال تعالى﴿ : ِوَالَّذينَ كَ فَ رُواْ بَعْضُهُمْ أَوْلِيَاء بَعْضٍ إِالَّ تَفْ عَلُوهُ تَكُ ن فِتْنَةٌ فِي األَرْض ٌوَفَسَ ادٌ كَ بِير﴾[األنفال : 73 ] ، وقد رأينا كيف عمّ الفساد وحلّ الخراب في البالد والعباد بعد أن تحالف املسلمون مع أعداء هللا تعالى ،فأصبحت األمة ممسوخة الهوية ،ليس لها مهابة وال مكانة بين األمم ، وأي فسادٍ اكثر من ذلك! وقد أبيحت الدماء وانتهكت األعراض ، حتى أصبحنا منهم في عدم االحساس والشعور ،أصبحنا نحن األدوات التي يستخدمونها في هدم الدين ،قال تعالى﴿ : ٍيَا أَي هَا الَّذِ ينَ آمَ نُواْ الَ تَتَّخِ ذُ واْ الْيَهُودَ وَالنَّصَارَى أَوْلِيَاء بَعْضُهُمْ أَوْلِيَاء بَعْض َوَمَ ن يَتَوَلَّهُم مِّنكُ مْ فَإِنَّهُ مِنْهُمْ إِنَّ اللّهَ الَ يَهْدِ ي الْقَ وْمَ الظَّاملِِين﴾ [املائد ة : 51 ]. ويخرج من هذا التحريم ما كان على سبيل التعايش السلمي مع املسالم من اليهود والنصارى وغيرهم لقوله تعالى﴿ : ْالَ يَنْهَاكُ مُ اللَّهُ عَنِ الَّذِ ينَ لَمْ يُقَ اتِلُوكُ مْ فِي الدِّ ينِ وَلَمْ يُخْ رِجُ وكُ م مِّن دِ يَارِكُ مْ أَن تَبَر وهُ م ْوَتُقْ سِ طُوا إِلَي َهِمْ إِنَّ اللَّه َيُحِ ب املْ ُقْ سِ طِ ين﴾ [املمتحنة :8]. ثانياا : الوالء للشيطان ا جاء التحذير من مواالة الشيطان بصورة أعظم من األمر بعدم مواالته ، فقد عبّر هللا تعالى بطريقة أخرى وهي بيان أن الشيطان عدو ، ًثم األمر باتخاذه عدوا ،قال تعالى﴿ : َإِنَّ الشَّ يْطَان لَكُ مْ عَدُ وٌّ فَاتَّخِ ذُ وهُ عَدُ وّاً إِنَّمَ ا يَدْ عُو ِحِ زْبَهُ لِيَكُونُوا مِنْ أَصْ حَ ابِ السَّ عِير﴾ [فاطر : 6] ، أي "فأنزلوه من أنفسكم منزلة العدو منكم واحذروه بطاعة هللا واستغشاشكم إياه حذركم من عدوكم الذي تخافون غائلته على أنفسكم ، فال تطيعوه وال تتبعو ا خطواته ، فإنه إنما يدعو حزبه إلى طاعته والقبول منه ، )ِوالكفر باهلل (لِيَكُونُوا مِنْ أَصْ حَ ابِ السَّ عِير"( 57 ). ثم بعد هذه العداوة كان من يتخذ الشياطين أولياء من الخاسرين قال تعالى﴿ : وَمَ ن يَتَّخِ ذِ الشَّ يْطَانَ وَلِيّاً مِّن ْدُونِ اللّهِ فَقَ دْ خَ سِ رَ خُ س ًرَاناً م بِينا﴾ [النساء : 119 ] ،ووصف هللا تعالى أنصار الشيطان وأوليائه بعدم اإليمان ، فقال تعالى﴾ : َإِنَّا جَ عَلْنَا الشَّ يَاطِ ينَ أَوْلِيَاء لِلَّذِ ينَ الَ يُؤْمِنُون﴾ [األعراف : 27 ] ، أي ال يمكن أن تكون هنالك والية بين مؤمن وشيطان ، وملا كانوا غير مؤمنين فقد حقت عليهم الضاللة ،قال تعالى﴿ : ُفَرِيقاً هَ دَ ى وَفَرِيقاً حَ قَّ عَلَيْهِمُ الضَّالَلَةُ إِنَّهُم َاتَّخَ ذُ وا الشَّ يَاطِ ينَ أَوْلِيَاء مِن دُونِ اللّهِ وَيَحْ سَ بُونَ أَنَّهُم م هْتَدُ ون﴾ [األعراف : 30 ] ، واآليات التي تحذر من مواالة الكافرين واليهود والن صارى والشياطين كثيرة ،لذا اكتفيت بما يؤدي الغرض منها. ا جاء التحذير من مواالة الشيطان بصورة أعظم من األمر بعدم مواالته ، فقد عبّر هللا تعالى بطريقة أخرى وهي بيان أن الشيطان عدو ، ًثم األمر باتخاذه عدوا ،قال تعالى﴿ : َإِنَّ الشَّ يْطَان لَكُ مْ عَدُ وٌّ فَاتَّخِ ذُ وهُ عَدُ وّاً إِنَّمَ ا يَدْ عُو ِحِ زْبَهُ لِيَكُونُوا مِنْ أَصْ حَ ابِ السَّ عِير﴾ [فاطر : 6] ، أي "فأنزلوه من أنفسكم منزلة العدو منكم واحذروه بطاعة هللا واستغشاشكم إياه حذركم من عدوكم الذي تخافون غائلته على أنفسكم ، فال تطيعوه وال تتبعو ا خطواته ، فإنه إنما يدعو حزبه إلى طاعته والقبول منه ، )ِوالكفر باهلل (لِيَكُونُوا مِنْ أَصْ حَ ابِ السَّ عِير"( 57 ). ال خاتمة : الحمد هلل والصالة والسالم على رسول هللا ،وبعد : فقد اكتملت دراستي عن موضوع الوالء في القرآن الكريم ، وقد حاولت قدر استطاعتي أن اجتهد في الوصول إلى املعاني املرادة من ذكر هذا املوضوع في القرآن ، ويبقى هذا الجهد من اجتهادات البشر وقد يعتريه ما يعتريه من القصور ،فما فيه من خطأ او قصور فمن نفس ي والشيطان ، .واستغفره تعالى على ذلك الحمد هلل والصالة والسالم على رسول هللا ،وبعد : فقد اكتملت دراستي عن موضوع الوالء في القرآن الكريم ، وقد حاولت قدر استطاعتي أن اجتهد في الوصول إلى املعاني املرادة من ذكر هذا املوضوع في القرآن ، ويبقى هذا الجهد من اجتهادات البشر وقد يعتريه ما يعتريه من القصور ،فما فيه من خطأ او قصور فمن نفس ي والشيطان ، .واستغفره تعالى على ذلك وبعد هذه الدراسة أرى أن أذكر بعض النتائج التي توصلت إليها الدراسة : 1- جاءت مادة (ول ي ) في القرآن في عدة معانٍ منها املحبة والنص رة ،والوريث والقريب ، .وكذلك األرباب واألصنام 2- بينت الدراسة أن الوالء بمعناه االصطالحي يختلف عن التعايش السلمي الذي أقره اإلسالم للتعامل مع غير املسلم املسالم 3- .أن الوالء بمعناه املطلق ال يكون إال هلل تعالى 4- أن مواالة النبي ال تكون إال باتباع ما جاء به والنتهاء عما نهى عنه 5- .بينت الدراسة أن مواالة املسلمين ال تكون إال فيما بينهم 6- تحريم مواالة أعداء اإلسالم وبعد هذه الدراسة أرى أن أذكر بعض النتائج التي توصلت إليها الدراسة : 1- جاءت مادة (ول ي ) في القرآن في عدة معانٍ منها املحبة والنص رة ،والوريث والقريب ، .وكذلك األرباب واألصنام 2- بينت الدراسة أن الوالء بمعناه االصطالحي يختلف عن التعايش السلمي الذي أقره اإلسالم للتعامل مع غير املسلم املسالم 3- .أن الوالء بمعناه املطلق ال يكون إال هلل تعالى 4- أن مواالة النبي ال تكون إال باتباع ما جاء به والنتهاء عما نهى عنه 5- .بينت الدراسة أن مواالة املسلمين ال تكون إال فيما بينهم 6- تحريم مواالة أعداء اإلسالم غير املسلم املسالم 3- .أن الوالء بمعناه املطلق ال يكون إال هلل تعالى 4- أن مواالة النبي ال تكون إال باتباع ما جاء به والنتهاء عما نهى عنه 5- .بينت الدراسة أن مواالة املسلمين ال تكون إال فيما بينهم 6- تحريم مواالة أعداء اإلسالم 6- تحريم مواالة أعداء اإلسالم ثانياا : الوالء للشيطان ََ جاء التحذير من مواالة الشيطان بصورة أعظم من األمر بعدم مواالته ، فقد عبّر هللا تعالى بطريقة أخرى وهي بيان أن الشيطان عدو ، ًثم األمر باتخاذه عدوا ،قال تعالى﴿ : َإِنَّ الشَّ يْطَان لَكُ مْ عَدُ وٌّ فَاتَّخِ ذُ وهُ عَدُ وّاً إِنَّمَ ا يَدْ عُو ِحِ زْبَهُ لِيَكُونُوا مِنْ أَصْ حَ ابِ السَّ عِير﴾ [فاطر : 6] ، أي "فأنزلوه من أنفسكم منزلة العدو منكم واحذروه بطاعة هللا واستغشاشكم إياه حذركم من عدوكم الذي تخافون غائلته على أنفسكم ، فال تطيعوه وال تتبعو ا خطواته ، فإنه إنما يدعو حزبه إلى طاعته والقبول منه ، )ِوالكفر باهلل (لِيَكُونُوا مِنْ أَصْ حَ ابِ السَّ عِير"( 57 ). ثم بعد هذه العداوة كان من يتخذ الشياطين أولياء من الخاسرين قال تعالى﴿ : وَمَ ن يَتَّخِ ذِ الشَّ يْطَانَ وَلِيّاً مِّن ْدُونِ اللّهِ فَقَ دْ خَ سِ رَ خُ س ًرَاناً م بِينا﴾ [النساء : 119 ] ،ووصف هللا تعالى أنصار الشيطان وأوليائه بعدم اإليمان ، َََفقال و بول و زب إ ى ي)ِِير هل(ِي وو ِن ص بِ رب و ثم بعد هذه العداوة كان من يتخذ الشياطين أولياء من الخاسرين قال تعالى﴿ : وَمَ ن يَتَّخِ ذِ الشَّ يْطَانَ وَلِيّاً مِّن ْدُونِ اللّهِ فَقَ دْ خَ سِ رَ خُ س ًرَاناً م بِينا﴾ [النساء : 119 ] ،ووصف هللا تعالى أنصار الشيطان وأوليائه بعدم اإليمان ، فقال تعالى﴾ : َإِنَّا جَ عَلْنَا الشَّ يَاطِ ينَ أَوْلِيَاء لِلَّذِ ينَ الَ يُؤْمِنُون﴾ [األعراف : 27 ] ، أي ال يمكن أن تكون هنالك والية بين مؤمن وشيطان ، وملا كانوا غير مؤمنين فقد حقت عليهم الضاللة ،قال تعالى﴿ : ُفَرِيقاً هَ دَ ى وَفَرِيقاً حَ قَّ عَلَيْهِمُ الضَّالَلَةُ إِنَّهُم َاتَّخَ ذُ وا الشَّ يَاطِ ينَ أَوْلِيَاء مِن دُونِ اللّهِ وَيَحْ سَ بُونَ أَنَّهُم م هْتَدُ ون﴾ [األعراف : 30 ] ، واآليات التي تحذر من مواالة الكافرين واليهود والن صارى والشياطين كثيرة ،لذا اكتفيت بما يؤدي الغرض منها. ( 31 ) الوالء في القرآن الكريم الوالء في القرآن الكريم المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م التوصيات .واملقترحات استنادا لنتائج البحث توص ي ال باحثة وتقترح بما يأتي : 1- أن تخصص دراسات للتفريق بين.مفهوم الوالء وبين مفهوم التعايش والسلم 2- .أن تخصص دراسات في ضوابط الوالء ومظاهره وهللا اسأل أن يتقبل هذا العمل لوجهه الكريم ، .والحمد هلل رب العاملين - ابن هشام ، عبد امللك بن أيوب الحميري (املتوفى : 213 )هـ ،السيرة النبوية البن هشام ،تحقيق :مص وآخرون( ،مكتبة ومطبعة مصطفى البابي الحلبي وأوالده بمصر ، 1375 هـ- 1955 م) ط2. - ابن هشام ، عبد امللك بن أيوب الحميري (املتوفى : 213 )هـ ،السيرة النبوية البن هشام ،تحقيق : مصطفى السقا وآخرون( ،مكتبة ومطبعة مصطفى البابي الحلبي وأوالده بمصر ، 1375 هـ- 1955 م) ط2. - ابن هشام ، عبد امللك بن أيوب الحميري (املتوفى : 213 )هـ ،السيرة النبوية البن هشام ،تحقيق : مصطفى السقا وآخرون( ،مكتبة ومطبعة مصطفى البابي الحلبي وأوالده بمصر ، 1375 هـ- 1955 م) ط2. - أبو حيان ،محمد بن يوسف (املتوفى : 745 )هـ ،البحر املحيط في التفسير ،تحقيق :صدقي محمد جميل( ، دار الفكر– بيروت ، 1420 )هـ ، .د.ط - أبو حيان ،محمد بن يوسف (املتوفى : 745 )هـ ،البحر املحيط في التفسير ،تحقيق :صدقي محمد جميل( ، دار الفكر– بيروت ، 1420 )هـ ، .د.ط - أبو داود ،سليمان بن األشعث (املتوفى : 275 )هـ ،سنن أبي داود ،تحقيق :محمد محيي الدين عبد الحميد( ، املكتبة العصرية ، صيدا– )بيروت. - أبو داود ،سليمان بن األشعث (املتوفى : 275 )هـ ،سنن أبي داود ،تحقيق :محمد محيي الدين عبد الحميد( ، املكتبة العصرية ، صيدا– )بيروت. - األلباني ،محمد ناصر الدين (املتوفى : 1420 )هـ ،سلسلة األحاديث الصحيحة وش يء من فقهها وفوائدها( ، مكتبة املعارف للنشر والتوزيع ،الرياض ، 1415هـ- 1995 .م) ط1 - األلباني ،محمد ناصر الدين (املتوفى : 1420 )هـ ،سلسلة األحاديث الصحيحة وش يء من فقهها وفوائدها( ، مكتبة املعارف للنشر والتوزيع ،الرياض ، 1415هـ- 1995 .م) ط1 - األلباني ،محمد ناصر الدين (املتوفى : 1420 )هـ ، صحيح الجامع الصغير وزياداته ( .)املكتب اإلسالمي - األنباري ،عبد الرحمن بن محمد (املتوفى : 577 )هـ ،نزهة األلباء في طبقات األدباء ،تحقيق :إبراهيم السامرائي ، (مكتبة املنار ، الزرقاء- األردن ، 1405هـ- 1985 )م ،ط3 ،ص : 119 - 122 . - األلباني ،محمد ناصر الدين (املتوفى : 1420 )هـ ، صحيح الجامع الصغير وزياداته ( .)املكتب اإلسالمي - األنباري ،عبد الرحمن بن محمد (املتوفى : 577 )هـ ،نزهة األلباء في طبقات األدباء ،تحقيق :إبراهيم (مكتبة املنار ، الزرقاء- األردن ، 1405هـ- 1985 )م ،ط3 ،ص : 119 - 122 . - األنباري ،عبد الرحمن بن محمد (املتوفى : 577 )هـ ،نزهة األلباء في طبقات األدباء ،تحقيق :إبراهيم السامرائي ، (مكتبة املنار ، الزرقاء- األردن ، 1405هـ- 1985 )م ،ط3 ،ص : 119 - 122 . - ابن هشام ، عبد امللك بن أيوب الحميري (املتوفى : 213 )هـ ،السيرة النبوية البن هشام ،تحقيق :مص وآخرون( ،مكتبة ومطبعة مصطفى البابي الحلبي وأوالده بمصر ، 1375 هـ- 1955 م) ط2. - البخاري ،محمد بن اسماعيل (ت : 256 )هـ ، صحيح البخاري ،تحقيق :محمد زهير بن ناصر الناصر( ، دار طوق النجاة ، 1422 )ه( ، مصورة عن)السلطانية بإضافة ترقيم محمد فؤاد عبد الباقي ،ط1. - البخاري ،محمد بن اسماعيل (ت : 256 )هـ ، صحيح البخاري ،تحقيق :محمد زهير بن ناصر الناصر( ، دار طوق النجاة ، 1422 )ه( ، مصورة عن)السلطانية بإضافة ترقيم محمد فؤاد عبد الباقي ،ط1. - البغوي ،الحسين بن مسعود (املتوفى : 510 )هـ ،معالم التنزيل في تفسير القرآن ،تحقيق :عبد الرزاق املهدي( ، دار إحياء التراث العربي–بيروت ، 1420 )ه ،ط1. - البغوي ،الحسين بن مسعود (املتوفى : 510 )هـ ،معالم التنزيل في تفسير القرآن ،تحقيق :عبد الرزاق املهدي( ، دار إحياء التراث العربي–بيروت ، 1420 )ه ،ط1. - البقاعي ،إبراهيم بن عمر (املتوفى : 885 )هـ ،نظم الدرر في تناسب ا آليات والسور( ،دار الكتاب اإلسالمي ، .)القاهرة - البيضاوي ،عبد هللا بن عمر (املتوفى : 685 )هـ ،ـ ،أنوار التنزيل وأسرار التأويل ،تحقيق : محمد عبد الرحمن املرعشلي( ،دار إحياء التراث العربي– بيروت1418 )ه ،ط1. - البقاعي ،إبراهيم بن عمر (املتوفى : 885 )هـ ،نظم الدرر في تناسب ا آليات والسور( ،دار الكتاب اإلسالمي ، .)القاهرة - البيضاوي ،عبد هللا بن عمر (املتوفى : 685 )هـ ،ـ ،أنوار التنزيل وأسرار التأويل ،تحقيق : محمد عبد الرحمن املرعشلي( ،دار إحياء التراث العربي– بيروت1418 )ه ،ط1. م - الترمذي ،محمد بن عيس ى (املتوفى : 279 )هـ ،سنن الترمذي ،تحقيق :أحمد محمد شاكر وآخرون( ، شركة مكتبة ومطبعة مصطفى البابي الحلبي– مصر ، 1395هـ- 1975م) ط2. - الترمذي ،محمد بن عيس ى (املتوفى : 279 )هـ ،سنن الترمذي ،تحقيق :أحمد محمد شاكر وآخرون( ، شركة مكتبة ومطبعة مصطفى البابي الحلبي– مصر ، 1395هـ- 1975م) ط2. - حسين ،سيد قطب إبراهيم (املتوفى : 1385 )هـ ،في ظالل القرآن( ،دار الشروق- بيروت- القاهرة ، 1412ه ، ) ، ط17 . - حسين ،سيد قطب إبراهيم (املتوفى : 1385 )هـ ،في ظالل القرآن( ،دار الشروق- بيروت- القاهرة ، 1412ه ، ) ، ط17 . - الخازن ،علي بن محمد (املتوفى : 741 )هـ ، لباب التأويل في معاني التنزيل ،تصحيح :محمد علي شاهين( ، دار الكتب العلمية- بيروت ، 1415 )هـ ،ط1. - الخازن ،علي بن محمد (املتوفى : 741 )هـ ، لباب التأويل في معاني التنزيل ،تصحيح :محمد علي شاهين( ، دار الكتب العلمية- بيروت ، 1415 )هـ ،ط1. املصادر واملراجع : املصادر واملراجع : - ابن األثير ،علي بن أبي الكرم محمد (املتوفى : 630 )هـ ،أسد الغابة في معرفة الصحابة تحقيق :عل ي محمد معوض- عادل أحمد عبد املوجود ،الناشر( :دار الكتب العلمية1415 هـ- 1994 )م ،ط1 . م - ابن حبان ،محمد بن حبان (املتوفى : 354 )هـ ،صحيح ابن حبان بترتيب ابن بلبان ،تحقيق شعيب األرناؤوط ، (مؤسسة الرسالة-بيروت ، 1414 – 1993 ) ،ط2. - ابن حبان ،محمد بن حبان (املتوفى : 354 )هـ ،صحيح ابن حبان بترتيب ابن بلبان ،تحقيق شعيب األرناؤوط ، (مؤسسة الرسالة-بيروت ، 1414 – 1993 ) ،ط2. - ابن حنبل أحمد بن محمد (املتوفى : 241 )هـ ،مسند اإلمام أحمد بن حنبل ،تحقيق :شعيب األرنؤوط وآخرون ، (مؤسسة الرسالة ، 1421 هـ- 2001 )م ،ط1. - ابن حنبل أحمد بن محمد (املتوفى : 241 )هـ ،مسند اإلمام أحمد بن حنبل ،تحقيق :شعيب األرنؤوط وآخرون ، (مؤسسة الرسالة ، 1421 هـ- 2001 )م ،ط1. - ابن عاشور ،محمد الطاهر بن محمد (املتوفى : 1393 )هـ ،التحرير والتنوير( ،الدار التونسية للنشر– تونس ، 1984 .)هـ - ابن عطية ،عبد الحق بن غالب (املتوفى : 542 )هـ ، املحرر الوجيز في تفسير الكتاب العزيز ،تحقيق : عبد السالم عبد الشافي( ،دار الكتب العلمية– بيروت ، 1422 )ه ،ط1. - ابن عطية ،عبد الحق بن غالب (املتوفى : 542 )هـ ، املحرر الوجيز في تفسير الكتاب العزيز ،تحقيق : عبد السالم عبد الشافي( ،دار الكتب العلمية– بيروت ، 1422 )ه ،ط1. - ابن ماجة ،محمد بن يزيد (املتوفى : 273 )هـ ،سنن ابن ماجه ،تحقيق : شعيب األرنؤوط- وآخرون( ، دار الرسالة العاملية ، 1430هـ- 2009 )م ،ط1. - ابن ماجة ،محمد بن يزيد (املتوفى : 273 )هـ ،سنن ابن ماجه ،تحقيق : شعيب األرنؤوط- وآخرون( ، دار الرسالة العاملية ، 1430هـ- 2009 )م ،ط1. - ابن منظور ،محمد بن مكرم بن ع لى (املتوفى : 711 )هـ ،لسان العرب( ،دار صادر– بيروت ، 1414 )ه ،ط3 - ابن منظور ،محمد بن مكرم بن ع لى (املتوفى : 711 )هـ ،لسان العرب( ،دار صادر– بيروت ، 1414 )ه، الوالء في القرآن الكريم ( 32 ) الحصان الوالء في القرآن الكريم ( 32 ) الحصان المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م - ال شاطبي ،إبراهيم بن موس ى (املتوفى : 790 )هـ ،االعتصام ،تحقيق :سليم بن عيد الهاللي( ،دار ابن عفان ، السعودية ، 1412 هـ- 1992 )م ،ط1. - ال شاطبي ،إبراهيم بن موس ى (املتوفى : 790 )هـ ،االعتصام ،تحقيق :سليم بن عيد الهاللي( ،دار ابن عفان ، السعودية ، 1412 هـ- 1992 )م ،ط1. - الشنقيطي ،محمد األمين بن محمد املختار (املتوفى : 1393 )هـ ،أضواء البيان في إيضاح القرآن بالقرآن( ، دار الفكر للطباعة و النشر و التوزيع بيروت– لبنان ، 1415هـ- 1995 .)مـ - الشنقيطي ،محمد األمين بن محمد املختار (املتوفى : 1393 )هـ ،أضواء البيان في إيضاح القرآن بالقرآن( ، دار الفكر للطباعة و النشر و التوزيع بيروت– لبنان ، 1415هـ- 1995 .)مـ - الطبراني ،سليمان بن أحمد (املتوفى : 360 )هـ ،املعجم الكبير ،تحقيق :حمدي بن عبد املجيد السلفي( ، دار إحياء التراث العربي ، 1983م) ط2. - الطبراني ،سليمان بن أحمد (املتوفى : 360 )هـ ،املعجم الكبير ،تحقيق :حمدي بن عبد املجيد السلفي( ، دار إحياء التراث العربي ، 1983م) ط2. - الطبري ،محمد بن جرير (املتوفى : 310 )هـ ،جامع البيان في تأويل القرآن ،تحقيق :أحمد محمد شاكر( ،م ؤسسة الرسالة ، 1420 هـ- 2000 .)م - الطبري ،محمد بن جرير (املتوفى : 310 )هـ ،جامع البيان في تأويل القرآن ،تحقيق :أحمد محمد شاكر( ،م ؤسسة الرسالة ، 1420 هـ- 2000 .)م - عمر ،أحمد مختار عبد الحميد (املتوفى : 1424هـ) بمساعدة فريق عمل ،معجم اللغة العربية املعاصرة( ، عالم الكتب ، 1429 هـ- 2008 ) م ،ط1. - عمر ،أحمد مختار عبد الحميد (املتوفى : 1424هـ) بمساعدة فريق عمل ،معجم اللغة العربية املعاصرة( ، عالم الكتب ، 1429 هـ- 2008 ) م ،ط1. - الفارابي ،إسماعيل بن حماد (املتوفى : 393 )هـ ،الصحاح تاج اللغة وصحاح العربية ،تحقيق : أحمد عبد الغفور عطار( ،دار العلم للماليين– بيروت ، 1407هـ - 1987م) ط4. - الفارابي ،إسماعيل بن حماد (املتوفى : 393 )هـ ،الصحاح تاج اللغة وصحاح العربية ،تحقيق : أحمد عبد الغفور عطار( ،دار العلم للماليين– بيروت ، 1407هـ - 1987م) ط4. - ابن هشام ، عبد امللك بن أيوب الحميري (املتوفى : 213 )هـ ،السيرة النبوية البن هشام ،تحقيق :مص وآخرون( ،مكتبة ومطبعة مصطفى البابي الحلبي وأوالده بمصر ، 1375 هـ- 1955 م) ط2. - الرازي ،محمد بن عمر (املتوفى : 606 )هـ ،مفاتيح الغيب( ،دار إحياء التراث العربي ،بيروت- 1420هـ) ط الرازي ،محمد بن عمر (املتوفى : 606 )هـ ،مفاتيح الغيب( ،دار إحياء التراث العربي ،بيروت- 1420هـ) ط3. - رضا ،محمد رشيد (املتوفى : 1354 )هـ ،تفسير القرآن الحكيم ( )تفسير املنار( ،الهيئة املصرية ال عامة للكتاب ، 1990 .)م - رضا ،محمد رشيد (املتوفى : 1354 )هـ ،تفسير القرآن الحكيم ( )تفسير املنار( ،الهيئة املصرية ال عامة للكتاب ، 1990 .)م - الزمخشري ، محمود بن عمرو (املتوفى : 538 )هـ ،الكشاف عن حقائق غوامض التنزيل( ،دار الكتاب العربي– بيروت ، 1407 )ه ،ط3. - الزمخشري ، محمود بن عمرو (املتوفى : 538 )هـ ،الكشاف عن حقائق غوامض التنزيل( ،دار الكتاب العربي– بيروت ، 1407 )ه ،ط3. - السرحان ،محمد قضام ،الوالء واالنتماء لدى الشباب األردني واثره في بناء الشخصية( ، مطبعة التوفيق– عمان2003 .)م - السرحان ،محمد قضام ،الوالء واالنتماء لدى الشباب األردني واثره في بناء الشخصية( ، مطبعة التوفيق– عمان2003 .)م - السعدي ، عبد الرحمن بن ناصر (املتوفى : 1376 )هـ ،تيسير الكريم الرحمن في تفسير كالم املنان ،تحقيق : عبد الرحمن بن معال اللويحق( ،مؤسسة الرسالة ، 1420 هـ- 2000 )م ،ط1. - سيد قطب إبراهيم (املتوفى : 1385 )هـ ،في ظالل القرآن( ،دار الشروق- بيروت- القاهرة ، 1412 )ه ،ط17 ،ج : 2 ، ص : 909 . - سيد قطب إبراهيم (املتوفى : 1385 )هـ ،في ظالل القرآن( ،دار الشروق- بيروت- القاهرة ، 1412 )ه ،ط17 ،ج : 2 ، ص : 909 . الوالء في القرآن الكريم ( 33 ) الحصان الوالء في القرآن الكريم ( 33 ) الحصان المجلة العربية للعلوم ونشر األبحاث ــ مجلة العلوم اإلسالمية ــ المجلد ال رابع ــ العدد ال ثاني ــ يونيو 21 20 م ا - النابلس ي ،محمد راتب ،موسوعة اإلعجاز العلمي في القرآن والسنة ، دار املكتبي- سورية- دمشق- الحلبوني- جادة ابن سينا ،الطبعة : الثانية1426 هـ- 2005 م - النابلس ي ،محمد راتب ،موسوعة اإلعجاز العلمي في القرآن والسنة ، دار املكتبي- سورية- دمشق- الحلبوني- جادة ابن سينا ،الطبعة : الثانية1426 هـ- 2005 م - النيسابوري ،مسلم بن الحجاج (املتوفى : 261 )هـ ،صحيح مس لم ،تحقيق :محمد فؤاد عبد الباقي( ، دار إحياء التراث العربي– .)بيروت - النيسابوري ،مسلم بن الحجاج (املتوفى : 261 )هـ ،صحيح مس لم ،تحقيق :محمد فؤاد عبد الباقي( ، دار إحياء التراث العربي– .)بيروت - الواحدي ،علي بن أحمد (املتوفى : 468 )هـ ،أسباب نزول القرآن ،تحقيق :عصام بن عبد املحسن الحميدان ، الناشر : دار اإلصالح- الدمام ،الطبعة :الثانية ، 1412 هـ- 1992 م - الواحدي ،علي بن أحمد (املتوفى : 468 )هـ ،أسباب نزول القرآن ،تحقيق :عصام بن عبد املحسن الحميدان ، الناشر : دار اإلصالح- الدمام ،الطبعة :الثانية ، 1412 هـ- 1992 م ( 34 ) الوالء في القرآن الكريم الحصان الوالء في القرآن الكريم
https://openalex.org/W2596535500
https://zenodo.org/records/1099020/files/10000396.pdf
English
null
Modeling and Simulation of Standalone Photovoltaic Charging Stations for Electric Vehicles
Zenodo (CERN European Organization for Nuclear Research)
2,015
cc-by
7,206
I. INTRODUCTION Fig. 1 EV charging/discharging: H2V2H structure LECTRIC vehicles (EVs) are green transports, and they are good means to solve transport and environmental problems. The environmental benefits of EVs increase with the produced electricity from green sources such as (wind, solar, small scale hydroelectricity). Green sources are also a good solution and alternative enabling to avoid the problem of reliability and safely which can be encountered when grid power is used to charge EVs [1]. Charging stations provide power supply for EVs; so, the deployment of complete infrastructures with sophistic equipments is indispensable for promoting EVs. However, EV charging process takes much time than charging process using fuel car [2], and batteries should be efficiently used since the propulsion of EVs depend on their energy storage capacity [3], [23]. E E This paper focuses on the modeling and sizing of EV charging stations using solar energy. More precisely, we address a PV panel mathematical model whose parameters are extracted from PV tests. We address also the voltage modeling of lead-acid battery we use in our system H2V. In fact, the battery state information allows optimal control for battery charging/discharging process, reduces the risk of overcharge and deep charging. In addition, it is possible to extend the battery life and reach its optimal usage. To do so, we focus on the modeling of the lead-acid battery voltage by developing a mathematical model enabling to reach these objectives. The proposed model describes the profile of battery voltage considering time and electrical parameters. These parameters can be found using manufacturer data or experimental tests. Afterward, a mathematical model is deduced using a curve- fitting approach. Many parameters such as the state of charge (SOC), time of charging and discharging, current of charging and discharging should be taken into account during charging and discharging processes. EVs can be charged by either plugging into electrical outlets or by means of on-board electricity generation. There are two main places where the batteries of EVs can be charged: either on a car park, corporate or public, or at home. With this last charging solution, a system H2V is designed to charge BEVs using green sources such as photovoltaic systems as illustrated in Fig. 1. In a H2V system, EV can be charged with direct current from photovoltaic panels (PV) or with current from a Lead-Acid battery installed at home (see Fig. 1). World Academy of Science, Engineering and Technology International Journal of Computer and Information Engineering Vol:9, No:1, 2015 World Academy of Science, Engineering and Technology International Journal of Computer and Information Engineering Vol:9, No:1, 2015 I. INTRODUCTION Conversely, the system can provide the electric energy from the EV to the household when this is needed (V2H). The study of these charging/discharging processes H2V and V2H The remainder of the paper is structured as follows. Section II introduces the energy storage sources. Section III presents the adopted modeling approach. PV and Lead-Acid battery modeling as well as DC/DC converter topologies are presented in this section. Section IV concerns the system sizing. The obtained results and a comparison study of simulation results with datasheet and experimental results are given in Section V. Last section concludes the paper and gives some future directions of this work. R. Mkahl is with the laboratory OPERA/FCLAB FR-CNRS3539, University of Technology Belfort-Montbéliard, Belfort, France (corresponding author, phone 0033695015520; e-mail: rania.mkahl@utbm.fr). A. Nait-Sidi-Moh is with Laboratory of Innovative Technologies, University of Picardie Jules Verne, Saint-Quentin, France (e-mail: ahmed.nait-sidi-moh@u-picardie.fr). International Science Index, Computer and Information Engineering Vol:9, No:1, 2015 waset.org/Public Keywords—Electric vehicles, photovoltaic energy, lead-acid batteries, charging process, modeling, simulation, experimental tests. R. Mkahl is with the laboratory OPERA/FCLAB FR-CNRS3539, University of Technology Belfort-Montbéliard, Belfort, France (corresponding author, phone 0033695015520; e-mail: rania.mkahl@utbm.fr). A. Nait-Sidi-Moh is with Laboratory of Innovative Technologies, University of Picardie Jules Verne, Saint-Quentin, France (e-mail: ahmed.nait-sidi-moh@u-picardie.fr). M. Wack is with the laboratory OPERA/FCLAB FR-CNRS3539, University of Technology Belfort-Montbéliard, Belfort, France (e-mail: maxime.wack@utbm.fr). International Science Index, Computer and Information Engineering Vol:9, No:1, 2015 waset.org/Publication/10000396 Fig. 1 EV charging/discharging: H2V2H structure M. Wack is with the laboratory OPERA/FCLAB FR-CNRS3539, University of Technology Belfort-Montbéliard, Belfort, France (e-mail: maxime.wack@utbm.fr). Modeling and Simulation of Standalone Photovoltaic Charging Stations for Electric Vehicles R. Mkahl, A. Nait-Sidi-Moh, M. Wack systems requires adequate models in order to ensure an optimal energy management and effective usage of the system components. This modeling is based on mathematical equations that govern the system in order to predict and evaluate its behavior. systems requires adequate models in order to ensure an optimal energy management and effective usage of the system components. This modeling is based on mathematical equations that govern the system in order to predict and evaluate its behavior. Abstract—Batteries of electric vehicles (BEV) are becoming more attractive with the advancement of new battery technologies and promotion of electric vehicles. BEV batteries are recharged on board vehicles using either the grid (G2V for Grid to Vehicle) or renewable energies in a stand-alone application (H2V for Home to Vehicle). This paper deals with the modeling, sizing and control of a photovoltaic stand-alone application that can charge the BEV at home. The modeling approach and developed mathematical models describing the system components are detailed. Simulation and experimental results are presented and commented. International Science Index, Computer and Information Engineering Vol:9, No:1, 2015 waset.org/Publication/10000396 Fig. 3 Equivalent circuit of a solar cell Fig. 2 Ragone plot of energy storage Fig. 3 Equivalent circuit of a solar cell This diagram shows that supercapacitors (Scaps) have a very high power density but a very low energy density. The batteries have a low power density and high energy density. The batteries are "reversible" generators; they can store electrical energy in chemical form and return it at any time when it is needed. The nature of electric vehicles is governed primarily by the characteristics of the used batteries. The weight and volume of batteries are usually a decisive factor. A BEV must satisfy certain conditions: a good specific power for high accelerations, good specific energy synonymous with good battery life, stable voltage generating regular performances, a long lifetime and low maintenance and recyclable [6]. The equation of PV module witch expresses the characteristic current–voltage (I-V) of PV module is given as follow [13]:       × + −     − × + − × = ) ) ( ) ( ( 1 )) / ) ( ) ( ( exp( ) ( ) ( 0 SHm p sm m s p Sm m L p m R n R t I t V nkT n n R t I t V q I t I n t I (1) (1) n: diode ideality factor (1 for an ideal diode); ns: cells in series np: cells in parallel; Im: current of PV module; V: voltage of PV module; RSm: series resistance of PV module; RSHm: shunt resistance of PV module; IL : photovoltaic current; I0: reverse saturation current;   : terminal potential (0.0259V at 25C°). Batteries currently used in electric vehicles are: Lead-Acid (LA) battery, Lithium-Ion (Li-Ion) battery, Nickel Metal Hybrdrure [7], Nickel Cadmium battery [6], and Zink-Air. Li- Ion battery is the main hope for electric vehicles [8]. It holds a higher voltage per element, good volume and mass performance, and a very high specific energy compared to other types of batteries. It is worth noting that the specific systems of stationary electricity storage are very different from the specific systems of embedded systems for which energies and unit powers are weak. In stationary systems, the amount of energy and the total power available then become largely predominant. III. MODELING OF THE SYSTEM COMPONENTS B. Lead-Acid Battery Modeling In this section, we focus on the modeling of the main components of charging station. To do so, we present PV and Lead-Acid battery models and DC/DC converter topologies. II. ENERGY STORAGE SOURCES Energy storage system includes different storage technologies, electrochemical technology (battery), electrical scholar.waset.org/1307-6892/10000396 International Scholarly and Scientific Research & Innovation 9(1) 2015 72 World Academy of Science, Engineering and Technology International Journal of Computer and Information Engineering Vol:9, No:1, 2015 International Science Index, Computer and Information Engineering Vol:9, No:1, 2015 waset.org/Publication/10000396 Lead-Acid batteries have high availability and they are the least expensive storage batteries for any application, while still providing reasonable performance and life characteristics. They are widely used like the stationary electricity storage in PV systems as given in [9]. Generally, unless otherwise specified by the manufacturer, PV module consists of thirty six cells in series (ns =36 cells) and np=1 cell. The PWX500-12V module is chosen for this study. The parameters I0, RSm, RSHm of this module are not given in the data sheet, so we have determined it by using the functions 'fittype' and 'fit' of Matlab. The parametric identification is considered by using current-voltage (I-V) characteristic curve of the module extracted from experimental data. The PV panel parameters are reported in the Table I. TABLE I PV PARAMETERS PV parameters Digital values RSm 0.2297 Ω RSHm 60.78 Ω I0 3.886e-009 A B. Lead-Acid Battery Modeling A. PV Modeling technology (supercapacitor), and mechanical technology (a flywheel) as detailed in [4]. To compare the energy storage sources many parameters can be considered. Among these parameters we underline energy density, power density, cycle life performance, cost, environmental impact [5]. Fig. 2 illustrates the Ragone diagram of different energy storages. Several studies are developed about the mathematical modeling of the PV cell. A model of the photovoltaic cell with double diode is developed in [10]. This model consists of a current source representing the light flux, in parallel with two diodes. The diode represents the cell behavior in darkness. Tow resistances, shunt and series resistance are added to present internal losses. The current-voltage (I-V) equation can be simplified by considering the shunt resistance as infinity [11]. Another works have been proposed to simplify the PV cell by using single-model PV cell with one diode [12]. Like this last research work, we use a single-model PV cell in order to formalize the PV solar cell. The equivalent electrical circuit is presented in Fig. 3. Fig. 2 Ragone plot of energy storage 1. Voltage Modeling In the literature the battery behavior has been described by many models. In fact, several research works proposed some scholar.waset.org/1307-6892/10000396 International Scholarly and Scientific Research & Innovation 9(1) 2015 73 World Academy of Science, Engineering and Technology International Journal of Computer and Information Engineering Vol:9, No:1, 2015 World Academy of Science, Engineering and Technology International Journal of Computer and Information Engineering Vol:9, No:1, 2015 technique as detailed in [21]. technique as detailed in [21]. battery models which describing battery behavior for specifics purpose, from the battery design and performance estimation to the circuit simulation. According to these researches, the battery models can be classified into three categories: Based on the curves showing the evolution of the terminal voltage discharging, we deduce an expression of the voltage discharging battery by an extrapolation of the points which have been raised. The electrochemical model: this model is used to optimize the physical design aspects of batteries, to characterize the fundamental mechanisms of power generation and lay electric parameters of the battery with chemical parameters [14]. Shepherd model which can be considered as the best battery model for using for the hybrid vehicle analysis is one example of electrochemical model [15]. For charging curve, the datasheet does not give sufficient curves. So, we charge the battery with constant current in order to obtain the curve enabling to describe the relationship between the terminal battery voltages during charging versus charging time. The battery is charged with constant current I1 until the battery voltage reaches overcharge voltage. Then it discharges at constant current until the battery voltage dropped to the deep-discharge protection point. We repeat these processes with currents I2, I3,..., In. Finally, the obtained curves, from performed tests, describe the variation of the battery terminal voltage during charging/discharging process over the time. Based on the test data we deduce an expression of the voltage charging battery by an extrapolation of the point which we have raised. The mathematical model is the second category. This model is mostly too abstract to embody any practical meaning but it is useful to system designers [16]. Ciemat model is one example of a mathematical model. This model consists of an ideal voltage in series with resistance, the electromotive force and resistance which are expressed according to the battery SOC as detailed in [17]. 1. Voltage Modeling International Science Index, Computer and Information Engineering Vol:9, No:1, 2015 waset.org/Publication/10000396 The third category is electric model. This last lies between electrochemical and mathematical model. Electric model consists of voltage source in series with a resistance which is not function of battery SOC [18]. From the datasheet, we obtain the curves and with applying the method of extrapolation of the curve, we obtain a polynomial equation of 3rd degree. The goal of this section is to determine a relationship between the battery voltage and the battery time charging/discharging. This expression takes into account the electrical parameters. During cycles of charging and discharging, the characteristics of the battery depend on its SOC, charging/discharging current and charging/discharging time. As given in [19], the SOC of the battery is defined by: D Ct Bt At t V + + + = 2 3 ) ( (3) (3) (3) where A, B, C, and D are the parameters of the battery whose expressions are detailed in the following subsection. It is worth noting that the parameters A, B, and C depend on the battery current. The parameter D depends on the battery current and the open circuit voltage. ∫ − = dt t i c soc soc n ) ( 1 0 (2) (2) 2. Identification of Parameters A, B, C, D Using basic fitting technique, the parameters A, B and C are given as polynomial functions of 7th degree depending on the battery current I. These parameters can be determined by: where: SOC0: initial state of charging percentage; Cn: battery capacity in Ampere-hours; i(t): battery current. - Case of charging: A= a*e-07; B = b; C = c. - Case of charging: A= a*e-07; B = b; C = c. - Case of discharging: A = (4, 63e-13)*a; - Case of discharging: A = (4, 63e-13)*a; Fig. 4 Voltage E versus SOC 0 20 40 60 80 100 11.2 11.4 11.6 11.8 12 12.2 12.4 12.6 12.8 13 13.2 soc% E[V] given limits approximation given limits Fig. 4 Voltage E versus SOC 0 20 40 60 80 100 11.2 11.4 11.6 11.8 12 12.2 12.4 12.6 12.8 13 13.2 soc% E[V] given limits approximation given limits B = (2,7778e-009)*b; C = 0, 016667*c where a, b and c are given by: where a, b and c are given by:  a b c  M V (4) (4) where the vector V is given by: where the vector V is given by: Fig. 4 Voltage E versus SOC V I, I, I, I, I, I, I, 1  In the H2V concept the Lead-Acid battery YUASA SW280 was used, the nominal voltage is 12V and the capacity Cn is 7,6 Ah, for n = 20. The effect of temperature on discharging curves is not given by the datasheets, so the modeling is done at a temperature of 20°C. The matrix M is given by Least Square Fitting as detailed in [21]. The parameter D represents the starting voltage (voltage at the beginning of charging/discharging). Experimentally, the expression of this parameter is given by: As exposed in [20], datasheets give the relationship between E (open circuit voltage) and SOC (State of Charge). For the battery YUASA SW280 this relationship is linear as illustrated in Fig. 4. A mathematical equation of SOC according to E is established using a linear approximation dv E D ± = (5) dv E D ± = (5) International Scholarly and Scientific Research & Innovation 9(1) 2015 scholar.waset.org/1307-6892/10000396 74 World Academy of Science, Engineering and Technology International Journal of Computer and Information Engineering Vol:9, No:1, 2015 Fig. 6 Combined recharging cycle Yes DC DC VLA VLi-Ion Current control Voltage control VLi-Ion ref 220V iLi-Ion ref 50A SOCLi-Ion >80% No α where E is the open circuit voltage, dv is the initial voltage drop at the switching on process in the battery. We use the sign "+" (respectively "-") in the case of the battery charging (resp. discharging). The initial voltage drop at the switching on process in the battery is given by: RI dv = (6) (6) R corresponds to the battery resistance which is a function of the current I. Using the technique of basic fitting we can find the relationship between R and I. We measure the values of the open circuit voltage E and the values of the starting voltage V0 of the battery, then we find dv = E-V0. For several values of dv, using (6), we calculate the resistance values for each corresponding values of dv, and then we find the relationship between R and I using interpolation method. This calculation is detailed in [21]. Fig. 6 Combined recharging cycle A. Ev Sizing The power demand is due to speed variations, tire friction dissipation, aerodynamics dissipation, and mass elevation. C. DC/DC Charger Topologies Solar energy is converted to electric energy by the PV panels. Electric energy is used for recharging Lead-Acid batteries via DC/DC Boost converter (see Fig. 5(a)). Boost converter is controlled by maximum power point tracking algorithm (MPPT) for obtaining always the PV maximum power at PV panel output. International Science Index, Computer and Information Engineering Vol:9, No:1, 2015 waset.org/Publica where V: vehicle speed; M=1000 (kg): vehicle mass; α = 0 (radians): road angle with a horizontal line; g = 9.81M·s−2: acceleration of gravity; Cr = 0.01: friction coefficients; Cx = 0.30: aerodynamic coefficients; ρ = 1.225 (km. m3): air density; S = 2.5(m2): front surface area. In addition, a Buck- Boost (current-bidirectional converter) is used for charging embedded Li-Ion battery into the EV from home energy (H2V). This converter can be used also for charging Lead-Acid batteries from vehicle battery (V2H) when it is needed. Fig. 5 (b) corresponds to a DC-DC current- bidirectional converter. Fig. 7 NEDC driving cycle 0 200 400 600 800 1000 1200 0 50 100 150 Time (s) Speed (Km/h) 0 200 400 600 800 1000 1200 -5000 0 5000 10000 15000 20000 Time (s) Power demande(W) (a) boost (b) Buck-Boost Fig. 5 DC-DC charger topologies International Science Index, Computer and Information Eng Fig. 7 NEDC driving cycle So the vehicle energy demand equals to 17kWh. This amount of energy needs to be embedded and stored in the Li- Ion batteries pack. For testing vehicles, driving cycles have been normalized. European light-duty vehicles have to face the New European Driving Cycle (NEDC). The NEDC consists of 4 repeated urban cycles (ECE-15) and an Extra- Urban driving cycle. Fig. 7 shows the NEDC driving cycle with the speed and the power demand of the small car. Fig. 5 DC-DC charger topologies Fig. 6 shows the fast recharge control technique consisting on a current control from low SOCLi-Ion to 80% and then switching to a voltage control from 80% to 100% of SOCLi-Ion. where the vector V is given by: This power demand can be expressed as in [22] by: dex, Computer and Information Engineering Vol:9, No:1, 2015 waset.org/Publication/10000396 International Science Index, Computer and Information Engineering Vol:9, No:1, 2015 waset.org/Publication/10000396       + + + = 2 2 1 ) sin( ) cos( V SC dt dV M Mg Mg C V P x r ρ α α (7) (7) V. SIMULATION AND EXPERIMENTAL RESULTS The simulation platform of PV system consists of PV panels, Lead-Acid batteries, Boost converter and MPPT P&Q as illustrated in Fig. 8. Hereafter, we present simulation results of PV model and we report a benchmarking with datasheets and experimental results. C. Sizing of Lead-Acid Battery Current [A] As underlined previously we use of YUASA SW280 Lead- Acid battery as the embedded battery at home. Its characteristics are reported in Table V, and sizing results are presented in Table VI. TABLE V CHARACTERISTICS OF LEAD-ACID BATTERIES YUASA SW280 YUASA SW280 Characteristics Digital values Voltage 12 V Volume 151x65x99 mm Weight Nominal capacity Energy / Volume Energy/Weight Internal resistance of charged battery Maximum discharge current in minute 2.7 kg 7.6 Ah 93 Wh/l 30 Wh/Kg 15 Ω 50A TABLE VI SIZING OF LEAD-ACID BATTERIES YUASA SW280 Sizing Digital values N° in series 4 N° in parallel Pack voltage Pack capacity Pack mass 78 48 V 588 Ah 842.4 kg V S E R ernational Science Index, Computer and Information Engineering Vo Fig. 9 Comparison of simulation results with datasheets for several levels of radiation and at cell temperature of 25°C International Science Index, Computer and Informatio Fig. 9 shows that the simulation results match with those of the datasheet. After comparing the simulation results with the datasheet, we compared the simulation results with experimental results of current-voltage (I-V) characteristics and power-voltage (P-V) characteristics. The used materials for experimental tests are PWX500-12V module, variable load, current sensor, voltage sensor, contact thermometer, and light meter as illustrated in Fig. 10. The aim of these tests is to determine the I-V, P-V curves of the PV panel and find the PV panel electric parameters from the I-V curve. Fig. 10 Test bench of PV panel International Science Index, Computer and Information Engineering Vol:9, No:1, 2015 waset.org/Publication/10000396 e Index, Computer and Information Engineering Vol:9, No:1, 2015 waset.org/Publication/10000396 TABLE IV SIZING OF SOLAR PANEL PWX500-12V PWX500-12V Sizing Digital values Number of PV panels Surface of PV Power max Weight 148 70 m2 7.4 kWc 1361 kg . Sizing of Lead-Acid Battery Fig. 8 PV system controlled by MPPT algorithm Fig. 8 PV system controlled by MPPT algorithm Fig. 9 Comparison of simulation results with datasheets for several levels of radiation and at cell temperature of 25°C 0 5 10 15 20 25 0 0.5 1 1.5 2 2.5 3 3.5 Voltage [V] Current [A] 500W/m² 400W/m² 600W/m² 800W/m² 1000W/m² 0 5 10 15 20 25 0 0.5 1 1.5 2 2.5 3 3.5 Voltage [V] Current [A] 500W/m² 400W/m² 600W/m² 800W/m² 1000W/m² IV. SYSTEM SIZING Data of PV sizing are given in Table II. Characteristics and sizing PV panels are reported in Tables III and IV. PV panels are supposed to be installed on the roof and have a good orientation for capturing a maximum solar radiation. In this section, we focus on the sizing of charging station for small car following a flat road. scholar.waset.org/1307-6892/10000396 International Scholarly and Scientific Research & Innovation 9(1) 2015 75 World Academy of Science, Engineering and Technology International Journal of Computer and Information Engineering Vol:9, No:1, 2015 TABLE II DATA VALUES FOR PV SIZING PV PARAMETERS Data Values Device EV Power of receiver Usage time Factor Corrector Radiation 4704 W 6 h 1.3 5 k Wh/m².j TABLE III CHARACTERISTICS OF SOLAR PANEL PWX500-12V PWX500-12V Characteristics Digital values Power max Optimal current Optimal voltage Short circuit cure Open circuit volt 50 W 2.9 A 17.2 V 3.2 A 21.6 V TABLE IV SIZING OF SOLAR PANEL PWX500-12V PWX500-12V Sizing Digital values Number of PV panels Surface of PV Power max Weight 148 70 m2 7.4 kWc 1361 kg Sizing of Lead-Acid Battery d li d i l f ASA S 280 datasheets for several levels of the radiation. Fig. 9 shows the superposition of the characteristic curves of PV panels I = f(V) with a cell temperature = 25°C and solar radiation at 5 levels: 1000W/m2, 800W/m2, 600W/m2, 500W/m2, 400W/m2. TABLE II DATA VALUES FOR PV SIZING PV PARAMETERS Fig. 8 PV system controlled by MPPT algorithm Fig. 9 Comparison of simulation results with datasheets for several levels of radiation and at cell temperature of 25°C 0 5 10 15 20 25 0 0.5 1 1.5 2 2.5 3 3.5 Voltage [V] Current [A] 500W/m² 400W/m² 600W/m² 800W/m² 1000W/m² Fig. 8 PV system controlled by MPPT algorithm Fig. 8 PV system controlled by MPPT algorithm A. PV Simulation Results 12 Comparing P-V curves of PV model and experimental results 0 5 10 15 20 0 2 4 6 8 10 12 14 16 18 Voltage(V) Power(W) E=280W/m², T=22C° E= 415.625 W/m², T= 18.9C° E=400 W/m², T=20C° E=342W/m², T=26.671C° 0 5 10 15 20 0 2 4 6 8 10 12 14 16 18 Voltage(V) Power(W) E=280W/m², T=22C° E= 415.625 W/m², T= 18.9C° E=400 W/m², T=20C° E=342W/m², T=26.671C° Fig. 12 Comparing P-V curves of PV model and experimental results 0 5 10 15 20 0 2 4 6 8 10 12 14 16 18 Voltage(V) Power(W) E=280W/m², T=22C° E= 415.625 W/m², T= 18.9C° E=400 W/m², T=20C° E=342W/m², T=26.671C° Fig. 12 Comparing P-V curves of PV model and experimental results Fig. 13 PV module current, voltage and power applying MPPT algorithm 0 5 10 15 20 0 2 4 6 8 10 12 14 16 18 Voltage(V) Power(W) E=280W/m², T=22C° E= 415.625 W/m², T= 18.9C° E=400 W/m², T=20C° E=342W/m², T=26.671C° 0 100 200 0 1 2 3 4 5 Time (s) Module current (A) 0 100 200 0 5 10 15 Time (s) Module voltage (v) 0 50 100 150 200 0 20 40 60 Time (s) Power (W) ience Index, Computer and Information Engineering Vol:9, No:1, 2015 waset.org/Publication/10000396 Based on the obtained results, absolute error and relative error are reported in Table VII. The parameter C represents the battery nominal capacity with C = 7.6 Ah. nce Index, Computer and Information Engineering Vol:9, No:1, 2015 waset.org/Publication/10000396 International Science Index, Computer and Information Engineering Vol:9, No:1, 2015 waset.org/Publication/10000396 Power(W) TABLE VII ERRORS BETWEEN DATASHEETS AND SIMULATION RESULTS Discharging current Absolute error Relative error TABLE VII ERRORS BETWEEN DATASHEETS AND SIMULATION RESULTS Discharging current Absolute error Relative error 0.05C 0.1C 0.2C 0.4C 0.6C 1C 2C 0.05 0.01 0.003 8.95.e-4 0.006 0.05 0.276 0.44% 0.1% 0.03% 0.008% 0.05% 0.43% 2.83% International Science Index, Computer and Information Engineering Vol:9, No:1, 2015 waset.org/Publica Fig. 12 Comparing P-V curves of PV model and experimental results Fig. 13 PV module current, voltage and power applying MPPT algorithm 0 100 200 0 1 2 3 4 5 Time (s) Module current (A) 0 100 200 0 5 10 15 Time (s) Module voltage (v) 0 50 100 150 200 0 20 40 60 Time (s) Power (W) The average error represents good model accuracy for each rate of discharging current. A. PV Simulation Results I-V characteristics of a PWX500-12V module are simulated according to (1). The simulation results are compared with Fig. 10 Test bench of PV panel scholar.waset.org/1307-6892/10000396 International Scholarly and Scientific Research & Innovation 9(1) 2015 76 Fig. 14 Comparing the simulation of discharge voltage with the datasheet (dashed line refers to datasheet) 10 0 10 1 10 2 10 3 8 9 10 11 12 13 Discharge time [min] Battery voltage [V] data sheet simu 2C 1C 0.6C 0.4C 0.2C 0.05C 0.1C gineering and Technology and Information Engineering 2015 Comparison I-V curves of PV model and experimental results Fig. 14 Comparing the simulation of discharge voltage with the datasheet (dashed line refers to datasheet) 0 5 10 15 20 0 0.5 1 1.5 Voltage (V) E= 400 W/m², T= 20C° E= 415.6 W/m², T= 18.9C° E= 342 W/m², T= 26.671C° E= 280 W/m², T= 22C° 18 10 0 10 1 10 2 10 3 8 9 10 11 12 13 Discharge time [min] Battery voltage [V] data sheet simu 2C 1C 0.6C 0.4C 0.2C 0.05C 0.1C World Academy of Science, Engineering and Technology International Journal of Computer and Information Engineering Vol:9, No:1, 2015 World Academy of Science, Engineering and Technology International Journal of Computer and Information Engineering Vol:9, No:1, 2015 10 0 10 1 10 2 10 3 8 9 10 11 12 13 Discharge time [min] Battery voltage [V] data sheet simu 2C 1C 0.6C 0.4C 0.2C 0.05C 0.1C Fig. 11 Comparison I-V curves of PV model and experimental results 0 5 10 15 20 0 0.5 1 1.5 Voltage (V) Current(A) E= 400 W/m², T= 20C° E= 415.6 W/m², T= 18.9C° E= 342 W/m², T= 26.671C° E= 280 W/m², T= 22C° Fig. 11 Comparison I-V curves of PV model and experimental results 0 5 10 15 20 0 0.5 1 1.5 Voltage (V) Current(A) E= 400 W/m², T= 20C° E= 415.6 W/m², T= 18.9C° E= 342 W/m², T= 26.671C° E= 280 W/m², T= 22C° 0 5 10 15 20 0 0.5 1 1.5 Voltage (V) Current(A) E= 400 W/m², T= 20C° E= 415.6 W/m², T= 18.9C° E= 342 W/m², T= 26.671C° E= 280 W/m², T= 22C° Current(A) Fig. 11 Comparison I-V curves of PV model and experimental results Fig. 14 Comparing the simulation of discharge voltage with the datasheet (dashed line refers to datasheet) Fig. A. PV Simulation Results The simulation curves coincide with datasheets, which allows concluding that the analytical expression represents well the evolution of the terminal voltage battery YUASA SW280. The comparison of obtained simulation results with experimental measurements for validation of the battery model accuracy is reported. Experimentations are carried out under ambient temperature. To perform the experimental tests, some materials are required such as regulated power supply for constant charge current, electronic load to discharge with constant current, acquisition card with voltage probe, PC with Labview and a current sensor. Figs. 15 and 16 show the test bench of battery test. It is worth to note that the performed tests for battery model and PV model are carried out within the laboratory FEMOT-ST/FCLAB in Belfort, a small city in the north east of France. We underline also that the PV tests are done in the first week of November 2011. International Science Index, Computer and I Fig. 13 PV module current, voltage and power applying MPPT algorithm Figs. 11 and 12 show the superposition of the experimental and simulation results for the I-V and P-V characteristic curves respectively. The comparison study of the two results shows a good accuracy of this model. Fig. 15 Test bench of charge battery The MPPT algorithm is applied to obtain the PV maximum power. Fig. 13 shows PV module current, voltage and power applying MPPT algorithm. B. Simulation Results of Battery Lead-Acid 17 Comparison of simulation and experimental results of discharging terminal voltage 10 0 10 1 10 2 10 3 10 4 10 10.5 11 11.5 12 12.5 13 Time [s] Voltage [v] exp simu I=3.22A I=2.9A 10 0 10 1 10 2 10 3 10 4 10 10.5 11 11.5 12 12.5 13 Time [s] Voltage [v] exp simu I=3.22A I=2.9A 0 2000 4000 6000 8000 10000 12000 -200 -150 -100 -50 0 Time (s) Lead-Acid batteries current(A) Fig. 19 Simulation of charging voltage and current pack of batteries from PV current applying MPPT algorithm Fig. 17 Comparison of simulation and experimental results of discharging terminal voltage (a) Combined charge cycle vs time (b) SoC vs time (c) Alpha vs time Fig. 20 Li-Ion batteries charge from Lead-Acid batteries using the combined charge cycle (a) Combined charge cycle vs time In Fig. 17, we show that the experimental curves match well with those given by the analytical expression. This leads to the conclusion that the analytical expression represents well the evolution of the battery voltage Yuasa SW280. International Science Index, Computer and Information Engine Fig. 18 Supervision system of charging Lead-Acid batteries from PV panels Yes No Lead-Acid pack Voltage < 57.7 Stop charging process Continue charging process (a) Combined charge cycle vs time (a) Combined charge cycle vs time International Science Index, Computer and (b) SoC vs time Fig. 18 Supervision system of charging Lead-Acid batteries from PV panels (b) SoC vs time (b) SoC vs time (c) Alpha vs time Voltage and current of Lead-Acid battery with MPPT algorithm are presented in Fig. 19. W remark that the battery voltage increases until reaching the voltage of full charge and then the current switched off. The pack of batteries is fully charged for nearly 3 hours. Fig. 20 presents the control performance in terms of current and voltage control. We can observe that the Li-Ion current is tracking its reference allowing a fast Li-Ion batteries charge (the Li-Ion battery is charged until 80% in less than 30min), than the last 20% are charged very slowly according to the Li- Ion battery characteristics (about 5 hours to obtain a full charge (100%)). Fig. 20 (b) corresponds to the Li-Ion SoC (starting from an arbitrary initial condition, 40% in this case). (c) Alpha vs time Fig. B. Simulation Results of Battery Lead-Acid The work presented in this section is focused on the battery model results. Once the parameters A, B, C, and D are determined, the voltage is plotted using (3) for several current rates on the same graph compared with the curves of the datasheets, Fig. 14. Fig. 15 Test bench of charge battery scholar.waset.org/1307-6892/10000396 International Scholarly and Scientific Research & Innovation 9(1) 2015 77 World Academy of Science, Engineering and Technology International Journal of Computer and Information Engineering Vol:9, No:1, 2015 Fig. 16 Test bench of discharge battery The combined recharge cycle control is illustrated in Fig. 20 (a) where we can see the first value control corresponding to the current until 80% of SoC and the voltage control from 80% to 100%. Once the SoC is reaching 100%, the Li-Ion recharge is stopped and the control equals to 0 (the value of iLi- Ion(A) in Fig. 20 (a), and the value of Alpha in Fig. 20 (c). Alpha is the temperature coefficient of the short-circuit current). Fig. 19 Simulation of charging voltage and current pack of batteries from PV current applying MPPT algorithm (a) Combined charge cycle vs time (b) SoC vs time (c) Alpha vs time Fig. 20 Li-Ion batteries charge from Lead-Acid batteries using the combined charge cycle 0 2000 4000 6000 8000 10000 12000 25 30 35 40 45 50 55 60 Time (s) Lead-Acid batteries voltage (v) 0 2000 4000 6000 8000 10000 12000 -200 -150 -100 -50 0 Time (s) Lead-Acid batteries current(A) Fig. 19 Simulation of charging voltage and current pack of batteries from PV current applying MPPT algorithm 0 2000 4000 6000 8000 10000 12000 25 30 35 40 45 50 55 60 Time (s) Lead-Acid batteries voltage (v) 0 2000 4000 6000 8000 10000 12000 -200 -150 -100 -50 0 Time (s) Lead-Acid batteries current(A) 0 2000 4000 6000 8000 10000 12000 25 30 35 40 45 50 55 60 Time (s) Lead-Acid batteries voltage (v) Fig. 16 Test bench of discharge battery The proposed model enables to predict the voltage battery for discharging rate other than those given in datasheet. Fig. 17 shows results of battery discharging for I=3.22A and 2.9A. Fig. VI. CONCLUSION VI. CONCLUSION Solutions for Sustainable Environment (CESSE), vol. 18, pp. 538–544, 2012. Solutions for Sustainable Environment (CESSE), vol. 18, pp. 538–544, 2012. To properly coordinate the operations of all elements of charging/discharging system H2V and V2H, a modeling and sizing of the whole system is required to describe and simulate the behavior of each element. In this paper, we performed a mathematical modeling of charging station for EV using solar energy; model parameters of PV panel and Lead-acid battery are identified using fitting methodology. PV and Lead-Acid models are validated experimentally. MPPT control method for obtaining PV maximum power is applied. System sizing is proposed and finally home batteries pack is charged by PV current until reaching full charging voltage. The obtained results show that the batteries Li-Ion can be charged promptly from the current of Lead-Acid batteries using buck/boost converter. In our future work, we will focus on the energy management in both directions H2V and V2H with a particular attention to bring to the battery as mean of energy storage. [15] W. Zhoua, H. Yanga, and Z. Fang, “Battery behaviour prediction and battery working states analysis of a hybrid solar–wind power generation system,” Siencedirecte, Re-newable, vol. 33, pp. 1413–1423, 2008. [16] R.A Jackey, “A Simple effective lead-acid battery modelling process for electrical system component selection,” SAE Technical Paper, 2007. [17] O. Geraud, G. Robin, B. Multon, and H. Ben Ahmed, “Energy modeling of a lead-acid battery within hybrid wind/photovoltaic systems,” European Power Electronic Conference 2003, Toulouse, 2003. [18] M. Dürr, A. Cruden, S. Gair, and J.R. McDonald, “Dynamic model of a lead acid battery for use in a domestic fuel cell system,” Siencedirecte, Journal of Power Sources, vol. 161, pp. 1400–1411, 2006. [19] M. Coleman, C. K. Lee, C. Zhu, and W. G. Hurley, “State-of-charge determination from EMF voltage estimation: Using impedance, terminal voltage, and current for lead-acid and lithium-ion batteries,” IEEE Trans. on Industrial Electronics, vol. 54, no. 5, pp. 2550–2557, 2007. [20] Yuasa Battery, “SWL Batteries stationnaires étanches au plomb à recombinaison de gas régulées par soupapes,” 2010. [21] R. Mkahl, and A. Nait Sidi Moh, “Modeling of charging station batteries for electric vehicles,” J. of Asian Electric Vehicles, vol. 11, no. 2, pp. 1667–1672. 2013. [22] M. Becherif, M. Y. Ayad, D. Hissel, and R. REFERENCES Jorge, “Design Methodology of Energy Storage Systems for a Small Electric Vehicle,” World Electric Vehicle Journal, vol. 3, pp. 1–12, 2009. He has more than six years’ experiences in participating and working in European and national/regional projects. He is principal investigator of a regional project Com-SloT (Community of logistic services on the Internet of Things, 2013-2016). He was Co-PI (UTBM side) of two European projects ASSET (Advanced Safety and Driver Support in Efficient Road Transport, FP7-SST, 2008-2011, and TELEFOT (Field Operational Tests of Aftermarket and Nomadic Devises in Vehicles, FP7-ICT, 2008-2012. He is also a member (UTBM side) of EU EACEA Erasmus Mundus project TARGET (Transfer of Appropriate Requirements for Global Education and Technology), 2011-2014. [8] A. Nouh, “Contribution au développement d'un simulateur pour les véhicules électriques routiers,” Ph. D. thesis, University of Technologie Belfort-Montbeliard 2008. [9] A. Cherif, M. Jraidi, and A. Dhouib, “A battery ageing model using in stand-alone PV systems,” Journal of Power Sources, vol. 112, no. 1, pp. 49–53, 2002. [10] A. Zegaouia, P. Petita, M. Ailleriea, J-P. Sawickia, and J.P Charlesa, “ Experimental Validation of Photovoltaic Direct and Reverse Mode Model. Influence of Partial Shading,” Energy Procedia, vol. 18, pp. 1247–1253, 2012. His research interests include modeling, analysis and control of discrete event systems, resources and information sharing, decision-making and interoperability for service composition, Internet of Things, Geo-positioning and mobility, decision-making and management of EV charging. [11] J. Surya Kumari, and Ch. Sai Babu, “Mathematical modeling and simulation of photovoltaic cell using Matlab-Simulink environment,” International Journal of Electrical and Computer Engineering, vol. 2, no. 1, pp. 26–34, 2012. Maxime, Wack received his PhD degree in 1981 in computer science from the Université de Technologie de Compiègne (UTC), France. Currently, he is associate professor-HDR (Habilité à diriger les recherches) at the laboratory OPERA/FCLAB at the Université de Technologie de Belfort Montbéliard (UTBM). He is the head of the research group Geopositioning, Embedded systems and mobility (GSEM) at UTBM. [12] E. Mboumboue, and D. Njomo, “Mathematical modeling and digital simulation of PV solar panel using Matlab software,” Inter. Journal of Emerging Technology and Advanced Engineering, vol. 3, pp. 24–23, 2013. [13] S. AGBLI, “Modélisation multiphysique des flux énergétiques d’un couplage photovoltaïque-électrolyseur PEM–Pile à Combustible PEM en vue d’une application stationnaire,” Ph. D. thesis, University of Franche comté 2012. REFERENCES [23] A. Ruzmetov, A Nait-Sidi-Moh, M. Bakhouya, and J Gaber, “A (max - plus)-based approach for charging management of electric vehicles,” In Proc. of the 2nd World Conference on Complex Systems, Agadir, Morocco. Nov. 2014. [1] M. G. Egan, D. L. O’Sullivan, J. G. Hayes, M.J. Willers, and C.P. Henze, “Power-factor-corrected single-stage inductive charger for electric vehicle batteries,” IEEE Trans. on Industrial Electronics, vol. 54, no. 2, pp. 1217–1226, 2007. [2] Z. P. Wang, P. Liu, H. B. Han, C. Lu, and T. Xin, “ Adistribution model of electric vehicle charging station,” Applied Mechanics and Materials, 44–47, pp. 1543–1548, 2011. Rania, Mkahl is a PhD student working at the University of Technology Belfort-Montbéliard (UTBM), Belfort, France. Her PhD thesis is part of research collaboration between the UTBM and the University of Picardie Jules Verne (UPJV) – INSSET, Saint Quentin, France. She received her Master’s degree in Electrical Engineering from the Ecole Centrale of Lyon, France in 2010. Prior to beginning the Master and PhD programs, she worked as assistant professor at the Tishreen University, Syria. Her main research interests are modeling, control and management of energy flows H2V and V2H, charging process of electric vehicles, renewable energy for EV charging, decision-making, simulation and operations research. [3] A. Ruzmetov, A. Nait Sidi Moh, M. Bakhouya, J. Gaber, and M.Wack, “Optimal assignment and charging scheduling of electric vehicles,” IEEE International Renewable and Sustainable Energy Conference (IRSEC'13) Ouarzazate, Morocco, 10.1109/IRSEC.2013.6529691, pp. 537 –541, 2013. [4] J. Song, Amir Toliyat, Dave Tuttle, and Alexis Kwasinski, “A Rapid Charging Station with an Ultracapacitor Energy Storage System for Plug-In Electrical Vehicles,” Electrical Machines and Systems (ICEMS), 2010, International Conference on, pp. 2003-2007, 2010. [5] J. Baker, “New technology and possible advances in energy storage,” Energy Policy, vol. 36, pp. 4368–4373, 2008. Ahmed, Nait-Sidi-Moh received his Ph.D. degree in 2003 in Computer Engineering and Automatic Control from the University of Technology of Belfort Montbéliard (UTBM), France. He is currently an Associate Professor of Computer Engineering at the University of Picardie Jules Verne (UPJV). Prior to joining the UPJV, he was research scientist and lecturer at the UTBM. [6] A. Boucherit, “ Conception d’un convertisseur de puissance pour les véhicules électriques multi-sources,” Ph. D thesis of University Technologie de Belfort –Montbéliard, 2011. g [7] J. P. Trovão, P. G. Pereirinha, and H. M. B. Simulation Results of Battery Lead-Acid 20 Li-Ion batteries charge from Lead-Acid batteries using the combined charge cycle scholar.waset.org/1307-6892/10000396 International Scholarly and Scientific Research & Innovation 9(1) 2015 78 World Academy of Science, Engineering and Technology International Journal of Computer and Information Engineering Vol:9, No:1, 2015 VI. CONCLUSION Mkahl, “Design and sizing of a stand-alone recharging point for battery electrical vehicles using photovoltaic energy,” IEEE Vehicle Power and Propulsion Conference, 10.1109/VPPC.2011.6043075, pp. 1–6, 2011. World Academy of Science, Engineering and Technology International Journal of Computer and Information Engineering Vol:9, No:1, 2015 EACEA Erasmus Mundus project TARGET (Transfer of Appropriate Requirements for Global Education and Technology), 2011-2014. His research interests include information systems, security, digital signature and certification, ubiquitous and pervasive computing, location based services and distributed systems, energy. scholar.waset.org/1307-6892/10000396 International Scholarly and Scientific Research & Innovation 9(1) 2015 REFERENCES He was Co-PI of two European projects ASSET (Advanced Safety and Driver Support in Efficient Road Transport, FP7-SST, 2008-2011, and TELEFOT (Field Operational Tests of Aftermarket and Nomadic Devises in Vehicles, FP7-ICT, 2008-2012. He is also a member (UTBM side) of EU [14] N. Achaibou, M. Haddadi, and A. Malek, “Modelling of lead acid batteries in PV systems,” Siencedirecte, Energy Procedia, Clean Energy scholar.waset.org/1307-6892/10000396 International Scholarly and Scientific Research & Innovation 9(1) 2015 79 International Science Index, Computer and Information Engineering Vol:9, No:1, 2015 waset.org/Publication/10000396 ce Index, Computer and Information Engineering Vol:9, No:1, 2015 waset.org/Publication/10000396 International Science Index, Computer and Information Engineering Vol:9, No:1, 2015 waset.org/Publication/10000396 International Science Index, Computer and Information Engineering Vol:9, No:1, 2015 waset.org/Publica scholar.waset.org/1307-6892/10000396 International Scholarly and Scientific Research & Innovation 9(1) 2015 80
https://openalex.org/W2113199572
https://www.ajol.info/index.php/lex/article/download/49172/35515
English
null
Target Users' Expectations versus the Actual Compilation of a Shona Children's Dictionary
Lexikos
2,009
cc-by
6,784
Target Users' Expectations versus the Actual Compilation of a Shona Children's Dictionary Esau Mangoya, African Languages Research Institute, University of Zimbabwe, Harare, Zimbabwe (emangoya@arts.uz.ac.zw) Esau Mangoya, African Languages Research Institute, University of Zimbabwe, Harare, Zimbabwe (emangoya@arts.uz.ac.zw) Abstract: The article discusses the challenges that confronted the team of compilers working on the monolingual Shona Children's Dictionary (henceforth SCD). It looks at the active involve- ment of the target users in shaping the project and discusses the considerations for the implemen- tation of their recommendations. Matters of concern include issues of headword selection, espe- cially problems of dialect representation in the dictionary. The article also discusses the inclusion of grammatical information such as tone marking. The SCD is one of the many efforts to promote and raise the functions of the indigenous languages in Zimbabwe. Of special interest in this article is therefore the discussion on the inclusion of international words like those denoting weight, dis- tance and mathematical and scientific concepts. The article also considers the treatment of taboo words in the SCD, which takes into account that society has to open up culturally to be able to unequivocally view some of the aspects of life with which present-day children are confronted. The article lastly discusses how a balance was reached for accommodating the target users' proposal for the inclusion of an elaborate back matter in view of the limited available scope and space of the SCD. Introduction A team of three people at the University of Zimbabwe's African Languages Research Institute (ALRI) embarked on a pioneering project to compile a monolingual Shona Children's Dictionary (henceforth SCD) whose main target users are school children at primary level. This team worked closely with teachers and parents who automatically became an interested party in the dic- tionary project, consequently constituting the majority of the target users. The project started in 2002 and the dictionary was supposed to be published in 2006. However, there were technical hitches which saw the draft of the diction- ary being submitted to the publishers only in 2009. y g p y In Zimbabwe, a culture of dictionary compilation and use has not been thoroughly developed. Consequently, most of the lexicographic products in the Zimbabwean context come as pioneering projects. In societies with a long his- tory of lexicography, it is easy to identify the gaps that a newly initiated dic- tionary project is meant to fill within the context of other earlier and previously published dictionary products. In such situations, both the compiler and the target users have a common goal and expectation. The target users' needs are easy to identify and satisfy since the compiler will not be starting a completely new process. However, despite the varying needs of the target users and the difference in the challenges faced by compilers working on different dictionary projects, the target users' needs have to remain a priority. Hartmann (2001: 80) says: "Ultimately all dictionaries are motivated by and judged against the lexi- cal needs of those who consult them." Emphasis is always laid on the need to address the target users' expecta- tions. Gouws (1993: 29) says: "It is an accepted fact that every dictionary has to be compiled in accordance with specific needs and demands of a well-defined target user." Here the task for the compiler is clearly defined. The parameters for the production of a "perfect" dictionary are delineated. The expectations are that a dictionary must have authority, scholarship and precision (Landau 2001: 6). At the same time, it has to be considered that their expectations differ for various reasons, including the linguistic and the socio-cultural nature of the communities for which the dictionaries are compiled. As a result, each diction- ary project may face problems that remain peculiar to it. Keywords: TARGET USERS, DIALECT REPRESENTATION, INTERNATIONAL WORDS, TABOO WORDS, TONE MARKING, BACK MATTER, DICTIONARY, LEXICOGRAPHY Keywords: TARGET USERS, DIALECT REPRESENTATION, INTERNATIONAL WORDS, TABOO WORDS, TONE MARKING, BACK MATTER, DICTIONARY, LEXICOGRAPHY Opsomming: Teikengebruikers se verwagtinge teenoor die werklike same- stelling van 'n Sjonakinderwoordeboek. Die artikel bespreek die uitdagings waarvoor die span samestellers te staan gekom het tydens werk aan die eentalige Sjonakinderwoordeboek (voortaan SKW). Dit kyk na die aktiewe betrokkenheid van die teikengebruikers by die ontwikke- ling van die projek en bespreek die oorwegings vir die uitvoering van hulle aanbevelings. Sake van belang sluit in kwessies van trefwoordkeuse, veral probleme van dialekverteenwoordiging in die woordeboek. Die artikel bespreek ook die insluiting van grammatiese inligting soos toonaandui- ding. Die SKW is een van die baie pogings om die funksies van die inheemse tale in Zimbabwe te bevorder en te vergroot. Van spesiale belang in hierdie artikel is dus die bespreking oor die inslui- ting van internasionale woorde soos dié wat gewig, afstand en wiskundige en wetenskaplike kon- septe benoem. Die artikel beskou ook die behandeling van taboewoorde in die SKW wat in aan- merking neem dat die gemeenskap kultureel oper moet word om in staat te wees om sommige aspekte van die lewe waarvoor hedendaagse kinders te staan kom, onomwonde te beskou. Laas- tens bespreek die artikel hoe 'n balans verkry is om die teikengebruikers se voorstel vir die inslui- ting van 'n uitvoerige agterwerk in te pas in ooreenstemming met die beperkte beskikbare omvang en ruimte van die SKW. Lexikos 19 Supplement (AFRILEX-reeks/series 19: 2009): 120-133 121 The Compilation of a Shona Children's Dictionary Dialectal Representation Shona has five major dialects namely: Karanga, Zezuru, Ndau, Manyika and Korekore. What the research team gathered from the outreach programmes and workshops was that in the past there has been preferential treatment of the Zezuru and Karanga dialects in the Shona resource books used at primary school level. These two dialects have minimal differences compared to the rest of the dialects. This tended to disadvantage pupils who speak other dialects and it was alleged that there was a high failure rate in Shona examinations among them. Zezuru and Karanga which are more central to the whole Shona- speaking community are inclined to dominate and the rest of the dialects play a peripheral role. The feeling was that children particularly from Ndau- and Korekore-speaking areas fail to comprehend the vocabulary from the central dialects. Manyika figured less prominently in the debate as it forms a buffer dialect that is in contact with the central dialects and Ndau and Korekore. Doke (1931: 81) laid down the basic principle that was to be followed in the compilation of Shona dictionaries. He recommended that if a Shona dic- tionary should be compiled, it has to be as inclusive as possible of words from Zezuru, Karanga, Manyika and Ndau, but for the time being Korekore words have to be admitted sparingly. On the contrary, earlier in his report, on page 9, he shows reservations about the inclusion of Ndau words when he says: "Into their vocabulary is quite a noticeable infiltration of Zulu following the conquest of Gungunhana." This gives the impression that from the time of the defeat of the Ndau, their dialect is no longer pure. As a result Ndau and Korekore can- not without reservations be seriously considered as dialects of Shona. Today the speakers of these dialects are fighting to have their dialects recognized as belonging to the Shona language. A new environmental situation has given them reason to clamour for recognition of their dialects. This is in view of the recommendations by the National Language Advisory Panel of 1998. In the report, Chimhundu et al. Introduction The SCD team con- ducted outreach programmes and workshops with the aim of determining the actual needs and expectations of the target users. Primary school teachers, pri- mary school children and interested and knowledgeable parents were con- sulted during these programmes and workshops. This article discusses the challenges that the team compiling the SCD faced in view of the recommenda- tions given by the target users. The problematic areas that the team had to deal 122 Esau Mangoya with are mainly dialectal representation, tone marking for the purpose of pro- nunciation, inclusion of international words, the treatment of words deemed culturally taboo and the setting of the back matter. Dialectal Representation (1998: 36) say: "Use of indigenous/local languages should be made mandatory in schools firstly as subjects and later as the medium of instruction." Although Korekore and Ndau are dialects of Shona, their clamour for recognition is similar to that of some Zimbabwean indigenous languages which ought also, according to the report, to be granted the same right as the other languages. The SCD team had to do strategic research in order to cover the so-called neglected dialects as much as possible. After going through the usual head- word selection process in which student research assistants were involved, the team printed a list of the collected headwords. This also saw a substantial number of headwords from these neglected dialects appearing. The next stage 123 The Compilation of a Shona Children's Dictionary was to engage the target users, comprising teachers, children and parents. The group of teachers that was engaged firstly had to be speakers of one of these neglected dialects, and secondly had to be teaching in schools in areas where these dialects are spoken. These teachers had the advantage of being speakers and practitioners who were knowledgeable about the problems their pupils face when learning Shona as a subject. g j In this way, an additional list of headwords was collected. However, at the same time this strategy also encountered its own problems. As is always the case with groups that feel excluded, there is a tendency to be emotional about their dialects and languages, trying to be as inclusive and exhaustive as possi- ble. Therefore, because of this, a problem surfaced with regard to the many synonymous headwords from the Ndau and Korekore dialects in comparison with the single headwords from the central dialects as shown in (1) and (2) below. Dialectal Representation (1) central dialects headword headwords from Ndau chikuvauro chikwa, chichayo chiroo (wooden tool used for flattening the floor) guvhu chikuvhu, chikumvu, mukuvhu (navel) (2) central dialects headword headwords from Korekore gangamwiwe fengu, topo, mupagada (type of inedible pumpkin) gangemukange madzimba, majochwe (type of ant) (1) central dialects headword headwords from Ndau chikuvauro chikwa, chichayo chiroo (wooden tool used for flattening the floor) guvhu chikuvhu, chikumvu, mukuvhu (navel) (2) central dialects headword headwords from Korekore gangamwiwe fengu, topo, mupagada (type of inedible pumpkin) gangemukange madzimba, majochwe (type of ant) headwords from Ndau chikwa, chichayo chiroo (wooden tool used for flattening the floor) chikuvhu, chikumvu, mukuvhu (navel) headwords from Ndau chikwa, chichayo chiroo (wooden tool used for flattening the floor) chikuvhu, chikumvu, mukuvhu (navel) (2) central dialects headword gangamwiwe This automatically implies that lexical items from those regions are discriminated against when it comes to entering them into the dictionary. This is a feature not peculiar to the Zimbabwean situation only. In general lexicographic works elsewhere, it has also been pointed out that dialects are considered substandard if not plainly incorrect (Landau 2001: 220). The assertion is showing that dialect issues are always problematic. Wherever they feature, they present emotional sentiments. In the Korekore and Ndau situation, their exclusion or selective inclusion leads to protest by speakers who see it as an injustice. y To omit or partly omit some dialect forms such as those from Korekore and Ndau as suggested by Doke, should serve as a warning not to disregard peripheral dialects. However, sidelined dialects will always have their head- words not well recognised in other Shona-speaking areas. As a result, words from these dialects are not quite as familiar to many of the compilers compared to items from the central dialects. The forms of these recognised dialects are always the first to be included in the dictionaries. The central varieties also enjoy being used as the standard, their vocabulary featuring prominently in literary publications which are normally the source for headwords in the dic- tionaries. Consequently, Korekore and Ndau dialects have always been side- lined in Shona publications including dictionaries that are purported to be comprehensive. p There has to be a policy for handling the dialectal items. As one way of standardising Shona, Doke (1931: 81) recommended that a dictionary has to be a collection of headwords gathered from the different dialects. This has how- ever been found to be a too simplistic way of dealing with the persistent ques- tion of unfair treatment of dialects in Shona dictionaries. With every publica- tion there have been allegations by speakers of other dialects that there were no headwords included from their dialects. These groups that maintain that their dialects are not being considered in written Shona also claim that the pass rate in Shona examinations in those areas where Ndau and Korekore are spoken are perpetually low because pupils are always made to study texts representing the central dialects. This is the major reason why target users from those areas were engaged as a reference group. (2) central dialects headword gangamwiwe headwords from Korekore fengu, topo, mupagada (type of inedible pumpkin) madzimba, majochwe (type of ant) headwords from Korekore fengu, topo, mupagada (type of inedible pumpkin) madzimba, majochwe (type of ant) There came plenty of headwords from the excited group of target users who had received the opportunity to show the linguistic ability of their dialects. This resulted in a variety of synonyms and variants to single headwords from the central dialects. This obviously was a strenuous effort by the speakers to try to prove as much as possible that their dialects have plenty of words that are always omit- ted. This great number of words posed yet another problem to the dictionary compilers because not all the headwords that were given would be of complete equivalence to the headwords from the central dialects and even amongst the presumed peripheral dialects themselves. This would result in a situation whereby words from the presumed peripheral dialects dominate at the expense of the central dialects. The other problem was how to determine the level of synonymy the terms from the peripheral dialects have among themselves and to those from the central dialects. It seems as if these dialects have a higher level of term productivity than the central dialects. This touches on the sociolinguistic situation of the people in Zimbabwe. Theirs is a reaction to the colonial history in which the administrative demar- cations have become tribal demarcations as well. Dialects become a feature of speech that serves to identify the speaker as a member of a particular speech community, past or present (Landau 2001: 220). This provides the speakers of 124 Esau Mangoya dialects with arguments as they protest at being deliberately excluded where the rule and policy is that the local and indigenous languages have to be empowered without discrimination. The empowerment of languages, as given in the Advisory Panel Report, also means all the dialects have to enjoy equal status. After independence, the policy has been set as a goal to empower the indigenous languages which have always come second to English. The policy sounds all-embracing, implying that there has to be equal treatment of the indigenous languages and implicitly their dialectal varieties. As pointed out by Landau (2001: 219), forms of expression and pronunciation limited to a par- ticular region have long been regarded as objects of contempt and ridicule. (4) central dialects headword gangamwiwe (4) central dialects headword gangamwiwe gangemukange headwords from Korekore (3) fengu, (2) opo, (1) mupagada (type of inedible pumpkin) (1) madzimba, (2) jochwe (type of ant) gangemukange This ranking was helpful in eliminating headwords from Korekore and Ndau as all those indicated as first were also considered for entry into the dictionary. Tone marking Tone is a fundamental aspect of language. It refers to the distinctive pitch level of a syllable (Crystal 1983: 353). In Shona, the tone contrasts of syllables in words are vital in bringing out the meaning of words. Indicating the tone of words in a dictionary is also important in demonstrating the way words are pronounced. The issue of tone marking became problematic when a recom- mendation against its inclusion was suggested by the prospective target users during the workshops and outreach programmes. As compilers become well acquainted with dictionary making, some of the practices become routine, usu- ally laid down as standard. ALRI's first two monolingual dictionaries Dura- mazwi reChiShona (1996) and the advanced Duramazwi Guru reChiShona (2001) did not only include tone markings but went a step further by coining the Shona terms for high and low tone. These are K from kwidza (raise) for high tone and D from dzikisa (lower) for low tone, as shown in example (5) of the headword akapero (acapella music). 5) akapero DDKD z 9 (2) central dialects headword gangamwiwe However, with the abundance of head- words coming from these target users, some of them had to be eliminated to balance the dialect ratio in the dictionary. The target users were asked to rank 125 The Compilation of a Shona Children's Dictionary the Ndau and Korekore words they had provided in order of preference based on their knowledge of the precise equivalence of these words with the head- words from the central dialects. Eventually the ordering of the above examples was reached as shown under (3) and (4). (3) central dialects headword headwords from Ndau chikuvauro (2) chikwa, (3) chichayo, (1) chiroo (wooden tool used for flattening the floor), guvhu (1) chikuvhu, (3) chikumvu, (2) mukuvhu (navel) (3) central dialects headword chikuvauro guvhu headwords from Ndau (2) chikwa, (3) chichayo, (1) chiroo (wooden tool used for flattening the floor), (1) chikuvhu, (3) chikumvu, (2) mukuvhu (navel) (5) akapero DDKD z 9 (5) (5) The headword has four syllables a+ka+pe+ro. D stands for low tone and K for high tone. So the first two syllables a and ka marked by DD are low tones, the third syllable pe marked by K is high tone and the last one ro marked again by D is low tone. After the tone comes other vital information like z from zita (noun) which is of class 9, then followed by the definition. In Shona lexicogra- phy, tone markings are relatively new grammatical coinages that are being 126 Esau Mangoya standardised not only in the SCD, but also in other ongoing projects that deal with Shona language and grammar. standardised not only in the SCD, but also in other ongoing projects that deal with Shona language and grammar. The target users' position can be understood. The introduction of new elements such as tone marking which gives specialised grammatical informa- tion vital to the pronunciation of words is mostly regarded with reservation. The main question arose whether the SCD team had to include information which did not interest the target users. On the other hand it can also be asked if tone marking should be omitted simply because some target users are not fully acquainted with its use. The problem was complicated by the fact that the speakers of the central dialects needed assistance in the pronunciation of the many new headwords from Ndau and Korekore as much as the speakers of these peripheral dialects needed to acquaint themselves with the tone of the headwords from the central dialects. As a result, the inclusion of tone was considered helpful to users when pronouncing words. It may be argued that children have not yet been exposed to these complicated grammatical aspects such as tone. However, this informa- tion may assist the teacher working with the children. A dictionary that is inclusive has an added advantage to those who might need that extra informa- tion. The teacher can help pupils extract what is relevant to them. At the same time the availability of a dictionary which has extra details leaves the teacher assisting the pupils with additional information although the pupils may not use it themselves. This does not mean that the suggestions by the target users had to be disregarded completely, but the merit of such suggestions had to be reviewed as well. (5) As a reference work, a dictionary has many functions. The SCD team agreed that there was need to have the tone marked in the data base and again recommended the idea of indicating tone in the dictionary to the working groups consisting of target users. The admissibility of tone markings in the dictionary were again assessed in the sample headwords and definitions which were taken to the target users during the outreach and seminar programmes. When the same aspects are again brought up for discussion and viewed in print the target users are normally forthcoming with suggestions for improve- ment. Tone marking was eventually accepted as an essential tool in the diction- ary. International Words What have come to be regarded as international words are those ones that have originated in particular languages but are now used across the world in almost every language. At this stage, they have not been adopted in the Shona lan- guage yet but because of their specialised sphere of use are always mentioned in Shona texts. Examples of these are words denoting weight, length and sci- entific and mathematical terms, as demonstrated in the examples under (6). 127 The Compilation of a Shona Children's Dictionary (6) g g length: centimetre, metre, kilometre These and many others are recognised standard terms in many languages. The initial view on the possible inclusion of these terms in the SCD was purist in nature. As they were considered foreign, they were seen as unsuitable for a dic- tionary meant to strengthen children's communication skills in the Shona lan- guage. However, because the purpose of compiling the dictionary was to empower the Shona language, brought some change in perception. The lan- guage has to be developed so that it would be able to describe scientific con- cepts. The target users did not accept the idea of outright adoption but opted for the coinage of "pure" Shona terms. A precedence has already been set before when coinage was attempted in Hannan's (1981) Standard Shona Diction- ary which yielded words like dutavanhu (bus), hambautare (motorcar) and bhi- zautare (bicycle) in an attempt to avoid using English terms. Naturally, when people speak they say bhazi (bus), motokari (motorcar) and bhasikoro (bicycle) which are all adoptives. People hardly use the once prescribed coinages. p p y p g Being aware of the fate of some coinages in Hannan's dictionary, the SCD team of compilers argued against their inclusion. These coinages would end up as redundant entries in the dictionary and the terminological gap they were meant to fill would remain open. If its natural behaviour is considered, a lan- guage gives preference to adoptives that are close to the source language in spelling and pronunciation. However, there was the difficulty that some of the borrowed headwords had to be adapted to suit the Shona spelling system. Taboo words Another category of words that needed special attention was taboo words. Taboo words are known to speakers but avoided in some, most or all forms or contexts of speech (Matthews 1997: 371). Considerations regarding taboo words can be culture-bound. Culture, however, changes, causing the taboo tag given to some lexical elements to be removed partly or wholly. It is important for dictionary compilers to fully know and understand the feelings of the target users on some important aspects of the dictionary they compile. The issue becomes much more complicated when questions arise on whether some aspects are culturally acceptable to be entered into the dictionary. The diction- ary compiler has to have a full understanding of the users whom the compilers have sometimes ignored so that there was little appreciation for some diction- ary products. The position of target users has to be ascertained in order to avoid criticism of the dictionary product. About the dictionary user, Hartmann (2001: 80) says: "We still know very little about the dictionary user whom sev- eral authorities have called the familiar stranger, presumably because we take him for granted without bothering further." g g Hartmann's assertion assumes that the participation of the target users in making their recommendations towards the contents of a dictionary may help enhance the lexicographer's insights leading to a lexicographic product that answers the user's needs. The question that has to be answered is whether the shape of a dictionary should be completely determined by the target users. Does the compiler have some authority and power to incorporate new chal- lenges that can help change the society's view of the world? Such challenges were encountered in the compilation of the SCD with regard to taboo words. The target users, particularly the teachers and parents, were clear and adamant that human private parts and some physiological terms would not be accept- able in a dictionary meant for children. According to their view, these children are at the critical stage where there has to be a total induction into their culture. Part of the culture forbids having access to knowledge of these taboo words, particularly by primary school children. The refusal to enter headwords deemed to be breaching the ethical code of the society is not peculiar to the Zimbabwean situation. International Words The examples of the international words above were entered as shown under (7): (7) weight: kirogiramu, tani length: sendimita, mita, kiromita scientific and mathematical terms: atomu, ikwezheni, ikweta (7) weight: kirogiramu, tani length: sendimita, mita, kiromita scientific and mathematical terms: atomu, ikwezheni, ikweta The Shona alphabet does not have the letter l but the trend has been that it can be substituted by r, hence the change from the English term kilogramme to kiro- giramu. In Shona, the vowel o cannot be realised as /a/ as in the case of the English word tone in which the first syllable sounds like /ta/. The new adop- tive for tone is now /tani/. Similarly the initial vowel e in the word equator is realised as /i/, therefore the change to /ikweta/. All syllables in Shona are marked by a vowel, hence the change of the word mitre to /mita/ where it now has the syllables /mi/ and /ta/. The adoptives had to be adapted to the Shona writing system. This was found to be an important step towards empowering the Shona language, par- ticularly in a book targeted at a group that is at the foundation level of the edu- cation system. This will give the target users the confidence to use the language in fields where other languages such as English have always dominated. The target users' creative abilities will be enhanced. This will broaden their view of 128 Esau Mangoya the world in which they, using their mother tongue, can be active participants. The belief is that what has already been initiated will continue and eventually the Shona language will not be void of such important terminology. Taboo words All communities at the initial stages of their lexicographic tradition seem to follow the trend of reser- vations on the inclusion of what is deemed taboo (see Landau 2001 : 228). There is the feeling that the exclusion of taboo words contributes towards the up- holding of ethical values. Because the situation of the SCD was found to be rather unique, it brought 129 The Compilation of a Shona Children's Dictionary a number of challenges. Firstly, by aiming primary school children as target users, the dictionary belongs to a type of its own in comparison to the earlier publications Duramazwi reChiShona (1996), targeted at ordinary level students and Duramazwi Guru reChiShona (2001), targeted at college and university level students. Secondly, there are new challenges not only to the Zimbabwean soci- ety but to societies worldwide that need to be addressed to this age group as a matter of urgency. One channel of doing so is through books such as the SCD. Because the world is changing fast, what society once might have strongly con- sidered taboo might need to be reconsidered in today's world. One of the big- gest challenges that have besieged the world is the advent of HIV and AIDS. There is also the problem of the early indulgence in sexual intercourse by today's children and the dangers that go with such activities. There is the ram- pant problem of child abuse and rape. These and other challenges have re- sulted in the need to teach and inform children as a precautionary measure about the dangers of the various sexually transmitted diseases and the eventual consequences. All these problems cannot be fully understood if discussed in unclear and veiled language. In Zimbabwe, the language situation is such that English has been ac- corded the official status and Shona has always come second to English. This has led to a culture in which anything presumed to contain difficult and for- eign concepts should be explained in English. Everything is left to feature in the English texts to which the majority of school-going children eventually have access. However, since English in Zimbabwe is learnt as a second lan- guage, there is little consideration at what time or stage in the children's edu- cational development, they will be able to fully comprehend English. This has consequently led to the exclusion and avoidance of vital terms in Shona text- books. Taboo words The SCD was caught up in a similar dilemma. As a result, the teachers who have become accustomed to this culture over the years oppose the inclu- sion of these taboo words in a children's dictionary, their argument being that it will be antisocial to expose children to such terminology. After serious discussions, it was agreed that some of these presumed taboo words had to be included as long as their role was to give information found to be vital to the children. These are terms specifying the body parts, describing the signs and symptoms of venereal diseases and naming some sex- ual activities which cannot be avoided mentioning when teaching the children. Examples of such headwords are listed under (8). mhata (anus) mheche (vagina) mboro (penis) maronyo (sperm/semen) siki (venereal disease) njovhera (type of venereal disease) -svira (have sexual intercourse) (8) 130 Esau Mangoya These were allowed into the dictionary because of needs and challenges. How- ever, despite their relatedness to the words under (8), there were some reserva- tions on the inclusion of another group of words which were deemed unneces- sary for the level of primary school children. These are common taboo words describing the nature of certain sexual organs or the manner of some sexual ac- tivities. Examples of words about which teachers had reservations are given under (9). (9) beche (big vagina) zimboro (big penis) nzvonyo (circumcised penis) mukodo (sexual intercourse from the back) mufongo (sexual intercourse from the back) (9) beche (big vagina) zimboro (big penis) nzvonyo (circumcised penis) mukodo (sexual intercourse from the back) mufongo (sexual intercourse from the back) (9) beche (big vagina) zimboro (big penis) nzvonyo (circumcised penis) mukodo (sexual intercourse from the back) mufongo (sexual intercourse from the back) (9) beche (big vagina) zimboro (big penis) nzvonyo (circumcised penis) mukodo (sexual intercourse from the back) mufongo (sexual intercourse from the back) (9) It was agreed that specimens of normal use should be given for nouns. It was felt that including words meant to give an obscure or indistinct explanation of the mentioned organs and activities would actually destroy the main aim of teaching, and could create confusion and uncertainty in the children that will in reality be contrary to the aim and purpose of the words' inclusion. So the taboo words would have to be selectively entered into the dictionary. Taboo words Inclusion of some of the vital words will assist in the newly introduced subjects on HIV and AIDS. The children are also being taught issues of human rights in which child sexual abuse would be discussed. Children should know what abuse is and should be able to describe it if the need arises. Because teachers and parents should be able to talk to the children, the vocabulary that was considered to be taboo has to be made normal and familiar by including it in a general diction- ary such as the SCD. Back Matter One of the main concerns of a dictionary is to give comprehensive information. A dictionary of the SCD type has to contain information on issues children might not have had a true experience of and direct exposure to in their lives. For example, a child born and bred in town might not be fully aware of aspects that are predominantly rural and vice versa. As a result the dictionary is expected to play an informative role with many aspects reserved for the back matter. As has been pointed out, the SCD project generated much interest among teachers who played a major role as a reference group advising the compiling team. There was also much interest from the community at large who also felt the dictionary would be a useful resource for their children, par- ticularly when writing the Grade 7 Shona examinations. These are vital exami- nations which need to be passed before children can proceed to secondary level. There have always been complaints from teachers and parents about the 131 The Compilation of a Shona Children's Dictionary lack of resource materials for the Shona examinations at primary school level. The idea was to try as much as possible to provide for the different sections of the examinations usually written at this level. So the SCD project was consid- ered to be a major step in compensating for this lack. This resulted in a number of suggestions on additions to be made to the dictionary over and above the general headwords and their definitions. All the additional information could be placed in the dictionary as back matter. It was suggested that this back mat- ter could include a list of people and their professions, a list of animals and their young ones, illustrations of kitchen utensils, a list of common proverbs and idioms and a list of kinship terms. While this would generally be a recom- mendable idea, it had its own limitations. An example of how this was to be done is shown under (10). Conclusion It is every dictionary compiler's wish to produce a dictionary that fully makes provision for the needs of target users. As a result, it is necessary to consult its prospective target users. The SCD project involved them to a great extent. However, each dictionary project faces challenges of a general nature and at times some which are peculiar to it. This article has discussed those which are peculiar to the SCD, starting with the nature of the target user group which mostly comprised teachers and parents, despite the fact that the real target users are children. Children as a group have to be guided, hence they are mostly represented by the teachers and parents so that their own contribution is minimal. The article has discussed the discrepancies that in the past occurred in the treatment of Shona dialects. It has looked at the pressure exerted by the speak- ers of the neglected dialects, showing how the new scenario has impacted on the SCD project, including the problem of excessive headwords that had to be reduced to bring about a balance with other dialects. Dictionary making is also important in introducing and standardising new aspects for the benefit of tar- get users. As a result, the SCD tried to uphold the new phenomenon of mark- ing the tone, which is vital for the pronunciation of headwords. Although tar- get users are not yet comfortable with tone marking, it is hoped that once introduced and maintained as a lexicographic tradition, target users will soon be familiar with it. This being a pioneering project of a unique nature, it had to confront new challenges. As a result it included some adopted international words. This is an attempt to bring Shona on the same level of communicative ability with other developed languages so that foreign languages need not to be used in discus- sions dealing with foreign concepts. As the world is changing, this also de- mands cultural change. Therefore, the once considered taboo words found their way into the SCD. The aim is to enable communication with the children, so resources such as the SCD must have a high information level. For this rea- son, some additional carefully selected material has been added as back matter to the general dictionary, at the same time taking limitations of space and detail into account. (10) Tete ihanzvadzi yababa (One's aunt is one's father's sister) Tezvara ndibaba vomudzinai (One's father-in-law is one's wife's father) (10) Tete ihanzvadzi yababa (One's aunt is one's father's sister) Tezvara ndibaba vomudzinai (One's father-in-law is one's wife's father) From the first example, the words tete (aunt), hanzvadzi (sister) and baba (father) would have been entered as headwords in the dictionary. Such is also the case with words like tezvara (father-in-law), baba (father) and mudzimai (wife) from the second example. They again appear as repeat entries in the back matter where they, despite being combined in a new context, are in fact a duplication within the same dictionary. Such is also the case with illustrations and all the aspects that were suggested for inclusion in the back matter. A careful selection had to be made to include only those that would bring extra information beyond what could already be found in the headword section. An example of a topographical illustration that was chosen, is a mountain. The illustration would then show gomo (mountain), mawere (cliff), mupata (valley) and bako (cave). The lexicographer is always contending with the issue of space in the dic- tionary. At the same time, it has to be understood that the dictionary has its limitations as a reference book. It cannot be the ultimate solution to everything related to examinations. Moreover, as this is a general and not an encyclopae- dic dictionary, it was found to be difficult to include all the suggested aspects in the back matter limited by size and detail. Eventually it was resolved that the dictionary could include trimmed lists. However, the compilers had to be careful not to outrightly refuse special requests from the reference group which forms a major component of the target users. As a compromise it was agreed that some of the requests would actually be better incorporated in school text books. A dictionary was only meant to ad- dress problems that usually arise out of the subject matter of text books. It was not meant to provide solutions for these problems and at the same time func- tion as a text book which addresses all aspects of Shona as a school subject. It was hoped that the compilation of the SCD would help generate interest by other relevant participants to write Shona books for primary school level. 132 Esau Mangoya 132 Esau Mangoya Conclusion Challenges occur in dictionary making but they can be discussed and overcome in some way or other. Chimhundu, H. et al. 1998. Report on the Formulation of a National Language Policy. Harare: Ministry of Sport, Recreation and Culture. Chimhundu, H. (Ed.). 1996. Duramazwi reChiShona. Harare: College Press. Chimhundu, H. (Ed.). 2001. Duramazwi Guru reChiShona. Harare: College Press. Doke, C. 1931. Report on the Unification of Shona Dialects Carried Out under the Auspices of the Govern- ment of Southern Rhodesia and the Carnegie Corporation. Hertford: Stephen Austin. Crystal, D. 1991. A Dictionary of Linguistics and Phonetics. Third Edition. Cambridge: Basil Black- well. Hartmann, R.R.K. 2001. Teaching and Researching Lexicography. London: Longman. Hannan, M. 1959. Standard Shona Dictionary. Salisbury: The College Press. Landau, S.I. 2001. Dictionaries: The Art and Craft of Lexicography. Second Edition. Cambridge: Cam- bridge University Press. Crystal, D. 1991. A Dictionary of Linguistics and Phonetics. Third Edition. Cambridge: Basil Black- well. Gouws, R.H. 1993. Afrikaans Learner's Dictionaries for a Multilingual South Africa. Lexikos 3: 29- 66. Hannan, M. 1959. Standard Shona Dictionary. Salisbury: The College Press. Hartmann, R.R.K. 2001. Teaching and Researching Lexicography. London: Longman. Landau, S.I. 2001. Dictionaries: The Art and Craft of Lexicography. Second Edition. Cambridge: Cam- bridge University Press. Matthews, P.H. 1997. Oxford Concise Dictionary of Linguistics. Oxford: Oxford University Press. Mpofu, N. et al. (Eds.). 2004. Duramazwi reUrapi neUtano. Gweru: Mambo Press. References 133 The Compilation of a Shona Children's Dictionary Crystal, D. 1991. A Dictionary of Linguistics and Phonetics. Third Edition. Cambridge: Basil Black- well. Gouws, R.H. 1993. Afrikaans Learner's Dictionaries for a Multilingual South Africa. Lexikos 3: 29- 66. Hannan, M. 1959. Standard Shona Dictionary. Salisbury: The College Press. Hartmann, R.R.K. 2001. Teaching and Researching Lexicography. London: Longman. Landau, S.I. 2001. Dictionaries: The Art and Craft of Lexicography. Second Edition. Cambridge: Cam- bridge University Press. Matthews, P.H. 1997. Oxford Concise Dictionary of Linguistics. Oxford: Oxford University Press.
https://openalex.org/W2305302216
https://iris.uniroma1.it/bitstream/11573/904109/1/Midulla_Paediatrics%20messages%20from_2015.pdf
English
null
Paediatrics: messages from Munich
ERJ open research
2,015
cc-by
16,144
MESSAGES FROM MUNICH PAEDIATRICS MESSAGES FROM MUNICH PAEDIATRICS MESSAGES FROM MUNICH PAEDIATRICS @ERSpublications Paediatric highlights from the 2014 ERS International Congress in Munich, Germany http://ow.ly/MaXZv aed a c esp a Forced oscillations Several researchers have investigated how to apply the forced oscillation technique (FOT) clinically and previous publications have provided technical recommendations for adults and children [2, 3]. In a study designed to evaluate lung function using impulse oscillometry (IOS) and spirometry, UYAN et al. [4] followed 41 children with post-infectious bronchiolitis obliterans (mean±SD age 8.8±5.0 years) for a median of 29 months in three different centres in Turkey. Among the 26 subjects who were able to perform spirometry, percentage of predicted respiratory system resistance (Rrs) at 5, 10, 15 and 20 Hz and resonance frequency correlated negatively with forced expiratory volume in 1 s (FEV1), whereas reactance values correlated positively with FEV1 results, suggesting that IOS, which requires only minimal cooperation, is suitable for evaluating lung function in children with bronchiolitis obliterans. IOAN et al. [5] proposed using FOT at a single frequency to detect the paradoxical glottis adduction during inspiration that underlies the clinical manifestations of vocal cord dysfunction (VCD). Six children with VCD and 36 controls with asthma underwent a bronchial challenge and the investigators measured the difference between inspiratory and expiratory Rrs (Rrsi−e). Rrsi−e in children with VCD versus controls was lower at baseline than after the challenge (0.51±2.0 versus −0.37±1.0 hPa·s·L−1 (p<0.03) and 6.0±5.0 versus −0.5±1.0 hPa·s·L−1 (p<0.001)), confirming that FOT can detect vocal cord adduction during inspiration in children with VCD, a pattern that was exacerbated during the bronchial challenge. To assess whether a modified FOT (wave-tube FOT) could be used to measure respiratory mechanics, GRAY et al. [6] studied 219 unsedated infants aged 6–10 weeks enrolled in a birth cohort study in South Africa. A total of 198 (90%) infants had successful measurements. Sex was a determinant of Rrs (higher in males) and compliance (Crs) (lower in males), and Crs was significantly affected by maternal smoking during pregnancy. These data suggest that the modified FOT is a feasible method for measuring respiratory mechanics in healthy unsedated infants and might also be used for assessing lung function early in life. Multiple-breath washout Many researchers presented abstracts on the multiple-breath inert gas washout (MBW), a technique addressed in a recently published technical consensus statement [7]. YAMMINE et al. Paediatrics: messages from Munich Paediatrics: messages from Munich Fabio Midulla1, Enrico Lombardi2, Marielle Pijnenburg3, Ian M. Balfour-Lynn4, Jonathan Grigg5, Kajsa Bohlin6, Franca Rusconi7, Petr Pohunek8 and Ernst Eber9 Affiliations: 1Dept of Paediatrics, Sapienza University of Rome, Rome, Italy. 2Dept of Paediatrics, Anna Meyer Children’s University Hospital, Florence, Italy. 3Dept of Paediatrics, Erasmus MC – Sophia Children’s Hospital, Rotterdam, The Netherlands. 4Dept of Paediatric Respiratory Medicine, Royal Brompton Hospital, London, UK. 5Blizard Institute, Queen Mary University, London, UK. 6Dept of Neonatology, Karolinska University Hospital and Karolinska Institutet, Stockholm, Sweden. 7Unit of Epidemiology, Anna Meyer Children’s University Hospital, Florence, Italy. 8Dept of Paediatrics, 2nd Faculty of Medicine and University Hospital Motol, Charles University, Prague, Czech Republic. 9Respiratory and Allergic Disease Division, Dept of Paediatrics, Medical University of Graz, Graz, Austria. Correspondence: Ernst Eber, Klinische Abteilung für Pulmonologie und Allergologie, Univ.-Klinik für Kinder- und Jugendheilkunde, Medizinische Universität Graz, Auenbruggerplatz 34/2, 8036 Graz, Austria. E-mail: ernst.eber@medunigraz.at ABSTRACT The aim of this article is to describe paediatric highlights from the 2014 European Respiratory Society (ERS) International Congress in Munich, Germany. Abstracts from the seven groups of the ERS Paediatric Assembly (Respiratory Physiology and Sleep, Asthma and Allergy, Cystic Fibrosis, Respiratory Infection and Immunology, Neonatology and Paediatric Intensive Care, Respiratory Epidemiology, and Bronchology) are presented in the context of the current literature. @ERSpublications Paediatric highlights from the 2014 ERS International Congress in Munich, Germany http://ow.ly/MaXZv Copyright ©ERS 2015. This article is open access and distributed under the terms of the Creative Commons Attribution Non-Commercial Licence 4.0. ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 PAEDIATRICS | F. MIDULLA ET AL. PAEDIATRICS | F. MIDULLA ET AL. Introduction The 2014 International Congress of the European Respiratory Society (ERS) in Munich, Germany, included a substantial paediatric programme, with numerous high-quality scientific communications. As for the 2013 Annual Congress [1], the chairs of the scientific groups of the Paediatric Assembly have selected and discussed the most important abstracts to give a review of the research presented during the meeting. Due to the large number of abstracts, this update cannot be comprehensive but aims to address schemes of research in major areas of paediatric respiratory medicine. Reference values After the Global Lung Initiative (GLI) reference equations for spirometry were published in 2012 (GLI 2012) [12], researchers focussed on validating these equations in different populations and age groups. ARIGLIANI et al. [13] performed spirometry in 399 children (202 boys) aged 6–12 years from two public and two private schools in Ambanja, Madagascar. GLI 2012 equations for black people fitted well with spirometric data for Malagasy children. FEV1 and forced vital capacity (FVC) were reduced in malnourished children with no evidence of airflow limitation, reflecting stunted growth. Conversely, IGLESIAS et al.[14] found that the GLI 2012 equations significantly overestimated FEV1 and FVC values in 318 white, healthy Spanish children aged 7–15 years, suggesting that the reasons for this discrepancy should be investigated before applying the GLI 2012 equations in Spanish school-age children. Similarly, KIRKBY et al. [15] found, in 811 healthy Indian children aged <12 years, that GLI 2012 significantly underestimated FEV1 and FVC values, and calculated a new coefficient for Indian children. Focussing on other lung function techniques, MANDADZHIEVA et al. [16] produced prediction equations for transfer factor of the lung for carbon monoxide (TLCO) in 449 healthy Bulgarian children aged 7–18 years (254 boys). Boys had significantly higher values for single-breath TLCO than girls (7.19±2.47 versus 6.51±1.71 mmol min−1·kPa−1, p<0.001), while alveolar volume (VA) was similar in both sexes. TLCO and VA showed close correlations with height (r2 between 0.82 and 0.90), and with increasing height, all children presented a faster increase in TLCO and VA. Functional monitoring of sleep disordered breathing Functional monitoring of sleep disordered breathing BOUDEWYNS et al. [17] assessed the usefulness of endoscopy under sedation as a tool to detect anatomical factors for upper airway obstruction in 13 obese children with obstructive sleep apnoea (OSA) aged 9– 14 years. In the six surgically naïve children, endoscopy showed upper airway obstruction at the level of the adenoids and tonsils with associated upper airway hypotonia in five, whereas in six out of seven children with previous upper airway surgery, endoscopy documented partial or complete tongue base obstruction, and in three out of four children with previous adenoidectomy, significant tonsillar obstruction was seen. Endoscopy under sedation was reported to be a useful tool for obtaining insights in the pathogenesis of OSA in obese children and making treatment decisions. Seeking ways to reduce the need for polysomnography (PSG), PIETROPAOLI et al. aed a c esp a Forced oscillations [8] compared the repeatability of shortened protocols to measure the lung clearance index (LCI) (calculated at 5% of initial nitrogen washout) and standard LCI (calculated at 2.5% of initial nitrogen washout) in a longitudinal sample of 37 children with CF (age range 5.7–7.2 years) over 35 months. Both indexes yielded similar intra-test, mid-term (<4 months) and long-term (>4 months) repeatability. The authors also showed nonsignificant mean changes after intravenous antibiotics. These data suggest that LCI at 5% of initial nitrogen washout might be useful as a potential study end-point. To explain their previous finding that nitrogen equipment (N2MBW) in younger children induced a higher LCI than sulfur hexafluoride equipment with a mass spectrometer (SF6MBW), BENSELER et al. [9] evaluated the effects of equipment dead space (VD) on LCI measurements. As previously reported, N2LCI was higher than SF6LCI in 10 healthy adults. When SF6MBW VD was increased to be equivalent to N2MBW VD, SF6LCI increased, becoming higher than N2LCI, whereas when VD was added to the N2MBW system in steps approximating 1 mL·kg−1 to mimic the VD spectrum/weight ratios observed in preschool children, N2LCI increased linearly by 0.4 units for each unit increase in weight-adjusted VD. These data suggest that the two methods yield contrasting LCI values because their VD equipment differs and have important implications for interpreting MBW data in young children. To obtain objective physiological assessments in children with acute bronchiolitis, STAFLER et al. [10] measured LCI using SF6 and an ultrasonic flowmeter in 29 infants with acute bronchiolitis (age 2.9±2.1 months) and 23 healthy controls (age 4.2±2.5 months). Valid tidal breathing measurements were obtained in only 19 (66%) out of 29 infants with acute bronchiolitis and 15 of these achieved more than two valid MBW measurements, whereas valid tidal breathing measurements were achieved in 22 (97%) out of 23 of the controls and 19 also achieved more than two valid MBW measurements. LCI was 8.4±0.8 in infants with acute bronchiolitis and 7.3±0.7 in controls (p<0.001). In five infants with acute bronchiolitis who returned after 4 months, LCI decreased from 8.3±0.9 to 7.4±0.7 (p=0.08). The authors concluded that measuring LCI in infants with acute bronchiolitis is feasible, although technically challenging, and LCI can potentially serve as an objective severity measure. In a ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 2 PAEDIATRICS | F. MIDULLA ET AL. similar study, KOBBERNAGEL et al. Reference values [18] investigated whether a sleep clinical record (SCR) and nocturnal pulse oximetry with a McGill Oximetry Score (MOS) could detect OSA. MOS yielded positive results (>2) in 52 out of 285 children with a sensitivity of 20.5% and a specificity of 97.2% in detecting OSA when compared with PSG, whereas 227 (79.6%) children had a positive SCR score (>6.5) with a sensitivity of 81.1% and a specificity of 30.5%. In 48 (16.8%) children, all of whom received a diagnosis of OSA at PSG, SCR and MOS in combination detected the presence of obstructive apnoea with a sensitivity of 52% and a specificity of 100%. These findings suggest that SCR and nocturnal pulse oximetry with MOS may offer a valid alternative to PSG. Finally, ALEXOPOULOS et al. [19] aimed to study whether nocturnal enuresis (defined as urine incontinence on more than one night per week) was associated with an increased risk of moderate to severe OSA (apnoea–hypopnoea index >5 episodes·h−1) among 525 children with snoring (age 7.5±2.2 years) referred for PSG over 12 years. 355 (67.6%) children had nocturnal enuresis and 87 (16.6%) had moderate to severe OSA. Nocturnal enuresis was associated with moderate to severe OSA after adjustment for tonsillar hypertrophy, obesity, sex and age. Nocturnal enuresis had a high sensitivity (78.2%) and a low positive predictive value (19.2%) for detecting moderate to severe OSA, and a low specificity (34.5%) and a high negative predictive value (88.8%) for ruling it out, suggesting that children with snoring and without nocturnal enuresis referred for PSG are less likely to have OSA than those with nocturnal enuresis. aed a c esp a Forced oscillations [11] assessed the long-term variability in N2MBW indices in 26 children (6–18 years) with primary ciliary dyskinesia (PCD) on three occasions during a 1-year follow-up. For LCI, the within-occasion standard deviation (95% CI) was 0.63 (0.55–0.70) and the coefficient of variation was 6.6% (6.0–7.2%), whereas the between-occasion standard deviation was 1.08 (0.83–1.28) and coefficient of variation was 11.4% (10.4–12.5%). The authors also reported within-occasion and between-occasion variability for other MBW indices (Scond and Sacin), thus providing important information for using and interpreting N2MBW indices in the clinical management of PCD in children and as outcome measures in interventional studies. Databases “Big data” found its way into paediatric asthma. Although guidelines heavily rely on results from randomised controlled trials, only few patients treated for asthma meet the eligibility criteria for major trials [20]. MURRAY et al. [21] compared the effectiveness of adding a long-acting β-agonist (LABA) versus increasing the dose of inhaled corticosteroids (ICS) in a real-life population of children whom low-dose ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 PAEDIATRICS | F. MIDULLA ET AL. ICS left uncontrolled. Patients (n=3129) were recruited from two UK databases. Increasing the dose of ICS led to fewer exacerbations with similar asthma control than adding a LABA. These results provide no support for the step 3 recommendations of the 2014 British Thoracic Society/Scottish Intercollegiate Guidelines Network and Global Initiative for Asthma (GINA) guidelines on asthma management, and this gap between guidelines and implementation is exactly what MURRAY et al. [22] showed in a second presentation from the same study. Seeking further information an asthma management, ENGELKES et al. [23] used a large general practitioners’ database to identify children with asthma and studied severe asthma exacerbations in this group of patients. The overall rate of severe exacerbations was 0.02 per year, being highest in children <7 and >15 years of age, and in children on ICS who were treated by a paediatrician. A history of severe exacerbations increased the risk of subsequent severe exacerbations, a finding in line with earlier studies [24]. In a separate study, ENGELKES et al. [25] found that LABA monotherapy was decreasing but, despite the guidelines, the prevalence remains at 1.44 per 100 per year. Although few studies have addressed clinical effectiveness in childhood asthma, research of this kind gives a major insight into the problem and may be complimentary to the results reported in randomised controlled trials. Preschool wheeze Preschool wheeze remains a topic of high clinical and scientific interest. Much effort has focussed on defining the clinical phenotypes that warrant different treatment or monitoring strategies, and on predicting asthma at school age [26]. MUTTI et al. [27] were unable to distinguish preschool children with episodic viral wheeze (EVW) from children with multiple-trigger wheeze (MTW) by clinical and endobronchial biopsy results, suggesting a similar pathophysiology for both entities. They did, however, find thicker basal membranes and more epithelial loss, and higher mucosal eosinophil and mast cell numbers in children with wheeze compared to controls. Databases These results are supported by animal data and data from autopsy studies presented by ANDERSSON et al. [28] showing that increased mast cells in the alveolar parenchyma after respiratory viral infections may affect susceptibility towards allergens and asthma development in later life. The biopsy data provided by MUTTI et al. [27] might imply that asthma is as likely to develop in children with EVW as in those with MTW. In preschool children, others found no difference in reticular basement membrane thickness and mucosal eosinophils or airway smooth muscle mast cell values between children who did or did not have asthma at school age, but they made no distinction between preschool children with MTW and EVW [29]. Yet, biopsy studies, in general, include highly selected populations of children who had a clinical indication for bronchoscopy. GOKSÖR et al. [30] nevertheless showed a higher risk of doctor-diagnosed asthma at 8 years for children with EVW and MTW than for children without preschool wheeze (MTW: OR 48.9, 95% CI 29.3–81.6; EVW: OR 16.2, 95% CI 10.3–25.6). This risk was independent of atopic heredity and allergic sensitisation during preschool years. These data showed that many children with EVW will continue to wheeze and will have asthma, suggesting that EVW is not always a transient, “innocent” disease. In an attempt to define asthmatic and preschool wheezing phenotypes in an unbiased clustering of children, BRINKMAN et al. [31] used an electronic nose (eNose) platform and, with a metabolomics approach, the researchers identified five clinical clusters, which differed in age, atopic state, asthma control and asthma-related quality of life (fig. 1). Whether these five clusters are clinically meaningful and can guide management remains unclear. In a study by VAN DER SCHEE et al. [32], the eNose was also able to discriminate atopic wheeze from nonatopic wheeze in a small cohort of 64 patients, with moderate accuracy (area under the curve 0.74, p=0.008). Another possible source of noninvasive and easily obtainable inflammatory biomarkers in preschool children is urine. CHIU et al. [33], in a birth cohort study, showed that elevated urinary leukotriene E4 had a high specificity and a high positive predictive value for asthma and rhinitis after age Cluster 1 Cluster 2 Cluster 3 Cluster 4 Cluster 5 FIGURE 1 Topology clusters of asthma patients identified using an eNose platform. Reproduced from [31] with permission from the authors. Databases 4 ERJ Open Res 2015; 1: 00016–2015 | DOI FIGURE 1 Topology clusters of asthma patients identified using an eNose platform. Reproduced from [31] with permission from the authors. FIGURE 1 Topology clusters of asthma patients identified using an eNose platform. Reproduced from [31] with permission from the authors. ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 PAEDIATRICS | F. MIDULLA ET AL. 2 years. These data suggest that biomarkers in the urine may have an added value in diagnosis and monitoring of preschool children. 2 years. These data suggest that biomarkers in the urine may have an added value in diagnosis and monitoring of preschool children. 2 Several groups showed that preschool wheeze and asthma have a multifactorial aetiology that includes viruses (in particular rhinovirus) [34], traffic-related air pollution [35], prenatal exposures to environmental contaminants [36], foods and genetics. LUKKARINEN et al. [34], in a cohort of 64 infants hospitalised for their first wheeze episode, showed that rhinovirus detection and allergic sensitisation were the most important risk factors for atopic asthma at age 7 years, but not for nonatopic asthma. Current evidence therefore confirms that rhinovirus interacts with atopy and with immune system maturity in the development of asthma. The mechanisms underlying rhinovirus-induced wheeze now need unravelling in prospective studies of rhinovirus infections in asymptomatic, healthy preschool children [37]. SHULTZ et al. [35], reporting results from the BAMSE cohort study, showed that exposure to air pollution from road traffic, especially during the first year of life and between years 1 and 8, was associated with impaired small airway function as measured by IOS in adolescents. Their data conflicted with the results reported by OLSSON et al. [38], who failed to find a higher risk of asthma after prenatal exposure or exposure during infancy to air pollution. These discrepancies may depend on differences in how exposure to air pollution was measured and in the outcomes used. Similarly, SMIT et al. [36] found only very limited evidence linking prenatal exposure to contaminants to asthma and eczema in school-age children in Ukraine and Greenland. Obviously, such an association needs assessment in more studies on different exposures and in different populations. Previous studies have shown that preterm birth, low birth weight and high infant weight gain are associated with increased risk of later asthma development. To investigate these possible risks, DUIJTS et al. Databases [39] collected data from 24 birth cohorts to assess the association of early growth and lung function. Preterm birth (<37 weeks) had an adverse effect on FEV1/FVC and forced expiratory flow at 75% of FVC (FEF75%), and low birth weight (<2500 g) on FEV1, FVC and FEF25–75%. The authors concluded that smaller airways might be partly responsible for the associations between early growth characteristics and asthma. Monitoring of asthma During the International Congress, the ERS Task Force on Monitoring of Asthma in Children presented their results. Clinical history, spirometry, and assessment of adherence to therapy, inhaler technique and exposures remain the mainstays of monitoring of asthma [40]. The Task Force members found no evidence supporting the use of composite asthma control scores and asthma-related quality of life or symptom diaries in daily practice. Future directions in monitoring of asthma should include monitoring strategies in specific populations, also called “phenotyped” or “personalised” monitoring. VAN BRAGT et al. [41] in a randomised controlled trial enrolling 93 school children with asthma showed that adding an individualised self-management support programme to usual care resulted in better asthma-related quality of life. Personalised monitoring strategies could usefully include biomarkers in blood, urine, sputum or exhaled breath, genetic markers, and electronic health initiatives. Cystic fibrosis Therapies p Cystic fibrosis transmembrane conductance regulator therapies In the past years, the most exciting new therapies for cystic fibrosis (CF) have focussed on small-molecule therapy, to correct or potentiate the faulty or missing chloride channel on epithelial cell surfaces. The initial studies on the cystic fibrosis transmembrane conductance regulator (CFTR) potentiator ivacaftor in patients with the p.Gly551Asp mutation showed an impressive reduction in sweat chloride, accompanied by a significant improvement in lung function, weight gain and quality of life [42]. Greater clinical experience with the drug has resulted in publication of post-marketing experience in 151 children aged 6 years and above [43]. The hospitalisation rate decreased by 19%, thus improving this expensive drug’s health economic evaluation. Pseudomonas aeruginosa growth decreased, mucociliary clearance doubled and microbial diversity increased. Additionally, intestinal bicarbonate secretion increased (and gut pH increased by 1.5), which may explain the observed improvement in weight gain. A recent publication has extended safety and efficacy data to 144 weeks, and showed maintained improvements and good tolerance [44]. Data have now been published on the use of ivacaftor for the other nine, much rarer (non-p.Gly551Asp) gating mutations that have shown encouraging effects (apart from the p.Gly970Arg mutation) on sweat chloride, lung function, nutrition and quality of life [45]. Ivacaftor has been studied in combination with the CFTR corrector lumacaftor in patients homozygous for the p.Phe508del mutation. The results from the phase 2 studies were published last year [46]. Ataluren is a drug that leads to the production of full-length CFTR protein in patients with nonsense mutations (e.g. p.Gly542X). Last year saw the publication of the phase 3, 48-weeks study in 236 patients ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 PAEDIATRICS | F. MIDULLA ET AL. over 6 years old [47]. The results were disappointing after the drug had shown early promise; however post hoc analysis showed a positive effect in patients not taking inhaled tobramycin. Antimicrobial therapies Some important publications have addressed antibiotic therapy. A phase 2 trial of inhaled Arikace, a liposomal amikacin preparation for nebulisation, showed, in 105 patients after 28 days treatment, a significant rise in FEV1, which was maintained (although to a lesser extent) after a month off therapy [48]. In an open-label extension, lung function also improved with 28 days of therapy followed by 56 days off; this was accompanied by a reduction in sputum P. aeruginosa density [48]. Cystic fibrosis Therapies This should offer another inhaled antibiotic option for treating chronic P. aeruginosa infection. At the ERS International Congress, BILTON et al. [49] presented interim data from the CLEAR-110 extension study in which long-term safety, tolerability and efficacy of once-daily liposomal amikacin (in monthly on–off cycles) is being studied in over 200 patients for 2 years. The treatment was well tolerated and improvements in lung function were maintained during both the on and off treatment months. Another study published last year looked at patients with Burkholderia infection, who are usually excluded from trials [50]. The study investigated the use of inhaled aztreonam in 105 children and adults with chronic Burkholderia infection, and found no significant improvement in lung function, hospitalisation rate or chest exacerbations, with a trend for less antibiotic use. Unfortunately, it was a negative study, but at least it was published, given the definite bias towards publishing only positive results [51]. As well as nebulised antibiotics, some pharmaceutical companies have introduced dry powder forms. Inhaled colistimethate sodium is now being given for chronic P. aeruginosa infection in a dry powder form because it is quicker to administer than the traditional nebulised form and may therefore improve adherence. SU et al. [52] used radioactive scintigraphic imaging to look at lung and oropharyngeal deposition, and found that the dry powder gave a greater lung deposition than the nebuliser (12% versus 6%). Nebulised mannitol is a recently introduced mucoactive osmotic agent [53]. ONG et al. [54] reported that in vitro the drug promotes P. aeruginosa dispersion from the biofilm and enhances the antibacterial effect of ciprofloxacin (fig. 2). This may add to the benefit of this treatment. The study also demonstrated a model for studying bacterial biofilms. Azithromycin has become a standard part of therapy in CF, used both in the long term as well as for shorter antibiotic courses. Respiratory viral infections play an important role in CF lung disease, with few specific therapies available. SCHOEGLER et al. [55], in an in vitro study, showed that azithromycin pre-treatment reduced rhinovirus replication seven-fold in bronchial epithelial cells, although it did not prevent rhinovirus-induced cytokine production. This suggests that azithromycin may have an antiviral role and, in their recent full publication, the authors suggest that studies are necessary to see whether azithromycin might have a role in preventing or managing rhinovirus exacerbations in CF [56]. Local drug deposition on biofilm FIGURE 2 Scanning electron micrographs of a) the nonhomogeneous codeposition of ciprofloxacin and mannitol on the biofilm, b) the site of aerosol deposition and c) areas of no drug deposition. Scale bars=2 μm. Reproduced from [54] with permission from the authors. ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 Cystic fibrosis Therapies Influenza immunisation has been recommended for people with CF for many years. For the winter of 2013–2014, the US CF Foundation stated that the new live attenuated influenza vaccine delivered as a nasal spray was contraindicated in CF, due to a lack of data. A safety study has now been published in 168 CF patients aged 2–18 years receiving FluMist (MedImmune, Gaithersburg, MD, USA) [57]. There was no increase in respiratory deteriorations or hospitalisation for 28 days post-immunisation, although 8% of the patients did wheeze in the first week (two thirds on the actual day). This should allow its use in children with CF, which will help those with needle anxiety. Contraindications remain immunosuppression (including oral corticosteroids), acute wheezing on the day and large nasal polyps. Local drug deposition on biofilm No drug deposition FIGURE 2 Scanning electron micrographs of a) the nonhomogeneous codeposition of ciprofloxacin and mannitol on the biofilm, b) the site of aerosol deposition and c) areas of no drug deposition. Scale bars=2 μm. Reproduced from [54] with permission from the authors. Local drug deposition on biofilm No drug deposition Local drug deposition on biofilm ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 PAEDIATRICS | F. MIDULLA ET AL. Other therapies Other therapies p Intravenous aminophylline is sometimes used during chest exacerbations, especially when the patient has a tight chest with severe bronchoconstriction. WADDINGHAM et al. [58] reviewed their use in 30 patients. 60% had subtherapeutic levels; only 0.4% levels were high. Although adverse effects were common (60%), none led to drug cessation. The investigators suggested that high doses are required to reach therapeutic levels. Finally, vitamin D deficiency is common but the levels recommended for optimising bone mineralisation (75–150 nmol·L−1) are hard to achieve in CF. MISTRY et al. [59] reviewed their prescribing practice and found that, initially, many patients were not receiving the correct daily dose. As expected, adherence was a major issue. Vitamin D seems to have a role in many things and is the subject of a profusion of publications. SCHOEGLER et al. [60] in an in vitro study showed that vitamin D lowered rhinovirus 16 replication in bronchial epithelial cells, possibly by inducing the antimicrobial peptide cathelicidin. Assessment of disease The LCI measures ventilation inhomogeneity and has been shown to be a useful marker of early CF lung disease. It is also one of the more sensitive outcome measures available for clinical trials; for example, the LCI decreased by a mean of 2.2 in 21 patients receiving ivacaftor [61]. ELBORN et al. [62] showed an association of a raised LCI with systemic inflammation (C-reactive protein and white-cell count); HATZIAGOROU et al. [63], an association with a positive sputum culture and chest exacerbations; and GROSSE-ONNEBRINK et al. [64], LCI as a predictor of future exacerbations. Although the LCI was also associated with computed tomography (CT) findings of bronchiectasis in children (excluding infants), RAMSEY et al. [65] suggested that it is not a substitute for a chest CT but has a role as a surveillance tool. Chest CT scanning has its advocates, although many believe its role should be restricted to clinical need on an individual basis rather than routine annual surveillance. CT scores for bronchiectasis may be useful in more advanced disease, but in mild cases, scoring is less helpful. The publication from the London CF Collaboration newborn screened cohort illustrated this disadvantage by showing that CT changes in 1-year-olds had poor to fair agreement between two scorers (best for air trapping), probably because the changes were very mild (especially compared with the Australian AREST-CF data) [66, 67]. ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 ROSENOW et al. [68] reported on a new imaging technique, PRAGMA (Perth–Rotterdam Annotated Grid Morphometry), which is said to have good inter- and intraobserver agreement in young children. BOON et al. [69] used CT scans of explanted lungs, including micro-CT on lung tissue cores, to study end-stage lung disease. Magnetic resonance imaging The radiation burden of CT scans has aroused increasing interest in the use of magnetic resonance imaging (MRI) for long-term monitoring of lung disease. JUNG et al. [70] reported that typical findings in children with CF can be demonstrated and dynamic contrast-enhanced imaging reveals lung perfusion abnormalities, which may differentiate chronic consolidation from acute atelectasis due to sedation. MARSHALL et al. [71] reported that early lung changes, including those in subclinical disease, can be detected using hyperpolarised helium MRI, and that this technique was more sensitive than LCI, lung function and proton MRI (fig. 3). Inflammatory markers If assessed noninvasively, inflammatory markers could be used routinely and repeatedly. PAREKH et al. [72], in a pilot study, looked at several urinary biomarkers and found higher levels of the protease inhibitors TIMP2 (tissue inhibitor of metalloproteinase) and α1-antitrypsin, and lower levels of fMLP (formyl-methionyl-leucyl-phenylalanine), a neutrophil chemotactic agent, in patients with CF compared to healthy volunteers. More work is needed to determine whether these markers will have any clinical use. Elafin is a serine elastase inhibitor and therefore has anti-inflammatory properties. YACOB et al. [73] measured significantly lower plasma elafin levels in children with CF (who were free from exacerbation) than in controls, whereas elastase levels were comparable in the two groups. The authors concluded that although elafin replacement therapy may be effective, much work remains to be done before this possibility can be considered. Using automated proteomic technology, DEBOER et al. [74] analysed over 1100 proteins in bronchoalveolar lavage fluid, to assess whether they may be biomarkers for bronchiectasis on a CT scan; 82 proteins correlated significantly with the CT airway score but no adjustment was made for multiple comparisons. As many as 43 of these proteins correlated more strongly than neutrophil elastase with the airway score. Miscellaneous With increasing survival and a known increased risk of gastrointestinal malignancy, the adult centre in Munich has instituted screening colonoscopy at 40 years of age (routine screening is recommended a ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 7 PAEDIATRICS | F. MIDULLA ET AL. Paediatric respiratory infection and immunology h f h l d f The major cause of hospital admissions for acute respiratory symptoms during the first years of life is bronchiolitis. To date, the efficacy of inhaled therapies for bronchiolitis remains unclear. This uncertainty may account for the wide variation in approaches to treatment. For example, CONSTANT et al. [84], in a survey including members of the Portuguese Society of Paediatrics (n=514) and general practitioners (n=165), found that inhaled salbutamol was used by 43% of respondents for mild disease and by 78% for moderate disease. 20% of paediatricians routinely used hypertonic saline for moderate disease. The routine use of inhaled therapy was also reported by BON et al. [85], who compared bronchiolitis treatment in a single Italian tertiary unit in 2002 and 2012. At both time-points, most infants received bronchodilator therapy (72.4% in 2002 and 91.3% in 2012). However, a recent Cochrane review that included data from 30 trials representing 1992 infants with bronchiolitis found that bronchodilators do not improve oxygen saturation, do not reduce hospital admission after outpatient treatment and do not shorten the duration of hospitalisation [86]. The Cochrane review’s authors therefore concluded that “bronchodilators are not effective in the routine management of bronchiolitis”. Since there is good evidence to suggest that bronchodilators are ineffective in bronchiolitis, the efficacy of hypertonic saline is of interest. MAGUIRE et al. [87] reported the results of a systematic review of controlled trials of nebulised hypertonic saline for infants hospitalised with primary acute bronchiolitis. They identified 15 trials representing 1722 infants. Overall, hypertonic saline reduced the mean length of stay in the hospital by 0.41 (95% CI −0.56–−0.27) days, but the researchers found a risk of bias and high levels of heterogeneity. Remarkably, no trial reported intervention-related severe adverse events. EVERARD et al. [88] also reported the results of their own trial. This was a parallel-group, pragmatic randomised controlled trial performed in 10 UK hospitals. Infants with acute bronchiolitis were randomised either to standard supportive care with oxygen as required or to supportive care plus 6-hourly 3% nebulised hypertonic saline. The primary outcome was the time to when infants were assessed as being “fit for discharge”, defined as, in air with saturations of >92% for 6 h. 141 infants were allocated to hypertonic saline and 159 to standard care. PAEDIATRICS | F. MIDULLA ET AL. 55 years in Germany). NAEHRIG et al. [75] found a high rate of abnormalities in 11 patients studied (two adenocarcinomas, three tubulovillous adenomas and one patient with an inflammatory polyp. The CF-ABLE score (based on age, body mass index (BMI), lung function and number of exacerbations) has been developed as a prognostic tool. MEURLING et al. [76] showed that the score predicts death or transplantation over a 4-year period. 3He MRI Patient 1 Patient 3 Patient 4 Patient 5 Patient 10 CT 1H MRI FIGURE 3 Images from five different patients with mild cystic fibrosis: hyperpolarised helium magnetic resonance imaging (MRI), computed tomography (CT) and proton MRI. Arrows indicate common features between MRI and CT. Images courtesy of POLARIS, The University of Sheffield, Sheffield Children’s Hospital and the Cystic Fibrosis Trust. Reproduced from [71] with permission from the authors. 1H MRI 3He MRI Patient 1 Patient 3 Patient 4 Patient 5 Patient 10 FIGURE 3 Images from five different patients with mild cystic fibrosis: hyperpolarised helium magnetic resonance imaging (MRI), computed tomography (CT) and proton MRI. Arrows indicate common features between MRI and CT. Images courtesy of POLARIS, The University of Sheffield, Sheffield Children’s Hospital and the Cystic Fibrosis Trust. Reproduced from [71] with permission from the authors. ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 PAEDIATRICS | F. MIDULLA ET AL. High cyanide levels have been found in the sputum of CF patients infected with P. aeruginosa and correlate negatively with lung function. Recently, cyanide has been shown to impair mucociliary function in vitro [77]. GILCHRIST et al. [78] evaluated exhaled breath hydrogen cyanide (HCN) measured by SIFT (selected ion flow tube) mass spectrometry as a marker of P. aeruginosa infection in children. While raised HCN is a marker of Pseudomonas infection, the sensitivity needs to be improved to make this a useful measure. International guidelines and standards of care The US CF Foundation Infection Control guidelines were updated in 2013 (published in 2014). Among many suggestions, the guidelines recommend that staff should all wear gowns and gloves when in contact with CF patients, and the patients themselves should wear facemasks when in the hospital environment [79]. There may be quite an effect on patient morale in terms of stigmatisation and it would be a surprise if many European centres fully adopted this approach. PAEDIATRICS | F. MIDULLA ET AL. The US CF 2014 guidelines also recommended keeping patients 2 m (6 feet) apart based on how far cough aerosols travel. Since this publication, work from Australia has shown that after intense coughing for 5 min, P. aeruginosa can travel as far as 4 m (13 feet) and viable organisms remain in the air for 45 min [80]. This observation proves, once again, that people with CF should stay apart and not mix socially with each other. The European CF Society Standards of Care were published as three separate documents, a framework for a CF centre that describes what that centre needs in terms of facilities and multidisciplinary staffing [81]; practice guidelines outlining recommendations for clinical care and what CF centres should provide [82]; and quality management, which describes areas for quality improvement moving from an individual to national and international levels [83]. Paediatric respiratory infection and immunology h f h l d f There was no difference between the two arms in the time to being declared fit for discharge (hazard ratio (HR) 0.95, 95% CI 0.75–1.20) or to actual discharge (HR 0.97, 95% CI 0.76–1.23). There was also no difference in adverse events. In a separate trial, LOZA et al. [89] assessed the efficacy of nebulised 3% and 6% hypertonic saline compared with normal saline in children hospitalised with bronchiolitis. In this multicentre, randomised and double-blind controlled trial, 292 infants were randomised to receive either nebulised 3% or 6% hypertonic saline, or normal saline during their hospital stay. The primary end-point was length of hospital stay. Overall, no difference was found between the three treatment groups in median length of hospital stay and adverse effects were similar in the three groups. Since the UK trial conducted by EVERARD et al. [88] suggests that 3% hypertonic saline is ineffective and the Dutch trial by LOZA et al. [89] suggests that the efficacy of 3% hypertonic saline is no ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 9 PAEDIATRICS | F. MIDULLA ET AL. different from either 6% hypertonic saline or normal saline, it is likely that all three inhaled saline therapies are ineffective. Despite recent evidence that inhaled therapies should not be routinely used in bronchiolitis, there may be ways of improving the quality and efficiency of standard supportive care. First, BEKHOF et al. [90], in a prospective cohort study, assessed the effect of cohorting respiratory syncytial virus (RSV)-positive infants separately from RSV-negative infants. Infants shared a two- to four-bed hospital room during the entire admission, irrespective of the virological diagnosis. Of the 65 infants, 94% were RSV positive, 56 (86%) of whom shared a room with another bronchiolitis patient. 18 (28%) of these infants had bronchiolitis related to another respiratory virus. On admission, 10 (15%) infants were already co-infected with another virus and eight (12%) infants became cross-infected with a different virus during their admission. Of these cross-infected infants, only one had shared a room with the virus identified in one of its roommates. Given that there are no significant differences in disease severity between patients infected with single or multiple viruses, nor between RSV-positive and RSV-negative patients, the researchers concluded that room sharing does not seem to play a major role in the transmission of viruses between infants with bronchiolitis sharing a room. Neonatology and paediatric intensive care N l Minimising lung injury and preventing the development of chronic lung disease continues to be a challenge in the care of very preterm infants. Intensive research efforts now focus on seeking reliable markers to predict short- and long-term lung morbidity. BARALDI et al. [92], in a pilot study, collected amniotic fluid samples and performed metabolomic analysis, which revealed the presence of metabolic profiles characterising preterm delivery and bronchopulmonary dysplasia (BPD) development. PRAMANA et al. [93] reported that levels of pro-endothelin-1, a potent pulmonary vasoconstrictor, might serve as a marker for severe lung injury and the development of BPD in very preterm infants. In established BPD, DASSIOS et al. [94] showed that the chest radiographic thoracic area is significantly related to disease severity as quantified by ventilation–perfusion inequality and oxygen requirement. HENCKEL et al. [95] investigated the relationship between telomere length as a marker of previous oxidative stress, chitinase-like protein YKL-40 as a marker of airway remodelling and lung function in school-age children with a history of BPD. They found that BPD was associated with increased levels of YKL-40, which also correlated with significantly shorter telomeres. The clinical progression of BPD and long-term lung health in preterm infants are difficult to predict, as was demonstrated in a recent thorough systematic review and an external validation study [96]. The aforementioned studies all help to advance research for better predictive tools to be used in future intervention studies. Understanding the many and complex causes driving the development of BPD is another challenge still facing neonatologists, and is even more pressing now that survival is increasing even in the most extremely immature gestational age groups [97]. Experimental evidence suggests that the bone morphogenic protein (BMP) pathway participates in regulating pulmonary vasculogenesis, and might thereby intervene in the development of pulmonary hypertension and chronic lung disease. In a mouse model of BPD, KOSCHLIG et al. [98] showed that activating the BMP receptor II signalling pathway improved impaired vasculogenesis. In another mouse model of hypoxia-induced pulmonary hypertension presented by MORENO et al. [99], upregulation of the BMP antagonist Gremlin-1 was shown to contribute to increased vascular tone. Both studies indicate that modulating the BMP signalling pathway may be a promising strategy to prevent pulmonary hypertension in the newborn (PHN). This is also in line with recent experimental findings showing that sildenafil, a treatment option increasingly used in PHN, potentiates BMP signalling [100]. Paediatric respiratory infection and immunology h f h l d f Second, in an uncontrolled study, RUBIO et al. [91] reported that infants with bronchiolitis treated with a high-flow nasal oxygen cannula did at least as well as infants given usual oxygen care. Indeed, preliminary evidence showed a decreased risk of transfer to intensive care and no technical complications. Neonatology and paediatric intensive care N l The maturational changes in the immune system after preterm birth are still incompletely understood. Immunological factors may play a role in the development of BPD during the perinatal period. Two studies extended current knowledge on this relationship. MUSTAFAYEV et al. [101] evaluated cellular immunity in patients with BPD and reported that the acute phase of the disease was characterised by T-cell inhibition. FRANKENBERGER et al. [102] described a strong expansion and aberrant phenotype of intermediate blood monocytes in preterm neonates related to the innate immune system immaturity. Lung function testing in the neonatal period continues to be a rapidly expanding field. The importance of an adequate diaphragm function for extubation success was investigated by BHAT et al. [103] who found that tension time index measurements of the diaphragm may be useful in predicting extubation success in term but not preterm neonates. The mechanism explaining why the prone sleeping position is a risk factor for sudden infant death syndrome was elucidated by ROSSOR et al. [104] in a crossover study in term neonates. The authors found no difference in carbon dioxide sensitivity between the prone and supine ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 10 PAEDIATRICS | F. MIDULLA ET AL. positions, but a significantly longer time constant for the carbon dioxide response in prone sleep, indicating a damped ventilatory response to hypercarbia. BARIKBIN et al. [105] in a study of infants with congenital cystic adenomatoid malformations of the lung found that a breathing pattern consistent with a more severe restrictive ventilation disorder, in particular, reduced respiratory compliance, was associated with the need for surgery during the first 2 years of life, thus showing that lung function testing may be an important tool for monitoring and guiding treatment of infants with this rare condition. positions, but a significantly longer time constant for the carbon dioxide response in prone sleep, indicating a damped ventilatory response to hypercarbia. BARIKBIN et al. [105] in a study of infants with congenital cystic adenomatoid malformations of the lung found that a breathing pattern consistent with a more severe restrictive ventilation disorder, in particular, reduced respiratory compliance, was associated with the need for surgery during the first 2 years of life, thus showing that lung function testing may be an important tool for monitoring and guiding treatment of infants with this rare condition. Neonatology and paediatric intensive care N l Paediatric intensive care There is much interest in noninvasive respiratory support for children with moderate to severe acute onset of respiratory distress. The use of high-flow nasal cannula (HFNC) oxygen therapy has expanded dramatically over the past few years. In a retrospective study, RUBIO et al. [91] reported that HFNC provided a safe and effective means of respiratory support for children with viral bronchiolitis in a secondary hospital, and that the introduction of HFNC was associated with a 58% reduction in transfers to the paediatric intensive care unit over two seasons. HFNC has also been successfully used during emergency transport, as shown by IGLESIAS et al. [106]. HFNC was well tolerated during transport and reduced the need for continuous positive airway pressure. LUCIANI et al. [107], in a crossover study, found that breathing efforts decreased significantly more after HFNC than after low-flow oxygen therapy. FOUZAS et al. [108] presented data from a simulation model they had developed including a new equation to estimate the effective oxygen delivery in relation to flow and respiratory rate more accurately. In summary, accumulating evidence implies that HFNC has physiological benefits but larger randomised trials are warranted [109]. Severe acute asthma continues to be a life-threatening condition in children. In a randomised controlled trial in children 1–12 years of age, TIWARI et al. [110] compared ketamine with aminophylline as second line adjuvant therapy and found both drugs equally effective. THOUVENIN et al. [111] in a retrospective review following the publication of the GINA recommendations in 2011 showed that intravenous magnesium sulfate, if used within the first hour as recommended by GINA, significantly reduced both the total duration of hospitalisation and the length of stay in the paediatric intensive care unit. This is in accordance with a very recent systematic review that recommends the use of intravenous magnesium sulfate as a safe and effective adjunct to conventional bronchodilator therapy in children with acute severe asthma [112]. Some researchers even believe that the accumulating evidence confirming a favourable “cost benefit” profile justifies using magnesium for all children presenting with acute severe asthma [113]. Preterm birth A recent systematic review and meta-analysis showed that preterm-born survivors, even those in whom BPD does not develop, have moderate deficits in FEV1 compared with term-born controls [125]. DUIJTS et al. [39] examined the association between preterm birth and low birth weight with lung function at age 4–18 years, using data from 24715 children in 24 European birth cohorts. Random-effect meta-analyses were used with individual participant data and pooled effect estimates. The strongest independent effects were found for preterm birth (<37 versus ⩾37 weeks of gestation) on FEV1/FVC and FEF75% and for low birth weight (<2500 versus ⩾2500 g) on FEV1, FVC and FEF25–75% (p<0.05). FAINARDI et al. [126], in a small group of 7-year-old children born very preterm (<32 weeks of gestation), assessed lung function by IOS. Compared with preterm children born appropriate for gestational age (AGA), children born small for gestational age or AGA with intrauterine growth restriction showed higher small-airway resistance and lower pulmonary compliance. EDWARDS et al. [127], in a large cross-sectional survey of all surviving preterm-born children in Wales (n=13361) and matched term control children, confirmed previous findings that preterm birth increases the risk of wheezing disorders [128]. Both the <5-year-old and 5–10-year-old preterm born children in the RANOPS had higher reported rates of wheezing ever, wheeze in the last 3 months and use of inhaled medication than term infants. Analysis by gestational age showed a gradient of increasing respiratory symptoms and use of inhaled medication for each week of gestational age prior to 38 weeks. Primary ciliary dyskinesia A number of national and international databases have been developed in order to better define clinical and laboratory data of paediatric PCD. MAURER et al. [129] presented preliminary data from a large multinational dataset (2128 patients in 16 countries, in the framework of the European Union Seventh Framework project BESTCILIA); THOUVENIN et al. [130], data from a French national cohort (298 patients in 23 centres); and SNIJDERS et al. [131], data from an Italian survey (261 patients in 21 centres). The latter group reported that age at diagnosis in patients <18 years was 5.0 years lower in children with situs inversus (4.2 versus 6.0 years, p<0.0127) and higher in children with bronchiectasis (7.0 versus 3.5 years, p<0.0001). GOUTAKI et al. Preterm birth [132] assessed height and BMI in 263 paediatric and adult patients with PCD from six different centres (BESTCILIA project) and found comparable height z-scores and slightly higher BMI z-scores compared with World Health Organization reference data, suggesting that undernutrition might not be a predominant problem in PCD. In a study presenting 5-year data on re-testing in 162 patients diagnosed with PCD across a broad range of phenotypic variants, HIRST et al. [133] showed that inner dynein arm phenotypic variants in the cilia of PCD can in some cases revert to normal on re-testing. They concluded that re-testing for PCD should be considered in patients whose initial biopsy suggested an absence of inner dynein arms. Paediatric respiratory epidemiology Early-life factors for respiratory disorders Longitudinal birth cohort studies have identified a number of early risk factors for respiratory disorders in childhood as well as protective factors [114]. Several studies have reported an increased risk of wheezing and asthma development in children after prenatal exposure to antibiotics [115]. The suggested mechanism is a derangement in neonatal and infant microbial colonisation patterns. Whether the association between maternal antibiotics during pregnancy and wheezing or asthma in the offspring is causal or due to confounding factors has been explored in a cohort study by POPOVIC et al. [116]. and in a crossover and a case–control study by MULDER et al. [117]. Both studies found an increased risk of wheezing or asthma for antibiotic prescription in the third trimester of pregnancy but could not rule out unmeasured confounding as a possible explanation. In particular, in the Italian cohort study [116], the association greatly diminished after a statistical analysis controlling for several maternal factors. A recent study using data from the Danish national register found an association between maternal use of antibiotics and asthma in the offspring regardless of the timing for maternal antibiotic treatment (either during or before or after pregnancy) [118]. These results are also in favour of a confounding effect due to a maternal or offspring propensity to infections. Another topic of interest is vitamin D deficiency in pregnancy and early childhood and the development of infections or wheezing or asthma in the first years of life. Findings from several cohort studies suggest a protective effect of 25-hydroxyvitamin D levels both in pregnancy and in childhood against respiratory infections [119, 120] whereas evidence on protection against wheezing and asthma is inconclusive. In a case–control study, INGHAM et al. [121] reported an association between vitamin D deficiency and severity of acute respiratory infections in New Zealand children. Few data are available on how exposure to air pollution in pregnancy influences respiratory health in offspring. A recent study in the INMA cohort found an association between prenatal exposure to residential traffic-related air pollution and lung function deficits at preschool age [122]. Conversely, OLLSON et al. [38], in a Swedish register-based cohort study, showed no association between nitrogen dioxide levels at the place of residence during pregnancy or infancy and prescribed asthma medication ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 11 PAEDIATRICS | F. MIDULLA ET AL. during the sixth year of life. Paediatric respiratory epidemiology Nitrogen dioxide levels had been evaluated with a dispersion model and used as an indicator of motor vehicle exhaust. The role of allergen exposure in causing asthma remains highly debatable [123]. In a collaborative study of five birth cohorts in Europe, CASAS et al. [124] found a geographical variation in the concentration of house dust mite in infants’ homes, with lower levels in colder areas, such as Scandinavian regions, and higher levels in more humid and warm areas, such as the Mediterranean regions. No association was found with subsequent asthma up to the age of 10 years. Preterm birth Paediatric bronchology h ll b Bronchoscopy is a well-established and standardised technique. Many groups are now looking at the paediatric bronchoscope as an interventional tool, especially in congenital anomalies and airway narrowing. In a retrospective study of 61 children with endoscopic findings of vascular anomalies causing compression of the tracheobronchial tree, SERIO et al. [134] found a good agreement between bronchoscopy and CT angiography. The same group recently published follow-up data for a series of 100 consecutive children who underwent stent insertion for airway narrowing of various aetiologies [135]. They had inserted 235 airway stents with no fatal complications and 80% of the patients had experienced significant improvement. ANTON-PACHECO et al. [136] presented their initial experience with biodegradable polydioxanone stents in two infants (5 and 8 months of age) with severe airway narrowing (fig. 4). Although one child had to undergo multiple stent insertions, no intervention led to stent-related complications, such as stent displacement, bleeding, granulation tissue formation or perforation during the 2-year follow-up. This group has already published information on the use of biodegradable stents in children after slide tracheoplasty, reporting the technique’s good safety profile [137]. Although ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 12 PAEDIATRICS | F. MIDULLA ET AL. FIGURE 4 Bronchoscopic view 15 weeks after polydioxanone tracheal stent insertion. Reproduced from [136] with permission from the authors. FIGURE 4 Bronchoscopic view 15 weeks after polydioxanone tracheal stent insertion. Reproduced from [136] with permission from the authors. FIGURE 4 Bronchoscopic view 15 weeks after polydioxanone tracheal stent insertion. Reproduced from [136] with permission from the authors. FIGURE 4 Bronchoscopic view 15 weeks after polydioxanone tracheal stent insertion. Reproduced from [136] with permission from the authors. biodegradable stents seem to be a very promising alternative to metallic or silicone stents, more experience is needed to define the precise indications in children. MADKOUR et al. presented their experience with the use of a laryngeal mask airway (LMA) for foreign body extraction with a flexible bronchoscope [138]. In a prospective 1-year study, they included 49 children (mean age 5.9 years) suspected of having aspirated a foreign body. They identified 41 mainly organic foreign bodies and successfully removed 34 (82.9%). In six cases they had to use a rigid bronchoscope and ultimately removed one foreign body via open thoracotomy. The authors reported no critical complications related to flexible bronchoscopy. Paediatric bronchology h ll b They concluded that the main advantage of the LMA is that larger (adult size) flexible bronchoscopes and, thus, larger extraction forceps may be used. This study adds to the growing evidence showing that flexible bronchoscopy may be a feasible technique for extracting foreign bodies in children. MORENO et al. [139] addressed the association of protracted bacterial bronchitis (PBB) and airway malacia. They retrospectively analysed data of 165 children who underwent bronchoscopy for persistent cough and received a final diagnosis of PBB or airway malacia. The average age at diagnosis of PBB was 3 years. In 53 children with PBB, only 10 had no symptoms indicating airway malacia. Airway malacia was associated with poor response to treatment and the authors concluded that patients with PBB and malacia should probably receive prolonged antibiotic treatment. Several papers in recent years have looked at bacterial bronchitis and airway malacia [140, 141]. Children with clinically diagnosed PBB should undergo bronchoscopy to document possible airway malacia, a factor that potentially can contribute to disease severity and to poor response to treatment. GOUSSARD et al. [142], in children with tuberculosis (TB), studied the use of GeneXpert MTB/RIF (Cepheid, Sunnyvale, CA, USA) testing on bronchoalveolar lavage (BAL) fluid. Among 40 children (median age 18 months), TB was confirmed in 29 (73%) by Xpert and 23 (58%) by culture. In 21 (53%) children both methods yielded positive results. Positive Xpert testing was associated with lymph nodes ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 13 PAEDIATRICS | F. MIDULLA ET AL. ulcerating into the airway (p=0.03), lung disease on chest X-ray or duration of treatment <14 days. Because median time to culture positivity in this group was 14 days, methods such as Xpert can speed-up the diagnostic workup and increase the diagnostic yield. SVEDBERG et al. [143] looked at BAL fluid return and factors that may influence the amount of BAL fluid recovered from the bronchial tree. In 311 children who underwent bronchoscopy and BAL for diagnostic purposes, they found that younger age and higher percentage of neutrophils were associated with reduced BAL fluid return. HONKOVÁ et al. [144] presented new data on bronchial remodelling. They did bronchial biopsies in 27 children with asthma, 15 with CF and 14 with PCD, and compared basement membrane (BM) thickness and the deposition of structural proteins (tenascin C and collagen IV) in patients and seven controls. References 15 Kirkby J, Lum S, Stocks J, et al. Adaptation of the GLI-2012 spirometry reference equations for use in Indian children. Eur Respir J 2014; 44: Suppl. 58, 191. an I, Clisson R, Bonabel C, et al. Inspiratory vs expiratory resistance in diagnosing vocal cord dysfunction in hildren. Eur Respir J 2014; 44: Suppl. 58, 4533. Gray D, Czövek D, Willemse L, et al. Non-invasive measurement of respiratory impedance in unsedated healthy infants. Eur Respir J 2014; 44: Suppl. 58, 186. Robinson PD, Latzin P, Verbanck S, et al. Consensus statement for inert gas washout measurement using multiple- and single-breath tests. Eur Respir J 2013; 41: 507–522. g p Yammine S, Salzmann S, Singer F, et al. Repeatability of shortened and standard lung clearance index. Eur Respir J 2014; 44: Suppl. 58, 4529. pp Benseler A, Stanojevic S, Jensen R, et al. The effect of equipment dead space on lung clearance index. Eur Respir J 2014; 44: Suppl. 58, 189. pp 9 Benseler A, Stanojevic S, Jensen R, et al. The effect of equipment dead space on lung clearance index. Eur Respir J 2014; 44: Suppl. 58, 189. 10 Stafler P, Weinreb S, Mussaffi H, et al. Lung clearance index – a new parameter for airway obstruction in acute bronchiolitis? Eur Respir J 2014: Suppl. 58, 44: 188. 10 Stafler P, Weinreb S, Mussaffi H, et al. Lung clearance index – a new parameter for airway obstruction in acute bronchiolitis? Eur Respir J 2014: Suppl. 58, 44: 188. p 11 Kobbernagel H, Green K, Madsen A, et al. Prospective longitudinal measurements of N2 multiple breath washout indices in primary ciliary dyskinesia. Eur Respir J 2014; 44: Suppl. 58, 4527. obbernagel H, Green K, Madsen A, et al. Prospective longitudinal measurements of N2 multiple breath washout dices in primary ciliary dyskinesia. Eur Respir J 2014; 44: Suppl. 58, 4527. p y y y p J pp 12 Quanjer PH, Stanojevic S, Cole TJ, et al. Multi-ethnic reference values for spirometry for the 3–95-yr age range the global lung function 2012 equations. Eur Respir J 2012; 40: 1324–1343. p y y y p pp 12 Quanjer PH, Stanojevic S, Cole TJ, et al. Multi-ethnic reference values for spirometry for the 3–95-yr age range: the global lung function 2012 equations. Eur Respir J 2012; 40: 1324–1343. 13 Arigliani M, Canciani MC, Altomare M, et al. p 2 Oostveen E, MacLeod D, Lorino H, et al. The forced oscillation technique in clinical practice: methodo recommendations and future developments. Eur Respir J 2003; 22: 1026–1041. p p 3 Beydon N, Davis SD, Lombardi E, et al. An official American Thoracic Society/European Respiratory Society statement: pulmonary function testing in preschool children. Am J Respir Crit Care Med 2007; 175: 1304–1345. 1 Midulla F, Lombardi E, Rottier B, et al. Paediatrics in Barcelona. Eur Respir J 2014; 44: 457–474. p pp 6 Gray D, Czövek D, Willemse L, et al. Non-invasive measurement of respiratory impedance in unsedated healthy infants. Eur Respir J 2014; 44: Suppl. 58, 186. 5 Ioan I, Clisson R, Bonabel C, et al. Inspiratory vs expiratory resistance in diagnosing vocal cord dysfunction in children. Eur Respir J 2014; 44: Suppl. 58, 4533. p y g p J p ; 4 Uyan ZS, Çakir E, Gökdemir Y, et al. The evaluation of pulmonary function of children with bronchiolitis obliterans by spirometry and impulse oscillometry methods. Eur Respir J 2014; 44: Suppl. 58, 4532. y y p p y statement: pulmonary function testing in preschool children. Am J Respir Crit Care Med 2007; 175: 1304–13 4 Uyan ZS, Çakir E, Gökdemir Y, et al. The evaluation of pulmonary function of children with bronchi obliterans by spirometry and impulse oscillometry methods. Eur Respir J 2014; 44: Suppl. 58, 4532. Paediatric bronchology h ll b In contrast to earlier opinions, this study found similar airway remodelling in all studied chronic respiratory diseases. No difference was found in BM thickness and tenascin layer between children with asthma, CF or PCD. These data add new knowledge about airway remodelling in asthma [145, 146]. KRIVEC et al. [147] studied the role of bronchoscopy in children with neuromuscular diseases (NMDs) and acute hypoxaemic respiratory failure requiring noninvasive ventilation. In eight consecutive children (median age 3.2 years) with NMD, lower respiratory infections and atelectasis, the authors used a specific protocol consisting of flexible bronchoscopy for airway suction (six children), noninvasive ventilation (eight children) and physiotherapy with a cough-assist device (eight children). In all the children who underwent full treatment including bronchoscopy, but not in two who only had noninvasive ventilation and physiotherapy, atelectasis fully resolved. This small series supports the idea of using flexible bronchoscopy for managing respiratory complications in NMD. ARUMUGAM et al. [148] in 53 children with difficult asthma, cystic fibrosis and chronic cough studied the diagnostic value of the lipid-laden macrophage index (LLMI) in BAL fluid. Comparing oesophageal pH or impedance with symptoms and LLMI, they found that neither technique achieved sufficient diagnostic sensitivity and specificity in detecting acidic or nonacidic gastro-oesophageal reflux-related pulmonary aspiration in children with respiratory problems. JEDYNAK-WASOWICZ et al. [149] studied the extraoesophageal reflux by monitoring oropharyngeal reflux in 21 children with chronic cough and observed that in coughing children, reflux events detected by standard multichannel intraluminal impedance/pH measurement and oropharyngeal pH monitoring correlated only when subjects were examined in the supine position. This interesting observation merits further studies because it could influence current diagnostic standards. UMUTOGLU et al. [150], in a randomised, controlled, crossover study of patients aged between 0 and 15 years of age, compared various manoeuvres used for visualising the glottis during flexible bronchoscopy. They found that the most effective manoeuvres were the head tilt, chin lift and triple-airway manoeuvres. References 1 Midulla F, Lombardi E, Rottier B, et al. Paediatrics in Barcelona. Eur Respir J 2014; 44: 457–474. 2 Oostveen E, MacLeod D, Lorino H, et al. The forced oscillation technique in clinical practice: methodology, recommendations and future developments. Eur Respir J 2003; 22: 1026–1041. 3 Beydon N, Davis SD, Lombardi E, et al. An official American Thoracic Society/European Respiratory Society statement: pulmonary function testing in preschool children. Am J Respir Crit Care Med 2007; 175: 1304–1345. 4 Uyan ZS, Çakir E, Gökdemir Y, et al. The evaluation of pulmonary function of children with bronchiolitis obliterans by spirometry and impulse oscillometry methods. Eur Respir J 2014; 44: Suppl. 58, 4532. 5 Ioan I, Clisson R, Bonabel C, et al. Inspiratory vs expiratory resistance in diagnosing vocal cord dysfunction in children. Eur Respir J 2014; 44: Suppl. 58, 4533. 6 Gray D, Czövek D, Willemse L, et al. Non-invasive measurement of respiratory impedance in unsedated healthy infants. Eur Respir J 2014; 44: Suppl. 58, 186. 7 R bi PD L i P V b k S l C f i h i 1 Midulla F, Lombardi E, Rottier B, et al. Paediatrics in Barcelona. Eur Respir J 2014; 44: 457–474. 2 Oostveen E, MacLeod D, Lorino H, et al. The forced oscillation technique in clinical practice: methodology, recommendations and future developments. Eur Respir J 2003; 22: 1026–1041. 3 Beydon N, Davis SD, Lombardi E, et al. An official American Thoracic Society/European Respiratory Society statement: pulmonary function testing in preschool children. Am J Respir Crit Care Med 2007; 175: 1304–1345. 4 Uyan ZS, Çakir E, Gökdemir Y, et al. The evaluation of pulmonary function of children with bronchiolitis obliterans by spirometry and impulse oscillometry methods. Eur Respir J 2014; 44: Suppl. 58, 4532. 5 Ioan I Clisson R Bonabel C et al Inspirator vs e pirator resistance in diagnosing ocal cord d sfunction in References References 1 Midulla F, Lombardi E, Rottier B, et al. Paediatrics in Barcelona. Eur Respir J 2014; 44: 457–474. 2 Oostveen E, MacLeod D, Lorino H, et al. The forced oscillation technique in clinical practice: methodology, recommendations and future developments. Eur Respir J 2003; 22: 1026–1041. 3 Beydon N, Davis SD, Lombardi E, et al. An official American Thoracic Society/European Respiratory Society statement: pulmonary function testing in preschool children. Am J Respir Crit Care Med 2007; 175: 1304–1345. 4 Uyan ZS, Çakir E, Gökdemir Y, et al. The evaluation of pulmonary function of children with bronchiolitis obliterans by spirometry and impulse oscillometry methods. Eur Respir J 2014; 44: Suppl. 58, 4532. 5 Ioan I, Clisson R, Bonabel C, et al. Inspiratory vs expiratory resistance in diagnosing vocal cord dysfunction in children. Eur Respir J 2014; 44: Suppl. 58, 4533. 6 Gray D, Czövek D, Willemse L, et al. Non-invasive measurement of respiratory impedance in unsedated healthy infants. Eur Respir J 2014; 44: Suppl. 58, 186. 7 Robinson PD, Latzin P, Verbanck S, et al. Consensus statement for inert gas washout measurement using multiple- and single-breath tests. Eur Respir J 2013; 41: 507–522. 8 Yammine S, Salzmann S, Singer F, et al. Repeatability of shortened and standard lung clearance index. Eur Respir J 2014; 44: Suppl. 58, 4529. 9 Benseler A, Stanojevic S, Jensen R, et al. The effect of equipment dead space on lung clearance index. Eur Respir J 2014; 44: Suppl. 58, 189. 10 Stafler P, Weinreb S, Mussaffi H, et al. Lung clearance index – a new parameter for airway obstruction in acute bronchiolitis? Eur Respir J 2014: Suppl. 58, 44: 188. 11 Kobbernagel H, Green K, Madsen A, et al. Prospective longitudinal measurements of N2 multiple breath washout indices in primary ciliary dyskinesia. Eur Respir J 2014; 44: Suppl. 58, 4527. 12 Quanjer PH, Stanojevic S, Cole TJ, et al. Multi-ethnic reference values for spirometry for the 3–95-yr age range: the global lung function 2012 equations. Eur Respir J 2012; 40: 1324–1343. 13 Arigliani M, Canciani MC, Altomare M, et al. Lung function and nutritional status in urban Malagasy children. Eur Respir J 2014; 44: Suppl. 58, 192. 14 Iglesias I, Benavides M, Delgado YP, et al. Validation of the global lung function initiative (GLI) spirometry reference equations in school age Spanish children. Eur Respir J 2014; 44: Suppl. 58, 4519. p 3 Beydon N, Davis SD, Lombardi E, et al. An official American Thoracic Society/European Respiratory So statement: pulmonary function testing in preschool children. Am J Respir Crit Care Med 2007; 175: 1304–134 4 Uyan ZS, Çakir E, Gökdemir Y, et al. The evaluation of pulmonary function of children with bronchi obliterans by spirometry and impulse oscillometry methods. Eur Respir J 2014; 44: Suppl. 58, 4532. 5 Ioan I Clisson R Bonabel C et al Inspiratory vs expiratory resistance in diagnosing vocal cord dysfunctio References g gy 30 Goksör E, Loid P, Alm B, et al. Increased risk of school age asthma following multiple trigger wheeze independent of atopy. Eur Respir J 2014; 44: Suppl. 58, 4243. p py p pp 31 Brinkman P, Hashimoto S, Fleming LJ, et al. Unbiased clustering of children with asthma or pre-school wheeze using the U-BIOPRED electronic nose platform. Eur Respir J 2014; 44: Suppl. 58, 431. g p p pp 32 Van der Schee MP, Hashimoto S, Van den Ouweland M, et al. Identification of atopy amongst wheezing infant via electronic nose. Eur Respir J 2014; 44: Suppl. 58, 4202. via electronic nose. Eur Respir J 2014; 44: Suppl. 58, 420 p pp 33 Chiu CY, Yeh KW, Huang YL, et al. Urinary LTE4 level as a diagnostic marker for atopic diseases in preschoo children: A birth cohort study. Eur Respir J 2014; 44: Suppl. 58, 4200. p 33 Chiu CY, Yeh KW, Huang YL, et al. Urinary LTE4 level as a diagno children: A birth cohort study. Eur Respir J 2014; 44: Suppl. 58, 4200. 34 Lukkarinen M, Vuorinen T, Lehtinen P, et al. Rhinovirus aetiology at the first wheeze predicts atopic but no non-atopic asthma at 7 years. Eur Respir J 2014; 44: Suppl. 58, 430. 34 Lukkarinen M, Vuorinen T, Lehtinen P, et al. Rhinovirus aetiology non-atopic asthma at 7 years. Eur Respir J 2014; 44: Suppl. 58, 430. 35 Schultz ES, Hallberg J, Bellander T, et al. Preschool exposure to traffic-related air pollution and small airway involvement in adolescence. Eur Respir J 2014; 44: Suppl. 58, 2991. 35 Schultz ES, Hallberg J, Bellander T, et al. Preschool exposure to t involvement in adolescence. Eur Respir J 2014; 44: Suppl. 58, 2991. 36 Smit LAM, Lenters V, Høyer BB, et al. Prenatal exposure to environmental contaminants and asthma and eczema in school-age children. Eur Respir J 2014; 44: Suppl. 58, 2918. 37 Kieninger E, Fuchs O, Latzin P, et al. Rhinovirus infections in infancy and early childhood. Eur Respir J 2013; 41 443–452. 38 Olsson D, Bråbäck L, Forsberg B. Air pollution exposure during pregnancy and infancy and childhood asthma Eur Respir J 2014; 44: Suppl. 58, 4237. p 39 Duijts L, Sonnenschein-van der Voort AMM, De Jongste JC, et al. Preterm birth and early growth characteristic are associated with lower lung function in childhood: a meta-analysis of 24,000 European children. References Lung function and nutritional status in urban Malagasy children. Eur Respir J 2014; 44: Suppl. 58, 192. 13 Arigliani M, Canciani MC, Altomare M, et al. Lung function and nutritional status in urban Malagasy children Eur Respir J 2014; 44: Suppl. 58, 192. p pp 14 Iglesias I, Benavides M, Delgado YP, et al. Validation of the global lung function initiative (GLI) spirometry reference equations in school age Spanish children. Eur Respir J 2014; 44: Suppl. 58, 4519. q g p p pp 15 Kirkby J, Lum S, Stocks J, et al. Adaptation of the GLI-2012 spirometry reference equations for use in Indian children. Eur Respir J 2014; 44: Suppl. 58, 191. ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 14 PAEDIATRICS | F. MIDULLA ET AL. 16 Mandadzhieva S, Marinov B, Kostianev S. Prediction equations for carbon monoxide diffusing capacity of the lung (TL,CO) in healthy Bulgarian children aged 7 to 18 years. Eur Respir J 2014; 44: Suppl. 58, 193. 17 Boudewyns A, Verhulst S, Saldien V, et al. Drug-induced sedation endoscopy (DISE) as a tool for upper airway l ti i b hild ith b t ti l E R i J 2014 44 S l 58 235 17 Boudewyns A, Verhulst S, Saldien V, et al. Drug-induced sedation endoscopy (DISE) as a tool for upper airway evaluation in obese children with obstructive sleep apnoea. Eur Respir J 2014; 44: Suppl. 58, 235. 17 Boudewyns A, Verhulst S, Saldien V, et al. Drug-induced sedation endoscopy (DISE) as a tool for evaluation in obese children with obstructive sleep apnoea. Eur Respir J 2014; 44: Suppl. 58, 235. 18 Pie tropaoli N, Supino MC, Rabasco J, et al. The role of sleep clinical record and nocturnal pulse oximetry in predicting childhood obstructive sleep apnea. Eur Respir J 2014; 44: Suppl. 58, 3271. 18 Pie tropaoli N, Supino MC, Rabasco J, et al. The role of sleep clinical record and nocturnal pulse o di ti hildh d b t ti l E R i J 2014 44 S l 58 3271 18 Pie tropaoli N, Supino MC, Rabasco J, et al. The role of sleep clinical record and nocturnal pulse oximetry in predicting childhood obstructive sleep apnea. Eur Respir J 2014; 44: Suppl. 58, 3271. p g p p p pp 19 Alexopoulos E, Malakasioti G, Varlami V, et al. References Nocturnal enuresis as risk factor for moderate-to-severe OSA in children with snoring. Eur Respir J 2014; 44: Suppl. 58, 4912. children with snoring. Eur Respir J 2014; 44: Suppl. 58, 4912 g p pp 20 Price D, Hillyer EV, van der Molen T. Efficacy versus effectiven management. Curr Opin Allergy Clin Immunol 2013; 13: 50–57. g p pp 20 Price D, Hillyer EV, van der Molen T. Efficacy versus effectiveness trials: informing guidelines for asthma management. Curr Opin Allergy Clin Immunol 2013; 13: 50–57. 21 Murray CS, Turner S, Thomas M, et al. Comparative effectiveness of paediatric asthma step-up options Increasing ICS dose vs adding separate LABA. Eur Respir J 2014; 44: Suppl. 58, 434. 22 Murray CS, Turner S, Thomas K, et al. Predictors of BTS Step 3 paediatric asthma prescribing. Eur Respir J 2014 44: Suppl. 58, 1171. 23 Engelkes M, Janssens H, De Ridder M, et al. Epidemiology and characteristics of severe asthma exacerbations in children. Eur Respir J 2014; 44: Suppl. 58, 435. p pp 24 Forno E, Celedón JC. Predicting asthma exacerbations in children. Curr Opin Pulm Med 2012; 18: 63–69. lk l h h l d 25 Engelkes M, Janssens H, De Jongste J, et al. Long-acting β2 agonist without concomitant inhaled cortic i hild ith th i i E R pi J 2014 44 S l 58 1166 25 Engelkes M, Janssens H, De Jongste J, et al. Long-acting β2 agonist without concomitant inhaled corticosteroids in children with asthma in primary care. Eur Respir J 2014; 44: Suppl. 58, 1166. asthma in primary care. Eur Respir J 2014; 44: Suppl. 58, 1166 26 Brand PL, Caudri D, Eber E, et al. Classification and pharmacological treatment of preschool wheezing: change since 2008. Eur Respir J 2014; 43: 1172–1177. p 27 Mutti E, Baraldo S, Bazzan E, et al. Defining phenotypes of wheeze at preschool age: Comparison of episodic v multitrigger wheeze. Eur Respir J 2014; 44: Suppl. 58, 429. gg p pp 28 Andersson C, Shikhagaie M, Al-Garawi A, et al. Mast cells infiltrate the alveolar parenchyma in young children with respiratory viral infections Eur Respir J 2014; 44: Suppl 58, 3225 29 O’Reilly R, Ullmann N, Irving S, et al. Increased airway smooth muscle in preschool wheezers who have asthma at school age. J Allergy Clin Immunol 2013; 131: 1024–1032. school age. J Allergy Clin Immunol 2013; 131: 1024–1032. References Eur Respir 2014; 44: Suppl. 58, 442. pp 40 Pijnenburg MW, Baraldi E, Brand PLP, et al. Monitoring asthma in children. Eur Respir J 2015; 45: 906–925. S d b A l ff f d d l d lf 41 Van Bragt S, Van den Bemt L, Vaessen-Verberne A, et al. Effectiveness of individualized self managemen support for children with asthma in Dutch outpatient clinics, preliminary results of a randomized controlled trial. Eur Respir J 2014; 44: Suppl. 58, 1159. p pp 42 Ramsey BW, Davies J, McElvaney NG, et al. A CFTR potentiator in patients with cystic fibrosis and the G551D mutation. N Engl J Med 2011; 365: 1663–1672. 43 Rowe SM, Heltshe SL, Gonska T, et al. Clinical mechanism of the cystic fibrosis transmembrane conductance regulator potentiator ivacaftor in G551D-mediated cystic fibrosis. Am J Respir Crit Care Med 2014; 190: 175–184. 44 McKone EF, Borowitz D, Drevinek P, et al. Long-term safety and efficacy of ivacaftor in patients with cystic fibrosis who have the Gly551Asp-CFTR mutation: a phase 3, open-label extension study (PERSIST). Lancet Respir Med 2014; 2: 902–910. k k A lk S l ff d f f f h f b d p 45 De Boeck K, Munck A, Walker S, et al. Efficacy and safety of ivacaftor in patients with cystic fibrosis and a non-G551D gating mutation. J Cyst Fibros 2014; 13: 674–680. g g y 46 Boyle MP, Bell SC, Konstan MW, et al. A CFTR corrector (lumacaftor) and a CFTR potentiator (ivacaftor) fo treatment of patients with cystic fibrosis who have a phe508del CFTR mutation: a phase 2 randomised controlled trial. Lancet Respir Med 2014; 2: 527–538. p 47 Kerem E, Konstan MW, De Boeck K, et al. Ataluren for the treatment of nonsense-mutation cystic fibrosis: a randomised, double-blind, placebo-controlled phase 3 trial. Lancet Respir Med 2014; 2: 539–547. 48 Clancy JP, Dupont L, Konstan MW, et al. Phase II studies of nebulised Arikace in CF patients with Pseudomona aeruginosa infection. Thorax 2013; 68: 818–825. 49 Bilton D, Pressler T, Fajac I, et al. Interim data from a long-term safety, tolerability, and efficacy study of liposomal amikacin for inhalation in cystic fibrosis patients with chronic Pseudomonas aeruginosa infection. Eur Resp J 2014; 44: Suppl. 58, 3445. p pp 50 Tullis DE, Burns JL, Retsch-Bogart GZ, et al. Inhaled aztreonam for chronic Burkholderia infection in cystic fibrosis: a placebo-controlled trial. PAEDIATRICS | F. MIDULLA ET AL. 51 Balfour-Lynn IM. At last, Burkholderia spp. is one of the inclusion criteria – a negative (but published) randomised controlled trial. J Cyst Fibros 2014; 13: 241–242. 52 Su S, Riccobene T, Scott C. Lung deposition of inhaled colistimethate sodium in cystic fibrosis patients. Eur Respir J 2014; 44: Suppl. 58, 1975. p pp 53 Bilton D, Bellon G, Charlton B, et al. Pooled analysis of two large randomised phase III inhaled mannitol studies in cystic fibrosis. J Cyst Fibros 2013; 12: 367–376. y y 54 Ong HX, Loo CY, Lee WH, et al. Sweetening antibiotic treatment for eradication of bacteria biofilm. Eur Respir J 2014; 44: Suppl. 58, 3443. 55 Schoegler A, Kopf BS, Muster RJ, et al. Antiviral activity of azithromycin in cystic fibrosis airway epithelial cells Eur Respir J 2014; 44: Suppl. 58, 3450. p 56 Schögler A, Kopf BS, Edwards MR, et al. Novel antiviral properties of azithromycin in cystic fibrosis airway epithelial cells. Eur Respir J 2015; 45: 428–439. p p 57 Boikos C, De Serres G, Lands LC, et al. Safety of live-attenuated influenza vaccination in cystic fibrosis. Pediatrics 2014; 134: e983–e991. 58 Waddingham P, Simmonds N, Bilton D. Safety, tolerability and efficacy of intravenous aminophylline in adult patients with pulmonary exacerbations of cystic fibrosis. Eur Respir J 2014; 44: Suppl. 58, 1969. 59 Mistry A, Huggins R, Ward A, et al. Difficulties in optimizing vitamin D levels in paediatric cystic fibrosis patients. Eur Respir J 2014; 44: Suppl. 58, 1223. 60 Schoegler A, Kopf BS, Muster RJ, et al. Novel antiviral properties of vitamin D in cystic fibrosis airway epithelial cells. Eur Respir J 2014; 44: Suppl. 58, 3449. p pp 61 Davies J, Sheridan H, Bell N, et al. Assessment of clinical response to ivacaftor with lung clearance index in cystic fibrosis patients with a G551D-CFTR mutation and preserved spirometry: a randomised controlled trial Lancet Respir Med 2013; 1: 630–638. p 62 Elborn JS, O’Neill K, Johnston E, et al. Increased systemic inflammation in cystic fibrosis (CF) is associated with deterioration in lung clearance index (LCI). Eur Respir J 2014; 44: Suppl. 58, 1206. 63 Hatziagorou E, Avramidou V, Kampouras A, et al. Clinical value of lung clearance index (LCI) among patients with cystic fibrosis. Eur Respir J 2014; 44: Suppl. 58, 1218. 64 Grosse-Onnebrink J, Stehling F, Mellies U. Lung clearance index predicts pulmonary exacerbations in cystic fibrosis. PAEDIATRICS | F. MIDULLA ET AL. Eur Respir J 2014; 44: Suppl. 58, 1219. 64 Grosse-Onnebrink J, Stehling F, Mellies U. Lung clearance index predicts pulmonary exacerbations in cystic fibrosis. Eur Respir J 2014; 44: Suppl. 58, 1219. 65 Ramsey K, Rosenow T, Skoric B, et al. Agreement between the lung clearance index and bronchiectasis detected 65 Ramsey K, Rosenow T, Skoric B, et al. Agreement between the lung clearance index and bronchiectasis detected via chest computed tomography in infants and children with cystic fibrosis (CF). Eur Respir J 2014; 44: Suppl 58, 1974. 66 Thia LP, Calder A, Stocks J, et al. Is chest CT useful in newborn screened infants with cystic fibrosis at 1 year of age? Thorax 2014; 69: 320–327. g 67 Mott LS, Park J, Murray CP, et al. Progression of early structural lung disease in young children with cystic fibrosis assessed using CT. Thorax 2012; 67: 509–516. g 68 Rosenow T, Kuo W, de Bruijne M, et al. A new gold standard for assessing CT in early CF lung disease? Eur Respir J 2014; 44: Suppl. 58, 3446. 69 Boon M, Bosch B, Lammertyn E, et al. Quantitative evaluation of CF airways using HRCT, µCT and histology Eur Respir J 2014; 44: Suppl. 58, 3447. 70 Jung A, Amaxopoulou C, Gnannt R, et al. Lung MRI findings in children with cystic fibrosis. Eur Respir J 2014 44: Suppl. 58, 1215. pp 71 Marshall H, Hughes D, Horsley A, et al. Detection of early-stage lung disease in cystic fibrosis; comparing the sensitivity of 3He and 1H MRI, CT and LCI. Eur Respir J 2014; 44: Suppl. 58, 3448. 72 Parekh G, Tunney M, Vallières E, et al. Inflammatory biomarkers in urine of cystic fibrosis patients. Eur Respir J 2014; 44: Suppl. 58, 1208. pp 73 Yacob A, Zirbes J, Dunn C, et al. A relative plasma Elafin deficiency in children with cystic fibrosis (CF) is associated with pulmonary disease. Eur Respir J 2014; 44: Suppl. 58, 1200. 74 DeBoer E, Kroehl M, Wagner B, et al. Novel protein biomarkers of bronchiectasis in children with cystic fibrosis Eur Respir J 2014; 44: Suppl. 58, 1960. p pp 75 Naehrig S, Huber RM, Gülberg V, et al. Screening colonoscopy in adults with cystic fibrosis. Eur Respir J 2014 44: Suppl. 58, 1967. 76 Meurling J, McCarthy C, Gunaratnam C, et al. The CF-ABLE score: A 2-year evaluation of a 4-year prognostic tool. References J Cyst Fibros 2014; 13: 296–305. 15 ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 PAEDIATRICS | F. MIDULLA ET AL. PAEDIATRICS | F. MIDULLA ET AL. 87 Maguire C, Cantrill H, Hind D, et al. Hypertonic saline (HS) for acute bronchiolitis: systematic review and meta-analysis. Eur Respir J 2014; 44: Suppl. 58, 1226. 88 Everard ML, Hind D, Freeman JV, et al. Hypertonic saline in acute bronchiolitis: randomised controlled trial (RCT) and economic evaluation (the SABRE study). Eur Respir J 2014; 44: Suppl. 58, 3451. 89 Loza B, Teunissen J, Hochs A, et al. Effect of 3 and 6% hypertonic saline in viral bronchiolitis: a RCT. Eur Respir 2014; 44: Suppl. 58, 389. 90 Bekhof J, Wessels M, Reimink R, et al. Roomsharing in hospitalized children with bronchiolitis. Eur Respir 2014; 44: Suppl. 58, 390. pp 91 Rubio MTR, Sendra RL, Pérez JM, et al. High-flow nasal oxygen cannula: a useful non-invasive therapy fo mild-severe bronchiolitis in a secondary hospital. Eur Respir J 2014; 44: Suppl. 58, 3294. 92 Baraldi E, Guiseppe G, Stocchero M, et al. Metabolomic profiling of the amniotic fluid predicts the risk o preterm delivery and BPD development. Eur Respir J 2014; 44: Suppl. 58, 274. 93 Pramana I, Baumann P, Grass B, et al. Plasma pro-endothelin-1 as marker of severe lung injury in very preterm infants. Eur Respir J 2014; 44: Suppl. 58, 275. 94 Dassios T, Curley A, Molnar Z, et al. Chest radiographic thoracic area and severity of bronchopulmonary dysplasia. Eur Respir J 2014; 44: Suppl. 58, 279. y p p pp 95 Henckel E, James A, Konradsson J, et al. A novel association between YKL-40, a marker for structural lung disease, and short telomere length in 10-year old children with BPD. Eur Respir J 2014; 44: Suppl. 58, 3304. 96 Onland W, Debray TP, Laughon MM, et al. Clinical prediction models of bronchopulmonary dysplasia: a systematic review and external validation study. BMC Paediatrics 2013; 13: Suppl. 58, 207. y y pp 97 Fellman V, Hellstrom-Westas L, Norman M, et al. One-year survival of extremely preterm infants after active perinatal care in Sweden. JAMA 2009; 301: 2225–2233. p 98 Koschlig M, Tian X, Sudheendra D, et al. Reduced BMP signaling in lungs of mechanically ventilated newborn mice as a potential target for neonatal chronic lung disease. Eur Respir J 2014; 44: Suppl. 58, 278. p g g p pp 99 Moreno L, Menéndez C, Barreira B, et al. A potential role for Gremlin1 in pulmonary maturation and neonata hypoxia-induced pulmonary hypertension. Eur Respir J 2014; 44: Suppl. 58, 3296. PAEDIATRICS | F. MIDULLA ET AL. 111 Thouvenin G, Monhounso H, Busson PF, et al. M g py p pp 112 Albuali WH. The use of intravenous and inhaled magnesium sulphate in management of children with bronchia asthma. J Matern Fetal Neonatal Med 2014; 27: 1809–1815. 113 Ohn M, Jacobe S. Magnesium should be given to all children presenting to hospital with acute severe asthma Paediatr Respir Rev 2014; 15: 319–321. p 114 Duijts L. Fetal and infant origins of asthma. Eur J Epidemiol 2012; 27: 5–14. 115 Murk W, Risnes KR, Bracken MB. Prenatal or early-life exposure to antibiotics and risk of childhood asthma: a systematic review. Pediatrics 2011; 127: 1125–1138. y 116 Popovic M, Zugna D, Galassi C, et al. Prenatal exposure to antibiotics and wheezing: An internet-based birth cohort study. Eur Respir J 2014; 44: Suppl. 58, 441. y p pp 117 Mulder B, Pouwels K, Schuiling-Veninga C, et al. Antibiotic use among Dutch pregnant woman and the development of toddler asthma: the influence of confounding. Eur Respir J 2014; 44: Suppl. 58, 440. 118 Stokholm J, Sevelsted A, Bønnelykke K, et al. Maternal propensity for infections and risk of childhood asthma: a registry-based cohort study. Lancet Respir Med 2014; 2: 631–637. 118 Stokholm J, Sevelsted A, Bønnelykke K, et al. Maternal propensity fo registry-based cohort study. Lancet Respir Med 2014; 2: 631–637. 119 Camargo CAJr, Ingham T, Wickens K, et al. Cord-blood 25-hydroxyvitamin D levels and risk of respiratory infection, wheezing, and asthma. Pediatrics 2011; 127: e180–e187. 120 Morales E, Romieu I, Guerra S, et al. Maternal vitamin D status in pregnancy and risk of lower respiratory trac infections, wheezing, and asthma in offspring. Epidemiology 2012; 23: 64–71. 120 Morales E, Romieu I, Guerra S, et al. Maternal vitamin D status in pregnancy infections, wheezing, and asthma in offspring. Epidemiology 2012; 23: 64–71. g p g p gy 121 Ingham TR, Jones B, Camargo CAJr, et al. Association of vitamin D deficiency with severity of acute respiratory infection: A case-control study in New Zealand children. Eur Respir J 2014; 44: Suppl. 58, 439. 122 Morales E, Garcia-Esteban R, de la Cruz OA, et al. Intrauterine and early postnatal exposure to outdoor ai pollution and lung function at preschool age. Thorax 2015; 70: 64–73. g g 123 Fuchs O, von Mutius E. Genetic and environmental factors in bronchial asthma and wheezing disorders. In: Eber E, Midulla F, eds. PAEDIATRICS | F. MIDULLA ET AL. Eur Respir J 2014; 44: Suppl. 58, 1964. 77 Nair C, Shoemark A, Chan M, et al. Cyanide levels found in infected cystic fibrosis sputum inhibit airway ciliary function. Eur Respir J 2014; 44: 1253–1261. p 78 Gilchrist F, Jones A, Webb K, et al. The sensitivity and specificity of Pseudomonas aeruginosa detection using hydrogen cyanide concentration in exhaled breath – the SPACE study. Eur Respir J 2014; 44: Suppl. 58, 3444. 79 Saiman L, Siegel JD, LiPuma JJ, et al. Infection prevention and control guideline for cystic fibrosis: 2013 update Infect Control Hosp Epidemiol 2014; 35: Suppl. 1, S1–S67. f p p 80 Knibbs LD, Johnson GR, Kidd TJ, et al. Viability of Pseudomonas aeruginosa in cough aerosols generated by persons with cystic fibrosis. Thorax 2014; 69: 740–745. p y 81 Conway S, Balfour-Lynn IM, De Rijcke K, et al. European Cystic Fibrosis Society Standards of Care: framework for the cystic fibrosis centre. J Cyst Fibros 2014; 13: Suppl. 1, S3–22. y y pp 82 Smyth AR, Bell SC, Bojcin S, et al. European Cystic Fibrosis Society Standards of Care: best practice guidelines J Cyst Fibros 2014; 13: Suppl. 1, S23–S42. 83 Stern M, Bertrand DP, Bignamini E, et al. European Cystic Fibrosis Society Standards of Care: quality management in cystic fibrosis. J Cyst Fibros 2014; 13: Suppl. 1, S43–S59. g y y 84 Constant C, Magalhães M, Andrade MG, et al. Perspectives of pediatricians and general practitioners on diagnosis and treatment of bronchiolitis. Eur Respir J 2014; 44: Suppl. 58, 1237. g p pp 85 Bon A, Mauro M, Manfredi A, et al. Bronchiolitis in the last ten years in a tertiary paediatric department Evaluation of evidence-based guidelines. Eur Respir J 2014; 44: Suppl. 58, 3459. d k b h d l f b h l h b 85 Bon A, Mauro M, Manfredi A, et al. Bronchiolitis in the last ten years in Evaluation of evidence-based guidelines. Eur Respir J 2014; 44: Suppl. 58, 3459. 86 Gadomski AM, Scribani MB. Bronchodilators for bronchiolitis. Cochrane Datab 86 Gadomski AM, Scribani MB. Bronchodilators for bronchiolitis. Cochrane Database Syst Rev 2014; 6: CD001266. ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 16 PAEDIATRICS | F. MIDULLA ET AL. PAEDIATRICS | F. MIDULLA ET AL. 100 Yang J, Li X, Al-Lamki RS, et al. Sildenafil potentiates bone morphogenetic protein signaling in pulmonary arterial smooth muscle cells and in experimental pulmonary hypertension. Arterioscler Thromb Vasc Biol 2013 33: 34–42. arterial smooth muscle cells and in experimental pulmonary hypertension. Arterioscler Thromb Vasc Biol 2013; 33: 34–42. 101 Mustafayev I, Allahverdiyeva L, Bogdanova A. Immune status in bronchopulmonary dysplasia. Eur Respir J 2014; 44 Suppl 58 3306 33: 34–42. 101 Mustafayev I, Allahverdiyeva L, Bogdanova A. Immune status in bronchopulmonary dysplasia. Eur Respir J 2014; 44: Suppl 58, 3306 101 Mustafayev I, Allahverdiyeva L, Bogdanova A. Immune status in bronchopulmonary dysplasia. Eur Respir J 2014 44: Suppl. 58, 3306. 102 Frankenberger M, Kaßner G, Oak P, et al. Intermediate CD14++CD16+ blood monocytes are elevated in preterm neonates. Eur Respir J 2014; 44: Suppl. 58, 3307. p 103 Bhat P, Rafferty G, Hannam S, et al. Prediction of extubation outcome in neonates born prematurely or at term Eur Respir J 2014; 44: Suppl. 58, 277. 104 Rossor T, Ali K, Trenear R, et al. The effects of sleeping position on the ventilatory response to hypercarbia. Eu Respir J 2014; 44: Suppl. 58, 276. p pp 105 Barikbin P, Roehr CC, Wilitzki S, et al. Congenital cystic adenomatoid malformation: Initial lung function tes predicts respiratory impairment. Eur Respir J 2014; 44: Suppl. 58, 3302. p p y p p pp 106 Iglesias I, Rajmil R, Dominguez P. High flow nasal cannulae for bronchiolitis in pediatric interhospital critica care transport. Eur Respir J 2014; 44: Suppl. 58, 3300. p p pp 107 Luciani S, Caresta E, Cicchetti R, et al. Effort of breathing indices in infants with acute respiratory insufficiency receiving different noninvasive respiratory support. Eur Respir J 2014; 44: Suppl. 58, 3295. 108 Fouzas S, Tzifas S, Pelekouda P, et al. Effective concentrations of oxygen delivered to infants via nasal cannula: Back to the model. Eur Respir J 2014; 44: Suppl. 58, 3298. p pp 109 Phillips B. Towards evidence based medicine for paediatricians. Arch Dis Child 2013; 98: 1018. 110 Tiwari A, Guglani V, Jat KR. Ketamine versus aminophylline for status asthmatic in children: A randomized controlled trial. Eur Respir J 2014; 44: Suppl. 58, 281. 111 Thouvenin G, Monhounso H, Busson PF, et al. Management of severe acute asthma in childhood: impact of intravenous magnesium therapy. Eur Respir J 2014; 44: Suppl. 58, 280. PAEDIATRICS | F. MIDULLA ET AL. Treatment strategies in the management of severe complications following slide tracheoplasty in children. Eur J Cardiothorac Surg 2014; 46: 280–285. g p y g 138 Madkour A, Elmansoury A, Sharkawy S. The efficacy of fiberoptic bronchoscopy via laryngeal mask airway in pediatric foreign bodies extraction. Eur Respir J 2014; 44: Suppl. 58, 4652. 139 Moreno M, Castillo S, Castaño C, et al. Protracted bacterial bronchitis and malacias: which came first, the chicken or the egg? Eur Respir J 2014; 44: Suppl. 58, 4654. 140 Kompare M, Weinberger M. Protracted bacterial bronchitis in young children: association with airway malacia J Pediatr 2012; 160: 88–92. 141 Zgherea D, Pagala S, Mendiratta M, et al. Bronchoscopic findings in children with chronic wet cough. Pediatrics 2012; 129: e364–e369. 142 Goussard P, Walters E, Bosch C, et al. Factors that predict for positive GeneXpert MTB/RIF on bronchoalveolar lavage samples in children with suspected tuberculosis. Eur Respir J 2014; 44: Suppl. 58, 4653. 143 Svedberg M, Kötz K, Hesselmar B. Bronchoalveolar lavage fluid recovery in children correlates with age and neutrophils. Eur Respir J 2014; 44: Suppl. 58, 4657. p p pp 144 Honková L, Beránková K, Uhlík J, et al. Deposition of tenascin C and collagen IV in bronchial basement membrane of children with chronic respiratory diseases. Eur Respir J 2014; 44: Suppl. 58, 4655. 145 Berankova K, Uhlik J, Honkova L, et al. Structural changes in the bronchial mucosa of young children at risk of developing asthma. Pediatr Allergy Immunol 2014; 25: 136–142. developing asthma. Pediatr Allergy Immunol 2014; 25: 136– 146 Saglani S, Malmström K, Pelkonen AS, et al. Airway remodeling and inflammation in symptomatic infants with reversible airflow obstruction. Am J Respir Crit Care Med 2005; 171: 722–727. p 147 Krivec U, Praprotnik M, Lepej D, et al. Flexible bronchoscopy in children with neuromuscular disease and acute hypoxemic respiratory failure requiring noninvasive ventilation. Eur Respir J 2014; 44: Suppl. 58, 4656. 148 Arumugam JM, Hartt C, Vadamalayan B, et al. Lipid laden macrophages in bronchoalveolar lavage as a marker of pulmonary aspiration secondary to acid and non-acid gastroesophageal reflux. Eur Respir J 2014; 44: Suppl 58, 4468. 149 Jedynak-Wasowicz U, Cichocka-Jarosz E, Sladek M, et al. Evaluation of gastroesophageal reflux in children with persistent cough: correlation between multichannel intraluminal impedance/pH-metry and oropharyngeal pH monitoring. Eur Respir J 2014; 44: Suppl. 58, 4469. PAEDIATRICS | F. MIDULLA ET AL. 124 Casas L, García-Esteban R, Tischer C, et al. Early life mite allergens and respiratory and allergic health Eur Respir J 2014; 44: Suppl. 58, 437. p pp 125 Kotecha SJ, Edwards MO, Watkins WJ, et al. Effect of preterm birth on later FEV1: a systematic review and meta-analysis. Thorax 2013; 68: 760–766. y 126 Fainardi V, Sapienza E, Magnani C, et al. IOS in school-aged children born preterm: is small for gestational age a risk factor for small airway dysfunction? Eur Respir J 2014; 44: Suppl. 58, 1255. y y p pp 127 Edwards M, Kotecha S, Lowe J, et al. Respiratory and neurological outcomes in children born preterm study (RANOPs): Preterm outcomes. Eur Respir J 2014; 44: Suppl. 58, 1253. 128 Been JV, Lugtenberg MJ, Smets E, et al. Preterm birth and childhood wheezing disorders: a systematic review and meta-analysis. PLoS Med 2014; 11: e1001596. y 129 Maurer E, Goutaki M, Behan L, et al. Creating a large multinational dataset of patients with primary ciliary dyskinesia (PCD). Eur Respir J 2014; 44: Suppl. 58, 1244. y p pp 130 Thouvenin G, de Blic J, Epaud R, et al. The French national cohort of children with primary ciliary dyskinesia Eur Respir J 2014; 44: Suppl. 58, 1242. 131 Snijders D, Quartesan S, di Cicco ME, et al. A national survey on primary ciliary dyskinesia in Italy. Eur Respir J 2014; 44: Suppl. 58, 1243. pp 132 Goutaki M, Maurer E, Boon M, et al. Growth in patients with primary ciliary dyskinesia (PCD): a multinational study. Eur Respir J 2014; 44: Suppl. 58, 1246. y p pp 133 Hirst R, Rutman A, Williams G, et al. Re-testing for primary ciliary dyskinesia (PCD) is only indicated for inner dynein arm defects. Eur Respir J 2014; 44: Suppl. 58, 1247. y p pp 134 Serio P, Fainardi V, Leone R, et al. Role of bronchoscopy in diagnosis, treatment and follow-up of vascular anomalies: A multidisciplinary approach. Eur Respir J 2014; 44: Suppl. 58, 4650. 135 Serio P, Fainardi V, Leone R, et al. Tracheobronchial obstruction: follow-up study of 100 children treated with airway stenting. Eur J Cardiothorac Surg 2014; 45: e100–e109. y g g 136 Anton-Pacheco JL, Luna-Paredes C, García-Hernández G, et al. Initial experience with biodegradable tracheal stents in children. Eur Respir J 2014; 44: Suppl. 58, 4651. p pp 137 Antón-Pacheco JL, Comas JV, Luna C, et al. PAEDIATRICS | F. MIDULLA ET AL. g p pp 150 Umutoglu T, Gedik AH, Bakan M, et al. The influence of airway supporting maneuvers on glottis view in paediatric patients undergoing diagnostic flexible fiberoptic bronchoscopy. Eur Respir J 2014; 44: Suppl. 58, 4476. ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 PAEDIATRICS | F. MIDULLA ET AL. ERS Handbook of Paediatric Respiratory Medicine. Sheffield, European Respiratory Society, 2013; pp. 298–304. 17 ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 PAEDIATRICS | F. MIDULLA ET AL. ERJ Open Res 2015; 1: 00016–2015 | DOI: 10.1183/23120541.00016-2015 18
https://openalex.org/W4229044803
https://www.nature.com/articles/s42003-022-03372-2.pdf
English
null
Succession comprises a sequence of threshold-induced community assembly processes towards multidiversity
Communications biology
2,022
cc-by
9,057
1 Department of Environment and Biodiversity, Paris Lodron University Salzburg, 5020 Salzburg, Austria. 2 Evolutionary Ecology of Plants, Department of Biology, Philipps-University Marburg, 35043 Marburg, Germany. ✉email: robert.junker@uni-marburg.de COMMUNICATIONS BIOLOGY | (2022) 5:424 | https://doi.org/10.1038/s42003-022-03372-2 | www.nature.com/commsbio ARTICLE ARTICLE COMMUNICATIONS BIOLOGY | https://doi.org/10.1038/s42003-022-03372-2 S Yet, it is an ongoing debate whether ecological communities generally converge towards a core set of species over the course of succession21,22, and studies on successional convergence have mostly been focused on singular taxa neglecting potential inter- actions and co-occurrences across organismal groups23–25. To specifically test the extent of species turnover across several taxa, we introduce multi-betadiversity, an aggregated measure of taxonomic community dissimilarity. This index allows to test whether the expected increase in biotic interactions is reflected in a reduced compositional variation (i.e., reduced multi- betadiversity regarding several taxa) of the multidiverse com- munity, i.e., a community that comprises a number of taxonomic groups, once niche-based and interaction-mediated assembly processes dominate over stochastic dispersal as main mechanisms shaping multidiversity. S uccession and community assembly research are neigh- boring fields, each with a long history of constructive debates and a large body of ecological literature. Both research lines are founded on overlapping concepts considering processes such as dispersal, environmental filtering, biotic inter- actions, and stochasticity as structuring elements of local com- munities and ecosystems. Nevertheless, succession and community assembly research focus on different spatial and temporal scales, which may have hindered a mutual exchange of ideas1. Succession research relates to the initial development of ecosystems and communities over time. Community assembly studies, on the other hand, try to elucidate the past drivers of local and recent diversity patterns regardless of temporal components. Attempts to synthesize the two fields led to the development of an integrated conceptual framework of succession and community assembly dynamics. Here, drivers of community structure are considered from an explicitly temporal perspective, assuming a temporal sequence of assembly processes shifting from stochastic (likely dispersal) to rather deterministic (niche-based and inter- action-mediated) processes along the course of succession1. The proposed framework also emphasizes the importance of threshold dynamics, predicting that gradual changes in the abiotic and biotic environment are followed by rapid shifts in the pre- dominant processes that determine community assembly2,3. These shifts in processes are expected to be associated with var- ious community-level responses such as changes in diversity, species composition, and functionality which ultimately leads to a community state shift1,2,4. Recent research suggests that sudden ecosystem shifts are not restricted to changes in species compo- sition of single organismal groups but that local diversity patterns emerge from on-site interactions between multiple taxa5,6. ARTICLE Mul- tidiversity, an aggregate measure of biodiversity that integrates the standardized diversities of multiple taxa7, has been shown to reflect ecosystem functionality8, species composition9, and mul- titrophic interactions10 more accurately than diversity measures considering only one taxon. Additionally, the responses of dif- ferent organismal groups to successional gradients may differ either due to stochastic or deterministic drivers11–15. For instance, the assembly of belowground bacterial and fungal communities follows individual trajectories during primary succession that differ from the assembly of vascular plant communities16,17. Thus, the concept of multidiversity is a well-suited approach that can reflect various community-level responses and allows more concise conclusions about different ecosystem states along suc- cessions, as well as underlying assembly processes than con- sidering a single or few taxa only16. Assuming that multidiversity more precisely reflects ecosystem responses and functions, we tested predictions deduced from contemporary succession hypotheses using a dataset on multi- diversity comprising inventories of plants, animals, and micro- organisms along a successional gradient. Most studies on multidiversity have been undertaken in well-developed ecosys- tems that have undergone severe anthropogenic alterations in the past and focused on the drivers of biodiversity decline7,9,10. The mechanisms behind the successional emergence of multidiversity and ecosystem complexity under natural conditions, however, are yet poorly understood. Thus, considering multidiversity within a successional framework will help to gain insights into the tem- poral dynamics of the processes that shape the initial emergence of biodiversity in natural ecosystems that comprise multiple organismal groups with unique and complementary ecological functions. We adopted the concept of multidiversity to empiri- cally test predictions of the integrated framework of succession and community assembly dynamics on an ecological gradient of primary succession following glacial retreat in the Austrian Alps26. We assessed the multidiversity and multi-betadiversity of five organismal groups, including vascular plants, bryophytes, invertebrates, and soil-inhabiting fungi and bacteria on 110 plots spanning 170 years of primary succession. We estimated multi- diversity by the mean of ranked normalized Shannon-diversities and calculated multi-betadiversity as the mean Bray-Curtis dis- similarities between plots regarding the composition of individual taxa. According to the conceptual framework by Chang and HilleRisLambers (2016)1, we predicted that the multidiverse community will undergo a rapid shift that is induced by a sudden change of the biotic and abiotic environment along the succes- sional gradient. ARTICLE We expect this shift to be associated with increased biotic interactions and stronger environmental influ- ences that result in a reduced compositional variation between plots of the multidiverse community. g g y The assumed changes of assembly processes along successions, a decrease in the importance of stochasticity, and a simultaneous increase in niche-based and interaction-based processes, have consequences for the taxonomic, functional, and phylogenetic composition of communities and thus beta diversity1,17. The framework by Chang and HilleRisLambers (2016)1 predicts an increase in functional and phylogenetic diversity of local single- taxon communities in later successions due to niche differentia- tion and intensified biotic interactions. In a multidiversity context where multiple taxa are considered, increased interactions and thus potentially strong dependencies between taxa may result in aggregated co-occurrence patterns18, which may have con- sequences for the beta-diversity between local communities—and not necessarily for the functional and phylogenetic diversity within a community. For instance, interactions between plants and soil-inhabiting microorganisms intensify with successional age19 and regulate plant-animal interactions20, which is reflected in the co-occurrence of the partners involved in these interac- tions. Such interactions may thus result in reduced species turnover across local assemblages in older successional stages. Accordingly, we identified a threshold in multidiversity development (i.e., a shift from an increase of multidiversity with time to a rather stationary phase) and estimated the relative importance of stochasticity, as well as environmental and biotic drivers on the multidiverse community before and after the threshold using path analysis. We further highlighted the more structured character of community assembly after the shift by comparing multi-betadiversity estimates of the early and late- successional communities. Succession comprises a sequence of threshold- induced community assembly processes towards multidiversity Maximilian Hanusch 1, Xie He 1, Victoria Ruiz-Hernández1 & Robert R. Junker 1, Research on successions and community assembly both address the same processes such as dispersal, species sorting, and biotic interactions but lack unifying concepts. Recent theore- tical advances integrated both research lines proposing a sequence of stochastic and deterministic processes along successional gradients. Shifts in ecosystem states along suc- cessional gradients are predicted to occur abruptly once abiotic and biotic factors dominate over dispersal as main driver. Considering the multidiversity composed of five organismal groups including plants, animals, and microbes, our results imply that stochastic, likely dis- persal-dominated, processes are replaced by rather deterministic processes such as envir- onmental filtering and biotic interactions after around 60 years of succession in a glacier forefield. The niche-based character of later successional processes is further supported by a decline in multi-beta-diversity. Our results may update concepts of community assembly by considering multiple taxa, help to bridge the gap between research on successions and community assembly, and provide insights into the emergence of multidiverse and complex ecosystems. 1 Results 1 Multidiversity along the successional gradient. Multidiversity increases during the early successional stage and remains stationary as Fig. 1 Multidiversity along the successional gradient. Multidiversity increases during the early successional stage and remains stationary as succession continues. The vertical dashed line indicates the estimated threshold in multidiversity development, which is the threshold in community assembly as predicted by the framework of Chang and HilleRisLambers (2016)1. The grey regression line indicates the linear correlation between multidiversity and time since deglaciation using a broken-stick model. Blue dashed lines indicate the 2.5% and 97.5% quantiles of fitted values. The yellow curve on the x-axis resembles the posterior distribution for the estimate of the breaking point, i.e., higher density of the frequency indicates a higher probability for the breaking point to be located at a given value. whereas temperature did not affect multidiversity (β = 0.01, p = 0.93, Fig. 3a). Furthermore, diversities of the five organismal groups varied independently of each other suggesting little or no mutual influences. In late succession, mean growth-season soil temperature had a significant positive direct effect on the diversity of bryophytes (β = 0.35, p = 0.01) and a clear positive indirect effect on multidiversity mediated through all organismal groups (β = 0.30, p = 0.01). Plot age had a negative effect on fungal diversity (β = −0.35, p < 0.01) and a positive effect on bryophyte diversity (β = 0.30, p = 0.01) but no effect on multidiversity (β = −0.01, p = 0.89). We further detected positive residual covariances between vascular plant (β = 0.26, p = 0.04), inverte- brate (β = 0.25, p = 0.05) and bacterial (β = 0.29, p = 0.03) diversities with fungal diversity, suggesting mutual influences between taxa (Fig. 3b). Drivers of multidiversity. To quantify the putative relative importance of stochastic dispersal, species interactions, and environmental drivers before and after the threshold, we specified a path model in which time since deglaciation and mean growth- season soil temperature act as exogenous variables and directly affect diversities of single organismal groups. Soil temperature is an environmental factor that is important for the diversity of several trophic levels in alpine environments29,30. We also tested the effects of other environmental variables, such as soil nutrient content and soil-pH value but could not detect any significant effects and thus removed these variables from the final model (see “Methods” and Supplementary Data 1–4). Results After accounting for environmental variation, we consider the effect of time since deglaciation as a proxy for stochastic events, such as successful dispersal and colonization events31,32, leading to cumulating multidiversity over time. The total effects of time since degla- ciation (proxy for stochastic dispersal) and environmental drivers on multidiversity were estimated as indirect effects mediated through the organismal groups. Biotic interactions were modeled as the residual covariance among the diversity values among all organismal groups that remained after accounting for stochasti- city and environmental variation. If corrected for such underlying common causes, strong positive covariances within communities can be interpreted as biotic interactions33,34. We further tested whether the residuals of the estimated models show significant spatial autocorrelation but could not detect any unexplained variance that could be attributed to geographic variation (see Methods and Supplementary Table 2). Multi-betadiversity. We predicted that the shift from dispersal dominated stochastic events in early successional stages to more deterministic niche-based processes that are induced through environmental filtering and biotic interactions in late successional stages is associated with lower beta-diversity among communities after the threshold. To test this prediction, we calculated a mea- sure of total community dissimilarity, multi-betadiversity (mbD) for both successional stages by the mean Bray-Curtis dissim- ilarities of the multidiverse community (see “Methods”). Of n = 5 organismal groups surveyed, n = 4 showed a decrease in betadi- versity and in total, multi-betadiversity was significantly lower in the late successional stage (mean ± SD; mbDearly = 0.75 ± 0.09; mbDlate = 0.70 ± 0.08; Fig. 4). y The path analysis provided good model fit (Model fit: pchi-square > 0.05; CFI > 0.95; TLI ≥0.9; SRMR < 0.09; RMSEAearly < 0.05; RMSEAlate = 0.066 with lower bound of confidence interval = 0) and revealed different influences of the exogenous variables between the early and late successional environments (Fig. 3, Supplementary Data 4). During early succession, time since deglaciation had a strong positive effect on the diversity of bryophytes (β = 0.66, p < 0.01), arthropods (β = 0.62, p < 0.01), and bacteria (β = 0.32, p = 0.04), whereas there was no significant effect of temperature on any organismal group. Time since deglaciation also had a significant positive indirect effect on total multidiversity (β = 0.74, p < 0.01) during early succession, Results Breaking point in multidiversity. Multidiversity follows a non- linear trajectory along the successional gradient. We screened the gradient for the predicted shift from a developing (characterized by an increase in multidiversity over time) to a more stationary ecosystem (characterized by non-monotonic variation in COMMUNICATIONS BIOLOGY | (2022) 5:424 | https://doi.org/10.1038/s42003-022-03372-2 | www.nature.com/commsbio 2 ARTICLE COMMUNICATIONS BIOLOGY | https://doi.org/10.1038/s42003-022-03372-2 Fig. 1 Multidiversity along the successional gradient. Multidiversity increases during the early successional stage and remains stationary as succession continues. The vertical dashed line indicates the estimated threshold in multidiversity development, which is the threshold in community assembly as predicted by the framework of Chang and HilleRisLambers (2016)1. The grey regression line indicates the linear correlation between multidiversity and time since deglaciation using a broken-stick model. Blue dashed lines indicate the 2.5% and 97.5% quantiles of fitted values. The yellow curve on the x-axis resembles the posterior distribution for the estimate of the breaking point, i.e., higher density of the frequency indicates a higher probability for the breaking point to be located at a given value. multidiversity over time) using breaking point analysis, which detects changes in the slope of associations. According to Groffman (2006)27 breaking points represent ecological thresh- olds, which is characterized by a rapid change of the slope in the association between time since deglaciation as explanatory vari- able and multidiversity as dependent variable in our study. We found such a breaking point by cross-validating a broken-stick model to alternative models that either did not include a breaking point or included a disjunct breaking point using Bayesian inference28. We then used Bayes Factors analysis to validate the exact location of the breaking point after about 60 years of suc- cession, i.e., plot index 44 along the gradient (lower-upper bounds: 40–74 years after deglaciation; see “Methods”, Fig. 1, Supplementary Table 1). Resulting piecewise linear models showed a significant linear increase in multidiversity during the early successional stage and a stationary multidiversity (non- significant relationship with time) for the late successional stage (early: t42 = 5.77, p < 0.001, r2 = 0.44; late: t64 = −0.55, p = 0.58, r2 = 0.004; Fig. 1). To assess whether the delineated threshold is also reflected in the composition of the multidiverse community, we calculated the relative abundance of each taxon along the successional gradient and visualized it in a temporally ordered multi-taxa community table of species occurrences (see “Meth- ods”, Fig. 2). Fig. Discussion Multidiversity is indicated as light pink density plot on top of the community composition plot. Grey density plot on the left side indicates the range size of the taxa, i.e., whether their occurrence is restricted to a narrow range of the successional gradient or whether taxa occur along the whole gradient. Black bars on the right represent the organismal group of the taxa in each row, symbols of organismal groups are ordered by decreasing frequency; white dashed horizontal line marks the threshold. Fig. 3 Path analysis regarding the effects of stochastic and deterministic drivers on the multidiverse community for the early and late successional stages. Time since deglaciation and mean growth-season soil temperature act as exogenous variables with directed effects on the diversities of vascular plants, bryophytes, invertebrates, and soil-inhabiting fungi and bacteria. Indirect effects of exogenous variables on multidiversity were calculated by mediation analysis through the direct effects of the organismal groups on multidiversity. Biotic interactions are modeled as covariances between organismal groups. Numbers represent standardized path coefficients and are given for significant paths only. The path model was calculated for (a) the early and (b) the late successional stage separately. Silhouette images were obtained from PhyloPic (http://phylopic.org) under a public domain license (CC0 1.0 license). Fig. 3 Path analysis regarding the effects of stochastic and deterministic drivers on the multidiverse community for the early and late successional g. 3 Path analysis regarding the effects of stochastic and deterministic drivers on the multidiverse community f Fig. 3 Path analysis regarding the effects of stochastic and deterministic drivers on the multidiverse community for the early and late successional stages. Time since deglaciation and mean growth-season soil temperature act as exogenous variables with directed effects on the diversities of vascular plants, bryophytes, invertebrates, and soil-inhabiting fungi and bacteria. Indirect effects of exogenous variables on multidiversity were calculated by garding the effects of stochastic and deterministic drivers on the multidiverse community for the early and late s g y g g y y stages. Time since deglaciation and mean growth-season soil temperature act as exogenous variables with directed effects on the diversities of vascular plants, bryophytes, invertebrates, and soil-inhabiting fungi and bacteria. Indirect effects of exogenous variables on multidiversity were calculated by mediation analysis through the direct effects of the organismal groups on multidiversity. Biotic interactions are modeled as covariances between organismal groups. Discussion Our study is an empirical test of the conceptual framework integrating succession and community assembly dynamics pro- posed by Chang and HilleRisLambers (2016)1 and modified here in the context of multidiverse communities. We showed that threshold dynamics play an important role in the generation of multidiversity under natural conditions and that succession comprises a sequence of different ecosystem states that can be detected using multidiversity. These threshold-mediated shifts in ecosystem states are associated with substantial changes in the COMMUNICATIONS BIOLOGY | (2022) 5:424 | https://doi.org/10.1038/s42003-022-03372-2 | www.nature.com/commsbio 3 ARTICLE COMMUNICATIONS BIOLOGY | https://doi.org/10.1038/s42003-022-03372-2 Fig. 2 Single taxa occurrence along the successional gradient for each taxon that occurs on at least three plots along the gradient. Tiles indicate the relative abundance of each taxon at a given plot relative to the mean abundance of the taxon along the gradient. Taxa are ordered by the weighted average plot of their occurrence, i.e., taxa that reach their abundance optima early in succession appear in the top left and late successional specialist in the bottom right. Relative taxon abundance is color-coded and reflects z-scores with the mean abundance as 0 and one standard deviation as +1 or −1, rescaled between −1 and 1. Multidiversity is indicated as light pink density plot on top of the community composition plot. Grey density plot on the left side indicates the range size of the taxa, i.e., whether their occurrence is restricted to a narrow range of the successional gradient or whether taxa occur along the whole gradient. Black bars on the right represent the organismal group of the taxa in each row, symbols of organismal groups are ordered by decreasing frequency; white dashed horizontal line marks the threshold. Fig. 2 Single taxa occurrence along the successional gradient for each taxon that occurs on at least three plots along the gradient. Tiles indicate the relative abundance of each taxon at a given plot relative to the mean abundance of the taxon along the gradient. Taxa are ordered by the weighted average plot of their occurrence, i.e., taxa that reach their abundance optima early in succession appear in the top left and late successional specialist in the bottom right. Relative taxon abundance is color-coded and reflects z-scores with the mean abundance as 0 and one standard deviation as +1 or −1, rescaled between −1 and 1. COMMUNICATIONS BIOLOGY | https://doi.org/10.1038/s42003-022-03372-2 Fig. 4 Betadiversity values for each organismal group and community-wide multi-betadiversity values for the early and late successional stages. Mean Bray-Curtis dissimilarities were used to calculate betadiversity and multi-betadiversity values. Green violin plots resemble the dissimilarity values of the early successional stage (n = 44 plots), rose violin plots indicate the late successional stage (n = 66 plots). Boxplots indicate the upper and lower quartile of the estimates, and the size of the notch represents the confidence interval of the median. a mean of all organismal groups, i.e., multi-betadiversity (b) bacteria, c fungi, d vascular plants, e bryopyhtes, and (f) invertebrates. Silhouette images were obtained from PhyloPic (http://phylopic.org) under a public domain license (CC0 1.0 license). Fig. 4 Betadiversity values for each organismal group and community-wide multi-betadiversity values for the early and late successional stages. Mean Bray-Curtis dissimilarities were used to calculate betadiversity and multi-betadiversity values. Green violin plots resemble the dissimilarity values of the early successional stage (n = 44 plots), rose violin plots indicate the late successional stage (n = 66 plots). Boxplots indicate the upper and lower quartile of the estimates, and the size of the notch represents the confidence interval of the median. a mean of all organismal groups, i.e., multi-betadiversity (b) bacteria, c fungi, d vascular plants, e bryopyhtes, and (f) invertebrates. Silhouette images were obtained from PhyloPic (http://phylopic.org) under a public domain license (CC0 1.0 license). Our data do not allow to directly test for mutual influences between organismal groups on the taxon level, but we find a strong pattern of positive covariances of the diversities of various taxonomic groups after accounting for environmental variation that is indicative of biotic dependencies within the community. Community covariances have initially been applied to evaluate the relative importance of biotic interactions in multitrophic communities by estimating synchronized fluctuations in popu- lation abundances where positive covariances have been inter- preted as a result of facilitative interactions within a community33,34,39. On the diversity level as analyzed in this study, however, positive covariances among organismal groups do not necessarily reflect only facilitative interactions, because diversity in one group is likely to be positively linked to diversity of another trophic group through specialized interactions, either positive or negative40. For instance, in host-pathogen relation- ships, more diverse host communities harbor a higher diversity of obligate pathogens41 and below-ground fungal diversity is pro- moted by diverse bacterial assemblages through complex feed- back loops42. COMMUNICATIONS BIOLOGY | https://doi.org/10.1038/s42003-022-03372-2 A previous study in the same glacier forefield showed that after more than 50 years of ecosystem development, the soil microbial community is mainly supported by carbon from recent plant production, whereas during the initial stage of ecosystem development, the microbial community is mainly sustained by ancient carbon sources43. The time point of the shift in the main carbon source largely coincides with our delineated threshold in multidiversity development. The increased inter- dependence of the soil microbial and plant community during the later successional stage is also reflected in the positive covariances of vascular plant, fungal and bacterial diversities in our path model. Previous studies have also shown strong mutual depen- dencies of invertebrate and fungal communities in developing alpine environments44,45. Invertebrates increase the diversity of soil-inhabiting microbial taxa by propagule dispersal and create a variability of suitable habitats through modifications of the phy- sical environment46. Some fungal-feeding taxa show preferences community assembly processes. So far, the importance of threshold dynamics has been recognized for anthropogenically altered ecosystems either as catastrophic shifts with respect to climate change4,6 or for restoration efforts of anthropogenically altered landscapes2,3. Here, we revealed a threshold after about 60 years of ecosystem development when multidiversity became stationary. Significant thresholds that are marked by a steep increase followed by stationarity after 40–60 years of succession appear to be a generalizable pattern that occurs in various aspects of ecosystem development, such as plant, invertebrate, and microbial diversities and functionality in glacier forefields in Europe and Northern America11,35–38. The threshold became also evident in the change of community composition with different sets of taxa before and after the breaking point. Prior to the threshold, communities mainly consist of species that reach their abundance optima early in succession. These pioneering species were soon accompanied by taxa with no clear preference of early or late successional stages leading to an increase in multidiversity over time. After the threshold, specialists for early successions are replaced by specialists for late successional stages, consequently multidiversity remained stationary over time (Fig. 2). Thus, acknowledging the effects of threshold dynamics during the development of natural multidiverse ecosystems, and their uni- versality in ecological systems provides valuable insights into the patterns and processes of initial ecosystem development. Discussion Numbers represent standardized path coefficients and are given for significant paths only. The path model was calculated for (a) the early and (b) the late successional stage separately. Silhouette images were obtained from PhyloPic (http://phylopic.org) under a public domain license (CC0 1.0 license). COMMUNICATIONS BIOLOGY | (2022) 5:424 | https://doi.org/10.1038/s42003-022-03372-2 | www.nature.com/commsbio 4 ARTICLE COMMUNICATIONS BIOLOGY | https://doi.org/10.1038/s42003-022-03372-2 COMMUNICATIONS BIOLOGY | (2022) 5:424 | https://doi.org/10.1038/s42003-022-03372-2 | www.nature.com/commsbio Methods S d d i Although co-occurrence patterns must not necessarily reflect biotic interactions54, reduced beta-diversity between plots in later successional stages still may be indicative for stronger biotic interactions, which finds support in studies on plant community assembly55,56. The literature suggests the increasing importance of interactions in community development over time. One explanation put forward is that with increasing niche differentiation, energy and nutrient flows in an ecosystem follow more complex biochemical pathways that necessitate biotic interactions to retain nutrients in the ecosystem through closed mineral cycles and complex food-webs1,17. Our results support the increasing importance of biotic interactions as in the late successional stage, our path model revealed positive community covariances between the soil microbial, vascular plant, and arthropod communities that may represent such complex nutritional cycles comprising primary producers, het- erotrophic organisms, and decomposers For the organismal groups forming these putative cycles, we find a reduced betadi- versity between the plots that indicates a strong interrelatedness of individual taxa after the threshold, which may lead to re- occurring core assemblages of species of several taxa. These assumptions and the threshold suggested by our data after 60 years are further supported by the study of Bardgett et al. (2007)43 that revealed a high dependence of heterotrophic microorganisms on plant communities in the Ödenwinkel fore- field after a similar number of years. We thus recommend extending the integrative framework of succession and commu- nity assembly for multiple interacting taxa that mutually shape their diversity and composition and thus cause a reduction of betadiversity. Sampling. In 2019, we identified all vascular plant and bryophyte species present on the plots and estimated their cover with a resolution of 0.1%. We sampled above-ground arthropod diversity by installing two pitfall traps on each plot. Traps were set active for a total of n = 7 days. The abundance of all arthropods, excluding Collembola and Acari, larger than 3 mm was counted. The abundance of Col- lembola and Acari and of animals smaller than 3 mm was estimated based on random samples of aliquots of the total sample. All arthropods and other animals are identified to the order level. Soil-inhabiting bacteria and fungi were sampled from soil cores from an approximate depth of 3 cm, as soil development in the proglacial study area was limited to the top layers of the pedosphere. Methods S d d i Study design. The study was conducted in the long-term ecological research platform Ödenwinkel which was established in 2019 in the Hohe Tauern National Park, Austria (Dynamic Ecological Information Management System—site and dataset registry: https://deims.org/activity/fefd07db-2f16-46eb-8883-f10fbc9d13a3, last access: March 2021). A total of n = 135 permanent plots was established within the glacier forefield of the Ödenwinkelkees which was covered by ice at the latest glacial maximum in the Little Ice Age around 1850. For this study, we used a subset of n = 110 plots with complete datasets with all biotic and abiotic variables available. The plots represent a successional gradient spanning over 1.7 km in length and were distributed within the glacier forefield to reflect the gradient of glacial retreat at an altitude ranging from 2070 to 2170 m a.s.l (distance between neighboring plots, median ± SD: 19 m ± 6.3 m). Each plot was given a unique index number according to the location along the gradient: the plot with index 1 is located closest to the glacier, plot index 135 is the farthest away from the glacier. Plot age was estimated based on data of historical glacial extent and as glacial loss did not occur at a constant rate, plot locations were pre-selected to represent a linear gradient of time since deglaciation rather than a spatial gradient with equally spaced intervals between plots. To ensure independence of plots in areas of slow glacial retreat, we chose a minimum distance of 5 m between two neighboring plots. Plots were defined as squares with an area of 1 m² and were all oriented in the same cardinal direction. Further details on the design of the research platform, exact plot positions and details on the surrounding environment, as well as on the historical glacial extent can be found in Junker et al. (2020)26. litter). The threshold-mediated character of successional processes is further supported by a pronounced decline in multi-betadiversity that is indicative of an increased dependence structure among the organismal groups. In line with that assumption, we detected a lower beta-diversity in all those organismal groups that also show positive community covariances in the path model. Out of the five organismal groups we studied, only bryophytes were char- acterized by a higher betadiversity in the late successional stage that might be attributable to increasing variability in micro- habitats as the communities mature52,53. ARTICLE COMMUNICATIONS BIOLOGY | https://doi.org/10.1038/s42003-022-03372-2 for certain types of fungal hyphae that frequently have distinct associations with selected plant species as pathogens47, mycor- rhizal partners48, or litter decomposers49, which well explains the pattern of covariance among these groups in our analysis. Fur- ther, the importance of fungi-animal interactions for the devel- opment of ecological complexity was predicted in foundational works on succession theory by Connell and Slatyer (1977)50, as heterotrophic fungi were expected to feed on the carcasses and dung of animals and in turn, certain arthropods were hypothe- sized to be reliant on decomposed substrate for the develop- mental stages of their life cycles. Although bryophytes have been shown to closely interact with epiphytic microorganisms after glacial retreat51, potential interactions of bryophytes with microorganisms may not be detectable in our path model as we sampled soil microbial communities and not all substrate types colonized by bryophytes in our study site (e.g., rocks, scree, and litter). natural ecosystems. These results are not only a proof of concept but also (re-)emphasize that succession is a multi-faceted rather than a linear process that comprises a sequence of assembly processes towards multidiversity and ecosystem complexity. Methods S d d i Soil- microbiome samples were analyzed by next-generation sequencing, and micro- biome profiling of isolated DNA was performed by Eurofins Genomics (Ebersberg, Germany). Prior to the statistical analysis of microbial communities, we performed a cumulative sum scaling (CSS) normalization (R-package “metagenomeSeq” v1.28.2)57 on the count data to account for differences in sequencing depth among samples. Detailed information on the sampling strategies of all organismal groups can be found in Junker et al. (2020)26. Soil temperature measurements were done by installing temperature loggers (MF1921G iButton, Fuchs Elektronik, Weinheim, Germany) 10 cm north of each plot center, at the same depth of 3 cm at which the microbial samples were taken. Mean growth-season soil temperature was calculated based on the recordings ranging from 26th of June to 16th of September repre- senting the period in which the plots were free of permanent snow cover before and after the winter 2019/2020. In 2020, soil samples were taken and soil nutrients (Ca, P, K, Mg, and total N2) as well as soil pH were measured on all plots by AGROLAB Agrar und Umwelt GmbH (Sarstedt, Germany). Soil nutrient analysis was per- formed according to the Ö-Norm Boden: L 1087: 2012-12 (K and P—mg/1000 g), L 1093: 2010-12 (Mg—mg/1000 g), and L 1083: 2006-04 (pH). Total N2 (%) was determined according to the DIN EN 16168: 2012-11. COMMUNICATIONS BIOLOGY | https://doi.org/10.1038/s42003-022-03372-2 Our results indicate an ecosystem state shift associated with different assembly processes: the first 60 years of succession are characterized by stochastic species additions, afterwards rather deterministic processes such as niche-filtering and biotic inter- actions dominate. Although different organismal groups follow individual trajectories during primary succession, multidiversity is mainly promoted by stochastic drivers during the initial phase of ecosystem development, most assumably by heterogenous dispersal events. Over the course of succession, stochasticity is replaced by environmental filtering and biotic interactions as the structuring mechanism of multidiversity. 5 5 COMMUNICATIONS BIOLOGY | (2022) 5:424 | https://doi.org/10.1038/s42003-022-03372-2 | www.nature.com/commsbio COMMUNICATIONS BIOLOGY | (2022) 5:424 | https://doi.org/10.1038/s42003-022-03372-2 | www.nature.com/commsbio Statistics and reproducibility models by calculating spatial neighbor matrices for distance classes of 5 m and 10 m between plots (i.e., the potential to include a maximum of three or five neighboring plots). For both distance classes, we estimated Moran´s I for the residuals of the piece wise linear models of the breaking point analysis and the case-wise residuals of the exogenous variables of the path models using the R-Package “spdep” v1.1-865. Breaking point analysis. According to the hypothesis of community assembly dynamics1 and by visual inspection of the relationship between multidiversity and successional age of the plots, we expected two different stages of community establishment along the successional gradient. These stages are separatable by the transition from a developing (characterized by an increase in multidiversity over time) to a more stationary ecosystem (characterized by non-monotonic variation in multidiversity over time). Such non-linear associations are suggestive of regime- shifts of the ecosystem and can be interpreted as ecological thresholds27. Piecewise regression models have been shown to be the most suitable tool for the detection of ecological thresholds in natural systems, as they are able to correctly estimate the probability, as well as the number and position of ecological thresholds58. We screened the successional gradient for the existence of a threshold by comparing four different models with mD as the dependent and plot age as the independent variable using the R-package “mcp” v0.3.0.928. The mcp-method fits piecewise regression models with a pre-defined number of breaking points and is based on Bayesian inference. We specified a base model m1 (mD-values remain constant along the gradient), and compared it to three alternative models (m2 = constant linear increase of mD-values without a breaking point, m3 = one breaking point in mD-values with a segregated slope (abrupt-threshold model), m4 = one breaking point in mD-values with a joined slope (broken-stick or smooth-threshold model)). For each model, we separately ran three Markov Chain Monte Carlo estimators with a uniform prior for a total of n = 11,000 generations while discarding the first n = 1000 generations as burn-in. Model convergence was estimated by visually inspecting the trace plots and checking that all model parameters reached statio- narity. We then compared the predictive performance of the four models using leave-one-out-cross-validation and confirmed the exact position of the breaking point using Bayes Factors. References 1. Chang, C. & HilleRisLambers, J. Integrating succession and community assembly perspectives. F1000Research 5, 1–10 (2016). 1. Chang, C. & HilleRisLambers, J. Integrating succession and community assembly perspectives. F1000Research 5, 1–10 (2016). 1. Chang, C. & HilleRisLambers, J. Integrating succession and community assembly perspectives. F1000Research 5, 1–10 (2016). 2. Suding, K. N. & Hobbs, R. J. Threshold models in restoration and conservation: a developing framework. Trends Ecol. Evol. 24, 271–279 (2009) 2. Suding, K. N. & Hobbs, R. J. Threshold models in restoration and conservation: a developing framework. Trends Ecol. Evol. 24, 271–279 (2009 g, , J conservation: a developing framework. Trends Ecol. Evol. 24, 271–279 (2009). 3. Kadowaki, K., Nishijima, S., Kéfi, S., Kameda, K. O. & Sasaki, T. Merging community assembly into the regime-shift approach for informing ecological restoration. Ecol. Indic. 85, 991–998 (2018). Path analysis. We used path analysis (i) to model the influence of the abiotic environment on the diversities of all taxonomic groups individually, (ii) to estimate the strength of covariance between the diversities of those groups, (iii) to infer the effect sizes of the diversity of each group on total mD, and (iv) estimate the strength of indirect effects of the exogenous variables that are mediated through the organismal groups on mD. We built separate models with identical structure for the early (n = 44 plots) and late (n = 66 plots) successional stages. The stages were delineated by the threshold identified in the breakpoint analysis. Exogenous vari- ables in the model were time since deglaciation and mean growth-season soil temperature. Time since deglaciation reflects the plot age and can be seen as a proxy for the increasing chance of heterogeneous dispersal events that occur over time. The mean temperature of the growing season is an estimate for environ- mental heterogeneity and has been shown to affect diversity directly and indirectly on various trophic levels29. All variables were scaled by subtracting the mean and dividing through the standard deviation. We first ran a full model that included soil pH and soil nutrient content as additional exogenous variables. None of the two variables showed a significant direct effect on any organismal group or a significant indirect effect on multidiversity during either the young or late successional stage. References Accordingly, we stepwise removed the two variables from the model while cross- checking whether the effect strength of one variable became significant in the absence of the other variable. As no significant effects occurred or the model fit significantly decreased, we decided to remove both variables from the final model. Within the final model, the strength of residual covariance between the diversities of all taxonomic groups was estimated while accounting for influences of time since deglaciation and temperature. If corrected for an underlying common cause, such as environmental autocorrelation, strong covariances between members of a community can be interpreted as biotic interactions and especially positive com- munity covariances are indicative of facilitative effects within the community33,34. All path models were estimated using the R-package “lavaan” v0.6-762. 4. Scheffer, M., Carpenter, S., Foley, J. A., Folke, C. & Walker, B. Catastrophic shifts in ecosystems. Nature 413, 591–596 (2001). 5. Lu, M. & Hedin, L. O. Global plant–symbiont organization and emergence of biogeochemical cycles resolved by evolution-based trait modelling. Nat. Ecol. Evol. 3, 239–250 (2019). 6. Berdugo, M. et al. Global ecosystem thresholds driven by aridity. Science 367, 787–790 (2020). 7. Allan, E. et al. Interannual variation in land-use intensity enhances grassland multidiversity. Proc. Natl Acad. Sci. USA 111, 308–313 (2014). y ( ) 8. Delgado-Baquerizo, M. et al. Multiple elements of soil biodiversity drive t f ti bi N t E l E l 4 210 220 (2020) y 8. Delgado-Baquerizo, M. et al. Multiple elements of soil biodiversity drive ecosystem functions across biomes. Nat. Ecol. Evol. 4, 210–220 (2020). y 9. Felipe-Lucia, M. R. et al. Land-use intensity alters networks between y 9. Felipe-Lucia, M. R. et al. Land-use intensity alters networks between biodiversity, ecosystem functions, and services. Proc. Natl Acad. Sci. USA 117, 28140–28149 (2020). biodiversity, ecosystem functions, and services. Proc. Natl Acad. Sci. USA 117, 28140–28149 (2020). 10. Manning, P. et al. Grassland management intensification weakens the associations among the diversities of multiple plant and animal taxa. Ecology 96, 1492–1501 (2015). 11. Kaufmann, R. Invertebrate succession on an alpine glacier foreland. Ecology 82, 2261–2278 (2001). 12. Blaalid, R. et al. Changes in the root-associated fungal communities along a primary succession gradient analysed by 454 pyrosequencing. Mol. Ecol. 21, 1897–1908 (2012). 13. Fenton, N. J. & Bergeron, Y. Stochastic processes dominate during boreal bryophyte community assembly. Ecology 94, 1993–2006 (2013). 14. Dini-Andreote, F., Stegen, J. C., Van Elsas, J. Data availability R f Raw sequences of next-generation 16 S rRNA gene amplicon sequencing are available at the NCBI Sequence Read Archive (SRA) under the BioProject accession PRJNA701884 and PRJNA701890. Raw floristic, microbial, and zoological community composition data are available in a Mendeley Data repository66. https://doi.org/10.17632/xkv89tbftc.1. Code availability R i il bl i R scripts are available in a Mendeley Data repository67. https://doi.org/10.17632/ dr6d3728xb.1. Community taxa occurrence. To visualize the distribution of individual taxa and thus the community-wide taxonomic turnover along the successional gradient, we estimated the abundance optimum of each taxon that occurred on at least three plots. Abundance optima were estimated by calculating the weighted mean plot of occurrence with abundance of each taxon as weighting factor (i.e., cover for vas- cular plants and bryophytes, individual count for invertebrates, and CSS- normalized read number for microorganisms). We further calculated the relative abundance of each taxon per plot by using z-scores of abundances. The mean abundance was set as 0 with one standard deviation as +1 or −1. To allow a comparison across taxa, z-scores were then rescaled between −1 and 1. Range size was estimated by calculating the variance of occurrence plots (i.e., the span of plots on which a taxon was found along the gradient) weighted by the abundance of the taxon on the respective plots. Received: 3 November 2021; Accepted: 14 April 2022; Statistics and reproducibility Both validation methods can be applied for a robust and accurate testing of competing hypotheses in ecological datasets59–61. Multi-betadiversity. We defined Multi-betadiversity (mbD) as the cumulative averaged pairwise-dissimilarity across a number of organismal groups. First, we split the total community composition data table (sites x species, n = 110 plots) for each organismal group into two tables containing the plots before (n = 44 plots) and after (n = 66 plots) the threshold. Second, we calculated pairwise Bray-Curtis dissimilarities for each of the organismal groups individually. Third, we calculated mbD as the mean of the n = 5 dissimilarity estimates of each plot pair. Reporting summary. Further information on research design is available in the Nature Research Reporting Summary linked to this article. Statistics and reproducibility Calculation of multidiversity. Multidiversity is defined as the cumulative diversity of a number of taxonomic groups7. The multidiversity of the n = 110 plots composed of the diversities of vascular plants, bryophytes, invertebrates, fungi, and bacteria present in each plot and was defined as follows: First, we calculated the Shannon diversities of each of the taxonomic groups in each plot. Second, we ranked the plots by increasing diversity for each of the five taxonomic groups individually, i.e., for each plot we received n = 5 ranks. The mean rank of each plot was defined as multidiversity mD. For better interpretability of the index, we then normalized the mean ranks as Understanding the relative importance and temporal dynamics of deterministic and stochastic processes is a key challenge in community ecology, especially in natural systems and has been in the center of broad debates among ecologists. Using the multi- diversity and multi-betadiversity approach allows us to compre- hensively understand the processes leading to stable, resilient, and complex ecosystems, which may remain vague in single-taxon approaches. Thus, our study contributes to a synthesis of com- munity ecological theories into succession research, acknowl- edging the fundamental importance of abrupt state shifts in x0 ¼ ðx  minðxÞÞ=ðmaxðxÞ  minðxÞÞ ð1Þ ð1Þ to scale them between zero and one. Ranks were used to give the same weighting to each taxonomic group despite deviations in the absolute values of Shannon diversity and to reduce the impact of outliers in mD values. To account for dif- ferences in the sequencing depth of the microbial raw dataset and sampling effort of the invertebrate trapping, we performed multiple rarefactioning prior to the calculation of Shannon diversity by averaging the results of n = 999 iterations 6 ARTICLE COMMUNICATIONS BIOLOGY | https://doi.org/10.1038/s42003-022-03372-2 (R-package “rtk” v0.2.5.7) and used original read numbers instead of using the CSS-normalized dataset for the microbial dataset. models by calculating spatial neighbor matrices for distance classes of 5 m and 10 m between plots (i.e., the potential to include a maximum of three or five neighboring plots). For both distance classes, we estimated Moran´s I for the residuals of the piece wise linear models of the breaking point analysis and the case-wise residuals of the exogenous variables of the path models using the R-Package “spdep” v1.1-865. COMMUNICATIONS BIOLOGY | (2022) 5:424 | https://doi.org/10.1038/s42003-022-03372-2 | www.nature.com/commsbio COMMUNICATIONS BIOLOGY | https://doi.org/10.1038/s42003-022-03372-2 Contrasting primary successional trajectories of fungi and bacteria in retreating glacier soils. Mol. Ecol. 23, 481–497 (2014). 54. Blanchet, F. G., Cazelles, K. & Gravel, D. Co‐occurrence is not evidence of ecological interactions. Ecol. Lett. 23, 1050–1063 (2020). 24. Castle, S. C. et al. Biogeochemical drivers of microbial community convergence across actively retreating glaciers. Soil Biol. Biochem. 101, 74–84 (2016). 55. Fukami, T. & Nakajima, M. Complex plant-soil interactions enhance plant species diversity by delaying community convergence. J. Ecol. 101, 316–324 (2013). 25. Chang, C. C. et al. Testing conceptual models of early plant succession across a disturbance gradient. J. Ecol. 107, 517–530 (2019). 56. Martínez-García, L. B., Richardson, S. J., Tylianakis, J. M., Peltzer, D. A. & Dickie, I. A. Host identity is a dominant driver of mycorrhizal fungal community composition during ecosystem development. N. Phytol. 205, 1565–1576 (2015). 26. Junker, R. R. et al. Ödenwinkel: an Alpine platform for observational and experimental research on the emergence of multidiversity and ecosystem complexity. Web Ecol. 20, 95–106 (2020). p y 27. Groffman, P. M. et al. Ecological thresholds: the key to successful environmental management or an important concept with no practical application? Ecosystems 9, 1–13 (2006). 57. Paulson, J. metagenomeSeq: statistical analysis for sparse high-throughput sequencing. Bioconductor.Jp https://github.com/nosson/metagenomeSeq/ (2014). pp y 28. Lindeløv, J. K. mcp: an R package for regression With multiple change points. J. Stat. Softw. https://doi.org/10.31219/osf.io/fzqxv (2020). 58. Francesco Ficetola, G. & Denoël, M. Ecological thresholds: an assessment of methods to identify abrupt changes in species-habitat relationships. Ecography 32, 1075–1084 (2009). 29. Ohler, L. M., Lechleitner, M. & Junker, R. R. Microclimatic effects on alpine plant communities and flower-visitor interactions. Sci. Rep. 10, 1–9 (2020). 59. Aho, K., Derryberry, D. & Peterson, T. Model selection for ecologists: the worldviews of AIC and BIC. Ecology 95, 631–636 (2014). 30. Cavieres, L. A. et al. Facilitative plant interactions and climate simultaneously drive alpine plant diversity. Ecol. Lett. 17, 193–202 (2014). 60. Conn, P. B., Johnson, D. S., Williams, P. J., Melin, S. R. & Hooten, M. B. A guide to Bayesian model checking for ecologists. Ecol. Monogr. 88, 526–542 (2018). 31. Lowe, W. H. & McPeek, M. A. Is dispersal neutral? Trends Ecol. Evol. 29, 444–450 (2014). 61. Hanusch, M., Ortiz, E. M., Patiño, J. & Schaefer, H. Biogeography and integrative taxonomy of epipterygium (Mniaceae, Bryophyta). Taxon 69, 1150–1171 (2020). ( ) 32. Legendre, P., Borcard, D. COMMUNICATIONS BIOLOGY | https://doi.org/10.1038/s42003-022-03372-2 COMMUNICATIONS BIOLOGY | https://doi.org/10.1038/s42003-022-03372-2 16. Pulsford, S. A., Lindenmayer, D. B. & Driscoll, D. A. A succession of theories: purging redundancy from disturbance theory. Biol. Rev. 91, 148–167 (2016). 17. Odum, E. P. The strategy of ecosystem development. Science 164, 262–270 (1969). 16. Pulsford, S. A., Lindenmayer, D. B. & Driscoll, D. A. A succession of theories: purging redundancy from disturbance theory. Biol. Rev. 91, 148–167 (2016). 48. Klironomos, J. N. & Kendrick, W. B. Palatability of microfungi to soil arthropods in relation to the functioning of arbuscular mycorrhizae. Biol. Fertil. Soils 21, 43–52 (1996). p g g y y 17. Odum, E. P. The strategy of ecosystem development. Science 164, 262–270 (1969). 49. Klironomos, J. N., Widden, P. & Deslandes, I. Feeding preferences of the collembolan Folsomia candida in relation to microfungal successions on decaying litter. Soil Biol. Biochem. 24, 685–692 (1992). 18. Ohlmann, M. et al. Mapping the imprint of biotic interactions on β-diversity. Ecol. Lett. 21, 1660–1669 (2018). 19. Chen, C., Chen, H. Y. H., Chen, X. & Huang, Z. Meta-analysis shows positive effects of plant diversity on microbial biomass and respiration. Nat. Commun. 10, 1–10 (2019). y g 50. Connell, J. H. & Slatyer, R. O. Mechanisms of succession in natural communities and their role in community stability and organization. Am. Nat 111, 1119–1144 (1977). 20. Howard, M. M., Kao-Kniffin, J. & Kessler, A. Shifts in plant–microbe interactions over community succession and their effects on plant resistance to herbivores. N. Phytol. 226, 1144–1157 (2020). 51. Arróniz-Crespo, M. et al. Bryophyte-cyanobacteria associations during primary succession in recently deglaciated areas of Tierra del Fuego (Chile). PLoS One 9, 15–17 (2014). y 21. Lepš, J., Rejmánek, M., Leps, J. & Rejmanek, M. Convergence or divergence: what should we expect from vegetation succession? Oikos 62, 261–264 (1991). 52. Jean, M. et al. Experimental assessment of tree canopy and leaf litter controls on the microbiome and nitrogen fixation rates of two boreal mosses. N. Phytol. 227, 1335–1349 (2020). 22. Fukami, T., Bezemer, T. M., Mortimer, S. R. & Van Der Putten, W. H. Species divergence and trait convergence in experimental plant community assembly. Ecol. Lett. 8, 1283–1290 (2005). 53. Jean, M., Alexander, H. D., Mack, M. C. & Johnstone, J. F. Patterns of bryophyte succession in a 160-year chronosequence in deciduous and coniferous forests of boreal Alaska. Can. J. Res. 47, 1021–1032 (2017). 23. Brown, S. P. & Jumpponen, A. Acknowledgements 40. Vellend, M. Effects of diversity on diversity: consequences of competition and facilitation. Oikos 117, 1075–1085 (2008). We thank the Hohe Tauern National Park Salzburg administration and the Rudolfshütte for organizational and logistic support, the governing authority Land Salzburg for the permit to conduct our research (permit no. 20507-96/45/7-2019), Jan-Christoph Otto, Tobias Seifert, and Anna Vojtkó for help in the field. Hamed Azarbad, Lisa-Maria Ohler and Verena Zieschank provided valuable comments to improve the study. This research has been supported by the Austrian Science Fund (FWF), which provided funding to R.R.J. (grant no. Y1102). 41. Rottstock, T., Joshi, J., Kummer, V. & Fischer, M. Higher plant diversity promotes higher diversity of fungal pathogens, while it decreases pathogen infection per plant. Ecology 95, 1907–1917 (2014). p p gy 42. Baudy, P. et al. Fungal–fungal and fungal–bacterial interactions in aquatic decomposer communities: bacteria promote fungal diversity. Ecology 102, 1–16 (2021). 43. Bardgett, R. D. et al. Heterotrophic microbial communities use ancient carbon following glacial retreat. Biol. Lett. 3, 487–490 (2007). Author contributions 44. Bokhorst, S. & Wardle, D. A. Snow fungi as a food source for micro- arthropods. Eur. J. Soil Biol. 60, 77–80 (2014). R.R.J. conceived and initiated the study. M.H., X.H., V.R.-H., and R.R.J. designed the study and conducted fieldwork. M.H. performed the processing and analysis of the data with main inputs from R.R.J. and X.H. M.H. and R.R.J. drafted the initial version of the manuscript. All authors contributed critically to the interpretation of the results, revising, and approving the final version of the manuscript. p 45. Hågvar, S. et al. Ecosystem birth near melting glaciers: a review on the pioneer role of ground-dwelling arthropods. Insects 11, 1–35 (2020). role of ground-dwelling arthropods. Insects 11, 1–35 (2020). 46. Wardle, D. A. The influence of biotic interactions on soil biodiversity. Ecol. Lett. 9, 870–886 (2006). 47. Sabatini, M. A. & Innocenti, G. Functional relationships between Collembola and plant pathogenic fungi of agricultural soils. Pedobiologia (Jena.) 44, 467–475 (2000). COMMUNICATIONS BIOLOGY | https://doi.org/10.1038/s42003-022-03372-2 & Peres-Neto, P. R. Analyzing beta diversity: partitioning the spatial variation of community composition data. Ecol. Monogr. 75, 435–450 (2005). 62. Oksanen, J. et al. vegan: community ecology package. Github https://github. com/vegandevs/vegan (2019). g 33. Ranta, E. et al. Detecting compensatory dynamics in competitive communities under environmental forcing. Oikos 117, 1907–1911 (2008). 63. Baker, S. C. & Barmuta, L. A. Evaluating spatial autocorrelation and depletion in pitfall-trap studies of environmental gradients. J. Insect Conserv. 10, 269–276 (2006). 34. Houlahan, J. E. et al. The utility of covariances: a response to Ranta et al. Oikos 117, 1912–1913 (2008). 64. Pickett, S. T. A. in Long-Term Studies in Ecology (ed. Likens, G. E.) 110–135 (Springer, 1989). 35. Tscherko, D., Rustemeier, J., Richter, A., Wanek, W. & Kandeler, E. Functional diversity of the soil microflora in primary succession across two glacier forelands in the Central Alps. Eur. J. Soil Sci. 54, 685–696 (2003). 65. Bivand, R. S. & Wong, D. W. S. Comparing implementations of global and local indicators of spatial association. Test 27, 716–748 (2018). 36. Raffl, C., Mallaun, M., Mayer, R. & Erschbamer, B. Vegetation succession pattern and diversity changes in a Glacier Valley, Central Alps, Austria. Arct. Antarct. Alp. Res. 38, 421–428 (2006). 66. Hanusch, M., He, X., Ruiz-Hernández, V. & Junker, R. R. Successional generation of functional multidiversity and ecosystem complexity—a dataset from the Ödenwinkel research platform. Mendeley Data. https://doi.org/10. 17632/xkv89tbftc.1 (2022). p 37. Schütte, U. M. E. et al. Bacterial diversity in a glacier foreland of the high Arctic. Mol. Ecol. 19, 54–66 (2010). 67. Hanusch, M., He, X., Ruiz-Hernández, V. & Junker, R. R. Supporting dataset and code: succession comprises a sequence of threshold-induced community assembly processes towards multidiversity. Mendeley Data. https://doi.org/10. 17632/dr6d3728xb.1 (2022). 38. Dong, K. et al. Soil fungal community development in a high Arctic glacier foreland follows a directional replacement model, with a mid-successional diversity maximum. Sci. Rep. 6, 1–9 (2016). y p 39. Houlahan, J. E. et al. Compensatory dynamics are rare in natural ecological communities. Proc. Natl Acad. Sci. USA 104, 3273–3277 (2007). References D. & Salles, J. F. Disentangling mechanisms that mediate the balance between stochastic and deterministic processes in microbial succession. Proc. Natl Acad. Sci. USA 112, E1326–E1332 (2015). Test for spatial autocorrelation. Studies taking advantage of space-for-time sub- stitution generally are prone to erroneous conclusions caused by spatial auto- correlation, especially when sampling points are located at varying distances63,64. We tested for the presence of residual spatial autocorrelation in the estimated path 15. Måren, I. E., Kapfer, J., Aarrestad, P. A., Grytnes, J. A. & Vandvik, V. Changing contributions of stochastic and deterministic processes in community assembly over a successional gradient. Ecology 99, 148–157 (2018). 7 COMMUNICATIONS BIOLOGY | (2022) 5:424 | https://doi.org/10.1038/s42003-022-03372-2 | www.nature.com/commsbio © The Author(s) 2022 Competing interests The authors declare no competing interests. 8 COMMUNICATIONS BIOLOGY | (2022) 5:424 | https://doi.org/10.1038/s42003-022-03372-2 | www.nature.com/commsbio Additional information Open Access This article is licensed under a Creative Commons Attri- bution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. Supplementary information The online version contains supplementary material available at https://doi.org/10.1038/s42003-022-03372-2. COMMUNICATIONS BIOLOGY | (2022) 5:424 | https://doi.org/10.1038/s42003-022-03372-2 | www.nature.com/commsbio 9
https://openalex.org/W3050064217
https://www.frontiersin.org/articles/10.3389/fchem.2020.00715/pdf
English
null
High Power Energy Storage via Electrochemically Expanded and Hydrated Manganese-Rich Oxides
Frontiers in chemistry
2,020
cc-by
10,381
Edited by: Jennifer L. Schaefer, University of Notre Dame, United States Reviewed by: Yanliang Liang, University of Houston, United States Liqiang Mai, Wuhan University of Technology, China Reviewed by: Yanliang Liang, University of Houston, United States Liqiang Mai, Wuhan University of Technology, China Keywords: aqueous electrolyte, manganese oxide, interlayer, confined water, electrochemical capacitor Specialty section: This article was submitted to Electrochemistry, a section of the journal Frontiers in Chemistry Received: 14 May 2020 Accepted: 09 July 2020 Published: 18 August 2020 Citation: Boyd S, Geise NR, Toney MF and Augustyn V (2020) High Power Energy Storage via Electrochemically Expanded and Hydrated Manganese-Rich Oxides. Front. Chem. 8:715. doi: 10.3389/fchem.2020.00715 Specialty section: This article was submitted to Electrochemistry, a section of the journal Frontiers in Chemistry ORIGINAL RESEARCH published: 18 August 2020 doi: 10.3389/fchem.2020.00715 High Power Energy Storage via Electrochemically Expanded and Hydrated Manganese-Rich Oxides Shelby Boyd 1, Natalie R. Geise 2,3, Michael F. Toney 3 and Veronica Augustyn 1* 1 Department of Materials Science and Engineering, North Carolina State University, Raleigh, NC, United States, 2 Departme of Chemistry, Stanford University, Stanford, CA, United States, 3 Stanford Synchrotron Radiation Lightsource, SLAC Nationa Accelerator Laboratory, Menlo Park, CA, United States 1 Department of Materials Science and Engineering, North Carolina State University, Raleigh, NC, United States, 2 Department of Chemistry, Stanford University, Stanford, CA, United States, 3 Stanford Synchrotron Radiation Lightsource, SLAC National Accelerator Laboratory, Menlo Park, CA, United States Understanding the materials design features that lead to high power electrochemical energy storage is important for applications from electric vehicles to smart grids. Electrochemical capacitors offer a highly attractive solution for these applications, with energy and power densities between those of batteries and dielectric capacitors. To date, the most common approach to increase the capacitance of electrochemical capacitor materials is to increase their surface area by nanostructuring. However, nanostructured materials have several drawbacks including lower volumetric capacitance. In this work, we present a scalable “top-down” strategy for the synthesis of EC electrode materials by electrochemically expanding micron-scale high temperature-derived layered sodium manganese-rich oxides. We hypothesize that the electrochemical expansion induces two changes to the oxide that result in a promising electrochemical capacitor material: (1) interlayer hydration, which improves the interlayer diffusion kinetics and buffers intercalation-induced structural changes, and (2) particle expansion, which significantly improves electrode integrity and volumetric capacitance. When compared with a commercially available activated carbon for electrochemical capacitors, the expanded materials have higher volumetric capacitance at charge/discharge timescales of up to 40 s. This shows that expanded and hydrated manganese-rich oxide powders are viable candidates for electrochemical capacitor electrodes. Keywords: aqueous electrolyte, manganese oxide, interlayer, confined water, electrochemical capacitor INTRODUCTION Electrochemical energy storage plays ever-increasing roles in our daily lives by powering everything from portable electronics to electric vehicles. Electrochemical capacitors (ECs) are a class of energy storage devices with intermediate energy and power between those of batteries and dielectric capacitors. Commercialized ECs are highly attractive for diverse applications requiring reliability, large currents, and high energy efficiency. They exhibit specific energy of up to 10 Wh/kg, specific power of up to 30 kW/kg, typical charge/discharge timescales on the order of seconds, and lifetimes of up to ∼1,000,000 cycles (Conway, 1999; Nybeck et al., 2019). Most commercialized ECs store energy by the rapid (within seconds) formation of the electric double layer at the electrode/electrolyte interface. This mechanism can give rise to specific capacitance values of up to 150 F/g when the electrolyte ion size matches the average pore size of the electrode material (Largeot et al., 2008). Another capacitive energy storage mechanism, termed pseudocapacitance, Received: 14 May 2020 Accepted: 09 July 2020 Published: 18 August 2020 Citation: Boyd S, Geise NR, Toney MF and Augustyn V (2020) High Power Energy Storage via Electrochemically Expanded and Hydrated Manganese-Rich Oxides. Front. Chem. 8:715. doi: 10.3389/fchem.2020.00715 August 2020 | Volume 8 | Article 715 Frontiers in Chemistry | www.frontiersin.org 1 Electrochemically Expanded Hydrated Manganese-Rich Oxides Boyd et al. poor electronic and ionic conductivity (Clément et al., 2015; Clement et al., 2016; Nam et al., 2015; Liu C. et al., 2019). However, these materials could be promising as EC electrode materials due to their tendency to form hydrated phases under ambient conditions and upon electrochemical cycling in aqueous electrolytes (Lu and Dahn, 2001; Buchholz et al., 2014; Boyd et al., 2018). In our previous work, we established that this water intercalation causes a 25% c-axis expansion and a phase transformation to a birnessite-like structure, which subsequently exhibits capacitive electrochemical behavior (Boyd et al., 2018). While these electrodes experience a severe capacity decline from active material detachment due to the large structural change, the capacitive response of the remaining expanded, hydrated oxide led us to consider whether it was possible to perform the expansion prior to electrode assembly. The resulting expanded micron-sized particles of manganese-rich oxide with hydrated interlayers could then be used for high rate capability and high volumetric energy density EC electrodes with improved stability upon extended cycling. uses fast and reversible redox reactions in materials such as transition metal oxides and can lead to capacitances >150 F/g (Fleischmann et al., 2020). There is a need to increase the energy density and reduce the cost of ECs to enable their use for broader applications. However, this requires the development of new electrode materials that exhibit high energy storage performance and are made from abundant elements via scalable synthesis processes. Thus far, the search for new EC materials has primarily focused on the synthesis of nanostructured materials. This improves the power density by increasing the interfacial area between the electrode and electrolyte, and reducing the solid-state diffusion distance within the particles (Okubo et al., 2007; Rauda et al., 2014; DeBlock et al., 2019; Li et al., 2020). However, the high surface area of nanostructured particles can lead to undesirably low volumetric capacitance electrodes and increased parasitic side reactions with the electrolyte (Palacín et al., 2016; Augustyn and Gogotsi, 2017). Citation: Additionally, the decrease of tap density with particle size lowers the volumetric capacity of electrodes made with small particles (Jouanneau et al., 2003; Li et al., 2019). Therefore, there is a need for high-power energy storage materials that match the rate performance of high surface area materials but exhibit higher volumetric capacitance, as well as scalable strategies to synthesize such materials. In this work, we present a scalable “top-down” strategy for the synthesis of EC electrode materials by electrochemically expanding micron-scale high temperature-derived layered manganese-rich oxides. Inspired by the electrochemical exfoliation methods developed for large sheet graphite and MoS2, this batch process is significantly quicker than traditional chemical exfoliations and produces expanded bulk particles (Ma et al., 2008; Liu et al., 2014; Achee et al., 2018; Ambrosi and Pumera, 2018). We then show that assembly of the micron-sized expanded materials into electrodes leads to high power capacitive energy storage. Comparison with commercial activated carbon shows that the oxides exhibit similar rate capability but higher volumetric capacitance. We hypothesize that the electrochemical expansion enables high power and high volumetric capacitance via two important changes in the oxide: (1) interlayer hydration, which improves interlayer diffusion kinetics while also buffering intercalation-induced structural changes, and (2) particle expansion, which significantly improves electrode integrity and volumetric capacitance. Commonly studied materials for ECs include transition metal oxides with hydrated interlayers. Oxides such as V2O5·xH2O, WO3·2H2O, and birnessite (typical formula KxMnO2·nH2O) show pseudocapacitive behavior in aqueous electrolytes due to reversible cation intercalation (Nam et al., 2015; Sai Gautam et al., 2016; Mitchell et al., 2017; Xiong et al., 2017; Wang et al., 2018; Wu et al., 2019). The interlayer water in these materials is hypothesized to enable fast energy storage by buffering structural changes during cycling, reducing transition metal dissolution into the electrolyte, and/or improving the interlayer diffusion kinetics of intercalating cations (Zhu et al., 2017; Wang et al., 2018; Liu Z. et al., 2019). In particular, birnessite manganese oxides are promising EC materials due to the abundance and safety of manganese. However, their low crystallinity and frequently nanoscale morphology result in low material utilization and packing density, and therefore low volumetric capacitance in thick electrodes (Wu et al., 2015; Wang et al., 2017; Liu et al., 2018). Citation: An attractive alternative is developing material synthesis techniques to produce micron- scale transition metal oxide particles with hydrated interlayers, which could lead to high volumetric capacitance EC electrodes made via traditional slurry electrode manufacturing techniques. Frontiers in Chemistry | www.frontiersin.org Materials Synthesis: Bulk Powders Materials Synthesis: Bulk Powders A coprecipitation and calcination method was used to prepare the micron-scale layered oxide powders with a P2 structure (Boyd et al., 2018). Briefly, a 2:1 ratio of Mn(CH2CHOO)2·4H2O and Cu(CH2CHOO)2 (Alfa Aesar) were dissolved in deionized water, and added at ∼1 drop/s into a stirred aqueous NaOH (Fisher Scientific) solution of pH ∼12. After aging for ∼1 h, the Mn0.62Cu0.31(OH)2 precipitate was washed until pH neutral, filtered, and dried overnight at 120◦C. The hydroxide precursor was ball milled in ethanol for 24 h. After drying the material again, Na+ was added in a 0.74:1 molar ratio of Na+:MCu(OH)2 by mixing the precursor and NaOH in DI water for 1 h at room temperature and then heating it at 100◦C on a stir plate until dry. The dried powder was ground with a mortar and pestle to break up any large chunks, and annealed at 500◦C for 5 h. After cooling to room temperature, the powder was ground To address this, we propose the use of electrochemically expanded and hydrated manganese oxides based on P2 oxides of the formula Na0.67MO2. Here, M is a combination of manganese and other transition metals and P2 indicates the prismatic (P) coordination of Na+ and ...ABBA... stacking of the oxygen layers. The high temperature (∼900◦C) synthesis of the P2 oxides leads to micron-scale primary particles with surface areas of ∼1 m2/g (Yabuuchi et al., 2014). P2 Na0.67MO2 are widely studied for non-aqueous sodium ion battery cathodes, but often exhibit poor cyclability due to the Jahn-Teller distortion and dissolution of the Mn atoms during electrochemical cycling, and August 2020 | Volume 8 | Article 715 2 Electrochemically Expanded Hydrated Manganese-Rich Oxides Boyd et al. for 15 min before calcination at 850◦C for 6 h and subsequent transfer to an inert-atmosphere glovebox (<1 ppm H2O and O2) while at ∼70◦C. The calcined powder was ground with a mortar and pestle for 30 min in the glovebox. The composition of the as-synthesized material was Na0.64Mn0.62Cu0.31O2, abbreviated NaMCu. A Ni-containing material, Na0.64Ni0.22Mn0.66Cu0.12O2 (NaNMCu), was synthesized in the same manner. electrochemical cycling. XRD was performed with standard Bragg-Brentano geometry and Cu-Ka radiation (PANalytical Empyrean). The powder samples were rotated at 7.5 RPM, while the electrodes remained stationary. Scanning electron microscopy (SEM, FEI Verios 460L) was used to determine the morphology of the P2 powders before and after expansion, as well as after electrochemical cycling. Materials Synthesis: Bulk Powders The water content of the expanded samples was measured with thermogravimetric analysis (TGA; SII EXSTAR6000 TG/DTA6200), using aluminum pans to hold ∼12 mg of powder during heating in air at 5◦C /min from 25 to 300◦C. Methods: Electrochemical Characterization Electrode Preparation The electrochemical behavior of the expanded particles was characterized using slurry electrodes cast onto either Ti mesh or foil (Alfa Aesar). The metal substrates were cleaned by sonication in ethanol, after which the mesh electrodes were dried and coated with slurry. The working face of the Ti foil was etched with sandpaper to improve slurry adhesion while the back of the foil electrode was covered with Kapton tape to minimize its current contribution during electrochemical cycling. The electrode was then plasma cleaned (Harrick Plasma PDC-32G) for 3 min also to improve slurry adhesion. p y The slurry composition varied depending on the type of current collector (mesh or foil). We found that for the expanded oxide on Ti mesh, a slurry composition of 80 wt% active material, 17.5 wt% acetylene black (Alfa Aesar), and 2.5 wt% polyvinylidene fluoride (PVDF, Arkema Kynar KV 900) gave good adhesion to the mesh and the best rate capability. The acetylene black slurries, used to understand the current contribution from the conductive carbon additive, consisted of 67 wt% acetylene black and 33 wt% PVDF. To compare the electrochemically expanded NaMCu to commercial activated carbon on a volumetric basis, we used foil current collectors. For the activated carbon slurry on Ti foil, 90 wt% YP50 activated carbon (Kuraray Co., Ltd.) was combined with 10 wt% PVDF. The expanded oxide slurry on Ti foil consisted of 80 wt% active material, 15 wt% acetylene black, and 5 wt% PVDF. The dry components of each slurry were ground for 5 min before adding n-methyl pyrrolidone (NMP; Sigma Aldrich) and stirring overnight on a magnetic stir plate at 990 RPM. After painting the slurry onto the current collector, the electrodes dried for several hours at room temperature in the fume hood. At this point, the foil electrodes were placed between a folded weigh paper and calendared to the approximate thickness of the electrode-weigh paper assembly with a rolling mill (Durston) before transfer to an oven at 120◦C. We transferred the mesh electrodes directly from the fume hood to the oven at 120◦C, where they dried for several hours before calendaring to 125 µm between the sheets of a folded weigh paper. The final thickness of the mesh electrodes was ∼90 µm. Methods: Synchrotron X-Ray Diffraction Methods: Synchrotron X-Ray Diffraction Synchrotron X-ray diffraction (XRD) was performed at the Stanford Synchrotron Radiation Lightsource (SSRL) on beamline 7–2 with a 14.013 keV beam. The operando diffraction patterns were collected with a Pilatus 300 K area detector (DECTRIS Ltd.) in portrait mode, in a Bragg-Brentano (θ-2θ) reflection geometry at a sample-to-detector distance of 750 mm. XRD patterns were taken with the middle of the detector at 11.4 and 23.0◦2θ with a 3 s exposure every 20 s while cycling the electrode at 0.5 mV/s. After calibrating the detector geometry (tilts and distance) with LaB6, the area diffraction patterns were reduced to one dimensional intensity vs. 2θ patterns with the pyFAI library (Ashiotis et al., 2015). The electrochemical cell consisted of a 1 M Na2SO4 (Fisher Scientific) electrolyte, a Pt counter electrode, and a miniature leakless Ag/AgCl reference electrode (eDAQ ET072-1) using a cell developed for in situ electrochemical X- ray scattering (Cao et al., 2016; Mitchell et al., 2019). The preparation of the working electrode is discussed in more detail in section Methods: Electrochemical Characterization. Briefly, an 8:1:1 slurry of the P2 oxide, acetylene black, and polyvinylidene fluoride was prepared in n-methyl pyrrolidone, cast onto a plasma-cleaned platinized silicon substrate (MTI Corp.), and dried at 120◦C overnight. Methods: Physical Characterization XRD was used to determine the structure of the as-synthesized P2 and expanded powders, and the electrodes before and after Expansion To electrochemically expand and hydrate the P2 powders, ∼0.5 g of the material was placed into an electrolyte-permeable and electronically-connected pouch acting as the positive electrode in a two electrode cell, vs. a Ni foam negative electrode. The pouch was made by folding double-layer dialysis tubing (Thermo Scientific SnakeSkin R⃝, 10,000 MWCO, 22 mm diameter) around a coiled Pt wire electrode (Pine Instruments, 99.99% pure) and sealing it with parafilm (Figure S1). The dialysis tubing held the NaMCu powder near (and optimally in contact with) the Pt wire. After ensuring that the 0.5 M K2SO4 (Fisher Scientific) electrolyte fully wet the dialysis tubing, +4 V was applied to the cell for 24 h. After expansion, the pouch was rinsed and cut open. The expanded material was washed out of the pouch using DI water, and centrifuged at 4,500 RPM for 3– 5 min to remove excess water. The powders were rinsed at least twice more to remove all electrolyte salt, and centrifuged after each rinse. Finally, the expanded powder was air dried at room temperature. RESULTS AND DISCUSSION Mechanism of Electrochemical Expansion To determine the mechanism of electrochemical expansion and interlayer hydration of P2-type layered sodium manganese- rich oxides in aqueous electrolytes, we performed operando XRD during cyclic voltammetry of NaMCu and NaNMCu. The crystal structure of a P2-type layered oxide (Figure S2A) consists of layers of edge-sharing MO6 octahedra, and ∼67% of the interlayer prismatic sites are filled with Na+ (Delmas et al., 1980). Figure 1A shows the cyclic voltammogram (CV) of P2 NaMCu at 0.5 mV/s in 1 M Na2SO4. During the first anodic cycle, the CV of NaMCu shows current peaks around 0.2 and 0.9 V vs. Ag/AgCl. On the subsequent cathodic scan, the overall current decreases and is relatively constant as a function of potential. These electrochemical changes suggest a change in the structure and energy storage mechanism in the material, which we attribute to expansion (vide infra) and interlayer water insertion as shown in Figure 1B and described in our previous work (Boyd et al., 2018). Well-defined current peaks correlate to a well-defined Gibbs free energy of reaction, which in an intercalation-type material indicates little dispersion in the intercalation site energy. On the other hand, a constant current as a function of potential, such as observed after the first anodic sweep, is indicative of a capacitive mechanism exhibited by many layered manganese oxides in neutral pH electrolytes (Brousse et al., 2006; Ghodbane et al., 2012; Leong and Yang, 2019). The capacitive charge storage mechanism of manganese oxides under these conditions is a In addition to this expected behavior, the appearance of a new peak at 7.19◦2θ at ∼0.9 V during the first anodic cycle indicates the formation of a new phase. According to prior results, this peak corresponds to the (001) plane of a birnessite-like hydrated phase with an interlayer spacing of 7.05 Å (Lu and Dahn, 2001; Abou-El-Sherbini et al., 2002; Buchholz et al., 2014; Boyd et al., 2018; Yao et al., 2019). The full XRD patterns of the material before and after the phase transformation are shown in Figure S2B. The large interlayer spacing of the new phase indicates the insertion of a single layer of water molecules from the aqueous electrolyte into the interlayer of NaMCu (Nam et al., 2015; Li et al., 2016). Electrochemistry XRD was used to determine the structure of the as-synthesized P2 and expanded powders, and the electrodes before and after All electrodes were tested with a three-electrode set up in glass 50 mL round bottom flasks with an aqueous 0.5 M K2SO4 (Fisher August 2020 | Volume 8 | Article 715 Frontiers in Chemistry | www.frontiersin.org 3 Electrochemically Expanded Hydrated Manganese-Rich Oxides Boyd et al. FIGURE 1 | Mechanism of water intercalation into P2-type NaMCu upon electrochemical cycling in 1 M Na2SO4. (A) Cyclic voltammetry at 0.5 mV/s. A.B. indicates “acetylene black,” the electrochemical response of the conductive carbon in the electrode. (B) Cartoon showing the insertion of water molecules (red) from the electrolyte into the material interlayer to compensate for the electrochemical de-intercalation of Na+ (dark blue). (C) Operando synchrotron XRD during the first two CV cycles at 0.5 mV/s. The right-most panel shows the applied potential (dashed line) and the current response (solid line). During the first anodic cycle, the interlayer peak of the hydrated birnessite-like phase (∼7◦2θ) emerges around 0.9 V. Both the P2 and the hydrated peak show reversible, continuous changes in the interlayer spacing as a function of potential attributed to Na+ de/intercalation. The peak at 8.1◦2θ is due to the electrochemical cell. FIGURE 1 | Mechanism of water intercalation into P2-type NaMCu upon electrochemical cycling in 1 M Na2SO4. (A) Cyclic voltammetry at 0.5 mV/s. A.B. indicates “acetylene black,” the electrochemical response of the conductive carbon in the electrode. (B) Cartoon showing the insertion of water molecules (red) from the electrolyte into the material interlayer to compensate for the electrochemical de-intercalation of Na+ (dark blue). (C) Operando synchrotron XRD during the first two CV cycles at 0.5 mV/s. The right-most panel shows the applied potential (dashed line) and the current response (solid line). During the first anodic cycle, the interlayer peak of the hydrated birnessite-like phase (∼7◦2θ) emerges around 0.9 V. Both the P2 and the hydrated peak show reversible, continuous changes in the interlayer spacing as a function of potential attributed to Na+ de/intercalation. The peak at 8.1◦2θ is due to the electrochemical cell. Scientific) electrolyte, using an Ag/AgCl in 3.5 M KCl reference electrode (Pine Instruments) and a platinum wire counter electrode (99.997%, Alfa Aesar). All tests used Ni-plated stainless steel alligator clips to hold the working and counter electrodes in the electrolyte. Electrochemistry The cyclic voltammetry was performed with a Biologic MPG2 potentiostat. subject of debate, but has been attributed to the correlated intercalation of cations and water molecules (Bélanger et al., 2008; Arias et al., 2014; Costentin et al., 2017). The structural changes of NaMCu during the first two CV cycles were measured with operando synchrotron XRD (Figure 1C). Two changes are apparent: the appearance of a new peak during the first anodic cycle (discussed below) and shift of the NaMCu diffraction peak. The interlayer spacing of the P2 phase, indicated by the (002) peak at ∼9◦2θ, increases from 5.59 Å (9.07◦2θ) at 0 V to 5.65 Å (8.97◦2θ) at 1.1 V. Upon reduction to 0 V, the spacing returns to nearly its original value, 5.61 Å (9.04◦2θ). This shows that the interlayer spacing reversibly increases during oxidation and decreases during reduction. The continuous change of the NaMCu interlayer spacing as a function of potential indicates a solid-solution intercalation mechanism, similar to its structural behavior in non-aqueous Na+ electrolytes (Kang et al., 2015; Li et al., 2015; Wang L. et al., 2017). The faint splitting of the P2 (001) peak near the end of the cathodic cycle may indicate that the remaining P2 material forms two phases with slightly different Na+ content. Frontiers in Chemistry | www.frontiersin.org Batch Expansion Process During the second cycle it increases to 7.07 Å (7.17◦2θ) at 1.1V and shifts back to 6.97 Å (7.27◦2θ) at 0 V. This change of ∼0.1 Å is about half of that typically observed in birnessite in aqueous electrolytes (Ghodbane et al., 2012; Xiong et al., 2017). The reversible peak shifts of the hydrated phase indicate that cation (de)intercalation into the hydrated interlayer at least partially contributes to the capacitive energy storage mechanism. These changes would not appear if the capacitive behavior was simply due to the formation of the double layer at the outer surface of the particles. The intensity increase of the hydrated phase peak and corresponding decrease in the P2 (002) peak during the first anodic sweep show the partial phase transformation of the electrode material. However, all peak intensities decrease after ∼0.5 V during the second cathodic sweep, as the change in particle volume during electrochemical expansion causes the electrode to delaminate from the current collector. During the second cycle it increases to 7.07 Å (7.17◦2θ) at 1.1V and shifts back to 6.97 Å (7.27◦2θ) at 0 V. This change of ∼0.1 Å is about half of that typically observed in birnessite in aqueous electrolytes (Ghodbane et al., 2012; Xiong et al., 2017). The reversible peak shifts of the hydrated phase indicate that cation (de)intercalation into the hydrated interlayer at least partially contributes to the capacitive energy storage mechanism. These changes would not appear if the capacitive behavior was simply due to the formation of the double layer at the outer surface of the particles. The intensity increase of the hydrated phase peak and corresponding decrease in the P2 (002) peak during the first anodic sweep show the partial phase transformation of the electrode material. However, all peak intensities decrease after ∼0.5 V during the second cathodic sweep, as the change in particle volume during electrochemical expansion causes the electrode to delaminate from the current collector. p To circumvent the electrical contact and slurry delamination problems resulting from in situ P2 particle expansion on electrodes, we developed a batch expansion process for the P2 oxide powder, as described in the Experimental section. Figure 2 shows the expansion cell, along with scanning electron microscopy (SEM) images of a P2 particle (Figure 2A) and an expanded particle (Figure 2C). Batch Expansion Process The resulting expanded and hydrated particles can be assembled into electrodes, thus bypassing the issue of electrode delamination after direct electrochemical expansion of the P2 particles. The batch process uses a neutral pH electrolyte, a voltage source, permeable membrane, and a Ni foam counter electrode, rendering it environmentally friendly and scalable. Figure S4 shows representative chronoamperometry for the process. We observed that a smoother current response is a good indicator of expansion quality—noisier curves resulted in less expansion of the P2 oxide, as indicated by XRD (Figure 3A). This is likely due to the variability of the electrical contact between the powders and the Pt coil in the pouch cell, which could be improved with more advanced pouch designs. This synthesis method offers a new, scalable method to produce materials for EC electrodes that can provide high volumetric capacitance. Figure S3 shows similar behavior in a P2 oxide with a different composition, NaNMCu, where the inclusion of nickel led to Na+ deintercalation and the subsequent formation of the birnessite- like phase at a lower potential (Kang et al., 2015; Wang L. et al., 2017; Chen et al., 2018). Overall, the operando results show that when these P2 oxides are cycled in an aqueous electrolyte, water incorporation occurs during Na+ deintercalation, likely to offset the increasing electrostatic repulsion between the transition metal and oxygen layers. Within an individual particle, the formation of this birnessite-like phase may lead to the capacitive CV observed after the first cycle. However, the large expansion of the P2 particles (25% c-axis increase) in the slurry electrode leads to loss of electronic connection to the current collector, or even delamination, when cast onto the electrode before expansion. If the electrochemical expansion is better controlled, the formation of micron-scale particles with hydrated interlayers with a capacitive electrochemical response indicates that these particles could be viable for high volumetric capacitance EC materials. RESULTS AND DISCUSSION Moreover, reversible peak shifts indicate that this new hydrated phase is electrochemically active: upon reduction from 1.1 to 0 V, the interlayer spacing decreases to 6.97 Å (7.27◦2θ). August 2020 | Volume 8 | Article 715 4 Electrochemically Expanded Hydrated Manganese-Rich Oxides Boyd et al. FIGURE 2 | Effect of batch expansion on particle morphology: (A) a pristine P2 NaMCu particle has a compact structure, which expands after electrochemical water insertion. (B) A schematic of the electrochemical expansion setup, where the P2 material is contained in a dialysis tubing pouch around a coil of Pt wire, and the counter electrode is Ni foam. (C) A typical fully expanded NaMCu particle, which retains its ab-plane morphology but expands vertically due to water insertion. Scale bar 2 µm. FIGURE 2 | Effect of batch expansion on particle morphology: (A) a pristine P2 NaMCu particle has a compact structure, which expands after electrochemical water insertion. (B) A schematic of the electrochemical expansion setup, where the P2 material is contained in a dialysis tubing pouch around a coil of Pt wire, and the counter electrode is Ni foam. (C) A typical fully expanded NaMCu particle, which retains its ab-plane morphology but expands vertically due to water insertion. Scale bar 2 µm. Structural Characterization of the Expanded Materials To determine the extent to which the batch expansion process affects material structure and electrochemical performance, we compared three structures: as-synthesized NaMCu, fully expanded (F.E.) NaMCu, and partially expanded (P.E.) NaMCu. Figure 3 shows the XRD, TGA, and SEM of these materials. The pristine NaMCu has the same structure as reported previously (Boyd et al., 2018): a primary P2-type phase (∗) and a small amount of CuO (+). The first peak at 15.92◦2θ (5.57 Å) corresponds to the (002) peak of the P2 phase. The F.E. NaMCu August 2020 | Volume 8 | Article 715 Frontiers in Chemistry | www.frontiersin.org 5 Electrochemically Expanded Hydrated Manganese-Rich Oxides Boyd et al. FIGURE 3 | Structural characterization of expanded NaMCu materials. (A) Powder XRD shows the complete transformation of the F.E. material into the hydrated phase, while the P.E. material contains both the hydrated phase and residual P2 phase. (B) TGA shows that both F.E. and P.E. NaMCu materials lose a significant amount of water with increasing temperature. SEM of the (C) pristine NaMCu powder and (D) F.E. NaMCu powder shows that the expanded particles retain their initial hexagonal morphology and particle size but are now expanded along the layers. Scale bar 3 µm. FIGURE 3 | Structural characterization of expanded NaMCu materials. (A) Powder XRD shows the complete transformation of the F.E. material into the hydrated phase, while the P.E. material contains both the hydrated phase and residual P2 phase. (B) TGA shows that both F.E. and P.E. NaMCu materials lose a significant amount of water with increasing temperature. SEM of the (C) pristine NaMCu powder and (D) F.E. NaMCu powder shows that the expanded particles retain their initial hexagonal morphology and particle size but are now expanded along the layers. Scale bar 3 µm. shows a completely expanded and hydrated structure: the P2- phase is no longer present and the interlayer peak at 12.99◦2θ (6.99 Å) indicates a 25% expansion, the same as the operando XRD experiments. As discussed above, the large increase in interlayer spacing is due to the transformation to a new hydrated phase. Both the P2 and F.E. NaMCu materials exhibit a peak at 35.8◦2θ (2.5 Å). This peak corresponds to the (100) plane of the P2 structure, and its presence in both the pristine and F.E. materials indicates that the lattice spacing along the transition metal oxide sheets is unaffected by electrochemical expansion. Structural Characterization of the Expanded Materials The larger c-axis in the expanded materials leads to slightly decreased angles of the (101) and (102) peaks at 36.5 and 38.1◦2θ. The two-phase P.E. structure indicates that the expansion proceeds via a direct phase transformation and agrees with the operando XRD, which shows the emergence of the hydrated phase at a distinct potential as opposed to a gradual structural transition over a broad potential range. varying degrees of partial exfoliation. Figure 2 shows higher magnification SEM images of pristine and expanded NaMCu particles. Before expansion, the material consists of dense, roughly hexagonal, micron-scale primary particles. Based on the crystal structure, the interlayer spacing is parallel to the surface of hexagon-like primary particles. After electrochemical oxidation, there is clear partial exfoliation of the particles along the c axis that gives rise to large pores hundreds of nanometers in dimension. We hypothesize that the large pores and interlayer hydration formed by the expansion process enable high power energy storage by increasing access of electrolyte ions to the interlayer and buffering the structural changes during ion (de)intercalation. Electrochemical Behavior of Expanded Materials Electrochemical characterization shows that the capacitive character of the material increases with amount of interlayer hydration and expansion. We characterized the electrochemical behavior of pristine, P.E., and F.E. NaMCu in a 0.5 M K2SO4 electrolyte. This electrolyte was selected over Na2SO4 because K+ has a smaller hydrated ion radius compared to Na+, which is hypothesized to allow higher rate capability and cyclability in aqueous electrolytes (Shao et al., 2013; Xiong et al., 2017; Dupont et al., 2018; Phadke et al., 2020). Figure 4 shows the CVs of the pristine, P.E., and F.E. NaMCu in 0.5 M K2SO4 at 1, 10, and 100 mV/s. The response of the acetylene black conductive additive is also shown for reference. It contributes only minimal double-layer current. The F.E. NaMCu exhibits a capacitive CV at 1 and 10 mV/s, with a semi-rectangular shape and broad peaks similar to those often observed in birnessite (Xiong et al., 2017; Yao et al., 2019). The P.E. NaMCu also has a semi-rectangular CV, albeit with a lower specific current and lacking the broad peaks present in the F.E. material. In contrast, the pristine P2 NaMCu particles expand upon intercalating water during the first anodic cycle, and the electrode capacity drops p g TGA of each material indicates decreasing mass loss between room temperature (∼25◦C) and 300◦C in the order F.E. NaMCu > P.E. NaMCu > NaMCu. In this temperature range, mass losses are most likely due to the removal of water molecules from the oxide surface and interlayer. The composition of the F.E. material for TGA was Mn0.62Cu0.31O2·xH2O, assuming the removal of all Na+ during electrochemical expansion. This means that the 6.2 wt% lost from F.E. NaMCu between 50 and 120◦C corresponds to 0.33 mol H2O per MCu (x = 0.33). Many birnessites also have a oxide:water content ratio near 1:0.33, supporting the XRD data that electrochemical expansion leads to insertion of a single layer of water molecules into the interlayer of the P2 oxides. The P.E. NaMCu lost 2.4 wt%, which suggests only ∼38% of the powder expanded based on the mass lost from F.E. NaMCu. Lastly, NaMCu exhibits only a minor 1.2 wt% loss, likely due to the desorption of surface water. Frontiers in Chemistry | www.frontiersin.org Electrochemical Behavior of Expanded Materials The SEM images in Figures 3C,D show that the crystallographic change affects the morphology as well: the ab plane particle size and shape are retained after expansion, while the c-axis dimensions increase as the layers experience August 2020 | Volume 8 | Article 715 6 Electrochemically Expanded Hydrated Manganese-Rich Oxides Boyd et al. FIGURE 4 | CVs of the pristine P2, P.E., and F.E. NaMCu materials in 0.5 M K2SO4 electrolyte at (A) 1 mV/s, (B) 10 mV/s, and (C) 100 mV/s. The specific current from just the acetylene black (A.B.) conductive additive is shown for reference. FIGURE 5 | Electrochemical energy storage rate capability and post-electrochemical cycling material structure. (A) Cathodic capacitance and (B) rate capability (cathodic capacitance normalized to the capacitance at 0.1 mV/s), from 0.1 to 100 mV/s. The low capacity and rate capability of the acetylene black (A.B.) conductive additive shows that the capacitive electrochemical response is due to the oxide active materials. (C) Ex situ XRD of electrodes after electrochemical cycling shows that the F.E. and P.E. retain their initial structures. FIGURE 4 | CVs of the pristine P2, P.E., and F.E. NaMCu materials in 0.5 M K2SO4 electrolyte at (A) 1 mV/s, (B) 10 mV/s, and (C) 100 mV/s. The specific current from just the acetylene black (A.B.) conductive additive is shown for reference. FIGURE 4 | CVs of the pristine P2, P.E., and F.E. NaMCu materials in 0.5 M K2SO4 electrolyte at (A) 1 mV/s, (B) 10 mV/s, and (C) 100 mV/s. The specific current f j h l bl k (A B ) d i ddi i i h f f FIGURE 4 | CVs of the pristine P2, P.E., and F.E. NaMCu materials in 0.5 M K2SO4 electrolyte at (A) 1 mV/s, (B) 10 mV/s, and (C) 100 mV/s. The specific current from just the acetylene black (A.B.) conductive additive is shown for reference. FIGURE 4 | CVs of the pristine P2, P.E., and F.E. NaMCu materials in 0.5 M K2SO4 electrolyte at (A) 1 mV/s, (B) 10 mV/s, and (C) 100 mV/s. The specific current from just the acetylene black (A.B.) conductive additive is shown for reference. FIGURE 5 | Electrochemical energy storage rate capability and post-electrochemical cycling material structure. (A) Cathodic capacitance and (B) rate capability (cathodic capacitance normalized to the capacitance at 0.1 mV/s), from 0.1 to 100 mV/s. Electrochemical Behavior of Expanded Materials The low capacity and rate capability of the acetylene black (A.B.) conductive additive shows that the capacitive electrochemical response is due to the oxide active materials. (C) Ex situ XRD of electrodes after electrochemical cycling shows that the F.E. and P.E. retain their initial structures. FIGURE 5 | Electrochemical energy storage rate capability and post-electrochemical cycling material structure. (A) Cathodic capacitance and (B) rate capability (cathodic capacitance normalized to the capacitance at 0.1 mV/s), from 0.1 to 100 mV/s. The low capacity and rate capability of the acetylene black (A.B.) conductive additive shows that the capacitive electrochemical response is due to the oxide active materials. (C) Ex situ XRD of electrodes after electrochemical cycling shows that the F.E. and P.E. retain their initial structures. of activated carbon materials, which is surprising given the much smaller surface area of the oxide materials. When cycled from 0.1 to 50 mV/s, the F.E. NaMCu retains 34% of its initial capacitance. The maximum capacitance of the P.E. NaMCu is lower, 62.4 F/g (14 mAh/g), but its rate capability is slightly better than that of F.E. NaMCu. The pristine P2 NaMCu undergoes electrochemical expansion and hydration directly on the electrode, and its second-cycle capacitance of 57 F/g (13 mAh/g) drops offsignificantly as the material delaminates from the electrode. Ex situ XRD (Figure 5C) indicates that F.E. and P.E. NaMCu retain their initial structure after electrochemical cycling. There is no ex situ XRD of the P2 electrodes after electrochemistry because the slurries delaminated from the current collectors during cycling. Together, these results show that the F.E. and P.E. NaMCu exhibit relatively high capacitance and rate capability for aqueous energy storage due to the hydrated interlayer and particle expansion. The batch electrochemical expansion of P2 NaMCu and subsequent electrode assembly leads to electrodes significantly as the 25% increase along the c-axis causes particles to delaminate. P2 NaMCu electrodes do not show clear redox peaks in K2SO4 (Figure S5), possibly because the interlayer Na+ partially exchanges with K+ and H2O immediately upon immersion into the electrolyte. The semi-rectangular CV, with the lowest specific current of the three electrodes, is likely from the response of the remaining, partially-hydrated material that is still in electrical contact with the current collector. By 100 mV/s, all three materials exhibit significant polarization arising from increased Ohmic resistance from the large measured currents. Frontiers in Chemistry | www.frontiersin.org Electrochemical Behavior of Expanded Materials Overall, these results show that the degree of expansion directly determines the material’s electrochemical behavior, and that electrochemical expansion before electrode assembly leads to stable, capacitive energy storage. Figure 5 shows the cathodic capacitance and rate capability of the three materials. The highest capacitance of 102 F/g (23 mAh/g) is obtained with the F.E. materials, indicating that the interlayer expansion enabled access of electrolyte ions to the interlayer. This value is comparable to capacitances August 2020 | Volume 8 | Article 715 7 Electrochemically Expanded Hydrated Manganese-Rich Oxides Boyd et al. FIGURE 6 | (A) Cycling stability of F.E., P.E., and P2 NaMCu over 600 cycles at 10 mV/s. (B) Ex situ XRD after 600 cycles shows that the F.E. NaMCu retains the hydrated phase, while some of the remaining P2 material in the P.E. NaMCu electrode expanded after prolonged cycling. FIGURE 6 | (A) Cycling stability of F.E., P.E., and P2 NaMCu over 600 cycles at 10 mV/s. (B) Ex situ XRD after 600 cycles shows that the F.E. NaMCu retains the hydrated phase, while some of the remaining P2 material in the P.E. NaMCu electrode expanded after prolonged cycling. showed that after 50 cycles, NaMCu partially transformed to the hydrated phase (Boyd et al., 2018). with high rate capability and is promising for high-power energy storage. Post-electrochemical SEM (Figure 7) shows that while most particles in the F.E. and P.E. electrodes retained their original morphology, some exhibit a nanostructured surface coating. After 600 cycles, the morphology of the F.E. NaMCu primary particles appears similar as before cycling. However, the surface of these primary particles now has a nano–structured, semi- porous coating. One possible mechanism of this surface coating could be restructuring due to the dissolution of Mn2+ during reduction, and subsequent re-deposition during oxidation (Liang et al., 2019). The variability of this surface coating from particle to particle in F.E. NaMCu may highlight how the electrode architecture affects the relevant electrochemical reaction. A well- connected particle may experience more overall charge transfer, leading to surface restructuring. However, there was little surface coating in the P.E. NaMCu, suggesting that more of the current may have gone into expanding the remaining P2 particles. Figure 7D shows one of the few P.E. NaMCu particles with partial surface coating. Finally, Figures 7E,F show the pristine P2 NaMCu after 600 cycles. Electrochemical Behavior of Expanded Materials While the P2 particles expanded somewhat, their morphology is much smoother than F.E. or P.E. electrode particles. The presence of only F.E. and Ti substrate peaks in the XRD results confirm that this surface film is either the same hydrated birnessite-like phase or it is just a minor weight fraction of the total electrode mass. Overall, the electrochemistry, XRD, and SEM results highlight that electrodes assembled from pre-expanded F.E. or P.E. NaMCu possess high rate capability and structure stability that make them suitable as EC materials. Evaluation of the cyclability of the three oxide materials shows that the F.E. NaMCu electrode retained its structure and the most capacity after 600 cycles at 10 mV/s (Figure 6), while the P.E. NaMCu converted to the F.E. structure and the P2 NaMCu delaminated from the electrode. The initial capacitances were 58 F/g (13 mAh/g) for the F.E. electrode, 34 F/g (8 mAh/g) for the P.E. electrode, and 37 F/g (8 mAh/g) for the P2 electrode. After 600 cycles at 10 mV/s, the F.E. electrode retained 86.3% capacity, the P.E. retained 85.7%, and the P2 retained 40.4%. Figure 6 shows that the F.E. electrode experienced an initial capacity drop, but after 60 cycles the capacity increased close to its initial value. The P.E. electrode experienced a steady capacity increase over the first 50 cycles, and then a steady decline during the subsequent 550. The P2 NaMCu lost most of its capacity within the first 50 cycles, as water insertion into the P2 NaMCu partially expanded the oxide particles, causing them to fall offthe electrode due to the change in volume. The materials with an expanded and hydrated interlayer exhibit a significant improvement over the as-synthesized P2 materials, likely due to the improved access of the electrolyte to the material. However, further investigation is required to understand the reaction mechanisms and develop their electrode architecture so they can withstand the ∼1,000,000 cycles required of ECs (Conway, 1999; Nybeck et al., 2019). XRD of the F.E. and P.E. NaMCu after the cyclability testing (Figure 6B) shows that the F.E. phase is stable under these electrochemical conditions, as the only visible change is a slight broadening of the peaks after cycling. This suggests that the particle expansion and interlayer hydration limit further structural changes in the material, leading to better stability. Ex situ XRD of the P.E. material confirms that an increasing fraction of the F.E. Electrochemical Behavior of Expanded Materials material develops after extended cycling. It appears that the initial fraction of expanded particles was enough to maintain electronic connectivity with the particles expanded in situ. Slurry delamination during cycling prevented ex situ post- cycling XRD of the pristine NaMCu, but our previous work Frontiers in Chemistry | www.frontiersin.org Comparison of Expanded NaMCu to Commercial Activated Carbon To test our hypothesis that the hydrated and expanded NaMCu would allow an increase in the volumetric capacitance of EC electrodes by increasing access of electrolyte ions to the interlayer and buffering structural changes associated with August 2020 | Volume 8 | Article 715 Frontiers in Chemistry | www.frontiersin.org 8 Electrochemically Expanded Hydrated Manganese-Rich Oxides Boyd et al. than F.E. NaMCu. To enable comparison of the volumetric capacity/capacitance, the materials were cast onto foil (vs. mesh) current collectors. Figure 8 compares the CVs for both materials at 1, 10, and 100 mV/s in 0.5 M K2SO4 while Figure 9 shows the specific capacity/capacitance and rate capability. Both P.E. NaMCu and activated carbon exhibit nearly rectangular, ideally capacitive CVs. At sweep rates up to 20 mV/s (corresponding to a charge/discharge time of 40 s), P.E. NaMCu shows a higher specific current than activated carbon, indicating that the expanded oxide particles give better volumetric performance than the high surface area activated carbon. At 0.1 mV/s, the volumetric capacitances of P.E. NaMCu and activated carbon are 57.2 F/cm3 (12.7 mAh/cm3) and 20.9 F/cm3 (4.64 mAh/cm3), respectively. However, the response of the two materials becomes similar at faster sweep rates; by 100 mV/s the CVs essentially overlap and their diagonality indicates both are more Ohmically resistive. The similarity of the material response at faster sweep rates may be due to similar issues of maintaining adequate ionic and electronic conductivity in the electrodes. These results show that an oxide material with expanded and hydrated micron- size particles can increase EC energy density over traditionally used high surface area activated carbon at timescales of up to 40 s. While further studies are required to determine the exact mechanism, we propose that the expanded and hydrated interlayer facilitates access of electrolyte ions for charge storage, enabling better material utilization at high rates. ion (de)intercalation, we compared the P.E. NaMCu with a commercially available activated carbon used for EC electrodes. P.E. NaMCu was selected due to its better rate capability FIGURE 7 | SEM images of (A,B) F.E., (C,D) P.E., and (E,F) P2 NaMCu electrodes after 600 cycles in 0.5 M K2SO4. While most F.E. particles show expansion or a surface coating, few P.E. particles show surface coating, and few P2 particles even show expansion. Scale bar 500 nm. CONCLUSIONS This work describes a promising new material for EC electrodes by detailing how electrochemically expanding micron-sized layered oxides and hydrating the interlayer leads to EC electrodes with high volumetric capacitance and cyclability in aqueous electrolytes. We propose a scalable “top-down” synthesis to electrochemically expand particles, changing their electrochemical characteristics from battery-like for the initial Na+ deintercalation to capacitive upon subsequent cycling. Specifically, after interlayer hydration and subsequent particle expansion, micron-sized P2 oxide particles exhibit capacitive FIGURE 7 | SEM images of (A,B) F.E., (C,D) P.E., and (E,F) P2 NaMCu electrodes after 600 cycles in 0.5 M K2SO4. While most F.E. particles show expansion or a surface coating, few P.E. particles show surface coating, and few P2 particles even show expansion. Scale bar 500 nm. FIGURE 8 | CV comparison of P.E. NaMCu and activated carbon (A.C.) on the basis of their specific current at (A) 1 mV/s, (B) 10 mV/s, and (C) 100 mV/s. At sweep rates up to ∼20 mV/s, the P.E. NaMCu out-performs the activated carbon, although both electrodes appear relatively resistive at 100 mV/s. FIGURE 8 | CV comparison of P.E. NaMCu and activated carbon (A.C.) on the basis of their specific current at (A) 1 mV/s, (B) 10 mV/s, and (C) 100 mV/s. At sweep rates up to ∼20 mV/s, the P.E. NaMCu out-performs the activated carbon, although both electrodes appear relatively resistive at 100 mV/s. August 2020 | Volume 8 | Article 715 Frontiers in Chemistry | www.frontiersin.org 9 Electrochemically Expanded Hydrated Manganese-Rich Oxides Boyd et al. FIGURE 9 | (A) Volumetric capacity/capacitance and (B) rate capability of P.E. NaMCu and activated carbon (A.C.) electrodes. FIGURE 9 | (A) Volumetric capacity/capacitance and (B) rate capability of P.E. NaMCu and activated carbon (A.C.) electrodes. behavior that is at least in part pseudocapacitive, as evidenced by reversible interlayer spacing changes during operando XRD. The obvious reduction in redox peaks in CVs after expansion suggests that the material deformation is further buffered by the interlayer water. In addition, the surface area of the bulk expanded particles is only slightly greater than that of the pristine materials. Therefore, we hypothesize that the interlayer expansion and hydration effectively increase the surface area by extending the electrolyte into the bulk of the particles in two ways. DATA AVAILABILITY STATEMENT The authors thank Cynthia Koehler and Prof. Thom LaBean (NC State University) for providing dialysis tubing. The authors thank Cynthia Koehler and Prof. Thom LaBean (NC State University) for providing dialysis tubing. The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation. FUNDING SB was supported by the National Science Foundation Graduate Research Fellowship Program under Grant No. 571800. NG was supported by the Department of Defense (DoD) through the National Defense Science and Engineering Graduate Fellowship (NDSEG) Program. XRD and SEM studies were supported as part of the Fluid Interface Reactions, Structures, and Transport (FIRST) Center, an Energy Frontier Research Center funded by the U.S. Department of Energy, Office of Science, Office of Basic Energy Sciences. This work was performed in part at the Analytical Instrumentation Facility (AIF) at North Carolina State University, which was supported by the State of North Carolina and the National Science Foundation (award number ECCS-1542015). The AIF was a member of the North Carolina Research Triangle Nanotechnology Network (RTNN), a site in the National Nanotechnology Coordinated Infrastructure (NNCI). Use of the Stanford Synchrotron Radiation Lightsource, SLAC National Accelerator Laboratory, was supported by the U.S. Department of Energy, Office of Science, Office of Basic Energy Sciences under Contract No. DE-AC02-76SF00515. CONCLUSIONS First, hydrating the material interlayer improves cation transfer from the bulk electrolyte to the particles, and second, the large (∼100 nm) pores between expanded sections of the material allow easier access of the bulk electrolyte to the particles. The hydrated interlayers may also cushion the structural effects of ion intercalation. All of these increase the rate at which electrolyte cations can approach transition metal oxide storage sites. These results show that hydrating the material interlayer allowed the micron-scale particles to maintain their structure during extended cycling, making them compatible for capacitive energy storage in aqueous electrolytes. By expanding the interlayer of P2 NaMCu oxide, we show that particles with a large solid-state cation diffusion distance can be competitive with the state-of- the-art activated carbon for EC electrodes in aqueous electrolytes. While this synthesis is conducted on P2 oxides, it can be applied to other layered materials that possess an electrochemically labile ion. Overall, this shows that electrochemically-driven expansion of oxide materials can tune both the interlayer chemistry and particle size, leading to a new scalable synthesis strategy for EC materials with high volumetric capacitance. NG extracted and analyzed the synchrotron data. SB performed all other experiments and performed the data analysis. All authors contributed to writing and revising the manuscript, and read and approved the submitted version. REFERENCES Quantifying the volumetric performance metrics of supercapacitors. Adv. Energy Mater. 9, 1–11. doi: 10.1002/aenm.201900079 Bélanger, D., Brousse, T., and Long, J. W. (2008). Manganese oxides: battery materials make the leap to electrochemical capacitors. Electrochem. Soc. Interface 17, 47–52. Available online at: https://www.electrochem.org/dl/ interface/spr/spr08/spr08_p49-52.pdf Li, X., Xiang, L., Xie, X., Zhang, C., Liu, S., Li, Z., et al. (2020). Impact of the electrode thickness and crystal water to pseudocapacitive performances of layered birnessite MnO2. Nanotechnology 31:215406. doi: 10.1088/1361-6528/ab73bf Boyd, S., Dhall, R., LeBeau, J. M., and Augustyn, V. (2018). Charge storage mechanism and degradation of P2-type sodium transition metal oxides in aqueous electrolytes. J. Mater. Chem. A 6, 22266–22276. doi: 10.1039/C8TA08367C Li, Y., Feng, X., Cui, S., Shi, Q., Mi, L., and Chen, W. (2016). From α-NaMnO 2 to crystal water containing Na-birnessite: enhanced cycling stability for sodium- ion batteries. CrystEngComm 18, 3136–3141. doi: 10.1039/C6CE00191B Brousse, T., Toupin, M., Dugas, R., Athouël, L., Crosnier, O., and Bélanger, D. (2006). Crystalline MnO2 as possible alternatives to amorphous compounds in electrochemical supercapacitors. J. Electrochem. Soc. 153, A2171–A2180. doi: 10.1149/1.2352197 Li, Y., Yang, Z., Xu, S., Mu, L., Gu, L., Hu, Y., et al. (2015). Air-stable copper- based P2-Na7/9Cu2/9Fe1/9Mn2/3O2 as a new positive electrode material for sodium-ion batteries. Adv. Sci. 2:1500031. doi: 10.1002/advs.201500031 Buchholz, D., Chagas, L. G., Vaalma, C., Wu, L., and Passerini, S. (2014). Water sensitivity of layered P2/P3-NaxNi0.22Co0.11Mn0.66O2 cathode material. J. Mater. Chem. A 2:13415. doi: 10.1039/C4TA02627F Liang, G., Mo, F., Li, H., Tang, Z., Liu, Z., Wang, D., et al. (2019). A universal principle to design reversible aqueous batteries based on deposition–dissolution mechanism. Adv. Energy Mater. 9:1901838. doi: 10.1002/aenm.201901838 Cao, C., Steinrück, H.-G., Shyam, B., Stone, K. H., and Toney, M. F. (2016). In situ study of silicon electrode lithiation with x-ray reflectivity. Nano Lett. 16, 7394–7401. doi: 10.1021/acs.nanolett.6b02926 Liu, C., Luo, S., Huang, H., Zhai, Y., and Wang, Z. (2019). Layered potassium- deficient P2- and P3-type cathode materials KxMnO2 for K-ion batteries. Chem. Eng. J. 356, 53–59. doi: 10.1016/j.cej.2018.09.012 Chen, T., Liu, W., Liu, F., Luo, Y., Zhuo, Y., Hu, H., et al. (2018). Benefits of copper and magnesium Co-substitution in Na0.5Mn0.6Ni0.4O2 as a superior cathode for sodium-ion batteries. ACS Appl. Energy Mater. 2, 844–851. doi: 10.1021/acsaem.8b01909 Liu, H., Wang, J. G., Hua, W., Wang, J., Nan, D., and Wei, C. (2018). Scale-up production of high-tap-density carbon/MnOx/carbon nanotube microcomposites for Li-ion batteries with ultrahigh volumetric capacity. Chem. Eng. J. REFERENCES dioxide for electrochemical capacitors. Electrochim. Acta 271, 337–350. doi: 10.1016/j.electacta.2018.03.141 Abou-El-Sherbini, K. S., Askar, M. H., and Schöllhorn, R. (2002). Hydrated layered manganese dioxide: part I. Synthesis and characterization of some hydrated layered manganese dioxides from??-NaMnO2. Solid State Ionics 150, 407–415. doi: 10.1016/S0167-2738(02)00258-8 Fleischmann, S., Mitchell, J. B., Wang, R., Zhan, C., Jiang, D., Presser, V., et al. (2020). Pseudocapacitance: from fundamental understanding to high power energy storage materials. Chem. Rev. 120, 6738–6782. doi: 10.1021/acs.chemrev.0c00170 Achee, T. C., Sun, W., Hope, J. T., Quitzau, S. G., Sweeney, C. B., Shah, S. A., et al. (2018). High-yield scalable graphene nanosheet production from compressed graphite using electrochemical exfoliation. Sci. Rep. 8, 1–8. doi: 10.1038/s41598-018-32741-3 Ghodbane, O., Ataherian, F., Wu, N.-L. L., and Favier, F. (2012). In situ crystallographic investigations of charge storage mechanisms in MnO2-based electrochemical capacitors. J. Power Sources 206, 454–462. doi: 10.1016/j.jpowsour.2012.01.103 Ambrosi, A., and Pumera, M. (2018). Electrochemical exfoliation of MoS2 crystal for hydrogen electrogeneration. Chem. Eur. J. 24, 18551–18555. doi: 10.1002/chem.201804821 Jouanneau, S., Eberman, K. W., Krause, L. J., and Dahn, J. R. (2003). Synthesis, characterization, and electrochemical behavior of improved Li[NixCo1–2xMnx]O2 (0.1 ≤x ≤0.5). J. Electrochem. Soc. 150:A1637. doi: 10.1149/1.1622956 Arias, C. R., Debiemme-Chouvy, C., Gabrielli, C., Laberty-Robert, C., Pailleret, A., Perrot, H., et al. (2014). New insights into pseudocapacitive charge- storage mechanisms in Li-birnessite type MnO2 monitored by fast quartz crystal microbalance methods. J. Phys. Chem. C 118, 26551–26559. doi: 10.1021/jp508543h Kang, W., Zhang, Z., Lee, P. K., Ng, T. W., Li, W., Tang, Y., et al. (2015). Copper substituted P2-type Na0.67CuxMn1−xO2: a stable high-power sodium-ion battery cathode. J. Mater. Chem. A 3, 22846–22852. doi: 10.1039/C5TA06371J Largeot, C., Portet, C., Chmiola, J., Taberna, P., Gogotsi, Y., and Simon, P. (2008). Relation between the ion size and pore size for an electric double-layer capacitor. J. Am. Chem. Soc. 130, 2730–2731. doi: 10.1021/ja7106178 jp Ashiotis, G., Deschildre, A., Nawaz, Z., Wright, J. P., Karkoulis, D., Picca, F. E., et al. (2015). The fast azimuthal integration python library: pyFAI. J. Appl. Crystallogr. 48, 510–519. doi: 10.1107/S1600576715004306 Leong, Z. Y., and Yang, H. Y. (2019). A study of MnO2 with different crystalline forms for pseudocapacitive desalination. ACS Appl. Mater. Interfaces 11, 13176–13184. doi: 10.1021/acsami.8b20880 Augustyn, V., and Gogotsi, Y. (2017). 2D materials with nanoconfined fluids for electrochemical energy storage. Joule 1, 443–452. doi: 10.1016/j.joule.2017.09.008 Li, H., Qi, C., Tao, Y., Liu, H., Wang, D. W., Li, F., et al. (2019). AUTHOR CONTRIBUTIONS The Supplementary Material for this article can be found online at: https://www.frontiersin.org/articles/10.3389/fchem. 2020.00715/full#supplementary-material SB and VA contributed to the study conception and design. All authors designed the synchrotron experiments. August 2020 | Volume 8 | Article 715 Frontiers in Chemistry | www.frontiersin.org 10 Electrochemically Expanded Hydrated Manganese-Rich Oxides Boyd et al. REFERENCES 354, 220–227. doi: 10.1016/j.cej.2018.08.031 Clement, R. J., Billaud, J., Armstrong, A. R., Singh, G., Filo Rojo, T., Bruce, P. G., et al. (2016). Structurally stable Mg-doped P2-Na2/3Mn1−yMgyO2 sodium-ion battery cathodes with high rate performance: insights from electrochemical, NMR and diffraction studies. Energy Environ. Sci. 9, 3240–3251. doi: 10.1039/C6EE01750A Liu, N., Kim, P., Kim, J. H., Ye, J. H., Kim, S., and Lee, C. J. (2014). Large-area atomically thin MoS2 nanosheets prepared using electrochemical exfoliation. ACS Nano 8, 6902–6910. doi: 10.1021/nn5016242 Liu, Z., Tian, R., Mushtaq, M., Guo, W., Yao, M., and Feng, J. (2019). Performance modulation through synergetic effect of interstitial water with Ti-substitution for sodium ion battery cathode. Chem. Lett. 48, 670–673. doi: 10.1246/cl.1 90137 Clément, R. J., Bruce, P. G., and Grey, C. P. (2015). Review—manganese-based P2-type transition metal oxides as sodium-ion battery cathode materials. J. Electrochem. Soc. 162, A2589–A2604. doi: 10.1149/2.0201514jes Lu, Z., and Dahn, J. R. (2001). Intercalation of water in P2, T2 and O2 Structure Az[CoxNi1/3−xMn2/3]O2. Chem. Mater. 13, 1252–1257. doi: 10.1021/cm000721x Conway, B. E. (1999). Electrochemical Supercapacitors: Scientific Fundamentals and Technological Applications. New York, NY: Kluwer-Academic. Costentin, C., Porter, T. R., Save, J., and Savéant, J. M. (2017). How do pseudocapacitors store energy? Theoretical analysis and experimental illustration. ACS Appl. Mater. Interfaces 9, 8649–8658. doi: 10.1021/acsami.6b14100 Ma, B., Hou, W., Han, Y., Sun, R., and Liu, Z. H. (2008). Exfoliation reaction of birnessite-type manganese oxide by a host-guest electrostatic repulsion in aqueous solution. Solid State Sci. 10, 141–147. doi: 10.1016/j.solidstatesciences.2007.09.003 DeBlock, R. H., Choi, C., Ashby, D. S., Butts, D. M., DeBlock, R. H., Wei, Q., et al. (2019). Achieving high energy density and high power density with pseudocapacitive materials. Nat. Rev. Mater. 5, 5–19. doi: 10.1038/s41578-019-0142-z Mitchell, J. B., Geise, N. R., Paterson, A. R., Osti, N. C., Sun, Y., Fleischmann, S., et al. (2019). Confined interlayer water promotes structural stability for high-rate electrochemical proton intercalation in tungsten oxide hydrates. ACS Energy Lett. 4, 2805–2812. doi: 10.1021/acsenergylett.9b02040 Delmas, C., Fouassier, C., and Hagenmuller, P. (1980). Structural classification and properties of the layered oxides. Phys. B 99, 81–85. doi: 10.1016/0378-4363(80)90214-4 Mitchell, J. B., Lo, W. C., Genc, A., LeBeau, J., and Augustyn, V. (2017). Transition from battery to pseudocapacitor behavior via structural water in tungsten oxide. Chem. Mater. 29, 3928–3937. doi: 10.1021/acs.chemmater.6b 05485 Dupont, M. F., Forghani, M., Cameron, A. P., and Donne, S. W. (2018). REFERENCES Effect of electrolyte cation on the charge storage mechanism of manganese August 2020 | Volume 8 | Article 715 Frontiers in Chemistry | www.frontiersin.org 11 Electrochemically Expanded Hydrated Manganese-Rich Oxides Boyd et al. Nam, K. W., Kim, S., Yang, E., Jung, Y., Levi, E., Aurbach, D., et al. (2015). Critical role of crystal water for a layered cathode material in sodium ion batteries. Chem. Mater. 27, 3721–3725. doi: 10.1021/acs.chemmater.5b00869 water driven battery-to-pseudocapacitor transition. ACS Nano 12, 6032–6039. doi: 10.1021/acsnano.8b02273 Wu, T., Zhu, K., Qin, C., and Huang, K. (2019). Unraveling the role of structural water in bilayer V2O5 during Zn2+-intercalation: insights from DFT calculations. J. Mater. Chem. A 7, 5612–5620. doi: 10.1039/C8TA12014E Nybeck, C. N., Dodson, D. A., Wetz, D. A., and Heinzel, J. M. (2019). Characterization of ultracapacitors for transient load applications. IEEE Trans. Plasma Sci. 47, 2493–2499. doi: 10.1109/TPS.2019.2904562 Wu, T. H., Hesp, D., Dhanak, V., Collins, C., Braga, F., Hardwick, L. J., et al. (2015). Charge storage mechanism of activated manganese oxide composites for pseudocapacitors. J. Mater. Chem. A 3, 12786–12795. doi: 10.1039/C5TA03334A Okubo, M., Hosono, E., Kim, J., Enomoto, M., Kojima, N., Kudo, T., et al. (2007). Nanosize effect on high-rate Li-ion intercalation in LiCoO2 electrode. J. Am. Chem. Soc. 129, 7444–7452. doi: 10.1021/ja0681927 Palacín, M. R., Simon, P., and Tarascon, J. M. (2016). Nanomaterials for electrochemical energy storage: the good and the bad. Acta Chim. Slov. 63, 417–423. doi: 10.17344/acsi.2016.2314 Xiong, P., Ma, R., Sakai, N., Bai, X., Li, S., and Sasaki, T. (2017). Redox active cation intercalation/deintercalation in two-dimensional layered MnO2 nanostructures for high-rate electrochemical energy storage. ACS Appl. Mater. Interfaces 9, 6282–6291. doi: 10.1021/acsami.6b14612 Phadke, S., Mysyk, R., and Anouti, M. (2020). Effect of cation (Li+, Na+, K+, Rb+, Cs+) in aqueous electrolyte on the electrochemical redox of prussian blue analogue (PBA) cathodes. J. Energy Chem. 40, 31–38. doi: 10.1016/j.jechem.2019.01.025 Yabuuchi, N., Hara, R., Kajiyama, M., Kubota, K., Ishigaki, T., Hoshikawa, A., et al. (2014). New O2/P2-type Li-excess layered manganese oxides as promising multi-functional electrode materials for rechargeable Li/Na batteries. Adv. Energy Mater. 4:1301453. doi: 10.1002/aenm.201301453 Rauda, I. E., Augustyn, V., Saldarriaga-Lopez, L. C., Chen, X., Schelhas, L. T., Rubloff, G. W., et al. (2014). Nanostructured pseudocapacitors based on atomic layer deposition of V2O5 onto conductive nanocrystal-based mesoporous ITO scaffolds. Adv. Funct. Mater. 24, 6717–6728. doi: 10.1002/adfm.201401284 Yao, M., Ji, X., Chou, T. F., Cheng, S., Yang, L., Wu, P., et al. (2019). Frontiers in Chemistry | www.frontiersin.org August 2020 | Volume 8 | Article 715 REFERENCES Simple and cost-effective approach to dramatically enhance the durability and capability of a layered δ-MnO2 based electrode for pseudocapacitors: a practical electrochemical test and mechanistic revealing. ACS Appl. Energy Mater. 2, 2743–2750. doi: 10.1021/acsaem.9b00075 affolds. Adv. Funct. Mater. 24, 6717–6728. doi: 10.1002/adfm.2014 Sai Gautam, G., Canepa, P., Richards, W. D., Malik, R., and Ceder, G. (2016). Role of structural H2O in intercalation electrodes: the case of Mg in nanocrystalline xerogel-V2O5. Nano Lett. 16, 2426–2431. doi: 10.1021/acs.nanolett. 5b05273 Zhu, K., Guo, S., Li, Q., Wei, Y., Chen, G., and Zhou, H. (2017). Tunable electrochemistry via controlling lattice water in layered oxides of sodium-ion batteries. ACS Appl. Mater. Interfaces 9, 34909–34914. doi: 10.1021/acsami.7b09658 Shao, J., Li, X., Qu, Q., and Wu, Y. (2013). Study on different power and cycling performance of crystalline KxMnO2·nH2O as cathode material for supercapacitors in Li2SO4, Na2SO4, and K2SO4 aqueous electrolytes. J. Power Sources 223, 56–61. doi: 10.1016/j.jpowsour.2012.09.046 Conflict of Interest: The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. Conflict of Interest: The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. Wang, J.-G., Liu, H., Liu, H., Fu, Z., and Nan, D. (2017). Facile synthesis of microsized MnO/C composites with high tap density as high performance anodes for Li-ion batteries. Chem. Eng. J. 328, 591–598. doi: 10.1016/j.cej.2017.07.039 Copyright © 2020 Boyd, Geise, Toney and Augustyn. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms. Wang, L., Sun, Y.-G., Hu, L.-L., Piao, J.-Y., Guo, J., Manthiram, A., et al. (2017). Copper-substituted Na0.67Ni0.3−xCuxMn0.7O2 cathode materials for sodium- ion batteries with suppressed P2-O2 phase transition. J. Mater. Chem. A 5, 8752–8761. doi: 10.1039/C7TA00880E Wang, R., Mitchell, J. B., Gao, Q., Tsai, W., Boyd, S., Pharr, M., et al. (2018). Operando atomic force microscopy reveals mechanics of structural August 2020 | Volume 8 | Article 715 Frontiers in Chemistry | www.frontiersin.org 12
https://openalex.org/W4310363527
https://pure.eur.nl/files/79456829/The_impact_of_pancreatic_cancer_screening_on_life_expectancy.pdf
English
null
The impact of pancreatic cancer screening on life expectancy: A systematic review of modeling studies
International journal of cancer
2,022
cc-by
8,504
The impact of pancreatic cancer screening on life expectancy: A systematic review of modeling studies Brechtje D. M. Koopmann1,2 | Amir-Houshang Omidvari1 | Iris Lansdorp-Vogelaar1 | Djuna L. Cahen2 | Marco J. Bruno2 | Inge M. C. M. de Kok1 1Department of Public Health, Erasmus MC University Medical Center, Rotterdam, The Netherlands 2Department of Gastroenterology & Hepatology, Erasmus MC University Medical Center, Rotterdam, The Netherlands Correspondence Brechtje D. M. Koopmann, Department of Public Health, Erasmus MC University Medical Center, Rotterdam, The Netherlands. Email: b.koopmann@erasmusmc.nl Funding information Maag Lever Darm Stichting, Grant/Award Number: SK 17-52 1Department of Public Health, Erasmus MC University Medical Center, Rotterdam, The Netherlands Abstract Evidence supporting the effectiveness of pancreatic cancer (PC) screening is scant. Most clinical studies concern small populations with short follow-up durations. Math- ematical models are useful to estimate long-term effects of PC screening using short- term indicators. This systematic review aims to evaluate the impact of PC screening on life expectancy (LE) in model-based studies. Therefore, we searched four data- bases (Embase, Medline, Web-of-science, Cochrane) until 30 May 2022 to identify model-based studies evaluating the impact of PC screening on LE in different risk populations. Two authors independently screened identified papers, extracted data and assessed the methodological quality of studies. A descriptive analysis was per- formed and the impact of screening strategies on LE of different risk groups was reported. Our search resulted in 419 studies, of which eight met the eligibility criteria (mathematical model, PC screening, LE). Reported relative risks (RR) for PC varied from 1 to 70. In higher risk individuals (RR > 5), annual screening (by imaging with 56% sensitivity for HGD/early stage PC) predicted to increase LE of screened individ- uals by 20 to 260 days. In the general population, one-time PC screening was esti- mated to decrease LE (2-110 days), depending on the test characteristics and treatment mortality risk. In conclusion, although the models use different and some- times outdated or unrealistic assumptions, it seems that PC screening in high-risk populations improves LE, and that this gain increases with a higher PC risk. Updated model studies, with data from large clinical trials are necessary to predict the long- term effect of PC screening more accurately. Funding information Maag Lever Darm Stichting, Grant/Award Number: SK 17-52 Received: 7 March 2022 Revised: 9 October 2022 Accepted: 7 November 2022 Received: 7 March 2022 Revised: 9 October 2022 Accepted: 7 November 2022 DOI: 10.1002/ijc.34379 C A N C E R E P I D E M I O L O G Y Int. J. Cancer. 2022;1–11. 2.1 These models all have a similar principle of decision processes. These processes relate to potential events that can occur. For exam- ple, an individual can be at a certain risk to develop a precursor lesion. Based on this risk, a precursor lesion will or will not develop during his or her lifetime. If a precursor lesion develops, the associated cancer risk will determine the chance that it will progress to a malignancy. Decision processes can be relatively simple, such as a decision tree, or more complex, such as a microsimulation model. In a decision tree the risk of events and states of nature is diagramed over a fixed time hori- zon. Markov models simulate a hypothetical cohort of individuals through health states over time. A microsimulation model simulates individual life histories and tracks the past health states and future events for each individual.2 These decision-analytic models can inform policy makers on optimal screening strategies for several cancer types. Also, they can estimate the cost-effectiveness and harms and benefits of a screening program.3,4 In the past, these models have been used to quantify the effects of screening for cancer such as breast, colon, cervix, and lung cancer in a population.3-6 Mathematical modeling is, for example, used to translate colorectal cancer screening trial results (that showed screening effectiveness in a controlled setting) to real world health outcomes for the total population and a longer time period.7,8 We searched for studies that used a mathematical model to evaluate the effect of PC screening on LE in different PC risk groups. Mathe- matical models were defined as models using given input to simulate a decision process with the help of algorithms (eg, simulation, Markov, microsimulation or decision tree models). Our search was limited to papers written in English and involving human subjects. We excluded studies that evaluated the effect of PC treatment. We also excluded reviews, in vitro studies, case reports and letters. What's new? Robust evidence on the effectiveness of pancreatic cancer screening is lacking, as published studies are mostly cohort studies, limited in size and duration. Here, the authors performed a systematic review to evaluate the impact of pancreatic cancer screening on life expectancy as determined in model-based studies. The results show that, while it could be detrimental in the general population, pancreatic cancer screening in high-risk populations may increase life expec- tancy. Updated model studies, with data from large clinical trials, are necessary to predict the long-term effect of pancreatic cancer screening more accurately. 2 | METHODS This systematic review was executed according to the Preferred Report- ing Items for Systematic reviews and Meta-Analyses (PRISMA) guideline. The review protocol is available in PROSPERO (CRD42020168804). We searched four electronic databases (Embase, Ovid Medline, Web of Science, Cochrane central) for studies published before 30 May 2022. The search strategies used for each database are presented in the Supplementary Materials (Data S1). Mathematical models, also known as decision-analytic models, can simulate health outcomes of individual patients or a population under a variety of scenarios. They can be used to estimate the conse- quences of distinct screening scenarios under varying circumstances. Several types of mathematical models exist, such as decision trees, Markov models and microsimulation models. 1 | INTRODUCTION objective of the current systematic review is to gain insight into the esti- mated effects of these mathematical models pertaining life expec- tancy (LE). Pancreatic cancer (PC) is mostly diagnosed at an incurable stage.1 Early detection by screening might improve survival, but robust evi- dence on the effectiveness of PC screening is lacking, as published studies are cohort studies, limited in size and duration. Ideally, large clinical trials with decades of follow-up would provide solid evidence on the efficacy of screening. Since such studies are unlikely to be concluded promptly, mathematical models can be used to predict long-term outcomes, using short-term indicators from observational studies. K E Y W O R D S high-risk, mathematical model, pancreatic cancer, screening Abbreviations: AGA, American Gastroenterological Association; CI, confidence interval; CT, computed tomography; EUS, endoscopic ultrasound; FPC, familial pancreatic cancer; ICER, incremental cost effectiveness ratio; LE, life expectancy; LYG, life years gained; MRI, magnetic resonance imaging; NA, not applicable; NNS, number needed to screen; NNT, number needed to treat; PanIN, pancreatic intraepithelial neoplasia; PC, pancreatic cancer; PRISMA, Preferred Reporting Items for Systematic reviews and Meta-Analyses; PROSPERO, Prospective Register of Systematic Reviews; RR, relative risk; SB-IPMN, Side Branch—Intraductal Papillary Mucinous Neoplasm; Sens., sensitivity; Spec., specificity. Systematic review registration number: CRD42020168804. This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited. g © 2022 The Authors. International Journal of Cancer published by John Wiley & Sons Ltd on behalf of UICC. wileyonlinelibrary.com/journal/ijc 1 2 KOOPMANN ET AL. 2.3 | Quality assessment We adapted the ISPOR-AMCP-NPC Questionnaire14 to assess the relevance and credibility of each modeling study according to the following criteria: (I) Validation; (II) Bias due to the study design; (III) Limitations in data sources; (IV) Appropriateness of the model analy- sis; (V) Reporting bias; (VI) Interpretation bias; and (VII) Conflict of interest. The risk of bias for each domain was rated as low, high, or unclear. The checklist is available in the Supplementary Materials (Data S1). This assessment provided us with information on the qual- ity of the included studies, which is important when results are trans- lated to clinical practice. FIGURE 1 PRISMA flow chart (CT), a combination of imaging tests or a hypothetical test. Two papers assumed a 100% sensitive test for PanIN3 and PC detec- tion.11,17 Although unrealistic, this model provides insight in the maxi- mal gain of screening in a hypothetical optimal scenario. (CT), a combination of imaging tests or a hypothetical test. Two papers assumed a 100% sensitive test for PanIN3 and PC detec- tion.11,17 Although unrealistic, this model provides insight in the maxi- mal gain of screening in a hypothetical optimal scenario. 3.1 | Models Rulyak et al used an EUS sensitivity of 90% for the detection of dysplasia based on expert opinion.12 An abnormal EUS was defined as two or more of the following abnormalities: heteroge- nous parenchyma with echogenic foci, hypoechoic nodules, hyper- echoic main duct wall or discrete masses. A positive test led to a diagnostic Endoscopic Retrograde Cholangiopancreatography (ERCP) for confirmation. Koopmann et al used preliminary data from a large surveillance cohort to assess a stage dependent sensi- tivity (60%-99%) for a combined EUS/MRI test.13 An overview of the extracted data from the included models is presented in Table 2. Our search resulted in 514 articles, of which 11 underwent full text review after title and abstract screening (Figure 1). Four papers were excluded based on study type (review) and/or model outcome (LE was not reported). One paper was found by evaluation of reference lists. Altogether, eight articles met the inclusion criteria, published between 2003 and 2021. Table 1 provides an overview of the included studies. Six were performed in the United States, one in Italy and one in the Netherlands. The simulated populations varied from general popula- tions, to high-risk groups (such as BRCA2 gene mutation carriers or kindreds of familial pancreatic cancer patients [FPC] or individuals with pancreatic cystic lesions), to PC patients. In this latter group the effect of detection in an earlier stage on LE was evaluated. The models encompass five Markov models, one Monte Carlo model, one Microsimulation model and one decision tree.9-13,15-17 Three studies from a single research group used the same base model, which was adjusted for different research questions. 2.2 After removing duplicates, two reviewers (B.K. and A.O) indepen- dently screened titles, abstracts and full texts for potentially eligible studies. In case of disagreement, discrepancies between the two reviewers were discussed, and if no consensus was reached, a third reviewer (IdK) joined to settle. The reference lists of included studies were scanned to identify potential additional studies. The following information was extracted (if available): authors, publication year, model type, model input (source), simulated population (PC risk level, gender), screening method (diagnostic method, test characteristics, screening interval, start-, stop age, complication risk), treatment (type, effect, complication risk, morbidity), screening effect (LE), Life years gained (LYG), number needed to screen (NNS), number needed to In the last decade, several mathematical models on PC screening have been developed to evaluate the efficacy of screening with a variety of screening modalities, screening strategies, and risk populations.9-13 The Electronic Database searches: PubMed, Embase, Medline Ovid, Web of Science and Cochrane central (n = 514 records) Titles/abstracts screened (n = 514) Excluded (n = 503) Full-text articles assessed for eligibility (n = 11) Excluded (n = 4): - 2 Reviews - 2 Measured outcome (biomarker availability) Full-text articles assessed for inclusion (n = 8) n oit a cifit n e d I g nin e e r c S ytilibigil E d e d ulc n I Included (n = 1): - From reference list FIGURE 1 PRISMA flow chart 3 KOOPMANN ET AL. treat (NNT). If detailed results of a certain analysis were not available, we contacted the corresponding author to get access to the results. treat (NNT). If detailed results of a certain analysis were not available, we contacted the corresponding author to get access to the results. 2.4 | Data synthesis and analysis We performed a descriptive analysis and summarized the effect of PC screening on LE. We compared the screening effect on LE for the dif- ferent risk groups in the included studies (general population, high-risk group, different risk levels/mutation carriers). A really low sensitivity of 56% for detection of HGD/early stage PC with MRI was described by Pandharipande et al9,10 used a sensitiv- ity of 56% for detection of HGD/early stage PC with MRI. This sensi- tivity was based on pooled data from six clinical studies dating from 2009 to 2012. Cases (resected and/or clinical PC) within these studies were classified into true-positive (resectable PC), false-negative (advanced PC), true-negative and false-positive (surgery + no PC). Because of a paucity of available data on cystic lesions, similar test characteristics were assumed for high risk cysts. 3.2 | Screening in a high-risk population Four studies reported on the effect of screening in different high-risk populations.9,10,12,13 The effect of PC screening on LE depended on the relative risk (RR) for PC of the screened population and the test characteristics (Table 3). Pandharipande et al reported that one-time MRI screening (sensitivity 56%, specificity 97% for pancreatic cyst and early stage cancer) in 50-year-old individuals with a 2.4 to 4.5 RR for PC (eg, BRCA2) led to a negligible gain in LE of 3.9 to 5.8 days per simulated individual. Annual MRI screening even reduced LE by 1.3 to 12.9 days in this risk group. When higher risk individuals (RR 6.4% or The study aims of all included articles differed. Some focused on efficacy of screening in different risk groups, while others focused on the natural disease course of PC and its precursor lesions. Besides variations in screen frequency and starting age, models used different surveillance tests; varying between magnetic resonance imaging (MRI), Endoscopic Ultrasound (EUS), Computed tomography KOOPMANN ET AL. TABLE 1 Overview included studies Study Modeling aim Modeling method Simulated population Outcome Rulyak, 200312 Cost-effectiveness of EUS screening in FPC kindreds Decision tree Members of familial pancreatic cancer kindreds Endoscopic screening was cost-effective, with an incremental cost-effectiveness ratio of 16 885/life-year saved. Screening was more cost-effective as the probability of dysplasia increased and as the sensitivity of the test increased. Expected gain in LE was 38 years for a cohort of 100 people Weinberg, 201015 Assist patients and physicians with understanding how their decisions concerning pancreatic cysts affect overall survival/QoL Markov model Pancreatic cyst (SB-IPMN located in head) Initial pancreaticoduodenectomy was the dominant strategy to maximize overall survival for any cyst >2 cm, regardless of age or comorbidities. “Do nothing” maximized quality of life for all cysts <3 cm in patients aged <75, when measuring quality adjusted survival Pandharipande, 20159 Identify when, from the standpoint of RR, one time screening is effective in high-risk individuals for PC Markov model RR for PC from 1 to 70 One time MR imaging screening in average risk group of 100 000 men at age 50 identifies 2375 low risk cysts, 159 high-risk cysts and 56 cancers. Resulting in 39 cancer deaths averted and a net LE loss of 3 days). 3.2 | Screening in a high-risk population If the PC risk exceeds 2.4 (men) or 2.7 (women) there was a gain in LE Pandharipande, 201510 Compare effectiveness of different PC screening strategies in BRCA2 mutation carriers, from standpoint of life expectancy Markov model BRCA2 mutation carriers (with or without FDR with PC) One time screening at age 50 resulted in a LE gain of 3.9 days for the BRCA2 cohort. The gain was higher with more FDRs with PC. Annual screening resulted in a LE loss of 12.9 days for BRCA2 mutation carriers. BRCA2 carriers with 2 FDRs gained 20.6 days with annual screening Cucchetti, 201616 Verify survival benefit obtained from a hypothetical screening where a 20,30 or 50% reduction of PC stage was obtained Monte Carlo Simulation Pancreatic cancer patients Mean expected LE for PC patients was 13 months. When a hypothetical screening reduced stage III/IV with 30-50% this LE was: 14-15.9 months Peters, 201811 Gain insight into the natural history of PanIN and to assess the potential of screening Markov model General population Lifetime probability for PanIN1 to progress to PDAC (1.5%). Duration of this progression: 33.6 years. A hypothetical perfect test for PanIN 3 detection and treatment could provide a maximum, average LE gain of 40 days Raphel, 201817 Determine the effect of patient age and comorbidity on LE benefits associated with SB-IPMN follow- up Markov model Pancreatic cyst (SB-IPMN) The LE benefit of SB-IPMN follow-up is 5.3-6.4 months for healthy 60 year old individuals. The effect on LE was limited in case of 80 year old individuals and coexistence of severe comorbidity Koopmann, 202113 Analyze the impact of relevant uncertainties on the effect of PC screening in high-risk individuals Markov model High-risk individuals Screening reduced PC mortality in all modeled scenarios. The reduction depended strongly on natural disease course (progressive vs indolent and faster progressive lesions). The impact of test sensitivity was much smaller. The NNS was impacted most by PC risk 7.5% life time risk) were screened annually, a gain in LE of up to 158 days was predicted, depending on test performance.13 PC life-time risk in the general population, which can be compared to a RR of 12. Rulyak et al reported a gain of 139 days per simulated individual when EUS (sensitivity 90% for pancreatic dysplasia) was performed once at age 50 in family members of familial pancreatic cancer kin- dreds. 3.2 | Screening in a high-risk population They assumed individuals in this risk group had a 20% risk of having dysplasia and a 90% risk of progression to PC when having dysplasia. This resulted in an estimated 18% risk of PC, given a 1.5% A higher PC risk (ie, RR of 30) also led to a higher LE gain (31.5 for one time and 260 days for annual screening). The effect of one- time MRI screening was highest in individuals with a RR of 70. Their LE increased by 160 days for men and 188 days for women.9 Cucchetti et al evaluated the effect on LE in case of an earlier PC diagnosis after hypothetical screening.16 They evaluated the impact of 10970215, 0, Downloaded from https://onlinelibrary.wiley.com/doi/10.1002/ijc.34379 by Erasmus University Rotterdam Universiteitsbibliotheek, Wiley KOOPMANN ET AL. 1 2 3 4 5 6 7 8 hor + publication ar Rulyak et al,12 2003 Weinberg et al,15 2010 Pandharipande et al,9 2015 Pandharipande et al,10 2015 Cucchetti et al,16 2016 Peters et al,11 2018 Raphel et al,17 2018 Koopmann et al,13 2021 al Gastrointestinal endoscopy Gastroenterology Radiology Ebiomedicine Pancreas Pancreatology Radiology International journal of cancer try USA USA USA USA Italy USA USA The Netherlands el type Decision Tree Markov based clinical Nomogram Markov model Markov model Monte Carlo Simulation Markov model Markov model Markov model ation Members of FPC kindreds Pancreatic cystic lesions, male and female (cyst: 0.5 to >3 cm) General population to high risk group (both male and female) BRCA2 mutation carriers (with/ without FDRs) 1000 PC patients General population Pancreatic cyst (SB-IPMN), male and female, different comorbidities High risk group (7.5% life time risk) sk 18% lifetime riska 1% RR 0-70 for PC RR 3.5 or greater 100%b RR 0 Low risk incidental findings 7.5% lifetime risk n method EUS (on indication + ERCP) CT or EUS (± FNA) MRI scan MRI (combined with EUS) Hypothetical test Hypothetical test Hypothetical imaging test EUS and MRI n sens. (sens. alysis) 90% for detection of pancreatic dysplasia 80%-86% 56% (0.25-1.0) For detection of cyst and early stage cancer. No PanIN. 56% (0.5-1.0) For detection of cyst and early stage cancer. No PanIN. NA 100% for detection of PanIN3 100% for malignant lesions Disease stage dependent: 60-99% (±10%) n spec. (sens. 3.2 | Screening in a high-risk population alysis) 90% 99% 97% (0.5-1.0) 97% (0.9-1.0) NA 100% NA 99% (±5 and 10%) n test mplication Pancreatitis: 5.1% (0.3-8.2) Death from EUS- FNA: 0.01% NA NA NA NA NA NA ning interval One time One time Annual and one time One time One time and continuous Annual Annual and 5 yearly /stop age (sens. alysis) 50 65, 75, 85 50 (40, 60, 70) 50-80 NA 50, 60 or 70 60,80 ment Surgery (total pancreatectomy) Surgery Surgery Surgery Surgery Surgery Surgery Surgery ment mplication risk ns. analysis) Mortality risk: 3% (1%-5%) Mortality risk: 2%-6.4% Chronic compl: 19.5% Mortality risk: 2% (0%-10%) Mortality risk: 1% (0%-2.5%) NA Mortality risk: 0 and 2% Mortality risk: 0% (2%-4%) Mortality risk: 3% (5%) ence of dysplasia (0.20) x progression probability to PC given the presence of dysplasia (0.90) = 0.18. is performed on individuals already diagnoses with PC. Consequences of earlier detection were evaluated. OOPMANN ET AL. 5 0970215, 0, Downloaded from https://onlinelibrary.wiley.com/doi/10.1002/ijc.34379 by Erasmus University Rotterdam Universiteitsbibliotheek, Wiley Online Library on [27/01/2023]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable TABLE 3 Effect of different PC screening strategies on life expectancy Risk group Screening method Screening interval Age Treatment mortality (%) Effect on LE (days) per simulated individual Reference General population MRI (sens. 56%, spec. 97%, for detection of cyst and early stage PC. No PanIN) One time 40 2 5.1 to 5.8a 9 50 2 3.3 to 4.0a 10 27 to 31a 1 2 to 3a 60 2 2.2 to 2.9a 70 2 1.5 to 1.8a MRI (sens. 25%, spec. 97%, for detection of cyst and early stage PC. No PanIN) One time 50 2 4 to 5a MRI (sens. 56%, spec. 50%, for detection of cyst and early stage PC. No PanIN) One time 50 2 94 to 110a MRI (sens. 56%, spec. 100%, for detection of cyst early stage PC. No PanIN) One time 50 2 2 MRI (sens. 100%, spec. 97%, for detection of cyst and early stage PC. No PanIN. One time 50 2 2 Hypothetical perfect test for PanIN3 Continuous 50 0 40 11 2 37 One time 50 0 7.1 2 6.7 60 0 10 2 9.3 70 0 7.9 2 7 Inherited increased risk for PC RR 2.4-4.5 MRI (sens. 56%, spec. 97%, for detection of cyst and early stage PC. TABLE 3 (Continued) stage reduction on LE for different stages. The mean LE without screening was 13 months (395.2 days) from diagnosis. The 3- and 5-year survival rates were 14.1% and 3.8%, respectively. When a hypothetical screening program reduced stage III/IV PC by 20%, 30% or 50%, the mean LE increased to 450, 477 and 547 days, respec- tively.16 After adjustment for lead-time, LE was 426, 444 and 483 days. 3.4 | Screening in the general population Two studies evaluated the effect of PC screening in the general popu- lation.9,11 The first reported that one-time screening either at age 40, 50, 60 or 70 with MRI (sensitivity 56%, specificity 97% for HGD pancreatic cyst and early stage cancer) resulted in a LE loss of 1.5 to 5.8 days per screened individual. A lower test specificity of 50% resulted in an even higher loss of LE (94-100 days). An increase in test sensitivity to 100% hardly effected LE (LE loss of 2 vs 4 days with 56%-sensitivity). TABLE 3 (Continued) Note: The effect on LE is visible in days lost or gained per simulated individual entering screening. Morality risk is either caused by screentest (EUS) or by treatment (surgery after positive screentest). Abbreviations: CT, computed tomography; EUS, endoscopic ultrasound; HGD, high grade dysplasia; MRI, magnetic resonance imaging; Neg., negative; PanIN, Pancreatic Intraepithelial Neoplasia; PC, pancreatic cancer; Pos., positive; RR, relative risk; SB-IPMN, Side Branch—Intraductal Papillary Mucinous Neoplasm; Sens., sensitivity; Spec., specificity. aEffect on life expectancy for men and women. bIn this model two pathways are simulated, one with only progressive lesions and one with indolent and faster progressive lesions. A larger effect on LE was seen in the progressive-only pathway. cLYG are presented in years per patient in ranges correlated with cyst size (1 cm less gain 3 cm more gain in LE) Note: The effect on LE is visible in days lost or gained per simulated individual entering screening. Morality risk is either caused by screentest (EUS) or by treatment (surgery after positive screentest). Abbreviations: CT, computed tomography; EUS, endoscopic ultrasound; HGD, high grade dysplasia; MRI, magnetic resonance imaging; Neg., negative; PanIN, Pancreatic Intraepithelial Neoplasia; PC, pancreatic cancer; Pos., positive; RR, relative risk; SB-IPMN, Side Branch—Intraductal Papillary Mucinous Neoplasm; Sens., sensitivity; Spec., specificity. aEffect on life expectancy for men and women. Note: The effect on LE is visible in days lost or gained per simulated individual entering screening. Morality risk is either caused by screentest (EUS) or by treatment (surgery after positive screentest). Abbreviations: CT, computed tomography; EUS, endoscopic ultrasound; HGD, high grade dysplasia; MRI, magnetic resonance imaging; Neg., negative; PanIN, Pancreatic Intraepithelial Neoplasia; PC, pancreatic cancer; Pos., positive; RR, relative risk; SB-IPMN, Side Branch—Intraductal Papillary Mucinous Note: The effect on LE is visible in days lost or gained per simulated individual entering screening. Morality risk is either caused by screentest (EUS) or by treatment (surgery after positive screentest). Note: The effect on LE is visible in days lost or gained per simulated individual entering screening. Morality risk is either caused by screentest (EUS) or by treatment (surgery after positive screentest) cLYG are presented in years per patient in ranges correlated with cyst size (1 cm less gain, 3 cm, more gain in LE). comorbidity levels.17 For healthy men and women, the LE benefit was 161 and 195 days, respectively. In 80-year-old individuals with severe comorbidity, surveillance had less effect on LE (36 days). 3.2 | Screening in a high-risk population No PanIN) One time 50 1 3.9 to 5.8 10 Annual 50 1 12.9 to 1.3 RR 6.4/life time risk 7.5% MRI (sens. 56%, spec. 97%, for detection of cyst and early stage PC. No PanIN) One time 50 1 9.1 10 Annual (50– 80) 50 1 20.6 MRI + EUS (sens. per disease stage [60–99%], spec. 90%) Annual 50 3 120.4-158.4b 13 MRI + EUS (sens. per disease stage [60-99%], spec. 90%) 5-yearly 50 3 48.6-90.4b RR 12 (PC life time risk 18%) EUS (sens. 90%, for detection of pancreatic dysplasia) One time 50 3 138.7 12 RR 30-32 MRI (sens. 56%, spec. 97%, for detection of cyst and early stage PC. No PanIN) One time 50 1 31.5 10 2 65 to 71a 9 Annual 50 1 260 10 RR 70 MRI (sens. 56%, spec. 97%, for detection of early stage PC) One time 50 2 160 to 181a 9 PC Hypothetical screening reducing stage III/IV cancer with 20% NA NA NA 54.7 16 Hypothetical screening reducing stage III/IV cancer with 30% NA NA NA 82.1 Hypothetical screening reducing stage III/IV cancer with 50% NA NA NA 152 6 KOOPMANN ET AL. 10970215, 0, Downloaded from https://onlinelibrary.wiley.com/doi/10.1002/ijc.34379 by Erasmus University Rotterdam Universiteitsbibliotheek, Wiley Online Library on [27/01/2023]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Com 10970215, 0, Downloaded from https://onlinelibrary.wiley.com/doi/10.1002/ijc.34379 by Erasmus University Rotterdam Universiteitsbibliotheek, Wiley KOOPMANN ET AL. TABLE 3 Effect of different PC screening strategies on life expectancy /onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License TABLE 3 (Continued) Pancreatic cyst Test mortality (%) Cyst (1-3 cmc) CT/MRI (Detecting HGD + PC. Probability true pos. = 0.80, true neg. = 0.99) Annual 65 0 17 to 439 15 75 0 9 to 50 85 0 3 to 54 EUS ± FNA (Detecting HGD + PC. Probability true pos. = 0.86, true neg. = 0.99) Annual 65 0.01 18 to 445 75 0.01 10 to 55 85 0.01 4 to 59 SB-IPMN Imaging Annual 60 0 161 to 195 17 80 0 69 Note: The effect on LE is visible in days lost or gained per simulated individual entering screening. Morality risk is either caused by screentest (EUS) or by treatment (surgery after positive screentest). 3.3 | lesions Two studies evaluated the effect of screening in individuals with pan- creatic cysts.15,17 Weinberg et al evaluated the effect of annual screening with computed tomography (CT)/MRI or endoscopic ultra- sound (EUS) in patients with different size cystic lesions suggestive of Side Branch—Intraductal Papillary Mucinous Neoplasm (SB-IPMN), specifically in the pancreatic head. Their results show that the effect on LE was larger when screening started at age 65, as compared to starting at 75 or 85, both for CT/MRI and EUS screening. The effect on LE increased with cyst size. In case of annual screening with CT starting at age 65, a gain of 17 days was achieved for cystic lesions of 1 cm. If the cystic lesion was 3 cm, the LE gain for the same screening scenario was 439 days per screened individual. When individuals aged 85 received annual screening with CT, the average LE gain was 3 days in case of a 1 cm cystic lesion and 54 days in case of a 3-cm cyst. Sim- ilar results were seen for screening with EUS (Table 3). The second study evaluated the maximum effect of surveillance in the general population with a hypothetical perfect test for pancre- atic intraepithelial neoplasia (PanIN).11 When a 2% treatment mortal- ity was considered, one time screening improved LE by a mere 6.7 to 9.3 days per screened individual. In the hypothetical optimal scenario where screening with this perfect test was continuous (eg, daily), a 40-day gain in LE was found for each simulated individual. 3.2 | Screening in a high-risk population Abbreviations: CT, computed tomography; EUS, endoscopic ultrasound; HGD, high grade dysplasia; MRI, magnetic resonance imaging; Neg., negative; PanIN, Pancreatic Intraepithelial Neoplasia; PC, pancreatic cancer; Pos., positive; RR, relative risk; SB-IPMN, Side Branch—Intraductal Papillary Mucinous Neoplasm; Sens., sensitivity; Spec., specificity. aEffect on life expectancy for men and women. bIn this model two pathways are simulated, one with only progressive lesions and one with indolent and faster progressive lesions. A larger effect on LE was seen in the progressive-only pathway. cLYG are presented in years per patient in ranges correlated with cyst size (1 cm less gain, 3 cm, more gain in LE). KOOPMANN ET AL. 7 TABLE 3 (Continued) Pancreatic cyst Test mortality (%) Cyst (1-3 cmc) CT/MRI (Detecting HGD + PC. Probability true pos. = 0.80, true neg. = 0.99) Annual 65 0 17 to 439 15 75 0 9 to 50 85 0 3 to 54 EUS ± FNA (Detecting HGD + PC. Probability true pos. = 0.86, true neg. = 0.99) Annual 65 0.01 18 to 445 75 0.01 10 to 55 85 0.01 4 to 59 SB-IPMN Imaging Annual 60 0 161 to 195 17 80 0 69 Note: The effect on LE is visible in days lost or gained per simulated individual entering screening. Morality risk is either caused by screentest (EUS) or by t t t ( ft iti t t) KOOPMANN ET AL. 7 KOOPMANN ET AL. | Screening individuals with pancreatic cystic s 3.3 | lesions 4 | DISCUSSION This systematic review evaluates model-based analyses on the effect of PC screening on LE. PC screening in the general population led to decreased LE in most analyses, as screening benefits were out- weighed by false positive tests and surgical mortality risks. For higher- risk individuals, screening was more beneficial, but this conclusion strongly depends on model assumptions such as test characteristics. The effect of surveillance on LE seemed small in the slightly increased risk group (RR < 4.5). However, in this analysis, an unrealistic low test sensitivity (56%) for HGD/early stage PC were used in this analysis. As a result, these predictions likely underestimate the potential effect of screening. In individuals at higher risk (RR 6.4-60, eg, CDKN2A), both annual and one-time screening improved LE, even with a poor screening test. Although most papers were based on outdated and unrealistic assumptions, they do show that PC screening can be worthwhile. In the future, predictions from these models will improve when they are updated with reliable input data from ongoing long- term studies. Also, the use of a composite sensitivity for the detection of both HGD and early stage PDAC is a limitation. Overbeek et al published results of PC screening in high risk individuals, and showed that none of the 14 resected lesions harbored HGD. This shows how difficult detection of HGD is and that using the sensitivity for PDAC likely overestimates test performance for HGD. Ideally, each detected lesion on imaging is pathologically con- firmed. However, a lesion without worrisome features on imaging is not resected, and thus no pathological confirmation is available. In surveillance studies, only resected lesions can be compared head-to- head, causing selection bias. In higher-risk individuals (RR: 30), the expected median LE gain of 260 days for annual PC screening seems worthwhile. In comparison, colorectal cancer screening with an annual FIT test in the general pop- ulation is estimated to increase LE by 89 days per screened individ- ual.18 For lung cancer, 30 days are gained by annual screening with a low dose CT of 50 to 75-year old males who smoke.19 One model evaluated the effect of a hypothetical test that detects all PanIN3 lesions. Under this ideal (but for now unrealistic) assumption, one-time PC screening led to a LE gain, even in the general population, although that gain was still low compared to other cancer screening programs. | Risk of bias Especially in the field of PC, where data are scarce and evidence is based on small studies, the risk of bias regarding input or target data is relatively high. Figure 2 provides an overview of the risk of bias of Raphel et al evaluated the effect of surveillance in patients with SB-IPMN and analyzed the effect on LE for individuals with different the included articles per item. Bias assessment per study is available in the Supplementary Materials (Data S1). 0% 20% 40% 60% 80% 100% Validation Design Data Analysis Reporting Interpretation Conflict of interest Risk of Bias Low risk Moderate risk High risk FIGURE 2 Risk of bias 8 KOOPMANN ET AL. 8 0% 20% 40% 60% 80% 100% Validation Design Data Analysis Reporting Interpretation Conflict of interest Risk of Bias Low risk Moderate risk High risk adenomas.12,15 Distinct precursor types such as IPMN and PanIN, that can progress from LGD to HGD into cancer, were not defined. The models that did simulate both precursors in separate pathways assumed that 90% of PC developed from PanIN and 10% from cystic lesions.9-11 If the proportion of cyst derived cancers is actually higher, as some studies indicate,20-22 these models would also underestimate the efficacy of screening. Input on cyst prevalence is needed to simulate a population at (increased) risk for pancreatic precursor lesions and PC.9-11,13 The reported cyst prevalence in the general population varies from 2.6% to 55%. This range is caused by differences in imaging techniques, populations and cyst definition (size and type). Pandharipande et al used an imaging based cyst prevalence of 4.6% at age 50 as a calibra- tion target. An increased cyst prevalence was assumed in the models that simulated a higher risk group, as is consistent with literature.23,24 the included articles per item. Bias assessment per study is available in the Supplementary Materials (Data S1). the included articles per item. Bias assessment per study is available in the Supplementary Materials (Data S1). Next to differences in natural history, the models incorporated different screen scenarios and assumed different screen tests charac- teristics. Test sensitivity for cystic lesions and PC varied from 56% to 99%. Also, most models used the same sensitivity for all disease stages, which is unrealistic. Pandharipande et al assumed a sensitivity of 56% for both cystic lesions and early stage cancer. | Risk of bias When we evalu- ate more recent publications on PC screening in high risk individuals, a sensitivity of 70% to 75% for HGD/early stage cancer seems more realistic.23,25,26 A lower test sensitivity leads to an underestimation of the screening effect. However, with frequent screening, the effect of test sensitivity on life years saved is relatively small.13 4 | DISCUSSION As the majority of LGD cysts will never progress to PC (given the high cyst prevalence and low PC incidence), the impact of a resected LGD cyst on life expectancy will be low and possibly negative because of treatment complications. Trials also show that patients with early detected and resected PC still have a limited life expectancy.23 The 5 year survival rate of T1 patients was reported to be 30.6%.32 For future research, focus should therefore lay on the detection and treatment of HGD precursor lesions. The detection of early stage cancer, even with annual screening, seems challenging and screen detected early stage PC remains associated with a decreased LE. The simulated screening strategies vary from one time to annual, to 5-yearly screening. Multiple studies evaluate the effect of one time screening at age 50. The relevance of this strategy is questionable given the PC peak incidence at age 60 to 70 years. However, the rele- vance also depends on duration of disease stages and test characteris- tics. One time screening at age 60 or 65 would be an interesting alternative scenario to study. Unfortunately, current screen tests are underperforming in the detection of high-grade dysplastic precursor lesions. Despite the exis- tence of multiple risk prediction tools, it remains difficult to classify cysts and determine their grade of dysplasia correctly, based on imag- ing.27 Also, test specificity for PanIN lesions is nowhere near 97%, while this lesion is believed to account for 50% to 90% of all PC. Thus, it is important to search for new and better screen tests. In this regard biomarkers hold promise, not only to detect early cancer, but also to search for timely identification of (high grade dysplastic) precursor lesions.33 Assumed treatment mortality varied from 0% to 10%. Recent lit- erature shows a mortality risk of 1% to 3% for a Whipple procedure and 1% to 2% for pancreatic tail resections.28,29 Thus, the study that assumed a 10% treatment mortality may have overestimated the harms of screening, resulting in an even larger loss in LE. Finally, of the models that evaluated PC screening in high-risk individuals, only one accounted for the increased risk to die from other prevalent malignancies in mutation carriers.10 The assumption that high-risk individuals have an average probability to die of other causes in the other models seems inappropriate and leads to an over- estimation of life-years gained. 4 | DISCUSSION However, in clinical practice, we fail to detect PanIN lesions with current imaging modalities, let alone determine their dysplastic grade. However, this unrealistic scenario provides useful information on the upper limit of effective- ness of screening, and the maximal benefit in life expectancy it can provide. However, LE gain is not the only parameter to determine effec- tiveness of a screening program. Other factors, such as impact on quality of life, but also harms and costs should be considered. More- over, morbidity associated with the screening methodology or the sur- gical treatment (pancreatic fistula, exocrine pancreatic insufficiency and diabetes) was not taken into account in most studies, although this is highly relevant. It is very difficult to distinguish low from high grade dysplasia, based on imaging. Although cyst characteristics can give some guid- ance, a discrepancy between the imaging based diagnosis, and the true pathological state is observed.27 In the model of Pandharipande et al,9 the proportion of high-risk cystic lesions was estimated using a proxy as a calibration target: the proportion of patients with cysts The effect of screening on LE varies within the models because of different model assumptions, for instance on the natural history. In two models, PC could only evolve from “pancreatic dysplasia” or 10970215, 0, Downloaded from https://onlinelibrary.wiley.com/doi/10.1002/ijc.34379 by Erasmus University Rotterdam Universiteitsbibliothe 9 KOOPMANN ET AL. who underwent subsequent pancreatic surgery was considered “high- risk” (5/84). However, as we know from surgical series, not nearly all individuals with high-risk features harbor actual high-grade dysplasia or PC. A large meta-analysis showed a pooled sensitivity of 0.67 (95% Confidence Interval [CI] 0.64-0.70) and a specificity of 0.64 (95% CI 0.62-0.66) for the Fukuoka guideline to detect advanced neoplasia (HGD or PC). Similar results were seen for the American Gastroenter- ological Association (AGA) guideline (pooled sensitivity of 0.59 [95% CI 0.52-0.65] and specificity of 0.77 [95% CI 0.74-0.80]).27 The effect of PC screening in ongoing clinical trials is mainly based on early detection of cancer rather than resection of HGD cyst, as published data shows that the number of resected HGD lesions is low (n = 0,31 n = 0,23 n = 1025). Precursor lesions that have been resected were mainly LGD. 4 | DISCUSSION Importantly, mathematical models use observational data to simulate disease progression and evaluate effects of screening. Compared to other cancer models, observational PC data on the natural history and test characteristics are scant. This is a source for bias and may hamper the reliability of decision-analytic models. In conclusion, even though most included papers used out- dated and unrealistic assumptions, our study shows that screening can be effective in high-risk individuals. The extend of this effect depends on PC risk, test characteristics and screen frequency. Long lasting clinical trials are needed to gain more insight in the natural history of PC and the true test sensitivity by disease stage. Such input data will improve the predictive performance of PC screening models. Despite these limitations, the results of this systematic review on PC screening are important for clinical practice and future research. They show the potential and limitations of screening on LE in different PC risk groups and emphasize the importance of selecting the right pop- ulation for screening and the need for better screening tests to correctly identify and classify pancreatic precursor lesions. Especially for PanIN lesions, there is a lot to gain. For a screening program to be successful, given the current screening tests, the focus should be on individuals from the highest risk groups. Consensus guidelines advice screening for individuals with a 5% life time risk for PC.30 This PC risk greatly depends on test characteristics. Future model updates, based on more reliable input data from large and long-term studies should focus on establishing this. ACKNOWLEDGEMENTS Screening is always associated with lead and length-time bias. In this review, only one study reported on this.16 They estimated a lead- time bias of 23 to 64 days, which has considerable impact, given the short survival. They corrected for this bias by using the tumor volume doubling time, after which the NNS encompassed the harmful thresh- old. Other studies evaluating the effect of PC screening did not account for this bias. Thus, the true effect of surveillance in these groups is even smaller. The authors wish to thank Wichor Bramer from the Erasmus MC Medical Library for developing and updating the search strategies. AUTHOR CONTRIBUTIONS Brechtje D. M. Koopmann: Conceptualization, data curation, formal analysis, methodology, writing original draft. Amir-Houshang Omid- vari: Data curation, formal analysis, methodology, writing original draft. Iris Lansdorp-Vogelaar: Supervision, review & editing. Djuna L. Cahen: Funding, supervision, review & editing. Marco J. Bruno: Funding, supervision, review & editing. Inge M. C. M. de Kok: Fund- ing, Methodology, supervision, review & editing. The work reported in the paper has been performed by the authors, unless clearly specified in the text. REFERENCES 19. Du YSG, Heuvelmans MA, Groen HJM, Vermeulen KM, Greuter MJW, de Bock GH. Cost-effectiveness of lung cancer screen- ing with low-dose computed tomography in heavy smokers: a micro- simulation modelling study. Eur J Cancer. 2020;135:121-129. 1. Huang LJL, Balavarca Y, Molina-Montes E, et al. Resection of pancre- atic cancer in Europe and USA: an international large-scale study highlighting large variations. Gut. 2020;69(1):7-17. 2019 Jan;68(1): 130-139. 1. Huang LJL, Balavarca Y, Molina-Montes E, et al. Resection of pancre- atic cancer in Europe and USA: an international large-scale study highlighting large variations. Gut. 2020;69(1):7-17. 2019 Jan;68(1): 130-139. 20. Poultsides GARS, Cameron JL, Hruban RH, et al. Histopathologic basis for the favorable survival after resection of intraductal papillary mucinous neoplasm-associated invasive adenocarcinoma of the pan- creas. Ann Surg. 2010;251(3):470-476. 2. Kuntz K, Sainfort F, Butler M, et al. Decision and Simulation Modeling in Systematic Reviews [Internet]. Rockville, MD: Agency for Healthcare Research and Quality (US); 2013. 21. Makohon-Moore APMK, Zhang M, Reiter JG, et al. Precancerous neoplastic cells can move through the pancreatic ductal system. Nature. 2018;561(7722):201-205. 3. Geuzinge HA, Obdeijn IM, Rutgers EJT, et al. Cost-effectiveness of breast cancer screening with magnetic resonance imaging for women at familial risk. JAMA Oncol. 2020;6(9):1381-1389. 22. McGinnis TBL, Madan R, Dandawate P, et al. Survival outcomes of pancreatic intraepithelial neoplasm (PanIN) versus intraductal papil- lary mucinous neoplasm (IPMN) associated pancreatic adenocarci- noma. J Clin Med. 2020;9(10):3102. 4. de Kok IM, van Rosmalen J, Dillner J, et al. Primary screening for human papillomavirus compared with cytology screening for cervical cancer in European settings: cost effectiveness analysis based on a Dutch microsimulation model. BMJ. 2012;344:e670. 23. Overbeek KALI, Koopmann BDM, Harinck F, et al. Long-term yield of pancreatic cancer surveillance in high-risk individuals. Gut. 2022; 71(6):1152-1160. 5. Ten Haaf K, van Rosmalen J, de Koning HJ. Lung cancer detectability by test, histology, stage, and gender: estimates from the NLST and the PLCO trials. Cancer Epidemiol Biomarkers Prev. 2015;24(1): 154-161. 5. Ten Haaf K, van Rosmalen J, de Koning HJ. Lung cancer detectability by test, histology, stage, and gender: estimates from the NLST and the PLCO trials. Cancer Epidemiol Biomarkers Prev. 2015;24(1): 154-161. 24. Canto MIHR, Fishman EK, Kamel IR, et al. Frequent detection of pan- creatic lesions in asymptomatic high-risk individuals. Gastroenterology. 2012;142(4):796-804. 6. Lansdorp-Vogelaar I. Effect of Rising Chemotherapy Costs on the Cost Savings of Colorectal Cancer Screening; 2009. http://academic.oup. com. Accessed September 24, 2009. ORCID Brechtje D. M. Koopmann https://orcid.org/0000-0001-5025-5050 Amir-Houshang Omidvari https://orcid.org/0000-0002-5005-8038 Iris Lansdorp-Vogelaar https://orcid.org/0000-0002-9438-2753 Djuna L. Cahen https://orcid.org/0000-0001-6753-4857 Marco J. Bruno https://orcid.org/0000-0001-9181-5499 Inge M. C. M. de Kok https://orcid.org/0000-0002-9419-0452 Brechtje D. M. Koopmann https://orcid.org/0000-0001-5025-5050 Amir-Houshang Omidvari https://orcid.org/0000-0002-5005-8038 Iris Lansdorp-Vogelaar https://orcid.org/0000-0002-9438-2753 Djuna L. Cahen https://orcid.org/0000-0001-6753-4857 Marco J. Bruno https://orcid.org/0000-0001-9181-5499 Inge M. C. M. de Kok https://orcid.org/0000-0002-9419-0452 17. Raphel TJWD, Berland LL, Herts BR, Megibow AJ, Knudsen AB, Pandharipande PV. Imaging follow-up of low-risk incidental pancreas and kidney findings: effects of patient age and comorbidity on pro- jected life expectancy. Radiology. 2018;287(2):504-514. 18. Knudsen ABZA, Rutter CM, Naber SK, et al. Estimation of benefits, burden, and harms of colorectal cancer screening strategies: modeling study for the US Preventive Services Task Force. JAMA. 2016; 315(23):2595-2609. doi:10.1001/jama.2016.6828 FUNDING INFORMATION Brechtje D. M. Koopmann, Djuna L. Cahen, Marco J. Bruno and Inge M. C. M. de Kok received funding from the MLDS (nongovernmental organization, national gastrointestinal disease association, nonprofit). 10 KOOPMANN ET AL. Brechtje D. M. Koopmann, Amir-Houshang Omidvari, Iris Lansdorp- Vogelaar, Djuna L. Cahen, Marco J. Bruno and Inge M. C. M. de Kok have nothing to disclose. 10. Pandharipande PV, Jeon A, Heberle CR, et al. Screening for pancreatic adenocarcinoma in BRCA2 mutation carriers: results of a disease sim- ulation model. EBioMedicine. 2015;2(12):1980-1986. 11. Peters MLB, Eckel A, Mueller PP, et al. Progression to pancreatic duc- tal adenocarcinoma from pancreatic intraepithelial neoplasia: results of a simulation model. Pancreatology. 2018;18(8):928-934. CONFLICT OF INTEREST 12. Rulyak SJ, Kimmey MB, Veenstra DL. Cost-Effectiveness of Pancreatic Cancer Screening in Familial Pancreatic Cancer Kindreds. Elsevier; 2003;57(1):23-9. doi:10.1067/mge.2003.28. The authors declare no potential conflict of interests. The authors declare no potential conflict of interests. DATA AVAILABILITY STATEMENT 13. Koopmann BDM, Harinck F, Kroep S, et al. Identifying key factors for the effectiveness of pancreatic cancer screening: a model-based anal- ysis. Int J Cancer. 2021;149(2):337-346. All data used in this systematic review is available in the original papers that were included. 14. Jaime Caro JED, Kan H, Kaltz C, et al. Questionnaire to assess rele- vance and credibility of modeling studies for informing health care decision making: an ISPOR-AMCP-NPC good practice task force report. Value Health. 2014;17(2):174-182. ETHICS STATEMENT No ethical approval was needed for this systematic review because data from previous published modeling studies with simulated individ- uals was retrieved and analyzed. 15. Weinberg BM, Spiegel BM, Tomlinson JS, Farrell JJ. Asymptomatic pancre- atic cystic neoplasms: maximizing survival and quality of life using Markov- based clinical nomograms. Gastroenterology. 2010;138(2):531-540. 16. Cucchetti A, Ercolani G, Cescon M, et al. Estimation of the survival benefit obtainable from screening for the early detection of pancre- atic cancer. Pancreas. 2016;45(5):714-719. REFERENCES 25. Canto MIKT, Yeo CJ, Hruban RH, et al. Surgical outcomes after pan- creatic resection of screening-detected lesions in individuals at high risk for developing pancreatic cancer. J Gastrointest Surg. 2020;24(5): 1101-1110. 7. Toes-Zoutendijk E vLM, Dekker E, van Hees F, et al. Real-time monitoring of results during first year of Dutch colorectal cancer screening program and optimization by altering fecal imm- unochemical test cut-off levels. Gastroenterology. 2017;152(4): 767-775.e2. 26. Vasen H II, Ponce CG, Slater EP, et al. Benefit of surveillance for pan- creatic cancer in high-risk individuals: outcome of long-term prospec- tive follow-up studies from three European expert centers. J Clin Oncol. 2016;34(17):2010-2019. 8. Kooyker AIT-ZE, Opstal-van Winden AWJ, Spaander MCW, et al. The second round of the Dutch colorectal cancer screening program: impact of an increased fecal immunochemical test cut-off level on yield of screening. Int J Cancer. 2020;147(4): 1098-1106. 27. Wu JWY, Li Z, Miao H. Accuracy of Fukuoka and American Gastroen- terological Association guidelines for predicting advanced neoplasia in pancreatic cyst neoplasm: a meta-analysis. Ann Surg Oncol. 2019; 26(13):4522-4536. 9. Pandharipande PV, Heberle C, Dowling EC, et al. Targeted screening of individuals at high risk for pancreatic cancer: results of a simulation model. Radiology. 2015;275(1):177-187. 28. Peluso H, Abougergi M, Mrad C, Jones W. The incidence, risk factors and impact of 30-day readmission after Whipple procedure KOOPMANN ET AL. for pancreatic cancer on mortality and healthcare resource utilization: a nationwide analysis. Am J Gastroenterol. 2017;112- (October):S22. 33. Tanaka MHM, Liu B, Heger U, Hackert T, Michalski CW. Cytologic analysis of pancreatic juice increases specificity of detection of malignant IPMN—a systematic review. Clin Gastroenterol Hepatol. 2019;17(11):2199-2211.e21. 29. Cardini B, Primavesi F, Maglione M, et al. Outcomes following pancre- atic resections—results and challenges of an Austrian university hos- pital compared to nationwide data and international centres. Eur Surg. 2019;51:81-89. SUPPORTING INFORMATION 30. Goggins MOK, Brand R, Syngal S, et al. International cancer of the pancreas screening (CAPS) consortium. Management of patients with increased risk for familial pancreatic cancer: updated recommenda- tions from the international cancer of the pancreas screening (CAPS) Consortium. Gut. 2020;69(1):7-17. Additional supporting information can be found online in the Support- ing Information section at the end of this article. How to cite this article: Koopmann BDM, Omidvari A-H, Lansdorp-Vogelaar I, Cahen DL, Bruno MJ, de Kok IMCM. The impact of pancreatic cancer screening on life expectancy: A systematic review of modeling studies. Int J Cancer. 2022; 1‐11. doi:10.1002/ijc.34379 31. Klatte DCFBB, Wasser MNJM, Feshtali Shahbazi S, et al. Pancreatic cancer surveillance in carriers of a germline CDKN2A pathogenic variant: yield and outcomes of a 20-year prospective follow-up. J Clin Oncol. 2022;40:3267-3277. 32. Kwon WPT, He J, Higuchi R, et al. Is the new T1 category as defined in the eighth edition of the AJCC pancreatic cancer staging system an improvement? J Gastrointest Surg. 2020; Feb;24(2):262-269.
https://openalex.org/W4294397970
https://www.nature.com/articles/s41598-022-19430-y.pdf
English
null
Miniaturized antenna verified with diffuse optical measurements for native and boiled adipose tissue differentiation
Scientific reports
2,022
cc-by
6,395
Ashraf S. Abdel Halim1, Mohanad Mostafa1 & Omnia Hamdy2* Ashraf S. Abdel Halim1, Mohanad Mostafa1 & Omnia Hamdy2* Medical industries are continuously working towards the development of wearable theragnostic devices which enable monitoring various ailments in the body and then transmitting them to the base-station. The antenna design is of prime importance where the suitable design guarantees proper communication between the antenna and the base-station. In this paper, a co-planar wave-guide antenna is proposed for the use in the medical implant communication service (MICS) band for data transmission. The proposed antenna is studied for ex-vivo applications where the antenna is simulated for bovine intramuscular fat (adipose tissue). The preliminary results showed that the antenna radiates in MICS band. Two types of samples are tested; namely, native fat and boiled fat. The boiled fat is used in order to represent the infected fat tissue. Hence, the antenna was implanted into the fat samples and the results revealed noticeable variations in the radiation characteristics between native and boiled fat. Different parameters of the proposed antenna including the reflection coefficient ­(S11), radiation patterns, gain, efficiency, and front-to-back ratio are investigated. The simulations showed that ­S11 parameter was − 12.4 dB in MICS band for the normal fat. On the other hand, the measured ­S11 values were − 12.3 dB for the native samples and − 9.9 dB for the boiled fat samples. To assert the variation in the biological characteristics of the boiled fat as compared to those of the native fat, diffuse optical measurements of the examined samples were investigated. Such variation in the light scattering and absorbance by the tissue is responsible for varying the ­S11 parameter for each case. The results have shown that the proposed design is a good candidate for detecting the change in biological tissue. Biomedical antenna has been developed in 1960s by Medtronic, ­USA1 as a battery powered device. Nowadays, antenna in medical applications provides a virtual environment that has the ability to stimulate and monitor the function of various body ­organs2. The antenna wirelessly transfers information about glucose level, body tem- perature, pH, and cardiac pressure to a certain receiver (e.g., base-stations in medical centers) via links named “bio-telemetry”3–5. The design of the antenna depends on the industrial, scientific and medical (ISM) band for medical telemetry operations. www.nature.com/scientificreports www.nature.com/scientificreports Ashraf S. Abdel Halim1, Mohanad Mostafa1 & Omnia Hamdy2* Nonetheless, a recent medical implant communication service (MICS) band (402–405 MHz) has been allocated which is regulated by the United States federal communications commission and the European radio communications committee for bi-directional bio-telemetry ­operations6.h p y p The MICS band permits low noise propagation through human body that makes it suitable for low power implanted device ­circuits7. The wavelength for free space is 74 cm in the med radio whereas it is around 12 cm in the ISM ­bands8. Accordingly, there is a need to miniaturize the antenna to be implanted inside the human body considering the biocompatibility properties and other related parameters such as gain, SAR, bandwidth, and directivity. Studying the miniaturized antenna and its radiation characteristics has started since decades. The size of the antenna was directly proportional to the radiation power factor, the total efficiency, and the antenna ­bandwidth7. Later on, different miniaturization techniques has been proposed including the use of high permittivity dielectric substrate, lengthening the current flow path on the patch surface, and inserting shorted pins between the ground and the patch plane. The latter results in developing antennas of relatively small effec- tive ­size9. 1Department of Communication, Faculty of Engineering, Canadian International College (CIC), Cairo, Egypt. 2Department of Engineering Applications of Lasers, National Institute of Laser Enhanced Sciences, Cairo University, Giza, Egypt. *email: omnia@niles.cu.edu.eg Scientific Reports | (2022) 12:15035 | https://doi.org/10.1038/s41598-022-19430-y www.nature.com/scientificreports/ Table 1. Performance comparison between the proposed antenna and the relevant literature. Ref Antenna dimension ­(mm3) Resonant Freq. (GHz) BW (MHz) Gain (dBi) SAR W/Kg Test tissue 35 57 0.402 38.6  − 30.8 289 Minced pork 38 10 × 10 × 2.54 0.402 115  − 7 341 Pork 39 20.5 × 30 × 0.05 0.402 3.73  − 32 513.7 Deep tissue 40 7 × 6.5 × 0.377 0.402 36.8  − 30.5 588 Skin layer 41 22 × 23 × 1.27 0.402 30  − 36.7 832 Skin-mimicking material 42 14 × 7.5 × 0.5 0.405 64  − 40.85 665.35 Scalp (realistic human phantom) This work 14 × 14 × 0.76 0.454 0.23  − 10 50 Fat Table 1. Performance comparison between the proposed antenna and the relevant literature. Since the signal is highly attenuated within the human body, the near-field effect of antenna causes an increase in the temperature of neighboring tissues. Higher frequency operation also causes similar effect. Ashraf S. Abdel Halim1, Mohanad Mostafa1 & Omnia Hamdy2* This may be useful for some therapeutic applications yet shows a negative impact on ­communication7. Utilizing meandered antennas has solved such problem. The meandered structure can miniaturize the size of the antenna and keep the same radiation properties for an implantable ­antenna8. p p p Micro-strip (or patch) antennas have the advantages of being low cost, light weight, compact size and easy fabrication. However, a typical micro-strip antenna has a relatively narrow ­bandwidth10. Therefore, various techniques to enhance the bandwidth of patch antennas have been proposed including substrate-integrated sus- pended-line ­technique11, slotted ­patch12,13, adding ­stubs14,15, proximity coupled ­technique16, and cutting ­edges17. Also, the use of rectangular-shaped coplanar waveguide (CPW) fed printed antennas provides wider bandwidths necessary for wireless and wearable ­applications18–21. Additionally, to increase the gain of the antenna, several advancements are used such as artificial magnetic conductors (AMCs)22, ­metamaterials23 or a horn ­reflector24. i gl Various designs of wireless antennas were developed based on the use of rigid substrates such as FR4 as reported ­in25–27. Nevertheless, for implanting purpose, the design of efficient antennas requires the use of flex- ible substrates which have the ability to be incorporated with shapes of irregular ­surfaces28. Example of these flexible substrate are ­kapton29, liquid crystal polymer (LCP)30, Rogers RT/duroid31, cotton ­layer32, polyethylene terephthalate (PET) ­film33, and ­paper34. A flexible material such as Rogers ULTRALAM has been utilized for multiband conformal implantable antenna fabrication which is utilized in ingestible capsule endoscope and biotelemetry ­applications35. Moreover, antennas can be designed in different shapes including flat and capsule shapes. The capsule antennas are suitable for deep tissue implantation such as intestine, stomach and heart, while the flat type is used for skin (e.g., scalp) ­implantation36,37. Table 1 presents a comparison between the proposed antenna performance and the state-of-the-art designs.f p g In the present paper, a micro-strip antenna is designed for monitoring adipose tissue (fat) at two different conditions (native and boiled). The antenna is designed in a simple double layered meandered structure. The different antenna parameters are evaluated at each tissue condition. The proposed antenna radiates near the MICS band for data transmission related to patient monitoring. Additionally, diffuse reflectance and transmittance of the examined samples were measured at four laser wavelengths (532, 660, 780 and 980 nm) using integrating sphere-based optical setup to emphasize the difference in tissue properties at each condition, which in turn results in varying the reflection coefficient ­(S11). Antenna design Design process. g Design process. A compact antenna of dimensions of 0.116 λ0 × 0.116 λ0 × 0.006 λ0 with respect to the reso- nant frequency is proposed in the current study. The simulations are performed using a commercial simula- tion software (High-Frequency Structure Simulator Technology (HFSS)). The design is applied on a dielectric substrate Rogers 3210 (dielectric constant = 10.5) to achieve the required characteristics. This substrate has a thickness of 0.76 mm and a loss tangent of 0.0027. It should be noted that the design is primarily based on the meander patch antenna. Figure 1 presents the meander patch antenna. Moreover, the dimensions of the pro- posed antenna are listed in Table 2.hih p The first step in the design process is to identify the medium. The proposed antenna is designed to test fat tissue which has dispersive electromagnetic characteristics. The antenna design achieved the 50-Ω excitation in both cases. Figure 2 shows the simulation model in case of fat as a medium. As shown in Fig. 2, the antenna is sandwiched between two layers of fat. The preliminary simulation results for the native fat tissue shows that the resonance frequency achieved by our proposed antenna is 513 MHz. Design approach. The proposed antenna consists of three layers. The first layer is a ground sheet connected with the patch through the pin. The second layer is the substrate which is divided into two layers that sandwiches the patch (the third layer) between them (see Fig. 3).hh p y g The patch layer of the antenna is attached at the top right corner with SMA connector pin. This layer also includes meander tailored resonators and a capacitive coupler ­gap43. The proposed design aims to elongate the current path. The meander structure is bent to decrease the length and increase stiffness of the antenna. A superstrate is usually added to avoid the short circuit between patch and substrate. Therefore, this eliminates the patch to function as a radiating element. Nevertheless, in our proposed design, there is no need to use a https://doi.org/10.1038/s41598-022-19430-y Scientific Reports | (2022) 12:15035 | www.nature.com/scientificreports/ www.nature.com/scientificreports/ Figure 1. The proposed antenna configuration and dimensions. Table 2. Dimensions of the proposed antenna (in mm). Antenna design Design process. A B C D E F G H i J K L M h W P Q R S 12 12 1.7 6.6 1 1.7 1 3.2 1 1 1 14 1.7 0.76 14 0.8 0.5 1.2 5 Figure 2. The simulation of the measurement setup in fat. Figure 1. The proposed antenna configuration and dimensions. Figure 1. The proposed antenna configuration and dimensions. Table 2. Dimensions of the proposed antenna (in mm). Figure 2. The simulation of the measurement setup in fat. Figure 2. The simulation of the measurement setup in fat. Figure 2. The simulation of the measurement setup in fat. superstrate due to the poor conductivity of fat material (0.102 S/m). Table 3 represents fat parameters in the resonance frequency. The manufacturing and measurements were performed in the National Telecommunica- tion Institute (NTI), Cairo, Egypt.f superstrate due to the poor conductivity of fat material (0.102 S/m). Table 3 represents fat parameters in the resonance frequency. The manufacturing and measurements were performed in the National Telecommunica- tion Institute (NTI), Cairo, Egypt.f Indeed, the microstructural and macroscopic properties of boiled fat are relatively different from the native ­one44. Once the fat is heated, adipose tissue (fat) is liberated from the adipocytes (a cell in connective tissue that is specialized for the fat storage) and its oxidation ­increases45. Accordingly, the electrical conductivity of the fat tissue increases as the temperature increases while decreases if its structure ­changes46. The current distribution. To illustrate the mechanism of operation, the surface current distribution for the proposed antenna is presented in Fig. 4. The current distribution demonstrates that the antenna structure is responsible for producing l dip at 513 MHz as the current concentration along the antenna length. The cur- rent concentrates along the antenna width, patch, and pin. The intensive current indicated by red and a null https://doi.org/10.1038/s41598-022-19430-y Scientific Reports | (2022) 12:15035 | www.nature.com/scientificreports/ Figure 3. The common design approach of meander antenna. Table 3. Fats parameters in the resonance frequency. Tissue Conductivity Relative permittivity Loss tangent Wavelength Penetration depth Fat 0.10235 S/m 5.2853 0.14503 0.054193 m 0.11956 m Figure 4. Current distribution of the proposed antenna at MICS band. Fi 3 Th d i h f d t Figure 3. The common design approach of meander antenna. Figure 4. Current distribution of the proposed antenna at MICS band. Figure 4. Current distribution of the proposed antenna at MICS band. Figure 4. Antenna design Design process. Current distribution of the proposed antenna at MICS band. https://doi.org/10.1038/s41598-022-19430-y Scientific Reports | (2022) 12:15035 | www.nature.com/scientificreports/ Figure 5. (a) The implemented optical setup using integrating sphere, (b) schematic of the transmission mode, and (c) schematic of the reflection mode. Figure 5. (a) The implemented optical setup using integrating sphere, (b) schematic of the transmission mode, and (c) schematic of the reflection mode. represented by blue. The figure also illustrates the effective area at which the proposed antenna resonates at the certain frequency. Diffuse optical measurementshl f The optical transmission and reflection resulting from light interaction with biological tissue is named as diffuse because of the multiple scattering events affected the light propagation in ­tissues47. The tissue diffuse reflectance/ transmittance is a representative parameter for each tissue, where they vary according to the tissue condition. Therefore, they can be used in tissue differentiation ­processes48,49. Integrating sphere is a very common device that is used for the ex-vivo measurement of the tissue diffuse reflectance and ­transmittance50,51. It is a hollow spherical cavity coated with highly reflective material to ensure reflection of the whole entering light. In our experiments, Barium sulfate coated mcPHERSON integrating sphere has been used to measure diffuse reflectance/transmit- tance of the native and boiled fat samples. A photo of the experimental setup is presented in Fig. 5a. A typical integrating sphere has multiple ports and locations for placing the sample under investigation. Furthermore, a light detector is used where its location is dependent on the required measurement (tissue transmittance or reflectance) as demonstrated in Fig. 5b,c, respectively. The tissue’s detected diffuse light is then delivered to a compact spectrometer that is connected to a computer for data analysis and processing. In the present work, a digital fiber spectrometer (STDFSM, Touptek Photonics Co. Ltd, Zhejiang China) integrated with a detector (Toshiba TCD1304AP linear CCD array) has been used. Collecting fat samples. Ex-vivo bovine intramuscular fat (adipose tissue) samples have been collected from different butcher shops. There is no direct contact with alive animals in the present study. Therefore, no specific ethical approval is required. The sources of the utilized fat samples (bovines) were already slaughtered for commercial food production and the fat tissues can be considered as disposals or remains. Scientific Reports | (2022) 12:15035 | https://doi.org/10.1038/s41598-022-19430-y www.nature.com/scientificreports/ Figure 6. The measured reflection coefficient (S11) of the three fabricated antennas for native and boiled fat tissues. Figure 6. The measured reflection coefficient (S11) of the three fabricated antennas for native and boiled fat tissues. Results and discussion To evaluate the proposed design, a Rohde&Schwarz ZVB 20 (Vector Network Analyzer, 10 MHz–20 GHz) is used to test the antenna. As previously mentioned, the fat is examined in this study in two cases; normal and infected (the infected was represented by the boiled tissue). For better profess, three similar antennas with the same design and material were fabricated and measured. Figure 6 shows the measured reflection coefficient of each antenna at the two examined tissue conditions.t Photographs of the fabricated antennas before and after immersed in the fat sample is presented in Fig. 7a,b respectively. Moreover, a comparison between the simulated and average measured reflection coefficient ­(S11) for the three antennas is presented in Fig. 7c. Figure 7c illustrates the ­S11 parameter for the three cases; simulations, native tissue and infected tissue (boiled). In the simulations, ­S11 was − 12.4 dB at 0.513 GHz. However, in the case of native fat the ­S11 was − 12.3 dB. In case of infected fat ­S11 changed to − 9.9 dB. In the measurements, both native and infected fat exhibit a frequency shift to the left with respect to that of the simulated value (i.e., 0.454 GHz for the native fat and 0.425 GHz for the infected fat). The observed frequency shift in the three cases is attributed to the non-uniform thickness (structure) of the examined fat tissue samples at the different conditions (native and boiled samples). In addition, the pos- sible fabrication tolerance may lead to the same effect. Table 4 summarizes the results of the proposed antenna. The radiation patterns. The E-plane of the radiation pattern of the proposed antenna ­(Eθ at φ = 0°) and the H-plane radiation pattern ­(Eθ at φ = 90°) is presented in Fig. 8.h The E-plane radiation patterns show that the proposed antenna radiates omnidirectional in case of simulated and boiled tissue and bi-directional in case of normal fat. However, the H-plane patterns reveal that the antenna radiates bi-directional in the three cases. It is worth noting that the model does not take into account the probe location. Results and discussion It is also assumes that the dielectric material of the substrate is truncated and does not cover the ground plane beyond the edges of the patch which may be the cause of the discrepancies between the two patterns.hi y g y The 3-D radiation patterns for the proposed antenna at the resonance frequency for the three configurations; simulated, normal and boiled fat are illustrated in Fig. 9a–c, respectively. The gain. Figure 10 shows the gain of the proposed antenna. The maximum obtained gain in the MICS band was about − 10 dB. This is due to limitations in the measurement process in addition to the degenerative effect of the SMA connector due to small size of the antenna. SAR. The electromagnetic parameters of the human tissue are given in Table 5. The calculation formula of SAR value is presented as follows: (1) SAR = σE2 ρ SAR = σE2 ρ (1) where σ is conductivity, E is the electric field intensity, and ρ is the mass ­density52 where σ is conductivity, E is the electric field intensity, and ρ is the mass ­density52.h i The average SAR value of the proposed antenna when implanted into the fat tissue is presented in Fig. 11. The maximum SAR of the 10 g is 50 W/Kg. Due to the reflection characteristics, the obtained SAR enhances the main lobe but it also reduces the back lobe. This means that only a small amount of electromagnetic wave energy is radiated to the fat tissue. Therefore, the antenna has good forward radiation and reasonable SAR value. Total efficiency and front to back ratio. The simulated total efficiency and front to back ratio “FBR” versus frequency of the proposed antenna are presented in Fig. 12a,b, respectively.fi As shown in Fig. 12a, the total efficiency of the antenna is almost − 10 dB at the operational frequency. In addition, a relatively high FBR is obtained at the resonance frequency of the antenna (see Fig. 12b). Scientific Reports | (2022) 12:15035 | https://doi.org/10.1038/s41598-022-19430-y www.nature.com/scientificreports/ Figure 7. (a) A photograph of the fabricated antennas, (b) a photograph of the antenna with studied fat sample, (c) the ­S11 parameters for simulation, normal and boiled fat. Validation Operating frequency (GHz) Reflection coefficient S11 (dB) 3 dB Bandwidth (MHz) Figure 7. Results and discussion (a) A photograph of the fabricated antennas, (b) a photograph of the antenna with studied fat sample, (c) the ­S11 parameters for simulation, normal and boiled fat. Figure 7. (a) A photograph of the fabricated antennas, (b) a photograph of the antenna with studied fat sample, (c) the ­S11 parameters for simulation, normal and boiled fat. Table 4. Summary of the simulated and measured antenna results. Validation Operating frequency (GHz) Reflection coefficient, S11 (dB)  − 3- dB Bandwidth (MHz) Simulated Native fat 0.513  − 12.4 0.20 Measured Native fat 0.454  − 12.3 ± 0.3 0.19 ± 0.02 Boiled fat 0.425  − 9.9 ± 0.2 0.17 ± 0.01 Table 4. Summary of the simulated and measured antenna results. Table 4. Summary of the simulated and measured antenna results. Diffuse optical measurements. Tissue reflectance is the ratio between the reflected light intensity and the incident light intensity, while the transmittance is defined as the ratio between the transmitted light intensity and the incident light intensity. Accordingly, the variations in the reflected light intensity and transmitted light intensity of the fat samples (native and boiled) at each wavelength are presented in Figs. 13 and 14, respectively. For each sample, the experimental measurements have been obtained five times and the average values are plot- ted.fl As shown in Fig. 13, the diffuse reflectance of the boiled fat tissues is less than the native tissues at the four studied wavelengths. On the other hand, the transmittance measurements show the opposite behavior (Fig. 14). Scientific Reports | (2022) 12:15035 | https://doi.org/10.1038/s41598-022-19430-y www.nature.com/scientificreports/ Figure 8. The Radiation pattern (a) E-plane at φ = 0 and (b) H-plane at φ = 90°. Figure 9. The 3-D radiation patterns for the proposed antenna (a) simulation, (b) normal fat and (c) boiled fat. Figure 8. The Radiation pattern (a) E-plane at φ = 0 and (b) H-plane at φ = 90°. Figure 8. The Radiation pattern (a) E-plane at φ = 0 and (b) H-plane at φ = 90°. Figure 9. The 3-D radiation patterns for the proposed antenna (a) simulation, (b) normal fat and (c) boiled fat. Figure 9. The 3-D radiation patterns for the proposed antenna (a) simulation, (b) normal fat and (c) boiled fat. igure 9. The 3-D radiation patterns for the proposed antenna (a) simulation, (b) normal fat and (c) boiled fat. Figure 10. The gain of the proposed antenna. Figure 10. Results and discussion The gain of the proposed antenna. Figure 10. The gain of the proposed antenna. https://doi.org/10.1038/s41598-022-19430-y https://doi.org/10.1038/s41598-022-19430-y Scientific Reports | (2022) 12:15035 | www.nature.com/scientificreports/ Tissue εr Conductivity (S/m) Density (kg/m3) Thickness (mm) Skin 37.95 1.49 1001 2 Fat 5.27 0.10235 900 5 Muscle 52.67 1.77 1006 20 Bone 18.49 0.82 1008 13 Table 5. The electromagnetic parameters of the human tissue. Skin 37.95 1.49 1001 2 Fat 5.27 0.10235 900 5 Muscle 52.67 1.77 1006 20 Bone 18.49 0.82 1008 13 Figure 11. Simulated SAR of the proposed antenna. Figure 12. The simulated (a) total efficiency, and (b) front to back ratio of the proposed antenna. Table 5. The electromagnetic parameters of the human tissue. Table 5. The electromagnetic parameters of the human tissue. Figure 11. Simulated SAR of the proposed antenna. Figure 11. Simulated SAR of the proposed antenna. Figure 12 The simulated (a) total efficiency and (b) front to back ratio of the proposed antenna Figure 12. The simulated (a) total efficiency, and (b) front to back ratio of the proposed antenna. Figure 12. The simulated (a) total efficiency, and (b) front to back ratio of the proposed antenna. https://doi.org/10.1038/s41598-022-19430-y Scientific Reports | (2022) 12:15035 | www.nature.com/scientificreports/ Figure 13. Diffuse reflected light of fat samples at (a) 532 nm, (b) 660 nm, (c) 780 nm, and (d) 980 nm. Figure 13. Diffuse reflected light of fat samples at (a) 532 nm, (b) 660 nm, (c) 780 nm, and (d) 980 nm. Figure 13. Diffuse reflected light of fat samples at (a) 532 nm, (b) 660 nm, (c) 780 nm, and (d) 980 nm. Such results are reasonable as some cellular and intracellular characteristics (such as protein denaturation, hyalinization of collagen, and cell membrane rupture) of fat tissues are supposed to be altered after ­boiling53. These characteristics have a great effect on tissue scattering properties and hence affect light distribution and ­propagation54. Conclusions A miniaturized multilayer antenna was designed as a diagnostic tool for differentiating native and infected adi- pose tissue (ex-vivo bovine fat). An additional substrate was added to the design to enable the antenna to test high conductive tissues. The antenna resonated at 454 MHz (near to the MICS band), which makes it applicable for the short range medical applications. Although the resonant frequency of the proposed antenna does not lay exactly in the MICS band (402–405 MHz), the measured reflection coefficient ­(S11) showed a considerable change at the different conditions of the tissue. Additionally, the measured results of the proposed antenna showed an acceptable agreement with the simulation results. Moreover, the E- and H-field radiation patterns asserted the same conclusions. The antenna gain was − 10 dB in the three cases. Furthermore, the diffuse reflectance and trans- mittance of the studied tissue samples were measured to confirm the variation in the optical properties between native and infected samples which was also demonstrated in the obtained ­S11 parameter at each case. Compared with the previous literature, the proposed antenna has relatively small dimensions. For future investigations, the proposed antenna will be tested on other tissues with high conductivity. Additionally, multiple antennas with different designs using various Rogers will be considered. https://doi.org/10.1038/s41598-022-19430-y Scientific Reports | (2022) 12:15035 | www.nature.com/scientificreports/ Figure 14. Total transmitted light of fat samples at (a) 532 nm, (b) 660 nm, (c) 780 nm, and (d) 980 nm. Figure 14. Total transmitted light of fat samples at (a) 532 nm, (b) 660 nm, (c) 780 nm, and (d) 980 nm. Data availabilityh Data availability The datasets used and/or analyzed during the current study available from the corresponding author on reas able request. Data availability The datasets used and/or analyzed during the current study available from the corresponding author on reason- able request. Received: 15 March 2022; Accepted: 29 August 2022 Received: 15 March 2022; Accepted: 29 August 2022 References 1. Bhattacharjee, S., Maity, S., Metya, S. K. & Bhunia, C. T. Performance enhancement of implantable medical antenna using dif- ferential feed technique. Eng. Sci. Technol. Int. J. 19, 642–650 (2016). q g 2. Cosoli, G., Scalise, L., Poli, A. & Spinsante, S. Wearable devices as a valid support for diagnostic excellence: lessons from a pandemic going forward. Health Technol. (Berl) 11, 673–675 (2021). g g ( ) ( ) 3. Taylor, W. et al. A review of the state of the art in non-contact sensing for covid-19. Sensors 20, 1–19 (2020). g g 3. Taylor, W. et al. A review of the state of the art in non-contact sensing for covid-19. Sensors 20, 1–19 (2020 3. Taylor, W. et al. A review of the state of the art in non-cont y g 4. Yun, S. M. et al. Recent advances in wearable devices for non-invasive sensing. Appl. Sci. 11, 1–28 (2021). y g 4. Yun, S. M. et al. Recent advances in wearable devices for non-invasive sensing. Appl. Sci. 11, 1–28 (2021). 5. Liao, Y., Leeson, M. S. & Higgins, M. D. A communication link analysis based on biological implant wireless body area networks Appl. Comput. Electromagn. Soc. J. 31, 619–628 (2016). pp p g J ( ) 6. Kiourti, A., Costa, J. R., Fernandes, C. A., Santiago, A. G. & Nikita, K. S. Miniature implantable antennas for biomedical telemetry: From simulation to realization. IEEE Trans. Biomed. Eng. 59, 3140–3147 (2012). 6. Kiourti, A., Costa, J. R., Fernandes, C. A., Santiago, A. G. & Nikita, K. S. Miniature implantable antennas for biomedical telemetry From simulation to realization. IEEE Trans. Biomed. Eng. 59, 3140–3147 (2012). g , ( ) 7. Kiourti, A., Costa, J. R., Fernandes, C. A. & Nikita, K. S. A broadband implantable and a dual-band on-body repeater antenna: Design and transmission performance. IEEE Trans. Antennas Propag. 62, 2899–2908 (2014).hfi g ( ) 7. Kiourti, A., Costa, J. R., Fernandes, C. A. & Nikita, K. S. A broadband implantable and a dual-band on-body repeater antenna Design and transmission performance. IEEE Trans. Antennas Propag. 62, 2899–2908 (2014).hfi g p p g 8. Skrivervik, A. K. Implantable antennas: The challenge of efficiency. in 7th European Conference on Antennas and Propagation (EuCAP) 3627–3631 (2013). 9. Kiourti, A. & Nikita, K. S. A review of implantable patch antennas for biomedical telemetry: Challenges and solutions. IEEE Antennas Propag. Mag. 54, 210–228 (2012). 9. www.nature.com/scientificreports/ A low-profile high-gain substrate-integrated waveguide-slot anten zation using metamaterial. IEEE Antennas Wirel. Propag. Lett. 16, 1614–1617 (2017).i y p p g g 23. Pandit, S., Mohan, A. & Ray, P. A low-profile high-gain substrate-integrated waveguide-slot antenna with suppressed cross po i i i l IEEE A Wi l P L 16 1614 1617 (2017) 3. Pandit, S., Mohan, A. & Ray, P. A low-profile high-gain substrate-integrated waveguide-slot antenna with suppressed cross polari zation using metamaterial. IEEE Antennas Wirel. Propag. Lett. 16, 1614–1617 (2017).i 24. Ge, Y., Sun, Z., Chen, Z. & Chen, Y. Y. A high-gain wideband low-profile fabry-perot resonator antenna with a conical short horn. IEEE Antennas Wirel. Propag. Lett. 15, 1889–1892 (2016). 25. Wu, M. T. & Chuang, M. L. Multibroadband slotted bow-tie monopole antenna. IEEE Antennas Wirel. Propag. Lett. 14, 887–890 (2015). 6. Supriya, A. S. & Rajendran, J. A low cost tri-band microstrip patch antenna for GPS application. Prog. Electromagn. Res. Symp 60–65 (2017). https://​doi.​org/​10.​1109/​PIERS-​FALL.​2017.​82931​11. p g 7. Ahmad, A., Arshad, F., Naqvi, S. I., Amin, Y. & Tenhunen, H. Design, fabrication, and measurements of extended l-shaped multi band antenna for wireless applications. Appl. Comput. Electromagn. Soc. J. 33, 388–393 (2018).ll 28. Kavitha, A. & Swaminathan, J. N. Design of flexible textile antenna using FR4, jeans cotton and teflon substrates. Microsyst. Technol. 25, 1311–1320 (2019).l 9. Ahmed, S., Tahir, F. A., Shamim, A. & Cheema, H. M. A compact kapton-based inkjet-printed multiband antenna for flexible wireless devices. IEEE Antennas Wirel. Propag. Lett. 14, 1802–1805 (2015).l g 30. Haque, E., Mahmuda, S. & Ahmed, F. A capsule-like flexible multiband antenna for WBAN applications. IEEE Reg. 10 Annu. Int. Conf. Proceedings/TENCON 1614–1619 (2017). https://​doi.​org/​10.​1109/​TENCON.​2017.​82281​16. 1. Liu, H. et al. Quad-band CPW-fed monopole antenna based on flexible pentangle-loop radiator. IEEE Antennas Wirel. Propag Lett. 14, 1373–1377 (2015). 2. Hosseini Varkiani, S. M. & Afsahi, M. Grounded CPW multi-band wearable antenna for MBAN and WLAN applications. Microw Opt. Technol. Lett. 60, 561–568 (2018).il p 33. Castro, A. T. & Sharma, S. K. Inkjet-printed wideband circularly polarized microstrip patch array antenna on a PET film flexible substrate material. IEEE Antennas Wirel. Propag. Lett. 17, 176–179 (2018). p g 4. Abutarboush, H. F., Farooqui, M. F. & Shamim, A. Inkjet-printed wideband antenna on resin-coated paper substrate for curved wireless devices. IEEE Antennas Wirel. Propag. Lett. 15, 20–23 (2016). 5. Yousaf, M. et al. www.nature.com/scientificreports/ Compacted conformal implantable antenna with multitasking capabilities for ingestible capsule endoscope. IEEE Access 8, 157617–157627 (2020). 6. Zada, M. & Yoo, H. A miniaturized triple-band implantable antenna system for bio-telemetry applications. IEEE Trans. Antennas Propag. 66, 7378–7382 (2018). 7. Zada, M., Shah, I. A., Basir, A. & Yoo, H. Ultra-compact implantable antenna with enhanced performance for leadless cardiac pacemaker system. IEEE Trans. Antennas Propag. 69, 1152–1157 (2021). 37. Zada, M., Shah, I. A., Basir, A. & Yoo, H. Ultra-compact implantable antenna with enh pacemaker system. IEEE Trans. Antennas Propag. 69, 1152–1157 (2021). 8. Huang, F. J. et al. Rectenna application of miniaturized implantable antenna design for triple-band biotelemetry communication IEEE Trans. Antennas Propag. 59, 2646–2653 (2011). IEEE Trans. Antennas Propag. 59, 2646–2653 (2011). p g 9. Das, R. & Yoo, H. Biotelemetry and wireless powering for leadless pacemaker systems. IEEE Microw. Wirel. Components Lett. 25 262–264 (2015). ( ) 0. Shah, I. A., Zada, M. & Yoo, H. Design and analysis of a compact-sized multi-band spiral-shaped implantable antenna for scalp implantable and leadless pacemaker systems. IEEE Trans. Antennas Propag. 67, 4230–4234 (2019).f 41. Liu, Y., Chen, Y., Lin, H. & Juwono, F. H. A novel differentially fed compact dual-band implantable antenna for biotelemetry applications. IEEE Antennas Wirel. Propag. Lett. 15, 1791–1794 (2016). 42. Gani, I. & Yoo, H. Multi-band antenna system for skin implant. IEEE Microw. Wirel. Components Lett. 26, 294–296 (2016) 43 Abb i M A B Sh hid S Ri M T M A & Abb S M O b d i d h d i h l d 43. Abbasi, M. A. B., Shahid, S., Rizwan, M., Tarar, M. A. & Abbas, S. M. On-board printed handset antenna with coupled mon 8th Eur. Conf. Antennas Propagation, EuCAP 2014 2889–2892 (2014). https://​doi.​org/​10.​1109/​EuCAP.​2014.​69024​30.f 44. Glorieux, S. et al. Effect of meat type, animal fat type, and cooking temperature on microstructural and macroscopic pro of cooked sausages. Food Bioprocess Technol. 12, 16–26 (2019).f g p ( ) 45. El-Zayat, S. R., Sibaii, H. & El-Shamy, K. A. Physiological effects of fat loss. Bull. Natl. Res. Cent. 43, 1–15 (2019). 46. Bozkurt, H. & Icier, F. Electrical conductivity changes of minced beef-fat blends during ohmic cooking. J. Food Eng. 96, 8 (2010). 47. Wang, L. V., Wu, H. Biomedical Optics: Principles and Imaging. (Wiley-Interscience, 2007).i 48. Hamdy, O. & Mohammed, H. S. References Kiourti, A. & Nikita, K. S. A review of implantable patch antennas for biomedical telemetry: Challenges and solutions. IEEE Antennas Propag. Mag. 54, 210–228 (2012). p g g 10. Liu, Y. et al. Some recent developments of microstrip antenna. Int. J. Antennas Propag. https://​doi.​org/​10.​1155/​2012/​428284 (2012). 11. He, Y., Ma, K., Yan, N. & Zhang, H. Dual-band monopole antenna using substrate-integrated suspended line technology for WLAN application. IEEE Antennas Wirel. Propag. Lett. 16, 2776–2779 (2017). 10. Liu, Y. et al. Some recent developments of microstrip antenna. Int. J. Antennas Propag. https://​doi.​org/​10.​1155/​2012/​428284 (2012). 11. He, Y., Ma, K., Yan, N. & Zhang, H. Dual-band monopole antenna using substrate-integrated suspended line technology for WLAN application. IEEE Antennas Wirel. Propag. Lett. 16, 2776–2779 (2017). Scientific Reports | (2022) 12:15035 | https://doi.org/10.1038/s41598-022-19430-y www.nature.com/scientificreports/ www.nature.com/scientificreports/ 12. Boukarkar, A., Lin, X. Q., Jiang, Y. & Yu, Y. Q. Miniaturized Single-Feed Multiband Patch Antennas. IEEE Trans. Antennas Propag. 65, 850–854 (2017). 3. Araghi, A. A compact planar ultra wideband antenna with triple-notched bands using capacitive coupled and parallel LC elements Appl. Comput. Electromagn. Soc. J. 31, 1416–1420 (2016). pp p g J , ( ) 14. Cao, Y. F., Cheung, S. W. & Yuk, T. I. A multiband slot antenna for GPS/WiMAX/WLAN systems. IEEE Trans. Antennas Propag. 63, 952–958 (2015). 5. Gad, N. H. & Vidmar, M. Design of a Microstrip-fed printed-slot antenna using defected ground structures for Multiband applica- tions. Appl. Comput. Electromagn. Soc. J. 33, 854–860 (2018). tions. Appl. Comput. Electromagn. Soc. J. 33, 854–860 (2018). 16. Majidi, N. et al. Design and comparison of 4 types of dual resonance proximity coupled microstrip patch antennas. Appl. Comput. Electromagn Soc J 33 1135–1139 (2018) pp p g 6. Majidi, N. et al. Design and comparison of 4 types of dual resonance proximity coupled microstrip patch antennas. Appl. Comput Electromagn. Soc. J. 33, 1135–1139 (2018). g ( ) 7. Hsu, C. K. & Chung, S. J. Compact multiband antenna for handsets with a conducting edge. IEEE Trans. Antennas Propag. 63 5102–5107 (2015). 8. Prabakaran, N. et al. A coplanar waveguide (CPW) fed circular microstripantenna for UWB applications. Int. J. Innov. Technol Explor. Eng. 8, 531–534 (2019). p g 9. Shanmuganantham, T., Balamanikandan, K. & Raghavan, S. CPW-fed slot antenna for wideband applications. Int. J. Antennas Propag. 1–4 (2008). https://​doi.​org/​10.​1155/​2008/​379247.l Propag. 1–4 (2008). https://​doi.​org/​10.​1155/​2008/​379247. p g ( ) p g 20. Kadry, M., Atrash, M. El & Abdalla, M. A. Design of an ultra-thin compact flexible dual-band antenna for wearable applications. in 2018 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting 1949–1950 (2018). https://​doi.​org/​10.​1109/​APUSN​CURSI​NRSM.​2018.​86092​47.l p g 21. Abdalgalil, O. F., Atrash, M. El & Abdalla, M. A. a flexible high gain wide-band antenna for wireless and wearable applications. in 2018 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting 1279–1280 (2018). https://​doi.​org/​10.​1109/​APUSN​CURSI​NRSM.​2018.​86088​30.i p g 22. Bean, D. & Venkataraman, J. Gain Enhancement of on-chip antenna at 60 GHz using an artificial magnetic conductor. in 2020 IEEE International Symposium on Antennas and Propagation and North American Radio Science Meeting 1423–1424 (2020).i y p p g 23. Pandit, S., Mohan, A. & Ray, P. www.nature.com/scientificreports/ www.nature.com/scientificreports/ 3. Larin, K. V., Larina, I. V. & Esenaliev, R. O. Monitoring of tissue coagulation during thermotherapy using optoacoustic technique J. Phys. D. Appl. Phys. 38, 2645–2653 (2005).l 53. Larin, K. V., Larina, I. V. & Esenaliev, R. O. Monitoring of tissue coagulation during thermotherapy using optoacoustic technique. J. Phys. D. Appl. Phys. 38, 2645–2653 (2005).l y pp y 4. Hamdy, O., El-Azab, J., Al-Saeed, T. A., Hassan, M. F. & Solouma, N. H. A method for medical diagnosis based on optical fluence rate distribution at tissue surface. Materials (Basel). 10, 1–13 (2017). Acknowledgementsh g The authors would like to thank their colleague Dr. Mahmoud M. A. Ahmed for his diligent proofreading of this paper. g The authors would like to thank their colleague Dr. Mahmoud M. A. Ahmed for his diligent proofreading of this paper. Author contributions Study design and conceptualization: A.S.A.H. and O.H. Writing original draft: O.H. and A.S.A.H. Analyzing results: M.M., A.S.A.H., and O.H. All authors reviewed the final manuscript. Competing interests h Competing interests  The authors declare no competing interests. p g The authors declare no competing interests. www.nature.com/scientificreports/ Investigating the transmission profiles of 808 nm laser through different regions of the rat ’ s head. Lasers Med. Sci. 36, 803–810 (2021).l 9. Hamdy, O., Fathy, M., Al-Saeed, T. A., El-Azab, J. & Solouma, N. H. Estimation of optical parameters and fluence rate distribution in biological tissues via a single integrating sphere optical setup. Optik (Stuttg). 140, 1004–1009 (2017). 50. Hamdy, O. & Solouma, N. H. Distant-detector versus integrating sphere measurements for estimating tissue optical parameters: A comparative experimental study. Optik (Stuttg). 247, 167981 (2021). 51. Hamdy, O. & Mohammed, H. S. Variations in tissue optical parameters with the incident power of an infrared laser. PLoS ONE 17, e0263164 (2022).li 2. Saeed, S. M., Balanis, C. A., Birtcher, C. R., Durgun, A. C. & Shaman, H. N. Wearable flexible reconfigurable antenna integrated with artificial magnetic conductor. IEEE Antennas Wirel. Propag. Lett. 16, 2396–2399 (2017). https://doi.org/10.1038/s41598-022-19430-y Scientific Reports | (2022) 12:15035 | Funding Funding Open access funding provided by The Science, Technology & Innovation Funding Authority (STDF) in coopera- tion with The Egyptian Knowledge Bank (EKB). Additional information Correspondence and requests for materials should be addressed to O.H. Reprints and permissions information is available at www.nature.com/reprints. Reprints and permissions information is available at www.nature.com/reprints. Publisher’s note  Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Open Access  This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://​creat​iveco​mmons.​org/​licen​ses/​by/4.​0/. © The Author(s) 2022 https://doi.org/10.1038/s41598-022-19430-y Scientific Reports | (2022) 12:15035 |
https://openalex.org/W4380675504
https://ejde-ojs-txstate.tdl.org/ejde/article/download/506/441
English
null
Stability of initial-boundary value problem for quasilinear viscoelastic equations
Electronic journal of differential equations
2,020
cc-by
7,186
Electronic Journal of Differential Equations, Vol. 2020 (2020), No. 85, pp. 1–15. ISSN: 1072-6691. URL: http://ejde.math.txstate.edu or http://ejde.math.unt.edu Electronic Journal of Differential Equations, Vol. 2020 (2020), No. 85, pp. 1–15. ISSN: 1072-6691. URL: http://ejde.math.txstate.edu or http://ejde.math.unt.edu Electronic Journal of Differential Equations, Vol. 2020 (2020), No. 85, pp. 1–15. ISSN: 1072-6691. URL: http://ejde.math.txstate.edu or http://ejde.math.unt.edu c⃝2020 Texas State University. Submitted November 11, 2019. Published July 30, 2020. KUN-PENG JIN, JIN LIANG, TI-JUN XIAO Abstract. We investigate the stability of the initial-boundary value problem for the quasilinear viscoelastic equation |ut|ρutt −∆utt −∆u + Z t 0 g(t −s)∆u(s)ds = 0, in Ω× (0, +∞), u = 0, in ∂Ω× (0, +∞), u(·, 0) = u0(x), ut(·, 0) = u1(x), in Ω, where Ωis a bounded domain of Rn (n ≥1) with smooth boundary ∂Ω, ρ is a positive real number, and g(t) is the relaxation function. We present a general polynomial decay result under some weak conditions on g, which generalizes and improves the existing related results. Moreover, under the condition g′(t) ≤−ξ(t)gp(t), we obtain uniform exponential and polynomial decay rates for 1 ≤p < 2, while in the previous literature only the case 1 ≤p < 3/2 was studied. Finally, under a general condition g′(t) ≤−H(g(t)), we establish a fine decay estimate, which is stronger than the previous results. 1. Introduction 2010 Mathematics Subject Classification. 35Q74, 35B35, 74H55, 74H40, 93D15. Key words and phrases. Quasilinear viscoelastic equation; polynomial and exponential decay; relaxation function; uniform decay. c⃝2020 Texas State University. Submitted November 11, 2019. Published July 30, 2020. Key words and phrases. Quasilinear viscoelastic equation; polynomial and exponential decay; relaxation function; uniform decay. c⃝2020 Texas State University ⃝ y Submitted November 11, 2019. Published July 30, 2020 2010 Mathematics Subject Classification. 35Q74, 35B35, 74H55, 74H40, 93D15. c⃝2020 Texas State University. 1. Introduction In this article, we consider the stability of the initial-boundary value problem for quasilinear viscoelastic equations, |ut|ρutt −∆utt −∆u + Z t 0 g(t −s)∆u(s)ds = 0, in Ω× (0, +∞), u = 0, in ∂Ω× (0, +∞), u(·, 0) = u0(x), ut(·, 0) = u1(x), in Ω, (1.1) (1.1) where Ωis a bounded domain of Rn(n ≥1) with smooth boundary ∂Ω, ρ is a positive real number, and g(t) the relaxation function. where Ωis a bounded domain of Rn(n ≥1) with smooth boundary ∂Ω, ρ is a positive real number, and g(t) the relaxation function. p , g( ) In [16], under the assumption that the bounded C1-function g : R+ →R+ satisfies 1 − Z +∞ 0 g(t)ds > 0, g′(t) ≤−ξgp(t), 1 ≤p < 3 2, (1.2) (1.2) where ξ > 0 is a constant, Messaoudi and Tatar obtained decay rates in [16, Theo- rem 3.1]. where ξ > 0 is a constant, Messaoudi and Tatar obtained decay rates in [16, Theo- rem 3.1]. 1 2 K P JIN J LIANG T J XIAO EJDE 2020/85 K. P. JIN, J. LIANG, T.-J. XIAO 2 EJDE-2020/85 EJDE-2020/85 More recently, Messaoudi and Al-Khulaifi[13] improved this result [16, Theorems 3.1] by using the assumption that the non-increasing differentiable function g : R+ →R+ satisfies 1 − Z +∞ 0 g(t)ds > 0, g′(t) ≤−ξ(t)gp(t), 1 ≤p < 3 2, (1.3) (1.3) here ξ(t) : R+ →R+ is a non-increasing differentiable function with ξ(0) > 0. here ξ(t) : R+ →R+ is a non-increasing differentiable function with ξ(0) > 0. Messaoudi and Mustafa [14] also studied problem (1.1) and the corresponding decay results were obtained for the following condition on g(t), g′(t) ≤−H(g(t)), t ≥0, (1.4) (1.4) where H is a positive function and satisfies some conditions (see details in [14, hypotheses (A2) and (A3)]). where H is a positive function and satisfies some conditions (see details in [14, hypotheses (A2) and (A3)]). For more related information on the stability of problem (1.1) and some related equations or systems, we refer the reader to [1, 3, 4, 5, 6, 7, 8, 9, 10, 11, 18, 19, 20, 21, 22, 23, 24] and references therein. In this article, we investigate the stability for problem (1.1) by using more general (weaker) assumptions on the relaxation functions g(t). 1. Introduction We establish ideal stability theorems with exact uniform polynomial decay rates t−1 for the solutions to this problem, under some basic conditions (see Theorem 3.2). Furthermore, in Theorems 3.4 and 3.6, our results hold for all 1 ≤p < 2, while in the previous literature only the case: 1 ≤p < 3 2 was studied. Therefore, all of our results, with much weaker conditions on the relaxation function g(t), are optimal so far. In the next section, we prove some estimates (lemmas) which will be used in Section 3. Finally, we will state and prove our main results in Section 3. 2. Basic estimates In this article we use the following assumptions: (A1) 0 < ρ, if n = 1, 2; and In this article we use the following assumptions: (A1) 0 < ρ, if n = 1, 2; and (A1) 0 < ρ, if n = 1, 2; and 0 < ρ ≤ 2 n −2, if n ≥3; (A2) g(t) : [0, +∞) →[0, +∞) is a non-increasing differentiable function with meas(J0) = 0, g(0) > 0, g′(t) ≤0, µ0 > 0, (A2) g(t) : [0, +∞) →[0, +∞) is a non-increasing differentiable function with meas(J0) = 0, g(0) > 0, g′(t) ≤0, µ0 > 0, (A2) g(t) : [0, +∞) →[0, +∞) is a non-increasing differentiable function with meas(J0) = 0, g(0) > 0, g′(t) ≤0, µ0 > 0, where J0 := {s ≥0; g(s) > 0, g′(s) = 0} = 0, µ0 := 1 − Z +∞ 0 g(t) dt. J0 := {s ≥0; g(s) > 0, g′(s) = 0} = 0, µ0 := 1 − Z +∞ 0 In the sequel, C, Ci > 0, i = 1, 2, . . . represent positive constants which are possibly different in different places. We denote In the sequel, C, Ci > 0, i = 1, 2, . . . represent positive constants which are possibly different in different places. We denote G(t) := Z +∞ t g(s)ds, for t ≥0; M(δ) := Z +∞ 0 g(s) Kδ(s)ds, Kδ(s) := −g′(s) g(s) + δ, where δ ∈(0, 1) is a constant. We define where δ ∈(0, 1) is a constant. We define I1(t) := Z Ω Z t 0 G(t −s)|∇u(s)|2 ds dx, STABILITY OF VISCOELASTIC EQUATIONS EJDE-2020/85 3 I2(t) := M(δ)  δ Z Ω Z t 0 G(t −s)|∇u(s)|2 ds dx + E(t)  . d dtI1(t) ≤−1 2 Z Ω Z t 0 g(t −s)|∇u(t) −∇u(s)|2 ds dx + 2G(0) Z Ω |∇u(t)|2dx, (2.1) and d dtI2(t) ≤−1 2M(δ) Z Ω Z t 0 Kδ(t −s)g(t −s)|∇u(t) −∇u(s)|2 ds dx + 2δM(δ)G(0) Z Ω |∇u(t)|2dx. (2.2) d dtI1(t) ≤−1 2 Z Ω Z t 0 g(t −s)|∇u(t) −∇u(s)|2 ds dx + 2G(0) Z Ω |∇u(t)|2dx, (2.1) and and d dtI2(t) ≤−1 2M(δ) Z Ω Z t 0 Kδ(t −s)g(t −s)|∇u(t) −∇u(s)|2 ds dx + 2δM(δ)G(0) Z Ω |∇u(t)|2dx. (2.2) (2.2) Moreover, δM(δ) →0, as δ →0. (2.3) δM(δ) →0, as δ →0. , δM(δ) →0, as δ →0. 2. Basic estimates (2.3) (2.3) Proof. Noting that Proof. Noting that −(a ± b)2 ≤−1 2a2 + b2, we see by a direct calculation that, for t ≥0, d dtI1(t) = − Z Ω Z t 0 g(t −s)|∇u(s)|2 ds dx + G(0) Z Ω |∇u(t)|2dx = − Z Ω Z t 0 g(t −s)|∇u(t) −∇u(s) −∇u(t)|2 ds dx + G(0) Z Ω |∇u(t)|2dx ≤−1 2 Z Ω Z t 0 g(t −s)|∇u(t) −∇u(s)|2 ds dx + Z Ω Z t 0 g(t −s)|∇u(t)|2 ds dx + G(0) Z Ω |∇u(t)|2dx ≤−1 2 Z Ω Z t 0 g(t −s)|∇u(t) −∇u(s)|2 ds dx + 2G(0) Z Ω |∇ This means that (2.1) holds. This means that (2.1) holds. F th d fiiti f K ( ) (2 1) d (3 2) it f ll th t ( ) From the definition of Kδ(s), (2.1) and (3.2), it follows that ( ) From the definition of Kδ(s), (2.1) and (3.2), it follows that ( ) From the definition of Kδ(s), (2.1) and (3.2), it follows that From the definition of Kδ(s d dtI2(t) ≤−1 2M(δ) Z Ω Z t 0 (δg(t −s) + g′(t −s)) |∇u(t) −∇u(s)|2 ds dx + 2δM(δ)G(0) Z Ω |∇u(t)|2dx ≤−1 2M(δ) Z Ω Z t 0 Kδ(t −s)g(t −s)|∇u(t) −∇u(s)|2 ds dx + 2δM(δ)G(0) Z Ω |∇u(t)|2dx. According to [8, P. 1525, lines 8-10], we know that (2.3) is true. Thus, we completed the proof. □ According to [8, P. 1525, lines 8-10], we know that (2.3) is true. Thus, we completed the proof. □ K. P. JIN, J. LIANG, T.-J. XIAO EJDE-2020/85 K. P. JIN, J. LIANG, T.-J. XIAO K. P. JIN, J. LIANG, T.-J. XIAO EJDE-2020/85 4 EJDE-2020/85 We define F1(t) := 1 ρ + 1 Z Ω |ut|ρutu dx + Z Ω ∇u · ∇ut dx, Lemma 2.2. For t ≥0, Lemma 2.2. For t ≥0, d dtF1(t) ≤−µ0 2 Z Ω |∇u|2dx + 1 2µ0 Z Ω  Z t 0 g(t −s)|∇u(t) −∇u(s)|ds 2 dx + Z Ω |∇ut|2dx + 1 ρ + 1 Z Ω |ut|ρ+2dx. (2.4) (2.4) Proof. Clearly, we can rewrite the first equation in (1.1) as Proof. Clearly, we can rewrite the first equation in (1.1) as |ut|ρutt −∆utt −  1 − Z t 0 g(s)ds  ∆u − Z t 0 g(t −s) (∆u(t) −∆u(s)) ds = 0. 2. Basic estimates (2.5) It follows from (2.5) that It follows from (2.5) that tF1(t) =  1 − Z t 0 g(s)ds  Z Ω u∆udx + Z Ω u(t) Z t 0 g(t −s) (∆u(t) −∆u(s)) ds + Z Ω |∇ut|2dx + 1 ρ + 1 Z Ω |ut|ρ+2dx = −  1 − Z t 0 g(s)ds  Z Ω |∇u|2dx − Z Ω ∇u(t) · Z t 0 g(t −s) (∇u(t) −∇u(s)) ds dx + Z Ω |∇ut|2dx + 1 ρ + 1 Z Ω |ut|ρ+2dx ≤−µ0 Z Ω |∇u|2dx + µ0 2 Z Ω |∇u|2dx + 1 2µ0 Z Ω Z t 0 g(t −s)|∇u(t) −∇u(s)|ds 2 dx + Z Ω |∇ut|2dx + 1 ρ + 1 Z Ω |ut|ρ+2dx ≤−µ0 2 Z Ω |∇u|2dx + 1 2µ0 Z Ω  Z t 0 g(t −s)|∇u(t) −∇u(s)|ds 2 dx + Z Ω |∇ut|2dx + 1 ρ + 1 Z Ω |ut|ρ+2dx. d dtF1(t) =  1 − Z t 0 g(s)ds  Z Ω u∆udx + Z Ω u(t) Z t 0 g(t −s) (∆u(t) −∆u(s)) ds dx + Z Ω |∇ut|2dx + 1 ρ + 1 Z Ω |ut|ρ+2dx = −  1 − Z t 0 g(s)ds  Z Ω |∇u|2dx − Z Ω ∇u(t) · Z t 0 g(t −s) (∇u(t) −∇u(s)) ds dx + Z Ω |∇ut|2dx + 1 ρ + 1 Z Ω |ut|ρ+2dx ≤−µ0 Z Ω |∇u|2dx + µ0 2 Z Ω |∇u|2dx 2 Z Ω Z Ω + 1 2µ0 Z Ω Z t 0 g(t −s)|∇u(t) −∇u(s)|ds 2 dx + Z Ω |∇ut|2dx + 1 ρ + 1 Z Ω |ut|ρ+2dx ≤−µ0 2 Z Ω |∇u|2dx + 1 2µ0 Z Ω  Z t 0 g(t −s)|∇u(t) −∇u(s)|ds 2 dx + Z Ω |∇ut|2dx + 1 ρ + 1 Z Ω |ut|ρ+2dx. □ This completes the proof. his completes the proof. □ Now, we define Now, we define F2(t) := Z Ω  ∆ut − 1 ρ + 1|ut|ρut  Z t 0 g(t −s)(u(t) −u(s)) ds dx. STABILITY OF VISCOELASTIC EQUATIONS EJDE-2020/85 5 Lemma 2.3. There is a constant C1 > 0 such that, for t ≥t0, Lemma 2.3. 2. Basic estimates There is a constant C1 > 0 such that, for t ≥t0, dt ≤− G(0) 2(ρ + 1) Z Ω |ut(t)|ρ+2dx −G(0) 2 Z Ω |∇ut(t)|2dx + µ0G(0) 16 Z Ω |∇u(t)|2dx + C1 Z Ω Z t 0 g(t −s)|∇u(t) −∇u(s)|ds 2 dx −C1 Z Ω Z t 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx, (2.6) (2.6) where t0 a positive large number so that where t0 a positive large number so that Z t0 0 g(s)ds = 3G(0) 4 . Proof. By (2.5), we obtain Proof. By (2.5), we obtain d dtF2(t) = − 1 ρ + 1 Z t 0 g(s)ds Z Ω |ut(t)|ρ+2dx + Z t 0 g(s)ds Z Ω ut(t)∆ut(t)dx + Z Ω ut Z t 0 g′(t −s)(∆u(t) −∆u(s)) ds dx − 1 ρ + 1 Z Ω |ut|ρut Z t 0 g′(t −s)(u(t) −u(s)) ds dx −  1 − Z t 0 g(s)ds  Z Ω ∆u(t) · Z t 0 g(t −s)(u(t) −u(s)) ds dx − Z Ω Z t 0 g(t −s)(∆u(t) −∆u(s))ds Z t 0 g(t −s)(u(t) −u(s)) ds dx = − 1 ρ + 1 Z t 0 g(s)ds Z Ω |ut(t)|ρ+2dx − Z t 0 g(s)ds Z Ω |∇ut(t)|2dx − Z Ω ∇ut · Z t 0 g′(t −s)(∇u(t) −∇u(s)) ds dx − 1 ρ + 1 Z Ω |ut|ρut Z t 0 g′(t −s)(u(t) −u(s)) ds dx +  1 − Z t 0 g(s)ds  Z Ω ∇u(t) · Z t 0 g(t −s)(∇u(t) −∇u(s)) ds dx + Z Ω  Z t 0 g(t −s)|∇u(t) −∇u(s)|ds 2 dx. (2.7) (2.7) − 1 ρ + 1 Z Ω |ut|ρut Z 0 g′(t −s)(u(t) −u(s)) ds dx +  1 − Z t 0 g(s)ds  Z Ω ∇u(t) · Z t 0 g(t −s)(∇u(t) −∇u(s)) ds dx + Z Ω  Z t 0 g(t −s)|∇u(t) −∇u(s)|ds 2 dx. Next, let us to estimate the third, fourth and fifth terms on the right of (2.7). First we estimate the fourth term. By Young’s and Holder’s inequality, for any ζ1 > 0, we have − 1 ρ + 1 Z Ω |ut|ρut Z t 0 g′(t −s)(u(t) −u(s)) ds dx K. P. JIN, J. LIANG, T.-J. XIAO EJDE-2020/85 6 ≤ 1 ρ + 1ζ1 Z Ω |ut|2ρ+2dx − g(0) 4ζ1(ρ + 1) Z Ω Z t 0 g′(t −s)|u(t) −u(s)|2 ds dx. 2. Basic estimates By (A1), (A2) and the Sobolev embedding inequality, we obtain By (A1), (A2) and the Sobolev embedding inequality, we obtain Z Ω |ut|2ρ+2dx ≤Cs(2E(0))ρ Z Ω |∇ut|2dx . By Poincar´e’s inequality, we have By Poincar´e’s inequality, we have − Z Ω Z t 0 g′(t −s)|u(t) −u(s)|2 ds dx ≤−Cp Z Ω Z t 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx, where Cp is the Poincar´e’s constant and Cs the Sobolev embedding constant. There- fore, where Cp is the Poincar´e’s constant and Cs the Sobolev embedding constant. There- fore, − 1 ρ + 1 Z Ω |ut|ρut Z t 0 g′(t −s)(u(t) −u(s)) ds dx ≤ Cs ρ + 1(2E(0))ρζ1 Z Ω |∇ut|2dx − g(0)Cp 4ζ1(ρ + 1) Z Ω Z t 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx. (2.8) (2.8) Now, we estimate the third and fifth terms. It is not hard to see that, for any ζ2, ζ3 > 0, − Z Ω ∇ut · Z t 0 g′(t −s)(∇u(t) −∇u(s)) ds dx ≤ζ2 Z Ω |∇ut|2dx −g(0) 4ζ2 Z Ω Z t 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx, (2.9) (2.9) and  1 − Z t 0 g(s)ds  Z Ω ∇u(t) · Z t 0 g(t −s)(∇u(t) −∇u(s)) ds dx ≤ζ3 Z Ω |∇u(t)|2dx + 1 4ζ3 Z Ω  Z t 0 g(t −s)|∇u(t) −∇u(s)|ds 2 dx. (2.10) (2.10) Thus, combining (2.8), (2.9), (2.10) with (2.7), we know that Thus, combining (2.8), (2.9), (2.10) with (2.7), we know that d dtF2(t) d dtF2(t) ≤− 1 ρ + 1 Z t 0 g(s)ds Z Ω |ut(t)|ρ+2dx −  Z t 0 g(s)ds −ζ2 − Cs ρ + 1(2E(0))ρζ1  Z Ω |∇ut(t)|2dx − g(0) 4ζ2 + g(0)Cp 4ζ1(ρ + 1)  Z Ω Z t 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx + ζ3 Z Ω |∇u(t)|2dx +  1 + 1 4ζ3  Z Ω  Z t 0 g(t −s)|∇u(t) −∇u(s)|ds 2 dx. Setting ζ1 = (ρ + 1)G(0) 8Cs(2E(0))ρ , ζ2 = G(0) 8 , ζ3 = µ0G(0) 16 , ζ1 = (ρ + 1)G(0) 8Cs(2E(0))ρ , □ we obtain the estimate (2.6). This completes the proof. we obtain the estimate (2.6). This completes the proof. we obtain the estimate (2.6). This completes the proof. □ EJDE-2020/85 EJDE-2020/85 STABILITY OF VISCOELASTIC EQUATIONS 7 3. Main results and their proofs We firstly state an existence and uniqueness result for problem (1.1), which can be proved by using similar arguments as in [4, 15] so we omit it here. Theorem 3.1. Let (A1) and (A2) hold. Then for any u0 ∈H1 0(Ω), u1 ∈H1 0(Ω), the problem (1.1) has a unique global solution on [0, ∞) with the regularity u ∈C1 R+; H1 0(Ω)  . We introduce the energy functional E(t) := 1 ρ + 2 Z Ω |ut|ρ+2dx + 1 2 Z Ω |∇ut|2dx + 1 2  1 − Z t 0 g(s)ds  Z Ω |∇u|2dx + 1 2 Z Ω Z t 0 g(t −s)|∇u(t) −∇u(s)|2 ds dx. (3.1) E(t) := 1 ρ + 2 Z Ω |ut|ρ+2dx + 1 2 Z Ω |∇ut|2dx + 1 2  1 − Z t 0 g(s)ds  Z Ω |∇u|2dx t (3.1 (3.1) + 1 2 Z Ω Z t 0 g(t −s)|∇u(t) −∇u(s)|2 ds dx. ( ) + 1 2 Z Ω Z t 0 g(t −s)|∇u(t) −∇u(s)|2 ds dx. ( ) Then, for t ≥0, Then, for t ≥0, d dtE(t) = −1 2g(t) Z Ω |∇u|2dx + 1 2 Z Ω Z t 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx ≤1 2 Z Ω Z t 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx, (3.2) nd E(t) ∼ Z Ω |ut|ρ+2 + |∇ut|2 + |∇u|2 dx + Z Ω Z t 0 g(t −s)|∇u(t) −∇u(s)|2 ds dx. (3.3) h f ll i i l if d th f th l ti f b d dtE(t) = −1 2g(t) Z Ω |∇u|2dx + 1 2 Z Ω Z t 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx 1 Z Z t (3.2) d dtE(t) = −1 2g(t) Z Ω |∇u|2dx + 1 2 Z Ω Z t 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx ≤1 2 Z Ω Z t 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx, (3.2) nd (3.2) and and E(t) ∼ Z Ω |ut|ρ+2 + |∇ut|2 + |∇u|2 dx + Z Ω Z t 0 g(t −s)|∇u(t) −∇u(s)|2 ds dx. (3.3) (3.3) Z Ω Z 0 The following is our general uniform decay theorem for the solution energy of prob- lem (1.1). Theorem 3.2. Let (A1) and (A2) hold. 3. Main results and their proofs Then, for u0, u1 ∈H1 0(Ω), the solution energy E(t) of the problem (1.1) satisfies Z +∞ 0 E(t) ≤CE(0), t ≥0, E(t) ≤CE(0)(t + 1)−1, t ≥0, where C > 0 is a constant. where C > 0 is a constant. Proof. The proof is mainly based on the construction of an auxiliary function L(t) satisfying L(t0) ≤CE(0), L(t) ≥0, t ≥0, and and d dtL(t) ≤−ϵ0E(t), t ≥t0. (3.4) d dtL(t) ≤−ϵ0E(t), t ≥t0. (3.4) Clearly, integrating (3.4) we obtain the desired estimate. Now, we apply the lemmas obtained in the previous section to construct this auxiliary function L(t). We define J(t) := NE(t) + F1(t) + 4 G(0)F2(t). By the definitions of F1(t) and F2(t) and a simple calculation, we see that, there is a constant c0 > 0 such that, for t ≥0, |F1(t)|, |F1(t)| ≤c0E(t). |F1(t)|, |F1(t)| ≤c0E(t). K. P. JIN, J. LIANG, T.-J. XIAO EJDE-2020/85 8 Taking N > 8C1/G(0) large enough, we obtain c1E(t) ≤J(t) ≤c2E(t), t ≥0, Taking N > 8C1/G(0) large enough, we obtain Taking N > 8C1/G(0) large enough, we obtain c1E(t) ≤J(t) ≤c2E(t), t ≥0, where c1, c2 > 0 are constants. , Thus, by (2.4), (2.6) and (3.2), for t ≥t0, we have d dtJ(t) ≤−µ0 4 Z Ω |∇u(t)|2dx − 1 ρ + 1 Z Ω |ut(t)|ρ+2dx − Z Ω |∇ut|2dx +  4C1 G(0) + 1 2µ0  Z Ω  Z t 0 g(t −s)|∇u(t) −∇u(s)|ds 2 dx. (3.5) (3.5) Moreover, Z Ω  Z t 0 g(t −s)|∇u(t) −∇u(s)|ds 2 dx ≤ Z Ω Z t 0 g(s) Kδ(s)ds Z t 0 Kδ(t −s)g(t −s)|∇u(t) −∇u(s)|2 ds dx ≤M(δ) Z Ω Z t 0 Kδ(t −s)g(t −s)|∇u(t) −∇u(s)|2 ds dx. Hence, by (3.5), for t ≥t0, we see that Hence, by (3.5), for t ≥t0, we see that d dtJ(t) ≤−µ0 4 Z Ω |∇u(t)|2dx − 1 ρ + 1 Z Ω |ut(t)|ρ+2dx − Z Ω |∇ut|2dx +  4C1 G(0) + 1 2µ0  M(δ) Z Ω Z t 0 Kδ(t −s)g(t −s)|∇u(t) −∇u(s)|2 ds dx. (3.6) dt ≤−µ0 4 Z Ω |∇u(t)|2dx − 1 ρ + 1 Z Ω |ut(t)|ρ+2dx − Z Ω |∇ut|2dx +  4C1 G(0) + 1 2µ0  M(δ) Z Ω Z t 0 Kδ(t −s)g(t −s)|∇u(t) −∇u(s)|2 ds dx. 3. Main results and their proofs (3.6) (3.6) Now we define Now we define L(t) := J(t) + µ0 32G(0)I1(t) + 2  4C1 G(0) + 1 2µ0  I2(t). Then, by (2.1), (2.2) and (3.6), for t ≥t0, we obtain d dtL(t) ≤− 3µ0 16 −4G(0)  4C1 G(0) + 1 2µ0  δM(δ)  Z Ω |∇u(t)|2dx − 1 ρ + 1 Z Ω |ut(t)|ρ+2dx − Z Ω |∇ut|2dx − µ0 64G(0) Z Ω Z t 0 g(t −s)|∇u(t) −∇u(s)|2 ds dx. (3.7) (3.7) − µ0 64G(0) Z Ω Z t 0 g(t −s)|∇u(t) −∇u(s)|2 ds dx. Convergence (2.3) shows that there exists δ0 > 0 such that, for any 0 < δ < δ0, Convergence (2.3) shows that there exists δ0 > 0 such that, for any 0 < δ < δ0, δM(δ) ≤ µ0 64G(0) 4C1 G(0) + 1 2µ0 . Thus, by (3.7) and (3.3), we deduce that, for 0 < δ < δ0, there exists a constant ϵ0 > 0 such that, for t ≥t0, d dtL(t) ≤−ϵ0E(t). (3.8) (3.8) STABILITY OF VISCOELASTIC EQUATIONS EJDE-2020/85 9 Since L(t) ≥0 for t ≥0, and L(t0) ≤CE(0), it follows by integrating (3.8) over [t0, τ) that for any τ > t0, Since L(t) ≥0 for t ≥0, and L(t0) ≤CE(0), it follows by integrating (3.8) over [t0, τ) that for any τ > t0, Z τ t0 E(t)dt ≤CE(0). Z τ t0 E(t)dt ≤CE(0). So, Z +∞ 0 E(t)dt ≤CE(0). (3.9) (3.9) Noting that E′(t) ≤0, by(3.9), we obtain E(t) ≤CE(0)(t + 1)−1, t ≥0. This completes the proof. □ □ This completes the proof. Remark 3.3. (1) As showed in Theorem 3.2, the polynomial decay rates can be obtained without the control conditions on g′(t) used previously. There are many functions g(t) satisfying the assumptions (A2) without satisfying the previous restriction that g(t) controls g′(t) as in (1.2), (1.3) and (1.4). For example, if g(t) = √ 2 + sin t  e−t, t ≥0, then g′(t) = − √ 2 −cos t + sin t  e−t = − √ 2 1 −cos(t + π 4 )  e−t, t ≥0. Clearly, g′(t) ≤0, for t ≥0; g′(t) = 0, for t = 2kπ −π 4 , k = 1, 2, . . . . Hence, g(t) satisfies (A2), while g(t) does not satisfy (1.2), (1.3) or (1.4). That is, g′(t) is not controlled by g(t). 3. Main results and their proofs Hence, g(t) satisfies (A2), while g(t) does not satisfy (1.2), (1.3) or (1.4). That is, g′(t) is not controlled by g(t). Functions g(t) as above have not been studied in the literature. However, we can treat the problem (1.1) with these general relaxation functions, and according to Theorem 3.2 here, we know the energy E(t) of problem (1.1) decays at least at the rate (t + 1)−1. ( ) (2) The decay rates given in Theorem 3.2 are optimal in a sense according to [13, Example 3.1, Remark 3.2] and [8, Remark 3.3(ii)]. When the derivative g′(s) is controlled by the relaxation function g(t), we can prove the following results. Theorem 3.4. Let (A1) and (A2) hold, and g′(t) ≤−ξ(t)gp(t), t ≥0, (3.10) (3.10) g′(t) ≤−ξ(t)gp(t), t ≥0, (3.10) where ξ(t) : R+ →R+ is a non-increasing differentiable function with ξ(0) > 0 and 1 ≤p < 2 is a constant. Then there are constants C, η > 0 such that for t ≥0, where ξ(t) : R+ →R+ is a non-increasing differentiable function with ξ(0) > 0 and 1 ≤p < 2 is a constant. Then there are constants C, η > 0 such that for t ≥0, E(t) ≤    CE(0)e−η R t 0 ξ(s)ds, p = 1, CE(0)  1 1+ R t 0 ξ(s)ds  1 p−1 1 < p < 2. (3.11) (3.11) / K. P. JIN, J. LIANG, T.-J. XIAO 10 EJDE-2020/85 EJDE-2020/85 Proof. A key idea in the proof is to construct a Lyapunov function satisfying R(t) ∼ E(t) and Proof. A key idea in the proof is to construct a Lyapunov function satisfying R(t) ∼ E(t) and d dtR(t) ≤−ϵ2ξ(t)Rp(t). dt To find this function, we will use the results of Theorem 3.2 and J(t) defined above. Clearly, Z Ω  Z t 0 g(t −s)|∇u(t) −∇u(s)|ds 2 dx ≤G(0) Z Ω Z t 0 g(t −s)|∇u(t) −∇u(s)|2 ds dx. Thus, by (3.5) and (3.3), for t ≥t0, we have d dtJ(t) ≤−ϵ1E(t) + C2 Z Ω Z t 0 g(t −s)|∇u(t) −∇u(s)|2 ds dx, (3.12) 0 i t t (3.12) where ϵ1 > 0 is a constant. where ϵ1 > 0 is a constant. On the other hand, by Theorem 3.2, we know that Z +∞ 0 E(t)dt ≤CE(0), and E(t) ≤CE(0)(t + 1)−1. ∞ E(t)dt ≤CE(0), and E(t) ≤CE(0)(t + 1)−1. 3. Main results and their proofs Since Since Z Ω Z t 0 g(t −s)|∇u(t) −∇u(s)|2 ds dx ≤  Z t 0 Z Ω |∇u(t) −∇u(s)|2dxds 1−1 p  Z Ω Z t 0 gp(t −s)|∇u(t) −∇u(s)|2 ds dx 1/p ≤C  Z t 0 (E(t) + E(s))ds 1−1 p  Z Ω Z t 0 gp(t −s)|∇u(t) −∇u(s)|2 ds dx 1/p ≤CE1−1 p (0)  Z Ω Z t 0 gp(t −s)|∇u(t) −∇u(s)|2 ds dx 1/p , Z t 0 g(t −s)|∇u(t) −∇u(s)|2 ds dx by (3.12) it follows that for t ≥t0, by (3.12) it follows that for t ≥t0, d dtJ(t) ≤−ϵ1E(t)+C3E1−1 p (0)  Z Ω Z t 0 gp(t−s)|∇u(t)−∇u(s)|2 ds dx 1/p . (3.13) Multiplying (3.13) by ξ(t)Ep−1(t), for t ≥t0, we obtain Multiplying (3.13) by ξ(t)Ep−1(t), for t ≥t0, we obtain ξ(t)Ep−1(t) d dtJ(t) ≤−ϵ1ξ(t)Ep(t) ξ(t)Ep−1(t) d dtJ(t) ≤−ϵ1ξ(t)Ep(t) + C3E1−1 p (0)ξ(t)Ep−1(t)  Z Ω Z t 0 gp(t −s)|∇u(t) −∇u(s)|2 ds dx 1/p ≤−ϵ1 2 ξ(t)Ep(t) + C4ξ(t) Z Ω Z t 0 gp(t −s)|∇u(t) −∇u(s)|2 ds dx. (3.14) + C3E1−1 p (0)ξ(t)Ep−1(t)  Z Ω Z t 0 gp(t −s)|∇u(t) −∇u(s)|2 ds dx 1/p ≤−ϵ1 2 ξ(t)Ep(t) + C4ξ(t) Z Ω Z t 0 gp(t −s)|∇u(t) −∇u(s)|2 ds dx. (3.14) Since ξ(t), E(t) are non-increasing functions, from (3.10) it follows that for t ≥0, d ξ(t)Ep−1(t)J(t)  = ξ(t)Ep−1(t) d J(t) + J(t) d ξ(t)Ep−1(t)  Since ξ(t), E(t) are non-increasing functions, from (3.10) it follows that for t ≥0, d d d Since ξ(t), E(t) are non-increasing functions, from (3.10) it follows that for t ≥0, d dt ξ(t)Ep−1(t)J(t)  = ξ(t)Ep−1(t) d dtJ(t) + J(t) d dt ξ(t)Ep−1(t)  ≤ξ(t)Ep−1(t) d dtJ(t), Since ξ(t), E(t) are non-increasing functions, from (3.10) it follows that for t ≥0, d dt ξ(t)Ep−1(t)J(t)  = ξ(t)Ep−1(t) d dtJ(t) + J(t) d dt ξ(t)Ep−1(t)  ≤ξ(t)Ep−1(t) d dtJ(t), ≤ξ(t)Ep−1(t) d dtJ(t), STABILITY OF VISCOELASTIC EQUATIONS EJDE-2020/85 STABILITY OF VISCOELASTIC EQUATIONS 11 EJDE-2020/85 and and ξ(t) Z Ω Z t 0 gp(t −s)|∇u(t) −∇u(s)|2 ds dx ≤ Z Ω Z t 0 ξ(t −s)gp(t −s)|∇u(t) −∇u(s)|2 ds dx ≤− Z Ω Z t 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx ≤−2 d dtE(t). Hence, by (3.14), for t ≥t0, we have d dt ξ(t)Ep−1(t)J(t) + 2C4E(t)  ≤−ϵ1 2 ξ(t)Ep(t). (3.15) Hence, by (3.14), for t ≥t0, we have d dt ξ(t)Ep−1(t)J(t) + 2C4E(t)  ≤−ϵ1 2 ξ(t)Ep(t). (2) The decay rates given in Theorem 3.4 are optimal in according to [13, Ex- ample 3.1, Remark 3.2] and [8, Remark 3.3(ii)]. 3. Main results and their proofs (3.15) (3.15) Now, we define ow, we de e R(t) := ξ(t)Ep−1(t)J(t) + 2C4E(t). Then, R(t) ∼E(t). By (3.15), for t ≥t0, we obtain , R(t) := ξ(t)Ep−1(t)J(t) + 2C4E(t). Then, R(t) ∼E(t). By (3.15), for t ≥t0, we obtain d dtR(t) ≤−ϵ2ξ(t)Rp(t), □ where ϵ2 > 0 is a constant. This completes the proof. □ where ϵ2 > 0 is a constant. This completes the proof. where ϵ2 > 0 is a constant. This completes the proof. □ Remark 3.5. (1) Theorem 3.4 extends the results in [13, 14, 16], where g′(t) was assumed to satisfy (3.10) with p ∈[1, 3/2), since Theorem 3.4 holds for all p ∈[1, 2). Moreover, the decay rates obtained in [13] are Remark 3.5. (1) Theorem 3.4 extends the results in [13, 14, 16], where g′(t) was assumed to satisfy (3.10) with p ∈[1, 3/2), since Theorem 3.4 holds for all p ∈[1, 2). Moreover, the decay rates obtained in [13] are E(t) ≤Ke−λ R t t0 ξ(s)ds, p = 1, E(t) ≤K  1 1 + R t t0 ξ2p−1(s)ds  1 2p−2 , 1 < p < 3 2. In addition, if Z +∞ 0  1 tξ2p−1(t) + 1  dt < +∞, 1 < p < 3 2, (3.16) (3.16) reference [13] shows the improved estimate E(t) ≤K  1 1 + R t t0 ξp(s)ds  1 p−1 , 1 < p < 3 2. Since ξ(t) is nonnegative and non-increasing, it is clear that ξp(s) ≲ξ(s), and then  1 1 + R t 0 ξ(s)ds  1 p−1 ≲  1 1 + R t t0 ξp(s)ds  1 p−1 . Therefore, the decay rates given in Theorem 3.4 is stronger than the previous conclusion in the [13, Theorem 3.1] for all p ∈[1, 2). On the other hand, we obtain the stronger estimate without the other restrictions on ξ(t) (as (3.16) in [13, Theorem 3.1]). As can be seen, Theorem 3.4 here give stronger conclusions essentially under weaker conditions on g(t). (2) The decay rates given in Theorem 3.4 are optimal in according to [13, Ex- ample 3.1, Remark 3.2] and [8, Remark 3.3(ii)]. K. P. JIN, J. LIANG, T.-J. XIAO 12 Theorem 3.6. Let the assumptions of Theorem 3.2 hold, and g′(t) ≤−H(g(t)), t ≥0, (3.17) Theorem 3.6. 3. Main results and their proofs Let the assumptions of Theorem 3.2 hold, and g′(t) ≤−H(g(t)), t ≥0, (3.17) (3.17) where H ∈C1 (R+) is a positive function with H(0) = 0, and it is also a linear or strictly increasing and strictly convex C2 function on (0, r], for some r < 1. Then there are constants k1, k2, k3, ε0 > 0 such that where H ∈C1 (R+) is a positive function with H(0) = 0, and it is also a linear or strictly increasing and strictly convex C2 function on (0, r], for some r < 1. Then there are constants k1, k2, k3, ε0 > 0 such that E(t) ≤k3G−1(k1t + k2), t ≥0, (3.18) E(t) ≤k3G−1(k1t + k2), t ≥0, (3.18) where G(t) = Z 1 t 1 sH′(ε0s)ds. E(t) ≤k3G−1(k1t + k2), t ≥0, (3.18) h (3.18) where Proof. By Theorem 3.2, we obtain Proof. By Theorem 3.2, we obtain Z +∞ 0 E(t)dt ≤CE(0) and E(t) ≤CE(0)(t + 1)−1. So, Z Ω Z t 0 |∇u(t) −∇u(s)|2 ds dx ≤CE(0) < +∞. (3.19) (3.19) According to (3.17) and (3.19), we can and do take t1 > t0 large enough such that for any t ≥t1, According to (3.17) and (3.19), we can and do take t1 > t0 large enough such that for any t ≥t1, Z Ω Z t t1 |∇u(t) −∇u(s)|2 ds dx < min{r, H(r)}, (3.20) − Z Ω Z t−t1 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx < min{r, H(r)}, (3.21) Z Ω Z t−t1 0 g(t −s)|∇u(t) −∇u(s)|2 ds dx < min{r, H(r)}, (3.22) max{g(t), −g′(t)} < min{r, H(r)}. (3.23) Z Ω Z t t1 |∇u(t) −∇u(s)|2 ds dx < min{r, H(r)}, (3.20) (3.20) (3.23) Using (3.17), (3.20)-(3.23) and Jensen’s inequality, for t ≥t1, we obtain Using (3.17), (3.20)-(3.23) and Jensen’s inequality, for t ≥t1, we obtain − Z Ω Z t−t1 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx ≥ Z Ω Z t−t1 0 H(g(t −s))|∇u(t) −∇u(s)|2 ds dx ≥H  Z Ω Z t−t1 0 g(t −s)|∇u(t) −∇u(s)|2 ds dx  . (3.24) (3.24) Then for t ≥t1, Z Ω Z t−t1 0 g(t −s)|∇u(t) −∇u(s)|2 ds dx ≤H−1 − Z Ω Z t−t1 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx  . (3.25) (3.25) Moreover, by [14, P. 3. Main results and their proofs 1860, equation (3.24)], for t ≥t1, we obtain d dtW1(t) ≤−ϵ3E(t) + C5 Z Ω Z t−t1 0 g(t −s)|∇u(t) −∇u(s)|2 ds dx, (3.26) (3.26) where W1(t) ∼E(t) and ϵ3 > 0 is a constant. where W1(t) ∼E(t) and ϵ3 > 0 is a constant. where W1(t) ∼E(t) and ϵ3 > 0 is a constant. STABILITY OF VISCOELASTIC EQUATIONS EJDE-2020/85 13 By (3.25) and (3.26), for t ≥t1, we have d dtW1(t) ≤−ϵ3E(t) + C5H−1 − Z Ω Z t−t1 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx  . (3.27) By (3.25) and (3.26), for t ≥t1, we have By (3.25) and (3.26), for t ≥t1, we have d dtW1(t) (3.27) dt ≤−ϵ3E(t) + C5H−1 − Z Ω Z t−t1 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx  . (3.27) Now, we define W2(t) := H′ ε0 E(t) E(0)  W1(t) + ME(t), ( ) where 0 < ε0 < r, M > 0 are constants, which will be specific later. where 0 < ε0 < r, M > 0 are constants, which will be specific later. Clearly W2(t) ∼E(t) because of the assumption on H Therefore where 0 < ε0 < r, M > 0 are constants, which will be specific later. Clearly, W2(t) ∼E(t) because of the assumption on H. Therefore, for t ≥t1, 0 , , p Clearly, W2(t) ∼E(t) because of the assumption on H. Therefore, for t ≥t1, d dtW2(t) d dtW2(t) = H′ ε0 E(t) E(0)  d dtW1(t) + ε0 E′(t) E(0) H′′ ε0 E(t) E(0)  W1(t) + ME′(t) ≤C5H′ ε0 E(t) E(0)  H−1 − Z Ω Z t−t1 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx  −ϵ3E(t)H′ ε0 E(t) E(0)  + ME′(t), (3.28) (3.28) where we have used E′(t) ≤0, H′′ ≥0, and (3.27). where we have used E′(t) ≤0, H′′ ≥0, and (3.27). where we have used E′(t) ≤0, H′′ ≥0, and (3.27). ( ) , , ( ) Next, we estimate the first term on the right of (3.28). Let H⋆be the convex conjugate of H in the sense of Young (see [2, P. 61-64] and [14, P. 1863]). Then H⋆(s) = s(H′)−1(s) −H[(H′)−1(s)], s ∈(0, H′(r)), (3.29) and it satisfies ab ≤H⋆(a) + H(b), for a ∈(0, H′(r)], b ∈(0, r]. 3. Main results and their proofs (3.30) (3.30) Setting a = H′ ε0 E(t) E(0)  , b = H−1 − Z Ω Z t−t1 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx  , and using (3.29), (3.30) and (3.21), we obtain and using (3.29), (3.30) and (3.21), we obtain H′ ε0 E(t) E(0)  H−1 − Z Ω Z t−t1 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx  ≤H⋆ H′ ε0 E(t) E(0)  − Z Ω Z t−t1 0 g′(t −s)|∇u(t) −∇u(s)|2 ds dx ≤ε0 E(t) E(0)H′ ε0 E(t) E(0)  −2E′(t). (3.31) (3.31) From (3.28) and (3.31), it follows that for t ≥t1, d dtW2(t) ≤−(ϵ3E(0) −C5ε0) E(t) E(0)H′ ε0 E(t) E(0)  + (M −2C5)E′(t). (3.32) (3.32) Therefore, if we take M > 0 large enough and ε0 > 0 small sufficiently, then we obtain, for t ≥t1, Therefore, if we take M > 0 large enough and ε0 > 0 small sufficiently, then we obtain, for t ≥t1, d dtW2(t) ≤−ϵ4 eH  E(t) E(0)  , (3.33) (3.33) K. P. JIN, J. LIANG, T.-J. XIAO EJDE-2020/85 14 where ϵ4 > 0 is a constant and eH(t) = tH′(ε0t). We define W(t) := γ W2(t) E(0) , where γ > 0 small enough such that where γ > 0 small enough such that where γ > 0 small enough such that where γ > 0 small enough such that W(t) < E(t) E(0). W(t) < E(t) E(0). W(t) < E(t) E(0). Clearly, W(t) ∼E(t) ∼W2(t), and eH(t), eH′(t) ≥0. So, by (3.33), we know that there exists ϵ5 > 0 such that for t ≥t1 Clearly, W(t) ∼E(t) ∼W2(t), and eH(t), eH′(t) ≥0. So, by (3.33), we know that there exists ϵ5 > 0 such that for t ≥t1 d dtW(t) ≤−ϵ5 eH (W(t)) . (3.34) (3.34) □ This gives the estimate (3.18). Thus the proof is complete. □ This gives the estimate (3.18). Thus the proof is complete. □ Remark 3.7. In [14, Theorem 3.1], if the relaxation function g(t) satisfies (3.17), then the decay rate is E(t) ≤k3H−1 1 (k1t + k2), t ≥0. E(t) ≤k3H−1 1 (k1t + k2), t ≥0. Detailed information about H1 can be found in [14, Theorem 3.1]. In addition, if Z 1 0 H1(t)dt < +∞, (3.35) (3.35) hen the improved estimate (3.18) iss obtained then the improved estimate (3.18) iss obtained. then the improved estimate (3.18) iss obtained. 3. Main results and their proofs As showed in Theorem 3.6, the improved estimate (3.18) is directly obtained without the extra assumption condition (3.35) (except (3.17)). Therefore, Theorem 3.6 improves [14, Theorem 3.1] essentially, with weaker conditions on the relaxation function. Moreover, Theorem 3.6 gives stronger conclusions. Acknowledgments. The work was supported by the NSF of China (11771091, 11971306, 11831011), by the China Postdoctoral Science Foundation (2018M632094), and by the Shanghai Key Laboratory for Contemporary Applied Mathematics (08DZ2271900). Acknowledgments. The work was supported by the NSF of China (11771091, 11971306, 11831011), by the China Postdoctoral Science Foundation (2018M632094), and by the Shanghai Key Laboratory for Contemporary Applied Mathematics (08DZ2271900). [8] K. P. Jin, J. Liang, T. J. Xiao; Coupled second order evolution equations with fading memory: Optimal energy decay rate, J. Differential Equations, 257(4) (2014), 1501–1528. References [1] R. O. Araujo, T. F. Ma, Y. Qin; Long-time behavior of a quasilinear viscoelastic equation with past history, J. Differential Equations, 254(10) (2013), 4066–4087. [ ] with past history, J. Differential Equations, 254(10) (2013), 4066–4087. [2] V I Arnold; Mathematical Methods of Classical Mechanics Springer-Verlag New York [2] V. I. Arnold; Mathematical Methods of Classical Mechanics, Springer-Verlag, New York, 1989. [3] A. N. Carvalho, J. W. Cholewa, T. Dlotko; Strongly damped wave problems: bootstrapping and regularity of solutions, J. Differential Equations, 244(9) (2008), 2310–2333. [4] M. M. Cavalcanti, V. N. D. Cavalcanti, J. Ferreira; Existence and uniform decay for nonlinear viscoelastic equation with strong damping, Math. Methods Appl. Sci., 24 (2001), 1043–1053. [5] M. M. Cavalcanti, V. N. Domingos Cavalcanti, F. A. F. Nascimento, I. Lasiecka; Intrinsic de- cay rate estimates for the wave equation with competing viscoelastic and frictional dissipative effects, Discrete Contin. Dyn. Syst. Ser. B, 19(7) (2014), 1987–2012. [6] B. W. Feng; General decay rates for a viscoelastic wave equation with dynamic boundary conditions and past history, Mediterr. J. Math., 15 (2018), Article 103. [7] Y. Gao, J. Liang, T. J. Xiao; A new method to obtain uniform decay rates for multidimen- sional wave equations with nonlinear acoustic boundary conditions, SIAM J. Control Optim., 56(2) (2018), 1303–1320. [8] K. P. Jin, J. Liang, T. J. Xiao; Coupled second order evolution equations with fading memory: Optimal energy decay rate, J. Differential Equations, 257(4) (2014), 1501–1528. STABILITY OF VISCOELASTIC EQUATIONS 15 EJDE-2020/85 [9] K. P. Jin, J. Liang, T. J. Xiao; Uniform stability of semilinear wave equations with arbitrary local memory effects versus frictional dampings. J. Differential Equations, 266 (2019), 7230– 7263. [10] K. P. Jin, J. Liang, T. J. Xiao; Asymptotic behavior for coupled systems of second order abstract evolution equations with one infinite memory, J. Math. Anal. Appl., 475(1) (2019), 554–575. [11] M. Kafini; Rate of decay for solutions of viscoelastic evolution equations, Electron. J. Differ- ential Equations, 2013 (134) (2013), 1–17. [12] Y. X. Li; Existence and asymptotic stability of periodic solution for evolution equations with delays, J. Funct. Anal., 261(5) (2011), 1309–1324. [13] S. A. Messaoudi, W. Al-Khulaifi; General and optimal decay for a quasilinear viscoelastic equation, Appl. Math. Lett., 66 (2017), 16–22. [14] S. A. Messaoudi, M. I. Mustafa; A general stability result for a quasilinear wave equation with memory, Nonlinear Anal. Real World Appl., 14(4) (2013), 1854–1864. [15] S. A. Messaoudi, N.-E. References Tatar; Global existence and uniform stability of solutions for a quasi- linear viscoelastic problem, Math. Methods Appl. Sci. 30 (2007), 665–680. [16] S. A. Messaoudi, N.-E. Tatar; Exponential and polynomial decay for a quasilinear viscoelastic equation, Nonlinear Anal. 68 (2008), 785–793. [17] M. I. Mustafa, G. A. Abusharkh; Plate equations with frictional and viscoelastic dampings, Appl. Anal. 96(7) (2017), 1170–1187. [18] J. E. Mu˜noz Rivera, M. G. Naso; Asymptotic stability of semigroups associated with linear weak dissipative systems with memory, J. Math. Anal. Appl. 326(1) (2007), 691–707. [19] A. Peyravi; General decay and blow up of solutions for a system of viscoelastic wave equations with nonlinear boundary source terms, J. Math. Anal. Appl. 451(2) (2017), 1056–1076. [20] T. J. Xiao, J. Liang; The Cauchy Problem for Higher-Order Abstract Differential Equations, Lecture Notes in Mathematics, 1701, Springer, Berlin, Germany, 1998. [21] T. J. Xiao, J. Liang; A solution to an open problem for wave equations with generalized Wentzell boundary conditions, Math. Ann., 327 (2003), 351–363. ( ) [22] T. J. Xiao, J. Liang; Second order differential operators with Feller-Wentzell type boundary conditions, J. Funct. Anal., 254 (2008), 1467–1486. ( ) [23] T. J. Xiao, J. Liang; Coupled second order semilinear evolution equations indirectly damped via memory effects, J. Differential Equations, 254(5) (2013), 2128–2157. [24] Q. L. Zhang; Stability of Riemann solutions to pressureless Euler equations with Coulomb- type friction by flux approximation, Electron. J. Differential Equations, 2019 (65) (2019), 1–22. Kun-Peng Jin School of Science, Chongqing University of Posts and Telecommunications, Chongqing 400065, China Kun-Peng Jin School of Science, Chongqing University of Posts and Telecommunications, Chongqing 400065, China Email address: kjin11@fudan.edu.cn Email address: kjin11@fudan.edu.cn Jin Liang (corresponding author) School of Mathematical Sciences, Shanghai Jiao Tong University, Shanghai 200240, China Jin Liang (corresponding author) School of Mathematical Sciences, Shanghai Jiao Tong University, Shanghai 200240, China J g (corr s o g u or) School of Mathematical Sciences, Shanghai Jiao Tong University, Shanghai 200240, China Email address: jinliang@sjtu.edu.cn Ti-Jun Xiao Shanghai Key Laboratory for Contemporary Applied Mathematics, School of Mathe- matical Sciences, Fudan University, Shanghai 200433, China Ti-Jun Xiao Shanghai Key Laboratory for Contemporary Applied Mathematics, School of Mathe- matical Sciences, Fudan University, Shanghai 200433, China Ti-Jun Xiao Shanghai Key Laboratory for Contemporary Applied Mathematics, School of Mathe- matical Sciences, Fudan University, Shanghai 200433, China Email address: tjxiao@fudan.edu.cn
https://openalex.org/W3195045201
https://www.frontiersin.org/articles/10.3389/fpsyg.2021.702106/pdf
English
null
A Web-Based Auditory and Visual Emotion Perception Task Experiment With Children and a Comparison of Lab Data and Web Data
Frontiers in psychology
2,021
cc-by
10,300
ORIGINAL RESEARCH published: 18 August 2021 doi: 10.3389/fpsyg.2021.702106 Edited by: Sho Tsuji, Edited by: Sho Tsuji, The University of Tokyo, Japan The University of Tokyo, Japan Reviewed by: Yang Yang, Nanyang Technological University, Singapore Paddy Ross, Durham University, United Kingdom *Correspondence: Akihiro Tanaka akih.tanaka@gmail.com Reviewed by: Yang Yang, Nanyang Technological University, Singapore Paddy Ross, Durham University, United Kingdom Yang Yang, Nanyang Technological University, Singapore Paddy Ross, Durham University, United Kingdom Paddy Ross, Durham University, United Kingdom *Correspondence: Akihiro Tanaka akih.tanaka@gmail.com *Correspondence: Akihiro Tanaka akih.tanaka@gmail.com Keywords: online experiments, emotion perception, cognitive development, auditory perception, visual perception, vocal expression, facial expression INTRODUCTION Specialty section: This article was submitted to Developmental Psychology, a section of the journal Frontiers in Psychology The COVID-19 pandemic that began in 2020 has forced people to move much of their daily, face-to-face communication online. Psychological experiments are no exception. Many behavioral scientists had to stop their research and decide whether to postpone it or to move it online. Although many researchers have been trying to conduct studies remotely, sufficient examination of the validity of online developmental research is absent to date. In the present study, we introduce an online trial of perception tasks for children. We conducted a simple experiment featuring an auditory and a visual emotion perception task using video chat and an online experiment platform with children (4–12 years old) and adult participants. We then examined the validity of these data (online data) with the data from our previous, similar laboratory trial (Kawahara et al., 2021). Received: 29 April 2021 Accepted: 19 July 2021 Published: 18 August 2021 A Web-Based Auditory and Visual Emotion Perception Task Experiment With Children and a Comparison of Lab Data and Web Data Hisako W. Yamamoto1,2, Misako Kawahara1,2 and Akihiro Tanaka1* 1 Tokyo Woman’s Christian University, Tokyo, Japan, 2 Japan Society for the Promotion of Science, Tokyo, Japan Due to the COVID-19 pandemic, the significance of online research has been rising in the field of psychology. However, online experiments with child participants are rare compared to those with adults. In this study, we investigated the validity of web- based experiments with child participants 4–12 years old and adult participants. They performed simple emotional perception tasks in an experiment designed and conducted on the Gorilla Experiment Builder platform. After short communication with each participant via Zoom videoconferencing software, participants performed the auditory task (judging emotion from vocal expression) and the visual task (judging emotion from facial expression). The data collected were compared with data collected in our previous similar laboratory experiment, and similar tendencies were found. For the auditory task in particular, we replicated differences in accuracy perceiving vocal expressions between age groups and also found the same native language advantage. Furthermore, we discuss the possibility of using online cognitive studies for future developmental studies. Citation: Moreover, even when participants remained until the end of the experiment, some of them, known as “satisfiers,” might not devote the cognitive effort in the tasks (Miura and Kobayashi, 2016). In addition to considering issues with online participants, we should consider the variety of their environments. In most of online studies, participants use their own devices. For this reason, while the validity of online data has been ensured for within-subject designs (e.g., Semmelmann and Weigelt, 2017), the case for between-subject design has not been clearly made. These factors may lead to greater variance in web experiments compared to lab experiments (Germine et al., 2012). Thus, while Internet-based experiments are easy to participate in, there may be some problems due to this ease (see Paolacci and Chandler, 2014). In this study, we report on our attempt at moving an experiment involving children’s perception tasks online. Our experiment consisted of video chat communication, and main tasks were controlled through the online experiment platforms. First, the experimenter communicated with the child participants and their parents via Zoom1 to check the child’s participation and to build rapport with them. Next, the experimenter guided participants to the browser experiment webpage built with Gorilla Experiment Builder2,3 (Anwyl-Irvine et al., 2020) and instructed them to engage in two simple emotion perception tasks. To investigate the validity of the obtained data, we compared web data for each task lab data for very similar tasks (Kawahara et al., 2021). We hypothesized that this online experiment method would reduce the issues usually associated with an online experiment. Specifically, we predicted that participants would perform as well in the online experiment as in the lab experiment and that the accuracy of each task would not differ between web and lab data. Now then, what is the situation with online research for child participants? We were able to find some trials and projects that shifted developmental research online. For example, Tran et al. (2017) tried to move an infant study online by recruiting participants through Amazon Mechanical Turk. They measured the length of time that 5–8-month-olds remained looking at various stimuli and reported success in capturing changes in their attention depending on the stimulus presented, even in an online data collection environment. Concerning behavioral measures, Klindt et al. Citation: Yamamoto HW, Kawahara M and Tanaka A (2021) A Web-Based Auditory and Visual Emotion Perception Task Experiment With Children and a Comparison of Lab Data and Web Data. Front. Psychol. 12:702106. doi: 10.3389/fpsyg.2021.702106 Even before the pandemic, online experiment research targeting adults was becoming popular due to its advantages. Unlike laboratory experiments, in which participants tend to be limited to residents around universities (e.g., Henrich et al., 2010), in online studies researchers can recruit participants without geographical constraints. Moreover, online experiments pair well with crowdsourcing services. Such services enable researchers to collect large amounts of data at low costs within a short time (Stewart et al., 2017). Such advantages have led many cognitive psychology August 2021 | Volume 12 | Article 702106 1 Frontiers in Psychology | www.frontiersin.org Online Perceptual Experiment With Children Yamamoto et al. researchers to adopt data collected through online experiments (e.g., Mills and D’Mello, 2014; Shin and Ma, 2016; Laeng et al., 2018; Lavan et al., 2018; McPherson and McDermott, 2018; Carbon, 2020). to choose online research to pursue their research questions? The lack of online developmental research may be caused by the following difficulties. First, it is difficult for participants to form a rapport with the experimenter during online experiments. A rapport is important for ensuring that child participants are as relaxed as possible while engaging in tasks. Second, we cannot always check whether a participant is really a child (and not an adult), and participant age is a critical factor in developmental research. Third, differences in performance between different aged participants may be difficult to observe because experiments with a between-subject design are not considered suitable for online research. However, as the pandemic continues, the benefits of online developmental research may surpass such disadvantages if we can ensure the data is valid. Thus, it is imperative to accumulate data from online developmental studies featuring various online tasks to determine its suitability for use in future research. However, can online experiments ensure the validity and quality of the data they generate? To answer this question, some studies have compared online cognitive experiment data with laboratory experiment data and reported their success in replicating results (e.g., Crump et al., 2013; Simcox and Fiez, 2014; de Leeuw and Motz, 2016). Previous studies have also demonstrated some disadvantages of online studies. One such problem is high dropout rates (Reips, 2002; Zhou and Fishbach, 2016). Frontiers in Psychology | www.frontiersin.org 1https://zoom.us/ 2https://gorilla.sc/ 3Anwyl-Irvine et al. (2020) showed that child participants had completed a flanker task created with Gorilla Experiment Builder (the youngest participant in the final sample was 4.38 years old) and revealed the development of the children’s performance. This was not a remote online study because participation in the experiment took place in a laboratory setting with an experimenter, not in participants’ homes. Nonetheless, the results do suggest that even child participants can engage in cognitive tasks controlled by this platform. 5According to EMFACS (Friesen and Ekman, 1984), the activation of AU 17 is related to negative expressions such as distress and rage. Considering this fact, it is possible that the activation of AU 17 leads to the judgment of facial expressions as negative. Nevertheless, for stimuli in the present study (Kawahara et al., 2021), we confirmed that both Japanese and Dutch adult participants’ accuracy of perceiving angry faces did not differ between stimulus cultures. Therefore, we consider that the frequency of activation in AU 17 did not significantly impact participants’ judgment in the present study. MATERIALS AND METHODS voice expression. The speakers were four women (two native Japanese speakers and two native Dutch speakers). In each video clip, each speaker speaks one of four utterances containing only emotionally neutral linguistic information, including Hello (Japanese, “Hai, moshimoshi”; Dutch, “Hallo, dat ben ja”) and Good-by (Japanese, “Sayonara”; Dutch “Een goede dag”); What is this? (Japanese, “Korenani”; Dutch “Hey, wat is dit?”); and Is that so? (Japanese, “Sounandesuka”; Dutch, “Oh, is dat zo?”). A total of 32 video clips [in two languages (Japanese and Dutch) × two emotions (angry and happy) × two speakers × four utterances] were used. Participants Web Data The 36 children aged 4–12 years old (30 girls and 6 boys) and the 16 undergraduate or graduate students (age range: 18–29, M age = 21.63, 13 women and 3 men) participated in the experiment. Since one 5-years-old girl’s parent reported that she used built- in laptop speakers because her earphones did not fit her, her data for both tasks were excluded from the analysis. In the analysis, 4–8-year-old children were classified as the younger child group (N = 21, M age = 6.48 years old) and the 9–12-year- old children were classified as the older child group (N = 14, M age = 10.29 years old). Data were collected from undergraduate or graduate students to compare the data collected from children with data collected from adults. Auditory stimuli were created by turning offthe images and adding a gray rectangle image of the same size. Visual stimuli were created by muting sounds. Auditory stimuli comprised 32 video clips with vocal expression information only. Visual stimuli comprised 32 video clips with facial expression information only. The resolution of each video clip was 640 × 480 pixels. In the web experiment, auditory and visual stimuli were encoded in MP4 files for web page presentation. Child participant data were collected during the online science event of the National Museum of Emerging Science and Innovation (Miraikan) in Tokyo, Japan. We recruited participants through the Miraikan web page and SNS services (Twitter, Facebook). This event was held from August to December 2020. Adult participants were recruited through a snowball-sampling method and the Crowdworks crowdsourcing service website.4 Citation: (2017) reported that the large amount of data they collected from online participants revealed changes in cognitive skills (e.g., working memory, false belief, etc.) over the human lifespan. They collected the data through the BRAiN’US online platform for smartphones, and participants also included children (participants ranged from 5 to 85 years old). However, their study did not focus on the validity of online experiments with children, nor did it compare their data with lab data; rather their aim was to obtain a large dataset from a wide range of participants. More recently, Nussenbaum et al. (2020) investigated the decision-making strategies of participants aged 8–25 during an online task. They compared their results with data from previous lab experiments and were able to replicate age-related changes in strategy even in the online experiment. Moreover, some new online platforms for child research, such as Lookit (Scott et al., 2017), Discoveries Online (Rhodes et al., 2020), and Childlab (Sheskin and Keil, 2018) have been developed with the aim of enabling participation in remote studies for children who are not able to easily travel to a laboratory. In the emotion perception tasks, participants were asked to judge emotions by watching dynamic facial expressions or listening to vocal expressions. We chose these tasks for our online developmental research for two reasons. First, the development of emotional perception has not been investigated in online research. Second, the emotional judgment task enables us to examine the effect of stimulus presented through a web browser on auditory (vocal expression) perception and visual (facial expression) perception independently. To compare web data with lab data for each modality, participants engaged in an auditory task judging emotions by listening to sounds only, and a visual task judging emotions by watching facial dynamics only (with no sound). These studies notwithstanding, less remote developmental research is being conducted than remote cognitive studies targeting adults. Why have developmental researchers hesitated August 2021 | Volume 12 | Article 702106 Frontiers in Psychology | www.frontiersin.org 2 Online Perceptual Experiment With Children Yamamoto et al. 4https://crowdworks.co.jp/ Lab Data We compared lab data from the unimodal session of our previous experiment (Kawahara et al., 2021) with our web data. Data collected from 179 children aged 5–12 years old (75 girls and 104 boys) and from 33 undergraduate or graduate students (age range: 18–32, M age = 22.39, 17 women, 16 men) were included in the analysis. Child participants’ lab data were collected during the science event held at the Miraikan in 2015. We recruited participants through the Miraikan web page. For data analysis, the 5–8 year-old children comprised the younger child group (N = 100, M age = 6.36), and the 9–12 year-old children comprised the older child group (N = 79, M age = 10.66). Adult participants were recruited using a snowball-sampling method. As with participants in the web experiment, all participants in the lab experiment spoke Japanese as their native language. Adult participants and parents of child participants gave written informed consent in accordance with the Declaration of Helsinki. Lab Data The web experiment stimuli and the lab experiment stimuli were almost same but differed in file format. In the lab experiment, the auditory stimuli files were in WAV format and the visual stimuli files in AVI format. Moreover, in the lab experiment auditory stimuli were presented with a blank, white display, and in web experiment a gray rectangle was displayed while the auditory stimuli were presented. The latter was to prevent web participants from becoming anxious due to watching a mere blank display in an experiment in which the experimenter is not present, unlike in a lab experiment. All participants spoke Japanese as their native language. All adult participants and parents of child participants were informed of the purpose of the study and gave informed consent in accordance with the Declaration of Helsinki by checking a box on the consent page during the browser experiment session. The Validation of Stimuli The validation of our stimulus set was verified in Kawahara et al.’s (2021) study, which investigated cross-cultural audiovisual emotion perception. Overall, there was no remarkable difference between Japanese and Dutch stimuli. For auditory stimuli, the average fundamental frequency (f0) was higher in Japanese than in Dutch for the happy voice stimuli (z = –3.36, p < 0.001), but not for the angry voice stimuli (Table 1). Considering that both Japanese and Dutch adult participants in Kawahara et al. (2021) responded to their ingroup voice stimuli more correctly than to their outgroup stimuli, this difference reflected their natural expressions in each culture. For visual stimuli, a certified FACS (Facial Action Coding System; Ekman and Friesen, 1978) coder coded all activated AUs during each stimulus. There was no difference in activated AUs except for AU175 in angry faces (z = –3.00, p = 0.01) between Japanese and Dutch visual stimuli. Thus, the stimulus set was validated. 6We used response alternatives written in hiragana characters (angry: おこっている[okotteiru]; happy: よろこんでいる[yorokondeiru]) because both young children and adults can read them easily. According to previous studies on Japanese children’s literacy, more than half of 3–4-year-olds could read most of hiragana characters (Kakihana et al., 2009), and about 90% of children in 5-year-old classes could read them (Ota et al., 2018) without formal education. Since Japanese hiragana characters have high transparency (each hiragana character corresponds to a syllable in Japanese phonology), Japanese children who know hiragana characters can be assumed to also read words. Considering Japanese children’s literacy, we inferred that the participants in this study could read response alternatives. Procedure Web Data After these tasks, in response to the questionnaire, participants’ parents reported problems during the experiment, whether participants had worn earphones, headphones, or had used other devices, whether parents had instructed their children to press a specific key during the main trials (“Did you ask your child to press any specific key during a task, for example, by saying ‘Press this key’?”); if they had any concerns, they were asked to fill out a form. According to the questionnaire, we confirmed that all participants included in the analysis had worn earphones or headphones, and that no parent instructed their child to press any specific key. None of parents reported any problems and concerns related with the tasks. The flow of the procedure is shown in Figure 1. Before the experiment, child participants’ parents and adult participants received an instructions and documents file that included how to participate in the event and research brief. At the starting time, each participant and their parent joined the Zoom meeting room. The experimenter and the staffcommunicated with each participant using their web cameras and microphones to help participants relax. After a short communication, the experimenter provided attendees with instructions (e.g., not to click the web browser back button during the experiment, not to influence their children’s responses), checked that participants understood the positions of keys for response (D and K) on their keyboards, and guided them to the experiment web page by providing the URL link in the meeting room chatbox. After checking that each participant succeeded in accessing the experiment page, the experimenter instructed each participant to quit the meeting room to avoid low internet connection speeds during the experiment. They were also instructed to return to the same meeting room if they had any problems or reached the browser experiment’s final display. Adult participants similarly joined a Zoom meeting room before the browser experiment and received instructions. They were to proceed with the browser experiment by themselves and return to the same meeting room if they had any problems or had reached the last display in the browser experiment. The procedure was similar to that of the child participants except that for adult participants the instructions were rewritten In the browser experiment session, participants’ parents proceeded with the experiment by themselves following instructions on the display. We used Gorilla Experiment Builder to control the experimental program and collect data. Stimuli W b D t The auditory and visual stimuli used were based on the audiovisual stimuli originally used by Tanaka et al. (2010). These audiovisual stimuli (stimuli used as the “congruent condition” in their study) were short video clips featuring a speaker expressing anger or happiness through face and August 2021 | Volume 12 | Article 702106 Frontiers in Psychology | www.frontiersin.org 3 Online Perceptual Experiment With Children Yamamoto et al. TABLE 1 | The average fundamental frequency (f0) of auditory stimuli (Hz). Angry Happy Japanese 242.8 336.9 Dutch 233.1 261.4 consent and indicated that environment requirements were met (sufficient device battery, headphones or earphones connection, environmental silence, web browser maximization) using checkboxes. Next, parents checked the sound volume with child participants, MP4 file playback, and keyboard operation following displayed instructions. After preparation, participants engaged in the auditory task and the visual task in each task section. The order of tasks was counterbalanced. At the beginning of each task section, participants watched a task instruction movie that included a simple speaking animation describing the task. The flow of each task is shown in Figure 1 (see panels 2 and 3, Auditory Task and Visual Task). Frontiers in Psychology | www.frontiersin.org Lab Data Researchers provided headphones (SONY MDR-ZX660) (used at a comfortable listening level) to present auditory stimuli and computers (Latitude 3540, Dell) to present visual stimuli and control the experiment program using Hot Soup Processor (Onion Software). Apparatus Web Data Participants used their own earphones or headphones to listen to auditory stimuli and their own computers to watch visual stimuli and control the browser experiment program. We asked participants to use a computer monitor and earphones (or headphones) and recommended that they use the latest version of Google Chrome. We did not specify the models of the devices. In the auditory task, participants were instructed to listen to a voice and judge whether the speaker was angry or happy. A fixation point was displayed at the center of the monitor for 500 ms, after which an auditory stimulus was presented. When the response alternatives written in hiragana characters6 were displayed, participants responded by pressing D or K keys (i.e., the allocation of response alternatives was counterbalanced). Five hundred ms after participant’s response, the next test trial began, for a total of 32 trials. In the visual task, participants were instructed to observe the face of a (muted) speaker and judge whether they were angry or happy. A fixation point was displayed at the center of the monitor for 500 ms, and each visual stimulus was presented successively. As with the auditory task, responses were indicated by pressing keys. 500 ms blank displays were inserted between trials, for 32 trials. For each task, the main trials were conducted following two practice trials. The resolution of participant displays ranged from 915 × 515 to 1920 × 1080. The participants’ used Windows (45 participants), Mac OS (3), Android (2), and iOS (1) operating systems and Google Chrome (27), Microsoft Edge (19), Microsoft Internet Explorer (4), and Safari (1) web browsers. Procedure Web Data The browser experiment session consisted of a preparation section, the auditory task, the visual task, and a questionnaire. In the preparation section, participants’ parents gave informed August 2021 | Volume 12 | Article 702106 4 Online Perceptual Experiment With Children Yamamoto et al. t flow (The instructions and alternatives were written in Japanese in the actual experiment). FIGURE 1 | Experiment flow (The instructions and alternatives were written in Japanese in the actual experiment). Frontiers in Psychology | www.frontiersin.org August 2021 | Volume 12 | Article 702106 5 Online Perceptual Experiment With Children Yamamoto et al. using online tools were not significantly different from those of the lab experiment. (e.g., converting some hiragana characters to kanji characters for readability7), and they were not asked a question about parents’ instruction (“Did you ask your child to press any specific key during a task, for example, by saying ‘Press this key’?”) in the questionnaire after the task. p As for other factors, results showed significant main effects for age group (F(2, 257) = 31.56, p < 0.001, ηp2 = 0.20). The post hoc analysis (Shaffer’s Modified Sequentially Rejective Bonferroni Procedure) revealed that the older child group of participants responded correctly to more stimulus than the younger child group and that adult participants responded correctly more often than younger and older child participants (ps < 0.001). The main effect of stimulus culture was also significant (F(1, 257) = 281.61, p < 0.001, ηp2 = 0.52), showing that participants responded correctly to the Japanese voice more often than to the Dutch voice. Interaction between age group and stimulus culture was marginally significant (F(2, 257) = 2.89, p = 0.057, ηp2 = 0.02). To check whether the impact of stimulus culture was different among age group, we conducted a simple main effect analysis. The simple main effect analysis also showed that all groups selected more correct answers in responses to the Japanese voice than in response to the Dutch voice (Younger child group: F(1, 119) = 157.56, p < 0.001; Older child group: F(1, 91) = 97.22, p < 0.001; Adult group: F(1, 47) = 59.11, p < 0.001). Moreover, a simple main effect of age was significant for both the Japanese voice (F(2, 257) = 9.01, p < 0.001) and the Dutch voice (F(2, 257) = 42.04, p < 0.001). 7We did it because it is easier for native Japanese speaking adults to read sentences such as instructions that use both kanji and hiragana than sentences written in hiragana characters only. RESULTS We calculated the rate of correct responses for each participant. Then, this rate was arcsine transformed to increase the normality of its distribution (accuracy). To investigate whether the experiment method affected different aged participants’ performance differently, we conducted a 2 (method: web, lab) × 3 (age group: younger child, older child, adult) × 2 (stimulus culture: Japanese, Dutch) mixed-factorial ANOVA on accuracy for each task. To further examine the marginal interaction between age group and stimulus culture, we conducted a two-way ANOVA (method × age group) on the ingroup advantage. This was calculated by subtracting the accuracy of Dutch voices from that of Japanese voices. The main effect of age groups was marginally significant (F(2, 257) = 2.89, p = 0.057, ηp2 = 0.02). Post hoc analysis (Shaffer’s Modified Sequentially Rejective Bonferroni Procedure) showed that the difference between younger children and adults was marginally significant (p = 0.051), suggesting that the ingroup advantage in younger children was more salient than that in adults. The differences between other pairs were not significant (younger child group – older child group: p = 0.149, older child group – adult group: p = 0.393). The main effects of method (F(1, 257) = 0.07, p = 0.789, ηp2 < 0.001) and the interaction of method and age group (F(2, 257) = 0.22, p = 0.800, ηp2 = 0.002) were not significant. Lab Data The experiment was conducted in an experimental room at the Miraikan for the child participants and in an experimental room at the Tokyo Woman’s Christian University for the adult participants. The procedure was almost the same as with the web experiment but with three slight differences. First, in the (Kawahara et al., 2021) lab experiment, auditory and visual tasks were conducted after audiovisual emotional perception tasks in which participants judged speakers’ emotions after being presented with face and voice simultaneously. Participants in the web experiment did not engage in audiovisual emotion perception tasks like those in the lab experiment. We cannot rule out the priming effect in the lab data induced by the audiovisual stimuli that had been presented before. However, considering that the number of presentations of “angry” and “happy” stimuli was the same in the audiovisual emotion perception task, a response bias is not possible. Second, cards showing the alternatives (“angry” and “happy” written in hiragana characters) were put on a keyboard in the lab experiment; these alternatives were shown on the display in the web experiment. Third, the experimenter was physically present next to each participant and controlled the experiment program throughout the experiment session in the lab experiment. The presentation of stimuli was controlled using the Hot Soup Processor (Onion Software). These differences were summarized in Figure 2. Procedure Web Data Post hoc analysis (Shaffer’s Modified Sequentially Rejective Bonferroni Procedure) revealed that older child participants responded correctly to the Japanese voice more than the younger child group (p = 0.049), and that adult participants responded correctly more often than younger (p < 0.001) and older child participants (p = 0.034). A similar accuracy difference between age groups was observed with the Dutch voice. Older child participants responded correctly to the Dutch voice more often than the younger child group, and adult participants responded correctly more often than younger and older child participants (ps < 0.001). All age groups responded correctly more often to the Japanese voice than the Dutch voice, and accuracy with both voices increased with age. Auditory Task The Bayesian ANOVA revealed that the BFinclusion values of the effect of method (BFinclusion = 0.165), the interaction effect between method and stimulus culture August 2021 | Volume 12 | Article 702106 Frontiers in Psychology | www.frontiersin.org 7 Online Perceptual Experiment With Children Yamamoto et al. FIGURE 4 | Visual task Accuracy (Error bars indicate standard deviations and a dashed line indicates a perfect score). FIGURE 4 | Visual task Accuracy (Error bars indicate standard deviations and a dashed line indicates a perfect score). FIGURE 3 | Auditory task Accuracy (Error bars indicate standard deviations and a dashed line indicates a perfect score). FIGURE 3 | Auditory task Accuracy (Error bars indicate standard deviations and a dashed line indicates a perfect score). FIGURE 3 | Auditory task Accuracy (Error bars indicate standard deviations and a dashed line indicates a perfect score). FIGURE 4 | Visual task Accuracy (Error bars indicate standard deviations and a dashed line indicates a perfect score). FIGURE 3 | Auditory task Accuracy (Error bars indicate standard deviations and a dashed line indicates a perfect score). TABLE 2 | Evidence for the presence of particular effects in the accuracy of the auditory task (Data averaged over all the models including/excluding a particular predictor). participants responded correctly to the Dutch face more often than to the Japanese face. Interaction between age group and stimulus culture (F(2, 257) = 3.05, p = 0.049, ηp2 = 0.023) was also significant, but the main effect for age group was not (F(2, 257) = 0.19, p = 0.829, ηp2 = 0.001). A simple main effect analysis revealed that older children (p = 0.007) and adults (p = 0.003) responded correctly to the Dutch face more often than to the Japanese face, while younger children’s accuracy did not differ between stimulus cultures (p = 0.744). The accuracy for faces did not differ among age groups both for Japanese (p = 0.624) and Dutch stimuli (p = 0.165). Auditory Task The results for the auditory task are shown in Figure 3. In the auditory task, the main effects of method (F(1, 257) = 2.07, p = 0.151, ηp2 = 0.008), the interaction of method and age group (F(2, 257) = 0.09, p = 0.917, ηp2 = 0.001), of method and stimulus culture (F(1, 257) = 0.07, p = 0.789, ηp2 < 0.001), and of the second-order interaction of method, age group, and stimulus culture (F(2, 257) = 0.22, p = 0.800, ηp2 = 0.002) were not significant. Thus, the results of the auditory task To further examine the effect of method on accuracy, we conducted a Bayesian repeated measures ANOVA on accuracy using JASP (2018) with default prior scales. Table 2 shows the inclusion probabilities and the inclusion Bayes factor (Clyde et al., 2011; van den Bergh et al., 2019). The inclusion Bayes 7We did it because it is easier for native Japanese speaking adults to read sentences such as instructions that use both kanji and hiragana than sentences written in hiragana characters only. August 2021 | Volume 12 | Article 702106 Frontiers in Psychology | www.frontiersin.org 6 Online Perceptual Experiment With Children Yamamoto et al. FIGURE 2 | The differences in procedures between web and lab data. FIGURE 2 | The differences in procedures between web and lab data. actors reflect the average across possible models and reveal (BFinclusion = 0 111) the interaction effect between method FIGURE 2 | The differences in procedures between web and lab data. (BFinclusion = 0.111), the interaction effect between method and age group (BFinclusion = 0.069), and the second-order interaction of method, age group, stimulus culture, and age (BFinclusion = 0.004) were all small, supporting no effect of the difference between the web and lab experiments. Additionally, the data provide strong evidence for the effects of age group and stimulus culture (BFinclusions > 100), although they are not factors reflect the average across possible models and reveal whether models with a particular predictor are more likely to have produced the observed data than those without. This approach is especially useful when the number of potential variables under consideration is large. Auditory Task P(incl) P(excl) P(incl| data) P(excl| data) BFincl Stimulus Culture 0.737 0.263 1.000 0.000 ∞ Age Group 0.737 0.263 1.000 0.000 ∞ Method 0.737 0.263 0.316 0.684 0.165 Stimuli × Age Group 0.316 0.684 0.336 0.664 1.095 Stimuli × Method 0.316 0.684 0.049 0.951 0.111 Method × Age Group 0.316 0.684 0.031 0.969 0.069 Stimuli × Method × Age Group 0.053 0.947 > 0.001 1.000 0.004 To further examine the effect of method on accuracy, similar to the auditory task, we conducted a Bayesian repeated measures ANOVA using JASP with default prior scales. Table 3 shows the inclusion probabilities and inclusion Bayes factor. The Bayesian ANOVA revealed that the effect of method type (BFinclusion = 0.084), the interaction effect between method and stimulus culture (BFinclusion = 0.083), the interaction effect between method and age group (BFinclusion = 0.033), and the second-order interaction of method, age group, stimulus culture, and age (BFinclusion = 0.006) were all small, supporting no effect of the difference between the web and lab experiments. Consistent with the results of classical ANOVA, the data provided moderate evidence for the effect of stimulus culture (BFinclusion = 5.893). However, the effect of the interaction between age group and stimulus culture was not informative (BFinclusion = 0.128). sufficiently informative to allow a strong conclusion about the effect of the interaction between age group and stimulus culture (BFinclusion = 1.095). Reaction Time the Dutch voice (Younger child group: F(1, 20) = 6.01, p = 0.024; Older child group: F(1, 13) = 17.37, p = 0.011; Adult group: F(1, 15) = 8.51, p = 0.011). Moreover, a simple main effect of age was significant for both the Japanese voice (F(2, 48) = 4.35, p = 0.018) and the Dutch voice (F(2, 48) = 5.08, p < 0.001). Post hoc analysis (Shaffer’s Modified Sequentially Rejective Bonferroni Procedure) revealed that adult participants responded to Japanese voice faster than older children (p = 0.029) and younger children (p = 0.029), and adult participants responded to Dutch voice faster than older children (p = 0.011) and younger children (p = 0.022). There was no significant difference between the younger and older child groups for both Japanese voice (p = 0.962) and Dutch voice (p = 0.351). We conducted a one-way ANOVA on the ingroup advantage to further examine the interaction between age group and stimulus culture. This was calculated by subtracting the reaction time to Japanese voices from that of Dutch voices. The main effect of age groups was significant (F(2, 48) = 3.91, p = 0.027, ηp2 = 0.01). Post hoc analysis (Shaffer’s Modified Sequentially Rejective Bonferroni Procedure) showed that the ingroup advantage in older children was larger than that in both adults (p = 0.025) and younger children (marginally significant; p = 0.053). The difference between younger children and adults was not significant (p = 0.338). Thus, the ingroup advantage based on reaction times was most salient in older children, unlike the analysis of accuracy. We showed average reaction times of each task in Figure 5. We excluded outlier reaction time data (each participant’s average reaction time ±2.5 SD), while including trials in which participants pressed the wrong key, considering the following reasons. First, children’s responses classified as “incorrect responses” may include the results of their careful consideration. Second, given the age differences in accuracy, the number of correct responses, that is, the number of trials included in the analysis differed among age groups in the auditory task. We conducted a 3 (age group) × 2(stimulus culture) mixed-factorial ANOVA on reaction time for each task. In the auditory task, the main effects for age group (F(2, 48) = 4.91, p = 0.011, ηp2 = 0.17) was significant. Visual Task The results of the visual task are shown in Figure 4. In the visual task, the main effects of method (F(1, 257) = 0.36, p = 0.551, ηp2 = 0.001), the interaction of method and age group (F(2, 257) = 1.10, p = 0.335, ηp2 = 0.008), method and stimulus culture (F(1, 257) = 1.00, p = 0.320, ηp2 = 0.004), and the second-order interaction of method, age group and stimuli (F(2, 257) = 1.99, p = 0.138, ηp2 = 0.015) were not significant. Thus, the results of the visual task using online tools were not significantly different from those of the lab experiment. Thus, results showed that the experiment method (web or lab) did not affect participants’ performance in either the auditory task Results indicated a significant main effect for stimulus culture (F(1, 257) = 13.92, p < 0.001, ηp2 = 0.051), showing that August 2021 | Volume 12 | Article 702106 Frontiers in Psychology | www.frontiersin.org 8 Online Perceptual Experiment With Children Yamamoto et al. TABLE 3 | Evidence for the presence of particular effects in the accuracy of the visual task (Data averaged over all the models including/excluding a particular predictor). FIGURE 5 | The average of participants’ reaction time in web data (Error bars indicate standard deviations). P(incl) P(excl) P(incl| data) P(excl| data) BFincl Stimulus Culture 0.737 0.263 0.943 0.057 5.893 Age Group 0.737 0.263 0.300 0.700 0.153 Method 0.737 0.263 0.191 0.809 0.084 Stimuli × Age Group 0.316 0.684 0.056 0.944 0.128 Stimuli × Method 0.316 0.684 0.037 0.963 0.083 Method × Age Group 0.316 0.684 0.015 0.985 0.033 Stimuli × Method × Age Group 0.053 0.947 >0.001 1.000 0.006 or the visual task; that is, the web data obtained in the present study did not differ from our previously obtained lab data. That is, our method can enable researchers to obtain data that would be comparable to those of a laboratory experiment in the emotion perception tasks. Reaction Time Here we reported reaction times in the online experiment. Since we did not measure reaction times in the lab experiment, we cannot compare them between methods. Moreover, we did not instruct participants to respond to each stimulus as quickly as they could. Thus, the reaction times data here are for reference only. Nevertheless, this is useful as data of online developmental experiment, and it also enable us to investigate whether we could find age difference in performance for the visual task, in which no age difference in accuracy was found due to the ceiling effect. FIGURE 5 | The average of participants’ reaction time in web data (Error bars indicate standard deviations). the Dutch voice (Younger child group: F(1, 20) = 6.01, p = 0.024; Older child group: F(1, 13) = 17.37, p = 0.011; Adult group: F(1, 15) = 8.51, p = 0.011). Moreover, a simple main effect of age was significant for both the Japanese voice (F(2, 48) = 4.35, p = 0.018) and the Dutch voice (F(2, 48) = 5.08, p < 0.001). Post hoc analysis (Shaffer’s Modified Sequentially Rejective Bonferroni Procedure) revealed that adult participants responded to Japanese voice faster than older children (p = 0.029) and younger children (p = 0.029), and adult participants responded to Dutch voice faster than older children (p = 0.011) and younger children (p = 0.022). There was no significant difference between the younger and older child groups for both Japanese voice (p = 0.962) and Dutch voice (p = 0.351). We conducted a one-way ANOVA on the ingroup advantage to further examine the interaction between age group and stimulus culture. This was calculated by subtracting the reaction time to Japanese voices from that of Dutch voices. The main effect of age groups was significant (F(2, 48) = 3.91, p = 0.027, ηp2 = 0.01). Post hoc analysis (Shaffer’s Modified Sequentially Rejective Bonferroni Procedure) showed that the ingroup advantage in older children was larger than that in both adults (p = 0.025) and younger children (marginally significant; p = 0.053). The difference between younger children and adults was not significant (p = 0.338). Thus, the ingroup advantage based on reaction times was most salient in older children, unlike the analysis of accuracy. Frontiers in Psychology | www.frontiersin.org Reaction Time The post hoc analysis (Shaffer’s Modified Sequentially Rejective Bonferroni Procedure) revealed that adult group of participants responded more quickly than the younger (p = 0.019) and older child groups (p = 0.019). There was no significant difference between the younger and older child groups (p = 0.587). The main effect of stimulus culture was also significant (F(1, 48) = 27.67, p < 0.001, ηp2 = 0.37), showing that participants responded more quickly to the Japanese voice than to the Dutch voice. Interaction between age group and stimulus culture was also significant (F(2, 48) = 3.91, p = 0.027, ηp2 = 0.14). To check whether the impact of stimulus culture was different among age groups, we conducted a simple main effect analysis. The simple main effect analysis also showed that all groups yielded faster responses to the Japanese voice than in response to In the visual task, the main effects of age group (F(2, 48) = 2.18, p = 0.124, ηp2 = 0.08) and of stimulus culture (F(1, 48) < 0.01, p = 0.991, ηp2 < 0.001), and the interaction between them (F(2, 48) = 0.84, p = 0.438, ηp2 = 0.03) were not significant. Thus, all groups responded visual stimulus quickly and there was August 2021 | Volume 12 | Article 702106 9 Online Perceptual Experiment With Children Yamamoto et al. studies using low intensity facial expressions, with more variety of emotions, or with smaller sized pictures in the future. no difference among age groups and between stimulus culture. This is consistent with that high accuracy was observed in all age groups. Taken together, there was no differences among age groups both in accuracy and reaction times in the visual task. Although our main purpose was to investigate the validity of data obtained through online experiments, our data provide interesting findings on perceptual development. First, in the auditory task, the difference in the ingroup advantage was marginally significantly different between younger children and adults. That is, the ingroup advantage in younger children may be more salient than that in adults. This tendency may be related to the findings that young children prefer people who spoke their native language (e.g., Kinzler et al., 2007). Second, in the visual task, participants gave more correct responses to Dutch faces than to Japanese faces. DISCUSSION The purpose of this study was to investigate the validity of online developmental studies through an emotion perception experiment. To that end, we conducted an experiment controlled by Gorilla Experiment Builder with child and adult participants who engaged in simple auditory and visual emotion perception tasks following communication and instruction through Zoom. As predicted, results showed no significant differences in participants’ performance between our web data results and out lab data results (Kawahara et al., 2021). In the auditory task, we found performance differences between age groups (between-subject factor) and better performance with stimuli spoken in their native language (within-subject factor). These findings were consistent with previous laboratory studies reporting performance improvements with age (Sauter et al., 2013; Chronaki et al., 2014) and superior perception of vocal emotional expression with native language stimulus (Sauter et al., 2010). In the visual task, accuracy was high and near- perfect among all age groups both in our web and lab data. To date, although online experiments have replicated laboratory experiment results with adult participants (e.g., Crump et al., 2013), developmental studies with child participants have been limited. By including child participants in our online study of emotional perception tasks, the present study adds new evidence regarding the validity of data collected in online developmental studies. Notably, accuracy of perception of vocal expression in the lab experiment was replicated in the web experiment even though participants were not required to use a specific device and were allowed to use any earphones or headphones. The results of the present study may relieve researchers’ hesitation to conduct developmental experiments online, at least in the field of auditory emotional perception. Of course, we need additional examination to determine the suitability of online platforms for other types of auditory perception research. In tasks such as phoneme perception, judgment of speaker identities, or perceiving vocal expression from among multiple choices, participants’ responses may be affected by the devices they use (see Woods et al., 2017). We showed new possibilities for using simple, general (not specialized for children) online tools that may enable researchers to move their laboratory studies online. However, we should clarify the limitations of the methods presented here. First, this study targeted children who could be instructed verbally and could respond by pressing keys on a keyboard. Reaction Time These results are unexpected considering that previous studies have insisted on the ingroup effect in facial recognition tasks (e.g., Elfenbein and Ambady, 2002). However, more recent studies have demonstrated that Japanese raters did not show the ingroup advantage in the perception of facial expressions (Matsumoto et al., 2009; Hutchison et al., 2018). Overall, Japanese people’s facial expressions may not necessarily be perceived correctly by ingroup members. Our results of the visual task may also reflect this. Moreover, the interaction between age group and stimulus culture on accuracy was also significant in the visual task, suggesting that older children and adults responded more correctly to Dutch facial expressions than to Japanese facial expressions. These may be interesting if Japanese people judge their outgroup facial expressions more accurately compared to Japanese stimuli with age. Japanese children may come to know that Japanese people tend to conceal their true emotions (e.g., Matsumoto, 1990) and that they inhibit their facial expressions, and this may cause “outgroup advantage.” This may lead to Japanese people’s tendency to prioritize voice in audiovisual emotion perception as for Japanese stimuli shown in previous studies (Yamamoto et al., 2020; Kawahara et al., 2021). We cannot clarify this speculation based on the present study because the Bayesian ANOVA did not provide strong evidence for the interaction between age group and stimulus culture in both tasks. However, we need to investigate these perceptual developmental suggestions in the further study. Frontiers in Psychology | www.frontiersin.org August 2021 | Volume 12 | Article 702106 DISCUSSION Considering that Japanese preschool children read written words from relatively early on, we did not check the level of literacy for each participant. However, checking this would be important for researchers to apply this method to children living in various environments. For studies targeting preliterate children as participants, researchers should select a video-recorder type experiment model and record participants’ oral or pointing responses. Second, we had to rely on parents’ self-reports and could not independently check children’s actual states during the browser experiment because we instructed parents to turn offtheir web cameras. Although we ensured that parents did not ask their children to respond in line with parents’ answers during the main trials by questionnaires, y y y We cannot strongly conclude that online developmental research is valid for the task of perceiving facial expressions because we observed a ceiling effect; that is, performance was near perfect among all age groups in the present task. Our stimuli for the visual task were quite clear—Tanaka et al. (2010) originally created them by adding random dynamic noises to be degraded—and only two response alternatives (angry or happy) were available. The reasoning behind Kawahara et al.’s (2021) use of visual stimuli without noises was to avoid unpleasantness for the children, and so the present study followed that procedure. However, to investigate the impact of browser experiments on the presentation of visual stimuli in detail, we should conduct online August 2021 | Volume 12 | Article 702106 August 2021 | Volume 12 | Article 702106 10 Online Perceptual Experiment With Children Yamamoto et al. we did not have a way to confirm this was the case. Moreover, it is possible that parents would have given their children instructions without being aware of it. This could be avoided by keeping the web cameras on during the experiment. However, this could affect the quality of the presentation of the stimuli due to internet connection speed issues. These are the trade-offs, and in the present study we gave prioritized the quality of the stimuli. Such choices should be made in accordance with the aim of each study. Moreover, we should not forget the burden on parents during online experiments, and minimizing this burden should be considered when designing online experiments. In addition, as described in the section “Materials and Methods,” our web experiment procedure was not exactly the same as that of our laboratory experiment (Figure 2). DISCUSSION Nevertheless, there were no significant differences between our web data and lab data in the present study, which suggests that the difference in procedure does not have a critical impact on the results in the experiments investigating the development of emotion perception. not find age differences between child groups for reaction times. Moreover, while we observed a salient ingroup advantage in younger children compared with adults (although the tendency was marginally significant) for accuracy, this was not reflected in reaction times. Rather, for reaction times, we found that older children’s ingroup advantage was more salient than the other two age groups. Since we do not have reaction time data of our lab experiment, it remains unclear whether such tendency is observed also in a lab experiment or is unique to an online experiment. As a limitation of online research, one previous study pointed out the difficulty in controlling a short presentation of stimuli such as a masked priming procedure (Crump et al., 2013). Another study investigating the contrast threshold reported a high rate of data exclusions due to each participant’s experimental environment (Sasaki and Yamada, 2019). Further studies are needed to examine which indices and tasks are adequate for online experiments. Despite the limitations, we demonstrated that online experiments are useful for child research using auditory and visual (movie) stimuli. Combinations of online tools will lead researchers to new developmental research styles. Moreover, due to the validity of this online research using unimodal auditory and visual stimuli, application to future audiovisual perception research is expected. As an online experiment research, the procedure of the present study has two particularities. First, child participants’ parents take on the “experimenter” role. Second, researchers and participants communicate with each other through video chat before the tasks. Previous online psychological experiment studies with adults have pointed out high dropout rates (e.g., Reips, 2002), large variances due to various environments among participants, and difficulties in a between-subject design study. On the contrary, it is worth noting that the methods we adopted resulted in very few cases of participant data being excluded. Moreover, the variance of performance seemed to be similar to that of the lab experiment even though participants used their laptops and earphones (headphones). Our only requests before the experiment were to enter the video chat at the appointed time and to prepare earphones or headphones. DISCUSSION Considering the effort involved in making an appointment with each participant, and in instructing both parents and child participants to proceed with the experiments, our method does not have benefits such as large data collecting in a short period, unlike usual crowdsourced online experiments. Nevertheless, the results of the present study suggest that this effort can reduce issues associated with online research, such as a dropout rate and variance of data. Given that even adult participants engaged in tasks seriously without an experimenter, video chat communication before the main experiment may be specifically effective. Even though our method does not have the aforementioned benefits associated with crowdsourced online research, we regard its biggest advantage to be the fact that both experimenters and participants are not affected by geographical constraints. In fact, as long as they have an internet connection, researchers can conduct studies with people living in various countries and continue to collect data even under a pandemic. ETHICS STATEMENT The studies involving human participants were reviewed and approved by Tokyo Woman’s Christian University Research Ethics Committee. Written informed consent or digital informed consent to participate in this study was provided by the participants’ legal guardian/next of kin. Frontiers in Psychology | www.frontiersin.org DATA AVAILABILITY STATEMENT The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation. AUTHOR CONTRIBUTIONS HY was involved in designing the web experiment programs, collecting the data in the web experiment, analyzing the data, and drafting the manuscript. MK was involved in collecting the data and designing programs in the laboratory experiment. AT was involved in the creation of stimuli. All authors were involved in the experimental design, interpretation of the results, revised, and approved the final version of the manuscript. We should note that the reproducibility of results in online experiments may depend on indices. We used the rate of correct responses, and we did not compare other indices such as reaction times or fixations. Given that our web data showed that all age groups responded more quickly to the Japanese stimuli in the auditory task, reaction time may be used even in online experiments. However, unlike the results for accuracy, we did REFERENCES Lavan, N., Burston, L. F. K., and Garrido, L. (2018). How many voices did you hear? Natural variability disrupts identity perception from unfamiliar voices. Br. J. Dev. Psychol. 110, 576–593. doi: 10.1111/bjop.12348 Lavan, N., Burston, L. F. K., and Garrido, L. (2018). How many voices did you hear? Natural variability disrupts identity perception from unfamiliar voices. Anwyl-Irvine, A. L., Massonnié, J., Flitton, A., Kirkham, N., and Evershed, J. K. (2020). Gorilla in our midst: an online behavioral experiment builder. Behav. Res. Methods 52, 388–407. doi: 10.3758/s13428-019-01237-x Br. J. Dev. Psychol. 110, 576–593. doi: 10.1111/bjop.12348 Matsumoto, D. (1990). Cultural similarities and differences in display rules. Motiv. Emot. 14, 195–214. doi: 10.1007/BF00995569 Carbon, C.-C. (2020). Wearing face masks strongly confuses counterparts in reading emotions. Front. Psychol. 11:566886. doi: 10.3389/fpsyg.2020.56 6886 Matsumoto, D., Olide, A., and Willingham, B. (2009). Is there an ingroup advantage in recognizing spontaneously expressed emotions? J. Nonverbal. Behav. 33:181. doi: 10.1007/s10919-009-0068-z McPherson, M. J., and McDermott, J. H. (2018). Diversity in pitch perception revealed by task dependence. Nat. Hum. Behav. 2, 52–66. doi: 10.1038/s41562- 017-0261-8 Chronaki, G., Hadwin, J. A., Garner, M., Maurage, P., and Sonuga-Barke, E. J. S. (2014). The development of emotion recognition from facial expressions and non-linguistic vocalizations during childhood. Br. J. Dev. Psychol. 33, 218–236. doi: 10.1111/bjdp.12075 Mills, C., and D’Mello, S. (2014). On the validity of the autobiographical emotional memory task for emotion induction. PLoS One 9:e95837. doi: 10.1371/journal. pone.0095837 Clyde, M. A., Ghosh, J., and Littman, M. L. (2011). Bayesian adaptive sampling for variable selection and model averaging. J. Comput. Graph. Stat. 20, 80–101. doi: 10.1198/jcgs.2010.09049 Miura, A., and Kobayashi, T. (2016). Survey satisficing inflates stereotypical responses in online experiment: the case of immigration study. Front. Psychol. 7:1563. doi: 10.3389/fpsyg.2016.01563 Crump, M. J. C., McDonnell, J. V., and Gureckis, T. M. (2013). Evaluating amazon’s mechanical turk as a tool for experimental behavioral research. PLoS One 8:e57410. doi: 10.1371/journal.pone.0057410 Nussenbaum, K., Scheuplein, M., Phaneuf, C. V., Evans, M. D., and Hartley, C. A. (2020). Moving developmental research online: comparing in-lab and web-based studies of model-based reinforcement learning. Collabra. Psychol. 6:17213. doi: 10.1525/collabra.17213 de Leeuw, J. R., and Motz, B. A. (2016). Psychophysics in a web browser? Comparing response times collected with javascript and psychophysics toolbox in a visual search task. Behav. Res. Methods 48, 1–12. doi: 10.3758/s13428-015- 0567-2 Ota, S., Uno, A., and Inomata, T. (2018). REFERENCES Attainment level of hiragana reading / spelling in kindergarten children. Jpn. J. Logop. Phoniatr. 59, 9–15. doi: 10.5112/ jjlp.59.9 Ekman, P., and Friesen, W. V. (1978). Facial Action Coding System: Investigator’s Guide. Palo Alto, CA: Consulting Psychologists Press. Paolacci, G., and Chandler, J. (2014). Inside the turk: understanding mechanical turk as a participant pool. Psychol. Sci. 23, 184–188. doi: 10.1177/09637214145 31598 Elfenbein, H. A., and Ambady, N. (2002). On the universality and cultural specificity of emotion recognition: a meta-analysis. Psychol. Bull. 128, 203–235. doi: 10.1037/0033-2909.128.2.203 Friesen, W. V., and Ekman, P. (1984). EMFACS-7. Unpublished manuscript. Human Interaction Laboratory. San Francisco, CA: University of California. Reips, U. D. (2002). Standards for internet-based experimenting. Exp. Psychol. 49, 243–256. doi: 10.1027/1618-3169.49.4.243 Rhodes, M., Rizzo, M. T., Foster-Hanson, E., Moty, K., Leshin, R. A., Wang, M., et al. (2020). Advancing developmental science via unmoderated remote research with children. J. Cogn. Dev. 21, 477–493. doi: 10.1080/15248372.2020. 1797751 Germine, L., Nakayama, K., Duchaine, B. C., Chabris, C. F., Chatterjee, G., and Wilmer, J. B. (2012). Is the web as good as the lab? comparable performance from web and lab in cognitive/perceptual experiments. Psychon. Bull. Rev. 19, 847–857. doi: 10.3758/s13423-012-0296-9 Sasaki, K., and Yamada, Y. (2019). Crowdsourcing visual perception experiments: a case of contrast threshold. PeerJ 7:e8339. doi: 10.7717/peerj.8339 Henrich, J., Heine, S. J., and Norenzayan, A. (2010). The Weirdest People in the World? (RatSWD Working Paper Series, 139). Berlin: Rat für Sozial- und Wirtschaftsdaten (RatSWD). Sauter, D. A., Eisner, F., Ekman, P., and Scott, S. K. (2010). Cross-cultural recognition of basic emotions through nonverbal emotional vocalizations. Proc. Natl. Acad. Sci. U.S.A. 107, 2408–2412. doi: 10.1073/pnas.0908239106 Hutchison, A., Gerstein, L., and Kasai, M. (2018). A cross-cultural comparison of u.s. and japanese trainees’ emotion-recognition ability. Jpn. Psychol. Res. 60, 63–76. doi: 10.1111/jpr.12182 Sauter, D. A., Panattoni, C., and Happé, F. (2013). Children’s recognition of emotions from vocal cues. Br. J. Dev. Psychol. 31, 97–113. JASP (2018). JASP (Version 0.9) [Computer software]. Available online at: https: //jasp-stats.org (accessed June 21, 2021). Scott, K., Chu, J., and Schulz, L. (2017). Lookit (Part 2): assessing the viability of online development research, results from three case studies. Open Mind 1, 15–29. doi: 10.1162/opmi_a_00001 Kakihana, S., Ando, J., Koyama, M., Iitaka, S., and Sugawara, I. (2009). Cognitive factors relating to the development of early literacy in the Kana syllabary. Jpn. J. Educ. Psychol. 57, 295–308. doi: 10.5926/jjep.57.295 Semmelmann, K., and Weigelt, S. (2017). ACKNOWLEDGMENTS We thank all the participants and staffmembers of the National Museum of Emerging Science and Innovation (Miraikan). The Supplementary Material for this article can be found online at: https://www.frontiersin.org/articles/10.3389/fpsyg. 2021.702106/full#supplementary-material FUNDING This work was supported by JSPS KAKENHI (No. 20J01281) and Grant-in-Aid for Scientific Research on Innovative Areas No. 17H06345 “Construction of the Face-Body Studies in Transcultural Conditions”. August 2021 | Volume 12 | Article 702106 11 Online Perceptual Experiment With Children Yamamoto et al. REFERENCES Online psychophysics: reaction time effects in cognitive experiments. Behav. Res. Methods 49, 1241–1260. doi: 10. 3758/s13428-016-0783-4 Kawahara, M., Sauter, D., and Tanaka, A. (2021). Culture shapes emotion perception from faces and voices: changes over development. Cogn. Emot. doi: 10.1080/02699931.2021.1922361 [Epub ahead of print]. Sheskin, M., and Keil, F. (2018). TheChildLab.com: a video chat platform for developmental research. PsyArXiv [Preprint]. doi: 10.31234/osf.io/rn7w5 Kinzler, K. D., Dupoux, E., and Spelke, E. S. (2007). The native language of social cognition. Proc. Natl. Acad. Sci. U.S.A. 104, 12577–12580. doi: 10.1073/pnas. 0705345104 Shin, H., and Ma, W. J. (2016). Crowdsourced single-trial probes of visual working memory for irrelevant features. J. Vis. 16, 1–8. doi: 10.1167/16.5.10 Simcox, T., and Fiez, J. A. (2014). Collecting response times using amazon mechanical turk and adobe flash. Behav. Res. Methods 46, 95–111. doi: 10.3758/ s13428-013-0345-y Klindt, D., Devaine, M., and Daunizeau, J. (2017). Does the way we read others’ mind change over the lifespan? Insights from a massive web poll of cognitive skills from childhood to late adulthood. Cortex 86, 205–215. doi: 10.1016/j. cortex.2016.09.009 Stewart, N., Chandler, J., and Paolacci, G. (2017). Crowdsourcing samples in cognitive science. Trends Cogn. Sci. 21, 736–748. doi: 10.1016/j.tics.2017.0 6.007 Laeng, B., Kiambarua, K. G., Hagen, T., Bochynska, A., Lubell, J., Suzuki, H., et al. (2018). The “face race lightness illusion”: an effect of the eyes and pupils? PLoS One 13:e0201603. doi: 10.1371/journal.pone.02 01603 Tanaka, A., Koizumi, A., Imai, H., Hiramatsu, S., Hiramoto, E., and de Gelder, B. (2010). I feel your voice. Cultural differences in the multisensory perception of emotion. Psychol. Sci. 21, 1259–1262. doi: 10.1177/0956797610380698 August 2021 | Volume 12 | Article 702106 Frontiers in Psychology | www.frontiersin.org 12 Yamamoto et al. Online Perceptual Experiment With Children Tran, M., Cabral, L., Patel, R., and Cusack, R. (2017). Online recruitment and testing of infants with Mechanical Turk. J. Exp. Child Psychol. 156, 168–178. doi: 10.1016/j.jecp.2016.12.003 Conflict of Interest: The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. j j van den Bergh, D., van Doorn, J., Marsman, M., Draws, T., van Kesteren, E., Derks, K., et al. (2019). A tutorial on conducting and interpreting a bayesian anova in JASP. PsyArXiv [Preprint]. doi: 10.31234/osf.io/spreb. Zhou, H., and Fishbach, A. (2016). The pitfall of experimenting on the web: how unattended selective attrition leads to surprising (yet false) research conclusions. J. Pers. Soc. Psychol. 111, 493–504. doi: 10.1037/pspa0000056 Frontiers in Psychology | www.frontiersin.org REFERENCES Publisher’s Note: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher. Woods, K. J. P., Siegel, M. H., Traer, J., and McDermott, J. H. (2017). Headphone screening to facilitate web-based auditory experiments. Atten. Percept. Psychophys. 79, 2064–2072. doi: 10.3758/s13414-017-1361-2 Yamamoto, H. W., Kawahara, M., and Tanaka, A. (2020). Audiovisual emotion perception develops differently from audiovisual phoneme perception during childhood. PLoS One 15:e0234553. doi: 10.1371/journal.pone.023 4553 Copyright © 2021 Yamamoto, Kawahara and Tanaka. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms. Zhou, H., and Fishbach, A. (2016). The pitfall of experimenting on the web: how unattended selective attrition leads to surprising (yet false) research conclusions. J. Pers. Soc. Psychol. 111, 493–504. doi: 10.1037/pspa0000056 August 2021 | Volume 12 | Article 702106 Frontiers in Psychology | www.frontiersin.org 13
https://openalex.org/W4240541518
https://www.matec-conferences.org/articles/matecconf/pdf/2021/11/matecconf_simpro21_01008.pdf
English
null
Measurement of the occupational risk level specific to workplaces
MATEC web of conferences
2,021
cc-by
3,222
Measurement of the occupational risk level specific to workplaces Angelica-Nicoleta Călămar1*, Sorin Simion1, Marius Kovacs1, Alexandru Simion1 1National Institute for Research and Development in Mine Safety and Protection to Explosion – INSEMEX Petroşani, 32-34 G-ral Vasile Milea Street, Postcode: 332047, Petroşani, Hunedoara County, Romania Abstract. Any workplace implies a greater or lesser number of occupational hazards, respectively workers are exposed to occupational risks, putting their health in danger. If we talk about industrial environments (construction, energy, metallurgy, textiles, wood, etc.), these hazards are found to a greater extent, often exceeding the allowable limit, but occupational pollutants such as dust in suspension and microclimate parameters can also be found in offices, whether they are open space or not. In this sense, the current paper reviews some workplaces and quantifies the level of risk to which workers are exposed to show and demonstrate the importance of occupational health prevention in order not to reach further measures, in time, when these occupational diseases occur. The research conducted led to the conclusion that the determined pollutants (dust, gas, microclimate) exceeded the maximum allowable concentration required by national legislation, both at workplaces in various technological flows and in offices. The high concentrations found in offices are caused by staff traffic, large number of employees, as well as the lack of natural ventilation. * Corresponding author: angela.calamar@insemex.ro © The Authors, published by EDP Sciences. This is an open access article distributed under the terms of the Creative Commons Attribution License 4.0 (http://creativecommons.org/licenses/by/4.0/). MATEC Web of Conferences 342, 01008 (2021) UNIVERSITARIA SIMPRO 2021 MATEC Web of Conferences 342, 01008 (2021) UNIVERSITARIA SIMPRO 2021 https://doi.org/10.1051/matecconf/202134201008 1 Introduction Occupational health requires multidisciplinary research to prevent health damage that may result from excessive, acute, or chronic exposure to chemicals. Early detection of harmful exposures can significantly reduce the occurrence of adverse effects by reducing exposure level and by taking precautionary measures. Exposure monitoring is a procedure that consists of routine assessment and interpretation of biological and/or environmental parameters in order to detect possible health risks [1, 2]. Work capacity and workers' health are influenced by nature of work, its regulation, relationships between work teams and structure of jobs. Ensuring the health of workers exposed to occupational hazards is an important goal in increasing the quality of life. The occupational environment in which the worker's activity takes place is characterized by complex interaction of specific physical-chemical factors that can negatively influence the health of employees. These factors (microclimate parameters, toxic substances, MATEC Web of Conferences 342, 01008 (2021) UNIVERSITARIA SIMPRO 2021 https://doi.org/10.1051/matecconf/202134201008 suspended dust, noise, inadequate lighting, etc.) are also called harmful or dangerous factors [3]. suspended dust, noise, inadequate lighting, etc.) are also called harmful or dangerous factors [3]. [ ] Along with the dangerous and harmful factors, working conditions are determined by technological processes, the core business of workers or the type of work. To quantify the level of occupational risk, a number of economic sectors were selected, namely, physical-chemical analysis laboratory, steel plant, automotive and IT activities. Investigation of selected objectives involved gathering information related to work environment, choosing the dominant toxins, choosing the appropriate equipment and working methods, taking samples, analysing and interpreting these samples. Occupational risk assessment is a tool that demonstrates the application of prevention principles at company/enterprise level [4]. This means that any company must anticipate the dangers that can lead to accidents at work or occupational diseases, instead of reacting after such events have taken place. An essential step in implementing a responsible approach to occupational health and safety is occupational risk assessment. 2 Investigating working conditions To investigate a workplace, it is necessary to: have knowledge of the technological process, choose the pollutants, sample assays, analyse and interpret data. To quantify the level of pollution of workplace atmosphere, the measured concentrations are related to the legislation in force, respectively GD 359/2015 and GD 157/2020 [3]. In case of simultaneous presence of several noxious substances, their action and interaction will be taken into account both from an analytical point of view and especially in terms of their action upon the human body (synergism by addition or potentiation, antagonism, etc.) [5, 6]. In choosing the noxious substances, both the raw material used in technological flows and possible impurities that it may contain, were taken into account. Exact knowledge of the noxious substances action upon humans, as well as their virulence are very important things, because the noxious substances collecting system and the method of determination chosen can largely depend on them. In the industrial environment, the main way toxic substances penetrate the body is the respiratory tract (80 - 90% of occupational poisonings occur in this way), followed by transcutaneous and gastrointestinal paths [5, 7, 8]. In work places, the microclimate is influenced by regional climate and its variations, but it depends, first of all, on the heat sources, the heating and the ventilation found inside. Microclimate conditions in workplaces must ensure the maintenance of human body’s thermal balance, in accordance with the activity carried out. Unfavourable microclimate is defined as the set of microclimate factors whose combined action exceeds the adaptive capacity of the body, overloading the thermoregulation system in order to maintain thermal balance. Strains upon the thermoregulation system generate thermal stress [9, 10]. 3 Methodology for determining occupational hazards Determination of occupational hazards and microclimate parameters in the work environment was performed in accordance with test procedures of the Toxicology Laboratory within INCD INSEMEX, authorized by the Ministry of Health, Public Health and Public Health Control. Determination of respirable dusts in the work environment is performed gravimetrically, according to SR EN 689/2018 and STAS 10813/76. The principle consists in retaining dust 2 https://doi.org/10.1051/matecconf/202134201008 MATEC Web of Conferences 342, 01008 (2021) UNIVERSITARIA SIMPRO 2021 UNIVERSITARIA SIMPRO 2021 on an FM membrane filter by passing a determined volume of air. The sampling assembly retains coarse dust from total dust, allowing the breathable fraction to pass through the filter. Fig. 1. Sampling probes (air flow meters) type TUFF Fig. 1. Sampling probes (air flow meters) type TUFF Fig. 2. AMI 300 device for determining microclimate parameters Fig. 2. AMI 300 device for determining microclimate parameters Fig. 2. AMI 300 device for determining microclimate parameters Fig. 2. AMI 300 device for determining microclimate parameters Fig. 2. AMI 300 device for Fig. 1. Sampling probes (air flow meters) type TUFF Fig. 2. AMI 300 device for determining microclimate parameters g determining microclimate parameters For performing noise tests, the integrating sound level meter type 2250 was used, with 4189 type microphone and weighting networks A, C and Z. To determine the weighted sound exposure A and/or the equivalent continuous A-weighted sound pressure level, the measurements were performed with the microphone placed in the position normally occupied by the worker's head. To determine the microclimate parameters, the AMI 300 device (Fig. 2.) from INCD INSEMEX Petrosani was used, which is a multifunctional instrument for measuring temperature (in the range of -20 ÷ +800C), humidity (in the range of 3 ÷ 98%) and air velocity (in the range of 0.2 ÷ 30 m/s), and measuring gaseous pollutants, both portable gas analysers with electrochemical sensors (MSA ORION plus) and the Optima 2100 DV inductive coupled plasma atomic emission spectrometer were used. 4 Results and discussion During 2019, the team of the Toxicology Laboratory within INCD INSEMEX carried out several measurement campaigns (table 1.) at different economic agents, having different objects of activity. The current paper summarizes results found in several economic sectors (physical-chemical analysis laboratory, steel plant, automotive and IT activities) regarding the determination of pollutants in workplaces, to emphasize the importance of annually checks performed for these pollutants, so that employers are be able to take measures prevent or reduce noxae, where appropriate. 3 https://doi.org/10.1051/matecconf/202134201008 MATEC Web of Conferences 342, 01008 (2021) UNIVERSITARIA SIMPRO 2021 Table 1. Determination of occupational hazards in the work environment N o. Economi c sector Work area / technologi cal operation Determi ned noxae Measuri ng unit Average determined concentrati on Max. allowable concentrat ion according to GD 157/2020, GD 493/2006 Observati ons 15 mi n. 8 ore 1. Steel plant Electrical furnace Breathabl e dust in suspensio n [mg / m3] - 13,8 1 5 The activity takes place in closed halls without the possibility of optimal retention / exhaust of dust generated by technologi cal processes. Pot preparatio n cast [mg / m3] - 6,41 5 Crane cabin rolling bridge [mg / m3] - 8,16 5 Flue Gas Capture and Treatment Plant [mg / m3] - 8,59 5 Electrical furnace Noise dB(A) - 103, 4 87 Pot preparatio n cast dB(A) - 89,8 87 Crane cabin rolling bridge dB(A) - 83,3 75 Flue Gas Capture and Treatment Plant dB(A) - 87,7 87 Electrical furnace CO [ppm] 29 - 26 The activity of the evaluated Sections is carried out in closed halls without the possibility of an optimal retention / exhaust of CO2 [ppm] 642 0 - 5000 Ferric oxide [mg / m3] 7 - 10 Pot preparatio n cast CO [ppm] 10 - 26 CO2 [ppm] 540 - 5000 Ferric oxide [mg / m3] 1,2 - 10 Flame cutting machine CO [ppm] 14 - 26 CO2 [ppm] 542 - 5000 Ferric oxide [mg / m3] 7,6 - 10 Distributio n room CO [ppm] 2 - 26 CO2 [ppm] 479 - 5000 IVERSITARIA SIMPRO 2021 4 https://doi.org/10.1051/matecconf/202134201008 MATEC Web of Conferences 342, 01008 (2021) UNIVERSITARIA SIMPRO 2021 Ferric oxide [mg / m3] 4,2 - 10 the gases generated by the technologi cal processes. 2. MATEC Web of Conferences 342, 01008 (2021) UNIVERSITARIA SIMPRO 2021 MATEC Web of Conferences 342, 01008 (2021) UNIVERSITARIA SIMPRO 2021 Conferenc e room Air temperatu re [0C] - 23,3 - Central air conditioni ng system Radiant average temperatu re [0C] - 23,9 8 Relative humidity [%] - 38,2 Air flow speed [m/s] - 0,01 4 Kindergart en Air temperatu re [0C] - 19,1 5 - Individual air conditioni ng system (AC) Radiant average temperatu re [0C] - 20,4 8 Relative humidity [%] - 46,9 5 Air flow speed [m/s] - 0,00 6 nalysis of results (table 1.) showed that in the steel plant activity sector, the maximum allowed limits for dust, noise and gas (CO and CO2) are exceeded only in the electric furnace. In the activity carried out in the automotive section, there is a single exceeding of the noise level for the 80t press, and in the physical-chemical analysis laboratory there are exceedances for Pb and some volatile compounds. Regarding the IT activity carried out in open space offices, values of dust in suspension concentration exceed the limit set by in force legislation, by 1.4 mg / m3. According to the website of the European Agency for Safety and Health at Work (EU- OSHA) regarding the limits for microclimate parameters, it is recommended that during warm periods of the year (when air cooling is required) temperature reaches 23-260C, and in cold periods of the year (when the air needs to be heated) the temperature should be in the range of 20-240C. Also, relative humidity of the air is recommended to be in the range of 30- 70% (avoiding, as much as possible, the limits of the range), and speed of the air currents in the room to be between 0.01 - 0.2 THX. PMV (Predicted mean vote) and PPD (Predicted percentage dissatisfied) calculation indices were used to interpret data obtained from IT activities, and for this it was necessary to estimate the metabolic rate and clothing isolation indices: - the metabolic rate index was estimated at 1.2, which represents the specific value office activity (offices, schools, laboratories, housing); - the insulation index of daily clothing was estimated at 1, which represents the specific value for clothing: shoes, trousers, blouse or shirt, socks and underwear to which 0.1 is added, represented by the index of the office chair. 4 Results and discussion Automot ive Sandblasti ng section Breathabl e dust in suspensio n [mg / m3] - 3,25 5 Activity carried out in halls, with permanentl y controlled temperatur e and humidity Injection moulding machine [mg / m3] - 1,33 5 Eccentric press 125 t Noise dB(A) - 79,9 87 Eccentric press 80 t dB(A) - 88,0 87 Hydraulic press 60 t dB(A) - 72,8 87 3. Physical- chemical analysis laborator y Physical- chemical analysis laboratory HCl [mg / m3] 4,96 - 8 Industrial ventilation system NO2 [mg / m3] 7,04 - 5 Furnace room Pb [mg / m3] - 0,32 9 0,15 Weighing room - Document ary tests Pb [mg / m3] - 0,46 8 0,15 4. Carpentr y worksho p - wood parts treatment Oiling wood parts Toluene [mg / m3] 458 - 384 Inefficient ventilation system Xylene [mg / m3] 371 - 442 Acetone [mg / m3] 121 0 - 1210 Varnishing room Toluene [mg / m3] 96 - 384 Xylene [mg / m3] 266 - 442 Acetone [mg / m3] 285 4 - 1210 Ethyl alcohol [mg / m3] 652 - 9500 5. IT activities Offices (open space) Breathabl e dust in suspensio n [mg / m3] - 6,40 5 Central air conditioni ng system Air temperatu re [0C] - 23,9 5 - Radiant average temperatu re [0C] - 26,6 8 Relative humidity [%] - 39,2 5 Air flow speed [m/s] - 0,18 9 VERSITARIA SIMPRO 2021 5 https://doi.org/10.1051/matecconf/202134201008 MATEC Web of Conferences 342, 01008 (2021) UNIVERSITARIA SIMPRO 2021 - the insulation index of daily clothing was estimated at 1, which represents the specific value for clothing: shoes, trousers, blouse or shirt, socks and underwear to which 0.1 is added, represented by the index of the office chair. In kindergarten, the calculated value of PPD is 6.28% (fig. 3.), which represents the percentage of people dissatisfied with microclimate parameters of the work environment, and the PMV value indicates a "cool" work environment. In kindergarten, the calculated value of PPD is 6.28% (fig. 3.), which represents the percentage of people dissatisfied with microclimate parameters of the work environment, and the PMV value indicates a "cool" work environment. 6 6 MATEC Web of Conferences 342, 01008 (2021) UNIVERSITARIA SIMPRO 2021 https://doi.org/10.1051/matecconf/202134201008 Fig.3. Graphic representation of the PMV and PPD index in kindergarten Fig.3. Graphic representation of the PMV and PPD index in kindergarten Therefore, the analysed work environments are in line with the activities carried out (low energy consumption activities - office work and children's playgrounds), keeping a thermal balance between the internal heat production of the human body and heat loss in the work environment. In conclusion, in the work environment where microclimate parameters were determined, 6.28% of the employed staff could be dissatisfied with the microclimate conditions, which proves the microclimate is favourable for development of office activities and education of children, but to increase the PMV index to a warmer environment it is recommended to increase the temperature in the work environment. For a full understanding of the specific terminology in accordance with SR EN ISO 7730: 2006, the terms PPD and PMV are defined below. PMV (Predicted mean vote) - is an index that predicts the average value of the votes of a large group of people on the thermal sensation scale. PPD (Predicted percentage dissatisfied) - is an index that establishes a quantitative prediction of the percentage of thermally dissatisfied people who feel the work environment is too cold or too hot. Conclusions Concentrations of noxious substances (dust, gas, noise) from the analysed workplaces exceed the limit allowed by the legislation in force, especially in the steel sector. Also, values of respirable dust concentration in the IT sector - offices, exceed the maximum limit allowed by the applicable legislation. In this case, a number of technical and organizational measures are recommended, including replacement of existing carpeting in the workspace with parquet or other flooring that does not retain dust, installation of ventilation systems so as to ensure efficient ventilation, periodic replacement of filters in the air conditioning system. Environmental conditions (temperature, humidity, pressure, thermal environment and thermal stress) have a significant influence on work performance. Analysis of results according to the thermal sensation felt by workers (according to SR EN ISO 7730: 2006), shows that in most workplaces it is “warm / warmish”, except for the Kindergarten, where a “cool” thermal sensation is felt. In order to reduce the percentage of people who are dissatisfied, from a thermal point of view, it is recommended to reduce temperature and increase humidity in work spaces where the thermal environment is described as “warm”. Also, at the Kindergarten location where a “cool” thermal sensation is felt, it is recommended to increase temperature to an approximate value of 23 ÷ 260C. MATEC Web of Conferences 342, 01008 (2021) UNIVERSITARIA SIMPRO 2021 https://doi.org/10.1051/matecconf/202134201008 The case study showed that even in office work (multinational companies), there may be concentrations of noxious substances, especially dust, which exceed the allowable limit, creating discomfort for workers and affecting their health over time. The risk assessment may include a justification by the employer that nature and extent of risks due to chemical agents do not require another detailed risk assessment, if occupational exposure limit values or national biological limit values are not exceeded. p g The risk assessment and implicitly the determination of noxious substances are updated, in particular if there have been significant changes in the working conditions or when results of workers’ health status surveillance make this necessary. 7 7 References 1. L. Cioca, R. Moraru, Occupational psychosocial risk management, “Lucian Blaga” University of Sibiu Publishing House, ISBN 978-973-739-924-3, (2010) 2. A. N. Calamar, L. Toth, D. Pupazan, Environmental protection and risk factor analysis, Focus Publishing House, Petrosani, ISBN 978-973-677-313-6, (2016) 3. DECISION no. 157 of February 27th, 2020 for the amendment of the Government Decision no. 1,218 / 2006 regarding the establishment of minimum occupational safety and health requirements for ensuring protection of workers against risks related to presence of chemical agents, as well as for modification and completion of the Government Decision no. 1,093 / 2006 on the establishment of minimum safety and health requirements for protection of workers from risks related to exposure to carcinogens or mutagens at work. 4. A. N. Calamar, G.A. Gaman, L. Toth; D. Pupazan, S. Simion, Assessment of workers` occupational exposure in the context of industrial toxicology, World multidisciplinary earth sciences symposium WMESS 2016, Prague, Czech Republic, September, Vol.44, Article number: 032004, ISSN 1755-1307, (2016) 5. Guide General aspects of industrial toxicology. Methods of analysis used in industrial toxicology, Ministry of Health - National Institute of Public Health, (2013) 6. R.I. Moraru, Safety and health at work: university treaty, Focus Publishing House, Petrosani, ISBN 978-973-677-272-6, (2013) 7. M. Kovacs, L. Toth, G. Ghetie, A. N. Draghici, V. Traian, L., Gheorghe Best management practices applied to prevent and reduce concentrations of dust and gases released from power plants, Environmental Engineering and Management Journal, July, vol.13, No.6, pg.1421-1458, ISSN 1582-9596, (2014) R. Stanescu Dumitru, Harmful agents in the professional environment, Romanian Medical Life Publishing House - Bucharest, ISBN 978-973-160-013-0, (2008) 9. C. Lupu, A.N. Draghici, G. Ghetie, M. Kovacs, L. Toth, C. Ilie, The influence of microclimate parameters in workplace, Bulletin of the Polytechnic Institute of Iasi "Gheorghe Asachi" Technical University of Iasi, Fasc. 4, Ed. Polithnium, ISSN 1453-1690, (2013) 10. M. Nakielska, K. Pawlowski, Conditions of the Internal Microclimate in the Museum, Journal of Ecological Engineering, Vol. 21, Issue: 1, pg.205-209, (2020) 8 8
https://openalex.org/W3122389018
https://www.preprints.org/manuscript/201805.0142/v1/download
English
null
A Review Paper on “Graphene Field Emission for Electron Microscopy”
Applied sciences
2,018
cc-by
10,855
Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805.0142 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805.0142 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805.0142.v1 Review 1 A Review Paper on “Graphene Field Emission for 2 Electron Microscopy” 3 Xiuyuan Shao 1 and Anjam Khursheed 1,2,* 4 1 Department of Electrical and Computer Engineering, National University of Singapore, 4 Engineering 5 Drive 3, Singapore 117583, Singapore 6 2 Engineering Science Programme, National University of Singapore, 9 Engineering Drive 1, Singapore 7 117575, Singapore 8 * Correspondence: eleka@nus.edu.sg (A.K.); Tel.: +65-6516-2295 (A.K.) 9 10 Abstract: Although good field emission from graphene has been demonstrated from a wide variety 11 of different micro-fabricated structures, very few of them can be used to improve the design of cold 12 field emitters for electron microscopy applications. Most of them consist of densely packed nano- 13 emitters, which produce a large array of defocused overlapping electron beams, and therefore 14 cannot be subsequently defocused down to a single nano-meter electron probe. This paper reviews 15 the kind of single-tip cathode structures suitable in cold field emission guns for instruments such as 16 the Scanning Electron Microscopy, Transmission Electron Microscope or the Scanning Transmission 17 Electron Microscopy, and reviews progress in fabricating them from graphene based materials. 18 Keywords: graphene; cold field emission; single-tip cathode; electron microscopy 19 20 1. Introduction 21 The Dyke group proposed a variety of applications of a cold field emission (CFE) source and 22 formed the first company to produce CFE based commercial products in the early 1960s [1]. The 23 successful application of CFE cathodes to electron microscopy, including both Scanning Electron 24 Microscopy (SEM) and Scanning Transmission Electron Microscopy (STEM), was achieved by a 25 group led by Crewe et al. in the late 1960s [2,3]. For over 40 years, state-of-the-art metal tip CFE 26 sources used in electron microscopy suffer from many well-known practical challenges, such as an 27 inherent Ultrahigh Vacuum (UHV) condition requirement (<10-9 Torr) and relatively large current 28 instabilities (~40% fall-off within the first hour), which have impeded their wide-ranging use [4]. As 29 a result, most of the latest generation electron microscopes use the more stable and reliable Schottky 30 electron source, which has a lower brightness (~108 A m-2 sr-1 V-1) and higher energy spread (~0.5 eV) 31 [5-7]. Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805.0142 Although CFE sources have the desirable characteristics of a low energy spread (~0.3 eV) and 32 high brightness (~109 A m-2 sr-1 V-1), their lifetimes need to be improved (> 1 year) and their current 33 stabilities need to be reduced (< 1%) [4,5,8]. 34 Nanostructures in the form of nanotubes [9-12], nanotips [13], and nanowires [14,15] have the 35 potential to be used as cathodes in CFE sources. Their large field enhancement factors stem from 36 nanometer-scale emission sites which can, in some cases, produce electron beams with brightness 37 values, one order of magnitude higher than the state-of-the-art single crystal tungsten cathode tips. 38 Despite their promising electron optics performance, they have not been successfully integrated into 39 any commercial electron microscopes, and this is largely due to the same technological difficulties 40 faced by single crystal tungsten cathode-tips (stringent vacuum, low lifetime and high beam current 41 fluctuations). However, in addition, they require the delicate transfer/mounting process of an 42 individual emitter being attached to the tip of a sharpened supporting metal wire, and this is very 43 difficult do without incurring significant misalignment or damage. 44 Review 1 A Review Paper on “Graphene Field Emission for 2 Electron Microscopy” 3 Xiuyuan Shao 1 and Anjam Khursheed 1,2,* 4 1 Department of Electrical and Computer Engineering, National University of Singapore, 4 Engineering 5 Drive 3, Singapore 117583, Singapore 6 2 Engineering Science Programme, National University of Singapore, 9 Engineering Drive 1, Singapore 7 117575, Singapore 8 * Correspondence: eleka@nus.edu.sg (A.K.); Tel.: +65-6516-2295 (A.K.) 9 10 Abstract: Although good field emission from graphene has been demonstrated from a wide variety 11 of different micro-fabricated structures, very few of them can be used to improve the design of cold 12 field emitters for electron microscopy applications. Most of them consist of densely packed nano- 13 emitters, which produce a large array of defocused overlapping electron beams, and therefore 14 cannot be subsequently defocused down to a single nano-meter electron probe. This paper reviews 15 the kind of single-tip cathode structures suitable in cold field emission guns for instruments such as 16 the Scanning Electron Microscopy, Transmission Electron Microscope or the Scanning Transmission 17 Electron Microscopy, and reviews progress in fabricating them from graphene based materials. 18 Keywords: graphene; cold field emission; single-tip cathode; electron microscopy 19 20 1. Introduction 21 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805.0142.v1 Since the discovery of two-dimensional (2D) graphene in 2004, graphene has attracted a lot of attention as a potential candidate for CFE source emitters, due to its high aspect ratio (the lateral size to the thickness) [16-18] and excellent thermal, mechanical, and electrical properties [19-22]. Excellent field emission from graphene has been demonstrated from a wide variety of different micro- fabricated structures, and most of them consist of densely packed nano-emitters that produce a large array of defocused overlapping electron beams, and therefore cannot be subsequently defocused down to a single nano-meter electron probe [23-25], making them unsuitable for electron microscopy/lithography applications. py g p y pp This paper primarily focuses on reviewing developments in the field emission of graphene based 53 emitters for electron microscopy/lithography applications. In the first part of the paper, it will 54 summarize basic field emission theory in relation to single crystal W field emitters (CFE) oriented in 55 the <310> or <111> directions and other well-developed one-dimensional (1D) nanostructure CFE 56 electron emitters. In the second part, different types of graphene field emitters will be introduced, 57 including graphene film emitters, graphene point emitters and graphene ring emitters. The main 58 theme is primarily on how graphene can be used to make single-tip cathodes in electron sources 59 suitable for electron microscopy/lithography applications, whose electron beams can be defocused 60 down to a single nano-meter electron probe. Finally, a summary and outlook are given towards the 61 future development of high brightness-high resolution CFE electron gun on graphene-based 62 nanomaterials. 63 1. Introduction 21 The Dyke group proposed a variety of applications of a cold field emission (CFE) source and 22 formed the first company to produce CFE based commercial products in the early 1960s [1]. The 23 successful application of CFE cathodes to electron microscopy, including both Scanning Electron 24 Microscopy (SEM) and Scanning Transmission Electron Microscopy (STEM), was achieved by a 25 group led by Crewe et al. in the late 1960s [2,3]. For over 40 years, state-of-the-art metal tip CFE 26 sources used in electron microscopy suffer from many well-known practical challenges, such as an 27 inherent Ultrahigh Vacuum (UHV) condition requirement (<10-9 Torr) and relatively large current 28 instabilities (~40% fall-off within the first hour), which have impeded their wide-ranging use [4]. As 29 a result, most of the latest generation electron microscopes use the more stable and reliable Schottky 30 electron source, which has a lower brightness (~108 A m-2 sr-1 V-1) and higher energy spread (~0.5 eV) 31 [5-7]. Although CFE sources have the desirable characteristics of a low energy spread (~0.3 eV) and 32 high brightness (~109 A m-2 sr-1 V-1), their lifetimes need to be improved (> 1 year) and their current 33 stabilities need to be reduced (< 1%) [4,5,8]. 34 Nanostructures in the form of nanotubes [9-12], nanotips [13], and nanowires [14,15] have the 35 potential to be used as cathodes in CFE sources. Their large field enhancement factors stem from 36 nanometer-scale emission sites which can, in some cases, produce electron beams with brightness 37 values, one order of magnitude higher than the state-of-the-art single crystal tungsten cathode tips. 38 Despite their promising electron optics performance, they have not been successfully integrated into 39 any commercial electron microscopes, and this is largely due to the same technological difficulties 40 faced by single crystal tungsten cathode-tips (stringent vacuum, low lifetime and high beam current 41 fluctuations). However, in addition, they require the delicate transfer/mounting process of an 42 individual emitter being attached to the tip of a sharpened supporting metal wire, and this is very 43 difficult do without incurring significant misalignment or damage. 44 2.1. Theory of cold field electron emission 65 derived an analytical formula to calculate the 94 virtual source size [34], given by the following expression: 95 ݀୴= 1.67 ௥౪౟౦ ௠ഀට ழா౪வ ௘௏౛౮౪ , (3) (3) where ݎ୲୧୮ is the tip radius and < ܧ୲> is an initial average tangential energy defined as < ܧ୲> 97 = ݁ħܨ/√(8݉߶), with ܨ the local electric field strength, ϕ the work function, ݉ఈ the angular 98 magnification and ħ the reduced Planck constant. In these formulas, ݉ఈ and F can be estimated from 99 direct ray tracing simulations and when used together with an experimentally measured angular 100 intensity profile, the source brightness Br can be estimated. For high brightness electron beam 101 applications, statistical Coulomb interactions lead to radial broadening of the virtual source size due 102 to lateral electron-electron interactions, which in turn, lower the brightness [35]. The calculation of 103 statistical Coulomb interactions within an electron source is not straightforward, since the electron 104 potential and beam size vary in the gun region. A semi-analytical technique known as the “slice 105 method” reported in the recent papers by Kruit, was introduced to do this [36]. First, the electric 106 potential distribution in the gun region is solved numerically, and then the beam size in the region is 107 determined by the simulated direct ray tracing of electron trajectories that leave the cathode-tip. The 108 gun region is subsequently divided into small segments over which the voltage and beam size is 109 assumed to remain constant, and an analytical expression is used to estimate the trajectory 110 displacement effect due to the lateral electron-electron interactions. 111 It should be noted that the method just outlined avoids the need to measure the virtual source 112 diameter dv experimentally, this is because direct measurement of the virtual source diameter not 113 trivial. One way to achieve it is to put the source in a transmission electron microscope as the emitter 114 and obtain a magnified source image of it [7]. A different method to measure dv is to use a 115 demagnifying lens to focus the electron beam from the gun unit into a spot which is source-size 116 dominated (relatively low contributions from lens aberrations), and then measure the spot size of the 117 beam by scanning it across a knife edge [37,38]. 2.1. Theory of cold field electron emission 65 derived an analytical formula to calculate the 94 virtual source size [34], given by the following expression: 95 ݀୴= 1.67 ௥౪౟౦ ௠ഀට ழா౪வ ௘௏౛౮౪ , (3) 96 where ݎ୲୧୮ is the tip radius and < ܧ୲> is an initial average tangential energy defined as < ܧ୲> 97 = ݁ħܨ/√(8݉߶), with ܨ the local electric field strength, ϕ the work function, ݉ఈ the angular 98 magnification and ħ the reduced Planck constant. In these formulas, ݉ఈ and F can be estimated from 99 direct ray tracing simulations and when used together with an experimentally measured angular 100 intensity profile, the source brightness Br can be estimated. For high brightness electron beam 101 applications, statistical Coulomb interactions lead to radial broadening of the virtual source size due 102 to lateral electron-electron interactions, which in turn, lower the brightness [35]. The calculation of 103 statistical Coulomb interactions within an electron source is not straightforward, since the electron 104 potential and beam size vary in the gun region. A semi-analytical technique known as the “slice 105 method” reported in the recent papers by Kruit, was introduced to do this [36]. First, the electric 106 potential distribution in the gun region is solved numerically, and then the beam size in the region is 107 determined by the simulated direct ray tracing of electron trajectories that leave the cathode-tip. The 108 gun region is subsequently divided into small segments over which the voltage and beam size is 109 assumed to remain constant, and an analytical expression is used to estimate the trajectory 110 displacement effect due to the lateral electron-electron interactions. 111 ܤ୰= ସூᇲ ஠ௗ౬మ௏౛౮౪ , (2) 92 (2) where ܫᇱ is the angular intensity, obtained by dividing the emission current over the acceptance 93 solid angle subtending the source. Bronsgeest et al. derived an analytical formula to calculate the 94 virtual source size [34], given by the following expression: 95 where ܫᇱ is the angular intensity, obtained by dividing the emission current over the acceptance 93 solid angle subtending the source. Bronsgeest et al. 2.1. Theory of cold field electron emission 65 Another method is using a point projection 118 microscope, and this technique for measuring dv is to place a knife edge at a small distance (a few 119 micrometers) from an emitter and to measure the angular width of the Fresnel fringes patterns 120 [12,39]. In this technique, the intensity distribution shape of the source is assumed to be a Gaussian 121 function, and the values of magnification and electron wavelength are needed to extract dv. 122 Another important electron gun parameter, apart from brightness, is its energy spread. The 3 energy spread, through the chromatic aberration of the objective lens, degrades the final spatial 4 resolution of an electron optical system, particularly at high relative beam energy spreads (say higher 5 than 10-4). Ideally, the energy distribution (∆ܧ) of the emitted electron beam should be as narrow as 6 possible while maintaining sufficient brightness. From the theoretical point of view, the total energy 7 distribution (TED) of electron emission in the thermal field regime was first derived by Young based 8 on the free-electron model as [40]: 9 ܲ(ܧ) = ௃ಷಿ ௗ൥ ௘௫௣൬ ಶషಶ೑ ೏ ൰ ଵା௘௫௣൬ ಶషಶ೑ ೖ೅൰ ൩ , (4) 2.1. Theory of cold field electron emission 65 Electron sources are an essential tool for investigation into a broad range of field emission 66 devices [26-30]. For electron microscopy applications, electron sources can be divided into two main 67 categories, known as thermionic and field emission [31]. A thermionic electron gun uses Joule-heating 68 induced thermal excitation to allow electrons to overcome the energy barrier between the metal tip 69 and the vacuum. The electron beam it produces is inherently incoherent, has a source size in the tens 70 of microns range, a relatively large energy spread (2 eV) and poor brightness (~106 A m-2 sr-1 V-1). A 71 CFE electron gun overcomes these limitations by decreasing the virtual source size to about 3 nm (by 72 significantly decreasing the emission tip to about 100 nm radius) and a low energy spread to about 73 0.3 eV (operating the source at room temperature), in which electrons pass from a solid surface to the 74 vacuum by creating a high local electric field [1]. The mechanism of the electron emission process is 75 based on the Fermi-Dirac distribution for a free electron gas in the potential energy barrier between 76 the metal tip and the vacuum [32]. 77 Fowler and Nordheim first found a classical theory describing the behavior of field emission 78 currents from a metallic surface in 1928 [33]. In the theory, the relationship between the emission 79 current (I) and the tip field strength (F) is expressed as, 80 ܫ= ܣ ଵ.ହ×ଵ଴షల థ ܨଶexp (− ଺.ସସ×ଵ଴వథభ.ఱ ி ) , (1) 81 (1) For successful electron microscopy applications, a high source brightness (Br) and a low energy 89 spread (∆ܧ) are always needed to provide a high-resolution focused electron beam. Calculation of Br 90 requires knowledge of the virtual source size (dv), which is given by the following expression [34]: 91 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805.0142.v1 doi:10.20944/preprints201805.0142.v1 ܤ୰= ସூᇲ ஠ௗ౬మ௏౛౮౪ , (2) 92 where ܫᇱ is the angular intensity, obtained by dividing the emission current over the acceptance 93 solid angle subtending the source. Bronsgeest et al. 130 In particular, 159 their use as potential electron field emitters exhibit excellent geometric, electrical and mechanical 160 properties, as compared to conventional metallic cold field emitters [43-46]. However, there are also 161 significant technical challenges that have yet to be resolved. 162 Generally, preparation of an individual nanoscopic CFE electron emitter is an extremely labor- 163 intensive delicate process. To mount a single nanowire or nanotube onto a supporting tip, the most 164 common method is to use microscopic manipulators under the observation of an electron microscope. 165 Fig. 2a and 2c show a single LaB6 nanowire [15] and a single CNT nanotube [9] mounted on a 166 sharpened W tip, respectively. The ends of the emitter were deposited with platinum (or carbon) by 167 electron beam induced deposition (EBID) in order to make good thermal contact and the final emitter 168 structure is fitted into an electron gun unit is shown in Fig. 2b, and its inset. Figs. 2d and 2e show the 169 mounting procedure for a carbon cone nanotip (CCnT) [13], where a CCnT was welded onto the apex 170 of the supporting tip by using a gas injecting system. The whole process has a very high probability 171 of incurring misalignment and damage 172 These nanoscale point-cathode emitters also have the limitation that they need to be operated in 173 an UHV level, in the 10-11 to 10-10 Torr range. For a LaB6 point-cathode emitter with a dimeter of nearly 174 60 nm, a maximum reduced brightness (Br) of 2.77×1011 A m-2 sr-1 V-1 and energy spread value of 0.367 175 eV have been reported in a vacuum with a base pressure of 10-10 Torr. The short-term stability profile 176 of the LaB6 point-cathode is 0.32% over 60 seconds, and the emission current deviates from the mean 177 within 5% throughout a week-long test. For the CNT and CCnT point-cathode emitters with 178 diameters of around 10 nm, the source electron optics parameters were reported to be 8.2×109 A m-2 179 148 Figure 1. SEM photos of the W<310> (a) and W<111> (b) CFE sources. (c) The source reduced 149 brightness Br versus the corresponding FWHM(E) values for the two CFE sources. Reproduced with 150 permission from [4], Copyright Elsevier, 2009. 151 Figure 1. SEM photos of the W<310> (a) and W<111> (b) CFE sources. 130 (c) The source reduced brightness Br versus the corresponding FWHM(E) values for the two CFE sources. Reproduced with permission from [4], Copyright Elsevier, 2009. The source reduced brightness (Br) versus the FWHM(E) values for the W<310> and W<111> 152 sources are plotted in Fig 1c. For the state-of-the-art W<310> field emitter, a reduced brightness value 153 of 4×109 A m-2 sr-1 V-1 has been reported, and the measured energy spread ranges from 0.33 eV to 0.48 154 eV [4]. The relatively large values of Br mainly come from the small values of virtual source size dv 155 (~3 nm) and the large values of angular current density (~100 µA/sr). 156 Nanostructures in the form of 1D Nanowires, Nanotubes, and Nanocones have attracted much attention in past decades and have been demonstrated for many potential applications. In particular, their use as potential electron field emitters exhibit excellent geometric, electrical and mechanical properties, as compared to conventional metallic cold field emitters [43-46]. However, there are also significant technical challenges that have yet to be resolved. Generally, preparation of an individual nanoscopic CFE electron emitter is an extremely labor- 163 intensive delicate process. To mount a single nanowire or nanotube onto a supporting tip, the most 164 common method is to use microscopic manipulators under the observation of an electron microscope. 165 Fig. 2a and 2c show a single LaB6 nanowire [15] and a single CNT nanotube [9] mounted on a 166 sharpened W tip, respectively. The ends of the emitter were deposited with platinum (or carbon) by 167 electron beam induced deposition (EBID) in order to make good thermal contact and the final emitter 168 structure is fitted into an electron gun unit is shown in Fig. 2b, and its inset. Figs. 2d and 2e show the 169 mounting procedure for a carbon cone nanotip (CCnT) [13], where a CCnT was welded onto the apex 170 of the supporting tip by using a gas injecting system. The whole process has a very high probability 171 of incurring misalignment and damage 172 These nanoscale point-cathode emitters also have the limitation that they need to be operated in an UHV level, in the 10-11 to 10-10 Torr range. 130 According to Knauer’s model of a 136 spherical electric field around an emitter of tip radius rtip, the energy broadening (in eV) due to 137 Coulomb interactions is given by [41]: 138 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805.0142 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805.0142.v1 ∆ܧ୆୭ୣ୰ୱୡ୦= 15.9 ൫ூᇲ൯మ/య ௥౪౟౦ భ/య௏౛౮౪ భ/య (5) 139 (5) 2.3. The state-of-the-art electron source used in electron microscopes 2.3. The state-of-the-art electron source used in electron microscopes 140 2.3. The state-of-the-art electron source used in electron microscopes 140 The state-of-the-art electron sources used in high-resolution electron microscopy are made from 141 a single crystal W field emitter (CFE) oriented in the <310> direction with a work function of 4.5 eV 142 [4]. Figs. 1a and 1b show typical SEM images of the W<310> and W<111> CFE sources, respectively. 143 As observed in the SEM images, the emitters have a spherical apex with a radius of around 130 nm 144 at the end of the cathode-tip. For a single crystal W field emitter, the emitter axis orientation is 145 required to be <310> or <111> at the emitter apex, due to their lower work function values, and this 146 can be achieved by using a zone melting technique [42]. 147 y g g q 148 Figure 1. SEM photos of the W<310> (a) and W<111> (b) CFE sources. (c) The source reduced 149 brightness Br versus the corresponding FWHM(E) values for the two CFE sources. Reproduced with 150 permission from [4], Copyright Elsevier, 2009. 151 The source reduced brightness (Br) versus the FWHM(E) values for the W<310> and W<111> 152 sources are plotted in Fig 1c. For the state-of-the-art W<310> field emitter, a reduced brightness value 153 of 4×109 A m-2 sr-1 V-1 has been reported, and the measured energy spread ranges from 0.33 eV to 0.48 154 eV [4]. The relatively large values of Br mainly come from the small values of virtual source size dv 155 (~3 nm) and the large values of angular current density (~100 µA/sr). 156 2.4. Nanoscale point-cathode emitters 157 Nanostructures in the form of 1D Nanowires, Nanotubes, and Nanocones have attracted much 158 attention in past decades and have been demonstrated for many potential applications. 130 130 (4) where kT = 0.155 eV at room temperature, JFN is the well-known Fowler-Nordheim emission 131 current density and d is the tunneling parameter given by: d = 9.76×10-11 F/ϕ1/2 t(y). The variable t(y) is 132 a slowly-varying function of y = 3.79×10-5 F1/2/ϕ and can be approximated by the formula t(y) = 1 + 133 0.1107 y1.33. The analytical formula is valid provided kT/d < 0.7 and y < 1. The longitudinal electron- 134 electron interactions (known as Boersch effect) will add to the intrinsic source energy spread which 135 causes an additional enlargement of the energy spread [35]. According to Knauer’s model of a 136 spherical electric field around an emitter of tip radius rtip, the energy broadening (in eV) due to 137 Coulomb interactions is given by [41]: 138 where kT = 0.155 eV at room temperature, JFN is the well-known Fowler-Nordheim emission 131 current density and d is the tunneling parameter given by: d = 9.76×10-11 F/ϕ1/2 t(y). The variable t(y) is 132 a slowly-varying function of y = 3.79×10-5 F1/2/ϕ and can be approximated by the formula t(y) = 1 + 133 0.1107 y1.33. The analytical formula is valid provided kT/d < 0.7 and y < 1. The longitudinal electron- 134 electron interactions (known as Boersch effect) will add to the intrinsic source energy spread which 135 causes an additional enlargement of the energy spread [35]. According to Knauer’s model of a 136 spherical electric field around an emitter of tip radius rtip, the energy broadening (in eV) due to 137 Coulomb interactions is given by [41]: 138 where kT = 0.155 eV at room temperature, JFN is the well-known Fowler-Nordheim emission 131 current density and d is the tunneling parameter given by: d = 9.76×10-11 F/ϕ1/2 t(y). The variable t(y) is 132 a slowly-varying function of y = 3.79×10-5 F1/2/ϕ and can be approximated by the formula t(y) = 1 + 133 0.1107 y1.33. The analytical formula is valid provided kT/d < 0.7 and y < 1. The longitudinal electron- 134 electron interactions (known as Boersch effect) will add to the intrinsic source energy spread which 135 causes an additional enlargement of the energy spread [35]. 130 For a LaB6 point-cathode emitter with a dimeter of nearly 60 nm, a maximum reduced brightness (Br) of 2.77×1011 A m-2 sr-1 V-1 and energy spread value of 0.367 eV have been reported in a vacuum with a base pressure of 10-10 Torr. The short-term stability profile of the LaB6 point-cathode is 0.32% over 60 seconds, and the emission current deviates from the mean within 5% throughout a week-long test. For the CNT and CCnT point-cathode emitters with diameters of around 10 nm, the source electron optics parameters were reported to be 8.2×109 A m-2 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805.0142.v1 sr-1 V-1, 0.48 eV, and 1.6×109 A m-2 sr-1 V-1, 0.32 eV respectively. The vacuum pressure requirements 180 are even more stringent for CNTs and CCnT point-cathode emitters, typically around 10-11 Torr. It 181 was found there exists some unrecoverable structure damage to the CNT during electron emission 182 under the high vacuum conditions of 9×10-8 Torr, and this leads to emission reduction or failure [47]. 183 In addition to its inherent UHV requirements, the CNT emitter is reported to have relatively large 184 fluctuations in emission current, e.g. up to 24% for an emission current of about 2 µA over 6 hours 185 with a sampling rate of 3×10-3 Hz. 186 187 Figure 2. Well-developed nanowire, nanotube, and nanocone point-cathode cold field emitters. (a) 188 Illustration showing the electron beam deposition process to fix a LaB6 NW onto a W needle. (b) SEM 189 image showing the finished LaB6 NW emitter and the complete emitter assembly used for field- 190 emission SEM, scale bar, 10 µm. Reproduced with permission from [15], Copyright Springer Nature, 191 2015; (c) TEM image of a very thin and short nanotube sample. Reproduced with permission from [9], 192 Copyright Elsevier, 2003; (d) View of part of the starting CCnT object. (e) Resulting new tip after 193 welding the carbon microfiber to the tungsten tip. The inset displays the whole set-up inside the dual 194 beam. Reproduced with permission from [13], Copyright Elsevier, 2012. 195 Figure 2. Well-developed nanowire, nanotube, and nanocone point-cathode cold field emitters. (a) Illustration showing the electron beam deposition process to fix a LaB6 NW onto a W needle. (b) SEM image showing the finished LaB6 NW emitter and the complete emitter assembly used for field- emission SEM, scale bar, 10 µm. 130 Reproduced with permission from [15], Copyright Springer Nature, 2015; (c) TEM image of a very thin and short nanotube sample. Reproduced with permission from [9], Copyright Elsevier, 2003; (d) View of part of the starting CCnT object. (e) Resulting new tip after welding the carbon microfiber to the tungsten tip. The inset displays the whole set-up inside the dual beam. Reproduced with permission from [13], Copyright Elsevier, 2012. These nanoscale CFE electron sources have not as yet been successfully integrated in any 196 commercial electron microscopes due to the aforementioned significant technical challenges, and 197 studies of nanowire, nanotube, and nanocone based cold field emitters have remained at the research 198 level. Meanwhile, other developments in CFE electron emitter research have come from the use of 199 materials such as graphene. 200 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805.0142.v1 216 3.1. Graphene film emitters To achieve successful electron emission from graphene, it is crucial to orientate thin graphene 217 edges or control the dimension of graphene protrusions on some supporting substrate, in order to 218 sufficiently enhance the applied electric field to produce quantum tunneling. Until now, many 219 emerging technologies have become available for fabricating vertically aligned graphene nanosheets 220 (VG) or graphene protrusions. The plasma-enhanced chemical vapor deposition (PECVD) is the most 221 widely used way to synthesize large-scale VG graphene films [50], which offers the advantages of a 222 lower substrate temperature and higher growth selectivity (Fig. 3a). Koh et al. presented a pulsed 223 laser deposition (PLD) method [51] to directly fabricate graphene thin film onto metal nano-sized 224 Spindt tips by using the transformation of solid carbon deposited from a pulsed laser system at low 225 temperature (Fig. 3b). The main drawback of these two deposition methods remains the difficulty of 226 controlling the graphene film ordering and density with problems arising due to the screening effect 227 [52,53]. 228 Figure 3. SEM images of microfabricated graphene film emitters. (a) Top view SEM micrograph of as grown FLG by microwave PECVD. Reproduced with permission from [50], Copyright AIP, 2008; (b) Graphene onto metal nano-Spindt tip by pulsed laser deposition. Reproduced with permission from [51], Copyright Wiley, 2014; (c) Graphene films prepared by electrophoretic deposition. Reproduced with permission from [54], Copyright Wiley, 2009; (d) Screen-printed graphene films. Reproduced with permission from [55], Copyright IOP, 2009; (e) Hybrid structures of graphene stretched on patterned and size-controllable Si nanowires. Reproduced with permission from [24], Copyright Springer Nature, 2015. Figure 3. SEM images of microfabricated graphene film emitters. (a) Top view SEM micrograph of as grown FLG by microwave PECVD. Reproduced with permission from [50], Copyright AIP, 2008; (b) Graphene onto metal nano-Spindt tip by pulsed laser deposition. Reproduced with permission from [51], Copyright Wiley, 2014; (c) Graphene films prepared by electrophoretic deposition. Reproduced with permission from [54], Copyright Wiley, 2009; (d) Screen-printed graphene films. Reproduced with permission from [55], Copyright IOP, 2009; (e) Hybrid structures of graphene stretched on patterned and size-controllable Si nanowires. Reproduced with permission from [24], Copyright Springer Nature, 2015. Wu et al. 3. Graphene based cold field emitters 201 Fast development of 2D graphene in recent years has led to a variety of different applications 202 for field emission based devices [19]. Compared with other metallic or 1D nanoscale CFE electron 203 sources, graphene is well known for possessing several desirable properties: (1) it has excellent 204 thermal, mechanical, and electrical characteristics [16,20], (2) its work function can be significantly 205 lowered both by direct contact with metals (effectively doping it), and through the application of 206 intense electric fields [48,49], (3) it is extremely flexible. Graphene CFE electron sources fall into two 207 main categories: the single-tip cathode field nano-emitter (which includes point cathodes and ring 208 cathodes) and graphene film cathodes, which consist of densely packed graphene nano-emitters. 209 Only the former can be used for electron microscopy applications, as the latter produces a large array 210 of defocused overlapping electron virtual sources that cannot be subsequently defocused down to a 211 single nano-sized probe. 212 213 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805.0142.v1 not suitable for electron microscopy applications, graphene film emitters are very useful for many 251 non-focused electron beam applications, like flat panel display [27,60], X-ray sources [61-63], etc. 252 3.2. Graphene point-cathode field emitters 253 Until now, graphene point-cathode field emitters for electron microscopy applications have been 254 rarely studied due to the difficulties inherent in controlling graphene morphology. Tsai et al. [64] 255 reported an idea of overlaying an ultra-thin (~1 nm) graphene flake on to a blunted tungsten probe 256 by van der Waals forces, as shown in Fig. 4a, which would make it applicable to single-column 257 electron beam microscopy applications. However, this loosely hanging ultra-thin freestanding 258 graphene flake is not suitable for practical applications, since the graphene can easily be damaged or 259 detached from its supporting probe. More importantly, the emitting surface is not circular, it spans a 260 few micrometers along one direction, and this means it can’t be subsequently defocused down to a 261 single nano-meter electron spot. 262 not suitable for electron microscopy applications, graphene film emitters are very useful for many 251 non-focused electron beam applications, like flat panel display [27,60], X-ray sources [61-63], etc. 252 Until now, graphene point-cathode field emitters for electron microscopy applications have been 254 rarely studied due to the difficulties inherent in controlling graphene morphology. Tsai et al. [64] 255 reported an idea of overlaying an ultra-thin (~1 nm) graphene flake on to a blunted tungsten probe 256 by van der Waals forces, as shown in Fig. 4a, which would make it applicable to single-column 257 electron beam microscopy applications. However, this loosely hanging ultra-thin freestanding 258 graphene flake is not suitable for practical applications, since the graphene can easily be damaged or 259 detached from its supporting probe. More importantly, the emitting surface is not circular, it spans a 260 few micrometers along one direction, and this means it can’t be subsequently defocused down to a 261 single nano-meter electron spot. 262 263 Figure 4. Images of graphene edge field emitters and field emission characteristics. (a) Field emission 264 from individual freestanding graphene edge. Reproduced with permission from [64], Copyright 265 Wiley, 2013; (b) Field emission from atomically thin edges of reduced graphene oxide. Reproduced 266 with permission from [69], Copyright ACS publications, 2011. 267 Figure 4. Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805 applied the electrophoretic deposition (EPD) technique [54] to fabricate large area 238 homogeneous single-layer graphene films, and this processing technique is more economic and 239 versatile compared to PECVD (Fig. 3b). Screen printing technology is a sophisticated technology 240 widely used in large-scale applications coating on various substrates. A screen-printed graphene 241 cathode was fabricated by Qian et al. [55] using high-yield graphene prepared by a modified 242 Hummers method and a hydrazine hydrate reduction process (Fig. 3d). Another efficient way to 243 produce uniform nanometer-scale graphene protrusions is through transferring graphene onto some 244 sharp supporting substrates (Fig. 3e) [23,24,56]. However, the exfoliated graphene by using either 245 screen printing technologies, or electrophoretic deposition, or simple transfer have been found to 246 lead to many defects to the as-grown graphene, that degrades its physical properties [57-59]. For 247 graphene film emitters, high current densities, around 23 mA cm-2, have been reported with good 248 stability over a period of several hours [54]. Current density here, is calculated by dividing the total 249 measured emission current by the average area on the substrate occupied by emitter sites. Although 250 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 In doing so, they have overcome many Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805.0142.v1 of the practical difficulties associated with conventional metallic tungsten CFE sources, such as 289 misalignment, damage, stringent vacuum requirements, and current instabilities. They reported 290 stable field emission results from a graphene coated nickel wire tip in HV conditions (4×10-8 Torr), 291 where the tip diameter is in the submicron to micron range, over a factor of three times larger than 292 conventional single crystal tungsten tip sizes, sizes that are comparable to the Schottky field emitter 293 tip. 294 Figure 5. Graphene coated point cathode field emitter. (a) SEM images of graphene coated point cathode emitter. Reproduced with permission from [71], Copyright Springer Nature, 2018; (b) Source brightness and energy spread. Reproduced with permission from [71], Copyright Springer Nature, 2018. Figure 5. Graphene coated point cathode field emitter. (a) SEM images of graphene coated point cathode emitter. Reproduced with permission from [71], Copyright Springer Nature, 2018; (b) Source brightness and energy spread. Reproduced with permission from [71], Copyright Springer Nature, 2018. The Graphene-Ni point cathode was fabricated by a two-step process, which consists firstly of 300 an electrochemical etching process to obtain a sharp Ni tip, and secondly, a graphene coating step of 301 chemical vapor deposition (CVD). The Graphene-Ni point cathode was shown to have a maximum 302 emission current of about 5 µA, and the experimental results do not indicate any obvious need for 303 regular flashing (heating) of the cathode. More importantly, experimental results demonstrate that 304 the large diameter Graphene-Ni point cathodes are capable of emitting over a few micro-amps of 305 current stably for over 72 hours, and no emitter failure was observed. In their study, direct ray tracing 306 simulations of electron trajectory paths leaving the emitter surface were carried out to estimate ݉ఈ 307 and F, from which the virtual source size dv and gun brightness Br were then calculated by using Eqs. 308 2 and 3. The source brightness values range from 7×107 A m-2 sr-1 V-1 to 2.51×109 A m-2 sr-1 V-1 for a 309 cathode tip radii range of 130 nm to 800 nm. There is a trade-off between the source brightness value 310 and the tip size. Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 Images of graphene edge field emitters and field emission characteristics. (a) Field emission from individual freestanding graphene edge. Reproduced with permission from [64], Copyright Wiley, 2013; (b) Field emission from atomically thin edges of reduced graphene oxide. Reproduced with permission from [69], Copyright ACS publications, 2011. For most single point field emitters, the emission current is surface sensitive and the adsorption 268 of any gas molecules will increase the surface work function [14,65]. A high emission current under 269 excessive applied voltage ionizes many gas molecules around the emission surface and eventually 270 triggers a vacuum arc. Therefore, the practical use of cold field emitters in electron microscopes 271 typically requires cathode flashing at regular intervals to remove the residual contaminant molecules. 272 Endo et al. [66] reported that CFE electron sources can be cleaned by in situ Joule heating during the 273 emission process in high vacuum (HV) conditions, which is well known as a “conditioning” process 274 in many cold field emission experiments [67-69]. For example, during the first and second cycle of 275 voltage ramping up from the graphene flake overlaid on the tungsten probe (Fig. 4a), the current- 276 applied voltage characteristic presents a typical conditioning process, which is observed to deviate 277 from the conventional FN plot. The third cycle of electron emission shows a well fitted FN plot with 278 an emission current up to 6 µA. Similar work has been done by other researchers studying the field 279 emission characteristics from reduced graphene oxide (Fig. 4b) and carbon nanowalls, and they have 280 obtained high emission current, around several tens of micro-amps [69,70]. However, none of these 281 kinds of emission conditioning experiments on CFE graphene flakes have direct application for 282 electron microscopy, where a single point graphene source is required. 283 Recently, the research group at the National University of Singapore, led by A. Khursheed, have presented the development of a completely new type of cold field emission electron source (Fig. 5a), a Graphene-Ni point cathode for electron microscopy systems [71]. They present a way of overcoming the morphological problems associated with micro-fabricating single-tip graphene emitters, by coating it on to a sharpened wire metal wire tip. Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.209 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805.0142.v1 3.3. Graphene ring-cathode field emitters 323 Khursheed first proposed the idea of using a ring-cathode emitter for combining high spatial 324 resolution with high beam current for focused electron beam applications in 2013 [73,74]. Khursheed 325 presented electron focused beam designs based upon using ring-cathodes together with off-axis 326 aberration correction techniques. The first step towards a practical implementation of this idea is to 327 develop a ring-cathode emitter. The proposal of a field emission ring-cathode gun unit has the 328 advantage of intrinsically being a large area field emitter, and it is therefore expected to overcome 329 the well-known disadvantage of conventional point-cathode field emitters having relatively low total 330 current (compared to earlier larger cathode electron gun designs). The much larger emission area of 331 a ring-cathode field emitter, compared to a point-cathode field emitter is also expected to provide it 332 with greater current stability. 333 Nguyen et al. [75] reported a versatile and robust method based on graphene growth on Ni 334 templates and thermo-assisted removal of poly(methyl methacrylate) (PMMA) for fabrication of 335 macroscopic and freestanding tubular graphene (TG) architectures. The TG architectures have a 336 diameter of 50 µm with a wall thickness in the range of 2.1-2.9 nm. The individual TG emitter can 337 produce an extremely high emission current, up to 0.46 mA at a very low external applied electric 338 field of 0.68 V µm-1. This most likely comes from ultrathin edges on graphitic walls, which consist of 339 a great number of field emission sites. Another important observation is that the TG CFE electron 340 source has good current stability and the stability is maintainable for days under HV conditions 341 (2.2×10-8 Torr). However, one limitation of TG architectures fabricated by Nguyen et al. is that the 342 edges are very jagged rather than being smooth, making it hard to be directly used as a CFE electron 343 source for electron microscopy applications. Moreover, transfer and alignment of such a large 344 diameter graphene tube is an extremely delicate process. 345 Khursheed first proposed the idea of using a ring-cathode emitter for combining high spatial 324 resolution with high beam current for focused electron beam applications in 2013 [73,74]. Khursheed 325 presented electron focused beam designs based upon using ring-cathodes together with off-axis 326 aberration correction techniques. Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.209 The first step towards a practical implementation of this idea is to 327 develop a ring-cathode emitter. The proposal of a field emission ring-cathode gun unit has the 328 advantage of intrinsically being a large area field emitter, and it is therefore expected to overcome 329 the well-known disadvantage of conventional point-cathode field emitters having relatively low total 330 current (compared to earlier larger cathode electron gun designs). The much larger emission area of 331 a ring-cathode field emitter, compared to a point-cathode field emitter is also expected to provide it 332 with greater current stability. 333 Nguyen et al. [75] reported a versatile and robust method based on graphene growth on Ni 334 templates and thermo-assisted removal of poly(methyl methacrylate) (PMMA) for fabrication of 335 macroscopic and freestanding tubular graphene (TG) architectures. The TG architectures have a 336 diameter of 50 µm with a wall thickness in the range of 2.1-2.9 nm. The individual TG emitter can 337 produce an extremely high emission current, up to 0.46 mA at a very low external applied electric 338 field of 0.68 V µm-1. This most likely comes from ultrathin edges on graphitic walls, which consist of 339 a great number of field emission sites. Another important observation is that the TG CFE electron 340 source has good current stability and the stability is maintainable for days under HV conditions 341 (2.2×10-8 Torr). However, one limitation of TG architectures fabricated by Nguyen et al. is that the 342 edges are very jagged rather than being smooth, making it hard to be directly used as a CFE electron 343 source for electron microscopy applications. Moreover, transfer and alignment of such a large 344 diameter graphene tube is an extremely delicate process. 345 Figure 6. Graphene ring-cathode field emitter. (a) Macroscopic, freestanding, and tubular graphene architectures. Reproduced with permission from [75], Copyright ACS publications, 2015; (b) A few- layer graphene ring-cathode field emitter. Reproduced with permission from [76], Copyright Elsevier, 2016; Figure 6. Graphene ring-cathode field emitter. (a) Macroscopic, freestanding, and tubular graphene architectures. Reproduced with permission from [75], Copyright ACS publications, 2015; (b) A few- layer graphene ring-cathode field emitter. Reproduced with permission from [76], Copyright Elsevier, 2016; Shao et al. [76] reported an in-situ fabrication technique, eliminating any transfer and alignment 351 process. Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 On the one hand, a larger tip size has a greater emission area, thereby having a better 311 current stability and can operate in much less stringent vacuum conditions, predicted by the root 312 mean square (RMS) noise ratio varying inversely with the emission area [72]. One the other hand, a 313 larger tip size has a larger virtual source size and lower source brightness value. This trade-off is 314 applicable to all CFE sources, and most of the previous studies on CNT, LaB6, and CCnT tips sought 315 to maximized gun brightness at the expense of gun current stability and stringent vacuum 316 requirements. Another stand out feature of the Graphene-Ni point cathodes is their low energy 317 spread (Fig. 5b). The lowest reported energy spread is 0.246 eV obtained from a tip with a radius of 318 500 nm, and these properties make cold field emission sources the best type of electron source for 319 forming nano-size electron probes combined with high current intensity. Therefore, the promising 320 prospect of using Graphene-based CFE cathodes for high brightness high resolution electron 321 microscopy applications has recently been established. 322 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805.0142.v1 achieved, it is expected to a wide variety of applications in subjects such as lithography, mass spectrometer, X-ray tube and accelerator physics. achieved, it is expected to a wide variety of applications in subjects such as lithography, mass spectrometer, X-ray tube and accelerator physics. 357 358 4. Conclusions High brightness, low energy spread and good current stability are critical for CFE electron 360 sources for electron microscopy applications. Although considerable research has been carried out 361 into developing single crystal tungsten and other 1D nanostructure-based field emitters, they have 362 as yet, faced many practical technological difficulties, such as stringent UHV requirements, poor 363 current stability and fast emission decay. Therefore, other ways to make CFE electron sources need 364 to be investigated. With the fast development of 2D graphene in recent years, graphene has been 365 proven to have ultra-high aspect ratios, good electric conductivity, chemical inertness and mechanical 366 hardness, and these properties make graphene based field emitters an attractive possible alternative. 367 Three types of graphene-based field emitters have been highlighted in this review: graphene film 368 emitters, graphene point/edge-cathode emitters, and graphene ring-cathode emitters. Most graphene 369 field emitters proposed and studied so however, involve field emission from multiple emission sites, 370 and are therefore not suitable for electron microscopy applications. 371 This paper has highlighted some recent promising developments in the category of single-point 372 and ring-shaped graphene field emitters for electron microscopy applications, however, the 373 investigation of graphene field emitters is still in an early stage of development, and there is still 374 much room for further improvement. More emission characterization tests need to be performed, 375 ones that can measure the source virtual source size, transverse coherent length, emission under a 376 variety of different vacuum conditions, and emitter lifetime need to be made. An electron gun unit 377 that can accommodate promising graphene emitters, which has its optical axis well aligned to the 378 central axis of the cathode still needs to be developed. Beyond that, electron guns based upon the 379 new class of graphene based field emitters need to be fitted on to electron microscopes, and their 380 performance critically compared to convention systems, in terms of parameters such as image 381 resolution and signal-to-noise. 382 Acknowledgments: This work is funded by the National Research Foundation (NRF) Competitive Research 383 Acknowledgments: This work is funded by the National Research Foundation (NRF) Competitive Research 383 Programme (CRP) award # NRFCRP13-2014-04 titled “Micro-fabricated Ring Carbon Nanotube electron/ion 384 sources”. 385 Conflicts of Interest: The authors declare no conflict of interest. 386 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.209 They obtained a graphene ring emitter, which consists of a graphene tube grown in-situ on 352 a sharp nickel wire tip. The diameter of the tubular graphene is about 5 µm while the edge of the tube 353 is approximately 2.7 nm. They have obtained high emission current of ~30 µA at the relatively low 354 applied field of ~1.75 V/mm. The ring-cathode field emitter is a new type of field emitter source, and 355 suitable electron ring-focused beam columns will first need to be designed for it. When that is 356 References 387 Dyke, W.; Dolan, W. Field emission. Adv. Electron. Electron Phys. 1956, 8, 89-185. 1. Dyke, W.; Dolan, W. Field emission. Adv. Electron. Electron Phys. 1956, 8, 89-185. 388 Crewe, A.; Wall, J.; Welter, L. A high-resolution scanning transmission electron microscope. J. Appl. Phys 1968, 39, 5861-5868. 3. Crewe, A.V.; Isaacson, M.; Johnson, D. A simple scanning electron microscope. Rev. Sci. Instrum. 1969, 40, 391 241-246. 392 4. Swanson, L.; Schwind, G. A review of the cold-field electron cathode. Adv. Imaging Electron Phys. 2009, 393 159, 63-100. 394 5. Schwind, G.; Magera, G.; Swanson, L. Comparison of parameters for schottky and cold field emission 395 sources. J. Vac. Sci. Technol. B 2006, 24, 2897-2901. 396 6. Tuggle, D.; Swanson, L. Emission characteristics of the zro/w thermal field electron source. J. Vac. Sci. 397 Technol. B 1985, 3, 220-223. 398 7. Fransen, M.; Overwijk, M.; Kruit, P. Brightness measurements of a zro/w schottky electron emitter in a 399 transmission electron microscope. Appl. Surf. Sci. 1999, 146, 357-362. 400 8. Crewe, A.; Eggenberger, D.; Wall, J.; Welter, L. Electron gun using a field emission source. Rev. Sci. Instrum. 401 1968, 39, 576-583. 402 9. De Jonge, N.; Van Druten, N. Field emission from individual multiwalled carbon nanotubes prepared in 403 an electron microscope. Ultramicroscopy 2003, 95, 85-91. 404 10. Bonard, J.-M.; Dean, K.A.; Coll, B.F.; Klinke, C. Field emission of individual carbon nanotubes in the 405 scanning electron microscope. Phys. Rev. Lett. 2002, 89, 197602. 406 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805.0142.v1 11. Fransen, M.; Van Rooy, T.L.; Kruit, P. Field emission energy distributions from individual multiwalled 407 carbon nanotubes. Appl. Surf. Sci. 1999, 146, 312-327. 408 2. De Jonge, N.; Lamy, Y.; Schoots, K.; Oosterkamp, T.H. High brightness electron beam from a multi-wa carbon nanotube. Nature 2002, 420, 393. 13. Houdellier, F.; De Knoop, L.; Gatel, C.; Masseboeuf, A.; Mamishin, S.; Taniguchi, Y.; Delmas, M.; 411 Monthioux, M.; Hÿtch, M.; Snoeck, E. Development of tem and sem high brightness electron guns using 412 cold-field emission from a carbon nanotip. Ultramicroscopy 2015, 151, 107-115. 413 14. Yeong, K.; Thong, J. Field-emission properties of ultrathin 5 nm tungsten nanowire. J. Appl. Phys. 2006, 414 100, 114325. 415 15. Zhang, H.; Tang, J.; Yuan, J.; Yamauchi, Y.; Suzuki, T.T.; Shinya, N.; Nakajima, K.; Qin, L.-C. An ultrabright 416 and monochromatic electron point source made of a lab 6 nanowire. Nat. References 387 Nanotechnol. 2016, 11, 273. 417 16. Novoselov, K.S.; Geim, A.K.; Morozov, S.; Jiang, D.; Katsnelson, M.; Grigorieva, I.; Dubonos, S.; Firsov; AA. 418 Two-dimensional gas of massless dirac fermions in graphene. Nature 2005, 438, 197. 419 17. Xiao, Z.; She, J.; Deng, S.; Tang, Z.; Li, Z.; Lu, J.; Xu, N. Field electron emission characteristics and physical 420 mechanism of individual single-layer graphene. Acs Nano 2010, 4, 6332-6336. 421 18. Lei, W.; Li, C.; Cole, M.T.; Qu, K.; Ding, S.; Zhang, Y.; Warner, J.H.; Zhang, X.; Wang, B.; Milne, W.I. A 422 graphene-based large area surface-conduction electron emission display. Carbon 2013, 56, 255-263. 423 19. Geim, A.K.; Novoselov, K.S. The rise of graphene. Nat. Mater. 2007, 6, 183. 424 20. Balandin, A.A.; Ghosh, S.; Bao, W.; Calizo, I.; Teweldebrhan, D.; Miao, F.; Lau, C.N. Superior thermal 425 conductivity of single-layer graphene. Nano Lett. 2008, 8, 902-907. 426 21. Neto, A.C.; Guinea, F.; Peres, N.M.; Novoselov, K.S.; Geim, A.K. The electronic properties of graphene. 427 Rev. Mod. Phys. 2009, 81, 109. 428 22. Lee, C.; Wei, X.; Kysar, J.W.; Hone, J. Measurement of the elastic properties and intrinsic strength of 429 monolayer graphene. science 2008, 321, 385-388. 430 23. Ye, D.; Moussa, S.; Ferguson, J.D.; Baski, A.A.; El-Shall, M.S. Highly efficient electron field emission from 431 graphene oxide sheets supported by nickel nanotip arrays. Nano Lett. 2012, 12, 1265-1268. 432 24. Lv, S.; Li, Z.; Liao, J.; Wang, G.; Li, M.; Miao, W. Optimizing field emission properties of the hybrid 433 structures of graphene stretched on patterned and size-controllable sinws. Sci. Rep. 2015, 5, 15035. 434 25. Zhang, Y.; Du, J.; Tang, S.; Liu, P.; Deng, S.; Chen, J.; Xu, N. Optimize the field emission character of a 435 vertical few-layer graphene sheet by manipulating the morphology. Nanotechnology 2011, 23, 015202. 436 26. Hernandez-Garcia, C.; O Shea, P.G.; Stutzman, M.L. Electron sources for accelerators. Phys. today 2 44. 27. Choi, W.; Chung, D.; Kang, J.; Kim, H.; Jin, Y.; Han, I.; Lee, Y.; Jung, J.; Lee, N.; Park, G. Fully sealed, high- 439 brightness carbon-nanotube field-emission display. Appl. Phys. Lett. 1999, 75, 3129-3131. 440 28. Saito, Y.; Uemura, S. Field emission from carbon nanotubes and its application to electron sources. Carbon 441 2000, 38, 169-182. 442 29. Barber, M.; Bordoli, R.; Sedgwick, R.; Tyler, A. Fast atom bombardment of solids as an ion source in mass 443 spectrometry. References 387 Zhang, H.; Tang, J.; Zhang, Q.; Zhao, G.; Yang, G.; Zhang, J.; Zhou, O.; Qin, L.C. Field emission of electrons 472 from single lab6 nanowires. Adv. Mater. 2006, 18, 87-91. 473 473 474 47. Jin, C.; Wang, J.; Wang, M.; Su, J.; Peng, L.-M. In-situ studies of electron field emission of single carbon 474 nanotubes inside the tem. Carbon 2005, 43, 1026-1031. 475 48. Giovannetti, G.; Khomyakov, P.; Brocks, G.; Karpan, V.v.; Van den Brink, J.; Kelly, P.J. Doping graphene 476 with metal contacts. Phys. Rev. Lett. 2008, 101, 026803. 477 49. Kwon, K.C.; Choi, K.S.; Kim, B.J.; Lee, J.-L.; Kim, S.Y. Work-function decrease of graphene sheet usin metal carbonates. J. Phys. Chem. C 2012, 116, 26586-26591. 50. Malesevic, A.; Kemps, R.; Vanhulsel, A.; Chowdhury, M.P.; Volodin, A.; Van Haesendonck, C. Field 480 emission from vertically aligned few-layer graphene. J. Appl. Phys. 2008, 104, 084301. 481 51. Koh, A.T.; Foong, Y.M.; Yusop, Z.; Tanemura, M.; Chua, D.H. Low temperature direct of graphene onto 482 metal nano-spindt tip with applications in electron emission. Adv. Mater. Interfaces 2014, 1. 483 52. Suh, J.S.; Jeong, K.S.; Lee, J.S.; Han, I. Study of the field-screening effect of highly ordered carbon nanotube 484 arrays. Appl. Phys. Lett. 2002, 80, 2392-2394. 485 y pp y 53. Bonard, J.M.; Weiss, N.; Kind, H.; Stöckli, T.; Forró, L.s.; Kern, K.; Chatelain, A. Tuning the field emission 486 properties of patterned carbon nanotube films. Adv. Mater. 2001, 13, 184-188. 487 54. Wu, Z.S.; Pei, S.; Ren, W.; Tang, D.; Gao, L.; Liu, B.; Li, F.; Liu, C.; Cheng, H.M. Field emission of single- 488 layer graphene films prepared by electrophoretic deposition. Adv. Mater. 2009, 21, 1756-1760. 489 55. Qian, M.; Feng, T.; Ding, H.; Lin, L.; Li, H.; Chen, Y.; Sun, Z. Electron field emission from screen-printed 490 graphene films. Nanotechnology 2009, 20, 425702. 491 56. Hwang, J.O.; Lee, D.H.; Kim, J.Y.; Han, T.H.; Kim, B.H.; Park, M.; No, K.; Kim, S.O. Vertical zno 492 nanowires/graphene hybrids for transparent and flexible field emission. J. Mater. Chem. 2011, 21, 3432- 493 3437. 494 57. Hallam, T.; Berner, N.C.; Yim, C.; Duesberg, G.S. Strain, bubbles, dirt, and folds: A study of graphene 495 polymer-assisted transfer. Adv. Mater. Interfaces 2014, 1. 496 58. Li, X.; Zhu, Y.; Cai, W.; Borysiak, M.; Han, B.; Chen, D.; Piner, R.D.; Colombo, L.; Ruoff, R.S. Transfer of 497 large-area graphene films for high-performance transparent conductive electrodes. References 387 Nature 1981, 293, 270. 444 30. Khursheed, A. Scanning electron microscope. Google Patents: 2007. 445 30. Khursheed, A. Scanning electron microscope. Google Patents: 2007. 445 32. Murphy, E.L.; Good Jr, R. Thermionic emission, field emission, and the transition region. Phys. Rev. 1956, 447 102, 1464. 448 33. Fowler, R.H.; Nordheim, L. Electron emission in intense electric fields. Proc. R. Soc. Lond. A 1928, 119, 173- 449 181. 450 34. Bronsgeest, M.; Barth, J.; Swanson, L.; Kruit, P. Probe current, probe size, and the practical brightness for 451 probe forming systems. J. Vac. Sci. Technol. B 2008, 26, 949-955. 452 35. Kruit, P.; Jansen, G.H. Space charge and statistical coulomb effects. Handbook of Charged Particle Optics 453 1997, 2. 454 36. Cook, B.; Verduin, T.; Hagen, C.; Kruit, P. Brightness limitations of cold field emitters caused by coulomb 455 interactions. J. Vac. Sci. Technol. B 2010, 28, C6C74-C76C79. 456 37. Kratschmer, E.; Rishton, S.; Kern, D.; Chang, T. Quantitative analysis of resolution and stability in 457 nanometer electron beam lithography. J. Vac. Sci. Technol. B 1988, 6, 2074-2079. 458 38. Rishton, S.; Beaumont, S.; Wilkinson, C. Measurement of the profile of finely focused electron beams in a 459 scanning electron microscope. J. Phys. E: Sci. Instrum. 1984, 17, 296. 460 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805.0142.v1 39. Fransen, M.; Damen, E.; Schiller, C.; van Rooy, T.; Groen, H.; Kruit, P. Characterization of ultrasharp field 461 emitters by projection microscopy. Appl. Surf. Sci. 1996, 94, 107-112. 462 40. Young, R.D. Theoretical total-energy distribution of field-emitted electrons. Phys. Rev. 1959, 113, 1 41. Knauer, W. Energy broadening in field emitted electron and ion-beams. Optik 1981, 59, 335-354. 41. Knauer, W. Energy broadening in field emitted electron and ion-beams. Optik 1981, 59, 335-354. 464 42. Dyke, W.; Charbonnier, F.; Strayer, R.; Floyd, R.; Barbour, J.; Trolan, J. Electrical stability and lif heated field emission cathode. J. Appl. Phys. 1960, 31, 790-805. 43. Ajayan, P. Nanotubes from carbon. Chem. Rev. 1999, 99, 1787-1800. 43. Ajayan, P. Nanotubes from carbon. Chem. Rev. 1999, 99, 1787-1800. 467 44. Berber, S.; Kwon, Y.-K.; Tománek, D. Unusually high thermal conductivity of carbon nanotubes. Phys. Rev. 468 Lett. 2000, 84, 4613. 469 45. Ebbesen, T.; Lezec, H.; Hiura, H.; Bennett, J.; Ghaemi, H.; Thio, T. Electrical conductivity of individual 470 carbon nanotubes. Nature 1996, 382, 54. 471 472 46. 65. Kleint, C. Electron emission noise. Surf. Sci. 1988, 200, 472-489. 513 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805.0142 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805.0142.v1 66. Endo, Y.; Honjo, I.; Goto, S. Microelectron gun with silicon field emitter. J. Vac. Sci. Technol. 514 3082-3085. 515 67. Purcell, S.; Vincent, P.; Journet, C.; Binh, V.T. Hot nanotubes: Stable heating of individual multiw 516 nanotubes to 2000 k induced by the field-emission current. Phys. Rev. Lett. 2002, 88, 105502. 517 68. Semet, V.; Binh, V.T.; Vincent, P.; Guillot, D.; Teo, K.; Chhowalla, M.; Amaratunga, G.; M 518 Legagneux, P.; Pribat, D. Field electron emission from individual carbon nanotubes of a vertica 519 array. Appl. Phys. Lett. 2002, 81, 343-345. 520 69. Yamaguchi, H.; Murakami, K.; Eda, G.; Fujita, T.; Guan, P.; Wang, W.; Gong, C.; Boisse, J.; Mille 521 M. Field emission from atomically thin edges of reduced graphene oxide. Acs Nano 2011, 5, 494 522 70. Wang, Y.; Yang, Y.; Zhao, Z.; Zhang, C.; Wu, Y. Local electron field emission study of two-di 523 carbon. Appl. Phys. Lett. 2013, 103, 033115. 524 71. Shao, X.; Srinivasan, A.; Ang, W.K.; Khursheed, A. A high-brightness large-diameter graphene co 525 cathode field emission electron source. Nat. Commun. 2018, 9, 1288. 526 72. Swanson, L.; Martin, N. Field electron cathode stability studies: Zirconium/tungsten thermal-fiel 527 J. Appl. Phys. 1975, 46, 2029-2050. 528 73. Khursheed, A. Design of a focused electron beam column for ring-cathode sources. Ultramicros 529 128, 10-23. 530 74. Khursheed, A.; Ang, W.K. Annular focused electron/ion beams for combining high spatial resol 531 high probe current. Microsc. Microanal. 2016, 22, 948-954. 532 75. Nguyen, D.D.; Suzuki, S.; Kato, S.; To, B.D.; Hsu, C.C.; Murata, H.; Rokuta, E.; Tai, N.-H.; Yosh 533 Macroscopic, freestanding, and tubular graphene architectures fabricated via thermal annealing. 534 2015, 9, 3206-3214. 535 76. Shao, X.; Srinivasan, A.; Zhao, Y.; Khursheed, A. A few-layer graphene ring-cathode field e 536 focused electron/ion beam applications. Carbon 2016, 110, 378-383. 537 538 539 66. Endo, Y.; Honjo, I.; Goto, S. Microelectron gun with silicon field emitter. J. Vac. Sci. Technol. B 1998, 16, 3082-3085. 67. Purcell, S.; Vincent, P.; Journet, C.; Binh, V.T. Hot nanotubes: Stable heating of individual multiwall carbon nanotubes to 2000 k induced by the field-emission current. Phys. Rev. Lett. 2002, 88, 105502. 68. Semet, V.; Binh, V.T.; Vincent, P.; Guillot, D.; Teo, K.; Chhowalla, M.; Amaratunga, G.; Milne, W.; 8 Legagneux, P.; Pribat, D. References 387 Nano Lett. 2009, 9, 498 4359-4363. 499 59. Suk, J.W.; Kitt, A.; Magnuson, C.W.; Hao, Y.; Ahmed, S.; An, J.; Swan, A.K.; Goldberg, B.B.; Ruoff, R.S. 500 Transfer of cvd-grown monolayer graphene onto arbitrary substrates. ACS nano 2011, 5, 6916-6924. 501 J g J g Transfer of cvd-grown monolayer graphene onto arbitrary substrates. ACS nano 2011, 5, 6916-6924. 501 60. Yang, C.; Liu, N.; Zeng, W.; Long, F.; Song, Z.; Su, J.; Li, L.; Zou, Z.; Fang, G.; Xiong, L. Superelastic and 502 ultralight electron source from modifying 3d reduced graphene aerogel microstructure. Nano Energy 2017, 503 33, 280-287. 504 61. Lee, H.R.; Lee, S.W.; Shikili, C.; Kang, J.S.; Lee, J.; Park, K.C. Enhanced electron emission of paste cnt 505 emitters with nickel buffer layer and its x-ray application. J. Nanosci. Nanotechnol. 2016, 16, 12053-12058. 506 61. Lee, H.R.; Lee, S.W.; Shikili, C.; Kang, J.S.; Lee, J.; Park, K.C. Enhanced electron emission of paste cnt 505 emitters with nickel buffer layer and its x-ray application. J. Nanosci. Nanotechnol. 2016, 16, 12053-12058. 506 62. Sugie, H.; Tanemura, M.; Filip, V.; Iwata, K.; Takahashi, K.; Okuyama, F. Carbon nanotubes as electron 507 508 emitters with nickel buffer layer and its x-ray application. J. Nanosci. Nanotechnol. 2016, 16, 12053-12058. 506 62. Sugie, H.; Tanemura, M.; Filip, V.; Iwata, K.; Takahashi, K.; Okuyama, F. Carbon nanotubes as electron 507 source in an x-ray tube. Appl. Phys. Lett. 2001, 78, 2578-2580. 508 62. Sugie, H.; Tanemura, M.; Filip, V.; Iwata, K.; Takahashi, K.; Okuyama, F. Carbon nanotubes as electron 507 source in an x-ray tube. Appl. Phys. Lett. 2001, 78, 2578-2580. 508 63. Lee, Y.Z.; Burk, L.; Wang, K.-h.; Cao, G.; Lu, J.; Zhou, O. Carbon nanotube based x-ray sources: Applications 509 in pre-clinical and medical imaging. Nucl. Instrum. Meth. A 2011, 648, S281-S283. 510 64. Tsai, J.T.; Chu, T.Y.; Shiu, J.Y.; Yang, C.S. Field emission from an individual freestanding graphene edge. 511 Small 2012, 8, 3739-3745. 512 65. Kleint, C. Electron emission noise. Surf. Sci. 1988, 200, 472-489. 513 Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 9 May 2018 doi:10.20944/preprints201805.0142 Field electron emission from individual carbon nanotubes of a vertically aligned 9 array. Appl. Phys. Lett. 2002, 81, 343-345. 0 69. Yamaguchi, H.; Murakami, K.; Eda, G.; Fujita, T.; Guan, P.; Wang, W.; Gong, C.; Boisse, J.; Miller, S.; Acik, 21 M. Field emission from atomically thin edges of reduced graphene oxide. Acs Nano 2011, 5, 4945-4952. 22 70. Wang, Y.; Yang, Y.; Zhao, Z.; Zhang, C.; Wu, Y. Local electron field emission study of two-dimensional 523 carbon. Appl. Phys. Lett. 2013, 103, 033115. 524 71. Shao, X.; Srinivasan, A.; Ang, W.K.; Khursheed, A. A high-brightness large-diameter graphene coated point 525 cathode field emission electron source. Nat. Commun. 2018, 9, 1288. 526 72. Swanson, L.; Martin, N. Field electron cathode stability studies: Zirconium/tungsten thermal-field cathode. 527 J. Appl. Phys. 1975, 46, 2029-2050. 528 73. Khursheed, A. Design of a focused electron beam column for ring-cathode sources. Ultramicroscopy 2013, 529 128, 10-23. 530 73. Khursheed, A. Design of a focused electron beam column for ring-cathode sources. Ultramicroscopy 2013, 529 128, 10-23. 530 74 Khursheed A ; Ang W K Annular focused electron/ion beams for combining high spatial resolution with 531 74. Khursheed, A.; Ang, W.K. Annular focused electron/ion beams for combining high spatial resolution w high probe current. Microsc. Microanal. 2016, 22, 948-954. 75. Nguyen, D.D.; Suzuki, S.; Kato, S.; To, B.D.; Hsu, C.C.; Murata, H.; Rokuta, E.; Tai, N.-H.; Yoshimura, M. 533 Macroscopic, freestanding, and tubular graphene architectures fabricated via thermal annealing. ACS nano 534 2015, 9, 3206-3214. 535 76. Shao, X.; Srinivasan, A.; Zhao, Y.; Khursheed, A. A few-layer graphene ring-cathode field emitter for 536 focused electron/ion beam applications. Carbon 2016, 110, 378-383. 537 538 539
https://openalex.org/W2900314329
https://europepmc.org/articles/pmc6254677?pdf=render
English
null
Multiple mechanisms can disrupt oncogenic pathways in multiple myeloma
Oncotarget
2,018
cc-by
1,337
Oncotarget, 2018, Vol. 9, (No. 88), pp: 35801-35802 www.oncotarget.com Phuc H. Hoang and Richard S. Houlston Multiple myeloma (MM) is a clinically and biologically heterogeneous malignancy resulting from the infiltration of clonal plasma cells in the bone marrow [1]. Thus far the molecular mechanisms responsible for the initiation and heterogeneous evolution of MM are poorly understood. Recent large-scale analyses of MM have focussed mainly on the protein-coding components of the genome, identifying recurrently mutated genes including KRAS, NRAS, PRDM1, CCND1, and TP53 as drivers of tumourigenesis [1]. Many of these mutations are, however typically found at low frequency (<10% of tumours), and hence do not fully explain the clinical and biological diversity of MM. With the increasing availability of MM whole-genome sequencing (WGS) initiatives such as The Relating Clinical Outcomes in Multiple Myeloma to Personal Assessment of Genetic Profile Study (CoMMpass), we have sought to systematically search for driver mutations in the MM non-coding as well as coding regions of the genome. In our recent study, we reported an integrated analysis of the WGS of 765 and whole-exome sequencing (WES) of 804 MM patients from CoMMpass, identifying novel non-coding drivers altering expression of target genes as well as coding drivers [2]. We also demonstrated that pathways central to MM tumourigenesis could be targeted by both coding and non-coding drivers, further enhancing our understanding of alternative oncogenic pathways driving MM.ii To search for non-coding drivers, we first defined the cis-regulatory elements (CREs) and promoters using information from promoter capture Hi-C in naïve B-cells [3] and transcription start site (TSS) proximity respectively. The approach enabled us to narrow down the genomic searches and mitigate against the high statistical burden in establishing significantly mutated regions. We identified promoters associated with 34 genes and CREs associated with 271 genes and as recurrently mutated by single nucleotide variants (SNVs). Many of the target genes are enriched for established oncogenic pathways in MM such as PAX5 and BCL6 in B-cell differentiation. Recurrent mutation of the NBPF1 promoter corresponded to 1.7-fold increase in gene expression of NBPF1. Mutations in CREs of six target genes (PAX5, ST6GAL1, Figure 1: Key oncological pathways in multiple myeloma can be targeted by both coding and non-coding mechanisms. Figure adapted from Hoang et al [2]. Figure 1: Key oncological pathways in multiple myeloma can be targeted by both coding and non-coding mechanisms. Figure adapted from Hoang et al [2] Figure 1: Key oncological pathways in multiple myeloma can be targeted by both coding and non-coding mechanisms. Phuc H. Hoang and Richard S. Houlston Hoang, email phuc.hoang@icr.ac.uk Keywords: multiple myeloma; cancer genetics; non-coding drivers; coding drivers; integrated analysis Received: October 08, 2018 Published: November 09, 2018 drivers; coding drivers; integrated analysis g pi To better understand the interplay of alternative somatic mechanisms underlying MM, we extended our analysis to categorise chromosomal copy number alterations, structural variations (SVs), and protein-coding drivers in CoMMpass dataset. We observed aberrant copy number alterations characteristic of MM [1]: gain of odd number chromosomes (in 59% tumours); deletions at 13q (63%), 14q (43%), 16q (38%), and 8p (38%); and amplification overlapping MYC and PVT1 at 8q24.21. We detected novel SVs affecting genes including inversions disrupting CYLD, MYC translocations disrupting CD96, translocations intergenic to PRDM1 and FBXW7, and translocations associated with upregulation of MAP3K14 (7-fold) and CCND2 (12-fold). We also identified 40 significantly mutated coding genes, 11 of which are novel (BAX, C8orf86, FAM154B, FTL, HIST1H4H, LEMD2, PABPC1, RPN1, RPS3A, SGPP1, TBC1D29). Phuc H. Hoang and Richard S. Houlston Figure adapted from Hoang et al [2]. Figure 1: Key oncological pathways in multiple myeloma can be targeted by both coding and non-coding mechanisms. Figure adapted from Hoang et al [2]. www.oncotarget.com Oncotarget 35801 COBLL1, HOXB3, and ATP13A2) were also associated with differential gene expression. Notably, mutations in the PAX5 CRE identified resulted in a 4.6-fold reduced expression, consistent with PAX5 being a tumour suppressor as in other B-cell malignancies [4-6]. In contrast, disruption of ST6GAL1 CRE by SNVs led to a 1.4-fold upregulation, consistent with ST6GAL1 is overexpressed in various cancers [7] and aberrant glycosylation in MM [8]. COBLL1, HOXB3, and ATP13A2) were also associated with differential gene expression. Notably, mutations in the PAX5 CRE identified resulted in a 4.6-fold reduced expression, consistent with PAX5 being a tumour suppressor as in other B-cell malignancies [4-6]. In contrast, disruption of ST6GAL1 CRE by SNVs led to a 1.4-fold upregulation, consistent with ST6GAL1 is overexpressed in various cancers [7] and aberrant glycosylation in MM [8]. prevalent in MM than previously described (present in 96% of samples) and is associated with mutation affecting PAX5 CREs. Finally, we also identified novel mutational signatures reflective of homologous recombination deficiency (signature 3 and 8) and of unknown aetiologies (signature 16 and 30) in >30% of tumours. In summary, through identifying novel mutations disrupting coding and non-coding genomes, we have demonstrated that key biological pathways in MM could be targeted by alternative mechanisms. Our study thus further delineates the genomic complexity and heterogeneity underlying the disease, providing important information for potential development of novel therapeutic agents and offering perspectives for personalised therapy. We also found copy number variations at CREs regulate expression of seven candidate genes (MYC, PACS2, TEX22, KDM3B, RAB36, PLD4, and SP110). Notably, MYC oncogene was overexpressed in tumours having either deletion of upstream putative silencers or amplification of downstream putative enhancers. The amplified enhancers coincides with the Myc enhancer cluster essential for MLL–AF9-driven leukaemia in mice [9]. Our results demonstrate that MYC can be amplified via dysregulation of non-coding regulatory regions, in addition to the well-established mechanisms of MYC upregulation through chromosomal translocations and gene amplification. Phuc H. Hoang: Division of Genetics and Epidemiology, The Institute of Cancer Research, London, UK; Division of Molecular Pathology, The Institute of Cancer Research, London, UK Correspondence to: Phuc H. Hoang, email phuc.hoang@icr.ac.uk Correspondence to: Phuc H. REFERENCES 1. Manier S, et al. Nat Rev Clin Oncol. 2017; 14:100-113. 1. Manier S, et al. Nat Rev Clin Oncol. 2017; 14:100-113. 1. Manier S, et al. Nat Rev Clin Oncol. 2017; 14:100 113. 2. Hoang PH, et al. Leukemia. 2018; 32:2459-2470. https://doi.org/10.1038/s41375-018-0103-3. 3. Javierre BM, et al. Cell. 2016; 167:1369-1384.e19. 4. Puente XS, et al. Nature. 2015; 526:519-524. 5. Shah S, et al. Nat Genet. 2013; 45:1226-1231. 6. Dang J, et al. Blood. 2015; 125:3609-3617. 7. Lu J, et al. J Biol Chem. 2014; 289:34627-34641. 8. Aurer I, et al. Coll Antropol. 2007; 31:247-251. 9. Bahr C, et al. Nature. 2018; 553:515-520. , ; 2. Hoang PH, et al. Leukemia. 2018; 32:2459-2470. https://doi.org/10.1038/s41375-018-0103-3. 3. Javierre BM, et al. Cell. 2016; 167:1369-1384.e19. 4. Puente XS, et al. Nature. 2015; 526:519-524. 5. Shah S, et al. Nat Genet. 2013; 45:1226-1231. 6. Dang J, et al. Blood. 2015; 125:3609-3617. 7. Lu J, et al. J Biol Chem. 2014; 289:34627-34641. 8. Aurer I, et al. Coll Antropol. 2007; 31:247-251. 9. Bahr C, et al. Nature. 2018; 553:515-520. 2. Hoang PH, et al. Leukemia. 2018; 32:2459-2470. https://doi.org/10.1038/s41375-018-0103-3. 3. Javierre BM, et al. Cell. 2016; 167:1369-1384.e19. . Aurer I, et al. Coll Antropol. 2007; 31:247-251. 9. Bahr C, et al. Nature. 2018; 553:515-520. Performing an integrated analysis, allowed us to identify several key pathways somatically targeted by both coding and non-coding mutations (Figure 1). This is exemplified by plasma cell differentiation pathway in which we identified significant non-coding mutations associated with BCL6 and PAX5, complementary to established coding drivers affecting IRF4 and PRDM1. Copyright: Hoang et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License 3.0 (CC BY 3.0), which permits unrestricted use, distribution, and re­ production in any medium, provided the original author and source are credited. Following on from these analyses, to gain insight into aetiological basis of somatic mutations in MM, we examined mutational signatures. Our findings are consistent with an association between the APOBEC family of cytidine deaminases signature 2 with coding drivers in DNAH5, SAMHD1, TP53, and BRAF along with and myeloma subtypes – t(14;16), t(14;20), and t(4;14). Additionally, we noted, AID-related signature 9 was more www.oncotarget.com www.oncotarget.com Oncotarget 35802
https://openalex.org/W2145921127
https://escholarship.org/content/qt8kj2n564/qt8kj2n564.pdf?t=mm2t2b
English
null
RegTransBase – a database of regulatory sequences and interactions based on literature: a resource for investigating transcriptional regulation in prokaryotes
BMC genomics
2,013
cc-by
5,480
UC Davis UC Davis Previously Published Works Title RegTransBase -- a database of regulatory sequences and interactions based on literature: a resource for investigating transcriptional regulation in prokaryotes Permalink https://escholarship.org/uc/item/8kj2n564 Journal BMC Genomics, 14(1) * Correspondence: ildubchak@lbl.gov 2Lawrence Berkeley National Laboratory, Berkeley, CA 94710, USA 7Department of Energy Joint Genome Institute, 2800 Mitchell Drive, Walnut Creek, CA 94598, USA Full list of author information is available at the end of the article © 2013 Cipriano et al.; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract Background: Due to the constantly growing number of sequenced microbial genomes, comparative genomics has been playing a major role in the investigation of regulatory interactions in bacteria. Regulon inference mostly remains a field of semi-manual examination since absence of a knowledgebase and informatics platform for automated and systematic investigation restricts opportunities for computational prediction. Additionally, confirming computationally inferred regulons by experimental data is critically important. Description: RegTransBase is an open-access platform with a user-friendly web interface publicly available at http://regtransbase.lbl.gov. It consists of two databases – a manually collected hierarchical regulatory interactions database based on more than 7000 scientific papers which can serve as a knowledgebase for verification of predictions, and a large set of curated by experts transcription factor binding sites used in regulon inference by a variety of tools. RegTransBase captures the knowledge from published scientific literature using controlled vocabularies and contains various types of experimental data, such as: the activation or repression of transcription by an identified direct regulator; determination of the transcriptional regulatory function of a protein (or RNA) directly binding to DNA or RNA; mapping of binding sites for a regulatory protein; characterization of regulatory mutations. Analysis of the data collected from literature resulted in the creation of Putative Regulons from Experimental Data that are also available in RegTransBase. Conclusions: RegTransBase is a powerful user-friendly platform for the investigation of regulation in prokaryotes. It uses a collection of validated regulatory sequences that can be easily extracted and used to infer regulatory interactions by comparative genomics techniques thus assisting researchers in the interpretation of transcriptional regulation data. Keywords: Transcriptional regulation, Prokaryotes, Comparative genomics RegTransBase – a database of regulatory sequences and interactions based on literature: a resource for investigating transcriptional regulation in prokaryotes RegTransBase – a database of regulatory sequences and interactions based on literature: a resource for investigating transcriptional regulation in prokaryotes Michael J Cipriano1, Pavel N Novichkov2, Alexey E Kazakov2, Dmitry A Rodionov3,4, Adam P Arkin2,5, Mikhail S Gelfand4,6 and Inna Dubchak2,7* Michael J Cipriano1, Pavel N Novichkov2, Alexey E Kazakov2, Dmitry A Rodionov3,4, Adam P Arkin2,5, Mikhail S Gelfand4,6 and Inna Dubchak2,7* Powered by the California Digital Library University of California eScholarship.org Cipriano et al. BMC Genomics 2013, 14:213 http://www.biomedcentral.com/1471-2164/14/213 Cipriano et al. BMC Genomics 2013, 14:213 DATABASE Open Access * Correspondence: ildubchak@lbl.gov 2 © 2013 Cipriano et al.; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Background considered to belong to a regulon. Predicting the regulon of a transcription factor that binds DNA by detecting TFBSs in most cases requires the alignment of known binding sites to create a positional weight matrix (PWM). It is very important to filter out irrelevant sites and find TFBSs that are of higher confidence, and com- parative genomics is the method of choice for this. Activation and repression of gene expression in bacteria is usually mediated by DNA-binding transcription fac- tors (TFs) that specifically recognize TF-binding sites (TFBSs) in upstream regions of target genes. Genes and operons directly co-regulated by the same TF are With the advent of new and cheaper sequencing tech- nologies and ongoing sequencing projects such as GEBA [1], which aims to close the gaps in the bacterial tree of Page 2 of 8 Cipriano et al. BMC Genomics 2013, 14:213 http://www.biomedcentral.com/1471-2164/14/213 Table 1 Content of RegTransBase 2012 2006 Articles Curated: 7213 2958 Experiments: 18877 7129 Organisms: Phylum 11 9 Genus 224 Not reported Species 666 128 Genes: 59754 7467 Sites: 13321 6470 Regulators: 1488 678 Effectors: 875 558 PWM 151 151 Putative Regulons Total 6390 N/A Avg. Regulon/Genome 13 N/A Median Regulon/Genome 5 N/A Table 1 Content of RegTransBase life, a lot of bacterial organisms are now being se- quenced [2]. Of note is that not only are organisms with no close sequenced relatives being sequenced, but spe- cifically groups of closely related organisms and multiple strains of the same species. This trend of sequencing can be successfully exploited when using comparative ana- lyses, and already has been used in studying and pre- dicting transcriptional regulation [3-6]. life, a lot of bacterial organisms are now being se- quenced [2]. Of note is that not only are organisms with no close sequenced relatives being sequenced, but spe- cifically groups of closely related organisms and multiple strains of the same species. This trend of sequencing can be successfully exploited when using comparative ana- lyses, and already has been used in studying and pre- dicting transcriptional regulation [3-6]. While many transcriptional regulation experiments are performed on model organisms, the existing experimental evidence can be transferred to other organisms by com- parative methods. However, even closely related organisms can have different transcriptional regulation [7], thus pre- diction of binding sites and regulon inference in bacteria until recently has been mostly done by careful manual ana- lysis [8-10]. Background Availability of experimental data on regulation for a wider range of organisms would be very helpful in automatic verification of computationally derived predic- tions of regulation. These verifications require well- designed databases accessible to prediction and analysis programs. of transcriptional regulation and experimentally charac- terized TF binding sites. The main steps of the data col- lection. Described in detail in our previous article [22], are the following: search for relevant articles in PubMed [25], entry of data through a specialized annotator inter- face, quality control, mapping sites and genes to ge- nomes, additional manual corrections (if necessary) and presentation of the data in the final format. The entry quality is controlled by a number of consistency and completeness checks. The genomic location of a specific feature (site or gene) is then recorded by the annotator as a signature (a DNA sequence fragment of sufficient length) that is then used to map all the features in the database to a wide range of the NCBI RefSeq genomes [26,27]. Eukaryotic transcriptional regulation data has been sum- marized in both commercial and open-source databases, such as TransFac [11], Pazar [12], and ORegAnno [13], widely used by the community. There are several gene regulation databases that focus on distinct microbial organ- isms such as E. coli [14,15], B. subtilis [16], Mycobacterium tuberculosis [17], and corynebacteria [18]. On the other hand, PRODORIC [19], PePPER [20] and SwissRegulon [21] cover a wide range of bacterial genomes. RegTransBase, first introduced in 2007 [22], was built with the goal to cover a wide microbial diversity and pro- vide a collection of curated experimental data to use in ex- ternal computational tools. The current advanced version of RegTransBase: (i) contains a much larger set of manually collected experimental results (Table 1); (ii) has a brand new interface with novel capabilities for multi-level data navigation such as the new Classification Browser and new data aggregation tools such as the Putative Regulons Browser; (iii) is linked to associated analytical systems. Each database entry describes a single experiment that is an experimentally determined relationship between several database elements. A single entry may describe an experiment and control, identical results obtained by different methods or the results of the application of one technique to several similar objects. Only original results are recorded, normally from the ‘Results’ or ‘Discussion’ sections of an article. Background It is important to mention that we have recently deve- loped two new resources – the RegPredict Web tool to support genomic reconstruction of transcriptional regu- lons in groups of closely related prokaryotic genomes [23], and the RegPrecise database to capture, visualize and analyze transcription factor regulons that were recon- structed [24]. We are working on the integration of RegTransBase, RegPredict and RegPrecise into a powerful platform for regulon reconstruction and analysis. The types of experimental techniques form a con- trolled vocabulary. The following categories of experi- ments were accepted: (i) regulation of gene expression by a known regulator; (ii) demonstration that a gene en- codes a regulatory protein (excluding proteins that do not directly bind DNA, e.g. protein kinases); (iii) experi- mental mapping of DNA binding sites for known regula- tors; (iv) identification of mutations in regulatory genes influencing expression of regulated genes; (v) computa- tional prediction of binding sites. Construction and content Experimental data annotation The main objective during the article annotation phase for RegTransBase was to collect experimental evidences Cipriano et al. BMC Genomics 2013, 14:213 http://www.biomedcentral.com/1471-2164/14/213 Page 3 of 8 Cipriano et al. BMC Genomics 2013, 14:213 http://www.biomedcentral.com/1471-2164/14/213 Cipriano et al. BMC Genomics 2013, 14:213 http://www.biomedcentral.com/1471-2164/14/213 The classes of elements in the database are: regulators (regulatory proteins and RNAs directly binding to DNA, with a well-defined binding site); effectors (molecules not binding DNA or physical effects such as stress, etc.); and positional elements. The latter are described as re- gions in DNA sequences. Positional elements form a hierarchy: locus > operon > transcript > gene and site; an elements may be a sub-elements of other elements of the same or higher levels (e.g., a site and a gene may be a sub-element of a operon). scanning published articles, and recorded its genomic lo- cation. The curator then annotated binding sites and their sequence, downstream gene, location in a published genome, and any published experimental evidence. In addition, curators supplied groups of organisms that they believe could be used when searching for homologous binding sites based on phylogenetic distance of organism and presence of a conserved transcription factor. Lastly, the curator recorded default scores and the expected dis- tance a binding site would be from the start of a gene based on examination of the existing binding sites. All elements are linked to the corresponding expe- riments and together they are linked to the original article. As mentioned above, positional elements are mapped to genomes, thus if two independent articles describe regulation of the same gene, the data contained in these articles will be interlinked via this gene, but sites and other experimental data will be reported as independent entries. A PWM is automatically created in the RegTransBase database based on the TFBSs alignment. We then searched all recommended bacterial genomes using MAST [28]. We recorded all hits that passed the following criteria into the RegTransBase database: e-value of 1e-5 or better, it did not overlap coding regions and it was upstream of a predic- ted gene. With each record, we provide the binding site location with a reference to a published sequence (usually NCBI RefSeq [26]), the sequence, the gene which is affected by the binding site, the evidence for the binding if any, any relevant articles pertaining to that site, and the tran- scription factor which binds the site. Putative regulons from experimental data The Putative Regulons section of RegTransBase provides a list of experimental sites along with a non-redundant list of target genes for each regulator. The process we undertook in developing this list of putative regulons from the manually curated data includes three steps. First, we selected a subset of experiments using the following criteria: (i) the experiment describes a single regulator, (ii) a regulator and its regulated genes belong to the same genome, (iii) no computational predictions are included. Utility and discussion Our goal is to provide a comprehensive resource to the greater genomic community to allow for easy transfer of known binding site information as well as tools for dis- covering interesting regulatory interactions in groups of organisms. We believe that by using a comparative ap- proach, new genomes could be more easily annotated, and this approach can help facilitate the discovery and expansion of regulons in a wide range of organisms. Third, we compiled a list of putative regulons by uni- fying all ‘regulator-gene’ pairs with the same regulator. Database statistics As of November 2012, RegTransBase contains information on 666 bacterial species from 224 genera. This resource al- lows for access to the information on 19000 different expe- riments from about 7200 articles from as far back as 1977 until the present day (more details in Table 1). Second, from this subset we extracted the pairs ‘regulator-regulated gene’ for each genome, taking into account operon structure, that extend the list of regu- lated genes by adding other members of a particular op- eron. In some cases we see a particular pair of a regulator and an associated regulated gene in multiple entries in RegTransBase. We removed such redundant pairs from the list of regulator-regulated genes based on positional mapping. Construction and content Experimental data annotation We also provide for download the sequence logo for the alignment, pro- files and alignments in many different formats, and recommended options in using the profiles for search- ing other genomes (cut-off scores, distance from gene, taxonomy). Our original publication on RegTransBase [22] and the Help pages at http://regtransbase.lbl.gov provide more details on the procedure of experimental data annotation. Database access and features Each record in the Manually Curated PWM section of the database comprises a TFBS training set (alignment) cre- ated by an expert curator using published experimen- tal data and manual in silico analyses. The curator first gathered information about a known transcription factor where a set of binding sites was known, created a sum- mary of a description of this transcription factor by RegTransBase is freely accessible via a user-friendly web interface at http://regtransbase.lbl.gov. Besides browsing, searching for various data of interest, and carrying out ana- lytical tasks (see below), users can download the Annota- tors Database, which includes all of the annotated data elements and experiments as a sql dump file to perform Cipriano et al. BMC Genomics 2013, 14:213 http://www.biomedcentral.com/1471-2164/14/213 Cipriano et al. BMC Genomics 2013, 14:213 http://www.biomedcentral.com/1471-2164/14/213 Page 4 of 8 their own analysis, as well as the Annotators Database Schema Description, and Alignments of Binding Site through the ‘Download’ page. their own analysis, as well as the Annotators Database Schema Description, and Alignments of Binding Site through the ‘Download’ page. Two categories refer to experimental methodology and the goals of experiments. The ‘Experiment techniques’ classification uses a controlled vocabulary of methods used in experiments. This classification has a two-level struc- ture with the upper level containing method categories (i.e. protein analysis, RNA analysis) and lower level containing individual techniques such as Western blotting, DNAase footprinting etc. The ‘Experiment result’ classifi- cation describes what the experiment resulted in (i.e. pro- moter mapping, regulatory site mapping, gene/operon repression). Data navigation BMC Genomics 2013, 14:213 http://www.biomedcentral.com/1471-2164/14/213 Page 6 of 8 Use Case 1: use of Putative Regulon for the search of a TF binding motif Putative regulons from experimental data d f f f b d Identification of transcription factor binding motifs is an important step in the computational reconstruction of regulatory elements. The ‘Putative Regulons’ section of RegTransBase provides sets of upstream sequences of target genes for each regulon. These sets can be used for the identification of conserved DNA motifs that may bind transcriptional regulators. This scheme was successfully tested for the TnrA regulon from B. subtilis. Search methods RegTransBase provides a user with a broad range of search options such as search by Gene name, effector name, or a full text search of an abstract. Search for genes involved in regulatory experiments can be done using the gene name, function, product, accession num- ber, or any other GenBank annotation. Searching for ef- fectors by their name extracts the information on regulator, experiment, and genome with all associated links. Full text search allows for running complex que- ries against the abstracts and experiment descriptions such as ‘+mga +promoter’. 1. Find genome of interest on the Putative Regulons page. 2. Find regulon of interest based on the regulator name. 3. Get a set of upstream sequences by clicking the ‘Download’ link in the ‘Upstream sequences column of regulons table. 4. Start RegPredict [23], select genomes of interest. 5. Open ‘Discover Profiles’, paste upstream sequences (at least three sequences). 6. Select profile parameters (palindrome 6. Select profile parameters (palindrome recommended), start search. 7. Select profile with highest informational content and run search for sites in selected genomes. Data navigation We developed a new navigation interface to easily select a set of experimental records based on six categories (classifi- cations) covering different aspects of the database. Three categories (classifications) describe genomes that were studied in relevant experiments (Figure 1). The ‘Effector’ classification uses a tree-like hierarchy of effectors where classes of the hierarchy are mainly based on the Chemicals and Drugs Category of MESH [31]. The ‘Taxonomy’ category is based on the NCBI Taxonomy [29] and describes phylogenetic relationships. A user can choose a taxon of interest starting from the super kingdom level (Bacteria or Archaea) and move down to the species level. The ‘Relevance’ category refers to the attributes of genome projects that provide infor- mation about the wide area of research a particular genome is a part of, such as Antibiotic production, Agri- cultural, etc. [30]. The ‘Phenotypes’ category includes at- tributes that describe phenotypic properties of the organisms [30]. User can browse all categories in the database by choosing a term in one classification and then narrowing a result by choosing terms in other classifications as additional filters. At any time, the user can click on the number beside the classification to get articles fitting all criteria currently selected. For example, we want to know if there is any data on experiments with cis-elements that are involved in Figure 1 Home page of RegTransBase. Data navigation panel with its major classifications in the middle of the page. Figure 1 Home page of RegTransBase. Data navigation panel with its major classifications in the middle of the page. Cipriano et al. BMC Genomics 2013, 14:213 http://www.biomedcentral.com/1471-2164/14/213 Page 5 of 8 Figure 2 Step-by-step data navigation in search for the experiments where cis-elements are involved in the fructose-dependent l ti Figure 2 Step-by-step data navigation in search for the experiments where cis-elements are involved in the fructose-dependent regulation. Figure 2 Step-by-step data navigation in search for the experiments where cis-elements are involved in the fructose-dependent regulation. A subsequent choosing of the ‘Regulatory site map- ping’ term in the ‘Result’ classification produces a list of 3 experiments where cis-elements involved in fructose- dependent regulation were studied. fructose-dependent regulation. By using the ‘Effectors’ classification in three steps: ‘Carbohydrates’ -> ‘Mono- saccharides’ -> ‘Fructose’ we find a list of 20 experiments (Figure 2). Cipriano et al. BMC Genomics 2013, 14:213 http://www.biomedcentral.com/1471-2164/14/213 Cipriano et al. BMC Genomics 2013, 14:213 http://www.biomedcentral.com/1471-2164/14/213 Cipriano et al. Acknowledgements The authors are grateful to Igor Lukashin for obtaining the genome alignment data, MicrobesOnline team for useful discussions and encouragement, and to Tatiana Smirnova for the artistic and highly functional RegTransBase Web site. 6. Start RegPredict (click ‘Start Application’) 7. Click ‘Select genomes’. 8. Find recommended taxonomical group (Bacillales - see the ‘Recommended options’ section on ABC0302 page in RegTransBase) and add all genomes from that group (or as many genomes as possible). ‘This work conducted by ENIGMA- Ecosystems and Networks Integrated with Genes and Molecular Assemblies (http://enigma.lbl.gov), a Scientific Focus Area Program at Lawrence Berkeley National Laboratory, was supported by the Office of Science, Office of Biological and Environmental Research, of the U. S. Department of Energy under Contract No. DE-AC02-05CH11231.’ The work was also supported by the Director, Office of Science, Office of Biological and Environmental Research, Life Sciences Division, U.S. 9. Click ‘Run Profile’. 9. Click ‘Run Profile’. 10. Select the ‘Sequences’ tab and paste your alignment of binding sites in the FASTA format. Department of Energy under Contracts No. DE-AC02-05CH11231 and No. DE-SC0004999. 11. Click ‘Generate profile’. Conclusions RegTransBase, a user-friendly open-access database, pro- vides biologists involved in the investigation of microbial regulation and systems biology with convenient access to experimental data collected in thousands of original studies. It allows a user to interact with a valuable collec- tion of manually curated data on a range of experiments related to the transcriptional regulation of bacteria. These data, with associated analytical tools, provide a valuable resource to assist in investigation of gene functions in the constantly growing number of available genome assem- blies. RegTransBase collection of PWMs is currently used by various tools for TF binding prediction and motif comparison (for example, MEME-ChIP [32] and TOMTOM [33] from MEME Suite, FITBAR [34], ISGA Received: 15 November 2012 Accepted: 22 March 2013 Published: 2 April 2013 Authors’ contributions 2. Find a regulator of interest (for example, ABC0302). MJC worked on the database and interface design, general data organization and access; PSN participated in the database and interface design and construction, and lead the putative regulon collection and RegPredict access projects; AEK was responsible for data collection and manual curation; DAR proposed several critical directions of the project and actively participated in discussions; APA was involved with the MicrobesOnline integration and general discussions; MSG conceived and performed general coordination of the project. ID supervised the project and was involved with all aspects of database design, construction and implementation. MJC, AEK and ID wrote the manuscript. All authors read and approved the final manuscript. 3. Open the page with the ABC0302 binding sites alignment (http://regtransbase.lbl.gov/cgi-bin/ regtransbase?page=show_alignment&amp; matrix_id=95). 4. Download an alignment in FASTA format (First option in Download section at the bottom of the page). 5. Go to the RegPredict website (http://regpredict.lbl. gov/). Author details 1 12. Set search parameters ‘Position from’ and ‘Position to’ (see ‘Recommended options’ section on ABC0302 page in RegTransBase). 1Department of Microbiology, University of California Davis, Davis, CA 95616, USA. 2Lawrence Berkeley National Laboratory, Berkeley, CA 94710, USA. 3Sanford-Burnham Medical Research Institute, La Jolla, CA 92037, USA. 4A.A. Kharkevich Institute for Information Transmission Problems, Russian Academy of Sciences, Moscow 127994, Russia. 5Department of Bioengineering, University of California, Berkeley, CA 94720, USA. 6M.V. Lomonosov Moscow State University, Vorobyevy Gory 1073, Moscow 119991, Russia. 7Department of Energy Joint Genome Institute, 2800 Mitchell Drive, Walnut Creek, CA 94598, USA. 13. Click ‘Run’. Manually curated position weight matrices (PWM) Positional weight matrices from RegTransBase collec- tions can be used for computational prediction of TFBSs Figure 3 Access to the RegTransBase PWMs and browsing capabilities. Figure 3 Access to the RegTransBase PWMs and browsing capabilities. Cipriano et al. BMC Genomics 2013, 14:213 http://www.biomedcentral.com/1471-2164/14/213 Page 7 of 8 [35], STAMP [13]. MicrobesOnline, an integrated portal for comparative and functional genomics [36], is cross- linked with RegTransBase. using RegPredict [23] or other software for PWM-based TFBS search. Figure 3 shows an access page to the RegTransBase PWMs and the associated data. A user se- lects a PWM of interest from the list and opens a webpage with PWM description. PWMs are available for download in different formats including a binding site alignment in FASTA format, matrices in MAST and Transfac formats and as a frequency matrix. As regulon inference is of significant importance for deciphering the regulation of biological processes, we be- lieve that a current improved and expanded version of RegTransBase is a useful tool for the research community. Use Case 2: use of manually curated PWM for compu- tational reconstruction of a regulon Competing interests The authors declare that they have no competing interests. Competing interests The authors declare that they have no competing interests. Availability and requirements RegTransBase is available at http://regtransbase.lbl.gov. 1. Open a list of the binding site alignments (http:// regtransbase.lbl.gov/cgi-bin/regtransbase? page=alignment_browse). 1. Wu D, Hugenholtz P, Mavromatis K, Pukall R, Dalin E, Ivanova NN, Kunin V, Goodwin L, Wu M, Tindall BJ, et al: A phylogeny-driven genomic encyclopaedia of Bacteria and Archaea. Nature 2009, 462(7276):1056–1060. 2. Pagani I, Liolios K, Jansson J, Chen IM, Smirnova T, Nosrat B, Markowitz VM, Kyrpides NC: The Genomes OnLine Database (GOLD) v.4: status of genomic and metagenomic projects and their associated metadata. Nucleic Acids Res 2012, 40(Database issue):D571–D579. 3. Liu J, Xu X, Stormo GD: The cis-regulatory map of Shewanella genomes. Nucleic Acids Res 2008, 36(16):5376–5390. 4. Rodionov DA: Comparative genomic reconstruction of transcriptional regulatory networks in bacteria. Chem Rev 2007, 107(8):3467–3497. References 1. Wu D, Hugenholtz P, Mavromatis K, Pukall R, Dalin E, Ivanova NN, Kunin V, Goodwin L, Wu M, Tindall BJ, et al: A phylogeny-driven genomic encyclopaedia of Bacteria and Archaea. Nature 2009, 462(7276):1056–1060. 1. Wu D, Hugenholtz P, Mavromatis K, Pukall R, Dalin E, Ivanova NN, Kunin V, Goodwin L, Wu M, Tindall BJ, et al: A phylogeny-driven genomic encyclopaedia of Bacteria and Archaea. Nature 2009, 462(7276):1056–1060. 2. Pagani I, Liolios K, Jansson J, Chen IM, Smirnova T, Nosrat B, Markowitz VM, Kyrpides NC: The Genomes OnLine Database (GOLD) v.4: status of genomic and metagenomic projects and their associated metadata. Nucleic Acids Res 2012, 40(Database issue):D571–D579. 3. Liu J, Xu X, Stormo GD: The cis-regulatory map of Shewanella genomes. Nucleic Acids Res 2008, 36(16):5376–5390. 4. Rodionov DA: Comparative genomic reconstruction of transcriptional regulatory networks in bacteria. Chem Rev 2007, 107(8):3467–3497. Page 8 of 8 Cipriano et al. BMC Genomics 2013, 14:213 http://www.biomedcentral.com/1471-2164/14/213 5. Rodionov DA, Novichkov PS, Stavrovskaya ED, Rodionova IA, Li X, Kazanov MD, Ravcheev DA, Gerasimova AV, Kazakov AE, Kovaleva GY, et al: Comparative genomic reconstruction of transcriptional networks controlling central metabolism in the Shewanella genus. BMC Genomics 2011, 12(Suppl 1):S3. 25. Coordinators NR: Database resources of the national center for biotechnology information. Nucleic Acids Res 2013, 41(Database issue):D8– D20. 26. Pruitt KD, Tatusova T, Maglott DR: NCBI Reference Sequence (RefSeq): a curated non-redundant sequence database of genomes, transcripts and proteins. Nucleic Acids Res 2005, 33(Database issue):D501–D504. 6. Xu X, Ji Y, Stormo GD: Discovering cis-regulatory RNAs in shewanella genomes by support vector machines. PLoS Comput Biol 2009, 5(4):e1000338. 27. Wheeler DL, Barrett T, Benson DA, Bryant SH, Canese K, Church DM, DiCuccio M, Edgar R, Federhen S, Helmberg W, et al: Database resources of the national center for biotechnology information. Nucleic Acids Res 2005, 33(Database issue):D39–D45. 7. Gelfand MS: Evolution of transcriptional regulatory networks in microbial genomes. Curr Opin Struct Biol 2006, 16(3):420–429. 28. Bailey TL, Gribskov M: Combining evidence using p-values: application to sequence homology searches. Bioinformatics 1998, 14(1):48–54. 8. Gerasimova A, Kazakov AE, Arkin AP, Dubchak I, Gelfand MS: Comparative genomics of the dormancy regulons in mycobacteria. J Bacteriol 2011, 193(14):3446–3452. 29. Federhen S: The NCBI Taxonomy database. Nucleic Acids Res 2012, 40 (Database issue):D136–D143. 9. Suvorova IA, Tutukina MN, Ravcheev DA, Rodionov DA, Ozoline ON, Gelfand MS: Comparative genomic analysis of the hexuronate metabolism genes and their regulation in gammaproteobacteria. doi:10.1186/1471-2164-14-213 Cite this article as: Cipriano et al.: RegTransBase – a database of regulatory sequences and interactions based on literature: a resource for investigating transcriptional regulation in prokaryotes. BMC Genomics 2013 14:213. Cite this article as: Cipriano et al.: RegTransBase – a database of regulatory sequences and interactions based on literature: a resource for investigating transcriptional regulation in prokaryotes. BMC Genomics 2013 14:213. 15. Robison K, McGuire AM, Church GM: A comprehensive library of DNA-binding site matrices for 55 proteins applied to the complete Escherichia coli K-12 genome. J Mol Biol 1998, 284(2):241–254. 16. Sierro N, Makita Y, de Hoon M, Nakai K: DBTBS: a database of transcriptional regulation in Bacillus subtilis containing upstream intergenic conservation information. Nucleic Acids Res 2008, 36(Database issue):D93–D96. 17. Sharma D, Mohanty D, Surolia A: RegAnalyst: a web interface for the analysis of regulatory motifs, networks and pathways. Nucleic Acids Res 2009, 37(Web Server issue):W193–W201. 18. Baumbach J: CoryneRegNet 4.0 - A reference database for corynebacterial gene regulatory networks. BMC Bioinforma 2007, 8:429. 18. Baumbach J: CoryneRegNet 4.0 - A reference database for corynebacterial gene regulatory networks. BMC Bioinforma 2007, 8:429. 19. Grote A, Klein J, Retter I, Haddad I, Behling S, Bunk B, Biegler I, Yarmolinetz S, Jahn D, Munch R: PRODORIC (release 2009): a database and tool platform for the analysis of gene regulation in prokaryotes. Nucleic Acids Res 2009, 37(Database issue):D61–D65. 20. de Jong A, Pietersma H, Cordes M, Kuipers OP, Kok J: PePPER: a webserver for prediction of prokaryote promoter elements and regulons. BMC Genomics 2012, 13:299. Submit your next manuscript to BioMed Central and take full advantage of: • Convenient online submission • Thorough peer review • No space constraints or color figure charges • Immediate publication on acceptance • Inclusion in PubMed, CAS, Scopus and Google Scholar • Research which is freely available for redistribution Submit your manuscript at www.biomedcentral.com/submit 21. Pachkov M, Erb I, Molina N, van Nimwegen E: SwissRegulon: a database of genome-wide annotations of regulatory sites. Nucleic Acids Res 2007, 35(Database issue):D127–D131. Submit your next manuscript to BioMed Central and take full advantage of: • Convenient online submission • Thorough peer review • No space constraints or color figure charges • Immediate publication on acceptance • Inclusion in PubMed, CAS, Scopus and Google Scholar • Research which is freely available for redistribution Submit your manuscript at www.biomedcentral.com/submit 21. References J Bacteriol 2011, 193(15):3956–3963. 30. Liolios K, Tavernarakis N, Hugenholtz P, Kyrpides NC: The Genomes On Line Database (GOLD) v.2: a monitor of genome projects worldwide. Nucleic Acids Res 2006, 34(Database issue):D332–D334. 31. Rogers FB: Medical subject headings. Bull Med Libr Assoc 1963, 51:114–116. 10. Vitreschak AG, Mironov AA, Lyubetsky VA, Gelfand MS: Comparative genomic analysis of T-box regulatory systems in bacteria. RNA 2008, 14(4):717–735. 32. Machanick P, Bailey TL: MEME-ChIP: motif analysis of large DNA datasets. Bioinformatics 2011, 27(12):1696–1697. 33. Gupta S, Stamatoyannopoulos JA, Bailey TL, Noble WS: Quantifying similarity between motifs. Genome Biol 2007, 8(2):R24. 11. Wingender E: The TRANSFAC project as an example of framework technology that supports the analysis of genomic regulation. Brief Bioinform 2008, 9(4):326–332. y 34. Oberto J: FITBAR: a web tool for the robust prediction of prokaryotic regulons. BMC Bioinforma 2010, 11:554. y 34. Oberto J: FITBAR: a web tool for the robust prediction of prokaryotic regulons. BMC Bioinforma 2010, 11:554. 12. Portales-Casamar E, Arenillas D, Lim J, Swanson MI, Jiang S, McCallum A, Kirov S, Wasserman WW: The PAZAR database of gene regulatory information coupled to the ORCA toolkit for the study of regulatory sequences. Nucleic Acids Res 2009, 37(Database issue):D54–D60. 35. Hemmerich C, Buechlein A, Podicheti R, Revanna KV, Dong Q: An Ergatis- based prokaryotic genome annotation web server. Bioinformatics 2010, 26(8):1122–1124. 35. Hemmerich C, Buechlein A, Podicheti R, Revanna KV, Dong Q: An Ergatis- based prokaryotic genome annotation web server. Bioinformatics 2010, 26(8):1122–1124. 36. Dehal PS, Joachimiak MP, Price MN, Bates JT, Baumohl JK, Chivian D, Friedland GD, Huang KH, Keller K, Novichkov PS, et al: MicrobesOnline: an integrated portal for comparative and functional genomics. Nucleic Acids Res 2010, 38(Database issue):D396–D400. 13. Griffith OL, Montgomery SB, Bernier B, Chu B, Kasaian K, Aerts S, Mahony S, Sleumer MC, Bilenky M, Haeussler M, et al: ORegAnno: an open-access community-driven resource for regulatory annotation. Nucleic Acids Res 2008, 36(Database issue):D107–D113. Friedland GD, Huang KH, Keller K, Novichkov PS, et al: MicrobesOnline: an integrated portal for comparative and functional genomics. Nucleic Acids Res 2010, 38(Database issue):D396–D400. 14. Gama-Castro S, Jimenez-Jacinto V, Peralta-Gil M, Santos-Zavaleta A, Penaloza-Spinola MI, Contreras-Moreira B, Segura-Salazar J, Muniz-Rascado L Martinez-Flores I, Salgado H, et al: RegulonDB (version 6.0): gene regulation model of Escherichia coli K-12 beyond transcription, active (experimental) annotated promoters and Textpresso navigation. Nucleic Acids Res 2008, 36(Database issue):D120–D124. doi:10.1186/1471-2164-14-213 Pachkov M, Erb I, Molina N, van Nimwegen E: SwissRegulon: a database of genome-wide annotations of regulatory sites. Nucleic Acids Res 2007, 35(Database issue):D127–D131. Submit your next manuscript to BioMed Central and take full advantage of: • Convenient online submission • Thorough peer review • No space constraints or color figure charges • Immediate publication on acceptance • Inclusion in PubMed, CAS, Scopus and Google Scholar • Research which is freely available for redistribution Submit your manuscript at www.biomedcentral.com/submit Submit your next manuscript to BioMed Central and take full advantage of: Submit your next manuscript to BioMed Central and take full advantage of: 22. Kazakov AE, Cipriano MJ, Novichkov PS, Minovitsky S, Vinogradov DV, Arkin A, Mironov AA, Gelfand MS, Dubchak I: RegTransBase–a database of regulatory sequences and interactions in a wide range of prokaryotic genomes. Nucleic Acids Res 2007, 35(Database issue):D407–D412. • Convenient online submission 23. Novichkov PS, Rodionov DA, Stavrovskaya ED, Novichkova ES, Kazakov AE, Gelfand MS, Arkin AP, Mironov AA, Dubchak I: RegPredict: an integrated system for regulon inference in prokaryotes by comparative genomics approach. Nucleic Acids Res 2010, 38(Web Server issue):W299–W307. 24. Novichkov PS, Laikova ON, Novichkova ES, Gelfand MS, Arkin AP, Dubchak I, Rodionov DA: RegPrecise: a database of curated genomic inferences of transcriptional regulatory interactions in prokaryotes. Nucleic Acids Res 2010, 38(Database issue):D111–D118.
https://openalex.org/W2886451843
https://europepmc.org/articles/pmc6534009?pdf=render
English
null
Perioperative factors associated with delayed graft function in renal transplant patients
Brazilian Journal of Nephrology
2,018
cc-by
4,301
Resumo Authors Milton Halyson Benevides de Freitas1 Luciana Cavalcanti Lima1 Tania Cursino de Menezes Couceiro1 Wilton Bernadino da Silva2 João Marcelo de Andrade1 Marcio Handerson Benevides de Freitas2 Introdução: O sucesso do transplante renal e a boa função do enxerto dependem de uma boa técnica cirúrgica, anestesia que assegure a estabilidade hemodinâmica do receptor e condições adequadas de enxerto e receptor. Diversos fatores podem interferir na perfusão do enxerto e comprometer sua viabilidade. O objetivo deste estudo foi avaliar os fatores perioperatórios associados à função retardada do enxerto (FRE) em pacientes transplantados renais. Métodos: Estudo de coorte histórica em 310 pacientes submetidos a transplante entre 2011 e 2013. A FRE foi definida como a necessidade de diálise durante a primeira semana pós-transplante. Utilizou-se regressão logística e técnica Stepwise para construir modelos estatísticos. Resultados: A análise multivariada revelou fatores associados à FRE: técnica de anestesia combinada (OR = 3,81,95% CI, 1,71 a 9,19), regime de fluidos < 50 mL.kg-1 (OR = 3,71,95% CI, 1,68 a 8,61), diálise por mais de 60 meses (OR = 4,77,95% IC, 1,93 a 12,80), basiliximab (OR = 3,34,95% IC, 1,14 a 10,48), tempo de isquemia fria > 12 horas (OR = 5,26,95 % IC, 2,62 a 11,31), doador vivo (OR = 0,19,95% CI, 0,02 a 0,65) e diurese precoce (OR = 0,02,95% IC, 0,008 a 0,059). A precisão desse modelo é de 92,6%, calculada usando a área sob a curva ROC. A incidência de FRE na população estudada foi de 76,1%. Conclusões: Técnica combinada de anestesia, diálise por mais de 60 meses, basiliximab e tempo de isquemia fria> 12 horas são fatores de risco para FRE; regimes de fluidos liberais e rins de doadores vivos são protetores. Introduction: Successful renal transplant and consequent good graft function depend on a good surgical technique, an anesthetic that ensures the hemodynamic stability of the receiver, and appropriate conditions of graft and recipient. Several factors can in- terfere with the perfusion of the graft and compromise its viability. The objective of this study was to evaluate perioperative fac- tors associated with delayed graft function (DGF) in renal transplantation patients. Methods: This is a historical cohort study of patients who underwent renal trans- plantation between 2011 and 2013. Three hundred and ten transplants were ana- lyzed. DGF was defined as the need for di- alysis during the first week post-transplant. Perioperative factors associated with delayed graft function in renal transplant patients Fatores perioperatórios associados à função retardada do enxerto em pacientes transplantados renais Perioperative factors associated with delayed graft function in renal transplant patients Fatores perioperatórios associados à função retardada do enxerto em pacientes transplantados renais 1 Instituto de Medicina Integral Professor Fernando Figueira, Recife, PE, Brasil. 2 Universidade Federal de Pernambuco, Recife, PE, Brasil. Submitted on: 01/08/2018. Approved on: 06/12/2018. Introduction Introduction Renal transplantation is the treatment of choice for patients with end-stage kidney disease and is asso- ciated with better quality of life, a greater cost/ben- efit ratio, and longer survival.1 Proper functioning of the graft is essential for patients to re-establish body homeostasis and thus benefit from receiving the transplant.2 Standard monitoring included continuous elec- trocardiography, heart rate (HR), peripheral oxygen saturation, and noninvasive blood pressure measure- ment. Induction and maintenance of general anesthe- sia were performed using sevoflurane in concentra- tions of 1 to 2% in a mixture of 50% oxygen and 50% air. The most commonly used intravenous an- esthetics were fentanyl, propofol and atracurium. Patients underwent balanced general anesthesia (GA) or combined anesthesia (CA), defined by the assistant anesthesiologist depending on hemodynamic stability, comorbidities, and coagulation profile. Regional an- esthesia was performed by lumbar epidural injection of bupivacaine 0.125%, follow by general anesthe- sia. The protocol of immunosuppressive drugs used in our institution is Thymoglobulin and Basiliximab. Thymoglobulin is generally used when the patient has a panel reactive antibody (PRA) > 25% and Basiliximab when the PRA < 25%. Early diuresis is a good marker of successful re- nal transplantation as it reflects the re-establishment of graft function.3 Kidney failure immediately after transplantation, on the other hand, is known as de- layed graft function (DGF), which is associated with acute kidney rejection, renal failure and an increased risk of graft loss.4 The fluid regimen, living or de- ceased donor, the anesthetic technique, comorbidities, cold ischemia time (CIT) and the anesthetic drugs used during surgery are some of the factors that may interfere with the perfusion of the graft and compro- mise its viability.5 The aim of this study was to evaluate the periop- erative factors associated with delayed graft function in patients who underwent renal transplantation. Methods Data were collected from patients’ pre-anesthesia evaluation form, intraoperative anesthesia records, and nephrology medical records. The independent variables included anesthesia technique, intraopera- tive hydration regimen, CIT, duration and type of di- alysis, PRA, living or deceased donor, hemodynamic instability, traumatic or non-traumatic death of the donor, receptor comorbidities, type of immunosup- pressant used, and weight and age of the donor and receptor. The dependent variable was DGF. Following approval by the hospital ethics committee, this historical cohort study was conducted on patients aged 18-60 years who were scheduled for renal trans- plantation at our institution in Recife, Brazil between 2011 and 2013. Patients with cardiac disease (ejec- tion fraction < 30), kidney-pancreas transplantation, and kidney retransplantation were excluded from this study. Hemodynamic instability was considered to be a drop in systolic blood pressure (SBP) of at least 30% compared to the initial blood pressure in the operat- ing room and/or requiring vasoactive drugs for a pe- riod equal to or greater than 15 minutes.6 Restrictive fluid regimen was defined as the intraoperative hy- dration < 50 mL·kg-1. There are many definitions of DGF in the literature; one of the most well established and adopted in our research was the need for dialysis during the first week post-transplant. Immediate graft function (IGF) is defined as serum creatinine decrease less than 70% of preoperative value in the first week. We used the Fisher’s exact and Chi-square (χ2) tests to compare categorical variables and the Student’s t and Mann-Whitney tests for mean comparisons (table 1). The independent variables were subjected to logistic regression modeling using a backward step- wise method, according to the Akaike information criterion (AIC).8 To evaluate the quality of the regres- sion adjustment, the Hosmer and Lemeshow test was used.9 The accuracy and performance of each model were evaluated using the area under the ROC curve. Expanded criteria deceased organ donors (ECD) are a source of kidneys that permit more patients to benefit from transplantation. ECD is defined as all Resumo Logistic regression with a stepwise tech- nique was used to build statistical models. Results: Multivariate analysis revealed the following risk factor for DGF: combined anesthesia technique (OR = 3.81, 95%CI, 1.71 to 9.19), a fluid regimen < 50 mL·kg-1 (OR = 3.71, 95%CI, 1.68 to 8.61), dialy- sis for more than 60 months (OR = 4.77, 95%CI, 1.93 to 12.80), basiliximab (OR = 3.34, 95%CI, 1.14 to 10.48), cold ischemia time > 12 hour (OR = 5.26, 95%CI, 2.62 to 11.31), living donor (OR = 0.19, 95%CI, 0.02 to 0.65), and early diuresis (OR = 0.02, 95%CI, 0.008 to 0.059). The accuracy of this model was 92.6%, calculated using the area under the ROC curve. The incidence of DGF in the study population was 76.1%. Conclusions: Combined anesthesia tech- nique, dialysis for more than 60 months, basiliximab, and cold ischemia time > 12 hours are risk factor for DGF, while liberal fluid regimens and kidneys from living do- nors are protective factors. 1 Instituto de Medicina Integral Professor Fernando Figueira, Recife, PE, Brasil. 2 Universidade Federal de Pernambuco, Recife, PE, Brasil. Keywords: Kidney Transplantation; Re- nal Dialysis; Immunosuppressive Agents; Delayed Graft Function. Palavras-chave: Transplante de Rim; Di- álise Renal; Imunossupressores; Função Retardada do Enxerto. Delayed graft function in renal transplant patients deceased donors older than 60 years or donors older than 50 years with two of the following conditions: hypertension, stroke as the cause of death, or prer- etrieval serum creatinine greater than 1.5 mg/dL-1.7 Results Three hundred forty-four patients underwent re- nal transplantation but 34 were excluded from the Braz. J. Nephrol. (J. Bras. Nefrol.) 2018;40(4):360-365 361 Delayed graft function in renal transplant patients Table 1 Demographic and clinical features of the study population IGF (74) DGF (236) p-value Recipient Gender 0.1767° Female 27 (36.4%) 73 (30.9%) Male 47 (63.5%) 163 (69%) Age (years) 42.6 (± 15.1) 45.9 (± 12.6) 0.2962°° Weight (kg) 63.5 (± 13.4) 65.2 (± 14.2) 0.3041°° BMI (kg.m-2) * 22.9 (± 4.2) 24 (± 4.3) 0.4239°° Hypertension 0.3424° - No 19 (25.6%) 53 (22.4%) - Yes 55 (74.4%) 183 (77.6%) Diabetes 0.1964° - No 63 (82.8%) 194 (82.2%) - Yes 11 (17.1%) 42 (17.7%) Dialysis type 0.0826° - Peritoneal dialysis 6 (0.8%) 8 (3.3%) - Hemodialysis 68 (91.2%) 228 (96.7%) PRA > 25 0.1556° - No 18 (24.3%) 42 (17.7%) - Yes 56 (75.6%) 194 (82.2%) Donor Deceased < 0.0001° - No 28 (37.8%) 4 (12.5%) - Yes 46 (62.1%) 232 (83.4%) Age (years) 39.3 (± 15) 42.1 (± 14.5) 0.5368°° Cr 1.5 (± 0.8) 2.2 (± 1.9) 0.4495°° Transplantation Cold Ischemia Time (hours) 11.7 (± 11.2) 21.2 (± 7.8) < 0.0001° Restrictive fluid regimen < 0.0001° No 43 (58.1%) 64 (27.1%) Yes 31 (41.8%) 172 (72.8%) Surgical time (min) 153.9 (± 31.6) 146.1 (± 33.5) 0.3730°° SD = Standard deviation (±),°Chi-square (χ2) tests; °° Student's t; IGF = Immediate graft function; PRA = panel reactive antibody. analysis (Figure 1). The demographic and clinical de- tails of the included patients are shown in Table 1. Both groups were comparable concerning recipient sex, age, and positive versus negative PRA. ECD organs were present in 109 transplanted patients, 56 in the DGF group (p-value = 0.44). Traumatic death occurred in 42.7% (120) of the do- nors. Stroke was the cause of death of 46.3% (130) and death from others causes was 11%. Of 310 patients, 67.7% were male, 89% received kidneys from deceased donors, and 112 (36%) received general anesthesia. Upon univariate analysis (Table 1), only the origin of the kidney, restrictive fluid regimen, and the CIT were more prevalent among DGF com- pared with IGF patients. Hemodynamic instability oc- curred in 110 patients during the perioperative period, without correlation with any group (p-value = 0.48). Results Flowchart of patient inclusion Table 2 Factors associated with Delayed Graft Function (DGF) * p < 0.05 Estimate of coefficients p-value OR (95% CI) Risk factors - Combined Anesthesia 1.3381 < 0.0001* 3.81 (1.71-9.19) - Restrictive fluid regimen (< 50 mL·kg-1) 1.3118 0.00153 * 3.71 (1.68-8.61) - Immunosuppressant (Basiliximab) 1.2082 0.03201 * 3.34 (1.14-10.48) - Dialysis > 60 months 1.5641 0.00110 * 4.77 (1.93-12.80) - Cold ischemia time (> 12h) 1.6618 < 0.0001* 5.26 (2.62-11.31) Protective factors - Living donor -1.2047 0.03434 * 0.19 (0.02-0.65) - Early diuresis -3.7312 < 0.0001* 0.02 (0.008-0.059) Figure 1. Flowchart of patient inclusion Table 2 Factors associated with Delayed Graft Function (DGF) * p < 0.05 Estimate of coefficients p-value OR (95% CI) Risk factors - Combined Anesthesia 1.3381 < 0.0001* 3.81 (1.71-9.19) - Restrictive fluid regimen (< 50 mL·kg-1) 1.3118 0.00153 * 3.71 (1.68-8.61) - Immunosuppressant (Basiliximab) 1.2082 0.03201 * 3.34 (1.14-10.48) - Dialysis > 60 months 1.5641 0.00110 * 4.77 (1.93-12.80) - Cold ischemia time (> 12h) 1.6618 < 0.0001* 5.26 (2.62-11.31) Protective factors - Living donor -1.2047 0.03434 * 0.19 (0.02-0.65) - Early diuresis -3.7312 < 0.0001* 0.02 (0.008-0.059) hours (43.1%). Analysis of recipient factors revealed hours (43.1%). Analysis of recipient factors revealed associations of DGF with dialysis time > 60 months (OR = 4.77, 95%CI, 1.93 to 12.80). During the intraoperative time, a restrictive fluid regime (OR = 3.71, 95%CI, 1.68 to 8.61), and the use of combined anesthesia (OR = 3.81, 95%CI, 1.71 to 9.19) were related to DGF. Cold ischemia time > 12 hours (OR = 5.26, 95%CI, 2.62 to 11.31) and basil- iximab (OR = 3.34, 95%CI, 1.14 to 10.48) were risk factors to DGF. Among donor factors, living donor was a protective factor against DGF (OR = 0.19, 95%CI, 0.02 to 0.65) and patients with early diuresis had a lower risk of DGF (OR = 0.02, 95%CI, 0.008 to 0.059). To assess the performance of the multiple logistic regression analysis, we calculated the area un- der ROC curve, which yielded accuracies of 92.6% (Figure 2). Results The base logistic regression model obtained had the following independent variables: dialysis time, type of anesthesia, immunosuppressive drugs, flu- id regimen, early diuresis, and origin of the kidney (Table 2). The incidence of DGF in our study was 76.1%; most of the patients needed dialysis in the first 24 Braz. J. Nephrol. (J. Bras. Nefrol.) 2018;40(4):360-365 362 Delayed graft function in renal transplant patients Figure 1. Flowchart of patient inclusion hours (43.1%). Analysis of recipient factors revealed associations of DGF with dialysis time > 60 months (OR = 4.77, 95%CI, 1.93 to 12.80). During the intraoperative time, a restrictive fluid regime (OR = 3.71, 95%CI, 1.68 to 8.61), and the use of combined anesthesia (OR = 3.81, 95%CI, 1.71 to 9.19) were related to DGF. Cold ischemia time > 12 hours (OR = 5 26 95%CI 2 62 to 11 31) and basil logistic regression analysis, we calculated the area un- der ROC curve, which yielded accuracies of 92.6% (Figure 2). Discussion In this retrospective study conducted in 310 kidney transplant patients, we identified several factors re- Figure 1. Flowchart of patient inclusion Table 2 Factors associated with Delayed Graft Function (DGF) * p < 0.05 Estimate of coefficients p-value OR (95% CI) Risk factors - Combined Anesthesia 1.3381 < 0.0001* 3.81 (1.71-9.19) - Restrictive fluid regimen (< 50 mL·kg-1) 1.3118 0.00153 * 3.71 (1.68-8.61) - Immunosuppressant (Basiliximab) 1.2082 0.03201 * 3.34 (1.14-10.48) - Dialysis > 60 months 1.5641 0.00110 * 4.77 (1.93-12.80) - Cold ischemia time (> 12h) 1.6618 < 0.0001* 5.26 (2.62-11.31) Protective factors - Living donor -1.2047 0.03434 * 0.19 (0.02-0.65) - Early diuresis -3.7312 < 0.0001* 0.02 (0.008-0.059) hours (43.1%). Analysis of recipient factors revealed associations of DGF with dialysis time > 60 months (OR = 4.77, 95%CI, 1.93 to 12.80). During the intraoperative time, a restrictive fluid regime (OR = 3.71, 95%CI, 1.68 to 8.61), and the use of combined anesthesia (OR = 3.81, 95%CI, 1.71 to logistic regression analysis, we calculated the area un- der ROC curve, which yielded accuracies of 92.6% (Figure 2). Discussion In this retrospective study conducted in 310 kidney Figure 1. Discussion In this retrospective study conducted in 310 kidney transplant patients, we identified several factors re- lated with delayed graft function. Although causality cannot be established, our data suggested associations in agreement with other reports. DGF is one of the most common complications following renal transplantation and is often associat- ed with acute rejection and increased risk of graft loss. The incidence of DGF in our study was 76.1%, with Braz. J. Nephrol. (J. Bras. Nefrol.) 2018;40(4):360-365 363 Delayed graft function in renal transplant patients rates of 0.01% for living donor kidneys and 83.4% for deceased donor kidneys. In a Brazilian multicenter study of 6 transplantation centers, totaling 612 kid- ney transplants with grafts of deceased donors carried out between 2000 and 2002, revealed an incidence of DGF of 53.9, 62.3, and 51.6% in 2000, 2001, and 2002, respectively.10 One center had an incidence of 81.6%, similar to our results. These high rates of DGF of grafts from deceased donors are explained mainly by the difficulty of maintaining hemodynamic stability of the donor, prolonged cold ischemia time, use of ECD kidneys, and the definition for DGF (need for dialysis during the first week post-transplant). Ojo et al.11 have demonstrated that recipients of ECD kidneys benefit from extra life-years when compared to wait-listed dialysis patients, although they pres- ent higher rates of delayed graft function, more acute rejection episodes, and decreased long-term graft function. Living donor kidneys and early diuresis were iden- tified as protective factors for DGF. The short cold ischemia time and the consequent less pronounced ischemia-reperfusion injury (IRI) produce fewer cyto- kines and free radicals, which limit the deleterious ef- fects of IRI. A similar association between graft origin and DGF was reported by Ojo et al.12, who conducted a retrospective cohort study of 37,216 patients. In that study, there was a 23% increased risk of DGF for every 6 hours of cold ischemia time in deceased donor kidneys. DGF rates were also affected by the type of an- esthesia used. Combined anesthesia showed a three- fold increased risk of graft dysfunction in our study. This is the first study to correlate anesthetic technique with DGF. The association may be explained by the reduction in catecholamine levels and vasodilatation following neuraxial blockade, which reduces graft perfusion.13 A restrictive fluid regimen increased the risk of DGF approximately 4-fold. Discussion Kidney perfusion depends linearly on mean arterial pressure, which is influenced by intravascular volume, sympathetic tone, and renal autoregulation.14 Due to the denervation during trans- plantation, self-regulation and sympathetic tone are Figure 2. ROC curve showing the sensitivity and false positive rate (1- specificity) of factors associated with Delayed Graft Function (area under the curve: 92.6%). Figure 2. ROC curve showing the sensitivity and false positive rate (1- specificity) of factors associated with Delayed Graft Function (area under the curve: 92.6%). Figure 2. ROC curve showing the sensitivity and false positive rate (1- specificity) of factors associated with Delayed Graft Function (area under the curve: 92 6%) Figure 2. ROC curve showing the sensitivity and false positive rate (1 specificity) of factors associated with Delayed Graft Function (area under the curve: 92.6%). rates of 0.01% for living donor kidneys and 83.4% for deceased donor kidneys. In a Brazilian multicenter study of 6 transplantation centers, totaling 612 kid- ney transplants with grafts of deceased donors carried out between 2000 and 2002, revealed an incidence of DGF of 53.9, 62.3, and 51.6% in 2000, 2001, and 2002, respectively.10 One center had an incidence of 81.6%, similar to our results. These high rates of DGF of grafts from deceased donors are explained mainly by the difficulty of maintaining hemodynamic stability of the donor, prolonged cold ischemia time, use of ECD kidneys, and the definition for DGF (need for dialysis during the first week post-transplant). Ojo et al.11 have demonstrated that recipients of ECD kidneys benefit from extra life-years when compared to wait-listed dialysis patients, although they pres- ent higher rates of delayed graft function, more acute rejection episodes, and decreased long-term graft function. rates of 0.01% for living donor kidneys and 83.4% for deceased donor kidneys. In a Brazilian multicenter study of 6 transplantation centers, totaling 612 kid- ney transplants with grafts of deceased donors carried out between 2000 and 2002, revealed an incidence of DGF of 53.9, 62.3, and 51.6% in 2000, 2001, and 2002, respectively.10 One center had an incidence of 81.6%, similar to our results. These high rates of DGF of grafts from deceased donors are explained mainly by the difficulty of maintaining hemodynamic stability of the donor, prolonged cold ischemia time, use of ECD kidneys, and the definition for DGF (need for dialysis during the first week post-transplant). References 1. Coupe N, O’Brien M, Gibson P, de Lima J. Anesthesia for pediatric renal transplantation with and without epidural analgesia-- a review of 7 years experience. Paediatr Anaesth 2005;15:220-8. 2. Rabbat CG, Thorpe KE, Russel JD, Churchill DN. Comparison of mortality risk for dialysis patients and cadaveric first renal transplant recipients in Ontario, Canada. J Am Soc Nephrol 2000;11:917-22. 3. Dawidson IJ, Ar’Rajab A. Perioperative fluid and drug therapy during cadaver kidney transplantation. Clin Transpl 1992:267- 84. Duration of dialysis pre-transplantation was also identified as a risk factor for DGF in our study. In a retrospective study of 30,294 kidney transplant pa- tients, Keith et al.16 found that the incidence of DGF was 26.4% higher in patients who received dialysis for more than 72 months. 4. Perico N, Cattaneo D, Sayegh MH, Remuzzi G. Delayed graft function in kidney transplantation. Lancet 2004;364:1814-27. 5. Gil JS, Pereira BJ. Death in the first year after kidney trans- plantation: implication for patient waiting list. Transplantation 2003;75:113-7. 6. Smith TW, Kelly RA, Stevenson LW, Braunwald E. Manage- ment of heart failure. In: Braunwald E. Heart Disease: A Text- book of Cardiovascular Medicine. Philadelphia: W.B. Saun- ders; 1997. p. 442-514. Basiliximab was identified as risk factor for DGF (OR 3.34, p-value = 0.03201). Similarly, in a retro- spective cohort study of 327 patients, Chen et al.17 found a higher risk of DGF in the basiliximab group (37.1% versus 26.1%, p-value = 0.035). According to Lebranchu et al.,18 both anti-lymphocyte drugs (Thymoglobulin and Basiliximab) are effective for in- ducing immunosuppression and are associated with DGF because they release cytokines and induce neph- rotoxicity. Thymoglobulin is associated with a lower incidence of graft dysfunction because of its anti-ad- hesin molecules, which prevent leukocytes from ad- hering to cell surfaces.19 7. Metzger RA, Delmonico FL, Feng S, Port FK, Wynn JJ, Merion RM. Expanded criteria donors for kidney transplantation. Am J Transplant 2003;3:114-25. 8. Bozdogan H. Model selection and Akaike’s Information Cri- terion (AIC): The general theory and its analytical extensions. Psychometrika 1987;52:345-70. y 9. Hosmer DW, Lemeshow S. Applied Logistic Regression. New York: Wiley; 1989. 10. Azevedo LS, Castro MC, Monteiro de Carvalho DB, d’Avila DO, Contieri F, Gonçalves RT, et al. Incidence of delayed graft function in cadaveric kidney transplants in Brazil: a multicenter analysis. Transplant Proc 2005;37:2746-7. 11. Ojo AO, Hanson JA, Meier-Kriesche, Okechukwu CN, Wolfe RA, Leichtman AB, et al. Discussion Ojo et al.11 have demonstrated that recipients of ECD kidneys benefit from extra life-years when compared to wait-listed dialysis patients, although they pres- ent higher rates of delayed graft function, more acute rejection episodes, and decreased long-term graft function. ischemia-reperfusion injury (IRI) produce fewer cyto- kines and free radicals, which limit the deleterious ef- fects of IRI. A similar association between graft origin and DGF was reported by Ojo et al.12, who conducted a retrospective cohort study of 37,216 patients. In that study, there was a 23% increased risk of DGF for every 6 hours of cold ischemia time in deceased donor kidneys. DGF rates were also affected by the type of an- esthesia used. Combined anesthesia showed a three- fold increased risk of graft dysfunction in our study. This is the first study to correlate anesthetic technique with DGF. The association may be explained by the reduction in catecholamine levels and vasodilatation following neuraxial blockade, which reduces graft perfusion.13 A restrictive fluid regimen increased the risk of DGF approximately 4-fold. Kidney perfusion depends linearly on mean arterial pressure, which is influenced by intravascular volume, sympathetic tone, and renal autoregulation.14 Due to the denervation during trans- plantation, self-regulation and sympathetic tone are Living donor kidneys and early diuresis were iden- tified as protective factors for DGF. The short cold ischemia time and the consequent less pronounced Braz. J. Nephrol. (J. Bras. Nefrol.) 2018;40(4):360-365 364 Delayed graft function in renal transplant patients lost and the renal flow undergoes great influence of volemia.15 In a clinical study of 40 patients, Othman et al.14 evaluated the influence of the hydration regime on hemodynamic stability and early function of the graft and found that patients who received the largest infusion of fluids moments before the renal artery was unclamped presented lower hemodynamic instability and higher levels of systolic blood pressure, medium blood pressure, and central venous pressure. References Survival in recipients of marginal ca- daveric donor kidneys compared with other recipients and wait- listed transplant candidates. J Am Soc Nephrol 2001;12:589- 97. 12. Ojo AO, Wolfe RA, Held PJ, Port FK, Schmouder RL. Delayed graft function: risk factors and implications for renal allograft survival. Transplantation 1997;63:968-74. The current study had a few limitations. First, some unmeasured variables may have affected the accuracy of our models. Second, perioperative care practices may be different in other institutions, po- tentially accounting for the differences in outcomes. Third, the lack of water balance, which would be the ideal variable to characterize peri-operative volume management. Our study has several strengths: this is the first study to examine the effect of anesthesia on DGF, and our end-points are statistically relevant for clinical practice. Future controlled prospective studies should be conducted to further evaluate these results. 13. Yost CS, Niemann CU. Anesthesia for Abdominal Organ Transplantation. In: Miller RD, ed. Miller’s Anesthesia. Phila- delphia: Churchill Livingstone; 2010. p. 2155-84. 14. Othman MM, Ismael AZ, Hammouda GE. The impact of tim- ing of maximal crystalloid hydration on early graft function during kidney transplantation. Anesth Analg 2010;110:1440- 6. 15. Morita K, Seki T, Nonomura K, Koyanagi T, Yoshioka M, Saito H. Changes in renal blood flow in response to sympatho- mimetics in the rat transplanted and denervated kidney. Int J Urol 1999;6:24-32. 16. Keith D, Cantarovich M, Paraskevas S, Tchervenkov J. Duration of dialysis pretransplantation is an important risk factor for de- layed recovery of renal function following deceased donor kidney transplantation. Transplant Int 2008;21:126-32. 17. Chen G, Gu J, Qiu J, Wang C, Fei J, Deng S, et al. Efficacy and safety of thymoglobulin and basiliximab in kidney transplant pa- tients at high risk for acute rejection and delayed graft function. Exp Clin Transplant 2013;11:310-4. Conclusion In summary, this study showed that liberal fluid regi- mens, kidneys from living donors, and cold ischemia of less than 12 hours are protective factors for DGF. Dialysis pre-transplantation > 60 months and com- bined anesthesia are risk factors. Basiliximab is a risk factors for DGF. 18. Lebranchu Y, Bridoux F, Büchler M, Le Meur Y, Etienne I, Tou- pance O, et al. Immunoprophylaxis with basiliximab compared with antithymocyte globulin in renal transplant patients receiving MMF-containing triple therapy. Am J Transplant 2002;2:48-56. 19. Batiuk TD, Bennet WM, Norman DJ. Cytokine nephropathy during antilymphocyte therapy. Transplant Proc 1993;25:27- 30. Braz. J. Nephrol. (J. Bras. Nefrol.) 2018;40(4):360-365 365
https://openalex.org/W4281645226
https://zenodo.org/records/6629104/files/ARIMS0714.pdf
Russian
null
ЎЗБЕКИСТОНДА БОЛА ҲУҚУҚЛАРИ КАФОЛАТЛАРИ
Zenodo (CERN European Organization for Nuclear Research)
2,022
cc-by
1,135
ACADEMIC RESEARCH IN MODERN SCIENCE International scientific-online conference ЎЗБЕКИСТОНДА БОЛА ҲУҚУҚЛАРИ КАФОЛАТЛАРИ Д.М.Эргашев АндДУ Ижтимоий-иқтисодиёт факультети талабаси https://doi.org/10.5281/zenodo.6629104 Abstract Президентимизнинг 2017 йил 7 февралдаги Фармони билан тасдиқланган 2017 — 2021 йилларда Ўзбекистон Республикасини ривожлантиришнинг бешта устувор йўналиши бўйича Ҳаракатлар стратегиясининг 4-устивор йўналиши “Ижтимоий соҳани ривожлантиришнинг устувор йўналишлари” деб номланиб, унинг 4.2.– банди Аҳолини ижтимоий ҳимоя қилиш ва соғлиқни сақлаш тизимини такомиллаштириш, хотин-қизларнинг ижтимоий-сиёсий фаоллигини ошириш сифатида белгиланган. Key words: ҳуқуқий тарбия, болалар, фуқаролик, жамият, ички ва ташқи сиёсати. Мазкур бандда оила саломатлигини мустаҳкамлаш, оналик ва болаликни муҳофаза қилиш, оналар ва болаларнинг сифатли тиббий хизматдан фойдаланишни кенгайтириш, уларга ихтисослаштирилган ва юқори технологияларга асосланган тиббий ёрдам кўрсатиш, чақалоқлар ва болалар ўлимини камайтириш бўйича комплекс чора-тадбирларни янада кенгроқ амалга ошириш каби муҳим масалалар белгилаб берилган бўлса, “Таълим ва фан соҳасини ривожлантириш” деб номланган 4.4.- бандида эса мактабгача таълим муассасалари тармоғини кенгайтириш ва ушбу муассасаларда болаларнинг ҳар томонлама интеллектуал, эстетик ва жисмоний ривожланиши учун шарт-шароитларни тубдан яхшилаш, болаларнинг мактабгача таълим билан қамраб олинишини жиддий ошириш ва фойдаланиш имкониятларини таъминлаш, педагог ва мутахассисларнинг малака даражасини юксалтириш каби мухум масалалар устивор вазифа қилиб белгиланди. Ўзбекистон Республикаси БМТнинг тўла ҳуқуқли аъзосига айланганидан кейин, инсон ҳуқуқ ва эркинликларини ҳимоялаш бўйича халқаро тизимни шакллантирувчи 60 дан ортиқ халқаро ҳуқуқий ҳужжатларга қўшилди, Бола ҳуқуқлари Конвенцияси шулар жумласидан. Республиканинг ярмидан кўп аҳолиси (67 %) 30 ёшгача бўлган ёшлар, шулардан 11 млн. - 18 ёшгача бўлгани ҳолда, бу аҳолининг умумий хисобида 48,2 % ни ташкил этади. Бундай вазиятда Конвенция қоидаларининг қўлланилиш муаммоси ўта долзарбдир. Болаларнинг 56 ACADEMIC RESEARCH IN MODERN SCIENCE International scientific-online conference ҳуқуқ ва эркинликларини таъминлаш муаммосини самарали ечмасдан туриб мамлакатнинг демократик ривожланишини тасаввур қилиб бўлмайди, шу сабабдан мамлакат ҳукумати томонидан мазкур ижтимоий муносабатлар доирасида катта ишлар амалга оширилди. Ўзбекистонда бола ҳуқуқларини ҳимоялашнинг қонуний тизими асосини Ўзбекистон Республикаси Конституцияси, қонун ва қонуности ҳужжатлари ташкил этади, уларда инсоннинг асосий ҳуқуқ ва эркинликлари акс этган. Мазкур соҳадаги бевосита қонун бўлиб 1991 йил 20 ноябрдаги «Ўзбекистон Республикасида ёшларга оид давлат сиёсатининг асослари тўғрисида»гиЎзбекистон Республикасининг қонуни хисобланади. Унга мувофиқ, «Ўзбекистон Республикасида ёшларга оид давлат сиёсати қуйидаги қоидаларга асосланади: миллати, ирқи, тили, дини, ижтимоий мавқеи, жинси, маълумоти ва сиёсий эътиқодидан қатъи назар ёшлар тўғрисида ғамхўрлик қилиш; ёшларни ҳуқуқий ва ижтимоий жиҳатдан ҳимоя қилиш; миллий, маданий анъаналарнинг авлоддан авлодга ўтиши, авлодларнинг маънавий алоқаси; ёшларнинг ташаббусларини қўллаб- қувватлаш, ёшлар Ўзбекистон Республикаси Конституцияси ва қонунлари доирасида ўз манфаатларини амалга ошириш йўлларини эркин танлаб олишларига кафолат бериш; жамиятни ривожлантиришга, айниқса республика ёшлари ҳаётига оид сиёсат ва дастурларни ишлаб чиқиш ҳамда амалга оширишда ёшларнинг бевосита иштирок этиши; ҳуқуқ ва бурчларнинг эркинлик ва фуқаролик масъулиятининг бирлиги». Abstract Қуйидаги ҳолатда биз Ўзбекистон қонунчилигида бола ҳуқуқлари масалалари таъминланганлигини кўришимиз мумкин. Республикада меҳнат муносабатларини тартибга солувчи асосий қонун бўлиб Ўзбекистон Республикасининг Меҳнат кодекси хисобланади (Ўзбекистон Республикаси МК). Ишлаб чиқаришда ёки ишлаб чиқариш давомидаги таълимда меҳнат ва дам олишни тўғри ташкил этилган ҳолатдаги вояга етмаганларнинг жисмоний меҳнати нафақат уларнинг соғлигига зарар етказмайди, балки кучи, чидамлилига ва иродасининг мустаҳкамланишига ҳам хизмат қилади. Аммо, ҳар бир бола жисмоний ва ақлий заифлиги сабабли маҳсус ҳуқуқий ҳимояга муҳтож. Давлат болага зўравонлик, ёмон даволаш, мажбурий меҳнат ёки уларнинг ҳаёти ва соғлигига зарар етказиши мумкин бўлган ACADEMIC RESEARCH IN MODERN SCIENCE International scientific-online conference ҳар қандай ишдан ҳимояланганлик ҳуқуқини таъминлаб бериши лозим, буни болаларга ўқиб-ўрганиш ва енгил меҳнат билан шуғулланишга имкон яратиб бериш билан таъминлаш мумкин. Бир томондан 18 ёшга тўлмаган ишчилар ҳар қандай чекловларсиз, катталар каби тўла ҳуқуқларга эга бўлашлари лозим. Иккинчи томондан эса, вояга етмаганларни махсус ҳимояга олиш зарурати, табиийки уларга бир қанча қўшимча ҳуқуқ ва кафолатларни яратиб берилишини талаб этади ҳамда баъзи ҳолларда катталарга қўлланиладиганидан фарқ қилувчи қоидаларнинг тадбиқ этилишини кўзда тутади . Ҳозирда юқорида қайд етилган аждодларимизнинг илмий меросини, ижтимоий-сиёсий фаолиятини ўрганиш ва ёшлар билан таништириш хайриҳоҳлиги ҳозирги замон зиёлиларининг асосий долзарб вазифаларидан саналади. Ушбу мақола бугунги бозор иқтисодиётида кичик бизнес ва бизнеснинг асосий ўрнини қамраб олади. Шу жумладан, кичик бизнес ва бизнеснинг ривожланиши ва ҳуқуқий асослари илмий таҳлил қилиниб, айни пайтда кичик бизнес ва бизнесни молиявий қўллаб-қувватлаш, иккинчисига ўзгартиришлар киритилади ва миллий қонунчиликнинг ушбу соҳасига оид қоидалар қўшилади. Мақолада замонавий Ўзбекистонда қонун устуворлиги ва фуқаролик жамиятини шакллантиришнинг енг муҳим масалалари кўриб чиқилган. Ўзбекистон сиёсий ҳаётнинг бой тажрибасига, сиёсий онг хусусиятларига ега бўлиб, ўзига хос ва мураккаб шароитларда ривожланади. Шундай қилиб, Ғарб дунёси сиёсий тажрибасининг оддий нусхасини кўчириб олиш нотўғри бўлиб чиқди. Жамиятда ижтимоий барқарорликни таъминлаш мақсадида оила институти функцияларининг бажарилиши масаласига алоҳида эътибор қаратиб, оила аъзоларига оила ва унинг функцияларини бажарилиши ҳақида сабоқ бериш лозим. Ам Мақолада маънавий салоҳиятнинг моҳияти ва унинг замонавий жамиятдаги ўрни ўрганилган. Шукур Бугунги кунда "Миллий model" га асосланган таълим соҳасидаги ислоҳотларнинг моҳияти миллий қадриятларнинг устуворлигини таъминлаш емас, балки янги давр тараққиётини жаҳон илм-фани ва ACADEMIC RESEARCH IN MODERN SCIENCE International scientific-online conference таълим тизимидаги улкан ютуқлар ва миллий ўзлик асосига қурадиган таълим тизимини - рағбатлантириш. ACADEMIC RESEARCH IN MODERN SCIENCE International scientific-online conference таълим тизимидаги улкан ютуқлар ва миллий ўзлик асосига қурадиган таълим тизимини - рағбатлантириш. Ўзбекистон Республикаси МКнинг 6-моддаси ҳамма фуқароларга чекловларнинг барча шаклларидан ҳимояни кафолатлайди. Abstract Унда белгиланганки, барча фуқаролар жинси, ёши, ирқи ва бошқа белгиларидан қатъий назар меҳнат ҳуқуқларига эга бўлиш ва улардан фойдаланишда тенг имкониятларга эга. Корхона маъмурияти ишга қабул қилишда хизматчининг ишчанлик қобилияти, ва унинг меҳнати натижаларидан ташқари, бошқа сабаблар туфайли рад жавобини беришга ҳақлари йўқ. Бу Бола ҳуқуқлари тўғрисидаги Конвенцияга, яъни Конвенциянинг 138- моддаси ишга қабул қилишнинг минимал ёши ва 146-модданинг талабрига тўла мос келади. р ур 1. Ўзбекистон Республикасини 2017-2021 йилларда ривожлантиришнинг Ҳаракатлар стратегияси. Ўзбекистон Республикаси қонун ҳужжатлари тўплами, 2017 й., 6-сон, 70-модда 2. Болалар меҳнатининг энг ёмон шаклларига барҳам бериш. Халқаро Меҳнат Ташкилотининг 182-Конвенциясини қўллаш бўйича амалий қўлланма Парламентлар аъзолари учун қўппанма №3/2002 Тошкент, Инсон ҳуқуқлари бўйича Ўзбекистон Республикаси Миллий маркази, 2008 3. Tolibjonovich, M. T. (2021). EASTERN RENAISSANCE AND ITS CULTURAL HERITAGE: THE VIEW OF FOREIGN RESEARCHERS. ResearchJet Journal of Analysis and Inventions, 2(05), 211-215. 4. Tolibjonovich, Madumarov T., and Gulomjonov O. R. Ogli. "Lombard Microcredit Organization Its Concept and Its Importance Today." JournalNX, vol. 6, no. 10, 2020, pp. 109-111. 4. Tolibjonovich, Madumarov T., and Gulomjonov O. R. Ogli. "Lombard Microcredit Organization Its Concept and Its Importance Today." JournalNX, vol. 6, no. 10, 2020, pp. 109-111. 5. Nasriddinovich, A. A. (2021). Structure, Models and Characteristics of Civil Society. STRUCTURE, 7(4). 6. Амирхўжаев Шукуржон Қурбонович, & Ғуломжонов Одилжон Рахимжон Ўғли (2022). Ижтимоий-фалсафий жиҳатдан оиланинг этномаданий хусусиятлари. Ta’lim fidoyilari, 14 (1), 133-143. 7. Madumarov Talantbek, & Ergashev Omonillo. (2022). SPIRITUAL POTENTIAL AND ITS ROLE IN MODERN. Yosh Tadqiqotchi Jurnali, 1(2), 58– 62. Retrieved from http://2ndsun.uz/index.php/yt/article/view/66 7. Madumarov Talantbek, & Ergashev Omonillo. (2022). SPIRITUAL POTENTIAL AND ITS ROLE IN MODERN. Yosh Tadqiqotchi Jurnali, 1(2), 58– 62. Retrieved from http://2ndsun.uz/index.php/yt/article/view/66 8. Mukhtarov, U. M. (2019). STUDYING OF SCIENTIFIC-PHILOSOPHICAL HERITAGE OF THE EAST RENAISSANCE INTELLECTUALS IN DEVELOPMENT 8. Mukhtarov, U. M. (2019). STUDYING OF SCIENTIFIC-PHILOSOPHICAL HERITAGE OF THE EAST RENAISSANCE INTELLECTUALS IN DEVELOPMENT 59 ACADEMIC RESEARCH IN MODERN SCIENCE International scientific-online conference OF PHILOSOPHICAL EDUCATION. Theoretical & Applied Science, (7), 120- 124. ACADEMIC RESEARCH IN MODERN SCIENCE International scientific-online conference 124.
https://openalex.org/W2949777931
https://ieeexplore.ieee.org/ielx7/6287639/8600701/08737948.pdf
English
null
Data Augmentation and Second-Order Pooling for Facial Expression Recognition
IEEE access
2,019
cc-by
6,255
Received June 7, 2019, accepted June 13, 2019, date of publication June 17, 2019, date of current version July 17, 2019. Received June 7, 2019, accepted June 13, 2019, date of publication June 17, 2019, date of current version July 17, 2019. Digital Object Identifier 10.1109/ACCESS.2019.2923530 The associate editor coordinating the review of this manuscript and approving it for publication was Abdullah Iliyasu. Data Augmentation and Second-Order Pooling for Facial Expression Recognition INDEX TERMS Facial expression recognition, data augmentation, second-order pooling, deep convolutional neural networks. Data Augmentation and Second-Order Pooling for Facial Expression Recognition XIAOYUN TONG , SONGLIN SUN , (Senior Member, IEEE), AND MEIXIA FU National Engineering Laboratory for Mobile Network Security, Beijing University of Posts and Telecommunications, Beijing 100876, Chi Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, Beijing University of Posts and Telec Beijing 100876, China XIAOYUN TONG , SONGLIN SUN , (Senior Member, IEEE), AND MEIXIA FU National Engineering Laboratory for Mobile Network Security, Beijing University of Posts and Telecommunications, Beijing 100876, China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China j g School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China Corresponding author: Xiaoyun Tong (email: xiaoyun_t@bupt.edu.cn) This work was supported in part by the National Natural Science Foundation of China under Project 61471066, and in part by the Open Project Fund of the National Key Laboratory of Electromagnetic Environment, China, under Grant 201600017. ABSTRACT Facial expression is the main medium of information transmission in human communication, playing an important role in human’s daily life. Facial expression recognition is still challenging due to the various obstacle, illumination, and posture. However, most of the existing works focus on deeper or wider network structures and rarely explores the high-level feature statistics. In this paper, we propose a second-order pooling convolution neural network to explore the correlation information between the facial features after deep network learning. At the final stage of the network, we add a new covariance pooling layer to replace the first-order pooling of standard convolution networks. In the pooling layer of covariance, the Newton iteration method is used to approximate the square root instead of EIG or SVD, which makes it more suitable for GPU. Due to the small amount of facial expression data, this paper uses different data augmentation methods to increase the amount of training data and improve the generalization ability of the model. The proposed method, data augmentation and second-order pooling (DASOP), was evaluated on the real-world affective faces database (RAFDB) and the static facial expressions in the wild (SFEW), yielding correct rates of 88.625% and 59.518%, respectively. We achieve state-of-the-art performance superior to existing methods. INDEX TERMS Facial expression recognition, data augmentation, second-order pooling, deep convolutional neural networks. II. RELATED WORK The proposed method DASOP consists of two parts: data aug- mentation and second-order pooling. Therefore, this paper introduces the related work of data augmentation and the second-order pooling separately, and summarizes as follows. So, the performance of single model is limited to the loss of discriminant information. At present, deep facial expression recognition faces two key problems: (1) over-fitting due to lack of sufficient training data; (2) facial expression changes are subtle and changeable, the first-order information is insufficient to provide more discriminant information. To overcome these issues, this paper proposes data augmentation and second-order pooling based deep convolutional neural networks for facial expres- sion recognition. An overview of the proposed methods is shown in Figure 1. The input image is transformed into a Densenet121 neural network, then the second-order informa- tion of the output feature is calculated, and the final output category is obtained. In summary, the main contribution of our work consists of: I. INTRODUCTION Newton iteration method is used to solve the covariance matrix to make it more suitable for GPU. (3) The proposed DASOP achieves the state-of-art perfor- mance on two public datasets: RAFDB and SFEW. The remainder of this paper is introduced as follows. Section II summarize the work most relevant to our work. Section III descripts the proposed model, including data aug- mentation, and covariance descriptors. The improved perfor- mance of the proposed DASOP on two public datasets, and comparison with the state-of-art solutions is demonstrated in Section IV. Finally, Section V concludes this paper and gives the directions of future work. I. INTRODUCTION amount of public database of facial expression recognition is limited, so data augmentation can be used to increase the diversity of training samples, improve the robustness and generalization ability of the model, and avoid over-fitting [3]. For example, we can crop the image in different ways so that the objects appear at different positions in the image at different scales, which can reduce the sensitivity of the model to the target position. Facial expression is the most natural and direct way to reflect people’s inner emotions and thoughts. Therefore, the research of facial expression recognition technology based on visual information is another research topic after face detection and recognition [1]. Facial expression recognition has potential application value in many fields, such as intelligent med- ical care, intelligent monitoring in security field, human- computer interaction, digital entertainment, etc. In facial expression recognition, it is a very challenging task because the visual differences between different subclasses are small and easily affected by posture, perspective, illumination, and so on [2]. Convolutional neural network (CNNs) have enough capac- ity to represent the complex variations of samples by learning features hierarchically [4]. Therefore, CNNs have made out- standing achievements in facial expression recognition. The common models mainly adopt the average or max pooling layer in designing network architectures. However, these lay- ers only capture the first-order statistics of input features, which limit the learning capacity of models [5]. In addition, the structure of face not only contains the global discrimi- nant information, but also the local discriminant information. Deep convolutional neural networks generally require a large amount of training data to get ideal results. However, the VOLUME 7, 2019 86821 86821 X. Tong et al.: DASOP for Facial Expression Recognition FIGURE 1. Data augmentation and second-order pooling based Densenet121 networks for facial expression recognition. RE 1. Data augmentation and second-order pooling based Densenet121 networks for facial expression recognition. FIGURE 1. Data augmentation and second-order pooling based Densenet121 networks for facial expression recognit TABLE 1. Comparison of accuracies with various standard network architectures on RAFDB and SFEW. TABLE 1. Comparison of accuracies with various standard network architectures on RAFDB and SFEW. (2) Facial expression recognition adopts end-to-end pool- ing of second-order statistics. Newton iteration method is used to solve the covariance matrix to make it more suitable for GPU. (2) Facial expression recognition adopts end-to-end pool- ing of second-order statistics. B. SECOND-ORDER POOLING Deep convolutional neural networks have achieved great success in large-scale object classification and other areas of computer vision. In fact, this network can be seen as a process of learning low level features through hierarchical convolution and pooling, and getting high level representation through a global average pooling that is sent it to the classifier for classification. Global Gaussian Distribution Embedding Network (G2DeNet) [15]: take advantage of matrix normalization but suffer from large dimensionality since they use the square- root of a large pooled matrix. At the same time, the authors use the first and second-order information and normalize it by 0.5 matrix power. Global Gaussian Distribution Embedding Network (G2DeNet) [15]: take advantage of matrix normalization but suffer from large dimensionality since they use the square- root of a large pooled matrix. At the same time, the authors use the first and second-order information and normalize it by 0.5 matrix power. The focus here is global average pooling. This layer of work was first proposed on [8], and is now widely used in mainstream deep networks, such as Inception, Resnet, Densenet and so on. However, the problem of global average pooling is that the previous network acquires a strong expres- sive feature through continuous learning, but at last it makes a global mean when it expresses the image. Statistically speaking, the mean is only a first-order information that is often simple, fast and effective. However, it is easy to ignore the relevant information between channels by calculating the mean of each channel. Based on this point, many authors propose a second-order statistical method to replace the first- order global average pooling, and thus make a series of work. One of the earliest works employing second-order pool- ing for semantic segmentation used it as regional descriptor, combined with LBP, SIFT and MSIFT [9]. Previous well- known work included DeepO2P [5] and Bilinear Model [10] and various improvements. In [11], authors propose a new class of CNN architectures to employ covariance pooling. The method of global covariance pooling is first applied to large-scale visual recognition tasks in [12]. It not only given The focus here is global average pooling. This layer of work was first proposed on [8], and is now widely used in mainstream deep networks, such as Inception, Resnet, Densenet and so on. A. DATA AUGMENTATION Convolutional neural networks can classify objects placed in different directions, or different scales, or different illu- minations robustly, that is, convolutional neural networks have invariant properties [3]. This is the premise of data augmentation. Data augmentation is mainly to improve the robustness and generalization ability of the model, and reduce the over-fitting phenomenon of the network. By transforming the training data, the network with stronger generalization ability can be obtained, which can better adapt to the application scenarios. Over-fitting is mainly caused by two reasons: too little data and too complex model. Hence, data augmentation is the most direct and effective method to avoid over-fitting. (1) We add multiple data augmentation technologies to datasets, and set a group of experiments on different networks to illustrate the effectiveness of data augmentation. The result of experiments is shown in Table 1. 86822 86822 VOLUME 7, 2019 X. Tong et al.: DASOP for Facial Expression Recognition Commonly data augmentation methods listed as follows: some theoretical analysis, but also prove to be effective in large-scale vision problems, such as the classification of Ima- geNet. In [13], authors propose symmetric positive definite manifold network, that is, covariance pool is used in facial expression recognition, combining manifold networks with traditional convolutional networks, and using spatial pools in a single image feature map in an end-to-end depth learning approach. The following is a brief description of the covari- ance processing for different second-order pooling. some theoretical analysis, but also prove to be effective in large-scale vision problems, such as the classification of Ima- geNet. In [13], authors propose symmetric positive definite manifold network, that is, covariance pool is used in facial expression recognition, combining manifold networks with traditional convolutional networks, and using spatial pools in a single image feature map in an end-to-end depth learning approach. The following is a brief description of the covari- ance processing for different second-order pooling. Rotation: Random rotates the image at a certain angle. Reflection: change the orientation of the image content. Flip: Flip the image horizontally or vertically. Scale: The image can be outward or inward according to the specified scale factor; or the scale space is constructed by filtering the image with using the specified scale factor, according to the idea of SIFT feature extraction. Crop: Random select the region of the image for clipping and scaling to a certain scale. A. DATA AUGMENTATION Deep Second Order Pooling (DeepO2P) [5]: adopts Log-Euclidean (Log-E) metric for exploiting geometry of covariance spaces, which only brings side effect on covari- ance representations. It is not suitable for large-scale datasets, such as ImageNet. Shift: shifts the image in a certain way on the image plane. Noise: Random perturbation of each pixel of the image. The common noise modes are salt and pepper noise and Gauss noise. Color jitter: Randomly change the brightness, contrast and saturation of the image. Bilinear Pooling (BP) [10]: performs element-wise square root normalization, without considering the manifold of covariance matrices. Bilinear convergence calculates the outer product of different spatial locations and calculates the average convergence for different spatial locations to obtain bilinear features. The outer product captures the pairwise correlation between the feature channels, and this is trans- lationally invariant. Bilinear convergence provides a stronger representation of the feature than the linear model, and can be optimized end-to-end to achieve performance. Random Erasing [6]: Random selection of an area on a picture and random erasure of image information. Generative Adversarial Networks (GAN) [7]: An image generation model consists of two parts, a generator and a dis- criminator, which generate images through two-part mutual game learning. In order to get more data, we just need to make minor changes to our existing dataset, such as flips, translations or rotations. Data augmented images are distinct and indepen- dent images for untrained neural networks. Compact Bilinear Pooling (CBP) [14]: use the outer product to combine the feature maps of the two stream CNNs, then transform the bilinear features through the square root of the symbol, and add L2 normalization, input classifier. Compared with the BP, the loss of the CBP is basically unchanged, but the size of the parameters is reduced by two orders of magnitude, and CBP supports an end-to-end training structure. B. SECOND-ORDER POOLING However, the problem of global average pooling is that the previous network acquires a strong expres- sive feature through continuous learning, but at last it makes a global mean when it expresses the image. Statistically speaking, the mean is only a first-order information that is often simple, fast and effective. However, it is easy to ignore the relevant information between channels by calculating the mean of each channel. Based on this point, many authors propose a second-order statistical method to replace the first- order global average pooling, and thus make a series of work. Moments Embedding Network (MoNet) [16]: using a sub-matrix square root layer, matrix normalization is performed before bilinear pooling, combined with com- pact pooling, reduces dimensionality significantly with- out compromising performance. The description matrix is augmented, which contains both first and second-order information. In addition, tensor sketch can be used to design a compact bilinear merge operation. Its performance is better than G2DeNet. Symmetric Positive Definite Manifold Network (SPDNET) [13]: covariance features can be flattened through Bilinear Mapping Layer, and then introduced non- linearity by Eigenvalue Rectification, Log Eigenvalue Layer endows elements in Riemannian manifold with a Lie Group structure. Symmetric Positive Definite Manifold Network (SPDNET) [13]: covariance features can be flattened through Bilinear Mapping Layer, and then introduced non- linearity by Eigenvalue Rectification, Log Eigenvalue Layer endows elements in Riemannian manifold with a Lie Group structure. Symmetric Positive Definite Manifold Network (SPDNET) [13]: covariance features can be flattened through Bilinear Mapping Layer, and then introduced non- linearity by Eigenvalue Rectification, Log Eigenvalue Layer endows elements in Riemannian manifold with a Lie Group structure. One of the earliest works employing second-order pool- ing for semantic segmentation used it as regional descriptor, combined with LBP, SIFT and MSIFT [9]. Previous well- known work included DeepO2P [5] and Bilinear Model [10] and various improvements. In [11], authors propose a new class of CNN architectures to employ covariance pooling. The method of global covariance pooling is first applied to large-scale visual recognition tasks in [12]. It not only given Matrix Power Normalization [12]: the covariance matrix of depth description vector is normalized by 0.5 matrix power to obtain bilinear convergence feature. The covariance is by Matrix Power Normalization [12]: the covariance matrix of depth description vector is normalized by 0.5 matrix power to obtain bilinear convergence feature. The covariance is by 86823 VOLUME 7, 2019 X. III. PROPOSED METHOD eigen-decomposed to obtain the eigenvalue, and then the square root of eigenvalue is obtained. It solves the problem of high dimension statistics of small samples, and effectively uses the geometric structure of covariance matrix [17]. How- ever, almost all platforms based on GPU have poor support for eigen decomposition, so its efficiency is very poor. Facial expression recognition mainly includes three parts: face detection, feature extraction, expression recognition. That is, given a picture, face detection is performed first, and then align based on facial markers. The extracted face is augmented and standardized, and then fed into the deep neural network. To consider the interaction between fea- tures, we use second-order pooling, and then employ the Newton-Schulz iteration to explore second-order statistical information. Because the difference between classes is not significant, the first-order information is not applicable, but the second-order information can bring more discriminatory and valuable information to the classifier. Iterative Matrix Square Root Normalization of Covari- ance Pooling [18]: because there is no efficient implementa- tion of eigenvalue decomposition and SVD on GPU, Schur decomposition or eigenvalue decomposition are still needed when Lyapunov equation is solved in reverse. It is pro- posed that both forward and backward processes are based on Newton iteration method. The matrix is normalized by 0.5 matrix power. A common framework of above references is to use CNN to extract feature map, and then use each location in feature map as a sample to calculate the covariance matrix of the entire feature map. After the covariance matrix is obtained, the eigenvalues are reduced, parameterized or normalized and then output. B. SECOND-ORDER POOLING Tong et al.: DASOP for Facial Expression Recognition FIGURE 2. Data augmentation in train and test datasets. FIGURE 2. Data augmentation in train and test datasets. III. PROPOSED METHOD IV. EXPERIMENTS In this section, we conduct many experiments of the proposed method on two public datasets and present the state-of-the-art performance though comparing with the previous work. The proposed system is implemented on Pytorch using NVIDIA GeForce GTX 1080Ti with 11GB memory. In our experi- ments, the input image is 224∗224, the batch size is 32. The training epoch is set to 100. The initial learning rate is 0.1 and decays by a factor of 0.1 every 30 epochs. DNNs adopted in Table 1 is trained from scratch. B. COVARIANCE POOLING Equation (4) only involves matrix product operations, not matrix inverse, hence is suitable for implementations on GPUs. Compared to the exact square root of the EIG calculation, the approximate solution can only be obtained by 5 iterations [13]. After deep convolutional neural network, feature will be obtained. Firstly, covariance matrix is calculated. Unlike first- order pooling, covariance matrix can describe the correlation between each channel. The reason for exponentiation is to solve the problem of small sample high dimension in covariance estimation. Reference [8] has been verified that when the power is 0.5, that is, the square root operation, the effect is optimal. Defining the output of the convolutional network is a tensor of h×w×d dimensions, where h is the height, w is the width, and d is the number of channels. This tensor is reshaped into a n × d dimensional feature matrix, where n = h × w. Then calculate the covariance of this matrix: A. DATASETS A = 1 tr (6)6 (2) In this paper, facial expression datasets in the wild are chosen, which can better approximation to the real-world scenarios, and also more challenging. We present the evaluation results of RAFDB and SFEW datasets, and reveal the relevance and importance of facial features. In this paper, facial expression datasets in the wild are chosen, which can better approximation to the real-world scenarios, and also more challenging. We present the evaluation results of RAFDB and SFEW datasets, and reveal the relevance and importance of facial features. (2) Let λi be eigenvalues of 6, arranged in nondecreasing order. As tr (6) = P i λi, then: Let λi be eigenvalues of 6, arranged in nondecreasing order. As tr (6) = P i λi, then: ∥6 −I∥2 = max (6 −I) = 1 − λ1 P i λi < 1 (3) Real-world Affective Faces Database (RAFDB) [19] is a large-scale facial expression database with around 30K great- diverse facial images downloaded from the Internet. This dataset contains 15331 images and that have been labeled for seven basic expressions. There are 12271 samples in training set and 3068 samples in test set. The RAF-DB is 100∗100 RGB image, is shown in figure 3(a). There are 7 rows, each row representing a category with 7 images per category. Figure 3(b) is the data distribution. It shows the number of images per emotion in the training set and test set. As can be seen from Figure 3(b), the data distribution is very uneven. (3) Therefore, the proposed algorithm satisfies the conver- gence condition. A. DATA AUGMENTATION Because of too little data and too many network param- eters, it is easy to lead to over-fitting. The facial expres- sions publicity dataset is small, and the categories are not balanced, so this paper adopts data augmentation methods to expand the dataset to avoid over-fitting. Another advan- tage of data augmentation is to expand the amount of data in the database, which makes the training network more robust. The data augmentation of training used in this paper are as follows: resize, random horizontal flip, random crop and random Erasing. Random erasing is complementary to random clipping and random horizontal flipping. The test- ing data is cropping the given image four corners and the central crop plus the flipped version of these, then average the predictions of 10 images, the largest output classifica- tion is corresponding expression. This method effectively reduces classification errors. Data augmentation is shown in Figure 2. Facial expression recognition is more directly related to the deformation of facial feature points than to the existence or absence of specific feature points. Therefore, we believe that if geometric moments are applied to facial expression recognition, the second-order statistics are more suitable than other statistics for capturing the regional distortion of key points in facial features. In the generated convolution network, global covariance pooling is a better choice than global average pooling. There are three reasons: (1) better performance and stronger gener- alization ability; (2) good theoretical explanation in statistics and geometry; (3) fast convergence and high computational efficiency. 86824 VOLUME 7, 2019 VOLUME 7, 2019 X. Tong et al.: DASOP for Facial Expression Recognition 1) PRE-NORMALIZATION In order to ensure the global convergence of the proposed algorithm, we pre-normalize covariance matrix by dividing its trace before the Newton iteration, i.e., 3) POST-COMPENSATION 6 = 1 n −1 n X i=1 (xi −µ) (xi −µ)T = 1 n −1XT X (1) Since the pre-normalization changes the covariance size, in order to eliminate this effect, post-compensation is added after the Newton iteration method to compensate the trace value back, i.e., C = √tr (6)YN where x1, x2, . . . , xn ∈Rd be the set of features, X denotes the mean-subtracted data matrix. Finally, the output of the second-order pooling layer is fed into the classifier for classification. At present, almost all GPU-based platforms have very poor support for eigenvalue decomposition, so the second-order pooling layer in this paper uses iterative method to solve the square root of covariance. Since the iteration itself is not global convergence, it can be guaranteed by dividing the trace of the matrix by the covariance matrix; however, the covariance is changed after dividing by the trace, so the value of the trace is compensated by post-compensation after the iteration. Detailed description is as follows. 2) NEWTON-SCHULZ ITERATION The idea of Newton’s method is simple. Given an initial point, the tangent at that point is used to approximate the function, and then the root of the tangent is found as an iteration. Newton’s iteration method is to make the equation converge gradually through continuous iteration. SFEW [20] extracted from a temporal facial expressions database Acted Facial Expressions in the Wild which we have extracted from movies. The database covers unconstrained facial expressions, varied head poses, large age range, occlu- sions, varied focus, different resolution of face and close to real world illumination. In total, SFEW contains 1766 images and that have been labeled for seven basic expressions. There are 958 samples in training set and 436 samples in validation set. Since the test set are not labeled, here the results on the validation set is reported in this paper. Let A be an SPD matrix, the square root of A is Y = Udiag  λ1/2 i  UT , but both EIG and SVD are not well sup- ported on GPU [12]. Hence, we computing Y by Newton Schulz iteration, a case of coupled iteration as follows: Yk = 1 2Yk−1 (3I −Zk−1Yk−1) Zk = 1 2 (3I −Zk−1Yk−1) Zk−1 (4) (4) where Z = I for k = 1, . . . , N. where Z = I for k = 1, . . . , N. 86825 VOLUME 7, 2019 X. Tong et al.: DASOP for Facial Expression Recognition FIGURE 4. Confusion matrix for Densenet121 and DASOP on the RAFDB and SFEW. FIGURE 3. RAFDB samples and distribution. FIGURE 3. RAFDB samples and distribution. FIGURE 3. RAFDB samples and distribution. FIGURE 3. RAFDB samples and distribution. FIGURE 3. RAFDB samples and distribution. B. RESULTS AND DISCUSSION Since the images provided by the dataset contain many back- grounds, it needs to be preprocessed, that is, face extraction. For SFEW, we use the MTCNN proposed in [21] to detect faces. For RAFDB, the dataset provides the aligned faces. FIGURE 4. Confusion matrix for Densenet121 and DASOP on the RAFDB and SFEW. on RAFDB and 16-32% on SFEW, respectively. The SFEW datasets are fewer, so the improvement of the accuracy rate is more obvious. on RAFDB and 16-32% on SFEW, respectively. The SFEW datasets are fewer, so the improvement of the accuracy rate is more obvious. We evaluate five current classical CNN architecture as backbone network for DASOP in Table 1. we present the comparison of accuracies with various standard network architectures on RAFDB and SFEW. Original means the original data input to different networks for training. Aug is for data augmentation using standard techniques including random crop, random flip and random erasing. DASOP is data augmentation and covariance pooling. (3) Compared with the first-order pooling, the accuracy of the second-order pooling is improved by 0.7-6% on RAFDB and 1-6% on SFEW, respectively, which shows the effective- ness of the second-order pooling and provides more useful information. Figure 4 shows that the accuracy of happiness and angry is significantly higher than others, but the accuracy of fear and disgust is very low. For this problem, we think that the first reason is that the number of different expressions in the data set is not balanced, this kind of imbalance is enough to make the classification error. The second reason is that surprise, disgust, fear and sad have certain similarities. In real life, people also find it difficult to distinguish these four kinds of expressions, especially when they are not acquainted with It can be seen from Table 1 that: (1) the densenet121 + DASOP of method proposed in this paper obtains best classification results with accuracy 88.625% on RAFDB and 59.518% on SFEW. This shows that the deep convolution network has a very obvious effect on the classification. The corresponding confusion matrixes are shown in Figure 3. (2) Data augmentation is very effective to improve the classification effect. The accuracy rate is increased by 1-7% (2) Data augmentation is very effective to improve the classification effect. The accuracy rate is increased by 1-7% VOLUME 7, 2019 VOLUME 7, 2019 86826 X. B. RESULTS AND DISCUSSION Tong et al.: DASOP for Facial Expression Recognition FIGURE 5. The loss function curve for original data and data augmentation with Densenet121 on the RAFDB. FIGURE 6. comparison of densenet121 + DASOP with other pooling. FIGURE 6. comparison of densenet121 + DASOP with other pooling. C. COMPARE TO OTHER POOLING In this section, we evaluate different second-order pooling methods for facial expression recognition. Figure 6 shows the comparison of the proposed method with the first-order global average pooling (GAvP) method and the second-order pooling methods, BP with CNN (BCNN) and CBP. Accord- ing to the Table 1 experimental results, Densenet121 was chosen as the basic network. As can be seen from Figure 6, the result of second-order pooling is higher than first-order pooling with accuracy 2-4% on RAFDB and 5-10% on SFEW, respectively. And our method achieves the highest accuracy in second-order pooling methods. FIGURE 5. The loss function curve for original data and data augmentation with Densenet121 on the RAFDB. each other, it is even more difficult to correctly recognize expressions. Moreover, we find that misjudgments always occur in some classes, which may be really difficult to dis- tinguish and confuse. In RAFDB, the loss function curve of original data and data augmentation based on densnet121 is shown in Figure 5. From Figure 5 (a), it can be seen that there is a serious over-fitting problem in the original data, so data augmenta- tion technology is used to avoid over-fitting in this paper. Figure 5 (b) shows that data augmentation can solve this problem very well. FUTURE WORKS In this work, we use traditional supervised methods for data enhancement. However, in the real world, data in the natural state exists in a variety of situations, and cannot be handled by the above simple methods. Therefore, data enhancement can be achieved by the following unsupervised methods: [17] Q. Wang, P. Li, W. Zuo, and L. Zhang, ‘‘RAID-G: Robust estimation of approximate infinite dimensional Gaussian with application to material recognition,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), Jun. 2016, pp. 4433–4441. [18] P. Li, J. Xie, Q. Wang, and Z. Gao, ‘‘Towards faster training of global covariance pooling networks by iterative matrix square root normal- ization,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), Jun. 2018, pp. 947–955. (1) Through the distribution of model learning data, the images which are consistent with the distribution of training data set are randomly generated. The representative method, GAN. [19] S. Li, W. Deng, and J. Du, ‘‘Reliable crowdsourcing and deep locality- preserving learning for expression recognition in the wild,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), Jul. 2017, pp. 2852–2861. [20] A. Dhall, R. Goecke, S. Lucey, and T. Gedeon, ‘‘Static facial expression analysis in tough conditions: Data, evaluation protocol and benchmark,’’ in Proc. IEEE Int. Conf. Comput. Vis. Workshops (ICCV Workshops), Nov. 2011, pp. 2106–2112. (2) Through the model, learn the data enhancement method suitable for the current task, the representative method, AutoAugment [27]. (2) Through the model, learn the data enhancement method suitable for the current task, the representative method, AutoAugment [27]. [21] K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, ‘‘Joint face detection and alignment using multitask cascaded convolutional networks,’’ IEEE Signal Process. Lett., vol. 23, no. 10, pp. 1499–1503, Oct. 2016. Also, we can add Global Second-order Pooling [28] across from lower to higher layers of deep convolutional net- works aiming to learn more discriminative representations by exploiting the second-order statistics of holistic image throughout a deep convolutional network. This will be an interesting direction, and the results should be improved in theory. [22] Y. Fan, J. C. K. Lam, and V. O. K. Li, ‘‘Multi-region ensemble convolu- tional neural network for facial expression recognition,’’ in Proc. Int. Conf. Artif. Neural Netw. Cham, Switzerland: Springer, Sep. 2018, pp. 84–94. [23] Y. Li, J. Zeng, S. Shan, and X. Chen, ‘‘Occlusion aware facial expression recognition using CNN with attention mechanism,’’ IEEE Trans. D. COMPARE TO OTHER REFERENCE Table 2 shows the comparison of the accuracy of each class between this paper and other references on RAFDB and SFEW. It can be seen that our algorithm is 1.625% higher than the current highest result, achieves the state-of-art results. TABLE 2. The comparison of the accuracy of each class between this paper and other references on RAFDB and SFEW. VOLUME 7, 2019 86827 he accuracy of each class between this paper and other references on RAFDB and SFEW. TABLE 2. The comparison of the accuracy of each class between this paper and other references on RAFDB and SFEW. X. Tong et al.: DASOP for Facial Expression Recognition This verifies the effective and significant of the proposed method. From all results based-deep learning, we can obtain that this stems from the effectiveness of deep convolu- tional networks and second-order information for feature extraction. [6] Z. Zhong, L. Zheng, G. Kang, S. Li, and Y. Yang, ‘‘Random eras- ing data augmentation,’’ 2017, arXiv:1708.04896. [Online]. Available: https://arxiv.org/abs/1708.04896 [7] I. Goodfellow, J. Pouget-Abadie, and M. Mirza, ‘‘Generative adversarial nets,’’ in Proc. Adv. Neural Inf. Process. Syst., 2014, pp. 2672–2680. [8] M. Lin, Q. Chen, and S. Yan, ‘‘Network in network,’’ in Proc. ICLR, Mar. 2014, pp. 1–10. [9] J. Carreira, R. Caseiro, J. Batista, and C. Sminchisescu, ‘‘Semantic seg- mentation with second-order pooling,’’ in Proc. Eur. Conf. Comput. Vis., 2012, pp. 430–443. V. CONCLUSION The novelty of the proposed model is that second-order sta- tistical information is introduced into the network as image representation. Compared with the classical method, only the first-order statistical information is mined in the learning process, and the visual features with stronger resolving power can be learned. By introducing global covariance aggregation and matrix power normalization techniques, the proposed model is significantly better than the classical convolutional network in performance, and the convergence speed is faster. Data augmentation reduces the risk of over-fitting and makes the model robust to occlusion. Experiment conducted on RAFDB and fer2013 with various architectures validate the effectiveness of our method. pp [10] T. Y. Lin, A. RoyChowdhury, and S. Maji, ‘‘Bilinear CNN models for fine- grained visual recognition,’’ in Proc. IEEE Int. Conf. Comput. Vis. (ICCV), Dec. 2015, pp. 1449–1457. [11] K. Yu and M. Salzmann, ‘‘Second-order convolutional neural networks,’’ Clin. Immunol. Immunopathol., vol. 66, no. 3, pp. 230–238, 2017. [12] P. Li, J. Xie, Q. Wang, and W. Zuo, ‘‘Is second-order information helpful for large-scale visual recognition?’’ in Proc. IEEE Int. Conf. Comput. Vis., Oct. 2017, pp. 2070–2078. [13] D. Acharya, Z. Huang, and D. Pani-Paudel, ‘‘Covariance pooling for facial expression recognition,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. Workshops, Jun. 2018, pp. 367–374. [14] Y. Gao, O. Beijbom, and N. Zhang, ‘‘Compact bilinear pooling,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), Jun. 2016, pp. 317–326. [15] Q. Wang, P. Li, and L. Zhang, ‘‘G2DeNet: Global Gaussian distribution embedding network and its application to visual recognition,’’ in Proc. CVPR, Jul. 2017, pp. 6507–6516. [16] M. Gou, F. Xiong, and O. Camps, ‘‘Monet: Moments embedding net- work,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2018, pp. 3175–3183. FUTURE WORKS Image Process., vol. 28, no. 5, pp. 2439–2450, May 2019. [24] J. Zeng, S. Shan, and X. Chen, ‘‘Facial expression recognition with incon- sistently annotated datasets,’’ in Proc. Eur. Conf. Comput. Vis. (ECCV), Sep. 2018, pp. 222–237. [25] Z. Yu and C. Zhang, ‘‘Image based static facial expression recognition with multiple deep network learning,’’ in Proc. ACM Int. Conf. Multimodal Interact., Nov. 2015, pp. 435–442. [2] Y. Zong, X. Huang, W. Zheng, Z. Cui, and G. Zhao,, ‘‘Learning from hierarchical spatiotemporal descriptors for micro-expression recognition,’’ IEEE Trans. Multimedia, vol. 20, no. 11, pp. 3160–3172, Nov. 2018. [1] S. Li and W. Deng, ‘‘Deep facial expression recognition: A survey,’’ 2018, arXiv:1804.08348. [Online]. Available: https://arxiv.org/abs/1804.08348 [1] S. Li and W. Deng, ‘‘Deep facial expression recognition: A survey,’’ 2018, arXiv:1804.08348. [Online]. Available: https://arxiv.org/abs/1804.08348 [2] Y. Zong, X. Huang, W. Zheng, Z. Cui, and G. Zhao,, ‘‘Learning from hierarchical spatiotemporal descriptors for micro-expression recognition,’’ IEEE Trans. Multimedia, vol. 20, no. 11, pp. 3160–3172, Nov. 2018. [3] K. He, X. Zhang, S. Ren, and J. Sun ‘‘Deep residual learning for image recognition,’’ in Proc. CVPR, Jun. 2016, pp. 770–778. [4] A. Krizhevsky, I. Sutskever, and G. E. Hinton, ‘‘Imagenet classification with deep convolutional neural networks,’’ in Proc. NIPS, 2012, pp. 1–9. [5] C. Ionescu, O. Vantzos, and C. Sminchisescu, ‘‘Matrix backpropagation for deep networks with structured layers,’’ in Proc. IEEE Int. Conf. Comput. [3] K. He, X. Zhang, S. Ren, and J. Sun ‘‘Deep residual learning for image recognition,’’ in Proc. CVPR, Jun. 2016, pp. 770–778. [4] A. Krizhevsky, I. Sutskever, and G. E. Hinton, ‘‘Imagenet classification with deep convolutional neural networks,’’ in Proc. NIPS, 2012, pp. 1–9. REFERENCES [1] S. Li and W. Deng, ‘‘Deep facial expression recognition: A survey,’’ 2018, arXiv:1804.08348. [Online]. Available: https://arxiv.org/abs/1804.08348 [26] X. Liu, B. V. K. V. Kumar, J. You, and P. Jia, ‘‘Adaptive deep metric learning for identity-aware facial expression recognition,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. Workshops (CVPRW), Jul. 2017, pp. 522–531. [2] Y. Zong, X. Huang, W. Zheng, Z. Cui, and G. Zhao,, ‘‘Learning from hierarchical spatiotemporal descriptors for micro-expression recognition,’’ IEEE Trans. Multimedia, vol. 20, no. 11, pp. 3160–3172, Nov. 2018. [3] K. He, X. Zhang, S. Ren, and J. Sun ‘‘Deep residual learning for image recognition,’’ in Proc. CVPR, Jun. 2016, pp. 770–778. [27] E. D. Cubuk, B. Zoph, and D. Mane, ‘‘AutoAugment: Learning augmen- tation policies from data,’’ 2018, arXiv:1805.09501. [Online]. Available: https://arxiv.org/abs/1805.09501 [4] A. Krizhevsky, I. Sutskever, and G. E. Hinton, ‘‘Imagenet classification with deep convolutional neural networks,’’ in Proc. NIPS, 2012, pp. 1–9. [28] Z. Gao, J. Xie, Q. Wang, and P. Li, ‘‘Global second-order pooling convolutional networks,’’ 2018, arXiv:1811.12006. [Online]. Available: https://arxiv.org/abs/1811.12006 [5] C. Ionescu, O. Vantzos, and C. Sminchisescu, ‘‘Matrix backpropagation for deep networks with structured layers,’’ in Proc. IEEE Int. Conf. Comput. Vis. (ICCV), Dec. 2015, pp. 2965–2973. 86828 VOLUME 7, 2019
https://openalex.org/W2028046413
https://jcheminf.biomedcentral.com/counter/pdf/10.1186/1758-2946-4-17
English
null
Avogadro: an advanced semantic chemical editor, visualization, and analysis platform
Journal of cheminformatics
2,012
cc-by
11,477
*Correspondence: marcus.hanwell@kitware.com 1Department of Chemistry, University of Pittsburgh, 219 Parkman Avenue, Pittsburgh, PA, 15260, USA 2Department of Scientific Computing, Kitware, Inc., 28 Corporate Drive, Clifton Park, NY, 12065, USA Full list of author information is available at the end of the article © 2012 Hanwell et al.; licensee Chemistry Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 SOFTWARE Open Access Avogadro: an advanced semantic chemical editor, visualization, and analysis platform Marcus D Hanwell1,2*, Donald E Curtis3, David C Lonie4, Tim Vandermeersch5, Eva Zurek4 and Geoffrey R Hutchison1 Abstract Background: The Avogadro project has developed an advanced molecule editor and visualizer designed for cross-platform use in computational chemistry, molecular modeling, bioinformatics, materials science, and related areas. It offers flexible, high quality rendering, and a powerful plugin architecture. Typical uses include building molecular structures, formatting input files, and analyzing output of a wide variety of computational chemistry packages. By using the CML file format as its native document type, Avogadro seeks to enhance the semantic accessibility of chemical data types. Results: The work presented here details the Avogadro library, which is a framework providing a code library and application programming interface (API) with three-dimensional visualization capabilities; and has direct applications to research and education in the fields of chemistry, physics, materials science, and biology. The Avogadro application provides a rich graphical interface using dynamically loaded plugins through the library itself. The application and library can each be extended by implementing a plugin module in C++ or Python to explore different visualization techniques, build/manipulate molecular structures, and interact with other programs. We describe some example extensions, one which uses a genetic algorithm to find stable crystal structures, and one which interfaces with the PackMol program to create packed, solvated structures for molecular dynamics simulations. The 1.0 release series of Avogadro is the main focus of the results discussed here. Conclusions: Avogadro offers a semantic chemical builder and platform for visualization and analysis. For users, it offers an easy-to-use builder, integrated support for downloading from common databases such as PubChem and the Protein Data Bank, extracting chemical data from a wide variety of formats, including computational chemistry output, and native, semantic support for the CML file format. For developers, it can be easily extended via a powerful plugin mechanism to support new features in organic chemistry, inorganic complexes, drug design, materials, biomolecules, and simulations. Avogadro is freely available under an open-source license from http://avogadro.openmolecules.net. Software architecture O h The core of Avogadro is written in portable C++ code with platform-specific differences abstracted away by Qt, OpenGL, and Open Babel. The CMake build system makes the build process relatively simple on all supported platforms. Avogadro has been successfully built and tested on Linux, Apple Mac OS X, and Microsoft Windows in common 32 and 64 bit hardware architectures. At the time of writing, it is apparent that other researchers have perceived similar needs. Several new applications are available today that focus on both build- ing and visualizing molecular structure. These include CCP1GUI [21], Gabedit [22] and some highly specific edi- tors such as MacMolPlt [23] which focus on particular computational packages (i.e., GAMESS-US for MacMol- Plt). Whilst offering many interesting and useful fea- tures, these projects suffer from the same issues centering around effective reuse of existing code, well commented and documented code, and easy extension to add new features and adapt for specialized areas. The core of Avogadro is written in portable C++ code with platform-specific differences abstracted away by Qt, OpenGL, and Open Babel. The CMake build system makes the build process relatively simple on all supported platforms. Avogadro has been successfully built and tested on Linux, Apple Mac OS X, and Microsoft Windows in common 32 and 64 bit hardware architectures. Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Licensing costs can be prohibitive. If the company were to change its direction or focus, this can lead to a loss of a significant research investment in a commercial product. Furthermore, in most cases, these programs use custom, proprietary file formats, and semantic and chemical data can be lost in conversion to other data formats. chemistry, biochemistry, and molecular dynamics, among many others [28-47]. From the beginning, the project has strived to make a robust, flexible framework for both building and visual- izing molecular structures. Much of the initial focus has been placed on preparing input and analyzing output from quantum calculations. Other applications such as prepar- ing input for MD simulations and visualizing periodic structures will also be presented, demonstrating the flex- ibility of the Avogadro platform. The development team has also been members of the Blue Obelisk movement, fol- lowing the three pillars outlined by the group: Open Data, Open Standards, and Open Source [48,49]. The selection of free, open-source, cross-platform, three-dimensional, molecular builders was quite limited when the Avogadro project was founded in late 2006. Ghemical [17] was one of the only projects satisfying these needs at the time. Two of the authors (Hutchison and Curtis) contributed to Ghemical previously, but had found that it was not easily extensible. This led them to found a new project to address the issues they had observed in Ghemical and other packages. The Molden [18] applica- tion was also available, able to build up small molecules and analyze output from several quantum codes. How- ever, it suffers from a restrictive license and it uses an antiquated graphical toolkit, which is not native on most modern operating systems. Background aforementioned viewers are all freely available, and most of them are available under open-source licenses and work on the most common operating systems (Linux, Apple Mac OS X, Microsoft Windows, and BSD). Many fields such as chemistry, materials science, physics, and biology, need efficient computer programs to both build and visualize molecular structures. The field of molecular graphics is dominated by viewers with lit- tle or no editing capabilities, such as RasMol [1], Jmol [2], PyMOL [3], VMD [4], QuteMol [5], BALLView [6], VESTA [7], and XCrySDen [8,9], among many others. The The choice of software capable of building chemical structures in three dimensions is far smaller. There are existing commercial packages, such as CAChe/Scigress [10], ChemBio3D [11], GaussView [12], HyperChem [13], CrystalMaker [14], Materials Studio [15], and Spartan [16], which are polished and capable of constructing many different types of molecular structures. They are, however, not available for all operating systems (most of them only run on Microsoft Windows), and are not easily extensi- ble, customized, or integrated into automated workflows. Page 2 of 17 Software architecture O h One area that seems to suffer in many code bases in chemistry is software architecture. This can lead to less maintainable code, poor code reuse, and a much higher barrier to entry. Problems were identified in other projects with a view to minimize their impact when developing Avogadro. Modern software design processes were used in the initial planning stages of Avogadro, along with the choice of modern programming languages and libraries. Broad goals for the design of a molecular editor were identified following a case study of the available appli- cations. One of the main issues with both commercial and open-source applications is a lack of extensibility; many of the applications also only work on one or two operating systems. The creation of an open and exten- sible framework that implements many of the necessary foundations for a molecular builder and visualizer would facilitate more effective research in this area. Further, the open, standardized Chemical Markup Language (CML) file format [19,20] would be used, to secure semantic and chemical data and allow easy interoperability with other chemistry software. Avogadro has close ties to several other free, cross- platform, open-source projects to reuse as much code as is practical. These projects include Qt [50] to pro- vide a free, cross-platform graphical toolkit; Open Babel [51] for chemical file input/output, geometry optimiza- tion, and other chemical perception; Eigen [52] for matrix and vector mathematics; OpenGL/GLSL for real-time, three-dimensional rendering; and POV-Ray for ray-traced rendering. Based on the previous experience of the authors and a review of available programs at the time, several fun- damental choices were made. The C++ programming language; the Qt graphical toolkit; OpenGL for 3D visu- alization; CMake as the build system; and Open Babel as the chemical library. Using this combination of languages and libraries requires the project to be licensed under the GNU GPLv2 [53] license and made openly available to all. Based on the previous experience of the authors and a review of available programs at the time, several fun- damental choices were made. The C++ programming language; the Qt graphical toolkit; OpenGL for 3D visu- alization; CMake as the build system; and Open Babel as the chemical library. Using this combination of languages and libraries requires the project to be licensed under the GNU GPLv2 [53] license and made openly available to all. Implementation The Avogadro framework uses the model, view, con- troller paradigm. The model is comprised of the core data classes such as Molecule, Atom, and Bond, views are made up of the engine/display plugins, and controllers are the tools (interactive mouse) and extensions (non- interactive, form based/menu based). Every plugin has full access to the core data model, but view and controller The Avogadro project was started in earnest in 2007, and over the first 5 years of development has been downloaded over 270,000 times [24], been translated into over 20 lan- guages [25], and has over 20 contributors [26]. So far, it has been cited over 100 times [27], including applications in spectroscopy, catalysis, materials chemistry, theoretical Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Page 3 of 17 activities (Figure 1). The Avogadro::Color base class defines the virtual interface for applying colors to atoms, bonds, and other properties. Avogadro::Engine defines the common interface for all display types in Avogadro: simple ball and stick, Van der Waals visualizations, surfaces, and force visualizations. The Avogadro::Tool base class provides the interface for all interactive tools, focusing principally on mouse and keyboard interaction with Avogadro. Examples of tool plugins include the draw tool used to draw molecules atom by atom, and the navigation tool used to pan, rotate, and scale the view of the molecule. There are also several specialized tools such as the alignment tool. plugins are conceptually different; views are responsible for displaying data and controllers are responsible for modifying/changing data. Plugins rely on Avogadro’s set of programming inter- faces and almost all functionality is implemented in self contained plugins that are loaded at runtime. The major- ity of plugins distributed with Avogadro are written in C++, but the API is also available in the Python script- ing language. This allows for a great deal of choice in how plugins are implemented. Each plugin is a singleton class that implements a particular set of functions–depending on the type of plugin–which allows for features to be implemented in a very modular way. Finally there is the Avogadro::Extension class, which defines the interface for dialog based plugins. These extensions can interact with the molecule, and are used for a variety of purposes from molecule prop- erties dialogs to input file generation dialogs for many quantum codes including NWChem, Gaussian, GAMESS, and others. Implementation This class of plugin is also applied to file import, and network aware extensions querying web databases for structures given their common name for example. Over the last few years Avogadro development has started to use nightly builds of the latest version of the code in order to automatically flag issues introduced in new commits. Code review was also introduced in order to add a review step before new code is merged, along with softening the line between someone with commit rights and someone without (anyone can propose and upload a patch, but a small group can choose if/when the patch will be merged). Some automated testing has been added, but coverage at this point remains relatively low. API docu- mentation is automatically generated from comments in the code using Doxygen. At start up, several standard directories, which may be customized, are searched for plugins. The Qt plugin framework is used to check that the plugins have a recent enough version to be loaded, and the plugin type can be deduced once loaded. The user interface is then populated with appropriate entries; tools are added to the main tool- bar using their embedded icons, display types are added Display types Table 1 List of default display type (engine) plugins Name Description Axes Renders x, y, z Cartesian axes from the origin Ball and Stick Standard ball and stick representation Cartoon Secondary biological structure (α helix and β sheet) Dipole Render direction/magnitude of dipole moment if present Force Renders arrows showing forces on atoms from force field Hydrogen Bond Renders hydrogen bonds as dotted lines Label Shows labels on atoms and bonds, configurable Overlay Overlay of color gradient used for electrostatic properties Polygon Renders closed polygons of metallic centers Ribbon Basic secondary structure ribbon rendering Ring Renders rings in structure, different colors depending on ring size Simple Wireframe Very simple wireframe display Sticks Stick or liquorice rendering style for atoms and bonds Surface Renders triangular isosurface meshes Van der Waals Van der Waals sphere rendering (no bonds, Spheres space-filling) Wireframe Wireframe with more features such as bond order rendering Table 1 List of default display type (engine) plugins Name Description Axes Renders x, y, z Cartesian axes from the origin Ball and Stick Standard ball and stick representation Cartoon Secondary biological structure (α helix and β sheet) Dipole Render direction/magnitude of dipole moment if present Force Renders arrows showing forces on atoms from force field Hydrogen Bond Renders hydrogen bonds as dotted lines Label Shows labels on atoms and bonds, configurable Overlay Overlay of color gradient used for electrostatic properties Polygon Renders closed polygons of metallic centers Ribbon Basic secondary structure ribbon rendering Ring Renders rings in structure, different colors depending on ring size Simple Wireframe Very simple wireframe display Sticks Stick or liquorice rendering style for atoms and bonds Surface Renders triangular isosurface meshes Van der Waals Van der Waals sphere rendering (no bonds, Spheres space-filling) Wireframe Wireframe with more features such as bond order rendering There are also two tools for adjustment of structures (atom or bond centric), a selection tool supporting stan- dard selection interactions, and an auto-rotate tool that allows users to set the speed and angles about which to rotate the molecule. The interactive auto-optimization tool provides a sculpting interaction, where the user can begin a continuous geometry optimization and switch back to the draw or adjustment tools and change the shape and structure of the molecule while observing the new structure being optimized. Display types Display plugins are referred to as “engines” internally. Their primary focus is rendering graphics to the screen. As is the case with most molecular graphics, a large por- tion of the geometric primitives are spheres and cylinders, typically used to represent atoms and bonds. There are many other properties that can be rendered using the dis- play type plugins, for example, some of the engines also convey information about the underlying data the geomet- ric primitives represent to allow for the molecule to be edited. Table 1 shows a summary of the display plugins distributed with Avogadro. The navigation tool provides basic scene navigation, implementing rotation,panning, tilting, and zooming sup- port. The initial point of interaction (where the click occurs) changes the anchor point for navigation; navi- gation takes place about the center of molecule when clicking in empty space or about the center of any clicked atom. During interaction, the navigation tool provides visual cues to show what type of navigation is taking place. The navigation tool is also used as the default tool if the currently active tool does not handle the mouse event passed to it. Engines are performance critical as the render functions are called each time a frame is requested for display. Effi- cient rendering is also critical since multiple display types One of the other central tools is the draw tool, which implements a free-hand molecule drawing input method supporting keyboard shortcuts, combo boxes, and a peri- odic table view to select elements. The user can use the left mouse button to add new atoms or bonds, or click on the bonds to change their order. The right mouse button can be used to delete atoms or bonds, and the directional keys can be used in combination with the mouse to quickly rotate/pan the molecule. Display types This can also be combined with the measurement tool to interactively observe bond lengths and angles evolve as the structure is updated and the geometry minimized. If the optimization tool is turned off, the measurement tool also allows the user to precisely adjust bond lengths and/or angles using the adjustment tools. Tools The tools are responsible for virtually all mouse and key- board interaction with the molecule. A list of all tools is given in Table 2. Plugin interface Avogadro plugins are divided into four different types corresponding to four main classes that derive from this common base class, specializing their interface for specific Extensions Tools Painters Engines Open Babel Qt Eigen Force Fields Manipulate Tool Balls & Sticks POV-Ray OpenGL Scripting Python Tools Colors Elements Figure 1 General code architecture of Avogadro. General code architecture of Avogadro, indicating major plugin interfaces for colors, display engines, tools, and extensions. Red boxes indicate code dependencies of Avogadro, blue boxes indicate plugin API classes, and green boxes inidicate examples of each plugin type. Manipulate Tool Scripting Force Fields Figure 1 General code architecture of Avogadro. General code architecture of Avogadro, indicating major plugin interfaces for colors, display engines, tools, and extensions. Red boxes indicate code dependencies of Avogadro, blue boxes indicate plugin API classes, and green boxes inidicate examples of each plugin type. Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Page 4 of 17 Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 can be combined to form a composite display. For exam- ple, ball and stick display overlaid with a transparent Van der Waals space-filling display and ring rendering to high- light all rings in the structure. Figure 2 (d) and (f) show two such combinations of multiple display types. to the display type list, and menu entries are added for all loaded extensions. The tool and display type plugins can both (option- ally) provide a dialog for configuring the plugin. Dialogs are specific to each plugin and integrated into the user interface. Extensions Extensions represent quite a diverse range of plugins including input generation dialogs for various quantum chemistry codes such as GAMESS, Molpro, NWChem, etc., animation of the molecule, and visualization of molecular orbitals and electron density. Network aware extensions allow the user to click on a menu item to fetch Hanwell et al. Journal of Cheminformatics 2012, 4:17 Page 5 of 17 http://www.jcheminf.com/content/4/1/17 Hanwell et al. Journal of Cheminformatics 2012, 4:17 Page 5 of 17 http://www.jcheminf.com/content/4/1/17 Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Page 5 of 17 Figure 2 Standard molecular structure representations. Several molecular representations of thiophene, (a) wireframe, (b) stick/licorice, (c) ball and stick, (d) ball and stick with ring, (e) Van der Waals/CPK and (f) transparent Van der Waal’s with stick. Figure 2 Standard molecular structure representations. Several molecular representations of thiophene, (a) wireframe, (b) stick/licorice, (c) ball and stick, (d) ball and stick with ring, (e) Van der Waals/CPK and (f) transparent Van der Waal’s with stick. by chemical name and search for “tnt” or “propanol” and have structures returned by the NIH CACTUS Chem- ical Structure Resolver service [54]. A summary of the extensions distributed with Avogadro is shown in Table 3. are all implemented as extensions showing up in Avo- gadro menus. More recently a crystallography extension was added, giving access to a much wider range to func- tionality useful to practitioners in that area, including Miller Plane visualization, slab and surface generation. New builders for nanotubes, nanoparticles, and DNA are also planned for upcoming releases. Other extensions translate the entire scene to POV- Ray input, and call POV-Ray to render the molecule using ray tracing techniques to provide higher quality renderings for publication. Various molecular property dialogs are also implemented as plugins, drawing largely on Open Babel functionality to provide an overview of the molecule. Cartesian editors, addition and removal of hydrogens, fragment, SMILES, and peptide insertion Colors The color plugins primarily take either double precision numbers or integer values and return an RGB value. The plugins range from the standard color plugin that takes atomic number and returns the standard RGB value for that element through to mapping things like partial change and index to more easily view various aspects of the molecule’s structure. Table 2 List of default mouse tool plugins Name Description Draw Tool Build and edit atoms Navigate Tool Move the camera, rotate, pan, and zoom Bond Centric Alter bond lengths, angles, and torsions Manipulate Tool Move atoms and selected fragments Select Tool Select individual atoms, bonds, or fragments Auto Rotate Tool Continuously rotate a molecule for presentations Auto Optimize Tool Continuously optimize molecular geometry using molecular mechanics Measure Tool Determine bond lengths, angles, and dihedrals Align Tool Rotate and translate to a specified frame of reference Table 2 List of default mouse tool plugins Name Description Draw Tool Build and edit atoms Navigate Tool Move the camera, rotate, pan, and zoom Bond Centric Alter bond lengths, angles, and torsions Manipulate Tool Move atoms and selected fragments Select Tool Select individual atoms, bonds, or fragments Auto Rotate Tool Continuously rotate a molecule for presentations Auto Optimize Tool Continuously optimize molecular geometry using molecular mechanics Measure Tool Determine bond lengths, angles, and dihedrals Align Tool Rotate and translate to a specified frame of reference By defining a plugin interface for coloring atoms, bonds, or residues, developers can easily offer flexible render- ing options to highlight important information without requiring a user to tediously set colors on specific atoms or functional groups. Default color plugins are listed in Table 4, illustrating the variety of options. Each plugin is usually only 40-50 lines of C++ code. Python scripting h b d Python bindings are provided for all of the core API. Python code can be used in two ways: the first is the inter- active Python terminal, and the second is to write Python plugins; extensions, tools, or display types. Writing a Page 6 of 17 Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Table 3 List of default extension commands Name Description Create Surfaces Create surface meshes from molecular orbital/ electron density data GAMESS Prepare input files for GAMESS-US, featuring syntax highlighting, advanced properties Insert Fragment Insert molecular fragments from a library of common fragments Insert Peptide Build up and insert peptide fragments Molecular Mechanics Use Open Babel’s force fields for geometry optimization and conformer searches MOPAC Prepare input for and run MOPAC200x POV-Ray Ray-trace the displayed structure using POV-Ray Properties Angle Properties Table of all bond angles (editable) Atom Properties Table of all atoms with common properties Bond Properties Table of all bonds with common properties Molecule Properties Common properties of the molecule (including molecular weight, etc.) Torsion Properties Table of all dihedral angles (editable) Spectra Visualize spectra from output files Super Cell Builder Expand atoms with space group, replicate specified repeats and perform simple bonding Unit Cell Change crystallographic unit cell display and parameters Vibrations Show and animate molecular vibrations Table 3 List of default extension commands Name Description instructions on how to compile the latest source code are also provided on the main Avogadro web site [60,61] for the more adventurous, or those using an operating system that is not yet supported. The Qt toolkit gives Avogadro a native look and feel on the three major supported operating systems—Linux, Apple Mac OS X, and Microsoft Windows. The basic functionality expected in a molecular builder and viewer has been implemented, along with several less common features. It is very easy for new users to install Avogadro and build their first molecules within minutes. Thanks to the Open Babel library [51], Avogadro supports a large portion of the chemical file formats that are in common use. The vast majority of this functionality has been writ- ten using the interface made available to plugin writers, and is loaded at runtime. We will discuss these plugin interfaces and descriptions of the plugin types later. Semantic chemistry d h d Avogadro has used CML [19,20] as its default file format from a very early stage; this was chosen over other file formats because of the extensible, semantic structure pro- vided by CML, and the support available in Open Babel [51]. The CML format offers a number of advantages over others in common use, including the ability to extend the format. This allows Avogadro and other programs to be future-proof, adding new information and features neces- sary for an advanced semantically-aware editor at a later time, while still remaining readable in older versions of Avogadro. Through the use of Open Babel [51], a large array of file formats can be interpreted. When extending Avogadro to read in larger amounts of the output from quantum codes, it was necessary to devote significant develop- ment resources to understanding and adding semantic meaning to the quantum code output. This work was developed in a plugin, which was later split out into Python plugin requires the same functionality to be imple- mented as a native C++ plugin [55]. The advantage of Python plugins is that it’s easier to make prototypes since no compilation is required. Python plugins can also easily be shared with other users. The Python bindings interface with the PyQt python bindings for the Qt toolkit, which enables Python code to use all of Qt’s features when writing a plugin. For example, a short Python script can present a window using Qt and render molecules using Avogadro [56-58]. Semantic chemistry d h d Table 4 List of default color plugins Name Description Atom Index Color Color based on atom ID (from atom 1, 2, etc.) Charge Color Color based on predicted electrostatic partial charge Custom Color Color all atoms a specific, custom color Distance Color Color based on distance from one end of the molecule Element Color Standard color scheme, giving each atom a color (Default) defined by its element Residue Color Color based on amino acid or nucleic acid residue (i.e., glycine, histidine, etc.) SMARTS Color Color atoms matching a specific SMARTS pattern with a custom color Table 4 List of default color plugins Name Description Atom Index Color Color based on atom ID (from atom 1, 2, etc.) Charge Color Color based on predicted electrostatic partial charge Custom Color Color all atoms a specific, custom color Distance Color Color based on distance from one end of the molecule Element Color Standard color scheme, giving each atom a color (Default) defined by its element Residue Color Color based on amino acid or nucleic acid residue (i.e., glycine, histidine, etc.) SMARTS Color Color atoms matching a specific SMARTS pattern with a custom color Table 4 List of default color plugins Name Description Table 4 List of default color plugins Avogadro also includes an interactive Python console (Figure 3, which allows users to directly script and manip- ulate the Avogadro environment [59]. The graphical user interface The first thing most people will see is the main Avo- gadro application window, as shown in Figure 4. Binary installers are provided for Apple Mac OS X and Microsoft Windows, along with packages for all of the major Linux distributions. This means that Avogadro can be installed quite easily on most operating systems. Easy to follow Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Page 7 of 17 Figure 3 Python scripting terminal, printing atomic numbers. Simply left-clicking on the black part of the display allows the user to draw a carbon atom. If the user pushes the left mouse button down and drags, a bonded carbon atom is drawn between the start point and the final position where the mouse is released. a small independent library called OpenQube [62,63]. More recently a large amount of work has been done by the Quixote project [64], JUMBO-Converters, and the Semantic Physical Science workshop to augment quantum codes to output more of this data directly from the code. Since CML can be extended, it is possible to reuse exist- ing conventions for molecular structure data, and add new conventions for the additional quantum data. A large amount of effort has been expended to create an intuitive tool for drawing small molecules. Common chemical elements can be selected from a drop down list, or a periodic table can be displayed to select less com- mon elements. Clicking on an existing atom changes it to the currently selected element, dragging changes the atom back to its previous element and draws a new atom Building a molecule: atom by atom After opening Avogadro a window such as that shown in Figure 4 is presented. By default, the draw tool is selected. Figure 4 The Avogadro graphical user interface. Taken on Mac OS X, showing the editing interface for a molecule. Figure 4 The Avogadro graphical user interface. Taken on Mac OS X, showing the editing interface for a molecule. Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Page 8 of 17 bonded to the original. If the bonds are left-clicked then the bond order cycles between single, double, and triple. Shortcut keys are also available, e.g., typing the atomic symbol (e.g., “C-o” for cobalt) changes the selected ele- ment, or typing the numbers “1,” “2,” and “3” changes the bond order. adding new groups, or removing groups can be observed interactively. Several dialogs are implemented to provide information on molecule properties and to precisely change parame- ters, such as the cartesian coordinates of the atoms in the molecule. Right clicking on atoms or bonds deletes them. If the “Adjust Hydrogens” box is checked, the number of hydro- gens bonded to each atom is automatically adjusted to satisfy valency. Alternatively, this can also be done at the end of an editing session by using the “Add hydrogens” extension in the build menu. Building a molecule: from fragments In addition to building molecules atom-by-atom, users can insert pre-built fragments of common molecules, ligands, or amino-acid sequences, as shown in Figure 5. In all cases, after inserting the fragment, the atom-centered manipulate tool is selected, allowing the fragment to be moved or rotated into position easily. In addition to the draw tool, there are two tools for adjusting the position of atoms in existing molecules. The “atom centric manipulate” tool can be used to move an atom or a group of selected atoms. The “bond centric manipulate” tool can be used to select a bond, and then adjust all atoms positions relative to the selected bond in various ways (e.g., altering the bond length, bond angles, or dihedral angles). These three tools allow for a great deal of flexibility in building small molecules interactively on screen. Users can also insert a SMILES [65,66] string for a molecule. In this case, a rough 3D geometry is generated using Open Babel and a quick force field optimization. Preparing input for quantum codes l d l Several extensions were developed for Avogadro that assist the user in preparing input files for popular quantum codes such as GAMESS-US, [67] NWChem, [68] Gaussian, [69] Q-Chem, [70] Molpro, [71] and MOPAC200x [72]. The graphical dialogs present the fea- tures required to run basic quantum calculations; some examples are shown in Figure 6. Once the molecular structure is complete, the force field extension can be used to perform a geometry opti- mization. By clicking on “Extensions” and “Optimize Geometry” a fast geometry optimization is performed on the molecule. The force field and calculation parameters can be adjusted, but the defaults are adequate for most molecules. This workflow is typical when building up a small molecular structures for use as input to quantum calculations, or publication quality figures. The preview of the input file at the bottom of each dialog is updated as options are changed. This approach helps new users of quantum codes to learn the syntax of input files for different codes, and to quickly generate use- ful input files as they learn. The input can also be edited by hand in the dialog before the file is saved and sub- mitted to the quantum code. The MOPAC extension can also run the MOPAC200x program directly if it is avail- able on the user’s computer, and then reload the output An alternative is to combine the “Auto Optimization” tool with the drawing tool. This presents a unique way of sculpting the molecule while the geometry is constantly minimized in the background. The geometry optimiza- tion is animated, and the effect of changing bond orders, Figure 5 Dialogs for inserting pre-built fragments. The left shows molecules, and the right amino-acid sequences. Figure 5 Dialogs for inserting pre-built fragments. The left shows molecules, and the right amino-acid sequences. Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Page 9 of 17 Figure 6 Dialog for generating input for quantum codes. Dialogs for generating input for Q-Chem, NWChem, Molpro and MOPAC200x. Note that the dialogs are similar in interface, allowing users to use multiple computational chemistry packages. Figure 6 Dialog for generating input for quantum codes. Dialogs for generating input for Q-Chem, NWChem, Molpro and MOPAC200x. Note that the dialogs are similar in interface, allowing users to use multiple computational chemistry packages. file into Avogadro once the calculation is complete. Preparing input for quantum codes l d l This feature will be extended to other quantum codes in future versions of Avogadro. the coordinate origin if one atom is selected, and along the specified axis if two atoms are selected. The align- ment tool can be combined with the measure, select, and manipulate tools to create inputs for quantum codes where the position and orientation of the molecule is important. One example of this is calculations where an external electric field is applied to the molecule. In these types of calculations, the alignment of the molecule can have a large effect. Figure 8 shows the measurement tool in action with the alignment tool configuration dialog visible in the lower-left corner. The GAMESS-US plugin is one of the most highly developed, featuring a basic dialog present in most of the other input deck generators, as well as an advanced dialog exposing many of the more unusual and complex calcula- tion types. In addition to the advanced dialog, the input deck can be edited inline and features syntax highlight- ing (Figure 7) as used in many popular editors aimed at software developers. This can indicate simple typing errors in keywords, as well as harder to spot whitespace errors that would otherwise cause the hand-edited input deck to fail when being read by GAMESS-US. More complex alignment tools for specific tasks could be created. The alignment tool was created in just a few hours for a specific research project. This is a prime exam- ple where extensibility was very important for performing research using a graphical computational chemistry tool. It would not be worth the investment to create a new application just to align molecular structures to an axis, but creating a plugin for an extensible project is not unreasonable. Visualization The Avogadro application uses OpenGL to render molec- ular representations to the screen interactively. OpenGL offers a high-level, cross-platform API for rendering three-dimensional images using hardware accelerated graphics. OpenGL 1.1 and below is used in most of the rendering code, and so Avogadro can be used even on older computer systems, or those without more modern accelerated graphics. It is capable of taking advantage of some of the newer features available in OpenGL 2.0 as described below, but this has been kept as an optional extra feature when working on novel visualizations of molecular structure. Quantum codes were originally developed for line print- ers, and unfortunately little has changed since then in the standard log files. There are several formats developed for use in other codes and specifically for visualization and analysis, but there is little agreement on any standard file format in the computational quantum chemistry commu- nity. A plugin was developed in Avogadro to visualize the output of various quantum codes, and get the data into the right format for further visualization and analysis. Initially support was added and extended in Open Babel for Gaussian cube files. This format provides atomic coor- dinates and one or more regularly spaced grids of scalar values. This can be read in, and techniques such as the marching cubes algorithm can be used to compute trian- gular meshes of isosurfaces at values of electron density for example. Once the code has been developed to visu- alize these isosurfaces, it became clear that it would be useful to be able to calculate these cubes on the fly, and at different levels of detail depending upon the intended use. Alignment and measurements One of the specialized tools included in the standard Avo- gadro distribution is the alignment tool. This mouse tool facilitates the alignment of a molecular structure with Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Page 10 of 17 Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Figure 7 The GAMESS-US input deck generator. This input generator has an advanced panel and syntax highlighting. Standard representations In chemistry, there are several standard representations of molecular structure, originally based upon those possible with physical models. The Avogadro application imple- ments each of these representations shown in Figure 2 as a plugin. These range from the simple wireframe repre- sentation, stick/licorice, ball and stick, and Van der Waals spheres. The first format, which was somewhat documented at the time it was developed, is the Gaussian formatted checkpoint format. This format is much easier to parse than the log files generated as the program runs, and provides all of the detail needed to calculate scalar val- ues of the molecular orbital or electron density at any point in space. Once a class structure had been developed It is also possible to combine several representations, such as ball and stick with ring rendering (Figure 2 (d)), and a semi-transparent Van der Waals space-filling repre- sentation with a stick representation to elucidate molecu- lar backbone (Figure 2 (f)). Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Page 11 of 17 Figure 8 The measurement tool. The measurement tool being used to measure bond angles and lengths (on Linux with KDE 4). Figure 8 The measurement tool. The measurement tool being used to measure bond angles and lengths (on Linux with KDE 4). independently of all other points, the results of which can be seen in Figure 9. An alternate approach to calculating the molecular orbitals was developed in a second plu- gin that has since been split offinto a separate project named “OpenQube”. The “OpenQube” library has also been added as an optional backend in VTK during the 2011 Google Summer of Code, bringing support for sev- eral output file formats and calculation of cube files that can later be fed into more advanced data pipelines. for Gaussian type orbitals, the approach was extended to read in several other popular output file formats including Q-Chem, GAMESS-US, NWChem, and Mol- pro. MOPAC200x support was added later, along with support for the AUX format and Slater type orbitals used in that code. All of these codes output their final config- urations using the standard linear combination of atomic orbitals, meaning that parallelization is extremely simple. for Gaussian type orbitals, the approach was extended to read in several other popular output file formats including Q-Chem, GAMESS-US, NWChem, and Mol- pro. GLSL, novel visualization GLSL, or OpenGL Shader Language, is a C-like syntax that can be used to develop code that will run on graphics cards and included in the OpenGL 2.0 specification. It has been used to great effect by the games industry, as well as in many areas of data visualization. Several recent papers highlight the potential in chemistry, such as QuteMol [5] in adding support for features such as ambient occlusion to add depth to images. Avogadro has support for vertex and fragment shader programs, and several examples are bundled with the package. If the user’s graphics card is capable, these pro- grams can be loaded at runtime and used to great effect to visualize structure. Some of these include summariza- tion techniques such as isosurface rendering where only the edges orthogonal to the view plane are visible, giv- ing a much better rendering of both the molecular and electronic structure (Figure 10). Ray tracing A d Avogadro uses a painter abstraction that makes it much easier for developers to add new display types. It also abstracts away the renderer, making it possible to add support for alternative backends. Currently only OpenGL and POV-Ray are supported. Due to the abstraction, we are able to use the implicit surfaces available in ray trac- ers to render molecular structure at very high levels of clarity and with none of the triangle artifacts present in standard OpenGL rendered images. Much higher quality transparency and reflection also allow for the images to be used in poster and oral presentations as well as research articles (Figure 11). Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Slater set is populated with the correct ordering and the expected normalization scheme. The s, p, and d-type Gaussian orbitals are supported, with f and g support planned in order to support the increasing number of calculations using these higher-order orbitals. The Basis Set Exchange hosted by EMSL provides access to the basis sets in common use, although at present these basis sets are normally read in directly from the output files. There are several related projects for adding semantic meaning to this type of output, including the JUMBO- Converters project and Quixote. It is hoped that more codes will adopt semantic output in the future, using a common format so that data exchange, validation, and analysis become easier across several codes. This was the subject of a recent meeting with several computa- tional chemistry codes beginning to use FoX in order to output CML. Development has begun on code to read in CML output, either directly from the codes or from conversion of other formats using Open Babel or the JUMBO-Converters. If enough semantic structure can be added to CML, and the converters support a large enough range of the output, this could replace most of the parsing code present in OpenQube. Semantic mean- ing is one of the most difficult to extract from log files, and coming together as a community will help projects like Avogadro to derive more meaning from the outputs of these codes. Standard representations MOPAC200x support was added later, along with support for the AUX format and Slater type orbitals used in that code. All of these codes output their final config- urations using the standard linear combination of atomic orbitals, meaning that parallelization is extremely simple. The plugin was developed to take advantage of the map- reduce approach offered by QtConcurrent in order to use all available processor cores. This offers almost lin- ear scaling as each point in the grid can be calculated The plugin was developed to take advantage of the map- reduce approach offered by QtConcurrent in order to use all available processor cores. This offers almost lin- ear scaling as each point in the grid can be calculated A class hierarchy with a standard API is provided for quantum output. Adding support for new codes involved developing a new parser and ensuring the Gaussian or Figure 9 Molecular orbitals and surfaces. Rendering of a molecular orbital isosurface (left) and an electrostatic surface potential mapped onto the electron density (right). Figure 9 Molecular orbitals and surfaces. Rendering of a molecular orbital isosurface (left) and an electrostatic surface potential mapped onto the electron density (right). Page 12 of 17 Page 12 of 17 Page 12 of 17 Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Avogadro library in use The Avogadro library’s first use was the Avogadro appli- cation, closely followed by the Kalzium periodic table program that is part of the KDE software collection. This initial work was funded in part by the Google Summer of Code program in 2007, and also resulted in the addi- tion of several other features in the Avogadro library to support Kalzium and general visualization and editing of molecular structure (Figure 12). Secondary biological structure Avogadro uses the PDB reader from Open Babel to read in the secondary biological structure. Two plugins exist to process and render this information. The first is a plu- gin which renders a simple tube between the biomolecule backbone atoms. A second more advanced plugin calcu- lates meshes for the alpha helices and beta sheets. While the first plugin is much faster, the advanced plugin more accurately produces output expected in the field. This allows users flexibility for rendering secondary biological structures. This feature is implemented in an extension, with an additional painter class deriving from the base class and a dialog allowing the user to edit the basic rendering controls. The POV-Ray input file can also be retained and edited to produce more complex images, or to allow for much finer control of the rendering process if desired. Figure 10 Molecular orbitals rendering using GLSL shaders. Rendering of a molecular orbital isosurface using two GLSL shaders to highlight the edges of the surfaces. The X-ray effect (left) and red and blue (right) showing the positive and negative molecular orbital shapes. Figure 10 Molecular orbitals rendering using GLSL shaders. Rendering of a molecular orbital isosurface using two GLSL shaders to highlight the edges of the surfaces. The X-ray effect (left) and red and blue (right) showing the positive and negative molecular orbital shapes. Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Page 13 of 17 Figure 11 Ray-traced HOMO isosurfaces of varying cube density. Rendering of a molecular orbital isosurface using POV-Ray with cubes of low (left) and high (right) density. some results from their development of a Molpro interface using the Avogadro library [74]. Conclusions Avogadro has grown over its first six years to become an important tool for building, editing, visualizing, and ana- lyzing chemical and molecular data. With over 270,000 downloads, language translations and localizations, and over 100 citations, it has become an integral part of the chemical software toolbox. Through use of the native CML file format and a wide variety of chemical data import, Avogadro can provide semantic chemical data editing and conversion. We seek to provide an inte- grated environment in the simulation and cheminfor- matics workflow. While more must be done, particularly in regards to documentation, tutorials, ease-of-use, and automation, we aim to improve the quality and feature set with each new release. Development Center (W912HZ-11-P-0019) for financial support. EZ and DL acknowledge the NSF (DMR-1005413) for financial support. Author details 1 1Department of Chemistry, University of Pittsburgh, 219 Parkman Avenue, Pittsburgh, PA, 15260, USA. 2Department of Scientific Computing, Kitware, Inc., 28 Corporate Drive, Clifton Park, NY, 12065, USA. 3Department of Computer Science, Coe College, 1220 First Avenue NE, Cedar Rapids, Iowa 52402, USA. 4Department of Chemistry, State University of New York at Buffalo, Buffalo, New York 14260-3000, USA. 5Avogadro development team. Received: 25 June 2012 Accepted: 31 July 2012 Published: 13 August 2012 Received: 25 June 2012 Accepted: 31 July 2012 Published: 13 August 2012 Currently, two upcoming versions of Avogadro are under development. The first is Avogadro version 1.1, which adds additional features and refinement, par- ticularly including crystallography support developed through the XtalOpt project. The second is a more sub- stantial development for Avogadro version 2.0, where many of the core data structures are being rewritten in order to offer greater flexibility and scalability. Our goal is to support an increasing scope of chemical sys- tems, including biomolecules (DNA, RNA, saccarides, etc.), materials (crystallography, polymers, surfaces), nanoscience (nanoparticles, nanotubes, graphene, etc.) with improved speed, intuitive ease-of-use and simpler non-reciprocal licensing terms. References 1. Sayle R, Milner-White EJ: RasMol: Biomolecular graphics for all. Trends Biochem Sci(TIBS) 1995, 20(9):374. 2. Hanson RM, Howard MT, Willighagen EL, et al.: Jmol: an open-source Java viewer for chemical structures in 3D. 2012. [http://www.jmol.org] 3. DeLano WL: The PyMOL Molecular Graphics System. 2002. [http:// www.pymol.org] 4. Humphrey W, Dalke A, Schulten K: VMD - Visual Molecular Dynamics. J Molec Graphics 1996, 14:33–38. 5. Tarini M, Cignoni P, Montani C: Ambient Occlusion and Edge Cueing for Enhancing Real Time Molecular Visualization. IEEE Trans Visualization and Comput Graphics 2006, 12(5):1237–1244. 6. Mehlhorn K, Lenhof HP, Kholbacher O, Hildebrandt A: BALLView. 2012. [http://www.ballview.org] 7. Momma K, Izuma F: VESTA 3 for three-dimensional visualization of crystal, volumetric and morphology data. J Appl Cryst 2011, 44:1272–1276. 8. Kokalj A: XCrySDen—a new program for displaying crystalline structures and electron densities. J Mol Graphics and Model 1999, 17(3–4):176–179. 9. Kokalj A: Computer graphics and graphical user interfaces as tools in simulations of matter at the atomic scale. Comput Mater Sci 2003, 28(2):155–168. 10. SCIGRESS 2012. [http://www.fujitsu.com/global/services/solutions/tc/ hpc/app/scigress] 11. ChemBio3D 2012. [http://www.cambridgesoft.com/software/ chembio3d] 12. GaussView 5 2012. [http://gaussian.com/g prod/gv5.htm] Authors’ contributions GRH and DEC are the founders of the Avogadro project. MDH is the current lead developer and maintainer of Avogadro. GRH, DL and TV are active developers. DL and EZ are founders of the XtalOpt project which is discussed in this work. TV developed the PackMol plugin. All authors read and approved the final manuscript. Acknowledgements We wish to thank the many contributors to the Avogadro project, including developers, testers, translators, and users. We thank SourceForge for providing resources for issue tracking and managing releases, Launchpad for hosting language translations, and Kitware for additional dashboard resources. MDH and GRH thank the University of Pittsburgh for support. DEC would like to thank Jan Halborg Jensen for designing the GAMESS-US interface and supporting Avogadro in its infancy; believing Avogadro could be better than what was available. MDH acknowledges the Engineering Research Development Center (W912HZ-11-P-0019) for financial support. EZ and DL acknowledge the NSF (DMR-1005413) for financial support. 1. Sayle R, Milner-White EJ: RasMol: Biomolecular graphics for all. Trends Biochem Sci(TIBS) 1995, 20(9):374. 1. Sayle R, Milner-White EJ: RasMol: Biomolecular graphics for all. Trends Biochem Sci(TIBS) 1995, 20(9):374. 2. Hanson RM, Howard MT, Willighagen EL, et al.: Jmol: an open-source Java viewer for chemical structures in 3D. 2012. [http://www.jmol.org] 3. DeLano WL: The PyMOL Molecular Graphics System. 2002. [http:// www.pymol.org] 4. Humphrey W, Dalke A, Schulten K: VMD - Visual Molecular Dynamics. J Molec Graphics 1996, 14:33–38. 4. Humphrey W, Dalke A, Schulten K: VMD - Visual Molecular Dynamics. J Molec Graphics 1996, 14:33–38. 6. Mehlhorn K, Lenhof HP, Kholbacher O, Hildebrandt A: BALLView. 2012. [http://www.ballview.org] 7. Momma K, Izuma F: VESTA 3 for three-dimensional visualization of crystal, volumetric and morphology data. J Appl Cryst 2011, 44:1272–1276. 8. Kokalj A: XCrySDen—a new program for displaying crystalline structures and electron densities. J Mol Graphics and Model 1999, 17(3–4):176–179. Avogadro is freely available from http://avogadro. openmolecules.net/, and new contributors are welcome in all areas (users, developers, testers, translators, educators, students, researchers, dreamers). 9. Kokalj A: Computer graphics and graphical user interfaces as tools in simulations of matter at the atomic scale. Comput Mater Sci 2003, 28(2):155–168. 9. Kokalj A: Computer graphics and graphical user interfaces as tools in simulations of matter at the atomic scale. Comput Mater Sci 2003, 28(2):155–168. 10. SCIGRESS 2012. [http://www.fujitsu.com/global/services/solutions/tc/ hpc/app/scigress] Packmol Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Competing interests The authors declare that they have no competing interests. Competing interests The authors declare that they have no competing interests. Competing interests The authors declare that they have no competing interests. Packmol Packmol is a third-party package designed to create ini- tial “packed” configurations of molecules for molecular dynamics or other simulations [75,76]. Examples include surrounding a protein with solvent, solvent mixtures, lipid bilayers, spherical micelles, placing counterions, adding ligands to nanoparticles, etc. Typically, users may have equilibrated “solvent boxes” which have been run for long simulations to ensure proper density, and both short and long-range interactions between solvent molecules. Using such solvent boxes allows placing solute molecules, such g The Q-Chem package [70] has developed “QUI - The Q-Chem User Interface” [73] around Avogadro, originally as an Avogadro extension. This is a more advanced ver- sion of the input generator developed in Avogadro, with much tighter integration. Molpro [71] has also published Figure 12 The Kalzium application in KDE using Avogadro to render molecular structures. Figure 12 The Kalzium application in KDE using Avogadro to render molecular structures. Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Page 14 of 17 Figure 13 The PackMol lipid layer as produced by the PackMol extension. Figure 13 The PackMol lipid layer as produced by the PackMol extension. including estimating the number of molecules in a given volume. as proteins, in an approximately correct initial structure, such as that shown in Figure 13. The solute is added into the box, and solvent molecules with overlapping atoms are removed. While these utilities are often enough, creating complex input files is not always easy. For more compli- cated systems, Packmol can create an initial configuration based on defined densities, geometries (e.g., sphere, box, etc.), and the molecules to be placed. An Avogadro devel- oper wrote an external plugin to facilitate use of Packmol, The plugin is not currently distributed with Avogadro as a standard feature, although it is planned for some future version. It serves as an example of how Avogadro can facil- itate a workflow with a text-oriented package (Packmol), including saving files in the PDB format required by Pack- mol, generating an input file, and reading the output for visualization, analysis, and further simulations. Figure 14 The XtalOpt extension. XtalOpt extension showing a plot of stability vs. search progress for a TiO2 supercell. igure 14 The XtalOpt extension. XtalOpt extension showing a plot of stability vs. search progress for a TiO2 supercell. Page 15 of 17 Hanwell et al. XtalOpt p The XtalOpt [77,78] software package is implemented as a third-party C++ extension to Avogadro and makes heavy use of the libavogadro API. The extension implements an evolutionary algorithm tailored for crystal structure prediction. The XtalOpt development team chose Avo- gadro as a platform because of its open-source license, well-designed API, powerful visualization tools, and intu- itive user-interface. XtalOpt exists as a dialog window (Figure 14) and uses the main Avogadro window for visu- alizing candidate structures as they evolve. The API is well suited for XtalOpt’s needs, providing a simple mechanism to allow the user to view, edit, and export the struc- tures generated during the search. Taking advantage of the cross-platform capabilities of Avogadro and its dependen- cies, XtalOpt is available for Linux, Windows, and Mac. Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 com/scholar?&amp;q=22http://avogadro.openmolecules.net/22] Mera-Adasme R, Mendiz´abal F, Olea-Azar C, Miranda-Rojas S, Fuentealba 28. Mera-Adasme R, Mendiz´abal F, Olea-Azar C, Miranda-Rojas S, Fuentealba P: A Computationally Efficient and Reliable Bond Order Measure. J Phys Chem A 2011, 115(17):4397–4405. 48. Guha R, Howard MT, Hutchison GR, Murray-Rust P, Rzepa H, Steinbeck C, Wegner J, Willighagen EL: The Blue Obelisk - Interoperability in Chemical Informatics. J Chem Inf and Model 2006, 46(3):991–998. P: A Computationally Efficient and Reliable Bond Order Measure. J Phys Chem A 2011, 115(17):4397–4405. 29. Closser KD, Head-Gordon M: Ab Initio Calculations on the Electronically Excited States of Small Helium Clusters. J Phys Chem A 2010, 114(31):8023–8032. 49. O’Boyle N, Guha R, Willighagen E, Adams S, Alvarsson J, Bradley JC, Filippov I, Hanson R, Hanwell M, Hutchison G, James C, Jeliazkova N, Lang A, Langner K, Lonie D, Lowe D, Pansanel J, Pavlov D, Spjuth O, Steinbeck C, Tenderholt A, Theisen K, Murray-Rust P: Open Data, Open Source and Open Standards in chemistry: the Blue Obelisk five years on. J Cheminformatics 2011, 3:37. 30. Ide T, Takeuchi D, Osakada K, Sato T, Higuchi M: Aromatic Macrocycle Containing Amine and Imine Groups: Intramolecular Charge-Transfer and Multiple Redox Behavior. J Org Chem 2011, 76(22):9504–9506. 50. Qt Framework 2012. [http://qt-project.org/] 31. Menegazzo N, Zou Q, Booksh KS: Characterization of electrografted 4-aminophenylalanine layers for low non-specific binding of proteins. New J Chem 2012, 36(4):963–970. 51. O’Boyle NM, Banck M, James CA, Morley C, Vandermeersch T, Hutchison GR: Open Babel: an open chemical toolbox. J Cheminf 2011, 3:33. 52. Guennebaud G, Jacob B, et al.: Eigen v2. 2010. [http://eigen.tuxfamily.org] 32. Patel DGD, Ohnishi Yy, Yang Y, Eom SH, Farley RT, Graham KR, Xue J, Hirata S, Schanze KS, Reynolds JR: Conjugated polymers for pure UV light emission: Poly(meta-phenylenes). J Polym Sci Part B-Polym Phys 2011, 49(8):557–565. 53. GNU General Public License v2.0 2012. [http://www.gnu.org/licenses/ gpl-2.0.html] 54. Sitzmann M, Filippov IV, Nicklaus MC: Internet resources integrating many small-molecule databases. SAR QSAR Environ Res 2008, 19(1–2):1–9. 33. Popov AV, Gould EA, Salvitti MA, Hernandez R, Solntsev KM: Diffusional effects on the reversible excited-state proton transfer. From experiments to Brownian dynamics simulations. Phys Chem Chem Phys 2011, 13(33):14914. 55. Python Extensions - Avogadro wiki 2012. [http://avogadro. openmolecules.net/wiki/Python Extensions] 56. Vandermeersch T: Python Example. 2009. [http://timvdm.blogspot. com/2009/05/using-avogadro-library-from-python.html] 34. Hu W, Webb LJ: Direct Measurement of the Membrane Dipole Field in Bicelles Using Vibrational Stark Effect Spectroscopy. J PhysChem Lett 2011, 2(15):1925–1930. Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 13. HyperChem 2012. [http://www.hyper.com/] 40. Kapla J, Stevensson B, Dahlberg M, Maliniak A: Molecular Dynamics Simulations of Membranes Composed of Glycolipids and Phospholipids. J Phys Chem B 2012, 116:244–252. 14. CrystalMaker 2012. [http://www.crystalmaker.com] 15. Materials Studio 2001–2007. [http://accelrys.com/products/materials- studio] 41. Mandal D, Mondal B, Das AK: Nucleophilic Degradation of Fenitrothion Insecticide and Performance of Nucleophiles: a Computational Study. J Phys Chem A 2012, 116(10):2536–2546. 16. Spartan 2012. [http://www.wavefun.com] 17. Hassinen T, et al.: Ghemical. 2012. [http://www.uku.fi/thassine/projects/ ghemical] 42. Bernstein N, Kulp III JL, Cato Jr MA, Clark TD: Simulations of Nanocylinders Self-Assembled from Cyclic β-Tripeptides. J Phys Chem A 2010, 114(44):11948–11952. 18. Schaftenaar G, Noordik JH: Molden: a pre- and post-pro 18. Schaftenaar G, Noordik JH: Molden: a pre- and post-processing program for molecular and electronic structures. J Comput-Aided Mol Des 2000, 14:123–134. 43. Hlawacek G, Khokhar FS, van Gastel R, Poelsema B, Teichert C: Smooth Growth of Organic Semiconductor Films on Graphene for High-Efficiency Electronics. Nano Lett 2011, 11(2):333–337. 19. Murray-Rust P, Townsend J, Adams S, Phadungsukanan W, Thomas J: The semantics of Chemical Markup Language (CML): dictionaries and conventions. J Cheminformatics 2011, 3:43. 44. F¨orster S, Hahn T, Loose C, R¨oder C, Liebing S, Seichter W, Eißmann F, Kortus J, Weber E: Synthesis and characterization of new derivatives of azulene, including experimental and theoretical studies of electronic and spectroscopic behavior. J Phys Org Chem 2012: . [http:// onlinelibrary.wiley.com/doi/10.1002/poc.2934/abstract? deniedAccessCustomisedMessage=&amp;userIsAuthenticated=false] 20. Murray-Rust P, Rzepa H: CML: Evolution and Design. J Cheminformatics 2011, 3:44. 21. Thomas J, Sherwood P: The CCP1 GUI Project. 2009. [http://www.cse. scitech.ac.uk/ccg/software/ccp1gui] 2. Allouche AR: Gabedit. 2012. [http://gabedit.sourceforge.net] 45. Burkhardt SE, Rodr´ıguez-Calero GG, Lowe MA, Kiya Y, Hennig RG, Abru˜na HD: Theoretical and Electrochemical Analysis of Poly(3,4- alkylenedioxythiophenes): Electron-Donating Effects and Onset of p-Doped Conductivity. J Phys Chem C 2010, 114(39):16776–16784. 23. Bode BM, Gordon MS: Macmolplt: a graphical user interface for GAMESS. J Mol Graphics Model 1998, 16(3):133–138. 24. Avogadro Downloads 2012. [http://sourceforge.net/projects/avogadro/ files/stats/timeline?dates=2006-04-14+to+2012-03-29] 46. Burkhardt SE, Conte S, Rodr´ıguez-Calero GG, Lowe MA, Qian H, Zhou W, Gao J, Hennig RG, Abru˜na HD: Towards organic energy storage: characterization of 2,5-bis(methylthio)thieno[3,2-b]thiophene. J Mater Chem 2011, 21(26):9553. 25. Avogadro Translations 2012. [https://translations.launchpad.net/ avogadro/trunk/+translations] 26. Avogadro Contributors 2012. [http://www.ohloh.net/p/avogadro/ contributors] 47. Madison TA, Hutchison GR: Effects of Charge Localization on the Orbital Energies of Bithiophene Clusters. J Phys Chem C 2011, 115(35):17558–17563. 27. Avogadro Citations from Google Scholar 2012. [http://scholar.google. Availability and requirements g 11. ChemBio3D 2012. [http://www.cambridgesoft.com/software/ chembio3d] Project Name: Avogadro Project Name: Avogadro Project home page: http://avogadro.openmolecules.net/ ct home page: http://avogadro.openmolecules.net/ 12. GaussView 5 2012. [http://gaussian.com/g prod/gv5.htm] Page 16 of 17 Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 57. Python Scripting in Avogadro 2012. [http://avogadro.openmolecules. net/wiki/Category:Scripting] 35. Bing¨ol B, Durrell AC, Keller GE, Palmer JH, Grubbs RH, Gray HB: Electron Transfer Triggered by Optical Excitation of Phenothiazine-tris(meta- phenylene-ethynylene)-(tricarbonyl)(bpy)(py)rhenium(I). J Phys Chem B 2012:120503135353007 . g y g 58. PyQt Scripting Example 2012. [https://gist.github.com/3194164] 59. Vandermeersch T: Avogadro Python Terminal Tutorial 2012. [http:// avogadro.openmolecules.net/wiki/Tutorials:Console] Chem B 2012:120503135353007 . 36. Yao CJ, Sui LZ, Xie HY, Xiao WJ, Zhong YW, Yao J: Electronic Coupling between Two Cyclometalated Ruthenium Centers Bridged by 1,3,6,8-Tetra(2-pyridyl)pyrene (tppyr). Inorg Chem 2010, 49(18):8347–8350. 37. Fleisher A, Morgan P, Pratt D: High-Resolution Electronic Spectroscopy Studies of meta-Aminobenzoic Acid in the Gas Phase Reveal the Origins of its Solvatochromic Behavior. Chem Phys Chem 2011, 12(10):1808–1815. 38. Mayorkas N, Malka I, Bar I: Ionization-loss stimulated Raman spectroscopy for conformational probing of flexible molecules. Phys Chem Chem Phys 2011, 13(15):6808–6815. 39. Tian H, Bora I, Jiang X, Gabrielsson E, Karlsson KM, Hagfeldt A, Sun L: Modifying organic phenoxazine dyes for efficient dye-sensitized solar cells. J Mater Chem 2011, 21(33):12462. 60. Compiling Avogadro on Windows 2012. [http://avogadro. openmolecules.net/wiki/Compiling on Windows] 36. Yao CJ, Sui LZ, Xie HY, Xiao WJ, Zhong YW, Yao J: Electronic Coupling between Two Cyclometalated Ruthenium Centers Bridged by 1,3,6,8-Tetra(2-pyridyl)pyrene (tppyr). Inorg Chem 2010, 49(18):8347–8350. 61. Compiling Avogadro on Linux 2012. [ http://avogadro.openmolecules. net/wiki/Compiling on Linux and Mac OS X] 61. Compiling Avogadro on Linux 2012. [ http://avogadro.openmolecules. net/wiki/Compiling on Linux and Mac OS X] 62. Hanwell MD: OpenQube. 2012. [http://www.openchemistry.org] 62. Hanwell MD: OpenQube. 2012. [http://www.openchemistry.org] 37. Fleisher A, Morgan P, Pratt D: High-Resolution Electronic Spectroscopy Studies of meta-Aminobenzoic Acid in the Gas Phase Reveal the Origins of its Solvatochromic Behavior. Chem Phys Chem 2011, 12(10):1808–1815. 63. OpenQube Source 2012. [http://github.com/OpenChemistry/ openqube] 64. Adams S, de Castro, P, Echenique P, Estrada J, Hanwell MD, Murray-Rust P, Sherwood P, Thomas J, Townsend JA: The Quixote project: Collaborative and Open Quantum Chemistry data management in the Internet age. J Cheminformatics 2011, 3:38. 38. Mayorkas N, Malka I, Bar I: Ionization-loss stimulated Raman spectroscopy for conformational probing of flexible molecules. Phys Chem Chem Phys 2011, 13(15):6808–6815. 65. Weininger D: SMILES, a chemical language and information system. 1 Introduction to methodology and encoding rules. J Chem Inf Comp Sci 1988, 28:31–36. 39. Tian H, Bora I, Jiang X, Gabrielsson E, Karlsson KM, Hagfeldt A, Sun L: Modifying organic phenoxazine dyes for efficient dye-sensitized solar cells. J Mater Chem 2011, 21(33):12462. 39. Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 66. James CA, Willighagen EL, Dalke A, Landrum G, Apodaca R, Morley C: OpenSMILES. 2012. [http://opensmiles.org] 67. Schmidt M, Baldridge K, Boatz J, Elbert S, Gordon M, Jensen J, Koseki S, Matsunaga N, Nguyen K, Su S, Windus T, Dupuis M, Montgomery J: General Atomic and Molecular Electronic-Structure System. J Comput Chem 1993, 14(11):1347–1363. 68. Valiev M, Bylaska EJ, Govind N, Kowalski K, Straatsma TP, Van Dam HJJ, Wang D, Nieplocha J, Apra E, Windus TL, de Jong W: NWChem: a comprehensive and scalable open-source solution for large scale molecular simulations. Comput Phys Commun 2010, 181(9):1477–1489 69. Frisch MJ, Trucks GW, Schlegel HB, Scuseria GE, Robb MA, Cheeseman JR, Scalmani G, Barone V, Mennucci B, Petersson GA, Nakatsuji H, Caricato M, Li X, Hratchian HP, Izmaylov AF, Bloino J, Zheng G, Sonnenberg JL, Hada M, Ehara M, Toyota K, Fukuda R, Hasegawa J, Ishida M, Nakajima T, Honda Y, Kitao O, Nakai H, Vreven T, Montgomery JJA, et al.: Gaussian 09 Revision A.1. Wallingford CT: Gaussian Inc.; 2009. g 70. Shao Y, Molnar LF, Jung Y, Kussmann Jr, Ochsenfeld C, Brown ST, Gilbert ATB, Slipchenko LV, Levchenko SV, O Neill DP, DiStasio Jr RA, Lochan RC, Wang T, Beran GJO, Besley NA, Herbert JM, Yeh Lin C, Van Voorhis T, Hung Chien S, Sodt A, Steele RP, Rassolov VA, Maslen PE, Korambath PP, Adamson RD, Austin B, Baker J, Byrd EFC, Dachsel H, Doerksen R J, et al.: Advances in methods and algorithms in a modern quantum chemistry program package. Phys Chem Chem Phys 2006, Hanwell et al. Journal of Cheminformatics 2012, 4:17 http://www.jcheminf.com/content/4/1/17 Tian H, Bora I, Jiang X, Gabrielsson E, Karlsson KM, Hagfeldt A, Sun L: Modifying organic phenoxazine dyes for efficient dye-sensitized solar cells. J Mater Chem 2011, 21(33):12462. Page 17 of 17 y p g 8(27):3172–3191. 71. Werner HJ, Knowles PJ, Knizia G, Manby FR, Sch¨utz M, Celani P, Korona T, Lindh R, Mitrushenkov A, Rauhut G, Shamasundar KR, Adler TB, Amos RD, Bernhardsson A, Berning A, Cooper DL, Deegan MJO, Dobbyn AJ, Eckert F, Goll E, Hampel C, Hesselmann A, Hetzer G, Hrenar T, Jansen G, K¨oppl C, Liu Y, Lloyd AW, Mata RA, May AJ, et al.: MOLPRO, version 2010.1, a package of ab initio programs. Cardiff, UK ; 2010. See http://www.molpro.net 71. Werner HJ, Knowles PJ, Knizia G, Manby FR, Sch¨utz M, Celani P, Korona T, Lindh R, Mitrushenkov A, Rauhut G, Shamasundar KR, Adler TB, Amos RD, Bernhardsson A, Berning A, Cooper DL, Deegan MJO, Dobbyn AJ, Eckert F, Goll E, Hampel C, Hesselmann A, Hetzer G, Hrenar T, Jansen G, K¨oppl C, Liu Y, Lloyd AW, Mata RA, May AJ, et al.: MOLPRO, version 2010.1, a package of ab initio programs. Cardiff, UK ; 2010. See http://www.molpro.net 72. Stewart JJP: MOPAC2009. Internet. USA: Colorado Springs CO; 2008. [http://openmopac.net] 73. Gilbert ATB: QUI - The Q-Chem User Interface 2008. [http://rsc.anu.edu. au/agilbert/gilbertspace/qui.php] 74. Werner HJ, Knowles PJ, Knizia G, Manby FR, Sch¨utz M: Molpro: a general-purpose quantum chemistry program package. Wiley Interdisciplinary Rev: Comput Mol Sci 2012, 2(2):242–253. [http://dx.doi.org/ 10.1002/wcms.82] 74. Werner HJ, Knowles PJ, Knizia G, Manby FR, Sch¨utz M: Molpro: a general-purpose quantum chemistry program package. Wiley Interdisciplinary Rev: Comput Mol Sci 2012, 2(2):242–253. [http://dx.doi.org/ 10.1002/wcms.82] 75. Mart´ınez L, Andrade R, Birgin EG, Mart´ınez JM: Packmol: a package for building initial configurations for molecular dynamics simulations. J Comp Chem 2009, 30(13):2157–2164. 75. Mart´ınez L, Andrade R, Birgin EG, Mart´ınez JM: Packmol: a package for building initial configurations for molecular dynamics simulations. J Comp Chem 2009, 30(13):2157–2164. 76. Mart´ınez JM, Mart´ınez L: Packing optimization for automated generation of complex system’s initial configurations for molecular dynamics and docking. J Comp Chem 2003, 24(7):819–825. 77. Lonie D, Zurek E: XtalOpt. 20 77. Lonie D, Zurek E: XtalOpt. 2011. [http://xtalopt.openmolecules.net] 78. Lonie D, Zurek E: XtalOpt: an Open-Source Evolutionary Algorithm for Crystal Structure Prediction. Comput Phys Commun 2011, 182:372–387. 78. Lonie D, Zurek E: XtalOpt: an Open-Source Evolutionary Algorithm for Crystal Structure Prediction. Comput Phys Commun 2011, 182:372–387. doi:10.1186/1758-2946-4-17 Cite this article as: Hanwell et al.: Avogadro: an advanced semantic chem- ical editor, visualization, and analysis platform. Journal of Cheminformatics 2012 4:17. y p g 8(27):3172–3191. Open access provides opportunities to our colleagues in other parts of the globe, by allowing anyone to view the content free of charge. Publish with ChemistryCentral and every scientist can read your work free of charge W. Jeffery Hurst, The Hershey Company. available free of charge to the entire scientific community peer reviewed and published immediately upon acceptance cited in PubMed and archived on PubMed Central yours you keep the copyright Submit your manuscript here: http://www.chemistrycentral.com/manuscript/ Open access provides opportunities to our colleagues in other parts of the globe, by allowing anyone to view the content free of charge. Publish with ChemistryCentral and every scientist can read your work free of charge W. Jeffery Hurst, The Hershey Company. available free of charge to the entire scientific community peer reviewed and published immediately upon acceptance cited in PubMed and archived on PubMed Central yours you keep the copyright Submit your manuscript here: http://www.chemistrycentral.com/manuscript/ Open access provides opportunities to our colleagues in other parts of the globe, by allowing anyone to view the content free of charge. Publish with ChemistryCentral and every scientist can read your work free of charge W. Jeffery Hurst, The Hershey Company. available free of charge to the entire scientific community peer reviewed and published immediately upon acceptance cited in PubMed and archived on PubMed Central yours you keep the copyright Submit your manuscript here: http://www.chemistrycentral.com/manuscript/ ed Central
https://openalex.org/W4388185370
https://periodicos.uff.br/trabalhonecessario/article/download/53523/32470
Portuguese
null
EDUCAÇÃO PARA O SÉCULO XXI E O CENTRO DE INOVAÇÃO PARA A EDUCAÇÃO BRASILEIRA (CIEB): UMA CONEXÃO ESTRATÉGICA
Trabalho necessário
2,022
cc-by
6,469
Resumo O presente trabalho problematiza o slogan da inovação na educação. A partir de um levantamento bibliográfico, identificamos que a questão remonta ao contexto de agravamento da crise do capital nas décadas de 1960 e 1970, caracterizando uma retomada da teoria do capital humano. O levantamento documental preliminar, no sítio do Ministério da Educação (MEC) e do Centro de Inovação para a Educação Brasileira (CIEB), indica que este tem despontado enquanto agente e referência para o projeto de educação da classe dominante para os trabalhadores do século XXI. p j ç p Palavras-chave: Centro de Inovação para a Educação Brasileira. Políticas públicas. Inova educação. V 20 nº 42 2022 (maio-agosto) ISSN: 1808-799 X ISSN: 1808-799 X Resumen El presente trabajo problematiza la consigna de innovación en educación. Con base en un levantamiento bibliográfico, identificamos que la cuestión se remonta al contexto de agravamiento de la crisis del capital en las décadas de 1960 y 1970, caracterizando una reanudación de la teoría del capital humano. El relevamiento documental preliminar en el sitio web del Ministerio de Educación (MEC) y del Centro de Innovación para la Educación Brasileña (CIEB) indica que ha emergido como agente y referencia para el proyecto de educación de la clase dominante para los trabajadores en el siglo XXI. Palabras clave: Centro de Innovación para la Educación Brasileña. Políticas públicas. Innovación en la educación. EDUCATION FOR THE 21ST CENTURY AND THE INNOVATION CENTER FOR BRAZILIAN EDUCATION (CIEB): A STRATEGIC CONNECTION EDUCATION FOR THE 21ST CENTURY AND THE INNOVATION CENTER FOR BRAZILIAN EDUCATION (CIEB): A STRATEGIC CONNECTION EDUCAÇÃO PARA O SÉCULO XXI E O CENTRO DE INOVAÇÃO PARA A EDUCAÇÃO BRASILEIRA (CIEB): UMA CONEXÃO ESTRATÉGICA1 Patrícia Ferreira Duarte2 Abstract This article analyses the slogan of innovation in education. Based on a bibliographic survey, we identified that the issue goes back to the context of aggravation of the capital crisis in the 1960s and 1970s, characterizing a resumption of the theory of human capital. The preliminary documentary survey on the website of the Ministry of Education (MEC) and the Center for Innovation for Brazilian Education (CIEB) indicates that it has emerged as an agent and reference for the education project of the ruling class for workers in the 21st century. y Keywords: Innovation Center for Brazilian Education. Public Policy. innovation in education. 1Artigo recebido em 19/04/2022. Primeira avaliação em 09/05/2022. Segunda avaliação em 16/05/2022. Aprovado em 07/07/2022. Publicado em 21/07/2022. DOI: https://doi.org/10.22409/tn.v20i42.53523. 2 Doutoranda do Programa de Pós-Graduação em Educação e Demandas Populares (PPGEDUC) da Universidade Federal Rural do Rio de Janeiro (UFRRJ). Professora EBTT dos anos iniciais do ensino fundamental do Colégio de Aplicação João XXIII (UFJF). E-mail: pduarteufjf@gmail.com. Lattes: http://lattes.cnpq.br/4833052154661970. ORCID: http://orcid.org/0000-0002-3468-4549. 1 Introdução As últimas décadas do século XX foram marcadas por mudanças no conteúdo e na forma de organização do trabalho. Segundo Neves e Sant’Anna (2005), essas transformações decorrem da conformação de um novo bloco histórico, preconizada no início do referido século com a passagem do capitalismo concorrencial para o monopolista. Com base nos escritos do pensador sardo Antônio Gramsci, os autores indicam como características do bloco histórico: a reprodução ampliada do capital e a expropriação crescente do trabalho e da mais-valia no plano econômico. No plano político, se estrutura uma ampliação do Estado, que além de exercer as tarefas de comando, governo e domínio, assume a função de dirigir culturalmente a classe dominada, com vias de legitimar o capitalismo como única via histórica possível. Mészaros (2009), analisando as décadas de 1960 e 1970, aponta para a identificação de uma crise estrutural do capital. Esta se diferenciaria das demais, cíclicas, devido seu caráter universal e seu alcance global e consubstancia um aprofundamento de uma perspectiva de produção descolada das reais necessidades humanas, intensificação da destruição da natureza e da precarização do trabalho. O contexto de crise demandou a articulação de novas estratégias de organização da produção, da sociedade política e sociedade civil (GRAMSCI, 2000). Exigiu o realinhamento do modo de ser, pensar e agir na direção do padrão de acumulação flexível (NEVES; SANT’ANNA, 2005). Observando o movimento dos países capitalistas centrais nesse período, Fernandes (2019) retoma o contexto de criação da Organização para a Cooperação e Desenvolvimento Econômico (OCDE) e o fortalecimento das cooperações econômicas, com desígnios políticos em diversas áreas dos governos envolvidos, incluindo a educação. Assim, a tríade produção-capital-trabalho incorporou um elemento suplementar: o capital humano. Noções como “competências” e “habilidades” foram apresentadas como sinônimo de desenvolvimento econômico. No bojo desse processo, é criado, em 1968, o Centro de Pesquisa Inovação Educacional (CERI) da OCDE, financiado pela Fundação Ford, cuja atividade se estende até os dias atuais (FERNANDES, 2019). É interessante observar que o apelo à inovação na educação consubstancia com o período de mundialização da produção, descrito por Neves e Sant’Anna (2005), 2 2 da difusão do paradigma da acumulação flexível, da veloz introdução e difusão da microeletrônica e da informática na organização e no conjunto das relações sociais de produção. 3 3 O conceito nova pedagogia da hegemonia fora cunhado pelo Coletivo de Estudos de Política Educacional da Universidade Federal Fluminense e da Fundação Oswaldo Cruz. Para maior aprofundamento ver Neves e Sant´Anna, 2005. Introdução A política de criação do CERI pela OCDE, já em 1968, indica não ser recente a premissa da inovação em educação como amálgama da formação do novo homem coletivo, do novo modelo de cidadania a ser produzido pela nova pedagogia da hegemonia3. No Brasil, a articulação dos pressupostos da inovação para a educação ganha relevo no processo de elaboração e promulgação do Plano Nacional de Educação (PNE 2014-2024) que é citada em 5 das 20 metas do documento. Em 2015, há a criação da “Iniciativa pela Inovação e Criatividade na Educação Básica” e em 2017 a discussão ganha mais substância com a publicação da Base Nacional Comum Curricular (BNCC), trazendo a inovação entrelaçada ao domínio das Tecnologias de Informação e Comunicação, competência geral 5. Nesse panorama, ocorre a fundação do Centro de Inovação para a Educação Brasileira, o CIEB: um pool de empresas que se apresentam como uma organização sem fins lucrativos com objetivo de impulsionar uma transformação sistêmica na educação brasileira (BRITO e MARINS, 2020). Desde sua criação, tem desenvolvido parcerias técnicas com o Ministério da Educação (MEC), atuando ativamente no desenvolvimento de estudos e plataformas, e apoiando a criação e a execução de “programas de inovação” nas redes de ensino básico para “[...] impulsionar a qualidade, a equidade e a contemporaneidade da educação pública brasileira” (CIEB, 2015, p. 3). O presente artigo é um desdobramento dos primeiros passos na análise das inciativas e pressupostos do Centro de Inovação da Educação Brasileira, pesquisa desenvolvida no curso de doutorado, no âmbito do Programa de Pós-Graduação em Educação e Demandas Populares (PPGEDUC/UFRRJ). O texto tem por objetivo analisar o slogan da inovação na educação e a incidência do mesmo no Brasil, sob a lente do materialismo histórico-dialético. Para tanto, foram elencados objetivos específicos correspondentes a cada uma das seções deste trabalho: mapear o processo de inserção de políticas, na agenda dos governos brasileiros, onde a inovação aparecera como prerrogativa; compilar as iniciativas mais destacadas pelo 3 CIEB, voltadas ao sistema público de educação; e apresentar algumas considerações preliminares sobre a incidência política do CIEB junto ao MEC e às escolas. A partir de um levantamento bibliográfico acerca do tema da inovação e educação, identificamos que a questão remonta ao contexto de agravamento da crise do capital nas décadas de 1960 e 1970, e à retomada da teoria do capital humano, um dos pilares das estratégias capitalistas de dominação (LIMA; MARTINS, 2005). Introdução Na mesma esteira, o levantamento documental preliminar no sítio do Ministério da Educação (MEC) e do Centro de Inovação para a Educação Brasileira (CIEB) indica que este tem despontado enquanto uma das principais agências de referência para a implementação de uma “cultura da inovação” na educação pública, obtendo êxito na promoção do projeto de educação da classe dominante para os trabalhadores do século XXI. A agenda educacional dos governos brasileiros no contexto de contrarreformas Tavares (2019) localiza o aumento de publicações relacionando educação e inovação nas décadas de 1960 e 1970. Nesta última, são publicados inúmeros trabalhos sobre o fenômeno pela Organização das Nações Unidas para a Educação, Ciência e Cultura (UNESCO), com destaque para as obras de Huberman (1973) “Comment s’opbrent les changements en éducation: contribution à l’étude de l’innovation” e Huberman e Havelock (1977) “Solving educational problem: the theory and reality of innovation in developing countries”. As obras apresentam uma preocupação no desenvolvimento de princípios e modelos experimentais. Entretanto, é na década de 1990 que a OCDE estipularia a inovação como um dos eixos estruturantes para a implementação de políticas em diferentes países. Como país que se desenvolveu de forma dependente da economia dos países capitalistas centrais, o Brasil incorporou as orientações de diversos organismos internacionais. Na educação, a “Conferência Mundial de Educação para Todos” foi um dos grandes marcos deste processo. Cento e cinquenta e cinco governos se fizeram presentes e comprometeram-se com a premissa de uma educação básica de qualidade para jovens crianças e adultos (SHIROMA et al., 2007). Os “E9” foram o foco por apresentarem, à época, as maiores taxas de analfabetismo no mundo: Bangladesh, Brasil, Nigéria, Paquistão, Índia, México, China, Egito, Indonésia. Na mesma esteira, se estruturaram os lemas da Comissão 4 Econômica para a América Latina e Caribe (CEPAL) para a educação em 1990. Na concepção cepalina, os resultados para o desempenho no mercado de trabalho e na cidadania tendiam a convergir. A nova educação deveria ensinar para a moderna cidadania e para a competitividade, permitindo a apropriação dos códigos comuns para a modernidade, necessários para a vida pública. Vale também o destaque ao relatório Jacques Delors, onde foi manifesta a necessidade de “conciliar a competição à cooperação e solidariedade” e ajustá-los “às demandas do conhecimento científico e tecnológico” (SHIROMA et al., 2007, p. 55). O slogan da “Educação para Todos” selou a subsunção das finalidades da educação às prerrogativas do capital. Essa tônica fora incorporada no Brasil, ainda que de forma incipiente, pelo governo de José Sarney em 1985 com a publicação do plano “Educação para Todos – Compromisso com a Mudança”. A agenda educacional dos governos brasileiros no contexto de contrarreformas Partindo dos altos índices de analfabetismo no país, evasão e defasagem entre idade escolar e número de matrículas, o plano indicava como objetivo a universalização da educação básica e convocava a mobilização da sociedade em prol da qualidade de ensino (BRASIL, 1985 apud CÊA et al., 2019). O governo Collor de Melo, apesar de ter se tornado signatário da Declaração Mundial sobre Educação para Todos, resultante da reunião de Jontien, não foi capaz de materializá-lo, tendo em vista a não deflagração de seu Plano Decenal. Seria em 1993, no governo de Itamar Franco, que ocorreria a elaboração e a aprovação do Plano Decenal de Educação para Todos (1993-2003), com a chancela de organismos internacionais como a UNICEF e BM. Em meio a presença dos representantes dos nove países mais populosos do chamado Terceiro Mundo (E9) o governo brasileiro incorpora a perspectiva de garantir as necessidades básicas de aprendizagens para todos (CÊA et al., 2019). A vitória de Fernando Henrique Cardoso (1995-2002) garantiu a hegemonia dos setores privatistas e conservadores. Salermo e Kubata (2008) identificam que, desde os anos 2000, iniciativas sistemáticas de apoio à inovação foram implementadas, estando estas em sintonia com as Diretrizes de Política Industrial, Tecnológica e de Comercio Exterior. No plano educacional, várias regulamentações foram aprovadas na direção da reformulação do currículo em diferentes níveis de ensino, bem como da regulamentação do magistério (SHIROMA et al., 2007). 5 5 Ainda que neste período o termo inovação não apareça explicitamente ligado à educação, o alinhamento das práticas educacionais às empresariais foram apresentados como um movimento necessário de modernização, tanto nas políticas educacionais quanto nas práticas pedagógicas. O discurso presente nos documentos do CIEB, mais de uma década depois, também parte do apelo à mudança, pautado na ideia de inovação, com vistas a atingir a “qualidade total” em educação. No entanto, será preciso avaliar no decorrer da pesquisa o que é uma retomada dessa forma de mobilização discursiva, e quais elementos são especificidades geradas pela tríade inovação-tecnologia-educação. Foram implementados fundos e programas que concorriam para uma nova lógica no financiamento da educação e a organização de uma estrutura de monitoramento e avaliação da educação: a implementação do Exame Nacional do Ensino Médio (ENEM), do Sistema de Avaliação da Educação Básica (SAEB), Exame Nacional de Cursos (PROVÃO) e do Censo Escolar (SHIROMA et al., 2007). A agenda educacional dos governos brasileiros no contexto de contrarreformas O governo Lula da Silva, por sua vez, não representou um rompimento em relação às premissas erigidas dos organismos internacionais, solidificando a questão da inovação em diferentes frentes de sua gestão. Oliveira (2011), produz um levantamento do tema na agenda dos governos brasileiros, destacando os planos jurídico, econômico e institucional, de modo que salta aos olhos o aumento do quantitativo de iniciativas nessa direção: No plano jurídico, os principais marcos desse processo foram: a criação dos primeiros fundos setoriais, em 1999; a realização da 2ª Conferência Nacional de Ciência, Tecnologia e Inovação (CNCTI), em 2001;2 a Lei de Inovação, promulgada em 2004; a chamada Lei do Bem, de 2005; e o Plano de Ação em Ciência, Tecnologia e Inovação para o Desenvolvimento Nacional (PACTI), instituído em 2007. No plano econômico, as agências de fomento e órgãos afins dos governos federal e estaduais adotaram inúmeros programas de apoio à pesquisa visando a inovação, e envolvendo o setor empresarial, na forma de convênios, empréstimos subsidiados, financiamentos a fundo perdido, bolsas etc. No plano institucional, criaram-se entidades, tanto no setor público (por exemplo, as "agências de inovação " nas universidades), como no setor privado (na forma de associações empresariais, consultorias, ONGs etc.). Campanhas e concursos são promovidos com o intuito de instilar no público a "cultura da inovação", como, por exemplo, a Olimpíada USP de Inovação (OLIVEIRA, 2011, p. 671-672). A lei de incentivo fiscal à Pesquisa e Desenvolvimento (P&D), promulgada em 2005, possibilitou o subsídio às empresas que apresentassem planos com foco em 6 6 desenvolvimento tecnológico “[...] com programas de financiamento à inovação, com programas de capital empreendedor, e com arcabouço legal propício para a interação universidade/empresa (PIMENTEL, 2020, grifos nossos). Com a sanção da Lei n. 12.193/2010, Luiz Inácio designa o dia 19 de outubro como Dia Nacional da Inovação. Oliveira (2011) também destaca o entusiasmo em torno do inovacionismo à época, no contexto 4ª CNCTI, registrado em documento publicado pelo Ministério da Ciência e Tecnologia: "[...] o Brasil tem uma necessidade gigantesca, urgente, de inocular inovação em todos os poros da economia" (BRASIL, 2010, p. 35 apud OLIVEIRA, 2011 p. 672, grifos nossos). O aprofundamento da noção de inovação na educação se manifesta mais explicitamente com o governo Dilma Roussef (2011-2016) com a aprovação do Plano Nacional de Educação (PNE 2014-2024), onde encontramos a preocupação com a inovação pedagógica e tecnológica em 5 das 20 metas do documento. A agenda educacional dos governos brasileiros no contexto de contrarreformas Em 2015, há a criação da “Iniciativa pela Inovação e Criatividade na Educação Básica” e em 2017 a discussão ganha mais substância com a publicação da Base Nacional Comum Curricular (BNCC), trazendo a inovação entrelaçada ao domínio das Tecnologias de Informação e Comunicação, competência geral 5. Assim, dois marcos importantes da última década na política educacional brasileira – o PNE e a BNCC – trazem traços significativos em relação ao estímulo de uma “cultura da inovação” na educação, ainda que em meio ao intervalo da aprovação de cada documento tenha ocorrido um golpe de Estado, com o impedimento de Dilma Rousseff. Na próxima sessão nos deteremos a descrever e analisar a movimentação e os pressupostos do Centro de Inovação para a Educação Brasileira (CIEB), agência que emerge nesse processo e intervém em prol da materialização do discurso da inovação na educação. O Centro de Inovação para a Educação Brasileira: iniciativas e colaborações na tessitura das políticas públicas Quando sonhamos o Brasil, sonhamos com educação. Quando sonhamos educação, nosso caminho é a inovação. CIEB vação. CIEB Importante movimentação para estimular a “cultura da inovação” nas redes públicas brasileiras ocorre em 2016, com a fundação do Centro de Inovação para a 7 Educação Brasileira (CIEB). Brito e Marins (2020) caracterizam o CIEB como um pool de empresas, ainda que este se apresente como uma organização sem fins lucrativos. Desde sua criação, tem desenvolvido parcerias técnicas com o Ministério da Educação (MEC), atuando ativamente no desenvolvimento de estudos e plataformas, e apoiando a criação e a execução de “programas de inovação” nas redes de ensino básico para “[...] impulsionar a qualidade, a equidade e a contemporaneidade da educação pública brasileira” (CIEB, 2015, p. 3, grifos nossos). O pressuposto central do CIEB, portanto, consiste na defesa da inovação como propulsora da qualidade da educação. Nesse aspecto, cabe destacar a relação do termo inovação com qualidade Em sua primeira nota técnica, seus especialistas advogam “A importância de políticas nacionais e centros de inovação em educação” (CIEB, 2015). O estudo parte da análise do Plano Nacional de Educação (2014-2024), com o objetivo de fomentar o debate sobre a criação de um Centro de Inovação para a Educação no Brasil, e investigar como iniciativas de inovação tecnológica impulsionariam o atingimento das metas do PNE (FIGURA 1): Figura 1- O papel da inovação para implementação das metas do PNE (2014-2024) gura 1- O papel da inovação para implementação das metas do PNE (2014-2024) Figura 1- O papel da inovação para implementação das metas do PNE (201 8 Figura 1 O papel da inovação para implementação das metas do PNE (2014 2024) Fonte: CIEB (2015) Fonte: CIEB (2015) Fonte: CIEB (2015) 8 8 Ao elencar algumas das metas do Plano Nacional de Educação (2014-2024) e caracterizá-las como desafiadoras, o documento apresenta como solução recorrente a “inovação” em diferentes frentes do trabalho educativo. Desde a gestão, passando pela alfabetização e até a formação docente: bastaria às secretarias de educação implementar estratégias adjetivadas como “inovadoras”. Para o CIEB a inovação está fortemente relacionada às Tecnologias da Informação e da Comunicação (TICs), atreladas à uma visão reducionista e gerencialista da educação. Outrossim, o termo inovação é utilizado como incauto e exato, definindo práticas novas – que em aparência superariam as antigas – como se o problema da educação fosse a obsolescência de práticas educativas, dos professores e da escola. 9 5 Para saber mais, consultar os documentos CIEB Notas Técnicas #11: “Contribuições para a inclusão do tema tecnologia na Base Nacional Comum Curricular”; CIEB Notas Técnicas #12: “Conceitos e 4 Sobre a diferença entre educação integral e educação em tempo integral consultar Arco Verde (2003). 9 4 Sobre a diferença entre educação integral e educação em tempo integral consultar Arco Verde (2003). 5 Para saber mais, consultar os documentos CIEB Notas Técnicas #11: “Contribuições para a inclusão do tema tecnologia na Base Nacional Comum Curricular”; CIEB Notas Técnicas #12: “Conceitos e 4 Sobre a diferença entre educação integral e educação em tempo integral consultar Arco Verde (2003). 5 Para saber mais consultar os documentos CIEB Notas Técnicas #11: “Contribuições para a inclusão O Centro de Inovação para a Educação Brasileira: iniciativas e colaborações na tessitura das políticas públicas Questões que se arrastam ao longo da história da educação brasileira, como a erradicação do analfabetismo, seriam facilmente solucionadas com a distribuição de tablets, notebooks e aplicativos gratuitos. Mas, a “democratização” dos chamados objetos digitais seriam capazes por si só de fazer a educação “dar um salto”? A forma com que o CIEB afirma ser o papel da inovação para o cumprimento das metas do PNE, acaba por indicar a inovação na educação como “a meta das metas”. A adoção de equipamentos (hardware), aplicativos e programas (software) permitiria o cumprimento de 8 das 20 metas do PNE em um curto período de tempo! Metas essas que englobam complexas questões como a educação especial, defasagem idade/série, índices em avaliações de larga escala e educação em tempo integral. Em relação à meta 6, inclusive, há um equívoco na concepção de educação integral, que aparece como sinônimo de educação em tempo integral4. Partindo deste equívoco se desenvolve a defesa da implementação da cultura maker, aprendizagem em projetos como meio para promoção do desenvolvimento integral dos estudantes. Por fim, as plataformas EAD e comunidades virtuais correspondem à supressão das dificuldades e questões que assolam a formação de professores, consubstanciando para o cumprimento da meta 15 do PNE. Em 2017, o CIEB não só produziu três notas técnicas sobre a inclusão do tema da tecnologia na Base Nacional Comum Curricular (BNCC)5, como participou das 9 audiências públicas para a discussão da Base. Esta movimentação gerou a incorporação de algumas proposições referentes à tecnologia educacional e pensamento computacional, desenvolvidos pelo Centro. Outra participação de destaque foi a incorporação das dimensões propostas para o uso das tecnologias6 no “Programa de Inovação Educação Conectada”, lançado pelo então Ministério da Educação e Cultura (MEC) no governo Temer e instituído pelo Decreto 9.204/23 de novembro de 2017 (GONSALES, P.; ALLODI, S, 2019). Em 2018, contratou especialistas para elaborar propostas pedagógicas e curriculares para a implementação do eixo transversal referente às tecnologias digitais da BNCC: o “Currículo de Referência em Tecnologia” e “Computação e o Itinerário Formativo Cultura Digital” (CIEB, 2021a). Entretanto, é no ano de 2021 que o Centro de Inovação destaca a ampliação de seu alcance. ç p p p g 6 As dimensões para o uso eficaz de tecnologias na educação propostas pelos intelectuais pela organização em questão consistiam em: a) visão estratégica; b) formação de gestores e professores; c) recursos educacionais digitais e d) infraestrutura (GONSALES, P.; ALLODI, S., 2019). conteúdo de inovação e tecnologia (I&T) na BNCC” e CIEB Notas Técnicas #14: “An contribuições para a proposta da BNCC-EM com foco em tecnologia e computação”. 7 A relação dos parceiros e mantedores do centro está disponível no sítio do centro:<https://cieb.net.br/quem-somos/#parceiros>. O Centro de Inovação para a Educação Brasileira: iniciativas e colaborações na tessitura das políticas públicas Com a reabertura gradual das escolas, ainda em meio a pandemia de COVID-19, o ensino híbrido ganha força, que já vinha sendo defendido nos materiais do CIEB desde 2015, oportunizando ao Centro impulsionar seus pressupostos: A reabertura gradual das escolas em 2021 despertou na comunidade educacional um grande interesse pelo ensino híbrido, abordagem que, na visão do CIEB em suas publicações, utiliza e integra tecnologias digitais em momentos presenciais e remotos para oferecer flexibilidade, diversificação de estratégias pedagógicas, personalização e foco nas crianças e jovens. Não por acaso, a Nota Técnica #18: Ensino híbrido e o uso das tecnologias digitais na educação básica foi a publicação mais baixada no site do CIEB em 2021 (CIEB, 2021b). A ampliação de sua incidência política refletiu no aumento de sua rede. Em 2020, teve como mantenedores: Fundação Leman, Instituto Natura, Instituto Península, Itaú Social, Omidyar Network, Fundação Telefônica. Em 2021, ainda que o site não registre mais a parceria com a Omidyar Network, o Centro contou com importantes reforços: o Instituto General Motors e a Cisco. Também são absolutamente relevantes as agências que estabelecem cooperação técnica com a organização: The Boston Consultin Group, Conselho Nacional de Secretarias de 10 Educação (CONSED), Digital Promise, Empresa Brasileira de Inovação e Pesquisa, Porvir, bem como a representação da UNESCO no Brasil7. A congregação que se formou e ganhou mais robustez ao longo dos últimos anos em torno do CIEB, demonstra não apenas um apoio desinteressado, mas a intencionalidade da classe dominante em relação à ampliação da educação como mercado, além da convergência com os pressupostos do CIEB, na defesa de uma educação pública “inovadora”, como delineado na seção a seguir. 11 p q p 8 Levantamento desenvolvido pela Associação Brasileira de Startups (Abstartups) em parceria com o Centro de Inovação para a Educação Brasileira (CIEB). Considerações preliminares sobre a incidência política do Centro de Inovação para a Educação Brasileira A defesa das Tecnologias de Informação e Comunicação (TICs) como meio para atingir a qualidade na educação não é algo novo no discurso de pesquisadores da área, governos e agências nacionais e internacionais. Todavia, o advento da pandemia de COVID-19, representou um significativo salto da defesa das TICs como “soluções incontestáveis”, devido a adoção do Ensino Remoto Emergencial (ERE). Sob o mote da “mitigação das desigualdades”, o mercado das Edtechs vivenciou uma expansão vertiginosa e uma “calorosa” recepção nos sistemas públicos de educação no Brasil. O “Mapeamento Edtech 2020”8 demonstra o fenômeno: ao final de 2020, o país contava com 566 startups de educação ativas, crescimento de 26% em relação a 2019. Enquanto diversos setores sofreram o impacto da crise com a pandemia, 64% das startups Edtechs mantiveram ou aumentaram o faturamento, 40% aumentaram o quadro de funcionários e 89% não realizaram cortes na folha de pagamento (CIEB; ABSTARTUPS, 2021). Por fim, mas não menos importante, o mesmo estudo também indicou que em 2020, 13% das startups com foco em educação haviam negociado com órgãos públicos. O percentual não foi maior, de acordo com o estudo, devido as dificuldades no acesso às informações sobre os editais de compra, “excesso de burocracia” e a “falta de clareza nas comunicações” (CIEB; ABSTARTUPS, 2021). Tais queixas já 7 A relação dos parceiros e mantedores do centro está disponível no sítio do centro:<https://cieb.net.br/quem-somos/#parceiros>. 11 11 eram apresentadas nos manuais técnicos do Centro, acompanhadas de proposições de políticas públicas. Portanto, não se trata de coincidência a preocupação do CIEB em elaborar, no calor do lançamento da Base Nacional Comum para a Formação Inicial de Professores da Educação Básica (BNC-Formação) (Resolução CNE/CP nº 2, de 20 de dezembro de 2019), uma proposta de componentes curriculares sobre tecnologia para a formação inicial de professores9. O ano de 2021 não foi marcado apenas pela adesão de novos mantenedores ao CIEB. Na verdade, estas adesões indicam forte relação com a incidência política do Centro junto ao MEC. Nesse sentido, é imperioso observar com cautela o Programa de Inovação Educação Conectada (PIEC). Criado pelo Decreto n. 9.204, de 23 de novembro de 2017, tem como objetivo central “[...]a universalização do acesso à internet em alta velocidade e fomentar o uso pedagógico de tecnologias digitais na educação básica” (BRASIL, 2017, p. 1, grifos nossos). 12 9 O documento competências digitais na formação de professores está disponível no sítio do CIEB <https://cieb.net.br/wp-content/uploads/2020/12/Compete%CC%82ncias-Digitais.pdf>. Considerações preliminares sobre a incidência política do Centro de Inovação para a Educação Brasileira Ao ter em seu cerne a promoção da “cultura de inovação” por meio da adoção de tecnologias na educação, o programa demonstra estreito alinhamento com o projeto de educação defendido pelo CIEB, seus mantenedores e parceiros. A esse respeito, é estratégica a localização dessa organização no PIEC, que cumpre a função de assessoria técnica ao programa, tendo sido responsável pela orientação da elaboração dos Planos Locais de Inovação nos estados e municípios. Ademais, Brito e Marins (2020) chamam a atenção para o fato de o CIEB ocupar duas cadeiras no comitê consultivo do PIEC: uma, referente a consultoria técnica e a outra como representante de entidade privada e organizações da sociedade civil (a segunda cadeira desta categoria é ocupada pela Fundação Lemann, uma das mantenedoras do CIEB). Também é curioso observar o item 6.3 do Edital de Seleção n.001/2018, concernente à Chamada Pública “BNDES – Educação Conectada – Implementação e Uso de Tecnologias Digitais na Educação”: O BNDES contará com o suporte técnico do Centro de Inovação para a Educação Brasileira – CIEB, para a execução das atividades da Ch d Públi i t Edit l ti id d d O BNDES contará com o suporte técnico do Centro de Inovação para a Educação Brasileira – CIEB, para a execução das atividades da Chamada Pública previstas nesse Edital; para as atividades de monitoramento e avaliação; e para a implantação dos projetos selecionados, incluindo orientação para a eventual alocação dos a Educação Brasileira – CIEB, para a execução das atividades da Chamada Pública previstas nesse Edital; para as atividades de monitoramento e avaliação; e para a implantação dos projetos selecionados, incluindo orientação para a eventual alocação dos 9 O documento competências digitais na formação de professores está disponível no sítio do CIEB <https://cieb.net.br/wp-content/uploads/2020/12/Compete%CC%82ncias-Digitais.pdf>. 9 O documento competências digitais na formação de professores está disponível no sítio do CIEB <https://cieb.net.br/wp-content/uploads/2020/12/Compete%CC%82ncias-Digitais.pdf>. 12 recursos financeiros, bens e serviços captados junto aos parceiros da iniciativa privada, de acordo com o cronograma a ser definido com as redes de ensino selecionadas (BNDES, 2018, p. 7). recursos financeiros, bens e serviços captados junto aos parceiros da iniciativa privada, de acordo com o cronograma a ser definido com as redes de ensino selecionadas (BNDES, 2018, p. 7). Ao tratar do novo empresariamento na educação, Harvey (1996) apresenta como é estratégica a conexão gerada pelas parcerias público-privadas, onde cabe ao primeiro assumir os riscos e à segunda os benefícios. Considerações preliminares sobre a incidência política do Centro de Inovação para a Educação Brasileira Diante deste panorama, salta aos olhos que uma mesma organização hoje, acumule as funções de prestar assessoria técnica ao principal programa de inovação para a educação do governo federal e realizar o mapeamento e a orientação das Edtechs que se interessem em vender seus produtos para o MEC e para as secretarias estaduais e municipais de educação. Outrossim, é mister a sinalização de Leher e Lamarão (2020) no tocante às tensões entre o público e o privado na educação brasileira: Para os autores, as políticas que possibilitam e/ou direcionam novas “formas de privatização” da educação convergem para uma redefinição do papel do professor. Em outras palavras, os caminhos tomados pelas políticas de financiamento da educação pública no país corroboraram para a desprofissionalização e precarização do trabalho docente. Considerações Finais Este artigo se propôs a reconstituir e mapear o percurso em que a ideia de inovação se insere na agenda política educacional brasileira e a relação deste processo com a criação e fortalecimento do CIEB. Ao realizar esse mapeamento, identificamos que na última década o PNE (2014-2024) e a BNCC (promulgada em 2017) constituíram-se como pilares para o aprofundamento do apelo às TICs na educação. Entre 2016 e 2022, o Brasil sofreu mudanças importantes em relação às agendas dos governos. Vale destacar que o período chega a compreender um golpe de Estado, corroborando com a avaliação de Bianchi (2016), mas mesmo assim, em relação ao fortalecimento da tríade inovação-educação-tecnologia, observa-se uma constância em sua consolidação como modelo a ser buscado, seja na iniciativa pública ou privada. Sob o mote da mitigação das desigualdades educacionais, o ensino híbrido e a entrada cada vez mais ampla de plataformas, aplicativos e outros produtos 13 13 tecnológicos para a educação, vem sendo indicados como sinônimo de “inovação” e de melhoria da qualidade da educação pública. Ou seja, fazer da educação cada vez mais uma bancada de negócios absolutamente lucrativa e um caminho para que os parcos investimentos na área desaguem nas mãos dos investidores das Edtechs. Aqui entendemos que o acesso à tecnologia deve ser sim um direito de todos, que a conectividade nas escolas pode ser uma possibilidade de potencializar o trabalho dos professores e professoras. Quanto mais recursos didáticos na escola, maior a autonomia do professor para desenvolver o trabalho com os conteúdos escolares, e consequentemente, fazer com que os filhos e filhas da classe trabalhadora exerçam o direito do acesso à educação. Mas fica a questão: inovação conectada para quem e para quê? De início, é importante lembrar que, de acordo com a divulgação do próprio governo federal, o PIEC é muito mais que uma ação que pretende levar recursos tecnológicos e conectividade para as escolas. De acordo com o sítio do governo federal: A Política de Inovação Educação Conectada pretende estimular o uso das ferramentas tecnológicas, definir os princípios, assegurar as ações voltadas à inclusão da inovação na prática pedagógica das escolas, capacitar os professores e demais profissionais envolvidos, bem como fomentar a produção de materiais escolares digitais gratuitos. Queremos chamar atenção, primeiramente para o que seria “inovação na prática pedagógica”. Para olhar mais de perto, precisamos lembrar que o termo inovação é importado do léxico empresarial. Considerações Finais Todos os problemas da educação são reduzidos a questões técnicas, e com isso criam-se dispositivos para a melhor gestão dos recursos como a comparação internacional de índices, cujo substrato são avaliações em larga escala. É preciso compreender as diferentes facetas que o apelo à inovação pode apresentar para o trabalho educativo, tendo em vista o conteúdo político que identificamos ao localizar este slogan no percurso da conformação da sociabilidade do capital. Para o CIEB, em 2021, o foco do trabalho pedagógico nas escolas deve ser as competências gerais e socioemocionais descritas na BNCC: 14 É hora de selecionar habilidades e competências por ano e por componente que: ● sejam aprendizagens essenciais para a compreensão de conceitos mais complexos na mesma área; ● sejam habilidades e competências que se conectem com outras áreas e possibilitem melhor compreensão delas; ● estejam relacionadas às competências gerais (socioemocionais e competências do século 21) (CIEB, 2021a, p. 9). O estudo dos diferentes materiais e iniciativas do Centro reforçam a defesa de que conteúdo e forma não de separam e se constituem como um exemplo completo do fenômeno da pedagogia de mercado, e do sequestro da escola (SANTOS, 2012). O mote pela inovação na educação consolida e põe em marcha a punção do fundo público e o esvaziamento da função social da escola. Esvaziamento marcado não somente pela proposição de currículos rarefeitos, mas pela proposição da centralidade do trabalho pedagógico nas competências gerais e socioemocionais. É preciso, corroborando com Accioly e Lamosa (2021), destacar o caráter repressivo/coercitivo do fomento à formação das competências socioemocionais. Em uma conjuntura de aprofundamento da privatização da educação pública, de controle do trabalho, dos corações e mentes dos trabalhadores e trabalhadoras, o desvelamento de slogans como a inovação torna-se imperioso para que se possa intervir na direção da defesa do direito à educação, à liberdade de cátedra e de pensamento. Referências ACCIOLY, I.; LAMOSA, R.. As Competências Socioemocionais na Formação da Juventude: Mecanismos de Coerção e Consenso frente às Transformações no Mundo do Trabalho e os Conflitos Sociais no Brasil. Revista Vértice, Campos dos Goytacazes, v.23, n.3, set./dez. 2021. ARCO-VERDE, Y. F. S. A arquitetura do tempo na cultura escolar: um estudo sobre os Centros de Educação Integral de Curitiba. 2003. 212f. Tese (Doutorado em Educação) – PUC, São Paulo. BRASIL. Presidência da República. Decreto nº 9.204, de 23 de novembro de 2017. Institui o Programa de Inovação Educação Conectada e dá outras providências. Brasília, 2017. Disponível em: http://www.planalto.gov.br/ccivil_03/_Ato2015- 2018/2017/Decreto/D9204.htm. Acesso em 15 de abril de 2020. BRASIL. Presidência da República. Decreto nº 9.204, de 23 de novembro de 2017. Institui o Programa de Inovação Educação Conectada e dá outras providências. Brasília, 2017. Disponível em: http://www.planalto.gov.br/ccivil_03/_Ato2015- 2018/2017/Decreto/D9204.htm. Acesso em 15 de abril de 2020. BANCO NACIONAL DE DESENVOLVIMENTO ECONÔMICO E SOCIAL (BNDES). Edital de Seleção nº 001/2018 (Edital retificado). Rio de Janeiro, 2018. Disponível 15 em:https://www.bndes.gov.br/wps/portal/site/home/onde-atuamos/social/chamada- publicabndes-educacao-conectada. Acesso em 04 de janeiro de 2022. em:https://www.bndes.gov.br/wps/portal/site/home/onde-atuamos/social/chamada- publicabndes-educacao-conectada. Acesso em 04 de janeiro de 2022. em:https://www.bndes.gov.br/wps/portal/site/home/onde-atuamos/social/chamada- publicabndes-educacao-conectada. Acesso em 04 de janeiro de 2022. CÊA, G. S. S..; SILVA, S. R. P. S.; SANTOS, I. M. S. DE “EDUCAÇÃO PARA TODOS” PARA “TODOS PELA EDUCAÇÃO”. RTPS - Revista Trabalho, Política e Sociedade, v. 4, n. 6, 30 jun. 2019. CENTRO DE INOVAÇÃO PARA A EDUCAÇÃO BRASILEIRA E ASSOCIAÇÃO BRASILEIRA DE STARTUPS. Mapeamento Edtech 2020 – investigação sobre as tecnologias educacionais brasileiras. São Paulo: ABSTARTUPS CIEB, 2021. __________. Programa de inovação conectada (PIEC). CIEB, 2021a. Disponível em: <https://cieb.net.br/programa-de-inovacao-educacao-conectada-piec/>. Acesso em 19 de dezembro de 2021. __________. Confira as publicações do CIEB de maior audiência em 2021. CIEB, 2021b. Disponível em: <https://cieb.net.br/confira-as-publicacoes-do-cieb-de-maior- audiencia-em-2021>. Acesso em 04 de janeiro de 2022. __________. CIEB: notas técnicas #1: A importância de políticas nacionais e centros de inovação em educação. São Paulo: CIEB, 2015. E-book em pdf. FERNANDES, E. F. A Política da OCDE para a Educação Básica: das mesas de reuniões internacionais à carteira escolar. 2019. 169f. Dissertação (Mestrado em Educação) – UnB, Brasília. FRIGOTTO, G. A Produtividade da Escola Improdutiva. 7. ed. São Paulo: Cortez, 2006. FRIGOTTO, G. A Produtividade da Escola Improdutiva. 7. ed. São Paulo: Cortez, 2006. GRAMSCI, A. Cadernos do Cárcere. Maquiavel. Notas sobre o Estado e a política. Rio de Janeiro: Civilização Brasileira, 2000. v. 3. GONSALES, P.; ALLODI, S. Design da educação conectada: metodologia para resolução de problemas na implementação do plano de tecnologia educacional. São Paulo: CIEB, 2019. HARVEY, D. Do gerenciamento ao empresariamento: a transformação da administração urbana no capitalismo tardio. Espaços e Debates, v. 16, n. 39, p. 48- 64, 1996. Disponível em: https://edisciplinas.usp.br/pluginfile.php/2078563/mod_resource/content/1/Harvey_D o%20gerenciamento%20ao%20empresariamento%20%281%29.pdf. Acesso em 20 de dezembro de 2021. HAVELOCK, R.; HUBERMAN, M. Solving educational problem: the theory and reality of innovation in developing countries. Paris: UNESCO, 1977. HUBERMAN, M. Comment s’opbrent les changements en éducation: contribution à l’étude de l’innovation. Paris: UNESCO, 1973. 16 LEHER, R..; LAMARÃO, M. V. M. A disputa pelos recursos educacionais e o movimento todos pela educação: antigas e novas formas de privatização. In: VIEIRA, S. V.; LAMOSA, L. (orgs.) Todos pela Educação? Uma década de ofensiva do capital sobre as escolas públicas. Curitiba: Appris, 2020. LIMA, K. R. S.; MARTINS, A. S. Pressupostos, Princípios e Estratégias. In: NEVES, Lúcia Maria Wanderley (org.). A nova pedagogia da hegemonia no Brasil: estratégias do capital para educar o consenso. São Paulo: Xamã, 2005. MENDONÇA, S. R. O Estado Ampliado como Ferramenta Metodológica. Marx e o Marxismo, v.2, n.2, jan/jul., 2014. MÉSZÁROS, I. A Crise Estrutural do Capital. 2ª ed. São Paulo: Boitempo, 2009. ÉSZÁROS, I. A Crise Estrutural do Capital. 2ª ed. São Paulo: Boitempo, 2009 NEVES, L. M. W. e SANT’ANNA, R. S.. Introdução: Gramsci, o Estado educador e a nova pedagogia da hegemonia. In: NEVES, Lúcia Maria Wanderley (org.). A nova pedagogia da hegemonia: estratégias do capital para educar o consenso. São Paulo: Xamã, 2005. OLIVEIRA, M. B. O inovacionismo em questão. Scientiae Studia. 2011, v. 9, n. 3. Disponível em: <https://doi.org/10.1590/S1678-31662011000300011>. Epub 27 Jan 2012. Acesso em 18 de janeiro de 2022. PIMENTEL, N.. M. A inovação como política na educação e na modalidade a distância / Innovation as a policy in education and distance mode. Revista Educação e Políticas em Debate, [S. l.], v. 9, n. 1, 2020. Disponível em: https://seer.ufu.br/index.php/revistaeducaopoliticas/article/view/53333. Acesso em 20 de janeiro de 2022. SALERNO, M. S.; KUBOTA, L. C. Estado e inovação. In: DE NEGRI, J.A.; KUBOTA, L.C. (Org.) Políticas de incentivo à inovação tecnológica. Brasília: Ipea, 2008. SHIROMA, E. O.; MORAES, Maria Célia Marcondes de; EVANGELISTA, Olinda. Política Educacional. Rio de Janeiro: Lamparina, 2007. TAVARES, F. G. O.. O conceito de inovação em educação: uma revisão necessária. Educação, [S. l.], v. 44, p. e4/ 1–19, 2019. Disponível em: https://periodicos.ufsm.br/reveducacao/article/view/32311. Acesso em 20 de janeiro de 2022. TAVARES, F. G. O.. O conceito de inovação em educação: uma revisão necessária. Educação, [S. l.], v. 44, p. e4/ 1–19, 2019. Disponível em: https://periodicos.ufsm.br/reveducacao/article/view/32311. Acesso em 20 de janeiro de 2022. 17
https://openalex.org/W4307952310
https://zenodo.org/records/7321948/files/22%2021073.pdf
English
null
Single parent mating in genetic algorithm for real robotic system identification
IAES International Journal of Artificial Intelligence
2,023
cc-by
5,300
IAES International Journal of Artificial Intelligence (IJ-AI) Vol. 12, No. 1, March 2023, pp. 201~208 ISSN: 2252-8938, DOI: 10.11591/ijai.v12.i1.pp201-208 IAES International Journal of Artificial Intelligence (IJ-AI) Vol. 12, No. 1, March 2023, pp. 201~208 ISSN: 2252-8938, DOI: 10.11591/ijai.v12.i1.pp201-208 IAES International Journal of Artificial Intelligence (IJ-AI) Vol. 12, No. 1, March 2023, pp. 201~208 ISSN: 2252-8938, DOI: 10.11591/ijai.v12.i1.pp201-208  201  201 201 Keywords: Discrete-time system Evolutionary computation Genetic algorithm Mathematical modelling Robotic system System identification Discrete-time system Evolutionary computation Genetic algorithm Mathematical modelling Robotic system System identification This is an open access article under the CC BY-SA license. This is an open access article under the CC BY-SA license. Md Fahmi Abd Samad Faculty of Mechanical Engineering, Universiti Teknikal Malaysia Melaka Hang Tuah Jaya, 76100 Durian Tunggal, Melaka, Malaysia Email: mdfahmi@utem.edu.my Single parent mating in genetic algorithm for real robotic system identification Md Fahmi Abd Samad1,2, Farah Ayiesya Zainuddin1 1Faculty of Mechanical Engineering, Universiti Teknikal Malaysia Melaka, Melaka, Malaysia 2Center for Advanced Computing Technology, Universiti Teknikal Malaysia Melaka, Melaka, Malaysia ABSTRACT System identification (SI) is a method of determining a mathematical model for a system given a set of input-output data. A representation is made using a mathematical model based on certain specified assumptions. In SI, model structure selection is a step where a model structure perceived as an adequate system representation is selected. A typical rule is that the final model must have a good balance between parsimony and accuracy. As a popular search method, genetic algorithm (GA) is used for selecting a model structure. However, the optimality of the final model depends much on the effectiveness of GA operators. This paper presents a mating technique named single parent mating (SPM) in GA for use in a real robotic SI. This technique is based on the chromosome structure of the parents such that a single parent is sufficient in achieving mating that eases the search for the optimal model. The results show that using three different objective functions (Akaike information criterion, Bayesian information criterion and parameter magnitude–based information criterion 2) respectively, GA with the mating technique is able to find more optimal models than without the mating technique. Validations show that the selected models using the mating technique are acceptable. Received Oct 2, 2021 Revised Jul 14, 2022 Accepted Aug 12, 2022 Corresponding Author: Md Fahmi Abd Samad Faculty of Mechanical Engineering, Universiti Teknikal Malaysia Melaka Hang Tuah Jaya, 76100 Durian Tunggal, Melaka, Malaysia Email: mdfahmi@utem.edu.my 1. INTRODUCTION System identification (SI) is known as a field of study where an optimal mathematical model, relating the variables and terms of a system, is determined. This is done by using the input-output data from the system. By developing the model, better control of the system may be achieved [1], [2]. There are two types of system modelling i.e. continuous-time and discrete-time modelling. Noting that data acquisition in industry or laboratory is made by instants of time, discrete-time modelling is commonly seen. There are 4 main steps in SI and these are data acquisition, model structure selection, parameter estimation and, lastly, model validation. The description of an optimal model is one that has adequate accuracy in predicting the response of the system but at the same time, is parsimonious in form. A parsimonious model structure, that contain fewer variables and/or terms, is desirable because the analysis and control of the system becomes easier [3]. To identify an optimal model for a system within a short time and cost, high efficiency in modelling is needed. Therefore, researchers have turned to meta-heuristic methods, including evolutionary computation as a method to allow optimal search for the system’s model [4]–[8]. Evolutionary computation, more specifically genetic algorithm (GA), has proven its strength and endurance, and able to reduce computational Journal homepage: http://ijai.iaescore.com  202 ISSN: 2252-8938 burden. GA has become an interesting area of investigation among researchers for many applications such as wireless sensor network energy optimization [9], control of vehicles [10], [11], modelling of disease severity [12], scheduling in medical field [13], aeronautics and robotics [14]. Although GA has been adopted in SI, its efficiency is still lacking which can be observed from long processing time, premature convergence or non-optimal setting of GA operators that causes loss of computation time and restricted global performance. Premature convergence to local optima is one of the most frequent difficulties that arise when applying GA to complex problem. It occurs when genetic operators can no longer generate offsprings that are fitter than their suboptimal parents. Premature convergence is associated with the loss of diversity in the population. However, too much population diversity can lead to a dramatic deterioration of GA efficiency [15]. Aside from the common operators of GA selection, crossover and mutation and although, relatively rare, researchers have started looking into mating after selection to enhance GA. 1. INTRODUCTION An example include the introduction of a self-adaptive mating based on parent similarity or fitness [15]. Another example introduces gender and kinship to the individuals in GA [16]. The idea is also adopted in [17] and used together with tabu search in [18]. With proper mating technique, the “marriage” of the parents must be able to explore new search space of solution, producing more varied offsprings (hence, in the context of SI, may mean system model) that cannot be achieved by common procedure of GA. This paper aims at introducing and implementing a new mating technique, named single parent mating (SPM), which is simpler yet effective, for a real robotic SI. The technique is shown to be capable of exploring new search space of solutions, thus producing more optimal and valid models according to three different objective functions (OF). The sections are divided as: section 2 explains the method of study including the mechanism of the mating proposal, section 3 reveals the results along with validation analysis and section 4 concludes the findings of the paper. 2.2. Real robotic system The real data comes from a flexible robot arm system available from [22]. The flexible robot arm has 1,024 data points of an input (measured reaction torque of the robotic structure) and an output (the acceleration of the flexible arm). Markovsky et al. [23], [24] selected lag 4 for a linear model identification of the system. Yassin et al. [25], it is identified that the system’s suitable specification is maximum order of input lag=2 and maximum order of output lag=4, also within a linear form. 2.1. GA with mating technique GA is known as an optimization method that takes the metaphor of species evolution [19]. In traditional GA, the search for an optimal model is made through three important processes: selection, crossover and mutation [20], [21]. The selection process copies good chromosomes into a mating pool - some may be copied a number of times. Common crossover operates by the mating of two or more parents taken randomly from the mating pool once the selection process is completed. However, there is a possibility that the 2 selected parents have the same features causing the process to produce similar offsprings to parents and thus suppressing the evolution. In this paper, to speed up the search and avoid premature convergence in the population, the algorithm incorporates a mating technique named SPM. The idea is to have 2 parents of completely different characteristics to be mated in order to try out new offsprings for the next generation. In SPM, once the parents are transferred to the mating pool after the selection process, they are copied and inverted to form a new set of parents. Using a binary representation, all bits 1 are changed to 0 and vice versa. The mating is achieved by pairing the original parent with its inverted self, hence the name SPM. The mating emphasizes how the pair of chromosomes is made, not how their informations are exchanged, as information exchange is carried out through crossover. Figure 1 illustrates that there are 24 possible offsprings with SPM when applied together with uniform crossover, as illustration. By this way, bigger search space is explored, diversity of the population is maintained and higher variability of offsprings is accomplished in the next generation. Figure 2 shows the procedure of GA using the mating technique. Int J Artif Intell, Vol. 12, No. 1, March 2023: 201-208 2.3. Simulation setup In this study, the chromosomes in GA represent specific models for SI. The models, in the form of nonlinear autoregressive with exogenous input (NARX) models, are represented using binary representation where 1 is presence of term and 0 for omission of term. Adopting some literature results, the specification of the search space is as: maximum nonlinearity=2, maximum order of output lag=4, maximum order of input lag=4 and time delay=1. This specification makes up 44 terms to be selected for model structure and the Int J Artif Intell, Vol. 12, No. 1, March 2023: 201-208 203  ISSN: 2252-8938 Int J Artif Intell number of possible models to choose from is 244-1>1013. Once a model structure is selected, the parameters are estimated using the least squares method. Then, they are evaluated based on the minimization of a specific optimality measurement a.k.a. OF in identifying the system. Three different types of OF i.e. Akaike information criteria (AIC), Bayesian information criteria (BIC) and parameter magnitude-based information criteria 2 (PMIC2) are used to evaluate the models throughout evolution. AIC and BIC may be referred from e.g. [26] while PMIC2 is demonstrated in [27] and [28]. The specification of GA is as: population size=200 and 100, maximum generation=300, bit-flip mutation probability=0.01 and single-point crossover probability=0.6. The study uses roulette-wheel selection and the elitism strategy. In the elitism strategy, the chromosome that is evaluated as the best is brought forward, unchanged, into the population of the next iteration (generation). The processes are repeated until termination (maximum generation). Prior study conducted using the mating technique with single-point crossover on simulated data sets revealed that the method found more optimal models by setting its implementation in the range of 10% to 20% of population, inclusively. Hence, in this study, GA is carried out using two specific percentages of the parents in the mating pool where the mating pool is the same size as the population. The percentages tested were 0% and 15%. As an example, for a 15% SPM, 15% of the parents in the mating pool are copied and inverted. This makes another set of parents of size 15% of population. Mating was done between the parents and its inverted selves (making up 30% of a population). The remaining 70% comes from the initial mating pool. With this setting, it may be noted that 0% represents GA without mating. 2.3. Simulation setup For each percentage, 15 runs of GA on the real robot arm system data set are made. Figure 1. Possible offsprings with single parent mating (SPM) Figure 2. GA with SPM Figure 2. GA with SPM Figure 1. Possible offsprings with single parent mating (SPM) Figure 2. GA with SPM 3.1. Model structure selection Finding an optimal model, that has adequate accuracy of prediction yet parsimonious in its structure, is aimed through the minimization of the OF. Figure 3 shows the average OF value of the best chromosome versus generation when using 0% SPM technique (that represents no mating and labelled “0” in legend) and 15% SPM technique (labelled “0.15”) for the real flexible robot arm data with 200 population size. Based on Figure 3(a), the graph of 15% SPM started at a high value but then decreased rapidly until the 100th generation when using AIC. It then settled rather consistently until the 300th generation. The decrement when using 0% SPM was rather slow until the maximum generation. The OF value of 15% SPM is better (lower) than 0% SPM throughout the evolution. Closer investigation revealed that GA with 15% SPM managed to find the same, presumably, the most optimal model in all its runs while with 0% SPM, the very same model is found in only 5 runs. The model has 8 regressors with an OF of -10745. Some of the models in 0% SPM gives higher OF of -10741. The best model from 15% SPM is written as: 𝑦(𝑡) = 3.158𝑦(𝑡−1) −4.439𝑦(𝑡−2) + 3.13𝑦(𝑡−3) −0.982𝑦(𝑡−4) +0.019𝑢(𝑡−1) −0.029𝑢(𝑡−2) + 0.055𝑢(𝑡−3) −0.030𝑢(𝑡−4) (1) 𝑦(𝑡) = 3.158𝑦(𝑡−1) −4.439𝑦(𝑡−2) + 3.13𝑦(𝑡−3) −0.982𝑦(𝑡−4) +0.019𝑢(𝑡−1) −0.029𝑢(𝑡−2) + 0.055𝑢(𝑡−3) −0.030𝑢(𝑡−4) (1) Single parent mating in genetic algorithm for real robotic system identification (Md Fahmi Abd Sama  204 ISSN: 2252-8938 Figures 3(b) to 3(c) show that the results using BIC and PMIC2 have quite the same pattern as graph in Figure 3(a). The graphs show that 15% SPM is better than 0% SPM, noted by achieving lower OF average of the best chromosomes, and, additionally, by shorter time. Similar to the observation when using AIC, with BIC, GA with 15% SPM found the same most optimal model (according to BIC) in all runs with an OF of -10707 whilst 0% SPM found it in 8 runs. Some of the models in 0% SPM gives higher OF of -10694. The model found with BIC has 7 regressors and is: 𝑦(𝑡) = 3.128𝑦(𝑡−1) −4.367𝑦(𝑡−2) + 3.058𝑦(𝑡−3) −0.952𝑦(𝑡−4) +0.004𝑢(𝑡−1) + 0.026𝑢(𝑡−3) −0.015𝑢(𝑡−4) (2) (2) Selecting these linear models as the optimal ones within the space of nonlinear model choices agree with [25]. 3.1. Model structure selection The best model contains several nonlinear terms and the linear ones are 𝑦(𝑡−1) and 𝑦(𝑡−3). This model has a higher OF than the one with 200 population size i.e. 15.583. g p p All the results obtained with 200 and 100 population size indicate that the population in 15% SPM contain more genetic diversity, allowing more optimal models to be found quicker. It indicates that bigger search space was explored and higher variety of offsprings was found in the next generation, compared to no mating. When a population is unable to produce offsprings of higher variability than their parents, an algorithm becomes trapped in local optima. This may have caused 0% SPM to be stuck with the near- optimals. (a) (b) (c) Figure 4. Best chromosome’s OF value for robot arm with 100 population size (a) AIC model, (b) BIC model, and (c) PMIC2 model (a) (b) (b) (a) (a) ( ) (c) Figure 4. Best chromosome’s OF value for robot arm with 100 population size (a) AIC model, (b) BIC (c) (c) Figure 4. Best chromosome’s OF value for robot arm with 100 population size (a) AIC model, (b) BIC model, and (c) PMIC2 model 3.1. Model structure selection When using PMIC2, models with lower OF value is found in 4 runs with 15% SPM than the lowest of 0% SPM. The best model of PMIC2 contains 29 regressors. It contains several nonlinear terms and the linear ones are 𝑦(𝑡−2), 𝑦(𝑡−3) and 𝑦(𝑡−4) with an OF value of 7.032, compared to 21.692 - the lowest when using 0% SPM. (a) (b) (c) Figure 3. Best chromosome’s OF value for robot arm with 200 population size (a) AIC model, (b) BIC model, and (c) PMIC2 model (a) (b) (b) (a) (b) (a) (a) (b) (c) (a) (b) (c) Figure 3. Best chromosome’s OF value for robot arm with 200 population size (a) AIC model, (b) BIC model, and (c) PMIC2 model (c) (c) Figure 3. Best chromosome’s OF value for robot arm with 200 population size (a) AIC model, (b) BIC model, and (c) PMIC2 model Next, another test is made by reducing the population size to 100. This affects GA in a way that less parents are inverted, making the effectiveness of SPM questionable. Figure 4 shows the average results. Based on Figure 4(a), it is seen again that, throughout evolution, the OF of the best model in 15% SPM is lower than that of 0% SPM. The decrement of 15% SPM is rapid until it found a model with a very low OF Int J Artif Intell, Vol. 12, No. 1, March 2023: 201-208 205  ISSN: 2252-8938 Int J Artif Intell whilst the decrement of 0% SPM is slow. 5% SPM found the same model as with 200 population size (1) in all its runs while 0% SPM found the very same, presumably, the most optimal model in 10 runs. Figures 4(b) to 4(c) show the OF average of the best chromosomes when using BIC and PMIC2, respectively. The pattern with PMIC2 is not exactly the same as with AIC and BIC but the outcome is the same. In all the OFs, 15% SPM found models with lower OF than 0% SPM throughout evolutions. With BIC, 0% SPM found, presumably, the most optimal model in 7 runs whilst 15% SPM found the same model in all its runs. This is the same model when using 200 population size (2). When using PMIC2, 8 runs in 15% SPM ended with final models of lower OF than the best model found using 0% SPM in all its runs. 3.2. Model validation Single parent mating in genetic algorithm for real robotic system identification (Md Fahmi Abd Samad) 3.2. Model validation To complement the whole procedure of SI, correlation tests are used as validation stage to ensure that no other significant terms and/or variables are omitted from the model [29]. Only the models selected using AIC and BIC are discussed since the validation of the PMIC2 models do not provide significant result. To complement the whole procedure of SI, correlation tests are used as validation stage to ensure that no other significant terms and/or variables are omitted from the model [29]. Only the models selected using AIC and BIC are discussed since the validation of the PMIC2 models do not provide significant result. Single parent mating in genetic algorithm for real robotic system identification (Md Fahmi Abd Samad)  206 ISSN: 2252-8938 Since the selected models using AIC and BIC are of linear forms, Figure 5 shows the linear correlation tests, consisting of error autocorrelation test (𝜙𝜀𝜀) and input-error cross correlation test (𝜙𝑢𝜀), carried out onto the results of the models, respectively. The dotted horizontal lines resemble the bandwidth such that a valid model with 95% confidence should have the lines within the bandwidth. They both look the same and it can be seen that some points lie outside of the bandwidth. The data reveals that there are small differences between Figures 5(a) and 5(b) where the biggest difference in 𝜙𝜀𝜀 test is at lag -16 while in 𝜙𝑢𝜀 test, the biggest difference is at lag -1. Nonetheless, the result is similar to the ones found in [30] where the authors commented that it is difficult to achieve perfect results for real life cases, and that sufficiently good, as can be seen, is acceptable. These validation deficiencies may be inherent from wrong selection of lag orders or nonlinearity. Including the noise terms will improve the model as carried out in [25]. Since the selected models using AIC and BIC are of linear forms, Figure 5 shows the linear correlation tests, consisting of error autocorrelation test (𝜙𝜀𝜀) and input-error cross correlation test (𝜙𝑢𝜀), carried out onto the results of the models, respectively. The dotted horizontal lines resemble the bandwidth such that a valid model with 95% confidence should have the lines within the bandwidth. They both look the same and it can be seen that some points lie outside of the bandwidth. 3.2. Model validation The data reveals that there are small differences between Figures 5(a) and 5(b) where the biggest difference in 𝜙𝜀𝜀 test is at lag -16 while in 𝜙𝑢𝜀 test, the biggest difference is at lag -1. Nonetheless, the result is similar to the ones found in [30] where the authors commented that it is difficult to achieve perfect results for real life cases, and that sufficiently good, as can be seen, is acceptable. These validation deficiencies may be inherent from wrong selection of lag orders or nonlinearity. Including the noise terms will improve the model as carried out in [25]. (a) (b) Figure 5. Linear correlation tests for best model in 15% SPM (a) AIC model (1) and (b) BIC model (2) (a) (a) (b) (b) (a) Figure 5. Linear correlation tests for best model in 15% SPM (a) AIC model (1) and (b) BIC model (2) Cross validation is also carried out on the results, as shown in Figure 6 and Figure 7, where the predicted output is superimposed to the real output and the error (difference of value between the two) plotted. With the range of real output data from -0.7883 to 0.7891, the highest error is 0.0147 whilst the average error is 0.0043 in Figure 6. From Figure 7, the highest error is 0.0151 whilst the average error is 0.0042. These errors are small and they show that the models selected by GA using AIC and BIC incorporating the mating technique are valid and acceptable. Furthermore, the mean square error of the models are 2.620×10-5 and 2.632×10-5 for AIC and BIC models, respectively. These data are comparable to the ones from [30] who obtained 2.69×10-5 and 2.72×10-5 for training data set and testing data set, respectively. I J A if I ll V l 12 N 1 M h 2023 201 208 Figure 6. Superimposition of predicted output of model using AIC with 15% SPM onto real output Figure 7. Superimposition of predicted output of model using AIC with 15% SPM onto real output Figure 6. Superimposition of predicted output of model using AIC with 15% SPM onto real output Figure 7. Superimposition of predicted output of model using AIC with 15% SPM onto real output Int J Artif Intell, Vol. 12, No. 1, March 2023: 201-208 207  ISSN: 2252-8938 Int J Artif Intell REFERENCES [1] K. J. Keesman, System identification: An introduction. London: Springer, 2011. p g [2] L. Ljung, System identification - theory for the user, 2 nd Editi. Prentice Hall PTR, 1999. [3] M. F. A. Samad and A. R. M. Nasir, “Comparison of information criterion on identification of discrete-time dynamic system,” Journal of Engineering and Applied Sciences, vol. 12, no. Special Issue 1, pp. 5660–5665, 2017, doi: 10.3923/jeasci.2017.5660.5665. [4] J. Nowaková and M. Pokorný, “System identification using genetic algorithms,” in Proceedings of the Fifth International Conference on Innovations in Bio-Inspired Computing and Applications IBICA 2014, vol. 303, Springer International Publishing, 2014, pp. 413–418. pp [5] M. I. A. Zamri, M. S. Hadi, A. N. S. Shaari, and N. M. Mokhtar, “Proportional integral derivative controller based on ant colony optimization for vibration cancellation of horizontal flexible plate structure,” International Journal of Electrical and Computer Engineering, vol. 12, no. 4, pp. 3583–3594, Aug. 2022, doi: 10.11591/ijece.v12i4.pp3583-3594. g g pp g j pp [6] R. Zhang and J. Tao, “A nonlinear fuzzy neural network modeling approach using an improved genetic algorithm,” IEEE Transactions on Industrial Electronics, vol. 65, no. 7, pp. 5882–5892, Jul. 2017, doi: 10.1109/TIE.2017.2777415. pp [7] B. Keshanchi, A. Souri, and N. J. Navimipour, “An improved genetic algorithm for task scheduling in the cloud environments using the priority queues: formal verification, simulation, and statistical testing,” Journal of Systems and Software, vol. 124, pp. 1–21, Feb. 2017, doi: 10.1016/j.jss.2016.07.006. pp , , j j [8] Y. Huang et al., “An application of evolutionary system identification algorithm in modelling of energy production system,” Measurement: Journal of the International Measurement Confederation, vol. 114, pp. 122–131, Jan. 2018, doi: 10.1016/j.measurement.2017.09.009. j [9] D. L. Shanthi and K. Prasanna, “Energy efficient intelligent routing in WSN using dominant genetic algorithm,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 1, pp. 500–511, Feb. 2020, doi: 10.11591/ijece.v10i1.pp500-511. j pp [10] I. K. Mohammed and A. I. Abdulla, “Balancing a Segway robot using LQR controller based on genetic and bacteria foraging optimization algorithms,” Telkomnika (Telecommunication Computing Electronics and Control), vol. 18, no. 5, pp. 2642–2653, Oct. 2020, doi: 10.12928/TELKOMNIKA.v18i5.14717. [11] A. J. Moshayedi, M. Gheibollahi, and L. Liao, “The quadrotor dynamic modeling and study of meta-heuristic algorithms performance on optimization of PID controller index to control angles and tracking the route,” IAES International Journal of Robotics and Automation (IJRA), vol. 9, no. 4, pp. 256–270, Dec. 4. CONCLUSION The aim of this paper is to show the effectiveness of SPM for GA in optimization of a real discrete- time SI. Three types of OFs are used and according to all OFs, GA with SPM is able to find more optimal models, and additionally, quicker than without mating. In all runs, the models found using the mating technique have either lower or equal OF value than the runs without mating, indicating that the selected models are parsimonious yet with adequate accuracy. In validating the models, correlation tests are done to the selected models. Although the correlation tests show that the models do not fulfill the 95% confidence bandwidth completely, which is expected to be due to inherent noise of real data, superimposition of the predicted output from the models with the real output value provide convincing validation. Even when using a small population size, the technique is shown to be capable of reaching into untested territory of the search space. Using the mating technique, new points are able to be explored thus enabling the search for optimal models to become more promising than the traditional procedure of GA. From application perspective, future work may focus on changing the phenotype-to-genotype conversion for a more effective search of optimal models while from the method’s perspective, other crossover and selection types may be tested together with SPM to see whether faster convergence may be achieved. ACKNOWLEDGEMENTS The authors would like to express gratitude to Ministry of Higher Education Malaysia and Universiti Teknikal Malaysia Melaka (UTeM) for their financial support through FRGS/1/2018/TK03/UTEM/02/13 grant, technical support and facility. Single parent mating in genetic algorithm for real robotic system identification (Md Fahmi Abd Sama 8] C. K. Ting and H. K. Büning, “A mating strategy for multi-parent genetic algorithms by integrating tabu search,” in 20 Congress on Evolutionary Computation, CEC 2003 - Proceedings, 2003, vol. 2, pp. 1259–126 doi: 10.1109/CEC.2003.1299813. REFERENCES Voon, “Correlation based model validity tests for non-linear models,” International Journal of Control, vol. 44, no. 1, pp. 235–244, Jul. 1986, doi: 10.1080/00207178608933593. [30] A. Zabidi, N. M. Tahir, I. M. Yassin, and Z. I. Rizman, “The performance of binary artificial bee colony (BABC) in structure selection of polynomial NARX and NARMAX models,” International Journal on Advanced Science, Engineering and Information Technology, vol. 7, no. 2, pp. 373–379, Apr. 2017, doi: 10.18517/ijaseit.7.2.1387. REFERENCES Golberg, Genetic algorithms in search, optimization, and machine learning, 13th editi. Addison-Wesley Professional, 1989. [20] S. N. Sivanandam and S. N. Deepa, Introduction to genetic algorithms. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. g g p g y [20] S. N. Sivanandam and S. N. Deepa, Introduction to genetic algorithms. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. p g g g p g g 1] S. Mirjalili, J. Song Dong, A. S. Sadiq, and H. Faris, “Genetic algorithm: Theory, literature review, and application in ima reconstruction,” Nature-inspired optimizers, pp. 69–85, 2020. , p p , pp , [22] D. M. B.L.R., “DaISy: database for the identification of systems,” Department of Electrical Engineering, ESAT/STADIUS, KU Leuven, Belgium. Accessed: Aug. 15, 2021. [Online]. Available: http://homes.esat.kuleuven.be/$~$smc/daisy/. [23] I. Markovsky, J. C. Willems, S. Van Huffel, B. De Moor, and R. Pintelon, “Application of structured total least squares for system identification,” in Proceedings of the IEEE Conference on Decision and Control, 2004, vol. 4, pp. 3382–3387, doi: 10.1109/cdc.2004.1429229. [24] I. Markovsky, J. C. Willems, B. De Moor, K. U. Leuven, K. Arenberg, and B.- Leuven, “Comparison of identification algorithms on the database DAISY,” in Proceedings of the 17th International Symposium on Mathematical Theory of Networks and Systems (MTNS 2006), 2006, pp. 2858–2869. [25] I. M. Yassin, A. Zabidi, M. S. A. M. Ali, N. M. Tahir, H. Z. Abidin, and Z. I. Rizman, “Binary particle swarm optimization structure selection of nonlinear autoregressive moving average with exogenous inputs (NARMAX) model of a flexible robot arm,” International Journal on Advanced Science, Engineering and Information Technology, vol. 6, no. 5, pp. 630–637, 2016, doi: 10.18517/ijaseit.6.5.919. j [26] S. Hosseini, S. M. Saberali, and M. F. Sabahi, “Model order selection based on different information criteria for PDF estimation using maximum entropy method and application in cognitive radio systems,” in 7’th International Symposium on Telecommunications (IST’2014), Sep. 2014, pp. 1239–1244, doi: 10.1109/ISTEL.2014.7000893. [27] M. F. Abd Samad and A. R. Mohd Nasir, “Parameter magnitude-based information criterion in identification of discrete-time dynamic system,” Journal of Mechanical Engineering, vol. SI 4, no. 1, pp. 119–128, 2017. y y pp 8] M. F. A. Samad and A. R. M. Nasir, “Implementation of parameter magnitude-based information criterion in identification o real system,” Defence Science and Technical Bulletin, vol. 11, no. 1, pp. 99–106, 2018. [29] S. A. Billings and W. S. F. REFERENCES 2020, doi: 10.11591/ijra.v9i4.pp256-270. [12] N. A. M. Aseri et al., “Comparison of meta-heuristic algorithms for fuzzy modelling of COVID-19 illness’ severity classification,” IAES International Journal of Artificial Intelligence, vol. 11, no. 1, pp. 50–64, Mar. 2022, doi: 10.11591/ijai.v11.i1.pp50-64. j pp [13] M. El Midaoui, M. Qbadou, and K. Mansouri, “A fuzzy-based prediction approach for blood delivery using machine learning and genetic algorithm,” International Journal of Electrical and Computer Engineering (IJECE), vol. 12, no. 1, pp. 1056–1068, Feb. 2022, doi: 10.11591/ijece.v12i1.pp1056-1068. [14] F. A. Zainuddin and M. F. A. Samad, “A review of crossover methods and problem representation of genetic algorithm in recent engineering applications,” International Journal of Advanced Science and Technology, vol. 29, no. 6, pp. 759–769, 2020. [15] S. F. Galán, O. J. Mengshoel, and R. Pinter, “A novel mating approach for genetic algorithms,” Evolutionary Computation, vol. 21, no. 2, pp. 197–229, May 2013, doi: 10.1162/EVCO_a_00067. engineering applications, International Journal of Advanced Science and Technology, vol. 29, no. 6, pp. 759–769, 2020. [15] S. F. Galán, O. J. Mengshoel, and R. Pinter, “A novel mating approach for genetic algorithms,” Evolutionary Computation, vol. 21, no. 2, pp. 197–229, May 2013, doi: 10.1162/EVCO_a_00067. vo . , o. , pp. 97 9, ay 0 3, do : 0. 6 / VCO_a_00067. [16] A. C. Rizal and S. Suyanto, “Human-like constrained-mating to make genetic algorithm more explorative,” Jun. 2020, doi: 10.1109/ICoICT49345.2020.9166387. J. A. Ventura and S. H. Yoon, “A new genetic algorithm for lot-streaming flow shop scheduling with limited capacity buffers,” Journal of Intelligent Manufacturing, vol. 24, no. 6, pp. 1185–1196, May 2013, doi: 10.1007/s10845-012-0650-9. [ 7] J. . Ve tu a a d S. . oo , ew ge et c a go t o ot st ea g ow s op sc edu g w t ted capac ty bu e s, Journal of Intelligent Manufacturing, vol. 24, no. 6, pp. 1185–1196, May 2013, doi: 10.1007/s10845-012-0650-9. [18] C. K. Ting and H. K. Büning, “A mating strategy for multi-parent genetic algorithms by integrating tabu search,” in 2003 Congress on Evolutionary Computation, CEC 2003 - Proceedings, 2003, vol. 2, pp. 1259–1266, doi: 10.1109/CEC.2003.1299813. pp y [18] C. K. Ting and H. K. Büning, “A mating strategy for multi-parent genetic algorithms by integrating tabu search,” in 2003 Congress on Evolutionary Computation, CEC 2003 - Proceedings, 2003, vol. 2, pp. 1259–1266, doi: 10.1109/CEC.2003.1299813.  208 ISSN: 2252-8938 [19] D. E. Int J Artif Intell, Vol. 12, No. 1, March 2023: 201-208 BIOGRAPHIES OF AUTHORS Md Fahmi Abd Samad has earned his Ph.D. degree in mechanical engineering from Universiti Teknologi Malaysia and currently serving as an associate professor in Faculty of Mechanical Engineering, Universiti Teknikal Malaysia Melaka. His research interests are in system identification, control engineering and evolutionary computation. He is also a Chartered Engineer. He can be contacted at email: mdfahmi@utem.edu.my. Farah Ayiesya Zainuddin has earned Bachelor of Mechanical Engineering (Thermal-Fluids) and Master of Science in Mechanical Engineering from Universiti Teknikal Malaysia Melaka. Her research areas include genetic algorithm and aeronautics. She is currently pursuing PhD degree in mechanical engineering. She can be contacted at email: p041910001@student.utem.edu.my. Int J Artif Intell, Vol. 12, No. 1, March 2023: 201-208
https://openalex.org/W4283204155
http://sjme.journals.sharif.edu/article_22806_4ad0ba597ed411945d74d1a7af499d53.pdf
English
null
مدل سازی یک سیستم جاذب انرژی باد اینولوکس با ترکیب نتایج حل عددی در بستر نیمه تحلیلی
Muhandisī-i mikānīk-i Sharīf/Muhandisī-i mikānīk-i Sharīf
2,022
cc-by
9,873
karimian@modares.ac.ir saberrezaey@modares.ac.ir Original Article Tmwrwv}= O=@ |SQv= ?P=H sDU}U l} |R=UpOt |r}rLDxt}v QDU@ QO |OOa pL G}=Dv ?}mQD =@ Q=}O=DU= |O=@;|ra u=}t}Qm O}aU OWQ= |U=vWQ |wHWv=O |}=[Q Q@=Y TQOt C}@QD x=oWv=O l}vt |UOvyt |xOmWv=O Original Article Tmwrwv}= O=@ |SQv= ?P=H sDU}U l} |R=UpOt |r}rLDxt}v QDU@ QO |OOa pL G}=Dv ?}mQD =@ Q=}O=DU= |O=@;|ra u=}t}Qm O}aU OWQ= |U=vWQ |wHWv=O |}=[Q Q@=Y TQOt C}@QD x=oWv=O l}vt |UOvyt |xOmWv=O Original Article O=@ |SQv= ?P=H sDU}U QO |Oa@xU u=}QH |R=Ux}@W w xm@W O}rwD 'j}kLD u}= QO G}=Dv R= "CU= xOW |UQQ@ |OOa CQwYx@ 'O=@ |SQv= u}wv |=yxv=t=U R= |m} 'Tmwrwv}= u}tND w |R=UpOt Qw_vt x@ =}=Bx@W |m}t=v}OwQ}; pOt |r}rLDxt}v QDU@ QO '|OOa pL R= GQ=N |R=U CiH l} O=H}= =@ w xOW xO=iDU= QwmPt sDU}U |OQmrta |=yxYNWt BIM |r}rLD Om |=y|OwQw u=wvax@ |OOa pL R= pY=L G}=Dv 'u}qi; nv}rBwm \N |QwDvw VN@ QO |Q}oQ=mx@ |=Q@ |Y=YDN= w xv}y@ O=@ u}@QwD l} "CU= xDiQ Q=m x@ w xQB lwv K}LYD ?}=Q[ |Q}oQ=mx@ =@ "CU= xOW x=Q= w |L=Q] 'Tmwrwv}= sDU}U C=QF= VWwB Qw_vt x@ 'CQ;wro w uwDQ@ |xr=@vO KqY= ?}Q[ R}v w pDv=QB |BwD K}LYD ?ULQ@ `t=H |xar=]t l} "CU= xOW x=Q= wQ}v ?}=Q[ w u=wD ?}Q[ Q=DiQ '|Oa@xU G}=Dv "CU= xDiQo CQwY R}v xQB Oa@|@ pw] w xQB lwv CaQU C@Uv =O@tq ?=NDv= |xw}W wO Qy xm OyO|t u=Wv |r}rLD w |OOa pL |xw}W wO Qy |HvUQ=@Da= xm OQm xOy=Wt u=wD|t =yOQw=DUO u}ty |x}=B Q@ "OvQ=O Ck@=]t `HQt |=yxO=O =@ 'xOW u=R}t x@ |QwDvw VN@ QO =Q u=}QH CaQU CU= QO=k Tmwrwv}= O=@ |SQv= ?P=H sDU}U hOy =@ "OR=U sy=Qi OwQW w Cm=O R= |QDW}@ |SQv= w OyO V}=Ri= OYQO 70 OwOL hqDN= 'xOW xO=O xaUwD Om G}=Dv T=U= Q@ 'xDiW; |xr=@vO K}LYD ?}=Q[ |xU}=kt "CU= QDsm OYQO 15 R= xQ=wty u=wD ?}Q[ u}tND QO CQ;wro pOt w uwDQ@ pOt K}LYD '|r}rLDxt}v Om '|OOa pL 'Tmwrwv}= sDU}U 'O=@ |SQv= %|O}rm u=oS=w "xr=@vO K}LYD ?}Q[ 'pDv=QB karimian@modares.ac.ir saberrezaey@modares.ac.ir xtOkt "1 u=wD w QwDwQ Qw=DWo '|}x}w=R xv=mD |=k@ uwv=k R= xO=iDU= "OQw; CUO x@ Q}R a) r3dr (3) (1 a)3 rdr  (4) |v=wNty |y=oW}=tR; G}=Dv =@ xm CU= xOW xOQm |L=Q] QDlJwm O=a@= QO =Q Tmwrwv}= s CN=U |=Q@ ?U=vt |xO=t l} ?=NDv= w Tmwrwv}= |xvO@ Qo= xm OvO}UQ xH}Dv u}= x@ Q=Okt u}QDW}@ sDU}U |HwQN u=wD OwW xDN Cr=L QO |HwQN u=wD uOW QDsm OwHw =@ ' sQv Oqwi R= xOW C}wkD |m}DUqB |=yQ@}i |@=}DUO Qw_vt x@ =Q Tmwrwv}= |L=Q] QO =@ w |OOa CQwYx@ |QwDvw VN@ QO Ca |}xv}y@ |L=Q] C}=yv QO w xO=O Q=Qk p}rL VN@ QO CaQU u}QDW}@ xm OyO|t u=Wv u}@ |}x}w=R O=@ CyH =@ Tmwrwv}= sDU}U | |QwDvw VN@ Q]k Vy=m =@ [8]Vv=Q=mty w w OQmrta |UQQ@ x@ '|QwDvw VN@ pN=O u "OvDN=OQB |Oa@xU |R=UpOt R= xO=iDU= =@ w Q=Okt l} x@ =Q OwHwt Tmwrwv}= sDU}U |Q |HwQNu=wDxH}DvQOwswUwswO|=yu}@Qw swUQt |O}rwD `@=vt =@ xv}Ry T=U= Q@ CU Vy=m |Q}otWJ RQ] x@ xDWPo xyO OvJ QO |=Q@ xv}Ry u}QDsm =@ |O=YDk= Q_v R= Ovv=w s=Hv= |QDW}@ CkO =@ |O=@ |=yu}@QwD |R |x}Q_v |O=@ |=yu}@QwD |R=UpOt T=U= " "CU= xOW =Q |ki= QwLt |O=@ |=yu}@QwD R= hrDNt p |x}w=R w QDw `}RwD =@ |}=yxQB =@ O=@ u}@QwD [1311]Vv=Q=mtywu=}t}Qm"Ovm|tO}rwD=Qu |O=@ |=yu}@QwD OQmrta |R=UpOt w |U |}=v=wD BIM |x}Q_v xm OvO=O u=Wv w Ov |x}Q_v R= xO=iDU= =@ [14]Vv=Q=mty w |v=L] 60 xm OvDiQo xH}Dv 'VJ}B |x}w=R w QDw |R=U|]N p=ta= |=Q@ \=kv u}QDy@ xQB O x@ '|r}rLD w |OOa QDU@ wO Qy R= xO=iDU u}@QwD R}v w Tmwrwv}= |O=@ |SQv= ?P=H |OOa QDU@ wO ?}mQD "CU= xOW xDN=OQB u}O@ "CU= xDiQo CQwY u}qi; \N R= GQ pL xr}Uwx@ u; R= |Qw@a u=}QH w Tmwrw r rLDx v Om |=y|Ow w u= vax@ pL u sm=L CqO=at "2 BIM |x}Q_v Q@ sm=L CqO=at "1"2 _v w xQB u=tr= |x}Q_v VwQ wO j}irD R= BIM |x}Q_v u=wvax@ |O=@ u}@QwD |Oa@l} swDvtwt |x}Q_v QO "CU= pwL u=}QH "OwW|t xDiQo Q_v QO xQB |OwOLt=v O=OaD =@ Q_v QO C@=F Qorta lU}O uwJ w xOw@ =}=B w Q}PB=v sm=QD "OQ=Ov OwHw u=}QH xr=@vO QO |WNQJ CaQU Ou}}=B QO u=}QH Q=}at sHL OwW|t ZQi u}vJty HQ=N |wQ}v I}y 'u; Q@ xwqa "CU= xDi=} VQDUo QwDwQ =@ |m}D=DU= Q=Wi TB OwW|tv p=ta= u=}QH CUOu}}=B 'QwDwQ |xLiY QO xOW O}rwD |wQ}v =yvD "OUQ|t O=R; lU}O K]U s=tD QO w OwW|t pY=L CmQL xR=Ov= Ci= Qw; 1 pmW QO |O=@ u}@QwD QwDwQ |xLiY R= xOvQPo j@=]t =Q u=QW}B |wQ}v '|rwvQ@ uwv=k R= xO=iDU= =@ u=wD|t a)] (1) O swyit hqNQ@ "CU= |QwLt |}=kr= ?}Q[ a u; QO xm U}O \UwD xOW O=H}= |}x}w=R CmQL xR=Ov= 'CmQL xR=Ov= m R}v =Q QwDwQ CWB u=}QH "OwW|t xDio Qw=DWo u; x@ xm |W@vH|SQv=Qo="Ovt=v|txr=@vOVNQJ'ONQJ|tQwDwQ TB 'OwW sm Qorta lU}O R= xOt; CUO x@ |SQv= R= xr=@vO ;|t OwHw x@ =Q |U=tt |xir-wt Qorta lU}O VNQJ "O=O u=Wv 2 |xrO=at \UwD u=wD|t =Q |wkrL 1 + a0)  (2rdr) (2) ! xtOkt "1 CQwYx@ w xOw@ |U=tt |}=kr= ?}Q[ 'a0 u; QO xm |}x}w=R CaQU w QwDwQ VNQJ |}x}w=R CaQU ! xtOkt "1 wD u=wD w QwDwQ Qw=DWo '|}x}w=R xv=mD |=k@ uwv=k R= xO=iDU= "OQw; CUO x@ Q}R a) r3dr (3) a0(1 a)3 rdr  (4) |v=wNty |y=oW}=tR; G}=Dv =@ xm CU= xOW Vy=m Q=JO u=}QH CaQU 'Q=WiQB xOQm |L=Q] QDlJwm O=a@= QO =Q Tmwrwv}= sDU}U l} [6]Vv=Q=mty w p}D=B "OQ=O CN=U |=Q@ ?U=vt |xO=t l} ?=NDv= w |UQQ@ u=v; |rY= hOy "OvDN=U w Tmwrwv}= |xvO@ Qo= xm OvO}UQ xH}Dv u}= x@ =yu; "CU= Tmwrwv}= sDU}U |xvO@ Q=Okt u}QDW}@ sDU}U |HwQN u=wD OwW xDN=U xOW C}wkD |m}DUqB |=yQ@}i R= Cr=L QO |HwQN u=wD uOW QDsm OwHw =@ '?}=at |NQ@ p}rO x@ |rw Ow@ Oy=wN sQv Oqwi R= xOW C}wkD |m}DUqB |=yQ@}i |=Hx@ u=wD|t 'sQv Oqwi R= xO=iDU= "OQm xO=iDU= |@=}DUO Qw_vt x@ =Q Tmwrwv}= |L=Q] QO QF-wt |=yQDt=Q=B [7]xv}=D=@ w Qwm; =@ w |OOa CQwYx@ |QwDvw VN@ QO CaQU V}=Ri= |=Q@ xv}y@ |L=Q] l} x@ |}xv}y@ |L=Q] C}=yv QO w xO=O Q=Qk p}rLD w |UQQ@ OQwt |Oa@xU |R=UpOt VN@ QO CaQU u}QDW}@ xm OyO|t u=Wv G}=Dv "Ov=xOQm x=Q= sDU}U u}= |=Q@ u}@ |}x}w=R O=@ CyH =@ Tmwrwv}= sDU}U |xvO@ xm OwW|t pY=L |v=tR |QwDvw |QwDvw VN@ Q]k Vy=m =@ [8]Vv=Q=mty w C=y@ "OW=@ xDW=O xHQO 45 =D 45 w OQmrta |UQQ@ x@ '|QwDvw VN@ pN=O u}@QwD |xQB xU R= xO=iDU= w Tmwrwv}= "OvDN=OQB |Oa@xU |R=UpOt R= xO=iDU= =@ w |OOa VwQ x@ sDU}U |HwQN u=wD Q=Okt l} x@ =Q OwHwt Tmwrwv}= sDU}U |QwDvw VN@ Q]k Qo= xm OvDi=}QO =yu; |HwQNu=wDxH}DvQOwswUwswO|=yu}@QwDQOu=}QHCaQU'OvyOVy=mxv}y@ "O@=}|t V}=Ri= =yu}@QwD u}= swUQt |O}rwD `@=vt =@ xv}Ry T=U= Q@ CU}=@|t u=vJty O=@ |SQv= CavY Vy=m |Q}otWJ RQ] x@ xDWPo xyO OvJ QO O=@ |SQv= |xv}Ry xJQo= "Ovm C@=kQ |=Q@ xv}Ry u}QDsm =@ |O=YDk= Q_v R= Ovv=wD@ O}=@ |O=@ |=yxSwQB =t= CU= xDi=} s=Hv= |QDW}@ CkO =@ |O=@ |=yu}@QwD |R=UpOt xJQy "Ovvm C@=kQ jQ@ O}rwD |x}Q_v |O=@ |=yu}@QwD |R=UpOt T=U= "Ow@ Oy=wN QDOvtOwU C@=kQ u}= 'OQ}PB "CU= xOW x=Q= [9]CQ;wro \UwD xm CU= BIM =Q |ki= QwLt |O=@ |=yu}@QwD R= hrDNt pOt xU [10]Vv=Q=mty w w=}Uy |x}w=R w QDw `}RwD =@ |}=yxQB =@ O=@ u}@QwD xm OvDi=}QO w OvO=O Q=Qk |UQQ@ OQwt [1311]Vv=Q=mtywu=}t}Qm"Ovm|tO}rwD=Qu=wD?}Q[u}QDW}@xOWxv}y@VJ}B |O=@ |=yu}@QwD OQmrta |R=UpOt w |UQQ@ x@ BIM |x}Q_v R= xO=iDU= =@ |}=v=wD BIM |x}Q_v xm OvO=O u=Wv w OvDN=OQB =}=B=v w =}=B \}=QW QO hrDNt |x}Q_v R= xO=iDU= =@ [14]Vv=Q=mty w |v=L] "OQ=O XwYN u}= QO |yHwD p@=k 60 xm OvDiQo xH}Dv 'VJ}B |x}w=R w QDw `}RwD |R=U|]N R= TB w BIM |R=U|]N p=ta= |=Q@ \=kv u}QDy@ xQB OYQO 37 =D 30 w QDw OYQO 64 =D "OvDUy x@ '|r}rLD w |OOa QDU@ wO Qy R= xO=iDU= Q@ O}m-=D =@ Q[=L VywSB QO u}@QwD R}v w Tmwrwv}= |O=@ |SQv= ?P=H sDU}U |QDt=Q=B |UQQ@ w |R=UpOt |OOa QDU@ wO ?}mQD "CU= xOW xDN=OQB u; |QwDvw VN@ QO xOW x}@aD |O=@ u}O@ "CU= xDiQo CQwY u}qi; \N R= GQ=N CQwYx@ xar=]t u}= QO |r}rLD w pL xr}Uwx@ u; R= |Qw@a u=}QH w Tmwrwv}= sDU}U xUOvy =OD@= QO xm |vat |r}rLDxt}v Om |=y|OwQw u=wvax@ pL u}= |=y|HwQN w xOW pOt |OOa R= pY=L G}=Dv R= xO=iDU= =@ TBU "Ov=xOW xDiQo Q_v QO BIM |x}Q_v C=Q}}eD w BIM |x}Q_v KqY= hrDNt ?}=Q[ Q}F-=D |UQQ@ x@ QwmPt |x}Q_v OW DN= =D = v l v C m =v ; = D = = """ Tmwrwv}= O=@ |SQv= ?P=H sDU}U l} |R=UpOt sm=L CqO=at "2 BIM |x}Q_v Q@ sm=L CqO=at "1"2 xOt; CUO x@ xv=mD |x}Q_v w xQB u=tr= |x}Q_v VwQ wO j}irD R= BIM |x}Q_v |va} lQLt lU}O l} u=wvax@ |O=@ u}@QwD |Oa@l} swDvtwt |x}Q_v QO "CU= 'uoty Qorta lU}O u}= pwL u=}QH "OwW|t xDiQo Q_v QO xQB |OwOLt=v O=OaD =@ xir-wt TB 'OwW|t xDiQo Q_v QO C@=F Qorta lU}O uwJ w xOw@ =}=B w Q}PB=v sm=QD "OQ=Ov OwHw u=}QH xr=@vO QO |WNQJ CaQU |xLiY CUOq=@ w CUOu}}=B QO u=}QH Q=}at sHL OwW|t ZQi u}vJty w CUOq=@ QO p=}U Q@ |HQ=N |wQ}v I}y 'u; Q@ xwqa "CU= xDi=} VQDUo QwDwQ u=}QH Q=Wi x@ xOW |@=}R=@ |m}D=DU= Q=Wi TB OwW|tv p=ta= u=}QH CUOu}}=B R= xm CU= xv=QW}B |wQ}v 'QwDwQ |xLiY QO xOW O}rwD |wQ}v =yvD "OUQ|t O=R; u=}QH "CU= CN=wvm} lU}O K]U s=tD QO w OwW|t pY=L CmQL xR=Ov= Ci= C}=yv QO "CU= xOW xOQw; 1 pmW QO |O=@ u}@QwD QwDwQ |xLiY R= xOvQPo %OQm G=QNDU= 1 |x]@=Q j@=]t =Q u=QW}B |wQ}v '|rwvQ@ uwv=k R= xO=iDU= =@ u=wD|t T = 1 2AU2 1 [4a(1 a)] (1) |x}Q_v QO 'Qorta lU}O swyit hqNQ@ "CU= |QwLt |}=kr= ?}Q[ a u; QO xm CU= |WNQJ Qorta lU}O \UwD xOW O=H}= |}x}w=R CmQL xR=Ov= 'CmQL xR=Ov= VNQJ CyH hr=Nt xm R}v =Q QwDwQ CWB u=}QH "OwW|t xDio Qw=DWo u; x@ xm VNQJCyHR=}vOQwt|W@vH|SQv=Qo="Ovt=v|txr=@vOVNQJ'ONQJ|tQwDwQ "O@=}|t Vy=m O}it Q=m TB 'OwW sm Qorta lU}O R= xOt; CUO x@ |SQv= R= xr=@vO u=tr= l} QO CU=QD "OQw;|t OwHw x@ =Q |U=tt |xir-wt Qorta lU}O VNQJ "O=O u=Wv 2 |xrO=at \UwD u=wD|t =Q |wkrL dT = 1 2 2r2 4a0(1 + a0)  (2rdr) (2) "OwW|t h}QaD a0 = !2 CQwYx@ w xOw@ |U=tt |}=kr= ?}Q[ 'a0 u; QO xm =@ "CU= u=}QH VNQJ |}x}w=R CaQU w QwDwQ VNQJ |}x}w=R CaQU ! xtOkt "1 VN@ R= |HwQN u=}QH ,=twO 'Ovm|t u}t-=D Tmwrwv}= |OwQw VN@ QO =Q u=}QH w |}qa \UwD Tmwrwv}= swyit "OW=@ nvy=ty u; =@ O}=@ Tmwrwv}= |}=yDv= w ?Yv |=yxv}Ry Vy=m =@ xm Ovm|t =aO= KQ] u}= "OW KQ]t [3w2]TwrwBwQOv= xOQm O=H}= O=@ |SQv= CavY QO |t}_a pwLD 'swUQt |O=@ |=yu}@QwD |Q=Oyov "CU= w |m}t=v}OwQ}; Q_v R= sy |RwQt= pw=ODt w nQR@ |=yu}@QwD |=yxQB |L=Q] |Q=Oyov w Q}taD |iQ] R= w CU= xO}J}B w Q=wWO |Q=m |m}v=mt Q_v R= sy Q=mx@ u}@QwD |=yxQB xm |DQwY QO "Ovm|t p}tLD =Q |Q=}U@ |xv}Ry =yu; O=a@= uwJ w CU= QDTQDUO QO Tmwrwv}= O=@ |SQv= ?P=H sDU}U QO xDiQ |v=OvJ |xv}Ry w |SQv= hQY x@ R=}v =yu; |Q=Oyov w Q}taD 'OvQ=O |QDlJwm |xvO@ p@=kDt QF= p}rO x@ Tmwrwv}= sDU}U OQmrta |R=Ux}@W "CW=O Oy=wNv R= |Q=}U@ uwJty w xOw@ xO}J}B ,=D@Uv 'u}@QwD |=yxQB w O=@ u=}QH 'sDU}U C=ar=]t ,=Q}N= "CU= [1]|D=@U=Lt Cq=}U l}t=v}O OvtR=}v |UOvyt p=Ut u}vJty w Tmwrwv}= pN=O O=@ u=}QH p}rLD w |R=UpOt OQwt QO |}xOQDUo |HQ=N u=}QH p}rLD "CU= xDiQo CQwY sDU}U u}= pwL |HQ=N u=}QH u=O}t ,qw= xm =QJ OQ=O C}ty= u; pN=O u=}QH Ovv=ty ,=k}kO Tmwrwv}= sDU}U pwL u}@QwD sDU}U QO |r=wDt |O=@ |=yu}@QwD u}vJty [4]Vv=Q=mty w |}qa xU}=kt QO xm OvDi=}QO w OvOQm |UQQ@ |@QHD VwQ R= xO=iDU= =@ =Q Tmwrwv}= |O=@ 'OQ=O Q=Qk Tmwrwv}= O=@ |SQv= ?P=H sDU}U QO u}@QwD l} \ki xm |Dr=L =@ 72 u=R}t x@ u}@QwD xU |=Q@ w OYQO 52 u=R}t x@ u}@QwD wO |=Q@ sDU}U xOR=@ xU 'Q=OVWwB |=yu}@QwD |=Q@ [5]Vv=Q=mty w Ck=OY "O@=}|t V}=Ri= OYQO CQwYx@ Ovv=t QRw}i}O w Ovv=t pR=v '|}xv=wDU= |=ypmW x@ |r=NwD |x_iLt '|Owta w |ki= |HQ=N |=yu=}QH |=Q@ =Q =yu; TBU w xOQm |L=Q] |Oa@xU |x_iLt |=Q@ j}kLD u}= QO "OvO=O Q=Qk |UQQ@ OQwt |OOa w |r}rLD CQwYx@ |x}L=v l} O=H}= Cra x@ pR=v |OwQw CtUk QO xm OW xOy=Wt Ovv=t pR=v pwUt xOvU}wv  "1400 12 24 VQ}PB '1400 10 28 x}LqY= '1400 8 25 Ci=}QO %M}Q=D DOI:10.24200/J40.2020.59289.1626 sm=L CqO=at "2 BIM |x}Q_v Q@ sm=L CqO=at "1"2 w xQB u=tr= |x}Q_v VwQ wO j}irD R= BIM |x}Q_v wvax@ |O=@ u}@QwD |Oa@l} swDvtwt |x}Q_v QO "CU= wL u=}QH "OwW|t xDiQo Q_v QO xQB |OwOLt=v O=OaD =@ _v QO C@=F Qorta lU}O uwJ w xOw@ =}=B w Q}PB=v sm=QD "OQ=Ov OwHw u=}QH xr=@vO QO |WNQJ CaQU u}}=B QO u=}QH Q=}at sHL OwW|t ZQi u}vJty =N |wQ}v I}y 'u; Q@ xwqa "CU= xDi=} VQDUo QwDwQ |m}D=DU= Q=Wi TB OwW|tv p=ta= u=}QH CUOu}}=B wDwQ |xLiY QO xOW O}rwD |wQ}v =yvD "OUQ|t O=R; U}O K]U s=tD QO w OwW|t pY=L CmQL xR=Ov= Ci= ; 1 pmW QO |O=@ u}@QwD QwDwQ |xLiY R= xOvQPo ]t =Q u=QW}B |wQ}v '|rwvQ@ uwv=k R= xO=iDU= =@ u=wD|t a)] (1) wyit hqNQ@ "CU= |QwLt |}=kr= ?}Q[ a u; QO xm O \UwD xOW O=H}= |}x}w=R CmQL xR=Ov= 'CmQL xR=Ov= }v =Q QwDwQ CWB u=}QH "OwW|t xDio Qw=DWo u; x@ xm W@vH|SQv=Qo="Ovt=v|txr=@vOVNQJ'ONQJ|tQwDwQ 'OwW sm Qorta lU}O R= xOt; CUO x@ |SQv= R= xr=@vO |t OwHw x@ =Q |U=tt |xir-wt Qorta lU}O VNQJ "O=O u=Wv 2 |xrO=at \UwD u=wD|t =Q |wkrL + a0)  (2rdr) (2) CQwYx@ w xOw@ |U=tt |}=kr= ?}Q[ 'a0 u; QO xm }x}w=R CaQU w QwDwQ VNQJ |}x}w=R CaQU ! xtOkt "1 CQwYx@ u=wD|t =Q |O}rwD u=wD w QwDwQ Qw=DWo '|}x}w=R xv=mD |=k@ uwv=k R= xO=iDU= "OQw; CUO x@ Q}R dQ = 4U1a0(1 a) r3dr (3) |v=wNty |y=oW}=tR; G}=Dv =@ xm CU= xOW Vy=m Q=JO u=}QH CaQU 'Q=W xOQm |L=Q] QDlJwm O=a@= QO =Q Tmwrwv}= sDU}U l} [6]Vv=Q=mty w p}D=B " CN=U |=Q@ ?U=vt |xO=t l} ?=NDv= w |UQQ@ u=v; |rY= hOy "OvDN= Tmwrwv}= |xvO@ Qo= xm OvO}UQ xH}Dv u}= x@ =yu; "CU= Tmwrwv}= sDU}U | Q=Okt u}QDW}@ sDU}U |HwQN u=wD OwW xDN=U xOW C}wkD |m}DUqB |=yQ@} Cr=L QO |HwQN u=wD uOW QDsm OwHw =@ '?}=at |NQ@ p}rO x@ |rw Ow@ Oy sQv Oqwi R= xOW C}wkD |m}DUqB |=yQ@}i |=Hx@ u=wD|t 'sQv Oqwi R= xO=i "OQm xO=i |@=}DUO Qw_vt x@ =Q Tmwrwv}= |L=Q] QO QF-wt |=yQDt=Q=B [7]xv}=D=@ w Qwm; =@ w |OOa CQwYx@ |QwDvw VN@ QO CaQU V}=Ri= |=Q@ xv}y@ |L=Q] l |}xv}y@ |L=Q] C}=yv QO w xO=O Q=Qk p}rLD w |UQQ@ OQwt |Oa@xU |R=U VN@ QO CaQU u}QDW}@ xm OyO|t u=Wv G}=Dv "Ov=xOQm x=Q= sDU}U u}= u}@ |}x}w=R O=@ CyH =@ Tmwrwv}= sDU}U |xvO@ xm OwW|t pY=L |v=tR |Q |QwDvw VN@ Q]k Vy=m =@ [8]Vv=Q=mty w C=y@ "OW=@ xDW=O xHQO 45 =D  w OQmrta |UQQ@ x@ '|QwDvw VN@ pN=O u}@QwD |xQB xU R= xO=iDU= w Tmw "OvDN=OQB |Oa@xU |R=UpOt R= xO=iDU= =@ w |OOa VwQ x@ sDU}U |HwQN Q=Okt l} x@ =Q OwHwt Tmwrwv}= sDU}U |QwDvw VN@ Q]k Qo= xm OvDi=}QO = |HwQNu=wDxH}DvQOwswUwswO|=yu}@QwDQOu=}QHCaQU'OvyOVy=mx "O@=}|t V}=Ri= =yu}@QwD swUQt |O}rwD `@=vt =@ xv}Ry T=U= Q@ CU}=@|t u=vJty O=@ |SQv= CavY Vy=m |Q}otWJ RQ] x@ xDWPo xyO OvJ QO O=@ |SQv= |xv}Ry xJQo= "Ovm C |=Q@ xv}Ry u}QDsm =@ |O=YDk= Q_v R= Ovv=wD@ O}=@ |O=@ |=yxSwQB =t= CU= x s=Hv= |QDW}@ CkO =@ |O=@ |=yu}@QwD |R=UpOt xJQy "Ovvm C@=kQ jQ@ O |x}Q_v |O=@ |=yu}@QwD |R=UpOt T=U= "Ow@ Oy=wN QDOvtOwU C@=kQ u}= 'O "CU= xOW x=Q= [9]CQ;wro \UwD xm CU= B =Q |ki= QwLt |O=@ |=yu}@QwD R= hrDNt pOt xU [10]Vv=Q=mty w w=}Uy |x}w=R w QDw `}RwD =@ |}=yxQB =@ O=@ u}@QwD xm OvDi=}QO w OvO=O Q=Qk |UQQ@ O [1311]Vv=Q=mtywu=}t}Qm"Ovm|tO}rwD=Qu=wD?}Q[u}QDW}@xOWxv}y@V |O=@ |=yu}@QwD OQmrta |R=UpOt w |UQQ@ x@ BIM |x}Q_v R= xO=iDU |}=v=wD BIM |x}Q_v xm OvO=O u=Wv w OvDN=OQB =}=B=v w =}=B \}=QW QO hr |x}Q_v R= xO=iDU= =@ [14]Vv=Q=mty w |v=L] "OQ=O XwYN u}= QO |yHwD 60 xm OvDiQo xH}Dv 'VJ}B |x}w=R w QDw `}RwD |R=U|]N R= TB w B sm=L CqO=at "2 BIM |x}Q_v Q@ sm=L CqO=at "1"2 xOt; CUO x@ xv=mD |x}Q_v w xQB u=tr= |x}Q_v VwQ wO j}irD R= BIM |x}Q_v |va} lQLt lU}O l} u=wvax@ |O=@ u}@QwD |Oa@l} swDvtwt |x}Q_v QO "CU= 'uoty Qorta lU}O u}= pwL u=}QH "OwW|t xDiQo Q_v QO xQB |OwOLt=v O=OaD =@ xir-wt TB 'OwW|t xDiQo Q_v QO C@=F Qorta lU}O uwJ w xOw@ =}=B w Q}PB=v sm=QD "OQ=Ov OwHw u=}QH xr=@vO QO |WNQJ CaQU |xLiY CUOq=@ w CUOu}}=B QO u=}QH Q=}at sHL OwW|t ZQi u}vJty w CUOq=@ QO p=}U Q@ |HQ=N |wQ}v I}y 'u; Q@ xwqa "CU= xDi=} VQDUo QwDwQ u=}QH Q=Wi x@ xOW |@=}R=@ |m}D=DU= Q=Wi TB OwW|tv p=ta= u=}QH CUOu}}=B R= xm CU= xv=QW}B |wQ}v 'QwDwQ |xLiY QO xOW O}rwD |wQ}v =yvD "OUQ|t O=R; u=}QH "CU= CN=wvm} lU}O K]U s=tD QO w OwW|t pY=L CmQL xR=Ov= Ci= C}=yv QO "CU= xOW xOQw; 1 pmW QO |O=@ u}@QwD QwDwQ |xLiY R= xOvQPo %OQm G=QNDU= 1 |x]@=Q j@=]t =Q u=QW}B |wQ}v '|rwvQ@ uwv=k R= xO=iDU= =@ u=wD|t T = 1 2AU2 1 [4a(1 a)] (1) |x}Q_v QO 'Qorta lU}O swyit hqNQ@ "CU= |QwLt |}=kr= ?}Q[ a u; QO xm CU= |WNQJ Qorta lU}O \UwD xOW O=H}= |}x}w=R CmQL xR=Ov= 'CmQL xR=Ov= VNQJ CyH hr=Nt xm R}v =Q QwDwQ CWB u=}QH "OwW|t xDio Qw=DWo u; x@ xm VNQJCyHR=}vOQwt|W@vH|SQv=Qo="Ovt=v|txr=@vOVNQJ'ONQJ|tQwDwQ "O@=}|t Vy=m O}it Q=m TB 'OwW sm Qorta lU}O R= xOt; CUO x@ |SQv= R= xr=@vO u=tr= l} QO CU=QD "OQw;|t OwHw x@ =Q |U=tt |xir-wt Qorta lU}O VNQJ "O=O u=Wv 2 |xrO=at \UwD u=wD|t =Q |wkrL dT = 1 2 2r2 4a0(1 + a0)  (2rdr) (2) "OwW|t h}QaD a0 = !2 CQwYx@ w xOw@ |U=tt |}=kr= ?}Q[ 'a0 u; QO xm |v=wNty |y=oW}=tR; G}=Dv =@ xOQm |L=Q] QDlJwm O=a@= QO =Q CN=U |=Q@ ?U=vt |xO=t l Tmwrwv}= |xvO@ Qo= xm OvO}UQ Q=Okt u}QDW}@ sDU}U |HwQN Cr=L QO |HwQN u=wD uOW QD sQv Oqwi R= xOW C}wkD |m}DU |@=}DUO Qw_vt x@ =Q Tmwrwv}= =@ w |OOa CQwYx@ |QwDvw V |}xv}y@ |L=Q] C}=yv QO w xO VN@ QO CaQU u}QDW}@ xm O u}@ |}x}w=R O=@ CyH =@ Tmwrw |QwDvw VN@ Q]k Vy=m =@ [8] w OQmrta |UQQ@ x@ '|QwDvw V "OvDN=OQB |Oa@xU |R=UpOt R Q=Okt l} x@ =Q OwHwt Tmwrwv} |HwQNu=wDxH}DvQOwswUws swUQt |O}rwD `@=vt =@ xv}Ry T Vy=m |Q}otWJ RQ] x@ xDWPo |=Q@ xv}Ry u}QDsm =@ |O=YDk= s=Hv= |QDW}@ CkO =@ |O=@ | |x}Q_v |O=@ |=yu}@QwD |R=U =Q |ki= QwLt |O=@ |=yu}@QwD |x}w=R w QDw `}RwD =@ |}=yxQB =@ [1311] = =m = m m |v=wNty |y=oW}=tR; G}=Dv =@ xm CU= xOW Vy=m Q=JO u=}QH CaQU 'Q=WiQB xOQm |L=Q] QDlJwm O=a@= QO =Q Tmwrwv}= sDU}U l} [6]Vv=Q=mty w p}D=B "OQ=O CN=U |=Q@ ?U=vt |xO=t l} ?=NDv= w |UQQ@ u=v; |rY= hOy "OvDN=U w Tmwrwv}= |xvO@ Qo= xm OvO}UQ xH}Dv u}= x@ =yu; "CU= Tmwrwv}= sDU}U |xvO@ Q=Okt u}QDW}@ sDU}U |HwQN u=wD OwW xDN=U xOW C}wkD |m}DUqB |=yQ@}i R= Cr=L QO |HwQN u=wD uOW QDsm OwHw =@ '?}=at |NQ@ p}rO x@ |rw Ow@ Oy=wN sQv Oqwi R= xOW C}wkD |m}DUqB |=yQ@}i |=Hx@ u=wD|t 'sQv Oqwi R= xO=iDU= "OQm xO=iDU= |@=}DUO Qw_vt x@ =Q Tmwrwv}= |L=Q] QO QF-wt |=yQDt=Q=B [7]xv}=D=@ w Qwm; =@ w |OOa CQwYx@ |QwDvw VN@ QO CaQU V}=Ri= |=Q@ xv}y@ |L=Q] l} x@ |}xv}y@ |L=Q] C}=yv QO w xO=O Q=Qk p}rLD w |UQQ@ OQwt |Oa@xU |R=UpOt VN@ QO CaQU u}QDW}@ xm OyO|t u=Wv G}=Dv "Ov=xOQm x=Q= sDU}U u}= |=Q@ u}@ |}x}w=R O=@ CyH =@ Tmwrwv}= sDU}U |xvO@ xm OwW|t pY=L |v=tR |QwDvw |QwDvw VN@ Q]k Vy=m =@ [8]Vv=Q=mty w C=y@ "OW=@ xDW=O xHQO 45 =D 45 w OQmrta |UQQ@ x@ '|QwDvw VN@ pN=O u}@QwD |xQB xU R= xO=iDU= w Tmwrwv}= "OvDN=OQB |Oa@xU |R=UpOt R= xO=iDU= =@ w |OOa VwQ x@ sDU}U |HwQN u=wD Q=Okt l} x@ =Q OwHwt Tmwrwv}= sDU}U |QwDvw VN@ Q]k Qo= xm OvDi=}QO =yu; |HwQNu=wDxH}DvQOwswUwswO|=yu}@QwDQOu=}QHCaQU'OvyOVy=mxv}y@ "O@=}|t V}=Ri= =yu}@QwD u}= (2) x@ '|r}rLD w |OOa QDU@ wO Qy R= xO=iDU= Q@ O}m-=D =@ Q[=L VywSB QO u}@QwD R}v w Tmwrwv}= |O=@ |SQv= ?P=H sDU}U |QDt=Q=B |UQQ@ w |R=UpOt |OOa QDU@ wO ?}mQD "CU= xOW xDN=OQB u; |QwDvw VN@ QO xOW x}@aD |O=@ u}O@ "CU= xDiQo CQwY u}qi; \N R= GQ=N CQwYx@ xar=]t u}= QO |r}rLD w pL xr}Uwx@ u; R= |Qw@a u=}QH w Tmwrwv}= sDU}U xUOvy =OD@= QO xm |vat |r}rLDxt}v Om |=y|OwQw u=wvax@ pL u}= |=y|HwQN w xOW pOt |OOa R= pY=L G}=Dv R= xO=iDU= =@ TBU "Ov=xOW xDiQo Q_v QO BIM |x}Q_v C=Q}}eD w BIM |x}Q_v KqY= hrDNt ?}=Q[ Q}F-=D |UQQ@ x@ QwmPt |x}Q_v xOW xDN=OQB xQB |=DU=Q QO R}v w xQB lwv CaQU ?ULQ@ |m}t=v}OwQ}; |=yQDt=Q=B "CU= 38 2 |xQ=tW '38 3 |xQwO '14 1 R}}=B h}QW l}v=mt |UOvyt "xDiW; xr=@vO K}LYD |=Q@ uwDQ@ w CQ;wro |=ypOt "1 pwOH xOW KqY= u=QW}B |wQ}v ?}Q[ |v=QL@ |QwLt |}=kr= ?}Q[ pOt 4a(1 (53a)a 4 )F 0 2 [9]CQ;wro 1 816 4 p1 816 1  (1 a) 0 3262 [17]u=Q=mty w uwDQ@ u=wD|tp=L'OvOWK}QWDpt=mQw]x@xQBu=tr=wxv=mD|=yx}Q_vxmu}=R=TB x@ u=QW}B |wQ}v xm ?}DQD u}= x@ "OQm G=QNDU= =Q R=}v OQwt \@=wQ w ?}mQD =Q =yu; xv=mD |x}Q_v \UwD xQB |=DU=Q QO |wkrL |=yu=tr= R= s=Om Qy |=Q@ xOt; CUO =D 8 \@=wQ R= xO=iDU= =@ u=wD|t p=L "OvQ}o|t Q=Qk Q@=Q@ sy =@ xQB u=tr= |x}Q_v w %CN=OQB u=wD w Qw=DWo 'u=QW}B |wQ}v |x@U=Lt x@ 10 T = B N X i=1 Fni (8) Q = B N X i=1 Ftiri (9) P = B N X i=1 Ftiri = Q (10) Tmwrwv}= sDU}U Q@ sm=L CqO=at "2"2 |=yu}@QwDQOxJv;=@xrUtl}R}iTmwrwv}=O=@|SQv=?P=HsDU}UQOxm=Hu;R= sDU}U u}= |UQQ@ QO CU= sRq u}=Q@=v@ 'OQ=O Cw=iD OwW|t QwYDt pw=ODt |O=@ CqO=at w |SQv= w sQH |=k@ CqO=at =Pr "OwW xi=[= |Q_v C=_Lqt |NQ@ Q}PB=vsm=QD'GRrQ}ep=}Uu=O}t|=Q@pQDvmsHLl}|wQQ@|}x}w=Rw|]NswDvtwt [42]"Ow@ Ovy=wN Q}R CQwYx@ w |r=QoDv= sQi x@ uQ=kDt w I A V:dA = 0 (11) I A uzV:dA = T I A PdA:ez (12) I A V:dA = 0 (13) [16]"xQB Q@ OQ=w |m}t=v}OwQ}; |=ywQ}v C=}RH "2 pmW xQB lwv CaQU C@Uv  = R U1 w |rLt xQB lwv CaQU C@Uv r = r U1 xm "OvDUy OwW|txO=iDU=xQBu=tr=|x}Q_vR='xQB|UOvyC=YNWtuDiQoQ_vQO|=Q@ w OwW|t s}UkD p=@ xv=yO |=DU=Q QO u=tr= |v}at O=OaD x@ QwDwQ xQB u; QO xm "OW=@ xDW=Ov OwHw =yu=tr= u}@ |m}t=v}OwQ; VvmsyQ@ I}y xm CU= u}= Q@ ZQi x@ =Q xQB Qy Q@ OQ=w pm u=tt w wQ}v u=wD|t xQB |=DU=Q QO |Q}op=QoDv= =@ C}=yv QO "CU= xOW xOQw; 2 pmW QO xQB Q@ OQ=w |m}t=v}OwQ}; |=ywQ}v p}rLD "OQw; CUO Qy Q@ OQ=w Qw=DWo w u=QW}B |wQ}v 'xQB Qy |wQ u=tr= |YNWt O=OaD ZQi =@ %OW Oy=wN x@U=Lt u}vJ R}v u=tr= dQ = (1 a)2U2 1 sin2 (CL(sin ) Cd(cos )) rdr (5) 2 |xQ=tW '383 |xQwO '1401 R}}=B h}QW l}v=mt |UOvyt "xDiW; xr=@vO K}LYD |=Q@ uwDQ@ w CQ;wro |=ypOt "1 pwOH T = B N X i=1 Fni (8) Q = B N X i=1 Ftiri (9) P = B N X i=1 Ftiri = Q (10) [16]"xQB Q@ OQ=w |m}t=v}OwQ}; |=ywQ}v C=}RH "2 pmW xQB lwv CaQU C@Uv  = R U1 w |rLt xQB lwv CaQU C@Uv r = r U1 xm "OvDUy Tmwrwv}= sDU}U Q@ sm=L CqO=at "2"2 |=yu}@QwDQOxJv;=@xrUtl}R}iTmwrwv}=O=@|SQv=?P=HsDU}UQOxm=Hu;R= sDU}U u}= |UQQ@ QO CU= sRq u}=Q@=v@ 'OQ=O Cw=iD OwW|t QwYDt pw=ODt |O=@ CqO=at w |SQv= w sQH |=k@ CqO=at =Pr "OwW xi=[= |Q_v C=_Lqt |NQ@ Q}PB=vsm=QD'GRrQ}ep=}Uu=O}t|=Q@pQDvmsHLl}|wQQ@|}x}w=Rw|]NswDvtwt [42]"Ow@ Ovy=wN Q}R CQwYx@ w |r=QoDv= sQi x@ uQ=kDt w I A V:dA = 0 (11) I A uzV:dA = T I A PdA:ez (12) [16]"xQB Q@ OQ=w |m}t=v}OwQ}; |=ywQ}v C=}RH "2 pmW xQB lwv CaQU C@Uv  = R U1 w |rLt xQB lwv CaQU C@Uv r = r U1 xm "OvDUy OwW|txO=iDU=xQBu=tr=|x}Q_vR='xQB|UOvyC=YNWtuDiQoQ_vQO|=Q@ w OwW|t s}UkD p=@ xv=yO |=DU=Q QO u=tr= |v}at O=OaD x@ QwDwQ xQB u; QO xm "OW=@ xDW=Ov OwHw =yu=tr= u}@ |m}t=v}OwQ; VvmsyQ@ I}y xm CU= u}= Q@ ZQi x@ =Q xQB Qy Q@ OQ=w pm u=tt w wQ}v u=wD|t xQB |=DU=Q QO |Q}op=QoDv= =@ C}=yv QO "CU= xOW xOQw; 2 pmW QO xQB Q@ OQ=w |m}t=v}OwQ}; |=ywQ}v p}rLD "OQw; CUO Qy Q@ OQ=w Qw=DWo w u=QW}B |wQ}v 'xQB Qy |wQ u=tr= |YNWt O=OaD ZQi =@ %OW Oy=wN x@U=Lt u}vJ R}v u=tr= Tmwrwv}= sDU}U Q@ sm=L CqO=at "2"2 |=yu}@QwDQOxJv;=@xrUtl}R}iTmwrwv}=O=@|SQv=?P=HsDU}UQOxm=Hu;R= sDU}U u}= |UQQ@ QO CU= sRq u}=Q@=v@ 'OQ=O Cw=iD OwW|t QwYDt pw=ODt |O=@ CqO=at w |SQv= w sQH |=k@ CqO=at =Pr "OwW xi=[= |Q_v C=_Lqt |NQ@ Q}PB=vsm=QD'GRrQ}ep=}Uu=O}t|=Q@pQDvmsHLl}|wQQ@|}x}w=Rw|]NswDvtwt [42]"Ow@ Ovy=wN Q}R CQwYx@ w |r=QoDv= sQi x@ uQ=kDt w A I A V:dA = 0 (13) I A ruV:dA = QT (14) I A p  + 1 2 V2  V:dA = P (15) dQ = (1 a)2U2 1 sin2 (CL(sin ) Cd(cos )) rdr (5) dT = (1 a)2U2 1 sin2 (CL(cos ) + Cd(sin )) rdr (6) QwDwQ l} R= Cw=iDt 'OwOLt xQB O=OaD =@ QwDwQ l} |=Q@ p=@ lwv |=yx@=OQo Qw[L p=ta= w OwOLt xQB O=OaD uDiQo Q_v QO =@ "CU= C}=yv|@ xQB O=OaD =@ (13) (14) dQ = (1 a)2U2 1 sin2 (CL(sin ) Cd(cos )) rdr (5) dT = (1 a)2U2 1 sin2 (CL(cos ) + Cd(sin )) rdr (6) (5) (6) QwDwQ l} R= Cw=iDt 'OwOLt xQB O=OaD =@ QwDwQ l} |=Q@ p=@ lwv |=yx@=OQo Qw[L p=ta= w OwOLt xQB O=OaD uDiQo Q_v QO =@ "CU= C}=yv|@ xQB O=OaD =@ QF= pDv=QB KqY= `k=w QO "OvwW p}OaD O}=@ Qw=DWo w wQ}v 'xQB Qy lwv |=yx@=OQo Q}R CQwYx@ pDv=QB KqY= ?}Q[ "Ovm|t ^=Lr =Q u=QwO lU}O |oDUw}B sOa %OwW|t h}QaD QwDwQ l} R= Cw=iDt 'OwOLt xQB O=OaD =@ QwDwQ l} |=Q@ p=@ lwv |=yx@=OQo Qw[L p=ta= w OwOLt xQB O=OaD uDiQo Q_v QO =@ "CU= C}=yv|@ xQB O=OaD =@ QF= pDv=QB KqY= `k=w QO "OvwW p}OaD O}=@ Qw=DWo w wQ}v 'xQB Qy lwv |=yx@=OQo Q}R CQwYx@ pDv=QB KqY= ?}Q[ "Ovm|t ^=Lr =Q u=QwO lU}O |oDUw}B sOa %OwW|t h}QaD F = 2  cos1  e B2 Rr r sin()  2  cos1  e B2 rRhub r sin()  (7) xOW Q=@Da=|@ xv=mD |x}Q_v 0 5 R= QDnQR@ |QwLt |}=kr= ?}Q[ Q}O=kt |=Q@ "OyO x=Q= O=@ u}@QwD u=QW}B |wQ}v ?}Q[ R= |DUQO |v}@V}B Ov=wD|tv w u}= |=Q@ "OwW p=ta= xOt; CUO x@ \@=wQ x@ |D=LqY= xm CU= R=}v u}=Q@=v@ xOW xOQw; 1 pwOH QO xm xOW x=Q= [17]uwDQ@ w [9]CQ;wro \UwD |]@=wQ Qw_vt "CU= CL=Ut Q=OQ@ A '`=aW r 'CaQU Q=OQ@ V = (ur; u; uz) CqO=at u}= QO xm '|QwLt |wQ}v T 'Q=Wi p '=yz QwLt |xm} Q=OQ@ ez '=wy |r=oJ  'pQDvm K]U |Oa@ l} pOt 3 pmW QO "CU= xQB \UwD xOW p=YLDU= u=wD P w Qw=DWo QT j}kO pLt w Tmwrwv}= O=@ |SQv= ?P=H sDU}U |QwDvw VN@ R= |Qw@a u=}QH "CU= xOW xO=O u=Wv sDU}U R= VN@ u}= QO u}@QwD |Q}oQ=Qk |xrO=atx@xHwD=@'OwWxDiQoQ_vQO U1 Q@=Q@xQBR=p@kO=@\UwDtCaQUQo= |k=@ Q}}eD uwO@ CaQU 'C@=F `]kt K]U =@ p=v=m R= u=}QH Qw@a =@ sQH |=k@ "Ov=t|t e = h p  + 12 V2 i = P0  Q@=Q@ O=R; u=}QH |tQH |@O |Br=Dv; xm =Hu; R= u=}QH =Pr 'CU= P0 = p + 12V 2 Q@=Q@ w pm Q=Wi P0 u; QO xm OwW|t u=}@ CL=Ut Q=OQ@ A '`=aW r 'CaQU Q=OQ@ V = (ur; u; uz) CqO=at u}= QO xm '|QwLt |wQ}v T 'Q=Wi p '=yz QwLt |xm} Q=OQ@ ez '=wy |r=oJ  'pQDvm K]U |Oa@ l} pOt 3 pmW QO "CU= xQB \UwD xOW p=YLDU= u=wD P w Qw=DWo QT j}kO pLt w Tmwrwv}= O=@ |SQv= ?P=H sDU}U |QwDvw VN@ R= |Qw@a u=}QH "CU= xOW xO=O u=Wv sDU}U R= VN@ u}= QO u}@QwD |Q}oQ=Qk F = 2  cos1  e B2 Rr r sin()  2  cos1  e B2 rRhub r sin()  (7) u s } R V @ u} Q u}@Qw |Q} QQ |xrO=atx@xHwD=@'OwWxDiQoQ_vQO U1 Q@=Q@xQBR=p@kO=@\UwDtCaQUQo= |k=@ Q}}eD uwO@ CaQU 'C@=F `]kt K]U =@ p=v=m R= u=}QH Qw@a =@ sQH |=k@ "Ov=t|t h i e = h p  + 12 V2 i = P0  Q@=Q@ O=R; u=}QH |tQH |@O |Br=Dv; xm =Hu; R= u=}QH =Pr 'CU= P0 = p + 12V 2 Q@=Q@ w pm Q=Wi P0 u; QO xm OwW|t u=}@ 39 Tmwrwv}= O=@ |SQv= ?P=H sDU}U l} |R=UpOt |QwDvw VN@ R= |Qw@a u=}QH w u}@QwD |Q}oQ=Qk pLt |Oa@ l} pOt "3 pmW [3]"Tmwrwv}= "Tmwrwv}= sDU}U O=a@= "4 pmW "Tmwrwv}= O=@ |SQv= ?P=H sDU}U |UOvy C=YNWt "2 pwOH QDt O=a@= O=tv QDt=Q=B 12 19 DF unnel;Upper |i}k |}q=@ Q]k 21 34 H pm `=iDQ= 10 67 HF unnel |i}k `=iDQ= 1 83 DF unnel;Lower |i}k |v}}=B Q]k 6 1 HInlet |OwQw `=iDQ= 1 83 DV enturi |QwDvw Q]k 3 05 DOutlet |HwQN Q]k "OvDUy QDt x@ O=a@= xrUt pL |xvt=O "5 pmW |QDW}@ Q=@Da= R= |OOa pL =D OW=@ QDlJwm =yxQ=w}O |m}ORv QO xOW O}rwD xm@W O=H}= |xm@W R= |}=tv 6 pmW QO w xrUt pL |xvt=O 5 pmW QO "OwW Q=OQwNQ "CU= xOW x=Q= xOW xm@W R= pqkDU= |UQQ@ R= TB |Ov@xm@W u}QD?U=vt 'QwmPt xUOvy |=Q@ "Tmwrwv}= sDU}U O=a@= "4 pmW "Tmwrwv}= O=@ |SQv= ?P=H sDU}U |UOvy C=YNWt "2 pwOH QDt O=a@= O=tv QDt=Q=B 12 19 DF unnel;Upper |i}k |}q=@ Q]k 21 34 H pm `=iDQ= 10 67 HF unnel |i}k `=iDQ= 1 83 DF unnel;Lower |i}k |v}}=B Q]k 6 1 HInlet |OwQw `=iDQ= 1 83 DV enturi |QwDvw Q]k 3 05 DOutlet |HwQN Q]k "OvDUy QDt x@ O=a@= xrUt pL |xvt=O "5 pmW |QDW}@ Q=@Da= R= |OOa pL =D OW=@ QDlJwm =yxQ=w}O |m}ORv QO xOW O}rwD xm@W O=H}= |xm@W R= |}=tv 6 pmW QO w xrUt pL |xvt=O 5 pmW QO "OwW Q=OQwNQ "CU= xOW x=Q= xOW xm@W R= pqkDU= |UQQ@ R= TB |Ov@xm@W u}QD?U=vt 'QwmPt xUOvy |=Q@ xm@W u}= ?=NDv= =@ "OW=@ 1018037 Q@=Q@ =ypwrU O=OaD xm OyO|t MQ |Dr=L Q "OwW|t xv}tm xH}Dv u}QD?U=vt x@ |@=}DUO |=Q@ |OOa pL |xv}Ry Q@=Q@ |HwQN Q=Wi Q=Wi |RQt \QW '|OwQw QO CaQU |RQt \QW u}vJty |=yVN@ Q}=U |=Q@ Q=w}O |RQt \QW w CU= xOW xDiQo Q_v QO QiUtD= Q=W = i o _ m r = = = =] """ Tmwrwv}= O=@ |SQv= ?P=H sDU}U l} |R=UpOt |QwDvw VN@ R= |Qw@a u=}QH w u}@QwD |Q}oQ=Qk pLt |Oa@ l} pOt "3 pmW [3]"Tmwrwv}= "Tmwrwv}= sDU}U O=a@= "4 pmW "Tmwrwv}= O=@ |SQv= ?P=H sDU}U |UOvy C=YNWt "2 pwOH QDt O=a@= O=tv QDt=Q=B 12 19 DF unnel;Upper |i}k |}q=@ Q]k 21 34 H pm `=iDQ= 10 67 HF unnel |i}k `=iDQ= 1 83 DF unnel;Lower |i}k |v}}=B Q]k 6 1 HInlet |OwQw `=iDQ= 1 83 DV enturi |QwDvw Q]k 3 05 DOutlet |HwQN Q]k """ Tmwrwv}= O=@ |SQv= ?P=H sDU}U l} |R=UpOt "Tmwrwv}= sDU}U O=a@= "4 pmW sy p}Uv=DB |SQv= pt=W xmr@ |W@vH |SQv= pt=W =yvD xv '|SQv= `@vt u=wvax@ O=@ QO xm 'Ci= |Q=Okt =@ 'sDU}U x@ OwQw R= TB u=}QH sQH OL=w |SQv= u}= "CUy u=}QH "OUQ|t xQB u=}QH CUOq=@ C}akwt x@ 'OQm Q_v hQY u; R= u=wD|t x_Lr u=}QHu=wvax@Ov=wD|t'QRw}i}Ow|QwDvw'xOvvmRmQtDtVN@xUpt=W'p=v=mpN=O CU= |}=H ,=k}kO pR=v x=owro u; QO xm OwW xDiQo Q_v QO QRw}i}O  pR=v l} pN=O CL=Ut AT &CU= A = A1 AT Q@=Q@ u; `]kt K]U w OQ=O Q=Qk xQB xm "CU= u=}QH CyH Q@ Owta |xLiY |wQ =yxQB |xOW Q}wYD "Tmwrwv}= O=@ |SQv= ?P=H sDU}U |UOvy C=YNWt "2 pwOH QDt O=a@= O=tv QDt=Q=B 12 19 DF unnel;Upper |i}k |}q=@ Q]k 21 34 H pm `=iDQ= 10 67 HF unnel |i}k `=iDQ= 1 83 DF unnel;Lower |i}k |v}}=B Q]k 6 1 HInlet |OwQw `=iDQ= 1 83 DV enturi |QwDvw Q]k 3 05 DOutlet |HwQN Q]k u=}@ P = H A h P0  i V:dA |xrO=at =@ 'xQB \UwD xOt; CUO x@ u=wD |x]@=Q \UwD A1 `]kt K]U =@ |r=v=m pw] QO P0  \UwDt Q=Okt "OwW|t |tQH |@O _m u; QO xm OwW|t XNWt h P0  i A1 = 1 _m H A h P0  i V:dA j@=]t u=wD Q=Okt xH}Dv QO "CU= Tmwrwv}= O=@ p=kDv= sDU}U pw] QO u=}QH %O};|t CUO x@ 16 |xrO=at "OvDUy QDt x@ O=a@= xrUt pL |xvt=O "5 pmW P = P0   1 P0   2  _m (16) P = P0   1 P0   2  _m (16) |OOa pL |R=UxO=}B "3 Tmwrwv}= sDU}U xUOvy |iQat "1"3 u=Wv =Q xar=]t OQwt Tmwrwv}= |O=@ u}@QwD sDU}U |Oa@xU xUOvy O=a@= 4 pmW QO xm xvwou=ty "CU= xOW xOQw; 2 pwOH QO R}v xUOvy |ak=w O=a@= "OyO|t CU= xOW |L=Q] |Qw] |Umwrwv}= |O=@ u}@QwD sDU}U 'OwW|t x_Lqt 4 pmW Ovm|t ?PH '|}xHQO 360 |xvt=O l} QO |va} 'C=yH s=tD R= =Q O=@ u=}QH xm CtUx@ u}@QwD |=yxQB CyH s}kDUtQ}e =} w s}kDUt s}_vD x@ |R=}v u}=Q@=v@ w sDU}U |OwQw QO xOvvmC}=Oy |xQB Q=yJ 'u}= Q@ xwqa "CU}v O=@ VRw CyH O=@ u=}QH C}=Oy w pQDvm =yu; xi}_w xm OQ=O OwHw Tmwrwv}= O=@ |SQv= ?P=H |SQv= ?P=H sDU}U |OwQw \UwD xOW ?PH O=@ u=}QH "CU= sDU}U x@ |OwQw VN@ QO '|}wv=R l} R= Qw@a R= TB w xOW pkDvt u}}=B CtU x@ 'Tmwrwv}= O=@ p=v=m pN=O w u}tR K]U QO xOW x}@aD |=yu}@QwD =} u}@QwD |=yxQB x@ |QwDvw "OwW|t xO}@=D 'Tmwrwv}= |O=@ u}@QwD sDU}U |ki= "OvDUy QDt x@ O=a@= xrUt pL |xvt=O "5 pmW "OvDUy QDt x@ O=a@= xrUt pL |xvt=O "5 pmW |QDW}@ Q=@Da= R= |OOa pL =D OW=@ QDlJwm =yxQ=w}O |m}ORv QO xOW O}rwD xm@W O=H}= |xm@W R= |}=tv 6 pmW QO w xrUt pL |xvt=O 5 pmW QO "OwW Q=OQwNQ@ "CU= xOW x=Q= xOW xm@W R= pqkDU= |UQQ@ R= TB |Ov@xm@W u}QD?U=vt 'QwmPt xUOvy |=Q@ xm@W u}= ?=NDv= =@ "OW=@ 1018037 Q@=Q@ =ypwrU O=OaD xm OyO|t MQ |Dr=L QO "OwW|t xv}tm xH}Dv u}QD?U=vt x@ |@=}DUO |=Q@ |OOa pL |xv}Ry Q@=Q@ |HwQN Q=Wi Q=Wi |RQt \QW '|OwQw QO CaQU |RQt \QW u}vJty |=yVN@ Q}=U |=Q@ Q=w}O |RQt \QW w CU= xOW xDiQo Q_v QO QiUtD= Q=Wi QO "CU= xOW xDiQo Q_v QO Tmwrwv}= |O=@ u}@QwD sDU}U |=Q@ xOW |L=Q] xUOvy 'Tmwrwv}=O=@|SQv=?P=H sDU}Uh=Q]=|=yQ=w}O|xrY=ixOW|L=Q]|xUOvy "OvW=@ xDW=Ov O=@ u=}QH Q@ |Q}F-=D xm xOW ?=NDv= |}xvwox@ '|v}=B Q=w}O RH x@ |RQt \}=QW w xm@W R= pqkDU= 'xrUt |Ov@xm@W "2"3 uwO@ |Ov@xm@W R= 'xUOvy uOw@ |Oa@xU w |oO}J}B p}rO x@ Q[=L |xar=]t QO |UQQ@ w |OOa |R=UpOt CkO V}=Ri= Qw_vt x@ "CU= xOW xO=iDU= Q=DN=U xm CU= xOW |aU 'u; C=QF= w =yxQ=w}O |m}ORv QO u=}QH V}=OH QDj}kO xJQy 40 "x}v=F Q@ QDt 6 71 |OwQw u=}QH CaQU |=Q@ CaQU QwDv=m "7 pmW [10]"OwHwt G}=Dv =@ Q[=L Q=m |=Q@ =O@tq ?ULQ@ u=wD ?}Q[ |xU}=kt "8 pmW O=@ |SQv= ?P=H sDU}U pN=O O=@ u=}QH `k=w QO "OQ@ s=v |O=@ |=yu}@QwD =O}B V}=Ri= VDaQU w OQ}o|t ?=DW 'Ovv=t |QwDvw VN@ l} QO w Tmwrwv}= sDU}U pN=O xOW x}@aD u}@QwD |=yxQB \UwD xm |O=@ u=}QH u}=Q@=v@ "Ovm|t O=R; u=}QH x@ C@Uv |QDW}@ CaQU 'OwW|t TL Tmwrwv}= O=@ |SQv= ?P=H |SQv= ?P=H sDU}U |yOR=@ xm OwW|t ?@U Qt= u}ty w CW=O Oy=wN O=@ sDU}U u}= R= xH}Dv QO "OW=@ QDW}@ |RwQt= |=yu}@QwD x@ C@Uv Tmwrwv}= O=@ xO=iDU= 'CU= u}}=B =yu; QO O=@ VRw CaQU xm |k]=vt QO |DL u=wD|t "OQm |r}rLDxt}v Om |R=UxO=}B "4 |r}rLDxt}v Om |HvUQ=@Da= "1"4 pY=L |r}rLD w |@QHD G}=Dv w xUOvy R= 'BIM ?rDt Om |HvUQ=@Da= Qw_vtx@ "CU= xOW xO=iDU= [10]u}W}B u=kkLt |UQQ@ R= pY=L BIM |x}Q_v R= TvQiQ \UwD xOW xv}y@ u}@QwD 'Qw_vt u}= |=Q@ xOW xDiQo Q_v QO xUOvy =O@tq w C=w 50 |t=v u=wD 'xQB 3 'QDt 0 72 Q]k |=Q=O xm CU= QwmPt ?ULQ@ u=wD ?}Q[ G}=Dv |xU}=kt 8 pmW QO "CU= |L=Q] x]kv QO 5 Q_v QO =@ 'Q[=L Q=m QO xOW |L=Q] BIM Om R= pY=L xQB lwv CaQU G}=Dv =@ 'CQ;wro K}LYD R}v w pDv=QB |BwD w xQB lwv KqY= ?}=Q[ Q}F-=D uDiQo G}=Dv |x_Lqt p@=k ji=wD |xOvyOu=Wv xm xOW x=Q= [10]OwHwt |r}rLD w |@QHD "CU= "Tmwrwv}= O=@ |SQv= ?P=H sDU}U |=Q@ xOW O=H}= xm@W R= |}wQ@wQ |=tv "6 pm "QorL |HvUQ=@Da= Qw_vt x@ [3w2]xr=kt =@ Q[=L Q=m G}=Dv xU}=kt "3 pwOH Q[=L Q=m [3w2]TwrwBwQOv= w |}qa |r=a |r=a xm@W C}i}m 6 71 6 71 (m=s) |OwQw O=@ CaQU 10 845 10 6 (m=s) |QwDvw QO CaQU 1 6162 1 58 CaQU C@Uv 2 31 |@Uv |=]N OYQO |OOa pL |HvUQ=@Da= "3 u}@QwD sDU}U QO u=}QH |OOa |R=Ux}@W Qw_vt x@ xm |QopL |HvUQ=@Da= | xJv; j@=]t xrUt \}=QW =OD@= QO 'CU= xDiQo Q=Qk xO=iDU= OQwt Tmwrwv}= | u}= QO "OW xDiQo Q_v QO 'CU= xOW xOQw; [3w2]TwrwBwQOv= w |}qa xr=kt QwLt C@Ft CyH hqN w x}v=F Q@ QDt 6 71 Q@=Q@ w C@=F O=@ u=}QH CaQU xr Tmwrwv}= O=@ |SQv= ?P=H sDU}U |UOvy O=a@= w CU= xOW xDiQo Q_v QO pY=L G}=Dv |xU}=kt "CU= u=Um} xOW xOQw; Q[=L Q=m QO xJv; =@ xOW |L CaQU u}ov=}t |=Q@ [3w2]'xr=kt w |Ov@xm@W Cr=L u}QDy@ QO Q[=L Q=m xOW xOQw; 3 pwOH QO CaQU C@Uv u}vJty w |QwDvw VN@ QO O=@ u=} "C =@ w |}q=@ Q=}U@ CkO =@ Q[=L Q=m R= pY=L G}=Dv 'OwW|t x_Lqt xm u=vJ "OQ=O Ck@=]t [3w2]|r=a C}i}m =@ pOt R= pY=L G}=Dv =@ =]N OYQO 2 Ow |OOa pL G}=Dv "4 xrUt Q@ sm=L |RQt \}=QW w Tmwrwv}= O=@ |SQv= ?P=H sDU}U xUOvy xm p =@ u=wD|t 'OW s=Hv= R}v |OOa QopL |HvUQ=@Da= w OW XNWt pt=m Qw] |=yCaQU |=Q@ =Q |QwDvw pLt QO u=}QH CaQU '|OOa pL QDU@ R= xO=iD R= |r}rLD xt}v Om |OwQw QDt=Q=B u=wvax@ w xOQm G=QNDU= hrDNt |OwQw CaQU \UwDt 'x}v=F Q@ QDt 6 71 O=R; u=}QH CaQU ZQi =@ "CiQo xQy@ QO u=}QH CaQU C@Uv w x}v=F Q@ QDt 10 845 Q@=Q@ |QwDvw VN@ RmQt QO u=} CaQU QwDv=m "O};|t CUO x@ 1 661 Q@=Q@ |OwQw QO u=}QH CaQU x@ |Qw "CU= xOW xOQw; 7 pmW QO x}v=F Q@ QDt 6 71 |OwQw u=}QH CaQU | xOW O=}R |Q}otWJ Qw] x@ |QwDvw VN@ QO u=}QH CaQU xm OwW|t x_L xm OwW|t Ea=@ '=wy O=R; u=}QH CaQU x@ C@Uv CaQU V}=Ri= u}= "C |xRwL QO QF-wt |Qw;wv l} u=wvax@ u=wD@ =Q Tmwrwv}= O=@ |SQv= ?P=H sDU 2 |xQ=tW '383 |xQwO '1401 R}}=B h}QW l}v=mt |UOvyt "x}v=F Q@ QDt 6 71 |OwQw u=}QH CaQU |=Q@ CaQU QwDv=m "7 pmW "x}v=F Q@ QDt 6 71 |OwQw u=}QH CaQU |=Q@ CaQU QwDv=m "7 pmW "x}v=F Q@ QDt 6 71 |OwQw u=}QH CaQU |=Q@ CaQU QwDv=m "7 pmW "x}v=F Q@ QDt 6 71 |OwQw u=}QH CaQU |=Q@ CaQU QwDv=m "7 pmW |OOa pL |HvUQ=@Da= "3"3 u}@QwD sDU}U QO u=}QH |OOa |R=Ux}@W Qw_vt x@ xm |QopL |HvUQ=@Da= |=Q@ xJv; j@=]t xrUt \}=QW =OD@= QO 'CU= xDiQo Q=Qk xO=iDU= OQwt Tmwrwv}= |O=@ u}= QO "OW xDiQo Q_v QO 'CU= xOW xOQw; [3w2]TwrwBwQOv= w |}qa xr=kt QO QwLt C@Ft CyH hqN w x}v=F Q@ QDt 6 71 Q@=Q@ w C@=F O=@ u=}QH CaQU xr=kt Tmwrwv}= O=@ |SQv= ?P=H sDU}U |UOvy O=a@= w CU= xOW xDiQo Q_v QO Z pY=L G}=Dv |xU}=kt "CU= u=Um} xOW xOQw; Q[=L Q=m QO xJv; =@ xOW |L=Q] CaQU u}ov=}t |=Q@ [3w2]'xr=kt w |Ov@xm@W Cr=L u}QDy@ QO Q[=L Q=m R= xOW xOQw; 3 pwOH QO CaQU C@Uv u}vJty w |QwDvw VN@ QO O=@ u=}QH "CU= |OOa pL G}=Dv "4"3 |r}rLDxt}v Om |R=UxO=}B "4 |r}rLDxt}v Om |HvUQ=@Da= "1"4 pY=L |r}rLD w |@QHD G}=Dv w xUOvy R= 'BIM ?rDt Om |HvUQ=@Da= Qw_vtx@ "CU= xOW xO=iDU= [10]u}W}B u=kkLt |UQQ@ R= pY=L BIM |x}Q_v R= TvQiQ \UwD xOW xv}y@ u}@QwD 'Qw_vt u}= |=Q@ xOW xDiQo Q_v QO xUOvy =O@tq w C=w 50 |t=v u=wD 'xQB 3 'QDt 0 72 Q]k |=Q=O xm CU= QwmPt ?ULQ@ u=wD ?}Q[ G}=Dv |xU}=kt 8 pmW QO "CU= |L=Q] x]kv QO 5 Q_v QO =@ 'Q[=L Q=m QO xOW |L=Q] BIM Om R= pY=L xQB lwv CaQU G}=Dv =@ 'CQ;wro K}LYD R}v w pDv=QB |BwD w xQB lwv KqY= ?}=Q[ Q}F-=D uDiQo G}=Dv |x_Lqt p@=k ji=wD |xOvyOu=Wv xm xOW x=Q= [10]OwHwt |r}rLD w |@QHD "CU= G xrUt Q@ sm=L |RQt \}=QW w Tmwrwv}= O=@ |SQv= ?P=H sDU}U xUOvy xm p=L =@ u=wD|t 'OW s=Hv= R}v |OOa QopL |HvUQ=@Da= w OW XNWt pt=m Qw]x@ |=yCaQU |=Q@ =Q |QwDvw pLt QO u=}QH CaQU '|OOa pL QDU@ R= xO=iDU= R= |r}rLD xt}v Om |OwQw QDt=Q=B u=wvax@ w xOQm G=QNDU= hrDNt |OwQw O=@ CaQU \UwDt 'x}v=F Q@ QDt 6 71 O=R; u=}QH CaQU ZQi =@ "CiQo xQy@ u; QO u=}QH CaQU C@Uv w x}v=F Q@ QDt 10 845 Q@=Q@ |QwDvw VN@ RmQt QO u=}QH CaQU QwDv=m "O};|t CUO x@ 1 661 Q@=Q@ |OwQw QO u=}QH CaQU x@ |QwDvw "CU= xOW xOQw; 7 pmW QO x}v=F Q@ QDt 6 71 |OwQw u=}QH CaQU |=Q@ xOW O=}R |Q}otWJ Qw] x@ |QwDvw VN@ QO u=}QH CaQU xm OwW|t x_Lqt xm OwW|t Ea=@ '=wy O=R; u=}QH CaQU x@ C@Uv CaQU V}=Ri= u}= "CU= |xRwL QO QF-wt |Qw;wv l} u=wvax@ u=wD@ =Q Tmwrwv}= O=@ |SQv= ?P=H sDU}U 41 m r v= = S v= P= D l = pO ?=UDL= =@ w uwDQ@ w CQ;wro K}LYD |=Q@ =O@tq ?ULQ@ u=wD ?}Q[ "10 pmW "pDv=QB xQB lwv KqY= ?}Q[ ZQi =@ w uwDQ@ w CQ;wro K}LYD |=Q@ =O@tq ?ULQ@ u=wD ?}Q[ "11 pmW "pDv=QB |BwD w xQB lwv KqY= ?}Q[ =O@tq ?ULQ@ |QDt=Q=B |xar=]t "3"4 TB '=O@tq ?ULQ@ O=@ u}@QwD QO p}NO |m}t=v}OwQ}= |=yQDt=Q=B p}rLD Qw_vtx@ QO "CU= xOW ZQi xQB Qy |wQ u=tr= 100 'xm@W R= pqkDU= Ov}=Qi s=Hv= R= Cr=L wO |=Q@ =O@tq ?ULQ@ u=wD ?}Q[ C=Q}}eD |xU}=kt R= |Q=Owtv 10 pmW xQB lwv KqY= ?}Q[ uDiQo Q_v QO =@ w uwDQ@ w CQ;wro xDiW; xr=@vO K}LYD \w@Qt Q=Owtv OwW|t x_Lqt xm u=vJ "CU= xOW xOQw; Cr=L wO Qy |=Q@ pDv=QB xr=@vO K}LYD x@ \w@Qt Q=Owtv u}}=B xQ=wty uwDQ@ |xDiW; |xr=@vO K}LYD x@ C@Uv =Q |QDsm G}=Dv uwDQ@ K}LYD xm CU=vat u=O@ u}= w CU= CQ;wro xDiW; QO u=wD ?}Q[ xv}W}@ "Ovm|t |v}@V}B u=wD ?}Q[ |=Q@ CQ;wro K}LYD x@ xm |DQwY QO "OyO|t MQ 7 929 =O@tq QO w xOw@ 0 457 Q@=Q@ CQ;wro K}LYD j=iD= 7 194 =O@tq QO w xOw@ 0 393 Q@=Q@ uwDQ@ K}LYD QO u=wD ?}Q[ xv}W}@ "ODi=|t K}LYD wO |=Q@ =O@tq ?ULQ@ u=wD ?}Q[ C=Q}}eD Q=Owtv 11 pmW QO |=Q@ pDv=QB |BwD w xQB lwv KqY= ?}Q[ uDiQo Q_v QO =@ w uwDQ@ w CQ;wro ?}Q[ xv}W}@ Q=Okt 'OwW|t x_Lqt xm u=vJ "CU= xOW xOQw; Cr=L wO Qy x@ 'CU= xOW xO=O QF= xQB lwv KqY= ?}Q[ \ki xm |Dr=L x@ C@Uv u=wD u}= QO "CU= xDi=} Vy=m |BwD VN@ KqY= ?}Q[ p=ta= R= |W=v Ci= Cra QO w xOw@ 0 3813 Q@=Q@ CQ;wro K}LYD Cr=L QO u=wD ?}Q[ xv}W}@ Cr=L uwDQ@ K}LYD QO u=wD ?}Q[ xv}W}@ xm |DQwY QO "OyO|t MQ 7 876 =O@tq [18]"`HQt u}@QwD x@ \w@Qt C=aq]= "4 pwOH Q=Okt xYNWt 3 xQB O=OaD QDt 0 8192 xQB Qy pw] QDt 1 7336 QwDwQ Q]k QDt 0 0952 |BwD Q]k [20]"10e5 ROrwv}Q OOa QO NREL S822 p}wiQ}= C=aq]= "5 pwOH Q=Okt xYNWt 9 Ncrit 94 7 (CL=CD)max 5=075 opt 0 8582 CL; opt 0 00906 CD; opt "xOW |L=Q] xQB |rm |=tW w xv}y@ VJ}B |x}w=R w QDw `}RwD Q=Owtv "9 pmW u}@QwD |=yxQB |xUOvy "2"4 |QwDvw VN@ QO |Q}oxQy@ Qw_vt x@ xOW |L=Q] u}@QwD x@ \w@Qt C=YNWt R= xm [18]'Vv=Q=mty w MwtUO \UwD xOW x=Q= G}=Dv x@ xHwD =@ Tmwrwv}= sDU}U QO 'OvOw@ xDN=OQB Tmwrwv}= sD}U |=Q@ u}@QwD |L=Q] x@ |OOa pL QDU@ j}Q] "Ov=xOW VQ=Ro 4 pwOH QO C=aq]= u}= "CU= xOW xDiQo Q_v NREL S822 p}wiQ}= 'QDt 5 Q}R pw] =@ |=yxQB |=Q@ [19]RQtwU w Q}Hv=D s=tD |=Q@ p}wiQ}= u}ty R= xr=kt u}= QO =yxQB sm pw] Crax@ xm Ov=xOQm O=yvW}B =Q xDiQo xQy@ xOW xO=iDU= u; |=Q@ |wQ}=O p}wiQ}= R= xm |BwD VN@ RHx@ xQB `]=kt OOa QO [20]NREL S822 p}wiQ}= x@ \w@Qt |=yxO=O 5 pwOH QO "CU= xOW u=}QH CaQU x@ xHwD =@ Q[=L Q=m u}@QwD |OQmrta |xOwOLt xm '10e5 ROrwv}Q "Ov=xOW xOQw; 'CU= =yxQB xUOvy w O=@ |=yxQB |rm |=tW R}v w xv}y@ VJ}B |x}w=R w QDw `}RwD Q=Owtv C}=yv QO "O};|t CUO x@ 9 pmW CQwYx@ xOW |L=Q] ?=UDL= =@ w uwDQ@ w CQ;wro K}LYD |=Q@ =O@tq ?ULQ@ u=wD ?}Q[ "10 pmW "pDv=QB xQB lwv KqY= ?}Q[ ZQi =@ w uwDQ@ w CQ;wro K}LYD |=Q@ =O@tq ?ULQ@ u=wD ?}Q[ "11 pmW "pDv=QB |BwD w xQB lwv KqY= ?}Q[ [18]"`HQt u}@QwD x@ \w@Qt C=aq]= "4 pwOH Q=Okt xYNWt 3 xQB O=OaD QDt 0 8192 xQB Qy pw] QDt 1 7336 QwDwQ Q]k QDt 0 0952 |BwD Q]k [20]"10e5 ROrwv}Q OOa QO NREL S822 p}wiQ}= C=aq]= "5 pwOH Q=Okt xYNWt 9 Ncrit 94 7 (CL=CD)max 5=075 opt 0 8582 CL; opt 0 00906 CD; opt "xOW |L=Q] xQB |rm |=tW w xv}y@ VJ}B |x}w=R w QDw `}RwD Q=Owtv "9 pmW [18]"`HQt u}@QwD x@ \w@Qt C=aq]= "4 pwOH Q=Okt xYNWt 3 xQB O=OaD QDt 0 8192 xQB Qy pw] QDt 1 7336 QwDwQ Q]k QDt 0 0952 |BwD Q]k [20]"10e5 ROrwv}Q OOa QO NREL S822 p}wiQ}= C=aq]= "5 pwOH Q=Okt xYNWt 9 Ncrit 94 7 (CL=CD)max 5=075 opt 0 8582 CL; opt 0 00906 CD; opt ?=UDL= =@ w uwDQ@ w CQ;wro K}LYD |=Q@ =O@tq ?ULQ@ u=wD ?}Q[ "10 pmW "pDv=QB xQB lwv KqY= ?}Q[ =O@tq ?ULQ@ |QDt=Q=B |xar=]t "3"4 TB '=O@tq ?ULQ@ O=@ u}@QwD QO p}NO |m}t=v}OwQ}= |=yQDt=Q=B p}rLD Qw_vtx@ QO "CU= xOW ZQi xQB Qy |wQ u=tr= 100 'xm@W R= pqkDU= Ov}=Qi s=Hv= R= Cr=L wO |=Q@ =O@tq ?ULQ@ u=wD ?}Q[ C=Q}}eD |xU}=kt R= |Q=Owtv 10 pmW xQB lwv KqY= ?}Q[ uDiQo Q_v QO =@ w uwDQ@ w CQ;wro xDiW; xr=@vO K}LYD \w@Qt Q=Owtv OwW|t x_Lqt xm u=vJ "CU= xOW xOQw; Cr=L wO Qy |=Q@ pDv=QB xr=@vO K}LYD x@ \w@Qt Q=Owtv u}}=B xQ=wty uwDQ@ |xDiW; |xr=@vO K}LYD x@ C@Uv =Q |QDsm G}=Dv uwDQ@ K}LYD xm CU=vat u=O@ u}= w CU= CQ;wro xDiW; QO u=wD ?}Q[ xv}W}@ "Ovm|t |v}@V}B u=wD ?}Q[ |=Q@ CQ;wro K}LYD x@ xm |DQwY QO "OyO|t MQ 7 929 =O@tq QO w xOw@ 0 457 Q@=Q@ CQ;wro K}LYD j=iD= 7 194 =O@tq QO w xOw@ 0 393 Q@=Q@ uwDQ@ K}LYD QO u=wD ?}Q[ xv}W}@ "ODi=|t "xOW |L=Q] xQB |rm |=tW w xv}y@ VJ}B |x}w=R w QDw `}RwD Q=Owtv "9 pmW u}@QwD |=yxQB |xUOvy "2"4 |QwDvw VN@ QO |Q}oxQy@ Qw_vt x@ xOW |L=Q] u}@QwD x@ \w@Qt C=YNWt R= xm [18]'Vv=Q=mty w MwtUO \UwD xOW x=Q= G}=Dv x@ xHwD =@ Tmwrwv}= sDU}U QO 'OvOw@ xDN=OQB Tmwrwv}= sD}U |=Q@ u}@QwD |L=Q] x@ |OOa pL QDU@ j}Q] "Ov=xOW VQ=Ro 4 pwOH QO C=aq]= u}= "CU= xOW xDiQo Q_v NREL S822 p}wiQ}= 'QDt 5 Q}R pw] =@ |=yxQB |=Q@ [19]RQtwU w Q}Hv=D s=tD |=Q@ p}wiQ}= u}ty R= xr=kt u}= QO =yxQB sm pw] Crax@ xm Ov=xOQm O=yvW}B =Q xDiQo xQy@ xOW xO=iDU= u; |=Q@ |wQ}=O p}wiQ}= R= xm |BwD VN@ RHx@ xQB `]=kt OOa QO [20]NREL S822 p}wiQ}= x@ \w@Qt |=yxO=O 5 pwOH QO "CU= xOW u=}QH CaQU x@ xHwD =@ Q[=L Q=m u}@QwD |OQmrta |xOwOLt xm '10e5 ROrwv}Q "Ov=xOW xOQw; 'CU= =yxQB xUOvy w O=@ K}LYD wO |=Q@ =O@tq ?ULQ@ u=wD ?}Q[ C=Q}}eD Q=Owtv 11 pmW QO |=Q@ pDv=QB |BwD w xQB lwv KqY= ?}Q[ uDiQo Q_v QO =@ w uwDQ@ w CQ;wro ?}Q[ xv}W}@ Q=Okt 'OwW|t x_Lqt xm u=vJ "CU= xOW xOQw; Cr=L wO Qy x@ 'CU= xOW xO=O QF= xQB lwv KqY= ?}Q[ \ki xm |Dr=L x@ C@Uv u=wD u}= QO "CU= xDi=} Vy=m |BwD VN@ KqY= ?}Q[ p=ta= R= |W=v Ci= Cra QO w xOw@ 0 3813 Q@=Q@ CQ;wro K}LYD Cr=L QO u=wD ?}Q[ xv}W}@ Cr=L uwDQ@ K}LYD QO u=wD ?}Q[ xv}W}@ xm |DQwY QO "OyO|t MQ 7 876 =O@tq |=yxQB |rm |=tW R}v w xv}y@ VJ}B |x}w=R w QDw `}RwD Q=Owtv C}=yv QO "O};|t CUO x@ 9 pmW CQwYx@ xOW |L=Q] 42 "uwDQ@ w CQ;wro K}LYD wO |=Q@ xv}W}@ u=wD ?}Q[ "6 pwOH xv}W}@ u=wD ?}Q[ QO =O@tq xv}W}@ u=wD ?}Q[ pOt 7 929 0 457 xQB lwv KqY= QF= w CQ;wro K}LYD 7 876 0 3813 |BwD w xQB lwv KqY= QF= w CQ;wro K}LYD 7 194 0 393 xQB lwv KqY= QF= w uwDQ@ K}LYD 7 194 0 335 |BwD w xQB lwv KqY= QF= w uwDQ@ K}LYD w x}v=F Q@ QDt hrDNt O=@ |=yCaQU |=Q@ =O@tq ?ULQ@ u=wD ?}Q[ "14 pmW "pDv=QB |BwD w xQB lwv KqY= ?}Q[ w CQ;wro K}LYD ZQi =@ w x}v=F Q@ QDt hrDNt O=@ |=yCaQU |=Q@ =O@tq ?ULQ@ u=wD ?}Q[ "15 pmW "pDv=QB |BwD w xQB lwv KqY= ?}Q[ w uwDQ@ K}LYD ZQi =@ QO OyO|t MQ u=wD ?}Q[ xv}W}@ u; QO xm |}=O@tq xm CU= OwyWt "CU= xOW ?}Q[ QF= w xQB lwv KqY= ?}Q[ QF= |=Q@ w uwDQ@ w CQ;wro K}LYD |=yCr=L "CU= xDW=O R}J=v |Q}}eD |BwD w xQB lwv KqY= lwv CaQU C@Uv ?ULQ@ u=wD ?}Q[ |xU}=kt 15 w 14 |=ypmW QO D ; ro D i o _v = hr N = = = w xQB lwv KqY= ?}Q[ |=Q@ =O@tq ?ULQ@ u=wD ?}Q[ |xU}=kt "12 pmW "CQ;wro K}LYD ZQi =@ w pDv=QB |BwD w xQB lwv KqY= ?}Q[ |=Q@ =O@tq ?ULQ@ u=wD ?}Q[ |xU}=kt "13 pmW "uwDQ@ K}LYD ZQi =@ w pDv=QB |BwD QF= uO=O Cr=NO R= TB "ODi=|t j=iD= 7 194 =O@tq QO w xOw@ 0 335 Q@=Q@ 0 8344 CQ;wro K}LYD Cr=L QO u=wD ?}Q[ xv}W}@ 'xQB |BwD KqY= ?}Q[ u}= xm |}=y=O@tq =t= "CU= xOW Q@=Q@ 0 8524 uwDQ@ K}LYD Cr=L QO w Q@=Q@ xH}Dv QO "Ov=xDW=O |R}J=v Q}}eD 'OyO|t MQ =yu; QO u=wD ?}Q[ |=yxv}W}@ = D [ V =m \ki D q = [ F-=D m io = D w x}v=F Q@ QDt hrDNt O=@ |=yCaQU |=Q@ =O@tq ?ULQ@ u=wD ?}Q[ "14 pmW "pDv=QB |BwD w xQB lwv KqY= ?}Q[ w CQ;wro K}LYD ZQi =@ QF= uO=O Cr=NO R= TB "ODi=|t j=iD= 7 194 =O@tq QO w xOw@ 0 335 Q@=Q@ 0 8344 CQ;wro K}LYD Cr=L QO u=wD ?}Q[ xv}W}@ 'xQB |BwD KqY= ?}Q[ u}= xm |}=y=O@tq =t= "CU= xOW Q@=Q@ 0 8524 uwDQ@ K}LYD Cr=L QO w Q@=Q@ xH}Dv QO "Ov=xDW=O |R}J=v Q}}eD 'OyO|t MQ =yu; QO u=wD ?}Q[ |=yxv}W}@ u=wD ?}Q[ Vy=m QO \ki xQB |BwD KqY= ?}Q[ Q}F-=D xm Cio u=wD|t "CU= ?}Q[QF=wuwDQ@wCQ;wroK}LYDwO|=Q@u=wD?}Q[|xU}=kt6pwOHQO "CU= xOW xOQw; pDv=QB |BwD w xQB lwv KqY= ?}Q[ s=wD QF= w xQB lwv KqY= w xQB lwv KqY= ?}Q[ |=Q@ =O@tq ?ULQ@ u=wD ?}Q[ x@ \w@Qt Q=Owtv xOQw; 13 w 12 |=ypmW QO uwDQ@ w CQ;wro K}LYD uDiQo Q_v QO =@ w pDv=QB |BwD 43 43 "hrDNt |=y=O@tq |=Q@ xQB |=DU=Q QO =UB |wQ}v "16 pmW "hrDNt |=y=O@tq |=Q@ xQB |=DU=Q QO u=wD ?}Q[ "17 pmW """ Tmwrwv}= O=@ |SQv= ?P=H sDU}U l} |R=UpOt KqY= ?}Q[ QF= ZQi =@ w CQ;wro K}LYD |=Q@ xv}W}@ u=wD ?}Q[ "7 pwOH "hrDNt O=@ |=yCaQU |=Q@ pDv=QB |BwD w xQB lwv ?}Q[ QO =O@tq xv}W}@ u=wD ?}Q[ (m=s) O=@ CaQU xv}W}@ u=wD 4 5323 0 2202 8 5 7107 0 272 9 7 161 0 3289 10 8 702 0 3909 11 10 3336 0 4582 12 12 1465 0 5306 13 "hrDNt |=y=O@tq |=Q@ xQB |=DU=Q QO =UB |wQ}v "16 pmW KqY=?}Q[s=wDQF=ZQi=@wuwDQ@K}LYD|=Q@xv}W}@u=wD?}Q["8pwOH "hrDNt O=@ |=yCaQU |=Q@ pDv=QB |BwD w xQB lw ?}Q[ QO =O@tq xv}W}@ u=wD ?}Q[ (m=s) O=@ CaQU xv}W}@ u=wD 4 079 0 1874 8 5 2574 0 2314 9 6 5265 0 2797 10 7 8861 0 3323 11 9 4271 0 3893 12 11 0587 0 4506 13 "xOW |L=Q] u}@QwD |L=Q] |x]kv "9 pwOH Q=Okt xYNWt 10 845 x}v=F Q@ QDt O=@ u=}QH CaQU 3 xQB O=OaD 0 3813 u=wD ?}Q[ 7 876 =O@tq 96 xk}kO Q@ QwO |v=QwO CaQU "xOW |L=Q] u}@QwD |L=Q] |x]kv "9 pwOH Q=Okt xYNWt 10 845 x}v=F Q@ QDt O=@ u=}QH CaQU 3 xQB O=OaD 0 3813 u=wD ?}Q[ 7 876 =O@tq 96 xk}kO Q@ QwO |v=QwO CaQU u=wD|t xQB Qy |wQ u=tr= 500 ZQi =@ "OQm sUQ x]kv u}= |=Q@ =Q xQB pw] |=DU=Q "CN=OQB xQB |=DU=Q QO hrDNt |=yC}tm C=Q}}eD xwLv j}kO |UQQ@ x@ |=Q@ xQB Oa@|@ pw] |=DU=Q QO =UB |wQ}v C=Q}}eD u; QO xm 16 pmW QO |wQ}v '=O@tq V}=Ri= =@ xm OwW|t x_Lqt 'CU= xOW xOQw; hrDNt |=y=O@tq QO =UB |wQ}v xm CU= x_Lqt p@=k Kw[w x@ ,=vt[ "OwW|t Vy=m Q=JO =UB 'xQB |}=OD@= \=kv QO xvW}@ x]kv l} x@ uO}UQ R= TB w xOw@ |OwaY xQB |=OD@= QDw pw] V}=Ri= Cra x@ `k=w QO |}=OD@= \=kv QO =UB |wQ}v V}=Ri= "OwW|t |rwRv |xOwOLt QO xQB |}=OD@= \=kv uwJ u}vJty "CU= |L=wv u}= QO 9 pmW j@=]t QDW}@ xQB |}=yDv= \=kv x@ C@Uv \=kv u}= QO =UB |wQ}v u}=Q@=v@ 'OvQ=O Q=Qk p=DU= "CU= xQB Oa@|@ pw] ?ULQ@ |QDt=Q=B |xar=]t "4"4 QO |yHwD p@=k |}=v=wD Tmwrwv}= O=@ |SQv= ?P=H sDU}U 'OW KQ]t xm u=vJ OYQO 66 ,=OwOL Ov=wD|t w OQ=O O=@ u=}QH R= |SQv= ?PH u=tOv=Q V}=Ri= |=yxQB x@ xm |O=@ u=}QH CaQU V}=Ri= =@ "OyO V}=Ri= =Q O=R; O=@ u=}QH CaQU Q}}eD VwNDUO O=@ u}@QwD |m}t=v}OwQ}; |=yQDt=Q=B Q}O=kt 'OwW|t xO}@=D u}@QwD Q}otWJ CaQU V}=Ri= R= |W=v xm '=yQDt=Q=B u}= C=Q}}eD |UQQ@ |=Q@ "OW Oy=wN XNWt |=O@tq l} l CU= sRq 'CU= Tmwrwv}= sDU}U \UwD O=@ u=}QH XNWt xQB Oa@|@ pw] O=ODt= QO hrDNt |m}t=v}OwQ}; |=yQDt=Q=B |UQQ@ |=Q@ OW=@ xv}y@ |L=Q] x]kv x@ \w@Qt |=O@tq u=ty =O@tq u}= xm CU= QDy@ "OwW 9 pwOH "O=O Q=Qk QDj}kO |UQQ@ OQwt |i}m Q_v R= u=wD@ =Q |HwQN G}=Dv =D u=Wv =Q Q[=L Q=m QO xOW |L=Q] |O=@ u}@QwD |L=Q] x]kv x@ \w@Qt C=aq]= "OyO|t QO hrDNt |=yQDt=Q=B Q=Owtv u=wD|t '|L=Q] |xv}y@ |x]kv uOw@ XNWt =@ xO}O hrDNt |=y=O@tq |=Q@ xQB |=DU=Q QO u=wD ?}Q[ Q=Owtv 17 pmW QO xDi=} V}=Ri= |rLt u=wD ?}Q[ xv}W}@ Q=Okt '=O@tq V}=Ri= =@ =OD@= QO "OwW|t C=Q}}eD OvwQ XNWt |=O@tq l} x@ uO}UQ =@ =t= "OwW|t QwO xQB lwv R= w R}v =O@tq ?ULQ@ u=wD ?}Q[ C=Q}}eD XwYNQO OvwQ u}ty "OwW|t Tma TB TBU w xOW QDW}@ =OD@= QO u=wD ?}Q[ Q=Okt '=O@tq V}=Ri= =@ "CW=O OwHw \=kv xm u}= x@ xHwD =@ u}vJty "O@=}|t Vy=m '|a[wt xv}W}@ l} R= Qw@a R= u=wD O}rwD QO |QDsm syU u}=Q@=v@ 'OvQ=O Q=Qk p=DU= ZQat QO QDW}@ xQB |}=OD@= xQB |}=yDv= \=kv QO u=wD ?}Q[ xv}W}@ xm OwQ|t Q=_Dv= xH}Dv QO "CW=O Ovy=wN "ODi}@ j=iD= = 18 pm r = = q = = = ; = xOy=Wt 18 pmW QO hrDNt |=y=O@tq |=Q@ xQB |=DU=Q QO ;Q@ |wQ}v Q=Owtv 44 "hrDNt |=y=O@tq |=Q@ xQB |=DU=Q QO ;Q@ |wQ}v "18 pmW "hrDNt |=y=O@tq |=Q@ xQB |=DU=Q QO u=QW}B |wQ}v "19 pmW "hrDNt |=y=O@tq |=Q@ xQB |=DU=Q QO ;Q@ |wQ}v "18 pmW "hrDNt |=y=O@tq |=Q@ xQB |=DU=Q QO ;Q@ |wQ}v "18 pmW "hrDNt |=y=O@tq |=Q@ xQB |=DU=Q QO ;Q@ |wQ}v "18 pmW K}LYD ?}Q[ R= BIM |x}Q_v Om |HvUQ=@Da= |=Q@ w |r}rLD VN@ QO  K}LYD ?}=Q[ Q}=U |xU}=kt Qw_vt x@ "xOW xO=iDU= CQ;wro xDiW; xr=@vO u=}t `t=H |}xU}=kt '=yu; CkO u=Q}t |UQQ@ w CQ;wro K}LYD ?}Q[ =@ K}LYD xm OyO|t u=Wv G}=Dv "CiQo CQwY uwDQ@ w CQ;wro K}LYD ?}=Q[ u; R= |QDsm G}=Dv w xOQm pta QDxv=Q=m x_i=Lt CQ;wro K}LYD C@Uv x@ uwDQ@ \}=QW QO uwDQ@ K}LYD xm CQwY u}= x@ &O};|t CUO x@ u=wD ?}Q[ |=Q@ QDsm Q@=Q@ 0 913 w 0 878 ?}DQD x@ =Q u; Q_=vDt |=O@tq w u=wD ?}Q[ x@=Wt "Ovm|t |v}@V}B "hrDNt |=y=O@tq |=Q@ xQB |=DU=Q QO u=QW}B |wQ}v "19 pmW Q=_Dv= R= QwO u}=Q@=v@ 'OvQ=O Q=Qk p=DU= |xOwOLt QO xQB |}=OD@= \=kv "OwW|t xOy=Wt "OW=@ QDsm ;Q@ |wQ}v xQB |}=yDv= \=kv x@ C@Uv \=kv u}= QO xm CU}v 0 1445 `=aW QO Q=Owtv xm u}= =D CU= |OwaY Q=Owtv OvwQ =OD@= QO xm OwW|t uwDw}v 2 29 Q@=Q@ x]kv u}= QO ;Q@ |wQ}v Q=Okt "OUQ|t |a[wt |xv}W}@ x@ QDt `wkw p=tDL= V}=Ri= w QDw C=Q}}eD OvwQ QO Q}}eD Crax@ ;Q@ |wQ}v TBU "CU= xm "OUQ|t OwN Q=Okt u}QDsm x@ 0 2797 `=aW QO w xDi=} Vy=m 'p=DU= x@ |OwaY OvwQ Q=Owtv xt=O= QO "CU= uwDw}v 2 165 Q@=Q@ ;Q@ |wQ}v u; QO uwDw}v 2 552 |va} OwN Q=Okt xv}W}@ x@ QDt 0 7537 `=aW QO w xDiQo OwN 'OvW=@ xDW=O Q=Qk p=DU= xOwOLt QO xQB |}=OD@= \=kv xm OwQ|t Q=_Dv= "OUQ|t QDsm ;Q@ |wQ}v w QDW}@ =UB |wQ}v xQB |}=yDv= \=kv x@ C@Uv \=kv u}= QO u}=Q@=v@ "CU= =yO=tv &`@Qt QDt CL=Ut %A &pDv=QB hqD= ?}Q[ %F &|QwLt |}=kr= ?}Q[ %a &|U=tt |}=kr= ?}Q[ %a0 &;Q@ ?}Q[ %CL &=UB ?}Q[ %CD &xv}W}@ |=UB x@ ;Q@ ?}Q[ C@Uv %(CL=CD)max &u=wD ?}Q[ %CP &uDw}v ;Q@ |wQ}v %L &uDw}v =UB |wQ}v %D &C=w u=wD %P &uDw}v |QwLt |wQ}v %T &QDt uDw}v Qw=DWo %Q &x}v=F Q@ QDt p=}U CaQU %U &QDt QwDwQ `=aW %R &QDt |rLt `=aW %r &QDt xQB |=DU=Q QO QDw `}RwD %C(r) References `@=vt 11. Karimian Aliabadi, S. and Rasekh, S. \E ect of platform disturbance on the performance of o shore wind turbine under pitch control", Wind Energy, 23, pp. 1210-1230 (2020). 1. Rezaey, S. \Numerical investigation of a globe con- trol valve and estimating its loss coecient at dif- ferent opening states", European Journal of Compu- tational Mechanics, 29(4-6), pp. 549-576 (2021). DOI: https://doi.org/10.13052/ejcm1779-7179.294610. 12. Karimian, S. and Rasekh, S. \Power and noise perfor- mance assessment of a variable pitch vertical axis dar- rieus type wind turbine", Journal of the Brazilian So- ciety of Mechanical Sciences and Engineering, 43, pp. 1-21 (2021). 2. Allaei, D. and Andreopoulos, Y. \INVELOX: a new con- cept in wind Energy harvesting, Proceeding of ASME 2013 7th International Conference on energy Sustain- ability & 11th Fuel Cell Science, Engineering and Tech- nology Conference ES-Fuel Cell, pp. 14-19 (2013). 13. Asghari, M., Karimian Aliabadi, S. and Hashemi, M. \Study the e ect of suction ow control on the aerody- namic performance of a wind turbine using 2D section numerical results", Sharif Journal of Mechanical Engi- neering, 37 pp. 79-89 (2021). 3. Allaei, D. and Andreopoulos, Y. \INVELOX: description of a new concept in wind power and its performance evaluation", Energy, 69, pp. 336-344 (2014). 4. Allaei, D., Tarnowski, D. and Andreopoulos, Y. \IN- VELOX with multiple wind turbine generator systems", Energy, 93, pp. 1030-1040 (2015). 14. Tahani, M., Kavari, G., Masdari, M. and et al. \Aero- dynamic design of horizontal axis wind turbine with in- novative local linearization of chord and twist distribu- tions", Energy, 131, pp. 78-91 (2017). 5. Sedaghat, A., Waked, A., Assad, H. and et al. Anahysis of accelerating devices for enclosure wind turbines. Int. J. Astronaut. Aeronaut. Eng, 2(9), pp.9-23 (2017). 15. Branlard, E., Wind Turbine Aerodynamics and Vorticity-Based Methods: Fundamentals and Recent Applications, Springer (2017). 6. Patil, M.N, Ghadage, S.M., Gaikwad, O.R. and et al. De- sign and Fabrication of Invelox, International Research Journal of Engineering and Technology (IRJET), 6(6), pp.765-768 (2019). 16. Manwell, J.F., McGowan, J.G. and Rogers, A.L., Wind Energy Explained: Theory, Design and Application, John Wiley & Sons (2010). 7. Akour, S.N. and Bataineh, H.O. \Design considerations of wind funnel concentrator for low wind speed regions", AIMS Energy, 7, pp. 728-742 (2019). 17. Burton, T., Jenkins, N., Sharpe, D. and et al., Wind Energy Handbook, John Wiley & Sons (2011). 8. Solanki, A.L., Kayasth, B.D. and Bhatt, H. =yO=tv '4 hrDNt |=y=O@tq |=Q@ xQB |=DU=Q QO =Q u=QW}B |wQ}v Q=Owtv 19 pmW u}= w CU= |OwaY u=QW}B |wQ}v xm OwW|t xO}O =OD@= QO "Ovm|t x=Q= 8 w 6 \=kv QO QDw pw] V}=Ri= p}rO x@ xm OQ}o|t CQwY |OvD ,=D@Uv ?}W =@ OwaY `=aW QO uwDw}v 0 01 Q=Okt x@ uO}UQ R= TB u=QW}B |wQ}v "CU= xQB Qy |}=OD@= Q}}eD x@ u=wD|t =Q u=QW}B |wQ}v OvwQ Q}}eD "OwW|t Vy=m Q=JO '0 5056 Oa@|@ u=wD|t 8 |x]@=Q R= |Q}op=QoDv= =@ "O=O C@Uv u; uOW |Wy=m w QDw `}RwD OvwQ |xv}y@ |x]kv QO,qFt "OQm x@U=Lt |}=O@tq Qy QO =Q QwDwQ u=QW}B |wQ}v pm Q=Okt uwDw}v21 912'xQB3ZQi=@xOW|L=Q]O=@u}@QwDu=QW}B|wQ}vQ=Okt'|L=Q] "O};|t CUO x@ 45 """ Tmwrwv}= O=@ |SQv= ?P=H sDU}U l} |R=UpOt &xQB lwv CaQU C@Uv % &QDt |BwD `=aW %Rhub &ROrwv}Q OOa %Re &xQB O=OaD %B &xHQO xrtL |x}w=R % &xHQO VJ}B |x}w=R % &xHQO xv}y@ VJ}B |x}w=R %opt &xHQO u=}QH x}w=R % &?amt QDt Q@ sQowr}m |r=oJ % &xOR=@ % &C}@rY =} s=mLDU= ?}Q[ % "xk}kO Q@ QwO QwDwQ |v=QwO CaQU %! (HAWT) blade shapes using experimental and numerical methods", Energies, 6 pp. 2784-2803 (2013). References `@=vt References `@=vt \Design modi cation & analysis for venturi section of INVELOX system to maximize power using multiple wind turbine", Int J Innovat Res Sci Technol, 3, pp. 125-127 (2017). 18. SnehalNarendrabhai, P. and Desmukh, T. \Numerical simulation of ow through INVELOX wind turbine sys- tem", International Journal of Renewable Energy Re- search, 8, pp. 291-301 (2018). 9. Glauert, H. \The analysis of experimental results in the windmill brake and vortex ring states of an airscrew", HM Stationery Oce (1926). 19. Tangler, J.L. and Somers, D.M. \NREL airfoil families for HAWTs", National Renewable Energy Lab., Golden, CO (United States) (1995). 10. Hsiao, F.-B., Bai, C.-J. and Chong, W.-T. \The perfor- mance test of three di erent horizontal axis wind turbine 20. http://airfoiltools.com/airfoil/details. 46 46
https://openalex.org/W4246514263
https://ora.ox.ac.uk/objects/uuid:c2ca694d-a23a-4411-9aba-711dc3e55033/files/mf851b4737db199abec2bc0b8926e4125
English
null
Quantum correlations between single telecom photons and a multimode on-demand solid-state quantum memory
null
2,017
cc-by
6,981
Quantum Correlations between Single Telecom Photons and a Multimode On-Demand Solid-State Quantum Memory Alessandro Seri,1 Andreas Lenhard,1 Daniel Rieländer,1 Mustafa Gündoğan,1,† Patrick M. Ledingham,1 Margherita Mazzera,1,* and Hugues de Riedmatten1,2 1ICFO-Institut de Ciences Fotoniques, The Barcelona Institute of Science and Technology, Mediterranean Technology Park, 08860 Castelldefels (Barcelona), Spain 2ICREA-Institució Catalana de Recerca i Estudis Avançats, 08015 Barcelona, Spain (Received 9 December 2016; revised manuscript received 30 March 2017; published 24 May 2017) Alessandro Seri,1 Andreas Lenhard,1 Daniel Rieländer,1 Mustafa Gündoğan,1,† Patrick M. Ledingham Margherita Mazzera,1,* and Hugues de Riedmatten1,2 1ICFO-Institut de Ciences Fotoniques, The Barcelona Institute of Science and Technology, Mediterranean Technology Park, 08860 Castelldefels (Barcelona), Spain 2ICREA-Institució Catalana de Recerca i Estudis Avançats, 08015 Barcelona, Spain (Received 9 December 2016; revised manuscript received 30 March 2017; published 24 May 2017) Alessandro Seri,1 Andreas Lenhard,1 Daniel Rieländer,1 Mustafa Gündoğan,1,† Patrick M. Ledingham,1 Margherita Mazzera,1,* and Hugues de Riedmatten1,2 1ICFO-Institut de Ciences Fotoniques, The Barcelona Institute of Science and Technology, Mediterranean Technology Park, 08860 Castelldefels (Barcelona), Spain 2ICREA-Institució Catalana de Recerca i Estudis Avançats, 08015 Barcelona, Spain (Received 9 December 2016; revised manuscript received 30 March 2017; published 24 May 2017) Quantum correlations between long-lived quantum memories and telecom photons that can propagate with low loss in optical fibers are an essential resource for the realization of large-scale quantum information networks. Significant progress has been realized in this direction with atomic and solid-state systems. Here, we demonstrate quantum correlations between a telecom photon and a multimode on- demand solid state quantum memory. This is achieved by mapping a correlated single photon onto a spin collective excitation in a Pr3þ∶Y2SiO5 crystal for a controllable time. The stored single photons are generated by cavity-enhanced spontaneous parametric down-conversion and heralded by their partner photons at telecom wavelength. These results represent the first demonstration of a multimode on-demand solid state quantum memory for external quantum states of light. They provide an important resource for quantum repeaters and pave the way for the implementation of quantum information networks with distant solid state quantum nodes. Subject Areas: Photonics, Quantum Physics, Quantum Information *margherita.mazzera@icfo.es †Present address: Cavendish Laboratory, University of Cambridge, J.J. Thomson Avenue, Cambridge CB3 0HE, United Kingdom. ‡Present address: Department of Physics, Clarendon Laboratory, University of Oxford, Oxford OX1 3PU, United Kingdom. Selected for a Viewpoint in Physics PHYSICAL REVIEW X 7, 021028 (2017) Selected for a Viewpoint in Physics PHYSICAL REVIEW X 7, 021028 (2017) DOI: 10.1103/PhysRevX.7.021028 Published by the American Physical Society II. EXPERIMENTAL DETAILS y p g Our cavity-enhanced SPDC source produces ultra- narrow-band photon pairs, where one photon, the idler, is in the telecom E-band at 1436 nm, and the other, the signal, is resonant with the Pr3þ optical transition at 606 nm, specifi- cally with the transition where the AFC is prepared [28,35]. The pump laser wavelength is 426.2 nm, and the average power for the measurements presented in this paper is 3.3  0.5 mW. The probability to obtain a single signal photon in front of the quantum memory conditioned on a detection in the idler SPD (i.e., the heralding efficiency) is ηH ¼ ð20.9  0.5Þ%. We also switch off the SPDC pump after the detection of the idler photons for 30 to 40 μs (depending on the experiment), thus interrupting the creation of photon pairs during the detection of the stored and FIG. 1. (a) The experimental setup. Photon pairs are created by cavity-enhanced spontaneous parametric down-conversion (SPDC) in a periodically poled lithium niobate (PPLN) crystal. At the output of the cavity, they are separated by a dichroic mirror (DM). The idler photon is further filtered with a cavity (FCav) to select a single frequency mode, before being coupled in an optical fiber and detected with an InGaAs single-photon detector (SPD). The signal photon is spectrally filtered with a band-pass filter (BPF) and an etalon, before being coupled in a single-mode optical fiber and directed towards the quantum memory (QM), where it is stored using the AFC scheme. Control pulses (CPs) are used to transfer optical excitations to spin waves and back; they are sent at an angle and counterpropagating with respect to the input photons. The retrieved single photon is spectrally filtered using a filter crystal (FC) before being detected by a silicon SPD. Temporal filtering is achieved with acousto-optic modulators, placed after the memory crystal, opened only when we expect the SW echo. This prevents additional hole burning in the filter crystal and the SPD to be blinded by eventual leakage of the control pulses. During the preparation of the memory crystal via optical pumping, the SPDs of both idler and signal arms are gated off. After each AFC preparation, the gates are opened, and we detect the arrival time of both photons of the pair during a measurement time of about 100 ms, leading to a duty cycle of 0.14. II. EXPERIMENTAL DETAILS “write-read” quantum memory that can store an externally prepared quantum optical state sharing a quantum corre- lation with a telecom band photon. To date, this has not been achieved with an on-demand spin-wave solid state quantum memory. Its successful realization with single photons requires an efficient quantum light source match- ing the spectral properties of the quantum memory [35,36] and the quasisuppression of the noise generated by the strong control pulses. These tasks are challenging because of the small spectral separation between the hyperfine states of the optically active ions (a few MHz in our system). Figure 1 depicts the experimental setup (a) and the relevant energy-level scheme of Pr3þ∶Y2SiO5 (b), where the chosen Λ system is indicated by arrows. The atomic frequency comb is prepared, following the spectral hole-burning procedure described in Ref. [37], at the frequency of the 1=2g −3=2e transition, and the control pulses drive the coherence from the 3=2e to the empty 3=2g storage state and back. The narrow-band spectral filtering of the noise resulting from the control pulses is accomplished with a second Pr3þ∶Y2SiO5 crystal, where a narrow trans- parency window (around 5.5 MHz) is burned at the frequency of the AFC [31]. An example of AFC prepared in the memory crystal overlapped with the narrow spectral hole burned in the filter crystal is reported in Fig. 2(a). Here, we demonstrate the spin-wave storage with on-demand retrieval of heralded single photons in a Pr3þ∶ Y2SiO5 crystal using the full atomic frequency comb (AFC) scheme. This is achieved by generating pairs of nondegenerate single photons where one photon is reso- nant with the optical transition of Pr3þ∶Y2SiO5 while the other photon is at telecom wavelength. The telecom photon is used to herald the presence of the other photon, which is stored as a SW in the crystal and retrieved on demand after a controllable time. We measure second- order cross-correlation values between the heralding and the retrieved photons, which exceed the classical bound fixed by the Cauchy-Schwarz inequality for storage times longer than 30 μs, effectively demonstrating quantum correlations between telecom photons and single spin waves in a solid. Moreover, we demonstrate that our memory can store spin waves in multiple independent temporal modes. I. INTRODUCTION [19,20] or optomechanical systems [10]. However, the most efficient and long-lived storage systems up to date are working at wavelengths far from the telecom window, leading to a large loss in optical fibers. Possible solutions to overcome this problem include quantum frequency con- version [3,21–25] or nondegenerate photon pair sources to establish entanglement between quantum memories and telecom photons [15,26–29]. The latter approach has been demonstrated using the atomic frequency comb scheme [30] in rare-earth-doped single crystals or waveguides [15,27,28], but the storage of photonic entanglement has only been performed so far in the excited state for short and predetermined storage times. Photonic quantum memories [1] are essential elements for quantum information networks [2], providing efficient and on-demandinterfacingbetweensinglephotonsandstationary qubits, e.g., atomic gases [3–6], electronic spins in diamonds [7,8], or phonons [9,10]. Besides featuring efficiencies and storage times comparable to or even surpassing those of atomic gases [11–14], solid state photonic memories based on rare-earth-doped crystals are becoming increasingly important as they offer prospects for scalability and inte- grability [15–18]. Most protocols for long-distance quan- tum communication require quantum memories connected to communication channels through optical fibers. One possible direction to achieve this goal is to use telecom quantum memories, e.g., based on erbium-doped solids Longer and programmable storage times can be obtained by transferring the optical atomic excitations to long-lived spin collective excitations [spin waves (SWs)] thanks to control laser pulses [30]. Recently, spin-wave storage of weak coherent states at the single-photon level [31,32], including qubit storage [31,33], has been demonstrated with rare-earth-doped crystals. The generation and storage of continuous variable entanglement between a multimode solid state quantum memory and a light field have also been reported recently [34]. In this experiment, light- matter entanglement is created within the memory between spontaneously emitted light and spin waves, the matter part then being converted into a light field. This is a “read- only” quantum memory [1], with the generated light fields being resonant and, for this demonstration, outside the telecommunication band. This motivates the need for a Published by the American Physical Society under the terms of the Creative Commons Attribution 4.0 International license. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI. 021028-1 Published by the American Physical Society Published by the American Physical Society 2160-3308=17=7(2)=021028(7) ALESSANDRO SERI et al. PHYS. REV. X 7, 021028 (2017) II. EXPERIMENTAL DETAILS (b) Hyperfine splitting of the first sublevels of the ground 3H4 and the excited 1D2 manifold of Pr3þ in Y2SiO5. The arrows highlight the Λ system chosen for the storage. FIG. 1. (a) The experimental setup. Photon pairs are created by cavity-enhanced spontaneous parametric down-conversion (SPDC) in a periodically poled lithium niobate (PPLN) crystal. At the output of the cavity, they are separated by a dichroic mirror (DM). The idler photon is further filtered with a cavity (FCav) to select a single frequency mode, before being coupled in an optical fiber and detected with an InGaAs single-photon detector (SPD). The signal photon is spectrally filtered with a band-pass filter (BPF) and an etalon, before being coupled in a single-mode optical fiber and directed towards the quantum memory (QM), where it is stored using the AFC scheme. Control pulses (CPs) are used to transfer optical excitations to spin waves and back; they are sent at an angle and counterpropagating with respect to the input photons. The retrieved single photon is spectrally filtered using a filter crystal (FC) before being detected by a silicon SPD. Temporal filtering is achieved with acousto-optic modulators, placed after the memory crystal, opened only when we expect the SW echo. This prevents additional hole burning in the filter crystal and the SPD to be blinded by eventual leakage of the control pulses. During the preparation of the memory crystal via optical pumping, the SPDs of both idler and signal arms are gated off. After each AFC preparation, the gates are opened, and we detect the arrival time of both photons of the pair during a measurement time of about 100 ms, leading to a duty cycle of 0.14. (b) Hyperfine splitting of the first sublevels of the ground 3H4 and the excited 1D2 manifold of Pr3þ in Y2SiO5. The arrows highlight the Λ system chosen for the storage. 021028-2 021028-2 IV. SPIN-WAVE STORAGE OF HERALDED SINGLE PHOTONS To access the spectrum of the heralded photons to be stored, we compare two measurements. First, we measure the temporal distribution of coincidences between the signal and idler photons of the source alone [36]. This correlation function has a width of 78 ns (FWHM), which is the correlation time of the photons. From this value, we calculate a biphoton bandwidth of 2.8 MHz. In a second experiment, we employ the Pr3þ∶Y2SiO5 memory crystal as a tunable frequency filter [31,39,40]. We prepare a 800-kHz- wide spectral hole and record coincidence histograms when the central frequency is swept by about 10 MHz around the frequency of the signal photons. In this experiment, the photons passing through the transparency window are directly steered to the APD for detection, bypassing the temporal and spectral filtering stages. The coincidence rate as a function of the hole position [blue diamonds overlapped with the AFC in Fig. 2(a)] gives the spectral distribution of the heralded single photons at 606 nm. The result of this measurement agrees with the spectrum extrapolated from the signal-idler coincidence histogram measured immedi- ately after the SPDC source [36]. This is confirmed by the good overlap between the diamonds and the blue dotted line, which represents the convolution of a Lorentzian curve of width 2.8 MHz and the trace of the 800-kHz-wide spectral We first measure the coincidence histogram when the signal photons are sent through a 18-MHz-wide transparency window prepared in the memory crystal [input trace at 0 μs in Fig. 2(b)]. The correlation time between the signal and idler photons is τc ¼ ð89  4Þ ns, leading to a heralded photon line width of ð2.5  0.1Þ MHz [36]. The correlation between the two photons is inferred by measuring the normalized second-order cross-correlation function gð2Þ s;i ¼ Ps;i=ðPs · PiÞ, where Ps;i is the probability to detect a coincidence between idler and signal photons in a time window ΔTd ¼ 320 ns, while Pi and Ps are the uncondi- tional probabilities to detect each photon. We find a gð2Þ s;i value of 96  32. Then, we prepare an AFC with periodicity Δ and storethesinglephotonasacollectiveopticalatomicexcitation jψei ¼ ð1= ffiffiffiffi N p Þ PN j¼1 eixj·kinjg1…ej…gNi, where kin is the wave vector of the incoming photon [see level scheme in Fig. 1(b)]. 021028-2 QUANTUM CORRELATIONS BETWEEN SINGLE TELECOM … PHYS. REV. X 7, 021028 (2017) FIG. 2. (a) Example of an atomic frequency comb prepared for τ ¼ 7.3 μs (red trace). The light violet trace is the transparency window that we burn in the filter crystal. The diamonds are signal-idler coincidence rates taken after preparing a single 800-kHz broad transparency window in the memory crystal and moving its frequency along the input photons. The error is smaller than the data points. The dotted blue line is a simulation of a Lorentzian peak with FWHM ¼ 2.8 MHz convoluted with a 800-kHz-wide spectral hole. (b) Time histograms of the input photons (black trace), the AFC echo at τ ¼ 7.3 μs (red trace), and the SW echo (blue trace) acquired over an integration time of 343 min. We construct the coincidence histogram by taking the detection of the idler photons as a start and the detection of a signal photon after the memory as a stop. The coincidence count rate in the AFC echo is 4= min and in the SW echo ≈1= min. The control pulses, detected with a reference photodetector, are displayed as plain pulses and are separated by Ts ¼ 6 μs. They are modulated in amplitude and frequency with Gaussian and hyperbolic tangent waveforms, respectively, as described in Ref. [38]. The peak power is 21 mW. The dashed vertical lines indicate the integration window for the signal (ΔTd ¼ 320 ns), while the dashed horizontal line represents the noise floor. (c) Coincidence counts for the SW echo at T ¼ τ þ Ts ¼ 13.3 μs normalized by the average noise level, along with its fit to a double exponential function, to account for the Lorentzian spectral shape of the SPDC photons. FIG. 2. (a) Example of an atomic frequency comb prepared for τ ¼ 7.3 μs (red trace). The light violet trace is the transparency window that we burn in the filter crystal. The diamonds are signal-idler coincidence rates taken after preparing a single 800-kHz broad transparency window in the memory crystal and moving its frequency along the input photons. The error is smaller than the data points. The dotted blue line is a simulation of a Lorentzian peak with FWHM ¼ 2.8 MHz convoluted with a 800-kHz-wide spectral hole. 021028-2 (b) Time histograms of the input photons (black trace), the AFC echo at τ ¼ 7.3 μs (red trace), and the SW echo (blue trace) acquired over an integration time of 343 min. We construct the coincidence histogram by taking the detection of the idler photons as a start and the detection of a signal photon after the memory as a stop. The coincidence count rate in the AFC echo is 4= min and in the SW echo ≈1= min. The control pulses, detected with a reference photodetector, are displayed as plain pulses and are separated by Ts ¼ 6 μs. They are modulated in amplitude and frequency with Gaussian and hyperbolic tangent waveforms, respectively, as described in Ref. [38]. The peak power is 21 mW. The dashed vertical lines indicate the integration window for the signal (ΔTd ¼ 320 ns), while the dashed horizontal line represents the noise floor. (c) Coincidence counts for the SW echo at T ¼ τ þ Ts ¼ 13.3 μs normalized by the average noise level, along with its fit to a double exponential function, to account for the Lorentzian spectral shape of the SPDC photons. retrieved photons. Further details about the experimental setup and the preparation of the atomic frequency comb can be found in Ref. [38]. hole. We estimate the spectral overlap between the heralded single photons and the AFC to be about 70%, which currently limits the AFC storage efficiency. IV. SPIN-WAVE STORAGE OF HERALDED SINGLE PHOTONS We obtain, for a preprogrammed storage time τ ¼ ð1=ΔÞ ¼ 7.3 μs, an efficiency ηAFC ¼ ð11.0  0.5Þ% and gð2Þ AFC;i ¼ 130  31 [see Fig. 2(b)]. This result represents an improvement in terms of gð2Þ AFC;i of more than 1 order of magnitude compared to the state of the art in the same system an improvement in terms of gð2Þ AFC;i of more than 1 order of magnitude compared to the state of the art in the same system 021028-3 PHYS. REV. X 7, 021028 (2017) ALESSANDRO SERI et al. [28]. The gð2Þ value increases after the AFC storage due to the fact that the stored photons are transferred to a temporal mode free of noise [28]. After the retrieval, we measure τc ¼ ð147  7Þ ns, larger than the value measured before storage. We attribute this temporal stretching to spectral mismatch between the input photons before the memory (FWHM ¼ 2.8 MHz) and the atomic frequency comb (total width 4 MHz), as evidenced in Fig. 2(a). [28]. The gð2Þ value increases after the AFC storage due to the fact that the stored photons are transferred to a temporal mode free of noise [28]. After the retrieval, we measure τc ¼ ð147  7Þ ns, larger than the value measured before storage. We attribute this temporal stretching to spectral mismatch between the input photons before the memory (FWHM ¼ 2.8 MHz) and the atomic frequency comb (total width 4 MHz), as evidenced in Fig. 2(a). infer gð2Þ swe;i. With our filtering strategy, we reach a noise floor of ð2.0  0.1Þ × 10−3 photons per storage trial at the memory crystal (horizontal dashed line in the SW echo temporal mode). The correlation time of τc ¼ ð200  40Þ ns exceeds the one after storage in the excited state. This further increase after the SW storage is attributed to the limited chirp of the control pulses (see Ref. [38]). We then perform spin-wave storage experiments by sending pairs of strong control pulses after the detection of each heralding photon. The first control pulse with wave vector kC transfers the collective optical excitation jψei to a collective spin excitation (a spin wave), which can be written as jψswi ¼ ð1= ffiffiffiffi N p Þ PN j¼1 eixj·ðkin−kCÞjg1…sj…gNi. V. QUANTUM CORRELATION BETWEEN SINGLE TELECOM PHOTONS AND SINGLE SPIN WAVES To investigate the nonclassical nature of the photon correlation after the SW storage, we measure gð2Þ swe;iðΔTdÞ and compare it to the unconditional autocorrelation of the idler [gð2Þ i;i ðΔTdÞ] and retrieved signal [gð2Þ swe;sweðΔTdÞ] fields, respectively. To access these quantities, we correlate photon detections from different unconditional storage iterations [see Fig. 3(a)]. The time between two consecutive storage trials is 190 μs. In each trial (500 per comb preparation), we maintain the gate of the idler SPD open during 4.5 μs before sending the control pulses. We find gð2Þ swe;i ¼ 6.1  0.7. We note that our gð2Þ swe;i is limited by the spin-wave read-out efficiency, which we estimate to be approximately FIG. 3. (a) Unconditional cross-correlation between the idler photons and the retrieved signal photons. The gð2Þ swe;iðΔTd ¼ 320 nsÞ value for this measurement is 6.1  0.7. The classical bound given by the Cauchy-Schwarz inequality is reported as a horizontal line. The error bars are calculated considering Poissonian statistics. (b) Scheme representing the analysis of the cross-correlation measurement to evidence the multimodality. Both idler and retrieved signal integration windows are divided into smaller intervals (640 ns), and the correlation is calculated between intervals separated by different storage time. (c) Cross-correlation value between idler and retrieved signal photons detected in small temporal modes separated by different storage times. For this analysis, we also set ΔTd ¼ 640 ns for better statistics. The gð2Þ swe;iðΔTd ¼ 640 nsÞ exceeds the classical threshold for ΔTd ¼ 640 ns (reported in the color bar) only for windows separated by the total storage time T ¼ 13.3 μs. Violations outside these windows are not statistically significant because of a low number of counts. (d) Cross- correlation value between the idler photons and the retrieved signal photons (full circles) and the coincidence counts in the SWecho (empty squares) as a function of the detection window for the idler photons. Both the signal detection window and the coincidence window remain constant at 4.5 μs and 320 ns, respectively. The classical threshold is also reported as a horizontal line. The integration time for this measurement is 38.5 h. The error bars are calculated considering Poissonian statistics. FIG. 3. (a) Unconditional cross-correlation between the idler photons and the retrieved signal photons. The gð2Þ swe;iðΔTd ¼ 320 nsÞ value for this measurement is 6.1  0.7. IV. SPIN-WAVE STORAGE OF HERALDED SINGLE PHOTONS For a storage time in the ground state of Ts ¼ 6 μs (thus, a total storage time T ¼ Ts þ τ ¼ 13.3 μs), we detect the retrieved photons, i.e., the spin-wave echo (swe), with an efficiency ηsw ¼ ð3.6  0.2Þ%. Note that ηsw is inferred with a coincidence window of ΔTd ¼ 320 ns, containing 80% of the signal, and it includes the loss in the filter crystal. Figure 2(c) shows a magnification of the SW echo mode, normalized by the average value of the noise measured outside the peak, leading directly to the signal-to-noise ratio (SNR) of the stored and retrieved photons. We observe a maximum SNR of around 5. This curve can also be used to V. QUANTUM CORRELATION BETWEEN SINGLE TELECOM PHOTONS AND SINGLE SPIN WAVES The classical bound given by the Cauchy-Schwarz inequality is reported as a horizontal line. The error bars are calculated considering Poissonian statistics. (b) Scheme representing the analysis of the cross-correlation measurement to evidence the multimodality. Both idler and retrieved signal integration windows are divided into smaller intervals (640 ns), and the correlation is calculated between intervals separated by different storage time. (c) Cross-correlation value between idler and retrieved signal photons detected in small temporal modes separated by different storage times. For this analysis, we also set ΔTd ¼ 640 ns for better statistics. The gð2Þ swe;iðΔTd ¼ 640 nsÞ exceeds the classical threshold for ΔTd ¼ 640 ns (reported in the color bar) only for windows separated by the total storage time T ¼ 13.3 μs. Violations outside these windows are not statistically significant because of a low number of counts. (d) Cross- correlation value between the idler photons and the retrieved signal photons (full circles) and the coincidence counts in the SWecho (empty squares) as a function of the detection window for the idler photons. Both the signal detection window and the coincidence window remain constant at 4.5 μs and 320 ns, respectively. The classical threshold is also reported as a horizontal line. The integration time for this measurement is 38.5 h. The error bars are calculated considering Poissonian statistics. 021028-4 021028-4 021028-4 QUANTUM CORRELATIONS BETWEEN SINGLE TELECOM … PHYS. REV. X 7, 021028 (2017) ηR ¼ 24%, while the write efficiency is ηW ¼ 31% (see Ref. [38] for a detailed discussion). With this unconditional sequence, the measured noise floor [ð1.3  0.1Þ × 10−3 photons per storage trial] is lower than with the conditional one (Sec. IV). We attribute this result to the fact that the number of control pulse pairs per comb is larger in the unconditional sequence.Thisprobablycontributes to further emptying of the spin storage state. The classical bound from the Cauchy-Schwarz inequality gð2Þ swe;i < ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi gð2Þ swe;swe · gð2Þ i;i q is indicated in Fig. 3(a) as a horizontal line. The measured unconditional autocorrelations are (also for ΔTd ¼ 320 ns) gð2Þ i;i ¼ 1.32  0.04 [36] and gð2Þ swe;swe ¼ 1.0  0.4 (see Ref. [38]). The Cauchy-Schwarz parameter R ¼ ððgð2Þ swe;iÞ2= gð2Þ swe;swe · gð2Þ i;i Þ ¼ 28  12 exceeds the classical limit of R ¼ 1 by more than 2 standard deviations. The confidence level for violating the Cauchy-Schwarz inequality, i.e., for observing a nonclassical correlation between the telecom heralding photon and the single spin wave stored in the crystal, is 98.8%. If a larger coincidence window is con- sidered, ΔTd ¼ 1 μs, the R value is reduced to 8.3  2.3 because of a bigger contribution of noise in the gð2Þ swe;i. On the other hand, because of a reduction of the statistical error, the confidence level for the demonstration of nonclassical correlation rises up to 99.92% (see Ref. [38]). boundoverthewholerange.Definingthenumberoftemporal modes as Nm ¼ Δti=ΔTd, we confirm nonclassical storage of a maximum of seven temporal modes with a ΔTd ¼ 640 ns that contains 94% of the coincidence peak. However, considering ΔTd ¼ 320 ns, which still contains 80% of the SW echo, a 4.5 μs-wide gate can accommodate up to 14 independent temporal modes. ηR ¼ 24%, while the write efficiency is ηW ¼ 31% (see Ref. [38] for a detailed discussion). With this unconditional sequence, the measured noise floor [ð1.3  0.1Þ × 10−3 photons per storage trial] is lower than with the conditional one (Sec. IV). We attribute this result to the fact that the number of control pulse pairs per comb is larger in the unconditional sequence.Thisprobablycontributes to further emptying of the spin storage state. 021028-4 The classical bound from Finally, to illustrate the ability to read out the stored spin wave ondemand, we perform storageexperiments at different SW storage times. For these measurements, we implement a semiconditional storage sequence in order to obtain good statistics with shorter integration time. We wait for heralding photons and, after each detection, we send 15 pairs of control pulses (each pair beingseparated fromtheneighboringoneby 190 μs), which we exploit to correlate the idler and the retrieved signal (see Ref. [38]). The measured storage and retrieval efficiencies are reported in Fig. 4(a), together with a Gaussian fit, which accounts for the inhomogeneous broad- ening of the spin state. As a fitting parameter, we obtain the spin inhomogeneous line width γinh ¼ ð20  3Þ kHz, in good agreement with that measured in different experiments on the same crystal [18,31]. This result further confirms that the photons are stored as spin waves. The second-order cross- correlation function for increasing SW storage times Ts is shown in Fig. 4(b). The red dashed curve is calculated by consideringtheGaussian fit ofthe signal decay [solid curve in panel (a)], normalized by the source heralding efficiency ηH and theaveragenoise floor of ð1.9  0.2Þ × 10−3 photonsper trial (the average being over the different Ts). We measure The main advantage of the full AFC protocol is the possibility to store multiple distinguishable temporal modes while maintaining their coherence and quantum correlation [30]. This ability is crucial for applications in quantum information protocols, e.g., to enable temporally multiplexed quantum repeater protocols with high communication speed [26] and storage of time-bin qubits robust against decoherence in optical fibers. To test this aspect, we perform experiments with detection gates much longer than the photon duration. We divide both the idler and the retrieved signal detection windows, Δti and Δts, respectively, into smaller temporal modes of width 640 ns, as sketched in Fig. 3(b). For this analysis, we also consider ΔTd ¼ 640 ns in order to have better statistics. We then check that we have nonclassical correlations between modes separated by the total storage time T ¼ Ts þ τ ¼ 13.3 μs and classical cor- relations between modes separated by T ≠13.3 μs, as shown in Fig. 3(c). Contrary to other temporally multimode storage protocols [11,34,41], in the full AFC protocol, the total storage time is maintained for the different temporal modes. VI. DISCUSSION AND CONCLUSION The demonstrated quantum correlation between a tele- com photon and a spin wave in a solid is an essential resource to generate entanglement between remote solid state quantum memories [26]. The measured value of gð2Þ swe;i after spin-wave storage is currently limited by the signal-to- noise ratio of the retrieved photon, which is, in turn, mostly limited by the low storage and retrieval efficiency. This value could be greatly improved by using higher optical depth [11] with higher-quality combs, or crystals in impedance matched cavities [42,43]. The storage time is currently limited by the spin inhomogeneous broadening and could be increased using spin-echo and dynamical decoupling techniques [32], with prospects for achieving values up to one minute [13] in our crystal, while even longer storage times (of order of hours) may be available in Eu3þ∶Y2SiO5 [14]. Finally, our experiment could be extended to the storage of entangled qubits, e.g., using time-bin encoding [31]. [5] S.-J. Yang, X.-J. Wang, X.-H. Bao, and J.-W. Pan, An Efficient Quantum Light-Matter Interface with Sub-Second Lifetime, Nat. Photonics 10, 381384 (2016). [6] Y.-W. Cho, G. T. Campbell, J. L. Everett, J. Bernu, D. B. Higginbottom, M. T. Cao, J. Geng, N. P. Robins, P. K. Lam, and B. C. Buchler, Highly Efficient Optical Quantum Memory with Long Coherence Time in Cold Atoms, Optica 3, 100 (2016). [7] B. Hensen, H. Bernien, A. E. Dreau, A. Reiserer, N. Kalb, M. S. Blok, J. Ruitenberg, R. F. L. Vermeulen, R. N. Schouten, C. Abellan et al., Loophole-Free Bell Inequality Violation Using Electron Spins Separated by 1.3 Kilometres, Nature (London) 526, 682 (2015). [8] S. Yang et al., High-Fidelity Transfer and Storage of Photon States in a Single Nuclear Spin, Nat. Photonics 10, 507 (2016). [9] D. G. England, K. A. G. Fisher, J.-P. W. MacLean, P. J. Bustard, R. Lausten, K. J. Resch, and B. J. Sussman, Storage and Retrieval of THz-Bandwidth Single Photons Using a Room-Temperature Diamond Quantum Memory, Phys. Rev. Lett. 114, 053602 (2015). In conclusion, we have reported the first demonstration of quantum storage of heralded single photons in an on-demand solid state quantum memory. We have shown that the nonclassical correlations between the heralding and the stored photons are maintained after the retrieval, thus demonstrating nonclassical correlations between single tele- com photons and single collective spin excitations in a solid. 021028-4 Toadditionallydemonstratethat themultimodecapacitydoes not decrease the correlations, we compute gð2Þ swe;iðΔTd ¼ 320 nsÞ for idler detection windows Δti varying from 320 ns to 4.5 μs, as shown in Fig. 3(d) (full circles), together with the coincidence counts measured in the center peak for each window size (empty squares). As expected, the latter increases linearly with Δti, but the gð2Þ swe;i value remains constant, within the error bar, and well above the classical FIG. 4. (a) Spin-wave storage efficiency as a function of the storage time Ts. The solid line is a fit of the experimental data, taking into account a Gaussian inhomogeneous broadening of the spin state. The spin inhomogeneous broadening extracted from the fit is γinh ¼ ð20  3Þ kHz. (b) The gð2Þ swe;ið320 nsÞ value as a function of the storage time. The classical threshold is reported as a horizontal line. In both panels, the error bars are calculated by considering Poissonian statistics, and the circled data points refer to the measurement reported in Fig. 2. FIG. 4. (a) Spin-wave storage efficiency as a function of the storage time Ts. The solid line is a fit of the experimental data, taking into account a Gaussian inhomogeneous broadening of the spin state. The spin inhomogeneous broadening extracted from the fit is γinh ¼ ð20  3Þ kHz. (b) The gð2Þ swe;ið320 nsÞ value as a function of the storage time. The classical threshold is reported as a horizontal line. In both panels, the error bars are calculated by considering Poissonian statistics, and the circled data points refer to the measurement reported in Fig. 2. 021028-5 021028-5 PHYS. REV. X 7, 021028 (2017) ALESSANDRO SERI et al. nonclassical correlations between the idler and the retrieved signal photons up to a total storage time T ¼ τ þ Ts ¼ 32.3 μs. Note that, while we measure the Cauchy-Schwarz parameter R with unconditional measurements at T ¼ 13.3 μs, to assess the nonclassicality for longer storage times, we make the assumption that the retrieved signal autocorre- lation does not increase for semiconditional measurements at different storage times. This is a conservative estimate since the gð2Þ swe;swe value is mainly determined by the noise in the read-out, which we verify to be constant over thewhole range of storage times investigated and not bunched (see Ref. [38]). 021028-4 Under this hypothesis, the Cauchy-Schwarz inequality is violated at T ¼ 32.3 μs with a confidence of 94% for ΔTd ¼ 320 ns. MINECO Severo Ochoa through Grant No. SEV-2015- 0522 and through the Ph.D. Fellowship Program (for A. S.), by AGAUR via 2014 SGR 1554, by Fundació Cellex, and by CERCA Programme/Generalitat de Catalunya. MINECO Severo Ochoa through Grant No. SEV-2015- 0522 and through the Ph.D. Fellowship Program (for A. S.), by AGAUR via 2014 SGR 1554, by Fundació Cellex, and by CERCA Programme/Generalitat de Catalunya. [1] M. Afzelius, N. Gisin, and H. de Riedmatten, Quantum Memory for Photons, Phys. Today 68, No. 12, 42 (2015). [2] H. J. Kimble, The Quantum Internet, Nature (London) 453, 1023 (2008). [3] A. G. Radnaev, Y. O. Dudin, R. Zhao, H. H. Jen, S. D. Jenkins, A. Kuzmich, and T. A. B. Kennedy, A Quantum Memory with Telecom-Wavelength Conversion, Nat. Phys. 6, 894 (2010). [4] K. S. Choi, H. Deng, J. Laurat, and H. J. Kimble, Mapping Photonic Entanglement into and out of a Quantum Memory, Nature (London) 452, 67 (2008). VI. DISCUSSION AND CONCLUSION Finally, we showed that the full atomic frequency comb protocol employed allows one to store a single photon in multiple independent temporal modes. These results re- present a fundamental step towards the implementation of quantum communication networks where solid state quan- tum memories are interfaced with the current fiber networks operating in the telecom window [26]. [10] R. Riedinger, S. Hong, R. A. Norte, J. A. Slater, J. Shang, A. G. Krause, V. Anant, M. Aspelmeyer, and S. Gröblacher, Non-classical Correlations between Single Photons and Phonons from a Mechanical Oscillator, Nature (London) 530, 313 (2016). [11] M. P. Hedges, J. J. Longdell, Y. Li, and M. J. Sellars, Efficient Quantum Memory for Light, Nature (London) 465, 1052 (2010). [12] D. Schraft, M. Hain, N. Lorenz, and T. Halfmann, Stopped Light at High Storage Efficiency in a Pr3þ∶Y2SiO5 Crystal, Phys. Rev. Lett. 116, 073602 (2016). [13] G. Heinze, C. Hubrich, and T. Halfmann, Stopped Light and Image Storage by Electromagnetically Induced Transpar- ency up to the Regime of One Minute, Phys. Rev. Lett. 111, 033601 (2013). QUANTUM CORRELATIONS BETWEEN SINGLE TELECOM … PHYS. REV. X 7, 021028 (2017) Broadband Waveguide Quantum Memory for Entangled Photons, Nature (London) 469, 512 (2011). Broadband Waveguide Quantum Memory for Entangled Photons, Nature (London) 469, 512 (2011). [30] M. Afzelius, C. Simon, H. de Riedmatten, and N. Gisin, Multimode Quantum Memory Based on Atomic Frequency Combs, Phys. Rev. A 79, 052329 (2009). [16] T. Zhong, J. M. Kindem, E. Miyazono, and A. Faraon, Nanophotonic Coherent Light-Matter Interfaces Based on Rare-Earth-Doped Crystals, Nat. Commun. 6, 8206 (2015). [31] M. Gündoğan, P. M. Ledingham, K. Kutluer, M. Mazzera, and H. de Riedmatten, Solid State Spin-Wave Quantum Memory for Time-Bin Qubits, Phys. Rev. Lett. 114, 230501 (2015). [17] S. Marzban, J. G. Bartholomew, S. Madden, K. Vu, and M. J. Sellars, Observation of Photon Echoes from Evanescently Coupled Rare-Earth Ions in a Planar Waveguide, Phys. Rev. Lett. 115, 013601 (2015). [32] P. Jobez, C. Laplane, N. Timoney, N. Gisin, A. Ferrier, P. Goldner, and M. Afzelius, Coherent Spin Control at the Quantum Level in an Ensemble-Based Optical Memory, Phys. Rev. Lett. 114, 230502 (2015). [18] G. Corrielli, A. Seri, M. Mazzera, R. Osellame, and H. de Riedmatten, Integrated Optical Memory Based on Laser- Written Waveguides, Phys. Rev. Applied 5, 054013 (2016). [33] C. Laplane, P. Jobez, J. Etesse, N. Timoney, N. Gisin, and M. Afzelius, Multiplexed On-Demand Storage of Polari- zation Qubits in a Crystal, New J. Phys. 18, 013006 (2016). [19] B. Lauritzen, J. Minar, H. de Riedmatten, M. Afzelius, N. Sangouard, C. Simon, and N. Gisin, Telecommunication- Wavelength Solid-State Memory at the Single Photon Level, Phys. Rev. Lett. 104, 080502 (2010). [34] K. R. Ferguson, S. E. Beavan, J. J. Longdell, and M. J. Sellars, Generation of Light with Multimode Time-Delayed Entanglement Using Storage in a Solid-State Spin-Wave Quantum Memory, Phys. Rev. Lett. 117, 020501 (2016). [20] E. Saglamyurek, J. Jin, V. B. Verma, M. D. Shaw, F. Marsili, S. W. Nam, D. Oblak, and W. Tittel, Quantum Storage of Entangled Telecom-Wavelength Photons in an Erbium- Doped Optical Fibre, Nat. Photonics 9, 83 (2015). [35] J. Fekete, D. Rieländer, M. Cristiani, and H. de Riedmatten, Ultranarrow-Band Photon-Pair Source Compatible with Solid State Quantum Memories and Telecommunication Networks, Phys. Rev. Lett. 110, 220502 (2013). [21] K. De Greve et al., Quantum-Dot Spin-Photon Entangle- ment via Frequency Downconversion to Telecom Wave- length, Nature (London) 491, 421 (2012). [36] D.Rieländer, A.Lenhard, M. QUANTUM CORRELATIONS BETWEEN SINGLE TELECOM … Mazzera, and H.de Riedmatten, Cavity Enhanced Telecom Heralded Single Photons for Spin-Wave Solid State Quantum Memories, New J. Phys. 18, 123013 (2016). [22] B. Albrecht, P. Farrera, X. Fernandez-Gonzalvo, M. Cristiani, and H. de Riedmatten, A Waveguide Frequency Converter Connecting Rubidium-Based Quantum Memo- ries to the Telecom C-Band, Nat. Commun. 5, 3376 (2014). [37] P. Jobez, N. Timoney, C. Laplane, J. Etesse, A. Ferrier, P. Goldner, N. Gisin, and M. Afzelius, Towards Highly Multimode Optical Quantum Memory for Quantum Repeaters, Phys. Rev. A 93, 032327 (2016). [23] N. Maring, K. Kutluer, J. Cohen, M. Cristiani, M. Mazzera, P. M. Ledingham, and H. de Riedmatten, Storage of Up- Converted Telecom Photon in a Doped Crystal, New J. Phys. 16, 113021 (2014). [38] See Supplemental Material at http://link.aps.org/ supplemental/10.1103/PhysRevX.7.021028 for details about the experimental setup, the preparation and charac- terization of the AFC, the storage sequences and the discussion of the results. [24] P. Farrera, N. Maring, B. Albrecht, G. Heinze, and H. de Riedmatten, Nonclassical Correlations between a C-Band Telecom Photon and a Stored Spin-Wave, Optica 3, 1019 (2016). [25] R. Ikuta, T. Kobayashi, K. Matsuki, S. Miki, T. Yamashita, H. Terai, T. Yamamoto, M. Koashi, T. Mukai, and N. Imoto, Heralded Single Excitation of Atomic Ensemble via Solid- State-Based TelecomPhoton Detection,Optica3,1279(2016). [39] H. Zhang, M. Sabooni, L. Rippe, C. Kim, S. Kröll, L. V. Wang, and P. R. Hemmer, Slow Light for Deep Tissue Imaging with Ultrasound Modulation, Appl. Phys. Lett. 100, 131102 (2012). [26] C. Simon, H. de Riedmatten, M. Afzelius, N. Sangouard, H. Zbinden, and N. Gisin, Quantum Repeaters with Photon Pair Sources and Multimode Memories, Phys. Rev. Lett. 98, 190503 (2007). [40] S. E. Beavan, E. A. Goldschmidt, and M. J. Sellars, Demonstration of a Dynamic Bandpass Frequency Filter in a Rare-Earth Ion-Doped Crystal, J. Opt. Soc. Am. B 30, 1173 (2013). [27] C. Clausen, I. Usmani, F. Bussières, N. Sangouard, M. Afzelius, H. de Riedmatten, and N. Gisin, Quantum Storage of Photonic Entanglement in a Crystal, Nature (London) 469, 508 (2011). [41] P. Sekatski, N. Sangouard, N. Gisin, H. de Riedmatten, and M. Afzelius, Photon-Pair Source with Controllable Delay Based on Shaped Inhomogeneous Broadening of Rare-Earth-Metal-Doped Solids, Phys. Rev. A 83, 053840 (2011). [28] D. Rieländer, K. Kutluer, P. M. Ledingham, M. Gündoğan, J. Fekete, M. Mazzera, and H. de Riedmatten, Quantum Storage of Heralded Single Photons in a Praseodymium- Doped Crystal, Phys. Rev. Lett. ACKNOWLEDGMENTS [14] M. Zhong, M. P. Hedges, R. L. Ahlefeldt, J. G. Bartholomew, S. E. Beavan, S. M. Wittig, J. J. Longdell, and M. J. Sellars, Optically Addressable Nuclear Spins in a Solid with a Six- Hour Coherence Time, Nature (London) 517, 177 (2015). We acknowledge financial support by the ERC Starting Grant QuLIMA, by the Spanish Ministry of Economy and Competitiveness (MINECO) and Fondo Europeo de Desarrollo Regional (FEDER) (FIS2015-69535-R), by [15] E. Saglamyurek, N. Sinclair, J. Jin, J. A. Slater, D. Oblak, F. Bussières, M. George, R. Ricken, W. Sohler, and W. Tittel, 021028-6 QUANTUM CORRELATIONS BETWEEN SINGLE TELECOM … QUANTUM CORRELATIONS BETWEEN SINGLE TELECOM … 112, 040504 (2014). [42] M. Sabooni, Q. Li, S. Kröll, and L. Rippe, Efficient Quantum Memory Using a Weakly Absorbing Sample, Phys. Rev. Lett. 110, 133604 (2013). [29] W. Zhang, D.-S. Ding, S. Shi, Y. Li, Z.-Y. Zhou, B.-S. Shi, and G.-C. Guo, Storing a Single Photon as a Spin Wave Entangled with a Flying Photon in the Telecommunication Bandwidth, Phys. Rev. A 93, 022316 (2016). [43] P. Jobez, I. Usmani, N. Timoney, C. Laplane, N. Gisin, and M. Afzelius, Cavity-Enhanced Storage in an Optical Spin-Wave Memory, New J. Phys. 16, 083005 (2014). 021028-7
https://openalex.org/W2809178129
https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0199549&type=printable
English
null
Characterization of normative hand movements during two functional upper limb tasks
PloS one
2,018
cc-by
12,786
Editor: Antoine Nordez, Universite de Nantes, FRANCE Received: December 21, 2017 Accepted: June 8, 2018 Published: June 21, 2018 RESEARCH ARTICLE Methods Twenty non-disabled participants were recruited to perform two tasks: the Pasta Box Task and Cup Transfer Task. A 12-camera motion capture system was used to collect kinematic data from which hand movement and grip aperture measures were calculated. Measures reported for reach-grasp and transport-release segments were hand distance travelled, hand trajectory variability, movement time, peak and percent-to-peak hand velocity, number of movement units, peak and percent-to-peak grip aperture, and percent-to-peak hand deceleration. A between-session repeatability analysis was conducted on 10 participants. Copyright: © 2018 Valevicius et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Data Availability Statement: All relevant data are within the paper and its Supporting Information files (S3 Data_Supplementary Data File). Funding: This work was sponsored by the Defense Advanced Research Projects Agency (DARPA) BTO under the auspices of Dr. Doug Weber and Dr. Al Emondi through the DARPA Contracts Management Office; Grant/Contract No. N66001- 15-C-4015 (JSH). Partial funding support was also received through Discovery Grants from the Natural Sciences and Engineering Research Characterization of normative hand movements during two functional upper limb tasks Aïda M. Valevicius1, Quinn A. Boser1, Ewen B. Lavoie2, Glyn S. Murgatroyd3, Patrick M. Pilarski4, Craig S. Chapman2, Albert H. Vette1,3,5, Jacqueline S. Hebert1,3,4* 1 Department of Biomedical Engineering, Faculty of Medicine and Dentistry, University of Alberta, Edmonton, Alberta, Canada, 2 Faculty of Kinesiology, Sport, and Recreation, University of Alberta, Edmonton, Alberta, Canada, 3 Glenrose Rehabilitation Hospital, Alberta Health Services, Edmonton, Alberta, Canada, 4 Department of Medicine, Faculty of Medicine and Dentistry, University of Alberta, Edmonton, Alberta, Canada, 5 Department of Mechanical Engineering, Faculty of Engineering, University of Alberta, Edmonton, Alberta, Canada a1111111111 a1111111111 a1111111111 a1111111111 a1111111111 a1111111111 a1111111111 a1111111111 a1111111111 a1111111111 * jhebert@ualberta.ca Background Citation: Valevicius AM, Boser QA, Lavoie EB, Murgatroyd GS, Pilarski PM, Chapman CS, et al. (2018) Characterization of normative hand movements during two functional upper limb tasks. PLoS ONE 13(6): e0199549. https://doi.org/ 10.1371/journal.pone.0199549 Dexterous hand function is crucial for completing activities of daily living (ADLs), which typi- cally require precise hand-object interactions. Kinematic analyses of hand trajectory, hand velocity, and grip aperture provide valuable mechanistic insights into task performance, but there is a need for standardized tasks representative of ADLs that are amenable to motion capture and show consistent performance in non-disabled individuals. Our objective was to develop two standardized functional upper limb tasks and to quantitatively characterize the kinematics of normative hand movement. Editor: Antoine Nordez, Universite de Nantes, FRANCE * jhebert@ualberta.ca Introduction Dexterous hand function is essential for successfully performing many activities of daily living (ADLs). Neurological or musculoskeletal impairments such as stroke [1], spinal cord injury [2], and upper limb amputation [3,4] result in deficiencies in hand and upper limb function, such that alternate control strategies and compensations must be used to accomplish ADLs. A key aspect of ADLs are hand-object interactions, where successfully reaching, grasping, and transferring an object is crucial for task completion. Quantifying these hand-object interac- tions in non-disabled populations to allow comparison to strategies used by impaired individ- uals could provide a valuable tool for assessing hand function. p g One method of examining hand-object interactions is through kinematic analysis using optical motion capture, either to measure joint angles of the full upper body kinematic chain to infer hand function, or to directly quantify hand function through specific features of how the hand moves [5]. However, the design of the object interaction task becomes crucial in developing a standard assessment protocol that is repeatable and reliable for comparison within a normative population and across impaired populations. Specifically, hand movement during object interactions is influenced by an object’s extrinsic (location and orientation) and intrinsic parameters (size, color, shape, mass, and texture) [6,7]. When reaching for objects, normative adult behaviour will show typical hand trajectories, hand velocities, and grip aper- ture motions [7–9]. Reaching is influenced by the object’s extrinsic parameters, and typically characterized by a straight or gently curved hand trajectory path from an initial hand position to the object [8], with a smooth bell-shaped velocity profile with one velocity peak occurring approximately halfway through the movement [9], and with greater peak hand velocities observed for targets that are further away [10]. Grasp is primarily influenced by intrinsic parameters [6] and characterized by hand pre-shaping at hand movement onset [7], with grip aperture (the distance between the thumb and index finger) reaching a maximum at approxi- mately 60 to 70% of the reaching phase, followed by hand closing around the object [9]. Grip aperture is also a function of object size, where a larger grip aperture is required for larger objects [6,9]. Given the importance of object interactions in ADLs and the influence of an object’s intrin- sic and extrinsic proprieties on hand movement, task selection for kinematic analysis should include ecologically valid tasks for clinical assessment. Discussion Competing interests: The authors have declared that no competing interests exist. Competing interests: The authors have declared that no competing interests exist. Normative hand kinematics for two standardized functional tasks challenging various aspects of hand-object interactions important for ADLs showed excellent repeatability. The consistency in normative task performance across a variety of task demands shows prom- ise as a potential outcome assessment for populations with upper limb impairment. movements. Movements requiring the clearing of an obstacle while transporting an object displayed a double velocity peak and typically a longer deceleration phase. Council of Canada (RGPIN-2014-04666; RGPIN- 2014-05248) (AHV). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. Results Movement times were longer for transport-release compared to reach-grasp for every movement. Hand and grip aperture measures had low variability, with 55 out of 63 measures showing good repeatability (ICC > 0.75). Cross-body movements in the Pasta Box Task had longer movement times and reduced percent-to-peak hand velocity values. The Cup Trans- fer Task showed decoupling of peak grip aperture and peak hand deceleration for all 1 / 21 PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 Normative hand movements during two functional upper limb tasks movements. Movements requiring the clearing of an obstacle while transporting an object displayed a double velocity peak and typically a longer deceleration phase. PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 Normative hand movements during two functional upper limb tasks asymmetries in hand velocity profile and decoupling of reach and grasp in those with hemipar- esis [1,16,17], spinal cord injury [2] and with use of a prosthesis [18]. These studies have used a variety of objects for grasping such as a cup [16], ball [1], or cylinder [1,17,18]. However, it has been shown that not only the object characteristics but also the goal of the object interaction will affect grasp kinematics [19]. Therefore, a standardized functional task protocol for kine- matic assessment with applicability to clinical populations would ideally involve reaching and grasping real objects, with specific movement goals, in order to most accurately mimic typical daily tasks. Clinical assessments currently exist that evaluate hand function involving hand-object interactions. Performance tests, such as the Jebsen Test of Hand Function [20], the Box and Blocks Test [21], and Standardized Object Test [22], as well as subjective rater tests, such as the Action Research Arm Test [23] and Assessment of Capacity of Myoelectric Control (ACMC) [24] are commonly administered in a clinical environment. Although these tests involve hand- object interactions and provide a global outcome measurement of function, they do not allow for precise quantitative assessment of grasp, dexterity, movement quality, and efficiency. Ide- ally, functional assessment tasks used for kinematic analysis would utilize elements of these current clinical assessments, such as moving the arm in different positions; lateral reaches; crossing the body’s midline; adjusting hand opening and closing; varying grasp patterns; mod- ulating force when gripping; and grasping and releasing objects. The objectives of this study were to develop two standardized functional upper limb tasks with hand-object interactions that result in consistent and repeatable performance in non- disabled individuals, and to use kinematic analysis to quantitatively characterize hand move- ment for those two tasks. The hypothesis was that the performance of the tasks in non-disabled individuals would result in consistent performance (low variability) within and across per- formers and good between-session repeatability due to the standardized sequencing of the task movements. PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 Introduction Although some upper limb kinematic assessment protocols for motion capture mimic functional movements, such as hand to head (e.g., for combing hair), hand to shoulder (e.g., for dressing, applying deodorant), and hand to back pocket (e.g., for reaching for wallet, perineal care) [11–15], they provide limited informa- tion on hand function during real object interactions. In clinical populations, reaching and grasping tasks using real objects have shown alterations in hand kinematics such as PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 2 / 21 Functional task development The tasks were developed through iteration and consensus by a team involving a movement neuroscientist, kinesiologist, physiatrist, and occupational therapist. Current best-practice out- come measures for upper limb function were explored for commonalities in task requirements [20,21,24–27]. Functional tasks incorporated elements that would be challenging, but not impossible for clinical populations to complete, while being representative of ‘real-world’ tasks that might be performed in anyone’s daily environment. A key feature of the tasks was that they needed to be amenable to motion capture with standardized, discrete movement sequences to optimize kinematic analysis of hand movement characteristics across performers. Specifically, standardization of order of task execution allows kinematic data segmentation into specific movement sequences that can be averaged across trials and individuals to isolate characteristic movement strategies. Two standardized functional tasks were developed, the Pasta Box Task and Cup Transfer Task (Fig 1). Full task set up and descriptions are available in the supplementary materials. The Pasta Box Task (S1 Text) was designed to mimic moving objects from a counter to a cup- board, between cupboards at different heights, and across the body’s midline. The Pasta Box Task consisted of three movements, during which the performer moved a box of pasta from a lower side shelf on their right (height: 30 inches) to a shelf in front of them (height: 43 inches); then to a second shelf at a higher height across the body (height: 48 inches); and then back to the starting position. The performer was required to return the hand to a “home” PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 3 / 21 Normative hand movements during two functional upper limb tasks Fig 1. Functional tasks. Sequence of the Pasta Box Task (A) and Cup Transfer Task (B). During the Pasta Box Task, the participant moved the box of pasta from a lower side table to two shelves of different heights in front of them (Movements 1 and 2) and back again to the start position (Movement 3). Tasks were completed using three distinct movements, with standardized placement positions, including returning the hand to a standard “home” position at the end of each movement. During the Cup Transfer Task, the participant moved two compliant cups filled with therapeutic Fig 1. Functional tasks. Sequence of the Pasta Box Task (A) and Cup Transfer Task (B). Functional task development During the Pasta Box Task, the participant moved the box of pasta from a lower side table to two shelves of different heights in front of them (Movements 1 and 2) and back again to the start position (Movement 3). Tasks were completed using three distinct movements, with standardized placement positions, including returning the hand to a standard “home” position at the end of each movement. During the Cup Transfer Task, the participant moved two compliant cups filled with therapeutic Fig 1. Functional tasks. Sequence of the Pasta Box Task (A) and Cup Transfer Task (B). During the Pasta Box Task, the participant moved the box of pasta from a lower side table to two shelves of different heights in front of them (Movements 1 and 2) and back again to the start position (Movement 3). Tasks were completed using three distinct movements, with standardized placement positions, including returning the hand to a standard “home” position at the end of each movement. During the Cup Transfer Task, the participant moved two compliant cups filled with therapeutic PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 4 / 21 Normative hand movements during two functional upper limb tasks beads over a partition to a target location using a top grasp for the first cup and a side grasp for the second cup (Movements 1 and 2). These movements were followed by a return of the hand to the “home” position, and then by moving the cups back to their initial positions using respective types of grasps (Movements 3 and 4). https://doi.org/10.1371/journal.pone.0199549.g001 beads over a partition to a target location using a top grasp for the first cup and a side grasp for the second cup (Movements 1 and 2). These movements were followed by a return of the hand to the “home” position, and then by moving the cups back to their initial positions using respective types of grasps (Movements 3 and 4). https://doi.org/10.1371/journal.pone.0199549.g001 https://doi.org/10.1371/journal.pone.0199549.g001 position after each specified movement. The Cup Transfer Task (S2 Text) was designed to involve greater risk by using compliant cups with content that can be spilled, and requiring careful placement around barriers such as would be encountered at a sink or countertop. Functional task development The Cup Transfer Task consisted of four movements, where the performer moved two compliant cups filled with therapeutic beads from an initial position on the right side of a box to specific target positions on the left side of the box, and then back again to the start locations, while hav- ing to clear a middle partition. The box was placed at a standard counter height of 36 inches to recreate a real-world environment. The performer was required to return the hand to a “home” position after the first two movements and at the end of the task. In order to challenge grasp capabilities which might be difficult for impaired populations, two types of grasps, linked to the placement of the cups in the box, were required: a top grasp for the near cup and a side grasp for the far cup. Experimental setup and procedures A 12-camera Vicon Bonita motion capture system (Vicon Motion Systems Ltd, Oxford, UK) with an accuracy of 0.5 mm and 0.5 degrees was used to collect three-dimensional marker tra- jectories at 120 Hz. A rigid plate with three 11.1 mm reflective markers was attached to the dorsal side of the right hand using double-sided tape. Two 14 mm single reflective markers were attached to the middle phalange of the index finger and the distal phalange of the thumb. Additional markers and marker clusters were attached to upper body segments (pelvis; trunk; upper arms; forearms; head), but were not used in the current analysis. Prior to data collection, each participant received verbal instructions, a demonstration, and a practice trial to be familiarized with the tasks. Each participant performed a minimum of 20 successful trials for both tasks. If there was an error in performance of the task (i.e., dropping the object), that trial was marked as an “error trial” and the trial was repeated until a total of 20 error-free trials were recorded. The order of the tasks was block-randomized, with ten partici- pants starting with the Pasta Box Task and ten with the Cup Transfer Task. Ten participants returned on a separate day for repeatability testing after the initial testing session (7.5 months ± 11 days), with the identical set up. The same two testers ran all data collection sessions. Study participants Twenty non-disabled individuals (11 male; 18 right-handed; age: 25.8 ± 7.2 years; height: 173.8 ± 8.3 cm; mean ± standard deviation) were recruited to participate in the study. They had no upper body pathology or history of neurological or musculoskeletal injuries within the past two years. The study followed the Declaration of Helsinki guidelines and was approved by the University of Alberta Health Research Ethics Board (Pro00054011), the Department of the Navy Human Research Protection Program (DON-HRPP), and the SSC-Pacific Human Research Protection Office (SSCPAC HRPO). The individual in Fig 1 has provided written consent to publish the photographs. Normative hand movements during two functional upper limb tasks Table 1. Segmentation and phase definitions. Phase Name Start/End Definition Reach Start: Hand leaves the home position First occurrence of the hand exceeding the ‘Hand Velocity Threshold’ OR first occurrence of the hand exceeding the ‘Target Distance Threshold’, whichever happens first Grasp Start: Closing of grip aperture First occurrence of the hand falling below the ‘Grasp Distance Threshold’ Transport Start: Start of object movement First occurrence of the object exceeding the ‘Object Velocity Threshold’ OR first occurrence of the object exceeding the ‘Target Distance Threshold’, whichever happens first Release Start: End of object movement First occurrence of the object falling below the ‘Object Velocity Threshold’ OR first occurrence of the object distance falling below the ‘Target Distance Threshold’, whichever happens last End: End of grip aperture opening Last occurrence of the hand before exceeding the ‘Release Distance Threshold’ Table 1. Segmentation and phase definitions. Phase start and end definitions for the two functional tasks. Each task movement is separated into four phases: reach, grasp, transport, and release. The start and end of the phases are based on kinematic variables of hand velocity, object velocity, grip aperture, and hand-to-target or object-to-target distance. ‘Hand Velocity Threshold’ was defined as 5% of the peak hand velocity during the trial. ‘Object Velocity Threshold’ was defined as 5% of the peak object velocity during the trial. ‘Grasp Distance Threshold’ and ‘Release Distance Threshold’ were based on average occurrence of peak grip aperture prior to and following object movement, respectively. ‘Target Distance Threshold’ was defined as the location of the hand or object during a transition phase with respect to the target plus a tolerable distance of 70 mm. https://doi.org/10.1371/journal.pone.0199549.t001 velocity, object velocity, and grip aperture (Table 1). The Pasta Box Task was divided into three movements, and the Cup Transfer Task was divided into four movements. Each task had a standard starting position for the hand (labelled ‘home’). Participants had to bring their hand to the “home” position after each movement for the Pasta Box Task and after the first two movements of the Cup Transfer Task to allow for task segmentation and standardization. Each movement was composed of four phases: reach, grasp, transport, and release. PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 Experimental data analysis Raw marker trajectory data were filtered using a second-order, low-pass Butterworth filter with a cut-off frequency of 6 Hz [28]. Motion capture data were segmented based on hand 5 / 21 PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 For the quantitative kinematic analysis, due to the short duration of grasp and release phases, and to interpret the results in light of functional hand movement sequences, the reach and grasp phases were combined into a reach-grasp segment, and the transport and release phases into a transport-release segment. Kinematic measures were selected based on commonly reported measures in assessments of individuals with upper limb impairments [5,29]. Hand movement was calculated using the average position of the three markers on the hand plate. Grip aperture was defined as the dis- tance between the markers attached to the index and thumb. Analysed measures were move- ment time, hand distance travelled, hand trajectory variability, peak hand velocity, percent-to- peak hand velocity, number of movement units, peak grip aperture, percent-to-peak grip aper- ture, and percent-to-peak hand deceleration. Percent-to-peak measures were defined as the percent of time elapsed before the peak for a specific reach-grasp or transport-release segment. Hand trajectory variability was quantified as the maximum of the mean three-dimensional standard deviation at each time-normalized point. Number of movement units was defined as a local maximum velocity, or velocity peak [30–32] of the hand and was calculated by finding the zero-crossings in the hand acceleration profile where the signal switches from positive to negative. The hand trajectory, hand velocity, and grip aperture time series were time-normal- ized by segment (resampled to have 100 points per segment), averaged across trials and 6 / 21 PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 Normative hand movements during two functional upper limb tasks participants for each segment, and resampled across segments based on average segment length (with 1,000 points per overall trial). Statistical analysis Statistical analysis was completed using the SPSS software (IBM Corporation, Armonk, NY, USA). For each task, hand trajectory variability, movement time, peak hand velocity and per- cent-to-peak hand velocity were analyzed using a two-way repeated-measures analysis of vari- ance (ANOVA) examining effects of movement (3 for Pasta, 4 for Cups) and segment (reach- grasp, transport-release). Significant interactions (p < 0.05) were examined by conducting simple main effect one-way repeated-measures ANOVA’s of movement at each level of seg- ment. Significant main or simple main effects (p < 0.05) were followed up by conducting all pairwise comparisons with Bonferroni correction. Normality was assessed using the Kolmogo- rov-Smirnov Test and sphericity was assessed through a Mauchly’s Test of Sphericity. In cases where the assumption of sphericity was not met, a Greenhouse-Geisser Correction was applied and reported. For peak grip aperture, percent-to-peak grip aperture, and percent-to-peak hand deceleration a one-way repeated-measures ANOVA, with Bonferroni corrected pairwise comparisons where significant (p < 0.05), was conducted to assess potential differences between movements for the reach-grasp segment only. A between-session repeatability analysis was performed by calculating the intra-class corre- lation (ICC) for model (2,k), the standard error of measurement (SEM), and the minimal detectable change (MDC) [33] between the first and second session for ten participants. SEM was calculated based on the ICC analysis scores. The equation for SEM was: SEM ¼ SD ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 1 ICC p ð1Þ ð1Þ where SD is the standard deviation of all the participants in the first session. The MDC was cal- culated based on the SEM values and the 95% confidence interval. The equation for MDC was: MDC ¼ SEM  1:96  ffiffiffi 2 p ð2Þ ð2Þ MDC ¼ SEM  1:96  ffiffiffi 2 p where 1.96 is the z score associated with the 95% confidence interval [34]. SEM and MDC scores were also represented as a percentage of the absolute average measurement value to indicate relative error. ICC, SEM, and MDC values were calculated for movement time, peak hand velocity, percent-to-peak hand velocity, peak grip aperture, percent-to-peak grip aper- ture, and percent-to-peak hand deceleration. ICC values above 0.90 were considered to indi- cate reasonable reliability for clinical measurements, above 0.75 indicated good repeatability, and below 0.75 indicated poor to moderate repeatability [33]. Task performance Overall performance time (from start to finish) for the Pasta Box Task was 8.84 ± 0.34 seconds, and for the Cup Transfer Task 10.60 ± 0.49 seconds. Error trials occurred at a rate of 4% for the Pasta Box Task, and 11% for the Cups Transfer Task. The most common errors were sequence hesitation (Pasta Box Task: 38% of errors, Cup Transfer Task: 54% of errors), hitting a partition/obstacle (Pasta Box Task: 31% of errors, Cup Transfer Task: 25% of errors), and incorrect grasp of the object (Pasta Box Task: 12% of errors, Cup Transfer Task: 16% of errors). Movement times, hand distance travelled, and hand trajectory variability for each move- ment are listed in Tables 2 and 3 for the Pasta Box Task and Cup Transfer Task, respectively. PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 7 / 21 Pasta Box Task measures for hand distance travelled, hand trajectory variability, movement time, peak hand velocity, percent-to-peak hand velocity, number of movement units, peak grip aperture, percent-to-peak grip aperture, and percent-to-peak hand deceleration. Data are presented, for movements and segments separately, as group means and across-participant standard deviations (SD). Average within-participant variability (WPV) is also presented for each measure. Movements are: Movement 1 (Mvmt 1), Movement 2 (Mvmt 2), and Movement 3 (Mvmt 3); segments are: reach-grasp (RG) and transport-release (TR). PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 Normative hand movements during two functional upper limb tasks Table 2. Pasta Box Task kinematic measures. Hand distance travelled (mm) Hand trajectory variability (mm) Movement time (sec) Peak hand velocity (mm/s) Percent-to-peak hand velocity (%) Mean ± SD WPV Mean ± SD Mean ± SD WPV Mean ± SD WPV Mean ± SD WPV Mvmt 1 RG 464 ± 25 21 17 ± 5 0.97 ± 0.15 0.07 1007 ± 125 71 42.5 ± 4.0 2.9 TR 850 ± 27 14 19 ± 3 1.36 ± 0.16 0.07 1330 ± 140 69 33.1 ± 3.7 4.0 Mvmt 2 RG 478 ± 21 12 13 ± 3 0.68 ± 0.11 0.05 1204 ± 151 54 43.2 ± 6.5 3.8 TR 740 ± 72 23 19 ± 4 1.45 ± 0.18 0.08 1035 ± 114 52 45.8 ± 5.7 8.5 Mvmt 3 RG 701 ± 21 14 19 ± 4 0.84 ± 0.15 0.05 1466 ± 197 74 38.8 ± 5.2 4.9 TR 1069 ± 22 16 32 ± 6 1.68 ± 0.24 0.10 1470 ± 164 94 32.5 ± 3.8 3.6 Number of movement units Peak grip aperture (mm) Percent-to-peak grip aperture (%) Percent-to-peak hand deceleration (%) Mean ± SD WPV Mean ± SD WPV Mean ± SD WPV Mean ± SD WPV Mvmt 1 RG 1.2 ± 0.3 0.3 117 ± 7 3 71.6 ± 5.3 3.1 58.2 ± 8.5 11.0 TR 1.3 ± 0.3 0.5 - - - - - - Mvmt 2 RG 1.1 ± 0.1 0.2 107 ± 7 3 78.0 ± 4.3 3.1 74.4 ± 8.0 5.3 TR 2.3 ± 0.3 0.4 - - - - - - Mvmt 3 RG 1.2 ± 0.2 0.3 110 ± 6 3 79.0 ± 4.1 3.3 72.8 ± 7.8 4.9 TR 1.8 ± 0.5 0.9 - - - - - - Table 2. Pasta Box Task kinematic measures. Pasta Box Task measures for hand distance travelled, hand trajectory variability, movement time, peak hand velocity, percent-to-peak hand velocity, number of movement units, peak grip aperture, percent-to-peak grip aperture, and percent-to-peak hand deceleration. Data are presented, for movements and segments separately, as group means and across-participant standard deviations (SD). Average within-participant variability (WPV) is also presented for each measure. Movements are: Movement 1 (Mvmt 1), Movement 2 (Mvmt 2), and Movement 3 (Mvmt 3); segments are: reach-grasp (RG) and transport-release (TR). Pasta Box Task measures for hand distance travelled, hand trajectory variability, movement time, peak hand velocity, percent-to-peak hand velocity, number of movement units, peak grip aperture, percent-to-peak grip aperture, and percent-to-peak hand deceleration. Data are presented, for movements and segments separately, as group means and across-participant standard deviations (SD). Average within-participant variability (WPV) is also presented for each measure. Movements are: Movement 1 (Mvmt 1), Movement 2 (Mvmt 2), and Movement 3 (Mvmt 3); segments are: reach-grasp (RG) and transport-release (TR). Statistical results including post-hoc pairwise comparisons are presented in Tables 4 and 5 for the Pasta Box Task and Cup Transfer Task, respectively, and discussed below in the relevant sections per task. Movement times for reach-grasp segments were significantly smaller than for transport- release segments (p < 0.001), even in the single case where transport distance was shorter than reach distance during Movement 3 in the Cup Transfer Task (Table 3). For the Pasta Box Task, post-hoc pairwise comparisons revealed that movement time for both reach-grasp and transport-release segments was significantly different between all individual movements (p < 0.001). For the Cup Transfer Task, post-hoc pairwise comparisons revealed that move- ment time for both reach-grasp and transport-release segments was significantly different between individual movements (p < 0.001), except for the transport-release segment of Move- ment 1 compared to Movement 4 (p = 0.079) and Movement 2 compared to Movement 3 (p = 1.000). Hand trajectory graphs displaying the average hand trajectories and across-participant stan- dard deviations are shown in Figs 2 and 3. Maximum hand trajectory variability was overall small for both tasks, ranging from 13 mm to 32 mm for the Pasta Box Task (Table 2) and 16 mm to 27 mm for the Cup Transfer Task (Table 3). For the Pasta Box Task (Table 4), during reach-grasp, Movement 2 was significantly less variable than Movement 1 and 3 (p < 0.001) and, during transport-release, Movement 3 was significantly more variable than Movement 1 and 2 (p < 0.001). For the Cup Transfer Task (Table 5), during reach-grasp, Movement 1 was significantly less variable than Movement 2, 3, and 4 (p < 0.001) and, during transport-release, Movement 1 was significantly less variable than Movement 3 (p < 0.05). 8 / 21 PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 Cup Transfer Task measures for hand distance travelled, hand trajectory variability, movement time, peak hand velocity, percent-to-peak hand velocity, number of movement units, peak grip aperture, percent-to-peak grip aperture, and percent-to-peak hand deceleration. Data are presented, for movements and segments separately, as group means and across-participant standard deviations (SD). Average within-participant variability (WPV) is also presented for each measure. Movements are: Movement 1 (Mvmt 1), Movement 2 (Mvmt 2), Movement 3 (Mvmt 3), and Movement 4 (Mvmt 4); segments are: reach-grasp (RG) and transport-release (TR). https://doi.org/10.1371/journal.pone.0199549.t003 Normative hand movements during two functional upper limb tasks Table 3. Cup Transfer Task kinematic measures. Hand distance travelled (mm) Hand trajectory variability (mm) Movement time (sec) Peak hand velocity (mm/s) Percent-to-peak hand velocity (%) Mean ± SD WPV Mean ± SD Mean ± SD WPV Mean ± SD WPV Mean ± SD WPV Mvmt 1 RG 380 ± 44 22 16 ± 3 0.86 ± 0.13 0.07 818 ± 117 60 43.7 ± 7.7 6.0 TR 608 ± 36 21 16 ± 2 1.32 ± 0.15 0.10 970 ± 79 47 21.1 ± 3.8 4.2 Mvmt 2 RG 445 ± 45 30 27 ± 7 0.75 ± 0.15 0.07 1050 ± 104 62 25.9 ± 7.7 6.7 TR 635 ± 46 26 17 ± 4 1.47 ± 0.15 0.10 898 ± 73 46 39.9 ± 7.7 6.3 Mvmt 3 RG 851 ± 35 25 26 ± 6 1.10 ± 0.17 0.07 1435 ± 157 75 42.5 ± 5.6 6.3 TR 673 ± 42 28 18 ± 3 1.46 ± 0.17 0.10 976 ± 53 48 25.1 ± 2.1 2.3 Mvmt 4 RG 426 ± 43 25 24 ± 6 0.63 ± 0.09 0.06 1041 ± 113 59 25.0 ± 7.2 7.5 TR 622 ± 42 25 17 ± 3 1.36 ± 0.17 0.10 956 ± 66 47 23.8 ± 5.3 7.1 Number of movement units Peak grip aperture (mm) Percent-to-peak grip aperture (%) Percent-to-peak hand deceleration (%) Mean ± SD WPV Mean ± SD WPV Mean ± SD WPV Mean ± SD WPV Mvmt 1 RG 1.3 ± 0.3 0.4 99 ± 5 3 80.9 ± 5.1 4.5 69.7 ± 7.9 9.2 TR 2.5 ± 0.4 0.8 - - - - - Mvmt 2 RG 1.3 ± 0.3 0.4 114 ± 6 3 71.9 ± 5.9 6.0 49.8 ± 8.2 8.7 TR 2.5 ± 0.5 0.8 - - - - - - Mvmt 3 RG 1.4 ± 0.3 0.4 113 ± 7 2 81.0 ± 3.7 4.5 60.6 ± 5.7 5.4 TR 2.2 ± 0.7 1.0 - - - - - - Mvmt 4 RG 1.3 ± 0.3 0.4 118 ± 7 3 78.1 ± 6.9 5.1 68.4 ± 13.5 10.7 TR 2.5 ± 0.4 0.7 - - - - - - Table 3. Cup Transfer Task kinematic measures. PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 Pasta Box Task For the Pasta Box Task (Table 2), movements involving the side table location affected several kinematic parameters compared to other movements. Movement 1, where participants had to turn their body and reach to the side table to pick up the box, had the lowest peak hand veloc- ity for the reach-grasp segment (Fig 4A), which was significantly different from Movements 2 and 3 (p < 0.001). Peak grip aperture (Fig 5A) was also greatest for the first reach-grasp seg- ment, which was significantly different from the reach-grasp segment of Movements 2 and 3. The peak grip aperture during the first reach-grasp segment also occurred significantly earlier than for the following two movements (p < 0.001) and did not align with the percent-to-peak hand deceleration. The transport-release segments of Movement 1 and 3, both involving mov- ing the box from or to the side cart, had similar percent-to-peak hand velocities (p = 1.000). They were significantly lower than for Movement 2 (p < 0.001). The distinct feature of Movement 2 was that the participant had to transfer the box of pasta from the first shelf to the second shelf by moving around the middle cart barrier, which served as an obstacle. The transport-release segment of this movement had a significantly lower peak hand velocity than the other transport-release segments (p < 0.001), displayed two velocity peaks (indicated by the number of movement units in Table 2 and as seen in Fig 4A), and exhibited the greatest within-participant variability in percent-to-peak hand velocity. Movement 3 had the longest distances for both reach and transport segments. Although the magnitude and timing of peak grip aperture for the reach-grasp segment was statistically PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 9 / 21  indicates that the F-statistic was significant at p < 0.001;  indicates that the F-statistic was significant at p < 0.05; << indicates that the pairwise comparison was significantly smaller at p < 0.001; < indicates that the pairwise comparison was significantly smaller at p < 0.05. Pasta Box Task results of the two-factor and one-factor repeated-measures analysis of variance (ANOVA). The results for the interaction of Movement and Segment for the two-factor repeated-measures ANOVA is reported for hand trajectory variability, movement time, peak hand velocity, and percent-to-peak hand velocity. The effect of movement for the one-way repeated measures ANOVA is reported for peak grip aperture, percent-to-peak grip aperture, and percent-to-peak-grip hand deceleration. The simple main effects ANOVA is reported for hand trajectory variability, movement time, peak hand velocity, and percent-to-peak hand velocity.  indicates that the F-statistic was significant at p < 0.001;  i di t th t th F t ti ti i ifi t t < 0 05 << i di t th t th i i i i ifi tl ll t < 0 001 < i di t th t th i i g p ;  indicates that the F-statistic was significant at p < 0.05; << indicates that the pairwise comparison was significantly smaller at p < 0.001; < indicates that the pairwise comparison was significantly smaller at p < 0.05. different for each movement, the absolute values were very close. Reach-grasp of Movement 3 had significantly higher peak hand velocities than for reach-grasp in the other movements (p < 0.001), and the peak hand velocity in reach-grasp occurred significantly earlier than that of Movement 1 (p = 0.028) and Movement 2 (p < 0.001). Peak hand velocity during transport- release of Movement 3 was similarly significantly higher than that of Movement 1 and 2 (p < 0.001), but with a lower percent-to-peak hand velocity compared to Movement 2 (p < 0.001) (but not significantly different from Movement 1 (p = 1.000)). Pasta Box Task results of the two-factor and one-factor repeated-measures analysis of variance (ANOVA). The results for the interaction of Movement and Segment for the two-factor repeated-measures ANOVA is reported for hand trajectory variability, movement time, peak hand velocity, and percent-to-peak hand velocity. The effect of movement for the one-way repeated measures ANOVA is reported for peak grip aperture, percent-to-peak grip aperture, and percent-to-peak-grip hand deceleration. The simple main effects ANOVA is reported for hand trajectory variability, movement time, peak hand velocity, and percent-to-peak hand velocity.  indicates that the F-statistic was significant at p < 0.001;  indicates that the F-statistic was significant at p < 0.05; << indicates that the pairwise comparison was significantly smaller at p < 0.001; < indicates that the pairwise comparison was significantly smaller at p < 0.05. Normative hand movements during two functional upper limb tasks Table 4. Pasta Box Task statistical analysis results. Movement time (s) Interaction: Mvmt x Segment F(2, 38) = 238.5 Mvmt 1 Mvmt2 Mvmt 3 F (Mvmt effect) Pairwise Reach-grasp 0.97 0.68 0.84 (2, 38) = 255.9 2 << 3 << 1 Transport-release 1.36 1.45 1.68 (2, 38) = 128.5 1 << 2 << 3 Hand trajectory variability (mm) Interaction: Mvmt x Segment F(2, 38) = 22.6 Mvmt 1 Mvmt 2 Mvmt 3 F (Mvmt effect) Pairwise Reach-grasp 17 13 19 (1.4, 27.5) = 23.6 2 << 1,3 Transport-release 19 19 32 (1.5, 28.7) = 63.1 1 << 3; 2 << 3 Peak hand velocity (mm/s) Interaction: Mvmt x Segment F(2, 38) = 154.3 Mvmt 1 Mvmt 2 Mvmt 3 F (Mvmt effect) Pairwise Reach-grasp 1008 1204 1466 (1.4, 26.4) = 183.1 1 << 2 << 3 Transport-release 1330 1035 1470 (2, 38) = 199.1 2 << 1 << 3 Percent-to-peak hand velocity (%) Interaction: Mvmt x Segment F(2, 38) = 22.2 Mvmt 1 Mvmt 2 Mvmt 3 F (Mvmt effect) Pairwise Reach-grasp 42.4 43.2 38.8 (1.4, 26.2) = 6.9 3 < 1; 3 << 2 Transport-release 33.1 45.8 32.5 (2, 38) = 80.4 1 << 2; 3 << 2 Peak grip aperture (mm) Mvmt 1 Mvmt 2 Mvmt 3 F (Mvmt effect) Pairwise Reach-grasp 117 107 109 (1.3, 25.2) = 92.7 2 << 3 << 1 Percent-to-peak grip aperture (%) Mvmt 1 Mvmt 2 Mvmt 3 F (Mvmt effect) Pairwise Reach-grasp 71.6 77.9 79.0 (1.2, 23.5) = 61.3 1 << 2,3; 2 < 3 Percent-to-peak hand deceleration (%) Mvmt 1 Mvmt 2 Mvmt 3 F (Mvmt effect) Pairwise Reach-grasp 58.2 74.4 72.8 (1.1, 20.9) = 58.0 1 << 2,3; 3 < 2 Table 4. Pasta Box Task statistical analysis results. Pasta Box Task results of the two-factor and one-factor repeated-measures analysis of variance (ANOVA). The results for the interaction of Movement and Segment for the two-factor repeated-measures ANOVA is reported for hand trajectory variability, movement time, peak hand velocity, and percent-to-peak hand velocity. The effect of movement for the one-way repeated measures ANOVA is reported for peak grip aperture, percent-to-peak grip aperture, and percent-to-peak-grip hand deceleration. The simple main effects ANOVA is reported for hand trajectory variability, movement time, peak hand velocity, and percent-to-peak hand velocity. Normative hand movements during two functional upper limb tasks Table 5. Cup Transfer Task statistical analysis results. Movement time (s) Interaction: Mvmt x Segment F(3, 57) = 167.1 Mvmt 1 Mvmt2 Mvmt 3 Mvmt 4 F (Mvmt effect) Pairwise Reach-grasp 0.86 0.75 1.10 0.63 (3, 57) = 273.2 4 << 2 << 1 << 3 Transport-release 1.32 1.48 1.47 1.36 (2.5, 48.1) = 55.2 1 << 2,3; 4 << 2,3 Hand trajectory variability (mm) Interaction: Mvmt x Segment F(3, 57) = 10.2 Mvmt 1 Mvmt2 Mvmt 3 Mvmt 4 F (Mvmt effect) Pairwise Reach-grasp 16 27 26 24 (3, 57) = 19.5 1 << 2,3,4 Transport-release 16 17 18 17 (3, 57) = 4.42 1 < 3 Peak hand velocity (mm/s) Interaction: Mvmt x Segment F(3, 57) = 130.3 Mvmt 1 Mvmt2 Mvmt 3 Mvmt 4 F (Mvmt effect) Pairwise Reach-grasp 818 1050 1435 1041 (3, 57) = 176.3 1 << 2,3,4; 2 << 3; 4 << 3 Transport-release 970 897 976 956 (3, 57) = 18.5 2 < 1; 2 << 3,4 Percent-to-peak hand velocity (%) Interaction: Mvmt x Segment F(3, 57) = 132.0 Mvmt 1 Mvmt2 Mvmt 3 Mvmt 4 F (Mvmt effect) Pairwise Reach-grasp 43.7 25.9 42.5 25.0 (3, 57) = 54.1 2 << 1,3; 4 << 1,3 Transport-release 21.1 39.9 25.1 23.8 (1.8, 35.0) = 70.0 1 << 2,3; 3 << 2; 4 << 2 Peak grip aperture (mm) Mvmt 1 Mvmt2 Mvmt 3 Mvmt 4 F (Mvmt effect) Pairwise Reach-grasp 99 114 113 118 (3, 57) = 102.1 1 << 2,3,4; 2 < 4; 3 < 4 Percent-to-peak grip aperture (%) Mvmt 1 Mvmt2 Mvmt 3 Mvmt 4 F (Mvmt effect) Pairwise Reach-grasp 80.9 71.9 80.9 78.1 (3, 57) = 24.9 2 << 1,3; 2 < 4 Percent-to-peak hand deceleration (%) Mvmt 1 Mvmt2 Mvmt 3 Mvmt 4 F (Mvmt effect) Pairwise Reach-grasp 69.7 49.2 60.6 68.4 (2.1, 40.4) = 45.4 2 << 1,3,4; 3 << 1; 3 < 4 Cup Transfer Task results of the two-factor and one-factor repeated-measures analysis of variance (ANOVA). The results for the interaction of Movement and Segment for the two-factor repeated-measures ANOVA is reported for hand trajectory variability, movement time, peak hand velocity, and percent-to-peak hand velocity. The effect of movement for the one-way repeated measures ANOVA is reported for peak grip aperture, percent-to-peak grip aperture, and percent-to-peak-grip hand deceleration. The simple main effects ANOVA is reported for hand trajectory variability, movement time, peak hand velocity, and percent-to-peak hand velocity.  indicates that the F-statistic was significant at p < 0.001;  indicates that the F-statistic was significant at p < 0.05; << indicates that the pairwise comparison was significantly smaller at p < 0.001; < indicates that the pairwise comparison was significantly smaller at p < 0.05. Table 5. Cup Transfer Task statistical analysis results. Cup Transfer Task results of the two-factor and one-factor repeated-measures analysis of variance (ANOVA). The results for the interaction of Movement and Segment for the two-factor repeated-measures ANOVA is reported for hand trajectory variability, movement time, peak hand velocity, and percent-to-peak hand velocity. The effect of movement for the one-way repeated measures ANOVA is reported for peak grip aperture, percent-to-peak grip aperture, and percent-to-peak-grip hand deceleration. The simple main effects ANOVA is reported for hand trajectory variability, movement time, peak hand velocity, and percent-to-peak hand velocity.  indicates that the F-statistic was significant at p < 0.001;  indicates that the F-statistic was significant at p < 0.05; << indicates that the pairwise comparison was significantly smaller at p < 0.001; < indicates that the pairwise comparison was significantly smaller at p < 0.05. Cup Transfer Task results of the two-factor and one-factor repeated-measures analysis of variance (ANOVA). The results for the interaction of Movement and Segment for the two-factor repeated-measures ANOVA is reported for hand trajectory variability, movement time, peak hand velocity, and percent-to-peak hand velocity. The effect of movement for the one-way repeated measures ANOVA is reported for peak grip aperture, percent-to-peak grip aperture, and percent-to-peak-grip hand deceleration. The simple main effects ANOVA is reported for hand trajectory variability, movement time, peak hand velocity, and percent-to-peak hand velocity.  indicates that the F-statistic was significant at p < 0.001;  indicates that the F-statistic was significant at p < 0.05; << indicates that the pairwise comparison was significantly smaller at p < 0.001; < indicates that the pairwise  indicates that the F-statistic was significant at p < 0.05; << indicates that the pairwise comparison was significantly smaller at p < 0.001; < indicates that the pairwise comparison was significantly smaller at p < 0.05. https://doi.org/10.1371/journal.pone.0199549.t005 transport-release segments displayed small, double hand velocity peaks, reflecting a conse- quence of transporting the cup over an obstacle in the vertical plane. Cup Transfer Task Overall, peak velocities for the Cup Transfer Task (Table 3) were significantly higher for reach-grasp segments than transport-release segments (p < 0.001). Slower movement during transport was expected given the risk of spilling the compliant cups filled with beads. As evi- denced by the hand velocity graph (Fig 4B) and the number of movement units (Table 3), all PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 10 / 21 PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 Cup Transfer Task results of the two-factor and one-factor repeated-measures analysis of variance (ANOVA). The results for the interaction of Movement and Segment for the two-factor repeated-measures ANOVA is reported for hand trajectory variability, movement time, peak hand velocity, and percent-to-peak hand velocity. The effect of movement for the one-way repeated measures ANOVA is reported for peak grip aperture, percent-to-peak grip aperture, and percent-to-peak-grip hand deceleration. The simple main effects ANOVA is reported for hand trajectory variability, movement time, peak hand velocity, and percent-to-peak hand velocity.  indicates that the F-statistic was significant at p < 0.001;  indicates that the F-statistic was significant at p < 0.05; << indicates that the pairwise comparison was significantly smaller at p < 0.001; < indicates that the pairwise comparison was significantly smaller at p < 0.05. The Cup Transfer Task was unique in that it required two different grasp patterns, which we hypothesized would affect grip aperture and velocity of movements based on confidence in modulating grip patterns to not crush the cup and spill the contents. Movement 1 had the shortest distance to reach and the lowest peak velocity (Fig 4B) compared to all the other seg- ments (p < 0.001). Movement 1 also had the lowest peak grip aperture (Fig 5B) compared to the other three movements (p < 0.001). The transport velocity for Movement 1 was similar to that of Movements 3 and 4 (p = 1.000). Movement 2 required a change in grasp to a side grasp of the cup, and displayed a similar peak grip aperture to Movement 3 also requiring a side grasp (p = 0.959), but was significantly different from the top grasps (p < 0.05). Although Movements 2 and 3 had similar grip aper- tures, there were differences in the velocity profiles. Movement 2 had a lower and earlier peak hand velocity than Movement 3, and the earliest deceleration peak of all the reach-grasp PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 11 / 21 Normative hand movements during two functional upper limb tasks Fig 2. Pasta Box Task hand trajectory. Hand trajectories for the Pasta Box Task. The group average hand trajectory is plotted as a dark line, and the standard deviation of participant means as three-dimensional shading. Movement 1 (A), Movement 2 (B), and Movement 3 (C) are segmented into reach (red), grasp (orange), transport (blue), and release (green) phases. The maximum of the mean three-dimensional standard deviation was calculated for reach-grasp and transport-release segments in each movement to quantify variability, reported in Table 2. https://doi.org/10.1371/journal.pone.0199549.g002 Fig 2. Pasta Box Task hand trajectory. Hand trajectories for the Pasta Box Task. The group average hand trajectory is plotted as a dark line, and the standard deviation of participant means as three-dimensional shading. Movement 1 (A), Movement 2 (B), and Movement 3 (C) are segmented into reach (red), grasp (orange), transport (blue), and release (green) phases. The maximum of the mean three-dimensional standard deviation was calculated for reach-grasp and transport-release segments in each movement to quantify variability, reported in Table 2. https://doi.org/10.1371/journal.pone.0199549.g002 https://doi.org/10.1371/journal.pone.0199549.g002 https://doi.org/10.1371/journal.pone.0199549.g002 segments. Between-session repeatability Both the Pasta Box Task and Cup Transfer Task presented mostly good repeatability (ICC > 0.75) for movement time, peak hand velocity, percent-to-peak hand velocity, peak grip aper- ture, percent-to-peak grip aperture, and percent-to-peak hand deceleration. For the Pasta Box Task (Table 6), poor to moderate repeatability (ICC values of below 0.75) was found for only two measures: peak hand velocity and percent-to-peak hand velocity for the transport-release segment of Movement 1. For the Cup Transfer Task (Table 7), poor to moderate repeatability (ICC values of below 0.75) was found for six of the 36 measures: peak hand velocity for the transport-release segment of Movement 1, Movement 3, and Movement 4, as well as for percent-to-peak hand velocity, percent-to-peak grip aperture, and percent-to- peak hand deceleration for the reach-grasp segment of Movement 1. For the Pasta Box Task (Table 6), SEM values ranged from 1 to 7% of the average absolute measurement value across measures, and MDC ranged from 3 to 20% across measures. For the Cup Transfer Task (Table 7), SEM values ranged from 1 to 15% across measures and MDC ranged from 2 to 42% across measures. This slowed movement was also seen in the transport-release segment of Movement 2, which had the lowest peak hand velocity of all the transport-release segments. The percent- to-peak grip aperture occurred significantly earlier in the reach-grasp segment of Movement 2 compared to the other 3 movements (p < 0.01). In contrast, the reach-grasp segment in Movement 3 had the highest peak hand velocity. The hand velocity for the transport-release segment of Movement 3 was not significantly dif- ferent from Movement 1 (p = 1.000) and 4 (p = 0.137). Movement 4 had the largest peak grip aperture (p < 0.05). It otherwise showed similar characteristics in percent-to-peak grip aper- ture and percent-to-peak hand deceleration as Movement 1, which had the same grasp. PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 Discussion The purpose of developing new standardized functional tasks representative of real-world ADLs was to create a meaningful assessment metric for clinical populations with upper limb impairments, that specifically focused on quantifying hand kinematics. Reach-grasp tasks have 12 / 21 PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 Normative hand movements during two functional upper limb tasks Fig 3. Cup Transfer Task hand trajectory. Hand trajectories for the Cup Transfer Task. The group average hand trajectory is plotted as a dark line, and the standard deviation of participant means as three-dimensional shading. Movement 1 (A), Movement 2 (B), Movement 3 (C), and Movement 4 (D) are segmented into reach (red), grasp (orange), transport (blue), and release (green) phases. The maximum of the mean three-dimensional standard deviation was calculated for reach-grasp and transport-release segments for each movement to quantify variability, reported in Table 3. https://doi.org/10.1371/journal.pone.0199549.g003 Fig 3. Cup Transfer Task hand trajectory. Hand trajectories for the Cup Transfer Task. The group average hand trajectory is plotted as a dark line, and the standard deviation of participant means as three-dimensional shading. Movement 1 (A), Movement 2 (B), Movement 3 (C), and Movement 4 (D) are segmented into reach (red), grasp (orange), transport (blue), and release (green) phases. The maximum of the mean three-dimensional standard deviation was calculated for reach-grasp and transport-release segments for each movement to quantify variability, reported in Table 3. https://doi.org/10.1371/journal.pone.0199549.g003 https://doi.org/10.1371/journal.pone.0199549.g003 been shown to provide insights into altered motor control strategies in populations with impaired upper limb function [1,16,30,35–37]. The importance of involving objects in goal- directed tasks with a functional context has been previously demonstrated as resulting in smoother, faster, more preplanned movement compared to non-goal directed movement through space [38]. Using natural objects for completing a task and providing functional infor- mation on the objects, rather than simulated devices, is important to enhance functional per- formance in both normative and impaired populations [39]. Our tasks, designed to be consistent with these parameters and also the requirements of known clinical upper limb assessments [20,23–26,40,41], were relatively easy for non-disabled individuals to perform. However, since errors were made by participants, the tasks required some level of attention and concentration. This may be valuable for assessing clinical populations with not only motor difficulties but also motor planning impairments. PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 13 / 21 Normative hand movements during two functional upper limb tasks Fig 4. Hand velocity. Hand velocity graphs for Pasta Box Task (A) and Cup Transfer Task (B). The solid line represents the group average, and grey shading the standard deviation of participant means. The task is segmented into reach (red), grasp (orange), transport (blue), and release (green) phases for each movement, with light grey representing the return to “home” phase. Kinematics of the reach-grasp segment and the transport-release segment were analyzed together. Fig 4. Hand velocity. Hand velocity graphs for Pasta Box Task (A) and Cup Transfer Task (B). The solid line represents the group average, and grey shading the standard deviation of participant means. The task is segmented into reach (red), grasp (orange), transport (blue), and release (green) phases for each movement, with light grey representing the return to “home” phase. Kinematics of the reach-grasp segment and the transport-release segment were analyzed together. https://doi.org/10.1371/journal.pone.0199549.g004 https://doi.org/10.1371/journal.pone.0199549.g004 Fig 5. Grip aperture. Grip aperture graphs for Pasta Box Task (A) and Cup Transfer Task (B). The solid line represents the group average, and grey shading represents the standard deviation of participant means. The task is segmented into reach (red), grasp (orange), transport (blue), and release (green) phases for each movement, with light grey representing the return to “home” phase. Kinematics of the reach-grasp segment and the transport- release segment were analyzed together. Fig 5. Grip aperture. Grip aperture graphs for Pasta Box Task (A) and Cup Transfer Task (B). The solid line represents the group average, and grey shading represents the standard deviation of participant means. The task is segmented into reach (red), grasp (orange), transport (blue), and release (green) phases for each movement, with light grey representing the return to “home” phase. Kinematics of the reach-grasp segment and the transport- release segment were analyzed together. https://doi.org/10.1371/journal.pone.0199549.g005 PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 14 / 21 Cup Transfer Task repeatability results. Repeatability analysis was performed, for movements and segments separately, on movement time, peak hand velocity, percent- to-peak hand velocity, peak grip aperture, percent-to-peak grip aperture, and percent-to-peak hand deceleration. Repeatability measures include intra-class correlation (ICC) with corresponding 95% confidence intervals, standard error of measurement (SEM), and minimal detectable change (MDC). ICC values above 0.90 are presented in bold. ICC values below 0.75 are presented in italics. ICC values that failed the F-test (p > 0.05) are presented with an asterisks (), indicating the validity of the ICC may be compromised for this result. Movements are: Movement 1 (Mvmt 1), Movement 2 (Mvmt 2), Movement 3 (Mvmt 3), and Movement 4 (Mvmt 4); segments are: reach-grasp (RG) and transport-release (TR). Normative hand movements during two functional upper limb tasks Table 6. Pasta Box Task repeatability. Movement time (sec) Peak hand velocity (mm/s) Percent-to-peak hand velocity (%) ICC SEM MDC ICC SEM MDC ICC SEM MDC Mvmt 1 RG 0.84 (0.37–0.96) 0.035 0.098 0.89 (0.54–0.97) 38 106 0.90 (0.61–0.98) 1.4 3.8 TR 0.81 (0.25–0.95) 0.046 0.128 0.56 (-0.77–0.89) 56 156 0.74 (-0.06–0.93) 2.4 6.6 Mvmt 2 RG 0.88 (0.50–0.97) 0.030 0.083 0.79 (0.15–0.95) 64 177 0.95 (0.79–0.99) 1.6 4.4 TR 0.86 (0.45–0.97) 0.057 0.159 0.91 (0.64–0.98) 30 84 0.83 (0.30–0.96) 2.0 5.5 Mvmt 3 RG 0.93 (0.70–0.98) 0.029 0.081 0.93 (0.72–0.98) 47 130 0.89 (0.57–0.97) 2.1 5.7 TR 0.89 (0.56–0.97) 0.052 0.145 0.78 (0.10–0.94) 40 112 0.86 (0.45–0.97) 1.6 4.4 Peak grip aperture (mm) Percent-to-peak grip aperture (%) Percent-to-peak hand deceleration (%) ICC SEM MDC ICC SEM MDC ICC SEM MDC Mvmt 1 RG 0.95 (0.78–0.99) 2 4 0.88 (0.50–0.97) 1.8 4.9 0.84 (0.35–0.96) 3.4 9.5 Mvmt 2 RG 0.92 (0.68–0.98) 2 4 0.95 (0.81–0.99) 1.0 2.7 0.80 (0.20–0.95) 2.6 7.2 Mvmt 3 RG 0.95 (0.79–0.99) 1 4 0.87 (0.47–0.97) 1.3 3.7 0.75 (0.01–0.94) 2.4 6.6 Table 6. Pasta Box Task repeatability. Pasta Box Task repeatability results. Repeatability analysis was performed for movements and segments separately, on movement time, peak hand velocity, percent-to- peak hand velocity, peak grip aperture, percent-to-peak grip aperture, and percent-to-peak hand deceleration. Repeatability measures include intra-class correlation (ICC) with corresponding 95% confidence intervals, standard error of measurement (SEM), and minimal detectable change (MDC). ICC values above 0.90 are presented in bold. ICC values below 0.75 are presented in italics. ICC values that failed the F-test (p > 0.05) are presented with an asterisks (), indicating the validity of the ICC may be compromised for this result. Movements are: Movement 1 (Mvmt 1), Movement 2 (Mvmt 2), and Movement 3 (Mvmt 3); segments are: reach-grasp (RG) and transport-release (TR). Pasta Box Task repeatability results. Repeatability analysis was performed for movements and segments separately, on movement time, peak hand velocity, percent-to- peak hand velocity, peak grip aperture, percent-to-peak grip aperture, and percent-to-peak hand deceleration. Repeatability measures include intra-class correlation (ICC) with corresponding 95% confidence intervals, standard error of measurement (SEM), and minimal detectable change (MDC). ICC values above 0.90 are presented in bold. ICC values below 0.75 are presented in italics. Pasta Box Task repeatability results. Repeatability analysis was performed for movements and segments separately, on movement time, peak hand velocity, percent-to- peak hand velocity, peak grip aperture, percent-to-peak grip aperture, and percent-to-peak hand deceleration. Repeatability measures include intra-class correlation (ICC) with corresponding 95% confidence intervals, standard error of measurement (SEM), and minimal detectable change (MDC). ICC values above 0.90 are presented in bold. ICC values below 0.75 are presented in italics. ICC values that failed the F-test (p > 0.05) are presented with an asterisks (), indicating the validity of the ICC may be compromised for this result. Movements are: Movement 1 (Mvmt 1), Movement 2 (Mvmt 2), and Movement 3 (Mvmt 3); segments are: reach-grasp (RG) and transport-release (TR). Normative hand movements during two functional upper limb tasks The tasks had specific movement sequences that were standardized, repeatable, of short duration, and consistently performed by individual participants. Other tasks used in literature have shown low within-participant variability [12,13,35], however typically using more con- strained tasks not as representative of real-world object interactions. Within-participant vari- ability is an important factor to assess as, for some clinical populations, increased variability in motor performance is a key indicator of poor motor skill, and may indicate the adoption of various strategies for accomplishing a task rather than converging on one strategy. For exam- ple, prosthesis users have been shown to have increased variability in upper limb angular kinematics, as reflected by increased average standard deviation [36], whereas more skilled prosthesis users have less deviation in end-point kinematic profiles from non-disabled move- ment patterns [42]. The measurement of variability may play an important role given that it has been shown in the occupational literature that both kinematic compensation and motor variability are associated with musculoskeletal pain [43]. The inclusion of mean participant standard deviation as a measure of within-participant variability in this normative data set will allow comparison in future study of impaired populations. The between-session repeatability of the task was also found to be good for 55 out of 63 parameters, which is a prerequisite prior to investigating sensitivity to change in clinical populations. The task design with specific sequencing allowed for segmentation of movements into the crucial phases of reaching and grasping, and transporting and releasing objects within the same task. This allows examination of discrete characteristics of hand movement pertaining to hand trajectory, hand velocity, and grip aperture for each of these phases. This is important as many clinical populations will have impaired dexterity impacting grasp, which has been exten- sively investigated [30,44]; however, valuable information can also be obtained by examining control of the hand during transport, such as grip modulation. In addition, grasp features are known to be affected by the task goal and setting [19]; therefore, it is most ecologically valid to use tasks that not only reach and grasp but involve a logical next step of movement and place- ment of the object. The influence of an object’s intrinsic and extrinsic parameters on hand kinematics was con- sistent with prior literature. PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 ICC values that failed the F-test (p > 0.05) are presented with an asterisks (), indicating the validity of the ICC may be compromised for this result. Movements are: Movement 1 (Mvmt 1), Movement 2 (Mvmt 2), and Movement 3 (Mvmt 3); segments are: reach-grasp (RG) and transport-release (TR). https://doi.org/10.1371/journal.pone.0199549.t006 Table 7. Cup Transfer Task repeatability. Movement time (sec) Peak hand velocity (mm/s) Percent-to-peak hand velocity (%) ICC SEM MDC ICC SEM MDC ICC SEM MDC Mvmt 1 RG 0.83 (0.33–0.96) 0.032 0.089 0.77 (0.07–0.94) 64 176 0.54 (-0.84–0.89) 4.6 12.6 TR 0.85 (0.41–0.96) 0.042 0.116 0.65 (-0.43–0.91) 50 139 0.82 (0.25–0.95) 0.9 2.5 Mvmt 2 RG 0.85 (0.40–0.96) 0.033 0.092 0.96 (0.83–0.99) 26 72 0.93 (0.71–0.98) 2.1 5.9 TR 0.81 (0.22–0.95) 0.053 0.147 0.76 (0.03–0.94) 29 81 0.91 (0.63–0.98) 2.8 7.8 Mvmt 3 RG 0.85 (0.41–0.96) 0.045 0.125 0.76 (0.05–0.94) 60 166 0.91 (0.62–0.98) 2.1 5.9 TR 0.76 (0.05–0.94) 0.068 0.189 0.52 (-0.93–0.88) 25 68 0.85 (0.38–0.96) 0.8 2.1 Mvmt 4 RG 0.75 (0.01–0.94) 0.031 0.086 0.84 (0.35–0.96) 50 139 0.78 (0.10–0.95) 3.8 10.5 TR 0.85 (0.38–0.96) 0.058 0.162 0.64 (-0.44–0.91) 29 80 0.99 (0.96–1.00) 0.7 2.0 Peak grip aperture (mm) Percent-to-peak grip aperture (%) Percent-to-peak hand deceleration (%) ICC SEM MDC ICC SEM MDC ICC SEM MDC Mvmt 1 RG 0.97 (0.87–0.99) 1 3 0.60 (-0.61–0.90) 1.8 5.0 0.68 (-0.30–0.92) 4.1 11.4 Mvmt 2 RG 0.97 (0.86–0.99) 1 3 0.79 (0.14–0.95) 2.1 5.9 0.86 (0.43–0.97) 2.8 7.9 Mvmt 3 RG 0.97 (0.86–0.99) 1 2 0.81 (0.24–0.95) 1.6 4.3 0.95 (0.78–0.99) 1.5 4.3 Mvmt 4 RG 0.96 (0.83–0.99) 2 4 0.86 (0.45–0.97) 2.2 6.0 0.84 (0.36–0.96) 5.2 14.5 Table 7. Cup Transfer Task repeatability. https://doi.org/10.1371/journal.pone.0199549.t007 PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 15 / 21 Normative hand movements during two functional upper limb tasks velocities occurring no later than 25% of the movement, indicating that movement of the com- pliant cup with risk of spillage was potentially challenging. This is consistent with Butler et al. who found lower percent-to-peak hand velocity values for the segment of their task where the performer had to bring a cup to their mouth, suggesting that this movement was riskier and required more conservative control strategies [35]. Both tasks involved obstacle avoidance; in the vertical plane for every movement of the cups, and in the horizontal plane for the second movement of the box of pasta. As previously shown by Chapman & Goodale, obstacles change the spatiotemporal characteristics of hand movement by increasing movement time and decreasing peak hand velocity [50]. This effect is even greater when obstacles are closer to the performer and on the side of the reaching arm [50]. These differences in spatiotemporal characteristics may have been amplified in our task since these trends were observed during the transport-release segment as opposed to the reach-grasp segment, where moving the object adds a further level of uncertainty. The challenges presented by these varied intrinsic and extrinsic properties is expected to result in significant performance differences in conditions with impaired hand sensation and impaired upper limb function. Reaching and grasping are functionally linked to the specific task, with the characteristics of the object determining the relative timing of peak grip aperture and peak hand deceleration [51]. Abnormalities in these features resulting in decoupling of reach and grasp have been shown in prosthesis users [18], cerebellar lesions [37], spinal cord injury [2] and in stroke populations [52], suggesting that this type of kinematic analysis could have applicability to multiple populations with upper limb impairment. Limitations and future work The assessment of normative hand movement characteristics demonstrated consistent trends across varying task challenges. The limitations of the current study include the assessment of only between-session repeatability, not the repeatability among different test administrators and study sites. Further study of inter-rater repeatability will assist with determining reproduc- ibility of the task assessment. Considering that the presented normative data set establishes an ideal young adult performance standard, further work may focus on establishing differences between the sexes or with aging cohorts to obtain a fully comparative data set for populations with impairment. Finally, future work will also test the application of this methodology in pop- ulations with upper limb impairments, and validate the measures against other clinically vali- dated hand outcome assessments in these populations. PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 Location of the object influenced several parameters, particularly the first movement of the Pasta Box Task where the box of pasta was not within the direct field of view and required a turn of the body and the head for the grasp. This misalignment of the body space to the visual space has been shown to increase the latency of the movement towards a target and decrease accuracy [45,46]. This first movement also required the arm to move multiple degrees of freedom across several planes (i.e., sagittal, transverse, and coronal planes) to complete the movement accurately. Therefore, a greater deceleration phase was necessary, evidenced by the hand velocity peaks occurring earlier than for other movements. This aligns with previous research by Fisk & Goodale who found hand velocity peaks to occur roughly around one third of the movement for lateral reaches [45], compared to studies that restricted reaching tasks to single plane movement and reported more symmetrical hand velocity profiles [47]. The location of the cups in the task space and the required grasp conformation also influ- enced reaching strategies. The first reach-grasp of the Cup Transfer Task showed the smallest grip aperture, suggesting confidence with the upcoming grasp of the top of the cup, but a slo- wed velocity of the reach likely due to the short distance. The two cylindrical side grasps showed similar grip apertures, but were different in movement strategies in that the first cylin- drical side grasp showed several features suggesting it was the reach with the highest perceived risk, with lower, earlier peak velocity and the earliest deceleration. This is consistent with pre- vious studies where hand velocity was lower during the reach when the task following the approach required precision [48,49]. Three of the transport release segments showed peak PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 16 / 21 Acknowledgments We thank Elizabeth Crockett, Ognen Kovic, Brody Kalwajtys, and Thomas R. Dawson for their contributions to task design, data collection and data processing. We thank Elizabeth Crockett, Ognen Kovic, Brody Kalwajtys, and Thomas R. Dawson for their contributions to task design, data collection and data processing. Author Contributions Conceptualization: Patrick M. Pilarski, Craig S. Chapman, Albert H. Vette, Jacqueline S. Hebert. Conceptualization: Patrick M. Pilarski, Craig S. Chapman, Albert H. Vette, Jacqueline S. Hebert. Data curation: Aïda M. Valevicius, Quinn A. Boser, Ewen B. Lavoie. Formal analysis: Aïda M. Valevicius, Quinn A. Boser, Craig S. Chapman. Funding acquisition: Craig S. Chapman, Jacqueline S. Hebert. Investigation: Aïda M. Valevicius, Quinn A. Boser, Ewen B. Lavoie. Investigation: Aïda M. Valevicius, Quinn A. Boser, Ewen B. Lavoie. Methodology: Glyn S. Murgatroyd, Craig S. Chapman, Albert H. Vette, Jacqueline S. Hebert. Project administration: Jacqueline S. Hebert. Methodology: Glyn S. Murgatroyd, Craig S. Chapman, Albert H. Vette, Jacqueline S. Hebert. Project administration: Jacqueline S. Hebert. Resources: Craig S. Chapman, Albert H. Vette, Jacqueline S. Hebert. Software: Aïda M. Valevicius, Quinn A. Boser, Patrick M. Pilarski, Craig S. Chapman. Supervision: Albert H. Vette, Jacqueline S. Hebert. Validation: Craig S. Chapman, Albert H. Vette, Jacqueline S. Hebert. Visualization: Aïda M. Valevicius, Craig S. Chapman, Albert H. Vette. Writing – original draft: Aïda M. Valevicius, Albert H. Vette, Jacqueline S. Hebert. Writing – review & editing: Patrick M. Pilarski, Craig S. Chapman, Albert H. Vette, Jacque- line S. Hebert. Conclusion Standardized upper limb functional tasks which mimic ADLs and incorporate elements of risk and accuracy, lateral reaches, reaches crossing the body’s midline, objects of different shapes and sizes, and different grasp patterns to assess hand movements were developed. A normative dataset for hand movement was created based on non-disabled performance characterizing hand trajectory, hand velocity, and grip aperture features for reach-grasp and transport-release segments of the movements. These features verified that the tasks challenged a variety of motor control strategies, and these unique movement characteristics were reflected in the quantitative results while being highly consistent within-performers. In addition to the low within-participant and between-participant variability for these complex tasks, a repeatability analysis showed that this novel assessment approach has good between-session repeatability. This assessment promises to be a valuable tool for future research in populations with upper limb impairments. PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 17 / 21 Normative hand movements during two functional upper limb tasks References 1. Lang CE, Wagner JM, Bastian AJ, Hu Q, Edwards DF, Sahrmann SA, et al. Deficits in grasp versus reach during acute hemiparesis. Exp Brain Res. 2005; 166(1):126–36. https://doi.org/10.1007/s00221- 005-2350-6 PMID: 16021431 2. Mateo S, Roby-Brami A, Reilly KT, Rossetti Y, Collet C, Rode G. Upper limb kinematics after cervical spinal cord injury: a review. J Neuroeng Rehabil. 2015; 12(1):9. 3. Metzger AJ, Dromerick AW, Holley RJ, Lum PS. Characterization of compensatory trunk movements during prosthetic upper limb reaching tasks. Arch Phys Med Rehabil. 2012; 93(11):2029–34. https://doi. org/10.1016/j.apmr.2012.03.011 PMID: 22449551 4. Hebert JS, Lewicke J. Case report of modified Box and Blocks test with motion capture to measure prosthetic function. J Rehabil Res Dev. 2012; 49(8):1163–74. PMID: 23341309 PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 18 / 21 Normative hand movements during two functional upper limb tasks 5. De Los Reyes-Guzma´n A, Dimbwadyo-Terrer I, Trincado-Alonso F, Monasterio-Huelin F, Torricelli D, Gil-Agudo A. Quantitative assessment based on kinematic measures of functional impairments during upper extremity movements: a review. Clin Biomech. 2014; 29(7):719–27. 6. Smeets JB, Brenner E. A new view on grasping. Motor Control. 1999; 3(3):237–71. PMID: 10409797 7. Cuijpers RH. On the relation between object shape and grasping kinematics. J Neurophysiol. 2004; 91(6):2598–606. https://doi.org/10.1152/jn.00644.2003 PMID: 14749319 8. Abend WBE, Morasso P. Human arm movement trajectory formation. Brain. 1982; 105:331–48. PMID: 7082993 9. Jeannerod M. The timing of natural prehension movements. J Mot Behav. 1984; 16(3):235–54. PMID: 15151851 10. Gordon J, Ghilardi MF, Cooper SE, Ghez C. Accuracy of planar reaching movements. Exp Brain Res. 1994; 99(1):112–30. PMID: 7925785 11. Gates DH, Walters LS, Cowley J, Wilken JM, Resnik L. Range of motion requirements for upper-limb activities of daily living. Am J Occup Ther. 2016; 70(1):7001350010p1–7001350010p10. https://doi.org/ 10.5014/ajot.2016.015487 PMID: 26709433 12. Jaspers E, Feys H, Bruyninckx H, Harlaar J, Molenaers G, Desloovere K. Upper limb kinematics: Devel- opment and reliability of a clinical protocol for children. Gait Posture. 2011; 33(2):279–85. https://doi. org/10.1016/j.gaitpost.2010.11.021 PMID: 21196120 13. Vanezis A, Robinson MA, Darras N. The reliability of the ELEPAP clinical protocol for the 3D kinematic evaluation of upper limb function. Gait Posture. 2015; 41(2):431–9. https://doi.org/10.1016/j.gaitpost. 2014.11.007 PMID: 25534948 14. Petuskey K, Bagley A, Abdala E, James MA, Rab G. Upper extremity kinematics during functional activ- ities: Three-dimensional studies in a normal pediatric population. Gait Posture. 2007; 25(4):573–9. https://doi.org/10.1016/j.gaitpost.2006.06.006 PMID: 16875821 15. van Andel CJ, Wolterbeek N, Doorenbosch CAM, Veeger D(H. EJ), Harlaar J. References J Rehabil Res Dev. 2014; 51(6):919–32. 28. Winter DA. Biomechanics of Human Movement. In: Biomechanics of Human Movement. John Wiley & Sons, Inc.; 1979. p. 32–5. 29. Alt Murphy M, Ha¨ger CK. Kinematic analysis of the upper extremity after stroke–how far have we reached and what have we grasped? Phys Ther Rev. 2015; 20(3):137–55. 30. Alt Murphy M, Wille´n C, Sunnerhagen KS. Kinematic variables quantifying upper-extremity perfor- mance after stroke during reaching and drinking from a glass. Neurorehabil Neural Repair. 2011; 25(1):71–80. https://doi.org/10.1177/1545968310370748 PMID: 20829411 31. Cirstea MC, Mitnitski AB, Feldman AG, Levin MF. Interjoint coordination dynamics during reaching in stroke. Exp Brain Res. 2003; 151(3):289–300. https://doi.org/10.1007/s00221-003-1438-0 PMID: 12819841 32. Schneiberg S, Mckinley P, Gisel E, Sveistrup H, Levin MF. Reliability of kinematic measures of func- tional reaching in children with cerebral palsy. Dev Med Child Neurol. 2010; 52(7):167–73. 33. Portney LG, Watkins MP. Foundations of clinical research : applications to practice. [Internet]. Upper Saddle River, N.J. : Pearson/Prentice Hall, c2009.; 2009. 34. Weir JP. Quantifying test-retest reliability using the intraclass correlation coefficient and the SEM. J Strength Cond Res. 2005; 19(1):231–40. PMID: 15705040 35. Butler EE, Ladd AL, LaMont LE, Rose J. Temporal-spatial parameters of the upper limb during a Reach & Grasp Cycle for children. Gait Posture. 2010; 32(3):301–6. https://doi.org/10.1016/j.gaitpost.2010.05. 013 PMID: 20558067 36. Major MJ, Stine RL, Heckathorne CW, Fatone S, Gard S a. Comparison of range-of-motion and variabil- ity in upper body movements between transradial prosthesis users and able-bodied controls when exe- cuting goal-oriented tasks. J Neuroeng Rehabil. 2014; 11(1):132. 37. Zackowski K, Thach W, Bastian A. Cerebellar subjects show impaired coupling of reach and grasp movements. Exp Brain Res. 2002; 146(4):511–22. https://doi.org/10.1007/s00221-002-1191-9 PMID: 12355280 38. Wu C-Y, Trombly CA, Lin K-C, Tickle-Degnen L. Effects of Object Affordances on Movement Perfor- mance: A Meta-Analysis. Vol. 5, Scandinavian Journal of Occupational Therapy. 1998 [cited]. p. 83– 92. 39. Wu C-Y, Trombly CA, Lin K-C, Tickle-Degnen L. Effects of Object Affordances on Reaching Perfor- mance in Persons with and Without Cerebrovascular Accident. Am J Occup Ther. 1998; 52(6):447–56. PMID: 9612495 40. Mathiowetz V, Volland G, Kashman N, Weber K. Adult Norms for the Box and Block Test of Manual Dexterity. Am J Ocupational Ther. 1985; 39(6):387–91. 41. Light CM, Chappell PH, Kyberd PJ. Establishing a standardized clinical assessment tool of pathologic and prosthetic hand function: Normative data, reliability, and validity. Arch Phys Med Rehabil. 2002; 83(6):776–83. References Complete 3D kinematics of upper extremity functional tasks. Gait Posture. 2008; 27(1):120–7. https://doi.org/10.1016/j.gaitpost. 2007.03.002 PMID: 17459709 16. van Vliet PM, Sheridan MR. Coordination between reaching and grasping in patients with hemiparesis and healthy subjects. Arch Phys Med Rehabil. 2007; 88(10):1325–31. https://doi.org/10.1016/j.apmr. 2007.06.769 PMID: 17908577 17. Schaefer SY, DeJong SL, Cherry KM, Lang CE. Grip type and task goal modify reach-to-grasp perfor- mance in post-stroke hemiparesis. Motor Control. 2012; 16(2):245–64. PMID: 22357103 18. Bouwsema H, van der Sluis CK, Bongers RM. Movement characteristics of upper extremity prostheses during basic goal-directed tasks. Clin Biomech. 2010; 25(6):523–9. 19. Valyear KF, Chapman CS, Gallivan JP, Mark RS, Culham JC. To use or to move: Goal-set modulates priming when grasping real tools. Exp Brain Res. 2011; 212(1):125–42. https://doi.org/10.1007/s00221- 011-2705-0 PMID: 21584628 20. Jebsen RH, Taylor N, Trieschmann RB, Trotter MJ, Howard LA. An objective and standardized test of hand function. Arch Phys Med Rehabil. 1969 Jun; 50(6):311–9. PMID: 5788487 21. Jongbloed-Pereboom M, Nijhuis-Van Der Sanden MWG, Steenbergen B. Norm scores of the box and block test for children ages 3–10 years. Am J Occup Ther. 2013 May 1; 67(3):312–8. https://doi.org/10. 5014/ajot.2013.006643 PMID: 23597689 22. Thrope G, Stroh K, Baco A. A Standardized Object Test for quantitative assessment of hand grasp func- tion using the C.W.R.U. upper extremity neuroprosthesis. Presperin J, editor. New Orleans: RESNA Press; 1989. 481 p. 23. Lyle RC. A performance test for assessment of upper limb function in physical rehabilitation. Int J Reha- bil Res. 1981; 4(4):483–92. PMID: 7333761 24. Lindner HYN, Linacre JM, Norling Hermansson LM. Assessment of capacity for myoelectric control: evaluation of construct and rating scale. J Rehabil Med. 2009; 41(6):467–74. https://doi.org/10.2340/ 16501977-0361 PMID: 19479160 25. Hudak PL, Amadio PC, Bombardier C, Beaton D, Cole D, Davis A, et al. Development of an upper extremity outcome measure: The DASH (disabilities of the arm, shoulder, and head). Am J Ind Med. 1996 Jun; 29(6):602–8. https://doi.org/10.1002/(SICI)1097-0274(199606)29:6<602::AID-AJIM4>3.0. CO;2-L PMID: 8773720 26. Resnik L, Adams L, Borgia M, Delikat J, Disla R, Ebner C, et al. Development and evaluation of the activities measure for upper limb amputees. Arch Phys Med Rehabil. 2013; 94(3):488–494.e4. https:// doi.org/10.1016/j.apmr.2012.10.004 PMID: 23085376 19 / 21 PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 Normative hand movements during two functional upper limb tasks 27. Hebert JS, Lewicke J, Williams TR, Vette AH. Normative data for modified Box and Blocks test measur- ing upper-limb function via motion capture. 50. Chapman CS, Goodale MA. Missing in action: The effect of obstacle position and size on avoidance while reaching. Exp Brain Res. 2008; 191(1):83–97. https://doi.org/10.1007/s00221-008-1499-1 PMID: 18716765 51. Marteniuk G, Leavitt JL, Mackenzie L. Functional relationship between grasp and transport components in a prehension task. 1990; 9:149–76. 52. Nowak DA. The impact of stroke on the performance of grasping: Usefulness of kinetic and kinematic motion analysis. Vol. 32, Neuroscience and Biobehavioral Reviews. 2008 [cited]. p. 1439–50. PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 References PMID: 12048655 42. Bouwsema H, Kyberd PJ, Hill W, van der Sluis CK, Bongers RM. Determining skill level in myoelectric prosthesis use with multiple outcome measures. J Rehabil Res Dev. 2012; 49(9):1331. PMID: 23408215 43. Madeleine P. On functional motor adaptations: From the quantification of motor strategies to the pre- vention of musculoskeletal disorders in the neck-shoulder region. Acta Physiol. 2010; 199(SUPPL. 679):1–46. 44. Alt Murphy M, Sunnerhagen KS, Johnels B, Wille´n C. Three-dimensional kinematic motion analysis of a daily activity drinking from a glass: a pilot study. J Neuroeng Rehabil. 2006; 3:18. https://doi.org/10. 1186/1743-0003-3-18 PMID: 16914057 45. Fisk JD, Goodale MA. The organization of eye and limb movements during unrestricted reaching to tar- gets in contralateral and ipsilateral visual space. Exp Brain Res. 1985; 60(1):159–78. PMID: 4043274 46. Prablanc C, Echallier JE, Jeannerod M, Komilis E. Optimal response of eye and hand motor systems in pointing at a visual target. II. Static and dynamic visual cues in the control of hand movement. Biol Cybern. 1979; 35(3):183–7. PMID: 518938 47. Morasso P. Spatial control of arm movements. Exp Brain Res. 1981; 42(2):223–7. PMID: 7262217 48. Marteniuk RC, Mackenzie CL. Constraints on Human Arm Movement Trajectories. Can J Psychol. 1987; 41(3). 49. Claxton LJ, Keen R, McCarty ME. Evidence of motor planning in infant reaching behavior. Psychol Sci. 2003; 14(4):354–6. https://doi.org/10.1111/1467-9280.24421 PMID: 12807409 20 / 21 PLOS ONE | https://doi.org/10.1371/journal.pone.0199549 June 21, 2018 Normative hand movements during two functional upper limb tasks 21 / 21
https://openalex.org/W4394757617
https://www.frontiersin.org/journals/microbiology/articles/10.3389/fmicb.2024.1355069/pdf
English
null
Risk factors of Carbapenem-resistant Enterobacterales intestinal colonization for subsequent infections in hematological patients: a retrospective case-control study
Frontiers in microbiology
2,024
cc-by
7,383
Risk factors of Carbapenem-resistant Enterobacterales intestinal colonization for subsequent infections in hematological patients: a retrospective case-control study OPEN ACCESS EDITED BY Silpak Biswas, Calcutta School of Tropical Medicine, India REVIEWED BY Anna Giammanco, University of Palermo, Italy Martina Barchitta, University of Catania, Italy *CORRESPONDENCE Yan Jin sdjinyan@163.com RECEIVED 13 December 2023 ACCEPTED 01 April 2024 PUBLISHED 12 April 2024 CITATION Wang Z, Shao C, Shao J, Hao Y and Jin Y (2024) Risk factors of Carbapenem-resistant Enterobacterales intestinal colonization for subsequent infections in hematological patients: a retrospective case-control study. Front. Microbiol. 15:1355069. doi: 10.3389/fmicb.2024.1355069 Zihan Wang, Chunhong Shao, Jing Shao, Yingying Hao and Yan Jin* Department of Clinical Laboratory, Shandong Provincial Hospital Afliated to Shandong First Medical University, Jinan, China Objective: Infections caused by Carbapenem-resistant Enterobacterales (CRE) have high treatment costs, high mortality and few efective therapeutic agents. This study aimed to determine the risk factors for progression from intestinal colonization to infection in hematological patients and the risk factors for 30-day mortality in infected patients. COPYRIGHT © 2024 Wang, Shao, Shao, Hao and Jin. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms. Methods: A retrospective case-control study was conducted in the Department of Hematology at Shandong Provincial Hospital afliated to Shandong First Medical University from April 2018 to April 2022. Patients who developed subsequent infections were identified as the case group by electronic medical record query of patients with a positive rectal screen for CRE colonization, and patients who did not develop subsequent infections were identified as the control group by stratified random sampling. Univariate analysis and logistic regression analysis determined risk factors for developing CRE infection and risk factors for mortality in CRE-infected patients. Results: Eleven hematological patients in the study developed subsequent infections. The overall 30-day mortality rate for the 44 hematological patients in the case-control study was 11.4% (5/44). Mortality was higher in the case group than in the control group (36.5 vs. 3.0%, P = 0.0026), and septic shock was an independent risk factor for death (P = 0.024). Univariate analysis showed that risk factors for developing infections were non-steroidal immunosuppressants, serum albumin levels, and days of hospitalization. TYPE Original Research PUBLISHED 12 April 2024 DOI 10.3389/fmicb.2024.1355069 TYPE Original Research PUBLISHED 12 April 2024 DOI 10.3389/fmicb.2024.1355069 Carbapenem-resistant Enterobacterales, colonization, infections, risk factors, hematological patients Risk factors of Carbapenem-resistant Enterobacterales intestinal colonization for subsequent infections in hematological patients: a retrospective case-control study In multivariable logistic regression analysis, immunosuppressants [odds ratio (OR), 19.132; 95% confidence interval (CI), 1.349–271.420; P = 0.029] and serum albumin levels (OR, 0.817; 95% CI, 0.668–0.999; P = 0.049) were independent risk factors for developing infections. Conclusion: Our findings suggest that septic shock increases mortality in CRE- infected hematological patients. Hematological patients with CRE colonization using immunosuppressive agents and reduced serum albumin are more likely to progress to CRE infection. This study may help clinicians prevent the onset of infection early and take measures to reduce mortality rates. 1 Introduction University. This hospital has 3,889 beds, 90 of which belong to the hematology department. This study was approved by the Shandong Provincial Hospital Ethics Committee (NO. SWYX2023-610). University. This hospital has 3,889 beds, 90 of which belong to the hematology department. This study was approved by the Shandong Provincial Hospital Ethics Committee (NO. SWYX2023-610). Carbapenem-resistant Enterobacterales (CRE) infections pose a significant threat to global public health due to their high treatment costs, high mortality, and limited availability of effective therapeutic agents (Xu et al., 2017; European Centre for Disease Prevention and Control, 2018; Tacconelli et al., 2018; Brolund et al., 2019; Centers for Disease Control and Prevention, 2019). A report published in 2023 by the European Center for Disease Prevention and Control (ECDC) and the World Health Organization (WHO) revealed that the prevalence of carbapenem resistance in Klebsiella pneumoniae isolates rose by 0, 8, 31, and 20% between 2017 and 2021 (European Centre for Disease Prevention and Control and World Health Organization, 2023). Based on data from the China Antimicrobial Resistance Surveillance System (CARSS), the detection rate of carbapenem-resistant Klebsiella pneumoniae (CR-KPN) increased from 10.9% in 2020 to 11.3% in 2021, marking a rise from 6.4% in 2014. Additionally, the national average of Escherichia coli resistance to carbapenems remained at 1.6%, the same as in 2020 (China Antimicrobial Resistance Surveillance System, 2023). Patients with hematological disorders are at a higher risk of contracting CRE infections due to their compromised immune systems, low levels of neutrophils, extended hospital stays, undergoing hematopoietic stem cell transplantation, receiving chemotherapy, taking immunosuppressant medications, and frequent use of broad-spectrum antibiotics (Lalaoui et al., 2020; Cao et al., 2021). CRE rectal colonization was defined as a positive CRE stool screen and the absence of invasive infection. CRE rectal infection was defined as the presence of clinical signs and symptoms of infection and the detection of CRE in specimens taken from the site of infection. Infections such as bacteremia, pneumonia, urinary tract infections, and perianal infections are defined according to guidelines issued by Centers for Disease Control and Prevention (2023). Patients with CRE colonization who were hospitalized for <3 days and discharged without identifying the colonizing strain were excluded, and patients with positive rectal screening for CRE in the hematology department from April 2018 to April 2022 were further studied. KEYWORDS Carbapenem-resistant Enterobacterales, colonization, infections, risk factors, hematological patients Frontiers in Microbiology 01 frontiersin.org Wang et al. Wang et al. 10.3389/fmicb.2024.1355069 1 Introduction The case group consisted of patients colonized with CRE and subsequently developed CRE infections caused by the same strain (Figure 1). The control group comprised patients selected in a 3:1 ratio relative to the 11 patients in the case group. To enhance the comparability between the case and control groups, we employed frequency matching based on age and sex to mitigate the influence of confounding factors. First, we determined the proportions of age and sex in the case group. Then, we used statistical software to conduct a stratified random sample of colonized patients who did not develop subsequent infections. The control and case groups were compared using clinical data variables to examine the risk factors associated with subsequent CRE infection. We conducted a 30-day follow-up study on the patients, with death as the end event. The initial event for the control group was the detection of positive test results for CRE colonization samples, while the case group involved detecting positive test results for CRE infection samples. Subsequently, CRE-infected patients were further divided into survival and non-survival groups to analyze risk factors for 30-day mortality. Furthermore, a time-to-event study was conducted to evaluate the characteristics of CRE colonization and infection in CRE- infected patients. As a reservoir for secondary infections, intestinal colonization correlates significantly and independently with CRE infection (Gorrie et al., 2017; Cao et al., 2022). Multiple clinical studies have found that CRE colonization is associated with an increased risk of CRE infection and mortality in patients (Giannella et al., 2014; McConville et al., 2017; Lin et al., 2021; Gomides et al., 2022; Zhu et al., 2022). According to the guidelines from the ECDC, it is advisable to actively screen for CRE and apply effective infection prevention and control strategies to stop the spread of CRE (Magiorakos et al., 2017). Hence, promptly identifying the risk factors contributing to the transition from CRE colonization to subsequent infection will significantly decrease the incidence of CRE infections and mortality. 2.2 Data collection Fewer studies have been conducted regarding secondary CRE infections in hematological patients with intestinal colonization of CRE. Consequently, this study aimed to identify the factors that increase the likelihood of hematological patients with intestinal CRE colonization progressing to infection, as well as the factors that contribute to mortality in hematological patients already infected with CRE. It provides hematology clinicians with a reference for early identification of high-risk hospitalized patients, allowing them to implement timely preventative measures against CRE infection and mortality. Between April 2018 and April 2022, we obtained stool sample data from 1,390 individuals with hematological conditions. Of these, 131 patients had CRE colonization, and we examined their clinical data. Clinical data is obtained from the patient’s electronic medical record and encompasses various factors such as demographic characteristics (age and gender), length of hospitalization, hematological diseases (such as acute myeloid leukemia, acute lymphoblastic leukemia, multiple myeloma, myelodysplastic syndrome, lymphoma, etc.), comorbidities (such as diabetes, hypertension, chronic liver disease, gastrointestinal disease, graft vs. host disease, hemorrhagic cystitis, mucositis, pneumonia, diarrhea, and shock), previous invasive procedures (such as deep venous catheterization, urinary catheterization, hematopoietic stem cell transplantation), exposure to drugs (such as chemotherapy, glucocorticoids, non-steroidal immunosuppressants, proton pump inhibitors, carbapenems, cephalosporins, fluoroquinolones, aminoglycosides, glycopeptide, Frontiers in Microbiology 2.1 Study design This retrospective case-control study was conducted at the Shandong Provincial Hospital Affiliated to Shandong First Medical Frontiers in Microbiology 02 frontiersin.org Wang et al. 10.3389/fmicb.2024.1355069 FIGURE 1 Flowchart of the study design. penicillins, tigecycline), laboratory examinations (neutrophil count and serum albumin levels), CRE isolates (such as Escherichia coli, Klebsiella pneumoniae, Enterobacter cloacae, and others), and outcomes (mortality at 30 days). Furthermore, we collected in vitro susceptibility data, carbapenemase phenotypes (serine carbapenemase and metal β-lactamases), sensitive antibiotic treatments, and the timing of colonization and infection in patients infected with CRE. system determined antimicrobial susceptibility tests. Tigecycline susceptibility was determined using the US Food and Drugs Administration (FDA) interpretive criteria (US Food Drug and Administration, 2023). Colistin using the European Committee on Antimicrobial Susceptibility Testing (EUCAST) breakpoint (European Committee on Antimicrobial Susceptibility Testing, 2023), and the remaining susceptibility results were interpreted using the Clinical and Laboratory Standards Institute (CLSI) documentation standards (Clinical and Laboratory Standards Institute, 2022). The Modified Carbapenem Inactivation Method (mCIM) and Modified EDTA-Carbapenem Inactivation Method (eCIM) were employed to detect carbapenemase phenotypes (Pierce et al., 2017). 2.3 Microbiology Bacterial isolates for this study were identified using the Vitek 2 automatic system (bioMérieux, France). The stool samples were inoculated on MacConkey agar plates (ThermoFisher, USA), followed by carbapenem antimicrobial susceptibility testing using the disk diffusion method to confirm the presence of carbapenem-resistant Enterobacteriaceae (CRE). CRE refers to Enterobacterales that exhibit resistance to at least one carbapenem antibiotic, namely ertapenem, imipenem, or meropenem. The broth microdilution method or the Vitek 2 Frontiers in Microbiology frontiersin.org 3.1 Patient characteristics A total of 131 patients were identified as positive for CRE colonization in this study (131/1,390, 9.4%), and the colonization frequency has been seen to increase annually (Supplementary Figure 1). After applying the exclusion criteria, 116 patients with CRE colonization were selected for further study. Eleven patients with CRE colonization subsequently acquired CRE infection (11/116, 9.5%). A control group of 33 out of the 105 patients colonized with CRE but did not acquire subsequent infection was selected using stratified random sampling. This control group was included in the case-control research alongside the group of infected patients (Figure 1). There was a higher proportion of males than females in the case and control groups (both 63.6%). The age of the case group was 35.36 ± 13.44 years, and the age of the control group was 36.33 ± 12.78 years. Acute myeloid leukemia was the most prevalent hematological condition in the case group (5/11, 45.5%), with acute lymphoblastic leukemia being the second most common (4/11, 36.4%). The control group primarily comprised individuals with acute myeloid leukemia (15/33, 45.5%), lymphoma (9/33, 27.3%), and acute lymphoblastic leukemia (3/33, 9.1%). Furthermore, we analyzed the time characteristics of 11 CRE-infected patients from admission to colonization and subsequent infection. The median duration from admission to colonization was 3 days (2–23 days). Similarly, the median duration from colonization to infection was 4 days (2–11 days; Figure 2). overall increasing trend from year to year. Escherichia coli was the dominant strain among the colonizers in the hematology department each year (Figure 4). Based on the CLSI and FDA breakpoints, the infected group showed the greatest susceptibility to colistin (100%) among CRE, followed by tigecycline and amikacin (both 81.8%) and gentamicin (63.6%). 72.7% of CRE exhibited resistance to aztreonam, while 72.7% of CRE showed resistance or intermediate susceptibility to tobramycin. All CRE found in infected patients exhibited resistance to a wide range of antibiotics, including ampicillin, ampicillin-sulbactam, piperacillin-tazobactam, cefoperazone- sulbactam, cefazolin, cefuroxime, ceftazidime, ceftriaxone, cefepime, cefoxitin, cefotetan, ertapenem, imipenem, meropenem, ciprofloxacin, levofloxacin, and trimethoprim/sulfamethoxazole (Supplementary Table 1). In addition, the carbapenemase phenotypes of CRE-infected patients were characterized. Of these, seven strains produced metal β-lactamases (7/11, 63.6%), and four strains produced serine carbapenemases (4/11, 36.4%; Supplementary Table 2). 3.3 Analysis of risk factors for progression to CRE infection Table 1 displays the findings of the risk factor analysis for the progression from CRE colonization to CRE infection. No significant differences were observed between the case and control groups regarding the prevalence of hematological conditions, comorbidities, invasive operations, and CRE strains (all P > 0.05). The median duration of hospitalization in the case group was 29 days (21–47 days), significantly longer than the control group’s median duration of 11 days (6–26 days). Additionally, the mean albumin level in the case group was 28.11 ± 3.61 g/L, lower than the mean albumin level of 34.64 ± 6.92 g/L in the control group. In univariate analyses, variables associated with progression to infection included length of hospitalization, application of non-steroidal immunosuppressants, and serum albumin level. In 2.4 Statistical analysis All statistical analyses were performed using IBM SPSS Statistics version 25.0 software. We first applied the Shapiro- Wilk test for normality to the continuous variables. Continuous variables that were normally distributed with variance equivalence 03 frontiersin.org Wang et al. 10.3389/fmicb.2024.1355069 were denoted as mean ± standard deviation (SD) and analyzed using independent samples t-test. While continuous variables that were not normally distributed or had non-equivalent variances were denoted as median with interquartile ranges (IQR) and analyzed using the Mann-Whitney U-Test. Categorical variables were analyzed using the Pearson Chi-square test, Continuity correction test, or Fisher’s Exact Test. Variables with P < 0.05 in the univariate analysis were included in the logistic regression analysis after Collinearity diagnostics and Variance inflation factor (VIF) checks to exclude multicollinearity. Kaplan-Meier curves and the log-rank test for the CRE colonization group vs. the infection group performed survival analysis. All tests were two-tailed and P < 0.05 indicated statistical significance. FIGURE 2 Time characteristics of colonization and infection in 11 CRE-infected patients. The 11 CRE-infected patients are denoted as P01-P11. Frontiers in Microbiology 3.2 Microbiological characteristics Of the 44 CRE-colonized patients, 20 were colonized with Escherichia coli (20/44, 45.5%), 16 with Klebsiella pneumoniae (16/44, 36.4%), 6 with Enterobacter cloacae (6/44, 13.6%), and two with others (2/44, 4.5%). Escherichia coli was the most prevalent among patients with secondary CRE infections (5/11, 45.5%), followed by Klebsiella pneumoniae (4/11, 36.4%; Figure 3). Out of the 11 cases, 72.7% (8/11) were caused by infectious strains originating from bacteremia, while perianal infections, pneumonia, and urinary tract infections each accounted for 9% (1/11). In addition, we found that CRE colonization showed an 04 frontiersin.org Wang et al. 10.3389/fmicb.2024.1355069 FIGURE 3 Microbial characterization of CRE strains isolated from 44 CRE-colonized patients (A); Microbial characterization of CRE strains isolated from 11 CRE-infected patients (B). Escherichia coli was the most common strain for CRE colonization and infection, followed by Klebsiella pneumoniae. FIGURE 4 Trends of CRE colonization and infection in case-control studies, annual distribution of CRE-colonized strains. The annual trend of CRE colonization was upward, and the Escherichia coli counts were significantly diferent from the other strains. FIGURE 3 Microbial characterization of CRE strains isolated from 44 CRE-colonized patients (A); Microbial characterization of CRE strains isolated from 11 CRE-infected patients (B). Escherichia coli was the most common strain for CRE colonization and infection, followed by Klebsiella pneumoniae. FIGURE 3 Microbial characterization of CRE strains isolated from 44 CRE-colonized patients (A); Microbial characterization of CRE strains isolated from 11 CRE-infected patients (B). Escherichia coli was the most common strain for CRE colonization and infection, followed by Klebsiella pneumoniae. FIGURE 3 Microbial characterization of CRE strains isolated from 44 CRE-colonized patients (A); Microbial characterization of CRE strains iso CRE-infected patients (B). Escherichia coli was the most common strain for CRE colonization and infection, followed by Klebsiella FIGURE 4 Trends of CRE colonization and infection in case-control studies, annual distribution of CRE-colonized strains. The annual trend of CRE colonization was upward, and the Escherichia coli counts were significantly diferent from the other strains. FIGURE 4 Trends of CRE colonization and infection in case-control studies, annual distribution of CRE-colonized strains. The annual trend of CRE colonization was upward, and the Escherichia coli counts were significantly diferent from the other strains. FIGURE 4 Trends of CRE colonization and infection in case-control studies, annual distribution of CRE-colonized strains. The annual trend of CRE colonization was upward, and the Escherichia coli counts were significantly diferent from the other strains. 3.2 Microbiological characteristics and carbapenemase phenotypes (Supplementary Table 2). Four patients were treated with monotherapy (tigecycline, polymyxin, or aminoglycoside), whereas seven other patients were treated with combination therapy (all combined with tigecycline). Carbapenems were administered in combination to nine patients. Univariate analysis revealed that patients with CRE infection complicated by septic shock had a higher likelihood of mortality. Furthermore, no statistically significant distinction was observed between monotherapy and combination therapy. multivariate logistic regression analysis, immunosuppressants (OR, 19.132; 95% CI, 1.349–271.420; P = 0.029) and albumin level (OR, 0.817; 95% CI, 0.668–0.999; P = 0.049) were identified as independent risk factors. 3.4 Analysis of risk factors for 30-day mortality in CRE-infected patients A total of five patients in both the case and control groups died during the 30-day follow-up period (5/44, 11.4%). The case group’s mortality rate was significantly higher than the control group (36.5 vs. 3.0%, P = 0.0026; Figure 5). Within 30 days, four patients infected with CRE died of bacteremia. In order to determine mortality risk factors among hematological patients infected with CRE, we conducted a comparative analysis of the survival and non-survival groups using the same variables outlined in Table 1. Furthermore, we considered combined carbapenems, in vitro sensitive antibiotic treatment, Frontiers in Microbiology frontiersin.org 4 Discussion Controlling the spread of CRE has become a critical public health concern on a global scale, necessitating the implementation of infection prevention and control measures (Magiorakos et al., 2017; Zeng et al., 2023). Intensive Care Unit (ICU) admission and hematological malignancies are identified as risk factors associated with CRE infection (Tian et al., 2016; Chen et al., 2022; Zhang 05 frontiersin.org Wang et al. 10.3389/fmicb.2024.1355069 Univariate analysis and multivariate logistic regression analysis of risk factors for progression of CRE colonization to CRE infection TABLE 1 Univariate analysis and multivariate logistic regression analysis of risk factors for progression of CRE colonization to CRE infection. Characteristics Univariable analysis Multivariate analysis Case Control P-value OR (95% CI) P-value n = 11 (%) n = 33 (%) Sex-male 7 (63.6) 21 (63.6) Age (years), mean ± SD 35.36 ± 13.44 36.33 ± 12.78 Hospital stay (days), median (IQR) 29 (21.47) 11 (6.26) 0.004∗ 1.062 (0.996–1.132) 0.066 Hematological disease Acute myeloid leukemia 5 (45.5) 15 (45.5) 1.000 Acute lymphoblastic leukemia 4 (36.4) 3 (9.1) 0.096 Lymphoma 0 (0.0) 9 (27.3) 0.131 Myelodysplastic syndrome 1 (9.1) 2 (6.1) 1.000 Multiple myeloma 0 (0.0) 2 (6.1) 1.000 Others 1 (9.1) 2 (6.1) 1.000 Comorbidities Diabetes 1 (9.1) 2 (6.1) 1.000 Hypertension 0 (0.0) 3 (9.1) 0.561 Chronic liver disease 0 (0.0) 4 (12.1) 0.545 Gastrointestinal disease 3 (27.3) 5 (15.2) 0.652 GVHD 2 (18.2) 3 (9.1) 0.784 Hemorrhagic cystitis 1 (9.1) 3 (9.1) 1.000 Mucositis 7 (63.6) 10 (30.3) 0.108 Pneumonia 9 (81.8) 25 (75.8) 1.000 Diarrhea 5 (45.5) 6 (18.2) 0.159 Shock 0 (0.0) 1 (3.0) 1.000 Previous invasive procedures Deep venous catheterization 7 (63.6) 10 (30.3) 0.108 Urinary catheterization 1 (9.1) 1 (3.0) 0.442 HSCT 3 (27.3) 3 (9.1) 0.310 Exposure to drug Carbapenems (≤90 days) 10 (90.9) 23 (69.7) 0.315 Cephalosporins (≤90 days) 8 (72.7) 19 (57.6) 0.592 Fluoroquinolones (≤90 days) 3 (27.3) 13 (39.4) 0.717 Aminoglycosides (≤90 days) 2 (18.2) 9 (27.3) 0.841 Glycopeptides (≤90 days) 2 (18.2) 10 (30.3) 0.696 Penicillins (≤90 days) 2 (18.2) 10 (30.3) 0.696 Tigecycline (≤90 days) 5 (45.5) 9 (27.3) 0.455 Chemotherapy (≤30 days) 9 (81.8) 22 (66.7) 0.567 Glucocorticoids (≤30 days) 9 (81.8) 19 (57.6) 0.278 Non-steroidal immunosuppressants (≤30 days) 10 (90.9) 12 (36.4) 0.002∗ 19.132 (1.349–271.420) 0.029∗ PPIs (≤30 days) 6 (54.5) 21 (63.6) 0.858 (Continued) 06 Frontiers in Microbiology frontiersin.org Wang et al. 4 Discussion 10.3389/fmicb.2024.1355069 Characteristics Univariable analysis Multivariate analysis Case Control P-value OR (95% CI) P-value n = 11 (%) n = 33 (%) Laboratory examinations Neutrophils (×109/L), median (IQR) 0.56 (0.03, 3.03) 2.41 (0.93, 3.94) 0.080 Albumin (g/L), mean ± SD 28.11 ± 3.61 34.64 ± 6.92 0.005∗ 0.817 (0.668–0.999) 0.049∗ CRE isolates Escherichia coli 5 (45.5) 15 (45.5) 1.000 Klebsiella pneumoniae 4 (36.4) 12 (36.4) 1.000 Enterobacter cloacae 2 (18.2) 4 (12.1) 1.000 Other Enterobacterales 0 (0.0) 2 (6.1) 1.000 ∗Significant statistical difference (P < 0.05). P, test significance; OR, odds ratio; CI, confidence interval; SD, standard deviation; IQR, Interquartile range; GVHD, graft vs. host disease; HSCT, hematopoietic stem cell transplantation; PPIS, proton pump inhibitors. ∗Significant statistical difference (P < 0.05). Significant statistical difference (P < 0.05). P, test significance; OR, odds ratio; CI, confidence interval; SD, standard deviation; IQR, Interquartile range; GVHD, graft vs. host disease; HSCT, hematopoietic stem cell transplantation; PPIS, p t p p i hibit ence (P < 0.05). s ratio; CI, confidence interval; SD, standard deviation; IQR, Interquartile range; GVHD, graft vs. host disease; HSCT, hematopoietic stem cell transplantation; PPIS Significant statistical difference (P < 0.05). P, test significance; OR, odds ratio; CI, confidence interval; SD, standard deviation; IQR, Interquartile range; GVHD, graft vs. host disease; HSCT, hematopoietic stem cell transplantation; PPIS, proton pump inhibitors. factor in CRE infection, which does not occur in all patients with colonization (Gorrie et al., 2017; Qin et al., 2020). Only a limited number of studies have been conducted concerning the risk factors that contribute to CRE infection in patients with hematological diseases (Zhang et al., 2019). Our study aims to identify the risk variables associated with the progression from colonization to infection in hematological patients and the risk factors for mortality in infected patients. These could provide clinicians with recommendations for preventing and controlling CRE infections. FIGURE 5 Survival curves of the case and control groups. The 30-day mortality rate was considerably higher in CRE-infected patients than in CRE-colonized patients (36.5 vs. 3.0%, P = 0.0026). The two studies on hematological malignancies had CRE colonization rates of 6.56 and 10.3%, respectively (Zhu et al., 2022; Chen et al., 2023). The CRE colonization rate in studies conducted in the ICU ranged from 15.5 to 45.4% (McConville et al., 2017; Kontopoulou et al., 2019; Gomides et al., 2022). frontiersin.org Frontiers in Microbiology 4 Discussion Our findings indicate that individuals with clinically severe disease had a higher likelihood of being prescribed combination therapies. Furthermore, the sample size of patients receiving combination therapy is small. Therefore, the effect of combination therapy needs to be evaluated in randomized controlled trials. Chemotherapy, invasive operations, ICU admission, prolonged hospitalization, and exposure to carbapenem antibiotics are common risk factors for acquiring infections in patients with CRE colonization (Schechner et al., 2013; McConville et al., 2017; Collingwood et al., 2020; Chu et al., 2022; Chen et al., 2023). In our univariate analysis, prolonged hospitalization was identified as a risk factor for developing infections in patients harboring CRE colonization. Nevertheless, when doing multivariate analyses, the duration of hospitalization was not shown to be statistically significant. Instead, non- steroidal immunosuppressants and albumin levels were identified as independent risk factors for the progression of infections. This study has some limitations. First, the study was single- center, and the results may not be generalizable to other departments and regions. Second, the study was retrospective and could not determine that the deaths were caused entirely by the CRE, thus making it impossible to analyze the attributable mortality rates. Third, the small sample size of infection and bias in treatment selection had limited ability to analyze risk factors for death. Therefore, multicenter prospective studies are necessary to address these issues. While prior use of carbapenems was a common culprit, and chemotherapy as well as proton pump inhibitors (PPIs) have also been found to be associated with infections (Chen et al., 2023), our analysis of previous drug exposures showed that immunosuppressant use significantly increased the risk of infection in patients (OR, 19.132; 95% CI, 1.349– 271.420; p = 0.029). Moreover, a recent international matched case-control-control study found that immunosuppressive drugs in an inpatient population were risk factors for CRE infection (Perez-Galera et al., 2023). Many individuals with weakened immune systems due to hematological malignancies and hematopoietic stem cell transplants are admitted to hematology departments. These patients are regularly exposed to chemotherapy and immunosuppressive medications (Bar- Yoseph et al., 2019). Myelosuppression, an adverse effect, can be experienced with any immunosuppressive drug and may result in agranulocytosis, hence increasing vulnerability to infections (Fraiser et al., 1991; Lee et al., 2016; Toksvang et al., 2022). Furthermore, reducing albumin levels amplifies the susceptibility to infection in patients with CRE colonization (Rao et al., 2020; Liu et al., 2022; Qian et al., 2023). 4 Discussion administering immunosuppressive medicines and promptly address hypoalbuminemia in patients with CRE colonization to decrease CRE infections effectively. Wang et al.’s (2018) longitudinal large-scale CRE data revealed that the predominant strain of clinical CRE isolates was Klebsiella pneumoniae, which exhibited a yearly upward trend. Escherichia coli was the primary strain that colonized the hematology department of our hospital, both in terms of total colonization and colonization on an annual basis. The major strain of secondary CRE infection was Escherichia coli, followed by Klebsiella pneumoniae, consistent with a prior study conducted in the Department of Hematology (Zhang et al., 2019). The infected strains mainly produced metal β- lactamases, and the choice of antibiotics varied for different carbapenemases (Wang et al., 2018). KPC is a serine enzyme that hydrolyzes aztreonam but can be inhibited by the novel enzyme inhibitors avibactam and vebobactam, whereas NDM is a metalloenzyme that does not hydrolyze aztreonam but is not inhibited by avibactam and vebobactam. Hence, it is critical to identify the carbapenemase phenotype for subsequent antimicrobial treatment. In the present study, the 30-day mortality rate of patients with CRE infection was 36.4%, similar to that in studies on patients with hematological diseases (Liu et al., 2019; Zhang et al., 2019; Chen et al., 2023). The independent risk factor for death was septic shock, a variable that has been found to be associated with high mortality in several previously conducted studies (Tumbarello et al., 2012; Daikos et al., 2014; Chen et al., 2022, 2023). Septic shock is a sign of severe infection, and critically ill patients are more likely to die after the onset of the disease. Our study found that combination therapy did not reduce patient mortality, which is inconsistent with previous studies (Daikos et al., 2014; Tumbarello et al., 2015; Trecarichi et al., 2016; Chen et al., 2022). However, Paul et al. propose that patients infected with pathogens that exhibit limited susceptibility to antibiotics in vitro are more likely to be prescribed monotherapy. Conversely, patients infected with microorganisms more susceptible to in vitro susceptibility antibiotics are more likely to receive combination therapy. Patients with multiple antibiotic resistance may be more severely ill at baseline than patients with less antibiotic resistance. Consequently, the comparisons made between monotherapy and combination therapy may be influenced by selection bias (Paul et al., 2014). 4 Discussion The CRE colonization rate in this study was 9.4% (131/1390), similar to the studies on hematological malignancies and lower than the ICU colonization rate. A prospective study also suggests intestinal CRE colonization is more prevalent in the ICU, with widespread rapid spread (Chu et al., 2022). Furthermore, Cao et al. (2022) observed that the CRE colonization rate among recipients of allogeneic hematopoietic stem cell transplantation would be marginally elevated at 23.8%. The colonization rate exhibits variation within different departments and may be associated with pharmacological therapies, patient groups, and clinical settings. FIGURE 5 Survival curves of the case and control groups. The 30-day mortality rate was considerably higher in CRE-infected patients than in CRE-colonized patients (36.5 vs. 3.0%, P = 0.0026). et al., 2022). Multiple studies have investigated the factors that increase the risk of infection and mortality from CRE in patients with either ICU or hematological malignancies (McConville et al., 2017; Kontopoulou et al., 2019; Lin et al., 2021; Chen et al., 2023). The hematology department admits many immunocompromised patients with hematological disorders who are more vulnerable to CRE infections. Our study’s infection rate in patients with CRE colonization was 9.5% (11/116). In patients colonized with CRE, the prevalence of CRE infection varied between 9.1 and 86% (Borer et al., 2012; Schechner et al., 2013; Dickstein et al., 2016; Tischendorf et al., 2016; Gomides et al., 2022). Due to the different types of diseases and treatments administered to patients in each department, the results may be inconsistent; therefore, it is essential to examine hematology departments separately for CRE infection risk factors. Additionally, CRE colonization is a critical Our study also observed an overall trend of increasing CRE colonization in hematological patients throughout the years, aligning with the findings of a multicenter investigation (Fasciana et al., 2023). Nevertheless, the growth rate in 2020– 2022 is considerably diminished compared to 2018–2020. This can be ascribed to the proactive implementation of the national policy regarding the rational utilization of antimicrobial drugs in clinical practice and the enhanced surveillance of hospital infections by medical institutions in recent years (China Antimicrobial Resistance Surveillance System, 2023). Medical institutions must prioritize improving the appropriate utilization of antimicrobial drugs, minimizing the excessive use of broad-spectrum antimicrobial medicines like carbapenems, and Frontiers in Microbiology 07 frontiersin.org Wang et al. 10.3389/fmicb.2024.1355069 effectively implementing hospital infection control measures to contain the widespread transmission of drug-resistant bacteria. 5 Conclusion In summary, the results of our study suggest that careful use of non-steroidal immunosuppressive agents and prompt correction of reduced albumin levels in hematological patients with CRE colonization can help reduce the incidence of CRE infections. Septic shock leads to a significant increase in mortality in patients with CRE infection. These findings may help clinicians take appropriate precautions to reduce the incidence of CRE infections and decrease mortality in such patients. 4 Discussion Critically sick patients often exhibit hypoalbuminemia, which is characterized by a gradual depletion of vital protein components in the body due to inflammation caused by infection (McMillan et al., 2001). Hence, it is imperative to exercise caution in References China Antimicrobial Resistance Surveillance System (2023). Antimicrobial Resistance Surveillance in China 2023–2021 Data. Available online at: http://carss.cn/ Report/Details/862 (accessed June 15, 2023). Bar-Yoseph, H., Cohen, N., Korytny, A., Andrawus, E. R., Even Dar, R., Geffen, Y., et al. (2019). Risk factors for mortality among carbapenem-resistant Enterobacteriaceae carriers with focus on immunosuppression. J. Infect. 78, 101–105. doi: 10.1016/j.jinf.2018.10.003 Bar-Yoseph, H., Cohen, N., Korytny, A., Andrawus, E. R., Even Dar, R., Geffen, Y., et al. (2019). Risk factors for mortality among carbapenem-resistant Enterobacteriaceae carriers with focus on immunosuppression. J. Infect. 78, 101–105. doi: 10.1016/j.jinf.2018.10.003 Chu, W., Hang, X., Li, X., Ye, N., Tang, W., Zhang, Y., et al. (2022). Bloodstream infections in patients with rectal colonization by carbapenem-resistant Enterobacteriaceae: a prospective cohort study. Infect. Drug Resist. 15, 6051–6063. doi: 10.2147/IDR.S383688 Borer, A., Saidel-Odes, L., Eskira, S., Nativ, R., Riesenberg, K., Livshiz- Riven, I., et al. (2012). Risk factors for developing clinical infection with carbapenem-resistant Klebsiella pneumoniae in hospital patients initially only colonized with carbapenem-resistant K. pneumoniae. Am. J. Infect. Contr. 40, 421–425. doi: 10.1016/j.ajic.2011.05.022 Clinical and Laboratory Standards Institute (2022). M100-Performance Standards for Antimicrobial Susceptibility Testing, 32nd Edn. Malvern, PA: Clinical and Laboratory Standards Institute. Brolund, A., Lagerqvist, N., Byfors, S., Struelens, M. J., Monnet, D. L., Albiger, B., et al. (2019). Worsening epidemiological situation of carbapenemase-producing Enterobacteriaceae in Europe, assessment by national experts from 37 countries, July 2018. Eurosurveillance 24:1900123. doi: 10.2807/1560-7917.ES.2019.24.9.1900123 Collingwood, A., Blostein, F., Seekatz, A. M., Wobus, C. E., Woods, R. J., Foxman, B., et al. (2020). Epidemiological and microbiome associations between Klebsiella pneumoniae and vancomycin-resistant enterococcus colonization in intensive care unit patients. Open For. Infect. Dis. 7:ofaa012. doi: 10.1093/ofid/ofaa012 Cao, W., Guan, L., Li, X., Zhang, R., Li, L., Zhang, S., et al. (2021). Clinical analysis of bloodstream infections during agranulocytosis after allogeneic hematopoietic stem cell transplantation. Infect. Drug Resist. 14, 185–192. doi: 10.2147/IDR.S280869 Daikos, G. L., Tsaousi, S., Tzouvelekis, L. S., Anyfantis, I., Psichogiou, M., Argyropoulou, A., et al. (2014). Carbapenemase-producing Klebsiella pneumoniae bloodstream infections: lowering mortality by antibiotic combination schemes and the role of carbapenems. Antimicrob. Agents Chemother. 58, 2322–2328. doi: 10.1128/AAC.02166-13 Cao, W., Zhang, J., Bian, Z., Li, L., Zhang, S., Qin, Y., et al. (2022). Active screening of intestinal colonization of carbapenem-resistant Enterobacteriaceae for subsequent bloodstream infection in allogeneic hematopoietic stem cell transplantation. Infect. Drug Resist. 15, 5993–6006. doi: 10.2147/IDR.S387615 Dickstein, Y., Edelman, R., Dror, T., Hussein, K., Bar-Lavie, Y., and Paul, M. Funding The Supplementary Material for this article can be found online at: https://www.frontiersin.org/articles/10.3389/fmicb.2024. 1355069/full#supplementary-material The author(s) declare financial support was received for the research, authorship, and/or publication of this article. Data availability statement The original contributions presented in the study are included in the article/Supplementary material, further inquiries can be directed to the corresponding author. Frontiers in Microbiology 08 frontiersin.org Wang et al. Wang et al. 10.3389/fmicb.2024.1355069 10.3389/fmicb.2024.1355069 Ethics statement This study was funded by Shandong Provincial Natural Science Foundation (ZR2021MH214). The studies involving humans were approved by Biomedical Research Ethic Committee of Shandong Provincial Hospital. The studies were conducted in accordance with the local legislation and institutional requirements. The human samples used in this study were acquired from primarily isolated as part of your previous study for which ethical approval was obtained. Written informed consent for participation was not required from the participants or the participants’ legal guardians/next of kin in accordance with the national legislation and institutional requirements. Conflict of interest The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. Author contributions All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher. ZW: Writing – original draft, Software, Methodology, Investigation, Formal analysis, Data curation. CS: Writing – review & editing, Supervision, Resources. JS: Writing – review & editing, Supervision, Resources. YH: Writing – review & editing, Supervision, Resources. YJ: Resources, Writing – review & editing, Supervision, Funding acquisition, Conceptualization. References (2014). Risk factors for carbapenem-resistant Klebsiella pneumoniae bloodstream infection among rectal carriers: a prospective observational multicentre study. Clin. Microbiol. Infect. 20, 1357–1362. doi: 10.1111/1469-0691.12747 Schechner, V., Kotlovsky, T., Kazma, M., Mishali, H., Schwartz, D., Navon-Venezia, S., et al. (2013). Asymptomatic rectal carriage of blaKPC producing carbapenem- resistant Enterobacteriaceae: who is prone to become clinically infected? Clin. Microbiol. Infect. 19, 451–456. doi: 10.1111/j.1469-0691.2012.03888.x Gomides, M. D. A., Fontes, A. M. S., Silveira, A., Matoso, D. C., Ferreira, A. L., and Sadoyama, G. (2022). The importance of active surveillance of carbapenem- resistant Enterobacterales (CRE) in colonization rates in critically ill patients. PLoS ONE 17:e0262554. doi: 10.1371/journal.pone.0262554 Tacconelli, E., Carrara, E., Savoldi, A., Harbarth, S., Mendelson, M., Monnet, D. L., et al. (2018). Discovery, research, and development of new antibiotics: the WHO priority list of antibiotic-resistant bacteria and tuberculosis. Lancet Infect. Dis. 18, 318–327. doi: 10.1016/S1473-3099(17)30753-3 Gorrie, C. L., Mirˇceta, M., Wick, R. R., Edwards, D. J., Thomson, N. R., Strugnell, R. A., et al. (2017). Gastrointestinal carriage is a major reservoir of Klebsiella pneumoniae infection in intensive care patients. Clin. Infect. Dis. 65, 208–215. doi: 10.1093/cid/cix270 Tian, L., Tan, R., Chen, Y., Sun, J., Liu, J., Qu, H., et al. (2016). Epidemiology of Klebsiella pneumoniae bloodstream infections in a teaching hospital: factors related to the carbapenem resistance and patient mortality. Antimicrob. Resist. Infect. Contr. 5:145. doi: 10.1186/s13756-016-0145-0 Kontopoulou, K., Iosifidis, E., Antoniadou, E., Tasioudis, P., Petinaki, E., Malli, E., et al. (2019). The clinical significance of carbapenem-resistant Klebsiella pneumoniae rectal colonization in critically ill patients: from colonization to bloodstream infection. J. Med. Microbiol. 68, 326–335. doi: 10.1099/jmm.0.000921 Tischendorf, J., de Avila, R. A., and Safdar, N. (2016). Risk of infection following colonization with carbapenem-resistant Enterobactericeae: a systematic review. Am. J. Infect. Contr. 44, 539–543. doi: 10.1016/j.ajic.2015.12.005 Lalaoui, R., Javelle, E., Bakour, S., Ubeda, C., and Rolain, J. M. (2020). Infections due to carbapenem-resistant bacteria in patients with hematologic malignancies. Front. Microbiol. 11:1422. doi: 10.3389/fmicb.2020.01422 Toksvang, L. N., Lee, S. H. R., Yang, J. J., and Schmiegelow, K. (2022). Maintenance therapy for acute lymphoblastic leukemia: basic science and clinical translations. Leukemia 36, 1749–1758. doi: 10.1038/s41375-022-01591-4 Lee, J. Y., Kang, C. I., Ko, J. H., Lee, W. J., Seok, H. R., Park, G. E., et al. (2016). Clinical features and risk factors for development of breakthrough gram- negative bacteremia during carbapenem therapy. Antimicrobial. Agents Chemother. 60, 6673–6678. doi: 10.1128/AAC.00984-16 Trecarichi, E. References (2016). Carbapenem-resistant Enterobacteriaceae colonization and infection in critically ill patients: a retrospective matched cohort comparison with non-carriers. J. Hosp. Infect. 94, 54–59. doi: 10.1016/j.jhin.2016.05.018 Centers for Disease Control and Prevention (2019). Antibiotic Resistance Threats in the United States, 2019. Available online at: https://www.cdc.gov/drugresistance/ biggest-threats.html (accessed August 21, 2023). European Centre for Disease Prevention and Control (2018). Rapid Risk Assessment: Carbapenem-Resistant Enterobacteriaceae. Available online at: https://www.ecdc. europa.eu/en/publications-data/rapid-risk-assessment-carbapenem-resistant- enterobacteriaceae-first-update (accessed August 21, 2023). Centers for Disease Control and Prevention (2023). CDC/NHSN Surveillance Definitions for Specific Types of Infections. Available online at: https://stacks.cdc.gov/ view/cdc/127235 (accessed June 17, 2023). Chen, J., Ma, H., Huang, X., Cui, Y., Peng, W., Zhu, F., et al. (2022). Risk factors and mortality of carbapenem-resistant Klebsiella pneumoniae bloodstream infection in a tertiary-care hospital in China: an eight-year retrospective study. Antimicrob. Resist. Infect. Control 11:161. doi: 10.1186/s13756-022-01204-w European Centre for Disease Prevention and Control and World Health Organization (2023). Antimicrobial Resistance Surveillance in Europe 2023–2021 Data. Available online at: https://www.ecdc.europa.eu/en/publications-data/antimicrobial- resistance-surveillance-europe-2023-2021-data (accessed August 22, 2023). Chen, X., Wen, X., Jiang, Z., and Yan, Q. (2023). Prevalence and factors associated with carbapenem-resistant Enterobacterales (CRE) infection among hematological malignancies patients with CRE intestinal colonization. Ann. Clin. Microbiol. Antimicrob. 22:3. doi: 10.1186/s12941-023-00554-6 European Committee on Antimicrobial Susceptibility Testing (2023). Clinical Breakpoints and Dosing of Antibiotics. Available online at: http://www.eucast.org/ clinical_breakpoints/ (accessed February 20, 2023). Frontiers in Microbiology 09 frontiersin.org Wang et al. Wang et al. 10.3389/fmicb.2024.1355069 Fasciana, T., Antonelli, A., Bianco, G., Lombardo, D., Codda, G., Roscetto, E., et al. (2023). Multicenter study on the prevalence of colonization due to carbapenem- resistant Enterobacterales strains before and during the first year of COVID-19, Italy 2018-2020. Front. Public Health 11:1270924. doi: 10.3389/fpubh.2023.1270924 with carbapenem-resistant organisms bloodstream infection. Infect. Drug Resist. 16, 201–215. doi: 10.2147/IDR.S393932 Qin, X., Wu, S., Hao, M., Zhu, J., Ding, B., Yang, Y., et al. (2020). The colonization of carbapenem-resistant Klebsiella pneumoniae: epidemiology, resistance mechanisms, and risk factors in patients admitted to intensive care units in China. J. Infect. Dis. 221(Suppl.2), S206–S214. doi: 10.1093/infdis/jiz622 Fraiser, L. H., Kanekal, S., and Kehrer, J. P. (1991). Cyclophosphamide toxicity. Characterising and avoiding the problem. Drugs 42, 781–795. doi: 10.2165/00003495-199142050-00005 Rao, K., Seekatz, A., Bassis, C., Sun, Y., Mantlo, E., and Bachman, M. A. (2020). Enterobacterales infection after intestinal dominance in hospitalized patients. mSphere 5:20. doi: 10.1128/mSphere.00450-20 Giannella, M., Trecarichi, E. M., De Rosa, F. G., Del Bono, V., Bassetti, M., Lewis, R. E., et al. References M., Pagano, L., Martino, B., Candoni, A., Di Blasi, R., Nadali, G., et al. (2016). Bloodstream infections caused by Klebsiella pneumoniae in onco-hematological patients: clinical impact of carbapenem resistance in a multicentre prospective survey. Am. J. Hematol. 91, 1076–1081. doi: 10.1002/ajh.24489 Lin, Q., Wang, Y., Yu, J., Li, S., Zhang, Y., Wang, H., et al. (2021). Bacterial characteristics of carbapenem-resistant Enterobacteriaceae (CRE) colonized strains and their correlation with subsequent infection. BMC Infect. Dis. 21:638. doi: 10.1186/s12879-021-06315-0 Tumbarello, M., Trecarichi, E. M., De Rosa, F. G., Giannella, M., Giacobbe, D. R., Bassetti, M., et al. (2015). Infections caused by KPC-producing Klebsiella pneumoniae: differences in therapy and mortality in a multicentre study. J. Antimicrob. Chemother. 70, 2133–2143. doi: 10.1093/jac/dkv086 Liu, J., Wang, H., Huang, Z., Tao, X., Li, J., Hu, Y., et al. (2019). Risk factors and outcomes for carbapenem-resistant Klebsiella pneumoniae bacteremia in onco- hematological patients. J. Infect. Dev. Ctries 13, 357–364. doi: 10.3855/jidc.11189 Tumbarello, M., Viale, P., Viscoli, C., Trecarichi, E. M., Tumietto, F., Marchese, A., et al. (2012). Predictors of mortality in bloodstream infections caused by Klebsiella pneumoniae carbapenemase-producing K. pneumoniae: importance of combination therapy. Clin. Infect. Dis. 55, 943–950. doi: 10.1093/cid/c is,588 Liu, P., Mai, Y., Yuan, W., Xie, L., Ma, W., Liu, J., et al. (2022). Risk factors for mortality and antimicrobial regimens in pediatric intensive care unit patients with carbapenem-resistant Enterobacteriaceae infections: a six-year retrospective study. Infect. Drug Resist. 15, 7307–7316. doi: 10.2147/IDR.S394283 US Food and Drug Administration (2023). Tigecycline—Injection Products. Available online at: https://www.fda.gov/drugs/development-resources/tigecycline- injection-products (accessed February 15, 2023). Magiorakos, A. P., Burns, K., Rodríguez Baño, J., Borg, M., Daikos, G., Dumpis, U., et al. (2017). Infection prevention and control measures and tools for the prevention of entry of carbapenem-resistant Enterobacteriaceae into healthcare settings: guidance from the European Centre for Disease Prevention and Control. Antimicrob. Resist. Infect. Contr. 6:259. doi: 10.1186/s13756-017-0259-z Wang, Q., Wang, X., Wang, J., Ouyang, P., Jin, C., Wang, R., et al. (2018). Phenotypic and genotypic characterization of Carbapenem-resistant Enterobacteriaceae: data from a longitudinal large-scale CRE study in China (2012–2016). Clin. Infect. Dis. 67(Suppl.2), S196–S205. doi: 10.1093/cid/ciy660 McConville, T. H., Sullivan, S. B., Gomez-Simmonds, A., Whittier, S., and Uhlemann, A. C. (2017). Carbapenem-resistant Enterobacteriaceae colonization (CRE) and subsequent risk of infection and 90-day mortality in critically ill patients, an observational study. PLoS ONE 12:e0186195. doi: 10.1371/journal.pone.0186195 Xu, L., Sun, X., and Ma, X. (2017). References Systematic review and meta-analysis of mortality of patients infected with carbapenem-resistant Klebsiella pneumoniae. Ann. Clin. Microbiol. Antimicrob. 16:3. doi: 10.1186/s12941-017-0191-3 McMillan, D. C., Watson, W. S., O’Gorman, P., Preston, T., Scott, H. R., and McArdle, C. S. (2001). Albumin concentrations are primarily determined by the body cell mass and the systemic inflammatory response in cancer patients with weight loss. Nutr. Cancer 39, 210–213. doi: 10.1207/S15327914nc392_8 Zeng, M., Xia, J., Zong, Z., Shi, Y., Ni, Y., Hu, F., et al. (2023). Guidelines for the diagnosis, treatment, prevention and control of infections caused by carbapenem-resistant gram-negative bacilli. J. Microbiol. Immunol. Infect. 56, 653–671. doi: 10.1016/j.jmii.2023.01.017 Paul, M., Carmeli, Y., Durante-Mangoni, E., Mouton, J. W., Tacconelli, E., Theuretzbacher, U., et al. (2014). Combination therapy for carbapenem- resistant Gram-negative bacteria. J. Antimicrob. Chemother. 69, 2305–2309. doi: 10.1093/jac/dku168 Zhang, H., Hu, S., Xu, D., Shen, H., Jin, H., Yang, J., et al. (2022). Risk factors for carbapenem resistant gram negative bacteria (CR-GNB) carriage upon admission to the gastroenterology department in a tertiary first class hospital of China: development and assessment of a new predictive nomogram. Infect. Drug Resist. 15, 7761–7775. doi: 10.2147/IDR.S396596 Perez-Galera, S., Bravo-Ferrer, J. M., Paniagua, M., Kostyanev, T., de Kraker, M. E. A., Feifel, J., et al. (2023). Risk factors for infections caused by carbapenem-resistant Enterobacterales: an international matched case-control-control study (EURECA). EClinicalMedicine 57:101871. doi: 10.1016/j.eclinm.2023.101871 Zhang, L., Zhai, W., Lin, Q., Zhu, X., Xiao, Z., Yang, R., et al. (2019). Carbapenem- resistant Enterobacteriaceae in hematological patients: outcome of patients with Carbapenem-resistant Enterobacteriaceae infection and risk factors for progression to infection after rectal colonization. Int. J. Antimicrob. Agents 54, 527–529. doi: 10.1016/j.ijantimicag.2019.06.023 Pierce, V. M., Simner, P. J., Lonsway, D. R., Roe-Carpenter, D. E., Johnson, J. K., Brasso, W. B., et al. (2017). Modified carbapenem inactivation method for phenotypic detection of carbapenemase production among Enterobacteriaceae. J. Clin. Microbiol. 55, 2321–2333. doi: 10.1128/JCM.00193-17 Zhu, R., Xu, X., Lian, S., Cai, M., Zhang, H., Chen, X., et al. (2022). Intestinal colonization with Carbapenem-resistant Enterobacteriaceae in acute leukemia patients: risk factors and molecular characteristics. Infect. Drug Resist. 15, 4275–4283. doi: 10.2147/IDR.S376413 Qian, C., Wu, Q., Ruan, Z., Liu, F., Li, W., Shi, W., et al. (2023). A visualized mortality prediction score model in hematological malignancies patients 10 frontiersin.org Frontiers in Microbiology
https://openalex.org/W2883557846
http://www.revistas.usp.br/espinosanos/article/download/145925/141532
Portuguese
null
JOHN LOCKE E AS TEORIAS DO DIREITO DE RESISTÊNCIA DE MATRIZ LUTERANA
Cadernos Espinosanos/Cadernos espinosanos
2,018
cc-by
5,718
imagem Detalhe do retrato The Honourable Algernon Sidney gravado por J. Cochran em torno de 1800. Cadernos Espinosanos estudos sobre o século xvii 2018 n. 38 issn 1413-6651 jan-jun estudos sobre o século xvii 2018 n. 38 issn 1413-6651 jan-jun estudos sobre o século xvii imagem Detalhe do retrato The Honourable Algernon Sidney gravado por J. Cochran em torno de 1800. JOHN LOCKE E AS TEORIAS DO DIREITO DE RESISTÊNCIA DE MATRIZ LUTERANA Silvio Gabriel Serrano Nunes  Doutor em Filosofia, Universidade de São Paulo, São Paulo, Brasil serrano.nunes@gmail.com Silvio Gabriel Serrano Nunes  Doutor em Filosofia, Universidade de São Paulo, São Paulo, Brasil serrano.nunes@gmail.com resumo: Pretende-se abordar como os argumentos luteranos – de na- tureza constitucional das “magistraturas inferiores” e de direito privado – acerca do direito de resistência, desenvolvidos no final da década de 1520 e início de 1530, foram recepcionados no Segundo Tratado Sobre o Governo Civil, de John Locke, escrito no século xvii. O argumento de direito privado compreende que todo governante que abandona as boas ações e se dedica a cometer atos tirânicos se despoja de sua autoridade e, consequentemente, deve ser tratado como uma pessoa privada, por- tanto, sujeita ao lícito revide, o que configura uma espécie de legítima defesa. O argumento constitucional das “magistraturas inferiores” afirma a possibilidade de órgãos intermediários (agentes políticos como corpos legislativos e judiciais) entre o governante e o povo estarem legitimados para oferecer resistência às tiranias. Em John Locke, ambos os argumen- tos objetivam a solução do problema da tirania para se obter liberdade política e religiosa. palavras-chave: Direito de Resistência, Teorias Luteranas, Argumento Constitucional, Argumento de Direito Privado, John Locke. Silvio Gabriel Serrano Nunes p. 189 - 205 189 O presente texto objetiva abordar como os argumentos luteranos – de natureza constitucional das “magistraturas inferiores” e de direito privado – acerca do direito de resistência, desenvolvidos no final da dé- cada de 1520 e início de 1530, foram recepcionados no Segundo Tratado Sobre o Governo Civil, de John Locke, escrito no século xvii. O argumento de direito privado afirma que todo governante que abandona as boas ações e se dedica a cometer atos tirânicos perde sua condição de autoridade e deve ser tratado como uma pessoa privada, portanto, sujeita ao revide, o que configura uma espécie de legítima de- fesa. O argumento constitucional das “magistraturas inferiores” afirma a possibilidade de órgãos intermediários (agentes políticos como corpos legislativos e judiciais) entre o governante e o povo estarem legitimados para oferecer resistência às tiranias. Em John Locke, ambos os argumen- tos recepcionados têm como objetivo a solução do problema da tirania para se obter liberdade política. John Locke, em seu Segundo Tratado sobre o Governo Civil, no Ca- pítulo xiii, “Da subordinação dos poderes da sociedade política”, recep- cionando o argumento constitucional de origem luterana, descreve o legislativo como o poder supremo nos seguintes termos: Em todos os casos, enquanto subsistir o governo, o legislativo é o poder supremo. 90 Cadernos Espinosanos São Paulo n.38 jan-jun 2018 Silvio Gabriel Serrano Nunes  Doutor em Filosofia, Universidade de São Paulo, São Paulo, Brasil serrano.nunes@gmail.com Pois o que pode legislar para outrem deve por força ser-lhe superior; e como o legislativo o é tão somente pelo direito de elaborar leis para todas as partes e para cada membro da sociedade, prescreven- do regras para as suas ações e concedendo poder de execução onde quer que sejam transgredidas, deve por força ser o poder supremo, e todos os demais poderes depositados em quaisquer membros ou partes da sociedade devem derivar dele ou servir-lhe subordinados (locke, 2005, p. 519). No Capítulo xviii – “Da tirania” – deste clássico da filosofia polí- tica, Locke, após definir a tirania como o exercício do poder que exorbita o direito, bem como o uso do poder para benefício privado em detri- mento do interesse público, afirma que essa prática ensejaria conferir ao Cadernos Espinosanos São Paulo n.38 jan-jun 2018 190 tirano o tratamento não mais de uma autoridade constituída, mas de um particular merecedor de resposta imediata ao mal provocado: Onde termina a lei, começa a tirania, se a lei for transgredida para preju- ízo de outrem. E todo aquele que, investido de autoridade, exceda o poder que lhe é conferido por lei e faça uso da força que tem sob seu comando para impor ao súdito o que a lei não permite, deixa, com isso, de ser magistrado e, agindo sem autoridade, pode ser combatido, como qualquer outro homem que pela força invade o direito alheio. Tal é reconhecido nos magistrados subalternos. Aquele que tem auto- ridade para prender a minha pessoa na rua pode ser combatido como ladrão e assaltante, se tentar invadir-me a casa para executar um man- dato, não obstante eu saiba ter ele permissão e autoridade legal para prender-me fora de casa (locke, 2005, p. 563-564). Antes de aprofundar a análise da teoria do argumento constitu- cional das magistraturas inferiores, desenvolvida pelos luteranos no sé- culo xvi, considerando-se o clássico estudo de Richard Roy Benert, Inferior Magistrates in Sixteenth – Century Political and Legal Thought, con- vém destacar, no âmbito do pensamento político medieval, o esforço em se afirmar a legitimidade do combate às tiranias em nome de uma uni- versalidade ou corporação conferida genericamente a agentes da aristo- cracia, o que constituiu um precedente de grande importância para que os protestantes desenvolvessem seu pensamento de resistência. Para Benert (1967, p. 192 Cadernos Espinosanos São Paulo n.38 jan-jun 2018 Silvio Gabriel Serrano Nunes  Doutor em Filosofia, Universidade de São Paulo, São Paulo, Brasil serrano.nunes@gmail.com 80-81), a partir do século xii ocorreu um reavivamento do direito romano, sendo que a influência das ideias dos canonistas quanto ao conceito de corporação levou os autores medievais a formular que o povo constituía uma verdadeira universitas ou corpora- ção, apta a exercer sua autoridade política contra o supremo magistrado que a governasse, como um rei ou o imperador. Segundo vários autores medievais, uma corporação deveria agir como unidade e, no advento de uma tirania, combatê-la em nome do “povo como um todo” (benert, 1967, p. 81). Silvio Gabriel Serrano Nunes p. 189 - 205 191 Na Idade Média, o traço essencial da corporação não seria sim- plesmente “uma pluralidade de pessoas reunidas em um só corpo” num determinado momento, mas consistiria em algo mais complexo, pois essa pluralidade deve ser compreendida em sucessão no tempo e mediante a ação deste. Consequentemente, [...] seria errôneo considerar a universitas corporativista meramente como os simul cohabitantes, aqueles vivendo juntos no mesmo momen- to; pois, na linguagem de Tomás de Aquino, seriam semelhantes apenas no corpo físico humano, cujos os membros estavam presentes “todos de uma vez”, mas não constituíam o corpus mysticum genuíno, tal como Tomás de Aquino o definira. A pluralidade em sucessão, portanto, ou a pluralidade no tempo, era o fator essencial costurando a universitas na continuidade e tornando-a imortal (kantorowicz, 1998, p. 190). Em linhas gerais, E. H. Kantorowicz, em seu clássico estudo Os Dois Corpos do Rei, mostra que no período medieval já se manifestava a distinção entre o corpo físico do rei e o corpo político (um binômio razoavelmente análogo ao da pessoa de Cristo e seu corpo místico, a Igreja), o primeiro perecível e o segundo perene. A distinção entre um ente concreto e outro abstrato se manifestava visivelmente nos funerais dos reis, uma vez que os principais magistrados do reino, membros do corpo político, estavam dispensados de usar roupas de luto, de modo a atestar a continuidade do corpo político. Esses mesmos magistrados, cuja autoridade se associava mais ao corpo político do que ao próprio rei, passariam a ter legitimidade para o exercício do direito de resistência contra a tirania. Kantorowicz (1998, p. 193) explica que os jurisconsultos, ao inter- pretarem o povo como uma universitas “que nunca morre”, elaboraram conceitualmente a ideia de uma “perpetuidade tanto da totalidade do corpo político (cabeça e membros em conjunto) como de cada um dos membros constituintes”. Silvio Gabriel Serrano Nunes  Doutor em Filosofia, Universidade de São Paulo, São Paulo, Brasil serrano.nunes@gmail.com O princípio de resistência por parte de corpos representativos perenes das comunidades políticas encontrou várias formas de se expres- O princípio de resistência por parte de corpos representativos perenes das comunidades políticas encontrou várias formas de se expres- Cadernos Espinosanos São Paulo n.38 jan-jun 2018 sar na pena dos pensadores políticos medievais. A título de exemplo, São Tomás de Aquino afirma ser lícito à autoridade pública depor um tirano graças ao “direito da multidão”; Guilherme de Occam reconheceria em determinadas circunstâncias a superioridade do “reino”, de modo que lhe seria facultado depor o rei; Jean Gerson evoca a autoridade de Aristó- teles (A Política, Livro v) para alegar que “a comunidade como um todo” estaria apta a corrigir a situação e remover o tirano; Coluccio Salutati, versando sobre as repúblicas independentes, afirma que a resistência de- pende de um decreto do “povo”, que exerce a autoridade política, e, uma vez que toda punição criminal deveria decorrer de um ato público da autoridade da comunidade, desta mesma forma deveria se proceder para destronar os tiranos (benert, 1967, p. 81-82). Richard Roy Benert ainda explica que, apesar de desenvolverem habilmente o argumento da legitimidade da autoridade da comunidade para o exercício do direito de resistência, esses autores medievais “foram menos bem-sucedidos em identificar os instrumentos pelos quais a auto- ridade pública age [deveria agir]”. Em regra, faziam genéricas referências aos “tradicionais líderes aristocráticos que na ocasião agiam individual- mente contra o rei, mas a partir de então podiam clamar que agiam cor- porativamente pelo [bem do] reino como um todo” (benert, 1967, p. 82). Algumas vezes, esses pensadores chegavam a indicar os nobres que poderiam perpetrar a resistência, mencionando genericamente, porém, um grupo de “líderes naturais do reino”. A título exemplificativo, João de Paris apontava os “barões e pares do reino”; Egídio de Roma mencio- nava os “gentil-homens e grandes homens da nação”; Marsílio de Pádua, os homens que compunham os “valentior pars” que atuavam em nome de todo o povo; Nicolau de Cusa, no século xv, asseverava que o combate ao tirano era responsabilidade daqueles que governavam em nome de todo o império, como os “praesides” e “rectors” (benert, 1967, p. 83). Os autores medievais que interpretavam a lex regia da mesma for- ma que Hugolino e Azo tinham em mente que “a revogabilidade da au- toridade do imperador era uma garantia do povo romano”, cabendo-lhes Silvio Gabriel Serrano Nunes p. Cadernos Espinosanos São Paulo n.38 jan-jun 2018 Silvio Gabriel Serrano Nunes  Doutor em Filosofia, Universidade de São Paulo, São Paulo, Brasil serrano.nunes@gmail.com 189 - 205 193 então a tarefa de identificar a quem competiria revogar a autoridade do imperador, o que, segundo Benert, resultou em vagas menções, como no caso de Guilherme de Occam que, sem tecer maiores considerações, ape- nas alegou que o imperador poderia ser removido por “aqueles a quem os romanos conferissem tal poder”. Lupold von Bebenberg entendia que os agentes públicos aptos a destronar o imperador seriam “os eleitores [do Sacro Império Romano-Germânico, ou seja, o “povo romano” à época], príncipes, condes e barões do império” (benert, 1967, p. 83-84). Ainda segundo Richard Benert (1967, p. 84), indicava-se a no- breza como os agentes políticos competentes para a solução da tirania, numa concretização dos anseios da comunidade política sob seu jugo, tendo em vista a “ausência de instituições regulares do poder público” nesse contexto. Um exemplo prático e histórico das teorias que defendiam o empoderamento da nobreza data de 1464, a formação da Ligue du Bien Public contra Luís XI, composta por um apanhado aleatório de nobres franceses que justificavam sua atuação em nome do bem público (benert, 1967, p. 84-86). De acordo com Benert (1967, p. 85): [...] os huguenotes continuariam a operar sob essa combinação de re- sistência feudal e pública, porém alocariam muito maior ênfase na au- toridade pública pela qual os nobres atuavam, particularmente porque em geral viam os nobres como membros dos Estados-Gerais [abrindo a perspectiva de afirmação das prerrogativas do parlamento oponíveis aos reis], e não meramente indivíduos poderosos. Na Era Moderna, a Reforma Protestante se aproveitaria da tradi- ção medieval e contribuiria com contornos mais precisos para a teoria das magistraturas inferiores de afinidade constitucional. Quentin Skinner consigna que, em 1529, quando Carlos v convocou a Dieta Imperial (o parlamento do Sacro Império Romano-Germânico), foi imposta a obri- gação de se revogarem todas as concessões obtidas pelos luteranos até Cadernos Espinosanos São Paulo n.38 jan-jun 2018 194 então, tendo a maioria católica elaborado uma resolução determinando, mesmo que à força, a imediata entrada em vigor do Édito de Worms, que instituía a ilegalidade da “heresia” luterana. Silvio Gabriel Serrano Nunes  Doutor em Filosofia, Universidade de São Paulo, São Paulo, Brasil serrano.nunes@gmail.com O protesto formal dos luteranos diante desse contexto originou a expressão “protestantismo”, que passou a designar a fé dissidente de Roma na Europa Ocidental desde então, realizado “em nome de seis príncipes e catorze cidades, inspirados por João da Saxônia, Jorge de Bradenburgo -Ansbach e o jovem Filipe de Hesse, que nessa ocasião se destacou como o mais brilhante militante entre os príncipes luteranos” (skinner, 2000, p. 471), além de ter sido o principal articulador para a gênese da teoria das magistraturas inferiores. O Landegrave da região de Hesse abriu o debate com os juristas de sua corte sobre a licitude ou não de se efetivar a resistência ativa con- tra Carlos v. Concluíram pela licitude da resistência por meio de uma [...] engenhosa reafirmação da teoria feudal e particularista da consti- tuição imperial – com base na qual [...] os eleitores já haviam resistido ao imperador Wezel, depondo-o em 1400. Tal como a interpretavam os juristas de Hesse, essa leitura da constituição permitia-lhes desem- penhar duas tarefas ideológicas vitais: legitimava a ideia de resistência armada contra o imperador, porém ao mesmo tempo conseguia sus- tentar a tese luterana fundamental segundo a qual todas as autoridades constituídas são estabelecidas por Deus (skinner, 2000, p. 471). [...] engenhosa reafirmação da teoria feudal e particularista da consti- tuição imperial – com base na qual [...] os eleitores já haviam resistido ao imperador Wezel, depondo-o em 1400. Tal como a interpretavam os juristas de Hesse, essa leitura da constituição permitia-lhes desem- penhar duas tarefas ideológicas vitais: legitimava a ideia de resistência armada contra o imperador, porém ao mesmo tempo conseguia sus- tentar a tese luterana fundamental segundo a qual todas as autoridades constituídas são estabelecidas por Deus (skinner, 2000, p. 471). Ainda que Skinner não especifique o documento considerado como Constituição Imperial, assim como também não o fez Gottfried G. Krodel – cuja introdução à Carta de Lutero ao Eleitor João da Saxô- nia, de 24 de Dezembro de 1529, muito contribuiu para explicar a gênese da teoria das magistraturas inferiores entre os protestantes -, entendemos com base em Política Metodicamente Apresentada e Ilustrada com Exemplos Sagrados e Profanos, de Johannes Althusius (2003, p. 231), que a referida Constituição Imperial é o Áureo Édito do Imperador Carlos IV, institu- ído em 1356, que estabeleceu as regras para as eleições e coroações dos Silvio Gabriel Serrano Nunes p. Cadernos Espinosanos São Paulo n.38 jan-jun 2018 Silvio Gabriel Serrano Nunes  Doutor em Filosofia, Universidade de São Paulo, São Paulo, Brasil serrano.nunes@gmail.com 189 - 205 195 imperadores do Sacro Império Romano-Germânico, bem como as obri- gações e prerrogativas dos eleitores (althusius, 2003, p. 231). Filipe de Hesse, em cartas ao Eleitor da Saxônia e ao Margrave de Bradenburgo-Anbach, escritas em Dezembro de 1529, afirma que a cor- reta exegese da exortação de Paulo no capítulo 13 da Carta aos Romanos seria a de que o apóstolo se referia a todos os soberanos territoriais que exercem jurisdição sobre um império ou reino. Afirma também que os poderes foram ordenados com a finalidade de “desempenhar uma deter- minada função, na qual se inclui o dever de observar algumas obrigações legais mútuas, bem como o de garantir o bem-estar e a salvação de seus próprios súditos” (skinner, 2000, p. 471-472). Segundo Krodel, essa correspondência mostra o esforço do Lan- degrave Filipe de circunscrever a possível aplicação da exortação de Paulo aos Romanos (Capítulo 13) à situação de perigo para a causa protestan- te alemã, enfatizando que os soberanos dos territórios dos principados alemães “eram as autoridades governamentais de que Paulo falava nesse capítulo, e que o imperador era somente primus inter pares com base em pactos [tratados] com os soberanos, um arranjo contratual que o impera- dor quebraria agora ao fazer a guerra contra os protestantes em razão de sua fé” (lutero, 1972, p. 254). Em outras palavras, para Filipe de Hesse, a relação político-jurídi- ca entre o imperador e os demais príncipes não poderia ser reconhecida no binômio governante-governado, implicava antes uma relação alheia a essa lógica de subordinação, com competências coordenadas entre au- toridades detentoras de imperium em seus respectivos domínios e que, como tais, podiam em plena licitude se opor aos rompimentos de tra- tados firmados com autoridades também soberanas como o imperador. Skinner (2000, p. 472) entende perseverar nesse contexto a ótica de que “se o imperador ultrapassar os limites de seu cargo perseguindo o Evangelho ou tratando com violência qualquer um dos príncipes, estará violando as obrigações a ele impostas por ocasião de sua eleição, sendo, portanto, legítimo combatê-lo”. Cadernos Espinosanos São Paulo n.38 jan-jun 2018 196 Acerca do conteúdo da correspondência de Hesse, o Eleitor da Saxônia acionou Lutero para se manifestar sobre suas teses, que entendeu ilegítimo o direito de resistência. Silvio Gabriel Serrano Nunes  Doutor em Filosofia, Universidade de São Paulo, São Paulo, Brasil serrano.nunes@gmail.com Em carta ao Eleitor da Saxônia, de 1529, Lutero assevera que, mesmo que a intenção do imperador fosse proceder contra o Evangelho com força militar sem ouvir o partido protestante e sem um concílio geral, a ninguém seria dado o direito de colocar as tropas no campo de batalha, por três razões. A primeira: naquele momento de dificuldade os protestantes de- veriam enviar uma resposta humilde ao imperador, uma vez que a Es- critura em 1 Pedro 2:17 é categórica quanto ao dever de submissão à autoridade suprema constituída: “Honrai a todos, amai os irmãos, temei a Deus, tributai honra ao rei”. A segunda razão consistia em que mesmo sendo a atitude do imperador injusta e também contra a lei natural, “trazer as tropas para o campo de batalha e desferir a resistência deveriam ser evitados, a não ser que existisse violência iminente ou um constrangimento inevitável. Esse movimento precipitado para a guerra e essa determinação para resistir não devem ser considerados legítima defesa, mas um desafio e um ato de insolência contra quem ainda está em posição de calmaria e não agiu [contra os protestantes]” (lutero, 1972, p. 257-258). Lutero, nutrindo a esperança de que a providência divina se ma- nifestasse e resolvesse a situação, argumenta que mesmo se sua majestade imperial expedisse mandados contra os príncipes eleitores, ou mesmo se esses mandados já tivessem sido expedidos, isso ainda não significaria uma proibição aos protestantes sob a tutela dos príncipes que aderiram à Reforma de professarem a sua fé. Afirma ser censurável a resistên- cia mesmo se hipoteticamente o imperador fosse considerado um igual aos demais dirigentes. Em suas palavras, “durante esse tempo muita água pode rolar rio abaixo, e Deus pode facilmente encontrar muitos meios em direção à paz e talvez estabeleça a paz [...]. Por conseguinte, em busca da acima mencionada paz, ninguém pode começar a guerra ou trazer as Silvio Gabriel Serrano Nunes p. 189 - 205 197 tropas ao campo de batalha, mesmo se o imperador fosse um soberano em pé de igualdade [com os eleitores]” (lutero, 1972, p. 258). Alocando o imperador no topo da organização político-adminis- trativa do império, Lutero enfatiza o dever de negar a tese constitucio- nalista elaborada por Filipe de Hesse e seus juristas, afirmando que “o imperador, claramente, é o senhor e governador superior desses sobera- nos. Cadernos Espinosanos São Paulo n.38 jan-jun 2018 Silvio Gabriel Serrano Nunes  Doutor em Filosofia, Universidade de São Paulo, São Paulo, Brasil serrano.nunes@gmail.com De fato, nenhum desses senhores gostaria de ter seus próprios sú- ditos colocados em tal condição precipitada de resistência a ele próprio, como nesse caso seria feito contra o imperador; então toda a questão seria realmente uma rebelião e desobediência” (lutero, 1972, p. 259). Para Gottfried G. Krodel (lutero, 1972, p. 259), a posição de Lu- tero contra o argumento constitucional legitimador do direito de resis- tência pode ser vista como uma possível falha de sua compreensão sobre essa teoria: “é uma questão em aberto o quão claramente Lutero aqui entendeu a base constitucional do cargo imperial e a administração de fato [os feitos concretos] dessa função em seu tempo”, quando Carlos v governava. Por fim, Lutero levanta um terceiro argumento contrário à resis- tência armada: ela representaria uma injustiça, uma vez que fatalmente se atacariam outros soberanos católicos e as respectivas populações civis dos principados que não aderiram à Reforma e que fossem aliados do imperador. Além disso, teria chegado a Lutero a informação de que o im- perador formalmente declarara estar empenhado pela paz com os estados do império e, “consequentemente, se apesar disso, [...] [os protestantes atacassem o imperador preventivamente] então Deus e o mundo se tor- nariam imensamente furiosos e com toda justiça seríamos condenados. Eles poderiam então com toda justiça e excelentes argumentos apresen- tarem todas essas questões como prova de sua inocência, e nos cobrir de desgraça e vergonha” (lutero, 1972, p. 260). Apesar do tom de extrema cautela de Lutero, em 1530 os proble- mas se agravariam ainda mais para os protestantes, depois da Dieta em que Carlos V mandou refutar as teses teológicas apresentadas por Melan- 198 chton na Confissão de Augsburgo, que inclusive aspirava a uma concórdia com os católicos. A maioria católica presente na Dieta impôs o dever de todo herege luterano retornar à unidade cristã até a Páscoa subsequente, além disso, as pregações de conteúdo luterano foram suspensas em todo o império. Como se não bastasse o rigor dessas medidas, ao fim desta Dieta orquestrou-se “entre os príncipes católicos a formação de uma liga de defesa do império, medida que deliberadamente impunha uma ameaça militar direta aos protestantes” (skinner, 2000, p. 473). Silvio Gabriel Serrano Nunes  Doutor em Filosofia, Universidade de São Paulo, São Paulo, Brasil serrano.nunes@gmail.com Diante dessa realidade, que certamente evoluiria para um prog- nóstico desolador face aos ataques que sofria a causa protestante na Ale- manha, em outubro de 1530, Filipe de Hesse escreveu a Lutero e também a João da Saxônia e seu chanceler Gregory Brück, “exortando-os a acei- tar seu plano para uma aliança protestante e pedindo-lhes que aceitassem seu pressuposto de que na verdade era possível justificar a resistência armada ao imperador” (skinner, 2000, p. 473). João da Saxônia se sensibiliza com a crise enfrentada pela causa de sua nova crença e decide consultar seu chanceler Brück e os demais juristas de sua corte acerca da viabilidade e licitude ou não das ideias apresentadas pelo governante da região de Hesse. Apesar de Brück e os juristas inicialmente se inclinarem a acei- tar a “interpretação federalista da constituição imperial” manifestada por Hesse, optaram pelo fundamento privado do direito de resistência e, no final de outubro de 1530, entregaram ao eleitor da Saxônia uma súmula jurídica com a resposta requerida acerca da licitude ou não do exercício do direito de resistência. O documento intitulado Se é Justo Defender-se de um Juiz que Pro- ceda Injustamente, Iudici Procedenti Iniuste an Licitum Sit Resistire, apresenta o argumento de resistência ativa com lastro no direito privado, segundo o qual, em certos contextos, “o uso da violência não constitui necessa- riamente uma injúria”, recuperando teses já desenvolvidas por civilistas e canonistas na Idade Média nas quais se declara “ser justificável repelir com a força a força injusta” (skinner, 2000, p. 473-474). Silvio Gabriel Serrano Nunes p. 189 - 205 199 Revisitando canonistas como Panormitanus, cuja tese sustentava a plena licitude de resistir a um juiz injusto – que nessas circunstâncias passaria a ser considerado um indivíduo privado , válida por extensão ao imperador, posto “que o estatuto do imperador era com efeito o de um juiz”, Brück transpunha as lições daqueles (algo que dificilmente um católico poderia contestar) para o contexto da lide entre os protestantes e Carlos v. Cadernos Espinosanos São Paulo n.38 jan-jun 2018 Silvio Gabriel Serrano Nunes  Doutor em Filosofia, Universidade de São Paulo, São Paulo, Brasil serrano.nunes@gmail.com Em sua súmula, Brück expõe três possíveis circunstâncias que va- lidam a resistência ativa lícita, inclusive por meio da violência, contra um juiz (agente político comparável ao imperador nesse documento) injusto quando ocorre uma apelação: “quando o juiz procede fora de sua jurisdição; [...] quando o dano é irreparável ou notório; [...] se o juiz age de acordo com sua jurisdição, porém, injustamente, e se o dano for irreparável” (heins, 1969, p. 64). Diante dessas premissas, a súmula menciona que “os príncipes e as cidades apelaram a César (imperador) e a um Concílio; então [estaria] suspensa a jurisdição” do imperador e seu caráter de exclusividade sobre a questão (heins, 1969, p. 64). Brück também alegava ser um completo despropósito a obedi- ência ao imperador nessas circunstâncias, uma vez que “obedecer ordens do imperador [em seus] éditos ou [em] seus mandatos contra a Palavra [de Deus] é um dano irreparável. É mais útil, nas causas da fé, obedecer a Deus e às verdades do Evangelho do que ao homem” (heins, 1969, p. 64). Em reforço ao dever de desobedecer ao imperador quando aten- tasse contra os ditames do Evangelho, é relembrada a tese luterana sobre a noção de tirania, na qual se conceitua o tirano como um governante que excede os limites de seu poder (ultra vires), ao disciplinar o conteúdo da fé verdadeira: “Além disso, o imperador, em questão de fé, não tem ne- nhuma jurisdição. Pode, com negligência, convocar um Concílio Papal, mas nada nele pode estatuir” (heins, 1969, p. 65). A título de conclusão, a súmula explicita as atitudes do imperador que afligiam os luteranos depois da Dieta de 1530, comparáveis apenas às Cadernos Espinosanos São Paulo n.38 jan-jun 2018 200 de um juiz que age injustamente, razão pela qual deveria ser considera- do uma pessoa privada, despojado de autoridade pública, passível de ser objeto do lícito exercício do direito de resistência eventualmente perpe- trado pelos protestantes (heins, 1969, p. 66). Para alguns comentadores (skinner, 2000; bowman, 1997), a re- sistência ao soberano considerado indivíduo privado e despojado da au- toridade pública deve ser exercida por um agente competente, ou seja, investido da vocação para tanto, o que exclui o povo em geral e autoriza os magistrados inferiores, conclusão oriunda da combinação lógica entre os dois argumentos de resistência de matriz luterana. Silvio Gabriel Serrano Nunes  Doutor em Filosofia, Universidade de São Paulo, São Paulo, Brasil serrano.nunes@gmail.com Exemplo notório da combinação entre tais argumentos em um mesmo texto de matriz luterana acerca do problema da resistência é a Confissão de Magdeburgo (skinner, 2000, p. 493). Quanto ao dever de respeitar a vocação daquele que exerce o direito de resistência, salienta que, no âmbito do pensamento político lu- terano, haveria sempre um rechaço à participação popular simples e pura sem a colaboração e comando dos magistrados inferiores: Tanto a lei divina quanto a constitucional eram invocadas para apoiar o princípio de que a resistência era proibida para os cidadãos privados; desse modo se aquietavam os medos de que os súditos dos príncipes pudessem fazer o uso desses argumentos para justificar uma rebelião contra eles também. Deus não concedeu a espada para o indivíduo privado mas somente para os magistrados [...]. Indivíduos que não possuíssem um cargo público deviam obedecer às autoridades dentro de seus estados e juntarem-se na batalha contra o imperador somente por meio do comando de seus superiores locais (bowman, 1977, p. 75). O próprio Lutero sempre manteve postura e argumentação, em regra, refratárias ao direito de resistência ativa. O máximo que se apre- senta em sua biografia, em termos mais permissivos quanto ao direito de resistência ativa, consiste em uma capitulação autorizadora do direito de resistência no palácio de Torgau, nos fins de outubro de 1530, um escrito que foi redigido de próprio punho pelo reformador e assinado também Silvio Gabriel Serrano Nunes p. 189 - 205 201 por outras lideranças luteranas. Segundo Pierre Mesnard, as circunstân- cias vividas pelo movimento reformador alemão, nesse momento, teriam extorquido tal declaração de Lutero (mesnard, 1977, p. 228). Entre os dias 25 e 28 de outubro de 1527, os teólogos de Win- tenberg, liderados por Lutero, e os conselheiros e juristas do Eleitor da Saxônia, liderados por Brück, encontraram-se em Torgau para uma con- ferência. Os juristas apresentaram trechos de seus estudos sobre o direito de resistência, que levaram Lutero a capitular nos seguintes termos: Um pedaço de papel foi-nos apresentado no qual vemos o que os Doutores da Lei têm concluído sobre a questão: Em quais situações se pode resistir à autoridade governante? Silvio Gabriel Serrano Nunes  Doutor em Filosofia, Universidade de São Paulo, São Paulo, Brasil serrano.nunes@gmail.com Se, então, [essa questão] tem sido colocada por esses Doutores da Lei ou especialistas nesse assunto, e [uma vez que] nós certamente estamos naquelas situações em que (como [os especialistas legais] demonstram) pode-se resistir à autori- dade governante, e [como] nós temos sempre ensinado que na medida em que o evangelho não contraria a lei secular e leva a lei secular a ser efetiva, válida e competente [naqueles problemas em que ela é apta a lidar], nós então somos incapazes de nos opor [a qualquer um com argumentos extraídos da] Escritura, se nessa instância é necessário lu- tar, mesmo se o próprio imperador [nos atacar], ou outro alguém que também o faça em seu nome. Além disso, agora em todo lugar há o perigo de que em algum dia outros incidentes possam ocorrer, como um resultado de que alguém tenha que se defender sozinho imediatamente, não apenas por causa da lei secular, mas também em razão do dever e da angústia da cons- ciência. Portanto, é também apropriado armar-se e estar pronto para opor-se à força que pode repentinamente se levantar, como pode fa- cilmente ocorrer, julgando a partir do padrão presente e do curso dos eventos (lutero, 1972, p. 431-432). Apesar da declaração acima, Lutero não perde por completo o tom de conservadorismo e fidelidade às instituições políticas de seu tempo e reafirma a coerência de seu pensamento político, uma vez que Cadernos Espinosanos São Paulo n.38 jan-jun 2018 202 a legitimidade dessa ação constitui uma transferência da sacralidade do dever de obediência ao qual os magistrados seculares são revestidos para a lei civil: De modo que, até agora, nós temos ensinado absolutamente a não re- sistir à autoridade governante; isto era devido ao fato de que nós não sabíamos que a própria lei da autoridade governante garante [o direito de resistência armada]; nós temos, claro, de forma diligente, ensinado que [essa lei] deve ser obedecida (lutero, 1972, p. 431-432). Compreendemos tais passagens mais como uma atitude polí- tica de Lutero do que propriamente uma elaboração teórica componen- te do conjunto de sua obra, o que permite afirmar ser quase nulo o grau de adesão ao direito de resistência ao longo do projeto reformador do teólogo de Wittenberg, que não envolvia apenas elucubrações teóricas, mas também atitudes políticas. Silvio Gabriel Serrano Nunes  Doutor em Filosofia, Universidade de São Paulo, São Paulo, Brasil serrano.nunes@gmail.com Pelo exposto, podemos com clareza notar na filosofia política de John Locke traços do pensamento político de resistência de matriz lu- terana em suas duas vertentes: o argumento constitucional de resistência, que legitima a atuação do parlamento com prerrogativas de supremacia em relação ao monarca, e o argumento de direito privado, que autoriza considerar uma autoridade pública que se tornou um tirano como um particular e, portanto, passível de uma resposta pronta e justa à agressão que pratica. Silvio Gabriel Serrano Nunes p. 189 - 205 203 john locke and the theories of the right OF RESISTANCE OF LUTHERAN MATRIX abstract: This work aims to address how the Lutheran arguments – the constitutional argument of the “inferior magistracies” and the pri- vate law argument – about the right of resistance, developed in the late 1520s and early 1530s, were received in John Locke’s Second Treatise of Civil Government, written in the 17th century. The private law argument understands that every ruler who give up doing good actions in order to commit tyrannical acts, renounces his authority and, consequently, must be treated as a private person, therefore, subject to licit retaliation, which constitutes a kind of self-defence. The constitutional argument of the “inferior magistracies” asserts the possibility that intermediate organs (political agents such as legislative and judicial bodies) between the rul- er and the people are legitimated to resist tyranny. In John Locke, both arguments are aimed to solve the problem of tyranny in order to obtain political and religious freedom. keywords: Right of Resistance, Lutheran Theories, Constitutional Argu- ment, Private Law Argument, John Locke. Silvio Gabriel Serrano Nunes p. 189 - 205 205 referências bibliográficas: althusius, j. (2003). Política Metodicamente Apresentada e Ilustrada com Exemplos Sagrados e Profanos. Rio de Janeiro: Topbooks. althusius, j. (2003). Política Metodicamente Apresentada e Ilustrada com Exemplos Sagrados e Profanos. Rio de Janeiro: Topbooks. benert, r. r. (1967). Inferior Magistrates in Sixteenth-Century Political and Legal Thought. Minnesota. 388f. Thesis (PhD Philosophy). University of Minnesota. benert, r. r. (1967). Inferior Magistrates in Sixteenth-Century Political and Legal Thought. Minnesota. 388f. Thesis (PhD Philosophy). University of Minnesota. lia de jerusalém. (2006). São Paulo: Paulus. bíblia de jerusalém. (2006). São Paulo: Paulus. bowman, c. g. (1977). The development of the Lutheran Theory of Re- 04 Cadernos Espinosanos São Paulo n.38 jan-jun 2018 204 sistance: 1523-1530. The Sixteenth Century Journal, Kirksville, v. VIII, n. 1, p. 61-76, April/1977. heins, s. (1969). Das Widerstandrecht als Problem der deutschen Protestanten, 1523-1546. Gütersloh: Gütersloher Verlagshaus Gerd Mohn. kantorowicz, e. h. (1998). Os Dois Corpos do Rei. São Paulo: Companhia das Letras. locke, j. (2005). Dois Tratados Sobre o Governo. São Paulo: Martins Fontes. lutero. (1972). Luther’s Works - Letters II. v. 49. Philadelphia: Fortress Press. mesnard, p. (1977). L´essor de la Philosophie Politique au XVI Siècle. Paris: Libraire Philosophique J. Vrin. skinner, q. (2000). As Fundações do Pensamento Político Moderno. São Pau- lo: Companhia das Letras. Silvio Gabriel Serrano Nunes p. 189 - 205 205
https://openalex.org/W3047571307
https://discovery.dundee.ac.uk/ws/files/55039647/annurev_cellbio_100818_125512.pdf
English
null
Parkinson's: A Disease of Aberrant Vesicle Trafficking
Annual review of cell and developmental biology
2,020
cc-by
21,553
Parkinson’s Citation for published version (APA): Singh, P. K., & Muqit, M. M. K. (2020). Parkinson’s: A Disease of Aberrant Vesicle Trafficking. Annual Review of Cell and Developmental Biology, 36, 237-264. https://doi.org/10.1146/annurev-cellbio-100818-125512 Citation for published version (APA): Singh, P. K., & Muqit, M. M. K. (2020). Parkinson’s: A Disease of Aberrant Vesicle Trafficking. Annual Review of Cell and Developmental Biology, 36, 237-264. https://doi.org/10.1146/annurev-cellbio-100818-125512 General rights Copyright and moral rights for the publications made accessible in Discovery Research Portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Citation for published version (APA): Singh, P. K., & Muqit, M. M. K. (2020). Parkinson’s: A Disease of Aberrant Vesicle Trafficking. Annual Review of Cell and Developmental Biology, 36, 237-264. https://doi.org/10.1146/annurev-cellbio-100818-125512 University of Dundee Parkinson’s Singh, Pawan Kishor; Muqit, Miratul M. K. Published in: Annual Review of Cell and Developmental Biology DOI: 10.1146/annurev-cellbio-100818-125512 Publication date: 2020 Licence: CC BY Document Version Publisher's PDF, also known as Version of record Link to publication in Discovery Research Portal Citation for published version (APA): Singh, P. K., & Muqit, M. M. K. (2020). Parkinson’s: A Cell and Developmental Biology, 36, 237-264. https:// General rights i h d Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 24. Oct. 2024 Download date: 24. Oct. 2024 Download date: 24. Oct. 2024 Parkinson’s disease, α-synuclein, LRRK2, PINK1, Parkin, Rab, SNARE, exosome, vesicle trafficking, mitophagy Parkinson’s disease, α-synuclein, LRRK2, PINK1, Parkin, Rab, SNARE, exosome, vesicle trafficking, mitophagy The Annual Review of Cell and Developmental Biology is online at cellbio.annualreviews.org Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Annu. Rev. Cell Dev. Biol. 2020. 36:237–64 Annu. Rev. Cell Dev. Biol. 2020. 36:237–64 Annu. Rev. Cell Dev. Biol. 2020. 36:237–64 First published as a Review in Advance on August 4, 2020 Keywords First published as a Review in Advance on August 4, 2020 Abstract https://doi.org/10.1146/annurev-cellbio-100818- 125512 Parkinson’s disease (PD) is a leading cause of neurodegeneration that is de- fined by the selective loss of dopaminergic neurons and the accumulation of protein aggregates called Lewy bodies (LBs). The unequivocal identification of Mendelian inherited mutations in 13 genes in PD has provided transform- ing insights into the pathogenesis of this disease. The mechanistic analysis of several PD genes, including α-synuclein (α-syn), leucine-rich repeat kinase 2 (LRRK2), PTEN-induced kinase 1 (PINK1), and Parkin, has revealed cen- tral roles for protein aggregation, mitochondrial damage, and defects in en- dolysosomal trafficking in PD neurodegeneration. In this review, we outline recent advances in our understanding of these gene pathways with a focus on the emergent role of Rab (Ras analog in brain) GTPases and vesicular trafficking as a common mechanism that underpins how mutations in PD genes lead to neuronal loss. These advances have led to previously distinct genes such as vacuolar protein–sorting-associated protein 35 (VPS35) and LRRK2 being implicated in a common signaling pathway. A greater under- standing of these common nodes of vesicular trafficking will be crucial for linking other PD genes and improving patient stratification in clinical trials underway against α-syn and LRRK2 targets. Copyright © 2020 Pawan Kishor Singh & Miratul M.K. Muqit. This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. See credit lines of images or other third-party material in this article for license information 237 Contents INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 PARKINSON’S DISEASE GENETICS AND TRAFFICKING. . . . . . . . . . . . . . . . . . . . 239 The Genetic Landscape of Parkinson’s Disease . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 Rabs: RAB39B Mutations and PARK16 (RAB29) Risk Variants in Parkinson’s Disease . . . . Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 VPS35 and VPS13C Mutations in Parkinson’s Disease . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 Synaptic Vesicle Trafficking: DNAJC6 and SYNJ1 Mutations in Parkinson’s Disease . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 PROTEIN AGGREGATION PATHWAYS AND VESICULAR TRAFFICKING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 α-Synuclein and Rab GTPases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 α-Synuclein and SNAREs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246 α-Synuclein and Exosomes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Abstract 247 LRRK2: AT THE NEXUS OF VESICULAR TRAFFICKING IN PARKINSON’S DISEASE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 The Landscape of Rab GTPases Regulated by LRRK2 . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 Autophagy and LRRK2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 Golgi Trafficking Mediated by LRRK2 and Rab29 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 The Interplay Between Retromer Activity and LRRK2 Phosphorylation . . . . . . . . . . . 251 MITOCHONDRIAL QUALITY CONTROL AND VESICULAR TRAFFICKING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 PINK1/Parkin Regulation of Mitophagy and Link to Rabs. . . . . . . . . . . . . . . . . . . . . . . . 252 PINK1/Parkin and Mitochondrial-Derived Vesicles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 PINK1 Regulation of the Rab SF3 Motif . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 CONCLUDING REMARKS AND CLINICAL APPLICATION . . . . . . . . . . . . Abstract . . . . . . 256 INTRODUCTION Parkinson’s disease (PD) was first defined as a clinical entity just over two centuries ago, and it now represents the second most common neurodegenerative disorder, affecting from 2% to 3% of the population greater than 65 years age (Poewe et al. 2017). The hallmark motor symptoms of PD include resting tremor, postural instability, bradykinesia, and rigidity. However, PD also involves nonmotor symptoms that contribute to patients’ disability, including anosmia, cognitive dysfunc- tion, sleep–awake dysregulation, dysautonomia, depression, and constipation (Poewe et al. 2017). PD pathology is characterized by the loss of pigmented dopaminergic neurons in the substantia nigra pars compacta (SNpc) midbrain region, and PD motor symptoms are thought to occur with a 60–70% loss of dopaminergic neurons (Lang & Lozano 1998). In association with neuronal loss is the widespread accumulation of α-synuclein (α-syn)-containing aggregates in surviving neu- rons, termed Lewy bodies (LBs) (Spillantini & Goedert 2018). Although the common cause of PD, termed sporadic or idiopathic, is unknown, multiple risk factors including aging and environ- mental factors are believed to contribute to disease pathogenesis (Poewe et al. 2017). These risk factors are thought to interact with genetic susceptibility, and over the last decade, great advances have been made in uncovering the genetic architecture of PD (Bandres-Ciga et al. 2020). Our un- derstanding of mechanisms and pathways underlying PD has been transformed by the discovery of gene mutations in rare familial forms of PD that account for from 5% to 10% of all cases. The Singh • Muqit 238 mechanistic analysis of several genes,namely α-syn,PTEN-induced kinase 1 (PINK1),Parkin,and leucine-rich repeat kinase 2 (LRRK2), has broadly highlighted major pathways including protein aggregation, mitochondrial dysfunction, and defects in endolysosomal trafficking; this has thereby implicated Rab (Ras analog in brain) GTPases as playing a central role in the pathogenesis of PD.i Rab GTPases are the key regulators of intracellular trafficking in eukaryotic cells, with more than 60 members in mammals and 11 homologs in budding yeast (Muller & Goody 2018). Rabs exist within cells in two conformations: an active GTP-bound form, which associates with intra- cellular membranes, and an inactive GDP-bound conformation, which is present in the cytosol. Rabs are prenylated at their C-terminal cysteine residues with the help of geranylgeranyl trans- ferases (GGTs) and Rab escort proteins (REPs); this process is required for their association with the membrane. INTRODUCTION In their membrane-bound form, Rabs are activated by the exchange of GDP to GTP, which is catalyzed by guanine nucleotide exchange factors (GEFs). In their active state, Rabs interact with various effector proteins to regulate myriad functions including cargo selec- tion, vesicle budding, vesicle transport along the cytoskeletal track, and tethering and fusion of the vesicle with the target membrane compartments. There Rabs can hydrolyze their GTP into GDP with the aid of GTPase-activating proteins (GAPs) and thereby switch into an inactive state. In the GDP-bound inactive state, Rabs are retrieved and sequestered in the cytosol by GDP dissociation-inhibitor (GDI) proteins (Bonet-Ponce & Cookson 2019, Stenmark 2009). Whether the deregulation of Rab function and vesicular trafficking is a primary cause of PD neurodegen- eration, as well as the relevance of Rab biology to the more common general form of PD, is an outstanding question that is being intensively studied. PARKINSON’S DISEASE GENETICS AND TRAFFICKING The Genetic Landscape of Parkinson’s Disease The most recent meta-analysis of genome-wide association studies (GWAS) of sporadic PD has identified 90 independent gene risk variants that overall account for 16% to 36% of the heritable risk of PD (Nalls et al. 2019). The functional analysis of these genes has revealed links to lyso- somal biology, mitochondrial homeostasis, autophagy, and vesicular trafficking as well as protein aggregation (Nalls et al. 2019). However, whether the gene assignment of risk variants based on proximity is appropriate for all cases is unclear. Of the 23 PD genes and loci (designated PARK) that have been identified in rare families with monogenic forms of PD, clear-cut mutations have been confirmed in 13 genes (Lunati et al. 2018). These genes are classified into autosomal domi- nant genes, namely SNCA/PARK1/PARK4 (α-syn), LRRK2/PARK8 (LRRK2), and VPS35/PARK17 (vacuolar protein–sorting-associated protein 35; VPS35); X-linked gene mutations in RAB39B (Rab39B); autosomal recessive genes, including PRKN/PARK2 (Parkin), PINK1/PARK6 (PINK1), and PARK7 (DJ-1); and finally autosomal recessive genes associated with complex Parkinsonian phenotypes, including ATP13A2/PARK9 (ATPase 13A2; ATP13A2), PLA2G6/PARK14 (phospho- lipase A2 group VI; PLA2G6), FBX07/PARK15 (F-box only protein 7; FBX07), DNAJC6/PARK19 [DnaJ heat shock protein family member C6 (DNAJC6); auxilin], SYNJ1/PARK20 (Synaptojanin 1; SYNJ1),and VPS13C/PARK23 (vacuolar protein–sorting 13 homolog C; VPS13C) (Lunati et al. 2018). A further four loci/genes have been confirmed as major risk factors for late-onset PD in- cluding PARK10, MAPT (microtubule-associated protein tau), GBA (glucocerebrosidase; GBA) and PARK16, whose locus contains the gene RAB29 (Rab29) (Martin et al. 2011). The identi- fication of a PD-causing mutation in the α-syn gene and the subsequent discovery that α-syn (Figure 1a) is the major protein component of LBs have shown that protein misfolding and ag- gregation is a central pathway in PD pathogenesis. In parallel, the discovery of the physiological www.annualreviews.org • Aberrant Vesicle Trafficking in Parkinson’s 239 Amphipathic Acidic NAC 140 α-Syn UBL RING0 RING1 RING2 IBR 465 Parkin 581 MTS Kinase TM CTE PINK1 ARM ANK LRR ROC COR Kinase WD40 2,527 LRRK2 213 GTPase Rab39B 203 GTPase Rab7L1/Rab29 1,573 Sac1 5'-Phosphatase PRD SYNJ1 3,753 Chorein N rpt rpt C ATG SHR-BD rpt VPS13C α-Solenoid VSP29 binding VSP29 binding 796 VPS35 DNAJC6 PTEN CBD J 913 a b c d e f g h i j Figure 1 Domain architecture of PD proteins linked to membrane trafficking. Singh • Muqit PARKINSON’S DISEASE GENETICS AND TRAFFICKING The Genetic Landscape of Parkinson’s Disease Protein domains of human (a) α-syn (140 aa), (b) PINK1 (581 aa), (c) Parkin (465 aa), (d) LRRK2 (2,527 aa), (e) VPS35 (796 aa), ( f ) Rab39B (213 aa), (g) Rab7L1/Rab29 (203 aa), (h) DNAJC6/auxilin (913 aa), (i) SYNJ1/Synaptojanin (1,573 aa), and ( j) VPS13C (3,573 aa). Abbreviations: α-syn, α-synuclein; aa, amino acids; ANK, ankyrin; ARM, armadillo; ATG, autophagy-related protein; C, C-terminal domain; CBD, clathrin-binding domain; COR, C-terminal of ROC; CTE, C-terminal extension; DNAJC6, DnaJ heat shock protein family member C6; GTP, guanosine triphosphate; IBR, in-between RING; J, J-domain; LRRK2, leucine-rich repeat kinase 2; MTS, mitochondrial targeting sequence; N, N-terminal domain; NAC, nonamyloid-β component; PD, Parkinson’s disease; PINK1, PTEN-induced kinase 1; PRD, proline-rich domain; PTEN, phosphatase and tensin homolog; Rab, Ras analog in brain; RING, really interesting new gene; ROC, Ras of complex; rpt, repeat; SHR-BD, SHORT ROOT–binding domain; SYNJ1, Synaptojanin 1; TM, transmembrane; UBL, ubiquitin-like; VPS, vacuolar protein–sorting protein. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Amphipathic Acidic NAC 140 α-Syn UBL RING0 RING1 RING2 IBR 465 Parkin 581 MTS Kinase TM CTE PINK1 ARM ANK LRR ROC COR Kinase WD40 2,527 LRRK2 213 GTPase Rab39B 203 GTPase Rab7L1/Rab29 1,573 Sac1 5'-Phosphatase PRD SYNJ1 Chorein N rpt rpt C ATG SHR-BD rpt VPS13C α-Solenoid VSP29 binding VSP29 binding 796 VPS35 DNAJC6 PTEN CBD J 913 a b c d e f g h i j Figure 1 Domain architecture of PD proteins linked to membrane trafficking. Protein domains of human (a) α-syn (140 aa), (b) PINK1 (58 (c) Parkin (465 aa), (d) LRRK2 (2,527 aa), (e) VPS35 (796 aa), ( f ) Rab39B (213 aa), (g) Rab7L1/Rab29 (203 aa), (h) DNAJC6/auxil 2020.36:237-264. Downloaded from www.annualreviews.org 174.33.195 on 12/11/20. See copyright for approved use. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. LRRK2 encodes a multidomain protein comprising core kinase and GTPase [Ras of complex (Roc)-C-terminal of Roc (COR)] domains (Figure 1d ) together with several protein-interaction domains; mutations in this gene represent the most common cause of PD (Taylor & Alessi 2020). To date nine missense mutations have been confirmed as pathogenic that are mainly lo- calized within the kinase or Roc-COR domains, including [Asn1437His], [Arg1441Gly/Cys/His], [Arg1628Pro], [Tyr1699Cys], [Gly2019Ser], [Ile2020Thr], and [Gly2385Arg] (Lunati et al. 2018). The [Gly2019Ser] mutation is the most frequent, varying from 1% to 5% of PD cases in Europe and up to 40% of cases in North Africa; however, the penetrance is incomplete and increases with every decade of patients’ lives to greater than 90% by the ninth decade (Lunati et al. 2018). The phenotype resembles typical PD with asymmetrical onset,nonmotor symptoms,and good L-Dopa response that is indistinguishable from typical PD (Lunati et al. 2018). However, the mean age of onset is lower at 58 years and the progression slower than that of typical PD cases (Lunati et al. 2018). Interestingly, there does not appear to be any difference in severity between heterozygous and homozygous [Gly2019Ser] patients (Lunati et al. 2018). Furthermore, the neuropathology of LRRK2 is variable, with LBs found in [Gly2019Ser] cases but few LBs and a predominance of tau inclusions found in the other mutations (Lunati et al. 2018). All pathogenic mutations lead to hyperactivation of the kinase activity of LRRK2, and Type I kinase inhibitors are currently undergoing clinical trials (Alessi & Sammler 2018). Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Domain architecture of PD proteins linked to membrane trafficking. Protein domains of human (a) α-syn (140 aa), (b) PINK1 (581 aa), (c) Parkin (465 aa), (d) LRRK2 (2,527 aa), (e) VPS35 (796 aa), ( f ) Rab39B (213 aa), (g) Rab7L1/Rab29 (203 aa), (h) DNAJC6/auxilin (913 aa), (i) SYNJ1/Synaptojanin (1,573 aa), and ( j) VPS13C (3,573 aa). Abbreviations: α-syn, α-synuclein; aa, amino acids; ANK, ankyrin; ARM, armadillo; ATG, autophagy-related protein; C, C-terminal domain; CBD, clathrin-binding domain; COR, C-terminal of ROC; CTE, C-terminal extension; DNAJC6, DnaJ heat shock protein family member C6; GTP, guanosine triphosphate; IBR, in-between RING; J, J-domain; LRRK2, leucine-rich repeat kinase 2; MTS, mitochondrial targeting sequence; N, N-terminal domain; NAC, nonamyloid-β component; PD, Parkinson’s disease; PINK1, PTEN-induced kinase 1; PRD, proline-rich domain; PTEN, phosphatase and tensin homolog; Rab, Ras analog in brain; RING, really interesting new gene; ROC, Ras of complex; rpt, repeat; SHR-BD, SHORT ROOT–binding domain; SYNJ1, Synaptojanin 1; TM, transmembrane; UBL, ubiquitin-like; VPS, vacuolar protein–sorting protein. nnu. Rev. Cell Dev. Biol. 2020.36 Access provided by 86.174.33 role that α-syn plays in SNARE (soluble N-ethylmaleimide-sensitive factor attachment protein receptor) complex assembly and synaptic vesicle trafficking (see the section titled Protein Aggre- gation Pathways and Vesicular Trafficking) and how this is disrupted by α-syn mutations have also been of major interest. Mutations in α-syn are rare, accounting for only from 1% to 2% of familial PD. These comprise gene duplications, triplications, or missense mutations ([Ala30Pro], [Glu46Lys], [Gly51Asp], [Ala53Glu], and [Ala53Thr]). In general, the phenotype of these patients does not resemble that of patients with typical PD, instead having a high prevalence of dementia, neuropsychiatric signs, and a moderate response to L-Dopa. Pathologically there is a high burden of LBs, Lewy neurites (LNs), and neuronal loss in the SNpc (Lunati et al. 2018). The discovery of mutations in the PINK1 and Parkin genes has spearheaded understand- ing of the roles of these genes in mitochondrial quality control pathways linked to PD Singh • Muqit 240 neurodegeneration (Harper et al. 2018). Autosomal recessive mutations in Parkin were first dis- covered in 1998 and are the most common cause of early-onset PD, accounting for nearly 40% of all cases (Kitada et al. 1998). Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Parkin encodes a multidomain ubiquitin (Ub) E3 ligase containing an N-terminal Ub-like (Ubl) domain and RING0, RING1, in-between RING (IBR), and RING2 domains (Figure 1c). The catalytic cysteine (Cys431) lies within the RING2 domain (Wenzel et al. 2011). Numerous PD-causing mutations have been identified including rearrangements that dras- tically destabilize the protein and missense mutations across the whole protein that disrupt critical regulatory amino acid residues, e.g., [Cys431Phe] within RING2 that disrupts the Ub thioester formation required for Ub transfer to substrates (Wenzel et al. 2011) and [Ser65Asn] that prevents phosphorylation and activation by PINK1 (McWilliams et al. 2018). Autosomal recessive muta- tions in PINK1 that encode a mitochondria-localized protein kinase represent the second leading cause of early-onset PD. Over 30 missense and nonsense mutations have been reported, mainly localized within the kinase domain (Figure 1b), that lead to loss of function through catalytic inactivation or truncations, respectively (Valente et al. 2004). Structural and biochemical studies have elaborated the mechanism by which PINK1 phosphorylates and activates Parkin, and cell biological studies have demonstrated that these enzymes function in a common signaling pathway to stimulate the removal of damaged mitochondria by mitophagy (see the section titled Mito- chondrial Quality Control and Vesicular Trafficking) (Harper et al. 2018, McWilliams & Muqit 2017). Consistent with this, patients harboring PINK1 or Parkin mutations exhibit identical phe- notypes with early-onset disease, an excellent response to L-Dopa, and a relatively high frequency of dystonia and dyskinesias (Lunati et al. 2018). Pathologically, PINK1 and Parkin patient brains exhibit relatively restricted neurodegeneration within the substantia nigra (SN) and a paucity of LBs, although variability in LB burden has been reported in select cases for each gene (Kunath et al. 2019). Rabs: RAB39B Mutations and PARK16 (RAB29) Risk Variants in Parkinson’s Disease The most compelling evidence for the deregulation of Rabs as a primary cause of PD has been the discovery of direct Rab mutations in familial PD cases. X-linked mutations in RAB39B were www.annualreviews.org • Aberrant Vesicle Trafficking in Parkinson’s 241 first reported in 2014, including a ∼45 kb loss-of-function deletion mutation in an Australian family with intellectual disability and early-onset PD and a missense [Thr168Lys] mutation in a Wisconsin family with a similar phenotype (Wilson et al. 2014). These mutations led to complete loss of protein expression, and patients exhibited a typical PD phenotype that evolved later in life (usually before age 45) and had a good response to L-Dopa. Women were reported to exhibit a milder phenotype with a later age of onset of PD and less intellectual disability (Wilson et al. 2014). Pathological analysis of a male patient revealed typical PD pathology with extensive loss of dopaminergic neurons from the SN and classic LBs and LNs (Wilson et al. 2014). A loss-of- function [Trp108Stop], null-truncating mutation was reported in a 39-year-old man with typical early-onset PD and mild intellectual disability (Lesage et al. 2015). A missense [Gly192Arg] muta- tion has been reported in families with L-Dopa-responsive, early-onset PD without any intellec- tual disability and affecting both males and females (albeit with reduced penetrance), suggesting that some mutations may be able to exert a dominant-negative effect (Mata et al. 2015). This mutation lies within the C-terminal hypervariable domain of Rab39B and is predicted to disrupt intracellular localization and interaction with effectors (Figure 1f ). Rab39B is highly expressed in the brain and in situ hybridization studies indicate this occurs exclusively in neurons (Giannandrea et al. 2010). The subcellular localization of Rab39B is predominantly within the Golgi apparatus, and RAB39B knockdown studies reveal effects on vesicle trafficking and a reduction in synapse formation of neurons in culture (Giannandrea et al. 2010). Genetic studies have identified and confirmed a locus, PARK16, as a susceptibility factor for sporadic PD (Nalls et al. 2014, Satake et al. 2009). Of 5 genes within this region, RAB29 (RAB7L1) has emerged as the leading candidate (Figure 1g), although the mechanism of how the risk variant leads to PD is unclear; in one study using protein–protein interaction arrays, analysis suggested that Rab29 is a binding partner of LRRK2 and promotes the removal of Golgi-derived vesicles through the autophagy-lysosome pathway (ALP) (Beilina et al. 2014). Rabs: RAB39B Mutations and PARK16 (RAB29) Risk Variants in Parkinson’s Disease Other genetic studies of PD patient cohorts have found common variants within the LRRK2 and RAB29 genes that function coordinately to increase PD risk nonadditively (Pihlstrøm et al. 2015). Perhaps the most com- pelling evidence for RAB29 has been functional studies showing that the Rab29 protein functions as a critical upstream regulator of LRRK2 leading to increased LRRK2 activity and phosphory- lation of Rabs (Liu et al. 2018, Purlyte et al. 2018). Rab29 is closely related to Rab32 and Rab38, and Rab32 has been found to interact with LRRK2 via its N-terminal armadillo (ARM) domain (Figure 1d ); similar to Rab29, however, there is no evidence for RAB32 mutations in familial PD cases (McGrath et al. 2019). VPS35 and VPS13C Mutations in Parkinson’s Disease Autosomal dominant mutations in VPS35 were identified in 2011 in patients with late-onset PD (Vilariño-Güell et al. 2011, Zimprich et al. 2011). VPS35 encodes the cargo-binding subunit of the trimeric retromer complex (also containing VPS29 and VPS26) whose function is to trans- port specific endosomal cargoes into vesicles and tubules,delivering these to either the trans-Golgi network or the plasma membrane (Williams et al. 2017). To date, the only definite pathogenic mu- tation identified is an [Asp620Asn] (D620N) mutation that structural analysis indicates is located at the surface of the convex face of an α-helical solenoid domain (Figure 1e), suggesting that the D620N mutation may impact interaction with an as-yet-unknown effector (Williams et al. 2017). The symptoms of these patients generally resemble those of patients with typical PD but with a mean age of onset of 50 years; however, several cases have been reported with earlier age of onset in the 30s and 40s (Lunati et al. 2018). Disease progression tends to be slow, cognitive decline rare, and response to L-Dopa good (Lunati et al. 2018). The discovery that the D620N mutation Singh • Muqit 242 significantly enhances LRRK2 activation, as assessed by autophosphorylation and Rab phospho- rylation, places VPS35 upstream of LRRK2 in a common pathway, although the mechanism by which it activates LRRK2 is unknown (Mir et al. 2018). Cell biological studies have shown that the D620N mutation also disrupts the association of VPS35 with the WASH complex via impaired binding to FAM21,which leads to trafficking defects (McGough et al.2014,Zavodszky et al.2014); further studies are required to assess whether this is linked to LRRK2 hyperactivation. Autosomal recessive mutations in VPS13C have been identified in patients with early-onset PD presenting between 25 and 45 years of age (Lesage et al. 2016). VPS13C encodes a large 3,753– amino acid protein that belongs to the VPS13 (A-D) family of proteins. VPS13C and VPS13A function as lipid transporters at organelle contact sites (Kumar et al. 2018). VPS13C is local- ized at sites bridging the endoplasmic reticulum (ER) with an endolysosomal system, specifi- cally vesicles containing the lysosomal marker LAMP1 and Rab7. VPS13C is anchored to the ER via its N-terminal domain (Figure 1j) through a conserved FFAT motif that binds both the ER vesicle-associated membrane protein (VAMP)-associated protein (VAP) and lipid droplets via its C-terminus (Kumar et al. 2018). VPS35 and VPS13C Mutations in Parkinson’s Disease Interestingly, the analysis of cells expressing PD-associated VPS13C mutants found mitochondrial defects suggesting that this may be an indirect consequence of defects in the endolysosomal system (Lesage et al. 2016). The clinical phenotype is atypical for PD, with a moderate response to L-Dopa and a rapid and severe disease progression with early cognitive decline. Pathological analysis of a single case has revealed severe pathological changes that resemble diffuse LB disease (Lesage et al. 2016). α-Synuclein and Rab GTPases α-Synuclein and Rab GTPases Multiple studies have established the role of Rab GTPases in α-syn aggregation–induced PD neu- rodegeneration in different model systems. An initial study reported the role of Rab5a, an early- endosomal Rab GTPase, in the endocytosis of α-syn leading to neuronal cell death, whereas the expression of GTPase-deficient Rab5a rescued the phenotype due to perturbed endocytosis (Sung et al. 2001). The role of Rab5b, another isoform of Rab5, was also linked to the α-syn-induced en- docytosis of the NMDA receptor (a glutamate and ion channel protein receptor) by upregulating its expression (Cheng et al. 2011). The role of endocytic Rabs contributing to α-syn trafficking was further established following the discovery of Rab7 in the autolysosomal clearance of α-syn aggregates (Figure 2b). When a pathogenic A53T mutant of α-syn was expressed in HEK293 Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. gg g Microglia Neuron Exosomes Synapse a Synaptic cleft Synaptic cleft Postsynaptic Postsynaptic Presynaptic Presynaptic α-Syn α-Syn Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Microglia Neuron Exosomes Exosomes ILV formation ESCRTs (I, II, and III) ESCRT 0 α-Syn α-Syn α-Syn α-Syn Rab7 Rab7 Rab5 Golgi TGN α-SNAP Munc18-1 Syntaxin-1 SNAP25 Synaptobrevin-2 (VAMP2) Synaptobrevin-2 (VAMP2) NSF SGT CSPα Hsc70 Synapse Presynaptic membrane Neurotransmitter Neurotransmitter Synaptic vesicle PM a b c MVBs MVBs MVBs MVBs Synaptic cleft Synaptic cleft Postsynaptic Postsynaptic Presynaptic Presynaptic α-Syn α-Syn Cytoplasm Synaptic cleft MHC II MHC I Tetraspanins Tetraspanins Hsps miRNA mRNA CPs α-Syn Exosome d Rab27b EE LY LY (Caption appears on following page) 244 Singh • Muqit Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews. Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Microglia Exosomes Exosomes ILV formation ESCRTs (I, II, and III) ESCRT 0 α-Syn α-Syn Rab7 Rab7 Rab5 Golgi TGN PM a b MVBs MVBs MVBs MVBs MHC II MHC I Hsps mRNA CPs d Rab27b EE LY LY y 86.174.33.195 on 12/11/20. See copyright for approved use b Annu. Rev. Cell Dev. Biol. Synaptic Vesicle Trafficking: DNAJC6 and SYNJ1 Mutations in Parkinson’s Disease Synaptic transmission at dopaminergic synapses is critically dependent on the recycling of dopamine receptors and other proteins via synaptic vesicle endocytosis followed by trafficking and sorting within the endosomal pathway. Interestingly, mutations in two genes encoding com- ponents of this process have been identified in autosomal recessive early-onset complex PD pa- tients. Mutations in DNAJC6 encoding auxilin (Figure 1h) cause juvenile-onset PD (Edvardson et al. 2012) and are loss-of-function with exonic deletions and splice-defective mutants. Auxilin is part of the conserved DNAJ/Hsp40 family that stimulates ATPase activity of heat shock cog- nate 70 (Hsc70) to mediate uncoating of clathrin-coated vesicles (CCVs) following endocytosis (Edvardson et al. 2012). Without the removal of clathrin, vesicles are unable to fuse and be taken up into the endosomal pathway for cargo sorting. Loss-of-function mutations in Synaptojanin-1 (SYNJ1), which encodes a lipid 5′ phosphatidylinositide phosphatase, lead to early-onset PD (Drouet & Lesage 2014, Fasano et al. 2018). SYNJ1 dephosphorylates phosphatidylinositide 4,5- bisphosphate to trigger the release of adaptor proteins from CCVs that enables auxilin-mediated clathrin uncoating (Drouet & Lesage 2014). Mutations including [Arg258Gln] and [Arg459Pro] have been identified within the Sac1 domain (Figure 1i) and have been shown to reduce phos- phatase activity (Hardies et al. 2016, Vanhauwaert et al. 2017). Patients harboring DNAJC6 or SYNJ1 mutations have a similar phenotype, with typical onset between 20 and 40 years of age and complex deficits including Parkinsonism with poor response to L-Dopa and epilepsy and cogni- tive decline (Lunati et al. 2018). Consistent with this observation, SYNJ1 or DNAJC6-knockout mice exhibit the same phenotype with neurological deficits and accumulate CCVs at the synaptic terminal (Cao et al. 2017). SYNJ1 and DNAJC6 mutations highlight the critical role of synaptic vesicle endocytosis and the endosomal pathway in the maintenance of dopaminergic striatal ter- minals to prevent PD; whether these factors interact with other PD gene components remains unknown. www.annualreviews.org • Aberrant Vesicle Trafficking in Parkinson’s 243 Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. cells and Drosophila melanogaster, Rab7 overexpression was found to lead to the clearance of α-syn aggregates, reduced cell death, and rescue of the locomotor deficit. These effects were specific to Rab7, as other Rab GTPases such as Rab5, Rab9, or Rab23 failed to rescue the pathogenic phe- notype (Dinter et al. 2016). Increased levels of GTP-bound Rab5 and Rab7 were also found upon α-syn overexpression that interacted with the motor protein dynein in a transgenic mouse model of PD (Fang et al. 2017). Rab11A, which regulates the trafficking of recycling endosomes, also regulates the secretion of extracellular α-syn through its interaction with Hsp90 (Liu et al. 2009). In Drosophila models of PD, Rab11 rescues the α-syn-induced increased synaptic vesicle size, the degeneration of dopaminergic neurons, and reduced life span in both larval and adult flies (Breda et al. 2015). Secretory pathway Rabs have also been shown to work in concert with endocytic Rabs to reg- ulate α-syn trafficking. Pull-down studies (Dalfó et al. 2004b) have identified the interaction of secretory pathway Rabs such as Rab3A and Rab8 as well as endocytic Rab5 with mutant A30P human α-syn in a transgenic mouse model. Immunoprecipitation studies (Dalfó et al. 2004a) have also showed an increased interaction of Rab3A with α-syn aggregates and a decreased affinity for its effector Rabphilin in LB disease (LBD) cases. Rab3A was also immunoprecipitated with α-syn from the SN but not cerebral cortex extracts from the postmortem brains of patients with PD (Dalfó & Ferrer 2005). In PC12 cells, soluble α-syn interacts with Rab3A to enhance exocytosis through vesicle priming and fusion by releasing calcium (Ca2+) from thapsigargin (an inhibitor of ER Ca2+ ATPase)-sensitive Ca2+ pools (Huang et al. 2018). In an RNA interference (RNAi)- based microscopic screen of α-syn aggregation in human neuroglial cells, Rab8B, Rab11A, and Rab13 knockdown were found to rescue α-syn-induced cytotoxicity, whereas Rab11A and Rab13 expression induced α-syn endocytic recycling and secretion (Gonçalves et al. 2016). α-Synuclein also blocks trafficking between the ER and Golgi compartments in yeast cells and increased Rab1 (yeast homolog Ypt1) expression protects against dopaminergic neuronal loss in PD animal models (Cooper et al. 2006). Similarly, in a neuronal model of PD, post–Golgi vesicle– associated Rab8A also inhibited α-syn toxicity (Gitler et al. 2008). α-Synuclein and Rab GTPases 2020.36:237- A id d b 86 174 33 195 Access provided by 86.174.33.195 Neuron α-Syn α-Syn α-SNAP Munc18-1 Syntaxin-1 SNAP25 Synaptobrevin-2 (VAMP2) Synaptobrevin-2 (VAMP2) NSF SGT CSPα Hsc70 Presynaptic membrane Neurotransmitter Neurotransmitter Synaptic vesicle c Postsynaptic Postsynaptic Cytoplasm Synaptic cleft Tetraspanins Tetraspanins miRNA α-Syn Exosome (Caption appears on following page) c Exosome Presynaptic Presynaptic Cytoplasm Synaptic cleft Synaptic cleft Synaptic cleft 244 Singh • Muqit Figure 2 (Figure appears on preceding page) Figure 2 (Figure appears on preceding page) www.annualreviews.org • Aberrant Vesicle Trafficking in Parkinson’s Figure 2 (Figure appears on preceding page) Vesicular trafficking mechanisms of α-syn aggregation–mediated neurotoxicity. (a) α-Syn aggregates can be transmitted to other neurons through endocytic mechanisms or exosomes, or they can block neurotransmitter release at synapses. (b) Under normal conditions, α-syn aggregates can enter the cell through an endocytic mechanism, first reaching Rab5-positive EEs, where they can be recycled back through a recycling mechanism (not shown) or sorted within the MVBs to form ILVs through the involvement of ESCRT machinery (complexes 0, I, II, and III). When MVBs fuse with the plasma membrane, exosomes are secreted into the extracellular milieu. Rab27b has been suggested to play a role in the exosome-mediated secretion of α-syn aggregates, or these aggregates can be degraded within lysosomes through Rab7-mediated endolysosomal fusion. The perturbation of these processes in PD causes the accumulation of pathogenic α-syn aggregates within the cell, leading to toxicity. (c) Under physiological conditions, α-syn functions as a SNARE chaperone to regulate the exocytic release of neurotransmitter at the presynaptic terminal. In PD, α-syn aggregates block neurotransmitter release by engaging VAMP2 and SNAP25, leading to neurodegeneration. Panel c is adapted from Rizo & Sudhof (2012). (d ) Exosomes containing α-syn aggregates may facilitate propagation to other cells. Other constituents of exosomes include proteins such as tetraspanins, MHCs I and II, CPs, Hsps, miRNA, and mRNA. Abbreviations: α-SNAP, α-soluble NSF-attachment protein; α-syn, α-synuclein; CP, cytoskeletal protein; CSPα, cysteine string protein α; EE, early endosome; ESCRT, endosomal sorting complex required for transport; Hsc70, heat shock cognate 70; Hsp, heat shock protein; ILV, intraluminal vesicle; LE, late endosome; LY, lysosome; MHC, major histocompatibility complex; miRNA, microRNA; mRNA, messenger RNA; Munc18-1, mammalian uncoordinated 18-1; MVB, multivesicular body; NSF, N-ethylmaleimide-sensitive factor; PM, plasma membrane; Rab, Ras analog in brain; SGT, small glutamine-rich tetratricopeptide repeat; SNAP25, synaptosomal-associated protein 25; SNARE, soluble N-ethylmaleimide-sensitive factor attachment protein receptors; TGN, trans-Golgi network; VAMP2, vesicle-associated membrane protein 2. α-Synuclein and SNAREs SNAREs are a family of proteins that associates with intracellular membranes and regulates the docking and fusion of donor intracellular vesicles with target compartment membranes. SNAREs can be functionally categorized into v-SNAREs, which associate with donor vesicles, and t-SNAREs, which are associated with target compartments ( Jahn & Scheller 2006). The specific interaction of v-SNAREs with t-SNAREs leads to the formation of a quaternary helix complex that facilitates membrane fusion. These complexes are further recycled with the help of two solu- ble proteins: NSF (N-ethylmaleimide-sensitive factor), an AAA (ATPases associated with diverse cellular activities)-type ATPase, and α-SNAP (α soluble NSF-attachment protein), which main- tains SNARE availability for subsequent fusion events (Chen & Scheller 2001). Similar to Rab GTPases, SNAREs also define a layer of specificity by localizing to specific membrane compart- ments,but their role is considered more promiscuous than that of Rabs.Synaptic vesicle fusion and neurotransmission are regulated by the neuronal SNAREs syntaxin-1, synaptobrevin/VAMP1, and synaptosomal-associated protein 25 (SNAP25) (Rizo & Sudhof 2012). Therefore, any pertur- bation in SNARE proteins per se or in regulatory proteins such as α-syn leads to the neurotrans- mission defects underpinning many neurological diseases including PD (Chua & Tang 2011). p g y g g g Our understanding of the role of SNARE proteins involved in PD came from an earlier metabolic labeling study in the late nineties ( Jensen et al. 1999), when SNAP25, a predominantly neuronal SNARE, was found to be colocalized with and involved in α-syn axonal transport in rat retinal ganglion cells. α-Syn was later discovered to cooperate with cysteine string protein α (CSPα) in mediating chaperone activity toward neuronal SNARE complexes (Figure 2c) and to prevent neurodegeneration in mice. This modulation was achieved through the phospholipid binding of wild-type α-syn but not of the A30P mutant, which failed to attach to the membrane and could not rescue the phenotype (Chandra et al. 2005). A subsequent study (Darios et al. 2010) suggested that α-syn modulated SNARE complex formation and exocytosis through sequestering arachidonic acid, a common component of phospholipids. A transgenic mouse model of PD expressing truncated human α-syn (1–120) showed an age-dependent reduction of dopamine release accompanied by a redistribution of the SNARE proteins SNAP25, syntaxin-1, and synaptobrevin-2 in the striatum (Garcia-Reitböck et al. 2010). However, another study (Anwar et al. 2011) suggested no difference in the distribution of synaptic SNAREs in the dorsal striatum of triple-synuclein knockout mice. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. In a cellular model of PD, Rab1, Rab2, and Rab8 regulated Golgi fragmentation, leading to the aggregation of α-syn as well as the impairment of anterograde and retrograde transport between the ER and the Golgi apparatus www.annualreviews.org • Aberrant Vesicle Trafficking in Parkinson’s 245 (Rendón et al. 2013). Taken together, Rab GTPases can regulate α-syn aggregation and secretion as well as its clearance in the various model systems of PD. α-Synuclein and Exosomes Exosomes are a type of extracellular vesicle measuring 30–100 nm in diameter that are secreted into the extracellular medium by many cell types in both normal and pathological conditions. Exo- somes are composed of a lipid bilayer and are found to contain various proteins, lipids, RNAs, and other substances released by the secreting cell (Mathivanan et al. 2010). Exosomes are formed through inward budding in multivesicular bodies (MVBs) that generates intraluminal vesicles (ILVs) (Figure 2d ), which are then secreted extracellularly by the fusion of MVBs with the plasma membrane. ESCRT (endosomal sorting complex required for transport) machinery, which in- cludes ESCRT complexes 0, I, II, and III, are involved in cargo sorting, budding, and fission of exosomes within MVBs. Several families of proteins such as tetraspanins, Hsps, cytoskeletal proteins, and trafficking proteins as well as various lipids, miRNAs, mRNAs, immune regulatory molecules such as major histocompatibility complexes (MHCs) I and II, and pathological com- ponents including viral proteins are all found in exosomes (Gupta & Pulliam 2014) (Figure 2d ). Initial hints about the role of exosomes in α-syn trafficking came through its detection in human plasma and cerebrospinal fluid and reports of the secretion of its monomeric and oligomeric forms from primary cortical neurons as well as from human neuroblastoma cells (Borghi et al. 2000; El- Agnaf et al. 2003, 2006; Lee et al. 2005; Tokuda et al. 2010). Later it was reported that α-syn is secreted through exosomes in a Ca2+-dependent manner and affects the survival of neighbor- ing neurons (Emmanouilidou et al. 2010). Another study (Alvarez-Erviti et al. 2011) in SH-SY5Y cells reported that lysosomal dysfunction, which has been reported in PD, can lead to the increased exosome-mediated secretion of α-syn and to its transmission to neighboring cells. In transgenic mice expressing human phosphorylation mimic S129D α-syn, which aggregates, exosomes loaded with small interfering RNA (siRNA) against α-syn and expressing neuron-specific rabies viral gly- coprotein were found to be effective in reducing intraneuronal aggregates (Cooper et al. 2014). Exosomes have also been suggested to provide a catalytic environment for nucleation that pro- motes α-syn aggregation (Grey et al. 2015). Microglia have been suggested to play an important role in the transmission of α-syn- containing exosomes through the uptake of pathogenic exosomes (Figure 2a). www.annualreviews.org • Aberrant Vesicle Trafficking in Parkinson’s α-Synuclein and SNAREs The first evidence of the direct interaction of α-syn with SNAREs came through a study (Burré et al. 2010) suggesting its binding with synaptobrevin-2 (VAMP2) through its C-terminus to maintain the presynaptic SNARE complex for efficient neurotransmitter release. Remarkably, a follow-up study by the same group (Sharma et al. 2011) also discovered that CSPα, which forms complexes with Hsc70 and the small glutamine-rich tetratricopeptide-repeat protein (SGT), directly interacts with SNAP25 to promote SNARE- complex formation (Figure 2c) by preventing its aggregation and ubiquitylation-dependent proteasomal degradation. Analysis of the CSPα-knockout mouse that leads to neurodegeneration revealed that the neurodegenerative phenotype was mainly due to low levels of SNAP-25 leading to aberrant synaptic SNARE-complex assembly (Sharma et al. 2012). While soluble α-syn monomers promote the assembly of such complexes, how α-syn oligomers cause neurotoxicity has also been a major question. One report (Choi et al. 2013) suggested that α-syn oligomers bind to the N-terminal domain of VAMP2 and inhibit SNARE-mediated lipid mixing by pre- venting SNARE-complex formation. Interestingly, another study (DeWitt & Rhoades 2013) also Singh • Muqit 246 suggested that α-syn inhibits SNARE-dependent vesicle fusion by binding to the lipid membrane without direct interaction with SNAREs. α-Syn aggregates have also been shown to directly sequester SNARE proteins such as VAMP2 and SNAP25 (Figure 2c), and this interaction, which is resistant to SDS treatment, leads to neurotoxicity. Furthermore, this sequestration is partially blocked by a VAMP2 peptide, resulting in reduced neurotoxicity (Choi et al. 2018). y g y Proteins regulating SNARE functions have also been found to be involved in modulating α- syn activity. Munc18-1 (mammalian uncoordinated 18-1), which is important for regulating the SNARE-dependent fusion of synaptic vesicles and thereby neurotransmitter release, regulates α-syn aggregation by acting as a molecular chaperone (Chai et al. 2016). In a mouse model of lysosomal storage disorders, α-syn aggregation and proteasomal degradation of CSPα have been reported, resulting in inhibition of SNARE-complex assembly and reduced recycling of synaptic vesicles and leading to neurodegeneration (Sambri et al. 2017). In conclusion, α-syn interacts with SNAREs to regulate neurotransmitter release, but this process is disrupted by oligomeric α-syn; conversely, SNAREs can, in turn, regulate α-syn function. α-Synuclein and Exosomes This uptake re- sults in inhibition of the autophagy and scavenging activities of microglia, which leads to further enhanced secretion of pathogenic exosomes and transmission to other cells (Xia et al. 2019). The reduced phagocytosis of exosomes containing α-syn with increased tumor necrosis factor (TNF)- α secretion was shown in mice microglia as well as in human monocytes derived from aged donors. www.annualreviews.org • Aberrant Vesicle Trafficking in Parkinson’s 247 This might lead to an age-dependent susceptibility to misfolded proteins and infections in neu- rodegenerative diseases such as PD (Bliederhaeuser et al. 2016). Exosomes derived from the serum of PD patients have also been shown to be pathogenic to mice due to the presence of an increased abundance of α-syn and inflammatory factors such as interleukin (IL)-1β and TNF-α in compari- son to healthy controls. This leads to α-syn, Ub, and p62 aggregation, leading in turn to microglial activation, dopaminergic neuronal cell death, and motor defects in recipient cells (Han et al. 2019). Quantitative proteomic profiling using laser-capture microdissection has identified the enrich- ment of extracellular exosomal proteins in the SN of human brain samples (Griesser et al. 2020). A recent study also suggested the role of Rab27b, a GTPase involved in the endolysosomal pathway, in α-syn secretion through both exosomal (Figure 2b) and nonexosomal pathways as well as its clearance and toxicity (Underwood et al. 2020). Microglia secreted α-syn through exosomes when they were treated with human α-syn preformed fibrils, which help in the transmission of α-syn pathology and cause aggregation in neuronal cells (Guo et al. 2020). Collectively, α-syn secreted in exosomes may play an important role in PD progression and appears to be a promising biomarker and therapeutic target. However, future studies are required to uncover the fusion mechanism by which exosomes are taken up by recipient cells, and how the RNA or protein contents of exosomes escapes from its membrane coat following engulfment of exosomes to mediate cellular effects. This might lead to an age-dependent susceptibility to misfolded proteins and infections in neu- rodegenerative diseases such as PD (Bliederhaeuser et al. 2016). Exosomes derived from the serum of PD patients have also been shown to be pathogenic to mice due to the presence of an increased abundance of α-syn and inflammatory factors such as interleukin (IL)-1β and TNF-α in compari- son to healthy controls. α-Synuclein and Exosomes This leads to α-syn, Ub, and p62 aggregation, leading in turn to microglial activation, dopaminergic neuronal cell death, and motor defects in recipient cells (Han et al. 2019). Quantitative proteomic profiling using laser-capture microdissection has identified the enrich- ment of extracellular exosomal proteins in the SN of human brain samples (Griesser et al. 2020). A recent study also suggested the role of Rab27b, a GTPase involved in the endolysosomal pathway, in α-syn secretion through both exosomal (Figure 2b) and nonexosomal pathways as well as its clearance and toxicity (Underwood et al. 2020). Microglia secreted α-syn through exosomes when they were treated with human α-syn preformed fibrils, which help in the transmission of α-syn pathology and cause aggregation in neuronal cells (Guo et al. 2020). Collectively, α-syn secreted in exosomes may play an important role in PD progression and appears to be a promising biomarker and therapeutic target. However, future studies are required to uncover the fusion mechanism by which exosomes are taken up by recipient cells, and how the RNA or protein contents of exosomes escapes from its membrane coat following engulfment of exosomes to mediate cellular effects. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. LRRK2: AT THE NEXUS OF VESICULAR TRAFFICKING IN PARKINSON’S DISEASE The Landscape of Rab GTPases Regulated by LRRK2 Early studies implicating LRRK2 with Rab GTPases came from localization of the Drosophila ho- molog of LRRK2 (Lrrk) to the membranes of late endosomes and lysosomes and found that it regulates endolysosomal transport and autophagy (Dodson et al. 2012, 2014). Further, LRRK2 was found to interact with Rab7 to inhibit the perinuclear positioning of lysosomes, whereas the G2019S disease mutant promoted perinuclear positioning through microtubules and dynein (Dodson et al. 2012). Mutant LRRK2 was further shown to delay EGFR receptor degradation by decreasing Rab7 activity, which led to the blocking of late endosomal budding (Gómez-Suaga et al. 2014) (Figure 3). Another study also suggested that LRRK2 directly interacts with Rab32 and Rab38 to regulate endolysosomal trafficking (Waschbüsch et al. 2014). The interaction of LRRK2 with Rab32 and Rab38 (a related Rab32 subfamily of GTPases) occurred via the LRRK2 N-terminal armadillo domain (Figure 1d ) with GTP-bound Rab proteins (McGrath et al. 2019). Interestingly, Rab2a was also identified as an LRRK2-interacting partner that regulated the traf- ficking of lysozyme-containing dense core vesicles to promote the symbiosis of commensal bac- teria in Paneth cells (Zhang et al. 2015). In human pluripotent stem cell–derived macrophages, LRRK2 was also found to be recruited onto LAMP1- and Rab9-positive maturing phagosomes, where it in turn recruits Rab8 and Rab10 and might regulate phagocytic trafficking (Lee et al. 2020). These latter studies suggested the role of LRRK2 in infection and inflammatory bowel disease that could also be linked to PD pathogenesis (Ahmadi Rastegar & Dzamko 2020, Herbst & Gutierrez 2019, Houser & Tansey 2017, Wallings & Tansey 2019). Another study in mice (Kuwahara et al.2016) suggested that LRRK2 and Rab29 work in a coordinated fashion to regulate axonal morphology and lysosome integrity, as knockout of either gene resulted in a similar pheno- type. Furthermore, altered LRRK2 kinase activity is associated with defects in neurite outgrowth, and PD pathogenic mutants of LRRK2, including R1441C, R1441G, Y1699C, and I2020T, have been shown by immunoelectron microscopy and electron tomography studies (Kett et al. 2012) to exhibit enhanced binding to microtubules appearing as filamentous structures in primary neuron cultures. www.annualreviews.org • Aberrant Vesicle Trafficking in Parkinson’s LRRK2: AT THE NEXUS OF VESICULAR TRAFFICKING IN PARKINSON’S DISEASE Cryo-electron tomography analysis has recently demonstrated that pathogenic LRRK2 Singh • Muqit 248 Rab29 ARM ANK LRR ROC COR α-Syn Damaged mitochondria Kinase WD40 LRRK2 Retromer complex VPS35 VPS26 VPS29 8A 10 43 3 12 5 1A/B 29 35 Golgi TGN CCV LE LE Rab7 Rab5 Rab7 EGFR PM Autolysosomes Phagophore Autophagosomes 8A 10 RILPL1/2 RILPL1/2 RILPL1/2 RILPL1/2 Ciliogenesis Thr73 Thr72 8A Thr72 Ser111 Parkinson’s disease ? PPM1H protein phosphatase ? Rab GTPases Phosphorylation at Thr72 or homologous residues at switch II– effector-binding region LY LY Rab10 Rab8A Rab8A PINK1 EE Figure 3 The regulation and downstream function of LRRK2. Pathogenic mutations of LRRK2 have been identified in PD that lead to various trafficking perturbations. Rab29 can activate LRRK2, which leads to its recruitment to the TGN through the ARM and ANK domains. VPS35, a core component of the retromer complex, is mutated in PD (D620N) and is associated with the hyperactivation of LRRK2 activity by an unknown mechanism. LRRK2 has been reported to disrupt endocytic pathways (e.g., EGFR trafficking) via the inhibition of Rab7 activity. LRRK2 phosphorylates Thr72 or homologous residues in the switch II–effector-binding region of a subset of Rab GTPases. PPM1H phosphatase reverses the LLRK2-mediated phosphorylation of Rab GTPases. The phosphorylation of Rab10 and Rab8A regulates ciliogenesis through binding to RILPL1 and RILPL2. Rab8A is phosphorylated in response to PINK1 activation at the Ser111 residue, which can modulate phosphorylation by LRRK2. Abbreviations: α-syn, α-synuclein; ANK, ankyrin; ARM, armadillo; CCV, clathrin-coated vesicle; COR, C-terminal of ROC; EE, early endosome; EGFR, epidermal growth factor receptor; LE, late endosome; LRRK2, leucine-rich repeat kinase 2; LY, lysosome; PD, Parkinson’s disease; PINK1, PTEN-induced kinase 1; Rab, Ras analog in brain; RILPL, Rab-interacting lysosomal protein-like; ROC, Ras of complex; TGN, trans-Golgi network; VPS, vacuolar protein–sorting. Rab29 ARM ANK LRR ROC COR α-Syn Damaged mitochondria Kinase WD40 LRRK2 Retromer complex VPS35 VPS26 VPS29 8A 10 43 3 12 5 1A/B 29 35 Golgi TGN CCV LE LE Rab7 Rab5 Rab7 EGFR PM Autolysosomes Phagophore Autophagosomes 8A 10 RILPL1/2 RILPL1/2 RILPL1/2 RILPL1/2 Ciliogenesis Thr73 Thr72 8A Thr72 Ser111 Parkinson’s disease ? PPM1H protein phosphatase ? Rab GTPases Phosphorylation at Thr72 or homologous residues at switch II– effector-binding region LY LY Rab10 Rab8A Rab8A PINK1 EE Figure 3 Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Parkinson’s disease Figure 3 The regulation and downstream function of LRRK2. Pathogenic mutations of LRRK2 have been identified in PD that lead to various trafficking perturbations. Rab29 can activate LRRK2, which leads to its recruitment to the TGN through the ARM and ANK domains. VPS35, a core component of the retromer complex, is mutated in PD (D620N) and is associated with the hyperactivation of LRRK2 activity by an unknown mechanism. LRRK2 has been reported to disrupt endocytic pathways (e.g., EGFR trafficking) via the inhibition of Rab7 activity. LRRK2 phosphorylates Thr72 or homologous residues in the switch II–effector-binding region of a subset of Rab GTPases. PPM1H phosphatase reverses the LLRK2-mediated phosphorylation of Rab GTPases. The phosphorylation of Rab10 and Rab8A regulates ciliogenesis through binding to RILPL1 and RILPL2. Rab8A is phosphorylated in response to PINK1 activation at the Ser111 residue, which can modulate phosphorylation by LRRK2. Abbreviations: α-syn, α-synuclein; ANK, ankyrin; ARM, armadillo; CCV, clathrin-coated vesicle; COR, C-terminal of ROC; EE, early endosome; EGFR, epidermal growth factor receptor; LE, late endosome; LRRK2, leucine-rich repeat kinase 2; LY, lysosome; PD, Parkinson’s disease; PINK1, PTEN-induced kinase 1; Rab, Ras analog in brain; RILPL, Rab-interacting lysosomal protein-like; ROC, Ras of complex; TGN, trans-Golgi network; VPS, vacuolar protein–sorting. oligomerizes around microtubules (Watanabe et al. 2019), and a high-resolution cryo-electron mi- croscopy structure has been solved that shows the C-terminal half of the LRRK2 kinase domain bound to tubulin (Deniston et al. 2020). In future work it will be interesting to understand how LRRK2 regulation of Rab GTPase influences vesicle trafficking along microtubules (Horgan & McCaffrey 2011). However, the most compelling evidence for a link between LRRK2 and Rab biology was the discovery that a subset of Rab GTPases, including Rab1A/B, Rab3, Rab5, Rab8A, Rab10, Rab12, Rab29, Rab35, and Rab43, were substrates of LRRK2 via phosphorylation of a con- served Thr72 or homologous residue within their switch II–effector-binding regions (Figure 3). The phosphorylated Rab8A and Rab10 were suggested to regulate cilia formation through their antagonistic roles by interacting with RILPL1 and RILPL2 (Rab-interacting lysosomal protein-like 1/2), respectively (Dhekne et al. 2018; Steger et al. 2016, 2017) (Figure 3). In- terestingly, Rab phosphorylation by LRRK2 was found to be counteracted by the action of the Golgi-localized PPM1H phosphatase, which dephosphorylates Rab proteins (Figure 3) www.annualreviews.org • Aberrant Vesicle Trafficking in Parkinson’s 249 to regulate primary cilia formation (Berndsen et al. 2019). Figure 3 The LRRK2 activation and subse- quent phosphorylation of various Rab GTPases have been suggested to depend on the LRRK2 association at the membrane of different intracellular compartments (Gomez et al. 2019). Rab8A phosphorylation by LRRK2 was also suggested to promote lipid storage, which might be indirectly linked to PD pathogenesis (Yu et al. 2018). In iPSC (induced pluripotent stem cell)-derived dopaminergic neurons carrying the LRRK2 G2019S mutation, the use of the integrated transcriptomic and proteomic method led to the observation of endocytic dysreg- ulation, which might be due to changes in the expression of several Rab proteins, including Rab5B, Rab7A, and Rab10, along with other endocytic proteins (Connor-Robson et al. 2019). Interestingly, Rab29 was suggested to be an activator of LRRK2 that recruits it to the trans- Golgi network (TGN) to stimulate its kinase activity (Liu et al. 2018, Purlyte et al. 2018) (Figure 3). A major question has been which Rabs are relevant to neurodegeneration in PD. One study ( Jeong et al. 2018) using in vitro kinase assays and tandem mass spectrometry suggested that the dysregulation of Rab35 phosphorylation was associated with neurodegeneration. In a transgenic mouse model expressing mutant LRRK2, Rab35 protein expression was found to be increased in the SN and was suggested as a potential biomarker (Chiu et al. 2016). In an in vivo electroretinogram screen in selected Drosophila dopaminergic neurons, Rab10 was found to be the strongest interactor and Rab3 the weakest with the PD-associated LRRK2-G2019S mutant form (Petridi et al. 2020). Autophagy and LRRK2 A role for LRRK2 in regulating autophagy has been suggested by many studies using knockout or expressing wild-type or PD-associated mutants in many model systems. That said, whether LRRK2 positively or negatively regulates autophagy remains unclear (Figure 3). In differentiated SH-SY5Y cells, the expression of the LRRK2 PD-associated mutant G2019S led to an increase in autophagic vacuoles (AVs) marked by LC3 and neurite shortening (Plowey et al. 2008). This phenotype was similar to that seen in the deletion of Atg7 (an essential autophagy gene) in Purk- inje cells of conditional knockout mutant mice and also leads to the presynaptic accumulation of LRRK2 (Friedman et al. 2012, Komatsu et al. 2007). Moreover, the localization of LRRK2 R1441C to ILVs of MVBs as well as in caveolae neck and filopodia in the endosomal-autophagic pathway has been reported. Here also LRRK2 was reported to cause autophagic impairment leading to an increase in AVs with partly digested cargoes, the accumulation of MVBs, and increased levels of the p62 autophagy receptor (Alegre-Abarrategui et al. 2009). In Saccharomyces cerevisiae, the GTPase domain of LRRK2 (Figure 3) has been shown to be important for mod- ulating endocytic and autophagic activity (Xiong et al. 2010). In mice studies (Tong et al. 2010, 2012), knockout of LRRK2 showed age-dependent biphasic alterations in autophagy pathways in kidneys leading to altered LC3-II and p62 levels with an accumulation of lipofuscin granules. Additionally, transgenic mice expressing LRRK2 G2019S showed autophagic impairment in the aged brain (Ramonet et al. 2011). Interestingly, the ALP was found to be impaired in the brains of double-knockout mice of both LRRK2 and LRRK1 (a functional homolog of LRRK2, which is not mutated in PD) but not in the single knockout of either gene (Giaime et al. 2017). Using LRRK2 kinase inhibitors in SH-SY5Y cells, LRRK2 activates a protective autophagic process through the disruption of dynamin-related protein-1 (DRP-1)-dependent mitochondrial dynamics and mitochondrial-derived reactive oxygen species signaling (Saez-Atienzar et al. 2014). Overall, LRRK2 likely modulates autophagic activity, but in future work it will be important to address whether these are direct or indirect effects of LRRK2. With the knowledge that LRRK2 phosphorylates Rab GTPase, future studies investigating autophagy should be undertaken within the prism of potential Rab-dependent mechanisms. Singh • Muqit Singh • Muqit 250 Golgi Trafficking Mediated by LRRK2 and Rab29 Golgi Trafficking Mediated by LRRK2 and Rab29 The association of LRRK2 and Rab29 (also known as Rab7L1), a TGN-associated GTPase that regulates the retrograde trafficking of the mannose-6-phosphate receptor, came from both ge- netic and protein interaction studies, further suggesting the involvement of aberrant trafficking defects in PD (Feng et al. 2018, Wang et al. 2014). In primary rodent neurons as well as a fly model of PD, Rab29 was found to interact with LRRK2 and to rescue a pathogenic degeneration defect associated with the expression of familial PD–associated LRRK2 G2019S or R1441C mu- tants (MacLeod et al. 2013). Later, a large-scale GWAS also identified Rab29 as a risk locus for PD (Nalls et al. 2014). In an unbiased screen, Rab29 was found to be an interacting partner of LRRK2 in both in vitro and in vivo systems and promoted the clearance of Golgi-derived vesicles through the ALP (Beilina et al. 2014). This TGN-associated activity of LRRK2 might involve its constitutive phosphorylation by the CK1α kinase and its interaction with VPS52, a subunit of the Golgi-associated retrograde protein complex that regulates fusion at the TGN (Beilina et al. 2020, Chia et al. 2014). The finding that LRRK2 phosphorylates many members of the Rab GTPase family, including Rab29, opens a new avenue of research regarding trafficking perturba- tion in PD. LRRK2 was found to phosphorylate Rab29 at both the Thr71 and Ser72 residues, and the N-terminal domain of LRRK2 is important for optimal phosphorylation at Thr71 (Kalogeropulou et al. 2018, Steger et al. 2017). The Ser72 phosphorylation of Rab29 by LRRK2 has been suggested to alter the morphology and distribution of the TGN (Fujimoto et al. 2018). Furthermore, LRRK2 directly phosphorylates Rab29 in its GTP-bound, membrane-associated form, which in turn regulates LRRK2 activity and recruits it to the TGN (Liu et al. 2018, Purlyte et al. 2018). The Rab29-mediated recruitment of wild-type LRRK2 to the Golgi (Figure 3) leads to centrosomal cohesion deficits due to aberrant Rab8A phosphorylation (Madero-Pérez et al. 2018a, Madero-Pérez et al. 2018b). This centrosomal cohesion deficit resembles defects associ- ated with pathogenic PD-associated LRRK2 mutants that also showed ciliogenesis defects and depends upon both Rab8A and Rab10 phosphorylation as well as on RILP1 (Lara Ordónez et al. 2019) (Figure 3). PINK1/Parkin Regulation of Mitophagy and Link to Rabs PINK1/Parkin Regulation of Mitophagy and Link to Rabs PINK1 and Parkin function in a common mitochondrial signaling pathway to generate the Ub- dependent elimination of damaged mitochondria by autophagy (mitophagy) (Harper et al. 2018, McWilliams & Muqit 2017) (Figure 4). Under healthy cellular conditions, PINK1 is imported into mitochondria, where it undergoes proteolytic cleavage and then is released back into the cy- toplasm where it is degraded via the N-end rule pathway (Yamano & Youle 2013), and Parkin resides in the cytosol in an autoinhibited conformation mediated in part by its N-terminal Ubl domain (Figure 1c) and partly by an autoinhibitory interface between the RING2 and RING0 domains (Chaugule et al. 2011, Trempe et al. 2013, Wauer & Komander 2013). However, in re- sponse to mitochondrial damage (specifically mitochondrial depolarization that can be induced by mitochondrial uncouplers), PINK1 accumulates at the outer mitochondrial membrane (OMM), where it becomes activated and autophosphorylated (Kondapalli et al. 2012, Narendra et al. 2010) (Figure 4). The major role of active PINK1 is to phosphorylate and activate the Parkin E3 ligase; it achieves this via a three-step activation process whereby it phosphorylates Ser65 on Ub resident on protein substrates on the OMM to yield Ser65-phosphorylated Ub (phospho-Ub). Phospho-Ub binds with high affinity to Parkin via a phosphate-binding pocket that leads to release of the Ubl domain, thereby enabling PINK1 to phosphorylate Parkin at a conserved Ser65 site within the Ubl domain (equivalent to the Ub residue) (Kane et al. 2014, Kazlauskaite et al. 2014, Kondapalli et al. 2012, Koyano et al. 2014, Ordureau et al. 2014) (Figure 4). The formation of the cocomplex of Ser65-phosphorylated Parkin bound to phospho-Ub represents the active Parkin conforma- tion and leads to the ubiquitylation of multiple OMM substrates including mitofusins 1 and 2, voltage-dependent anion-selective channel 1–3 (VDAC1–3), and CDGSH iron–sulfur domain- containing protein 1 (CISD1) (Ordureau et al. 2018, 2020; Sarraf et al. 2013). The assembly of new Ub chains at the OMM of mitochondria leads to further PINK-dependent phosphorylation, Parkin recruitment, and activation, thereby creating a powerful feed-forward amplification step that drives mitophagy (Ordureau et al. 2014) (Figure 4). Furthermore, pSer65 poly-Ub chains are resistant to degradation by deubiquitinases, which promotes mitophagic signaling (Wauer et al. 2015). The Interplay Between Retromer Activity and LRRK2 Phosphorylation Our understanding of the dynamic interplay between retromer activity and LRRK2 activity has come from many studies. In a Drosophila model of PD, the overexpression of VPS35, a core com- ponent of the retromer complex (Figure 3), rescued the disease phenotype linked with the ex- pression of mutant LRRK2 associated with PD (Linhart et al. 2014). Loss of function of lrrk, the Drosophila homolog of LRRK2, causes aberrant autophagy and endolysosomal trafficking that was rescued by the expression of the constitutively active form of Rab9 (a small GTPase that regulates retromer-dependent recycling from late endosomes to the Golgi) (Dodson et al. 2014). Further- more, LRRK2 and VPS35, along with Rab5 and Rab11, work in cooperation to regulate synaptic vesicle recycling in Drosophila (Inoshita et al. 2017). In addition, in brain tissues, reduced LRRK2 expression in LRRK2 mutant carriers also showed a reduced retromer function with a decreased level of VPS35 (Zhao et al. 2018). Moreover, the retromer VPS35 PD-associated mutant D620N was found to enhance the kinase activity of LRRK2 as measured by Rab8A, Rab10, and Rab12 phosphorylation (Mir et al. 2018, Vilarino-Guell et al. 2011, Zimprich et al. 2011). The Rab32 interaction with sorting nexin 6 (SNX6) was also suggested to regulate LRRK2-dependent Golgi trafficking (Waschbüsch et al. 2019). This further strengthened the evidence of an interplay be- tween these two genes in trafficking perturbations associated with PD. Overall these studies have firmly placed VPS35 upstream of LRRK2, and the mechanism of how the D620N mutant of VPS35 activates LRRK2 remains to be solved in future work. www.annualreviews.org • Aberrant Vesicle Trafficking in Parkinson’s 251 PINK1/Parkin Regulation of Mitophagy and Link to Rabs PINK1 phosphorylates both Parkin and Ub at the Ser65 residue. Ser65- phosphorylated Ub binds to Parkin, leading to the activation of its E3 Ub ligase activity. Parkin ubiquitylates multiple OMM proteins. Damaged mitochondria also lead to the recruitment of several proteins, including Rab7, Rab7-GAPs, TBC1D15, and TBC1D17, as well as TBK1 kinase, which phosphorylates Rab7 at Ser72. In addition, this damage recruits autophagy receptors that bind ubiquitylated proteins and they in turn recruit autophagy machinery to degrade mitochondria through the selective autophagy known as mitophagy. In response to oxidative stress, mitochondria can also release MDVs that fuse with lysosomes through the recruitment of syntaxin-17 that forms a SNARE complex with SNAP29 and VAMP7. PINK1 activation also leads to the phosphorylation of several Rab GTPases such as Rab8A, Rab8B, and Rab13 at the Ser111 residue. The kinases or phosphatases involved in these phosphorylation events remain unknown. Abbreviations: CCV, clathrin-coated vesicle; EE, early endosome; ER, endoplasmic reticulum; GAP, GTPase-activating protein; LE, late endosome; LY, lysosome; MDV, mitochondria-derived vesicle; NSF, N-ethylmaleimide-sensitive factor; OMM, outer mitochondrial membrane; PARL, presenilins-associated rhomboidlike; PINK1, PTEN-induced kinase 1; PM, plasma membrane; Rab, Ras analog in brain; SNAP, soluble NSF-attachment protein; SNARE, soluble N-ethylmaleimide-sensitive factor attachment protein receptors; TBK1, TANK-binding kinase 1; TGN, trans-Golgi network; Ub, ubiquitin; VAMP, vesicle-associated membrane protein. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. The PINK1-Parkin signaling pathway. Under healthy conditions, PINK1 is degraded in the cytosol after its cleavage following precursor import into mitochondria by the intramembrane protease PARL, which leads to its release into the cytoplasm. Upon mitochondrial depolarization, PINK1 accumulates on the outer mitochondrial membrane through an unknown mechanism and is activated and autophosphorylated (small red spheres). PINK1 phosphorylates both Parkin and Ub at the Ser65 residue. Ser65- phosphorylated Ub binds to Parkin, leading to the activation of its E3 Ub ligase activity. Parkin ubiquitylates multiple OMM proteins. PINK1/Parkin Regulation of Mitophagy and Link to Rabs The mechanism of Parkin activation by phosphorylation has been comprehensively studied by structural analysis, revealing the sequential release of autoinhibitory interfaces culminating in the binding of the phospho-Ser65 Ubl domain to the RING0 domain to release its autoinhibition of the catalytic Cys431 within the RING2 domain. This release enables the transthiolation of the Cys431 by Ub from the charged E2 to allow substrate ubiquitylation (Gladkova et al. 2018, Sauvé et al. 2018). While early cell biology studies used human cell lines and Parkin overexpression, this model of Parkin activation by PINK1 has been validated in both primary mouse neurons and human- induced neurons (McWilliams et al. 2018; Ordureau et al. 2018, 2020). The model has also been demonstrated by showing that mutation of Parkin Ser65 to Ala or Asn inactivates Parkin activity in a mouse knock-in model in vivo and leads to early-onset PD in humans, respectively (McWilliams et al. 2018). The contribution of endogenous PINK1 to stress-evoked mitophagy has recently been demonstrated in human-induced neurons exposed to mitochondrial depolar- ization using the mitophagy reporter mito-Keima (Ordureau et al. 2020). This conclusion also follows from previous studies using PINK1 and Parkin knockout models that showed that, in response to mitochondrial stress in vivo (induced genetically in a mouse model of mitochondrial stress or acquired through exhaustive exercise regimes), PINK1 and Parkin are critical for Singh • Muqit 252 PM CCV Ser111 Nucleus Ub Ser72 Ser65 Ser65 TBK1 Damaged mitochondria Phosphatases? Rab8A Rab7 Rab7 Rab5 Rab13 TGN Golgi ER Rab8B Parkin Syntaxin-17 VAMP7 LY LE EE SNAP29 Kinases? Degradation PINK1 PINK1 Mitochondrial depolarization Mitochondrial depolarization Healthy mitochondria TBC1D15 TBC1D15 TBC1D17 TBC1D17 MDVs ? ? ? Autolysosomes Phagophore Autophagosomes Autophagy receptors Autophagy adapters OMM proteins Rab7A Rab7A PM CCV Ser111 Nucleus Ub Ser72 Ser65 Ser65 TBK1 Damaged mitochondria Phosphatases? Rab8A Rab7 Rab7 Rab5 Rab13 TGN Golgi ER Rab8B Parkin Syntaxin-17 VAMP7 LY LE EE SNAP29 Kinases? Degradation PINK1 PINK1 Mitochondrial depolarization Mitochondrial depolarization Healthy mitochondria TBC1D15 TBC1D15 TBC1D17 TBC1D17 MDVs ? ? ? Autolysosomes Phagophore Autophagosomes Autophagy receptors Autophagy adapters OMM proteins Rab7A Rab7A Figure 4 The PINK1-Parkin signaling pathway. Under healthy conditions, PINK1 is degraded in the cytosol after its cleavage following precursor import into mitochondria by the intramembrane protease PARL, which leads to its release into the cytoplasm. Upon mitochondrial depolarization, PINK1 accumulates on the outer mitochondrial membrane through an unknown mechanism and is activated and autophosphorylated (small red spheres). PINK1/Parkin Regulation of Mitophagy and Link to Rabs Damaged mitochondria also lead to the recruitment of several proteins, including Rab7, Rab7-GAPs, TBC1D15, and TBC1D17, as well as TBK1 kinase, which phosphorylates Rab7 at Ser72. In addition, this damage recruits autophagy receptors that bind ubiquitylated proteins and they in turn recruit autophagy machinery to degrade mitochondria through the selective autophagy known as mitophagy. In response to oxidative stress, mitochondria can also release MDVs that fuse with lysosomes through the recruitment of syntaxin-17 that forms a SNARE complex with SNAP29 and VAMP7. PINK1 activation also leads to the phosphorylation of several Rab GTPases such as Rab8A, Rab8B, and Rab13 at the Ser111 residue. The kinases or phosphatases involved in these phosphorylation events remain unknown. Abbreviations: CCV, clathrin-coated vesicle; EE, early endosome; ER, endoplasmic reticulum; GAP, GTPase-activating protein; LE, late endosome; LY, lysosome; MDV, mitochondria-derived vesicle; NSF, N-ethylmaleimide-sensitive factor; OMM, outer mitochondrial membrane; PARL, presenilins-associated rhomboidlike; PINK1, PTEN-induced kinase 1; PM, plasma membrane; Rab, Ras analog in brain; SNAP, soluble NSF-attachment protein; SNARE, soluble N-ethylmaleimide-sensitive factor attachment protein receptors; TBK1, TANK-binding kinase 1; TGN, trans-Golgi network; Ub, ubiquitin; VAMP, vesicle-associated membrane protein. www.annualreviews.org • Aberrant Vesicle Trafficking in Parkinson’s 253 maintaining dopaminergic neuronal survival and preventing the development of Parkinsonian features (Pickrell et al. 2015, Sliter et al. 2018). Vesicular trafficking machinery is required for multiple steps in autophagy including the delivery of membranes to the site of phagophore formation and autophagosome-lysosome fusion (Søreng et al. 2018). The initial evidence for a specific role of Rabs in mitophagy was the report that the Rab7 GTPase-activating protein (Rab7-GAP) TBC1D15 (Figure 4) regulates mito- autophagosome biogenesis, and that TBC1D15 knockout cells exhibit excessive LC3-positive autophagosome structures around damaged mitochondria (Yamano et al. 2014). A similar effect was seen with TBC1D17 (Figure 4) and was mitigated by knockdown of Rab7, suggesting that overactivation of Rab7 activity underlies the phenotype and highlighting the critical role of Rab7 in the regulation of mito-autophagosome formation (Yamano et al. 2014). Because Rab7 is found primarily on late endosomes and lysosomal membranes, the mechanism was initially not clear. However, Yamano and colleagues (2018) further demonstrated that Rab7 is recruited to damaged mitochondria together with the upstream regulator Rab5. The activation of Rab5 at mitochondria led to the recruitment of its effectors MON1/CCZ1, which in turn recruited GDP-bound Rab7 dependent on Parkin activation (Yamano et al. 2018). PINK1/Parkin Regulation of Mitophagy and Link to Rabs An alternative model for the role of Rab7 in mitophagy has been proposed through which Rab7 activity and localization to the mitochondria is regulated by the interaction between the retromer complex and TBC1D5 (retromer-associated Rab7-specific GAP) ( Jimenez-Orgaz et al. 2018). Further, mitophagy was suppressed in cells in which VPS29, VPS35, and TBC1D5 were knocked out, and Rab7 localization was shifted to late endosomal-lysosomal membranes where it was hyperactive ( Jimenez-Orgaz et al. 2018). Several Ub-binding autophagy receptors have been identified, including Optineurin (OPTN1), Tax-1 binding protein (TAX1BP1), p62/SQSTM1, and coiled-coil domain-containing protein 2 (CALCOCO2/NDP52), that are recruited to Ub chains assembled at the OMM and are required for mitophagy (Heo et al. 2015, Lazarou et al. 2015, Richter et al. 2016). Akin to other forms of selective autophagy such as xenophagy, PINK1/Parkin–induced recruitment of OPTN1 is associated with the activation of TANK-binding kinase 1 (TBK1), which phosphory- lates OPTN1 to increase its affinity for Ub chain binding (Heo et al. 2015, Richter et al. 2016). This promotes further OPTN1 recruitment to damaged mitochondria, in turn increasing fur- ther TBK1 activation (Figure 4) and creating a feed-forward loop that is critical for mitophagy (Heo et al. 2015, Richter et al. 2016). TBK1 has also been demonstrated to phosphorylate Rab7 at Ser72 (Figure 4) that lies within the switch II domain and is the equivalent site on other Rabs targeted by the LRRK2 kinase (Heo et al. 2018). The phosphorylation of Rab7 at Ser72 is critical for mitophagy because cells expressing the nonphosphorylatable Rab7 [Ser72Ala] mutant could no longer undergo mitophagy and were associated with a defect in the recruitment of autophago- some components to sites of damaged mitochondria (Heo et al. 2018). The contribution of Rab Ser72 phosphorylation to mitophagy has been established in HeLa cells overexpressing Parkin, and probing the contribution of Rab 7 phosphorylation in cells more relevant to PD pathogenesis will be interesting. Because TBK1 is also implicated in regulating the cyclic GMP-AMP synthase (cGAS)-stimulator of interferon genes (STING) pathway in innate immune signaling, it will also be intriguing to explore the role of Rab7 in the STING-mediated neuroinflammation that has been found in PINK1/Parkin mouse models in which STING inflammation is increased by the accumulation of mtDNA mutations in the cytosol following exhaustive exercise (Sliter et al. 2018). PINK1/Parkin Regulation of Mitophagy and Link to Rabs PINK1/Parkin and Mitochondrial-Derived Vesicles In Drosophila, while PINK1/Parkin–dependent mitophagy is evident, the half-lives of several mi- tochondrial proteins dependent on PINK1/Parkin were also found to be independent of ATG7, Singh • Muqit 254 suggesting that there are additional autophagy-independent mechanisms of mitochondrial pro- tein turnover (Vincow et al. 2013). This has been further extended in cultured mammalian cell lines in which mitochondria-derived vesicles (MDVs) have been detected that traffic specific mi- tochondrial protein cargoes to lysosomes for degradation in a strict PINK1/Parkin–dependent manner (McLelland et al. 2014, Soubannier et al. 2012). MDVs occur under basal conditions but are upregulated in response to oxidative stress, which promotes the generation of MDVs con- taining oxidized cargoes (McLelland et al. 2014). The composition and identity of MDVs are dependent on the source of oxidative stress, with intramitochondrial stressors such as antimycin A (complex III inhibitor) inducing double-membrane MDVs positive for inner membrane and ma- trix components (e.g., pyruvate dehydrogenase [PDH]) but negative for OMM proteins, whereas more general oxidative stress outside the mitochondria led to the formation of single-membrane MDVs that were positive for OMM components (e.g., Tom20 or VDAC1) but negative for PDH1 (McLelland et al. 2014, 2016). Interestingly, endogenous PINK1 and Parkin have not been de- tected in MDVs, although this may be due to limitations on detection with current antibody tools. While disease-associated Parkin mutants (e.g., C431F) affect the formation of MDVs under ox- idative stress, the Ub-dependent mechanisms of MDV formation remain to be fully elucidated— whether there are differential substrates, Ub linkages, and Ub receptors to those of mitophagy are unknown (McLelland et al. 2014). Furthermore, it remains to be established whether phospho-Ub is required for MDV generation. However, the regulation of PINK1/Parkin–dependent MDVs appears to be distinct from mitophagy, as the former can occur independently of Drp1, which promotes mitochondrial fission (Soubannier et al. 2012). Furthermore, the targeting of MDVs to the late endosome/lysosome compartment is dependent on the SNARE syntaxin-17 that forms a ternary SNARE complex with SNAP29 and VAMP7 to mediate MDV-endolysosome fusion (Figure 4), and this SNARE machinery is not required for mitophagy (McLelland et al. 2016). www.annualreviews.org • Aberrant Vesicle Trafficking in Parkinson’s PINK1/Parkin Regulation of Mitophagy and Link to Rabs In striking contrast to cultured cell lines, PINK1 and Parkin have been demonstrated to inhibit MDV formation in immune cells, which is required for mitochondrial antigen presentation (MitAP) crit- ical for the expression of MHC I peptides at the cell surface for T cell recognition and activation (Matheoud et al. 2016). The generation of MDVs and MitAP is dependent on the SNX9 required for clathrin-mediated endocytosis and the Rab9 required for late endosome fusion, and SNX9 levels have been observed to be regulated by Parkin (Matheoud et al. 2016). The relevance of this pathway to PD has been strikingly demonstrated in PINK1-knockout mice exposed to intestinal infection by gram-negative bacteria (Matheoud et al. 2019). This led to a MitAP response and the induction of cytotoxic mitochondrial CD8+ T cells in the periphery, which in turn triggered dopaminergic pathological deficits in the brain associated with L-Dopa-responsive motor deficits (Matheoud et al. 2019). This has opened a new area of biological research in which PINK1 and Parkin may have critical roles in adaptive immunity to repress mitochondrial antigens that may k th CNS i fl ti t ib ti t PD th i suggesting that there are additional autophagy-independent mechanisms of mitochondrial pro- tein turnover (Vincow et al. 2013). This has been further extended in cultured mammalian cell lines in which mitochondria-derived vesicles (MDVs) have been detected that traffic specific mi- tochondrial protein cargoes to lysosomes for degradation in a strict PINK1/Parkin–dependent manner (McLelland et al. 2014, Soubannier et al. 2012). MDVs occur under basal conditions but are upregulated in response to oxidative stress, which promotes the generation of MDVs con- taining oxidized cargoes (McLelland et al. 2014). The composition and identity of MDVs are dependent on the source of oxidative stress, with intramitochondrial stressors such as antimycin A (complex III inhibitor) inducing double-membrane MDVs positive for inner membrane and ma- trix components (e.g., pyruvate dehydrogenase [PDH]) but negative for OMM proteins, whereas more general oxidative stress outside the mitochondria led to the formation of single-membrane MDVs that were positive for OMM components (e.g., Tom20 or VDAC1) but negative for PDH1 (McLelland et al. 2014, 2016). Interestingly, endogenous PINK1 and Parkin have not been de- tected in MDVs, although this may be due to limitations on detection with current antibody tools. PINK1/Parkin Regulation of Mitophagy and Link to Rabs While disease-associated Parkin mutants (e.g., C431F) affect the formation of MDVs under ox- idative stress, the Ub-dependent mechanisms of MDV formation remain to be fully elucidated— whether there are differential substrates, Ub linkages, and Ub receptors to those of mitophagy are unknown (McLelland et al. 2014). Furthermore, it remains to be established whether phospho-Ub is required for MDV generation. However, the regulation of PINK1/Parkin–dependent MDVs appears to be distinct from mitophagy, as the former can occur independently of Drp1, which promotes mitochondrial fission (Soubannier et al. 2012). Furthermore, the targeting of MDVs to the late endosome/lysosome compartment is dependent on the SNARE syntaxin-17 that forms a ternary SNARE complex with SNAP29 and VAMP7 to mediate MDV-endolysosome fusion (Figure 4), and this SNARE machinery is not required for mitophagy (McLelland et al. 2016). In striking contrast to cultured cell lines, PINK1 and Parkin have been demonstrated to inhibit MDV formation in immune cells, which is required for mitochondrial antigen presentation (MitAP) crit- ical for the expression of MHC I peptides at the cell surface for T cell recognition and activation (Matheoud et al. 2016). The generation of MDVs and MitAP is dependent on the SNX9 required for clathrin-mediated endocytosis and the Rab9 required for late endosome fusion, and SNX9 levels have been observed to be regulated by Parkin (Matheoud et al. 2016). The relevance of this pathway to PD has been strikingly demonstrated in PINK1-knockout mice exposed to intestinal infection by gram-negative bacteria (Matheoud et al. 2019). This led to a MitAP response and the induction of cytotoxic mitochondrial CD8+ T cells in the periphery, which in turn triggered dopaminergic pathological deficits in the brain associated with L-Dopa-responsive motor deficits (Matheoud et al. 2019). This has opened a new area of biological research in which PINK1 and Parkin may have critical roles in adaptive immunity to repress mitochondrial antigens that may provoke the CNS neuroinflammation contributing to PD pathogenesis. PINK1 Regulation of the Rab SF3 Motif A subset of Rab GTPases, including Rab8A, Rab8B, Rab13, and Rab1A/1B, have been reported to be phosphorylated at a highly conserved Ser111 residue upon PINK1 activation (Lai et al. 2015) (Figure 4). The regulation of Rabs by PINK1 appears to be indirect, and the identity of the upstream Rab kinase remains unknown. The Ser111 residue lies within a C-terminal α3/β5 loop of Rab8A known as the SF3 motif and lies adjacent to the effector-binding switch II domain. Structural heterogeneity within the SF3 motif across diverse Rabs suggests that this region also determines effector binding. Previous studies (Ostermeier & Brunger 1999) have reported a role for the SF3 motif in the selective recruitment of effectors via direct effector-specific contact sites, www.annualreviews.org • Aberrant Vesicle Trafficking in Parkinson’s 255 e.g., the recruitment of Rabphilin by Rab3A via SF3 motif–binding sites. Clues to how phospho- rylation of the SF3 motif alters such effector interactions have recently been obtained by exploit- ing gene codon expansion technologies to purify preparative amounts of Ser111-phosphorylated Rab8A (Vieweg et al. 2020). Phosphorylation of Rab8A led to impaired interactions with its GEFs, Rabin8, and GAPs. Analysis of the phospho-Ser111 Rab8A crystal structure revealed an in- tramolecular H bond created by the presence of the phosphate at Ser111 with an Arg79 side chain (Vieweg et al. 2020). Molecular dynamics (MD) simulation studies of the Rab8A:Rabin8 complex structure demonstrate a salt-bridge interaction between residue Asp187 of Rabin8 with Arg79; this structure would be predicted to be weakened or disrupted by the addition of a negative charge by pSer111 that lies opposite the negative surface patch of Rabin8 containing Asp187 (Pourjafar- Dehkordi et al. 2019). The specific effectors for phospho-Ser111 Rab8A remain unknown, a gap that has hampered progress in understanding the downstream biology of phospho-Ser111 Rab8A; however, phospho-Ser111 Rab8A has been shown to impair the ability of the LRRK2 kinase to phosphorylate its Thr72 residue within the switch II domain (Vieweg et al. 2020) (Figure 3). Because hyperactive R1441G LRRK2-phosphorylated Rab Thr72 recruits RILPL1 and RILPL2 leading to inhibition of primary cilia in the brains of mice (Dhekne et al. 2018), understanding the contribution of PINK1-regulated Rab phosphorylation to this process in vivo would be of inter- est. CONCLUDING REMARKS AND CLINICAL APPLICATION The identification of monogenic forms of PD has led to the elaboration of vesicular trafficking pathways whose disruption are major causal mechanisms in PD. This knowledge has been crucial for the development of therapeutic strategies against PD. Currently, clinical trials are advancing for the evaluation of human monoclonal antibodies that preferentially bind oligomeric α-syn and prevent cell-to-cell transmission and progression, including the PASDENA Phase II trial being undertaken by Roche. Trials for LRRK2 inhibitors are also underway in several companies in- cluding Denali Therapeutics, whose LRRK2 inhibitor DNL201 was found to be safe for humans in Phase I studies. In addition, Biogen is currently evaluating an antisense oligonucleotide against LRRK2 in Phase I studies. A major question is whether these strategies will be beneficial for pa- tients beyond those monogenic individuals harboring causal mutations, and this will be dependent on uncovering common overlapping pathways between genes. An exemplar of this has been the discovery that VPS35 [D620N] mutations lead to increased LRRK2-mediated Rab phosphoryla- tion, thereby placing VPS35 upstream of LRRK2 and suggesting that VPS35 patients may also benefit from LRRK2 inhibitors and should be assessed in ongoing clinical trials (Mir et al. 2018). Our increased understanding of Rab biology and vesicular trafficking mechanisms between dis- tinct PD gene pathways now provides a tractable framework to uncover further knowledge that will expand our ability to stratify PD patients for future disease-modifying therapies. PINK1 Regulation of the Rab SF3 Motif The contribution of the Ser111 phosphorylation of Rabs to mitophagy and MDV generation is also unknown, although none of these Rab components were found to be essential in a recent CRISPR genome-wide screen for mitophagy regulators (Heo et al. 2019). Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. ACKNOWLEDGMENTS We apologize to our colleagues whose work we were unable to discuss or cite due to space limitations. DISCLOSURE STATEMENT M.M.K.M. is a member of the Scientific Advisory Board of Mitokinin Inc. and serves as a member of the Wellcome Trust Clinical Interview Committee. M.M.K.M. is funded by a Wellcome Trust Senior Research Fellowship in Clinical Science (210753/Z/18/Z), the Michael J. Fox Foundation for Parkinson’s Research, the Medical Research Council, the Rosetrees Trust, Astex Pharmaceuti- cals Ltd.,and an EMBO (European Molecular Biology Organization) Young Investigator Program Award. Singh • Muqit 256 Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Anwar S, Peters O, Millership S, Ninkina N, Doig N, et al. 2011. Functional alterations to the nigrostriatal system in mice lacking all three members of the synuclein family. J. Neurosci. 31:7264–74 Bandres-Ciga S, Diez-Fairen M, Kim JJ, Singleton AB. 2020. Genetics of Parkinson’s disease: an introspection of its journey towards precision medicine. Neurobiol. Dis. 137:104782 Beilina A, Bonet-Ponce L, Kumaran R, Kordich JJ, Ishida M, et al. 2020. The Parkinson’s disease protein LRRK2 interacts with the GARP complex to promote retrograde transport to the trans-Golgi network. Cell Rep. 31:107614 Beilina A, Rudenko IN, Kaganovich A, Civiero L, Chau H, et al. 2014. Unbiased screen for interactors of leucine-rich repeat kinase 2 supports a common pathway for sporadic and familial Parkinson disease. PNAS 111:2626–31 Berndsen K, Lis P, Yeshaw WM, Wawro PS, Nirujogi RS, et al. 2019. PPM1H phosphatase counteracts LRRK2 signaling by selectively dephosphorylating Rab proteins. eLife 8:e50416 Bliederhaeuser C, Grozdanov V, Speidel A, Zondler L, Ruf WP, et al. 2016. Age-dependent defects of alpha- synuclein oligomer uptake in microglia and monocytes. Acta Neuropathol. 131:379–91 Bonet-Ponce L, Cookson MR. 2019. The role of Rab GTPases in the pathobiology of Parkinson’ disease. Curr. Opin. Cell Biol. 59:73–80 Borghi R, Marchese R, Negro A, Marinelli L, Forloni G, et al. 2000. Full length α-synuclein is present in cerebrospinal fluid from Parkinson’s disease and normal subjects. Neurosci. Lett. 287:65–67 Breda C, Nugent ML, Estranero JG, Kyriacou CP, Outeiro TF, et al. 2015. Rab11 modulates α-synuclein- mediated defects in synaptic transmission and behaviour. Hum. Mol. Genet. 24:1077–91 Burré J,Sharma M,Tsetsenis T,Buchman V,Etherton MR,Südhof TC.2010.α-Synuclein promotes SNARE- complex assembly in vivo and in vitro. Science 329:1663–67 Cao M, Wu Y, Ashrafi G, McCartney AJ, Wheeler H, et al. 2017. Parkinson Sac domain mutation in synap- tojanin 1 impairs clathrin uncoating at synapses and triggers dystrophic changes in dopaminergic axons. Neuron 93:882–96 Chai YJ, Sierecki E, Tomatis VM, Gormal RS, Giles N, et al. 2016. Munc18-1 is a molecular chaperone for α-synuclein, controlling its self-replicating aggregation. J. Cell Biol. 214:705–18 Chandra S, Gallardo G, Fernández-Chacón R, Schlüter OM, Südhof TC. 2005. α-Synuclein cooperates with CSPα in preventing neurodegeneration. Cell 123:383–96 Chaugule VK, Burchell L, Barber KR, Sidhu A, Leslie SJ, et al. 2011. Autoregulation of Parkin activity through its ubiquitin-like domain. EMBO J. 30:2853–67 Chen YA, Scheller RH. 2001. SNARE-mediated membrane fusion. Nat. Rev. Mol. Cell Biol. LITERATURE CITED Ahmadi Rastegar D, Dzamko N. 2020. Leucine rich repeat kinase 2 and innate immunity. Front. Neurosci. 14:193 Alegre-Abarrategui J, Christian H, Lufino MMP, Mutihac R, Venda LL, et al. 2009. LRRK2 regulates au- tophagic activity and localizes to specific membrane microdomains in a novel human genomic reporter cellular model. Hum. Mol. Genet. 18:4022–34 Alessi DR, Sammler E. 2018. LRRK2 kinase in Parkinson’s disease. Science 360:36–37 Alvarez-Erviti L, Seow Y, Schapira AH, Gardiner C, Sargent IL, et al. 2011. Lysosomal dysfunction increases di d l h l i l d i i N bi l Di 42 360 67 Alvarez-Erviti L, Seow Y, Schapira AH, Gardiner C, Sargent IL, et al. 2011. Lysosomal dysfunction increases exosome-mediated alpha-synuclein release and transmission. Neurobiol. Dis. 42:360–67 Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Dis. 16:92–97 Dalfó E, Ferrer I. 2005. α-Synuclein binding to rab3a in multiple system a Dalfó E, Ferrer I. 2005. α-Synuclein binding to rab3a in multiple system atrophy. Neurosci. Lett. 380:170–75 Dalfó E, Gómez-Isla T, Rosa JL, Nieto Bodelón M, Cuadrado Tejedor M, et al. 2004b. Abnormal α-synuclein interactions with Rab proteins in α-synuclein A30P transgenic mice. J. Neuropathol. Exp. Neurol. 63:302– 13 Darios F, Ruipérez V, López I, Villanueva J, Gutierrez LM, Davletov B. 2010. α-Synuclein sequesters arachi- donic acid to modulate SNARE-mediated exocytosis. EMBO Rep. 11:528–33 Deniston CK, Salogiannis J, Mathea S, Snead DM, Lahiri I, et al. 2020. Parkinson’s disease-linked LRRK2 structure and model for microtubule interaction. bioRxiv 895367. https://doi.org/10.1101/2020.01. 06.895367 DeWitt DC, Rhoades E. 2013. α-Synuclein can inhibit SNARE-mediated vesicle fusion through direct inter- actions with lipid bilayers. Biochemistry 52:2385–87 Dhekne HS, Yanatori I, Gomez RC, Tonelli F, Diez F, et al. 2018. A pathway for Parkinson’s Disease LRRK2 kinase to block primary cilia and Sonic hedgehog signaling in the brain. eLife 7:e40202 Dinter E, Saridaki T, Nippold M, Plum S, Diederichs L, et al. 2016. Rab7 induces clearance of aggregates. J. Neurochem. 138:758–74 Dodson MW, Leung LK, Lone M, Lizzio MA, Guo M. 2014. Novel ethyl methanesulfonate (EMS)-induced null alleles of the Drosophila homolog of LRRK2 reveal a crucial role in endolysosomal functions and autophagy in vivo. Dis. Model. Mech. 7:1351–63 Dodson MW, Zhang T, Jiang C, Chen S, Guo M. 2012. Roles of the Drosophila LRRK2 homolog in Rab7- dependent lysosomal positioning. Hum. Mol. Genet. 21:1350–63 V, Lesage S. 2014. Synaptojanin 1 mutation in Parkinson’s disease brings further insight into th uropathological mechanisms Biomed Res Int 2014:289728 Drouet V, Lesage S. 2014. Synaptojanin 1 mutation in Parkinson’s disease brings further insight into the neuropathological mechanisms. Biomed. Res. Int. 2014:289728 Edvardson S, Cinnamon Y, Ta-Shma A, Shaag A, Yim YI, et al. 2012. A deleterious mutation in DNAJC6 en- coding the neuronal-specific clathrin-uncoating co-chaperone auxilin, is associated with juvenile parkin- sonism. PLOS ONE 7:e36458 El-Agnaf OMA, Salem SA, Paleologou KE, Cooper LJ, Fullwood NJ, et al. 2003. α-Synuclein implicated in Parkinson’s disease is present in extracellular biological fluids, including human plasma. FASEB J. 17:1945–47 El-Agnaf OMA, Salem SA, Paleologou KE, Curran MD, Gibson MJ, et al. 2006. Detection of oligomeric forms of α-synuclein protein in human plasma as a potential biomarker for Parkinson’s disease. FASEB J. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. 2:98–106 Cheng F, Li X, Li Y, Wang C, Wang T, et al. 2011. α-Synuclein promotes clathrin-mediated NMDA receptor endocytosis and attenuates NMDA-induced dopaminergic cell death. J. Neurochem. 119:815–25 Chia R, Haddock S, Beilina A, Rudenko IN, Mamais A, et al. 2014. Phosphorylation of LRRK2 by casein kinase 1α regulates trans-Golgi clustering via differential interaction with ARHGEF7. Nat. Commun. 5:5827 www.annualreviews.org • Aberrant Vesicle Trafficking in Parkinson’s 257 Chiu CC, Yeh TH, Lai SC, Weng YH, Huang YC, et al. 2016. Increased Rab35 expression is a potential biomarker and implicated in the pathogenesis of Parkinson’s disease. Oncotarget 7:54215–27 Choi BK,Choi MG,Kim JY,Yang Y,Lai Y,et al.2013.Large α-synuclein oligomers inhibit neuronal SNARE- mediated vesicle docking. PNAS 110:4087–92 g Choi MG, Kim MJ, Kim DG, Yu R, Jang YN, Oh WJ. 2018. Sequestration of synaptic proteins by alpha- synuclein aggregates leading to neurotoxicity is inhibited by small peptide. PLOS ONE 13:e0195339 Chua CE, Tang BL. 2011. Rabs, SNAREs and α-synuclein–membrane trafficking defects in synucleinopathies. B i R R 67 268 81 Choi MG, Kim MJ, Kim DG, Yu R, Jang YN, Oh WJ. 2018. Sequestration of synaptic proteins by alpha- synuclein aggregates leading to neurotoxicity is inhibited by small peptide. PLOS ONE 13:e0195339 h b d l bi k d l h J J g J q y p p y p synuclein aggregates leading to neurotoxicity is inhibited by small peptide. PLOS ONE 13:e0195339 Chua CE, Tang BL. 2011. Rabs, SNAREs and α-synuclein–membrane trafficking defects in synucleinopathies. Brain Res. Rev. 67:268–81 Chua CE, Tang BL. 2011. Rabs, SNAREs and α-synuclein–membrane trafficking defects in synucleinopathies. Brain Res. Rev. 67:268–81 Connor-Robson N, Booth H, Martin JG, Gao B, Li K, et al. 2019. An integrated transcriptomics and pro- teomics analysis reveals functional endocytic dysregulation caused by mutations in LRRK2. Neurobiol. Dis. 127:512–26 Cooper AA, Gitler AD, Cashikar A, Haynes CM, Hill KJ, et al. 2006. α-Synuclein blocks ER-Golgi traffic and Rab1 rescues neuron loss in Parkinson’s models. Science 313:324–28 Cooper JM, Wiklander PB, Nordin JZ, Al-Shawi R, Wood MJ, et al. 2014. Systemic exosomal siRNA delivery reduced alpha-synuclein aggregates in brains of transgenic mice. Mov. Disord. 29:1476–85 Dalfó E, Barrachina M, Rosa JL, Ambrosio S, Ferrer I. 2004a. Abnormal α-synuclein interactions with rab3a and rabphilin in diffuse Lewy body disease. Neurobiol. Dis. 16:92–97 Dalfó E, Barrachina M, Rosa JL, Ambrosio S, Ferrer I. 2004a. Abnormal α and rabphilin in diffuse Lewy body disease. Neurobiol. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Giannandrea M, Bianchi V, Mignogna ML, Sirri A, Carrabino S, et al. 2010. Mutations in the small GTPase gene RAB39B are responsible for X-linked mental retardation associated with autism, epilepsy, and macrocephaly. Am. J. Hum. Genet. 86:185–95 Gitler AD, Bevis BJ, Shorter J, Strathearn KE, Hamamichi S, et al. 2008. The Parkinson’s disease protein α-synuclein disrupts cellular Rab homeostasis. PNAS 105:145–50 Gladkova C, Maslen SL, Skehel JM, Komander D. 2018. Mechanism of parkin activation by PINK1. Nature 559:410–14 Gomez RC, Wawro P, Lis P, Alessi DR, Pfeffer SR. 2019. Membrane association but not identity is required for LRRK2 activation and phosphorylation of Rab GTPases. J. Cell Biol. 218:4157–70 Gómez-Suaga P, Rivero-Ríos P, Fdez E, Blanca Ramírez M, Ferrer I, et al. 2014. LRRK2 delays degradative receptor trafficking by impeding late endosomal budding through decreasing Rab7 activity. Hum. Mol. Genet. 23:6779–96 Gonçalves SA, Macedo D, Raquel H, Simões PD, Giorgini F, et al. 2016. shRNA-based screen identifies endocytic recycling pathway components that act as genetic modifiers of alpha-synuclein aggregation, secretion and toxicity. PLOS Genet. 12:e1005995 Grey M, Dunning CJ, Gaspar R, Grey C, Brundin P, et al. 2015. Acceleration of α-synuclein aggregation by exosomes. J. Biol. Chem. 290:2969–82 Griesser E, Wyatt H, Ten Have S, Stierstorfer B, Lenter M, Lamond AI. 2020. Quantitative profiling of the human substantia nigra proteome from laser-capture microdissected FFPE tissue. Mol. Cell Proteom. 19:839–51 Guo M, Wang J, Zhao Y, Feng Y, Han S, et al. 2020. Microglial exosomes facilitate α-synuclein transmission in Parkinson’s disease. Brain 143:1476–97 Gupta A, Pulliam L. 2014. Exosomes as mediators of neuroinflammation. J. Neuroinflammation 11:68 Han C, Xiong N, Guo X, Huang J, Ma K, et al. 2019. Exosomes from patients with Parkinson’s disease are pathological in mice. J. Mol. Med. 97:1329–44 Hardies K, Cai Y, Jardel C, Jansen AC, Cao M, et al. 2016. Loss of SYNJ1 dual phosphatase activity leads to early onset refractory seizures and progressive neurological decline. Brain 139:2420–30 Harper JW, Ordureau A, Heo JM. 2018. Building and decoding ubiquitin chains for mitophagy. Nat. Rev. Mol. Cell Biol. 19:93–108 Heo JM, Harper NJ, Paulo JA, Li M, Xu Q, et al. 2019. Integrated proteogenetic analysis reveals the landscape of a mitochondrial-autophagosome synapse during PARK2-dependent mitophagy. Sci. Adv. 5:eaay4624 Heo JM, Ordureau A, Paulo JA, Rinehart J, Harper JW. 2015. The PINK1-PARKIN mitochondrial ubiq- uitylation pathway drives a program of OPTN/NDP52 recruitment and TBK1 activation to promote mitophagy. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. 20:419–25 Emmanouilidou E, Melachroinou K, Roumeliotis T, Garbis SD, Ntzouni M, et al. 2010. Cell-produced α-synuclein is secreted in a calcium-dependent manner by exosomes and impacts neuronal survival. J. Neurosci. 30:6838–51 Fang F, Yang W, Florio JB, Rockenstein E, Spencer B, et al. 2017. Synuclein impairs trafficking and signaling of BDNF in a mouse model of Parkinson’s disease. Sci. Rep. 7:3868 Singh • Muqit 258 Fasano D, Parisi S, Pierantoni GM, De Rosa A, Picillo M, et al. 2018. Alteration of endosomal trafficking is associated with early-onset parkinsonism caused by SYNJ1 mutations. Cell Death Dis. 9:385 Feng M, Hu X, Li N, Hu F, Chang F, et al. 2018. Distinctive roles of Rac1 and Rab29 in LRRK2 mediated membrane trafficking and neurite outgrowth. J. Biomed. Res. 32:145–56 Friedman LG, Lachenmayer ML, Wang J, He L, Poulose SM, et al. 2012. Disrupted autophagy leads to dopaminergic axon and dendrite degeneration and promotes presynaptic accumulation of α-synuclein and LRRK2 in the brain. J. Neurosci. 32:7585–93 Fujimoto T, Kuwahara T, Eguchi T, Sakurai M, Komori T, Iwatsubo T. 2018. Parkinson’s disease-associated mutant LRRK2 phosphorylates Rab7L1 and modifies trans-Golgi morphology. Biochem. Biophys. Res. Commun. 495:1708–15 Garcia-Reitböck P, Anichtchik O, Bellucci A, Iovino M, Ballini C, et al. 2010. SNARE protein redistribution and synaptic failure in a transgenic mouse model of Parkinson’s disease. Brain 133:2032–44 Giaime E, Tong Y, Wagner LK, Yuan Y, Huang G, Shen J. 2017. Age-dependent dopaminergic neurodegen- eration and impairment of the autophagy-lysosomal pathway in LRRK-deficient mice. Neuron 96:796– 807.e6 Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Mol. Cell 60:7–20 Heo JM, Ordureau A, Swarup S, Paulo JA, Shen K, et al. 2018. RAB7A phosphorylation by TBK1 promotes mitophagy via the PINK-PARKIN pathway. Sci. Adv. 4:eaav0443 Herbst S, Gutierrez MG. 2019. LRRK2 in infection: friend or foe? ACS Infect. Dis. 5:809–15 www.annualreviews.org • Aberrant Vesicle Trafficking in Parkinson’s 259 Horgan CP, McCaffrey MW. 2011. Rab GTPases and microtubule motors. Biochem. Soc. Trans. 39 Houser MC, Tansey MG. 2017. The gut-brain axis: is intestinal inflammation a silent driver of Parkinson’s disease pathogenesis? NPJ Park. Dis. 3:3 Huang C-C, Chiu T-Y, Lee T-Y, Hsieh H-J, Lin C-C, Kao L-S. 2018. Soluble α-synuclein facilitates prim- ing and fusion by releasing Ca2+ from the thapsigargin-sensitive Ca2+ pool in PC12 cells. J. Cell Sci. 131:jcs213017 Inoshita T, Arano T, Hosaka Y, Meng H, Umezaki Y, et al. 2017. Vps35 in cooperation with LRRK2 regulates synaptic vesicle endocytosis through the endosomal pathway in Drosophila. Hum. Mol. Genet. 26:2933–48 h h ll f b f Jahn R, Scheller RH. 2006. SNAREs—engines for membrane fusion. Nat. Rev. Mol. Cell Biol. 7:63 Jensen PH, Li JY, Dahlström A, Dotti CG. 1999. Axonal transport of synucleins is mediated by all rate com- ponents. Eur. J. Neurosci. 11:3369–76 Jeong GR, Jang E-H, Bae JR, Jun S, Kang HC, et al. 2018. Dysregulated phosphorylation of Rab GTPases by LRRK2 induces neurodegeneration. Mol. Neurodegener. 13:8 Jimenez-Orgaz A, Kvainickas A, Nägele H, Denner J, Eimer S, et al. 2018. Control of RAB7 activity and localization through the retromer-TBC1D5 complex enables RAB7-dependent mitophagy. EMBO J. 37:235–54 Kalogeropulou AF,Zhao J,Bolliger MF,Memou A,Narasimha S,et al.2018.P62/SQSTM1 is a novel leucine- rich repeat kinase 2 (LRRK2) substrate that enhances neuronal toxicity. Biochem. J. 475:1271–93 Kane LA, Lazarou M, Fogel AI, Li Y, Yamano K, et al. 2014. PINK1 phosphorylates ubiquitin to activate Parkin E3 ubiquitin ligase activity. J. Cell Biol. 205:143–53 Kazlauskaite A, Kondapalli C, Gourlay R, Campbell DG, Ritorto MS, et al. 2014. Parkin is activated by PINK1-dependent phosphorylation of ubiquitin at Ser65. Biochem. J. 460:127–39 Kett LR, Boassa D, Ho CC, Rideout HJ, Hu J, et al. 2012. LRRK2 Parkinson disease mutations enhance its microtubule association. Hum. Mol. Genet. 21:890–9 Kitada T, Asakawa S, Hattori N, Matsumine H, Yamamura Y, et al. 1998. Mutations in the parkin gene cause autosomal recessive juvenile parkinsonism. Nature 392:605–8 Komatsu M, Wang QJ, Holstein GR, Friedrich VL Jr., Iwata J, et al. 2007. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Essential role for autophagy pro- tein Atg7 in the maintenance of axonal homeostasis and the prevention of axonal degeneration. PNAS 104:14489–94 Kondapalli C, Kazlauskaite A, Zhang N, Woodroof HI, Campbell DG, et al. 2012. PINK1 is activated by mitochondrial membrane potential depolarization and stimulates Parkin E3 ligase activity by phospho- rylating Serine 65. Open Biol. 2:120080 Koyano F, Okatsu K, Kosako H, Tamura Y, Go E, et al. 2014. Ubiquitin is phosphorylated by PINK1 to activate parkin. Nature 510:162–66 Kumar N, Leonzino M, Hancock-Cerutti W, Horenkamp FA, Li P, et al. 2018. VPS13A and VPS13C are lipid transport proteins differentially localized at ER contact sites. J. Cell Biol. 217:3625–39 Kunath T, Natalwala A, Chan C, Chen Y, Stecher B, et al. 2019. Are PARKIN patients ideal candidates for dopaminergic cell replacement therapies? Eur. J. Neurosci. 49:453–62 Kuwahara T, Inoue K, D’Agati VD, Fujimoto T, Eguchi T, et al. 2016. LRRK2 and RAB7L1 coordinately regulate axonal morphology and lysosome integrity in diverse cellular contexts. Sci. Rep. 6:29945 Lai YC, Kondapalli C, Lehneck R, Procter JB, Dill BD, et al. 2015. Phosphoproteomic screening identifies Rab GTPases as novel downstream targets of PINK1. EMBO J. 34:2840–61 Lang AE, Lozano AM. 1998. Parkinson’s disease. First of two parts. N. Engl. J. Med. 339:1044–53 Lara Ordónez AJ, Fernández B, Fdez E, Romo-Lozano M, Madero-Pérez J, et al. 2019. RAB8, RAB10 and RILPL1 contribute to both LRRK2 kinase–mediated centrosomal cohesion and ciliogenesis deficits. Hum. Mol. Genet. 28:3552–68 Lazarou M, Sliter DA, Kane LA, Sarraf SA, Wang C, et al. 2015. The ubiquitin kinase PINK1 recruits au- tophagy receptors to induce mitophagy. Nature 524:309–14 Lee H, Flynn R, Sharma I, Haberman E, Carling PJ, et al. 2020. LRRK2 is recruited to phagosomes and co- recruits RAB8 and RAB10 in human pluripotent stem cell-derived macrophages.Stem Cell Rep.14:940–55 Lee H, Flynn R, Sharma I, Haberman E, Carling PJ, et al. 2020. LRRK2 is recruited to phagosomes and co- recruits RAB8 and RAB10 in human pluripotent stem cell-derived macrophages.Stem Cell Rep.14:940–55 Lee HJ, Patel S, Lee SJ. 2005. Intravesicular localization and exocytosis of α-synuclein and its aggregates. y g p g recruits RAB8 and RAB10 in human pluripotent stem cell-derived macrophages.Stem Cell Rep.14:940–55 Lee HJ, Patel S, Lee SJ. 2005. Intravesicular localization and exocytosis of α-synuclein and its aggregates. J. Neurosci. 25:6016–24 Lee HJ, Patel S, Lee SJ. 2005. Intravesicular localization and exocytosis of α-synuclein and its aggregates. J. Neurosci. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. MacLeod DA, Rhinn H, Kuwahara T, Zolin A, Di Paolo G, et al. 2013. RAB7L1 interacts with LRRK2 to modify intraneuronal protein sorting and Parkinson’s disease risk. Neuron 77:425–39 Madero-Pérez J, Fdez E, Fernández B, Lara Ordónez AJ, Blanca Ramírez M, et al. 2018a. Parkinson disease- associated mutations in LRRK2 cause centrosomal defects via Rab8a phosphorylation. Mol. Neurodegener. 13:3 Madero-Pérez J, Fernández B, Lara Ordónez AJ, Fdez E, Lobbestael E, et al. 2018b. RAB7L1-mediated relo- calization of LRRK2 to the Golgi complex causes centrosomal deficits via RAB8A. Front. Mol. Neurosci. 11:417 Martin I, Dawson VL, Dawson TM. 2011. Recent advances in the genetics of Parkinson’s disease. Annu. Rev. Genom. Hum. Genet. 12:301–25 Mata IF, Jang Y, Kim CH, Hanna DS, Dorschner MO, et al. 2015. The RAB39B p.G192R mutation causes X-linked dominant Parkinson’s disease. Mol. Neurodegener. 10:50 Mata IF, Jang Y, Kim CH, Hanna DS, Dorschner MO, et al. 2015. The R X-linked dominant Parkinson’s disease. Mol. Neurodegener. 10:50 Matheoud D,Cannon T,Voisin A,Penttinen AM,Ramet L,et al.2019.Intestinal infection triggers Parkinson’s disease-like symptoms in Pink1−/−mice. Nature 571:565–69 Matheoud D, Sugiura A, Bellemare-Pelletier A, Laplante A, Rondeau C, et al. 2016. Parkinson’s disease-related proteins PINK1 and Parkin repress mitochondrial antigen presentation. Cell 166:314–27 Mathivanan S, Ji H, Simpson RJ. 2010. Exosomes: extracellular organelles important in intercellular commu- nication. J. Proteom. 73:1907–20 McGough IJ, Steinberg F, Jia D, Barbuti PA, McMillan KJ, et al. 2014. Retromer binding to FAM21 and the WASH complex is perturbed by the Parkinson disease-linked VPS35(D620N) mutation. Curr. Biol. 24:1670–76 McGrath E, Waschbüsch D, Baker BM, Khan AR. 2019. LRRK2 binds to the Rab32 subfamily in a GTP- dependent manner via its armadillo domain. Small GTPases. https://doi.org/10.1080/21541248.2019. 1666623 McLelland GL, Lee SA, McBride HM, Fon EA. 2016. Syntaxin-17 delivers PINK1/parkin-dependent mito- chondrial vesicles to the endolysosomal system. J. Cell Biol. 214:275–91 McLelland GL, Soubannier V, Chen CX, McBride HM, Fon EA. 2014. Parkin and PINK1 function in a vesicular trafficking pathway regulating mitochondrial quality control. EMBO J. 33:282–95 McWilliams TG, Barini E, Pohjolan-Pirhonen R, Brooks SP, Singh F, et al. 2018. Phosphorylation of Parkin at serine 65 is essential for its activation in vivo. Open Biol. 8. https://doi.org/10.1098/rsob.180108 McWilliams TG, Barini E, Pohjolan-Pirhonen R, Brooks SP, Singh F, et al. 2018. Phosphorylation of Parkin at serine 65 is essential for its activation in vivo. Open Biol. 8. https://doi.org/10.1098/rsob.180108 McWilliams TG, Muqit MMK. 2017. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. 25:6016–24 Singh • Muqit 260 Lesage S, Bras J, Cormier-Dequaire F, Condroyer C, Nicolas A, et al. 2015. Loss-of-function mutations in RAB39B are associated with typical early-onset Parkinson disease. Neurol. Genet. 1:e9 Lesage S, Drouet V, Majounie E, Deramecourt V, Jacoupy M, et al. 2016. Loss of VPS13C function in autosomal-recessive Parkinsonism causes mitochondrial dysfunction and increases PINK1/Parkin- dependent mitophagy. Am. J. Hum. Genet. 98:500–13 Linhart R,Wong SA,Cao J,Tran M,Huynh A,et al.2014.Vacuolar protein sorting 35 (Vps35) rescues locomo- tor deficits and shortened lifespan in Drosophila expressing a Parkinson’s disease mutant of Leucine-Rich Repeat Kinase 2 (LRRK2). Mol. Neurodegener. 9:23 Liu J, Zhang JP, Shi M, Quinn T, Bradner J, et al. 2009. Rab11a and HSP90 regulate recycling of extracellular α-synuclein. J. Neurosci. 29:1480–85 Liu Z, Bryant N, Kumaran R, Beilina A, Abeliovich A, et al. 2018. LRRK2 phosphorylates membrane-bound Rabs and is activated by GTP-bound Rab7L1 to promote recruitment to the trans-Golgi network. Hum. Mol. Genet. 27:385–95 Lunati A, Lesage S, Brice A. 2018. The genetic landscape of Parkinson’s disease. Rev. Neurol. 174:628–43 Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. PINK1 and Parkin: emerging themes in mitochondrial homeostasis. at serine 65 is essential for its activation in vivo. Open Biol. 8. https://doi.org/10.1098/rsob.180108 McWilliams TG, Muqit MMK. 2017. PINK1 and Parkin: emerging themes in mitochondrial homeostasis. Curr. Opin. Cell Biol. 45:83–91 McWilliams TG, Muqit MMK. 2017. PINK1 and Parkin: emerging themes in mitochondrial homeostasis. Curr. Opin. Cell Biol. 45:83–91 Mir R, Tonelli F, Lis P, Macartney T, Polinski NK, et al. 2018. The Parkinson’s disease VPS35[D620N] mutation enhances LRRK2-mediated Rab protein phosphorylation in mouse and human. Biochem. J. 475:1861–83 Muller MP, Goody RS. 2018. Molecular control of Rab activity by GEFs, GAPs and GDI. Small GTPases 9:5–21 www.annualreviews.org • Aberrant Vesicle Trafficking in Parkinson’s 261 Nalls MA, Blauwendraat C, Vallerga CL, Heilbron K, Bandres-Ciga S, et al. 2019. Identification of novel risk loci,causal insights,and heritable risk for Parkinson’s disease: a meta-analysis of genome-wide association studies. Lancet Neurol. 18:1091–102 Nalls MA, Pankratz N, Lill CM, Do CB, Hernandez DG, et al. 2014. Large-scale meta-analysis of genome- wide association data identifies six new risk loci for Parkinson’s disease. Nat. Genet. 46:989–93 Narendra DP, Jin SM, Tanaka A, Suen DF, Gautier CA, et al. 2010. PINK1 is selectively stabilized on impaired mitochondria to activate Parkin. PLOS Biol. 8:e1000298 Ordureau A, Paulo JA, Zhang J, An H, Swatek KN, et al. 2020. Global landscape and dynamics of Parkin and USP30-dependent ubiquitylomes in iNeurons during mitophagic signaling. Mol. Cell 77:1124–42.e10 Ordureau A, Paulo JA, Zhang W, Ahfeldt T, Zhang J, et al. 2018. Dynamics of PARKIN-dependent mito- chondrial ubiquitylation in induced neurons and model systems revealed by digital snapshot proteomics. Mol. Cell 70:211–27.e8 Ordureau A, Sarraf SA, Duda DM, Heo JM, Jedrychowski MP, et al. 2014. Quantitative proteomics re- veal a feedforward mechanism for mitochondrial PARKIN translocation and ubiquitin chain synthesis. Mol. Cell 56:360–75 Ostermeier C, Brunger AT. 1999. Structural basis of Rab effector specificity: crystal structure of the small G protein Rab3A complexed with the effector domain of rabphilin-3A. Cell 96:363–74 Petridi S, Middleton CA, Ugbode C, Fellgett A, Covill L, Elliott CJH. 2020. In vivo visual screen for dopamin- ergic Rab ↔LRRK2-G2019S interactions in Drosophila discriminates Rab10 from Rab3. Genes Genomes Genet. 10:1903–14 Pickrell AM, Huang CH, Kennedy SR, Ordureau A, Sideris DP, et al. 2015. Endogenous Parkin preserves dopaminergic substantia nigral neurons following mitochondrial DNA mutagenic stress. Neuron 87:371– 81 Pihlstrøm L, Rengmark A, Bjørnarå KA, Dizdar N, Fardell C, et al. 2015. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Fine mapping and resequencing of the PARK16 locus in Parkinson’s disease. J. Hum. Genet. 60:357–62 Plowey ED, Cherra SJ III, Liu Y-J, Chu CT. 2008. Role of autophagy in G2019S-LRRK2-associated neurite shortening in differentiated SH-SY5Y cells. J. Neurochem. 105:1048–56 Poewe W, Seppi K, Tanner CM, Halliday GM, Brundin P, et al. 2017. Parkinson disease. Nat. Rev. Dis. Primers 3:17013 Pourjafar-Dehkordi D, Vieweg S, Itzen A, Zacharias M. 2019. Phosphorylation of Ser111 in Rab8a modulates Rabin8-dependent activation by perturbation of side chain interaction networks.Biochemistry 58:3546–54 Purlyte E, Dhekne HS, Sarhan AR, Gomez R, Lis P, et al. 2018. Rab29 activation of the Parkinson’s disease- associated LRRK2 kinase. EMBO J. 37:1–18. Corrigendum. 2019. EMBO J. 38:e101237 Ramonet D, Daher JP, Lin BM, Stafa K, Kim J, et al. 2011. Dopaminergic neuronal loss, reduced neurite complexity and autophagic abnormalities in transgenic mice expressing G2019S mutant LRRK2. PLOS ONE 6:e18568 Rendón WO, Martínez-Alonso E, Tomás M, Martínez-Martínez N, Martínez-Menárguez JA. 2013. Golgi fragmentation is Rab and SNARE dependent in cellular models of Parkinson’s disease. Histochem. Cell Biol. 139:671–84 Richter B, Sliter DA, Herhaus L, Stolz A, Wang C, et al. 2016. Phosphorylation of OPTN by TBK1 enhances its binding to Ub chains and promotes selective autophagy of damaged mitochondria. PNAS 113:4039– 44 Rizo J, Sudhof TC. 2012. The membrane fusion enigma: SNAREs, Sec1/Munc18 proteins, and their accomplices—guilty as charged? Annu. Rev. Cell Dev. Biol. 28:279–308 Saez-Atienzar S, Bonet-Ponce L, Blesa JR, Romero FJ, Murphy MP, et al. 2014. The LRRK2 inhibitor GSK2578215A induces protective autophagy in SH-SY5Y cells: involvement of Drp-1-mediated mi- tochondrial fission and mitochondrial-derived ROS signaling. Cell Death Dis. 5:e1368 Sambri I, D’Alessio R, Ezhova Y, Giuliano T, Sorrentino NC, et al. 2017. Lysosomal dysfunction disrupts presynaptic maintenance and restoration of presynaptic function prevents neurodegeneration in lysoso- mal storage diseases. EMBO Mol. Med. 9:112–32 g Sarraf SA, Raman M, Guarani-Pereira V, Sowa ME, Huttlin EL, et al. 2013. Landscape of the PARKIN- dependent ubiquitylome in response to mitochondrial depolarization. Nature 496:372–76 Singh • Muqit 262 Satake W, Nakabayashi Y, Mizuta I, Hirota Y, Ito C, et al. 2009. Genome-wide association study identifies common variants at four loci as genetic risk factors for Parkinson’s disease. Nat. Genet. 41:1303–7 Sauvé V, Sung G, Soya N, Kozlov G, Blaimschein N, et al. 2018. Mechanism of parkin activation by phospho- rylation. Nat. Struct. Mol. Biol. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Spillantini MG, Goedert M. 2018. Neurodegeneration and the ordered assembly of α-synuclein. Cell Tissue Res. 373:137–48 Steger M, Diez F, Dhekne HS, Lis P, Nirujogi RS, et al. 2017. Systematic proteomic analysis of LRRK2- mediated Rab GTPase phosphorylation establishes a connection to ciliogenesis. eLife 6:e31012 Steger M, Tonelli F, Ito G, Davies P, Trost M, et al. 2016. Phosphoproteomics reveals that Parkinson’s disease kinase LRRK2 regulates a subset of Rab GTPases. eLife 5:e12813 g f tenmark H. 2009. Rab GTPases as coordinators of vesicle traffic. Nat. Rev. Mol. Cell Biol. 10:513–2 Sung JY, Kim J, Paik SR, Park JH, Ahn YS, Chung KC. 2001. Induction of neuronal cell death by Rab5A- dependent endocytosis of α-synuclein. J. Biol. Chem. 276:27441–48 Taylor M, Alessi DR. 2020. Advances in elucidating the function of leucine-rich repeat protein kinase-2 in normal cells and Parkinson’s disease. Curr. Opin. Cell Biol. 63:102–13 Tokuda T, Qureshi MM, Ardah MT, Varghese S, Shehab SA, et al. 2010. Detection of elevated levels of α-synuclein oligomers in CSF from patients with Parkinson disease. Neurology 75:1766–72 Tong Y, Giaime E, Yamaguchi H, Ichimura T, Liu Y, et al. 2012. Loss of leucine-rich repeat kinase 2 causes age-dependent bi-phasic alterations of the autophagy pathway. Mol. Neurodegener. 7:2 Tong Y, Yamaguchi H, Giaime E, Boyle S, Kopan R, et al. 2010. Loss of leucine-rich repeat kinase 2 causes impairment of protein degradation pathways, accumulation of α-synuclein, and apoptotic cell death in aged mice. PNAS 107:9879–84 Trempe JF, Sauvé V, Grenier K, Seirafi M, Tang MY, et al. 2013. Structure of parkin reveals mechanisms for ubiquitin ligase activation. Science 340:1451–55 Underwood R, Wang B, Carico C, Whitaker RH, Placzek WJ, Yacoubian TA. 2020. The GTPase Rab27b regulates the release, autophagic clearance, and toxicity of alpha-synuclein. J. Biol. Chem. http://doi. org/10.1074/jbc.RA120.013337 Valente EM, Abou-Sleiman PM, Caputo V, Muqit MMK, Harvey K, et al. 2004. Hereditary early-onset Parkinson’s disease caused by mutations in PINK1. Science 304:1158–60 Vanhauwaert R, Kuenen S, Masius R, Bademosi A, Manetsberger J, et al. 2017. The SAC1 domain in synap- tojanin is required for autophagosome maturation at presynaptic terminals. EMBO J. 36:1392–411 Vieweg S, Mulholland K, Bräuning B, Kacharia N, Lai Y-C, et al. 2020. PINK1-dependent phosphorylation of Serine111 within the SF3 motif of Rab GTPases impairs effector interactions and LRRK2-mediated phosphorylation at Threonine72. Biochem. J. 477:1651–68 Vilariño-Güell C, Wider C, Ross OA, Dachsel JC, Kachergus JM, et al. 2011. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. 25:623–30 Sharma M, Burré J, Bronk P, Zhang Y, Xu W, Südhof TC. 2012. CSPα knockout causes neurodegeneration by impairing SNAP-25 function. EMBO J. 31:829–41 Sharma M, Burré J, Südhof TC. 2011. CSPα promotes SNARE-complex assembly by chaperoning SNAP-25 during synaptic activity. Nat. Cell Biol. 13:30–39 Sliter DA, Martinez J, Hao L, Chen X, Sun N, et al. 2018. Parkin and PINK1 mitigate STING-induced inflammation. Nature 561:258–62 Søreng K, Neufeld TP, Simonsen A. 2018. Membrane trafficking in autophagy. Int. Rev. Cell Mol. Biol. 336:1– 92 Soubannier V, McLelland GL, Zunino R, Braschi E, Rippstein P, et al. 2012. A vesicular transport pathway shuttles cargo from mitochondria to lysosomes. Curr. Biol. 22:135–41 Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. VPS35 mutations in Parkinson disease. Am. J. Hum. Genet. 89:162–67 Vincow ES, Merrihew G, Thomas RE, Shulman NJ, Beyer RP, et al. 2013. The PINK1–Parkin pathway promotes both mitophagy and selective respiratory chain turnover in vivo. PNAS 110:6400–5 Wallings RL, Tansey MG. 2019. LRRK2 regulation of immune-pathways and inflammatory disease. Biochem. Soc. Trans. 47:1581–95 Wang S, Ma Z, Xu X, Wang Z, Sun L, et al. 2014. A role of Rab29 in the integrity of the trans-Golgi network and retrograde trafficking of mannose-6-phosphate receptor. PLOS ONE 9:e96242 www.annualreviews.org • Aberrant Vesicle Trafficking in Parkinson’s 263 Waschbüsch D, Hübel N, Ossendorf E, Lobbestael E, Baekelandt V, et al. 2019. Rab32 interacts with SNX6 and affects retromer-dependent Golgi trafficking. PLOS ONE 14:e0208889 Waschbüsch D, Michels H, Strassheim S, Ossendorf E, Kessler D, et al. 2014. LRRK2 transport is regulated by its novel interacting partner Rab32. PLOS ONE 9:e111632 Watanabe R, Buschauer R, Böhning J, Audagnotto M, Lasker K et al. 2019. The in situ structure of Parkinson’s disease-linked LRRK2. bioRxiv 837203. https://doi.org/10.1101/837203 Wauer T, Komander D. 2013. Structure of the human Parkin ligase domain in an autoinhibited state. EMBO J. 32:2099–112 Wauer T, Swatek KN, Wagstaff JL, Gladkova C, Pruneda JN, et al. 2015. Ubiquitin Ser65 phosphorylation affects ubiquitin structure, chain assembly and hydrolysis. EMBO J. 34:307–25 Wenzel DM, Lissounov A, Brzovic PS, Klevit RE. 2011. UBCH7 reactivity profile reveals parkin and HHARI to be RING/HECT hybrids. Nature 474:105–8 Williams ET, Chen X, Moore DJ. 2017. VPS35, the retromer complex and Parkinson’s disease. J. Park. Dis. 7:219–33 Wilson GR, Sim JCH, McLean C, Giannandrea M, Galea CA, et al. 2014. Mutations in RAB39B cause X-linked intellectual disability and early-onset Parkinson disease with α-synuclein pathology. Am. J. Hum. Genet. 95:729–35 Xia Y, Zhang G, Han C, Ma K, Guo X, et al. 2019. Microglia as modulators of exosomal alpha-synuclein transmission. Cell Death Dis. 10:174 Xiong Y, Coombes CE, Kilaru A, Li X, Gitler AD, et al. 2010. GTPase activity plays a key role in the patho- biology of LRRK2. PLOS Genet. 6:e1000902 gy Yamano K, Fogel AI, Wang C, van der Bliek AM, Youle RJ. 2014. Mitochondrial Rab GAPs govern autophago- some biogenesis during mitophagy. eLife 3:e01612 Yamano K, Fogel AI, Wang C, van der Bliek AM, Youle RJ. some biogenesis during mitophagy. eLife 3:e01612 Yamano K, Wang C, Sarraf SA, Münch C, Kikuchi R, et al. 2018. Contents Structural Biology of RNA Polymerase II Transcription: 20 Years On Sara Osman and Patrick Cramer p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 1 F-Actin Cytoskeleton Network Self-Organization Through Competition and Cooperation Rachel S. Kadzik, Kaitlin E. Homa, and David R. Kovar p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p35 Integrating Chemistry and Mechanics: The Forces Driving Axon Growth Kristian Franze p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p61 Nuclear Membrane Rupture and Its Consequences John Maciejowski and Emily M. Hatch p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p85 Protein Quality Control and Lipid Droplet Metabolism Melissa A. Roberts and James A. Contents Olzmann p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 115 Msp1/ATAD1 in Protein Quality Control and Regulation of Synaptic Activities Lan Wang and Peter Walter p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 141 Developing Therapies for Neurodegenerative Disorders: Insights from Protein Aggregation and Cellular Stress Responses Giovanna R. Mallucci, David Klenerman, and David C. Rubinsztein p p p p p p p p p p p p p p p p p p p 165 Cellular Mechanisms of NETosis Hawa Racine Thiam, Siu Ling Wong, Denisa D. Wagner, and Clare M. Waterman p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 191 Scaling of Subcellular Structures Wallace F. Marshall p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 219 Parkinson’s: A Disease of Aberrant Vesicle Trafficking Pawan Kishor Singh and Miratul M.K. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Endosomal Rab cycles regulate Parkin- mediated mitophagy. eLife 7:e31326 Yamano K, Youle RJ. 2013. PINK1 is degraded through the N-end rule pathway. Autophagy 9:1758–69 Yu M, Arshad M, Wang W, Zhao D, Xu L, Zhou L. 2018. LRRK2 mediated Rab8a phosphorylation promotes lipid storage. Lipids Health Dis. 17:34 Zavodszky E, Seaman MNJ, Moreau K, Jimenez-Sanchez M, Breusegem SY, et al. 2014. Mutation in VPS35 associated with Parkinson’s disease impairs WASH complex association and inhibits autophagy. Nat. Commun. 5:3828 Zhang Q, Pan Y, Yan R, Zeng B, Wang H, et al. 2015. Commensal bacteria direct selective cargo sorting to promote symbiosis. Nat. Immunol. 16:918–26 Zhao Y, Perera G, Takahashi-Fujigasaki J, Mash DC, Vonsattel JPG, et al. 2018. Reduced LRRK2 in asso- ciation with retromer dysfunction in post-mortem brain tissue from LRRK2 mutation carriers. Brain 141:486–95 Zimprich A, Benet-Pages A, Struhal W, Graf E, Eck SH, et al. 2011. A mutation in VPS35, encoding a subunit of the retromer complex, causes late-onset Parkinson disease. Am. J. Hum. Genet. 89:168–75 264 Singh • Muqit Contents Muqit p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 237 Mitochondrial Quality Control and Restraining Innate Immunity Andrew T. Moehlman and Richard J. Youle p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 265 Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. vii Combinatorial Control of Plant Specialized Metabolism: Mechanisms, Functions, and Consequences Elia Lacchini and Alain Goossens p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 291 Cellular, Molecular, and Physiological Adaptations of Hibernation: The Solution to Environmental Challenges Sarah M. Mohr, Sviatoslav N. Bagriantsev, and Elena O. Gracheva p p p p p p p p p p p p p p p p p p p p p 315 Synthetic Developmental Biology: Understanding Through Reconstitution Gavin Schlissel and Pulin Li p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 339 Processing Temporal Growth Factor Patterns by an Epidermal Growth Factor Receptor Network Dynamically Established in Space Aneta Koseska and Philippe I.H. Bastiaens p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 359 Shaping Organs: Shared Structural Principles Across Kingdoms O. Hamant and T.E. Saunders p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 385 Human Embryogenesis: A Comparative Perspective Claudia Gerri, Sergio Menchero, Shantha K. Mahadevaiah, James M.A. Turner, and Kathy K. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Niakan p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 411 The Role of Immune Factors in Shaping Fetal Neurodevelopment Alice Lu-Culligan and Akiko Iwasaki p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 441 The Lineage Before Time: Circadian and Nonclassical Clock Influences on Development Amita Sehgal, Daniel Maxim Iascone, and Joseph Bedont p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 469 Pediatric Allergic Diseases, Food Allergy, and Oral Tolerance Kirsty Logan, George Du Toit, Mattia Giovannini, Victor Turcanu, and Gideon Lack p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 511 The Source and Dynamics of Adult Hematopoiesis: Insights from Lineage Tracing Joseph N. Pucella, Samik Upadhaya, and Boris Reizis p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 529 B Cell Immunosenescence Daniela Frasca, Alain Diaz, Maria Romero, Denisse Garcia, and Bonnie B. Annu. Rev. Cell Dev. Biol. 2020.36:237-264. Downloaded from www.annualreviews.org Access provided by 86.174.33.195 on 12/11/20. See copyright for approved use. Blomberg p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p p 551 Indexes Cumulative Index of Contributing Authors, Volumes 32–36 p p p p p p p p p p p p p p p p p p p p p p p p p p p 575 Indexes Cumulative Index of Contributing Authors, Volumes 32–36 p p p p p p p p p p p p p p p p p p p p p p p p p p p 575 Errata Errata An online log of corrections to Annual Review of Cell and Developmental Biology articles may be found at http://www.annualreviews.org/errata/cellbio Contents
https://openalex.org/W3105486817
https://www.biorxiv.org/content/biorxiv/early/2016/12/11/093021.full.pdf
English
null
Cox-nnet: an artificial neural network method for prognosis prediction on high-throughput omics data
bioRxiv (Cold Spring Harbor Laboratory)
2,016
cc-by
19,061
. CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made availab The copyright holder for this preprint (which w this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint Cox-nnet: an artificial neural network 1 method for prognosis prediction on high- 2 throughput omics data 3 Travers Ching*,†, Xun Zhu*,†, Lana X. Garmire*,† 5 *Molecular Biosciences and Bioengineering Graduate Program, University of Hawaii at Manoa, 6 Honolulu, HI 96822, USA 7 †Epidemiology Program, University of Hawaii Cancer Center, Honolulu, HI 96813, USA 8 1 1 . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint Running title 9 Artificial neural network for prognosis 10 Keywords 11 Survival analysis, RNA-Seq, cancer, machine learning, bioinformatics 12 Corresponding author 13 Lana Garmire 14 701 Ilalo Street, Honolulu HI 96813 15 (808) 441-8193 16 lgarmire@cc.hawaii.edu 17 18 2 2 . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint Abstract 19 Artificial neural networks (ANN) are computing architectures with massively parallel interconnections of 20 simple neurons and has been applied to biomedical fields such as imaging analysis and diagnosis. We 21 have developed a new ANN framework called Cox-nnet to predict patient prognosis from high throughput 22 transcriptomics data. In over 10 TCGA RNA-Seq data sets, Cox-nnet achieves a statistically significant 23 increase in predictive accuracy, compared to the other three methods including Cox-proportional hazards 24 (Cox-PH), Random Forests Survival and CoxBoost. Cox-nnet also reveals richer biological information, 25 from both pathway and gene levels. The outputs from the hidden layer node can provide a new approach 26 for survival-sensitive dimension reduction. In summary, we have developed a new method for more 27 accurate and efficient prognosis prediction on high throughput data, with functional biological insights. 28 The source code is freely available at https://github.com/lanagarmire/cox-nnet. 29 Artificial neural networks (ANN) are computing architectures with massively parallel interconnections of 20 simple neurons and has been applied to biomedical fields such as imaging analysis and diagnosis. We 21 have developed a new ANN framework called Cox-nnet to predict patient prognosis from high throughput 22 transcriptomics data. In over 10 TCGA RNA-Seq data sets, Cox-nnet achieves a statistically significant 23 increase in predictive accuracy, compared to the other three methods including Cox-proportional hazards 24 (Cox-PH), Random Forests Survival and CoxBoost. Cox-nnet also reveals richer biological information, 25 from both pathway and gene levels. The outputs from the hidden layer node can provide a new approach 26 for survival-sensitive dimension reduction. In summary, we have developed a new method for more 27 accurate and efficient prognosis prediction on high throughput data, with functional biological insights. 28 The source code is freely available at https://github.com/lanagarmire/cox-nnet. 29 30 30 3 3 . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint Introduction 31 Artificial Neural networks (ANNs) were developed in 1943 in order to model the activity of neurons 1. In 32 recent years, ANNs have caught renewed attention, thanks to the increased parallel computing power and 33 the promise of deep learning 2. The original ANN extension of Cox Regression was not designed to 34 handle high throughput input data3. Some recent attempts using ANNs to high dimensional survival data 35 simplified the regression problem as either a binary classification or fitting discrete variables of survival 36 time through binning , leading to loss of accuracy 4,5. Another study used time as an additional input in 37 order to predict patient survival or censoring status6, with the potential to overfit if the survival time and 38 censoring time are correlated. To avoid all these issues, we herein leverage the neural network extension 39 of Cox regression by a high-performance and easy-to-use package, particularly fit for high dimensional 40 data. 41 Artificial Neural networks (ANNs) were developed in 1943 in order to model the activity of neurons 1. In 32 recent years, ANNs have caught renewed attention, thanks to the increased parallel computing power and 33 the promise of deep learning 2. The original ANN extension of Cox Regression was not designed to 34 handle high throughput input data3. Some recent attempts using ANNs to high dimensional survival data 35 simplified the regression problem as either a binary classification or fitting discrete variables of survival 36 time through binning , leading to loss of accuracy 4,5. Another study used time as an additional input in 37 order to predict patient survival or censoring status6, with the potential to overfit if the survival time and 38 censoring time are correlated. To avoid all these issues, we herein leverage the neural network extension 39 of Cox regression by a high-performance and easy-to-use package, particularly fit for high dimensional 40 data. 41 Besides Cox-nnet, some other modeling methods exist to predict patient survival. The standard method is 42 Cox proportional hazards (Cox-PH) regression, a semi-parametric and generalized linear model with an 43 exponential link function7. Another method, CoxBoost 8, is an iterative “boosting” method modified from 44 the Cox-PH model. In each boosting iteration, it refits the parameters by maximizing the penalized 45 likelihood function. Introduction 31 CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint comparison with the other methods mentioned above (Cox-PH, RF-S and CoxBoost), Cox-nnet has better 56 overall predictive accuracy. It is also optimized on graphics processing unit (GPU) with at least an order 57 of computational speed-up over the central processing unit (CPU), making it a compelling new tool to 58 predict disease prognosis in the era of precision medicine. Second, Cox-nnet utilizes feature importance 59 scores based on the partial derivatives of gene features selected by the model, so that the relative 60 importance of the genes to prognosis outcome can be directly assessed. Thirdly, the hidden layer node 61 structure in ANN can be harnessed to reveal much richer information of featuring genes and biological 62 pathways, compared to the Cox-PH method. Overall, Cox-nnet is a desirable survival analysis method 63 with both excellent predictive power and usage to gain biological functions related to prognosis. 64 comparison with the other methods mentioned above (Cox-PH, RF-S and CoxBoost), Cox-nnet has better 56 overall predictive accuracy. It is also optimized on graphics processing unit (GPU) with at least an order 57 of computational speed-up over the central processing unit (CPU), making it a compelling new tool to 58 predict disease prognosis in the era of precision medicine. Second, Cox-nnet utilizes feature importance 59 scores based on the partial derivatives of gene features selected by the model, so that the relative 60 importance of the genes to prognosis outcome can be directly assessed. Thirdly, the hidden layer node 61 structure in ANN can be harnessed to reveal much richer information of featuring genes and biological 62 pathways, compared to the Cox-PH method. Overall, Cox-nnet is a desirable survival analysis method 63 with both excellent predictive power and usage to gain biological functions related to prognosis. 64 Introduction 31 Rather than using L2 ridge regression common in Cox-PH, the number of boosting 46 iterations is used as the complexity parameter in CoxBoost and optimized via cross-validation (CV) 8. 47 Random Forests Survival (RF-S) is another ensemble, non-linear method 9. It combines many 48 bootstrapped decision trees in order to reduce the variance in the model, and then calculates a weighted 49 average of all the decision trees. Unlike Cox-PH and CoxBoost, RF-S does not use the log likelihood 50 function to determine the fitness of the model. Instead, it predicts estimated survival times, and uses 51 Harrel’s C-Index, a score that measures the correct ranking of individuals 9. 52 Besides Cox-nnet, some other modeling methods exist to predict patient survival. The standard method is 42 Cox proportional hazards (Cox-PH) regression, a semi-parametric and generalized linear model with an 43 exponential link function7. Another method, CoxBoost 8, is an iterative “boosting” method modified from 44 the Cox-PH model. In each boosting iteration, it refits the parameters by maximizing the penalized 45 likelihood function. Rather than using L2 ridge regression common in Cox-PH, the number of boosting 46 iterations is used as the complexity parameter in CoxBoost and optimized via cross-validation (CV) 8. 47 Random Forests Survival (RF-S) is another ensemble, non-linear method 9. It combines many 48 bootstrapped decision trees in order to reduce the variance in the model, and then calculates a weighted 49 average of all the decision trees. Unlike Cox-PH and CoxBoost, RF-S does not use the log likelihood 50 function to determine the fitness of the model. Instead, it predicts estimated survival times, and uses 51 Harrel’s C-Index, a score that measures the correct ranking of individuals 9. 52 4 The new software package we have developed here, named Cox-nnet, advances the ANN extension of 53 Cox regression for survival prediction on high-throughput data. The caliber of this package is manifested 54 in several aspects. First, it has improved technical performance in terms of both accuracy and speed. In 55 4 4 . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . The Cox model 66 The Cox-PH model is a log-linear model that estimates individual hazard, i.e., an instantaneous measure 67 g , , of the likelihood of an event, based on a set of features. The hazard is given by the equation: 68 of the likelihood of an event, based on a set of features. The hazard is given by the equation: 68 ( 1 ) ( 2 )    0 | exp i h t h t   i X i T i X β ( 1 ) ( 2 )    0 | exp i h t h t   i X i T i X β ( 1 )    0 | exp i h t h t   i X ( 1 ) ( ) ( 2 )   0 exp i h t   i X i T i X β ( 2 ) i T i X β ( 2 ) i T i X β ( 2 ) Where is the log hazard ratio for patient . The partial likelihood is represented by the following 69 formula: 70 i i Where is the log hazard ratio for patient . The partial likelihood is represented by the following 69 formula: 70 i i ( 3 )  1 exp exp j i i C i j t t PL      β ( 3 ) Where is the censoring status of a patient, and if the patient was censored or 1 if the 71  C i  0 C i  Where is the censoring status of a patient, and if the patient was censored or 1 if the 71  C i  0 C i  patient died or had a recurrence event, etc. The partial log-likelihood is used as the cost function: 72 patient died or had a recurrence event, etc. The partial log-likelihood is used as the cost function: 72 5 5 . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . The Cox model 66 In the k-th iteration of a K-fold CV, the 79 optimal coefficients are found by minimizing the cost function on the training sub-samples. If 80 , ˆ k  β The cross-validated performance metric may be Harrel’s concordance index (C-index) 10 or the “cross- 76 validated partial likelihood” 11. Since the contribution of each patient in the partial likelihood is 77 determined only in the context of all the other patients, the cross-validated partial likelihood is calculated 78 subtracting full partial likelihood from the training set in the CV. In the k-th iteration of a K-fold CV, the 79 optimal coefficients are found by minimizing the cost function on the training sub-samples. If 80 , ˆ k  β The cross-validated performance metric may be Harrel’s concordance index (C-index) 10 or the “cross- 76 validated partial likelihood” 11. Since the contribution of each patient in the partial likelihood is 77 determined only in the context of all the other patients the cross-validated partial likelihood is calculated 78 is the partial likelihood of the training sub-samples, and is the partial likelihood of 81   , ˆ k k pl  β   , ˆ k pl  β the full dataset, then the cross-validated partial likelihood is the sum of differences: 82 the full dataset, then the cross-validated partial likelihood is the sum of differences: 82 ( 6 ) ( 6 )    , , 1 ˆ ˆ ( ) K k k k k cvpl pl pl        β β ( 6 )    , , 1 ˆ ˆ ( ) K k k k k cvpl pl pl        β β ( 6 )    , , 1 ˆ ˆ ( ) K k k k k cvpl pl pl        β β    , , 1 ˆ ˆ ( ) K k k k k cvpl pl pl        β β ANN extension of Cox regression 83 The Cox model 66 CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint ( 4 )  1 log exp j i i j C i t t pl                 β ( 4 )  1 log exp j i i j C i t t pl                 β ( 4 ) In a Cox model with L2 ridge regression, a penalty term is added which is proportional to the L2 norm of 73 the coefficients. The cost function is minimized to find the best coefficients for the model: 74 In a Cox model with L2 ridge regression, a penalty term is added which is proportional to the L2 norm of 73 the coefficients. The cost function is minimized to find the best coefficients for the model: 74 In a Cox model with L2 ridge regression, a penalty term is added which is proportional to the L2 norm of 73 the coefficients. The cost function is minimized to find the best coefficients for the model: 74 In a Cox model with L2 ridge regression, a penalty term is added which is proportional to the L2 norm of 73 the coefficients The cost function is minimized to find the best coefficients for the model: 74 ( 5 )   2 Cost pl    β β β ( 5 ) ( 5 )   2 Cost pl    β β β where the tuning parameter is determined by maximizing CV. 75  where the tuning parameter is determined by maximizing CV. 75  The cross-validated performance metric may be Harrel’s concordance index (C-index) 10 or the “cross- 76 validated partial likelihood” 11. Since the contribution of each patient in the partial likelihood is 77 determined only in the context of all the other patients, the cross-validated partial likelihood is calculated 78 subtracting full partial likelihood from the training set in the CV. ANN extension of Cox regression 83 The tanh function is: 91 In this manuscript, the tanh activation function is used, as it results in faster training time compared to the 90 sigmoid activation 12. The tanh function is: 91 ( 9 )        exp exp exp exp z z G z z z      ( 9 )        exp exp exp exp z z G z z z      ( 9 ) In addition to ridge regularization, we also employ dropout regularization13. In this approach, nodes are 92 removed during each training iteration with probability 1-p. During evaluation, output from the nodes are 93 multiplied by p. The optimal dropout parameter, p, is determined through cross-validation on the training 94 set. Dropout regularization has been shown to reduce overfitting and improve performance over other 95 regularization schemes13. 96 The source code of cox-nnet can be found at: https://github.com/lgarmire/cox-nnet, and can be installed 97 through the Python Package Index (PyPI). Documentation of package can be found at 98 http://lgarmire.github.io/cox-nnet/docs. 99 The source code of cox-nnet can be found at: https://github.com/lgarmire/cox-nnet, and can be installed 97 through the Python Package Index (PyPI). Documentation of package can be found at 98 http://lgarmire.github.io/cox-nnet/docs. 99 ANN extension of Cox regression 83 ANN extension of Cox regression 83 The ANN extension of Cox regression (Cox-nnet) is a neural network whose output layer is replaced by a 84 Cox model. In a Cox-nnet model with one input layer of input features and one hidden layer composed 85 of hidden nodes, the linear predictor is replaced by the outputs of the hidden layer: 86 J H The ANN extension of Cox regression (Cox-nnet) is a neural network whose output layer is replaced by a 84 The ANN extension of Cox regression (Cox-nnet) is a neural network whose output layer is replaced by a 84 Cox model. In a Cox-nnet model with one input layer of input features and one hidden layer composed 85 of hidden nodes, the linear predictor is replaced by the outputs of the hidden layer: 86 J H ( 7 )   i G   T T i W X b β ( 7 ) 6 . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint Where is the coefficient weight matrix between the input and hidden layer with the size H x J, is 87 W b the bias term for each hidden node and is the activation function (applied element-wise on a vector). 88 G Subsequently, the ridge regression cost function is modified to: 89 y, the ridge regression cost function is modified to: ( 8 )       2 2 , , Cost pl     β W β W β W ( 8 ) In this manuscript, the tanh activation function is used, as it results in faster training time compared to the 90 sigmoid activation 12. The tanh function is: 91 In this manuscript, the tanh activation function is used, as it results in faster training time compared to the 90 sigmoid activation 12. Implementation in Python with Theano 100 We implement Cox-nnet using a feed forward, back propagation network with gradient descent. The 101 partial log likelihood is usually written as a double conditional sum (equation 4). To avoid the 102 computational inefficiency of calculating the partial log likelihood (equation 4) using two nested for 103 loops, we convert it into a formulation of matrix operations and basic sums. First we define an indicator 104 matrix with elements: 105 R We implement Cox-nnet using a feed forward, back propagation network with gradient descent. The 101 partial log likelihood is usually written as a double conditional sum (equation 4). To avoid the 102 computational inefficiency of calculating the partial log likelihood (equation 4) using two nested for 103 loops, we convert it into a formulation of matrix operations and basic sums. First we define an indicator 104 matrix with elements: 105 R 7 . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint (10 ) 1, 0, i j ij i j t t R t t      (10 ) 1, 0, i j ij i j t t R t t      1, 0, i j ij i j t t R t t      (10 ) We also define an indicator vector with elements given by the censoring of each patient. An operation 106 using replaces the conditional sum over , and an operation using replaces the conditional 107 C R j i t t  C sum over in equation 4. In Theano, the partial log likelihood is: 108  1 C i  sum over in equation 4. In Theano, the partial log likelihood is: 108  1 C i  pl=T.sum((theta - T.log(T.sum(T.exp(theta) * R,axis=1))) * C) ( 11 ) pl=T.sum((theta - T.log(T.sum(T.exp(theta) * R,axis=1))) * C) ( 11 ) ( 11 ) Model evaluation 109 To evaluate the performance of all methods in comparison, we trained each model on 80% of the samples 110 for each dataset (chosen randomly) and evaluated the performance on the 20% holdout test set. The 111 output of Cox-PH, Cox-nnet and CoxBoost are the log hazard ratios (i.e., Prognosis Index, or PI) for each 112 patient. The hazard ratio describes the relative risk of a patient compared to a non-parametric baseline. 113 On the other hand, the output of RF-S is an estimation of the survival time for each patient. 114 We use C-index and log-ranked p-value based on dichotomization of the hold-out test data of the holdout 115 test data to measure the performance of each model. The C-index is a measure of how well the model 116 prediction corresponds to the ranking of the survival data 14. It is calculated for censored survival data, 117 which evaluates a value between 0 and 1, with 0.5 equivalent to a random process. The C-index can be 118 computed as a summation over all events in the dataset, whereby patients with a higher survival time and 119 lower log hazard ratios (and conversely patients with a lower survival time but higher log hazard ratios) 120 are considered concordant. The C-index is a measure of concordance of the data with the model 121 prediction. To calculate the log-ranked p-value, a PI cutoff threshold is used to dichotomize the patients 122 in the data set into higher and lower risk groups, similar to our earlier report 15,16. A log-ranked p-value is 123 then computed to differentiate the Kaplan-Meier survival curves between the higher vs. lower risk groups. 124 In this report, we used the median log hazard ratio as the cutoff threshold. 125 To evaluate the performance of all methods in comparison, we trained each model on 80% of the samples 110 for each dataset (chosen randomly) and evaluated the performance on the 20% holdout test set. The 111 output of Cox-PH, Cox-nnet and CoxBoost are the log hazard ratios (i.e., Prognosis Index, or PI) for each 112 patient. The hazard ratio describes the relative risk of a patient compared to a non-parametric baseline. 113 On the other hand, the output of RF-S is an estimation of the survival time for each patient. Model evaluation 109 CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint Feature evaluation 126 For computing the importance of a feature in Cox-nnet, we use a method of partial derivatives (PaD) 17,18. 127 For each patient, we compute the partial derivatives of each input with respect to the linear output of the 128 model (e.g., the log hazard ratio). The average of the partial derivatives for each input across all patient 129 samples is calculated as the feature score. 130 For computing the importance of a feature in Cox-nnet, we use a method of partial derivatives (PaD) 17,18. 127 For each patient, we compute the partial derivatives of each input with respect to the linear output of the 128 model (e.g., the log hazard ratio). The average of the partial derivatives for each input across all patient 129 samples is calculated as the feature score. 130 Model evaluation 109 114 We use C-index and log-ranked p-value based on dichotomization of the hold-out test data of the holdout 115 test data to measure the performance of each model. The C-index is a measure of how well the model 116 prediction corresponds to the ranking of the survival data 14. It is calculated for censored survival data, 117 which evaluates a value between 0 and 1, with 0.5 equivalent to a random process. The C-index can be 118 computed as a summation over all events in the dataset, whereby patients with a higher survival time and 119 lower log hazard ratios (and conversely patients with a lower survival time but higher log hazard ratios) 120 are considered concordant. The C-index is a measure of concordance of the data with the model 121 prediction. To calculate the log-ranked p-value, a PI cutoff threshold is used to dichotomize the patients 122 in the data set into higher and lower risk groups, similar to our earlier report 15,16. A log-ranked p-value is 123 then computed to differentiate the Kaplan-Meier survival curves between the higher vs. lower risk groups. 124 In this report, we used the median log hazard ratio as the cutoff threshold. 125 We use C-index and log-ranked p-value based on dichotomization of the hold-out test data of the holdout 115 test data to measure the performance of each model. The C-index is a measure of how well the model 116 prediction corresponds to the ranking of the survival data 14. It is calculated for censored survival data, 117 which evaluates a value between 0 and 1, with 0.5 equivalent to a random process. The C-index can be 118 computed as a summation over all events in the dataset, whereby patients with a higher survival time and 119 lower log hazard ratios (and conversely patients with a lower survival time but higher log hazard ratios) 120 are considered concordant. The C-index is a measure of concordance of the data with the model 121 8 8 . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . Datasets 131 148 As a proof of concept, the current ANN architecture is composed of three layers: one input layer, one 149 Datasets 131 In order to evaluate the performance of Cox-nnet, we analyzed 10 TCGA datasets which were combined 132 into a pan-cancer dataset. The TCGA datasets included the following cancer types: Bladder Urothelial 133 Carcinoma (BLCA), Breast invasive carcinoma (BRCA), Head and Neck squamous cell carcinoma 134 (HNSC), Kidney renal clear cell carcinoma (KIRC), Brain Lower Grade Glioma (LGG), Liver 135 hepatocellular carcinoma (LIHC), Lung adenocarcinoma (LUAD), Lung squamous cell carcinoma 136 (LUSC), Ovarian serous cystadenocarcinoma (OV) and Stomach adenocarcinoma (STAD). RNA-Seq 137 expression and clinical data were downloaded from the Broad Institute GDAC 19. Overall survival time 138 and censoring information were extracted from the clinical follow-up data. Raw count data were 139 normalized using the DESeq2 R package 20 and then log-transformed. Datasets were selected from 140 TCGA based on the following criteria: > 300 samples with both RNASeq and survival data and > 50 141 survival events. In total, 5031 patient samples were used (see Table S1 for a patient tabulation by 142 individual dataset). 143 In order to evaluate the performance of Cox-nnet, we analyzed 10 TCGA datasets which were combined 132 into a pan-cancer dataset. The TCGA datasets included the following cancer types: Bladder Urothelial 133 Carcinoma (BLCA), Breast invasive carcinoma (BRCA), Head and Neck squamous cell carcinoma 134 (HNSC), Kidney renal clear cell carcinoma (KIRC), Brain Lower Grade Glioma (LGG), Liver 135 hepatocellular carcinoma (LIHC), Lung adenocarcinoma (LUAD), Lung squamous cell carcinoma 136 (LUSC), Ovarian serous cystadenocarcinoma (OV) and Stomach adenocarcinoma (STAD). RNA-Seq 137 expression and clinical data were downloaded from the Broad Institute GDAC 19. Overall survival time 138 and censoring information were extracted from the clinical follow-up data. Raw count data were 139 normalized using the DESeq2 R package 20 and then log-transformed. Datasets were selected from 140 TCGA based on the following criteria: > 300 samples with both RNASeq and survival data and > 50 141 survival events. In total, 5031 patient samples were used (see Table S1 for a patient tabulation by 142 individual dataset). 143 Results 144 Cox-nnet structure and optimization 145 Cox-nnet is the neural network extension of the Cox-PH model. We created a package suitable for high 146 dimensional datasets using the Theano math library in Python. The neural network model used in this 147 paper is shown in Figure 1 and an overview of modules in the Cox-nnet package is shown in Figure S1. Cox-nnet structure and optimization 145 Moreover, this package can be run on multiple threads or a Graphics Processing 158 Unit (GPU), and it achieves slightly faster training time compared to Random Forest and CoxBoost 159 (Figure S2B). Thus, Cox-nnet is a modern software implementation that can achieve efficient 160 computational time. 161 fully connected hidden layer and an output “Cox regression” layer. The output layer of Cox-nnet replaces 150 the linear predictors in the standard Cox-PH model. Many other functions are implemented to improve 151 the usability of the package, including CVSearch, CVProfile, CrossValidation, and TrainCoxMlp. 152 CVSearch, CVProfile, CrossValidation are methods that perform CV to find the optimal regularization 153 parameter. TrainCoxMlp performs optimization of coefficients on the regularized partial likelihood 154 function. The optimization strategies include momentum gradient descent 21, Nesterov accelerated 155 gradient 22 and Ada Delta 23. A comparison of these descent methods is shown in Figure S2A, where 156 Nesterov accelerated gradient method achieved the best efficiency based on TCGA kidney renal clear cell 157 carcinoma (KIRC) data. Moreover, this package can be run on multiple threads or a Graphics Processing 158 Unit (GPU), and it achieves slightly faster training time compared to Random Forest and CoxBoost 159 (Figure S2B). Thus, Cox-nnet is a modern software implementation that can achieve efficient 160 computational time. 161 Cox-nnet structure and optimization 145 9 Cox-nnet is the neural network extension of the Cox-PH model. We created a package suitable for high 146 dimensional datasets using the Theano math library in Python. The neural network model used in this 147 paper is shown in Figure 1 and an overview of modules in the Cox-nnet package is shown in Figure S1. 148 As a proof of concept, the current ANN architecture is composed of three layers: one input layer, one 149 Cox-nnet is the neural network extension of the Cox-PH model. We created a package suitable for high 146 dimensional datasets using the Theano math library in Python. The neural network model used in this 147 paper is shown in Figure 1 and an overview of modules in the Cox-nnet package is shown in Figure S1. 148 As a proof of concept, the current ANN architecture is composed of three layers: one input layer, one 149 9 . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint fully connected hidden layer and an output “Cox regression” layer. The output layer of Cox-nnet replaces 150 the linear predictors in the standard Cox-PH model. Many other functions are implemented to improve 151 the usability of the package, including CVSearch, CVProfile, CrossValidation, and TrainCoxMlp. 152 CVSearch, CVProfile, CrossValidation are methods that perform CV to find the optimal regularization 153 parameter. TrainCoxMlp performs optimization of coefficients on the regularized partial likelihood 154 function. The optimization strategies include momentum gradient descent 21, Nesterov accelerated 155 gradient 22 and Ada Delta 23. A comparison of these descent methods is shown in Figure S2A, where 156 Nesterov accelerated gradient method achieved the best efficiency based on TCGA kidney renal clear cell 157 carcinoma (KIRC) data. reports 15,16,24. A log-ranked p-value is then computed to differentiate the Kaplan-Meier survival curves 174 from these two groups. 175 The comparison of C-indices among the four methods over the 10 TCGA data is shown in Figure 2A. 176 Overall, Cox-nnet has higher predictive accuracy over the other three methods, regardless of the 177 regularization method. Cox-PH performs the second best, followed by CoxBoost and RF-S in descending 178 order (Figure 2B). The comparison of log-ranked p-values on the dichotomized survival risk groups is 179 shown in Figure S3. Generally, log-ranked p-values in the 10 TCGA datasets are more significant in Cox- 180 nnet, compared to other methods. However, the dichotomization of patients ignores the differences within 181 each dichotomized group, thus the resulting log-ranked p-values are less consistent than C-indices on the 182 same data. 183 The comparison of C-indices among the four methods over the 10 TCGA data is shown in Figure 2A. 176 Overall, Cox-nnet has higher predictive accuracy over the other three methods, regardless of the 177 regularization method. Cox-PH performs the second best, followed by CoxBoost and RF-S in descending 178 order (Figure 2B). The comparison of log-ranked p-values on the dichotomized survival risk groups is 179 shown in Figure S3. Generally, log-ranked p-values in the 10 TCGA datasets are more significant in Cox- 180 nnet, compared to other methods. However, the dichotomization of patients ignores the differences within 181 each dichotomized group, thus the resulting log-ranked p-values are less consistent than C-indices on the 182 same data. 183 Performance comparison of survival prediction methods 162 CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint reports 15,16,24. A log-ranked p-value is then computed to differentiate the Kaplan-Meier survival curves 174 from these two groups. 175 Performance comparison of survival prediction methods 162 We compared four methods, including Cox-nnet, Cox-PH, CoxBoost and RF-S, on 10 datasets from The 163 Cancer Genome Atlas (TCGA), which were selected based on having at least 50 death events (Table S1). 164 For each dataset, we trained the model on 80% of the randomly selected samples and determined the 165 regularization parameter using 5-fold CV on the training set. We used two types of regularizations, L2 166 ridge regularization (also known as weight decay) and dropout regularization. We evaluated the 167 performance on the remaining 20% holdout test set. Two metrics are used to evaluate the performance of 168 the model. The first one is Harrell’s concordance index (C-index) calculated for censored survival data 169 10,24. It evaluates the relative ordering of the samples and ranges between 0 and 1, with 0.5 equivalent to a 170 random process. The second metric is the log-ranked p-value from Kaplan-Meier survival curves of two 171 different survival risk groups. This is done by using the median threshold of Prognosis Index (PI), the 172 output of Cox-nnet, to dichotomize the patients into higher and lower risk groups, similar to our earlier 173 We compared four methods, including Cox-nnet, Cox-PH, CoxBoost and RF-S, on 10 datasets from The 163 Cancer Genome Atlas (TCGA), which were selected based on having at least 50 death events (Table S1). 164 For each dataset, we trained the model on 80% of the randomly selected samples and determined the 165 regularization parameter using 5-fold CV on the training set. We used two types of regularizations, L2 166 ridge regularization (also known as weight decay) and dropout regularization. We evaluated the 167 performance on the remaining 20% holdout test set. Two metrics are used to evaluate the performance of 168 the model. The first one is Harrell’s concordance index (C-index) calculated for censored survival data 169 10,24. It evaluates the relative ordering of the samples and ranges between 0 and 1, with 0.5 equivalent to a 170 random process. The second metric is the log-ranked p-value from Kaplan-Meier survival curves of two 171 different survival risk groups. This is done by using the median threshold of Prognosis Index (PI), the 172 output of Cox-nnet, to dichotomize the patients into higher and lower risk groups, similar to our earlier 173 10 . Biological relevance of hidden layer nodes of Cox-nnet 184 To explore the biological relevance of the hidden nodes of Cox-nnet, we used the TCGA KIRC dataset as 185 an example. We first extracted the contribution of each hidden node to the PI score for each patient 186 (Figure 3A). The contribution was calculated as the output value of each hidden node weighted by the 187 corresponding coefficient at the Cox regression output layer. As expected, the value of the hidden nodes 188 strongly correlated to the PI score. However, there is still significant heterogeneity among the nodes, 189 suggesting that individual nodes may reflect different biological processes. We hypothesize that the top 190 nodes may serve as surrogate features to discriminate patient survival. To explore this idea, we selected 191 the top 20 nodes with the highest variances, and presented the patients PI scores using t-SNE, a popular 192 method to enhance the separation among samples25. The nodes represent a dimension reduction of the 193 original data and clearly discriminate samples by their PI scores (Figure 3B). In contrast, the top 20 194 principle components obtained from principal component analysis (PCA) in combination with t-SNE fail 195 to separate the patient samples (Figure 3B). This drastic difference demonstrates that the nodes in Cox- 196 nnet effectively capture the survival information, and the top node PI scores can be used as features for 197 dimension reduction in survival analysis. 198 To explore the biological relevance of the hidden nodes of Cox-nnet, we used the TCGA KIRC dataset as 185 an example. We first extracted the contribution of each hidden node to the PI score for each patient 186 (Figure 3A). The contribution was calculated as the output value of each hidden node weighted by the 187 corresponding coefficient at the Cox regression output layer. As expected, the value of the hidden nodes 188 strongly correlated to the PI score. However, there is still significant heterogeneity among the nodes, 189 suggesting that individual nodes may reflect different biological processes. We hypothesize that the top 190 nodes may serve as surrogate features to discriminate patient survival. To explore this idea, we selected 191 the top 20 nodes with the highest variances, and presented the patients PI scores using t-SNE, a popular 192 method to enhance the separation among samples25. The nodes represent a dimension reduction of the 193 original data and clearly discriminate samples by their PI scores (Figure 3B). Biological relevance of hidden layer nodes of Cox-nnet 184 In contrast, the top 20 194 principle components obtained from principal component analysis (PCA) in combination with t-SNE fail 195 to separate the patient samples (Figure 3B). This drastic difference demonstrates that the nodes in Cox- 196 nnet effectively capture the survival information, and the top node PI scores can be used as features for 197 dimension reduction in survival analysis. 198 11 . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: ioRxiv preprint To further explore the biological relevance of the top 20 hidden nodes, we conducted Gene Set 199 Enrichment Analysis (GSEA)26 using KEGG pathways 27. We calculated significantly enriched pathways 200 using gene correlation to the output score of each node (Figure 3C and Table S2), and compared these 201 enriched pathways to those from GSEA of the Cox-PH model (Table S3). To calculate statistical 202 significance of the pathways, we performed 10,000 permutations, followed by multiple hypothesis testing 203 with Benjamini Hochberg adjustment. A total of 110 (out of 187) significantly enriched pathways (Table 204 S2) were identified in at least one node, including seven pathways enriched in all 20 nodes that were not 205 found by the Cox-PH method (Table 1). In contrast, Cox-PH only identified 30 significantly enriched 206 pathways using the same significance threshold. Among the seven pathways, the P53 signaling pathway 207 stands out as an important biologically relevant pathway (Figure 4 and Figure S4), since it was shown to 208 be highly prognostic of patient survival in kidney cancer28. 209 Next, we estimated the predicative accuracies of the leading edge genes (LEG) enriched in the KEGG 210 pathways from Cox-nnet vs. those enriched in Cox-PH model. We used the C-index of each LEG, 211 obtained from single-variable analysis (Figure 4). Biological relevance of hidden layer nodes of Cox-nnet 184 Collectively, LEGs from Cox-nnet have significantly 212 higher C-index scores (p = 5.79e-05) than those from Cox-PH, suggesting that Cox-nnet has selected 213 more informative features. In order to visualize these gene level and pathway level differences between 214 Cox-nnet and Cox-PH, we reconstructed a bipartite graph between LEGs for Cox-nnet or feature genes 215 (for Cox-PH) and their corresponding enriched pathways (Figure 5). Besides P53 pathway mentioned 216 earlier that is specific to Cox-nnet, several other pathways, such as insulin signaling pathway, endocytosis 217 and adherens junction, also have many more genes enriched in Cox-nnet. Among them, some have been 218 previously reported to relevant to renal carcinoma development and prognosis, such as CASP929, 219 TGFBR230, KDR (VEGFR)31. These results demonstrate that Cox-nnet model reveals richer biological 220 information than Cox-PH. 221 Next, we estimated the predicative accuracies of the leading edge genes (LEG) enriched in the KEGG 210 pathways from Cox-nnet vs. those enriched in Cox-PH model. We used the C-index of each LEG, 211 obtained from single-variable analysis (Figure 4). Collectively, LEGs from Cox-nnet have significantly 212 higher C-index scores (p = 5.79e-05) than those from Cox-PH, suggesting that Cox-nnet has selected 213 more informative features. In order to visualize these gene level and pathway level differences between 214 Cox-nnet and Cox-PH, we reconstructed a bipartite graph between LEGs for Cox-nnet or feature genes 215 (for Cox-PH) and their corresponding enriched pathways (Figure 5). Besides P53 pathway mentioned 216 earlier that is specific to Cox-nnet, several other pathways, such as insulin signaling pathway, endocytosis 217 and adherens junction, also have many more genes enriched in Cox-nnet. Among them, some have been 218 previously reported to relevant to renal carcinoma development and prognosis, such as CASP929, 219 TGFBR230, KDR (VEGFR)31. These results demonstrate that Cox-nnet model reveals richer biological 220 Next, we estimated the predicative accuracies of the leading edge genes (LEG) enriched in the KEGG 210 pathways from Cox-nnet vs. those enriched in Cox-PH model. Biological relevance of hidden layer nodes of Cox-nnet 184 We used the C-index of each LEG, 211 To further examine the importance of each gene relative to the survival outcome, we calculated the 222 averaged partial derivative (PaD) of each input gene feature over all patients, with respect to the linear 223 To further examine the importance of each gene relative to the survival outcome, we calculated the 222 averaged partial derivative (PaD) of each input gene feature over all patients, with respect to the linear 223 12 . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint output of the model (e.g., the log hazard ratio). As demonstrated by the LEGs in seven common pathways 224 of all nodes in Cox-nnet, the feature importance scores produce stronger biological insight (Figure S4). 225 For example, the feature importance for the BAI1 gene in the P53 pathway is much higher in the Cox- 226 nnet model compared to the Cox-PH model. Corresponding to our finding, the BAI gene family was 227 found to be involved in several types of cancers including renal cancer32 33 34 35. BAI1 acts as an inhibitor 228 to angiogenesis and is transcriptionally regulated by P53 36. Its expression level was significantly 229 decreased in tumor vs. normal kidney tissue, and was even lower in advanced stage renal carcinoma35. 230 Mice kidney cancer models treated with BAI1 showed slower tumor growth and proliferation 37. 231 Additionally, the MAPK1 gene (also known as ERK2) has a much higher feature importance score in 232 Cox-nnet compared to Cox-PH, and is annotated in the Adherens Junction pathway as well as the Insulin 233 Signalling Pathway found by Cox-nnet. MAPK1 is one of the key kinases in intra-cellular transduction, 234 and was found constitutively activated in renal cell carcinoma 38. Drugs inhibiting the MAPK cascade 235 have been targeted for development39. Biological relevance of hidden layer nodes of Cox-nnet 184 236 output of the model (e.g., the log hazard ratio). As demonstrated by the LEGs in seven common pathways 224 of all nodes in Cox-nnet, the feature importance scores produce stronger biological insight (Figure S4). 225 For example, the feature importance for the BAI1 gene in the P53 pathway is much higher in the Cox- 226 nnet model compared to the Cox-PH model. Corresponding to our finding, the BAI gene family was 227 found to be involved in several types of cancers including renal cancer32 33 34 35. BAI1 acts as an inhibitor 228 to angiogenesis and is transcriptionally regulated by P53 36. Its expression level was significantly 229 decreased in tumor vs. normal kidney tissue, and was even lower in advanced stage renal carcinoma35. 230 Mice kidney cancer models treated with BAI1 showed slower tumor growth and proliferation 37. 231 Additionally, the MAPK1 gene (also known as ERK2) has a much higher feature importance score in 232 Cox-nnet compared to Cox-PH, and is annotated in the Adherens Junction pathway as well as the Insulin 233 Signalling Pathway found by Cox-nnet. MAPK1 is one of the key kinases in intra-cellular transduction, 234 and was found constitutively activated in renal cell carcinoma 38. Drugs inhibiting the MAPK cascade 235 have been targeted for development39. 236 Discussion 238 Additionally, it is possible to embed a priori 263 biological pathway information into the network architecture, e.g., by connecting genes in a pathway to a 264 common node in the next hidden layer of neurons. In the future, we plan to further analyze how different 265 neural network architectures affect the performance of Cox-nnet and compare the biological insights from 266 the various models. 267 Discussion 238 In this report, we have implemented Cox-nnet, a new non-linear ANN method, to predict patient survival 239 from high throughput omics data. Cox-nnet is an improved, modern alternative to the standard Cox-PH 240 regression, as demonstrated by increased performance for survival prediction and the capabilities to 241 explore more deeply the biological information. 242 In this report, we have implemented Cox-nnet, a new non-linear ANN method, to predict patient survival 239 from high throughput omics data. Cox-nnet is an improved, modern alternative to the standard Cox-PH 240 regression, as demonstrated by increased performance for survival prediction and the capabilities to 241 explore more deeply the biological information. 242 In this report, we have implemented Cox-nnet, a new non-linear ANN method, to predict patient survival 239 from high throughput omics data. Cox-nnet is an improved, modern alternative to the standard Cox-PH 240 regression, as demonstrated by increased performance for survival prediction and the capabilities to 241 explore more deeply the biological information. 242 First, through in-depth comparison of 10 TCGA RNA-Seq, Cox-nnet achieves overall statistically 243 significant improvements over Cox-PH on its predictive accuracy, as measured by C-indices. 244 Interestingly, the ensemble-based method RF-S consistently ranks worse than Cox-nnet and Cox-PH. 245 Because RF-S bootstraps both samples and features for individual trees, many uninformative features in 246 each tree may be chosen for node splitting in particularly high dimensional datasets, leading to a decrease 247 Interestingly, the ensemble-based method RF-S consistently ranks worse than Cox-nnet and Cox-PH. 245 Because RF-S bootstraps both samples and features for individual trees, many uninformative features in 246 each tree may be chosen for node splitting in particularly high dimensional datasets, leading to a decrease 247 13 . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint in overall accuracy 40. Discussion 238 In contrast, the dropout and L2-regularization approach used by both Cox-nnet and 248 Cox-PH can prune out uninformative features. 249 in overall accuracy 40. In contrast, the dropout and L2-regularization approach used by both Cox-nnet and 248 Cox-PH can prune out uninformative features. 249 Second, Cox-nnet can reveal a lot richer biological information than Cox-PH. This is manifested both at 250 the pathway and gene levels. The hidden nodes in the Cox-nnet model have distinct expression patterns, 251 and can serve as surrogate features for survival-sensitive dimension reduction. Many more significant 252 KEGG pathways are enriched which correlate with top nodes in Cox-nnet, as compared to those from the 253 Cox-PH model. A critical pathway for renal cancer development, P53 pathway, is only enriched by Cox- 254 nnet but not Cox-PH model in TCGA KIRC. Other pathways, including insulin signaling pathway, 255 endocytosis and adherens junction, have many more genes enriched by Cox-mmet. Moreover, leading 256 edge genes (LEGs) obtained from these KEGG pathways enriched by Cox-nnet (which are a fraction of 257 the gene features considered by the model) have collectively higher associations with survival. 258 As a promising new predictive method for prognosis, the current Cox-nnet implementation has some 259 limitations. Its architecture includes 3-layer ANN, and it is possible to incorporate other more 260 sophisticated architecture into the model, such as including more layers of neurons. A convolutional 261 neural network approach using convolutional and pooling layers could also be used, as those reported in 262 processing imaging or other types of positional data 41. Additionally, it is possible to embed a priori 263 biological pathway information into the network architecture, e.g., by connecting genes in a pathway to a 264 common node in the next hidden layer of neurons. In the future, we plan to further analyze how different 265 neural network architectures affect the performance of Cox-nnet and compare the biological insights from 266 the various models. 267 As a promising new predictive method for prognosis, the current Cox-nnet implementation has some 259 limitations. Its architecture includes 3-layer ANN, and it is possible to incorporate other more 260 sophisticated architecture into the model, such as including more layers of neurons. A convolutional 261 neural network approach using convolutional and pooling layers could also be used, as those reported in 262 processing imaging or other types of positional data 41. Competing financial interests 272 The author(s) declare no competing financial interests. 273 The author(s) declare no competing financial interests. 273 The author(s) declare no competing financial interests. 273 Acknowledgements 274 This research was supported by grants K01ES025434 awarded by NIEHS thro 275 trans-NIH Big Data to Knowledge (BD2K) initiative (www.bd2k.nih.gov), P2 276 awarded by NIH/NIGMS, R01 LM012373 awarded by NLM, R01 HD084633 277 Hawaii Community Foundation Medical Research Grant 14ADVC-64566 to L 278 References 279 1 McCulloch, W. S. & Pitts, W. A logical calculus of the ideas immanent 280 bulletin of mathematical biophysics 5, 115-133 (1943). 281 2 Jones, N. (Nature Publishing Group MACMILLAN BUILDING, 4 CRINA 282 ENGLAND, 2014). 283 3 Faraggi, D. & Simon, R. A neural network model for survival data. Stat 284 (1995). 285 4 Petalidis, L. P. et al. Improved grading and survival prediction of huma 286 by artificial neural network analysis of gene expression microarray da 287 therapeutics 7, 1013-1024 (2008). 288 5 Chi, C.-L., Street, W. N. & Wolberg, W. H. in AMIA Annual Symposium 289 (American Medical Informatics Association). 290 6 Joshi, R. & Reeves, C. in Proceedings of the eighteenth international c 291 engineering. 179-184. 292 7 Therneau, T. M. & Grambsch, P. M. Modeling survival data: extending 293 Science & Business Media, 2000). 294 8 Binder, H. CoxBoost: Cox models by likelihood based boosting for a si 295 competing risks. R package version 1 (2013). 296 9 Ishwaran, H., Kogalur, U. B., Blackstone, E. H. & Lauer, M. S. Random 297 of Applied Statistics, 841-860 (2008). 298 10 Koziol, J. A. & Jia, Z. The concordance index C and the Mann–Whitney 299 randomly censored data. Biometrical Journal 51, 467-474 (2009). 300 11 van Houwelingen, H. C., Bruinsma, T., Hart, A. A., van't Veer, L. J. & W 301 Cox regression on microarray gene expression data. Statistics in medi 302 12 Haykin, S. & Network, N. A comprehensive foundation. Neural Netwo 303 13 Srivastava, N., Hinton, G. E., Krizhevsky, A., Sutskever, I. & Salakhutdin 304 way to prevent neural networks from overfitting. Journal of Machine 305 1929 1958 (2014) 306 Acknowledgements 274 This research was supported by grants K01ES025434 awarded by NIEHS through funds provided by the 275 trans-NIH Big Data to Knowledge (BD2K) initiative (www.bd2k.nih.gov), P20 COBRE GM103457 276 awarded by NIH/NIGMS, R01 LM012373 awarded by NLM, R01 HD084633 awarded by NICHD, and 277 Hawaii Community Foundation Medical Research Grant 14ADVC-64566 to L.X. Competing financial interests 272 Garmire. 278 References 279 1 McCulloch, W. S. & Pitts, W. A logical calculus of the ideas immanent in nervous activity. The 280 bulletin of mathematical biophysics 5, 115-133 (1943). 281 2 Jones, N. (Nature Publishing Group MACMILLAN BUILDING, 4 CRINAN ST, LONDON N1 9XW, 282 ENGLAND, 2014). 283 3 Faraggi, D. & Simon, R. A neural network model for survival data. Statistics in medicine 14, 73-82 284 (1995). 285 4 Petalidis, L. P. et al. Improved grading and survival prediction of human astrocytic brain tumors 286 by artificial neural network analysis of gene expression microarray data. Molecular cancer 287 therapeutics 7, 1013-1024 (2008). 288 5 Chi, C.-L., Street, W. N. & Wolberg, W. H. in AMIA Annual Symposium Proceedings. 130 289 (American Medical Informatics Association). 290 6 Joshi, R. & Reeves, C. in Proceedings of the eighteenth international conference on systems 291 engineering. 179-184. 292 7 Therneau, T. M. & Grambsch, P. M. Modeling survival data: extending the Cox model. (Springer 293 Science & Business Media, 2000). 294 8 Binder, H. CoxBoost: Cox models by likelihood based boosting for a single survival endpoint or 295 competing risks. R package version 1 (2013). 296 9 Ishwaran, H., Kogalur, U. B., Blackstone, E. H. & Lauer, M. S. Random survival forests. The Annals 297 of Applied Statistics, 841-860 (2008). 298 10 Koziol, J. A. & Jia, Z. The concordance index C and the Mann–Whitney parameter Pr (X> Y) with 299 randomly censored data. Biometrical Journal 51, 467-474 (2009). 300 11 van Houwelingen, H. C., Bruinsma, T., Hart, A. A., van't Veer, L. J. & Wessels, L. F. Cross‐validated 301 Cox regression on microarray gene expression data. Statistics in medicine 25, 3201-3216 (2006). 302 12 Haykin, S. & Network, N. A comprehensive foundation. Neural Networks 2 (2004). 303 13 Srivastava, N., Hinton, G. E., Krizhevsky, A., Sutskever, I. & Salakhutdinov, R. Dropout: a simple 304 way to prevent neural networks from overfitting. Journal of Machine Learning Research 15, 305 1929-1958 (2014). 306 Author contributions 268 LXG and TC envisioned the project and designed the work. TC coded the project and conducted the 269 analysis. XZ provided insight and discussion on neural networks. All authors have read, revised and 270 approved the final manuscript. 271 LXG and TC envisioned the project and designed the work. TC coded the project and conducted the 269 analysis. XZ provided insight and discussion on neural networks. All authors have read, revised and 270 approved the final manuscript. 271 14 . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint Acknowledgements 274 This research was supported by grants K01ES025434 awarded by NIEHS through funds provided by the 275 trans-NIH Big Data to Knowledge (BD2K) initiative (www.bd2k.nih.gov), P20 COBRE GM103457 276 awarded by NIH/NIGMS, R01 LM012373 awarded by NLM, R01 HD084633 awarded by NICHD, and 277 Hawaii Community Foundation Medical Research Grant 14ADVC-64566 to L.X. Garmire. 278 This research was supported by grants K01ES025434 awarded by NIEHS through funds provided by the 275 trans-NIH Big Data to Knowledge (BD2K) initiative (www.bd2k.nih.gov), P20 COBRE GM103457 276 awarded by NIH/NIGMS, R01 LM012373 awarded by NLM, R01 HD084633 awarded by NICHD, and 277 Hawaii Community Foundation Medical Research Grant 14ADVC-64566 to L.X. Garmire. 278 1 McCulloch, W. S. & Pitts, W. A logical calculus of the ideas immanent in nervous activity. The 280 bulletin of mathematical biophysics 5, 115-133 (1943). 281 2 Jones, N. (Nature Publishing Group MACMILLAN BUILDING, 4 CRINAN ST, LONDON N1 9XW, 282 ENGLAND, 2014). 283 3 Faraggi, D. & Simon, R. A neural network model for survival data. Statistics in medicine 14, 73-82 284 (1995). 285 4 Petalidis, L. P. et al. Improved grading and survival prediction of human astrocytic brain tumors 286 by artificial neural network analysis of gene expression microarray data. Molecular cancer 287 therapeutics 7, 1013-1024 (2008). 288 5 Chi, C.-L., Street, W. N. & Wolberg, W. H. in AMIA Annual Symposium Proceedings. 130 289 (American Medical Informatics Association). 290 6 Joshi, R. & Reeves, C. in Proceedings of the eighteenth international conference on systems 291 engineering. 179-184. 292 7 Therneau, T. M. & Grambsch, P. M. Modeling survival data: extending the Cox model. (Springer 293 Science & Business Media, 2000). 294 8 Binder, H. CoxBoost: Cox models by likelihood based boosting for a single survival endpoint or 295 competing risks. R package version 1 (2013). 296 9 Ishwaran, H., Kogalur, U. B., Blackstone, E. H. & Lauer, M. S. Random survival forests. The Annals 297 of Applied Statistics, 841-860 (2008). 298 10 Koziol, J. A. & Jia, Z. The concordance index C and the Mann–Whitney parameter Pr (X> Y) with 299 randomly censored data. Biometrical Journal 51, 467-474 (2009). 300 11 van Houwelingen, H. C., Bruinsma, T., Hart, A. A., van't Veer, L. J. & Wessels, L. F. Cross‐validated 301 Cox regression on microarray gene expression data. Statistics in medicine 25, 3201-3216 (2006). 302 12 Haykin, S. & Network, N. A comprehensive foundation. Neural Networks 2 (2004). Acknowledgements 274 Brain-specific angiogenesis inhibitor 1 expression is inversely co 352 vascularity and distant metastasis of colorectal cancer. International journal of onco 353 970 (1998). 354 14 Harrell, F. E., Lee, K. L. & Mark, D. B. Tutorial in biostatistics multivariable prognostic models: 307 issues in developing models, evaluating assumptions and adequacy, and measuring and reducing 308 errors. Statistics in medicine 15, 361-387 (1996). 309 14 Harrell, F. E., Lee, K. L. & Mark, D. B. Tutorial in biostatistics multivariable prognostic models: 307 issues in developing models, evaluating assumptions and adequacy, and measuring and reducing 308 errors. Statistics in medicine 15, 361-387 (1996). 309 15 Huang, S., Yee, C., Ching, T., Yu, H. & Garmire, L. X. A Novel Model to Combine Clinical and 310 Pathway-Based Transcriptomic Information for the Prognosis Prediction of Breast Cancer. PLoS 311 computational biology 10, e1003851 (2014). 312 16 Huang, S. et al. Novel personalized pathway-based metabolomics models reveal key metabolic 313 pathways for breast cancer diagnosis. Genome medicine 8, 1 (2016). 314 17 Gevrey, M., Dimopoulos, I. & Lek, S. Review and comparison of methods to study the 315 contribution of variables in artificial neural network models. Ecological modelling 160, 249-264 316 (2003). 317 18 Olden, J. D., Joy, M. K. & Death, R. G. An accurate comparison of methods for quantifying 318 variable importance in artificial neural networks using simulated data. Ecological Modelling 178, 319 389-397 (2004). 320 19 Broad. Broad Institute TCGA Genome Data Analysis Center (2014): Analysis Overview for 15 July 321 2014. Broad Institute of MIT and Harvard, doi:10.7908/C1DN43V9 (2014). 322 20 Love, M., Anders, S. & Huber, W. Differential analysis of RNA-Seq data at the gene level using 323 the DESeq2 package. (2013). 324 21 Qian, N. On the momentum term in gradient descent learning algorithms. Neural networks 12, 325 145-151 (1999). 326 22 Bengio, Y., Boulanger-Lewandowski, N. & Pascanu, R. in Acoustics, Speech and Signal Processing 327 (ICASSP), 2013 IEEE International Conference on. 8624-8628 (IEEE). 328 23 Battiti, R. Accelerated backpropagation learning: Two optimization methods. Complex systems 3, 329 331-342 (1989). 330 24 Wei, R. et al. Meta-dimensional data integration identifies critical pathways for susceptibility, 331 tumorigenesis and progression of endometrial cancer. Oncotarget (2016). 332 25 Maaten, L. v. d. & Hinton, G. Visualizing data using t-SNE. Journal of Machine Learning Research 333 9, 2579-2605 (2008). 334 26 Subramanian, A. et al. Acknowledgements 274 Gene set enrichment analysis: a knowledge-based approach for 335 interpreting genome-wide expression profiles. Proceedings of the National Academy of Sciences 336 102, 15545-15550 (2005). 337 , ( ) 27 Kanehisa, M. & Goto, S. KEGG: kyoto encyclopedia of genes and genomes. Nucleic acids research 338 28, 27-30 (2000). 339 27 Kanehisa, M. & Goto, S. KEGG: kyoto encyclopedia of genes and genomes. Nucleic acids research 338 28, 27-30 (2000). 339 Girgin, C. et al. P53 mutations and other prognostic factors of renal cell carcinoma. Urol internationalis 66, 78-83 (2001). 28 Girgin, C. et al. P53 mutations and other prognostic factors of renal cell carcinoma. Urologia 340 internationalis 66, 78-83 (2001). 341 28 Girgin, C. et al. P53 mutations and other prognostic factors of renal cell carcinoma. Urologia 340 internationalis 66, 78-83 (2001). 341 29 Marques, I. et al. Influence of survivin (BIRC5) and caspase-9 (CASP9) functional polymorphisms 342 in renal cell carcinoma development: a study in a southern European population. Molecular 343 biology reports 40, 4819-4826 (2013). 344 29 Marques, I. et al. Influence of survivin (BIRC5) and caspase-9 (CASP9) functional polymorphisms 342 in renal cell carcinoma development: a study in a southern European population. Molecular 343 biology reports 40, 4819-4826 (2013). 344 29 Marques, I. et al. Influence of survivin (BIRC5) and caspase-9 (CASP9) functional polymorphisms 342 in renal cell carcinoma development: a study in a southern European population. Molecular 343 biology reports 40, 4819-4826 (2013). 344 30 Akhurst, R. J. & Derynck, R. TGF-β signaling in cancer–a double-edged sword. Trends in cell 345 biology 11, S44-S51 (2001). 346 30 Akhurst, R. J. & Derynck, R. TGF-β signaling in cancer–a double-edged sword. Trends in cell 345 biology 11, S44-S51 (2001). 346 30 Akhurst, R. J. & Derynck, R. TGF-β signaling in cancer–a double-edged sword. Trends in cell 345 biology 11, S44-S51 (2001). 346 31 Choueiri, T. K. et al. Phase II and biomarker study of the dual MET/VEGFR2 inhibitor foretinib in 347 patients with papillary renal cell carcinoma. Journal of Clinical Oncology 31, 181-186 (2013). 348 31 Choueiri, T. K. et al. Phase II and biomarker study of the dual MET/VEGFR2 inhibitor foretinib in 347 patients with papillary renal cell carcinoma. Journal of Clinical Oncology 31, 181-186 (2013). 348 31 Choueiri, T. K. et al. Phase II and biomarker study of the dual MET/VEGFR2 inhibitor foretinib in 347 patients with papillary renal cell carcinoma. Acknowledgements 274 303 13 Srivastava, N., Hinton, G. E., Krizhevsky, A., Sutskever, I. & Salakhutdinov, R. Dropout: a simple 304 way to prevent neural networks from overfitting. Journal of Machine Learning Research 15, 305 1929-1958 (2014). 306 8 Binder, H. CoxBoost: Cox models by likelihood based boosting for a single survival endpoint or 295 competing risks. R package version 1 (2013). 296 9 Ishwaran, H., Kogalur, U. B., Blackstone, E. H. & Lauer, M. S. Random survival forests. The Annals 297 of Applied Statistics, 841-860 (2008). 298 10 Koziol, J. A. & Jia, Z. The concordance index C and the Mann–Whitney parameter Pr (X> Y) with 299 randomly censored data. Biometrical Journal 51, 467-474 (2009). 300 13 Srivastava, N., Hinton, G. E., Krizhevsky, A., Sutskever, I. & Salakhutdinov, R. Dropout: a simple 304 way to prevent neural networks from overfitting. Journal of Machine Learning Research 15, 305 1929-1958 (2014). 306 13 Srivastava, N., Hinton, G. E., Krizhevsky, A., Sutskever, I. & Salakhutdinov, R. Dropout: a simple 304 way to prevent neural networks from overfitting. Journal of Machine Learning Research 15, 305 1929-1958 (2014). 306 15 . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint 14 Harrell, F. E., Lee, K. L. & Mark, D. B. Tutorial in biostatistics multivariable prognosti 307 issues in developing models, evaluating assumptions and adequacy, and measuring 308 errors. Statistics in medicine 15, 361-387 (1996). 309 15 Huang, S., Yee, C., Ching, T., Yu, H. & Garmire, L. X. A Novel Model to Combine Clinic 310 Pathway-Based Transcriptomic Information for the Prognosis Prediction of Breast C 311 computational biology 10, e1003851 (2014). 312 16 Huang, S. et al. Novel personalized pathway-based metabolomics models reveal key 313 pathways for breast cancer diagnosis. Genome medicine 8, 1 (2016). 314 17 Gevrey, M., Dimopoulos, I. & Lek, S. Acknowledgements 274 Review and comparison of methods to study th 315 contribution of variables in artificial neural network models. Ecological modelling 16 316 (2003). 317 18 Olden, J. D., Joy, M. K. & Death, R. G. An accurate comparison of methods for quant 318 variable importance in artificial neural networks using simulated data. Ecological M 319 389-397 (2004). 320 19 Broad. Broad Institute TCGA Genome Data Analysis Center (2014): Analysis Overvie 321 2014. Broad Institute of MIT and Harvard, doi:10.7908/C1DN43V9 (2014). 322 20 Love, M., Anders, S. & Huber, W. Differential analysis of RNA-Seq data at the gene l 323 the DESeq2 package. (2013). 324 21 Qian, N. On the momentum term in gradient descent learning algorithms. Neural ne 325 145-151 (1999). 326 22 Bengio, Y., Boulanger-Lewandowski, N. & Pascanu, R. in Acoustics, Speech and Signa 327 (ICASSP), 2013 IEEE International Conference on. 8624-8628 (IEEE). 328 23 Battiti, R. Accelerated backpropagation learning: Two optimization methods. Compl 329 331-342 (1989). 330 24 Wei, R. et al. Meta-dimensional data integration identifies critical pathways for susc 331 tumorigenesis and progression of endometrial cancer. Oncotarget (2016). 332 25 Maaten, L. v. d. & Hinton, G. Visualizing data using t-SNE. Journal of Machine Learni 333 9, 2579-2605 (2008). 334 26 Subramanian, A. et al. Gene set enrichment analysis: a knowledge-based approach 335 interpreting genome-wide expression profiles. Proceedings of the National Academ 336 102, 15545-15550 (2005). 337 27 Kanehisa, M. & Goto, S. KEGG: kyoto encyclopedia of genes and genomes. Nucleic a 338 28, 27-30 (2000). 339 28 Girgin, C. et al. P53 mutations and other prognostic factors of renal cell carcinoma. 340 internationalis 66, 78-83 (2001). 341 29 Marques, I. et al. Influence of survivin (BIRC5) and caspase-9 (CASP9) functional pol 342 in renal cell carcinoma development: a study in a southern European population. M 343 biology reports 40, 4819-4826 (2013). 344 30 Akhurst, R. J. & Derynck, R. TGF-β signaling in cancer–a double-edged sword. Trends 345 biology 11, S44-S51 (2001). 346 31 Choueiri, T. K. et al. Phase II and biomarker study of the dual MET/VEGFR2 inhibitor 347 patients with papillary renal cell carcinoma. Journal of Clinical Oncology 31, 181-186 348 32 Cork, S. M. & Van Meir, E. G. Emerging roles for the BAI1 protein family in the regul 349 phagocytosis, synaptogenesis, neurovasculature, and tumor development. Journal o 350 medicine 89, 743-752 (2011). 351 33 Fukushima, Y. et al. Acknowledgements 274 Journal of Clinical Oncology 31, 181-186 (2013). 348 p p p y f gy , ( ) 32 Cork, S. M. & Van Meir, E. G. Emerging roles for the BAI1 protein family in the regulation of 349 phagocytosis, synaptogenesis, neurovasculature, and tumor development. Journal of molecular 350 medicine 89, 743-752 (2011). 351 32 Cork, S. M. & Van Meir, E. G. Emerging roles for the BAI1 protein family in the regulation of 349 phagocytosis, synaptogenesis, neurovasculature, and tumor development. Journal of molecular 350 medicine 89, 743-752 (2011). 351 33 Fukushima, Y. et al. Brain-specific angiogenesis inhibitor 1 expression is inversely correlated with 352 vascularity and distant metastasis of colorectal cancer. International journal of oncology 13, 967- 353 970 (1998). 354 16 . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint 34 Lee, J. et al. Comparative study of angiostatic and anti-invasive gene expressions as prognostic 355 factors in gastric cancer. International journal of oncology 18, 355-362 (2001). 356 35 Izutsu, T., Konda, R., Sugimura, J., Iwasaki, K. & Fujioka, T. Brain-specific angiogenesis inhibitor 1 357 is a putative factor for inhibition of neovascular formation in renal cell carcinoma. The Journal of 358 urology 185, 2353-2358 (2011). 359 36 Nishimori, H. et al. A novel brain-specific p53-target gene, BAI1, containing thrombospondin 360 type 1 repeats inhibits experimental angiogenesis. Oncogene 15, 2145-2150 (1997). 361 37 Kudo, S. et al. Inhibition of tumor growth through suppression of angiogenesis by brain-specific 362 angiogenesis inhibitor 1 gene transfer in murine renal cell carcinoma. Oncology reports 18, 785- 363 792 (2007). 364 38 Oka, H. et al. Constitutive activation of mitogen-activated protein (MAP) kinases in human renal 365 cell carcinoma. Cancer research 55, 4182-4187 (1995). 366 39 Friday, B. B. & Adjei, A. A. Advances in targeting the Ras/Raf/MEK/Erk mitogen-activated protein 367 kinase cascade with MEK inhibitors for cancer therapy. Acknowledgements 274 Clinical Cancer Research 14, 342-346 368 (2008). 369 40 Nguyen, T.-T., Huang, J. Z. & Nguyen, T. T. Unbiased Feature Selection in Learning Random 370 Forests for High-Dimensional Data. The Scientific World Journal 2015 (2015). 371 41 LeCun, Y. & Bengio, Y. Convolutional networks for images, speech, and time series. The 372 handbook of brain theory and neural networks 3361, 1995 (1995). 373 374 375 376 Figures 377 Figure 1. An overview of the neural network architecture used in this study. 378 35 Izutsu, T., Konda, R., Sugimura, J., Iwasaki, K. & Fujioka, T. Brain-specific angiogenesis inhibitor 1 357 is a putative factor for inhibition of neovascular formation in renal cell carcinoma. The Journal of 358 urology 185, 2353-2358 (2011). 359 36 Nishimori, H. et al. A novel brain-specific p53-target gene, BAI1, containing thrombospondin 360 type 1 repeats inhibits experimental angiogenesis Oncogene 15 2145-2150 (1997) 361 7 Kudo, S. et al. Inhibition of tumor growth through suppression of angiogenesis by brain-specific angiogenesis inhibitor 1 gene transfer in murine renal cell carcinoma. Oncology reports 18, 785- 792 (2007). 38 Oka, H. et al. Constitutive activation of mitogen-activated protein (MAP) kinases in human renal 365 cell carcinoma. Cancer research 55, 4182-4187 (1995). 366 39 Friday, B. B. & Adjei, A. A. Advances in targeting the Ras/Raf/MEK/Erk mitogen-activated protein 367 kinase cascade with MEK inhibitors for cancer therapy. Clinical Cancer Research 14, 342-346 368 (2008). 369 40 Nguyen, T.-T., Huang, J. Z. & Nguyen, T. T. Unbiased Feature Selection in Learning Random 370 Forests for High-Dimensional Data. The Scientific World Journal 2015 (2015). 371 40 Nguyen, T.-T., Huang, J. Z. & Nguyen, T. T. Unbiased Feature Selection in Learning Random 370 Forests for High-Dimensional Data. The Scientific World Journal 2015 (2015). 371 41 LeCun, Y. & Bengio, Y. Convolutional networks for images, speech, and time series. The 372 handbook of brain theory and neural networks 3361, 1995 (1995). 373 Figures 377 CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint Figure 5. Enriched pathway-gene bipartite network from the leading edge genes and significantly 387 enriched pathways. Significantly enriched pathways common to all 20 hidden nodes are labeled in green. 388 Leading edge genes found uniquely in Cox-nnet are labeled in orange, and genes found in both Cox-nnet 389 and Cox-PH are labeled in blue. 390 enriched pathways. Significantly enriched pathways common to all 20 hidden nodes are labeled in green. 388 Leading edge genes found uniquely in Cox-nnet are labeled in orange, and genes found in both Cox-nnet 389 and Cox-PH are labeled in blue. 390 Table 1. Cox-nnet node-associated pathways. Significantly enriched pathways from common to all 20 391 hidden nodes that are not found in the Cox-PH Gene Set Enrichment Analysis (Adjusted p < 0.05). 392 Pathway P.value P.adjusted Nodes KEGG adherens junction 0.000 0.001 1-20 KEGG endocytosis 0.000 0.001 1-20 KEGG insulin signaling pathway 0.000 0.001 1-20 KEGG lysine degradation 0.000 0.003 1-20 KEGG p53 signaling pathway 0.000 0.003 1-20 KEGG pyruvate metabolism 0.000 0.001 1-20 KEGG sphingolipid metabolism 0.001 0.005 1-20 393 Supplemental Figures 394 Figure S1. An overview of the structure, methods and classes in Cox-nnet package. 395 Figure S2. A: comparison of descent methods on the TCGA KIRC dataset. The change in cost function 396 is evaluated over 100,000 iterations for three methods: gradient descent, momentum gradient descent and 397 the Nesterov accelerated gradient. B: Training time comparing CPU training time vs. GPU training time 398 on the same dataset. 399 Figure S3. Log-rank p-value bar plot of the 10 TCGA datasets. 400 Table 1. Cox-nnet node-associated pathways. Significantly enriched pathways from common to all 20 391 hidden nodes that are not found in the Cox-PH Gene Set Enrichment Analysis (Adjusted p < 0.05). 392 Pathway P.value P.adjusted Nodes KEGG adherens junction 0.000 0.001 1-20 KEGG endocytosis 0.000 0.001 1-20 KEGG insulin signaling pathway 0.000 0.001 1-20 KEGG lysine degradation 0.000 0.003 1-20 KEGG p53 signaling pathway 0.000 0.003 1-20 KEGG pyruvate metabolism 0.000 0.001 1-20 KEGG sphingolipid metabolism 0.001 0.005 1-20 393 Figure S3. Log-rank p-value bar plot of the 10 TCGA datasets. Figures 377 Figures 377 Figure 1. An overview of the neural network architecture used in this study. 378 Figure 2. A. Barplot of the C-index of the 10 TCGA datasets using four prognosis-predicting methods 379 (Cox-nnet, CoxBoost, Cox-PH and RF-S). Each dataset was randomly split into 80% training and 20% 380 testing sets. B. Heatmap of the performance rank of each dataset. 381 Figure 3. A. Hidden node output of the TCGA KIRC dataset. B. t-SNE plot of the top 20 hidden nodes 382 and the top 20 principal components in PCA analysis. C. Gene Set Enrichment Analysis: significantly 383 enriched KEGG pathways of the top 20 hidden nodes (adjusted p-value < 0.05). 384 Figure 4. Single variable C-index scores of the leading edge genes from Cox-nnet and Cox-PH. Cox-nn 385 has significantly higher C-index scores (p = 5.79e-5). 386 Figure 1. An overview of the neural network architecture used in this study. 378 Figure 2. A. Barplot of the C-index of the 10 TCGA datasets using four prognosis-predicting methods 379 (Cox-nnet, CoxBoost, Cox-PH and RF-S). Each dataset was randomly split into 80% training and 20% 380 testing sets. B. Heatmap of the performance rank of each dataset. 381 Figure 3. A. Hidden node output of the TCGA KIRC dataset. B. t-SNE plot of the top 20 hidden nodes 382 and the top 20 principal components in PCA analysis. C. Gene Set Enrichment Analysis: significantly 383 enriched KEGG pathways of the top 20 hidden nodes (adjusted p-value < 0.05). 384 Figure 3. A. Hidden node output of the TCGA KIRC dataset. B. t-SNE plot of the top 20 hidden nodes 382 and the top 20 principal components in PCA analysis. C. Gene Set Enrichment Analysis: significantly 383 enriched KEGG pathways of the top 20 hidden nodes (adjusted p-value < 0.05). 384 Figure 4. Single variable C-index scores of the leading edge genes from Cox-nnet and Cox-PH. Cox-nnet 385 has significantly higher C-index scores (p = 5.79e-5). 386 17 . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . Figure S3. Log-rank p-value bar plot of the 10 TCGA datasets. 400 Figures 377 400 18 . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint Figure S4. Variable importance of the common leading edge genes of enriched KEGG pathways. 401 402 Table S1. Tabulation of TCGA patients by individual dataset. 403 Table S2. Significantly enriched pathways from the Cox-PH method (p < 0.05). 404 Table S3. Significantly enriched pathways from the Cox-nnet method (p < 0.05). 405 406 407 Table S1. Tabulation of TCGA patients by individual dataset. 403 Table S2. Significantly enriched pathways from the Cox-PH method (p < 0.05). 404 Table S3. Significantly enriched pathways from the Cox-nnet method (p < 0.05). 405 407 19 ( ) T i H G W X b = + ( ) T T i H G W X b β = + ( ) 1 ( ) ( log exp ) i j i j C i t t pl β θ θ = ≥ = − ∑ ∑ * * ** * * ** ** ** ** ** ** ** * * ** ** ** ** ** ** ** ** ** 0.5 0.6 0.7 0.8 0.9 BLCA BRCA HNSC KIRC LGG LIHC LUAD LUSC OV STAD Dataset c−index Mtehod Cox−nnet ( Cox−nnet ( Cox−PH CoxBoost Random Fo Performance across TCGA datasets Cox-nnet s better * Performance Rank A B . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. Figures 377 CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint Prognostic Index of patients Node value −2 0 2 Node output value . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. Figures 377 ; https://doi.org/10.1101/093021 doi: bioRxiv preprint node_19 node_9 node_16 node_14 node_4 node_15 node_6 node_13 node_5 node_20 node_11 node_2 node_7 node_8 node_17 node_10 node_1 node_3 node_18 node_12 MELANOGENE CALCIUM_SIG LONG_TERM_ CHRONIC_MY MELANOMA THYROID_CAN UBIQUITIN_ME GLIOMA SMALL_CELL_ ACUTE_MYEL NON_SMALL_ ERBB_SIGNAL PANCREATIC_ MISMATCH_R ARRHYTHMOG SPLICEOSOM PRION_DISEA PURINE_META GLYCOSAMIN ALZHEIMERS_ HUNTINGTON O_GLYCAN_B LONG_TERM_ GAP_JUNCTIO LYSOSOME ARGININE_AN TASTE_TRANS LEUKOCYTE_ PARKINSONS_ OXIDATIVE_PH PRIMARY_BIL AMYOTROPHI VIRAL_MYOCA ASTHMA FC_GAMMA_R T_CELL_RECE STEROID_BIO CELL_ADHES AUTOIMMUNE JAK_STAT_SIG CHEMOKINE_ ANTIGEN_PRO ALLOGRAFT_ GRAFT_VERS LEISHMANIA_ NATURAL_KIL TYPE_I_DIABE TOLL_LIKE_RE HEMATOPOIET FC_EPSILON_ BASAL_CELL_ DRUG_METAB ASCORBATE_ GLYCINE_SER PYRIMIDINE_M PATHOGENIC_ GLYCOSAMIN HISTIDINE_ME DNA_REPLICA NOD_LIKE_RE COMPLEMENT GLYCOLYSIS_ REGULATION_ BASE_EXCISI CYTOSOLIC_D RIBOSOME INTESTINAL_I VASOPRESSIN TERPENOID_B PRIMARY_IMM WNT_SIGNAL TGF_BETA_SI PATHWAYS_IN RENAL_CELL_ ALDOSTERON MTOR_SIGNA NEUROTROPH COLORECTAL FOCAL_ADHE HOMOLOGOU ADIPOCYTOK NITROGEN_M INOSITOL_PH PHOSPHATIDY BETA_ALANIN SYSTEMIC_LU PROSTATE_CA ENDOMETRIA PROXIMAL_TU INSULIN_SIGN RENIN_ANGIO TIGHT_JUNCT ADHERENS_J VASCULAR_S PEROXISOME ENDOCYTOSI P53_SIGNALIN CELL_CYCLE CYTOKINE_CY PPAR_SIGNAL PROTEASOME BUTANOATE_M PROPANOATE PYRUVATE_M SPHINGOLIPID TRYPTOPHAN LYSINE_DEGR VALINE_LEUC CITRATE_CYC FATTY_ACID_M Prognostic Index of patients Node value −2 0 2 Node output value t−SNE plot of top 20 Cox−nnet nodes B ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● −20 −10 0 10 20 −20 −10 0 10 20 30 t−SNE_1 t−SNE_2 Top 20 Cox−nnet nodes ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● −20 0 20 −25 0 25 t−SNE_1 t−SNE_2 −4 0 4 PI Top 20 principal components . Figures 377 ; https://doi.org/10.1101/093021 doi: bioRxiv preprint * * * ** ** ** ** ** ** ** * * ** ** ** ** ** ** ** ** ** BRCA HNSC KIRC LGG LIHC LUAD LUSC OV STAD Dataset Mtehod Cox−nnet (Dropout) Cox−nnet (Ridge) Cox−PH CoxBoost Random Forest Performance across TCGA datasets Cox-nnet significantly better * (Dropout) et (Ridge) Cox−PH CoxBoost RF BLCA BRCA HNSC KIRC LGG LIHC LUAD LUSC OV STAD Dataset Rank 1 2 3 4 5 Performance Rank . CC-BY 4.0 International license under a y peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: t * * * ** ** ** ** ** ** ** * * ** ** ** ** ** ** ** ** ** BRCA HNSC KIRC LGG LIHC LUAD LUSC OV STAD Dataset Mtehod Cox−nnet (Dropout) Cox−nnet (Ridge) Cox−PH CoxBoost Random Forest Performance across TCGA datasets Cox-nnet significantly better * . CC-BY 4.0 International license under a y peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: t A A Performance across TCGA datasets . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint Performance across TCGA datasets . CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. ; https://doi.org/10.1101/093021 doi: bioRxiv preprint Cox−nnet (Dropout) Cox−nnet (Ridge) Cox−PH CoxBoost RF BLCA BRCA HNSC KIRC LGG LIHC LUAD LUSC OV STAD Dataset Method Rank 1 2 3 4 5 Performance Rank B B Performance Rank Method C A Node clustering by pathway Hidden layer node outputs of KIRC dataset Node clustering by pathway y p Prognostic Index of patients Node value −2 0 2 Node output value . Figures 377 CC-BY 4.0 International license under a not certified by peer review) is the author/funder, who has granted bioRxiv a license to display the preprint in perpetuity. It is made available The copyright holder for this preprint (which was this version posted December 11, 2016. Figures 377 ; https://doi.org/10.1101/093021 doi: bioRxiv preprint Prognostic Index of patients Enriched Pathway Not significant 2 B t−SNE plot of top 20 Cox−nnet nodes B ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● −20 −10 0 10 20 −20 −10 0 10 20 30 t−SNE_1 t−SNE_2 Top 20 Cox−nnet nodes ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● −20 0 20 −25 0 25 t−SNE_1 t−SNE_2 −4 0 4 PI Top 20 principal components e_19 de_9 e_16 e_14 de_4 e 15 t−SNE plot of top 20 Cox−nnet nodes B ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● −20 −10 0 10 20 −20 −10 0 10 20 30 t−SNE_1 t−SNE_2 Top 20 Cox−nnet nodes ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● −20 0 20 −25 0 25 t−SNE_1 t−SNE_2 −4 0 4 PI Top 20 principal components t−SNE plot of top 20 Cox−nnet nodes Cox nnet nodes ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● −20 0 20 −25 0 25 t−SNE_1 t SNE_2 −4 0 4 PI Top 20 principal components p p ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● −20 −10 0 10 20 −20 −10 0 10 20 30 t−SNE_1 t−SNE_2 Top 20 Cox−nnet nodes Top 20 principal components Top 20 Cox−nnet nodes t−SNE_2 t−SNE_2 node_19 node_9 node_16 node_14 node_4 node_15 node_6 node_13 node_5 node_20 node_11 node_2 node_7 node_8 node_17 node_10 node_1 node_3 node_18 node_12 0 50 0 55 0 60 Single variable c−index of leading edge genes Method Cox−nnet Cox−PH Cox-nnet specific leading edge genes Leading edge genes found by both Cox-nnet and Cox-PH models Enriched Pathway Single variable c−index of leading edge genes Single variable c−index of leading edge genes 20 density 0 0.50 0.55 0.60 c_index Enriched pathway-gene bipartite network ADHERENS_JUNCTION BUTANOATE_METABOLISM CITRATE_CYCLE_TCA_CYCLE ENDOCYTOSIS ENDOMETRIAL_CANCER FATTY_ACID_METABOLISM INSULIN_SIGNALING_PATHWAY LYSINE_DEGRADATION PEROXISOME PPAR_SIGNALING_PATHWAY PROPANOATE_METABOLISM PROSTATE_CANCER PROXIMAL_TUBULE_BICARBONATE_RECLAMATION INSR CREBBP EP300 MAPK1 TJP1 SMAD4 ERBB2 WASL FER TCF7L2 CTNNA1 TGFBR2 PVRL3 LMO7 CTNNB1 RHOA IGF1R PTPRB ACSM3 ALDH2 ALDH7A1 OXCT1 HADHA BDH2 ABAT HMGCS2 HMGCS1 EHHADH ACAT1 L2HGDH ALDH3A2 HADH PCK2 SDHAIDH3A SUCLG2 ACO1 SDHD OGDH SDHB OGDHL DLD PCK1 DLST ACO2 DLAT SUCLA2 FLT1 C3 3 IQSEC1 NEDD4L KIT ASAP2RABEP1 ZFYVE20 DCD6IP EHD3 STAM AB11FIP5 DNAJC6 CHMP4C RAB11FIP2 EHD4 ITCH STAM2 PIP5K1B 5C AP2B1 AGAP1 KDR ADRB2 USP8 MP5 VPS4B VPS37D VPS24 TCF7L1 CCND1 FOXO3 ARAF PIK3CA GSK3B AKT3 PTEN APC BRAF PIK3R3 PDPK1 SOS2 CYP4A22 CYP4A11 ACADL CPT1A HADHB ACSL1 ACOX1 PECI ACAA2 ADH5 CPT2 ACADM ACADSB PRKAA1 MAPK10 RAPGEF1 LIPE FBP1 PRKCZ PRKAR1A FOXO1 MAPK8 G6PC CRK PPP1CB PRKAR2A PHKB SOCS2 CALM1 PPARGC1A PRKAA2 SUV420H1 SETDB2 ASH1L AASDH BBOX1 TMLHE NUDT12 DDO PXMP2 HSD17B4 PEX11A HACL1 NOS2 PEX7 ACOX2 HAO2 PECR ABCD3 PEX26 CAT PHYH PEX1 CROT PEX12 PEX19 SCP2 EPHX2 CRAT SLC27A2 MPV17L AQP7 PPARG PPARA SCD5 ACSS3 MUT HIBCH PCCA ALDH6A1 PDGFB BCL2 CHUK PDGFD AR ATP1B1 SLC9A3 FXYD2 SLC4A4 CA2 GLS2 AQP1 GLUD2 CA4 ATP1A1 CYTOKINE_CYTOKINE RECEPTOR_INTERACTION PROTEASOME AMH IL20RB RELT TNFSF14 TNFRSF25 IL15RA INHBE LIF IL6 CXCL2 IL23A IFNB1 IFNE TNFRSF6B CSF2 OSM TNFRSF18 CXCL5 IFNGR2 CXCL3 CXCL13 IFNG TNFRSF8 CCR10 CCL7 TNFSF4 CXCL1 IL4R CSF3R CCL8 LTA CCL5 CCL25 FLT3LG CXCR5 XCL1 TNFRSF1A TNFSF9 XCL2 CSF1 LTBR FASLG IL8 TNFRSF12A IL2RG IL21R TGFB1 LTB CCL11 IL2RB IL10RB IL1B IL1A GDF5 TNFSF11 CCL26 TNFSF13B IL1R2 IL20RA CCL19 CCR8 PSMD13 PSMA4 PSMB4 PSME2 PSMB10 PSMD4 PSMC5 PSMB3 SHFM1 PSMD7 PSMB2 PSMA5 PSMB6 PSMA1 PSMC3 PSMD14 PSMC4 CELL_CYCLE P53_SIGNALING PATHWAY PLK1 CDC25B CHEK2 CCNA2 ANAPC7 PTTG1 ORC6L CDC20 CDC7 CCNB2 E2F3 PKMYT1 ANAPC5 E2F4 CDC25C BUB1B CCNE1 DBF4 TTK CDC45 CDK1 BUB1 SFN E2F2 CDK2 CDC6 CCNB1 CDC25A CCNA1 CDKN2C BID GTSE1 BAI1 STEAP3 RRM2 PMAIP1 SHISA5 CASP9 CASP3 et specific leading edge genes g edge genes found by both et and Cox-PH models ched Pathway Enriched pathway-gene bipartite network ADHERENS_JUNCTION ENDOCYTOSIS ENDOMETRIAL_CANCER INSULIN_SIGNALING_PATHWAY PROSTATE_CANCER PROXIMAL_TUBULE_BICAR INSR CREBBP EP300 MAPK1 TJP1 SMAD4 ERBB2 WASL FER TCF7L2 CTNND1 CTNNA1 TGFBR2 PVRL3 LMO7 CTNNB1 RHOA IGF1R PTPRB PCK1 FLT1 IQSEC3 ERBB3 IQSEC1 CHMP2B NEDD4L KIT ASAP2RABEP1 ZFYVE20 PDCD6IP EHD3 STAM RAB11FIP5 DNAJC6 CHMP4C HSPA1L RAB11FIP2 EHD4 ITCH STAM2 PIP5K1B RAB5C AP2B1 AGAP1 KDR ADRB2 USP8 CHMP5 VPS4B VPS37D TRAF6 VPS24 TCF7L1 CCND1 FOXO3 ARAF PIK3CA GSK3B AKT3 PTEN APC BRAF PIK3R3 PDPK1 SOS2 PRKAA1 MAPK10 RAPGEF1 LIPE FBP1 PRKCZ PRKAR1A FOXO1 MAPK8 G6PC CRK PPP1CB PRKAR2A PHKB SOCS2 CALM1 PPARGC1A PRKAA2 PDGFB BCL2 CHUK PDGFD AR CELL_CYCLE P53_SIGNALING PATHWAY PLK1 CDC25B CHEK2 CCNA2 ANAPC7 PTTG1 ORC6L CDC20 CDC7 CCNB2 E2F3 PKMYT1 ANAPC5 E2F4 CDC25C BUB1B CCNE1 DBF4 TTK CDC45 CDK1 BUB1 SFN E2F2 CDK2 CDC6 CCNB1 CDC25A CCNA1 CDKN2C BID GTSE1 BAI1 STEAP3 RRM2 PMAIP1 SHISA5 CASP9 CASP3
W2301744751.txt
https://ejournal.undip.ac.id/index.php/jitaa/article/download/10589/8427
en
SYNCHRONIZATION OF CARBOHYDRATE AND PROTEIN SUPPLY IN THE SUGARCANE BAGASSE BASED RATION ON IN SITU NUTRIENT DEGRADABILITY
Journal of The Indonesian Tropical Animal Agriculture/Journal of the Indonesian tropical animal agriculture
2,016
cc-by-sa
4,229
Journal of the Indonesian Tropical Animal Agriculture (J. Indonesian Trop. Anim. Agric.) pISSN 2087-8273 eISSN 2460-6278 41(1):28-36, March 2016 DOI: 10.14710/jitaa.41.1.28-36 SYNCHRONIZATION OF CARBOHYDRATE AND PROTEIN SUPPLY IN THE SUGARCANE BAGASSE BASED RATION ON IN SITU NUTRIENT DEGRADABILITY F. F. Sani, L. K. Nuswantara, E. Pangestu, F. Wahyono and J. Achmadi1 Faculty of Animal and Agricultural Sciences, Diponegoro University, Tembalang Campus, Semarang 50275 - Indonesia 1Corresponding E-mail:jachmadi@gmail.com Received August 17, 2015; Accepted November 02, 2015 ABSTRAK Dua ekor domba jantan dewasa digunakan pada dua percobaan untuk mengkaji pengaruh sinkronisasi suplai karbohidrat dan protein dalam pakan komplit berbasis bagase tebu terhadap kecernaan nutrien secara in situ. Percobaan pertama ditujukan untuk menyusun tiga pakan komplit berbasis bagase dengan tiga indeks sinkroni yang berbeda. Semua bahan pakan penyusun dievaluasi untuk mendapatkan gambaran kinetika degradasi bahan organik (BO) dan nitrogen (N) secara in situ. Berdasarkan atas kinetika degradasi BO dan N, tiga pakan komplit masing-masing diformulasikan dengan indeks sinkroni 0,37; 0,50; dan 0,63. Ketiga pakan komplit mengandung protein kasar (PK), energi dan neutral detergent fiber (NDF) yang sama. Percobaan kedua merupakan evaluasi terhadap tiga pakan komplit berbasis bagase tebu dengan indeks sinkroni yang berbeda secara in situ. Degradasi BO pada pakan komplit secara in situ menurun (P<0,05) dengan peningkatan indeks sinkroni. Semakin meningkat indeks sinkroni semakin meningkatkan (P<0,05) degradasi PK pada pakan komplit. Perubahan indeks sinkroni pada pakan komplit menurunkan (P<0,05) degradasi NDF. Semakin meningkat indeks sinkroni pada pakan komplit semakin menurunkan degradasi sulfur, dan ini tidak mendukung tujuan pengaruh sinkronisasi suplai karbohidrat dan protein dalam pakan komplit berbasis bagase. Kata kunci: degradasi nutrien, bagase tebu, sinkronisasi, in situ ABSTRACT Two adult male sheeps fitted with rumen cannula were used in two experiments to study the effects of synchronization of carbohydrate and nitrogen supply in sugarcane bagasse based total mixed ration (TMR) on in situ nutrient degradation. The first experiment was aimed to create three TMR with different synchronization index. Ingredient feedstuffs of TMR were evaluated for its in situ organic matter (OM) and nitrogen (N) degradation kinetics. On the basis of the OM and N degradation kinetics of feedstuffs, three sugarcane bagasse based TMR were formulated with synchronization indexes of 0.37; 0.50; and 0.63; respectively. The TMR had similar levels of crude protein (CP), total digestible nutrients, and neutral detergent fiber (NDF). In the second experiment, the three TMR with different synchronization index were evaluated for in situ degradability characteristics of OM, CP, NDF, and sulfur. The in situ degradation of OM in TMR were decreased (P<0.05) with the increasing of synchronization index. The higher synchronization index in TMR increased (P<0.05) CP degradation of CP. The NDF degradation decreased slightly by the alteration of synchronization index in TMR. The higher synchronization index in TMR reduced (P<0.05) in situ sulfur degradation, and this may not support to effects of synchronization of carbohydrate and nitrogen supply. Key words: in situ, nutrient degradation, sugarcane bagasse, synchronization 28 J.Indonesian Trop.Anim.Agric. 41(1):28-36, March 2016 INTRODUCTION The synchronization of dietary carbohydrate and protein degradability in rumen is attempted to increase microbial protein synthesis, thus improving the post-ruminal flow of protein. The synchronization of energy and nitrogen supplies in the rumen enhance microbial protein synthesis, improving rumen fermentation efficiency, nurient utilization and animal performance (Seo et al., 2010; Chumpawadee et al., 2006; Sinclair et al., 1993). By contrast, Piao et al. (2012), Rotger et al. (2006) and Chanjula et al. (2004) reported that there is no significant synchronization effect of ruminal nutrient degradability characteristics on rumen fermentation and microbial growth. Sulfur is one of the most important element for synthesis of sulfur amino acid such as methionine, cystine and cysteine. Methionine is an essential amino acid which has an important role in protein synthesis, as a start codon in the formation of amino acids. Sulfur intake restriction may lower the synthesis of methionine by bacteria, thus microbial protein synthesis may be adjusted to the availability of ruminal sulfur (Karto, 1999). Likewise, dietary sulfur concentration has been found to effect on rumen microbial growth (Suttle, 2010; Pathak, 2008; Stevani and Durand, 1989). The synchronization of supply from ruminal product of carbohydrate and nitrogen degradations is expected to increase microbial protein synthesis. Therefore, ruminal sulfur availability may be an important factor in contributing the improved microbial protein synthesis. The objectives of this study were to evaluate the effects of synchronization of carbohydrate and protein in sugarcane bagasse based total mixed ration on the ruminal degradation of sulfur and other organic nutrients. This was accomplished using the in situ technique. MATERIALS AND METHODS Experiment 1. In situ Degradation Characteristics of Feedstuffs This experiment was aimed to determine the characteristics of ruminal nutrient degradation of feedstuffs. Two ruminally cannulated male sheeps with the average body weight of 20 kg were housed individually in metabolic cages. They were fed on a diet (12% CP; 62% TDN; 55% NDF) daily at a maintenance level, and drinking water was available ad libitum. After two weeks of adaptation period to the diet and environment, each sheep was subjected to the experiment of in situ degradation characteristics of feedstuffs. Samples of each feedstuffs were ground through a 2-mm screen and material less than 45 μm was removed by hand sieving. Approximately 5.0 g of DM of each test feedstuff was accurately weighed into nylon bags with a pore size of 46 μm. The bags were then placed into the rumen 30 min after morning feeding and removed after intervals of 0, 2, 4, 6, 12, 24, 48, 72 h. For each incubation time, each sample of feedstuff was tested in triplicates in each sheep, randomly. Following incubation, the bags and contents were washed using aquademineral through the cold rinse cycle of a washing machine. Zero-hour bags were not incubated in the rumen but were washed in the same manner as incubated bags. After washing, bags and contents were dried in an oven at 60°C for 48 h and reweighed. Residue in the bags from the incubation period were analyzed to know the percentage of disappearance organic matter (OM) and crude protein (CP). The degradability data obtained for N and OM for feedstuffs were fitted to the model of Ǿrskov dan McDonald (1979) p = a + b (1 – exp (-ct)), where p is the cumulative amount degraded at time t, a is the rapidly soluble fraction, b is the potentially degraded fraction and c is the rate of degradation of fraction b. The synchronization index of each feedstuff was calculated based on degradation values of N to OM as described by Sinclair et al. (1993): Synchronization Index = 25 − ∑ 1 − 24 (25 − N kg) 2 OM 24 25 where 25 is 25 g of N/kg of digested OM in the rumen (Czerkawski, 1986), a synchronization index of 1.0 represent perfect synchronization between N and OM supply throughout the day and values less than 1.0 indicate the degree of ansynchronization. Three formulas of experimental diets were created on the basis of synchronization index value of each ingredient. The experimental diets were formulated to have synchronization indexes of 0.37; 0.50; and 0.63; respectively. The diets were in the form of total mixed ration (TMR) and were designed to have similar CP, TDN and NDF levels. Urea and molasses were used in formulating the diets. This was assumed that 95% of urea N was degraded in the first hour after In situ Nutrient Degradability of TMR with Different Synchronization Index (F. F. Sani et al.) 29 feeding, with the remaining 5% of urea N degraded at a rate of 0.5/h (Sinclair et al., 1995). Molasses was assumed at 100% of N and OM was degraded in the first hour post feeding (Chumpawadee et al., 2006). Experiment 2. Evaluation of Bagasse Based TMR with Different Synchronization Index The Experiment 2 was aimed to study the effect of the synchronization index alteration in sugarcane bagasse based TMR on the in situ degradation of sulfur, OM, CP and NDF. Three formulas of sugarcane bagasse based TMR resulted from Experiment 1 were used in this evaluation (Table 2). Animal, environment, and procedures of the in situ technique were similar to the Experiment 1. During the in situ technique, sheep were fed on TMR according to the test of TMR. Animals were fed TMR daily at maintenance level in two equal meals at 06.00 h and 18.00 h. Drinking water was available at all times throughout experimental period. Feed and residue in nylon bags were analyzed for sulfur, OM, CP, and NDF. Sulfur, OM, and CP contents of feed and residue were analyzed according to the procedure of AOAC (2000). A crossover design (two animals; three synchronization index treatments) was used to allocate the treatment of synchronization index alteration with six replicates of each treatment, and one way analyse of variance was used to test the data. RESULTS Experiment 1 Nutrient composition and synchronization index of each feedstuff ingredient are presented in Table 1. The feedstuff ingredients varied widely in their chemical compositions. The CP content of cassava waste was the lowest, and the CP content of soybean mill was the highest. The NDF and ADF contents of soybean m was the lowest, and the NDF and ADF contents of sugarcane bagasse was the highest. The ash content of rice bran was the highest and the ash content of maize grain was the lowest. The synchronization index was calculated on the basis of N and OM ruminal degradation characteristics for each feedstuff ingredients. The feedstuff ingredients had variation in their synchronization indexes. The synchronization Table 1. Chemical Compositions of Feedstuffs for TMR Formulation Feedstuffs OM TDN CP Ash NDF ADF Sulfur SI ---------------------------------- % DM basis ------------------------------- Sugarcane bagasse 96.66 49.49 1.75 3.34 89.07 53.98 0.63 0.088 Rice bran 87.20 66.64 6.01 12.80 61.21 28.39 0.10 0.668 Molasses 92.91 80.64 1.15 7.09 - - 0.84 1.000 Copra mill 93.32 55.21 14.98 6.68 62.35 35.51 0.25 0.847 - - 287.5 - - - - 0.950 Palm frond mill 96.94 61.78 15.07 3.06 75.19 45.33 0.06 0.627 Coffe seed shell 90.13 47.68 7.37 9.87 72.58 51.69 0.15 0.558 Cassava waste 95.55 64.99 1.49 4.45 35.28 21.76 0.03 0.112 Wheat pollard 95.14 75.74 12.83 4.86 51.10 20.69 0.05 0.891 Groundnuts shell 91.47 34.38 5.59 8.53 69.68 56.89 0.12 0.286 Corn 98.79 80.06 8.84 1.21 51.07 17.56 0.16 0.528 Soybean mill 93.34 82.23 47.96 6.66 11.66 8.87 0.45 0.960 - - - - - - - - Urea Salt OM = Organic matter, TDN = Total digestible nutrients, CP = Crude protein, NDF = Neutral detergent fiber, ADF = Acid detergent fiber, SI = Synchronization Index 30 J.Indonesian Trop.Anim.Agric. 41(1):28-36, March 2016 index of soybean mill was the highest and the synchronization index of sugarcane bagasse was the lowest. Table 2 shows the experimental TMR which were formulated with synchronization indexes of 0.37; 0.50; and 0.63; respectively. These diets had similar contents of CP, TDN, and NDF. Experiment 2 Figure 1 shows the percentage loss of OM, CP, NDF, and sulfur of three TMR with respective synchronization indexes throughout the incubation times. There were rapid increases in nutrient disappearances during the first 24 h of incubation time, then the rates of nutrient disappearances were plateau throughout the second 24 h of incubation time. Table 3 shows the in situ nutrient degradation characteristics of TMR with different synchronization index, those were calculated on the basis of data from Figure 1. The higher synchronization index of TMR lowered (P<0.05) fraction a+b of OM (Table 3). In contrast, higher synchronization index of TMR Table 2. Ingredients and Chemical Composition of TMR with Different Synchronization Index Synchronization Index 0.37 Ingredient Sugarcane bagasse Rice bran Molasses Copra mill Urea Palm frond mill Coffe seed shell Cassava waste Wheat pollard Groundnuts shell Corn Soybean mill Salt Total Analyzed chemical composition (%) Organic matter Crude protein Total digestible nutrients1 Neutral detergent fiber Acid detergent fiber Cell contents Hemicellulose Sulfur contents N : S ratio 1 0.50 0.63 25.00 2.50 2.00 2.50 0.70 16.50 2.30 30.20 1.10 1.60 5.80 11.30 0.50 100.00 25.00 4.00 4.00 6.00 0.50 9.00 2.00 15.50 15.50 3.50 4.50 10.00 0.50 100.00 25.00 5.60 7.00 16.30 0.20 1.00 3.80 2.20 23.00 3.60 0.50 11.30 0.50 100.00 95.64 12.06 62.05 54.80 32.85 45.20 21.95 0.26 7.4 : 1 95.03 12.17 62.93 55.97 32.12 44.03 23.85 0.29 6.7 : 1 94.13 12.95 62.96 55.98 31.67 44.02 24.31 0.34 6.1 : 1 Calculated according to Harris et al. (1972) In situ Nutrient Degradability of TMR with Different Synchronization Index (F. F. Sani et al.) 31 Table 3. In situ Degradability of Bagasse Based TMR with Different Synchronization Index Parameters Synchronization Index 0.37 0.50 0.63 a (%) 34.88±0.60a 28.21±0.78c 31.11±0.70b b (%) 23.32 ±0.73c 29.12±1.18a 25.09±1.14b c (% / h) 5.97±0.46a 5.44±0.30b 4.14±0.32c a+b (%) 58.12±0.27a 57.33±0.49b 56.12±0.71c a (%) 38.82±0.84a 21.52±0.94b 17.65±1.80c b (%) 25.08±0.96c 47.11±1.14b 52.59±2.21a c (% / h) 6.82±0.50a 6.28±0.21b 6.98±0.42a a+b (%) 63.90 ±0.23c 68.63±0.36b 70.34±0.48a a (%) 10.45±0.94 8.51±1.40 9.66±1.40 b (%) 20.25±1.04 19.35±2.05 20.21±2.30 c (% / h ) 5.66±0.72 5.78±0.98 5.25±1.03 a+b (%) 30.71±0.45a 27.86±0.85b 29.89±1.41ab a (%) 53.47±2.44a 40.99±0.61b 27.09 ±1.19c b (%) 24.93±2.54a 22.85±0.23b 21.64 ±0.87c c (% / h) 1.48±0.29b 0.98 ±0.26b 4.15 ±1.30a a+b (%) 78.40±0.14a 63.84 ±0.42b 48.73 ±0.83c OM degradability CP degradability NDF degradability Sulfur degradability Values are means ±SE (n=6) a, b, c P<0.05 increased (P<0.05) the degradable fraction a+b of CP. The fraction a+b degradability of NDF decreased slightly with the increasing value of synchronization index of TMR. The higher synchronization index of TMR lowered (P<0.05) the fraction a+b of sulfur. DISCUSSIONS Sugarcane Bagasse Based TMR with Different Synchronization Index The sugarcane based TMR could be an alternative to secure feed availability for ruminants throughout the year, though the existence of most fiber components in sugarcane bagasse are tightly bound to lignin as 32 lignohemicelluloses and lignocelluloses. This study evaluated the in situ sulfur and other nutrient degradability of sugarcane bagasse based TMR with different synchronization index. The TMR were created using similar ingredient of feedstuffs, but the ruminal supply of energy and nitrogen of all ingredients were synchronized to favor the improvement of microbial protein synthesis. The levels of CP, TDN, NDF, and sulfur were similar among the TMR to avoid any effect of different chemical composition in the tested TMR (Table 2). The levels of CP and TDN in TMR were designed as the recommendation of Kearl (1982). Moreover, sugarcane bagasse portions were also similar in the TMR, because sugarcane bagasse had the lowest CP and J.Indonesian Trop.Anim.Agric. 41(1):28-36, March 2016 ratio of N to sulfur at 9.09 may maximize the in vitro growth of rumen microbes. The ratio of N to sulfur at 10 in diet results maximum nitrogen retention in Naeimi sheep (Al-Dobeeb, 2004). Figure 1. Dissapearance of sulfur (S), neutral detergent fiber (NDF), crude protein (CP) and organic matter (OM) with synchrony indexes of 0.37 ( ), 0.50 ( ) and 0.63 ( ), respectivelly. synchronization index and the highest NDF compared to other ingredients (Table 1). The ratios of N to sulfur in the TMR were relatively low to contribute an optimum rumen microbial growth. Suwandyastuti (2013) reported that the In situ Organic Nutrient Degradability of TMR Generally, ruminant diet is characterized with relatively more rapid ruminal degradation of dietary nitrogen than those of dietary carbohydrate. The synchronization of protein and carbohydrate supply means providing both rumen degradable protein (rumen degradable protein; non protein N and rumen degradable true protein) and energy (ruminally fermentable carbohydrates) to the rumen, so that ruminal microorganisms use both simultaneously (Yang et al., 2010; Hall and Huntington, 2008). The synchronization of the ruminal degradation rate of carbohydrates and protein has been proposed as a method to increase ruminal microbial protein synthesis, improve efficiency of N usage and animal performance, and decrease urinary N excretion. Using the in situ method, Orskov and McDonald (1979) explain the nutrient degradation characteristic of tested feed on the basis of the rapidly soluble fraction of nutrients, the potentially degradable fraction of nutrient, and degradation rate of the potentially degradable fraction of nutrient, respectively which were delineated as values of a, b, and c. Kim et al. (2014) suggested that the DM of tested feeds are classified into water-soluble and 45-mm filterable, insoluble degradable, and non-degradable fraction. The digestible NDF would be completely degraded in the rumen within 72 h. The portion of NDF that remained after 72 h of incubation was considered the indigestible fraction. The CP of tested feeds are classified into water-soluble and 45-mm filterable, insoluble degradable, and nondegradable fractions. The portion of CP that remained after 48 h of incubation was considered the non-degradable fraction. The higher synchronization index in TMR may prevent acids accumulation that cause an abrupt reduce in ruminal pH. Kim et al. (2014) concluded that higher portion of soluble carbohydrates in a diet increases ruminal concentration of lactic acid concomitantly with reduces ruminal pH. The decrease in ruminal pH do not favor to the growth of rumen microbes. Table 3 shows that the rapidly degradable OM fraction decreased (P<0.05) and the potentially degradable portion of OM fraction increased (P<0.05) by increasing the synchronization index. In situ Nutrient Degradability of TMR with Different Synchronization Index (F. F. Sani et al.) 33 Although the impact of synchronization index alteration in the lower digestive tract may have diluted the influence on rumen fermentation, there were some inconsistency results of in vivo studies. The in vivo OM digestibility are unchanged with the increasing synchronization index in the diets (Piao et al., 2012; Rotger et al., 2006; Chanjula et al., 2004). In contrast, the higher synchronization index of diets slightly increases in vivo OM digestibility of diets (Seo et al., 2010; Chumpawadee et al., 2006). Table 3 shows that the higher synchronization index decreased (P<0.05) the rapid degradable fractions of dietary CP and increased (P<0.05) the potentially degradable fractions of dietary CP. These results were in line with degradability characteristics of OM fraction. Therefore, the synchronization of ruminal dietary OM and CP releases could be used simultaneously for the growth of rumen microbes (Yang et al., 2010; Hall and Huntington, 2008). Moreover, the higher synchronization index increased (P<0.05) the sum of the rapid degradable and the potentially degradable fractions of dietary CP (Table 3). Although the impact of synchronization index alteration in the lower digestive tract may have diluted the influence on rumen fermentation, the in vivo CP digestibility increased according to the increasing of synchronization index in diets (Chumpawadee et al., 2006). The sum of rapid degradable and potentially degradable dietary NDF decreased (P<0.05) by the alteration of synchronization index, but both fractions were unaffected by the alteration of synchronization index in the TMR (Table 3). The discrepancy between degradation characteristic of dietary NDF with other organic nutrients may be caused by the degradability dietary lignin, although the in situ degradation characteristic of lignin was not determined in this study. Dietary NDF consists of hemicellulose, cellulose, lignin and other nutrients bound to lignin. The portion of sugarcane bagasse in TMR was the highest among ingredient feedstuffs (Table 2). Most fiber components of sugarcane bagasse are tightly bound to lignin as lignohemicelluloses and lignocelluloses (Ariyani et al., 2014; Ramli et al., 2005). In situ Sulfur Degradability of TMR The synchronization of ruminal carbohydrate and nitrogen supply may create an environment that favor optimum microbial synthesis. Optimum microbial protein synthesis and sulfur capture 34 occur when fermentable energy, degradable sulfur, nitrogen and phosphorus are supplied at rates that match the capacity of optimum microbial protein synthesis (Suttle, 2010). When a large amount of urea to substitute natural protein in a ruminant diet, limited sulfur intake and may restrict microbial protein synthesis (Pathak, 2008). The sulfur capture for synthesis of microbial methionine and cystine requires more degradable source of feed carbohydrate (Stevani and Durand, 1989). However, it is not clear why all in situ degradation characteristics of sulfur decreased (P<0.05) with increasing the synchronization index in TMR (Table 3). The reduced ruminal NDF degradation may attribute to the decreased sulfur degradation. Rumen microbes are well known to have the capability in degrading lignocellulolitic bonds, therefore rumen is the most important site for mineral availability to animal host and rumen microbes. Some parts of feed mineral are associated with the cell wall in cellulolitic diet, and ruminal release of mineral depends on degradability of feed NDF (Ceresnakova et al., 2007; Ibrahim and Zemmelink, 1999). CONCLUSION The synchronization of carbohydrate and nitrogen supply in TMR reduced ruminal OM digestibility and increased CP digestibility. It is suggested that the decreased ruminal OM degradation may match with rate of CP degradation. However, degradability of NDF and sulfur did not favor to microbial protein synthesis. Future study needs to consider some aspects concerning with micro flora fauna environment of rumen. REFERENCES Al-Dobeeb, S.N. 2004. Evaluation of digestibility, nitrogen and sulfur balances and rumen fermentation of diets supplemented with urea and/or potassium sulfate in Naeimi sheep. Pak. J. Biol. Sci. 7(12):2216-2221. AOAC. 2000. Official methods of analysis, 17 th Ed. Association of Official Analytical Chemists. Washington DC. Ariyani, S. A., L.K. Nuswantara, E. Pangestu, F. Wahyono and J. Achmadi. 2014. Parameters of potein metabolism in goats fed diets with different portion of sugarcane bagasse. J. Indonesia Trop. Anim. Agric. 39(2): 111- J.Indonesian Trop.Anim.Agric. 41(1):28-36, March 2016 116. Ceresnakova, Z., P. Flak, M. Polacikova and M. Chrenkova. 2007. In sacco macromineral release from selected foreges. Czech. J. Anim. Sci. 52(6):175-182. Chanjula, P., M. Wanapat, C. Wachirapaorn and P. Rowlinson. 2004. Effects of synchronizing starch sources and protein (NPN) in the rumen on feed intake, rumen microbial fermentation, nutrient utilization and performance of lactating dairy cows. AsianAust. J. Anim. Sci. 17:1400-1410. Chumpawadee, S., K. Sommart, T. Vongpralub and V. Pattarajinda. 2006. Effect of synchronizing the rate of dietary energy and nitrogen release on ruminal fermentation, microbal protein synthesis, blood urea nitrogen and nutrient digestibility in beef cattle. Asian-Aust. J. Anim. Sci. 19(2):181188. Czerkawski, J. W. 1986. An Introduction to Ruminal Studies. Oxford: Pergamon Press (Ed. H. J. Finalyson) 1986. The effect of pH on the growth and metabolism of Streptococcus bovis in continous culture. J. Appl. Bacteriol. 61:201-208. Hall, M. B. and G. B. Huntington. 2008. Nutrient synchrony: Sound in theory, elusive in practice. J. Anim. Sci. 86(E.Suppl.): E287E292. Harris, L. E., L. C. Kearl and P. V. Fonnesbeck. 1972. Use of regression equations in predicting availability of energy and protein. J. Animal Sci. 35 (3):658-680. Ibrahim, M. N. M. and G. Zemmelink. 1999. Effect of plant fibre on the solubility of mineral elements. Asian-Aust. J. Anim. Sci. 12(8):1277-1284. Karto, A. A. 1999. Peran dan kebutuhan sulfur pada ternak ruminansia. Wartazoa 8(2):3843. Kearl, L. C. 1982. Nutrient Requirements of Ruminants in Developing Countries. International Feed Stuffs Institute. Utah Agriculture Experimental Station. Utah State University, Logon, Utah, USA. pp. 45-58. Kim, Y.I., Y.K. Oh. K.K. Park, and W.S. Kwak. 2014. Ensiling characteristics and the in situ degradability of a by-product feed based silage. Asian-Aust. J. Anim. Sci. 27(2):201208. Ǿrskov, E. R. and I. McDonald. 1979. The estimation of protein degradability in the rumen from incubation measurements weight according to rate of passage. J. Agric. Sci., Cambridge. 92:499-503. Pathak, A. K. 2008. Various factors affecting microbial protein synthesis in rumen. Veterinary World. 1(6):186-189. Piao, M.Y., H.J. Kim, J.K. Seo, T.S. Park, J.S. Yoon, K.H. Kim, and J.K. Ha. 2012. Effects os synchronization of carbohydrate and protein supply in total mixed ration with Korean wine residue on ruminal fermentation, nitrogen metabolism and microbial protein synthesis in Holstein steers. Asian-Aust. J. Anim. Sci. 25(11):1568-1574. Ramli, M.N., Y. Imura, K. Takayama, and Y. Nakanishi. 2005. Bioconversion of sugarcane bagasse with Japanese koji by solid-state fermentation and its effects on nutritive value and preference in goats. Asian-Aust. J. Anim. Sci. 18(9):1279-1284. Rotger, A., A. Ferret, S. Calsamiglia and X. Manteca. 2006. Effects of nonstructural carbohydrate and protein sources on intake, apparent total tract digestibility, and ruminal metabolism in vivo and in vitro with highconcentrate beef cattle diets. J. Anim. Sci. 84:1188-1196. Seo, J. K., J. Yang, H. J. Kim, S. D. Upadhaya, W. M. Cho and J. K. Ha. 2010. Effects of synchronization of carbohydrate and protein supply on ruminal fermentation, nitrogen metabolism and microbial protein synthesis in holstein steers. Asian-Aust. J. Anim. Sci. 23(11):1455-1461. Sinclair, L. A., P. C. Garnsworthy, J. R. Newbold and P. J. Buttery. 1993. Effects of synchronizing the rate dietary energy and nitrogen release on rumen fermentation and microbal protein synthesis in sheep. J. Agric. Sci. 120:251-263. Sinclair, L. A., P. C. Garnsworthy, J. R. Newbold and P. J. Buttery. 1995. Effects of synchronizing the rate dietary energy and nitrogen release in diets with a similiar carbohydrate composition on rumen fermentation and microbial protein synthesis in sheep. J. Agric. Sci. 124:463-472. Stevani, J. and M. Durand. 1989. Effect of sulphur deficiency on fermentation of different carbohydrate sources in an artificial rumen (RUSITEC). Asian-Aust. J. Anim. Sci. 2(3):399-389. Suttle, N. F. 2010. Mineral Nutrition of Livestock. 4th Ed. CAB International, Cambridge. Pp. In situ Nutrient Degradability of TMR with Different Synchronization Index (F. F. Sani et al.) 35 206-222. Suwandyastuti, S. N. O. 2013. Pengaruh nisbah energi-protein, nitrogen-sulfur dan kalsiumfosfor terhadap produk metabolisme rumen dan kecernaan substrat. Agripet. 13(2): 1-6. 36 Yang, J. Y., J. Seo, H. J. Kim, S. Seo and J. K. Ha. 2010. Nutrient synchrony: Is it a suitable strategy to improve nitrogen utilization and animal performace?. Asian-Aust. J. Anim. Sci. 23: 972-979 J.Indonesian Trop.Anim.Agric. 41(1):28-36, March 2016
https://openalex.org/W4395090203
https://eajournals.org/gjahss/wp-content/uploads/sites/33/2024/04/Firm-Characteristics.pdf
English
null
Firm Characteristics and Corporate Social Responsibility of Listed Consumer Goods Sector Firms in Nigeria
Global journal of arts, humanities and social sciences
2,024
cc-by
7,079
doi: https://doi.org/10.37745/gjahss.2013/vol12n36376 Published April 24, 2024 Citation: Colma E. and Etale L.M. (2024) Firm Characteristics and Corporate Social Responsibility of Listed Consumer Goods Sector Firms in Nigeria, Global Journal of Arts, Humanities and Social Sciences, Vol.12, No.3, pp.63-76 ABSTRACT: This study assessed the impact of firm characteristics on corporate social responsibility (CSR) of listed consumer goods firms in Nigeria for the period of eleven years covering 2013 to 2023. The study adopted firm size and firm age as proxies for firm characteristics with the addition of firm growth (explanatory variables), while corporate social responsibility served as the response variable. Based on the ex post facto study design, secondary data collected from published financial statements of sampled five companies listed on the Nigerian Exchange Group were evaluated using Pearson correlation coefficient and multiple regression analysis based on OLS technique assisted by E-Views statistical software. The findings revealed that that firm size and firm growth had positive but insignificant impact on CSR, while firm age had negative insignificant effect on CSR practices of listed consumer goods firms in Nigeria. The study recommended that larger firms should dedicate specific departments or teams to CSR, while smaller firms can designate responsible individuals to CSR or outsource CSR functions if needed before implementing any CSR initiatives. Also, firms should conduct a thorough assessment of their competitive advantages and competencies in order to develop a comprehensive and sustainable CSR strategy that aligns with their business objectives, enhances their reputation, to satisfy the interest of all stakeholders in order to enjoy stable operations to enhance firm growth and sustainability. KEYWORDS: firm age, firm growth, firm size, legitimacy, stakeholder value integrati Firm Characteristics and Corporate Social Responsibility of Listed Consumer Goods Sector Firms in Nigeria Ebiye Colma and Lyndon M. Etale Department of Accounting, Faculty of Management Sciences, Niger Delta University, Wilberforce Island, Bayelsa State, Nigeria Ebiye Colma and Lyndon M. Etale Department of Accounting, Faculty of Management Sciences, Niger Delta University, Wilberforce Island, Bayelsa State, Nigeria Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Publication of the European Centre for Research Training and Development -UK Firm Characteristics and Corporate Social Responsibility of Listed Consumer Goods Sector Firms in Nigeria Ebiye Colma and Lyndon M. Etale Department of Accounting, Faculty of Management Sciences, Niger Delta University, Wilberforce Island, Bayelsa State, Nigeria Firm Characteristics and Corporate Social Responsibility of Listed Consumer Goods Sector Firms in Nigeria Ebiye Colma and Lyndon M. Etale Department of Accounting, Faculty of Management Sciences, Niger Delta University, Wilberforce Island, Bayelsa State, Nigeria Publication of the European Centre for Research Training and Development -UK According to CBN (2018), consumer goods firms in Nigeria contributed over 16% of country’s total Gross Domestic Product in the 2018 fiscal year. Firms are expected to contribute positively to the environment where they carry out their operation and to the growth of the economy at large. However, most of these firms production process, waste or disposal pattern sometimes does more harm to the environment they operate than good especially the manufacturing companies. As a result of this, corporate social responsibility (CSR) has been employed as a crucial element of business strategy to curtail the environmental and social brunt, the activities of firms does to the environment where they carry out production and other activities (Hosam, et al., 2019). The generally acceptable CSR given by Rasche et al. (2017) is that CSR is the integration of an organization’s social, ethical, environmental, and philanthropic responsibilities towards society into its processes, operations, and core business strategy in cooperation with relevant stakeholders. Nwude and Comfort (2021) further said that, CSR is an act where corporate firms include in their social values a strategic arrangement that will enable it to behave responsibly towards society. The extent to which a firm will meet up with its planned CSR as agreed by the board in a financial year largely depends on the board and firms characteristics such as the board diversity, board independence, board size, firm size, firm age etc. Nwude and Comfort (2021), Onipe and James (2021) and Adamu, et al. (2020), asserted that there is a connection between the board of directors’ characteristics, firms characteristics and corporate social responsibility. Firm characteristics can be seen as the wide varieties of information disclosed in the financial statement of business entities that serve as the predictors of the firm’s quality of accounting information and performance. It is made up of firm structural characteristics and firm performance characteristics. The firm structural characteristics include firm age, firm size, capital expenditure, firm leverage, and management efficiency while firm performance characteristics include profitability and firm growth (Shehu, 2009, Shuaibu et al., 2019). The financial statement of an organization is expected to show with accuracy the information on CSR for the stakeholders to know since it is a disclosure required by the standard. INTRODUCTION Corporate entities do not exist in isolation but rather exist in an environment. They exist as an entity that can sue and be sued and has impact on the social, economic, legal, cultural, ecological, technological and political environment of an economy so as to achieve the stated goals and objectives of the entity in the long run. Due to this, firms are being seen to be more concerned about what benefits them more than the environment they are situated. Ibrahim and Hamid (2019), posited that in the past firms have been seen traditionally to be self-centered by only aiming to achieve organizational profit, thereby assuming that the betterment of the standard of living of people in the society is solely on the government. 63 Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Global Journal of Arts, Humanities and Social Sciences Publication of the European Centre for Research Training and Development -UK Publication of the European Centre for Research Training and Development -UK The reminder of this paper dealt with the review of relevant literature, the methodology used in carrying out the study, the results of data analysis and discussion of findings, and finally, the conclusion and recommendations. Firm Age Firm age is a concept which examines the years the business has been in existence in the corporate world. Yameen, et.al (2019) asserted that firm age connotes the age of a firm at the time span of assessment. It has always been thought that years of operation by a firm can influence the degree of her CSR. Mutende et al (2017) argued that firm age has an influence on its performance. The older companies disclose more social responsibility information than newer companies, therefore. Firm Characteristics Firm characteristics also known as firm attributes simply refer to some specific features that differentiate a firm from other firms. Some of these features are: firm age, firm size, firm liquidity, firm financial performance, ownership structure and industry classification (Bassiouny, et al. 2016). Mohammed (2017) opined that firm characteristics are the factors that exist internally in the firm which influences share price of firms. According to Abdullahi (2016), firm characteristics are firm size, dividend, corporate governance, firm age, profitability, operating expenses, cash flow, and leverage. Firm Size Firm size connotes the magnitude of firm’s business. Astute (2015), opined that the size of a firm do have significant effect on the corporate social responsibility disclosure in her financial statement. Sritharan (2015), further stated that out of the elements of the characteristics of firm like liquidity, capital structure, performance, dividend policy and firm size, firm size gives the most competitive advantage to firms in the form of, reduced costs and economies of scale. Bujaki and Richardson (2017), concluded in their study that the expenses to be incurred with a higher disclosure level is at a minimal in big companies due to a better organized and robust internal reporting system. Masika and Simiyu (2018) then suggested that the size of a firm is strongly and positively related to financial performance of firms. Publication of the European Centre for Research Training and Development -UK Despite the fact that CSR is planned and budgeted for by entities, it is pertinent that the effect of such act on profit maximization and shareholders is at a minimal because prospective investors tend to look at firms age, firm size, asset composition, sales volume, profit distribution and dividend of a firm before making vital investment decision. Onipe and James (2021) agreed that CSR is desirable and also valued by all the stakeholders of a firm but even with the desire, most shareholders will prefer to earn a high dividend and capital gains on their investments. It is against the aforementioned backdrop that this study sought to examine the effect of firm characteristics (proxy by firm age, firm growth and firm size) on corporate social responsibility practices of listed consumer goods firms in Nigeria bearing in mind that these companies have resultant waste from operation that can be harmful to the hosting communities. More specifically, the purpose of the study was to determine the influence of firm age, firm growth and firm size on corporate social responsibility practices of listed consumer goods firms in Nigeria. In line these goals, three hypotheses were formulated and tested. 64 Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Legitimacy Theory The Legitimacy theory provided the theoretical foundation for this study to examine the effect of firm characteristics on corporate social responsibility practices of consumer goods firms in Nigeria. Legitimacy theory posits that organizations always make an effort to make sure that their operations adhere to social norms and boundaries (Deegan et al, 2002). The company's relationships with society are the main emphasis of this legitimacy theory. According to this view, an organization should adhere to the social norms that are applicable in the community since it is a part of it. According to legitimacy theory, a company's reporting practices and business practices are shaped by the social values of the community and society in which it operates (Ahmad et al, 2003). Therefore, businesses will make an effort to obtain legitimacy if they are aware of the changes in public opinion and the need for them to be socially responsible. In order to accomplish its goals, assure its existence, and reap other benefits, the organization has to carry out a variety of socially expected acts; society undoubtedly plays a role in determining the efficacy and legality of any particular corporation's activities. Society is putting more pressure on companies to use a portion of their profits to address pressing environmental issues, worker welfare, consumer safety, and involvement in the community. This is a significant departure from the long-held belief that an organization's ability to make money is a reliable measure of its legitimacy (Muwazir, 2011). Ogunode (2022), postulated that the legitimacy theory has to do with a social contract between communities and corporate entities where the corporate entities carryout operation. The social contract is of great importance for the purpose of peaceful co-existence between them and for also mutual benefits to both parties. The theory is of the opinion that entities should naturally agree to the existing rules, regulations, social and environmental norms of the community where they carry out operation maintaining existing peace and at the same time promoting growth. Suddaby et al. (2017), posit that legitimacy theory entails such assurance of meeting the conditions and expectations of the society, while the entity is carrying on its legitimate business. Some authors that have adopted this theory includes: Bissadu et al. (2017), Cho et al. (2015) and Akhalumeh & Ohiokha (2018). Publication of the European Centre for Research Training and Development -UK Publication of the European Centre for Research Training and Development -UK concerning the various positive effect the company has on the growth of its various stakeholders through community contribution, product involvement, employee welfare, and philanthropic act. The carrying out of CSR activities can build a positive image for a company than that of its competitors in the same industry. Starineca (2016), is of the opinion that communities that have enjoyed CSR programs have a better and higher standard of living than those who have not. Corporate Social Responsibility CSR is basically incorporation of the aspirations of the communities in the business plan of companies operating in their domain at a given time. The needs of the communities could be economic, legal, ethical or philanthropic. CSR activities to employees, communities, suppliers, creditors, shareholders and other stakeholders are expected to be disclosed by entities in order to keep the public abreast of the contribution the company is making. Egbunike and Tarilaye (2017), opined that CSR disclosure adequately provide all parties in the community with the information 65 Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Empirical Review p Velinov et al (2022) examined the perception of employees of brewery companies in Czech. Emphasis on this study was placed on the implementation of CSR practices in breweries across Czech in order to motivate employees. The study findings revealed that workers in Czech breweries were the least motivated because of the fact that CSR practices are not mandatory, therefore, employees’ perception of CSR practices are not positive. Cincalova and Novakova (2021) examined CSR practices of a selected Czech transport company. Primary data for the study was generated through the administration of a questionnaire on employees of the company. The findings revealed that the sampled transport company had very good CSR strategies, and the company’s CSR activities were adequately disclosed in line with requirements in Czech. Malik and Okere (2020) examined corporate social responsibility, environmental investments and financial performance with evidence from manufacturing companies. The study explored a total of 64 manufacturing companies as population from the period 2011 to 2016 and used descriptive and panel regression analysis to analyze the information obtained. Donations, staff training cost and employee benefits as variables while monetary output as reliant factor. The findings of the study revealed that environmental investments had positive significant impact on financial performance. Oladele and Mokuolu (2020) evaluated the relationship between corporate social responsibility expenditure and financial performance of quoted manufacturing firms in Nigeria between 1999 and 2015. The study used profit after tax of the firms as proxy for financial performance while total asset, working capital and leverage ratio were used as proxy for corporate social responsibility expenditure. The study results showed that CSR expenditure had positive impact on financial performance of the companies studied even though not significant. Tarus (2020) explore the effect of board size on environmental disclosure in 27 listed firms in Kenya between the period of 2008 and 2017. The random effect regression was used to analyze the data and content analysis was used as a measurement for environmental accounting disclosure. The regression results showed that board size and environmental disclosure were significant negatively related. Cincalova and Hedija (2020) investigated the relationship between firm characteristics and corporate social responsibility among Czech transportation and storage industry firms. Data collected from the Albertina database was evaluated using Pearson and Spearman correlation coefficients, and regression analysis. Legitimacy Theory This theory is relevant to this study because it explain the relationship that is expected to exist between a company, the community in which it operates and its stakeholders. It emphasis on the notion that no entity is assured continuity without putting the interests of one of its major stakeholders: the community into consideration. 66 Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ C t f R h T i i d D l t UK Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ blication of the European Centre for Research Training and Development -UK Publication of the European Centre for Research Training and Development -UK Publication of the European Centre for Research Training and Development -UK Publication of the European Centre for Research Training and Development -UK regression trend analysis and E-view statistical package. The study concluded that the extent of compliance by Nigerian manufacturing firms to CSR is far higher than the rate of non-compliance. Mugambi and Fatoki (2019) analyzed the between corporate social responsibility disclosure and financial performance of quoted manufacturing firms on Nairobi Securities Exchange (NSE). Return on asset was used to measure financial performance, while STATA 12 software was employed to analyze the data using descriptive and inferential method. The study reached a conclusion that community disclosure and environmental disclosure of listed manufacturing companies in Kenya have a positive but insignificant effect on financial performance. Kajola et al (2019) examined board features and corporate social responsibility practices in Oil and Gas firms in Nigeria. Ten Nigerian oil and gas firms were used as sample with the aim of investigating the effect of three board attributes on CSR between the period 2011 and 2020 and data were then obtained from their audited financial statement. The data were analyzed using panel data analysis. The findings revealed that corporate boards should have more numbers with most of them being non-executive directors with diverse skills, experience and expertise. Osemene and Fagbemi (2019) examined the association between corporate governance attributes and environmental reporting in Nigerian consumer goods firms using 20 listed consumer goods firms. The study covered period from 2008 – 2018 while data collected were analyzed with fixed effects estimation technique. The result of the study findings shows that board independence has a positive significant effect on environment reporting. Inua and Emeni (2019) executed a study on the influence of corporate governance attributes on social sustainability reporting using chief executive officer tenure, executive compensation, board gender diversity and board size to measure corporate governance. The studied used 35 Nigerian financial and non-financial companies as sample for the study obtaining data between 2010 and 2016. The analytical tool employed for data analysis was panel regression and the study revealed that only board gender diversity was the only driving variable has impact on social sustainability reporting. Ofoegbu et al (2018) investigated the impact of corporate board characteristics on environmental disclosure of listed firms in South Africa and Nigeria. The study collected data from 90 Nigeria companies and 213 South Africa companies for 2015 financial statement. Empirical Review The study found significant relationship between firm size, firm financial performance and CSR, whereas, firm age and board gender diversity had no effect on CSR of Czech transportation and storage industry companies. Igbekoyi et al (2019) explored corporate social responsibility compliance among manufacturing firms in Nigeria. A study employed a sample size of 25 and the information were obtained from the firm’s financial records between 2002 and 2016 and did analysis using graph, table, cross-sectional 67 Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Global Journal of Arts, Humanities and Social Sciences Publication of the European Centre for Research Training and Development -UK Ashafoke and Ilaboya (2017) assessed the effect of board features on environmental disclosure in Nigerian listed banks between 2012 and 2014. The sample used was 10 while board features was measured with gender diversity, foreign director, board size and board independence and CSR disclosure was measured using environmental disclosure index. The OLS regression was employed to analyze the data and these showed that gender diversity has a negative and significant effect on CSR disclosure. Study Population and Sample Size The study was based on consumer goods companies in Nigeria with focus on firm characteristics (using firm size and firm age as proxy) and the independent variable, with firm growth and control variable, while corporate social responsibility was used as the dependent variable for the period of 2013 to 2023. The population of the study comprised of twenty-six (26) consumer goods manufacturing companies listed on the Nigerian Exchange Group as at 2023. Through the application of purposive sampling technique five (5) companies were selected for inclusion in the study sample. These five companies were selected because their published financial statements were readily available online and the statements provided data required for the study. Research Design This study made use of an ex-post facto research design in order to achieve the objective of the study. Ex-post facto design was adopted due to the nature of the variables involved in this study whereby data was collected from past historical observations (secondary source). An after-the-fact research design was most suited for this study, because the data used was already in existence and the researcher lacked the capacity to manipulate the data. Publication of the European Centre for Research Training and Development -UK The ordinary least square was adopted to analyze the data collected and they concluded that both in Nigeria and South Africa, board size and environmental disclosure were positively related. Ali and Isa (2018) investigated the impact of board attributes on corporate social responsibility performance in Nigerian cement companies. The variables used for board attributes were board size, board composition and managerial ownership. The study used 3 cement companies and obtained data from 2004-2014. Pooled ordinary least square and generalized least square regression were used to analyze the data collected. The study discovered that board composition and CSR performance have no positive significant relationship. 68 Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Global Journal of Arts, Humanities and Social Sciences Publication of the European Centre for Research Training and Development -UK Publication of the European Centre for Research Training and Development -UK Publication of the European Centre for Research Training and Development -UK Results This study employed descriptive statistics, Pearson correlation coefficient and multiple regression techniques for the analysis of data in assessing the effect of firm characteristics measured by firm size and firm age (with firm growth as a control variable) on corporate social responsibility of listed consumer goods firms in Nigeria. The results of the analysis and the discussions to follow are presented in this section. Estimation Model The study employed a multiple regression model adapted from Etale and Levi-Owonaro (2023) as stated below: CSR = ƒ (FSZ, FGE, FGR) The above regression model was further translated into an econometric equation to facilitate the analysis. CSR = βₒ + β1FSZ + β2FGE + β3FGR + µ Equation 1 Where; CSR = Dependent variable FSZ = Firm size FGE = Firm age FGR = Firm growth β0 = Constant β1, β2 & β3 = Coefficients of the independent variables to be determined µ = Stochastic error term CSR = ƒ (FSZ, FGE, FGR) The above regression model was further translated into an econometric equation to facilitate the analysis. CSR = ƒ (FSZ, FGE, FGR) The above regression model was further translated into an econometric equation to facilitate the analysis. Equation 1 69 Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Descriptive Statistics In a bid to carry out this study, the descriptive statistics of the data used for the study were initially examined. Table 1 reports the descriptive statistics of data employed in this study from 2013 to 2023. Table 1: Descriptive Statistics CSR FSZ FGE FGR Mean 5.055396 7.923232 48.40000 0.781636 Maximum 6.896526 8.793314 57.00000 38.15000 Minimum 2.863323 6.960838 38.00000 -0.960000 Std. Dev. 1.031583 0.566203 5.475873 5.138131 Observations 55 55 55 55 Source: E-views Out put 2024 Table 1 presents the descriptive statistics for both the dependent and explanatory variables of the study for 55 panel observations. Corporate social responsibility (CSR) which is represented by firm donation and gift to the community reflect a mean value of 5.0554 and standard deviation of 1.0316, while 2.8633 and 6.8965 are the minimum and maximum values respectively. The standard deviation reveals that the data of CSR are far spread across the mean. This simply implies that the CSR of consumer goods firms in Nigeria are sparsely spread apart. This is further confirmed by the disparity between the maximum and minimum. Thus, the CSR of consumer goods firms varies a great deal from one company to the other. Furthermore, the firm size (FSZ) had a mean value of 7.9232 with a fluctuation of 0.5662. This indicates that on the average, the FSZ of listed consumer goods firms stood at 7.9232 during the period under investigation. The standard deviation of FSZ in Table 1 indicates that there is a low dispersion from the mean value of FSZ recorded within the period of study. The highest FSZ recorded within the study period is 8.7933 with a minimum value of 6.9608. Firm age (FGE) of the sampled companies, indicates that on the average, FGE of listed consumer goods firms stood at 48.400 mean value during the period under investigation. Also, as shown in Table 1, its standard deviation indicates that there is a high dispersion from the mean value of FGE recorded within the period of study. The maximum and minimum FGE recorded within the study period were 57.000 and 38.150 respectively. Publication of the European Centre for Research Training and Development -UK Pearson Correlation Coefficients The correlation results computer based on Pearson Moment Correlation Coeeficients are reported in Table 2. It shows that the coefficients are 0.1110 for FSZ, -0.4262 for FGE, and 0.1340 for FGR respectively. The Pearson correlation coefficients results have been relied upon for assessing the multicollinearity of the study variables. The values of Pearson correlation coefficients between the independent and dependent variables have been found to be lower than the standard value of 0.7000. Therefore, the results reveal that there is no problem of multicollinearity. Table 2: Pearson Correlation Matrix of the Variables Table 2: Pearson Correlation Matrix of the Variables Observations 55 CSR FSZ FGE FGR CSR 1.0000 -0.1110 -0.4262 0.1340 FSZ 0.1110 1.0000 0.1888 0.1426 FGE -0.4262 0.1888 1.0000 0.1880 FGR 0.1340 0.1426 0.1880 1.0000 Source: E-views Out put 2024 Regression Results Descriptive Statistics 70 Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ ublication of the European Centre for Research Training and Development -UK Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ pean Centre for Research Training and Development -UK Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Publication of the European Centre for Research Training and Development -UK Hypothesis Three wth (FGR) has no significant influence on corporate social responsibility (CSR). Similar, the figures in Table 3 revealed that the coefficient of FGR and its p-value are 0.1340 and 0.3970 respectively. Again the p-value of FGR is 0.3970 > 0.0500. Therefore, the study revealed that FGR has a positive but non-significant influence on CSR of listed consumer goods firms in Nigeria. Here also, the null hypothesis is accepted. Publication of the European Centre for Research Training and Development -UK Publication of the European Centre for Research Training and Development -UK The regression results as presented in Table 3 revealed that when all the predictor variables assume zero values, the CSR of listed Consumer Goods firms would be estimated at 9.1342 (the constant value in the equation). This simply implies that when all the other variables are not considered, there will be an insignificant improvement in the CSR of listed Consumer Goods firms to the tune of 9.1342. Regression Results g Regression Estimates of the Model Table 3: Regression Results Dependent variable: CSR Variable Coefficient Std. Error t-Statistic Prob. C 9.1342 5.3887 1.7000 0.0970 FSZ 0.1110 0.5797 0.0100 0.9910 FGE -0.4262 3.1784 -0.7800 0.4420 FGR 0.1340 0.0176 0.8500 0.3970 R-squared 0.8724 Mean dependent var 5.0554 Adjusted R-squared 0.8144 S.D. dependent var 1.0316 S.E. of regression 8.9234 Durbin-Watson stat 1.9987 F-statistic 0.4245 Prob (F-statistic) 0.0003 Source: E-views Out put 2024 Regression Estimates of the Model Table 3: Regression Results Dependent variable: CSR Table 3 presents the results of the regression. The result in Table 3 revealed an overall R2 value of 0.8724. The R2, which represents the coefficient of determination implies that 87 per cent of the variations in the dependent variable (CSR) of listed consumer goods firms in Nigeria is jointly explained by the combined changes in the predictor variables (firm size (FSZ), firm age (FGE)and firm growth (FGR). The remaining 13 per cent of the variation could be explained by other factors not captured in the study model but could help to enhance firm success. Table 3 further explained the nature and extent of relationship between the dependent variable and each of the independent variables of the study in terms of coefficients and the probability values. 71 Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Global Journal of Arts, Humanities and Social Sciences yp Hypothesis One e (FSZ) has no significant influence on corporate social responsibility (CSR). Firm size (FSZ) has no significant influence on corporate social responsibility (CSR). From Table 3, the coefficient of FSZ is 0.1110 and its p-value is 0.9910. The p-value of FSZ 0.9910 > 0.0500, the rule for accepting or rejecting the null hypothesis in all cases is if the calculated p- value is greater than the 5 per cent level of significance. Therefore at 5% level of significance, the null hypothesis one is accepted. It means that FSZ has a positive influence on CSR, giving a coefficient of 0.1110 and p-value of 0.9910 but the influence is not significant. Hypothesis Two GE) has no significant influence on corporate social responsibility (CSR). Firm age (FGE) has no significant influence on corporate social responsibility (CSR). Again from Table 3, the coefficient of FGE and the p-value are -0.4262 and 0.4420 respectively. The p-value of FSZ as shown in Table 3 is 0.4420 > 0.0500. This means that FGE has a negative but insignificant influence on CSR. So, the null hypothesis is accepted. Firm age has no significant effect on CSR. Test of Hypotheses yp Hypothesis One Publication of the European Centre for Research Training and Development -UK Publication of the European Centre for Research Training and Development -UK Finally, this found that firm growth which was introduced as a control variable has no significant influence on CSR of consumer goods firms in Nigeria. In specific terms, the relationship between FGR and CSR though positive, given the values of the coefficient and p-value as 0.1340 and 0.3970 respectively, FGR has positive but insignificant relationship with CSR. In the overall, the findings of the study are in part consistent with the findings of Tarus (2020), Osemene and Fagbemi (2019), Ofoegbu et al (2018) and Ashafoke and Ilaboya (2017). Conclusion This study assessed the impact of firm characteristics on corporate social responsibility (CSR) of listed consumer goods firms in Nigeria for the period of eleven years covering 2013 to 2023. The study adopted firm size and firm age as proxies for firm characteristics with the addition of firm growth (explanatory variables), while corporate social responsibility served as the response variable. Based on the ex post facto study design, secondary data collected from published financial statements of sampled five companies listed on the Nigerian Exchange Group were evaluated using Pearson correlation coefficient and multiple regression analysis based on OLS technique assisted by E-Views statistical software. The findings revealed that that firm size and firm growth had positive but insignificant impact on CSR, while firm age had negative insignificant effect on CSR practices of listed consumer goods firms in Nigeria. Recommendations The following recommendations are advanced: e following recommendations are advanced: 1. The management of larger firms to should dedicate specific departments or teams to CSR, while smaller firms can designate responsible individuals or outsource CSR functions (where necessary) before implementing any CSR initiatives. 2. Firms should conduct a thorough assessment of their competitive advantages and competencies in order to develop a comprehensive and sustainable CSR strategy that aligns with their business objectives, enhances their reputation, and generates positive social and environmental impact. 3. Firms should ensure they satisfy the interest of all stakeholders to enjoy stable operations to enhance firm growth and sustainability. 3. Firms should ensure they satisfy the interest of all stakeholders to enjoy stable operations to enhance firm growth and sustainability. DISCUSSION This study revealed a positive relationship between firm size (FSZ) and CSR with coefficient of correlation value of 0.1110. This means a unit change in FSZ will lead to an increase in CSR by 0.1110 units. This relationship is however insignificant (given a p-value of 0.9910). This finding is consistent with the findings of Činčalová and Hedija (2020) who in their study investigated firm characteristics and corporate social responsibility of Czech transportation and storage industry and found that firm size has a statistically insignificant relationship between firm size and CSR practice. Also, this study revealed a negative relationship between firm age (FGE) and CSR with coefficient of correlation value of -0.4262. This means a unit change in FGE will lead to a decrease in CSR by 0.4262 units. Again this relationship is not significant (given a p-value of 0.4420). This finding also supports the findings of Činčalová and Hedija (2020), whose study investigated the relationship between firm characteristics and corporate social responsibility of Czech transportation and storage industry and submitted that firm age is not a factor affecting the CSR practice. 72 Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Global Journal of Arts, Humanities and Social Sciences Website: https://www.eajournals.org/ Publication of the European Centre for Research Training and Development -U Ali, S.M., & Isa,M.A. (2018). Board attributes and corporate social responsibility performance of listed cement companies in Nigeria. Research Journal of Finance and Accounting, 9(7), 109-121. Akhalumeh, P., & Ohiokha, F.I. (2018). Firm characteristics and corporate social donations among Nigerian firms. CEDSAF Journal of Business & Economy, 6(1), 60-72 Ashafoke, T.O., & Ilaboya, J. (2017). Board characteristics and environmental disclosure in Nigerian banking sector. ICAN Journal of Accounting & Finance, 6(1), 87-102. Astute, R.P. (2015). The influence firm characteristics of manufacture Industries to corporate social responsibility (CSR) Disclosure and the impact on investors reaction. Economic and Business Faculty Accounting Department Muhammadiyah University of Surakarta y g p y y Bassiouny, S.W., Soliman, M.M. & Ragab, A (2016). The impact of firm characteristics on earnings management: An empirical study of listed firms in Egypt. The Business and Management Review, 7(2), 91-101. Bissadu, K. D, Koglo, Y.S, Johnson, D. B. & Akpoti, K. (2017). Coarse scale remote sensing and GIS evaluation of rainfall and anthropogenic land use changes on soil erosion in Nasarawa state, Nigeria. Journal of Geoscience and Geography, 5(6), 259–266. Bujaki, M.L., & Richardson, A.J. (2017). A citation trail review of the uses of firm size in accounting research. Journal of Accounting Literature, 16, 1–27. CBN (2018). Central Bank of Nigeria Annual Report 2018 Central Bank of Nigeria Annual Report 201 Cho, C., Laine, M, Roberts, R.W., & Rodrigue, M. (2015). Organized hypocrisy, organizational facades, and sustainability reporting. Accounting, Organizations and Society, 40(6), 78-94. y p g g g y Cincalova, S. & Hedija, V. (2020). Firm characteristics and corporate social responsibility: The case of Czech transportation and storage industry. Sustainability (MDPI), 1-15 Cincalova, S. & Vovakova, Z. (2021). Corporate social responsibility of the selected transport company operated on the Czech market. Problems of Management in the 21st Century, 16(2), 65-73 Egbunike, A.R., & Tarilaye, N. (2017). Firm’s specific attributes and voluntary environmental disclosure in Nigeria: Evidence from listed manufacturing companies. Academy of Accounting and Financial Studies Journal, 21(3), 1-9. Etale, L.M. & Levi-Owonaro, S. P. (2023). Environmental financial reporting and corporate performance of listed pharmaceutical companies in Nigeria. European Journal of Accounting, Auditing and Finance Research, 11(8), 1-14 Hosam, A.R., Eko, G.S., & Salsabila, S.A. (2019). The impact of corporate social responsibility disclosure and board characteristics on corporate performance. Journal of Cogent Business and Management, 6(1), 1 – 19. Ibrahim, M. & Hamid, K. T. (2019). REFERENCES Abdullahi, M. (2016). Firms characteristics governance and financial performance of listed building materials firms in Nigeria. (Unpublished M.Sc Dissertation submitted to the Department of Accounting, Faculty of administration, Ahmadu Bello University, Zaria, Nigeria). Adamu, I.A., Nafisat, M.A., & Oyindamola,E. (2020). The relationship between corporate social disclosures and board characteristics: Evidence from Nigeria. Asian People Journal, 3(2), 96 – 105. Adamu, I.A., Nafisat, M.A., & Oyindamola,E. (2020). The relationship between corporate social disclosures and board characteristics: Evidence from Nigeria. Asian People Journal, 3(2), 96 – 105. 73 Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Website: https://www.eajournals.org/ Publication of the European Centre for Research Training and Development -UK Publication of the European Centre for Research Training and Development -U Corporate social responsibility and financial performance of listed Non-Financial Services companies in Nigeria. American Journal of Business and Society, 4(2), 56-71 y ( ) Igbekoyi, O. S., Alade, M. E., & Oladele, R. (2019). Corporate social responsibility compliance among manufacturing firms in Nigeria. Accounting and Taxation Review, 3(1), 27–41. Inua, O. I., & Emeni, A. A. (2019). Corporate governance attributes and social sustainability reporting. International Journal of Accounting & Finance, 8(1), 21-37 74 Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Publication of the European Centre for Research Training and Development -UK Kajola, S.O., Sanyaolu, W.A., Alao, A., & Ojurongbe, J. (2019). Liquidity and profitability dynamics: Evidence from the Nigerian banking sector. Accounting & Taxation Review, 3(2), 1-12. Malik, S.S., & Okere, W. (2020). The relationship between corporate social responsibility, environmental investments and financial performance: Evidence from manufacturing companies. Environmental Science and Pollution Research, 27, 39946–39957. Masika, D. & Simiyu, E. (2018). Effect of firm characteristics on financial performance of deposit taking SACCOS licensed by Sasra in Nairobi Kenya. African Journal of Emerging Issues. Mohammed, G., T, (2017). Firm Characteristics and Firm Value of Listed Healthcare Companies in Nigeria. (unpubished published) M.Sc Dissertation Submitted to the Department of accounting, Faculty of Administration, Ahmadu Bello University, Zaria Nigeria. g y y g Mugambi, C.M., & Fatoki, O.I. (2019). Effect of corporate social responsibility disclosure on financial performance of manufacturing firms quoted on Nairobi Securities Exchange. Canadian Social Science, 15(4), 15–25. Mutende, A. E., Mwangi, M., Njihia, M. J. & Ochieng, E. D. (2017). The moderating role of firm characteristics on the relationship between free cash flows and financial performance of firms listed at the Nairobi Securities Exchange. Journal of Finance and Investment Analysis, 6(4), 55-74 Nwude, C.E., & Comfort, A. N. (2021). Board structure and corporate social responsibility: Evidence from developing economy. SAGE Open Journal, 3(1), 1 – 12. Ofoegbu, G. N., Odoemelom, N., & Okafor, R. G. (2018). Corporate board characteristics and environmental disclosure quantity: Evidence from South Africa (integrated reporting) and Nigeria (traditional reporting). Cogent Business & Management, 5, 1-27. g p g g g Ogunode, O. A. (2022). Legitimacy Theory and Environmental Accounting Reporting and Practice: A Review. South Asian Journal of Social Studies and Economics. Yameen, M., Farhan, N. H. S. & Tabash, M. I. (2019). The impact of liquidity on firms’ performance: Empirical investigation from India pharmaceutical companies. Academic Journal of Interdisciplinary Studies, 8(3), 212-220 Publication of the European Centre for Research Training and Development -U 13(1): 17-28 Oladele, P. O., & Mokuolu, J. O. (2020). Corporate Social Responsibility Expenditure and the Financial Performance of Quoted Firms in Nigeria. International Journal of Research and Innovation in Social Science (IJRISS), 4(4), 4–1. Onipe, A.Y., & James, A. (2021). Board of directors and corporate social responsibility reporting of quoted companies in Nigeria. Journal of Accounting, Finance and Auditing Studies, 7(2), 38 – 52. Osemene, O. F., & Fagbemi, T. O. (2019). A study of the relationship between corporate governance and environmental reporting in Nigeria’s listed consumer goods companies. Fountain University Osogbo Journal of Management, 4(3), 1-22 Rasche, A., Morsing, M., & Moon, J. (2017). Corporate social responsibility: Strategy, communication, governance. Cambridge University Press: Cambridge, UK. Shehu, M.M. (2009). The impact of firm characteristics on market value of quoted manufacturing firms in Nigeria. (unpubished published) M.Sc Dissertation submitted to the Department of accounting, Faculty of Administration, Ahmadu Bello University, Zaria Nigeria. Shuaibu, K., Ali, I., & Moh’d Amin, I. (2019). Company attributes and firm value of listed consumer goods companies in Nigeria. Journal of Research in Humanities and Social Science Volume 7(5), 40-49. 75 Global Journal of Arts, Humanities and Social Sciences Vol.12, No.3, pp.63-76, 2024 Print ISSN: 2052-6350(Print) Online ISSN: 2052-6369(Online) Website: https://www.eajournals.org/ Publication of the European Centre for Research Training and Development -UK Publication of the European Centre for Research Training and Development -UK Sritharan, V, (2015). Does firm size influence on firm’s profitability? Evidence from firms of Sri- Lankan hotels and travel sector. Research Journal of Finance and Accounting, 6(6), 201- 207. Starineca, O. (2016). Human resource selection approaches and socially responsible strategy. Economics and Business, 28(1), 106–114. Suddaby, R., Bitektine, A. & Haack, P. (2017). Legitimacy. Academy of Management Annals, 11(1), 451-478 Tarus, J. K. (2020). Do board size and firm size affect environmental accounting disclosure? Evidence from selected listed firms in Kenya. Journal of Business Management and Economic Research, 4(1), 21-37 Velinov, E., Cincalova, S. & Toporova, V. (2022). Corporate social responsibility activities through the employees’ lenses: Evidence from the Czech brewery sector. Hradiec Economic Days, 1-8 1-8 Yameen, M., Farhan, N. H. S. & Tabash, M. I. (2019). The impact of liquidity on firms’ performance: Empirical investigation from India pharmaceutical companies. Academic Journal of Interdisciplinary Studies, 8(3), 212-220 76
https://openalex.org/W3214053507
https://www.e3s-conferences.org/10.1051/e3sconf/202132103008/pdf
English
null
Application of passengers’ thermoregulation integral model used in the evaluation of thermal comfort in vehicles compartment equipped with internal curtains
E3S web of conferences
2,021
cc-by
3,856
* Corresponding author: econcei@ualg.pt Application of passengers’ thermoregulation integral model used in the evaluation of thermal comfort in vehicles compartment equipped with internal curtains 1FCT - Universidade do Algarve, Campus de Gambelas, 8005-139 Faro, Portugal 2CINTAL, Campus de Gambelas, 8005-139 Faro, Portugal 3Instituto Superior Técnico, Av. Rovisco Pais, 1049-001 Lisboa, Portugal 4School of Built Environment, University of Reading, Reading, RG6 6AW, United Kingdom 1FCT - Universidade do Algarve, Campus de Gambelas, 8005-139 Faro, Portugal 2CINTAL, Campus de Gambelas, 8005-139 Faro, Portugal 3Instituto Superior Técnico, Av. Rovisco Pais, 1049-001 Lisboa, Portugal 4School of Built Environment, University of Reading, Reading, RG6 6AW, United Kingdom Abstract. This work evaluates the passengers thermal comfort level inside a vehicles compartment. The numerical study, made in winter conditions, consider a bus indoor environment equipped with internal curtains, internal seats, lateral panels, ceiling, floor and occupied by 52 passengers. The numerical model considers the passengers and vehicle grid generation, passengers body and clothing thermal response and passengers thermal comfort level. The grid generation is used to evaluate the view factors and Mean Radiant Temperature that the passengers are subjected. In this calculus the passengers and the vehicles surfaces shading devices are considered. The thermal response numerical models consider the energy and mass balance integral equations. The thermal comfort evaluation considers the heat produced inside the body and the heat exchange between the body and the environment. The human body numerical model considers also the thermoregulatory system to control the temperature. The numerical model is used to evaluate the thermal comfort level that seated passengers are subjected in a bus equipped with asymmetrical warm curtains. Three Cases studies were developed: the first one considers the temperature curtains equal to the indoor bus surfaces, while the other two consider higher temperatures values. All Cases are thermally comfortable according to the standards. © The Authors, published by EDP Sciences. This is an open access article distributed under the terms of the Creative Commons Attribution License 4.0 (http://creativecommons.org/licenses/by/4.0/). DP Sciences. This is an open access article distributed under the terms of the Creative Commons Attribution License 4.0 ses/by/4 0/) https://doi.org/10.1051/e3sconf/202132103008 https://doi.org/10.1051/e3sconf/202132103008 E3S Web of Conferences 321, 03008 (2021) ICCHMT 2021 d by EDP Sciences. This is an open access article distributed under the terms of the Creative Commons Attribution Licens org/licenses/by/4.0/). 3 Vehicle mathematical model The numerical model that simulates the Vehicle Thermal Behaviour and work in transient conditions is based on energy and mass balance integral equations. The equations are based on conduction, convection and radiation phenomena and are solved by the Runge- Kutta-Felberg method with error control. The Human Thermal Response numerical model is used to evaluate the passengers thermal comfort level. This numerical model, based on a human multi-node comfort model, considers energy and mass balance integral equations and the Thermoregulatory system based in the work of Stolwijk and Hardy [18]. More details can be seen in studies of Conceição et al. [19, 20]. The equations are developed through the Computer Aided Design techniques. This methodology, that considers a vehicle with complex topology, can be used to simulate more realistic vehicles designs. The radiative heat exchanges numerical model between the vehicle and the passengers, based on Mean Radiant Temperature method, is developed and applied in the works of Conceição et al. [6,21]. The numerical model that simulates the vehicles thermal behavior calculates not only the solar radiation incident in the internal and external surfaces, but also the radiative heat exchange between internal, in each space, and external surfaces, between vehicle and surrounding bodies. In the radiative calculus are considered, in the internal and external calculus, the shading effect. The radiative heat exchange applications can be seen in Conceição and Lúcio [15]. All coefficients used in these equations are evaluated by sub-models that calculate the glass radiative properties, occupation cycle, ventilation strategy and heat and mass transfer coefficients by convection using empirical expressions. The Vehicle Thermal Behavior considers the convective (natural, forced and mixed), conductive (in the main bodies divided in several layers), radiative (shortwave and long wave radiation outside and inside the vehicle) and mass transfer (inside the compartments) phenomena. The present work is a continuation of the works developed in Conceição et al. [22,23]. Others studies with the same topic can be analysed in Shek and Chan [24] and Velt and Daanen [25]. The vehicle, in general, is divided into several compartments (passengers, luggage and motor), main bodies (panels, doors, ceiling and floor), interior bodies (benches and motors) and glasses (windows). In the present numerical study is analysed, in detail, the thermal comfort of the passengers seated inside a bus, on both sides with windows, without and with internal curtains on the left window subjected to solar radiation. 1 Introduction Percentage of Dissatisfied (PPD) index. Applications using the thermal comfort level, adaptive thermal comfort levels and empirical models can be analysed in, the works of Conceição et al. [7,8]. The people spend part of the time inside vehicles, as bus, trains, and others vehicles. This kind of vehicles can provide acceptable thermal conditions, using Heating, Ventilating and Air-Conditioning system. This system can promote similar thermal comfort conditions to the occupants, however external environmental conditions, as the solar radiation, can provide asymmetrical conditions to the occupants. In general, internal curtains are used to reduce this uncomfortable conditions. The curtains subjected to solar radiation reduce the inlet solar radiation and can be used as radiative surfaces that, in winter conditions, can improve the thermal comfort conditions that the occupants are subjected. ç [ , ] The software applied in this work simulates the Vehicle Thermal Response and the Human Thermal Response numerical models, that includes the human thermoregulatory system. The first one evaluates the vehicle design, using Computer Aid Design, and calculates the distribution of temperature and solar radiation inside vehicle spaces, in particular, the passenger compartment. In the vehicle thermal behavior numerical models, have been given special attention to the passenger compartment (main and interior bodies and windows) and thermal phenomena (radiation, convection, human generation, glass radiative properties, air renovation and others). To evaluate the thermal discomfort and thermal comfort levels, different models were developing [1]. These models, inclusively, are published in international standards [2,3]. The local thermal discomfort, as asymmetrical thermal conditions, can promote uncomfortable thermal conditions, as Draught Risks and others. The works of Conceição et al. [4] and Conceição [5] analyzed in detail these uncomfortable problems using experimental and numerical methodologies. The thermal comfort level, developed by Fanger [6], and showed in the standards [2,3], is evaluated using Predicted Mean Vote (PMV) index and Predicted Some works related with the Vehicle Thermal Response and the evaluation of thermal comfort were developed in the last years. Some examples about the thermal comfort evaluation can be analyzed in Walgama et al. [9] and Rugh et al. [10], while the numerical simulation of bus and passengers can be seen in Riachi [11] and Mezrhab and Bouzidi [12]. Vehicle Thermal Response numerical model is based on the Building Thermal Response. 1 Introduction The Building Thermal Response, developed in the last years, E3S Web of Conferences 321, 03008 (2021) ICCHMT 2021 https://doi.org/10.1051/e3sconf/202132103008 12 cylindrical or spherical layers and could be still protected of the external environment through several layers of clothing. considers energy and mass balance integral equations. Some applications can be seen in Conceição et al. [13], for an internal energy analysis, in Conceição and Lúcio [14], for an application of shading devices, in Conceição and Lúcio [15], for a passive analysis, in Conceição and Lúcio [16], for both passive and active analysis, and for a set of validations in Conceição and Lúcio [17]. 4 Heat exchanges by radiation The heat exchange by radiation numerical model, that uses the view factors calculated between the human body and the vehicles surrounding surfaces, is based on the Mean Radiant Temperature method. In the methodology used in view factors determination, each vehicle surface is sub-divided into several small areas and each human body element, with inclinations and dimensions equal to the respective body, are divided into infinitesimal areas. It is considered the shading effect caused by the surrounding surfaces, namely the vehicle surfaces and the occupant’s bodies. 3 Vehicle mathematical model The view factors and the radiative heat exchanges by radiation between the different human body sections and the surroundings surfaces, namely, the seats, lateral panels, ceiling, floor, curtains, and others, are considered. 5 Simplified bus model In the passenger compartment of the bus studied is considered two ventilation ducts over the seats, 99 main bodies, 18 glazed window, 9 curtains and 105 interior bodies (as can be seen in Fig. 1 and Fig. 2). The bus is occupied by 52 passengers. Each passenger has 1.7 m of height, 70 kg of weight, 1 met of activity level and 1 clo of clothing level. Each of these surfaces, vehicle and passengers, in order to evaluate the view factors, is divided into several infinitesimal areas. In general, all vehicle surfaces are subdivided in a minimum of 100 elementary areas. Regarding the passengers: Fig. 1. Scheme of a bus and the 52 occupants: detailed visualization of the external vehicle surfaces. Fig. 2. Scheme of a bus and the 52 occupants: detailed visualization of the occupants.  The spherical head is divided in 64 elementary areas (a grid in the azimuthal angle direction of 8 divisions and a grid in the polar angle direction of 8 divisions);  The cylindrical elements are also divided in 64 elements (a grid in the longitudinal direction of 8 divisions and a grid in the radial direction of 8 divisions). In the geometry definition, all vehicles surfaces (main bodies and transparent bodies) are in contact. However, in the interior bodies only the seats, defined by a vertical and an inclined surface, are defined. y All elements of the passengers are arranged in similar way to the seat human body posture. The neck, the arms and the legs, both divided in four sections, are connected to the trunk with dimensions and angles similar to the human body sections. The head is connected to the neck, the hands are connected to the arms and the feet are connected to the legs. In the neck, shoulders, elbows, hips, knees and ankles, they are placed rotation elements. The dimensions and inclination of each element are obtained using a numerical model based on the human body weight and height. All passengers are not in contact between them and all passengers are not in contact with the seat and with all vehicle surfaces. Fig. 2. Scheme of a bus and the 52 occupants: detailed visualization of the occupants. Fig. 2. Scheme of a bus and the 52 occupants: detailed visualization of the occupants. 2 Occupant mathematical model The numerical model, that simulates the Human Thermal Response, that works in transient conditions, is based on energy and mass balance integral equations. The equations are based on conduction, convection and radiation phenomena and are solved by the Runge- Kutta-Felberg method with error control. The human body considers:  Heat exchanges between the human body sections and the surrounding surfaces (main and interiors bodies and glass); The human body geometry is generated using the empirical equations and the equation system is generated in accordance with the inputs, namely, in accordance with the number of elements and layers considered in the human body and in the clothing level defined in the numerical simulation.  Heat exchanges between the human bodies sections of each passenger and between the human bodies sections of different passengers.  The vehicle body considers: All coefficients used in these equations are evaluated by sub-models that calculate the view factors, radiative heat exchanges, clothing level, human thermo- physiology and heat and mass transfer coefficients by convection using empirical expressions.  Heat exchanges between the vehicle surfaces (main and interiors bodies and glass) itself;  Heat exchanges between the vehicle surfaces (main and interiors bodies and glass) and the passengers; The occupants are divided in 25 cylindrical or spherical elements and each element is sub-divided in 2 2 E3S Web of Conferences 321, 03008 (2021) ICCHMT 2021 https://doi.org/10.1051/e3sconf/202132103008  Heat exchanges between the vehicle surfaces (main and interiors bodies and glass) and the external surfaces (floor, environment, and fire front). while Fig. 2 shows the details of the visualization of the external passenger surfaces. In Fig. 3, the location of the occupants in the bus and the identification of symbols in Fig. 4 to Fig. 7 are presented. The Mean Radiant Temperature method, with correction, calculates, step by step, the Mean Radiant Temperature, using the human body and vehicles bodies, calculated in each iteration, and the pre- calculated view factors. The Mean Radiant Temperature method, with correction, calculates, step by step, the Mean Radiant Temperature, using the human body and vehicles bodies, calculated in each iteration, and the pre- calculated view factors. Fig. 1. Scheme of a bus and the 52 occupants: detailed visualization of the external vehicle surfaces. Fig. 3. Location of the occupants in the bus and identification of symbols in the Fig. 4 to Fig. 7. 6 Results and discussion In Fig. 4, it is presented the Mean Radiant Temperature (MRT) that each occupant is subjected for Case A (point a), Case B (point b), and Case C (point c). a) b) c) Fig. 4. Mean Radiant Temperature (MRT) that each occupant is subjected for: a) Case A; b) Case B; c) Case C. 15 20 25 30 35 40 45 50 55 60 MRT (ºC) Body sections 15 20 25 30 35 40 45 50 55 60 MRT (ºC) Body sections 15 20 25 30 35 40 45 50 55 60 MRT (ºC) Body sections a) b) 28 30 32 34 36 38 Tskin (ºC) Body sections a) 15 Body sections 60 a) b) Body sections 15 20 25 30 35 40 45 50 55 60 MRT (ºC) Body sections b) y c) 28 30 32 34 36 38 Tskin (ºC) Body sections ) c) 15 20 25 30 35 40 45 50 55 60 MRT (ºC) Body sections Fig. 5. Skin temperature (Tskin) that each occupant is subjected for: a) Case A; b) Case B; c) Case C. -0.7 -0.6 -0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 Case A Case B Case C PMV Occupant Number c) Body sections Fig. 4. Mean Radiant Temperature (MRT) that each occupant is subjected for: a) Case A; b) Case B; c) Case C. Regarding to the results obtained is possible to verify that:  When the curtain surface temperature increases the Mean Radiant Temperature increases; Fig. 6. PMV values that the occupants are subjected. Fig. 6. PMV values that the occupants are subjected.  The Mean Radiant Temperature is highest for the passenger located near the left side of the vehicle; Fig. 7. PPD values that the occupants are subjected. 5 Simplified bus model In these calculations, the air temperature and relative humidity are, respectively, 20ºC and 50%, while the internal vehicle surfaces temperatures are 20ºC. This work is divided in three parts: This work is divided in three parts:  The temperature of the internal left curtains is 20ºC (Case A);  The temperature of the internal left curtains is 40ºC (Case B);  The temperature of the internal left curtains is 60ºC (Case C). The scheme of a bus and the 52 occupants is presented in Fig. 1 and Fig. 2. Fig. 1 shows the details of the visualization of the external vehicle surfaces, 3 https://doi.org/10.1051/e3sconf/202132103008 E3S Web of Conferences 321, 03008 (2021) ICCHMT 2021 a) b) c) Fig. 5. Skin temperature (Tskin) that each occupant is subjected for: a) Case A; b) Case B; c) Case C. Fig. 6. PMV values that the occupants are subjected. 28 30 32 34 36 38 Tskin (ºC) Body sections 28 30 32 34 36 38 Tskin (ºC) Body sections 28 30 32 34 36 38 Tskin (ºC) Body sections -0.7 -0.6 -0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 Case A Case B Case C PMV Occupant Number 5 10 15 Case A Case B Case C PPD (%) a) b) c) Fig. 5. Skin temperature (Tskin) that each occupant is subjected for: a) Case A; b) Case B; c) Case C. 28 30 32 34 36 38 Tskin (ºC) Body sections 28 30 32 34 36 38 Tskin (ºC) Body sections 28 30 32 34 36 38 Tskin (ºC) Body sections a) 28 30 32 34 36 38 Tskin (ºC) Body sections 28 30 32 34 36 38 Tskin (ºC) Body sections a) 28 30 32 34 36 38 Tskin (ºC) Body sections 38 6 Results and discussion 0 5 10 15 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 Case A Case B Case C PPD (%) Occupant Number  The Mean Radiant Temperature is higher for the left side passenger sections than for the right side passenger sections;  The Mean Radiant Temperature is higher in upper passenger sections than in lower passenger sections. In Fig. 5, it is presented the skin temperature (Tskin) that each occupant is subjected for Case A (point a), Case B (point b), and Case C (point c). The PMV and the PPV values that each occupant is subjected are presented, respectively, in Fig. 6 and Fig. 7. Fig. 7. PPD values that the occupants are subjected. The thermal comfort level for the Case A is acceptable, regarding to the category C [3], for all occupants, by negative PMV values. The skin temperature, that each occupant section is subjected, increases when the Mean Radiant Temperature increases. The highest values are verified in sections not protected by the clothing as the head, neck and hands. When the curtain surface temperature increases, Case B, the thermal comfort level of the occupants improves and the occupant seated near the warm curtain surface is comfortable according to the Categories A and 4 https://doi.org/10.1051/e3sconf/202132103008 E3S Web of Conferences 321, 03008 (2021) ICCHMT 2021 system, in Proceedings of 7th International Conference on Air Distribution in Room, ROOMVENT 2000, 9-12 July 2000, Reading, UK (2000) B [3], by negative PMV values. However, the other occupants are comfortable according to the Category C [3], also by negative PMV values. When the curtains surface temperature increases to 60ºC, Case C, the thermal comfort of the occupant seated near the warm curtain is in accordance with the Category C [3], but by positive PMV values. However, the occupant seated near the right window is comfortable in accordance with the Category C [3], by negative PMV values, and the other occupants are comfortable according to the Categories A and B [3], by negative or positive PMV values. 6. P. Fanger, Thermal comfort (Danish Technical Press, Copenhagen, 1970) 7. E. Conceição, J. Gomes, A. Ruano. 7 Conclusions 13. E. Conceição, M. Lúcio, M. Lopes. WSEAS Trans. Environ. Dev. 4, 644-654 (2008) In this study the application of passengers’ thermoregulation integral model used in the evaluation of thermal comfort in vehicles compartment equipped with internal curtains was made. The study was made for winter conditions and considering three Cases study. 14. E. Conceição, M. Lúcio. Indoor Built Environ. 19, 657-667 (2010) 15. E. Conceição, M. Lúcio. Indoor Built Environ. 18, 41-51 (2009) The numerical model was used to evaluate the thermal comfort level that seated passengers are subjected in a bus equipped with asymmetrical warm curtains. 16. E. Conceição, M. Lúcio. Build. Simul. 3, 245-261 (2010) 17. E. Conceição, M. Lúcio, Numerical study of thermal response of school buildings in summer conditions, in Proceedings of the 8th International Conference and Exhibition on Healthy Buildings (HB 2006), 4-8 June 2006, Lisbon, Portugal (2006) The warm curtains, subjected to solar radiation, can be used to improve the thermal comfort conditions of the occupants in winter conditions. However, if the increase in the curtains temperature is high, then the thermal comfort conditions can be thermal uncomfortable for the occupants. 18. J. Stolwijk, J. Hardy. Pflugers Arch. Gesamte Physiol. Menschen Tiere 291, 129-162 (1966) The authors would like to acknowledge to the project (SAICT- ALG/39586/2018) from Algarve Regional Operational Program (CRESC Algarve 2020), under the PORTUGAL 2020 Partnership Agreement, through the European Regional Development Fund (ERDF) and the National Science and Technology Foundation (FCT). 19. E. Conceição, M. Lúcio, H. Awbi. Build. Simul. 6, 51-67 (2013) 20. E. Conceição, S. Rosa, A. Custódio, R. Andrade, M. Meira, M. Lúcio. HVACR Res. 16, 401-412 (2010) 21. F. Incropera, D. De Witt, T. Bergman, A. Lavine. Principles of heat and mass transfer (Wiley, 2013) 6 Results and discussion IFAC PapersOnLine 51, 20–25 (2018) 8. E. Conceição, M. Lúcio, A. Ruano, E. Crispim. Build. Environ. 44, 871-877 (2009) 9. C. Walgama, S. Fackrell, M. Karimi, A. Fartaj, G. Rankin. P. I. Mech. Eng. D-J. Aut. 5, 543-562 (2006) Thus, regarding to results obtained, the warm curtains, subjected to solar radiation, can be used to improve the thermal comfort conditions of the occupants in winter conditions. 10. J. Raugh. R. Farrington, D. Bharathan, A. Vlahinos, R. Burke, C. Huinzenga, H. Zhang. Eur. J. Appl. Physiol. 92, 721-727 (2004) In future works, the influence of solar radiation that each passenger is subjected, also in winter conditions, will be analyzed. 11. Y. Riachi. Int. J. Environ. Prot. Policy 2, 1-8 (2014) 12. A. Mezrhab, M. Bouzidi. Appl. Therm. Eng. 26, 1697-1704 (2006) References . Awbi, Ventilation of Buildings (Routledge, 2004) 22. E. Conceição, M. Silva, J. André, D. Viegas. Int. J. Veh. Des. 24, 372-387 (2000) 2. ANSI/ASHRAE-55 Standard, Thermal environmental conditions for human occupancy (ASHRAE, Atlanta, 2017) 23. E. Conceição, M. Silva, D. Viegas. HVACR Res. 3, 311-323 (1997) 3. ISO 7730, Ergonomics of the thermal environment Analytical determination and interpretation of thermal comfort using calculation of the PMV and PPD indices and local thermal comfort criteria (International Organisation for Standardisation, Geneva, 2005) 24. K. Shek, W. Chan. Sci. Total Environ. 389, 277-82 (2008) 25. K. Velt, H. Daanen. Appl. Ergon. 62, 72-76 (2017) 4. E. Conceição, M. Lúcio, V. Vicente, V. Rosão. Int. J. Vent. 7, 267-277 (2008) 4. E. Conceição, M. Lúcio, V. Vicente, V. Rosão. Int. J. Vent. 7, 267-277 (2008) 5. E. Conceição, Evaluation of thermal comfort and local discomfort conditions using the numerical modelling of the human and clothing thermal 5
https://openalex.org/W2071245712
https://arbor.revistas.csic.es/index.php/arbor/article/download/718/726/725
Spanish; Castilian
null
Tramas de objetos
Arbor
2,003
cc-by
794
(c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es http://arbor.revistas.csic.es http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es http://arbor.revistas.csic.es http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) http://arbor.revistas.csic.es http://arbor.revistas.csic.es http://arbor.revistas.csic.es http://arbor.revistas.csic.es http://arbor.revistas.csic.es http://arbor.revistas.csic.es http://arbor.revistas.csic.es http://arbor.revistas.csic.es (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc) (c) Consejo Superior de Investigaciones Científicas Licencia Creative Commons 3.0 España (by-nc)
https://openalex.org/W3143693011
https://www.degruyter.com/document/doi/10.1515/9783110731958-017/pdf
German
null
Weil STANDARD verständlich ist und DIALEKT authentisch macht
De Gruyter eBooks
2,021
cc-by
10,960
Vergeiner, Philip C.: Universität Salzburg, FB Germanistik, Erzabt-Klotz.Straße 1, A–5020 Salzburg, philip.vergeiner@sbg.ac.at Buchner, Elisabeth: Universität Salzburg, FB Germanistik, Erzabt-Klotz.Straße 1, A–5020 Salzburg, elisabeth.buchner@sbg.ac.at Fuchs, Eva: Pädagogische Hochschule Salzburg „Stefan Zweig“, Akademiestraße 23–25, A– 5020 Salzburg, eva.fuchs@phsalzburg.at Elspaß, Stephan: Universität Salzburg, FB Germanistik, Erzabt-Klotz.Straße 1, A–5020 Salzburg, stephan. elspass@sbg.ac.at Philip C. Vergeiner, Elisabeth Buchner, Eva Fuchs, Stephan Elspaß Weil STANDARD verständlich ist und DIALEKT authentisch macht Varietätenkonzeptionen im sekundären und tertiären Bildungsbereich in Österreich Zusammenfassung: Der vorliegende Beitrag zielt darauf ab, Varietätenkonzep- tionen im sekundären und tertiären Bildungsbereich in Österreich zu analysie- ren. Dabei wird gefragt, (a) was Sprecher/innen an Schule und Universität unter Varietäten wie DIALEKT und STANDARD verstehen, (b) wie sie sie jeweils bewerten und (c) welche normativen Erwartungen sie zu ihrer Verwendung in Bildungs- kontexten haben. Um diese Fragen zu beantworten, wurden halbstrukurierte Interviews einer inhaltsanalytischen Untersuchung zugeführt. Die Ergebnisse zeigen, dass es sowohl an Schule als auch Universität zum Teil ähnliche Varie- tätenkonzepte gibt. Zugleich werden jedoch auch Ambiguitäten und Widersprü- che zwischen beiden Bereichen ebenso wie innerhalb dieser offengelegt. Dies spiegelt die komplexe DIAGLOSSISCHE, z. T. auch DIGLOSSISCHE Situation in Öster- reich, wo DIALEKT und STANDARD im Alltag gleichermaßen präsent sind und ein- zelne Varietäten regionen-, situations- und wohl auch individuenspezifisch unterschiedlich bewertet und verwendet werden. Abstract: The aim of this paper is to analyse concepts of language varieties in secondary and tertiary education in Austria. The questions put forward are (a) what speakers’ notions of varieties such as dialect and standard are at schools and universities, (b) how they evaluate them and (c) what normative expecta- tions they have for their use in educational contexts. To answer these questions, semi-structured interviews were subjected to a content analysis. The results Vergeiner, Philip C.: Universität Salzburg, FB Germanistik, Erzabt-Klotz.Straße 1, A–5020 Salzburg, philip.vergeiner@sbg.ac.at Buchner, Elisabeth: Universität Salzburg, FB Germanistik, Erzabt-Klotz.Straße 1, A–5020 Salzburg, elisabeth.buchner@sbg.ac.at Fuchs, Eva: Pädagogische Hochschule Salzburg „Stefan Zweig“, Akademiestraße 23–25, A– 5020 Salzburg, eva.fuchs@phsalzburg.at Elspaß, Stephan: Universität Salzburg, FB Germanistik, Erzabt-Klotz.Straße 1, A–5020 Salzburg, stephan. elspass@sbg.ac.at Vergeiner, Philip C.: Universität Salzburg, FB Germanistik, Erzabt-Klotz.Straße 1, A–5020 Salzburg, philip.vergeiner@sbg.ac.at Buchner, Elisabeth: Universität Salzburg, FB Germanistik, Erzabt-Klotz.Straße 1, A–5020 Salzburg, elisabeth.buchner@sbg.ac.at Fuchs, Eva: Pädagogische Hochschule Salzburg „Stefan Zweig“, Akademiestraße 23–25, A– 5020 Salzburg, eva.fuchs@phsalzburg.at Elspaß, Stephan: Universität Salzburg, FB Germanistik, Erzabt-Klotz.Straße 1, A–5020 Salzburg, stephan. elspass@sbg.ac.at Open Access. © 2021 Philip C. Vergeiner, Elisabeth Buchner, Eva Fuchs, Stephan Elspaß, publiziert von De Gruyter. Dieses Werk ist lizenziert unter der Creative Commons Attribution 4.0 International Lizenz. https://doi.org/10.1515/9783110731958-017 https://doi.org/10.1515/9783110731958-017 418 | Philip C. Vergeiner, Elisabeth Buchner, Eva Fuchs, Stephan Elspaß 418 show that there are some similar variety concepts at school and university. At the same time, however, ambiguities and contradictions between the two areas as well as within them are disclosed. Philip C. Vergeiner, Elisabeth Buchner, Eva Fuchs, Stephan Elspaß Weil STANDARD verständlich ist und DIALEKT authentisch macht Varietätenkonzeptionen im sekundären und tertiären Bildungsbereich in Österreich This reflects the complex diaglossic and partly also diglossic situation in Austria, where dialect and standard are equally present in everyday life and individual varieties are evaluated and used differ- ently depending on the region, situation and probably also on an individual basis. Schlüsselwörter: Standard, Dialekt, Varietätenkonzeptionen, Sprachwahrnehmungen, Spracheinstellungen, Normen Schlüsselwörter: Standard, Dialekt, Varietätenkonzeptionen, Sprachwahrnehmungen, Spracheinstellungen, Normen || 1 Erste Ergebnisse zur Schule wurden im Rahmen des Projekts Österreichisches Deutsch als Unterrichts- und Bildungssprache erbracht, das sich allerdings stark auf den STANDARDNAHEN Bereich und verschiedene STANDARD-Varietäten des Deutschen fokussierte; vgl. bspw. de Cillia || (2018). Zu Varietätenverhältnissen an der Universität kann vor allem auf Publikationen im Kontext des VAMUS-Projekts verwiesen werden, bspw. Dannerer (2018) oder Vergeiner (2021). 2 Das von Monika Dannerer und Peter Mauser geleitete Projekt wurde vom Jubiläumsfonds der Österreichischen Nationalbank finanziert (ÖNB-Projektnummer 15.827). 3 Das von Stephan Elspaß geleitete Projekt – Fonds zur Förderung der wissenschaftlichen Forschung (FWF), Projektnummer F 6010 G23 – wird als Teil des SFBs F 60 „Deutsch in Öster- reich“ vom FWF gefördert. 1 Problemaufriss Bildungsinstitutionen galten lange als die Domäne der STANDARDSPRACHE – dies wurde für den tertiären Bildungsbereich als ebenso selbstverständlich ange- nommen (vgl. zusammenfassend Dannerer 2018: 169, 174–175) wie für den se- kundären (vgl. bspw. Mattheier 1991). Der Gebrauch von NONSTANDARD- Varietäten wurde daher auch – ganz im Sinne der Sprachbarrieren-Hypothese (vgl. Ammon 1972) – als etwas Defizitäres und von allen Beteiligten Uner- wünschtes dargestellt. Mehrere Untersuchungen konnten seither jedoch nach- weisen, dass in Bildungseinrichtungen NONSTANDARD-Gebrauch sehr wohl häu- fig vorkommt – zumindest im Süden des deutschsprachigen Raums (vgl. bspw. Knöbl 2012; Steiner 2008). Anzunehmen ist, dass dies der Fall ist, weil die Spre- cher/innen an diesen Institutionen keine so negative Sicht auf den NONSTANDARD haben, wie ihnen früher bisweilen unterstellt wurde. Festzustellen ist jedoch, dass sowohl die tatsächliche Varietätenverwendung als auch die Konzepte von STANDARD und NONSTANDARD bei den Sprecher/inne/n im Bildungsbereich bis heute nur ausschnittweise untersucht wurden (vgl. für die Varietätenkonzepte von bundesdeutschen Deutschlehrer/inne/n bspw. Hochholzer 2004). Gerade in Österreich liegen zwar zur allgemeinen Sicht auf Varietäten viele Befunde vor (vgl. z. B. Bellamy 2012; Moosmüller 1991; Soukup 2009), in Hinblick auf Schule und Universität ist darüber aber nur wenig bekannt.1 Hier besteht ein klares Forschungsdesiderat. 419 Weil Standard verständlich ist und Dialekt authentisch macht | Ziel des vorliegenden Beitrages ist es, sich dieses Desiderats anzunehmen. Gefragt werden soll, welche Varietätenkonzeptionen verschiedene Spre- cher/innen in sekundären und tertiären Bildungsinstitutionen zu STANDARD- Varietäten einerseits und NONSTANDARD-Varietäten andererseits haben. Dabei sollen auch Gemeinsamkeiten und Unterschiede zwischen den Institutionen herausgearbeitet werden. Dazu werden Interviewdaten inhaltsanalytisch unter- sucht, die in zwei Projekten entstanden sind: zum einen im Projekt VAMUS (= Verknüpfte Analyse von Mehrsprachigkeiten am Beispiel der Universität Salz- burg),2 zum anderen im Teilprojekt PP10 Wahrnehmung von und Einstellung zu Varietäten und Sprachen an österreichischen Schulen des Spezialforschungsbe- reichs Deutsch in Österreich (DiÖ).3 In der Folge wird zunächst geklärt, was wir im vorliegenden Aufsatz unter Laienkonzeptionen verstehen (Abschnitt 2). In Abschnitt 3 werden wir auf das Datenmaterial der Untersuchung eingehen, bevor wir in Abschnitt 4 die Unter- suchungsergebnisse präsentieren. Abschließend erfolgt eine Diskussion mit Fazit (Abschnitt 5). 3 Das von Stephan Elspaß geleitete Projekt – Fonds zur Förderung der wissenschaftlichen Forschung (FWF), Projektnummer F 6010 G23 – wird als Teil des SFBs F 60 „Deutsch in Öster reich“ vom FWF gefördert. 2 Konzeptionelle Grundlage Die Sichtweise linguistischer Laien auf Sprachen und Varietäten wird bereits seit längerem ausgiebig beforscht. Dies geschieht unter Bezug auf verschiedene Konzepte – zu nennen sind etwa EINSTELLUNGEN, IDEOLOGIEN, PERZEPTIONEN oder NORMEN. Nicht immer ist klar, ob und inwiefern diese Begriffe klar abgrenzbar sind. In der Folge sollen die einzelnen Begriffe kurz diskutiert werden, um letzt- lich für einen holistischen Blickwinkel auf diese Phänomene in Form von ‚Vari- etätenkonzeptionen‘ zu plädieren. Eines der ersten Paradigmen, welches die Laiensicht auf Sprache systema- tisch untersuchte, war die Einstellungsforschung. Ausgehend von sozialpsycho- logischen Zugängen werden EINSTELLUNGEN dabei bis heute häufig mit der klas- sischen Definition von Allport (1935: 810) als sozial erlernte Dispositionen 420 | Philip C. Vergeiner, Elisabeth Buchner, Eva Fuchs, Stephan Elspaß 420 verstanden, die beeinflussen, wie auf gewisse Phänomene (z. B. Sprachen oder Varietäten) reagiert wird – dies im Denken (kognitiv), Werten (affektiv) und Handeln (konativ) (vgl. z. B. Ajzen 1989; aus linguistischer Sicht Lasagabaster 2004). Untersucht wurden Spracheinstellungen häufig indirekt mittels der „matched-guise“-Methode (Lambert et al. 1960), womit äußerst konsistente Befunde erbracht werden konnten, wie etwa, dass STANDARD-Sprecher/inne/n vor allem status-, NONSTANDARD-Sprecher/inne/n hingegen vor allem solidari- tätsbezogene Eigenschaften zugewiesen werden (vgl. für Österreich z. B. Soukup 2009; zu Erklärungsansätzen Schoel & Stahlberg 2012). In den letzten Jahren ist jedoch vermehrte Kritik an der (vermeintlichen) Kontextlosigkeit und Stabilität beim gängigen Einstellungskonzept aufgekom- men. Das führte zu einer Modifikation des Einstellungsbegriffs im Rahmen einer „sozial-konstruktivistische[n] Perspektive“ (Cuonz 2014: 32). Hierbei werden Einstellungen als soziale Konstrukte aufgefasst, die in Interaktionen laufend entstehen, modifiziert oder stabilisiert werden – die Folge war eine Öffnung der Einstellungsforschung hin zu qualitativen Methoden wie der Gesprächsanalyse (vgl. Liebscher & Dailey-O’Cain 2009). Zugleich näherte sich der Einstellungs- begriff dadurch (noch) stärker dem Ideologiebegriff an (vgl. bspw. Soukup 2009: 88–89; zur Ähnlichkeit beider Konzepte etwa Garrett, Coupland & Willi- ams 2003). Der Begriff IDEOLOGIE, der vorrangig in sprachanthropologischen Paradigmen verwendet wird, bezeichnet dabei diskursiv erzeugte „conceptual schemes“ (Irvine & Gal 2000: 35). Ideologien liefern „Just So Stories“, „charac- teristically by the way that they constitute rationalizing, systematizing, indeed most importantly naturalizing schemata that ‚explain‘ the indexical value of signs“ (Silverstein 1992: 316). Wie Einstellungen sind Ideologien sozial erlernt – dabei prägen sie das Verhalten der Sprecher/innen (vgl. Errington 1999: 115; Kroskrity 2009: 505) ebenso wie auch ihre Bewertungen (vgl. Cavanaugh 2013) bzw. das Denken und den Diskurs über Sprache (vgl. Coupland & Jaworski 2004: 36). 2 Konzeptionelle Grundlage Die Spannweite von Ideologien ist groß und reicht „from seemingly neutral ‚cultural conceptions‘ to strategies for maintaining social power“ (Woolard 1992: 239). Sprachideologien sind dabei häufig mit außersprachlichen Kategorien und Institutionen verwoben (wie Nation, Rasse, Geschlecht; vgl. Woolard & Schieffelin 1994: 55–56). In diesem Sinne verknüpft bspw. die Ideo- logie des „homogeneism“ (Elspaß & Niehaus 2014: 48) eine homogene STAN- DARDSPRACHE mit einer homogenen Gesellschaft. Sowohl Einstellungen als auch Ideologien sind vielfach normativ – sie ge- hen mit Handlungsbewertungen und -erwartungen einher. Damit überlappen sie sich mit dem Normkonzept. Charakteristisch für NORMEN ist jedoch ihr klarer Handlungsbezug. Normen beruhen auf sozial geteilten Erwartungen zum er- Weil Standard verständlich ist und Dialekt authentisch macht | 421 laubten, verbotenen oder präferierten Handeln. Werden sie nicht befolgt, so ruft dies oft wertende Reaktionen bzw. Sanktionen hervor (vgl. zum Normbegriff ausführlich Bartsch 1987; Gloy 1975, 2004; Vergeiner 2021). Voraussetzung für die normbezogenen Erwartungen und Wertungen ist, dass Sprecher/innen Normvorstellungen haben, für die ein Geltungsanspruch kennzeichnend ist (der jedoch von faktischer Geltung zu unterscheiden ist, vgl. Hundt 2009: 118). Zur Herstellung und Stützung dieser Geltung werden Normen häufig im Rahmen von normativen Systemen mit anderen normativen Entitäten (z. B. auch Einstel- lungen, Ideologien) verbunden (vgl. Berger & Luckmann 2016). Eine sehr wich- tige Rolle spielen dabei auch Werte und Prinzipien – ähnlich wie Normen die- nen sie zur Handlungsorientierung in sozialen Gruppen, schreiben dabei aber keine konkreten Handlungen, sondern vielmehr sein-sollende Zustände vor (vgl. Gloy 1975: 33). Was sprachbezogene Einstellungen, Ideologien, Normen, Werte und Prinzi- pien verbindet, ist, dass sie letztlich (auch) auf die Laiensicht auf sprachliche Phänomene abzielen – wenn auch mit unterschiedlichen Schwerpunktsetzun- gen und wissenschaftsgeschichtlichem Hintergrund. Die Laiensicht auf Varietä- ten wird heutzutage zunehmend im Rahmen der Wahrnehmungsdialektologie zusammengefasst. Entstanden als folk linguistics beschäftigte sie sich anfangs vor allem mit der PERZEPTION von Laien auf DIALEKT-Grenzen und die (Un-)Ähnlichkeit von DIALEKTEN (vgl. bspw. Preston 2009). Gegenwärtig wird als Aufgabe der Wahrnehmungsdialektologie indes vielfach die allgemeine „Be- schreibung kognitiver Strukturen des Alltagswissens“ gesehen (Anders 2010: 3; vgl. auch Hundt, Palliwoda & Schröder 2015: 385–386 sowie kritisch bspw. Kre- feld & Pustka 2010: 13–14). Dies schließt Untersuchungen zur Laiensicht auf die Strukturierung und Verbreitung sprachlicher Varietäten ebenso ein wie varietä- tenbezogene Attribuierungen, Assoziationen und Einstellungen (vgl. bspw. Hundt, Palliwoda & Schröder 2015: 369; Purschke & Stoeckle 2019). Als Überbe- griff für all diese zusammenhängenden Phänomene bietet sich der Ausdruck „Sprachkonzeption“ an (vgl. z. B. 2. wie die GP die jeweiligen Varietäten und ihre Verwendung im Rahmen ei- nes Bildungskontextes jeweils bewerten und 3. wann die Varietäten in diesem Bereich den GP folgend Verwendung finden sollen. 3. wann die Varietäten in diesem Bereich den GP folgend Verwendung finden sollen. Zu beachten ist, dass wir den Laienbegriff in der vorliegenden Untersuchung sehr weit definieren – wir zählen als Laienäußerungen alle varietätenbezogenen Aussagen, die aus einer nicht-wissenschaftlichen Perspektive geäußert werden, auch wenn sie von GP stammen, die sich beruflich mit Sprache beschäftigen und/oder eine entsprechende Ausbildung aufweisen (z. B. Deutschlehrer/innen in der Schule oder Philolog/inn/en an der Universität). Wir tun dies, weil auch diese GP eine Alltagssicht auf Variation haben, die zwar beeinflusst von ihrem ‚Expertenwissen‘ sein mag, aber nichtsdestoweniger nicht damit zusammenfal- len dürfte. Auf welchen Daten und Methoden die Untersuchung beruht, wird im nächsten Abschnitt ausführlicher thematisiert. || 4 Die Datenkorpora von DiÖ wie VAMUS beinhalten jeweils auch Fragebogendaten, die auf- grund des Fokus auf qualitative Daten hier ausgespart bleiben (vgl. zu diesen Daten auch Vergeiner et al. 2019). Ausgeklammert werden weiters die Sprachgebrauchsaufnahmen beider Projekte, die nur indirekt Aufschluss über Varietätenkonzepte geben. Da der Untersuchungs- schwerpunkt auf Salzburg und Tirol liegt, werden außerdem die Daten des DiÖ-Teilprojekts aus den Bundesländern Vorarlberg und Wien ausgespart. 2 Konzeptionelle Grundlage Hundt, Palliwoda & Schröder 2015: 369). Im Rahmen des vorliegenden Aufsatzes sollen solche Varietätenkonzeptionen fo- kussiert werden, ohne den Forschungsgegenstand näher auf die weiter oben diskutierten Einzelphänomene festlegen zu wollen. Dies geschieht, weil, wie gezeigt, die Begriffe oftmals nicht abgrenzbar sind, sondern vielmehr zusam- menhängen. Im Folgenden sollen laienlinguistische Sprachkonzeptionen in Hinblick auf drei Aspekte genauer betrachtet werden: 1. was die untersuchten Gewährspersonen (= GP) unter den jeweiligen Varie- tätenbegriffen verstehen, 1. was die untersuchten Gewährspersonen (= GP) unter den jeweiligen Varie- tätenbegriffen verstehen, 422 | Philip C. Vergeiner, Elisabeth Buchner, Eva Fuchs, Stephan Elspaß 2. wie die GP die jeweiligen Varietäten und ihre Verwendung im Rahmen ei- nes Bildungskontextes jeweils bewerten und 2. wie die GP die jeweiligen Varietäten und ihre Verwendung im Rahmen ei- nes Bildungskontextes jeweils bewerten und 5 Die Interviewleitfäden enthielten Fragen zu den Sprachbiographien der GP, zum (wahrge- nommenen) Sprachgebrauch in den Institutionen sowie zu Spracheinstellungen. 6 Bei der Überführung in den STANDARD wurden auch Merkmale der GESPROCHENEN SPRACHE wie Rückversicherungs- und Häsitationssignale ausgespart. 3 Daten und Methoden In der vorliegenden Studie wird ein Vergleich zwischen Varietätenkonzeptionen an sekundären und tertiären Bildungsinstitutionen in Österreich unternommen. Die analysierten und gegenübergestellten Befragungsdaten stammen zum einen aus dem Teilprojekt Wahrnehmungen von und Einstellungen zu Varietäten und Sprachen an österreichischen Schulen des SFB Deutsch in Österreich (= DiÖ) und zum anderen aus dem Projekt Verknüpfte Analyse von Mehrsprachigkeiten am Beispiel der Universität Salzburg (= VAMUS) (s. o. Anm. 2 und 3). Beide Projekte verbindet das Ziel, Perzeptionen und Attitüden zur Varietätenverwendung in Bildungskontexten zu untersuchen, wobei der Erhebungsschwerpunkt jeweils in Westösterreich liegt. Tabelle 1 gibt einen Überblick über das Datenmaterial beider Projekte, soweit es für die vorliegende Studie herangezogen wurde.4 Die Weil Standard verständlich ist und Dialekt authentisch macht | 423 aus halbstrukturierten Interviews5 gewonnenen Daten wurden standardortho- grafisch transkribiert6 und inhaltsanalytisch ausgewertet. Tab. 1: Untersuchtes Datenmaterial. Projektkorpora DiÖ VAMUS Erhebungszeitraum 2017/2018 2014/2015 Untersuchungsort(e) vier berufsbildende mittlere und höhere Schulen in den Bundes- ländern Salzburg und Tirol eine mittelgroße öffentliche Universität in Grenznähe zu Deutschland (Universität Salz- burg) GP Lehrer/innen aller Fächer und Schüler/innen der 10. Schulstu- fe aus 4 Klassen (50 % städ- tisch; 50 % maturaführend); großteils aus der unmittelbaren Region stammend; bei Schü- ler/inne/n etwas mehr als die Hälfte Sprecher/innen anderer Erstsprachen (vor allem Tür- kisch und die BKS-Sprachen) Lehrende und Studierende an allen Fakultäten; jeweils bedeu- tender Anteil von GP aus Deutschland sowie Spre- cher/innen mit anderer Erstspra- che (vor allem DaF-, zum Teil aber auch DaZ-Sprecher/innen) GP-Zahl in den Interviews Lehrer/innen: 22 Schüler/innen: 140 Lehrende: 36 Studierende: 66 GP Wie Tabelle 1 zeigt, lässt sich das Datenmaterial von DiÖ und VAMUS nicht nur wegen der Befragungsmethode, sondern auch wegen ähnlicher Erhebungsräu- me, -zeitpunkte und ähnlich großer GP-Zahlen (> 100) gut vergleichen. Es be- stehen allerdings gewisse Unterschiede bei den befragten Gruppen: Während im DiÖ-Korpus mehrere Untersuchungsorte berücksichtigt werden (je eine städ- tische und eine ländliche Schule in Salzburg und Tirol), beschränkt sich VAMUS auf nur einen Standort. Gleichwohl ist bei der Gruppe der universitären GP – entsprechend dem größeren universitären Einzugsgebiet – eine größere Hetero- genität gegeben: Anders als im Schulkontext kommen vermehrt Sprecher/innen vor, die nicht in Österreich bzw. im deutschsprachigen Raum aufgewachsen sind. Ein weiterer Unterschied besteht in der Altersverteilung, die sich bei den 424 | Philip C. Vergeiner, Elisabeth Buchner, Eva Fuchs, Stephan Elspaß 424 Schüler/inne/n im Gegensatz zu den anderen GP-Gruppen als weitestgehend homogen (16–17 Jahre) beschreiben lässt. 4 Ergebnisse In diesem Abschnitt werden die Ergebnisse der Untersuchung präsentiert. Dabei wird zunächst auf die Befunde zur Universität, anschließend jene zur Schule eingegangen. Jeweils erfolgt zunächst eine Analyse der Konzeptionen von STAN- DARD, anschließend der von NONSTANDARD. Aus Darstellungsgründen werden in der Folge nur exemplarisch Intervie- wäußerungen wiedergegeben. Bei der Zitation verweisen die Zahlen auf die Zeitfenster in den Aufnahmen. Zur Wahrung ihrer Anonymität werden die GP mit Siglen belegt. Sowohl bei den GP aus der Schule als auch bei denen aus der Universität steht der erste Buchstabe dabei für die GP-Gruppe (S = Studieren- de(r) bzw. Schüler/in); L = Lehrende(r)). Bei den GP aus der Universität stellen die Folgebuchstaben pseudonymisierte Initialen dar (z. B. „SIH“). Bei den GP aus den Schulen setzen sich die Folgezeichen zum einen aus Buchstaben, die den Schulstandort kennzeichnen, zum anderen aus Zahlen, die den einzelnen Proband/inn/en zugewiesen wurden, zusammen (z. B. „SA3“). 3 Daten und Methoden Schüler/inne/n im Gegensatz zu den anderen GP-Gruppen als weitestgehend homogen (16–17 Jahre) beschreiben lässt. 4.1.1 Konzeptionen von STANDARD Universitäten gelten häufig als reine Domänen des STANDARDS; in ihnen werde, so die verbreitete Ansicht, nur die STANDARDSPRACHE gebraucht (vgl. Dannerer 2018: 169, 174–175). Im VAMUS-Korpus zeigt sich tatsächlich, dass in vielen universitären Situationen die Verwendung der STANDARDSPRACHE erwartet wird. Dies gilt vor allem für Prüfungen, den Sprachgebrauch von und mit Lehrenden sowie studentische Präsentationen. Diese Normvorstellungen wie auch die Rechtfertigungen dafür deuten auf eine Konzeption der STANDARDSPRACHE als formelle, distanzsprachliche Varietät hin. So meint etwa LIH, wenn „[du] offiziell […] als Lehrender vorne stehst, hast natürlich eine gewisse Rolle […] und das ist schon verbunden mit der Standardsprache“ (LIH 26:28–26:42). Auf die Universi- tät allgemein bezogen betont auch LUJ, er sei ein „Verfechter, dass man die Hochsprache sprechen sollte, gerade wenn es um offizielle Dinge geht, auch im Studium“ (01:36–02:01). Mit seiner distanzsprachlichen Funktion geht einher, Weil Standard verständlich ist und Dialekt authentisch macht | 425 dass der Gebrauch des STANDARDS mit Höflichkeit und Respekt assoziiert wird. Vor allem in der Kommunikation mit Lehrenden halten Studierende den STAN- DARD daher für angemessen. So ist etwa SIC überzeugt, es gebe ein „Niveau an Sprache, Standardsprache“, das für einen „respektvolle[n] Umgang“ mit Leh- renden unabdingbar sei; man rede mit ihnen „halt natürlich nicht so wie mit […] Freunden“ (32:44–33:14). Neben der Konzeption, dass die STANDARDSPRACHE diejenige Varietät ist, mit der man dem Gegenüber in besonderer Weise Höflichkeit und Respekt zum Ausdruck bringt, wird sie auch häufig mit Korrektheit assoziiert. Dahinter mag die Ideologie stehen, dass (nur) die STANDARDSPRACHE korrekt sei. Für etliche GP, wie etwa SUI, ist die STANDARDSPRACHE das „korrekte Deutsch, das auch in ge- schriebener Sprache existiert und bestimmte grammatikalische Regeln hat und Normen“ (SUI 19:12–19:32). Gerade die Verbindung zwischen SCHRIFTLICHKEIT – NORMIERTHEIT – STANDARDSPRACHLICHKEIT ist an der Universität weit verbreitet. Der STANDARD sei „halt dann wirklich korrekt“, insofern man spricht, wie man schreibt, urteilt etwa SIH (27:21–27:28). Diese Gleichsetzungen sind wohl ur- sächlich dafür, dass STANDARD-Sprecher/inne/n auch eine höhere Kompetenz und Professionalität unterstellt wird. LOB bspw. ist „nicht dafür, dass wir […] im Lehrbetrieb Umgangssprache sprechen […]. Die Professionalität hängt auch ein bisschen daran, dass man gehobeneres Deutsch spricht“. Nicht nur auf sie wir- ken bspw. Sprecher/innen aus dem Norden Deutschlands allein wegen ihrer STANDARDNAHEN Sprechweise „unglaublich kompetent“ (16:18–17:37). 4.1.1 Konzeptionen von STANDARD In Verbin- dung mit solchen Einstellungen steht, dass die STANDARDSPRACHE als bildungs- sprachliche Varietät konzipiert wird: „Ich glaube schon […], dass es erwünscht ist, wenn man halt schöner spricht […], es klingt irgendwie gebildeter“, denkt etwa SUG (24:45–25:15). Auch SOE bekundet, in Referaten sei STANDARD zu ver- wenden, weil es „einfach seriöser klingt“ – „wissenschaftliche Sachen, die sind halt doch irgendwie immer eher bisschen steif und das ist für mich auch die Standardsprache“ (21:34–22:42). Eine besonders häufig vorgebrachte Zuschreibung der STANDARDSPRACHE ist ihre hohe Verständlichkeit. Im Allgemeinen wird die STANDARDSPRACHE als ver- ständlicher und damit als angemessener für universitären Sprachgebrauch angesehen als NONSTANDARD. So ist etwa SIC dafür, „dass die Professoren selber darauf schauen bisschen, dass alle Hochdeutsch sprechen“ – NONSTANDARD würden nämlich „nicht alle verstehen“ (05:31–05:37). Als besonders unver- ständlich werden vom STANDARD abweichende Varietäten für Sprecher/innen mit anderer L1 als Deutsch angesehen. So erwartet etwa LOE, dass man wegen der „Internationalisierung unserer Universitäten“ und der „zahlreichen Inco- mings“ generell STANDARD verwenden sollte. „Dass sie unsere Sprache verste- 426 | Philip C. Vergeiner, Elisabeth Buchner, Eva Fuchs, Stephan Elspaß 426 hen“, sei ein „Argument der Höflichkeit“ (09:18–10:52). Bisweilen wird der Ge- brauch der STANDARDSPRACHE auch in Gegenwart von Sprecher/inne/n aus Mit- tel- und Norddeutschland befürwortet, da auch diesen unterstellt wird, keinen bairisch-österreichischen NONSTANDARD zu verstehen: „wenn ich mit […] jeman- dem aus Norddeutschland spreche, dann versteht er mich nicht, so wie wir zwei jetzt reden, oder hat seine Mühe nur, da muss ich mich anpassen und Hoch- deutsch verwenden“, wertet etwa die Österreicherin SUH (19:39–19:51).7 Bun- desdeutschen Sprecher/inne/n (vor allem aus dem Norden und der Mitte Deutschlands) wird an der Universität Salzburg allerdings nicht nur unterstellt, keinen regionalen NONSTANDARD zu verstehen; ihnen wird auch zugeschrieben, die ,echten‘ bzw. ,besten‘ STANDARD-Sprecher/innen zu sein: „sie sprechen na- türlich schöner, akkurater, und nicht so schlampig wie wir Österreicher“, urteilt z. B. die Österreicherin VIA (01:52–02:01). Das ist nicht nur die Fremdwahrneh- mung österreichischer GP, auch viele bundesdeutsche GP sind davon über- zeugt. LUJ vertritt etwa die Meinung, dass er in Österreich „eigentlich noch nie auf einen gestoßen [ist], der Hochdeutsch spricht“ (17:10–17:14), höchstens auf Sprecher/innen, die „Pseudohochdeutsch“ verwenden. Was er als Norddeut- scher spreche, „komme dem Hochdeutschen wahrscheinlich relativ nahe“, die STANDARDORIENTIERTE Sprechweise in Österreich sei hingegen „vom Hochdeut- schen relativ weit entfernt und hat noch immer ganz deutliche dialektische [sic] Einfärbungen“ (03:30–03:50). || 7 Auffällig ist, dass die Sprechweise im Ausschnitt nicht sonderlich DIALEKTAL ist, vgl. die Übertragung der Transkription in GAT2: „we_wenn i mit am (-) m_mit am (.) mit jemanden aus NORDdeutschland sprech? | dann verSTEHT er mi ned, | so wie WIR zwa jetzt reden;=JA? | °h äh oder (.) hot seine MÜhe nur;=JO?= | =do muss i mi ONpassn.“ Zu erwähnen ist, dass nicht alle GP aus der Ansicht, dass Bundesdeutsche NONSTANDARD nicht verstehen, folgern, es sollte STANDARD mit ihnen gesprochen werden – vielmehr sind sie der Ansicht, Deutsche sollten NONSTANDARD verstehen lernen (vgl. dazu Vergeiner 2020). 9 Um Missverständnisse zu vermeiden, sei erwähnt, dass die Sprecherin hier natürlich eine völlig korrekte Ausspracheform vorbringt, diese aber für defizient hält. 8 Dies führt etwa zu der paradoxen Situation, dass Sprecher/innen, die ein vermeintlich ,von regionalen Merkmalen freies Deutsch‘ sprechen, in einer bestimmten Region verortet werden, z. B. „in der mitte von deutschland“ (vgl. Beuge 2019: 161; auch 188, 227, 274f.). || 7 Auffällig ist, dass die Sprechweise im Ausschnitt nicht sonderlich DIALEKTAL ist, vgl. die Übertragung der Transkription in GAT2: „we_wenn i mit am (-) m_mit am (.) mit jemanden aus NORDdeutschland sprech? | dann verSTEHT er mi ned, | so wie WIR zwa jetzt reden;=JA? | °h äh oder (.) hot seine MÜhe nur;=JO?= | =do muss i mi ONpassn.“ Zu erwähnen ist, dass nicht alle GP aus der Ansicht, dass Bundesdeutsche NONSTANDARD nicht verstehen, folgern, es sollte STANDARD mit ihnen gesprochen werden – vielmehr sind sie der Ansicht, Deutsche sollten NONSTANDARD verstehen lernen (vgl. dazu Vergeiner 2020). 8 Dies führt etwa zu der paradoxen Situation, dass Sprecher/innen, die ein vermeintlich ,von regionalen Merkmalen freies Deutsch‘ sprechen, in einer bestimmten Region verortet werden, z. B. „in der mitte von deutschland“ (vgl. Beuge 2019: 161; auch 188, 227, 274f.). 9 Um Missverständnisse zu vermeiden, sei erwähnt, dass die Sprecherin hier natürlich eine völlig korrekte Ausspracheform vorbringt, diese aber für defizient hält. 10 Der durchaus umstrittene Begriff wird hier verwendet, da es sich bei vielen GP um eine Teilnehmerkategorie handelt (s. u.). Wir nutzen ihn als solchen, ohne damit eine diskrete Sprachschicht zwischen DIALEKT und STANDARD postulieren zu wollen (vgl. zur Diskussion bspw. Vergeiner 2019). 4.1.1 Konzeptionen von STANDARD STANDARDSPRACHLICHKEIT wird oft damit gleichgesetzt, dass eine Sprechweise frei von regionalen Merkmalen sei.8 Dabei werden Merkmale als STANDARDkon- stitutiv genannt, die auf ein sehr rigides, monozentrisches Konzept von STANDARD hinweisen – die Bayerin SOE bspw. ist davon überzeugt, sie könne „einfach nicht richtig Hochdeutsch sprechen […] ich sage zum Beispiel [ʃpɔɐ̯t]9 und nicht [ʃpɔʁt], oder im Bayrischen gibt es kein summendes [z] […], oder das [ɒ] ist ganz Weil Standard verständlich ist und Dialekt authentisch macht | 427 anders“ (23:23–23:41). Diese starre Auffassung des STANDARDS hat zur Folge, dass nicht nur Österreicher/inne/n, sondern bisweilen überhaupt den meisten oder allen Deutschsprachigen abgesprochen wird, eine (mündliche) STANDARD- KOMPETENZ zu besitzen. LAF hält den GESPROCHENEN STANDARD etwa für eine „reine Kunstsprache“ – es gebe nur „Umgangssprache“ und „Österreichisch ist genau- so […] wenig Hochdeutsch wie jetzt irgendeine Umgangssprache in Deutsch- land“ (72:05–73:08). Andere GP sind indessen bereit, mehr Variation zu akzep- tieren und vertreten Positionen, die eher einem GEBRAUCHSSTANDARD (vgl. Elspaß & Kleiner 2019: 159–160) entsprechen – so charakterisiert etwa LED sein Deutsch zwar als „ein bisschen österreichisch gefärbt, aber grundsätzlich ist es die Hochsprache“, auch wenn er Strukturen gebraucht, „die man natürlich in Norddeutschland nicht verwenden würde“ (16:52–17:11). Insgesamt sind solche Konzeptionen aber eher selten – auch der tatsächliche Sprachgebrauch ist eher von einem am Monozentrismus und der Explizitlautung orientierten Konzept des STANDARDS geprägt (vgl. ausführlich Vergeiner 2021). 4.1.2 Konzeptionen von NONSTANDARD Auch wenn an der Universität vielfach der Gebrauch von STANDARD erwartet wird und die Konzeptionen von STANDARD generell eher positiv ausfallen, wird an der Universität nicht ausschließlich STANDARDSPRACHLICHKEIT propagiert. Etliche GP halten die Verwendung von DIALEKT und UMGANGSSPRACHE10 als infor- melle, eher nähesprachlichere Varietäten an der Universität für legitim, zumin- dest in gewissen Situationen wie spontanen Wortmeldungen oder Sprechstun- dengesprächen. Dafür scheinen nicht zuletzt gewisse Einstellungen verantwortlich, die ins- besondere DIALEKT mit Attributen wie Authentizität, Identität oder Spontanität verbinden. Dass DIALEKT an der Universität vorkomme, hält etwa SUK für „be- rechtigt“, denn „es macht das Ganze ein bisschen ungezwungen und lebendig, authentisch“ (20:48–20:58). Auch der Lehrende LAE bemerkt, dass durch die Verwendung von NONSTANDARD-Varietäten der Sprachgebrauch an der Universi- tät „aufgelockert“ werde – dadurch komme man „wesentlich authentischer rüber“, sei „pointierter“ und „vom alltäglichen Umgang her“ sei die Kommuni- 428 | Philip C. Vergeiner, Elisabeth Buchner, Eva Fuchs, Stephan Elspaß 428 kation dadurch „einfach […] viel einfacher“ (26:20–26:50). Äußerungen wie diese verweisen einerseits auf eine Ambivalenz der Konzeptionen von STAN- DARD, insofern Zuschreibungen wie Formalität und Distanziertheit auch negativ wahrgenommen werden können. Sie belegen andererseits aber auch die hohe Loyalität, die etliche GP an der Universität gegenüber NONSTANDARD-sprach- lichen Varietäten aufweisen – wie etwa SOE, die von sich behauptet, „immer Dialekt“ zu reden, komme sie sich doch beim Sprechen des STANDARDS „immer so gekünstelt vor“, es sei dann ihre „Stimme ganz anders und das bin dann einfach nicht mehr ich“. Sie wertet es daher positiv, dass sie an der Universität auch ihren DIALEKT sprechen dürfe (17:33–18:42). Doch auch GP, die selbst keine DIALEKT-Sprecher/innen sind, verbinden mit dem DIALEKT vielfach positive Eigenschaften. Auffallend oft werden dabei ästhe- tische Urteile gefällt: „Mir […] gefallen Dialekte“, betont etwa SOF, der weiter ausführt, die Verwendung von DIALEKT bringe „ein bisschen Pepp“ und „Span- nung“ in Lehrveranstaltungen, während es ohne Sprachvariation „langweilig“ sei (02:33–03:02). Besonders häufig wird auch darauf verwiesen, dass es „gut“ sei, wenn man „hört, wo wer herkommt“ (SUA 15:31–15:48). Und während eini- ge GP durch den Gebrauch von DIALEKT zumindest „keine Nachteile“ sehen, „solange alle Anwesenden zurechtkommen“ – schließlich sei „Sprache“ nur „ein Mittel der Verständigung“ (LOH 03:37–04:49) – tragen DIALEKTE nach An- sicht anderer GP zur sprachlichen Vielfalt an der Universität bei. Das wird als positiver Wert gesehen: Z. B. 4.1.2 Konzeptionen von NONSTANDARD sollte SOL zufolge „nicht jeder sprachlich so zu- recht gedengelt werden […] dass alles uniform klingt“ (33:48–33:56) – „Diversi- tät“ sei schließlich „immer etwas Gutes“ (38:47–38:56). Ein Topos, der in die- sem Zusammenhang immer wieder angesprochen wird, ist der (vermeintliche) Schwund des DIALEKTS: SUK bspw. befürchtet, dass manche Personen DIALEKTE „ausrotten“ und „aussortieren“ wollen; das sei „schade“, habe der DIALEKT doch einen „gewissen Wert“, gerade im „Alpenraum“, der DIALEKTAL „so extrem viel- schichtig ist“ und wo DIALEKTE auch für die kulturelle Identität „prägend sind“; um den DIALEKT-Abbau zu verhindern, sollten DIALEKTE auch an der Universität Verwendung finden (31:42–33:38). Allerdings treten an der Universität auch negative Einstellungen zu und Wer- tungen von NONSTANDARD-Varietäten zutage. Im Vergleich zur STANDARDSPRACHE wird insbesondere der DIALEKT als potentielles Verständnishindernis dargestellt (s. o.), außerdem sei es so, wie etwa LOC bemerkt, dass viele „Intelligenz nicht mit Dialekt“ verbinden (12:41–12:59). Damit zusammenhängend wird NONSTAN- DARD oftmals als inkorrekte und falsche Form der Sprachverwendung begriffen. So charakterisiert etwa SIH den Begriff des DIALEKTS wie folgt: „Dialekt ist mehr so, ja, ich weiß eigentlich eh, wie es richtig ist, aber es fällt mir unheimlich Weil Standard verständlich ist und Dialekt authentisch macht | 429 schwer, das im Sprachgebrauch anzuwenden“ (32:24–32:33). Andere GP vertre- ten zwar sehr wohl die Ansicht, dass auch der DIALEKT Regeln und Normen ha- be, obgleich diese vom STANDARD abweichen. So ist etwa nach SIC im STANDARD „Vieles nicht richtig“, was „im Dialekt einfach richtig ist […], er [= der DIALEKT] hat einfach eigene Regeln und eine eigene Grammatik“ (37:28–37:34). Nichts- destoweniger halten viele GP den DIALEKT zumindest in Bezug auf die wissen- schaftliche Sprachverwendung jedoch für nicht ausreichend ausgebaut. „Einen wissenschaftlichen Vortrag“, ist etwa LEA überzeugt, „komplett im Dialekt, das geht ja kaum […], Dialekt hat ja einfach nicht diesen funktionalen Geltungsbe- reich“ (05:40–05:50). Auch SUH äußert z. B. die Ansicht, im DIALEKT könne man nicht „kurz und prägnant und klar formulieren“, weshalb man in Prüfungen STANDARD nutzen solle (19:51–20:25). Häufiger vorgebracht wird auch der (Irr-)Glaube, der DIALEKT sei ein Resul- tat des Sprachverfalls oder eine, wie etwa SAB äußert, „verzerrte Form […] von der Standardsprache“ (29:41–29:49). 4.2 Schule Auch an der Schule existieren unterschiedliche Varietätenkonzeptionen, die z. T. mit denen an der Universität übereinstimmen, sich z. T. auch unterschei- den. In der Folge werden zunächst die STANDARD-, dann die NONSTANDARD- Konzepte in der Schule besprochen und mit der Universität verglichen. 4.1.2 Konzeptionen von NONSTANDARD Eine besonders drastische Ansicht ist, vermehrter Gebrauch des DIALEKTS sei schädlich, wie sie etwa SEG vertritt; sie berichtet in diesem Zusammenhang von einer Lehrveranstaltung in „Stimmbil- dung“, wo von einer externen Lehrenden (einer „Opernsängerin aus München“) vermittelt worden sei, der Gebrauch von DIALEKT schädige die Stimmbänder und wenn jemand „ständig Dialekt spricht“, könne der-/diejenige die „Stimme ver- lieren“ (36:42–38:00). Negative Konzeptionen finden sich häufig auch von der UMGANGSSPRACHE. Von manchen GP wird sie sogar als noch weniger angebracht für den Gebrauch an der Universität eingestuft als etwa der DIALEKT; so meint etwa LAC, man habe „weniger ein Problem“, dass das „Sprachniveau zu niedrig wird […], wenn man Dialekt spricht […] als wenn man Umgangssprache spricht“ (07:11–07:22). Sol- che Konzeptionen legen nahe, dass die UMGANGSSPRACHE nicht von allen GP als Sprechweise ,zwischen‘ DIALEKT und STANDARD begriffen wird – auch wenn viele GP dies tun –, sondern als SOZIOLEKT: „Umgangssprache ist halt, immer so viel Englisch drinnen […], das ist halt Jugendsprache“ definiert den Begriff etwa SIH (27:28–27:43). Andere GP bekunden, das Konzept überhaupt nicht zu kennen oder sie rücken es in die Nähe der STANDARDSPRACHE. So etwa LEG, wenn er meint, er habe eigentlich „immer in Dialekt und Schriftsprache gedacht“ – durch die Fragestellungen bei der VAMUS-Erhebung sei er jedoch darauf ge- kommen, dass es „dreigeteilt“ ist, sei doch ein „große[r] Unterschied zwischen wirklich Schriftdeutsch“ und dem, „was ein österreichischer Fernsehsprecher redet“ (06:08–06:31). Dass nach LEGs Ansicht selbst professionelle Spre- cher/innen NONSTANDARD in Form einer UMGANGSSPRACHE verwenden, belegt 430 | Philip C. Vergeiner, Elisabeth Buchner, Eva Fuchs, Stephan Elspaß 430 nicht zuletzt die eher monozentrische Auffassung des STANDARDS vieler GP, von welcher oben die Rede war. nicht zuletzt die eher monozentrische Auffassung des STANDARDS vieler GP, von welcher oben die Rede war. 4.2.1 Konzeptionen von STANDARD Betrachtet man die Konzepte von STANDARD an der Schule, fällt zunächst ein Unterschied zwischen Stadt und Land auf: Der STANDARD wird von den meisten GP aus dem städtischen Raum als Sprache des täglichen Umgangs definiert. So ist es Schülerin SA47 zufolge eine „komplett normale Sprache“, die in der „All- tagskommunikation“ gesprochen wird (12:14–13:21). SA10 bestätigt das dahin- gehend, als diese Varietät etwas sei, „das alle reden“ und „das am Ende des Tages von allen verstanden wird“ (19:35–20:21). SA21 geht noch weiter, indem sie meint, dass die STANDARDSPRACHE diejenige Varietät sei, die „in Österreich allgemein gesprochen“ werde und „im täglichen Austausch“ die wichtigste Kommunikationsform darstelle – sei es nun „im Arbeitsleben“ oder „in der Freizeit“ (15:50–19:22). Auch Schüler SA23 ist der Meinung, dass der STANDARD „eine vorgegebene Sprache für alles“ sei, die auch allenthalben genutzt werden sollte. Ihm zufolge habe es „nur Vorteile“, dass in Salzburg-Stadt keine DIALEKTE gesprochen würden. Es gebe keine Verständnisprobleme und dadurch sei die Kommunikation „viel unkomplizierter“ (20:21–21:15). Interessanterweise wird der STANDARD von den Schüler/inne/n in Salzburg-Stadt viel deutlicher als „All- tagssprache“ definiert als von ihren Lehrer/inne/n, die dabei wesentlich vager bleiben. Trotzdem ist der STANDARD auch für etliche städtische Lehrpersonen eine Art GEBRAUCHSSTANDARD, der in den meisten Interaktionssituationen ange- messen ist und den Lehrenden zufolge dabei auch Potential für Variation auf- weist. Nicht überall gilt der STANDARD jedoch als „Sprache des täglichen Umgangs“ – vor allem in stark DIALEKTAL geprägten, ländlichen Regionen wird er im Gegen- teil als „eine Art Fremdsprache“ verstanden, wie es etwa LC4 ausdrückt, wobei er als solche zum Teil „nur wenig Ähnlichkeiten“ mit dem lokalen DIALEKT auf- weise. Dennoch sei es laut LC4 vor allem in Hinblick auf die (mündlichen) Ma- Weil Standard verständlich ist und Dialekt authentisch macht | 431 turaprüfungen notwendig, dass die Schüler/innen auch mit dem HOCHDEUT- SCHEN konfrontiert werden (19:18–21:08). Auch andere GP konzipieren den STANDARD als Art Fremdsprache – wie beim Fremdspracherwerb erfolge laut LC2 etwa der Übergang vom DIALEKT in die STANDARDSPRACHE „prozesshaft“. Nach und nach könne die STANDARD-Kompetenz aufgebaut und dieser in verschiede- nen Situationen eingesetzt werden (17:33–19:09). Auch wenn der STANDARD zumindest in ländlichen Regionen als Art Fremd- sprache wahrgenommen wird, wird er nichtsdestoweniger an allen Schulstan- dardorten oft – wie an der Universität (vgl. Abschnitt 4.1.1) – als korrektes Deutsch vorgestellt. SC22 vertritt bspw. 4.2.1 Konzeptionen von STANDARD die Ansicht, dass das HOCHDEUTSCHE teilweise einen „ganz anderen Wortschatz“ als der DIALEKT umfasse, wobei HOCHDEUTSCH im Gegensatz zum DIALEKT auch „grammatikalisch korrekt“ sei. Das mache eine Verständigung außerhalb der eigenen Region schwierig. Schon allein deshalb sei „das Erlernen der Standardsprache notwendig“ (15:22–15:47). Auch an der Schule wird von den GP der STANDARD gemeinhin als „klarer“, „deutlicher“ und auch „gebildeter“ angesehen, wie etwa SA45 meint. Ihr zufol- ge versuche man mit HOCHDEUTSCH „etwas darzustellen“, „sich gut zu positio- nieren“ und dadurch auch „ernster genommen zu werden“ (17:03–17:55). Ähn- lich argumentiert SA52. Für sie zeugt HOCHDEUTSCH von „Respekt, von Hochachtung“. Indem man STANDARD spricht, zeige man, dass man das Gegen- über „akzeptiert“ und „schätzt“. Insofern SA52 den STANDARD mit der Sprache Goethes vergleicht, wird auch deutlich, dass sie HOCHDEUTSCH als Sprache der Gebildeten und der Bildung ansieht (15:22–16:03). Für SA2 ist die STANDARDSPRA- CHE dabei auch eine Sprechweise, die „so vorgegeben ist“ und „bestimmten Regeln entspricht, an die man sich halten muss“ (13:28–14:50). SA6 zufolge ist es wichtig, „die Wörter so auszusprechen, wie sie sind“. Erst dann sei es „richti- ges Hochdeutsch“. Obwohl es für diese GP „nicht schlimm“ ist, wenn dazwi- schen ein paar Wörter im DIALEKT vorkommen, zeuge das trotzdem für „weniger Intelligenz“ und sei auch „nicht so schön“ (13:58–14:32). Dass STANDARD mit Bildung, Respekt und Höflichkeit verbunden wird, entspricht der Sicht, die an der Universität vorherrscht (vgl. Abschnitt 4.1.1). Auch in Regionen, in denen der DIALEKT die unumstrittene Alltagsvarietät ist, stellt die STANDARDSPRACHE die Varietät mit dem höchsten Prestige dar, die mit der Assoziation hoher Bildung einhergeht. So bezeichnet SC5 den STANDARD als „höher, gebildeter“ (12:05–12:35). SC25 unterstreicht diese Meinung, indem er die STANDARDSPRACHE als „eine gehobene Weise von Dialekt“ bezeichnet, die „gepflogener und schöner“ ist. Für ihn steht sie in unmittelbarem Zusammen- hang mit „Vornehmheit“. STANDARD sei eine „saubere Sprache, ohne Fehler, in dem man alles klar ausdrücken“ könne. Vor allem „die Gebildeten“ würden 432 | Philip C. Vergeiner, Elisabeth Buchner, Eva Fuchs, Stephan Elspaß 432 HOCHDEUTSCH sprechen, während in der Familie oder mit Freunden doch eher der DIALEKT im Vordergrund stehe. Vor Leuten, die die STANDARDSPRACHE im täglichen Leben benutzen, habe er „großen Respekt“ (11:05–12:01). Aus einem ähnlichen Grund hält es auch SA20 für unangebracht, in der Schule DIALEKT zu sprechen. HOCHDEUTSCH sei die „Höflichkeitsform“, die „förmlicher“ als der DIALEKT sei und „die man außerhalb der Familie oder des Freundeskreises“ immer sprechen sollte (07:52–09:19). 4.2.1 Konzeptionen von STANDARD Weil der STANDARD als förmlichere Sprechweise konzipiert wird, ist der aus- schließliche Gebrauch des STANDARDS sowohl Lehrer/inne/n als auch Schü- ler/inne/n zufolge in bestimmten schulischen Situationen anzustreben. Dies betrifft – ähnlich wie an der Universität (vgl. Abschnitt 4.1.1) – vor allem die fachlichen Teile bei Referaten (bei Lehrer/inne/n teilweise auch Fachvorträgen) oder Prüfungssituationen. Schüler SA1 betont in diesem Sinne, dass es sich „einfach nicht gehört, bei Referaten Dialekt zu sprechen“ (06:58–07:03). Eine ähnliche Ansicht vertritt der Lehrer LC3, der beteuert, dass „dialektal gefärbte“ Sprache bei einer Abschlussprüfung „natürlich nicht geht“ (04:28–04:55). Als oberstes Ziel wird dabei oft die mündliche Abschlussprüfung (d. h. Matura- bzw. Fachprüfung) genannt. Auch in Hinblick auf ein Universitätsstudium sei, so sind die schulischen GP nicht zu Unrecht (vgl. Abschnitt 4.1.1) überzeugt, eine gewisse Versiertheit in der STANDARDSPRACHE notwendig. Das ist dann auch der Grund für LA3, ihre Schüler/innen auf eine solche Versiertheit vorzubereiten; schließlich sei sie selbst, im Gegensatz zu „deutschen oder ostösterreichischen“ Kommiliton/inn/en, die sich die adäquate Sprache „nicht zuerst überlegen mussten“, an der Universität oft in einen „sprachlichen Notstand“ geraten, weil die „Grammatik und Lexik“, die sie aus dem DIALEKT gewohnt war, für formelle Situationen nicht mehr passend schien. Um den Lernenden solche Schwierig- keiten zu ersparen, versuche sie, ihnen „anhand eigener Erfahrungen Empfeh- lungen zu geben“ und in Vorbereitung auf das Studium mit ihnen die STAN- DARDVARIETÄT zu trainieren (09:37–10:18). Dass die Schule den Erwerb von STANDARD auch in Hinblick auf das spätere Berufsleben forcieren müsse, kommt häufiger vor. Dabei scheint das Erlernen von HOCHDEUTSCH in der Schule als überregionale Varietät von einem Großteil der GP als Vorteil für das spätere Berufsleben eingeschätzt zu werden. Verwie- sen wird im Zuge dessen insbesondere auf Wirtschaftsberufe oder Berufe, die ein Studium voraussetzen, wie etwa der Arzt- oder Lehrberuf. SC25 zufolge wer- de man in solchen Berufen „besser wahrgenommen“ und sei dadurch „erfolg- reicher“, wenn man sich „gut auf Hochdeutsch artikulieren“ könne (21:14– 21:57). Ein ähnliches Argument bemüht SC41, die der Meinung ist, dass die STANDARDSPRACHE „das Um und Auf im Geschäftsleben“ sei (19:18–21:03). Auch 433 Weil Standard verständlich ist und Dialekt authentisch macht | Bewerbungsgespräche werden in diesem Zusammenhang öfter genannt. In ihnen spricht etwa SC4 „eher Hochdeutsch“, weil sie sich „gut ausdrücken“ will, außerdem ist der STANDARD für sie ein Mittel, um vom Gegenüber gut ver- standen zu werden (03:30–04:05). 4.2.1 Konzeptionen von STANDARD Für LA2 ist es gleichsam in einer „globalisier- ten Welt“ Voraussetzung, dass man „in einer Sprache spricht, wo man einen in Norddeutschland auch versteht.“ Gerade für ihren Schultyp sei das umso wich- tiger, wo doch ein Großteil der Absolvent/inn/en zukünftig in wirtschaftlichen Betätigungsfeldern arbeiten werde (09:07–09:28). Dass STANDARD verwendet werden soll, um den Erwerb des STANDARDS zu forcieren, ist ein Aspekt, der an der Universität zwar auch belegbar ist, aber nicht so oft, da STANDARD- Kompetenzen dort vielfach erwartet werden (vgl. ausführlicher etwa Vergeiner et al. 2020). Gerade in Hinblick auf das spätere Berufsleben zeigt sich, dass die GP an der Schule dem STANDARD nicht nur ein höheres Prestige, sondern auch eine bessere Verständlichkeit zuschreiben. Dieser Wert stellt für die meisten ein star- kes Argument für die Orientierung am STANDARD dar. Zumindest für manche GP spricht dies auch für einen verstärkten Gebrauch von STANDARD in der Schule. Für die Lehrperson LG1 ist es z. B. explizit „erwünscht“, dass „Schriftsprache“ gesprochen werde. Ihr zufolge hätten vorwiegend Schüler/innen aus stark dia- lektal geprägten Regionen zwar anfangs oft Schwierigkeiten, sich „sprachlich umzustellen“; „erstrebenswert“ sei das aber allemal, zumal Lernende aus DIA- LEKTFERNEREN Gebieten oft Schwierigkeiten hätten, den starken DIALEKT zu ver- stehen (05:22–06:18). Auch die große Zahl an Schüler/inne/n mit Deutsch als Zweitsprache mache es SG5 zufolge notwendig, sich an die STANDARDSPRACHE anzunähern (15:18–15:56). Auffällig an den schulischen Interviews im Vergleich zur Universität ist, dass manche GP zwar unterschiedslos von HOCHSPRACHE und STANDARDSPRACHE sprechen, dass andere GP jedoch zwischen beiden Begriffen sehr wohl differen- zieren. Sie unterscheiden dabei zwischen STANDARD, der in Österreich als „höchste Varietät“ möglich ist, und HOCHDEUTSCH. Letzteres sei eine Sprachform, die „rein in Deutschland“ gesprochen wird und für Österreicher/innen „gar nicht realisierbar“ sei. SA33 zufolge sei das aber auch nicht notwendig. Damit einher geht auch die Auffassung von einem eigenen ÖSTERREICHISCHEN STANDARD. Für viele GP ist dieser ÖSTERREICHISCHE STANDARD dem DEUTSCHEN STANDARD indes untergeordnet im Sinne einer asymmetrischen Plurizentrik (vgl. Scharloth 2005 für eine ähnliche Situation in der Deutschschweiz). Trotz der Überzeu- gung, dass verschiedene Zentren existierten und ein Einheitsdeutsch nie er- reicht werden könne, stellt ein solches den GP zufolge ein Ideal dar, das über allen anderen Varietäten steht. Das österreichische Deutsch, das innerhalb 434 | Philip C. Vergeiner, Elisabeth Buchner, Eva Fuchs, Stephan Elspaß 434 Österreichs die „höchste Sprachlage“ darstelle, wird dabei als inferior betrach- tet. 4.2.1 Konzeptionen von STANDARD So ist nach Ansicht von LG2 das „deutsche Deutsch lupenreiner“ im Ver- gleich zum „holprigen“ österreichischen Deutsch, Deutsche wirkten „kompe- tenter“, „rhetorisch besser“ und seien viel eher in der Lage, etwas auf den Punkt zu bringen (07:22–08:23). Laut SA40 gibt es einen großen Unterscheid zwischen dem DEUTSCHEN und dem ÖSTERREICHISCHEN STANDARD. Bewusst sei ihr das erst geworden, als ihre vierjährige deutsche Cousine sie fragte, warum sie nicht „richtig Deutsch“ sprechen könne. Sie würde sie „nicht gut verstehen“, weil sie „so komisch“ rede (20:16–20:49). SA52 zufolge würden in Österreich „die gleichen Wörter benutzt“ wie in Deutschland, diese würden aber „schlampiger ausgesprochen“. Im Gegensatz dazu klinge das HOCHDEUTSCHE „viel hochgestochener“ und sei „viel näher an der Rechtschreibung und an der Norm“ (15:33–16:25). Dass die Schreibung als Maßstab für STANDARDSPRACHLICHKEIT gesehen wird, zeigt sich generell auch bei anderen GP – STANDARDSPRACHLICH ist nach Meinung von SC37 „das Schriftli- che“, was für die Alltagskommunikation „nicht relevant“ sei. Insofern gilt der STANDARD als „normierte und kodifizierte Schriftsprache“, wie sie in den Lehr- büchern verwendet wird (20:18–21:03). Laut SA12 ist HOCHDEUTSCH genau so, „wie man schreibt und formuliert“. Es sei in Bezug auf die Grammatik „genau so, wie man es in der Schule lernt“ (15:14–15:46). Auch für SC12 ist die STAN- DARDSPRACHE ebendas, was „im Wörterbuch“ zu finden sei. Es sei ein „sehr sach- liches und grammatikalisch korrektes Deutsch“, das in Österreich „die Amts- sprache“ darstelle und deshalb auch in der Schule gelernt werden müsse (23:30–24:45). Letztlich ist die Gleichsetzung von SCHRIFTLICHKEIT – NORMIERTHEIT – STANDARDSPRACHLICHKEIT also an der Schule genauso wie an der Universität verbreitet. Dasselbe gilt – wenn auch etwas weniger stark – für die areale Veror- tung des STANDARDS in Deutschland. 4.2.2 Konzeptionen von NONSTANDARD Obwohl die STANDARDVARIETÄT eng mit dem schulischen Alltag verwoben zu sein scheint und gerade den Lehrpersonen zufolge unabdingbar in formelleren Situ- ationen ist, wird oft für den Gebrauch von NONSTANDARD-Varietäten im Schulall- tag argumentiert: Analog zur Universität (vgl. Abschnitt 4.1.2) wird NONSTANDARD dabei vor- wiegend mit Nähe, Heimat und Verwurzelung in Zusammenhang gebracht. Von SC6 als „emotionale Herzenssprache“ mit kleinräumiger Verbreitung definiert, zeichne er sich durch „lokale Sprachnuancen“ aus und unterscheide sich in Weil Standard verständlich ist und Dialekt authentisch macht | 435 „wesentlichen Elementen“ von der STANDARDSPRACHE. Insofern sei der DIALEKT stark mit „Heimat“ in Beziehung zu bringen und als solcher ein „wichtiger Be- standteil“ ihres Lebens (09:46–10:01). Für LC2 zeigt sich die regionale Verwur- zelung in der Verwendung von DIALEKT, der für sie „die Wurzel“, die „wirkliche Muttersprache“, in der man „fast alles“, insbesondere aber „Emotionen und Gefühle“, viel besser ausdrücken könne (12:06–13:10). LC4 teilt diese Sichtwei- se, wobei sie den Stellenwert des DIALEKTS für die Jugendlichen hervorstreicht. Die regionale Varietät würde ihnen ein „gewisses Selbstbewusstsein“ geben, sie hätten das Gefühl, „irgendwo dazuzugehören“. Der DIALEKT habe demgemäß viel mit „Identität, mit Persönlichkeit“ zu tun. Durch die Sprache würde man sich „mit einem Gebiet identifizieren“. In ihrem Unterricht sei es ihr daher wich- tig, dass die Schüler/innen „authentisch“ blieben und sich nicht „verstellten“ (15:14–15:23). Immer wieder wird, wie an der Universität (vgl. Abschnitt 4.1.2), dieser Zusammenhang von Identität und DIALEKT betont. LF5 zufolge betreffe er selbst Schüler/innen mit Migrationshintergrund: Sie wüssten oft nicht, welcher Nationalität sie sich zugehörig fühlen. Allein die regionale Varietät und die dadurch geschaffene Solidarität helfe ihnen, sich zu integrieren (07:18–08:52). Das Zugeständnis an den als authentisch empfundenen NONSTANDARD wird an der Schule – und hier unterschieden sich Schule und Universität – auch öfter auf die pädagogische Beziehung zwischen Lehrenden und Lernenden bezogen, zumindest wenn es sich nicht um offizielle Situationen handelt. Für LA2 ist es das Kennzeichen einer „guten Beziehung“, wenn die Schüler/innen mit ihr im DIALEKT sprechen. Die Lernenden würden sich dadurch „wohl“ und „angenom- men“ fühlen, was für eine „gute Vertrauensbasis“ unabdingbar sei. In Prü- fungssituationen müssten sie natürlich „ordentlich“ sprechen (05:10–06:04). An der Universität scheint die nähesprachliche Funktion von NONSTANDARD bei Lehrenden-Studierenden-Interaktionen weit weniger bedeutsam zu sein. Das gilt auch für den didaktischen Wert, der dem DIALEKT an der Schule zu- gemessen wird, etwa beim Sprachenlernen: Für LF2 z. B. 4.2.2 Konzeptionen von NONSTANDARD bildet der DIALEKT als „Muttersprache“ die Basis für den weiteren Varietäten- und Spracherwerb. In der regionalen Sprache seien „zusätzliche Informationen“ enthalten. „Über Jahrzehnte bzw. sogar Jahrhunderte entwickelt“, habe diese Varietät „eine ge- wisse Tradition“. Verstehe man das, „woher man kommt“, könne man auch „das große Ganze“ besser begreifen. Egal, ob man dann „gehobene Umgangs- sprache“, „Standard“ oder sogar eine „zweite oder dritte Fremdsprache“ lerne, mit dem DIALEKT als Basis habe man weit weniger Schwierigkeiten damit (14:22– 15:35). Im Unterschied zur Universität stellen NONSTANDARD-Varietäten an der Schu- le für manche Lehrpersonen auch eine Möglichkeit dar, ein Bewusstsein für eine 436 | Philip C. Vergeiner, Elisabeth Buchner, Eva Fuchs, Stephan Elspaß 436 situationsangemessene Varietätenverwendung bei den Lernenden zu schaffen. LC4 zufolge ist es wichtig, die „sprachlichen Register für formelle und informel- le Kontexte“ bedienen zu können. Das schließe auch den DIALEKT mit ein. Die Lernenden sollten auf verschiedene sprachliche Anforderungen vorbereitet werden und dafür sensibilisiert werden, sich in verschiedenen sozialen Kontex- ten sprachlich angemessen zu verhalten. Nach Ansicht von LC4 trägt genau diese sprachliche Diversität dazu bei, dass man für andere Varietäten und Spra- chen sensibilisiert und im Zuge dessen „toleranter“ anderen Sprachformen gegenüber werde (15:41–16:12). Zudem würde die Auseinandersetzung mit an- deren Varietäten auch zu einer Veränderung des persönlichen Sprachgebrauchs und in weiterer Folge zu einem Ausbau STANDARDSPRACHLICHER Kompetenzen beigetragen. Das sei die Voraussetzung für eine umfassende Sprachkompetenz. Die Schule sollte als „Übungsplatz“ dafür dienen. Generell wird an der Schule – im Unterschied zur Universität – davon aus- gegangen, dass Kompetenzen im STANDARD bei den Lernenden nicht von Anfang an gegeben sind. Auch wenn STANDARD für LG4 in der Schule eine „wichtige Varietät“ sei, die auch die „größte kommunikative Reichweite“ aufweise, sei er für viele Schüler/innen de facto aber „mündlich nur schwer realisierbar“. Aus diesem Grund würden STANDARDABWEICHENDE Sprechweisen akzeptiert, um die Angst vor Überforderung angesichts zu hoher STANDARD-Erwartungen zu mini- mieren. So finde die Alltagskommunikation der meisten Schüler/innen im länd- lichen Raum ausschließlich im DIALEKT statt (15:20–16-11). LC2 zufolge sei der „Wechsel“ zum STANDARD „sehr schwierig“. Der DIALEKT sei somit eine Art „Hilfsvarietät“, die „natürlich mit Grenzen“ akzeptiert werde, um den Schü- ler/inne/n entgegenzukommen (06:15–07:22). Stellt der NONSTANDARD vorwiegend für Deutschlehrer/innen eine Hilfestel- lung dar, wird er in anderen Fächern großteils als die eigentliche Unterrichts- sprache definiert. So fällt es LC1 zufolge in anderen Gegenständen „nur zum Teil“ in den Aufgabenbereich einer Lehrperson, auf die Sprache zu achten. 4.2.2 Konzeptionen von NONSTANDARD Solange eine gegenseitige Verständigung gewährleistet sei, sei der DIALEKT dort durchaus adäquat (05:21–06:15). Auch SA1 argumentiert dahingehend, dass die Sprache in anderen Fächern lediglich „als Medium“ diene, explizit aber „kaum etwas mit dem Lernstoff zu tun“ habe. Insofern könne man durchaus gute Leis- tungen beispielsweise in Mathematik erbringen, ohne STANDARDSPRACHE im Unterricht zu sprechen (07:39–08:25). Ähnlich pragmatisch wird auch bisweilen an der Universität argumentiert (vgl. Abschnitt 4.1.2). 437 Weil Standard verständlich ist und Dialekt authentisch macht | 437 11 Zu ausgewählten quantitativen (neben qualitativen) Ergebnissen vgl. Vergeiner et al. (2019). 5 Diskussion und Fazit Im vorliegenden Beitrag präsentierten wir Ergebnisse einer qualitativen Unter- suchung zu Varietätenkonzeptionen an Schulen in Salzburg und Tirol und an der Universität Salzburg. In Anlehnung an neuere qualitative Ansätze der Perzeptionslinguistik wurden für den vorliegenden Beitrag keine quantitativen Daten,11 sondern ausschließlich Gesprächsdaten ausgewertet, die im Rahmen halbstrukturierter Interviews mit insgesamt 264 GP erhoben wurden. Begründen lässt sich diese Vorgehensweise damit, dass die inhaltsanalytische Auswertung von Interviewdaten eine Tiefe der Rekonstruktion abstrakter Konzepte wie den Varietätenkonzeptionen gestattet, die rein quantitative Ansätze nicht zu leisten vermögen. Die Interviewdaten wurden daraufhin ausgewertet, (1) welche Varie- tätenkonzeptionen sich aus den Äußerungen erschließen lassen, (2) wie die Verwendung dieser Varietäten innerhalb und außerhalb des Schul- bzw. Uni- versitätsalltags bewertet wird sowie (3) wann welche Varietäten aus der Sicht der GP verwendet werden sollten (und wann nicht). Generell lässt sich festhalten, dass zwischen den Varietätenkonzeptionen der GP an der Universität und den Schulen viele Gemeinsamkeiten auftreten. Was beiden Institutionstypen gemeinsam ist, sind die heterogenen Sprachver- hältnisse in Bezug auf innere wie äußere Mehrsprachigkeit, wobei die Hetero- genität an der Universität aufgrund des höheren Anteils von Personen, die nicht in Österreich bzw. überhaupt im deutschsprachigen Raum aufgewachsen sind, ausgeprägter ist als an den Schulen (vgl. Abschnitt 3). Mit Blick auf die drei genannten Fragen lässt sich aus den Analysen Folgendes rekonstruieren: 1. Alle GP haben ein klares Bewusstsein für die Existenz von mindestens zwei Varietäten. Das STANDARDDEUTSCHE wird meist als HOCHDEUTSCH bezeichnet, der NONSTANDARD meist als DIALEKT, gelegentlich wird zusätzlich auch von einer „UMGANGSSPRACHE“ oder einfach von einem „DAZWISCHEN“ (von Leh- rer/inne/n an den Schulen) gesprochen. Bei jenen GP, deren Varietätenkon- zeption neben HOCHDEUTSCH und DIALEKT keine(n) Zwischenbereich(e) vor- sieht, muss man annehmen, dass der DIALEKT-Begriff sehr weit ist und neben den Basisdialekten auch den mittleren Bereich umfasst. Von GP an Schulen wie an der Universität werden DIALEKTE hauptsächlich als informelle, nähesprachliche Varietäten begriffen; der STANDARD/das HOCHDEUTSCHE wird entsprechend als formelle, distanzsprachliche Varietät Von GP an Schulen wie an der Universität werden DIALEKTE hauptsächlich als informelle, nähesprachliche Varietäten begriffen; der STANDARD/das HOCHDEUTSCHE wird entsprechend als formelle, distanzsprachliche Varietät 438 | Philip C. Vergeiner, Elisabeth Buchner, Eva Fuchs, Stephan Elspaß 438 konzeptualisiert. Auffällig ist an beiden Institutionen, dass STAN- DARDSPRACHLICHKEIT dabei stark mit Schriftlichkeit assoziiert wird. 5 Diskussion und Fazit Insbeson- dere an den Universitäten lassen viele GP ein starres, monozentrisches, auf die Existenz einer homogenen Entität gerichtetes Verständnis von STANDARD erkennen, einige andere eher ein an einen GEBRAUCHSSTANDARD erinnerndes Konzept, das etwa auch österreichische Eigenheiten zulässt. Die Vorstel- lung eines eigenen ÖSTERREICHISCHEN HOCHDEUTSCH klingt nur in einigen In- terviews mit Schüler/inne/n an – allerdings meist mit dem Hinweis einer gewissen Höherwertigkeit des DEUTSCHEN HOCHDEUTSCH. Wenn es in den Köp- fen dieser GP also tatsächlich so etwas wie ein Konzept der Plurizentrizität gibt, dann ist es klar von einer Asymmetrie zugunsten des BUNDESDEUTSCHEN STANDARDS geprägt – so, wie es etwa für das Verhältnis zwischen DEUTSCH- SCHWEIZERISCHEM und BUNDESDEUTSCHEM STANDARD beschrieben wird (vgl. Scharloth 2005). 2. Die Bewertungen der Varietätenverwendungen lassen sich zum Teil explizi- ten Urteilen entnehmen, zum Teil müssen sie aus Äußerungen, die ihnen bestimmte Attribute zuschreiben, erschlossen werden. Explizit sind etwa den DIALEKT stigmatisierende Bewertungen, die an Vorstellungen von einem RESTRINGIERTEN CODE erinnern. Gemeinsam ist Schule und Universität dabei etwa, dass der NONSTANDARD vielfach als falsche, inkorrekte Sprechweise at- tribuiert wird. Zu den indirekten Bewertungen gehören die an beiden Insti- tutionstypen anzutreffenden Äußerungen, wonach dem STANDARD im Ver- gleich zu NONSTANDARD-Varietäten ein hoher Grad an Verständlichkeit attestiert wird – an der Universität nicht nur mit Blick auf Nichtmutter- sprachler/innen des Deutschen, sondern durchaus auch auf bundesdeut- sche Studierende und Lehrende (vgl. ausführlicher dazu Vergeiner 2020). Aus der These der besseren Verständlichkeit des STANDARDs lässt sich die Auffassung ableiten, dass sich für bestimmte universitäre Verwendungssi- tuationen, z. B. Lehrveranstaltungen, per se nur STANDARD-Varietäten eigne- ten (siehe Punkt 3). 2. Die Bewertungen der Varietätenverwendungen lassen sich zum Teil explizi- ten Urteilen entnehmen, zum Teil müssen sie aus Äußerungen, die ihnen bestimmte Attribute zuschreiben, erschlossen werden. Explizit sind etwa den DIALEKT stigmatisierende Bewertungen, die an Vorstellungen von einem RESTRINGIERTEN CODE erinnern. Gemeinsam ist Schule und Universität dabei etwa, dass der NONSTANDARD vielfach als falsche, inkorrekte Sprechweise at- tribuiert wird. Zu den indirekten Bewertungen gehören die an beiden Insti- tutionstypen anzutreffenden Äußerungen, wonach dem STANDARD im Ver- gleich zu NONSTANDARD-Varietäten ein hoher Grad an Verständlichkeit attestiert wird – an der Universität nicht nur mit Blick auf Nichtmutter- sprachler/innen des Deutschen, sondern durchaus auch auf bundesdeut- sche Studierende und Lehrende (vgl. ausführlicher dazu Vergeiner 2020). Aus der These der besseren Verständlichkeit des STANDARDs lässt sich die Auffassung ableiten, dass sich für bestimmte universitäre Verwendungssi- tuationen, z. B. 5 Diskussion und Fazit Wichtig sei mit Blick auf münd- liche Abschlussprüfungen und das spätere Berufsleben eine Sensibilisierung für situationsangemessene Varietätenverwendung, die eben den Gebrauch der STANDARD- wie der NONSTANDARD-Varietäten im Un- terricht umfasse. ) 4. Aus verschiedenen Attribuierungen und Bewertungen ergeben sich schließ- lich auch Erwartungen an Varietätenverwendungen. Wenn etwa auf der ei- nen Seite Universitätslehrer/innen den Gebrauch des STANDARDS mit Kom- petenz und Professionalität oder Studierende mit wissenschaftlicher Seriosität assoziieren, so ergibt sich daraus fast zwangsläufig, dass solche Akteure und Akteurinnen für universitäre Lehrveranstaltungen und Prü- fungsgespräche die Verwendung der STANDARDSPRACHE einfordern – wie auch immer sich diese am Ende wirklich anhört. Wird auf der anderen Seite – von Universitätsangehörigen wie auch von Lehrenden und Schü- ler/inne/n an den Schulen gleichermaßen – hervorgehoben, dass regionale NONSTANDARD-Varietäten wichtige identitätsstiftende Funktionen hätten und die Sprecher/innen ,authentischer‘ wirken ließen, so wird damit ihre Verwendung in Unterrichtssituationen legitimiert. Eine ganz eigene Recht- fertigung des NONSTANDARD-Gebrauchs im Unterricht findet sich in Äuße- rungen von Lehrer/inne/n vor allem ländlicher Schulen: Da DIALEKTE so stark in der Alltagskommunikation vieler Schüler/innen verankert und auch durchaus positiv konnotiert seien, sei die Verwendung von NONSTAN- DARD-Varietäten im Unterricht nicht nur üblich, sondern in einem bestimm- ten Rahmen auch angemessen und legitim. Wichtig sei mit Blick auf münd- liche Abschlussprüfungen und das spätere Berufsleben eine Sensibilisierung für situationsangemessene Varietätenverwendung, die eben den Gebrauch der STANDARD- wie der NONSTANDARD-Varietäten im Un- terricht umfasse. 4. Aus verschiedenen Attribuierungen und Bewertungen ergeben sich schließ- lich auch Erwartungen an Varietätenverwendungen. Wenn etwa auf der ei- nen Seite Universitätslehrer/innen den Gebrauch des STANDARDS mit Kom- petenz und Professionalität oder Studierende mit wissenschaftlicher Seriosität assoziieren, so ergibt sich daraus fast zwangsläufig, dass solche Akteure und Akteurinnen für universitäre Lehrveranstaltungen und Prü- fungsgespräche die Verwendung der STANDARDSPRACHE einfordern – wie auch immer sich diese am Ende wirklich anhört. Wird auf der anderen Seite 4. In inhaltlicher Perspektive fördern die Ergebnisse unserer Untersuchungen sowohl heterogene als auch sehr reflektierte Varietätenkonzeptionen von Ak- teur/inn/en im sekundären und im tertiären Bildungsbereich in Österreich zu- tage. Dabei dürften sie, wie überhaupt die Salzburger Sprachverhältnisse – aufgrund ähnlich diaglossischer Situationen –, mit denen in anderen Regionen in Österreich sowie im Süden Deutschlands vergleichbar sein. Wie gezeigt, be- steht auch eine gewisse Vergleichbarkeit der Varietätenkonzeptionen mit denen in der Schweiz, trotz der grundlegend anderen, Situation dort. 5 Diskussion und Fazit Lehrveranstaltungen, per se nur STANDARD-Varietäten eigne- ten (siehe Punkt 3). 2. 3. Was den schulischen Bereich betrifft, zeigen sich bei den indirekten Bewer- tungen von Varietätenverwendungen klare Unterschiede zwischen Schü- ler/inne/n, die städtische und solchen, die ländliche Schulen besuchen. Während Schüler/innen an Schulen im städtischen Umfeld den STANDARD als „Sprache des täglichen Umgangs“ charakterisieren, kommt dieses Attri- but am Land den DIALEKTEN zu. Schüler/innen im ländlichen Umfeld etiket- tieren das HOCHDEUTSCHE vielfach als so etwas wie ihre erste Fremdsprache, als Sprache der Gebildeten bzw. der Bildung oder als Sprache der Schrift – auf jeden Fall als eine exogene Varietät. Auch hier bestehen durchaus Pa- 3. Was den schulischen Bereich betrifft, zeigen sich bei den indirekten Bewer- tungen von Varietätenverwendungen klare Unterschiede zwischen Schü- ler/inne/n, die städtische und solchen, die ländliche Schulen besuchen. Während Schüler/innen an Schulen im städtischen Umfeld den STANDARD als „Sprache des täglichen Umgangs“ charakterisieren, kommt dieses Attri- but am Land den DIALEKTEN zu. Schüler/innen im ländlichen Umfeld etiket- tieren das HOCHDEUTSCHE vielfach als so etwas wie ihre erste Fremdsprache, als Sprache der Gebildeten bzw. der Bildung oder als Sprache der Schrift – auf jeden Fall als eine exogene Varietät. Auch hier bestehen durchaus Pa- 3. Weil Standard verständlich ist und Dialekt authentisch macht | 439 rallelen zu Sprachkonzeptionen von Deutschschweizer/inne/n (vgl. Chris- ten & Schmidlin 2019). ten & Schmidlin 2019). 4. Aus verschiedenen Attribuierungen und Bewertungen ergeben sich schließ- lich auch Erwartungen an Varietätenverwendungen. Wenn etwa auf der ei- nen Seite Universitätslehrer/innen den Gebrauch des STANDARDS mit Kom- petenz und Professionalität oder Studierende mit wissenschaftlicher Seriosität assoziieren, so ergibt sich daraus fast zwangsläufig, dass solche Akteure und Akteurinnen für universitäre Lehrveranstaltungen und Prü- fungsgespräche die Verwendung der STANDARDSPRACHE einfordern – wie auch immer sich diese am Ende wirklich anhört. Wird auf der anderen Seite – von Universitätsangehörigen wie auch von Lehrenden und Schü- ler/inne/n an den Schulen gleichermaßen – hervorgehoben, dass regionale NONSTANDARD-Varietäten wichtige identitätsstiftende Funktionen hätten und die Sprecher/innen ,authentischer‘ wirken ließen, so wird damit ihre Verwendung in Unterrichtssituationen legitimiert. Eine ganz eigene Recht- fertigung des NONSTANDARD-Gebrauchs im Unterricht findet sich in Äuße- rungen von Lehrer/inne/n vor allem ländlicher Schulen: Da DIALEKTE so stark in der Alltagskommunikation vieler Schüler/innen verankert und auch durchaus positiv konnotiert seien, sei die Verwendung von NONSTAN- DARD-Varietäten im Unterricht nicht nur üblich, sondern in einem bestimm- ten Rahmen auch angemessen und legitim. 5 Diskussion und Fazit Für die Verhält- nisse an mittel- und norddeutschen Schulen und Universitäten, die weitgehend vom monovarietären Gebrauch von STANDARDNAHEN Varietäten – oder zumindest einem monovarietären Habitus – geprägt sind, mögen sich die drei genannten Untersuchungsfragen hingegen erst gar nicht stellen. 440 | Philip C. Vergeiner, Elisabeth Buchner, Eva Fuchs, Stephan Elspaß 440 In methodischer Hinsicht zeigt sich der Wert qualitativer Ansätze, die zum einen eine analytische Tiefe erreichen, welche bei rein quantitativen Zugängen nicht möglich wäre, und die zum anderen durchaus eine Generalisierbarkeit der Ergebnisse beanspruchen können, wenn sie sich – wie im vorliegenden Fall – auf eine große Zahl von GP stützen. Dadurch wird natürlich der Wert quantitati- ver Untersuchungen keineswegs in Abrede gestellt; vielmehr können sich der quantitative und der qualitative Ansatz gegenseitig sinnvoll ergänzen – wie in den beiden Projekten, in deren Rahmen der vorliegende Beitrag entstanden ist. Literaturverzeichnis In Christina Cuonz & Rebekka Stud- ler (Hrsg.), Sprechen über Sprache. Perspektiven und neue Methoden der Spracheinstel- lungsforschung, 31–64. Tübingen: Stauffenburg. Dannerer, Monika (2018): Sprachwahl, Sprachvariation und Sprachbewertung an der Universi- tät. In Arnulf Deppermann & Silke Reineke (Hrsg.), Sprache im kommunikativen, interakti- ven und kulturellen Kontext, 169–192. Berlin, Boston: De Gruyter. Dannerer, Monika (2018): Sprachwahl, Sprachvariation und Sprachbewertung an der Universi- tät. In Arnulf Deppermann & Silke Reineke (Hrsg.), Sprache im kommunikativen, interakti- ven und kulturellen Kontext, 169–192. Berlin, Boston: De Gruyter. Elspaß, Stephan & Konstantin Niehaus (2014): The standardization of a modern pluriareal language. Concepts and corpus designs for German and beyond. Orð og tunga 16, 47–67. Elspaß, Stephan & Stefan Kleiner (2019): Forschungsergebnisse zur arealen Variation im Stan- darddeutschen. In Joachim Herrgen & Jürgen Erich Schmidt (Hrsg.), Sprache und Raum – Ein internationales Handbuch der Sprachvariation. Band 4: Deutsch, 159–184. Berlin, Bos- ton: De Gruyter. Errington, Joseph (1999): Ideology. Journal of Linguistic Anthropology 9 (1), 115–117. Garrett, Peter, Nikolas Coupland & Angie Williams (2003): Investigating language attitudes: Social meanings of dialect, ethnicity and performance. Cardiff: University of Wales Press. Gloy, Klaus (1975): Sprachnormen I. Linguistische und soziologische Analysen. Stuttgart: Frommann-Holzboog. Gloy, Klaus (2004): Norm. In Ulrich Ammon, Norbert Dittmar, Klaus J. Mattheier & Peter Trudgill (Hrsg.), Sociolinguistics. An international handbook of the science of language and socie- ty. Volume 1. 2nd completely rev. and extended ed, 392–399. Berlin, New York: De Gruy- ter. Hochholzer, Rupert (2004): Konfliktfeld Dialekt. Das Verhältnis von Deutschlehrerinnen und Deutschlehrern zu Sprache und ihren regionalen Varietäten. Regensburg: Edition Vulpes. Hundt, Markus (2009): Normverletzungen und neue Normen. In Marek Konopka & Bruno Stre- cker (Hrsg.), Deutsche Grammatik – Regeln, Normen, Sprachgebrauch, 117–140. Berlin: De Gruyter. Hundt, Markus, Nicole Palliwoda & Saskia Schröder (2015): Der deutsche Sprachraum aus der Sicht linguistischer Laien – das Kieler DFG-Projekt. In Michael Elmentaler, Markus Hundt & Erich Jürgen Schmidt (Hrsg.), Deutsche Dialekte. Konzepte, Probleme, Handlungsfelder. Akten des 4. Kongresses der Internationalen Gesellschaft für Dialektologie des Deutschen (IGDD) in Kiel, 295–322. Stuttgart: Steiner. Irvine, Judith. T. & Susan Gal (2000): Language Ideology and Linguistic Differentiation. In Paul V. Kroskrity (Hrsg.), Regimes of language. Ideologies, polities, and identities. 1. Aufl., 35– 84. Santa Fe, NM: School of American Research Press. Knöbl, Ralf (2012): Dialekt – Standard – Variation. Formen und Funktionen von Sprachvariation in einer mittelschwäbischen Schulklasse. Heidelberg: Winter. Krefeld, Thomas & Elissa Pustka (2010): Für eine perzeptive Varietätenlinguistik. Literaturverzeichnis Ajzen, Icek (1989): Attitude structure and behavior. In Anthony R. Pratkanis, Steven J. Breckler & Anthony G. Greenwald (Hrsg.), Attitude structure and function, 241–274. Hillsdale: Law- rence Erlbaum. Allport, Gordon W. (1935): Attitudes. In Carl Murchison (Hrsg.), A handbook of social psycholo- gy. Worcester: Clark University Press. Ammon, Ulrich (1972): Dialekt, soziale Ungleichheit und Schule. Weinheim: Beltz. Anders, Christina Ada (2010): Wahrnehmungsdialektologie. Das Obersächsische im Alltagsver- ständnis von Laien. Berlin: De Gruyter. Bartsch, Renate (1987): Sprachnormen. Theorie und Praxis. Tübingen: Niemeyer. Bellamy, John (2012): Language Attitudes in England and Austria. A Sociolinguistic Investiga- tion into Perceptions of High and Low-Prestige Varieties in Manchester and Vienna. Stutt- gart: Steiner. Berger, Peter L. & Thomas Luckmann (2016): Die gesellschaftliche Konstruktion der Wirklich- keit. Eine Theorie der Wissenssoziologie. 26. Aufl. Frankfurt a. M.: Fischer. Beuge, Patrick (2019): Was ist gutes Deutsch? Eine qualitative Analyse laienlinguistischen Sprachnormwissens. Berlin, Boston: De Gruyter. Cavanaugh, Jillian R. (2013): Language ideologies and language attitudes. A linguistic anthro- pological perspective. In Peter Auer, Javier Caro Caro Reina & Göz Kaufmann (Hrsg.), Lan- guage variation – European perspectives IV. Selected papers from the Sixth International Conference on Language Variation in Europe (ICLaVE 6), Freiburg, June 2011, 45–55. Ams- terdam: Benjamins. Christen, Helen & Regula Schmidlin (2019): Die Schweiz. Dialektvielfalt in mehrsprachigem Umfeld. In Rahel Beyer & Albrecht Plewnia (Hrsg.), Handbuch des Deutschen in West- und Mitteleuropa: Sprachminderheiten und Mehrsprachigkeitskonstellationen, 193–244. Tü- bingen: Narr Francke Attempto. Cillia, Rudolf de (2018): Sprache(n) im Klassenzimmer. Varietätengebrauch und Spracheinstel- lungen in der Schule aus Sicht der Lehrer/innen und der Schüler/innen. In Monika Danne- rer & Peter Mauser (Hrsg.), Formen der Mehrsprachigkeit in sekundären und tertiären Bil- dungskontexten. Verwendung, Rolle und Wahrnehmung von Sprachen und Varietäten. Unter Mitarbeit von Philip C. Vergeiner, 67–85. Tübingen: Stauffenburg. Coupland, Nikolas & Adam Jaworski (2004): Sociolinguistic perspectives on metalanguage: Reflexivity, evaluation and ideology. In Adam Jaworski, Dariusz Galasiński & Nikolas Cou- Weil Standard verständlich ist und Dialekt authentisch macht | 441 pland (Hrsg.), Metalanguage. Social and ideological perspectives, 15–51. Berlin, New York: De Gruyter. pland (Hrsg.), Metalanguage. Social and ideological perspectives, 15–51. Berlin, New York: De Gruyter. Cuonz, Christina (2014): Was kann die diskursive Spracheinstellungs forschung (nicht)? Me- thodologische und epistemologische Überlegungen. In Christina Cuonz & Rebekka Stud- ler (Hrsg.), Sprechen über Sprache. Perspektiven und neue Methoden der Spracheinstel- lungsforschung, 31–64. Tübingen: Stauffenburg. Cuonz, Christina (2014): Was kann die diskursive Spracheinstellungs forschung (nicht)? Me- thodologische und epistemologische Überlegungen. Literaturverzeichnis In Thomas Krefeld & Elissa Pustka (Hrsg.), Perzeptive Varietätenlinguistik, 9–28. Frankfurt a. M.: Lang. Kroskrity, Paul V. (2009): Language Ideologies. In Alessandro Duranti (Hrsg.), A Companion to Linguistic Anthropology. 4. Aufl., 496–517. Malden: Blackwell. Lambert, Wallace E., Richard Hodgson, Robert C. Gardner & Samuel Fillenbaum (1960): Evalua- tional reactions to spoken languages. Journal of Abnormal and Social Psychology 60 (1), 44–51. 442 | Philip C. Vergeiner, Elisabeth Buchner, Eva Fuchs, Stephan Elspaß 442 Liebscher, Grit & Jennifer Dailey-O’Cain (2009): Language attitudes in interaction. Journal of Sociolinguistics 13 (2), 195–222. Lasagabaster, David (2004): Attitude / Einstellung. In Ulrich Ammon, Norbert Dittmar, Klaus J. Mattheier & Peter Trudgill (Hrsg.), Sociolinguistics. An international handbook of the sci- ence of language and society. Volume 1. 2nd completely rev. and extended ed., 399–405. Berlin, New York: De Gruyter. Mattheier, Klaus J. (1991): Standardsprache als Sozialsymbol. Über kommunikative Folgen gesellschaftlichen Wandels. In Rainer Wimmer (Hrsg.), Das 19. Jahrhundert. Sprachge- schichtliche Wurzeln des heutigen Deutsch, 41–72. Berlin, New York: De Gruyter. Moosmüller, Sylvia (1991): Hochsprache und Dialekt in Österreich. Soziophonologische Unte suchungen zu ihrer Abgrenzung in Wien, Graz, Salzburg und Innsbruck. Wien: Böhlau. Preston, Dennis R. (2009): Language, space and the folk. In Peter Auer & Jürgen Erich Schmidt (Hrsg.), Language and Space. An International Handbook of Linguistic Variation. Volume 1: Theories and Methods, 179–201. Berlin: De Gruyter. Purschke, Christoph & Philipp Stoeckle (2019): Perzeptionslinguistik arealer Sprachvariation im Deutschen. In Joachim Herrgen & Jürgen Schmidt (Hrsg.), Sprache und Raum – Deutsch. Ein internationales Handbuch der Sprachvariation, 844–860. Berlin: De Gruyter. Scharloth, Joachim (2005): Asymmetrische Plurizentrizität und Sprachbewusstsein. Einstellun- gen der Deutschschweizer zum Standarddeutschen. Zeitschrift für Germanistische Lingu- istik 33 (2), 236–267. Schoel, Christiane & Dagmar Stahlberg (2012): Spracheinstellungen aus sozialpsychologischer Perspektive II: Dialekte. In Ludwig M. Eichinger, Albrecht Plewnia, Christiane Schoel & Dagmar Stahlberg (Hrsg.), Sprache und Einstellungen. Spracheinstellungen aus sprach- wissenschaftlicher und sozialpsychologischer Perspektive. Mit einer Sprachstandserhe- bung zum Deutschen von Gerhard Stickel. 1. Aufl, 205–225. Tübingen: Narr Francke At- tempto. Silverstein, Michael (1992): The uses and utility of ideology: Some reflections. Special Issue of Pragmatics 2 (3), 311–323. Soukup, Barbara (2009): Dialect use as interaction strategy. A sociolinguistic study of contex- tualization, speech perception, and language attitudes in Austria. Wien: Braumüller. Steiner, Astrid (2008): Unterrichtskommunikation. Eine linguistische Untersuchung der Ge- sprächsorganisation und des Dialektgebrauchs in Gymnasien der Deutschschweiz. Tübin- gen: Narr. Vergeiner, Philip C. (2019): Kookkurrenz – Kovariation – Kontrast. Literaturverzeichnis Formen und Funktionen individueller Dialekt-/Standardvariation in Beratungsgesprächen. Wien: Peter Lang. Vergeiner, Philip C. (2020): Sprachnormbezogene Akkommodation in der Hochschullehre. Zeitschrift für Angewandte Linguistik 72, 33–62. DOI: https://doi.org/10.1515/zfal-2020- 2027 (letzter Zugriff 02.03.2020). Vergeiner, Philip C. (2021): Bewertungen – Erwartungen – Gebrauch: Sprachgebrauchsnormen zur inneren Mehrsprachigkeit an der Universität. Stuttgart: Steiner. Vergeiner, Philip C., Elisabeth Buchner, Eva Fuchs & Stephan Elspaß (2019): Sprachnormvor- stellungen in sekundären und tertiären Bildungseinrichtungen in Österreich. Zeitschrift für Dialektologie und Linguistik 86 (3), 284–330. f g g Woolard, Kathrvn A. (1992): Language Ideology: Issues and Approaches. Pragmatics 2 (3), 235– 249. Woolard, Kathrvn A. & Bambi B. Schieffelin (1994): Language Ideology. Annual Review of An- thropology 23, 55–82.
https://openalex.org/W4390443638
https://link.springer.com/content/pdf/10.1007/s00590-023-03806-5.pdf
English
null
Effectiveness of permissive weight bearing in surgically treated trauma patients with peri- and intra-articular fractures of the lower extremities: a prospective comparative multicenter cohort study
European journal of orthopaedic surgery & traumatology
2,023
cc-by
6,625
Abstract Purpose  The aim of the present study was to investigate the effectiveness of a novel approach involving permissive weight bearing (PWB) in surgically treated trauma patients with peri- and intra-articular fractures of the lower extremities.i Purpose  The aim of the present study was to investigate the effectiveness of a novel approach involving permissive weight bearing (PWB) in surgically treated trauma patients with peri- and intra-articular fractures of the lower extremities. Methods  Prospective comparative multicenter cohort study in one level 1 trauma center and five level 2 trauma centers. Surgically treated trauma patients with peri- and intra-articular fractures of the lower extremities were included. Permissive weight bearing (PWB) in comparison to restricted weight bearing (RWB) was assessed over a 26-week post-surgery follow- up period. Patients’ self-perceived outcome levels regarding activities of daily living (ADL), quality of life (QoL), pain and weight bearing compliance were used.i Results  This study included 106 trauma patients (N = 53 in both the PWB and RWB groups). Significantly better ADL and QoL were found in the PWB group compared to the RWB group at 2-, 6-, 12- and 26-weeks post-surgery. There were no significant differences in postoperative complication rates between the PWB and RWB groups.fii if Conclusion  PWB is effective and is associated with a significantly reduced time to full weight bearing, and a significantly better outcome regarding ADL and QoL compared to patients who followed RWB regimen. Moreover, no significant differ- ences in complication rates were found between the PWB and RWB groups. Level of evidence  Level II. Registration  This study is registered in the Dutch Trial Register (NTR6077). Date of registration: 01-09-2016. Keywords  Permissive weight bearing · Restricted weight bearing · Trauma patients · Fractures · Lower extremity · Rehabilitation Keywords  Permissive weight bearing · Restricted weight bearing · Trauma patients · Fractures · Lower extremity · Rehabilitation Effectiveness of permissive weight bearing in surgically treated trauma patients with peri‑ and intra‑articular fractures of the lower extremities: a prospective comparative multicenter cohort study Pishtiwan Kalmet1   · Cherelle Maduro1   · Coen Verstappen1   · Guido Meys2   · Yvette van Horn2   · Raoul van Vugt3   · Heinrich Janzing4   · Alexander van der Veen5   · Coen Jaspars6 · Jan Bernard Sintenie7   · Taco Blokhuis1   · Silvia Evers8,9   · Henk Seelen2,8   · Peter Brink1   · Martijn Poeze1,10 Pishtiwan Kalmet1   · Cherelle Maduro1   · Coen Verstappen1   · Guido Meys2   · Yvette van Horn2   · Raoul van Vugt3   · Heinrich Janzing4   · Alexander van der Veen5   · Coen Jaspars6 · Jan Bernard Sintenie7   · Taco Blokhuis1   · Silvia Evers8,9   · Henk Seelen2,8   · Peter Brink1   · Martijn Poeze1,10 Received: 31 August 2023 / Accepted: 2 December 2023 / Published online: 30 December 2023 © The Author(s) 2023 European Journal of Orthopaedic Surgery & Traumatology (2024) 34:1363–1371 https://doi.org/10.1007/s00590-023-03806-5 European Journal of Orthopaedic Surgery & Traumatology (2024) 34:1363–1371 https://doi.org/10.1007/s00590-023-03806-5 European Journal of Orthopaedic Surgery & Traumatology (2024) 34:1363–1371 https://doi.org/10.1007/s00590-023-03806-5 European Journal of Orthopaedic Surgery & Traumatology (2024) 34:1363–1371 https://doi.org/10.1007/s00590-023-03806-5 ORIGINAL ARTICLE ORIGINAL ARTICLE Extended author information available on the last page of the article Introduction The current recommendations regarding postoperative management in surgically treated trauma patients with peri- and intra-articular fractures of the lower extremities is either non-weight bearing or restricted weight bearing for 6–12 weeks, followed by partial weight bearing with a 25% increase in weight every week [1, 3]. The recommendations for aftercare in surgically treated trauma patients with peri- and intra-articular fractures of the lower extremities are still more or less the same as they were during the last 60 years, without any source of evidence being given for the advice of restricted weight bearing [1]. In view of this lack of evidence, many orthopedic and trauma surgeons tend to advise conservatively regarding postopera- tive management and hold on to the prevailing dogmas, i.e., non-weight bearing or restricted weight bearing [2]. There is no consensus from the surgeons in the current postoperative management [4]. Moreover, almost 90% of the surgeons deviate from the current postoperative management protocols because of e.g., type of fracture, (un-) certainty of fixation, clinical experience, or gut feeling [4]. Furthermore, while instructions on rehabilitation provided to patients may be clear, patients’ compliance with a non-weight bearing or restricted weight bearing regimen is poor, so neither (0121 3456789) 3 3456789) 3 European Journal of Orthopaedic Surgery & Traumatology (2024) 34:1363–1371 1364 surgeons nor patients follow the instructions regarding the postoperative management regimen [5, 6]. hospitals underwent the PWB protocol as aftercare reha- bilitation treatment, while the others followed the RWB protocol [1, 2]. The postoperative management of surgically treated peri- and intra-articular fractures of the lower extremities is very important in view of the impact on the patient’s functional outcome. Recent literature has reported composite postop- erative complication rates of up to 37%, with an average of 10–20% for patients with lower extremity fractures [7–11]. In addition, several studies indicate that the postopera- tive management, i.e., early or permissive weight bearing, increases the postoperative complications rates [3, 4]. Surgically treated trauma patients with peri- and intra- articular fractures of the lower extremities (i.e., pelvic fractures, acetabular fractures, distal femur fractures, tibial plateau fractures, pilon fractures, calcaneal fractures and talar fractures) were eligible for inclusion if they were aged 18 years or over. Patients with pathological fractures, shaft fractures treated with intra-medullary nailing, hip fractures treated with prosthesis, or fractures treated with external fixation, and patients with amputations in the area of the lower extremity, were excluded. Introduction Patients with inability to follow instructions (e.g., cognitive dysfunction), due to the consequences of severe neurotrauma or due to concomitant or mental illness were also excluded [16]. p p p Several biomechanical, animal, and clinical studies have found early or permissive weight bearing to be beneficial [2, 3, 12–15]. However, very few clinical studies are avail- able that compared permissive weight bearing (PWB) with restricted weight bearing (RWB) in surgically treated trauma patients with peri- and intra-articular fractures of the lower extremities. Furthermore, despite the generally accepted value of the use of patient-specific outcome measures, no data is available offering insights into patients’ self-per- ceived outcome levels (e.g., regarding activities of daily living (ADL), quality of life or pain) in PWB versus RWB. The aim of the present study was therefore to investi- gate the effectiveness of PWB in surgically treated trauma patients with peri- and intra-articular fractures of the lower extremities, reporting on patients’ self-perceived outcome levels regarding ADL, quality of life, pain, weight bearing or patients’ compliance and postoperative complications, in comparison to RWB, over a 26-week post-surgery follow- up period. Several biomechanical, animal, and clinical studies have found early or permissive weight bearing to be beneficial [2, 3, 12–15]. However, very few clinical studies are avail- able that compared permissive weight bearing (PWB) with restricted weight bearing (RWB) in surgically treated trauma patients with peri- and intra-articular fractures of the lower extremities. Furthermore, despite the generally accepted value of the use of patient-specific outcome measures, no data is available offering insights into patients’ self-per- ceived outcome levels (e.g., regarding activities of daily living (ADL), quality of life or pain) in PWB versus RWB. Study design and participants This prospective comparative multicenter cohort study included surgically treated trauma patients with peri- and intra-articular fractures of the lower extremities. Subjects were consecutively recruited from six hospitals in the Neth- erlands between October 2017 and September 2018. The allocation of the patients to the intervention or control group depended on the regimen adhered to by the hospital in which the patients were surgically treated. During the conceptu- alization of this study design, randomization was not con- sidered feasible because of the nature of the two different interventions. Namely, implementation of these different protocols includes patient instructions as well as physical therapy guidance and nursing staff participation. A mix of treatment protocols on a single ward was therefore consid- ered suboptimal. However, this meant we had to consider that not randomizing the study could introduce observer bias, which may be a study limitation. Patients from two In the RWB group, the patients underwent a non-weight bearing regimen for 6–12 weeks followed by partial weight bearing with a 25% increase in weight loading every week according to the existing (AO) guidelines [1]. Protocols The PWB treatment involves a gradual progression in func- tional activities guided by patients’ subjective experience (pain and confidence to bear weight) and by objective clini- cal symptoms of the patients occurring during the process of rehabilitation, evaluated by the physical therapist during every outpatient physiotherapy session. Clinical symptoms include the evolution of signs of inflammation, neuro- vascular status, weight-bearing tolerance, changes in the alignment of the affected side of the body, and the quality and function of the soft tissue and the joints involved. The progress in therapy is not determined by any predetermined or fixed degree of loading of the affected side in kg or in percentage of bodyweight, as this has proved to be difficult to adhere to. This process enables patients to carry out the activities with normal/optimal motor skills as soon as pos- sible. The approach is guided by the quality of performance and the safety of the activity (e.g., preventing stumbling). The next stage of the treatment is started when the gait pat- tern associated with the current stage of the treatment is optimally executed and can be performed by the patient safely and independently [2]. The aim of the present study was therefore to investi- gate the effectiveness of PWB in surgically treated trauma patients with peri- and intra-articular fractures of the lower extremities, reporting on patients’ self-perceived outcome levels regarding ADL, quality of life, pain, weight bearing or patients’ compliance and postoperative complications, in comparison to RWB, over a 26-week post-surgery follow- up period. Outcome measures and co‑variables The patients’ self-perceived outcome levels, questionnaires related to the activities of daily living (ADL) were assessed as primary outcome measure. ADL was measured with the Lower Extremity Functional Scale (LEFS). The LEFS con- sists of 20 questions about a person’s ability to perform daily tasks. The score for each question ranges from 0 (extreme 1 3 3 European Journal of Orthopaedic Surgery & Traumatology (2024) 34:1363–1371 1365 t-tests were used for normally distributed continuous data, and chi-squared tests for categorical variables. In the case of non-parametric data, the median with the interquartile range was calculated. Furthermore, a linear mixed model was used to identify any differences among the outcome measures over time. This analysis ensured that both random and cluster effects, such as treatment in different hospitals, and fixed effects, such as ASA classification, could be con- sidered and corrected for. Results are presented as either mean (standard deviation) or frequencies and percentages. The level of statistical significance was set at α = 0.05. The data was analyzed blinded by the researchers. difficulty in performing the activity) to 4 (good performance of activity), maximizing the score at 80 points. The lower the score, the greater the disability [17]. The other patients’ self-perceived outcome levels were assessed as secondary outcome measures, using question- naires related to the quality of life and pain score. The qual- ity of life was measured with the Short Form-12 (SF-12) questionnaire. The SF-12 consists of 12 items that assess 8 dimensions of health: physical functioning, role-physical, bodily pain, general health, vitality, social functioning, role- emotional and mental health. The SF-12 measures various aspects of physical and mental health from which a physical composite score (PCS) and a mental composite score (MCS) can be calculated, ranging from 0 to 100 [18]. The intensity of pain was measured with the Numeric Rating Scale (NRS; 0 indicating no pain and 10 worst pain) [19]. All patients’ self-perceived outcome levels were obtained at the follow- up time-points of 2-, 6-, 12- and 26-weeks post-surgery. The other secondary outcome measures were the rehabilitation outcome (i.e., outpatient physiotherapy, time to full weight bearing, completion of rehabilitation within 26 weeks), com- plications during a 26-week post-surgery follow-up and the progression of weight bearing during the first 12 weeks of rehabilitation. Primary outcome measures All patients’ compliance were monitored for 3 months after surgery with the OpenGo insole (Moticon GmbH, Munich, Germany) [20]. The insole incorporates 13 capaci- tive pressure sensors and a 3D accelerometer, measuring peak pressures (in Newton) and mean weight bearing (in Newton). It operates completely wireless. Data is stored on a flash drive. The insole can be placed in any shoe and shoes can be changed at random during the study due to an auto- mated zeroing system [20]. After a 26 wees post-surgery follow-up, the overall response rate for the patient-specific outcome measures at all meas- urement points was 99.8% (N = 1 patient refused to fill out the patient self-perceived outcome questionnaires at week 26). ADL as measured with the LEFS, and quality of life as measured with the SF-12, were both significantly better in the PWB group compared to the RWB group (p < 0.01) (Appendix I). There were no differences in pain score between the PWB and RWB groups (Appendix I). The patient self-perceived outcome levels regarding ADL and quality of life in the PWB and RWB groups are summarized in Figs. 2 and 3. Baseline characteristics, recorded at admission, included age at time of fracture, sex, ASA (American Society of Anesthesiologists) classification (type 1–6) [21], Charlson comorbidity score (classifying prognostic comorbidity, a higher score correlating with additional comorbidities) [22], type of fracture and in-hospital length of stay (in days). Outcome measures and co‑variables Postoperative complications, i.e., superficial wound infections, deep wound infections, non-unions and secondary dislocations, or other additional adverse situations that required medical intervention, were recorded as either present or non-present, along with the type of complica- tion. Removal of implants was only performed in case of functional complaints. Baseline characteristics A total of 106 patients were included in this cohort study, N = 53 in both the PWB and RWB groups (Fig. 1). As the assumption for normality was violated, non-parametric tests were used, and established that the PWB group patients had comparable ASA score (p = 0.14) and fewer comorbidities, as measured with the Charlson score, (p = 0.03) compared to those in the RWB group. No significant differences in sex, age, type of fracture, number of surgical interventions during primary admission or in-hospital length of stay were found between the groups. Characteristics of patients in the PWB and RWB groups are summarized in Table 1. Statistical analysis Of the total patient population, 77.4% (N = 82) achieved full weight bearing within 12 weeks. The number of patients who achieved this was significantly higher in the PWB group than in the RWB group: 98.1% versus 56.6% (p < 0.01). The median time from surgery to ascertain- ment of full weight bearing was significantly shorter in Statistical analysis was performed with IBM SPSS Statis- tics (Version 25.0, Armonk, NY). Descriptive statistics were used to describe the demographic data and baseline charac- teristics for the entire study population. Independent samples 1 3 European Journal of Orthopaedic Surgery & Traumatology (2024) 34:1363–1371 1366 European Journal of Orthopaedic Surgery & Traumatology (2024) 34:1363–1371 1 3 the PWB group than in the RWB group: 4.0 (2.1) weeks versus 12.2 (4.2) weeks (p < 0.01). The incidence of postoperative complications in the total study popula- tion was 16.0%, with no statistical significant differences Fig. 1   CONSORT Flowchart of study patients Table 1   Baseline characteristics and in-hospital outcome of the PWB and RWB groups Abbreviations: PWB permissive weight bearing, RWB restricted weight bearing, N number of subjects, ASA American Society of Anesthesiologists, IQR interquartile range PWB (N = 53) RWB (N = 53) Total (N = 106) p Female, N 27 (50.9%) 27 (50.9%) 54 (50.9%) 1.00 Median age (IQR), years 55.0 (38.5–65.0) 60.0 (47.0–67.0) 58.0 (43.5–66.3) 0.27 ASA, N I, II  > II 49 (92.5%) 4 (7.5%) 44 (83.0%) 9 (17%) 93 (87.7%) 13 (12.3%) 0.14 Median Charlson score (IQR) 1 (0–3) 2 (1–3) 2 (0–3) 0.03 Fracture type, N:   Pelvic   Acetabular   Tibial plateau   Pilon   Calcaneal 7 (13.2%) 5 (9.4%) 16 (30.2%) 17 (32.1%) 8 (15.1%) 1 (1.9%) 3 (5.7%) 28 (52.8%) 12 (22.6%) 9 (17.0%) 8 (7.5%) 8 (7.5%) 44 (41.5%) 29 (27.4%) 17 (16%) 0.18 In-hospital outcome: Two or more procedures (%) Median length of stay (IQR), in days 9 (17.0) 7.0 (2.0–15.5) 8 (15.1) 5.0 (2.0–11.5) 17 (16.0) 6.0 (2.0–14.0) 0.57 0.24 1366 Fig. Discussion The aim of this study was to investigate the effectiveness of a novel approach involving permissive weight bearing (PWB) in surgically treated trauma patients with peri- and intra-articular fractures of the lower extremities. The PWB regimen led to the patients being able to bear full weight on their affected leg much sooner, with a better ADL and quality of life, compared to those who followed the usual RWB regimen. No significant differences between the two treatment regimens were found in either postoperative complication rates or pain levels.i Patients’ self-perceived outcome levels were signifi- cantly better among patients who followed the PWB pro- tocol than among those who followed the RWB protocol. This study found a general improvement in ADL (LEFS) and quality of life (SF-12) for both groups during the 26-week rehabilitation period. In our total population, the mean LEFS 26 weeks post-surgery was 55.2 (14.3). This is in line with earlier studies, which found similar lev- els of ADL in trauma patients after surgery of the lower extremities [23–25]. The mean quality of life for the total population in our study was also in the same range as that reported by other studies [26, 27]. Fig. 2   Patient self-perceived activities of daily living during a 26-week post-surgery follow-up. ADL Activities of Daily Living, LEFS Lower Extremity Functional Scale, PWB permissive weight bearing, RWB restricted weight bearing Fig. 3   Patient self-perceived quality of life during a 26-week post- surgery follow-up. PWB permissive weight bearing, RWB restricted weight bearing Despite the early PWB regimen, the recorded pain lev- els during the 26-week rehabilitation period were higher in the RWB group than in the PWB group, which could be due to the consequences of immobilization [2]. In our study 56.6% of the patients in the RWB group were already bearing full weight within 12 weeks, in contrast to the standard protocol of 12 weeks non-weight-bearing or partial weight bearing [1]. Earlier studies also reported that one-third of patients (due to e.g., cognitive impairment in older patients to follow instructions) did not comply with a non-weight-bearing or restricted weight bearing regime [5, 6]. Despite the willingness to comply, patients often do not follow the weight-bearing restrictions and increase their weight bearing as fracture healing progresses [6]. This is also in line with our data on weight bearing, as measured with the Moticon insoles. Statistical analysis 1   CONSORT Flowchart of study patients Abbreviations: PWB permissive weight bearing, RWB restricted weight bearing, N number of subjects, ASA American Society of Anesthesiologists, IQR interquartile range PWB (N = 53) RWB (N = 53) Total (N = 106) p Female, N 27 (50.9%) 27 (50.9%) 54 (50.9%) 1.00 Median age (IQR), years 55.0 (38.5–65.0) 60.0 (47.0–67.0) 58.0 (43.5–66.3) 0.27 ASA, N I, II  > II 49 (92.5%) 4 (7.5%) 44 (83.0%) 9 (17%) 93 (87.7%) 13 (12.3%) 0.14 Median Charlson score (IQR) 1 (0–3) 2 (1–3) 2 (0–3) 0.03 Fracture type, N:   Pelvic   Acetabular   Tibial plateau   Pilon   Calcaneal 7 (13.2%) 5 (9.4%) 16 (30.2%) 17 (32.1%) 8 (15.1%) 1 (1.9%) 3 (5.7%) 28 (52.8%) 12 (22.6%) 9 (17.0%) 8 (7.5%) 8 (7.5%) 44 (41.5%) 29 (27.4%) 17 (16%) 0.18 In-hospital outcome: Two or more procedures (%) Median length of stay (IQR), in days 9 (17.0) 7.0 (2.0–15.5) 8 (15.1) 5.0 (2.0–11.5) 17 (16.0) 6.0 (2.0–14.0) 0.57 0.24 Table 1   Baseline characteristics and in-hospital outcome of the PWB and RWB groups Abbreviations: PWB permissive weight bearing, RWB restricted weight bearing, N number of subjects, ASA American Society of Anesthesiologists, IQR interquartile range postoperative complications in the total study popula- tion was 16.0%, with no statistical significant differences the PWB group than in the RWB group: 4.0 (2.1) weeks versus 12.2 (4.2) weeks (p < 0.01). The incidence of the PWB group than in the RWB group: 4.0 (2.1) weeks versus 12.2 (4.2) weeks (p < 0.01). The incidence of 1 3 European Journal of Orthopaedic Surgery & Traumatology (2024) 34:1363–1371 1367 Fig. 2   Patient self-perceived activities of daily living during a 26-week post-surgery follow-up. ADL Activities of Daily Living, LEFS Lower Extremity Functional Scale, PWB permissive weight bearing, RWB restricted weight bearing Discussion These measurements showed that there was no significant difference in mean weight bear- ing between the RWB and PWB groups. The difference in peak loading was nearly significant between the RWB group and PWB group: p = 0.05. The patients in the PWB group were bearing full weight 9 weeks earlier than those in the RWB group. The effort to bear weight earlier was not at the expense of longer duration of outpatient physiotherapy. In fact, the RWB group required significantly longer outpa- tient physiotherapy than the PWB group, viz. 41 versus 25 h, respectively. Furthermore, significantly more patients in the PWB group completed the rehabilitation within 26 weeks compared to the RWB group, viz. 65.2% versus 34.8%. Fig. 3   Patient self-perceived quality of life during a 26-week post- surgery follow-up. PWB permissive weight bearing, RWB restricted weight bearing between the PWB group and the RWB group (11.3% [N = 6] versus 20.8% [N = 11], respectively (p = 0.19), see Table 2. Among all documented complications, superficial wound infections did not require surgical intervention. Consequently, N = 3 patients adhering to the PWB regimen required supplementary surgical procedures, in contrast to N = 5 patients who adhered to the RWB regimen. Weight bearing compliance The mean weight bearing and peak loading were not sig- nificantly different between the subjects who followed the PWB or RWB regimens, see Figs. 4 and 5. 1 3 3 European Journal of Orthopaedic Surgery & Traumatology (2024) 34:1363–1371 1368 Table 2   Rehabilitation outcome and postoperative complications in the PWB and RWB groups Abbreviations: PWB permissive weight bearing, RWB restricted weight bearing, N number of subjects, IQR interquartile range, OPD outpatient physiotherapy duration, FWB full weight bearing PWB (N = 53) RWB (N = 53) Total (N = 106) p Prescribed rehabilitation aftercare (%):   PWB   6 weeks RWB   8 weeks RWB   12 weeks RWB Rehabilitation outcome:   Median OPD (IQR), in hours   FWB within 12 weeks (%), N   Median time to FWB (IQR), in weeks   N who completed rehabilitation within   26 weeks (%) 53 (100) 0 (0) 0 (0) 0 (0) 25 (13.0–46.8) 52 (98.1) 4.0 (2.0–7.0) 30 (65.2) 0 (0) 36 (67.9) 3 (5.7) 14 (26.4) 41 (28.5–57.5) 30 (56.6) 13.0(9.0–15.0) 16 (34.8) 53 (50) 36 (34.0) 3 (2.8) 14 (13.2) 33 (18.5–52.0) 82 (77.4) 8.0 (4.0–13.0) 46 (43.4) – 0.01  < 0.01  < 0.01  < 0.01 Total post-operative complications (%)   Non-unions   Secondary dislocations   Superficial wound infections   Deep wound infections   Removal of osteosynthesis material 6 (11.3) 0 (0.0) 1 (1.9) 3 (5.7) 1 (1.9) 1 (1.9) 11 (20.8) 1 (1.9) 2 (3.8) 6 (11.3) 1 (1..9) 1 (1.9) 17 (16.0) 1 (0.9) 3 (2.8) 9 (8.5) 2 (1.9) 2 (1.9) 0.19 Table 2   Rehabilitation outcome and postoperative complications in the PWB and RWB groups Abbreviations: PWB permissive weight bearing, RWB restricted weight bearing, N number of subjects, IQR interquartile range, OPD outpatient physiotherapy duration, FWB full weight bearing Fig. 4   Mean weight bearing compliance during a 26-week post-sur- gery follow-up. Abbreviation: PWB Permissive weight bearing, RWB Restricted weight bearing, N number of subjects, SD standard devia- tion, WB Weight bearing in newton on affected leg Fig. 5   Weight bearing compliance expressed in peak loading during a 26-week post-surgery follow-up. Abbreviations: PWB Permissive weight bearing, RWB Restricted weight bearing, N number of sub- jects, SD standard deviation, Peak loading Peak loading in newton on affected leg Fig. 4   Mean weight bearing compliance during a 26-week post-sur- gery follow-up. Abbreviation: PWB Permissive weight bearing, RWB Restricted weight bearing, N number of subjects, SD standard devia- tion, WB Weight bearing in newton on affected leg Fig. Weight bearing compliance Special thanks are also due to the six par- ticipating centers in the Netherlands: Maastricht University Medical Center+, Maastricht; Zuyderland Medical Center, Heerlen; Elkerliek Hospital, Helmond; Catharina Hospital, Eindhoven; Maxima Medical Center, Veldhoven and Viecuri Medical Center, Venlo. We would like to thank MEMIC Maastricht for managing our data safely. Further- more, we want to thank Adelante Rehabilitation Center, Hoensbroek, the Netherlands for taking care of the postoperative management in the intervention group. We would also like to thank the AO foundation for providing us with the Moticon insole material free of charge. Finally, we want to thank all the members of the research group and Joey Jansen to their contributions to this study. Authors’ contribution  PK is the main researcher and has conceptual- ized this paper with CM, HS, TB, PB and MP. PK has written the protocol for this study. The idea for the study originated from PK, GM, Yv. H, MP and PB. All authors participated in recruiting and enrolling patients for this study. HS, MP and PB are the supervisors of PK. All authors have read and have approved the final version of the manuscript. Our study, the first large-scale prospective multicenter cohort study comparing PWB with RWB, adds evidence in support of the use of PWB in surgically treated trauma patients with peri- and intra-articular fractures of the lower extremities. This means that our study contests the para- digm of the current RWB guidelines, which have remained unchanged for 60 years. The time has now come to renew the current guidelines in accordance with the most recent evidence. Funding  Funding by Netherlands Organization for Health Research and Development (ZonMW, project number 843001807). The insole material for this study was provided by the AO Foundation TK Sys- tem (AOTK Project number: AO516.05). The funders had no role in the design and conduct of the study; in the collection, management, analysis and interpretation of the data; in the preparation, review, or approval of the manuscript; or in the decision to submit the manuscript for publication. When interpreting our data, some limitations have to be considered. Due to practical reasons, this study featured a non-randomized groups design. However, patients were included to the PWB and RWB groups consecutively to avoid selection bias. There were differences regarding the patients’ comorbidities and the different hospitals in which the patients were treated. Weight bearing compliance 5   Weight bearing compliance expressed in peak loading during a 26-week post-surgery follow-up. Abbreviations: PWB Permissive weight bearing, RWB Restricted weight bearing, N number of sub- jects, SD standard deviation, Peak loading Peak loading in newton on affected leg Our study found that there was no statistical significant difference in postoperative complications between the PWB group and the RWB group. Nevertheless, a discernible clinical difference was observed, with a lower incidence of post-operative complications evident in patients sub- jected to the PWB regimen in comparison to those under- going a RWB regimen. One of the key objections often raised against early weight bearing is the possibility of frac- ture displacement [28]. On the other hand, it has often been stated that early weight bearing does not entail an undue risk of postoperative complications [2, 3, 12, 13, 29]. These two views are contradictory, and our study provides evidence in favor of regimes with early weight bearing instead of the standard non-weight-bearing protocols. According to recent literature, a composite postoperative complications rate of up to 27% has been found in surgically treated trauma patients with peri- and intra-articular fractures of the lower extremities [7–11]. Comparison of our complication rates with data published in recent literature shows that we found lower rates of postoperative complication in these patients when they were treated with the PWB regimen. 1 3 1369 European Journal of Orthopaedic Surgery & Traumatology (2024) 34:1363–1371 Over- and under-loading may lead to prolonged and com- plicated recovery [2]. A certain minimum level of loading is required to elicit micro-movements between adjacent bony fracture components, stimulating biological processes that are converted into cellular signals initiating bone remod- eling [27, 30]. This process is described in the literature as the mechanotransduction in bone. Mechanotransduction is continuously present and enables the bone to resist the mechanical impacts caused by daily activities [30]. To opti- mize recovery with the lowest number of complications and better patients’ self-perceived outcome levels, one should apply a treatment that approaches the upper limit of the therapeutic bandwidth regarding weight bearing, yet is safe enough to avoid complications due to overloading. This is the case with the PWB protocol [2].i Acknowledgements  First of all, we would like to thank all patients participating in this study. Weight bearing compliance Our statistical analyses took these issues into consideration, thus correcting the presented results for the confounding influence that these factors may have had on the study results. Surgeon-oriented functional outcome scores (e.g., the function of a knee or ankle joint) were not taken into account. Another limitation of the study is that we did not investigate the cost-effectiveness of PWB. Therefore, further data are needed on the cost-effec- tiveness, and long-term patient-reported outcome of the PWB strategy. Availability of data and material  The datasets used and/or analyzed during the current study are available from the corresponding author on reasonable request. Declarations Conflict of interest  No benefits in any form have been received or will be received from a commercial party related directly or indirectly to the subject of this article. All authors declare that they have no poten- tial conflicts of interest. Ethics approval and consent to participate  The medical ethics com- mittee of Maastricht University Medical Center, Maastricht+, the Netherlands approved this study, reference number: METC 16-4-236. Informed consent to participate was obtained from all patients. Open Access  This article is licensed under a Creative Commons Attri- bution 4.0 International License, which permits use, sharing, adapta- tion, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. References 16. Kalmet PHS, Meys G, van Horn YY et al (2018) Permissive weight bearing in trauma patients with fracture of the lower extremities: prospective multicenter comparative cohort study. BMC Surg 18:8 1. Ruedi TP, Buckley RE, Moran CG (2018) AO principles of frac- ture management, 3rd edn. Thieme, New York 17. Doyle DJ, Garmon EH. American Society of Anesthesiologists Classification (ASA Class) (2018) StatPearls. Stat-Pearls Publish- ing StatPearls Publishing LLC, Treasure Island, FL 2. Meys G, Kalmet PHS, Sanduleanu S et al (2019) A protocol for permissive weight-bearing during allied health therapy in surgi- cally treated fractures of the pelvis and lower extremities. J Reha- bil Med 51:290–297 18. Charlson ME, Pompei P, Ales KL, MacKenzie CR (1987) A new method of classifying prognostic comorbidity in longitudinal stud- ies: development and validation. J Chronic Dis 40:373–383 3. Haller JM, Potter MQ, Kubiak EN (2013) Weight bearing after a periarticular fracture: what is the evidence? Orthop Clin N Am 44:509–519 19. Binkley JM, Stratford PW, Lott SA, Riddle DL (1999) The Lower Extremity Functional Scale (LEFS): scale development, measure- ment properties, and clinical application. North American Ortho- paedic Rehabilitation Research Network. Phys Ther 79:371–383 4. van der Vusse M, Kalmet PHS, Bastiaenen CHG et al (2017) Is the AO guideline for postoperative treatment of tibial plateau fractures still decisive? A survey among orthopaedic surgeons and trauma surgeons in the Netherlands. Arch Orthop Trauma Surg 137:1071–1075 20. Ware JE, Keller SD (1995) How to score the SF-12 physical and mental health summaries: a user’s manual. New England Medical Centre, Boston 5. Hustedt JW, Blizzard DJ, Baumgaertner MR et al (2012) Is it pos- sible to train patients to limit weight bearing on a lower extremity? Orthopedics 35:e31–e37 21. Breivik H, Borchgrevink PC, Allen SM et al (2008) Assessment of pain. Br J Anaesth 101:17–24 22. Braun BJ, Bushuven E, Hell R et al (2016) A novel tool for con- tinuous fracture aftercare - clinical feasibility and first results of a new telemetric gait analysis insole. Injury 47:490–494 6. Raaben M, Holtslag HR, Leenen LPH et al (2018) Real-time vis- ual biofeedback during weight bearing improves therapy compli- ance in patients following lower extremity fractures. Gait Posture 59:206–210 23. Repo JP, Barner-Rasmussen I, Roine RP et al (2016) Treatment of compound tibia fracture with microvascular latissimus dorsi flap and the Ilizarov technique: a cross-sectional study of long-term outcomes. * Coen Verstappen Coen.Verstappen@mumc.nl Conclusion This prospective, comparative, multicenter study shows that PWB in surgically treated trauma patients with peri- and intra-articular fractures of the lower extremities is effective and is associated with a significant reduction in time to full weight bearing and significantly better outcomes in terms of ADL and quality of life compared to the RWB regime, with a similar complication rate. This PWB protocol contests the paradigm of the current RWB guidelines, which have remained unchanged for 60 years. 1 3 1 3 1370 European Journal of Orthopaedic Surgery & Traumatology (2024) 34:1363–1371 References Eur J Orthop Surg Traumatol 29:1789–1794 Publisher's Note  Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Publisher's Note  Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. 15. Smeeing DPJ, Houwert RM, Briet JP et al (2020) Weight-bearing or non-weight-bearing after surgical treatment of ankle fractures: a multicenter randomized controlled trial. Eur J Trauma Emerg Surg 46:121–130 References J Plast Reconstr Aesthet Surg 69:524–532 7. Choo KJ, Morshed S (2014) Postoperative complications after repair of tibial plateau fractures. J Knee Surg 27:11–19 8. Yu X, Pang QJ, Chen L et al (2013) Postoperative complications after closed calcaneus fracture treated by open reduction and inter- nal fixation: a review. J Int Med Res 42:17–25 24. Garner MR, Thacher RR, Ni A et al (2015) Elective removal of implants after open reduction and internal fixation of Tibial Pla- teau fractures improves clinical outcomes. Arch Orthop Trauma Surg 135:1491–1496 i 9. Halvorson JJ, Winter SB, Teasdall RD, Scott AT (2013) Talar neck fractures: a systematic review of the literature. J Foot Ankle Surg 52:56–61 g 25. von Rüden C, Wenzel L, Becker J et al (2019) The pararectus approach for internal fixation of acetabular fractures involving the anterior column: evaluating the functional outcome. Int Orthop 43:1487–1493 10. Schwabe P, Wichlas F, Druschel C et al (2014) Complications after osteosynthetic treatment of acetabular fractures. Orthopade 43:24–34 26. Kerschbaum M, Hausmann N, Worlicek M et al (2017) Patient related outcome of unstable pelvic ring fractures stabilized with a minimal invasive screw-rod system. Health Qual Life Outc 15:248 11. Papakostidis C, Kanakaris NK, Giannoudis PV (2009) Pelvic ring disruptions: treatment modalities and analysis of outcomes. Int Orthop 33:329–338 27. Westerman RW, Hull P, Hendry RG, Cooper J (2008) The physi- ological cost of restricted weight bearing. Injury 39:725–727 12. Kalmet PHS, van Horn YY, Sanduleanu S et al (2019) Patient- reported quality of life and pain after permissive weight bear- ing in surgically treated trauma patients with tibial plateau frac- tures: a retrospective cohort study. Arch Orthop Trauma Surg 139:483–488 28. Black JD, Bhavikatti M, Al-Hadithy N et al (2013) Early weight- bearing in operatively fixed ankle fractures: a systematic review. Foot (Edinb) 23:78–85 29. Williamson M, Iliopoulos E, Jain A et al (2018) Immediate weight bearing after plate fixation of fractures of the tibial plateau. Injury 49:1886–1890 13. Kubiak EN, Beebe MJ, North K et al (2013) Early weight bearing after lower extremity fractures in adults. J Am Acad Orthop Surg 21:727–738 30. Klein-Nulend J, Bacabac RG, Mullender MG (2005) Mechanobi- ology of bone tissue. Pathol Biol 53:576–580 14. Consigliere P, Iliopoulos E, Ads T, Trompeter A (2019) Early ver- sus delayed weight bearing after surgical fixation of distal femur fractures: a non-randomized comparative study. Authors and Affiliations Pishtiwan Kalmet1   · Cherelle Maduro1   · Coen Verstappen1   · Guido Meys2   · Yvette van Horn2   · Raoul van Vugt3   · Heinrich Janzing4   · Alexander van der Veen5   · Coen Jaspars6 · Jan Bernard Sintenie7   · Taco Blokhuis1   · Silvia Evers8,9   · Henk Seelen2,8   · Peter Brink1   · Martijn Poeze1,10 Pishtiwan Kalmet Pishtiwan.Kalmet@mumc.nl * Coen Verstappen Coen.Verstappen@mumc.nl 1 3 European Journal of Orthopaedic Surgery & Traumatology (2024) 34:1363–1371 1371 European Journal of Orthopaedic Surgery & Traumatology (2024) 34:1363–1371 Cherelle Maduro Cherelle.Maduro@mumc.nl Guido Meys G.Meys@adelante-zorggroep.nl Yvette van Horn Y.Horn@adelante-zorggroep.nl Raoul van Vugt r.vanvugt@zuyderland.nl Heinrich Janzing hjanzing@viecuri.nl Alexander van der Veen alexander.vd.veen@catharinaziekenhuis.nl Coen Jaspars C.Jaspars@mmc.nl Jan Bernard Sintenie jb.sintenie@elkerliek.nl Taco Blokhuis Taco.Blokhuis@mumc.nl Silvia Evers s.evers@maastrichtuniversity.nl Henk Seelen h.seelen@maastrichtuniversity.nl Peter Brink p.brink@mumc.nl Martijn Poeze M.Poeze@mumc.nl 1 Maastricht University Medical Center+, Maastricht, The Netherlands 2 Adelante Rehabilitation Center, Hoensbroek, The Netherlands 3 Zuyderland Medical Center, Heerlen, The Netherlands 4 Viecuri Medical Center, Venlo, The Netherlands 5 Catharina Hospital, Eindhoven, The Netherlands 6 Maxima Medical Center, Veldhoven, The Netherlands 7 Elkerliek Hospital, Helmond, The Netherlands 8 Maastricht University, Care and Public Health Research Institute (CAPHRI), Maastricht, The Netherlands 9 Trimbos Institute, Netherlands Institute of Mental Health and Addiction, Utrecht, The Netherlands 10 Nutrim School for Nutrition, Toxicology and Metabolism, Maastricht University, Maastricht, The Netherlands Cherelle Maduro Cherelle.Maduro@mumc.nl Guido Meys G.Meys@adelante-zorggroep.nl Yvette van Horn Y.Horn@adelante-zorggroep.nl Raoul van Vugt r.vanvugt@zuyderland.nl Heinrich Janzing hjanzing@viecuri.nl Alexander van der Veen alexander.vd.veen@catharinaziekenhuis.nl Coen Jaspars C.Jaspars@mmc.nl Jan Bernard Sintenie jb.sintenie@elkerliek.nl Taco Blokhuis Taco.Blokhuis@mumc.nl Silvia Evers s.evers@maastrichtuniversity.nl Henk Seelen h.seelen@maastrichtuniversity.nl Peter Brink p.brink@mumc.nl Martijn Poeze M.Poeze@mumc.nl 1 Maastricht University Medical Center+, Maastricht, The Netherlands 2 Adelante Rehabilitation Center, Hoensbroek, The Netherlands 3 Zuyderland Medical Center, Heerlen, The Netherlands 4 Viecuri Medical Center, Venlo, The Netherlands 5 Catharina Hospital, Eindhoven, The Netherlands 6 Maxima Medical Center, Veldhoven, The Netherlands 7 Elkerliek Hospital, Helmond, The Netherlands 8 Maastricht University, Care and Public Health Research Institute (CAPHRI), Maastricht, The Netherlands 9 Trimbos Institute, Netherlands Institute of Mental Health and Addiction, Utrecht, The Netherlands 10 Nutrim School for Nutrition, Toxicology and Metabolism, Maastricht University, Maastricht, The Netherlands Peter Brink p.brink@mumc.nl Martijn Poeze M.Poeze@mumc.nl 1 Maastricht University Medical Center+, Maastricht, The Netherlands 2 Adelante Rehabilitation Center, Hoensbroek, The Netherlands 3 Zuyderland Medical Center, Heerlen, The Netherlands 4 Viecuri Medical Center, Venlo, The Netherlands 5 Catharina Hospital, Eindhoven, The Netherlands 6 Maxima Medical Center, Veldhoven, The Netherlands 7 Elkerliek Hospital, Helmond, The Netherlands 8 Maastricht University, Care and Public Health Research Institute (CAPHRI), Maastricht, The Netherlands 9 Trimbos Institute, Netherlands Institute of Mental Health and Addiction, Utrecht, The Netherlands 10 Nutrim School for Nutrition, Toxicology and Metabolism, Maastricht University, Maastricht, The Netherlands Cherelle Maduro Cherelle.Maduro@mumc.nl Guido Meys G.Meys@adelante-zorggroep.nl Yvette van Horn Y.Horn@adelante-zorggroep.nl Raoul van Vugt r.vanvugt@zuyderland.nl Heinrich Janzing hjanzing@viecuri.nl Alexander van der Veen alexander.vd.veen@catharinaziekenhuis.nl Coen Jaspars C.Jaspars@mmc.nl Jan Bernard Sintenie jb.sintenie@elkerliek.nl Taco Blokhuis Taco.Blokhuis@mumc.nl Silvia Evers s.evers@maastrichtuniversity.nl Henk Seelen h.seelen@maastrichtuniversity.nl Peter Brink p.brink@mumc.nl Martijn Poeze M.Poeze@mumc.nl 1 Maastricht University Medical Center+, Maastricht, The Netherlands 2 Adelante Rehabilitation Center, Hoensbroek, The Netherlands 3 Zuyderland Medical Center, Heerlen, The Netherlands 4 Viecuri Medical Center, Venlo, The Netherlands 5 Catharina Hospital, Eindhoven, The Netherlands 6 Maxima Medical Center, Veldhoven, The Netherlands 7 Elkerliek Hospital, Helmond, The Netherlands 8 Maastricht University, Care and Public Health Research Institute (CAPHRI), Maastricht, The Netherlands 9 Trimbos Institute, Netherlands Institute of Mental Health and Addiction, Utrecht, The Netherlands 10 Nutrim School for Nutrition, Toxicology and Metabolism, Maastricht University, Maastricht, The Netherlands 10 Nutrim School for Nutrition, Toxicology and Metabolism, Maastricht University, Maastricht, The Netherlands 1 3 1 3 3
https://openalex.org/W4308545571
https://www.researchsquare.com/article/rs-761797/latest.pdf
English
null
The protective effects of melatonin in high glucose environment by alleviating autophagy and apoptosis on primary cortical neurons
Molecular and cellular biochemistry
2,022
cc-by
7,306
The protective effects of melatonin in high glucose environment by alleviating autophagy and apoptosis on primary cortical neurons Lijiao , Xiong  First Affiliated Hospital Of Gannan Medical University Song Liu  Gannan Medical University Chaoming Liu  Gannan Medical University Tianting Guo  Ganzhou People's Hospital Zhihua Huang  (  zh.huang@gmu.edu.cn ) Gannan Medical University https://orcid.org/0000-0002-2610-1999 Liangdong Li  First Affiliated Hospital of Fujian Medical University Research Article Keywords: Cortical neurons, High glucose environment, Melatonin, Autophagy, Apoptosis Posted Date: August 10th, 2021 DOI: https://doi.org/10.21203/rs.3.rs-761797/v1 License:   This work is licensed under a Creative Commons Attribution 4.0 International License.   Read Full License The protective effects of melatonin in high glucose environment by alleviating autophagy and apoptosis on primary cortical neurons Lijiao , Xiong  First Affiliated Hospital Of Gannan Medical University Song Liu  Gannan Medical University Chaoming Liu  Gannan Medical University Tianting Guo  Ganzhou People's Hospital Zhihua Huang  (  zh.huang@gmu.edu.cn ) Gannan Medical University https://orcid.org/0000-0002-2610-1999 Liangdong Li  First Affiliated Hospital of Fujian Medical University Research Article Keywords: Cortical neurons, High glucose environment, Melatonin, Autophagy, Apoptosis Posted Date: August 10th, 2021 DOI: https://doi.org/10.21203/rs.3.rs-761797/v1 License:   This work is licensed under a Creative Commons Attribution 4.0 International License. Read Full License Research Article Page 1/17 Page 1/17 Page 1/17 Abstract Cognitive dysfunction has been regarded as a complication of diabetes. Melatonin shows a neuroprotective effect on various neurological diseases. However, it’s protective effect on cortical neurons in high glucose environment has not been reported. Our present study aims to observe the protective effect of melatonin on rat cortical neurons and its relationship with autophagy in high glucose environment. The rat primary cortical neurons damaged model was induced by high glucose. The CCK-8, flow cytometry, Western Blot and immunofluorescence methods were used to examine the cell viability, apoptosis rate and proteins expression. Our results showed that there were no differences in cell viability, apoptosis rate, and protein expression among the control MLT and mannitol group. The cell viability of the glucose group was significantly lower than that of the control group, and the apoptosis rate of the glucose group was significantly higher than that of the control group. Compared with the glucose group, the glucose + melatonin group showed a significant increase in cell viability and a notable decrease in apoptosis rate. Melatonin concentration of 0.1-1 mmol/L can significantly reduce the injury of cortical neurons by high glucose. Compared with the control group, the glucose group showed a significant reduction of Bcl-2 protein expression, while remarkable elevations of Bax, caspase-3, Beclin-1 and LC3B levels. The neurons pre-administered with melatonin obtained significantly reversed these changes induced by high glucose. The phosphorylation levels of Akt and mTOR in the glucose group were significantly lower than those in the control group, were significantly increased in the glucose + MLT group compared with the glucose group. These data indicated that melatonin has a neuroprotective effect on cortical neurons under high glucose environment, which may work by activating Akt/mTOR pathway and following the down-regulation of autophagy. 1. Introduction The incidence of diabetes has been increasing year by year. Traditionally, diabetes complications mainly affect the kidney, retina, peripheral nerve and cardiovascular system. Recently, diabetes cognitive dysfunction has been regarded as a complication of the central nervous system of diabetes, attracting more and more attention. "Diabetes encephalopathy (diabetic encephalopathy, DE)" was first proposed by Nielon scholars in 1965, means the changes in brain structure, function and metabolic state caused by long-term sustained hyperglycemia, which eventually causes nerve behavior and cognitive function defect. It is mainly manifested in the descent of comprehension ability, memory decline, cognitive dysfunction, accompanied by indifference, delayed behavior, and even the development of dementia. Its pathogenesis is related to glucotoxicity, insulin resistance, apoptosis of nerve cells, vascular diseases, oxidative stress, mitochondrial dysfunction, inflammatory response, amyloid deposition and synaptic changes of nerve cells (1). With high incidence of DE, the search for new effective diagnostic methods and therapeutic measures of DE has important clinical and social application value. At present, DE has been recognized as an independent type of dementia, and the pathological changes of Tau protein hyperphosphorylation and amyloid protein deposition have also been found in the brains of patients with diabetes. DE and Alzheimer's disease (AD), Parkinson's disease (PD), multiple sclerosis and Page 2/17 Page 2/17 huntingtin's disease (HD) all belong to neurodegenerative diseases. Abnormal accumulation of proteins in cells formed in the affected brain regions is a common feature of these diseases (2)。 When cells are stimulated by the outside environment, they form a membrane-like structure wrapped by a double membrane, transport misfolded proteins or abnormal cell components to lysosomal degradation and maintain cell self-renewal, this process known as Autophagy. Autophagy is essential for maintaining neuronal homeostasis by clearing damaged mitochondria and phagocytes, such as HD and PD related proteins (3). Studies have shown that autophagy disorders can lead to degenerative changes in neurons, such as Parkinson's syndrome and amyotrophic lateral sclerosis (4)。Mitochondrial autophagy plays an important role in apoptosis of nerve cells. In the early stage of nerve cell injury, autophagy can remove harmful substances to protect cells from apoptosis. Excessive activation of autophagy may lead to excessive self-digestion, which in turn triggers the apoptosis process to initiate and promote apoptosis (5). 1. Introduction On account of  involved in the pathogenesis of cognitive dysfunction, autophagy regulation has been regarded as a target for the therapy of neurodegenerative disease (3-5)。 Studies have shown that the hyperglycemic state of diabetes leads to excessive activation of autophagy, which damages the target organs. For example, in diabetic retinopathy, excessive activation of autophagy by neurons leads to increased apoptosis of retinal nerve cells, while inhibiting their autophagy activity can reduce hyperglycemia toxicity and improve retinal function (6). Animal experiments showed that the cognitive dysfunction of diabetes also has excessive activation of autophagy, and inhibiting the autophagy activity can improve its cognitive function (7)。Therefore, we speculated that the use of drugs or other methods to inhibit neuronal autophagy could delay the occurrence and development of diabetic cognitive dysfunction. Melatonin is a hormone synthesized and secreted by pineal gland, which has the physiological functions of regulating sleep, immune regulation, anti-inflammatory and antioxidant. Melatonin has a neuroprotective effect, which can ameliorate brain tissue edema and injury, inhibit neuronal apoptosis, reduce oxidative stress, prevent Aβ aggregation, and so on. It shows protective effects on PD, stroke, AD and etc in animal model tests (8, 9). Animal experiments show that melatonin can regulate autophagy and play a neuroprotective role in the rat model of ischemia reperfusion injury (10). However, whether there is protective effect of melatonin on cortical neurons in high glucose environment has not been reported. Therefore, in our study, the cortical neurons in the high glucose environment were used as the model to simulate the central neuropathy of diabetes mellitus and investigate the protective effect of melatonin and its related mechanisms. 2.2. Primary culture of cortical neurons from fetal rats 2.2. Primary culture of cortical neurons from fetal rats Experimental protocols for animal studies were approved by the local ethics committee. Primary cortical neurons were isolated and cultured from day E18 Sprague Dawley rat embryos. Anatomical microscope was used to dissect the cortex of rats and put it into Hank's anatomical solution. Cortex tissues were digested in 0.125% trypsin 18 min at 37 ° C water bath, meanwhile oscillation of 2–3 times. DMEM medium containing 10% FBS serum was used to terminate digestion. Centrifuge for 10 min at 1000 rpm/min, and the cells were resuspended with the density of 105/mL and inoculated in the Poly-L-lysine- coated (0.1 g/L) plates, and then cultured in DMEM supplemented with 10% fetal bovine serum, L- glutamine (200 nM), 50 U/mL penicillin and 50 µg/mL streptomycin at 37°C and 5% CO2 incubator. This medium was removed after 4 h and replaced with Neurobasal medium containing 2% B27 supplement. Half the medium was removed every 3 d in culture and replaced with fresh Neurobasal medium with supplements. After 6 d in the supplemented Neurobasal medium, the primary cortical neurons were used for the experiment. 2.1. Materials Female SD rats with pregnancy 18 days weighing 250–280 g were purchased from Hunan Slake Jingda Experimental Animals Limited Liability Company. (license number of animal center: SCXK(Xiang) 2016- Page 3/17 Page 3/17 0002, grade: SPF). Melatonin (M5250) purchased from Sigma-Aldrich, using Dimethyl sulfoxide (DMSO) solution to dissolve it. Dulbecco's modified Eagle's medium (DMEM, C11996600BT), Neurobasal medium (21103-049), B27 supplement (50×) (17504-044), GlutamaxTM-1(100×) (35050-061) were from Gibco. Fetal bovine serum (FBS), trypsin, penicillin-streptomycin and L-glutamine were from Gibco. Poly-L-lysine (molecular weight 15,000–30,000), glucose, Cell Counting kit-8 (CCK8) (CA1210) was purchased from Solarbio. Apoptosis detection kit (556547) was purchased from BD Pharmingen Company. Bcl-2(sc-7382) and Bax (sc-20067) antibody were purchased from Santa Cruz Blotechnology (CA, USA). Caspase-3 (9664S), LC3B (2775S), Beclin-1 (3738S), p-mTOR (5536S), mTOR (2983S), p-Akt (4046S) and Akt (9272S) antibody were purchased from Cell Signaling Technology. p-Beclin-1 (ab183335) antibody was purchased from Abcam (Cambridge, UK). β-tubulin (MA5-11732) antibody was purchased from Invitrogen. Goat anti-rabbit IgG (31460), goat anti-rat IgG (31430), PVDF membrane (88518), protein quantitative reagent (A33972), and enhanced chemiluminescence reagent (34580) were purchased from Thermo Fisher. 2.4. Experimental groups The cells were divided into control group (Ctrl), melatonin group (MLT), Mannitol group (100 mmol/L), Glucose group (100 mmol/L), and Glucose + MLT group. The primary fetal rat cortical neuron cells were mature after 6 days. Melatonin was added for pretreatment for half an hour, and then glucose or mannitol was added for treatment for 48 h. After that, neurons were collected for experimental detection (Fig. 1A). The concentrations of melatonin in MLT and Glucose + MLT groups were 0.1, 0.3, 1, 3, 10 microns /L in the cell viability assessment. The final concentrations of melatonin in the subsequent experiments were 0.1 µmol/L. 2.6. Detection of Apoptotic Cells by Annexin V-FITC/PI Flow Cytometry 2.6. Detection of Apoptotic Cells by Annexin V-FITC/PI Flow Cytometry 1.5×106 cells per pore were plated in 6 well plates. The cells were cultured for 6 days and then treated with drugs for 48 hours. Cells were trypsinized and harvested by centrifugation and then followed the instructions of Annexin V-FITC/PI kit to incubate with Annexin V-FITC and PI for 15 min at room temperature, away from light. Apoptosis rate was examined by flow cytometry in 30 minutes. The experiment was repeated 3 times with 4 duplicate holes in each group. 2.3. Cell immunofluorescent staining Neuronal nuclear protein (NeuN) immunostaining was performed to evaluate the purification rate of cortical neurons. Immunofluorescence of other proteins Bax, Bcl-2, Beclin-1, LC3B and Caspase-3 was performed. The culture medium was removed and the neurons were rinsed for 5 min three times in cold phosphate buffered saline (PBS). Cells were fixed with 4% paraformaldehyde for 30 min, permeabilized in PBS containing 0.2% Triton for 30 min, and blocked with 10% normal goat serum for 1 h. Cells were incubated with mouse anti-Bax, Bcl-2, Beclin-1, LC3B and Caspase-3 primary monoclonal antibody (1:50) for 2 h at 37°C and washed three times in PBS (5 min per wash), then incubated with goat anti-mouse secondary antibody conjugated to FITC (1:500) for 1 h at 37°C and washed three times in PBS (5 min per wash). Cells were incubated with DAPI (1:1000) for 5 min at room temperature and examined for fluorescence using a standard fluorescence photomicroscope (DM IRE2, Leica Microsystems, Cambridge, UK). Page 4/17 Page 4/17 2.5. Cell viability assessment Cell viability was quantified by CCK-8 assay. The cells were inoculated in 96-well plate with a concentration of 1×105/ml, and the treated cells were cultured for 48 h after 7 days. 10 µL CCK-8 was added to each hole, and cultured for 2 h, and the light absorption value was measured at 490 nm on a plate reader, and the neuronal cell viability was calculated as a mean percentage of the control group. All experiments were carried out in quadruplicate. 2.7. Western blot analysis of p-mTOR, mTOR, p-Akt, Akt, p- Beclin-1, Beclin-1, LC3B, Bcl-2, Bax, Caspase-3 and β-tubulin Primary fetal cortical neurons were processed and cells were collected. The protein concentration in each sample was determined by the bicinchoninic acid (BCA) protein assay and equal amounts of protein per lane were loaded onto the gel. Briefly, samples were electrophoresed on 10% SDS-PAGE gels and transferred to polyvinylidene difluoride membranes. After blocking with Tris hydrochloric acid buffered saline (TBS) containing 0.1% Tween 20 and 5% nonfat milk, the membranes were incubated overnight at 4°C with a rabbit polyclonal antibody against p-mTOR, mTOR, p-Akt, Akt, p-Beclin-1, Beclin-1, LC3B, Bcl-2, Bax, Caspase-3 and β-tubulin, diluted 1:2000 in 0.05% BSA. They were then washed and incubated with a horseradish peroxidase-conjugated goat-anti-rabbit or goat-anti-mice secondary antibody IgG (1:5000). Protein bands were visualized by chemiluminescence with a Western Chemiluminescent HRP Substrate kit (Immobilon) and the band images analyzed with Image J software (National Institutes of Health, Page 5/17 Page 5/17 Bethesda, MD, USA). β-actin was used as a control for the protein loading. Each experiment was repeated at least three times. Bethesda, MD, USA). β-actin was used as a control for the protein loading. Each experiment was repeated at least three times. 2.8. Statistical Analysis All statistical analyses were carried out with GraphPad Prism 5.0 software. Data are expressed as mean  ± SEM and analyzed by one-way ANOVA followed by post hoc Student–Newman–Keuls test to determine the influence of different groups. P < 0.05 was considered statistically significant. 3.1. Effect of melatonin on the cell viability and apoptosis of cortical neurons in high glucose environment 3.1. Effect of melatonin on the cell viability and apoptosis of cortical neurons in high glucose environment When melatonin concentration was 0.1, 0.3 and 1 µmol/L, the survival rate of cortical neurons was not statistically different from that of the control group (P>0.05). When melatonin concentration was 3 and 10 µmol/L, the cell survival rate was significantly lower than that of the control group, which indicating that 3 and 10 µmol/L MLT had toxic effects on primary cultured cortical neurons (Figure 1B). The survival rate of glucose group was significantly lower than that of the control group (P<0.01). Compared with the glucose group, the cell survival rate was significantly increased with a significant statistical difference (P<0.01), indicating that the high glucose induced cortical neuron injury could be significantly reduced with 0.1-1µmol/L melatonin (Figure 1C). There was no statistical difference in apoptosis rate between the control group, melatonin group and mannitol group (P>0.05). The apoptosis rate in the Glucose group was significantly higher than that in the control group (P<0.05), and significantly lower in the Glucose + MLT group than that in the Glucose group (P<0.05) (Figure 1D-F). This indicated that melatonin concentration of 0.1-1 µM can alleviate the damage of cortical neurons induced by high glucose, while melatonin concentration of 3 and 10 µM MLT can have toxic effects on the original cultured cortical neurons. 3.2. Effects of melatonin on the apoptosis-related proteins expression of Bcl-2, Bax and Caspase-3 on cortical neurons in high-glucose environment There was no significant difference in protein expression of Bcl-2, Bax and Caspase-3 among the control, melatonin and mannitol group by Western Blot and immunofluorescence (P>0.05) (Figure 2A-G). Western Blot and immunofluorescence both showed that the expression of Bcl-2 was significantly decreased while the expression of Bax and Caspase-3 was significantly increased in the glucose group compared with the control group, showing a statistically significant difference (P<0.05). Compared with the glucose group, glucose + MLT group obtained a significantly increase in Bcl-2 protein expression, while significantly decreases in Bax and Caspase-3 expression with statistical significant difference (P<0.05) (Figure 2A-G). These results indicate that MLT regulate the expression of apoptosis relation protein and inhibit cell apoptosis induced by high glucose stimulation. 3.4. Effects of melatonin on the phosphorylation of Akt/mTOR protein on cortical neurons in high-glucose environment by Western Blot The phosphorylation of AKT and mTOR protein in each group was determined by Western Blot, and there was no statistically significant difference among the control, melatonin and mannitol group (P>0.05) (Figure 4A-D). p-Akt/Akt, p-mTOR/mTOR and mTOR were significantly decreased in the glucose group compared with the control group (P<0.05), and were significantly increased in the glucose + MLT group compared with the glucose group (P<0.05) (Figure 4A-E). It suggested that AKT/mTOR activation was significantly inhibited in the glucose group, and melatonin could increase the phosphorylation level of AKT/mTOR in cortical neurons in the high glucose environment. Page 6/17 Page 6/17 3.3. Effects of melatonin on the autophagy related proteins expression of Beclin-1 and LC3B on cortical neurons in high-glucose environment Western Blot and immunofluorescence both showed that there was no statistical difference on the expression of autophagy related proteins Beclin-1 and LC3B among the control, melatonin, mannitol group (Figure 3A-F). Immunofluorescence results showed that Beclin-1 and LC3B expression in the glucose group were significantly higher than the control group. Beclin-1 and LC3B expression were significantly lower in the glucose +MLT group than in the glucose group, and the difference was statistically significant (Figure 3A, B). Western Blot results show that the expression of p-Beclin-1/Beclin- 1, LC3BⅠand LC3BⅡ were significantly increased in the glucose group compared with control group, with a statistically significant difference (P < 0.01). Compared with the glucose group, glucose +MLT showed significant reductions in the expression of p-Beclin-1/Beclin-1, LC3BⅠand LC3BⅡ(P < 0.01) (Figure 3C-F). The results of western Blot and immunofluorescence were consistent. 4. Discussion The pathogenesis of diabetic central neuropathy is not completely clear. The high fatty acids, high blood glucose and abnormal increase of glycation end products caused by hyperglycemia induce oxidative stress. Excess produced or insufficient eliminated ROS will directly cause biological membrane lipid peroxidation, protein and enzyme degeneration, mitochondrial dysfunction, which lead to neuronal cell damage, scabbard film, axon swelling degeneration and even broke off, neurons chromatin dissolved, cytoplasm vacuoles degeneration necrosis, mitochondrial dysfunction, nuclear pyknosis and nerve cells apoptosis (2). Abnormal changes in brain electrophysiology, imaging and pathology caused by diabetic metabolic factors such as glucose and lipid metabolism disorder, insulin resistance, vascular disease and obesity are closely related to the occurrence and development of DE. Melatonin is a strong antioxidant, with small molecular volume and amphiphilic nature, which is very easy to enter the cells, especially the mitochondria, and participate in mitochondrial energy metabolism to reduce mitochondrial damage caused by oxidative stress (11-13). Relevant studies have shown that melatonin can directly interact with electrons or induce the production of antioxidant enzymes to reduce the damage of oxidative respiratory chain, enhance mitochondrial function and reduce oxidative stress Page 7/17 even reduce cell apoptosis (11). In addition, melatonin can help restore the function of islet B cells, improve insulin sensitivity and glucose tolerance, reduce hyperinsulinemia, and reduce insulin resistance. Melatonin may be a potential diabetes treatment drug. even reduce cell apoptosis (11). In addition, melatonin can help restore the function of islet B cells, improve insulin sensitivity and glucose tolerance, reduce hyperinsulinemia, and reduce insulin resistance. Melatonin may be a potential diabetes treatment drug. In the hippocampus and cortex of diabetic rats, lipid peroxides increased, and rats showed obvious cognitive impairment. However, these manifestations were significantly reduced or even disappeared after the treatment with melatonin or antioxidants vitamin E (14, 15). Melatonin can also alleviate peripheral neuralgia caused by diabetes and improve diabetic neuropathy (16). In addition, melatonin has neuroprotective effects. Patients suffered from AD showed a reduction in secretion of melatonin, which slowed down the synthesis of the protein of Aβ protein and delay the progression of this disease (17). Activating the receptor of melatonin presented a protective effect on spinal cord injury (18). In addition, melatonin showed satisfactory neuroprotection and antioxidation effects on cultured primary cortical neurons deprived of oxygen and sugar, and animal brain injury induced by cerebral ischemic stroke (19). 4. Discussion In this study, we found that melatonin could improve the survival rate of cortical neurons and reduce the apoptosis rate of neurons in fetal rats under high-glucose environment, indicating that melatonin could protect neurons in cortex of fetal rats under high glucose environment. The cerebral cortex is an important anatomical basis for learning and memory and it is vulnerable to various adverse factors. The thickness and volume of cerebral cortex were significantly reduced in diabetic patients, which is the structural basis for learning and memory impairment in diabetic patients (20). High glucose environment can cause apoptosis of cortex and hippocampal neurons (21-22). Bax and Bcl-2 family are very important apoptotic regulatory genes. Bax is apoptosis promoting gene, and Bcl-2 is apoptosis inhibiting gene. In addition, Bcl-2 protein family can not only regulate cell apoptosis but also affect other cell processes, such as cell cycle, calcium signaling, glucose stability, autophagy and etc, which play an important role in cell survival and death (23). Caspase-3 is the main executor of apoptosis, and activation of caspase-3 can cause downstream apoptosis cascade reaction. In this study, we found that the high glucose environment can lead to apoptosis of cortical neurons, and regulated the expression of Bax, Caspase-3 and Bcl-2, and the hypertonic state of mannitol had no effect on neuronal apoptosis and protein levels, suggesting that it is high glucose rather than hyperosmosis directly leads to apoptosis and the changes of relevant protein expression in neurons, Melatonin can reverse the change of Bax, caspase-3 and bcl-2 proteins in cortical neurons induced by high-glucose environment and reduce neuron apoptosis. Autophagy is an important degradation pathway for phagocytosis of aging proteins or organelles in the cytoplasm, which is degraded by autophagy lysosome to complete the metabolic needs of the body and the renewal of aging organelles (24).. Different from other cells, neurons don't have the function of re- division, and can't dilute harmful substances in cells by way of division. Therefore, the autophagic lysosome degradation pathway is particularly important in neurons (3). At present, studies have found that the abnormal autophagy function plays an important role in the occurrence and development of nervous system diseases, such as PD and HD. The regulation of autophagy activity can delay the progress of the disease through devouring damaged mitochondria, reducing oxidative stress and Page 8/17 inhibiting apoptosis (4, 5). The excessive activation of autophagy can promote apoptosis. 4. Discussion In addition, autophagy and apoptosis can exist simultaneously and interact with each other (25). Inhibition of autophagy activity in cerebral ischemia reperfusion rats can improve their neural function (26). At present, there are few studies on autophagy in diabetic encephalopathy, and changes in autophagy activity of cells may be one of the important mechanisms of diabetic encephalopathy (7, 27, 28). Many studies have shown that the neuron apoptosis and cognitive decline in diabetic rats are related to the excessive activation of autophagy, and inhibition of autophagy activity can improve the cognitive function of diabetic mice (7, 27, 28). Diabetic retinopathy and diabetic hearing impairment were associated with elevated levels of autophagy in diabetic nerve cells (6, 29). This study showed that the expression of Beclin-1 and LC3B, two landmark molecules of autophagy, could be increased in high glucose environment, suggesting that high glucose environment could induce autophagy. Melatonin can decrease Beclin-1 and LC3B in high glucose environment, and reduce the apoptosis rate of cortical neurons. It suggests that melatonin can protect cortical neurons by down-regulating autophagy activity. This study is similar to the results of other studies (7, 27, 28). However, some studies showed that the autophagy activity of neurons in diabetic neuropathy and diabetic rats with microvascular disease decreases, and the activation of autophagy can reduce the damage of neurons (30-32). We believe that the differences in these findings are related to the degree of autophagy activation. Moderate autophagy activation has neuroprotective effects, but excessive autophagy activation can induce programmed cell death. Akt/mTOR signaling pathway is an important mechanism for the negative regulation of autophagy. Bcl-2 inhibits autophagy initiation by binding to Beclin-1 in the structural domain of BH3 protein, and mTOR is required to participate in the binding of Beclin1 to BH3 protein. Activation of mTOR directly inhibits autophagic initiation, and mTOR regulates autophagic related protein phosphorylation and thus blocks autophagy (33-35). Studies found that diabetic cognitive dysfunction is related to mTOR signaling pathway, and activation of PI3K/Akt/mTOR signaling pathway can improve nerve defects in diabetic cerebral ischemia reperfusion rats and hyperglycemia induced neurotoxicity of PC-12 cells (22, 36). In addition, activation of Akt/mTOR signaling pathway can promote the growth of posterior axons and improve the functional recovery after stroke (37). 4. Discussion It also found that melatonin can regulate AMPK/mTOR signaling pathway and play a protective role in myocardial ischemia reperfusion (13), reduce the neuron apoptosis induced by focal cerebral ischemia in mice via activating the PI3K/Akt signaling pathway (38), and alleviate nerve defects caused by middle cerebral artery occlusion in adult male rats through activating Akt/mTOR signaling pathway (39). Therefore, we believe that melatonin can regulate Akt/mTOR signaling pathway, which has also been demonstrated in this study. In this study, we found that high glucose environment inhibited the Akt/mTOR signaling pathway of cortical neurons, reduced the expression of Bcl-2, and over-activated the autophagy level of cortical neurons. Melatonin can activate Akt/mTOR pathway, up-regulate the expression of Bcl-2, inhibit the over-activation of autophagy and show neuroprotective effects. Page 9/17 To sum up, melatonin can reduce the apoptosis of cortical neurons under the high-sugar environment by activating Akt/mTOR pathway and following the down-regulation of autophagy, which has a neuroprotective effect. Funding This work was supported by the Innovation Team Foundation of Gannan Medical University (No. TD201705). Availability of data and materials The data that support the findings of this study are available from the corresponding author upon reasonable request. Ethics approval and consent to participate Animal experimental protocols were approved by the Gannan Medical University Animal Care and Use Committee. All animal experiments were performed following the Guidelines for the Care and Use of Laboratory Animals of China Medical University. Authors' contributions Liangdong Li and Zhihua Huang participated in the design of this study, and they both performed the statistical analysis. Lijiao Xiong and Song Liu carried out the study and collected important background information. Lijiao Xiong drafted the manuscript. Chaoming Liu and Tianting Guo provided assistances for data acquisition, data analysis and statistical analysis. All authors have read and approved the final manuscript. Competing interests The authors declare that they have no competing interests References 1. Vieira LL, de Lima Soares RG, Da Silva Felipe SM, de Moura FC, de Castro Brito GA, Pacheco C, Soares PM (2017) Physiological targets for the treatment of diabetic encephalopathy. Cent Nerv Syst Agents Med Chem 17(1):78–86 1. Vieira LL, de Lima Soares RG, Da Silva Felipe SM, de Moura FC, de Castro Brito GA, Pacheco C, Soares PM (2017) Physiological targets for the treatment of diabetic encephalopathy. Cent Nerv Sys Agents Med Chem 17(1):78–86 p Soares PM (2017) Physiological targets for the treatment of diabetic encephalopathy. Cent Nerv Syst Agents Med Chem 17(1):78–86 2. Zilliox LA, Chadrasekaran K, Kwan JY, Russell JW (2016) Diabetes and cognitive impairment. Curr Diab Rep 16(9):87 2. Zilliox LA, Chadrasekaran K, Kwan JY, Russell JW (2016) Diabetes and cognitive impairment. Curr Diab Rep 16(9):87 3. Nixon RA (2013) The role of autophagy in neurodegenerative disease. Nat Med 19(8):983–997 4 Jiang PD Mizushima N (2014) Autophagy and human diseases Cell Res 24(1SI):69 79 3. Nixon RA (2013) The role of autophagy in neurodegenerative disease. Nat Med 19(8):983–997 Page 10/17 3. Nixon RA (2013) The role of autophagy in neurodegenerative disease. Nat Med 19(8):983–997 4. Jiang PD, Mizushima N (2014) Autophagy and human diseases. Cell Res 24(1SI):69–79 Page 10/17 4. Jiang PD, Mizushima N (2014) Autophagy and human diseases. Cell Res 24(1SI):69–79 4. Jiang PD, Mizushima N (2014) Autophagy and human diseases. Cell Res 24(1SI):69–79 Page 10/17 Page 10/17 5. Ghavami S, Shojaeid S, Yeganeh B, Ande SR, Jangamreddy JR, Mehrpour M, Christoffersson J, Chaabane W, Moghadam AR, Kashani HH, Hashemi M, Owji AA, Los MJ (2014) Autophagy and apoptosis dysfunction in neurodegenerative disorders. Prog Neurobiol 112(1):24–49 6. Wang W, Wang Q, Wan D, Sun Y, Wang L, Chen H, Liu C, Petersen RB, Li J, Xue W, Zheng L, Huang K (2017) Histone HIST1H1C/H1.2 regulates autophagy in the development of diabetic retinopathy. Autophage 13(5):941–954 7. Ma L, Lv Y, Huo K, Liu J, Shang S, Fei Y, Li Y, Zhao B, Wei M, Deng Y, Qu Q (2017) Autophagy- lysosome dysfunction is involved in A beta deposition in STZ-induced diabetic rats. Behav Brain Res 320:484–493 8. Kim HA, Lee KH, Lee BH (2014) Neuroprotective effect of melatonin against kainic acid-induced oxidative injury in hippocampal slice culture of rats. Int J Mol Sci 15(4):5940–5951 9. References Dehdashtian E, Mehrzadi S, Yousefi B, Hosseinzadeh A, Reiter RJ, Safa M, Ghaznavi H, Naseripour M (2018) Diabetic retinopathy pathogenesis and the ameliorating effects of melatonin; involvement of autophagy, inflammation and oxidative stress. Life Sci 193:20–33 10. Roohbakhsh A, Shamsizadeh A, Hayes AW, Reiter RJ, Karimi G (2018) Melatonin as an endogenous regulator of diseases: The role of autophagy. Pharmacol Res 133:265–276 11. Ganie SA, Dar TA, Bhat AH, Dar KB, Anees S, Zargar MA, Masood A (2016) Melatonin: A potential anti-oxidant therapeutic agent for mitochondrial dysfunctions and related disorders. Rejuvenation Res 19(1):21–40 12. Paradies G, Paradies V, Ruggiero FM, Petrosillo G (2015) Protective role of melatonin in mitochondrial dysfunction and related disorders. Arch Toxicol 89(6):923–939 12. Paradies G, Paradies V, Ruggiero FM, Petrosillo G (2015) Protective role of melatonin in mitochondrial dysfunction and related disorders. Arch Toxicol 89(6):923–939 13. Chen WR, Liu HB, Chen YD, Sha Y, Ma Q, Zhu PJ, Mu Y (2018) Melatonin Attenuates Myocardial Ischemia/Reperfusion Injury by Inhibiting Autophagy Via an AMPK/mTOR Signaling Pathway. Cell Physiol Biochem 47(5):2067–2076 14. Tuzcu M, Baydas G (2006) Effect of melatonin and vitamin E on diabetes-induced learning and memory impairment in rats. Eur J Pharmacol 537(1–3):106–110 14. Tuzcu M, Baydas G (2006) Effect of melatonin and vitamin E on diabetes-induced learning and memory impairment in rats. Eur J Pharmacol 537(1–3):106–110 15. Olajide OJ, Asogwa NT, Moses BO, Oyegbola CB (2017) Multidirectional inhibition of cortico- hippocampal neurodegeneration by kolaviron treatment in rats. Metab Brain Dis 32(4):1147–1161 15. Olajide OJ, Asogwa NT, Moses BO, Oyegbola CB (2017) Multidirectional inhibition of cortico- hippocampal neurodegeneration by kolaviron treatment in rats. Metab Brain Dis 32(4):1147–1161 16. Negi G, Kumar A, Kaundal RK, Gulati A, Sharma SS (2010) Functional and biochemical evidence indicating beneficial effect of Melatonin and Nicotinamide alone and in combination in experimental diabetic neuropathy. Neuropharmacology 58(3):585–592 16. Negi G, Kumar A, Kaundal RK, Gulati A, Sharma SS (2010) Functional and biochemical evidence indicating beneficial effect of Melatonin and Nicotinamide alone and in combination in experimental diabetic neuropathy. Neuropharmacology 58(3):585–592 17. Buendia I, Parada E, Navarro E, Leon R, Negredo P, Egea J, Lopez MG (2016) Subthreshold concentrations of melatonin and galantamine improves pathological AD-Hallmarks in hippocampal organotypic cultures. Mol Neurobiol 53(5):3338–3348 17. Buendia I, Parada E, Navarro E, Leon R, Negredo P, Egea J, Lopez MG (2016) Subthreshold concentrations of melatonin and galantamine improves pathological AD-Hallmarks in hippocampal organotypic cultures. References Mol Neurobiol 53(5):3338–3348 18. Gao Y, Bai C, Zheng D, Li C, Zhang W, Li M, Guan W, Ma Y (2016) Combination of melatonin and Wnt- 4 promotes neural cell differentiation in bovine amniotic epithelial cells and recovery from spinal cord injury. J Pineal Res 60(3):303–312 18. Gao Y, Bai C, Zheng D, Li C, Zhang W, Li M, Guan W, Ma Y (2016) Combination of melatonin and Wnt- 4 promotes neural cell differentiation in bovine amniotic epithelial cells and recovery from spinal cord injury. J Pineal Res 60(3):303–312 Page 11/17 19. Parada E, Buendia I, Leon R, Negredo P, Romero A, Cuadrado A, Lopez MG, Egea J (2014) Neuroprotective effect of melatonin against ischemia is partially mediated by alpha-7 nicotinic receptor modulation and HO-1 overexpression. J Pineal Res 56(2):204–212 20. Geijselaers SL, Sep SJ, Stehouwer CD, Biessels GJ (2015) Glucose regulation, cognition, and brain MRI in type 2 diabetes: a systematic review. Lancet Diabetes Endocrinol 3(1):75–89 20. Geijselaers SL, Sep SJ, Stehouwer CD, Biessels GJ (2015) Glucose regulation, cognition, and brain MRI in type 2 diabetes: a systematic review. Lancet Diabetes Endocrinol 3(1):75–89 21. Qi WW, Zhong LY, Li XR, Li G, Liu ZX, Hu JF, Chen NH. Hyperglycemia induces the variations of 11beta-hydroxysteroid dehydrogenase type 1 and peroxisome proliferator-activated receptor-gamma expression in hippocampus and hypothalamus of diabetic rats. Exp Diabetes Res, 2012, 2012: 107130 22. Wu J, Zhou SL, Pi LH, Shi XJ, Ma LR, Chen Z, Qu ML, Li X, Nie SD, Liao DF, Pei JJ, Wang S (2017) High glucose induces formation of tau hyperphosphorylation via Cav-1-mTOR pathway: A potential molecular mechanism for diabetes-induced cognitive dysfunction. Oncotarget 8(25):40843–40856 23. Strappazzon F, Vietri-Rudan M, Campello S, Nazio F, Florenzano F, Fimia GM, Piacentini M, Levine B, Cecconi F (2011) Mitochondrial BCL-2 inhibits AMBRA1-induced autophagy. EMBO J 30(7):1195– 1208 24. Tooze SA, Codogno P (2011) Compartmentalized regulation of autophagy regulators: fine-tuning AMBRA1 by Bcl-2. EMBO J 30(7):1185–1186 24. Tooze SA, Codogno P (2011) Compartmentalized regulation of autophagy regulators: fine-tuning AMBRA1 by Bcl-2. EMBO J 30(7):1185–1186 25. Yang M, Yang XM, Yin DH, Tang QL, Wang L, Huang C, Li P, Li SS (2018) Beclin1 enhances cisplatin- induced apoptosis via Bcl-2-modulated autophagy in laryngeal carcinoma cells Hep-2. Neoplasma 65(1):42–48 26. References Wang J, Mei Z, Fu Y, Yang S, Zhang S, Huang W, Xiong L, Zhou H, Tao W, Feng Z (2018) Puerarin protects rat brain against ischemia/reperfusion injury by suppressing autophagy via the AMPK- mTOR-ULK1 signaling pathway. Neural Regen Res 13(6):989–998 27. Kong F, Ma L, Guo J, Xu L, Li Y, Qu S (2018) Endoplasmic reticulum stress/autophagy pathway is involved in diabetes-induced neuronal apoptosis and cognitive decline in mice. Clin Sci 132(1):111– 125 28. Li X, Hue Q, Chen L, Liu S, Su S, Tao H, Zhang L, Sun T, He L (2017) HSPB8 Promotes the Fusion of Autophagosome and Lysosome during Autophagy in Diabetic Neurons. Int J Med Sci 14(13):1335– 1341 29. Huang X, Zhang W, Yuan Y, Liu X, Yang C, Li Q, Zeng J, Zhou K, Liang Y (2017) Implication of autophagy and apoptosis in spiral ganglion cells and cochlear nucleus nuerons in diabetes-induced hearing impairment in rats. Biomed Res-India 28(5):2164–2169 29. Huang X, Zhang W, Yuan Y, Liu X, Yang C, Li Q, Zeng J, Zhou K, Liang Y (2017) Implication of autophagy and apoptosis in spiral ganglion cells and cochlear nucleus nuerons in diabetes-induced hearing impairment in rats. Biomed Res-India 28(5):2164–2169 30. Liu S, Chen L, Li X, Hu Q, He L (2018) Lycium barbarum polysaccharide protects diabetic peripheral neuropathy by enhancing autophagy via mTOR/p70S6K inhibition in Streptozotocin-induced diabetic rats. J Chem Neuroanat 89:37–42 30. Liu S, Chen L, Li X, Hu Q, He L (2018) Lycium barbarum polysaccharide protects diabetic peripheral neuropathy by enhancing autophagy via mTOR/p70S6K inhibition in Streptozotocin-induced diabetic rats. J Chem Neuroanat 89:37–42 31. Guan Z, Tao Y, Zhang X, Guo Q, Liu Y, Zhang Y, Wang Y, Ji G, Wu G, Wang N, Yang H, Yu Z, Guo J, Zhou H (2017) G-CSF and cognitive dysfunction in elderly diabetic mice with cerebral small vessel 31. Guan Z, Tao Y, Zhang X, Guo Q, Liu Y, Zhang Y, Wang Y, Ji G, Wu G, Wang N, Yang H, Yu Z, Guo J, Zhou H (2017) G-CSF and cognitive dysfunction in elderly diabetic mice with cerebral small vessel Page 12/17 Page 12/17 disease: Preventive intervention effects and underlying mechanisms[J]. CNS Neurosci Ther 23(6):462–474 disease: Preventive intervention effects and underlying mechanisms[J]. CNS Neurosci Ther 23(6):462–474 32. Areti A, Komirishetty P, Akuthota M, Malik RA, Kumar A. Melatonin prevents mitochondrial dysfunction and promotes neuroprotection by inducing autophagy during oxaliplatin-evoked peripheral neuropathy. References J Pineal Res, 2017, 62(3) 33. Zhang F, Wang J, Chu J, Yang C, Xiao H, Zhao C, Sun Z, Gao X, Chen G, Han Z, Zou W, Liu T (2015) MicroRNA-146a induced by hypoxia promotes chondrocyte autophagy through Bcl-2. Cell Physiol Biochem 37(4):1442–1453 34. Ryskalin L, Limanaqi F, Frati A, Busceti CL, Fornai F. mTOR-related brain dysfunctions in neuropsychiatric disorders. Int J Mol Sci, 2018, 19(8) 35. Kim YC, Guan K (2015) mTOR: a pharmacologic target for autophagy regulation. mTOR: a pharmacologic target for autophagy regulation. J Clin Invest 125(1):25–32 36. Pan Y, Wang N, Xia P, Wang E, Guo Q, Ye Z (2018) Inhibition of Rac1 ameliorates neuronal oxidative stress damage via reducing Bcl-2/Rac1 complex formation in mitochondria through PI3K/Akt/mTOR pathway. Exp Neurol 300:149–166 37. Mao L, Jia J, Zhou X, Xiao Y, Wang Y, Mao X, Zhen X, Guan Y, Alkayed NJ, Cheng J (2013) Delayed administration of a PTEN inhibitor BPV improves functional recovery after experimental stroke. Neuroscience 231:272–281 38. Kilic U, Caglayan AB, Beker MC, Gunal MY, Caglayan B, Yalcin E, Kelestemur T, Gundogdu RZ, Yulug B Yilmaz B, Kerman BE, Kilic E. Particular phosphorylation of PI3K/Akt on Thr308 via PDK-1 and PTEN mediates melatonin's neuroprotective activity after focal cerebral ischemia in mice. Redox Bio, 12: 657–665 39. Koh P (2008) Melatonin prevents ischemic brain injury through activation of the mTOR/p70S6 kinase signaling pathway. Neurosci Lett 444(1):74–78 Figures Figures Page 13/17 Page 13/17 Figure 1 Effects of melatonin on the cell viability and apoptosis of cortical neurons in high glucose environment. (A) Flow chart of the experiment. The primary fetal cortex neurons were cultured and were mature after 6 days. Melatonin was added for pre-administering for half an hour, and then glucose was added for treatment for 48 h. After that, neurons were collected for experimental detection on the eighth day. (B) Cell viability from the six different groups, Control, 0.1μΜ MLT, 0.3μΜ MLT, 1 μΜ MLT, 3 μΜ MLT, 10 μΜ MLT, were expressed as mean ± SEM. (C) Cell viability from the six different groups, Control, Glucose, Glucose+0.1μΜ MLT, Glucose +0.3μΜ MLT, Glucose+1 μΜ MLT, Glucose+3 μΜ MLT and Glucose+10 μΜ MLT, were expressed as mean ± SEM. (D, E) The percentage of surviving and apoptotic from the different five groups, Control, 0.1 μΜ MLT, Mannitol, Glucose and Glucose+0.1 μΜ MLT, were showed also as mean ± SEM. (F) The data of Annexin V/PI double staining collected by flow cytometry were showed as scatter plot. Results demonstrate that MLT protect the primary cultured neurons from subsequent high glucose toxicity injury. (*P<0.05, **P<0.01, ***P<0.001 vs. Control; #P< 0.05, ##P < 0.01, ###P< 0.001 vs. Glucose) Figure 1 Effects of melatonin on the cell viability and apoptosis of cortical neurons in high glucose environment Figure 1 Figure 1 Effects of melatonin on the cell viability and apoptosis of cortical neurons in high glucose environment. (A) Flow chart of the experiment. The primary fetal cortex neurons were cultured and were mature after 6 days. Melatonin was added for pre-administering for half an hour, and then glucose was added for treatment for 48 h. After that, neurons were collected for experimental detection on the eighth day. (B) Cell viability from the six different groups, Control, 0.1μΜ MLT, 0.3μΜ MLT, 1 μΜ MLT, 3 μΜ MLT, 10 μΜ MLT, were expressed as mean ± SEM. (C) Cell viability from the six different groups, Control, Glucose, Glucose+0.1μΜ MLT, Glucose +0.3μΜ MLT, Glucose+1 μΜ MLT, Glucose+3 μΜ MLT and Glucose+10 μΜ MLT, were expressed as mean ± SEM. (D, E) The percentage of surviving and apoptotic from the different five groups, Control, 0.1 μΜ MLT, Mannitol, Glucose and Glucose+0.1 μΜ MLT, were showed also as mean ± SEM. (F) The data of Annexin V/PI double staining collected by flow cytometry were showed as scatter plot. Results demonstrate that MLT protect the primary cultured neurons from subsequent high glucose toxicity injury. (*P<0.05, **P<0.01, ***P<0.001 vs. Control; #P< 0.05, ##P < 0.01, ###P< 0.001 vs. Glucose) ( ) Glucose+0.1μΜ MLT, Glucose +0.3μΜ MLT, Glucose+1 μΜ MLT, Glucose+3 μΜ MLT and Glucose+10 μΜ MLT, were expressed as mean ± SEM. (D, E) The percentage of surviving and apoptotic from the different five groups, Control, 0.1 μΜ MLT, Mannitol, Glucose and Glucose+0.1 μΜ MLT, were showed also as mean ± SEM. (F) The data of Annexin V/PI double staining collected by flow cytometry were showed as scatter plot. Results demonstrate that MLT protect the primary cultured neurons from subsequent high glucose toxicity injury. (*P<0.05, **P<0.01, ***P<0.001 vs. Control; #P< 0.05, ##P < 0.01, ###P< 0.001 vs. Glucose) Page 14/17 Figure 2 Figure 2 Effects of melatonin on the apoptosis-related proteins expression of Bcl-2, Bax and Caspase-3 on cortical neurons in high-glucose environment. The neuronal cells were cultured in 60 mm dish (4.5×106/well) for Western blot assay, and were cultured on glass sheet in 24 well plates (1×105 /well) for immunofluorescence test. (A-C) Bcl-2, Bax and Caspase-3 localization were showed as fluorescent photo. (D-G) Bcl-2, Bax and Caspase-3 protein level (A) from the different groups, control, 0.1 μΜ MLT, Mannitol, Glucose and Glucose+0.1 μΜ MLT, were expressed as mean ± SEM. Figure 1 Results demonstrate that MLT increases Bcl-2, decreases Bax and Caspase-3 proteins expression in primary cortical neurons injured by high glucose. (*P<0.05, **P<0.01, ***P<0.001 vs. Control; #P< 0.05, ##P < 0.01, ###P< 0.001 vs. Glucose) Figure 2 Effects of melatonin on the apoptosis-related proteins expression of Bcl-2, Bax and Caspase-3 on cortical neurons in high-glucose environment. The neuronal cells were cultured in 60 mm dish (4.5×106/well) for Western blot assay, and were cultured on glass sheet in 24 well plates (1×105 /well) for immunofluorescence test. (A-C) Bcl-2, Bax and Caspase-3 localization were showed as fluorescent photo. (D-G) Bcl-2, Bax and Caspase-3 protein level (A) from the different groups, control, 0.1 μΜ MLT, Mannitol, Glucose and Glucose+0.1 μΜ MLT, were expressed as mean ± SEM. Results demonstrate that MLT increases Bcl-2, decreases Bax and Caspase-3 proteins expression in primary cortical neurons injured by high glucose. (*P<0.05, **P<0.01, ***P<0.001 vs. Control; #P< 0.05, ##P < 0.01, ###P< 0.001 vs. Glucose) Page 15/17 Figure 3 Effects of melatonin on the autophagy related proteins expression of Beclin-1 a neurons in high-glucose environment. (A-B) Beclin-1 and LC3B localization were photo. (C-F) Beclin-1, p-Beclin-1 and LC3B protein level from the different groups Mannitol, Glucose and Glucose+0.1 μΜ MLT, were expressed as mean ± SEM. R Figure 3 Effects of melatonin on the autophagy related proteins expression of Beclin-1 and LC3B on cortical neurons in high-glucose environment. (A-B) Beclin-1 and LC3B localization were showed as fluorescent photo. (C-F) Beclin-1, p-Beclin-1 and LC3B protein level from the different groups, control, 0.1 μΜ MLT, Mannitol, Glucose and Glucose+0.1 μΜ MLT, were expressed as mean ± SEM. Results demonstrate that Figure 3 Figure 3 Effects of melatonin on the autophagy related proteins expression of Beclin-1 and LC3B on cortical neurons in high-glucose environment. (A-B) Beclin-1 and LC3B localization were showed as fluorescent photo. (C-F) Beclin-1, p-Beclin-1 and LC3B protein level from the different groups, control, 0.1 μΜ MLT, Mannitol, Glucose and Glucose+0.1 μΜ MLT, were expressed as mean ± SEM. Results demonstrate that Page 16/17 Page 16/17 MLT decreases Beclin-1, p-Beclin-1 and LC3B proteins expression in primary cortical neurons injured by high glucose. (*P<0.05, **P<0.01, ***P<0.001 vs. Control; #P< 0.05, ##P < 0.01, ###P< 0.001 vs. Glucose) Figure 4 Effects of melatonin on the phosphorylation of AKT/mTOR protein on cortical neurons in high-glucose environment by Western Blot. (A-E) Akt, p-AKT, p-mTOR and mTOR protein level from the different groups, control, 0.1 μΜ MLT, Mannitol, Glucose and Glucose+0.1 μΜ MLT, were expressed as mean ± SEM. Results demonstrate that MLT increases Akt, p-AKT, p-mTOR and mTOR proteins expression in primary cortical neurons injured by high glucose (*P<0 05 **P<0 01 ***P<0 001 vs Control; #P< 0 05 ##P < 0 01 Figure 4 Effects of melatonin on the phosphorylation of AKT/mTOR protein on cortical neurons in high-glucose environment by Western Blot. (A-E) Akt, p-AKT, p-mTOR and mTOR protein level from the different groups, control, 0.1 μΜ MLT, Mannitol, Glucose and Glucose+0.1 μΜ MLT, were expressed as mean ± SEM. Results demonstrate that MLT increases Akt, p-AKT, p-mTOR and mTOR proteins expression in primary cortical neurons injured by high glucose. (*P<0.05, **P<0.01, ***P<0.001 vs. Control; #P< 0.05, ##P < 0.01, ###P< 0.001 vs. Glucose) Page 17/17 Page 17/17
https://openalex.org/W2201044037
https://europepmc.org/articles/pmc4696739?pdf=render
English
null
Correlative Analysis of miRNA Expression and Oncotype Dx Recurrence Score in Estrogen Receptor Positive Breast Carcinomas
PloS one
2,015
cc-by
6,606
Rajyasree Emmadi1*, Emanuele Canestrari2, Zarema H. Arbieva3, Wenbo Mu4, Yang Dai4, Jonna Frasor5, Elizabeth Wiley1 1 Department of Pathology, University of Illinois at Chicago, Chicago, Illinois, United States of America, 2 Center for Pharmaceutical Biotechnology, University of Illinois at Chicago, Chicago, Illinois, United States of America, 3 Core Genomics Facility, University of Illinois at Chicago, Chicago, Illinois, United States of America, 4 Department of Bioengineering, University of Illinois at Chicago, Chicago, Illinois, United States of America, 5 Department of Physiology and Biophysics, University of Illinois at Chicago, Chicago, Illinois, United States of America * emmadi@uic.edu * emmadi@uic.edu RESEARCH ARTICLE Abstract Altered expression of miRNAs has been observed in many types of cancer, including breast cancer, and shown to contribute to cancer growth, aggressiveness, and response to thera- pies. In this pilot study, we investigated the possible correlation of miRNAs with risk of recur- rence of estrogen receptor positive, lymph node-negative mammary carcinomas as determined by the Oncotype DX1 Breast Cancer assay. To accomplish this, we extracted RNA from a collection of breast carcinomas that had previously been analyzed by Oncotype DX1. Multiple Let-7 family members were negatively correlated with the recurrence score (RS), which is consistent with their tumor suppressor properties. Additional miRNAs were found to positively correlate with RS, including miR-377-5p, miR-633b, miR-548t and miR- 3648. Pathway analysis of putative and validated targets suggests that these miRNAs may have a diverse range of functions that may contribute to tumor recurrence. Taken together, these findings provide evidence that a miRNA expression signature can be developed to aid existing methods to determine the risk of recurrence for women with estrogen receptor positive breast cancers treated with endocrine therapy. Editor: Nancy Lan Guo, West Virginia University, UNITED STATES Received: August 23, 2015 Accepted: December 2, 2015 Published: December 30, 2015 Copyright: © 2015 Emmadi et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Received: August 23, 2015 Accepted: December 2, 2015 Published: December 30, 2015 Copyright: © 2015 Emmadi et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Copyright: © 2015 Emmadi et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. OPEN ACCESS Citation: Emmadi R, Canestrari E, Arbieva ZH, Mu W, Dai Y, Frasor J, et al. (2015) Correlative Analysis of miRNA Expression and Oncotype Dx Recurrence Score in Estrogen Receptor Positive Breast Carcinomas. PLoS ONE 10(12): e0145346. doi:10.1371/journal.pone.0145346 Editor: Nancy Lan Guo, West Virginia University, UNITED STATES Correlative Analysis of miRNA Expression and Oncotype Dx Recurrence Score in Estrogen Receptor Positive Breast Carcinomas Rajyasree Emmadi1*, Emanuele Canestrari2, Zarema H. Arbieva3, Wenbo Mu4, Yang Dai4, Jonna Frasor5, Elizabeth Wiley1 Introduction Invasive breast tumors are biologically diverse with different rates of progression, treatment response, and outcomes. The current standard of care requires all newly diagnosed cases of invasive breast cancer to be routinely tested by immunohistochemistry (IHC) for the expres- sion of estrogen receptor alpha (ER), progesterone receptor (PR) and the growth factor recep- tor HER2/neu (ERBB2). ER-positive tumors are treated with endocrine therapy, such as tamoxifen or aromatase inhibitors. However, about one third to one half of patients treated with tamoxifen or other endocrine therapy will develop recurrence, in part due to development of acquired endocrine resistance. The differential responsiveness of ER-positive breast cancers Data Availability Statement: All relevant data are within the paper and its Supporting Information files. Data Availability Statement: All relevant data are within the paper and its Supporting Information files. Funding: This work was supported by the National Institutes of Health (R01 CA130932-05 to JF), and University of Illinois at Chicago Chancellor’s Discovery Fund (JF, EW, and YD). Funding: This work was supported by the National Institutes of Health (R01 CA130932-05 to JF), and University of Illinois at Chicago Chancellor’s Funding: This work was supported by the National Institutes of Health (R01 CA130932-05 to JF), and University of Illinois at Chicago Chancellor’s Discovery Fund (JF, EW, and YD). Discovery Fund (JF, EW, and YD). Competing Interests: The authors have declared that no competing interests exist. Competing Interests: The authors have declared that no competing interests exist. 1 / 12 PLOS ONE | DOI:10.1371/journal.pone.0145346 December 30, 2015 miRNA Expression and Oncotype Dx Recurrence Score in Breast Carcinomas to endocrine therapy is explained by the heterogeneity of these tumors, which has been clearly demonstrated by genome-wide expression profiling studies. The two sub-classifications of ER- positive tumors, representing biologically distinct tumor types, luminal A and luminal B, have been identified, with the luminal A tumors having a good response to endocrine therapy and luminal B tumors responding poorly [1, 2]. Based on gene expression studies, the Oncotype DX1 assay was developed through the NSABP clinical trials [3]. Since 2007, the Association for Clinical Oncology (ASCO) Guidelines have used Oncotype DX1 testing for treatment stratification of ER-positive, lymph node nega- tive breast carcinomas [4]. Oncotype DX1 is a reverse transcription polymerase chain reaction (RT-PCR) based assay that is performed on RNA isolated from formalin fixed paraffin embed- ded (FFPE) tumor tissue blocks. Introduction Based on the expression of 21 genes in the tumor, a Recur- rence Score (RS) is issued. The 16 cancer genes included in the assay are associated with proliferation (Ki67, STK15, Survivin, Cyclin B1, MYBL2), estrogen action (ER, PR, Bcl-2, SCUBE2), HER2/cERBB2 action (GRB7, HER2), invasion (Stromelysin 3, Cathepsin L2), or other functions (GSTM1, CD68 and BAG1). Five reference genes (beta-actin, GADPH, RPLPO, GUS and TFRC) are also included in the assay. The recurrence score is represented by a num- ber between 0 and 100, which correlates to a specific likelihood of breast cancer recurrence within 10 years of initial diagnosis. The scores are grouped into 3 risk categories (low: RS 17, intermediate: RS = 18–30, and high: RS>31). Oncologists use the RS to tailor the use of chemo- therapies based on the finding that women with high RS benefit from chemotherapy whereas women with low RS do not [5]. Hence, women at low risk for recurrence may avoid the toxicity of chemotherapy and be successfully managed with hormonal therapy alone. Patients with high RS, on the other hand, are at an increased risk of recurrence and may receive one or both types of therapy. Little is known about what distinguishes the intermediate from the high RS groups so they generally receive similar therapies. In fact, in 2006, the National Cancer Institute (NCI) sponsored a prospective randomized clinical trial, the TAILORx trial, involving hor- mone-receptor-positive, HER2-negative, axillary node-negative breast cancers less than 5.0 cm in size, assigned to one of three treatment arms based on their OncotypeDX RS results. The results of this trial have recently been released, showing that patients with tumors that had favorable gene-expression profiles (RS of 0–10) had very low rates of recurrence at 5 years with endocrine therapy alone. Of note, however, is that new cut-offs were used to designate the three subgroups of RS compared to the original OncotypeDX assay. The new RS ranges were 0–10 (low risk), 11–25 (intermediate risk) and 26 (high risk), in contrast to prior ranges of <18, 18–30 and 31, respectively. The overall sample size of 10,253 women was driven by the need to include a sufficient number of patients in the ‘new’ intermediate risk range of RS of 11–25. PLOS ONE | DOI:10.1371/journal.pone.0145346 December 30, 2015 miRNA Profiling RNA was extracted from each sample using the FFPE RNA Purification Kit, according to the manufacturer’s instructions (Norgen Biotek Corp., Thorold, ON, Canada). The quality of the total RNA was verified by Agilent 2100 Bioanalyzer profile. Total RNA from each sample was labeled with Hy3 and a reference sample, consisting of equal amounts of total RNA combined from every individual sample, was labeled with Hy5 fluorescent label, using the miRCURY LNAmicroRNA Hi-Power Labeling Kit (Exiqon, Denmark) following the procedure described by the manufacturer. The Hy3-labeled samples and a Hy5-labeled reference sample were mixed pair-wise and hybridized to the miRCURY LNA microRNA Array 6th gen (Exiqon, Denmark), which contains capture probes targeting all microRNAs for human, mouse or rat registered in the miRBASE 16.0. The hybridization was performed using a Tecan HS4800 hybridization station (Tecan, Austria). After hybridization the microarray slides were scanned and stored in an ozone free environment (ozone level below 2.0 ppb) in order to prevent poten- tial bleaching of the fluorescent dyes. The miRCURY LNA microRNA Array slides were scanned using the Agilent G2565BA Microarray Scanner System (Agilent Technologies, Inc., USA) and the image analysis was carried out using ImaGene 9 software (Exiqon, Denmark). The quantified signals were background corrected (Normexp with offset value 10) [16] and normalized using the global Lowess regression algorithm. Introduction In addition to gene expression signatures, recent studies have revealed associations between miRNAs and tumor expression of ER, PR and HER2, as well as breast carcinoma subtypes and tumor grades [6, 7]. In addition to these correlative studies, specific miRNAs have been shown to play key roles in hormone-dependent breast cancer biology. For example, down-regulation of miR-451 can promote breast cancer cell survival and endocrine resistance [8], a miR- NA196a2-TP63 circuit controls breast cancer proliferation and invasiveness properties [9], loss of miR-200c promotes breast cancer cell migration and invasion [10], and down-regulation of miR-29 contributes to progestin-induced stem cell expansion [11]. Let-7 family members have been found to inhibit breast cancer stem cell renewal [12] and have been implicated in tamoxi- fen response through modulation of ER levels [13]. Furthermore, miRNAs that are differen- tially expressed in tamoxifen-sensitive vs. resistant cell lines and tumors have been identified [14, 15]. These findings suggest that miRNAs may function as biomarkers of tumor response to therapy and/or risk of recurrence, as well as important drivers of these phenotypically PLOS ONE | DOI:10.1371/journal.pone.0145346 December 30, 2015 2 / 12 miRNA Expression and Oncotype Dx Recurrence Score in Breast Carcinomas different tumors. In this study we conducted miRNA profiling in a collection of breast tumors with previous testing for recurrence risk by the Oncotype DX1 assay in an attempt to identify additional miRNAs biomarkers of breast tumor recurrence and poor outcome in patients with ER-positive breast cancers. This is a pilot study with a small sample size. However, cases were selected to span the range of the Oncotype DX1 Recurrence Scores. We acknowledge the limi- tations of the study including retrospective analysis and a small sample size. Patient Cohort and Tumor Characteristics This research was a retrospective, non-interventional analysis, conducted following approval from the Institutional Review Boards (IRBs) of the University of Illinois Cancer Center and Provena Saint Joseph Medical Center in Illinois. The research was judged to qualify for waiver of informed consent based on the provisions under HHS regulations at 45 CFR 46.116(d). The research did not involve any risk to patients, data was anonymized and no patient identifiers were included. Formalin-fixed, paraffin-embedded (FFPE) tumor tissues from twenty-three cases of early stage breast carcinomas representing low, intermediate and high Oncotype DX Recurrence Score were obtained. Patient samples and clinical data were collected and processed in compliance with protocols approved by the University of Illinois Cancer Center and Provena Saint Joseph Medical Center Institutional Review Boards. Tumor tissue was macro-dissected by comparison to an adjacent H&E stained section to ensure that tissue used for miRNA analy- sis contained >70% tumor, in accordance with samples sent for Oncotype DX1 testing. Clini- cal data collected on each patient included information on ER, PR, p53, Ki67 and Her2 status for correlation with study results (Table 1). Data Analysis Principal Components Analysis (PCA) was performed using the top 50 microRNAs that had the largest variation across all samples (Fig 1). A heatmap diagram was generated based on the two-way clustering method with the complete-linkage and Euclidean distance measurement 3 / 12 PLOS ONE | DOI:10.1371/journal.pone.0145346 December 30, 2015 miRNA Expression and Oncotype Dx Recurrence Score in Breast Carcinomas Table 1. Patient and tumor characteristics. ID RS Group Recurrence Risk (%) ER PR p53 Ki67 Her2 Age Race S2 3 Low 4 81 52 13 0 1.7 54 White S53 6 Low 5 30 75 0 6 0 46 White S70 7 Low 6 97 50 9 16 1.1 45 AA S46 8 Low 6 20 9 0 2 0.2 58 White S30 9 Low 6 93 63 0 8 0 62 White S21 11 Low 8 50 48 0 2 0 73 White S11 12 Low 8 66 57 0 7 0.5 60 White S20 12 Low 8 56 18 1 4 0.6 52 White S7 14 Low 9 29 19 10 23 0.9 57 White S23 14 Low 9 87 85 1 8 1 54 White S63 14 Low 9 72 78 0 7 1.4 52 White S33 16 Low 10 90 68 0 13 0.2 65 White S26 26 Int 17 98 97 13 53 1 46 White S29 26 Int 17 1 2 7 3 1.2 70 White S8 27 Int 17 88 42 16 3 1.12 70 White S16 29 Int 20 83 71 36 17 0 75 White S58 31 High 21 37 42 0 9 0.9 50 White S25 32 High 22 29 86 5 14 1.9 53 White S12 38 High 26 95 91 14 42 0 47 Asian S49 39 High 27 58 62 2 21 1.4 55 White S64 40 High 27 100 37 2 63 1.4 59 White S6 47 High 32 29 52 0 33 0.3 43 White S32 56 High 34 23 2 1 31 1.4 48 White doi:10.1371/journal.pone.0145346.t001 Table 1. Patient and tumor characteristics. (Fig 2). The intermediate RS group was included in the high RS group since the number of sam- ples in the former was small. Student’s t-test was performed for differential expression analysis between low RS and high RS groups. Pearson correlation coefficient was used for correlation tests between the expression value of individual microRNAs and RS. All p-values were adjusted (Fig 2). The intermediate RS group was included in the high RS group since the number of sam- ples in the former was small. Student’s t-test was performed for differential expression analysis between low RS and high RS groups. doi:10.1371/journal.pone.0145346.t001 Pearson correlation coefficient was used for correlation tests between the expression value of individual microRNAs and RS. All p-values were adjusted Fig 1. Principal components analysis. Principal components analysis performed on all samples using the top 50 miRNAs showing the highest standard deviation across all samples. doi:10.1371/journal.pone.0145346.g001 Fig 1. Principal components analysis. Principal components analysis performed on all samples using the top 50 miRNAs showing the highest standard deviation across all samples. Fig 1. Principal components analysis. Principal components analysis performed on all samples using the top 50 miRNAs showing the highest standard deviation across all samples. doi:10.1371/journal.pone.0145346.g001 doi:10.1371/journal.pone.0145346.g001 PLOS ONE | DOI:10.1371/journal.pone.0145346 December 30, 2015 4 / 12 miRNA Expression and Oncotype Dx Recurrence Score in Breast Carcinomas Fig 2. Heat map of unsupervised hierarchical clustering. Hierarchical clustering performed on all samples using the top 50 miRNAs showing the highest standard deviation across all samples. doi:10.1371/journal.pone.0145346.g002 Fig 2. Heat map of unsupervised hierarchical clustering. Hierarchical clustering performed on all samples using the top 50 miRNAs showing the highest standard deviation across all samples. doi:10.1371/journal.pone.0145346.g002 Fig 2. Heat map of unsupervised hierarchical clustering. Hierarchical clustering performed on all samples using the top 50 miRNAs showing the highest standard deviation across all samples. doi:10.1371/journal.pone.0145346.g002 doi:10.1371/journal.pone.0145346.g002 based on the Benjamini-Hochberg procedure. The threshold for the adjusted p-value <0.05 was used to determine the significant correlation (Table 2). The analysis was carried out using pack- ages in R. Predicted and Validated miRNA Targets The miRNA story is an evolving one and the currently available databases are still incomplete. In order to maximize the information for correlative analysis, we looked at multiple miRNA databases. Predicted miRNA targets were obtained using DIANA-microT-CDS [17, 18]. Vali- dated miRNA targets were obtained using miRWalk with a default p-value of 0.05 [19]. The findings of the predicted miRNA targets and pathways are presented in Fig 3 and validated tar- gets and pathways are presented in Table 3 and Fig 4. Pathway Analysis Predicted targets. miRNA targets were predicted based on DIANA-microT-CDS. The combined effect of groups of miRNAs on pathways was determined based on the union of tar- get genes for enrichment analysis using DIANA miRPath v.2.0 (Vlachos). Heatmaps were gen- erated using the log-transformed enrichment p-values as features for each miRNA. [20]. 5 / 12 PLOS ONE | DOI:10.1371/journal.pone.0145346 December 30, 2015 miRNA Expression and Oncotype Dx Recurrence Score in Breast Carcinomas Table 2. Differential expression of miRNAs. High vs. Low (T-test) Low vs. Int vs. High (ANOVA) Correlation Analysis miRNA Annotation Log FC Adj. P. Val Adj. P. Val Correlation Coefficient Adj. P.Val hsa-let-7c -1.506 5.04E-03 0.115 -0.7503 9.22E-03 hsa-let-7b -1.716 7.35E-03 0.115 -0.7278 1.36E-02 hsa-let-7a -1.348 2.23E-02 0.115 -0.6774 2.71E-02 hsa-miR-126 -1.108 2.64E-02 hsa-miR-193a-5p -0.976 2.95E-02 hsa-let-7d -0.933 3.68E-02 hsa-miR-126* -0.819 3.68E-02 hsa-miR-26b -1.192 3.68E-02 hsa-miR-30c -1.167 3.68E-02 hsa-miR-3648 0.651 3.68E-02 0.7085 1.91E-02 hsa-miR-492 0.539 3.83E-02 hsa-miR-361-5p 0.340 3.93E-02 hsa-miR-4328 -1.014 3.93E-02 hsa-miR-663b 0.631 3.93E-02 0.6837 2.65E-02 hsa-miR-1914 0.332 3.98E-02 hsa-miR-195 -1.261 3.98E-02 hsa-miR-663 0.416 3.98E-02 hsa-miR-29c -1.314 4.01E-02 hsa-miR-377-5p 0.235 4.60E-02 4.23E-02 0.7886 3.87E-03 hsa-miR-143 -1.144 4.64E-02 hsa-miR-26a -1.032 4.64E-02 hsa-miR-1297 -0.795 4.80E-02 hsa-let-7f -0.962 4.98E-02 hsa-let-7f-1* 0.253 4.98E-02 hsa-miR-4301 -0.765 4.98E-02 hsa-miR-548t 0.6886 2.65E-02 doi:10.1371/journal.pone.0145346.t002 Table 2. Differential expression of miRNAs. High vs. Low (T-test) Low vs. Int vs. High (ANOVA) Correlation Analysis miRNA Annotation Log FC Adj. P. Val Adj. P. Val Correlation Coefficient Adj. P.Val hsa-let-7c -1.506 5.04E-03 0.115 -0.7503 9.22E-03 hsa-let-7b -1.716 7.35E-03 0.115 -0.7278 1.36E-02 hsa-let-7a -1.348 2.23E-02 0.115 -0.6774 2.71E-02 hsa-miR-126 -1.108 2.64E-02 hsa-miR-193a-5p -0.976 2.95E-02 hsa-let-7d -0.933 3.68E-02 hsa-miR-126* -0.819 3.68E-02 hsa-miR-26b -1.192 3.68E-02 hsa-miR-30c -1.167 3.68E-02 hsa-miR-3648 0.651 3.68E-02 0.7085 1.91E-02 hsa-miR-492 0.539 3.83E-02 hsa-miR-361-5p 0.340 3.93E-02 hsa-miR-4328 -1.014 3.93E-02 hsa-miR-663b 0.631 3.93E-02 0.6837 2.65E-02 hsa-miR-1914 0.332 3.98E-02 hsa-miR-195 -1.261 3.98E-02 hsa-miR-663 0.416 3.98E-02 hsa-miR-29c -1.314 4.01E-02 hsa-miR-377-5p 0.235 4.60E-02 4.23E-02 0.7886 3.87E-03 hsa-miR-143 -1.144 4.64E-02 hsa-miR-26a -1.032 4.64E-02 hsa-miR-1297 -0.795 4.80E-02 hsa-let-7f -0.962 4.98E-02 hsa-let-7f-1* 0.253 4.98E-02 hsa-miR-4301 -0.765 4.98E-02 hsa-miR-548t 0.6886 2.65E-02 doi:10.1371/journal.pone.0145346.t002 Fig 3. Pathway analysis for putative miRNA target genes. Pathways showing significant enrichment in putative target genes for miRNAs positively correlated with recurrence score (left) or negatively correlated with recurrence score (right) were clustered. doi:10.1371/journal.pone.0145346.g003 PLOS ONE | DOI:10 1371/journal pone 0145346 December 30 2015 6 / 12 Fig 3. Pathway analysis for putative miRNA target genes. Pathways showing significant enrichment in putative target genes for miRNAs positively correlated with recurrence score (left) or negatively correlated with recurrence score (right) were clustered. doi:10 1371/journal pone 0145346 g003 Fig 3. Pathway analysis for putative miRNA target genes. Pathways showing significant enrichment in putative target genes for miRNAs positively correlated with recurrence score (left) or negatively correlated with recurrence score (right) were clustered Fig 3. Pathway analysis for putative miRNA target genes. doi:10.1371/journal.pone.0145346.t002 PLOS ONE | DOI:10.1371/journal.pone.0145346 December 30, 2015 Pathways showing significant enrichment in putative target genes for miRNAs positively correlated with recurrence score (left) or negatively correlated with recurrence score (right) were clustered. Fig 3. Pathway analysis for putative miRNA target genes. Pathways showing significant enrichment in putative target genes for miRNAs positively correlated with recurrence score (left) or negatively correlated with recurrence score (right) were clustered. d i 10 1371/j l 0145346 003 doi:10.1371/journal.pone.0145346.g003 PLOS ONE | DOI:10.1371/journal.pone.0145346 December 30, 2015 6 / 12 miRNA Expression and Oncotype Dx Recurrence Score in Breast Carcinomas Table 3. Validated gene targets for miR-377-5p and miR-663b using miRWalk. miR-377-5p Gene Name Entrez ID Ensmbl ID LAMA1 284217 ENSG00000101680 CHRD 8646 ENSG00000090539 MITF 4286 ENSG00000187098 NOG 9241 ENSG00000183691 CYP7A1 1581 ENSG00000167910 CDKN1A 1026 ENSG00000124762 IFNG 3458 ENSG00000111537 PAK1 5058 ENSG00000149269 IL1B 3553 ENSG00000125538 PPM1A 5494 ENSG00000100614 NOS2A 4843 ENSG00000007171 PKN1 5585 ENSG00000123143 TNF 7124 ENSG00000232810 SOD1 6647 ENSG00000142168 HMOX1 3162 ENSG00000100292 SOD2 6648 ENSG00000112096 DICER1 23405 ENSG00000100697 COMP 1311 ENSG00000105664 ERBB2 2064 ENSG00000141736 GHRHR 2692 ENSG00000106128 miR-663b Gene Name Entrez ID Ensmbl ID EPHB2 2048 ENSG00000133216 LATS2 26524 ENSG00000150457 KRAS 3845 ENSG00000133703 CCND2 894 ENSG00000118971 TXNIP 10628 ENSG00000117289 doi:10.1371/journal.pone.0145346.t003 Table 3. Validated gene targets for miR-377-5p and miR-663b using miRWalk. Validated targets. Validated miRNA targets were available only for miR-377-5p (miR- 377) and miR-663b using miRWalk. No gene targets were elucidated for miR-3648 and miR- 748t. The gene targets for miR-377-5p and miR-663b were combined and pathway enrichment analysis was performed using the Panther classification system v9.0 and Panther pathway, enriched with a default p-value of 0.05 [21, 22]. Results Genome wide profiling of miRNA expression in 23 human breast tumors was carried out using a locked nucleic acid (LNA) based microRNA array that contained ~2800 capture probes com- plementary to mature microRNAs based on miRBase v16 (Exiqon). All tumors were ER-posi- tive, lymph node-negative, invasive mammary carcinomas. Clinical and laboratory data collected for each patient are shown in Table 1 and include the Recurrence Score (RS) based on the Oncotype DX1 assay and the estimated risk of recurrence (R-Rate). The tumors profiled included 12 low, 4 intermediate and 7 high RS scores. Principal components analysis (PCA), which was conducted for the top 50 miRNAs with the largest variation in expression across all samples, revealed that the tumors with high or low RS largely clustered independently of each other but that tumors with intermediate RS were 7 / 12 PLOS ONE | DOI:10.1371/journal.pone.0145346 December 30, 2015 miRNA Expression and Oncotype Dx Recurrence Score in Breast Carcinomas Fig 4. Pathway analysis for validated miRNA target genes. Pathways showing enrichment in validated targets genes for miR-377-5p and miR-663b. Fig 4. Pathway analysis for validated miRNA target genes. Pathways showing enrichment in validated targets genes for miR-377-5p and miR-663b. doi:10 1371/journal pone 0145346 g004 Fig 4. Pathway analysis for validated miRNA target genes. Pathways showing enrichment in validated targets genes for miR-377-5p and miR-663b. d miRNA target genes. Pathways showing enrichment in validated targets genes for miR-377-5p and miR-663b. Fig 4. Pathway analysis for validated miRNA target genes. Pathways showing enrichment in validated ta doi:10.1371/journal.pone.0145346.g004 more widely distributed (Fig 1). Of the samples with low RS, one (#S7) was more closely related to the high RS samples than other tumors with low RS. Two-way hierarchical clustering by miRNA expression levels confirmed the relationship between samples and recurrence score groups (Fig 2). To identify specific miRNAs that are associated with RS, two types of analyses were per- formed. First, differential expression of miRNAs between the low and high RS groups was car- ried out using Student’s T test followed by Benjamini Hochberg adjustment for multiple tests. Twenty-five miRNAs were found to be statistically different (P<0.05) between the two groups (Table 2). However, when all samples were analyzed as three groups (low, intermediate, and high) using ANOVA and Benjamini Hochberg adjustment, only three of miRNAs remained as significantly different among the groups. PLOS ONE | DOI:10.1371/journal.pone.0145346 December 30, 2015 miRNA Expression and Oncotype Dx Recurrence Score in Breast Carcinomas Fig 5. Correlation analysis between miRNA expression level and recurrence score. The relationship between miRNA expression and recurrence score is shown for seven miRNAs with a statistically significant correlation. Fig 5. Correlation analysis between miRNA expression level and recurrence score. The relationship between miRNA expression and recurrence score is shown for seven miRNAs with a statistically significant correlation. doi:10.1371/journal.pone.0145346.g005 miRNAs showing negative correlation with RS comprise several members of the Let-7 fam- ily, which have been found to inhibit breast cancer stem cell renewal [12] and have been impli- cated in Tamoxifen response through modulation of ER levels [13]. However, little is known about the other miRNAs (miR-377-5p, miR-663b, miR-548T and miR-3648) that we found to be higher in breast tumors with high RS. To determine pathways that may be controlled by these miRNAs, DIANA miRPath was first used to identify putative targets (see S1 Data for complete results). The union of the puta- tive targets from Let-7a, 7b and 7c (all negatively correlated with RS) and the union of putative targets from miR-663b, miR-377-5p and miR-3648 (all positively correlated with RS) were sep- arately used for pathway enrichment analysis. The miRNAs were then clustered based on the log-transformed enrichment p-values and visualized in heatmaps. As shown in Fig 3, target genes for miRNAs positively correlated with RS are fairly divergent with chemical carcinogene- sis and xenobiotic metabolism associated miR-3648, and glycan degradation and systemic lupus erythematosus with miR-633b. ErbB signaling, on the other hand, was enriched for both miR-377-5p and miR-633b. In contrast, pathways well characterized in breast cancer progres- sion (PI3K/AKT, MAPK, cytokines, and WNT), are highly enriched for all three Let-7 family members showing positive correlation with RS score. Validated gene targets obtained for miR-377-5p and miR-663b using miRWalk (Table 3) were then used for pathway enrichment analysis using PANTHER 9.0 and showed association with multiple pathways, in particular those involving angiogenesis, EGF receptor signaling, inflammation mediated by chemokines and cytokines, integrin signaling, PI3 kinase, TGF-beta signaling and Ras and p53 pathway feedback loops (Fig 4). Results In the second approach, correlation analysis between miRNA expression levels and the actual RS was conducted. Expression levels for seven miR- NAs were significantly correlated with RS (Fig 5), six of which overlapped with other analyses as indicated in Table 2. 8 / 12 PLOS ONE | DOI:10.1371/journal.pone.0145346 December 30, 2015 Discussion Several publications have looked at the miRNA expression profiles in breast carcinoma cell lines and tumor tissues. Most of the studies have varied representation of the different subtypes of breast carcinoma (luminal, basal-like, Her2-enriched) and with or without lymph node 9 / 12 PLOS ONE | DOI:10.1371/journal.pone.0145346 December 30, 2015 miRNA Expression and Oncotype Dx Recurrence Score in Breast Carcinomas involvement. As a result, mixed (non subtype-specific) miRNA signatures emerge and have been reported in ranges of 1–21 miRNAs [23–27]. Commonly reported differential expressions include upregulation of miR-21, miR-155, miR-206, miR-122a and miR-210 and downregulation of let-7, miR-10b, miR-125a, miR-125b and miR-145. Putative or validated target gene and path- way analyses demonstrate involvement of oncogenes and tumor suppressors, such as ErbB2, Akt, NF-κB, Myc, p53, Rb and PTEN with consequent proliferation and cell survival effects as well as inhibition of apoptosis. While cell cycle and proliferation signals would be expected to correlate with outcomes, other signatures described are associated with hypoxia, cytokines, stroma and chromosomal instability. In essence it appears that different reported signatures may represent different aspects of ultimate multifactorial mechanisms. Several of the miRNAs associated with RS in ER+ breast tumors have been described to play a role in cancer progression. For example, Let-7 family members, which in this study were found to be down-regulated in tumors with high recurrence score, have been found to inhibit breast cancer stem cell renewal [12] and have been implicated in tamoxifen response through modulation of ER levels [13]. On the other hand, little is known about the other miRNAs that we find to be higher in breast tumors with high RS. The inferences we have made by correlating the results of our analyses and literature are presented. 1. miRNA profiling captures basic biological relationship between high vs low risk of recurrence. More refined risk prediction is needed—both Oncotype DX1 and the Mamma- Print1 assays have a discordance rate between the assay prediction and clinical-pathologic risk category of approximately 30% [28]. 1. miRNA profiling captures basic biological relationship between high vs low risk of recurrence. More refined risk prediction is needed—both Oncotype DX1 and the Mamma- Print1 assays have a discordance rate between the assay prediction and clinical-pathologic risk category of approximately 30% [28]. 1. miRNA profiling captures basic biological relationship between high vs low risk of recurrence. PLOS ONE | DOI:10.1371/journal.pone.0145346 December 30, 2015 Discussion More refined risk prediction is needed—both Oncotype DX1 and the Mamma- Print1 assays have a discordance rate between the assay prediction and clinical-pathologic risk category of approximately 30% [28]. 2. The intermediate group does not represent a unique group biologically but appears to be distributed along a continuum of high to low. This is similar to findings reported previ- ously by Ivshina et al, who found 6 markers that could effectively separate grade 1 and grade 3 tumors and could also separate grade 2 tumors into two highly discriminate classes [29]. 2. The intermediate group does not represent a unique group biologically but appears to be distributed along a continuum of high to low. This is similar to findings reported previ- ously by Ivshina et al, who found 6 markers that could effectively separate grade 1 and grade 3 tumors and could also separate grade 2 tumors into two highly discriminate classes [29]. 3. Suppression of the Let-7 family is associated with increased RS score. Of particular inter- est is the reduced expression of Let-7 family members in cases with high RS. Six family members were found to be significantly associated with low risk of recurrence using at least one statistical analysis. The hsa-let-7 family is well established as a tumor suppressor with interactions with cell cycle proliferative genes including Aurora Kinase A (AURKA), which it downregulates [30]. A recent meta-analysis shows a significant correlation between increased AURKA expression and decreased metastasis-free survival in ER-positive breast cancers [31]. The hsa-let-7 family involvement in breast carcinoma is well documented and serves to confirm the validity of our findings. 3. Suppression of the Let-7 family is associated with increased RS score. Of particular inter- est is the reduced expression of Let-7 family members in cases with high RS. Six family members were found to be significantly associated with low risk of recurrence using at least one statistical analysis. The hsa-let-7 family is well established as a tumor suppressor with interactions with cell cycle proliferative genes including Aurora Kinase A (AURKA), which it downregulates [30]. A recent meta-analysis shows a significant correlation between increased AURKA expression and decreased metastasis-free survival in ER-positive breast cancers [31]. The hsa-let-7 family involvement in breast carcinoma is well documented and serves to confirm the validity of our findings. 4. Novel miRNAs involved in breast carcinoma. Acknowledgments This research was supported by the University of Illinois at Chicago through the Chancellor’s Discovery Fund (JF, EW, YD) and the National Institute of Health (R01 CA130932-05 to JF). The research was conducted in collaboration with Provena St. Joseph Medical Center after This research was supported by the University of Illinois at Chicago through the Chancellor’s Discovery Fund (JF, EW, YD) and the National Institute of Health (R01 CA130932-05 to JF). The research was conducted in collaboration with Provena St. Joseph Medical Center after obtaining IRBs from each institution. We thank Dr. J. Natarelli (Provena St. Joseph Medical center, Pathology) for reviewing the cases and selecting tumor tissue blocks for analysis. Author Contributions Conceived and designed the experiments: RE JF YD. Performed the experiments: RE EC ZA WM YD. Analyzed the data: RE JF ZA WM YD. Contributed reagents/materials/analysis tools: RE JF ZA YD W t th RE JF EW YD y J g / / y RE JF ZA YD. Wrote the paper: RE JF EW YD. RE JF ZA YD. Wrote the paper: RE JF EW YD. Discussion The three miRNAs (hsa-miR-377-5p, hsa- miR-663b and hsa-miR-3648) that are positively correlated with high Oncotype DX1 RS scores have not been previously detailed in association with breast carcinoma outcomes. Very little specific data exists regarding the interactions and roles of these miRNAs with regard to ER-positive breast carcinoma. 4. Novel miRNAs involved in breast carcinoma. The three miRNAs (hsa-miR-377-5p, hsa- miR-663b and hsa-miR-3648) that are positively correlated with high Oncotype DX1 RS scores have not been previously detailed in association with breast carcinoma outcomes. Very little specific data exists regarding the interactions and roles of these miRNAs with regard to ER-positive breast carcinoma. Information available via the tools listed suggest that multiple pathways are involved by miR-377-5p and miR-663b, affecting tumor suppressor functions (LATS2, TXNIP, wtKRAS, CDKN1A, PPM1A), cytoskeleton regulation (PAK1, PKN1) and a proinflammatory and reac- tive oxygen species adaptive response (TNF, IFNG, IL1B, HMOX1, SOD1 and SOD2). We infer that multiple factors are involved in separating those tumors that have a high RS score includ- ing specific proliferation advantages as well as suppression of tumor response mechanisms. While these genes and pathways may represent possible therapeutic targets for tumor sup- pression, these miRNAs also are of particular interest as they may provide novel approaches 10 / 12 PLOS ONE | DOI:10.1371/journal.pone.0145346 December 30, 2015 miRNA Expression and Oncotype Dx Recurrence Score in Breast Carcinomas for specific, targeted, less toxic systemic treatment protocols in the future. Progress in micro- RNA-directed therapeutic approaches offers hope that such strategies might prove useful in reversing endocrine resistance and reducing breast cancer recurrence. for specific, targeted, less toxic systemic treatment protocols in the future. Progress in micro- RNA-directed therapeutic approaches offers hope that such strategies might prove useful in reversing endocrine resistance and reducing breast cancer recurrence. PLOS ONE | DOI:10.1371/journal.pone.0145346 December 30, 2015 References Cittelly DM, Finlay-Schultz J, Howe EN, Spoelstra NS, Axlund SD, Hendricks P, et al. Progestin sup- pression of miR-29 potentiates dedifferentiation of breast cancer cells via KLF4. Oncogene. 2013 May 16; 32(20):2555–64 doi: 10.1038/onc.2012.275 PMID: 22751119 12. Yu F, Yao H, Zhu P, Zhang X, Pan Q, Gong C, et al. let-7 Regulates Self Renewal and Tumorigenicity of Breast Cancer Cells. Cell 2007; 131(6):1109–1123 PMID: 18083101 13. Zhao Y, Deng C, Lu W, Xiao J, Ma D, Guo M, et al. let-7 MicroRNAs Induce Tamoxifen Sensitivity by Downregulation of Estrogen Receptor α Signaling in Breast Cancer. Mol Med. 2011; 17(11–12)1233– 1241 doi: 10.2119/molmed.2010.00225 PMID: 21826373 14. Miller TE, Ghoshal K, Ramaswamy B, Roy S, Datta J, Shapiro CL, et al. MicroRNA-221/222 confers tamoxifen resistance in breast cancer by targeting p27Kip1. J Biol Chem. 2008 Oct 31; 283 (44):29897–903. doi: 10.1074/jbc.M804612200 PMID: 18708351 15. Manavalan TT, Teng Y, Appana SN, Datta S, Kalbfleisch TS, Li Y, et al. Differential expression of micro- RNA expression in tamoxifen-sensitive MCF-7 versus tamoxifen-resistant LY2 human breast cancer cells. Cancer Letters, 2011; 313(1):26–43. doi: 10.1016/j.canlet.2011.08.018 PMID: 21955614 16. Ritchie ME, Silver J, Oshlack A, Holmes M, Diyagama D, Holloway A, et al. A comparison of back- ground correction methods for two-colour microarrays. Bioinformatics. 2007; 23(20):2700–2707. PMID: 17720982 17. Paraskevopoulou MD, Georgakilas G, Kostoulas N, Vlachos IS, Vergoulis T, Reczko M, at al. DIANA- microT web server v5.0: service integration into miRNA functional analysis workflows. Nucleic Acids Res. 2013 Jul; 41(Web Server issue):W169–73. doi: 10.1093/nar/gkt393 PMID: 23680784 18. Reczko M, Maragkakis M, Alexiou P, Grosse I, Hatzigeorgiou AG. Functional microRNA targets in pro- tein coding sequences. Bioinformatics. 2012; 28(6):771–776. doi: 10.1093/bioinformatics/bts043 PMID: 22285563 19. Dweep H, Sticht C, Pandey P, Gretz N. miRWalk—database: prediction of possible miRNA binding sites by "walking" the genes of 3 genomes, Journal of Biomedical Informatics. 2011; 44: 839–7. doi: 10.1016/j.jbi.2011.05.002 PMID: 21605702 20. Vlachos IS, Kostoulas N, Vergoulis T, Georgakilas G, Reczko M, Maragkakis M, et al. DIANA miRPath v.2.0: investigating the combinatorial effect of microRNAs in pathways. Nucleic Acids Research 2012 Jul; 40(Web server issue): W498–504. doi: 10.1093/nar/gks494 PMID: 22649059 21. Mi H, Muruganujan A, Thomas PD. PANTHER in 2013: modeling the evolution of gene function, and other gene attributes, in the context of phylogenetic trees. Nucl. Acids Res. 2013; 41(D1):D377–D386. 22. Mi H, Thomas PD. Protein Networks and Pathway Analysis. Methods in Molecular biology, 2009; 563 Part 2: 123–140. 23. References 1. Voduc KD, Cheang M, Tyldesley S, Gelmon K, Nielsen TO, Kennecke H. Breast Cancer Subtypes and the Risk of Local and Regional Relapse. J Clin Oncol. 2010; 28:1684–1691. doi: 10.1200/JCO.2009. 24.9284 PMID: 20194857 2. Goldhirsch A, Winer EP, Coates AS, Gelber RD, Piccart-Gebhart M, Thürliman B, et al. Panel mem- bers. Personalizing the treatment of women with early breast cancer: highlights of the St Gallen Interna- tional Expert Consensus on the Primary Therapy of Early Breast Cancer 2013. Annals of Oncology. 2013; 24: 2206–2223 doi: 10.1093/annonc/mdt303 PMID: 23917950 3. Paik S, Shak S, Tang G, Kim C, Baker J, Cronin M, et al. A multigene assay to predict recurrence of tamoxifen-treated, node-negative breast cancer. N Engl J Med. 2004; 351:2817–2826 PMID: 15591335 4. Harris L, Fritsche H, Mennel R, Norton L, Ravdin P, Taube S, et al. American Society of Clinical Oncol- ogy 2007 update of recommendations for the use of tumor markers in breast cancer. J Clin Oncol. 2007; 25:5287–5312 PMID: 17954709 5. Paik S, Tang G, Shak S, Kim C, Baker J, Kim W, et al. Gene expression and benefit of chemotherapy in women with node-negative, estrogen receptor-positive breast cancer. J Clin Oncol. 2006; 24:3726– 3734 PMID: 16720680 6. Lowery AJ, Miller N, Devaney A, McNeill RE, Davoren PA, Lemetre C, et al. MicroRNA signatures pre- dict oestrogen receptor, progesterone receptor and HER2/neu receptor status in breast cancer. Breast Cancer Res. 2009; 11(3):R27 doi: 10.1186/bcr2257 PMID: 19432961 7. Blenkiron C, Goldstein LD, Thorne NP, Spiteri I, Chin S- F, Dunning MJ, et al. MicroRNA expression profiling of human breast cancer identifies new markers of tumor subtype. Genome Biology. 2007; 8: R214 PMID: 17922911 8. Bergamaschi A, Katzenellenbogen BS. Tamoxifen downregulation of miR-451 increases 14-3-3zeta and promotes breast cancer cell survival and endocrine resistance. Oncogene. 2012; 31:39–47 doi: 10.1038/onc.2011.223 PMID: 21666713 9. Kim K, Madak-Erdogan Z, Ventrella R, Katzenellenbogen BS. A MicroRNA196a2* and TP63 Circuit Regulated by Estrogen Receptor-alpha and ERK2 that Controls Breast Cancer Proliferation and Inva- siveness Properties. Horm Cancer 2013 Apr; 4(2):78–91 doi: 10.1007/s12672-012-0129-3 PMID: 23250869 10. Cochrane DR, Spoelstra NS, Howe EN, Nordeen SK, Richer JK 2. MicroRNA-200c mitigates invasive- ness and restores sensitivity to microtubule-targeting chemotherapeutic agents. Mol Cancer Ther. 2009; 8:1055–1066 doi: 10.1158/1535-7163.MCT-08-1046 PMID: 19435871 11 / 12 PLOS ONE | DOI:10.1371/journal.pone.0145346 December 30, 2015 miRNA Expression and Oncotype Dx Recurrence Score in Breast Carcinomas 11. PLOS ONE | DOI:10.1371/journal.pone.0145346 December 30, 2015 References Wang V and Wu W. MicroRNA: A New Player in Breast Cancer Development. Journal of Cancer Mole- cules. 2007; 3(5): 133–138. 24. Lu J, Getz G, Miska EA, Alvarez-Saavedra E, Lamb J, Peck D, et al. MicroRNA expression profiles classify human cancers. Nature. 2005; 435:834–838. PMID: 15944708 25. Iorio M, Ferracin M, Liu C-G, Veronese A, Spizzo R, Sabbioni S, et al. MicroRNA Gene Expression Deregulation in Human Breast Cancer. Cancer Res. 2005; 65(16):7065–70. PMID: 16103053 26. Volinia S, Calin GA, Liu CG, Ambs S, Cimmino A, Petrocca F, et al. A microRNA expression signature of human solid tumors defines cancer gene targets. Proc Natl Acad Sci U S A. 2006; 103(7):2257–61. PMID: 16461460 27. Si M-L, Zhu S, Wu H, Lu Z, Wu F and Mo Y-Y. miR-21-mediated tumor growth. Oncogene. 2007; 26:2799–2803. PMID: 17072344 28. Albain KS, Paik S, van’t Veer L. Prediction of adjuvant chemotherapy benefit in endocrine responsive, early breast cancer using multigene assays. The Breast. 2009; S*, S141–S145. doi: 10.1016/S0960- 9776(09)70290-5 PMID: 19914534 29. Ivshina AV, George J, Senko O, Mow B, Putti TC, Smeds J, et al. Genetic reclassification of histologic grade delineates new clinical subtypes of breast cancer. Cancer Res. 2006 Nov 1; 66 (21):10292–301. PMID: 17079448 30. Johnson CD, Esquela-Kerscher A, Stefani G, Byrom M, Kelnar K, Ovcharenko D, et al. The let-7 Micro- RNA Represses Cell Proliferation Pathways in Human Cells. Cancer Res. 2007; 67(16):7713–22 PMID: 17699775 31. Weier H-U G, Mao J-H. Meta-analysis of Aurora Kinase A (AURKA) Expression Data Reveals a Signifi- cant Correlation between Increased AURKA Expression and Distant Metastases in Human ER-positive Breast Cancers. J Data Mining Genomics Proteomics. 2013; 4(1):127. PMID: 24729942 12 / 12 PLOS ONE | DOI:10.1371/journal.pone.0145346 December 30, 2015
W3177991376.txt
https://library.oapen.org/bitstream/20.500.12657/41356/1/sg_010_DavidHenseler.pdf
fr
Datenschutz bei drohnengestützter Datenbearbeitung durch Private
null
2,020
cc-by
90,859
sui generis Z BEI TÜTZTER EITUNG TE Datenschutz bei drohnengestützter Datenbearbeitung durch Private David Henseler David Henseler Datenschutz bei drohnen­ gestützter Datenbearbeitung durch Private Dissertation sui generis, Zürich 2020 «Dann aber können wir Erdbewohner, die wir sonst schon allen möglichen Gefahren ausgesetzt sind, aufs neue und dieses Mal von der Luft aus bedroht werden, und zwar hinsichtlich unserer persönlichen und materiellen Rechtsgüter.» (Friedrich Meili, Ballons, Flugmaschinen und die Jurisprudenz, Allgemeine österreichische Gerichts-Zeitung 1909, Nr. 39, S. 3) V Vorwort Die vorliegende Arbeit ist zwischen Januar 2017 und Dezember 2019 entstanden. Während dieser Zeit war ich für zwei Jahre als Assistent und danach als Candoc-Stipendiant an der Universität Zürich angestellt. Den grössten Teil der Schreibarbeit konnte ich während Auslandaufenthalten am Center for IP & IT Law (CiTiP) der KU Leuven (Belgien) sowie am Max-Planck-Institut für ausländisches öffentliches Recht und Völkerrecht in Heidelberg erledigen. Für die Unterstützung durch alle vorgenannten Institutionen bin ich sehr dankbar. Die Arbeit wurde am 1. April 2020 an der Rechtswissenschaftlichen Fakultät der Universität Zürich als Dissertation abgenommen. Lehre und Rechtsprechung wurden bis Ende Oktober 2019 berücksichtigt, vereinzelt darüber hinaus. Mein herzlicher Dank gilt zunächst meiner Doktormutter, Frau Prof. Dr. Regina Kiener. Sie hat mich während der Ausarbeitung dieser Arbeit mit grossem Interesse unterstützt und stand für Fragen und Hinweise stets zur Verfügung. Während der Zeit als Assistent an ihrem Lehrstuhl habe ich sehr viel gelernt. Vor allem die Mitarbeit an Gutachten sowie an verschiedenen Publikationsprojekten habe mich wissenschaftlich ein grosses Stück weitergebracht. Daneben möchte ich mich auch ganz herzlich bei Prof. Dr. Thomas Gächter für die zügige Erstellung des Zweitgutachtens bedanken. Für den immer sehr interessanten Austausch zu verschiedensten Fragen mit Bezug zu Drohnen möchte ich mich bei Rechtsanwalt Dr. Kurt Moll sowie Dr. Maximilian Jablonowski bedanken. Ebenfalls gilt mein Dank dem gesamten Team «Innovation und Digitalisierung» des Bundesamts für Zivilluftfahrt, insbesondere Marcel Kägi und Sandra Bodmer. Den Austausch mit ihnen habe ich stets sehr geschätzt. Für interessante Inputs aus der Sozialgeografie gebührt mein Dank ausserdem Prof. Dr. Francisco Klauser. Für die sorgfältige Lektüre und Korrektur der Arbeit möchte ich meinem geschätzten Kollegen Rechtsanwalt Denis Parvex und insbesondere meinem lieben Bruder Rechtsanwalt Simon Henseler herzlich danken. Des Weiteren gilt mein Dank Herrn Moritz Henseler für die zweimalige und äusserst sorgfältige Durchsicht des Manuskripts. Meine Eltern Brigitte Henseler-Pfenninger und Moritz Henseler haben mir eine universitäre Ausbildung ermöglicht und mich stets bei all meinen Vorhaben unterstützt. Dafür werde ich ihnen immer dankbar sein. Das zentrale Element für den erfolgreichen Abschluss der vorliegenden Arbeit war und ist aber meine Frau Marina. Sie hat mich und meine Launen, meine VI Schreibblockaden und Schreibphasen hautnah miterlebt und mich immer wieder auf die richtige Spur gelenkt. Ohne Marina hätte ich mein Dissertations­ projekt vielleicht aufgegeben. Ihr ist diese Arbeit gewidmet. Zürich, im April 2020 David Henseler VII Übersicht Vorwort . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  V Übersicht . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . VII Inhaltsverzeichnis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IX Literatur- und Quellenverzeichnis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XIX Materialienverzeichnis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . LIX Abkürzungsverzeichnis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . LXIII Einleitung .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   1 Teil 1: Rechtliche, begriffliche und technische Grundlagen . . . . . . . . . . . .    11 Teil 2: Die drohnengestützte Datenbearbeitung im Lichte der Grundrechte . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    45 Teil 3: Bestandesaufnahme (1): Der E-DSG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    73 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» .. . . . . . . 119 Teil 5: Die Durchsetzung von datenschutzrechtlichen Ansprüchen . 157 Zusammenfassung und Schlussbemerkungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 IX Inhaltsverzeichnis Vorwort . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  V Übersicht . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . VII Inhaltsverzeichnis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IX Literatur- und Quellenverzeichnis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XIX Materialienverzeichnis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . LIX Abkürzungsverzeichnis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . LXIII Einleitung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   1 § 1 Einführung in das Problemfeld . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   1 § 2 Gegenstand und Ziel der Arbeit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   2 I. Forschungsfrage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   2 II. Eingrenzung des Themas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   2 III. Relevanz des Themas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   3 1. Anzahl und Verbreitung von Drohnen . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Neue Gefahren durch neue Technologie . . . . . . . . . . . . . . . . . . . . . 4 3. Misstrauen und Ablehnung in der Bevölkerung . . . . . . . . . 5 4. Wirtschaftliches Potenzial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 IV. Stand der Wissenschaft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   7 § 3 Aufbau und Methode .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   8 I. Gang der Untersuchung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   8 II. Methode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Teil 1: Rechtliche, begriffliche und technische Grundlagen .. . . . . . 11 § 1 Bemerkungen zu den zentralen Rechtsgrundlagen . . . . . . . . . 11 I. Datenschutzgesetz . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1. Auslöser und Ziele der Totalrevision . . . . . . . . . . . . . . . . . . . . . . . . . .    11 2. Abstellen auf den E-DSG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    13 II. Drohnenverordnungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 1. EU-Recht und dessen Bedeutung für die Schweiz . . . . . .    13 2. Übernahme durch die Schweiz . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    14 § 2 Begriffe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I. Drohne . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 15 X 1. Technische Bezeichnungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 2. Kategorisierung anhand der Konstruktionsweise . . . . . . . 18 2.1 Drehflügler .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 2.2 Starrflügler .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 2.3 Schwingflügler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3. Zwischenfazit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 4. Regelung in den Drohnenverordnungen . . . . . . . . . . . . . . . . . . . . . . 20 4.1 Drohnendefinition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 4.2 Die drei Drohnenkategorien . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 a Offene Kategorie . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 b Spezielle Kategorie . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 c Zulassungspflichtige Kategorie . . . . . . . . . . . . . . . . . . . . . . . . . . 23 4.3 Produkteklassen innerhalb der offenen Kategorie . 24 5. Zusammenfassung und Stellungnahme . . . . . . . . . . . . . . . . . . . . . . . 26 II. Drohnenpilot und Drohnenbetreiber . . . . . . . . . . . . . . . . . . . . . . . . . . 27 1. Pilot, Fernpilot, Drohnenpilot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 2. Betreiber und Halter .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 III. Daten . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 1. Personendaten im Allgemeinen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 2. Besonders schützenswerte Personendaten .. . . . . . . . . . . . . . . . . 31 2.1 Erfasste Kategorien . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 2.2 Biometrische Daten insbesondere . . . . . . . . . . . . . . . . . . . . . . . . 31 2.3 Verfassungsrechtliche Einordnung . . . . . . . . . . . . . . . . . . . . . . 32 IV. Datenbearbeitung .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 V. Drohnengestützte Datenbearbeitung . . . . . . . . . . . . . . . . . . . . . . . . . . 33 § 3 Einsatzformen von Drohnen in der Schweiz .. . . . . . . . . . . . . . . . . . . . . . I. Nutzung durch Behörden . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . II. Nutzung durch Private . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. Kommerzielle Nutzung .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. Hobbynutzung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . § 4 Stand der Technik . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I. In der Schweiz verbreitete Hobbydrohnen .. . . . . . . . . . . . . . . . . II. Sensoren .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. Fotokamera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. Videokamera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3. Mikrofon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4. Infrarot- und Wärmebildkameras . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5. IMSI-Catcher . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . III. Zwischenfazit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 35 37 37 38 39 39 40 40 41 41 42 42 43 XI Teil 2: Die drohnengestützte Datenbearbeitung im Lichte der Grundrechte . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 § 1 Vorbemerkungen ................................................................. § 2 Grundrechtliche Schutzpflichten . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I. Verpflichtungsdimensionen der Grundrechte . . . . . . . . . . . . 1. Die drei Kategorien der Verpflichtungsdimensionen . . . . 2. Schutz vor Übergriffen Privater .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . II. Grundlage der Schutzpflichten . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. In der Bundesverfassung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. In der Europäischen Menschenrechtskonvention . . . . . . . III. Semantik . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IV. Schutzpflichten und deren Verhältnis zur Lehre der Drittwirkung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . V. Ausprägungen der Schutzpflichten . . . . . . . . . . . . . . . . . . . . . . . . . . . . . VI. Adressaten . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. Primäre Verpflichtung des Gesetzgebers . . . . . . . . . . . . . . . . . . . . . 2. Exekutive und Judikative . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . VII. Tatbestand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . VIII. Rechtsfolge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IX. Schutzberechtigte .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . X. Justiziabilität grundrechtlicher Schutzpflichten . . . . . . . . 1. Grundsätzliche Justiziabilität . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. Durchsetzungsproblematik vor Bundesgericht . . . . . . . . . . . 3. Praxis des EGMR .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XI. Zwischenfazit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . § 3 Privatsphäre . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I. Vorbemerkungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. Die einzelnen Aspekte der Privatsphäre . . . . . . . . . . . . . . . . . . . . . . 2. Persönlicher Schutzbereich . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . II. Achtung des Brief-, Post- und Fernmeldeverkehrs . . . . . . 1. Inhalt und sachlicher Schutzbereich .. . . . . . . . . . . . . . . . . . . . . . . . . . . 2. Bei der drohnengestützten Datenbearbeitung durch Private insbesondere . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . III. Achtung der Wohnung .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. Inhalt und sachlicher Schutzbereich .. . . . . . . . . . . . . . . . . . . . . . . . . . . 2. Bei der drohnengestützten Datenbearbeitung durch Private insbesondere . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 46 46 46 46 47 47 48 48 49 50 51 51 51 52 53 55 55 55 56 57 57 58 58 58 58 59 59 59 60 60 60 XII IV. Achtung des Privatlebens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 1. Inhalt und sachlicher Schutzbereich .. . . . . . . . . . . . . . . . . . . . . . . . . . . 61 2. Bei der drohnengestützten Datenbearbeitung durch Private insbesondere . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 § 4 Informationelle Selbstbestimmung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I. Entstehung und Einordnung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . II. Schutzbereich . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. Persönlicher Schutzbereich . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. Sachlicher Schutzbereich . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1 Herrschende Lehre und Rechtsprechung .. . . . . . . . . . . . 2.2 Kritische Lehrstimmen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3 Verfassungsrevision? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.4 Zwischenfazit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . III. Bei der drohnengestützten Datenbearbeitung durch Private insbesondere . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . § 5 Weitere möglicherweise tangierte Grundrechte . . . . . . . . . . . . . . . . I. Menschenwürde . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. Inhalt und Schutzbereich . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. Bei der drohnengestützten Datenbearbeitung durch Private insbesondere . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . II. Glaubens- und Gewissensfreiheit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. Inhalt und Schutzbereich . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. Bei der drohnengestützten Datenbearbeitung durch Private insbesondere . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . III. Meinungsäusserungs- und Versammlungsfreiheit . . . . . 1. Inhalt und Schutzbereich . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. Bei der drohnengestützten Datenbearbeitung durch Private insbesondere . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IV. Eigentumsgarantie . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. Inhalt und Schutzbereich . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. Bei der drohnengestützten Datenbearbeitung durch Private insbesondere . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 62 63 63 63 63 64 64 65 65 66 66 66 66 67 67 67 68 68 68 68 68 69 § 6 Schutzpflichten im Kontext der informationellen Selbstbestimmung .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 I. Anerkannte Schutzpflichtendimension . . . . . . . . . . . . . . . . . . . . . . 69 II. Verfassungsrechtliche Anforderungen an das Datenschutzrecht . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 XIII Teil 3: Bestandesaufnahme (1): Der E-DSG .................................... 73 ................................................................. 73 § 2 Anwendbarkeit des Datenschutzgesetzes . . . . . . . . . . . . . . . . . . . . . . . . . . . I. Verantwortlicher und betroffene Person . . . . . . . . . . . . . . . . . . . . 1. Verantwortlicher . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. Betroffene Person . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . II. Sachlicher Geltungsbereich . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . III. Ausnahme: Bearbeitung ausschliesslich zum persönlichen Gebrauch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. Die Regelung des E-DSG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. Interessenausgleich als normative Grundlage .. . . . . . . . . . . . 3. Anwendungsbeispiele . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4. Bekanntgabe an Aussenstehende .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IV. Haushaltsausnahme bei der drohnengestützten Datenbearbeitung? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. Ausgangsbeispiel: «Nachbarschafts-Drohne» . . . . . . . . . . . . . . 2. Detailprüfung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3. Zusammenfassung und Fazit .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 § 1 Vorbemerkungen § 3 Zentrale Bestimmungen des E-DSG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I. Bearbeitungsgrundsätze . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. Rechtmässigkeit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2. Treu und Glauben und Verhältnismässigkeit . . . . . . . . . . . . . . . 2.1 Verhältnismässigkeit .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Treu und Glauben .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3. Zweckbindung und Erkennbarkeit (Transparenz) .. . . . . . 3.1 Zweckbindung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2 Erkennbarkeit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4. Datenrichtigkeit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5. Einwilligung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6. Rechtsfolge bei Missachtung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . II. Privacy by Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. Die Regelung im Einzelnen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1 Datenschutz durch Technik . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2 Beurteilung der Angemessenheit . . . . . . . . . . . . . . . . . . . . . . . . . 1.3 Stand der Technik insbesondere . . . . . . . . . . . . . . . . . . . . . . . . . . 2. Sanktionierung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3. Bedeutung bei der drohnengestützten Datenbearbeitung durch Private . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 74 75 75 75 76 77 78 78 79 79 80 81 81 82 82 83 83 84 85 85 85 86 87 88 89 89 89 90 91 92 92 XIV III. Informationspflicht . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 1. Voraussetzungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   94 2. Umfang und Modalitäten .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   94 3. Zeitpunkt der Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   96 4. Ausnahmen und Einschränkungen . . . . . . . . . . . . . . . . . . . . . . . . . .   96 4.1 Ausnahmen .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   96 4.2 Einschränkungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   97 5. Sanktionierung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   97 6. Bedeutung bei der drohnengestützten Datenbearbeitung durch Private . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   98 IV. Datenschutz-Folgenabschätzung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 1. Voraussetzungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   98 2. Sanktionierung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   99 3. Bedeutung bei der drohnengestützten Datenbearbeitung durch Private . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   99 V. Auskunftsrecht . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   100 1. Zentrale Bedeutung des Anspruchs . . . . . . . . . . . . . . . . . . . . . . . . . 100 2. Auskunftsberechtigte und Auskunftsverpflichtete . 101 3. Voraussetzungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 4. Ausübung des Auskunftsrechts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 4.1 Auskunftsbegehren . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 4.2 Identifikation des Auskunftsberechtigten . . . . . . . . . 102 5. Erteilung der Auskunft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 5.1 Form und Inhalt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 5.2 Einschränkungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 6. Zeitpunkt der Auskunft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 7. Sanktionierung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 8. Bedeutung bei der drohnengestützten Datenbearbeitung durch Private . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 VI. Rechte bei Persönlichkeitsverletzungen . . . . . . . . . . . . . . . . . .   106 1. Persönlichkeitsverletzung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 2. Rechtfertigungsgründe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 3. Rechtsansprüche .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 3.1 Übersicht .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 3.2 Klagen zum Schutz der Persönlichkeit .. . . . . . . . . . . . . . 110 3.3 Die Ansprüche im Einzelnen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 a Beseitigung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   112 b Unterlassung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   113 c Genugtuung .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    114 d Feststellung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   115 XV 4. Bedeutung bei der drohnengestützten Datenbearbeitung durch Private . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . § 4 Gesamtbetrachtung und Überleitung Teil 4: 116 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    117 Bestandesaufnahme (2): Die «Drohnenverordnungen» . . . . . .   119 § 1 Vorbemerkungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   119 § 2 Identifizierung von Drohnenbetreibern . . . . . . . . . . . . . . . . . . . . . . . . . .   120 I. Registrierung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   120 1. Zentrale Bedeutung der Registrierung . . . . . . . . . . . . . . . . . . . . . 120 2. Registrierungspflicht für Drohnen und Betreiber . . . . 120 3. Die Kriterien im Einzelnen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 3.1 Zertifizierung der Konstruktion . . . . . . . . . . . . . . . . . . . . . . . . 121 3.2 Kinetische Energie . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 a Begriff und Bedeutung .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   122 b Regelung in der Durchführungsverordnung .. . . .   123 3.3 Risiken für Privatsphäre und den Schutz von Personendaten . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 3.4 Ausnahme für «Spielzeugdrohnen» .. . . . . . . . . . . . . . . . . 125 a Begriff . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   125 b Fähigkeit zur Datenbearbeitung als Ausschlusskriterium? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   126 4. Zwischenfazit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 5. Registrierungsverfahren . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 6. Anzugebende Informationen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 7. «Drohnenbetreiberregister» . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 7.1 Ausgestaltung des Registers .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 7.2 Vergleichbare Register . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 a Luftfahrzeugregister .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   133 b Informationssystem Verkehrszulassung . . . . . . . . .   133 7.3 Zwischenfazit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 8. Datenschutzrechtliche Beurteilung und Überleitung . 135 II. Kennzeichnung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   135 1. Arten der Kennzeichnung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 2. Kennzeichnung mit Betreibernummer . . . . . . . . . . . . . . . . . . . . 136 2.1 Begriff . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 2.2 Praktische Umsetzung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 3. Datenschutzrechtliche Beurteilung . . . . . . . . . . . . . . . . . . . . . . . . . . 137 XVI III. Fernidentifizierung .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   138 1. Bedeutung und Begriff . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 2. Erfasste Drohnen .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 3. Zusatzgerät für die direkte Fernidentifizierung . . . . . . . 139 3.1 Allgemeine Anforderungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 3.2 Empfang durch Mobilfunkgeräte insbesondere .. . . . 140 4. Datenschutzrechtliche Beurteilung . . . . . . . . . . . . . . . . . . . . . . . . . . 141 IV. Flugverkehrsmanagement U-Space (UTM) .. . . . . . . . . . . . . .   142 1. Begriff . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 2. Inhalt und Zweck . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 3. Datenschutzrechtliche Beurteilung . . . . . . . . . . . . . . . . . . . . . . . . . . 143 V. Spezialfall: Selbst gebaute Drohnen . . . . . . . . . . . . . . . . . . . . . . . . .    144 1. Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 2. Anwendbare Vorschriften . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 2.1 Grundsätzliche Zugehörigkeit zur offenen Kategorie . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 2.2 Registrierung und Kennzeichnung .. . . . . . . . . . . . . . . . . . . 145 2.3 Fernidentifizierung .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 3. Datenschutzrechtliche Beurteilung . . . . . . . . . . . . . . . . . . . . . . . . . . 145 VI. Herausforderungen bei der Umsetzung . . . . . . . . . . . . . . . . . . .   146 1. Notwendige Mitwirkung der Drohnenbetreiber . . . . . . . 146 2. Übergangsbestimmungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 § 3 Präventive und flankierende Massnahmen . . . . . . . . . . . . . . . . . . . . .   148 I. Information und Ausbildung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   148 1. Informationsbeiblatt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 2. Online-Theorieprüfung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 3. Staatliche Informationsmassnahmen . . . . . . . . . . . . . . . . . . . . . . . 151 II. Geo-Awareness (Geofencing) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   151 1. Begriff und Abgrenzung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 2. Inhalt und Grenzen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 3. Datenschutzrechtliche Beurteilung . . . . . . . . . . . . . . . . . . . . . . . . . 153 III. Positionslichter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   153 1. Erfasste Drohnen .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 2. Datenschutzrechtliche Beurteilung . . . . . . . . . . . . . . . . . . . . . . . . . 154 § 4 Gesamtbetrachtung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   155 XVII Teil 5: Die Durchsetzung von daten­schutzrechtlichen Ansprüchen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   157 § 1 Schutzpflicht bei der drohnengestützten Datenbearbeitung durch Private . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    157 I. Informations- und Machtungleichgewicht als Ausgangspunkt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   157 II. Tatbestand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   158 1. Vorliegen eines Störerdreiecks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 2. Kenntnis der konkreten Gefährdung . . . . . . . . . . . . . . . . . . . . . . . 158 3. Kompetenz des Bundes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 III. Adressat der Schutzpflicht . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   159 1. Vollzugsbehörden . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 2. Gesetzgeber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 IV. Zwischenfazit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   161 § 2 Wahrnehmung der Schutzpflicht de lege ferenda . . . . . . . . . . . .    162 I. Achtung der Ansprüche der Drohnenbetreiber­ . . . . . . .   162 II. Bestimmung des passenden Gesetzes .. . . . . . . . . . . . . . . . . . . . . .   164 § 3 Vorschläge für eine Gesetzesbestimmung . . . . . . . . . . . . . . . . . . . . . . .   165 I. Zu regelnde Aspekte .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   165 II. Kommentierter Formulierungsvorschlag . . . . . . . . . . . . . . . .   166 1. Kompetenz (Abs. 1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 1.1 Formulierungsvorschlag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 1.2 Bemerkungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 2. Zweck (Abs. 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 2.1 Formulierungsvorschlag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 2.2 Bemerkungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 3. Inhalt (Abs. 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 3.1 Formulierungsvorschlag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 3.2 Bemerkungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 4. Datenbekanntgabe (Abs. 4 und 5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 4.1 Formulierungsvorschlag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 4.2 Bemerkungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 5. Zugriff im Abrufverfahren (Abs. 6) .. . . . . . . . . . . . . . . . . . . . . . . . . . . 171 5.1 Formulierungsvorschlag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 5.2 Bemerkungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 III. Unkommentierter Formulierungsvorschlag . . . . . . . . . . .   172 Zusammenfassung und Schlussbemerkungen § 1 Zusammenfassung .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    175 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    175 § 2 Schlussbemerkungen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   177 XIX Literatur- und Quellenverzeichnis Die angeführten Autorinnen und Autoren werden im Haupttext — sofern bei den einzelnen Publikationen nicht anders angegeben — mit ihrem Nach­ namen und mit der Seitenzahl, dem Paragraphen oder der sonstigen Fundstelle abgekürzt zitiert. Neuerscheinungen und Neuauflagen wurden bis zum 31. Oktober 2019 berücksichtigt. Internetquellen wurden am 31. Oktober 2019 zuletzt besucht. Abeyratne Ruwantissa, Convention on International Civil Aviation: A Commentary, Cham et al. 2014 Aebi-Müller Regina E., Personenbezogene Informationen im System des zivilrechtlichen Persönlichkeitsschutzes, Unter besonderer Berücksichtigung der Rechtslage in der Schweiz und in Deutschland, Bern 2005 Albers Marion, Informationelle Selbstbestimmung, Baden-Baden 2007 Alexy Robert, Theorie der Grundrechte, Baden-Baden 1985 American Civil Liberties Union (ACLU), Protecting Privacy From Aerial Surveillance: Recommendations for Government Use of Drone Aircraft, New York 2011 Applin Sally A., Deliveries by Drone: Obstacles and Sociability, in: Custers (Hrsg.), The Future of Drone Use: Opportunities and Threats from Ethical and Legal Perspectives, Den Haag 2016, S. 71 ff. Arai-Takahashi Yutaka, The Margin of Appreciation Doctrine and the Principle of Proportionality in the Jurisprudence of the ECHR, Diss. Cambridge 1998, Antwerpen 2002 Arbeitskreis im Erfahrungsaustauschkreis der Zentralstellen der Länder für Sicherheitstechnik (ZLS), Beschlüsse des Arbeitskreises 2.2 «Spielzeug», München 2015 (zit. Arbeitskreis ZLS) Arnosti Dominique C., Dashcam: Risiko oder Garant im (Rechts)Verkehr?, Eine rechtswissenschaftliche Analyse der datenschutzrechtlichen Zulässigkeit von Dashcam-Aufnahmen und deren Verwertbarkeit im Zivilprozess, Zürich 2019Arora Siddhartha, Swiss Commercial Drone Industry: A possibility with potential?, Zürich/St. Gallen 2016 XX Literatur- und Quellenverzeichnis Arterburn David / Olivares Gerardo / Bolte John / Prabhu Raj / Duma Stefan, Task A14: UAS Ground Collision Severity Evaluation 2017-2019 (zit. Arterburn et al.) Article 29 Data Protection Working Party, Opinion 01/2015 on Privacy and Data Protection Issues relating to the Utilisation of Drones, Working Paper 231, 16. Juni 2015 (zit. Article 29 Working Party) Aubert Jean-François / Mahon Pascal, Petit commentaire de la Con­sti­ tution fédérale de la Confédération suisse du 18 avril 1999, Zürich/Basel/ Genf 2003 (zit. Bearbeiter, Petit commentaire, Art. xx Cst. N xx) Auer Andreas / Malinverni Giorgio / Hottelier Michel, Droit constitu­ tionnel suisse, Volume II, Les droits fondamentaux, 3. Aufl., Bern 2013 Austin Reg, Unmanned Aircraft Systems: UAVS Design, Development and Deployment, New York 2010 Aviation Rulemaking Committee, Unmanned Aircraft Systems (UAS) Registration Task Force, Task Force Recommendation Final Report, 21. November 2015 Bacher Bettina, Medienfreiheit und Persönlichkeitsschutz, Zivilrecht­liche Auswirkungen der Lösung eines Grundrechtskonflikts, Diss. Freiburg i.Üe. 2015, Basel 2015 Bächli Marc, Das Recht am eigenen Bild: die Verwendung von Personen­ bildern in den Medien, in der Kunst, der Wissenschaft und in der Werbung aus der Sicht der abgebildeten Person, Diss. Basel 2001, Basel 2002 Baeriswyl Bruno — Die Verselbständigung des Computers — datenschutzrechtliche Aspekte, in: Kündig/Bütschi (Hrsg.), Die Verselbständigung des Computers, Zürich 2008, S. 117 ff. (zit. Baeriswyl, Verselbständigung) — Internet als Fahndungsmittel mit Kollateralschäden, Sicherheit & Recht 1/2010, S. 11 ff. (zit. Baeriswyl, Fahndungsmittel) — Entwicklungen im Datenschutzrecht / Le point sur le droit de la protec­tion des données, SJZ 115/2019, S. 592 ff. (zit. Baeriswyl, Entwicklungen) Literatur- und Quellenverzeichnis XXI Baeriswyl Bruno / Rudin Beat (Hrsg.) — Praxiskommentar zum Informations- und Datenschutzgesetz des Kantons Zürich (IDG), Zürich/Basel/Genf 2012 (zit. PK IDG/ZH-Bear­ beiter/-in, § xx N xx) — Datenschutzgesetz (DSG), Stämpflis Handkommentar, Bern 2015 (zit. SHK DSG-Bearbeiter/-in, Art. xx N xx) Bajde Domen / Hojer BruUn Maja / Sommer Jannek K. / Waltrop Karen, General Public’s Privacy Concerns Regarding Drone Use in Residential and Public Areas, Empirical research report, University of Southern Denmark/Aalborg University, Mai 2017 (zit. Bajde et al., Privacy Concerns) Bajde Domen / Woermann Niklas / Hojer BruUn Maja / Gahrn-Andersen Rasmus / Sommer Jannek K. / Nojgaard Mikkel / Christensen Sofie H. / Kirschner Heiko / Skaarup Jensen Rune Hagel / Bucher Jan Hendrik, Public reactions to drone use in residential and public areas, University of Southern Denmark/Aalborg University, Dezember 2017 (zit. Bajde et al., Public reactions) Balser Markus, Unerkannte Flugobjekte, SZ vom 19. August 2019, S. 5 Bartsch Ron, Unmanned and Uncontrolled: The Commingling Theory and the Legality of Unmanned Aircraft System Operations, J. Aeronaut Aero­ space Eng 2015 (1), S. 1 ff. Bartsch Ron / Coyne James / Gray Katherine, Drones in Society: Explor­ ing the strange new world of unmanned aircraft, Oxford/New York 2017 Baur Georges, Datenschutz-Grundverordnung Schengen-relevant? Vielleicht nicht, aber …, in: Breitenmoser/Lagodny/Uebersax (Hrsg.), Schengen und Dublin in der Praxis: Aktuelle Herausforderungen, Zürich/St. Gallen 2018, S. 165 ff. Belser Eva Maria, Zur rechtlichen Tragweite des Grundrechts auf Datenschutz: Missbrauchsschutz oder Schutz der informationellen Selbst­ bestimmung?, in: Epiney/Fasnacht/Blaser (Hrsg.), Instrumente zur Umsetzung des Rechts auf informationelle Selbstbestimmung, Zürich/ Basel/Genf 2013, S. 19 ff. (zit. Belser, Tragweite) Belser Eva Maria / Epiney Astrid / Waldmann Bernhard, Datenschutzrecht: Grundlagen und öffentliches Recht, Bern 2011 (zit. Bearbeiter/-in, in: Belser/Epiney/Waldmann) XXII Literatur- und Quellenverzeichnis Belser Eva Maria / Waldmann Bernhard, Grundrechte II: Die einzelnen Grundrechte, Zürich/Basel/Genf 2012 Belser Urs, Das Recht auf Auskunft, die Transparenz der Datenbearbeitung und das Auskunftsverfahren, in: Schweizer (Hrsg.), Das neue Datenschutzgesetz des Bundes, Zürich 1993, S. 55 ff. (zit. Belser U.) Berger Max, Keine Angst vor Dashcams: Video-Aufnahmen als Beweis­ mittel im Zivilprozess, Jusletter 8. April 2019 Bernauw Kristiaan, Drones: The Emerging Era of Unmanned Civil Aviation, Zbornik Pravnog fakulteta u Zagrebu [= Collected Papers of Zagreb Law Faculty], Vol. 66 (2016), S. 223 ff. Bertolini Andrea, Artificial Intelligence and civil law: liability rules for drones, Study for the JURI committee, Directorate General for Internal Policies of the Union, Brüssel November 2018 Besson Samantha — Les obligations positives de protection des droits fondamentaux — Un essai en dogmatique comparative, ZSR 2003 I, S. 49 ff. (zit. Besson, obliga­tions positives) — Comment humaniser le droit privé sans commodifier les droits de l’homme, in: Werro (Hrsg.), Droit civil et convention européenne des droits de l’homme / Zivilrecht und Europäische Menschenrechtskonvention, Zürich 2006, S. 1 ff. (zit. Besson, droit privé) Bestaoui Sebbane Yasmina, Smart autonomous aircraft: Flight control and planning for UAV, Boca Raton/London/New York 2015 Betschon Stefan, Ein Himmel voller Drohnen, 10. November 2016 Biaggini Giovanni — «Durchnummerieren» der Bevölkerung und Verfassung: Zur Zulässigkeit eines koordinierten eidgenössischen Personenidentifikators im Lichte des verfassungsrechtlichen Persönlichkeitsschutzes, in: Noll/ Olano (Hrsg.), «Im Namen des Obergerichts», Festschrift zur Pensionierung von Frau Dr. Magdalena Rutz, Liestal 2004, S. 71 ff. (zit. Biaggini, «Durchnummerieren») — Bundesverfassung der Schweizerischen Eidgenossenschaft, Kommentar, 2. Aufl., Zürich 2017 (zit. Biaggini, Komm. BV) Bieri Peter, Bearbeitung von Daten über Richterinnen und Richter: Bedarf und Schranken, Diss. Bern 2016, Zürich 2017 Literatur- und Quellenverzeichnis XXIII Biermann Kai / Wiegold Thomas, Drohnen: Chancen und Gefahren einer neuen Technik, Berlin 2015 Bischof Claudia, Drohnen im rechtlichen Praxistest, DuD 3/2017, S. 142 ff. Blue Ribbon Task Force (BRTF), Interim Report on UAS Mitigation at Airports, Juli 2019 Bolt Roger / Bryner Simone, Observationen in der Praxis — Sichtweise Suva, HAVE 2018, S. 209 ff. Boucher Philip, Joint Research Centre, Institute for the Protection and Security of the Citizen, Report EUR 26824, Civil Drones in Society, Luxemburg 2014 Bracken-Roche Ciara, Domestic drones: the politics of verticality and the surveillance industrial complex, Geogr. Helv. 71 (2016), S. 167 ff. Bracken-Roche Ciara / Lyon David / Mansour Mark James / Molnar Adam / Saulnier Alana / Thompson Scott, Surveillance drones: Privacy implications of the spread of unmanned aerial vehicles (UAVs) in Canada, Surveillance Studies Centre, Queen’s University, Kingston 2014 (zit. Bracken-Roche et al.) Brahms Florian / Maslaton Martin, Die gewerbliche Nutzung von Drohnen im Lichte der geplanten Novelle der LuftVO, NVwZ 2016, S. 1125 ff. Breitenmoser Stephan, Der Schutz der Privatsphäre gemäss Art. 8 EMRK, Das Recht auf Achtung des Privat- und Familienlebens, der Wohnung und des Briefverkehrs, Diss. Basel 1986, Basel/Frankfurt a.M. 1986 Brunner Stephan C., Mit rostiger Flinte unterwegs in virtuellen Welten?, Jusletter 4. April 2011 Büchi Roland — Fascination Quadrocopter, Basics — Electronics — Flight Experience, Norderstedt 2011 (zit. Büchi, Quadrocopter) — Das grosse Buch der Drohnen, Grundlagen — Technik — Flugpraxis, Baden-Baden 2018 (zit. Büchi, Buch der Drohnen) Büchler Andrea / Jakob Dominique (Hrsg.), Kurzkommentar ZGB, 2. Aufl., Basel 2018 (zit. KuKo ZGB-Bearbeiter/-in, Art. xx N xx) XXIV Literatur- und Quellenverzeichnis Bull Hans Peter — Informationelle Selbstbestimmung — Vision oder Illusion?, 2. Aufl., Tübingen 2011 (zit. Bull, Selbstbestimmung) — Sinn und Unsinn des Datenschutzes, Tübingen 2015 (zit. Bull, Datenschutz) Bundesamt für Justiz (BJ) — Obligation positive de mise à disposition d’aires de séjour ou de transit en faveur des gens du voyage suisses et portée de l’arzit. 35 Cst., VPB 2017.2, S. 19 ff. (zit. BJ, Obligation positive) — Gesetzgebungsleitfaden, Leitfaden für die Ausarbeitung von Erlassen des Bundes, 4. Aufl., Bern 2019 (zit. BJ, Leitfaden) Bundesamt für Lebensmittelsicherheit und Veterinärwesens (BLV), Erläuterungen zur Lebensmittel- und Gebrauchsgegenständeverord­ nung (zit. BLV, Erläuterungen LGV) Bundesamt für Zivilluftfahrt (BAZL) — Das Verhältnis zwischen der Schweiz und der Europäischen Agentur für Flugsicherheit (EASA), Bern November 2013 (zit. BAZL, Verhältnis) — BAZL RPAS Working Group, Zivile Drohnen in der Schweiz: Eine neue Herausforderung, Bern 7. Februar 2016 (zit. BAZL, Zivile Drohnen) — U-Space Program Management, Swiss U-Space ConOps, Version 1.0; 29. März 2019 (zit. BAZL, ConOps) — Memorandum of Cooperation established between Swiss FOCA and Skyguide, 20. Dezember 2018 (zit. BAZL, Memorandum) — Swiss U-Space Implementation (zit. BAZL, U-Space) — Übernahme neue europäische Drohnenregulierung (zit. BAZL, Übernahme) — Fernidentifizierung von Drohnen, 16. September 2019 (zit. BAZL, Fern­ identifizierung) — SUSI’s Remote ID Demonstration of September 16 2019, Report (zit. BAZL, Demo Report) Burger Jodie / Scuderi Eddie, Unmanned & unregulated: where are the privacy protections from drones?, LSJ Issue 46, Juli 2018, S. 88 f. Burkert Herbert, Internationale Grundlagen, in: Rossnagel (Hrsg.), Handbuch Datenschutzrecht, Die neuen Grundlagen für Wirtschaft und Verwaltung, München 2003, S. 85 ff. Literatur- und Quellenverzeichnis XXV Burkert Herbert / Hettich Peter / Thouvenin Florent, Grundlagen: Eine kritische Geschichte des Informationsrechts, in: Gschwend et al. (Hrsg.), Recht im digitalen Zeitalter, Festgabe Schweizer Juristentag 2015 in St. Gallen, Zürich/St. Gallen 2015 Burri Thomas, The Politics of Robot Autonomy, EJRR 2/2016, S. 341 ff. Burris Thomas, Daten «löschen» oder wirksam entfernen? Speicher­medien vergessen nicht so schnell — über das Löschen und Wieder­herstellen von Daten, digma 2008, S. 110 ff. Büttner Jean-Martin, Der Schweizer Drohnenkrieg, Tages-Anzeiger vom 30. April 2018, S. 1 Bydlinski Franz, Juristische Methodenlehre und Rechtsbegriff, 2. Aufl., Wien/New York 1991 Bygrave Lee A., Data Privacy Law, An International Perspective, Oxford 2014 Calliess Christian — Die grundrechtliche Schutzpflicht im mehrpoligen Verfassungsrechtsverhältnis, JZ 2006, S. 321 ff. (zit. Calliess, Schutzpflicht) — Gewährleistung von Freiheit und Sicherheit im Lichte unterschied­ licher Staats- und Verfassungsverständnisse, DVBl 2003, S. 1096 ff. (zit. Calliess, Gewährleistung) Calo M. Ryan, The Drone as Privacy Catalyst, 64 Stan. L. Rev. Online, 12. Dezember 2011, S. 29 ff. Canaris Klaus-Wilhelm, Grundrechte und Privatrecht, AcP 184 (1984), S. 201 ff. Cassart Alexandre — Drones: y-a-t’il un télépilote dans l’aéronef?, RDTI 2016 Nr. 1, S. 69 ff. (zit. Cassart, RDTI) — Droit des drones: Belgique, France, Luxembourg, Brüssel 2017 (zit. Cassart, Droit des drones) Cavoukian Ann, Privacy and Drones: Unmanned Aerial Vehicles, Information and Privacy Commissioner of Ontario, Canada, Ontario August 2012 Chadoian Satenig M., Das Fernmeldegeheimnis im Zeitalter der Internetund Mobilfunküberwachung: Eine rechtsvergleichende Untersuchung des schweizerischen und österreichischen Grundrechtsverständnisses im Hinblick auf neuartige technische Überwachungsmassnahmen, Diss. Wien 2011, Baden-Baden und Wien 2015 XXVI Literatur- und Quellenverzeichnis Chang Victoria / Chundury Pramod / Chetty Marshini, «Spiders in the Sky»: User Perceptions of Drones, Privacy and Security, Proceedings of the 2017 Conference on Human Factors in Computing Systems, Denver 2017, S. 6765 ff. Christen Markus / Guillaume Michel / Jablonowski Maximilian / Lenhart Peter / Moll Kurt, TA-SWISS (Hrsg.), Zivile Drohnen — Herausforderungen und Perspektiven, Zürich 2018 (zit. Christen et al.) Clarke Roger, The regulation of civilian drones’ impacts on behavioural privacy, CLSR 30 (2014), S. 286 ff. Clifford Damian, The Legal Limits to the Monetisation of Online Emotions, Diss. Löwen 2019, Löwen 2019 Clothier Reece A. / Greer Dominique A. / Greer Duncan G. / Mehta Amisha M., Risk Perception and the Public Acceptance of Drones, Risk Analysis 35 (2015) Nr. 6, S. 1167 ff. (zit. Clothier et al.) Corcoran Mark, Drone wars: The definition dogfight, ABC News, 1. März 2013 Cottier Bertil, L’ère numérique et le principe de légalité — Frictions et possibilités d’adaptation, in: Epiney/Sangsue (Hrsg.), Digitalisierung und Schutz der Privatsphäre, Zur Steuerungsfähigkeit der «traditionellen» Rechtsgrundsätze: Analyse und Perspektiven, Zürich 2018, S. 25 ff. Cuccuru Pierluigi, Profili di regolazione non-normativa dei droni alla luce della proposta di revisione del regolamento (CE) N. 216/2008 in materia di aviazione civile, in: Palmerini/Biasiotti/Aiello (Hrsg.), Diritto dei Droni: Regole, questioni e prassi, Mailand 2018, S. 333 ff. Custers Bart, Drones Here, There and Everywhere, Introduction and Overview, in: Custers (Hrsg.), The Future of Drone Use: Opportunities and Threats from Ethical and Legal Perspectives, Den Haag 2016, S. 1 ff. Dalamagkidis Konstantinos — Definitions and Terminology, in: Valavanis/Vachtsevanos (Hrsg.), Handbook of Unmanned Aerial Vehicles, Volume I, Heidelberg/New York/ London 2015, S. 43 ff. (zit. Dalamagkidis, Definitions) — Aviation History and Unmanned Flight, in: Valavanis/Vachtsevanos (Hrsg.), Handbook of Unmanned Aerial Vehicles, Volume I, Heidelberg/ New York/London 2015, S. 57 ff. (zit. Dalamagkidis, History) Literatur- und Quellenverzeichnis XXVII Dalamagkidis Konstantinos / Valavanis Kimon P. / Piegl Les A., On Integrating Unmanned Aircraft Systems into the National Airspace System, 2. Aufl., Dordrecht et al. 2012 Daphinoff Eva / Hassler Jannine, Teil 3: Datenschutzrechtliche Fragen im öffentlichen Personenverkehr, in: Furrer/Vasella (Hrsg.), Der öffentliche Personenverkehr — Haftung und Sicherheitsfragen, Bern 2018, S. 229 ff. Däubler Wolfgang / Wedde Peter / Weichert Thilo / Sommer Imke, EU-Datenschutz-Grundverordnung und BDSG-neu, Kompaktkommentar, Frankfurt a.M. 2018 (zit. Bearbeiter/-in, Däubler et al., Art. xx DSGVO N xx) Davola Antonio, L’acquisizione di dati da parte dei privati nelle operazioni con SAPR, in: Palmerini/Biasiotti/Aiello (Hrsg.), Diritto dei Droni: Regole, questioni e prassi, Mailand 2018, S. 137 ff. De Miguel Molina Blanca / Segarra Oña Marrival, The Drone Sector in Europe, in: de Miguel Molina/Santamarina Campos (Hrsg.), Ethics and Civil Drones: European Policies and Prosposals for the Industry, Cham 2018, S. 7 ff. De Terwangne Cécile — L’exception concernant les traitements de données à des fins personnelles et domestiques de la directive 95/46 relative à la protection des données, RDTI 2015 Nr. 1, S. 41 ff. (zit. de Terwangne, RDTI) — Définitions clés et champs d’application du RGDP, in: de Terwangne/ Rosier (Hrsg.), Le Règlement Général sur la Protection des Données (RGPD/GDPR), Analyse approfondie, Brüssel 2018, S. 59 ff. (zit. de Terwangne, champ d’application) De Vries Karin, Right to Respect for Private and Family Life, in: van Dijk et al. (Hrsg.), Theory and Practice of the European Convention on Human Rights, 5. Aufl., Cambridge/Antwerpen/Portland 2018, S. 667 ff. Deleury Stéphane, Les drones menacent toujours plus la sécurité de l’aviation civile en Suisse, 28. Juli 2017 Delise Riccardo, L’evoluzione del quadro regolamentare, in: Palmerini/ Biasiotti/Aiello (Hrsg.), Diritto dei Droni: Regole, questioni e prassi, Mailand 2018, S. 23 ff. Dempsey Paul Stephen, Public International Air Law, 2. Aufl., Montreal 2017 XXVIII Literatur- und Quellenverzeichnis Dettling-Ott Regula — Das bilaterale Luftverkehrsabkommen der Schweiz und der EG, in: Thürer et al. (Hrsg.), Bilaterale Verträge I & II Schweiz EU: Handbuch, Zürich/Basel/Genf 2007, S. 491 ff. (zit. Dettling-Ott, Luftverkehrs­ abkommen) — H. Luftverkehrsrecht — Teil II: Betrieb der Luftfahrt, in: Müller (Hrsg.), Verkehrsrecht, SBVR IV, Basel 2008, S. 391 ff. (zit. Dettling-Ott, Betrieb) — Exkurs: Organisation des Luftverkehrs in der Schweiz, in: Hobe/von Ruckteschell (Hrsg.), Kölner Kompendium des Luftrechts, Band 1: Grundlagen, Köln 2008, S. 251 ff. (zit. Dettling-Ott, Organisation) — Exkurs: Flugsicherung in der Schweiz, in: Hobe/von Ruckteschell (Hrsg.), Kölner Kompendium des Luftrechts, Band 2: Luftverkehr, Köln 2009, S. 1018 ff. (zit. Dettling-Ott, Flugsicherung) — Exkurs: Der Luftfahrzeughalter in der Schweiz, in: Hobe/von Ruckteschell (Hrsg.), Kölner Kompendium des Luftrechts, Band 2: Luftverkehr, Köln 2009, S. 1118 ff. (zit. Dettling-Ott, Luftfahrzeughalter) Dieckert Ulrich / Eich Stephan (Hrsg.), Drohnen — Technik und Recht: bei gewerblicher und behördlicher Nutzung, Köln 2018 (zit. Bearbeiter/-in, in: Dieckert/Eich) Doman David B. / Oppenheimer Michael W. / Sigthorsson David O., Dynamics and Control of Flapping Wing MAWs, in: Valavanis/Vachtsevanos (Hrsg.), Handbook of Unmanned Aerial Vehicles, Volume I, Heidelberg/ New York/London 2015, S. 329 ff. Döpke Christian F. / Jülicher Tim, Der Defikopter, InTeR 2017, S. 20 ff. DroneRules.eu — Privacy Handbook (zit. DroneRules, Handbook) — Privacy-by-Design Guide, A DronesRules.eu PRO resource for drone manufacturers (zit. DroneRules, Guide) Dubey Jacques — Droits fondamentaux, Volume I: Notion, garantie, restriction et juridiction, Basel 2018 (zit. Dubey, Vol. I) — Droits fondamentaux, Volume II: Libertés, garanties de l’Etat de droit, droits sociaux et politiques, Basel 2018 (zit. Dubey, Vol. II) Ebinger Christoph, Zivilrechtliche Haftung des Luftfrachtführers im Personentransport: Unter besonderer Berücksichtigung der Beförderung von Personen durch ferngesteuerte Luftfahrzeuge, Diss. Zürich 2010, Zürich/Basel/Genf 2012 Literatur- und Quellenverzeichnis XXIX Egli Patricia, Drittwirkung von Grundrechten: Zugleich ein Beitrag zur Dogmatik der grundrechtlichen Schutzpflichten im Schweizer Recht, Diss. Zürich 2002, Zürich 2002 Ehmann Eugen / Martin Selmayr (Hrsg.), Datenschutz-Grundverordnung, Kommentar, 2. Aufl., München 2018 (zit. Bearbeiter/-in, in: Ehmann/ Selmayr, Art. xx DSGVO N xx) Ehrenzeller Bernhard / Schindler Benjamin / Schweizer Rainer J. / Vallender Klaus A. (Hrsg.), Die Schweizerische Bundesverfassung, St. Galler Kommentar, 3. Aufl., Zürich/St. Gallen 2014 (zit. SGK BV-Bearbeiter/-in, Art. xx N xx) Eidgenössische Finanzverwaltung (EFV), Voranschlag 2019 mit inte­ griertem Aufgaben- und Finanzplan 2020–2022 der Verwaltungsein­ heiten, Band 2B (EFD, WBF, UVEK), Bern 2018 Eidgenössischer Datenschutz- und Öffentlichkeitsbeauftragter (EDÖB) — 25. Tätigkeitsbericht 2017/18, Bern 2018 (zit. EDÖB, Tätigkeitsbericht 2017/18) — Erläuterungen zu Videoüberwachung in Fahrzeugen (Dashcam) (zit. EDÖB, Dashcams) — Videoüberwachung mit Drohnen durch Private (zit. EDÖB, Drohnen) Eidgenössisches Departement für auswärtige Angelegenheiten (EDA), Aide-mémoire: Kompetenzen und Vorgehen für Beschlüsse der Gemischten Ausschüsse der sektoriellen Abkommen Schweiz–EG, Bern, 6. September 2007 Engberts Bart / Gillissen Edo, Policing from Above: Drone Use by the Police, in: Custers (Hrsg.), The Future of Drone Use: Opportunities and Threats from Ethical and Legal Perspectives, Den Haag 2016, S. 93 ff. Ensthaler Jürgen, Technikrecht: Einige Anmerkungen zum Verhältnis von juristischem und technischem Wissen, InTeR 1/2013, S. 34 ff. Epiney Astrid, Besonders schützenswerte Personendaten, Zu den Anforderungen an die Rechtmässigkeit der Bearbeitung durch öffentliche Organe im Falle des Fehlens einer gesetzlichen Grundlage, in: Rumo-Jungo et al. (Hrsg.), Une empreinte sur le Code civil, Mélanges en l’honneur de Paul-Henri Steinauer, Bern 2013, S. 97 ff. XXX Literatur- und Quellenverzeichnis Epiney Astrid / Frei Nula, Zur Übernahme weiterentwickelten EU-Rechts durch den Bundesrat, Selbstständige Vertragsschlusskompetenzen im Rahmen der Bilateralen Abkommen am Beispiel der Liberalisierung des internationalen Schienenpersonenverkehrs, Jusletter 12. August 2019 Euler Thorsten / Cobus Vanessa / Koelle Marion, Nummernschilder für Drohnen, Gesellschaftliche Vorstellungen zur Regulation von Smart Cams im öffentlichen Raum, DuD 2017, S. 147 ff. Europäische Kommission — Riga declaration on remotely piloted aircraft (drones), «Framing the future of aviation», 6. März 2015 (zit. Europäische Kommission, Riga declaration) — Warsaw declaration, «Drones as leverage for jobs and new business opportunities», 24. November 2016 (zit. Europäische Kommission, Warsaw declaration) — Richtlinie 2009/48/EG über die Sicherheit von Spielzeug, Erläuternde Leitlinien, Version 1.9 vom 10. Februar 2016, Brüssel 2016 (zit. Europäische Kommission, Leitlinien) European Union Aviation Safety Agency (EASA) — Advance Notice of Proposed Amendment 2015-1, Introduction of a regulatory framework for the operation of drones, 31. Juli 2015 (zit. EASA, A-NPA) — Vorschlag für die Erstellung von gemeinsamen Vorschriften für den Betrieb von Drohnen in Europa, September 2015 (zit. EASA, Drohnen in Europa) — Prototype Commission Regulation on Unmanned Aircraft Operations, Explanatory Note, 22. August 2016 (zit. EASA, Explanatory Note) — Notice of Proposed Amendment (NPA) 2017-05 (A), Introduction of a regulatory framework for the operation of drones, 4. Mai 2017 (zit. EASA, NPA) — Opinion No 01/2018, Introduction of a regulatory framework for the operation of unmanned aircraft systems in the ‹open› and ‹specific› categories (zit. EASA, Opinion) — Safe operations of drones in Europe, On Air Newsletter, Issue 20, 28. September 2018 (zit. EASA, On Air) — Acceptable Means of Compliance (AMC) and Guidance Material (GM) to Part-UAS, UAS operations in the ‹open› and ‹specific› categories, Issue 1, 9. Oktober 2019 (zit. EASA, GM Part-UAS) Literatur- und Quellenverzeichnis XXXI — Acceptable Means of Compliance (AMC) and Guidance Material (GM) to Commission Implementing Regulation (EU) 2019/947, Issue 1, 9. Oktober 2019 (zit. EASA, GM Implementing Regulation) — Flying a drone awareness leaflets (zit. EASA, awareness leaflets) — Opinions Information (zit. EASA, Opinions Information) Falcone Marco / Hahn Jörg / Burger Thomas, Galileo, in: Teunissen/ Montenbruck (Hrsg.), Springer Handbook of Global Navigation Satellite Systems, Cham 2017, S. 247 ff. Farber Hillary B., Eyes in the Sky: Constitutional and Regulatory Approaches to Domestic Drone Deployment, Syracuse L. Rev. 2013, S. 1 ff. Feiler Lukas / Forgó Nikolaus / Weigl Michaela, The EU General Data Protection Regulation (GDPR): A Commentary, Woking 2018 Finn Rachel L. / Wright David, Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications, CLSR 28 (2012), S. 184 ff. Fluck Sara, Polizei mahnt — Dutzende private Drohnen über dem Züri-­ Fäscht, tagesanzeiger.ch, 8. Juli 2019 Flückiger Alexandre — Droits fondamentaux et vidéosurveillance par les particuliers et les autorités des espaces ouverts au public, in: Schwarzenegger/Nägeli (Hrsg.), Drittes Zürcher Präventionsforum: Videoüberwachung als Prävention?, Zürich 2011, S. 195 ff. (zit. Flückiger, vidéosurveillance) — L’autodétermination en matière de données personnelles: un droit (plus si) fondamental à l’ère digitale ou un nouveau droit de propriété?, AJP 2013, S. 837 ff. (zit. Flückiger, autodétermination) Frei Nula, Die Revision des Datenschutzgesetzes aus europarechtlicher Sicht, Jusletter 17. September 2018 Freudiger Patrick, Anstalt oder Aktiengesellschaft?, Zur Bedeutung der Rechtsform bei Ausgliederungen, Diss. Bern 2015, Bern 2016 Froomkin Michael A. / Colangelo P. Zak, Self-Defense Against Robots and Drones, 48 Conn. L. Rev. 2015 Nr. 1, S. 1 ff. Frowein Jochen Abr. / Peukert Wolfgang, Europäische Menschenrechtskonvention, EMRK-Kommentar, 3. Aufl., Kehl am Rhein 2009 Fumagalli Antonio, «Präsenz Schweiz» setzt auf Drohnen, Die PR-Agentur des Bundes will das Land noch stärker als Hochtechnologie-Standort positionieren, NZZ vom 4. Mai 2019, S. 31 XXXII Literatur- und Quellenverzeichnis Gächter Thomas, § 30 Allgemeine Grundrechtslehren, in: Biaggini/Gächter/Kiener (Hrsg.), Staatsrecht, 2. Aufl., Zürich/St. Gallen 2015, S. 437 ff. Gächter Thomas / Egli Philipp, Informationsaustausch im Umfeld der Sozial­hilfe, Jusletter 6. September 2010 Gächter Thomas / Werder Gregori, Einbettung ausgewählter Konzepte in das schweizerische Datenschutzrecht, in: Belser/Fasnacht/Blaser (Hrsg.), Instrumente zur Umsetzung des Rechts auf informationelle Selbstbestimmung, Zürich/Basel/Genf 2013, S. 87 ff. Galli Peter / Moser André / Lang Elisabeth / Steiner Marc, Praxis des öffentlichen Beschaffungsrechts, Eine systematische Darstellung der Rechtsprechung des Bundes und der Kantone, 3. Aufl., Zürich 2013 (zit. Galli et al.) Gasser Urs, Das Recht neu codieren, NZZ vom 6. Februar 2016, S. 12 Gättelin Patrick / Müller Reto Patrick, Klare Regeln für Drohnen­ einsätze, ASMZ 2006/10, S. 44 f. Geiser Thomas / Fountoulakis Christiana (Hrsg.), Basler Kommentar, Zivilgesetzbuch I, Art. 1–456 ZGB, 6. Aufl., Basel 2018 (zit. BSK ZGB IBearbeiter / in, Art. xx N xx) Geiser Thomas / Uttinger Ursula, Keine Selbstjustiz gegen Drohnen, NZZ vom 7. Februar 2018, S. 9 Geiser Thomas / Wolf Stephan (Hrsg.), Basler Kommentar, Zivilgesetzbuch II, Art. 457–977 ZGB und Art. 1–61 SchlT ZGB, 6. Aufl., Basel 2019 (zit. BSK ZGB II-Bearbeiter/-in, Art. xx N xx) Germann Peter, Modellflug und Drohnenbetrieb: der Unterschied, AeroRevue 11/2016, S. 13 Gerschwiler Stefan, § 3 Prinzipien der Datenbearbeitung durch Privatpersonen und Behörden, in: Passadelis/Rosenthal/Thür (Hrsg.), Datenschutzrecht, Beraten in Privatwirtschaft und öffentlicher Verwaltung, Basel 2015, S. 73 ff. Giemulla Elmar, Unbemannte Luftfahrzeugsysteme — Probleme ihrer Einfügung in das zivile und militärische Luftrecht, ZLW 2/2007, S. 195 ff. Giemulla Elmar / Freiherr von Bothmer Bernhard, Ziviler Einsatz von unbemannten Luftfahrzeugen, CP 2013, S. 20 f. Literatur- und Quellenverzeichnis XXXIII Giemulla Elmar / van Schyndel Heiko / Friedl Achim, Gewerblicher und privater Einsatz von Drohnen: Regelung des Betriebs von unbemannten Fluggeräten, Köln 2018 Gierschmann Sibylle / Schlender Katharina / Stentzel Rainer / Veil Winfried (Hrsg.), Kommentar Datenschutz-Grundverordnung, Köln 2018 (zit. Bearbeiter/-in, in: Gierschmann et al., Art. xx DSGVO N xx) Giger Hans, SVG Kommentar, Strassenverkehrsgesetz mit weiteren Erlassen, 8. Aufl., Zürich 2014 (zit. OFK SVG-Giger, Art. xx N xx) Giuriato Luca, Durchzogener Heimelektronik Markt 2017 mit Lichtblicken, GfK Marktbericht Consumer Electronics, 8. Februar 2018 Glaneuski Jason, Unmanned Aircraft System (UAS) Service Demand 2015– 2035, September 2013 Glaus Bruno, Das Recht an der eigenen Stimme: informationelle Selbst­ bestimmung als Schranke der Medienfreiheit mit allgemeinen Geschäftsbedingungen für das Mediengespräch, Diss. Zürich 1997, Bern 1997 Gnehm Oliver, Das datenschutzrechtliche Auskunftsrecht, in: Epiney/ Nüesch (Hrsg.), Durchsetzung der Rechte der Betroffenen im Bereich des Datenschutzes, Zürich 2015, S. 77 ff. Gogarty Brendan / Hagger Meredith, The Laws of Man over Vehicles Unmanned: The Legal Response to Robotic Revolution on Sea, Land and Air, JLIS 2008, S. 73 ff. Gola Peter (Hrsg.), Datenschutz-Grundverordnung, VO (EU) 2016/679, Kommentar, 2. Aufl., München 2018 (zit. Bearbeiter/-in, in: Gola, Art. xx DSGVO N xx) González Fuster Gloria, The Emergence of Personal Data Protection as a Fundamental Right of the EU, Diss. Brüssel 2013, Cham et al. 2014 Gorkič Primož, The (F)utility of Privacy Laws: The Case of Drones?, in: Završnik (Hrsg.), Drones and Unmanned Aerial Systems: Legal and Social Implications for Security and Surveillance, Cham et al. 2016, S. 69 ff. Grabenwarter Christoph, Die Vorratsdatenspeicherung aus der Perspektive der EMRK, der Grundrechte-Charta und des Verfassungsrechts, in: Stuckenberg/Gärditz (Hrsg.), Strafe und Prozess im freiheitlichen Rechtsstaat: Festschrift für Hans-Ullrich Paeffgen zum 70. Geburtstag am 2. Juli 2015, Berlin 2015, S. 779 ff. XXXIV Literatur- und Quellenverzeichnis Grabenwarter Christoph / Pabel Katharina, Europäische Menschenrechtskonvention: Ein Studienbuch, 6. Aufl., München und Basel und Wien 2016 Graf Martin / Theler Cornelia / von Wyss Moritz, Parlamentsrecht und Parlamentspraxis der Schweizerischen Bundesversammlung, Kommentar zum Parlamentsgesetz (ParlG) vom 13. Dezember 2002, Basel 2014 (zit. Bearbeiter/-in, Komm. ParlG, Art. xx N xx) Granshaw Stuart I., RPV, UAV, UAS, RPAS… or just Drone?, The Photogrammetric Record 33(162), S. 160 ff. Graumann Horst, Die Drohne — Biene, Flugmodell oder …?, in: Benkö/Kröll (Hrsg.), Luft- und Weltraumrecht im 21. Jahrhundert, Liber Amicorum Karl-Heinz Böckstiegel, Köln et al. 2001, S. 62 ff. Grest Lauren, The drone revolution: can privacy and data protection legislation keep up with the technology?, C.T.L.R. 2015, 21(5), S. 120 ff. Griebel Thorsten, Schutz der Persönlichkeitsrechte vor Drohnenauf­ nahmen, InTeR 2019 S. 106 ff. Griffel Alain, § 31 Schutz von Person und Persönlichkeit, in: Biaggini/Gächter/Kiener (Hrsg.), Staatsrecht, 2. Aufl., Zürich/St. Gallen 2015, S. 468 ff. Groh Benedikt A., Entwicklung eines Rechtsrahmens zum Betrieb ziviler unbemannter Fluggeräte, Diss. Frankfurt (Oder) 2018, München 2019 Grosskopf Lambert, Aktiver Schutz gegen Medien-Drohnen: Was wird verletzt und wie kann es geschützt werden?, CR 11/2014, S. 759 ff. Haas Raphaël, Die Einwilligung in eine Persönlichkeitsverletzung nach Art. 28 AbS. 2 ZGB, Diss. Luzern 2007, Zürich 2007 Häfelin Ulrich / Haller Walter / Keller Helen / Thurnherr Daniela, Schweizerisches Bundesstaatsrecht, 9. Aufl., Zürich/Basel/Genf 2016 (zit. Häfelin et al.) Häfelin Ulrich / Müller Georg / Uhlmann Felix, Allgemeines Verwaltungsrecht, 7. Aufl., Zürich/St. Gallen 2016 Häfliger Markus, Von der Luftwaffe beim Kiffen erwischt, NZZ vom 23. Mai 2004, S. 14 Haller Ursina, Drohnen sollen mit Chip fliegen, nzz.ch, 14. Juli 2016 (zit. Haller U.) Literatur- und Quellenverzeichnis XXXV Haller Walter, Menschenwürde, Recht auf Leben und persönliche Freiheit, in: Merten/Papier (Hrsg.), HGR VII/2, Heidelberg und Zürich/ St. Gallen 2007, S. 199 ff. (zit. Haller W.) Hänni Peter, Staatshaftung bei unterlassener Wahrnehmung von Schutzpflichten: Grundsatzfragen und Rechtsprechung im Bereich von Menschenrechten, in: Rüssli/Hänni/Häggi Furrer (Hrsg.), Staats- und Verwaltungsrecht auf vier Ebenen: Festschrift für Tobias Jaag, Zürich/ Basel/Genf 2012, S. 429 ff. Hänni Peter / Stöckli Andreas, Schweizerisches Wirtschaftsverwaltungsrecht, Bern 2013 Hänsenberger Silvio — Wenn Drohnen vom Himmel fallen — luftrechtliche Haftungsfragen, AJP 2017, S. 163 ff. (zit. Hänsenberger, AJP 2017) — Die zivilrechtliche Haftung für autonome Drohnen unter Einbezug von Zulassungs- und Betriebsvorschriften, Diss. St. Gallen 2018, Berlin 2018 (zit. Hänsenberger, Diss.) Hänsenberger Silvio/Wildhaber Isabelle, Risiko im Anflug? Die Regulierung ziviler Drohnen, sui-generis 2016, S. 82 ff. Harasgama Rehana C., Erfahren — Wissen — Vergessen, Zur zeitlichen Dimension des staatlichen Informationsanspruches, Diss. St. Gallen 2017, Zürich/St. Gallen 2017 Harris David / O’Boyle Michael / Bates Ed / Buckley Carla, Harris, O’Boyle & Warbrick, Law of the European Convention on Human Rights, 4. Aufl., Oxford 2018 (zit. Harris et al.) Harris Matt / Given Peter, Privacy issues and drones: preparing for take-­ off, P. & D.P. 2014, S. 7 ff. Hassanalian Mostafa / Abdelkefi Abdessattar, Classification, applications, and design challenges of drones: A review, Progress in Aerospace Sciences 2017, S. 99 ff. Hausheer Heinz / Aebi-Müller Regina E., Das Personenrecht des Schweizerischen Zivilgesetzbuches, 4. Aufl., Bern 2016 Haustein Berthold H., Herausforderungen des Datenschutzrechtes vor dem Hintergrund aktueller Entwicklungen in der Robotik, in: Hilgendorf/Günther (Hrsg.), Robotik und Gesetzgebung: Beiträge der Tagung vom 7. bis 9. Mai 2012 in Bielefeld, Baden-Baden 2013, S. 93 ff. XXXVI Literatur- und Quellenverzeichnis Hegetschweiler Marcel, Drohnen im Dienste der Wirtschaft, Zürcher Wirtschaft 5/2019, S. 5 Henseler David — Die rechtliche Einordnung von Drohnen: Eine kritische Würdigung der heutigen Rechtslage und Überlegungen de lege ferenda, in: Canapa/Landolt/Müller (Hrsg.), Sein und Schein der Gesetzgebung: Erwartungen — Auswirkungen — Kritik, Zürich 2018, S. 115 ff. (zit. Henseler, Einordnung) — Von Drohnen und anderen Baupolizisten: Verfassungsrechtliche Überlegungen zum Einsatz von Drohnen zur Baukontrolle, Jusletter 25. Juni 2018 (zit. Henseler, Baupolizist) — Wenn die Digitalisierung Behörden lahmlegt …, Rechtliche Handlungsoptionen bei Untätigkeit einer Bundesbehörde — am Beispiel des Bundesamts für Zivilluftfahrt (BAZL), in: Dal Molin-Kränzlin/Schneuwly/ Stojanovic (Hrsg.), Digitalisierung und Recht, Zürich 2019, S. 183 ff. (zit. Henseler, Digitalisierung) Hertzberg Joachim / Lingemann Kai / Nüchter Andreas, Mobile Roboter: Eine Einführung aus Sicht der Informatik, Berlin/Heidelberg 2012 Hesse David, Surr mich nicht an, derbund.ch, 31. Mai 2017 Hilf Juliane / Umbach Klaus, The Commercial Use of Drones, An Overview of Regulatory Developments in the US and the EU, CRi 3/2015, S. 65 ff. Hodel Alois, Entwicklung der Landwirtschaft — Grosser Umbruch, BlAR 2016 Nr. 2-3, S. 17 ff. Hodgkinson David / Johnston Rebecca, Aviation Law and Drones: Unmanned Aircraft and the Future of Aviation, Oxford 2018 Honsell Heinrich (Hrsg.), Kurzkommentar OR, Basel 2014 (zit. KuKo ORBearbeiter/-in, Art. xx N xx) Honsell Heinrich / Vogt Nedim Peter / Watter Rolf (Hrsg.), Basler Kommentar, Obligationenrecht II, Art. 530–964 OR inkl. Schlussbestimmungen, 5. Aufl., Basel 2016 (zit. BSK OR II-Bearbeiter/-in, Art. xx N xx) Howley Kevin, Drones: Media Discourse and the Public Imagination, New York et al. 2018 Hrubesch-Millauer Stephanie/Bruggisser David, Sachenrechtliche Aspekte zum Einsatz von privaten Drohnen, Jusletter 11. August 2014 Huber Hans, Das Recht im technischen Zeitalter, Berner Rektoratsreden, Bern 1960 (zit. Huber H.) Literatur- und Quellenverzeichnis XXXVII Huber Martin, Drohnenflug bleibt straflos — weil bestimmte Augenzeugen fehlen, tagesanzeiger.ch, 8. Juli 2014 (zit. Huber M.) Huber Rolf, Rechtsprobleme der Personalakte, Diss. Zürich 1984, Zürich 1984 (zit. Huber R.) Husi-Stämpfli Sandra, DSG-Revision: Schritt in die richtige Richtung, digma 2017, S. 50 ff. Huttunen Mikko — Unmanned, Remotely Piloted, or Something Else?, Analysing the Ter­ minological Dogfight, Air & Space Law 2017, S. 349 ff. (zit. Huttunen, Unmanned) — The U-space Concept, Air & Space Law 2019, S. 69 ff. (zit. Huttunen, U-space) International Civil Aviation Organization (ICAO), Circular 328 AN/190, Unmanned Aircraft Systems (UAS), Montreal 2011 (zit. ICAO) International Transport Forum at the OECD, (Un)certain Skies?, Drones in the World of Tomorrow, Corporate Partnership Board Report, 22. Mai 2018 (zit. ITF/OECD) Isensee Josef — Das Grundrecht auf Sicherheit: Zu den Schutzpflichten des freiheitlichen Verfassungsstaates, Berlin/New York 1983 (zit. Isensee, Sicherheit) — § 191 Das Grundrecht als Abwehrrecht und als staatliche Schutzpflicht, in: Isensee/Kirchhof (Hrsg.), Handbuch des Staatsrechts der Bundesrepublik Deutschland, Band IX, Allgemeine Grundrechtslehren, 3. Aufl., Heidelberg 2011, S. 413 ff. (zit. Isensee, Handbuch, Rn. xx) Jackman Anna, Consumer drone evolutions: trends, spaces, tempora­lities, threats, Defense & Security Analysis, 24. Oktober 2019 Jöhri Yvonne, § 8 Aufgabe und Bedeutung der öffentlichen Datenschutzbeauftragten, in: Passadelis/Rosenthal/Thür (Hrsg.), Datenschutzrecht, Beraten in Privatwirtschaft und öffentlicher Verwaltung, Basel 2015, S. 245 ff. Joint Authorities for Rulemaking on Unmanned Systems (JARUS) — UAS Operational Categorization, Version 1.0, 21. Juni 2019 (zit. JARUS, Categorization) — Recommendations for Unmanned Aircraft Systems (UAS) Category A & Category B Operations, Version 1.0, 11. Juli 2019 (zit. JARUS, Operations) XXXVIII Literatur- und Quellenverzeichnis Jones Kevin D. / Platzer Max F., Flapping-Wing Propelled Micro Air Ve­hic­les, in: Valavanis/Vachtsevanos (Hrsg.), Handbook of Unmanned Aerial Vehicles, Volume III, Heidelberg/New York/London 2015, S. 1359 ff. Josipovic Neven, Europäische Regulierung des Betriebs unbemannter Luftfahrzeuge, NVwZ 2019, S. 438 ff. Juniper Adam, Das Drohnen Praxisbuch, Kauf — Selbstbau — Foto & Video — Rennen, Heidelberg 2018 Kaiser Stefan A., Legal Aspects of Unmanned Aerial Vehicles, ZLW 3/2006, S. 343 ff. Kälin Walter / Künzli Jörg, Universeller Menschenrechtsschutz, Der Schutz des Individuums auf globaler und regionaler Ebene, 4. Aufl., Basel 2019 Karjoth Günther, Fähigkeiten der Gesichtserkennung, digma 2019, S. 6 ff. Karlen Peter — Das Grundrecht der Religionsfreiheit in der Schweiz, Diss. Zürich 1987, Zürich 1988 (zit. Karlen, Religionsfreiheit) — Schweizerisches Verwaltungsrecht, Zürich 2018 (zit. Karlen, Verwaltungsrecht) Karpenstein Ulrich / Mayer Franz C. (Hrsg.), Konvention zum Schutz der Menschenrechte und Grundfreiheiten: Kommentar, 2. Aufl., München 2015 (zit. Karpenstein/Mayer-Bearbeiter/-in, Art. xx EMRK N xx) Keller Benjamin, Ausbildung von Drohnen-Besatzungen in der Schweizer Luftwaffe, ASMZ 2013/7, S. 32 f. Kettiger Daniel — Das gerichtliche Verbot als Instrument zur Abwehr ziviler Drohnen, Jusletter 11. April 2016 (zit. Kettiger, Abwehr) — Rechtliche Rahmenbedingungen des Einsatzes von Drohnen zum Erheben von Geobasisdaten, cadastre Nr. 20, April 2016, S. 24 ff. (zit. Kettiger, Geobasisdaten) Kiener Regina — Die «Rote Zora», die Zuhälterbande und die Polizei: Wie das Zürcher Kassationsgericht (sinngemäss) Schutzpflichten anerkannte, in: Jositsch/ Schwarzenegger/Wohlers (Hrsg.), Festschrift für Andreas Donatsch, Zürich/Basel/Genf 2017, S. 619 ff. (zit. Kiener, «Rote Zora») — Zugang zur Justiz, ZSR 138 II, S. 5 ff. (zit. Kiener, Zugang) Literatur- und Quellenverzeichnis XXXIX — V.2 Grundrechte in der Bundesverfassung, in: Hertig/Schindler/Diggelmann (Hrsg.), Verfassungsrecht der Schweiz / Droit constitutionnel suisse, 2. Aufl., im Erscheinen (zit. Kiener, Grundrechte in der BV) — V.6 Grundrechtsschranken, in: Hertig/Schindler/Diggelmann (Hrsg.), Verfassungsrecht der Schweiz / Droit constitutionnel suisse, 2. Aufl., im Erscheinen (zit. Kiener, Grundrechtsschranken) Kiener Regina / Kälin Walter / Wittenbach Judith, Grundrechte, 3. Aufl., Bern 2018 Kiener Regina / Leuzinger Andreas, Verdeckte polizeiliche Massnahmen, in: Kiener/Bühler/Schindler (Hrsg.), Sicherheits- und Ordnungsrecht des Bundes, SBVR III/2, Basel 2018, S. 470 ff. Kiener Regina / Rütsche Bernhard / Kuhn Mathias, Öffentliches Verfahrensrecht, 2. Aufl., Zürich/St. Gallen 2015 Klauser Francisco / Pedrozo Silvana, Big data from the sky: popular per­ceptions of private drones in Switzerland, Geogr. Helv. 72 (2017), S. 231 ff. Klauser Francisco / Pauschinger Dennis / Pedrozo Silvana / Stuber Lea / Placi Rahel, Professional Drone Usage in Switzerland: Results of a Quantitative Survey of Public and Private Drone Users, MAPS Working Paper 2/2017, Neuenburg 2017 Klein Hans H., Die grundrechtliche Schutzpflicht, DVBl 1994, S. 489 ff. Kley Andreas, Der Grundrechtskatalog der nachgeführten Bundesverfassung — ausgewählte Neuerungen, ZBJV 1999, S. 301 ff. Klitou Demetrius, Privacy-Invading Technologies and Privacy by Design, Safeguarding Privacy, Liberty and Security in the 21st Century, Den Haag 2014 Koelle Marion / Brück Yvonne / Cobus Vanessa / Heuten Wilko / Boll Susanne, Respektvolle tragbare Kameras?, Technische Gestaltung einer sozialakzeptablen Nutzung von Datenbrillen und Smart Cams, DuD 2017, S. 152 ff. (zit. Koelle et al.) Kokott Juliane / Sobotta Christoph, The distinction between privacy and data protection, IDPL 2013 (4), S. 222 ff. XL Literatur- und Quellenverzeichnis Koops Bert-Jaap / Leenes Ronald, Privacy Regulation Cannot Be Hardcoded. A critical comment on the ‹privacy by design› provision in dataprotection law, International Review of Law, Computers & Technology Vol. 28 (2014), S. 159 ff. Kornmeier Claudia, Der Einsatz von Drohnen zur Bildaufnahme: Eine luftverkehrsrechtliche und datenschutzrechtliche Betrachtung, Diss. Freiburg i.Br. 2011, Berlin 2012 Kramer Ernst A., Juristische Methodenlehre, 6. Aufl., München und Wien und Bern 2019 Krumm Malte — Der neue europäische Rechtsrahmen für unbemannte Luftfahrzeuge — Anpassungsbedarf im deutschen Luftverkehrsrecht?, EuZW 2019, S. 114 ff. (zit. Krumm, Anpassungsbedarf) — Luftverkehrsrecht: Neuer europäischer Rechtsrahmen für unbemannte Luftfahrzeuge tritt in Kraft, EuZW 2019, S. 484 (zit. Krumm, Rechts­ rahmen) Kühling Jürgen, Datenschutz und die Rolle des Rechts, in: Stiftung Datenschutz (Hrsg.), Zukunft der informationellen Selbstbestimmung, Berlin 2016, S. 49 ff. Kühling Jürgen / Buchner Benedikt (Hrsg.), Datenschutz-Grundverordnung, Kommentar, München 2017 (zit. Bearbeiter/-in, in: Kühling/ Buchner, Art. xx DSGVO N xx) Kühling Jürgen / Sivridis Anastasios / Schwuchow Mathis / Thorben Burghardt, Das datenschutzrechtliche Vollzugsdefizit im Bereich der Telemedien — ein Schreckensbericht, DuD 6/2009, S. 335 ff. (zit. Kühling et al.) Kunz Peter V., Staatsbeteiligungen und ausgewählte Verantwortlichkeiten, GesKR 2018, S. 156 ff. Künzli Jörg, Zwischen Rigidität und Flexibilität: Der Verpflichtungsgrad internationaler Menschenrechte, Diss. Bern 1999, Berlin 2001 Kutschera Wolfgang, Rechtliche Grundlagen für die Verwendung von Drohnen in Österreich, Diss. Linz 2016, Linz 2016 Labiod Houda / Afifi Hossam / De Santis Costantino, WiFi, Bluetooth, Zigbee and WiMax, Dordrecht 2007 Literatur- und Quellenverzeichnis XLI Landrock Holm / Baumgärtel Anne, Die Industriedrohne — der fliegende Roboter, Professionelle Drohnen und ihre Anwendung in der Industrie 4.0, Wiesbaden 2018 Langner Dirk / Klindt Thomas / Schucht Carsten, Kapitel C. VI. Technische Sicherheitsvorschriften und Normen, in: Dauses/Ludwigs (Hrsg.), Handbuch des EU-Wirtschaftsrechts, 47. Ergänzungslieferung, März 2019, München 2019 Laumanns Horst W., Drohnen: seit 1990, Stuttgart 2012 Lavallée Chantal, The New EU Policy on Civil Drones, A Paradigm Shift for European Airspace, PRIO Policy Brief 5/2019, S. 1 ff. Lavrysen Laurens — Human Rights in a Positive State, Rethinking the Relationship between Positive and Negative Obligations under the European Convention on Human Rights, Cambridge/Antwerpen/Portland 2017 (zit. Lavrysen, Positive State) — System of Restrictions, in: van Dijk et al. (Hrsg.), Theory and Practice of the European Convention on Human Rights, 5. Aufl., Cambridge/Antwerpen/Portland 2018, S. 307 ff. (zit. Lavrysen, Restrictions) Lee Isabella, DJI Maintains 74% of Market Share, Three Key Insights from the Skylogic 2018 Drone Market Report, 19. September 2018 Lee Yeon-Hee, Neue Kriterien für einen Eingriff in die informationelle Selbstbestimmung, Diss. Hamburg 2016, Hamburg 2016 Leenes Ronald / Palmerini Erica / Koops Bert-Jaap / Bertolini Andrea / Salvini Pericle / Lucivero Federica, Regulatory challenges of robo­ tics: some guidelines for addressing legal and ethical issues, Law, Innovation and Technology, Vol. 9 Nr. 1, S. 1 ff. (zit. Leenes et al.) Leissler Günther, Drohnen und Datenschutz: ein europäisches Problem, ecolex 2015, S. 535 ff. Lenk Klaus, Der Staat am Draht: Electronic Government und die Zukunft der öffentlichen Verwaltung — eine Einführung, Berlin 2004 Leutert Stefan, Polizeikostentragung bei Grossveranstaltungen: eine Studie unter Berücksichtigung der Grundrechte, des Polizeirechts und des Abgaberechts, Diss. Zürich 2005, Zürich 2005 Lynskey Orla, The Foundations of EU Data Protection Law, Diss. Cambridge 2009, Oxford 2015 XLII Literatur- und Quellenverzeichnis Mahn-Gauseweg Carolin, Automated Warfare — Operationen unbemannter Systeme: Eine technische Systematisierung, in: Frau (Hrsg.), Drohnen und das Recht, Tübingen 2014, S. 1 ff. Mahon Pascal, Droit constitutionnel, Volume II, Droits fondamentaux, 3. Aufl., Basel/Neuenburg 2015 Malgieri Gianclaudio, La titolarità dei dati trattati per mezzo dei droni tra privacy e proprietà intellettuale, in: Palmerini/Biasiotti/Aiello (Hrsg.), Diritto dei Droni: Regole, questioni e prassi, Mailand 2018, S. 163 ff. Marsch Nikolaus, Das europäische Datenschutzgrundrecht, Grundlagen — Dimensionen — Verflechtungen, München 2018 Marte Daniel A. / Anania Emily C. / Rice Stephen / Mehta Rian / Milner Mattie N. / Winter Scott R. / Walters Nathan W. / Capps John / Ragbir Nadine K., What type of person supports 24/7 police drones over neighbourhoods? A regression analysis, JUAS 2018 Vol. 4 Nr. 1, S. 61 ff. (zit. Marte et al.) Marti Gian Andrea, Die Schweiz wappnet sich gegen Drohnen, NZZ vom 21. März 2018, S. 17 Martin Céline, Grundrechtskollisionen, Diss. Basel 2007, Basel 2007 Martini Mario, Neue Freunde und Helfer?, Drohnen als Mittel der Beobachtung von Grossveranstaltungen und Versammlungen, DÖV 18/2019, S. 732 ff. Masutti Anna, The Regulation of Unmanned Air System Use in Common Airspace, JLIS Special Edition: The Law of Unmanned Vehicles 2011/2012, S. 212 ff. Masutti Anna / Tomasello Filippo, International Regulation of NonMilitary Drones, Cheltenham/Northampton 2018 Matter Livia, Gesichtserkennung auf dem Vormarsch, digma 2019, S. 14 ff. Matthias Andreas, Automaten als Träger von Rechten. Plädoyer für eine Gesetzesänderung, Diss. Berlin 2007, Berlin 2008 Mauchle Yves, Die regulatorische Antwort auf FinTech: Evolution oder Revolution?, Eine Verortung aktueller Entwicklungen, SZW 2017, S. 810 ff. Maurer-Lambrou Urs / Blechta Gabor P., Datenschutzgesetz Öffentlichkeitsgesetz, Basler Kommentar, 3. Aufl., Basel 2014 (zit. BSK DSG-Bearbeiter/-in, Art. xx N xx) Literatur- und Quellenverzeichnis XLIII McNally Maya, Recht der Sicherung und der Finanzierung von Luftfahrzeugen, Unter besonderer Berücksichtigung des Übereinkommens über internationale Sicherungsrechte an beweglicher Ausrüstung und des Protokolls betreffend Besonderheiten der Luftfahrzeugausrüstung (Kapstadt 2011), Diss. Luzern 2009, Zürich/St. Gallen 2009 Medici Gabriela Naemi, Migrantinnen als Pflegehilfen in Schweizer Privathaushalten: Menschenrechtliche Vorgaben und staatliche Handlungspflichten, Diss. Zürich 2015, Zürich/Basel/Genf 2015 Mégret Frédéric, Nature of Obligations, in: Moeckli/Shah/Sivakumaran (Hrsg.), International Human Rights Law, 3. Aufl., Oxford 2018, S. 86 ff. Meier Philippe, Protection des données: Fondements, principes généraux et droit privé, Bern 2011 Meier-Hayoz Arthur / Forstmoser Peter / Sethe Rolf, Schweizerisches Gesellschaftsrecht, 12. Aufl., Bern 2018 Meili Andreas, Freiheit zwischen Gucklöchern und Scheinwerfern — Eine Standortbestimmung zum Persönlichkeitsschutz im digitalen Zeitalter, NZZ vom 24. August 2015, S. 46 Meili Katja, Grundlagen und Grundsätze der Luftfahrthaftpflicht, Zürich 2014 Mendes de Leon Pablo / Scott Benjamyn Ian, An Analysis of Unmanned Aircraft Systems Under Air Law, in: Završnik (Hrsg.), Drones and Unmanned Aerial Systems: Legal and Social Implications for Security and Surveillance, Cham et al. 2016, S. 185 ff. Mihalyi Jessica S., Risiken und Rechtspflichten: Das Zusammenspiel von 3D-Druck-Technologie und IT-Sicherheitsrecht, InTeR 2017, S. 193 ff. Moeckli Daniel, V.10 Persönlichkeitsschutz, in: Hertig/Schindler/Diggelmann (Hrsg.), Verfassungsrecht der Schweiz / Droit constitutionnel suisse, 2. Aufl., S. 477 ff., im Erscheinen Mohler Markus H.F. — Grundzüge des Polizeirechts in der Schweiz, Basel 2012 (zit. Mohler, Polizeirecht) — Staatliches Gewaltmonopol, Sicherheit & Recht 3/2012, S. 152 ff. (zit. Mohler, Gewaltmonopol) XLIV Literatur- und Quellenverzeichnis Moor Pierre / Bellanger François / Tanquerel Thierry, Droit administratif, Volume III: L’organisation des activités administratives. Les biens de l’Etat, 2. Aufl., Bern 2018 Mowbray Alastair R., The Development of Positive Obligations under the European Convention on Human Rights by the European Court of Human Rights, Oxford/Portland 2004 Müller Georg — Die Drittwirkung der Grundrechte, Überblick über den Stand der Diskussion in Lehre und Rechtsprechung, ZBl 1978, S. 233 ff. (zit. Müller G., Drittwirkung) — Rechtskenntnis und Gesetzessprache, in: Müller et al. (Hrsg.), Staats­ organisation und Staatsfunktionen im Wandel, Festschrift für Kurt ­Eichenberger zum 60. Geburtstag, Basel/Frankfurt a.M. 1982, S. 152 ff. (zit. Müller G., Rechtskenntnis) — § 204 Schutzwirkung der Grundrechte, in: Merten/Papier (Hrsg.), Handbuch der Grundrechte in Deutschland und Europa, Band VII/2, Grundrechte in der Schweiz und in Liechtenstein, Heidelberg 2007, S. 59 ff. (zit. Müller G., HdG VII/2) Müller Georg / Uhlmann Felix, Elemente einer Rechtssetzungslehre, 3. Aufl., Zürich 2013 Müller Jörg Paul — Die Grundrechte der Verfassung und der Persönlichkeitsschutz des Privat­rechts, Diss. Bern 1964, Bern 1964 (zit. Müller J.P., Diss.) — Elemente einer schweizerischen Grundrechtstheorie, Bern 1982 (zit. Müller J.P., Elemente) — Verwirklichung der Grundrechte nach Art. 35 BV: Der Freiheit Chancen geben, Bern 2018 (zit. Müller J.P., Verwirklichung) Müller Lucien — Videoüberwachung in öffentlich zugänglichen Räumen — insbesondere zur Verhütung und Ahndung von Straftaten, Diss. St. Gallen 2011, Zürich/ St. Gallen 2011 (zit. Müller L., Diss.) — Private Videoüberwachung in öffentlich zugänglichen Räumen — Datenschutzrechtliche Aspekte, Sicherheit & Recht 2/2012, S. 63 ff. (zit. Müller L., Sicherheit & Recht 2/2012) Literatur- und Quellenverzeichnis XLV Murswiek Dietrich — Die staatliche Verantwortung für die Risiken der Technik: Verfassungsrechtliche Grundlagen und immissionsschutzrechtliche Ausformung, Berlin 1985 (zit. Murswiek, Verantwortung) — Freiheit und Freiwilligkeit im Umweltrecht, JZ 1988, S. 985 ff. (zit. Murswiek, Freiheit) Nadakavukaren Schefer Krista, Ein völkerrechtlicher Schutz der kollektiven Privatsphäre?, Der Schutz der Privatsphäre und die Anonymität im Zeitalter kommerzieller Drohnen, ZSR 2014 I, S. 259 ff. Niggli Marcel Alexander / Wiprächtiger Hans (Hrsg.), Basler Kommentar, Strafrecht (StGB/JStGB), 4. Aufl., Basel 2019 (zit. BSK StGB-Bearbeiter/-in, Art. xx N xx) Noll Peter, Gesetzgebungslehre, Reinbek bei Hamburg 1973 Nussbaum Hans Georg, Polizeiliche Massnahmen im Bereich des Zollwesens, in: Kiener/Bühler/Schindler (Hrsg.), Sicherheits- und Ordnungsrecht des Bundes, SBVR III/2, S. 232 ff. Oesch Matthias, Europarecht, Band I: Grundlagen, Institutionen, Verhältnis Schweiz–EU, 2. Aufl., Bern 2019 Paal Boris P. / Pauly Daniel A. (Hrsg.), Datenschutz-Grundverordnung, Beck’sche Kompakt-Kommentare, 2. Aufl., München 2018 (zit. Bearbeiter/-in, in: Paal/Pauly, Art. xx DSGVO N xx) Palmerini Erica, I Droni per uso civile nella prospettiva giuridica: Appunti per una sistemazione concettuale e normativa, in: Palmerini/Biasiotti/ Aiello (Hrsg.), Diritto dei Droni: Regole, questioni e prassi, Mailand 2018, S. 3 ff. Pärli Kurt, Observationen von Versicherten — Der Gesetzgeber auf Abwegen, recht 2018, S. 120 ff. Pauner Cristina / Viguri Jorge, A Legal Approach to Civilian Use of Drones in Europe. Privacy and Personal Data Protection Concerns, Democrazia e Sicurezza 2015 Nr. 3, S. 85 ff. Pedrazzini Mario M. — Die Grundlagen des Datenschutzes im Privatbereich: die Grundzüge und der Geltungsbereich des Bundesgesetzes, in: Schweizer (Hrsg.), Das neue Datenschutzrecht des Bundes, Zürich 1993, S. 19 ff. (zit. Pedrazzini, Grundlagen) XLVI Literatur- und Quellenverzeichnis — Der Rechtsschutz der betroffenen Personen gegenüber privaten Bearbeitern (Klagen, vorsorgliche Massnahmen, Gerichtsstand), in: Schweizer (Hrsg.), Das neue Datenschutzrecht des Bundes, Zürich 1993, S. 81 ff. (zit. Pedrazzini, Rechtsschutz) Pedrozo Silvana, Swiss military drones and the border space: a critical study of the surveillance exercised by border guards, Geogr. Helv. 72 (2017), S. 97 ff. Pedrozo Silvana / Klauser Francisco, Drones d’utilité publique: Une acceptabilité controversée, EspacesTemps.net, 13. Juli 2018 Perritt Henry H. / Sprague Eliot O. — Drones, Vanderbilt Journal of Entertainment and Technology Law 3/2015, S. 673 ff. (zit. Perritt / Sprague, JETLaw) — Law Abiding Drones, STLR 2015, S. 385 ff. (zit. Perritt / Sprague, STLR) — Domesticating Drones: The Technology, Law, and Economics of Unmanned Aircraft, Oxford/New York 2017 (zit. Perritt/Sprague, Domes­ ti­­cating Drones) Peter James T., Das Datenschutzgesetz im Privatbereich: Unter besonderer Berücksichtigung seiner motivationalen Grundlage, Diss. Zürich 1994, Zürich 1994 Pétermann Nathanaël, Les obligations positives de L’Etat dans la juris­ prudence de la Cour européenne des droits de l’homme: Théorie générale, incidences législatives et mise en œuvre en droit suisse, Diss. Lausanne 2014, Bern 2014 Peterson Mark Edward, The UAV and the Current and Future Regulatory Construct for Integration into the National Airspace System, Journal of Air Law and Commerce 2006, S. 521 ff. Plath Kai-Uwe (Hrsg.), DSGVO/BDSG, Kommentar zu DSGVO, BDSG und den Datenschutzbestimmungen von TMG und TKG, 3. Aufl., Köln 2018 (zit. Bearbeiter/-in, in: Plath, Art. xx DSGVO N xx) Plücken Milan A., Unbemannte Luftfahrzeugsysteme: Zulassungsvorgaben und -vorschriften der ICAO bzw. der EU, Diss. Köln 2016, Köln 2017 Poledna Thomas / Codoni Stefano, Sanktionierung von Informationsrechtsverletzungen, in: Baeriswyl/Rudin (Hrsg.), Perspektive Datenschutz, Praxis und Entwicklungen in Recht und Technik, Zürich 2002, S. 265 ff. Literatur- und Quellenverzeichnis XLVII Poltier Etienne, Droit des marchés publics, Bern 2014 Popper Ben, Our favorite drone crash-landed at the White House, 26. Januar 2015 Post CH AG — Weitere Drohnenflüge in Lugano, Medienmitteilung vom 4. Oktober 2017 (zit. Post, Medienmitteilung 4. Oktober 2017) — Drohnen, Längst keine Vision mehr (zit. Post, Drohnen) — Abgestürzte Post-Drohne ist geborgen, Medienmitteilung vom 28. Januar 2019 (zit. Post, Medienmitteilung 28. Januar 2019) — Post nimmt Drohnenflüge im Dienste der Medizin wieder auf, Mitteilung vom 12. April 2019 (zit. Post, Mitteilung 12. April 2019) Powers Caitlin / Mellinger Daniel / Kumar Vijay, Quadromotor Kinematics and Dynamics, in: Valavanis/Vachtsevanos (Hrsg.), Handbook of Unmanned Aerial Vehicles, Volume I, Heidelberg/New York/London 2015, S. 307 ff. Preznuk David, The Drone Age: A Primer for Individuals and the Enterprise, Haymarket 2016 Pugin Catherine, Ferngelenkte fliegende Kisten: Kurzfassung der TASWISS-Studie «Zivile Drohnen — Herausforderungen und Perspektiven», Bern 2018 Pulver Bernhard, Die Verbindlichkeit staatlicher Schutzpflichten — am Beispiel des Arbeitsrechts, AJP 2005, S. 413 ff. Pytlik Zillig Lisa M. / Duncan Brittany / Elbaum Sebastian / Detweiler Carrick, A Drone by Any Other Name, IEEE Technology and Science Magazine, März 2018, S. 80 ff. (zit. Pytlik Zillig et al.) Rao Bharat / Gopi Ashwin G. / Maione Romana, The societal impact of commercial drones, Technology in Society 45 (2016), S. 83 ff. Rebane Gerli, EASA Basic Regulation, Improving the Performance of the European Aviation Safety System, ZLW 2019, S. 51 ff. Rehbinder Manfred, Rechtssoziologie, 8. Aufl., München 2014 Reimers Andreas, Multikopter-Einsatz am Beispiel Rangierbahnhof Limmat­ tal SBB, cadastre Nr. 19, Dezember 2015, S. 14 ff. Rensmann Thilo, Wertordnung und Verfassung, Das Grundgesetz im Kontext grenzüberschreitender Konstitutionalisierung, Tübingen 2007 XLVIII Literatur- und Quellenverzeichnis Revnivykh Sergey / Bolkunov Alexey / Serdyukov Alexander / Monten­bruck Oliver, GLONASS, in: Teunissen/Montenbruck (Hrsg.), Springer Handbook of Global Navigation Satellite Systems, Cham 2017, S. 219 ff. (zit. Revnivykh et al.) Rhinow René / Schefer Markus / Uebersax Peter, Schweizerisches Verfassungsrecht, 3. Aufl., Basel 2016 Rice Stephen / Tamilselvan Gajapriya / Winter Scott R. / Milner Mattie N. / Anania Emily C. / Sperlak Lauren / Marte Daniel A., Public perception of UAS privacy concerns: a gender comparison, JUVS 2018 Vol. 6 Nr. 2, S. 83 ff. (zit. Rice et al.) Riedi Severin, Die technischen Normen der Internationalen Organisation für Zivilluftfahrt (ICAO), Diss. Bern 2014, Bern 2015 Roma Alfredo, Remotely Piloted Aircraft Systems: Privacy and Data Protection Implications, ASJ XXIII (2014) Nr. 1, S. 22 ff. Rose Eugen, Datenbrillen, Drohnen, Dashcams …, Smart Cams im öffentlichen Raum allein durch Rechtsprechung nicht beherrschbar, DuD 2017, S. 137 ff. Rosenthal David — Der Entwurf für ein neues Datenschutzgesetz, Jusletter 27. November 2017 (zit. Rosenthal, Entwurf) — Controller oder Processor: Die datenschutzrechtliche Gretchenfrage, Jusletter 17. Juni 2019 (zit. Rosenthal, Controller) Rosenthal David / Jöhri Yvonne, Handkommentar zum Datenschutz­ gesetz sowie weiteren, ausgewählten Bestimmungen, Zürich 2008 ­(zit. Handkomm. DSG-Bearbeiter/-in, Art. xx N xx) Rothen Eduard, Haftpflicht- und Versicherungsrecht — Gegenverkehrs­ kollisionen, in: Schaffhauser (Hrsg.), Jahrbuch zum Strassenverkehrsrecht 2015, Bern 2015, S. 49 ff. Rudin Beat, Datenschutzreform in der Schweiz: EU-Nachvollzug — idealistisch und realpolitisch, in: Breitenmoser/Lagodny/Uebersax (Hrsg.), Schengen und Dublin in der Praxis: Aktuelle Herausforderungen, Zürich/St. Gallen 2018, S. 215 ff. Rudin Beat / Baeriswyl Bruno (Hrsg.), Praxiskommentar zum Informations- und Datenschutzgesetz des Kantons Basel-Stadt (IDG), Zürich/ Basel/Genf 2014 (zit. PK IDG/BS-Bearbeiter/-in, Art. xx N xx) Literatur- und Quellenverzeichnis XLIX Ruegg Jean / Flückiger Alexandre / November Valérie / Klauser Francisco, Vidéosurveillance et risques dans l’espace à usage public: Représentations des risques, régulation sociale et liberté de mouve­ ment, Genf 2006 (zit. Ruegg et al.) Ruijten Peter A. M. / Cuijpers Raymond H., If Drones Could See: Investigating Evaluations of a Drone with Eyes, in: Shuzhi et al. (Hrsg.), 10th International Conference on Social Robotics 2018, Cham 2018, S. 65 ff. Rupp Martin, Die grundrechtliche Schutzpflicht des Staates für das Recht auf informationelle Selbstbestimmung im Pressesektor, Diss. Saar­ brücken 2013, Saarbrücken 2013 Saeed Saim, Europe buys Chinese drones, even as US expresses data concerns, EU countries are using commercial Chinese drones and experts say that rings alarm bells, 9. September 2019 Sägesser Thomas (Hrsg.), Die Bundesbehörden: Bundesversammlung — Bundesrat — Bundesgericht, Kommentar, Beiträge und Materialien zum 5. Titel der schweizerischen Bundesverfassung, Bern 2000 (zit. Bearbeiter/-in, in: Sägesser, Art. xx BV N xx) Saladin Peter, Grundrechte im Wandel, Die Rechtsprechung des Schweizerischen Bundesgerichts zu den Grundrechten in einer sich ändernden Umwelt, 3. Aufl., Bern 1982 Salter Michael, Toys for the Boys? Drones, Pleasure and Popular Culture in the Militarisation of Policing, Crit Crim 22 (2014), S. 163 ff. Sarrión Esteve Joaquín, El régimen jurídico de la utilización de los drones. Una aproximación multinivel a la legislación euoropea y española, REJP Nr. 12, Juni 2017, S. 103 ff. Sasse Christoph, Sinn und Unsinn des Datenschutzes, Karlsruhe/Heidelberg 1975 Savary Fiona, Regulierung dominanter Internetplattformen: Eigenheiten, Herausforderungen und Lösungsansätze im Licht von Ökonomie, Innovation und Recht, Diss. St. Gallen 2017, Zürich/St. Gallen 2017 Schaffhauser René / Peter Erich, Die Betriebsgefahr: Konkretes Schädigungspotential — abstrakt bemessen?, in: Schaffhauser (Hrsg.), Jahrbuch zum Strassenverkehrsrecht 2014, Bern 2014, S. 35 ff. Schaub Hans-Peter / Leuzinger Lukas, Die Stimmbeteiligung an der Glarner Landsgemeinde, LeGes 29 (2018) 1, Nr. 2 L Literatur- und Quellenverzeichnis Schefer Markus — Die Kerngehalte von Grundrechten: Geltung, Dogmatik, inhaltliche Ausgestaltung, Bern 2001 (zit. Schefer, Kerngehalte) — Gefährdung von Grundrechten: Eine grundrechtsdogmatische Skizze, in: Sutter-Somm et al. (Hrsg.), Risiko und Recht, Festgabe zum Schweizerischen Juristentag 2004, Basel/Genf/ München 2004, S. 441 ff. (Schefer, Gefährdung) Scheidt David H., Command and Control of Autonomous Unmanned Vehic­ les, in: Valavanis/Vachtsevanos (Hrsg.), Handbook of Unmanned Aerial Vehicles, Volume III, Heidelberg/New York/London 2015, S. 1273 ff. Scheurer Martin, Spielerisch selbstbestimmt, Rechtskonforme Einwilligungserklärungen in Zeiten ubiquitärer Digitalisierung, Diss. Passau 2019, Berlin 2019 Schladebach Marcus, Luftrecht, 2. Aufl., Tübingen 2018 Schmid Alain / Schmidt Kirsten Johanna / Zech Herbert, Rechte an Daten — zum Stand der Diskussion, sic! 2018, S. 627 ff. Schmid Alexander, IT- und Rechtssicherheit automatisierter und vernetzter cyber-physischer Systeme, Event Data Recording und integrierte Produktbeobachtung als Massnahmen der IT-Risikominimierung am Beispiel automatisierter und vernetzter Luft- und Strassenfahrzeuge, Diss. Passau 2018, Berlin 2019 Schneider-Marfels Jascha / Kaufmann Sebastian, Abschuss von zivilen Drohnen unter dem Aspekt des Persönlichkeitsschutzes: Wie weit muss man es sich gefallen lassen, von einem solchen Flugobjekt überwacht, gefilmt und ausspioniert zu werden?, medialex 3/2018, S. 2 ff. Schrepfer Thomas W., Datenschutz und Verfassung, Bern/Frankfurt a.M./ New York 1985 Schubert Francis, Le droit aérien, Genf/Zürich/Basel 2017 Schucan Jürg, Datenbanken und Persönlichkeitsschutz, Diss. Zürich 1977, Zürich 1977 Schucht Carsten, Moderne Mobilität im Fokus des europäischen Technikrechts: Herausforderungen, Schnittstellen und Weichenstellungen, EuZW 2018, S. 141 ff. Literatur- und Quellenverzeichnis LI Schwartmann Rolf / Jaspers Andreas / Thüsing Gregor / Kugelmann Dieter (Hrsg.), DS-GVO/BDSG, Heidelberger Kommentar, Heidelberg 2018 (zit. Bearbeiter/-in, in: Schwartmann et al., Art. xx DSGVO N xx) Schweizer Michael, Recht am Wort, Schutz des eigenen Wortes im System von Art. 28 ZGB, Diss. Luzern 2011, Bern 2012 (zit. Schweizer M.) Schweizer Rainer J. / Rechsteiner David, § 2 Grund- und menschenrechtlicher Datenschutz, in: Passadelis/Rosenthal/Thür (Hrsg.), Datenschutzrecht, Beraten in Privatwirtschaft und öffentlicher Verwaltung, Basel 2015, S. 41 ff. Schweizerische Sicherheitsuntersuchungsstelle (SUST) — Grenchen Flugplatz SO, Summarischer Bericht 17. Oktober 2018 (zit. SUST, Bericht Grenchen) — Rund 500 m nordöstlich der Landiwiese, Zürichsee ZH, Summarischer Bericht vom 11. April 2019 (zit. SUST, Bericht Zürichsee) Schwenk Walter / Giemulla Elmar, Handbuch des Luftverkehrsrechts, 5. Aufl., Köln 2019 Senn Carlo, Die Blutprobe kommt auf dem Luftweg, Der Bund, 6. Juni 2018, S. 15 Severoni Cecilia — La disciplina normativa attuale degli aeromobili a pilotaggio remoto, Diritto dei trasporti 2016 I, S. 65 ff. (zit. Severoni, Diritto dei transporti) — Il regime di responsabilità per l’esercizio dei mezzi a pilotaggio remoto, in: Palmerini/Biasiotti/Aiello (Hrsg.), Diritto dei Droni: Regole, questioni e prassi, Mailand 2018, S. 69 ff. (zit. Severoni, responsabilità) Siemen Birte, Datenschutz als europäisches Grundrecht, Diss. Kiel 2004, Berlin 2006 Simitis Spiros / Hornung Gerrit / Spieker genannt Döhmann Indra (Hrsg.), NomosKommentar, Datenschutzrecht, DSGVO mit BDSG, Baden-­ Baden 2019 (Bearbeiter/-in, in: Simitis et al., Art. xx DSGVO N xx) Simon Jürg W., Amtshilfe: Allgemeine Verpflichtungen, Schranken und Grundsätze, Diss. Bern 1991, Chur/Zürich 1991 Singh Adi / Carthew James / Xiong Weifeng, A Zero-Cost Solution for Remote Identification and Tracking of sUAS in Low Altitude Flights, A Ford Motor Company Whitepaper, März 2018 LII Literatur- und Quellenverzeichnis Single European Sky ATM Research Programme (SESAR) — European Drones Outlook Study: Unlocking the value for Europe, November 2016 (zit. SESAR, Outlook Study) — European ATM Master Plan: Roadmap for the safe integration of drones into all classes of airspace, 8. März 2018 (zit. SESAR, Master Plan) Solmecke Christian / Nowak Fabian, Zivile Drohnen — Probleme ihrer Nutzung, MMR 7/2014, S. 431 ff. Solove Daniel J. — Understanding Privacy, Cambridge (MA)/London 2008 (zit. Solove, Privacy) — Nothing to Hide: The False Tradeoff between Privacy and Security, New Haven/London 2011 (zit. Solove, Nothing to Hide) — Privacy y Design: 4 Key Points, PinG 2015, S. 191 f. (zit. Solove, Privacy by Design) Solove Daniel J. / Schwartz Paul M., Privacy, Information, and Technology, 3. Aufl., New York 2011 Spies Axel, USA: Schon über 400’000 Hobby-Drohnen online registriert, ZD 2016, S. 201 f. Sprecher Franziska, Datenschutz und Big Data im Allgemeinen und im Gesundheitsrecht im Besonderen, ZBJV 2018, S. 482 ff. Sprecher Franziska / Lienhard Andreas / Tschannen Pierre / Tschentscher Axel / Zeller Franz, Die staatsrechtliche Rechtsprechung des Bundesgerichts in den Jahren 2017 und 2018, ZBJV 2018, S. 641 ff. (zit. Sprecher et al.) Städele Julius Ph., Völkerrechtliche Implikationen des Einsatzes bewaffneter Drohnen, Diss. Bielefeld 2014, Berlin 2014 Steiger Martin, Regulierung von Drohnen im zivilen Behördeneinsatz in der Schweiz, Sicherheit & Recht 3/2014, S. 169 ff. (zit. Steiger, Regulierung) Steiger Martin, Sicherheitsesoterik statt Menschenrechte, digma 2015, S. 134 ff. (zit. Steiger, Sicherheitsesoterik) Steinauer Paul-Henri / Fountoulakis Christiana, Droit des personnes physiques et de la protection de l’adulte, Bern 2014 Literatur- und Quellenverzeichnis LIII Stinner Julia — Informationelle Selbstbestimmung und Grenzen rechtlicher Regulierung, in: Stiftung Datenschutz (Hrsg.), Zukunft der informationellen Selbstbestimmung, Berlin 2016, S. 151 ff. (zit. Stinner, Selbstbestimmung) — Staatliche Schutzpflichten im Rahmen informationstechnischer Systeme, Diss. Bonn 2017, Baden-Baden 2018 (zit. Stinner, Schutzpflichten) Stöcker Claudia / Bennett Rohan / Nex Francesco / Gerke Markus / Zevenbergen Jaap, Review of the Current State of UAV Regulations, Remote Sens. 2017 Nr. 45, S. 1 ff. (zit. Stöcker et al.) Straub Sebastian, Beobachtung aus der Luft — Grenzen des staatlichen und zivilen Drohneneinsatzes, Oldenburg 2018 Stumvoll Konstantin, Die Drohne — Das unbemannte Luftfahrzeug im Völkerrecht, Diss. Bonn 2014, Hamburg 2015 Sydow Gernot (Hrsg.), Europäische Datenschutzgrundverordnung, Handkommentar, Baden-Baden 2018 (zit. Bearbeiter/-in, in: Sydow, Art. xx DSGVO N xx) Taeger Jürgen / Gabel Detlev (Hrsg.), DSGVO — BDSG, Kommentar, 3. Aufl., Frankfurt a.M. 2019 (zit. Bearbeiter/-in, in: Taeger/Gabel, Art. xx DSGVO N xx) Tamò-Larrieux Aurelia, Designing for Privacy and its Legal Framework, Data Protection by Design and Default for the Internet of Things, Diss. Zürich 2018, Cham 2018 Tegler Eric, What Happens When a Drone Crashes Into Your Face?, An 18-month-long study attempts to find out., 22. August 2019 Tercier Pierre, Le nouveau droit de la personnalité, Zürich 1984 Thomasen Kristen M.J. — Beyond Airspace Safety: A Feminist Perspective on Drone Privacy Regulation, 22. März 2018 (zit. Thomasen, Beyond Airspace Safety) — Flying Between the Lines: Drone Laws and the (Re)Production of Public Spaces, in: Hilgendorf/Seidel (Hrsg.), Robotics, Autonomics, and the Law, Baden-Baden 2018, S. 205 ff. (zit. Thomasen, Between the Lines) Tombal Thomas, Les droits de la personne concernée dans la RGDP, in: de Terwangne/Rosier (Hrsg.), Le Règlement Général sur la Protection des Données (RGPD/GDPR), Analyse approfondie, Brüssel 2018, S. 407 ff. LIV Literatur- und Quellenverzeichnis Trüeb Hans Rudolf, Bundesgesetz über das öffentliche Beschaffungswesen (BöB), in: Oesch/Weber/Zäch (Hrsg.), Wettbewerbsrecht II, Kommentar, Zürich 2011 (zit. Trüeb, Art. xx BöB N xx) Tschannen Pierre, Staatsrecht der Schweizerischen Eidgenossenschaft, 4. Aufl., Bern 2016 Tschentscher Axel / Lienhard Andreas / Sprecher Franziska, Öffentliches Recht: Verfassungsrecht, Verwaltungsrecht, öffentliches Verfah­ rens­recht, 2. Aufl., Zürich/St. Gallen 2019 Unabhängiges Datenschutzzentrum Saarland, 25. Tätigkeitsbericht 2013/2014, Saarbrücken, April 2015 Unmanned Airspace, US, Swiss flight trials «show multiple UTM providers can share remote ID services via ASTM standards», 19. September 2019 Unruh Peter, Zur Dogmatik der grundrechtlichen Schutzpflichten, Berlin 1996 Uriante Landa Iñaki, Ámbito de aplicación material, in: Piñar Mañas (Hrsg.), Reglamento General de Protección de Datos, Hacia un nuevo modelo europeo de privacidad, Madrid 2016, S. 63 ff. Uschkereit Tim / Zdanowiecki Konrad, Rechtsrahmen für den Betrieb ziviler Drohnen, NJW 2016 Heft 7, S. 444 ff. Valavanis Kimon P. / Vachtsevanos George J., UAV Autonomy: Introduction, in: dies. (Hrsg.), Handbook of Unmanned Aerial Vehicles, Volume III, Heidelberg/New York/London 2015, S. 1723 ff. Van Gyseghem Jean-Marc, Les catégories particulières de données à caractère personnel, in: de Terwangne/Rosier (Hrsg.), Le Règlement Général sur la Protection des Données (RGPD/GDPR), Analyse approfondie, Brüssel 2018, S. 255 ff. Vasella David — Zur Freiwilligkeit und zur Ausdrücklichkeit der Einwilligung im Datenschutzrecht, Jusletter 16. November 2015 (zit. Vasella, Jusletter) — A‑3548/2018: Entscheid des BVGer i.S. Helsana+, 29. März 2019 (zit. Vasella, Helsana+) — Auftragsbearbeitung im Privatbereich, Zu Begriff, Anforderungen und Rechtsfolgen der arbeitsteiligen Datenbearbeitung, digma 2019, S. 110 ff. (zit. Vasella, Auftragsbearbeitung) Literatur- und Quellenverzeichnis LV Vasella David / Sievers Jacqueline, Der «Swiss Finish» im Vorentwurf des DSG, digma 2017, S. 44 ff. Vergouw Bas / Nagel Huub / Bondt Geert / Custers Bart, Drone Tech­ no­logy: Types, Payloads, Applications, Frequency Spectrum Issues and Future Developments, in: Custers (Hrsg.), The Future of Drone Use: Opportunities and Threats from Ethical and Legal Perspectives, Den Haag 2016, S. 21 ff. (zit. Vergouw et al.) Vivet Laura / Smith Lauren, Drones and Privacy by Design: Embedding Privacy Enhancing Technology in Unmanned Aircraft, Future of Privacy Forum Report, 2. August 2016 Vladeck David C., Machines without Principles: Liability Rules and Artificial Intelligence, Wash. L. Rev. 2014, S. 117 ff. Voigt Paul / von dem Bussche Axel, The EU General Data Protection Regulation (GDPR): A Practical Guide, Cham 2017 Voland Thomas / Qiu Stephan, Nochmals: «Abgehobene Mobilität», Zum neuen europäischen Rechtsrahmen für Drohnen, insbesondere für «fliegende Autos», NZV 2019, S. 344 ff. Waldmann Bernhard / Belser Eva Maria / Epiney Astrid (Hrsg.), Basler Kommentar, Bundesverfassung, Basel 2015 (zit. BSK BV-Bearbeiter/-in, Art. xx N xx) Waldmeier Stefanie-Daniela, Informationelle Selbstbestimmung — ein Grundrecht im Wandel?, Diss. Zürich 2015, Zürich 2015 Wang Yang / Xia Huichuan / Yao Yaxing / Huang Yun, Flying Eyes and Hidden Controllers: A Qualitative Study of People’s Privacy Perceptions of Civilian Drones in the US, Proceedings on Privacy Enhancing Technologies 2016 Nr. 3, S. 172 ff. (zit. Wang et al.) Weber Rolf H., Zivile Drohneneinsätze — Herausforderungen für das Wirtschafts- und Datenschutzrecht, in: Widmer (Hrsg.), Der rasante technologische Wandel — Überforderung der Gesellschaft?, Zürich/St. Gallen 2017, S. 1 ff. Weber Rolf H. / Laux Christian / Oertly Dominic, Datenpolitik als Rechts­ thema: Agenda für Open Government Data, Zürich/Basel/Genf 2016 Weber Rolf H. / Oertly Dominic, Datenschutzrechtliche Problemfelder von zivilen Drohneneinsätzen, Jusletter 26. Oktober 2015 LVI Literatur- und Quellenverzeichnis Weber-Dürler Beatrice, Grundrechtseingriffe, in: Zimmerli (Hrsg.), Die neue Bundesverfassung: Konsequenzen für Praxis und Wissenschaft, BTJP 1999, Bern 2000, S. 131 ff. Weiss Andreas, A. Einführung, Begrifflichkeiten und Marktentwicklung, in: Hilber (Hrsg.), Handbuch Cloud Computing, Köln 2014, S. 1 ff. Weissenberger Philippe, Kommentar Strassenverkehrsgesetz und Ordnungsbussengesetz, Mit Änderungen nach Via Sicura, 2. Aufl., Zürich/ St. Gallen 2014 (zit. Komm. SVG-Weissenberger, Art. xx N xx) Wermelinger Amédéo, Informationelle Amtshilfe: Verunmöglicht Datenschutz eine effiziente Leistungserbringung durch den Staat?, Analyse des eidgenössischen und des luzernischen Rechts, ZBl 2004, S. 173 ff. Werro Franz / Schmidlin Irène, La protection de la personnalité et les medias: une illustration de la rencontre du droit civil et du droit constitutionnel, in: Werro (Hrsg.), Droit civil et convention européenne des droits de l’homme / Zivilrecht und Europäische Menschenrechtskonvention, Zürich 2006, S. 161 ff. Widmer Lüchinger Corinne / Oser David (Hrsg.), Basler Kommentar, Obligationenrecht I, Art. 1–529 OR, 7. Aufl., Basel 2019 (zit. BSK OR I-Bear­ beiter/-in, Art. xx N xx) Widmer Michael, § 5 Rechte der Datenschutzsubjekte, in: Passadelis/ Rosenthal/Thür (Hrsg.), Datenschutzrecht, Beraten in Privatwirtschaft und öffentlicher Verwaltung, Basel 2015, S. 149 ff. Wiederkehr René — Die Kerngehaltsgarantie am Beispiel kantonaler Grundrechte, Zugleich ein Beitrag zu den Grundrechten als Staatsaufgaben und zu den Grundrechtverwirklichungsbestimmungen, Diss. St. Gallen 1999, Bern 2000 (zit. Wiederkehr, Diss.) — Bundesgericht, I. öffentlich-rechtliche Abteilung, Urteil vom 3.5.2000, Ruth Gonseth c. Stadtrat Liestal, Regierungsrat und Verwaltungsgericht des Kantons Basel-Landschaft, BGE 126 II 300 ff., Verwaltungsgerichtsbeschwerde., Bemerkungen, AJP 2001, S. 215 ff. (zit. Wiederkehr, AJP 2001) Winter Scott R. / Rice Stephen / Tamilselvan Gajapriya / Tokarski Russell, Mission-based citizen views on UAV usage and privacy: an affective perspective, JUVS 2016 Vol. 4 Nr. 2, S. 125 ff. (zit. Winter et al.) Literatur- und Quellenverzeichnis LVII Wright David / Finn Rachel L., Making Drones More Acceptable with Privacy Impact Assessments, in: Custers (Hrsg.), The Future of Drone Use: Opportunities and Threats from Ethical and Legal Perspectives, Den Haag 2016, S. 325 ff. Xenos Dimitris, The Positive Obligations of the State under the European Convention on Human Rights, Abingdon 2012 Zhang WEIxuan / Mueller Mark W. / D’Andrea Raffaello, A controllable flying vehicle with a single moving part, 2016 IEEE International Conference on Robotics and Automation, 9. Juni 2016 LIX Materialienverzeichnis I. Bundesbehörden Anfrage 18.1044, Leutenegger Oberholzer Susanne (Drohnen) Bericht des Bundesrates über die Evaluation des Bundesgesetzes über den Datenschutz vom 9. Dezember 2011, BBl 2012 335 ff. (zit. Bericht Evaluation DSG) Bericht 2016 über die Luftfahrtpolitik der Schweiz (Lupo 2016) vom 24. Fe­ bruar 2016, BBl 2016 1847 ff. (zit. Bericht Lupo 2016) Botschaft des Bundesrates an die Bundesversammlung zum Entwurf eines Bundesgesetzes über die Luftfahrt vom 28. März 1945, BBl 1945 I 341 ff. (zit. Botschaft LFG) Botschaft über die Änderung des Schweizerischen Zivilgesetzbuches (Persönlichkeitsschutz: Art. 28 ZGB und 49 OR) vom 5. Mai 1982, BBl 1982 II 636 ff. (zit. Botschaft Persönlichkeitsschutz) Botschaft zum Bundesgesetz über den Datenschutz (DSG) vom 23. März 1988, BBl 1988 II 413 ff. (Botschaft DSG 1988) Botschaft über eine neue Bundesverfassung vom 20. November 1996, BBl 1997 I 1 ff. (zit. Botschaft BV) Botschaft zur Genehmigung der sektoriellen Abkommen zwischen der Schweiz und der EG vom 23. Juni 1999, BBl 1999 6128 ff. (zit. Botschaft sektorielle Abkommen) Botschaft zur Änderung des Bundesgesetzes über den Datenschutz (DSG) und zum Bundesbeschluss betreffend den Beitritt der Schweiz zum Zusatzprotokoll vom 8. November 2001 zum Übereinkommen zum Schutz des Menschen bei der automatischen Verarbeitung personenbezogener Daten bezüglich Aufsichtsbehörden und grenzüberschreitende Datenübermittlung vom 19. Februar 2003, BBl 2003 2101 ff. (zit. Botschaft Revision DSG 2003) Botschaft zur Änderung der Militärgesetzgebung (Militärgesetz und Bundesgesetz über die militärischen Informationssysteme) vom 7. März 2008, BBl 2008 3213 ff. (zit. Botschaft MIG) LX Materialienverzeichnis Botschaft zum Bundesbeschluss über den Einsatz der Armee im Assistenzdienst zur Unterstützung der zivilen Behörden anlässlich der FussballEuropa­meisterschaft 2008 (UEFA EURO 2008) vom 13. September 2006, BBl 2006 8179 ff. (zit. Botschaft EURO 2008) Botschaft zur Teilrevision 1 des Luftfahrtgesetzes vom 20. Mai 2009, BBl 2009 4915 ff. (zit. Botschaft Teilrevision 1 LFG) Botschaft zum Nachrichtendienstgesetz vom 19. Februar 2014, BBl 2014 2105 ff. (zit. Botschaft NDG) Botschaft zum Bundesgesetz über die Totalrevision des Bundesgesetzes über den Datenschutz und die Änderung weiterer Erlasse zum Datenschutz vom 15. September 2017, BBl 2017 6941 ff. (zit. Botschaft Totalrevision DSG) Botschaft zu Via sicura, Handlungsprogramm des Bundes für mehr Sicherheit im Strassenverkehr vom 20. Oktober 2010, BBl 2010 8447 ff. (zit. Botschaft Via sicura) Frage 15.5039, Rusconi Pierre (Regolamentazione droni) Interpellation 14.4223, Schläfli Urs (Private Drohnenflüge und ihre Folgen) Interpellation 16.3837, Tornare Manuel (Zivile Drohnen. Kritische Infrastrukturen besser schützen) Interpellation 16.4032, Leutenegger Oberholzer Susanne (Drohnen zum Zweiten. Zivilrechtliche Beurteilung) Interpellation 18.3397, Jositsch Daniel (Regelung für den Privatgebrauch von Drohnen) Jahresbericht 2007 der Geschäftsprüfungskommissionen und der Geschäftsprüfungsdelegation der eidgenössischen Räte vom 25. Januar 2008, BBl 2008 5061 ff. (zit. Jahresbericht GPK/GPDel 2007) Motion 16.3310, Leutenegger Oberholzer Susanne (Drohnen. Bevölkerung vor Gefährdungen schützen) Motion 18.3371, Candinas Martin (Sicherheit und Ordnung beim Betrieb von Drohnen) Motion 18.4207, Reynard Mathias (Vernetztes Spielzeug. Für die Sicherheit unserer Kinder) Parlamentarische Initiative 14.413, Vischer Daniel (Grundrecht auf informationelle Selbstbestimmung) Materialienverzeichnis LXI Postulat 13.3977, Tornare Manuel (Zivile Drohnen. Gesetzgebung anpassen) Postulat 14.4137, FDP-Liberale Fraktion (Videoaufnahmen durch Private. Die Privatsphäre besser schützen) Postulat 14.4284, Comte Raphaël (Videoaufnahmen durch Private. Die Privat­ sphäre besser schützen) Postulat 18.3245, Guhl Bernhard (Identifikation von Drohnen und ähnlichen Flugkörpern) Übersicht Kompatibilität des E-DSG mit dem EU-Recht vom 5. August 2019, erstellt durch das Bundesamt für Justiz, Direktionsbereich Öffentliches Recht, Fachbereich Rechtsetzungsprojekte und -methodik (zit. BJ, Kompatibilitätstabelle) Verfügung über eine temporäre Änderung der Luftraumstruktur der Schweiz während der EURO 2008 vom 3. Juni 2008, BBl 2008 4447 ff. (zit. BAZL, Verfügung) II. Weitere Behörden und Gremien Anfrage Fehr Düsel Nina, KR Nr. 150/2017 (Registrierungspflicht für Drohnen) Beschluss des Regierungsrats des Kantons Zürich, Sitzung vom 27. September 2017 (RRB 874/2017) Vorschlag für eine Verordnung des europäischen Parlaments und des Rates zur Festlegung gemeinsamer Vorschriften für die Zivilluftfahrt und zur Errichtung einer Agentur der Europäischen Union für Flugsicherheit sowie zur Aufhebung der Verordnung (EG) Nr. 216/2008 des Europäischen Parlaments und des Rates, Dokument ST_14991_2015_INIT, vom 8. Dezember 2015 (zit. Rat der Europäischen Union, Vorschlag 2015) Vorschlag für eine Verordnung des europäischen Parlaments und des Rates zur Festlegung gemeinsamer Vorschriften für die Zivilluftfahrt und zur Errichtung einer Agentur der Europäischen Union für Flugsicherheit sowie zur Aufhebung der Verordnung (EG) Nr. 216/2008 des Europäischen Parlaments und des Rates, Dokument ST_14469_2016_ADD_1, vom 21. November 2016 (zit. Rat der Europäischen Union, Vorschlag 2016) LXIII Abkürzungsverzeichnis ABl. Abs. ACLU AcP AeroRevue AEUV Amtsblatt der Europäischen Union Absatz / Absätze American Civil Liberties Union Archiv für die civilistische Praxis (Tübingen) Die meistgelesene Aviatikzeitschrift der Schweiz (Brugg) Vertrag über die Arbeitsweise der Europäischen Union, ABl. 2012 C 326/01 AG Aktiengesellschaft AGer Amtsgericht Air & Space Law — Zeitschrift für internationale Aspekte des Luft- und Weltraumrechts (Alphen aan den Rijn) AJP Aktuelle Juristische Praxis (Zürich) AltlV Verordnung über die Sanierung von belasteten Stand­ orten vom 26. August 1998 (Altlasten-Verordnung, SR 814.680) a.M. anderer Meinung / am Main Amtl. Bull. NR Amtliches Bulletin der Bundesversammlung, Nationalrat Amtl. Bull. SR Amtliches Bulletin der Bundesversammlung, Ständerat A-NPA Advance Notice of Proposed Amendment Art. Artikel AS Amtliche Sammlung des Bundesrechts ASJ The Aviation & Space Journal (Bologna) ASMZ Allgemeine Schweizerische Militärzeitschrift (Volketswil) ASTRA Bundesamt für Strassen ATM Air Traffic Management (= Flugverkehrsmanagement) ATSG Bundesgesetz über den Allgemeinen Teil des Sozialversicherungsrechts vom 6. Oktober 2000 (SR 830.1) Aufl. Auflage BAKOM Bundesamt für Kommunikation BAZL Bundesamt für Zivilluftfahrt BBl Bundesblatt der Schweizerischen Eidgenossenschaft BDSG Bundesdatenschutzgesetz vom 30. Juni 2017 (BGBl. I S. 2097) LXIV Abkürzungsverzeichnis Beschluss Nr. 1/2019 — Beschluss Nr. 1/2019 des Luftverkehrsausschusses Europäische Union/Schweiz zur Ersetzung des Anhangs des Abkommens vom 21. Juni 1999 zwischen der Schweizerischen Eidgenossenschaft und der Europäischen Gemeinschaft über den Luftverkehr vom 22. August 2019 (AS 2019 S. 2979 ff.) BGBl. Bundesgesetzblatt (Deutschland) BGE Entscheidungen des Schweizerischen Bundesgerichts (Amtliche Sammlung) BGer Bundesgericht / Entscheidung des Schweizerischen Bundes­ gerichts (nicht amtlich publiziert) BJ Bundesamt für Justiz BlAR Blätter für Agrarrecht (Bern) BLV Bundesamt für Lebensmittelsicherheit und Veterinärwesen BöB Bundesgesetz über das öffentliche Beschaffungswesen vom 16. Dezember 1994 (SR 172.056.1) BR Bundesrat, Bundesrätin BRTF Blue Ribbon Task Force BS Kanton Basel-Stadt BSK Basler Kommentar BTJP Berner Tage für die juristische Praxis BV Bundesverfassung der Schweizerischen Eidgenossenschaft vom 18. April 1999 (SR 101) BVerfGE Entscheidungen des Bundesverfassungsgerichts (Tübingen) BVerfGer Bundesverfassungsgericht (Deutschland) BVGE Entscheidungen des Bundesverwaltungsgerichts (Amtliche Sammlung) BVGer Bundesverwaltungsgericht / Entscheidung des Bundesverwaltungsgerichts (nicht amtlich publiziert) BVLOS Beyond Visual Line of Sight (= ausserhalb direkter Sicht) bzw. beziehungsweise c. contre ca. circa cadastre Fachzeitschrift für amtliche Vermessung (Wabern) CCTV Closed Circuit Television CE Conformité Européenne CLSR Computer Law & Security Review, The International Journal of Technology Law and Practice (Amsterdam) Conn. L. Rev. Connecticut Law Review (Hartford) ConOps Concept of Operations Abkürzungsverzeichnis CP LXV Crisis Prevention, Fachmagazin für die Bereiche Innere Sicher­ heit, Bevölkerungsschutz und Katastrophenhilfe (Bonn) CR Computer und Recht (Köln) CRi Computer law review international (Köln) Crit Crim Critical Criminology (Dordrecht) Cst. Constitution fédérale de la Confédération suisse (= BV) C.T.L.R. Computer and Telecommunications Law Review (London) Defense & Security Analysis — Journal on defense theory and analysis (London) Delegierte Verordnung — Delegierte Verordnung (EU) 2019/945 der Kommission vom 12. März 2019 über unbemannte Luftfahrzeug­ systeme und Drittlandbetreiber unbemannter Luftfahrzeugsysteme, ABl. 2019 L 152/1 Democrazia & Sicurezza — Democracy and Security Review (Rom) Der Bund Schweizer Tageszeitung aus der Bundesstadt (Bern) ders. derselbe dies. dieselbe / dieselben digma Zeitschrift für Datenrecht und Informationssicherheit (Zürich) Diritto dei trasporti — Rivista semestrale (Rom) Diss. Dissertation d.h. das heisst DJI Da-Jiang Innovations Science and Technology Ltd. DÖV Die öffentliche Verwaltung: Zeitschrift für Öffentliches Recht und Verwaltungswissenschaft (München) DSG Bundesgesetz über den Datenschutz vom 19. Juni 1992 (Datenschutzgesetz; SR 235.1) DSGVO Verordnung (EU) 2016/679 des europäischen Parlaments und des Rates vom 27. April 2016 zum Schutz natürlicher Personen bei der Verarbeitung personenbezogener Daten, zum freien Datenverkehr und zur Aufhebung der Richtlinie 95/46/EG (Datenschutz-Grundverordnung), Abl. 2016 L 119/1 DuD Datenschutz und Datensicherheit (Berlin) Durchführungsverordnung — Durchführungsverordnung (EU) 2019/947 der Kommission vom 24. Mai 2019 über die Vorschriften und Verfahren für den Betrieb unbemannter Luftfahrzeuge, ABl. 2019 L 152/45 DVBl Deutsches Verwaltungsblatt (Köln) E Entwurf E. Erwägung LXVI EASA Abkürzungsverzeichnis European Union Aviation Safety Agency (= Europäische Agentur für Flugsicherheit) EASA-Grundverordnung — Verordnung (EU) 2018/1139 des Europäischen Parlaments und des Rates zur Festlegung gemeinsamer Vorschriften für die Zivilluftfahrt und zur Errichtung einer Europäischen Agentur für Flugsicherheit vom 4. Juli 2018, ABl. 2018 L 212/1 ebd. ebenda EBG Eisenbahngesetz vom 20. Dezember 1957 (SR 742.101) ecolex Fachzeitschrift für Wirtschaftsrecht (Wien) EDA Eidgenössisches Departement für auswärtige Angelegen­ heiten EDI Eidgenössisches Departement des Innern EDÖB Eidgenössischer Datenschutz- und Öffentlichkeitsbeauftragter E-DSG Entwurf zum Bundesgesetz über den Datenschutz (BBl 2017 S. 7206 ff.), Fassung gemäss Beschluss des NR vom 25. September 2019 EFV Eidgenössische Finanzverwaltung EG Europäische Gemeinschaft(en) / Erwägungsgrund EGMR Europäischer Gerichtshof für Menschenrechte EJRR European Journal of Risk Regulation (Cambridge, Gross­ britannien) EKMR Europäische Kommission für Menschenrechte E-LFG Revisionsentwurf zu einigen Artikeln des LFG (vgl. BBl 2017 S. 7142), Fassung gemäss Beschluss des NR vom 25. September 2019 EMRK Konvention zum Schutze der Menschenrechte und Grundfreiheiten vom 4. November 1950 (Europäische Menschenrechtskonvention; SR 0.101) EnG Energiegesetz vom 30. September 2016 (SR 730.0) engl. englisch et al. et alii / aliae etc. et cetera ETH Eidgenössische Technische Hochschule EU Europäische Union EuGH Gerichtshof der Europäischen Gemeinschaften EuZW Europäische Zeitschrift für Wirtschaftsrecht (München) f./ff. folgende Abkürzungsverzeichnis FAV FIFG FMG Fn. FOCA g GDPR GE Geogr. Helv. GeoIG GesKR GfK GG ggf. GK gl.M. GLONASS GM GNSS GPDel GPK GPS GR GRCh GSG Handkomm. HAVE HGR h.L. Hrsg. ICAO LXVII Verordnung über Fernmeldeanlagen vom 25. November 2015 (SR 784.101.2) Bundesgesetz über die Förderung der Forschung und der Innovation vom 14. Dezember 2012 (SR 420.1) Fernmeldegesetz vom 30. April 1997 (SR 784.10) Fussnote(n) Federal Office of Civil Aviation (= BAZL) Gramm General Data Protection Regulation (= DSGVO) Kanton Genf Geographica Helvetica: Swiss journal of geography (Göttingen/Zürich) Bundesgesetz über die Geoinformation vom 5. Oktober 2007 (Geoinformationsgesetz; SR 510.62) Gesellschafts- und Kapitalmarktrecht (Zürich) Gesellschaft für Konsumentenforschung Grundgesetz für die Bundesrepublik Deutschland vom 23. Mai 1949 (BGBl. S. 1) gegebenenfalls Grosse Kammer gleicher Meinung Globalnaja nawigazionnaja sputnikowaja sistema (= Globales Satellitennavigationssystem) Guidance Material Globale Navigationssatellitensysteme Geschäftsprüfungsdelegation Geschäftsprüfungskommission(en) Global Positioning System Kanton Graubünden Charta der Grundrechte der Europäischen Union (Grund­ rechtecharta), ABl. 2000 C 364/1 Bundesgesetz über die von der Schweiz als Gaststaat gewährten Vorrechte, Immunitäten und Erleichterungen sowie finanziellen Beiträge vom 22. Juni 2007 (Gaststaatgesetz; SR 192.12) Handkommentar Haftung und Versicherung (Zürich) Handbuch der Grundrechte herrschende Lehre Herausgeber International Civil Aviation Organization LXVIII Abkürzungsverzeichnis ICAO-Übereinkommen — Übereinkommen über die internationale Zivilluft­ fahrt, abgeschlossen in Chicago am 7. Dezember 1944, in Kraft getreten für die Schweiz am 4. April 1947 (SR 0.748.0) IDG/BS Gesetz über die Information und den Datenschutz [des Kantons Basel-Stadt] vom 9. Juni 2010 (SG 153.260) IDG/ZH Gesetz über die Information und den Datenschutz [des Kantons Zürich] vom 12. Februar 2007 (LS 170.4) IDPL International Data Privacy Law (Oxford) IEEE Institute of Electrical and Electronics Engineers IMSI International Mobile Subscriber Identity InTeR Zeitschrift zum Innovations- und Technikrecht (Frankfurt a.M.) IT Informationstechnik ITF/OECD International Transport Forum at the OECD i.V.m. in Verbindung mit IVZV Verordnung über das Informationssystem Verkehrszulassung vom 30. November 2018 (SR 741.58) J. Aeronaut Aerospace Eng — Journal of Aeronautics & Aerospace Engineering (Brüssel) JARUS Joint Authorities for Rulemaking on Unmanned Systems JETLaw Vanderbilt Journal of Entertainment & Technology Law (Nashville) JLIS Journal of Law, Information and Science (Hobart) JUAS Journal of Unmanned Aerial Systems (Ottawa) Jusletter Die grösste Schweizer Universalzeitschrift der Schweiz (Bern) Jusletter IT Die Zeitschrift für IT und Recht (Bern) JUVS Journal of Unmanned Vehicle Systems (Ottawa) JZ JuristenZeitung (Tübingen) Kap. Kapitel kg Kilogramm KGer Kantonsgericht KMU Kleine und mittlere Unternehmen Komm. Kommentar KR Kantonsrat KuKo Kurzkommentar LeGes Mitteilungsblatt der Schweizerischen Gesellschaft für Gesetzgebung und der Schweizerischen Evaluationsgesellschaft (Bern) LFG Bundesgesetz über die Luftfahrt vom 21. Dezember 1948 (Luftfahrtgesetz; SR 748.0) Abkürzungsverzeichnis LFV LGV lit. LS LSJ Ltd. LU Lupo LVA CH–EU MA MAPS MAW m.E. medialex MIG MMR m.w.H. N NDG NJW NPA NR Nr. Nrn. NSW NVwZ NZV NZZ OECD OFK LXIX Verordnung über die Luftfahrt vom 14. November 1973 (Luftfahrtverordnung; SR 748.01) Lebensmittel und Gebrauchsgegenständeverordnung vom 16. Dezember 2016 (SR 817.02) litera Loseblattsammlung des Kantons Zürich Law Society of NSW Journal (Sydney) Limited Kanton Luzern Luftfahrtpolitik Abkommen zwischen der Schweizerischen Eidgenossenschaft und der Europäischen Gemeinschaft über den Luftverkehr, abgeschlossen am 21. Juni 1999, in Kraft getreten am 1. Juni 2002 (SR 0.748.127.192.68) Massachusetts Maison d’analyse des processus sociaux (Universität Neuenburg) Mission Adaptive Wing meines Erachtens Zeitschrift für Medienrecht Bundesgesetz über die militärischen Informationssys­teme vom 3. Oktober 2008 (SR 510.10) MultiMedia und Recht (München) mit weiterem Hinweis / mit weiteren Hinweisen Note, Randnote Bundesgesetz über den Nachrichtendienst vom 25. September 2015 (Nachrichtendienstgesetz; SR 121) Neue Juristische Wochenschrift (München) Notice of Proposed Amendment Nationalrat Nummer Nummern New South Wales Neue Zeitschrift für Verwaltungsrecht (München) Neue Zeitschrift für Verkehrsrecht (München) Neue Zürcher Zeitung (Zürich) Organisation for Economic Co-operation and Development Orell Füssli Kommentar LXX OR Abkürzungsverzeichnis Bundesgesetz betreffend die Ergänzung des Schweizerischen Zivilgesetzbuches (Fünfter Teil: Obligationenrecht) vom 30. März 1911 (SR 220) OV-UVEK Organisationsverordnung für das Eidgenössische Departement für Umwelt, Verkehr, Energie und Kommunikation vom 6. Dezember 1999 (SR 172.217.1) P. & D.P. Privacy & Data Protection (London) ParlG Bundesgesetz über die Bundesversammlung (Parlamentsgesetz; SR 171.10) PBG/LU Planungs- und Baugesetz [des Kantons Luzern] vom 7. März 1989 (SRL 735) PinG Privacy in Germany: Datenschutz und Compliance (Berlin) PK Praxiskommentar PolG/ZH Polizeigesetz [des Kantons Zürich] vom 23. April 2007 (LS 550.1) PolR Oberes Fricktal — Polizeireglement Oberes Fricktal der Gemeinden Bözen, Densbüren, Effingen, Eiken, Elfingen, Frick, Gansingen, Gipf-Oberfrick, Herznach, Hornussen, Kaisten, Laufenburg, Mettauertal, Oberhof, Oeschgen, Schwaderloch, Sisseln, Ueken, Wittnau, Wölflinswil, Zeihen vom 1. Januar 2016 PRIO Peace Research Institute Oslo Prof. Professor Progress in Aerospace Sciences — An International Review Journal in Aero­ space Sciences (Amsterdam) QR-Code Quick Response Code RaLA Règlement concernant l’exécution de la loi fédérale sur l’aviation du 9 novembre 1951 (rs/GE H 3 05.02) RDTI Revue du droit des technologies de l’information (Louvain-la-Neuve) recht Zeitschrift für juristische Weiterbildung und Praxis (Bern) REJP Revista de la Escuela Jacobea de Posgrado (Xalapa) Remote Sens. Open access journal about the science and application of remote sensing technology (Basel) RGDP Règlement Général sur la Protection des Données (= DSGVO) Risk Analysis An international journal published on behalf of the Society for Risk Analysis (Oxford/Dordrecht) Abkürzungsverzeichnis RLG LXXI Bundesgesetz über Rohrleitungsanlagen zur Beförderung flüssiger oder gasförmiger Brenn- oder Treibstoffe (Rohrleitungsgesetz; SR 746.1) Rn. Randnummer RPAS Remotely Piloted Aircraft System RPV Remotely Piloted Vehicle RRB Regierungsratsbeschluss Rs. Rechtssache / Rechtssachen rs/GE Recueil systématique genevois RVOG Regierungs- und Verwaltungsorganisationsgesetz vom 21. März 1997 (SR 172.010) S. Seite SA Société anonyme (= AG) SAPR Sistemi Aeromobili a Pilotaggio Remoto (= RPAS) SBB Schweizerische Bundesbahnen SBVR Schweizerisches Bundesverwaltungsrecht (Basel) SchifffahrtsVO LU — Verordnung über die Schifffahrt [des Kantons Luzern] vom 18. Februar 2011 (SRL 787) SD Secure Digital [Memory Card] SERA Standardised European Rules of the Air (in Verordnung (EU) Nr. 923/2012) SESAR Single European Sky ATM Research Programme SEV Sammlung Europäischer Verträge SG Systematische Gesetzessammlung des Kantons Basel-Stadt SGK St. Galler Kommentar SHK Stämpflis Handkommentar SI-Einheit Einheit gemäss dem «Système international d’unités» (= Internationales Einheitensystem) sic! Zeitschrift für Immaterialgüter-, Informations- und Wettbewerbsrecht (Zürich) Sicherheit & Recht — Juristische Fachzeitschrift für Sicherheitsfragen in den Bereichen Polizei, Militär, Umwelt und Technik (Zürich/ St. Gallen) SJZ Schweizerische Juristen-Zeitung (Zürich) SNF Schweizerischer Nationalfonds SO Kanton Solothurn sog. sogenannt LXXII Abkürzungsverzeichnis Spielzeugrichtlinie — Richtlinie 2009/48/EG des Europäischen Parlaments und des Rates über die Sicherheit von Spielzeug vom 18. Juni 2009, ABl. 2009 L 170/1 SR Systematische Sammlung des Bundesrechts / Ständerat SRF Schweizer Radio und Fernsehen SRL Systematische Rechtssammlung des Kantons Luzern Stan. L. Rev. Online — Stanford Law Review Online (Stanford) StGB Schweizerisches Strafgesetzbuch vom 21. Dezember 1937 (SR 311.0) STLR The Columbia Science & Technology Law Review (New York) sUAS small Unmanned Aircraft System sui-generis Die juristische Open-Access-Zeitschrift SUSI Swiss U-Space Implementation SUST Schweizerische Sicherheitsuntersuchungsstelle SVG Strassenverkehrsgesetz vom 19. Dezember 1958 (SR 741.01) Syracuse L. Rev. — Syracuse Law Review (Syracuse) SZ Süddeutsche Zeitung (München) SZW Schweizerische Zeitschrift für Wirtschafts- und Finanzmarktrecht (Zürich) TA-SWISS Stiftung für Technologiefolgen-Abschätzung Technology in Society — International journal (Amsterdam) u.a. unter anderem u.U. unter Umständen UA Unmanned Aircraft UAS Unmanned Aircraft System UAV Unmanned Aerial Vehicle UEFA Union of European Football Associations UIDG Bundesgesetz über die Unternehmens-Identifikationsnummer vom 18. Juni 2010 (SR 431.03) UIDV Verordnung über die Unternehmens-Identifikationsnummer vom 26. Januar 2011 (SR 431.031) UK United Kingdom UNO-Pakt II Internationaler Pakt über bürgerliche und politische Rechte (SR 0.103.2) USA United States of America USB Universal Serial Bus USG Bundesgesetz über den Umweltschutz vom 7. Oktober 1983 (Umweltschutzgesetz; SR 814.01) U-Space Urban Space Abkürzungsverzeichnis UTM UVEK LXXIII Unmanned Aircraft Systems Traffic Management Eidgenössisches Departement für Umwelt, Verkehr, Energie und Kommunikation UWG Bundesgesetz gegen den unlauteren Wettbewerb vom 19. Dezember 1986 (SR 241) v.a. vor allem VDSG Verordnung zum Bundesgesetz über den Datenschutz vom 14. Juni 1993 (SR 235.11) VFAV Verordnung des BAKOM über Fernmeldeanlagen vom 26. Mai 2016 (SR 784.101.21) Verordnung (EG) Nr. 216/2008 — Verordnung (EG) Nr. 216/2008 des Europäischen Parlaments und des Rates zur Festlegung gemeinsamer Vorschriften für die Zivilluftfahrt und zur Errichtung einer Europäischen Agentur für Flugsicherheit vom 20. Fe­ bruar 2008, ABl. 2008 L 79/1 (nicht mehr in Kraft; aufgehoben durch EASA-Grundverordnung) Verordnung (EG) Nr. 765/2008 — Verordnung (EG) Nr. 765/2008 des Europäischen Parlaments und des Rates über die Vorschriften für die Akkreditierung und Marktüberwachung im Zusammenhang mit der Vermarktung von Produkten und zur Aufhebung der Verordnung (EWG) Nr. 339/93 des Rates vom 9. Juli 2008, ABl. 2008 L 218/30 Verordnung (EU) Nr. 923/2012 — Durchführungsverordnung (EU) 923/2012 der Kommission zur Festlegung gemeinsamer Luftverkehrsregeln und Betriebsvorschriften für Dienste und Verfahren der Flugsicherung und zur Änderung der Durchführungsverordnung (EG) 1035/2011 vom 26. September 2012, ABl. 2012 L 281/1 VGer Verwaltungsgericht vgl. vergleiche VLK Verordnung des UVEK über Luftfahrzeuge besonderer Kategorien vom 24. November 1994 (SR 748.941) Vol. Volume VPB Verwaltungspraxis der Bundesbehörden (Bern) VSFD Verordnung über den Flugsicherungsdienst vom 18. Dezember 1995 (SR 748.132.1) VSS Verordnung des EDI über die Sicherheit von Spielzeug vom 15. August 2012 (Spielzeugverordnung; SR 817.023.11) VSZV Verordnung über die Sicherheitsuntersuchung von Zwischenfällen im Verkehrswesen vom 17. Dezember 2014 (SR 742.161) LXXIV VVEA Abkürzungsverzeichnis Verordnung über die Vermeidung und die Entsorgung von Abfällen vom 4. Dezember 2015 (SR 814.600) Wash. L. Rev. Washington Law Review (Seattle) WiMax Worldwide Interoperability for Microwave Access WLAN Wireless Local Area Network WPJ World Policy Journal (Durham, North Carolina) z.B. zum Beispiel ZBJV Zeitschrift des Bernischen Juristenvereins (Bern) ZBl Schweizerisches Zentralblatt für Staats- und Verwaltungsrecht (Zürich) ZD Zeitschrift für Datenschutz (München) ZG Zollgesetz vom 18. März 2005 (SR 631.0) ZGB Schweizerisches Zivilgesetzbuch vom 10. Dezember 1907 (SR 210) ZH Kanton Zürich Ziff. Ziffer zit. zitiert ZLS Zentralstellen der Länder für Sicherheitstechnik ZLW Zeitschrift für Luft- und Weltraumrecht (Köln) ZPO Schweizerische Zivilprozessordnung vom 19. Dezember 2008 (Zivilprozessordnung; SR 272) ZSR Zeitschrift für Schweizerisches Recht (Basel) Zürcher Wirtschaft — Mitgliederzeitung des Zürcher KMU- und Gewerbe­ verbands (Zürich) 1 Einleitung § 1 Einführung in das Problemfeld Zivile Drohnen breiten sich in der Schweiz immer weiter aus; Behörden wie Private nutzen diese Technologie immer häufiger. Die digitale Transformation nimmt vermehrt auch den Luftraum ein.1 Drohnen bilden gewissermassen «den materiellen, auf die Welt zugreifenden Arm der Digitalisierung»; «sie haben das Potenzial, die ‹ikonische Maschine› der Digitalisierung zu werden, wie dies einst die Dampfmaschine gewesen ist.»2 Diese technische Entwicklung muss — früher oder später — vom Recht erfasst werden. Dies kann durch Subsumtion der Technik unter bestehende Regelwerke oder durch die Schaffung spezifischer Rechtssätze und Normen geschehen.3 Mithin stellen sich die Fragen, wie das Recht mit dem Einsatz neuer Technik umgeht4 und ob die Wirksamkeit bestehender Rechtsnormen angesichts technologischer Veränderungen sichergestellt werden kann.5 Der Umgang des Schweizer Rechts mit Drohnen war denn auch bereits Thema von zahlreichen parlamentarischen Vorstössen, sowohl auf Bundes- wie auch auf kantonaler Ebene.6 Dies ist Ausdruck davon, dass sich in der Rechtswissenschaft durch Drohnen zahlreiche (neue) Fragen ergeben, die noch nicht analysiert und beantwortet wurden. Die vorliegende Dissertation nimmt sich einer dieser rechtlichen Herausforderungen an. Namentlich sollen die wesentlichen Aspekte im Schnittstellenbereich der aufkommenden Drohnentechnologie und des ebenfalls immer zentraleren Rechtsgebiets des Datenschutzes beleuchtet werden. 1 Vgl. SESAR, Master Plan, S. 3; Bericht Lupo 2016, S. 1856. 2 Christen et al., S. 227; vgl. Palmerini, S. 6. 3 Vgl. allgemein Huber H., S. 14 ff.; Magnin, S. 134; spezifisch für die Luftfahrt Bericht Lupo 2016, S. 1925; für das Datenschutzrecht Haustein, S. 93. 4 Vgl. Kornmeier, S. 3; Gasser, S. 12. 5 Vgl. Burkert/Hettich/Thouvenin, S. 49; Mihalyi, S. 193. 6 Vgl. etwa Postulat Tornare (13.3977); Interpellation Schläfli (14.4223); Frage Rusconi (15.5039); Interpellation Eichenberger-Walther (17.4064); Motion Leutenegger Oberholzer (16.3310); Interpellation Tornare (16.3837); Interpellation Leutenegger Oberholzer (16.4032) sowie z.B. im Kanton Zürich Anfrage Fehr Düsel (Nr. 150/2017) und die Antwort des Regierungsrats dazu (RRB 874/2017). 2 Einleitung Das Thema ist von besonderer Brisanz, da Drohnenpiloten heute oftmals nicht oder nur mit sehr grossem Aufwand identifizierbar sind.7 Diese Anony­ mi­tät kann dazu führen, dass bestehende Rechtsdurchsetzungsmechanismen an ihre Grenzen stossen oder gar vollkommen ins Leere laufen. Denn die im Sinne des Datenschutzrechts betroffene Person befindet sich in einer Situa­ tion der Machtlosigkeit; zwischen dem Drohnenpiloten und ihr besteht ein Informations- und dadurch ein Machtgefälle. Aus den Problemstellungen, die sich daraus ergeben, ist das vorliegende Projekt entstanden. § 2 Gegenstand und Ziel der Arbeit I. Forschungsfrage Der Arbeit liegt die folgende Forschungsfrage zugrunde: Wie kann das Recht auf informationelle Selbstbestimmung (Art. 13 Abs. 2 BV; Art. 8 EMRK) — konkretisiert im Datenschutzrecht — bei der drohnengestützten Datenbearbeitung durch Private durchgesetzt werden? Das Ziel der Dissertation besteht darin, eine Möglichkeit aufzuzeigen, wie die Identifizierung der für eine drohnengestützte Datenbearbeitung verantwortlichen Person gewährleistet werden kann. Denn nur so wissen die Betroffenen, gegenüber wem sie ihre datenschutzrechtlichen Ansprüche geltend machen können. II. Eingrenzung des Themas Da Drohnen, wie erwähnt, in verschiedensten Rechtsgebieten neue Fragen aufwerfen, muss der Gegenstand dieser Arbeit klar umgrenzt werden. Der Fokus soll einzig auf zivilen Drohnen liegen, die militärische Nutzung wird nicht behandelt. Ebenfalls wird nicht die Nutzung ziviler Drohnen durch Behörden erörtert;8 vielmehr geht es um die drohnengestützte Datenbearbeitung durch Private. Dabei ist nochmals zwischen der kommerziellen und der hobbymässigen Drohnennutzung zu unterscheiden; oftmals ist in diesem Zusammenhang von «Hobbydrohnen» die Rede.9 Bei dieser liegt der Schwerpunkt des vorliegenden Projekts. 7 Article 29 Working Party, S. 7; Geiser/Uttinger, S. 9; Griebel, S. 113; Leissler, S. 535; Nadakavukaren Schefer, S. 286; Perritt/Sprague, STLR, S. 406 f.; vgl. auch Interpellation Jositsch (18.3397); Büttner, S. 1. 8 Darauf soll einzig im Rahmen der bisherigen Einsatzformen in der Schweiz (S. 35 ff.) kurz eingegangen werden. 9 Statt vieler Christen et al., S. 70, S. 85 und S. 104 f.; vgl. Bracken-Roche, S. 168. § 2 Gegenstand und Ziel der Arbeit 3 Bei der Drohnennutzung durch Private akzentuiert sich das Problem der Anonymität.10 Setzen Behörden Drohnen ein, so sind diese entweder sichtund zuordenbar (z.B. Feuerwehr bei Bränden, Polizei bei Verkehrsunfällen) oder aber gewollt verdeckt (Observationen im Bereich Staatsschutz, Grenzkontrollen etc.).11 In diesen Fällen ist auch die datenschutzrechtliche Pro­ blematik anders gelagert, da die Behörden entweder vollkommen offen agieren oder die Verborgenheit geradezu Zweck des Einsatzes ist. Deshalb soll der Fokus auf der drohnengestützten Datenbearbeitung durch Private liegen. Als letzte Eingrenzung ist darauf hinzuweisen, dass nicht die Datenbearbeitung durch autonom operierende Drohnen behandelt wird.12 Vollständig autonome Drohnensysteme werden denn auch in absehbarer Zeit nicht bestehen.13 In den hier besprochenen Fällen existiert mithin in jedem Fall eine natürliche (oder juristische) Person, welche für die drohnengestützte Datenbearbeitung verantwortlich14 ist.15 III. Relevanz des Themas 1. Anzahl und Verbreitung von Drohnen Das Bundesamt für Zivilluftfahrt (BAZL) hat in seinem bisher einzigen Bericht zu zivilen Drohnen vom 7. Februar 2016 festgehalten, dass sich «[mindestens] 20’000 zivile unbemannte Luftfahrzeuge, respektive ‹Drohnen›», im Schweizer Himmel bewegen — «Tendenz steigend».16 Gestützt auf eine Schätzung, basierend auf Zahlen des Detailhandels, ging das BAZL sodann im Oktober 2017 von ungefähr 100’000 in der Schweiz verkauften Drohnen aus.17 Der 10 Darauf wurde auch in der soziologischen Forschung hingewiesen; vgl. BrackenRoche, S. 170 m.w.H.: «The mutual glance, the reciprocity of eye-to-eye contact is, according to some, a basic constituent of society.» Ähnlich auch Geiser/Uttinger, S. 9: «Wer Vorgänge in der Öffentlichkeit wahrnehmen will, soll sich auch selber zu erkennen geben. Das ist bei einer Drohne nicht gewährleistet.» 11 Vgl. zu diesen Anwendungsfeldern hinten, S. 35 ff. 12 Ausführlich zum Thema autonomer Entscheidungsprozesse und deren Abgrenzung zur Automation Hänsenberger, Diss., S. 44 ff. Vgl. auch Bartsch, S. 3. 13 Hänsenberger, Diss., S. 48 m.w.H.; Vladeck, S. 121 f.; Perritt/Sprague, JETLaw, S. 689; vgl. auch Burri, S. 343 ff. 14 Zum Verantwortlichen im Sinne des Datenschutzrechts ausführlich hinten, S. 74. 15 Vgl. zum Thema der Verantwortlichkeit von «Automaten» (verstanden als Computer, Roboter etc.) Matthias, passim, v.a. S. 237 ff. Vgl. sodann Solove, Nothing to Hide, S. 185 f.; Haustein, S. 100 f.; Lenk, S. 34. 16 BAZL, Zivile Drohnen, S. 1. Im Jahr 2014 waren es wohl mehrere Tausend (vgl. Steiger, Regulierung, S. 170). 17 BAZL, E-Mail vom 23. Oktober 2017 (beim Autor einsehbar); diese Zahl nennen auch Christen et al., S. 106 m.w.H. 4 Einleitung Bundes­rat hielt Ende August 2018 dagegen fest, dass «Drohnen gegenwärtig nicht registriert werden18 und im Verkauf frei erhältlich [sind]. Dadurch ist ihre Zahl so wenig bekannt wie die Art des Einsatzes. (…) Auch die verfügbaren aktuellen Verkaufszahlen aus der Schweiz liefern keine zuverlässige Basis für genauere Schätzungen (…)».19 Tatsache ist, dass die Anzahl Drohnen in der Schweiz und in Europa in den nächsten Jahren und Jahrzehnten weiter zunehmen wird.20 Gemäss Marktforschungsinstitut GfK gingen in der Schweiz im Jahr 2017 73’200 Drohnen über den Ladentisch; der Absatz stieg in den letzten Jahren stetig an.21 Diese Zunahme wird die gesellschaftliche Bedeutung von Drohnen nochmals erhöhen.22 Gemäss einer Schätzung des Präsidenten des Schweizerischen Verbands Ziviler Drohnen (SVZD)23 vom Mai 2019 führen Privatpersonen in der Schweiz wöchentlich ca. 2’500 Drohnenflüge durch.24 2. Neue Gefahren durch neue Technologie Drohnen ermöglichen es, einen (Luft-)Raum einzunehmen, der bisher nur sehr wenig genutzt wurde.25 Dabei werden physische Grenzen überflogen, was die Abgrenzung zwischen Privatem und Öffentlichem zunehmend schwie- 18 Gemäss Art. 2 Abs. 1 i.V.m. Art. 1 VLK werden Drohnen nicht in das Luftfahrzeugregister eingetragen. Vgl. ausführlich zur zukünftigen Registrierung von Drohnen hinten, S. 120 ff. 19 Antwort des BR vom 29. August 2018 auf Anfrage Leutenegger Oberholzer (18.1044) (Hervorhebung hinzugefügt). Vgl. in diesem Zusammenhang auch die Frage Leuten­ egger Oberholzer (18.5399) sowie Landrock/Baumgärtel, S. 61, die darauf hinweisen, dass «fundierte Zahlen über den Drohnenmarkt noch kaum existieren». 20 In Deutschland sollen im August 2019 rund 500’000 Drohnen in privater und kommerzieller Nutzung betrieben worden sein (Balser, S. 5). Vgl. zur erwarteten Entwicklung der Nachfrage in Europa SESAR, Outlook Study, S. 17 (starke Zunahme bis 2025; bis sieben Millionen verkaufte Drohnen für Freizeitaktivitäten bis 2050); Klauser et al., S. 21. 21 Giuriato; vgl. auch Pugin, S. 5, die von rund 22’000 jährlich verkauften Drohnen spricht. 22 Vgl. SESAR, Outlook Study, S. 14 ff.; Klauser et al., S. 21 f. Kaiser, S. 359, wies bereits 2006 auf die absehbare Zunahme von Klein- und Kleinstdrohnen und das damit einhergehende Gefährdungspotenzial für die Privatsphäre hin. 23 Der SVZD ist der Dachverband des Schweizer Drohnengewerbes; vgl. die Webseite www.drohnenverband.ch. 24 Vgl. Hegetschweiler, S. 5. Über die Dauer und den Ort der einzelnen Flüge machte der Präsident des SVZD keine Angaben. Ihm zufolge kommen KMUs schätzungsweise auf rund 200 Flüge pro Woche. 25 Thomasen, Between the Lines, S. 207 und S. 218 ff.; Palmerini, S. 18. Vgl. Klauser/ Pedrozo, S. 236 f. § 2 Gegenstand und Ziel der Arbeit 5 riger macht.26 Zudem werden diese Grenzen immer häufiger auch wort­ wörtlich durchschaut: Moderne Sensoren27 können Gespräche im Innern von Gebäuden verfolgen oder (Körper-)Wärme hinter Mauern erkennen und registrieren.28 Gemäss der grössten bisher in der Schweiz durchgeführten Studie (Universität Neuenburg, 2017) sind alle in der Schweiz eingesetzten Drohnen mit mindestens einem Sensor bestückt; ca. 80 Prozent davon sind mit einer Fotooder Videokamera ausgestattet.29 Diese Sensoren sind es denn auch, welche die Datenbearbeitung — mit Drohnen als Plattformen30 — überhaupt ermöglichen und diese Technologie in den Fokus der datenschutzrechtlichen Diskussion rücken.31 Die immer günstiger werdende Drohnentechnologie «will make private spaces easier accessible to surveillance equipment and increase the number of intolerable privacy intrusions.»32 3. Misstrauen und Ablehnung in der Bevölkerung Auch oder gerade wegen dieser Datenbearbeitungsfähigkeiten werden Drohnen von der (Schweizer) Bevölkerung noch immer mit einigem Misstrauen betrachtet.33 Ähnliches wurde auch in anderen Ländern beobachtet. Eine Studie in Dänemark mit dem Titel «Public reactions to drone use in residential and public areas» kam u.a. zu folgendem Schluss: «When seeing a drone, bystanders (…) try to ascertain its purpose and legitimacy by either trying to interpret its flight pattern, lights, or design; or by looking for a pilot to hold accountable.»34 26 Rao/Gopi/Maione, S. 88; vgl. Burger/Scuderi, S. 88; Thomasen, Between the Lines, S. 208 ff. 27 Ausführlich dazu hinten, S. 40 ff. 28 Article 29 Working Party, S. 3; ACLU, S. 4 f.; Hodgkinson/Johnston, S. 15; Palmerini, S. 18; vgl. Bartsch, S. 6. Froomkin/Colangelo, S. 35, weisen in diesem Zusammenhang zudem auf die schnelle Datenübertragung hin. 29 Klauser et al., S. 8. 30 Vgl. Dieckert/Eich, in: dies., S. 2 («Schwebeplattform»); Custers, S. 11. 31 Article 29 Working Party, S. 7; Calo, passim, v.a. S. 32; Finn/Wright, S. 187 und 191 f.; Nadakavukaren Schefer, S. 266 ff.; Weber/Oertly, Rn. 1. 32 Kaiser, S. 360; ähnlich Bernauw, S. 242. Vgl. auch Aebi-Müller, Rn. 510. 33 Klauser/Pedrozo, S. 234 f.; Geiser/Uttinger, S. 9; vgl. auch Bajde et al., Privacy Concerns, S. 14; Christen et al., S. 135 m.w.H.; Chang/Chundury/Chetty, S. 6765 ff.; Rose, S. 140 m.w.H. 34 Bajde et al., Public reactions, S. 5; vgl. auch Bracken-Roche et al., S. 42 ff. (Kanada); Chang/Chundury/Chetty, S. 6770; Rice et al., S. 15; Rao/Gopi/Maione, S. 88 mit Fn. 42; Wang et al., S. 178 f. (alle Vereinigte Staaten von Amerika); Euler/Cobus/ Koelle, S. 150 f. (Deutschland); Marte et al., passim (mit Fokus auf Drohnenüber­ wachung durch die Polizei). 6 Einleitung Die gesellschaftliche Akzeptanz von Drohnen und deren Nutzung — auch durch Private — ist ein zentraler Aspekt dieser technologischen Entwicklung.35 Die Achtung der Grundrechte, und primär der Privatsphäre sowie der informationellen Selbstbestimmung, muss garantiert sein.36 Dem hat auch der Gesetzgeber im Hinblick auf allfällige zukünftige Normen zu Drohnen Beachtung zu schenken.37 Es ist davon auszugehen, dass die gesellschaftliche Skepsis gegenüber Drohnen anhält, zumindest solange die Anonymität der Drohnenpiloten Bestand hat und das damit verbundene Gefühl der Machtlosigkeit der betroffenen Personen nicht abgemildert werden kann. Die zunehmende Verbreitung von Drohnen und dem damit einhergehenden Informationsbedarf bzw. der damit verbundenen Verunsicherung wurde im November 2017 augenscheinlich. Das BAZL hielt damals auf seiner Webseite fest: «Der Informationsbedarf zu Drohnen ist sehr gross. Aufgrund von personellen Engpässen ist das BAZL momentan nicht mehr in der Lage, generelle Anfragen telefonisch oder per E-Mail zu beantworten.»38 Per Januar 2019 wurden innerhalb des Bundesamts sechs zusätzlichen Vollzeitstellen im Bereich Drohnen und Digitalisierung geschaffen, «um die zunehmende Arbeitslast abzufedern».39 4. Wirtschaftliches Potenzial Unter dem Titel der Relevanz ist schliesslich kurz auf das wirtschaftliche Potenzial der Drohnen hinzuweisen. Gemäss einer Studie der EU wird der europäische Drohnenmarkt ab 2035 schätzungsweise zehn Milliarden Euro pro Jahr ausmachen; ab 2050 sodann über 15 Milliarden Euro.40 In der Schweiz bemisst sich der zivile Drohnenmarkt auf etwa 300 Millionen Franken, wobei für die nächsten zehn Jahre ein jährliches Wachstum von 15 bis 35 EASA, A-NPA, S. 7; Winter et al., S. 131 ff.; ITF/OECD, S. 21; Masutti/Tomasello, S. 226; ausführlich Christen et al., S. 191 ff. Dies hat auch der Mediensprecher des BAZL im Mai 2019 festgehalten (vgl. Hegetschweiler, S. 5). 36 Europäische Kommission, Riga declaration, S. 4; vgl. auch Europäische Kommission, Warsaw declaration, S. 1; Giemulla/van Schyndel/Friedl, S. 6; Martini, S. 736 f.; Euler/Cobus/Koelle, S. 151 in fine. 37 Vgl. Geiser/Uttinger, S. 9; SESAR, Outlook Study, S. 10; EASA, Opinion, S. 9; Ensthaler, S. 34. Ängste und Unsicherheiten in der Gesellschaft werden denn auch regelmässig in politischen Vorstössen aufgegriffen; vgl. dazu die Hinweise vorne, Fn. 6. 38 Diese Information war mindestens bis am 14. März 2019 online einsehbar; zu welchem Zeitpunkt sie entfernt wurde, ist dem Autor nicht bekannt. 39 EFV, S. 278. 40 SESAR, Outlook Study, S. 3, S. 29 f. Vgl. zur kommerziellen Drohnennutzung auch SESAR, Master Plan, S. 19 f.; sowie Perritt/Sprague, Domesticating Drones, S. 295 ff.; mit Blick auf die Schweiz sodann ausführlich Arora, passim; Christen et al., S. 106 ff. sowie S. 115 ff. § 2 Gegenstand und Ziel der Arbeit 7 20 % prognostiziert wird.41 Diese Zahlen sind jedoch mit einer gewissen Vorsicht zu geniessen. Die bisher veröffentlichten Studien zum Wachstums­ potenzial des Drohnenmarkts präsentieren teilweise sehr unterschiedliche Resultate.42 Eine genaue Aussage ist deshalb nicht möglich. Die Tendenz steht aber auch hier — wie bei der Anzahl Drohnen — auf Wachstum.43 IV. Stand der Wissenschaft Bis anhin war die Identifizierung von Drohnenpiloten im Zusammenhang mit der Durchsetzung von datenschutzrechtlichen Ansprüchen wissenschaftlich nicht aufgearbeitet. Zu rechtlichen Fragen im Zusammenhang mit Drohnen wurden in der Schweiz aber bereits einige wenige Beiträge veröffentlicht. Zunächst ist auf den ausführlichen Artikel von Steiger44 hinzuweisen. Dieser befasst sich mit verschiedenen Aspekten der Drohnennutzung durch zivile Behörden. Auch aus haftungsrechtlicher sowie regulatorischer Sicht wurden Drohnen bereits beleuchtet.45 Des Weiteren wurde auch aus sachenrecht­ licher sowie zivilprozessualer Sicht erörtert, wie gegen Drohnen vorgegangen werden könnte.46 Haftungsrechtliche Fragen im Zusammenhang mit autonomen Drohnen wurden sodann ausführlich von Hänsenberger analysiert.47 Soweit ersichtlich wurden in der Schweiz bisher erst drei wissenschaftliche Beiträge veröffentlicht, welche sich des Themas Drohnen und Datenschutz annehmen.48 Diesen ist jedoch gemeinsam, dass sie sich nicht mit der Problematik der Identifikation des Drohnenpiloten bzw. der Durchsetzung der (grundrechtlichen) Ansprüche auf Datenschutz auseinandersetzen. In Deutschland wurde im Jahr 2012 die Dissertation von Kornmeier mit dem Titel «Der Einsatz von Drohnen zur Bildaufnahme» veröffentlicht. Die Autorin befasst sich aber darin ebenfalls nicht mit der Frage der Identifizierung 41 Fumagalli, S. 31 m.w.H. 42 Vgl. Christen et al., S. 115; Landrock/Baumgärtel, S. 62, je m.w.H. Dies ist auch auf die sehr unterschiedlichen (Welt-)Regionen oder Anwendungsfelder, die jeweils in die Analyse miteinbezogen wurden, zurückzuführen. 43 Ausführlich zum Ganzen Grohe, S. 28 ff. mit zahlreichen Hinweisen. 44 Steiger, Regulierung, S. 169 ff. 45 Hänsenberger, AJP 2017, sowie ausführlich ders., Diss. (Haftungsfragen); Hänsenberger/Wildhaber (regulatorische, luftrechtliche Aspekte). 46 Vgl. Hrubesch-Millauer/Bruggisser; Schneider-Marfels/Kaufmann (sachenrechtliche Aspekte); Kettiger, Abwehr (gerichtliches Verbot nach 258 ff. ZPO). 47 Hänsenberger, Diss. Vgl. ausführlich zum europarechtlichen Haftungsregime die Studie von Bertolini, passim. 48 Nadakavukaren Schefer, Weber/Oertly und Weber. Vgl. zum deutschen Recht den Artikel von Giebel. 8 Einleitung der Drohnenpiloten. Nur sehr kurz angesprochen wird das Thema Datenschutz im Werk von Kutschera («Rechtliche Grundlagen für die Verwendung von Drohnen in Österreich»).49 Insgesamt kann festgehalten werden, dass primär im spezifischen Gebiet der Literatur zu Drohnen und Datenschutz in der Schweiz sehr wenig Referenzmaterial zur Verfügung steht. Auch die Rechtsprechung in diesem Bereich ist äusserst spärlich. Als eines der ersten Gerichte überhaupt befasste sich das Kantonsgericht Luzern mit der Problematik, dass die Gemeinde Horw für die Wahrnehmung ihrer Kompetenzen im Bereich der Baupolizei auf Drohnenbilder abgestellt hatte; dabei musste das Gericht auch datenschutzrechtliche Erwägungen anstellen.50 Eine Rechtssache, in der es um datenschutzrechtliche Aspekte privater Drohnennutzung geht, existiert — soweit ersichtlich — in der Schweiz bis anhin nicht. Auch die sozialwissenschaftliche Forschung zu zivilen Drohnen wurde erst in den letzten Jahren als eigenständiges Forschungsfeld entdeckt.51 Aus Schweizer Sicht sind primär zwei wichtige Projekte in diesem Bereich zu erwähnen. Einerseits das SNF-Projekt «Power and Space in the Drone Age» unter der Leitung von Prof. Klauser der Universität Neuenburg,52 andererseits das TA-SWISS-Projekt53 von Christen et al. § 3 Aufbau und Methode I. Gang der Untersuchung Damit die eingangs gestellte Forschungsfrage beantwortet werden kann, müssen zunächst die zentralen Begriffe — Drohne, Daten, Datenbearbeitung sowie drohnengestützte Datenbearbeitung — definiert werden. Im Zusammenhang mit Drohnen sind auch der Stand der Technik und deren Einsatzformen in der Schweiz kurz darzustellen. Davor soll jedoch auf die fluide 49 Vgl. Kutschera, S. 49 ff. 50 KGer LU, 7H 17 49 vom 18. April 2018; vgl. auch BVGer, A-2482/2007 vom 26. Juni 2007 E. 5, wo eine kurze Auseinandersetzung mit Drohneneinsätzen und damit einher­ gehender Datenerhebung durch das Grenzwachtkorps im Lichte von Art. 13 BV und Art. 8 Ziff. 1 EMRK zu finden ist. 51 Christen et al., S. 133. 52 Vgl. die Publikationen von Klauser et al.; Klauser/Pedrozo und Pedrozo/Klauser. Vgl. auch die in Deutschland durchgeführten Studien von Euler/Cobus/Koelle und Koelle et al. 53 Technologiefolgen-Abschätzung ist eine im Bundesgesetz über die Förderung der Forschung und der Innovation (FIFG) verankerte Aufgabe (Art. 11 Abs. 2 lit. c FIFG); die TA-SWISS nimmt diese seit 1992 wahr (vgl. www.ta-swiss.ch — Mandat und Organisation). § 3 Aufbau und Methode 9 Gesetzgebung in den Bereichen Datenschutz und Drohnen sowie die daraus erwachsenden Konsequenzen für die vorliegende Arbeit eingegangen werden (Teil 1: Rechtliche, begriffliche und technische Grundlagen).54 In einem weiteren Schritt wird die drohnengestützte Datenbearbeitung im Lichte der Grundrechte betrachtet. Die Ausführungen zu den Schutzpflichten sind dabei von zentraler Bedeutung. Sie dienen als Massstab für die darauffolgende Analyse der Gesetzgebung im Zusammenhang mit der drohnengestützten Datenbearbeitung durch Private. Die Abhandlungen zu den durch Drohnen möglicherweise tangierten Grundrechte erlauben es, zu bestimmen, in welchen grundrechtlich geschützten Bereichen sich Schutzpflichten aktualisieren (Teil 2: Die drohnengestützte Datenbearbeitung im Lichte der Grundrechte).55 Die erarbeiteten grundrechtlichen Anforderungen sollen sodann auf das materielle Datenschutzrecht, namentlich den E-DSG, angewandt werden. Im Sinne einer Bestandesaufnahme soll überprüft werden, ob und welche datenschutzrechtlichen Ansprüche bei der drohnengestützten Datenbearbeitung durch Private entstehen können und wie es um deren Durchsetzung bestellt ist (Teil 3: Bestandesaufnahme (1): Der E-DSG).56 Die Bestandesaufnahme wird sodann im Luftfahrtrecht weitergeführt. Die neuen europäischen Vorschriften zu Drohnen sollen analysiert und deren datenschutzrechtliche Bedeutung herausgeschält werden. Ebenfalls soll analysiert werden, inwiefern die «Drohnengesetzgebung» die Durchsetzung datenschutzrechtlicher Ansprüche ermöglicht oder zumindest begünstigt (Teil 4: Bestandesauf­ nahme (2): Die «Drohnenverordnungen»).57 Der fünfte Teil baut auf den beiden Bestandesaufnahmen auf und stellt die dort erarbeiteten Erkenntnisse den Resultaten des zweiten Teils gegenüber. Dies ermöglicht zu beurteilen, ob (weitergehende) Schutzpflichten bestehen und wie diese wahrgenommen werden können. Daraus resultieren konkrete Vorschläge an den Gesetzgeber zur Ermöglichung der Durchsetzung von datenschutzrechtlichen Ansprüchen bei der drohnengestützten Datenbearbeitung durch Private (Teil 5: Die Durchsetzung von datenschutz­ rechtlichen Ansprüchen).58 Abschliessend folgt eine Zusammenfassung der gewonnenen Erkenntnisse.59 54 Hinten, S. 11 ff. 55 Hinten, S. 45 ff. 56 Hinten, S. 73 ff. 57 Hinten, S. 119 ff. 58 Hinten, S. 157 ff. 59 Hinten, S. 175 ff. 10 Einleitung II. Methode Die vorliegende Dissertation ist eine rechtswissenschaftliche Arbeit. Ihre Erkenntnisse gewinnt sie — der rechtswissenschaftlichen Tradition folgend — primär aus den einschlägigen Rechtssätzen und Materialien, der juristischen Literatur sowie der Judikatur. Dabei wird das Recht mit den Mitteln der grammatikalischen, historischen, systematischen und teleologischen Auslegung analysiert.60 Beim Verfassen dieser Dissertation werden die Bundesverfassung, der Revisionsentwurf zum Bundesgesetz über den Datenschutz,61 die europäischen Verordnungen zu Drohnen62 sowie die Luftfahrtgesetzgebung in der Schweiz63 im Vordergrund stehen. Erkenntnisse aus anderen Wissenschaftsdisziplinen, wie z.B. der Sozialoder Wirtschaftsgeografie oder der Soziologie, werden insofern in die Arbeit miteinbezogen, als dies für das Verständnis der rechtlichen Ausführungen dienlich ist. Ausserdem ist es unumgänglich, dass Erkenntnisse aus verschiedenen Bereichen der Ingenieurswissenschaften Eingang in die Untersuchung finden, namentlich bei den technischen Möglichkeiten von Drohnen,64 deren aerodynamischer Konstruktionsweise65 sowie bei der Beurteilung der von Drohnen ausgehenden Verletzungsgefahr.66 60 Ausführlich zu den einzelnen Auslegungsmethoden Kramer, S. 60 ff. und spezifisch zur Verfassungsauslegung Tschannen, § 4 Rn. 1 ff. Zum sog. «pragmatischen Methoden­ pluralismus» des Bundesgerichts vgl. Häfelin/Müller/Uhlmann, Rn. 178 ff.; sowie Kramer, S. 132 ff. mit zahlreichen Hinweisen auf die Rechtsprechung. 61 Weshalb auf der Basis des Entwurfs des neuen Datenschutzgesetzes gearbeitet wird, soll sogleich (S. 11 ff.) erläutert werden. 62 Vgl. dazu und deren Bedeutung für die Schweiz hinten, S. 13 ff. 63 Luftfahrtgesetz (LFG), die Luftfahrtverordnung (LFV) sowie die Verordnung des UVEK über Luftfahrzeuge besonderer Kategorien (VLK). 64 Vgl. dazu hinten, S. 40 ff. 65 Vgl. dazu hinten, S. 18 ff. 66 Vgl. dazu hinten, S. 122 ff. 11 Teil 1: Rechtliche, begriffliche und technische Grundlagen § 1 Bemerkungen zu den zentralen Rechtsgrundlagen Wie bei den Ausführungen zur Methode erwähnt,67 basiert diese Arbeit auf dem Entwurf des neuen Bundesgesetzes über den Datenschutz sowie den drei europäischen Verordnungen zu Drohnen. Nachfolgend soll zu beiden Rechtsmaterien kurz ausgeführt werden, weshalb diese Vorgehensweise gewählt wurde. I. Datenschutzgesetz 1. Auslöser und Ziele der Totalrevision Die schweizerische Datenschutzgesetzgebung wird momentan totalrevidiert.68 Der Entwurf zum neuen DSG wurde in der Herbstsession 2019 vom Nationalrat als Erstrat beraten. Der Ständerat befasste sich sodann am 18. Dezember 2019 mit der Vorlage.69 Der Zeitpunkt des Inkrafttretens des revidierten Datenschutzgesetzes ist noch unklar.70 Die Revisionsbestrebungen sind durch Entwicklungen auf europäischer Ebene ausgelöst geworden. Namentlich sollte damit den neu erlassenen Rechtsakten auf Ebene der Europäischen Union sowie des Europarats71 67 Vgl. vorne, S. 10. 68 Vgl. ausführlich zu den verschiedenen Etappen des noch laufenden Revisionsprozesses Curia Vista, 17.059. 69 Aus zeitlichen Gründen konnten die Beschlüsse des SR nicht mehr in die vorliegende Untersuchung einfliessen. 70 Vgl. Art. 69 E-DSG. 71 Namentlich wurde das Übereinkommen zum Schutz des Menschen bei der automatischen Verarbeitung personenbezogener Daten (SEV 108; auch Konvention 108) vom Europarat überarbeitet. Das Änderungsprotokoll liegt seit dem 10. Oktober 2018 vor; der Bundesrat hat dieses am 30. Oktober 2019 unterzeichnet. Vgl. Botschaft Total­ revision DSG, S. 6966; Bygrave, S. 32 ff. 12 Teil 1: Rechtliche, begriffliche und technische Grundlag Rechnung getragen werden. Die EU hat im Jahr 2016 ihre Datenschutzgesetzgebung auf eine neue Grundlage gestellt und insbesondere die Verordnung (EU) 2016/679 zum Schutz natürlicher Personen bei der Verarbeitung personenbezogener Daten (DSGVO) erlassen.72 Ein weiterer Grund für die Revision des Schweizer Datenschutzrechts waren sodann die Schwächen des «alten» Datenschutzgesetzes von 1992, welche aufgrund der rasanten technologischen Entwicklung entstanden waren.73 Wie noch aufgezeigt wird,74 sind die Regelungen der Datenschutzgesetzgebung und des Persönlichkeitsschutzes gemäss ZGB Ausdruck staatlicher Schutzpflichten.75 Die Totalrevision des DSG hatte mithin ebenfalls zum Ziel, den Schutz grundrechtlich relevanter Ansprüche im Kontext der informa­ tionellen Selbstbestimmung effektiver zu gestalten. Dies sollte insbesondere durch eine Verbesserung der Transparenz der Datenbearbeitung sowie der Kontrollmöglichkeiten der betroffenen Personen geschehen.76 Es lässt sich — gerade im Datenschutzrecht — eine «zunehmende Sensibilisierung des Grundrechtsverständnisses» beobachten.77 Die Einflüsse der Regelungen der Europäischen Union sind im Entwurf zum neuen DSG klar ersichtlich. Dies ist nicht überraschend, denn die Schweiz beabsichtigt, eine Bestätigung über ein angemessenes Datenschutzniveau zu erhalten (sog. Angemessenheitsbeschluss).78 Diese ermöglicht den freien Datenaustausch zwischen der Schweiz und der EU.79 72 Die DSGVO gilt seit dem 25. Mai 2018. Daneben wurde die Richtlinie (EU) 2016/680 zum Schutz natürlicher Personen bei der Verarbeitung personenbezogener Daten im Bereich des Strafrechts (Schengen-relevant; notifiziert am 1. August 2016) erlassen. Die dadurch notwendig gewordenen Anpassungen wurden bereits in Kraft gesetzt (vgl. BBl 2018 6003 ff.; AS 2019 625 ff.). Für die vorliegende Untersuchung ist die Richtlinie unbeachtlich, da sie die Strafverfolgung betrifft. 73 Vgl. zu den Zielen der Revision Botschaft Totalrevision DSG, S. 6943 und S. 6970 ff. 74 Ausführlich hinten, S. 69 ff. 75 Biaggini, Komm. BV, Art. 13 N 16; vgl. auch BGE 138 II 346, passim, v.a. E. 8.2. 76 Botschaft Totalrevision DSG, S. 6943; Amtl. Bull. NR 2019 S. 1774 (Votum Jauslin), S. 1781 (Votum Fluri) und S. 1782 (Votum BR Keller-Sutter); vgl. auch Aebi-Müller, Rn. 564 sowie Rn. 591 ff.; Savary, S. 217. 77 Stinner, S. 63. Vgl. dazu z.B. EG 73 und 104 DSGVO, wo die Menschenrechte explizit erwähnt werden. Vgl. auch Tamò-Larrieux, S. 77 mit Fn. 33. 78 Teilweise auch Äquivalenzbeschluss oder Adäquanzentscheidung. Vgl. Art. 45 DSGVO und dazu statt aller Schantz, in: Simitis et al., Art. 45 DSGVO N 3 ff.; Baur, S. 172 f. Vgl. sodann BJ, Kompatibilitätstabelle (Vergleich E-DSG mit DSGVO, SEV 108 etc., auch mit Blick auf den Angemessenheitsbeschluss). 79 Ausführlich dazu Botschaft Totalrevision DSG, S. 6964. Vgl. auch Rosenthal, Entwurf, Rn. 4 ff.; Savary, S. 217; Rudin, S. 222 ff. § 1 Bemerkungen zu den zentralen Rechtsgrundlagen 2. 13 Abstellen auf den E-DSG Vor diesem Hintergrund erweist es sich als nicht sinnvoll, für die vorliegende Auseinandersetzung auf das noch in Kraft stehende, aber «alte» DSG abzustellen. Nachfolgend wird deshalb mit dem Entwurf des Datenschutzgesetzes in der Version gemäss Beschluss des Nationalrats vom 25. September 2019 gearbeitet.80 Die selbstverständlich möglichen Änderungen in der weiteren Beratung des Entwurfs dürften — wenn überhaupt — nur sehr beschränkten Einfluss auf die zentralen Bestimmungen des neuen Datenschutzgesetzes und deren Anwendbarkeit auf die drohnengestützte Datenbearbeitung durch Private haben. Literatur und Rechtsprechung zum heute geltenden DSG können an vielen Stellen noch immer verwendet werden, da sich die Grundbegriffe und -prinzipien des Datenschutzrechts weder in der Schweiz noch in der EU im Grundsatz verändert haben bzw. verändern werden.81 II. Drohnenverordnungen 1. EU-Recht und dessen Bedeutung für die Schweiz Auch im Bereich der Luftfahrt ergaben sich unlängst auf europäischer Ebene zentrale Veränderungen.82 Die neue EASA-Grundverordnung ist am 11. Se­p­ tem­ber 2018 in Kraft getreten83 und enthält die gemeinsamen Vorschriften für die Zivilluftfahrt innerhalb der EU. Die Grundverordnung ist von zentraler Bedeutung, da sie — anders als das bisherige Recht84 — grundsätzlich alle Drohnen erfasst und mithin einen einheitlichen europäischen Rechtsrahmen schafft.85 80 Vgl. Fahne mit den Beschlüssen des Nationalrats vom 25. September 2019. 81 Vgl. dazu im Einzelnen die Auseinandersetzung mit den Bestimmungen des E-DSG hinten, S. 74 ff. 82 Diese wurden aber nicht nur mit Blick auf die Drohnentechnologie erlassen; vgl. zum Hintergrund der revidierten EASA-Grundverordnung Rebane, S. 51 ff. 83 Vgl. Art. 141 EASA-Grundverordnung. 84 Vor Inkrafttreten der EASA-Grundverordnung war die Regulierung unbemannter Luftfahrzeuge mit einem Gewicht von weniger als 150 kg Sache der Mitgliedstaaten (vgl. Anhang II lit. i i.V.m. Art. 4 Verordnung [EG] Nr. 216/2008). Vgl. dazu Masutti, S. 213 und S. 215; Voland/Qui, S. 346. 85 Verordnungen der EU haben gemäss Art. 288 Abs. 2 AEUV allgemeine Geltung. Sie sind in allen ihren Teilen verbindlich und gelten unmittelbar in jedem Mitgliedstaat. Sie müssen — anders als Richtlinien — nicht erst in nationales Recht umgesetzt werden (Oesch, Rn. 423 f.; Hänsenberger, Diss., S. 196; Ebinger, S. 5). 14 Teil 1: Rechtliche, begriffliche und technische Grundlag Ausnahmen vom Geltungsbereich sind u.a. für das Militär, Blaulichtorganisationen sowie für Forschungs- und Versuchszwecke vorgesehen.86 Diese sind für die vorliegende Untersuchung nicht weiter von Bedeutung, da sie primär Anwendungen erfassen sollen, «die unter der Kontrolle und Verantwortung eines Mitgliedstaats im öffentlichen Interesse von einer mit hoheitlichen Befugnissen ausgestatteten Stelle oder in deren Auftrag durchgeführt werden».87 Gestützt auf die EASA-Grundverordnung hat die EU-Kommission die Durchführungsverordnung sowie die Delegierte Verordnung erlassen.88 Diese Regelwerke sind per 1. Juli 2019 in Kraft getreten.89 Darin wird die Grundverordnung konkretisiert;90 sie enthalten ausführliche Vorschriften zu verschiedensten Aspekten der Drohnenfliegerei. 2. Übernahme durch die Schweiz Die Schweiz hat diese luftfahrtrechtlichen Vorschriften gestützt auf das Luftverkehrsabkommen Schweiz–EU (LVA CH–EU) übernommen bzw. wird diese noch übernehmen.91 Dies geschieht im Einklang mit dem Grundgedanken des Abkommens, namentlich der dynamischen Rechtsentwicklung und deren Übernahme.92 Mit der Revision des Anhangs zum LVA CH–EU durch den zuständigen Gemischten Ausschuss werden die dort genannten Regelwerke der EU für die Schweiz verbindlich.93 Die entsprechenden Beschlüsse des Gemischten Ausschusses werden gemäss der Vorgabe in Art. 22 Abs. 3 86 Vgl. Art. 2 Abs. 3 und Anhang I EASA-Grundverordnung; Lavallée, S. 2 f.; vgl. Dempsey, S. 63 f. 87 Art. 2 Abs. 3 lit. a EASA-Grundverordnung. Kritisch zur Formulierung der Bestimmung und der daraus möglicherweise resultierenden unsicheren Rechtslage — v.a. bei nichtmilitärischen Anwendungen — Masutti/Tomasello, S. 52 f.; vgl. auch Voland/Qui, S. 346. 88 Vgl. Art. 57 f., Art. 61 und Art. 128 EASA-Grundverordnung; Art. 290 f. AEUV; Josipovic, S. 440; Voland/Qui, S. 347. 89 Art. 23 Abs. 1 Durchführungsverordnung (sie gilt ab dem 1. Januar 2021); Art. 42 Delegierte Verordnung; Krumm, Rechtsrahmen, S. 484. 90 Die grundlegenden Anforderungen an Konstruktion, Herstellung, Instandhaltung, Betrieb, Organisationen, Betreiber und Fernpiloten, Registrierung etc. von Drohnen sind in Anhang IX EASA-Grundverordnung enthalten. Vgl. zu diesen im Einzelnen Josipovic, S. 440 f. 91 Vgl. Art. 23 LVA CH–EU und ausführlich dazu Dettling-Ott, Luftverkehrsabkommen, Rn. 9 ff. und Rn. 53 f. Vgl. zur Bedeutung von EU-Recht für die Regulierung von Drohnen in der Schweiz auch Hänsenberger, Diss., S. 200 und S. 234 f. 92 Vgl. dazu Epiney/Frei, Rn. 1 mit Fn. 1 sowie Rn. 21. Kritisch zur «pauschalen Übernahme europäischer Vorschriften» Christen et al., S. 181 und 225. 93 Art. 2 LVA CH–EU. Vgl. allgemein zur Übernahme des EU-Rechts im Bereich der Luftfahrt Botschaft sektorielle Abkommen, S. 6150 f. § 2 Begriffe 15 LVA CH–EU in der AS sowie im Amtsblatt der EU publiziert.94 Die EASA-­ Grundverordnung gilt dementsprechend für die Schweiz seit dem 1. September 2019;95 die Delegierte Verordnung soll per 1. Juli 2020 in Kraft treten. Die Durchführungsverordnung soll dagegen erst ein halbes Jahr später, namentlich ab dem 1. Januar 2021, anwendbar sein. Dies hat die EU-Kommission im April 2020 wegen der Coronakrise entschieden. Aus diesem Grund bleibt auch die bisherige Schweizer Drohnenregulierung bis Ende 2020 in Kraft.96 Die europa­rechtlichen Definitionen und Vorgaben sind bzw. werden somit bald auch in der Schweiz unmittelbar anwendbar.97 Der Gemischte Ausschuss hat die Kompetenz, den Wortlaut einzelner Bestimmungen so anzupassen, dass deren Anwendbarkeit für die Schweiz sichergestellt werden kann. Davon hat er z.B. mit Bezug auf Art. 132 Abs. 1 EASA-Grundverordnung Gebrauch gemacht: Der dortige Verweis auf die DSGVO ist unter LVA CH–EU «als Bezugnahme auf die einschlägigen nationalen Rechtsvorschriften zu verstehen».98 Aufgrund der bereits erfolgten sowie der geplanten Übernahme des euro­ päischen Rechtsrahmens zu Drohnen rechtfertigt es sich, in der vorliegenden Untersuchung darauf abzustellen. § 2 Begriffe I. Drohne Der Begriff der Drohne ist für das Verständnis der Arbeit zentral.99 Dabei haben die allermeisten Menschen eine relativ klare Vorstellung davon, was darunter zu verstehen ist.100 In der Gesellschaft und in den Medien101 ist er 94 Vgl. zur Veröffentlichungspflicht EDA, S. 8. 95 Beschluss Nr. 1/2019, AS 2019 S. 2979 ff.; vgl. auch ABl. 2019 L 226/1 vom 30. August 2019. 96 So BAZL, Übernahme. Der entsprechende Beschluss des Gemischten Ausschusses war im ersten Quartal 2020 geplant. Wann dieser nun erfolgen wird, ist noch nicht bekannt. 97 Zur «alten» EASA-Grundverordnung BAZL, Verhältnis, S. 6; EDA, S. 5; vgl. BSK BVKern, Art. 87 N 26; Giemulla, S. 197. 98 Beschluss Nr. 1/2019, AS 2019 S. 2985; vgl. auch ABl. 2019 L 226/1 vom 30. August 2019, S. 5. 99 Zum Ursprung des Begriffs vgl. Laumanns, S. 4; Kornmeier, S. 11; Bartsch/Coyne/ Gray, S. 25. Zur Geschichte der Drohnenfliegerei vgl. Dalamagkidis, History, S. 58 ff.; Peterson, S. 535 ff. 100 Vgl. dazu z.B. die Untersuchung zur gesellschaftlichen Akzeptanz von Drohnen von Klauser/Pedrozo, passim. 101 Vgl. statt vieler die Artikel von Betschon; Haller U. sowie kritisch Hesse. Vgl. auch Stumvoll, S. 5. 16 Teil 1: Rechtliche, begriffliche und technische Grundlag denn auch bereits weit verbreitet. Ein Hinweis auf die Verbreitung des Begriffs findet sich auch in einem Urteil des Bundesgerichts aus dem Jahr 2011. Es hatte sich mit dem Vorbringen eines Beschwerdeführers zu befassen, er sei «betroffen gewesen von einer fünfwöchigen Untersuchung seiner Räume mit der Unterstützung von Drohnen».102 Aus rechtswissenschaftlicher Optik sind der Begriff und vor allem seine Definition jedoch nicht klar und einfach.103 Aus diesem Grund soll nachfolgend zunächst eine Annäherung anhand verschiedener (technischer) Bezeichnungen dafür vorgenommen werden (sogleich). Danach wird eine Kate­ gorisierung anhand der aerodynamischen Konstruktionsweise präsentiert (S. 18 ff.). Des Weiteren wird die Drohnen-Definition gemäss den vorerwähnten EU-Rechtsakten und der darin vorgesehenen Einteilung in Risikokategorien vertieft (S. 20 ff.), bevor eine Zusammenfassung und eine Stellungnahme folgen (S. 26). 1. Technische Bezeichnungen Für Drohnen werden in der (technischen) Literatur verschiedene englische Bezeichnungen verwendet.104 Neben Unmanned Aircraft (kurz UA)105 ist auch UAV (Unmanned Aerial Vehicle)106 weit verbreitet.107 Im Deutschen werden diese Begriffe regelmässig mit «unbemanntes Luftfahrzeug» übersetzt.108 Als Luftfahrzeuge gelten gemäss der Definition in Art. 1 Abs. 2 LFG «Fluggeräte, welche sich durch Einwirkungen der Luft, jedoch ohne die Wirkung von Luft gegen den Boden (Luftkissenfahrzeuge), in der Atmosphäre halten können.»109 102 BGer, 6B_251/2011 vom 5. Juli 2011 E. 3. Drohnen wurden auch in weiteren Urteilen bereits erwähnt; vgl. BGer, 1C_444/2017 vom 20. August 2018 E. 3.3; BGer, 8C_437/2016 vom 10. Januar 2017 E. 2.1; BGer, 1A.365/1999 vom 12. April 2002, passim. 103 Vgl. Christen et al., S. 37 ff.; Mendes de Leon/Scott, S. 186 f.; Granshaw, passim; Salter, S. 163 mit FN 1. 104 Neben den hier erläuterten Begriffen werden in der Literatur teilweise noch weitere Bezeichnungen verwendet; eine vollständige Übersicht kann vorliegend nicht präsentiert werden. Weiterführend Christen et al., S. 37 m.w.H. 105 Dalamagkidis, Definitions, S. 44. 106 Mahn-Gauseweg, S. 2; Steiger, Regulierung, S. 171. 107 So z.B. Kornmeier, S. 10 m.w.H. 108 Stumvoll, S. 5; vgl. Kornmeier, S. 10. Ausführlich zur Bedeutung des Begriffs «unbemannt» in diesem Zusammenhang Henseler, Einordnung, S. 119 f. m.w.H. 109 Vgl. dazu und zur Abgrenzung von Flugkörpern McNally, S. 22 f.; Henseler, Einordnung, S. 118 f. § 2 Begriffe 17 Das Akronym UAS steht für Unmanned Aircraft System110 und stellt die umfassendste Bezeichnung dar.111 Durch die Verwendung des Ausdrucks «System» wird hervorgehoben, dass ein unbemanntes Luftfahrzeug notwendigerweise als Gesamtsystem zum Einsatz kommt.112 Dabei werden etwa auch die Bodenkontrollstation, die Kommunikationstechnologie, Start- und Landeelemente, die Ladung (sog. payload) etc. miteinbezogen.113 Auch das Bodenpersonal wird teilweise zum System gezählt.114 Ein UAS kann auch mehrere Bodenkontrollstationen sowie Start- und Landeelemente umfassen.115 Bei Sicherheitsfragen116 ist u.U. nicht nur das Luftfahrzeug an sich, sondern das System insgesamt massgebend.117 Oftmals sind UA, UAV und UAS aber austauschbar.118 Eng verwandt mit UAS ist die Bezeichnung RPAS (Remotely Piloted Aircraft System).119 Sie stellt explizit auf die Fernsteuerung durch einen sich nicht an Bord befindlichen Piloten ab.120 Somit sind autonom fliegende Luftfahrzeuge nicht erfasst, weshalb RPAS eine Teilmenge der UAS darstellen.121 110 Stumvoll, S. 6 f.; Kornmeier, S. 10; Steiger, Regulierung, S. 171; Kutschera, S. 35; vgl. ICAO, S. x. Städele, S. 25, gibt dagegen «Unmanned Aerial System» an. 111 Steiger, Regulierung, S. 171. 112 Städele, S. 25. 113 Steiger, Regulierung, S. 171; Kornmeier, S. 10; Austin, S. 3; vgl. Dalamagkidis, Definitions, S. 45. 114 So z.B. Stumvoll, S. 6. 115 Dalamagkidis, Definitions, S. 45; Kornmeier, S. 10. 116 Im englischen Sprachgebrauch werden in der Luftfahrt zwei «Arten» von Sicherheit unterschieden, namentlich «Safety» und «Security». Erstere beschreibt die betriebliche Sicherheit, Letztere äussere, nicht betriebsbedingte Gefahren. Auf Deutsch werden üblicherweise die Begriffe «Flugsicherheit» bzw. «Luftsicherheit» verwendet (Schwenk/Giemulla, Kap. 11 Rn. 2; vgl. auch EG 59 EASA-Grundverordnung). In der Textstelle oben wird Sicherheit umfassend verstanden. 117 BAZL, Zivile Drohnen, S. 7; Dalamagkidis/Valavanis/Piegl, S. 2. Diesem Ansatz folgen zu Recht auch die europäischen Verordnungen, vgl. dazu ausführlich hinten, S. 21 ff. 118 Dalamagkidis, Definitions, S. 45; vgl. Kornmeier, S. 11. 119 Abeyratne, S. 117; Kutschera, S. 36; Steiger, Regulierung, S. 171; BAZL, Zivile Drohnen, S. 5. 120 «Unbemannte und doch pilotengesteuerte Luftfahrzeuge» (BAZL, Zivile Drohnen, S. 7); vgl. ICAO, Ziff. 3.2. 121 Hilf/Umbach, S. 65; vgl. SESAR, Master Plan, S. 4; anders Steiger, Regulierung, S. 171, der RPAS und UAS als Synonyme bezeichnet. 18 2. Teil 1: Rechtliche, begriffliche und technische Grundlag Kategorisierung anhand der Konstruktionsweise Teilweise sind Begriffe wie Multikopter bzw. Multirotor122 anzutreffen, wenn von Drohnen die Rede ist.123 Bezeichnet wird damit aber lediglich eine Bauart derselben; sie ist anhand der aerodynamischen Konstruktion von anderen Arten abzugrenzen.124 Die am weitesten verbreiteten Konstruktionsweisen sollen nachfolgend dargestellt werden.125 2.1 Drehflügler Multikopter sind wie Helikopter den Drehflüglern (engl. rotorcraft) zuzurechnen.126 Diese verfügen über einen127 oder mehrere Rotoren als Antrieb und zur Stabilisierung.128 Quadrokopter gehören in diese Gruppe, wobei bei der Bezeichnung auf die Anzahl Propeller abgestellt wird.129 Die Hälfte derselben dreht in die jeweils entgegengesetzte Richtung der gegenüberliegenden Rotoren; unterschiedliche Drehzahlen ermöglichen das Manövrieren.130 Bei den auf dem (Schweizer) Markt erhältlichen Drohnenmodellen sind Quadro­kopter die vorherrschende Konfiguration.131 122 Diese beiden Begriffe sind Synonyme (vgl. dazu sogleich, 2.1 Drehflügler). 123 Vgl. Büchi, Buch der Drohnen, S. 12; Kornmeier, S. 11 f.; Steiger, Regulierung, S. 172. 124 Ausführlich zum nachfolgenden Preznuk, S. 17 ff.; Hassanalian/Abdelkefi, S. 101 ff. (je mit zahlreichen Illustrationen). Vgl. auch Kettiger, Abwehr, Rn. 4, der nur zwei Arten unterscheidet, namentlich «Multikopter» und «Tragflächenflieger-Drohnen». Es existieren auch Mischformen der hier dargestellten Konstruktionsarten, vgl. dazu die Hinweise bei Hänsenberger, Diss., S. 17 mit Fn. 112. 125 Vereinzelt werden zusätzliche Kategorien wie z.B. Luftschiffe diskutiert; vgl. dazu die Hinweise bei Henseler, Einordnung, S. 123. 126 Innerhalb der Kategorie der Drehflügler werden Trag- und Hubschrauber unterschieden (vgl. Art. 2 Abs. 1 und Anhang LFV; BGer, 2C_807/2016 vom 17. Juli 2017 E. 5.1). 127 Als Beispiel kann hier der «Monospinner», entwickelt an der ETH Zürich, genannt werden (vgl. dazu Zhang/Mueller/D’Andrea, passim). 128 Brahms/Maslaton, S. 1126; Steiger, Regulierung, S. 172; Vergouw et al., S. 24. 129 Ein Multirotor mit sechs Rotoren ist somit ein Hexakopter, ein solcher mit acht Rotoren ein Oktokopter etc. Vgl. dazu Weber, S. 3 m.w.H. in Fn 9 und ausführlich (aus technischer Optik) Büchi, Quadrocopter, S. 89 ff. 130 Biermann/Wiegold, S. 91 f.; Büchi, Buch der Drohnen, S. 16; Juniper, S. 18; Hänsenberger, Diss., S. 17 f.; Powers/Mellinger/Kumar, S. 310. 131 Preznuk, S. 23; Hodgkinson/Johnston, S. 11; Landrock/Baumgärtel, S. 6; vgl. Steiger, Regulierung, S. 172. Vgl. zu den in der Schweiz verbreiteten Drohnenmodellen hinten, S. 39. § 2 Begriffe 19 2.2 Starrflügler Starrflügler (engl. fixed-wing), wozu insbesondere Flugzeuge zu zählen sind, nutzen ihre Tragflächen zur Generierung von Auftrieb.132 Der Vortrieb wird durch Luftschrauben (Propeller) oder ein Strahltriebwerk erzeugt;133 die Lenkung erfolgt mittels Höhen- und Seitenruder.134 2.3 Schwingflügler Schwingflügler (engl. flapping-wing; Ornithopter) erzeugen — wie beim Flügelschlag von Vögeln oder Insekten — durch Dreh- oder Schlagbewegungen der Tragflächen den erforderlichen Auf- und Vortrieb.135 Aufgrund der Schwierigkeit, eine ausreichende Schlagfrequenz der Flügel zu erreichen, fristet diese Konstruktionsart ein Nischendasein.136 3. Zwischenfazit Die Darstellung der verwendeten Begriffe zeigt auf, dass die Bezeichnung von unbemannten Luftfahrzeugen weder einheitlich noch einfach verständlich ist. Die verbreitete Verwendung des Terms «Drohne» hängt wohl auch mit diesen Schwierigkeiten zusammen.137 Aus sprachlichen Gründen und aufgrund der weiten Verbreitung des Begriffs in der Gesellschaft,138 den Medien und der Literatur139 sollte m.E. primär von «Drohne» die Rede sein.140 In der Bevölkerung wird diese Bezeichnung wohl meist verstanden, 132 Schwenk/Giemulla, Kap. 7 Rn. 18; Dalamagkidis, Definitions, S. 47. Anschaulich zur Funktionsweise Juniper, S. 18. 133 Brahms/Maslaton, S. 1126; vgl. Juniper, S. 18. 134 Vergouw et al., S. 24. 135 Henseler, Einordnung, S. 123; Vergouw et al., S. 25; ausführlich Doman/Oppen­ heimer/Sighthorsson, passim. 136 Austin, S. 69; Jones/Platzer, S. 1359 ff.; Hänsenberger, Diss., S. 18 f. 137 Vgl. Kornmeier, S. 14. 138 Die EASA hielt etwa unlängst fest: «Everybody calls them drones» (EASA, On Air). 139 Sarrión Esteve, S. 105, befürwortet die Verwendung des Begriffs explizit auch in der akademischen Literatur. 140 A.M. Plücken, S. 36 f., der festhält, dass «[der Begriff] keinen eindeutigen Aufschluss darüber [gibt], worauf er sich bezieht (fliegendes Objekt oder System), welche luftrechtliche Einordnung damit einhergeht (aircraft oder nicht) und welche weiteren Eigenschaften das damit bezeichnete Objekt oder System (Grad der Autonomie) aufweist». Vgl. auch Granshaw, S. 168, wonach der Begriff nur verwendet werden sollte, «when conversing with a non-scientific audience»; ähnlich Cassart, Droit des drones, Rn. 12. Vgl. dagegen Hänsenberger, Diss., S. 11 und passim; Schladebach, § 6 N 49 in fine. 20 Teil 1: Rechtliche, begriffliche und technische Grundlag möglicherweise aber einzig mit Multikoptern assoziiert.141 Die Bekanntheit des Terms ist denn auch bei den wenigen Gerichtsverfahren im Zusammenhang mit Drohnen auffallend: Die Richter gehen nicht darauf ein und setzen ein Verständnis desselben voraus.142 Auch dieser Umstand spricht dafür, den Drohnenbegriff im rechtswissenschaftlichen Kontext zu benützen. Eine negative Konnotation desselben, der gegen eine solche Verwendung sprechen würde, konnte in Studien dazu nicht nachgewiesen werden. Die Terminologie «did not impact support for the technology, [but] it did impact familiarity.»143 Ausserdem hatte sie «minimal affect [recte: effect] on public perceptions, which contrasts with widely held industry beliefs and the results from analyses of media articles.»144 Relativierend ist anzumerken, dass die Studien in englischer Sprache in den USA (Pytlik Zillig et al.) bzw. in Australien (Clothier et al.) durchgeführt wurden. 4. Regelung in den Drohnenverordnungen 4.1 Drohnendefinition Gemäss EASA-Grundverordnung ist ein unbemanntes Luftfahrzeug (d.h. eine Drohne) «ein Luftfahrzeug, das ohne einen an Bord befindlichen Pilo­ ten autonom oder ferngesteuert betrieben wird oder dafür konstruiert ist».145 Auch Flugmodelle werden von dieser Definition erfasst,146 wobei sie als Unterkategorie von Drohnen zu qualifizieren sind.147 Dieser Ansatz ist mit der Übernahme der EASA-Grundverordnung auch in der Schweiz verbindlich geworden. Vor Übernahme der EU-Vorschriften wurden im Schweizer Recht Drohnen und Flugmodelle als «Modellluftfahrzeuge» zu- 141 Dies hängt mit der weiten Verbreitung dieses Typs zusammen; vgl. dazu Büchi, Buch der Drohnen, S. 12; Christen et al., S. 38 sowie vorne, S. 18. 142 In der Schweiz KGer LU, 7H 17 49 vom 18. April 2018 sowie die Hinweise in Fn. 102. In Deutschland z.B. VGer Braunschweig, 5 A 192/15 vom 7. September 2016, wo neben «Flugdrohne» auch der Begriff «Quadrocopter» erwähnt wird. Anders noch AGer Potsdam, 37 C 454/13 vom 16. April 2015, Tenor Ziff. 1, wo der Begriff Flugdrohne mit «funkgesteuertem Fluggerät» umschrieben wird. 143 Pytlik Zillig et al., S. 87 und S. 89. Zur (ursprünglich) negativen Konnotation des Drohnenbegriffs aus medien- und kulturwissenschaftlicher Sicht Howley, S. xiii ff. 144 Clothier et al., S. 1180. 145 Art. 3 Ziff. 30 EASA-Grundverordnung; vgl. auch die gleichlautende Definition in Art. 3 Ziff. 1 Delegierte Verordnung. 146 EASA, NPA, S. 9; Christen et al., S. 48; kritisch Schubert, S. 228; Germann, S. 13. 147 Flugmodell (Modellflugzeuge, Modellhelikopter usw.) lassen sich nicht ohne Weiteres von Drohnen abgrenzen. Vgl. dazu auch hinten, S. 25 f. § 2 Begriffe 21 sammengefasst, was in der Lehre kritisiert wurde.148 Die Verwendung des Oberbegriffs der «unbemannten Luftfahrzeuge» anstelle von «Modellluftfahrzeuge» ist deshalb ausdrücklich zu begrüssen. Da das Schweizer Luftfahrtrecht «unbemannte Luftfahrzeuge» bereits kennt, diese aber nicht klar von anderen Luftfahrzeugen abgrenzt, wird die EASA-Grundverordnung dazu führen müssen, die Begrifflichkeiten im Schweizer Recht zu überdenken und klarer zu definieren.149 Des Weiteren findet sich in Art. 2 Ziff. 1 Durchführungsverordnung eine Legaldefinition von «unbemanntes Luftfahrzeugsystem».150 Dabei handelt es sich um «ein unbemanntes Luftfahrzeug sowie die Ausrüstung für dessen Fernsteuerung». Diese Ausrüstung umfasst «alle Instrumente, Ausrüstungen, Mechanismen,151 Geräte, Zubehörteile, Software oder Zusatzteile, die für den sicheren Betrieb eines unbemannten Luftfahrzeugs erforderlich sind und die keine Teile152 sind und nicht an Bord des unbemannten Luftfahrzeugs mitgeführt werden».153 Es soll mithin das «Gesamtsystem» erfasst werden.154 4.2 Die drei Drohnenkategorien Die EASA-Grundverordnung teilt alle Drohnen bzw. Drohnenoperationen in drei risikobasierte Betriebskategorien ein, namentlich in die offene, die spezielle und die zulassungspflichtige Kategorie.155 Die Anforderungen an die Drohne und das zugehörige Gesamtsystem steigen von einer Kategorie zur nächsten anhand des damit verbundenen Risikos an.156 Dabei werden u.a. die kinetische Energie des Luftfahrzeugs,157 dessen Grösse und Ausstattung, die Anzahl an Personen im überflogenen Gebiet sowie die Gestal148 Christen et al., S. 49; Henseler, Einordnung, S. 126; zum deutschen Recht Giemulla, S. 203. 149 Vgl. dazu Art. 51 Abs. 3 LFG, Art. 2a LFV und v.a. Art. 1 und Art. 14 ff. VLK. 150 Vgl. auch die gleichlautende Definition in Art. 3 Ziff. 3 Delegierte Verordnung. 151 Der in der englischen Fassung enthaltene Ausdruck «mechanisms» ist hier wohl unbeholfen übersetzt worden. Es wäre korrekter, von «Vorrichtungen» zu sprechen. 152 In der englischen Sprachfassung der Delegierten Verordnung wird klar, dass hier (Bestand-)Teile der Drohne selber nicht erfasst werden sollen. Die Übersetzung ins Deutsche ist auch hier nicht optimal gelungen. 153 Art. 3 Ziff. 2 Delegierte Verordnung. 154 Vgl. dazu bereits vorne, S. 17. 155 Art. 3 Durchführungsverordnung; vgl. Schubert, S. 224 m.w.H. 156 Vgl. EG 32 EASA-Grundverordnung; EASA, Explanatory Note, S. 3; Palmerini, S. 16; Severoni, responsabilità, S. 75; Voland/Qui, S. 347. 157 Dieses Kriterium wird im Zusammenhang mit der Registrierungspflicht ausführlich diskutiert (hinten, S. 122 ff.). 22 Teil 1: Rechtliche, begriffliche und technische Grundlag tung des Luftraums, die Dichte an weiteren (bemannten und unbemannten) Luftfahrzeugen darin sowie die nutzbaren Flugsicherungsdienste158 betrachtet.159 a Offene Kategorie Die offene Kategorie ist als Grundkategorie160 auf pilotengesteuerte Drohnenmodelle ausgerichtet, von welchen ein geringes Betriebsrisiko ausgeht.161 Es ist keine vorgängige Bewilligung vorausgesetzt; das Risiko wird durch Verhaltensregeln und Betriebsbeschränkungen minimiert. So müssen Drohen dieser Kategorie grundsätzlich mit ununterbrochenem Sichtkontakt gesteuert werden162 und dürfen nicht schwerer als 25 kg sein.163 Die offene Kategorie ist in drei Unter- bzw. Einsatzkategorien (A1 bis A3) eingeteilt,164 wobei dem Umstand entscheidende Bedeutung zukommt, ob und wie nahe eine Drohne an Menschen heranfliegt.165 Je nach Unterkategorie kommen unterschiedliche Voraussetzungen an die technische Ausstattung und die Kenntnisse des Piloten zur Anwendung. Ausserdem sind jeweils andere Betriebsbeschränkungen vorgesehen.166 Für die vorliegende Untersuchung sind primär Drohnen dieser Kategorie von Bedeutung, denn diese kleinen, meist in Serie produzierten Drohnen sind generell in Europa und der Schweiz am weitesten verbreitet.167 Hinzu kommt, dass Private vor allem Drohnen in dieser Kategorie betreiben.168 158 «Flugsicherungsdienst» umfasst als Oberbegriff verschiedene Aufgaben wie das Luftraum-Management oder den Flugverkehrsdienst. In der Schweiz werden diese von Skyguide erfüllt. Vgl. ausführlich dazu hinten, S. 142 ff. 159 Josipovic, S. 439 m.w.H. 160 Vgl. JARUS, Categorization, S. 17 sowie die Ausführungen zur speziellen Kategorie sogleich, Rn. 57. 161 Vgl. Art. 4 Abs. 1 Durchführungsverordnung; Masutti/Tomasello, S. 79; Severoni, responsabilità, S. 75; vgl. JARUS, Categorization, S. 17. 162 Art. 4 Abs. 1 lit. d Durchführungsverordnung. 163 Art. 4 Abs. 1 lit. b Durchführungsverordnung; vgl. EASA, Explanatory Note, S. 10; EASA, Drohnen in Europa, S. 4; Hänsenberger, Diss., S. 216. 164 Art. 4 Abs. 2 und Anhang Teil A Durchführungsverordnung. Vgl. dazu Josipovic, S. 439; Hänsenberger, Diss., S. 219 f. 165 Voland/Qui, S. 347; vgl. EASA, Opinion, S. 21; Josipovic, S. 441; JARUS, Categorization, S. 20. 166 UAS.OPEN.020, UAS.OPEN.030 und UAS.OPEN.0 40 Anhang Teil A Durchführungsverordnung; vgl. Voland/Qui, S. 344; JARUS, Categorization, S. 20. 167 Vgl. Josipovic, S. 439; de Miguel Molina/Segarra Oña, S. 12 f. mit Tabelle 2. 168 Vgl. ausführlich dazu hinten, S. 39. § 2 Begriffe b 23 Spezielle Kategorie Die spezielle Kategorie169 baut gemäss Art. 5 Abs. 1 Durchführungsverordnung auf den Vorschriften der offenen Kategorie auf. Die dort geltenden Anforderungen sind grundsätzlich anwendbar. Werden diese nicht erfüllt, so ist eine Betriebsgenehmigung nötig.170 Das Verfahren basiert auf einer vom Betreiber171 der Drohne durchgeführten Risikobewertung,172 welche der zuständigen Behörde — zusammen mit dem Gesuch — einzureichen ist.173 Diese entscheidet über die Genehmigung und ob diese «für einen in Bezug auf Zeit, Ort oder beides einmaligen oder mehrmaligen Betrieb gilt».174 Vereinfachungen und Ausnahmen zur Genehmigungspflicht sind vorgesehen, wenn der Drohnenbetrieb innerhalb eines Standardszenarios erfolgt175 oder der Betreiber eine freiwillige Zertifizierung176 erhalten hat. Der Betrieb von autonomen Drohnen fällt grundsätzlich in die spezielle Kategorie.177 c Zulassungspflichtige Kategorie In die Kategorie «zulassungspflichtig»178 fallen diejenigen Drohnenopera­­tio­ nen, von denen ein grosses Risiko ausgeht,179 z.B. weil Menschen befördert 169 In der englischen Fassung der Durchführungsverordnung wird diese Kategorie als «specific» bezeichnet. Aus diesem Grund ist auch in der deutschsprachigen Literatur teilweise von der «spezifischen Kategorie» die Rede, so z.B. bei Hänsenberger, Diss., S. 220 ff. und passim. 170 Gemäss Art. 12 Durchführungsverordnung ist die Betriebsgenehmigung bei der zuständigen Behörde einzuholen. In der Schweiz handelt es sich dabei um das BAZL (vgl. Hänsenberger, Diss., S. 221). 171 Vgl. zum Begriff hinten, S. 27 f. 172 Masutti/Tomasello, S. 79; vgl. Hänsenberger, Diss., S. 221. Ausführlich zu Inhalt und Methodik der Risikobewertung Josipovic, S. 441 f. 173 Art. 5 Abs. 2 Durchführungsverordnung verlangt zudem, dass der Antrag «geeignete Massnahmen zur Risikominderung» darlegt. 174 Art. 5 Abs. 4 lit. a Durchführungsverordnung; vgl. Krumm, Anpassungsbedarf, S. 117. 175 Vgl. Art. 5 Abs. 5 Durchführungsverordnung; Voland/Qui, S. 348. Standardszenarien enthalten Voraussetzungen und damit verbundene Anforderungen für bestimmte Betriebsarten (Josipovic, S. 438). 176 Das sog. «Betreiberzeugnis für Leicht-UAS» (Art. 2 Ziff. 9 Durchführungsverordnung) erlaubt es dem Betreiber, eigene Drohneneinsätze zu genehmigen (vgl. dazu und zu den einzelnen Voraussetzungen Josipovic, S. 438; Voland/Qui, S. 348). 177 Vgl. UAS.SPEC.050 Abs. 1 lit. b Anhang Teil A Durchführungsverordnung; JARUS, Categorization, S. 24; Hänsenberger, Diss., S. 221. 178 In der englischen Fassung der Durchführungsverordnung wird diese Kategorie als «certified» bezeichnet. Aus diesem Grund ist auch in der deutschsprachigen Literatur teilweise von der «zertifizierten Kategorie» die Rede, so z.B. bei Hänsenberger, Diss., S. 223 ff. und Krumm, Anpassungsbedarf, S. 117. 179 Masutti/Tomasello, S. 79; JARUS, Categorization, S. 17. 24 Teil 1: Rechtliche, begriffliche und technische Grundlag oder gefährliche Güter transportiert werden.180 Das Zulassungsverfahren und die zu erfüllenden Anforderungen entsprechen deshalb grundsätzlich denjenigen, die auf die bemannte Luftfahrt zur Anwendung kommen.181 4.3 Produkteklassen innerhalb der offenen Kategorie Innerhalb der offenen Kategorie werden fünf Produkteklassen unterschieden, namentlich die Klassen C0 bis C4.182 Die Produkteklassen widerspiegeln das von der Drohne ausgehende Risiko anhand der jeweiligen Produkteeigenschaften.183 Von Drohnen der Klasse C0 geht das geringste und von solchen der Klassen C3 und C4 das höchste Risiko aus.184 Die Einteilung bezweckt die rasche und unkomplizierte Erkennbarkeit der auf die jeweilige Drohne anwendbaren Vorschriften.185 Ein entsprechendes Klassen-Identifizierungskennzeichen ist aus diesem Grund auf der Drohne anzubringen.186 Die folgende tabellarische Übersicht fasst die für die vorliegende Untersuchung zentralen Elemente zusammen: 180 Vgl. Art. 6 Abs. 1 lit. b Ziff. ii und iii Durchführungsverordnung; Art. 40 Delegierte Verordnung; EASA, GM Implementing Regulation, S. 8. 181 Krumm, Anpassungsbedarf, S. 117; Masutti/Tomasello, S. 79 f.; Palmerini, S. 16; Severoni, responsabilità, S. 75; Voland/Qui, S. 348; JARUS, Categorization, S. 17 und S. 43. Vgl. zu einzelnen Aspekten des Zulassungsverfahrens Huttunen, U-space, S. 72 ff. 182 Vgl. Anhang Delegierte Verordnung (Teil 1 bis 5). 183 Vgl. dazu die Tabelle auf S. 25. 184 Eine detaillierte Darstellung der Anforderungen und Vorschriften für die verschiedenen Produkteklassen würden den Rahmen der vorliegenden Untersuchung sprengen. Vgl. dazu Teile 1 bis 5 Anhang Delegierte Verordnung. 185 Krumm, Anpassungsbedarf, S. 118. 186 Anhang Delegierte Verordnung (Teile 1 bis 5); vgl. zu dieser Kennzeichnung auch hinten, S. 135. 25 § 2 Begriffe Klasse Startmasse187 Ausgewählte technische Anforderungen C0188 < 250 g — Höchstgeschwindigkeit < 19 m/s (68,4 km/h) — max. Flughöhe über Grund: 120 m C1 < 80 Joule oder — Höchstgeschwindigkeit < 19 m/s (68,4 km/h) < 900 g — max. Flughöhe über Grund: 120 m — Lichter189 — direkte Fernidentifizierung190 C2 < 4 kg — max. Flughöhe über Grund: 120 m — Lichter — direkte Fernidentifizierung C3 < 25 kg — max. Flughöhe über Grund: 120 m — Lichter — direkte Fernidentifizierung [C4 < 25 kg — max. Flughöhe über Grund: 120 m] Tabelle: Übersicht ausgewählter Produkteeigenschaften nach Drohnenklasse191 Die Produkteklasse C4 ist hier einzig der Vollständigkeit halber aufgeführt. Sie ist gemäss EASA explizit für unbemannte Luftfahrzeuge vorgesehen, die hauptsächlich für Freizeitzwecke verwendet werden. Es sollen demnach primär Flugmodelle erfasst werden.192 Für diese bestehen weniger strenge technische Anforderungen als für die anderen Produkteklassen; jedoch dürfen 187 Die «höchstzulässige Startmasse» (engl. maximum take-off mass [MTOM]) ist «die vom Hersteller oder Erbauer festgelegte höchstzulässige Masse des unbemannten Luftfahrzeugs, einschliesslich Nutzlast und Kraftstoff, mit der bzw. dem das unbemannte Luftfahrzeug betrieben werden kann» (Art. 2 Ziff. 22 Durchführungsverordnung; vgl. die Konkretisierungen in EASA, GM Implementing Regulation, S. 7). Nachfolgend soll vereinfachend der Begriff «Startmasse» verwendet werden, wenn die «höchstzulässige Startmasse» gemeint ist. 188 Vgl. zu den Anforderungen je Klasse im Einzelnen Teile 1 bis 5 Anhang Delegierte Verordnung. Auf Verweise im Einzelnen soll — im Sinne der Übersichtlichkeit der Tabelle — verzichtet werden. 189 Vgl. dazu ausführlich hinten, S. 153 ff. 190 Vgl. dazu ausführlich hinten, S. 138 ff. 191 Eigene Darstellung nach EASA, Opinion, S. 21. 192 EASA, Opinion, S. 14. Vgl. zu diesem Kriterium auch BAZL, Zivile Drohnen, S. 9. Kritisch zur «etwas schematisch[en]» Abgrenzung nach Verwendungszweck Schladebach, § 6 N 48; ähnlich Henseler, Einordnung, S. 127 f. Die subjektiven Nutzungs­ absichten verändern das eingesetzte Luftfahrzeug technisch nicht. 26 Teil 1: Rechtliche, begriffliche und technische Grundlag sie über «keine automatischen Steuerungsmodi» verfügen.193 Selbst wenn unbemannte Luftfahrzeuge der Klasse C4 Daten bearbeiten können,194 so stellen sie aus datenschutzrechtlicher Optik ein geringes Risiko dar. Aufgrund der komplexeren Steuerung derselben wird sich der Pilot primär darauf konzentrieren müssen.195 Diese Produkteklasse soll deshalb nachfolgend nicht weiter thematisiert werden. 5. Zusammenfassung und Stellungnahme Für die hier interessierenden Fragestellungen ist von untergeordneter Bedeutung, ob eine klare Abgrenzung zwischen Flugmodellen und Drohnen möglich ist bzw. eine eindeutige Definition dieser beiden Luftfahrzeuge formuliert werden kann. Aus datenschutzrechtlicher Sicht spielt es keine Rolle, ob Daten mit einer Drohne oder einem Flugmodell bearbeitet werden.196 Mit Blick auf die direkte Anwendbarkeit der Definitionen der EASA-­ Grundverordnung, der Durchführungsverordnung und der Delegierten Verordnung197 wäre eine Verwendung des Begriffs «Drohne» in der Schweizer Gesetzgebung aus Gründen der Rechtssicherheit problembehaftet. Trotzdem soll dieser Bezeichnung für die vorliegende Untersuchung der Vorzug gegeben werden. Dafür spricht deren Bekanntheit und Beliebtheit198 sowie die Komplexität der technischen Begrifflichkeiten.199 Inhaltlich ist damit jeweils ein «unbemanntes Luftfahrzeug» bzw. ein «unbemanntes Luftfahrzeugsystem» gemäss den vorne zitierten Definitionen gemeint.200 In Übereinstimmung mit dem Fokus der Untersuchung werden primär Drohnen der offenen Kategorie behandelt.201 Sollen auch die spezielle und/oder die zulassungspflichtige Kategorie erfasst werden, so wird dies im Text explizit erwähnt. 193 Teil 5 Ziff. 3 Anhang Delegierte Verordnung (engl. no automatic control modes). Vgl. zu diesem Abgrenzungskriterium auch Hänsenberger, Diss., S. 76 m.w.H.; EASA, NPA, S. 9. 194 Vgl. in diesem Kontext BAZL, Zivile Drohnen, S. 9. 195 Allgemein zur Steuerung von Drohnen Büchi, Buch der Drohnen, S. 85 ff.; Hänsenberger, Diss., S. 31 ff. 196 Mutatis mutandis aus haftungsrechtlicher Optik Hänsenberger, Diss., S. 76. Vgl. zu diesem Argument auch die Ausführungen zur Registrierungspflicht hinten, S. 120 ff., v.a. S. 124 f. 197 Vgl. zur direkten Anwendbarkeit vorne, S. 14 f. 198 Vgl. vorne, S. 19 f.; für die USA Perritt/Sprague, STLR, S. 386 mit Fn. 1. 199 Vgl. vorne, S. 16 f. 200 Vgl. vorne, S. 20 f. 201 Vgl. dazu vorne, S. 22. § 2 Begriffe 27 II. Drohnenpilot und Drohnenbetreiber 1. Pilot, Fernpilot, Drohnenpilot Ein Pilot ist, nach allgemeinem Verständnis, diejenige Person, welche die Flugsteuerung eines Luftfahrzeugs bedient.202 Im Rahmen der EASA-Grundverordnung wird für den Piloten einer Drohne der Begriff des «Fernpiloten» eingeführt und wie folgt definiert: «‹Fernpilot› bezeichnet eine natürliche Person, die für die sichere Durchführung des Fluges eines unbemannten Luftfahrzeugs verantwortlich ist, wobei der Fernpilot entweder die Flugsteue­rung manuell vornimmt oder, wenn das unbemannte Luftfahrzeug automatisch fliegt,203 dessen Kurs überwacht und in der Lage bleibt, jederzeit einzugreifen und den Kurs zu ändern.»204 Für die vorliegende Untersuchung werden Pilot und Drohnenpilot synonym verwendet, wenn der «Fernpilot» gemäss zitierter Definition gemeint ist. Dies dient sowohl der Klarheit wie der Einfachheit des Textes. Ist der Pilot eines bemannten Luftfahrzeugs gemeint, so wird dies im Text explizit erwähnt. 2. Betreiber und Halter Neben dem Piloten kennt die Durchführungsverordnung den «Betreiber eines unbemannten Luftfahrzeugsystems» (auch «UAS-Betreiber»). Dabei handelt es sich «um eine juristische oder natürliche Person, die ein oder mehrere UAS betreibt oder zu betreiben [beabsichtigt]».205 Mit der Definition wird zum Ausdruck gebracht, dass sich für Betreiber bereits vor dem eigentlichen Betrieb einer Drohne Pflichten ergeben.206 Im Folgenden sollen jeweils «Betreiber» bzw. «Drohnenbetreiber» verwendet werden, wenn der «Betreiber eines unbemannten Luftfahrzeugsystems» gemeint ist. 202 Vgl. z.B. ICAO, S. ix f. (Definitionen «Flying pilot» und «pilot [to]»). Das können auch mehrere Personen gleichzeitig sein, weshalb die ICAO zusätzlich den Begriff des «Pilot-­in-command» kennt (vgl. ebd., S. x); vgl. dazu auch Groh, S. 162. Klar zu eng ist die Definition des Duden online, wonach ein Pilot jemand ist, «der (berufsmässig) ein Flugzeug steuert»; sie klammert alle anderen pilotengesteuerten Luftfahrzeuge aus. 203 Vgl. zur Automation und deren Abgrenzung zur Autonomie die Hinweise vorne, Fn. 12. 204 Art. 3 Ziff. 31 EASA-Grundverordnung. Vgl. zur nicht immer einfachen Abgrenzung zwischen der manuellen Flugsteuerung und dem automatischen (bzw. autonomen) Flug Huttunen, Unmanned, S. 361 f. 205 Art. 2 Ziff. 2 Durchführungsverordnung; in der deutschen Fassung ist von «zu betreiben gedenkt» die Rede; «zu betreiben beabsichtigen» ist jedoch die passendere Übersetzung des englischen «intending to operate». Vgl. auch Art. 3 Ziff. 13 EASA-Grundverordnung (Definition des «Luftfahrzeugbetreibers»). 206 So etwa die Registrierungs- und Kennzeichnungspflicht; vgl. dazu ausführlich hinten, S. 120 ff. bzw. S. 138 ff. 28 Teil 1: Rechtliche, begriffliche und technische Grundlag Da der Fokus der Untersuchung auf der drohnengestützten Datenbearbeitung durch (nicht kommerziell operierende) Private liegt, besteht regelmässig Personalunion zwischen dem Piloten und dem Betreiber der betreffenden Drohne.207 Von diesem Verständnis soll nachfolgend ausgegangen werden: Ist vom Drohnenbetreiber bzw. vom Betreiber die Rede, so ist der Drohnenpilot (im Sinne der vorangehenden Ausführungen) miterfasst bzw. dieselbe Person gemeint; andernfalls wird dies explizit erwähnt. Zum Begriff des Betreibers drängen sich aus Sicht des Schweizer Rechts einige Hinweise auf. Dieser wird hierzulande primär im Infrastrukturrecht verwendet.208 Im Luftfahrtrecht (und im Schweizer Verkehrsrecht ins­ge­ samt) ist dagegen der Terminus des Halters (Luftfahrzeughalter, Motor­ fahrzeug­halter etc.) verbreitet. Eine Legaldefinition des Luftfahrzeughalters existiert nicht; gemäss Bundesgericht beurteilt sich die Haltereigenschaft nach den gleichen Kriterien wie bei Motorfahrzeugen.209 Demnach ist Halter «derjenige, auf dessen eigene Rechnung und Gefahr der Betrieb des [Luft-] Fahrzeugs erfolgt und der zugleich über dieses und allenfalls über die zum Betrieb erforderlichen Personen die tatsächliche, unmittelbare Verfügung besitzt».210 Die Betreiberdefinition gemäss Durchführungsverordnung enthält das Element der tatsächlichen und unmittelbaren Verfügungsgewalt nicht; der Halter ist folglich nicht notwendigerweise mit dem Betreiber identisch.211 Sind der Drohnenpilot und der Drohnenbetreiber die gleiche Person, so ist für diese auch die Haltereigenschaft zu bejahen. Somit erübrigen sich für den Zweck der vorliegenden Untersuchung weitere Ausführungen dazu. Ins­ gesamt soll der Terminologie der Drohnenverordnungen gefolgt werden, selbst wenn diese — wie aufgezeigt — im Schweizer Luftfahrtrecht (bisher) nicht verwendet wird. 207 Vgl. JARUS, Operations, S. 28. 208 Vgl. etwa Art. 2 lit. a und Art. 40d Eisenbahngesetz (EBG); Art. 16, Art. 19 Abs. 5 Energiegesetz (EnG); Art. 2 Abs. 4 Rohrleitungsgesetz (RLG); BGE 126 III 113 (Skilift); BGE 143 I 395 (Photovoltaikanlage). 209 Ausführlich dazu Komm. SVG-Weissenberger, Art. 58 N 3 ff. mit zahlreichen Hinweisen. 210 BGE 129 III 102 E. 2.1 m.w.H.; 129 III 410 E. 4; Dettling-Ott, Luftfahrzeughalter, Rn. 223; Meili K., S. 59. 211 So aber — jedoch vor Inkrafttreten der Durchführungsverordnung — Dettling-Ott, Luftfahrzeughalter, Rn. 223 und ihr folgend Meili K., S. 59. § 2 Begriffe 29 III. Daten 1. Personendaten im Allgemeinen Grundsätzlich können alle Angaben, d.h. jegliche Art von Information oder Aussage,212 wie z.B. Details, Einzelheiten, Fakten, Grössen, Masse, Messwerte oder Zahlen als Daten gelten.213 Im Rahmen des Datenschutzrechts ist der Begriff der Daten jedoch enger zu verstehen: umfasst werden nämlich einzig Personendaten.214 Um Sachdaten — verstanden als alle anderen Daten — kümmert sich der Datenschutz nicht.215 Art. 13 Abs. 2 BV spricht denn auch von «persönlichen Daten». Dabei handelt es sich um Angaben, die einen hinreichend engen Bezug zu einer natürlichen oder juristischen Person aufweisen.216 Art. 4 lit. a E-DSG definiert Personendaten — und Daten217 — als alle An­ gaben, die sich auf eine bestimmte oder bestimmbare natürliche Person beziehen.218 Bestimmt ist eine Person, wenn sich ohne Weiteres aus der Angabe selbst ergibt, dass es sich um eine ganz konkrete Person handelt.219 Als Beispiel können hier die Angaben auf einem Personalausweis angeführt werden.220 Bestimmbar ist eine Person, «wenn sie direkt oder indirekt identifiziert werden kann, z.B. über den Hinweis auf Informationen, die sich aus den Umständen oder dem Kontext ableiten lassen (Identifikationsnummer, Standortdaten, spezifische Aspekte, die ihre physische, physiologische, genetische, psychische, wirtschaftliche, kulturelle oder gesellschaftliche Identität betreffen). Die Identifizierung kann über eine einzige Information möglich sein (Telefonnummer, Hausnummer, AHV-Nummer, Finger­­­ab­ 212 BSK DSG-Blechta, Art. 3 N 6; Handkomm. DSG-Rosenthal, Art. 3 N 8. Ausführlich zum Informationsbegriff Karg, in: Simitis et al., Art. 4 Nr. 1 DSGVO N 25 ff. 213 Belser, in: Belser/Epiney/Waldmann, § 1 Rn. 46. Für eine technische Definition des Datenbegriffs und eine Abgrenzung desselben von «Information» vgl. Albers, S. 89; Weber/Laux/Oertly, S. 11. 214 Vgl. Biaggini, Komm. BV, Art. 13 N 12; BSK BV-Diggelmann, Art. 13 N 33. 215 Bull, Datenschutz, S. 15; Schmid/Schmidt/Zech, S. 628; vgl. Sasse, S. 45. 216 Biaggini, Komm. BV, Art. 13 N 12; vgl. Müller/Schefer, S. 167; BSK BV-Diggelmann, Art. 13 N 33; Auer/Malinverni/Hottelier, Rn. 388; BSK DSG-Blechta, Art. 3 N 7. 217 Im datenschutzrechtlichen Kontext werden die Termini Daten und Personendaten als Synonyme verwendet (vgl. dazu Art. 3 lit. a DSG sowie Botschaft Totalrevision DSG, S. 7019). 218 Juristische Personen sind vom E-DSG nicht mehr erfasst. Vgl. zur Begründung Botschaft Totalrevision DSG, S. 6972 und S. 7019; kritisch Amtl. Bull. NR 2019 S. 1775 f. (Votum Rutz) und S. 1783 f. (Votum Rutz). 219 Botschaft DSG 1988, S. 444; BSK DSG-Blechta, Art. 3 N 9. 220 So BGE 138 II 346 E. 6.1. 30 Teil 1: Rechtliche, begriffliche und technische Grundlag drücke) oder über den Abgleich verschiedener Informationen (Adresse, Geburtsdatum, Zivilstand).»221 Für die Bestimmbarkeit reicht gemäss bundesgerichtlicher Rechtsprechung jedoch nicht jede theoretische Möglichkeit der Identifizierung.222 In einem vielbeachteten Grundsatzurteil führte das Bundesgericht diesbezüglich aus: «Ist der Aufwand derart gross, dass nach der allgemeinen Lebens­ erfahrung nicht damit gerechnet werden muss, dass ein Interessent diesen auf sich nehmen wird, liegt keine Bestimmbarkeit vor. Die Frage ist abhängig vom konkreten Fall zu beantworten, wobei insbesondere auch die Möglichkeiten der Technik mit zu berücksichtigen sind, so z.B. die im Internet verfügbaren Suchwerkzeuge. Von Bedeutung ist indessen nicht nur, welcher Aufwand objektiv erforderlich ist, um eine bestimmte Information einer Person zuordnen zu können, sondern auch, welches Interesse der Daten­ bearbeiter oder ein Dritter an der Identifizierung hat.»223 Die Angaben müssen sich zudem nach dem Wortlaut der Legaldefinition auf eine Person beziehen. Vorausgesetzt ist demnach, dass eine Angabe in Verbindung mit einer Person steht und — im weitesten Sinn — «eine Aussage zur Person trifft».224 Thematisch sind die Angaben nicht eingeschränkt; sämtliche Angaben, die sich auf eine Person beziehen, sind umfasst.225 Der Begriff des Personendatums ist folglich sehr weit gefasst; unabhängig davon, ob er im Verfassungs- oder Gesetzeskontext Verwendung findet.226 Insgesamt kann festgehalten werden, dass er mit Blick auf natürliche Per­ sonen227 im verfassungsrechtlichen Sinn mit der einfachgesetzlichen Legal­ definition desselben gemäss DSG bzw. E-DSG deckungsgleich ist.228 221 Botschaft Totalrevision DSG, S. 7019; vgl. auch Botschaft DSG 1988, S. 444; BGE 136 II 508 E. 3.2; BSK DSG-Blechta, Art. 3 N 7; Aebi-Müller, Rn. 547; Flückiger, vidéosurveillance, S. 197. Aus rechtsvergleichender Perspektive ausführlich Bygrave, S. 133 ff. 222 Zur Frage, aus wessen Perspektive die Bestimmbarkeit zu beurteilen ist, BGE 136 II 508 E. 3.4; Handkomm. DSG-Rosenthal, Art. 3 N 20; Gerschwiler, Rn. 3.30. 223 BGE 138 II 346 E. 6.1 (Google Street View); vgl. auch BGE 136 II 508 E. 3.2. 224 Karg, in: Simitis et al., Art. 4 Nr. 1 DSGVO N 27 (Hervorhebung im Original); Handkomm. DSG-Rosenthal, Art. 3 N 13. 225 Vgl. BSK DSG-Blechta, Art. 3 N 6 f.; Karg, in: Simitis et al., Art. 4 Nr. 1 DSGVO N 27; detailliert zu diesem Aspekt Handkomm. DSG-Rosenthal, Art. 3 N 14. 226 Bieri, Rn. 626; Blonski, S. 52; BSK DSG-Blechta, Art. 3 N 7 («ausserordentlich weit»). Vgl. auch Bygrave, S. 135; Lee Y., S. 190 mit zahlreichen Hinweisen in Fn. 844. 227 Vgl. vorne, S. 29, sowie hinten, S. 63. 228 Bieri, Rn. 626; SGK BV-Schweizer, Art. 13 N 75; vgl. BVGE 2013/50 E. 9.2; Dubey, Vol. II, Rn. 1850; Belser, in: Belser/Epiney/Waldmann, § 1 Rn. 47; Blonski, S. 52; Moeckli, Rn. 38; Schweizer/Rechsteiner, Rn. 2.6. Ebenso Karg, in: Simitis et al., Art. 4 Nr. 1 DSGVO N 1 m.w.H. zu Art. 4 Ziff. 1 DSGVO und Art. 7 und 8 GrCH sowie Art. 2 Abs. 1 i.V.m. Art. 1 Abs. 1 GG; Kornmeier, S. 116; vgl. Kokott/Sobotta, S. 223. § 2 Begriffe 31 Auch der EGMR hat im Rahmen des Rechts auf Achtung des Privatlebens gemäss Art. 8 EMRK entschieden, dass der Begriff «Personendaten» alle Informationen umfasse, die sich auf eine bestimmte oder bestimmbare Person beziehen.229 2. Besonders schützenswerte Personendaten 2.1 Erfasste Kategorien Einen erhöhten Schutz lässt auch das Datenschutzgesetz einer bestimmten Kategorie von Personendaten zukommen, namentlich den sog. besonders schützenswerten Personendaten.230 Als solche gelten gemäss Art. 4 lit. c E-DSG Daten über religiöse, weltanschauliche oder politische Ansichten oder Tätigkeiten, über die Gesundheit, die Intimsphäre, die Rassenzugehörigkeit, aber auch genetische und biometrische Daten231 und solche über verwaltungs- und strafrechtliche Verfolgungen oder Sanktionen sowie über Massnahmen der sozialen Hilfe.232 2.2 Biometrische Daten insbesondere Die biometrischen Daten sollen kurz vertieft werden. Unter Biometrie wird die automatisierte Analyse und Erkennung von Menschen anhand ihrer körperlichen Merkmale, z.B. die Fingerbild-, Hand-, Stimm-, Iris-, Retina- oder auch die Gesichtserkennung verstanden.233 Besonders schützenswert sind biometrische Daten, wenn sie «eine natürliche Person eindeutig identifi­ zieren» (Art. 4 lit. c Ziff. 4 E-DSG).234 229 EGMR, Amann c. Schweiz, Nr. 27798/95 (2000) Ziff. 65; EGMR (GK), Rotaru c. Rumänien, Nr. 28341/95 (2000) Ziff. 43; Kokott/Sobotta, S. 223 und 225. Ähnlich auch EuGH, Rs. C-92/09 und C-93/09 vom 9. November 2010, Schecke und Eifert, Ziff. 52. 230 Vgl. statt aller BSK DSG-Blechta, Art. 3 N 27; Handkomm. DSG-Rosenthal, Art. 3 N 42. 231 Genetische und biometrische Daten sind nur dann besonders schützenswert, wenn sie eine «natürliche Person eindeutig identifizieren». So soll z.B. die Forschung nicht allzu stark eingeschränkt werden (vgl. Botschaft Totalrevision DSG, S. 7020; Amtl. Bull. NR 2019 S. 1784 [Votum Romano]) 232 Eine Vertiefung aller in Art. 4 lit. c aufgelisteten Kategorien kann die vorliegende Arbeit nicht leisten. Vgl. dazu im Einzelnen SHK DSG-Rudin, Art. 3 N 25 ff.; BSK DSGBlechta, Art. 3 N 32 ff. 233 Petri, in: Simitis et al., Art. 4 Nr. 14 DSGVO N 1; Kampert, in: Sydow, Art. 4 DSGVO N 183; Ernst, in: Paal/Pauly, Art. 4 DSGVO N 99; Müller L., Sicherheit & Recht 2/2012, S. 64. Als weitere körperliche Merkmale kommen z.B. der Tastendruck oder Venen­scans in Betracht (Petri, in: Simitis et al., Art. 4 Nr. 14 DSGVO N 10; Matter, S. 14). Detailliert zu weiteren biometrischen Merkmalen Blonski, S. 16 ff. 234 Eindeutig identifiziert ist eine natürliche Person dann, wenn die Bearbeitung die konkrete Zuordnung zu einer bestimmten Person ermöglicht und mithin deren Identi­ fizierung verifiziert (vgl. Petri, in: Simitis et al., Art. 4 Nr. 14 DSGVO N 9; ausführlich Arning/Rothkegel, in: Taeger/Gabel, Art. 4 DSGVO N 323 f.). 32 Teil 1: Rechtliche, begriffliche und technische Grundlag Biometrische Daten sind Personendaten, «die durch ein spezifisches tech­ nisches Verfahren zu den physischen, physiologischen oder verhaltens­ typischen Merkmalen eines Individuums gewonnen werden und die eine eindeutige Identifizierung der betreffenden Person ermöglichen oder bestätigen. Diese Daten müssen zwingend auf einem spezifischen technischen Verfahren beruhen, das die eindeutige Identifizierung oder Authentifizierung einer Person erlaubt.»235 Ein solches «spezifisches technisches Verfahren» liegt bei Fotos nur dann vor, wenn ein Lichtbild einer Person «unmittelbar zum Zwecke der Identifizierung oder Authentifizierung» erstellt wird.236 Somit liegen «bei gewöhnlichen Fotografien» grundsätzlich keine biometrischen Daten vor.237 Ebenso verhält es sich bei Ton- und Bildaufnahmen handelsüblicher Videokameras oder Mikrofone. 2.3 Verfassungsrechtliche Einordnung Art. 13 BV kennt die Kategorie der besonders schützenswerten Personendaten nicht explizit.238 In diesem Zusammenhang spricht das Bundesgericht teilweise von sensiblen Informationen,239 verwendet aber auch (im verfassungsrechtlichen Kontext) den Terminus der besonders schützenswerten Personendaten.240 Unabhängig von der konkreten Bezeichnung im Einzelfall bestehen bei Daten, welche persönlichkeitsnah sind und mit deren Bearbeitung für die betroffene Person ein erhöhtes Risiko verbunden ist, regelmässig strengere verfassungsrechtliche Anforderungen, und zwar bezüglich der Verhältnismässigkeit, des öffentlichen Interesses sowie der gesetzlichen Grundlage.241 So erfordert die Bearbeitung solcher Daten eine Grundlage in einem 235 Botschaft Totalrevision DSG, S. 7020; vgl. Matter, S. 14. In der Legaldefinition von Art. 4 Nr. 14 DSGVO werden ein «spezielles technisches Verfahren» und «die eindeutige Identifizierung» denn auch explizit erwähnt. Vgl. ausführlich dazu Kampert, in: Sydow, Art. 4 DSGVO N 184 f. 236 Petri, in: Simitis et al., Art. 4 Nr. 14 DSGVO N 8; vgl. Weichert, in: Kühling/Buchner, Art. 4 Nr. 14 DSGVO N 3; spezifisch zur Gesichtserkennung Karjoth, S. 7 ff. 237 Botschaft Totalrevision DSG, S. 7020. Vgl. EG 51 DSGVO; Kampert, in: Sydow, Art. 4 DSGVO N 184; Petri, in: Simitis et al., Art. 4 Nr. 14 DSGVO N 8; Ernst, in: Paal/Pauly, Art. 4 DSGVO N 103; van Gyseghem, Rn. 8. 238 Biaggini, Komm. BV, Art. 13 N 12; SGK BV-Schweizer, Art. 13 N 77. 239 Vgl. BGE 145 IV 42 E. 4.2; 138 II 346 E. 8.2; 122 I 360 E. 5d. Vgl. auch SGK BV-Schweizer, der von «sensitiven Personendaten» spricht. 240 Vgl. etwa BGer, 1C_447/2016, 1C_448/2016, 1C_449/2016 vom 31. August 2017 E. 5.3. 241 Biaggini, Art. 13 N 12; Kiener/Kälin/Wyttenbach, § 14 N 56; Belser, in: Belser/ Epiney/Waldmann, § 6 Rn. 91. § 2 Begriffe 33 formellen Gesetz (Art. 36 Abs. 1 BV).242 Gleich wie das Bundesgericht erkennt auch der EGMR sensiblen Daten eine besondere Schutzwürdigkeit zu.243 IV. Datenbearbeitung Der Term Datenbearbeitung umfasst jeden Umgang mit (Personen-)Daten,244 namentlich das Beschaffen, Erheben, Sammeln, Verarbeiten, Speichern, Aufbewahren und Archivieren, Verbreiten sowie das Bekannt-245 und Weitergeben.246 Daneben werden auch das Löschen oder Vernichten von Daten erfasst.247 Dabei ist unerheblich, welche Verfahren zur Anwendung kommen und welche Hilfsmittel oder Methoden eingesetzt werden.248 Auch heute noch nicht bekannte Technologien und Bearbeitungsweisen fallen darunter.249 Insgesamt kann in Bezug auf den Begriff der Bearbeitung konstatiert werden, dass dieser umfassend zu verstehen ist. Im Anwendungsbereich von Art. 13 Abs. 2 BV und des E-DSG kann von demselben Verständnis ausgegangen werden.250 V. Drohnengestützte Datenbearbeitung Es stellt sich folglich die Frage, ob und welche Art von Personendaten beim Einsatz von Drohnen durch Private bearbeitet werden. Dabei werden regelmässig keine hochtechnischen Sensoren zum Einsatz kommen, sondern vorwiegend eine Foto- und/oder Videokamera. Eine Ausstattung mit solcher Technik ist heute serienmässig der Fall.251 242 BGE 143 I 253 E. 6.3; 122 I 360 E. 5b; Blonski, S. 53. 243 Vgl. EGMR, I c. Finnland, Nr. 20511/03 (2008) Ziff. 38 und 40; EGMR, Avilkina u.a. c. Russland, Nr. 1585/09 (2013) Ziff. 45; Grabenwarter/Pabel, § 22 N 45 und N 60; de Vries, S. 673. 244 SGK BV-Schweizer, Art. 13 N 74; Aebi-Müller, Rn. 549; Biaggini, Komm. BV, Art. 13 N 11; vgl. Meier, Rn. 30; Kiener/Kälin/Wyttenbach, § 14 N 57; Griffel, § 31 Rn. 46. 245 Neu wird in Art. 4 lit. e E-DSG auch das Bekanntgeben definiert. Namentlich handelt es sich dabei um das Übermitteln oder Zugänglichmachen von Personendaten. Vgl. dazu auch § 3 Abs. 5 und 6 IDG/ZH. 246 Biaggini, Komm. BV, Art. 13 N 11; SGK BV-Schweizer, Art. 13 N 74; Kiener/Kälin/ Wyttenbach, § 14 N 57; Tschentscher/Lienhard/Sprecher, Rn. 267; Rhinow/ Schefer/Uebersax, Rn. 1378; BGE 137 I 167 E. 3.2; 128 II 259 E. 3.2; 122 I 360 E. 5a. 247 Waldmeier, S. 37; Meier, Rn. 30; Blonski, S. 56; vgl. § 3 Abs. 5 IDG/ZH. 248 Vgl. Art. 4 lit. d E-DSG; SGK BV-Schweizer, Art. 13 N 74; Blonski, S. 56; BSK DSGBlechta, Art. 3 N 71. 249 PK IDG/ZH-Rudin, § 3 N 32. 250 Bieri, Rn. 626; SGK BV-Schweizer, Art. 13 N 74; vgl. BGE 144 I 126 E. 4.1; Kiener/ Kälin/Wyttenbach, § 14 N 57. 251 Dieckert, in: Dieckert/Eich, S. 408. Ausführlich zu den Sensoren hinten, S. 40 ff. 34 Teil 1: Rechtliche, begriffliche und technische Grundlag Gemäss Lehre und Rechtsprechung stellen «Bilddaten in Form einer eine bestimmte Person zeigenden Fotografie» ein Personendatum dar.252 Auch ein Bild eines Grundstücks oder eines Hauses, welches mit einer Drohne auf­ genommen wird, ist regelmässig als Personendatum zu qualifizieren.253 Gleiches gilt grundsätzlich für Bilder von privaten Gärten, Höfen, Balkonen oder Hausfassaden.254 Werden Personen auf einem Privatgrundstück fotografiert oder gefilmt, so ist eine Identifikation derselben meist durch die Anschrift am Briefkasten bzw. an der Türklingel möglich. Bei Bildern von Grundstücken an sich kommen zudem eine Internetsuche oder «allgemeinzugängliche Zusatzinformationen wie z.B. eine elektronische Eigentümerabfrage» in Betracht.255 Mit einer Drohne erstellte Foto- und Videoaufnahmen, welche Personen abbilden, stellen potenziell besonders schützenswerte Personendaten dar,256 da auf einem Bild — je nach Auflösung — z.B. die Rassenzugehörigkeit und/ oder die religiöse Ansicht bzw. die Weltanschauung einer Person erkennbar ist.257 Biometrische Daten dürften bei einer drohnengestützten Datenbearbeitung durch Private dagegen regelmässig nicht vorliegen, da kein spezifisches technisches Verfahren zur Anwendung kommt.258 Die Bearbeitung im Sinne des Datenschutzrechts erfolgt durch die Aufnahme von Fotos und Videos mittels technischer Hilfsmittel. Dies stellt klarer­ weise ein Bearbeiten im Sinne des Datenschutzrechts dar; dass die Technik an der Drohne befestigt bzw. darin verbaut ist, ändert daran nichts.259 Insge252 BGE 127 III 481 E. 3a/bb; vgl. BGE 138 II 346 E. 8; 136 III 401 E. 5.2.1; Botschaft DSG 1988, S. 444; Malgieri, S. 196; Meier, Rn. 30. Zum Recht am eigenen Bild ausführlich Bächli, S. 59 ff. Zum Recht an der eigenen Stimme vgl. BGE 110 II 411 E. 3b; zum Recht am eigenen Wort Glaus, passim, v.a. S. 37 ff. und zur Umsetzung desselben im zivilrecht­ lichen Persönlichkeitsschutz Schweizer M., Rn. 69 ff. Vgl. sodann BSK ZGB I-Meili, Art. 28 N 19 und 22 m.w.H. 253 KGer LU, 7H 17 49 vom 18. April 2018 E. 3.4 f.; Weber/Oertly, Rn. 19; Henseler, Baupolizist, Rn. 32; vgl. BGE 138 II 346 E. 6.1; Arnosti, Rn. 34; BSK BV-Diggelmann, Art. 13 N 33; Moeckli, Rn. 38. 254 BGE 138 II 346 E. 6.3 mit Hinweis auf Müller L., Diss., S. 49. Vgl. KGer LU, 7H 17 49 vom 18. April 2018 E. 3.5; Moeckli, Rn. 38. 255 Vgl. nur KGer LU, 7H 17 49 vom 18. April 2018 E. 3.5 m.w.H. 256 Es ist grundsätzlich möglich, dass auch Tonaufnahmen besonders schützenswerte Personendaten darstellen (etwa die Aufnahme eines Raucherhustenanfalls; vgl. Art. 4 lit. c Ziff. 2 E-DSG). Darauf soll nicht weiter eingegangen werden. 257 Vgl. Malgieri, S. 181 f.; KGer LU, 7H 17 49 vom 18. April 2018 E. 3.5; Flückiger, vidéosurveillance, S. 197. Vgl. Müller L., Sicherheit & Recht 2/2012, S. 66 f. mit zahlreichen Hinweisen. 258 Zum Terminus der biometrischen Daten vorne, S. 31 f. 259 Vgl. KGer LU, 7H 17 49 vom 18. April 2018 E. 3.4. § 3 Einsatzformen von Drohnen in der Schweiz 35 samt kann deshalb konstatiert werden, dass bei Foto- und/oder Videoaufnahmen (inkl. Tonaufnahmen) durch Private, welche mithilfe von Drohnen erstellt werden, eine Bearbeitung von Personendaten (und möglicherweise von besonders schützenswerten Personendaten) im Sinne des E-DSG sowie der BV vorliegt. § 3 Einsatzformen von Drohnen in der Schweiz Die möglichen Anwendungsfelder von Drohnen sind sehr breit.260 Aus diesem Grund ist es schwierig, sich ein umfassendes Bild über die bisherigen und zukünftigen Einsatzformen von Drohnen in der Schweiz zu verschaffen.261 Es ist zudem vorstellbar, dass durch Drohnen in Zukunft Dienstleistungen angeboten werden können, die heute noch gar nicht existieren. Die nachfolgende Darstellung erhebt denn auch keinen Anspruch auf Vollständigkeit. I. Nutzung durch Behörden Während längerer Zeit wurden Drohnen fast ausschliesslich von Behörden ein­gesetzt. Namentlich militärische Drohnen stehen bereits seit den 1990erJahren im Einsatz, oftmals auch zur Unterstützung von zivilen Einsatzkräften.262 So wurden Drohnen des Militärs etwa 1994 bei der Waldbrandbekämpfung eingesetzt.263 Vorwiegend kommen die Drohnen der Luftwaffe aber zu Aufklärungs-, Such- und Überwachungszwecken zum Einsatz: Das Grenzwachtkorps (GWK)264 setzt diese seit 2001 regelmässig bei der Grenzkontrolle ein.265 Namentlich kam das Aufklärungsdrohnensystem 95 (ADS 95 Ranger) zum 260 Vgl. dazu statt vieler SESAR, Outlook Study, S. 8 f.; Roma, S. 22. 261 Eine ausführliche Darstellung dazu mit Fokus auf die Schweiz findet sich bei Christen et al., S. 80 ff., jeweils mit einer Darstellung der aktuellen Lage (2018) sowie einer Zukunftsprognose (2025). 262 Pedrozo/Klauser m.w.H. 263 Steiger, Regulierung, S. 169 mit Hinweis auf Lucien Trueb, Militärische Drohnen für die Waldbrandbekämpfung, NZZ vom 25. Mai 1994, S. 75. 264 Das GWK ist ein uniformierter und bewaffneter Verband (Art. 91 Abs. 2 ZG) innerhalb der Eidgenössischen Zollverwaltung. Vgl. zur Verwendung von Drohnen durch das GWK Kiener/Leuzinger, Rn. 141 mit Fn. 365 sowie BVGer, A-2482/2007 vom 26. Juni 2007. 265 Keller, S. 32; vgl. Gättelin/Müller, S. 44 f.; Steiger, Regulierung, S. 171. Zu den verschiedenen Zwecken des Einsatzes von Drohnen und anderen Luftfahrzeugen durch das GWK vgl. Nussbaum, Rn. 68 ff. 36 Teil 1: Rechtliche, begriffliche und technische Grundlag Einsatz;266 dieses ist u.a. mit Wärmebild- und Infrarotkameras ausgestattet.267 Im November 2019 wurden die Drohnen dieses Typs indes ausgemustert.268 Grössere — auch mediale — Aufmerksamkeit wurde Drohneneinsätzen aber erst anlässlich der Fussball-Europameisterschaft 2008 zuteil.269 Zur Unterstützung der Polizeikräfte während dieses Grossanlasses setzte die Luftwaffe rund um die Stadien der Schweizer Austragungsorte Basel, Bern und Zürich Drohnen ein.270 Seither ist das Interesse an Drohneneinsätzen bei verschiedenen Behörden gewachsen. Polizeikorps aus mehreren Kantonen setzen zunehmend (kleine) Drohnen ein.271 Diese kommen primär für Luftaufnahmen (etwa bei Verkehrsunfällen) oder für die Überwachung aus der Luft zum Zug.272 Daneben haben auch andere Blaulichtorganisationen die neue Technologie für sich entdeckt.273 So besitzt z.B. die Feuerwehr Rapperswil-Jona eigene Drohnen, welche bei Brandfällen oder zur Personensuche eingesetzt werden.274 Seit dem 1. September 2017 darf der Nachrichtendienst des Bundes Vorgänge und Einrichtungen an öffentlichen und allgemein zugänglichen Orten beobachten und in Bild und Ton festhalten. Dazu kann er u.a. «Fluggeräte» einsetzen, womit auch Drohnen erfasst sind.275 Seit kurzer Zeit dürfen sodann im Bereich der Sozialversicherungen Drohnen eingesetzt werden. Dieser Einsatz ist jedoch auf die Standortbestimmung beschränkt und umfasst 266 Keller, S. 32; Pedrozo, S. 101; vgl. Häfliger, S. 14. 267 Pedrozo, S. 101; Botschaft MIG, S. 3271. Vgl. auch Art. 2 Abs. 1 Verordnung über den Einsatz von Bildaufnahme-, Bildaufzeichnungs- und anderen Überwachungsgeräten durch die Eidgenössische Zollverwaltung (SR 631.053). 268 Ab Mitte 2020 sollen dann die neu beschafften Drohnen des Typs Hermes 900 eingesetzt werden. Während der Übergangszeit werden Helikopter die Überwachungsaufgaben übernehmen. Vgl. SRF Online, 16. September 2019, Schweizer Armee fehlen die Drohnen für den Grenzschutz. 269 Vgl. Steiger, Regulierung, S. 171 m.w.H. 270 Vgl. dazu Botschaft EURO 2008, S. 8189 f.; BAZL, Verfügung, S. 4447. 271 Klauser et al., S. 6; Steiger, Regulierung, S. 171; vgl. Klitou, S. 63; Martini, S. 733. Zum Kanton Zürich vgl. BGE 136 I 87 E. 8 sowie § 32b f. PolG/ZH. 272 Vgl. Klauser et al., S. 6; Landrock/Baumgärtel, S. 37. 273 Gemäss Klauser et al., S. 4, waren 11 % der 400 Studienteilnehmer aus öffentlichen Einrichtungen von Feuerwehren und anderen Notfalldiensten (ohne Polizei). Vgl. zum Einsatz von sog. «Defikoptern» in Deutschland Döpke/Jülicher, passim. 274 Stadtverwaltung Rapperswil-Jona, E-Mail vom 25. September 2017 (beim Autor einsehbar). 275 Art. 14 Abs. 1 NDG. Vgl. Steiger, Sicherheitsesoterik, S. 134; Kiener/Leuzinger, Rn. 140; Botschaft NDG, S. 2150. § 3 Einsatzformen von Drohnen in der Schweiz 37 keine drohnengestützte Observation.276 Als weitere behördliche Einsatzfelder sind die Erfüllung von Baupolizeiaufgaben277 oder die Erhebung von Geodaten278 zu nennen. II. Nutzung durch Private 1. Kommerzielle Nutzung Die Breite der möglichen Einsatzgebiete von Drohnen führt dazu, dass vermehrt auch Private auf Drohnen setzen.279 In der Schweiz werden sie momentan — im kommerziellen Bereich — für Luftaufnahmen (Foto und Video), Vermessungen, zur Kontrolle und Instandhaltung von Infrastrukturen (wie Brücken, Hochspannungsleitungen, Gleisen etc.)280 sowie in der Landwirtschaft eingesetzt. Private Sicherheitsfirmen setzen Drohnen sodann für Überwachungszwecke ein,281 und auch für die Forschung werden sie in der Schweiz verwendet.282 Grosse Aufmerksamkeit erlangte das Projekt der Post CH AG (Post), welche vom BAZL eine Ausnahmebewilligung für Drohnenflüge ohne direkten Augenkontakt erhielt.283 Bei diesen Drohnenflügen in Lugano werden Medikamente und Laborproben zwischen zwei Spitälern hin- und hertransportiert.284 Ähnliche Projekte wurden im Juni 2018 in Bern und im Dezember desselben Jahres in Zürich lanciert.285 Die Flüge in Zürich waren jedoch problemanfällig: Nach einem ersten Absturz einer Postdrohne am 25. Januar 276 Art. 43a f. ATSG; vgl. dazu Amtl. Bull. SR 2018 S. 236 (Votum Bischof); Pärli, S. 121; Bolt/Bryner, S. 211; unklar dagegen Amtl. Bull. NR 2018 S. 369 (Votum BR Berset); vgl. sodann BGer, 1C_389/2018, 1C_543/2018, 1C_649/2018 vom 8. August 2019 E. 5.3 und 5.4.2 (zur Publikation vorgesehen). 277 Vgl. dazu KGer LU, 7H 17 49 vom 18. April 2018. Vgl. auch § 203 Abs. 5 Satz 2 PBG/LU, wonach im Rahmen der Baukontrolle «nach Vorankündigung Flugaufnahmen von Grundstücken» erstellt werden dürfen (vgl. kritisch zu dieser Bestimmung Henseler, Baupolizist, Rn. 41 ff.). 278 Reimers, S. 14 ff.; vgl. Kettige r, Geobasisdaten, S. 24. Vgl. die Legaldefinition des Begriffs in Art. 3 Abs. 1 lit. a Geoinformationsgesetz (GeoIG). 279 Vgl. Mendes de Leon/Scott, S. 185 f.; ausführlich zu verschiedensten Anwendungsfeldern auf der ganzen Welt Kornmeier, S. 30 ff. 280 Vgl. Daphinoff/Hassler, Rn. 760 f. 281 Vgl. zu diesen Einsatzgebieten Klauser et al., S. 3 f.; aus europäischer Perspektive SESAR, Master Plan, S. 6 sowie ausführlich SESAR, Outlook Study, S. 52 ff. 282 Vgl. bspw. Schaub/Leuzinger, Rn. 20 mit Fn. 4, zum Drohneneinsatz bei der Erhebung der Stimmbeteiligung an der Glarner Landsgemeinde. 283 Vgl. dazu Art. 17 Abs. 1 und Art. 18 Abs. 1 lit. b VLK. 284 Vgl. Post, Medienmitteilung 4. Oktober 2017. 285 Senn, S. 15; Post, Drohnen. 38 Teil 1: Rechtliche, begriffliche und technische Grundlag 2019 über dem Zürichsee wurden die Flüge während ungefähr elf Wochen unterbrochen.286 Kurz nach der Wiederaufnahme derselben am 15. April 2019 stürzte eine weitere Drohne ab — diesmal über einem Waldstück unweit von dort spielenden Kindern. Die Drohnenflüge wurden daraufhin bis auf Weiteres eingestellt.287 In der Landwirtschaft wurden Drohnen bereits mehrfach zur Rettung von Rehkitzen in Feldern eingesetzt;288 die Jungtiere werden mit einer Wärme­ bildkamera an der Drohne aufgespürt und danach in Sicherheit gebracht.289 In dieser Branche wird die Drohnentechnologie auch zum Ausbringen von Pestiziden und zur Überwachung des Wachstums der Kulturen eingesetzt;290 des Weiteren können Drohnen auch die Bestäubung bestimmter Pflanzen­ arten übernehmen.291 2. Hobbynutzung Auch im Bereich der nicht kommerziellen Nutzung haben sich Drohnen in den letzten Jahren stark ausgebreitet.292 Hobbynutzer293 setzen Drohnen in verschiedensten Bereichen der Freizeitgestaltung ein, so u.a. für Foto- und Videoaufnahmen. Daneben kommen sie auch der Freude am Fliegen willen zum Einsatz294 oder werden für das sog. FPV-Racing eingesetzt (FPV = «First Person View»).295 Dabei werden die Drohnen anhand der Videoaufnahmen gesteuert, welche in Echtzeit auf eine Virtual-Reality-Brille übertragen werden.296 286 Post, Medienmitteilung 29. Januar 2019; Post, Mitteilung 12. April 2019; vgl. zur Ursache des Absturzes SUST, Bericht Zürichsee, v.a. S. 12. 287 Vgl. SRF Online, 9. Mai 2019, Erneut eine Post-Drohne in Zürich abgestürzt. 288 Hodel, S. 23 und S. 44 f. 289 Zur Wärmebildkamera hinten, S. 42. 290 Eines der führenden Unternehmen im Bereich der Agrardrohnen ist die senseFly SA mit Sitz in Lausanne (vgl. www.sensefly.com). 291 Dropcoter, ein Unternehmen mit Sitz in Kalifornien, hat z.B. Mandel- und Kirschbäume mittels Drohnen bestäubt (sUAS News, 4. Juli 2018, Dropcopter releases pollination results). 292 Vgl. dazu die Ausführungen vorne, S. 3 f. Zur zunehmenden Verbreitung von «Spielzeugdrohnen» Schucht, S. 143. 293 Gemäss Schladebach, § 6 N 50, «zumeist erwachsene Männer». 294 Perritt/Sprague, Domesticating Drones, S. 29 m.w.H. 295 Ungefähr «Ich-Perspektive». Vgl. zu diesen «Renndrohnen» Juniper, S. 32 f. 296 Ausführlich dazu Büchi, Buch der Drohnen, S. 60 ff. § 4 Stand der Technik 39 § 4 Stand der Technik I. In der Schweiz verbreitete Hobbydrohnen Wie einleitend ausgeführt, kann (momentan) keine exakte Angabe über die An­zahl in der Schweiz verkauften und/oder geflogenen Drohnen gemacht werden.297 Aus denselben Gründen kann auch keine genaue Angabe zu den in der Schweiz verbreiteten Drohnenmodellen gemacht werden. Anhand von Zahlen der Marktforschung und Studien zur Marktentwicklung lässt sich aber festhalten, dass Hobbydrohnen grundsätzlich dem Typ «Quadrokopter» zuzuordnen sind.298 Diese sind regelmässig unter 25 kg schwer und ferngesteuert.299 Der Marktführer im Segment dieser Hobbydrohnen ist der chinesische Hersteller DJI; seine Modelle «Mavic» und «Phantom» sind nicht nur in der Schweiz sehr beliebt.300 Gemäss einer Studie von Skylogic Research, einer auf Drohnen spe­ zialisierten Forschungseinrichtung, vom September 2018 verfügt DJI im privaten und kommerziellen Sektor gesamthaft über einen Marktanteil von 74 %.301 Die mögliche Flugzeit von Hobbydrohnen ist beschränkt.302 Bei Multikoptern mit einem Gewicht von bis zu 10 kg und einer Ladung von bis zu 1 kg (wenn diese selbst Akku verbraucht, wie z.B. eine Kamera), liegt die Flugzeit im Allgemeinen zwischen 7 und 30 Minuten.303 Kleinere Drohnen (mit bis zu 2 kg Gewicht) können Flugzeiten von lediglich 15 Minuten erreichen.304 Die genaue Flugzeit hängt zudem stark vom jeweils verwendeten Modell ab. Auch die maximale Traglast hängt vom jeweiligen Modell und dessen Grösse ab. Die Akkulaufzeit wird umso kürzer, je schwerer die Zuladung im Einzelfall ist.305 Dieser Umstand setzt der Grösse und vor allem dem Gewicht der Ladung klare Grenzen.306 297 Vgl. vorne, S. 3 f. 298 Vgl. BAZL, Zivile Drohnen, S. 22; Christen et al., S. 104 f.; Preznuk, S. 23; Hodgkinson/Johnston, S. 11; Landrock/Baumgärtel, S. 6; Steiger, Regulierung, S. 172. 299 EASA, Explanatory Note, S. 12 m.w.H.; vgl. Thomasen, S. 2. 300 Vgl. Christen et al., S. 105 und S. 117; de Miguel Molina/Segarra Oña, S. 10; Hänsenberger, Diss., Fn. 1212, 1553 und 1590; Martini, S. 735 mit Fn. 35; Vergouw et al., S. 29; Perritt/Sprague, Domesticating Drones, S. 29. Popper bezeichnet das Modell «Phantom» sehr anschaulich als «the Kleenex of drones». 301 Lee I. m.w.H.; Saeed. 302 Christen et al., S. 35; vgl. Graumann, S. 66. 303 Landrock/Baumgärtel, S. 8 und 63; Vergouw et al., S. 29. Vgl. auch den Produktbeschrieb der Drohne Phantom 4 Advanced auf der Herstellerseite. 304 Christen et al., S. 77; vgl. Büchi, Buch der Drohnen, S. 194 f. 305 Ausführlich zu den in Drohnen verwendeten Akkus Eich, in: Dieckert/Eich, S. 207 ff. 306 Vergouw et al., S. 35. Vgl. Applin, S. 74 m.w.H.; Engberts/Gillissen, S. 99. 40 Teil 1: Rechtliche, begriffliche und technische Grundlag II. Sensoren Die hiervor dargestellten Einsatzformen von Drohnen weisen eine zentrale Gemeinsamkeit auf, namentlich das Sammeln bzw. Bearbeiten von Sach- und Personendaten.307 Diese können sodann gezielt weiterverarbeitet (d.h. z.B. gespeichert, ausgewertet und versendet) werden. Für die vorliegende Ausein­ andersetzung kommt somit den Sensoren besondere Bedeutung zu; sie sind grundsätzlich geeignet, Personendaten zu bearbeiten.308 Im Vordergrund stehen dabei Foto- und Videokameras: Diese sind erstens bei privaten Drohnen am weitesten verbreitet und zweitens leicht und kostengünstig erhältlich.309 Der Vollständigkeit halber werden nachfolgend aber auch weitere — für Private eher schwer erhältliche — Sensoren kurz angesprochen.310 Vorauszuschicken ist, dass zur Verbreitung der einzelnen Sensoren keine gesicherten Zahlen existieren. Dies liegt u.a. daran, dass Drohnen oftmals mit verschiedenen Sensoren bestückt werden und gleichzeitig mehrere solche tragen können.311 Ebenfalls fehlen — zumindest im Bereich der Hobbynutzung — wissenschaftliche Erhebungen dazu. Nachfolgend soll deshalb auf die erste Erhebung zur professionellen Drohnennutzung in der Schweiz, bei welcher private Unternehmungen sowie Behörden teilnahmen, verwiesen werden.312 Daraus lassen sich interessante Erkenntnisse zur Art und Häufigkeit bestimmter Sensoren gewinnen. 1. Fotokamera Die am weitesten verbreiteten Sensoren sind Fotokameras. Gemäss Klauser et al. sind knapp über 40 % aller Drohnen damit bestückt.313 Drohnen verfügen oftmals über leistungsfähige Kameras, welche hochauflösende Bilder aufnehmen können.314 Diese werden primär zur Erstellung von Luftbildaufnahmen eingesetzt.315 307 Vgl. Landrock/Baumgärtel, S. 49. 308 Zur Bedeutung von Sensoren für (autonome) Drohneneinsätze Hänsenberger, Diss., S. 20. Vgl. auch Bestaoui Sebbane, S. 78 f. 309 Vgl. dazu Dieckert, in: Dieckert/Eich, S. 408. 310 Für eine ausführliche Darstellung weiterer Sensoren Eich, in: Dieckert/Eich, S. 319 f.; Hänsenberger, Diss., S. 27 ff. 311 Vgl. Hänsenberger, Diss., S. 27 ff.; Abeyratne, S. 120. 312 Klauser et al., S. 8. 313 Klauser et al., S. 8; vgl. auch Landrock/Baumgärtel, S. 16. 314 Eich, in: Dieckert/Eich, S. 317; Grosskopf, S. 759; Martini, S. 735; Büchi, Buch der Drohnen, S. 51 f. Zu den technischen Ausgestaltungen moderner Kameras vgl. Hertz­ berg/Lingemann/Nüchter, S. 55 ff. 315 Zu den verschiedenen Einsatzformen vorne, S. 35 ff. § 4 Stand der Technik 2. 41 Videokamera Auch (hochauflösende) Videokameras sind bei weiteren ca. 40 % aller Drohnen zu finden. Deren Bildauflösung wird bei gleichbleibendem oder sogar abnehmendem Energieverbrauch stetig besser.316 Es können zwei Arten unterschieden werden: Bei einem Grossteil findet eine Liveübertragung des aufgenommenen Bildmaterials statt; teilweise wird dieses aber lediglich gespeichert und kann erst später gesichtet werden.317 Die Videoaufnahmen erfolgen weitgehend automatisiert. Vom Boden aus können die Einstellungen in Echtzeit überprüft und nötigenfalls angepasst werden.318 Die vorangehend beschriebenen Drohnenmodelle,319 welche bei Privaten weit verbreitet sind, werden serienmässig mit Foto- und Videokamera ausgestattet.320 Die technischen Fortschritte beschränken sich jedoch nicht nur auf die Bildauflösung. Auch die Reichweite und die Lichtempfindlichkeit, insbesondere die gleichzeitige Darstellung von hellen und dunklen Stellen (sog. Restlichtverstärkung) sowie das Autotracking (automatische Kameranachführung) sind hier zu erwähnen. Insgesamt kann so eine immer grössere Fläche in immer besserer Auflösung erfasst werden; Drohnen ermöglichen zudem ganz neue Perspektiven.321 3. Mikrofon Neben Foto- und Videokameras tragen Hobbydrohnen teilweise auch ein Mikr­ofon.322 Es ermöglicht grundsätzlich die Aufnahme von Geräuschen und Gesprächen. Je nach Qualität des verwendeten Mikrofons können gut verständliche Audioaufnahmen von Gesprächen auch aus einiger Entfernung entstehen.323 Aufgrund der Geräuschkulisse, welche durch handels­ übliche Drohnen verursacht wird,324 ist damit ein Abhören bzw. Aufnehmen von Konversationen nicht oder kaum möglich. 316 Vgl. Perritt/Sprague, JETLaw, S. 685; Martini, S. 735 m.w.H. 317 Klauser et al., S. 8; vgl. Kaiser, S. 358. 318 Eich, in: Dieckert/Eich, S. 316. 319 Vgl. vorne, S. 39. 320 Vgl. Vergouw et al., S. 30; Schmid, S. 77. 321 Zum Ganzen Scholz, in: Simitis et al., Anhang 1 zu Art. 6 DSGVO N 14. 322 Vergouw et al., S. 30; Wright/Finn, S. 328; vgl. auch Gorkič, S. 69. 323 Ausführlich dazu mit Fokus auf «CCTV Microphones» Klitou, S. 116 ff., v.a. S. 119 f. 324 Vgl. EASA, Opinion, S. 14 und S. 38; JARUS, Categorization, S. 12; Hänsenberger, Diss., S. 208; Brahms/Maslaton, S. 1128. 42 4. Teil 1: Rechtliche, begriffliche und technische Grundlag Infrarot- und Wärmebildkameras Weniger weit verbreitet sind Infrarot- und Wärmebildkameras.325 Mit dieser Technik sind Aufnahmen von Bildern auch in der Nacht, bei Nebel oder bei Rauchbildung möglich.326 Im Bereich der behördlichen Drohnennutzung werden solche Kameras vom GWK eingesetzt.327 Hobbynutzer werden da­ gegen regelmässig keine solchen Kameras verwenden. Infrarot- und Wärmebildkameras erzeugen durch Infrarot-Scheinwerfer ein sichtbares Bild; die Infrarotenergie von Objekten (z.B. Menschen und Tieren) kann so aufgenommen werden.328 Sie enthalten in jedem Pixel eine Temperaturinformation, die anstelle von Grauwerten als Falschfarben Temperaturunterschiede interpretierbar macht.329 5. IMSI-Catcher Ein noch seltener vorkommender Sensor ist der sog. IMSI-Catcher. Dabei handelt es sich — in den Worten des Bundesgerichts — um «ein tragbares Gerät, das vereinfacht gesagt eine Mobilfunkantenne simuliert und die in der Umgebung des Catchers betriebenen Mobiltelefone dadurch so steuert, dass sie sich statt an der nächstgelegenen Mobilfunkantenne beim IMSI-Catcher anmelden. (…) Mit dem Einsatz von IMSI-Catchern ist es auch möglich, den Datenverkehr selbst abzugreifen, d.h. Telefongespräche mitzuhören oder andere übermittelte Daten zu analysieren. Der IMSI-Catcher erlaubt sodann die genaue Standortermittlung eines eingeschalteten Mobiltelefons.»330 IMSI-Catcher kommen in der Schweiz bei der Strafverfolgung (Art. 269bis und Art. 273 StPO)331 oder im nachrichtendienstlichen Bereich (Art. 28 NDG)332 zum Einsatz. Eine private Nutzung derselben ist nicht gänzlich auszuschliessen, denn ISMI-Catcher sind online für jedermann erhältlich.333 Auch das 325 Gemäss Klauser et al., S. 8, werden solche bei weniger als 10 % der befragten Unternehmen und Organisationen verwendet. 326 Wright/Finn, S. 328. Vgl. zum Einsatz von Infrarotkameras bereits EKMR, Kröcher und Möller c. Schweiz, Nr. 8463/78 (1981), v.a. Ziff. 9. 327 Vgl. dazu vorne, S. 35 f. 328 Glaneuski, S. 48; Müller L., Diss., S. 15 m.w.H. 329 Eich, in: Dieckert/Eich, S. 320; vgl. Hänsenberger, Diss., S. 28. 330 BGer, 1B_251/2017 vom 21. Februar 2018 E. 6.2 mit zahlreichen Hinweisen; vgl. auch BGer, 1B_199/2018 vom 18. Oktober 2018 E. 3.5. 331 BGE 144 IV 370 E. 2; BGer, 1B_252/2017 vom 21. Februar 2018 E. 6; BGer, 1B_696/2012 vom 11. Dezember 2012 E. 4.2 sowie die Hinweise in Fn. 330 hiervor. 332 Vgl. dazu Kiener/Leuzinger, Rn. 130. 333 Vgl. z.B. den Produktbeschrieb eines IMSI-Catchers auf der Webseite des Herstellers. § 4 Stand der Technik 43 Gewicht ist bei einem sog. «IMSI-Catcher mini» kein Hindernis, da dieser nur ca. 0,6 kg wiegt.334 Hobbydrohnen sind grundsätzlich in der Lage, ein solches Gerät zu tragen.335 Die Nutzung eines IMSI-Catchers setzt jedoch eine Bewilligung des BAKOM voraus, welche ausschliesslich an Behörden erteilt wird.336 Das «Inverkehrbringen und Anpreisen» von IMSI-Catchern ist zudem gemäss Art. 179sexies StGB strafbar.337 III. Zwischenfazit Aufgrund der grossen Vielfalt von Drohnenmodellen und verfügbaren Sensoren kann die vorliegende Arbeit keine abschliessende Darstellung derselben leisten. Die Ausführungen in diesem Kapitel haben aber zweierlei aufgezeigt: Erstens sind die von Privaten verwendeten Drohnen relativ klein und leicht. Zweitens sind diese mindestens in einer Weise zu einer Datenbearbeitung befähigt. Die serienmässig angebrachte Foto- und/oder Videotechnik ist soweit ausgereift, dass damit auch aus grösserer Entfernung338 hochauf­ lösendes Bildmaterial erstellt werden kann, welches regelmässig als Personen­ daten zu qualifizieren ist.339 334 Das Modell von Intercept wiegt gemäss Angaben auf der Webseite nur gerade 0,58 kg. Ein weiteres online erhältliches Modell wiegt gemäss Angaben auf der Webseite dagegen um die 25 kg. 335 Vgl. dazu vorne, S. 39. 336 Vgl. Art. 32a Fernmeldegesetz (FMG); Art. 26 bis 28 Verordnung über Fernmelde­ anlagen (FAV); Art. 4 f. Verordnung des BAKOM über Fernmeldeanlagen (VFAV). Auf Einzelheiten des Bewilligungsverfahrens wird nicht eingegangen. 337 Vgl. BSK StGB-Ramel/Vogelsang, Art. 179 sexies N 1a ff. 338 So können z.B. aus zwei Kilometer Entfernung Autokennzeichen erkannt werden (Dieckert, in: Dieckert/Eich, S. 408 mit Fn. 110). Vgl. auch Wright/Finn, S. 328 m.w.H. 339 Ausführlich dazu vorne, S. 29 ff. und insbesondere S. 33 ff. 45 Teil 2: Die drohnengestützte Datenbearbeitung im Lichte der Grundrechte § 1 Vorbemerkungen Nachfolgend soll die drohnengestützte Datenbearbeitung im Lichte der durch die BV sowie die EMRK geschützten Grundrechte analysiert werden.340 Diese Analyse beginnt mit einer eingehenden Diskussion der Dogmatik der grundrechtlichen Schutzpflichten (S. 46 ff.). Die Aufarbeitung dieser Grundlagen ist wesentlich für die später vorzunehmende Prüfung bestehender Schutzpflichten und ihrer Wahrnehmung im Kontext der Durchsetzung daten­ schutzrechtlicher Ansprüche bei der drohnengestützten Datenbearbeitung durch Private.341 Des Weiteren sind diejenigen Grundrechte zu vertiefen, welche durch die drohnengestützte Datenbearbeitung tangiert werden können. Dabei werden zunächst das Recht auf Privatsphäre (Art. 13 BV; Art. 8 EMRK) und namentlich dessen Teilgehalte des Schutzes des Privatlebens, der Wohnung sowie des Fernmeldeverkehrs behandelt (S. 58 ff.). Im Anschluss daran soll vertieft auf das für die vorliegende Arbeit zentrale Grundrecht der informationellen Selbstbestimmung eingegangen werden (S. 62 ff.). Sodann sind die Menschenwürde (Art. 7 BV; Art. 3 und 7 EMRK), die Glaubens- und Gewissensfreiheit (Art. 15 BV; Art. 9 EMRK), die Meinungsäusserungs- (Art. 16 BV; Art. 10 EMRK) und die Versammlungsfreiheit (Art. 22 BV; Art. 11 EMRK) sowie die Eigentumsgarantie (Art. 26 BV) kurz in ihren Bezügen zur drohnengestützten Datenbearbeitung darzustellen (S. 66 ff.). Weitere Grundrechte werden aufgrund fehlender Relevanz für die Forschungsfrage nicht behandelt. 340 Auf die in den UNO-Pakten verankerten Rechte soll vorliegend nicht vertieft eingegangen werden; ihnen kommt regelmässig keine über die in der BV und EMRK enthaltenen Garantien hinausgehende Bedeutung zu (vgl. etwa BGE 144 I 126 E. 4.1; Schweizer/Rechsteiner, Rn. 2.44 ff.). 341 Diese Prüfung erfolgt zu Beginn von Teil 5 dieser Untersuchung; vgl. hinten, S. 158 ff. 46 Teil 2: Die drohnengestützte Datenbearbeitung im Lichte der Grundrechte Im abschliessenden Abschnitt dieses 2. Teils werden sodann die grundrechtlichen Schutzpflichten im Bereich der informationellen Selbstbestimmung herausgearbeitet und wird aufgezeigt, welche Anforderungen sich daraus mit Blick auf das Datenschutzrecht und insbesondere die drohnengestützte Datenbearbeitung durch Private ergeben (S. 69 ff.). § 2 Grundrechtliche Schutzpflichten I. Verpflichtungsdimensionen der Grundrechte 1. Die drei Kategorien der Verpflichtungsdimensionen Den Grundrechten kommen verschiedene Verpflichtungsdimensionen zu.342 Diese können unterschiedlich kategorisiert werden.343 In der Schweizer Doktrin werden dabei regelmässig drei Kategorien genannt, namentlich staatliche Unterlassungs-, Leistungs- und Schutzpflichten.344 Auch Letztere sind heute sowohl in der Rechtsprechung345 als auch in der Lehre346 anerkannt.347 2. Schutz vor Übergriffen Privater Schutzpflichten aktualisieren sich dort, wo es um «die Vermeidung nicht staatlicher Übergriffe» geht.348 Als nicht staatliche «Gefahrenquellen»349 sind 342 Rhinow/Schefer/Uebersax, Rn. 981 und Rn. 1002; Tschannen, § 7 Rn. 8 f.; Kälin/ Künzli, Rn. 3.68 ff.; Häfelin/Haller/Keller/Thurnherr, Rn. 256 ff.; vgl. Grabenwarter/Pabel, § 19 Rn. 1. 343 Eine Übersicht der verschiedenen Kategorisierungen kann und soll die vorliegende Untersuchung nicht leisten. Vgl. dazu z.B. ausführlich Medici, S. 8 f. m.w.H. 344 Dubey, Vol. I, Rn. 69 ff.; Kiener/Kälin/Wyttenbach, § 4 N 2 ff.; Kälin/Künzli, Rn. 3.69 ff.; vgl. auch Mégret, S. 97 ff. und bereits Müller J.P., Elemente, S. 46 ff. 345 BGE 140 II 315 E. 4.8; 126 II 300 E. 5a; 119 Ia 28 E. 2; vgl. auch BGE 138 II 229 E. 3.2.2; 138 I 246 E. 3.2.2. 346 Auer/Malinverni/Hottelier, Rn. 132; Besson, obligations positives, S. 70 ff.; Biaggini, Komm. BV, Art. 35 N 7; Egli, S. 155 ff.; Gächter, § 30 Rn. 46 f.; Häfelin/Haller/ Keller/Thurnherr, Rn. 266; Hänni, S. 432; Kiener, «Rote Zora», S. 624 ff.; Kiener/ Kälin/Wyttenbach, § 4 N 17 ff.; Mahon, Petit commentaire, Art. 35 Cst. N 13; Rhinow/Schefer/Uebersax, Rn. 1173; Tschentscher/Lienhard/Sprecher, Rn. 122 ff.; BSK BV-Waldmann, Art. 35 N 40. Skeptisch zur «Konstruktion» der grundrechtlichen Schutzpflichten dagegen Tschannen, § 7 N 70 ff. 347 Vgl. Biaggini, Komm. BV, Art. 35 N 7; Medici, S. 11 m.w.H. 348 Kiener/Kälin/Wyttenbach, § 4 N 17; vgl. Isensee, Handbuch, Rn. 192; Medici, S. 11 ff. 349 Egli, S. 286. § 2 Grundrechtliche Schutzpflichten 47 primär «andere Private»350 zu qualifizieren.351 Des Weiteren sind auch Naturund Umweltkatastrophen352 sowie ausländische Träger staatlicher Gewalt erfasst.353 Für die vorliegende Forschungsarbeit können die beiden letztgenannten Gefährdungsquellen ausser Acht gelassen werden. Stehen Übergriffe Privater im Fokus, so entsteht das für grundrechtliche Schutzpflichten typische Dreiecksverhältnis «beeinträchtigter Grundrechts­ träger» — «Verursacher eines Übergriffs» — Staat354 bzw. «Staat — Störer — Opfer».355 II. Grundlage der Schutzpflichten 1. In der Bundesverfassung Die verfassungsrechtliche Grundlage grundrechtlicher Schutzpflichten ist in Art. 35 Abs. 1 BV zu erblicken.356 Gemäss dieser Bestimmung müssen die Grundrechte in der gesamten Rechtsordnung zur Geltung kommen. Ferner «[kann] die grundrechtliche Schutzpflicht des Staates bei Rechtsverhältnissen unter Privaten als Korrelat zum Gewaltmonopol des Staates gesehen werden».357 Die Bürger verzichten auf (private) Gewalt zugunsten eines Rechts auf wirksamen staatlichen Schutz.358 Auf weitere Ausführungen zur theo­ retischen Herleitung staatlicher Schutzpflichten wird verzichtet.359 350 BGE 119 Ia 28 E. 2; Egli, S. 287; Kiener/Kälin/Wyttenbach, § 4 N 17. Dabei sind natürliche und juristische Personen erfasst (statt aller Mahon, S. 46). Vgl. Müller J.P., Diss., S. 161 f.; Murswiek, Freiheit, S. 987 ff.; Unruh, S. 22 f. 351 Zur Bedrohung der Grundrechte durch nichtstaatliche Machtträger und der Forderung nach einer «Drittwirkung» der Grundrechte bereits Saladin, S. 308. 352 Kiener/Kälin/Wyttenbach, § 4 N 17; Schefer, Gefährdung, S. 446 mit zahlreichen Hinweisen in Fn. 22; vgl. BGE 140 II 315 E. 4.8. 353 Egli, S. 294 ff. m.w.H.; Schefer, Gefährdung, S. 446; ders., Kerngehalte, S. 260 ff.; vgl. BGE 123 II 511. 354 Medici, S. 10. Anschaulich auch Calliess, Schutzpflicht, S. 326 f. 355 Isensee, Handbuch, Rn. 5; Stinner, S. 63 («Grundrechtsdreieck»). Vgl. Rupp, S. 57 («Störerdreieck»). 356 BGE 126 II 300 E. 5a; Egli, S. 167; Kiener, «Rote Zora», S. 623; Rhinow/Schefer/Uebersax, Rn. 1140 ff. und Rn. 1173 ff. Vgl. BGE 139 I 114 E. 4 (Art. 35 Abs. 1 und 2 BV); Schefer, Kerngehalte, S. 253 f. (Art. 35 Abs. 1 und 3 BV); Mahon, S. 49 (einzig Art. 35 Abs. 3 BV). Vgl. sodann Bacher, Rn. 162 ff. für eine Übersicht und Diskussion der in der Schweizer Lehre vertretenen Ansichten. 357 Müller J.P., Verwirklichung, S. 72; Isensee, Handbuch, Rn. 102 und Rn. 186; Egli, S. 187 ff. Zur Sicherheit als Staatsaufgabe und deren Bedeutung im vorliegenden Zusammenhang auch Schefer, Kerngehalte, S. 239; Bacher, Rn. 153 ff. 358 Alexy, S. 415; Bacher, Rn. 152; Isensee, Handbuch, Rn. 186. 359 Vgl. dazu ausführlich Bacher, Rn. 147 ff. mit zahlreichen Hinweisen; Besson, obligations positives, S. 71 f.; aus deutschrechtlicher Sicht Rupp, S. 28 ff. 48 2. Teil 2: Die drohnengestützte Datenbearbeitung im Lichte der Grundrechte In der Europäischen Menschenrechtskonvention Auch aus der EMRK ergeben sich grundrechtliche Schutzpflichten.360 Diese werden teilweise aus Art. 1 EMRK abgeleitet.361 Sie können sich aber auch direkt aus jeder Konventionsgarantie ergeben:362 «In principle, positive obli­ gations can be claimed everywhere.»363 Der Gerichtshof hielt fest, er sei nicht gehalten, «to develop a general theory of the positive obligations which may flow from the Convention.»364 Auf eine eingehende Darstellung der Schutz��pflichten unter der Geltung der EMRK sowie deren Begründung wird im Rahmen dieser Untersuchung verzichtet.365 III. Semantik Die zur Bezeichnung von Schutzpflichten verwendeten Termini sind (noch) nicht einheitlich.366 Die Ausdrücke «grundrechtliche Schutzpflicht»367 und «staatliche Schutzpflicht»368 werden nebeneinander und synonym gebraucht.369 Dieser Begriffsverwendung soll auch in der vorliegenden Arbeit gefolgt werden. 360 Besson, droit privé, S. 17; Egli, S. 235 ff.; Lavrysen, Restrictions, S. 322; Rensmann, S. 216; Werro/Schmidlin, S. 184 ff. Zur Anerkennung derselben im Kontext von Art. 8 EMRK Breitenmoser, S. 34 f. 361 In diesem Sinne Pétermann, S. 31 f. m.w.H; vgl. Grabenwarter/Pabel, § 19 N 3. 362 Mowbray, passim, v.a. S. 7 ff.; Lavrysen, Restrictions, S. 322. Aus der Rechtsprechung z.B. EGMR (GK), Söderman c. Schweden, Nr. 5786/08 (2013) Ziff. 80 mit zahlreichen Hinweisen. 363 Xenos, S. 4. 364 EGMR, Plattform «Ärzte für das Leben» c. Österreich, Nr. 10126/82 (1988) Ziff. 31; vgl. Lavrysen, Restrictions, S. 322. Xenos, S. 5, bedauert das Fehlen eines «coherent methodological framework in the planning of the application and development of positive obligations». 365 Ausführlich dazu Rensmann, S. 220 ff. Vgl. zur Praxis des EGMR zu den einzelnen EMRK-Garantien Karpenstein/Mayer-Johann, Art. 1 EMRK N 7. Zur Verwirklichung der Schutzpflichten gemäss EMRK in der Schweiz ausführlich Pétermann, passim. 366 Vgl. die Hinweise bei Biaggini, Komm. BV, Art. 35 N 7. 367 Vgl. z.B. Kiener/Kälin/Wyttenbach, § 4 N 25; Biaggini, Komm. BV, Art. 35 N 7; Egli, S. 160. 368 Vgl. BSK BV-Waldmann, Art. 35 N 43; Kiener/Kälin/Wyttenbach, § 5 N 13 und § 11 N 25. So auch der Titel des Werks von Stinner, Schutzpflichten. 369 Das Adjektiv «staatlich» hebt den Adressaten hervor, das Adjektiv «grundrechtlich» den Gegenstand, den Rechtsgrund und den Begünstigten (so treffend Isensee, Handbuch, Rn. 191; vgl. auch Bacher, Rn. 145). § 2 Grundrechtliche Schutzpflichten 49 Die Bezeichnungen «positive Schutzpflichten»370 bzw. «positive Verpflichtungen»371 sind ebenfalls anzutreffen; diese sind wohl an die Begriffsverwendung des EGMR372 sowie an die französisch- und englischsprachigen Lehre373 angelehnt. Nachfolgend soll deshalb einzig von grundrechtlichen bzw. staatlichen Schutzpflichten die Rede sein. IV. Schutzpflichten und deren Verhältnis zur Lehre der Drittwirkung Schutzpflichten sind von der eng verwandten Lehre der Drittwirkung374 der Grundrechte abzugrenzen.375 Dabei ist anhand ihrer Perspektiven vorzugehen: Während sich die Drittwirkung mit dem Verhältnis zwischen Privaten befasst, fokussiert die Schutzpflichtenlehre auf den Staat und «seine Rolle bei der Ausgestaltung der Beziehungen unter Privaten».376 Georg Müller sieht in der Drittwirkung der Grundrechte eine «Modalität der Schutzpflicht: Der Staat hat die Grundrechte vor Beeinträchtigungen durch übermächtige Private zu schützen».377 Liegt der Fokus auf dem Staat als Adressat der grundrechtlichen Schutzpflichten und obliegt ihm somit die Pflicht, «à veiller [au respect des droits fondamentaux] dans les relations interindividuelles»,378 so rückt die Dritt370 Z.B. bei Schefer, Kerngehalte, S. 236; BGE 139 IV 121 E. 4.6 f. Da es sich bei Schutzpflichten um positive Pflichten handelt, ist diese Bezeichnung redundant. 371 Z.B. bei Kiener/Kälin/Wyttenbach, § 4 N 20, § 11 N 26, § 15 N 12. 372 Vgl. statt vieler Besson, obligations positives, S. 50; Rensmann, S. 216, je m.w.H. 373 Vgl. z.B. Mahon, S. 49; Xenos, passim. 374 Teilweise ist auch der Begriff der Horizontalwirkung anzutreffen, so z.B. bei BSK BV-Waldmann, Art. 35 N 29 sowie Bacher, Rn. 138; vgl. Kiener/Kälin/Wyttenbach, § 4 N 81. Das Bundesgericht verwendet diesen Term in seiner publizierten Rechtsprechung nur selten (vgl. BGE 111 II 245 E. 4b; 114 Ia 329 E. 2b; aus der neuen Rechtsprechung BGE 143 I 217 E. 5.2). Dagegen benutzt das Höchstgericht regelmässig den Ausdruck «Drittwirkung» (aus der neueren Rechtsprechung statt vieler BGE 144 I 50 E. 4.1; 142 I 49 E. 4.5.1; 139 I 306 E. 4.6). Aus diesem Grund wird letzterem Begriff hier der Vorzug gegeben. 375 Biaggini, Komm. BV, Art. 35 N 7, erstes Lemma; Besson, obligations positives, S. 66; Tschentscher/Lienhard/Sprecher, Rn. 125; Müller L., Diss., S. 309. 376 Rhinow/Schefer/Uebersax, Rn. 1181; BJ, Obligation positive, S. 38; Saladin, S. 310. Auf eine weitere Unterscheidung der direkten und indirekten (bzw. der mittelbaren und unmittelbaren) Drittwirkung wird vorliegend verzichtet, vgl. dazu ausführlich Bacher, Rn. 139 ff. mit zahlreichen Hinweisen und bereits Müller G., Drittwirkung, S. 240 ff. 377 Müller G., HdG VII/2, § 204 Rn. 42; so auch Müller J.P., Verwirklichung, S. 128 f.; Tschentscher/Lienhard/Sprecher, Rn. 125 («Sonderfall der Schutzpflicht»); Egli, S. 198 («Unterfall der Lehre der grundrechtlichen Schutzpflichten»). 378 Besson, obligations positives, S. 69; vgl. Kiener, Grundrechte in der BV, Rn. 32; Harris et al., S. 26 f.; Lavrysen, Positive State, S. 13. 50 Teil 2: Die drohnengestützte Datenbearbeitung im Lichte der Grundrechte wirkung in den Hintergrund. Dies gilt umso mehr, wenn — wie in der vorliegenden Untersuchung — deliktisches und nicht vertragliches Handeln der Privaten diskutiert wird.379 Zusammenfassend kann festgehalten werden, dass sich die Untersuchung nicht mit der Drittwirkung von Grundrechten befasst; dieser Begriff wird deshalb im Folgenden nicht verwendet. V. Ausprägungen der Schutzpflichten Schutzpflichten haben entweder präventiven oder kurativen Charakter.380 Präventive Massnahmen zielen darauf ab, einen drohenden Übergriff in eine grundrechtlich geschützte Rechtsposition zu verhindern bzw. dessen Risiko zu mindern.381 In dieser Ausprägung der Schutzpflicht ist ein staatliches Eingreifen bereits dann gefordert, wenn erst die Gefahr eines Übergriffs droht.382 Kurativ bedeutet demgegenüber, dass der Staat im Nachhinein dem Opfer beisteht, z.B. indem er — auf dem Weg der Gesetzgebung — eine möglichst vollständige Wiedergutmachung der bereits eingetretenen Grundrechtseinschränkung ermöglicht.383 Das staatliche Eingreifen zielt darauf ab, eine andauernde oder die Folgen einer bereits eingetretenen Beeinträchtigung zu beseitigen oder zumindest die Grundrechtswidrigkeit festzustellen, um dem Opfer dadurch eine gewisse Genugtuung zu verschaffen.384 Stellt der Staat dem Betroffenen eines Übergriffs durch einen Privaten die rechtlichen Möglichkeiten für ein (gerichtliches) Vorgehen gegen den Verursacher zur Verfügung, so ist dies ebenfalls Ausdruck einer kurativen Massnahme. Ebenso verhält es sich, wenn tatsächliche Hindernisse beseitigt werden, welche den grundsätzlich zur Verfügung stehenden Rechtsschutz gegenüber Dritten erschweren oder gänzlich vereiteln.385 379 Vgl. Tschentscher/Lienhard/Sprecher, Rn. 126. Das so verstandene Deliktsrecht umfasst «unerlaubte Handlungen» von Privaten, wie z.B. bei Persönlichkeitsverletzungen (vgl. zu den Begriffen statt aller KuKo OR-Schönenberger, Vor Art. 41-61 N 1 f.). 380 Statt vieler Kälin/Künzli, Rn. 3.107. 381 Kiener/Kälin/Wyttenbach, § 4 N 20; Müller G., HdG VII/2, § 204 Rn. 7; Rupp, S. 33. 382 Vgl. Schefer, Gefährdung, S. 447 f. 383 Kälin/Künzli, Rn. 3.70; Kiener/Kälin/Wyttenbach, § 4 N 20; Schefer, Kerngehalte, S. 318; Schefer, Gefährdung, S. 447. Rupp, S. 33, spricht in diesem Zusammenhang von «repressiven» Instrumenten. 384 Kälin/Künzli, Rn. 3.107; Schefer, Gefährdung, S. 447; vgl. auch Schefer, Kern­ gehalte, S. 257 f. 385 Vgl. Müller G., HdG VII/2, § 204 Rn. 7; Rupp, S. 33 mit Hinweis auf die Rechtsprechung des BVerfGer. § 2 Grundrechtliche Schutzpflichten 51 VI. Adressaten 1. Primäre Verpflichtung des Gesetzgebers Als Adressat der Schutzpflichten hat «der Staat in all seinen Erscheinungsformen zu gelten».386 Die Wahrnehmung derselben obliegt jedoch primär dem Gesetzgeber.387 Er «ist (…) verpflichtet, die Rechtsordnung so auszugestalten, dass die Grundrechte auch tatsächlich ausgeübt werden können».388 Des Weiteren ist er gehalten, die Regelungen bei Änderungen der Verhältnisse «nachzubessern» und an neue Gefährdungen anzupassen.389 Dem Gesetzgeber kommt demnach eine «Beobachtungs- und Prüfungspflicht» mit Blick auf die bereits erlassenen Normen zu.390 2. Exekutive und Judikative Daneben können sich auch im Bereich der Rechtsanwendung oder im Rahmen einfachen Verwaltungshandelns Schutzpflichten ergeben und faktische Massnahmen erforderlich machen;391 auch die Judikative und die Exekutive werden somit in die Pflicht genommen.392 Die Exekutive übernimmt im Rahmen ihrer Zuständigkeit die Durchsetzung der erforderlichen Schutzmassnahmen, wobei die öffentliche Sicherheit und Ordnung im Vordergrund steht.393 Im Rahmen des Verwaltungshandelns können z.B. technisches Versagen, fehlende Mittel oder un­ genügende Ausbildung dazu führen, dass grundrechtliche Schutzpflichten verletzt werden.394 Die Judikative verwirklicht grundrechtliche Schutzpflichten bei der Rechtsanwendung im Einzelfall, also in ihrem angestammten Tätigkeitsbereich. Das Gericht hat das Recht verfassungskonform auszulegen und die 386 Egli, S. 316. Vgl. Isensee, Handbuch, Rn. 219 lit. d; Schefer, Kerngehalte, S. 236; Unruh, S. 24; für die EMRK Pétermann, S. 116 m.w.H. 387 BGE 126 II 300 E. 5b; Kiener/Kälin/Wyttenbach, § 4 N 21; Egli, S. 317; Unruh, S. 23; Rupp, S. 32; Pétermann, S. 117 f. 388 BGE 139 I 114 E. 4, unter expliziter Bezugnahme auf Art. 35 Abs. 1 und 2 BV. 389 Isensee, Handbuch, Rn. 219 lit. e; Bacher, Rn. 257. Spezifisch in Bezug auf neue Technologien Cottier, S. 39. 390 Isensee, Handbuch, Rn. 287. 391 Kiener/Kälin/Wyttenbach, § 4 N 21; Kiener, Grundrechte in der BV, Rn. 30. 392 Egli, S. 315 f.; Unruh, S. 20, je mit zahlreichen Hinweisen. Vgl. auch Biaggini, Komm. BV, Art. 35 N 7. 393 Isensee, Handbuch, Rn. 267; vgl. Mohler, Polizeirecht, Rn. 298 f. 394 Pétermann, S. 118. 52 Teil 2: Die drohnengestützte Datenbearbeitung im Lichte der Grundrechte legislatorische Umsetzung und Konkretisierung der Schutzpflichten zu prüfen sowie ggf. auf dem Wege der Rechtsfortbildung zu ergänzen.395 VII. Tatbestand Schutzpflichten aktualisieren sich nur unter spezifischen Voraussetzungen.396 Zunächst ist vorausgesetzt, dass diejenige Person, deren Schutz infrage steht, vom Geltungsbereich eines Grundrechts erfasst und der Schutzbereich desselben durch das staatliche Unterlassen berührt ist.397 Zudem wird verlangt, dass der Staat bzw. die zuständige Behörde von der konkreten — d.h. realen und unmittelbar drohenden — Gefährdungslage weiss oder bei Anwendung pflichtgemässer Aufmerksamkeit und genügender Sorgfalt hätte wissen müssen.398 Der Staat verletzt seine Schutzpflichten, wenn er bzw. die zuständige Behörde nicht all jene Schutzmassnahmen ergreift, welche «im Rahmen der verfügbaren Mittel vernünftigerweise» zur Verfügung stehen und welche eine Gefahrenabwehr realistischerweise bewirken können.399 Er muss also «faktisch und rechtlich» in der Lage sein, die Grundrechtsbeeinträchtigung zu verhindern.400 Die vorerwähnte Gefährdungslage muss konkret sein, mithin eine gewisse Qualität aufweisen. Gefordert ist das Erreichen einer bestimmten Schwelle401 bzw. eines gewissen Masses.402 Damit von einer «realen und unmittelbar drohenden Gefährdungslage» gesprochen werden kann, muss die rechtlich relevante Gefährdung so geartet sein, dass «bei ungehindertem Ablauf des zu erwartenden Geschehens mit hinreichender Wahrschein395 SGK BV-Schweizer, Art. 13 N 84; Kiener/Kälin/Wyttenbach, § 14 N 66. Ausführlich zu diesen Pflichten Bacher, Rn. 30 ff. und Rn. 285 ff., je m.w.H. 396 Kiener, «Rote Zora», S. 629 f.; Egli, S. 284 ff., je m.w.H. Vgl. EGMR (GK), Osman c. Ver­ einigtes Königreich, Nr. 23452/94 (1998) Ziff. 115; EGMR, Nencheva u.a. c. Bulgarien, Nr. 48609/06 (2013) Ziff. 108. 397 Grabenwarter/Pabel, § 19 N 5; Kiener, «Rote Zora», S. 629; Kiener/Kälin/ Wytten­bach, § 4 N 31. 398 Kälin/Künzli, Rn. 3.110; Kiener, «Rote Zora», S. 630; Kiener/Kälin/Wyttenbach, § 4 N 31. 399 Kiener/Kälin/Wyttenbach, § 4 N 31; BSK BV-Waldmann, Art. 35 N 52. 400 Kälin/Künzli, Rn. 3.70 (vgl. auch Rn. 3.108); vgl. sodann BSK BV-Waldmann, Art. 35 N 51 und 55; Isensee, Handbuch, Rn. 219 lit. c. 401 Egli, S. 299 m.w.H. Zum Begriff der Gefahrenschwelle Murswiek, Verantwortung, S. 86; Unruh, S. 76. 402 Wiederkehr, AJP 2001, S. 217; vgl. auch Besson, obligations positives, S. 76 («gravité»); Martin, S. 105 f. § 2 Grundrechtliche Schutzpflichten 53 lichkeit»403 ein Übergriff in die grundrechtlich geschützte Rechtsposition derjenigen Person erfolgt, deren Schutz infrage steht.404 Dabei ist für den Erlass gesetzlicher Schutzmassnahmen ein weniger strenger Massstab anzusetzen (blosse Gefährdung kann ausreichen) als für eine direkte Intervention durch Einsatzkräfte wie die Polizei (ernsthafte und qualifizierte Gefahr vorausgesetzt).405 Insgesamt kann der Tatbestand für das Aufleben von Schutzpflichten im vorliegenden Zusammenhang als die reale und unmittelbare Gefährdung der «tatsächlichen Grundlagen eines Grundrechts durch Private, sodass seine Ausübung nicht mehr oder nur noch begrenzt gewährleistet ist»,406 umschrieben werden. VIII. Rechtsfolge Steht im Grundsatz fest, dass eine Schutzpflicht besteht, so gilt es, nach der angebrachten Schutzmassnahme und ihrer konkreten Verwirklichungsweise zu fragen. Die zuständige staatliche Behörde ist gehalten, die Gefährdungslage nach deren Art und Intensität sowie deren Materialisierungswahrscheinlichkeit zu beurteilen und entsprechende Schutzmassnahmen zu treffen.407 Dabei ist nach den üblichen Verhältnismässigkeitskriterien vorzugehen,408 wobei dieser Grundsatz gleichzeitig als Untermassverbot wirkt.409 403 Vgl. Egli, S. 299 m.w.H. und unter Heranziehung des polizeirechtlichen Gefährdungsbegriffs. Ausführlich zur Wahrscheinlichkeit und deren Beurteilung Schefer, Gefährdung, S. 477 ff. 404 Vgl. dazu auch Schefer, Gefährdung, S. 473, der darauf hinweist, dass einerseits die Schwere des potenziellen Übergriffs und andererseits dessen Wahrscheinlichkeit in Betracht gezogen werden müssen; die beiden Kriterien stünden in enger Wechselwirkung zueinander. Anschaulich BVerfGer, 2 BvR 2502/08 vom 18. Februar 2010: Mangels ausreichender Substanziierung unzulässige Verfassungsbeschwerde gegen eine Versuchsreihe der Europäischen Organisation für kernphysikalische Forschung («CERN»); die Beschwerdeführerin fürchtete ein «Schadenereignis apokalyptischen Ausmasses» durch schwarze Löcher. Gemäss den Verfassungsrichtern ist ein solches aber «nach dem Stand von Wissenschaft und Technik praktisch ausgeschlossen» (v.a. Rn. 12). 405 Müller J.P., Verwirklichung, S. 73; Mohler, Polizeirecht, Rn. 779 mit Fn. 1497; vgl. BGE 128 I 327 E. 4.2. Zu Recht betont Martin, S. 106, in diesem Zusammenhang die Bedeutung der Umstände des Einzelfalls. 406 Wiederkehr, AJP 2001, S. 217. 407 Isensee, Handbuch, Rn. 219 lit. a und f; Wiederkehr, AJP 2001, S. 217; Schefer, Gefährdung, S. 479 f. Vgl. auch Calliess, Gewährleistung, S. 1098; Müller L., Diss., S. 191. 408 Vgl. Besson, obligations positives, S. 77; Egli, S. 306. Zur Verhältnismässigkeit im Einzelnen statt vieler BSK BV-Epiney, Art. 36 N 53 ff. 409 Kiener/Kälin/Wyttenbach, § 9 N 149; Weber-Dürler, S. 154; ausführlich Calliess, Schutzpflicht, S. 329. Zum Begriff des Untermassverbots Canaris, S. 228. 54 Teil 2: Die drohnengestützte Datenbearbeitung im Lichte der Grundrechte Da bei der Wahrnehmung von Schutzpflichten kein «konkretisierbares Unterlassen»410 verlangt wird, kommt dem Staat bzw. der zuständigen Behörde ein grosser Gestaltungs- bzw. Ermessensspielraum bezüglich der zu treffenden Massnahme zu.411 In der Rechtsprechung des EGMR zeigen sich bei der Auslegung dieses Spielraums412 — je nach betroffener Garantie — Unterschiede: So hat der Gerichtshof etwa im Kontext von Art. 6 EMRK (Recht auf ein faires Verfahren) Schutzpflichten relativ strikt ausgelegt.413 In den meisten Fällen prüft er jedoch einzig, ob der Staat angemessene und geeignete Massnahmen getroffen hat, um die Wahrnehmung der Rechte des Einzelnen zu gewährleisten,414 und gesteht den Staaten somit einen grossen Ermessensspielraum zu.415 Neben gesetzgeberischen kommen auch organisatorische, verfahrensmässige und finanzielle Schutzvorkehrungen in Betracht.416 Vorausgesetzt ist selbstredend, dass die infrage kommenden Schutzmassnahmen selbst grundrechtskonform sind, mithin nicht unrechtmässig die Grundrechte der (potenziellen) Störer oder Dritter einschränken.417 Insgesamt müssen die in Realisierung der Schutzpflichten getroffenen Schutzmassnahmen so ausgestaltet sein, dass der bestmögliche Schutz grundrechtlicher Ansprüche resultiert. Ausschlaggebend ist die Effektivität des Schutzes.418 Dieser ist durch das faktisch und rechtlich Mögliche beschränkt, wobei auch die Begrenztheit der sachlichen und persönlichen 410 Unruh, S. 69; vgl. Martin, S. 107. 411 Vgl. Besson, obligations positives, S. 83 f.; Egli, S. 305; Unruh, S. 79. Anschaulich (zu Art. 8 EMRK) EGMR (GK), Von Hannover c. Deutschland (Nr. 2), NRn. 40660/08 und 60641/08 (2012) Ziff. 104. 412 Ausführlich dazu Arai-Takahashi, S. 85 f. und S. 217 ff.; Lavrysen, Restrictions, S. 327 ff. 413 Harris et al., S. 24 mit Hinweis auf EGMR, Zimmermann und Steiner c. Schweiz, Nr. 8737/79 (1983) Ziff. 29; vgl. auch Arai-Takahashi, S. 58 f. 414 So z.B. EGMR, Plattform «Ärzte für das Leben» c. Österreich, Nr. 10126/82 (1988) Ziff. 34. 415 Vgl. EGMR, Abdulaziz, Cabales und Balkandali c. Vereinigtes Königreich, NRn. 9214/80, 9473/81, 9474/81 (1985) Ziff. 67; Johnston u.a. c. Irland, Nr. 9697/82 (1986) Ziff. 55; EGMR (GK), A, B und C. Irland, Nr. 25579/05 (2010) Ziff. 247 ff. Vgl. auch Harris et al., S. 512 f. 416 Biaggini, Komm. BV, Art. 35 N 7. 417 Kiener, Grundrechtsschranken, Rn. 16; BSK BV-Waldmann, Art. 35 N 53; Calliess, Schutzpflicht, S. 326; Isensee, Handbuch, Rn. 220; Marsch, S. 263. Rupp, S. 37, spricht in diesem Zusammenhang von einem «Übermassverbot hinsichtlich der Beschränkung der Freiheit des Dritten». 418 BGE 138 I 475 E. 4.1; Besson, obligations positives, S. 85; Egli, S. 320 ff.; Martin, S. 136; Schefer, Kerngehalte, S. 253 f. Anschaulich BVerfGE 92, 26 (Rn. 74): «Das Bundesverfassungsgericht kann deswegen die Verletzung einer Schutzpflicht nur feststellen, wenn die öffentliche Gewalt Schutzvorkehrungen entweder überhaupt nicht getroffen hat oder die getroffenen Regelungen und Massnahmen gänzlich ungeeignet oder völlig unzulänglich sind, das gebotene Schutzziel zu erreichen […].» § 2 Grundrechtliche Schutzpflichten 55 Mittel des Staates zu beachten ist.419 Ein optimaler oder umfassender Schutz kann nicht beansprucht werden.420 Besteht die zu ergreifende Schutzmassnahme in einer gesetzlichen Regelung, so hat diese auch einen wirksamen Vollzugsmechanismus zu beinhalten. Nichts anderes ergibt sich auch aus dem Prinzip des effektiven Rechtsschutzes.421 Erweist sich eine in der Vergangenheit getroffene Massnahme aufgrund technologischer Fortschritte oder eines gesellschaftlichen Wandels als nicht mehr ausreichend, so sind neue Vorkehrungen zu treffen, um ein ausreichendes Schutzniveau aufrechtzuerhalten.422 IX. Schutzberechtigte Schutzpflichten aktualisieren sich unter der Voraussetzung, dass diejenige Person, deren Schutz infrage steht, vom Geltungsbereich eines Grundrechts erfasst ist.423 Somit sind primär natürliche Personen schutzberechtigt,424 juristische Personen des Privatrechts dagegen nur, wenn «die fragliche Garantie nicht an natürliche Qualitäten des Menschen anknüpft und von ihren Funktionen her auch auf juristische Personen passt.»425 X. Justiziabilität grundrechtlicher Schutzpflichten 1. Grundsätzliche Justiziabilität Anders als bei Unterlassungsansprüchen von Grundrechten wurde die Justi­ zia­bilität von Schutzpflichten zunächst kontrovers diskutiert.426 Die h.L. geht aber heute davon aus, dass Schutzpflichten von betroffenen Personen gericht- 419 Unruh, S. 78; Müller L., Diss., S. 192; Leutert, S. 96; Besson, obligations positives, S. 95; Künzli, S. 240. 420 Martin, S. 136; Schefer, Kerngehalte, S. 271. 421 Vgl. Isensee, Sicherheit, S. 21; Stinner, Schutzpflicht, S. 59; Wiederkehr, Diss., S. 251 f.; Calliess, Schutzpflicht, S. 327; Müller L., Diss., S. 313. Es müssen Sach- und Verfahrensnormen geschaffen werden (Isensee, Handbuch, Rn. 267; Bacher, Rn. 201). Zum Anspruch auf effektiven Rechtsschutz statt vieler BSK BV-Schaub, Art. 146 N 2; Kiener/Kälin/Wyttenbach, § 42 N 4. 422 Calliess, Schutzpflicht, S. 328, spricht in diesem Zusammenhang vom «dynamischen Charakter der Schutzpflicht». Vgl. Rupp, S. 75 sowie vorne, S. 51. 423 Vorne, S. 52. 424 Statt aller Auer/Malinverni/Hottelier, Rn. 112 f. 425 Kiener/Kälin/Wyttenbach, § 5 N 20. Ausführlich und differenzierend Egli, S. 301 ff. (zu Minderjährigen, Ausländerinnen und Ausländern etc.). 426 Bacher, Rn. 203 mit zahlreichen Hinweisen in Fn. 563. 56 Teil 2: Die drohnengestützte Datenbearbeitung im Lichte der Grundrechte lich durchgesetzt werden können.427 Auch die Rechtsprechung in Deutschland428 sowie die Praxis menschenrechtlicher Überwachungsorgane zeigen auf, dass «Schutzpflichten an sich ohne weiteres justiziabel»429 sind. Das Bun­ desgericht hat sich bisher noch nie explizit zur Frage geäussert; implizit hat es sich aber bereits mehrfach mit (Verletzungen von) Schutzpflichten befasst.430 2. Durchsetzungsproblematik vor Bundesgericht Die Frage nach der Justiziabilität von Schutzpflichten stellt sich primär dort, wo der Gesetzgeber zur Wahrnehmung derselben berufen ist. Das Bundesgericht ist bislang mit der Feststellung, dass der Gesetzgeber die Rechtsunterworfenen ungenügend schützt bzw. den Grundrechtsschutz nur ungenügend verwirklicht, eher zurückhaltend.431 Des Weiteren steht fest, dass der Bundesgesetzgeber vom Bundesgericht nicht gezwungen werden kann, ein Gesetz zu erlassen bzw. zu revidieren oder neue Normen zu schaffen.432 Stellt das Bundesgericht eine Verletzung von grundrechtlichen Schutzpflichten fest, so kann dies aber durchaus eine Gesetzesrevision auslösen.433 In BGE 137 I 305 hat das Bundesgericht die Möglichkeit eines subjektiven Anspruchs auf ein Tätigwerden des Gesetzgebers grundsätzlich bejaht, wenn der grundrechtlich geschützte Anspruch hinsichtlich des «Ob» sowie auch des «Wie»434 hinreichend klar bestimmt ist.435 Im 427 Bacher, Rn. 205 f.; Besson, obligations positives, S. 63; Egli, S. 336; Martin, S. 120; Müller J.P., Verwirklichung, S. 72; Pulver, S. 423; Wiederkehr, AJP 2001, S. 218; vgl. auch Alexy, S. 427 f.; Gächter, § 30 Rn. 47 f.; Schefer, Kerngehalte, S. 269 ff.; Unruh, S. 64 f.; Kiener, Grundrechte in der BV, Rn. 30. 428 Vgl. dazu die zahlreichen Hinweise auf die Rechtsprechung des BVerfG bei Bacher, Rn. 204 mit Fn. 568. 429 Kälin/Künzli, Rn. 3.77. Zur EMRK vgl. Frowein/Peukert, Art. 8 EMRK N 11 ff.; Wyss, S. 67. 430 So etwa in BGE 118 V 206 E. 5a ff.; 119 Ia 28 E. 2 f.; 126 II 300 E. 5a; 140 II 315 E. 4.8. Vgl. auch Bacher, Rn. 204; Besson, obligations positives, S. 63; Gächter, § 30 Rn. 47 f. 431 BSK BV-Diggelmann, Art. 13 N 9. 432 Egli, S. 332 f. und S. 338; Martin, S. 121. Dies ergibt sich aus der Gewaltenteilung (auf Bundesebene), vgl. dazu Tschannen, § 27 Rn. 6 ff.; Häfelin/Haller/Keller/ Thurnherr, Rn. 1406 ff., v.a. Rn. 1416. Vgl. auch Art. 190 BV und dazu statt aller BSK BV-Epiney, Art. 190 N 35 ff. 433 Egli, S. 333; Martin, S. 121; vgl. auch BSK BV-Epiney, Art. 190 N 36 m.w.H. 434 Vgl. ausführlich zu diesen beiden Aspekten Martin, S. 117 f. 435 BGE 137 I 305 E. 2.4 f. Inhaltlich ging es um die Nichtfortführung der (zeitlich befristeten) Kommission für die Gleichstellung von Frau und Mann im Kanton Zug. Vgl. dazu auch BSK BV-Diggelmann, Art. 13 N 9 mit Fn. 24. In BGE 126 II 300 E. 2c erwähnte das Bundesgericht sodann die Möglichkeit, bei Vorliegen eines schutzwürdigen Interesses (in casu aus Art. 10 BV) eine «konkrete rechtsgestaltende Anordnungen zu bean­ tragen». Vgl. auch BGE 104 Ia 284 E. 2b. § 2 Grundrechtliche Schutzpflichten 57 konkreten Fall richtete sich der legislatorische Auftrag jedoch an einen kantonalen Gesetzgeber. Ein subjektives und gerichtlich durchsetzbares Recht auf Erlass bzw. Revision eines Bundesgesetzes ist vor diesem Hintergrund zu verneinen. 3. Praxis des EGMR Der EGMR auferlegt sich weniger Zurückhaltung. Anschaulich ist in diesem Kontext das Urteil in Fall Marckx c. Belgien436. Der Gerichtshof befasste sich darin mit der Ausgestaltung des belgischen Familienrechts mit Blick auf das Recht auf Achtung des Privat- und Familienlebens. Der Umstand, dass zwischen einer unverheirateten Mutter und deren leiblichen Tochter nicht ex lege durch die Geburt ein Abstammungsverhältnis entsteht, stellte gemäss Strassburger Richter eine Verletzung von Art. 8 EMRK dar.437 Als die nationalen Gerichte diesem Urteil nicht zum Durchbruch verhalfen, hielt der Gerichtshof in einem anderen Verfahren fest, er «ne discerne pas ce qui pouvait empêcher la cour d’appel de Bruxelles, puis la Cour de cassation de se conformer aux conclusions de l’arrêt Marckx.»438 XI. Zwischenfazit Seit ihrer Anerkennung in der schweizerischen Lehre und Rechtsprechung haben die Schutzpflichten stetig an Bedeutung gewonnen. Diese «Verwirklichungstendenz der Grundrechte»439 ist kaum überraschend, gehen Gefährdungen von grundrechtlich geschützten Rechtspositionen doch vermehrt auch von Privaten aus.440 Vereinfacht ausgedrückt, entsteht eine grundrechtliche Schutzpflicht dort, wo der Staat von einer aktuellen oder drohenden Gefährdung einer gewissen Schwere für die Grundrechte von betroffenen Privaten weiss oder hätte wissen müssen. In einer solchen Situation ist primär der Gesetzge­­­ber 436 EGMR, Marckx c. Belgien, Nr. 6833/74 (1979), v.a. Ziff. 31. Vgl. aus der neueren Rechtsprechung des Gerichtshofs z.B. EGMR, Khadija Ismayilova c. Aserbaidschan, NRn. 65286/13 und 57270/14 (2019) Ziff. 112 ff. 437 Diese Missachtung des Prinzips mater semper certa est sei inkompatibel mit der staatlichen Schutzpflicht, Vorkehrungen zu treffen, welche die Integration eines Kindes in die Familie von Geburt an ermöglichen (EGMR, Marckx c. Belgien, Nr. 6833/74 (1979), Ziff. 31). Vgl. dazu und zur Weiterentwicklung dieser Rechtsprechung Arai-Takahashi, S. 66 ff. 438 EGMR, Vermeire c. Belgien, Nr. 12849/87 (1991), Ziff. 25. Inhaltlich ging es um die Erbschaft von Frau Vermeire, welche als uneheliche Tochter gegenüber den ehelichen Kindern der Erblasser benachteiligt war. 439 Unruh, S. 76. 440 Vgl. Besson, obligations positives, S. 94. 58 Teil 2: Die drohnengestützte Datenbearbeitung im Lichte der Grundrechte berufen, die grundrechtlichen Schutzpflichten wahrzunehmen. Der grundsätzlich justiziable, subjektive Anspruch auf Umsetzung scheitert auf Bundesebene indes daran, dass das Parlament vom Bundesgericht nicht zum Erlass von Gesetzen bzw. Einzelbestimmungen gezwungen werden kann. Bevor die in diesem Abschnitt diskutierten Tatbestandselemente und die daraus erwachsenden Rechtsfolgen der grundrechtlichen Schutzpflichten im hier interessierenden Kontext dargestellt und analysiert werden können,441 müssen zunächst die relevanten Grundrechtsgarantien diskutiert werden. § 3 Privatsphäre I. Vorbemerkungen 1. Die einzelnen Aspekte der Privatsphäre Jede Person hat Anspruch auf Achtung ihres Privat- und Familienlebens, ihrer Wohnung sowie ihres Brief-, Post- und Fernmeldeverkehrs (Art. 13 Abs. 1 BV); hinzu kommt der Anspruch auf Schutz vor Missbrauch ihrer persönlichen Daten (Art. 13 Abs. 2 BV). Nach der bundesgerichtlichen Rechtsprechung gewährleistet Abs. 1 allgemein das Recht auf eine Privat- und Geheimsphäre, wobei Abs. 2 im Besonderen das Recht auf informationelle Selbstbestimmung schützt.442 Inhaltlich weitgehend übereinstimmende Garantien finden sich in Art. 8 Ziff. 1 EMRK.443 Der grundrechtliche Anspruch auf Achtung des Familienlebens wird durch die drohnengestützte Datenbearbeitung nicht tangiert.444 Aus diesem Grund wird dieser Teilgehalt von Art. 13 Abs. 1 BV nicht weiter vertieft. 2. Persönlicher Schutzbereich Zum persönlichen Schutzbereich der nachfolgend behandelten Ansprüche gemäss Art. 13 Abs. 1 BV kann festgehalten werden, dass dieser alle natürlichen 441 Hinten, S. 69 ff. 442 BGE 142 II 340 E. 4.2; vgl. Biaggini, Komm. BV, Art. 13 N 11; Fasnacht, Rn. 135; BGE 128 II 259 E. 3.2; 137 I 167 E. 3.2. Ausführlich zur informationellen Selbstbestimmung hinten, S. 62 ff. 443 BGE 144 I 126 E. 4.1; 140 I 353 E. 8.3; 140 IV 181 E. 2.3; Kiener/Kälin/Wyttenbach, § 14 N 1; Haller W., § 209 N 34; Chadoian, S. 249. Gleiches gilt auch für Art. 17 UNO-Pakt II (vgl. Bygrave, S. 83 ff.; Schweizer/Rechsteiner, Rn. 2.47 f. und 2.55). 444 Vgl. ausführlich zum Schutzbereich des Anspruchs auf Achtung des Familienlebens Kiener/Kälin/Wyttenbach, § 14 N 22 ff. § 3 Privatsphäre 59 Personen erfasst. Juristische Personen können sich einzig auf jene Teilgehalte der Privatsphäre berufen, deren Schutzziel nicht untrennbar an die Existenz einer natürlichen Person gebunden ist.445 II. Achtung des Brief-, Post- und Fernmeldeverkehrs 1. Inhalt und sachlicher Schutzbereich Der Anspruch auf Achtung des Brief-, Post und Fernmeldeverkehrs schützt die Individualkommunikation als Ausprägung der Privatsphäre; auch moderne Kommunikationsformen wie z.B. Internettelefonate werden erfasst.446 Der Schutz erstreckt sich neben dem Inhalt der Kommunikation auch auf die Randdaten wie z.B. den Zeitpunkt, die Dauer und die Anzahl der Teilnehmer447 sowie sog. Standortdaten.448 2. Bei der drohnengestützten Datenbearbeitung durch Private insbesondere Das Fernmeldegeheimnis wird durch von Privatpersonen betriebene Drohnen und die damit einhergehende Datenbearbeitung kaum tangiert.449 Es wäre zwar vorstellbar, dass ein auf einer Drohne angebrachter Sensor Kommunikationsvorgänge abfangen kann (etwa ein IMSI-Catcher). Da die Verwendung von solcher Technik durch Private und auch deren Vertrieb nicht erlaubt sind,450 wird vorliegend auf eine ausführlichere Auseinandersetzung mit dem Fernmeldegeheimnis verzichtet. Im Übrigen hat das Bundesgericht unlängst festgehalten, dass der Einsatz eines IMSI-Catchers dann nicht das Fernmeldegeheimnis, sondern die informationelle Selbstbestimmung tangiert, wenn die Feststellung einer Geräte- oder Kartennummer eines Mobiltelefons unabhängig von einem Kommunikationsvorgang zwischen Menschen erfolgt.451 Bei so gearteten 445 Statt vieler BSK BV-Diggelmann, Art. 13 N 8; Dubey, Vol. II, Rn. 1766 ff.; Kiener/ Kälin/Wyttenbach, § 14 N 4 f. Die Garantien der Achtung der Wohnung und des Brief-, Post- und Fernmeldeverkehrs schützen folglich auch juristische Personen. 446 Rhinow/Schefer/Uebersax, Rn. 1402; Chadoian, S. 251; BGE 140 I 353 E. 8.3. 447 BGE 140 I 353 E. 8.3; 140 IV 181 E. 2.3 f.; Müller/Schefer, S. 203 mit zahlreichen Hinweisen. 448 Chadoian, S. 251 m.w.H. 449 Szenarien, in welchen durch eine drohnengestützte Datenbearbeitung das Recht auf Achtung des Brief- oder Postverkehrs verletzt wird, sind kaum erdenklich. Darauf wird deshalb nicht weiter eingegangen. 450 Vgl. zum Ganzen vorne, S. 42 f. 451 BGer, 1B_251/2017 vom 21. Februar 2018 E. 6.6. Vgl. dazu auch Sprecher et al., S. 666. 60 Teil 2: Die drohnengestützte Datenbearbeitung im Lichte der Grundrechte Einsätzen des IMSI-Catchers «‹kommunizierten› ausschliesslich technische Geräte miteinander».452 III. Achtung der Wohnung 1. Inhalt und sachlicher Schutzbereich Eine Wohnung im Sinne von Art. 13 Abs. 1 BV ist eine Räumlichkeit, «die eine gewisse Privatsphäre sichert und auf einen bestehenden oder künftigen, dauernden oder vorübergehenden Lebensmittelpunkt schliessen lässt.»453 Auch Neben- und Aussenräume wie Balkone, Innenhöfe sowie umfriedete Gärten fallen darunter.454 Die Garantie schützt primär vor unbefugtem (physischem) Eindringen in die Wohnung; doch auch das Aushorchen oder Ausspionieren von aussen (z.B. mit Kameras oder Richtmikrofonen) ist erfasst.455 Dabei ist unerheblich, ob die Sensoren an einer Drohne befestigt sind oder nicht. 2. Bei der drohnengestützten Datenbearbeitung durch Private insbesondere Im Bereich der drohnengestützten Datenbearbeitung tritt das Recht auf Achtung der Wohnung regelmässig hinter den Schutz des Privatlebens und der informationellen Selbstbestimmung zurück.456 Anders könnte es sich etwa verhalten, wenn ein Privater seine Drohne gezielt zum Ausspähen von Wohnräumen oder umfriedeten Gärten etc. eines Dritten einsetzt.457 Die damit einhergehende Datenbearbeitung eröffnet aber auch in diesen Fällen (zusätzlich) den Schutzbereich der informationellen Selbstbestimmung.458 452 BGer, 1B_251/2017 vom 21. Februar 2018 E. 6.6 mit Hinweis auf BVerfGer, 2 BvR 1345/03 vom 22. August 2006 (v.a. Rn. 57). 453 SGK BV-Breitenmoser, Art. 13 N 61 m.w.H. 454 SGK BV-Breitenmoser, Art. 13 N 61, erstes Lemma; BSK BV-Diggelmann, Art. 13 N 25; Rhinow/Schefer/Uebersax, Rn. 1396. 455 BSK BV-Diggelmann, Art. 13 N 26; Kälin/Künzli, Rn. 12.44; Kiener/Kälin/Wyttenbach, § 14 N 42. 456 Vgl. zur sog. unechten Grundrechtskonkurrenz BSK BV-Epiney, Art. 36 N 22; Kiener/ Kälin/Wyttenbach, § 7 N 7. 457 Vgl. BSK BV-Diggelmann, Art. 13 N 26; Kornmeier, S. 124. 458 Zur informationellen Selbstbestimmung ausführlich sogleich, S. 62 ff. § 3 Privatsphäre 61 IV. Achtung des Privatlebens 1. Inhalt und sachlicher Schutzbereich Eine präzise und umfassende Definition der in Art. 13 BV nebeneinanderstehenden Begriffe der Privatsphäre (Marginalie) und des Privatlebens (Abs. 1) ist unmöglich anzugeben.459 Mit Sicherheit umfasst der Schutz des Privatlebens die Gesamtheit der privaten Lebenssachverhalte, «die der Einzelne als Privatsache abgeschirmt haben möchte, unabhängig davon, ob diese Vorgänge als schutzwürdig erscheinen oder nicht.»460 Gemäss Bundesgericht schützt der Anspruch auf Achtung des Privatlebens somit «l’identité, les relations sociales et les comportements intimes de chaque personne physique, l’honneur et la réputation, ainsi que notamment toutes les informations se rapportant à une personne qui ne sont pas accessible au public.»461 Der Schutzpflichtengehalt des Grundrechts auf Achtung des Privatlebens ist mithin auf private Ausforschung gerichtet.462 2. Bei der drohnengestützten Datenbearbeitung durch Private insbesondere Setzen Private Drohnen ein, so geht es nicht «nur» um die Datenbearbeitung an sich, sondern — je nach den Umständen des Einzelfalls — auch um eine Einschränkung der Achtung des Privatlebens. Wird eine Drohne ausschliesslich zum Zwecke des Ausspionierens verwendet, ohne dass dabei Foto- oder Videoaufnahmen erstellet werden, so steht der Schutz des Privatlebens im Vordergrund.463 Das Gefühl des «Beobachtet-Werdens» durch Drohnen an sich kann — unabhängig von einer Datenaufzeichnung im konkreten Fall — bereits einen «Überwachungsdruck»464 bzw. einen «chilling effect»465 auslö459 BSK BV-Diggelmann, Art. 13 N 6; SGK BV-Breitenmoser, Art. 13 N 8. Vgl. auch BGE 144 I 266 E. 3.1, wo das BGer zum Begriff des Privatlebens gemäss Art. 8 Ziff. 1 EMRK festhält, dass dieser «sich einer abschliessenden Definition verschliesst». 460 Kiener/Kälin/Wyttenbach, § 14 N 11; vgl. Kälin/Künzli, Rn. 12.4; Tschentscher/ Lienhard/Sprecher, Rn. 265 . Für eine Aufzählung weiterer geschützter Aspekte vgl. Biaggini, Komm. BV, Art. 13 N 5 m.w.H. 461 BGE 135 I 198 E. 3.1; ähnlich auch BGE 140 I 381 E. 4.1; 137 II 371 E. 6.1. 462 Tschentscher/Lienhard/Sprecher, Rn. 265, die Stalking und Paparazzi als Beispiele nennen. Vgl. auch Biaggini, Komm. BV, Art. 13 N 16. 463 Bei diesem Vorgang liegt wohl regelmässig auch ein Beschaffen von Personendaten vor (vgl. zum Begriff vorne, S. 33). Dieser Umstand tritt jedoch, da er nicht primärer Zweck des Drohneneinsatzes ist, in den Hintergrund. 464 Zum Begriff Rose, S. 139 f.; vgl. Griebel, S. 112. 465 Dazu statt vieler Rhinow/Schefer/Uebersax, Rn. 1189 f. und Rn. 1564 f. Vgl. BGE 143 I 147 E. 3.3; 140 I 2 E. 10.6.3. 62 Teil 2: Die drohnengestützte Datenbearbeitung im Lichte der Grundrechte sen.466 Als «eyes in the sky»467 oder «verlängertes Auge»468 ermöglichen Drohnen eine Echtzeitbeobachtung, welche für sich allein genommen bereits eine Einschränkung des Rechts auf Achtung des Privatlebens darstellen kann.469 Dies gilt umso mehr, wenn aus voyeuristischen Beweggründen oder aus blosser Neugierde Drohnen zur Beobachtung eingesetzt werden.470 Da die allermeisten Drohnen jedoch mit audiovisuellen Sensoren ausgestattet sind, die gerade auf eine Datenbearbeitung abzielen,471 und die privatrechtlichen Schutzbehelfe in beiden Fällen parallel ausgestaltet sind,472 wird für die vorliegende Untersuchung das Recht auf informationelle Selbstbestimmung in den Fokus gerückt. Dieses soll sogleich vertieft werden. § 4 Informationelle Selbstbestimmung I. Entstehung und Einordnung Gemäss Art. 13 Abs. 2 BV hat jede Person Anspruch auf Schutz vor Missbrauch ihrer persönlichen Daten. Diese Bestimmung verankert einen grundrecht­ lichen Anspruch auf Datenschutz.473 Im Anschluss an das sog. «Volkszählungsurteil» des deutschen Bundesverfassungsgerichts474 sowie die Schweizer 466 Vgl. dazu vorne, S. 5 f., sowie Calo, S. 33; Cassart, RDTI, S. 87; Griebel, S. 112; Müller, Diss., S. 111 f.; Schmid, S. 83; Straub, S. 55; SGK BV-Schweizer, Art. 13 N 76. 467 Diesen Begriff findet man verschiedentlich in englischsprachigen Werken zu Drohnen, z.B. bei Farber. 468 Müller L., Diss., S. 23. Der Autor erwähnt auch das sog. Kamera-Monitor-Prinzip, wonach die aufgenommenen Bilder einzig auf einen Monitor (bei Drohnen regelmässig der Bildschirm eines Tablets oder Mobiltelefons) übertragen, aber nicht abgespeichert werden. Vgl. dazu auch Martini, S. 733. 469 Vgl. Ruegg et al., S. 53 f. Vgl. sodann aus deutschrechtlicher Optik Martini, S. 735 mit den Hinweisen in Fn. 37. 470 Vgl. Müller L., Diss., S. 113 f. 471 Vgl. dazu vorne, S. 40 (Sensoren) bzw. S. 33 ff. (drohnengestützte Datenbearbeitung). 472 Das Datenschutzgesetz verweist für die Durchsetzung von Ansprüchen bei Persönlichkeitsverletzungen auf die Regeln des ZGB (Art. 28 ff.). Diese sind ohne Weiteres auf Persönlichkeitsverletzungen anwendbar, die keine Datenbearbeitung beinhalten. Vgl. ausführlich zum Ganzen hinten, S. 106 ff. 473 BGE 128 II 259 E. 3.2; Botschaft BV, S. 153; Biaggini, Komm. BV, Art. 13 N 11. Vgl. Baeriswyl, Verselbständigung, S. 121, der das Grundrecht auf Datenschutz auch als Teil der persönlichen Freiheit (Art. 10 Abs. 2 BV) versteht. 474 BVerfGE 65, 1 (43 ff.) vom 15. Dezember 1983 (begriffsprägend); vgl. ausführlich dazu Flückiger, autodétermination, S. 849 ff. Vgl. sodann BGE 113 Ia 1 E. 4b/bb und BGE 129 I 232 E. 4.3.1. § 4 Informationelle Selbstbestimmung 63 Lehre475 hat das Bundesgericht entschieden, dass Art. 13 Abs. 2 BV ein Recht auf informationelle Selbstbestimmung garantiert.476 Es handelt sich um das spezifischste und zugleich zentralste Grundrecht im Kontext der Datenbearbeitung. Auch die EMRK garantiert als Teilaspekt von Art. 8 das Recht auf informationelle Selbstbestimmung.477 II. Schutzbereich 1. Persönlicher Schutzbereich Es können sich sowohl natürliche als auch juristische Personen auf die informationelle Selbstbestimmung berufen.478 Bei Letzteren werden Geschäftsge­ heimnisse jedoch primär von der Wirtschaftsfreiheit (Art. 27 BV) geschützt.479 2. Sachlicher Schutzbereich 2.1 Herrschende Lehre und Rechtsprechung Die h.L.480 geht davon aus, dass Art. 13 Abs. 2 BV — entgegen dem zu eng gera­ te­nen Wortlaut der Norm — nicht nur vor Datenmissbrauch schützt, sondern jeg­liche Bearbeitung von Personendaten481 erfasst.482 Jede Person hat folglich 475 Der Begriff wurde damals bereits von Huber R., S. 40 und Tercier, S. 67 Rn. 460, verwendet. Der Schöpfer des Begriffs war Wilhelm Steinmüller (vgl. Bull, Selbstbestimmung, S. 25 mit Fn. 54). 476 Zum ersten Mal wird diese Formulierung in BGE 120 II 118 E. 3a, ohne Bezugnahme auf die BV, verwendet; vgl. ausführlich zu diesem Urteil Aebi-Müller, Rn. 593 mit Fn. 1555. Kurz darauf ebenso in BGE 122 I 143 E. 6b/aa. Seither gefestigte Rechtsprechung, vgl. u.a. BGE 144 II 91E. 4.4; 144 II 77 E. 5.2; 142 II 340 E. 4.2; 140 I 381 E. 4.1; 138 I 256 E. 5.5; 133 I 77 E. 5.3; 129 I 232 E. 4.3.1; 128 II 259 E. 3.2. Ausführlich zur «Entstehungsgeschichte» dieses Grundrechts Waldmeier, S. 6 ff. 477 Explizit EGMR (GK), Satakunnan Markkinapörssi OY und Satamedia OY c. Finnland, Nr. 931/13 (2017) Ziff. 137; seither etwa EGMR, M.L. und W.W. c. Deutschland, NRn. 60798/10 und 65599/10 (2018) Ziff. 87; Benedik c. Slowenien, Nr. 62357/14 (2018) Ziff. 103; vgl. Grabenwarter, S. 784, und bereits Breitenmoser, S. 246. Vgl. auch BGE 138 I 256 E. 5.5. Zurückhaltend dagegen Siemen, S. 132 f.; Lynskey, S. 178 f. 478 BGE 141 I 201 E. 4.1; Kiener/Kälin/Wyttenbach, § 14 N 5. Anders verhält es sich unter dem E-DSG; dieser ist auf juristische Personen nicht anwendbar (vgl. dazu hinten, S. 75). 479 Schweizer/Rechsteiner, Rn. 2.5; Müller/Schefer, S. 167. Vgl. zur Wirtschaftsfreiheit statt anderer BSK BV-Uhlmann, Art. 27 N 3 ff. 480 Trotz der in den letzten Jahren aufgekommenen kritischen Stimmen in der Lehre (vgl. dazu sogleich S. 64) rechtfertigt es sich, von der «herrschenden Lehre» zu sprechen. So auch Bieri, Rn. 625 mit Fn. 1783. 481 Vgl. zu den Begriffen Daten und Datenbearbeitung vorne, S. 29 ff. bzw. S. 33 ff. 482 Biaggini, Komm. BV, Art. 13 N 11; SGK BV-Schweizer, Art. 13 N 74; Müller L., Diss., S. 122; Tschentscher/Lienhard/Sprecher, Rn. 267; vgl. BGE 137 I 167 E. 3.2; 128 II 259 E. 3.2. 64 Teil 2: Die drohnengestützte Datenbearbeitung im Lichte der Grundrechte u.a. das Recht, selbst zu entscheiden, ob, wem und wann sie persönliche Lebenssachverhalte, Anschauungen, Empfindungen und Gedanken bekannt gibt.483 Gemäss Bundesgericht beinhaltet die informationelle Selbstbestimmung, «dass jede Person gegenüber fremder, staatlicher oder privater Bearbeitung und Speicherung von sie betreffenden Informationen bestimmen können muss, ob und zu welchem Zweck diese Informationen über sie bearbeitet und gespeichert werden.»484 2.2 Kritische Lehrstimmen In der Lehre stösst das Konzept der informationellen Selbstbestimmung teilweise auf Kritik.485 Gächter/Egli lehnen eine Übernahme eines informationellen Selbstbestimmungsrechts in das schweizerische Verfassungsrecht bereits deshalb ab, weil dieses in Deutschland aus der allgemeinen Handlungs-freiheit abgeleitet wurde,486 welche in der Schweiz nicht vorgesehen ist.487 Vielmehr sei diese Verfassungsbestimmung im Sinne von «Datenverkehrsrecht» zu verstehen, welches sich an den Gesetzgeber richte; ähnlich den Verfahrensgarantien würden dadurch Ansprüche an das Verfahrens- und Organisationsrecht gestellt.488 Belser vertritt ebenfalls die Ansicht, dass durch Art. 13 Abs. 2 BV kein umfassendes Selbstbestimmungsrecht gewährleistet werde. Der Schutzbereich umfasse vielmehr bloss den Schutz vor Missbrauch; die Verfassungsbestimmung sei wortgetreu zu verstehen.489 2.3 Verfassungsrevision? Im Zusammenhang mit der konkreten Tragweite der informationellen Selbstbestimmung waren unlängst auf politischer Ebene interessante Entwicklungen zu beobachten. Eine parlamentarische Initiative verlangte, den 483 Müller/Schefer, S. 167; Bieri, Rn. 625; Handkomm. DSG-Rosenthal, Art. 1 N 4; ähnlich Tschentscher/Lienhard/Sprecher, Rn. 266. 484 BGE 142 II 340 E. 4.2; ständige Rechtsprechung: BGE 140 I 2 E. 9.1; 140 I 381 E. 4.1; 138 II 346 E. 8.2. 485 Für eine ausführliche Darstellung der Kritik Flückiger, autodétermination, passim, v.a. S. 853 ff. 486 Ausführlich zur Konzeption und Herleitung der informationellen Selbstbestimmung gemäss BVerfGer Albers, S. 152 ff. 487 Gächter/Egli, Rn. 23; Müller J.P., Elemente, S. 18; Schrepfer, S. 178; Simon, S. 107 f.; vgl. auch Fasnacht, Rn. 124. 488 Gächter/Egli, Rn. 26; ebenso Gächter/Werder, S. 89 ff.; vgl. auch Belser, in: Belser/Epiney/Waldmann, Rn. 120; Fasnacht, Rn. 125. 489 Belser, in: Belser/Epiney/Waldmann, § 6 Rn. 118 ff.; Belser, Tragweite, S. 28 ff.; ihr folgend Fasnacht, Rn. 121 ff. i.V.m. Rn. 158; ähnlich auch Belser/Waldmann, S. 79 Rn. 87. § 4 Informationelle Selbstbestimmung 65 Wortlaut von Art. 13 Abs. 2 BV in ein Recht auf informationelle Selbstbestimmung eabzuändern.490 Die staatspolitischen Kommissionen beider Räte gaben der Initiative Folge; schliesslich wurde sie jedoch am 29. September 2017 vom Nationalrat abgeschrieben.491 Die Ratsmehrheit sprach sich gegen zusätzliche Bürokratie aus; ausserdem war sie gegen «l’introduction d’un article qui existe déjà dans la Constitution fédérale».492 2.4 Zwischenfazit Insgesamt ist vor dem Hintergrund dieser politischen Entwicklungen und mit der ständigen Rechtsprechung des Bundesgerichts493 sowie der h.L.494 festzuhalten, dass Art. 13 Abs. 2 BV ein umfassendes Selbstbestimmungsrecht über die eigenen Personendaten garantiert. III. Bei der drohnengestützten Datenbearbeitung durch Private insbesondere Die informationelle Selbstbestimmung wird durch die drohnengestützte Datenbearbeitung direkt tangiert.495 Jede (unerwünschte) Datenbearbeitung mittels Drohnen stellt grundsätzlich eine Einschränkung des in Art. 13 Abs. 2 BV garantierten Grundrechts dar. Da die allermeisten Drohnen Sensoren tragen, welche — wie Foto- und Videokameras — auf eine Datenbearbeitung ausgelegt sind,496 rückt die informationelle Selbstbestimmung für die vor­ liegende Auseinandersetzung klar ins Zentrum.497 Die Schutzpflichten­ dimension der informationellen Selbstbestimmung ist deshalb genauer zu analysieren.498 490 Parlamentarische Initiative Vischer (14.413). 491 Amtl. Bull. NR 2017 S. 1682. 492 Amtl. Bull. NR 2017 S. 1682 (Votum Nantermod). 493 Vgl. dazu die Hinweise vorne, Fn. 476. Für zahlreiche weitere Hinweise (auf die ältere Rechtsprechung) vgl. Müller L., Diss., S. 122 mit Fn. 769. 494 Vgl. dazu die Hinweise vorne, Fn. 482 f. 495 Ebenso aus deutschrechtlicher Optik Kornmeier, S. 119. 496 Vgl. dazu vorne, S. 40 ff. (Sensoren). 497 Vgl. auch vorne, S. 61 f. 498 Vgl. dazu hinten, S. 69 ff. 66 Teil 2: Die drohnengestützte Datenbearbeitung im Lichte der Grundrechte § 5 Weitere möglicherweise tangierte Grundrechte I. Menschenwürde 1. Inhalt und Schutzbereich Gemäss Art. 7 BV ist die Würde des Menschen zu achten und zu schützen. So verankert die BV ein fundamentales Prinzip der gesamten Verfassungsordnung.499 Gleichzeitig kommt der Menschenwürde ein Status als justiziables «Auffanggrundrecht»500 zu, dessen Anwendung erst dann in Betracht kommt, wenn die «spezialisierten Garantien nicht greifen».501 Eine Verletzung ist nur zurückhaltend anzunehmen.502 Die Menschenwürde entzieht sich gemäss bundesgerichtlicher Rechtsprechung einer Definition. Der Verfassungsgeber habe auch deshalb auf eine Definition verzichtet, «weil eine verfassungsrechtliche Bestimmung dessen, was die Würde und den Wert eines Menschen ausmacht, grundsätzlich problematisch wäre.»503 Die einzelnen Gehalte dieser Garantie lassen sich deshalb weder positiv noch negativ eindeutig definieren.504 2. Bei der drohnengestützten Datenbearbeitung durch Private insbesondere Die Menschenwürde bietet u.a. Schutz gegen ausgeprägte Formen von Persönlichkeitsverletzungen.505 Gemäss Belser wiegt die Gefahr für den Einzelnen beim Einsatz von zivilen Drohnen, die mit Infrarotkameras bestückt sind, so schwer, dass mit Verletzungen der Menschenwürde zu rechnen ist.506 Eine solche Verletzung durch Drohnen des Grenzwachtkorps, die tatsächlich mit Infrarotkameras bestückt sind,507 wurde vor Bundesverwaltungsgericht bereits einmal gerügt, von diesem aber klar verneint.508 499 Biaggini, Komm. BV, Art. 7 N 4; Mahon, Petit commentaire, Art. 7 Cst. N 4; vgl. Kley, S. 325. 500 BGE 132 I 49 E. 5.1; 143 IV 77 E. 4.1; Kiener/Kälin/Wyttenbach, § 10 N 14; Müller L., Diss., S. 99; Rhinow/Schefer/Uebersax, Rn. 174. 501 Biaggini, Komm. BV, Art. 7 N 4; Mahon, Petit commentaire, Art. 7 Cst. N 4. 502 Biaggini, Komm. BV, Art. 7 N 4; Rhinow/Schefer/Uebersax, N 174; Müller L., Diss., S. 100 m.w.H. 503 BGE 143 IV 77 E. 4.1; zustimmend Kiener/Kälin/Wyttenbach, § 10 N 11. 504 Vgl. Haller W., § 209 N 15; Mahon, Petit commentaire, Art. 7 Cst. N 5; SGK BVMastronardi, Art. 7 N 40 ff. 505 BVGer, A-2482/2007 vom 26. Juni 2007 E. 6.3; vgl. Müller L., Diss., S. 100. 506 Belser, Tragweite, S. 30. Vgl. zu Infrarot- und Wärmebildkameras vorne, S. 42. 507 Vgl. dazu und allgemein zum Einsatz von Drohnen durch das GWK vorne, S. 35 f . 508 BVGer, A-2482/2007 vom 26. Juni 2007 E. 6.1 und E. 6.3. § 5 Weitere möglicherweise tangierte Grundrechte 67 Mithin darf — a maiore minus — davon ausgegangen werden, dass die Menschenwürde bei drohnengestützten Datenbearbeitungen durch Private nicht eingeschränkt wird. Von den heute auf dem Markt angebotenen Drohnen für Privatpersonen und den daran angebrachten Sensoren509 geht keine Gefahr einer so schwerwiegenden Persönlichkeitsverletzung aus, dass Art. 7 BV herangezogen werden müsste.510 II. Glaubens- und Gewissensfreiheit 1. Inhalt und Schutzbereich Art. 15 BV gewährleistet eine sachlich umfassende Glaubens- und Gewissensfreiheit511 (oftmals auch Religionsfreiheit genannt512).513 Geschützt ist insbesondere das Recht «eine religiöse Überzeugung zu haben, zu äussern, zu verbreiten oder zu praktizieren oder gemäss einer religiösen Überzeugung zu handeln.»514 Gleichzeitig ist jeder Zwang zu entsprechendem Verhalten verboten.515 2. Bei der drohnengestützten Datenbearbeitung durch Private insbesondere Bei der drohnengestützten Datenbearbeitung durch Private ist nicht auszuschliessen, dass Einblicke in religiöse oder weltanschauliche Bereiche ermöglicht werden.516 Dieser Umstand ist insofern von Bedeutung, als dass bei der Wahrnehmung von Schutzpflichten die Bearbeitung von besonders schützenswerten Personendaten517 speziell zu berücksichtigen ist.518 Eine darüber hinausgehende Bedeutung kommt der Glaubens- und Gewissensfreiheit in diesem Kontext jedoch nicht zu. 509 Vgl. dazu ausführlich vorne, S. 40 ff. 510 Vgl. auch Kornmeier, S. 115 ff., wo bei einer grundrechtlichen Auseinandersetzung mit Drohneneinsätzen (aus deutschrechtlicher Optik) die Menschenwürde nicht erwähnt wird. 511 Biaggini, Komm. BV, Art. 15 N 3; vgl. Karlen, Religionsfreiheit, S. 266. 512 So z.B. BGE 129 I 12 E. 8.4; 135 I 79 E. 2.2; 144 I 281 E. 3.2. 513 Zur ähnlichen Garantie in Art. 9 EMRK statt aller Frowein/Peukert, Art. 9 EMRK N 1 ff. 514 BGE 125 I 347 E. 3a. Vgl. BGE 145 I 121 E. 5.1; 142 I 49 E. 3.4. Zu Schutzobjekt und Inhalt im Einzelnen BSK BV-Pahud de Mortanges, Art. 15 N 28 ff.; Biaggini, Komm. BV, Art. 15 N 4 ff. 515 Kiener/Kälin/Wyttenbach, § 29 N 1; BSK BV-Pahud de Mortanges, Art. 15 N 110. 516 Vgl. KGer LU, 7H 17 49 vom 18. April 2018 E. 3.5; Kornmeier, S. 119 f. In Betracht kommen etwa auch Aufnahmen von Besuchern einer Kirche oder Moschee. 517 Vgl. dazu vorne, S. 34. 518 Vgl. Belser, Tragweite, S. 37 mit Fn. 53. 68 Teil 2: Die drohnengestützte Datenbearbeitung im Lichte der Grundrechte III. Meinungsäusserungs- und Versammlungsfreiheit 1. Inhalt und Schutzbereich Des Weiteren seien hier kurz die durch Art. 16 bzw. Art. 22 BV garantierte Meinungsäusserungs- und Versammlungsfreiheit erwähnt.519 Werden Drohnen durch Behörden — wie z.B. durch die Polizei — eingesetzt, so besteht die Gefahr eines «chilling effect».520 Dadurch kann der Schutzbereich von Art. 16 und/oder Art. 22 BV tangiert sein.521 2. Bei der drohnengestützten Datenbearbeitung durch Private insbesondere Im Kontext privat betriebener Drohnen ist kaum eine Situation vorstellbar, in welcher der Schutzbereich der Meinungsäusserungs- und/oder Versammlungsfreiheit eröffnet wäre. Eine drohnengestützte Überwachung oder Beobachtung einer Demonstration durch einen Privaten dürfte kaum einmal einen psychologischen Druck verursachen, der eine abschreckende Wirkung auf die Grundrechtsausübung der Betroffenen mit sich bringt.522 In Übereinstimmung mit dem Fokus der vorliegenden Arbeit wird deshalb auf weitere Ausführungen dazu verzichtet. IV. Eigentumsgarantie 1. Inhalt und Schutzbereich Die Bundesverfassung gewährleistet in Art. 26 Abs. 1 das Eigentum.523 Der verfassungsrechtliche Eigentumsbegriff ist autonom, d.h. nicht zivilrechtsabhängig;524 er umfasst aber auch die zivilrechtlichen Institute des Fahrnisund Grundeigentums sowie des Besitzes.525 Insgesamt schützt Art. 26 BV 519 Ausführlich zum Gehalt dieser Grundrechte statt aller Biaggini, Komm. BV, Art. 16 N 4 und N 12 ff. und Art. 22 N 3 ff. 520 Zum Begriff: Müller/Schefer, S. 375 ff.; Rhinow/Schefer/Uebersax, Rn. 1189 f. und Rn. 1564 f. Vgl. auch BGE 143 I 147 E. 3.3; 140 I 2 E. 10.6.3; 136 I 167 E. 3.2.3. 521 Vgl. BSK BV-Hertig, Art. 16 N 40 und Art. 22 N 16; Clarke, S. 287; Martini, S. 738 ff. 522 Vgl. Kiener/Kälin/Wyttenbach, § 9 N 31. 523 Das in Art. 1 des 1. Zusatzprotokolls zur EMRK verankerte Recht auf Schutz des Eigentums wird nicht behandelt, da die Schweiz dieses nicht ratifiziert hat. Die Entschädigungsfunktion der Eigentumsgarantie (vgl. Art. 26 Abs. 2 BV) ist sodann für die vorliegende Untersuchung unerheblich. 524 Komm. BV-Biaggini, Art. 26 N 12; BSK BV-Waldmann, Art. 26 N 17; vgl. BGE 144 II 367 E. 3.2. 525 BGE 128 I 295 E. 6a; 120 Ia 120 E. 1b. § 6 Schutzpflichten im Kontext der informationellen Selbstbestimmung 69 die konkreten Eigentumsrechte wie etwa die Verfügungsmacht über das Eigentum und dessen Nutzung.526 2. Bei der drohnengestützten Datenbearbeitung durch Private insbesondere Art. 667 ZGB hält fest, dass sich das Eigentum an Grund und Boden nach oben und unten auf den Luftraum und das Erdreich erstreckt, soweit für die Ausübung des Eigentums ein Interesse besteht. Es lässt sich demnach nicht abstrakt bestimmen, bis zu welcher Höhe ein schutzwürdiges Interesse an der Ausübung des Eigentumsrechts innerhalb der geschützten «Luftsäule» über einem Grundstück gegeben ist.527 Überfliegt ein Privater ein Grundstück mit einer Drohne in einer Höhe von weniger als 120 m,528 so ist nicht vollständig auszuschliessen, dass die Eigentumsgarantie tangiert wird.529 Dies gilt umso mehr, wenn der Überflug in geringer Höhe (wenige Meter über dem Boden bzw. über den sich darauf befindlichen Gebäuden) erfolgt.530 Werden gleichzeitig Daten bearbeitet, so rückt die Eigentumsgarantie jedoch in den Hintergrund, weshalb sie nicht weiter vertieft wird. § 6 Schutzpflichten im Kontext der informationellen Selbstbestimmung I. Anerkannte Schutzpflichtendimension Es ist noch nicht abschliessend geklärt, welche Grundrechte in welchem Umfang Schutzpflichten auslösen.531 Dabei ist in Lehre und Rechtsprechung anerkannt, dass alle Grundrechte grundsätzlich auch eine Schutzdimension 526 Kiener/Kälin/Wyttenbach, § 30 N 10 f. mit zahlreichen Beispielen. Vgl. zu den drei justiziablen Teilgehalten der Eigentumsgarantie statt vieler BSK BV-Waldmann, Art. 26 N 33 ff. 527 Hrubesch-Millauer/Bruggisser, Rn. 7 ff., v.a. Rn. 20; Christen et al., S. 166 f. 528 Vgl. zu dieser Maximalflughöhe vorne, S. 25 529 Vgl. BGE 142 II 128 E. 2.2; 131 II 137 E. 3.1.2, je m.w.H.; KGer GR, ZK1 14 34 vom 9. Juli 2014 E. 4c. 530 Vgl. Hrubesch-Millauer/Bruggisser, Rn. 20. 531 Kälin/Künzli, Rn. 3.100 ff.; Kiener/Kälin/ yttenbach, § 4 N 18; vgl. BSK BV-Waldmann, Art. 35 N 49. Eine abschliessende Darstellung der Grundrechte, welchen Praxis und Lehre eine Schutzdimension zuerkennen, kann und soll die vorliegende Arbeit nicht leisten. Vgl. für eine Diskussion besonderer Schutzaufträge gemäss BV Egli, S. 160 ff. 70 Teil 2: Die drohnengestützte Datenbearbeitung im Lichte der Grundrechte aufweisen.532 «Innerhalb der einzelnen Grundrechte sind jedoch (…) einige Gehalte besser ‹geeignet›, Schutzpflichten aufleben zu lassen, als andere.»533 Einigkeit herrscht bezüglich Art. 13 Abs. 2 BV und der darin verankerten Schutzdimension: Diese Grundrechtsnorm umfasst klarerweise (auch) Schutzpflichten und kann mithin ein Tätigwerden des Gesetzgebers erforderlich machen.534 Sie enthält denn auch explizit einen «besonderen Schutzauftrag», namentlich den Anspruch auf Schutz vor Missbrauch persönlicher Daten.535 Gemäss dem EGMR begründet Art. 8 EMRK staatliche Schutzpflichten, die «the adoption of measures designed to secure respect for private life even in the sphere of the relations of individuals themselves» beinhalten können.536 Die dort verankerten Ansprüche umfassen auch Schutz durch den Staat,537 namentlich bei Gefährdungen der Privatsphäre und der informationellen Selbstbestimmung.538 Dementsprechend ist dieser gehalten, Verletzungen der Privatsphäre und des Datenschutzes zu verbieten und bei Widerhandlungen Sanktionen vorzusehen, die vor Gericht geltend gemacht werden können.539 Der Staat muss aktiv intervenieren,540 sofern die vorne dargestellten Voraussetzungen gegeben sind.541 532 Kiener/Kälin/Wyttenbach, § 4 N 18; Schefer, Kerngehalte, S. 248 m.w.H.; vgl. Rhinow/Schefer/Uebersax, Rn. 1173. 533 Schefer, Kerngehalte, S. 254; vgl. Auer/Malinverni/Hottelier, Rn. 131. Vgl. dazu den Wortlaut von Art. 35 Abs. 3 BV. 534 Biaggini, «Durchnummerieren», S. 82; Biaggini, Komm. BV, Art. 13 N 16; Egli, S. 164 ff.; Kiener/Kälin/Wyttenbach, § 4 N 18; Schwander, S. 119; Schweizer/ Rechsteiner, Rn. 2.32; Moeckli, Rn. 43. Vgl. auch Häfelin/Haller/Keller/ Thurnherr, Rn. 266. 535 Müller G., HdG VII/2, § 204 Rn. 8; Kiener/Kälin/Wyttenbach, § 4 N 18; Egli, S. 160 ff. 536 Erstmals in EGMR, X und Y c. Niederlande, Nr. 8978/80 (1985) Ziff. 23; seither ständige Rechtsprechung, vgl. z.B. EGMR, Jäggi c. Schweiz, Nr. 58757/00 (2006) Ziff. 33; EGMR (GK), Evans c. Vereinigtes Königreich, Nr. 6339/05 (2007) Ziff. 75; EGMR (GK), Von Han­ nover c. Deutschland (Nr. 2), Nr. 40660/08 und 60641/08 (2012) Ziff. 98; EGMR (GK), Bédat c. Schweiz, Nr. 56925/08 (2016) Ziff. 73; EGMR (GK), Nicolae Virgiliu Tănase c. Rumänien, Nr. 41720/13 (2019) Ziff. 125. 537 Lynskey, S. 114; Kälin/Künzli, Rn. 12.59, je m.w.H. Vgl. auch BGE 136 III 410 E. 6.2, wonach Art. 28 ff. ZGB die zivilrechtliche Konkretisierung von Art. 8 EMRK darstellen und somit den Auftrag für staatliche Schutzmassnahmen verwirklichen, indem sie der verletzten Person zivilrechtliche Rechtsbehelfe zur Verfügung stellen. 538 Vgl. Harris et al., S. 26. 539 Vgl. Nadakavukaren Schefer, S. 269; Kühling, S. 51 mit Hinweisen auf die Rechtsprechung des EGMR. 540 Vgl. Solove, Privacy, S. 34 («To preserve people’s ability to engage in self-definition, the state must actively intervene»); Auer/Malinverni/Hottelier, Rn. 132 («devoir d’intervention»). Vgl. auch Calliess, Schutzpflicht, S. 322. 541 Vorne, S. 51 f. § 6 Schutzpflichten im Kontext der informationellen Selbstbestimmung 71 In der Schweiz findet die Schutzpflichtendimension der informationellen Selbstbestimmung primär in der Datenschutzgesetzgebung sowie dem Persönlichkeitsschutz gemäss ZGB seinen Ausdruck.542 Das Bundesgericht hat in diesem Zusammenhang auch vom «privatrechtlichen, im DSG konkretisierten Recht auf informationelle Selbstbestimmung» gesprochen.543 Dieses Verständnis wird durch den Zweckartikel des E-DSG untermauert; bezweckt wird namentlich der «Schutz der Persönlichkeit und der Grundrechte von natürlichen Personen, über die Personendaten bearbeitet werden».544 Des Weiteren ist auch die Regelung in Art. 26 Abs. 2 lit. b E-DSG, wonach eine Datenbearbeitung entgegen der ausdrücklichen Willenserklärung der betroffenen Person eine Persönlichkeitsverletzung darstellt, als klarer Hinweis auf die Umsetzung der informationellen Selbstbestimmung im E-DSG zu verstehen.545 II. Verfassungsrechtliche Anforderungen an das Datenschutzrecht Durch den Erlass eines Datenschutzgesetzes nimmt der Staat grundsätzlich seine Schutzpflichten im Bereich der informationellen Selbstbestimmung wahr.546 Doch ist insbesondere dieses Gesetz einer ständigen Dynamik unterworfen: Vorkehrungen des Gesetzgebers können durch gesellschaftlichen oder technologischen Wandel unter Druck kommen oder sich als nicht (mehr) ausreichend erweisen,547 was Anpassungen des Gesetzes verlangen kann.548 Umgekehrt ist darauf zu achten, technische Entwicklungen nicht 542 Biaggini, Komm. BV, Art. 13 N 16; Kiener/Kälin/Wyttenbach, § 4 N 18; Moeckli, Rn. 43; Müller/Schefer, S. 166; Schweizer/Rechsteiner, Rn. 2.32. Vgl. Bacher, Rn. 510 mit Fn. 1290. 543 BGE 127 III 481 E. 3b; ähnlich BGE 143 I 253 E. 3.3; 120 II 118 E. 3a; Botschaft Totalrevision DSG, S. 7010. Vgl. BGE 138 II 346 E. 8; Botschaft DSG 1988, S. 417 ff.; Peter, S. 56 f.; SHK DSG-Fey, Art. 1 N 11 f.; Hausheer/Aebi-Müller, Rn. 13.24; Moeckli, Rn. 43; Amtl. Bull. NR 2019 S. 1778 (Votum Glättli). 544 Vgl. dazu BSK DSG-Mauer-Lambrou/Kunz, Art. 1 N 15 ff.; Müller L., Diss., S. 34 m.w.H. 545 Aebi-Müller, Rn. 592; Schweizer M., Rn. 351; Botschaft DSG 1988, S. 459 (je zu Art. 12 DSG). Vgl. auch Art. 26 Abs. 3 E-DSG. 546 Dies mindestens zu einem Teil. Die Wahrnehmung der Schutzpflichten in diesem Bereich finden auch in anderen Gesetzen und Normen ihren Ausdruck, so u.a. in Art. 28 ff. ZGB (vgl. BSK ZGB I-Meili, Art. 28 N 17) oder in den Art. 179 ff. StGB («Straf­ bare Handlungen gegen den Geheim- oder Privatbereich»; vgl. BSK StGB-Ramel/ Vogelsang, Art. 179 N 7). 547 Rupp, S. 74; vgl. Isensee, Handbuch, Rn. 219 lit. e. 548 Vgl. dazu auch vorne, S. 55. 72 Teil 2: Die drohnengestützte Datenbearbeitung im Lichte der Grundrechte zu verhindern oder zu bremsen. Dies nicht nur im Sinne der Verhältnismässigkeit,549 sondern auch mit Blick auf das Gebot der Technologieneutralität. Danach sollen alle Technologien — soweit wie möglich — gleichberechtigt behandelt werden; das Gesetz bleibt dadurch offen für technologische Entwicklungen und verhindert keine Innovationen.550 Das «programmatische Mitbedenken der Grundrechte [hier: der informationellen Selbstbestimmung] durch den Gesetzgeber» in Umsetzung der grundrechtlichen Schutzpflichten geniesst jedoch nicht immer Priorität. «Umso grössere Bedeutung für die Verwirklichung der Grundrechte gewinnt ihre verfahrensrechtliche Durchsetzung und damit der niederschwellige Zugang zur Justiz.»551 Insgesamt steht fest, dass ein — wenn nicht der zentrale — Aspekt der Schutzpflichtendimension der informationellen Selbstbestimmung in deren Durchsetzung zu sehen ist. Der Staat kann und darf nicht hinnehmen, dass der Grundrechtsschutz in diesem Bereich nicht effektiv wahrgenommen werden kann. Denn «Selbstbestimmung und Souveränität bedeuten, dass man weiss, wer wofür verantwortlich ist, oder jedenfalls, dass diese Informa­ tionen durch Fragen zu erlangen sind.»552 549 Vgl. vorne, S. 53. 550 Botschaft Totalrevision DSG, S. 6971; Mauchle, S. 817 m.w.H. Vgl. Harasgama, S. 38 f.; Burkert/Hettich/Thouvenin, S. 49 f.; kritisch Burkert, Rn. 99; Cottier, S. 35. 551 Kiener, Grundrechte in der BV, Rn. 33 in fine. 552 Stinner, Selbstbestimmung, S. 157 (Hervorhebung hinzugefügt); vgl. dazu auch Frei, Rn. 58 sowie vorne, S. 5 f. 73 Teil 3: Bestandesaufnahme (1): Der E-DSG § 1 Vorbemerkungen Nachfolgend wird der E-DSG analysiert und anhand desselben geprüft, ob der Gesetzgeber seinen grundrechtlichen Schutzpflichten im Kontext der informationellen Selbstbestimmung nachgekommen ist. Dabei liegt der Fokus auf der Frage, ob im Datenschutzrecht ein effektiver Schutz der informationellen Selbstbestimmung gewährleistet ist.553 Der Einfachheit halber soll nachfolgend primär von Foto- und Videoaufnahmen die Rede sein, da entsprechende Sensoren am weitesten verbreitet sind.554 Wie bereits ausgeführt, wird das DSG momentan totalrevidiert. Aufgrund der bestehenden Ähnlichkeiten zu den Regeln der EU und deren Bedeutung bei der Ausarbeitung der neuen Bestimmungen555 können bei der Auslegung derselben auch die europäischen Regelungen beigezogen werden.556 Bevor die zentralen Bestimmungen des E-DSG dargestellt und deren Geltung im hier interessierenden Kontext analysiert werden können, gilt es, die Anwendbarkeit des E-DSG auf die drohnengestützte Datenbearbeitung durch Private zu analysieren (S. 75 ff.). Sodann werden insbesondere die Bearbeitungsgrundsätze (S. 82 ff.), die Informationspflicht (S. 93 ff.), das Auskunftsrecht (S. 100 ff.) und die Rechte bei Persönlichkeitsverletzung (S. 106 ff.) detailliert untersucht. 553 Vgl. vorne, S. 54. 554 Vgl. zu den Sensoren vorne, S. 40 ff. Auf andere Arten der Datenbearbeitung sind die nachfolgenden Ausführungen ebenfalls anwendbar. 555 Vgl. dazu vorne, S. 11 ff. 556 Der Gesetzgeber weicht teilweise explizit von den Regelungen der EU ab (sog. «Swiss Finishes»); vgl. dazu z.B. Rosenthal, Entwurf, Rn. 99; Vasella/Sievers, passim; Amtl. Bull. NR 2019 S. 1781 (Voten BR Keller-Sutter, Jauslin). 74 Teil 3: Bestandesaufnahme (1): Der E-DSG § 2 Anwendbarkeit des Datenschutzgesetzes Um zu prüfen, ob die drohnengestützte Datenbearbeitung durch Private in den sachlichen Geltungsbereich557 des E-DSG fällt, müssen zunächst die für das Datenschutzrecht zentralen Termini des «Verantwortlichen» und der «betroffenen Person» definiert werden. Deren Verständnis ist für jede datenschutzrechtliche Auseinandersetzung unabdingbar. I. Verantwortlicher und betroffene Person 1. Verantwortlicher Gemäss Art. 4 lit. i E-DSG ist Verantwortlicher u.a. jede private Person, die allein oder zusammen mit anderen über den Zweck und die Mittel der Datenbearbeitung entscheidet. Der Begriff wurde im Zuge der DSG-Revision aus dem europäischen Recht übernommen, namentlich anstelle des bisherigen «Inhaber[s] der Datensammlung».558 Materiell ergaben sich daraus keine Änderungen.559 Werden mithilfe einer Drohne Daten bearbeitet, so ist der Drohnenbetreiber560 als Verantwortlicher zu qualifizieren. Daneben kommen auch weitere Personen infrage, welche «über den Zweck und die Mittel der Bearbeitung» mitentscheiden.561 Betraut ein Kunde einen Fotografen mit der Erstellung von Drohnenbildern, so sind beide als Verantwortliche im Sinne des E-DSG zu qualifizieren: Der Fotograf entscheidet (zusammen mit dem Kunden) über das Mittel der Datenbearbeitung; der Kunde wiederum entscheidet über den Zweck derselben.562 Im Rahmen der drohnengestützten Datenbearbeitung durch Private kommen somit jeweils der Drohnenbetreiber selbst sowie allfällige Drittpersonen, die mit diesem über den Drohneneinsatz und dessen Zweck entschieden haben, als Verantwortliche in Betracht. 557 Der räumliche Geltungsbereich des E-DSG muss nicht weiter behandelt werden; vgl. nur Art. 2a Abs. 1 E-DSG. 558 Botschaft Totalrevision DSG, S. 6971 und S. 7023. Dies geschah im Sinne einer «Modernisierung der Terminologie» (ebd., S. 6971). 559 Botschaft Totalrevision DSG, S. 7023; vgl. Botschaft DSG 1988, S. 448; Rosenthal, Entwurf, Rn. 18. 560 Vgl. zum Begriff und seiner Verwendung in der vorliegenden Untersuchung vorne, S. 27 f. 561 Ausführlich zu den Begriffen Zweck und Mittel der Bearbeitung Rosenthal, Controller, Rn. 16 ff.; vgl. auch Vasella, Auftragsbearbeitung, S. 110 ff. 562 Eigenes Beispiel nach Malgieri, S. 173. § 2 Anwendbarkeit des Datenschutzgesetzes 2. 75 Betroffene Person Betroffene Person ist die natürliche Person, über die Personendaten bearbeitet werden (Art. 4 lit. b E-DSG). Angesprochen ist damit jeweils diejenige natürliche Person, auf die sich die bearbeiteten Daten beziehen563 bzw. die Trägerin des Persönlichkeits- und Grundrechtsschutzes ist, den der E-DSG bezweckt.564 Anders als unter dem noch geltenden DSG können juristische Personen nicht mehr Betroffene im Sinne de E-DSG sein.565 II. Sachlicher Geltungsbereich Das Datenschutzgesetz gilt für die Bearbeitung von Personendaten natür­ licher Personen durch private Personen und Bundesorgane (Art. 2 Abs. 1 lit. a und b E-DSG). Wird eine Drohne von einer Privatperson zur Erstellung von Foto- und/oder Videoaufnahmen von anderen Personen, Grundstücken etc. verwendet, so fällt dies grundsätzlich in den Geltungsbereich des E-DSG, da regelmässig Personendaten bearbeitet werden.566 III. Ausnahme: Bearbeitung ausschliesslich zum persönlichen Gebrauch Der E-DSG sieht in Art. 2 Abs. 2 Ausnahmen von seinem Geltungsbereich vor.567 Für die vorliegende Untersuchung ist die Klärung der Frage, ob die drohnengestützte Datenbearbeitung durch Private unter die Ausnahmeregelung von Art. 2 Abs. 2 lit. a E-DSG fällt, von zentraler Bedeutung. Aus diesem Grund soll nachfolgend die gesetzliche Regelung im Detail besprochen und insbesondere anhand von deren normativer Grundlage sowie Beispielen analysiert werden. 563 Vgl. Ziebarth, in: Sydow, Art. 4 DSGVO N 9. 564 SHK DSG-Rudin, Art. 3 N 16; vgl. Art. 1 DSG. 565 Mit der Revision des DSG wurde der Schutz der Daten juristischer Personen aufgehoben, wobei ebenfalls eine Angleichung an die Regelung in der EU vorgenommen wurde. Vgl. dazu ausführlich Botschaft Totalrevision DSG, S. 7011 sowie bereits vorne, S. 29 mit den Hinweisen in Fn. 218. 566 Vgl. zu den Begriffen im Einzelnen vorne, S. 29 ff. bzw. S. 33. und zur drohnengestützten Datenbearbeitung S. 33 ff. Vgl. sodann Leissler, S. 535 m.w.H. 567 Die Ausnahmebestimmungen in Art. 2 lit. b und c E-DSG (parlamentarische Beratungen bzw. Immunität nach Gaststaatgesetz [GSG]) sind vorliegend klarerweise nicht einschlägig und werden deshalb nicht vertieft. 76 1. Teil 3: Bestandesaufnahme (1): Der E-DSG Die Regelung des E-DSG Der E-DSG ist nicht anwendbar auf «Personendaten, die von einer natürlichen Person ausschliesslich zum persönlichen Gebrauch bearbeitet werden» (Art. 2 Abs. 2 lit. a E-DSG).568 So sollen rein private Datenbearbeitungen bzw. «die Verwendung von Personendaten im engeren Privat- und Familienleben»569 vom Anwendungsbereich des Gesetzes ausgenommen werden. Die Ausnahmeregelung von Art. 2 Abs. 2 lit. a E-DSG soll dann nicht greifen, wenn bestimmte Datenbearbeitungen «hinsichtlich der Daten oder ihrer Zwecke den persönlichen oder familiären Bereich überschreiten».570 Im Unterschied zum noch geltenden DSG enthält die Ausnahmebestimmung keine Präzisierung mehr, dass für deren Anwendbarkeit die Daten auch nicht an Aussenstehende bekannt gegeben werden dürfen.571 Gemäss Botschaft beinhaltet diese redaktionelle Anpassung jedoch keine materiellen Änderungen der Bestimmung.572 Das europäische Datenschutzrecht enthält eine materiell gleichbedeutende Vorschrift573 in Art. 2 Abs. 2 lit. c DSGVO (sog. Haushaltsausnahme oder Haushaltsprivileg574). Danach findet die Verordnung «keine Anwendung auf die Verarbeitung personenbezogener Daten575 durch natürliche Personen zur Ausübung ausschliesslich persönlicher oder familiärer Tätigkeiten». Literatur und Rechtsprechung zu dieser Bestimmung können somit vorliegend zur Auslegung des E-DSG beigezogen werden. 568 Greift die Ausnahmebestimmung, so kann sich die betroffene Person immer noch auf die allgemeinen Regeln des Persönlichkeitsschutzes (Art. 28 ff. ZGB) berufen (Meier, Rn. 385; BSK DSG- Maurer-Lambrou/Kunz, Art. 2 N 22; Botschaft DSG 1988, S. 441; vgl. Gola, in: Gola, Art. 2 DSGVO N 19). 569 BSK DSG-Maurer-Lambrou/Kunz, Art. 2 N 21. 570 Vgl. Rossnagel, in: Simitis et al., Art. 2 DSGVO N 31; ähnlich Schmidt, in: Taeger/ Gabel, Art. 2 DSGVO N 21. 571 Art. 2 Abs. 2 lit. a DSG lautet: «[Das DSG] ist nicht anwendbar auf Personendaten, die eine natürliche Person ausschliesslich zum persönlichen Gebrauch bearbeitet und nicht an Aussenstehende bekannt gibt.» 572 Botschaft Totalrevision DSG, S. 7012. 573 So bereits zur Rechtslage vor Inkrafttreten der DSGVO Weber/Oertly, Rn. 22. 574 Gola, in: Gola, Art. 2 DSGVO N 19; Leissler, S. 535; Schmidt, in: Taeger/Gabel, Art. 2 DSGVO N 16; Voigt/von dem Bussche, S. 16. 575 «Personenbezogene Daten» ist die Bezeichnung der DSGVO (vgl. Art. 4 Ziff. 1) und weiterer europäischer Regelwerke für Personendaten (vgl. dazu vorne, S. 29 ff.). Die beiden Begriffe sind Synonyme. § 2 Anwendbarkeit des Datenschutzgesetzes 2. 77 Interessenausgleich als normative Grundlage Mit der Haushaltsausnahme soll ein Ausgleich zwischen den durch das Daten­ schutzgesetz zu schützenden Grundrechten und denjenigen des Datenbearbeiters geschaffen werden.576 Auch der Verantwortliche hat Anspruch auf Achtung seiner Privatsphäre sowie seines Privat- und Familienlebens; es gilt mithin, die sich gegenüberstehenden Interessen abzuwägen und einen Inter­ essenausgleich zu schaffen.577 Darin ist denn auch die normative Grundlage der Vorschrift zu sehen; es handelt sich nicht um eine «Bagatellklausel».578 Bei der Prüfung, ob die Haushaltsausnahme einschlägig ist, muss jeweils danach gefragt werden, ob das Verhalten des Verantwortlichen als schutzwürdig erscheint bzw. ob dessen Schutz im Einzelfall demjenigen der grundrechtlich geschützten Ansprüche der betroffenen Person vorgehen kann und soll.579 Aufgrund der Tatsache, dass die Ausnahme den Anwendungsbereich des Datenschutzgesetzes generell ausschliesst — und dies selbst dann, wenn besonders schützenswerte Personendaten bearbeitet werden580 —, muss sie eng und streng sowie grundrechtskonform ausgelegt werden.581 Nur so kann der Zweck des datenschutzrechtlichen Grundrechtsschutzes erfüllt werden.582 576 In Art. 1 E-DSG (und Art. 1 DSG) sind neben der informationellen Selbstbestimmung und der Privatsphäre (Art. 13 BV; Art. 8 EMRK) auch die persönliche Freiheit (Art. 10 Abs. 2 BV) sowie grundsätzlich alle übrigen durch die BV und die EMRK garantierten Grundrechte angesprochen (vgl. dazu BSK DSG-Mauer-Lambrou/Kunz, Art. 1 N 15 ff.; Müller L., Diss., S. 34 m.w.H.; Handkomm. DSG-Rosenthal, Art. 1 N 3). 577 SGK BV-Schweizer, Art. 13 N 74; de Terwangne, champ d’application, Rn. 18; Kühling/Raab, in: Kühling/Buchner, Art. 2 DSGVO N 10 und N 23 in fine; Rossnagel, in: Simitis et al., Art. 2 DSGVO N 23; Weichert, in: Däubler et al., Art. 2 DSGVO N 17. Vgl. Gola, in: Gola, Art. 2 DSGVO N 19; Ennöckl, in: Sydow, Art. 2 DSGVO N 10. 578 So aber Zerdick, in: Ehmann/Selmayr, Art. 2 DSGVO N 10. Wie hier Weichert, in: Däubler et al., Art. 2 DSGVO N 17. 579 Vgl. Botschaft DSG 1988, S. 438: «Der Zweckartikel [des DSG] soll als Leitlinie für die Auslegung der einzelnen Datenschutzbestimmungen den Bezug zum Persönlichkeitsschutz und zu den Grundrechten hervorheben.» 580 Rossnagel, in: Simitis et al., Art. 2 DSGVO N 23; BSK DSG-Maurer-Lambrou/Kunz, Art. 2 N 20. Vgl. auch die Legaldefinition in Art. 4 lit. c E-DSG sowie vorne, S. 31. 581 Weber/Oertly, Rn. 22; Gerschwiler, Rn. 3.36; Rossnagel, in: Simitis et al., Art. 2 DSGVO N 23; Kühling/Raab, in: Kühling/Buchner, Art. 2 DSGVO N 23; de Terwangne, RDTI, S. 47; Weichert, in: Däubler et al., Art. 2 DSGVO N 17; vgl. EuGH, Rs. C-212/13 vom 11. Dezember 2014 František Ryneš, Ziff. 28 f. 582 Vgl. Art. 1 E-DSG und vorne, S. 69 ff., v.a. S. 71 f. 78 3. Teil 3: Bestandesaufnahme (1): Der E-DSG Anwendungsbeispiele Nicht anwendbar ist das Datenschutzgesetz auf ein persönliches Notizbuch oder eine persönliche Agenda583, private Briefsammlungen584 oder Adressverzeichnisse,585 Gästelisten für ein privates Fest oder Daten des persönlichen Konsums (Rechnungen, Bestellungen, Lieferscheine etc.)586 sowie Urlaubsfotos und -filme.587 Es soll verhindert werden, dass der Verantwortliche über Daten Auskunft erteilen muss, die eng mit seiner Privatsphäre und/oder seinem Familienleben verbunden sind.588 Führt man sich die genannten Beispiele vor Augen, so wird klar, dass in diesen Fällen den schutzwürdigen Interessen des Verarbeiters Vorrang vor dem Anspruch auf Datenschutz der Betroffenen zukommen soll. 4. Bekanntgabe an Aussenstehende Die Haushaltsausnahme ist nicht einschlägig, wenn Personendaten nach der Beschaffung Aussenstehenden bekannt gegeben werden.589 Ebenso verhält es sich, wenn eine solche Bekanntgabe bei der Beschaffung bzw. Erstellung der Daten bereits fest beabsichtigt ist.590 Die Bekanntgabe ist als irgendwie geartetes Zugänglichmachen zu verstehen (namentlich etwa eine Publikation im Internet).591 Aussenstehende ist jede Person, die nicht dem engeren Privat- und Familienleben des Datenbearbeiters zugerechnet werden kann.592 Zwischen den Personen muss 583 SHK DSG-Rudin, Art. 2 N 21. 584 Botschaft DSG 1988, S. 441. 585 BSK DSG-Maurer-Lambrou/Kunz, Art. 2 N 20. 586 Rossnagel, in: Simitis et al., Art. 2 DSGVO N 27 mit zahlreichen Hinweisen. Vgl. auch EG 18 DSGVO. 587 Gola, in: Gola, Art. 2 DSGVO N 19. 588 Anschaulich Pedrazzini, Grundlagen, S. 24 («[W]ir haben in den Expertenkommissionen tagelang über diese Grenzziehung der privaten Sphäre diskutiert […]»); Botschaft DSG 1988, S. 441; vgl. Gnehm, S. 89. 589 Vgl. BSK DSG-Maurer-Lambrou/Kunz, Art. 2 N 21; Marzocchi, S. 23; Rossnagel, in: Simitis et al., Art. 2 DSGVO N 29; Schmidt, in: Taeger/Gabel, Art. 2 DSGVO N 18 m.w.H.; EuGH, Rs. C-101/01 vom 6. November 2003 Bodil Lindqvist, Ziff. 47. 590 Müller L., Sicherheit & Recht 2/2012, S. 63 m.w.H.; vgl. auch SHK DSG-Rudin, Art. 2 N 23; BGer, 6B_1188/2018 vom 26. September 2019 E. 3.1 ff. (zur Publikation vorgesehen). Wohl a.M. bezüglich privater Dashcam-Aufnahmen Berger, Rn. 19. 591 SHK DSG-Rudin, Art. 2 N 24. 592 Handkomm. DSG-Rosenthal/Jöhri, Art. 2 N 23. A.M. SHK DSG-Rudin, Art. 2 N 24, der «jede andere Person als der Inhaber der Daten» als Aussenstehenden qualifiziert. Unklar BSK DSG-Maurer-Lambrou/Kunz, Art. 2 N 21. Auf die genaue Anzahl Personen, denen die Daten bekannt gegeben werden, kommt es nicht an (vgl. Uriante, S. 69). § 2 Anwendbarkeit des Datenschutzgesetzes 79 aber nicht zwingend ein Verwandtschaftsverhältnis im Sinne des Zivilrechts593 vorliegen; eine persönliche Beziehung kann auch auf informeller Basis bestehen.594 Bei sozialen Netzwerken etwa ist eine differenzierte Betrachtung notwendig: Beschränkt sich die Zugriffsmöglichkeit auf einen eng begrenzten Personenkreis (z.B. Einzelnachricht), so ist die betreffende Datenbearbeitung grundsätzlich von der Ausnahme erfasst. Wird aber ein unbestimmter Personenkreis erreicht, so greift sie nicht.595 IV. Haushaltsausnahme bei der drohnengestützten Datenbearbeitung? 1. Ausgangsbeispiel: «Nachbarschafts-Drohne» Weber/Oertly hielten zum noch geltenden DSG fest, dass «[m]it Blick auf die ‹Nachbarschafts-Drohnen› davon auszugehen [ist] (…), dass diese regelmässig den Ausnahmetatbestand erfüllen, wenn die aufgenommenen Bilder nicht Drittpersonen zugänglich gemacht werden.»596 Die Autoren gehen dabei von folgendem Sachverhalt aus: «Beispielhaft sei an die Person X zu denken, welche eine Drohne, die geeignet ist, Aufnahmen zu tätigen, direkt über das Gebäude des Nachbargrundstücks kreisen lässt und dadurch Einblicke erhält, die ihr sonst verborgen blieben. Behält X die darauf entstandenen Aufnahmen für sich, ohne sie seinen Eltern, Freunden oder anderen Personen zugänglich zu machen, greift die Ausnahme von Art. 2 Abs. 2 lit. a DSG.»597 593 Vgl. zur Verwandtschaft Art. 20 ZGB (sowie zur Schwägerschaft Art. 21 ZGB); ausführlich dazu statt aller Steinauer/Fountoulakis, Rn. 311 ff. 594 Vgl. Handkomm. DSG-Rosenthal/Jöhri, Art. 2 N 23; Ernst, in: Paal/Pauly, Art. 2 DSGVO N 18; Grafenstein, in: Gierschmann et al., Art. 2 DSGVO N 35; vgl. Pabst, in: Schwartmann et al., Art. 2 DSGVO N 38. 595 Kühling/Raab, in: Kühling/Buchner, Art. 2 DSGVO N 25; Ennöckl, in: Sydow, Art. 2 DSGVO N 13. Dies gilt auch dann, wenn die Personen in diesem Umfeld «Freunde» oder «Follower» genannt werden, vgl. dazu Rossnagel, in: Simitis et al., Art. 2 DSGVO N 29. Vgl. sodann Schmidt, in: Taeger/Gabel, Art. 2 DSGVO N 18. Kritisch zu dieser «strengen Auffassung» Grafenstein, in: Gierschmann et al., Art. 2 DSGVO N 47. 596 Weber/Oertly, Rn. 22. 597 Weber/Oertly, Rn. 21. Ähnlich und die Haushaltsausnahme extensiver auslegend Pauner/Viguri, S. 97 f. (zur Rechtslage in der EU vor Inkrafttreten der DSGVO). Fraglich ist, ob Eltern und Freunde überhaupt als Aussenstehende im Sinne des DSG zu betrachten wären (vgl. dazu vorne, S. 78 f.). 80 2. Teil 3: Bestandesaufnahme (1): Der E-DSG Detailprüfung Diese Auffassung ist insbesondere mit Blick auf die Ziele der DSG-Revision genauer zu überprüfen.598 Der Schutzzweck des Datenschutzrechts und die dadurch gebotene enge Auslegung des Ausnahmetatbestands599 müssen zur Anwendbarkeit des Datenschutzgesetzes führen, wenn moderne Kamerasysteme in Autos600 oder an Drohnen601 mehr als rein private Bereiche überwachen.602 In diesen Fällen wird der persönliche oder familiäre Bereich, welcher das Datenschutzgesetz von seiner Anwendung ausnehmen will, überschritten. Der Ausnahmetatbestand sollte — wie aufgezeigt — nur greifen, wenn es sich mit Blick auf die schutzwürdigen Interessen des Verantwortlichen tatsächlich rechtfertigt, der Datenschutzgesetzgebung die Anwendung zu versagen.603 Wird eine Drohne im Rahmen der Freizeitgestaltung verwendet und entstehen dabei (auch) Foto- oder Videoaufnahmen von fremden Grund­ stücken und/oder Personen, so ist die Haushaltsausnahme grund­sätzlich solange einschlägig, wie diese Daten keinem Aussenstehenden zugänglich gemacht werden.604 Wird ein fremdes Grundstück oder eine bestimmte Person hingegen über eine längere Dauer bzw. systematisch beobachtet, so ist von einer Überwachung auszugehen, was die Ausnahme entfallen lässt.605 Gleich verhält es sich, wenn die Aufnahme einer bestimmten Person bzw. von bestimmten fremden Grundstücken oder Gebäuden explizit beabsichtigt oder zumindest billigend in Kauf genommen wurde. In diesem Fall hat das schutz­ würdige Interesse des Verantwortlichen hinter dasjenige der be­troffenen 598 Vgl. dazu vorne, S. 11 f. 599 Vgl. dazu vorne, S. 77. 600 Hier geht es um sog. Dashcams (d.h. in oder auf Motorfahrzeugen installierte Kameras). In den Erläuterungen des EDÖB dazu wird die Ausnahmeregelung von Art. 2 Abs. 2 lit. c DSG gar nicht thematisiert (vgl. EDÖB, Dashcams). Berger, Rn. 19, hält dafür, dass die private Verwendung von Dashcams grundsätzlich von der Haushaltsausnahme erfasst wird; a.M. Arnosti, Rn. 60 ff., v.a. Rn. 67. 601 Rossnagel, in: Simitis et al., Art. 2 DSGVO N 31; Schmidt, in: Taeger/Gabel, Art. 2 DSGVO N 21 in fine. 602 Gola, in: Gola, Art. 2 DSGVO N 19; Plath, in: Plath, Art. 2 DSGVO N 24. Vgl. de Terwangne, champ d’application, Rn. 19 m.w.H. 603 Vgl. unter Bezugnahme auf die Privatsphäre des Verarbeiters Müller L., Diss., S. 40. Ausführlich zur Interessenabwägung vorne, S. 77. 604 Vgl. Rossnagel, in: Simitis et al., Art. 2 DSGVO N 31; Bischof, S. 144; de Terwangne, champ d’application, Rn. 19; Kühling/Raab, in: Kühling/Buchner, Art. 2 DSGVO N 27; Unabhängiges Datenschutzzentrum Saarland, S. 111 f. 605 Gola, in: Gola, Art. 2 DSGVO N 19 in fine; ähnlich Griebel, S. 111; vgl. auch Rose, S. 140. § 3 Zentrale Bestimmungen des E-DSG 81 Person zurückzutreten. Werden drohnengestützt Daten im öffentlichen Raum beschafft, so entfällt die Haushaltsausnahme ebenfalls.606 3. Zusammenfassung und Fazit Insgesamt kann auch unter dem E-DSG festgehalten werden, dass gewisse drohnengestützte Datenbearbeitungen durch Private nicht in den Anwendungsbereich des E-DSG fallen. Die erwähnte «Nachbarschafts-Drohne» fällt jedoch nicht unter die Haushaltsausnahme: Der Umstand, dass die Person X gemäss Beispiel die Drohne «direkt über das Gebäude des Nachbargrundstücks kreisen lässt und dadurch Einblicke erhält, die ihr sonst verborgen blieben», spricht für eine bewusste und beabsichtigte Beobachtung. Im Rahmen der Interessenabwägung im Einzelfall erscheint dieses Verhalten als wenig schutzwürdig; die datenschutzrechtlichen Ansprüche der Betroffen müssen vorgehen. Somit wird die Mehrzahl der privat erstellten Aufnahmen mit Drohnen in den Anwendungsbereich des E-DSG fallen.607 § 3 Zentrale Bestimmungen des E-DSG Nachdem nun feststeht, dass der E-DSG ohne Weiteres auf die drohnen­ gestützte Datenbearbeitung durch Private anwendbar ist und die Ausnahme gemäss Art. 2 Abs. 2 lit. a E-DSG nur in Einzelfällen greift, gilt es, die zentralen Vorschriften dieses Gesetzes und deren Anwendung auf die drohnengestützte Datenbearbeitung zu erläutern.608 Aufgrund der Totalrevision des DSG609 soll eingangs kurz dargestellt werden, in welchen Bereichen das neue Datenschutzrecht Änderungen mit sich bringt und wo die bisher geltenden Regelungen übernommen wurden. Die in Art. 5 und 7 E-DSG festgehaltenen Grundsätze der Datenbearbeitung wurden praktisch unverändert aus dem alten Recht übernommen;610 deshalb sollen diese nachfolgend nur kurz dargestellt und auf ihre Bedeu606 Dieckert, in: Dieckert/Eich, S. 408. Vgl. Uschkereit/Zdanowiecki, S. 447; EuGH, Rs. C-212/13 vom 11. Dezember 2014 František Ryneš, Ziff. 31 ff. Wohl anders für das deutsche Recht vor Inkrafttreten der DSGVO Solmecke/Novak, S. 433. Kritisch Schmidt, in: Taeger/Gabel, Art. 2 DSGVO N 21. 607 Im Ergebnis gleich Griebel, S. 111 (zur DSGVO). 608 Nicht behandelt werden etwa folgende Bestimmungen des E-DSG: Art. 11: Verzeichnis der Bearbeitungstätigkeiten; Art. 12: Zertifizierung; Art. 13–15: Datenbekanntgabe ins Ausland; sowie Art. 22: Meldung von Verletzungen der Datensicherheit. Diese sind für die vorliegende Untersuchung nicht von Bedeutung oder gar nicht einschlägig. 609 Vgl. dazu vorne, S. 11 ff. 610 Vgl. Botschaft Totalrevision DSG, S. 7024 ff.; Rosenthal, Entwurf, Rn. 28. 82 Teil 3: Bestandesaufnahme (1): Der E-DSG tung im Zusammenhang mit der drohnengestützten Datenbearbeitung hin untersucht werden (dazu sogleich). Die Rechte der Betroffenen sind jedoch ausgebaut und verstärkt worden. Ein Ziel der Revision war es denn auch, die Transparenz von Datenbearbeitungen zu erhöhen; dies ging mit ausgebauten Informationspflichten einher (hinten, S. 93 ff.).611 Auch das Auskunftsrecht, welches die Informationspflicht des Verantwortlichen ergänzt, wurde ausgebaut (dazu hinten, S. 100 ff.).612 Keine materiellen Änderungen ergaben sich bei den Rechten der betroffenen Person bei Persönlichkeitsverletzungen; diese Normen wurden übernommen (S. 106 ff.). Neu eingeführt wurden dagegen die Vorgaben zu «Privacy by Design» (S. 89 ff.) sowie die Datenschutz-Folgenabschätzung (dazu S. 98 ff.). Der Aufbau der nachfolgenden Ausführungen orientiert sich an der Systematik des E-DSG. I. Bearbeitungsgrundsätze Die Grundsätze der Datenbearbeitung sind in den Art. 5 und 7 E-DSG geregelt. Werden diese nicht eingehalten, führt dies zu einer Persönlichkeitsverletzung, welche möglicherweise durch einen Rechtfertigungsgrund gedeckt ist (Art. 26 f. E-DSG).613 Nachfolgend ist im Einzelnen zu skizzieren, welche Bedeutung den datenschutzrechtlichen Bearbeitungsgrundsätzen allgemein und insbesondere im Zusammenhang mit der drohnengestützten Daten­ bearbeitung durch Private zukommt. 1. Rechtmässigkeit Gemäss Art. 5 Abs. 1 E-DSG müssen Personendaten rechtmässig bearbeitet werden. Rechtswidrig ist eine Datenbearbeitung insbesondere, wenn damit gegen eine Bestimmung der Schweizer Rechtsordnung verstossen wird, wobei zivilrechtliche oder strafrechtliche Normen im Vordergrund stehen.614 Vorausgesetzt ist zudem, dass die verletzte Bestimmung «zumindest auch, direkt oder indirekt, den Schutz der Persönlichkeit einer Person bezweckt».615 611 Botschaft Totalrevision DSG, S. 6972 f. und S. 7050 ff. Kritisch dazu Rosenthal, Entwurf, Rn. 93 ff. 612 Botschaft Totalrevision DSG, S. 7066 ff. 613 So verhält es sich auch unter dem noch geltenden DSG. Vgl. dazu statt anderer Rosenthal, Entwurf, Rn. 29; Handkomm. DSG-Rosenthal, Art. 4 N 2 (umstritten; vgl. ausführlich Epiney, in: Belser/Epiney/Waldmann, § 9 Rn. 5 ff.). Zu den Rechten bei Persönlichkeitsverletzungen und den Rechtfertigungsgründen hinten, S. 106 ff. 614 BSK DSG-Maurer-Lambrou/Steiner, Art. 4 N 6; SHK DSG-Baeriswyl, Art. 4 N 11 ff.; Meier, Rn. 640 f.; Handkomm. DSG-Rosenthal, Art. 4 N 7. 615 BVGer, A-3548/2018 vom 19. März 2019 E. 5.4.4. Zustimmend Vasella, Helsana+; kritisch Baeriswyl, Entwicklungen, S. 593. § 3 Zentrale Bestimmungen des E-DSG 83 Aus strafrechtlicher Sicht stehen die Bestimmungen von Art. 179 ff. StGB616 und insbesondere der Tatbestand der Verletzung des Geheim- oder Privatbereichs durch Aufnahmegeräte (Art. 179quater StGB) im Vordergrund. Es ist nicht auszuschliessen, dass sich ein Privater, der drohnengestützt Bilder von Grundstücken und den sich darauf befindlichen Personen erstellt, gemäss Art. 179quater StGB strafbar macht.617 Aus zivilrechtlicher Optik sind etwa die Täuschung (Art. 28 OR) und Drohung (Art. 29 f. OR) zu beachten.618 2. Treu und Glauben und Verhältnismässigkeit 2.1 Verhältnismässigkeit Die Bearbeitung muss nach Treu und Glauben erfolgen und verhältnismässig sein (Art. 5 Abs. 2 E-DSG). Verhältnismässigkeit bedeutet in diesem Zusammenhang, dass die Art und Weise sowie der Zweck der Bearbeitung geeignet und erforderlich sein müssen, um das angestrebte Ziel zu erreichen. Zudem hat ein angemessenes Verhältnis zwischen dem Zweck und dem verwendeten Mittel zu bestehen.619 Über diese drei klassischen Vorgaben der Verhältnismässigkeit hinaus sind die Rechte der betroffenen Personen soweit wie möglich zu wahren.620 Die Grundsätze der Datenvermeidung und der Datensparsamkeit ergeben sich aus dem datenschutzrechtlichen Verhältnismässigkeitsgrundsatz.621 Die in Art. 5 Abs. 4 E-DSG verankerte Regelung zur Dauer der Aufbewahrung von Daten ist als Regel der Datensparsamkeit bzw. -vermeidung und mithin als Ausfluss des Verhältnismässigkeitsprinzips zu verstehen.622 Namentlich sollen jeweils nur so viele Daten bearbeitet werden, wie zur Erreichung des 616 Epiney, in: Belser/Epiney/Waldmann, § 9 Rn. 13; SHK DSG-Baeriswyl, Art. 4 N 11. 617 Dazu aus Sicht der (statischen) Videoüberwachung Müller L., Sicherheit & Recht 2/2012, S. 67. Daneben könnte auch Art. 179 ter (Unbefugtes Aufnehmen von Gesprächen) einschlägig sein. Allgemein zu diesen Strafbestimmungen statt anderer BSK StGB-Ramel/Vogelsang, Art. 179quater N 5 ff. bzw. Art. 179 ter N 3 ff. 618 Handkomm. DSG-Rosenthal, Art. 4 N 7. Vgl. dazu statt aller BSK OR I-Schwenzer/ Fountoulakis, Art. 28 und Art. 29/30, passim. 619 BGE 138 II 346 E. 9.2; Botschaft DSG 1988, S. 450; Müller L., Sicherheit & Recht 2/2012, S. 70; Epiney, in: Belser/Epiney/Waldmann, § 9 Rn. 23 und ausführlich zu den einzelnen Teilaspekten Rn. 26 f. 620 Botschaft Totalrevision DSG, S. 7050; vgl. Handkomm. DSG-Rosenthal, Art. 4 N 20 f. 621 SHK DSG-Baeriswyl, Art. 4 N 23; Epiney, in: Belser/Epiney/Waldmann, § 9 Rn. 27 mit Fn. 83. Diese beiden Grundsätze werden im DSG nicht explizit genannt. Teilweise wird auch der Begriff der Datenminimierung verwendet (so Art. 5 Abs. 1 lit. c DSGVO); vgl. dazu Frenzel, in: Paal/Pauly, Art. 5 DSGVO N 34. 622 Botschaft Totalrevision DSG, S. 7026; Epiney, in: Belser/Epiney/Waldmann, § 9 Rn. 27, zweites Lemma in fine; Meier, Rn. 633. 84 Teil 3: Bestandesaufnahme (1): Der E-DSG Zwecks notwendig ist.623 Des Weiteren fordert diese Norm, dass Daten vernichtet oder anonymisiert werden, sobald sie zum Zweck der Bearbeitung nicht mehr erforderlich sind.624 Im Kontext der drohnengestützten Datenbearbeitung durch Private kommen verschiedene Massnahmen zur Datensparsamkeit in Betracht. So könnte etwa ein Drohnenbetreiber die Kamera nicht während des gesamten Fluges laufen lassen und/oder das Mikrofon nur aktivieren, wenn dies notwendig ist.625 2.2 Treu und Glauben Die bereits in der Bundesverfassung (Art. 5 Abs. 3 und Art. 9 BV) sowie im Zivilrecht (Art. 2 Abs. 1 ZGB) verankerte «Fundamentalnorm»626 von Treu und Glauben besagt allgemein, dass im Rechtsverkehr ein loyales und vertrauenswürdiges Verhalten geboten ist; widersprüchliches Verhalten läuft dem zuwider.627 Im Datenschutzrecht stellt dieser Grundsatz eine Generalklausel dar, welche dort zum Zuge kommt bzw. kommen kann, wo die anderen Grundsätze nicht greifen.628 Im Zusammenhang mit der drohnengestützten Datenbearbeitung durch Private kommt dem Grundsatz von Treu und Glauben insofern Bedeutung zu, als eine heimliche Datenbearbeitung oder eine solche, mit der die betroffene Person nicht rechnen muss, diesen Grundsatz verletzt.629 Die Datenbearbeitung ist mithin rechtswidrig, und dies selbst dann, wenn gegen keine (andere) Rechtsnorm verstossen wird.630 623 Dies bringt der E-DSG in Art. 6 Abs. 3 explizit zum Ausdruck. Vgl. dazu Botschaft Total­revision DSG, S. 7030. 624 Die ausdrückliche Nennung im Gesetz sollte diesen Vorgaben «im Hinblick auf die technologische Entwicklung und die beinahe unbegrenzten Speichermöglichkeiten» Nachdruck verleihen; vgl. dazu Botschaft Totalrevision DSG, S. 7026. 625 Vgl. Harris/Given, S. 9. 626 BSK DSG-Maurer-Lambrou/Steiner, Art. 4 N 7 mit Hinweis auf BGE 128 III 201 E. 1c. 627 SHK DSG-Baeriswyl, Art. 4 N 17; Epiney, in: Belser/Epiney/Waldmann, § 9 Rn. 21; Kiener/Kälin/Wyttenbach, § 34 Rn. 5 f.; SGK BV-Schindler, Art. 5 N 55. 628 Epiney, in: Belser/Epiney/Waldmann, § 9 Rn. 22; SHK DSG-Baeriswyl, Art. 4 N 18; Handkomm. DSG-Rosenthal, Art. 4 N 14; vgl. BSK DSG-Maurer-Lambrou/Steiner, Art. 4 N 8. 629 Vgl. Botschaft DSG 1988, S. 449; SHK DSG-Baeriswyl, Art. 4 N 19. Die Abgrenzung zur Erkennbarkeit kann sich im konkreten Fall als schwierig erweisen; vgl. dazu auch sogleich, S. 85 f. 630 BVGer, A-3144/2008 vom 27. Mai 2009 E. 9.3.1; BSK DSG-Maurer-Lambrou/Steiner, Art. 4 N 8; SHK DSG-Baeriswyl, Art. 4 N 19. § 3 Zentrale Bestimmungen des E-DSG 3. 85 Zweckbindung und Erkennbarkeit (Transparenz) Art. 5 Abs. 3 E-DSG schreibt vor, dass Personendaten nur zu einem bestimmten und für die betroffene Person erkennbaren Zweck beschafft werden dürfen; sie dürfen nur so bearbeitet werden, dass es mit diesem Zweck vereinbar ist. Diese Bestimmung wurde im E-DSG neu gefasst und enthält nun die Grundsätze der Zweckbindung sowie der Transparenz; materiell ergaben sich daraus keine Änderungen im Verhältnis zum noch geltenden Recht.631 3.1 Zweckbindung Gemäss dem Grundsatz der Zweckbindung soll eine betroffene Person bereits zu Beginn wissen, wofür die über sie bearbeiteten Daten verwendet werden.632 Der Verantwortliche darf die Daten sodann nicht «zweckentfremden», d.h., er darf sie nicht ohne Weiteres für einen anderen als den ursprüng­lich vorgesehenen Zweck bearbeiten.633 Informiert ein Drohnenbetreiber die betroffene Person zwar, verwendet die entstandenen Aufnahmen anschliessend jedoch zu anderen Zwecken, so ist der Grundsatz der Zweckbindung verletzt. Im Kontext der drohnen­ gestützten Datenbearbeitung durch Private kommt der Zweckbindung aber keine besondere Bedeutung zu. Ist eine Datenbearbeitung an sich für die betroffene Person nicht erkennbar, so kann sie sich auch über den Zweck der Bearbeitung nicht im Klaren sein. 3.2 Erkennbarkeit Der Grundsatz der Erkennbarkeit (oder Transparenz) verlangt, dass die Beschaffung von Personendaten und insbesondere der Zweck ihrer Bearbeitung für die betroffene Person erkennbar sind.634 «Die Erkennbarkeit der Datenbearbeitung — das Prinzip der Transparenz — ist Grundlage des Rechts auf in­ for­mationelle Selbstbestimmung und Voraussetzung für die Wahrnehmung 631 Botschaft Totalrevision DSG, S. 7024 f. Die beiden Grundsätze stehen denn auch in einem engen Zusammenhang (Epiney, in: Belser/Epiney/Waldmann, § 9 Rn. 29). 632 Botschaft DSG 1988, S. 451; Epiney, in: Belser/Epiney/Waldmann, § 9 Rn. 29; BSK DSG-Maurer-Lambrou/Steiner, Art. 4 N 13; vgl. Peter, S. 126 f. 633 Epiney, in: Belser/Epiney/Waldmann, § 9 Rn. 29 und Rn. 35; vgl. BSK DSG-Maurer-Lambrou/Steiner, Art. 4 N 14b; BGE 138 II 346 E. 9.1. 634 Botschaft Revision DSG 2003, S. 2124; Epiney, in: Belser/Epiney/Waldmann, § 9 Rn. 37; BSK DSG-Maurer-Lambrou/Steiner, Art. 4 N 16a. Vgl. zum Zusammenspiel zwischen den Grundsätzen der Erkennbarkeit und von Treu und Glauben Gerschwiler, Rn. 3.89 f. 86 Teil 3: Bestandesaufnahme (1): Der E-DSG datenschutzrechtlicher Ansprüche.»635 Die Verbesserung dieser Transparenz war denn auch Teil verschiedener DSG-Revisionen.636 Sie kann als «Eckpfeiler des ganzen Datenschutzsystems» bezeichnet werden.637 Ob die Erkennbarkeit bejaht werden kann, ist nach den konkreten Umständen des Einzelfalls zu beurteilen.638 Ist eine Bearbeitung nicht oder nicht deutlich erkennbar, so hat der oder die Verantwortliche zusätzliche Informationen bereitzustellen. Gleiches gilt, wenn die Datenbeschaffung in einer konkreten Situation erkennbar, der Zweck derselben aber nicht ersichtlich ist.639 Nicht vorgegeben ist, in welcher Form die Erkennbarkeit sichergestellt werden soll.640 Auch diesbezüglich gilt, den Umständen des Einzelfalls Rechnung zu tragen sowie anhand der Vorgaben der Verhältnismässigkeit und von Treu und Glauben vorzugehen. Im Kontext der drohnengestützten Datenbearbeitung durch Private ist dem Transparenzgebot regelmässig nicht Genüge getan. Die betroffenen Personen sind sich über den Zweck einer drohnengestützten Datenbearbeitung meist nicht im Klaren. In den allermeisten Fällen kann eine allfällig betroffene Person nicht einmal erkennen, ob und welche Daten mit einer Drohne bearbeitet werden.641 4. Datenrichtigkeit Der Grundsatz der Datenrichtigkeit wurde aus Art. 5 DSG übernommen und mit den anderen zentralen Grundsätzen des E-DSG in einer einzigen Bestimmung zusammengeführt.642 Er besagt, dass, wer Personendaten bearbeitet, sich über deren Richtigkeit vergewissern muss. «Sie oder er muss alle angemessenen Massnahmen treffen, damit die Daten berichtigt, gelöscht oder vernichtet werden, die im Hinblick auf den Zweck ihrer Beschaffung oder Bearbeitung unrichtig oder unvollständig sind. Die Angemessenheit der Massnahmen hängt namentlich ab von der Art und dem Umfang der 635 SHK DSG-Baeriswyl, Art. 4 N 48. Vgl. auch Bull, Selbstbestimmung, S. 60. 636 Vgl. Botschaft Revision DSG 2003, S. 2124 ff. und S. 2130 ff.; Botschaft Totalrevision DSG, S. 7010 und S. 7050. 637 Botschaft Revision DSG 2003, S. 2126; SHK DSG-Baeriswyl, Art. 4 N 48; vgl. Rosenthal, Entwurf, Rn. 28. 638 Epiney, in: Belser/Epiney/Waldmann, § 9 Rn. 39; Meier, Rn. 707; SHK DSG-Baeriswyl, Art. 4 N 48. 639 SHK DSG-Baeriswyl, Art. 4 N 50; vgl. Epiney, in: Belser/Epiney/Waldmann, § 9 Rn. 40; Meier, Rn. 708 ff. 640 Meier, Rn. 711 ff. mit Beispielen. 641 Vgl. Masutti/Tomasello, S. 223; vgl. auch vorne, S. 5 f. 642 Botschaft Totalrevision DSG, S. 7026. § 3 Zentrale Bestimmungen des E-DSG 87 Datenbearbeitung sowie von den Risiken, welche die Bearbeitung für die Per­­sön­lichkeit und Grundrechte der betroffenen Personen mit sich bringt» (Art. 5 Abs. 5 E-DSG).643 Die Bestimmung ist vor allem im Bereich von wirtschaftlichen Transaktionen von Bedeutung. Wird z.B. bei der Beurteilung der Kreditwürdigkeit einer Person auf nicht korrekte Angaben zur finanziellen Situation oder auf eine falsche Wohnadresse derselben abgestellt, so sind diese Daten zu berichtigen.644 Bei der drohnengestützten Datenbearbeitung durch Private rückt die Datenrichtigkeit deshalb in den Hintergrund. 5. Einwilligung Art. 5 Abs. 6 E-DSG schreibt vor, dass die Einwilligung der betroffenen Person — falls sie erforderlich ist — nur gültig ist, wenn sie für eine oder mehrere bestimmte Bearbeitungen nach angemessener Information freiwillig erteilt wird. Die Einwilligung ist an keine Form gebunden; eine schriftliche Erklärung ist nicht erforderlich.645 Die Einwilligung kann somit auch durch eine stillschweigende bzw. konkludente Willenserklärung erfolgen (vgl. Art. 1 OR).646 Eine Information ist dann «angemessen» im Sinne der hier diskutierten Bestimmung, wenn die betroffene Person darauf gestützt die Datenbearbeitung in Bezug auf die Risiken für ihre Persönlichkeitsrechte einschätzen kann.647 Primär soll dazu über Umfang und Zweck der Datenbearbeitung informiert werden.648 Unfreiwillig erfolgt die Einwilligung, «wenn bei einer Verweigerung Nachteile drohen, die mit dem Bearbeitungszweck in keinem sachlichen Zusammenhang stehen oder aus anderen Gründen unverhältnismässig sind».649 643 Vgl. auch Handkomm. DSG-Rosenthal, Art. 5 N 1. Zu den gesetzlichen Ausnahmen der Berichtigungs-, Vernichtungs- und Löschungspflicht vgl. Botschaft Totalrevision DSG, S. 7026 f. 644 Ausführlich zum Ganzen Meier, Rn. 743 ff.; SHK DSG-Baeriswyl/Blonski, Art. 5 N 5 ff. 645 Botschaft Totalrevision DSG, S. 7027; Botschaft Revision DSG 2003, S. 2127; Meier, Rn. 874; Handkomm. DSG-Rosenthal, Art. 4 N 77; vgl. zur DSGVO Scheurer, S. 178 ff. 646 Haas, Rn. 229 ff.; Botschaft Totalrevision DSG, S. 7027; vgl. auch BGE 123 III 53 E. 5a; Hausheer/Aebi-Müller, Rn. 12.18. Zum Begriff der stillschweigenden Willenserklärung statt vieler BSK OR I-Zellweger-Gutknecht, Art. 1 N 17 m.w.H. 647 Vgl. SHK DSG-Baeriswyl, Art. 4 N 59; Meier, Rn. 826 f. 648 Botschaft Totalrevision DSG, S. 7027. Zu weiteren Aspekten SHK DSG-Baeriswyl, Art. 4 N 60 f.; Handkomm. DSG-Rosenthal, Art. 4 N 72 f. 649 Statt vieler Vasella, Jusletter, Rn. 14 mit zahlreichen Hinweisen. Vgl. auch BGE 138 II 331 E. 7.4.1. 88 Teil 3: Bestandesaufnahme (1): Der E-DSG Je sensibler die infrage stehenden Personendaten sind, desto höhere Anforderungen sind an die Eindeutigkeit zu stellen.650 Diesem Anspruch lebt Art. 5 Abs. 7 E-DSG denn auch nach, indem er für die Bearbeitung von besonders schützenswerten Personendaten eine ausdrückliche Einwilligung verlangt.651 «Eine Willenserklärung ist ‹ausdrücklich›, wenn sie durch geschriebene oder gesprochene Worte oder ein Zeichen erfolgt und der geäusserte Willen [recte: Wille] aus den verwendeten Worten oder dem Zeichen unmittelbar hervorgeht.»652 Eine ausdrückliche Willenserklärung kann mithin «auch etwa durch Kopfnicken und generell durch ein gesellschaftlich anerkanntes oder durch die Parteien im Einzelfall vereinbartes Kommunikationsmittel» erfolgen.653 Damit eine gültige Einwilligung vorliegen würde, müsste der Private, welcher mit seiner Drohne Daten bearbeiten will, die (möglicherweise) betroffenen Personen vorab über die Bearbeitung und deren Zweck informieren. Da für die Bearbeitung besonders schützenswerter Personendaten eine Einwilligung ausdrücklich zu erfolgen hat, müssten z.B. Grundstückeigentümer direkt kontaktiert werden.654 Diese Vorgaben werden in der Praxis wohl kaum einmal erfüllt werden (können).655 Der Einwilligung kommt im vor­ liegend interessierenden Bereich somit keine allzu grosse Bedeutung zu.656 6. Rechtsfolge bei Missachtung Werden die Bearbeitungsgrundsätze nicht eingehalten, liegt regelmässig eine Persönlichkeitsverletzung im Sinne von Art. 26 E-DSG vor. Dagegen kann sich die betroffene Person mit den Klagen nach Art. 28 E-DSG zur Wehr setzen.657 650 Vgl. Botschaft Totalrevision DSG, S. 7027. 651 Botschaft Totalrevision DSG, S. 7028; vgl. Botschaft Revision DSG 2003, S. 2127; Meier, Rn. 897. Eine detaillierte Diskussion der in der Schweiz vertretenen Auslegungen der «Ausdrücklichkeit» findet sich bei Vasella, Jusletter, Rn. 21 ff. mit zahlreichen Hinweisen. 652 Botschaft Totalrevision DSG, S. 7028 u.a. mit Hinweis auf BGE 121 III 31 E. 2c. Differenzierend zur Ausdrücklichkeit der Einwilligung Epiney, S. 103 mit Fn. 25. 653 Vasella, Jusletter, Rn. 26 m.w.H.; Handkomm. DSG-Rosenthal, Art. 4 N 78; vgl. Rosenthal, Entwurf, Rn. 39; Scheurer, S. 177 f. 654 Zur drohnengestützten Bearbeitung besonders schützenswerter Personendaten vgl. vorne, S. 34. 655 In Betracht käme etwa ein Hochzeitsfotograf, welcher die Anwesenden vor der Fotosession informiert. Diese Konstellation ist jedoch nicht Fokus der vorliegenden Untersuchung. Vgl. in diesem Kontext auch EASA, GM Implementing Regulation, S. 6 f. 656 Vgl. BSK ZGB II-Ernst, Art. 928 N 3a, zur Einwilligung des Besitzers (eines Grundstücks) in den Überflug mit einer Drohne. 657 Ausführlich dazu hinten, S. 106 ff. § 3 Zentrale Bestimmungen des E-DSG 89 Strafbewehrt ist eine Missachtung der Grundsätze von Art. 5 und 7 E-DSG dagegen nicht.658 Eine Bestrafung wäre denn auch unverhältnismässig; ein zivilrechtliches Vorgehen erscheint als geeignetere Massnahme, um Abhilfe zu schaffen. II. Privacy by Design Art. 6 E-DSG normiert «Datenschutz durch Technik und datenschutzfreundliche Voreinstellungen». Gemeint sind damit «Privacy by Design»659 bzw. «Data Protection by Design»660 und «Privacy by Default».661 1. Die Regelung im Einzelnen 1.1 Datenschutz durch Technik «Der Verantwortliche ist verpflichtet, die Datenbearbeitung technisch und organisatorisch so auszugestalten, dass die Datenschutzvorschriften eingehalten werden, insbesondere die Grundsätze nach Artikel 5 [E-DSG].662 Er berücksichtigt dies ab der Planung» (Art. 6 Abs. 1 E-DSG).663 «Datenschutzvorschriften» im Sinne dieser Bestimmung meint neben den exemplarisch erwähnten Datenbearbeitungsgrundsätzen auch die weiteren Anforderungen des E-DSG; diese sind einzuhalten und die Rechte der betroffenen Personen zu schützen.664 Ziel der Norm ist die Verwirklichung von datenschutzrechtlichen Anforderungen im System, und zwar dergestalt, dass die Gefahr von Verstössen gegen datenschutzrechtliche Vorgaben reduziert oder ausgeschlossen wird.665 658 Vgl. Art. 54 ff. E-DSG. 659 Botschaft Totalrevision DSG, S. 7029. Zum Ursprung dieses Begriffs Solove, Privacy by Design, S. 191 m.w.H. Kritisch zur Verwendung von «Privacy» im Zusammenhang mit der DSGVO, da dieser Begriff nicht mit «Datenschutz» gleichzusetzen sei, Hansen, in Simitis et al., Art. 25 DSGVO N 23; vgl. auch González Fuster, S. 254 ff., die von einem «Process of Legal Miscommunication» spricht. 660 Zu diesem Begriff bspw. Sydow, in: Sydow, Einleitung N 93. 661 Art. 6 Abs. 3 E-DSG. Im Kontext der drohnengestützten Datenbearbeitung durch Private kommt den datenschutzfreundlichen Voreinstellungen keine Bedeutung zu. Die Vorschrift zielt vielmehr auf ein Nutzer-Anwendungsanbieter-Verhältnis ab; vgl. Botschaft Totalrevision DSG, S. 7030; Hansen, in Simitis et al., Art. 25 DSGVO N 40. 662 Vgl. zu den Bearbeitungsgrundsätzen vorne, S. 82 ff. 663 Die Bestimmung ist inhaltlich an Art. 25 DSGVO angelehnt. Die Botschaft Totalrevision DSG, S. 7029, verweist denn auch explizit darauf. Literatur zur DSGVO kann somit auch hier zur Auslegung beigezogen werden. 664 Vgl. Mantz, in: Sydow, Art. 25 DSGVO N 19; Koops/Leenes, S. 163. 665 Botschaft Totalrevision DSG, S. 7029; vgl. Tamò-Larrieux, S. 86; Mantz, in: Sydow, Art. 25 DSGVO N 19. 90 Teil 3: Bestandesaufnahme (1): Der E-DSG Dabei müssen die Massnahmen des «Data Protection by Design» während des gesamten Lebenszyklus der Daten666 aufrechterhalten und ggf. angepasst bzw. verbessert werden.667 Als Umsetzungsbeispiele kommen die regelmässige Löschung von Daten oder deren standardmässige Anonymisierung in Betracht;668 kommt eine Kamera zum Einsatz, können z.B. Gesichter oder Personen durch Software unkenntlich gemacht werden.669 Aus organisatorischer Sicht sind sodann etwa die Regelung von Informationsflüssen, die Festlegung von Verhaltensregeln und das Abhalten von Schulungen denkbar.670 Hervorzuheben ist, dass Hersteller von Produkten und Applikationen nicht von Art. 6 E-DSG erfasst sind; Normadressat ist einzig der Verantwortliche.671 Letzterer ist mithin bei der Wahl der Massnahme auf diejenige Technik beschränkt, welche ihm angeboten wird.672 Dem Beispiel der DSGVO folgend, zielt auch der E-DSG darauf ab, Datenschutz durch Technik «übers Dreieck» zu erreichen, indem die Pflichten der Verantwortlichen die Nachfrage nach entsprechenden Produkten, Applikationen und Diensten bei den Herstellern erzeugt.673 1.2 Beurteilung der Angemessenheit Die technischen und organisatorischen Massnahmen müssen insbesondere dem Stand der Technik, der Art und dem Umfang der Datenbearbeitung sowie den Risiken, welche die Bearbeitung für die Persönlichkeit und Grundrechte der betroffenen Personen mit sich bringt, angemessen sein (Art. 6 Abs. 2 E-DSG).674 «Je höher das Risiko, je grösser die Eintrittswahrscheinlichkeit und je umfangreicher die Datenbearbeitung ist, umso höher 666 Ausführlich zum «life cycle of data» Tamò-Larrieux, S. 149 ff. 667 Tamò-Larrieux, S. 86; Mantz, in: Sydow, Art. 25 DSGVO N 19. 668 Botschaft Totalrevision DSG, S. 7029. Vgl. zur automatischen Anonymisierung BGE 138 II 436 E. 14.1. 669 Leenes et al., S. 28; vgl. auch BGE 138 II 436 E. 10.6.2; Vivet/Smith, S. 8 f. 670 Vgl. Mantz, in: Sydow, Art. 25 DSGVO N 60; Martini, in: Paal/Pauly, Art. 25 DSGVO N 28. 671 Vgl. Botschaft Totalrevision DSG, S. 7029; Hansen, in Simitis et al., Art. 25 DSGVO N 21. Wohl a.M. Masutti/Tomasello, S. 224, die auch Drohnenhersteller und -designer als Adressaten verstehen. 672 Martini, in: Paal/Pauly, Art. 25 DSGVO N 25; vgl. Klitou, S. 295 m.w.H. Rose, S. 140, fordert deshalb, dass sich entsprechende Vorschriften an Hersteller bzw. Anbieter der Technik richten sollen. 673 Martini, in: Paal/Pauly, Art. 25 DSGVO N 25; Tamò-Larrieux, S. 86 m.w.H.; vgl. EG 78 DSGVO. 674 Vgl. die ähnliche Regelung in Art. 8 Abs. 2 und 3 VDSG. § 3 Zentrale Bestimmungen des E-DSG 91 sind die Anforderungen an die technischen Vorkehren, damit sie (…) als angemessen gelten können.»675 Dem Verantwortlichen kommt bei der Wahl der Massnahmen ein relativ grosser Ermessensspielraum zu. Wird dieser überschritten, besteht die Gefahr der Verletzung von Datenbearbeitungsgrundsätzen und damit wiederum das Risiko von Persönlichkeitsverletzungen.676 Obwohl im E-DSG nicht explizit erwähnt, ist im Rahmen einer Verhältnismässigkeitsprüfung («Zweck-Mittel-Relation», Art. 5 Abs. 2 BV) auch eine wirtschaftliche Komponente zu berücksichtigen. So kann sichergestellt werden, dass der Verantwortliche die Implementierungskosten einer technischen oder organisatorischen Massnahme nicht in unbegrenztem Umfang zu tragen hat.677 1.3 Stand der Technik insbesondere Gemäss Art. 6 Abs. 2 E-DSG müssen die technischen und organisatorischen Massnahmen u.a. dem Stand der Technik angemessen sein. Die Botschaft zum E-DSG führt nicht aus, was damit gemeint ist.678 Auch neuere Urteile des Bundesgerichts zu datenschutzrechtlichen Fragen erwähnen den «Stand der Technik», ohne näher auf dessen Bedeutung und Inhalt einzugehen.679 Der im Umweltrecht oftmals verwendete Begriff680 beschreibt Massnahmen, die einem entwickelten Stadium von technischen Möglichkeiten zu einem bestimmten Zeitpunkt entsprechen und auf gesicherten Erkenntnissen der Wissenschaft, Technik und Erfahrung basieren. Ausserdem müssen diese Massnahmen in ausreichendem Mass verfügbar sein, um angemessen umgesetzt zu werden.681 675 Botschaft Totalrevision DSG, S. 7030. 676 Vgl. Mantz, in: Sydow, Art. 25 DSGVO N 36; Martini, in: Paal/Pauly, Art. 25 DSGVO N 37 ff.; Koops/Leenes, S. 163. 677 Zum DSG BSK DSG-Stamm-Pfister, Art. 7 N 9; Meier, Rn. 792. Vgl. den Wortlaut von Art. 25 Abs. 1 DSGVO und dazu Martini, in: Paal/Pauly, Art. 25 DSGVO N 41; Feiler/ Forgó/Weigl, Art. 25 GDPR N 3 sowie ausführlich Mantz, in: Sydow, Art. 25 DSGVO N 45 f. 678 Vgl. Botschaft Totalrevision DSG, S. 7029 f. 679 Vgl. etwa BGE 144 I 126 E. 8.3.5; 138 II 436 E. 10.6.5 und E. 14.1. 680 In der Schweizer Gesetzgebung ist er z.B. in Art. 32e Abs. 4 Umweltschutzgesetz (USG), Art. 4 Altlastenverordnung (AltlV) und Art. 26 Abfallverordnung (VVEA) zu finden. 681 Mantz, in: Sydow, Art. 25 DSGVO N 38; Martini, in: Paal/Pauly, Art. 25 DSGVO N 39; Hartung, in: Kühling/Buchner, Art. 25 DSGVO N 21. 92 2. Teil 3: Bestandesaufnahme (1): Der E-DSG Sanktionierung Werden die Vorschriften von Art. 6 E-DSG nicht eingehalten, so sieht das Gesetz keine strafrechtliche Sanktionierung vor (vgl. Art. 54 ff. E-DSG). Eine Nichteinhaltung kann dagegen (indirekt) zu einer Persönlichkeitsverletzung führen, namentlich wenn dadurch Bearbeitungsgrundsätze verletzt werden.682 3. Bedeutung bei der drohnengestützten Datenbearbeitung durch Private Privacy by Design hält in verschiedener Hinsicht Lösungsansätze für datenschutzrechtliche Probleme im Bereich der Drohnenfliegerei bereit. So kons� tatierte etwa Roma: «Privacy by design might prove an extremely useful tool to ensure effective enforcement of EU and national legislation, especially where Mini RPAS683 are concerned.»684 Mögliche Umsetzungsvarianten von Privacy by Design bei Drohnen sind z.B. eine Beschränkung von Dauer und Auflösung von Videoaufnahmen oder das Anbringen von Warnlichtern bzw. Warnsignalen, welche auf eine Datenbearbeitung hinweisen.685 Gesichter und/oder Nummern (z.B. auf Kontrollschildern von Motorfahrzeugen) könnten automatisch erkannt und unkenntlich gemacht werden.686 Doch auch das äussere Erscheinungsbild einer Drohne und die damit assoziierten Risiken für Sicherheit und Privatsphäre sollten im vorliegenden Zusammenhang mitbedacht werden.687 So kann etwa durch die Verwendung von helleren Farben und das Anbringen 682 Vgl. Husi-Stämpfli, S. 52; Botschaft Totalrevision DSG, S. 7029, wo explizit auf die Bearbeitungsgrundsätze Bezug genommen wird. Rosenthal, Entwurf, Rn. 41 mit Fn. 54, leitet dagegen aus der Tatsache, dass Art. 6 E-DSG in Art. 26 Abs. 2 lit. a E-DSG nicht aufgeführt wird, ab, dass eine Verletzung von ersterer Bestimmung keine Persönlichkeitsverletzung darstellt. Zu den Bearbeitungsgrundsätzen im Einzelnen vorne, S. 82 ff. 683 Remotely Piloted Aircraft System, vgl. dazu vorne, S. 17. 684 Roma, S. 30; ähnlich Cassart, RDTI, S. 88; Cavoukian, S. 16 ff.; Masutti/Tomasello, S. 231 f. Vgl. auch Boucher, S. 25; Dieckert, in: Dieckert/Eich, S. 415 f.; Harris/Given, S. 9; Klitou, S. 61 ff. 685 Cassart, RDTI, S. 88; Leenes et al., S. 29; Harris/Given, S. 9. Vgl. Froomkin/ Colangelo, S. 64; Groh, S. 167; Martini, S. 740; Rose, S. 139. 686 DroneRules, Guide, S. 18. Vgl. zu dieser Vorgehensweise auch BGE 138 II 346 E. 10.3 f. und 10.6.2. Vereinzelt wurde gar ein Verbot der drohnengestützten Bearbeitung von «personenbezogenen Bilddaten» propagiert (Leissler, S. 536 m.w.H.). 687 In der Studie von Chang/Chundury/Chetty, v.a. S. 6771, wurde festgestellt, dass die Probanden je nach Erscheinungsbild einer Drohne die damit einhergehenden Sicherheits- und Privatsphärerisiken anders beurteilten. § 3 Zentrale Bestimmungen des E-DSG 93 von Logos bzw. Kennzeichen eine Drohne weniger einschüchternd wirken und ggf. Transparenz geschaffen werden.688 Nicht alle der genannten Optionen sind jedoch ohne Weiteres umsetzbar. Denn die Programmierung von Datenschutzregeln in Software ist sehr komplex und teilweise gar nicht durchführbar. Zu Recht hielten Koops/ Leenes fest: «Some legal rules are intentionally open, vague, overinclusive or underinclusive, and often they are indeterminate and require interpretation.»689 Gerade die zentralen Bearbeitungsgrundsätze, insbesondere die Verhältnismässigkeit sowie Treu und Glauben,690 sind gewollt offen formuliert, was eine softwareseitige Umsetzung derselben erschwert, wenn nicht gar verunmöglicht.691 Die vorprogrammierten Datenschutzregeln würden ausserdem wohl oft (zu) rigide ausfallen (um Persönlichkeitsverletzungen mit Sicherheit zu vermeiden) und folglich keine Kontextsensitivität zulassen.692 Unter der Geltung des zukünftigen DSG wird sich erst zeigen müssen, welche Umsetzungsvarianten der Vorgabe von Datenschutz durch Technik die Drohnen- und Drohnenzubehörhersteller anbieten werden. Rechtsprechung zu Mindestanforderungen könnte «ein starker Anreiz [sein], erstens auf dem Markt ‹gerichtsfeste› Modelle anzubieten und zweitens auch nur solche Modelle zu verwenden».693 Entsprechende Gerichtspraxis fehlt indes bis anhin. III. Informationspflicht Die in Art. 17 E-DSG geregelte Informationspflicht, d.h. die Pflicht des Verantwortlichen, die betroffene Person angemessen über die Beschaffung von Personendaten zu informieren, ist primär darauf ausgerichtet, Transparenz bei der Datenbearbeitung herzustellen. Denn regelmässig kann die betroffene Person nicht erkennen, dass Daten über sie bearbeitet werden; folglich kann sie auch ihre Rechte gemäss E-DSG nicht wahrnehmen.694 Die Informationspflicht soll hier Abhilfe schaffen und dient somit auch einer effektiven 688 Ausführlich DroneRules, Guide, S. 10 ff.; vgl. auch Ruijten/Cuijpers, S. 68 ff.; Martini, S. 740 f.; Bajde et al., Public reactions, S. 5. 689 Koops/Leenes, S. 166; vgl. auch Leenes et al., S. 28. 690 Ausführlich zu den Bearbeitungsgrundsätzen vorne, S. 82 ff. 691 Leenes et al., S. 28; vgl. Koops/Leenes, passim, v.a. S. 166. 692 Leenes et al., S. 29; vgl. auch Boucher, S. 26. 693 Rose, S. 140, zum Einfluss von Rechtsprechung zur Verwertbarkeit von Dashcam-Aufnahmen auf die Gestaltung der Technik. Vgl. dazu auch BGer, 6B_1188/2018 vom 26. September 2019 E. 3.1 ff. (zur Publikation vorgesehen) 694 Botschaft Totalrevision DSG, S. 7050. 94 Teil 3: Bestandesaufnahme (1): Der E-DSG Rechtsdurchsetzung.695 Im Vergleich zum geltenden Recht wurde sie ausgeweitet; gemäss Art. 14 DSG trifft Private nur dann eine Informationspflicht, wenn sie besonders schützenswerte Personendaten beschaffen.696 1. Voraussetzungen Art. 17 Abs. 1 E-DSG schreibt vor, dass der Verantwortliche die betroffene Person angemessen über die Beschaffung von Personendaten informiert. Diese Informationspflicht gilt auch, wenn die Daten nicht bei der betroffenen Person beschafft werden; damit sind Fälle angesprochen, in denen die Daten bei Dritten beschafft werden.697 Als Dritter in diesem Sinn gilt jede vom Verantwortlichen und dem oder der Betroffenen verschiedene (natürliche oder juristische) Person.698 Wird auf öffentliche Quellen — wie etwa Medienberichte oder fremde Webseiten699 — zurückgegriffen, stellt dies ebenfalls eine Beschaffung bei Dritten dar.700 Die Pflicht zur Information wird durch die «Beschaffung» ausgelöst. Beim Beschaffen handelt es sich um einen Bearbeitungsvorgang im Sinne von Art. 4 lit. c E-DSG. «Beschaffen» beschreibt «die Aktivität […], wodurch [der Verantwortliche] gewollt Kenntnis von den Daten erhält oder die Verfügung darüber begründet».701 Es wird mithin ein aktives Tun vonseiten des Verantwortlichen vorausgesetzt.702 Die drohnengestützte Datenbearbeitung (unabhängig vom verwendeten Sensor) stellt ohne Weiteres eine «Beschaffung» im Sinne von Art. 17 E-DSG dar. Dieser Vorgang bezieht sich direkt auf die betroffene Person und die Daten werden somit direkt bei ihr beschafft. 2. Umfang und Modalitäten Inhaltlich schreibt Art. 17 Abs. 2 E-DSG vor, dass der betroffenen Person diejenigen Informationen mitgeteilt werden müssen, die erforderlich sind, damit 695 Vgl. Paal, in: Paal/Pauly, Art. 13 DSGVO N 4. 696 Daneben bestand die Informationspflicht auch dann, wenn «Persönlichkeitsprofile» beschafft wurden; dieser Begriff wurde mit dem E-DSG jedoch abgeschafft. Weder das europäische Recht noch andere ausländische Gesetzgebungen kennen diesen Begriff, er war eine Schweizer Eigenheit. An seiner Stelle wird im E-DSG der Begriff des «Profiling» verwendet (vgl. Art. 4 lit. f E-DSG sowie ausführlich Botschaft Totalrevision DSG, S. 7021). 697 Vgl. dazu den Wortlaut von Art. 14 Abs. 1 DSG. 698 BSK DSG-Rampini/Fuchs, Art. 14 N 6; vgl. Handkomm. DSG-Rosenthal, Art. 7a N 12. 699 Betreibt ein Unternehmen eine eigene Webseite, werden dort registrierte Daten regel­ mässig direkt bei der betroffenen Person beschafft. 700 Handkomm. DSG-Rosenthal, Art. 7a N 12. 701 SHK DSG-Rudin, Art. 3 N 34. 702 BSK DSG-Rampini/Fuchs, Art. 14 N 5; vgl. SHK DSG-Wermelinger, Art. 14 N 3. § 3 Zentrale Bestimmungen des E-DSG 95 sie ihre Rechte nach dem E-DSG geltend machen kann und eine transparente Datenbearbeitung gewährleistet ist. Im Sinne eines Mindestkatalogs führt das Gesetz folgende Informationen auf, die mitgeteilt werden müssen: die Identität und die Kontaktdaten des Verantwortlichen (lit. a); der Bearbeitungszweck (lit. b); und ggf. die Empfängerinnen und Empfänger oder die Kategorien von Empfängerinnen und Empfängern, denen Personendaten bekanntgegeben werden (lit. c).703 Der E-DSG legt nicht fest, auf welche Weise die Information erfolgen muss. Der Verantwortliche muss jedoch sicherstellen, dass die betroffene Person die Information tatsächlich zur Kenntnis nehmen kann.704 Sie muss demnach ausdrücklich und aktiv erfolgen sowie präzise, verständlich und in einer klaren und einfachen Sprache ausgedrückt werden.705 Der Verantwortliche hat sicherzustellen, dass die Möglichkeit besteht, sich in leicht zugänglicher Weise zu informieren, nicht aber, dass sich die betroffene Person im konkreten Fall tatsächlich informiert.706 Eine allgemeine Information kann genügen, wenn Personendaten bei der betroffenen Person selbst beschafft werden. In diesem Fall sind gemäss Botschaft «eine Datenschutzerklärung auf einer Website, aber gegebenenfalls auch Symbole oder Piktogramme, soweit sie die nötigen Informationen wiedergeben» denkbar.707 Es besteht keine Formvorschrift bezüglich der Information; sie kann also grundsätzlich auch mündlich erfolgen. Aus Beweisgründen sowie aus Transparenzüberlegungen ist aber eine schriftliche Information empfehlens­ wert.708 Insgesamt muss eine Form gewählt werden und zudem die Information so verständlich sein, dass sie dem Zweck einer transparenten Datenbearbeitung auch tatsächlich dient.709 Bei der drohnengestützten Datenbearbeitung durch Private kommt eine mündliche Information bezüglich Identität des Verantwortlichen und Zweck der Bearbeitung grundsätzlich in Betracht. 703 Vgl. zu den «Empfängerinnen und Empfänger[n]» und «Kategorien von Empfänger­ innen und Empfänger[n]» Handkomm. DSG-Rosenthal, Art. 7a N 17 und Art. 11a N 35; SHK DSG-Wermelinger, Art. 14 N 6. 704 Botschaft Totalrevision DSG, S. 7050. 705 Botschaft Revision DSG 2003, S. 2131; Epiney/Fasnacht, in: Belser/Epiney/Waldmann, § 11 Rn. 8 m.w.H.; Paal, in: Paal/Pauly, Art. 13 DSGVO N 5. 706 Botschaft Totalrevision DSG, S. 7050. 707 Botschaft Totalrevision DSG, S. 7050. 708 BSK DSG-Rampini/Fuchs, Art. 14 N 13; Handkomm. DSG-Rosenthal, Art. 7a N 12; Botschaft Totalrevision DSG, S. 7051; Botschaft Revision DSG 2003, S. 2131. 709 Botschaft Totalrevision DSG, S. 7051. 96 3. Teil 3: Bestandesaufnahme (1): Der E-DSG Zeitpunkt der Information Werden Daten direkt bei der betroffenen Person beschafft, so ist diese gemäss Art. 17 Abs. 2 E-DSG bei der Beschaffung zu informieren. Gemäss Botschaft bedeutet dies, dass der Verantwortliche die betroffene Person «in diesem Zeitpunkt» informieren muss.710 Daraus ergibt sich aber nicht zwingend eine Gleichzeitigkeit der Vorgänge; dies wäre auch nicht in jedem Fall praktikabel. Vielmehr hat die Information vor, während oder unmittelbar nach der (ersten) Datenbeschaffung zu erfolgen.711 Wie bei der eigentlichen Beschaffung ist auch hier ein aktives Tun des Verantwortlichen erforderlich.712 Für Daten, die nicht bei der betroffenen Person selbst beschafft werden, gibt Art. 17 Abs. 5 E-DSG eine Frist vor. Danach hat die Information spätestens einen Monat, nachdem der Verantwortliche die Daten erhalten hat, zu erfolgen. Eine kürzere Frist ist für den Fall vorgesehen, dass der Verantwortliche die Personendaten vor Ablauf der Monatsfrist (an einen oder mehrere) Empfänger bekannt gibt. In diesem Fall muss er die betroffene Person spätestens zum Zeitpunkt der Bekanntgabe informieren.713 4. Ausnahmen und Einschränkungen 4.1 Ausnahmen Das Gesetz sieht Ausnahmen zur und Einschränkungen der Informationspflicht vor. So entfällt diese gemäss Art. 18 Abs. 1 E-DSG, wenn eine der folgenden Voraussetzungen erfüllt ist: die betroffene Person verfügt bereits über die entsprechenden Informationen (lit. a); die Bearbeitung ist gesetzlich vorgesehen (lit. b); es handelt sich beim Verantwortlichen um eine private Person, die gesetzlich zur Geheimhaltung verpflichtet ist (lit. c); oder die Information erfordert einen unverhältnismässigen Aufwand (lit. e).714 Werden die Personendaten nicht bei der betroffenen Person beschafft, so entfällt die Informationspflicht zudem, solange die Person nicht mit verhältnismässigem Aufwand bestimmt werden kann (Art. 18 Abs. 2 E-DSG). Im Zusammenhang mit der drohnengestützten Datenbearbeitung durch Private besteht keine Rechtsgrundlage, welche eine entsprechende Daten710 Botschaft Totalrevision DSG, S. 7052. 711 Epiney/Fasnacht, in: Belser/Epiney/Waldmann, § 11 Rn. 8; BSK DSG-Rampini/ Fuchs, Art. 14 N 14; Handkomm. DSG-Rosenthal, Art. 7a N 23; vgl. SHK DSG-Wermelinger, Art. 14 N 8. Für eine Information jeweils vor der Datenbeschaffung plädiert Mester, in: Taeger/Gabel, Art. 13 DSGVO N 34 in fine. 712 Vgl. BSK DSG-Rampini/Fuchs, Art. 14 N 13. 713 Botschaft Totalrevision DSG, S. 7052. 714 Die in Art. 18 Abs. 1 lit. d E-DSG genannte Ausnahme bezieht sich auf Medien. Sie ist für die vorliegende Auseinandersetzung nicht beachtlich. § 3 Zentrale Bestimmungen des E-DSG 97 bearbeitung im Sinne von Art. 18 Abs. 1 lit. b E-DSG vorsehen würde. Ausserdem ist in diesem Kontext nicht ersichtlich, wie die betroffene Person bereits Kenntnis der entsprechenden Informationen haben oder dass ein Privater gesetzlich einer Geheimhaltungspflicht unterliegen könnte (lit. a und c). Des Weiteren werden die Daten nicht bei Dritten beschafft, womit die Ausnahmen gemäss Art. 18 Abs. 2 E-DSG nicht greifen.715 Insgesamt ist bei der drohnengestützten Datenbearbeitung durch Private keine der genannten Ausnahmen einschlägig. 4.2 Einschränkungen Des Weiteren sieht das Gesetz in Art. 18 Abs. 3 E-DSG vor, dass der Verantwortliche die Mitteilung der Informationen in gewissen Fällen einschränken, aufschieben oder darauf verzichten kann.716 Solche Massnahmen sind etwa möglich, wenn sie wegen überwiegender Interessen Dritter erforderlich sind (lit. a). Private Verantwortliche können zudem so vorgehen, wenn eigene überwiegende Interessen es erfordern (lit. c). Werden von einem Privaten mit einer Drohne Daten bearbeitet, so wird regelmässig keiner der im E-DSG vorgesehenen Tatbestände einschlägig sein. Denn es ist kaum eine Situation denkbar, in welcher überwiegende Inter­ essen des Drohnenbetreibers (als Verantwortlicher) oder von Dritten einer Information entgegenstehen könnten. Die Mitteilung der Informationen gemäss Art. 17 E-DSG kann somit nicht eingeschränkt, aufgeschoben oder auf sie verzichtet werden. 5. Sanktionierung Die Verletzung von Informationspflichten ist gemäss Art. 54 Abs. 1 lit. a und b E-DSG sanktionsbewehrt. So werden private Personen auf Antrag mit Busse bis zu 250’000 Franken bestraft, die ihre Pflichten nach den Art. 17, 19 und 23–25 E-DSG verletzen, indem sie vorsätzlich eine falsche oder unvollständige Auskunft erteilen (lit. a). Mit der gleichen Busse können private Personen belegt werden, die es vorsätzlich unterlassen, die betroffene Person nach Art. 17 Abs. 1 E-DSG zu informieren (lit. b Ziff. 1)717 oder ihr die Angaben nach Art. 17 Abs. 2 E-DSG zu liefern (lit. b Ziff. 2). 715 Vgl. dazu vorne, S. 94. 716 Die lit. b (Vereitelung des Zwecks der Datenbearbeitung) und d (Bearbeitung durch Bundesorgan) werden nicht weiter vertieft. Ausführlich zu den einzelnen Tatbeständen Botschaft Totalrevision DSG, S. 7054 ff. 717 Art. 54 Abs. 1 lit. b Ziff. 1 nimmt ausserdem Bezug auf Art. 19 Abs. 1 E-DSG. Dieser bezieht sich auf die Informationspflicht bei automatisierten Einzelentscheidungen und ist für die vorliegende Untersuchung nicht von Belang. 98 6. Teil 3: Bestandesaufnahme (1): Der E-DSG Bedeutung bei der drohnengestützten Datenbearbeitung durch Private Die Informationspflicht gemäss Art. 17 E-DSG ist ohne Weiteres auf Private anwendbar, die drohnengestützt Daten bearbeiten. Die gesetzlichen Ausnahmen der Informationspflicht sind nicht einschlägig. Es ist jedoch davon auszugehen, dass bei der drohnengestützten Datenbearbeitung eine Information der betroffenen Personen regelmässig unterbleibt. Dies dürfte sich primär daraus ergeben, dass sich Drohnenbetreiber einer entsprechenden Pflicht nicht bewusst sind oder aber diese nicht erfüllen. Eine Sanktionierung gemäss Art. 54 E-DSG kommt somit meist nicht in Betracht, da in so gearteten Fällen regelmässig keine Vorsätzlichkeit vorliegt.718 Die mit der Informationspflicht angestrebte Verbesserung der Transparenz wird bei der drohnengestützten Datenbearbeitung mithin nicht erreicht. Aus diesem Grund kommt dem datenschutzrechtlichen Auskunftsrecht (dazu hinten, S. 100 ff.) in diesem Kontext eine besondere Bedeutung zu. IV. Datenschutz-Folgenabschätzung 1. Voraussetzungen Wenn eine Bearbeitung ein hohes Risiko für die Persönlichkeit oder die Grundrechte der betroffenen Person mit sich bringen kann, erstellt der Verantwortliche vorgängig eine Datenschutz-Folgenabschätzung. Sind mehrere ähnliche Be­arbeitungsvorgänge geplant, so kann eine gemeinsame Abschätzung erstellt werden (Art. 20 Abs. 1 E-DSG).719 Das «hohe Risiko» ergibt sich, insbesondere bei Verwendung neuer Technologien, aus der Art, dem Umfang, den Umständen und dem Zweck der Bearbeitung (Art. 20 Abs. 2 E-DSG).720 Ein hohes Risiko liegt namentlich bei einer umfangreichen Bearbeitung besonders schützenswerter Personendaten, oder wenn systematisch umfangreiche öffentliche Bereiche überwacht werden, vor (Art. 20 Abs. 2 lit. a und c E-DSG).721 Inhaltich verlangt Art. 20 Abs. 3 E-DSG «eine Beschreibung der geplanten Bearbeitung, eine Bewertung der Risiken für die Persönlichkeit oder die Grundrechte der betroffenen Person sowie die Massnahmen zum Schutz der 718 Gemäss dem klaren Wortlaut der Strafbestimmung reicht (Grob-)Fahrlässigkeit nicht aus (vgl. vorne, S. 97 und Botschaft Totalrevision DSG, S. 7101). 719 Eine ähnliche, aber ausführlichere Regelung findet sich auch in Art. 35 DSGVO. 720 Vgl. auch § 10 IDG/ZH und dazu PK IDG/ZH-Blattmann, § 10 N 10, sowie § 13 IDG/BS und dazu PK IDG/BS-Rudin, § 13 N 11. 721 Der vom Bundesrat vorgeschlagene lit. b wurde vom NR gestrichen (vgl. Amtl. Bull. NR 2019 S. 1810 f.). § 3 Zentrale Bestimmungen des E-DSG 99 Persönlichkeit und der Grundrechte». Datenbearbeitungen durch Private, die zur Erfüllung einer gesetzlichen Pflicht des Verantwortlichen erfolgen, sind gemäss Abs. 4 von der Erstellung einer Datenschutz-Folgenabschätzung ausgenommen.722 2. Sanktionierung Wird die Pflicht zur Erstellung einer Datenschutz-Folgenabschätzung nicht eingehalten, hat der untätig gebliebene Verantwortliche keine strafrechtlichen Folgen zu gewärtigen: Die Missachtung von Art. 20 E-DSG ist in den Strafbestimmungen von Art. 54 ff. E-DSG nicht enthalten. In diesem Fall ist auch keine Persönlichkeitsverletzung möglich, da die Folgenabschätzung vor der Datenbearbeitung ansetzt und somit zu diesem Zeitpunkt noch keine Personen betroffen sind.723 Wird eine Datenbearbeitung durchgeführt, welche einer Folgenabschätzung bedurft hätte, so ist jedoch die Einhaltung der Bearbei­tungs­g rundsätze gefährdet, was Persönlichkeitsverletzungen nach sich ziehen kann.724 3. Bedeutung bei der drohnengestützten Datenbearbeitung durch Private Bei der drohnengestützten Datenbearbeitung durch Private kommt der Datenschutz-Folgenabschätzung geringe Bedeutung zu. Zwar ist ein privater Verantwortlicher grundsätzlich der Pflicht zur Erstellung einer solchen unterworfen; jedoch ist nicht davon auszugehen, dass bei einer drohnengestützten Datenbearbeitung durch einen Privaten oft ein «hohes Risiko» im Sinne von Art. 20 Abs. 1 und 2 E-DSG besteht. Der Umfang, die Umstände und der Zweck einer solchen Datenbearbeitung erreichen diese Schwelle regelmässig nicht.725 Bei den in dieser Untersuchung interessierenden Bearbeitungsvorgängen liegt keine systematische Überwachung von umfangreichen öffentlichen Bereichen vor (vgl. Art. 20 Abs. 2 lit. c E-DSG).726 Dagegen ist eine umfangreiche 722 Die in Art. 20 Abs. 5 E-DSG vorgesehene Ausnahme von der Erstellung einer Datenschutz-Folgenabschätzung ist zwar auf private Verantwortliche anwendbar. Aufgrund von deren Anwendungsvoraussetzungen kann eine Vertiefung der Bestimmung vorliegend unterbleiben. Vgl. dazu Botschaft Totalrevision DSG, S. 7062. 723 Vgl. den Wortlaut von Art. 20 Abs. 1 E-DSG. 724 Vgl. zu den Bearbeitungsgrundsätzen vorne, S. 82 ff. 725 Eine Konsultation des EDÖB, wie dies in Art. 21 E-DSG vorgesehen ist, falls die Datenschutz-Folgenabschätzung ein hohes Risiko aufzeigt, ist deshalb bei der drohnengestützten Datenbearbeitung durch Private kaum nötig. Auf eine Vertiefung dieser Regelung kann deshalb verzichtet werden. 726 Gemäss Botschaft Totalrevision DSG, S. 7061, soll diese Bestimmung etwa «die Überwachung einer Bahnhofshalle» erfassen. 100 Teil 3: Bestandesaufnahme (1): Der E-DSG Bearbeitung von besonders schützenswerten Personendaten im Sinne von Art. 20 Abs. 2 lit. a E-DSG nicht auszuschliessen.727 Umfangreich ist eine Daten­ bearbeitung dann, wenn grosse Mengen an Daten bearbeitet werden und/oder eine grosse Zahl von Personen betroffen ist bzw. betroffen sein kann.728 Demnach könnte etwa eine (beabsichtigte) Aufnahme einer Demon­s­tration729 mit einer Drohne durch einen Privaten die Pflicht zur Erstellung einer Datenschutz-Folgenabschätzung mit sich bringen.730 V. Auskunftsrecht 1. Zentrale Bedeutung des Anspruchs Das in Art. 23 E-DSG enthaltene Auskunftsrecht stellt eine Ergänzung der Informationspflicht des Verantwortlichen dar; es bildet die Grundlage dafür, dass die betroffene Person die Rechte aus dem Datenschutzgesetz überhaupt wahrnehmen kann.731 Das Auskunftsrecht ist mithin ein zentrales, wenn nicht das zentrale Institut der Durchsetzung des (datenschutzrechtlichen) Persönlichkeitsschutzes732 bzw. des Datenschutzrechts überhaupt.733 Es soll den betroffenen Personen ermöglichen, die über sie «bearbeiteten Daten zu kontrollieren mit dem Ziel, die Einhaltung der datenschutzrechtlichen Grund­ sätze und Bestimmungen zu überprüfen und gegebenenfalls durchzusetzen».734 So kann eine betroffene Person z.B. die Berichtigung unrichtiger Daten (vgl. Art. 5 Abs. 2 E-DSG), die Sperrung der Bekanntgabe gewisser Daten oder die 727 Die Botschaft Totalrevision DSG, S. 7060, enthält keine Präzisierungen des Begriffs «umfangreich», führt als Beispiel aber medizinische Forschungsprojekte an. 728 Gemäss Baumgartner, in: Ehmann/Selmayr, Art. 35 DSGVO N 38, kann «im Einzelfall auch bei deutlich weniger» als 5’000 Personen eine grosse Zahl gegeben sein. Vgl. Schwendemann, in: Sydow, Art. 35 DSGVO N 13 m.w.H.; Karg, in: Simitis, Art. 35 DSGVO N 33. 729 Religiöse, weltanschauliche oder politische Ansichten stellen besonders schützenswerte Personendaten dar; vgl. dazu vorne, S. 31 und S. 34. 730 Die diesbezüglichen luftfahrtrechtlichen Vorgaben sollen hier nicht vertieft werden. 731 BGE 144 I 126 E. 8.3.7; Botschaft Totalrevision DSG, S. 7066; Peter, S. 211 m.w.H.; vgl. BGE 140 V 464 E. 4.2; 139 V 492 E. 3.2; 125 II 473 E. 4b; anschaulich (zur DSGVO) Tombal, Rn. 39: «la porte d’entrée, voire même la condition préalable». 732 BGE 144 I 126 E. 8.3.7; 138 III 425 E. 5.3; 120 II 118 E. 3b; Botschaft DSG 1988, S. 433; BSK DSG-Gramigna/Maurer-Lambrou, Art. 8 N 1. Vgl. auch bereits Schucan, S. 82: «Kernstück der individuellen Gegenrechte gegen die datenverarbeitende Stelle». 733 SHK DSG-Rudin, Art. 8 N 1. Vgl. SGK BV-Schweizer, Art. 13 N 85; Biaggini, Komm. BV, Art. 13 N 14; Belser, in: Belser/Epiney/Waldmann, § 6 Rn. 99; Fasnacht, Rn. 155; Widmer, Rn. 5.2. 734 BGE 144 I 126 E. 8.3.7; EDÖB, Tätigkeitsbericht 2017/18, S. 17. Vgl. auch BGE 138 I 6 E. 7.5.2; Widmer, Rn. 5.2. § 3 Zentrale Bestimmungen des E-DSG 101 Löschung und Vernichtung derselben (Art. 28 Abs. 2 E-DSG735) verlangen.736 Dem Auskunftsrecht kommt folglich eine Kontrollfunktion zu.737 2. Auskunftsberechtigte und Auskunftsverpflichtete Jede Person kann gemäss Art. 23 Abs. 1 E-DSG vom Verantwortlichen kostenlos738 Auskunft darüber verlangen, ob Personendaten über sie bearbeitet werden. Als subjektives, höchstpersönliches Recht kann es auch von urteilsfähigen handlungsunfähigen Personen selbständig, ohne Zustimmung ihres gesetzlichen Vertreters, geltend gemacht werden (vgl. Art. 19c ZGB).739 Aufgrund des klaren Wortlauts von Art. 23 Abs. 1 E-DSG kann Auskunft darüber verlangt werden, ob Personendaten bearbeitet werden (und nicht etwa nur darüber, welche Personendaten bearbeitet werden).740 Auskunftsverpflichtet ist derjenige, der für eine Datenbearbeitung verantwortlich ist bzw. vermutungsweise dafür verantwortlich zeichnet.741 3. Voraussetzungen Das Auskunftsrecht besteht voraussetzungslos.742 Der Auskunftsberechtigte hat weder ein schutzwürdiges Interesse noch eine besondere Motivation nachzuweisen;743 auch blosse Neugier reicht aus.744 Grenze bildet einzig der Rechts- 735 Vgl. dazu detailliert hinten, S. 112 ff. 736 Vgl. BGE 125 II 473 E. 4b; 126 II 126 E. 5c/bb. 737 Vgl. BGE 138 III 425 E. 5.3; 120 II 118 E. 3b. 738 Vgl. aber Art. 23 Abs. 6 E-DSG, wonach der Bundesrat Ausnahmen von der Kostenlosigkeit vorsehen kann, namentlich wenn der Aufwand unverhältnismässig gross ist. 739 Botschaft Totalrevision DSG, S. 7066; Peter, S. 212. Ausführlich zum Begriff des höchstpersönlichen Rechts und dessen Bedeutung statt vieler KuKo ZGB-Hotz, Art. 19c N 1 ff. Ausführlich zu den Begriffen der Urteilsfähigkeit und der Handlungsfähigkeit (bzw. -un­f ähigkeit) statt vieler Steinauer/Fountoulakis, Rn. 75 ff. und Rn. 163 ff. 740 Vgl. Epiney/Fasnacht, in: Belser/Epiney/Waldmann, § 11 Rn. 24; BSK DSG-Gramigna/ Maurer-Lambrou, Art. 8 N 24. Selbstredend können vom Verantwortlichen keine Angaben gefordert werden, über die er gar nicht verfügt (vgl. BGE 136 II 508 E. 3.7). 741 «Lässt der Verantwortliche Personendaten von einem Auftragsbearbeiter bearbeiten, so bleibt er auskunftspflichtig» (Art. 23 Abs. 4 E-DSG). Auftragsdatenbearbeiter ist gemäss Legaldefinition in Art. 4 lit. j E-DSG die «private Person oder [das] Bundes­ organ, die oder das im Auftrag des Verantwortlichen Personendaten bearbeitet». In Übereinstimmung mit dem Fokus der vorliegenden Untersuchung wird nicht weiter auf die Auftragsdatenbearbeitung eingegangen. 742 Handkomm. DSG-Rosenthal, Art. 8 N 5; Epiney/Fasnacht, in: Belser/Epiney/Waldmann, § 11 Rn. 21. 743 BGE 144 III 119 E. 7.1.1; 127 V 219 E. 1a/aa; Handkomm. DSG-Rosenthal, Art. 8 N 12. 744 Botschaft Totalrevision DSG, S. 7069. 102 Teil 3: Bestandesaufnahme (1): Der E-DSG missbrauch (vgl. Art. 2 Abs. 2 ZGB).745 Besteht der Verdacht einer rechtsmissbräuchlichen oder querulatorischen Geltendmachung des Auskunftsrechts, so darf der Verantwortliche vom Auskunftsberechtigten eine Begründung des Auskunftsbegehrens verlangen;746 ansonsten ist grundsätzlich keine solche zu liefern. 4. Ausübung des Auskunftsrechts 4.1 Auskunftsbegehren Das Auskunftsbegehren ist prinzipiell schriftlich einzureichen,747 es kommen aber auch mündliche (z.B. telefonische) oder elektronische Gesuche in Betracht.748 Inhaltlich sind keine hohen Anforderungen an das Begehren zu stellen.749 Es kann jedoch vom Auskunftsberechtigten verlangt werden, wenigstens die «ihm möglichen und zumutbaren zweckdienlichen Angaben zur Erleichterung des Auffindens der Daten zu machen».750 Im Rahmen der drohnengestützten Datenbearbeitung liegt hier der Knackpunkt des Auskunftsrechts. Der Drohnenbetreiber, welcher als (allfälliger) Verantwortlicher die Auskunft zu erteilen hätte, ist nicht ohne Weiteres zu identifizieren. Somit kann die betroffene Person ihr Auskunftsbegehren gar nicht erst stellen. 4.2 Identifikation des Auskunftsberechtigten Der Verantwortliche hat die Identität des Gesuchstellers zu überprüfen; würde er dies nicht tun, bestünde die Gefahr von Persönlichkeitsverletzungen, indem Daten Dritter eingesehen werden könnten.751 Je schutzwürdiger die Daten, umso höhere Anforderungen sind an die Qualität des Identitätsnachweises zu stellen.752 Regelmässig geschieht die Überprüfung anhand einer Kopie eines amtlichen Identitätsausweises, der dem Gesuch beigelegt wird.753 745 Ausführlich zum Rechtsmissbrauch bei Ausübung des Auskunftsrechts BGE 138 III 432 E. 5.5 f. m.w.H. 746 BGE 138 III 425 E. 5.4 f.; 123 II 534 E. 2e; vgl. BSK DSG-Gramigna/Maurer-Lambrou, Art. 8 N 39. 747 Vgl. Art. 1 Abs. 1 VDSG. 748 Art. 1 Abs. 2 VDSG; SHK DSG-Rudin, Art. 8 N 20; Widmer, Rn. 5.18. 749 Epiney/Fasnacht, in: Belser/Epiney/Waldmann, § 11 Rn. 32; SHK DSG-Rudin, Art. 8 N 21; vgl. Peter, S. 219. 750 BSK DSG-Gramigna/Maurer-Lambrou, Art. 8 N 39; vgl. Belser U., S. 58. 751 BSK DSG-Gramigna/Maurer-Lambrou, Art. 8 N 40; SHK DSG-Rudin, Art. 8 N 22. 752 Epiney/Fasnacht, in: Belser/Epiney/Waldmann, § 11 Rn. 31; BSK DSG-Gramigna/ Maurer-Lambrou, Art. 8 N 40. 753 Die nicht notwendigen Informationen auf dem Identitätsausweis dürfen geschwärzt oder anders unleserlich gemacht werden; SHK DSG-Rudin, Art. 8 N 21. § 3 Zentrale Bestimmungen des E-DSG 5. 103 Erteilung der Auskunft 5.1 Form und Inhalt Die Auskunft ist grundsätzlich schriftlich, in Form eines Ausdrucks oder einer Fotokopie, zu erteilen.754 Auf jeden Fall müssen die Daten in lesbarer bzw. verständlicher und — falls sie in irgendeiner Weise verschlüsselt sind — entschlüsselter Form übermittelt werden.755 Je nach Art der bearbeiteten Daten ist dies jedoch kein gangbarer Weg: Geht es um Video- oder Tonaufnahmen, so ist der Auskunftsverpflichtete prinzipiell gehalten, dem Berechtigten eine Kopie der Daten auf einem geeigneten Speichermedium zuzustellen.756 Inhaltlich bestimmt Art. 23 Abs. 2 E-DSG, welche Angaben die betroffene Person erhält. Namentlich soll sie diejenigen Informationen erhalten, die erforderlich sind, damit sie ihre Rechte nach dem Datenschutzgesetz geltend machen kann. Gemäss dem Wortlaut der Bestimmung werden der betroffenen Person ausschliesslich die darin genannten Informationen mitgeteilt. Dabei handelt es sich u.a. um die Identität und die Kontaktdaten des Verantwortlichen (lit. a), die bearbeiteten Personendaten als solche (lit. b)757 sowie den Bearbeitungszweck (lit. c).758 Der Inhalt der erteilten Auskunft muss wahrheitsgetreu und vollständig sein.759 Vollständigkeit bedeutet in diesem Zusammenhang, dass der Gehalt der Auskunft dem Gegenstand des Gesuchs entspricht.760 Es gilt des Weiteren allfällige Einschränkungen zu beachten, was eine sorgfältige Prüfung im Einzelfall verlangt.761 754 De lege lata explizit Art. 8 Abs. 5 DSG. 755 BSK DSG-Gramigna/Maurer-Lambrou, Art. 8 N 49; SHK DSG-Rudin, Art. 8 N 35. 756 BSK DSG-Gramigna/Maurer-Lambrou, Art. 8 N 49; SHK DSG-Rudin, Art. 8 N 50. Vgl. in diesem Zusammenhang Art. 25a f. E-DSG, wo das «Recht auf Datenherausgabe und -übertragung» (sog. Datenportabilität) geregelt ist. Darauf soll nicht weiter eingegangen werden; vgl. dazu Amtl. Bull. NR 2019 S. 1813 (Votum Glättli) und S. 1816 (Votum BR Keller-Sutter). 757 Der Zusatz «als solche» wurde vom NR eingefügt und sollte gemäss Kommissionsmehrheit die Verständlichkeit der Bestimmung verbessern; dieses Ziel wurde damit aber nicht erreicht (ebenso Amtl. Bull. NR 2019 S. 1813 f. [Votum Flach]). 758 Die weiteren, in lit. d bis g genannten Informationen sind für die vorliegende Aus­ einandersetzung kaum von Bedeutung, weshalb hier auf eine Vertiefung derselben verzichtet wird. Weiterführend Botschaft Totalrevision DSG, S. 7067 f. 759 Botschaft DSG 1988, S. 453; Epiney/Fasnacht, in: Belser/Epiney/Waldmann, § 11 Rn. 36; BSK DSG-Gramigna/Maurer-Lambrou, Art. 8 N 51. 760 Epiney/Fasnacht, in: Belser/Epiney/Waldmann, § 11 Rn. 36. 761 Vgl. BSK DSG-Gramigna/Maurer-Lambrou, Art. 8 N 51. 104 Teil 3: Bestandesaufnahme (1): Der E-DSG 5.2 Einschränkungen Art. 24 Abs. 1 E-DSG sieht vor, dass der Verantwortliche die Auskunft verweigern, einschränken oder aufschieben kann, wenn ein Gesetz im formellen Sinn dies vorsieht, namentlich um ein Berufsgeheimnis zu schützen (lit. a), dies aufgrund überwiegender Interessen Dritter erforderlich ist (lit. b) oder das Auskunftsgesuch offensichtlich unbegründet ist, namentlich wenn es einen datenschutzwidrigen Zweck verfolgt oder offensichtlich querulatorisch ist (lit. c). Darüber hinaus kann ein privater Verantwortlicher gemäss Art. 24 Abs. 2 lit. a E-DSG die Auskunft verweigern, einschränken oder aufschieben, wenn «überwiegende Interessen des Verantwortlichen die Massnahme [erfordern]». Werden von einem Privaten mit einer Drohne Daten bearbeitet, so ist regelmässig keiner der vorgenannten Tatbestände erfüllt.762 Zunächst ist kaum eine Situation denkbar, in welcher überwiegende Interessen des Drohnenbetreibers als Verantwortlicher oder von Dritten der Auskunftserteilung entgegenstehen würden. Ausserdem ist kein Gesetz im formellen Sinn ersichtlich, das einschlägig wäre. Der Tatbestand des offensichtlich unbegründeten Auskunftsgesuchs ist sodann eng auszulegen und nicht leichthin anzunehmen.763 Aufgrund der Tatsache, dass das Auskunftsrecht bereits bei blosser Neugier und ohne spezifischen Interessennachweis zu erteilen ist,764 kommt eine Verweigerung oder eine Einschränkung der Auskunft wegen offensichtlicher Unbegründetheit grundsätzlich nur in Ausnahmefällen infrage, etwa bei unzulässiger Beweisausforschung im Vorfeld eines Prozesses.765 Querulatorische Auskunftsersuchen liegen dann vor, wenn diese z.B. häufig wiederholt werden, ohne dass dies schlüssig begründet würde, oder wenn sich diese an einen Verantwortlichen richten, von dem die gesuchstellende Person bereits weiss, dass er keine Daten über sie bearbeitet.766 762 Auch die in Art. 25 E-DSG vorgesehenen Einschränkungen des Auskunftsrechts für Medien sind für die vorliegende Auseinandersetzung nicht von Bedeutung. Aus diesem Grund wird nicht weiter darauf eingegangen. Vgl. dazu Botschaft Totalrevision DSG, S. 7070 sowie (zum materiell übernommenen alten Recht) Meier, Rn. 1164 ff. 763 Botschaft Totalrevision DSG, S. 7069. Dieser Umstand wird durch die Verwendung des Begriffs «offensichtlich» im Gesetzestext unterstrichen. 764 Vgl. dazu vorne, S. 101 f. 765 Botschaft Totalrevision DSG, S. 7069. Die Beweisausforschung lässt sich nicht klar von einer rechtsmissbräuchlichen Verwendung des Auskunftsrechts trennen. 766 Botschaft Totalrevision DSG, S. 7069. § 3 Zentrale Bestimmungen des E-DSG 6. 105 Zeitpunkt der Auskunft Das Auskunftsrecht kann ohne zeitliche Beschränkung, d.h. jederzeit, ausgeübt werden.767 Es ist unverjährbar.768 Die Auskunft ist in der Regel innert 30 Tagen seit Eingang des Auskunftsbegehrens zu erteilen (vgl. Art. 23 Abs. 7 E-DSG).769 Das Auskunftsrecht ist zudem unverzichtbar; das Gesetz hält dies in Art. 23 Abs. 5 E-DSG explizit fest, indem es bestimmt, dass niemand im Voraus auf das Auskunftsrecht verzichten kann.770 Es ist aber zulässig, dass eine betroffene Person gegenüber einem Verantwortlichen auf die (erneute) Ausübung des Auskunftsrechts verzichtet oder aber ein Gesuch wieder zurückzieht.771 7. Sanktionierung Die Verletzung von Auskunftspflichten ist gemäss Art. 54 Abs. 2 lit. a E-DSG sank­ tionsbewehrt. So werden private Personen auf Antrag mit Busse bis zu 250’000 Franken bestraft, die ihre Pflichten nach den Art. 17, 19 und 23–25 E-DSG verletzen, indem sie vorsätzlich eine falsche oder unvollständige Auskunft erteilen. 8. Bedeutung bei der drohnengestützten Datenbearbeitung durch Private Wie im Rahmen der Untersuchung der Informationspflicht festgestellt, ist es bei der drohnengestützten Datenbearbeitung unwahrscheinlich, dass die Verantwortlichen derselben nachkommen.772 Das Auskunftsrecht, als Ergänzung der Informationspflicht und als Kontrollrecht der betroffenen Person, ist somit von umso grösserer Bedeutung. Aus den vorangehenden Ausführungen erhellt jedoch, dass auch das Auskunftsrecht in diesem Kontext die ihm zugedachte Funktion nicht erfüllen kann. Denn ist der oder die Verantwortliche nicht zu identifizieren, so ist bereits das Stellen eines Auskunftsbegehrens ausgeschlossen. Dieser Umstand fällt besonders ins Gewicht, da bei der drohnengestützten Datenbearbeitung nachweislich ein Transparenzbedürfnis zu Art und Zweck derselben ausgelöst wird.773 767 Epiney/Fasnacht, in: Belser/Epiney/Waldmann, § 11 Rn. 21 m.w.H. 768 SHK DSG-Rudin, Art. 8 N 30 m.w.H.; vgl. auch BSK DSG-Gramigna/Maurer-Lambrou, Art. 8 N 61. 769 Soll die Auskunft beschränkt werden, so sollte der begründete Entscheid über die Beschränkung desselben innert gleicher Frist ergehen (vgl. Art. 8 Abs. 4 VDSG). 770 Diese Bestimmung wurde aus dem DSG, namentlich dessen Art. 8 Abs. 6, übernommen. 771 Weiterführend dazu Epiney/Fasnacht, in: Belser/Epiney/Waldmann, § 11 Rn. 42; BSK DSG-Gramigna/Maurer-Lambrou, Art. 8 N 61, je m.w.H. 772 Vgl. vorne, S. 98. 773 Vgl. zu den diesbezüglichen Studien vorne, S. 5 mit den Hinweisen in Fn. 34. 106 Teil 3: Bestandesaufnahme (1): Der E-DSG VI. Rechte bei Persönlichkeitsverletzungen Die in Art. 26 bis 28 E-DSG enthaltenen Vorschriften entsprechen weitgehend, mit einigen redaktionellen Änderungen, den heute geltenden Art. 12, 13 und 15 DSG.774 Inhaltlich konkretisieren diese Normen die in Art. 28 ff. ZGB geregelten Ansprüche bei Verletzungen der Persönlichkeit und allfällige Rechtfertigungsgründe im Kontext des Datenschutzrechts.775 1. Persönlichkeitsverletzung Wer Personendaten bearbeitet, darf die Persönlichkeit der betroffenen Personen nicht widerrechtlich verletzen (Art. 26 Abs. 1 E-DSG). Eine Persönlichkeitsverletzung liegt gemäss der Auflistung in Abs. 2 insbesondere vor, wenn die Datenbearbeitungsgrundsätze776 nicht eingehalten werden (lit. a).777 Daneben sind auch die Bearbeitung entgegen der ausdrücklichen Willens­ erklärung778 der betroffenen Person sowie die Bekanntgabe an Dritte von besonders schützenswerten Personendaten explizit erwähnt (lit. b und c). Die Liste ist — wie sich bereits aus der Verwendung des Begriffs «insbesondere» ergibt — als nicht abschliessend zu verstehen.779 Bei der drohnengestützten Datenbearbeitung durch Private werden regelmässig Datenbearbeitungsgrundsätze nicht eingehalten, wobei der Grundsatz der Erkennbarkeit im Vordergrund steht.780 In diesen Fällen ist gemäss Art. 26 Abs. 2 lit. a E-DSG grundsätzlich eine Persönlichkeitsverletzung gegeben; diese kann jedoch möglicherweise gerechtfertigt sein.781 Die zu Art. 12 Abs. 2 lit. a DSG geführte Diskussion, ob eine Rechtfertigung einer Persönlichkeitsverletzung aufgrund der Verletzung eines Datenbearbeitungsgrundsatzes überhaupt möglich ist,782 dürfte mit dem E-DSG erledigt 774 Botschaft Totalrevision DSG, S. 7070 f.; vgl. auch Rosenthal, Entwurf, Rn. 33 f. und 117. 775 BGE 136 II 508 E. 6.3.2; 127 III 481 E. 3 a/bb; Aebi-Müller, Rn. 545; Meier, Rn. 1517 ff.; Botschaft Totalrevision DSG, S. 7071; vgl. auch Schweizer M. Rn. 354 ff. 776 Ausführlich zu den Bearbeitungsgrundsätzen vorne, S. 82 ff. 777 Vgl. dazu anschaulich BSK DSG-Rampini, Art. 12 N 9. 778 Vgl. zur Bedeutung dieses Widerspruchsrechts im Kontext der informationellen Selbstbestimmung Handkomm. DSG-Rosenthal, Art. 4 N 66. 779 Botschaft Totalrevision DSG, S. 7072; vgl. SHK DSG-Wermelinger, Art. 12 N 4; BSK DSG-Rampini, Art. 12 N 7; Aebi-Müller, Rn. 574. 780 Ausführlich dazu vorne, S. 85 f. 781 Zu den Rechtfertigungsgründen sogleich, S. 108 f. 782 Vgl. dazu BGE 136 II 508 E. 5.3.1 ff.; BSK DSG-Rampini, Art. 12 N 9b. § 3 Zentrale Bestimmungen des E-DSG 107 sein.783 Eine Rechtfertigung der Bearbeitung von Personendaten entgegen den allgemeinen Bearbeitungsgrundsätzen ist demnach nicht generell ausgeschlossen; die Rechtfertigungsgründe dürfen aber im konkreten Fall nur mit grosser Zurückhaltung bejaht werden.784 Da die Aufnahmen von Personen und Grundstücken mithilfe von Drohnen besonders schützenswerte Personendaten darstellen können,785 kommt — bei deren Bekanntgabe — auch der Regelung von Art. 26 Abs. 2 lit. c E-DSG Gewicht zu. Eine solche Bekanntgabe, etwa eine Weitergabe an Dritte, bedarf somit in jedem Fall eines Rechtfertigungsgrundes,786 ansonsten sie eine widerrecht­ liche Persönlichkeitsverletzung darstellt. Von geringerer Bedeutung ist jedoch Art. 26 Abs. 2 lit. b E-DSG. Gemäss dieser Bestimmung liegt eine Persönlichkeitsverletzung vor, wenn Personendaten entgegen der ausdrücklichen Willenserklärung der betroffenen Person bearbeitet werden. Ein solches Verbot kann jedoch nicht pauschal ausgesprochen werden; es muss vielmehr gegenüber bestimmten Verantwortlichen und bezogen auf bestimmte Daten und Bearbeitungen verhängt werden.787 Bei der drohnengestützten Datenbearbeitung durch Private dürfte eine entsprechende «ausdrückliche» Willenserklärung der betroffenen Personen kaum einmal vorliegen bzw. kaum vom allfälligen Bearbeiter zur Kenntnis genommen werden.788 Anders würde es sich nur verhalten, wenn etwa die betroffene Person die Drohne sowie deren Betreiber identifizieren, diesen direkt ansprechen und eine allfällige Datenbearbeitung explizit verbieten kann. Keine Persönlichkeitsverletzung liegt in der Regel vor, wenn die betroffene Person die Personendaten allgemein zugänglich gemacht und eine Bearbeitung nicht ausdrücklich untersagt hat (Art. 26 Abs. 3 E-DSG). Ein «allgemeines Zugänglichmachen» von Daten setzt voraus, dass dies in den Medien 783 Vgl. Botschaft Totalrevision DSG, S. 7072: «In Buchstaben b und c [von Art. 26 Abs. 2 E-DSG] wurde die Bezugnahme auf den Rechtfertigungsgrund entfernt, wie dies bei der Revision im Jahre 2003 bereits für Buchstabe a [von Art. 12 Abs. 2 DSG] erfolgte. Auch dies dient lediglich der Klarheit und entspricht Artikel 28 ZGB, in dem die Verletzung der Persönlichkeit und die Rechtfertigungsgründe ebenfalls in zwei Teilbestimmungen behandelt werden.» 784 BGE 136 II 508 E. 5.2.4; 138 II 346 E. 7.2; vgl. BSK DSG-Rampini, Art. 12 N 9b in fine; ausführlich zur Kontroverse Handkomm. DSG-Rosenthal, Art. 12 N 16 ff. 785 Vgl. dazu vorne, S. 33 ff. 786 Vgl. BSK DSG-Rampini, Art. 12 N 14; Handkomm. DSG-Rosenthal, Art. 12 N 44. Zu den Rechtfertigungsgründen sogleich, Rn. 298 ff. 787 Botschaft Totalrevision DSG, S. 7071 f.; BSK DSG-Rampini, Art. 12 N 11; Handkomm. DSG-Rosenthal, Art. 12 N 31. 788 Vgl. Botschaft Totalrevision DSG, S. 7071 f.; BSK DSG-Rampini, Art. 12 N 11; SHK DSG-Wermelinger, Art. 12 N 6 f., der vom «Empfang des Verbots» spricht. Vgl. sodann ausführlich Meier, Rn. 1553 ff. 108 Teil 3: Bestandesaufnahme (1): Der E-DSG oder im Internet geschieht;789 so sind sie für «eine unbestimmte Zahl von Personen […] ohne wesentliche Hindernisse» zugänglich.790 Für die vorliegende Auseinandersetzung ist dieser Ausschluss unbeachtlich. 2. Rechtfertigungsgründe Gemäss Art. 27 Abs. 1 E-DSG ist eine Persönlichkeitsverletzung widerrechtlich, wenn sie nicht durch Einwilligung der betroffenen Person, durch ein überwiegendes privates oder öffentliches Interesse oder durch Gesetz gerechtfertigt ist. Diese Bestimmung entspricht der Regelung in Art. 28 Abs. 2 ZGB. Die Rechtfertigungsgründe des Gesetzes sowie der Einwilligung der betroffenen Person finden im Zusammenhang mit der drohnengestützten Datenbearbeitung durch Private kaum einmal Anwendung.791 Zunächst ist kein Gesetz ersichtlich, welches in diesem Kontext eine Datenbearbeitung rechtfertigen würde. Vorausgesetzt wäre dafür, dass der Gesetzgeber eine Datenbearbeitung «ausdrücklich fordert, erlaubt oder zumindest stillschweigend voraussetzt».792 Des Weiteren darf auch das Vorliegen einer wirksamen Einwilligung regelmässig verneint werden.793 Eine solche ist gemäss Art. 5 Abs. 6 E-DSG nur gültig, wenn sie für eine oder mehrere bestimmte Bearbeitungen nach angemessener Information freiwillig erteilt wird. Bei drohnengestützten Datenbearbeitungen durch Private sind nur wenige Situationen vorstellbar, in welcher diese Voraussetzungen erfüllt sind.794 Art. 27 Abs. 2 E-DSG enthält eine nicht abschliessende Liste von Fällen, in denen ein überwiegendes Interesse des Verantwortlichen als Rechtfertigungsgrund in Betracht fällt.795 So werden u.a. der Abschluss und die Durchführung eines Vertrags (lit. a), die Überprüfung der Kreditwürdigkeit (lit. c), 789 Meier, Rn. 1573; BSK DSG-Rampini, Art. 12 N 16, erwähnt zusätzlich öffentliche Veranstaltungen; vgl. SHK DSG-Wermelinger, Art. 12 N 10. 790 Handkomm. DSG-Rosenthal, Art. 12 N 54. Des Weiteren ist vorausgesetzt, dass dies mit Wissen und Willen der betroffenen Person geschieht (Handkomm. DSG-Rosen­ thal, Art. 12 N 55 f.). 791 Vgl. zur grundsätzlichen Bedeutung der Einwilligung als Rechtsfertigungsgrund SHK DSG-Baeriswyl, Art. 4 N 54; BSK DSG-Rampini, Art. 13 N 3. 792 SHK DSG-Wermelinger, Art. 13 N 15; vgl. BSK DSG-Rampini, Art. 13 N 15 und N 18 (mit Beispielen); Handkomm. DSG-Rosenthal, Art. 13 N 24. 793 Vgl. allgemein zur Einwilligung vorne, S. 87 f. 794 In Betracht kommt z.B. ein Hochzeitsfotograf, der die gesamte Hochzeitsgesellschaft vorab informiert (bzw. informieren lässt) und anschliessend mit einer Drohne Fotos schiesst. Die diesbezüglichen luftfahrtrechtlichen Vorgaben sollen hier ausser Acht gelassen werden. 795 Ausführlich zu den Einzelnen Tatbeständen Botschaft Totalrevision DSG, S. 7073 ff.; Meier, Rn. 1631 ff. § 3 Zentrale Bestimmungen des E-DSG 109 die Veröffentlichung im redaktionellen Teil eines periodisch erscheinenden Mediums (lit. d) oder die Verwendung zu Zwecken der Forschung, Planung oder Statistik (lit. e) genannt. Die aufgeführten Tatbestände sind im Zusammenhang mit der drohnengestützten Datenbearbeitung durch Private kaum einschlägig. Persönlichkeitsverletzungen können damit nicht gerechtfertigt werden. Handelt es sich bei der betroffenen Person um «eine Person des öffentlichen Lebens», d.h. eine (absolute oder relative) Person der Zeitgeschichte wie z.B. Politiker, Profisportler, Musiker, Schauspieler etc.,796 könnte u.U. Art. 27 Abs. 2 lit. f E-DSG zur Anwendung kommen. Gemäss dieser Bestimmung fällt ein überwiegendes Interesse des Verantwortlichen in Betracht, wenn dieser «Personendaten über eine Person des öffentlichen Lebens [sammelt], die sich auf das Wirken dieser Person in der Öffentlichkeit beziehen». Für den hier interessierenden Kontext ist ein so geartetes überwiegendes Interesse wohl in den allermeisten Fällen zu verneinen, da sich die drohnengestützte Datenbearbeitung auf das «Wirken der Person in der Öffentlichkeit» beziehen müsste.797 Ein überwiegendes privates Interesse des Verantwortlichen, das nicht im Gesetz erwähnt ist, kommt im Grundsatz ebenfalls als Rechtfertigungsgrund in Betracht. Ein solches setzt jedoch ein schützenswertes Interesse voraus, welches dasjenige der betroffenen Person überwiegt.798 Im hier interessierenden Kontext dürfte somit regelmässig keine so geartete Rechtfertigung in Betracht kommen.799 Insgesamt ist im Bereich der drohnengestützten Datenbearbeitung durch Private in den allermeisten Fällen kein Rechtfertigungsgrund gegeben. Die nicht gerechtfertigten Persönlichkeitsverletzungen bringen somit grundsätzlich die Anwendbarkeit der Ansprüche gemäss Art. 28 E-DSG mit sich. 796 Ausführlich zu den Begriffen der absoluten und relativen Person der Zeitgeschichte BGE 127 III 481 E. 2c/aa. Vgl. auch SHK DSG-Wermelinger, Art. 13 N 29; Meier, Rn. 1694. 797 Die Bestimmung wurde denn auch im Interesse von Medienschaffenden und Historikern ins DSG eingefügt (vgl. Handkomm. DSG-Rosenthal, Art. 13 N 67 m.w.H.). Sie wurde unverändert aus dem DSG in den E-DSG übernommen. 798 Ausführlich zur Beurteilung dieser Interessen Handkomm. DSG-Rosenthal, Art. 13 N 7 ff. 799 Vgl. dazu die Ausführungen zur Interessenabwägung im Zusammenhang mit der Haushaltsausnahme (vorne, S. 77). 110 3. Teil 3: Bestandesaufnahme (1): Der E-DSG Rechtsansprüche 3.1 Übersicht Art. 28 E-DSG enthält die Ansprüche, welche eine betroffene Person gegenüber privaten Verantwortlichen vor dem Zivilgericht geltend machen kann.800 Gemäss Art. 28 Abs. 2 E-DSG richten sich die Klagen zum Schutz der Persönlichkeit nach den Art. 28, 28a sowie 28g–28l ZGB.801 Darauf soll sogleich vertieft eingegangen werden. Daneben gewährt Art. 28 Abs. 1 E-DSG der betroffenen Person das Recht zu verlangen, dass unrichtige Personendaten berichtigt werden.802 Kann weder die Richtigkeit noch die Unrichtigkeit der betreffenden Personen­ daten festgestellt werden, so kann die klagende Partei verlangen, dass ein Bestreitungsvermerk angebracht wird (Art. 28 Abs. 3 E-DSG). Dem Berichtigungsanspruch kommt für die vorliegende Untersuchung untergeordnete Bedeutung zu, da die Richtigkeit der drohnengestützt bearbeiteten Daten kaum umstritten sein dürfte.803 Deshalb wird dieser Anspruch nicht weiter behandelt. Die betroffene Person kann zudem verlangen, dass die Berichtigung, die Löschung oder die Vernichtung, das Verbot der Bearbeitung oder der Bekanntgabe an Dritte, der Bestreitungsvermerk oder das Urteil Dritten mitgeteilt oder veröffentlicht wird (Art. 28 Abs. 4 E-DSG). 3.2 Klagen zum Schutz der Persönlichkeit Die datenschutzrechtlichen Klagen «richten sich nach» den Bestimmungen des ZGB (Art. 28 Abs. 2 E-DSG). Letztere sind folglich nicht unbesehen auf das Datenschutzgesetz zu übertragen; vielmehr ist kurz auf das Zusammenspiel zwischen den beiden Gesetzen einzugehen. Zunächst enthält Art. 28 Abs. 1 ZGB den Grundsatz, dass, wer in seiner Persönlichkeit widerrechtlich verletzt wird, zu seinem Schutz gegen jeden, der an der Verletzung mitwirkt, das Gericht anrufen kann. Abs. 2 dieser Be- 800 Die Ansprüche, welche gegenüber einem verantwortlichen Bundesorgan geltend gemacht werden können, finden sich in Art. 37 E-DSG. Vgl. dazu Botschaft Totalrevision DSG, S. 7084 ff. 801 Auf das bestehende Kosten- und Prozessrisiko kann vorliegend nicht weiter eingegangen werden; vgl. zu den diesbezüglichen Revisionsvorschlägen Botschaft Totalrevision DSG, S. 7123 f.; vgl. auch Handkomm. DSG-Rosenthal, Art. 15 N 2, und im Allgemeinen Kiener, Zugang, S. 54 f. 802 Es sei denn, eine gesetzliche Vorschrift verbietet die Änderung (lit. a) oder die Personen­ daten werden zu Archivzwecken im öffentlichen Interesse bearbeitet (lit. b). 803 Vgl. zur Datenrichtigkeit vorne, S. 86 f. § 3 Zentrale Bestimmungen des E-DSG 111 stimmung nennt Rechtfertigungsgründe; diese enthält der E-DSG selbst und fast gleichlautend bereits in Art. 27 Abs. 1. Als lex specialis geht die Bestimmung des E-DSG vor.804 Die Art. 28g–28l ZGB behandeln das Recht auf Gegendarstellung; sie sind für die vorliegende Untersuchung unbeachtlich.805 Art. 28a ZGB regelt die einzelnen Ansprüche, welche der betroffenen Person zur Verfügung stehen: Unterlassung (Abs. 1 Ziff. 1), Beseitigung (Abs. 1 Ziff. 2); Feststellung (Abs. 1 Ziff. 3); Schadenersatz (Abs. 3 i.V.m. Art. 41 ff. OR806); Genugtuung (Abs. 3 i.V.m. Art. 49 OR) und Gewinnherausgabe (Abs. 3 i.V.m. Art. 423 OR).807 Art. 28 Abs. 2 E-DSG seinerseits verdeutlicht die Unterlassungs- und Beseitigungsansprüche im datenschutzrechtlichen Kontext, indem er namentlich das Verbot einer bestimmten Datenbearbeitung (lit. a) und die Unter­ sagung einer bestimmten Bekanntgabe von Personendaten an Dritte (lit. b) explizit erwähnt.808 Daneben nennt die Bestimmung auch den Anspruch auf Löschung oder Vernichtung von Personendaten (lit. c).809 Aus Art. 26 Abs. 2 lit. a E-DSG ergibt sich — zusammen mit dem Löschungs- und Vernichtungsanspruch — des Weiteren ein einklagbares «Recht auf Vergessenwerden».810 Im Zusammenhang mit der drohnengestützten Datenbearbeitung durch Private sind dem Widerspruchs- bzw. Beseitigungsrecht sowie dem Unterlassungsanspruch zentrale Bedeutung zuzumessen. Dagegen kommt 804 Vgl. SHK DSG-Wermelinger, Art. 15 N 7. 805 Gemäss Art. 28g Abs. 1 ZGB hat, wer durch Tatsachendarstellungen in periodisch erscheinenden Medien, insbesondere Presse, Radio und Fernsehen, in seiner Persönlichkeit unmittelbar betroffen ist, Anspruch auf Gegendarstellung. Vgl. ausführlich zum Gegendarstellungsrecht statt vieler BSK ZGB I-Schwaibold, Art. 28g ff., passim. 806 Besteht zwischen dem Verantwortlichen und der betroffenen Person ein Vertrag, so können sich auch daraus Ansprüche aus Persönlichkeitsverletzung ergeben. Vom Bestehen eines entsprechenden Vertrags ist in den hier interessierenden Konstellationen nicht auszugehen. Vgl. dazu statt aller Handkomm. DSG-Rosenthal, Art. 15 N 9 f. 807 Die in Art. 28a Abs. 2 ZGB enthaltenen Ansprüche auf Mitteilung und Veröffentlichung werden in Art. 28 Abs. 4 E-DSG konkretisiert (Botschaft Totalrevision DSG, S. 7078; vgl. Poledna/Codoni, S. 274). 808 Vgl. Botschaft Totalrevision DSG, S. 7077. 809 «Der Begriff ‹Vernichten› ist stärker als der Begriff ‹Löschen› und impliziert, dass die Daten unwiederbringlich zerstört werden. Wenn die Daten auf Papier vorhanden sind, ist dieses zu verbrennen oder zu schreddern» (Botschaft Totalrevision DSG, S. 7021). Vgl. ausführlich zur Vernichtung von elektronischen Daten und deren Abgrenzung zur Löschung BVGE 2015/13 E. 3.3.4 sowie BSK DSG-Bühler, Art. 21 N 14 f. 810 Vgl. Rosenthal, Entwurf, Rn. 32; Botschaft Totalrevision DSG, S. 7077. Dieses ist in der Rechtsprechung zum zivilrechtlichen Persönlichkeitsschutz bereits seit längerer Zeit anerkannt; vgl. BGE 111 II 209 E. 3c; 122 III 449 E. 3b. 112 Teil 3: Bestandesaufnahme (1): Der E-DSG den Ansprüchen auf Schadenersatz811 und Gewinnherausgabe812 nur untergeordnete Bedeutung zu.813 Eine Genugtuungsklage käme jedoch prinzipiell in Betracht; gleiches gilt für die Feststellungsklage. 3.3 Die Ansprüche im Einzelnen a Beseitigung Gestützt auf Art. 28a Abs. 1 Ziff. 2 ZGB kann die betroffene Person verlangen, dass eine bestehende Persönlichkeitsverletzung beseitigt wird. Die Geltendmachung eines Beseitigungsanspruchs setzt voraus, dass die betroffene Person nachweist, dass die beklagte Partei ihre Daten in persönlichkeitsverletzender Weise (vgl. Art. 26 E-DSG) bearbeitet und diese Bearbeitung andauert.814 Im Rahmen des Datenschutzrechts kommen verschiedenste Arten der Beseitigung in Betracht. So kann neben der Löschung und Vernichtung (Art. 28 Abs. 2 lit. c E-DSG) auch ein Verbot der (weiteren) Bearbeitung und Bekanntgabe (vgl. Art. 28 Abs. 2 lit. a und b E-DSG) verlangt werden.815 Des Weiteren kann die betroffene Person etwa die Herausgabe, das Unbrauchbarmachen der Daten oder die Entfernung derselben von sozialen Netzwerken anbegehren.816 Unter dem Titel der Beseitigung kann zudem das Recht auf Auskunft gemäss Art. 23 E-DSG gerichtlich durchgesetzt werden.817 Wird ein Herausgabeanspruch geltend gemacht, so kann — im Rahmen der Verhältnismässigkeit — vom Verantwortlichen u.U. verlangt werden, dass er Datenträger wie USB-Sticks oder externe Speicherkarten wie z.B. SDKarten, 811 Eine drohnengestützte Datenbearbeitung durch Private wird regelmässig keinen Vermögensschaden im Sinne des Obligationenrechts mit sich bringen (zum Schadens­ begriff statt aller BSK OR I-Kessler, Art. 41 N 3 ff.). Aus diesem Grund wird auf eine weitere Vertiefung des Schadenersatzanspruchs verzichtet. Vgl. ausführlich und mit datenschutzrechtlichen Anwendungsbeispielen BSK DSG-Rampini, Art. 15 N 20 f.; Meier, Rn. 1782 ff. 812 Für den hier interessierenden Zusammenhang ist kaum ein Beispiel erdenklich, in welchem der Verantwortliche einen Gewinn erzielen würde. Die praktische Bedeutung dieses Anspruchs ist im Datenschutzrecht und allgemein im Kontext des Persönlichkeitsschutzes beschränkt (Poledna/Codoni, S. 276; Meier, Rn. 1788). Vgl. aber die Anwendungsbeispiele in BGE 133 III 153 und BGE 143 III 297. 813 Detailliert zu diesen Ansprüchen und deren Geltendmachung Meier, Rn. 1774 ff. mit zahlreichen Hinweisen. 814 BSK DSG-Rampini, Art. 15 N 9. Ausführlich zu den einzelnen Voraussetzungen Meier, Rn. 1731 ff. 815 Vgl. ausführlich dazu Handkomm. DSG-Rosenthal, Art. 15 N 28 ff. 816 Vgl. BSK DSG-Rampini, Art. 15 N 7 f.; SHK DSG-Wermelinger, Art. 15 N 9 ff.; Meier, Rn. 1744. 817 SHK DSG-Wermelinger, Art. 15 N 7 und N 11; Poledna/Codoni, S. 277. Vgl. Art. 243 Abs. 2 lit. d ZPO (Geltung des vereinfachten Verfahrens für diese Klagen). § 3 Zentrale Bestimmungen des E-DSG 113 auf welchen die strittigen Daten gespeichert sind, herausgibt.818 Trägt eine Drohne eine Kamera, so kommt daher grundsätzlich auch in Betracht, dass die Speicherkarte derselben her ausgefordert wird. Dabei gilt zu beachten, dass — wenn Daten verschiedener Personen darauf gespeichert sind — nicht durch die Herausgabe neuerliche Persönlichkeitsverletzungen begangen werden. Bezieht sich ein Beseitigungsanspruch auf die Löschung bzw. Vernichtung von elektronisch gespeicherten Personendaten, so geht es um einen technisch komplexen Vorgang.819 Vorausgesetzt ist, dass allfällige Kopien der Dateien in Clouds820 oder auf externen Festplatten erfasst werden (können).821 Die physische Zerstörung von Datenträgern soll vom Gericht nur als ultima ratio angeordnet werden.822 Sind Personendaten sodann im Internet, z.B. auf sozialen Netzwerken, gespeichert, führt dies oftmals dazu, dass diese auch nach einer Löschung auf der «Ursprungsseite» anderswo noch auffindbar bleiben.823 b Unterlassung Eine drohende oder die Wiederholung einer bereits begangenen Verletzung kann mit dem Unterlassungsanspruch unterbunden werden (vgl. Art. 28a Abs. 1 Ziff. 1 ZGB und Art. 28 Abs. 2 lit. a und b E-DSG). Unter diesem Titel kann etwa verlangt werden, dass eine unmittelbar bevorstehende bzw. beabsichtigte Bekanntgabe von Daten an Dritte oder Veröffentlichung von Daten (z.B. in sozialen Medien) untersagt wird.824 Die Geltendmachung des Unterlassungsanspruchs verlangt, dass die betroffene Person die Gefahr einer drohenden Persönlichkeitsverletzung nachweist. Ein Unterlassungsbegehren setzt mithin «ein hinreichendes Rechtsschutzinteresse voraus, das besteht, wenn die widerrechtliche Handlung unmittelbar droht, d.h., wenn das Verhalten des Beklagten die künftige Rechtsverletzung ernsthaft befürchten lässt.»825 Aus datenschutzrechtlicher 818 BSK DSG-Rampini, Art. 15 N 7 in fine; zurückhaltend Handkomm. DSG-Rosenthal, Art. 15 N 33; vgl. BSK ZGB I-Meili, Art. 28a N 5. 819 SHK DSG-Wermelinger, Art. 15 N 10 mit Hinweis auf PK IDG/BS-Rudin, § 16 N 13 ff.; vgl. auch BSK DSG-Bühler, Art. 21 N 14, und zu technischen Aspekten Burris, passim. 820 Cloud-Computing «ist eine weitgefasste Bezeichnung für eine IT-Architektur zur verteilten Bereitstellung von IT-basierten Diensten» (ausführlich dazu Weiss, S. 1 ff.). 821 SHK DSG-Wermelinger, Art. 15 N 10; vgl. Meier, Rn. 1746. 822 Meier, Rn. 1746. 823 SHK DSG-Wermelinger, Art. 15 N 10, nennt in diesem Zusammenhang «Archiv­ webseiten». 824 Vgl. BSK DSG-Rampini, Art. 15 N 10. 825 BGE 124 III 72 E. 2a (zu Art. 9 Abs. 1 lit. a UWG). Ähnlich BGE 128 III 96 E. 2e (zum Markenschutzrecht). Vgl. auch Meier, Rn. 1735; SHK DSG-Wermelinger, Art. 15 N 12. 114 Teil 3: Bestandesaufnahme (1): Der E-DSG Perspektive ist hier z.B. an Fälle zu denken, in denen der Verantwortliche in der Vergangenheit bereits eine ähnlich gelagerte Persönlichkeitsverletzung begangen hat und/oder eine Verwarnung durch die betroffene Person wirkungslos blieb. Ebenso wäre ein hinreichendes Rechtsschutzinteresse zu bejahen, wenn der Verantwortliche die Unrechtmässigkeit einer Bearbeitung bestreitet, sodass sich eine Wiederholung derselben abzeichnet.826 Da Datenbearbeitungen oftmals auf Dauer angelegt sind und die ernsthafte Gefahr einer Wiederholung der Persönlichkeitsverletzung bestehen kann, lassen sich Beseitigungs- und Unterlassungsansprüche nicht immer sauber trennen bzw. drängt sich eine Kombination derselben auf.827 Das Gericht kann dem Beklagten, ggf. unter Androhung der Bestrafung nach Art. 292 StGB,828 verbieten, die fragliche Datenbearbeitung vorzunehmen.829 Da damit vorwiegend präventive Zwecke verfolgt werden, ist einem solchen Begehren nur mit grosser Zurückhaltung und unter Wahrung des Grundsatzes der Verhältnismässigkeit stattzugeben.830 Im Kontext der drohnengestützten Datenbearbeitung durch Private könnte ein Unterlassungsbegehren darauf abzielen, eine beabsichtigte Veröffentlichung von Bildern oder Videos, z.B. auf sozialen Medien, gerichtlich verbieten zu lassen. c Genugtuung Gestützt auf Art. 28a Abs. 3 ZGB i.V.m. Art. 49 Abs. 1 OR hat eine Person, die in ihrer Persönlichkeit widerrechtlich verletzt wurde, Anspruch auf Leistung einer Geldsumme als Genugtuung, sofern die Schwere der Verletzung es rechtfertigt und diese nicht anders wiedergutgemacht worden ist.831 Vorausgesetzt ist mithin eine objektiv schwere Persönlichkeitsverletzung und dass diese auch subjektiv hinreichend schwer wiegt (d.h. als «seelischer Schmerz» 826 BSK DSG-Rampini, Art. 15 N 11. 827 Meier, Rn. 1733; BSK DSG-Rampini, Art. 15 N 12; Handkomm. DSG-Rosenthal, Art. 15 N 35. 828 «Ungehorsam gegen amtliche Verfügungen»; ausführlich dazu statt aller BSK StGB-Riedo/Boner, Art. 292 N 9 ff. mit zahlreichen Hinweisen. 829 Poledna/Codoni, S. 272; SHK DSG-Wermelinger, Art. 15 N 13. 830 BSK ZGB I-Meili, Art. 28a N 2; Meier, Rn. 1741. Vgl. auch BGE 135 III 145 E. 5 ff. 831 Als Wiedergutmachung kommen z.B. die Gutheissung eines Feststellungsbegehrens und die Urteilspublikation in Betracht (so BGE 133 III 153 E. 4). «Eine Geldsumme als Genugtuung soll nur gewährt werden, wenn der Betroffene Beeinträchtigungen erlitten hat, die wegen ihrer Intensität das Mass überschreiten, was eine Person nach der heute geltenden Auffassung ohne besonderen Rechtsschutz zu erdulden hat» (Botschaft Persönlichkeitsschutz, S. 681) § 3 Zentrale Bestimmungen des E-DSG 115 empfunden wird).832 Diese Voraussetzungen sind (auch) im datenschutzrechtlichen Kontext vom Kläger nachzuweisen.833 Neben der widerrechtlichen Persönlichkeitsverletzung muss für einen Genugtuungsanspruch ein Verschulden des Verletzers834 sowie ein adäquater Kausalzusammenhang835 zwischen der persönlichkeitsverletzenden Datenbearbeitung und der erlittenen seelischen Unbill vorliegen.836 Eine Genugtuung kommt u.a. in Betracht, wenn besonders schützenswerte Personendaten unrechtmässig bearbeitet werden.837 Diese Voraussetzungen können grundsätzlich bei einer drohnengestützten Datenbearbeitung durch Private vorliegen.838 Regelmässig werden aber Daten, welche Private mithilfe einer Drohne bearbeiten (z.B. in der Form der Bekanntgabe an Dritte), keine seelische Unbill von der erforderlichen Schwere verursachen.839 d Feststellung Gestützt auf Art. 28a Abs. 1 Ziff. 3 ZGB hat eine in ihrer Persönlichkeit verletzte Person Anspruch, die Widerrechtlichkeit einer Verletzung feststellen zu lassen, wenn sich diese weiterhin störend auswirkt. Vorausgesetzt ist, dass die Verletzung bereits eingetreten ist, diese aber nicht mehr andauert.840 In diesem Fall würden sowohl der Unterlassungs- sowie der Beseitigungsanspruch ins Leere laufen. Die Feststellungsklage ist denn auch subsidiär zu diesen Ansprüchen.841 832 BSK DSG-Rampini, Art. 15 N 22; BSK ZGB I-Meili, Art. 28a N 17; Handkomm. DSG-Rosenthal, Art. 15 N 49; Hausheer/Aebi-Müller, Rn. 14.63. Vgl. BGE 143 III 297 E. 9; 129 III 715 E. 4.4; 120 II 97 E. 2. 833 Art. 8 ZGB; BGE 120 II 97 E. 2b; BGer, 4A_465/2012 vom 10. Dezember 2012 E. 3.2; SHK DSG-Wermelinger, Art. 15 N 18; BSK DSG-Rampini, Art. 15 N 22. 834 Ständige Rechtsprechung seit BGE 126 III 161 E. 5b/aa; vgl. BGE 133 III 26 E. 12.1; BSK OR IKessler, Art. 49 N 14; anders dagegen BGE 120 II 97 E. 2c (obiter). Vgl. auch BSK ZGB IMeili, Art. 28a N 17 m.w.H. 835 Handkomm. DSG-Rosenthal, Art. 15 N 49. Zum Begriff des adäquaten Kausalzusammenhangs statt aller BSK OR I-Kessler, Art. 41 N 16 ff. mit zahlreichen Hinweisen. 836 Zur Bedeutung des Verschuldens bei der Bemessung einer allfälligen Genugtuung in Form einer Geldsumme BSK ZGB I-Meili, Art. 28a N 17; BSK DSG-Rampini, Art. 15 N 24. 837 Dazu und mit weiteren Anwendungsbeispielen BSK DSG-Rampini, Art. 15 N 22; SHK DSG-Wermelinger, Art. 15 N 19. Zurückhaltend Handkomm. DSG-Rosenthal, Art. 15 N 50. 838 Zur Bearbeitung von besonders schützenswerten Personendaten durch Drohnen vgl. vorne, S. 34. 839 Vgl. die Beispiele bei SHK DSG-Wermelinger, Art. 15 N 19; BSK DSG-Rampini, Art. 15 N 22. 840 Anschaulich BSK ZGB I-Meili, Art. 28a N 6; vgl. Handkomm. DSG-Rosenthal, Art. 15 N 36. 841 Anders verhält es sich im Verhältnis zu den anderen Klagen gemäss Art. 28a Abs. 2 und 3 ZGB (BSK DSG-Rampini, Art. 15 N 15 m.w.H.). 116 Teil 3: Bestandesaufnahme (1): Der E-DSG Zur erfolgreichen Geltendmachung des Feststellungsanspruchs muss sich die (abgeschlossene) Persönlichkeitsverletzung weiterhin oder erneut störend auswirken.842 «Der Feststellungsklage kommt […] die Funktion zu, eine eingetretene Persönlichkeitsverletzung zu beseitigen. Besteht ein durch eine Verletzung in den persönlichen Verhältnissen hervorgerufener Störungszustand, nimmt das Begehren um gerichtliche Feststellung einer widerrechtlichen Persönlichkeitsverletzung eine dem Verletzten dienende Beseitigungsfunktion wahr.»843 Die Feststellungsklage steht im Vordergrund, wenn für den Kläger ideelle Überlegungen ausschlaggebend sind; diese können sodann mit dem Rechtsbegehren der Mitteilung oder der Veröffentlichung verknüpft werden.844 Ein solches Vorgehen kommt z.B. in Betracht, wenn durch die persönlichkeitsverletzende Datenbearbeitung wie eine Publikation im Internet ein «nachteiliges Vorstellungsbild in der Öffentlichkeit oder bei Dritten» entstanden ist.845 An das Feststellungsinteresse sind keine hohen Anforderungen zu stellen.846 Die infrage stehende Persönlichkeitsverletzung muss somit nicht schwer wiegen.847 Im Zusammenhang mit der drohnengestützten Datenbearbeitung durch Private käme eine Feststellungsklage demnach in Betracht, wenn etwa durch ungewollte, auf sozialen Netzwerken veröffentlichte Foto- oder Videoaufnahmen ein nachteiliges Bild der betroffenen Person bei Dritten entstanden ist. 4. Bedeutung bei der drohnengestützten Datenbearbeitung durch Private Die in diesem Abschnitt gemachten Ausführungen zeigen klar auf, dass bei der drohnengestützten Datenbearbeitung regelmässig widerrechtliche Persönlichkeitsverletzungen begangen werden, wogegen die in Art. 28 E-DSG enthaltenen Ansprüche geltend gemacht werden können. Die zur Verfügung stehenden Klagevarianten sind denn auch grundsätzlich geeignet, um bei persönlichkeitsverletzenden Datenbearbeitungen mittels Drohnen Abhilfe 842 Vgl. den Wortlaut von Art. 28a Abs. 1 lit. c; BGE 127 III 481 E. 1c/aa; SHK DSG-Wermelinger, Art. 15 N 16; Handkomm. DSG-Rosenthal, Art. 15 N 36. 843 BGer, 5A_286/2012 vom 29. Oktober 2012 E. 2.1. Vgl. auch BGE 127 III 481 E. 1c/aa und grundlegend bereits BGE 95 II 481 E. 9. 844 Vgl. SHK DSG-Wermelinger, Art. 15 N 17; Handkomm. DSG-Rosenthal, Art. 15 N 37. 845 BSK DSG-Rampini, Art. 15 N 15; Meier, Rn. 1752; vgl. BGE 122 III 449 E. 2b. 846 BSK DSG-Rampini, Art. 15 N 15; Meier, Rn. 1753; Pedrazzini, Rechtsschutz, S. 82 f.; Handkomm. DSG-Rosenthal, Art. 15 N 37. 847 BGE 127 III 481 E. 1c/bb; Meier, Rn. 1753. Vgl. auch BSK ZGB I-Meili, Art. 28a N 8 mit Hinweisen auf die uneinheitliche Praxis zu dieser Frage vor BGE 127 III 481. § 4 Gesamtbetrachtung und Überleitung 117 zu schaffen. Die betroffenen Personen werden jedoch kaum einmal wirksam eine Klage zum Schutz der Persönlichkeit einreichen können, da ihnen die Kenntnis über die Identität des Drohnenbetreibers fehlt. § 4 Gesamtbetrachtung und Überleitung Der dritte Teil der vorliegenden Untersuchung hat die drohnengestützte Datenbearbeitung im Lichte des zukünftigen Schweizer Datenschutzgesetzes beleuchtet. Wie sich gezeigt hat, kommt die Haushaltsausnahme auf die drohnengestützte Datenbearbeitung durch Private nur in Ausnahmefällen zur Anwendung. Grundsätzlich greift mithin der E-DSG und die darin vorgesehenen Rechte und Pflichten sind anwendbar.848 Der Informationspflicht bei der Beschaffung von Personendaten, welche auch bei der drohnengestützten Datenbearbeitung einzuhalten wäre, kommen die Verantwortlichen wohl in den allermeisten Fällen nicht nach.849 Doch auch die Ausübung des Auskunftsrechts ist den betroffenen Personen kaum einmal möglich.850 Es muss deshalb konstatiert werden, dass die von einer drohnengestützten Datenbearbeitung betroffenen Personen sich nicht über Identität des Bearbeiters und Zweck der Bearbeitung informieren können. Die Rechte bei Persönlichkeitsverletzungen würden es prinzipiell erlauben, gegen Drohnenbetreiber vorzugehen, welche unter Verletzung von Persönlichkeitsrechten Daten bearbeiten.851 Jedoch scheitert dieses Vorgehen an der Anonymität der oder des Verantwortlichen. Ein effektiver Rechtsschutz fehlt somit. Insgesamt steht fest, dass das vom Gesetzgeber angestrebte Ziel der einfachgesetzlichen Konkretisierung und Verwirklichung der informationellen Selbstbestimmung im E-DSG nur teilweise erreicht wird. Die vorangehend analysierten Bestimmungen weisen klare Mängel bei der Rechtsdurchsetzung auf. Es gilt deshalb nun, die Bestandesaufnahme zur drohnengestützten Daten­bearbeitung und der Durchsetzung von datenschutzrechtlichen Ansprüchen mit Bezug auf das Luftfahrtrecht fortzuführen. 848 Ausführlich zum Ganzen vorne, S. 75 ff., v.a. S. 81. 849 Vgl. dazu vorne, S. 93 ff. 850 Vgl. vorne, S. 100 ff. 851 Vgl. dazu vorne, S. 106 ff. 119 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» § 1 Vorbemerkungen Das Schweizer Luftfahrtrecht kennt nur wenige Vorschriften zum Datenschutz. Art. 107a und 107b LFG852 beziehen sich zum einen auf die Datenbearbeitung durch das BAZL und weitere im Bereich des Luftfahrtrechts zuständige Behörden und Organisationen.853 Zum anderen sind dort die Zugriffsrechte zum Luftfahrzeugregister geregelt; Drohnen werden darin nicht eingetragen.854 Aus diesem Grund stehen die Bestimmungen der drei Drohnenverordnungen mit ihren Bezügen zum Datenschutz im Vordergrund.855 Nachfolgend werden deshalb die Vorschriften zur Identifizierung von Drohnenbetreibern, namentlich die Registrierung (sogleich, S. 120 ff.), die Kennzeichnung (S. 135 ff.), die Fernidentifizierung (S. 138 ff.) sowie der sog. U-Space (S. 142 ff.), behandelt. Ausserdem gilt es, auf den Spezialfall der selbst gebauten Drohnen einzugehen (S. 144 ff.) sowie auf gewisse Schwierigkeiten bei der Umsetzung der Drohnenverordnungen hinzuweisen (S. 146 ff.). In einem anschliessenden Abschnitt werden einige präventive und flankierende Massnahmen in den europäischen Regelwerken in ihren Bezügen zum Datenschutz untersucht. Neben den Aufklärung- und Informationsmassnahmen (S. 148 ff.) werden unter diesem Titel auch die Themen GeoAware­ness (S. 151 ff.) und Positionslichter (S. 153 ff.) analysiert.856 852 Die im Rahmen der Totalrevision des DSG vorgeschlagene Änderung des Art. 107a LFG wirkt sich inhaltlich nicht auf die vorliegende Untersuchung aus (vgl. Botschaft Totalrevision DSG, S. 7142; vgl. auch hinten, S. 172). 853 Vgl. dazu etwa BVGer, A­2 401/2011 vom 6. Januar 2012 E. 4.1 ff. 854 Vgl. dazu bereits vorne, S. 3 f., sowie insbesondere die Ausführungen hinten, S. 131 ff. 855 Vgl. zu den drei Verordnungen vorne, S. 13 ff. 856 Auf eine Analyse von weiteren Aspekten der Drohnenverordnungen wird verzichtet. 120 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» Zusammen mit den Resultaten der Bestandesaufnahme zum E-DSG857 ergeben die hier gemachten Ausführungen ein Gesamtbild, welches in einem nachfolgenden Schritt anhand der in Teil 2 herausgeschälten grundrecht­ lichen Vorgaben beurteilt werden kann.858 § 2 Identifizierung von Drohnenbetreibern I. Registrierung 1. Zentrale Bedeutung der Registrierung Die Registrierung von Drohnen und deren Betreibern ist in den allermeisten Fällen859 ein zentraler und notwendiger Schritt zur Identifizierung des jeweiligen Drohnenbetreibers860 oder piloten.861 Gleichzeitig handelt es sich jedoch «nur» um den ersten Schritt; zusätzlich muss eine Identifikation der Drohne aus der Ferne möglich sein.862 Die Registrierung ist mithin für die Rechtsdurchsetzung — gerade auch im Bereich des Datenschutzrechts — von zentraler Bedeutung.863 2. Registrierungspflicht für Drohnen und Betreiber Die Grundlage der Registrierungspflicht findet sich in Art. 57 lit. d und in Anhang IX Ziff. 4 EASA-Grundverordnung sowie den darauf basierenden Regeln in der Durchführungsverordnung. In Anhang IX Ziff. 4.1 schreibt die EASA-­ Grundverordnung vor, dass «unbemannte Luftfahrzeuge, für deren Konstruktion eine Zertifizierung gemäss Artikel 56 Absatz 1 erforderlich ist, im Einklang mit den in Artikel 57 genannten Durchführungsrechtsakten registriert [werden].»864 Die Betreiber von Drohnen werden registriert, wenn (a) das Luftfahrzeug bei einem Zusammenstoss kinetische Energie von mehr als 80 Joule auf 857 Vgl. vorne, S. 73 ff., v.a. S. 117. 858 Hinten, S. 157 ff. 859 Je nach Entfernung zur Drohne und der Einsehbarkeit des Geländes kann der Drohnenbetreiber ggf. visuell und durch direkte (persönliche) Kontaktaufnahme identifiziert werden. Vgl. dazu auch hinten, S. 160. 860 Vgl. zu den Begriffen «Pilot» und «Betreiber» ausführlich vorne, S. 27 f. 861 Grest, S. 120 f.; Delise, S. 25; Hänsenberger, AJP 2017, S. 164; Hänsenberger, Diss., S. 207 und S. 231 f.; Krumm, Anpassungsbedarf, S. 120; Schubert, S. 232. 862 Dazu ausführlich hinten, S. 138 ff. 863 Burger/Scuderi, S. 89 in fine. Vgl. auch EASA, Opinion, S. 27; Leissler, S. 536. 864 Es geht mithin um die Registrierung der Drohne an sich; vgl. zur Definition des unbemannten Luftfahrzeugs vorne, S. 20 f. § 2 Identifizierung von Drohnenbetreibern 121 einen Menschen übertragen kann,865 wenn (b) sein Betrieb mit Risiken für die Privatsphäre, den Schutz von personenbezogenen Daten,866 die Sicherheit oder die Umwelt verbunden ist oder wenn (c) für dessen Konstruktion eine Zertifizierung gemäss Art. 56 Abs. 1 EASA-Grundverordnung erforderlich ist.867 3. Die Kriterien im Einzelnen 3.1 Zertifizierung der Konstruktion Die Formulierung von Art. 56 Abs. 1 EASA-Grundverordnung weicht vom Wortlaut der Bestimmungen in Anhang IX Ziff. 4.1 und Ziff. 4.2 lit. c EASA-­ Grundverordnung ab. Erstere Vorschrift erwähnt nämlich keine «Zertifizierung», sondern «eine Zulassung/ein Zeugnis». Diese terminologische Besonderheit in Art. 56 Abs. 1 EASA-Grundverordnung lässt sich dadurch erklären, dass die darin aufgelisteten Sachverhalte («Konstruktion», «Herstellung», «Propeller», «Personal, einschliesslich Fernpilot» etc.) nicht alle (sinnvoll) vom Begriff der «Zertifizierung» erfasst werden können.868 Die Formulierung «Zulassung/Zeugnis» bezweckt somit die Erfassung aller aufgelisteten Sachverhalte, so auch die Zertifizierung der Konstruktion gemäss Anhang IX Ziff. 4.1 EASA-Grundverordnung.869 Die Zertifizierung der Konstruktion steht denn auch im Zentrum der Registrierungspflicht.870 Angesprochen sind damit Drohnen der zulassungspflichtigen Kategorie.871 Das Risiko, das von diesen Drohnen und deren Betrieb ausgeht (etwa, weil sie für die Beförderung von Menschen 865 Joule ist die SI-Einheit für Energie. Vgl. dazu ausführlich sogleich, S. 122 f. 866 Vgl. zum Begriff die Hinweise vorne, Fn. 575. 867 Anhang IX Ziff. 4.2 EASA-Grundverordnung; vgl. Josipovic, S. 440. 868 Es wäre unüblich, von einer «Zertifizierung» als Pilot zu sprechen; vielmehr wird in diesem Zusammenhang von einer «Zulassung» oder einer «Lizenz» gesprochen (vgl. z.B. Art. 3 lit. c Durchführungsverordnung). 869 Vgl. zur Änderung des Wortlauts von Art. 56 Abs. 1 EASA-Grundverordnung während des Gesetzgebungsverfahrens auch Rat der Europäischen Union, Vorschlag Dezember 2015, S. 48 sowie Rat der Europäischen Union, Vorschlag Dezember 2016, S. 97 (jeweils zu Art. 46 des ursprünglichen Vorschlags). 870 EASA, Opinion, S. 16, verweist denn auch auf das sog. Lufttüchtigkeitszeugnis (Certi�ficate of Airworthiness, CofA). 871 Vgl. die Marginalie zu Art. 14 Durchführungsverordnung «Registrierung […] zulassungspflichtiger UAS»; vgl. sodann zum Begriff vorne, S. 23 f. Unter gewissen Umständen können auch Drohnen der «speziellen» Kategorie eine solche Zulassung benötigen (vgl. EASA, Opinion, S. 30); auf weitere technische Ausführungen dazu wird verzichtet. 122 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» konstruiert sind872), erfordert eine eingehende Prüfung derselben durch die zuständige Behörde.873 Die unter dem Aspekt der Zertifizierung der Konstruktion erfassten Drohnen und deren Betreiber sind für die vorliegende Auseinandersetzung vernachlässigbar. Wie bereits aufgezeigt, sind die von Privaten betriebenen Drohnen regelmässig der offenen Kategorie zuzuordnen; deren Konstruktion bedarf keiner Zertifizierung.874 3.2 Kinetische Energie a Begriff und Bedeutung Die Formel für kinetische Energie lautet «halbe Masse mal Geschwindigkeit im Quadrat» (½ m × v2). Der Geschwindigkeit kommt folglich eine viel grössere Bedeutung zu als der Masse.875 Das Abstellen auf die kinetische Energie, welche im Fall einer Kollision beim Aufprall von einer Drohne übertragen werden kann, leuchtet ohne Weiteres ein. Im Strassenverkehrsrecht wird die Betriebsgefahr ebenfalls anhand der kinetischen Energie beurteilt.876 Die Grenze von 80 Joule kinetischer Energie als Anknüpfungspunkt für die Registrierung soll anhand der folgenden Beispiele illustriert werden: Eine 1 kg schwere Drohne, die mit einer Geschwindigkeit von 45 km/h aufschlägt, überträgt eine kinetische Energie von 78,125 Joule.877 Die gleiche kinetische Energie überträgt eine Drohne mit einer Masse von 250 g, die mit einer Geschwindigkeit von 90 km/h aufschlägt.878 Ziemlich genau 80 Joule an kinetischer Energie überträgt eine Drohne mit einer Masse von 423 g, die mit einer Geschwindigkeit von 70 km/h aufschlägt. Diese Beispiele zeigen auf, dass die Schwelle von 80 Joule kinetischer Energie relativ schnell erreicht wird. Die Verletzungsgefahr von Personen am Boden879 rückt dadurch bei der Beurteilung der Betriebsgefahr in den 872 Art. 40 Abs. 1 lit. b Delegierte Verordnung. 873 Vgl. zu den einzelnen erfassten Drohnen Art. 40 Delegierte Verordnung. Vgl. sodann EASA, Opinion, S. 16. Eine tiefergehende Auseinandersetzung mit den einzelnen erfassten Betriebsarten kann die vorliegende Untersuchung nicht leisten. 874 Vgl. dazu vorne, S. 22. 875 Rothen, S. 52; Hänsenberger, Diss., S. 14; Schmid, S. 75. 876 OFK SVG-Giger, Art. 58 N 53a; Schaffhauser/Peter, S. 38. Vgl. auch BGer, 1C_273/2016 vom 5. Dezember 2016 E. 5.5. 877 Vgl. Josipovic, S. 440 mit Fn. 24. Vgl. zur Berechnung der kinetischen Energie beim Aufprall einer Drohne ausführlich Dalamagkidis/Valavanis/Piegl, S. 101 ff.; vgl. sodann die tabellarische Übersicht bei Hänsenberger, Diss., S. 15 f. 878 Vgl. Masutti/Tomasello, S. 75 f. 879 Die Beförderung von Menschen mit Drohnen wird in Zukunft möglich sein; vgl. vorne, S. 121, sowie Art. 6 Abs. 1 lit. b Durchführungsverordnung; Preznuk, S. 99 ff.; zurück- § 2 Identifizierung von Drohnenbetreibern 123 Vordergrund.880 Bei einer Einwirkung von kinetischer Energie im Umfang von 80 Joule auf den (ungeschützten) Kopf eines Menschen beträgt die Wahrscheinlichkeit der Todesfolge des Aufpralls ungefähr 30%.881 Umstände des Einzelfalls wie z.B. das Alter oder die Gesundheit des betroffenen Menschen bleiben unberücksichtigt; Gleiches gilt für die Orientierung der Drohne beim Aufprall (z.B. mit Propellern oder mit der Ladung voran etc.).882 Zu Recht weist Hänsenberger in diesem Zusammenhang darauf hin, dass «der Rückgriff auf objektivierte Werte für die Bestimmung des allgemeinen Betriebs­ risikos (…) unumgänglich» ist.883 Neben der Masse und der Geschwindigkeit wirken sich selbstverständlich auch Faktoren wie die Konstruktionsweise884 und ggf. angehängte Sensoren885 auf die konkrete Betriebsgefahr aus.886 Aufgrund mangelnder Objektivierbarkeit bleiben sie im Rahmen der Registrierungsvorschriften aber unberücksichtigt. Vielmehr sind diese Aspekte bei der Herstellung und während des Betriebs zu beachten.887 b Regelung in der Durchführungsverordnung Der Grenzwert von 80 Joule wurde mit Blick auf den Übergang von Klasse C1 zu C2888 festgelegt.889 Drohnenbetreiber müssen sich registrieren, wenn sie eine haltend Ebinger, S. 141 f. 880 Personen am Boden sind denn auch von Drohnenflügen am meisten gefährdet, da sich heute (noch) keine Personen an Bord der Drohne befinden (vgl. EASA, Explanatory Note, S. 15). 881 Aviation Rulemaking Committee, S. 8; Masutti/Tomasello, S. 75. Diese Werte variieren je nach Aufprallstudie und deren genauen Ausgestaltung; vgl. dazu auch EASA, Explanatory Note, S. 15 f.; EASA, Opinion, S. 16; Arterburn et al., S. 10 ff. und dies., Annex C S. 27 ff. 882 Vgl. Schmid, S. 75; zur Auswirkung der Orientierung der Drohne anschaulich Tegler, passim. 883 Hänsenberger, Diss., S. 16. 884 Die Frage, ob Propeller (und ggf. wie viele) vorhanden sind, kann hier von Bedeutung sein. Vgl. dazu auch die Ausführungen zur Konstruktionsweise von Drohnen vorne, S. 18 ff. 885 Sensoren, wie z.B. eine Kamera, können in der Drohne verbaut oder daran angehängt werden. Dies beeinflusst deren Einwirkung bei einem Aufprall. Auch die Dichte der Objekte wirkt sich aus. Vgl. dazu ausführlich EASA, Explanatory Note, S. 15 f. 886 EASA, Explanatory Note, S. 15 f.; daran anschliessend Hänsenberger, Diss., S. 16 f. und S. 19 ff. 887 Vgl. Teil 1 Ziff. 5, Teil 2 Ziff. 6, Teil 3 Ziff. 6 Anhang Delegierte Verordnung (u.a. soll gemäss den dortigen Vorgaben die Verletzung von Menschen während des Betriebs minimiert und sollen scharfe Kanten vermieden werden). 888 Vgl. dazu vorne, S. 24 f. 889 EASA, Opinion, S. 16 und S. 21. Vgl. auch die Berechnungsbeispiele vorne, S. 122. 124 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» Drohne mit einer Startmasse890 von 250 g oder mehr betreiben, die bei einem Aufprall auf einen Menschen eine kinetische Energie von über 80 Joule891 übertragen kann.892 Innerhalb der offenen Kategorie sind demnach Betreiber von Drohnen der Klassen C2 und C3 gehalten, sich zu registrieren.893 Betreiber von Drohnen mit einer Startmasse von unter 250 g bzw. von solchen, die nur weniger als 80 Joule kinetische Energie übertragen können (d.h. solche der Produkteklasse C0 und C1), müssen sich nicht registrieren.894 Die Bestimmung ist aus Verhältnismässigkeitsüberlegungen eingefügt worden und soll Betreiber von «harmlosen» Drohnen von der Registrierungspflicht ausnehmen.895 Es mag zutreffen, dass eine Drohne mit einer Startmasse von weniger als 250 g nur eine geringe Verletzungsgefahr birgt. Die von Drohnen ausgehenden Risiken für den Datenschutz bzw. die informationelle Selbstbestimmung bestehen jedoch auch bei sehr leichten Drohnen. Diese wurden bei der Regelung der Registrierungspflicht denn auch explizit berücksichtigt. 3.3 Risiken für Privatsphäre und den Schutz von Personendaten Wenn der Betrieb einer Drohne mit Risiken für die Privatsphäre oder den Schutz von personenbezogenen Daten verbunden ist,896 so führt dies zu einer Registrierungspflicht des Betreibers.897 Prima facie stellt dies ein relativ 890 Vgl. zum Begriff «Startmasse» vorne, S. 25 mit den Hinweisen in Fn. 187. 891 Vgl. dazu vorne, S. 122 f. 892 Art. 14 Abs. 5 lit. a Ziff. i Durchführungsverordnung. 893 Art. 14 Abs. 5 lit. a Ziff. i Durchführungsverordnung. Drohnen, die 80 Joule oder mehr an kinetischer Energie übertragen können, fallen in Klasse C2 (vgl. dazu vorne, S. 25). 894 Gemäss Formulierung der Bestimmung kann auch der Betreiber einer Drohne mit einer Startmasse von mehr als 250 g auf eine Registrierung verzichten, wenn die Drohne keine kinetische Energie von 80 Joule übertragen kann. Dies hängt — wie dargelegt (vorne, S. 122 f.) — von der möglichen Geschwindigkeit der Drohne ab. Auf weitere Ausführungen hierzu wird verzichtet. 895 EASA, Opinion, S. 17; Masutti/Tomasello, S. 75. Letztere Autoren äussern sich jedoch kritisch zum festgesetzten Schwellenwert (Masutti/Tomasello, S. 78 f. mit Fn. 35). Vgl. auch EG 15 Durchführungsverordnung; Schmid, S. 77. 896 In der englischen Sprachfassung der Durchführungsverordnung ist von «privacy, and protection of personal data» die Rede. Es ist umstritten, ob «privacy» mit «Privatsphäre» treffend übersetzt wird (vgl. nur die Zusammenstellung verschiedenster Begriffsannäherungen und Definitionsversuchen zu «privacy» bei Solove/ Schwartz, S. 42 ff.). In der vorliegenden Untersuchung soll der Begriffsverwendung der Durchführungsverordnung gefolgt werden. 897 Anhang IX Ziff. 4.2 lit. b EASA-Grundverordnung; Art. 14 Abs. 1 Durchführungsverordnung. Erfasst werden sollen auch Drohnen, die ein Risiko für die Sicherheit und die Gefahrenabwehr und/oder für die Umwelt darstellen können. Darauf soll in Übereinstimmung mit dem Fokus der Untersuchung nicht weiter eingegangen werden. § 2 Identifizierung von Drohnenbetreibern 125 unklares Anknüpfungskriterium dar, denn es wird nicht angegeben, anhand welcher Faktoren solche Risiken beurteilt werden sollen. In der Durchführungsverordnung wird diesbezüglich jedoch Klarheit geschaffen. Dort heisst es, dass «Betreiber solcher unbemannte[r] Luftfahrzeuge registriert werden [sollten], die mit einem Sensor zur Erfassung personenbezogener Daten ausgestattet sind.»898 Dies bedeutet, dass bei der Beurteilung der Datenschutzrisiken (und folglich der Risiken für die informationelle Selbstbestimmung899) kein strenger Massstab anzulegen ist. Sofern eine Drohne die Fähigkeit zur Datenbearbeitung besitzt, ist deren Betrieb mit entsprechenden Risiken verbunden. Grundsätzlich müssen sich somit die Betreiber aller Drohnen, die zur Datenbearbeitung in der Lage sind,900 registrieren. 3.4 Ausnahme für «Spielzeugdrohnen» a Begriff Die Registrierungspflicht für Betreiber von Drohnen der offenen Kategorie,901 die mit einem «Sensor, der personenbezogene Daten erfassen kann», ausgerüstet sind, soll nicht gelten, wenn es sich um ein «Spielzeug» handelt.902 Diese Ausnahme muss vertieft analysiert werden, da eine Legaldefinition von Spielzeugdrohnen nicht existiert.903 Ausgangspunkt ist aufgrund der klaren Verweisung in Art. 14 Abs. 5 lit. a Ziff. ii Durchführungsverordnung das europäische Spielzeugrecht. Gemäss Art. 2 Abs. 1 Spielzeugrichtlinie sind Spielzeuge «Produkte, die — ausschliesslich oder nicht ausschliesslich — dazu bestimmt oder gestaltet sind, von Kindern unter 14 Jahren zum Spielen verwendet zu werden».904 Nach dieser Spielzeugdefinition richten sich auch die Standardised European Rules of the Air (SERA);905 danach ist ein Spielzeugluftfahrzeug «ein unbemanntes Luft898 EG 16 Durchführungsverordnung (Hervorhebung hinzugefügt); vgl. EASA, Opinion, S. 17. «Erfassen» fällt ohne Weiteres unter den weiten Begriff der «Bearbeitung»; vgl. dazu vorne, S. 33. 899 Vgl. dazu eingehend vorne, S. 63 ff. 900 Vgl. zu den Sensoren im Einzelnen vorne, S. 40 ff., zum (weiten) Begriff der Daten­ bearbeitung vorne, S. 33 ff. 901 Zur offenen Kategorie vorne, S. 22. 902 Art. 14 Abs. 5 lit. a Ziff. ii Durchführungsverordnung mit Verweis auf Richtlinie 2009/48/EG des Europäischen Parlaments und des Rates über die Sicherheit von Spielzeug (Spielzeugrichtlinie); vgl. auch EG 16 Durchführungsverordnung; Krumm, Rechtsrahmen, S. 484. 903 Hänsenberger, Diss., S. 136. 904 Vgl. die inhaltlich identische Legaldefinition in Art. 65 Lebensmittel- und Gebrauchsgegenständeverordnung (LGV); vgl. auch Art. 1bis Abs. 2 Spielzeugverordnung (VSS); BLV, Erläuterungen LGV, S. 20 f. 905 Diese gelten auch in der Schweiz; vgl. Anhang Ziff. 5 LVA CH–EU. 126 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» fahrzeug, das ausschliesslich oder nicht ausschliesslich für den Spielgebrauch durch Kinder unter 14 Jahren konzipiert oder bestimmt ist».906 Es wird mithin auf den sog. «Spielwert»907 abgestellt, was eine Grauzone entstehen lässt. Denn «[f]ür ein Kind hat zwar praktisch alles einen Spielwert, doch fällt deshalb nicht jeder Gegenstand unter die Definition von Spielzeug.»908 In diesem Graubereich ist anhand verschiedener Kriterien im Einzelfall zu entscheiden, ob ein Spielzeug im Rechtssinn vorliegt oder nicht.909 Geht es um Drohnen, können u.a. folgende Indikatoren für die Beur­ teilung der Spielzeugqualität herangezogen werden:910 — der Vertrieb als Spielzeug, ausgerichtet auf Kinder (Ort, Zielgruppe der Verpackung);911 — einfache Bedienungs- und Flugfunktionen (links/rechts und auf/ab); — fehlende Fähigkeit zu komplexen Flugmanövern; — einfache Montage, wenige Komponenten; — nur kurze Maximalflugzeit (einige wenige Minuten); — Grösse (Aussendurchmesser bis ca. 50 cm). Neben den vorgenannten Kriterien wird auch regelmässig das Gewicht in die Beurteilung miteinbezogen. So wird vereinzelt bei Drohnen mit einem Gewicht von weniger als 250 g von einem Spielzeug gesprochen.912 Andere Autoren gehen bis zu einem Gewicht von «ca. 200 g» von einem Spielzeug aus.913 Auf jeden Fall sollte die Schwelle mit Blick auf das Gefährdungspotenzial auch sehr leichter Drohnen nicht allzu hoch angesetzt werden. b Fähigkeit zur Datenbearbeitung als Ausschlusskriterium? Teilweise wird bei der Beurteilung der Spielzeugqualität das Vorhandensein einer «Bild-/Video-/Ton-Aufnahme-Übertragungs-Funktion» als Kriterium 906 Art. 2 Ziff. 129a SERA. 907 Vgl. Europäische Kommission, Leitlinien, S. 17. Eine Legaldefinition des Begriffs existiert nicht. Im Schweizer Recht wird er einzig in Anhang I Ziff. 14 Spielzeugverordnung (VSS) verwendet. 908 Europäische Kommission, Leitlinien, S. 17. Vgl. auch Graumann, S. 63. 909 Vgl. Langner/Klindt/Schucht, Rn. 149 m.w.H. sowie aus luftfahrtrechtlicher Sicht Schwenk/Giemulla, Kap. 7 Rn. 12. 910 Zum Ganzen Arbeitskreis ZLS, S. 13; Schucht, S. 143; Hänsenberger, Diss., S. 137; vgl. auch Langner/Klindt/Schucht, Rn. 149 in fine. 911 Wobei — in Übereinstimmung mit der Spielzeugdefinition der Spielzeugrichtlinie — von Kindern bis 14 Jahren ausgegangen wird. 912 Voland/Qui, S. 346 mit Blick auf das deutsche Recht (vor Inkrafttreten der Drohnenverordnungen); vgl. EASA, Opinion, S. 17. 913 Hänsenberger, Diss., S. 137; Arbeitskreis ZLS, S. 13 (unter Bezugnahme auf «fliegende Spielzeuge mit Rotorblättern […] für den Aussenbereich, die für Kinder über 12 Jahren bestimmt sind»). § 2 Identifizierung von Drohnenbetreibern 127 ver­wendet.914 Inhaltlich ist bei dieser etwas umständlichen Formulierung die Fähigkeit gemeint, Daten zu bearbeiten. Ist eine Drohne dazu in der Lage, kann gemäss Beschluss eines deutschen Expertengremiums nicht mehr von einem Spielzeug ausgegangen werden.915 Diese Ansicht steht im Widerspruch zur Durchführungsverordnung. Letztere schliesst nicht aus, dass eine Drohne einen «Sensor, der personenbezogene Daten erfassen kann», trägt und gleichzeitig als Spielzeug im Sinne der Spielzeugrichtlinie qualifiziert werden kann.916 Betrachtet man die Ausnahmebestimmung von Art. 14 Abs. 5 lit. a Ziff. ii Durchführungsverordnung im gesamten Normgefüge, steht fest, dass eine «Bild-/Video-/Ton-Aufnahme-­ Übertragungs-Funktion» die Spielzeugeigenschaft nicht gänzlich auszuschliessen vermag.917 Ansonsten würde die Ausnahme ihres Anwendungsbereichs beraubt.918 Es drängt sich deshalb eine differenzierte Betrachtung des in der Ausnahmebestimmung erwähnten Sensors auf. Bei einfachen Foto- und Videokameras mit geringer Auflösung kann ein Spielzeug vorliegen. Trägt eine Drohne jedoch hochtechnische Sensoren, die etwa hochauflösende Aufnahmen erlauben,919 liegt kein Spielzeug im Rechtssinn mehr vor, da solche Technik regelmässig nicht für Kinder konzipiert ist.920 Auf jeden Fall steht fest, dass sich im Zusammenhang mit der Registrierung von «Spielzeugdrohnen» schwierige Abgrenzungsfragen stellen werden. Nach hier vertretener Ansicht sollten sich die Betreiber von allen Drohnen, die Daten bearbeiten können, in jeden Fall registrieren müssen. «Spielzeugdrohnen» könnten ansonsten den Datenschutz gefährden.921 Auch die 914 Arbeitskreis ZLS, S. 13. Eine vergleichbare Stellungnahme von Schweizer Experten oder des zuständigen Bundesamts für Lebensmittelsicherheit und Veterinärwesen existiert nicht. 915 Arbeitskreis ZLS, S. 13; wohl gl.M. Hänsenberger, Diss., S. 137; vgl. Schucht, S. 143. 916 Vgl. den Wortlaut von Art. 14 Abs. 5 lit. a Ziff. ii Durchführungsverordnung; Krumm, Rechtsrahmen, S. 484. 917 Die Maxime «lex superior derogat legi inferiori» muss umso mehr gelten, wenn es sich bei den niederrangigen Regelungen nicht um Gesetze, sondern — wie hier — «nur» um einen Beschluss eines Expertengremiums handelt. Vgl. BGE 142 V 547 E. 3.3; BGer, 9C_921/2008 vom 23. April 2009 E. 3.3; Kramer, S. 131 f. 918 Eine Auslegung ist zu vermeiden, wenn dadurch eine Regelung unanwendbar oder sonst zweck- und funktionslos wird (Bydlinski, S. 444; Kramer, S. 123; vgl. BGE 112 II 167 E. 2b). 919 Vgl. EASA, Opinion, S. 17. 920 Vgl. zu diesem Kriterium vorne, S. 126. 921 Verschiedene Autoren kritisieren denn auch Ausnahmen für Spielzeuge ganz generell, vgl. nur Huttunen, Unmanned, S. 353; vgl. Masutti/Tomasello, S. 56 und S. 78 f. Vgl. sodann die Motion Reynard (18.420), wo gefordert wird, dass der Datenschutz bei der Sicherheit von Spielzeug ebenfalls mitberücksichtigt werden soll. 128 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» EASA wies im Gesetzgebungsprozess auf das durch die Ausnahmeregelung für Spielzeug geschaffene Risiko diesbezüglich hin.922 Aus diesem Grund sollte die Ausnahme für Spielzeugdrohnen mit der Fähigkeit zur Datenbearbeitung im Rahmen einer Revision der Durchführungsverordnung gestrichen werden. 4. Zwischenfazit Die Registrierungspflicht für Drohnen und vor allem deren Betreiber ist von eminenter Bedeutung für die Sicherheit des Luftverkehrs insgesamt, aber ebenfalls für den Datenschutz. In der offenen Kategorie, welche für die vorliegende Untersuchung zentral ist, müssen sich grundsätzlich die Betreiber aller Drohnen registrieren, welche zur Datenbearbeitung in der Lage sind. Ausgenommen davon sind einzig die Betreiber von Spielzeugdrohnen. 5. Registrierungsverfahren Drohnenbetreiber registrieren sich selbst in dem Staat, in welchem sie ihren Wohnsitz923 bzw. — bei juristischen Personen — ihren Hauptgeschäftssitz haben; sie stellen sicher, dass die von ihnen registrierten Informationen korrekt sind. Ein Betreiber kann zu keinem Zeitpunkt in mehr als einem Staat registriert sein.924 In der Schweiz ist das BAZL — als zuständige Fachbehörde des Bundes im Bereich der Luftfahrt925 — grundsätzlich für alle Aspekte des Registrierungsverfahrens zuständig. Es kann diese Aufgabe auch an einen externen Anbieter vergeben.926 Da noch unklar ist, ob und in welcher Form eine solche Vergabe in Betracht kommt, soll nachfolgend von der Zuständigkeit des BAZL selbst ausgegangen werden.927 Die Erfassung der Drohnenbetreiber erfolgt als Selbstregistrierung. Das Einreichen von Belegen ist nicht notwendig bzw. sollte durch das Hochladen von Scans (z.B. der Identitätskarte) erledigt werden können. Es drängt sich deshalb 922 EASA, Opinion, S. 17; vgl. auch EG 31 EASA-Grundverordnung. 923 Dieser beurteilt sich nach Art. 23 ZGB. Vgl. dazu statt aller Steinauer/Fountoulakis, Rn. 347 ff. 924 Art. 14 Abs. 6 Durchführungsverordnung. 925 Art. 7 Abs. 1 OV-UVEK; vgl. Art. 3 Abs. 2 LFG. Zum Aufgabenbereich des BAZL sowie dessen Stellung innerhalb der Bundesverwaltung Henseler, Digitalisierung, S. 188 f. m.w.H. 926 Ausführlich zur Vergabe von Dienstleistungsaufträgen Galli et al., Rn. 225 ff. 927 Aus diesem Grund soll nachfolgend nur vereinzelt auf die mögliche Zuständigkeit eines externen Dienstleisters verwiesen werden. § 2 Identifizierung von Drohnenbetreibern 129 die Verwendung eines Onlineformulars auf.928 Dies ermöglicht nicht nur eine einfache und unkomplizierte Registrierung für die einzelnen Drohnenbetreiber, sondern hält auch den administrativen Aufwand seitens des Bundes tief.929 Da Drohnen auch von Minderjährigen betrieben werden können, stellt sich die Frage, wer (Eltern und/oder Kind) und ab welchem Alter ein Kind der Registrierungspflicht unterliegt. Dazu bietet sich ein Rückgriff auf das vorgesehene Mindestalter für den Betrieb von Drohnen der offenen Kategorie an; dieses liegt grundsätzlich bei 16 Jahren.930 Für Jugendliche ab diesem Alter ist deshalb im Prinzip eine selbständige Registrierung zu verlangen. Fliegt dagegen ein Kind unter 12 Jahren eine Drohne in der offenen Kategorie,931 so sollte sich ausschliesslich der bzw. ein gesetzlicher Vertreter des Kindes932 regis­ trieren.933 Ab 12 und bis 16 Jahre kann, je nach den Umständen des Einzelfalls, eine Selbstregistrierung des Kindes in Betracht kommen.934 Findet keine solche statt, so ist eine Registrierung des gesetzlichen Vertreters zu verlangen. Um die Korrektheit der im Register gespeicherten Informationen sicherzustellen, sollten die registrierten Drohnenbetreiber in regelmässigen Abständen (z.B. alle zwei Jahre935) aufgefordert werden, ihre Angaben zu prüfen und ggf. zu korrigieren bzw. zu ergänzen. Diese Aufforderung kann automatisch erfolgen, wobei eine E-Mail-Erinnerung die effizienteste Lösung sein dürfte.936 Durch dieses Vorgehen wird zugleich dem datenschutzrechtlichen Grundsatz der Datenrichtigkeit nachgelebt.937 928 Vgl. Art. 14 Abs. 2 Durchführungsverordnung («Felder für die Eingabe […] [von] Informationen»); Groh, S. 165. Das BAZL spricht denn auch von der «Registrierungsplattform» (BAZL, Übernahme). 929 Vgl. JARUS, Categorization, S. 25. 930 Vgl. Art. 9 Abs. 1 Durchführungsverordnung. 931 Ein Kind unter 12 Jahren darf etwa mit einer selbst gebauten Drohne (vgl. dazu hinten, S. 144 ff.) mit einer Startmasse von < 250 g oder einer Spielzeugdrohne (vgl. vorne, S. 125 ff.) fliegen; ansonsten ist eine Beaufsichtigung notwendig (vgl. zu den Voraussetzungen solcher Flüge im Einzelnen Art. 9 Abs. 2 Durchführungsverordnung). 932 Dabei handelt es sich primär um die Eltern bzw. den Inhaber der elterlichen Sorge und/oder einen Beistand (vgl. zur gesetzlichen Vertretung statt vieler Hausheer/ Aebi-Müller, Rn. 07.50 ff.). 933 Art. 9 Abs. 1 i.V.m. Art. 9 Abs. 3 lit. a Durchführungsverordnung sieht vor, dass das Mindestalter in der offenen Kategorie von 16 auf 12 Jahre heruntergesetzt werden kann. Dies liegt in der Kompetenz der einzelnen Staaten. 934 Vgl. zur Rechtsstellung von urteilsfähigen handlungsunfähigen Personen Art. 19 ff. ZGB und dazu statt aller Hausheer/Aebi-Müller, Rn. 07.08 ff.; vgl. sodann ausführlich zur Beurteilung der Urteilsfähigkeit im Kindesalter dies., Rn. 06.42 f. 935 Dieser Zeitraum entspricht in etwa der «Lebensdauer» einer Drohne der offenen Kategorie (EASA, Opinion, S. 17). 936 Vgl. zu den registrierten Daten sogleich, S. 130 f. 937 Ausführlich zu diesem Grundsatz vorne, S. 86 f. 130 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» Das BAZL stellt eine «eindeutige digitale Registrierungsnummer» für Drohnenbetreiber sowie für registrierungspflichtige Drohnen aus, sodass sie «individuell identifiziert werden können».938 Dabei ist nach Standards vorzugehen, welche die Interoperabilität zwischen den Registrierungssystemen der einzelnen EU-Staaten und der Schweiz sicherstellen.939 Die zusätzlichen Ressourcen, welche dafür beim BAZL notwendig werden, können durch eine Registrierungsgebühr gedeckt werden.940 6. Anzugebende Informationen Im Registrierungssystem für Drohnenbetreiber müssen u.a. folgende Informationen angegeben werden:941 — bei natürlichen Personen: vollständiger Name und Geburtsdatum; — bei juristischen Personen: Name oder Firma und UnternehmensIdentifikationsnummer (UID942); — Adresse des Betreibers;943 — E-Mail-Adresse und Telefonnummer des Betreibers; — Nummer der Versicherungspolice für die Drohne, sofern eine solche erforderlich ist.944 Juristische Personen haben entweder eine Firma oder einen Namen.945 Art. 14 Abs. 2 lit. a Durchführungsverordnung, der nur «Namen und Identifizierungsnummer» der juristischen Person auflistet, ist somit zu einschränkend formuliert. Eine UID-Nummer wird ihnen unabhängig von der Rechtsform zugewiesen.946 Es erscheint nicht zwingend notwendig, dass ein Drohnenbetreiber eine EMail-Adresse und eine Telefonnummer hinterlegt. Verfügt eine natürliche 938 Vgl. dazu weiterführend hinten, S. 136 f. 939 Vgl. Art. 14 Abs. 6 Durchführungsverordnung; EASA, Explanatory Note, S. 7. Vgl. allgemein zur Bedeutung von Standards im Bereich der Drohnenfliegerei in Europa Cuccuru, S. 352 ff. 940 Vgl. EASA, Explanatory Note, S. 7. 941 Vgl. Art. 14 Abs. 2 lit. a bis d Durchführungsverordnung. Die weiteren geforderten Angaben sind für die vorliegende Auseinandersetzung vernachlässigbar. 942 Die UID ist im Bundesgesetz über die Unternehmens-Identifikationsnummer (UIDG) sowie der zugehörigen Verordnung (UIDV) geregelt. Mit dieser Nummer können Unternehmen eindeutig identifiziert werden (Art. 1 UIDG); sie besteht aus dem Präfix «CHE», einer nach dem Zufallsprinzip zugeteilten achtstelligen Zahl und einer Prüfziffer (Art. 5 lit. a bis c UIDV). 943 In Art. 14 Abs. 2 lit. b Durchführungsverordnung ist von «Anschrift» die Rede. 944 Die Versicherungspflicht für Drohnen ist in Art. 20 VLK geregelt. Vgl. dazu de lege ferenda Hänsenberger, Diss., S. 224 ff. 945 Vgl. Art. 950 Abs. 1 OR; Hausheer/Aebi-Müller, Rn. 16.07 ff. 946 Vgl. Art. 3 Abs. 1 lit. c und Art. 4 Abs. 1 UIDG. § 2 Identifizierung von Drohnenbetreibern 131 Person über keine E-Mail-Adresse und/oder (persönliche) Telefonnummer, so sollte dies eine Registrierung nicht ausschliessen. Die Hinterlegung einer EMail-Adresse ermöglicht eine einfache Kontaktaufnahme, was zu begrüssen ist.947 Die weiteren Angaben sind jedoch zwingend zu verlangen, da ansonsten der Zweck der Registrierungspflicht gefährdet werden könnte.948 Natürliche Personen geben ihre Wohnsitzadresse, juristische Personen die Adresse des Sitzes949 an, da die Selbstregistrierung daran anknüpft und jeweils nur in einem Staat eine Registrierung möglich ist.950 Des Weiteren sollten juristische Personen dazu angehalten werden, Name und Direkt­wahl der bzw. einer für die Drohnenflüge verantwortlichen natürlichen Person anzugeben. Dadurch ist gewährleistet, dass die Kommunikation zwischen BAZL und Betreiber (sowie ggf. Dritten) effizient abgewickelt werden kann. 7. «Drohnenbetreiberregister» 7.1 Ausgestaltung des Registers Wenn die Informationen der Drohnenbetreiber registriert wurden und ihnen eine Betreibernummer zugeteilt ist, stellt sich die Frage nach der Ausgestaltung des Registers und insbesondere den diesbezüglichen Zugriffsberechtigungen. Für Drohnen der zulassungspflichtigen Kategorie951 drängt sich eine Ergänzung der Bestimmungen zum Luftfahrzeugregister (Art. 52 ff. LFG, Art. 3 ff. LFV) auf.952 Für Betreiber von Drohnen der offenen und speziellen Kategorie953 müssen dagegen neue Normen geschaffen werden. Da der Fokus eines solchen Registers auf den Betreibern und nicht auf den Drohnen an sich liegt, handelt es sich dabei vielmehr um ein «Drohnenbetreiberregister» als um ein «Drohnenregister».954 947 So können die registrierten Drohnenbetreiber etwa zur Überprüfung ihrer Angaben im Register angehalten werden (vgl. dazu vorne, S. 129). 948 Vgl. dazu vorne, S. 120. 949 Mit Sitz wird grundsätzlich der Ort bezeichnet, wo die Verwaltung geführt wird (vgl. Art. 56 ZGB; BSK ZGB I-Huguenin/Reitze, Art. 56 N 1 ff.; BSK OR II-Schenker, Art. 626 N 5). Eine juristische Person kann neben dem Sitz auch über Zweig- und Geschäfts­ niederlassungen verfügen (vgl. dazu BSK ZGB I-Huguenin/Reitze, Art. 56 N 2; ausführlich Meier-Hayoz/Forstmoser/Sethe, § 16 Rn. 178, § 24 Rn. 14 ff.). 950 Art. 14 Abs. 6 Durchführungsverordnung. 951 Vgl. zur zulassungspflichtigen Kategorie vorne, S. 23 f. 952 Aufgrund der Ähnlichkeit zur bemannten Luftfahrt sollten die diesbezüglichen Vorschriften weiterentwickelt werden. Vgl. Art. 14 Abs. 3 und Abs. 7 Durchführungsverordnung; EASA, Explanatory Note, S. 5; Hänsenberger, Diss., S. 232. 953 Betreiber von Drohnen der speziellen Kategorie registrieren sich selber, unabhängig von der Masse der Drohne (Art. 14 Abs. 5 lit. b Durchführungsverordnung). 954 So aber etwa Fumagalli, S. 31; Pugin, S. 11. Vgl. auch vorne, S. 128. 132 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» Die EASA-Grundverordnung und die Durchführungsverordnung enthalten zur konkreten Ausgestaltung eines solchen Registers nur wenige Vorgaben. Die einzelnen Staaten sind gehalten «die Informationen über die Registrierung von unbemannten Luftfahrzeugen und über die Betreiber (…) in digitalen, harmonisierten und interoperablen nationalen Registrierungssystemen» zu speichern.955 Des Weiteren müssen die Systeme «es ermöglichen, über die in [Art. 74 EASA-Grundverordnung956] genannte Datenbank gegenseitig auf die Daten zuzugreifen und diese auszutauschen».957 Es ist somit die Verwendung eines europaweiten Standards bei der Ausstellung der Registrierungsnummern notwendig.958 In den Drohnenverordnungen wird jedoch kein solcher vorgegeben.959 Gemäss Auskunft der EASA vom September/Oktober 2019 wurde zwischen Vertretern der EU-Mitgliedstaaten und der Industrie ein entsprechender Standard vereinbart. Dieser soll jedoch erst im zweiten oder dritten Quartal 2020 der Öffentlichkeit zugänglich gemacht werden.960 Daneben sind bei der Ausgestaltung des Registers die datenschutzrechtlichen Vorschriften für Bundesbehörden einzuhalten.961 7.2 Vergleichbare Register Als Vorlage für das «Drohnenbetreiberregister» und insbesondere den für die Rechtsdurchsetzung zentralen Aspekt der Zugriffsberechtigungen kommt neben dem Luftfahrzeugregister auch das «Informationssystem Verkehrszulassung» in Betracht.962 Bei Letzterem handelt es sich um die Be955 Art. 56 Abs. 7 EASA-Grundverordnung; vgl. Krumm, Anpassungsbedarf, S. 116. 956 Der dort geregelte «Informationsspeicher» soll «eine wirksame Zusammenarbeit zwischen der [EASA] und den zuständigen nationalen Behörden bei der Wahrnehmung ihrer Zertifizierungs-, Aufsichts- und Durchsetzungsaufgaben im Rahmen der vorliegenden Verordnung» gewährleisten (Art. 74 Abs. 1 EASA-Grundverordnung) 957 Art. 14 Abs. 4 Durchführungsverordnung. Dies beinhaltet «a requirement for real-­ time accessibility» (EASA, Opinion, S. 17). 958 EASA, Opinion, S. 17. Vgl. dazu bereits vorne, S. 130. 959 Anders verhält es sich bei der «eindeutigen physischen Seriennummer» von Drohnen der Produkteklassen C1 bis C3; vgl. Teil 2 Ziff. 11, Teil 3 Ziff. 13 und Teil 4 Ziff. 8 Anhang Delegierte Verordnung. 960 EASA Communication Department, E-Mails vom 4. und 6. September sowie vom 22. Oktober 2019 (beim Autor einsehbar). Vgl. auch EASA, Opinion, S. 17. 961 Vgl. Art. 132 Abs. 1 EASA-Grundverordnung sowie die diesbezügliche Präzisierung für die Schweiz im Beschluss Nr. 1/2019, AS 2019 S. 2985; vgl. sodann Art. 2 Abs. 1 lit. b und Art. 29 ff. E-DSG. 962 Weitere Register wie z.B. das Schiffsregister gemäss Bundesgesetz über das Schiffsregister (SR 747.11) oder das Eisenbahnfahrzeugregister (Art. 17a EBG) werden nicht behandelt. Die dort erfassten Sachverhalte unterscheiden sich in wesentlicher Weise vom hier interessierenden Register für Drohnenbetreiber. § 2 Identifizierung von Drohnenbetreibern 133 zeichnung für das seit 1. Januar 2019 vom Bundesamt für Strassen (ASTRA) geführte System,963 welches u.a. das bis dahin existierende «Fahrzeug- und Fahrzeughalterregister» abgelöst hat.964 Die beiden Register sollen nachfolgend kurz diskutiert und darauf geprüft werden, ob sie als Vorlage für das Drohnenbetreiberregister dienen könnten. a Luftfahrzeugregister Das Luftfahrzeugregister dient primär «der öffentlichen Kontrolle und Sicherheit».965 Zudem erlaubt es, Art und Umfang von Rechtsbeziehungen zwischen (natürlichen und juristischen) Personen und eingetragenen Luftfahrzeugen abzubilden oder diese zu bestimmen.966 So werden u.a. der Name und die Adresse des Eigentümers und u.U. des Halters registriert.967 Gemäss Art. 107b Abs. 1 LFG sind «[d]ie im schweizerischen Luftfahrzeugregister enthaltenen Personendaten öffentlich. Sie können mittels Abrufverfahren zugänglich gemacht werden.» Ein solches Verfahren liegt vor, «wenn mehrere Verwaltungsstellen dasselbe Informationssystem betreiben oder wenn Dritte nach dem Prinzip der Selbstbedienung Zugriff auf die Daten des Systems haben.»968 Der Bundesrat hielt unlängst fest, dass «die Angaben innerhalb [des Luftfahrzeugregisters] auch in der Schweiz seit jeher öffentlich zugänglich [sind].»969 Auf der entsprechenden Webseite des BAZL können jederzeit und ohne Interessennachweis Angaben wie Name und Adresse des Eigentümers von registrierten Luftfahrzeugen eingesehen werden. b Informationssystem Verkehrszulassung Das Informationssystem Verkehrszulassung dient u.a. der Identifikation von Fahrzeughaltern und der Fahrzeugfahndung sowie der Erteilung, Kontrolle 963 Vgl. Art. 89a ff. SVG. 964 Daneben existierten drei weitere Register, namentlich das Fahrberechtigungsregister, das Administrativmassnahmen-Register sowie das Fahrzeugtypenregister. Vgl. ausführlich dazu Botschaft Via sicura, S. 8480 ff. 965 So bereits Botschaft LFG, S. 359; vgl. sodann McNally, S. 24 f.; Abeyratne, S. 262; Dempsey, S. 301. 966 Vgl. McNally, S. 23 ff.; Schwenk/Giemulla, Kap. 2 Rn. 130. Dieser Aspekt ist gemäss Botschaft LFG, S. 359, jedoch von untergeordneter Bedeutung. 967 Art. 8 Abs. 1 lit. f und Abs. 2 LFV. Vgl. zum Begriff des Halters vorne, S. 28. 968 BJ, Leitfaden, Rn. 838. Vgl. Baeriswyl, Fahndungsmittel, S. 13 mit Fn. 24; Wermelinger, S. 187; Handkomm. DSG-Jöhri, Art. 19 N 74. 969 So der Bundesrat 2009 in der Botschaft Teilrevision 1 LFG, S. 4969 (Hervorhebung hinzugefügt). Art. 107b LFG wurde (erst) per 1. April 2011 in Kraft gesetzt, um eine für die Datenbearbeitung (d.h. die öffentliche Bekanntgabe von Personendaten aus dem Luftfahrzeugregister) ausreichende Gesetzesgrundlage zu schaffen (vgl. dazu Botschaft Teilrevision 1 LFG, S. 4943). 134 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» und dem Entzug von Ausweisen für die Zulassung von Personen und Fahrzeugen zum Strassenverkehr sowie von Bewilligungen.970 Im Informationssystem sind deshalb z.B. die Personalien von Fahrzeughaltern und Ausweisinhabern gemäss SVG gespeichert.971 Im Unterschied zum Luftfahrzeugregister «[sind] [d]ie Daten der Verkehrszulassung nicht öffentlich» (Art. 89g Abs. 1 SVG). Dies wurde «als wichtiger Grundsatz zur Gewährleistung des Datenschutzes» auf Gesetzesstufe geregelt.972 Gemäss Art. 89g Abs. 3 SVG dürfen die kantonalen Verkehrs­ zulassungsbehörden die Fahrzeughalter- und Versicherungsdaten Personen bekannt geben, die von einem Verkehrsunfall betroffen sind oder die im Hinblick auf ein Verfahren ein hinreichendes Interesse schriftlich geltend machen.973 «Die bisherige Praxis der voraussetzungslosen Halterauskünfte an jedermann (z.B. per Internet, SMS etc.)» ist mit dem Grundsatz der Nicht­ öffentlichkeit nicht vereinbar und somit unzulässig.974 Für verschiedene Behörden (Polizei, Strafverfolger, Bundesämter etc.) ist eine Einsichtnahme in bestimmte Daten des Informationssystems vorgesehen (vgl. Art. 89e SVG). Dem Datenschutz kommt beim Informationssystem Verkehrszulassung somit eine zentrale Rolle zu.975 Die Zugriffs- und Einsichtsrechte sind explizit auf Gesetzesstufe verankert und dem «Schutz der Persönlichkeitsrechte» der betroffenen Personen wird explizit Rechnung getragen.976 7.3 Zwischenfazit Bei der Ausgestaltung des Registers und der Regelung der Zugriffsrechte sollten neben den Anforderungen an die Datenbearbeitung durch Bundesorgane977 auch mögliche Ansprüche Privater aus dem Datenschutzrecht und dem Persönlichkeitsschutz mitberücksichtigt werden. Das Modell des Infor­mations­ systems Verkehrszulassung, welches vom Grundsatz der Nicht­öffentlichkeit ausgeht, scheint deshalb als Vorlage für das «Drohnenbetreiberregister» gut 970 Art. 89b lit. a und e SVG. 971 Art. 89c SVG. 972 Davor war der Grundsatz der Nichtöffentlichkeit auf Verordnungsstufe festgeschrieben; vgl. Botschaft Via sicura, S. 8509; OFK SVG-Giger, Art. 89g N 2. 973 Daneben dürfen die Daten auch Personen bekannt gegeben werden, die an einem Zulassungsverfahren beteiligt sind. Anderweitige Bekanntgaben sind nicht zulässig; es handelt sich in Art. 89g Abs. 3 SVG um eine abschliessende Liste (Komm. SVGWeissen­berger, Art. 89g N 1; OFK SVG-Giger, Art. 89g N 4). 974 Botschaft Via sicura, S. 8508; OFK SVG-Giger, Art. 89g N 4. 975 Botschaft Via sicura, S. 8481. 976 Botschaft Via sicura, S. 8480. 977 Vgl. Art. 4 lit. h und Art. 29 ff. E-DSG sowie ausführlich hinten, S. 165 f. § 2 Identifizierung von Drohnenbetreibern 135 geeignet. Es erlaubt, einen Ausgleich zwischen den Interessen der Betreiber, Behörden und (betroffenen) Dritten zu schaffen.978 8. Datenschutzrechtliche Beurteilung und Überleitung Grundsätzlich müssen sich alle Betreiber von Drohnen, die Daten bearbeiten können, registrieren.979 Durch die bei der Registrierung anzugebenden Informationen, welche anschliessend mit einer eindeutigen Betreibernummer verknüpft werden, ist ein wichtiger Schritt zur Durchsetzung datenschutzrechtlicher Ansprüche getan. Die Pflicht zur Registrierung für sich allein genommen reicht jedoch noch nicht aus, um in einem konkreten Fall einen Drohnenbetreiber identifizieren zu können. Dazu sind weitere Vorgaben in den Drohnenverordnungen enthalten, namentlich in den Vorschriften zur Kennzeichnung. Darauf soll sogleich eingegangen werden. II. Kennzeichnung 1. Arten der Kennzeichnung Drohnen, welche registriert werden bzw. deren Betreiber sich registrieren müssen, sind einzeln zu markieren und zu kennzeichnen.980 Die Delegierte Verordnung kennt verschiedene Arten der Kennzeichnung,981 u.a. die «CEKennzeichnung»,982 die «Kennzeichnung des Schallleistungspegels»983 sowie die «Identifizierungskennzeichen der UA-Klasse»984. Letztere sollen auf einen Blick die Anforderungen an den Fernpiloten und den Betrieb der Drohne 978 Vgl. weiterführend hinten, S. 162 f. 979 Vgl. vorne, S. 128. 980 Vgl. Anhang IX Ziff. 4.3 EASA-Grundverordnung. Die deutsche Fassung dieser Bestimmung lässt Klarheit vermissen; besser geglückt ist die Formulierung in der englischen Sprachfassung. 981 Vgl. Art. 16 Delegierte Verordnung. 982 Die «CE-Kennzeichnung» (CE = Conformité Européenne) ist gemäss der Definition in Art. 3 Ziff. 12 Delegierte Verordnung «eine Kennzeichnung, durch die der Hersteller erklärt, dass das Erzeugnis den geltenden Anforderungen genügt, die in den Harmonisierungsrechtsvorschriften der Union, nach denen die Anbringung der Kennzeichnung vorgeschrieben ist, festgelegt sind». Vgl. dazu auch EG 32 und Art. 15 Delegierte Verordnung; vgl. sodann Verordnung (EG) Nr. 765/2008, welche die allgemeinen Grundsätze der CE-Kennzeichnung festlegt. 983 Vgl. dazu Teile 14 und 15 Anhang Delegierte Verordnung. 984 Die Abkürzung «UA» steht hier für «unbemanntes Luftfahrzeug» (engl. unmanned aircraft; vgl. dazu bereits vorne, S. 16). Gemeint sind damit die (Produkte-)Klassen C0 bis C3, vgl. dazu vorne, S. 24 ff. 136 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» erkenn- und überprüfbar machen.985 Vorliegend interessiert jedoch primär die Kennzeichnung der Drohnen mit der «eindeutigen digitalen Registriernummer für UAS-Betreiber».986 Die weiteren Kennzeichnungen sollen nicht vertieft werden. 2. Kennzeichnung mit Betreibernummer 2.1 Begriff Die für die Registrierung zuständige Behörde987 stellt eine eindeutige digitale Registriernummer aus, sodass die erfassten Drohnen sowie deren Betreiber «individuell identifiziert werden können».988 Betreiber, welche sich registrieren müssen, bringen ihre Registriernummer auf jeder Drohne an.989 Die Terminologie der Delegierten Verordnung ist nicht einheitlich; sie verwendet neben dem Begriff «UAS-Betreibernummer» auch verschiedentlich die Bezeichnung «eindeutige digitale Registriernummer für UAS-Betreiber».990 Damit ist dasselbe gemeint, nämlich die eindeutige Nummer, welche jedem registrierten Drohnenbetreiber zugeteilt wird. Der Einfachheit halber soll nachfolgend einzig von der Betreibernummer gesprochen werden. 2.2 Praktische Umsetzung Die Kennzeichnung knüpft an die Selbstregistrierung durch den Betreiber an; somit sind auch bei Inkrafttreten der entsprechenden Bestimmungen bereits im Umlauf befindliche Drohnen zu kennzeichnen. In welcher Form die Betreibernummer auf der Drohne angebracht werden soll, wird nicht spezifiziert. Die Verwendung einer Plakette mit starkem Klebstoff drängt sich auf, da der Gebrauch von Schrauben, Nägeln etc. die Flugeigenschaften der Drohne beeinträchtigen oder diese gar schädigen könnte.991 Es ist zudem notwendig, dass die Registrierungsnummer «gut sichtbar, leserlich und dauerhaft» angebracht wird.992 Befindet sich die Drohne am Boden, so sollten die Angaben auf der Plakette ohne Hilfsmittel gelesen wer985 Groh, S. 166. Vgl. zu den Anforderungen im Einzelnen Anhang Delegierte Verordnung. 986 Die Kennzeichnung mit der «eindeutigen digitalen Registriernummer für registrierungspflichtige UAS» wird nicht weiter behandelt, da Drohnen der offenen Kategorie selbst nicht registriert werden müssen; vgl. dazu vorne S. 120 ff. und S. 128. 987 Vgl. zum Verfahren vorne, S. 128 ff. 988 Art. 14 Abs. 6 Durchführungsverordnung. 989 Art. 14 Abs. 8 Durchführungsverordnung. 990 Vgl. Teil 2 Ziff. 12, Teil 3 Ziff. 14 und Teil 4 Ziff. 9 Anhang Delegierte Verordnung. 991 Vgl. zur Flugmechanik von Drohnen Büchi, Buch der Drohnen, S. 122 ff. 992 Vgl. zu diesen Anforderungen für die CE- bzw. die Kennzeichnung der Produkteklasse Art. 16 Abs. 1 und 2 Delegierte Verordnung. Vgl. auch Hänsenberger, Diss., S. 232. § 2 Identifizierung von Drohnenbetreibern 137 den können.993 Mit dauerhaft ist in diesem Zusammenhang zumindest Feuerund Wasserfestigkeit gemeint.994 Auch Wetter- und Kältebeständigkeit der Plakette sollten gewährleistet sein. Die Grösse derselben sollte selbstredend derjenigen der Drohne angepasst werden. Ist etwa eine Kennzeichnung auf dem Rumpf nicht leserlich anzubringen, so kann diese auch in der Batteriekammer angebracht werden.995 Dem Drohnenbetreiber steht es selbstverständlich frei, weitere Informationen auf der Plakette zu vermerken (etwa Adresse oder Telefonnummer, was bei Verlust der Drohne hilfreich sein könnte). Auch die (zusätzliche) Verwendung eines QR-Codes ist zulässig.996 Um eine effiziente und möglichst flächendeckende Umsetzung der Kennzeichnungsvorschrift zu erreichen, sollten die Plaketten direkt bei den einzelnen Drohnenherstellern und/oder händlern997 bezogen werden können. Das BAZL verfügt nicht über die notwendigen personellen und technischen Ressourcen zur Herstellung derselben.998 Zentral ist, dass unleserliche oder nicht dauerhafte Kennzeichnungen (die z.B. mit nicht wasserbeständiger Farbe angebracht sind) vermieden werden. 3. Datenschutzrechtliche Beurteilung Aufgrund der Tatsache, dass die Kennzeichnungspflicht an der Registrierungspflicht der Betreiber anknüpft, sind grundsätzlich alle Drohnen, welche Personendaten bearbeiten können, eindeutig zu kennzeichnen.999 Insgesamt ist die so ausgestaltete Kennzeichnungspflicht von Drohnen durchaus zu begrüssen, da damit eine Möglichkeit der Identifizierung des Betreibers geschaffen wird. Es ist jedoch zweifelhaft, ob die Betreibernummer im Flug tatsächlich gelesen werden kann. In Anbetracht der Grösse, der möglichen Geschwindigkeiten und Flughöhen von Drohnen in der offenen Kategorie1000 dürfte es nur ausnahmsweise gelingen, die Betreibernummer (vollständig) zu 993 Brillen oder Kontaktlinsen werden in diesem Kontext nicht als Hilfsmittel verstanden (vgl. EASA, GM Implementing Regulation, S. 124). 994 Vgl. EASA, Opinion, S. 17. 995 EASA, GM Implementing Regulation, S. 124 f. 996 EASA, GM Implementing Regulation, S. 124. 997 Vgl. die Begriffsdefinition in Art. 3 Ziff. 16 Delegierte Verordnung. 998 Vgl. dazu auch vorne, S. 6. 999 Vgl. zur Registrierungspflicht vorne, S. 135. 1000 Vgl. dazu die Tabelle vorne, S. 25, sowie die Ausführungen zu den in der Schweiz verbreiteten Drohnen vorne, S. 39. 138 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» erkennen.1001 Mit der Kennzeichnungspflicht allein können deshalb nicht alle datenschutzrechtlichen Bedenken ausgeräumt werden. III. Fernidentifizierung 1. Bedeutung und Begriff Die Identifizierung einer Drohne aus der Ferne ist neben der Registrierung der zentrale Aspekt für die Identifizierung des Betreibers.1002 Wie gerade aufgezeigt, ist dies mithilfe der auf der Drohne anzubringenden Betreibernummer, durch visuelle (Fern-)Identifizierung, wohl nur in Ausnahmefällen möglich. Es bedarf deshalb einer Möglichkeit der elektronischen Fernidentifizierung. Die Grundlagen dafür sind in der Durchführungsverordnung zu finden. Die «direkte» Fernidentifizierung1003 wird in Art. 2 Ziff. 13 Durchführungsverordnung definiert als «ein System, das die lokale Übertragung von Informationen über ein im Betrieb befindliches unbemanntes Luftfahrzeug gewährleistet und auch die Kennzeichnung des unbemannten Luftfahrzeugs umfasst, sodass diese Informationen ohne physischen Zugang zum unbemannten Luftfahrzeug abgerufen werden können.»1004 2. Erfasste Drohnen Innerhalb der offenen Kategorie ist die direkte Fernidentifizierung für Drohnen der Klassen C1 bis C31005 vorgeschrieben.1006 Ausnahmen sind für die Klassen C2 und C3 vorgesehen, sollten sie gefesselt (engl. tethered) betrieben werden. Dies bedeutet, dass die Drohne an einer Leine und/oder einem Kabel hängt, wodurch der Operationsradius eingeschränkt wird.1007 Insgesamt werden die allermeisten Drohnen, welche von Privaten eingesetzt werden, 1001 Vgl. dazu auch Groh, S. 166; JARUS, Categorization, S. 16. 1002 JARUS, Categorization, S. 25 und S. 29; vgl. BRTF, S. 8. 1003 Aus dem EU-Recht wird nicht klar, ob die direkte explizit von der «indirekten» Fern- identifizierung abgegrenzt werden sollte; Letztere wird in der Durchführungsverordnung denn auch nicht erwähnt. Als «indirekte» Variante käme z.B. in Betracht, dass eine Drohne keine spezifischen Signale zur Fernidentifizierung aussendet und somit mithilfe anderer Parameter identifiziert werden müsste. 1004 Vereinzelt ist in der Delegierten Verordnung von «Fernidentifikation» die Rede, ohne dass ein Grund für diese Abweichung ersichtlich wäre (vgl. Art. 1 Abs. 1 und 2 Delegierte Verordnung; vgl. auch EG 26 Durchführungsverordnung). In Übereinstimmung mit der Begriffsdefinition wird nachfolgend von der «Fernidentifizierung» gesprochen. 1005 Vgl. zu den (Produkte-)Klassen C0 bis C3 vorne, S. 24 ff. 1006 Teil 2 Ziff. 12, Teil 3 Ziff. 14 und Teil 4 Ziff. 9 Anhang Delegierte Verordnung. 1007 Teil 3 Ziff. 5 und Teil 4 Ziff. 4 Anhang Delegierte Verordnung. Vgl. dazu Schwenk/ Giemulla, Kap. 7 Rn. 24 in fine. § 2 Identifizierung von Drohnenbetreibern 139 von den Vorschriften zur Fernidentifizierung erfasst. Einzig Drohnen der Klasse C0 müssen keine Informationen zur Fernidentifizierung übertragen. Diese Ausnahme steht in Einklang mit derjenigen zur Registrierungspflicht für Drohnen mit einer Startmasse von weniger als 250 g.1008 3. Zusatzgerät für die direkte Fernidentifizierung 3.1 Allgemeine Anforderungen Die Delegierte Verordnung geht vom Verständnis aus, dass «die lokale Übertragung von Informationen über ein im Betrieb befindliches unbemanntes Luftfahrzeug» nicht durch die Drohne selber, sondern durch ein Zusatzgerät erfolgt. Aus diesem Grund stellt die Verordnung verschiedene Vorgaben dafür auf. So muss das Zusatzgerät für die direkte Fernidentifizierung gewährleisten, dass «während der gesamten Flugdauer (…) in Echtzeit direkt und regelmässig» bestimmte Informationen übermittelt werden. Diese müssen «innerhalb des Sendebereichs von vorhandenen Mobilfunkgeräten direkt empfangen werden können».1009 Das zentrale Element des Zusatzgeräts wird somit ein Chip sein, der die Übermittlung gewährleistet.1010 Die zu übermittelnden Informationen umfassen u.a.:1011 — die Drohnenbetreibernummer;1012 — die geografische Position der Drohne und ihre Höhe über der Oberfläche oder dem Startpunkt; — den Streckenverlauf, gemessen im Uhrzeigersinn vom geografischen Norden; — die Geschwindigkeit über Grund; — die geografische Position des Piloten oder, falls nicht verfügbar, des Startpunkts. Das Zusatzgerät für die direkte Fernidentifizierung muss ausserdem gewährleisten, dass der Nutzer diese Angaben nicht verändern kann.1013 Dadurch 1008 Vgl. dazu vorne, S. 123 f. 1009 Teil 6 Ziff. 3 Anhang Delegierte Verordnung. 1010 Vgl. EASA, A-NPA, S. 18; Hänsenberger, AJP 2017, S. 164; Hänsenberger, Diss., S. 231 f. 1011 Teil 6 Ziff. 3 Anhang Delegierte Verordnung. Das Zusatzgerät muss auch seine eigene eindeutige physische Seriennummer übermitteln (vgl. dazu Anhang Teil 6 Ziff. 2 Delegierte Verordnung). Diese Information ist für die vorliegende Auseinandersetzung jedoch nicht von Bedeutung. 1012 Vgl. dazu vorne, S. 136 f. 1013 Teil 6 Ziff. 4 Anhang Delegierte Verordnung. Die Betreibernummer ist in der Liste nicht enthalten. Aus den Gesetzesmaterialien wird nicht klar, weshalb dies so geregelt wurde. Die diesbezügliche Ziff. 4 ist in der finalen Fassung der Delegierten Verordnung erstmals enthalten (vgl. zur Entstehungsgeschichte der Delegierten Verordnung die zugehörige Webseite). 140 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» wird zum Ausdruck gebracht, dass nicht nur der Drohnenbetreiber, sondern auch Dritte und ggf. Behörden keine Möglichkeit haben dürfen, Änderungen an den Informationen der Fernidentifizierung vorzunehmen. 3.2 Empfang durch Mobilfunkgeräte insbesondere Die vom Zusatzgerät ausgesendeten Informationen müssen «innerhalb des Sendebereichs von vorhandenen Mobilfunkgeräten direkt empfangen werden können.»1014 Es handelt sich demnach um eine «lokale Übertragung»1015 der Angaben «over a short range».1016 Die Bezugnahme auf den Empfang mit Mobilfunkgeräten spricht für eine applikationsbasierte Lösung, wobei auch eine Webseite in Betracht kommt.1017 Wer die entsprechende App auf seinem Mobiltelefon installiert oder Zugriff auf die entsprechende Webseite hat, kann damit die ausgesendeten Informationen direkt empfangen.1018 Technisch erfolgt die lokale Übertragung entweder über Bluetooth oder Wi-Fi.1019 Ein am 16. September 2019 vom BAZL, von Skyguide1020 und weiteren beteiligten Unternehmen durchgeführter Test zeigte auf, dass ein Benutzer einer entsprechenden App damit Drohnen identifizieren konnte, die vor bis zu 60 Sekunden im näheren Umkreis betrieben wurden. Dies ermöglicht eine Fernidentifizierung auch dann, wenn sich eine schnell bewegende Drohne in kurzer Zeit von einer betroffenen Person entfernt.1021 Diese zeitliche Beschränkung wird durch eine geografische ergänzt, welche Abfragen auf ein Gebiet mit einem Durchmesser von 3,6 km beschränkt.1022 Der Test zeigte jedoch ebenfalls auf, dass das System der lokalen Übertragung Nachteile mit sich bringt. So sind aufgrund der zeitlichen und geo1014 Teil 6 Ziff. 3 Anhang Delegierte Verordnung. So auch bereits EASA, A-NPA, S. 18. 1015 So die Definition in Art. 2 Ziff. 13 Durchführungsverordnung. 1016 EASA, Opinion, S. 26. 1017 Vgl. BAZL, Demo Report, S. 2. 1018 Vgl. EASA, A-NPA, S. 18. Die EASA zog ursprünglich auch die Datenübermittlung per Radio-Frequency Identification (RFID) in Betracht. 1019 BAZL, Demo Report, S. 1. Bluetooth ist ein Industriestandard für die Datenübertra- gung zwischen Geräten über kurze Distanz per Funktechnik; Wi-Fi bezeichnet die Zertifizierung eines Funknetzwerks wie etwa eines «Wireless Local Area Network» (WLAN). Vgl. ausführlich dazu Labiod/Afifi/De Santis, S. 75 ff. bzw. S. 5 ff. 1020 Skyguide ist die Abkürzung von «Skyguide Schweizerische Aktiengesellschaft für zivile und militärische Flugsicherung» (vgl. Art. 2 Abs. 1 VFSD). Dabei handelt es sich um eine gemischtwirtschaftliche Gesellschaft, welche gestützt auf Art. 40a LGF geschaffen wurde (Kunz, S. 158; Moor/Bellanger/Tanquerel, S. 250; a.M. Freudiger, S. 40 f. mit Fn. 181; vgl. auch Art. 762 OR und ausführlich dazu BSK OR II-Wernli/ Rizzi, Art. 762 N 5 ff.). 1021 Unmanned Airspace, passim; vgl. BAZL, Fernidentifizierung. 1022 BAZL, Demo Report, S. 3. § 2 Identifizierung von Drohnenbetreibern 141 grafischen Beschränkung auch die Polizei und andere Behörden grundsätzlich gehalten, sich in der Nähe einer zu identifizierenden Drohne aufzuhalten. Ansonsten ist ein Abrufen der entsprechenden Informationen nicht oder nicht mehr möglich. Dies kann nicht Zweck der Bestimmungen zur Fernidentifizierung sein.1023 Für Strafverfolgungs- und Aufsichtsbehörden drängt sich deshalb eine andere Lösung auf, namentlich die Übertragung von Informationen über das Internet (mittels Mobilfunknetz). Dies erlaubt einen zeitlich weiter zurückreichenden und geografisch unbeschränkten Zugriff, da die Informationen nicht nur lokal übertragen werden.1024 Private Betroffene sollten dagegen auf die zeitlich und geografisch limitierte Übertragung beschränkt bleiben; sie könnten sich — sollten eine direkte Fernidentifizierung so nicht gelingen — an die Behörden wenden. Eine Umsetzung dieser sog. Netzwerklösung setzt eine Revision der entsprechenden Verordnungsbestimmungen voraus.1025 Dabei sind strikte Vorgaben für den Zugriff auf die Informationen aufzustellen; eine vollständige und flächendeckende Überwachung der Drohnen und somit ihrer Betreiber wäre unverhältnismässig.1026 4. Datenschutzrechtliche Beurteilung Die Ausnahme von den Vorschriften zur Fernidentifizierung für Drohnen der Klasse C0 — unabhängig davon, ob sie Personendaten bearbeiten können oder nicht — ist aus datenschutzrechtlicher Sicht bedauerlich. Die Möglichkeit der Fernidentifizierung wäre auch für diese Klasse wünschenswert.1027 Die gefesselt betriebenen Drohnen stellen dagegen aus datenschutzrechtlicher Sicht kaum ein Risiko dar; die Ausnahme für diese Betriebsart ist nachvollziehbar. Durch die Vorgaben für die Klassen C1 bis C3 können grundsätzlich die Betreiber einer Vielzahl von Drohnen fernidentifiziert werden. Der lokale Charakter der Ferni dentifizierung weist Parallelen zur Identifizierung von Fahrzeughaltern anhand ihrer Kontrollschildnummern auf.1028 Bei «Kleinst1023 Vgl. Anhang IX Ziff. 1.3 EASA-Grundverordnung. 1024 Vgl. BAZL, Demo Report, S. 3 f. Vorausgesetzt ist einzig eine funktionierende Internet­ verbindung. 1025 Vgl. Art. 2 Ziff. 13 Durchführungsverordnung und Teil 6 Ziff. 3 Anhang Delegierte Ver- ordnung, wo nur die «lokale Übertragung von Daten» erwähnt wird. 1026 Vgl. zu den datenschutzrechtlichen Ansprüchen der Drohnenbetreiber hinten, S. 162 f. 1027 Gegen Ausnahmen bei der Fernidentifizierung — jedoch gestützt auf Luftsicherheits- überlegungen — spricht sich auch BRTF, S. 8, aus. 1028 Singh/Carthew/Xiong, S. 4 f. Vgl. Art. 2 Abs. 1 lit. a und Anhang 1 Ziff. 2 Verordnung über das Informationssystem Verkehrszulassung [IVZV]. 142 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» drohnen» der Klasse C0, welche innert Sicht und somit nahe beim Betreiber fliegen müssen,1029 besteht sodann die Möglichkeit, diesen dadurch zu identifizieren.1030 Gemeinsam mit den Registrierungsvorschriften ermöglicht die Fernidentifizierung somit, Transparenz herzustellen bzw. diese stark zu verbessern.1031 IV. Flugverkehrsmanagement U-Space (UTM) 1. Begriff Ganz allgemein bezweckt das Flugverkehrsmanagement (Air Traffic Management, ATM1032) die Gewährleistung eines sicheren, geordneten und raschen Verkehrsflusses von Luftfahrzeugen im kontrollierten Luftraum.1033 In der Schweiz ist Skyguide1034 mit dem Flugverkehrsmanagement für den bemannten Luftverkehr betraut.1035 Die Integration von Drohnen in den kontrollierten Luftraum setzt die Schaffung einer Flugverkehrskontrolle spezifisch für diese Luftfahrzeuge voraus.1036 Nur so kann die Sicherheit und der ungestörte Betrieb der (bemannten) Luftfahrt gewährleistet werden. In diesem Zusammenhang wird der Begriff «Unmanned Aircraft System Traffic Management»1037 oder abgekürzt UTM verwendet.1038 Auf europäischer Ebene und auch in der Schweiz hat sich dafür der Begriff «Urban-Space» bzw. «U-Space» durchgesetzt.1039 Inhaltlich wird damit dasselbe, nämlich ein Flugverkehrsmanagementsystem 1029 Je kleiner die Drohe, desto näher am Betreiber muss diese fliegen, damit die grund- sätzlich geltende Vorgabe des direkten Sichtkontakts eingehalten werden kann (vgl. dazu Art. 2 Ziff. 7 und Art. 4 Abs. 1 lit. d Durchführungsverordnung). 1030 So EASA, Opinion, S. 17. 1031 DroneRules, Guide, S. 17. Zur Bedeutung dieses Aspekts, v.a. im Bereich des Daten� - schutzes, detailliert hinten, S. 157. 1032 Vgl. Art. 1 lit. a Verordnung über den Flugsicherungsdienst (VFSD). Flugverkehrs­ management umfasst als Überbegriff das Luftraum-Management (lit. b), das Verkehrsfluss- und Verkehrskapazitäts-Management (lit. c) und die Flugverkehrsdienste (lit. d). 1033 Hänsenberger, Diss., S. 70. Vgl. Art. 6 Abs. 1 sowie Anhang 1 VFSD. 1034 Vgl. zu Skyguide die Hinweise vorne, Fn. 1020. 1035 Art. 6 VFSD; vgl. auch Riedi, Rn. 648; Dettling-Ott, Flugsicherung, Rn. 583. 1036 BAZL, ConOps, S. 6; Hänsenberger, Diss., S. 70; Giemulla/Freiherr von Bothmer, S. 21. 1037 Vgl. zum Begriff Unmanned Aircraft System (UAS) vorne, S. 17 sowie S. 21. 1038 Vgl. Delise, S. 25; Masutti/Tomasello, S. 2; Schubert, S. 230. 1039 Vgl. SESAR, Master Plan, S. 4; BAZL, U-Space; BAZL, ConOps, passim; Stellung­nahme des BR vom 29. August 2018 zur Interpellation Jositsch (18.3397); SUST, Be­r icht Grenchen, S. 3. § 2 Identifizierung von Drohnenbetreibern 143 für Drohnen, beschrieben. Dieses soll den Zugang zum unteren Luftraum, insbesondere in urbanen Gebieten, ermöglichen.1040 Aufgrund des engen Zusammenhangs zwischen dem U-Space und den vorangehend dargestellten Vorschriften für Drohnen soll auch dieser kurz betrachtet werden.1041 2. Inhalt und Zweck Inhaltlich geht es um die Schaffung eines Systems, «mit dem eine automatisierte Verkehrsleitung für Drohnen eingeführt werden kann. Werden Drohnen dieser automatisierten Leitung unterstellt, sind ihre Identifizierung, die Überwachung im Luftraum, die Koordination mit anderen Luftverkehrsteilnehmenden sowie der Schutz von besonders sensiblen Gebieten sichergestellt.»1042 Als «all-encompassing framework»1043 soll der (Schweizer) U-Space zahlreiche Drohnenoperationen gleichzeitig und vor allem auf sichere und geordnete Weise ermöglichen.1044 Mit der zunehmenden Zahl an Drohnenflügen insgesamt und den komplexer werdenden Anwendungsfeldern ist dies für den bemannten Luftverkehr sowie für Dritte von zentraler Bedeutung.1045 Skyguide spielt bei der Einführung des U-Space in der Schweiz eine zentrale Rolle. Sie soll die anwendbaren Normen implementieren und die notwendigen Systeme entwickeln.1046 Die diesbezüglichen rechtlichen Vorgaben, welche ebenfalls auf Ebene der EU ausgearbeitet werden,1047 liegen jedoch noch nicht vor.1048 3. Datenschutzrechtliche Beurteilung Der U-Space als Flugverkehrsmanagementsystem ist nicht auf den Datenschutz und dessen Durchsetzung beim privaten Drohnenbetrieb ausgerichtet. 1040 Huttunen, U-space, S. 71 m.w.H. 1041 Registrierung und Fernidentifizierung sind (neben der Geo-Awareness; vgl. dazu hinten, S. 151 ff.) notwendige Voraussetzungen für die Einführung des U-Space (vgl. EASA, NPA, S. 12; Schubert, S. 230 ff.). 1042 Stellungnahme des BR vom 29. August 2018 zur Interpellation Jositsch (18.3397). 1043 BAZL, ConOps, S. 6. 1044 Vgl. zu den einzelnen Funktionen von U-Space und den damit verbundenen Umset- zungsschwierigkeiten Huttunen, U-Space, S. 80 ff. 1045 Vgl. nur SUST, Bericht Grenchen, S. 3. 1046 BAZL, Memorandum, S. 5. 1047 Vgl. zur Bedeutung europäischer Vorschriften in diesem Zusammenhang vorne, S. 13 ff. 1048 Eine «Opinion» der EASA zum U-Space soll im Februar 2020 publiziert werden. Diese hat selbst keine rechtliche Wirkung, dient aber der EU-Kommission als Hilfestellung beim Erlass entsprechender Normen (vgl. EASA, Opinions Information). 144 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» Jedoch hielt der Bundesrat unlängst fest, dass der «U-Space sämtliche notwendigen Elemente für die Rechtsdurchsetzung enthalten [wird].»1049 Die entsprechende Interpellation bezog sich explizit auf Art. 179quater StGB und Art. 28 ZGB.1050 Da bisher noch keine gesetzlichen Grundlagen für den U-Space bestehen, konnte sich der Bundesrat nicht konkreter zu den angesprochenen Elementen der Rechtsdurchsetzung äussern. Die Identifizierung privater Drohnenbetreiber, welche in die Privatsphäre Dritter eingreifen, soll gemäss Bundesrat durch den U-Space aber klarerweise ermöglicht werden. Darauf zielte die vorerwähnte Interpellation denn auch ab; Ständerat Jositsch bezog sich in der Begründung auf die Schwierigkeit der «Rückverfolgung zum Besitzer» in «der konkreten Situation».1051 Aufgrund der engen Verknüpfung des Privat­ sphärenschutzes gemäss ZGB und den datenschutzrechtlichen Ansprüchen1052 müssen trotz ihrer fehlenden Nennung in der Interpellation auch Letztere erfasst sein. V. Spezialfall: Selbst gebaute Drohnen 1. Definition Drohnen, auch solche mit der Fähigkeit zur Datenbearbeitung, können mit einfachen Materialien und mit beschränktem finanziellem Aufwand selbst gebaut werden.1053 Aus diesem Grund hat der europäische Gesetzgeber solche Luftfahrzeuge explizit geregelt.1054 Eine selbst gebaute bzw. — in der Terminologie der Drohnenverordnungen — «privat hergestellte» Drohne ist in Art. 2 Ziff. 16 Durchführungsverordnung definiert als «ein UAS,1055 das vom Erbauer für seine eigenen Zwecke zusammengebaut oder hergestellt wurde, mit Ausnahme von UAS, die aus Bauteilen zusammengesetzt werden, die vom Hersteller als Fertigbausatz in Verkehr gebracht werden».1056 1049 Stellungnahme des BR vom 29. August 2018 zur Interpellation Jositsch (18.3397). 1050 Interpellation Jositsch (18.3397), Ziff. 1 und 2. Vgl. in diesem Zusammenhang die Ausführungen vorne, S. 106 ff. (ad Art. 28 ZGB) und BSK StGB-Ramel/Vogelsang, Art. 179quater N 5 ff. 1051 Interpellation Jositsch (18.3397). 1052 Vgl. dazu vorne, S. 106. 1053 Thomasen, Beyond Airspace Safety, S. 2; Juniper, S. 112; Jackman, S. 8 ff. Vgl. zum Eigenbau ausführlich Büchi, Buch der Drohnen, S. 188 ff. 1054 Vgl. EG 4 EASA-Grundverordnung. 1055 Vgl. zum Begriff Unmanned Aircraft System (UAS) vorne, S. 17 sowie S. 21. 1056 Diese Definition findet sich auch in Art. 3 Ziff. 22 Delegierte Verordnung. Nachfolgend soll von «selbst gebaut» die Rede sein, da «privat hergestellt» eher sperrig klingt und den geregelten Sachverhalt m.E. weniger gut beschreibt. § 2 Identifizierung von Drohnenbetreibern 2. 145 Anwendbare Vorschriften 2.1 Grundsätzliche Zugehörigkeit zur offenen Kategorie Um die auf selbst gebaute Drohnen anwendbaren Regeln darzustellen, ist nach deren Drohnenkategorie und ggf. -klasse zu fragen. Gemäss Art. 4 Abs. 1 lit. a Durchführungsverordnung werden selbst gebaute Drohnen der offenen Kategorie zugeordnet. Die Vorgaben der Durchführungsverordnung, welche für Operationen der offenen Kategorie gelten, müssen folglich auch von selbst gebauten Drohnen eingehalten werden. Die Startmasse derselben muss somit < 25 kg betragen und die Drohne darf nicht höher als 120 m fliegen.1057 2.2 Registrierung und Kennzeichnung Bei der Registrierungspflicht sind keine Ausnahmen für selbst gebaute Drohnen vorgesehen.1058 Da die Kennzeichnungspflicht an die Selbstregistrierung des Betreibers anknüpft, sind auch selbst gebaute Drohnen mit der eindeutigen Betreibernummer zu markieren. Auch hier hat diese Kennzeichnung «gut sichtbar, leserlich und dauerhaft» zu sein, was beim Bau der Drohne ggf. bereits beachtet werden muss.1059 2.3 Fernidentifizierung Gemäss Art. 2 Abs. 1 lit. a Delegierte Verordnung i.V.m. Art. 4 Abs. 1 lit. a Durchführungsverordnung sind Vorschriften und Bedingungen der Delegierten Verordnung auf selbst gebaute Drohnen nicht anwendbar. Sie werden keiner Produkteklasse zugeordnet und müssen somit u.a. die Vorgaben zur Fernidentifizierung nicht erfüllen. 3. Datenschutzrechtliche Beurteilung Mit Blick auf die Verhältnismässigkeit kann gegen die Registrierungs- und Kennzeichnungspflicht für selbst gebaute Drohnen eingewendet werden, dass bei diesen regelmässig das Interesse am Handwerklichen im Vordergrund steht. Aus Sicht des Datenschutzes ist jedoch zu begrüssen, dass diese Pflichten einzuhalten sind. Diese greifen etwa, wenn eine selbst gebaute Drohne mit einem Sensor ausgestattet ist, der Personendaten bearbeiten kann.1060 1057 Vgl. auch die weiteren Vorgaben in Art. 4 Abs. 1 lit. b bis f Durchführungsverordnung. 1058 Vgl. ausführlich zu den einzelnen Kriterien, die eine Registrierungspflicht des Drohnenbetreibers auslösen, vorne, S. 121 ff. 1059 Ausführlich zur Kennzeichnung vorne, S. 136 ff. 1060 Ausführlich dazu vorne, S. 124 f. 146 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» Bedauerlich ist hingegen aus datenschutzrechtlicher Sicht, dass selbst gebaute Drohnen keine Informationen zur direkten Fernidentifizierung übertragen müssen. Die Identifizierung von deren Betreibern wird sich somit regelmässig schwierig gestalten. Es ist jedoch davon auszugehen, dass selbst gebaute Drohnen nicht sehr weit verbreitet sind und deren datenschutzrechtliches Gefährdungspotenzial deshalb beschränkt ist. VI. Herausforderungen bei der Umsetzung 1. Notwendige Mitwirkung der Drohnenbetreiber In der offenen Kategorie verlangen die gesetzlichen Regelungen die Mitwirkung der einzelnen Drohnenbetreiber. So ist eine Selbstregistrierung vorgesehen und auch die Kennzeichnung ist jedem Einzelnen übertragen.1061 Diese wenig restriktiven Vorgaben sind im Grundsatz zu begrüssen; strengere Regeln und höhere Anforderungen würden wohl von vielen privaten Drohnen­ betreibern als unverhältnismässig empfunden, was sodann zu illegalen Drohnenoperationen führen würde.1062 Bereits die vorangehend dargestellten Vorschriften zur Registrierung und Kennzeichnung werden wohl zunächst als übermässige administrative Bürde wahrgenommen werden (insbesondere im Unterschied zum bisherigen Schweizer Recht ohne vergleichbare Vorgaben). Dies ist jedoch bei einer so grundlegenden Neuregelung der Drohnen­fliegerei unvermeidbar.1063 Die notwendige Mitwirkung ist primär durch Ausbildung und Aufklärung zu fördern.1064 Es gilt, gezielt auf die gewollten Wirkungen der (neuen) Vorschriften hinzuarbeiten.1065 Denn die Schweizer Rechtsordnung basiert auf der Annahme, dass sich die Rechtsunterworfenen grundsätzlich (freiwillig) normgemäss verhalten.1066 Die grundlegenden Änderungen der Rechtslage im Bereich der Drohnen verlangen folglich eingehende Informationsund Aufklärungsmassnahmen seitens der Behörden und insbesondere des BAZL.1067 Damit wird nicht nur der Vollzug des neuen Rechts erleichtert, 1061 Vgl. dazu vorne, S. 128 ff. (Registrierungsverfahren) bzw. S. 136 ff. (Kennzeichnung). 1062 Zu Recht weist JARUS, Categorization, S. 19, auf diese Problematik hin. Vgl. zur Bedeutung der Akzeptanz einer Regelung auch Rehbinder, Rn. 116. 1063 Vgl. dazu vorne, S. 13 ff. 1064 Noll, S. 150; Müller G., Rechtskenntnis, S. 557; Leissler, S. 536 m.w.H. 1065 Zur «Information über das Recht als Aufgabe des Staates» eingehend Müller/ Uhlmann, Rn. 327 m.w.H. Ausführlich zur Information und Aufklärung von Drohnen­betreibern hinten, S. 148 ff. 1066 Müller/Uhlmann, Rn. 312; ausführlich Rehbinder, Rn. 115 ff.; vgl. auch Noll, S. 150. 1067 Vgl. Müller/Uhlmann, Rn. 323. § 2 Identifizierung von Drohnenbetreibern 147 sondern gleichzeitig den Ängsten und Befürchtungen in der Bevölkerung entgegengewirkt.1068 Die Einhaltung der Vorschriften kann sodann durch die Androhung von Sanktionen «erzwungen» werden.1069 Die Schweiz ist gemäss Art. 131 EASA-­ Grundverordnung gehalten, «Vorschriften [zu erlassen] über Sanktionen, die bei Verstössen gegen diese Verordnung und die auf ihrer Grundlage erlassenen Delegierten Rechtsakte und Durchführungsrechtsakte zu verhängen sind (…). Die vorgesehenen Sanktionen müssen wirksam, verhältnismässig und abschreckend sein.» Die Androhung von Bussgeldern könnte als Sank­ tion etwa in Betracht kommen, wenn es um die Missachtung der Pflicht zur Selbstregistrierung oder um die Nicht- oder Falschkennzeichnung einer Drohne geht. Solche Bussen kennt das LFG bereits für Übertretungen verschiedener Vorschriften des Luftfahrtrechts.1070 2. Übergangsbestimmungen Im Kontext der Umsetzung sei zudem auf die vorgesehenen Übergangbestimmungen verwiesen.1071 Diese sehen verschiedene Ausnahmen zu den Vor­ gaben der Delegierten Verordnung (etwa Kennzeichnung der Produkteklasse, Fähigkeiten zur direkten Fernidentifizierung etc.) vor. Heute bereits verkaufte Drohnen können daher unter bestimmten Bedingungen weiterbetrieben werden;1072 eine «Nachrüstung» wird nicht verlangt. Die Übergangsfristen beschlagen jedoch nicht die Registrierung- und Kennzeichnungspflicht; dieser müssen Drohnenbetreiber ab dem 1. Januar 2021 nachkommen.1073 In Anbetracht der tiefgreifenden Änderungen, welche durch die Droh1068 Zur eher kritischen Haltung der Bevölkerung vorne, S. 5 f. 1069 Ob sich solche Sanktionen als wirksam erweisen werden, kann vorliegend nicht be- antwortet werden. Vgl. dazu Rehbinder, Rn. 115. 1070 Vgl. z.B. Art. 91 LFG. Für die Missachtung von Vorschriften für Drohnen der speziellen und v.a. der zulassungspflichtigen Kategorie sollten schärfere Sanktionen vorgesehen werden. Ausgehend vom Risiko, das die Missachtung der Regeln der jeweiligen Kategorie mit sich bringt, wäre auch die Androhung einer Freiheitsstrafe durchaus vertretbar (vgl. etwa Art. 89 und 90 LFG). 1071 Vgl. Art. 22 Durchführungsverordnung sowie die «besonderen Bestimmungen» in Art. 20 Durchführungsverordnung. Die Einzelheiten dieser Regelungen sollen nicht weiter vertieft werden. 1072 Art. 20 Durchführungsverordnung etwa erlaubt den Betrieb in der Kategorie A1 für Drohnen mit einer Startmasse von < 250 g bzw. in der Kategorie A3 für solche mit einer Startmasse < 25 kg (jeweils einschliesslich Nutzlast). Vgl. zu den Einsatzkategorien vorne, S. 22 mit den dortigen Hinweisen. 1073 Die Übergangsbestimmungen verweisen einzig auf die Vorgaben der Delegierten Verordnung (vgl. dazu im Einzelnen Anhang Delegierte Verordnung). Zum Geltungsbeginn der Durchführungsverordnung vorne, S. 14 mit Fn. 89. 148 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» nenverordnungen veranlasst wurden, erscheinen solche Übergangsbestimmungen — für Hersteller wie Betreiber von Drohnen — unumgänglich.1074 Aus Sicht der Drohnenbetreiber wurde dadurch eine verhältnismässige Regelung geschaffen; sie dürfen ihre bereits gekauften Drohnen unter gewissen Voraussetzungen weiterbetreiben. Die damit einhergehenden Verzögerungen bis zur vollständigen Umsetzung des neuen Rechtsrahmens sind hinzunehmen. § 3 Präventive und flankierende Massnahmen Unter diesem Titel sollen weitere Vorschriften der Drohnenverordnungen analysiert werden, welche nicht auf die Identifizierung von Drohnenbetreibern ausgerichtet sind, sich jedoch positiv auf die Einhaltung von Datenschutzbestimmungen auswirken (können). Dabei werden zunächst die Information und Ausbildung von Drohnenbetreibern analysiert (sogleich). Danach soll kurz auf die Vorgaben zur Geo-Awareness (hinten, S. 151 ff.) sowie zu den Positionslichtern (hinten, S. 153 ff.) eingegangen werden. I. Information und Ausbildung Viele datenschutzrechtliche Vorschriften und deren Bedeutung sind einem Grossteil aller Privatpersonen wohl gar nicht bekannt.1075 Eine Sensibilisierung bezüglich dieser Thematik drängt sich deshalb auf; Betreibern und Pilo­ ten soll ab dem Zeitpunkt des Kaufs der Drohne bewusst gemacht werden, dass für deren Betrieb bestimmte Anforderungen und Beschränkungen gelten.1076 Der EU-Gesetzgeber schreibt in diesem Kontext Informationsbei­ blätter und eine Theorie-Prüfung für Drohnenpiloten vor. 1. Informationsbeiblatt Hersteller, Einführer1077 und Händler1078 von Drohnen müssen sicherstellen, 1074 Vgl. zu Zweck und Bedeutung von Übergangsregelungen Müller/Uhlmann, Rn. 345. 1075 Vgl. etwa EDÖB, Drohnen: «In einigen Fällen sind sich die [Drohnen-]Operateure nicht bewusst, dass sie etwas Unrechtmässiges (evtl. sogar Strafbares) machen.» Ähnlich Stöcker et al., S. 18. 1076 Vgl. EG 20 Durchführungsverordnung. 1077 Einführer (engl. importer) ist «jede in der Union niedergelassene natürliche oder juristische Person, die ein Erzeugnis aus einem Drittland auf dem Unionsmarkt in Verkehr bringt» (Art. 3 Ziff.15 Delegierte Verordnung). 1078 Händler (engl. distributor) ist «jede natürliche oder juristische Person in der Liefer- kette, die ein Erzeugnis auf dem Markt bereitstellt, mit Ausnahme des Herstellers oder des Einführers» (Art. 3 Ziff. 16 Delegierte Verordnung). § 3 Präventive und flankierende Massnahmen 149 dass diesen ein Informationsblatt beiliegt, welches klar, verständlich und lesbar sein muss.1079 Anders als die deutschen Sprachfassungen dieser Bestimmungen vermuten lassen, sind damit auch elektronische Instrumente wie QR-Codes erfasst.1080 Der Inhalt der Information ist von der EASA vorgegeben und klärt über die geltenden Beschränkungen und Auflagen für die jeweilige Produkteklasse1081 auf.1082 Inhaltlich liegt der Fokus auf der Verhinderung von Betriebsgefahren und der Gewährleistung der Luftsicherheit.1083 Die Informationsblätter der EASA1084 enthalten aber auch jeweils den folgenden Hinweis: «Do not take photographs, videos or sound recordings of people without their permission. Respect people’s privacy.»1085 Diese allgemein formulierten Verhaltensanweisungen vermögen für sich allein genommen noch keine ausreichende Sensibilisierung zu bewirken. Trotzdem sind sie zu begrüssen, da sie die Bedeutung des Datenschutzes im Kontext der Drohnenfliegerei unterstreichen.1086 2. Online-Theorieprüfung Für Flüge mit Drohnen der offenen Kategorie wird vom Drohnenpiloten1087 die Absolvierung eines Online-Lehrgangs, der erfolgreich mit einer OnlineTheo­rieprüfung abgeschlossen wird, verlangt.1088 Eine solche Prüfung ist für Drohnen der Klasse C0 nicht vorgeschrieben; die Kenntnisnahme des 1079 Vgl. Art. 6 Abs. 7, Art. 8 Abs. 4 und Art. 9 Abs. 2 Delegierte Verordnung. Vgl. JARUS, Categorization, S. 22. 1080 In der englischen Fassung ist denn auch von «information notice» und nicht mehr von «information leaflet» die Rede. Dies wurde mit Blick auf die Erweiterung der möglichen Instrumente angepasst. Vgl. dazu EASA, Opinion, S. 13; JARUS, Operations, S. 20 und S. 28 ff. 1081 Vgl. zu den (Produkte-)Klassen C0 bis C3 vorne,S. 24 ff. 1082 Vgl. Teil 1 Ziff. 9, Teil 2 Ziff. 19, Teil 3 Ziff. 20, Teil 4 Ziff. 16 und Teil 5 Ziff. 5 Anhang Delegierte Verordnung. Vgl. auch Krumm, Anpassungsbedarf, S. 118. 1083 EASA, Opinion, S. 12 f.; EASA, A-NPA, S. 20. 1084 Die EASA hat für jede Produkteklasse (C0 bis C4) ein eigenes Dokument ausgearbei- tet. Diese enthalten die jeweils geltenden Vorschriften; im Bereich des Datenschutzes und der Privatsphäre gilt für alle Produkteklassen dasselbe. 1085 Vgl. EASA, awareness leaflets, passim. In ähnlicher Form war dieser Hinweis auch bereits in EASA, NPA, S. 119 ff. enthalten. 1086 Vgl. dazu auch JARUS, Categorization, S. 29. 1087 Die Vorschriften zur Online-Theorieprüfung beziehen sich explizit auf die Drohnen- piloten, da sie die Drohnen fliegen. Dieser Terminologie soll in diesem Abschnitt gefolgt werden; vgl. grundsätzlich zur Begriffsverwendung vorne, S. 27 f. 1088 UAS.OPEN.020 Abs. 4 lit. b, UAS.OPEN.030 Abs. 2 lit. a, UAS.OPEN.040 Abs. 3 Anhang Teil A Durchführungsverordnung. Vgl. JARUS, Categorization, S. 22. 150 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» Informationsbeiblatts reicht aus.1089 Der Zeitpunkt der Online-Theorieprüfung könnte mit der Selbstregistrierung der Betreiber verknüpft werden.1090 Die Prüfung umfasst 40 Multiple-Choice-Fragen, die sich «angemessen» auf verschiedene Themen wie Flugsicherheit, Luftraumbeschränkungen, Luftsicherheit und Luftrecht verteilen sollen.1091 Ebenfalls aufgeführt ist das Thema «Schutz der Privatsphäre und der Daten».1092 Die Piloten müssen über theoretische Kenntnisse bezüglich der in diesem Kontext bestehenden Risiken sowie der grundlegenden Prinzipien des Datenschutzes gemäss anwendbarem Datenschutzgesetz verfügen.1093 Das BAZL ist für die Ausstellung von Nachweisen über das erfolgreiche Bestehen der Online-Theorieprüfung zuständig.1094 Es ist jedoch nicht davon auszugehen, dass das Bundesamt den Online-Lehrgang selbst ausarbeitet und/oder die Online-Theorieprüfung selbst durchführt.1095 Vielmehr werden diese Aufgaben wohl von einem externen Dienstleister erbracht.1096 Das BAZL hat sicherzustellen, dass die Dienstleistungen den Vorgaben der Durch­ führungsverordnung entsprechen. Mithin hat es in einer allfälligen Aus­ schreibung entsprechende Fachkompetenzen des Dienstleisters (etwa im Datenschutzrecht) als anbieterbezogenes Eignungskriterium1097 zu defi­ nieren.1098 Bezüglich Fragen zum Datenschutz kommt zudem ein (infor­ meller) Austausch mit dem EDÖB in Betracht.1099 1089 Vgl. Josipovic, S. 441; EASA, Opinion, S. 21. Dazu vorne, S. 148 f. 1090 Vgl. zur Selbstregistrierung per Onlineformular vorne, S. 128 ff. 1091 Vgl. die Aufzählung in UAS.OPEN.020 Abs. 4 lit. b. Die weiteren geprüften Themen sind menschliches Leistungsvermögen und dessen Grenzen, Betriebsverfahren, allgemeine Kenntnisse zu UAS und Versicherung. 1092 UAS.OPEN.020 Abs. 4 lit. b Ziff. vii. Vgl. zur Verwendung des Begriffs «Privatsphäre» die Hinweise vorne, Fn. 896. 1093 Vgl. EASA, GM Part-UAS, S. 11. 1094 Art. 18 lit. c Durchführungsverordnung. Diese können auch elektronisch ausgestellt werden (EASA, GM Part-UAS, S. 12). 1095 Vgl. zu den beschränkten personellen Ressourcen beim BAZL Henseler, Digitalisie- rung, S. 184 f. und S. 197 f. m.w.H. 1096 Vgl. UAS.OPEN.020 Abs. 4 lit. b spricht in diesem Zusammenhang «von einer Stelle […], die von der zuständigen Behörde des Mitgliedstaats, in dem der UAS-Betreiber registriert ist, anerkannt wurde». Vgl. zur öffentlichen Vergabe von Dienstleistungsaufträgen Galli et al., Rn. 225 ff.; Poltier, Rn. 213. 1097 Zum Begriff Poltier, Rn. 321 ff. 1098 Vgl. Hänni/Stöckli, Rn. 762; Karlen, Verwaltungsrecht, S. 372 f.; Trüeb, Art. 9 BöB N 3 f. 1099 Vgl. Leissler, S. 536; Roma, S. 30. Zu datenschutzrechtlichen Themen erteilt das BAZL denn auch keine Auskunft, sondern verweist auf die Webseite des EDÖB. § 3 Präventive und flankierende Massnahmen 151 Der Datenschutz und die Privatsphäre sind «angemessen» bei den 40 Multiple-­ Choice-Fragen zu berücksichtigen. In Anbetracht der nicht zu unterschätzenden Bedeutung der weiteren Themen, primär mit Blick auf die Sicherheit von Drohnenflügen, werden wohl keine vertieften Kenntnisse im Bereich des Daten­schutzes verlangt werden können. Trotzdem wird den Prüflingen eine Auseinandersetzung mit den wichtigsten Aspekten des Datenschutzrechts und des Rechts auf Schutz der Privatsphäre abverlangt. Dadurch kann eine gewisse Sensibilisierung erreicht werden, was zu begrüssen ist. 3. Staatliche Informationsmassnahmen In Ergänzung zu den dargestellten Informations- und Aufklärungsmassnahmen sollte das BAZL bei der Bekanntmachung der neuen Vorschriften für Drohnen proaktiv handeln;1100 dies hat es auch bis anhin auf innovative Weise getan.1101 Die gesellschaftliche Akzeptanz der Drohnentechnologie1102 würde durch eine Sensibilisierung der Gesamtbevölkerung auf datenschutzrechtliche Themen und die diesbezüglichen Vorschriften in den Drohnenverordnungen sicherlich zunehmen. Des Weiteren ist in diesem Zusammenhang eine enge Zusammenarbeit mit dem EDÖB und ggf. kantonalen Stellen wünschenswert, damit die neuen (datenschutzrechtlichen) Vorgaben in der breiten Öffentlichkeit bekannt gemacht werden können.1103 II. Geo-Awareness (Geofencing) 1. Begriff und Abgrenzung Geo-Awareness beschreibt eine Funktion, die eine potenzielle Verletzung von Luftraumgrenzen erkennt und die Piloten warnt, sodass diese sofortige und wirksame Massnahmen zur Vermeidung dieser Verletzung ergreifen können.1104 Ziel eines Geo-Awareness-Systems ist demnach, den Piloten in die Lage zu versetzen, den Eintritt einer drohenden Rechtsverletzung zu verhindern, indem es ihn mit Informationen über den Standort der Drohne in der Luft und ggf. von weiteren Luftfahrzeugen versorgt.1105 1100 Vgl. JARUS, Categorization, S. 29. Vgl. allgemein zur Information der Rechtsunter­ worfenen über Inhalt und Wirkung (neuer) Gesetze vorne, S. 146 m.w.H. 1101 So hat das BAZL etwa mehrere Videos zum Thema sowie ein «Drohnenquiz» erstellt (alles auf der Webseite des Bundesamts abrufbar). 1102 Vgl. vorne, S. 5 f. 1103 Vgl. Roma, S. 30; Stöcker et al., S. 18. 1104 Vgl. die Definition in Art. 2 Ziff. 15 Durchführungsverordnung. 1105 Krumm, Anpassungsbedarf, S. 118. 152 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» Im Gegensatz dazu zielt Geofencing1106 darauf ab, Drohnen softwaregestützt daran zu hindern, bestimmte einprogrammierte Lufträume anzufliegen oder zu verlassen. Zu denken ist etwa an Flugverbotszonen rund um Flughäfen; es können aber auch Innenstädte oder kritische Infrastrukturen «abgezäunt» werden (sog. no-drone zones).1107 Des Weiteren sind Beschränkungen der Ge­ schwindigkeit und/oder der Flughöhe in gewissen Zonen möglich.1108 Die hier beschriebene Abgrenzung wird in der Literatur nicht immer vorgenommen. Der Begriff «Geo-Awareness» ist neuer und deshalb noch weniger verbreitet. Deshalb ist regelmässig von Geofencing die Rede, wenn eigentlich Geo-Awareness gemeint ist. Aufgrund der sehr ähnlichen Zielrichtung der beiden Funktionen ist eine klare Abgrenzung derselben regelmässig nicht zwingend notwendig. Die deutsche Wortschöpfung «Geo-Sensibilisierung», als Übersetzung von Geo-Awareness1109 ist kaum verbreitet und sollte deshalb nur verwendet werden, wenn dies unumgänglich ist.1110 2. Inhalt und Grenzen Geo-Awareness sollte bereits durch die Hersteller von Drohnen (vor-)installiert werden.1111 Die Delegierte Verordnung fordert ein «Geo-Awareness-System» für Drohnen der Klassen C1 bis C3.1112 Die Ausstattung damit erlaubt den zuständigen Behörden die Schaffung von spezifisch umgrenzten Gebieten, welche «aus Gründen der Sicherheit und Gefahrenabwehr, des Schutzes der Privatsphäre oder der Umwelt» ausgeschieden werden. Darin können bestimmte Drohnenoperationen verboten bzw. erlaubt und gleichzeitig Auflagen gemacht werden.1113 Wichtig ist, dass der Zugang zum Luftraum durch diese technische Beschränkung nicht zu stark behindert wird. Grundsätzlich sollte der niedrige Luftraum allen Drohnenbetreibern offenstehen, solange sie sich an die 1106 Auch Bezeichnungen wie «Electronic Fencing» oder «GPS-Käfig» sind vereinzelt anzutreffen, vgl. Landrock/Baumgärtel, S. 13. 1107 Schubert, S. 225; vgl. EASA, A-NPA, S. 18. 1108 Zum Ganzen Hänsenberger, Diss., S. 216 f.; Landrock/Baumgärtel, S. 13 f.; Huttunen, U-space, S. 83 f. Vgl. auch JARUS, Categorization, S. 21. 1109 Vgl. Art. 2 Ziff. 15 Durchführungsverordnung. 1110 Die Legaldefinitionen in Art. 2 Durchführungsverordnung enthalten denn auch an verschiedenen Stellen den englischen «Originalbegriff». 1111 BRTF, S. 20. Es bestehen (noch) keine international anerkannten Standards dazu (Masutti/Tomasello, S. 2). 1112 Teil 2 Ziff. 13, Teil 3 Ziff. 15 und Teil 4 Ziff. 10 Anhang Delegierte Verordnung. Vgl. zu den (Produkte-)Klassen C0 bis C3 vorne, S. 24 ff. 1113 Vgl. Art. 15 Abs. 1 Durchführungsverordnung; Groh, S. 182 f. § 3 Präventive und flankierende Massnahmen 153 geltenden Vorschriften halten.1114 Unverhältnismässig wäre es jedenfalls, wenn grossflächig Städte und Dörfer insgesamt als «no-drone zones» ausgeschieden und dadurch Drohnenflüge gänzlich unterbunden würden.1115 3. Datenschutzrechtliche Beurteilung Diese hier diskutierten Luftraumbeschränkungen sind vor allem aus Sicht der bemannten Luftfahrt zentral.1116 Doch auch aus datenschutzrechtlicher Optik, namentlich im Rahmen der Privacy by Design,1117 kann Geo-Awareness nützlich sein, indem z.B. in besonders sensiblen Gebieten Drohnenflüge verboten oder stark beschränkt werden können (z.B. im Umkreis von Spitälern oder Gotteshäusern).1118 Umgekehrt können auch die Betreiber die Geo-Awareness-Funktion ihrer Drohne nutzen, um Flugpläne zu erstellen und die Drohne so vom Fliegen ausserhalb des vorgesehenen Bereichs abzuhalten, wodurch das Risiko der Bearbeitung von Daten, die der Betreiber möglicherweise nicht bearbeiten darf oder will, verringert wird.1119 Selbstverständlich ist nicht jeder Drohnenbetreiber bereit, seinen Drohnenflug einzig auf einer vor­ definierten Route zu fliegen. Denkbar wäre aber jedenfalls, dass im Vorfeld bestimmte Gebiete, wie etwa Wohnsiedlungen, davon ausgenommen würden und so das Risiko von ungewollten Datenbearbeitungen minimiert würde. Dies setzt jedoch voraus, dass sich Drohnenbetreiber der datenschutz­ rechtlichen Risiken ihrer Aktivitäten bewusst sind.1120 III. Positionslichter 1. Erfasste Drohnen Als letzte präventive Massnahme seien hier die Positionslichter erwähnt. Für Drohnen der Klassen C1 bis C31121 fordert die Delegierte Verordnung die Ausrüstung mit Lichtern für die Steuerbarkeit1122 sowie die Unterscheidbarkeit 1114 Vgl. Huttunen, U-space, S. 84. 1115 Vgl. zur Verhältnismässigkeit diesbezüglicher Vorgaben in der offenen Kategorie JARUS, Categorization, S. 21. 1116 Vgl. Masutti/Tomasello, S. 78; BRTF, S. 20. 1117 Dazu ausführlich vorne, S. 92 f. 1118 Vgl. Koelle et al., S. 158; Euler/Cobus/Koelle, S. 150. 1119 Vgl. Vivet/Smith, S. 7. 1120 Vgl. zu Information und Ausbildung vorne, S. 148 ff. 1121 Vgl. zu den (Produkte-)Klassen C0 bis C3 vorne, S. 24 ff. 1122 Die Kenntnis der genauen Lage der Drohne in der Luft ist unerlässlich, um die Drohne steuern zu können. 154 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» der Drohne bei Nacht. Die Anordnung der Lichter soll es einer Person am Boden ermöglichen, die Drohne von einem bemannten Luftfahrzeug unterscheiden zu können.1123 Nicht vorgeschrieben sind die Lichter für Drohnen der Klassen C0. Diese dürften aufgrund ihrer beschränkten Grösse nicht in der Lage sein, die notwendigen Lichter zu tragen, um diese Vorgaben zu erfüllen.1124 2. Datenschutzrechtliche Beurteilung Unter dem Titel der Privacy by Design wurden «Warnlichter» bereits angesprochen.1125 Die von der Delegierten Verordnung geforderten Lichter sind gemäss dem klaren Wortlaut der Bestimmungen aber auf die Steuerbarkeit der Drohnen ausgerichtet.1126 Werden Drohnen in der Nacht eingesetzt, so müssen sie anhand der Positionslichter von bemannten Luftfahrzeugen unterschieden werden können. Dies geht zumindest teilweise in Richtung des Datenschutzes durch Technik:1127 Eine möglicherweise betroffene Person kann eine Drohne anhand von deren Lichtern orten, als solche erkennen und ihr ggf. ausweichen. Ob überhaupt eine Datenbearbeitung durch die Drohne stattfindet, lässt sich zwar nicht erkennen. Es ist aber ohne Weiteres möglich, dass eine Drohne, welche in der Nacht eingesetzt wird, über eine Infrarot- oder Thermalkamera verfügt oder mithilfe des Steuerlichts und einer «normalen» Kamera Daten bearbeiten kann.1128 Insgesamt erscheinen die Vorschriften zu «Drohnenlichtern» dem Datenschutz zuträglich zu sein. Die bessere Sichtbarkeit der Drohne am Himmel und deren Identifizierbarkeit anhand der Positionslichter sind klar zu begrüssen. Denkt man den Datenschutz durch Lichtsignale weiter, so kämen zudem farbige Leuchtsignale oder Kennzeichen in Betracht, welche Aufschluss über die Fähigkeiten der Drohne sowie deren aktuellen Einsatz geben 1123 Teil 2 Ziff. 16, Teil 3 Ziff. 18 und Teil 4 Ziff. 14 Anhang Delegierte Verordnung. 1124 Die maximale Startmasse für eine Drohne der Klasse C0 beträgt < 250 g. Vgl. auch vorne, S. 24 f. 1125 Vorne, S. 92 f. 1126 Teil 2 Ziff. 16, Teil 3 Ziff. 18 und Teil 4 Ziff. 14 Anhang Delegierte Verordnung. Vgl. EASA, Opinion, S. 14. 1127 Vgl. Anhang IX Ziff. 1.3 EASA-Grundverordnung, wonach beim Betrieb von Drohnen auch «den Grundsätzen des Schutzes der Privatsphäre und personenbezogener Daten durch Technik und Voreinstellungen Rechnung [zu] tragen» ist. 1128 Vgl. ausführlich zu den Sensoren vorne, S. 40 ff., und spezifisch zu Infrarot- und Wärme­ bildkameras S. 42. § 4 Gesamtbetrachtung 155 würden (z.B. ob gefilmt wird).1129 Blinklichter, die in einer gewissen Abfolge ausgesendet werden, könnten zudem die Identifizierung der Drohne und/ oder des Betreibers ermöglichen. Solche Zeichen können von jeder handelsüblichen Kamera oder einem Smartphone erfasst und mit entsprechender Software verarbeitet werden.1130 Diesbezügliche Vorgaben müssten auf Ebene der EU (bzw. den gesamten europäischen Luftraum umfassend) beschlossen werden, damit sich die Farbcodes bzw. Lichtsequenzen durchsetzen und flächendeckend richtig interpretiert werden könnten.1131 Ein Vorteil der Nutzung von Lichtsignalen wäre, dass diese auch funktionieren, wenn keine (verlässliche) Funk- oder Satellitenabdeckung besteht.1132 De lege lata sind die Vorschriften zu den Positionslichtern aber «nur» auf die Steuerbarkeit und Unterscheidbarkeit der Drohne beschränkt. § 4 Gesamtbetrachtung Teil 4 der vorliegenden Untersuchung hat die drohnengestützte Datenbearbeitung vor dem Hintergrund der Drohnenverordnungen der EU und insbesondere der darin enthaltenen Bestimmungen mit Bezügen zum Datenschutz beleuchtet. Diese Bestandesaufnahme hat gezeigt, dass in verschiedenen Bereichen wichtige Bestimmungen eingeführt wurden, die dem Daten­schutz zuträglich sind. Die Registrierungsvorschriften und die damit verbundene Kennzeichnungspflicht erfassen die allermeisten Drohnen der offenen Kategorie. Dadurch wird die Grundlage für eine Identifizierung der Drohnenbetreiber und somit die Durchsetzung verschiedener Rechtsansprüche diesen gegenüber geschaffen. Die Vorschriften zur Fernidentifizierung stellen sodann einen weiteren wesentlichen Schritt in dieselbe Richtung dar. Die präventiven und flankierenden Massnahmen wie Geo-Awareness und Positionslichter können ebenfalls einen Beitrag zur Einhaltung datenschutzrechtlicher Vorgaben leisten. Auch die für die allermeisten Drohnenpiloten vorgeschriebene Online-Theorieprüfung sowie Informationsmassnahmen seitens der Händler und Behörden spielen eine nicht zu unterschätzende Rolle. Das Bewusstsein für neue Regeln und die damit einhergehenden 1129 Froomkin/Colangelo, S. 61 ff.; Thomasen, Beyond Airspace Safety, S. 20; Koelle et al., S. 158. 1130 Vgl. Singh/Carthew/Xiong, S. 4. 1131 Zur Bedeutung von (internationalen) Standards in diesem Kontext Froomkin/ Colangelo, S. 63. 1132 Singh/Carthew/Xiong, S. 4. 156 Teil 4: Bestandesaufnahme (2): Die «Drohnenverordnungen» Pflichten von Drohnenbetreibern wird dadurch geschärft. Die gezielte Ausbildung und Information von Drohnenbetreibern bezüglich datenschutzrechtlicher Themen sind deshalb klar zu begrüssen. Insgesamt ist in den Drohnenverordnungen aber keine wirksame Möglichkeit zur Durchsetzung von datenschutzrechtlichen Ansprüchen vorgesehen. Sie enthalten zwar mit der Registrierungs- und Kennzeichnungspflicht sowie der Fernidentifizierung die Grundlagen dafür, doch fehlt eine Verbindung derselben mit dem Datenschutzrecht und den darin enthaltenen Ansprüchen. Es besteht somit noch immer eine Lücke im Rechtsschutz. 157 Teil 5: Die Durchsetzung von daten­ schutzrechtlichen Ansprüchen § 1 Schutzpflicht bei der drohnengestützten Datenbearbeitung durch Private I. Informations- und Machtungleichgewicht als Ausgangspunkt Das einleitend festgestellte Informations- und Machtungleichgewicht1133 zwischen Drohnenbetreiber und betroffener Person ist im Bereich des Datenschutzrechts besonders ausgeprägt.1134 Letztere weiss nicht, ob und welche Daten über sie bearbeitet werden. Hinzu kommt, dass sie die im E-DSG verankerten Rechte kaum einmal wirksam geltend machen kann, da es an Transparenz mangelt: Die Informationspflicht läuft ohne die Mitwirkung des Drohnenbetreibers ins Leere; das Auskunftsrecht kann in den allermeisten Fällen aufgrund fehlender Informationen über den Verantwortlichen nicht ausgeübt werden. Daraus folgt, dass auch die weiteren Rechtsschutzmöglichkeiten gemäss E-DSG und ZGB1135 nicht geltend gemacht werden können.1136 Es überrascht deshalb nicht, dass gemäss Studien Transparenz «eine der zentralen Forderungen» von betroffenen Personen ist.1137 Insgesamt zeigt die drohnengestützte Datenbearbeitung durch Private exemplarisch die erheblichen Vollzugsdefizite im Datenschutzrecht auf.1138 1133 Vgl. vorne, S. 6, mit den dortigen Hinweisen. 1134 Thomasen, Beyond Airspace Safety, S. 19 f.; Froomkin/Colangelo, S. 49. Vgl. zum «Machtgefälle zwischen Datenbearbeiter und betroffener Person» auch bereits Aebi-Müller, Rn. 590, fünftes Lemma. Vgl. sodann Müller L., Diss., S. 133 und S. 310, jeweils mit Blick auf die (statische) Videoüberwachung. 1135 Vgl. dazu vorne, S. 110 ff. 1136 Vgl. Roma, S. 30; DroneRules, Handbook, S. 7. Vgl. zur gleich gelagerten Problematik im Bereich des Besitzschutzes nach ZGB BSK ZGB II-Ernst, Art. 926 N 5a und Art. 928 N 3a; Hrubesch-Millauer/Bruggisser, Rn. 38 ff. 1137 Euler/Cobus/Koelle, S. 150. Die Studie befasste sich mit dem Thema «Smart Cams», worunter neben Drohnen auch Dashcams und Datenbrillen subsumiert wurden. 1138 Vgl. dazu nur Bericht Evaluation DSG, S. 342 f.; Vasella/Sievers, S. 44 und S. 48; sowie den «Schreckensbericht» von Kühling et al., passim (zum deutschen Recht). 158 Teil 5: Die Durchsetzung von daten­schutzrechtlichen Ansprüchen Die Bestimmungen zur Identifizierung und Information von Drohnenbetreibern gemäss den im vorangehenden Teil dieser Untersuchung dargestellten Regelwerken vermögen keine hinreichende Abhilfe zu schaffen. Es liegt daher eine Situation vor, in welcher die grundrechtlich verankerten und im E-DSG konkretisierten Ansprüche der betroffenen Person nicht mehr effektiv zur Geltung kommen. Es gilt deshalb zu prüfen, ob sich daraus eine Schutzpflicht ergibt und wie diese ggf. wahrzunehmen ist. II. Tatbestand 1. Vorliegen eines Störerdreiecks Im hier interessierenden Bereich der drohnengestützten Datenbearbeitung durch Private ist das vorerwähnte Dreiecksverhältnis1139 zwischen «beeinträchtigtem Grundrechtsträger» — «Verursacher eines Übergriffs» — Staat offensichtlich. Die Drohnenbetreiber verursachen als Verantwortliche1140 regelmässig einen Übergriff in eine grundrechtlich geschützte Position. Die beeinträchtigten Grundrechtsträger sind andere, davon betroffene Private; deren Grundrechtsträgerschaft ist vorliegend klar zu bejahen.1141 2. Kenntnis der konkreten Gefährdung Des Weiteren steht fest, dass der Staat Kenntnis von der Problematik hat: So wiesen die Geschäftsprüfungskommissionen und die Geschäftsprüfungsdelegation der eidgenössischen Räte bereits im Jahr 2008 darauf hin, dass «mit Kameras ausgestattete Mini-Drohnen weit grössere Einblicke in die Privatsphäre des Bürgers ermöglichen», als dies bei Aufklärungsdrohnen der Armee der Fall sei.1142 Zahlreiche politische Vorstösse zum Thema unterstreichen diese Feststellung.1143 Ferner zeigt die laufende Revision des DSG und die damit angestrebte Stärkung der Rechte der betroffenen Personen, dass die verschiedenartigen Grundrechtsgefährdungen im Bereich der informationellen Selbstbestimmung bekannt waren und sind.1144 Diese aktualisieren sich bei drohnen­ 1139 Vgl. dazu vorne, S. 47. 1140 Vgl. zum Begriff vorne, S. 74. 1141 Vgl. dazu vorne, S. 63 und S. 65. 1142 Jahresbericht GPK/GPDel 2007, S. 5155. Zum Einsatz von Aufklärungsdrohnen der Ar- mee vgl. vorne, S. 35 f. 1143 Vgl. dazu die Hinweise vorne, in Fn. 6. 1144 Vgl. dazu ausführlich vorne, S. 11 f. § 1 Schutzpflicht bei der drohnengestützten Datenbearbeitung durch Private 159 gestützten Datenbearbeitungen durch Private in erheblichem Masse; die erforderliche Schwere der Gefährdung ist somit ebenfalls zu bejahen.1145 Hinzu kommt, dass der Bundesrat unlängst explizit Lücken bei der Rechtsdurchsetzung im Zusammenhang mit Drohnen eingeräumt hat.1146 Das Bewusstsein für die bestehenden Mängel im Grundrechtsschutz sind Bundesrat und Parlament demnach bekannt. 3. Kompetenz des Bundes Die Gesetzgebung im Bereich des Datenschutzes sowie der Luftfahrt ist Sache des Bundes. Für privatrechtliche Datenschutzbestimmungen kann sich der Bundesgesetzgeber auf die Rechtsetzungskompetenzen in den Bereichen Zivilrecht (Art. 122 BV), privatwirtschaftliche Erwerbstätigkeit (Art. 95 BV) und Verbraucherschutz (Art. 97 Abs. 1 BV) berufen.1147 Datenschutzvorschriften für Behörden und Verwaltungsstellen stützt der Bundesgesetz­ geber auf die organisatorische Zuständigkeit nach Art. 173 Abs. 2 BV.1148 Die Gesetzgebung über die Luftfahrt ist gemäss Art. 87 Abs. 1 BV dem Bund vorbehalten.1149 Dieser ist folglich rechtlich in der Lage, in den hier interessierenden Rechtsgebieten Massnahmen zu ergreifen. III. Adressat der Schutzpflicht Die Exekutive (unter Einschluss der Vollzugsbehörden), die Legislative und die Judikative können zur Wahrnehmung von Schutzpflichten berufen sein.1150 Gerichten kommt dabei im hier interessierenden Kontext kaum Bedeutung zu. Aus diesem Grund werden nachfolgend nur die Rolle der Vollzugsbehörden sowie diejenige des Gesetzgebers diskutiert. 1145 Vgl. dazu vorne, S. 52 f. 1146 Stellungnahme des BR vom 29. August 2018 zur Interpellation Jositsch (18.3397); vgl. dazu auch die Ausführungen vorne, S. 143 f. 1147 Botschaft Totalrevision DSG, S. 7185, sowie Botschaft DSG 1988, S. 424 ff. Ausführlich zur Zuständigkeit des Bundes Belser, in: Belser/Epiney/Waldmann, § 5 Rn. 7 ff.; vgl. auch SHK DSG-Fey, Art. 1 N 5 f. Die im E-DSG erstmals erwähnte Kompetenzgrundlage in Art. 97 Abs. 1 BV wurde in der Lehre teilweise kritisiert (vgl. z.B. Vasella, Helsana+). 1148 So explizit Botschaft Totalrevision DSG, S. 7186; vgl. auch Botschaft DSG 1988, S. 425. Gemäss Biaggini, Komm. BV, Art. 173 N 33, begründet diese Bestimmung aber keine Bundeskompetenzen; vielmehr handle es sich um «einen ‹Platzhalter› für eine inhärente Kompetenz des Bundes» (ebd., Vorbem. Art. 42–135 N 19); vgl. Belser, in: Belser/ Epiney/Waldmann, § 5 Rn. 33 f. 1149 Ausführlich dazu statt anderer BSK BV-Kern, Art. 87 N 24 ff.; Biaggini, Komm. BV, Art. 87 N 14 ff. 1150 Ausführlich dazu vorne, S. 51 f. 160 1. Teil 5: Die Durchsetzung von daten­schutzrechtlichen Ansprüchen Vollzugsbehörden Als Vollzugsbehörde ist primär die Polizei zu nennen. Entsprechend ihrem Auftrag greift sie ein zur Gefahrenabwehr sowie zum Schutz der öffentlichen Sicherheit und Ordnung.1151 Dazu zählen auch die Verhinderung und die Ahndung von Straftaten.1152 Dabei kommen vorliegend neben verschiedenen kernstrafrechtlichen Bestimmungen1153 auch Delikte gemäss LFG in Be­ tracht.1154 Sodann ist auch an kantonale oder kommunale Bestimmungen1155 zu denken, welche Drohnenflüge verbieten bzw. einer Bewilligungspflicht unterstellen.1156 Nicht nur Private, sondern auch die Polizei sieht sich indes mit der Schwierigkeit konfrontiert, dass eine wirksame Verfolgung des «Störers» die Identifizierung desselben voraussetzt. Bisher gelang dies in einzelnen Fällen, indem die Ordnungshüter den Standort des Piloten aus demjenigen der Drohne am Himmel eruieren konnten.1157 In vielen Fällen bleibt ein rechts­ widriger Drohnenflug heute jedoch ungeahndet, da keine Verfolgung statt­ finden kann. Ein effektives Vorgehen gegen fehlbare Drohnenpiloten setzt demnach legislatorische Massnahmen voraus. 2. Gesetzgeber Wie aufgezeigt, ergibt sich eine Pflicht zu gesetzgeberischen Massnahmen dort, wo «Straf- oder Privatrecht Lücken aufweisen, welche voraussehbare private Übergriffe in menschenrechtlich geschützte Bereiche sanktionslos 1151 Vgl. dazu statt anderer Mohler, Polizeirecht, Rn. 83 ff. 1152 Auf die strafprozessuale Polizeitätigkeit soll vorliegend nicht weiter eingegangen werden; vgl. dazu z.B. Mohler, Polizeirecht, Rn. 141. 1153 Im StGB werden durch Art. 179 bis, 179 ter und 179 quater das Abhören und Aufnehmen fremder Gespräche, das unbefugte Aufnehmen von Gesprächen bzw. die Verletzung des Geheim- oder Privatbereichs durch Aufnahmegeräte unter Strafe gestellt. Diese Bestimmungen sind ohne Weiteres auf die drohnengestützte Datenbearbeitung durch Private anwendbar, wobei Art. 179quater StGB im Vordergrund steht (vgl. Schneider-­ Marfels/Kaufmann, Rn. 10; Meili A., S. 46; Interpellation Jositsch [18.3397]). Vgl. zu den Bestimmungen im Einzelnen BSK StGB-Ramel/Vogelsang, Art. 179 bis N 2 ff., Art. 179 ter N 3 ff. und Art. 179quater N 5 ff. 1154 Hier steht Art. 91 LFG i.V.m. Art. 14b und 17 f. VLK im Vordergrund. 1155 Vgl. zur (kantonalen) Kompetenz zum Erlass solcher Bestimmungen Art. 51 Abs. 2 LGF und Art. 2a Abs. 2 LFV. Auf die teilweise umstrittene Kompetenzverteilung zwischen Bund und Kantonen (bzw. Gemeinden) soll nicht weiter eingegangen werden. 1156 Vgl. z.B. § 7 Abs. 1 PolR Oberes Fricktal (Bewilligungspflicht für «Modellfliegen inkl. Drohnen»); § 18 Abs. 3 SchifffahrtsVO LU («Modellflugzeuge dürfen weder auf noch über einem Gewässer eingesetzt werden»); Art. 10 Abs. 1 RaLA (Flugverbot in einem Umkreis von 300 m um öffentliche Gebäude). 1157 Vgl. z.B. die Berichte von Fluck und Huber M. § 1 Schutzpflicht bei der drohnengestützten Datenbearbeitung durch Private 161 lassen».1158 Um gegen die vorliegend interessierenden Übergriffe in das Grundrecht der informationellen Selbstbestimmung vorzugehen, muss mit gesetzgeberischen Massnahmen ein privatrechtliches Vorgehen überhaupt erst ermöglicht werden. Es geht folglich darum, zivilrechtliche Rechtsbehelfe zu schaffen, welche ausreichend Schutz bieten;1159 (zusätzliche) strafrechtliche Bestimmungen erscheinen nicht erforderlich.1160 IV. Zwischenfazit Zusammenfassend steht fest, dass bei der drohnengestützten Datenbearbeitung durch Private eine Gefährdung der informationellen Selbstbestimmung von hinreichender Schwere besteht, dass sich eine Schutzpflicht aktualisiert. Die Normen des Datenschutz- und des Luftfahrtrechts vermögen die Rechtsdurchsetzung nicht hinreichend zu garantieren; in diesem Bereich ist der Gesetzgeber zur Wahrnehmung seiner Schutzpflicht berufen. Er ist gehalten, die tatsächlichen Hindernisse im Bereich des grundsätzlich zur Verfügung stehenden Rechtsschutzes legislatorisch zu adressieren und so kurativ einzugreifen.1161 Dazu ist er faktisch und rechtlich in der Lage. Solange der Staat keine Schritte in Richtung eines effektiven Rechtsschutzes unternimmt, besteht ausserdem die Gefahr, dass sich Private der Selbsthilfe bzw. der Notwehr bedienen und eine Drohne über ihrem Grundstück «abschiessen».1162 Die Lehrmeinungen in der Schweiz zur Zulässigkeit eines solchen Vorgehens sind nicht einhellig, wobei jedoch ein Teil «insbesondere angesichts der regelmässig anonymen zivilen Drohnennutzung, wie sie heute an der Tagesordnung ist (…)», für zulässig erachtet, «bestimmt gegen einzelne Störer vorzugehen und die entsprechenden Schranken (…) nicht zu hoch anzusetzen.»1163 Wäre ein auf Selbsthilfe basierender Abschuss einer Drohne durch Private ohne Weiteres akzeptiert, würde dies dem staatlichen 1158 Kälin/Künzli, Rn. 3.113. Vgl. dazu vorne, S. 52 f. 1159 Vgl. EGMR (GK), Söderman c. Schweden, Nr. 5786/08 (2013) Ziff. 85; BGE 136 III 410 E. 6.2; Müller L., Diss., S. 317 f. 1160 Zu den bestehenden Strafbestimmungen vgl. die Hinweise in Fn. 1153. Vgl. sodann EGMR (GK), Söderman c. Schweden, Nr. 5786/08 (2013) Ziff. 85; EGMR, K.U. c. Finnland, Nr. 2872/02 (2008) Ziff. 47. 1161 Vgl. dazu vorne, S. 52 ff. und v.a. S. 50. 1162 Vgl. illustrativ Schneider-Marfels/Kaufmann, Rn. 32 in fine, wo diese Autoren die Formulierung «Feuer frei» verwenden. BSK ZGB II-Ernst, Art. 926 N 5a spricht vom «gewaltsamen Herunterholen». 1163 Christen et al., S. 168; ähnlich auch Schneider-Marfels/Kaufmann, passim, v.a. Rn. 29 und 32. Für Zurückhaltung plädierend dagegen Hrubesch-Millauer/ Bruggisser, Rn. 35 ff. Vgl. sodann BSK ZGB II-Ernst, Art. 926 N 5a und Art. 928 N 3a. 162 Teil 5: Die Durchsetzung von daten­schutzrechtlichen Ansprüchen Gewaltmonopol zuwiderlaufen. Dieses umfasst die Pflicht Privater, sich grundsätzlich jedweder Anwendung physischer Gewalt zu enthalten.1164 Stellt der Staat alternative Handlungsoptionen im Sinne eines effektiven Rechtsschutzes bereit, so ist dies ebenfalls Ausfluss seines Gewaltmonopols.1165 § 2 Wahrnehmung der Schutzpflicht de lege ferenda Vor diesem Hintergrund soll nun ein Vorschlag präsentiert werden, der die Durchsetzung von datenschutzrechtlichen Ansprüchen bei der drohnengestützten Datenbearbeitung durch Private ermöglicht. Dafür sind zwei Zwischenschritte notwendig: Zunächst ist die Perspektive der Drohnenbetreiber einzunehmen und danach zu fragen, wie deren Interessen im Rahmen der Wahrnehmung grundrechtlicher Schutzpflichten berücksichtigt werden müssen (sogleich). Des Weiteren ist der Frage nachzugehen, auf welcher Gesetzesstufe und in welcher Gesetzesmaterie ein legislatorisches Vorgehen korrekterweise angezeigt wäre (S. 164 ff.). I. Achtung der Ansprüche der Drohnenbetreiber­ Bei der Wahrnehmung von Schutzpflichten ist darauf zu achten, dass die infrage kommenden Schutzmassnahmen grundrechtskonform sind und die Schutzund Freiheitsbedürfnisse aller Betroffenen aufeinander abgestimmt werden.1166 Die Privatsphäre und die informationelle Selbstbestimmung der Drohnen­ betreiber ist mithin bei der Ausgestaltung und Anwendung der Registrierungs-, Kennzeichnungs-, und Fernidentifizierungsregelungen ebenfalls zu respektieren.1167 Der Fokus der vorliegenden Untersuchung, namentlich die Durchsetzung von datenschutzrechtlichen Ansprüchen gegenüber Drohnenbetreibern, darf nicht darüber hinwegtäuschen, dass auch deren Grundrechte zu schützen sind. Dieser Gedanke fand auch in EG 31 EASA-­Grundverordnung Eingang. Dort heisst es, dass die «nationalen Registrierungssysteme (…) dem geltenden natio­ nalen Recht über den Schutz der Privat­sphäre und die Verarbeitung personenbezogener Daten entsprechen [sollten]».1168 1164 Zum staatlichen Gewaltmonopol statt vieler Mohler, Gewaltmonopol, S. 157 ff. 1165 Mohler, Gewaltmonopol, S. 159; Stinner, S. 62; Rupp, S. 56. Vgl. auch Geiser/ Uttinger, S. 9. 1166 Kiener, Grundrechte in der BV, Rn. 30; Martin, S. 91. Vgl. dazu auch vorne,S. 54. 1167 Vgl. allgemein zur Schlichtung dieser «Grundrechtskollisionen» Martin, S. 91 m.w.H. 1168 So auch EG 19 Durchführungsverordnung. § 2 Wahrnehmung der Schutzpflicht de lege ferenda 163 Die Vorgaben zur Registrierung und Kennzeichnung1169 von Drohnen der offenen Kategorie sind diesbezüglich kaum risikobehaftet. Sie sind zumutbar, für die Identifizierung von Drohnenbetreibern erforderlich und somit ohne Weiteres als verhältnismässig zu qualifizieren. Anders verhält es sich bei der Fernidentifizierung, sofern diese eine dauerhafte und nicht anlassbezogene Überwachung der Drohnen und deren Betreiber ermöglicht.1170 Eine aktive Kontrolle über GPS-Tracker (oder alternative Systeme wie Galileo oder GLONASS1171) hätte zwar den Vorteil, dass den zuständigen Behörden zu jeder Zeit die Daten zu den Flugbewegungen von Drohnen zur Verfügung stünden.1172 Dies erscheint jedoch nicht erforderlich und folglich unverhältnismässig. Aus diesem Grund ist die in der Durchführungsverordnung getroffene Wertung zur Fernidentifizierung, namentlich deren Beschränkung auf eine «lokale Übertragung», zu begrüssen. Denn dies verunmöglicht die jederzeitige und anlasslose Überwachung von Drohnenoperationen.1173 Diese Überlegungen müssen umso mehr gelten, wenn es um die Implementierung des U-Space geht. Dieses System setzt grundsätzlich voraus, dass der exakte Standort von sich in der Luft befindlichen Drohnen jederzeit bekannt ist. Unklar ist derzeit, wer und in welcher Form Zugriff auf diese Positionsdaten hat.1174 Denn daraus liesse sich bei kommerziellen Anwendungen ggf. auf Geschäftspraktiken oder Geschäftsgeheimnisse schliessen.1175 Im Rahmen der nicht kommerziellen Nutzung kann vom Standort der Drohne auf denjenigen des Piloten geschlossen werden. Dies dürfte dazu führen, dass diese Positionsdaten regelmässig (auch) Personendaten darstellen.1176 Des Weiteren sind auch die Betreibernummern als Personendaten zu qualifizieren.1177 Diese Umstände sind von datenschutzrechtlicher Relevanz und mithin bei Überlegungen de lege ferenda unbedingt zu beachten.1178 1169 Vgl. dazu vorne, S. 120 ff. bzw. S. 135 ff. 1170 Vgl. nur BGer, 6B_908/2018 vom 7. Oktober 2019 E. 3.2 (zur Publikation vorgesehen) m.w.H. Zum «chilling effect» vgl. vorne, S. 61 mit den Hinweisen in Fn. 465. 1171 Dabei handelt es sich ebenfalls um globale Navigationssatellitensysteme (GNSS), die jedoch von Europa (Galileo) bzw. Russland (GLONASS) betrieben werden. Vgl. Büchi, Buch der Drohnen, S. 37, und ausführlich zu diesen Systemen Falcone/Hahn/Burger, passim (Galileo) bzw. Revnivykh et al., passim (GLONASS). 1172 Vgl. Grest, S. 121. 1173 Singh/Carthew/Xiong, S. 4 f. 1174 Vgl. dazu vorne, S. 142 ff. 1175 Vgl. Malgieri, S. 193. 1176 Dazu unter Geltung der DSGVO Malgieri, S. 194 f. Vgl. zum weit gefassten Begriff des Personendatums vorne, S. 29 ff. 1177 Mutatis mutandis BGE 138 II 346 E. 6.2 f. 1178 Vgl. zu diesem Aspekt mit Blick auf das Luftfahrzeugregister Botschaft Teilrevision 1 LFG, S. 4943; vgl. auch EG 19 Durchführungsverordnung. 164 Teil 5: Die Durchsetzung von daten­schutzrechtlichen Ansprüchen II. Bestimmung des passenden Gesetzes Da es inhaltlich um die Durchsetzung von datenschutzrechtlichen Ansprüchen geht, liegt die Vermutung nahe, dass entsprechende Bestimmungen im DSG aufzunehmen wären.1179 Eine drohnenspezifische Regelung im Datenschutzgesetz ist mit Blick auf die Technologieneutralität jedoch nicht erstrebenswert.1180 Ausserdem soll es nicht darum gehen, die Technologie an sich zu regulieren, sondern die negativen Auswirkungen derselben.1181 Aus diesem Grund bietet sich eine sektorspezifische Regulierung an.1182 Namentlich bei Datenbearbeitungen, «die im anonymen Massenverkehr auftreten und sich damit der Beeinflussung durch die betroffenen Personen entziehen»,1183 ist ein solches Vorgehen einer Anpassung des Datenschutzgesetzes vorzuziehen. Es sollten folglich die Datenschutzbestimmungen des Luftfahrtrechts revidiert und ergänzt werden. Da es inhaltlich um eine Datenbearbeitung und bekanntgabe durch Bundesbehörden und namentlich das BAZL geht, sind die entsprechenden Normen in einen bundesrechtlichen Erlass aufzunehmen.1184 Eine Anpassung der VLK oder die Ausarbeitung einer neuen Verordnung (durch das UVEK1185) wäre zwar innerhalb kürzerer Frist möglich.1186 Der zeitlich aufwendigere Weg über die Bundesversammlung (und ggf. das Volk) drängt sich jedoch aufgrund der Regelungsmaterie auf.1187 Insgesamt sind deshalb neue Regelungen ins LFG aufzunehmen. 1179 Vgl. zu dieser Forderung in Deutschland Uschkereit/Zdanowiecki, S. 449. Stöcker et al., S. 18, halten dafür, dass alle Gefahren der drohnengestützten Datenbearbeitung beurteilt und angemessen in die nationalen Datenschutzgesetze eingearbeitet werden sollten. 1180 Vgl. zur Technologieneutralität vorne, S. 71 f. 1181 Vgl. Leenes et al., S. 7 m.w.H. 1182 So auch Davola, S. 160. Vgl. allgemein zur Bedeutung sektorspezifischer Regulierungen im Datenschutz Sprecher, S. 544 m.w.H. 1183 Schantz, in: Simitis et al., Art. 6 Abs. 1 DSGVO N 86. 1184 Vgl. Art. 30, Art. 32 E-DSG und v.a. Art. 30 Abs. 2 lit. c E-DSG. Zur Normstufe ausführlich Waldmann/Bickel, in: Belser/Epiney/Waldmann, § 12 N 44 ff. 1185 Vgl. zur diesbezüglichen Kompetenz des UVEK Art. 51 Abs. 1 und 2 LFG; Art. 2a Abs. 3, Art. 21 und Art. 125 Abs. 2 LFV; vgl. auch Dettling-Ott, Organisation, Rn. 9. 1186 Vgl. dazu Cottier, S. 37, der im Kontext der Regulierung der Digitalisierung eine «refonte des lents et dispersés processus traditionnels d’adoption des normes» fordert. 1187 Vgl. zur Aufnahme von Datenschutzbestimmungen im LFG auch Botschaft Teil­ revision 1 LFG, S. 4943, und zu parallelen Überlegungen im Strassenverkehrsrecht Botschaft Via sicura, S. 8480 f. und S. 8521. § 3 Vorschläge für eine Gesetzesbestimmung 165 Wie aufgezeigt, ist der Bund für die Schaffung entsprechender Bestimmungen zuständig.1188 Der Anstoss zu einer neuen gesetzlichen Regelung kann von jedem Mitglied des National- und Ständerats, von jeder Fraktion, von jeder parlamentarischen Kommission und von jedem Kanton ausgehen (Art. 160 Abs. 1 BV).1189 Dem Bundesrat als Kollegium steht dieses Recht ebenfalls zu (Art. 181 und Art. 177 Abs. 1 BV);1190 er kann die Ausarbeitung einer entsprechenden Vorlage der Verwaltung übertragen (Art. 177 Abs. 2 BV).1191 Vorliegend würde die Federführung dem UVEK und innerhalb desselben dem BAZL zufallen.1192 Für Beratung und Beschluss einer neuen oder revidierten Norm ist sodann die Bundesversammlung zuständig.1193 § 3 Vorschläge für eine Gesetzesbestimmung I. Zu regelnde Aspekte Vor diesem Hintergrund soll nun ein Formulierungsvorschlag für eine Bestimmung im LFG präsentiert werden. Dieser soll — im Einklang mit der Forschungsfrage — primär die Bekanntgabe von Daten aus dem «Drohnenbetreiberregister» zum Zweck der Durchsetzung von datenschutzrechtlichen Ansprüchen behandeln. Es könnte sich dabei um einen nArt. 107c LFG handeln. Dieser würde systematisch unter dem Titel «Datenschutz» stehen und thematisch an die Zugriffsrechte zum bereits bestehenden Luftfahrzeug­ register anknüpfen. Neben dem Zugriff sind weitere Aspekte wie Zweck und Inhalt des Registers zu regeln, denn die neue Bestimmung muss eine ausreichende Bestimmtheit aufweisen.1194 Ausserdem sollte die Kompetenz zur Führung des 1188 Vgl. vorne, S. 159. 1189 Zum Initiativ- und Antragsrecht ausführlich statt vieler Biaggini, Komm. BV, Art. 160 N 2 ff.; BSK BV-Thurnherr, Art. 160 N 4 ff. 1190 Vgl. zu dieser Befugnis Biaggini, Komm. BV, Art. 181 N 2 f. und N 5. 1191 Biaggini, Komm. BV, Art. 181 N 7 und Art. 177 N 11 ff. 1192 Art. 2 Abs. 2 und Art. 43 Abs. 1 RVOG; Art. 3 Abs. 1 lit. a und Art. 7, v.a. Art. 7 Abs. 3 lit. a OV-UVEK; Art. 3 Abs. 2 LFG; vgl. Dettling-Ott, Betrieb, Rn. 5; Dettling-Ott, Organi­ sation, Rn. 10. 1193 Art. 163 BV und dazu Sägesser, in: Sägesser, Art. 163 BV N 404 ff. Zum Ablauf des Ver- fahrens im Einzelnen vgl. auch Art. 71 ff. ParlG; Komm. ParlG-von Wyss, Art. 71 N 8; Komm. ParlG-Theler, Art. 73 N 8. 1194 Vgl. zu diesem Kriterium und den einzelnen davon erfassten Aspekten BSK DSG-Jöhri/ Studer, Art. 17 N 11; SHK DSG-Mund, Art. 17 N 6 ff.; Waldmann/Bickel, in: Belser/ Epiney/Waldmann, § 12 N 45 f. 166 Teil 5: Die Durchsetzung von daten­schutzrechtlichen Ansprüchen Registers festgelegt werden.1195 Dadurch werden die Vorgaben des E-DSG und der EASA-Grundverordnung für die Datenbearbeitung durch das BAZL verwirklicht.1196 II. Kommentierter Formulierungsvorschlag 1. Kompetenz (Abs. 1) 1.1 Formulierungsvorschlag 1 Das BAZL führt das schweizerische Register der Betreiber von unbemann- ten Luftfahrzeugsystemen im Sinne von Art. 2 Ziff. 2 Verordnung (EU) Nr. 2019/947. 1.2 Bemerkungen Das BAZL hat die Plattform für die Selbstregistrierung der Drohnenbetreiber bereitzustellen.1197 Deshalb soll auch bezüglich der Führung des Betreiberregisters von der Kompetenz des Bundesamts ausgegangen werden.1198 Der Verweis auf das grundlegende europäische Regelwerk ist ohne Weiteres vertretbar;1199 solche sind im Schweizer Luftfahrtrecht denn auch nicht unüblich.1200 Aus Gründen der Klarheit und der Rechtssicherheit sowie mit Blick auf die Legaldefinition in der Durchführungsverordnung sollte zudem der Begriff «unbemanntes Luftfahrzeugsystem» (anstelle von Drohne) verwendet werden.1201 Das Betreiberregister ist im Gesetz in einem separaten Artikel zu behandeln; damit wird die Unterscheidung vom Luftfahrzeugregister verdeutlicht.1202 Die Bestimmung spricht vom «schweizerischen Register», da es sich gemäss Vorgaben der EASA-Grundverordnung um ein nationales (jedoch zugleich harmonisiertes und interoperables) System handeln soll.1203 1195 Vgl. zum Ganzen BJ, Leitfaden, Rn. 833. 1196 Vgl. Art. 5–7, Art. 30 und Art. 32 E-DSG; Art. 132 Abs. 1 EASA-Grundverordnung. Vgl. auch BJ, Leitfaden, Rn. 829 ff. 1197 Vgl. vorne, S. 128. 1198 Die Ausarbeitung und Führung des Registers könnte auch an eine dritte Institution vergeben werden (vgl. vorne, S. 128 mit den dortigen Hinweisen). 1199 Es handelt sich dabei um einen sog. «dynamisch-direkte Verweisung»; vgl. nur BJ, Leitfaden, Rn. 758. 1200 Zu finden sind solche etwa in Art. 14a VLK, Art. 2b Abs. 1, Art. 26 und Art. 77 LFV. 1201 Vgl. dazu vorne, S. 26 f. 1202 Vgl. zur Aufnahme von Drohnen der zulassungspflichtigen Kategorie ins Luftfahrzeug­ register vorne, S. 131. 1203 Vgl. vorne, S. 132. Auch die Pflicht zur Registrierung besteht im Staat des Wohnsitzes bzw. des Hauptgeschäftssitzes (vgl. dazu vorne, S. 128). § 3 Vorschläge für eine Gesetzesbestimmung 2. 167 Zweck (Abs. 2) 2.1 Formulierungsvorschlag 2 Das Register dient der Erfüllung folgender Aufgaben: a.  Identifizierung von Betreibern von unbemannten Luftfahrzeugsystemen; b. Durchführung von Administrativ- und Strafverfahren gegen Betreiber und Fernpiloten von unbemannten Luftfahrzeugsystemen; c. Unterstützung von in- und ausländischen Behörden sowie internationalen Organisationen bei der Erfüllung ihrer Aufgaben gemäss der Verordnung (EU) Nr. 2018/1139 und den darauf gestützt erlassenen Rechtsakten; d. (…).1204 2.2 Bemerkungen Der primäre Zweck ist die Identifizierung der Betreiber. Sind Betreiber und Fernpilot nicht ein und dieselbe Person, so kann Letzterer nicht direkt durch Rückgriff auf das Register identifiziert werden, da sich Fernpiloten selbst nicht registrieren müssen. Die notwendigen Angaben können in diesem Fall beim Betreiber in Erfahrung gebracht werden.1205 Das Register soll zudem der Durchführung von Administrativ- und Strafverfahren dienen. Entsprechende Verfahren sind zur Durchsetzung der Sanktionen, welche die Schweiz gemäss Art. 131 EASA-Grundordnung für Verstösse gegen die Grundverordnung sowie die Durchführungs- und die Delegierte Verordnung vorzusehen hat, notwendig.1206 Neben Strafverfolgungsbehörden wird z.B. auch die SUST Zugriff auf Angaben von Drohnenbetreibern benötigen.1207 Des Weiteren soll das Register der Zusammenarbeit mit der EASA, der EU-Kommission und den zuständigen ausländischen Behörden dienen. Letzteres wird von der EASA-Grundverordnung explizit verlangt.1208 1204 Weitere Zwecke wie z.B. die Erstellung von Statistiken kämen ebenfalls in Betracht. In Übereinstimmung mit dem Fokus der vorliegenden Untersuchung werden diese aber nicht weiter vertieft. 1205 Der Betreiber ist gehalten, «seine» Fernpiloten zu überwachen; er sollte diese mithin auch identifizieren können (vgl. etwa Art. 14 Abs. 2 lit. e Durchführungsverordnung; UAS.SPEC.050 Abs. 1 lit. b und d Anhang Teil B Durchführungsverordnung; EASA, GM Part-UAS, S. 20). 1206 Vgl. dazu vorne, S. 147. 1207 Die SUST ist eine ausserparlamentarische Kommission, welche u.a. mit der Untersu- chung von Zwischenfällen in der Luftfahrt betraut ist (Art. 1 und Art. 6 Verordnung über die Sicherheitsuntersuchung von Zwischenfällen im Verkehrswesen [VSZV]). 1208 Art. 74 EASA-Grundverordnung, v.a. Abs. 1; vgl. auch EG 35, 37 und 48 EASA-Grund- verordnung. Vgl. sodann vorne, S. 132. 168 3. Teil 5: Die Durchsetzung von daten­schutzrechtlichen Ansprüchen Inhalt (Abs. 3) 3.1 Formulierungsvorschlag 3 Das Register enthält folgende Daten: a. bei natürlichen Personen: vollständiger Name und Geburtsdatum; b. bei juristischen Personen: Name oder Firma und UnternehmensIdenti­fikationsnummer (UID); c. Adresse des Betreibers; d. E-Mail-Adresse und Telefonnummer des Betreibers; e. Nummer der Versicherungspolice jedes unbemannten Luftfahrzeug­ systems des jeweiligen Betreibers, sofern dafür eine Versicherung erforderlich ist. 3.2 Bemerkungen Der Formulierungsvorschlag zum Inhalt des Registers ist stark an Art. 14 Abs. 2 Durchführungsverordnung angelehnt; die dort aufgelisteten Informationen sind bei der Selbstregistrierung anzugeben und somit selbstredend auch im Register zu speichern.1209 Bei den registrierten Informationen handelt es sich um Personendaten bzw. um Daten,1210 weshalb dieser Begriff im Formulierungsvorschlag zu Abs. 3 sowie den nachfolgenden Absätzen verwendet wird. Kann eine natürliche Person bei der Registrierung keine E-Mail-Adresse und/oder keine (persönliche) Telefonnummer angeben, so wäre diese Angabe auch nicht im Register enthalten. Solange der Zweck der Identifizierung des Betreibers dennoch erreicht werden kann, ist nicht zwingend auf die Vollständigkeit der Angaben gemäss obigem Formulierungsvorschlag zu beharren.1211 1209 Vgl. zu den anzugebenden Daten vorne, S. 130 f. Die in Art. 14 Abs. 2 lit. e und f Durch- führungsverordnung aufgeführten Erklärungen und Dokumente werden im Formulierungsvorschlag nicht aufgeführt; sie sind denn auch für Betreiber von Drohnen der offenen Kategorie nicht von Bedeutung. 1210 Vgl. dazu eingehend vorne, S. 29 ff. 1211 Vgl. dazu auch bereits vorne, S. 130 f. § 3 Vorschläge für eine Gesetzesbestimmung 4. 169 Datenbekanntgabe (Abs. 4 und 5) 4.1 Formulierungsvorschlag 4 Das Register ist nicht öffentlich. Das BAZL darf folgende Daten gemäss Abs. 3 Personen bekannt geben: a. die im Hinblick auf die Geltendmachung von Ansprüchen gemäss dem Bundesgesetz über den Datenschutz und/oder dem Schweizerischen Zivilgesetzbuch ein hinreichendes Interesse geltend machen: Name und Adresse des Betreibers; b. (…).1212 5 Das BAZL stellt für Gesuche nach Abs. 4 ein Onlineformular zur Verfügung.» 4.2 Bemerkungen Das Register sollte vom Grundsatz der Nichtöffentlichkeit ausgehen und dieser explizit im Gesetz verankert werden.1213 Des Weiteren erfolgt die Identifizierung eines Drohnenbetreibers nicht direkt, d.h. gestützt auf die durch die Fernidentifizierung ausgesendeten Informationen. Vielmehr muss sich eine betroffene Person dafür an das BAZL wenden.1214 Von diesem Verständnis geht auch die Bestimmung zur direkten Fernidentifizierung aus; die Personalien des Betreibers werden nicht direkt übermittelt.1215 Betreiber von Drohnen, welche keine Informationen zur Fernidentifizierung übertragen müssen (d.h. solchen der Klasse C01216 sowie selbst gebauten Drohnen1217), können nur visuell identifiziert werden, was mit erheblichen Schwierigkeiten verbunden ist.1218 Somit verbleibt in diesem Bereich eine Lücke im Rechtsschutz. Relativiert wird die Problematik durch die beschränkte Verbreitung selbst gebauter Drohnen sowie den Umstand, dass (Kleinst-)Drohnen der Klasse C0 nahe dem Betreiber fliegen müssen, damit die relevanten Betriebsvorschriften eingehalten werden können.1219. 1212 Weitere Gründe für eine Datenbekanntgabe kommen zwar ohne Weiteres in Betracht (z.B. Personen, die von einem Unfall mit einer Drohne betroffen sind und haftungsrechtliche Ansprüche geltend machen wollen). Es kann jedoch im Rahmen der vorliegenden Untersuchung keine abschliessende Liste präsentiert werden. 1213 Zur Begründung vorne, S. 134 f. Dafür spricht ausserdem, dass u.U. Minderjährige im Register verzeichnet sind (vgl. dazu vorne, S. 129 sowie Spies, S. 102). 1214 Vgl. zur lokalen Übertragung von Angaben der Fernidentifizierung vorne, S. 140 f. 1215 Vgl. dazu vorne, S. 139 ff. 1216 Vgl. vorne, S. 138 f. 1217 Vgl. vorne, S. 145. 1218 Vgl. vorne, S. 137 f. 1219 Vgl. vorne, S. 141 f. 170 Teil 5: Die Durchsetzung von daten­schutzrechtlichen Ansprüchen Bringt eine Person schlüssig vor, dass sie von einer (unerwünschten) drohnengestützten Datenbearbeitung betroffen war, so hat das BAZL die nachgesuchten Daten bekannt zu geben. Es ist somit kein strenger Massstab anzuwenden; Glaubhaftmachung genügt.1220 Im Sinne der Verhältnismässigkeit sind selbstredend jeweils nur diejenigen Daten bekannt zu geben, welche für den konkreten Zweck notwendig sind.1221 Zur Geltendmachung des datenschutzrechtlichen Auskunftsrechts etwa sind einzig Name und Adresse des (vermeintlich) Verantwortlichen notwendig.1222 Das Geburtsdatum einer natürlichen Person oder Angaben zur Versicherung der Drohne sind hingegen für die Durchsetzung von datenschutzrechtlichen Ansprüchen unerheblich. Aus diesem Grund sollte das Gesetz festlegen, dass «nur» Name und Adresse des Betreibers bekannt gegeben werden dürfen.1223 Trotz der offenen Formulierung («darf») hat bei Nachweis eines hinreichenden Interesses grundsätzlich eine Bekanntgabe zu erfolgen.1224 Dabei stellt bereits die Angabe der Betreibernummer im Hinblick auf die Geltendmachung von datenschutzrechtlichen Ansprüchen ein solches Interesse dar.1225 Gleich sollte es sich auch verhalten, wenn eine Person glaubhaft den Bestand von Ansprüchen gestützt auf das ZGB geltend macht. Dies kommt etwa in Betracht, wenn das Datenschutzrecht gar nicht anwendbar ist1226 bzw. ein Vorgehen über den Besitzschutz infrage kommt.1227 Damit stünden der betroffenen Person die für die Wahrnehmung ihrer Rechte notwendigen Angaben zur Verfügung. Die bestehende Schutzpflicht im Rahmen der informationellen Selbstbestimmung wäre dadurch wahrgenommen.1228 Das Onlineformular soll eine möglichst effiziente und einfache Art der Betreiberabfrage ermöglichen. Gleichzeitig ist das BAZL damit in der Lage, eine Übersicht über die eingegangenen Anfragen zu erhalten sowie ggf. bei rechtsmissbräuchlichen Anfragen (z.B. Massen- oder querulatorischen Anfragen) einzuschreiten.1229 1220 Zur Glaubhaftmachung statt aller Kiener/Rütsche/Kuhn, Rn. 729 m.w.H. 1221 Zur Verhältnismässigkeit als Datenbearbeitungsgrundsatz vgl. vorne, S. 83 f. 1222 Vgl. vorne, S. 102. 1223 Vgl. BJ, Leitfaden, Rn. 833. 1224 Es besteht gleichzeitig aber keine Pflicht dazu; vgl. zur Verhinderung von Rechtsmiss- brauch sogleich. 1225 Vgl. vorne, S. 134 f. sowie Botschaft Via sicura, S. 8509. 1226 Vgl. dazu vorne, S. 75 ff., v.a. S. 76 mit den Hinweisen in Fn. 568. 1227 Vgl. vorne, S. 157 mit den Hinweisen in Fn. 1136. Vgl. sodann BSK ZGB II-Ernst, Art. 926 N 5a und Art. 928 N 3a. 1228 Vgl. vorne, S. 69 ff. und v.a. S. 72 sowie S. 50. 1229 Vgl. dazu nur Art. 2 Abs. 2 ZGB und zu dessen Geltung in der gesamten Schweizer Rechtsordnung BGE 143 III 666 E. 4.2; 128 III 201 E. 1c; 122 II 193 E. 2c/ee. § 3 Vorschläge für eine Gesetzesbestimmung 171 Ein Miteinbezug des EDÖB bei der Datenbekanntgabe erscheint nicht sinnvoll. Dieser ist zwar für die Überwachung der Einhaltung von datenschutzrechtlichen Vorschriften zuständig, ist aber am Registrierungsverfahren nicht beteiligt und hat deshalb auch keinen (direkten) Zugang zum Register. Hinzu kommt, dass er de lege lata nur ausnahmsweise dazu berufen ist, bei Auseinandersetzungen zwischen Privaten einzugreifen.1230 Gemäss Art. 43 Abs. 1 E-DSG kann der EDÖB zwar grundsätzlich gegen jede «private Person» vorgehen;1231 aufgrund fehlender (personeller) Mittel wird dies aber realistischerweise weiterhin nur bei gravierenden und/oder systematischen Datenschutzverletzungen in Betracht kommen.1232 5. Zugriff im Abrufverfahren (Abs. 6) 5.1 Formulierungsvorschlag 6  Folgende Behörden können im Abrufverfahren Einsicht in Daten des Registers nehmen: a. die Polizei in Daten, welche die Identifizierung des Betreibers ermöglichen; b. die Strafverfolgungs- und Gerichtsbehörden im Rahmen von Verfahren zur Beurteilung von Widerhandlungen gegen Bestimmungen des Schweizer Rechts sowie Vorschriften der Verordnung (EU) Nr. 2018/1139 und der darauf gestützt erlassenen Rechtsakte; c. die Untersuchungsstelle im Rahmen von Untersuchungen von Zwischen­ fällen im Luftverkehr; d. ausländische Behörden und internationale Organisationen im Rahmen der Erfüllung ihrer Aufgaben gemäss der Verordnung (EU) Nr. 2018/1139 und den darauf gestützt erlassenen Rechtsakten; e. (…).1233 5.2 Bemerkungen Ein Einsichtsrecht im Abrufverfahren1234 von Polizei sowie Strafverfolgungsund Gerichtsbehörden sollte unbedingt vorgesehen werden. Im Unterschied zur Datenbekanntgabe an Private sind diese Behörden dadurch nicht auf 1230 Botschaft DSG 1988, S. 479; Waldmann/Oeschger, in: Belser/Epiney/Waldmann, § 15 Rn. 15; vgl. BGE 136 II 508 E. 6.3.2; Art. 29 DSG. 1231 Botschaft Totalrevision DSG, S. 7090; Rosenthal, Entwurf, Rn. 124. 1232 Vgl. Rosenthal, Entwurf, Rn. 125; Jöhri, Rn. 8.97 ff.; vgl. auch Art. 43 Abs. 2 E-DSG. 1233 Wie bereits zu Zweck und Datenbekanntgabe festgehalten, wäre auch hier eine Erweiterung der Liste möglich. Es kann jedoch im Rahmen der vorliegenden Untersuchung keine abschliessende Aufzählung präsentiert werden. 1234 Zum Begriff vorne, S. 133. 172 Teil 5: Die Durchsetzung von daten­schutzrechtlichen Ansprüchen eine Mitwirkung des BAZL angewiesen, um den Inhalt des Registers zu konsultieren. Durch ihr Einsichtsrecht werden sie in die Lage versetzt, gegenüber fehlbaren Drohnenbetreibern das (Straf-)Recht durchzusetzen.1235 Die SUST wird im LFG als «Untersuchungsstelle» bezeichnet, weshalb dieser Begriff ebenso im Formulierungsvorschlag verwendet wird.1236 Die Datenbekanntgabe an ausländische Behörden sowie internationale Organisationen ist in Art. 107a Abs. 5 E-LFG bereits geregelt.1237 Die Bestimmung ist jedoch allgemein formuliert und deckt die Einspeisung von Daten in den Informationsspeicher gemäss Art. 74 Abs. 1 EASA-Grundverordnung durch das BAZL nicht hinreichend ab.1238 Da die Daten im Informationsspeicher jederzeit und ohne Mitwirkung und Kontrolle des BAZL abgerufen werden können, gehen damit erhöhte Risiken für die Persönlichkeitsrechte der Drohnenbetreiber einher.1239 Aus diesem Grund ist auch Datenbekanntgabe an Luftfahrtbehörden ausländischer Staaten sowie die europaweit wirkenden Luftfahrtorganisationen (primär EASA) zu normieren.1240 Durch die explizite Regelung dieser Form des Datenaustauschs wird sichergestellt, dass eine genügend spezifische Grundlage für den regelmässigen bzw. jederzeitigen Zugriff auf Personendaten durch ausländische Behörden sowie die EASA besteht.1241 III. Unkommentierter Formulierungsvorschlag Der Übersichtlichkeit halber wird der Formulierungsvorschlag nachstehend in seiner gesamten Länge und ohne Kommentierungen und Fussnoten wiedergegeben. 1 Das BAZL führt das schweizerische Register der Betreiber von unbemannten Luftfahrzeugsystemen im Sinne von Art. 2 Ziff. 2 Verordnung (EU) Nr. 2019/947. 1235 Vgl. zur Notwendigkeit gesetzgeberischer Massnahmen in diesem Kontext vorne, S. 160 f. 1236 Vgl. zu den Aufgaben der SUST vorne, S. 167 mit den Hinweisen in Fn. 1207. 1237 Vgl. zur geplanten Revision dieser Bestimmung im Rahmen der Totalrevision des DSG die Hinweise vorne, Fn. 852. 1238 Vgl. zum Informationsspeicher vorne, S. 132; zur notwendigen gesetzlichen Grund- lage für eine Datenbearbeitung durch das BAZL vorne, S. 164. 1239 Vgl. Waldmann/Bickel, in: Belser/Epiney/Waldmann, § 12 N 95; BSK DSG-Jöhri/ Studer, Art. 19 N 65; Wermelinger, S. 187. Vgl. sodann Art. 30 Abs. 2 lit. c und Art. 32 E-DSG; Botschaft Totalrevision DSG, S. 7083. 1240 Vgl. Botschaft Teilrevision 1 LFG, S. 4968 f. 1241 Vgl. BJ, Leitfaden, Rn. 838; Handkomm. DSG-Jöhri, Art. 19 N 74. § 3 Vorschläge für eine Gesetzesbestimmung 2 Das Register dient der Erfüllung folgender Aufgaben: 173 a. Identifizierung von Betreibern von unbemannten Luftfahrzeugsystemen; b. Durchführung von Administrativ- und Strafverfahren gegen Betreiber und Fernpiloten von unbemannten Luftfahrzeugsystemen; c. Unterstützung von in- und ausländischen Behörden sowie internationalen Organisationen bei der Erfüllung ihrer Aufgaben gemäss der Verordnung (EU) Nr. 2018/1139 und den darauf gestützt erlassenen Rechtsakten; d. (…). 3 Das Register enthält folgende Daten: a. bei natürlichen Personen: vollständiger Name und Geburtsdatum; b. bei juristischen Personen: Name oder Firma und UnternehmensIdenti­fikationsnummer (UID); c. Adresse des Betreibers; d. E-Mail-Adresse und Telefonnummer des Betreibers; e. Nummer der Versicherungspolice jedes unbemannten Luftfahrzeug­ systems des jeweiligen Betreibers, sofern dafür eine Versicherung erforderlich ist. 4 Das Register ist nicht öffentlich. Das BAZL darf folgende Daten gemäss Abs. 3 Personen bekannt geben: a. die im Hinblick auf die Geltendmachung von Ansprüchen gemäss dem Bundesgesetz über den Datenschutz und/oder dem Schweizerischen Zivilgesetzbuch ein hinreichendes Interesse geltend machen: Name und Adresse des Betreibers; b. (…). 5  Das BAZL stellt für Gesuche nach Abs. 4 ein Onlineformular zur Verfügung. 6  Folgende Behörden können im Abrufverfahren Einsicht in Daten des Registers nehmen: a. die Polizei in Daten, welche die Identifizierung des Betreibers ermög­ lichen; b. die Strafverfolgungs- und Gerichtsbehörden im Rahmen von Verfahren zur Beurteilung von Widerhandlungen gegen Bestimmungen des Schweizer Rechts sowie Vorschriften der Verordnung (EU) Nr. 2018/1139 und der darauf gestützt erlassenen Rechtsakte; c. die Untersuchungsstelle im Rahmen von Untersuchungen von Zwischen­ fällen im Luftverkehr; d. ausländische Behörden und internationale Organisationen im Rahmen der Erfüllung ihrer Aufgaben gemäss der Verordnung (EU) Nr. 2018/1139 und den darauf gestützt erlassenen Rechtsakten; e. (…). 175 Zusammenfassung und Schlussbemerkungen § 1 Zusammenfassung Die immer häufiger werdende Verwendung von Drohnen durch Private bedeutet eine Gefährdung der informationellen Selbstbestimmung. Nachweislich fühlen sich grosse Teile der Bevölkerung durch anonym operierende Drohnen verunsichert, da sie nicht identifizieren können, wer für die Drohne verantwortlich ist und was Letztere überhaupt tut. Gerade im Bereich des Datenschutzes stellt dies die Rechtsdurchsetzung vor grosse Herausforderungen. Die vorliegende Arbeit verfolgte deshalb das Ziel, eine Möglichkeit aufzuzeigen, wie die Identifizierung der für eine drohnengestützte Datenbearbeitung verantwortlichen Person gewährleistet werden kann. Vor diesem Hintergrund hat sie die (zukünftigen) Regeln des Datenschutzrechts sowie des Luftfahrtrechts analysiert und an den Vorgaben der grundrechtlichen Schutzpflichten im Kontext der informationellen Selbstbestimmung gemessen. Durch die drohnengestützte Datenbearbeitung können verschiedene Grundrechte tangiert werden, wobei die informationelle Selbstbestimmung klar im Vordergrund steht. In Lehre und Rechtsprechung besteht Einigkeit darüber, dass in Art. 13 Abs. 2 BV eine Schutzdimension verankert ist. Sie findet im Schweizer Recht primär in der Datenschutzgesetzgebung sowie dem Persönlichkeitsschutz gemäss ZGB ihren Ausdruck. Ein — wenn nicht der zentrale — Aspekt der grundrechtlichen Schutzpflichten im Kontext der informationellen Selbstbestimmung ist in deren Durchsetzung zu erblicken. Im Bereich des Datenschutzes verfolgt die noch laufende Revision des DSG insbesondere das Ziel, mittels Verbesserung der Transparenz der Datenbearbeitung sowie der Kontrollmöglichkeiten der betroffenen Personen, die staatlichen Schutzpflichten im Kontext der informationellen Selbstbestimmung effektiver wahrzunehmen. Die in dieser Untersuchung vorgenom­ mene Analyse zeigte auf, dass der E-DSG zwar auf die drohnengestützte Da­ ten­bearbeitung durch Private anwendbar ist, die darin verankerten Rechte jedoch oftmals nicht durchgesetzt werden können. Die Anonymität der Droh­ nen­betreiber verunmöglicht die angestrebte Transparenz und erlaubt regelmässig keine effektive Kontrolle durch die betroffene Person. 176 Zusammenfassung und Schlussbemerkungen Die neuen luftfahrtrechtlichen Vorschriften zu Drohnen werden in vielerlei Hinsicht zu einer Verbesserung führen. Die Bestimmungen zur Registrierung von Drohnenbetreibern und zur Kennzeichnung von Drohnen sowie die Vorgaben zur Fernidentifizierung stellen die Grundlagen dar, um einen Drohnenbetreiber erfolgreich identifizieren zu können. Die präventiven und flankierenden Massnahmen, welche in den Drohnenverordnungen vorgesehen sind, ermöglichen, in gewissen Bereichen unterstützend auf die Einhaltung des Datenschutzes hinzuwirken. Insgesamt erweisen sich die Regeln aber bezüglich der Durchsetzung des Datenschutzrechts nicht als ausreichend. Unter Bezugnahme auf die grundrechtlichen Ausführungen wird deshalb festgestellt, dass im Bereich der informationellen Selbstbestimmung bei der drohnengestützten Datenbearbeitung durch Private eine staatliche Schutzpflicht besteht. Diese bezieht sich auf die Durchsetzung datenschutzrechtlicher Ansprüche und folglich auf die Identifizierung der verantwortlichen Drohnenbetreiber. Der Bund, namentlich der Bundesgesetzgeber, ist gehalten, diese wahrzunehmen. Dazu drängt sich eine Revision des LFG auf, und zwar in dem Sinne, dass eine neue Bestimmung zum Drohnenbetreiberregister geschaffen wird. Die Regelung zur Datenbekanntgabe an Private würde als zentraler Aspekt des Registers das Eingangstor zur Durchsetzung datenschutzrechtlicher Ansprüche und primär des Auskunftsrechts jedes Betroffenen darstellen. Gleichzeitig würden so die Kontrollrechte jedes Einzelnen gestärkt und die angestrebte Transparenz bei drohnengestützten Datenbearbeitungen verbessert. Die gleiche Funktion käme der Bestimmung für die im ZGB verankerten Rechte zu. Insgesamt würde so die staatliche Schutzpflicht im Kontext der drohnengestützten Datenbearbeitung durch Private wahrgenommen. Damit die vorgeschlagene Norm ihren Zweck erfüllen und eine wirksame Durchsetzung von datenschutzrechtlichen Ansprüchen ermöglichen kann, ist bei der Prüfung von entsprechenden Gesuchen kein strenger Massstab anzulegen. Wird bei der Ausgestaltung des Drohnenbetreiberregisters im Rahmen der Umsetzung der Drohnenverordnungen im Schweizer Recht auch der Datenschutz und dessen Durchsetzung explizit mitbedacht, so würde dies gleichzeitig die Schaffung eines möglichst umfassenden rechtlichen Rahmens für die technologische Realität von heute bedeuten. § 2 Schlussbemerkungen 177 § 2 Schlussbemerkungen Die laufenden Revisions- und Umsetzungsprozesse in den für diese Dissertation zentralen Rechtsgebieten waren äusserst spannend und zugleich sehr herausfordernd. Wie bei den Bemerkungen zu den zentralen Rechtsgrundlagen ausgeführt, sollen einzelne Aspekte der Drohnenverordnungen, wie etwa die Vorschriften zur Registrierungs- und Kennzeichnungspflicht, bereits ab Januar 2021 praktisch umgesetzt werden.1242 Schon bald sind deshalb Neuerungen zu erwarten, die sich inhaltlich auf die hier präsentierten Resultate auswirken könnten. Dafür spricht auch, dass das BAZL bei gewissen Aspekten der Drohnenregulierung europa- und sogar weltweit bisher eine führende Rolle eingenommen hat. So war etwa der Test der Fernidentifizierung von Drohnen, welcher im September 2019 in Bern durchgeführt wurde,1243 der erste und einzige in ganz Europa. Gemäss Auskünften des BAZL anlässlich von Gesprächen im Oktober 2019 ist der Zeitplan für die Einführung und Umsetzung der Vorgaben der Drohnenverordnungen von Arbeitshilfen der EU bzw. der EASA abhängig. Aufgrund der in verschiedenen Bereichen angestrebten Harmonisierung und Standardisierung ist dies nicht erstaunlich. Es ist jedoch zu hoffen, dass das BAZL und der Bund insgesamt mutig voranschreiten und mit Weitsicht ausgewogene Regeln für die immer stärker aufkommende Drohnentechnologie schaffen werden. 1242 Vgl. vorne, S. 13 ff. 1243 Vorne, S. 140 f. Über den Autor: David Henseler studierte Rechtswissenschaften an der Universität Freiburg i.Üe. und am Center for Transnational Legal Studies (CTLS) in London. Nach Praktika in einer Zürcher Wirtschaftskanzlei und am Kantonsgericht Luzern erhielt er im November 2016 das Anwaltspatent des Kantons Luzern. An der Universität Zürich arbeitete er sodann am Lehrstuhl für Staats-, Verwaltungs- und Verfahrensrecht von Prof. Regina Kiener. Seine Dissertation wurde am 1. April 2020 von der Rechtswissenschaftlichen Fakultät der Universität Zürich abgenommen. Heute ist David Henseler als Gerichtsschreiber am Verwaltungsgericht des Kantons Zürich tätig. sui generis ist ein Verein, der sich der Förderung des freien Zugangs zu juristischer Literatur, Gerichtsurteilen, Behördenentscheidungen und Gesetzesmaterialien verschrieben hat. Unter dem Label sui generis erscheint seit 2014 eine juristische Open-Access-Fachzeitschrift. 2019 erfolgte die Gründung des sui generis Verlags. sui generis Buchreihe herausgegeben von Daniel Hürlimann und Marc Thommen In dieser Reihe werden juristische Dissertationen und Habilitationen sowie Lehrbücher und Fachpublikationen einem breiten Publikum zugänglich gemacht. Die Bücher dieser Reihe erscheinen als gedruckte Werke und online. Die digitale Version ist weltweit kostenlos zugänglich (Open Access). Die Urheberrechte verbleiben bei den AutorInnen; die Werke werden unter einer Creative-Commons-Lizenz veröffentlicht. Bisher in der sui generis Reihe erschienen: 001 — Monika Simmler: Normstabilisierung und Schuldvorwurf 002 — Marc Thommen: Introduction to Swiss Law 003 — Silvio Hänsenberger: Die zivilrechtliche Haftung für autonome Drohnen unter Einbezug von Zulassungs- und Betriebsvorschriften 004 — Mais A.M. Qandeel: Enforcing Human Rights of Palestinians in the Occupied Territory 005 — Moritz Oehen: Der Strafkläger im Strafbefehls- und im abgekürzten Verfahren 006 — Jens Lehne: Crisis at the WTO: Is the Blocking of Appointments to the WTO Appellate Body by the United States Legally Justified? 007 — Lorenz Garland: Waffengleichheit im Vorverfahren 008 — Christoph Urwyler: Die Praxis der bedingten Entlassung aus dem Strafvollzug 009 — Dominik Elser: Die privatisierte Erfüllung staatlicher Aufgaben 010 — David Henseler: Datenschutz bei drohnengestützter Datenbearbeitung durch Private 011— Lorenz Raess: Court Assistance in the Taking of Evidence in International Arbitration Dieses Werk ist erschienen in der Reihe sui generis, herausgegeben von Daniel Hürlimann und Marc Thommen. 1. Auflage 20. Juli 2020 © 2020 David Henseler Dieses Werk wurde unter einer Creative Commons Lizenz als Open Access veröffentlicht, die bei Weiterverwendung nur die Nennung des Urhebers erfordert (CC BY 4.0 — https://creativecommons.org/licenses/by/4.0). Die vorliegende Dissertation wurde durch den Forschungskredit der Universität Zürich, Verfügung Nr. FK-18-011, unterstützt. Die Druckvorstufe dieser Publikation wurde vom Schweizerischen Nationalfonds zur Förderung der wissenschaftlichen Forschung unterstützt. ISBN: 978–3–907297–10–0 DOI: 10.38107/010 Korrektorat: Christoph Meyer Gestaltung: Müller+Hess, Basel Druck: Ebner & Spiegel, Ulm www.suigeneris-verlag.ch 010 DATENSCHU DROHNENGE DATENBEAR DURCH PRIV Der Einsatz von Drohnen nimmt stetig zu, auch unter Privaten. Wer eine Drohne hört oder sieht, weiss in der Regel nicht, ob er gerade beobachtet oder gefilmt wird und ob das Aufgenommene live übertragen oder aufgezeichnet wird. Ebenso bleibt regelmässig unklar, wer für die Drohne verantwortlich ist. Vor diesem Hintergrund nimmt sich dieses Buch der folgenden Frage an: Wie kann das Recht auf informationelle Selbstbestimmung — konkretisiert im Datenschutzrecht — bei der drohnengestützten Datenbearbeitung durch Private durchgesetzt werden? Der Autor analysiert dazu sowohl das zukünftige Datenschutzgesetz als auch die neuen Vorschriften zur Drohnenfliegerei und präsentiert gestützt darauf konkrete Vorschläge für eine Gesetzesanpassung. sui generis ISBN 978–3–907297–10–0 DOI 10.38107/010
https://openalex.org/W4387056232
https://www.qeios.com/read/49HAI8/pdf
English
null
Review of: "Modified Hawking radiation of Schwarzschild-like black hole in bumblebee gravity model"
null
2,023
cc-by
542
Qeios, CC-BY 4.0 · Review, September 26, 2023 Review of: "Modified Hawking radiation of Schwarzschild-like black hole in bumblebee gravity model" Nan Li1 1 Northeastern University Nan Li1 Potential competing interests: No potential competing interests to declare. This paper studies the modified Hawking radiation in the bumblebee gravity model, and also considers the generalized uncertainty principle and the quantum-corrected entropy of the Schwarzschild black hole at the same time. This paper is clearly written, and the structure is well organized. However, there are several problems, as listed below. The authors should first carefully deal with these issues before this paper can be considered for publication. 1. After providing some necessary background knowledge of the three special coordinate systems, the final results are always directly given, without any detailed derivation! The authors should present what they do in this paper and what is new compared to previous literature. For example, How did the authors obtain the results in Eqs. (9), (10), and (11)? I cannot find the derivation or any reference. How did the authors obtain the results in Eqs. (19) and (20)? Actually, these are the essential results to obtain the tunneling probability in Eq. (21), but I cannot find their calculations at all. In contrast, Eq. (18) is trivial, unnecessary to be shown. How did the authors obtain the results in Eqs. (29), (31), and (32)? Again, the derivation of these important results is absent. How did the authors obtain the results in Eqs. (29), (31), and (32)? Again, the derivation of these important results is absent. The detailed derivation of Eq. (52) must be provided, because it is the most important result in this subsection. The detailed derivation of Eq. (52) must be provided, because it is the most important result in this subsection. 2. What is $\tilde{r}_h$ in Eqs. (19), (20), and (21)? Is it the same as $r_h$? 3. In Eq. (25), should the coordinate $r$ be $r^\ast$? Also, should all $r$ in this subsection be $r^\ast$? Otherwise, why did the authors introduce this new coordinate $r^\ast$? 3. In Eq. (25), should the coordinate $r$ be $r^\ast$? Also, should all $r$ in this subsection be $r^\ast$? Otherwise, why did the authors introduce this new coordinate $r^\ast$? 4. In the line above Eq. (26), there are two partial derivative $\partial_v$. Should they be $\partial_\nu$? 5. What is ${\bf e}$ in Eq. (39), (42), (43), and (44)? Is it just ${\rm e}$? 6. In addition, there are several typos in this paper. In Eq. Qeios ID: 49HAI8 · https://doi.org/10.32388/49HAI8 Review of: "Modified Hawking radiation of Schwarzschild-like black hole in bumblebee gravity model" (1), there is Newton constant $G_N$, but $G_N$ is set to be 1 throughout this paper. Qeios ID: 49HAI8 · https://doi.org/10.32388/49HAI8 1/2 Qeios, CC-BY 4.0 · Review, September 26, 2023 ere should be "-2 Im" in both the exponential functions in the denominator and numerator in Eq. (32) In Eqs. (32) and (60), "exp" should be "\exp", and "Im" should be "{\rm Im}". In Eqs. (32) and (60), "exp" should be "\exp", and "Im" should be "{\rm Im}". In Eq. (37), $rh$ should be $r_h$. Throughout this paper, the derivative operator "d" should be expressed in one form, $d$ or ${\rm d}$ Qeios ID: 49HAI8 · https://doi.org/10.32388/49HAI8 2/2
https://openalex.org/W3195334570
https://www.aging-us.com/article/203426/pdf
English
null
Bu-Shen-Zhu-Yun decoction induces PRLR deubiquitination and JAK2/STAT5 activation via CSN5 in vitro
Aging
2,021
cc-by
8,751
ABSTRACT Purpose: To determine the effect of Bu-Shen-Zhu-Yun Decoction (BSZY-D) on the kisspeptin through JAK2/STAT5 signaling pathway in hyperprolactinemia (HPRL) infertility. Method: SD rats were treated with BSZY-D for cerebrospinal fluid (CSF) extraction. GT1-7 cells were subjected to different treatments. The phosphorylation levels of JAK2 and STAT5, and the expressions of PRLR and kisspeptin of GT1-7 cells in different groups were detected by western blot, RT-qPCR and immunofluorescence. The expressions of CSN5 and GATA1 and other molecular features were checked by western blot, RT-PCR, co- immunoprecipitation and renilla luciferase activity. Results: The phosphorylation levels of JAK2 and STAT5, and the expressions of PRLR and kisspeptin in the HPRL group were significantly decreased, and these changes could be reversed after BSZY-D treatment. In addition, the presence of PRLR deubiquitination was detected in the HPRL group, which could be reversed by shRNA- CSN5, suggesting that BSZY-D played a role through targeting CSN5. The binding level of GATA1 and CSN5 promoter in the HPRL group was significantly decreased, but elevated in the HPRL (BSZY-D/CSF) group (P < 0.05). Conclusion: BSZY-D improved the transcription activity of GATA1 and increased the binding of GATA1 and CSN5. BSZY-D was involved in the deubiquitination of PRLR, which contributes to alleviating the symptoms of HPRL infertility. Hua Feng1,2, Huifang Zhou3,&, Jianxia Lu1, Qing Zhang4, Xingran Tang5, Yujie Shang5 Hua Feng1,2, Huifang Zhou3,&, Jianxia Lu1, Qing Zhang4, Xingran Tang5, Yujie Shang5 1Institute of Rehabilitation, Jiangsu Vocational College of Medicine, Yancheng 224008, Jiangsu Province, China 2Department of Gynecology, Nanjing University of Chinese Medicine, Nanjing 224005, Jiangsu Province, China 3Department of Gynecology, Affiliated Hospital of Nanjing University of Chinese Medicine, Nanjing 210029, Jiangsu Province, China 4School of Clinical Medicine Jiangsu Vocational College of Medicine, Yancheng 224008, Jiangsu Province, China 5Nanjing University of Chinese Medicine, Nanjing 224005, Jiangsu Province, China Correspondence to: Huifang Zhou; email: zhouhuifang2011301@163.com, https://orcid.org/0000-0001-5208-8727 Keywords: Bu-Shen-Zhu-Yun decoction, hyperprolactinemia infertility Received: December 2, 2020 Accepted: May 11, 2021 Published: August 23, 2021 Copyright: © 2021 Feng et al. This is an open access article distributed under the terms of the Creative Commons Attribution License (CC BY 3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. AGING 2021, Vol. 13, No. 16 AGING 2021, Vol. 13, No. 16 www.aging-us.com www.aging-us.com AGING 2021, Vol. 13, No. 16 Research Paper Bu-Shen-Zhu-Yun decoction induces PRLR deubiquitination and JAK2/STAT5 activation via CSN5 in vitro Hua Feng1,2, Huifang Zhou3,&, Jianxia Lu1, Qing Zhang4, Xingran Tang5, Yujie Shang5 1Institute of Rehabilitation, Jiangsu Vocational College of Medicine, Yancheng 224008, Jiangsu Province, China 2Department of Gynecology, Nanjing University of Chinese Medicine, Nanjing 224005, Jiangsu Province, China 3Department of Gynecology, Affiliated Hospital of Nanjing University of Chinese Medicine, Nanjing 210029, Jiangsu Province, China 4School of Clinical Medicine Jiangsu Vocational College of Medicine, Yancheng 224008, Jiangsu Province, China 5Nanjing University of Chinese Medicine, Nanjing 224005, Jiangsu Province, China Correspondence to: Huifang Zhou; email: zhouhuifang2011301@163.com, https://orcid.org/0000-0001-5208-8727 Keywords: Bu-Shen-Zhu-Yun decoction, hyperprolactinemia infertility Received: December 2, 2020 Accepted: May 11, 2021 Published: August 23, 2021 Copyright: © 2021 Feng et al. This is an open access article distributed under the terms of the Creative Commons Attribution License (CC BY 3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. www.aging-us.com AGING 2021, Vol. 13, No. 16 Research Paper Bu-Shen-Zhu-Yun decoction induces PRLR deubiquitination and JAK2/STAT5 activation via CSN5 in vitro Hua Feng1,2, Huifang Zhou3,&, Jianxia Lu1, Qing Zhang4, Xingran Tang5, Yujie Shang5 1Institute of Rehabilitation, Jiangsu Vocational College of Medicine, Yancheng 224008, Jiangsu Province, China 2Department of Gynecology, Nanjing University of Chinese Medicine, Nanjing 224005, Jiangsu Province, China 3Department of Gynecology, Affiliated Hospital of Nanjing University of Chinese Medicine, Nanjing 210029, Jiangsu Province, China 4School of Clinical Medicine Jiangsu Vocational College of Medicine, Yancheng 224008, Jiangsu Province, China 5Nanjing University of Chinese Medicine, Nanjing 224005, Jiangsu Province, China Correspondence to: Huifang Zhou; email: zhouhuifang2011301@163.com, https://orcid.org/0000-0001-5208-8727 Keywords: Bu-Shen-Zhu-Yun decoction, hyperprolactinemia infertility Received: December 2, 2020 Accepted: May 11, 2021 Published: August 23, 2021 Copyright: © 2021 Feng et al. This is an open access article distributed under the terms of the Creative Commons Attribution License (CC BY 3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. INTRODUCTION value more than 1.4 nmol/L should be diagnosed as HPRL [2]. The pathogenesis of HPRL includes the physiological, pathological, and pharmacological factors [3], among which the physiological factors include diet, sleep, gestation, nipple stimulation and breastfeeding; common pathological factors mainly include hypothalamic tumors, pituitary or ectopic prolactinoma, and acromegaly; as for pharmacological factors, some anesthetic (cocaine) and Chinese herbal medication (Angong Niuhuang Pill) can induce the Hyperprolactinemia (HPRL) is caused by a variety of factors and characterized by the significant elevation of serum prolactin (PRL). It is a syndrome of reproductive-endocrine disorder in the hypothalamic- pituitary axis, with relatively high morbidity [1]. At present, although there is no consistent detection method or reference range among different hospitals, it is widely accepted that the subject with serum PRL AGING 20418 www.aging-us.com JAK2/STAT5 pathway in a short time. On the other hand, it can lead to the ubiquitination, endocytosis, and degradation of PRLR, causing inhibition of PRL- mediated JAK2/STAT5 pathway in a long period. Excessive PRL cannot bind to its receptor, thus the expressions of JAK2/STAT5 pathway and its downstream kisspeptin are suppressed. CSN5, a type of deubiquitinating enzymes, can inhibit the degradation of PRLR through deubiquitination. We analyzed the transcription factors of CSN5 in the GENERADAR website (https://www.gcbi.com.cn/gcanalyze/html/gene radar/index), and found that GATA1 is one of the transcription factors of CSN5. Hence, the improvement of the deubiquitination level of PRLR in patients with HPRL is the key for the treatment of infertility, miscarriage, irregular menstruation and so on. Therefore, the illustration of BSZY-D underlying mechanism in HPRL is the crucial part. However, no research has reported the relationship between PRLR deubiquitination and BSZY-D. HPRL. The main clinical symptoms include galactorrhea, menstrual disorders, hirsutism, and even infertility [4]. Nowadays, the medication such as bromocriptine is mostly applied in clinical practice. Although the application of bromocriptine has a certain curative effect, the side effects such as dizziness, nausea, vomiting, and resistance to dopamine receptor agonists cannot be ignored. Therefore, it is necessary to explore more safe and effective therapeutic strategies for patients with HPRL infertility. The prescription of Bu-Shen-Zhu-Yun decoction (BSZY-D) created by Professor Guicheng Xia, is composed of yam, vinegar bupleurum, antlers tablets, red white peony root, cornus, dodder, salvia, angelica, amethyst, poria, fried cortex moutan, etc. This decoction has been proved to regulate menstruation and assist pregnancy [5]. INTRODUCTION BSZY-D has been widely applied in gynecological diseases, such as luteal phase defect, anovulatory infertility, and polycystic ovarian syndrome [5–7]. However, the efficacy of BSZY-D in HPRL infertility remains elusive. In the current study, we hypothesized that BSZY-D could improve the HPRL infertility through PRLR deubiquitination, targeting JAK2/STAT5 pathway and its downstream kisspeptin of hypothalamus. Our purpose is to explore the underlying molecular mechanism of HPRL infertility, thereby providing the new theoretical basis for the potential treatment application in clinic. Kisspeptin, a polypeptide hormone encoded by KISS-1 gene, can regulate the female reproductive endocrine functions. Kisspeptin modulates the secretion of gonadotropin-releasing hormone (GnRH) through the feedback effects of estradiol, and subsequently is involved in the regulation of reproductive and growth hormones in the reproductive system [8]. Hence, kisspeptin contributes to maintaining the stability of the hypothalamus-pituitary-ovarian (HPO) axis. A previous study has reported that BSZY-D can regulate the secretion of serum progesterone, follicle-stimulating hormone, luteinizing hormone, and estradiol through kisspeptin/GPR54 pathway, thereby improving luteal function and promoting embryo implantation [9]. The regulation of BSZY-D on PRLR/JAK2/STAT5 pathway via CSF in GT1-7 The level of PRLR in different GT1-7 cell groups were detected by western blot assay. As shown in Figure 3, compared with the Control group, the cytomembrane PRLR level in the HPRL group was significantly inhibited, but the total protein level of PRLR remained stable. Compared with the HPRL group, the protein level of PRLR in the HPRL (BSZY-D/CSF) group was significantly upregulated, which suggested that BSZY-D reversed the downregulation of PRLR protein level via HPRL (P < 0.05). Besides, we found that the PRLR ubiquitination level was increased in the HPRL group, however, there was deubiquitination of PRLR in the HPRL (BSZY-D/CSF) group (P < 0.05). It was indicated that HPRL caused the PRLR ubiquitination, but BSZY-D induced the deubiquitination of PRLR (Supplementary Figure 5). The phosphorylation levels of JAK, STAT5, and the levels of PRLR and kisspeptin in different groups were detected by western blot (Figure 2). Our data indicated that compared with the Control group, the phosphorylation levels of JAK2 and STAT5, and the levels of PRLR and kisspeptin in the HPRL group were decreased significantly (P < 0.05). Compared with the HPRL group, the phosphorylation levels of AK2 and STAT5, and the levels of PRLR and kisspeptin in the HPRL (BSZY-D/CSF) group were significantly elevated (P < 0.05), indicating that BSZY-D reversed the impact of HPRL on the downregulation of the PRLR/JAK/STAT5 pathway. Similarly, the kisspeptin mRNA expression in the HPRL group was significantly decreased, however, the PRLR mRNA expression was not downregulated significantly; compared with the HPRL group, the kisspeptin mRNA expression in the HPRL (BSZY- D/CSF) group was significantly increased, suggesting Compared with the Control group, the PRLR protein level was downregulated in the HPRL group, but there was no difference in total protein level. Moreover, Figure 1. Effect of PRL on PRLR-JAK-STAT5 pathway in GT1-7. The phosphorylation levels of JAK, STAT5 and the levels of PRLR and kisspeptin in GT1-7 from different groups were detected by western blot assay, and representative bands were shown in (A). The phosphorylation levels of JAK (B) and STAT5 (C), and the level of PRLR (D), and the level of kisspeptin (E) were normalized to control. The results were presented as mean ± SD (n = 3). *p < 0.05, **p < 0.01 vs. Control group. Figure 1. Effect of PRL on PRLR-JAK-STAT5 pathway in GT1-7. Effect of PRL on PRLR/JAK2/STAT5 pathway in GT1-7 The viability of GT1-7 cells under different concentrations of PRL treatment was detected, and the results showed that PRL (400 ng/ml) has a significant inhibitory effect on the viability of GT1-7 cells, compared with the control group (P < 0.05). No effects have been found in any concentration of CFS on the viability of GT1-7 cells (Supplementary Figure 2). Hence, we used PRL at the concentration of 0 ng/mL, 12.5 ng/mL, 25 ng/mL, 50 ng/mL, 100 ng/mL, 200 ng/mL, and CFS at a concentration of 10%. Then the phosphorylation levels of JAK, STAT5, and the levels of PRLR and kisspeptin of GT1-7 cells in different groups were detected by western blot (Figure 1). Our data represented that compared with the Control group, the phosphorylation levels of JAK2 and STAT5, and the levels of PRLR and kisspeptin in the PRL (100 ng/ml and 200 ng/ml) group were significantly decreased (P < 0.05). Consistently, the mRNA expression of kisspeptin was significantly declined in the PRL (100 ng/ml and 200 ng/ml) group, but no apparent change was detected in PRLR mRNA expression (Supplementary Figure 3). PRL binds to its receptor PRLR and forms a complex that can further activate the Janus kinase 2 (JAK2). Subsequently, the activated JAK2 leads to its downstream signal transducer and activator of transcription 5 (STAT5) [10]. Phosphorylated STAT5 protein forms homodimers or heterodimerizes with other STAT family members, relating to the nucleus translocation and transactivation of the molecular target. JAK2/STAT5 signaling pathway is involved in the development of HPRL, and PRL/PRLR-JAK2/STAT5 signaling pathway is widely explored in cell pro- liferation, differentiation, and immune regulation. It can also initiate the transcription of certain target genes, and enable the expressions of ovarian and endometrial related receptors. High PRL level elevates the combination of PRL and PRLR. On the one hand, it can activate the downstream AGING 20419 www.aging-us.com Therefore, PRL was concentration-dependent. The higher PRL had a more significant effect, so we took 200 ng/mL PRL for the subsequent experiments. that BSZY-D reversed the downregulation trend of kisspeptin through HPRL (Supplementary Figure 4). Therefore, PRL was concentration-dependent. The higher PRL had a more significant effect, so we took 200 ng/mL PRL for the subsequent experiments. The regulation of BSZY-D on PRLR/JAK2/STAT5 pathway via CSF in GT1-7 AGING 20421 www.aging-us.com compared with the HPRL group, the PRLR protein level was augmented in the HPRL (BSZY-D/CSF) group, suggesting that CSF reversed the downregulation of PRLR protein level through HPRL (P < 0.05) (Figure 4). compared with the HPRL group, the PRLR protein level was augmented in the HPRL (BSZY-D/CSF) group, suggesting that CSF reversed the downregulation of PRLR protein level through HPRL (P < 0.05) (Figure 4). with the Control group, the binding of PRLR and β- Trcp was significantly increased in the HPRL group, and the binding of PRLR and CSN5 was decreased; compared with the HPRL group, the binding of PRLR and CSN5 in the HPRL (BSZY-D/CSF) group was increased (P < 0.05). It was suggested that BSZY-D played a role by promoting the binding of PRLR and CSN5. The PRLR protein level of GT1-7 cells at different time points were detected using western blot. Compared with the Control + CHX group, the PRLR protein level was decreased significantly in the HPRL group. Compared with the HPRL + CHX group, the PRLR level in the HPRL (BSZY-D/CSF) + CHX group was significantly upregulated (P < 0.05). The results demonstrated that the PRLR degradation would be accelerated under the high PRL condition, and this degradation was inhibited after the addition of BSZY-D (Figure 5). The levels of CSN5 and GATA1 in GT1-7 were detected by western blot (Figure 6). Our results represented that the CSN5 and GATA1 protein levels were significantly decreased in the HPRL group compared with the Control group. Compared with the HPRL group, the levels of CSN5 and GATA1 in the HPRL (BSZY-D/CSF) group were significantly elevated (P<0.05). In line with the results of western blot, the RT-PCR data showed that the CSN5 mRNA expression was significantly suppressed in the HPRL group compared with the Control group, and the GATA1 mRNA expression did not change significantly. Besides, compared with the HPRL group, the CSN5 The regulation of BSZY-D on PRLR/JAK2/STAT5 pathway via CSF in GT1-7 The phosphorylation levels of JAK, STAT5 and the levels of PRLR and kisspeptin in GT1-7 from different groups were detected by western blot assay, and representative bands were shown in (A). The phosphorylation levels of JAK (B) and STAT5 (C), and the level of PRLR (D), and the level of kisspeptin (E) were normalized to control. The results were presented as mean ± SD (n = 3). *p < 0.05, **p < 0.01 vs. Control group. AGING 20420 www.aging-us.com Figure 2. Effect of CSF on PRLR-JAK-STAT5 pathway in GT1-7. The phosphorylation levels of JAK, STAT5 and the levels of PRLR and kisspeptin in GT1-7 from different groups were detected by western blot assay, and representative bands were shown in (A). The phosphorylation levels of JAK (B) and STAT5 (C), and the level of PRLR (D), and the level of kisspeptin (E) were normalized to control. The results were presented as mean ± SD (n = 3).**p < 0.01 vs. Control group, #p < 0.05, ##p < 0.01 vs. HPRL group. Figure 2. Effect of CSF on PRLR-JAK-STAT5 pathway in GT1-7. The phosphorylation levels of JAK, STAT5 and the levels of PRLR and kisspeptin in GT1-7 from different groups were detected by western blot assay, and representative bands were shown in (A). The phosphorylation levels of JAK (B) and STAT5 (C), and the level of PRLR (D), and the level of kisspeptin (E) were normalized to control. The results were presented as mean ± SD (n = 3).**p < 0.01 vs. Control group, #p < 0.05, ##p < 0.01 vs. HPRL group. Figure 3. The level of PRLR in GT1-7 from different groups was detected by western blot assay, and representative bands were shown in (A). The levels of PRLR (B, C) were normalized to control. The results were presented as mean ± SD (n = 3). **p < 0.01 vs. Control group, #p < 0.05, ##p < 0.01 vs. HPRL group. Figure 3. The level of PRLR in GT1-7 from different groups was detected by western blot assay, and representative bands were shown in (A). The levels of PRLR (B, C) were normalized to control. The results were presented as mean ± SD (n = 3). **p < 0.01 vs. Control group, #p < 0.05, ##p < 0.01 vs. HPRL group. The changes of CSN5 expression in GT1-7 cells treated with different reagents It was indicated that BSZY-D reversed the downregulation effect of HPRL on CSN5. The changes of CSN5 expression in GT1-7 cells treated with different reagents Co-IP was applied to test the expressions of β-Trcp, PRLR and CSN5 (Supplementary Figure 6). Compared Figure 4. The immunofluorescence staining of PRLR in GT1-7. Figure 5. The level of PRLR in GT1-7 at different times was detected by western blot assay. The levels of PRLR were normalized to control. (A) Representative blot of PRLR level. (B) Quantitative relative gray values of PRLR protein level. The results were presented as mean ± SD (n = 3). **p < 0.01 vs. Control group, ##p < 0.01 vs. HPRL group. Figure 4. The immunofluorescence staining of PRLR in GT1-7. Figure 4. The immunofluorescence staining of PRLR in GT1-7. Figure 5. The level of PRLR in GT1-7 at different times was detected by western blot assay. The levels of PRLR were normalized to control. (A) Representative blot of PRLR level. (B) Quantitative relative gray values of PRLR protein level. The results were presented as mean ± SD (n = 3). **p < 0.01 vs. Control group, ##p < 0.01 vs. HPRL group. Figure 5. The level of PRLR in GT1-7 at different times was detected by western blot assay. The levels of PRLR were normalized to control (A) Representative blot of PRLR level (B) Quantitative relative gray values of PRLR protein level The results were presented as mean Figure 5. The level of PRLR in GT1-7 at different times was detected by western blot assay. The levels of PRLR were normalized to control. (A) Representative blot of PRLR level. (B) Quantitative relative gray values of PRLR protein level. The results were presented as mean ± SD (n = 3). **p < 0.01 vs. Control group, ##p < 0.01 vs. HPRL group. AGING 20422 www.aging-us.com decreased; in turn, compared with the HPRL group, the CSN5 promoter activity in the HPRL (BSZY-D/CSF) group was significantly upregulated. Correspondingly, the binding of GATA1 and CSN5 promoter in the HPRL group was significantly decreased, but the binding of GATA1 and CSN5 promoter in the HPRL (BSZY-D/CSF) group was significantly elevated (P < 0.05) (Supplementary Figure 8). After the transfection of lentivirus plasmids, the CSN5 protein level was significantly inhibited in the shRNA-CSN5 group, suggesting that the shRNA-CSN5 plasmid reduced the expression of CSN5 in GT1-7 cells (P < 0.05) (Supplementary Figure 9). mRNA expression was significantly increased in the HPRL (BSZY-D/CSF) group (P<0.05) (Supplementary Figure 7). Effect of lentivirus plasmids shRNA-CSN5 on PRLR/JAK/STAT5 pathway in GT1-7 Luciferase activity was detected by measuring the renilla luciferase activity of GT1-7 cells transiently transfected with the CSN5 luciferase promoter (Figure 7). Compared with the Control group, the CSN5 promoter activity in the HPRL group was significantly Figure 6. The levels of CSN5 and GATA1 in GT1-7 were detected by western blot assay, and representative bands were shown in (A). The levels of CSN5 (B) and GATA1 (C) were normalized to control. The results were presented as mean ± SD (n = 3).**p < 0.01 vs. Control group, #p < 0.05, ##p < 0.01 vs. HPRL group. Figure 6. The levels of CSN5 and GATA1 in GT1-7 were detected by western blot assay, and representative bands were shown in (A). The levels of CSN5 (B) and GATA1 (C) were normalized to control. The results were presented as mean ± SD (n = 3).**p < 0.01 vs. Control group, #p < 0.05, ##p < 0.01 vs. HPRL group. Figure 7. Luciferase activity measured and normalized according to renilla luciferase activity in GT1-7 cells transiently transfected with the CSN5 luciferase promoter. The results were presented as mean ± SD (n = 3). **p < 0.01 vs. Control group, ##p < 0.01 vs. HPRL group. Figure 7. Luciferase activity measured and normalized according to renilla luciferase activity in GT1-7 cells transiently transfected with the CSN5 luciferase promoter. The results were presented as mean ± SD (n = 3). **p < 0.01 vs. Control group, ##p < 0.01 vs. HPRL group. AGING 20423 www.aging-us.com After the confirmation of transfection efficiency, the impact of shRNA-CSN5 on PRLR/JAK/STAT5 signaling pathway in GT1-7 cells of different treatment groups was detected by western blot. As shown in Figure 8, compared with the Control group, the phosphorylation levels of JAK2 and STAT5, and the protein levels PRLR and kisspeptin in the HPRL (BSZY-D/CSF) + shRNA-NC group were significantly decreased (P < 0.05). After knocking down CSN5 gene, the above-mentioned protein levels could be reversed. This result indicated that BSZY-D enhanced the PRLR/JAK/STAT5 signaling pathway through CSN5. Besides, there existed an increasing ubiquitination level of PRLR in the HPRL group, which could be reversed by knocking down shRNA-SCN5. It was suggested that BSZY-D played a role through targeting CSN5 (Supplementary Figure 10). DISCUSSION Previous researches of traditional Chinese medicine Bu- Shen-Zhu-Yun Decoction (BSZY-D) mainly focus on infertility caused by luteal phase defect. Recently, it is reported that BSZY-D can reduce the prolactin (PRL) Figure 8. Effect of shRNA-CSN5 on PRLR-JAK-STAT5 pathway in GT1-7. The phosphorylation levels of JAK, STAT5 and the levels of PRLR and kisspeptin in GT1-7 from different groups were detected by western blot assay, and representative bands were shown in (A). The phosphorylation levels of JAK (D) and STAT5 (E), and the level of PRLR (B, C), and the level of kisspeptin (F) were normalized to control. The results were presented as mean ± SD (n = 3). *p < 0.05, **p < 0.01 vs. Control group. Figure 8. Effect of shRNA-CSN5 on PRLR-JAK-STAT5 pathway in GT1-7. The phosphorylation levels of JAK, STAT5 and the levels of PRLR and kisspeptin in GT1-7 from different groups were detected by western blot assay, and representative bands were shown in (A). The phosphorylation levels of JAK (D) and STAT5 (E), and the level of PRLR (B, C), and the level of kisspeptin (F) were normalized to control. The results were presented as mean ± SD (n = 3). *p < 0.05, **p < 0.01 vs. Control group. AGING www.aging-us.com 20424 level in patients with luteal phase defect and hyperprolactinemia (HPRL) in clinic practice. Hence, our purpose in this study is to investigate the underlying mechanism of BSZY-D in decreasing PRL. In this study, we identified that HPRL could downregulate the levels of PRLR and kisspeptin, and phosphorylation levels of JAK2 and STAT5. BSZY-D reversed the effect of HPRL on the downregulation of the PRLR/ JAK2/STAT5 pathway. The potential mechanism was that excessive PRL cannot bind to its receptor under high PRL microenvironment, thus the expressions of JAK2/STAT5 pathway and kisspeptin were suppressed. Besides, CSN5 inhibited the degradation of PRLR through deubiquitination, and targeted its transcription factors GATA 1. These changes could be reversed after BSZY-D treatment. We proved that BSZY-D increased the binding level of CSN5 and GATA 1, and induced the deubiquitination of PRLR, thus increasing the expressions of JAK2/STAT5 pathway and its downstream signaling kisspeptin. Based on our study, BSZY-D can be regarded as an effective Chinese medicine to treat HPRL infertility in clinic (Figure 9). using vitro fertilization [11]. Several ingredients of BSZY-D including dioscoreae rhizome, cervi cornu, bupleuri radix and paeoniae radix alba, etc. www.aging-us.com DISCUSSION have been proved to improve the uterine receptivity and pregnancy rate in mice [12, 13]. Xiaofei Jiang et al. have demonstrated that BSZY-D can upregulate the expressions of integrin α5 and β3 by inhibiting the estrogen and progesterone receptor, meanwhile, improve the endometrial receptivity during embryo implantation and consequently enhance the pregnancy rates [14]. In the current study, we found that BSZY-D reserved the molecular and pathway changes caused by HPRL. The elevation of PRLR, kisspeptin, phosphorylated JAK2, and STAT5 levels were significantly reserved by BSZY-D treatment, as well as the decline of the PRLR ubiquitination. Prolactin (PRL) is a type of polypeptide hormone secreted by the anterior pituitary gland. PRL is balanced by PRL releasing factor (PRF) and PRL inhibiting hormone (PIH) [15, 16]. In the normal physio- logical condition, the increased transcription activity of GATA1 induces the transcription of its downstream CSN5 gene, leading to the upregulation of CSN5. CSN5 plays a role in mediating the deubiquitination of PRLR, blocking its endocytosis and degradation, and maintaining the normal function of PRLR. JAK2/STAT5 is the downstream signaling pathway of PRLR, and the activation of JAK2/STAT5 can elevate the expression of kisspeptin. In the presence of pathological HPRL condition, HPRL can reduce the The theory of Chinese medicine believes that the kidney affects reproduction, which is the innate foundation and the root of vitality. Ovulation relies on several factors, such as kidney, liver, spleen, qi, blood, yin and yang [7]. A previous study of meta-analysis has represented that BSZY-D can significantly elevate the pregnancy rate to 50%, comparing to the pregnancy rate of 30% Figure 9. The effects of BSZY-D on activating GATA 1 and CSN5, inducing PRLR deubiquitination and increasing the expressions of JAK2/STAT5 signaling pathway and kisspeptin. Hence, BSZY-D had an efficient role in HPRL infertility improvement. Figure 9. The effects of BSZY-D on activating GATA 1 and CSN5, inducing PRLR deubiquitination and increasing the expressions of JAK2/STAT5 signaling pathway and kisspeptin. Hence, BSZY-D had an efficient role in HPRL infertility improvement. AGING 20425 www.aging-us.com receptivity of the endometrium, and suppress the ovarian function, consequently causing ovulation disorders [17]. Recently, it is reported that the proper concentration of PRL can promote the growth of endometrial cells and blastocyst adhesion. However, the deregulated PRL concentration has an inhibitory effect, which causes follicle maturation disorder, ovulation disorder and decreased endometrial receptivity, thus eventually leading to infertility [18]. DISCUSSION The underlying mechanism can be explained by an abnormal level of PRLR ubiquitination. The overexpressing PRL augments the activity of CSN5, a type of deubiquitinating enzyme, which induces the deubiquitination of PRLR. Hence, the downstream JAK2/STAT5 signaling pathway is inhibited, as well as kisspeptin. In the current study, we identified that BSZY-D could reversely elevate the transcription activity of GATA1, increase the binding of GATA1 and CSN5, and then reserve the downstream expressions at a certain level. could increase the expressions of JAK/STAT5 and kisspeptin via inducing the deubiquitination of PRLR, thereby alleviating the clinic manifestations of HPRL infertility. We hope our novel work could establish a theoretical basis on the molecular mechanism of BSZY- D in HPRL infertility, meriting further investigation of potential treatment application. Cell culture and treatment GT1-7 cell line was purchased from Millipore (Schwalbach, Germany). GT1-7 cells were cultured and maintained in DMEM medium (GIBCO, Grand Island, USA) containing penicillin (final concentration 100U/mL) (Sigma-Aldrich, St. Louis, MO, USA), streptomycin (final concentration 100μg/mL) (Sigma- Aldrich, St. Louis, MO, USA), 2mM L-Glutamine (Millipore, Schwalbach, Germany) and 10% fetal bovine serum (FBS) (Hyclone, Logan, UT, USA). The cells were digested when reaching 90% confluence. Kisspeptin is a type of polypeptide encoded by the KISS-l gene. It is mainly distributed in the hypothalamus, pituitary, ovary, placenta, etc. Recent studies have represented that kisspeptin plays an important role in the initiation of puberty, menstrual cycle regulation, ovulation induction, and reproductive cycle regulation [19]. Some scholars have indicated that kisspeptin may have a certain correlation with pregnancy implantation, and further hypothesized it is also related to abortion [20]. In the current study, our results showed that HPRL could downregulate the expression of kisspeptin, which might impair the physiological role of kisspeptin in maintaining the normal productive function. Interestingly, kisspeptin expression could be reversed after BSZY-D treatment. Besides, in line with the changes of kisspeptin, the expression of PRLR/JAK/STAT5 signaling pathway showed the similar trend. Medicine and extraction preparation BSZY-D was concentrated to 2g/mL and stored at 4° C. In brief, the medicinal materials had been immersed in water for 30 min. Firstly, the deer horn slices were decocted and boiled for 20 min, and then added with the remaining medicinal materials. The decoction at a concentration of 2 g/mL was collected and stored at 4° C. A total of 75 female SD rats of specific pathogen-free (SPF) grade (aged 8 weeks and weighing 220 ± 20 g) were purchased from Animal Model Center of Nanjing University [license No: SCXK (Su) 2018- 0008], and raised in the SPF environment in the Experimental Animal Center of Nanjing Chinese Medicine University. The rats were reared at 40%- 70% humidity and 21-25° C, maintained in a 12 h light/dark cycle. The experimental operations were approved by the Animal Ethics Committee of Nanjing Chinese Medicine University [approval No: SYXK (Su) 2014-0001]. In this study, we proved that BSZY-D partly recovered the expressions of JAK/STAT5 and kisspeptin via inducing the deubiquitination of PRLR and targeting CSN5. The limitation of this study is that we did not clarify the possible molecular mechanism between CSN5 and PRLR deubiquitination, which will be investigated as a key point in our further study. Cerebrospinal fluid was prepared as follows: BSZY-D of 2 g/mL was given to normal female SD rats 1 mL/kg twice a day. After anesthesia, the neck skin of each rat was disinfected with 75% ethanol, and the foramen magnum was exposed. The micro-injector was pierced into the cistern magna and 100 uL cerebrospinal fluid (CSF) was slowly extracted. After centrifugation at 2000 r/min for 15 min, the supernatant was collected and stored at -20° C. The time point of CSF collection was after the estrus. CONCLUSIONS Altogether, we explored the underlying mechanism of BSZY-D in HPRL infertility. We demonstrated that BSZY-D could improve the transcription activity of GATA1 and increase the binding of GATA1 and CSN5. Also, the activated deubiquitinating enzyme CSN5 AGING www.aging-us.com 20426 8) Experiment 8: Normal group (Control group): 10% blank cerebrospinal fluid, cultured for 72 hours. 9) Experiment 9: Cerebrospinal fluid containing traditional Chinese medicine a concentration of 10% + MG132 [HPRL (BSZY-D/CSF) group]: 10% BSZY-D containing cerebrospinal fluid culture + 200ng/mL PRL + 10uM MG132 inhibitor, cultured for 72h. Cerebrospinal fluid containing traditional Chinese medicine at a concentration of 10% intervention [HPRL (BSZY-D/CSF) group]: 10% BSZY-D containing medicated cerebrospinal fluid culture + 200 ng/mL PRL, cultured for 72h. Cerebrospinal fluid containing traditional Chinese medicine at a concentration of 10% intervention [HPRL (BSZY-D/CSF) group]: 10% BSZY-D containing medicated cerebrospinal fluid culture + 200 ng/mL PRL, cultured for 72h. Cerebrospinal fluid containing traditional Chinese medicine at a concentration of 10% intervention [HPRL 5) Experiment 5: Prolactin intervention group (HPRL group): 10% blank cerebrospinal fluid + 200 ng/mL PRL, cultured for 72 h. Normal group + MG132 (Selleck Chemicals, Houston, Texas, USA) (Control + MG132 group): 10% blank cerebrospinal fluid + 10 uM MG132 inhibitor, cultured for 72h. Cerebrospinal fluid containing traditional Chinese medicine a concentration of 10% intervention [HPRL (BSZY-D/CSF) group]: 10% BSZY-D containing medicated cerebrospinal fluid culture + 200 ng/mL PRL, cultured for 72h. PRL intervention group + MG132 (HPRL + MG132 group): 10% blank cerebrospinal fluid + 200 ng/mL PRL + 10 uM MG132 inhibitor, cultured for 72h. PRL intervention group + MG132 (HPRL + MG132 group): 10% blank cerebrospinal fluid + 200 ng/mL PRL + 10 uM MG132 inhibitor, cultured for 72h. 9) Experiment 9: Experimental groups PRL intervention group + cycloheximide CHX (HPRL + CHX group): 10% blank cerebrospinal fluid + 200 ng/mL PRL + 10uM CHX inhibitor. Protocols in different experimental groups were shown as follows: Cerebrospinal fluid containing traditional Chinese medicine at a concentration of 10% + cycloheximide CHX [HPRL (BSZY-D/CSF) + CHX group]: 10% BSZY-D containing medicated cerebrospinal fluid culture + 200 ng/mL PRL + 10 uM CHX inhibitor. Cerebrospinal fluid containing traditional Chinese medicine at a concentration of 10% + cycloheximide CHX [HPRL (BSZY-D/CSF) + CHX group]: 10% BSZY-D containing medicated cerebrospinal fluid culture + 200 ng/mL PRL + 10 uM CHX inhibitor. 1) Experiment 1: 0% CSF (medicated cerebrospinal fluid), 5% CSF (medicated cerebrospinal fluid), 10% CSF (medicated cerebrospinal fluid) and 20% CSF (medicated cerebrospinal fluid). 2) Experiment 2: 0 ng/mL, 12.5 ng/mL, 25 ng/mL, 50 ng/mL, 100 ng /mL, 200 ng/mL and 400 ng/mL PRL. The time points for detection were 0h, 2h, 4h, 12h, 24h, respectively. 3) Experiment 3: 0 ng/mL, 12.5 ng/mL, 25 ng/mL, 50 ng/mL, 100 ng /mL and 200 ng/mL PRL. 7) Experiment 7: Normal group + MG132 (Control + MG132 group): 10% blank cerebrospinal fluid + 10 uM MG132 inhibitor, cultured for 72h. 4) Experiment 4: Normal group (Control group): 10% blank cerebrospinal fluid, cultured for 72 h. PRL intervention group + MG132 (HPRL + MG132 group): 10% blank cerebrospinal fluid + 200 ng/mL PRL + 10 uM MG132 inhibitor, cultured for 72h. PRL intervention group (HPRL group): 10% blank cerebrospinal fluid + 200 ng/mL PRL, cultured for 72 h. Cerebrospinal fluid containing traditional Chinese medicine at a concentration of 10% + MG132 [HPRL (BSZY-D/CSF) +MG132 group]: 10% BSZY-D containing medicated cerebrospinal fluid culture + 200 ng/mL PRL + 10 uM MG132 inhibitor, cultured for 72h. Cerebrospinal fluid containing BSZY-D intervention group (BSZY-D/CSF group): 10% BSZY-D containing medicated cerebrospinal fluid, cultured for 72 h. Cerebrospinal fluid containing BSZY-D intervention group (BSZY-D/CSF group): 10% BSZY-D containing medicated cerebrospinal fluid, cultured for 72 h. Cerebrospinal fluid containing traditional Chinese medicine at a concentration of 10% [HPRL (BSZY- D/CSF) group]: 10% BSZY-D containing cerebrospinal fluid culture + 10% blank cerebrospinal fluid + 200 ng/mL PRL, cultured for 72h. 8) Experiment 8: 6) Experiment 6: Cerebrospinal fluid containing traditional Chinese medicine a concentration of 10% + ShRNA-CSN5 [HPRL (BSZY-D/CSF) + ShRNA-CSN5 group]: after the cells were stably transfected with CSN5-knockdown Normal group + cycloheximide (CHX) (Seleck Chem, Shanghai, China) (Control + CHX group): 10% blank cerebrospinal fluid + 10uM CHX inhibitor. AGING www.aging-us.com 20427 lentivirus, added 10% BSZY-D containing medicated cerebrospinal fluid culture + 200 ng/mL PRL, cultured for 72h. lentivirus, added 10% BSZY-D containing medicated cerebrospinal fluid culture + 200 ng/mL PRL, cultured for 72h. Real-time PCR The total RNA was extracted from GT1-7 cells using TRIzol reagent (Invitrogen, Carlsbad, CA, USA). RNA then underwent reverse transcription using the iScript cDNA kit (Bio-Rad, Hercules, CA, USA), followed by analysis using real-time PCR (RT-PCR) with the SsoFast Eva Green Super Mix (Bio-Rad, Hercules, CA, USA) on Roche Light Cycler 480 system. Cerebrospinal fluid containing traditional Chinese medicine a concentration of 10% + ShRNA- NC [HPRL (BSZY-D/CSF) + ShRNA-NC group]: after the cells were stably transfected with NC lentivirus, added 10% BSZY-D containing medicated cerebrospinal fluid culture + 200 ng/mL PRL, cultured for 72h. Relative mRNA expressions of kisspeptin, PRLR, CSN5, GATA1, GAPDH were calculated by the comparative cycle threshold (CT) method, with expression of GAPDH as the internal reference. The 2−∆∆Ct method was used for analysis. The specific primers applied for RT-PCR reaction are shown in Table 1. Relative mRNA expressions of kisspeptin, PRLR, CSN5, GATA1, GAPDH were calculated by the comparative cycle threshold (CT) method, with expression of GAPDH as the internal reference. The 2−∆∆Ct method was used for analysis. The specific primers applied for RT-PCR reaction are shown in Table 1. Co-immunoprecipitation (Co-IP) The GT1-7 cells were treated as described in Experiment 5, 7 and 9. Then the cell precipitation was added with RIPA lysis buffer. Protein A/G-agarose microspheres were washed twice with PBS, and prepared into 50% protein A/G-agarose working solution with PBS. Next, 50% protein A/G agarose working solution was added into the samples at a ratio of 100 μL per 1 mL. The protein A/G-agarose microspheres were discarded by centrifugation. BCA assay was applied to test the protein concentration. Afterwards, 5 μL antibody (PRLR150) (IgG antibody as the control group) was added for incubation at 4° C overnight and the final volume was 500 μL. Next day, 100 μL protein A/G-agarose microspheres was added to capture the antigen-antibody complex at room temperature for 1h. The protein A/G-agarose microsphere antigen-antibody complex was collected after centrifugation and washed with PBS. The supernatant was collected, and the loaded samples were boiled for 5 min to precipitate. The obtained samples were detected by western blot using antibodies (β-Trcp, 4394, Abcam, Cambridge, UK), as described in 3.4. Western blot Total protein was extracted from GT1-7 cells using RIPA lysis buffer (Beyotime Biotechnology, Shanghai, China). The tissue lysates were centrifuged at 12,000 rpm for 5 min at 4° C, and the supernatants were collected for further analysis. The bicinchoninic acid (BCA) assay was applied to detect the concentration of protein samples. Then, 60 μg protein samples per lane were separated using 8% SDS-PAGE and then transferred onto PVDF membranes (0.45 μm, Millipore, Schwalbach, Germany). The membranes were blocked in Tris-buffered saline Tween containing 5% skim milk for 1h at room temperature and then incubated overnight at 4° C with primary antibodies: Anti-phos- JAK2 (Tyr1007/1008) antibody (3771), Anti-JAK2 antibody (3230), Anti-phos-STAT5 (Tyr694) antibody (9314), Anti-STAT5 antibody (94205), Anti-NA/K ATP antibody (3010) (CST, Boston, USA); Anti-PRLR antibody (ab170935), Anti-kisspeptin antibody (ab19028) (Abcam, Cambridge, UK); Anti-PRLR antibody (ABIN152720) (IP), Anti-GATA1 antibody (ABIN2704828) (antibodies-online, Beijing, China). Next day, these membranes were washed with PBS and incubated with secondary antibodies for 1h at room temperature. After rinsing, the proteins were detected by enhanced chemiluminescence. The protein levels were quantified by densitometry using Image-Pro Plus 6.0 and normalized to the corresponding GAPDH level. CCK8 assay The GT1-7 cell density was adjusted to 5000 cells/well, seeded into a 96-well plate, and cultured in the incubator at 37° C with 5% CO2 for 24 h. Afterwards, the original culture solution was discarded and the cells were washed twice with phosphate-buffered saline (PBS). According to Experiment 1 or 2, GT1-7 cells were treated differently. Each experiment group had 3 parallel wells. After 72h of incubation, each well was added with 10 μL CCK-8 (Beyotime Biotechnology, Shanghai, China) solution and incubated for 2 h in an incubator. The optical density (OD) value of the liquid in each well was measured by a microreader (Berthold LB941) at the wavelength of 450 nm. Table 1. Primers used in quantitative real-time PCR and shRNA-CNS5 sequence Primers Sequences (5’→3’) kisspeptin F- CTCTGTGTCGCCACCTATGG R- AGGCTTGCTCTCTGCATACC PRLR F- GACTCAAGGGGGCAAAGTCA R- CACCTCCACAGAGAAGCGTT CSN5 F- GCCTTGAGAGTCTATCACCACT R- TGATGATCATGGTCTCGCCG GATA1 F- TTGGGATCACCCTGAACTCG R- GGTTGAACCTGGGCTTGTTG GAPDH F- CATCACTGCCACCCAGAAGACTG R- ATGCCAGTGAGCTTCCCGTTCAG ShRNA-CSN5 CCGGAGCGCAGAGTATCGATGAAATCTCG AGATTTCATCGATACTCTGCGCTTTTTTG Table 1. Primers used in quantitative real-time PCR and shRNA-CNS5 sequence. Chromatin immunoprecipitation assay (ChIP) The cells were treated with 1% paraformaldehyde and incubated at 37° C for 10min. The cells were resuspended in SDS lysis buffer and broken by ultrasonic, and the supernatant was collected. CHIP diluent was added with protease inhibitor, and this solution was used to dilute the cell supernatant. Then 200 μL cell supernatant was added into 1800 μL ChIP diluent, making the final volume as 2 mL. The 10 μL cell supernatant dilution was regard as input control. Protein A Agarose/salmon sperm DNA was added to the supernatant, followed by antibody (GATA1) incubation overnight. Then 200μL eluent was added to the protein A Agarose/antibody complex, and the supernatant was collected. Next, 20 μL 5MNaCl was added to each 500 μL eluent and subjected to water bath at 65° C for 4h, followed by 10 μL 0.5M EDTA, 20 μL 1M Tris-HC1 and 2 μL proteinase K at a 45° C-water Construction of luciferase reporter gene plasmid bath for 1h. After filtered by DNA clean-up Column, the fluid was collected, and the qPCR was performed as described as 3.6. The full length of CSN5 (NM001277101) promoter was detected, combining with the target gene prediction software (Jaspar), to find the interaction site of CSN5 promoter and acting site of GATA1. Primer 5 was applied to design primers, making PCR product containing CSN5 promoter and GATA1 predicted binding site 1 (GGATGT). Construction of lentivirus Based on the construction of vector and identification of Colony PCR (Supplementary Figure 1), the bacterial solution with correct sequencing was seeded into 10 mL LB liquid medium containing Amp antibiotic and incubated, and then the plasmid was extracted. The GT1-7 cells were seeded into a 24-well plate and prepared for transfection. Then 0.8 μg plasmid was added to 50 μL Opti-MEM medium (GIBCO, Grand Island, USA) or 2.0 μL lipofectamine 2000 (Thermo Fisher Scientific, NY, USA) at room temperature for 5min, respectively. The two diluents were mixed for 5 min, and then 100 μL mixture was added into each well of the cell plate for 12 h-incubation at 37° C. After 72 h of transfection, the infective efficiency could be determined. According to the protocol of Experiment 8, each well of 96-well plate was added with 100 μL reporter gene cell lysate, followed by centrifugation at 15000rpm for 5 min to collect the supernatant. The sample was detected by a microplate reader with an interval of 2 s and a measurement time of 10 s. Then 100 μL luciferase detection reagent was added into 100 μL sample for RLU measurement. Statistical analysis All data were expressed as means ± SEM. Assessment of statistical significance was done using statistical analysis software SPSS (IBM SPSS Statistics 21; SPSS Inc., Chicago, IL, USA). For comparisons between experimental groups, one-way ANOVA and Tukey’s test were applied. All the P values were two-sided and the differences were considered statistically significant at P < 0.05. Immunofluorescence The cells were fixed with 10% paraformaldehyde for 20 min at room temperature. The fixed cells were blocked with 1% bovine serum albumin (BSA) for 30 min and incubated with the corresponding primary antibody (PRLR 1:20) at 4° C overnight, followed by washing with PBST for 10 min. Then the secondary antibody was added for 2h-incubation at room temperature, followed by the 4’, 6-diamidino-2-phenylindole (DAPI) staining for 15 min, and observation under a laser confocal microscope (400 ×). AGING 20428 www.aging-us.com Table 1. Primers used in quantitative real-time PCR and shRNA-CNS5 sequence. Primers Sequences (5’→3’) kisspeptin F- CTCTGTGTCGCCACCTATGG R- AGGCTTGCTCTCTGCATACC PRLR F- GACTCAAGGGGGCAAAGTCA R- CACCTCCACAGAGAAGCGTT CSN5 F- GCCTTGAGAGTCTATCACCACT R- TGATGATCATGGTCTCGCCG GATA1 F- TTGGGATCACCCTGAACTCG R- GGTTGAACCTGGGCTTGTTG GAPDH F- CATCACTGCCACCCAGAAGACTG R- ATGCCAGTGAGCTTCCCGTTCAG ShRNA-CSN5 CCGGAGCGCAGAGTATCGATGAAATCTCG AGATTTCATCGATACTCTGCGCTTTTTTG Ethical statement The experimental operations were approved by the Animal Ethics Committee of Nanjing Chinese Medicine University (approval No: SYXK (Su) 2014-0001). AGING www.aging-us.com 20429 20429 https://doi.org/10.1159/000493406 &This corresponding author has a verified history of publications using a personal email address for correspondence. 10. Sinha S, Sharma S, Vora J, Shah H, Srivastava A, Shrivastava N. Mucuna pruriens (L.) DC chemo sensitize human breast cancer cells via downregulation of prolactin-mediated JAK2/STAT5A signaling. J Ethnopharmacol. 2018; 217:23–35. https://doi.org/10.1016/j.jep.2018.02.006 PMID:29427634 https://doi.org/10.1530/JOE-18-0108 9. Trevisan CM, Montagna E, de Oliveira R, Christofolini DM, Barbosa CP, Crandall KA, Bianco B. Kisspeptin/GPR54 System: What Do We Know About Its Role in Human Reproduction? Cell Physiol Biochem. 2018; 49:1259–76. AUTHOR CONTRIBUTIONS 5. Li L, Jiang H, Wei X, Geng D, He M, Du H. Bu Shen Zhu Yun Decoction Improves Endometrial Receptivity via VEGFR-2-Mediated Angiogenesis. Evid Based Complement Alternat Med. 2019; 2019:3949824. https://doi.org/10.1155/2019/3949824 PMID:32082394 Huifang Zhou finished study design, Hua Feng, Jianxia Lu, Qing Zhang finished experimental studies, Hua Feng, Xingran Tang Yujie Shang finished data analysis, Hua Feng finished manuscript editing. All authors read and approved the final manuscript. 6. Bei L, Hui-fang ZH, Bo-ru ZH, Xiao-fei JI, Jian-ya XU, Tong XI, Jin-jun SH. Regulation of BuShen ZhuYun Decotion on gonadotropin in rat pituitary cells. Journal of Medical Postgraduates. 2018; 703–08. ACKNOWLEDGMENT We would like to acknowledge the reviewers for their helpful comments on this paper. 7. Jiang X, Zhou H, Shi M, Zhou B, Liu B, Yuan Y, Shan J, Xu J, Xie T. Bu-shen-zhu-yun decoction promotes synthesis and secretion of FSHβ and LHβ in anterior pituitary cells in vitro. Biomed Pharmacother. 2018; 102:494–501. CONFLICTS OF INTEREST The authors declare that they have no conflicts of interest. REFERENCES 1. Bernard V, Young J, Binart N. Prolactin - a pleiotropic factor in health and disease. Nat Rev Endocrinol. 2019; 15:356–65. 1. Bernard V, Young J, Binart N. Prolactin - a pleiotropic factor in health and disease. Nat Rev Endocrinol. 2019; 15:356–65. 8. Harter CJ, Kavanagh GS, Smith JT. The role of kisspeptin neurons in reproduction and metabolism. J Endocrinol. 2018; 238:R173–83. https://doi.org/10.1530/JOE-18-0108 PMID:30042117 8. Harter CJ, Kavanagh GS, Smith JT. The role of kisspeptin neurons in reproduction and metabolism. J Endocrinol. 2018; 238:R173–83. 8. Harter CJ, Kavanagh GS, Smith JT. The role of kisspeptin neurons in reproduction and metabolism. J Endocrinol. 2018; 238:R173–83. https://doi.org/10.1530/JOE-18-0108 PMID:30042117 Sponsored by Project of National Natural Science Foundation of China (No. 81473713 and 81774354); Phase III Project of Advantageous Discipline of Traditional Chinese Medicine (No. ZYX03KF005); Leading Talents of Traditional Chinese Medicine in Jiangsu Province (No. SLJ0202). Sponsored by Project of National Natural Science Foundation of China (No. 81473713 and 81774354); Phase III Project of Advantageous Discipline of Traditional Chinese Medicine (No. ZYX03KF005); Leading Talents of Traditional Chinese Medicine in Jiangsu Province (No. SLJ0202). https://doi.org/10.1038/s41574-019-0194-6 11. Ried K, Stuart K. Efficacy of Traditional Chinese Herbal Medicine in the management of female infertility: a systematic review. Complement Ther Med. 2011; 19:319–31. https://doi.org/10.1016/j.ctim.2011.09.003 PMID:22036524 11. Ried K, Stuart K. Efficacy of Traditional Chinese Herbal Medicine in the management of female infertility: a systematic review. Complement Ther Med. 2011; 19:319–31. 2. Arefi S, Fallah N. Comparison of pct after vaginal and oral bromocriptine use in women with hyperprolactinemia and infertility. J Reprod Infertil. 2002; 3:36–41. 3. Capozzi A, Scambia G, Pontecorvi A, Lello S. Hyperprolactinemia: pathophysiology and therapeutic approach. Gynecol Endocrinol. 2015; 31:506–10. https://doi.org/10.3109/09513590.2015.1017810 PMID:26291795 3. Capozzi A, Scambia G, Pontecorvi A, Lello S. Hyperprolactinemia: pathophysiology and therapeutic approach. Gynecol Endocrinol. 2015; 31:506–10. https://doi.org/10.3109/09513590.2015.1017810 PMID:26291795 12. Wen-Jie Y, Jing Y, Tai-Lang Y. [Effects of zhuyun recipe on the endometrial receptivity in mice with blastocyst implantation dysfunction and ovulation stimulation]. Zhongguo Zhong Xi Yi Jie He Za Zhi. 2012; 32:1554–57. PMID:23359985 4. Gasco V, Grottoli S. Physiopathology, Diagnosis, and Treatment of Hyperprolactinemia. In: Casanueva F, Ghigo E, editors. Hypothalamic-Pituitary Diseases. Endocrinology. Cham: Springer. 2018. https://doi.org/10.1007/978-3-319-44444-4_15 13. Yu N, Yang J, Yin T. Extracts from a traditional Chinese herbal remedy (Zhuyun recipe) improve endometrial receptivity in mice with embryonic implantation dysfunction and ovulation stimulation. J Ethnopharmacol. 2011; 137:389–95. AGING www.aging-us.com 20430 20430 https://doi.org/10.1016/j.jep.2011.05.037 18. Goffin V, Touraine P. The prolactin receptor as a therapeutic target in human diseases: browsing new potential indications. Expert Opin Ther Targets. 2015; 19:1229–44. https://doi.org/10.1517/14728222.2015.1053209 PMID:26063597 14. Zhou HF, Li AP, Tan Y. [Effects of bushen zhuyun recipe on protein expressions of estrogen receptor, progesterone receptor and integrin alpha5 and beta3 in endometrium of rats at the implantation stage]. Zhongguo Zhong Xi Yi Jie He Za Zhi. 2009; 29:628–31. PMID:19852297 19. Clarke H, Dhillo WS, Jayasena CN. Comprehensive Review on Kisspeptin and Its Role in Reproductive Disorders. Endocrinol Metab (Seoul). 2015; 30:124–41. https://doi.org/10.3803/EnM.2015.30.2.124 PMID:26194072 15. Borba VV, Zandman-Goddard G, Shoenfeld Y. Prolactin and Autoimmunity. Front Immunol. 2018; 9:73. https://doi.org/10.3389/fimmu.2018.00073 PMID:29483903 20. Hu KL, Zhao H, Yu Y, Li R. Kisspeptin as a potential biomarker throughout pregnancy. Eur J Obstet Gynecol Reprod Biol. 2019; 240:261–66. https://doi.org/10.1016/j.ejogrb.2019.07.016 PMID:31344665 16. Kataria J, Gill GK, Kaur M. Interrelationship of thyroid hormones, obesity, and prolactin in infertile women. Asian J Pharm Clin Res. 2018; 11:136. https://doi.org/10.22159/ajpcr.2017.v11i1.20861 17. Salvatori R. Dopamine agonist withdrawal in hyperprolactinemia: when and how. Endocrine. 2018; 59:4–6. https://doi.org/10.1007/s12020-017-1469-0 PMID:29124662 AGING 20431 www.aging-us.com SUPPLEMENTARY MATERIALS Supplementary Figures Supplementary Figure 1. The schematic diagram of lentiviral vector. Supplementary Figure 1. The schematic diagram of lentiviral vector. Supplementary Figure 2. Inhibitory effect of PRL or CSF in GT1-7 cells. (A) The change of cell vitality effected by different PRL concentration levels. (B) The change of cell vitality effected by different CSF concentration levels. Results were expressed as mean ± SD (n=3). **p<0.01 vs Control group. Supplementary Figure 2. Inhibitory effect of PRL or CSF in GT1-7 cells. (A) The change of cell vitality effected by different PRL concentration levels. (B) The change of cell vitality effected by different CSF concentration levels. Results were expressed as mean ± SD (n=3). **p<0.01 vs Control group. AGING 20432 www.aging-us.com Supplementary Figure 3. Effect of the mRNA expressions of PRLR and kisspeptin in GT1-7. The mRNA expressions of PRLR and kisspeptin were detected by RT-PCR. The mRNA expressions of PRLR (A) and kisspeptin (B) were normalized to control. The results were presented as mean ± SD (n = 3). **p < 0.01, vs. Control group. Supplementary Figure 3. Effect of the mRNA expressions of PRLR and kisspeptin in GT1-7. The mRNA expressions of PRLR and kisspeptin were detected by RT-PCR. The mRNA expressions of PRLR (A) and kisspeptin (B) were normalized to control. https://doi.org/10.1016/j.jep.2011.05.037 The results were presented as mean ± SD (n = 3). **p < 0.01, vs. Control group. Supplementary Figure 4. Effect of the mRNA expressions of PRLR and kisspeptin in GT1-7. The mRNA expressions of PRLR and kisspeptin were detected by RT-PCR. The mRNA expressions of PRLR (A) and kisspeptin (B) were normalized to control. The results were presented as mean ± SD (n = 3). **p < 0.01 vs. Control group, ##p < 0.01 vs. HPRL group. Supplementary Figure 4. Effect of the mRNA expressions of PRLR and kisspeptin in GT1-7. The mRNA expressions of PRLR and kisspeptin were detected by RT-PCR. The mRNA expressions of PRLR (A) and kisspeptin (B) were normalized to control. The results were presented as mean ± SD (n = 3). **p < 0.01 vs. Control group, ##p < 0.01 vs. HPRL group. AGING 20433 www.aging-us.com www.aging-us.com Supplementary Figure 5. The ubiquitin level of PRLR was measured with Co-IP. (n = 3). Supplementary Figure 5. The ubiquitin level of PRLR was measured with Co-IP. (n = 3). AGING 20434 www.aging-us.com pplementary Figure 6. The level of β-Trcp, PRLR, and CSN5 were measured with Co-IP (n = 3). (A) Representative blots of Co-IP ween PRLR andβ-Trcp. (B) Representative blots of Co-IP between PRLR and CSN5. (C) Quantitative relative binding level of RLR andβ-Trcp. Quantitative relative binding level of RLR and CSN5. Supplementary Figure 6. The level of β-Trcp, PRLR, and CSN5 were measured with Co-IP (n = 3). (A) Representative blots of Co-IP between PRLR andβ-Trcp. (B) Representative blots of Co-IP between PRLR and CSN5. (C) Quantitative relative binding level of RLR andβ-Trcp. (D) Quantitative relative binding level of RLR and CSN5. Supplementary Figure 7. Effect of the mRNA expressions of CSN5and GATA1 in GT1-7. The mRNA expressions of CSN5 and GATA1 were detected by RT-PCR. The mRNA expressions of CSN5 (A) and GATA1 (B) were normalized to control. The results were presented as mean ± SD (n = 3). **p < 0.01 vs. Control group, ##p < 0.01 vs. HPRL group. Supplementary Figure 7. Effect of the mRNA expressions of CSN5and GATA1 in GT1-7. The mRNA expressions of CSN5 and GATA1 were detected by RT-PCR. The mRNA expressions of CSN5 (A) and GATA1 (B) were normalized to control. The results were presented as mean ± SD (n = 3). **p < 0.01 vs. Control group, ##p < 0.01 vs. HPRL group. https://doi.org/10.1016/j.jep.2011.05.037 AGING 20435 www.aging-us.com Supplementary Figure 8. Chromatin immunoprecipitation (ChIP) assay on the promoter of GATA1. (A) Representative blot of ChIP assay on GATA1. (B) Quantitative relative binding of GATA1 to CSN5 promoter. The results were presented as mean ± SD (n = 3). **p < 0.01 vs. Control group, ##p < 0.01 vs. HPRL group. Supplementary Figure 8. Chromatin immunoprecipitation (ChIP) assay on the promoter of GATA1. (A) Representative blot of ChIP assay on GATA1. (B) Quantitative relative binding of GATA1 to CSN5 promoter. The results were presented as mean ± SD (n = 3). **p < 0.01 vs. Control group, ##p < 0.01 vs. HPRL group. Supplementary Figure 9. The level of CSN5 in GT1-7 was detected by western blot assay and representative bands were shown in (A). The level of CSN5 (B) was normalized to control. The results were presented as mean ± SD (n = 3). **p < 0.01 vs. shRNA-NC group. Supplementary Figure 9. The level of CSN5 in GT1-7 was detected by western blot assay and representative bands were shown in (A). The level of CSN5 (B) was normalized to control. The results were presented as mean ± SD (n = 3). **p < 0.01 vs. shRNA-NC group. AGING www.aging-us.com Supplementary Figure 10. The ubiquitin level of PRLR was measured with Co-IP (n = 3). Supplementary Figure 10. The ubiquitin level of PRLR was measured with Co-IP (n = 3). AGING www.aging-us.com
https://openalex.org/W4295925565
https://aladabj.uobaghdad.edu.iq/index.php/aladabjournal/article/download/2711/3327
Arabic
null
التعلیم الالكتروني وأثره على جودة التعليم العالي في العراق
˜Al-œādāb
2,022
cc-by
26,058
University of Religions and denominations Faculty of Media and communications DOI: https://doi.org/10.31973/aj.v1i142.2711 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ Abstract: Keywords: e-learning, quality of higher education, Iraqi universities, faculty b Keywords: e-learning, quality of higher education, Iraqi universities, faculty members 543 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) الباحث علي أحمد امين الطباطبائي ماجستير في ادارة االعالم والعالقات جامعة بغداد– كلية اللغات )(ملخَص البحث هدفت هذه الدراسة الةا الرفةعل وةا الةع الرفوةكت انل رع رة امة رال ّمة نسةك ّ فة ّالجّمفّت الفعاقك مدى تأثيعه وا ج دال الرفوةكت الفةّل اكةّل لة مةة جرة راةع ة هيئ الرةدرس و فةمرت الةدا ت اسسّسة لوف وكة الرفوك كة ال ةّفاية وةا رفةّرررّ لةذا تةت ّ إ ةةةةداد اسةةةةر ره خّفةةةة ورةةةةت ةةةةت الةةةة ا لةةةة اف لوفي ةةةة ال رةةةةّرال ف ةةةة ةةةةة ت ةةةةجيا . ال حاّت ح ل ل الرمةةةع ال ةةةل ال ةةةّل وةةةا ي ةةة م رةةة مةةةة313 ) تدرس ةةة مةةةة سةةةّتذال الجّمفةةةّت . Abstract: This study aimed to identify the reality of e-learning in general, and especially in Iraqi universities, and its impact on the quality of higher education. It concentrates on the point of view of the faculty members as the main supporter of the educational process and those who maintain its sobriety. A questionnaire is prepared for them and distributed randomly to the selected sample. In addition to recording notes about it, the current research is limited to a sample of (313) professors of Iraqi universities in the province of Baghdad (University of Baghdad, and Al-Mustansiriya University). The researcher adopted the survey method, one of the types of descriptive analysis method as a design for the research, and the research community consisted of university professors within the borders of the geographical area of the province of Baghdad, and the universities of Baghdad and Al-Mustansiriya were chosen to represent the sample of the current study. Teaching, and general evidence for teachers about e- learning, the pros and cons of e-learning, in addition to the obstacles of e-learning. The questionnaire’s paragraphs were statistically analyzed, and the questionnaire procedures took nearly two months, and the researcher analyzed the results he reached using the t-test, to verify the hypothesis Research and to calculate the significance of the differences between the averages to identify the effectiveness of e-learning and its impact on the quality of higher education in Iraqi universities, and found a statistically significant difference at the level of significance (0.05), it appeared that the role of e-learning is one of the reasons for the low quality of education in Iraqi universities, by comparing Between the arithmetic average and the hypothetical average, where the role of e-learning is negatively reflected on the reality of the quality of higher education because it does not require that attention And thinking may sometimes be a unilateral connection, in light of the results of the research, the researcher concluded that e-learning in Iraq is in dire need of elements and effort in order to contribute to improving the reality of higher education in Iraqi universities, due to the weak infrastructure that prevents leaving the old ways of education. Abstract: الريئ الردرس ك المقدمة نفةةد انتمةةّل هةةت سةة ن رةةّ ورةةّ ا ر ةةّل لةةدم جةةه ال لةةّ ا ر ةةّر ل تمةةةّل اسةةةر دامّت فةةة م جةةةّنت م رومةةة مثةةةا ت ةةةّدل اسف ةةةّر العسةةةّفا ال فو مةةةّت تفةةةد الف وكةةة الرفوك كة وكةة اتمةةّلك ت ةع ل مرةة م انتمةةّل ل ةّ ت رّجةةه مةةة تمّ ةا و اسةةل الف مةةّت العمةة الرةةة تلةةة ا حةةةد رةة اع انتمةةةّل مةةةة حيةةةل الوغةة اّ ر ةةةّر الةةةدر المةةةم ا ثّاةةة وكةةة اتمةةةّل لماةةة ن ةةةر دم ةةة مةةةة ا لردرس ةةة اللّلةةةب الومةةةل سةةةيو ل قةةةا العسةةةّل مةةةة ال مةةدر إلةةا ال روقةة اةةّخر ل اند ار هةة اتمةةّل خيةةع لماةة مةةة خةة ل لغةة ا شةةّرال ال ع ةة اسففةةّل سمةة انتمةةّل لوف وكةة الرفوك كةة اأرةةه اتمةةّل ج فةة الةةذل ن ةة ل وةةية مج ة مةة اسفةعاد ةد العجةة ع إلةا ال مةّدر ال رمة فةة وة م انتمةّل امةم ّمةة عربية ل وك انتمّل تر ل مة ّفع ه ال مدر العسّل ال سيو ال رقبا رجع المدى) د ملّاق تو الف ّفع مع الف وك الرفوك ك نقّوا ال مدر الردرس العسّل ال رج الرفوك ال سيو هة رعسقة الرةدرس ال ةرقبا هة اللّلةب ا خيةعا رجةع المةدى فةة قكةةّ مةةدى فرةةت اللّلةةب لو ةةّدال الفو كةة الرةة درسةةرّ مةةة خةة ل لةة عربةةية ل انتمةةّل عةةؤدل د را مر ةةّ فةة الف وكةة الرفوك كةة فةةم لةة ت ّدلكةة فّنتمةةّل نفربةةع ال سةةكط ال ةةا . Abstract: ) الفعاقك ف م ّفا اغداد جّمف اغداد) و فمرّ الجّمف اسم الجّمف ال ر معس ات ذ ال ّحل ال رج ال حد ر اع م رج الر ويةا ال فةم تمة ك ّ لو ةل تةأل مجر ةةع ال ةةل مةةة سةةّتذال الجّمفةةّت لةة ة حةةد د العلفةة الجغعادكةة ل ّفاةة اغةةداد جةةعى اخركّر جّمفر اغداد ال ر معس لر ثا ي الدراس ال ّلكة ةد ال ّحةل اسةر ّر م رة مة44) فقعال و ا م ّ ر ش وت البكّرّت اس لك ن ّ الريئة الردرس ةك اكّرةّت ّمة لوردرس يية ح ل الرفوكت انل رع ر م ر ال رّت الر تؤثع وا جة دال خةدمّت الرفوةكت الفةةّل م ةة ر سةةوبكّت الرفوةةكت انل رع رةة ف ةة ةةة م ةة ر مف لةةّت الرفوةةكت انل رع رةة حُووةةت فقةةةعات انسةةر ّر إحمةةةّفكّ اسةةةرغعلت اجةةعا ات انسةةةر ّر مّنقةةّر اللةةةرعسة حوةةةا ال ّحةةل ال رةةّفج الرةة ت فةةا إليرةةّ اّسةةرف ّل انخر ةةّر الرةةّفt-test ) لور قةةم مةةة فعلةةك ال ل ل ّ دنلة المةع ب وةية ال ر سةلّت لورفةعل وةا فّ وكة الرفوةكت انل رع رة ثةعه وا جة دال الرفوةكت الفةّل فة الجّم فةّت الفعاقكة ف جةد فةعب ل دنلة إحمةّفك ةد م ةر ى دنل0,05 ) ظرع إل د ر الرفوكت انل رع ر حد س ّ تدر ج دال الرفوكت ف الجّمفّت الفعاقك مة خ ل مقّرر وية ال ر سط ال ّو ال ر سةط المعلة إ عة ف د ر الرفوةكت انل رع ر سو ّ وا الع ج دال الرفوكت ا لفّل ل ره نعرلوب ل الرمّ ا الرم يع لد ن ة ل ف افض انحكّل اتمّل احّدل الجّرب ف ل ررّفج ال ةل سةر رج ال ّحةل إل الرفوةكت انلکرع ری فةی الفةعاب ا ّجة مّسة الةا مق مةّت جرةد حرةا ن ةرت فة ت ةية الةع الرفوةكت 544 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ الفةةّلی فةةی الجّمفةةّت الفعاقكةة لةة ل ةةف الب كةة الر ركةة الرةة ت ةة ل د ل تةةع اللةةعب .القدن اّلرفوكت الکلمااات الماتاحيااة ّ: الرفوةةكت انل رع رةة جةة دال الرفوةةكت الفةةّل الجّمفةةّت الفعاقكةة ةة . Abstract: ف وك الرفوكت فةة ت ال ّجةة مو ةة الةةا م او ةة الرلةة ر ةةّل تةةأثيع الرلةة ر ال ر لةة ج وةةا الةةع الرفوةكت فةة رقةا هةةذا القلةةّع مةة اللعافةةم ال سةةك ك الةا وةةدافا رعافةةم حدعثة اةةّلرفوكت حرةةا خةةعل ل ةةّ ممرةة م الرفوةةكت ا ل رع رةة رخةةت ل هةةذا ال ةة ع اسةةر دم فةة م رمةة القةةعل الرّسةةع لةةع إن شةةّع اسةةر دامه فةة المرةةعال الرةة رافقةةت جّف ةة ر رةةّ حيةةل ا ربةةع البةةدعا لورفوةةكت .الرقويدل لةةذا تةةدفف ّ ال ّجةة د مةةّ نجةةّد وةةدافا حوةة ل فةة الق ةةّنّ ات انهر ةةّم ال ّشةةع ا كةةّال ا ر ّل رخت ا الرردعدات الر نفّر م رّ ال جر ع إن ل م أل الرفوكت تفد ا ثّا خةط اح ةةع ن ن ةةة الررةةّ ل ورةةّ حيةةل نفةةد الرقمةةيع فةة توقةة الفوةةت لةةه مةةعد د سةةوب وةةا حكةةّال المةةعد ال جر ةةع ل ةة ل الرفوةةةكت مةةة اسمةة ر ال ّلغةة انه كةةة فةة حكةةّال اللةةف سفربةةةع انداال ال ر ف م أل م اجر الرك مة لبا الد ل الر ت كلع وا انلرمّد الر ت رو لة ال ال ح ةا توة ال ف لةّت الرة ت ة ل د ل انسةر عار اةّلرفوكت افةد تفلةا سةبا ال كةّال جة عا 545 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) ا جعا ات ال ر ف لو د مة اررلّر ال اّ الفةّل ةّل ال ةا فة الر جةه ر ة انسةرمّدال مةة اللة الفّل كةة تق كةةّت الر افةا فةة الةةدخ ل لوفةةّلت انفرعالة اسةةر عار الف وكةة الرفوك كةة . Abstract: د ل ارقلّع اسر ّل ال يعال الدراسك بع الرفوكت انل رع ر تک ة ه ك هذا ال ل ف ان ّح مّ ه البدعا الذل اتجرت إلكه ال ؤس ّت الرفوك ك ف ا اقّ وا الدراس د ل الرةأثع اةّ جعا ات ال لّفكة لةد فةّعع ر رةّ ةّل البةدعا ال ةةا هةة الرفوةةكت ا ل رع رةة اكةةّل مةةدى تةةأثيعه وةةا جةة دال الرفوةةكت الفةةّل اّ ر ةةّره اللةةغا اللةةّخا لو رمةةية فةةة ان رةة ان خيةةعال حيةةل شةةّع ممرةة م الرفوةةكت ا ل رع رةة اةةّلر امة مةةةع اررلةةّر فةةّعع ر رةةّ الةةذل ت ةةبب ورفليةةا ّفةة ممّفةةةا ال كةةّال حرةةا نن ةةكع مجرةة د اللو فة اسةر ّل دراسةررت ةّل نوةد مةة الر جةه ر ة ات ةّع اللةعب انل رع ركة فة إنمةّل ال ةةةّدال الدراسةةةك لولو ةةة ةةةا مةةةع مةةةّ عرفوةةةم اّلف وكةةة الرفوك كةةة مةةةة إجةةةعا انخر ةةةّرات لّمةةة ّال ةةةةؤت عات ال ةةةةد ات الفو كةةةة الةةةةد رات الردرسبكةةةة م ةةةةرغوية وةةةةذل مةةةةّ تقدمةةةةه لرةةةةت ت ل جكةةةة انتمّل ش انررعرةت مةة خةدمّت اةعامج مرلة رال ت ةّ د وةا الر افةا مةّ وةية اللّلةب الردرس لغعض ل ن ل الرفوكت انل رع ر البدعا ة الرفو.كت الرقويدل سفد للةّع الرفوةكت فة م لقة اللةعب اس سةط مةة الج ارةب الرة لةت نجةعل ويرةّ وكة الر سةةا الجةةذرل مةةة ال مةةّيكت القدن ةة إلةةا اللعافةةم ال دعثةة ال ر فةة فةة د ل الفةةّلت ال رلةة رال مة حيل اسر دام الرق كّت ال دعث ف ّف ممّفا ال كّال ففوا سةبيا ال ثةّل اةّت ا ة م الي م ن ا اّ م العل مفر دا وةا تقّرةّت انتمةّل ال دعثة الرة فةعت وةا ال روقة ال ؤس ا مك ال ثيع مةة الجرةد ال ةّل ةّ ّرةت وكةه ال سةّفا الرقويدنة ةذل هة الرفوكت الرقويدل د مقّررره ا ّ ع فعه الرفوكت انل رع ر رجد ال ع اس ل ن رةّل الةا الجرةد الف ةةّ الرقيةةد افّمةةا ال مةةّل ال ةةّل ف ةة ةةة ال مةةّرسا الرةة تر وةةا سةة ات الدراسةة وةةا توةة المع لةةّت رجةةدهّ فةة الرفوةةكت ا ل رع رةة وثةةع مع رةة لةةا تفقيةةدا لةةد ت ةة ل مفد مةة .ف افض ممّفا الف وك الرفوك ك ف وك الذهّ اننّ الا الجّمفّت مة جا مفعف ل الف وك الرفوك ك ت يع اّلل ا الذل ن ة لرّ ت قيم هدافرّ وا فم الرفوكت انل رع ر ّل لرذه العسّل جّرب مرت ف قكةّ تةأثيع الرفوةكت انل رع رة وةا جةة دال الرفوةةكت الفةةّل اخركةةّر مرغيةةع الجّمفةةّت الفعاقكةة في ةة لو ةةل مةةة خةة ل وكةةّل ر ل ّ الريئ الردرس ك ف الرفوكت انل رع ر م ةّ تلوةب ةا اسةربكّل مر ة ل مةة م ةّ ر ةةدال لغةةعض دراسةة ال رةةّت الرةة تةةؤثع وةةا جةة دال خةةدمّت الرفوةةكت الفةةّل ال ةةوبكّت اهةةت ال ف لةةّت الرةة ت اجةةه الرفوةةكت انل رع رةة حيةةل تلوةةب هةةذا اسمةةع جرةةد مةةة لبةةا ال ّحةةل فةة الذهّ الا الجّمفّت الفعاقك مة اجا ت. Abstract: سع ر خ انسر ّر وا الفي ال رردف الردرس لغعض ل ن ل الرفوكت انل رع ر البدعا ة الرفو.كت الرقويدل سفد للةّع الرفوةكت فة م لقة اللةعب اس سةط مةة الج ارةب الرة لةت نجةعل ويرةّ وكة الر سةةا الجةةذرل مةةة ال مةةّيكت القدن ةة إلةةا اللعافةةم ال دعثةة ال ر فةة فةة د ل الفةةّلت ال رلةة رال مة حيل اسر دام الرق كّت ال دعث ف ّف ممّفا ال كّال ففوا سةبيا ال ثةّل اةّت ا ة م الي م ن ا اّ م العل مفر دا وةا تقّرةّت انتمةّل ال دعثة الرة فةعت وةا ال روقة ال ؤس ا مك ال ثيع مةة الجرةد ال ةّل ةّ ّرةت وكةه ال سةّفا الرقويدنة ةذل هة الرفوكت الرقويدل د مقّررره ا ّ ع فعه الرفوكت انل رع ر رجد ال ع اس ل ن رةّل الةا الجرةد الف ةةّ الرقيةةد افّمةةا ال مةةّل ال ةةّل ف ةة ةةة ال مةةّرسا الرةة تر وةةا سةة ات الدراسةة وةةا توةة المع لةةّت رجةةدهّ فةة الرفوةةكت ا ل رع رةة وثةةع مع رةة لةةا تفقيةةدا لةةد ت ةة ل مفد مةة .ف افض ممّفا الف وك الرفوك ك ف وك الذهّ اننّ الا الجّمفّت مة جا مفعف ل الف وك الرفوك ك ت يع اّلل ا الذل ن ة لرّ ت قيم هدافرّ وا فم الرفوكت انل رع ر ّل لرذه العسّل جّرب مرت ف قكةّ تةأثيع الرفوةكت انل رع رة وةا جةة دال الرفوةةكت الفةةّل اخركةةّر مرغيةةع الجّمفةةّت الفعاقكةة في ةة لو ةةل مةةة خةة ل وكةةّل ر ل ّ الريئ الردرس ك ف الرفوكت انل رع ر م ةّ تلوةب ةا اسةربكّل مر ة ل مةة م ةّ ر ةةدال لغةةعض دراسةة ال رةةّت الرةة تةةؤثع وةةا جةة دال خةةدمّت الرفوةةكت الفةةّل ال ةةوبكّت اهةةت ال ف لةةّت الرةة ت اجةةه الرفوةةكت انل رع رةة حيةةل تلوةةب هةةذا اسمةةع جرةةد مةةة لبةةا ال ّحةةل فةة الذهّ الا الجّمفّت الفعاقك مة اجا ت. Abstract: سع ر خ انسر ّر وا الفي ال رردف 546 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) سف د الر جه ر ال مةّيكت ال دعثة فة ل للةّع مةة للّ ةّت الف ةا لة ل ةّ نلةرده الفّلت ف الفمع ال ّل مة لم ال وةا ال ةر ى الر لة ج ثةعت الة ا الةج وةا ج كةع ّج ارةةةب ال كةةةّال م رةةةّ الفو كةةة انلرمةةةّدن وةةةا تفةةةدت لك ةةة ل تأثيعهةةة وةةةا الج ارةةةب الثقّدكةةة انجر ّعكةة هةة مةةّ ت ةة ا اّلف ل ةة لك رةةا مجةةّل الرعاكةة الرفوةةكت الجّرةةب اسهةةت فةة مةةدى .تأثيع الر ل جكّ وا هذا الجّرب ال رت ف ال كّال لةةةدمت تق كةةةّت ال ّسةةة سةةةّفا انتمةةةّل ال دعثةةة خدمةةة فةةة مجةةةّل تلةةة سع الرفوةةةكت ّانل رع ر ف ّل ان ر ّد سّاق وا سّفا ان م ال عفة ال ة ع فة الةرفوت مةة خة ل ول الدر البعامج الردرسبك الر ّرت مقرمعال ف حي رّ وا الردرس ّت الف ة عس افةد ل لقةةت ال داثةة اا لرةةّ وةةا للةةّع الرفوةةكت جفوةةت مةةة ال ةةرا ل نجوةة المةةعد فةة م لةةه سرفوت بع ش ا ررعرت اسلعاص الرفوك. ك لورفوكت ا ل رع ر ممّيكت دعدال ت ل ح ب ال ع اللعسق الر تقدم مة خ لرّ ال ةّدال الفو كةة فةةّلرفوكت ةةة افةةد حةةد توةة ال مةةّيكت الةةذل ن ةة ل و ةة ية مةةّ م ّشةةع ةةة رعسةةم اسرف ّل ال مّت الرفوك ك خيع م ّشع مة خ ل ملّهدال انلعاص الرفوك ك مقّرع الميةةةدع لو ّلةةةعات ال ةةةجو م ةةة قّ ل ةةةا رةةة ع م انةةةّ سةةةوبكّت تؤشةةةع وةةةا فةةةم ربكفةةة ال رميد سلوم وكه ان ةّ الرفوةكت ال ر قةا الةذل ن ة ل مةة خة ل اسةرف ّل انجرة ال الو حكة ال اسةةيب ال لةة الر اتةة الذ كةة ن ةةّل الةةا لةة الرفوةةكت ال ةةدمج الةةذل نج ةةع مةةّ وةةية اللعافم القدن اّلرفو كت المم اللعافم ال دعث بع ش انررعرت ه مّتم وه القكّدات الجّمعكةةة فةةة الفةةةعاب مةةةة اجةةةا ال مةةةّم وةةةا رفةةةّر الرفوةةةكت مةةةة خةةة ل خةةةذ افةةةض ال ةةة اد . Abstract: اّللعافم الرقويدن انخعى بع ال مّت انل رع رك ن ّ د الرفوكت انل رع رة فئةّت دعةدال مةة ال جر ةع فة ال مة ل وةا فعفة اسةر ّل دراسةةةةررت افةةةةد ل تةةةةع خوةةةةبرت مقّ ةةةةد الدراسةةةة سسةةةة ّ ترفوةةةةم اّل لةةةةع انلرمةةةةّدل ةةةةدم انسرقعار اسم حيل ت ة ال فض مة الذعة جبعترت الاع ل ال عكلةك وةا ةدم إو ةّل م ةةيعترت الفو كةة اّلدراسةة الف ةةا فةة لةةت احةةد ل ةةّ لةةه مةةة م يةة ات فةة تةة فيع ال عسةة فةة ال مّل ال.ّل دم الرقيد ت فيع الرفوت ال ا م ر ع مدى ال كّال ع قةةةةةةا ان ر ةةةةةةّد انررقةةةةةةّل الةةةةةةا الرفوةةةةةةكت انل رع رةةةةةة معهةةةةةة ل اةةةةةةّلاع ل انلرمةةةةةةّدن انجر ّعك لوبودال خّف تو الر لت تور م وع ب الرل ر الر ت رّل الا و كة ت ركة م ةةّهج مرلةة رال جرةة ال حدعثةة شةة اررعرةةت فّفقةة ال ةةع مةةة جةةا الر ةة ل مةةة الرفوةةكت . Abstract: الرقويدل الا الرفوكت انل رع ر اّلل ا ال لو راةةعا ل ةةّ ن ثوةةه الرفوةةكت الفةةّل مةةة اه كةة اّلغةة فةة تلةة سع الةةع ال جر ةةع ل ةة ل هةةذا ن ّ د الرفوكت انل رع رة فئةّت دعةدال مةة ال جر ةع فة ال مة ل وةا فعفة اسةر ّل دراسةةةةررت افةةةةد ل تةةةةع خوةةةةبرت مقّ ةةةةد الدراسةةةة سسةةةة ّ ترفوةةةةم اّل لةةةةع انلرمةةةةّدل ةةةةدم انسرقعار اسم حيل ت ة ال فض مة الذعة جبعترت الاع ل ال عكلةك وةا ةدم إو ةّل م ةةيعترت الفو كةة اّلدراسةة الف ةةا فةة لةةت احةةد ل ةةّ لةةه مةةة م يةة ات فةة تةة فيع ال عسةة فةة ال مّل ال.ّل دم الرقيد ت فيع الرفوت ال ا م ر ع مدى ال كّال 547 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ اّل ةةةوب وةةةا حكةةةّال المةةة عد ف ةةةّل نوةةةد مةةةة انهر ةةةّم اةةةّلج دال الرةةة تفةةةد مةةةة هةةةت اسد ات فةةة ت ية ر عك الرفوكت حيل ت ثا الج دال الي م ف معرّ ال ّل ا ثّا ال قكةّ الةذل عبةية مدى الر ام ال ؤس ّت الرفوك ك ور قيم هدافرّ ال فّعيع ال اجب ت ميذهّ ل ة وعامج ّل ك مفةةدال لةةذل حيةةل ترةةرت الجةة دال ا ةةدخ ت ال ؤس ةة الرفوك كةة اّلم ةةّ ات ال ر ثوةة اّسو كةة القّ ةةةّت الدراسةةةك ال ربةةةعات ف ةةة ةةةة ال ةةةّهج الدراسةةةك الردرس ةةةيية اللو ةةة ر عكةةة ال ةة ا الفو كةة و ةةةّ اد انهر ةةّم وروةة الج ارةةب ثةةع الةة ا إنجةةةّو وةةا م عجةةّت توةة ال ؤس ّت الر ود رهّ تد ت للّ ّت ا. لد ل ال روم :التعليم االلكتروني ه ر ع مة الرفوكت ن وم فعص جدعةدال لورفوةكت مةدى ال كةّال فة ل لةت ف ل م ّل هذا ن ثا مع ر ف الف وك الرفوك ك ا ّ نجفورّ وثةع ففّلكة سةع لور كةا مع احركّجّت مرلو ّت الفمع. المعسجّت2014 ص167 ). Abstract: المر ل2019 ص148 .) مشكلة الدراسة عر ةةّ ل م لةة ع هةةذا ال ةةل انهر ةةّم اةةّلرفوكت انل رع رةة خّفةة افةةد اس مةة الفّل كةة ّالرةة اجرّحةةت الفةةّلت جّف ةة ر رةةّ) الةةذل جفةةا مةةة الرفوةةكت انل رع رةة شةة ه اّلاةةّهعال ل ةة حققةةه مةةة د ر انجةةّو مر يةة فةة ال ةةّ دال وةةا اسةةر ّل ال ةةيعال الرفوك كةة حيةةل وةةدت ال ّجةةة ال و ةةة نسةةةر ف ّل هةةةذه الرقّرةةة الرةةة هةةة لك ةةةت ليةةةدال اليةةة م ل ةةةة سةةةع ّل مةةةة ال ت ببت اس لّع ال عافق نررلّر فّعع ر رةّ فة ل عرمةم الج كةع وةا اسةر دام الرفوةكت انل رع رةة اّ ر ةةّره ال ةةا اسمثةةا فةة بةة ر هةةذه ال عحوةة حرةةا اةةّت اللةةغا اللةةّخا لج كةةع ال ّحثية ال رمية ف مجّل الرفوةك ت وةا حرةا تفةدى لة الةا اهر ةّم اللةع ّت الفّموة فة ال جّل العل ل ل تل سع اسرف ّل هذه الرقّرّت سفد اسرف ّل ال سّفا الر ل جك ه . ال ال ّر ال ف قكّ تل ر ال اّم الرفوك مة حيل الر ي اسر دام مفّعيع الج دال نفر ةد الرفوةكت ا ل رع رةة ن خيةعا وةا ا ل ةة رد ال لةعل الةذل وةةد ره ن رةّل الةا تلةة سع م ر ع حيل شرد الفعاب مؤخعا دخ ل الرقّرّت ال سّفا العل كة ا ة ل الةد ل ال جةّ رال لةه . اسمع الذل جفا مة المف ا لدى ال فض الر كا مع هذا اسمع إل الرفوكت ا ل رع ر له د ر ف ت ع ال سّفا اللعافم الرفوك ك فة لةت قكّسة الةا جرد فّفدال بيعال لألسرّ اللّلب لةذا مةة ال ةع رل جةدا ا ر ةّد هةذه الرقّرة لةفرّ وةا فةةم العةسةة ال ةةرقبوك لوقةةّف ية وةةا مةة ر الرفوةةكت س ةةة ال ت ةة ل الةة ط ال ةةّفد فةة الرفوةةكت م رميدعة وذل مةة ثةعال ت ة ع الرجةّر الرة اسةرف وت خة ل هةذه ال عحوة فة م روة د ل الفةةّلت قكةةّ الةةع الرفوةةكت ج دتةةه مةةة جرةة راةةع اسسةةرّ الةةذل ن ةة ل حةةعص فةة ممةةو . Abstract: التعليم االلكتروني: ه اسر دام الر ل جكّ ال دعث الر تفر د سّسٌّ وا ال رّرات ال م لورفّمةةةا مةةةع شةةة ال فو مةةةّت الد لكةةة افةةةض ال سةةةّفط الر ل جكةةة مثةةةا الميةةةدع ةةة رمعار ٌّ الروكم سةة ل الرفوك ةة اسل ةةّر المةة ّعك مةةة جةةا الرمّ ةةا وةةية اللةة اسسةةّتذال إل رع ركةة د ل الرقيد ا د د ال مّل ال ّل. ّمع2014 ص26 ). التعلااايم االلكتروناااي: هةةة رعسقةةة اور ّرسةةة نمةةةّل ويئةةةّت الةةةرفوت ال فّفةةةعال الرةةة ترمةةة اّلرمةة كت الجيةةد الرمّ وكةة الر ع ةة حةة ل ال ةةرفوت سل فةةعد فةة ل م ةةّل مةةّل ةةة رعسةةم انررمةةةّع مةةةة ال مةةةّفر ال مةةةّدر ال رةةة فعال فةةة الفد عةةةد مةةةة الرق كةةةّت العل كةةة ف ةةة ةةةة اسر ةةةةةةةةةّ اسخةةةةةةةةةعى مةةةةةةةةةة ال ةةةةةةةةة اد الرفوك كةةةةةةةةة ال ّسةةةةةةةةة لبيئةةةةةةةةةّت الةةةةةةةةةرفوت ال مرةةةةةةةةة ح ال ةةةةةةةةةعل ال ب. الف يعل2011 24 .) ا لجودة الشاملة كما عرفتها "منظمة الجودة البريطانية:" ه المو م ا دارس لو ؤس الر ّتةةةةدر مةةةةة خ لرةةةةّ ت قيةةةةم ةةةةا مةةةةة احرك جةةةةّت ال ةةةةررو ةةةةذل ت قيةةةةم هةةةةدال ال لةةةةع ع مفّ . رل ال2012 ص23 .) التعليم العالي: ه ال بدع لو فعف ال رج لوقّدال انل ل لرمّد الةد ر ال ّسةت فة رفةّه ال جر ع سفد ال يع الم عل لو جر ع. وي ار2010 ص41 .) الجامعاااة كماااا يقااادمها "ساااتانلي كاااا:" هةةة الرةةة تقةةة دم ال ةةةّفع الفّمةةة هةةة المّ ةةةا لو يةةةع انجر ةةةّ مر ررةةّ خوةةةم لةة ال ةةةا مةةةّهعال مثقمةة تلةةجكع ال لةةةّر ال دركةة ةةد اللو ةةة ت ةة ل ةةّ ال ع كةة انجر ّعكةة تؤسةة لةةع ااط مةةّ وةةية الرفوةةكت انورةةداف الثّر ل. فعارةة ري مّل2010 ص32 .) 548 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ عضو هيئة التدريس: هة ةا مةة نقة م اّلرةدر س فة الجّمفة مةة ح وة شةرّدال الةد ر راه ال ّج ريع س ّهت ف ت قيم هدال الجّمف . Abstract: الف وك الرفوك ك ه مّ وي ّ مفعفره مة جر راع اسسرّ مة خ ل ت دعد ال ف لّت اننجّوكّت مة ّخ ل تأثيع ل وا ج دال الرفوكت مّ اسم ر الر رافقت هذه الرجعا الر مة خ لر ها ن ةةر ع تلبيةةم الرفوةةكت انل رع رةة فةة الجّمفةةّت الفعاقكةة كاكةة تلةة سع هةةذا ال ممةةا ال رةةت اةةّلعخت مةةة ةةدم جةة د الب كةة الر ركةة الرةة تفربةةع ال ةةّج الةةعفك فةة ال رةة ض و الةةع الرفوةةكت خّفةة فةة مجةةّل الرفوةةكت انل رع رةة الةةّف الةةا ردافةة شةة انررعرةةت امةة رال ّمةة الرةة ثعت سوب كّ وا ج دال انتمّل الر افا ف او ّل الغّنة الرة جةدت مةة جوةه نوةد مةة انسةر عار وةد ت ال ؤس ةّت الرفوك كة ال ة ارد ال لةعس الفّموة فة دن مة الرفوةكت انل رع رة ال ر ثوةة اّسسةةّتذال الم يةةية ف ةة ةةة جةة د م رةة ى و ةة خيةةع الةةذل ا رةةّد وكةةه اللّلةةب 549 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) عر ّشةةةا مةةةع الثةةة ر ال الفو كةةة الرّفوةةة فةةة تلبكقةةةّت اسجرةةة ال ا ل رع ركةةة ّل اسةةةيب الر اتةةة . ال ل مع معا ّال تلبيم مفّعيع الج دال اسوّدن ك ال ؤال العفك اسسئو المععك ال ؤال العفك مةّ ثةع الرفوةكت انل رع رة وةا جة دال الرفوةكت الفةّل فة الجّمفةّت الفعاقكة مةة جرة راةةع ّ هيئ الردرس ؟ اسسئو المععك 1 - مّ خمّفر الرفوكت انلکرع ر ؟ 2 - مّ ال رّت الر تؤثع وا ج دال خدمّت الرفوكت الفّل ؟ 3 - مّ الف ل وية الرفوت انلکرع ر الرفوكت الفّل ؟ 4 - مّ ت دنّت الرفوكت انل رع ر ؟ س اسسئو المععك 1 - مّ خمّفر الرفوكت انلکرع ر ؟ 2 - مّ ال رّت الر تؤثع وا ج دال خدمّت الرفوكت الفّل ؟ 3 - مّ الف ل وية الرفوت انلکرع ر الرفوكت الفّل ؟ 4 - مّ ت دنّت الرفوكت انل رع ر ؟ اسسئو المععك 1 - مّ خمّفر الرفوكت انلکرع ر ؟ 2 - مّ ال رّت الر تؤثع وا ج دال خدمّت الرفوكت الفّل ؟ 3 - مّ الف ل وية الرفوت انلکرع ر الرفوكت الفّل ؟ 4 - مّ ت دنّت الرفوكت انل رع ر ؟ أهداف الدراسة 1 - ال ل ة ثع ارف ّسّت افّد اسر دام ال جّمفّت الفعاقك لورفوكت انل رع ر ثةع لة . Abstract: لد لمت ال رّفج ل ال ر سط ال وة لرقةدعع ّ هيئ الردرس وا مقكّ اسر ّر انتجّهّت ر اسةر دام د ات الةرفوت ا ل رع رة ةةةد فةةةعاد الفي ةةة لةةةد ووةةة لةةةدرال3.64 ) إ تبةةةية ل اتجّهةةةّت ةةةّ هيئةةة الرةةةدرس ر ةةة مرلو ةةّت اسةةر دام د ات الةةةرفوت ا ل رع رةةة إنجّوكةة ودرجةةة مر سةةل . ظرةةةعت ال رةةةّفج ةةة ةةةدم جةةة د فةةةع ب ات دنلةةة إحمةةةّفك وةةةية مر سةةةط تقةةةدععات ةةةّ هيئةةة الرةةةدرس ر ةةة مرلو ةةةّت اسةةةر دام د ات الةةةرفوت ا ل رع رةةة تفةةة ى ل رغيةةةعات: الجةةة الجّمفةةة سةةة ات ال بةةةعال وي ةةةّ ظرةةةعت فةةةع ب ات دنلةةة إحمةةةّفك نسةةةرجّاّت ةةةّ هيئةةة الرةةةدرس تفةةة ى ل رغيع الدرج الفو ك لمةّلج ةّ هيئة الرةدرس ودرجة سةرّ . لةدمت الدراسة ةدد مةة الر فةةةكّت ال قرعحةةةّت ه رةةةّ: الف ةةةا وةةةا رفةةةع مرةةةّرات ةةةّ هيئةةة الرةةةدرس فةةة مجةةةّل اسةةةةر دام د ات الةةةةرفوت ا ل رع رةةةة تلةةةةجكفرت وةةةةا اسةةةةر دامرّ تةةةة فيع ال رلو ةةةةّت ال ّدنةةةة . ال ّلك ال ّس نسر دام د ات الرفوت ا ل رع ر 2 - و ةةّ ترج ةةد ه كةة هةةذا ال ةةل فةة ت ةةوكط ال ةة ل لةة ع جةة دال الرفوةةكت و فةةمه الغّنةة اسسّسةةك مةةة الف وكةة الرعا سةة س ثةةا هةةذا اسمةةع قكةةّ ل ةةدى رفةةّر الرفوةةكت الفةةّل فةة الفةةةعاب لرةةةه افةةةد لةةة وةةةا جةةة دال ال ةةةعسج البيئةةة ال كلةةة اةةةه مةةةة خةةة ل م ّرسةةة .ت ممه اّلل ا الذل ن ن بب لعر وا ال جر ع 3 - إل ال ةةةل نفةةةةد مةةةة ال ةةةة ا ال يداركةةة سةةةةك ل مرةةةرت لورفةةةةعل وةةةا الف لةةةة الرةةة تةةةةعاط الجّمفّت الفعاقك اّلرفوكت ا ل رع ر اكّل ج كع ال رغيعات مةدى انسةر دام ال رةّت الرةةةة تةةةةؤثع وةةةةا جةةةة دال خةةةةدمّت الرفوةةةةكت ا لفةةةةّل ال ةةةةوبكّت مف لةةةةّت انسةةةةر دام) الرةةةة ن رقمة رةّ ال ةل سل الرفوةكت انل رع رة تةّثيعه وةا جة دال الرفوةكت الفةّل نقر ةة . Abstract: ال ل ه نجّد ان ّح ح ل ل 4 - مة خ ل الدراس الفو كة لرةذا ال ةل فةم مة رج و ة نفلة ل ةّ تمة ر الةج ن ةرت فةةة مةةةدى ت ظكةةةا الرفوةةةكت انل رع رةةة اّللةةة ا اسمثةةةا د ر لةةة وةةةا جةةة دال م عجةةةّت . الرفوكت الفّل مة خ ل دراس هذا اسمع فم قكّ الردرس يية لو وبكّت ال ج دال الدراسات السابقة هةدفت دراسة ر فةت الف لة2017 ) ال سةة م "اتجّهةّت ةّ هيئة الرةدرس فةة الجّمفّت المو لي ك ر مرلو ّت اسر دام " د ات الرفوكت ا ل رع ر ف الف وك الرفوك ك، إلةةا الرفةةعل وةةا اتجّهةةّت ةةّ هيئةة الرةةدرس فةة الجّمفةةّت المو ةةلي ك ر ةة مرلو ةةّت اسر دام د ات الرفوت ا ل رع ر ف الف وك الرفوك كة مةة جرة راةعهت اسةر دمت الدراسة ال ةةة رج ال فةةةم الر ويوةةة ت رةةةت ي ةةة الدراسةةة مةةة ة286 ) ةةة هيئةةة الرةةةدرس مةةةة جةةةّمفر اسلمةةةا اس هةةةع اغةةة ال ر قةةةت وةةةيرت اسةةةر ّر م رةةة مةةةة31 ) فقةةةعال فةةة الممةةةا الدراس الثّر لوفّم الجّمف2015 / 2016 م. لد لمت ال رّفج ل ال ر سط ال وة لرقةدعع ّ هيئ الردرس وا مقكّ اسر ّر انتجّهّت ر اسةر دام د ات الةرفوت ا ل رع رة ةةةد فةةةعاد الفي ةةة لةةةد ووةةة لةةةدرال3.64 ) إ تبةةةية ل اتجّهةةةّت ةةةّ هيئةةة الرةةةدرس ر ةةة مرلو ةةّت اسةةر دام د ات الةةةرفوت ا ل رع رةةة إنجّوكةة ودرجةةة مر سةةل . ظرةةةعت ال رةةةّفج ةةة ةةةدم جةةة د فةةةع ب ات دنلةةة إحمةةةّفك وةةةية مر سةةةط تقةةةدععات ةةةّ هيئةةة الرةةةدرس ر ةةة مرلو ةةةّت اسةةةر دام د ات الةةةرفوت ا ل رع رةةة تفةةة ى ل رغيةةةعات: الجةةة الجّمفةةة سةةة ات ال بةةةعال وي ةةةّ ظرةةةعت فةةةع ب ات دنلةةة إحمةةةّفك نسةةةرجّاّت ةةةّ هيئةةة الرةةةدرس تفةةة ى ل رغيع الدرج الفو ك لمةّلج ةّ هيئة الرةدرس ودرجة سةرّ . لةدمت الدراسة ةدد مةة الر فةةةكّت ال قرعحةةةّت ه رةةةّ: الف ةةةا وةةةا رفةةةع مرةةةّرات ةةةّ هيئةةة الرةةةدرس فةةة مجةةةّل اسةةةةر دام د ات الةةةةرفوت ا ل رع رةةةة تلةةةةجكفرت وةةةةا اسةةةةر دامرّ تةةةة فيع ال رلو ةةةةّت ال ّدنةةةة . Abstract: ال ّلك ال ّس نسر دام د ات الرفوت ا ل رع ر / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ 2022 / م1444 هـ / جمةل الداب( اجملدل1 ) العدد142 (أيلول) 2022 / م1444 هـ 2 - و ةةّ ترج ةةد ه كةة هةةذا ال ةةل فةة ت ةةوكط ال ةة ل لةة ع جةة دال الرفوةةكت و فةةمه الغّنةة اسسّسةةك مةةة الف وكةة الرعا سةة س ثةةا هةةذا اسمةةع قكةةّ ل ةةدى رفةةّر الرفوةةكت الفةةّل فةة الفةةةعاب لرةةةه افةةةد لةةة وةةةا جةةة دال ال ةةةعسج البيئةةة ال كلةةة اةةةه مةةةة خةةة ل م ّرسةةة .ت ممه اّلل ا الذل ن ن بب لعر وا ال جر ع 3 - إل ال ةةةل نفةةةةد مةةةة ال ةةةة ا ال يداركةةة سةةةةك ل مرةةةرت لورفةةةةعل وةةةا الف لةةةة الرةةة تةةةةعاط الجّمفّت الفعاقك اّلرفوكت ا ل رع ر اكّل ج كع ال رغيعات مةدى انسةر دام ال رةّت الرةةةة تةةةةؤثع وةةةةا جةةةة دال خةةةةدمّت الرفوةةةةكت ا لفةةةةّل ال ةةةةوبكّت مف لةةةةّت انسةةةةر دام) الرةةةة ن رقمة رةّ ال ةل سل الرفوةكت انل رع رة تةّثيعه وةا جة دال الرفوةكت الفةّل نقر ةة . ال ل ه نجّد ان ّح ح ل ل 4 - مة خ ل الدراس الفو كة لرةذا ال ةل فةم مة رج و ة نفلة ل ةّ تمة ر الةج ن ةرت فةةة مةةةدى ت ظكةةةا الرفوةةةكت انل رع رةةة اّللةةة ا اسمثةةةا د ر لةةة وةةةا جةةة دال م عجةةةّت . الرفوكت الفّل مة خ ل دراس هذا اسمع فم قكّ الردرس يية لو وبكّت ال ج دال الدراسات السابقة هةدفت دراسة ر فةت الف لة2017 ) ال سةة م "اتجّهةّت ةّ هيئة الرةدرس فةة الجّمفّت المو لي ك ر مرلو ّت اسر دام " د ات الرفوكت ا ل رع ر ف الف وك الرفوك ك، إلةةا الرفةةعل وةةا اتجّهةةّت ةةّ هيئةة الرةةدرس فةة الجّمفةةّت المو ةةلي ك ر ةة مرلو ةةّت اسر دام د ات الرفوت ا ل رع ر ف الف وك الرفوك كة مةة جرة راةعهت اسةر دمت الدراسة ال ةةة رج ال فةةةم الر ويوةةة ت رةةةت ي ةةة الدراسةةة مةةة ة286 ) ةةة هيئةةة الرةةةدرس مةةةة جةةةّمفر اسلمةةةا اس هةةةع اغةةة ال ر قةةةت وةةةيرت اسةةةر ّر م رةةة مةةةة31 ) فقةةةعال فةةة الممةةةا الدراس الثّر لوفّم الجّمف2015 / 2016 م. Abstract: وا ج دال الرفوكت الفّل قكّ افّده مة جر راع ّ هيئ الردرس 2 - الرفةعل وةةا تةةأثيعات اسةر دام الرفوةةكت انل رع رةة وةةا د ر الجّمفةّت الفعاقكةة فةة جةة دال .الرفوكت الفّل اافّد ل مة جر راع الردرس يية 3 - ال ل ل وا ال. د افع الفّم ال فعدك نسر دام ال ؤس ّت الرفوك ك لورفوكت انل رع ر 4 - . الرفعل وا تأثيع اسر دام الرفوكت انل رع ر وا ال الع الفو 5 - وكّل ارف ّسّت اسر دام الجّمفّت الفعاقك لورفوكت انل رع رة وةا ظكمة الر لةئ لولو ة 1 - ت ةة ه كة ال ةل فةة الةد ر الةذل ن ثوةةه الرفوةكت انل رع رة مةةة جرة الفي ة ال ةةرردف ه تدرس الجّمفّت الفعاقك اّلعخت مة جة د اا ةّا فة هةذا ال جةّل سفةد اللةغا اللةّخا لو ةّحثية فة اة رة اسخيةعال إن ل مج ةا اسا ةّا ال ةّاق لةت تةدر ارف ّسةّت اسةةةر دام هةةةذا ال ةةة ع مةةةة ال رفوةةةكت وةةةا جةةة دال الرفوةةةكت الفةةةّل قكةةةّ لةةة مةةةة جرةةة راةةةع الردرس يية مدى تأثيعه وا م عجّت الرفوكت الفّل ثعهّ وا ال جر ع لذا فإل ال رّفج الرة سةك عل ورةّ هةذا ال ةل سةر ل مر ة اّلةّف جّرةب رة فة دوكةّت هةذا ال جةةّل مةةة خةة ل دراسةة الرةةأثيعات لورفوةةكت انل رع رةة مةة ّدى فّفةةدال لةة مةةة جرةة راةةع ةة . الريئ الردرس ك 550 550 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ 551 2 - و ةةّ ترج ةةد ه كةة هةةذا ال ةةل فةة ت ةةوكط ال ةة ل لةة ع جةة دال الرفوةةكت و فةةمه الغّنةة اسسّسةةك مةةة الف وكةة الرعا سةة س ثةةا هةةذا اسمةةع قكةةّ ل ةةدى رفةةّر الرفوةةكت الفةةّل فةة الفةةةعاب لرةةةه افةةةد لةةة وةةةا جةةة دال ال ةةةعسج البيئةةة ال كلةةة اةةةه مةةةة خةةة ل م ّرسةةة .ت ممه اّلل ا الذل ن ن بب لعر وا ال جر ع 3 - إل ال ةةةل نفةةةةد مةةةة ال ةةةة ا ال يداركةةة سةةةةك ل مرةةةرت لورفةةةةعل وةةةا الف لةةةة الرةةة تةةةةعاط الجّمفّت الفعاقك اّلرفوكت ا ل رع ر اكّل ج كع ال رغيعات مةدى انسةر دام ال رةّت الرةةةة تةةةةؤثع وةةةةا جةةةة دال خةةةةدمّت الرفوةةةةكت ا لفةةةةّل ال ةةةةوبكّت مف لةةةةّت انسةةةةر دام) الرةةةة ن رقمة رةّ ال ةل سل الرفوةكت انل رع رة تةّثيعه وةا جة دال الرفوةكت الفةّل نقر ةة . Abstract: ال ّلك ال ّس نسر دام د ات الرفوت ا ل رع ر 551 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ ةة جة دال إدارال الرفوةكت هةةدفت دراسة رةدى ن يةا م ةد 2014 ) ال سة م "م ةةر ى جةة دال إدارال الرفوةةكت ا ل رع رةة فةة جّمفةة القةةد ال مر حةة مةةة جرةة راةةع ةةّ هيئةةةّت الردرس ف فع رّ ش ّل ال م الغعاك " إلةا مفعفة م ةر ى جة دال إدارال الرفوةكت ا ل رع رة ف جّمف القد ال مر ح مة جر راع ّ هيئّت الردرس ف فع رةّ شة ّل ال ةم الغعاك ف ر ثع ا مة مر غيعات الج ال ؤها الفو ال وك م ةّل ال ة ة) فة ّم ةةر ى جةة دال إدارال الرفوةةكت ا ل رع رةة فةة جّمفةة القةةد ال مر حةة مةةة جرةة راةةع ةة هيئّت الردرس فة فع رةّ شة ّل ال ةم الغعاكة ت ة ل مجر ةع الدراسة مةة ةّ هيئةّت الردرس ف فع ع جّمف القد ال مر ح شة ّل ال ة م الغعاكة ةددهت721 ) اخريةع مة رت ي ةة لةة افك تر ةة ل مةةةة105 ) ةة اسةةر دم فةةة هةةةذه الدراسةة ال ةة رج ال فةةم فةةةرت تم كت اسر ّر لج ةع البكّرةّت ت ة ت63 ) فقةعال ت ةت فة خ ة مجةّنت تةت الر قةم مةةةة فةةةدب اسداال ث ّترةةةّ ثةةةت ةةةت وةةةا فةةةعاد ي ةةة الدراسةةة مةةةة ثةةةت تةةةت ت ويةةةا البكّرةةةّت اّسةةر دام ال ر سةةلّت ال ةةّوك ال رةة انر عافةةّت ال عكّرسةة ت ويةةا الر ةةّعة اسحةةّدل .) اخر ّر ت ت ّ لةةةت دراسةةة امةةة ر فةةةا خويةةةا المةةةكم، 2015 ) ال سةةة م "اتجةةةّه ةةةّ هيئةةة الردرس اجّمف القد ال مر ح ر الرفوكت ا ل رع ر لره امّ وكة الةذات" إلةا مفعفة اتجّه ّ هيئ الردرس اجّمف القد ال مر ح ا ّفاّت خ ال ر الرفوكت انل رع رة و ّ هدفت إلا الرفعل إلا م ر ى فّ وك الذات لدعرت إلّف إلةا ال لة ةة المةع ب وةية مر سلّت انتجّه فّ وك الذات لدعرت فقّ ل رغيعات المعع ال ع انجر ّ الر مر ال ؤهةةةا الفو ةةة سةةة ات ال بةةةعال) ةةةّ هةةةدفت إلةةةا وكةةةّل الف لةةة وةةةية انتجةةةّه ر ةةة الرفوةةةكت انل رع رةة فّ وكةة الةةذات لةةدى ةةّ هيئةة الرةةدرس اجّمفةة القةةد ال مر حةة ا ّفاةةّت خ ال. Abstract: ال ل ه نجّد ان ّح ح ل ل هةدفت دراسة ر فةت الف لة2017 ) ال سةة م "اتجّهةّت ةّ هيئة الرةدرس فةة الجّمفّت المو لي ك ر مرلو ّت اسر دام " د ات الرفوكت ا ل رع ر ف الف وك الرفوك ك، إلةةا الرفةةعل وةةا اتجّهةةّت ةةّ هيئةة الرةةدرس فةة الجّمفةةّت المو ةةلي ك ر ةة مرلو ةةّت اسر دام د ات الرفوت ا ل رع ر ف الف وك الرفوك كة مةة جرة راةعهت اسةر دمت الدراسة ال ةةة رج ال فةةةم الر ويوةةة ت رةةةت ي ةةة الدراسةةة مةةة ة286 ) ةةة هيئةةة الرةةةدرس مةةةة جةةةّمفر اسلمةةةا اس هةةةع اغةةة ال ر قةةةت وةةةيرت اسةةةر ّر م رةةة مةةةة31 ) فقةةةعال فةةة الممةةةا الدراس الثّر لوفّم الجّمف2015 / 2016 م. لد لمت ال رّفج ل ال ر سط ال وة لرقةدعع ّ هيئ الردرس وا مقكّ اسر ّر انتجّهّت ر اسةر دام د ات الةرفوت ا ل رع رة ةةةد فةةةعاد الفي ةةة لةةةد ووةةة لةةةدرال3.64 ) إ تبةةةية ل اتجّهةةةّت ةةةّ هيئةةة الرةةةدرس ر ةةة مرلو ةةّت اسةةر دام د ات الةةةرفوت ا ل رع رةةة إنجّوكةة ودرجةةة مر سةةل . ظرةةةعت ال رةةةّفج ةةة ةةةدم جةةة د فةةةع ب ات دنلةةة إحمةةةّفك وةةةية مر سةةةط تقةةةدععات ةةةّ هيئةةة الرةةةدرس ر ةةة مرلو ةةةّت اسةةةر دام د ات الةةةرفوت ا ل رع رةةة تفةةة ى ل رغيةةةعات: الجةةة الجّمفةةة سةةة ات ال بةةةعال وي ةةةّ ظرةةةعت فةةةع ب ات دنلةةة إحمةةةّفك نسةةةرجّاّت ةةةّ هيئةةة الرةةةدرس تفةةة ى ل رغيع الدرج الفو ك لمةّلج ةّ هيئة الرةدرس ودرجة سةرّ . لةدمت الدراسة ةدد مةة الر فةةةكّت ال قرعحةةةّت ه رةةةّ: الف ةةةا وةةةا رفةةةع مرةةةّرات ةةةّ هيئةةة الرةةةدرس فةةة مجةةةّل اسةةةةر دام د ات الةةةةرفوت ا ل رع رةةةة تلةةةةجكفرت وةةةةا اسةةةةر دامرّ تةةةة فيع ال رلو ةةةةّت ال ّدنةةةة . Abstract: لر قيم هدال هذه الدراس لّم ال ّحل اإ داد اسر ّر ل تجّه فّ وك الذات ت رت ي الدرا س مة90 ) ا مة ّ هيئ الردرس اجّمف القد ال مر ح ا ّفاّت خةةة ال امع رةةةّ ال ةةة تةةةت ت ويةةةا البكّرةةةّت اّسةةةر دام البعرةةةّمج ا حمةةةّفSPSS ) لةةةد :ّت فةةةةةوت الدراسةةةةة إلةةةةةا مج ةةةةة مةةةةةة ال رةةةةةّفج ه رةةةةة1 - إل درجةةةةة انتجةةةةةّه ر ةةةةة الرفوةةةةةكت ا ل رع رةة لةةدى ةةّ هيئةة الرةةدرس اجّمفةة القةةد ال مر حةة لمةةع ع خةة ال ال ةة ّرةةت وةة ل ر ةةب مقةةداره81.1 )% 2 - الدرجةة ال وكةة لمّ وكةة الةةذات لةةدى ةةّ هيئةة الرةةدرس اجّمفةةة القةةةد ال مر حةةة لمةةةع ع خةةةة ال ال ةةة ّرةةةت وةةة ل ر ةةةب80.5 ) إ ت فةةةةوت% الدراس إلا ل فّ وكة ت اةكت الةذات جةّ ت فة ال عت ة اس لةا وة ل ر ةب83.8 ) توةا% لةة الثقةة اّلةةذات وةة ل ر ةةب77.5 ) ثةةت توةةا لةة تم ةةيا ال رةةّم المةةع وةة ل ر ةةب% 76.4 )% 3 - ت جد ل رعدن ات دنل إحمّفك د م ر ى دنلµ ³ 0.05 ) وية 552 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) ّاتجّه ةّ هيئة الرةدرس اجّمفة القةد ال مر حة ر ة الرفوةكت انل رع رة ف وكة الةذات .لدعرت ّ مةةةّ ةةةة مفعفةةة تةةةأثيع ت ل جكةةةّ الرفوةةةكت ا ل رع رةةة وةةةا وكةةة الرمّ ةةةا وةةةية اسسةةةر اللو هدفت دراس ويو اوة م هّر 2015) ) ال س م " الةع اسةر دام ت ل جكةّ الرفوةكت ا ل رع ر اّلجّمف الج افعسة : دراسة اسر لةّدك لفي ة مةة اسسةّتذال اجّمفة لّفة دل معاةّح ّ رلو ر جّ" إلا ا جّا ة الر ّةل العفك ال ر ثا ف : كا عؤثع اسةر دام ت ل جكة الرفوكت ا ل رع ر وا وك الرمّ ا وية اسسرّ اللو ف جّمف لّفةدل معاةّح رلوة ؟ : لإلجّا وا هذا الر ّةل رعحت ال ّحث ث ا سئو فععك1 . مّ اسر دامّت ت ّل جكة الرفوكت اسوثع اهر ّمةّ مةة رةعل اسسةّتذال اجّمفة لّفةدل معاةّح رلوة الرةدرس ال ةل . ال لةةةةع انل رع رةةةة )؟2 . مةةةةّ ال سةةةةّفا الر ل جكةةةة اسوثةةةةع اسةةةةر دامّ مةةةةة رةةةةعل اسسةةةةّتذال اجّمفةةة لّفةةةدل معاةةةّح؟3 ّ. Abstract: كةةةا عةةةؤثع هةةةذا انسةةةر دام وةةةا وكةةة الرمّ ةةةا وةةةية اسسةةةر اللّلةةةةةب؟ لقةةةةةد ات فةةةةةت ال ّحثةةةةة مج ةةةةة مةةةةةة ا جةةةةةعا ات شةةةةة وت ال ةةةةةدخا ال سةةةةةي ل ج الرمّ وكةةةة العم سةةةة ) ال ةةةة رج ال فةةةةم اّن ر ةةةةّد وةةةةا افةةةةض اسد ات لج ةةةةع ال فو مةةةةّت ال حاةة اسةةر ّرال انسةةربكّل) فةة ن إلةةا ال رةةّفج ت ويةةا البكّرةةّت ال رفوقةة ا ةةا ال رةةّفج . تت تلبيم هذه اسداال وا ي مة اسسّتذال ف ا مة وك الفو م ا ر ةّرك انجر ّعكة وكةةة الفوةةة م انلرمةةةّدن وةةة م الرجةةةّرال الر ةةةييع وكةةة اةدا الوغةةةّت اسج بكةةة اجّمفةةة لّفةةدل معاةةةّح رلوةة ال ر ثوةةة فةةة394 سةةرّ تةةةت اخركةةةّر الفي ةة الل قكةةة انحر ّلكةةة حيةل تةت ت سةع79 اسةةر ّرال اسةربكّل اسة ّرعجع م رة56 اسةةر ّرال اسةربكّل. ت فةوت ررةةّفج :الدراس إلا ل اسسّتذال نف و ل وةا اسةر دام ت ل جكةّ الرفوةكت ا ل رع رة هةذا راجةع إلةا اّلعخت الجر د ال بذ ل مة رعل الجّمف ا م ص تل سع الرفوكت الجّمف ل او الرلة ر الفةةّل إ إن رةةه ن الةةت ف ةةعال تلبيةةم الرفوةةكت ا ّل رع رةة اجّمفةة لّفةةدل معاةةّح فةة وةةداعرر الجّمفةةة فةةة معحوةةة اررقّلكةةة لةةةذل فرةةة ت ةةةّ ل جّمفةةة لّفةةةدل معاةةةّح رلوةةة تةةة فيع ةةةا ال سةةةّفا ال دعثةةة القكةةةّم وةةةد رات ت س كةةة لألسةةةّتذال فةةة هةةةذا ال جةةةّل لةةة ل جةةة د افةةةض ال قةةّفر ال لةةّوا فةة افةةض وكةةّت الجّمفةة مةةة وي رةةّ ةةدم تةة فع اللةة الف ب تكةة الةة ا وّل ف الجّمف رقر اليد الفّمو الر ت رع وا ت ية ال دمّت م ةّ م الجرة د م ّ نف ل الجّمف مّ الت افيدال ر ّ مّ ة ت قيم الج دال ف الرفوكت الفّل مة الجّرةب الرق هذا مّ ن ل د ل تلبيم الرفوةكت انل رع رة ففوكةّ فة الجّمفة شةي ع الف و كة الة ا . Abstract: اسع مة خ ل انرمرّح وا الجّمفّت الد لك 553 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ منهجية الدراسة ا ر دت الدراس ال رج ال فم الر ويوة هة حةد م ةّهج ال ةل الفو ة الةذل عةدر ّال الع الاّهعال م ل ع ال ل ّ ه ف الفرّ سررت ال ل فيرّ و فمرّ فمّ دقكقة ّمة جا ال ف ل الا اسر رّج ت ت رت ف الرل سع الرغييع هذه الا اهع ت ل ربكعك اجر ّعك سكّسةك الف عار2013 ص66 ) ت ثوةت ال ةد د ال مّركة لوفةّمية الدراسةية 2019 - 2020 / 2020 - 2021) فةةةةةةةة ال جّمفةةةةةةةةّت الفعاقكةةةةةةةةة ل ّفاةةةةةةةة اغةةةةةةةةداد اغةةةةةةةةداد ّال ر مةةةعس ) ت ثوةةت ال ةةد د ال لةةةعس ل روةة ح وةةة انلقةةة الفو كةةة مةةة الجّمفةةةّت ارمةةة الذ ع ّرت ال د د انجعافك ه الفي ةّت الفلة افك لومئة ال ةرردف ت ثوةت رعسقة ت ميةذ ال ةةل حيةةل نفربعرةة ع ال ةةل م ةةة سمةة مةةة ال ةة ا ال فةةاك مةةة خةةة ل اسةةرف ّل م رج ال ج هة دراسة انجةّد ال قةّفم مةة خة ل ج ةع البكّرةّت ال ّشةعال مةة مجر ة ع ي ة الدراس الذل عرلوب خبعال ف الر لكط الر ويا الرم يع لغعض ال ف ل الا ال رّفج تف د ال ا ال ك مة الدم اللعافم ال رف و ف ال ل الغّنة الرة جةدت مةة اجورةّ هة ال م ل وا ال فو مّت مةة مج ة مةة انفةعاد الة ا م ّشةع س ةر دم ال ة رج ال ة ّ وا رل ب اسع ف ال جّنت الرّلك وت انجر ّع دارال اس ّل الفو م ال كّسك وت انلرمةةّد الرعاكةة وةةت الةة م ان م) اوةة ةة م2013 ص297 ) ّرةةت رعسقةة تج كةةةةع ال فو مةةةةّت مةةةةة خةةةة ل اسةةةةر ّرال انسةةةةربكّل ت ةةةة ت م ةةةةّ ر م ةةةةددال ل ج ةةةة مةةةةة انسرم ّرات ال غوق الر تف اسئو هدال ال ل ّ مبي ة فة ال ةّ ر اسرافة هة وكّرّت ّم لوردرس يية ح ل الرفوكت انل رع رة ال رةّت الرة تةؤثع وةا جة دال خةدمّت الرفوةةكت الفةةّل ال ةةوبكّت ال ف لةةّت) ا ةةّ ل ال ّحةةل هةة مةةة لةة ة الفةةّموية فةة مجةةّل الفي ال رردف سر ل معالبر ه ل و الرفّما مع الرفوكت انل رع ر اكةّل مو ظّتةه حة ل . عرض نتائج االستبانة و حليلها و اسيرها عرض نتائج االستبانة و حليلها و اسيرها مة جا ت قيةم هةذا الرةدل جةعى تلبيةم انسةر ّر وةا فةعاد ي ة م رة مةة 313 ) تدرس ةةة مةةةة الجّمفةةةّت الفعاقكةةة حيةةةل ووةةة مجر ةةةع الدراسةةة1683 ) تدرس ةةة مةةةة م روةةة اسلقّ الفو ك خعجت ال لوفي فم لةّر ل "وة عاعة" هة مفّدلة مةة وثةع اللعافةم ال ةرف و ل ةّ حجةت الفي ةة انحمةّفك فةم ر ة الثقةة95 إ ظرةعت ررةّفج ال ةةل% إل د ر الرفوك ت ا ل رع ر حد سة ّ تةدر جة دال الرفوةكت فة الجّمفةّت الفعاقكة مةة خة ل ّ مقّررةة وةةةية مر سةةةط ال ةةةّو ال ر سةةةط المعلةة ال د ر الرفوةةةكت انل رع رةةة عةةة ف سةةةو وةةا الةةع جةة دال الرفوةةكت فةة الجّمفةةةّت الفعاقكةة قكةةّ لةة مةةة جرةة راةةع ةةّ هيئةة الرةةةدرس ةةةّ ظرةةةعت ررةةةّفج ال ةةة ل إل ه ةةةّ تةةةأثيعا الةةة ّ لورفوةةةكت انل رع رةةة ا ةةةةدى اسةةرف ّل خمةةّفر الرفوةةكت مةةة خةة ل ال قّررةة وةةية ال ر سةةط ال ةةّو ال ر سةةط المعلةة سفوةا ال ّحةل ال سةةبب لة فةة ارفةدام البةةدافا فة ظةا تملةة جّف ة ر رةةّ دفةع اّلقةةّف ية وةةا ال الةةع الرعاةة ل الةةا ات ةةّ الرفوةةكت انل رع رةة لغةةع ض ت ةةدل اس مةة ةةدم لةةكّع الفةةّم الدراس األا ال ّفع ةّ ظرةعت ال رةّفج ل ه ّلة تةأثيع الةج وةا الةع الرفوةكت الفةّل ا ؤشعات الج دال عرأثع الع الرفوكت الفّل ا ؤشعات الج دال سم ةع ال ّحةل لرةذا المةعض اةأل ال الةةةع الفو ةةة ال ةةةّتج ةةةة ال عجةةةّت الفو كةةة لو ؤس ةةةّت اسوّدن كةةة مةةةدى تةةةأثيعه اةةةّلرفوكت .انل رع ر كاك نف د اّل مع وا ال الع الفو اّل مو وا ال جر ع . حليل عالقة االر باط واالنحدار بين متغيرات البحث واختبار الارضية األصلية المعلةك اسفةوك: ت جةد لة ارت ةّ ات دنلة مف سة وةية الرفوةكت انل رع رة ثةعه . Abstract: ل منهجية الدراسة د ات تج كع ال فو مّت 1 - رعسق ال ر 2 - انررعرت 3 - ال رب ال لب صدق وثبات االستبانة ّوو مفّما المةّ رر ة-.033 0762 ) مةة الف ّفةع ال ّلغة44 ) سةؤال لة ة م ّ ر انسر ّر تت ةعض انسةر ّر وةا ةدد مةة ال ةية فة مجةّل ان ة م رعافةم .الردرس لبكّل فدب انسربكّل د ات تج كع ال فو مّت 1 - رعسق ال ر 2 - انررعرت 3 - ال رب ال لب صدق وثبات االستبانة ّوو مفّما المةّ رر ة-.033 0762 ) مةة الف ّفةع ال ّلغة44 ) سةؤال لة ة م ّ ر انسر ّر تت ةعض انسةر ّر وةا ةدد مةة ال ةية فة مجةّل ان ة م رعافةم .الردرس لبكّل فدب انسربكّل صدق وثبات االستبانة ّوو مفّما المةّ رر ة-.033 0762 ) مةة الف ّفةع ال ّلغة44 ) سةؤال لة ة م ّ ر انسر ّر تت ةعض انسةر ّر وةا ةدد مةة ال ةية فة مجةّل ان ة م رعافةم .الردرس لبكّل فدب انسربكّل 554 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) / مةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ عرض نتائج االستبانة و حليلها و اسيرها مة جا ت قيةم هةذا الرةدل جةعى تلبيةم انسةر ّر وةا فةعاد ي ة م رة مةة 313 ) تدرس ةةة مةةةة الجّمفةةةّت الفعاقكةةة حيةةةل ووةةة مجر ةةةع الدراسةةة1683 ) تدرس ةةة مةةةة م روةةة اسلقّ الفو ك خعجت ال لوفي فم لةّر ل "وة عاعة" هة مفّدلة مةة وثةع اللعافةم ال ةرف و ل ةّ حجةت الفي ةة انحمةّفك فةم ر ة الثقةة95 إ ظرةعت ررةّفج ال ةةل% إل د ر الرفوك ت ا ل رع ر حد سة ّ تةدر جة دال الرفوةكت فة الجّمفةّت الفعاقكة مةة خة ل ّ مقّررةة وةةةية مر سةةةط ال ةةةّو ال ر سةةةط المعلةة ال د ر الرفوةةةكت انل رع رةةة عةةة ف سةةةو وةةا الةةع جةة دال الرفوةةكت فةة الجّمفةةةّت الفعاقكةة قكةةّ لةة مةةة جرةة راةةع ةةّ هيئةة الرةةةدرس ةةةّ ظرةةةعت ررةةةّفج ال ةةة ل إل ه ةةةّ تةةةأثيعا الةةة ّ لورفوةةةكت انل رع رةةة ا ةةةةدى اسةةرف ّل خمةةّفر الرفوةةكت مةةة خةة ل ال قّررةة وةةية ال ر سةةط ال ةةّو ال ر سةةط المعلةة سفوةا ال ّحةل ال سةةبب لة فةة ارفةدام البةةدافا فة ظةا تملةة جّف ة ر رةةّ دفةع اّلقةةّف ية وةةا ال الةةع الرعاةة ل الةةا ات ةةّ الرفوةةكت انل رع رةة لغةةع ض ت ةةدل اس مةة ةةدم لةةكّع الفةةّم الدراس األا ال ّفع ةّ ظرةعت ال رةّفج ل ه ّلة تةأثيع الةج وةا الةع الرفوةكت الفةّل ا ؤشعات الج دال عرأثع الع الرفوكت الفّل ا ؤشعات الج دال سم ةع ال ّحةل لرةذا المةعض اةأل ال الةةةع الفو ةةة ال ةةةّتج ةةةة ال عجةةةّت الفو كةةة لو ؤس ةةةّت اسوّدن كةةة مةةةدى تةةةأثيعه اةةةّلرفوكت .انل رع ر كاك نف د اّل مع وا ال الع الفو اّل مو وا ال جر ع عرض نتائج االستبانة و حليلها و اسيرها خ ل قكّ ل مة جر راع ّ هيئ الردرس المةةةعض اس ل: ت جةةةد لةةة ارت ةةةّ ات دنلةةة مف سةةة وةةةية الرفوةةةكت انل رع رةةة د ره وةةةا . مرّرت اللو ج دال الرفوكت الفّل مة جا ت قيم هذه المعلك ا ر د وا م ر ال رّت الر تؤثع وا ج دال خدمّت الرفوكت الفّل سوبكّت الرفوكت ا ل رع ر تت تلبيةم وةا فةعاد ي ة ال ةل ال ّلغة313 ) تدرس ةة إ لةةّم ال ّحةةل اّسةةر عال ال ر سةةط ال ةةّو انر ةةعال ال عكةةّرل القك ةة الرّفكةة إ وو ال ر سط ال ّو15,38 ) اّر عال معكّرل لدره4,25 ) وي ّ وو ال ر سط المعل وةةةية وةةةا ر ةةة15,85 ) الةةةا ر ةةة14,91 ) لغةةةعض مفعفةةة دنلةةة المةةةعب وي ر ةةةّ تةةةت اسةةرف ّل انخر ةةّر الرةةّفt-test ) إ ووغةةت القك ةة الرّفكةة ال ةة ا64,01) م ةةر ى دنلةةة0,05 ) درجةةة حعسةةة312 ) ظرةةةع ل ه ّلةةة تةةةأثيع الةةةج لورفوةةةكت انل رع رةةة تأثيعه وا ج دال الرفوكت الفّل , ّ م لج ف الجد ل رلت2 ) ررّفج انخر ةّر الرةّفt- test ال رغيعات حجت الفي ال ر سط ال ّو انر عال ال عكّرل مفّما ّ انرت درج ال عس القك الرّفك م ر ى الدنل ال ر الثّر 313 15,71 3,79 136. 312 64,01 0,05 ال ر الثّلل 7,91 2,02 المةةةعض الثةةةّر : ت جةةد لةةة ارت ةةةّ ات دنلةةة مف سةةة وةةةية ال ةة ارد ال ّلكةةة جةة دال الرفوةةةكت . الفّل مة جا ت قيم هذا المعض ا ر ةد ال ّحةل وةا مرغيةع ال ر ة م ة ر مف لةّت الرفوةكت ا ل رع رةة ربةةم انسةةر ّر وةةا فةةعاد ي ةة ال ةةل ال ّلغةة313)تدرس ةة مةةة الجّمفةةّت الفعاقكةة إ لةةّم ال ّحةةل اّسةةر عال ال ر سةةط ال ةةّو انر ةةعال ال عكةةّرل القك ةة الرّفكةة إ تةةت اسةةر عال ال رةةّفج ال بي ةة فةة الجةةد ل1 ) اّسةةرف ّل ال سةةّفا ا حمةةّفك انسةةرفّر اّل قي ةة ا حمةةّفك لوفوةة م انجر ّعكةة ال م ةةكSPSS ) لر قيةةم هةةدال ال ةةل ال ةةّل حيل ع ف د ر الرفوكت انل رع ر سو ّ وا الع جة دال الرفوةكت فة الجّمفةّت الفعاقكة مةة . خ ل قكّ ل مة جر راع ّ هيئ الردرس المةةةعض اس ل: ت جةةةد لةةة ارت ةةةّ ات دنلةةة مف سةةة وةةةية الرفوةةةكت انل رع رةةة د ره وةةةا . عرض نتائج االستبانة و حليلها و اسيرها وا ج دال الرفوكت الفّل ف الجّمفّت الفعاقك مةةة جةةا ت قيةةم هةةذا الرةةدل تةةت تلبيةةم انسةةر ّر وةةا فةةعاد ي ةة م رةة مةةة313 ) تدرس مة الجّمفّت الفعاقك اخذ مرغيع ال ر ال ر الثّر ال رّت الر تؤثع وةا ج دال خدمّت الرفوكت الفّل إ لّم ال ّحل اّسر عال ال ر سط ال ّو انر عال ال عكّرل القك ةة الرّفكةة إ ووةة ال ر سةةط ال ةةّو13,17 ) اةةّر عال معكةةّرل لةةدره3,65 ّ) وي ةة وو ال ر سط المعل وية وا ر13,58 ) الا ر12,76 ) لغعض مفعفة دنلة المةةةةعب وي ر ةةةةّ تةةةةت اسةةةةرف ّل انخر ةةةةّر الرةةةةّفt-test ) إ ووغةةةةت القك ةةةة الرّفكةةةة ال ةةةة ا 63,70 ) م ر ى دنل0,05 ) درج حعس312 ) ظرع إل د ر الرفوكت ا ل رع ر حةةد سةة ّ تةةدر جةة دال الرفوةةكت الجّمفةةّت الفعاقكةة ةةّ م لةةج فةة الجةةد ل رلةةت1 ) ررةةّفج انخر ّر الرّفt-test . مةةة جةةا ت قيةةم هةةذا الرةةدل تةةت تلبيةةم انسةةر ّر وةةا فةةعاد ي ةة م رةة مةةة313 ) تدرس مة الجّمفّت الفعاقك اخذ مرغيع ال ر ال ر الثّر ال رّت الر تؤثع وةا ج دال خدمّت الرفوكت الفّل إ لّم ال ّحل اّسر عال ال ر سط ال ّو انر عال ال عكّرل القك ةة الرّفكةة إ ووةة ال ر سةةط ال ةةّو13,17 ) اةةّر عال معكةةّرل لةةدره3,65 ّ) وي ةة وو ال ر سط المعل وية وا ر13,58 ) الا ر12,76 ) لغعض مفعفة دنلة المةةةةعب وي ر ةةةةّ تةةةةت اسةةةةرف ّل انخر ةةةةّر الرةةةةّفt-test ) إ ووغةةةةت القك ةةةة الرّفكةةةة ال ةةةة ا 63,70 ) م ر ى دنل0,05 ) درج حعس312 ) ظرع إل د ر الرفوكت ا ل رع ر حةةد سةة ّ تةةدر جةة دال الرفوةةكت الجّمفةةّت الفعاقكةة ةةّ م لةةج فةة الجةةد ل رلةةت1 ) ررةةّفج انخر ّر الرّفt-test . 555 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ ال رغيعات حجت الفي ال ر سط ال ّو انر عال ال عكّرل مفّما ّ انرت درج ال عس القك الرّفك م ر ى الدنل ال ر الثّر 313 15,71 3,79 299. 312 63,70 0,05 ال ر 2,54 615. عرض نتائج االستبانة و حليلها و اسيرها تةةت اسةةر عال ال رةةّفج ال بي ةة فةة الجةةد ل1 ) اّسةةرف ّل ال سةةّفا ا حمةةّفك انسةةرفّر اّل قي ةة ا حمةةّفك لوفوةة م انجر ّعكةة ال م ةةكSPSS ) لر قيةةم هةةدال ال ةةل ال ةةّل حيل ع ف د ر الرفوكت انل رع ر سو ّ وا الع جة دال الرفوةكت فة الجّمفةّت الفعاقكة مةة . خ ل قكّ ل مة جر راع ّ هيئ الردرس المةةةعض اس ل: ت جةةةد لةةة ارت ةةةّ ات دنلةةة مف سةةة وةةةية الرفوةةةكت انل رع رةةة د ره وةةةا . مرّرت اللو ج دال الرفوكت الفّل مة جا ت قيم هذه المعلك ا ر د وا م ر ال رّت الر تؤثع وا ج دال خدمّت الرفوكت الفّل سوبكّت الرفوكت ا ل رع ر تت تلبيةم وةا فةعاد ي ة ال ةل ال ّلغة313 ) تدرس ةة إ لةةّم ال ّحةةل اّسةةر عال ال ر سةةط ال ةةّو انر ةةعال ال عكةةّرل القك ةة الرّفكةة إ وو ال ر سط ال ّو15,38 ) اّر عال معكّرل لدره4,25 ) وي ّ وو ال ر سط المعل وةةةية وةةةا ر ةةة15,85 ) الةةةا ر ةةة14,91 ) لغةةةعض مفعفةةة دنلةةة المةةةعب وي ر ةةةّ تةةةت اسةةرف ّل انخر ةةّر الرةةّفt-test ) إ ووغةةت القك ةة الرّفكةة ال ةة ا64,01 ) م ةةر ى دنلةةة0,05 ) درجةةة حعسةةة312 ) ظرةةةع ل ه ّلةةة تةةةأثيع الةةةج لورفوةةةكت انل رع رةةة تأثيعه وا ج دال الرفوكت الفّل , ّ م لج ف الجد ل رلت2 ) ررّفج انخر ةّر الرةّفt- test ال رغيعات حجت الفي ال ر سط ال ّو انر عال ال عكّرل مفّما ّ انرت درج ال عس القك الرّفك م ر ى الدنل / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ ال رغيعات حجت الفي ال ر سط ال ّو انر عال ال عكّرل مفّما ّ انرت درج ال عس القك الرّفك م ر ى الدنل ال ر الثّر 313 15,71 3,79 299. 312 63,70 0,05 ال ر 2,54 615. ال ر الثّر 313 15,71 3,79 299. 312 63,70 0,05 ال ر 2,54 615. تةةت اسةةر عال ال رةةّفج ال بي ةة فةة الجةةد ل1 ) اّسةةرف ّل ال سةةّفا ا حمةةّفك انسةةرفّر اّل قي ةة ا حمةةّفك لوفوةة م انجر ّعكةة ال م ةةكSPSS ) لر قيةةم هةةدال ال ةةل ال ةةّل حيل ع ف د ر الرفوكت انل رع ر سو ّ وا الع جة دال الرفوةكت فة الجّمفةّت الفعاقكة مةة . عرض نتائج االستبانة و حليلها و اسيرها مرّرت اللو ج دال الرفوكت الفّل مة جا ت قيم هذه المعلك ا ر د وا م ر ال رّت الر تؤثع وا ج دال خدمّت الرفوكت الفّل سوبكّت الرفوكت ا ل رع ر تت تلبيةم وةا فةعاد ي ة ال ةل ال ّلغة313 ) تدرس ةة إ لةةّم ال ّحةةل اّسةةر عال ال ر سةةط ال ةةّو انر ةةعال ال عكةةّرل القك ةة الرّفكةة إ وو ال ر سط ال ّو15,38 ) اّر عال معكّرل لدره4,25 ) وي ّ وو ال ر سط المعل وةةةية وةةةا ر ةةة15,85 ) الةةةا ر ةةة14,91 ) لغةةةعض مفعفةةة دنلةةة المةةةعب وي ر ةةةّ تةةةت اسةةرف ّل انخر ةةّر الرةةّفt-test ) إ ووغةةت القك ةة الرّفكةة ال ةة ا64,01 ) م ةةر ى دنلةةة0,05 ) درجةةة حعسةةة312 ) ظرةةةع ل ه ّلةةة تةةةأثيع الةةةج لورفوةةةكت انل رع رةةة تأثيعه وا ج دال الرفوكت الفّل , ّ م لج ف الجد ل رلت2 ) ررّفج انخر ةّر الرةّفt- test مة جا ت قيم هذا المعض ا ر ةد ال ّحةل وةا مرغيةع ال ر ة م ة ر مف لةّت الرفوةكت ا ل رع رةة ربةةم انسةةر ّر وةةا فةةعاد ي ةة ال ةةل ال ّلغةة313 )تدرس ةة مةةة الجّمفةةّت الفعاقكةة إ لةةّم ال ّحةةل اّسةةر عال ال ر سةةط ال ةةّو انر ةةعال ال عكةةّرل القك ةة الرّفكةة إ 556 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ 2022 / م1444 هـ ةجدمج م وو ال ر سط ال ّو15,36 ) اّر عال معكّرل لدره3,39 ) وي ّ وو ال ر سط المعل وةةةية وةةةا ر ةةة15,73 ) الةةةا ر ةةة14,98 ) لغةةةعض مفعفةةة دنلةةة المةةةعب وي ر ةةةّ تةةةت اسةةرف ّل انخر ةةّر الرةةّفt-test ) إ ووغةةت القك ةة الرّفكةة ال ةة ا79,95 ) م ةةر ى دنل0,05 ) درج حعس312 ) ظرع ل ه ّل تأثيع الج وا الةع الرفوةكت الفةّل ّا ّ ن ر ال ارد ال ّلك اّ ر ّرهّ احد ال ف لّت مّم تلبيم الج دال ف الرفوةكت الفةّل ة م لج ف الجد ل3 ) ررّفج انخر ّر الرّفt-test . ال رغيعات حجت الفي ال ر سط ال ّو انر عال ال عكّرل مفّما ّ انرت درج ال عس القك الرّفك م ر ى الدنل ال رالعااع 313 17,89 3,39 089. 312 79,95 0,05 ال ر 2,54 615. عرض نتائج االستبانة و حليلها و اسيرها عرةةةأثع الةةةع الرفوةةةكت الفةةةّل ا ؤشةةةعات الجةةة دال سم ةةةع ال ّحةةةل لرةةةذا المةةةعض اةةةأل ال الةةةع الفو ال ّتج ة ال عجةّت الفو كة لو ؤس ةّت اسوّدن كة مةدى تةأثيعه اةّلرفوكت انل رع رة كاك نف د اّل مع وا ال الع الفو اّل مو وا ال جر ع. المعض الثّلل : ت جد ل ارت ّ ات دنل مف س وية اسةر دام الرق كةّت انسةرعاتكجكّت . الرفوك ك ج دال الرفوكت الفّل مةة جةةا ت قيةةم هةذا المةةعض ا ر ةةد ال ّحةل وةةا مرغيةةع ال ر ة ال ةة ر ان ل وكّرةةّت ّمةة لوردرس ةةيية حةة ل الرفوةةكت انل رع رةة ربةةم انسةةر ّر وةةا فةةعاد ي ةة ال ةةل ال ّلغةة 313 ) تدرس ةةةةة مةةةةةة الجّمفةةةةةّت الفعاقكةةةةة إ لةةةةةّم ال ّحةةةةةل اّسةةةةةر عال ال ر سةةةةةط ال ةةةةةّو انر عال ال عكّرل الق ك الرّفك إ وو ال ر سط ال ّو28,56 ) اّر عال معكّرل لدره 3,98 ) وي ةةةّ ووةةة ال ر سةةةط المعلةةة وةةةية وةةةا ر ةةة29,00 ) الةةةا ر ةةةة28,11 ) لغةةعض مفعفةة دنلةة المةةعب وي ر ةةّ تةةت اسةةرف ّل انخر ةةّر الرةةّفt-test ) إ ووغةةت القك ةة الرّفكةةة ال ةةة ا126.85) م ةةةر ى دن لةةة0,05 ) درجةةة حعسةةة312 ) ظرةةةع ل ه ّلةة تةةأثيع الةةج وةةا الةةع الرفوةةكت الفةةّل ا ةةّ ن ةةر اسةةر دام الرق كةةّت انسةةرعاتكجكّت الرفوك ك اّ ر ّرهّ حد مق مّت الج دال فة الرفوةكت الفةّل ةّ م لةج فة الجةد ل رلةت4 ) ررّفج انخر ّر الرّفt-test . اسةةرف ّل الرفوةةكت انل رع رةة مةةة لبةةا ال ؤس ةةّت اسوّدن كةة مفعفةة مةةدى الف لةة الرةة . نجب لوردرس يية ل نق م ا ورّ خ ل الف وك الرفوك ك تأثيع ل ان ّ وا ال جر ع وو ال ر سط ال ّو15,36 ) اّر عال معكّرل لدره3,39 ) وي ّ وو ال ر سط المعل وةةةية وةةةا ر ةةة15,73 ) الةةةا ر ةةة14,98 ) لغةةةعض مفعفةةة دنلةةة المةةةعب وي ر ةةةّ تةةةت اسةةرف ّل انخر ةةّر الرةةّفt-test ) إ ووغةةت القك ةة الرّفكةة ال ةة ا79,95 ) م ةةر ى دنل0,05 ) درج حعس312 ) ظرع ل ه ّل تأثيع الج وا الةع الرفوةكت الفةّل ّا ّ ن ر ال ارد ال ّلك اّ ر ّرهّ احد ال ف لّت مّم تلبيم الج دال ف الرفوةكت الفةّل ة م لج ف الجد ل3 ) ررّفج انخر ّر الرّفt-test . عرض نتائج االستبانة و حليلها و اسيرها ج دال الرفوكت الفّل مة جا ت قيم هذا المعض ا ر د ال ّحل وا ال ر اس ل وكّرّت ّم لوردرس ةيية حةة ل الرفوةةكت انل رع رةة م ةة ر ال ف لةةّت ربةةم انسةةر ّر وةةا فةةعاد ي ةة ال ةةل ال ّلغةة 313 ) تدرس ةةةة مةةةةة الجّمفةةةةةّت الفعاقكةةةةة إ لةةةةةّم ال ّحةةةةل اّسةةةةةر عال ال ر سةةةةةط ال ةةةةةّو انر عال ال عكّرل ا لقك الرّفك إ وو ال ر سط ال ّو13,20 ) اّر عال معكّرل لدره 4 91 ) وي ةةةّ ووةةة ال ر سةةةط المعلةةة وةةةية وةةةا ر ةةة13 74 ) لةةةا ر ةةة12,65 ) لغةةعض مفعفةة دنلةة المةةعب وي ر ةةّ تةةت اسةةرف ّل انخر ةةّر الرةةّفt-test ) إ ووغةةت القك ةة الرّفك ال ا47,52 ) م ر ى د نل0,05 ) درج حعس312 ) ظرع ل ه ّل تأثيع الةج وةا الةع الرفوةكت الفةّل ا ةّ ن ةر اسةر دام الرق كةّت انسةرعاتكجكّت الرفوك كة و فةةةمرّ حةةد مق مةةةّت الجةة دال فةةة الرفوةةكت الفةةةّل ةةةّ م لةةج فةةة الجةةد ل رلةةت5 ) ررةةةّفج انخر ّر الرّفt-test . ال رغيعات حجت الفي ال ر سط ال ّو انر عال ال عكّرل مفّما ّ انرت درج ال عس القك الرّفك م ر ى الدنل ال ران ل 313 31,09 4,04 137. 312 47,52 0,05 ال ر العااع 17,89 3,39 البيانات األولية ألعضاء الهيئة التدريسية الج جد ل6 ) ع ال ال ئ س ارثا ال ال ئ س / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ ال رغيعات حجت الفي ال ر سط ال ّو انر عال ال عكّرل مفّما ّ انرت درج ال عس القك الرّفك م ر ى الدنل ال ران ل 313 31,09 4,04 175. 312 126.85 0,05 ال ر 2,54 615. المةةعض العااةةع: ت جةةد لةة ارت ةةّ ات دنلةة مف سةة وةةية القكةةّدات ا دارسةة فةة الجّمفةةّت . عرض نتائج االستبانة و حليلها و اسيرها ال رغيعات حجت الفي ال ر سط ال ّو انر عال ال عكّرل مفّما ّ انرت درج ال عس القك الرّفك م ر ى الدنل ال رالعااع 313 17,89 3,39 089. 312 79,95 0,05 ال ر 2,54 615. ا عرةةةأثع الةةةع الرفوةةةكت الفةةةّل ا ؤشةةةعات الجةةة دال سم ةةةع ال ّحةةةل لرةةةذا المةةةعض اةةةأل ال الةةةع الفو ال ّتج ة ال عجةّت الفو كة لو ؤس ةّت اسوّدن كة مةدى تةأثيعه اةّلرفوكت انل رع رة كاك نف د اّل مع وا ال الع الفو اّل مو وا ال جر ع. المعض الثّلل : ت جد ل ارت ّ ات دنل مف س وية اسةر دام الرق كةّت انسةرعاتكجكّت . الرفوك ك ج دال الرفوكت الفّل مةة جةةا ت قيةةم هةذا المةةعض ا ر ةةد ال ّحةل وةةا مرغيةةع ال ر ة ال ةة ر ان ل وكّرةةّت ّمةة لوردرس ةةيية حةة ل الرفوةةكت انل رع رةة ربةةم انسةةر ّر وةةا فةةعاد ي ةة ال ةةل ال ّلغةة 313 ) تدرس ةةةةة مةةةةةة الجّمفةةةةةّت الفعاقكةةةةة إ لةةةةةّم ال ّحةةةةةل اّسةةةةةر عال ال ر سةةةةةط ال ةةةةةّو انر عال ال عكّرل الق ك الرّفك إ وو ال ر سط ال ّو28,56 ) اّر عال معكّرل لدره 3,98 ) وي ةةةّ ووةةة ال ر سةةةط المعلةةة وةةةية وةةةا ر ةةة29,00 ) الةةةا ر ةةةة28,11 ) لغةةعض مفعفةة دنلةة المةةعب وي ر ةةّ تةةت اسةةرف ّل انخر ةةّر الرةةّفt-test ) إ ووغةةت القك ةة الرّفكةةة ال ةةة ا126.85) م ةةةر ى دن لةةة0,05 ) درجةةة حعسةةة312 ) ظرةةةع ل ه ّلةة تةةأثيع الةةج وةةا الةةع الرفوةةكت الفةةّل ا ةةّ ن ةةر اسةةر دام الرق كةةّت انسةةرعاتكجكّت الرفوك ك اّ ر ّرهّ حد مق مّت الج دال فة الرفوةكت الفةّل ةّ م لةج فة الجةد ل رلةت4 ) ررّفج انخر ّر الرّفt-test . اسةةرف ّل الرفوةةكت انل رع رةة مةةة لبةةا ال ؤس ةةّت اسوّدن كةة مفعفةة مةةدى الف لةة الرةة . نجب لوردرس يية ل نق م ا ورّ خ ل الف وك الرفوك ك تأثيع ل ان ّ وا ال جر ع 557 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ ال رغيعات حجت الفي ال ر سط ال ّو انر عال ال عكّرل مفّما ّ انرت درج ال عس القك الرّفك م ر ى الدنل ال ران ل 313 31,09 4,04 175. 312 126.85 0,05 ال ر 2,54 615. المةةعض العااةةع: ت جةةد لةة ارت ةةّ ات دنلةة مف سةة وةةية القكةةّدات ا دارسةة فةة الجّمفةةّت . عرض نتائج االستبانة و حليلها و اسيرها ج دال الرفوكت الفّل مة جا ت قيم هذا المعض ا ر د ال ّحل وا ال ر اس ل وكّرّت ّم لوردرس ةيية حةة ل الرفوةةكت انل رع رةة م ةة ر ال ف لةةّت ربةةم انسةةر ّر وةةا فةةعاد ي ةة ال ةةل ال ّلغةة 313 ) تدرس ةةةة مةةةةة الجّمفةةةةةّت الفعاقكةةةةة إ لةةةةةّم ال ّحةةةةل اّسةةةةةر عال ال ر سةةةةةط ال ةةةةةّو انر عال ال عكّرل ا لقك الرّفك إ وو ال ر سط ال ّو13,20 ) اّر عال معكّرل لدره 4 91 ) وي ةةةّ ووةةة ال ر سةةةط المعلةةة وةةةية وةةةا ر ةةة13 74 ) لةةةا ر ةةة12,65 ) لغةةعض مفعفةة دنلةة المةةعب وي ر ةةّ تةةت اسةةرف ّل انخر ةةّر الرةةّفt-test ) إ ووغةةت القك ةة الرّفك ال ا47,52 ) م ر ى د نل0,05 ) درج حعس312 ) ظرع ل ه ّل تأثيع الةج وةا الةع الرفوةكت الفةّل ا ةّ ن ةر اسةر دام الرق كةّت انسةرعاتكجكّت الرفوك كة و فةةةمرّ حةةد مق مةةةّت الجةة دال فةةة الرفوةةكت الفةةةّل ةةةّ م لةةج فةةة الجةةد ل رلةةت5 ) ررةةةّفج انخر ّر الرّفt-test . البيانات األولية ألعضاء الهيئة التدريسية الج جد ل6 ) الج ع ال ال ئ س ارثا ال ال ئ س 169 54% 144 46% 558 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ اللرّدال جد ل7 ) اللرّدال دوو م ّل مّج ريع د ر راه الفدد ال ال ئ س الفدد ال ال ئ س الفدد ال ال ئ س 20 6.40% 105 33.54% 188 60.06% البدائل والنسبة المئوية ال ر اس ل : وكّرّت ّم لوردرس يية ح ل الرفوكت انل رع ر جد ل رلت8 ) ت المقعات البدعا الر عار ال ال ئ س 1- هةةةةةةا ت جةةةةةةةد لّ ةةةةةةّت مر ممةةةةةةة فةةةةةةة الجّمف ت ّم الرفوكت انل رع ر. رفت 124 39.62% ن 189 60.38% 2- هةةا ت جةةد شةة إررعرةةت مرةة فعال امةة رال داف ةة س ّ الريئ. الردرس ك ف ال وك رفت 237 75.72% ن 76 24.28% 3- . عرض نتائج االستبانة و حليلها و اسيرها مّ مدى اجّدت نسر دام ال ّس ّم ر 147 46.96% جيد جدا 118 37.70% جيد 48 15.34% 4- مةةةّ مةةةدى اسةةةر دام ل ع ةةةّت ال ةةةل لو مةةة ل وةةةا مفو مةةةّت حةةة ل ال ةةةّدال الدراسةةةةك اإكةةةة إخ ةةةةّ ال ّلةةةةعال ورةةةةذه .ال فو مّت ام رال م ر عال 233 74.44% ّلويا الا حد م 70 22.36% ن اسر دم 10 3.20% 5- ا در اسرث ّفك لغةعض الر افةا ّمةةع اللو ةة لغةةعض ت ةةّدل ال بةةعات دك ةة .وي رت ام رال م ر عال 165 52.71% ّلويا الا حد م 113 36.11% ن اسر دم35 11.18% / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ اللرّدال جد ل7 ) اللرّدال دوو م ّل مّج ريع د ر راه الفدد ال ال ئ س الفدد ال ال ئ س الفدد ال ال ئ س 20 6.40% 105 33.54% 188 60.06% ة ال ئ ة ال ائل الن 559 20 6.40% 105 33.54% 188 60.06% البدائل والنسبة المئوية ال ر اس ل : وكّرّت ّم لوردرس يية ح ل الرفوكت انل رع ر جد ل رلت8 ) ت المقعات البدعا الر عار ال ال ئ س 1- هةةةةةةا ت جةةةةةةةد لّ ةةةةةةّت مر ممةةةةةةة فةةةةةةة الجّمف ت ّم الرفوكت انل رع ر. رفت 124 39.62% ن 189 60.38% 2- هةةا ت جةةد شةة إررعرةةت مرةة فعال امةة رال داف ةة س ّ الريئ. الردرس ك ف ال وك رفت 237 75.72% ن 76 24.28% 3- . مّ مدى اجّدت نسر دام ال ّس ّم ر 147 46.96% جيد جدا 118 37.70% جيد 48 15.34% 4- مةةةّ مةةةدى اسةةةر دام ل ع ةةةّت ال ةةةل لو مةةة ل وةةةا مفو مةةةّت حةةة ل ال ةةةّدال الدراسةةةةك اإكةةةة إخ ةةةةّ ال ّلةةةةعال ورةةةةذه .ال فو مّت ام رال م ر عال 233 74.44% ّلويا الا حد م 70 22.36% ن اسر دم 10 3.20% 5- ا در اسرث ّفك لغةعض الر افةا ّمةةع اللو ةة لغةةعض ت ةةّدل ال بةةعات دك ةة .وي رت ام رال م ر عال 165 52.71% ّلويا الا حد م 113 36.11% ن اسر دم 35 11.18% 6- م ّل . عرض نتائج االستبانة و حليلها و اسيرها ارسّل ال ّلعات لولو ّم 104 33.22% خّص 209 66.78% 7- اسر دام ال سّفا الر لك ك ف ام رال م ر عال 213 68.05% 559 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ 560 . ال ّلعال انل رع رك ّلويا الا حد م 93 29.71% ن اسر دم 7 2.24% 8- :اللوب مة اللو ارسّل اج ّت وا البعسد انل رع ر 116 37.06% ال مّت الرفوك ك 195 62.31% م الع الر افا ّ انجر 2 0.63% 9- اخركّر م ر ى تفوك معت ط اّنهدال الرفوك ك الف ا وا .ّت قكقر ام رال م ر عال 230 73.49% ّلويا الا حد م 82 26.20% ن اسر دم 1 0.31% 10- اسر دام الوغ المم ا د شعح .ال ّدال ام رال م ر عال 169 53.99% ّلويا الا حد م 143 45.70% ن اسر دم 1 0.31% 11- ت فيع لّم ل ملو ّت ال قعر .ّ ال مّيكت ال عت ل ور ام رال م ر عال 211 67.42% ّلويا الا حد م 98 31.31% ن اسر دم 4 1.27% 12- اسر دام اسرعاتكجكّت تفوك ك حدعث . لرلجكع الل ام رال م ر عال 221 70.61% ّلويا الا حد م 89 28.44% ن اسر دم 3 0.95% 13- . البعرّمج ال ر ع ف الرفوكت انل رع ر ال مّت الرفوك ك 303 96.81% م الع الر افا ّ انجر 2 0.63% ّج كفر 8 2.56% 14- الرفّ ل مع مفو ية اخعسة , الر افا مع خبعا م ويية د ليية د ت ميذ ام رال م ر عال 146 46.64% ّلويا الا حد م 114 36.43% .ال ّدال 560 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) / جمةل الداب( اجملدل1 ) العدد142 (أيلول) 2022 / م1444 هـ 56 البعرّمج الرفوك بع م مّت الرفوكت . انل رع ر ن اسر دم 53 16.93% 15- وا الردرس ال نغع ف رم ر ا انتجّهّت ا نجّوك ر الرفوكت . انل رع ر اتمم 105 33.54% م ّعد 131 41.86% ن اتمم 77 24.6% 16- نق م الرفوكت انل رع ر ا د رقر . عرض نتائج االستبانة و حليلها و اسيرها م الريئ الردرس ك اتمم 44 14.05% م ّعد 98 31.31% ن اتمم 171 54.64% 17- ع لد الرفوكت انل رع ر الر ل لدى ّ الريئ الردرس ك مة ارفدام .د رهت مقّرر اّلرفوكت الرقويدل اتمم 141 45.04% م ّعد 134 42.82% ن اتمم 38 12.14% 18- ّها ال ؤس الر تف ا ورّ و فمر ال ّل لّدرال وا انررقّل الا الرفوكت انل رع ر تع اللعب الرقويدن .اّلرفوكت رفت 58 18.54% ن 255 81.46% ال ر الثّر : ال رّت الر تؤثع وا ج دال خدمّت الرفوكت الفّل جد ل رلت9 ) ت المقعات البدعا الر عار ال ال ئ س ت ية م ر ى اللو ان ر ّد الةذات وا الرفوكت. اتمم 67 21.40% م ّعد 135 43.14% ن اتمم 111 35.46% 21- سةةةةةةّدال مرةةةةةةّرات اللو ةةةةةة فةةةةةة اسةةةةةةر دام ت و جكةةةةة ال ّسةةةةة تلةةةةة سع الرم يةةةةةع . ال قدل انودا اتمم 155 49.53% م ّعد 63 20.12% ن اتمم 95 30.35% 22- م ةةةةةةةةةةةّ دال اللو ةةةةةةةةةةة وةةةةةةةةةةةا انحرمةةةةةةةةةةةّم اّل فو مةةةةةةةّت انرةةةةةةةدفّع لوةةةةةةةرفوت رجةةةةةةةع اتمم 86 27.47% م ّعد 131 41.86% ال ر الثّر : ال رّت الر تؤثع وا ج دال خدمّت الرفوكت الفّل جد ل رلت9 ) ت المقعات البدعا الر عار ال ال ئ س ت ية م ر ى اللو ان ر ّد الةذات وا الرفوكت. اتمم 67 21.40% م ّعد 135 43.14% ن اتمم 111 35.46% 21- سةةةةةةّدال مرةةةةةةّرات اللو ةةةةةة فةةةةةة اسةةةةةةر دام ت و جكةةةةة ال ّسةةةةة تلةةةةة سع الرم يةةةةةع . ال قدل انودا اتمم 155 49.53% م ّعد 63 20.12% ن اتمم 95 30.35% 22- م ةةةةةةةةةةةّ دال اللو ةةةةةةةةةةة وةةةةةةةةةةةا انحرمةةةةةةةةةةةّم اّل فو مةةةةةةةّت انرةةةةةةةدفّع لوةةةةةةةرفوت رجةةةةةةةع اتمم 86 27.47% م ّعد 131 41.86% 561 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ 562 .المدع ام رال م ّشعال ن اتمم 96 30.67% 23- لوةةةةة الر ومةةةةة ال ّلكةةةةة ل ةةةةةا مةةةةةة اللو ةةةةة الردرس ةةةةةةةة مةةةةةةةةة رّحكةةةةةةةة ال مةةةةةةةةّرسا اسسّسةةةةةةك الجّربكةةةةةة ال عافقةةةةةة لوف وكةةةةةة . الرفوك ك اتمم 141 45.47% م ّعد 98 31.40% ن اتمم 74 23.13% 24- مقّرا المج ال وية اللّلب الردرس اتمم 44 14.05% م ّعد 106 33.88% ن اتمم 163 52.07% 25- اسرث ّر ال لت لمف ا ال ف ل الا .الجّمفّت ا بب ا دحّم اللعسم اتمم 134 42.81% م ّعد 96 30.68% ن اتمم 83 26.51% 26- . عرض نتائج االستبانة و حليلها و اسيرها معا ّال المع ب المعدن وية اللو اتمم 39 12.46% م ّعد 90 28.75% ن اتمم 184 58.79% 27- ف ج الرفوكت انل رع ر ظّهعال لور ي . ل ر ل مفعف مفّعيع الج دال اسدا اتمم 42 13.42% م ّعد 118 37.70% ن اتمم 153 48.88% ال ر الثّلل: سوبكّت الرفوكت انل رع ر جد ل10 ) ت المقعات البدعا الر عار ال ال ئ س 28- الف لةةةةةةةة تةةةةةةةةؤثع وةةةةةةةةا ةةةةةةةةدم الر افةةةةةةةةا انجر ةةّ الجوةة لمرةةعال ر سوةة مةةّم جر ال ال ّس. اتمم 270 86.26% م ّعد 38 12.15% ن اتمم 5 1.59% 29- دم اسر دام ّف ال ا فة الرمّ ةا مع اللو. اتمم 226 72.21% م ّعد 45 14.38% ن اتمم 42 13.41% / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 562 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ 563 30- ن ةةةةةرغعب الرفوةةةةةكت انل رع رةةةةة ال لةةةةةت الجرةةةةةد لوردرس ةة لةةد نمةةا الةةا سةةّ ّت مرةةأخعال فةة .مرّاف ال اج ّت ال عسو انسرم ّرات اتمم 250 79.88% م ّعد 49 15.65% ن اتمم 14 4.47% 31- ن ت جةد خبةعال ّدكةة اّل ة لولو ة فةة اسر دام تق كّت الرفوكت انل رع ر. اتمم 218 69.65% م ّعد 46 14.69% ن اتمم 49 15.66% 32- ةةةةةةدم معا ةةةةةةّال راةةةةةةت القةةةةةةكت تعتيةةةةةةب ال مةةةةةةّيكت ل ةةةةةةةر ل توقةةةةةةة ال فو مةةةةةةةّت انشةةةةةةةرعا فةةةةةةة الةةةدر سفةةةد الرفوةةةكت انل رع رةةة خيةةةع ففةةةّل ف الرعاك الع حك اسخ قك. اتمم 267 85.31% م ّعد 42 13.42% ن اتمم 4 1.27% 33- الرةةةةةةةةةأثيع ال ةةةةةةةةةوب اللةةةةةةةةةف ر اّل ةةةةةةةةةيم الر تع ةد ارقلةّع انررعرةت ا الركةّر .ال رعاّف خ ل ول ال ّلعال اتمم 265 84.66% م ّعد 38 12.15% ن اتمم 10 3.19% ال ر العااع: مف لّت الرفوكت انل رع ر جد ل رلت11 ) ت المقعات البدعا الر عار ال ال ئ س 34- ةةدم جةة د معشةةد تفوك ةة ع جةةه كاكةة اسةةةةةةر دام الرق كةةةةةةّت ال ةةةةةةّ دال لورفوةةةةةةكت انل رع ر. اتمم 192 61.35% م ّعد 100 31.95% ن اتمم 21 6.70% 35- لو تلجكع اللو اجد ى الرفوكت انل رع ر. اتمم 158 50.48% م ّعد 110 35.15% ن اتمم 45 14.37% 36- ا م ّركّت ال ّدن ن ت ّسب ت فيا ّ اسرق ّل ال ّدال اّللعب ال ر ف ّل ك. عرض نتائج االستبانة و حليلها و اسيرها اتمم 175 55.92% م ّعد 97 30.99% ن اتمم 41 13.09% 37- ق ّت إدارس لقكّدات خيع اعك اتمم 63 20.12% / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 563 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ خيع مر لورل سع. م ّعد 156 49.85% ن اتمم 94 30.03% 38- ارقلةةةةةّع الركةةةةةّر ال رعاةةةةةةّف نفةةةةةد ّفقةةةةةّ مةةةةةةّم تلبيم الرفوكت انل رع ر ف ة انررعرت ردافرةةه ت ةة ل د ل الر افةةا ال ةةوكت نمةةّل . ال ّدال اّلم رال الم ك اتمم 254 81.16% م ّعد 51 16.29% ن اتمم 8 2.55% 39- ال م فةك ال ةعس م رةّ الرجة م القعفة وةا ال الةع العفك ة فة انررعرةت الرة تةةؤثع وا ال قعرات انل رع رك انمر ّرّت. اتمم 217 69.33% م ّعد 88 28.12% ن اتمم 8 2.55% 40- الر وم ّلك لرجري الب ك الر رك لرلبيم الرفوكت انل رع ر. اتمم 198 63.26% م ّعد 91 29.07% ن اتمم 24 7.67% 41- ّنفد الرفوكت انل رع ر بئّ الّدك. اتمم 129 41.21% م ّعد 103 32.91% ن اتمم 81 25.88% 42- ةةةةدم ا رةةةةةعال افةةةةةض الجرةةةةّت العسةةةة ك فةةةةة افض الةد ل اّللةرّدات ال حة ةة رعسةم الرفوةةكت انل رع رةة امةة رال ّمةة لبةةا جّف ةة ّو ر ر اتمم 213 68.05% م ّعد 89 28.44% ن اتمم 11 3.51% 43- ها ع جد اسركفّ م ّشع ف الرفوكت انل رع ر ؟ ع جد 70 22.36% نع جد 91 29.07% ّ ار 152 48.57% 44- مّ تقيكت ه ك الرفوكت ا ل رع ر لولّلب ؟ لعكا 130 41.53% مقب ل 153 48.89% جيد 30 9.58% / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 564 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ لمحة اريخية عن نشأة التعليم االلكتروني وماهومه نُفةةةد ممرةةة م الرفوةةةكت ا ل رع رةةة اأرةةةه اللعسقةةة لوةةةرفوت اّسةةةر دام ال سةةةّفط انل رع ركةةة فةةة وك رقا نمةّل ال فو مةّت سة الرفوةكت انل رع رة ور ة كّت خةعى ةّلرفوكت ةة افةد . عرض نتائج االستبانة و حليلها و اسيرها الرفوكت ال ر قا الرفوكت الذات الرفوكت انفرعال نفةة د تةةّر سخ الرفوةةكت انل رع رةة فةة وةةدانّت القةةعل الرّسةةع لةةع حةةية اسةةرف وت المةة ر ال ر ع ةة فةةة مجةةةّل الرفوةةكت لر ةةةا م ةةةا ال رةةب القةةةّف ية وةةةا الف وكةة الدراسةةك إ ّرةةت ال ةع هةة ال ةبب را تلةة ر مجةّنت الةةرفوت خّفة ااةةّل ال ةع الفّل كةة الثّركة ّرةةت ال ّجةة إلةةا ال فةة ل ل عةةية ال ج ةة د تةةدرسبرت ا ر ةةد فةة البدانةة وةةا تمةة سع الرةةدرس ّت الف عس اثرّ بع ال سّفا ال عفك ّلرومّ لك ل ل م ل ف مجّل الرفوكت انل رع ر ه مّ ّل مف ل اه لبا افد ال ع الفّل ك الثّرك لذا ن ّ الق ل إل ال ننّت ال ر دال اسمعس ك ّرت العافدال ف مجّل الرفوكت خيع الرقويدل إ ّرةت ه ةّ شةعاو مةّ وةية الجةك . الجّمفّت لغعض دمج ادخّل م ّدئ وت ال م ف الرفوت وةةد ت فةة سةةري كّت القةةعل ال ّلةة وةة ادر الرفوةةكت انل رع رةة مةةة خةة ل لةةع رمةة ص مبعمجةة وةةةا فةةم سلكةةةّت تؤسةة لورةةةدرسب الرةةةدرس و اسةةل ال ّسةةة حرةةةا ةةةّل لورفوةةةك ت . انل رع ر ف تو ال ق ه ك الرمّدن اّ ر ّره ج مة انلرمّد ال فعف د ر الرفوةةكت انل رع رةة الةة ا سةةوب وةةا ممرةة م الردرس ةةيية جفورةةت مةةّم ملةة و هةة ام ّركةة انسةةرغ ّ ةةة د رهةةت فةة ال جةةّل الرفوك ةة ل ةةة سةةع ّل مةةّ ثبةةت الف ةة مةةة توةة ال ةةّ ل هةة ارتقةةّع سةةفّر ال ر ل جكةةّ فةة توةة المرةةعال ف ةة ةةة ال ّجةة إلةةا الرمّ ةةا مةةع ال ةةرفوت فةة اسةةرعجّع ال فو مةةّت ةةّل للعافةةم اللةةعح مةةع م روةة اللةةعافج ال رفو ةة ال ةةبب .اةخع ف دم انسرغ ّ ة الردرس يية اد الف ا وا ال ن ل الرفوكت ا ل رع ر وثةع تمّ وكة فة ودانة ال مة الثةّر مةة القةةع ل الرّسةةع لةةع نسةةك ّ فةة ظرةة ر ال ّسةة الل مةة فةة ةةّم1977 الةةذل ةةّل الردل م ه ل ن ل تلغيوه م ّشع مة لبةا ال ةرميد م ةّ جفةا ال رر ةية فة مجةّل تلة سع وةةعامج الرفوةةكت انل رع رةة ل نق مةة ا ورأسةةك لّ ةةدال رفةةي لبةةعامجرت عةةرت تلةةغيورّ مةةة خةة ل . عرض نتائج االستبانة و حليلها و اسيرها ال ّس ظ ال و إل الذ الل ف و ل ل إن ال ّ لمحة اريخية عن نشأة التعليم االلكتروني وماهومه نُفةةةد ممرةةة م الرفوةةةكت ا ل رع رةةة اأرةةةه اللعسقةةة لوةةةرفوت اّسةةةر دام ال سةةةّفط انل رع ركةةة فةةة وك رقا نمةّل ال فو مةّت سة الرفوةكت انل رع رة ور ة كّت خةعى ةّلرفوكت ةة افةد . الرفوكت ال ر قا الرفوكت الذات الرفوكت انفرعال رس يية ة م ع اد الف ا وا ال ن ل الرفوكت ا ل رع ر وثةع تمّ وكة فة ودانة ال مة الثةّر مةة القةةع ل الرّسةةع لةةع نسةةك ّ فةة ظرةة ر ال ّسةة الل مةة فةة ةةّم1977 الةةذل ةةّل الردل م ه ل ن ل تلغيوه م ّشع مة لبةا ال ةرميد م ةّ جفةا ال رر ةية فة مجةّل تلة سع وةةعامج الرفوةةكت انل رع رةة ل نق مةة ا ورأسةةك لّ ةةدال رفةةي لبةةعامجرت عةةرت تلةةغيورّ مةةة خةة ل . ال ّس وا العخت مة ظر ر ال ّس إن ل ل لت ن ة وةا فةم الل ة ح الةذل ن ةفا إلكةه ال رمةةةية فةةة مجةةةّل الرفوةةةكت انل رع رةةة ا ةةةبب ال لةةة ت الم كةةة فةةة اخةةةر ل اللةةةع ّت ّال مة ف ل جرة ال انل رع ركة البةعامج هة مةّ جفةا انسةرمّدال مةة الرفوةكت ا ل رع رة حو ةة . سس ّ ارتمّع الر وم سرذا 565 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) " ععفد تقعسع م ا اسمت ال ر دال لورعاك الفوت الثقّف الي رUNESCO , 2002 " الرل ر الرّرس لورفوكت انل رع ر ف ت و ا م ج ّةت: - . الجيا اس ل: را ال عاسو ّل نفر د وا ال ّدال ال لب بع ال عاس ت البعسدن ا ا - الجيا الثّر : را الروم س ل العادع سفر د وا ال ةّدال ال لب ة اسشةعر ال ة ال عفكةةةة الرفوةةةةكت ا ةةةةّ دال ال ّسةةةة اسلةةةةعاص ال دمجةةةة البةةةةل الروم سةةةة ر ا ا ةةةة . الرّت - الجيا الثّر : را الروم س ل العادع سفر د وا ال ةّدال ال لب ة اسشةعر ال ة ال عفكةةةة الرفوةةةةكت ا ةةةةّ دال ال ّسةةةة اسلةةةةعاص ال دمجةةةة البةةةةل الروم سةةةة ر ا ا ةةةة . الرّت - الجيةةةا الثّلةةةل: را ةةة ال سةةةّفط ال رفةةةددال سلةةة ا وةةةا انتمةةةّنت البكّركةةة ال ةةةؤت عات . عرض نتائج االستبانة و حليلها و اسيرها ال عفك اعامج اسل ّر الم ّعك - الج يةةا العااةةع: اسرا ةة ال عت ةة ال وةةا ا ررعرةةت سر ثةةا فةة الرفوةةكت ال ةةعل سفر ةةد وةةةا "ال سّفط ال رفددال الرمّ وك الر تق م ا ل العسّفا وا ش انتمّنتWWW " ه سةةةّفط إل رع ركةةة ن ت ام كةةة هةةةذا الجيةةةا عرةةةرت اةةةّسلعاص ال دمجةةة الرمّ وكةةة شةةة انتمّنت اّل بي تع ال ممةا الدراسة انفرعالة ال ر ةّت ال رةب انل رع ركة ل ا ةد البكّرّت د اللوب ال ّدث ال ّشعال. ال رد2018 ص296 .) ا فوائد التعليم االلكتروني 1 - .تقويا الر ّلكا 1 - .تقويا الر ّلكا 2 - .ال ف ل ف ال لت ال ّل ال ّسب 2 - .ال ف ل ف ال لت ال ّل ال ّسب 3 - . الفّل ك 4 - . و ّ مجر فّت داف ال ّرس 5 - ععفةةةةةةةع مةةةةةةةة اسةةةةةةةرث ّر اللةةةةةةةع ّت وةةةةةةة ا اللةةةةةةة الف ب تكةةةةةةة . مةةةةةةةّر ل ر ربيةةةةةةةعل 2019 28 ) 4 - . و ّ مجر فّت داف ال ّرس 5 - ععفةةةةةةةع مةةةةةةةة اسةةةةةةةرث ّر اللةةةةةةةع ّت وةةةةةةة ا اللةةةةةةة الف ب تكةةةةةةة . مةةةةةةةّر ل ر ربيةةةةةةةعل أنواع التعليم االلكتروني 1 - :الرفوةةكت ال رةة امة الةةذل نجفةةا ةة مةةة اللو ةة الردرس ةةيية مفةةّ فةة لةةت احةةد عر ةةّدل ل .ال فعف وا ال ط م ّ ن را مة وك الرفوت 2 - :الرفوكت خيع ال ر امة ّ ه ن را وا اللو إرج مرةّمرت الدراسةك الة ا اتة اّل لةت الةةةذل ع ف رةةةت مةةةة خةةة ل ان ر ةةةّد وةةةا البةةةعامج ال رةةة فعال وةةةا ا ررعرةةةت اسلةةةعاص ال دمج . و2021 ص86 .) ) 3 - :الرفوةةةكت ال ةةةدمج سلوةةةم وكةةةه الرفوةةةكت ال ةةةدمج سةةةرت اسةةةر دام الةةةرفوت الرقويةةةدل فةةة لّ ةةة المةة و ةةب م ةةددال اسةةر دام راةةت انتمةةّل انل رع رةة فةة الجةة اةخةةع مةةة رلةةل الرفوت. عرض نتائج االستبانة و حليلها و اسيرها الف يعل2011 ص25 .) 566 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ أدوات التعليم االلكتروني د ات الرفوةةةكت انل رع رةةةة هةةة اسداال الرةةةة عةةةرت اسةةةةر دامرّ مةةةة لبةةةةا الردرس ةةة لغةةةةعض إنمةةةّل ال ةةةّدال الفو كةةة إلةةةا اللو ةةة بةةةع رةةة اع الرفوةةةكت انل رع رةةة ال رّحةةة تمةةة د ات الرفوكت انل رع ر ح ب ت ليت اسةر دام اسداال وةية رةعال وكة الرفوةكت الةرفوت ةّ مبةية :ف ادرّه 1 - د ات الرفوكت ال ر امة - ال ّدث ال ار الل مChatting .) - ال ةةؤت عات اأر ا رةةّ ال ةة عك ال ةة دال اّلمةة ر العسةة م) مج ةة ال قةةّ ) مؤت عات .) الميدع2 - د ات الرفوكت خي ع ال ر امة أدوات التعليم االلكتروني د ات الرفوةةةكت انل رع رةةةة هةةة اسداال الرةةةة عةةةرت اسةةةةر دامرّ مةةةة لبةةةةا الردرس ةةة لغةةةةعض إنمةةةّل ال ةةةّدال الفو كةةة إلةةةا اللو ةةة بةةةع رةةة اع الرفوةةةكت انل رع رةةة ال رّحةةة تمةةة د ات الرفوكت انل رع ر ح ب ت ليت اسةر دام اسداال وةية رةعال وكة الرفوةكت الةرفوت ةّ مبةية :ف ادرّه ة كت - ال ّدث ال ار الل مChatting .) - ال ةةؤت عات اأر ا رةةّ ال ةة عك ال ةة دال اّلمةة ر العسةة م) مج ةة ال قةةّ ) مؤت عات .) الميدع2 - د ات الرفوكت خي ع ال ر امة - ال ةةؤت عات اأر ا رةةّ ال ةة عك ال ةة دال اّلمةة ر العسةة م) مج ةة ال قةةّ ) مؤت عات .) الميدع2 - د ات الرفوكت خي ع ال ر امة - البعسد انل رع رE-mail . - البعسد انل رع رE-mail . - رقا ال ومّتF.T(File Transfer .) - ل ح ال لعاتBulletin Board).B.B - فم ّت ال سب ال ّوStatic Web Pages)S.W.P . س) - فم ّت الل الف ب تك / ال سب الرمّ وInteractive Web Pages)I.W.P . - ل ام ال دم / انفّدال ا ال ّ دالListserv . انتعا2019 ص97 .) :ّ ه ّ د ات ت ّهت ف و ّ ويئّت الرفوكت انل رع ر م ر - د ات ت ةةةّ د فةةة ت ةةة سة ال رةةة ى الرفوك ةةة : مثةةةا م الةةةع الةةةع ااط انجر ّعكةةة م الةةةع .ّالم ر الميدع ال د رّت ال س خيعه - فم ّت الل الف ب تك / ال سب الرمّ وInteractive Web Pages)I.W.P . عرض نتائج االستبانة و حليلها و اسيرها اا ) - فم ّت الل الف ب تك / ال سب الرمّ وtive Web Pages)I.W.Pاا - د ات ت ةةةّ د فةةة ت ةةة سة ال رةةة ى الرفوك ةةة : مثةةةا م الةةةع الةةةع ااط انجر ّعكةةة م الةةةع .ّالم ر الميدع ال د رّت ال س خيعه - اد ات ت ةةةةةةّ د فةةةةةة الر افةةةةةةا: تةةةةةةأت م وةةةةةة ل ظكمةةةةةة البعسةةةةةةد انل رع رةةةةةة مثةةةةةةا خدمةةةةةة Twitter .) - د ات ت ةةّ د فةة الرلةةبك : هةة خةةدمّت ت ةةّ د فةة راةةط ال رفو ةةية ال فو ةةية و ف ةةرت .ال فض لر ّدل ال بعات ال فو مّت .ال فض لر ّدل ال بعات ال فو مّت - د ات ت ةةةةّ د فةةةة فّ وكةةةة اسد ات ال ةةةةّاق : مثةةةةا اسةةةةر دام خ فةةةةّت ال الةةةةعRSS ) اسر دام العس مّت لر فكا ال مّدر ال روم . فّر2017 ص62 .) مة د ات الرفوكت انل رع ر وا فم را إدارال الرفوت - د ات ت ةةةةّ د فةةةة فّ وكةةةة اسد ات ال ةةةةّاق : مثةةةةا اسةةةةر دام خ فةةةةّت ال الةةةةعRSS ) اسر دام العس مّت لر فكا ال مّدر ال روم . فّر2017 ص62 .) مة د ات الرفوكت انل رع ر وا فم را إدارال الرفوت 1 - . المم ل الذ ك 2 - ال اج ةةّت انل رع ركةة : داال ت ةةة ال فوةةت مةةة قكةةّ م ةةر سّت الرم يةةع لةةدن ال عت لةة . اأهدال الرفوت المععك لودر 3 - ل ح ال قّ : م ّح لو ار وية ال فوت اللو اللو و ف رت.ال فض 4 - .انخر ّرات انل رع رك : داال لقكّ م عجّت الرفوكت مة خ ل انخر ّرات 567 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) بة جم(جمل د )(ول)م 5 - ال ر ى الرمّ و : ه ال فو مّت ال فّرل الر عر رّ ال قعر الدراس الرة ترةدل الةةا ت قيةةم هةةدال تفوك كةة م لةة دال هةةذه ال فو مةةّت ال فةةّرل تقةةدم فةة شةة ّل مرفةةددال مّ ف لّلب امعل س ف س ف امعل. عرض نتائج االستبانة و حليلها و اسيرها انتعا2020 ص211 .) االختالف بين أنواع التعليم االلكتروني تارع ل ّ انخر فّت وية ر اع الرفوكت انل رع ر مةة خة ل ال مةّيكت الف ّفةع ال بي ة ف الجد ل درّه: و2021 ص88 ) الف مع الرفوكت انل رع ر الرفوكت الرقويدل ال ّدال الفو ك مة حيل ال ر ى الرم كت ) سو الفعض مرق مل ل تقويدن م د دال ر لك الج دال ثّور مرمّ ت قكّ ال رّفج توقّف ففب انحرمّم اّل فو مّت ّل مرمّ ت ال وم ال بك م م ّلك ال ف ّلك جدا مرمّ ت ال ع ر ّلك جدا مقيدال ان ر ّد وا ال م ّل جدا م د د رلّب ال ار و ر م و / الوك فعص ا وداع / انور ّر ّلك مرمّ ت ا أ يا 1 - .الرلجكع وا سّدال ال رفوت اقدراته ال ّف وا الرفوت ت ا م ؤ لك تفو ه 2 - عدفع ال رفوت وا ال ثّوعال. انسرق لك ل ط ال م 3 - .ن ج لو رفوت األ ن ل وثع فّ وك ثق و م ه ملّر ّ ف ف ع القعار 4 - ن ّ د ال رفوت وا تل سع ل ا د الرفوت ال ّفة اةه مةة لةدرال وةا الر بةؤ رةعح انسةئو ت لكج تو كر اسف ّر. 5 - ع لدى ال رفوت القدرال وا ال ل ال عاق الذاتكة مةة خة ل م رّافة معاجفة مةّ عةرت ارجّ ه مة هدال فّر2017 ص158 ) أهداف التعليم االلكتروني 1 - . ت ية م ر ى فّ وك الردرس يية سّدال ال بعال لدعرت ف إ داد ال اد الرفوك ك 2 - ال ف ل الا ممّدر ال فو مّت ت فيع ال ّدال الرفوك ك ام رترّ ا ل رع رك. 568 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 4 - .ال ّ دال ف فرت ال ّدال الرف م ورّ حيل ن رلكع اللّلب العج ع لودر ف ل لت 5 - سّدال ال اّسرغ ل ال لت ا ّ ع لدعرت القدرال وا ا وداع. عرض نتائج االستبانة و حليلها و اسيرها 6 - الر افةا مةع ال ؤس ةّت الفّل كة اإكة ال فة ل الةا ان ر ّدنة مةع توة ال ؤس ةّت لعفةع ال ر ى الفو ليع2017 ص80 .) معوقات التعليم اإللكتروني وسلبيا ه 1 - حةّج الوغة فةف اررّ: ل ة ل مفاةت ال فو مةةّت اسا ةّا ال رة افعال وةا شة انررعرةةت . ه اّلوغ انر وي س لذا فإل انسرمّدال ال ّمو سر ل مة رميب مة عرقة هذه الوغ 2 - خو. انررعرت مة العلّا 3 - . ال اج ال م ك مة جّرب اللو الردرس يية اتجّه الرفوكت انل رع ر 4 - . ّ اللف ر اّلف ل غكّ الرمّ ا انجر 5 - فف ا الرغييع ل ل انر ّل البكفره نن ب الرغييع وا مّ ا رّد وكةه نن ة ل لة اّت ّع سو م ّد وا نق سو ّ تجّه هذا الرغي.) يع مّ ت ا وة ال قّ م العاف 6 - مل ت مف لّت إدارس. 7 - مف لةةّت جةة د الميع سةةّت حيةةل تةةؤثع وةةا اسجرةة ال لةةّ ال ومّت سةةفّدال2015 ص241 - 243 .) 569 واقع التعليم االلكتروني في العراق شةةّع اررلةةّر ممرةة م الرفوةةكت انل رع رةة فةة الفةةعاب ةةد إ ةة ل حّلةة اللةة ارئ القمةة ى فعض ال اع اللّما افد سّدال ا فّاّت جعا تمل اةّ ر رةّ حيةل ا ة ت ال مة الفعاقكةة لةة ارال الرعاكةة الرفوةةكت الفةةّل ا ةةع رال إنجةةّد حوةة ل ل لةة و ةةدم د ام اللو ةة ا ةةبب إجةةةةعا ات ال جةةةةع المةةةة ةةةةدم لةةةةكّع ال ةةةة الدراسةةةةك وةةةةا اللو ةةةة ّرةةةةت ال قرعحةةةةّت ال و ل ف انررقّل . 2 أخذ من الموقع اإللكتروني لبرنامج االمم المتحدة االنمائي (- in - learning - stories/2020/09/e / https://www.iq.undp.org/content/iraq/ar/home iraq.html ) بتاريخ30 - 4 - 2021 . عرض نتائج االستبانة و حليلها و اسيرها اسر دام الرفوكت بع ال سّفط الرفوك ك مة خ ل ش انررعرت لةةت ن ةةة الرفوةةكت انل رع رةة ليةةد ال ةة ات انخيةةعال ل ةةة لوفةةعاب تجعاةة مةةع هةةذا ال مرةة م ل مة خ ل ملةع ع اوةة سةي ّ الةذل روقرةه م ا ة اسمةت ال ر ةدال لورعاكة الفوةت الثقّفة- م رةةب ع ر ةة الفةةعاب فةة ةةّم1 09 20 ةةّل هةةذا الرفةةّ ل مةةع ارال الرفوةةكت الفةةّل ال ةةل الفو مة جا تف س جة دال الرفوةكت وةا ج كةع ال ةر سّت د ةت اللةعاوّت وةية الجّمفةّت الفعاقك الجّمفّت خّرل الفعاب حيل ّرت ودان ال لع ع ف ثة ا جّمفةّت عاقكة هة 1 اخذ من الموقع االلكتروني لمكتب يونسكو العراق عبر الموقع (- office/single - this - office/about - http://www.unesco.org/new/ar/iraq view/news/launch_of_avicenna_virtual_campus_in_iraq/ ) بتاريخ30 - 4 - 2021 . 569 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ / جمةل الداب( اجملدل1 ) العدد142 (أيلول) 2022 / م1444 هـ اغداد ال معال ف ح الدعة) رالرت مع ج ّمفة اوةة سةي ّ انفرعالةك فة م لقة اللةعب اس سط تت تدرسب مّ نقةّر18 تدرس ةكّ مةة الجّمفةّت ال رةّرال فة ةّل مةة لبةا ارافة خبةةعا مةةة مقةةع الي ر ةة الفةةّم م رةةب الي ر ةة فةة اغةةداد خ ةة مةةدراية مةةة مع ةة اوةةة سةةي ّ ال فعفةة فةة جّمفةة في دلاكةةّ رافةة مةةة جّمفةة الب لير كةة فةة فّل كّ اسةة ّركّ) ارال .الرفوكت الفّل ال ل الفو ف الج افع لدم وعرّمج اسمت ال ر دال ا ر ةّف حة ل الفةّلت فة ةّم2017 ملةع ع لرلبيةم راةّم الرفوةةكت انل رع رةة فةة جّمفةة ةةعا إ تةةت تةةدرسب الفةةّموية تلةة سع مرةةّراترت ف ةة ةةة ت سةةةةد سةةةةّتذال الجّمفةةةة اأحةةةةد ا اللعافةةةةم سةةةةّفا إدارال الرفوةةةةكت انل رع رةةةة تقّرةةةةّت إ ةةةةداد ال رةةة ى الرفوك ةةة الةةة ا ال رع رةةة وةةةا اثةةةع لةةة تةةةت تأسةةةك ل ل ةةةت م ةةةرر اةةةّلرفوكت انل رع ر ف الجّمف تل سع ل م م تف وذل ليرت انسرمّدال مةة هةذا ال لةع ع افةد ّتمل اّ ر رّ بع ال مّت ال ّف اّلج. عرض نتائج االستبانة و حليلها و اسيرها مف2 اا اغداد ال معال ف ح الدعة) رالرت مع ج ّمفة اوةة سةي ّ انفرعالةك فة م لقة اللةعب اس سط تت تدرسب مّ نقةّر18 تدرس ةكّ مةة الجّمفةّت ال رةّرال فة ةّل مةة لبةا ارافة خبةةعا مةةة مقةةع الي ر ةة الفةةّم م رةةب الي ر ةة فةة اغةةداد خ ةة مةةدراية مةةة مع ةة اوةةة سةةي ّ ال فعفةة فةة جّمفةة في دلاكةةّ رافةة مةةة جّمفةة الب لير كةة فةة فّل كّ اسةة ّركّ) ارال .الرفوكت الفّل ال ل الفو ف الج افع لدم وعرّمج اسمت ال ر دال ا ر ةّف حة ل الفةّلت فة ةّم2017 ملةع ع لرلبيةم راةّم الرفوةةكت انل رع رةة فةة جّمفةة ةةعا إ تةةت تةةدرسب الفةةّموية تلةة سع مرةةّراترت ف ةة ةةة ت سةةةةد سةةةةّتذال الجّمفةةةة اأحةةةةد ا اللعافةةةةم سةةةةّفا إدارال الرفوةةةةكت انل رع رةةةة تقّرةةةةّت إ ةةةةداد ال رةةة ى الرفوك ةةة الةةة ا ال رع رةةة وةةةا اثةةةع لةةة تةةةت تأسةةةك ل ل ةةةت م ةةةرر اةةةّلرفوكت انل رع ر ف الجّمف تل سع ل م م تف وذل ليرت انسرمّدال مةة هةذا ال لةع ع افةد ّتمل اّ ر رّ بع ال مّت ال ّف اّلج. مف2 الجودة الشاملة المبادئ واالعتماد وعالقتها بالتعليم العالي نفةةد إد ارد دن ةة ج رافةةد ف ةةعال الجةة دال اللةةّمو حيةةل رةة ر ارافةة لةةع رقلةة مةةة م ةةّدئ الج دال ت لج مّ عو م نجّد تلة سع ثقّفة الجة دال روةم وةا هةذه ال ةّدئ "جة هع الجة دال : ف الرفوكت" ترو ر دك ّ نأت 2 - . تب فو م الج دال اللّمو 4 - ّإرج .اس ّل ال اج ّت العب جدعدال ا 5 - .ت ية الج دال ا ررّجك خمض الر ّلكا ا 10 - .خوم ثقّف الج دال 11 - ت ية.الف وكّت 2 أخذ من الموقع اإللكتروني لبرنامج االمم المتحدة االنمائي (- in - learning - stories/2020/09/e / https://www.iq.undp.org/content/iraq/ar/home iraq.html ) بتاريخ30 - 4 - 2021 . 570 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ عرمة الرفوةةكت انل رع رة ا رلو ةةّت شةع سّسةةك لرة فيع ال عكةة لة ّل الجةة دال : دكه معالبررّ مة هت هذه ال رلو ّت مّنأت 1 - ت فيع شع سّسك ف اللو ال ور قية ورذا ال ع مة الرفوكت ل ّل مدخ ت تفوك كة . م ّس 2 - ت لكط البعامج الرفوك ك وا ف ا . عرض نتائج االستبانة و حليلها و اسيرها ر اع ال فّرل ال فّفعال ال فو مّتك 3 - تةةةةة فيع شةةةةةع ر عكةةةةة فةةةةة الرفوةةةةةكت الةةةةةرفوت فةةةةة ال ةةةةةّدال الرفوك كةةةةة ال سةةةةةّفط الرفوك كةةةةة . الردرس ف ة البعمجكّت 4 - ت ميذ البعامج الر. فوك ك وا فم معاق دقكق 5 - تقيكت البعامج الرفوك ك ال ةرف و فةم سخةع ال ةرجدات الثقّدكة انجر ّعكة اسةر ص .الرغذن العاجف مة اجا ادخّل انف حّت الرل سع ا ن اأ ل ام رال م ر عال 6 - . تل سع دا ّ الريئ الردرس ك 7 - إ ةةّدال ال اةةع فةة ال اةةّم ا دارل الم ةة ت وةةكر الرفوةةكت انل رع رةة مةةة ةةا ا ّلةةّت الر تفعلا ت فيع ر عك الرفوكت لولو ال رد2018 ص298 .) : لغعض ت قيم ج دال الردرس يية نجب ل تر فع دد مة ال ّت لدعرت ه ّةت 1 - ال ّت الل مك : مةة خة ل امةر ال ع رة فة الرم يةع الرةأر فة إفةدار اسح ةّم ل ن رو الثق اّل م ل عرمرت اةخعسة سرقبورت ف ة ةة امةر مرةّرات انتمةّل .المفّل : لغعض ت قيم ج دال الردرس يية نجب ل تر فع دد مة ال ّت لدعرت ه ّةت 1 - ال ّت الل مك : مةة خة ل امةر ال ع رة فة الرم يةع الرةأر فة إفةدار اسح ةّم ل ن رو الثق اّل م ل عرمرت اةخعسة سرقبورت ف ة ةة امةر مرةّرات انتمةّل .المفّل 2 - ال مّنةةة الرعا سةةة الفو كةةة : هةةة ال فعفةةة اةةةّللعافم الرعا سةةة ال ّسةةة فةةة الرفّمةةةا مةةةع . اللو 2 - ال مّنةةة الرعا سةةة الفو كةةة : هةةة ال فعفةةة اةةةّللعافم الرعا سةةة ال ّسةةة فةةة الرفّمةةةا مةةةع . اللو 3 - ال مّنةّت ال ر كةة انتمةّلك : ل ن ةة ل الردرس ةة مةع اللو ةة ل عةدر ملةةّ ع اةخةةعسة . وكه ملّر اللو ا ال مثيعال لورم يع تقبا الرعاحّترت ال روم 4 - العغ ةة فةة الرفوةةكت ت ةةية م ةةر ى الرةةدرسب سلعارةةه م ةةة هةةت لةةا معت ةة و كةة تلةةجكع ال رّل الفو لرت ال م2017 ص169 .) 3 - ال مّنةّت ال ر كةة انتمةّلك : ل ن ةة ل الردرس ةة مةع اللو ةة ل عةدر ملةةّ ع اةخةةعسة . عرض نتائج االستبانة و حليلها و اسيرها الدافعك لورفوت مع عض ال ّدال العسق م م ال لولو 7 - ّ معا لا ف ّ الر ت ف لةع البعرةّمج الرفوك ة لغةعض ال فة ل إلكةه ا ةر ل مةة لبةا ل انحركّجّت ال ّف قا2014 ص393 - 395 .) طبيقات التعليم االلكتروني في مؤسسات التعليم العالي تقع تلبكقّت الرفوكت انل رع ر ل ة ويئّت الجيا الثّر سب2,0 ) سفد ال سب2,0 ) ع ّرال ة ت ق كّت ظرعت لجفا م الع انررعرت وثع دع ّمك كة تمّ وكة هة ال جة الثّركة مة ال سب حيل عر ة ال رميدعة مة هذه الرقّر ال دعث اّل لع ال لةّر ت ةّدل ال بةعات ال فو مّت مع ال ج ّت اسفعاد سر ي ال سب2,0 :ّ)ا مّفر دعدال م ر - خمّفر رمك : اخركّر لغ ال.رّا م ّرك الرفدعا ا لّف ال ذل - خمّفر شم س : ل مة خ ل د ات تلبكقّت ال ؤت عات ال عفكSkype . - خمّفر امعس : مثا مو مّت ال العRss . ) - خمّفر س عك : مة خ ل داال الرد سة الم تPodcast .) - رعافةةم جدعةةدال لو لةةّر لةةّ اس ل سةة لو لةةّر ية: إ إل ال ةةرميدعة هةةت مةةة عب ةة ل ال لع لك ال ّل مثا ال س ال عالWikipedia .) - تف س الرفوكت ا وداع: مثا م ع ّت ال ل وا سبيا ال ثّلGoogle .) - د ت انتمّل الرمّ وك : حيل تج ع اسفعاد ف ش ّت اجر ّعك مثاFacebook .) - تقويا الر ّلكا الف وك ال رفوك ك مقّرر اّل سب1,0 .) - ال ةر ل ال ةةع فة ال فةة ل إلةةا ال فو مةّت فةة ل لةةت ل م ةّل سر ةةت ا ةةر ى . ّ ّل مة اللّاع انجر - . اسر دام مج مر مة تلبكقّت الرفوكت انل رع ر - عض مقّرع الميدع بع تلبيمYoutube ) م2014 ص551 ) 5 - . مفّعيع الر ت ف البعمج مة لبا ال رفوت 6 - . عرض نتائج االستبانة و حليلها و اسيرها وكه ملّر اللو ا ال مثيعال لورم يع تقبا الرعاحّترت ال روم 3 - ال مّنةّت ال ر كةة انتمةّلك : ل ن ةة ل الردرس ةة مةع اللو ةة ل عةدر ملةةّ ع اةخةةعسة . وكه ملّر اللو ا ال مثيعال لورم يع تقبا الرعاحّترت ال روم 4 - العغ ةة فةة الرفوةةكت ت ةةية م ةةر ى الرةةدرسب سلعارةةه م ةةة هةةت لةةا معت ةة و كةة تلةةجكع ال رّل الفو لرت ال م2017 ص169 .) ا 4 - العغ ةة فةة الرفوةةكت ت ةةية م ةةر ى الرةةدرسب سلعارةةه م ةةة هةةت لةةا معت ةة و كةة تلةةجكع ال رّل الفو لرت ال م2017 ص169 .) 571 2022 / م1444 هـ / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) معايير الجودة في صميم المحتوى التعليمي الرق مي 1 - . الج دال الدل ف ال ر ى الفو 2 - .مرلو ّت العس ّلم يية ال رمية ف تم كت البعامج 3 - م ّدئ الرم كت مة خ ل ت ظكا اسل ال ةعض الة ر المة ر المة ت لقلةّت . الميدع ت ر ل وا سّليب جذ انرر ّه ل ت ل خواك اللّش معس لوفية 4 - ت دعةةةد اسهةةةدال ال لةةة ع اسرلةةةل ال رةةةّم الرفوك كةةة تفةةةد مةةةة مفةةةّعيع الرمةةة كت الرعاةة ل لو ةة رج ف ةة ةةة الرةةدرس ّت انهر ةةّم اّلرغذنةة العاجفةة مةةع لةةع رال اسةةرف ّل . سّليب لو ّ دال . سّليب لو ّ دال 5 - . مفّعيع الر ت ف البعمج مة لبا ال رفوت 6 - . عرض نتائج االستبانة و حليلها و اسيرها الدافعك لورفوت مع عض ال ّدال العسق م م ال لولو 7 - ّ معا لا ف ّ الر ت ف لةع البعرةّمج الرفوك ة لغةعض ال فة ل إلكةه ا ةر ل مةة لبةا ل انحركّجّت ال ّف قا2014 ص393 - 395 .) طبيقات التعليم االلكتروني في مؤسسات التعليم العالي تقع تلبكقّت الرفوكت انل رع ر ل ة ويئّت الجيا الثّر سب2,0 ) سفد ال سب2,0 ) ع ّرال ة ت ق كّت ظرعت لجفا م الع انررعرت وثع دع ّمك كة تمّ وكة هة ال جة الثّركة مة ال سب حيل عر ة ال رميدعة مة هذه الرقّر ال دعث اّل لع ال لةّر ت ةّدل ال بةعات ال فو مّت مع ال ج ّت اسفعاد سر ي ال سب2,0 :ّ)ا مّفر دعدال م ر - خمّفر س عك : مة خ ل داال الرد سة الم تPodcast .) - رعافةةم جدعةةدال لو لةةّر لةةّ اس ل سةة لو لةةّر ية: إ إل ال ةةرميدعة هةةت مةةة عب ةة ل ال لع لك ال ّل مثا ال س ال عالWikipedia .) - تف س الرفوكت ا وداع: مثا م ع ّت ال ل وا سبيا ال ثّلGoogle .) - د ت انتمّل الرمّ وك : حيل تج ع اسفعاد ف ش ّت اجر ّعك مثاFacebook .) - تقويا الر ّلكا الف وك ال رفوك ك مقّرر اّل سب1,0 .) - ال ةر ل ال ةةع فة ال فةة ل إلةةا ال فو مةّت فةة ل لةةت ل م ةّل سر ةةت ا ةةر ى . ّ ّل مة اللّاع انجر - . اسر دام مج مر مة تلبكقّت الرفوكت انل رع ر - عض مقّرع الميدع بع تلبيمYoutube ) م2014 ص551 .) 572 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ عةةرت إرلةةّ تلبكقةةّت الرفوةةكت انل رع رةة اّسةةر دام لغةة تعميةة الةة ر ال رةةةعااطHTML ) هة اخرمةّر لةةHyper Text Markup Language ) ت ةر دم فة و ةّ ةا البةعامج : ال ّهج الرفوك ك تدار وك الرفوكت ا ل رع ر تلبكقّته فم راّمية - راةّم إدارال الةرفوتLMS ) هةة ع ةّرال ةة وعرةةّمجSoftware فة ت لو ةّ دال فةة إدارال مرّافة تقيةكت الرةدرسب الرفوةكت ال ةر ع ج كةع اسرلةل فة الجّمفةّت معاوة الرةةدرسب . عرض نتائج االستبانة و حليلها و اسيرها ه إحدى م ر دثّت الرفوكت انل رع ر - راّم إدارال ال ر ى الرفوكCMS ) ه مج مةة البعمجكةّت الرة ت ة ج ورمة كت ت دعل ل الع ال سب الرلبكقّت ال رفددال ا ل سّفط و2021 ص208 .) مة تلبكقّت الرفوكت انل رع ر ف مؤس ّت الرفوكت الفّل 1 - البعسةةةةةد انل رع رةةةةةe-mail ): هةةةةة ع ةةةةةّرال ةةةةةة ت ةةةةةّدل العسةةةةةّفا ال ثةةةةةّفم اّسةةةةةر دام ال ّس مةة خة ل شة ا ررعرةت سفةد البعسةد ا ل رع رة ال لة ال ان لةا فة الرفوةكت ل لت ع جد البعسةد ا ل رع رة ل ةّ جةدت شة انررعرةت مةة مبةعرات اسةر دام البعسةد :انل رع ر ف الرفوكت عةةرت إرلةةّ تلبكقةةّت الرفوةةكت انل رع رةة اّسةةر دام لغةة تعميةة الةة ر ال رةةةعااطHTML ) هة اخرمةّر لةةHyper Text Markup Language ) ت ةر دم فة و ةّ ةا البةعامج : ال ّهج الرفوك ك تدار وك الرفوكت ا ل رع ر تلبكقّته فم راّمية - راةّم إدارال الةرفوتLMS ) هةة ع ةّرال ةة وعرةةّمجSoftware فة ت لو ةّ دال فةة إدارال مرّافة تقيةكت الرةدرسب الرفوةكت ال ةر ع ج كةع اسرلةل فة الجّمفةّت معاوة الرةةدرسب . ه إحدى م ر دثّت الرفوكت انل رع ر ت إ - راّم إدارال ال ر ى الرفوكCMS) ه مج مةة البعمجكةّت الرة ت ة ج ورمة كت ت دعل ل الع ال سب الرلبكقّت ال رفددال ا ل سّفط و2021 ص208 .) ا مة تلبكقّت الرفوكت انل رع ر ف مؤس ّت الرفوكت الفّل 1 - البعسةةةةةد انل رع رةةةةةe-mail ): هةةةةة ع ةةةةةّرال ةةةةةة ت ةةةةةّدل العسةةةةةّفا ال ثةةةةةّفم اّسةةةةةر دام ال ّس مةة خة ل شة ا ررعرةت سفةد البعسةد ا ل رع رة ال لة ال ان لةا فة الرفوةكت ل لت ع جد البعسةد ا ل رع رة ل ةّ جةدت شة انررعرةت مةة مبةعرات اسةر دام البعسةد :انل رع ر ف الرفوكت - .سع ف ل العسّل مة ل م ّل ف الفّلت إ - .ووم م م لإلرسّل انسرق ّل - دم ج د سكط وية ال عسا ال رقبا م ّ عؤدل إلا . إلغّ ال اج ا دارس ال م ك - ّإم ّرك تف كت العس. ل ال احدال وا وثع مة جر - .ووم م م لإلرسّل انسرق ّل - دم ج د سكط وية ال عسا ال رقبا م ّ عؤدل إلا . عرض نتائج االستبانة و حليلها و اسيرها إلغّ ال اج ا دارس ال م ك - ّإم ّرك تف كت العس. ل ال احدال وا وثع مة جر - .إم ّرك حم ل ال رميد وا العسّل ف ال لت الذل ع ّس ه ا - .إم ّرك حم ل ال رميد وا العسّل ف ال لت الذل ع ّس ه ا - إم ّرك راط مومّت إلّدك اّلبعسد ا ل رع ر مثا ال م ص الم ر اسش ّل سةفّدال 2015 ص154 .) - إم ّرك راط مومّت إلّدك اّلبعسد ا ل رع ر مثا ال م ص الم ر اسش ّل سةفّدال 2015 ص154 .) 2 - :ّمج تلبكقّت شع ج جا لورفوكت م ر - م ع ال لGoogle . - م ع ال لGoogle . - م ع ال لGoogle . - خدم الرعجGoogle Translate . - ال ّا انل رع ركGoogle Drive . - خدم انتمّل الميدع سGoogle Meet . - المما الدراسGoogle Classroom . - ّال ّ ل ال ّف اف ا انسر ّر ت ويورGoogle Forms . - ّال ّ ل ال ّف اف ا انسر ّر ت ويورGoogle Forms . - ملغا الر جي ت ال عفك البل الYouTube . 3 - مج ةةة ال مةةة ال ربكةةة مةةةة شةةة ع مّن ع سةةة فت دةةةك الرةةة ت ةةةت مج ةةة مةةةة البعامج ال ربكWord, Excel, PowerPoint .) 573 2022 / م1444 هـ / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 4 - . ّ سّفا الر افا انجر خطوات إقامة التعليم االلكتروني في المؤسسات التعليمية 1 - . ت فيع ال ّدر الذل نج ع وية ال بعتية الردرس الرق كّت ال دعث 2 - إدارال ح و ت عك شعح ال لع. عرض نتائج االستبانة و حليلها و اسيرها ع لدى ال رميدعة لبكّل اه يره ربكفره 3 - .) إ داد تجري الب ك الر رك لو لع ع ال رو مّت ال ّدن الرق ك 4 - تدرسب اللو الردرس يية وا اسر دام الرق كّت الرلبكقّت ال ا م ر ع ّمع2015 ص143 .) التقانات واألنظمة المستعملة في مجال التعليم االلكتروني 1 - وعرةةّمج سةةب سةة تةةWebCT :) ن ةةر دم مةةة لبةةا مّنقةةّر سنل ال ؤس ةةّت الرفوك كةة ّفةة وثةةع مةةة سةة فية د لةة عةةد ت رافةة لةةع لغةة م رةةّ ا رجوي سةة الفعاكةة ل اةةعا ل ةة نقدمةةه مةةة ويئةة خمةة اةةّسد ات مةةة ودانةة إ ةةداد ال قةةعر لرع ي ةةه وةةا ال اةةّم حرةةا فرةةعال .الرفوت 2 - وعرةةّمج وةة وةة ردBlackboard): نفةةد مةةة لةة ى اسرا ةة حيةةل نقةةدم فةةعص تفوك كةة ّمر مة خ ل ع ال اج الف افةم الرة ت اجةه ال ؤس ةّت الرفوك كة س رةّ ن ة اّل ع ر لّوويره لورل سع الر سع عد ت البعرّمج الوغّت انرجوي س الفعاك انس ّرك . عرض نتائج االستبانة و حليلها و اسيرها اننلّلك 3 - وعرةةّمج د يةةDokeos): ن ةةر دم مةةةة لبةةةا1200 مؤس ةةة تفوك كةة فةةة65 د لةةة س ةةةة لولّلةةةب ل ع لةةةع م رةةة ى تفوك ةةة ةةةّل الجةةة دال ت ةةةّرسة تمّ وكةةة مر افةةةم مةةةع SCORM عةةةةد ت34 لغةةةة مةةةةّ لوغةةةة الفعاكةةةة فقةةةةد تةةةةت تفعسةةةةب مّنقةةةةّر60.2 مةةةةة% ال رّ 3 - وعرةةّمج د يةةDokeos): ن ةةر دم مةةةة لبةةةا1200 مؤس ةةة تفوك كةة فةةة65 د لةةة س ةةةة لولّلةةةب ل ع لةةةع م رةةة ى تفوك ةةة ةةةّل الجةةة دال ت ةةةّرسة تمّ وكةةة مر افةةةم مةةةع SCORM عةةةةد ت34 لغةةةة مةةةةّ لوغةةةة الفعاكةةةة فقةةةةد تةةةةت تفعسةةةةب مّنقةةةةّر60.2 مةةةةة% .البعرّمج 4 - وعرّمج ت تعATutor :) ن رّ هذا البعرّمج اإم ّركة الر ةدعل الرغيةع ال ةعسع لو اجرةّت مة لبا اللو سد ت 30 .لغ م ر و الرعج الفعاك مفعا اّل ّما 5 - وعرةةةّمج مةةة دلMoodle): نُفةةةد مةةةة هةةةت ال مةةةّت ال ةةةرف و فةةة الفةةةّلت هةةة وعرةةةّمج حدعل ممر ح ال مدر ست ر اسرلل الرفوك ك ربت ووغPHP "" ه لغ وعمجك حةعال ممر ح ال مدر مجّرك انسرف ّل مم عال ت رف ا ف تلة سع تلبك قةّت ال سةب هة لغة خّفةةة اةةةّل الع الدع ّمك كةةة تةةةد ت مّنقةةةّر30 لغةةة رةةة رت هةةةذه ال مةةة مةةةة لبةةةا " انسرعالMartin Dougiamas " سقدم وعرّمج م دل خدمّت ل ّ نقّر40000 ال رّلةةب ل ةةا جّمفةة س ةةت رو ةة عر و ةة ل70 لغةة مةةة138 د لةة لةةذا نفربةةع البعرةةّمج ان ل فةة الرفوةةكت ان ل رع رةة حيةةل عةةدعع را ةة ال قةةعرات را ةة الرفوةةكت فةةّب اسةةر دام هذا البعرّمج لرما الا الرلبكقّت الر دسك الرق ك و2021 ص218 .) 574 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 6 - وعرةةةةةّمج ا دمةةةةة دEdmodo ): هةةةةة حةةةةةد تلبكقةةةةةّت انررعرةةةةةت مةةةةةة م مةةةةةّت الر افةةةةةا ّانجر ةةةةةّ ال ممةةةةة لورفوةةةةةكت ن ةةةةةّ د اللو ةةةةة فةةةةة انسةةةةةرمّدال مةةةةةة سةةةةة فا ا ةةةةة م انجر ّعك لرف س الرفوت ف إ داد المم ل الدراسك . عرض نتائج االستبانة و حليلها و اسيرها فّر2017 ص101 .) جارب وا جاهات الجامعات الدولية والعربية في مجال التعليم االلكتروني 1 - الرجعا اسمعس ك: تفد تق ك ال فو مّت لدى فةّرف القةعار فة ا دارال اسمعس كة مةة هةت ست ل ّنّ ف الرفوكت اسمعس ارلوم الرفوكت انل رع ر ف ّم1995 حيل او وةت امعس ّ ج كع خللرّ لرلبكقه ه ّ دال ملّرسع رافدال ف مجّل الرفوكت انل رع ر مثةا و ت مي سّتّ ردع تDyna Book LOBO ) تررت ج كفرّ ور فيع ش اسف . مة ال اسيب سرت تغذعررّ اّلبعمجكّت الرفوك ك 2 - الرجعاةة اسسةةرعالك: تجعاةة الرفوةةكت انل رع رةة مرمّ تةة مةةة ننةة إلةةا خةةعى ل جةة د ارال الرعاك الرفوكت ف ا نن فم نن ف ر رسّ دخوت هذه الرق كة فة ةّم1996 تفة د مةةة الرجةةّر المعسةةدال وةةا م ةةر ى الفةةّلت مةةة حيةةل ال ةةع اللةة لك حرةةا اشةةّد وةةذل .) رفك شع مّن ع س فت وا خير 3 - : الرجعاة ال دنة ّرخةت ال ةّح ال بيةعال الرة تر رةع ورةّ ةدا و فةمر وبةع ثةّر د لة فة الفّلت إن ل هذا اسمع لت نق حّف مّم الرفوت انل رع ر تفد مة هت ث ا د ل ف مجّل الرفوكت الجّمف ل ل الجّمفّت ال دن لرّ تجّر مر ي ال ف الرفوكت ا ل رع ر إ ّ سةر ت فة تمة كت وعمجكةّت مر ية ال ت ةة مفةد ممة ت ال ةّدال الرفوك كة مةة لةفر وةةا ا ررعرةةت الرفّمةةا مفرةةّ ا ةةر ل تفربةةع ةةدا رافةةد لورفوةةكت ةةة افةةد سةة ا داخةةا خّرل دا. ليع2017 ص169 - 173 .) 4 - : الرجعا البعسلّرك تفةد مةة الةد ل ال رقدمة فة اسةرف ّل را ة الةرفوت ا ل رع رة حيةل رلأت ال م البعسلّرك ّم2002 وعرّمج ملرع وية جّمف هيعتة ات هيئة تلة سع انلرمّد ال و ف اس رو دا لعاط الجّمفّت ال ر ي ال فيرّ اّلل ف ا ر ّ الفّلت ّإ نلرع فير60 ل رّلب مة الج ية مة20 .د ل ف الفّلت 5 - الرجعا اسل ّرك: ت رو وبع ملع ع مرل ر لوعاط ال سو وية ال حدات الرفوك كة تةت رالرةةّ اّللةة ّت الفّل كةة تريةةع ال جةةّل لر ةةّدل ال فو مةةّت دك ةةّ وي رةةّ انسةةرمّدال مةةة توةة الل ّت ف ت فيع ال فو مةّت ال ظكاكة تلة ر اسمةع لكلة ا الرفوةكت انل رع رة الرمةع . عرض نتائج االستبانة و حليلها و اسيرها وا تفوكت ّر ال ة رركج ال ثّف ال ّرك تقّر ال دل 6 - : الرجعاةةةة ال ةةةة سدن تفةةةةد ال ةةةة سد مةةةةة وثةةةةع الةةةةد ل تقةةةةدمّ فةةةة مجةةةةّل الرفوةةةةكت انل رع رةةةة نمر ورةةّ و كةة ت ركةة ل سةة ت ةةرف ا تقّرةةّت ّلكةة لةةد سةة قت ثيةةعا مةةة الةةد ل فةة هةةذا ال جةّل لرةذا تفربةع رافةةدال قكّدنة فة هةةذا ال ة ّر حيةل ترةةرت ال مة اهر ّمةّ اةةّلرفوكت 6 - وعرةةةةةّمج ا دمةةةةة دEdmodo ): هةةةةة حةةةةةد تلبكقةةةةةّت انررعرةةةةةت مةةةةةة م مةةةةةّت الر افةةةةةا ّانجر ةةةةةّ ال ممةةةةة لورفوةةةةةكت ن ةةةةةّ د اللو ةةةةة فةةةةة انسةةةةةرمّدال مةةةةةة سةةةةة فا ا ةةةةة م انجر ّعك لرف س الرفوت ف إ داد المم ل الدراسك . فّر2017 ص101 .) جارب وا جاهات الجامعات الدولية والعربية في مجال التعليم االلكتروني 1 - الرجعا اسمعس ك: تفد تق ك ال فو مّت لدى فةّرف القةعار فة ا دارال اسمعس كة مةة هةت ست ل ّنّ ف الرفوكت اسمعس ارلوم الرفوكت انل رع ر ف ّم1995 حيل او وةت امعس ّ ج كع خللرّ لرلبكقه ه ّ دال ملّرسع رافدال ف مجّل الرفوكت انل رع ر مثةا و ت مي سّتّ ردع تDyna Book LOBO ) تررت ج كفرّ ور فيع ش اسف . مة ال اسيب سرت تغذعررّ اّلبعمجكّت الرفوك ك 2 - الرجعاةة اسسةةرعالك: تجعاةة الرفوةةكت انل رع رةة مرمّ تةة مةةة ننةة إلةةا خةةعى ل جةة د ارال الرعاك الرفوكت ف ا نن فم نن ف ر رسّ دخوت هذه الرق كة فة ةّم1996 تفة د مةةة الرجةةّر المعسةةدال وةةا م ةةر ى الفةةّلت مةةة حيةةل ال ةةع اللةة لك حرةةا اشةةّد وةةذل .) رفك شع مّن ع س فت وا خير 3 - : الرجعاة ال دنة ّرخةت ال ةّح ال بيةعال الرة تر رةع ورةّ ةدا و فةمر وبةع ثةّر د لة فة الفّلت إن ل هذا اسمع لت نق حّف مّم الرفوت انل رع ر تفد مة هت ث ا د ل ف مجّل الرفوكت الجّمف ل ل الجّمفّت ال دن لرّ تجّر مر ي ال ف الرفوكت ا ل رع ر إ ّ سةر ت فة تمة كت وعمجكةّت مر ية ال ت ةة مفةد ممة ت ال ةّدال الرفوك كة مةة لةفر وةةا ا ررعرةةت الرفّمةةا مفرةةّ ا ةةر ل تفربةةع ةةدا رافةةد لورفوةةكت ةةة افةةد سةة ا داخةةا خّرل دا. عرض نتائج االستبانة و حليلها و اسيرها ليع2017 ص169 - 173 .) 4 - : الرجعا البعسلّرك تفةد مةة الةد ل ال رقدمة فة اسةرف ّل را ة الةرفوت ا ل رع رة حيةل جارب وا جاهات الجامعات الدولية والعربية في مجال التعليم االلكتروني 1 - الرجعا اسمعس ك: تفد تق ك ال فو مّت لدى فةّرف القةعار فة ا دارال اسمعس كة مةة هةت ست ل ّنّ ف الرفوكت اسمعس ارلوم الرفوكت انل رع ر ف ّم1995 حيل او وةت امعس ّ ج كع خللرّ لرلبكقه ه ّ دال ملّرسع رافدال ف مجّل الرفوكت انل رع ر مثةا و ت مي سّتّ ردع تDyna Book LOBO ) تررت ج كفرّ ور فيع ش اسف . مة ال اسيب سرت تغذعررّ اّلبعمجكّت الرفوك ك س ت 2 - الرجعاةة اسسةةرعالك: تجعاةة الرفوةةكت انل رع رةة مرمّ تةة مةةة ننةة إلةةا خةةعى ل جةة د ارال الرعاك الرفوكت ف ا نن فم نن ف ر رسّ دخوت هذه الرق كة فة ةّم1996 تفة د مةةة الرجةةّر المعسةةدال وةةا م ةةر ى الفةةّلت مةةة حيةةل ال ةةع اللةة لك حرةةا اشةةّد وةةذل .) رفك شع مّن ع س فت وا خير 3 - : الرجعاة ال دنة ّرخةت ال ةّح ال بيةعال الرة تر رةع ورةّ ةدا و فةمر وبةع ثةّر د لة فة الفّلت إن ل هذا اسمع لت نق حّف مّم الرفوت انل رع ر تفد مة هت ث ا د ل ف مجّل الرفوكت الجّمف ل ل الجّمفّت ال دن لرّ تجّر مر ي ال ف الرفوكت ا ل رع ر إ ّ سةر ت فة تمة كت وعمجكةّت مر ية ال ت ةة مفةد ممة ت ال ةّدال الرفوك كة مةة لةفر وةةا ا ررعرةةت الرفّمةةا مفرةةّ ا ةةر ل تفربةةع ةةدا رافةةد لورفوةةكت ةةة افةةد سةة ا داخةةا خّرل دا. عرض نتائج االستبانة و حليلها و اسيرها ) لغعض اسرفعاض م ّلعاترت وا اللو 10 - :تجعاةةةة د لةةةة للةةةةع لةةةةّم ال جوةةةة اس وةةةةا لورفوةةةةكت فةةةة د لةةةة للةةةةع ورةةةة فيع ال رةةةة ى ا ل رع ر مثا ال رب ا ل رع رك ال مّدر الرفوك ك الر ت ر ل وةا ر ااةط ل مة ّدر سّفط وا ش ا ررعرت ه مةّ ثةع وةا جة دال الرفوةكت الة ا انجةّو حيةل احروةت للع ال ع العااع وا م ر ى الفّلت ف ج دال الرفوكت لفّم2015 - 2016 . 11 - : الرجعاةة ال ةةف دن ن ثةةا الرفوةةكت انل رع رةة فةة مقدمةة اس لكةةّت لةةدعرّ ح ةةب تقعسةةع شع ويعس ل) ب ت فيع خدمّت الرفوكت ف الفّلت الذل عؤ د األ حجت ا رمّب وا ت ل جكّ الرفوكت نأت ل ة الرم كا اس وا ّل كّ لّمت ال ف دن افقد مذ عال تمّهت مةةع شةةع الرفوةةكت الرةةدرسب ا ل رع ر سةةك ّر ر) نقر ةة ور سةةا ّفةة ال ةةّهج الدراسةةك الا ر خ إل رع رك ة رعسم وعرّمج سك ّر ر الّذل عر ي افدال م انّ ه ر: - سةةر ل الرمةةةمج لج كةةع ال قةةةعرات مةةع إم ّركةةة ال ةةل الر ويةةا ثةةةعا ال ةةّدال الفو كةة مةةة خةةة ل م ع ةةةّت د ات ا ةةةل البعرةةةّمج تةةة فيع مج ةةة مةةةة ال ةةةّ دات مثةةةا ال ةةةعافط . الذه ك الميدع 9 - تجعاةة د لةة ا مةةّرات:الفعاكةة ال ر ةةدال ّرةةت وةةدانّت الرفوةةكت انل رع رةة مةةة خةة ل تب ةة ملةع ع تلةة سع م ةةّهج لرفوةةكت مةةّدال ال ّسة اةلةة لو عحوةة الثّر سةة ةةّم1990 الةةا ال ا ر ةةدت جّمفةة ا مةةّرات اّ ر ةةّد اةع ةةّد جرةةّ رسةة فةة الرفوةةكت الفةةّل وةةدع ةةة ال ّسب اةل ال ل اذل ف ج اللّلةب ا لجةّمف ن ةر دم وعرةّمج الةب وة رد ا ةا سر ل ذل اسر دام وعرّمجApple Tv . عرض نتائج االستبانة و حليلها و اسيرها وا تفوكت ّر ال ة رركج ال ثّف ال ّرك تقّر ال دل 575 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ انل رع رةةة وةةةت ال ر ةةة لوريئةةة ال ةةة سدن لورفوةةةكت ةةةة افةةةد الرةةة تأس ةةةت ةةةّم1999 ّ مر ررةةةّ د ةةةت الرفوةةةكت ا ل رع رةةة فةةة الجّمفةةةّت سر ةةةع لرةةة31 ّ وكةةة ج مفةةة . وةةةّف 2009 ص105 - 106 .) انل رع رةةة وةةةت ال ر ةةة لوريئةةة ال ةةة سدن لورفوةةةكت ةةةة افةةةد الرةةة تأس ةةةت ةةةّم1999 ّ مر ررةةةّ د ةةةت الرفوةةةكت ا ل رع رةةة فةةة الجّمفةةةّت سر ةةةع لرةةة31 ّ وكةةة ج مفةةة . وةةةّف 2009 ص105 - 106 .) 7 - : الرجعا المي ك حققت المية لم ال ر عك ف مجّل الرفوكت انل رع ر ت روة ةة اقكة الد ل ل ررّ حققت تقدم ف مفدنت ال ف ت مةة الةد ل ال رقدمة تلة ر الرفوةكت انل رع رةة م ةةذ الفةةّم1999 الةة ا بيةةع ت جةةد شةةع ّت بيةةعال تف ةةا فةة مجةةّل الرفوةةكت انل رع رةة مةةة اللةةع ّت الف لةة الرةة تف ةةا فةة المةةية شةةع وةة وةة رد اسمعس كةة نما دد ال رميدعة مة الرفوكت ا ل رع ر إلا100 .موي ل 8 - : الرجعاةة الر دنةة تفةة د مةةة الةةد ل العافةةدال فةة فةة ّ البعمجكةةّت م ةةذ ودانةة الفقةةد اسخيةةع لورفةةةةّ ل ال ث ةةةةع ةةةةّم2003 وةةةةية شةةةةع مّن ع سةةةة فت الجّمفةةةةّت اللةةةةع ّت الر دنةةةة لفت مج مة ال لّرسع لد ت ت ل جكّ ال فو مّت انتمّنت فة الر ةد. الفّر 2015 ص42 - 43 .) 9 - تجعاةة د لةة ا مةةّرات:الفعاكةة ال ر ةةدال ّرةةت وةةدانّت الرفوةةكت انل رع رةة مةةة خةة ل تب ةة ملةع ع تلةة سع م ةةّهج لرفوةةكت مةةّدال ال ّسة اةلةة لو عحوةة الثّر سةة ةةّم1990 الةةا ال ا ر ةةدت جّمفةة ا مةةّرات اّ ر ةةّد اةع ةةّد جرةةّ رسةة فةة الرفوةةكت الفةةّل وةةدع ةةة ال ّسب اةل ال ل اذل ف ج اللّلةب ا لجةّمف ن ةر دم وعرةّمج الةب وة رد ا ةا سر ل ذل اسر دام وعرّمجApple Tv . عرض نتائج االستبانة و حليلها و اسيرها ليع2017 ص169 - 173 .) يع لر ص9 ) 4 - : الرجعا البعسلّرك تفةد مةة الةد ل ال رقدمة فة اسةرف ّل را ة الةرفوت ا ل رع رة حيةل رلأت ال م البعسلّرك ّم2002 وعرّمج ملرع وية جّمف هيعتة ات هيئة تلة سع انلرمّد ال و ف اس رو دا لعاط الجّمفّت ال ر ي ال فيرّ اّلل ف ا ر ّ الفّلت ّإ نلرع فير60 ل رّلب مة الج ية مة20 .د ل ف الفّلت 5 - الرجعا اسل ّرك: ت رو وبع ملع ع مرل ر لوعاط ال سو وية ال حدات الرفوك كة تةت رالرةةّ اّللةة ّت الفّل كةة تريةةع ال جةةّل لر ةةّدل ال فو مةةّت دك ةةّ وي رةةّ انسةةرمّدال مةةة توةة الل ّت ف ت فيع ال فو مةّت ال ظكاكة تلة ر اسمةع لكلة ا الرفوةكت انل رع رة الرمةع . وا تفوكت ّر ال ة رركج ال ثّف ال ّرك تقّر ال دل 6 - : الرجعاةةةة ال ةةةة سدن تفةةةةد ال ةةةة سد مةةةةة وثةةةةع الةةةةد ل تقةةةةدمّ فةةةة مجةةةةّل الرفوةةةةكت انل رع رةةةة نمر ورةةّ و كةة ت ركةة ل سةة ت ةةرف ا تقّرةةّت ّلكةة لةةد سةة قت ثيةةعا مةةة الةةد ل فةة هةةذا ال جةّل لرةذا تفربةع رافةةدال قكّدنة فة هةةذا ال ة ّر حيةل ترةةرت ال مة اهر ّمةّ اةةّلرفوكت 4 - : الرجعا البعسلّرك تفةد مةة الةد ل ال رقدمة فة اسةرف ّل را ة الةرفوت ا ل رع رة حيةل رلأت ال م البعسلّرك ّم2002 وعرّمج ملرع وية جّمف هيعتة ات هيئة تلة سع انلرمّد ال و ف اس رو دا لعاط الجّمفّت ال ر ي ال فيرّ اّلل ف ا ر ّ الفّلت ّإ نلرع فير60 ل رّلب مة الج ية مة20 .د ل ف الفّلت 5 - الرجعا اسل ّرك: ت رو وبع ملع ع مرل ر لوعاط ال سو وية ال حدات الرفوك كة تةت رالرةةّ اّللةة ّت الفّل كةة تريةةع ال جةةّل لر ةةّدل ال فو مةةّت دك ةةّ وي رةةّ انسةةرمّدال مةةة توةة الل ّت ف ت فيع ال فو مةّت ال ظكاكة تلة ر اسمةع لكلة ا الرفوةكت انل رع رة الرمةع . عرض نتائج االستبانة و حليلها و اسيرها وا ويئ الرفوكت ا ل رع ر اسر دام وعامجه 7 - ن رّل الرفوكت انل رع رة الةا ا ةداد م ةبم ادلة اوثةع مةة اجةا ت دعةد ّفةع الرمّ ةا . خ ل الدر 8 - لوةة جةة د م ربةةعات م رمةة نت ةةّم الدراسةة مةةة خةة ل الرفوةةكت انل ر ع رةة ال جةةدت فر ل م ر دم فة إ لةّ د رات ال ّسة اسةر دامرّ فة ت لةك اس ةّل ا دارسة فةة ال ؤس ةةةّت الرفوك كةة مثةةا اسةةر دام جرةة ال ال ّسةة مو قّترةةّ فةة ر ّ ةة ال رةةب . العس ك 9 - غكةةّ د ر الردرس ةة مقّررةة اةةّلرفوكت الرقويةةدل حيةةل ن ةةّ د ال رفو ةة ل اف ةةرت الةة فض فةة الر فةةا إلةةا ّإجّاةةّت م ّسةة ل ةةا ال لةة ت مةةة خةة ل ج ةةع البكّرةةّت ت ويورةة .ّ م ّللررّ تم يعه - إم ّرك إرلّ الفدعد مة انخر ةّرات تمة كج هةذه انخر ةّرات إل رع ركّ. عرض نتائج االستبانة و حليلها و اسيرها هّشةت2017 ص109 - 115 .) االستنتاجات 1 - دم ج د خواك مفعدك لورفوكت انل رع ر مة لبا انسّتذال اللو وا حرا ال ؤس ّت الرفوك كةة الرةة لةةت تم ةةع اةةأل ت رةةّر هةةذا ال ةة ع مةةة رةة اع الرفوةةكت لو اةةعال ا ةةر ى لةةا الةةا خعسج الرفوكت انل رع ر ل لفدم ان رعال ل ف.ض الد ل الرّدات الرفوكت ة افد 2 - الرفوةةكت انل رع رةة عةةؤثع وةةا جةة دال الرفوةةكت فةة الجّمفةةّت ح ةةب ر ل ةةّ الريئةة الردرس ةةك لةةة ل رةةه ن ن ةةةع ل ةةّ نقدمةةه الرفوةةكت الرقويةةدل مةةة الرمّ ةةةا الدلةة فةةة .إنمّل ال ّدال 1 - دم ج د خواك مفعدك لورفوكت انل رع ر مة لبا انسّتذال اللو وا حرا ال ؤس ّت الرفوك كةة الرةة لةةت تم ةةع اةةأل ت رةةّر هةةذا ال ةة ع مةةة رةة اع الرفوةةكت لو اةةعال ا ةةر ى لةةا الةةا خعسج الرفوكت انل رع ر ل لفدم ان رعال ل ف.ض الد ل الرّدات الرفوكت ة افد 2 - الرفوةةكت انل رع رةة عةةؤثع وةةا جةة دال الرفوةةكت فةة الجّمفةةّت ح ةةب ر ل ةةّ الريئةة الردرس ةةك لةةة ل رةةه ن ن ةةةع ل ةةّ نقدمةةه الرفوةةكت الرقويةةدل مةةة الرمّ ةةةا الدلةة فةةة .إنمّل ال ّدال 3 - ةةدم رغ ةة ال عاتةةب الفو كةة الفوكةةّ اةةّلرفوكت انل رع رةة خّفةة الةةذعة لةةت ت ةة ل وةةداعررت فةة سو الرفوكت مةع ودانة الثة رال الر ل جكة حيةل ع اجرة ل المةف ا فة م او ة الرلة رات ال ّفةةةو فةةة مجةةةّل تقّرةةةّت انتمةةةّل اسةةةرف ّل ال ّسةةة اّللةةة ا الةةةذل ن ةةة رت مةةةة الردرس مة خ ل ال مّت البعامج ال رّح ل ة رلّب الرفوكت ا ل رع ر. 4 - سر ل إجع ا انخر ّرات ل ة نقّووه دم ج د الثق وية الردرس اللّلب فة م لة ع إجةةةةعا انخر ةةةةّرات ا روةةةة شةةةة ّلرّ لةةةة لفةةةةدم ال ةةةةكلعال وةةةةا اللو ةةةة اث ةةةةّ اجةةةةعا ّ انمر ّرّت ل ر ل الغ ال ا م معد ج. 5 - . ارفدام ال رّرات ف اسرف ّل الرقّرّت ال دعث 6 - ارفدام الردرسب ال بم وا سخةع ال ةر دثّت فة ال جةّل الر لة ج مةة جةا الرفةعل . وا ويئ الرفوكت ا ل رع ر اسر دام وعامجه 6 - ارفدام الردرسب ال بم وا سخةع ال ةر دثّت فة ال جةّل الر لة ج مةة جةا الرفةعل . عرض نتائج االستبانة و حليلها و اسيرها ) لغعض اسرفعاض م ّلعاترت وا اللو 10 - :تجعاةةةة د لةةةة للةةةةع لةةةةّم ال جوةةةة اس وةةةةا لورفوةةةةكت فةةةة د لةةةة للةةةةع ورةةةة فيع ال رةةةة ى ا ل رع ر مثا ال رب ا ل رع رك ال مّدر الرفوك ك الر ت ر ل وةا ر ااةط ل مة ّدر سّفط وا ش ا ررعرت ه مةّ ثةع وةا جة دال الرفوةكت الة ا انجةّو حيةل احروةت للع ال ع العااع وا م ر ى الفّلت ف ج دال الرفوكت لفّم2015 - 2016 . 576 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) / جمةل الداب( اجملدل1 ) العدد142 (أيلول) 2022 / م1444 هـ - إم ّرك إرلّ الفدعد مة انخر ةّرات تمة كج هةذه انخر ةّرات إل رع ركّ . هّشةت2017 ص109 - 115 .) االستنتاجات 1 - دم ج د خواك مفعدك لورفوكت انل رع ر مة لبا انسّتذال اللو وا حرا ال ؤس ّت الرفوك كةة الرةة لةةت تم ةةع اةةأل ت رةةّر هةةذا ال ةة ع مةةة رةة اع الرفوةةكت لو اةةعال ا ةةر ى لةةا الةةا خعسج الرفوكت انل رع ر ل لفدم ان رعال ل ف.ض الد ل الرّدات الرفوكت ة افد 2 - الرفوةةكت انل رع رةة عةةؤثع وةةا جةة دال الرفوةةكت فةة الجّمفةةّت ح ةةب ر ل ةةّ الريئةة الردرس ةةك لةةة ل رةةه ن ن ةةةع ل ةةّ نقدمةةه الرفوةةكت الرقويةةدل مةةة الرمّ ةةةا الدلةة فةةة .إنمّل ال ّدال 3 - ةةدم رغ ةة ال عاتةةب الفو كةة الفوكةةّ اةةّلرفوكت انل رع رةة خّفةة الةةذعة لةةت ت ةة ل وةةداعررت فةة سو الرفوكت مةع ودانة الثة رال الر ل جكة حيةل ع اجرة ل المةف ا فة م او ة الرلة رات ال ّفةةةو فةةة مجةةةّل تقّرةةةّت انتمةةةّل اسةةةرف ّل ال ّسةةة اّللةةة ا الةةةذل ن ةةة رت مةةةة الردرس مة خ ل ال مّت البعامج ال رّح ل ة رلّب الرفوكت ا ل رع ر. 4 - سر ل إجع ا انخر ّرات ل ة نقّووه دم ج د الثق وية الردرس اللّلب فة م لة ع إجةةةةعا انخر ةةةةّرات ا روةةةة شةةةة ّلرّ لةةةة لفةةةةدم ال ةةةةكلعال وةةةةا اللو ةةةة اث ةةةةّ اجةةةةعا ّ انمر ّرّت ل ر ل الغ ال ا م معد ج. 5 - . ارفدام ال رّرات ف اسرف ّل الرقّرّت ال دعث 6 - ارفدام الردرسب ال بم وا سخةع ال ةر دثّت فة ال جةّل الر لة ج مةة جةا الرفةعل . عرض نتائج االستبانة و حليلها و اسيرها العس ك 9 - غكةةّ د ر الردرس ةة مقّررةة اةةّلرفوكت الرقويةةدل حيةةل ن ةةّ د ال رفو ةة ل اف ةةرت الةة فض فةة الر فةةا إلةةا ّإجّاةةّت م ّسةة ل ةةا ال لةة ت مةةة خةة ل ج ةةع البكّرةةّت ت ويورةة .ّ م ّللررّ تم يعه 9 - غكةةّ د ر الردرس ةة مقّررةة اةةّلرفوكت الرقويةةدل حيةةل ن ةةّ د ال رفو ةة ل اف ةةرت الةة فض فةة الر فةةا إلةةا ّإجّاةةّت م ّسةة ل ةةا ال لةة ت مةةة خةة ل ج ةةع البكّرةةّت ت ويورةة .ّ م ّللررّ تم يعه 10 - ةدم جة د م ر ةةّت إل رع ركة فة الجّمفةةّت ت ةّ د اللو ة لو مةة ل وةا ال مةةّدر .مة اجا ارجّ ال ا .مة اجا ارجّ ال ا 577 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ 11 - تةةةأثع ال ؤس ةةةّت الرفوك كةةة ا ؤشةةةعات الجةةة دال ا ةةةّ ن ةةةر م عجّترةةةّ جةةةعا اسةةةر دام الرفوكت ان ل رع ر م ّ ن بب تعاجع ا ر ى ال عسجية ل ل الرفوةكت انل رع رة لةت ن ة ل .مة ل ة رةس هدال تو ال ؤس ّت ا / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 11 - تةةةأثع ال ؤس ةةةّت الرفوك كةةة ا ؤشةةةعات الجةةة دال ا ةةةّ ن ةةةر م عجّترةةةّ جةةةعا اسةةةر دام الرفوكت ان ل رع ر م ّ ن بب تعاجع ا ر ى ال عسجية ل ل الرفوةكت انل رع رة لةت ن ة ل .مة ل ة رةس هدال تو ال ؤس ّت 12 - عرةةةةدرا م ةةةةر ى الجةةةة دال لقوةةةة الرمرةةةةك ال عاق ةةةة مةةةةة الجرةةةةّت الفوكةةةةّ لةةةة ة الرفوةةةةكت . انل رع ر 12 - عرةةةةدرا م ةةةةر ى الجةةةة دال لقوةةةة الرمرةةةةك ال عاق ةةةة مةةةةة الجرةةةةّت الفوكةةةةّ لةةةة ة الرفوةةةةكت . عرض نتائج االستبانة و حليلها و اسيرها انل رع ر 13 - سةةّدال ال م ةةّنال لةةدى اللو ةة ارلةةغّلرت اةةأم ر جّربكةة ّلف ةةا سل الرفوةةكت انل رع رةة ن ن ثا ّ ّفق مّم الف ا خ ل لّت الدراس ا افدهّ ل ل افض ال ةّنت ش مةت امةةةرج اللّلةةةب لوبعرةةةّمج تةةةع انسةةةرّ نلةةةعح د ل ال ن ةةةر ع نلةةةّر اّلةةةدر سرفةةةذر اللّلةب افةدم ال لةّر ل ة خةط انررعرةت انرقلةّع ال ةر ع لولّلة ال رعاّفكة حيةةل تفربةةةةع ر دا ال م ا مةةةة انررعرةةةةت فةةةة الفةةةةعاب سةةةةّدال ارقلةةةةّع الركةةةةّر ال رعاةةةةّف مةةةةة هةةةةت ال ف لّت مّم رجّح الرفوكت ا ل رع ر. ا 14 - سّدال الفب وا الردرس ل ّ خوب لره ف الر افا مع روبره فة الةعد وةا .اسرم ّراترت افد ارررّ الدر مرّاف ا شعال وا ال ا 14 - سّدال الفب وا الردرس ل ّ خوب لره ف الر افا مع روبره فة الةعد وةا .اسرم ّراترت افد ارررّ الدر مرّاف ا شعال وا ال ا 15 - لوةة انرمةةّب ال ةة م ا ةةبب اس مةة ال ّلكةة ات ةةّع سكّسةة الرقلةة ثةةع وةةا ات ةةّع خلةة ات جةةّدال فةة رقةةا ال ؤس ةةّت الرفوك كةة مةةة الرفوةةكت ال ر ةةع لةةدعرّ وةةا فةةم اللعافةةم . الرقويدن الا الرفوكت انل رع ر ا 15 - لوةة انرمةةّب ال ةة م ا ةةبب اس مةة ال ّلكةة ات ةةّع سكّسةة الرقلةة ثةةع وةةا ات ةةّع خلةة ات جةةّدال فةة رقةةا ال ؤس ةةّت الرفوك كةة مةةة الرفوةةكت ال ر ةةع لةةدعرّ وةةا فةةم اللعافةةم . الرقويدن الا الرفوكت انل رع ر 16 - نقدم الرفوكت انل رع ر حا ل ل ت ال ة ال ة ّر ام ّركة اسةرقلّ ا ةداد ثيةعال . مة اللو 16 - نقدم الرفوكت انل رع ر حا ل ل ت ال ة ال ة ّر ام ّركة اسةرقلّ ا ةداد ثيةعال . عرض نتائج االستبانة و حليلها و اسيرها وا ويئ الرفوكت ا ل رع ر اسر دام وعامجه 7 - ن رّل الرفوكت انل رع رة الةا ا ةداد م ةبم ادلة اوثةع مةة اجةا ت دعةد ّفةع الرمّ ةا . خ ل الدر 7 - ن رّل الرفوكت انل رع رة الةا ا ةداد م ةبم ادلة اوثةع مةة اجةا ت دعةد ّفةع الرمّ ةا . خ ل الدر 8 - لوةة جةة د م ربةةعات م رمةة نت ةةّم الدراسةة مةةة خةة ل الرفوةةكت انل ر ع رةة ال جةةدت فر ل م ر دم فة إ لةّ د رات ال ّسة اسةر دامرّ فة ت لةك اس ةّل ا دارسة فةة ال ؤس ةةةّت الرفوك كةة مثةةا اسةةر دام جرةة ال ال ّسةة مو قّترةةّ فةة ر ّ ةة ال رةةب . عرض نتائج االستبانة و حليلها و اسيرها 578 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 24 - عرةةكج ال جةةّل انفرعالةة الةةذل ات ةةذه الرفوةةكت انل رع رةة مةةة إم ّركةة قةةد ال ةةؤت عات ال د ات الفو ك تقدنت ال مج ا رشّد تثق.كا ال جر فّت 25 - ام ّركةةة ل تقةةةدم ال ّتةةةب انسرلةةةّرس فةةة الجّمفةةةّت خةةةدمّترّ لو جر ةةةع بةةةع ات .البعامج ال ر ف ف الرفوكت انل رع ر انسرلّرات اللبك الر دسك الرعج ...الخ 26 - ت رّل الجّمفّت الفعاقك الا وذل ال سد مة الجرد ف تة فيع و كة ت ركة لةّدرال وةا تقدنت ال.رفوكت انل رع ر بدعا ة الرفوكت الرقويدل التوصيات 1 - الرثقكا ح ل الرفوكت انل رع ر اّلل ا الذل ن ج له ال ن ل ودعا مق ةع ةة الرفوةكت .الرقويدل 2 - لع مفّعيع لورفوكت ا ل رع ر الر مة شأررّ رفع م ةر ى جة دال الرفوةكت الفةّل الرة وةةةد رهّ تعفةةةع مةةةة اسةةةت ال ؤس ةةةّت الرف وك كةةة لغةةةعض دخ لرةةةّ لورمةةة كمّت ال ّف ةةة مةةةع . الجّمفّت الفّل ك 3 - د ت الردرس يية تذليا الفق ّت مّمرت مة جةا انلر ةّع اةّلرفوكت انل رع رة مةة خة ل تغييع ال مّيكت ح لةه نسةك ّ لةدى انسةرّ ال ال ةّر ل ة ررت سةّ ةا تغييةع و ة نلةع . ف مؤس ّت الرفوكت الفّل ت 4 - اللوب مةة اللةع ّت الرق كة ال ر ممة فة فة ّ البةعامج انل رع ركة مةة اسةر داا وعامج الغعض م رّ ال د مة ظّهعال الغ بع ال مّت ا ل رع رك. 5 - اّنلّف الا ج د رم ص لّر رك راد لوغ ل ةة مةة انف ةا لةع ميثةّب شةعل ع لع وكه اللّلب افدم الغ خ ل انمر ّرّت الغّنة م ةه سةّدال ّالثقة مةّ وةية انسةر . اللّلب هذا ود ره نل ا دافع مة جا ان ر ّد وا الرفوكت انل رع ر 6 - الف ةا وةةا إلّمةة الةةد رات الردرسبكةة لألسةةّتذال ال ة ظمية اللو ةة فةة الرفةةعل وةةا سخةةع الرقّرةةةةّت ال دعثةةةة فةةةة مجةةةةّل الرفوةةةةكت انل رع رةةةة مةةةةة اجةةةةا الرغوةةةةب وةةةةا ال لةةةة ت ال ف لّت الر . عرض نتائج االستبانة و حليلها و اسيرها مة اللو 17 - تبية ل لورفوكت انل رع رك ام ّرك ف ت فيع فعف الةرفوت لألفةعاد ل ةة فةّتررت فعفة .الدراس خ ل فرعال مفي مة حكّترت ه وذل ع فع الدراس مدى ال كّال ا 17 - تبية ل لورفوكت انل رع رك ام ّرك ف ت فيع فعف الةرفوت لألفةعاد ل ةة فةّتررت فعفة .الدراس خ ل فرعال مفي مة حكّترت ه وذل ع فع الدراس مدى ال كّال ا .الدراس خ ل فرعال مفي مة حكّترت ه وذل ع فع الدراس مدى ال كّال 18 - ن قةةم ت كةة الةة الثقةةّف الفو ةة لولو ةة س ةةّ دهت فةة تجةةّ ةةدم القةةدرال وةةا ال لّر الر نفّر م رّ اللو. ف ودان دراسررت الجّمعك 19 -الرفوكت الرقويدل ا بب ثعال عركج فعف ال لّر ال ا وبع ّ ّرت وكه ف 18 - ن قةةم ت كةة الةة الثقةةّف الفو ةة لولو ةة س ةةّ دهت فةة تجةةّ ةةدم القةةدرال وة ال لّر الر نفّر م رّ اللو. ف ودان دراسررت الجّمعك 18 - ن قةةم ت كةة الةة الثقةةّف الفو ةة لولو ةة س ةةّ دهت فةة تجةةّ ةةدم القةةدرال وةةا ال لّر الر نفّر م رّ اللو. ف ودان دراسررت الجّمعك 19 - عرةةكج فعفةة ال لةةّر الةة ا وبةةع ةةّ ّرةةت وكةةه فةة الرفوةةكت الرقويةةدل ا ةةبب ثةةعال . داد اللو الرقيد اّل لت ال دد لو ّلعال 20 - عر ةةبب الرفوةةكت انل رع رةة اّللةةف ر اّلف لةة لإكةةّ الرمّ ةةا انجر ةةّ وةةية اللو ةة . غكّ ا ح ّ اّل الع 20 - عر ةةبب الرفوةةكت انل رع رةة اّللةةف ر اّلف لةة لإكةةّ الرمّ ةةا انجر ةةّ وةةية اللو ةة . غكّ ا ح ّ اّل الع 22 - . الرأثيع ال وب وا و ّ المعد اّلم رال ال وك 23 - ام ّرك اسر دام ال مّت الرفوك ك ف إ لّ الد رات الردرسبك ف ّف ال جّنت. 23 - ام ّرك اسر دام ال مّت الرفوك ك ف إ لّ الد رات الردرسبك ف ّف ال جّنت. عرض نتائج االستبانة و حليلها و اسيرها ت اجه ال رميدعة مة الرفوكت انل رع ر 7 - الف ةا وةةا تغييةع ال ةةّهج الدراسةةك ا ةّ عر افةةم مةع اللعافةةم ال دعثةة ال ر فة فةة الرفوةةكت انل رع ر ل ل ال ّهج الرقويدن ت رّل الا ت سورّ الة ا مومةّت امةكغWord ) Power point ) PDF ) الةةا لةةت جرةةد هةةذا مةةّ نعر افةةم مةةع لةةت الردرس ةة ال دد اّلدر مرّاف اللو جعا ال ا الفو ك ف ة الر امّته ال كّتك ةا ّهذا نل ا ّفق مّم الرفوكت انل رع ر لذل مة انف ا الذهّ اّتجّه تغييةع ال ةّهج . م ّ ن را ا الردرس 4 - اللوب مةة اللةع ّت الرق كة ال ر ممة فة فة ّ البةعامج انل رع ركة مةة اسةر داا وعامج الغعض م رّ ال د مة ظّهعال الغ بع ال مّت ا ل رع رك. 579 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ 8 - ت جكةةه ال ؤس ةةّت الرفو ك كةة ا ةةع رال ال ّفاةة وةةا ال ربةةعات الرةة ن ةةة انسةةرمّدال م رّ ف مجّل الرفوكت انل رع ر دم اسرف ّلرّ لألخعاض ا دارس. 9 - تف سةة د ر الردرس ةة مةةة خةة ل الر جكةةه اةةّلرفوكت ال ةةدمج الةةذل مةةة شةةأره رفةةع ال ةةر ى الفو ةة لولو ةة تفاةةكت د ر الردرس ةة افةةّد اللةةف ر ال ةةوب تجةة ّه الرفوةةكت انل رع رةة ارذه اللعسق ن ة حم اللّلب ف م أل ت دعد اللّلب ال ر ي مة خيعه مة اللو هذا الجّرةب تةأثع ا ةبب حةّنت الغة الرة عوجةأ إليرةّ اللو ة مةة جةا ال مة ل وةا .درجّت ت ّ سرت مع العاررت ال ر ي سة 10 - اسةةةر داا ال ر ةةةّت انل رع ركةةة تةةة فيع ال مةةةّدر ا لفو كةةة الةةة ا ال رع رةةة مقّررةةة اّل ر ّت ال ج دال ف الجّمفّت الر ت ّ د اللو ف إرجّ ا ثرت خ ل م يعترت . الدراسك 10 - اسةةةر داا ال ر ةةةّت انل رع ركةةة تةةة فيع ال مةةةّدر ا لفو كةةة الةةة ا ال رع رةةة مقّررةةة اّل ر ّت ال ج دال ف الجّمفّت الر ت ّ د اللو ف إرجّ ا ثرت خ ل م يعترت . عرض نتائج االستبانة و حليلها و اسيرها الدراسك 11 - لةةع رةسةة الةة لو ؤس ةةّت الرفوك كةة حةة ل الرفوةةكت ا ل رع رةة حرةةا ن ةة ل مةةة اسهدال الر ت فا الا ت قكقرّ مؤس ّت الرفوكت الفّل وا الا تقدعع ت دعد وكةّت ّمفي د ل خيعهّ ورلبيم الرفوكت ا ل رع ر ف حّل رجّح الرجعا سرف ت وا خيعه . مة الجّمفّت مة اجا ارجّح هذه الرجعا المعسدال وا م ر ى الجّمفّت الفعاقك 11 - لةةع رةسةة الةة لو ؤس ةةّت الرفوك كةة حةة ل الرفوةةكت ا ل رع رةة حرةةا ن ةة ل مةةة اسهدال الر ت فا الا ت قكقرّ مؤس ّت الرفوكت الفّل وا الا تقدعع ت دعد وكةّت ّمفي د ل خيعهّ ورلبيم الرفوكت ا ل رع ر ف حّل رجّح الرجعا سرف ت وا خيعه . مة الجّمفّت مة اجا ارجّح هذه الرجعا المعسدال وا م ر ى الجّمفّت الفعاقك 12 - سّدال انهر ّم اّلد ر العلّو مة لبا الجرّت الفوكّ ف ارال الرفوكت الفّل ال ةل الفو ةة حرةة ا ت ةة ل م عجةةّت الرفوةةكت الفةةّل اّللةة ا الةةذل نجفورةةّ مؤهوةة ل ةة ب الف ةةا هةةذا اسمةةع ح ةةب ر ل الردرس ةةيية تعاجةةع و ةةب خيةةع مقوقةة ل ةةة مةةؤثعال وةةا ر عكةة ال ةةةةعسجية خّفةةةة فةةةة انخرمّفةةةةّت الفو كةةةة الرةةةة ت رةةةةّل إلةةةةا در وكةةةة فةةةة ال ربةةعات الفو كةة هةةذا مةةّ ن ةة ل لةة ة الرفوةةكت ال ةةدمج الةةذل ت ةة ل دكةةه الةةدر ات اللّاع الفو الر ت رّل الا ج د اللّلب ف ال ربةع الة ا ح ة رل اقكة ال ة اد . خّف خيع انسّسك ت ل ال ا انل رع ر 13 - إل ام الردرس يية ا ع رال ت دعل رعافم الردرس اّسةر عار ةدم تقةدنت ال ةّدال العسقة احدال ت سد مة حّلة ال وةا ال مة ر لةد ى اللو ة ل ة ل الجوة مةّم جرةّ ال ّسة الرّت ال قّل لمرعات ر سو ع لد حّل سوبك تجّه الدراس خ ّع ال ّلةعات الة ا م ةةةةر ع لورمرةةةةك مةةةةة لبةةةةا لجةةةةّل م رمةةةة ترةةةةّاع م ةةةةأل الإكةةةةّ ةةةةدم ال ةةةة ر الةةةةا ّالمةةةم ل ا ل رع رةةة رفةةةع تقةةةّرسع الةةة ا د رل الةةةا ةةةّدال ال وكةةة اّ ر ّرهةةة ال ةةةؤ ل . عرض نتائج االستبانة و حليلها و اسيرها هذا اسمع ععا ظّهعال ال سّدال ال ّرك لو انو ك الجّمعك 17 - ت سةةكع رلةةّب الف ةةا فةة ل ةةّم الرفوةةكت ال ةةر ع فةة الجّمفةةّت الرةة تقةةدم خةةدمّت م رومةةة ةةة ح ةةةب انخرمةةةّص ففوةةةا سةةةبيا ال ثةةةّل نقةةة م الرفوةةةكت ال ةةةر ع فةةة وكةةة الوغّت جّمف اغداد اإلّم د رات تل سعس ف مجّل تفوكت الوغّت انج بك الا الجرّت ال مكةة حيةةل ن ةةة لرةةذا الق ةةت مةةة ت ةة سة فةةم ل لولو ةة الةةذعة لةةت ن وةة ا دراسةةررت انوّدن كةةة سسةةة ّ مرفةةةددال جفةةةا الدراسةةة ال رع ركةةة سةةةرت مةةة رت شةةةرّدال ت ةةةعل اسةةة ال اةةةإلعاررت ل ةةةةة بةةةةع وعرةةةةّمج و ةةةة م مةةةةر لرةةةذه المئةةةة م ةةةةرغوية مةةةةّ نقدمةةةةه الرفوةةةةكت .انل رع ر مة ام ّرك او ّل دراسررت ة افد 18 - الّمةةة المفّلكةةةّت ال ةةةؤت عات ال ةةةد ات الفو كةةة الةةة ا إل رع رةةة لولو ةةة حةةةثرت وةةةا ال لّر ورذه ال لّرّت الر ت ّ دهت وا ت لة معحوة الدراسة اّللة ا الةذل ع سةد مة ا.لرمّ ا انجر ّ دك ّ وي رت 18 - الّمةةة المفّلكةةةّت ال ةةةؤت عات ال ةةةد ات الفو كةةة الةةة ا إل رع رةةة لولو ةةة حةةةثرت وةةةا ال لّر ورذه ال لّرّت الر ت ّ دهت وا ت لة معحوة الدراسة اّللة ا الةذل ع سةد مة ا.لرمّ ا انجر ّ دك ّ وي رت 19 - د ةةةت العفةةةّر الفو كةةة ال ّفاةةة وةةةا سةةة ف الجّمفةةةّت الفعاقكةةة امةةةّم ال ا ةةةّت الفّل كةةة هةةةذا مةةةّنف د ر الفةةةعاب لةةة ة الرمةةة كمّت الد لكةةة فةةة مجةةةّل جةةة دال الرفوةةةكت الفةةّل مةةة خةة ل ال ةةل ال ةةر ع ةةة ال ةةوبكّت الرةة تعافةةم الف وكةة الرفوك كةة لةة ة الرفو. عرض نتائج االستبانة و حليلها و اسيرها اس ل وا العفّر الفو ك لو ؤس الرفوك ك 14 - ت جكةةه اللو ةة مةةة خةة ل رةسةةةّ اسل ةةةّم اةةّنلر ام اّلر ليرةةةّت ال ممةةة لوةةدر دم الرجّ وا ال لت ال ح وةذل اسمةع الةذل ن مة مةة الفةب وةا الردرس ة . ت اكت لره اّلل ا الذل ن دم ال مو الفّم 580 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ 15 - ت مةةكر جةة مةةة ال ا رةة ال ّفةة اةةّلرفوكت الفةةّل وةةا د ةةت الرفوةةكت اسل رع رةة اّلل ا الذل نجفا الجّمفّت مؤهو لر سا راّم الرفوكت لدعرّ مةة الرفوةكت الرقويةدل الةا . الرفوكت انل رع ر 16 - اسرث ّر ال مّفر ال ية ات الرة ن رةّ ورةّ الرفوةكت انل رع رة خّفة انم ّركة فةة إلّمةة در ن ةةد اد مةةة اللو ةة تمةة ب اس ةةداد ال ةة ح ورةةّ فةة المةةم ل الرقويدنةة . عرض نتائج االستبانة و حليلها و اسيرها اااا نا 15 - االاربلغ ةریف لحميغ ال دا،ن اإللل رونل ولهاا، ا الهاار21 ن أ وا واساا راا،ج،، الاا دان الحيی االغ اله،هر،غ الدربل لات ر وال ع یعغ ط1 غ2020 . اااا 16 - لخ،رغ ب،ع ةف،الغ اال ا ، االلل رون،ل ميكن إ ا ي ل خعیر االنظماال ال دا،م،االغ لماا، غ ا ال ااروق لات ر وال ع یعغ ط1 غ2017 . ا 16 - لخ،رغ ب،ع ةف،الغ اال ا ، االلل رون،ل ميكن إ ا ي ل خعیر االنظماال ال دا،م،االغ لماا، غ ا ال ااروق لات ر وال ع یعغ ط1 غ2017 . ا ع 17 - ،سد، ،غ مع أحميغ ل، ل ف،یز السرط،ويغ اس خياو الح سعب واالن رنت فل ل،اا، ین ال رب،اال وال دااا،نغ لم، غ ا ال روق لات ر وال ع یعغ ط1 غ2015 . ع 17 - ،سد، ،غ مع أحميغ ل، ل ف،یز السرط،ويغ اس خياو الح سعب واالن رنت فل ل،اا، ین ال رب،اال وال دااا،نغ لم، غ ا ال روق لات ر وال ع یعغ ط1 غ2015 . ع 18 - لمسغ ل:خفا نمرغ إ ا ، الجع ، ال ،لال فل ال رب،ل وال دا،نغ لم، غ ا ل،ياء لات ر وال ع یعغط1 غ 2015 . 18 - لمسغ ل:خفا نمرغ إ ا ، الجع ، ال ،لال فل ال رب،ل وال دا،نغ لم، غ ا ل،ياء لات ر وال ع یعغط1 غ 2015 . 19 - ،ال للغ لس، م،ساان او غ هاايس م،ساان سااد،يغ إ ا ، الجااع ، ال اا،لال فاال الم سساا ال دا،م،االن لداا،ی،ر واخم،ه، ونم،مجغ لم، غ اليا المتهج،ل لات ر وال ع یعغ ط1 غ2017 . ا 19 - ،ال للغ لس، م،ساان او غ هاايس م،ساان سااد،يغ إ ا ، الجااع ، ال اا،لال فاال الم سساا ال دا،م،االن لداا،ی،ر واخم،ه، ونم،مجغ لم، غ اليا المتهج،ل لات ر وال ع یعغ ط1 غ2017 . ا ع ج 20 - لهنغ لج،ي سد،يغ لد،ی،ر ا:م،ن لت،صر ال دان بمس ع ل، ال دان االلل رونلغ بحااث لت ااع فاال لجااال م،لدل فاسخ،ن لذبح،ث والي اس، غ الدي الس، غ یت،ن،ر2014 . 20 - لهنغ لج،ي سد،يغ لد،ی،ر ا:م،ن لت،صر ال دان بمس ع ل، ال دان االلل رونلغ بحااث لت ااع فاال لجااال م،لدل فاسخ،ن لذبح،ث والي اس، غ الدي الس، غ یت،ن،ر2014 . 21 - لزللغ نم،ن م، غ ب،ئ، ال د ان ال ف،لا،لغ اله،هر،غ ا الفلر الدربلغ ط1 غ2014 . عرض نتائج االستبانة و حليلها و اسيرها ل 9 - أبع ل وغ م،ء لحمع غ لت،هج المحث اللمل والتعلل والمخ اطغ لم، غ ا المس،ر، لات اار وال ع یااعغ ط1 غ2013 . ا 9 - أبع ل وغ م،ء لحمع غ لت،هج المحث اللمل والتعلل والمخ اطغ لم، غ ا المس،ر، لات اار وال ع یااعغ ط1 غ2013 . ا 10 - الزنيغ ول،ي كضرغ ال :،ل،ن ال دا،م،ل والتعلعم،، ال دا،ن ب،ن التظریاال وال خم،ااالغ الریاا،ضغ ا الل اا،ب الج،لدل لات رغ ط1 غ2018 . اا 10 - الزنيغ ول،ي كضرغ ال :،ل،ن ال دا،م،ل والتعلعم،، ال دا،ن ب،ن التظریاال وال خم،ااالغ الریاا،ضغ ا الل اا،ب الج،لدل لات رغ ط1 غ2018 . اا 10 - الزنيغ ول،ي كضرغ ال :،ل،ن ال دا،م،ل والتعلعم،، ال دا،ن ب،ن التظریاال وال خم،ااالغ الریاا،ضغ ا الل اا،ب الج،لدل لات رغ ط1 غ2018 . اا 11 - ل، ك ج و نم،رجغ ال دان االلل رونل ن اساا راا،ج،، الی:اا،ل المد رفاال فاال الد:اار الرمماالغ ارمماال نع ، بتت سدع الهزانلغ الری،ضغ ا م،لدل الماك سدع لات رغ ط1 غ2019 . اإ 11 - ل، ك ج و نم،رجغ ال دان االلل رونل ن اساا راا،ج،، الی:اا،ل المد رفاال فاال الد:اار الرمماالغ ارمماال نع ، بتت سدع الهزانلغ الری،ضغ ا م،لدل الماك سدع لات رغ ط1 غ2019 . اإ ل 12 - لالغ لحمااي احماايغ التعلعم،اا، ال دااا،ن اإللل روناال ول خاماا، الجااع ، ال اا،لالغ االساالتي یلغ ا الفلاار الج،لدلغ ط1 غ2021 . اا ل 13 - االاربلغ ةریف لحمي ابراه،نغ ال دا،ن ب،ل خ،ن اساا را ا،ج،ل ال دااا،ن االلل روناال وأ وا الاا دانغ الهاا،هر،غ الدربل لات ر وال ع یعغ ط1 غ2019 . ا ل 13 - االاربلغ ةریف لحمي ابراه،نغ ال دا،ن ب،ل خ،ن اساا را ا،ج،ل ال دااا،ن االلل روناال وأ وا الاا دانغ الهاا،هر،غ الدربل لات ر وال ع یعغ ط1 غ2019 . ا ع ل 14 - فاا، غ نجاا ء لحماايغ لمااي الاارؤوف لحمااي اساام،ل،نغ ال دااا،ن االلل روناال لساا حي ، فاال التظریاال واالس راا،ج،لغ اله،هر،غ ل،لن الل دغ ط1 غ2017 . إا ع ل 14 - فاا، غ نجاا ء لحماايغ لمااي الاارؤوف لحمااي اساام،ل،نغ ال دااا،ن االلل روناال لساا حي ، فاال التظریاال واالس راا،ج،لغ اله،هر،غ ل،لن الل دغ ط1 غ2017 . إا نا 15 - االاربلغ ةریف لحميغ ال دا،ن اإللل رونل ولهاا، ا الهاار21 ن أ وا واساا راا،ج،، الاا دان الحيی االغ اله،هر،غ الدربل لات ر وال ع یعغ ط1 غ2020 . عرض نتائج االستبانة و حليلها و اسيرها كت انل رع ر م ّ ل ت ييم المج ات الر ت بب ف فلا هذه الرجعا 20 - ةةةدم اه ةةةّل الجّرةةةب الةةةذل مةةةة شةةةأره ال عةةةؤثع فةةة و ةةةّ ش مةةةك اللّلةةةب داخةةةا الجّمفةة مةةة خةة ل الر عكةة ال ةةر عال ا لةةّ ال بةةعال ال رعاو ةة لةةدى الردرس ةة اّ ر ةةّره م رلةةةةّر ل ةةةةّ ت ثوةةةةه الجّمفةةةةّت مةةةةة هيئةةةة اسرلةةةةّرس تقةةةة دم اسرلةةةةّرترّ لود لةةةة فةةةة ّفةةةة .ال جّنت حا لو ل ت الر ت اجه ال جر ع 21 - اسةةةةرغ ل ال ةةةةةّح الرةةةةة ت فعهةةةةّ ال مةةةةةّت الرةةةةة ت ةةةةر دم لةةةةة ة رلةةةةةّب الرفوةةةةةكت ا ل رع رةةة فةةةة الةةةةد رات الردرسبكةةةة لولو ةةةة ال ةةةعسجية مةةةةة جةةةةا م ةةةةّ دترت فةةةة ت كةةةة . مرّراترت ف لّت الفلا العاكعك المكاك 22 - تمف يةةا د ر ال ّتةةب انسرلةةّرس فةة الجّمفةةّت الفعاقكةة انسةةرمّدال مةةة وةةعامج الرفوةةكت انل رع ر ف تقدنت خدمّترّ لو رميدعة ا ّ ن ر الةد رات الرعج ة انسرلةّرات ة .ّح ب ت ممر 581 / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) / جمةل الآداب( اجملدل1 ) العدد142 (أ يلول) 2022 / م1444 هـ 4 - ضعا غ لحمع لمي الف ،حغ إ ا ، الجع ، ال ،لالغ اله،هر،غ المجمعلاال الدرب،اال لا ااي ید والت اارغ ط1غ 2012 . 5 - ،زا غ ا ی،ناا، وركاارو غ ال دااا،ن الداا،لل لخيلاال ال:اا،لا الداا،ون اصااعا صااي لاان حر اال معل،االغ الری،ضغ لل مل الدم،ل، لات ر وال ع یعغ ط1 غ2010 . ا ع ع 7 - ،،الف ويغ لحمي ،ظن حس،نغ أك م لهتل ال ي یسن اسل فل العظ،فاال الرساا،ل،ل لذساا ،م الجاا،لدلغ اإلل، ا الدرب،ل الم حي، غ ا افي لات رغ ط1 غ2019 . إ 8 - ،الدمرانیغ لمي الغتل لحمي اسم،ل،نغ لت،هج المحث الدملغ صتد،ءغ لر ااز م،لداال الداااعو وال لتعلعم،اا لال ،ب الج،لدلغ ط2 غ2013 . إ 8 - ،الدمرانیغ لمي الغتل لحمي اسم،ل،نغ لت،هج المحث الدملغ صتد،ءغ لر ااز م،لداال الداااعو وال لتعلعم،اا لال ،ب الج،لدلغ ط2 غ2013 . 8 - ،الدمرانیغ لمي الغتل لحمي اسم،ل،نغ لت،هج المحث الدملغ صتد،ءغ لر ااز م،لداال الداااعو وال لتعلعم،اا لال ،ب الج،لدلغ ط2 غ2013 . ل 9 - أبع ل وغ م،ء لحمع غ لت،هج المحث اللمل والتعلل والمخ اطغ لم، غ ا المس،ر، لات اار وال ع یااعغ ط1 غ2013 . عرض نتائج االستبانة و حليلها و اسيرها 21 - لزللغ نم،ن م، غ ب،ئ، ال د ان ال ف،لا،لغ اله،هر،غ ا الفلر الدربلغ ط1 غ2014 . ل ل ن 22 - ل،لرغ ط، ق لمي الرؤوفغ ال دا،ن لاان بدااي وال دااا،ن المف ااعح غ لماا، غ ا ال،اا، و ي الدام،اال لات اار وال ع یع غ ط1 غ2015 . اا 22 - ل،لرغ ط، ق لمي الرؤوفغ ال دا،ن لاان بدااي وال دااا،ن المف ااعح غ لماا، غ ا ال،اا، و ي الدام،اال لات اار وال ع یع غ ط1 غ2015 . اا ا 25 - ه،ةنغ لجيي یعنسغ ال دان االلل رونلغ اله،هر،غ ا هع المدرفل والمر لغ ط1 غ2017 . 582
https://openalex.org/W3101838266
https://www.confer.cz/metal/2020/download/3647-assessment-of-production-equipment-of-chosen-rolling-mill-in-poland.pdf
English
null
ASSESSMENT OF PRODUCTION EQUIPMENT OF chosen rolling mill IN POLAND
Metal ...
2,020
cc-by
4,052
ERROR: type should be string, got "https://doi.org/10.37904/metal.2020.3647 https://doi.org/10.37904/metal.2020.3647 Abstract Appropriate maintenance of machinery and production equipment allows for smooth production, eliminates \ndowntime related to failures, improves work safety and improves the productivity of an enterprise. Well-\nfunctioning machines allow for production of high-quality products. This is an important topic especially in \nenterprises of the metallurgical industry due to the specificity. They usually work in system 24/7, what is more, \nmachines and devices are used in the most effective way possible. In addition, an important factor is the ability \nto produce products with appropriate quality parameters, because many of these products are used, e.g. in \nvarious machines, vehicles, constructions or buildings. The purpose of the paper was to assess the production \ndevices of one of the rolling mills in Poland in terms of its condition and use. Chosen technical and \ntechnological indicators typical of metallurgical enterprises were used for this assessment. This research \ncovered 5 consecutive years. Slight fluctuations in the values of the research indicators were noted, which is \nwhy the machine breaks were additionally examined. Keywords: Rolling mill, production equipment, modernity, productivity ASSESSMENT OF PRODUCTION EQUIPMENT OF CHOSEN ROLLING MILL IN POLAND \n1Manuela INGALDI, 2Magdalena MAZUR \n1Czestochowa University of Technology, Faculty of Management, Czestochowa, Poland, EU, \nmanuela.ingaldi@wz.pcz.pl; manuela@gazeta.pl \n1Czestochowa University of Technology, Faculty of Management, Czestochowa, Poland, EU, \nmagdalena.mazur@wz.pcz.pl 1Czestochowa University of Technology, Faculty of Management, Czestochowa, Poland, EU, \nmanuela.ingaldi@wz.pcz.pl; manuela@gazeta.pl \n1Czestochowa University of Technology, Faculty of Management, Czestochowa, Poland, EU, \nmagdalena.mazur@wz.pcz.pl https://doi.org/10.37904/metal.2020.3647 ESSMENT OF PRODUCTION EQUIPMENT OF CHOSEN ROLLING MILL IN POLAN ASSESSMENT OF PRODUCTION EQUIPMENT OF CHOSEN ROLLING MILL IN POLAND\n1Manuela INGALDI, 2Magdalena MAZUR \n1Czestochowa University of Technology, Faculty of Management, Czestochowa, Poland, EU, \nmanuela.ingaldi@wz.pcz.pl; manuela@gazeta.pl \n1Czestochowa University of Technology, Faculty of Management, Czestochowa, Poland, EU, \nmagdalena.mazur@wz.pcz.pl May 20th - 22nd 2020, Brno, Czech Republic, EU 1. \nINTRODUCTION The maintenance department, which is responsible for maintaining the suitability of equipment for carrying out \nproduction processes, is part of every production system. Currently, this department is also part of the analysis \nof the effectiveness of processes that are part of the overall efficiency of implemented manufacturing \nprocesses [1]. The basic issue in this respect is the TPM concept, which includes the tasks of maintaining \nequipment for operation in processes, supervising the efficiency indicators of these machines, and the direct \nimpact on the production capacity and productivity of manufacturing processes [2,3]. The TPM system is one \nof the foundations of the Lean Management concept, which is based on the elimination of basic types of waste, \nalso those related to the operation of machinery and production equipment [4]. The technical condition and quality of used machines and devices directly affect the downtime in the \nimplementation of the production schedule. This element of waste in the production system has a significant \nimpact on the implementation of the assumed production plan and on the flexibility function of organized \nproduction process. Therefore, properly prepared strategies for the maintenance of machines is the basis for \nmaintaining the production capacity of the system for the production and realizations of orders in the planned \ntime periods [5]. The importance of machine maintenance strategies is enhanced by the high level of high-\nscale production automation and mechanization as well as the long service life of the used equipment [6,7]. Taking into account these elements and their importance, maintenance is the basis deciding about \nmanufacturing capabilities, but in accordance with the principles of Lean Management, they are also subject \nto the principles of optimization and adequate efficiency of operations that apply to all corporate resources, May 20th - 22nd 2020, Brno, Czech Republic, EU without exception. The main idea related to maintenance is to prepare parts and machines to do what is \nrequired in the allocated time and sizes, and to do it with less resources [8,9]. without exception. The main idea related to maintenance is to prepare parts and machines to do what is \nrequired in the allocated time and sizes, and to do it with less resources [8,9]. The TPM concept uses two basic indicators. Firstly, it is focused on minimizing waste in the production and \noperation of equipment from the point of view of the use of production capacities that have been planned. 1. \nINTRODUCTION Secondly, it focuses on the quality of created products, where the main goal is to achieve a zero level of \nproduct defects [10]. These two elements still allow reducing the amount of production scrap or reducing the \ndefect rate, no breakdown, no accidents, no waste during the process or replacement [11]. Numerous \npublications based on the implementation and use of the TPM concept show the benefits for the production \nsystem in terms of eliminating waste of time (according to the number of breakdowns as well as the number \nof production defects and the resulting corrective actions). Monitoring and calculating the main indicator of the \nefficiency and productivity of the use of the machine park also gives the company information at what stage of \nthe strategy implementation is, where weak points in the organization of production are, and as a consequence \nof further analysis also about way of possible improvement [12,13]. Metallurgical enterprises belong to those enterprises that work in a continuous system, which means that \nproduction devices are used 24/7. Maintenance and repairs of machines must be properly planned so as not \nto cause too long stoppages in production and reduction of the company's productivity and efficiency. The purpose of the paper was to assess the production devices of one of the rolling mills in Poland in terms of \nits condition and use. Chosen technical and technological indicators typical of metallurgical enterprises were \nused for this assessment. This research covered 5 consecutive years. 2. \nMETHODOLOGY An assessment of the rolling mill production equipment in one of the steelwork in Poland was conducted. The \nindicators for the research were chosen from the point of view of the specificity of the operation in the research \nenterprise and collected data. The estimation of the technical work equipment, which is used in the structures \nof the enterprise, illustrates the dependence of the replacement value of the machine park and labor inputs as \nwell as the work efficiency achieved with the use of these resources. This indicator is the result element of the \nimplemented TPM strategy and the principles of maintaining machinery and equipment in the technological \nline. The technical work equipment is the most general and most common indicator showing the technical level \nof an enterprise. This indicator is the ratio of value of fixed production assets to the number of employees [14]: 𝑇𝑒𝑐ℎ𝑛𝑖𝑐𝑎𝑙 𝑤𝑜𝑟𝑘 𝑒𝑞𝑢𝑖𝑝𝑚𝑒𝑛𝑡=\n𝑣𝑎𝑙𝑢𝑒 𝑜𝑓 𝑓𝑖𝑥𝑒𝑑 𝑝𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑜𝑛 𝑎𝑠𝑠𝑒𝑡𝑠\n𝑒𝑚𝑝𝑙𝑜𝑦𝑚𝑒𝑛𝑡 𝑇𝑒𝑐ℎ𝑛𝑖𝑐𝑎𝑙 𝑤𝑜𝑟𝑘 𝑒𝑞𝑢𝑖𝑝𝑚𝑒𝑛𝑡=\n𝑣𝑎𝑙𝑢𝑒 𝑜𝑓 𝑓𝑖𝑥𝑒𝑑 𝑝𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑜𝑛 𝑎𝑠𝑠𝑒𝑡𝑠\n𝑒𝑚𝑝𝑙𝑜𝑦𝑚𝑒𝑛𝑡 𝑇𝑒𝑐ℎ𝑛𝑖𝑐𝑎𝑙 𝑤𝑜𝑟𝑘 𝑒𝑞𝑢𝑖𝑝𝑚𝑒𝑛𝑡=\n𝑣𝑎𝑙𝑢𝑒 𝑜𝑓 𝑓𝑖𝑥𝑒𝑑 𝑝𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑜𝑛 𝑎𝑠𝑠𝑒𝑡𝑠\n𝑒𝑚𝑝𝑙𝑜𝑦𝑚𝑒𝑛𝑡 𝑚𝑒𝑛𝑡=\n𝑣𝑎𝑙𝑢𝑒 𝑜𝑓 𝑓𝑖𝑥𝑒𝑑 𝑝𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑜𝑛 𝑎𝑠𝑠𝑒𝑡𝑠\n𝑒𝑚𝑝𝑙𝑜𝑦𝑚𝑒𝑛𝑡\n \n \n \n \n \n \n (1) (1) The numerator \"may include all fixed assets or only the so-called active part of fixed assets (machinery and \ntechnical equipment without buildings)\" [15]. This part of the analysis of production resources is related to \ntechnical progress that may occur in the enterprise. The increase in value of equipment enhances the \nproduction force and in some way facilitates human work, which is expressed in higher productivity. When assessing the productivity of fixed assets or production assets, the research focuses primarily on \nassessing the relationship between fixed assets and the volume of production. Therefore, an important \nindicator that presents the efficiency relationship is the indicator showing the ratio of achieved production \neffects per 1 PLN of fixed assets involved in the production process [14]: 𝑃𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑣𝑖𝑡𝑦 𝑜𝑓 𝑓𝑖𝑥𝑒𝑑 𝑝𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑜𝑛 𝑎𝑠𝑠𝑒𝑡𝑠=\n𝑝𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑜𝑛\n𝑎𝑣𝑒𝑟𝑎𝑔𝑒 𝑣𝑎𝑙𝑢𝑒 𝑜𝑓 𝑓𝑖𝑥𝑒𝑑 𝑝𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑜𝑛 𝑎𝑠𝑠𝑒𝑡𝑠 \n \n \n \n (2) 3. \nRESULTS Table 1 presents summary of calculated indicators in the research period. To calculate these indicators, the \nvalue of production machinery and equipment of the chosen rolling mill was taken into account. Table 1 Summary of indicators in the research period [own study] Table 1 Summary of indicators in the research period [own study] \nIndicator \nYear 1 \nYear 2 \nYear 3 \nYear 4 \nYear 5 \nTechnical work equipment [PLN/person] \n509453.42 469646.47 398311.98 339327.97 299302.57 \nProductivity of fixed production assets [kg/PLN] \n2.49 \n2.62 \n3.66 \n4.82 \n4.25 \nFixed production assets involvement indicator [PLN/Mg] \n400.90 \n381.10 \n273.47 \n207.36 \n235.17 \nWorking time indicator for production equipment \n0.787 \n0.787 \n0.813 \n0.762 \n0.687 \nBreaks time indicator for production equipment \n0.213 \n0.213 \n0.187 \n0.238 \n0.313 In the case of the research rolling mill, the technical work equipment was systematically decreasing. This was \nrelated to changes in the means of production, as there were no major changes in the volume of employment. That is why this situation was related only to the general aging of the machine park and the lack of new \ninvestments in recent years. In the case of the research rolling mill, the technical work equipment was systematically decreasing. This was \nrelated to changes in the means of production, as there were no major changes in the volume of employment. That is why this situation was related only to the general aging of the machine park and the lack of new \ninvestments in recent years. In the case of the research rolling mill, the technical work equipment was systematically decreasing. This was \nrelated to changes in the means of production, as there were no major changes in the volume of employment. That is why this situation was related only to the general aging of the machine park and the lack of new \ninvestments in recent years. Productivity of fixed production assets and fixed production assets involvement indicator deserve a lot of \nattention. Despite a clear decrease in the value of production assets, these changes do not coincide with \nchanges in the production volume. What's more, it is possible to notice a continuous increase in productivity, \nexcept for last year of research period, when small decrease of the indicator was observed. This means that \ndespite the decrease in the value of production means and the lack of investment, the rolling mill is able to \nproduce the high amount of products. 𝑃𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑣𝑖𝑡𝑦 𝑜𝑓 𝑓𝑖𝑥𝑒𝑑 𝑝𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑜𝑛 𝑎𝑠𝑠𝑒𝑡𝑠=\n𝑝𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑜𝑛\n𝑎𝑣𝑒𝑟𝑎𝑔𝑒 𝑣𝑎𝑙𝑢𝑒 𝑜𝑓 𝑓𝑖𝑥𝑒𝑑 𝑝𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑜𝑛 𝑎𝑠𝑠𝑒𝑡𝑠 (2) Fixed production assets involvement indicator have an absorbent nature. It presents the opposite attitude to \nthe productivity of fixed production assets. It represents the amount of fixed assets involved per unit of \nproduction volume. In the literature it is often called the indicator of capital intensity or material intensity [16]. This indicator is calculated according to the following formula [17]: May 20th - 22nd 2020, Brno, Czech Republic, EU 𝐹𝑖𝑥𝑒𝑑 𝑝𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑜𝑛 𝑎𝑠𝑠𝑒𝑡𝑠 𝑖𝑛𝑣𝑜𝑙𝑣𝑒𝑚𝑒𝑛𝑡 𝑖𝑛𝑑𝑖𝑐𝑎𝑡𝑜𝑟=\n𝑎𝑣𝑒𝑟𝑎𝑔𝑒 𝑣𝑎𝑙𝑢𝑒 𝑜𝑓 𝑓𝑖𝑥𝑒𝑑 𝑝𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑜𝑛 𝑎𝑠𝑠𝑒𝑡𝑠\n𝑝𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑜𝑛 (3) Efficiency of use of production equipment is measured by the time of their work in the course of production. The most frequently calculated indicator is work time indicator for production equipment, presenting the ratio \nof the effective working time to the maximum possible to use working time [15]: 𝑊𝑜𝑟𝑘𝑖𝑛𝑔 𝑡𝑖𝑚𝑒 𝑖𝑛𝑑𝑖𝑐𝑎𝑡𝑜𝑟 𝑓𝑜𝑟 𝑝𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑜𝑛 𝑒𝑞𝑢𝑖𝑝𝑚𝑒𝑛𝑡=\n𝑠𝑢𝑚 𝑜𝑓 𝑡ℎ𝑒 𝑒𝑓𝑓𝑒𝑐𝑡𝑖𝑣𝑒 𝑤𝑜𝑟𝑘𝑖𝑛𝑔 𝑡𝑖𝑚𝑒\n𝑠𝑢𝑚 𝑜𝑓 𝑡ℎ𝑒 𝑚𝑎𝑥𝑖𝑚𝑢𝑚 𝑝𝑜𝑠𝑠𝑖𝑏𝑙𝑒 𝑡𝑜 𝑢𝑠𝑒 𝑤𝑜𝑟𝑘𝑖𝑛𝑔 𝑡𝑖𝑚𝑒 \n (4) (4) To illustrate the extent to which production machines and equipment were not used, the breaks time indicator \ncan be used. It can be calculated as follows [15]: 𝐵𝑟𝑒𝑎𝑘𝑠 𝑡𝑖𝑚𝑒 𝑖𝑛𝑑𝑖𝑐𝑎𝑡𝑜𝑟 𝑓𝑜𝑟 𝑝𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑜𝑛 𝑒𝑞𝑢𝑖𝑝𝑚𝑒𝑛𝑡=\n𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑏𝑟𝑒𝑎𝑘𝑠 ℎ𝑜𝑢𝑟𝑠\n𝑠𝑢𝑚 𝑜𝑓 𝑡ℎ𝑒 𝑚𝑎𝑥𝑖𝑚𝑢𝑚 𝑝𝑜𝑠𝑠𝑖𝑏𝑙𝑒 𝑡𝑜 𝑢𝑠𝑒 𝑤𝑜𝑟𝑘𝑖𝑛𝑔 𝑡𝑖𝑚𝑒 \n \n (5) (5) There are no specific values for individual indicators in the literature, because their level depends on many \nfactors. However, it is worth calculating them at regular intervals and comparing them to assess the overall \nsituation of the company. In addition, an analysis of the causes of breaks in the rolling mill was carried out. The percentage shares of \nindividual causes of breaks were calculated for each year in the analyzed period. 3. \nRESULTS The decrease of the indicator in year 5 was caused by a decrease in \norders for products, and thus a decrease in general production. The opposite situation was illustrated by fixed \nproduction assets involvement indicator. There was less and less fixed production assets for the production of \n1 Mg of products. With the exception of year 5, when production volume dropped dramatically, and thus a \nslight increase in the indicator was noted, which was caused by a decrease in demand. Working time indicator for production equipment informs about the rational use of production means. The \nhigher the value of the indicator is, the better the use of working time is. It can be seen that in year 1 and year May 20th - 22nd 2020, Brno, Czech Republic, EU 2 working time indicators were at the same level. In the following year, the rolling mill utilized the working time \nof the production means in over 0.813%, unfortunately in the last year only in almost 0.687%. Breaks time \nindicator for production equipment informs about level of breaks in working time. The high value of this indicator \nmeans low rationality of using the means of production. High value of this indicator was noted in year 5. This \nmeans that over 0.313 of the maximum possible to use time consists of different types of breaks in work of the \nrolling mean. However, one important thing should be emphasized that will be seen later in the further analysis. Research \nrolling mill produces different types of products, different dimensions of these products, which is associated \nwith the need for frequent changeover of the rolling mill. Additionally, the production plan includes periodic \ninspections and planned renovations of the rolling mill resulting from maintenance. Therefore, maximum \npossible to use time cannot be fully used. Fluctuations in the value of breaks time indicator for production equipment in individual years of the research \nperiod caused the need for additional research. The causes of breaks in work of the research rolling mill were \nanalyzed. Table 2 presents the causes and percentage shares of individual causes of breaks in the research \nperiod. 3. \nRESULTS Table 1 Summary of breaks in work of rolling mill in the research period, [%] [own study] \nCauses of breaks \nYear 1 \nYear 2 \nYear 3 \nYear 4 \nYear 5 \ntechnological \n73.08 \n84.21 \n87.71 \n76.46 \n75.05 \ndefects \n0.00 \n0.12 \n0.36 \n11.71 \n10.58 \nmechanical \n2.74 \n3.34 \n3.42 \n3.80 \n4.94 \nelectric \n4.67 \n3.64 \n3.20 \n3.26 \n4.09 \nenergetic \n1.83 \n1.15 \n0.95 \n1.51 \n1.40 \nexternal \n0.00 \n0.49 \n0.73 \n0.48 \n0.55 \norganizational, including: \n8.84 \n7.04 \n3.64 \n1.39 \n3.39 \n- lack of material \n0.00 \n3.28 \n2.40 \n0.00 \n0.00 \n- re-heating of material \n0.00 \n0.36 \n0.00 \n0.00 \n0.00 \n- other organizational reasons \n8.84 \n3.40 \n1.24 \n1.39 \n3.39 mmary of breaks in work of rolling mill in the research period, [%] [own study] Table 1 Summary of breaks in work of rolling mill in the research period, [%] [own study] Throughout the entire research period, technological breaks had the largest share in all breaks. As mentioned \nearlier, they are associated with all kinds of technological changes, primarily with machine as equipment \nchangeover but also inspections and repairs. However, some differences in the proportion of these breaks can \nbe seen. In year 2 and 3 the share of such breaks was around 85%, in the remaining years around 75%. This \nmeans that in the remaining years, the share of other, less desirable breaks increased. In year 4 and 5 a large share of breaks due to different production defects can be seen. This was related to \nthe increase in the number of defects during this period. They were caused by many factors: material defects \n(poor material composition) and technical factors resulting from the general condition of the equipment [13]. Mechanical breaks are associated with rolling mill breakdowns. However, there were no large differences in \nshare of this type of breaks. In the whole research period, this share did not exceed 5% of the total break time. This level of breaks was caused by the implementation of TPM principles and inspections and repairs at the \nrolling mill operation resulting from maintenance. A similar situation was noted in the case of electrical breaks, \ni.e. all the downtime associated with the lack of electricity or failures related to electricity. In the whole research \nperiod, this share was below 5%. Organizational breaks are noteworthy. Their large share was recorded in \nyear 1 and 2. 4. \nCONCLUSION The condition of production machines and devices influences not only the course of the production process, \nbut above all the quality of manufactured products. That is why proper management of machine exploitation is \nso important. Among the methods that are helpful in this case, it is necessary to highlight the TPM system \nfunctioning, among others, under the concept of Lean Management. TPM includes planned inspections and \nperiodic repairs to avoid waste related to e.g. breakdowns or defects of products [18,19]. The products from \nthe research rolling mill are used in many industries, e.g. in various types of constructions, machines, cars or \nbuildings. The proper quality of materials used in such constructions affects not only their quality but also the \nuser's safety. In the paper the use of rolling mill production machinery and equipment in one of Polish \nsteelworks was presented. Technical and technical indicators were used. The analysis showed that the \nproduction equipment was aging due to a lack of investment, but its overall condition should be considered \ngood. Despite the decrease in the value of fixed assets, it is possible to produce the right amount of products \nin accordance with orders. The working time of the machines was approx. 80%, except for the last research \nyear, when this level was below 70%. Nevertheless, it should be remembered that the breaks time should also \ninclude the time spent on the changeover of the rolling mill, so that a wide range of products can be produced. However, some investments in modernization of the machine park is needed because there has been an \nincrease in the number of defect. Such a careful approach to maintaining the machine park and thus ensuring \nthe safety of employees can also be useful in other industries, e.g. industrial soldering [20], biotechnology \n[21,22] or laser machining [23,24]. It may be also used in similar approaches to decision support [25] and \nevaluation methodology [26,27]. 3. \nRESULTS In the case of year 1, these were primarily other organizational breaks (breaks related to \nadditional days or free hours not previously planned). In case of year 2, apart from this reason, the lack of May 20th - 22nd 2020, Brno, Czech Republic, EU material also dominated, i.e. the lack of billets for production. In the same year there were breaks related to \nthe need to re-heat material before rolling. To avoid production defect and to modernize production, rolling mill \nmanagement should start investing more in production resources. Along with a decrease in the value of \nproduction means, their aging occurs, which results in greater system failure rate and more frequent defects. material also dominated, i.e. the lack of billets for production. In the same year there were breaks related to \nthe need to re-heat material before rolling. To avoid production defect and to modernize production, rolling mill \nmanagement should start investing more in production resources. Along with a decrease in the value of \nproduction means, their aging occurs, which results in greater system failure rate and more frequent defects. REFERENCES [1] \nNOWICKA-SKOWRON, M., ULEWICZ, R. Quality management in logistics processes in metal branch. In 24th \nInternational conference on metallurgy and materials, In METAL 2015: 24th Int. Conf. on Metallurgy and \nMaterials. Ostrava: TANGER, 2015, pp. 1707-1712. [1] \nNOWICKA-SKOWRON, M., ULEWICZ, R. Quality management in logistics processes in metal branch. In 24th \nInternational conference on metallurgy and materials, In METAL 2015: 24th Int. Conf. on Metallurgy and \nMaterials. Ostrava: TANGER, 2015, pp. 1707-1712. [2] \nMAZUR, M., MOMENI, H. Lean Production issues in the organization of the company - results. Production \nEngineering Archives. 2019, vol. 22, pp. 50-53, doi: 10.30657/pea.2019.22.10. [3] \nMASZKE, A., DWORNICKA, R., ULEWICZ, R. Problems in the Implementation of the Lean Concept at a Steel \nWorks - Case Study. MATEC Web of Conferences. 2018, vol. 183, doi: 10.1051/matecconf/201818301014. [4] \nMASZKE, A. The analysis of machine operation and equipment loss in ironworks and steelworks, Production \nEngineering Archives. 2017, vol. 17, pp. 45-48. doi: 10.30657/pea.2017.17.10. [5] \nULEWICZ, R., SELEJDAK, J., BORKOWSKI, S., JAGUSIAK-KOCIK, M., Process management in the cast iron \nfoundry. In METAL 2013: 22nd Int. Conf. on Metallurgy and Materials. Ostrava: TANGER, 2013, pp. 1926-1931. [6] \nSÖDERHOLM, P., NILSEN, T. Systematic risk-analysis to support a living maintenance programme for railway \ninfrastructure. Journal of Quality in Maintenance Engineering. 2017, vol. 23, no. 3, pp. 326-340, doi: \n10.1108/JQME-09-2016-0042. May 20th - 22nd 2020, Brno, Czech Republic, EU [7] \nGÁLOVÁ, K., RAJNOHA, R., ONDRA, P. The use of industrial lean management methods in the economics \npractice: An empirical study of the production companies in the Czech Republic. Polish Journal of Management \nStudies. 2018, vol. 17, iss. 1, pp. 93-104, DOI: 10.17512/pjms.2018.17.1.08. [8] \nALMEANAZEL, O.T.R. Total Productive Maintenance Review and Overall Equipment Effectiveness \nMeasurement. Jordan Journal of Mechanical and Industrial Engineering. 2010, vol. 4, no. 4, pp. 517-522. [9] \nWUDHIKARN, R. Implementation of overall equipment effectiveness in wire mesh manufacturing. In 2011 IEEE \nInternational Conference on Industrial Engineering and Engineering Management, IEEE, 2011, pp. 819-823. [10] \nLYSANOV, D.M., KARAMYSHEV, A.N., EREMINA, I.Il. Comparative Evaluation Of Quality Characteristics Of \nProcess Equipment. Astra Salvensis. 2017, year V, no. 10, pp. 217-223. [11] \nSHARMA, R.K., DINESH, K., PRADEEP, K. Manufacturing excellence through TPM implementation: a practical \nanalysis. Industrial Management & Data System. 2006, vol.106, pp. 256-280. [12] \nKNOP, K., MIKULOVÁ, P. REFERENCES Evaluation of the Level of Work Safety, Advancement and Efficiency of the Use of \nMachines and Devices on Labelling and Packaging Line and an Attempt to Compare the Results Using the \nModified McKinsey Matrix. System Safety: Human-Technical Facility-Environment. 2019, vol.1, iss. 1, pp. 189-\n196. [13] \nKLIMECKA-TATAR, D., DWORNICKA, R. The Assembly Process Stability Assessment Based on the Strength \nParameters Statistical Control of Complex Metal Products. In METAL 2019: 28th Int. Conf. on Metallurgy and \nMaterials. Ostrava: TANGER, 2019, pp. 709-714. [14] \nJANASZ, W., URBAŃCZYK, E., WAŚNIEWSKI, T. Gospodarka środkami trwałymi w przedsiębiorstwie. Warszawa: Państwowe Wydawnictwo Ekonomiczna, 1988. [15] \nSOBCZYK, G. (ed.) Ekonomika przedsiębiorstwa. Zbiór przykładów i zadań. Lublin: Wyd. UMCS, 1995. 6] \nGRABARA, A.S. Ekonomika i organizacja pracy w przedsiębiorstwie. Częstochowa: Skrypt uczelniany [16] \nGRABARA, A.S. Ekonomika i organizacja pracy w przedsiębiorstwie. Częstochowa: Skrypt uczelniany PCz, 1986\n[17]\nINGALDI M\nDZIUBA S T The Use of the FMEA Method for Qualitative Analysis of Steel Bars In METAL 2018: 7] \nINGALDI, M., DZIUBA, S.T. The Use of the FMEA Method for Qualitative Analysis of Steel Bars. In M\n27th Int. Conf. on Metallurgy and Materials. Ostrava: TANGER, 2018, pp. 1996-2001. [18] \nTABOR, J. Maintenance management and occupational safety in manufacturing organizations. Polish Journal of \nManagement Studies. 2014, vol. 10, iss. 2, pp. 225-235. [19] \nKRYNKE, M., MIELCZAREK, K., VAŠKO, A. Analysis of the Problem of Staff Allocation to Work Stations. Conf. Quality Production Improvement – CQPI. 2019, vol. 1, iss. 1, pp. 545-550, doi: 10.2478/cqpi-2019-0073. [20] \nPIETRASZEK, J., GADEK-MOSZCZAK, A., TORUNSKI, T. Modeling of Errors Counting System for PCB \nSoldered in the Wave Soldering Technology. Advanced Materials Research. 2014, vol.874, pp. 139-143. [21] \nSKRZYPCZAK-PIETRASZEK, E., PISKA, K., PIETRASZEK, J. Enhanced production of the pharmaceutically \nimportant polyphenolic compounds in Vitex agnus castus L. shoot cultures by precursor feeding strategy. Engineering in Life Sciences. 2018, vol. 18, pp. 287-297. [22] \nSKRZYPCZAK-PIETRASZEK, E., KWIECIEN, I., GOLDYN, A., PIETRASZEK, J. HPLC-DAD analysis of arbutin \nproduced from hydroquinone in a biotransformation process in Origanum majorana L. shoot culture. Phytochemistry Letters. 2017, vol. 20, pp. 443-448. [23] \nGADEK-MOSZCZAK, A., RADEK, N., WRONSKI, S., TARASIUK, J. Application the 3D Image Analysis \nTechniques for Assessment the Quality of Material Surface Layer Before and After Laser Treatment. Advanced \nMaterials Research-Switz. 2014, vol.874, pp.133-138. [24] \nRADEK, N., BARTKOWIAK, K. Laser treatment of electro-spark coatings deposited in the carbon steel substrate \nwith using nanostructured WC-Cu electrodes. Physics Procedia. 2012, vol. REFERENCES 39, pp. 295-301. [25] \nPACANA, A., PASTERNAK-MALICKA, M., ZAWADA. M., RADON-CHOLEWA, A. Decision support in the \nproduction of packaging films by cost-quality analysis. Przemysl Chemiczny. 2016, vol. 95, pp. 1042-1044. [26] \nBORKOWSKI, S., ULEWICZ, R., SELEJDAK, J., KONSTANCIAK, M., KLIMECKA-TATAR, D. The use of 3x3 \nmatrix to evaluation of ribbed wire manufacturing technology. In METAL 2012: 21st Int. Conf. on Metallurgy and \nMaterials. Ostrava: TANGER, 2012, pp. 1722-1728. [27] \nSYGUT, P., KLIMECKA-TATAR, D., BORKOWSKI, S. Theoretical Analysis of the Influence of Longitudinal Stress \nChanges on Band Dimensions During Continuous Rolling Process. Archives of Metallurgy and Materials. 2016, \nvol. 16, iss. 1, pp. 183-188, doi: 10.1515/amm-2016-0032."
https://openalex.org/W4377940325
https://www.scielo.br/j/rcbc/a/FW9HxzZkbDZZ7BWtRGxYTCz/?lang=en&format=pdf
English
null
Fecal microbiota transplantation and its repercussions in patients with melanoma refractory to anti-PD-1 therapy: scope review
Revista do Colégio Brasileiro de Cirurgiões
2,023
cc-by
8,996
Fecal microbiota transplantation and its repercussions in patients with melanoma refractory to anti-PD-1 therapy: scope review Transplante de microbiota fecal e suas repercussões em pacientes com melanoma refratário à terapia anti-PD-1: revisão de escopo Eduardo Cerchi Barbosa AcCBC-GO1 ; Eduarda Emília Cruz Bucar1 ; Gabriel Rodrigues Jubé1 ; Letícia Bonfim SilveiraNDbeSepF 1 ; Pedro Lucas Carneiro Ramos1 ; Vitor Ryuiti Yamamoto Moraes1 ; João Ormindo Beltrão Barros1,2 . 1 ; natália Cândido duailiBE silva1 ; PEdro Carvalho CamPos faria Eduardo Cerchi Barbosa AcCBC-GO1 ; Eduarda Emília Cruz Bucar1 ; Gabriel Rodrigues Jubé1 ; Letícia Bonfim SilveiraNDbeSepF 1 ; Pedro Lucas Carneiro Ramos1 ; Vitor Ryuiti Yamamoto Moraes1 ; João Ormindo Beltrão Barros1,2 . 1 ; natália Cândido duailiBE silva1 ; PEdro Carvalho CamPos faria A B S T R A C T A B S T R A C T Introduction: despite being extremely effective in some cases, up to 70% of patients with melanoma do not respond to anti-PD-1/ PD-L1 (primary resistance) and many of the responders eventually progress (secondary resistance). Extensive efforts are being made to overcome this resistance through new strategies, especially aimed at modulating the intestinal microbiota. Objective: to assess whether fecal microbiota transplantation (FMT), associated with immunotherapy, is beneficial in the clinical course of patients with refractory melanoma. Methods: this is a scope review, based on studies collected on the MEDLINE, ScienceDirect, The Cochrane Library, Embase and BMJ Journals; using the terms: “Antibodies, Monoclonal”; “Drug Resistance, Neoplasm”; “Fecal Microbiota Transplantation”; “Host Microbial Interactions”; “Immunotherapy”; “Melanoma”; and “Microbiota”. Clinical trials, in English, with relevant data on the subject and fully available were included. A cut-off period was not determined, due to the limited amount of evidence on the topic. Results: crossing the descriptors allowed the identification of 342 publications and, after applying the eligibility criteria, allowed the selection of 4 studies. From the analyses, it was observed that a considerable part of those studied overcame resistance to immune checkpoint inhibitors after FMT, with better response to treatment, less tumor growth and increased beneficial immune response. Conclusion: it is noted that FMT favors the response of melanoma to immunotherapy, translated into significant clinical benefit. However, further studies are necessary for the complete elucidation of the bacteria and the mechanisms involved, as well as for the translation of new evidence to oncological care practice. Keywords: Antibodies, Monoclonal. Immunotherapy. Melanoma. Microbiota. Fecal Microbiota Transplantation Melanoma is a neoplasm originating from the skin formed from the transformation of melanin- producing cells (melanocytes) and may appear in skin without previous lesions (60-80%) or with pigmented lesions (20-40%), such as melanocytic nevi3. Although it has a lower incidence when compared with non- melanomas, melanoma is the most important form of skin tumor, as it grows and spreads more quickly, has a higher risk of recurrence, and a worse prognosis, with a worldwide survival estimate in five years of 69%, 73% in developed countries and 56% in developing ones4,5. DOI: 10.1590/0100-6991e-20233490-en DOI: 10.1590/0100-6991e-20233490-en Review Article 1 - Universidade Evangélica de Goiás, Medicina - Anápolis - GO - Brasil 2 - Hospital Santa Casa de Anápolis, Cancerologia Cirúrgica - Anápolis - GO - Brasil 1 - Universidade Evangélica de Goiás, Medicina - Anápolis - GO - Brasil 2 - Hospital Santa Casa de Anápolis, Cancerologia Cirúrgica - Anápolis - GO - 1 - Universidade Evangélica de Goiás, Medicina - Anápolis - GO - Brasil INTRODUCTION C ancer is a state that involves both genetic and epigenetic interactions, culminating in a disorderly, autonomous, and uncontrollable proliferation of cells, which may eventually migrate to adjacent structures. This migratory growth characteristic belongs to invasive neoplasms, being called “malignant tumors”. There are more than 200 types of cancer, each with specific clinical and morphological characteristics, with melanoma being the third most common and the most lethal among skin cancers, with an estimated increase of 50% in new cases per year by 2040, according to data from the International Agency for Research on Cancer (IARC)1,2. C Among the risk factors for the development of this tumor, the inheritance of sun-sensitive skin stands out (Fitzpatrick skin types I and II – light skin, hair, and Rev Col Bras Cir 50:e20233490 Barbosa i Barbosa Fecal microbiota transplantation and its repercussions in patients with melanoma refractory to anti-PD-1 therapy: scope review eyes, and susceptibility to sunburn). Other factors include the presence of pigmented lesions, such as freckles, atypical nevi, or large numbers of common nevi (more than 50), intermittent sun exposure, sunburn (especially during childhood), artificial ultraviolet radiation (eg, use of tanning beds), proximity to the equator, and previous melanoma6,7. Positive family history for both melanoma and multiple atypical nevi is also considered a relevant factor. Mutations in the CDKN2A and CDK4 genes have been detected in some families with hereditary melanoma, conferring an approximately 60-90% increased risk for this neoplasm8,4. In addition, the immune status also seems to influence the development of melanoma, as this neoplasm is frequent in immunocompromised patients due to organ transplantation, human immunodeficiency virus (HIV) infection, hematologic malignancy, or use of immunosuppressants9. metastases), adjuvant treatment, systemic therapy, and/ or radiotherapy14. In cases of unresectable, metastatic cutaneous melanoma or with high rates of recurrence (stages III and IV), specific therapies should be considered, such as immunotherapy with immune checkpoint inhibitors (ICIs). Currently, the drugs most used in this treatment are the humanized monoclonal antibodies (mAbs) anti- PD-1 (pembrolizumab and nivolumab) and anti-PD-L1 (atezolizumab, avelumab, and durvalumab), which act by inhibiting the activity of the programmed cell death protein-1 (PD-1)15,16. These drugs bind to the PD-1 receptor, an immunological receptor present on the surface of tumor cells, preventing the receptor from interacting with specific ligands (PD-L1 and PD-L2). INTRODUCTION Blocking the PD-1 pathway signaling cascade inhibits the negative regulation of the immune system, reversing the suppression of T cells and culminating in the anti-tumor response17. The diagnostic suspicion, in general, is based on the identification of a new pigmented lesion (ab initio) or phenotypic alterations of a pre-existing melanocytic nevus. During the assessment, the mnemonic “ABCDE” has been shown to be useful: A – asymmetry; B – irregular edges; C – non-uniform coloring; D – diameter > 6mm; E – evolution, including rapid growth, pruritus, ulceration, and bleeding. The greater the positivity of these signs, the greater the probability of the lesion being a malignant melanoma. However, the definitive diagnosis is made through histopathological examination, which can identify the superficial disseminated, nodular, acral lentiginous, or lentigo maligna patterns10,11. Anti-PD-1/PD-L1 Anti-PD-1/PD-L1 demonstrated superior efficacy and a more favorable toxicity profile than other mAbs, such as ipilimumab, an inhibitor of cytotoxic T lymphocyte-associated antigen 4 (CTLA-4), also widely used in the therapeutic approach of melanoma18,19. However, although these blockers show extreme effectiveness in some cases, up to 70% of patients do not respond to PD-1 blockade (primary resistance) and many who do respond eventually progress (secondary resistance). Therefore, efforts are currently being made to understand in detail the mechanisms underlying resistance, aiming to elucidate biomarkers that can potentially help in identifying responders, as well as finding new strategies that can decrease anti-PD-1/PD- L1 resistance20-24. In terms of prognosis and treatment, staging the disease is essential, in accordance with the American Joint Commission on Cancer (AJCC) protocol, which divides patients into four distinct groups. The group is defined according to the phase the patient is in, in which stages I and II are considered clinically localized disease, stage III, locoregional disease, including individuals with metastases to regional or in-transit lymph nodes, and stage IV, comprising individuals with distant metastasis12. In search of advances in medicine, researchers returned to a Chinese practice dating back to the fourth century, during the Dong Jin dynasty, known as fecal microbiota transplantation (FMT). This practice consists of transferring fecal material from a healthy donor to a sick recipient, to repopulate the latter’s intestine. Despite being very old, FMT was scientifically reported for the first time in 1958, when it was successfully used in the treatment of four patients with pseudomembranous colitis25-27. Even in the face of apparent efficacy, only in the last ten years has FMT begun to be widely studied, After histopathological confirmation and staging, the treatment to be adopted is established13. The therapeutic management of melanoma includes different approaches, such as surgical intervention (excision with widened margins, sentinel lymph node investigation, lymphatic drainage, and resection of distant Rev Col Bras Cir 50:e20233490 2 Barbosa Fecal microbiota transplantation and its repercussions in patients with melanoma refractory to anti-PD-1 therapy: scope review Barbosa F l i this question, we carried out a broad search, aiming to minimize publication biases, in the following databases, in order of consultation: Medical Literature Analysis and Retrieval System Online (MEDLINE); ScienceDirect; The Cochrane Library; Excerpta Medica Database (EMBASE); and BMJ Journals. Anti-PD-1/PD-L1 During the search, we used the following Health Sciences Descriptors: “Antibodies, Monoclonal”; “Drug Resistance, Neoplasm”; “Fecal Microbiota Transplantation”; “Host Microbial Interactions”; “Immunotherapy”; “Melanoma”; and “Microbiota”. having proved to be beneficial, mainly when associated with other therapies, in various pathologies, including cancers such as gastric, colorectal, hepatocellular, pancreatic, breast, lung, and melanoma28-33. Therefore, due to the favorable pre-existing history, the present study aims to evaluate whether the ICI-FMT combined therapy positively impacts the clinical course of patients with melanoma refractory to isolated immunotherapy, representing a potential step during the therapeutic process of this neoplasm. METHODS The inclusion criteria of the studies were clinical trials with relevant data on the application of ICI-FMT therapy in patients with melanoma, research written only in English, and articles with the text available in full. We excluded articles outside thematic relevance and non-clinical studies, including research in animal and in vitro models, as well as those published in the form of letters to the editor, guidelines, books, literature reviews, dissertations, and case reports. A time cut-off period was not determined during the selection of studies, due to the limited amount of evidence on the subject. This is a descriptive study of exploratory nature in literature in the scope review modality, which is a research method that makes it possible to identify and analyze a set of scientific evidence to obtain a reliable understanding about a particular theme of study. This method makes it possible to summarize the state of knowledge in a given area, as well as pointing out gaps that need to be filled with new research. Therefore, it entails support for decision-making and improvement of clinical practice34. We used the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Extension for Scoping Reviews (PRISMA-ScR)34 strategy, through the following steps: (i) theme identification; (ii) formulation of the research question; (iii) collection of articles through searches on electronic platforms; (iv) eligibility of studies with application of inclusion and exclusion criteria; (v) assessment of the quality of evidence; (vi) elaboration of the collection instrument with the information to be extracted; (vii) data analysis, interpretation, synthesis, and discussion; and (viii) presentation of results. The final protocol was prospectively registered in the Open Science Framework platform. RESULTS The combination of search terms resulted in the identification of 342 publications. After removal of duplicates (n=27), 315 references were submitted to screening, with analysis of titles and abstracts, of which 302 were excluded by reviewers. The 13 remaining studies were read in full by two independent examiners for the application of the eligibility criteria, culminating in the final inclusion of four trials that met these criteria. The selected studies were published between 2019 and 2021. The research question was formulated based on the PICO strategy (Population, Intervention, Control, Outcome)35, where: Population – patients with melanoma refractory to immunotherapy with ICIs; Intervention – FMT + ICI; Control – ICIs monotherapy; Outcome – clinical benefit. Thus, we formulated the following guiding question: “Does the combined ICI- FMT therapy have a positive impact on the clinical course of patients with refractory melanoma?”. To answer After conducting the steps of identification, screening, and eligibility of the articles, it was possible to stratify and gather the main evidence related to the application of the ICI-FMT combined therapy in patients with melanoma. Studies extracted from each of the databases were recorded in a single Microsoft Excel 16.0 spreadsheet, with the aim of detecting repeated citations between platforms, forming the list of studies and assessing eligibility. Rev Col Bras Cir 50:e20233490 3 3 Barbosa i Barbosa Fecal microbiota transplantation and its repercussions in patients with melanoma refractory to anti-PD-1 therapy: scope review The results of clinical trials that investigated the impact of FMT on the effectiveness of the immune checkpoint inhibitor are summarized in Table 1. proliferation of T cells, as well as promoting immunological tolerance to self-antigens, preventing auto-inflammatory reactions and autoimmunity in the healthy host40,41. However, after continuous exposure and recognition of tumor antigens, tumor-specific effector T cells induce increased expression of PD-1 and secrete interferon-gamma (IFN-γ), a chemical signal that induces the expression of B7 H1 (PD-L1) in neoplastic cells. The PD-1/PD L1 interaction strongly suppresses T cell activation, disrupting its anti-tumor activity. This interruption of the T cell antineoplastic response, related to the anergy or “exhaustion” phenotype, represents a form of local immunocompromise that allows tumors to escape immunological surveillance42,43. PD-1/PD-L1 pathway as a therapeutic target It is estimated that its microbial population reaches 1011 to 1012 CFU/mL of intestinal contents, with about 700 different species of microorganisms, most of which are bacteria. However, although bacteria can be found throughout the GIT, the largest number resides in the colon56,57. Figure 1. PD-1/PD-L1 pathway blocking mechanism. The CD8+ T cell is activated after recognizing the tumor antigen presented by the MHC class I. After its activation, the CD8+ T cell releases IFN-γ, which binds to its receptor (IFN γR). From this connection, the tumor cell is induced to express PD-L1, which binds to the PD-1 protein, triggering an inhibitory effect against CD8+ T cells. Anti-PD 1 or anti PD L1 prevents the interac- tion between PD 1 and PD L1, suppressing the inhibitory action against CD8+ T cells and thus increasing the anti-tumor activity. PD-1, program- med cell death 1; anti-PD-1, PD-1 antibody; PDL-1, programmed-death ligand 1; anti-PDL-1, PDL-1 antibody; TCR, T cell receptor; MHC, major histocompatibility complex; IFN-γ; interferon-γ; IFN-γR, IFN- γ receptor; JAK1, janus kinase 1; JAK2, janus kinase 2; STAT-1, signal transducer and activator of transcription 1; IRF-1, interferon regulatory factor 1. Source: Adapted from Lei et al. (2020)24. In the ileum, the bacterial population is represented by 107 to 108 CFU/mL, consisting of facultative anaerobes, Enterobacteria, and obligate anaerobes, such as Veilonella, Enterococcus, Clostridium, Bacteroides, and Lactobacillus. On the other hand, in the large intestine, the population reaches the 1010 and 1011 CFU/mL and the most frequently found genera are Bacteroides, Bifidobacterium, Escherichia coli, Bacillus, Clostridium, Eubacterium, Fusobacterium, Peptostreptococcus, and Ruminococcus56-58. As a rule, facultative anaerobic bacteria such as E. coli, Enterococci faecalis, and E. faecium are the first to colonize the newborn’s GIT, due to the high level of oxygen that initially exists. As these microorganisms consume the gas, the medium becomes more suitable for restricted anaerobic bacteria such as Bacteriodes, Bifidobacterium, and Clostridium. The intestinal microbiota acquired in the postnatal period is composed of a vast diversity of bacteria and performs numerous functions in the human host56. Figure 1. PD-1/PD-L1 pathway blocking mechanism. The CD8+ T cell is activated after recognizing the tumor antigen presented by the MHC class I. After its activation, the CD8+ T cell releases IFN-γ, which binds to its receptor (IFN γR). From this connection, the tumor cell is induced to express PD-L1, which binds to the PD-1 protein, triggering an inhibitory effect against CD8+ T cells. PD-1/PD-L1 pathway as a therapeutic target PD-1 is a protein of the CD28 superfamily, characterized by generating negative signals when binding to PD-L1 and PD-L2 proteins. Both PD-1 and its ligands are widely expressed in different cell types (B cells, CD4+ and T CD8+ cells, natural killer cells, and dendritic cells) that physiologically act by limiting the activation and Table 1 - Selected clinical trials on the application of FMT associated with ICI in patients with refractory melanoma. Type of FMT- -associated immunotherapy Type of cancer Number of patients studied Number of patients with greater efficacy (%) Response to FMT in patients with greater efficacy Reference Anti-PD-1 Metastatic melanoma 5 3 (60%) Increased infiltration of functio- nal CD8+ T cells; increase in APCs (CD68+) in intestine and tumor; resis- tance to immunotherapy overcome Youngs- ter et al. (2019)36 Anti-PD-1 Metastatic melanoma 2 2 (100%) Increase in functional CD39+ and CD8+ T cells; decrease in dysfunctional PD1+, CD38+ and CD8+ T cells; resis- tance to immunotherapy overcome Maleki et al. (2020)37 Anti-PD-1 Metastatic melanoma 15 6 (40%) Higher number of functional CD8+ T cells; decrease in IL-8 producing mye- loid cells; resistance to immunotherapy overcome Davar et al. (2021)38 Anti-PD-1 Metastatic melanoma 10 3 (30%) Increased infiltration of functio- nal CD8+ T cells; increase in APCs (CD68+) in intestine and tumor; resis- tance to immunotherapy overcome Baruch et al. (2021)39 APCs: antigen-presenting cells. Source: Authors (2023). nical trials on the application of FMT associated with ICI in patients with refractory melanoma. Table 1 - Selected clinical trials on the application of FMT associated with ICI in patients with refractory melanoma. APCs: antigen-presenting cells. Source: Authors (2023). APCs: antigen-presenting cells. Source: Authors (2023). Blocking the PD-1/PD-L1 pathway (Figure 1) is considered one of the main targets of immunotherapy against cancer, with drugs already approved by the Food and Drug Administration (FDA), such as pembrolizumab, nivolumab, atezolizumab, and cemiplimab24,44-47. Table 2 highlights each drug, with its respective indications and main adverse effects. such as pembrolizumab, nivolumab, atezolizumab, and cemiplimab24,44-47. Table 2 highlights each drug, with its respective indications and main adverse effects. Rev Col Bras Cir 50:e20233490 4 Barbosa F l i Barbosa Fecal microbiota transplantation and its repercussions in patients with melanoma refractory to anti-PD-1 therapy: scope review (GIT). The GIT hosts the largest number and diversity of bacterial collections that colonize the human body. PD-1/PD-L1 pathway as a therapeutic target Anti-PD 1 or anti PD L1 prevents the interac- tion between PD 1 and PD L1, suppressing the inhibitory action against CD8+ T cells and thus increasing the anti-tumor activity. PD-1, program- med cell death 1; anti-PD-1, PD-1 antibody; PDL-1, programmed-death ligand 1; anti-PDL-1, PDL-1 antibody; TCR, T cell receptor; MHC, major histocompatibility complex; IFN-γ; interferon-γ; IFN-γR, IFN- γ receptor; JAK1, janus kinase 1; JAK2, janus kinase 2; STAT-1, signal transducer and activator of transcription 1; IRF-1, interferon regulatory factor 1. Source: Adapted from Lei et al. (2020)24. Among its various functions, the immunological stands out. The human intestinal mucosa is the main interface between the immune system and the external environment. The intestine is considered the largest immunological organ in the human body, housing about 80% of the cells of this system, being mainly responsible for the production of immunoglobulins essential for innate and adaptive immunity. In addition, it stimulates the immune system by recruiting immune cells and activating the function of epithelial cells, thus being able to modulate the organism’s multiple response pathways and tumor progression itself56,59-62. However, clinical data of anti-PD-1/PD L1 therapy show considerable rates of limited response, in which a large group of patients suffered primary resistance, not responding to therapy, and part of the responders developed acquired resistance over the course of treatment43. Extensive efforts are being made to overcome this resistance to therapy, especially in the approach to melanoma20-24. Intestinal Microbiota ADEs: adverse drug effects; NSCLC: non-small cell lung carcinoma; TCC: transitional cell carcinoma; cHL: classic Hodgkin’s lymphoma; RCC: renal cell carcinoma; HNSCC: head and neck squamous cell cancer; CRC: colorectal cancer; HCC: hepatocellular carcinoma; MPM: malignant pleural mesothe- lioma; BCC: basal cell carcinoma; SCC: squamous cell carcinoma. Source: Authors (2023). However, the microbiota is extremely dynamic and may be influenced by numerous factors. For example, most neoplasms reach extremes of age, when the structural ecology of the gut may be immature or disturbed by a lifetime’s exposure to environmental modifiers65. Furthermore, pathological states or specific therapies can also create an imbalance in the microbiota composition, increasing the influence of deleterious bacteria, as well as reducing the effectiveness of antineoplastic agents and exacerbating their toxicity. Therefore, the intestinal microbiota has been researched for the management of cancer, with the development of promising strategies, such as the modulation of the patients’ intestinal microorganisms’ content28-33. the use of feces as a therapy was described by Ge Hong, in China, in the fourth century, for the treatment of a variety of conditions, including diarrhea27,66,67. However, it was only in the 1950s that the practice was scientifically described by Eiseman et al. (1958)25, via fecal enema, for the treatment of pseudomembranous colitis, introducing FMT in conventional medicine. In general, the process initially involves selecting a donor with no personal or family history of metabolic, autoimmune, or malignant diseases, as well as screening for possible pathogens. The stool is then prepared by being mixed with water or normal saline, followed by a filtration step to remove any particulate matter. The mixture can be administered by nasogastric tube, nasojejunal tube, esophagogastroduodenoscopy, colonoscopy, retention enema, or lyophilized tablets. The choice of route depends on the institution facility, the physician’s experience, and the safety offered to the patient68. Intestinal Microbiota Moreover, the intestinal microbiota also influences the effectiveness of numerous drugs. With regard to antineoplastic agents, one of the first drugs to prove the influence of the intestinal microbiota on its response was cyclophosphamide. With the advancement The intestinal microbiota, previously referred to as flora, is a dynamic mixture of microorganisms, whose composition varies along the gastrointestinal tract Rev Col Bras Cir 50:e20233490 5 Barbosa i Barbosa Fecal microbiota transplantation and its repercussions in patients with melanoma refractory to anti-PD-1 therapy: scope review of high-throughput sequencing technologies, the importance of the intestinal microbiota in the modulation of chemotherapy drugs was listed and the search for new influenceable drugs is now increasingly recognized63,64. Table 2 - Applications and adverse effects of the main anti-PD-1/PD-L1 immunotherapies. References Antibody / drug Indications ADEs Garon et al. (2015)43 Martin-Liberal, et al. (2015)48 Ribas et al. (2016)49 Springman et al. (2020)50 Anti-PD-1 Pembrolizumab Melanoma, NSCLC, TCC, gastric cancer, cHL, RCC, HNSCC, esophageal cancer, CRC, endometrial cancer, HCC Fatigue, cough, nausea, pruritus, skin rash, decreased appetite, cold, arthralgia, diarrhea, infections Robert et al. (2015)45 Guo, Zhang, Chen (2017)51 Elias et al. (2017)52 Springman et al. (2020)50 Anti-PD-1 Nivolumab Melanoma, NSCLC, TCC, gastric cancer, cHL, RCC, HNSCC, esophageal cancer, HCC, MPM Skin rash, fatigue, dyspnoea, myalgia, decreased appetite, cough, nausea, cold Schmid et al. (2018)46 Elias et al. (2017)52 Tie et al. (2019)53 Anti-PD-L1 Atezolizumab Breast cancer, NSCLC, TCC Fatigue, decreased appetite, dysp- noea, cough, nausea, myalgia, cold, urinary infection, hypothyroidism, alopecia Migden et al. (2018)47 Goodman (2022)54 Sezer et al. (2021)55 Anti-PD-1 Cemiplimab BCC, SCC Diarrhea, fatigue, nausea, cold, chills, cough, diarrhea, pyrexia, hoarseness, pruritus, skin rash, backache ADEs: adverse drug effects; NSCLC: non-small cell lung carcinoma; TCC: transitional cell carcinoma; cHL: classic Hodgkin’s lymphoma; RCC: renal cell carcinoma; HNSCC: head and neck squamous cell cancer; CRC: colorectal cancer; HCC: hepatocellular carcinoma; MPM: malignant pleural mesothe- lioma; BCC: basal cell carcinoma; SCC: squamous cell carcinoma. Source: Authors (2023). Diarrhea, fatigue, nausea, cold, chills, cough, diarrhea, pyrexia, hoarseness, pruritus, skin rash, backache Anti-PD-1 Cemiplimab ADEs: adverse drug effects; NSCLC: non-small cell lung carcinoma; TCC: transitional cell carcinoma; cHL: classic Hodgkin’s lymphoma; RCC: renal cell carcinoma; HNSCC: head and neck squamous cell cancer; CRC: colorectal cancer; HCC: hepatocellular carcinoma; MPM: malignant pleural mesothe- lioma; BCC: basal cell carcinoma; SCC: squamous cell carcinoma. Source: Authors (2023). Influence of FMT on the response to anti-PD-1/PD- L1 in mice Given the evidence that the intestinal microbiota influenced the response to chemotherapy63,64, tests were carried out in mice with melanoma that would later be treated with FMT associated with immunotherapy. In the study by Sivan et al. (2015)69, two groups of genetically similar C57BL/6 mice from different locations were studied, the JAX group from the Jackson Laboratory and the TAC group from Taconic Farms, both of which presented differences in the intestinal microbial composition. Initially, melanoma cells were injected into both groups, and, before any other intervention, tumor growth was analyzed, which was more aggressive in TAC mice compared with JAX. Such responses were explained by divergences at the immunological level, the JAX group exhibiting a greater density of specific T cells against the tumor and a greater intratumoral accumulation of CD8+ T cells. After receiving treatment with PD-1 pathway inhibitors, significantly greater efficacy was observed in JAX mice. Aiming once again to determine the differences in intestinal microbial composition between immunotherapy responders and non-responders, Gopalakrishnan et al. (2018)72 showed that, in the R group (complete or partial response or stable disease for at least six months), there was a predominance of Faecalibacterium (belonging to the Ruminococcaceae family, order Clostridiales), while in the NR group (progressive or stable disease for less of six months), there was a predominance of Bacteroides thetaiotaomicron, Escherichia coli, and Anaerotruncus colihominis. In view of the results, the possible mechanisms by which the microbiota patterns could influence the response were described: in R patients, bacteria mainly exerted anabolic functions and biosynthesis of amino acids, in contrast to NR, in which predominantly catabolic functions were observed. Furthermore, in the R group, there was a Subsequently, to establish a cause-effect relationship, the fecal material of one of the JAX mice was transferred to TAC ones, generating a reduction in the tumor growth rate. In addition, some TAC mice were transplanted with JAX fecal microbiota associated with an anti-PD-L1, showing an even more effective response in tumor control. The analysis of the fecal material verified the predominance of bacteria of the genus Bifidobacterium (B. longum, B. breve, and B. adolescentis), which were found to be four hundred times more abundant in JAX mice. Fecal microbiota transplantation FMT consists of transferring a solution of fecal material from a donor to a recipient, aiming to directly change the microbial composition of the patient and confer benefits to his health. The first known report of Most of the clinical experience with FMT has been derived from the treatment of recurrent or refractory Rev Col Bras Cir 50:e20233490 6 Barbosa Fecal micr Barbosa Fecal microbiota transplantation and its repercussions in patients with melanoma refractory to anti-PD-1 therapy: scope review Based on the study by Sivan et al. (2015)69, new research was carried out aiming to list the differences in the constitution of the intestinal microbiota between individuals responsive (R) and non-responsive (NR) to immunotherapy, such as the studies by Frankel et al. (2017)70 and McCulloch et al. (2022)71. The former used a technique for sequencing the intestinal components of 39 individuals with metastatic melanoma before starting therapy with ICIs (ipilimumab, nivolumab, and pembrolizumab, either in monotherapy or combined). In general, all the R presented a microbiota enriched in Bacteroides caccae and Streptococcus parasanguinis, compared with the NR. In the second study, the analysis of the composition of the microbiota of 94 patients allowed the identification of the predominance of the following bacteria in group R: Ruminococcus (Mediterraneibacter) torques, Blautia (B. producta, B. wexlerae, and B. hansenii), Eubacterium rectale, Ruminococcus (Mediterraneibacter) gnavus, and Anaerostipes hadrus. On the other hand, in patients not responsive to anti-PD 1, a predominance of Prevotella spp., Oscillibacter spp., Alistipes spp., and Sutterellaceae spp. was observed. Subsequently, the fecal samples from these patients were taken for transcriptomic analysis, identifying a considerable increase of superoxide dismutase 2 (SOD2), pro-inflammatory cytokines (IL-1β and CXCL8), and transcription factors (NFKBIZ, NFKBIA, TNFAIP3, and LITAF) in NR. Clostridium difficile infection66,68. However, recent studies have listed its benefits, especially when associated with other therapies, in several pathologies, including cancers, such as gastric, colorectal, hepatocellular, pancreatic, breast, lung, and melanoma28-33. Influence of FMT on the response to anti-PD-1/PD- L1 in mice The presence of Bifidobacterium was strictly related to specific immune cytotoxicity against the tumor, translated by an exacerbated regulation of type-I IFN genes in antigen presenting cells (APCs) present in peripheral lymphoid organs, as well as a higher rate of maturation of dendritic cells and increased activity of effector CD8+ T cells69. Rev Col Bras Cir 50:e20233490 7 Barbosa i Barbosa i Barbosa Fecal microbiota transplantation and its repercussions in patients with melanoma refractory to anti-PD-1 therapy: scope review greater infiltration of CD8+ T cells in the tumor, as well as a greater diversity of immune cells. In order to confirm this relationship, fecal material from group R was transferred to germ-free mice, followed by inoculation of neoplastic melanoma cells and administration of PD 1 inhibitor. After two weeks, the transplanted mice evolved with a better response to therapy, lower tumor growth rate, and intestinal microbiota enriched with Faecalibacterium. In addition, they had a higher amount of CD8+ T cells, consistent with the results in human models. increase in the diversity of the intestinal microbiota (with a predominance of Ruminococcaceae, Bifidobacteriaceae, and Lachnospiraceae), a greater response to anti PD 1, an increase in CD8+ T cells activation, and a decrease in IL 8 producing myeloid cells. Therefore, it was shown that resistance to immunotherapy was overcome, as these patients, previously unresponsive to anti-PD-1 therapy, showed post-FMT clinical benefit, with tumor reduction and/or long-term disease stability. In addition, FMT has also been shown to modulate the levels of circulating chemical signals, since the R group showed a decrease in multiple cytokines associated with resistance to anti- PD-1 and an increase in biomarkers associated with a beneficial response to treatment. R patients were down regulated in circulating IL-8 as well as in tumor-producing IL-8 myeloid cells; IL-8 has been associated with low anti- PD-1 activity in several cancers, including melanoma. Matson et al. (2018)73 evaluated 42 patients with metastatic melanoma, of whom 26 responded to anti PD-1 treatment and 16 had disease progression. The most abundant bacteria among patients in group R were Bifidobacterium adolescentis, Bifidobacterium longum, Lactobacillus species, Klebsiella pneumoniae, Veillonella parvula, Parabacterioides shite, Collinsella aerofaciens, and Enterococcus faecium, while among NR patients they were Roseburia intestinalis and Ruminococcus obeum. Then human fecal material was transferred to germ-free mice, followed by inoculation of melanoma cells. Influence of FMT on the response to anti-PD-1/PD- L1 in mice They observed that the mice that received fecal material from the R group showed less tumor growth and greater infiltration of effector CD8+ T cells compared with those that received the microbiota from the NR group. The response to anti PD 1 therapy was also consistent with the response of human donors. However, there was a portion that did not have the same intestinal pattern as the donor, and there was no response to therapy. In view of this, they concluded that, although most mice mimic the donor’s response, certain bacteria may have different patterns of expansion and, therefore, generate changes in the recipient’s phenotype. Similar results were listed in the studies by Youngster et al. (2019)36 and Baruch et al. (2021)39, and in both there was a post-FMT increase in the infiltration of CD8+ T cells, as well as APCs (CD68+) in the intestine and in the tumor. Both examined therapy- resistant subjects with metastatic melanoma and defined resistance as the inability to achieve a lasting response to anti-PD-1 therapy. In the test performed by Youngster et al. (2019)36, three patients (60%) overcame resistance to immunotherapy. Furthermore, in this same study, there was a post-FMT increase in bacteria from the Paraprevotellaceae family, which have been associated with responsiveness to treatment, and a significant decrease in β-proteobacteria, which have been linked to resistance to treatment. In the phase 1 clinical trial carried out by Baruch et al. (2021)39, patients were treated with vancomycin and neomycin, aiming to eradicate their native microbiota, before receiving the lyophilized solution of fecal material associated with immunotherapy. They observed positive responses in three individuals, two partial and one complete. It is also worth noting that the patients with the highest response rate had an abundance of Ruminococcus (R. gnavus and R. callidus) and Bifidobacterium adolescentis, considered favorable to immunotherapy, while those with a lower response rate had a microbiota enriched in bacteria from the Clostridiaceae family. The researchers also showed an increase in the beneficial immune response. Influence of FMT on the response to anti-PD-1/PD-L1 in humans Thus, we haighlight t to conduct new randomized and controlled clini with a well-defined methodological design, pr follow-up time, representative sample, and low bias, to produce robust results and allow a more analysis of the benefits of this alternative therapy CONCLUSION This review presented consistent evidence regarding the use of ICI-FMT therapy in patients with refractory melanoma. However, it is worth mentioning its limitations. Among them, stands out the scarcity of studies that offer relevant data on the application of fecal microbiota transplantation associated with immunotherapy in individuals affected by melanoma. In addition, the few studies found also had limitations, mainly small sample size. Thus, we haighlight the need to conduct new randomized and controlled clinical trials, with a well-defined methodological design, prolonged follow-up time, representative sample, and low risk of bias, to produce robust results and allow a more in-depth analysis of the benefits of this alternative therapy. In the study carried out by Maleki et al. (2020)37, two individuals who had resistant melanoma underwent FMT from two different donors. Both patients showed an improvement in immune response, with an increase in the populations of CD39+ and CD8+ T cells, in addition to a decrease in the levels of dysfunctional PD1+, CD38+, and CD8+ T cells. Patient 1 also displayed stabilization of a large skin lesion. Some clinical trials aiming to evaluate the efficacy and safety of the ICI-FMT combination are in progress (Table 3). Despite the promising results of ICI-FMT therapy, there are still concerns about its long-term safety. In 2019, two independent clinical trials reported that two patients developed bacteremia by extended- spectrum β-lactamase-producing E. coli after receiving FMT from the same donor, leading to the death of one of them75. This study prompted the FDA to issue a safety bulletin warning of the risk of post-FMT infection. In addition, a recent retrospective cohort study analyzed donor stools and showed that six of the 66 individuals tested (9%) were positive for multidrug-resistant pathogens76. Influence of FMT on the response to anti-PD-1/PD-L1 in humans Based on the recognition of the influence of fecal transplantation associated with immunotherapy on the course of melanoma in mice, clinical trials were carried out with promising results. The trial conducted by Davar et al. (2021)38 analyzed the effect of FMT in 15 individuals with melanoma resistant to anti PD 1 therapy. After transplantation, six of the 15 patients (40%) showed an Rev Col Bras Cir 50:e20233490 8 Barbosa F l i Barbosa Fecal microbiota transplantation and its repercussions in patients with melanoma refractory to anti-PD-1 therapy: scope review Barbosa Fecal microbiota transplantation and its repercussions in patients with melanoma refractory to anti-PD-1 therapy: scope review Table 3 - Ongoing clinical trials with the application of combined ICI-FMT therapy in cancer patients (www.clinicaltrials.gov)74. NCT number Type of cancer Number of patients Intervention Stage NCT04521075 Melanoma; CPCNP 50 FMT + Nivolumab Phase 2 NCT04988841 Melanoma 60 MaaT013 + Ipilimumab + Nivolumab versus placebo + Ipilimumab + Nivolumab Phase 2 NCT03341143 Melanoma 20 FMT + Pembrolizumab Phase 2 NCT03772899 Melanoma 20 FMT + Pembrolizumab/Nivolumab Phase 1 NCT03353402 Melanoma 40 FMT + ICI Phase 1 NCT04577729 Melanoma 60 Allogeneic FMT + ICI versus autologous FMT + ICI Not applicable FMT: fecal microbiota transplantation; ICI: immune checkpoint inhibitor. Source: Authors (2023). In the study carried out by Maleki et al. 0)37, two individuals who had resistant melanoma rwent FMT from two different donors. Both patients wed an improvement in immune response, with an ase in the populations of CD39+ and CD8+ T cells, ddition to a decrease in the levels of dysfunctional +, CD38+, and CD8+ T cells. Patient 1 also displayed lization of a large skin lesion. Some clinical trials aiming to evaluate the acy and safety of the ICI-FMT combination are in ress (Table 3). Despite the promising results of ICI-FMT apy, there are still concerns about its long-term y. In 2019, two independent clinical trials reported two patients developed bacteremia by extended- β l d i E li f i i This review presented consistent regarding the use of ICI-FMT therapy in patie refractory melanoma. However, it is worth me its limitations. Among them, stands out the of studies that offer relevant data on the ap of fecal microbiota transplantation associat immunotherapy in individuals affected by me In addition, the few studies found also had lim mainly small sample size. CONCLUSION FMT has a positive effect on the response of melanoma to ICIs, translated into a significant clinical benefit. However, there is still no consensus regarding the specific bacteria that are associated with a superior response, although certain species belong to phylogenetically related groups. These disagreements can be explained by the use of different genomic sequencing techniques, as well as by geographic influences and dietary variations. Therefore, periodic screening of donor stools should be performed to strictly limit the spread of organisms that can lead to adverse events, which is especially relevant for immunocompromised patients. Additional clinical investigations, which allow a better understanding of the source, the procedure, and the phenotype of both the recipient and the donor are essential for the success of ICI-FMT combined therapy27. In addition, due to the limited amount of literature on the subject, it is not possible to determine the causal mechanism between the intestinal microbiota and the response to anti-PD-1/PD-L1 drugs. Nonetheless, we postulate that stimulation of responses by T cells Rev Col Bras Cir 50:e20233490 9 Barbosa i Barbosa i Barbosa Fecal microbiota transplantation and its repercussions in patients with melanoma refractory to anti-PD-1 therapy: scope review bacteria, the mechanisms involved, and the translation of new evidence to the care practice in oncology are indispensable. against microbial antigens is involved, which in turn aids the response against the tumor. In view of this, new studies aimed at the complete elucidation of the R E S U M O R E S U M O Introdução: apesar de extremamente eficaz em alguns casos, até 70% dos pacientes com melanoma não respondem aos anti-PD-1/PD- L1 (resistência primária) e muitos dos respondedores, eventualmente, acabam progredindo (resistência secundária). Extensos esforços estão sendo realizados para superar esta resistência através de novas estratégias, sobretudo, visando a modulação da microbiota intestinal. Objetivo: avaliar se o transplante de microbiota fecal (TMF), associado à imunoterapia, é benéfico no curso clínico do paciente com melanoma refratário. Métodos: trata-se de uma revisão de escopo, baseada em estudos coletados nas plataformas MEDLINE, ScienceDirect, The Cochrane Library, Embase e BMJ Journals; utilizando os descritores: “Antibodies, Monoclonal”; “Drug Resistance, Neoplasm”; “Fecal Microbiota Transplantation”; “Host Microbial Interactions”; “Immunotherapy”; “Melanoma”; e “Microbiota”. Foram incluídos ensaios clínicos, na língua inglesa, com dados relevantes sobre a temática e disponíveis integralmente. Não foi determinado um período de corte temporal, devido à quantidade limitada de evidências sobre o tema. Resultados: o cruzamento dos descritores permitiu a identificação de 342 publicações e, após a aplicação dos critérios de elegibilidade, permitiu a seleção de 4 estudos. A partir das análises, observou-se que grande parte dos estudados superaram a resistência aos inibidores do checkpoint imunológico pós-TMF, com melhor resposta ao tratamento, menor crescimento tumoral e aumento da resposta imunológica benéfica. Conclusão: nota-se que o TMF favorece a resposta do melanoma à imunoterapia, traduzido por benefício clínico significativo. Entretanto, novos estudos são necessários para a completa elucidação das bactérias e mecanismos envolvidos, bem como para que haja a translação das novas evidências para a prática assistencial oncológica. Palavras-chave: Anticorpos Monoclonais. Imunoterapia. Melanoma. Microbiota. Transplante de Microbiota Fecal 6. Colantonio S, Bracken MB, Beecker J. The association of indoor tanning melanoma in adults: systematic review and meta-analysis. J Am Acad Dermatol. 2014;70(5):847-57. doi: 10.1016/j. jaad.2013.11.050. alavras-chave: Anticorpos Monoclonais. Imunoterapia. Melanoma. Microbiota. Transplante de Microbiota Fecal. REFERENCES 1. Instituto Nacional de Câncer José Alencar Gomes da Silva. Estimativa 2020: incidência de câncer no Brasil. Rio de Janeiro: INCA. 2019. Disponível em: https://www.inca.gov.br/sites/ufu.sti.inca.local/files/ media/document/estimativa-2020-incidencia-de- cancer-no-brasil.pdf 7. Khan AQ, Travers JB, Kemp MG. Roles of UVA radiation and DNA damage responses in melanoma pathogenesis. Environ Mol Mutagen. 2018;59(5):438-60. doi: 10.1002/em.22176. 2. Arnold M, Singh D, Laversanne M, Vignat J, Vaccarella S, Meheus F, et al. Global Burden of Cutaneous Melanoma in 2020 and Projections to 2040. JAMA Dermatol. 2022;158(5):495-503. doi: 10.1001/jamadermatol.2022.0160. 8. Haenssle H, Mograby N, Ngassa A, Buhl T, Emmert S, Schön M, et al. Association of Patient Risk Factors and Frequency of Nevus-Associated Cutaneous Melanomas. JAMA Dermatol. 2016;152(3):291-8. doi: 10.1001/jamadermatol.2015.3775. 3. Eggermont AM, Spatz A, Robert C. Cutaneous melanoma. Lancet. 2014;383(9919):816-27. doi: 10.1016/S0140-6736(13)60802-8. 9. Kubica A, Brewer J. Melanoma in Immunosuppressed Patients. Mayo Clin Proc. 2012;87(10):991-1003. doi: 10.1016/j.mayocp.2012.04.018. 4. Dimitriou F, Krattinger R, Ramelyte E, Barysch M, Micaletto S, Dummer R, et al. The World of Melanoma: Epidemiologic, Genetic, and Anatomic Differences of Melanoma Across the Globe. Curr Oncol Rep. 2018;20(11):87. doi: 10.1007/s11912- 018-0732-8. 10. Antonio JR, Soubhia RMC, D’Avila SCGP, Caldas AC, Trídico LA, Alves FT. Correlation between dermoscopic and histopathological diagnoses of atypical nevi in a dermatology outpatient clinic of the Medical School of São José do Rio Preto, SP. An Bras Dermatol. 2013;88(2):199-203. doi: 10.1590/ S0365-05962013000200002. 5. Instituto Nacional de Câncer - INCA. Estatísticas de câncer. 2022. Disponível em: https://www.gov.br/ inca/pt-br/assuntos/cancer/numeros 11. Ahnlide I, Bjelerupp M, Nilsson F, Nielsen K. Validity 11. Ahnlide I, Bjelerupp M, Nilsson F, Nielsen K. Validity 10 Rev Col Bras Cir 50:e20233490 Barbosa Fecal micr Barbosa Fecal microbiota transplantation and its repercussions in patients with melanoma refractory to anti-PD-1 therapy: scope review of ABCD rule of dermoscopy in clinical practice. Acta Derm Venereol. 2016;96(3):367-72. doi: 10.2340/00015555-2239. images/Relatorios/2018/Relatorio_Ipilimumabe_ MelanomaMetastatico_FINAL.pdf 20. Spranger S, Bao R, Gajewski T. Melanoma-intrinsic β-catenin signalling prevents anti-tumour immunity. Nature. 2015;523(7559):231-5. doi: 10.1038/ nature14404. 12. Swetter S, Thompson J, Albertini M, Barker C, Baumgartner J, Boland G, et al. NCCN Guidelines® Insights: Melanoma: Cutaneous, Version 2.2021. J Natl Compr Canc Netw. 2021;19(4):364-76. doi: 10.6004/jnccn.2021.0018. 21. Koyama S, Akbay E, Li Y, Herter-Sprie G, Buczkowski K, Richards W, et al. Adaptive resistance to therapeutic PD-1 blockade is associated with upregulation of alternative immune checkpoints. Nat Commun. 2016;7(1):10501. doi: 10.1038/ ncomms10501. 13. Garbe C, Peris K, Hauschild A, Saiag P, Middleton M, Spatz A, et al. REFERENCES Diagnosis and treatment of melanoma. European consensus-based interdisciplinary guideline – Update 2012. Eur J Cancer. 2012;48(15):2375-90. doi: 10.1016/j.ejca.2012.06.013. 22. Zhang M, Yang J, Hua W, Li Z, Xu Z, Qian Q. Monitoring checkpoint inhibitors: predictive biomarkers in immunotherapy. Front Med. 2019;13(1):32-44. doi: 10.1007/s11684-018-0678- 0. 14. Burns D, George J, Aucoin D, Bower J, Burrell S, Gilbert R, et al. The Pathogenesis and Clinical Management of Cutaneous Melanoma: An Evidence-Based Review. J Med Imaging Radiat Sci. 2019;50(3):460-9. doi: 10.1016/j.jmir.2019.05.001. 23. Shergold A, Millar R, Nibbs R. Understanding and overcoming the resistance of cancer to PD-1/PD-L1 blockade. Pharmacol Res. 2019;145:104258. doi: 10.1016/j.phrs.2019.104258. 15. Schumacher T, Schreiber R. Neoantigens in cancer immunotherapy. Science. 2015;348(6230):69-74. doi: 10.1126/science.aaa4971. 16. Brasil. Ministério da Saúde. Secretaria de Ciência, Tecnologia, I. e I. E. Relatório de recomendação no 541 de 2020 - Terapia-alvo (vemurafenibe, dabrafenibe, cobimetinibe, trametinibe) e imunoterapia (ipilimumabe, nivolumabe, pembrolizumabe) para o tratamento de primeira linha do melanoma avançado não-cirúrgico e metastático. 2020. Disponível em: https:// docs.bvsalud.org/biblioref/2020/10/1123192/ relatorio_541_terapiaalvo_melanoma_final_2020. pdf 16. Brasil. Ministério da Saúde. Secretaria de Ciência, Tecnologia, I. e I. E. Relatório de recomendação no 541 de 2020 - Terapia-alvo (vemurafenibe, dabrafenibe, cobimetinibe, trametinibe) e imunoterapia (ipilimumabe, nivolumabe, pembrolizumabe) para o tratamento de primeira linha do melanoma avançado não-cirúrgico e metastático. 2020. Disponível em: https:// docs.bvsalud.org/biblioref/2020/10/1123192/ relatorio_541_terapiaalvo_melanoma_final_2020. pdf 24. Lei Q, Wang D, Sun K, Wang L, Zhang Y. Resistance Mechanisms of Anti-PD1/PDL1 Therapy in Solid Tumors. Front Cell Dev Biol. 2020;8. doi: 10.3389/ fcell.2020.00672. 25. Eiseman B, Silen W, Bascom G, Kauvar A. Fecal enema as an adjunct in the treatment of pseudomembranous enterocolitis. Surgery. 1958;44:854-9. 26. Hamilton MJ, Weingarden AR, Sadowsky MJ, Khoruts A. Standardized frozen preparation for transplantation of fecal microbiota for recurrent Clostridium difficile infection. Am J Gastroenterol. 2012;107(5):761-7. doi: 10.1038/ajg.2011.482. 17. Pardoll D. Cancer and the Immune System: Basic Concepts and Targets for Intervention. Semin Oncol. 2015;42(4):523-38. doi: 10.1053/j. seminoncol.2015.05.003. 17. Pardoll D. Cancer and the Immune System: Basic Concepts and Targets for Intervention. Semin Oncol. 2015;42(4):523-38. doi: 10.1053/j. seminoncol.2015.05.003. 27. Wang J, Kuo C, Kuo F, Wang Y, Hsu W, Yu F et al. Fecal microbiota transplantation: Review and update. J Formos Med Assoc. 2019;118 Suppl 1:S23-S31. 10.1016/j.jfma.2018.08.011. 18. Weber J, Mandala M, Del Vecchio M, et al. Adjuvant nivolumab versus ipilimumab in resected stage III or IV melanoma. N Engl Med. 2017;377(19):1824-35. doi: 10.1056/NEJMoa1709030. 28. Rossen N. Fecal microbiota transplantation as novel therapy in gastroenterology: A systematic review. REFERENCES World J Gastroenterol. 2015;21(17):5359-71. doi: 10.3748/wjg.v21.i17.5359. 19. Brasil. Ministério da Saúde. Secretaria de Ciência, T. e I. E. Relatório de recomendação no 391 de 2018 - Ipilimumabe para tratamento de pacientes com melanoma metastático. 2018. Disponível em: http://antigo-conitec.saude.gov.br/ 29. Wong S, Zhao L, Zhang X, Nakatsu G, Han J, Xu W, et al. Gavage of Fecal Samples From Patients With Colorectal Cancer Promotes Intestinal Carcinogenesis in Germ-Free and Conventional Rev Col Bras Cir 50:e20233490 11 Barbosa pe review Barbosa ope review Barbosa Fecal microbiota transplantation and its repercussions in patients with melanoma refractory to anti-PD-1 therapy: scope review Mice. Gastroenterology. 2017;153(6):1621-33. doi: 10.1053/j.gastro.2017.08.022. PD-1 therapy in melanoma patients. Science. 2021;371(6529):595-602. doi: 10.1126/science. abf3363. 30. Ma C, Han M, Heinrich B, Fu Q, Zhang Q, Sandhu M, et al. Gut microbiome–mediated bile acid metabolism regulates liver cancer via NKT cells. Science. 2018;360(6391):eaan5931. doi: 10.1126/ science.aan5931. 39. Baruch E, Youngster I, Ben-Betzalel G, Ortenberg R, Lahat A, Katz L, et al. Fecal microbiota transplant promotes response in immunotherapy-refractory melanoma patients. Science. 2021;371(6529):602- 9. doi: 10.1126/science.abb5920. 31. Pushalkar S, Hundeyin M, Daley D, Zambirinis C, Kurz E, Mishra A, et al. The Pancreatic Cancer Microbiome Promotes Oncogenesis by Induction of Innate and Adaptive Immune Suppression. Cancer Discov. 2018;8(4):403-16. doi: 10.1158/2159-8290. CD-17-1134. 40. Balar A, Weber J. PD-1 and PD-L1 antibodies in cancer: current status and future directions. Cancer Immunol Immunother. 2017;66(5):551-64. doi: 10.1007/s00262-017-1954-6. 41. Constantinidou A, Alifieris C, Trafalis DT. Targeting Programmed Cell Death -1 (PD-1) and Ligand (PD- L1): A new era in cancer active immunotherapy. Pharmacol Ther. 2019;194:84-106. doi: 10.1016/j. pharmthera.2018.09.008. 32. Chen D, Wu J, Jin D, Wang B, Cao H. Fecal microbiota transplantation in cancer management: Current status and perspectives. Int J Cancer. 2019;145(8):2021–31. doi: 10.1002/ijc.32003. 33. Di Modica M, Gargari G, Regondi V, Bonizzi A, Arioli S, Belmonte B, et al. Gut Microbiota Condition the Therapeutic Efficacy of Trastuzumab in HER2-Positive Breast Cancer. Cancer Res. 2021;81(8):2195-206. doi: 10.1158/0008-5472.CAN-20-1659. 42. Wang Y, Ma R, Liu F, Lee S, Zhang L. Modulation of Gut Microbiota: A Novel Paradigm of Enhancing the Efficacy of Programmed Death-1 and Programmed Death Ligand-1 Blockade Therapy. Front Immunol. 2018;9:374. doi: 10.3389/fimmu.2018.00374. 43. Sharma P, Hu-Lieskovan S, Wargo J, Ribas A. Primary, Adaptive, and Acquired Resistance to Cancer Immunotherapy. Cell. 2017;168(4):707-23. doi: 10.1016/j.cell.2017.01.017. 34. Tricco AC, Lillie E, Zarin W, O’Brien KK, Colquhoun H, Levac D, et al. 10.1056/NEJMoa1805131. 57. Tortora GJ, Funke BR, Case CL, Weber D, Bair WB. Microbiology: An Introduction, Global Edition. 13 ed. Pearson Education Limited; 2020. 48. Martin-Liberal J, Kordbacheh T, Larkin J. Safety of pembrolizumab for the treatment of melanoma. Expert Opin Drug Saf. 2015;14(6):957-64. doi: 10.1517/14740338.2015.1021774. 58. Sommer F, Bäckhed F. The gut microbiota – masters of host development and physiology. Nat Rev Microbiol. 2013;11(4):227-38. doi: 10.1038/ nrmicro2974. 49. Ribas A, Hamid O, Daud A, Hodi F, Wolchok J, Kefford R, et al. Association of Pembrolizumab With Tumor Response and Survival Among Patients With Advanced Melanoma. JAMA. 2016;315(15):1600. doi: 10.1001/jama.2016.4059. 59. Lopez A, Hansmannel F, Kokten T, Bronowicki J, Melhem H, Sokol H, et al. Microbiota in digestive cancers: our new partner?. Carcinogenesis. 2017;38(12):1157-66. doi: 10.1093/carcin/bgx087. 50. Springman S, Trapskin PJ, Hennes A, Vanderloo J. Perioperative Medication Management - Adult/ Pediatric - Inpatient/Ambulatory - Clinical Practice Guideline. UW Health, 2022. Disponível em: https://www.uwhealth.org/cckm/cpg/medications/ Perioperative-Medication-Management-Clinical- Pratice-Guideline---August-2022.pdf 60. Zitvogel L, Ma Y, Raoult D, Kroemer G, Gajewski T. The microbiome in cancer immunotherapy: Diagnostic tools and therapeutic strategies. Science. 2018;359(6382):1366-70. doi: 10.1126/science. aar6918. 61. Tilg H, Schmiderer A, Djanani A. Gut microbiome- immune crosstalk affects progression of cancer. Transl Gastroenterol Hepatol. 2018;3:34. doi: 10.21037/tgh.2018.06.02. 51. Guo L, Zhang H, Chen B. Nivolumab as Programmed Death-1 (PD-1) Inhibitor for Targeted Immunotherapy in Tumor. J Cancer. 2017;8(3):410-16. doi: 10.7150/ jca.17144. 62. Asmar N, Ibrahim T, Rey J. Checkpoint Inhibitors: Conquering Cancer with a Little (T)-Help from Our Microbial Friends. Dig Dis Sci. 2018;63(9):2177-9. doi: 10.1007/s10620-018-5188. 52. Elias A, Kasi P, Stauffer J, Thiel D, Colibaseanu D, Mody K, et al. The Feasibility and Safety of Surgery in Patients Receiving Immune Checkpoint Inhibitors: A Retrospective Study. Front Oncol. 2017;7:121. doi: 10.3389/fonc.2017.00121. 63. Iida N, Dzutsev A, Stewart C, Smith L, Bouladoux N, Weingarten R, et al. Commensal Bacteria Control Cancer Response to Therapy by Modulating the Tumor Microenvironment. Science. 2013;342(6161):967- 70. doi: 10.1126/science.1240527. 53. Tie Y, Yang H, Zhao R, Zheng H, Yang D, Zhao J et al. Safety and efficacy of atezolizumab in the treatment of cancers: a systematic review and pooled-analysis. Drug Des Devel Ther. 2019;13:523- 38. doi: 10.2147/DDDT.S188893. 64. Viaud S, Saccheri F, Mignot G, Yamazaki T, Daillère R, Hannani D, et al. The Intestinal Microbiota Modulates the Anticancer Immune Effects of Cyclophosphamide. Science. 2013;342(6161):971- 6. doi: 10.1126/science.1240537. 54. Goodman D. Cemiplimab and Cutaneous Squamous Cell Carcinoma: From Bench to Bedside. JPRAS Open. 2022;33:155-160. REFERENCES PRISMA Extension for Scoping Reviews (PRISMA-ScR): Checklist and Explanation. Ann Intern Med. 2018 Oct 2;169(7):467-73. doi: 10.7326/M18-0850. 44. Garon E, Rizvi N, Hui R, Leighl N, Balmanoukian A, Eder J, et al. Pembrolizumab for the Treatment of Non–Small-Cell Lung Cancer. N Engl J Med. 2015;372(21):2018-28. doi: 10.1056/ NEJMoa1501824. 35. Akobeng AK. Principles of evidence based medicine. Arch Dis Child. 2005;90(8):837-40. doi: 10.1136/ adc.2005.071761. 36. Youngster I, Baruch E, Katz L, Lahat A, Brosh- Nissimov T, Schachter J, et al. 90. Fecal Microbiota Transplantation in Metastatic Melanoma Patients Resistant to Anti-PD-1 Treatment. Open Forum Infect Dis. 2019;6(2):S7. doi: 10.1093/ofid/ofz359.014. 45. Robert C, Schachter J, Long G, Arance A, Grob J, Mortier L, et al. Pembrolizumab versus Ipilimumab in Advanced Melanoma. N Engl J Med. 2015;372(26):2521-32. doi: 10.1056/ NEJMoa1503093. 37. Maleki S, Lenehan J, Burton J, Silverman M, Parvathy S, El-Hajjar M, et al. P864 Combination of fecal microbiota transplantation from healthy donors with anti-PD1 immunotherapy in treatment- naïve advanced or metastatic melanoma patients. J Immunother Cancer. 2020;8(1):A11-A12. doi: 10.1136/LBA2019.17. 46. Schmid P, Adams S, Rugo H, Schneeweiss A, Barrios C, Iwata H, et al. Atezolizumab and Nab-Paclitaxel in Advanced Triple-Negative Breast Cancer. N Engl J Med. 2018;379(22):2108-21. doi: 10.1056/ NEJMoa1809615. 47. Migden M, Rischin D, Schmults C, Guminski A, Hauschild A, Lewis K, et al. PD-1 Blockade with Cemiplimab in Advanced Cutaneous Squamous-Cell Carcinoma. N Engl J Med. 2018;379(4):341-51. doi: 38. Davar D, Dzutsev A, McCulloch J, Rodrigues R, Chauvin J, Morrison R et al. Fecal microbiota transplant overcomes resistance to anti– Rev Col Bras Cir 50:e20233490 12 Barbosa Fecal microbiota transplantation and its repercussions in patients with melanoma refractory to anti-PD-1 therapy: scope review Barbosa F l i Barbosa Fecal microbiota transplantation and its repercussions in patients with melanoma refractory to anti-PD-1 therapy: scope review 10.1056/NEJMoa1805131. doi: 10.1016/j.jpra.2022.06.003. 65. Claesson M, Cusack S, O’Sullivan O, Greene-Diniz R, de Weerd H, Flannery E, et al. Composition, variability, and temporal stability of the intestinal microbiota of the elderly. Proc Natl Acad Sci U S A. 2010;108(1):4586-91. doi: 10.1073/ pnas.1000097107. 55. Sezer A, Kilickap S, Gümüş M, Bondarenko I, Özgüroğlu M, Gogishvili M, et al. Cemiplimab monotherapy for first-line treatment of advanced non-small-cell lung cancer with PD-L1 of at least 50%: a multicentre, open-label, global, phase 3, randomised, controlled trial. Lancet. 2021;397(10274):592-604. doi: 10.1016/S0140- 6736(21)00228-2. 66. Smits L, Bouter K, de Vos W, Borody T, Nieuwdorp M. Therapeutic Potential of Fecal Microbiota Transplantation. Gastroenterology. 2013;145(5):946-53. doi: 10.1053/j. gastro.2013.08.058. 56. Trabulsi L, Alterthum F, Rácz M, Martinez M, Campos L, Gompertz O et al. Microbiologia. 6 ed. São Paulo: Atheneu; 2015. 13 Rev Col Bras Cir 50:e20233490 13 Barbosa ope re ie Barbos Fecal microbiota transplantation and its repercussions in patients with melanoma refractory to anti-PD-1 therapy: scope review 10.1038/s41591-022-01698-2. 67. Zhang F, Luo W, Shi Y, Fan Z, Ji G. Should We Standardize the 1,700-Year-Old Fecal Microbiota Transplantation? Am J Gastroenterol. 2012;107(11):1755. doi: 10.1038/ajg.2012.251. 10.1038/s41591-022-01698-2. 72. Gopalakrishnan V, Spencer C, Nezi L, Reuben A, Andrews M, Karpinets T, et al. Gut microbiome modulates response to anti–PD-1 immunotherapy in melanoma patients. Science. 2018;359(6371):97- 103. doi: 10.1126/science.aan4236. 68. Dupont HL. Diagnosis and management of Clostridium difficile infection. Clin Gastroenterol Hepatol. 2013;11(10):1216-23. doi: 10.1016/j. cgh.2013.03.016. 73. Matson V, Fessler J, Bao R, Chongsuwat T, Zha Y, Alegre M, et al. The commensal microbiome is associated with anti–PD-1 efficacy in metastatic melanoma patients. Science. 2018;359(6371):104- 8. doi: 10.1126/science.aao3290. 69. Sivan A, Corrales L, Hubert N, Williams J, Aquino- Michaels K, Earley Z, et al. Commensal Bifidobacterium promotes antitumor immunity and facilitates anti– PD-L1 efficacy. Science. 2015;350(6264):1084-9. doi: 10.1126/science.aac4255. 74. ClinicalTrials. Clinicaltrials.gov. 2022. Disponível em: https://clinicaltrials.gov. 70. Frankel A, Coughlin L, Kim J, Froehlich T, Xie Y, Frenkel E, et al. Metagenomic Shotgun Sequencing and Unbiased Metabolomic Profiling Identify Specific Human Gut Microbiota and Metabolites Associated with Immune Checkpoint Therapy Efficacy in Melanoma Patients. Neoplasia. 2017;19(10):848- 55. doi: 10.1016/j.neo.2017.08.004. 75. DeFilipp Z, Bloom P, Torres Soto M, Mansour M, Sater M, Huntley M, et al. Drug-Resistant E. coli Bacteremia Transmitted by Fecal Microbiota Transplant. N Engl J Med. 2019;381(21):2043-50. doi: 10.1056/NEJMoa1910437. 76. Vendrik K, Terveer E, Kuijper E, Nooij S, Boeije- Koppenol E, Sanders I, et al. Periodic screening of donor faeces with a quarantine period to prevent transmission of multidrug-resistant organisms during faecal microbiota transplantation: a retrospective cohort study. Lancet Infect Dis. 2021;21(5):711-21. doi: 10.1016/S1473-3099(20)30473-4. 71. McCulloch JA, Davar D, Rodrigues RR, Badger JH, Fang JR, Cole AM et al. Intestinal microbiota signatures of clinical response and immune-related adverse events in melanoma patients treated with anti-PD-1. Nat Med. 2022;28(3):545-56. doi: Received in: 24/10/2022 Accepted for publication: 24/02/2023 Conflict of interest: no. Funding source: none. Mailing address: Eduardo Cerchi Barbosa E-mail: eduardo.cerchi27@gmail.com 14 14 Rev Col Bras Cir 50:e20233490
https://openalex.org/W4377293081
https://periodicos.uffs.edu.br/index.php/RIS/article/download/13597/8862
Portuguese
null
Estágio supervisionado em ensino de Ciências e Biologia: ações integradoras e interdisciplinares
Revista Insignare Scientia
2,023
cc-by
6,822
Resumo: Resumo: Os estágios supervisionados representam uma oportunidade de discussão, aproximação e compreensão da carreira docente e do campo de atuação dos professores, reconhecendo a realidade sociocultural dos espaços educativos, seus constituintes e nuances. Diante desse cenário, este artigo trata-se de relato de experiência descritivo, de abordagem qualitativa, cujo objetivo é explanar sobre o desenvolvimento do Projeto Integrador dos Estágios supervisionados (PIE) de um curso de licenciatura em Ciências Biológicas, ofertado por uma universidade estadual, situada na região dos Sertões de Crateús. O Projeto Integrador dos Estágios (PIE), foi desenvolvido ao longo do semestre letivo 2021.1 (setembro/2021 a janeiro/2022). Ele foi dividido em seis encontros ocorridos via aplicativo de web conferência Google Meet® ou pelo canal oficial do Programa Residência Pedagógica da instituição no Youtube®. Foram abordadas temáticas como: atuais documentos legais da educação brasileira (Base Nacional Comum Curricular – BNCC – e as Diretrizes Curriculares Referencial do Ceará – DCRC); utilização das tecnologias educativas no ensino de Ciências e Biologia; a educação contextualizada; os saberes e os fazeres docente; além da relação entre saúde física e mental em tempos de pandemia. Esse projeto visou, portanto, impactar em uma formação holística, integral e humana deste professor- aprendiz. Palavras-chave: Estágio; Formação de professores; Licenciatura. Palavras-chave: Estágio; Formação de professores; Licenciatura. Recebido em: 30/11/2022 Aceito em: 30/04/2023 Abstract: Vol. 6, n. 2. 2023 Edição Especial: Estágio Supervisionado e Prática de Ensino em Ciências aculdade de Educação de Crateús/Universidade Estadual do Ceará, Brasil Resumen: Las prácticas supervisadas son una oportunidad para discutir, abordar y comprender la carrera docente y el campo de trabajo de los docentes, reconociendo la realidad sociocultural de los espacios educativos, sus constituyentes y matices. Ante este escenario, este artículo es un relato de experiencia descriptivo, con enfoque cualitativo, cuyo objetivo es explicar el desarrollo del Proyecto Integrado de Pasantías Supervisadas (PIE) de una carrera de Licenciatura en Ciencias Biológicas ofrecida por una universidad estatal ubicada en la región. de los Sertões de Crateús. El Proyecto de Integración de Pasantías (PIE) se desarrolló durante el semestre académico 2021.1 (septiembre/2021 a enero/2022). Se dividió en seis encuentros que se realizaron a través de la aplicación de conferencias web Google Meet® oa través del canal oficial de la institución del Programa de Residencia Pedagógica en Youtube®. Se abordaron temas como: documentos legales actuales de la educación brasileña (Base Nacional Comum Curricular – BNCC – y Directrices Curriculares de Referencia de Ceará – DCRC); uso de tecnologías educativas en la enseñanza de Ciencias y Biología; educación contextualizada; los saberes y prácticas docentes; además de la relación entre la salud física y mental en tiempos de pandemia. Este proyecto pretendía, por tanto, incidir en una formación holística, integral y humana de este docente-aprendiz. Palabras-clave: Prácticas; Formación de profesores; Graduación. Palabras-clave: Prácticas; Formación de profesores; Graduación. Abstract: Abstract: Recebido em: 30/11/2022 Aceito em: 30/04/2023 492 Vol. 6, n. 2. 2023 Edição Especial: Estágio Supervisionado e Prática de Ensino em Ciências Supervised internships are an opportunity to discuss, approach and understand the teaching career and the field of work of teachers, recognizing the sociocultural reality of educational spaces, their constituents and nuances. Given this scenario, this article is a descriptive experience report, with a qualitative approach, whose objective is to explain the development of the Integrated Project of Supervised Internships (PIE) of a degree course in Biological Sciences offered by a state university located in the region. from the Sertões of Crateús. The Internship Integrating Project (PIE) was developed during the 2021.1 academic semester (September/2021 to January/2022). It was divided into six meetings that took place via the Google Meet® web conference application or through the institution's official channel of the Pedagogical Residency Program on Youtube®. Themes were addressed such as: current legal documents of Brazilian education (Base Nacional Comum Curricular – BNCC – and the Referential Curriculum Guidelines of Ceará – DCRC); use of educational technologies in Science and Biology teaching; contextualized education; the knowledge and teaching practices; in addition to the relationship between physical and mental health in times of a pandemic. This project aimed, therefore, to impact on a holistic, integral and human formation of this teacher- learner. Keywords: Internship; Teacher training; Graduation. alabras-clave: Prácticas; Formación de profesores; Graduación. ESTÁGIO SUPERVISIONADO: APROXIMAÇÕES INICIAIS Atividades práticas, que permitam o exercício da docência, sob supervisão, ainda durante a formação inicial dos professores (as), além de requisito legal (BRASIL, 2019), configura-se como etapa indispensável para a formação docente. Nesse contexto, o Recebido em: 30/11/2022 Aceito em: 30/04/2023 Recebido em: 30/11/2022 Aceito em: 30/04/2023 493 493 Vol. 6, n. 2. 2023 Edição Especial: Estágio Supervisionado e Prática de Ensino em Ciências estágio supervisionado nos cursos de licenciatura, apresenta-se como fundamental para uma formação docente ampla, articulada com a realidade e voltada para o desenvolvimento do trabalho docente (LÜDKE, 2013; GATTI, 2013). Esse momento formativo é necessário para a aprendizagem de um profissional que deseja realmente seguir e estar preparado para enfrentar os desafios de uma carreira docente. É durante o desenvolvimento dos estágios que os licenciandos se aproximam do futuro campo de atuação profissional, entrando em contato com a realidade sociocultural dos espaços educativos formais e não-formais, reconhecendo seus constituintes e nuances (FRACARO; HAEFLIGER, 2022; PINHEIRO JÚNIOR et al., 2022). Similarmente, para Lima (2009, p. 47), o desenvolvimento dos estágios em sua concepção mais ampla propõe-se a “instrumentalizar o estagiário para a reflexão sobre o seu fazer pedagógico mais abrangente e a sua identidade profissional”. Lima (2009) sugere que esse período de (form)ação para e na docência seja desenvolvido em três etapas: Lima (2009) sugere que esse período de (form)ação para e na docência seja desenvolvido em três etapas: i) Professor, Identidade e Memória Docente – acontecimento para apropriação da fundamentação teórico-epistemológicos, filosóficos e históricos da prática de ensino; ii) O professor e a escola em movimento – imergência reflexiva a partir do movimento real de aproximação com espaço escolar por meio das aprendizagens do contexto; iii) O Livro Didático e os Parâmetros Curriculares – fase de compreensão do material didático e das especificidades curriculares da área de conhecimento que o estudante esteja inserido (LIMA, 2009, p. 46). i) Professor, Identidade e Memória Docente – acontecimento para apropriação da fundamentação teórico-epistemológicos, filosóficos e históricos da prática de ensino; ii) O professor e a escola em movimento – imergência reflexiva a partir do movimento real de aproximação com espaço escolar por meio das aprendizagens do contexto; iii) O Livro Didático e os Parâmetros Curriculares – fase de compreensão do material didático e das especificidades curriculares da área de conhecimento que o estudante esteja inserido (LIMA, 2009, p. 46). ESTÁGIO SUPERVISIONADO: APROXIMAÇÕES INICIAIS Essas etapas possibilitam a construção da identidade docente assim como a compreensão do papel do professor na escola e no processo de ensino e aprendizagem, garantindo uma interação mútua entre licenciandos-professores supervisores-escola- universidade sedimentada na reflexão-ação. A Resolução CNE/CP Nº 2, de 20 de Dezembro de 2019 define as Diretrizes Curriculares Nacionais para a Formação Inicial de Professores para a Educação Básica e institui a Base Nacional Comum para a Formação Inicial de Professores da Educação Básica (BNC-Formação) (BRASIL, 2019), nela, os estágios supervisionados devem compor o Projeto Pedagógico do Curso (PPC) dos cursos de licenciatura, destinando-se, no mínimo, 400 (quatrocentas) horas para o estágio supervisionado, em situação de imersão de trabalho nas escolas. m: 30/11/2022 No Curso de Licenciatura em Ciências Biológicas representado neste manuscrito, são destinadas 408 horas de estágios, divididas em quatro disciplinas: Estágio No Curso de Licenciatura em Ciências Biológicas representado neste manuscrito, são destinadas 408 horas de estágios, divididas em quatro disciplinas: Estágio Recebido em: 30/11/2022 Aceito em: 30/04/2023 Recebido em: 30/11/2022 Aceito em: 30/04/2023 494 Recebido em: 30/11/2022 Aceito em: 30/04/2023 494 494 Vol. 6, n. 2. 2023 Edição Especial: Estágio Supervisionado e Prática de Ensino em Ciências Supervisionado no Ensino Fundamental, Estágio Supervisionado I, II e III no Ensino Médio, com carga horária de 102 horas cada, onde os alunos estagiários estarão em contato com o Ensino de Ciências e Biologia. Supervisionado no Ensino Fundamental, Estágio Supervisionado I, II e III no Ensino Médio, com carga horária de 102 horas cada, onde os alunos estagiários estarão em contato com o Ensino de Ciências e Biologia. Durante os estágios, os estudantes analisam a estrutura político-pedagógico- administrativa e o Projeto Político Pedagógico da escola, além de desenvolverem um projeto de ensino que será realizado ao longo do semestre, englobando o planejamento, as estratégias de integração da comunidade escolar, a observação e a regência das aulas (CEARÁ, 2012). Além disso, há também momentos de encontros presenciais com o professor orientador (responsável pelas disciplinas de estágios na Universidade), onde há aprofundamento teórico, discussões de temáticas inerentes à prática docente no ensino de Ciências e Biologia e socializações reflexivas das atividades desenvolvidas nas escolas. Todavia, devido à necessidade do ensino remoto emergencial em decorrência da pandemia da Covid-19, os encontros foram virtuais por meio de atividades síncronas. ESTÁGIO SUPERVISIONADO: APROXIMAÇÕES INICIAIS Nesse contexto, desenvolveu-se o Projeto Integrador dos Estágios (PIE), ao longo do semestre letivo 2021.1, o qual será descrito mais amplamente no tópico a seguir. A respeito dos estágios supervisionados em cursos de licenciatura durante a pandemia e a consequente adoção do ensino remoto emergencial, Souza e Ferreira (2020, p. 3) destacaram que: Além disso, há também momentos de encontros presenciais com o professor orientador (responsável pelas disciplinas de estágios na Universidade), onde há aprofundamento teórico, discussões de temáticas inerentes à prática docente no ensino de Ciências e Biologia e socializações reflexivas das atividades desenvolvidas nas escolas. Todavia, devido à necessidade do ensino remoto emergencial em decorrência da pandemia da Covid-19, os encontros foram virtuais por meio de atividades síncronas. Nesse contexto, desenvolveu-se o Projeto Integrador dos Estágios (PIE), ao longo do semestre letivo 2021.1, o qual será descrito mais amplamente no tópico a seguir. A respeito dos estágios supervisionados em cursos de licenciatura durante a pandemia e a consequente adoção do ensino remoto emergencial, Souza e Ferreira (2020, p. 3) destacaram que: [...] dentre os inúmeros impactos decorrentes da suspensão de aulas e de atividades presenciais, nos convoca a observar e pensar alternativas para a validação do componente estágio supervisionado nos cursos de licenciatura, à luz de estratégias que considerem as atividades formativas do ensino remoto, tanto já integrantes ao currículo do curso, ou propostas a partir da necessidade de replanejamento advinda da pandemia. Devido a isso, houve a necessidade de (re)planejar as atividades dos estágios em cursos de licenciatura para adaptação às condições remotas, Mendes, Maia e Biacon (2021, p. 88) destacam que a “adoção de modificações na condução e na realização dos Estágios em regime remoto já nos indica implicações na compreensão das/os estagiárias/os sobre a realidade escolar e o ato pedagógico de Ciências ou Biologia”. Para esses autores, o contexto de realização remota dos estágios “permite reflexões posteriores mais aprofundadas sobre os possíveis impactos na futura práxis docente de licenciandas/os em formação” (MENDES; MAIA; BIACON, 2021, p. 97). Recebido em: 30/11/2022 Aceito em: 30/04/2023 Recebido em: 30/11/2022 Aceito em: 30/04/2023 495 495 Vol. 6, n. 2. 2023 Edição Especial: Estágio Supervisionado e Prática de Ensino em Ciências Vol. 6, n. 2. ESTÁGIO SUPERVISIONADO: APROXIMAÇÕES INICIAIS 2023 Edição Especial: Estágio Supervisionado e Prática de Ensino em Ciências Dito isto, tratamos aqui de um relato de experiência descritivo, de abordagem qualitativa, cujo intuito é explanar sobre o desenvolvimento do projeto integrador dos estágios supervisionados de um curso de licenciatura em Ciências Biológicas, ofertado por uma universidade estadual, situada na região dos Sertões de Crateús. PROJETO INTEGRADOR DOS ESTÁGIOS (PIE) O Projeto Integrador dos Estágios (PIE), foi desenvolvido ao longo do semestre letivo 2021.1 (setembro/2021 a janeiro/2022). Sua idealização ocorreu no início do semestre, durante a semana pedagógica do curso, quando os professores orientadores dos estágios reuniram-se e propuseram realizar uma ação integradora e interdisciplinar, fazendo surgir o PIE. O PIE foi então definido como um momento de discussão de temáticas relacionadas diretamente ou transversalmente ao processo de ensino e aprendizagem, docência e/ou estrutura e funcionamento da educação básica. Ele foi dividido em seis encontros durante o decorrer do semestre, ocorridos via aplicativo de web conferência Google Meet® ou pelo canal oficial do PIRP/UECE (Programa Institucional de Residência Pedagógica da Universidade Estadual do Ceará) no Youtube®. Foram abordadas temáticas como: atuais documentos legais da educação brasileira (Base Nacional Comum Curricular – BNCC – e as Diretrizes Curriculares Referencial do Ceará – DCRC); utilização das tecnologias educativas no ensino de Ciências e Biologia; a educação contextualizada; os saberes e os fazeres docente; além da relação entre saúde física e mental em tempos de pandemia. O detalhamento do exposto em cada temática encontra-se no Quadro 1 a seguir. o em: 30/11/2022 Quadro 1 – Temáticas abordadas durante o desenvolvimento do Projeto Integrador dos Estágios supervisionados em ensino de Ciências e Biologia. Temática abordada Descrição da temática Base Nacional Comum Curricular (BNCC) Neste tópico foram apresentadas as concepções e conceitos que fundamentam a BNCC-EB. Para isto, realizou-se uma historização da proposta de implementação de uma Base Comum Nacional, em todo o território brasileiro e os marcos legais que regulamentam essa implementação, com destaque para o Art. 26 da Lei de Diretrizes e Bases da Educação-LDB, o Art. 14 das Diretrizes Curriculares nacionais-DCB e as metas 2, 3 e 8 do Plano Nacional de Educação-PNE. Discutiu- se ainda o contexto político e social no qual se deu a aprovação da BNCC, ocorrida, em 02 etapas distintas, sendo a primeira em dezembro de 2017, na parte referente a Educação infantil 496 Recebido em: 30/11/2022 Aceito em: 30/04/2023 Quadro 1 – Temáticas abordadas durante o desenvolvimento do Projeto Integrador dos Estágios supervisionados em ensino de Ciências e Biologia. Temática abordada Descrição da temática Base Nacional Comum Curricular (BNCC) Neste tópico foram apresentadas as concepções e conceitos que fundamentam a BNCC-EB. PROJETO INTEGRADOR DOS ESTÁGIOS (PIE) Nesse segundo encontro foram apresentados os desdobramentos que se seguiram a aprovação da BNCC, em especial o lançamento do Programa de Apoio à Implementação da Base Nacional Comum Curricular - ProBNCC, em abril de 2018, pelo Ministério da Educação, e instituído por meio da portaria Nº 331, que estabeleceu o regime de colaboração que seria instalado a partir daquele momento para que todos os Estados e o Distrito federal revisassem ou elaborassem seus currículos, alinhados a BNCC. Foram apresentados todos os regulamentos dos programas, a exemplo das Portaria MEC nº 756, de 3 de abril de 2019, para inserir aspectos específicos da implementação da BNCC para o Ensino Médio. No encontro, foram discutidos como a partir da implementação do programa, todos os Estados e o Distrito Federal iniciaram o processo de revisão e ou escrita de seus documentos curriculares e como este foi responsável pelo aporte financeiro do proBNCC, subsidiaram a formação das equipes de redatores e, cada Unidade da Federação. A segunda metade do encontro foi dedicada a apresentação do Documento Curricular do Estado do Ceará- DCRC, referente ao Ensino Fundamental discutindo-se, como documentos elaborados a luz da BNCC, podem configurar-se como espaços/oportunidades de resistências para que Estados e o DF pudessem imprimir suas marcas. Foram ainda apresentadas as concepções assumidas, tais como contextualização, interdisciplinaridade e como essas concepções ancoram a Autonomia docente e Gestão democrática das Escolas. A palestrante convidada iniciou sua explanação ressaltando fatores positivos relacionados às atividades físicas e estabelecendo relações entre saúde e o bem-estar físico, e o Ensino Fundamental e a segunda em dezembro de 2018 com aprovação do texto referente ao Ensino Médio. Foram apresentadas, comparadas e discutidas as diferenças entre as chamadas primeira e segundas versões, submetidas a consultas públicas e a terceira versão, que embora também tenha passado por consulta pública, apresentava escopo totalmente diferente dos documentos anteriores, com uma proposta formativa baseada em competências e habilidades. A partir dessas discussões foram apresentadas as estruturas presentes no documento final da BNCC, a organização das áreas e componentes curriculares, seguindo-se ao aprofundamento da área/componente Ciências da Natureza. A partir desse momento seguiu-se um estudo a miúde, com apresentação das competências específicas, Unidades temáticas, com detalhamento dos objetos de conhecimento e habilidades a estas associadas. PROJETO INTEGRADOR DOS ESTÁGIOS (PIE) Para isto, realizou-se uma historização da proposta de implementação de uma Base Comum Nacional, em todo o território brasileiro e os marcos legais que regulamentam essa implementação, com destaque para o Art. 26 da Lei de Diretrizes e Bases da Educação-LDB, o Art. 14 das Diretrizes Curriculares nacionais-DCB e as metas 2, 3 e 8 do Plano Nacional de Educação-PNE. Discutiu- se ainda o contexto político e social no qual se deu a aprovação da BNCC, ocorrida, em 02 etapas distintas, sendo a primeira em dezembro de 2017, na parte referente a Educação infantil Recebido em: 30/11/2022 Aceito em: 30/04/2023 496 Vol. 6, n. 2. 2023 Edição Especial: Estágio Supervisionado e Prática de Ensino em Ciências Vol. 6, n. 2. 2023 Edição Especial: Estágio Supervisionado e Prática de Ensino em Ciências e o Ensino Fundamental e a segunda em dezembro de 2018 com aprovação do texto referente ao Ensino Médio. Foram apresentadas, comparadas e discutidas as diferenças entre as chamadas primeira e segundas versões, submetidas a consultas públicas e a terceira versão, que embora também tenha passado por consulta pública, apresentava escopo totalmente diferente dos documentos anteriores, com uma proposta formativa baseada em competências e habilidades. A partir dessas discussões foram apresentadas as estruturas presentes no documento final da BNCC, a organização das áreas e componentes curriculares, seguindo-se ao aprofundamento da área/componente Ciências da Natureza. A partir desse momento seguiu-se um estudo a miúde, com apresentação das competências específicas, Unidades temáticas, com detalhamento dos objetos de conhecimento e habilidades a estas associadas. O encontro foi finalizado com uma análise crítica geral do documento, dos processos cognitivos presentes nas habilidades associadas as competências específicas do componente, assim como discussões de assuntos/conteúdos e conceitos historicamente tratados em ciências e biologia que foram deixados de fora da proposta aprovada pelo Conselho Nacional de Educação em dezembro de 2018. Nesse segundo encontro foram apresentados os desdobramentos que se seguiram a aprovação da BNCC, em especial o lançamento do Programa de Apoio à Implementação da Base Nacional Comum Curricular - ProBNCC, em abril de 2018, pelo Ministério da Educação, e instituído por meio da portaria Nº 331, que estabeleceu o regime de colaboração que seria instalado a partir daquele momento para que todos os Estados e o Distrito federal revisassem ou elaborassem seus currículos, alinhados a BNCC. PROJETO INTEGRADOR DOS ESTÁGIOS (PIE) Foram apresentados todos os regulamentos dos programas, a exemplo das Portaria MEC nº 756, de 3 de abril de 2019, para inserir aspectos específicos da implementação da BNCC para o Ensino Médio. No encontro, foram discutidos como a partir da implementação do programa, todos os Estados e o Distrito Federal iniciaram o processo de revisão e ou escrita de seus documentos curriculares e como este foi responsável pelo aporte financeiro do proBNCC, subsidiaram a formação das equipes de redatores e, cada Unidade da Federação. A segunda metade do encontro foi dedicada a apresentação do Documento Curricular do Estado do Ceará- DCRC, referente ao Ensino Fundamental discutindo-se, como documentos elaborados a luz da BNCC, podem configurar-se como espaços/oportunidades de resistências para que Estados e o DF pudessem imprimir suas marcas. Foram ainda apresentadas as concepções assumidas, tais como contextualização, interdisciplinaridade e como essas concepções ancoram a Autonomia docente e Gestão democrática das Escolas. A palestrante convidada iniciou sua explanação ressaltando fatores positivos relacionados às atividades físicas e estabelecendo relações entre saúde e o bem-estar físico, mental e social. Destacou a importância de se levar em Diretrizes Curriculares Referencial do Ceará (DCRC) Live PIRP/UECE - Impacto da atividade física na saúde mental em tempos de e o Ensino Fundamental e a segunda em dezembro de 2018 com aprovação do texto referente ao Ensino Médio. Foram apresentadas, comparadas e discutidas as diferenças entre as chamadas primeira e segundas versões, submetidas a consultas públicas e a terceira versão, que embora também tenha passado por consulta pública, apresentava escopo totalmente diferente dos documentos anteriores, com uma proposta formativa baseada em competências e habilidades. A partir dessas discussões foram apresentadas as estruturas presentes no documento final da BNCC, a organização das áreas e componentes curriculares, seguindo-se ao aprofundamento da área/componente Ciências da Natureza. A partir desse momento seguiu-se um estudo a miúde, com apresentação das competências específicas, Unidades temáticas, com detalhamento dos objetos de conhecimento e habilidades a estas associadas. O encontro foi finalizado com uma análise crítica geral do documento, dos processos cognitivos presentes nas habilidades associadas as competências específicas do componente, assim como discussões de assuntos/conteúdos e conceitos historicamente tratados em ciências e biologia que foram deixados de fora da proposta aprovada pelo Conselho Nacional de Educação em dezembro de 2018. PROJETO INTEGRADOR DOS ESTÁGIOS (PIE) O encontro foi finalizado com uma análise crítica geral do documento, dos processos cognitivos presentes nas habilidades associadas as competências específicas do componente, assim como discussões de assuntos/conteúdos e conceitos historicamente tratados em ciências e biologia que foram deixados de fora da proposta aprovada pelo Conselho Nacional de Educação em dezembro de 2018. Nesse segundo encontro foram apresentados os desdobramentos que se seguiram a aprovação da BNCC, em especial o lançamento do Programa de Apoio à Implementação da Base Nacional Comum Curricular - ProBNCC, em abril de 2018, pelo Ministério da Educação, e instituído por meio da portaria Nº 331, que estabeleceu o regime de colaboração que seria instalado a partir daquele momento para que todos os Estados e o Distrito federal revisassem ou elaborassem seus currículos, alinhados a BNCC. Foram apresentados todos os regulamentos dos programas, a exemplo das Portaria MEC nº 756, de 3 de abril de 2019, para inserir aspectos específicos da implementação da BNCC para o Ensino Médio. No encontro, foram discutidos como a partir da implementação do programa, todos os Estados e o Distrito Federal iniciaram o processo de revisão e ou escrita de seus documentos curriculares e como este foi responsável pelo aporte financeiro do proBNCC, subsidiaram a formação das equipes de redatores e, cada Unidade da Federação. A segunda metade do encontro foi dedicada a apresentação do Documento Curricular do Estado do Ceará- DCRC, referente ao Ensino Fundamental discutindo-se, como documentos elaborados a luz da BNCC, podem configurar-se como espaços/oportunidades de resistências para que Estados e o DF pudessem imprimir suas marcas. Foram ainda apresentadas as concepções assumidas, tais como contextualização, interdisciplinaridade e como essas concepções ancoram a Autonomia docente e Gestão democrática das Escolas. A palestrante convidada iniciou sua explanação ressaltando Diretrizes Curriculares Referencial do Ceará (DCRC) Diretrizes Curriculares Referencial do Ceará (DCRC) Diretrizes Curriculares Referencial do Ceará (DCRC) Live PIRP/UECE - Impacto da atividade física na saúde mental em tempos de Recebido em: 30/11/2022 Aceito em: 30/04/2023 Recebido em: 30/11/2022 Aceito em: 30/04/2023 497 Vol. 6, n. 2. 2023 Edição Especial: Estágio Supervisionado e Prática de Ensino em Ciências pandemia: um olhar sobre a saúde integral do indivíduo consideração não somente a ausência de doença, mas também o fato de que a qualquer momento, por mais que se esteja bem, eventuais lesões de natureza mental ou física podem agredir a saúde mental. PROJETO INTEGRADOR DOS ESTÁGIOS (PIE) Falou também sobre a combinação de pensamentos, percepções, emoções e comportamentos “anormais” que podem afetar as relações interpessoais, sociais, laborais, culturais, econômicas e ambientais. Destacou, ainda, alguns tipos de transtornos comuns na sociedade, tais como: depressão, transtorno afetivo bipolar; esquizofrenia; demência, dentre outros transtornos decorrentes de problemas psicológicos. Ao final, compreendeu-se que todos esses aspectos podem afetar fortemente as atividades acadêmicas e profissionais de estudantes e professores. Live PIRP/UECE - Diálogos sobre a docência: quais saberes? Quais fazeres? A palestrante iniciou a sua exposição fazendo questionamentos sobre o que identifica a profissão de professor. Destacou que é fundamental estabelecer um diálogo sobre o “fazer” e “ser” professor, refletindo e questionando sobre saberes e fazeres na profissão cotidiana como professor. Ressaltou a importância do envolvimento ativo do professor, buscando agir de forma inovadora, reflexiva, experimental e interativa, sempre com o objetivo de promover uma mudança em prol da promoção de conhecimento. Deixou claro que o processo formativo é dinâmico, não linear e depende da atividade profissional do professor. Deu destaque a três tipos de racionalidades: a técnica, a prática e a reflexiva. Quanto à racionalidade técnica, explicou que a mesma não é suficiente para a promoção de uma mudança de postura docente, já que: técnicas e métodos únicos não atendem qualquer realidade; não deve haver supremacia de conhecimentos teóricos sobre os saberes práticos; não deve haver uma predominância do trabalho individual; e não é adequado se basear em metas e objetivos externos como cernes do trabalho docente. Destacou que a racionalidade prática permite uma prática reflexiva pelo professor. Contudo, enfatizou que não basta refletir sobre a prática, mas é preciso colocar essa reflexão em um contexto crítico-reflexivo que representa a práxis docente, considerando as condições sociais, políticas e econômicas refletidas na prática do professor. Salientou a importância de reconhecer a epistemologia da prática, sendo necessário incluir a teoria a este pensamento, priorizando um acervo de experiências teórico-práticas. Forneceu também detalhes e referências educacionais no campo dos saberes docentes e das práticas pedagógicas e finalizou ressaltando que o ato de ensinar exige comprometimento, já que a atividade docente não é neutra (e sim intencional), devendo-se sempre buscar a transformação dos estudantes por meio do conhecimento. PROJETO INTEGRADOR DOS ESTÁGIOS (PIE) Tecnologias educacionais no ensino de Ciências e Biologia Foi abordado inicialmente o conceito das tecnologias digitais da informação e comunicação e contexto da sua utilização visto a nossa inserção em uma Sociedade do Conhecimento e de uma cultura digital, o que aproxima essas ferramentas tecnológicas do processo educacional. Assim, foram apresentadas algumas possibilidades de estratégias e recursos didáticos que podem ser utilizadas no processo de ensino e pandemia: um olhar sobre a saúde integral do indivíduo pandemia: um olhar sobre a saúde integral do indivíduo consideração não somente a ausência de doença, mas também o fato de que a qualquer momento, por mais que se esteja bem, eventuais lesões de natureza mental ou física podem agredir a saúde mental. Falou também sobre a combinação de pensamentos, percepções, emoções e comportamentos “anormais” que podem afetar as relações interpessoais, sociais, laborais, culturais, econômicas e ambientais. Destacou, ainda, alguns tipos de transtornos comuns na sociedade, tais como: depressão, transtorno afetivo bipolar; esquizofrenia; demência, dentre outros transtornos decorrentes de problemas psicológicos. Ao final, compreendeu-se que todos esses aspectos podem afetar fortemente as atividades acadêmicas e profissionais de estudantes e professores. A p Foi abordado inicialmente o conceito das tecnologias digitais da informação e comunicação e contexto da sua utilização visto a nossa inserção em uma Sociedade do Conhecimento e de uma cultura digital, o que aproxima essas ferramentas tecnológicas do processo educacional. Assim, foram apresentadas algumas possibilidades de estratégias e recursos didáticos que podem ser utilizadas no processo de ensino e aprendizagem mediados pela tecnologia. Por fim, convidamos Tecnologias educacionais no ensino de Ciências e Biologia Recebido em: 30/11/2022 Aceito em: 30/04/2023 498 Vol. 6, n. 2. 20 Edição Especial: Estágio Supervisionado e Prática de Ensino e à reflexão sobre as características do professor do futuro (ou seria presente?) e quem são os atores para que haja uma verdadeira (r)evolução educacional. Educação contextualizada Neste encontro, inicialmente foi apresentado a necessidade de pensarmos a Educação Contextualizada para a Convivência com o Semiárido Brasileiro, expondo sobre os estereótipos e preconceitos sobre as condições geoambientais e da população da região. Depois destacou-se as potencialidades e sobretudo a estratégias construídas ao longo da história, tanto pela população local, quanto pelos integrantes dos movimentos sociais, organização da sociedade civil, universidades, igrejas, etc. No momento seguinte discutiu-se sobre o histórico da Educação Contextualizada, bem como o seu conceito e elementos básicos dessa proposta. PROJETO INTEGRADOR DOS ESTÁGIOS (PIE) Após a realização das ações do projeto, os 19 estudantes regularmente matriculados nos quatro estágios (Estágio Supervisionado no Ensino Fundamental, Estágio à reflexão sobre as características do professor do futuro (ou seria presente?) e quem são os atores para que haja uma verdadeira (r)evolução educacional. Neste encontro, inicialmente foi apresentado a necessidade de pensarmos a Educação Contextualizada para a Convivência com o Semiárido Brasileiro, expondo sobre os estereótipos e preconceitos sobre as condições geoambientais e da população da região. Depois destacou-se as potencialidades e sobretudo a estratégias construídas ao longo da história, tanto pela população local, quanto pelos integrantes dos movimentos sociais, organização da sociedade civil, universidades, igrejas, etc. No momento seguinte discutiu-se sobre o histórico da Educação Contextualizada, bem como o seu conceito e elementos básicos dessa proposta. Por fim, foi apresentado experiências exitosas, utilizando uma que ocorreu no ensino básico e outra no curso de formação de professores. A ideia foi entender as aplicações básicas da Educação Contextualizada e instigar a comunidade acadêmica a colocá-la como prioridade nas pautas de propostas curriculares e na prática docente. Após a realização das ações do projeto, os 19 estudantes regularmente matriculados nos quatro estágios (Estágio Supervisionado no Ensino Fundamental, Estágio Supervisionado I, II e III no Ensino Médio, no qual os estagiários estarão desenvolvendo as atividades do 6º ao 9º ano; 1º ano, 2º ano e 3º ano, respectivamente) foram convidados a participar da avaliação do PIE. Para isso, foi enviado nos grupos das disciplinas, em um aplicativo de envio de mensagens, um formulário eletrônico no qual eles indicaram o grau de satisfação (em uma escala de Likert de 0 a 5, sendo 0 totalmente insatisfeito e o 5 totalmente satisfeito) para cada momento. Participaram voluntariamente deste passo 9 (nove) estudantes, sendo 5 do sexo masculino e 4 do sexo feminino, com idade variando de 20 a 27 anos. Para a maior parte dos professores em formação (88,9%) a participação e desenvolvimentos das ações obtiveram alto grau de satisfação (nota 5), sendo justificada na fala de alguns participantes, como posto a seguir. 499 Recebido em: 30/11/2022 Aceito em: 30/04/2023 Foi muito bem direcionada, contextualizada e os palestrantes mostraram domínio do conteúdo. Foram temas instigantes, importantes e provocativas (Estagiário 2). PROJETO INTEGRADOR DOS ESTÁGIOS (PIE) Por fim, foi apresentado experiências exitosas, utilizando uma que ocorreu no ensino básico e outra no curso de formação de professores. A ideia foi entender as aplicações básicas da Educação Contextualizada e instigar a comunidade acadêmica a colocá-la como prioridade nas pautas de propostas curriculares e na prática docente. Fonte: Elaborado pelos autores. Após a realização das ações do projeto, os 19 estudantes regularmente matriculados nos quatro estágios (Estágio Supervisionado no Ensino Fundamental, Estágio Supervisionado I, II e III no Ensino Médio, no qual os estagiários estarão desenvolvendo as atividades do 6º ao 9º ano; 1º ano, 2º ano e 3º ano, respectivamente) foram convidados a participar da avaliação do PIE. Para isso, foi enviado nos grupos das disciplinas, em um aplicativo de envio de mensagens, um formulário eletrônico no qual eles indicaram o grau de satisfação (em uma escala de Likert de 0 a 5, sendo 0 totalmente insatisfeito e o 5 totalmente satisfeito) para cada momento. Participaram voluntariamente deste passo 9 (nove) estudantes, sendo 5 do sexo masculino e 4 do sexo feminino, com idade variando de 20 a 27 anos. i d f f (88 9%) i i Vol. 6, n. 2. 2023 Edição Especial: Estágio Supervisionado e Prática de Ensino em Ciências à reflexão sobre as características do professor do futuro (ou seria presente?) e quem são os atores para que haja uma verdadeira (r)evolução educacional. Educação contextualizada Neste encontro, inicialmente foi apresentado a necessidade de pensarmos a Educação Contextualizada para a Convivência com o Semiárido Brasileiro, expondo sobre os estereótipos e preconceitos sobre as condições geoambientais e da população da região. Depois destacou-se as potencialidades e sobretudo a estratégias construídas ao longo da história, tanto pela população local, quanto pelos integrantes dos movimentos sociais, organização da sociedade civil, universidades, igrejas, etc. No momento seguinte discutiu-se sobre o histórico da Educação Contextualizada, bem como o seu conceito e elementos básicos dessa proposta. Por fim, foi apresentado experiências exitosas, utilizando uma que ocorreu no ensino básico e outra no curso de formação de professores. A ideia foi entender as aplicações básicas da Educação Contextualizada e instigar a comunidade acadêmica a colocá-la como prioridade nas pautas de propostas curriculares e na prática docente. Fonte: Elaborado pelos autores. PROJETO INTEGRADOR DOS ESTÁGIOS (PIE) Além de contribuir para a compreensão de fenômenos e conhecimentos científicos, estabelecer relações dos aspectos com o contexto em que vive Foi muito bem direcionada, contextualizada e os palestrantes mostraram domínio do conteúdo. Foram temas instigantes, importantes e provocativas (Estagiário 2). Além de contribuir para a compreensão de fenômenos e conhecimentos científicos, estabelecer relações dos aspectos com o contexto em que vive Recebido em: 30/11/2022 Aceito em: 30/04/2023 Recebido em: 30/11/2022 Aceito em: 30/04/2023 499 499 Vol. 6, n. 2. 2023 Edição Especial: Estágio Supervisionado e Prática de Ensino em Ciências Vol. 6, n. 2. 2023 Edição Especial: Estágio Supervisionado e Prática de Ensino em Ciências auxilia na compreensão e interação do aluno com as informações que estão sendo repassadas (Estagiário 3). Momento muito enriquecedor onde aprendemos várias formas de transmitir conhecimento de modo a integrar os alunos na sala, proporcionando um melhor ensino-aprendizagem (Estagiário 6). As proposições do PIE relacionam-se como formação humanística do licenciando, cuja centralidade é um processo de interação e integração, tangenciada pela colaboração e conhecimento. Esse tipo de aprendizagem formativa na prática favorece o desenvolvimento de múltiplas habilidades (procedimentais, conceituais e atitudinais) (LOPES et al., 2022), centrada numa alfabetização científica colaborativa que contribui no desenvolvimento profissional docente (FONSECA; GONÇALVES; SANTOS JÚNIOR, 2022). O desenvolvimento do projeto torna-se ainda mais relevante no momento histórico em que foi realizado: o ensino remoto emergencial. Nesse contexto, a ressignificação das práticas pedagógicas foi necessária, o que impactou diretamente na formação (inicial e continuada) dos professores. Neste percurso diversos desafios e barreiras precisaram ser transponíveis, como a falta de equipamentos e infraestrutura, apoio institucional e de formação (CLESAR; GIRAFFA, 2022; MENEZES; MOURA, 2021). O desenvolvimento do projeto torna-se ainda mais relevante no momento histórico em que foi realizado: o ensino remoto emergencial. Nesse contexto, a ressignificação das práticas pedagógicas foi necessária, o que impactou diretamente na formação (inicial e continuada) dos professores. Neste percurso diversos desafios e barreiras precisaram ser transponíveis, como a falta de equipamentos e infraestrutura, apoio institucional e de formação (CLESAR; GIRAFFA, 2022; MENEZES; MOURA, 2021). O PIE também se torna um espelho para a aplicação de uma prática docente interacionista, integrativa, colaborativa e interdisciplinar, como apontou o Estagiário 6, anteriormente. PROJETO INTEGRADOR DOS ESTÁGIOS (PIE) Neste ponto, Tonet (2006) reforça a necessidade de uma atividade educativa que contribua na formação de indivíduos autônomos, críticos, reflexivos e comprometidos para a construção de uma sociedade que por meio da formação integral possa transformar a realidade. O PIE também se torna um espelho para a aplicação de uma prática docente interacionista, integrativa, colaborativa e interdisciplinar, como apontou o Estagiário 6, anteriormente. Neste ponto, Tonet (2006) reforça a necessidade de uma atividade educativa que contribua na formação de indivíduos autônomos, críticos, reflexivos e comprometidos para a construção de uma sociedade que por meio da formação integral possa transformar a realidade. Essa realidade está em alinhamento à proposta educativa de uma educação global, integrando as diversas áreas do conhecimento, as dimensões intelectuais, sociais e cognitivas. Ações com essa característica acabam por promover uma forma autônoma, reflexiva, interdisciplinar e integradora, além de possibilitar livrar-se das amarras do ensino fragmento e descontextualizado com a realidade (BEANE, 2003; FAZENDA, 2014). Fato este corroborado por Nóvoa (2011), o qual destaca que a docência deve exercer a partilha de saberes e das práticas de modo colaborativo. Recebido em: 30/11/2022 Aceito em: 30/04/2023 Recebido em: 30/11/2022 Aceito em: 30/04/2023 500 500 Vol. 6, n. 2. 2023 Edição Especial: Estágio Supervisionado e Prática de Ensino em Ciências Vol. 6, n. 2. 2023 Edição Especial: Estágio Supervisionado e Prática de Ensino em Ciências REFERÊNCIAS BEANE, J. A. Integração Curricular: a essência de uma escola democrática. Currículo Sem Fronteiras, v.3, n.2, p. 91-110, 2003. BEANE, J. A. Integração Curricular: a essência de uma escola democrática. Currículo Sem Fronteiras, v.3, n.2, p. 91-110, 2003. BRASIL. Resolução CNE/CP 2/2019. Diário Oficial da União, Brasília, 15 de abril de 2020, Seção 1, p. 46-49, 2020. CEARÁ. Projeto pedagógico curso de Ciências Biológicas - modalidade licenciatura – FAEC/UECE. 2012. CONSIDERAÇÕES FINAIS O Projeto Integrado dos Estágios (PIE) trouxe aos estudantes licenciandos estagiários a oportunidade de um caro momento de discussão acerca de temáticas curriculares, metodológicas e integradoras do contexto educacional, ampliando o escopo dialógico da formação docente. As temáticas sobre os documentos curriculares (BNCC e DCRC), as tecnologias digitais no processo educacional, saberes e fazeres docente, educação contextualizada e saúde mental na pandemia são temas que permeiam a (form)ação docente, sendo fundamentalmente importantes sua abordagem e discussão nos cursos de licenciatura, em especial se forem realizadas de forma inte(g)rativa, contextualizada e colaborativa. No desabrochar do Estágio, esses tipos de ações são ainda mais profícuas, visto que este é um espaço de alinhamento da teoria e prática. Para mais, é uma possibilidade de promoção de atividades que proporcionem a reflexão da profissão docente e de temáticas que a rodeiam, possibilitando uma formação plural, integradora, humanística e holística do futuro professor, tornando-o capacitado para transformar uma sala de aula por vez, um aluno por vez, e contribuindo para reconstruir a realidade e alavancar a qualidade da educação brasileira. REFERÊNCIAS BEANE, J. A. Integração Curricular: a essência de uma escola democrática. Currículo Sem Fronteiras, v.3, n.2, p. 91-110, 2003. No desabrochar do Estágio, esses tipos de ações são ainda mais profícuas, visto que este é um espaço de alinhamento da teoria e prática. Para mais, é uma possibilidade de promoção de atividades que proporcionem a reflexão da profissão docente e de temáticas que a rodeiam, possibilitando uma formação plural, integradora, humanística e holística do futuro professor, tornando-o capacitado para transformar uma sala de aula por vez, um aluno por vez, e contribuindo para reconstruir a realidade e alavancar a qualidade da educação brasileira. REFERÊNCIAS BEANE, J. A. Integração Curricular: a essência de uma escola democrática. Currículo Sem Fronteiras, v.3, n.2, p. 91-110, 2003. No desabrochar do Estágio, esses tipos de ações são ainda mais profícuas, visto que este é um espaço de alinhamento da teoria e prática. Para mais, é uma possibilidade de promoção de atividades que proporcionem a reflexão da profissão docente e de temáticas que a rodeiam, possibilitando uma formação plural, integradora, humanística e holística do futuro professor, tornando-o capacitado para transformar uma sala de aula por vez, um aluno por vez, e contribuindo para reconstruir a realidade e alavancar a qualidade da educação brasileira. CEARÁ. Projeto pedagógico curso de Ciências Biológicas - modalidade licenciatura – FAEC/UECE. 2012. CLESAR, C.; GIRAFFA, L. A formação de professores a partir das vivências do ensino remoto: desafios, expectativas e possibilidades. Revista Insignare Scientia - RIS, v. 5, n. 5, p. 143-163, 2022. FAZENDA, I. A. C. (Org.). Interdisciplinaridade: pensar, pesquisar e intervir. São Paulo: Cortez, 2014. 501 Vol. 6, n. 2. 2023 Edição Especial: Estágio Supervisionado e Prática de Ensino em Ciências FONSECA, C.; GONÇALVES, S.; DOS SANTOS JR, J. Alfabetização científica, colaboração e desenvolvimento profissional: Investigando conexões em um grupo colaborativo de professoras dos anos iniciais. Revista Insignare Scientia - RIS, v. 5, n. 3, p. 226-242, 2022. FRACARO, A. R.; HAEFLIGER, C. K. M. Tornando-se professor: Um relato de experiência e vivência durante o Estágio Supervisionado II. Contraponto: Discussões científicas e pedagógicas em Ciências, Matemática e Educação, v. 3, n. 3, p. 92-106, 2022. GATTI, B. A. A formação inicial de professores para a educação básica: as licenciaturas. Revista USP, v. 100, p. 33-46, 2013. LIMA, M. S. L. O estágio nos cursos de licenciatura e a metáfora da árvore. Revista eletrônica pesquiseduca, v. 1, n. 01, p. 45-48, 2009. LOPES, A. et al. Percepções dos professores sobre interdisciplinaridade em um curso de formação continuada online. Revista Insignare Scientia - RIS, v. 5, n. 4, p. 1-17, 2022. LÜDKE, H. A. M. O lugar do estágio na formação de professores. Educação em Perspectiva, v.4, n.1, p. 111-133, 2013. MENDES, C. B.; MAIA, J. S. S.; BIANCON, M. L. Impactos do ensino remoto: a questão do Estágio Supervisionado Obrigatório em Ensino de Ciências e Biologia numa Universidade Estadual paranaense em tempos de pandemia. Momento: diálogos em educação, v. 30, n. 01, p. 78-98, jan./abr., 2021. MENEZES, J. B. F. de M.; MOURA, F. N. de S. O ensino em tempos de isolamento social: percepção de docentes de um curso de formação de professores. Olhar de Professor, [S. l.], v. 24, p. 1-10, 2021. DOI: 10.5212/OlharProfr.v.24.15836.046. SOUZA, E. M. F.; FERREIRA, L. G. Ensino remoto emergencial e o estágio supervisionado nos cursos de licenciatura no cenário da pandemia Covid 19. Rev. Tempos Espaços Educ., v.13, n. 32, p. 1-20. e-14290, jan./dez., 2020. PINHEIRO JÚNIOR, E. C. et al. O estágio supervisionado no curso de graduação em Ciências Biológicas: um relato de experiência. Educamazônia-Educação, Sociedade e Meio Ambiente, v. 15, n. 2, jul-dez, p. 188-209, 2022. TONET, I. Educação e formação humana. Ideação, v. 8, n. 9, p. 09-21, 2006. Recebido em: 30/11/2022 Aceito em: 30/04/2023 Recebido em: 30/11/2022 Aceito em: 30/04/2023 Recebido em: 30/11/2022 Aceito em: 30/04/2023 502
https://openalex.org/W4321004345
https://www.nature.com/articles/s41598-023-29439-6.pdf
English
null
Classification of electrically-evoked potentials in the parkinsonian subthalamic nucleus region
Scientific reports
2,023
cc-by
8,308
Classification of electrically‑evoked potentials in the parkinsonian subthalamic nucleus region OPEN Joshua Rosing 1, Alex Doyle 2, AnneMarie Brinda 1, Madeline Blumenfeld 1, Emily Lecy 2, Chelsea Spencer 1, Joan Dao 1, Jordan Krieg 1, Kelton Wilmerding 1, Disa Sullivan 1, Sendréa Best 1, Biswaranjan Mohanty 3, Jing Wang 3, Luke A. Johnson 3, Jerrold L. Vitek 3 & Matthew D. Johnson 1,4* Electrically evoked compound action potentials (ECAPs) generated in the subthalamic nucleus (STN) contain features that may be useful for titrating deep brain stimulation (DBS) therapy for Parkinson’s disease. Delivering a strong therapeutic effect with DBS therapies, however, relies on selectively targeting neural pathways to avoid inducing side effects. In this study, we investigated the spatiotemporal features of ECAPs in and around the STN across parameter sweeps of stimulation current amplitude, pulse width, and electrode configuration, and used a linear classifier of ECAP responses to predict electrode location. Four non-human primates were implanted unilaterally with either a directional (n = 3) or non-directional (n = 1) DBS lead targeting the sensorimotor STN. ECAP responses were characterized by primary features (within 1.6 ms after a stimulus pulse) and secondary features (between 1.6 and 7.4 ms after a stimulus pulse). Using these features, a linear classifier was able to accurately differentiate electrodes within the STN versus dorsal to the STN in all four subjects. ECAP responses varied systematically with recording and stimulating electrode locations, which provides a subject-specific neuroanatomical basis for selecting electrode configurations in the treatment of Parkinson’s disease with DBS therapy. Electrical stimulation within the nervous system is well known to generate evoked compound action potentials (ECAPs) whose features occur within milliseconds of stimulus onset and attenuate in amplitude over ­time1,2. This physiological activity, which is often detected from one or more recording electrodes positioned near the stimulating electrode, reflects the spatial summation of induced membrane polarization adjacent to the recording electrode(s)3–6. ECAP features are thought to be indicative of both direct activation of axons (immediate primary features) as well as synaptic and network-level modulation patterns (delayed secondary features)1,2. Such ECAP features have shown utility for assessing the degree of membrane polarization and thus target engagement with stimulation of the peripheral ­nerves7, spinal ­cord8–10, ­cochlea11–14, ­retina15,16, and deep brain ­regions2,17. www.nature.com/scientificreports www.nature.com/scientificreports www.nature.com/scientificreports Methods li i l Preclinical subjects. This study investigated ECAPs from STN-DBS leads in four aged female rhesus macaque monkeys (macaca mulatta; Subjects Ne, Az, So, and Bl; 14.75, 18.5, 19.5, and 26 years old, respectively, at the time of the recordings). Procedures used in the study were approved by the University of Minnesota’s Institutional Animal Care and Use Committee, were performed following the United States Public Health Ser- vice policy for humane care and use of laboratory animals, and follow the recommendations in the ARRIVE guidelines. All animals received environmental enrichment, free access to water, and a wide variety of foods, including fresh fruits and vegetables. All effort was made to provide animals with adequate care and prevent discomfort during the study. Surgical procedures. Animals were imaged pre-operatively using a 7 T or 10.5 T human bore magnet with custom-designed head coils for non-human primates at the Center for Magnetic Resonance Research at the Uni- versity of Minnesota. Similar to previous ­studies21,22, DBS leads were implanted along an oblique mapping track that had the largest span of sensorimotor-responsive STN cell activity. The depth of the implant was designed to have electrodes within the sensorimotor STN and the region dorsal to the STN, containing the lenticular ­fasciculus23 (Fig. 1). DBS implant procedures. Subjects Ne and Az were implanted with a 6-channel directional DBS lead (Abbott Neuromodulation, 0.6 mm diameter), consisting of 2 rows and 3 columns of electrodes (0.75 mm height, 0.5 mm spacing between rows) with the top row clocked 60 degrees from the bottom row. Subject So was implanted with a 12-channel directional DBS lead (Heraeus Medical Components, 0.8 mm diameter), consist- ing of 4 rows and 3 columns of electrodes (0.5 mm height, 0.5 mm spacing) with no rotational offset. Subject Bl was implanted with a non-directional DBS lead (NuMed, 0.625 mm diameter) with 8 electrodes (one band electrode per row, 0.5 mm height, and 0.5 mm spacing). DBS lead wires were routed to another chamber to interface with an external neurostimulator (IZ2MH) and recording (PZ5) system (Tucker-Davis Technologies). A CT scan was taken post-implant and co-registered to the pre-operative MRI to estimate placement of the DBS lead implant with respect to the STN (Fig. 1), and this was confirmed with post-mortem block-face histological imaging. Methods li i l Split-band electrode orientation for Subjects Ne, Az, and So was determined using a post-mortem bub- ble test whereby the explanted lead, still integrated with the chamber and cap, was submerged in 0.9% saline and stimulated through with 1–5 mA DC current over 1–5 s to generate an electrolysis reaction and small bubble at the stimulated electrode. Range in current and time needed for electrolysis reaction depended on the lead. This was used to verify electrode connector maps, check for electrical shorts, and identify each electrode’s orientation relative to the the STN. ECAP stimulation protocol. In each subject, monopolar stimulus pulse trains (125  Hz) were delivered through a single electrode contact using biphasic pulse waveforms that alternated between cathodic or anodic first phase polarities. The first phase had a duration of 100 µs, and the second active recharge phase had a duration of 1 ms with a stimulus amplitude at 10% of the first phase’s amplitude. Using these waveforms and pulse trains, the overall stimulus amplitude was increased until sustained side effects were observed on the contralateral side (e.g., muscle contractions, dyskinesias, etc.). Subsequent stimulation trials were then capped at 25 µA below the side effect threshold as determined for each electrode on the DBS lead. During all stimulation trials, the subject was seated and alert while wide-band, monopolar ECAP recordings were collected from the other electrodes at a sampling rate of 48.8 kHz and in reference to cranial bone screws distributed over the parietal lobe. 0.6 mm a 0.75 mm 2 3 1 1 2 A B C A B C A C B b Az Bl Ne So c 10 mm 2 mm STN D L 2 3 A B C A C B 2 A B C 0.8 mm Figure 1. DBS lead localization within the STN. (a) Directional and non-directional DBS leads used in this study. (b, c) High-field 7 T or 10.5 T MRI and CT co-registration were used to approximate the position of each lead within the subthalamic nucleus. The exact electrode position (all leads) and orientation (for the directional leads) was identified through post-mortem block-face histology and a post-mortem bubble test. These positions are shown in the figure. So a Bl Figure 1. DBS lead localization within the STN. (a) Directional and non-directional DBS leads used in this study. Classification of electrically‑evoked potentials in the parkinsonian subthalamic nucleus region OPEN ECAP features have also been integrated as feedback signals to adjust therapies dynamically, includ- ing cochlear implants to streamline behavioral fitting ­procedures18 and spinal cord stimulation to account for changes in the distance between the stimulating electrode(s) and the spinal cord during activities of daily ­living9. Similarly, for DBS applications, knowing the spatial position and orientation of each electrode in the context of the targeted nucleus or fiber pathways can be helpful for fine-tuning stimulation ­settings19. Previous studies have shown that ECAP feature presence and prominence in the subthalamic nucleus (STN) is associated with Such ECAP features have shown utility for assessing the degree of membrane polarization and thus target engagement with stimulation of the peripheral ­nerves7, spinal ­cord8–10, ­cochlea11–14, ­retina15,16, and deep brain ­regions2,17. ECAP features have also been integrated as feedback signals to adjust therapies dynamically, includ- ing cochlear implants to streamline behavioral fitting ­procedures18 and spinal cord stimulation to account for changes in the distance between the stimulating electrode(s) and the spinal cord during activities of daily ­living9. Si il l f DBS li i k i h i l i i d i i f h l d i h g g p g y g Similarly, for DBS applications, knowing the spatial position and orientation of each electrode in the context of the targeted nucleus or fiber pathways can be helpful for fine-tuning stimulation ­settings19. Previous studies have shown that ECAP feature presence and prominence in the subthalamic nucleus (STN) is associated with therapeutic effectiveness in Parkinson’s ­disease17,20. However, the degree of spatial heterogeneity of ECAPs within and adjacent to the STN remains unclear. In this study, we investigated the spatiotemporal features of ECAPs in and around the STN in four non-human primates rendered parkinsonian with MPTP treatments and aligned those features to neuroanatomical borders around each DBS lead implant. 1Department of Biomedical Engineering, University of Minnesota, Minneapolis, MN, USA. 2Department of Neuroscience, University of Minnesota, Minneapolis, MN, USA. 3Department of Neurology, University of Minnesota, Minneapolis, MN, USA. 4Institute for Translational Neuroscience, Department of Biomedical Engineering, University of Minnesota, 6‑134 Nils Hasselmo Hall, 312 Church Street SE, Minneapolis, MN 55455, USA. *email: john5101@umn.edu | https://doi.org/10.1038/s41598-023-29439-6 | https://doi.org/10.1038/s41598-023-29439-6 Scientific Reports | (2023) 13:2685 www.nature.com/scientificreports/ www.nature.com/scientificreports/ Current sweep experiments. To confirm the existence of ECAPs as neural responses as opposed to electrical artifacts, the current amplitude of the stimulus pulse train was varied randomly between no stimulation and 25 µA below the side effect threshold for each electrode. Current sweep data collection trials consisted of 5 s of stimulation followed by 5 s of no stimulation at each amplitude, with repeated measures of 5 trials per electrode. All current sweep data were collected in a parkinsonian condition. Strength‑duration sweep experiments. To further confirm that the signals were of neural origin, strength-duration relationships were assessed through ECAP recordings by systematically varying the current amplitude and pulse width of the charge-balanced, biphasic waveform. The protocol consisted of stimulating at (1) seven current ampli- tudes (12.5%, 25%, 37.5%, 50%, 62.5%, 75% and 87.5% of side-effect threshold) in the parkinsonian condition, and (2) five pulse widths per stimulus amplitude ranging from 40 to 160 µs for the first phase. Each trial consisted of 30 s of stimulation followed by 30 s without stimulation for each parameter combination. The presentation order of the parameters was randomized but kept consistent across electrodes and subjects (Az and So). Classification experiments. Stimulation settings for classifying electrode location were based on experiments running biphasic pulse waveforms at 125 Hz consisting of alternating presentations of a short phase (100 µs) of one polarity followed by a long recharge phase (1 ms) of the opposite polarity. In each subject, the electrode with the lowest side-effect threshold determined the peak stimulation amplitude (87.5% of that electrode’s side effect threshold) applied across all electrodes. This ensured that the within-subject classification would not be biased by varying stimulation amplitudes across electrodes. MPTP treatment and evaluation. Each primate was given a series of systemic injections of the neu- rotoxin MPTP (1-methyl-4-phenyl-1,2,3,6-tetrahydropyridine). Following MPTP treatment, the parkinsonian motor sign severity was rated for each subject using a modified version of the Unified Parkinson’s Disease Rating Scale (mUPDRS), which consisted of 14 motor scores, quantified from 0 (no effect) to 3 (severe)24. The total motor score for each subject was used to determine the overall severity of parkinsonian motor signs, and these scores were measured at least five times. Averaged scores were 18.25/42 for Subject Ne (moderate), 8.47/42 for Subject Az (mild), 0/42 for Subject So (asymptomatic), and 10.4/27 for Subject Bl (moderate). ECAP processing. www.nature.com/scientificreports/ Data collected during current sweep and strength-duration sweep experiments were processed to remove the stimulation artifacts and residual noise (Fig. 2). First, baseline subtraction was applied to each interstimulus ECAP segment (8 ms long) by subtracting the amplitude of the first data point (0.4 ms before the stimulus pulse) from all subsequent data points in the ECAP segment. Next, segments were sorted based on cathodic-anodic or anodic–cathodic stimulus waveforms to ensure that the sample sizes for both stim- ulus waveforms were identical. For the current sweep experiments, all 5 s of ECAP recordings were averaged together, and for the strength-duration sweep experiments, the last 20 s of the 30 s long ECAP recordings were averaged ­together2. Averaging significantly reduced the electrical artifact as shown in Fig. 2. The resulting data were then smoothed (4-sample moving average over the first 1.17 ms and 16 sample moving average over the remaining portion of the segment). This two-part filtering approach avoided over-smoothing the primary fea- tures while still removing high frequency noise from the secondary features of the ECAP. g g q y y Some ECAP recordings, most notably in Subjects Az and So, contained a 0.8–1.0 kHz noise source that was consistent in amplitude over the entire peri-stimulus time window. The peri-stimulus data (from 1.25 to 7.4 ms) was passed through an IIR filter with 0.99 steepness, with the delayed filter onset designed to avoid generating artifacts in the primary features (Fig. S1). The processed data before and after 1.25 ms were then stitched together with a weighted averaging of 9 samples about the stitch to avoid discontinuities in the data (sample 1 was 90% unfiltered sample value plus 10% filtered sample value, and sample 9 was 10% unfiltered sample value plus 90% filtered sample value).ih i Data with this 0.8–1.0 kHz noise source were marked for filtering objectively as follows. The maximum spec- tral power in two bands (< 500 Hz and 700–1500 Hz) in each recording were calculated and used to define two conditions: (A) the maximum spectral power of the unfiltered < 500 Hz band was sufficiently greater (determined by a manually set threshold for each subject) than the maximum spectral power for the unfiltered 700–1500 Hz band, and (B) the maximum spectral power of the unfiltered < 500 Hz band was less than the maximum spectral power of the filtered < 500 Hz band. Methods li i l (b, c) High-field 7 T or 10.5 T MRI and CT co-registration were used to approximate the position of each lead within the subthalamic nucleus. The exact electrode position (all leads) and orientation (for the directional leads) was identified through post-mortem block-face histology and a post-mortem bubble test. These positions are shown in the figure. https://doi.org/10.1038/s41598-023-29439-6 Scientific Reports | (2023) 13:2685 | www.nature.com/scientificreports/ www.nature.com/scientificreports/ (a) An alternating sequence of cathodic leading and anodic-leading waveforms was applied through one electrode while ECAP recordings were collected through all adjacent electrodes. (b) Raw ECAP data were grouped, averaged, filtered, and separated into primary, early secondary, and late secondary features. 10 ms 1. Raw 2. Grouped ECAP Signal Processing 2 ms 3. Avg/Filter 2 ms 20 µV 70 mV b b ECAP Signal Processing 4. Feature Visualization Secondary Features ry Figure 2. Signal processing of ECAPs within and adjacent to the STN. (a) An alternating sequence of cathodic- leading and anodic-leading waveforms was applied through one electrode while ECAP recordings were collected through all adjacent electrodes. (b) Raw ECAP data were grouped, averaged, filtered, and separated into primary, early secondary, and late secondary features. from those two groups as samples and training in a leave-one-out approach. Accuracy was calculated from the classification error, was averaged across trials, and compared against chance (50%) to determine effectiveness of the classifier. The classifier was also trained on all data from three subjects and tested using all data from a fourth subject. from those two groups as samples and training in a leave-one-out approach. Accuracy was calculated from the classification error, was averaged across trials, and compared against chance (50%) to determine effectiveness of the classifier. The classifier was also trained on all data from three subjects and tested using all data from a fourth subject. www.nature.com/scientificreports/ If condition A was false, or if both conditions were true, the recording was marked for filtering. Data analysis and classification. ECAP feature windows were determined based on time segments con- taining similar ECAP responses within and across subjects. Primary features were the first negative and positive peaks to occur, typically within 0.6–1.6 ms of stimulus pulse onset. Secondary features were divided into early (1.6–3.8 ms) and late (3.8–7.4 ms) windows after a stimulus pulse. The separation between early and late win- dows was based on previous data showing a clear transition (at approximately 3.8 ms) between stimulus evoked neuronal spike inhibition and a return to a baseline spiking probability for peri-stimulus time histograms of STN neurons during STN-DBS ­(see25). For each ECAP window, the root mean square (RMS) of the data was calculated and then used as feature amplitudes for graphical comparisons, and as features in a linear discrimi- nant analysis classifier. The rationale for feature windows as opposed to defining specific peaks and troughs was based on observations that ECAP features differed in manifestation and in their exact timing across recording configurations for each subject.i i g j A linear classifier (MATLAB) was used to predict stimulation and recording electrode site locations for two ossible groups—STN/STN and LF/LF (lenticular fasciculus)—in all subjects. The classifier used all data points https://doi.org/10.1038/s41598-023-29439-6 Scientific Reports | (2023) 13:2685 | www.nature.com/scientificreports/ DBS cathodic- anodic anodic- cathodic a ECAP Response a 0 1 2 3 4 5 6 7 -50 0 50 100 Response (µV) Peristimulus Time (ms) 10 ms cathodic- anodic 1. Raw 4. Feature Visualization 2. Grouped ECAP Signal Processing 2 ms Late Early Secondary Features Primary Artifact 3. Avg/Filter 2 ms 20 µV 70 mV b Figure 2. Signal processing of ECAPs within and adjacent to the STN. (a) An alternating sequence of cathodic- leading and anodic-leading waveforms was applied through one electrode while ECAP recordings were collected through all adjacent electrodes. (b) Raw ECAP data were grouped, averaged, filtered, and separated into primary, early secondary, and late secondary features. 0 1 2 3 4 5 6 7 -50 0 50 100 Response (µV) Peristimulus Time (ms) 10 ms 1. Raw 4. Feature Visualization 2. Grouped ECAP Signal Processing 2 ms Late Early Secondary Features Primary Artifact 3. Avg/Filter 2 ms 20 µV 70 mV b Figure 2. Signal processing of ECAPs within and adjacent to the STN. Results Results Distributions and variability of ECAP features. Within-subject comparison of ECAPs showed high variability of responses across all stimulation parameters (Fig. 3). Variance was highest during the period of known artifact, and second highest during the earlier portion of the primary feature window. The primary fea- ture window’s variance formed a second prominence, suggesting a different source than that of the artifact’s vari- ance. Variance declined rapidly during the primary feature window for most subjects, then steadily declined over https://doi.org/10.1038/s41598-023-29439-6 Scientific Reports | (2023) 13:2685 | www.nature.com/scientificreports/ ECAP Response (µV) Variance in ECAP (µV) -50 0 50 100 Subject So Time (ms) Subject Bl Time (ms) Subject Az Time (ms) 10 -3 10 -2 10 -1 10 0 10 1 10 2 10 3 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 Subject Ne Time (ms) A B 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 Figure 3. Distributions of all ECAP stimulation/recording experiments across subjects. (a) Pooled recordings across tested stimulation pulse widths (subjects Az and So only), amplitudes (all subjects), and electrode configurations (all subjects) for a single recording day. (b) Variance across pooled recordings across the ECAP window. Black lines indicate edges of selected feature windows (primary: 0.6–1.6 ms, early secondary 1.6– 3.8 ms, late secondary 3.8–7.4 ms). ECAP Response (µV) -50 0 50 100 Subject Az A Subject So Subject Ne A B Variance in ECAP (µV) Time (ms) 10 -3 10 -2 10 -1 10 0 10 1 10 2 10 3 0 1 2 3 4 5 6 7 B Time (ms) Time (ms) 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 Figure 3. Distributions of all ECAP stimulation/recording experiments across subjects. (a) Pooled recordings across tested stimulation pulse widths (subjects Az and So only), amplitudes (all subjects), and electrode configurations (all subjects) for a single recording day. (b) Variance across pooled recordings across the ECAP window. Black lines indicate edges of selected feature windows (primary: 0.6–1.6 ms, early secondary 1.6– 3.8 ms, late secondary 3.8–7.4 ms). the early and late secondary feature windows. Most subjects showed much lower variance during the secondary feature windows than during the primary feature window. ECAP responses to varying stimulation amplitudes and pulse widths. Results Current sweep and pulse width sweep experiments in each of the four subjects showed that features of the ECAP response changed non- linearly to adjustments in stimulation parameters while the stimulation artifact increased linearly with increas- ing stimulation amplitude (Fig. 4). Features emerged gradually as stimulation amplitude was increased, with secondary features appearing only at stimulation amplitudes that were higher than those sufficient to evoke pri- mary features. Primary and secondary features also generally increased in amplitude with increasing stimulation amplitude (Fig. 4). ECAP response features also followed classical strength duration curves across stimulation amplitudes and pulse widths (Fig. S2). Spatial heterogeneity of ECAP features. The spatial ECAP response differences were readily visible and distinguished by a simple linear classifier (Fig. 5). This classifier, trained on all subjects, was capable of cor- rectly determining the stimulation and recording sites as being either both in the STN or both in LF with 95.2% accuracy (measured using the leave-one-out method). Furthermore, when trained on all data from three sub- jects and tested using data solely from a fourth, the classifier was able to accurately determine the locations of the fourth subject’s electrodes with 75% (subject Az), 81.25% (subject So), 100% (subject Bl), and 93.3% (subject Ne) accuracy. This suggests that the DBS ECAP response in both directional and ring electrode configurations can be used to gain an understanding of implant location and is generalizable across subjects. The main determining feature across all subjects was the primary feature amplitude (Fig. 5), though there were also visible differences in secondary features in subjects Az and So. Discussionh This study investigated the spatiotemporal features of ECAPs collected within and around the STN region in four MPTP-treated non-human primates who were chronically implanted with STN-DBS leads. The use of directional DBS leads in this study enabled multi-channel recordings within and dorsal to the STN in the same subject with electrode contact position and orientation verified with post-mortem histology. ECAP features in the STN region were observed to (a) follow a sigmoidal intensity curve with respect to stimulation amplitude; (b) exhibit strength-duration curve relationships; and (c) vary systematically by stimulation/recording electrode configurations. Findings (a) and (b) provide continued support for the neurobiological basis of ECAPs in the STN region, while finding (c) indicates an opportunity to use subject-agnostic analysis methods of ECAP responses to determine electrode positions using pooled multi-subject classifiers.il p g p ji Traditionally, ECAP features have been viewed as having specific peak and trough ­features1,2,4,17,26 that reflect detection of neural sources of convergent activity. Discussionh ECAP responses to increasing stimulation amplitudes across all subject (a–d). (subpanel i) Lead diagrams for each subject with stimulation electrode shown in red and recording site shown in blue. Example ECAP response to (subpanel ii) the highest stimulation amplitude tested in the MPTP-treated state and (subpanel iii) varying stimulation current amplitudes. RMS values across stimulation amplitudes from epochs containing the (subpanel iv) stimulation artifact and primary features and (subpanel part v) secondary features. varied depending on stimulation amplitude and electrode configuration, lead geometry, and implant location. Using time ranges rather than specific points when calculating ECAP features allowed for more broadly applica- ble data analyses such as the use of summary statistics (RMS values), rather than peak-to-trough amplitudes or prominences. Additionally, previous ECAP studies have relied on macroscale electrodes and bipolar recording configurations with two electrodes guarding a center stimulating ­electrode2,17,26. In this study, single-electrode ECAP responses were used to show visually separable features between the STN and regions dorsal to the STN, most prominently observed in the primary features. These features enabled classifying electrode location (within the subthalamic nucleus or within the lenticular fasciculus) with high accuracy across subjects. g y j Previous research has suggested that the likely source of the primary features are direct axonal activation of passing white matter ­fibers1, which would be in much greater number and more aligned in the LF than in the STN. This may provide one possible explanation for why the primary feature amplitude was larger in the LF/ LF than the STN/STN configurations. Though the ECAP response data did not support a method to determine DBS lead orientation, additional subjects and recordings spanning a broader set of implant locations would be helpful to tease apart the neuroanatomical origins of differences in directional ECAP responses (Figs. 5, S3). Additionally, the classifier was not used to predict whether a stimulating electrode was in the STN while the recording electrode was in the LF or vice versa given that stimulating and recording electrode pairs in the same region proved to have a much higher accuracy level.hi The ability of a linear classifier to accurately predict where a stimulation and recording site pair are located could be useful for programming DBS systems, especially as DBS lead designs become more complex and clini- cal monopolar reviews take longer to complete. Discussionh -50 0 50 100 ECAP (µV) a 0 1 2 3 4 5 6 7 Time (ms) 200 150 100 50 0 DBS Amplitude (µA) -50 0 50 100 ECAP (µV) c Subject Ne ii iii i -50 0 50 100 ECAP (µV) 0 50 100 150 200 DBS Amplitude (µA) 0 10 20 30 RMS (µV) a 0 1 2 3 4 5 6 7 Time (ms) 200 150 100 50 0 DBS Amplitude (µA) -50 0 50 100 ECAP (µV) 0 40 80 120 RMS (µV) 0 0.1 0.2 0.3 0.4 Artifact Magnitude (V) c artifact primary early secondary late secondary Subject Ne ii iii iv v i 0 50 100 150 200 DBS Amplitude (µA) 0 10 20 30 RMS (µV) 0 40 80 120 RMS (µV) 0 0.1 0.2 0.3 0.4 Artifact Magnitude (V) artifact primary early secondary late secondary iv v b -50 0 50 100 ECAP (µV) 50 100 150 200 DBS Amplitude (µA) 0 20 40 60 RMS (µV) b 0 1 2 3 4 5 6 7 Time (ms) 240 200 170 100 35 DBS Amplitude (µA) -50 0 50 100 ECAP (µV) 0 100 200 300 RMS (µV) 0 0.1 0.2 0.3 Artifact Magnitude (V) Subject Az 140 70 -50 0 50 100 ECAP (µV) b 0 1 2 3 4 5 6 7 Time (ms) 240 200 170 100 35 DBS Amplitude (µA) -50 0 50 100 ECAP (µV) d Subject Az 140 70 b a 50 100 150 200 DBS Amplitude (µA) 0 20 40 60 RMS (µV) ECAP (µV) 0 100 200 300 RMS (µV) 0 0.1 0.2 0.3 Artifact Magnitude (V) 2 RMS (µV) d c Time (ms) -50 0 50 100 ECAP (µV) d 0 1 2 3 4 5 6 7 Time (ms) 200 150 100 50 0 DBS Amplitude (µA) -50 0 50 100 Subject Bl Time (ms) -50 0 50 100 ECAP (µV) c 0 1 2 3 4 5 6 7 Time (ms) 488 406 244 163 81 DBS Amplitude (µA) -50 0 50 100 Subject So 325 DBS Amplitude (µA) 100 200 300 400 DBS Amplitude (µA) 0 10 20 RMS (µV) 10 30 70 90 RMS (µV) 0 0.2 0.4 Artifact Magnitude (V) 50 500 p (µ ) ( ) -50 0 50 100 ECAP (µV) 100 200 300 400 DBS Amplitude (µA) 0 10 20 RMS (µV) c 0 1 2 3 4 5 6 7 Time (ms) 488 406 244 163 81 DBS Amplitude (µA) -50 0 50 100 ECAP (µV) 10 30 70 90 RMS (µV) 0 0.2 0.4 Artifact Magnitude (V) Subject So 50 500 325 -50 0 50 100 ECAP (µV) 0 50 100 150 200 DBS Amplitude (µA) 0 20 30 40 RMS (µV) d 0 1 2 3 4 5 6 7 Time (ms) 200 150 100 50 0 DBS Amplitude (µA) -50 0 50 100 ECAP (µV) 0 50 150 200 RMS (µV) 0 0.1 0.2 Artifact Magnitude (V) Subject Bl 100 10 0 50 100 150 200 DBS Amplitude (µA) 0 20 30 40 RMS (µV) ECAP (µV) 0 50 150 200 RMS (µV) 0 0.1 0.2 Artifact Magnitude (V) 100 10 Figure 4. Discussionh In this study, the timing, location, and number of these features Scientific Reports | (2023) 13:2685 | https://doi.org/10.1038/s41598-023-29439-6 www.nature.com/scientificreports/ -50 0 50 100 ECAP (µV) 0 50 100 150 200 DBS Amplitude (µA) 0 10 20 30 RMS (µV) a 0 1 2 3 4 5 6 7 Time (ms) 200 150 100 50 0 DBS Amplitude (µA) -50 0 50 100 ECAP (µV) 0 40 80 120 RMS (µV) 0 0.1 0.2 0.3 0.4 Artifact Magnitude (V) -50 0 50 100 ECAP (µV) 50 100 150 200 DBS Amplitude (µA) 0 20 40 60 RMS (µV) b 0 1 2 3 4 5 6 7 Time (ms) 240 200 170 100 35 DBS Amplitude (µA) -50 0 50 100 ECAP (µV) 0 100 200 300 RMS (µV) 0 0.1 0.2 0.3 Artifact Magnitude (V) -50 0 50 100 ECAP (µV) 100 200 300 400 DBS Amplitude (µA) 0 10 20 RMS (µV) c 0 1 2 3 4 5 6 7 Time (ms) 488 406 244 163 81 DBS Amplitude (µA) -50 0 50 100 ECAP (µV) 10 30 70 90 RMS (µV) 0 0.2 0.4 Artifact Magnitude (V) -50 0 50 100 ECAP (µV) 0 50 100 150 200 DBS Amplitude (µA) 0 20 30 40 RMS (µV) d 0 1 2 3 4 5 6 7 Time (ms) 200 150 100 50 0 DBS Amplitude (µA) -50 0 50 100 ECAP (µV) 0 50 150 200 RMS (µV) 0 0.1 0.2 Artifact Magnitude (V) artifact primary early secondary late secondary Subject Az Subject Ne Subject Bl Subject So 100 10 50 500 325 140 70 ii iii iv v i Figure 4. ECAP responses to increasing stimulation amplitudes across all subject (a–d). (subpanel i) Lead diagrams for each subject with stimulation electrode shown in red and recording site shown in blue. Example ECAP response to (subpanel ii) the highest stimulation amplitude tested in the MPTP-treated state and (subpanel iii) varying stimulation current amplitudes. RMS values across stimulation amplitudes from epochs containing the (subpanel iv) stimulation artifact and primary features and (subpanel part v) secondary features. Discussionh 0 1 2 3 4 5 6 7 Time (ms) -0.5 0 0.5 1 Subject Az a STN/STN LF/LF ECAP (mV) b Early Feature (µV) Late Feature (µV) Primary Feature (µV) Late Early Primary 0 10 20 30 40 50 60 200 100 600 500 400 0 300 200 100 10 20 30 40 50 60 100 50 1000 600 0200 b Early Feature (µV Late Feature (µV) Primary Feature (µV) 10 20 30 40 50 60 100 50 1000 600 0200 c Early Feature (norm.) Late Feature (norm.) Primary Feature (norm.) 0 0.2 1 0.4 0.6 0.8 1 0.5 1 0.8 0.6 0.4 0 0.2 0 All Subjects b a c 0 1 2 3 4 5 6 7 Time (ms) -0.5 0 0.5 1 ECAP (mV) Subject So Primary Feature (norm.) 0.8 0.6 0.4 0.2 0 0 0 0.1 0.1 0.1 0.2 0.2 0.2 0.3 0.3 0.3 0.4 0.4 0.4 0.5 0.5 0.5 0.6 0.6 0.6 0.7 0.7 0.7 0.8 0.8 0.8 0.9 0.9 0.9 1 1 1 Early Primary Late d Time (ms) Primary 300 Late Early Primary 5 10 15 20 100 700 500 0 300 100 Subject Bl 0 1 2 3 4 5 6 7 Time (ms) -0.5 0 0.5 1 ECAP (mV) Time (ms) Early Figure 5. Classification of ECAP responses within and dorsal to the STN. (a) Example ECAP responses for stimulation/recording configurations with STN/STN or LF/LF from subjects Az, So, and Bl. Subject Ne was not included in this figure as all directional DBS electrodes were within the STN. Stimulation amplitudes in each case are similar but not identical within each subject. ECAP responses are shown at a scale for visualizing primary features (dark grey). Early (middle gray) and late (light gray) secondary features were considerably smaller and played a smaller role in differentiating brain regions. (b) Plots of the three RMS features for each subject used by the classifier showing separability of spatial categories (STN/STN, LF/LF) in the feature space. (c, d) RMS values (normalized within subjects) that are plotted together to show separability of spatial categories in feature space. for thalamic ECAP recordings suggested that the anodic-leading and cathodic-leading ECAP responses and therapeutic effect on tremor were largely ­similar26. Other studies using cochlear ­stimulation32 have indicated differences in ECAP responses between anodic-leading and cathodic-leading pulses. Discussionh Studies have shown that stimulation targeting specific regions about the STN can be helpful in the programming process. For example, the dorsal region above STN can be beneficial for the cardinal motor signs of PD including rigidity and ­bradykinesia27, but also helpful for sup- pressing stimulation-induced ­dyskinesias19. At the same time, stimulation of the lenticular fasciculus has been associated with worsening of gait ­parameters28 and worsening of freezing of ­gait29.hf g g p g g g This approach complements other techniques for identifying DBS lead position and offers some strong advan- tages. One common approach is to merge high-field pre-operative MR imaging, that can visualize boundaries of the ­STN30, with post-operative CT imaging showing the position of the lead within the context of the cranium and ventricles. Most DBS centers, however, do not have access to high-field MRI, and even with such imaging facilities the definitive location and orientation of the DBS lead implant can only be confirmed, as shown in this study, with post-mortem histology. Previous studies have also shown that resting-state local field potentials filtered in the beta-band (12–30 Hz) can be useful for intra-operative targeting of DBS lead implants in the dorsolateral ‘motor’ STN, but again the exact location of the spectral feature can vary by several millimeters, especially considering the necessity to use bipolar electrode ­montages31. In this way, the ECAP approach may be a valuable complement for clinicians to use with current methods.h p The use of alternating polarity stimulation as a means of canceling stimulation artifact meant the stimula- tion parameters differed slightly from what is used clinically. Discussionh As such, the ECAP signals recorded may reflect an amalgam of different sources evoked between waveform polarities. The study also used monopolar electrode configurations for stimulation and recording to maintain a higher spatial resolution for the ECAP responses. Bipolar stimulation montages are also known to create orientation-selective activation ­patterns33 on pathways in and around the STN, and bipolar recording montages can reject local signals that are common to both ­electrodes34. Some, but not all, recordings also contained high-frequency noise in the 0.7–1.5 kHz range, which necessitated offline filtering. While the approach removed most of the high-frequency noise, some recordings still had a small residual noise level remaining. By employing analysis techniques such as calculation of RMS values as our feature amplitude metric, we reduced the effect that any residual noise had on the analysis, since the noise was of a high enough frequency to have multiple periods within a given feature window and features were either positive enough or negative enough that the noise did not cause the signal to cross 0 (thus the RMS of the noise approached a net 0 change on the signal). Discussionh In some studies, using artifact removal hardware Scientific Reports | (2023) 13:2685 | https://doi.org/10.1038/s41598-023-29439-6 www.nature.com/scientificreports/ 0 1 2 3 4 5 6 7 Time (ms) -0.5 0 0.5 1 0 1 2 3 4 5 6 7 Time (ms) -0.5 0 0.5 1 ECAP (mV) Subject Bl Subject Az Subject So a b STN/STN LF/LF Early Feature (µV) Late Feature (µV) Primary Feature (µV) Late Early Primary 0 1 2 3 4 5 6 7 Time (ms) -0.5 0 0.5 1 Late Early Primary 0 0 0 0.1 0.1 0.1 0.2 0.2 0.2 0.3 0.3 0.3 0.4 0.4 0.4 0.5 0.5 0.5 0.6 0.6 0.6 0.7 0.7 0.7 0.8 0.8 0.8 0.9 0.9 0.9 1 1 1 Early Primary Late c d Early Feature (norm.) Late Feature (norm.) Primary Feature (norm.) 0 0.2 1 0.4 0.6 0.8 1 0.5 1 0.8 0.6 0.4 0 0.2 0 5 10 15 20 100 700 500 0 300 100 0 10 20 30 40 50 60 200 100 600 500 400 0 300 200 100 10 20 30 40 50 60 100 50 1000 600 0200 All Subjects ECAP (mV) ECAP (mV) Figure 5. Classification of ECAP responses within and dorsal to the STN. (a) Example ECAP responses for stimulation/recording configurations with STN/STN or LF/LF from subjects Az, So, and Bl. Subject Ne was not included in this figure as all directional DBS electrodes were within the STN. Stimulation amplitudes in each case are similar but not identical within each subject. ECAP responses are shown at a scale for visualizing primary features (dark grey). Early (middle gray) and late (light gray) secondary features were considerably smaller and played a smaller role in differentiating brain regions. (b) Plots of the three RMS features for each subject used by the classifier showing separability of spatial categories (STN/STN, LF/LF) in the feature space. (c, d) RMS values (normalized within subjects) that are plotted together to show separability of spatial categories in feature space. Conclusionh This study found several principles that govern ECAP responses to DBS targeted within and around the STN. Increased stimulation amplitude or pulse width primarily affected the amplitude of ECAP features so long as the stimulation parameter exceeded a threshold to produce a detectable response feature. In contrast, variation in stimulation and recording site configurations had a large effect on when and what features were present in the ECAP response. Importantly, primary feature amplitude provided a means to accurately distinguish electrode contacts within or dorsal to the STN, which will be useful for guiding the programming of STN-DBS systems in the future. https://doi.org/10.1038/s41598-023-29439-6 Scientific Reports | (2023) 13:2685 | www.nature.com/scientificreports/ References References 1. Kent, A. R. & Grill, W. M. Neural origin of evoked potentials during thalamic deep brain stimulation. J. Neurophysiol. 110, 826–843. https://​doi.​org/​10.​1152/​jn.​00074.​2013 (2013). p g j ( ) 2. Schmidt, S. L., Brocker, D. T., Swan, B. D., Turner, D. A. & Grill, W. M. Evoked potentials reveal neural circuits engaged by human deep brain stimulation. Brain Stimul. 13, 1706–1718. https://​doi.​org/​10.​1016/j.​brs.​2020.​09.​028 (2020).hi 3. Buzsáki, G., Anastassiou, C. A. & Koch, C. The origin of extracellular fields and currents: EEG, ECoG, LFP and spikes. Nat. Rev. Neurosci. 13, 407–420. https://​doi.​org/​10.​1038/​nrn32​41 (2012). , p g ( ) 4. Kent, A. R. & Grill, W. M. Recording evoked potentials during deep brain stimulation: Development and validation of instrumenta- tion to suppress the stimulus artefact. J. Neural Eng. 9, 036004. https://​doi.​org/​10.​1088/​1741-​2560/9/​3/​036004 (2012). 4. Kent, A. R. & Grill, W. M. Recording evoked potentials during deep brain stimulation: Development tion to suppress the stimulus artefact. J. Neural Eng. 9, 036004. https://​doi.​org/​10.​1088/​1741-​2560 tion to suppress the stimulus artefact. J. Neural Eng. 9, 036004. htt 5. Cohen, L. T., Richardson, L. M., Saunders, E. & Cowan, R. S. C. Spatial spread of neural excitation in cochlear implant recipients: Comparison of improved ECAP method and psychophysical forward masking. Hear. Res. 179, 72–87. https://​doi.​org/​10.​1016/​ S0378-​5955(03)​00096-0 (2003). ( ) ( ) 6. Tang, Q., Benítez, R. & Zeng, F.-G. Spatial channel interactions in cochlear implants. J. Neural Eng. 8, 046029. https://​doi.​org/​10 1088/​1741-​2560/8/​4/​046029 (2011). 7. Parker, J. L., Shariati, N. H. & Karantonis, D. M. Electrically evoked compound action potential recording in peripheral nerves Bioelectron. Med. 1, 71–83. https://​doi.​org/​10.​2217/​bem-​2017-​0005 (2018). p g 8. Parker, J. L. et al. Evoked compound action potentials reveal spinal cord dorsal column neuroanatomy. Neuromodul. Technol. Neural Interface 23, 82–95. https://​doi.​org/​10.​1111/​ner.​12968 (2020). eural Interface 23, 82–95. https://​doi.​org/​10.​1111/​ner.​12968 (2020) f p g 9. Russo, M. et al. Sustained long-term outcomes with closed-loop spinal cord stimulation: 12-month results of the prosp multicenter open-label avalon study. Neurosurgery 87, E485–E495. https://​doi.​org/​10.​1093/​neuros/​nyaa0​03 (2020). 10. Parker, J. L. et al. Electrically evoked compound action potentials recorded from Neural Interface 16, 295–303. https://​doi.​org/​10.​1111/​ner.​12053 (2013). 10. Parker, J. L. et al. Electrically evoked compound action potentials recorded from the sheep spinal cord. Neuromodul. Technol. Neural Interface 16, 295–303. https://​doi.​org/​10.​1111/​ner.​12053 (2013). 11. Jeon, E. K. et al. Comparison of electrically evoked compound action potential thresholds and loudness estimates for the stimuli used to program the advanced bionics cochlear implant. J. Am. Acad. Audiol. Received: 15 August 2022; Accepted: 6 February 2023 Received: 15 August 2022; Accepted: 6 February 2023 References Real-time suppression and amplification of frequency-specific neural activity using stimulation evoked oscil lations. Brain Stimul. 13, 1732–1742. https://​doi.​org/​10.​1016/j.​brs.​2020.​09.​017 (2020).i 20. Sanabria, D. E. et al. Real-time suppression and amplification of frequency-specific neural activity u lations. Brain Stimul. 13, 1732–1742. https://​doi.​org/​10.​1016/j.​brs.​2020.​09.​017 (2020).i 20. Sanabria, D. E. et al. Real time suppression and amplification of frequency specific neural activity using stimulation evoked lations. Brain Stimul. 13, 1732–1742. https://​doi.​org/​10.​1016/j.​brs.​2020.​09.​017 (2020).i p g j 1. Brinda, A. K. et al. Longitudinal analysis of local field potentials recorded from directional deep brain stimulation lead implants in the subthalamic nucleus. J. Neural Eng. 18, 046050. https://​doi.​org/​10.​1088/​1741-​2552/​abfc1c (2021). p g j 21. Brinda, A. K. et al. Longitudinal analysis of local field potentials recorded from directio in the subthalamic nucleus. J. Neural Eng. 18, 046050. https://​doi.​org/​10.​1088/​1741-​255 g p g 22. Vitek, J. L. & Johnson, L. A. Understanding Parkinson’s disease and deep brain stimulation: Role of monkey models. Proc. Natl. Acad. Sci. 116, 26259–26265. https://​doi.​org/​10.​1073/​pnas.​19023​00116 (2019). p g p 3. Miocinovic, S. et al. Computational analysis of subthalamic nucleus and lenticular fasciculus activation during therapeutic deep brain stimulation. J. Neurophysiol. 96, 1569–1580. https://​doi.​org/​10.​1152/​jn.​00305.​2006 (2006). J p y , p g j ( ) 4. Imbert, C., Bezard, E., Guitraud, S., Boraud, T. & Gross, C. E. Comparison of eight clinical rating scales used for the assessment of MPTP-induced parkinsonism in the Macaque monkey. J. Neurosci. Methods 96, 71–76 (2000).i 24. Imbert, C., Bezard, E., Guitraud, S., Boraud, T. & Gross, C. E. Comparison of eight clinical rating of MPTP-induced parkinsonism in the Macaque monkey. J. Neurosci. Methods 96, 71–76 (2000).i 5. Meissner, W. et al. Subthalamic high frequency stimulation resets subthalamic firing and reduces abnormal oscillations. Brain 128 2372–2382. https://​doi.​org/​10.​1093/​brain/​awh616 (2005). g 6. Kent, A. R. et al. Measurement of evoked potentials during thalamic deep brain stimulation. Brain Stimul. 8, 42–56. https://​doi org/​10.​1016/j.​brs.​2014.​09.​017 (2015).i g j ( ) 7. Butson, C. R., Cooper, S. E., Henderson, J. M. & McIntyre, C. C. Patient-specific analysis of the volume of tissue activated during deep brain stimulation. Neuroimage 34, 661–670. https://​doi.​org/​10.​1016/j.​neuro​image.​2006.​09.​034 (2007).tf 28. Goftari, M. et al. Parkinsonian gait effects with DBS are associated with pallido-peduncular axis activation. BioRxiv https://​doi.​ org/​10.​1101/​2021.​10.​13.​464270 (2021). 29. Strelow, J. N. et al. Structural connectivity of subthalamic nucleus stimulation for improving freezing of gait. MedRxiv https://​doi.​ org/​10.​1101/​2021.​07.​01.​21259​612 (2021). g 0. He, C., Zhang, F., Li, L., Jiang, C. & Li, L. References 21, 016–027. https://​doi.​org/​10.​3766/​jaaa.​21.1.3 (2010). ( ) 12. Miller, C. A., Brown, C. J., Abbas, P. J. & Chi, S.-L. The clinical application of potentials evoked from the peripheral auditory system. Hear. Res. 242, 184–197. https://​doi.​org/​10.​1016/j.​heares.​2008.​04.​005 (2008). 3. Adenis, V. et al. ECAP growth function to increasing pulse amplitude or pulse duration demonstrates large inter-animal variability that is reflected in auditory cortex of the guinea pig. PLoS ONE 13, e0201771. https://​doi.​org/​10.​1371/​journ​al.​pone.​02017​71 (2018) that is reflected in auditory cortex of the guinea pig. PLoS ONE 13, e0201771. https://​doi.​org/​10.​1371/​journ​al.​pone.​02017​71 (2 14. Gärtner, L., Lenarz, T. & Büchner, A. Fine-grain recordings of the electrically evoked compound action potential amplitude gr l y g p g p g j p 14. Gärtner, L., Lenarz, T. & Büchner, A. Fine-grain recordings of the electrically evoked compound action potential amplitude growth function in cochlear implant recipients Biomed Eng Online 17 140 https://doi org/10 1186/s12938 018 0588 z (2018) l 4. Gärtner, L., Lenarz, T. & Büchner, A. Fine-grain recordings of the electrically evoked compound action potential amplitude growth function in cochlear implant recipients. Biomed. Eng. Online 17, 140. https://​doi.​org/​10.​1186/​s12938-​018-​0588-z (2018). , , , , g g y p p p g function in cochlear implant recipients. Biomed. Eng. Online 17, 140. https://​doi.​org/​10.​1186/​s12938-​018-​0588-z (2018). g g 5. Finn, W. E. & LoPresti, P. G. Wavelength and intensity dependence of retinal evoked responses using in vivo optic nerve recording IEEE Trans. Neural Syst. Rehabil. Eng. 11, 372–376. https://​doi.​org/​10.​1109/​TNSRE.​2003.​819928 (2003). 6. Maynard, K. I., Yanez, P. & Ogilvy, C. S. Nitric oxide modulates light-evoked compound action potentials in the intact rabbit retina NeuroReport 6(6), 850–852 (1995). p 7. Gmel, G. E. et al. A new biomarker for subthalamic deep brain stimulation for patients with advanced Parkinson’s disease: A pilot study. J. Neural Eng. 12, 066013. https://​doi.​org/​10.​1088/​1741-​2560/​12/6/​066013 (2015). y g g 8. Somers, B., Long, C. J. & Francart, T. EEG-based diagnostics of the auditory system using cochlear implant electrodes as sensors Sci. Rep. 11, 5383. https://​doi.​org/​10.​1038/​s41598-​021-​84829-y (2021).t 18. Somers, B., Long, C. J. & Francart, T. EEG-based diagnostics of the auditory Sci. Rep. 11, 5383. https://​doi.​org/​10.​1038/​s41598-​021-​84829-y (2021).t p p g y ( ) 9. Goftari, M. et al. Pallidothalamic tract activation predicts suppression of stimulation-induced dyskinesias in a case study of Par kinson’s disease. Brain Stimul. 13, 1821–1823. https://doi.org/10.1016/j.brs.2020.09.022 (2020). p g j 0. Sanabria, D. E. et al. Data availability Th d d d y The datasets used and analyzed during the current study are available from the corresponding author on reason- able request. Acknowledgements ld l k h k h c o edge e ts We would like to thank the Neuromodulation Research and Technology Lab for helpful comments in preparation of this manuscript, and the RAR and veterinary staff at the University of Minnesota. Author contributions J.R.: Conceptualization, Methodology, Software, Validation, Formal analysis, Investigation, Data Curation, Writ- ing—original draft, Writing—review & editing, Visualization. A.D.: Investigation, Writing—review & editing, Visualization. A.B.: Investigation, Writing—review & editing, Visualization. M.B.: Investigation, Writing—review & editing. E.L.: Investigation, Writing—review & editing. C.S.: Investigation, Writing—review & editing. J.D.: Investigation, Writing—review & editing. J.K.: Investigation, Writing—review & editing. K.W.: Investigation, Writing—review & editing. D.S.: Investigation, Writing—review & editing. S.B.: Investigation, Writing—review & editing. B.M.: Investigation, Writing—review & editing. J.W.: Investigation, Writing—review & editing. L.A.J.: Conceptualization, Investigation, Resources, Writing—review & editing, Supervision, Project administration. J.L.V.: Conceptualization, Resources, Writing—review & editing, Supervision, Project administration, Funding acquisition. M.D.J.: Conceptualization, Methodology, Validation, Formal analysis, Writing—original draft, Writ- ing—review & editing, Visualization, Supervision, Project administration, Funding acquisition. Funding Thi t d Funding This study was supported by the NIH-NINDS under Grants R01-NS094206, P50-NS098573, P50-NS123109, R01-NS037019, R37-NS077657, R01-NS058945, F31-NS108625 (to AD) and GRFP award (to AB). References Measurement of lead localization accuracy based on magnetic resonance imaging. Front Neurosci. 15, 63288 (2021). 1. Darcy, N. et al. Spectral and spatial distribution of subthalamic beta peak activity in Parkinson’s disease patients. Exp. Neurol. 2022 114150. https://​doi.​org/​10.​1016/j.​expne​urol.​2022.​114150 (2022).h p g j p 32. He, S., Teagle, H. F. B. & Buchman, C. A. The electrically evoked compound action potential: From laboratory to clinic. Front. Neurosci. 11, 1–10 (2017). 3. Slopsema, J. P. et al. Clinical deep brain stimulation strategies for orientation-selective pathway activation. J. Neural Eng. 15, 056029 https://​doi.​org/​10.​1088/​1741-​2552/​aad978 (2018).i p g 34. Zhang, S., Connolly, A. T., Madden, L. R., Vitek, J. L. & Johnson, M. D. High-resolution local field potentials measured with deep brain stimulation arrays. J. Neural Eng. 15, 046019. https://​doi.​org/​10.​1088/​1741-​2552/​aabdf5 (2018). https://doi.org/10.1038/s41598-023-29439-6 Scientific Reports | (2023) 13:2685 | www.nature.com/scientificreports/ © The Author(s) 2023 Competing interests h g The authors declare no competing interests. Additional informationh Additional information Supplementary Information The online version contains supplementary material available at https://​doi.​org/​ 10.​1038/​s41598-​023-​29439-6. Additional information Supplementary Information The online version contains supplementary material available at https://​doi.​org/​ 10.​1038/​s41598-​023-​29439-6. Correspondence and requests for materials should be addressed to M.D.J. Correspondence and requests for materials should be addressed to M.D.J. Reprints and permissions information is available at www.nature.com/reprints. Reprints and permissions information is available at www.nature.com/reprints. Publisher’s note  Springer Nature remains neutral with regard to jurisdictional claims in published maps and nstitutional affiliations. Publisher’s note  Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Open Access  This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://​creat​iveco​mmons.​org/​licen​ses/​by/4.​0/. Open Access  This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://​creat​iveco​mmons.​org/​licen​ses/​by/4.​0/. © The Author(s) 2023 https://doi.org/10.1038/s41598-023-29439-6 Scientific Reports | (2023) 13:2685 |
https://openalex.org/W1486260669
https://revistas.pucp.edu.pe/index.php/agendainternacional/article/download/3667/3646, https://revistas.pucp.edu.pe/index.php/agendainternacional/article/download/3667/3646/
es
Activismo judicial en la evolución del Derecho Internacional: hacia la configuración de un incipiente orden público internacional
Agenda internacional
2,010
cc-by
13,672
Agenda Internacional Año XVII, N° 28, 2010, pp. 75-102 ISSN 1027-6750 Activismo judicial en la evolución del Derecho Internacional: hacia la configuración de un incipiente orden público internacional Francisco Jiménez García 1. La dimensión jurídica de la actual comunidad internacional y el activismo judicial como test de su efectividad y coherencia La expresión «activismo judicial» en Derecho internacional no presenta necesariamente las connotaciones ni las dimensiones suscitadas en el ámbito nacional en cuanto poder de los jueces frente al poder legislativo,1 sino que con ella se pretende hacer referencia al papel que desempeña los jueces y tribunales en la aplicación efectiva de los principios estructurales o constitucionales consagrados en el ordenamiento normativo internacional, aun cuando tal aplicación no esté exenta de controversia y tensión. No se trata tanto de una dialéctica entre poderes, pues como es sabido en Derecho internacional no se puede hablar estrictamente de un poder legislativo y de un poder judicial en cuanto órganos superiores a los destinatarios de este ordenamiento. Es preferible hablar de un proceso de creación normativa que no concluye con la adopción o cristalización de la norma en cuestión, sino con el test del análisis de sus consecuencias. En este sentido, con la expresión activismo judicial se pretende analizar hasta qué punto el juez internacional deduce consecuencias jurídicas de los principios y normas declaradas en el ordenamiento como estructurales y de ahí inferir su coherencia.2 Se trata de la complementariedad necesaria o la interrelación 1 Sobre esta cuestión véase ZAPATERO, V. El arte de legislar. Cizur Menor: Thomson/Aranzadi, 2009, pp. 349-372. 2 Como se destaca en el Curso de Derecho Internacional Público de los profesores Julio D. GONZÁLEZ CAMPOS, Luis L. SÁNCHEZ RODRÍGUEZ y Andrés SÁENZ DE SANTA MARÍA (Madrid: Thomson/ Civitas, 2008, pp. 105-107), «en cuanto ordenamiento jurídico, el derecho internacional público constituye un conjunto organizado de principios y normas. Aquellos expresan ciertos valores jurídicos fundamentales 76 Francisco Jiménez García dialéctica entre la norma y el juez en la resolución del dilema de la coherencia del ordenamiento internacional como sistema jurídico. Como ha afirmado el profesor Sánchez Rodríguez, «el examen analítico de la jurisprudencia nos enfrenta al reto formidable e irrenunciable de explicar los mecanismos y metodologías a través de los cuales los enunciados necesariamente abstractos de las fórmulas normativas, así como la consideración teórica de los diversos intereses que se hallan en conflicto en el momento de su formulación, se concretan y solucionan controversialmente en la vida práctica, en la puesta en movimiento, en la dinámica de tales principios y normas. La interrelación dialéctica existente entre la formación y la aplicación normativas».3 También es verdad que el activismo judicial ha sido asociado a la fragmentación del Derecho internacional como consecuencia de la proliferación de tribunales internacionales de carácter sectorial y la inexistencia de un poder judicial supremo o constitucional que pudiera actuar como órgano de casación de las decisiones judiciales adoptadas por los tribunales sectoriales.4 Pero en este caso el factor determinante no es el pretendido activismo judicial, sino las características del nuevo orden internacional que se caracteriza, paradójicamente, por un reglamentarismo que hace que la norma internacional se proyecte no solo respecto de los Estados, sino directamente sobre la esfera de los derechos y obligaciones de los individuos sin que a la vez se articulen mecanismos generales de control judicial de tal actividad normativa, correspondiendo tal función a los tribunales internacionales sectoriales que controlan la legalidad del régimen jurídico singular afectado. Desde la perspectiva nacional se ha destacado que el resultado de la creciente internacionalización sin control de la que informan el sistema jurídico en su totalidad o en un determinado sector del mismo. Las normas, en cambio, contienen la prescripción de un comportamiento, una conducta que se exige, prohíbe o se permite a sus destinatarios. Ahora bien, la coherencia interna del ordenamiento determina que entre principios y normas exista una relación sustantiva». Los principios estructurales serían aquellos que expresan los valores jurídicos básicos que inspiran el ordenamiento internacional en un determinado momento de su evolución histórica, entre los que cabría citar los previstos en la Resolución 2625 (XXV) de la Asamblea General de las Naciones Unidas así como los relativos a la promoción y respeto de los derechos humanos, al derecho al desarrollo y a la protección del medio ambiente. «Estos principios poseen una doble función en el actual ordenamiento internacional. De un lado, por expresar valores generalmente aceptados por la comunidad internacional en su conjunto, informan las distintas estructuras jurídicas que hoy integran el derecho internacional […] .Y en ellos se encuentra, por tanto, el núcleo de las normas de ius cogens del ordenamiento internacional […]. De otro lado, constituyen verdaderos principios de organización de la sociedad de Estados, por ser indispensables para la existencia de unas relaciones pacíficas y de cooperación en dicho grupo social. Y por tanto, constituyen un límite importante al relativismo del derecho internacional». 3 Véase su «Prólogo» a la obra colectiva El poder de los jueces y el estado actual del Derecho Internacional. Análisis crítico a la jurisprudencia internacional (2000-2007), SÁNCHEZ RODRÍGUEZ, L. I., F.J. QUEL LÓPEZ, A. G. MARTÍN LÓPEZ (eds.). Bilbao: Universidad del País Vasco, 2010, p. 18. 4 Sobre esta cuestión véase SIMMA, B. «Universality of international law from perspective of a practitioner». EJIL 2009-2, pp. 265-297; HIGGINS, R. «A Babel of judicial voices? Ruminations from the Bench». ICLQ, 2006-4, pp. 791-804. Activismo judicial en la evolución del Derecho Internacional 77 creación de normas no puede ser otro que el debilitamiento del hilo capital que une al ciudadano con las normas y que es la fuente de la que nace su legitimidad.5 Desde el Derecho internacional se ha planteado el debate acerca de la aplicación de los principios del estado de derecho al propio sistema internacional, en particular con motivo de la potestad sancionadora antiterrorista del Consejo de Seguridad.6 Si bien es verdad que tal situación puede plantear problemas al universalismo y la unidad del Derecho internacional, sin embargo tal activismo judicial —incluido el nacional—7 coadyuvan a evitar anquilosamientos jurídicos que impiden comprender la nueva realidad existente y deslegitiman un sistema jurídico incapaz de articular los avances que declara normativamente con las decisiones prácticas que adopta. En realidad se trata del clásico debate en torno al fundamento voluntarista u objetivista del Derecho internacional. Para algunos autores, como P. Weil,8 el concepto de orden público internacional es en sí mismo incompatible con la estructura de las sociedad internacional en la que no existe una entidad superior a los Estados. El Derecho internacional presenta, según este autor, una doble crisis de normatividad derivada de elementos no voluntaristas. Por un lado cuantitativa, por la inflación de la juridicidad internacional debida a la acumulación del no-derecho o pre-derecho (soft-law y sus variantes), por otro lado, de carácter cualitativo fruto de la aparición de una «normatividad reforzada» (ius cogens y obligaciones erga omnes) que suponen un alto riesgo por sus dificultades de identificación y por el efecto desestabilizador que provoca en las estructuras de coexistencia y cooperación del actual sistema jurídico internacional. Para el profesor francés, esta práctica cercana al derecho («near-law») es reflejo del desarrollo de la sociedad internacional pero no constituye derecho,9 5 Cfr. Zapatero, ob. cit., p. 30. Informe del Secretario General, «Fortalecimiento y coordinación de las actividades de las Naciones Unidas orientadas a la promoción del estado de derecho», UN. Doc. A/63/226 de 6 de agosto de 2008. Sobre el estado de derecho en Derecho internacional véase L’Etat de Droit en Droit International, Colloque de Bruxelles, Pedone, Paris, 2009; CHESTERMAN, S. «An International Rule of Law?». New York University School of Law, April 11, 2008, Papers 70 <http://lsr.nellco.org/nyu/plltwp/papers/70>. Respecto a la aplicación de este principio a los respectivos Comités de sanciones del Consejo de Seguridad, véase JIMÉNEZ GARCÍA, F. «Tutela judicial efectiva, Pilares intergubernamentales de la Unión Europea y Naciones Unidas o viceversa». En A. Cuerda Riezu y F. Jiménez García (Dirs.). Nuevos desafíos del Derecho Penal Internacional. Madrid: Tecnos, 2009, pp. 411-463; HINOJOSA MARTÍNEZ, L. M. La financiación del terrorismo y las Naciones Unidas. Madrid: Tecnos, 2008. 7 Cabría destacar en este sentido, la jurisprudencia española generada en torno al asunto Scilingo (véase JIMÉNEZ GARCÍA, F. «El fin de la impunidad ante los crímenes internacionales». Tiempo de Paz, N° 93 2009, pp. 70-78). Sobre esta cuestión véase Benvenisti, E. «Reclaiming Democracy: the estrategic uses of foreign and international law by national Courts». AJIL 2008-2, pp. 241-274. 8 Cfr. su Curso General de La Haya, «Le Droit International en quête de son identité», RCADI 1992-VI, t. 237. 9 «Le near law peut ressembler au droit, il peut préceder le droit ou préfigurer le droit; il n’est pas du droit...l’acumulation de non-droit ou de pré-droit ne suffit à elle seule à créer du droit», véase ibíd. p. 243. 6 78 Francisco Jiménez García al igual que el ius cogens aparece como una doctrina necesaria pero imposible por su falta de identificación y de adaptación a la realidad jurídica internacional, sería simplemente un arma de disuasión, el arma nuclear del Derecho internacional, la caja vacía indispensable que nunca hay que llenar.10 Por el contrario, para otros autores, la concepción objetivista no niega el papel fundamental de la voluntad de los Estados en la positivación de las normas jurídicas internacionales, lo que sucede es que la razón de ser del Derecho transciende la voluntad unilateral del Estado. En este sentido, el profesor Carrillo Salcedo hace converger el relativismo del Derecho internacional, pues, los Estados existen per se y de facto sin que pueda estimarse que la soberanía es una delegación del Derecho Internacional, con las limitaciones que le impone el Derecho internacional contemporáneo, en particular, como consecuencia de la influencia de las organizaciones internacionales en la estructura del sistema jurídico internacional y la afirmación progresiva de nociones jurídicas como comunidad internacional, ius cogens y obligaciones erga omnes.11 En definitiva, se trata de observar cómo se resuelve la tensión entre la protección de los intereses colectivos reconocidos por el Derecho internacional a la comunidad internacional en su conjunto y los intereses individuales de los sujetos primigenios de este ordenamiento.12 2. El reconocimiento del ius cogens internacional por la Corte Internacional de Justicia: ¿el inicio de una nueva tendencia o inmovilismo con aportaciones simbólicas? A pesar de que el término de ius cogens (normas imperativas de Derecho internacional general) fue asumido por los artículos 53 y 64 de la Convención de Viena de 1969 sobre el derecho de los tratados y de que en la Sentencia de 1970 sobre el asunto de la Barcelona Traction Light & Power se declarara por parte de la Corte Internacional de Justicia (CIJ) la existencia de obligaciones erga omnes, respecto de 10 Cfr. ibíd. pp. 227-312. El símil de la caja vacía hace referencia a la reflexión de G. Abi-Saab acerca de que «even as an empty box, jus cogens is necessary, because if you do not have the box, you cannot put anything in it», Change and Stability in International Law Making. CASSESE, A. y J. WEILER (Dirs.), Berlin, 1988, p. 96. Respecto a las obligaciones erga omnes llega a la misma conclusión, constituye una teoría imprescindible e irresistible para la promoción de valores morales y solidarios que responde a una necesidad del mundo internacional de hoy; pero de otro lado, su defensa resulta imposible desde el punto de vista de las actuales estructuras del Derecho internacional, pues «quels que soient ses attraits, la théorie de l’obligation erga omnes exige une maîtrise et une élaboration qui jusqu’à présent font défaut». Ibíd., pp. 290-291. 11 Cfr. CARRILLO SALCEDO, J. A. «Droit International et Souveraineté des Etats». RCADI, 1996, t. 257. Del mismo autor, «El fundamento del Derecho internacional: algunas reflexiones sobre un problema clásico». REDI 1998-1, pp. 30-31. 12 Sobre esta cuestión véase VILLALPANDO, S. «The legal dimension of international community: how community interests are protected in international law». EJIL 2010-2, pp. 387-419. Activismo judicial en la evolución del Derecho Internacional 79 las cuales todos los Estados tienen un interés jurídico en su protección,13 este mismo Tribunal obstinadamente ha evitado este término hasta la Sentencia de 3 de febrero de 2006 dictada en el asunto de las Actividades armadas en el territorio del Congo (nueva demanda:2002) (República Democrática del Congo c. Ruanda).14 Hasta entonces había preferido las perífrasis relativas a los «principios intransgredibles de Derecho internacional consuetudinario» y a las «obligaciones erga ommes» declaradas en las opiniones consultivas sobre la Legalidad del uso o la amenaza de armas nucleares15 y las Consecuencias jurídicas de la construcción del Muro de Israel en territorio palestino ocupado,16 así como en los contenciosos relativos a Timor Oriental17 y la Aplicación de la Convención para la prevención y sanción del crimen de genocidio.18 Es más, en el asunto consultivo del Muro en territorio palestino ocupado, la CIJ asumió las consecuencias propias de la violación de este tipo de normas –positivadas en el artículo 41 del Proyecto de la Comisión de Derecho Internacional (CDI) sobre responsabilidad del Estado por hechos internacionalmente ilícitos–19, aun cuando en la práctica sus conclusiones hayan quedado en nada.20 En concreto la Corte declaró que Todos los Estados tienen la obligación de no reconocer la situación ilegal resultante de la construcción del muro en el territorio palestino ocupado, incluida Jerusalén oriental y sus alrededores. Asimismo tienen la obligación de no prestar ayuda ni asistencia para el mantenimiento de la situación creada por tal construcción. Incumbe también a todos los Estados, dentro del respeto por la Carta de las Naciones Unidas y el derecho internacional, velar por que se ponga fin a cualquier impedimento, resultante de la construcción del muro, para el ejercicio por el pueblo palestino de su derecho a la libre determinación. Además, todos los Estados partes en el Convenio de Ginebra relativo a la protección debida a las personas civiles en tiempo de guerra de 12 de agosto de 1949, tienen la obligación, dentro del respeto por la Carta de las Naciones Unidas y el derecho internacional, de hacer que Israel respete el derecho internacional humanitario incorporado en dicho Convenio. Por último, la Corte opina que las Naciones Unidas, y en especial la Asamblea General y el Consejo de Seguridad, deberían considerar qué medidas adicionales son necesarias 13 Cfr. ICJ Reports 1970, p. 32, párr. 33. Cfr. ICJ Reports 2006, pp. 32 y 53, párrs. 64 y 123. 15 Cfr. ICJ Reports 1996 (I), p. 257, párr. 79. 16 Cfr. ICJ Reports 2004, p. 199, párrs. 155 y 157. 17 Cfr. ICJ Reports 1995, p. 102, párr. 29. 18 Cfr. Aplicación de la Convención para la prevención y sanción del crimen de genocidio (Bosnia- Herzegovina c. Yugoslavia), Excepciones preliminares, C.I.J. Recueil 1996 (II), p. 616, párr. 31. 19 Texto aprobado por la CDI en su 53° período de sesiones, Documentos oficiales de la Asamblea General, 56 período de sesiones, Suplemento nº 10 (A/56/10), pp. 10-405. En su Resolución 56/83, de 12 de diciembre de 2001, la Asamblea General de las Naciones Unidas tomó nota de este texto. 20 Como reacción más destacada véase la Resolución ES-10/17 de la Asamblea General de las Naciones Unidas de 15 de diciembre de 2006. 14 80 Francisco Jiménez García para poner fin a la situación ilegal resultante de la construcción del muro y el régimen conexo, teniendo debidamente en cuenta la presente Opinión Consultiva.21 El principal órgano judicial de las Naciones Unidas ha asumido, pues, el término ius cogens tiempo después de que ya fuera reconocido por otros tribunales internacionales. El Tribunal Penal Internacional para la antigua Yugoslavia había invocado en 1998, en el asunto Furundzija, el carácter de ius cogens de la norma que prohíbe la tortura para fundamentar asimismo la aplicación del principio de justicia universal en la persecución y sanción de tal crimen.22 Esta decisión tuvo especial incidencia en el asunto Al-Adsani c. Reino Unido, resuelto el 21 de noviembre de 2001 por el Tribunal Europeo de Derechos Humanos (TEDH), en el que de forma incongruente se concluyó, por un lado, que si bien la prohibición de la tortura es una norma de ius cogens que ostenta dentro de la jerarquía normativa internacional, convencional y consuetudinaria, el rango más elevado; sin embargo, se afirmaba por otro lado, que esta posición solo sirve para los procesos penales y no para los procesos civiles por daños y perjuicios ocasionados en el extranjero.23 Por su parte, la Corte Interamericana de Derechos Humanos (CorteIDH) declaraba en su opinión consultiva de 17 de septiembre de 2003 sobre la Condición jurídica y derechos de los inmigrantes indocumentados, que el principio de igualdad y no discriminación había ingresado en el dominio del ius cogens,24 conclusión que era reiterada dos años después en el asunto de la Masacre de Mapiripán vs. Colombia precisando que […] en cumplimiento de dichas obligaciones, los Estados deben abstenerse de realizar acciones que de cualquier manera vayan dirigidas, directa o indirectamente, a crear situaciones de discriminación de jure o de facto, así como a adoptar medidas positivas para revertir o cambiar situaciones discriminatorias existentes en sus sociedades, en perjuicio de determinado grupo de personas. Esto implica el deber especial de protección que el Estado debe ejercer con respecto a actuaciones y prácticas de terceros que, bajo su tolerancia o aquiescencia, creen, mantengan o favorezcan las situaciones discriminatorias.25 21 Párrs. 159 y 160 de la Opinión Consultiva. Cfr. TPY Fiscal c. Furundzija, Sentencia de 10 de diciembre de 1998m IT-95-17/1 párrs. 153-156. 23 Cfr. TEDH asunto Al-Adsani c. Reino Unido, Sentencia de 21 de noviembre de 2001, párr. 61. En materia de inmunidades destaca también la Sentencia de 14 de febrero de 2002 de la CIJ en el asunto de la Orden de detención de 11 de abril de 2000 (República Democrática del Congo c. Bélgica) que mantiene también una interpretación restrictiva en cuanto a los límites de las inmunidades soberanas respecto a los crímenes internacionales. Sobre esta cuestión véase ESPÓSITO MASSICCI, C. Inmunidad del Estado y Derechos Humanos. Madrid: Civitas, 2007; JIMÉNEZ GARCÍA, F. «Justicia universal e inmunidades estatales: justicia o impunidad ¿Una encrucijada dualista para el Derecho Internacional?». ADI 2002, pp. 63-124. 24 CorteIDH, Opinión Consultiva OC-18/03 de 17 de septiembre de 2003, párr. 101. 25 CorteIDH, Sentencia de 15 de septiembre de 2005, Serie C Nº 134, párr. 178. 22 Activismo judicial en la evolución del Derecho Internacional 81 No obstante, el avance aludido por parte de la Corte Internacional de La Haya en el asunto de las Actividades armadas en el territorio del Congo (2006), se limita al hecho histórico de la invocación expresa del término ius cogens, pues el Tribunal se enroca en su clásica proclama relativa a la distinción entre la oponibilidad erga omnes de una norma y el carácter facultativo de la jurisdicción internacional, declarada en el asunto Timor Oriental, para no deducir consecuencias jurídicas de la existencia de una norma imperativa que en teoría conlleva la nulidad de pleno derecho de los actos que la contravenga. En este caso, el Estado demandante, la República del Congo, había argumentado que la reserva ruandesa al artículo IX de la Convención contra el genocidio, que reconocía la jurisdicción de la CIJ, resultaba nula, pues tal exclusión suponía la consagración de la impunidad de los Estados autores de tal crimen, cuando precisamente el objeto y fin de tal Convención es su erradicación, propósito al que se han comprometido todos los Estados Parte en virtud del artículo I. Se invoca además que la Convención contra el crimen del genocidio, en virtud de la propia jurisprudencia de este Tribunal, constituye una ley general de obligado cumplimiento para todos los Estados de la Comunidad internacional, incluida Ruanda, en la medida en que contiene normas de ius cogens y que de acuerdo con lo dispuesto en los artículos 53 y 64 del Convenio de Viena sobre el derecho de los tratados, declarativos de dicha noción, ha de entenderse como nulo de pleno derecho todo acto convencional contrario a esta categoría de normas. Por tal razón, la reserva ruandesa a dicha cláusula de arreglo judicial sería nula y carecería de todo efecto jurídico. Sin embargo la Corte de La Haya, volviendo la vista atrás a su jurisprudencia sobre la materia (Opinión consultiva sobre las Reservas a la Convención contra el crimen del genocidio de 195126 y su Sentencia sobre las excepciones preliminares dictada en el asunto de la Aplicación de la convención contra el crimen del genocidio, Bosnia-Herzegovina c. Yugoslavia27), afirma que no cabe duda de que los principios sustantivos de la Convención contra el genocidio constituyen principios que obligan a todos los Estados al margen de todo vínculo convencional. Los derechos y obligaciones consagrados por la Convención son derechos y obligaciones erga omnes integrantes de normas imperativas de ius cogens.28 No obstante y sin desviar su mirada del pasado, insiste en que tales reconocimientos no alteran su jurisprudencia sentada en 1995 en el asunto Timor Oriental29 en virtud de la cual la oponibilidad erga omnes de una norma y la regla del consentimiento a la jurisdicción del Tribunal son dos cuestiones totalmente diferentes, sin 26 CIJ Recueil 1951, p. 23. CIJ Recueil 1996, p. 616, párr. 31. 28 Cfr. CIJ Recueil 2006, p. 32, párr. 64. 29 Timor Oriental (Portugal c. Australia), CIJ Recueil 1995, p. 102, párr. 29, decisión recordada en su Providencia de 10 de julio de 2002 sobre medidas provisionales en el propio asunto de las Actividades armadas en territorio del Congo (RDC c. Ruanda), CIJ Recueil 2002, p. 241, párr. 57. 27 82 Francisco Jiménez García que por lo tanto la libertad reservista de los Estados se haya visto modificada ni un ápice por la calificación de ius cogens de la norma convencional reservada. Para el Tribunal, la evolución del Derecho internacional acerca del genocidio, en particular el artículo 120 del Estatuto de la Corte Penal Internacional que prohíbe las reservas al mismo, no ha modificado su doctrina general declarada en la Opinión consultiva de 1951 acerca de que las reservas a la competencia de la Corte Internacional de Justicia, prevista en el artículo IX, no resultan contrarias o incompatibles con el objeto y fin del tratado en la medida en que no afectan a las obligaciones sustantivas que derivan de esta Convención en relación con la prevención y sanción del crimen de genocidio.30 En el mismo sentido se pronuncia el Tribunal respecto a la reserva a la cláusula compromisoria de la Convención contra la discriminación racial al afirmar que el hecho de que una controversia se relacione con la inobservancia de una norma imperativa del Derecho internacional general no es fundamento suficiente para demostrar la competencia de la Corte al respecto, y que no existe ninguna norma imperativa que obligue a los Estados a aceptar dicha competencia para resolver controversias relativas a la Convención internacional sobre la eliminación de todas las formas de discriminación racial.31 El carácter self-restraint mostrado por esta decisión contó con la crítica de la Opinión particular conjunta de los jueces Higgins, Kooijmans, Elabary, Owada y Simma que estimaron que el principio consensualista aplicado por la Corte en su fallo no podía tener un alcance absoluto, subrayando que podría haber situaciones en que una reserva a una cláusula relativa al arreglo de controversias pudiera ser contraria al objeto y fin de un tratado, todo dependía de las circunstancias del caso. Requieren a tal efecto del Tribunal una interpretación más sutil de la Opinión consultiva de 1951 en la que se introdujera la evolución acaecida desde entonces en el Derecho internacional como consecuencia de la multiplicación de instrumentos internacionales sobre derechos humanos así como de la existencia de ciertas instancias judiciales y determinados órganos de control de estos tratados. De forma acertada recuerdan que en 1951 no existía como tal un corpus jurídico sobre derechos humanos hasta tal punto que la Convención contra el genocidio constituía prácticamente el único tratado internacional sobre la materia. Por ello resulta difícilmente concebible que en 2006 se pueda mantener los mismos criterios interpretativos que en 1951. La opinión conjunta de estos jueces se aparta expresamente del régimen interestatal de laissez-faire en materia de reservas proclamado en la Opinión consultiva de 1951, rechazando por irrealizable que, ante 30 31 Cfr. CIJ Recueil 2006, p. 32, párrs. 66-67. Cfr. ibíd., p. 35, párr. 78. Activismo judicial en la evolución del Derecho Internacional 83 la plétora de reservas formuladas a los tratados de derechos humanos, se pueda seguir manteniendo el esquema bilateral de aceptación/objeción, que en la mayoría de los casos obedece a consideraciones políticas, para apreciar la validez de las reservas formalizadas.32 Además, destacan el papel de los órganos judiciales y de los mecanismos convencionales de control de los tratados sobre derechos humanos que han limitado sustancialmente la libertad de los Estados en cuanto a la formulación de reservas a la competencia de los mismos. A tal efecto se hace referencia a la jurisprudencia del Tribunal Europeo de Derechos Humanos (sentencias Belilos de 1988; Loizidou de 1995), de la Corte Interamericana de Derechos Humanos (Opiniones consultivas sobre el Efecto de las reservas a la entrada en vigor de la Convención americana de 1982 y sobre las Restricciones a la pena de muerte 1983); así como la doctrina sentada por el Comité de Derechos Humanos de Naciones Unidas en el asunto Rawle Kennedy c. Trinidad y Tobago de 1999 y, principalmente, en su Observación General N° 24 de 2 de noviembre de 1994 en la que convergen las anteriores decisiones. Como es sabido, en tal Comentario General del Comité de Derechos Humanos de Naciones Unidas se estimó que las reservas destinadas a excluir los mecanismos de garantía y control establecidos en el Pacto de Derechos Civiles y Políticos, elementos básicos de la concepción del Pacto que están destinados a garantizar el disfrute de los derechos, resultaban incompatibles con el objeto y fin del tratado.33 Por estas razones y en virtud de la especial responsabilidad de los Estados en la ejecución de la Convención contra el genocidio, uno de los más graves crímenes conocidos, los jueces que suscriben la citada Opinión particular estimaron que no resultaba tan evidente que las reservas al artículo IX de la Convención contra el genocidio no fueran incompatibles con el objeto y fin del tratado, por lo que el Tribunal debería haber reconsiderado su jurisprudencia. Para estos jueces, resulta especialmente grave que a principios del siglo XXI los Estados puedan seguir eligiendo si son o no juzgados por delitos de genocidio.34 Más contundente se muestra la Opinión disidente del juez Koroma. Además de incidir sobre el carácter normativo de la Convención contra el crimen del genocidio ajena a las consideraciones de reciprocidad, declara que su artículo IX constituye un elemento crucial para alcanzar el objetivo y fin previstos en la misma puesto que es la única disposición de la Convención que permite la determinación del grado de 32 Cfr. párrs. 10-11 de la opinión conjunta. A estos efectos recuerdan que a la Convención del genocidio se ha presentado 28 reservas que han suscitado la objeción de 18 Estados; 54 reservas se han presentado a la Convención contra la discriminación racial que ha generado 26 objeciones; 75 reservas a la Convención sobre la eliminación de la discriminación contra la mujer con 18 Estados objetantes. 33 Cfr. apartado 11 de la Observación General Nº 24. 34 Acerca de la Opinión conjunta de los cinco jueces, véanse los comentarios de la Sentencia efectuados por WECKEL, Ph. y G. AREOU en la RGDIP 2006-2, pp. 491-492 y LATTY, F. AFDI, 2005, pp. 211-212. 84 Francisco Jiménez García responsabilidad de los Estados en la comisión de un crimen de genocidio (en cuya perpetración es difícil de imaginar la no intervención del aparato estatal), pues el resto de sus disposiciones se refieren a la responsabilidad penal de los individuos implicados. Para el juez de Sierra Leona, tal conclusión resulta conforme con lo establecido en la Directriz 3.1.13 del décimo Informe del Relator especial sobre las reservas a los tratados que dispone que las reservas a una disposición convencional relativa al arreglo de controversias o al control de la aplicación de un tratado será incompatible con el objeto y fin del tratado si tal disposición constituye la razón de ser del tratado.35 Denegar esta función a la Corte no solo le impide resolver las controversias resultantes de su aplicación e interpretación, sino principalmente las relativas a su ejecución así como deducir, en su caso, la responsabilidad de los Estados por actos de genocidio. Que el artículo IX de la Convención es una disposición nuclear para la determinación de la responsabilidad estatal por actos de genocidio, ha resultado posteriormente confirmada por la propia Corte Internacional de Justicia en su Sentencia de 26 de febrero de 2007 en el asunto de la Aplicación de la Convención para la prevención y sanción del crimen del genocidio (Bosnia-Herzegovina c. Serbia), en la que tal disposición convencional ha constituido el fundamento jurídico de base para que el Tribunal se pronunciase sobre la participación de Serbia en el genocidio de Srebrenica, precisando que tal Convención no sólo prevé la responsabilidad penal individual sino también la estatal.36 Esta situación de mero reconocimiento formal de las normas imperativas ha provocado que alguno de los jueces del Tribunal, el juez Kooijmans, haya mantenido en el plano doctrinal que la Corte Internacional de Justicia debe superar tal inmovilismo judicial, estéril y asfixiante, y que, sin caer en un activismo judicial destructivo, apueste por un método integrador e incidental de las disposiciones normativas –proactivo en palabras del juez– que permita al Tribunal avanzar de conformidad con los nuevos desarrollos del Derecho internacional.37 35 Cfr. párr. 11 de la Opinión disidente y párr. 99 del Informe, AG. Doc. A/CN.4/558/Add.1, p. 31. CIJ Reports 2007, párrs. 167-169. 37 P. KOOIJMANS asume que «I am certainly not in favour of judicial activism which may turn into a destructive trap. But neither am I in favour of a form of judicial restraint closes windows which need to be opened and thus becomes barren. Earlier I used the word ‘proactive’. In one of my dictionaries I found the following meaning of that term: ‘having orientation to the future, anticipating problems and taking affirmative steps to deal positively with them rather than reacting after a situation has already occurred». «The ICJ in the 21st Century, judicial restraint, judicial activism, or proactive judicial policy». ICQL 2007-4, p. 753. 36 Activismo judicial en la evolución del Derecho Internacional 85 3. Constitucionalismo sustantivo frente al constitucionalismo institucional El asunto Kadi38 ha generado un controvertido pero necesario debate39 en la era del reglamentarismo del Consejo de Seguridad sin que las estructuras de garantías de los derechos fundamentales, como parte integrante del estado de derecho, se hayan alterado en el ordenamiento internacional. El Derecho internacional se había caracterizado –y se sigue caracterizando en términos generales– por ser un ordenamiento esencialmente de cooperación, correspondiendo a los ordenamientos nacionales el desarrollo y la ejecución de la normativa internacional así como las garantías pertinentes para que tal normativa resultase conforme con los principios constitucionales del ordenamiento nacional sin cuestionar la primacía del Derecho internacional. No obstante, este planteamiento se ha visto profundamente alterado mediante la adopción de resoluciones por parte del Consejo de Seguridad que proyectan su normatividad no exclusivamente sobre los Estados sino directamente sobre el patrimonio jurídico (derechos, obligaciones y libertades) de los ciudadanos. A tal efecto surge la cuestión si determinados principios esenciales del estado de derecho (como los relativos al derecho a la defensa y la tutela judicial efectiva)40 como parte integrante del 38 Aunque nos vamos a centrar en el asunto Kadi, se ha de precisar que este no es más que uno de los asuntos llevados ante el Tribunal de Justicia de las Comunidades Europeas (TJCE) sobre esta materia. Véanse también los asuntos Yusuf/Al Barakaat International Foundation c. Consejo y Comisión, asunto T-306/01, Sentencia de 21 de septiembre de 2005; Chafiq Ayadi c. Consejo, Sentencia de 12 de julio de 2006, asunto T-253/02; Hassan c. Consejo y Comisión, asunto T-49/04, Sentencia de 12 de julio de 2006; Organización de los Modjahedines del Pueblo de Irán c. Consejo Asunto T-228/02, Sentencia del TPI (Sala Segunda), de 12 de diciembre de 2006. 39 Sobre este asunto véase: DE WET, E. «The role of European Courts in the development of a hierarchy of norms within international law: evidence of Constitutionalisation». European Constitutional Law Review, 2009-2, pp. 284-306; ZIEGLER, K. S. «Strengthening the rule of law, but fragmenting international law: the Kadi decision of the ECJ from the perspective of human rights». HRLR 2009-2, pp. 288-305; DE SENA, P. y M. Ch. VITUCCI. «The European Courts and the Security Council: between dédoublement fonctionnel and balancing of values«. EJIL 2009-1, pp.193-228 así como el debate suscitado en torno a este artículo por parte de DE BÚRCA, G. y A. NOLLKAEMPER en EJIL 2009-3, pp. 853-862 y 862-887 respectivamente; SIMMA, B. «Universality of international law from perspective of a practitioner». EJIL 2009-2, pp. 265-297, en particular, pp. 292-296; JIMÉNEZ GARCÍA, F. «Tutela judicial efectiva, Pilares intergubernamentales de la Unión Europea y Naciones Unidas o viceversa», l. cit.; SANTOS VARA, J. «El control de las sanciones contra Al-Qaeda y los talibanes en la Unión Europea: ¿un desafío a los poderes del Consejo de Seguridad?». RDCE, Nº 32, 2009, pp. 91-120; BORE EVENO, V. «Le contrôle juridictionnel des résoltions du Conseil de Securité: vers un constitutionnalisme international?». RGDIP 2006-4, pp. 827-860. 40 Conforme a la Observación General N° 32 del Comité de Derechos Humanos sobre el artículo 14 del Pacto de Derechos Civiles y Políticos relativo a los derechos de defensa y tutela judicial efectiva, «el artículo 14 establece garantías que los Estados Partes deben respetar, independientemente de su tradición jurídica y de su derecho interno. Si bien los Estados Partes deben informar sobre la interpretación que dan a estas garantías en sus respectivos ordenamientos jurídicos, el Comité observa que el contenido esencial de las garantías del Pacto no puede dejarse exclusivamente a la discreción del derecho interno». Además se recuerda que «si bien el artículo 14 no está incluido en la lista de derechos que no pueden suspenderse, que figuran en el párrafo 2 del artículo 4 del Pacto, los Estados que en circunstancias de emergencia pública decidan dejar en suspenso los procedimientos normales previstos en el artículo 14 deben asegurarse de que tal suspensión no vaya más allá de lo que exija estrictamente la situación. Las garantías procesales nunca podrán ser objeto de medidas 86 Francisco Jiménez García ius cogens conforman un orden constitucional de carácter internacional que vertebra e integra los sistemas jurídicos. En tal sentido y dada la naturaleza facultativa y el alcance limitado del sistema jurisdiccional internacional, no debería existir ningún problema en que tribunales sectoriales o regionales –incluso los nacionales desde el planteamiento del desdoblamiento funcional– controlaran dicha legalidad internacional con efectos jurídicos limitados en sus respectivos ordenamientos (aunque con una potencialidad jurídica superior), al margen de las consecuencias prácticas que esto pudiera suscitar y de la activación de los mecanismos internacionales oportunos para subsanar tales contradicciones o deficiencias (incluida la solicitud por parte del Consejo de Seguridad de una opinión consultiva a la CIJ sobre esta materia). No se ha de olvidar, en este sentido, que el propio Consejo de Seguridad ha reafirmado que la lucha antiterrorista ha de ser conforme con la Carta de las Naciones Unidas y el Derecho internacional. Igualmente, ha subrayado que los Estados deben asegurarse de que cualquier medida adoptada para luchar contra el terrorismo se ha de ajustar a las obligaciones que les incumben en virtud del Derecho internacional y que deben adoptar dichas medidas de conformidad con ese derecho, en particular, con el Derecho internacional relativo a los derechos humanos, el derecho relativo a los refugiados y el derecho humanitario.41 El origen del asunto Kadi proviene de la interacción entre las resoluciones dictadas por el Consejo de Seguridad en el marco del Capítulo VII de la Carta de las Naciones Unidas y aplicadas por el Comité de Sanciones 1267 creado al efecto, que imponen distintas sanciones económicas y financieras contra el régimen afgano de los talibanes y Usama bin Laden, así como contra las personas y entidades asociadas, incluyendo empresas, que se encontraran bajo su control directo o indirecto,42 y las medidas de ejecución adoptadas por la Unión Europea (UE) concretadas en distintas posiciones comunes aprobadas en el ámbito exclusivo de su Política Exterior y de Seguridad Común (PESC)43 que devinieron en reglamentos adoptados por el Con- derogatorias que soslayen la protección de derechos que no son susceptibles de suspensión. Cfr. CCPR/C/ GC/32 de 23 de agosto de 2007. 41 Cfr. párrafo 2 de la Resolución 1624 (2005) del Consejo de Seguridad que impone a los Estados la obligación de prohibir por ley la incitación a la comisión de un acto o actos de terrorismo. 42 Resoluciones 1267 (1999), 1333 (2000), 1390 (2002), 1452 (2003), en relación con las competencias ejecutivas del Comité de Sanciones, creado al efecto por el Consejo de Seguridad mediante la Resolución 1267 (1999), en la identificación y elaboración de las personas y entidades sancionadas, quien además, en virtud de la resolución 1452 (2003), aprueba las excepciones a la congelación de fondos y de recursos económicos que por razones humanitarias podían conceder los Estados. Este régimen de sanciones fue modificado por las Resoluciones 1526 (2004), 1617 (2005), 1735 (2006), 1822 (2008) y 1904 (2009) de modo que ahora las sanciones abarcan a las personas asociadas dondequiera que se encuentren. Junto a este Comité, operan otros dos, el Comité contra el Terrorismo y el Comité 1540. 43 Posiciones comunes 1999/727/PESC, 2001/154/PESC, 2002/402/PESC y 2003/140/PESC. Activismo judicial en la evolución del Derecho Internacional 87 sejo y la Comisión sobre la base jurídica de los artículos 60 y 301 del Tratado de la Comunidad Europea (TCE)44 Según los demandantes, la aplicación de tal normativa vulneraba directamente su derecho de defensa y tutela, pues la imposición de tales sanciones se había realizado en virtud de un procedimiento totalmente confidencial, sin que se les informara de las razones que las motivaron, ni se les comunicara las pruebas ni circunstancias invocadas en su contra, negándoseles todo oportunidad de defensa. Su inscripción en la lista del anexo I del Reglamento impugnado se debía únicamente al hecho de que figuraban en la lista que el Comité de Sanciones elaboró a partir de la información recibida de los Estados y de las organizaciones internacionales o regionales. Por estas razones alegan que, a su juicio, las resoluciones del Consejo de Seguridad no son directamente aplicables, sino que deben ser objeto de transposición al derecho interno de conformidad con las disposiciones constitucionales pertinentes así como con arreglo a los principios fundamentales del Derecho.45 Por su parte, el Consejo de la UE reconocía en sus alegatos que, cuando la Comunidad decide adoptar medidas unilaterales de coerción económica y financiera por iniciativa propia, el control jurisdiccional debe extenderse al examen de las pruebas utilizadas contra las personas sancionadas. En cambio, según el Reino Unido y el Consejo, cuando la Comunidad actúa sin ejercitar potestad discrecional alguna, basándose en una decisión adoptada por un órgano al que la comunidad internacional ha atribuido considerables facultades a fin de preservar la paz y seguridad internacionales, un control jurisdiccional completo entrañaría el riesgo de socavar el sistema de la ONU establecido en 1945, podría perjudicar gravemente a las relaciones internacionales de la Comunidad y de los Estados Miembros y entraría en conflicto con la obligación de la Comunidad de respetar el Derecho internacional. El Consejo arguyó que, en el presente asunto, el control jurisdiccional del juez comunitario no podía ir más allá del que existe en los Estados miembros en lo que respecta a la recepción, en su ordenamiento jurídico interno, de las decisiones adoptadas por los órganos de la comunidad internacional con el objetivo de preservar la paz y la seguridad internacionales. A este respecto, el Consejo invocó que, en varios Estados Miembros, los actos de aplicación de las resoluciones del Consejo de Seguridad son calificados de «actos de gobierno» y escapan por completo a la competencia del juez. En otros Estados Miembros, a su juicio, la amplitud de dicho control jurisdiccional está muy limitada.46 44 Reglamentos del Consejo: 337/2000, 467/2001, 881/2002, 561/2003 y Reglamentos de la Comisión, 2199/2001, 1580/2002 y 866/2003. 45 Cfr. apartados 137-152 de la Sentencia Kadi. 46 Cfr. ibíd., apartados 154-164 y párr. 225 de la Sentencia dictada en el asunto Yusuf. 88 Francisco Jiménez García Una vez afirmado que la UE se encuentra vinculada por las obligaciones dimanantes de Naciones Unidas y por las del Consejo de Seguridad, no directamente,47 sino en virtud de que «la Comunidad no puede violar las obligaciones que la Carta de las Naciones Unidas impone a sus Estados miembros ni obstaculizar el cumplimiento de las mismas y, por otra parte, que la Comunidad se encuentra obligada, en virtud del propio Tratado que la creó, a adoptar en el ejercicio de sus competencias todas las disposiciones necesarias para permitir que sus Estados miembros respeten tales obligaciones»,48 el Tribunal de Primera Instancia (TPI) asume que en este caso las instituciones actuaron en ejercicio de una competencia reglada de modo que no disponían de ningún margen de apreciación autónomo. En particular, no podían ni modificar directamente el contenido de las resoluciones de que se trata ni establecer un mecanismo que pudiera provocar tal modificación. Por otra parte, rechaza que pueda ejercerse un control jurisdiccional sobre tales actos, pues cualquier control de la legalidad interna del Reglamento impugnado efectuado por el Tribunal, en particular desde el punto de vista de las disposiciones o principios generales del Derecho comunitario relativos a la protección de los derechos fundamentales, exigiría por tanto un examen, de modo incidental, de la legalidad de las resoluciones del Consejo de Seguridad que impusieron las sanciones. De esta forma el Tribunal de Justicia da marchamo judicial a la producción en cascada de actos políticos o de gobierno que no dejan margen alguno al control jurisdiccional, en el ámbito de las Naciones Unidas porque no existen mecanismos jurisdiccionales con tal competencia, en los ámbitos internos de aplicación, como es el caso de la UE, porque se trata de actuaciones regladas que los órganos judiciales no pueden revisar ni articular mecanismos que promuevan tal revisión. La determinación y calificación política de que una situación constituye una amenaza para la paz y la seguridad internacionales ejercida por el Consejo de Seguridad en el ámbito del Capítulo VII de la Carta supone la creación de un «espacio político de actuación inmune a cualquier control jurisdiccional en defensa de los derechos fundamentales» ejercida por los tribunales nacionales o comunitarios. Las previsiones de los artículos 25, 48 y 103 de la Carta de las Naciones Unidas y del artículo 27 de la Convención de Viena sobre el derecho de los tratados avalan, según el TPI, tal afirmación. Para el Tribunal «habida cuenta en particular de las disposiciones del artículo 307 CE y del artículo 103 de la Carta de las Naciones Unidas, la alegación de que se han vulnerado, bien los derechos fundamentales protegidos por el ordenamiento jurídico comunitario, bien los principios de dicho ordenamiento jurídico, no puede afectar a la validez 47 48 Cfr. párrs. 93-203 del asunto Kadi. Véase ibíd., párr. 204. Activismo judicial en la evolución del Derecho Internacional 89 de una resolución del Consejo de Seguridad ni a su eficacia en el territorio de la Comunidad».49 Tal constatación, contraria a la propia esencia de la UE y de su ordenamiento jurídico así como a la jurisprudencia del TEDH, obliga al Tribunal de Primera Instancia a acudir a la noción paliativa del ius cogens (orden público internacional que se impone a todos los sujetos del Derecho internacional, incluidos los órganos de la ONU, y que no tolera excepción alguna50) para justificar su posición, abriendo a tal efecto una sedicente posibilidad de control en el caso de que tal actuación onusiana constituyera una violación grave de las obligaciones derivadas de las normas imperativas del Derecho internacional público, tal y como se desprende de los artículos 53 y 64 de la Convención de Viena sobre el derecho de los tratados. Solo en el hipotético caso de que la tutela judicial efectiva constituyera una norma superior del Derecho internacional integrante del ius cogens, esto es, un principio inviolable del Derecho internacional consuetudinario en términos de la Opinión consultiva de la Corte Internacional de Justicia en el asunto de la Licitud de la amenaza o del uso de armas nucleares, entonces el control jurisdiccional incidental ejercido por el TPI en virtud del recurso de anulación podría extenderse a los actos impugnados.51 Así pues, el TPI se reconoce con competencia universal para enjuiciar la legalidad internacional de las sanciones decretadas por el Consejo de Seguridad de las Naciones Unidas, aunque previamente se había declarado incompetente para enjuiciar los efectos territoriales en la Comunidad Europea de las propias disposiciones comunitarias dictadas en ejecución de las resoluciones del Consejo de Seguridad, ni siquiera para articular mecanismos comunitarios que pudieran provocar su revisión. No obstante, esta posibilidad no supone ningún avance en el razonamiento jurídico del Tribunal, sino que se erige en una premeditada válvula de escape sin consecuencia alguna, pues sobre la base de que el derecho a la defensa y a la tutela judicial efectiva no constituyen, según el Tribunal, un derecho absoluto –sin entrar en un mayor análisis sobre las consecuencias de la derogación absoluta de tal derecho en un ordenamiento que pivota sobre el mismo–, finalmente se reitera la incuestionable autoridad política del Consejo de Seguridad y el nulo margen de actuación tanto para las instancias políticas comunitarias, esto es el Consejo como la Comisión, como para la propia instancia judicial de la Unión Europea. Es más y en una pirueta de difícil comprensión por parte de un órgano judicial, la ausencia de este control 49 50 51 Véase ibíd., párrs. 214-224. Véase ibíd., párr. 226. Apartado 231. 90 Francisco Jiménez García jurisdiccional es suplida, según el TPI, por la existencia de controles políticos de carácter discrecional.52 La falta de conocimiento de los hechos y las pruebas sobre la vinculación terrorista de los afectados se proyecta sobre la fase jurisdiccional y sobre el ejercicio del derecho a la tutela judicial efectiva, situación que es justificada por el TPI mediante el reconocimiento de una nueva regla de ius cogens: la inmunidad de jurisdicción absoluta de los actos del Consejo de Seguridad cuando actúa en el marco del Capítulo VII, así como de la normativa regional de aplicación.53 Conforme al tenor literal de la Sentencia, Dicha limitación se justifica tanto por la naturaleza de las decisiones que el Consejo de Seguridad se ve obligado a adoptar en virtud del capítulo VII de la Carta de las Naciones Unidas como por el objetivo legítimo que se persigue. En las circunstancias del presente asunto, el interés de los demandantes en que el fondo del litigio sea examinado por un tribunal no tiene entidad suficiente para prevalecer sobre el interés general esencial en el mantenimiento de la paz y la seguridad internacionales frente a una amenaza claramente identificada por el Consejo de Seguridad, con arreglo a las disposiciones 52 La única posibilidad que acierta a proponer el TPI es la puesta en marcha de un sistema particular de protección diplomática que transciende al previsto en el Derecho internacional en vigor en cuanto viene determinado por el principio de jurisdicción, en lugar del principio de nacionalidad, y porque se entabla directamente ante un órgano político como es el Comité de Sanciones, aun cuando sea sobre un procedimiento bilateral entre Estados. Tal situación es la descrita en las Directrices del Comité de Sanciones, aprobadas por el 7 de noviembre y enmendadas el 10 de abril de 2003, así como la Resolución 1526 (2004), por las cuales se prevé la posibilidad de que un requirente (persona, grupo, empresa o entidad incluida en las lista consolidada del Comité de Sanciones) pueda pedir al Gobierno de su país de residencia o nacionalidad para que solicite una revisión del caso. Para tal efecto, se regula un procedimiento bilateral y discrecional entre el Gobierno requerido y el Gobierno o Gobiernos que propusieron originalmente la designación (el Gobierno o gobiernos proponentes) para reexaminar el mantenimiento o exclusión de la lista ante el Comité quien decide por consenso y, en caso de no hallarse este, el asunto se remitirá al Consejo de Seguridad quien decidirá en ultima instancia. Este procedimiento ha sido revisado el 12 de febrero de 2007 en virtud de las Resoluciones 1730 (2006) y 1735 (2006) del Consejo de Seguridad que destacan el carácter preventivo de estas medidas «que no se basan en criterios penales establecidos en el derecho interno», inciden en la necesidad de justificar la propuesta de inclusión en la lista, además de recordar el deber de los Estados de informar por escrito, en la medida de lo posible, a las personas y entidades incluidas en la Lista Consolidada sobre las medidas adoptadas, y mejoran el mecanismo de exclusión de la lista previendo la posibilidad de que el particular afectado pueda presentar directamente una solicitud de revisión del caso ante el punto focal, siendo éste el que tramite la solicitud sin que suponga reconocer la intervención directa del particular ante las instancias sancionadoras Cfr. Comité del Consejo de Seguridad establecido en virtud de la Resolución 1267 (1999) relativa a AlQaida y los talibanes y personas y entidades asociadas. Directrices del Comité para el desempeño de su labor (Aprobadas el 7 de noviembre de 2002, y modificadas el 10 de abril de 2003, el 21 de diciembre de 2005, el 29 de noviembre de 2006 y el 12 de febrero de 2007. Conforme a la Resolución 1730 (2006) del Consejo de Seguridad, un Estado puede decidir como norma general que sus nacionales o residentes presenten sus solicitudes directamente al punto focal. A tal efecto, el Estado hará una declaración dirigida al Presidente del Comité que se publicará en su sitio web. Por el momento, Francia, mediante carta de 30 de abril de 2007, ha formulado tal declaración. Las Directrices así como las Resoluciones del Consejo de Seguridad y demás documentación pertinente relativa a este Comité de Sanciones, incluyendo información sobre el punto focal, puede consultarse en la siguiente dirección: <http://www.un.org/spanish/sc/committees/1267/index.shtml>. 53 Cfr. párrs. 287-288. Activismo judicial en la evolución del Derecho Internacional 91 de la Carta de las Naciones Unidas. A este respecto, procede atribuir especial importancia al hecho de que las resoluciones que el Consejo de Seguridad ha ido aprobando sucesivamente no sólo no han establecido unas medidas de duración ilimitada o indeterminada, sino que han previsto siempre un mecanismo para revisar la oportunidad de mantener tales medidas tras un período de tiempo de 12 o 18 meses como máximo.54 Y se concluye que tal déficit de control jurisdiccional queda salvaguardado por el control político ejercido por el Comité de Sanciones: Por último, el Tribunal de Primera Instancia considera que, al no existir un tribunal internacional competente para controlar la legalidad de los actos del Consejo de Seguridad, la creación de un órgano tal como el Comité de Sanciones y la posibilidad, prevista en la normativa, de dirigirse a él en todo momento para obtener la revisión de cualquier caso individual, mediante un mecanismo formalizado en el que participan tanto «el Gobierno requerido» como «el Gobierno proponente» constituyen otra vía razonable para proteger adecuadamente los derechos fundamentales de los demandantes, tal como son reconocidos por el ius cogens.55 No obstante, tales conclusiones favorables a la indefensión absoluta fueron revisadas por la Gran Sala del TJCE en su Sentencia de 3 de septiembre de 200856. Tal y como había mantenido el Abogado General, Sr. Poiares Maduro en sus conclusiones,57 la Gran Sala niega la existencia de la pretendida inmunidad de los actos comunitarios ejecutivos de las resoluciones del Consejo de Seguridad, lo que lleva al Tribunal a declarar la nulidad del Reglamento por vulneración de los derechos de defensa y tutela judicial efectiva y, de forma colateral, el derecho de propiedad.58 Conforme a las conclusiones del Tribunal, con arreglo a las competencias que les confiere el Tratado, los tribunales comunitarios deben garantizar un control, en principio completo, de la legalidad de todos los actos comunitarios desde el punto de vista de los derechos fundamentales que forman parte integrante de los principios generales del Derecho comunitario –constitutivos a su vez del «bloque de legalidad constitucional» de la UE–, control que también se extiende a los actos comunitarios destinados a aplicar resoluciones aprobadas por el Consejo de Seguridad en virtud del capítulo VII de la Carta de las Naciones Unidas, como el Reglamento controvertido.59 Eso sí, el Tribunal de Luxemburgo declara que no le corresponde controlar la legalidad de las 54 Véase ibíd., apartado 289. Ibíd., apartado 290. 56 Véase TJCE, Sentencia de 3 de septiembre de 2008, asuntos acumulados C-402/05 P y C-415/05 P. En el mismo sentido la Sentencia de 3 de diciembre de 2009 dictada en el caso Hassan c. Consejo y Comisión, asuntos acumulados C-399/06 P y 403/06 P. 57 Conclusiones presentadas respectivamente el 16 de enero y 23 de enero de 2008 respecto a los asuntos C-402/05 P y C-415/05 P. 58 Véanse apartados 278-330. 59 Véase apartado 326. 55 92 Francisco Jiménez García resoluciones aprobadas por otros órganos internacionales, como es el caso del Consejo de Seguridad, ni siquiera limitando su control al examen de la compatibilidad de tales resoluciones con el ius cogens.60 Así pues, podemos afirmar que finalmente el TJCE reconoció que la UE, como comunidad de derecho, no puede aceptar ciegamente el «constitucionalismo puramente formal o extrínseco derivado de la institución de las Naciones Unidas» en virtud de sus artículos 25, 48 y 103 de su Carta sin un análisis de fondo de la norma que se ha de aplicar de acuerdo con los principios que conforman su «bloque de legalidad», lo que implica la exigencia de un control de constitucionalidad sustantivo o intrínseco. Ello no supone el reconocimiento de un poder de derogación internacional de la disposición onusiana cuestionada, pues carece de tal competencia, sino que sus efectos se limitan al ámbito normativo de la UE poniendo en atención del propio Consejo de Seguridad y de los Estados miembros (no se ha de olvidar que Francia y el Reino Unido son miembros permanentes del Consejo de Seguridad) las dificultades ínsitas en la normativa adoptada para que sean subsanadas. Tal «activismo judicial» ya ha tenido sus consecuencias en el ámbito sancionador de las Naciones Unidas. Así las Resoluciones del Consejo de Seguridad 1822 (2008) y 1904 (2009), relativas a la amenaza a la paz y la seguridad internacionales causadas por actos terroristas, toman nota de los problemas jurídicos y de otra índole surgidos como consecuencia de las medidas de aplicación adoptadas por los Estados miembros en ejecución de las resoluciones contra el terrorismo internacional así como de las mejoras que se han introducido en los procedimientos del Comité antiterrorista en cuestión y la calidad de la Lista consolidada.61 En concreto, la Resolución 1904 (2009) reafirma no solo que todos los Estados miembros han de tomar todas las medidas necesarias posibles, de conformidad con su legislación y prácticas nacionales, para notificar e informar oportunamente a la persona o entidad que se proponga incluir en la Lista y adjunten a esa notificación el resumen de los motivos para la inclusión, sino que prevé la instauración de una Oficina del Ombudsman donde se podrán remitir solicitudes de exclusión de la Lista consolidada sustituyendo en tal labor a los puntos focales establecidos mediante la Resolución 1730 (2006). A tal efecto, se regula un procedimiento contradictorio entre, por una parte, el peticionario y el Ombudsman que se hace cargo de su causa, y de otra, los Estados y los órganos competentes de Naciones Unidas: Equipo de Vigilancia y el Comité antiterrorista.62 60 Cfr. párr. 287. Véase Directrices del Comité 1267 para la realización de su labor aprobadas el 7 de noviembre de 2002 con las modificaciones introducidas el 12 de febrero de 2007 y el 9 de diciembre de 2008 <http://www.un.org/ spanish/sc/committees/1267/1267_guidelines_sp.shtml>. 62 Cfr. párrs. 19-21 de la Resolución así como su Anexo II. 61 Activismo judicial en la evolución del Derecho Internacional 93 4. Los Tribunales como garantes y responsables de la efectividad del Derecho Internacional. La persecución positiva de los crímenes internacionales y el control de convencionalidad El actual Derecho internacional ha consagrado como uno de sus principios estructurales el fin de la impunidad entendida ésta, tal y como se declara en el Acuerdo entre la ONU y el Gobierno de Guatemala relativo al establecimiento de una Comisión Internacional contra la Impunidad en Guatemala de 12 de diciembre de 2006,63 como la inexistencia de hecho o de derecho de responsabilidad penal, administrativa, disciplinaria o civil para los responsables que atentan gravemente contra los derechos humanos, eludiendo la investigación o la condena; todo lo cual conduce al debilitamiento del estado de derecho, impidiendo al Estado con su deber de garantizar a los ciudadanos afectados la protección de su vida, integridad física y el pleno acceso a la justicia, con la consecuente pérdida de la confianza de los ciudadanos en las instituciones democráticas del país. Tal principio se concibe además como uno de los presupuestos necesarios para alcanzar un verdadero estado de derecho internacional donde prime el imperio de las leyes frente al imperio de los Estados, garantice la generalidad de los derechos por él declarados así como la efectividad de su control y respeto mediante instancias jurisdiccionales,64 ya sean internacionales o nacionales en virtud de distintos criterios de atribución de competencia, asumiendo en el ámbito penal internacional el principio de complementariedad declarado en el Estatuto de Roma por el que se crea la Corte Penal Internacional. Por otra parte, el principio normativo del fin de la impunidad ante los crímenes internacionales ha adquirido una dimensión que va más allá de la garantía de la existencia de un recurso judicial efectivo (piedra angular, no obstante). En estos momentos tal derecho se concibe de una forma holística que comprende la búsqueda de la verdad y la obtención de una adecuada reparación tanto individual como de carácter social o colectivo. Tal concepción es la que preconizan los «Principios y directrices básicos sobre el derecho de las victimas de violaciones manifiestas de las normas internacionales de derechos humanos y de violaciones graves del derecho internacional humanitario a interponer recursos y obtener reparaciones», anexos a la Resolución 60/147 aprobada sin necesidad de votación por la Asamblea General de las Naciones Unidas de 16 de diciembre de 2005. Por otro lado, mientras que el fin de la impunidad y el deber de todo Estado de ejercer su jurisdicción penal contra los responsables de los crímenes internacionales se declaran en los Preámbulos 63 Acerca de este acuerdo y el mandato de esta Comisión véase: <http://cicig.org/index.php?page=mandato>. Cfr. CHESTERMAN, S. «An International Rule of Law?». New York University School of Law, April 11, 2008, Papers 70 <http://lsr.nellco.org/nyu/plltwp/papers/70>. 64 94 Francisco Jiménez García de la Convención Internacional para la protección de todas las personas contra las desapariciones forzadas, adoptada el 20 de diciembre de 2006, y del Estatuto de la Corte Penal Internacional de 17 de julio de 1998, la decisión de 13 de mayo de 2008 adoptada por la Sala de Cuestiones Preliminares de la CPI en el asunto Fiscal c. Germain Katanga and Mathieu Ngudjolo Chui, reconoció como derechos de las víctimas de los crímenes de la competencia de la Corte, el derecho a la verdad y el derecho a la justicia tal y como han sido interpretados por la CorteIDH y, en menor medida, por el TEDH65 y de conformidad con la doctrina sentada sobre esta cuestión por la denominada justicia transicional.66 Asimismo y en consecuencia, se afirma de manera contundente que el conjunto de derechos procesales de las víctimas no debe ser determinado de manera casuística sino mediante una aproximación sistemática. En tal sentido, la jueza Silvia Steiner concluye que a la hora de concretar el estatuto procesal de la víctima en el procedimiento ante la Corte, incluso en la fase preliminar, se ha de tener en cuenta su legítimo interés en la determinación veraz de los hechos, la identificación de los responsables de tales crímenes y la declaración de su responsabilidad como elementos integrantes de su derecho a la verdad. Además en el reconocimiento del derecho a la justicia, ha de presidir el objetivo de poner fin a la impunidad mediante el establecimiento judicial de las circunstancias en las cuales se consumaron las violaciones, la declaración de responsabilidad de los perpetradores de tales crímenes y la seguridad de que se impondrán sanciones de conformidad con la gravedad de los crímenes por los que hayan sido condenados.67 La consagración de este principio, sin embargo, se ha encontrado con importantes obstáculos en distintos ámbitos, desde las reglas de las inmunidades jurisdiccionales penales de los representantes internacionales de los Estados (asuntos Yerodia, Al-Adsani …), hasta las legislaciones nacionales relativas a las amnistías, indultos, prescripción o al principio de irretroactividad. No obstante, en el reconocimiento paulatino del principio del fin de la impunidad como principio estructural del Derecho internacional también cabe destacar el activismo de ciertos tribunales internacionales. En primer lugar, la Corte Interamericana de Derechos Humanos en el caso de la Masacre de Mapiripán v. Colombia reiteraba que: 65 Se cita la siguiente jurisprudencia de la Corte Interamericana de Derechos Humanos: Bàmaca- Velasquez c. Guatemala, Sentencia de 25 de noviembre de 2000, Serie C, nº 70, párr. 201, Barrios Altos c. Perú, Sentencia de 14 de marzo 2001, Series C, nº 75, par. 48, Masacre de Mapiripá c. Colombia, Sentencia de 15 de septiembre de 2005, Serie C, nº 134, párr. 297; Almohacid-Arellano y otros c. Chile, Sentencia de 26 de septiembre de 2006, Serie C, nº 154, párrs. 148 y ss. Respecto al TEDH, se cita el asunto Hugh Jordan c. Reino Unido, Sentencia de 4 de mayo de 2001, Demanda No. 24746/1994, [2001] ECHR 327, párr. 93. 66 Sobre este tema, véase J. Chinchón Álvarez, Derecho Internacional y Transiciones a la Democracia y la Paz. Madrid: Ediciones Parthenon, 2007. 67 Cfr. ICC-01/04-01/07, pars. 31-51 <http://www.icc-cpi.int/library/cases/ICC-01-04-01-07-474-ENG.pdf>. Activismo judicial en la evolución del Derecho Internacional 95 [...] ninguna ley ni disposición de derecho interno puede impedir a un Estado cumplir con la obligación de investigar y sancionar a los responsables de violaciones de derechos humanos. En particular, son inaceptables las disposiciones de amnistía, las reglas de prescripción y el establecimiento de excluyentes de responsabilidad que pretendan impedir la investigación y sanción de los responsables de las violaciones graves de los derechos humanos –como las del presente caso, ejecuciones y desapariciones. El Tribunal reitera que la obligación del Estado de investigar de manera adecuada y sancionar, en su caso, a los responsables, debe cumplirse diligentemente para evitar la impunidad y que este tipo de hechos vuelvan a repetirse.68 El principio de irretroactividad de las leyes penales es un principio general del Derecho internacional consustancial al principio de legalidad penal. Tanto el artículo 15 del Pacto Internacional de Derechos Civiles y Políticos de Naciones Unidas como los respectivos artículos 7 y 9 del Convenio Europeo de Derechos Humanos y de la Convención Americana sobre Derechos Humanos lo declaran. Según las disposiciones internacionales citadas, nadie será condenado por actos u omisiones que en el momento de su comisión no fueran delictivos según el derecho nacional o internacional, precisando que tal derecho no impide el juicio ni la condena de una persona por actos u omisiones que, en el momento de cometerse, fueran delictivos conforme a los principios generales del derecho reconocidos por la comunidad internacional. Esto es, que a la hora de concretar el alcance de este principio no sólo se ha de tener en cuenta la legalidad nacional sino también la legalidad internacional (incluida la consuetudinaria así como la derivada de los principios generales), por lo que estrictamente hablando la aplicación de la ley penal posterior a hechos anteriores que estaban condenados internacionalmente no supone una aplicación retroactiva de la ley penal nacional sino su aplicación retrospectiva en atención al cumplimiento de las obligaciones internacionales existentes para el Estado y para los individuos desde el momento en que se pueda afirmar la existencia de responsabilidad penal internacional sobre el crimen en cuestión. Como ha destacado el profesor Antonio Remiro Brotóns, «no hay razón alguna para hacer a los criminales beneficiarios de la morosidad de los legisladores estatales una vez que los tipos ya establecidos en el orden internacional son recibidos –miméticamente o por equivalencia– por los ordenamientos internos».69 68 Sentencia Corte IDH. de 15 de septiembre de 2005, Serie C. nº 134, párr. 304. En el mismo sentido y con especial referencia al artículo 20 del Estatuto de la Corte Penal Internacional, Sentencia de 26 de septiembre en el asunto Almonacid Arellano y otros c. Chile, CorteIDH Serie C nº 154 y Sentencia de 29 de noviembre de 2006 en el asunto La Cantuta c. Perú, CorteIDH Serie C nº 162. 69 Véase Remiro Brotóns, A. El caso Pinochet. Los límites de la impunidad. Madrid: Biblioteca Nueva, 1999, p. 60. 96 Francisco Jiménez García Así pues no resultan contrarios al principio de legalidad penal internacional aquellos procesos judiciales abiertos contra actuaciones delictivas que si bien en el momento de su comisión no estaban tipificadas en el código penal en vigor sin embargo eran consideradas criminales conforme al Derecho internacional, convencional o consuetudinario, vigente en ese momento y tales conductas fueron posteriormente incorporadas al respectivo código penal de aplicación por parte del tribunal enjuiciador. Por su parte, la Audiencia Nacional española mantuvo en su sentencia de 19 de abril de 2005 sobre el asunto Scilingo que debe negarse […] el argumento de que el legislador español, al introducir dicho precepto penal (el crimen de lesa humanidad en el artículo 607 bis CP) se estaba limitando a permitir en el ordenamiento español, pero sólo de cara al futuro y para el ámbito interno español, la persecución de este tipo de crímenes, a modo de dar formal cumplimiento a la exigencia derivada del principio de complementariedad del Estatuto de la Corte Penal Internacional o de la obligación de cooperar con dicho Tribunal, dejando sin previsión en derecho interno la norma penal internacional que ya desde hace décadas castigaba ese tipo de conductas. Ello significaría negar cualquier clase de internacionalidad a esta clase de delitos lo que representa una absoluta contradicción, además de no ajustarse siquiera a la ubicación sistemática dada a estos delitos.70 Las anteriores conclusiones no son meras aseveraciones o desiderata doctrinales, sino que cuentan con un importante soporte jurisprudencial. Además de las decisiones de la Corte Interamericana de Derechos Humanos ya indicadas, se ha de destacar la doctrina más reciente del Tribunal Europeo de Derechos Humanos que ha declarado la conformidad con el principio de legalidad penal internacional del artículo 7 del Convenio Europeo de Derechos Humanos de las legislaciones nacionales, así como de la jurisprudencia de ellas derivadas, que reconocen efectos retroactivos (o retrospectivos) a los crímenes contra la humanidad tipificados en sus respectivos códigos penales. Doctrina que viene a completar los desarrollos jurisprudenciales dictados en 1997 sobre el asunto Touvier c. Francia y en 2001 acerca de los asuntos Papon c. Francia y Streletz, Kesskest y Krentz c. Alemania.71 En los asuntos Kolk y Kislyiy c. Estonia, resuelto por el TEDH mediante decisión de admisibilidad dictada el 17 de enero de 2006 y Kononov c. Letonia, resuelto mediante sentencia del 24 de julio de 2008, se reconoce por parte del Tribunal de Estrasburgo que no resultan contrarias al artículo 7 del Convenio las decisiones judiciales nacionales que habían concluido que los crímenes contra la humanidad tipificados por el Estatuto Militar Internacional de Nuremberg en 1945, los Principios de dicho Tribunal declarados en 1950 por la Asamblea General de las Naciones Unidas e incluso en 70 71 Cfr. Fundamento Jurídico 1.4.3 de la sentencia. Las decisiones citadas pueden consultarse en la siguiente dirección: http://www.echr.coe.int/echr Activismo judicial en la evolución del Derecho Internacional 97 la Convención de la Haya de 1907, que reproduce casi literalmente el texto de la Convención de la Haya de 1989 y que asume la Cláusula Martens, son perseguibles independientemente de la fecha en que fueron cometidos y ello a pesar de que en el momento en que se produjeron los hechos impugnados no estuvieran tipificados como tales crímenes en los códigos penales entonces vigentes, sino que fueron códigos posteriores (de 1994 y 1993 respectivamente) los que introdujeron con efectos retroactivos y sin posibilidad de prescripción la persecución penal de tales crímenes. Es más, el TEDH salva las exigencias del principio de legalidad de las penas al mostrar su conformidad con el hecho de que la condena de los demandantes y la pena que les habían sido impuestas tienen su base jurídica en los respectivos códigos penales de la década de 1990. Con anterioridad en el asunto Jorgic c. Alemanía, el Tribunal de Estrasburgo había declarado compatible con los derechos a la libertad y seguridad (artículo 5) y a un proceso equitativo (artículo 6) la aplicación del principio de justicia universal en relación con la persecución del crimen del genocidio de conformidad con las previsiones de la Convención de 1948 sobre la prevención y sanción del crimen en cuestión. Para el TEDH, del artículo I de esta Convención deriva para las partes contratantes la obligación erga omnes de prevenir y sancionar el genocidio cuya prohibición forma parte del ius cogens internacional.72 Por su parte, en la sentencia en casación dictada el 17 de mayo de 2010 por la Gran Sala del TEDH sobre el asunto Kononov, se reitera que la garantía que consagra el artículo 7, elemento esencial de la preeminencia del derecho, ocupa un lugar primordial en el sistema de protección de la Convención, tal y como lo constata el hecho de que dicha disposición no pueda ser objeto de suspensión en caso de guerra o de otro peligro público. En cuanto a su contenido, recuerda que la previsión de legalidad penal hace referencia tanto a la existencia de una norma, escrita o no escrita, así como a los principios de accesibilidad y previsibilidad de tales disposiciones penales. A tal efecto insiste respecto al principio de previsibilidad que este comprende la interpretación judicial, pues está sólidamente establecido en la tradición jurídica de ciertos Estados Partes que la jurisprudencia, como fuente del derecho, contribuye necesariamente a la evolución pregresiva del derecho penal.73 En cuanto a los crímenes de guerra por los que fue el demandante condenado, acaecidos en 1944, se declara que tales crímenes habían sido codificados en las Reglas de la Haya de 1907, en las que se incluye la Cláusula Martens, además de en los Convenios de Ginebra de 1949 y en los Principios de Nuremberg. Es más, la prohibición de tales crímenes había sido declarada 72 73 TEDH, asunto Jorgic c. Alemanía, sentencia de 12 de julio de 2007, párr. 68. Cfr. párr. 185 de la Sentencia Kononov (2010). 98 Francisco Jiménez García por la jurisprudencia internacional como parte integrante de las «consideraciones elementales de la humanidad» así como de los «principios intransgredibles del derecho internacional consuetudinario».74 Por su parte el Tribunal Supremo español con ocasión del reiteradamente citado asunto Scilingo ha elaborado una interesante doctrina conforme a la cual se sancionan los hechos imputados de conformidad con los delitos tipificados en el momento de su comisión en los respectivos códigos penales de los Estados involucrados, salvando así los problemas de retroactividad, pero advirtiendo que tales conductas delictivas resultaban asimismo en ese momento sancionadas internacionalmente como crímenes contra la humanidad y que tal sanción era no solo plenamente conocida por los Estados implicados sino también por los autores de tales de crímenes, conjurando así los problemas relativos a la prescripción de los delitos o a la aplicación del principio de justicia universal. Se trata de la contextualización de delitos nacionales en categorías de crímenes sancionados por el ordenamiento internacional, incluyendo el derecho consuetudinario. Para el Tribunal Supremo, las referencias a estas conductas en el Derecho internacional penal con anterioridad a los hechos enjuiciados han sido generalmente previas a su constatación en normas de derecho interno. Desde la primera aparición escrita, en 1907 (Cláusula Martens), la evolución normativa ha permitido la consolidación internacional de un elemento de contexto identificable, añadido al hecho individual, que permite atribuir mayor cantidad de injusto a conductas que ya previamente eran constitutivas de delito. Las consecuencias de su apreciación se concretan en el reconocimiento de esa extraordinaria gravedad desde la perspectiva de la protección de los derechos humanos, y en la aceptación internacional de la necesidad de proceder a su persecución y castigo, haciendo efectivo un impulso internacional que supere las dificultades derivadas de su propia naturaleza.75 En atención a estos desarrollos jurisprudenciales y de forma complementaria a ellos, habría que destacar dos doctrinas fundamentales reconocidas por la Corte Interamericana de Derechos Humanos. En primer lugar, la relativa a las obligaciones positivas derivadas de las convenciones suscritas y del principio de diligencia debida que permiten declarar la responsabilidad del Estado por actuaciones delictivas cometidas por los particulares. En segundo lugar, la referente al control de la convencionalidad internacional por parte de los jueces nacionales de su derecho interno. Estas doctrinas jurisprudenciales han supuesto un importante avance respecto a la responsabilidad en el ámbito de la protección de los derechos humanos. Respecto a la teoría de la 74 75 Ibíd., párr. 215. Cfr. Fundamento Jurídico 6.3 de la sentencia. Activismo judicial en la evolución del Derecho Internacional 99 obligaciones positivas, se altera la estructura vertical del Derecho internacional de los derechos humanos (individuo v. Estado) introduciendo la dimensión horizontal (individuo v. individuo) que potencia la efectividad y plenitud de los derechos reconocidos por los Estados en los convenios internacionales que suscriben. A tal efecto, en el caso Campo Algodonero v. México, con importante referencia al acervo jurisprudencial del TEDH sobre la materia, se ha reconocido la responsabilidad del Estado por su falta de actuación respecto al asunto de los crímenes de mujeres de Ciudad Juárez. El Tribunal ha constatado en este caso que Las irregularidades en el manejo de evidencias, la alegada fabricación de culpables, el retraso en las investigaciones, la falta de líneas de investigación que tengan en cuenta el contexto de violencia contra la mujer en el que se desenvolvieron las ejecuciones de las tres víctimas y la inexistencia de investigaciones contra funcionarios públicos por su supuesta negligencia grave, vulneran el derecho de acceso a la justicia, a una protección judicial eficaz y el derecho de los familiares y de la sociedad a conocer la verdad de lo ocurrido. Además, denota un incumplimiento estatal de garantizar, a través de una investigación seria y adecuada, los derechos a la vida, integridad personal y libertad personal de las tres víctimas. Todo ello permite concluir que en el presente caso existe impunidad y que las medidas de derecho interno adoptadas han sido insuficientes para enfrentar las graves violaciones de derechos humanos ocurridas. El Estado no demostró haber adoptado normas o implementado las medidas necesarias, conforme al artículo 2 de la Convención Americana y al artículo 7.c de la Convención Belém do Pará, que permitieran a las autoridades ofrecer una investigación con debida diligencia. Esta ineficacia judicial frente a casos individuales de violencia contra las mujeres propicia un ambiente de impunidad que facilita y promueve la repetición de los hechos de violencia en general y envía un mensaje según el cual la violencia contra las mujeres puede ser tolerada y aceptada como parte del diario vivir.76 Ahora bien, y conforme a su propia jurisprudencia, la Corte interamericana deja claro que un Estado no puede ser responsable por cualquier violación de derechos humanos cometida entre particulares dentro de su jurisdicción. En efecto, las obligaciones convencionales de garantía a cargo de los Estados no implican una responsabilidad ilimitada de los Estados frente a cualquier acto o hecho de particulares, pues sus deberes de adoptar medidas de prevención y protección de los particulares en sus relaciones entre sí se encuentran condicionados al conocimiento de una situación de riesgo real e inmediato para un individuo o grupo de individuos determinado y a las posibilidades razonables de prevenir o evitar ese riesgo. Es decir, aunque un acto u omisión de un particular tenga como consecuencia jurídica la violación de determinados derechos humanos de otro particular, aquel no es automáticamente 76 Véase CorteIDH, caso González y otras («Campo Algodonero») v. México, Sentencia de 16 de noviembre de 2009, Serie C, nº 205, párr. 388. 100 Francisco Jiménez García atribuible al Estado, pues debe atenderse a las circunstancias particulares del caso y a la concreción de dichas obligaciones de garantía.77 En lo que respecta a la doctrina del control de convencionalidad, con ella se mueve el foco de la responsabilidad desde el Gobierno, principal valedor del cumplimiento de las obligaciones internacionales, hacía el poder judicial al que, en cuanto órgano del Estado, le corresponde un papel primordial y definitivo en el reconocimiento y garantía de los derechos asumidos por el ordenamiento internacional con independencia del sistema monista o dualista que impere en su ordenamiento nacional. Con este fin, el Tribunal de San José de Costa Rica ha establecido en su jurisprudencia que es consciente de que los jueces y tribunales internos están sujetos al imperio de la ley y, por ello, están obligados a aplicar las disposiciones vigentes en el ordenamiento jurídico. Pero cuando un Estado ha ratificado un tratado internacional como la Convención Americana, sus jueces, como parte del aparato del Estado, también están sometidos a ella, lo que les obliga a velar porque los efectos de las disposiciones de la Convención no se vean mermados por la aplicación de leyes contrarias a su objeto y fin, que desde un inicio carecen de efectos jurídicos. En otras palabras, el Poder Judicial debe ejercer un «control de convencionalidad» ex officio entre las normas internas y la Convención Americana, evidentemente en el marco de sus respectivas competencias y de las regulaciones procesales correspondientes. En esta tarea, el Poder Judicial debe tener en cuenta no solamente el tratado, sino también la interpretación que del mismo ha hecho la Corte Interamericana, intérprete última de la Convención Americana.78 No resulta ajena a esta doctrina cierta jurisprudencia nacional relativa a la persecución de los crímenes internacionales. A este respecto se puede destacar la Sentencia de la Corte Suprema de Perú en el asunto del ex presidente Alberto Fujimori de 7 de abril de 200979 en la que se incide sobre el valor interpretativo de la jurisprudencia de la Corte IDH,80 la virtualidad del derecho consuetudinario en la calificación de los actos criminales que justifica su perseguibilidad internacional, la improcedencia de la prescripción y la necesidad imperativa de su castigo,81 declarando la nulidad de toda 77 Cfr. ibíd., párr. 280. Cfr. Caso Almonacid Arellano y otros vs. Chile, Sentencia de 26 de septiembre de 2006 CorteIDH Serie C nº 154, párrs. 123 a 125 y caso La Cantuta vs. Perú, Sentencia de 29 de noviembre de 2006, CorteIDH Serie C nº 162, párrs. 173-189; Caso Boyce y otros vs. Barbados. Excepción Preliminar, Fondo, Reparaciones y Costas. Sentencia de 20 de noviembre de 2007. Serie C No. 169, párr. 78; asunto Radilla Pacheco vs. México, Corte IDH Serie C nº 209 Sentencia de 23 de noviembre de 2009, párr. 339 79 La sentencia puede consultarse en la siguiente dirección: <http://www.derechos.org/nizkor/peru/doc/fujimori.pdf>. 80 Cfr. párr. 107.1. 81 Cfr. párrs.710 y ss. 78 Activismo judicial en la evolución del Derecho Internacional 101 norma de amnistía que pudiera amparar la impunidad de los mismos.82 Asimismo, la Sentencia de la Corte Suprema argentina dictada el 13 de julio de 2007 en el asunto Mazzeo, Julio Lilo y otros que, reiterando su jurisprudencia anterior contraría las leyes de amnistía (Arancibia Clavel y Simon), declara la imposibilidad constitucional de indultar a autores y partícipes de crímenes internacionales, pues dicho acto de gobierno conllevaría de modo inescindible la renuncia a la verdad, a la investigación, a la comprobación de los hechos, a la identificación de sus autores y a la desarticulación de los medios y recursos eficaces para evitar la impunidad.83 En España destacan la Sentencia del Tribunal Constitucional 237/2005 de 26 de septiembre en el denominado asunto del genocidio maya en Guatemala, en la que se reconocía el carácter absoluto y pleno del principio de justicia universal tal y como entonces lo reconocía el artículo 23.4 de la Ley Orgánica del Poder Judicial (actualmente reformada y tal principio limitado), así como la Sentencia del Tribunal Supremo en el mencionado asunto Scilingo dictada en casación el 2 de septiembre de 2007.84 Según esta sentencia, los principios contenidos en el Derecho internacional penal deben ser tenidos en cuenta al proceder a la interpretación y aplicación del Derecho nacional, con mayor motivo cuando aquellos revisten naturaleza de ius cogens. Consiguientemente, tanto las normas de Derecho penal sustantivo como las de orden orgánico o procesal, deben ser interpretadas teleológicamente en coherencia con la necesidad de protección eficaz y con la efectividad de la prohibición de lesión de los derechos humanos conforme al contexto jurídico internacional existente en el momento de la comisión de la conducta criminal.85 5. Conclusiones Los asuntos analizados nos permiten apreciar la relevancia que el «activismo judicial» presenta actualmente en el panorama del Derecho internacional. No se trata de interpretaciones contra legem o apologéticas que pretendan movilizar la normativa internacional en la consecución de ciertos valores o principios meramente auspiciados por el ordenamiento internacional, sino de interpretaciones ajustadas a la normativa internacional vigente tendentes a la consecución de un equilibrio equitativo entre los intereses en presencia salvando la coherencia y la unidad del Derecho internacional. Si bien este ordenamiento se encuentra arraigado en principios 82 Cfr. párrs. 621 y ss. Cfr. párr. 29 de la Sentencia. La jurisprudencia de la Corte Suprema Argentina puede consultarse en <http://www.csjn.gov.ar/>. 84 Tribunal Supremo, Sala de lo Penal, sentencia 798/2007 de 1 de octubre de 2007. 85 Cfr. Fundamento Jurídico 6.3 de la sentencia. 83 102 Francisco Jiménez García estructurales de corte clásico incuestionables (soberanía, relativismo jurídico…), no puede obviar los progresos alcanzados en otros ámbitos que han de resultar necesariamente compatibles con los esquemas jurídicos anteriores. Se trata de significativos avances que quizá nos permitan hablar de la existencia de un incipiente orden público internacional concretado, en este caso, en el ámbito del Derecho internacional de los derechos humanos.
https://openalex.org/W3107799629
http://www.scielo.br/pdf/csp/v36n11/1678-4464-csp-36-11-e00194619.pdf
Portuguese
null
Determinantes do trabalho remunerado entre brasileiros mais velhos usando modelagem de equações estruturais: evidências do ELSI-Brasil
Cadernos de Saúde Pública
2,020
cc-by
9,255
Resumo Correspondência C. M. S. Castro Instituto René Rachou, Fundação Oswaldo Cruz, Belo Horizonte, Brasil. Av. Augusto de Lima 1715, Belo Horizonte, MG 30190-002, Brasil. camilamscastro@gmail.com O objetivo do estudo foi desenvolver um modelo conceitual e explorar asso­ ciações diretas e indiretas entre trabalho remunerado e fatores que operam ao longo da vida em amostra nacional representativa da população brasileira com 50 anos e mais. A análise foi baseada em 8.903 participantes da linha de base do Estudo Longitudinal da Saúde dos Idosos Brasileiros (ELSI- -Brasil). Os fatores de exposição foram sociodemográficos, de saúde, trabalho e interação social. Utilizando modelo de equações estruturais, observou-se que o trabalho remunerado apresentou associação total com a condição social ao longo da vida entre mulheres (coeficiente de padronização – CP = 0,489) e as­ sociação direta com a capacidade para o trabalho entre homens (CP = 0,527) Apenas para as mulheres, associação indireta e negativa foi observada com o esforço físico intenso no trabalho ao longo da vida, via aposentadoria (CP = -0,156). Homens com trabalho remunerado foram mais propensos à partici­ pação social, aferida pelo pertencimento a grupos ou associações (CP = 0,209) Entre as mulheres, essa participação ocorreu por meio de interações com fa­ mília e amigos (CP = 0,047), via capacidade para o trabalho. Tanto entre ho­ mens quanto entre mulheres, a condição de saúde ao longo da vida mostrou associação indireta e positiva (CP = 0,298 homens; CP = 0,142 mulheres) com o trabalho remunerado, via capacidade para o trabalho. Todos os fatores men­ cionados apresentaram associação significativa com o trabalho remunerado Os resultados do estudo mostraram que a participação de homens e mulheres mais velhos no mercado de trabalho ocorre por mecanismos diferentes, princi­ palmente ao considerar os fatores relacionados ao trabalho e interação Envelhecimento; Trabalho; Modelos Estatísticos; Situação Sociecônomica; Interação Social Este é um artigo publicado em acesso aberto (Open Access) sob a licença Creative Commons Attribution, que permite uso, distribuição e reprodu­ ção em qualquer meio, sem restrições, desde que o trabalho original seja corretamente citado. O objetivo do estudo foi desenvolver um modelo conceitual e explorar asso­ ciações diretas e indiretas entre trabalho remunerado e fatores que operam ao longo da vida em amostra nacional representativa da população brasileira com 50 anos e mais. A análise foi baseada em 8.903 participantes da linha de base do Estudo Longitudinal da Saúde dos Idosos Brasileiros (ELSI- -Brasil). ARTIGO ARTICLE Determinantes do trabalho remunerado entre brasileiros mais velhos usando modelagem de equações estruturais: evidências do ELSI-Brasil Determinants of paid work among older Brazilians using structural equation modeling: evidence from the ELSI-Brazil study Determinantes del trabajo remunerado entre adultos mayores brasileños usando modelos de ecuaciones estructurales: evidencias del ELSI-Brasil doi: 10.1590/0102-311X00194619 doi: 10.1590/0102-311X00194619 Envelhecimento; Trabalho; Modelos Estatísticos; Situação Sociecônomica; Interação Social Este é um artigo publicado em acesso aberto (Open Access) sob a licença Creative Commons Attribution, que permite uso, distribuição e reprodu­ ção em qualquer meio, sem restrições, desde que o trabalho original seja corretamente citado. Cad. Saúde Pública 2020; 36(11):e00194619 Introdução O envelhecimento populacional traz desafios significativos para o mercado de trabalho. Como alter­ nativa para minimizar esse desafio, diversos países têm considerado a inclusão das pessoas mais velhas nas atividades 1,2,3. Estudos sobre ocupação utilizam, frequentemente, idade de 45 ou 50 anos como critério base para o termo “trabalhadores mais velhos”. Esse ponto de vista oferece melhores possibilidades de medidas preventivas na saúde dos trabalhadores 4. Em nível mundial, a proporção da participação de adultos mais velhos no mercado de trabalho, em relação ao gênero, é maior entre os homens 5,6. Observa-se que, após um período de declínio constante, a participação dos homens mais velhos na força de trabalho aumentou recentemente na maioria dos países de alta renda da Organização para a Cooperação e Desenvolvimento Econômi­ co (OECD) 5. Concomitantemente, a participação das mulheres de todas as idades no mercado de trabalho vem aumentando tanto em países de alta quanto de média renda 5. No Brasil, verificou-se a predominância dos homens (56,1%) entre as pessoas ocupadas, o que foi confirmado em todas as regiões brasileiras 6. Em relação à análise por grupos de idade, o segmento dos trabalhadores mais velhos foi o que apresentou as maiores taxas de crescimento da ocupação. No terceiro trimestre de 2019, comparado com o mesmo período de 2017 e 2018, observou-se uma expansão da participação dos adultos mais velhos no mercado de trabalho. A participação das pessoas de 40-59 anos de idade passou de 39,9% para 40,4%, e a participação das pessoas com 60 anos e mais passou de 7,6% para 8,3%. Por outro lado, houve uma diminuição da participação no mercado de trabalho das pessoas entre 18-39 anos 6. A participação de adultos mais velhos no mercado de trabalho é um processo complexo, influen­ ciado por experiências passadas e atuais da vida. Pesquisas em países de alta renda têm mostrado que a participação das pessoas mais velhas na força de trabalho não é determinada por um único fator. Características individuais (sexo, idade, status socioeconômico) e da família interagem com os fatores relacionados à organização do trabalho e com os fatores contextuais, como mercado de trabalho e cobertura do sistema previdenciário 2,7. Outro exemplo de complexidade na participação dos mais velhos na força de trabalho é que muitos determinantes desta participação estão sujeitos a mudanças substanciais e, às vezes, temporalmente muito rápidas 7,8. Resumo Os fatores de exposição foram sociodemográficos, de saúde, trabalho e interação social. Utilizando modelo de equações estruturais, observou-se que o trabalho remunerado apresentou associação total com a condição social ao longo da vida entre mulheres (coeficiente de padronização – CP = 0,489) e as­ sociação direta com a capacidade para o trabalho entre homens (CP = 0,527). Apenas para as mulheres, associação indireta e negativa foi observada com o esforço físico intenso no trabalho ao longo da vida, via aposentadoria (CP = -0,156). Homens com trabalho remunerado foram mais propensos à partici­ pação social, aferida pelo pertencimento a grupos ou associações (CP = 0,209). Entre as mulheres, essa participação ocorreu por meio de interações com fa­ mília e amigos (CP = 0,047), via capacidade para o trabalho. Tanto entre ho­ mens quanto entre mulheres, a condição de saúde ao longo da vida mostrou associação indireta e positiva (CP = 0,298 homens; CP = 0,142 mulheres) com o trabalho remunerado, via capacidade para o trabalho. Todos os fatores men­ cionados apresentaram associação significativa com o trabalho remunerado. Os resultados do estudo mostraram que a participação de homens e mulheres mais velhos no mercado de trabalho ocorre por mecanismos diferentes, princi­ palmente ao considerar os fatores relacionados ao trabalho e interação 1 Instituto René Rachou, Fundação Oswaldo Cruz, Belo Horizonte, Brasil. 2 Programa de Pós-graduação em Saúde Púbica, Universidade Federal de Minas Gerais, Belo Horizonte, Brasil. 1 Instituto René Rachou, Fundação Oswaldo Cruz, Belo Horizonte, Brasil. 2 Programa de Pós-graduação em Saúde Púbica, Universidade Federal de Minas Gerais, Belo Horizonte, Brasil. Castro CMS et al. 2 Cad. Saúde Pública 2020; 36(11):e00194619 Variáveis do estudo A variável dependente do estudo foi participação no trabalho remunerado obtida pela pergunta: “O(A) Sr(a). trabalhou remuneradamente nos últimos 30 dias?”. Trabalho remunerado foi considerado como o exercício de qualquer atividade com remuneração em dinheiro, produtos, mercadorias ou benefícios. Essa variável incluiu assalariados, patrões, trabalhador autônomo, trabalho por produção e biscate, pessoas afastadas por motivo de férias, licença por doença, entre outros. Todas as outras condições, quais sejam aposentados, pedintes, estudantes, donas de casa que se dedicam exclusiva­ mente aos afazeres domésticos, pessoas que trabalham sem remuneração ou se dedicam a trabalho voluntário e aqueles que viviam exclusivamente de renda ou ajuda de parentes e/ou conhecidos foram incluídos na categoria não trabalho. As variáveis independentes foram definidas considerando-se os fatores de exposição que operam ao longo da vida e foram classificadas em fatores sociodemográficos e fatores relacionados à saúde, ao trabalho e à interação social. As variáveis sociodemográficas consideradas foram: (1) anos de escolari­ dade da mãe (0-4 anos vs. 5 anos ou mais); (2) local de residência aos 10 anos (rural vs. urbano); (3) idade em que começou a trabalhar (até 17 anos vs. 18 anos e mais); (4) anos de escolaridade do participante (0-7 anos vs. 8 anos ou mais); (5) idade na data da entrevista; (6) posição no domicílio (responsável pelo domicílio ou não); (7) situação conjugal (vive ou não com cônjuge ou companheiro(a); e (8) local de residência atual (rural ou urbano). Para a presente análise foi construída a variável latente condição social ao longo da vida, com base nas variáveis anos de escolaridade da mãe, local de residência aos 10 anos, idade em que começou a trabalhar e anos de escolaridade do participante. Essa variável foi baseada na análise de componentes principais e, posteriormente, foi dicotomizada em acima da média e abaixo deste valor. As variáveis relacionadas à saúde foram: (1) saúde até os 15 anos de idade, aferida pela pergunta: “O(a) Sr(a). diria que a sua saúde, desde o nascimento até os 15 anos de idade, era:” boa (boa, muito boa ou excelente) vs ruim (razoável ou ruim); (2) autoavaliação da saúde atual, definida pela resposta à pergunta: “Em geral, como o(a) Sr(a). avalia a sua saúde?”, categorizada como boa (boa ou muito boa) vs. ruim (regular, ruim ou muito ruim); e (3) número de doenças crônicas, categorizado em pelo menos uma vs duas ou mais. Fonte de dados e amostra Foram usados dados do inquérito da linha de base do Estudo Longitudinal da Saúde dos Idosos Brasileiros (ELSI-Brasil), cuja amostra foi delineada para representar a população brasileira não institucionali­ zada, com idade igual ou superior a 50 anos. A coleta de dados da linha de base da coorte foi condu­ zida entre 2015 e 2016. A amostragem utilizou um delineamento complexo, combinando estratifica­ ção por municípios, setores censitários e domicílios. Todos os residentes nos domicílios selecionados com idade igual ou superior a 50 anos foram elegíveis para entrevista e outros procedimentos. A amostra final foi estimada em 10 mil pessoas (9.412 participaram), residentes em 70 municípios das cinco regiões do país. Mais detalhes estão disponíveis na homepage do ELSI-Brasil (http://elsi.cpqrr. fiocruz.br/) e em publicação anterior 18. O ELSI-Brasil foi aprovado pelo Comitê de Ética em Pesquisa da Fundação Oswaldo Cruz, Minas Gerais (CAAE: 34649814.3.0000.5091). Todos os participantes assinaram o termo de consentimento livre e esclarecido separados para cada procedimento da pesquisa. Introdução Somando-se a isso, alguns estudos também mostraram que fatores biológicos, sociais e ambientais nas diferentes fases da vida podem acumu­ lar-se ao longo do tempo, impactando na tomada de decisão de permanecer trabalhando nas idades avançadas 9,10,11. Existem poucos estudos brasileiros examinando os determinantes da participação de adultos mais velhos no mercado de trabalho. Pesquisa conduzida em São Paulo, no ano 2000, entre idosos (60 anos e mais), mostrou que a idade e a escolaridade diminuem seu poder explicativo para o trabalho remunerado nas idades mais velhas quando são consideradas as condições de saúde 12. Um estudo mais recente, realizado na Região Metropolitana de Belo Horizonte, Minas Gerais, entre adultos mais velhos (50-69 anos de idade), mostrou que a associação entre autoavaliação de saúde e trabalho remunerado foi modificada pela escolaridade, principalmente entre as mulheres 13. Em comparação àqueles com boa autoavaliação de saúde e escolaridade igual ou superior a oito anos (grupo de refe­ rência), a participação no trabalho remunerado foi duas vezes mais baixa entre os homens com pior autoavaliação de saúde, independentemente do nível de escolaridade. Para as mulheres com pior autoavaliação de saúde, a participação no trabalho remunerado foi cerca de nove vezes menor entre aquelas com escolaridade mais baixa 13. Frente a essas evidências, é preciso aprofundar na compreensão dos mecanismos pelos quais homens e mulheres em idades avançadas permanecem trabalhando. O modelo de equação estrutural tem sido cada vez mais utilizado na área da saúde para medir e testar relações em fenômenos com­ plexos que exigem a análise de múltiplas relações simultaneamente 14,15. A vantagem da utilização do modelo de equação estrutural está no fato de que esta técnica estatística estima uma série de equações de regressão múltipla separadas, mas dependentes entre si, baseadas no modelo conceitual proposto pelo pesquisadores 16,17. O presente estudo baseou-se em evidências da literatura nacional e interna­ cional desenvolvidas em estudos longitudinais que investigaram especificamente os determinantes da participação na força de trabalho de pessoas em idades avançadas 2,8. Assim, o objetivo deste estudo foi Cad. Saúde Pública 2020; 36(11):e00194619 DETERMINANTES DO TRABALHO REMUNERADO ENTRE OS MAIS VELHOS 3 desenvolver um modelo conceitual e explorar as associações diretas e indiretas entre fatores sociode­ mográficos, de saúde, trabalho, interação social e a participação no trabalho remunerado de homens e mulheres em amostra nacional representativa da população com 50 anos e mais. Introdução desenvolver um modelo conceitual e explorar as associações diretas e indiretas entre fatores sociode­ mográficos, de saúde, trabalho, interação social e a participação no trabalho remunerado de homens e mulheres em amostra nacional representativa da população com 50 anos e mais. Variáveis do estudo As doenças foram definidas pela resposta à pergunta: “Algum médico já disse que o(a) Sr(a). tinha ‘tal doença’?”, sendo consideradas hipertensão, diabetes, colesterol, acidente vascular cerebral, asma, artrite ou reumatismo, osteoporose, problema crônico de coluna, câncer, doença do Cad. Saúde Pública 2020; 36(11):e00194619 Cad. Saúde Pública 2020; 36(11):e00194619 Castro CMS et al. 4 coração e depressão. Para a presente pesquisa, a variável latente condição de saúde ao longo da vida foi construída baseada na análise de componentes principais, com todas as variáveis descritas anterior­ mente. Em seguida, a variável foi dicotomizada em acima da média e abaixo deste valor. As variáveis relacionadas ao trabalho foram: (1) esforço físico intenso no trabalho ao longo da vida, definido pela informação: “Como o(a) Sr(a). descreveria as exigências físicas do trabalho que exerceu durante a maior parte da vida?”, categorizada como ausência de esforço físico intenso (nunca trabalhou ou ficava sentado a maior parte do tempo, ficava em pé/andando ou o trabalho exigia algum esforço físico) vs. presença de esforço físico intenso (o trabalho exigia esforço físico intenso a maior parte do tempo); (2) capacidade para o trabalho, definida pela pergunta: “Como o(a) Sr(a). avalia a sua capacidade atual para o trabalho?”, categorizada como boa (boa/muito boa) vs. ruim (razoável/ruim/ muito ruim); e (3) aposentadoria (sim/não), definido como aposentado quando o entrevistado decla­ rou receber salário ou pensão do Instituto Nacional do Seguro Social (INSS) ou governo. As variáveis relativas à interação social foram: (1) interação social primária, elaborada baseando-se na informação sobre a frequência com que a pessoa se encontrava ou conversava com filhos, parentes e/ou amigos, sem contar os que moravam com ele, categorizada como três ou mais vezes na semana, uma ou duas vezes por semana, uma ou duas vezes por mês, a cada dois ou três meses, uma ou duas vezes por ano e menos de uma vez por ano ou nunca; e (2) interação social secundária, elaborada com base na informação se o indivíduo tinha, nos últimos 12 meses, participado de atividades sociais organizadas ou associações civis, conselhos, lideranças comunitárias, cooperativas, partidos políticos etc, categorizada como não vs. sim. Para a interação social primária, as opções três ou mais vezes na semana e uma ou duas vezes por semana foram categorizadas em interação social elevada. Para a interação secundária, a categoria “sim” foi classificada em interação social elevada. Modelo conceitual O modelo proposto foi desenvolvido tendo como base dois modelos teóricos da literatura internacio­ nal, o lidA Cohort Study (German Cohort Study on Work, Age, Health and Work Participation) 2 e o Study on Transitions in Employment, Ability and Motivation 8, com o intuito de explorar as relações diretas e indiretas entre os fatores associados à participação no trabalho remunerado de homens e mulheres brasileiros com 50 anos e mais. A condição social ao longo da vida ocupou a posição mais distal do modelo; as variáveis intermediárias foram condição de saúde ao longo da vida, esforço físico inten­ so no trabalho ao longo da vida, aposentadoria e interação social e, por último, a capacidade para o trabalho foi considerada a variável proximal na associação com o trabalho remunerado. A idade na data da entrevista foi usada como variável de ajuste para todas as associações do modelo. As variáveis posição no domicílio, situação conjugal e local de residência atual foram consideradas como variáveis de ajuste para o desfecho (trabalho remunerado). Na Figura 1, as formas circulares ou elípticas repre­ sentam as variáveis latentes e os retângulos as variáveis observadas. As setas indicam as relações entre as variáveis, podendo ser diretas ou indiretas. O modelo proposto assume que as variáveis condição social ao longo da vida, condição de saúde ao longo da vida, esforço físico intenso no trabalho ao longo da vida, capacidade para o trabalho, aposen­ tadoria, interação social primária e interação social secundária estão associadas de forma direta com a participação no trabalho remunerado. Além disso, a condição social ao longo da vida está associada indiretamente ao trabalho remunerado, pelas vias da condição de saúde, trabalho e interação social. Variáveis do estudo No presente artigo usamos os termos “interação primária”, que é uma proxy para o conceito de “laço forte”, e “interação secundária”, que é uma proxy para o conceito de “laço fraco” proposto por Granovetter 19. Figura 1 Modelo conceitual desenvolvido para explorar as inter-relações entre as variáveis associadas à participação no trabalho remunerado de homens e mulheres com 50 anos ou mais. Estudo Longitudinal da Saúde dos Idosos Brasileiros (ELSI-Brasil), 2015-2016. Fonte: elaboração própria dos autores (2018). APOS: aposentadoria; CIVIL: situação conjugal; CS: condição social ao longo da vida (anos de escolaridade da mãe, local de residência aos 10 anos, idade em que começou a trabalhar, anos de escolaridade do participante); CT: capacidade para o trabalho; IDADE: idade na data da entrevista; OCUP: esforço físico intenso no trabalho ao longo da vida; PRIMÁRIA: interação social primária; SAÚDE: condição de saúde ao longo da vida (saúde até os 15 anos de idade, autovaliação da saúde atual, número e doenças crônicas); SECUNDÁRIA: interação social secundária; RESP: posição no domicílio; RESID: local de residência atual; TRABALHO: trabalho remunerado. Fonte: elaboração própria dos autores (2018). Fonte: elaboração própria dos autores (2018). APOS: aposentadoria; CIVIL: situação conjugal; CS: condição social ao longo da vida (anos de escolaridade da mãe, local de residência aos 10 anos, idade em que começou a trabalhar, anos de escolaridade do participante); CT: capacidade para o trabalho; IDADE: idade na data da entrevista; OCUP: esforço físico intenso no trabalho ao longo da vida; PRIMÁRIA: interação social primária; SAÚDE: condição de saúde ao longo da vida (saúde até os 15 anos de idade, autovaliação da saúde atual, número e doenças crônicas); SECUNDÁRIA: interação social secundária; RESP: posição no domicílio; RESID: local de residência atual; TRABALHO: trabalho remunerado. mensuradas 20. Nas análises das estimativas padronizadas para a construção das variáveis latentes deste estudo (condição social ao longo da vida e condição de saúde ao longo da vida) considerou-se a carga fatorial e os autovalores. Todas as variáveis latentes resultaram de fatores com autovalores maiores do que 1,00 e todos os itens dos fatores apresentaram cargas fatoriais maiores do que 0,70. mensuradas 20. Nas análises das estimativas padronizadas para a construção das variáveis latentes deste estudo (condição social ao longo da vida e condição de saúde ao longo da vida) considerou-se a carga fatorial e os autovalores. Todas as variáveis latentes resultaram de fatores com autovalores maiores do que 1,00 e todos os itens dos fatores apresentaram cargas fatoriais maiores do que 0,70. O modelo de equação estrutural também permite a estimação de múltiplas funções lineares, incluindo efeitos diretos e indiretos, característica não permitida pelos métodos tradicionais de regressão. Análise dos dados Na análise descritiva dos participantes do estudo foi usado o teste qui-quadrado de Pearson, para examinar diferenças entre homens e mulheres. O modelo de equação estrutural foi usado para ana­ lisar, simultaneamente, os fatores associados ao trabalho remunerado. Esse método permite testar a validade de um modelo conceitual baseado em um conjunto de variáveis observáveis e latentes. Uma variável latente ou constructo é aquela que não pode ser observada diretamente, com base nas unidades de análise em estudo, mas supostamente está relacionada a muitas variáveis que podem ser Cad. Saúde Pública 2020; 36(11):e00194619 DETERMINANTES DO TRABALHO REMUNERADO ENTRE OS MAIS VELHOS 5 ç p p APOS: aposentadoria; CIVIL: situação conjugal; CS: condição social ao longo da vida (anos de escolaridade da mãe, local de residência aos 10 anos, idade em que começou a trabalhar, anos de escolaridade do participante); CT: capacidade para o trabalho; IDADE: idade na data da entrevista; OCUP: esforço físico intenso no trabalho ao longo da vida; PRIMÁRIA: interação social primária; SAÚDE: condição de saúde ao longo da vida (saúde até os 15 anos de idade, autovaliação da saúde atual, número e doenças crônicas); SECUNDÁRIA: interação social secundária; RESP: posição no domicílio; RESID: local de residência atual; TRABALHO: trabalho remunerado. Resultados A amostra final deste estudo foi composta por 8.903 participantes do inquérito de base do ELSI-Bra­ sil, ou seja, aquelas pessoas que possuíam informações completas para todas as variáveis. Desses, 4.961 (56%) eram mulheres e 3.942 (44%) eram homens. O trabalho remunerado foi informado por 31,3% dos participantes, sendo maior para o sexo masculino (39,6% em relação a 24,2% para mulheres; p < 0,001). Na Tabela 1, são mostradas as características dos participantes do estudo, segundo o gênero. Foram observadas diferenças estatisticamente significantes entre homens e mulheres para residência urbana aos 10 anos, escolaridade do indivíduo, idade em que começou a trabalhar, idade na data da entrevista, posição no domicílio, situação conjugal, condição de saúde ao longo da vida, número de doenças crônicas, esforço físico intenso no trabalho ao longo da vida e interação social primária. Entre os homens, o trabalho remunerado apresentou associação significativa com condição social ao longo da vida, condição de saúde ao longo da vida, capacidade para o trabalho e interação social secundária. A situação conjugal e a idade na data da entrevista compuseram o modelo final como variáveis de ajuste. Para as mulheres, o trabalho remunerado apresentou associação significativa com condição social ao longo da vida, condição de saúde ao longo da vida, interação social primária, esfor­ ço físico intenso no trabalho ao longo da vida, capacidade para o trabalho e aposentadoria. A idade na data da entrevista compôs o modelo final como variável de ajuste. Os modelos conceituais finais das inter-relações entre os fatores associados à participação no trabalho remunerado, segundo o gênero, estão representados na Figura 2. Na Tabela 2, são apresentadas as OR (IC95%) e os coeficientes padronizados (CP) do modelo de equação estrutural das variáveis que compuseram o modelo final dos homens e das mulheres. Na Tabela 3, estão apresentadas as associações diretas, indiretas e totais das variáveis associadas ao trabalho remunerado para homens e mulheres. De modo geral, os resultados mostraram maior associação entre a participação no trabalho remunerado das mulheres com a condição social ao longo da vida, apresentando um coeficiente padronizado (CP) total de 0,489, e a participação dos homens registrou maior associação com a capacidade para o trabalho (CP = 0,527). Entre os homens, a con­ dição social ao longo da vida apresentou associação indireta e positiva (CP = 0,352) com o trabalho remunerado, principalmente via capacidade para o trabalho (CP = 0,186). Figura 1 O método combina aspectos de regressão múltipla e análise fatorial para estimar as relações entre cada variável dependente (endógena) e as variáveis explicativas (exógenas). Para esta análise, as variáveis consideradas como endógenas foram condição de saúde ao longo da vida, esforço físico intenso no trabalho ao longo da vida, aposentadoria, capacidade para o trabalho, interação social primária, interação social secundária e trabalho remunerado. Neste estudo, utilizou-se uma versão específica do modelo de equação estrutural para dados binários proposta por Kupek 15. Realizou-se inicialmente regressões logísticas com todas as variáveis do modelo conceitual. Num segundo momento, as variáveis com valor de p > 0,05 foram excluídas do modelo. Logo após essa etapa, realizou-se novamente as estimações das regressões logísticas do modelo somente com as variáveis que foram significativas. Na terceira etapa, os coeficientes do modelo de equação estrutural foram calculados com base nas odds ratio (OR) encontradas no segundo passo. Na quarta etapa, os coeficientes menores ou iguais a 0,18 foram excluídos do modelo. Após o desenvolvimento do modelo final foram calculados os coeficientes das associações indiretas e total, denominados coeficientes padronizados. Esse cálculo foi realizado baseando-se na transformação de Cad. Saúde Pública 2020; 36(11):e00194619 Cad. Saúde Pública 2020; 36(11):e00194619 Castro CMS et al. 6 Yule. Esse método aproxima a matriz dos coeficientes de correlação de Pearson das OR pela fórmula (OR – 1)/(OR + 1) 15. Quanto maior o valor do coeficiente padronizado, mais forte é a associação entre a variável explicativa e a variável dependente. Para determinar se o modelo apresentou bom ajuste foram considerados os seguintes critérios: (a) a qualidade de ajuste de cada equação de regressão logística, com base nos valores de p, nos R2 e na comparação dos qui-quadrados dos modelos; (b) foram incluídas nos modelos de equação estrutural finais apenas as variáveis com coeficientes maiores ou iguais a 0,18. Decidiu-se assumir uma postura mais conservadora para que o modelo fosse mais parcimonioso. A busca da parcimônia nesse modelo se justifica pelo fato de não ser possível o cálculo de medidas gerais de ajuste, pois o modelo utilizado proposto por Kupek 15 baseia-se na transformação de estimadores de regressão logística (especifica­ mente, as razões de chance) em um modelo de equações estruturais. Assim, só é possível ter indicado­ res de ajuste para cada equação isoladamente. Todas as análises foram realizadas separadamente para homens e mulheres. Figura 1 As estimativas foram realizadas usando-se os procedimentos para amostras complexas do programa Stata 14.1 (https:// www.stata.com), de forma a considerar o efeito do delineamento do estudo e os pesos dos indivíduos. Resultados Para esse grupo, a condição social ao longo da vida também registrou associação indireta e positiva com o trabalho remunerado pela via da condição de saúde ao longo da vida e capacidade para o trabalho (CP = 0,111). Entre as mulheres, a condição social ao longo da vida apresentou associação total (CP = 0,489) e direta (CP = 0,257) positivas com o trabalho remunerado. Além disso, apresentou associação indireta e positiva (CP = 0,232), principalmente via esforço físico intenso no trabalho ao longo da vida e aposentadoria (CP = 0,076). Entre homens e mulheres a condição de saúde ao longo da vida registrou associação indireta e positiva (CP = 0,298 entre homens; CP = 0,142 entre mulheres) com o trabalho remunerado, via Cad. Saúde Pública 2020; 36(11):e00194619 DETERMINANTES DO TRABALHO REMUNERADO ENTRE OS MAIS VELHOS 7 7 Tabela 1 Distribuição do trabalho remunerado e demais características da população com 50 anos ou mais, segundo o gênero. Estudo Longitudinal da Saúde dos Idosos Brasileiros (ELSI-Brasil), 2015-2016. Resultados Variáveis Total Homens Mulheres Valor de p ** % * IC95% % * IC95% % * IC95% Trabalho remunerado 31,3 28,2-34,5 39,6 36,0-43,4 24,2 21,7-26,8 < 0,001 Melhor condição social ao longo da vida 41,1 38,1-44,2 41,6 38,1-45,3 40,6 37,5-43,9 0,516 Anos de escolaridade da mãe (5+ anos) 7,1 6,1-8,4 7,9 6,4-9,7 6,5 5,4-7,8 0,117 Residência urbana aos 10 anos 39,7 36,6-42,8 38,1 34,9-41,4 41,0 37,5-44,6 0,043 Anos de escolaridade do participante (8+ anos) 35,7 32,9-38,7 37,4 34,0-40,9 34,3 31,4-37,3 0,033 Idade em que começou a trabalhar (18+ anos) 17,5 15,4-19,8 12,1 10,5-13,8 22,3 19,7-25,2 < 0,001 Idade na data da entrevista (65+ anos) 35,9 32,2-39,7 33,3 28,7-38,3 38,1 35,0-41,3 0,006 Responsável pelo domicílio 73,2 71,4-75,0 86,7 84,5-88,7 61,7 57,9-65,4 < 0,001 Vive com cônjuge/companheiro(a) 63,5 60,5-66,3 75,2 72,5-77,7 53,5 50,4-56,5 < 0,001 Residência atual urbana 84,7 79,4-88,8 84,8 79,2-89,1 84,6 79,2-88,8 0,855 Melhor condição de saúde ao longo da vida 49,3 46,9-51,8 52,6 49,6-55,4 46,6 43,9-49,3 < 0,001 Saúde boa até os 15 anos 78,0 76,4-79,6 78,8 76,9-80,7 77,3 75,4-79,1 0,139 Nenhuma ou uma doença crônica *** 39,1 36,9-41,3 49,7 47,2-52,1 30,1 28,0-32,3 < 0,001 Autoavaliação da saúde atual como boa 43,7 41,3-46,2 43,6 40,3-46,9 43,8 41,4-46,3 0,873 Esforço físico intenso no trabalho ao longo da vida 19,3 17,1-21,8 27,8 24,6-31,2 11,9 9,8-14,4 < 0,001 Capacidade para o trabalho boa 48,4 46,0-50,8 49,0 45,9-52,0 47,8 45,5-50,2 0,381 Aposentadoria 54,4 51,3-57,5 54,3 50,4-58,1 54,6 51,0-58,1 0,877 Interação social primária elevada 48,4 46,4-50,5 44,6 42,2-47,1 51,6 49,2-54,1 < 0,001 Interação social secundária elevada 50,3 47,2-53,5 49,0 45,2-52,8 51,5 48,3-54,6 0,087 Total 8.903 3.942 4.961 IC95%: intervalo de 95% de confiança. * Porcentagens ponderadas pelos parâmetros amostrais; ** Teste qui-quadrado de Pearson ou teste t de student com nível de significância ≤ 0,05; para diferenças entre gêneros; *** Diagnóstico médico de hipertensão, diabetes, colesterol, acidente vascular cerebral, asma, artrite ou reumatismo, osteoporose, problema crônico de coluna, câncer, doença do coração e depressão. Distribuição do trabalho remunerado e demais características da população com 50 anos ou mais, segundo o gênero. Estudo Longitudinal da Saúde dos Idosos Brasileiros (ELSI-Brasil), 2015-2016. erado e demais características da população com 50 anos ou mais, segundo o gênero. Estudo Longitudinal da Saúde dos capacidade para o trabalho. Ressalta-se que a força da associação para o grupo dos homens foi o dobro da magnitude da associação do grupo das mulheres. capacidade para o trabalho. Ressalta-se que a força da associação para o grupo dos homens foi o dobro da magnitude da associação do grupo das mulheres. Em relação à interação social, a participação mas­ culina no trabalho remunerado esteve associada direta e positivamente à interação social secundária (CP = 0,209), já a participação feminina mostrou associação indireta e positiva com a interação social primária (CP = 0,047). Apenas para o grupo das mulheres, aposentadoria apresentou associação direta e negativa (CP = -0,439) com o trabalho remunerado. Além disso, o trabalho remunerado também esteve associado indireta e negativamente com esforço físico intenso no trabalho ao longo da vida, via aposentadoria (CP = -0,156). Resultados Em relação à interação social, a participação mas­ culina no trabalho remunerado esteve associada direta e positivamente à interação social secundária (CP = 0,209), já a participação feminina mostrou associação indireta e positiva com a interação social primária (CP = 0,047). Apenas para o grupo das mulheres, aposentadoria apresentou associação direta e negativa (CP = -0,439) com o trabalho remunerado. Além disso, o trabalho remunerado também esteve associado indireta e negativamente com esforço físico intenso no trabalho ao longo da vida, via aposentadoria (CP = -0,156). Cad. Saúde Pública 2020; 36(11):e00194619 Castro CMS et al. 8 Figura 2 Figura 2 Resultado do modelo de equação estrutural final com coeficientes padronizados dos fatores associados à participação no trabalho remunerado, segundo o gênero. Estudo Longitudinal da Saúde dos Idosos Brasileiros (ELSI-Brasil), 2015-2016. Fonte: elaboração própria dos autores (2018). APOS: aposentadoria; CIVIL: situação conjugal; CS: condição social ao longo da vida; CT: capacidade para o trabalho; IDADE: idade na data da entrevista; OCUP: esforço físico intenso no trabalho ao longo da vida; SAÚDE: condição de saúde ao longo da vida; PRIMÁRIA: interação social primária; SECUNDÁRIA: interação social secundária; TRABALHO: trabalho remunerado. Nota: N = 8.903 (3.942 homens e 4.961 mulheres). 2a) Homens 2b) Mulheres 2a) Homens 2a) Homens 2b) Mulheres 2b) Mulheres Fonte: elaboração própria dos autores (2018). Fonte: elaboração própria dos autores (2018). APOS: aposentadoria; CIVIL: situação conjugal; CS: condição social ao longo da vida; CT: capacidade para o trabalho; IDADE: idade na data da entrevista; OCUP: esforço físico intenso no trabalho ao longo da vida; SAÚDE: condição de saúde ao longo da vida; PRIMÁRIA: interação social primária; SECUNDÁRIA: interação social secundária; TRABALHO: trabalho remunerado. Nota: N = 8.903 (3.942 homens e 4.961 mulheres). Fonte: elaboração própria dos autores (2018). APOS: aposentadoria; CIVIL: situação conjugal; CS: condição social ao longo da vida; CT: capacidade para o trabalho; IDADE: idade na data da entrevista; OCUP: esforço físico intenso no trabalho ao longo da vida; SAÚDE: condição de saúde ao longo da vida; PRIMÁRIA: interação social primária; SECUNDÁRIA: interação social secundária; TRABALHO: trabalho remunerado. Nota: N = 8.903 (3.942 homens e 4.961 mulheres). Cad. Saúde Pública 2020; 36(11):e00194619 Resultados Resultados da regressão logística multivariada e respectivo coeficiente de padronização do modelo de equação estrutural para cada variável endógena, segundo o gênero. Estudo Longitudinal da Saúde dos Idosos Brasileiros (ELSI-Brasil), 2015-2016. ca multivariada e respectivo coeficiente de padronização do modelo de equação estrutural para cada variável endógena, tudinal da Saúde dos Idosos Brasileiros (ELSI-Brasil), 2015-2016. Resultados da regressão logística multivariada e respectivo coeficiente de padronização do modelo de equação estrutura segundo o gênero. Estudo Longitudinal da Saúde dos Idosos Brasileiros (ELSI-Brasil), 2015-2016. CP: coeficiente padronizado; IC95%: intervalo de 95% de confiança; OR: odds ratio. Nota: N = 8.903 (3.942 homens e 4.961 mulheres). Resultados ç p p APOS: aposentadoria; CIVIL: situação conjugal; CS: condição social ao longo da vida; CT: capacidade para o trabalho; IDADE: idade na data da entrevista; OCUP: esforço físico intenso no trabalho ao longo da vida; SAÚDE: condição de saúde ao longo da vida; PRIMÁRIA: interação social primária; SECUNDÁRIA: interação social secundária; TRABALHO: trabalho remunerado. h lh Cad. Saúde Pública 2020; 36(11):e00194619 DETERMINANTES DO TRABALHO REMUNERADO ENTRE OS MAIS VELHOS 9 Tabela 2 Resultados da regressão logística multivariada e respectivo coeficiente de padronização do modelo de equação estrutural para cada variável endógena, segundo o gênero. Estudo Longitudinal da Saúde dos Idosos Brasileiros (ELSI-Brasil), 2015-2016. Variáveis endógenas * Variáveis exógenas ** Homens Mulheres OR *** IC95% CP # OR *** IC95% CP # Condição de saúde ao longo da vida Condição social ao longo da vida 2,19 1,86-2,58 0,37 1,92 1,65-2,24 0,32 Esforço físico intenso no trabalho ao longo da vida Condição social ao longo da vida - - - 0,24 0,17-0,33 -0,61 Aposentadoria Esforço físico intenso no trabalho ao longo da vida - - - 2,09 1,70-2,58 0,36 Idade na data da entrevista - - - 11,69 9,59- 14,25 0,84 Capacidade para o trabalho Condição social ao longo da vida 2,09 1,82-2,40 0,35 1,99 1,66-2,38 0,33 Condição de saúde ao longo da vida 3,61 3,06-4,26 0,57 3,89 3,23-4,56 0,59 Interação social primária - - - 1,49 1,26-1,77 0,20 Interação social primária Condição social ao longo da vida - - - 1,69 1,41-2,02 0,26 Interação social secundária Condição social ao longo da vida 1,71 1,42-2,05 0,26 - - Trabalho remunerado Condição social ao longo da vida - - - 1,69 1,40-2,03 0,26 Aposentadoria - - - 0,39 0,32-0,47 -0,44 Capacidade para o trabalho 3,23 2,71-3,86 0,53 1,63 1,37-1,95 0,24 Interação social secundária 1,53 1,30-1,81 0,21 - - - Vive com cônjuge/companheiro(a) 1,47 1,17-1,86 0,19 - - - Idade na data da entrevista 0,46 0,34-0,61 -0,37 0,34 0,27-0,42 -0,49 CP: coeficiente padronizado; IC95%: intervalo de 95% de confiança; OR: odds ratio. Nota: N = 8.903 (3.942 homens e 4.961 mulheres). * Variáveis endógenas: variáveis dependentes para cada regressão logística; ** Variáveis exógenas: variáveis explicativas para cada regressão logística; *** OR ajustada por todas as variáveis listadas como explicativas pela regressão logística, com variância robusta; # CP = (OR – 1)/(OR + 1). Tabela 3 Resultados do modelo de equação estrutural com as associações diretas, indiretas e totais das variáveis associadas ao trabalho remunerado, segundo o gênero. Estudo Longitudinal da Saúde dos Idosos Brasileiros (ELSI-Brasil), 2015-2016. Associação das variáveis Homens Mulheres CP associação direta CP Associação indireta CP Associação total CP Associação direta CP Associação indireta CP Associação total * CS → TR - - 0,352 0,257 0,232 0,489 CS → CT → TR - 0,186 - - 0,079 - CS → OCUP → APOS → TR - - - - 0,076 - CS → SAÚDE → CT → TR - 0,111 - - 0,045 - CS → PRIMÁRIA → CT → TR - - - - 0,012 - CS → SECUNDÁRIA → TR - 0,055 - - - - SAÚDE → CT → TR - 0,298 - - 0,142 - CT → TR 0,527 - - 0,249 - - APOS → TR - - - -0,439 - - OCUP → APOS → TR - - - - -0,156 - PRIMÁRIA → CT → TR - - - - 0,047 - SECUNDÁRIA → TR 0,209 - - - - -i APOS: aposentadoria; CP: coeficiente padronizado **; CS: condição social ao longo da vida; CT: capacidade para o trabalho; APOS: aposentadoria; CP: coeficiente padronizado **; CS: condição social ao longo da vida; CT: capacidade para o trabalho; OCUP: esforço físico intenso no trabalho ao longo da vida; PRIMÁRIA: interação social primária; SAÚDE: condição de saúde ao longo da vida; SECUNDÁRIA: interação social secundária; TR: trabalho remunerado. Nota: N = 8.903 (3.942 homens e 4.961 mulheres). * Associação total = associação direta + associação indireta; ** CP = (OR – 1)/(OR + 1). * Associação total = associação direta + associação indireta; ** CP = (OR – 1)/(OR + 1). entre fatores relacionados ao trabalho (esforço físico intenso no trabalho ao longo da vida e aposen­ tadoria) e participação no trabalho remunerado. A condição social ao longo da vida parece afetar a participação no trabalho remunerado de homens e mulheres em idades avançadas 1. Uma pesquisa conduzida na Região Metropolitana de Belo Horizonte 21 mostrou que para homens e mulheres, tanto o rendimento, quanto o nível de esco­ laridade dos pais garante a educação dos filhos. Discussão Os resultados deste estudo mostraram que a participação no trabalho remunerado de homens e mulheres com 50 anos ou mais ocorre por mecanismos diferentes. A participação feminina foi influenciada diretamente pela condição social ao longo da vida, capacidade para o trabalho e aposen­ tadoria, e indiretamente pela condição de saúde ao longo da vida, esforço físico intenso no trabalho ao longo da vida e interação social primária. Por outro lado, a participação masculina no trabalho remu­ nerado foi influenciada diretamente pela capacidade para o trabalho e interação social secundária, e indiretamente pela condição social ao longo da vida e condição de saúde ao longo da vida. Segundo os resultados do modelo de equação estrutural, a variável que apresentou maior força de associação com a participação feminina no trabalho remunerado foi a condição social ao longo da vida, já que para os homens foi a capacidade para o trabalho. Para ambos os gêneros, a condição de saúde ao longo da vida apresentou associação indireta e positiva com o trabalho remunerado, mas a magnitude da força da associação para os homens foi duas vezes maior que para as mulheres. Os resultados do modelo de equação estrutural identificaram ainda diferenças de gênero em relação à interação social, com a participação dos homens no trabalho remunerado caracterizada pelo engajamento em atividades sociais organizadas ou associações civis, e a participação das mulheres caracterizada pela relação com parentes e amigos próximos. Além disso, somente entre as mulheres observou-se associação negativa Cad. Saúde Pública 2020; 36(11):e00194619 Cad. Saúde Pública 2020; 36(11):e00194619 Castro CMS et al. 10 Tabela 3 O que pode ser explicado pelo fato de que os homens tendem a exercer um trabalho mais desgastante fisicamente ao longo da vida, quando comparados às mulheres. Segundo um estudo baseado na teoria do capital social 26, o fato de um indivíduo pertencer a grupos ou associações (interação social secundária) afeta positivamente a probabilidade de ter uma maior participação no trabalho remunerado. Relacionamentos baseados em laços fracos (secundá­ rios), como aqueles encontrados entre os participantes de um grupo ou associação, são importantes pois conectam as pessoas a uma maior gama de informações e conhecimentos relativos a emprego. Apesar dos amigos próximos de um indivíduo serem mais motivados a ajudá-lo, os laços fracos estão estruturalmente localizados de tal modo a serem mais úteis no processo de busca por emprego 26. O presente estudo acrescentou a esses achados, uma vez que mostrou que a participação dos homens no trabalho remunerado está direta e positivamente associada à interação social secundária. Ao passo que, entre as mulheres, ter contato mais frequente com família e amigos (interação social primária) aumenta a probabilidade da participação feminina no trabalho remunerado, via capacidade para o trabalho 26. Parece que, para as mulheres, o contexto social formado pela família e amigos pode ser importante para a percepção da sua capacidade para o trabalho e consequente participação no traba­ lho remunerado. Isso, provavelmente, deve-se ao fato de que no modelo de família patriarcal, que é o predominante, o funcionamento da família é uma atribuição feminina. Uma interação mais forte das mulheres dentro de redes primárias pode, assim, garantir às mulheres de maior idade a segurança de que a funcionalidade familiar pode acontecer mesmo com sua ausência mais prolongada do ambiente doméstico. Nesse caso, não se pode descartar a possibilidade de causalidade reversa, uma vez que a interação social pode ser causa ou consequência da maior participação no trabalho remunerado. Somente entre as mulheres, a associação entre condição social ao longo da vida e trabalho remu­ nerado foi parcialmente mediada pelo esforço físico intenso no trabalho ao longo da vida e pela apo­ sentadoria. Mulheres que exerceram esforço físico intenso no trabalho ao longo da vida apresentaram maior probabilidade de estar aposentada e, consequentemente, menor probabilidade de participar do trabalho remunerado. Tabela 3 No entanto, a participação das mulheres no trabalho remunerado, em qualquer idade, depende mais do seu nível socioeconômico, em particular da esco­ laridade, em comparação ao nível socioeconômico dos pais (renda e escolaridade). O presente estudo mostrou que a condição social ao longo da vida apresentou associação direta com o trabalho remu­ nerado apenas entre as mulheres, além de registrar associação indireta via esforço físico intenso no trabalho ao longo da vida e aposentadoria. Esses resultados indicam a importância da condição social ao longo da vida para a participação feminina no trabalho remunerado. Independentemente de outros fatores, as mulheres com melhor condição social ao longo da vida apresentam maior probabilidade de participar do trabalho remunerado em idades avançadas. Além disso, os resultados evidenciam que mulheres com melhor condição social ao longo da vida apresentam menor probabilidade de exercer esforço físico intenso no trabalho ao longo da vida, levando à menor probabilidade de aposentadoria e, consequentemente, maior probabilidade de participar do trabalho remunerado. Em relação aos homens a condição social ao longo da vida apresentou somente associação indireta, via condição de saúde ao longo da vida e capacidade para o trabalho. Os resultados sugerem que homens com melhor condição social ao longo da vida registram melhor condição de saúde ao longo da vida, percepção da capacidade para o trabalho como boa e maior probabilidade de participar do trabalho remunerado. A saúde é considerada o principal fator determinante da capacidade para o trabalho 4,22, e um nível de saúde ruim aumenta a probabilidade de deterioração desta capacidade 23. Estudos mostram que independentemente de como a saúde é medida, seja objetiva ou subjetivamente 24, ela continua sendo um fator determinante da participação no trabalho remunerado em idades avançadas 25. Cad. Saúde Pública 2020; 36(11):e00194619 Cad. Saúde Pública 2020; 36(11):e00194619 DETERMINANTES DO TRABALHO REMUNERADO ENTRE OS MAIS VELHOS 11 Os resultados do presente estudo sugerem que, tanto homens quanto mulheres com melhores con­ dições de saúde ao longo da vida tendem a perceber sua capacidade para o trabalho como boa, apre­ sentando maior probabilidade de participar do trabalho remunerado. Os resultados do modelo de equação estrutural mostraram ainda que, para os homens, a força da associação entre condição de saúde ao longo da vida e participação no trabalho remunerado foi o dobro da magnitude da associação para as mulheres. Tabela 3 Há evidências de que os fatores psicossociais e físicos do trabalho, como alta demanda física e baixo controle, podem mediar a associação entre posição social de um indivíduo e o risco de aposentadoria por invalidez 2. Os resultados deste estudo reforçam a hipótese de que o traba­ lho remunerado pode representar uma sobrecarga para a saúde das mulheres quando a qualidade do emprego é baixa, e estar associada ao trabalho doméstico para a própria família 2,27. A principal vantagem deste estudo é a sua grande base populacional, representativa da população brasileira com 50 anos ou mais. Ao nosso conhecimento, este é o primeiro estudo baseado em amos­ tra nacional a analisar as relações entre os determinantes da participação no trabalho remunerado entre adultos mais velhos. Outra vantagem do estudo é o uso do modelo de equações estruturais, que permite analisar, simultaneamente, os fatores associados ao trabalho remunerado. Entre as limitações do estudo podemos citar o viés de informação e o viés de desejabilidade social, isto é, o desejo de transmitir uma imagem social e culturalmente aceitável. Outra limitação diz respeito à sua natureza transversal, que não permite estabelecer associações temporais para as variáveis relativas às condições atuais. Finalmente, uma terceira limitação do estudo é que a especificação do modelo final analisado não contou com uma medida geral de ajuste. Como recomendações finais, os resultados do modelo de equação estrutural mostraram a com­ plexidade da participação no trabalho remunerado de pessoas com 50 anos ou mais, principalmente em relação às diferenças de gênero. Para o grupo das mulheres, investimentos na condição social ao longo da vida, em particular na escolaridade, podem contribuir para aumentar a participação nas atividades econômicas. Além disso, estudos sobre a participação feminina no mercado de trabalho devem considerar o tipo de trabalho ao longo da vida e entender melhor o papel da aposentadoria na vida das mulheres. Por outro lado, a participação dos homens mais velhos no mercado de trabalho depende mais de melhorias nas condições de saúde ao longo da vida e na capacidade para o trabalho. Pesquisas que analisam a participação de adultos mais velhos no mercado de trabalho devem abordar Cad. Saúde Pública 2020; 36(11):e00194619 Cad. Saúde Pública 2020; 36(11):e00194619 Castro CMS et al. 12 Castro CMS et al. 12 uma perspectiva do curso de vida, considerando os fatores nos níveis micro, meso e macro. Colaboradores Todos os autores contribuíram igualmente para todas as fases do estudo e na elaboração e revisão do manuscrito. 1. Camarano AA, Kanso S, Fernandes D. Menos jovens e mais idosos no mercado de trabalho. In: Camarano AA, organizador. Novo regime demográfico: uma nova relação entre popula­ ção e desenvolvimento? Rio de Janeiro: Insti­ tuto de Pesquisa Econômica Aplicada; 2014. p. 377-406. Tabela 3 Além disso, devem verificar se as relações entre os fatores associados a essa participação se mantêm ao longo do tempo. Concluindo, apesar de diferenças importantes nos determinantes do trabalho remunerado entre homens e mulheres mais velhos, as condições de saúde ao longo da vida apresentaram associações indiretas e positivas em ambos os gêneros, via capacidade para o trabalho. Esses resultados sugerem que melhorias nas condições de saúde em todas as idades têm o potencial de aumentar a participação de adultos mais velhos brasileiros no mercado de trabalho. Informações adicionais 2. Hasselhorn HM, Apt W. Understanding em­ ployment participation of older workers: cre­ ating a knowledge base for future labour mar­ ket challenges. http://www.jp-demographic. eu/ (acessado em 10/Mai/2018). ORCID: Camila Menezes Sabino de Castro (0000- 0002-5383-9796); Maria Fernanda Lima-Costa (0000-0002-3474-2980); Jorge Alexandre Barbo­ sa Neves (0000-0003-4141-2282); Fabíola Bof de Andrade (0000-0002-3467-3989); Rosana Ferreira Sampaio (0000-0002-4775-9650). 3. 3. Nonato F, Pereira RHM, Nascimento PAMM, Araújo TC. O perfil da força de trabalho bra­ sileira: trajetórias e perspectivas. Boletim de mercado de trabalho – conjuntura e análise. Rio de Janeiro: Instituto de Pesquisa Econômi­ ca Aplicada; 2012. DETERMINANTES DO TRABALHO REMUNERADO ENTRE OS MAIS VELHOS 13 13 8. Ybema, JF, Geuskens GA, van den Heuvel S, Wind A, Leijten FRM, et al. Study on Transi­ tions in Employment, Ability and Motivation (STREAM): the design of a four-year longitu­ dinal cohort study among 15.118 persons aged 45 to 64 years. British Journal of Medicine & Medical Research 2014; 4:1383-99. 18. Lima-Costa MF, Andrade FB, Souza Jr. PRB, Neri AL, Duarte YAO, Castro-Costa E, et al. The Brazilian Longitudinal Study of Aging (ELSI-Brazil): objectives and design. Am J Epi­ demiol 2018; 187:1345-53. 19. Granovetter M. The strength of the weak ties. Am J Sociol 1973; 78:1360-80. Medical Research 2014; 4:1383-99. 20. Silva AAM, Vasconcelos AGG, Bettiol H, Bar­ bieri MA. Socioeconomic status, birth weight, maternal smoking during pregnancy and adiposity in early adult life: an analysis us­ ing structural equation modeling. Cad Saúde Pública 2010; 26:15-29. 9. Ploubidis GB, Silverwood RJ, DeStavola B, Grundy E. Life-course partnership status and biomarkers in midlife: evidence from the 1958 British Birth Cohort. Am J Public Health 2015; 105:1596-603. 10. World Health Organization. Active ageing: a policy framework, 2002. http://www.who. int/ageing/publications/en (acessado em 26/ Abr/2018). 21. Aguiar NF, Fernandes DC, Neves JAB. Mobi­ lidade social feminina. In: Aguiar NF, organi­ zador. Desigualdades sociais, redes de sociabi­ lidade e participação política. v. 1. Belo Hori­ zonte: Editora da UFMG; 2007. p. 165-80. 11. Bem-Shlomo Y, Kuh D. A life course approach to chronic disease epidemiology: conceptual models, empirical challenges and interdis­ ciplinar perspectives. Int J Epidemiol 2002; 31:285-93. 22. Martinez MC, Latorre MRDO. Saúde e capa­ cidade para o trabalho em trabalhadores de área administrativa. Rev Saúde Pública 2006; 40:851-8. 12. Pérez ER, Wajnman S, Oliveira AMHC. Análi­ se dos determinantes da participação no mer­ cado de trabalho dos idosos em São Paulo. Rev Bras Estud Popul 2006; 23:269-86. 23. Gould R, Ilmarinen J, Järvisalo J, Koskinen S, editors. Dimension of work ability: results of the health 2000 survey. Helsinki: Finnish Cen­ tre of Pensions/The Social Insurance Institu­ tion/National Public Health Institute/Finnish Institute of Occupational Health; 2008. 13. Castro CMS, Mambrini JVM, Sampaio RF, Macinko J, Lima-Costa MF. Aspectos socio­ demográficos e de saúde associados ao tra­ balho remunerado em adultos (50-69 anos) na Região Metropolitana de Belo Horizonte, Minas Gerais, Brasil. Cad Saúde Pública 2015; 31:1775-87. 24. Lima-Costa MF, Cesar CC, Chor D, Proietti FA. Agradecimentos M. F. F. L. Castro, J. A. B. Neves e R. F. Sampaio são bolsistas de produtividade em pesquisa do Con­ selho Nacional de Desenvolvimento Científico e Tecnológico, Ministério da Saúde (DECIT/SCTIE); COSAPI/DAPES/SAS; Ministério da Ciência, Tec­ nologia, Inovação e Comunicação. p 4. Ilmarinem JE. Aging workers. https://oem. bmj.com/content/58/8/546 (acessado em 29/ Jul/2019). 5. Department of Economic and Social Affairs, United Nations. World population ageing 2017. http://esa.un.org/wpp (acessado em 10/ Mai/2018). 6. Instituto Brasileiro de Geografia e Estatística. Pesquisa Nacional por Amostra de Domicílios Contínua. 3o trimestre de 2019. Rio de Janeiro: Instituto Brasileiro de Geografia e Estatística; 2019. 7. Bélanger A, Carrière Y, Sabourin P. Under­ standing employment participation o folder workers: the Canadian perspective. Can Public Policy 2016; 42:94-109. Cad. Saúde Pública 2020; 36(11):e00194619 Cad. Saúde Pública 2020; 36(11):e00194619 DETERMINANTES DO TRABALHO REMUNERADO ENTRE OS MAIS VELHOS 13 Cad. Saúde Pública 2020; 36(11):e00194619 Abstract This study aimed to develop a conceptual model and to explore direct and indirect associations be­ tween paid work and life-course factors in a repre­ sentative national sample of the Brazilian popula­ tion 50 years and older. The analysis was based on 8,903 participants in the baseline of the Brazilian Longitudinal Study of Aging (ELSI-Brazil). The exposure variables were sociodemographic, health, work, and social interaction variables. Based on a structural equation model, paid work showed total association with lifetime social status in women (standardized coefficient – SC = 0.489) and direct association with capacity for work in men (SC = 0.527). For women alone, an indirect and negative association was observed with life­ time intense physical effort at work, via retirement (SC = -0.156). Men with paid work were more prone to social participation, measured by belong­ ing to groups or associations (SC = 0.209). Among women, this participation was through interaction with family and friends (SC = 0.047), via capac­ ity for work. For both men and women, lifetime health status showed an indirect and positive asso­ ciation (SC = 0.298 men; SC = 0.142 women) with paid work, via capacity for work. All the above- mentioned factors showed a significant associa­ tion with paid work. The study’s results showed that participation in the work market occurs by different mechanisms for men and women, prin­ cipally considering the factors related to work and social interaction. El objetivo de este estudio fue desarrollar un mod­ elo conceptual y explorar asociaciones directas e indirectas entre trabajo remunerado y factores que operan a lo largo de la vida, en una muestra na­ cional representativa de población brasileña con 50 años y más. El análisis se basó en 8.903 partici­ pantes procedentes del Estudio Brasileño Longi­ tudinal del Envejecimiento (ELSI-Brasil). Los factores de exposición fueron: sociodemográficos, de salud, trabajo e interacción social. Utilizando un modelo de ecuaciones estructurales, se observó que el trabajo remunerado presentó una aso­ ciación total con la condición social a lo largo de la vida entre mujeres (coeficiente de estandarización- CP = 0,489) y asociación directa con la capacidad para el trabajo entre hombres (CP = 0,527). Sola­ mente para las mujeres, la asociación indirecta y negativa se observó con el esfuerzo físico intenso en el trabajo a lo largo de la vida, vía jubilación (CP = -0,156). DETERMINANTES DO TRABALHO REMUNERADO ENTRE OS MAIS VELHOS 13 Self-rated health compared with objective­ ly measured health status as a tool for mortal­ ity risk screening in older adults: 10-year fol­ low-up of the Bambuí Cohort Study of Aging. Am J Epidemiol 2012; 175:228-35. 14. Wind A, Geuskens GA, Ybema JF, Bongers PM, van der Beek AJ. The role of ability, motiva­ tion, and opportunity to work in the transition from work to early retirement – testing and optimizing the Early Retirement Model. Scand J Work Environ Health 2015; 41:24-35. 25. Castro CMS, Lima-Costa MF, César CC, Ne­ ves JAB, Bof de Andrade F, Souza-Junior PRB, et al. Curso da vida e capacidade para o traba­ lho entre adultos mais velhos: ELSI-Brasil. Rev Saúde Pública 2018; 52 Suppl 2:11s. 15. Kupek E. Beyond logistic regression: struc­ tural equations modelling for binary variables and its application to investigating unobserved confounders. BMC Med Res Methodol 2006; 6:13. 26. Neves JAB, Helal DH. Associativismo, capital social e mercado de trabalho. In: Aguiar NF, organizador. Desigualdades sociais, redes de sociabilidade e participação política. v. 1. Belo Horizonte: Editora da UFMG; 2007. p. 61-72. 16. Amorim LDAF, Fiaccone RL, Santos CAST, Santos TN, Moraes LTLP, Oliveira NF, et al. Structural equation modeling in epidemiology. Cad Saúde Pública 2010; 26:2251-62. 27. Barata RB. Relações de gênero e saúde: desi­ gualdade ou discriminação? In: Barata RB. Co­ mo e por que as desigualdades sociais fazem mal à saúde. Rio de Janeiro: Editora Fiocruz; 2009. p. 73-94. 17. Morais AODS, Simões VMF, Rodrigues LS, Batista RFL, Lamy ZC, Carvalho CA, et al. Sin­ tomas depressivos e de ansiedade maternos e prejuízos na relação mãe/filho em uma coorte pré-natal: uma abordagem com modelagem de equações estruturais. Cad Saúde Pública 2017; 33:e00032016. Cad. Saúde Pública 2020; 36(11):e00194619 Castro CMS et al. 14 Cad. Saúde Pública 2020; 36(11):e00194619 Recebido em 04/Out/2019 Versão final reapresentada em 14/Fev/2020 Aprovado em 01/Abr/2020 Envejecimiento; Trabajo; Modelos Estadísticos; Situación Socioeconómica; Interacción Social Abstract Hombres con trabajo remunerado fueron más propensos a la participación social, medida por la pertenencia a grupos o asociaciones (CP = 0,209). Entre mujeres, esta participación se produjo mediante interacciones con la familia y amigos (CP = 0,047), vía capacidad para el tra­ bajo. Tanto entre hombres como entre mujeres, la condición de salud a lo largo de la vida mostró una asociación indirecta y positiva (CP = 0,298 hombres; CP = 0,142 mujeres) con el trabajo re­ munerado, vía capacidad para el trabajo. Todos los factores mencionados presentaron una asociación significativa con el trabajo remunerado. Los resul­ tados del estudio mostraron que la participación en el mercado de trabajo de hombres y mujeres mayores se produce por mecanismos diferentes, principalmente al considerar los factores relacio­ nados con el trabajo e interacción social. Aging; Work; Statiscal Models; Socieconimic Status; Social Interaction Envejecimiento; Trabajo; Modelos Estadísticos; Situación Socioeconómica; Interacción Social Recebido em 04/Out/2019 Versão final reapresentada em 14/Fev/2020 Aprovado em 01/Abr/2020 Cad. Saúde Pública 2020; 36(11):e00194619
https://openalex.org/W4281257337
https://quantum-journal.org/papers/q-2023-09-21-1117/pdf/
English
null
Anonymous conference key agreement in linear quantum networks
arXiv (Cornell University)
2,022
cc-by
15,153
Anonymous conference key agreement in linear quantum networks Jarn de Jong1, Frederik Hahn1,2, Jens Eisert2, Nathan Walk2, and Anna Pappa1 1Electrical Engineering and Computer Science, Technische Universität Berlin, 10587 Berlin, Germany 2Dahlem Center for Complex Quantum Systems, Freie Universität Berlin, 14195 Berlin, Germany Sharing multi-partite quantum entanglement between parties allows for diverse secure communication tasks to be performed. Among them, conference key agreement (CKA) – an extension of key distribution to multiple parties – has received much attention recently. Interestingly, CKA can also be performed in a way that protects the identities of the participating parties, therefore pro- viding anonymity. In this work, we propose an anonymous CKA protocol for three parties that is implemented in a highly practical network setting. Specif- ically, a line of quantum nodes is used to build a linear cluster state among all nodes, which is then used to anonymously establish a secret key between any three of them. The nodes need only share maximally entangled pairs with their neighbours, therefore avoiding the necessity of a central server sharing entan- gled states. This linear chain setup makes our protocol an excellent candidate for implementation in future quantum networks. We explicitly prove that our protocol protects the identities of the participants from one another and per- form an analysis of the key rate in the finite regime, contributing to the quest of identifying feasible quantum communication tasks for network architectures beyond point-to-point. v:2205.09169v2 [quant-ph] 5 Sep 2023 arXiv:2205.09169v2 [quant-ph] 5 Sep arXiv:2205.09169v2 [quant-ph Jarn de Jong: dejong@tu-berlin.com Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. 1 Introduction The goal of conference key agreement (CKA) protocols is to establish a shared key between multiple parties that do not use trusted means of communication. CKA has been explored in the quantum domain, with the aim of developing new schemes for cryptography and communication beyond bi-partite key distribution [1, 2, 3, 4]. Various quantum states have been proposed to achieve CKA, including both discrete-variable [5, 6, 7] and continuous- variable [8, 9, 10] states. In this work, we focus on the discrete-variable case. Particularly suitable for CKA protocols are quantum resource states that exhibit symmetric measure- ment outcome correlations for all participants of the respective communication protocol. Such states include GHZ states [11], which are ideal CKA resources due to their obvious correlation when measured in the computational basis [1, 5, 6]. Other useful symmetric resources are W states [12], although they only allow for the probabilistic generation of a conference key [7]. In recent years, the need for privacy and anonymity has led researchers to develop anonymous versions of protocols that implement important cryptographic primitives [13, 14, 15]. In the case of CKA, the goal would be to establish a key between a number of participants, while keeping their identities hidden from the other non-participating parties, Jarn de Jong: dejong@tu-berlin.com 1 Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. and in some instances even from each other. Using shared GHZ states, anonymous proto- cols have been proposed [16, 17] and implemented [18] that also provide an advantage in keyrate compared to sharing bi-partite entanglement [17]. However, GHZ states are highly loss-prone and cannot be easily exchanged over long distances. Moreover, most previous approaches using these states require a central server to distribute the state. In this work, we address and answer the question of how to achieve anonymous CKA within a minimal and in several ways experimentally feasible nearest neighbour architec- ture of discrete variable quantum states. Specifically, we assume a linear chain of quantum nodes1, and study how to anonymously share a secret key between three of them. These three participants (also referred to as Alice, Bob and Charlie) use shared bi-partite entan- glement with their neighbours to establish a linear cluster state [19, 20, 21] that ‘connects’ the three of them and all the nodes in between. 1 Introduction This linear cluster state is further used to anonymously establish a three-partite maximally entangled state between Alice, Bob and Charlie, which is used to run a conference key agreement protocol and share a key with provable security. Our new protocol is one of the few cryptographic demonstrations where non-maximally entangled states are used for practical tasks. It highlights the flexibility that multi-partite entanglement provides for cryptographic tasks involving more than two parties and complements known results supporting this approach [16, 17, 22, 23, 24]. [ ] This work is structured as follows. In Subsection 1.1 we provide the necessary pre- liminaries and definitions to subsequently introduce the protocol in Section 2. Section 3 contains an analysis and explanation of the protocol and its performance, specifically how anonymity and security are achieved, as well as how the (finite) key rate is calculated. Section 4 contains a general discussion. Some details of the protocol, as well as the proofs of security and anonymity have been deferred to Appendices A, B and C, respectively. Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. 1.1 Preliminaries and definitions Throughout this work, we denote with the ordered set N = {N1, N2, . . . , Nn−1, Nn} the collection of all nodes in a linear network (Fig. 1). We fix a set of three nodes P = {Na, Nb, Nc} ⊂N such that a < b < c and call them Alice, Bob and Charlie, respectively. The goal of these three parties is to establish a secret key between them, without revealing their identities to everyone else. We will refer to them as the participants and to all other nodes ¯P := N \ P as the non-participants of our anonymous conference key agreement protocol. N1 N2 · · · Na−1 Na Na+1 · · · Nb−1 Nb Nb+1 · · · Nc−1 Nc Nc+1 · · · Nn Alice Bob Charlie Figure 1: Participants P = {Na, Nb, Nc} and non-participants ¯P are connected by a linear network. The position of Alice, Bob and Charlie are not known by any other node in the network. Figure 1: Participants P = {Na, Nb, Nc} and non-participants ¯P are connected by a linear network. The position of Alice, Bob and Charlie are not known by any other node in the network. 1Note that “linear chain” setups often refer to quantum repeater setups involving quantum memories. Our protocol however does not require quantum memories. The feasibility of implementing this protocol in the short term, and the relevance of the photonics experiments discussed in Section 4, are due to the fact that the setup is a linear chain of source and measurement stations without quantum memories, rather than a traditional linear repeater chain. Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. 2 Alice, Bob and Charlie know each other’s position within the network and can iden- tify the communication from each Ni with its index i. Moreover, they have access to a pre-shared secret key; note that our scheme is a key-expansion scheme, like all known quantum key distribution and CKA protocols. We assume that the participants are coop- erating: neither do they reveal each other’s identity nor do they reveal the created secret key. However, we allow the non-participants to be dishonest and to actively deviate from the protocol – as long as they do not collude with each other. 2 Protocol Our protocol is divided into three parts – the preparation of the required multi-partite states from the Bell pairs (2.1), the anonymous extraction of the GHZ3 states from the multi-partite states (2.2), and the subsequent key generation with post-processing (2.3). 1.1 Preliminaries and definitions This means that non- participants can perform arbitrary maps and measurements in deviating bases or disclose false measurement outcomes, but they cannot, jointly with other non-participants, perform a coordinated attack. Regarding initial resources, we assume that all nodes share one copy of an entangled (potentially noisy) Bell pair – i.e. (|0, 0⟩+|1, 1⟩)/ √ 2 – with each of their neighbours: node Ni therefore holds two qubits with labels τi and ωi. Qubit τi is entangled with qubit ωi+1 from node Ni+1 while qubit ωi is entangled with qubit τi−1 from Ni−1. Since nodes N1 and Nn both have a single neighbour, they only have a qubit τ1 and ωn, respectively. These Bell pairs are used to create three linear cluster states between the nodes. For a set of qubits {1, 2, . . . , n}, we define the n-qubit linear cluster state vector |L1,...,n⟩:= n−1 Y i=1 CZi,i+1 |+⟩⊗n , (1) (1) where |+⟩⊗n := Nn i=1 |+⟩i and CZi,i+1 is the controlled-Z quantum gate that is applied between neighbouring qubits labelled i and i + 1. Finally, from the linear cluster state, a three-partite GHZ state with state vector |GHZ3⟩:= 1 √ 2 (|0, 0, 0⟩+ |1, 1, 1⟩) (2) (2) is extracted in an anonymous fashion. Fig. 2 depicts a visualization of our protocol. For clarity, throughout this work, we denote a unitary Pauli operation with a capital letter, where a superscript indicates a real power (e.g. Zb is a unitary Z operation for b = 1 and I for b = 0). To indicate measurement bases, we use the σ-notation, where a superscript indicates the qubit (i.e. σi x refers to a measurement of qubit i in the Hadamard basis). 2.1 Preparation of linear cluster states From the Bell resources, we create the network state vector |N⟩:= |Ll⟩⊗|Lm⟩⊗|Lr⟩, where |Ll⟩, |Lm⟩and |Lr⟩– with l, m, r denoting left, middle and right – are linear cluster states on the qubits labelled {τ1, τ2, . . . , τa−1, ωa}, {τa, τa+1, . . . , τc−1, ωc} and {τc, τc+1, . . . , τn−1, ωn}, respectively (Fig. 2 top and middle), by performing Protocol 1 for State preparation. Protocol 1 is divided into three steps. Some nodes execute only a subset of the steps and a small selection of nodes execute a variant of Step 2a, listed as Step 2b. These considerations are reflected in Tab. 1, which indicates which nodes perform which steps. Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. 3 3 · · · · · · · · · · · · · · · · · · · · · · · · y 1 · · · · · · · · · · · · · · · · · · · · · · · · y 2 · · · · · · · · · · · · N1 N2 . . . Na−1 Na Na+1 . . . Nb . . . Nc−1 Nc Nc+1 . . . Nn−1 Nn Figure 2: Top: Bell pairs shared between nodes Ni and Ni+1. Qubit τi (dark gray) of Ni and ωi+1 (light gray) of Ni+1 are entangled. The three qubits to be part of the GHZ state are colored green, blue and pink. Middle: In Protocol 1, the Bell resources are used to create three linear cluster states via Bell state projection. Alice and Charlie do not perform the projection. Bottom: In Protocol 2 the network states |N⟩are transformed into |GHZ3⟩states between Na, Nb and Nc. Figure 2: Top: Bell pairs shared between nodes Ni and Ni+1. Qubit τi (dark gray) of Ni and ωi+1 (light gray) of Ni+1 are entangled. The three qubits to be part of the GHZ state are colored green, blue and pink. Middle: In Protocol 1, the Bell resources are used to create three linear cluster states via Bell state projection. Alice and Charlie do not perform the projection. Bottom: In Protocol 2 the network states |N⟩are transformed into |GHZ3⟩states between Na, Nb and Nc. Protocol 1: State preparation Input. Bell pairs between nodes Ni and Ni+1. Goal. 2.1 Preparation of linear cluster states Prepare the network state vector |N⟩. All Ni perform the following steps consecutively: 1. Receive oi−1. If oi−1 = 1 apply Z on ωi. 2a. Perform CZ between τi and ωi. Measure στi x and record measurement outcome bit as oi. 2b. Draw uniformly random bit oi. If oi = 1 apply Z on τi. Apply H on τi. 3. Send oi to Ni+1. Table 1: Protocol 1 Overview Not all steps of Protocol 1 are performed by everyone. This table indicates which steps are performed by whom. Note that since N1 does not perform 1. and Nn does not perform 3. there is neither o0 nor Nn+1. Node N1 Na Ni Nc Nn 1.      2a.      2b.      3.      Table 1: Protocol 1 Overview Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. Protocol 1: State preparation Not all steps of Protocol 1 are performed by everyone. This table indicates which steps are performed by whom. Note that since N1 does not perform 1. and Nn does not perform 3. there is neither o0 nor Nn+1. Node N1 Na Ni Nc Nn 1.      2a.      2b.      3.      After discarding all measured qubits, each node but Alice and Charlie holds only one qubit. Therefore, we can rename τi →i for all Ni ∈N \ {Na, Nc, Nn} and ωn →n. For Alice and Charlie we rename τa and ωc to a and c as part of |Lm⟩and ωa and τc to ˜a and ˜b as part of |Ll⟩and |Lr⟩, respectively. From the network state we will now show how to anonymously extract a GHZ3 state for Alice, Bob and Charlie. Protocol 1 and the above discussion is phrased under the assumption that neither Alice nor Charlie are at the ‘ends’ of N. If indeed Na = N1, Alice performs the steps of the column marked N1 in Tab. 1, and similarly for Charlie if Nc = Nn. Note that Alice and/or Charlie then also hold just one qubit. As a small example, consider a network with only five nodes, where P = {Na, Nb, Nc} = {N2, N4, N5} and thus ¯P = {N1, N3}. Note that Nn = Nc. All nodes except the first apply Z to their qubit ωi based on the outcome bit oi−1 they received. Any node other than Na, Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. 4 4 Nc or the first or last node performs step 2a.: they apply a CZ gate and then measure στi x , sending the outcome oi to the next node. To disguise that they are not performing this step, N1 and Na apply Z to their τi based on randomly drawn bit oi and send it to the next node. Moreover, they apply H to τi. Since Nc is the last node, they only perform step 1. 2.2 Anonymous extraction of GHZ states After the n network nodes have created L network states as presented in Protocol 1, each of these states is used to anonymously establish a |GHZ3⟩state between Alice, Bob and Charlie via Protocol 2 for GHZ extraction, as visualized in Fig. 2. Protocol 2: GHZ extraction Input. Network state vector |N⟩from Protocol 1. Configuration corrections {Ci}i∈P calculated by Ni, as explained in App. A. Goal. Anonymous |GHZ3⟩for Na, Nb, Nc. All Ni perform the following steps consecutively: 1. Receive bit βi−1 and compute βi = βi−1⊕1. 2a. Measure σi x or σi y if βi is 0 or 1, respectively. Record the measurement outcome bit mi. 2b. Draw a uniformly random bit mi. If i ∈P: apply Ci. 3. Communicate βi to node Ni+1. Table 2: Protocol 2 Overview N1 draws a uniformly ran- dom bit β1; Nn does not perform Step 3. Node N1 P ¯P Nn 1. ✗ ✓ ✓ ✓ 2a. ✗ ✗ ✓ ✗ 2b. ✓ ✓ ✗ ✓ 3. ✓ ✓ ✓ ✗ Protocol 2: GHZ extraction Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. 2.3 Measurements and post-processing The participants now use a fraction p of the L GHZ3 states to check for eavesdropping and the rest to generate conference keys. Using L · h2(p) bits of the pre-shared key – where h2(p) := −p log2(p) −(1 −p) log2(1 −p) is the binary entropy of p – Alice, Bob, and Charlie coordinate their measurements to be in either the σz-basis (for KeyGen rounds) or σx-basis (for Verification rounds). During the latter, ⟨m⟩:= L · p states are measured to estimate the σx-basis error rate is the binary entropy of p – Alice, Bob, and Charlie coordinate their measurements to be in either the σz-basis (for KeyGen rounds) or σx-basis (for Verification rounds). During the latter, ⟨m⟩:= L · p states are measured to estimate the σx-basis error rate Qm X := 1 2  1 −⟨σa xσb xσc x⟩  , that is the relative number of erroneous (i.e. odd-parity) measurements. Every party announces a uniformly random bit after every KeyGen and every Verification round – with the exception of Bob and Charlie who announce their measurement outcome after each Verification round; this allows Alice to calculate Qm X. When Alice determines that Qm X is above a predetermined tolerance threshold Qtol, she sets her abort bit to 1 to abort the protocol. that is the relative number of erroneous (i.e. odd-parity) measurements. Every party announces a uniformly random bit after every KeyGen and every Verification round – with the exception of Bob and Charlie who announce their measurement outcome after each Verification round; this allows Alice to calculate Qm X. When Alice determines that Qm X is above a predetermined tolerance threshold Qtol, she sets her abort bit to 1 to abort the protocol. The other ⟨k⟩:= L −⟨m⟩= L · (1 −p) states are used to generate conference keys by Alice, Bob, and Charlie measuring in the σz-basis. This results in k bits of raw key for each participant which is then post-processed with error correction and privacy amplification. i To perform error correction, Alice applies a publicly known error-correcting code to her raw key and encrypts the resulting error syndrome with a one-time pad using a portion of the pre-shared key. Alice now announces the encrypted syndrome, while everyone else announces a string of random bits of the same length. Protocol 2: GHZ extraction Table 2: Protocol 2 Overview Input. Network state vector |N⟩from Protocol 1. Configuration corrections {Ci}i∈P calculated by Ni, as explained in App. A. Goal. Anonymous |GHZ3⟩for Na, Nb, Nc. N1 draws a uniformly ran- dom bit β1; Nn does not perform Step 3. All Ni perform the following steps consecutively: Node N1 P ¯P Nn 1. ✗ ✓ ✓ ✓ 2a. ✗ ✗ ✓ ✗ 2b. ✓ ✓ ✗ ✓ 3. ✓ ✓ ✓ ✗ Protocol 2 is divided into three steps as well; some nodes only execute a subset of the steps and for Step 2 there are again two different options; this is reflected in Tab. 2. After a given amount of time for everyone to measure their qubit, all nodes broadcast their mea- surement outcome mi. The participants P then perform local unitary corrections on their own qubits based on the number of nodes between Alice, Bob and Charlie as well as the collection of measurement outcomes {mi}i∈¯P, resulting in L GHZ3 states shared between them. These corrections can be found in App. A and consist of Clifford operations only. Importantly, the corrections invoked by the measurement outcomes can be accounted for in post-processing, so that all actions of the protocol can be carried out simultaneously; this ensures no quantum memories are necessary. The final steps that enable secure anonymous conference key agreement are explained in the next section. Similarly to the previous one, Protocol 2 is phrased under the assumption that neither Alice nor Charlie are at the ‘ends’ of N. If indeed Na = N1, Alice performs the steps of the column marked N1 in Tab. 1, and similarly for Charlie if Nc = Nn. Note that Alice and/or Charlie then also hold just one qubit. Consider again the example where P = {Na, Nb, Nc} = {N2, N4, N5}, ¯P = {N1, N3} and Nn = Nc. To start Protocol 2, N1 draws uniformly random bits β1 and m1. They send β1 to N2. Here, N2 is a participant and therefore does not measure their qubit after calculating β2 = β1 ⊕1. Instead they apply C2, draw the bit m2 uniformly and send β2 to 5 N3. The following node N3 is again not a participant. It flips the received bit, measures it, and records the result as m3 before sending β3 to N4. Protocol 2: GHZ extraction The node N4 now acts as the first participant N2: apply C4, compute β4, draw m4 and send β4 to N5. This last participant N5 is now in a special position at the end of the network, which allows them to skip the last step and just to apply C5, to compute β5 and to draw m5. Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. 2Note that the CZ operation and the two subsequent measurements of each non-participant can be viewed as a measurement in the Bell-state basis, i.e. as a Bell-state projection, and therefore can be performed in one step. 3 Analysis of the protocol Our nearest neighbour state preparation ensures that no central server is needed to pro- vision resources. First, the parties create the linear cluster state by exchanging Bell pairs with their nearest neighbours, performing an entangling operation between their two qubits and subsequently measuring one. The non-participants then measure their remaining qubit in order to establish a GHZ3 state between the participants.2 The resulting corrections to obtain the GHZ3 are non-trivial only for Alice and Charlie: The correction for Alice de- pends only on the number of non-participants between Alice and Bob and the measurement outcomes {mi}b−1 i=a+1 of these nodes, while the correction for Charlie can be constructed by analogy. Importantly, the part of the correction that depends on the measurement results generates only Pauli corrections, so all these corrections can be considered as post- processing of KeyGen and Verification rounds of Alice and Charlie; this means that the participants do not have to wait for announcements from non-participants before perform- ing their measurements. 3.1 Anonymity of the protocol The definition of anonymity is taken from [17]. The protocol is defined to be εan-anonymous if, for any choice of participants, it is at most εan-close (in trace distance) to any state with a desired property. This property, adapted to our attack model, loosely states that the reduced state for any subset G ⊂N that does not contain the participants, is independent of the choice of participants P. For the rigorous definition and more details, see App. C. The alternating σx-σy measurement pattern of Step 2a in Protocol 2 only works when Alice and Charlie are at the respective ends of the linear cluster state. It is for this reason that we designed our extraction of the GHZ state to effectively only use the middle state |Lm⟩. Since all non-participants perform steps that are independent of the position of Alice, Bob, and Charlie, the nodes {N1, . . . , Na−1} and {Nc+1, . . . , Nn} generate the linear cluster states |Ll⟩and |Lr⟩as a byproduct. Alice and Charlie not performing the Bell projection creates the tri-separable network state |N⟩:= |Ll⟩⊗|Lm⟩⊗|Lr⟩. While this could make their actions distinguishable from those of all other nodes, it is easy to see that the reduced quantum state of each node Ni is maximally mixed – even given all announced measurement results. In particular, this means that the reduced state of each node does not contain information about the identity of any other node in the network. The definition of anonymity is taken from [17]. The protocol is defined to be εan-anonymous if, for any choice of participants, it is at most εan-close (in trace distance) to any state with a desired property. This property, adapted to our attack model, loosely states that the reduced state for any subset G ⊂N that does not contain the participants, is independent of the choice of participants P. For the rigorous definition and more details, see App. C. i The alternating σx-σy measurement pattern of Step 2a in Protocol 2 only works when Alice and Charlie are at the respective ends of the linear cluster state. It is for this reason that we designed our extraction of the GHZ state to effectively only use the middle state |Lm⟩. Since all non-participants perform steps that are independent of the position of Alice, Bob, and Charlie, the nodes {N1, . . . , Na−1} and {Nc+1, . . 2.3 Measurements and post-processing Bob and Charlie decrypt Alice’s error syndrome using their pre-shared key and then perform error correction on their respective keys using the publicly known error-correcting code. To verify the error correction, all participants apply a hash function hEC to their corrected key; Alice announces her outcome after encrypting it with a one-time pad using part of the pre-shared key, while everyone else announces a uniformly random bit string instead. Bob and Charlie now both decrypt Alice’s announced output and verify the error correction by comparing their output of hEC with Alice’s. If either Bob or Charlie find a discrepancy, they abort by setting their abort bit to 1; this ensures that the key they share is correct. To potentially abort the protocol, the participants each announce their abort bit, which is 1 if and only if they want to abort, while the non-participants all announce random bits. The participants encrypt again by one-time padding their bit each with a separate single bit of the pre-shared key, using another 3 bits in total. Finally, the participants perform privacy amplification to remove any correlation be- tween the key and a potential eavesdropper, thereby reducing the length of the key. To this end, they apply another hash function hPA; after subtracting the necessary key to replenish the pre-shared key for communication in subsequent rounds, this results results in a secure and correct key s of length ℓ(see App. B) shared by Alice, Bob, and Charlie if the protocol was not aborted. 6 3.1 Anonymity of the protocol . , Nn} generate the linear cluster states |Ll⟩and |Lr⟩as a byproduct. Alice and Charlie not performing the Bell projection creates the tri-separable network state |N⟩:= |Ll⟩⊗|Lm⟩⊗|Lr⟩. While this could make their actions distinguishable from those of all other nodes, it is easy to see that the reduced quantum state of each node Ni is maximally mixed – even given all announced measurement results. In particular, this means that the reduced state of each node does not contain information about the identity of any other node in the network. For noiseless scenarios, these announced measurement results {oi | Ni ∈N\{Na, Nc, N1} are all uniformly random and uncorrelated – see App. C for a proof. To mask their iden- tity, the other three nodes therefore announce uniformly random bits oa, oc and o1. For noisy scenarios, the announced measurement bits remain uniformly random, if there is no noise bias in the σx or σy basis, as for e.g. depolarizing noise. If there were such a bias, it could however reveal some information about the participants’ identities, as the announced measurement results would be distinguishable from the uniformly random announcements of the participants. This can be avoided if the latter introduce some bias to their source of randomness, and hence mimic the non-uniformity of the announced measurement results of the non-participants; see Sec. 4 for more discussion. Furthermore, the neighbours to- the-right of the participants are not aware that the latter announce randomly chosen bits and will therefore perform Z corrections conditioned on them (i.e. Step 1 in Protocol 1); Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. 7 hence Step 2b of the protocol works as “anti-correction” performed by Na, Nc and N1 on their part of the Bell pair. Similar to Protocol 1, during Protocol 2 all non-participants ¯P (except N1 and Nn) measure and announce their outcomes {mi | Ni ∈¯P, i /∈{1, n}}, which are uniformly random and uncorrelated – see App. C for a proof. To hide their identity, the participants P as well as N1 and Nn announce a uniformly randomly drawn bit (in case of biased noise, the same considerations and solution as in Protocol 1 apply). In approaches where anonymity is of no concern, an error syndrome can be announced publicly. However, this syndrome might not be uniformly random and could potentially disclose Alice’s identity. 3.2 Security and performance of the protocol Following [1], we define the protocol to be εc-correct if the probability that the generated keys are the same for all participants is greater than 1−εc. Similarly, we define the protocol to be εs-secret if the output state is εs-close (in trace distance) to an ideal state where the key is uniformly random and uncorrelated. The protocol is then called (εc + εs)-secure. For more details and the rigorous definition, see App. B. In principle, all resulting GHZ3 states could be used for key generation by each par- ticipant measuring in the σz basis. However, to ensure secrecy of the key, it is of utmost importance that the states are verified, which is achieved by having all participants mea- sure their qubit in the σx basis instead. Crucially, the Verification rounds are selected such that potentially malicious non-participants do not learn of their selection. This is achieved by coordinating the Verification rounds in advance between Alice, Bob, and Charlie using secret communication. There are m = L · p Verification rounds and we therefore need L·h2(p) bits to coordinate their choices. As the k bits of the raw conference key resulting from the L·(1−p) KeyGen rounds are neither perfectly correlated nor secret, error correction and privacy amplification are required. Error correction. To make the key εc-correct they use a publicly known error-correcting code (e.g., a low-density parity-check code as in Ref. [25]) with an error syndrome of length lEC := k · h2(Qz). Here, Qz = maxi=B,C 1 2(1 −⟨σa zσi z⟩) is the maximum pairwise σz- basis error rate between Alice and Bob or Alice and Charlie; it is estimated in advance and thus regarded as a given parameter. Since the error syndrome is one-time padded, the participants use up lEC of the pre-shared key. To verify the error correction, the participants apply a hash function hEC, which is drawn from a family of two universal hash functions using a seed shEC. This seed is sourced from the pre-shared key3 and has length k −log2(εc) −1, which ensures an εc-correct key. The output of the hash function hEC is a bitstring of length log2( 2 εc ); the same amount is used from the pre-shared key to encrypt the outcome using one-time pad before Alice announces it. Privacy amplification. 3.1 Anonymity of the protocol Hence Alice one-time-pad encrypts the error syndrome so that her communication is indistinguishable from all other parties; the same reasoning applies to all other communication of the post-processing (i.e. the verification and abort), too. 3It should be noted that unlike the other uses of the pre-shared key, the same seed can be used in subsequent runs of the protocol and therefore it only needs to be determined once. 3.2 Security and performance of the protocol Privacy amplification works in a similar fashion: Alice, Bob and Charlie apply a hash function hPA drawn from a family of two-universal hash functions using a seed shPA of length k + lPA −1 sourced from the pre-shared key3, where lPA := k · 1 −h2(Qtol + µ εs−ε 2 ) +2−2 log2(ε) is the length of the output of the hash function. Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. 8 Here, µ is a statistical correction and εs is the security parameter, while ε > 0 is a free parameter (see App. B for details). Note that in other approaches [6], privacy amplification also affects the lEC-parity bits that are transmitted during error correction. Since these have been encrypted with the pre-shared key in our approach, no leakage is possible and thus no privacy amplification is needed for these bits. Here, µ is a statistical correction and εs is the security parameter, while ε > 0 is a free parameter (see App. B for details). Note that in other approaches [6], privacy amplification also affects the lEC-parity bits that are transmitted during error correction. Since these have been encrypted with the pre-shared key in our approach, no leakage is possible and thus no privacy amplification is needed for these bits. Finally, the unencrypted announcement of the – not uniformly random – abort bits could reveal the identities of the participants. This is solved by all participants encrypting their abort bits with one-time pads; each participant uses a single bit of their pre-shared key to hide the correlation of the abort bits. In order to obtain an accurate key rate, we need to replenish the pre-shared key used as a one-time pad in the various communications: coordinating the verification rounds, the error correction’s syndrome and its verification, and the three bits for the abort communication, obtaining the secret key length ℓ(see App. B). Dividing by the number of rounds L, we obtain the key rate r := l/L with r = (1 −p)  1 −h2  Qtol + µ εs −ε 2  −h2(Qz)  −h2(p) + 1 L  log2  ε2εc  −2  , where µ εs−ε 2  is a statistical correction (see App. B) and ε > 0 is a free parameter. 3.2 Security and performance of the protocol Note that for fixed εs > 0 and εc > 0 and given Qtol, Qz and L, one can optimise over p and ε. In the asymptotic limit (i.e. L →∞), not only the L-dependent terms of Eq. (3.2) vanish, but so do p and µ. We refer to Tab. 3 for a representation of the performance of the protocol in terms of the required number L of network states for a fixed key length ℓ, while Fig. 3 contains the achievable finite key rate r as a function of L. log10(ℓ) Qm x = 0.03 Qm x = 0.06 Qm x = 0.10 0 4.093e+04 1.277e+05 1.691e+06 3 4.652e+04 1.359e+05 1.709e+06 4 8.528e+04 1.992e+05 1.874e+06 5 3.420e+05 6.359e+05 3.222e+06 6 2.236e+06 3.731e+06 1.246e+07 Table 3: The number of network states L necessary to obtain vari- ous secret key lengths ℓ, for differ- ent σx-basis error rates Qm x (Qtol has been fixed at this value). Here, Qz is fixed at two thirds of Qm x to simulate white noise. The se- curity parameters εc and εs have both been fixed at 10−8 and the rates are optimised over p and ε. 4 Discussion In this work, we have investigated how to anonymously establish a secret key between three participants in a line of nearest-neighbour quantum nodes. We find that by sharing maximally entangled pairs that are then projected into linear cluster states, a secret key can be obtained without revealing the identity of the participants. This contrasts with previous approaches to anonymous conference key agreement [16, 17], which directly distribute large GHZ states that are not only error-prone but also rely on a central server. Although in this work we explicitly show how the three-partite GHZ state is generated using linear cluster states, this is in fact equivalent to performing Bell-state projections, as is for example common in quantum repeater schemes. There are other ways to extract Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. 9 9 105 106 107 108 109 1010 Total number of rounds L −0.6 −0.4 −0.2 0.0 0.2 0.4 0.6 0.8 Finite key rate r Qm x = 0.120 Qm x = 0.105 Qm x = 0.090 Qm x = 0.075 Qm x = 0.060 Qm x = 0.045 Qm x = 0.030 Finite key rate r per total number of rounds L Figure 3: Finite key rate r as a function of the total number of network states L. Here, Qtol is fixed at various values of Qm x and Qz is fixed at two thirds of this value to simulate white noise. The blue dotted line is the asymptotic key rate for the minimum Qm x shown. Security parameters εc and εs have both been fixed at 10−8; the rates are optimised over p and ε. Finite key rate r per total number of rounds L Figure 3: Finite key rate r as a function of the total number of network states L. Here, Qtol is fixed at various values of Qm x and Qz is fixed at two thirds of this value to simulate white noise. The blue dotted line is the asymptotic key rate for the minimum Qm x shown. Security parameters εc and εs have both been fixed at 10−8; the rates are optimised over p and ε. smaller GHZ states from Bell pairs [26], however, these might not be as straightforward to perform anonymously. Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. 4 Discussion After all measurements have taken place everyone can then announce their (potentially fabricated) bits. Since these secret measurements are in place of the actual measurements that need to be performed, the corresponding round cannot be used for either verification or key generation. As such, this approach would slightly diminish the keyrate. We now briefly discuss the prospects for implementation of these protocols via multi- partite photonic entanglement. The dominant cause of noise is typically presence of higher- order photon events for parametric down conversion (PDC) photon sources [18, 27, 25, 28, 29] and photon distinguishability for solid state sources [30, 31, 32], although other effects such as detector dark-counts and misalignment also contribute. Furthermore, for practical implementations it is important that the generated photons are at telecom wavelengths compatible with low loss transmission over optical fibre, which renders some multi-partite entanglement sources unsuitable. Regardless of the source of the noise, for the ACKA protocol the only quantity that ultimately matters are the measured QBER’s in the X and Z bases. In that sense our results in Fig. 3 already provide a detailed description of the tradeoff between the total tolerable noise and block size. An implementation of our ACKA protocol has already been carried out demonstrating positive asymptotic keyrates, albeit at non-telecom wavelengths [28]. Comparison with other experiment results shows that for moderate block-sizes the required noise thresholds are well within those that have already been demonstrated in state-of-the-art PDC sources deployed through optical fibre at telecom wavelengths for 4 and 6 photon entangled states [25, 29] showing that proof-of-principle demonstrations of this protocol are within the reach of present-day technology. Nevertheless, the observed rates are quite low due to losses, and these would only become more severe with increasing transmission distance and number of parties. This observation, coupled with previous work on the increasingly demanding noise thresholds for large scale multi-partite CKA [1, 5, 6, 7], suggest that a robust, large-scale implementation would require more sophisticated networks incorporating quantum repeaters or error-correction protocols [2, 3, 4]. We leave the generalization of our protocol to more than three participants as an open question: the extraction of larger GHZ states (i.e. more than three qubits) from linear cluster states is possible (see Ref. [33, 34]). However, the size of the larger GHZ state is bounded from above by roughly half of the number of nodes between Alice and Charlie [33]. 4 Discussion We also note that our method of generating the linear cluster state connecting the three participants, is not unique: in fact, any scheme that anonymously generates a linear cluster state from Alice to Charlie can be used, and from there, our proposed method for generating the conference key can be further applied. With respect to non-trusted participants, if they were allowed to collaborate with an adversary who controls the entanglement sources and does not care about protocol termina- tion, a trivial attack would be to distribute an eigenstate of a to-be-measured observable to one or more of the parties. Since participants and non-participants behave differently and the protocol contains announcements, albeit encrypted ones, the attacker would, at least probabilistically, learn the roles of the parties in the protocol. This attack can in principle be circumvented by first performing randomized verification of the shared entanglement as in Ref. [15, 16]; however, this would require access to sufficiently good quantum memories and/or would drastically decrease the keyrate. In the absence of such countermeasures, anonymity can only be guaranteed against the non-trusted participants assuming they cannot collaborate with an all powerful eavesdropper. However, we emphasise that the security, as opposed to the anonymity, does hold in a fully adversarial model where all non-trusted participants and the eavesdropper collaborate (see Appendix B). As mentioned in Section 3.1, the measurement outcomes that are announced throughout the protocol could, in the presence of noise, be distinguishable from the chosen (uniformly random) announced bits of the nodes that do not perform a measurement; this would be detrimental to their anonymity, even if the non-trusted participants are not collaborating with an eavesdropper, since they could potentially learn about noise characteristics in the network via measurements announced in the current (or previous) runs of the protocol. To mitigate this risk, these nodes can add a bias to their random announcements that is consistent with the noise of their detectors. If they want to mimic the exact bias that their detectors have, they could – in an adjusted protocol – postpone all announcements until 10 all L rounds of measurements have taken place. Such a protocol would be modified such that N1 and the participants can secretly estimate their bias, by performing additional measurements in the bases that they would have had to perform if it wasn’t for their special role. 4 Discussion In addition, the specific measurement bases used to extract the state may depend on the position of the participants, so particular care must be taken to prevent identity leakage in this way. Finally, closed-form expressions for post-processing corrections in this generalized form are not straightforward either – and obtaining them remains an open question. Our work contributes to the growing body of multi-partite quantum cryptographic schemes that live up to stringent security requirements in protocols that go beyond point-to-point protocols. It is the hope that this work further stimulates theoretical and experimental research towards understanding notions of secure quantum communication in multi-partite settings. Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. col. We thank Federico Grasselli for carefully reading an early version of the manuscript and providing valuable feedback. J. de Jong and A. Pappa acknowledge support from the Emmy Noether DFG grant No. 418294583. F. H. acknowledges support from the Ger- man Academic Scholarship Foundation and J. E. from the BMBF (Q.Link.X and QR.X), J. E. and A. P. also acknowledge support from the Einstein Research Unit on Quantum Devices, for which this is an inter-node project. Appendices The appendix consists of three parts. Part A contains an explanation of the corrections that the participants have to perform on their qubits due to the network layout and the measurement results of the non-participants. Part B contains a restatement of the protocol, the definition of security, and the proof of security for the protocol. Finally, part C deals with the anonymity of the protocol, showing in particular that the announcements of the measurement do not reveal any information about the identity of the participants or non- participants. 5 Acknowledgements We thank Stefanie Barz, Jakob Budde, Lukas Rückle and Christopher Thalacker for fruitful discussions during our ongoing collaboration on experimentally implementing our proto- 11 Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. col. We thank Federico Grasselli for carefully reading an early version of the manuscript and providing valuable feedback. J. de Jong and A. Pappa acknowledge support from the Emmy Noether DFG grant No. 418294583. F. H. acknowledges support from the Ger- man Academic Scholarship Foundation and J. E. from the BMBF (Q.Link.X and QR.X), J. E. and A. P. also acknowledge support from the Einstein Research Unit on Quantum Devices, for which this is an inter-node project. 12 A Corrections for Alice, Bob and Charlie during Protocol 2 Alice and Charlie need to perform a correction to obtain the GHZ3 state with Bob, whereas Bob never has to perform a non-trivial rotation. The corrections for Alice and Charlie are structurally similar; we first introduce those for Alice. In order to achieve this, we define the following quantities. • δab := b −a −1, the number of non-participants between Alice and Bob. • δab := b −a −1, the number of non-participants between Alice and Bob. • pab := δab mod 4, the mod-four value of δab • pab := δab mod 4, the mod-four value of δab • pab := δab mod 4, the mod-four value of δab • gab := δab−pab 4 , the integer number of groups of four that fit between Alice and Bob For Charlie, δcb, gcb and pcb are defined in a similar fashion. We refer to Fig. 4 for two potential configurations of the network that exemplifies these definitions. Na Na+1 Na+2 Na+3 Nb−4 Nb−3 Nb−2 Nb−1 Nb Nb+1 Nb+2 Nb+3 Nb+4 Nc−2 Nc−1 Nc Alice Bob Charlie pab = 3 gab = 1 pcb = 2 gcb = 1 Na Na+1 Na+2 Nb−8 Nb−7 Nb−6 Nb−5 Nb−4 Nb−3 Nb−2 Nb−1 Nb Nc−3 Nc−2 Nc−1 Nc Alice Bob Charlie pab = 2 gab = 2 pcb = 3 Figure 4: Two exemplary configurations. Top: δab = 7 (with pab = 3 and gab = 1) and δcb = 6 (with pcb = 2 and gcb = 1). Bottom: δab = 10 (with pab = 2 and gab = 2) and δcb = 3 (with pcb = 3 and gcb = 0). Figure 4: Two exemplary configurations. Top: δab = 7 (with pab = 3 and gab = 1) and δcb = 6 (with pcb = 2 and gcb = 1). Bottom: δab = 10 (with pab = 2 and gab = 2) and δcb = 3 (with pcb = 3 and gcb = 0). Alice now performs the following correction steps: Alice now performs the following correction steps: Alice now performs the following correction steps: 1. Apply a configuration correction Cab depending on pab and gab, as shown in Tab. 4, picking the left (brown, βa = 1) or right (green, βa = 0) table. 1. Apply a configuration correction Cab depending on pab and gab, as shown in Tab. Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. A Corrections for Alice, Bob and Charlie during Protocol 2 The kx column contains the measurement outcomes that add to kx, which induce together with lx a correction Xkx⊕lx; similarly the kz column contains the measurement outcomes that create kz. δab mod 4 Cab kx kz 0 Zgab ✗ ✗ 1 ZgabH ✗ ma+1 2 ZgabPz ma+1 ma+1 ⊕ma+2 3 ZgabHPz ma+1 ⊕ma+2 ma+1 ⊕ma+3 δab mod 4 Cab kx kz 0 Xgab ✗ ✗ 1 XgabHPx ✗ ma+1 2 XgabPx ma+1 ma+2 3 XgabHX ma+2 ma+1 ⊕ ma+2 ⊕ma+3 Table 4: Local corrections that Alice needs to perform to obtain the GHZ state with Bob and Charlie after the non-participants measured their qubits. The left table shows the corrections if the non- participant a + 1 after Alice measured in the σx-basis (βa = 1), the right table the corrections if it was in the σy-basis (βa = 0). The Cab column contains the configuration correction which only depends on the number of non-participants δab between Alice and Bob – note that gab := ⌊δab/4⌋. The kx column contains the measurement outcomes that add to kx, which induce together with lx a correction Xkx⊕lx; similarly the kz column contains the measurement outcomes that create kz. Table 4: Local corrections that Alice needs to perform to obtain the GHZ state with Bob and Charlie after the non-participants measured their qubits. The left table shows the corrections if the non- participant a + 1 after Alice measured in the σx-basis (βa = 1), the right table the corrections if it was in the σy-basis (βa = 0). The Cab column contains the configuration correction which only depends on the number of non-participants δab between Alice and Bob – note that gab := ⌊δab/4⌋. The kx column contains the measurement outcomes that add to kx, which induce together with lx a correction Xkx⊕lx; similarly the kz column contains the measurement outcomes that create kz. βa = 1 βa = 0 lx 1st, 3rd 1st, 2nd, 3rd lz 2nd, 3rd, 4th 2nd, 4th βa = 1 βa = 0 lx 1st, 3rd 1st, 2nd, 3rd lz 2nd, 3rd, 4th 2nd, 4th Table 5: Selection of measure- ment outcomes out of every pair of four from the second set to calculate lx and lz, respectively. For example, when δab = 7 and βa = 1, lx = ma+4 ⊕ma+6 and lz = ma+5 ⊕ma+6 ⊕ma+7. Note that all three corrections (i.e. A Corrections for Alice, Bob and Charlie during Protocol 2 the configura- tion correction, the X correction and the Z correction) can be contracted into a single Clifford operation. How- ever, since the measurement-outcome dependent correc- tions are only Pauli operators, they will at most flip the measurement outcomes for Alice in the subsequent steps of the protocol – and need not be physically imple- mented. This also means that the participants can per- form their KeyGen or Verification measurements be- fore the measurement outcomes of the non-participants are announced. By having all nodes {Na+1, . . . , Nb−1} perform their measurements and Alice subsequently per- form the aforementioned corrections, the linear cluster state is contracted towards a |La,b,b+1,...,c−1,c⟩linear clus- ter state. Hence, Charlie can perform the same steps (while using the measurement out- comes {mc−1, mc−2, . . . , mb+1}, δbc := c −b −1 and its redefined derivatives) to contract the state towards a three-partite linear cluster state |La,b,c⟩. Two final H gates for Alice and Charlie result in the desired GHZ3 state between Alice, Bob and Charlie. Table 5: Selection of measure- ment outcomes out of every pair of four from the second set to calculate lx and lz, respectively. For example, when δab = 7 and βa = 1, lx = ma+4 ⊕ma+6 and lz = ma+5 ⊕ma+6 ⊕ma+7. Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. A Corrections for Alice, Bob and Charlie during Protocol 2 4, picking the left (brown, βa = 1) or right (green, βa = 0) table. 2. Divide all the measurement outcomes {mi}b−1 a+1 into a set {mi}a+1+pab a+1 and a set {mi}b−1 a+2+pab – where it is to be understood that if pab = 0, the first set is empty. 2. Divide all the measurement outcomes {mi}b−1 a+1 into a set {mi}a+1+pab a+1 and a set {mi}b−1 a+2+pab – where it is to be understood that if pab = 0, the first set is empty. 3. From the outcomes in the first set, they calculate the bits kx and kz using Tab. 4. 3. From the outcomes in the first set, they calculate the bits kx and kz using Tab. 4. cepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. 13 4. From the outcomes in the second set, out of every pair of four they select the mea- surement outcomes as described in Tab. 5 and add them all together to calculate lx and lz, respectively (e.g. if βa = 1, Alice selects every odd element of the second set to calculate lx, and every second, third and fourth out of four to calculate lz). 5. They apply an X operation on their qubit if and only if kx ⊕lx = 1. 6. They apply a Z operation on their qubit if and only if kz ⊕lz = 1. y pp y p q y z z δab mod 4 Cab kx kz 0 Zgab ✗ ✗ 1 ZgabH ✗ ma+1 2 ZgabPz ma+1 ma+1 ⊕ma+2 3 ZgabHPz ma+1 ⊕ma+2 ma+1 ⊕ma+3 δab mod 4 Cab kx kz 0 Xgab ✗ ✗ 1 XgabHPx ✗ ma+1 2 XgabPx ma+1 ma+2 3 XgabHX ma+2 ma+1 ⊕ ma+2 ⊕ma+3 Table 4: Local corrections that Alice needs to perform to obtain the GHZ state with Bob and Charlie after the non-participants measured their qubits. The left table shows the corrections if the non- participant a + 1 after Alice measured in the σx-basis (βa = 1), the right table the corrections if it was in the σy-basis (βa = 0). The Cab column contains the configuration correction which only depends on the number of non-participants δab between Alice and Bob – note that gab := ⌊δab/4⌋. A.1 Calculating the corrections Using the stabiliser formalism, it is straightforward to show that, starting from a linear cluster state |La,a+1,...,c−1,c⟩, a measurement on node Na+1 in the σx- or σz-basis results in |La,a+2,...,c−1,c⟩up to a local correction Ca+1 ab for Alice, where this correction depends on both the measurement basis βa+1 and outcome ma+1 as Ca+1 ab (ma+1, βa+1) = P (2ma+1+βa+1) z H = HP (2ma+1+βa+1) x , (3) (3) 14 where Pz := Rz π 2  is a half-rotation around the Z-axis and Px is defined similarly. Note that either identity (i.e. the Z- or X-based rotation) can be used. A series of multiple measurements then introduces a concatenation of these corrections, where the corrections are performed in order from Na+1 to Nb−1. They do not necessarily commute, but by using the X- and Z-based correction interchangeably (and thus cancelling out the H operations), and using the identity ZmiPx = PxXmiZmi (and likewise for Pz) one can group all the corrections that are not measurement outcome based together as the first corrections; this allows to partition the complete correction into a ‘configuration’ correction and an outcome-based correction. Specifically, for the alternating pattern of σx and σy measurements, each group of four consecutive measurements together introduces only Pauli corrections. For example, for any group of four consecutive nodes {N1, N2, N3, N4} (note that these labels resemble any set of four consecutive nodes) these corrections are X(m1+m3)Z(m2+m3+m4)X, (βa = 1) X(m1+m2+m3)Z(m2+m4)Z. (βa = 0) (βa = 0) Up to an irrelevant global phase, all these operators commute with each other. Therefore, starting from the last measured node (i.e. Nb−1) an integer multiple of four can be ‘stitched together’. Since there are gab := ⌊δab/4⌋of such groups, the correction becomes Up to an irrelevant global phase, all these operators commute with each other. Therefore, starting from the last measured node (i.e. Nb−1) an integer multiple of four can be ‘stitched together’. Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. A.1 Calculating the corrections Since there are gab := ⌊δab/4⌋of such groups, the correction becomes gab−1 Y i=0 X(mb−4i−4⊕mb−4i−2)Z(mb−4i−3⊕mb−4i−2⊕mb−4i−1)X = XlxZlzXgab, (βa = 1) gab−1 Y i=0 X(mb−4i−4⊕mb−4i−3⊕mb−4i−2)Z(mb−4i−3⊕mb−4i−1)X = XlxZlzZgab, (βa = 0) where lx is defined as where lx is defined as lx := gab−1 M i=0 mb−4i−4 ⊕mb−4i−2, (βa = 1) lx := gab−1 M i=0 mb−4i−4 ⊕mb−4i−3 ⊕mb−4i−2, (βa = 0) and lz is defined as and lz is defined as lz := gab−1 M i=0 mb−4i−3 ⊕mb−4i−2 ⊕mb−4i−1, (βa = 1) lz := gab−1 M i=0 mb−4i−3 ⊕mb−4i−1. (βa = 0) (βa = 0) (βa = 0) The corrections for the measurements of the nodes Na+1, . . . , Na+pab (i.e. the first pab measurements) are then also grouped together; by splitting them into a measurement- outcome dependent and -independent part, they can be written as XkxZkzCab, where Cab, kx and kz can be read from Tab. 4. Note that the Xgab or Zgab in Tab. 4 is technically not part of the correction here, but that they will commute with XkxZkz and hence the total correction that Alice needs to perform becomes (where now Cab is as in Tab. 4): XlxZlzXkxZkzCab ˆ= Xkx⊕lxZkz⊕lzCab, (4) (4) 15 where ˆ= here indicates ‘up to an (irrelevant) global phase’. Since these corrections only consider nodes between Alice and Bob, and since there are actions that Bob needs to perform, the corrections for Charlie work in a similar fashion and can be seen separately from these. Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. B Protocol statement and security proof We now state the protocol and proof the security of the generated key. Note that we have omitted the network state generation (i.e. Protocol 1) as it does not affect security. Input: Alice, Bob and Charlie then hash their string using the seed shEC. Alice encrypts her output using her copy of shEC. Using their copy, Bob and Charlie each decrypt Alice’s hash outcome and compare it to their own; if they do not align, they abort by setting their abort bit to 1. 6. Bob and Charlie use their copies of sEC to obtain lEC and correct their k σz mea- surement strings, i.e. their raw key. Alice, Bob and Charlie then hash their string using the seed shEC. Alice encrypts her output using her copy of shEC. Using their copy, Bob and Charlie each decrypt Alice’s hash outcome and compare it to their own; if they do not align, they abort by setting their abort bit to 1. 7. Alice, Bob and Charlie, using another three bits of the pre-shared key, encrypt their abort bit – which is equal to 1 if and only if they want to abort – and announce it, while all other parties announce uniformly random bits instead. If any participants announced a 1, everyone aborts (meaning they will not use the generated key). 7. Alice, Bob and Charlie, using another three bits of the pre-shared key, encrypt their abort bit – which is equal to 1 if and only if they want to abort – and announce it, while all other parties announce uniformly random bits instead. If any participants announced a 1, everyone aborts (meaning they will not use the generated key). 8. Finally, the participants hash their measurement results with the seed shPA to pro- duce the final key s of length 8. Finally, the participants hash their measurement results with the seed shPA to pro- duce the final key s of length lPA := k  1 −h2(Qtol + µ εs −ε 2  )  + 2 + 2 log2(ε) = ℓ+ ℓEC + ℓhEC + L · h2(p) + 3. However, to fairly evaluate performance the parties should replenish their stock of secret-shared key so as to be able to perform subsequent CKA protocols. Subtracting off the non-reusable shared randomness results in a string of length ℓthat is available for applications. Input: 16 (a) Alice and Charlie apply their configuration corrections Ca and Cc, respectively (cf. Tab. 4). (b) Alice (i = a) and Charlie (i = c) both calculate their parameters li x, ki x and li z, ki z from the measurement outcomes of the non-participants (cf. Tabs. 4 and 5) and each apply Xlx⊕kx and Zlz⊕kz to their qubit. (c) Alice and Charlie each apply a Hadamard operation H to their qubit to obtain the final desired GHZ state. (c) Alice and Charlie each apply a Hadamard operation H to their qubit to obtain the final desired GHZ state. 3. Using the pre-shared string sb, the participants coordinate their measurements of all L GHZ states into m Verification rounds (i.e. σx-basis) and k KeyGen rounds (i.e. σz- basis). Everyone announces after each measurement a random bit mi, except for Bob and Charlie, who announce their measurement outcomes for the Verification rounds. 3. Using the pre-shared string sb, the participants coordinate their measurements of all L GHZ states into m Verification rounds (i.e. σx-basis) and k KeyGen rounds (i.e. σz- basis). Everyone announces after each measurement a random bit mi, except for Bob and Charlie, who announce their measurement outcomes for the Verification rounds. 4. Alice, who can locate Bob’s and Charlie’s measurement outcomes from the Verifi- cation rounds, estimates the σx-basis error rate Qm X = 1 2(1 −⟨σa xσb xσc x⟩). If this is above the tolerance Qtol, she aborts by setting her abort bit to 1. 4. Alice, who can locate Bob’s and Charlie’s measurement outcomes from the Verifi- cation rounds, estimates the σx-basis error rate Qm X = 1 2(1 −⟨σa xσb xσc x⟩). If this is above the tolerance Qtol, she aborts by setting her abort bit to 1. 5. Alice computes the necessary information for error correction – the error syndrome of length ℓEC – and then one-time pad encrypts this information with the string sEC. All other players announce uniform random strings of length ℓEC. 5. Alice computes the necessary information for error correction – the error syndrome of length ℓEC – and then one-time pad encrypts this information with the string sEC. All other players announce uniform random strings of length ℓEC. 6. Bob and Charlie use their copies of sEC to obtain lEC and correct their k σz mea- surement strings, i.e. their raw key. Input: Input: • L network states |N⟩connecting {Ni}n i=1, including Na, Nb and Nc. • Desired secrecy parameter εs > 0, which determines a correlation threshold Qtol, and correctness parameter εc > 0. • A random string sb of length L · h2(p) secretly pre-shared between the participants to randomly choose m out of the L cluster states to be measured in the σx-basis for parameter estimation where p = m/L, leaving k := L −m measurements in the σz-basis for key generation. • An estimate of the expected bit error rate Qz in the σz-basis between Alice and Bob and Alice and Charlie. The worst of these will be used to select an error-correcting code that requires an error syndrome of length ℓEC := k · h2(Qz) to be announced. • A pre-shared secret random string sEC of length ℓEC to be used to one-time pad the error reconciliation announcements, another pre-shared string shEC of length ℓhEC := log2(2/εc) to one-time pad the error correction verification announcements, and three bits of pre-shared key to communicate aborting by the participants. • Two pre-shared random strings, sh and shEC, of lengths k + ℓPA −1 and k + ℓhEC −1 respectively to be used as the seeds for hashing, where ℓPA is the output of the privacy amplification hashing as defined below. The string sh is used for privacy- amplification of the private key, while shEC is used to verify the error correction step has succeeded. Note that unlike the previous seeds, these can be used indefinitely and need not be replenished after each run of the protocol. utput: A key of length ℓshared anonymously between Alice, Bob and Charlie that is -secret and εc-correct. 1. For i = 1, . . . , n: (a) Node Ni receives bit βi−1 and computes βi = 1−βi−1, except for N1 who draws a random bit β0 instead. i. If Ni ∈¯P, they measure the operator σi x or σi y if βi = 0 or βi = 1, respec- tively. They broadcast the measurement outcome mi. ii. If Ni ∈P, they announce a uniform randomly drawn bit mi. (b) Node Ni sends bit βi to neighbour Ni+1, except for node Nn. 2. The participants perform corrections on their qubits to rotate the post-measurement state to the desired GHZ state. cepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. Input: We now prove the security of our protocol in the scope of an even more general adversary model than the one introduced in the main text, so that we can resort to a powerful machinery that has been developed in the literature [35, 36] and we can build on the strategy of proof laid out in Ref. [6]; the security of our protocol within our adversary model then follows readily. However, there are some variations to the tools necessary to preserve the anonymity of the participants which is key to the present work. We briefly explain some critical quantities and definitions. Let ρSASBSCE′ be the joint classical-quantum state between the final keys of the participants and an eavesdropper conditioned on passing all 17 Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. checks. Note that the eavesdroppers system, E′ = ER, is made up of a quantum system, E, that completely purifies the pre-measurement state ρABC (and is, therefore, assumed to include system of the non-participating player) and a classical register R that contains all of the information announced during the protocol. A protocol is called εrob-robust if it passes the correlation and the error correction checks with probability 1 −εrob. Defining a uniformly distributed state as ρU ≡ X s∈S 1 |S||s⟩⟨s| (5) (5) with S the set of possible secret keys we have the following definition [6]. Definition 1 (Approximate robustness and secrecy) A CKA protocol that is εrob-robust is εc-correct if Definition 1 (Approximate robustness and secrecy) A CKA protocol that is εrob-robust is εc-correct if (1 −εrob) Pr [SA ̸= SB ∨SA ̸= SC] ⩽εc (6) (6) and εs-secret if (1 −εrob) 1 2 ∥ρSAE′ −ρU ⊗ρE′∥⩽εs (7) (7) is called (εs + εc)-secure if it is εc-correct and εc secret. Turning first to multi-partite error correction we have the following statement. Theorem 1 (Theorem 2 in Ref. [6]) Given a probability distribution PXA,B1,B2,...,BN , be- tween Alice and n other players there exists a one-way error-correction protocol for all n players that is: εc-correct, and 2(n −1)ε′ -robust on PXA,B1,B2,...,Bn, and has leakage ℓEC ⩽max i Hε′ 0 (XA|Bi) + log2 2(n −1) εc . (8) (8) In terms of secrecy the critical results are leftover hashing against quantum side- information, an entropic uncertainty relation for smoothed min- and max-entropies, applied to our protocol, states the following. cepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. Input: Lemma 1 (Leftover hashing against quantum side information in Refs. [37, 35]) Let ε′ ≥ 0 and ρZAE be a classical-quantum state where ZA is defined over a discrete-valued and finite alphabet, E is a quantum system and R is a register containing the classical infor- mation learnt by Eve during information reconciliation. If Alice applies a hash function, drawn at random from a family of two-universal hash functions that maps ρZAE to ρSAE and generates a string of length ℓ, then 1 2 ∥ρSAER −ρU ⊗ρER∥⩽2−1 2 (Hε′ min(ZA|ER)−ℓ+2) + 2ε′, (9) (9) where Hε′ min (ZA|ER) is the conditional smooth min-entropy of the raw measurement data given Eve’s quantum system and the leakage of the information reconciliation. leads to the following corollary. This leads to the following corollary. This leads to the following corollary. Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. 18 Corollary 1 (Secret string extraction) For an εrob-robust protocol an εs-secret string of length Corollary 1 (Secret string extraction) For an εrob-robust protocol an εs-secret string of length ℓ= Hε′ min (ZA|ER) + 2 −2 log2 1 ε (10) (10) ℓ Hmin (ZA|ER) + 2 2 log2 ε (10) can be extracted for any εs, ε, ε′ ≥0 such that ′ can be extracted for any εs, ε, ε′ ≥0 such that can be extracted for any εs, ε, ε′ ≥0 such that can be extracted for any εs, ε, ε′ ≥0 such that can be extracted for any εs, ε, ε′ ≥0 such that (11) εs ≥ε + 2ε′ (11) where Hε′ min (ZA|ER) is the conditional smooth min-entropy of the raw measurement data given Eve’s quantum system and the information reconciliation leakage conditioned on the protocol not aborting. Proof: Note that if we choose Proof: Note that if we choose ℓ= Hε′ min (ZA|ER) + 2 −2 log2 (1 −εrob) ε , (12) (12) then the right hand side of (9) is equal to ε/(1 −εrob) + 2ε′. Comparing with (7) in Definition 1 we see we want this expression to satisfy ε/(1 −εrob) + 2ε′ ≤εs/(1 −εrob) so our security condition is satisfied for any εs ≥ε + 2(1 −εrob)ε′ which is true for any εs ≥ε+2ε′ where we used that (1−εrob) ≤1. Noting further that log2(1−εrob) ≤0 yields (10). This means that, provided the constraint in (11) is satisfied, the positive constant ε can be optimised over. Input: ε′ max(XA|XBi) ≤kh2(d0 + µ(ε′(1 −εrob))), where µ(ε) := s m + k mk m + 1 m ln 1 ε. (14) Hε′ max(XA|XBi) ≤kh2(d0 + µ(ε′(1 −εrob))), where µ(ε) := s m + k mk m + 1 m ln 1 ε. (14) (14) Putting all of these results together we can prove the following security statement. Putting all of these results together we can prove the following security statement. Theorem 2 (Security statement) If the anonymous CKA protocol defined above proceeds without aborting an (maxi∈{B,C} ℓi EC, εc) error correction protocol and a two-universal hash- ing are successfully applied then an (εs + εc)-secure key of length ℓ= k  1 −h2  Qtol + µ εs −ε 2  + 2 −2 log2 1 ε −ℓEC −ℓhEC −L · h2(p) −3 = L  (1 −p)  1 −h2  Qtol + µ εs −ε 2  −h2 (Qz)  −h2(p)  + log2(ε2εc) −2 (15) (15) can be anonymously extracted. can be anonymously extracted. Proof: At the conclusion of the protocol we can immediately apply Corollary 1 to the k round classical-quantum state ρk ZAE = trBi(|ΨABiE⟩⟨ΨABiE|) to extract an εs-secret key of length ℓ= Hε′ min (ZA|ER) + 2 −2 log2 1 ε (16) (16) for positive constants satisfying for positive constants satisfying εs ≥ε + 2(1 −εrob)ε′. (17) (17) Now, because all of the communication involved in error reconciliation is one-time padded to ensure anonymity we have that Hε′ min (ZA|E, R) = Hε′ min (ZA|E) by definition. This gives Now, because all of the communication involved in error reconciliation is one-time padded to ensure anonymity we have that Hε′ min (ZA|E, R) = Hε′ min (ZA|E) by definition. This gives ℓ = Hε′ min (ZA|E) + 2 −2 log2 1 ε (13) ≥ k −Hε′ max (XA|XBi) + 2 −2 log2 1 ε (17) ≥ k −H(εs−ε)/2/(1−εrob) max (XA|XBi) + 2 −2 log2 1 ε (14) ≥ k −kh2  Qtol + µ εs −ε 2  + 2 −2 log2 1 ε, (18) (18) where in the third line we have also used that Hε1 max(X|Y ) < Hε2 max(X|Y ) for ε1 > ε2. This string is guaranteed to be εs-secret and, by Theorem 1, if the error correction process did not abort then the string is also εc-correct. Input: However, this is not a fair representation of the performance of the protocol, since we had to use up the reservoir of pre-shared key for the basis choices and for one-time padding the error reconciliation information. Thus, to get the length of useable key we need to calculate how much remains after we have replenished the pre-shared strings necessary for the next protocol implementation. Subtracting off the seed for basis choices, Lh2(p), and the length of the error correction information and verification, ℓEC and ℓhEC and the 3 bits for the abort step, gives (15). Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. Input: Typically this makes little difference to the final performance and and they are commonly chosen as ε = εs/2. Now we see that the problem has condensed to determining Eve’s conditional smooth min-entropy for Zk A (in the following we will suppress the k superscript), the variable de- scribing the outcome of Alice’s σz measurements on the k key-generating qubits. To begin with, consider the situation before any information reconciliation is exchanged (there is no register R) so we simply have Hmin(ZA|E). Since Eve’s state is taken to include that of all the non-participating players we can assume without loss of generality that there is an overall pure tripartite state between Alice, the remaining participants (which we denote Bi), and Eve. The required bound for this situation has been derived by applying an en- tropic uncertainty relation [37] for the smoothed min- and max-entropies specialised to the case of observables made up of the k-fold tensor product of either σz and σx measurements, (i.e. the observables ZA = σ1 z ⊗σ2 z ⊗· · · ⊗σk z and XA = σ1 x ⊗σ2 x ⊗· · · ⊗σk x) [35] Hε min(ZA|E) + Hε max(XA|Bi) ≥ k, ⇒Hε min(ZA|E) ≥ k −Hε max(XA|Bi), (13) (13) where we have used the data processing inequality, Hε max(XA|XBi) ≥Hε max(XA|XBi), in the second line. Naively, this bound cannot be evaluated since it is counterfactual, i.e. the k qubits are always measured in the σz-basis so we have no direct access to Hε max(XA|XBi), which is the conditional max-entropy of the participants given their Pauli measurements if Alice had instead measured in the σx in these k rounds. However, since the parameter estimation and key generation rounds were selected at random then it has been shown that Serfling’s bound can be applied to statistically bound the σx correlation that would have been observed in the k key generation rounds based upon those that were actually observed in the parameter estimation rounds. This is expressed in the following result. Lemma 2 (Lemma 3 in Ref. [35]) Let k be the number of key generation rounds, m be the number of parameter estimation rounds, d0 a threshold on the number of errors that can be observed during parameter estimation without the protocol aborting and ε′ > 0. 19 Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. C.1 Definition of anonymity We base our definition of anonymity on [17] (Eqs. B7 and B13) and adapt it to our setting. The definition is given in terms of the relation to an ideal output state of the protocol. Let σN|abc be the ideal output state on the entire network, conditioned on a particular choice of participants P = {Na,Nb,Nc}. Let G ⊂¯P be a random subset of nodes that does not include the participants and define σG|abc = trN\G[σN|abc]. For all sets G and every other choice of participants P′ = {Na′, Nb′, Nc′}, σN|abc should have the property: σG|abc = σG|a′b′c′. (19) (19) This property ensures that the reduced state of any set of non-participants is indepen- dent of the choice of participants.i We define a protocol with output state ρN|abc to be εan-anonymous, if for every choice of participants P = {Na,Nb,Nc}, we have: ρ ¯P|abc −σ ¯P|abc ⩽εan, (20) (20) where σ ¯P|abc is any state that fulfills property (19). where σ ¯P|abc is any state that fulfills property (19). where σ ¯P|abc is any state that fulfills property (19). C Anonymity in the protocol This section is concerned with the anonymity of the protocol. We first define anonymity according to the definition presented in [17] and adapt it to the setting of our protocol. Most importantly for our analysis, we need to show that all public communication – the announced measurement results – is independent of the choice of participants. We do this by showing that they are uniformly random and uncorrelated. 20 Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. C.2.1 Honest-but curious setting Consider the stabilizer of the network state after all CZ operations have been performed in Step 2a of Protocol 1. It is generated by the following collection of operators: στ1 x σω2 z , στ1 z σω2 x στ2 z , {στi z σωi+1 z }a−2 i=2 , {σωi z στi x σωi+1 x στi+1 z }a−2 i=2 , σωa−1 z στa−1 x σωa x , στa−1 z σωa z . (21) (21) The measurement operator of all measurement outcomes together depends on β1 as M = ( σω2 y στ2 x σω3 x στ3 x σω4 y στ4 x σω5 x στ5 x σω6 y . . . στa−1 x , (β1 = 0) σω2 x στ2 x σω3 y στ3 x σω4 x στ4 x σω5 y στ5 x σω6 x . . . στa−1 x , (β1 = 1) (22) (22) where all (σx-)observables acting on {τi}a−1 i=2 are associated with the measurements of Protocol 1 (i.e. the outcomes {oi}) and all others are associated with Protocol 2 (i.e. the outcomes {mi}). It is now our goal to show that all these measurement outcomes are uniformly random, and that there are no correlations between the measurement outcomes associated with any subset S ⊂Q, where Q = {ω2, τ2, . . . , ωa−1, τa−1} is the set of qubits measured throughout both Protocol 1 and Protocol 2. Any such S has an associated observable MS = O i∈S σi b(i), (23) (23) where b(i) ∈{x, y} indicates the type of support on qubit i as shown in Eq. (22). If MS does not commute with at least one generator of the stabiliser (i.e. any operator from Eq. (21)), by Gottesman-Knill simulation, the measurement outcome for MS is uniformly random 0 or 1. If this holds for any S, there cannot be any correlations between any of the measurement outcomes. The uniform randomness of the individual measurement outcomes follows readily for the case when S contains only a single qubit. We now show that any MS indeed always anti-commutes with at least a single generator. Suppose that MS does commute with all generators but is non-trivial. If it has (non- trivial) support on τa−1, this is necessarily with σx. It will then not commute with στa−1 z σωa z (the last generator of Eq. (21)) and hence cannot have support on τa−1. Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. C.2 Proof of anonymity In the proposed protocol, the output state ρ ¯P|abc has several registers. The only non-trivial registers that need to be addressed are the ones containing the classical communication of all the measurement outcomes {oi} ∪{mi}. The reason is that the reduced quantum state of any dishonest party is the maximally mixed state, which is independent of the choice of participants, and therefore trivially fulfills (19). Moreover, all other parties do not hold a quantum register by the end of the protocol. In the remainder of this section we will show that there are no correlations between any of the announced measurement outcomes {oi} ∪{mi}, i.e. that the outcome distribution is indistinguishable from that of the uniformly drawn announcements of the nodes N1, Na and Nc during Protocols 1 and 2. We can then conclude that we have complete anonymity, i.e. our protocol is εan-anonymous for εan = 0. Since the state of the network always remains separable between the tri-partition of the nodes to the left of (and including) Alice, the nodes to the right of (and including) Charlie, and the nodes between (and including) Alice and Charlie, it suffices to show that there are no correlations within the measurement announcements associated with these three separate groups. We show this absence of correlations only for the left set, since the argument applies analogously to the other two sets. We first show this in the case of an honest-but-curious non-participant, followed by the case where a non-participant may actively deviate from the protocol. 21 C.2.1 Honest-but curious setting 2.1 Honest-but curious setting C.2.1 Honest-but curious setting C.2.2 Dishonest participant We are now allowing a single non-participant to deviate from the protocol in an arbitrary way. Let the index of this dishonest non-participant be i. To try to force any other node in the network to implicitly reveal their identity, Ni can actively perform a different measurement than described, where their outcomes would then be correlated with its (e.g.) direct neighbours. If these correlations then do not exist between their outcomes and the announced outcomes, then they can infer that these announced outcomes are artificial, and therefore that those who have announced them are in fact participants. Let this arbitrary measurement be represented by a 2-qubit POVM µi := {µj i}, where without loss of generality j ∈{1, 2, 3, 4}. Slightly abusing notation by combining POVM elements and observables, the measure- ment operator then becomes M = ( σω2 y στ2 x . . . σωi−1 x στi−1 x N µj i N σωi+1 x στi+1 x σωi+2 y . . . στa−1 x , (β1 = 0) σω2 x στ2 x . . . σωi−1 y στi−1 x N µj i N σωi+1 y στi+1 x σωi+2 x . . . στa−1 x , (β1 = 1). (24) (24) Without loss of generality, the underlying network state is still the same4 as in (21). Likewise, all of the single-qubit measurement operators in M for any node Nj̸=i do not commute with at least one of these generators, indicating that the individual measurement outcomes are uniformly random 0 or 1. Similar to before, the goal is to show that no choice of µi can create a measurement operator MS that shows correlations between the qubits of i and any subset S ⊂Q. It suffices to show that there is no MS with support on any of the qubits in Q \ {τi, ωi} that commutes with all generators. By the same analysis as in the previous section, MS cannot have any support on the qubits of any Nj|j∈{a−1,...,i+1}. Moreover, we can make a similar inductive argument for nodes Nj|j∈{2,...,i−1}. Independent of β1, if MS has support on ω2 it will not commute with the generator στ1 x σω2 z . Likewise, if MS has support on τ2, it will not commute with the generator στ1 z σω2 x στ2 z . 4Any non-trivial map that Ni may perform on their subsystem can be merged with the measurements {µi}. The other participants don’t deviate, or Ni is not aware of the deviation and therefore cannot exploit it. C.2.1 Honest-but curious setting Then, if MS has (non-trivial) support on ωa−1, with either a σx or σy, it will not commute with the generator σωa−1 z στa−1 x σωa x - thus it cannot have support on ωa−1 either. We can inductively go through the rest of the qubits in Q in reversed order, i.e. from right to left through the observable from Eq. (22). For j ∈{a −2, a −3, . . . , 3, 2}: Suppose MS has non-trivial support on τj, it is of type σx. Since MS has by con- struction no support on any qubit to the right of τj, it does not commute with the generator στj z σωj+1 z - hence MS cannot have support on τj. Suppose MS has non-trivial support on ωj, either of type σx or σy. Since MS has by construction no support on any qubit to the right of ωj, it does not commute with the generator σωj z στj x σωj+1 x στj+1 z – hence MS cannot have support on ωj. 22 We conclude that there is no MS with non-trivial support on at least a single qubit that does not anti-commute with at least one generator. From this, we can conclude that there are no correlations possible between any set of measurement outcomes from {oi} and {mi}, and that they are thus uniformly random and uncorrelated. Moreover, it stays uniformly random under any noise that does not add a bias in the used measurement bases (i.e. σx and σy). Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. References [1] Gláucia Murta, Federico Grasselli, Hermann Kampermann, and Dagmar Bruß. “Quan- tum conference key agreement: A review”. Advanced Quantum Technologies 3, 2000025 (2020). [2] S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. En- glund, T. Gehring, C. Lupo, C. Ottaviani, J. L. Pereira, M. Razavi, J. Shamsul Shaari, M. Tomamichel, V. C. Usenko, G. Vallone, P. Villoresi, and P. Wallden. “Advances in quantum cryptography”. Adv. Opt. Photon. 12, 1012–1236 (2020). [3] Antonio Acín, Immanuel Bloch, Harry Buhrman, Tommaso Calarco, Christopher Eichler, Jens Eisert, Daniel Esteve, Nicolas Gisin, Steffen J. Glaser, Fedor Jelezko, Stefan Kuhr, Maciej Lewenstein, Max F. Riedel, Piet O. Schmidt, Rob Thew, Andreas Wallraff, Ian Walmsley, and Frank K. Wilhelm. “The European quantum technologies roadmap”. New Journal of Physics 20, 080201 (2018). [4] Sumeet Khatri and Mark M. Wilde. “Principles of quantum communication theory: A modern approach” (2020). arXiv:2011.04672. [5] Michael Epping, Hermann Kampermann, Chiara Macchiavello, and Dagmar Bruß. “Multi-partite entanglement can speed up quantum key distribution in networks”. New Journal of Physics 19, 093012 (2017). [6] Federico Grasselli, Hermann Kampermann, and Dagmar Bruß. “Finite-key effects in multipartite quantum key distribution protocols”. New Journal of Physics 20, 113014 (2018). [7] Federico Grasselli, Hermann Kampermann, and Dagmar Bruß. “Conference key agree- ment with single-photon interference”. New Journal of Physics 21, 123002 (2019). [8] Yadong Wu, Jian Zhou, Xinbao Gong, Ying Guo, Zhi-Ming Zhang, and Guangqiang He. “Continuous-variable measurement-device-independent multipartite quantum communication”. Phys. Rev. A 93, 022325 (2016). [9] Carlo Ottaviani, Cosmo Lupo, Riccardo Laurenza, and Stefano Pirandola. “Modular network for high-rate quantum conferencing”. Communications Physics 2, 118 (2019). [10] Zhaoyuan Zhang, Ronghua Shi, and Ying Guo. “Multipartite continuous variable quantum conferencing network with entanglement in the middle”. Applied Sci- ences8 (2018). [11] Daniel M. Greenberger, Michael A. Horne, and Anton Zeilinger. “Going beyond bell’s theorem”. Pages 69–72. Springer Netherlands. Dordrecht (1989). [12] W. Dür, G. Vidal, and J. I. Cirac. “Three qubits can be entangled in two inequivalent ways”. Phys. Rev. A 62, 062314 (2000). [13] Zixin Huang, Siddarth Koduru Joshi, Djeylan Aktas, Cosmo Lupo, Armanda O. Quintavalle, Natarajan Venkatachalam, Sören Wengerowsky, Martin Lončarić, Sebas- tian Philipp Neumann, Bo Liu, Željko Samec, Laurent Kling, Mario Stipčević, Rupert Ursin, and John G. Rarity. “Experimental implementation of secure anonymous pro- tocols on an eight-user quantum key distribution network”. npj Quantum Information 8, 25 (2022). C.2.2 Dishonest participant We can inductively go through all qubits from the nodes Nj|j∈{2,...,i−1} to show that there exists no MS that has non-trivial support on any qubit of the nodes {2, . . . , i −1, i + 1, . . . , a −1} and at the same time commutes with all the generators. We can conclude that, even for a dishonest node Ni, there are no correlations in the measurement outcomes announced by the other nodes. 23 References [14] Yu-Guang Yang, Xiao-Xiao Liu, Shang Gao, Yi-Hua Zhou, Wei-Min Shi, Jian Li, and Dan Li. “Towards practical anonymous quantum communication: A measurement- device-independent approach”. Physical Review A 104, 052415 (2021). Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. 24 [15] Anupama Unnikrishnan, Ian J. MacFarlane, Richard Yi, Eleni Diamanti, Damian Markham, and Iordanis Kerenidis. “Anonymity for practical quantum networks”. Physical Review Letters 122, 240501 (2019). [16] Frederik Hahn, Jarn de Jong, and Anna Pappa. “Anonymous quantum conference key agreement”. PRX Quantum 1, 020325 (2020). [17] Federico Grasselli, Gláucia Murta, Jarn de Jong, Frederik Hahn, Dagmar Bruß, Her- mann Kampermann, and Anna Pappa. “Secure Anonymous Conferencing in Quantum Networks”. PRX Quantum 3, 040306 (2022). [18] Christopher Thalacker, Frederik Hahn, Jarn de Jong, Anna Pappa, and Stefanie Barz. “Anonymous and secret communication in quantum networks”. New Journal of Physics 23, 083026 (2021). [19] Hans J. Briegel and Robert Raussendorf. “Persistent entanglement in arrays of inter- acting particles”. Physical Review Letters 86, 910 (2001). [20] Robert Raussendorf and Hans J. Briegel. “A one-way quantum computer”. Physical Review Letters 86, 5188 (2001). [21] Marc Hein, Jens Eisert, and Hans J. Briegel. “Multi-particle entanglement in graph states”. Physical Review A 69, 062311 (2004). [22] Matthias Christandl and Stephanie Wehner. “Quantum anonymous transmissions”. In Bimal Roy, editor, Advances in Cryptology - ASIACRYPT 2005. Pages 217–235. Berlin, Heidelberg (2005). Springer Berlin Heidelberg. [23] Nathan Walk and Jens Eisert. “Sharing classical secrets with continuous-variable entanglement: Composable security and network coding advantage”. PRX Quantum 2, 040339 (2021). [24] Damian Markham and Barry C. Sanders. “Graph states for quantum secret sharing”. Phys. Rev. A 78, 042309 (2008). [25] Massimiliano Proietti, Joseph Ho, Federico Grasselli, Peter Bar- row, Mehul Malik, and Alessandro Fedrizzi. “Experimental quan- tum conference key agreement”. Science Advances 7, eabe0395 (2021). arXiv:https://www.science.org/doi/pdf/10.1126/sciadv.abe0395. [26] Clément Meignant, Damian Markham, and Frédéric Grosshans. “Distributing graph states over arbitrary quantum networks”. Physical Review A 100, 052333 (2019). [27] Xi-Lin Wang, Luo-Kan Chen, W. Li, H.-L. Huang, C. Liu, C. Chen, Y.-H. Luo, Z.-E. Su, D. Wu, Z.-D. Li, H. Lu, Y. Hu, X. Jiang, C.-Z. Peng, L. Li, N.-L. Liu, Yu-Ao Chen, Chao-Yang Lu, and Jian-Wei Pan. “Experimental Ten-Photon Entanglement”. Physical Review Letters 117, 210502 (2016). [28] Lukas Rückle, Jakob Budde, Jarn de Jong, Frederik Hahn, Anna Pappa, and Ste- fanie Barz. “Experimental anonymous conference key agreement using linear cluster states” (2022). arXiv:2207.09487. Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. References [29] Alexander Pickston, Joseph Ho, Andrés Ulibarrena, Federico Grasselli, Massimiliano Proietti, Christopher L Morrison, Peter Barrow, Francesco Graffitti, and Alessan- dro Fedrizzi. “Experimental network advantage for quantum conference key agree- ment” (2022). arXiv:2207.01643. [30] Zi-Heng Xiang, Jan Huwer, Joanna Skiba-Szymanska, R. Mark Stevenson, David J. P. Ellis, Ian Farrer, Martin B. Ward, David A. Ritchie, and Andrew J. Shields. “A Accepted in Quantum 2023-09-05, click title to verify. Published under CC-BY 4.0. 25 tuneable telecom wavelength entangled light emitting diode deployed in an installed fibre network”. Communications Physics 3, 121 (2020). tuneable telecom wavelength entangled light emitting diode deployed in an installed fibre network”. Communications Physics 3, 121 (2020). [31] Chao-Wei Yang, Yong Yu, Jun Li, Bo Jing, Xiao-Hui Bao, and Jian-Wei Pan. “Se- quential generation of multiphoton entanglement with a Rydberg superatom”. Nature Photonics 16, 658–661 (2022). [32] Philip Thomas, Leonardo Ruscio, Olivier Morin, and Gerhard Rempe. “Efficient gen- eration of entangled multiphoton graph states from a single atom”. Nature 608, 677–681 (2022). [33] Jarn de Jong, Frederik Hahn, Nikolay Tcholtchev, Manfred Hauswirth, and Anna Pappa. “Extracting ghz states from linear cluster states” (2023). arXiv:2211.16758. [34] Frederik Hahn, Anna Pappa, and Jens Eisert. “Quantum network routing and local complementation”. npj Quantum Information 5, 1–7 (2019). [35] Marco Tomamichel, Charles Ci Wen Lim, Nicolas Gisin, and Renato Renner. “Tight finite-key analysis for quantum cryptography”. Nature Communications 3, 634 (2012). [36] Christopher Portmann and Renato Renner. “Security in quantum cryptography”. Rev. Mod. Phys. 94, 025008 (2022). [37] Marco Tomamichel, Christian Schaffner, Adam Smith, and Renato Renner. “Leftover Hashing Against Quantum Side Information”. IEEE Transactions on Information Theory 57, 5524–5535 (2011). 26
https://openalex.org/W3181944422
https://discovery.ucl.ac.uk/10130961/1/Tsoumpas_RSTA2021_Synergistic%20tomographic%20image%20reconstruction%20-%20part%202.pdf
English
null
Synergistic tomographic image reconstruction: part 2
Philosophical transactions - Royal Society. Mathematical, Physical and engineering sciences/Philosophical transactions - Royal Society. Mathematical, physical and engineering sciences
2,021
cc-by
3,542
Accepted: 17 May 2021 Accepted: 17 May 2021 Downloaded from https://royalsocietypublishing.org One contribution of 9 to a theme issue ‘Synergistic tomographic image reconstruction: part 2’. Subject Areas: computer modelling and simulation, image processing, medical physics, computational mathematics, biomedical engineering, artificial intelligence 8Institute of Nuclear Medicine, and 9Centre for Medical Image Computing, University College London, London, UK CT, 0000-0002-4971-2477; JSJ, 0000-0001-9114-754X; CK, 0000-0002-4355-8368; KT, 0000-0002-5514-199X Keywords: This special issue is the second part of a themed issue that focuses on synergistic tomographic image reconstruction and includes a range of contributions in multiple disciplines and application areas. The primary subject of study lies within inverse problems which are tackled with various methods including statistical and computational approaches. This volume covers algorithms and methods for a wide range of imaging techniques such as spectral X-ray computed tomography (CT), positron emission tomography combined with CT or magnetic resonance imaging, bioluminescence imaging and fluorescence-mediated imaging as well as diffuse optical tomography combined with ultrasound. Some of the articles demonstrate their positron emission tomography, X-ray computed tomography, magnetic resonance imaging, diffuse optical tomography, tomography, open-source software Synergistic tomographic image reconstruction: part 2 royalsocietypublishing.org/journal/rsta Charalampos Tsoumpas1,2,3, Jakob Sauer Jørgensen4,5, Christoph Kolbitsch6,7 and Kris Thielemans8,9 Introduction 1Biomedical Imaging Science Department, University of Leeds, West Yorkshire, UK 2Biomedical Engineering and Imaging Institute, Icahn School of Medicine at Mount Sinai, New York, NY, USA 3Invicro, London, UK 4Department of Applied Mathematics and Computer Science, Technical University of Denmark, Kongens Lyngby, Denmark 5Department of Mathematics, The University of Manchester, Manchester, UK 6Physikalisch-Technische Bundesanstalt, Braunschweig and Berlin, Germany 7School of Biomedical Engineering and Imaging Sciences, King’s College London, London, UK 8Institute of Nuclear Medicine, and 9Centre for Medical Image Computing, University College London, London, UK CT, 0000-0002-4971-2477; JSJ, 0000-0001-9114-754X; CK, 0000-0002-4355-8368; KT, 0000-0002-5514-199X 1Biomedical Imaging Science Department, University of Leeds, West Yorkshire, UK 2Biomedical Engineering and Imaging Institute, Icahn School of Medicine at Mount Sinai, New York, NY, USA 3Invicro, London, UK 4Department of Applied Mathematics and Computer Science, Technical University of Denmark, Kongens Lyngby, Denmark 5Department of Mathematics, The University of Manchester, Manchester, UK 6Physikalisch-Technische Bundesanstalt, Braunschweig and Berlin, Germany 7School of Biomedical Engineering and Imaging Sciences, King’s College London, London, UK 8Institute of Nuclear Medicine, and 9Centre for Medical Image Computing, University College London, London, UK CT, 0000-0002-4971-2477; JSJ, 0000-0001-9114-754X; CK, 0000-0002-4355-8368; KT, 0000-0002-5514-199X Cite this article: Tsoumpas C, Sauer Jørgensen J, Kolbitsch C, Thielemans K. 2021 Synergistictomographicimage reconstruction: part 2. Phil.Trans.R.Soc.A 379: 20210111. https://doi.org/10.1098/rsta.2021.0111 lsocietypublishing.org/ on 05 July 2021 om https://royalsocietypublishing.org/ on 05 July 2021 1. Introduction Image reconstruction describes the process from acquired data to the corresponding image information. Often research in this area is guided by the individual modalities (e.g. magnetic resonance imaging (MRI), X-ray computed tomography (CT) and positron emission tomography (PET) for medical imaging) or by different fields (e.g. tomographic imaging in medicine, biology or industry). Although each modality has its own unique challenges, the underlying image reconstruction problems also have a lot in common and the mathematical, computational and software aspects are not necessarily so different. Downloaded from https://royalsocietypublishing.org/ on 05 July 2021 lsocietypublishing.org/ on 05 July 2021 Each of these areas uses innovative solutions to optimize the reconstructed images. However, there is a lot of synergy between different fields and modalities. The special issue focuses on ideas or methodologies that could be translated across domain areas and hence benefit many different applications. Thus, we hope that the special issue will help accelerate future research across different scientific fields. The common element of the research and review articles is the synergy of different measurements to provide substantially improved information on the unknown quantity/quantities being reconstructed. The approach to synthesizing and combining information intelligently is of great relevance in various research domains beyond the scope of this special issue and we envisage that techniques and ideas presented in this issue may attract interest in completely different application domains. Downloaded from https://royalsocietypublishing.o In order to bring together scientists and academics across different research domains, we organized in November 2019 a symposium on Synergistic Image Reconstruction (http://www.ccpsynerbi.ac.uk/symposium2019) and this special issue includes work presented at this event. The meeting was sponsored by two EPSRC-sponsored networks: the collaborative computational project (CCP) in synergistic PET-MR image reconstruction (CCP-PET-MR, http://www.ccppetmr.ac.uk) and the collaborative computational project in tomographic imaging (CCPi, https://www.ccpi.ac.uk/). Both these networks, which will stay active at least until 2025, with the former expanded to synergistic reconstruction in biomedical imaging (CCP SyneRBI, https://www.ccpsynerbi.ac.uk/), welcome national and international collaborations to better support their scientific communities. The special issue entitled ‘Synergistic Tomographic Reconstruction‘ is separated in two different parts. The first issue (Part 1) included three review articles and five research investigations [1]. 1. Introduction This is the second part of the issue, and focuses on novel concepts as well as methods and software tools that can be useful for multi-spectral and multi-modality imaging such as spectral X-ray CT, MRI, PET-MRI, PET/CT, bioluminescence imaging and fluorescence- mediated imaging as well as diffuse optical tomography with ultrasound. Many of these techniques have been developed only recently and several potential synergies still need to be explored [2]. Author for correspondence: Charalampos Tsoumpas e-mail: Tsoumpas@ieee.org 2021 The Authors. Published by the Royal Society under the terms of the Creative Commons Attribution License http://creativecommons.org/licenses/ by/4.0/, which permits unrestricted use, provided the original author and source are credited. 2 utility on real-world challenges, either medical applications (e.g. motion compensation for imaging patients) or applications in material sciences (e.g. material decomposition and characterization). One of the desired outcomes of the special issues is to bring together different scientific communities which do not usually interact as they do not share the same platforms such as journals and conferences. utility on real-world challenges, either medical applications (e.g. motion compensation for imaging patients) or applications in material sciences (e.g. material decomposition and characterization). One of the desired outcomes of the special issues is to bring together different scientific communities which do not usually interact as they do not share the same platforms such as journals and conferences. royalsocietypublishing.org/journal/rsta Phil. Trans. R.Soc. A 379: 20210111 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . j This article is part of the theme issue ‘Synergistic tomographic image reconstruction: part 2’. 3 royalsocietypublishing.org/journal/rsta Phil. Trans. R.Soc. A 379: 20210111 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . artefacts in the images. Synergy can be achieved on various levels including motion tracking, estimation and correction. The review presents successful examples and discusses software and data available to the scientific community for validation and further use in clinical and preclinical scanners. 3 The next contribution—in two parts—presents the Core Imaging Library (CIL), a new open- source Python framework for processing and reconstruction of tomographic imaging data. Both articles provide complete open-access code and data to fully reproduce results and figures. Part I by Jørgensen et al. [4] gives an overview of CIL and its capabilities to handle both conventional but also challenging datasets such as those with high noise, incomplete data, non-standard scan geometries or obtained with new modalities such as dynamic and spectral CT. A modular object-oriented design and a flexible convex (smooth and non-smooth) optimization framework enable users to experiment with existing reconstruction algorithms or easily implement new ones. The capabilities are demonstrated in four case studies covering synchrotron parallel-beam X-ray CT, laboratory cone-beam laminography, golden-angle neutron tomography and positron emission tomography. Downloaded from https://royalsocietypublishing.org/ on 05 July 2021 Part II by Papoutsellis et al. [5] focuses on the capabilities of CIL for multi-channel cases such as dynamic (time-resolved) and spectral (energy-resolved) tomography. CIL natively supports multi-channel data and provides a number of dedicated regularization methods, such as spatial, spectral and spatio-spectral variants of Total Variation (TV). CIL handles general linear inverse problems, as demonstrated by the first case study of colour denoising and inpainting. The second case study covers fast dynamic CT and compares a range of regularized reconstruction methods including directional TV in terms of compensating for highly undersampled data and exploiting the dynamic dimension. The third and final case study considers K-edge imaging in hyperspectral tomography. The use of CIL algorithms and building blocks demonstrate how cross-channel regularization can produce substantial improvements in reconstruction quality, and the use of a stochastic algorithm to accelerate computations is further discussed (figure 1). Downloaded from https://royalsocietypublishing.o Motion-correction for PET-MRI is the subject of the next paper by Brown et al. [6]. It describes recent additions to the open-source Synergistic Image Reconstruction Framework (SIRF) [7], enabling researchers to develop and evaluate new methods of motion correction and image reconstruction for either PET, MRI or (synergistic) PET-MRI. The article describes the basic functionality and illustrates the software in the context of respiratory motion. 2. Contributions in the second issue The issue commences with a review article by Polycarpou et al. [3] which summarizes various recently proposed motion compensation methods in PET-MRI. Physiological motion of the subject during scanning can affect the diagnostic value of PET-MRI substantially. The synergistic nature of integrated PET-MRI scanners can help combine information and potentially correct for motion 3 royalsocietypublishing.org/journal/rsta Phil. Trans. R.Soc. A 379: 20210111 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . In the example, motion estimation is performed on cardiac MRI data. This is then followed by motion- compensated image reconstruction for both MRI and PET, combining functionality of SIRF and CIL to obtain fully corrected PET-MRI images that are spatially matched. A final software-related contribution by Peter [8] describes a new framework for multi- modality simulation and reconstruction called Musiré. This provides a bash script that allows easy simulation for CT, MR, PET but also bioluminescence imaging (BLI) and fluorescence- mediated imaging (FMI), starting from a single object description. The tool is an interface to several standard open-source packages and handles data format conversions. Although currently, all reconstructions are single-modality, the package simplifies data generation for studying synergistic reconstruction methods. Li et al. [9] describe the development of a promising technique that exploits PET/CT data to perform material decomposition (in two components) without the need for dual-energy X-ray CT, as attenuation for high-energy (511 keV) is estimated from time-of-flight PET data [10]. The paper describes a novel method to reconstruct both activity and high energy attenuation from the PET data by using the X-ray CT for guided reconstruction. The method uses a kernel reconstruction with kernels estimated by an autoencoder convolutional neural network (CNN) with the X-ray CT image as input. The article provides proof-of-concept results in a simulation context. Open-source software implementing the method is also made available. The article by Cueva et al. [11] proposes a new variant of directional TV regularization for spectral CT. Specifically, a spectral CT setup with three energy channels is considered and the three energy channel datasets are initially summed and reconstructed using TV-regularization Figure1. Examplefrom[5]ofhyperspectralX-raytomographicimaginginthreedimensionsofgoldandothermineraldeposits using synergistic reconstruction methods. Localizing and distinguishing inclusions with similar densities is not possible using conventionalX-rayCT.Newenergy-sensitiveX-raydetectorscan,inprinciple,distinguishinclusionsthroughK-edgeabsorption profiles which act as elemental fingerprints. However, the hyperspectral data is very noisy, causing simple reconstruction of energy channels independently to fail: channelwise SIRT reconstruction (left column) of energy channel below (top row) and above(bottomrow)goldandgalenaK-edgesarenoisyandinclusionspoorlydefined.Usingasynergisticreconstructionmethod described in [5] employing both spectral and spatial regularization (right column, same energy channels as before in top and bottom rows) the imaging of mineral phases and small inclusions is strongly improved. Inclusions can be distinguished due to different responses at different energies. For example, unlike the many smaller inclusions (gold and galena) the two large inclusionsinthetoprightonlyshowahighresponseatthelowerenergy,whichhelpstodistinguishtheseaschalcopyrite.Image credit: Laura Murgatroyd, STFC, UKRI. 3. Conclusion 5 The contributions in this second part of the special issue provide an overview of the different scientific fields as well as several software-oriented papers. The latter describe open-source software packages enabling researchers to explore synergistic image reconstruction methods. Where possible, authors have ensured that part of their data has been made publicly available via open data platforms (e.g. Zenodo). We believe that open datasets play an important role in accelerating research outcomes and are equally important to open source code. One of the issues we have noted is the lack of access to clinical datasets primarily due to ethical considerations. Another challenge is that extracting raw data (rather than images) is much harder and usually requires the support by the scanner manufacturer. Having a common protocol or file format for making raw data accessible would strongly help the scientific community, especially scientists from less economically advanced countries who otherwise cannot effectively contribute their scientific ideas to this field. It is our hope that the open-access software described in this issue points towards a more inclusive and open-access research environment to engage more scientists in state-of-the-art research projects, potentially supported by strong international collaborations. d from https://royalsocietypublishing.org/ on 05 July 2021 Downloaded from https://royalsocietypublishing.org/ on 05 July 2021 Data accessibility. This article has no additional data. Data accessibility. This article has no additional data. Data accessibility. This article has no additional data. Authors’contributions. C.T. drafted the manuscript; J.S.J., C.K. and K.T. wrote sections and revised the manuscript; all authors read and approved the manuscript. tributions. C.T. drafted the manuscript; J.S.J., C.K. and K.T. wrote sections and revised the manuscript; rs read and approved the manuscript. Downloaded from https://royalsocietypublishing.org Competing interests. C.T. serves as an executive member of the advisory board of Positrigo AG, Zürich, Switzerland. K.T. is the Director of Algorithms and Software Consulting Ltd, London, UK. The other authors report no conflicts of interest. Funding. This work was funded by the UK EPSRC grants ‘Computational Collaborative Project in Synergistic PET/MR Reconstruction’ (CCP PETMR) EP/M022587/1 and its associated Software Flagship project EP/P022200/1; the ‘Computational Collaborative Project in Synergistic Reconstruction for Biomedical Imaging’ (CCP SyneRBI) EP/T026693/1; ‘A Reconstruction Toolkit for Multichannel CT’ EP/P02226X/1 and ‘Collaborative Computational Project in tomographic imaging’ (CCPi) EP/M022498/1 and EP/T026677/1. C.T. is sponsored by a Royal Society Industry Fellowship (IF170011). J.S.J. was partially supported by The Villum Foundation (grant no. 25893). Downloaded from https://royalsocie Acknowledgements. 4 royalsocietypublishing.org/journal/rsta Phil. Trans. R.Soc. A 379: 20210111 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 hil. Trans. R.Soc. A 379: 20210111 Downloaded from https://royalsocietypublishing.o Figure1. Examplefrom[5]ofhyperspectralX-raytomographicimaginginthreedimensionsofgoldandothermineraldeposits using synergistic reconstruction methods. Localizing and distinguishing inclusions with similar densities is not possible using conventionalX-rayCT.Newenergy-sensitiveX-raydetectorscan,inprinciple,distinguishinclusionsthroughK-edgeabsorption profiles which act as elemental fingerprints. However, the hyperspectral data is very noisy, causing simple reconstruction of energy channels independently to fail: channelwise SIRT reconstruction (left column) of energy channel below (top row) and above(bottomrow)goldandgalenaK-edgesarenoisyandinclusionspoorlydefined.Usingasynergisticreconstructionmethod described in [5] employing both spectral and spatial regularization (right column, same energy channels as before in top and bottom rows) the imaging of mineral phases and small inclusions is strongly improved. Inclusions can be distinguished due to different responses at different energies. For example, unlike the many smaller inclusions (gold and galena) the two large inclusionsinthetoprightonlyshowahighresponseatthelowerenergy,whichhelpstodistinguishtheseaschalcopyrite.Image credit: Laura Murgatroyd, STFC, UKRI. to obtain a side information image. Each energy channel is then reconstructed separately using directional TV regularization with the side information as a reference from which to propagate edge information. Forward–backward splitting and linearized Bregman iterations are compared for solving the resulting optimization problem. Experiments with simulated and real data demonstrate that the proposed method compares favourably with TV-regularization. Di Sciacca et al. [12] present a method for Diffuse Optical Tomographic (DOT) reconstruction using concurrent ultrasound information as guidance. The inverse problem in DOT has a nonlinear forward model and is highly ill-posed. The paper suggests a practical way to guide the three-dimensional DOT reconstruction using a structural prior from a two-dimensional ultrasound acquisition which is segmented and extended to three-dimensional. The paper compares the proposed approach with non-guided Tikhonov regularization on simulated data using the geometry of the proposed system [13]. Open-source software and datasets are made available. 3. Conclusion We wish to thank Ms Alice Power who, as the commissioning editor of the journal, has provided great support in the timely and appropriate completion of both volumes of this special issue. Furthermore, we wish to thank all authors and reviewers of the articles for their work that made the second volume of the special issue possible even during a pandemic. Downloaded from https://r References 1. Tsoumpas C, Jørgensen JS, Kolbitsch C, Thielemans K. 2021 Synergistic tomographic image reconstruction: part 1. Phil. Trans. R. Soc. A 379, 20200189. (doi:10.1098/rsta.2020.0189) 2. Arridge SR, Ehrhardt MJ, Thielemans K. 2021 (An overview of) Synergistic reconstruction for multimodality/multichannel imaging methods. Phil. Trans. R. Soc. A 379, 20200205. (doi:10.1098/rsta.2020.0205) 2. Arridge SR, Ehrhardt MJ, Thielemans K. 2021 (An overview of) Synergistic reconstruction for multimodality/multichannel imaging methods. Phil. Trans. R. Soc. A 379, 20200205. (doi:10.1098/rsta.2020.0205) 3. Polycarpou I, Soultanidis G, Tsoumpas C. 2021 Synergistic motion compensation strategies for positron emission tomography when acquired simultaneously with magnetic resonance imaging. Phil. Trans. R. Soc. A 379, 20200207. (doi:10.1098/rsta.2020.0207) 3. Polycarpou I, Soultanidis G, Tsoumpas C. 2021 Synergistic motion compensation strategies for positron emission tomography when acquired simultaneously with magnetic resonance imaging. Phil. Trans. R. Soc. A 379, 20200207. (doi:10.1098/rsta.2020.0207) g g ( ) 4. Jørgensen JS et al. 2021 Core Imaging Library part I: a versatile Python framework for tomographic imaging. Phil. Trans. R. Soc. A 379, 20200192. (doi:10.1098/rsta.2020.0192) g g 4. Jørgensen JS et al. 2021 Core Imaging Library part I: a versatile Python framework for tomographic imaging. Phil. Trans. R. Soc. A 379, 20200192. (doi:10.1098/rsta.2020.0192) g p g g 5. Papoutsellis E et al. 2021 Core Imaging Library – Part II: multichannel reconstruction for dynamic and spectral tomography. Phil. Trans. R. Soc. A 379, 20200193. (doi:10.1098/rsta.2020.0193) 5. Papoutsellis E et al. 2021 Core Imaging Library – Part II: multichannel reconstruction for dynamic and spectral tomography. Phil. Trans. R. Soc. A 379, 20200193. (doi:10.1098/rsta.2020.0193) ( ) 6. Brown R et al. 2021 Motion estimation and correction for simultaneous PET/MR using SIRF and CIL. Phil. Trans. R. Soc. A 379, 20200208. (doi:10.1098/rsta.2020.0208) 6. Brown R et al. 2021 Motion estimation and correction for simultaneous PET/MR using SIRF and CIL. Phil. Trans. R. Soc. A 379, 20200208. (doi:10.1098/rsta.2020.0208) ( ) 7. Ovtchinnikov E et al. 2020 SIRF: synergistic image reconstruction framework. Comput. Phys. Commun. 249, 107087. (doi:10.1016/j.cpc.2019.107087) 7. Ovtchinnikov E et al. 2020 SIRF: synergistic image reconstruction framework. Comput. Phys. Commun. 249, 107087. (doi:10.1016/j.cpc.2019.107087) 8. Peter J. 2021 Musiré: multimodal simulation and reconstruction framework for the radiological imaging sciences. Phil. Trans. R. Soc. A 379, 20200190. (doi:10.1098/ rsta.2020.0190) 6 royalsocietypublishing.org/journal/rsta Phil. Trans. R.Soc. A 379: 20210111 . . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 royalsocietypublishing.org/journal/rsta Phil. Trans. R.Soc. A 379: 20210111 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9. Li S, Wang G. 2021 Modified kernel MLAA using autoencoder for PET-enabled dual-energy CT. Phil. Trans. R. Soc. A 379, 20200204. (doi:10.1098/rsta.2020.0204) 10. Wang G. 2020 PET-enabled dual-energy CT: image reconstruction and a proof-of-concept computer simulation study. Phys. Med. Biol. 65, 245028. (doi:10.1088/1361-6560/abc5ca) 11. Cueva E, Meaney A, Siltanen S, Ehrhardt MJ. 2021 Synergistic multi-spectral CT reconstruction with directional total variation. Phil. Trans. R. Soc. A 379, 20200198. (doi:10.1098/rsta.2020.0198) ( ) 12. Di Sciacca G et al. 2021 Enhanced diffuse optical tomographic reconstruction using concurrent ultrasound information. Phil. Trans. R. Soc. A 379, 20200195. (doi:10.1098/rsta.2020.0195) 13. Pifferi A et al. 2021 SOLUS: an innovative multimodal imaging system to improve breast cancer diagnosis through diffuse optics and ultrasounds. In Optical Tomography and Spectroscopy of Tissue XIV, vol. 11639, p. 116390C. International Society for Optics and Photonics. Downloaded from https://royalsocietypublishing.org/ on 05 July 2021 lsocietypublishing.org/ on 05 July 2021 om https://royalsocietypublishing.org/ on 05 July 2021
https://openalex.org/W3045675383
https://journal.nurulfikri.ac.id/index.php/jtt/article/download/109/92
Indonesian
null
Penerapan Fasilitas TWAIN Untuk Digitalisasi Kearsipan Pada PT. PLN Area Flores Bagian Barat Berbasis Client-Server
Jurnal teknologi terpadu
2,018
cc-by-sa
3,811
Penerapan Fasilitas TWAIN Untuk Digitalisasi Kearsipan Pada PT. PLN Area Flores Bagian Barat Berbasis Client-Server Meliana Oktavia Meo Program Studi Teknik Informatika, STIKOM Uyelindo Kupang E-mail: meliana.oktavia.g@gmail.com ABSTRACT PLN Area Flores bagian barat masih mengalami banyak kendala, seperti dalam sistem penyimpanan arsipnya saat ini masih bersifat konvensional yaitu menggunakan media kertas sehingga tidak menerapkan sistem pengindeksan yang berakibat pencarian arsip dalam bentuk fisik menjadi sulit dan lambat, rusaknya kertas arsip surat dikarenakan penumpukan dan masih besarnya tingkat kehilangan arsip surat karena dokumen fisik yang berceceran dan tidak tertata dengan baik, serta kesulitan untuk memindahkan arsip surat yang berdasarkan klasifikasi kode arsip ISSN 2477-0043 e-ISSN 2460-7908 ISSN 2477-0043 e-ISSN 2460-7908 ISSN 2477-0043 e-ISSN 2460-7908 Jurnal Teknologi Terpadu Vol. 4, No. 1, Juli 2018 Jurnal Teknologi Terpadu Vol. 4, No. 1, Juli 2018 Jurnal Teknologi Terpadu Vol. 4, No. 1, Juli 2018 ABSTRACT Arsip adalah warkat, gambar atau dalam bentuk yang lain yang disimpan sebagai bahan informasi pada saat diperlukan. Arsip memiliki peranan yang sangat penting bagi suatu instansi atau suatu perusahaan. Arsip yang tidak dikelola dengan baik akan menganggu kelancaran aktivitas suatu organisasi karena arsip yang disimpan merupakan sumber data dan informasi yang berguna bagi suatu organisasi. Oleh karena itu, perlu adanya suatu sistem pengelolaan arsip yang baik dan benar dengan memanfaatkan teknologi komputer. PT. PLN Area Flores Barat adalah salah satu Badan Usaha Milik Negara (BUMN) yang tidak terlepas dari kegiatan surat menyurat dan kearsipan lainnya. Permasalahan yang dialami oleh PT. PLN Area Flores Barat adalah proses penyimpanan arsip surat masih bersifat konvensional dan belum menerapkan sistem pengindeksan serta pemanfaatan teknologi komputer. Hal ini menyebabkan pencarian arsip dalam bentuk fisik menjadi sulit dan lambat, selain itu rusaknya kertas arsip surat dikarenakan penumpukan. Penelitian ini bertujuan untuk membuat sebuah aplikasi bantu yang dapat mempermudah proses pengarsipan dokumen berbasis client-server pada PT. PLN area Flores bagian barat secara digital dengan menerapkan fasilitas TWAIN. Metode yang digunakan dalam penelitian ini adalah metode Waterfall dengan Bahasa pemrograman Microsoft Visual Basic. Hasil penelitian ini dapat membantu dan mempermudah proses pengolahan data kearsipan pada PT. PLN Area Flores Bagian Barat sehingga diharapkan dapat meminimalisasi kehilangan dan kerusakan data serta dapat memberikan informasi yang efektif dan efisien dalam pendukung pengambilan keputusan oleh pimpinan Kata Kunci : Digitalisasi, Kearsipan, Client-Server, TWAIN Flores bagian Barat yang tentunya tidak terlepas dari kegiatan surat menyurat dan kearsipan lainnya namun dalam pelaksanaan kegiatan administrasi, proses penyimpanan arsip surat pada PT. PLN Area Flores bagian barat masih mengalami banyak kendala, seperti dalam sistem penyimpanan arsipnya saat ini masih bersifat konvensional yaitu menggunakan media kertas sehingga tidak menerapkan sistem pengindeksan yang berakibat pencarian arsip dalam bentuk fisik menjadi sulit dan lambat, rusaknya kertas arsip surat dikarenakan penumpukan dan masih besarnya tingkat kehilangan arsip surat karena dokumen fisik yang berceceran dan tidak tertata dengan baik, serta kesulitan untuk memindahkan arsip surat yang berdasarkan klasifikasi kode arsip Flores bagian Barat yang tentunya tidak terlepas dari kegiatan surat menyurat dan kearsipan lainnya namun dalam pelaksanaan kegiatan administrasi, proses penyimpanan arsip surat pada PT. Kata Kunci : Digitalisasi, Kearsipan, Client-Server, TWAIN 2.4 Sistem Penyimpanan Arsip Sistem penyimpanan adalah sistem yang dipergunakan pada penyimpanan warkat agar kemudahan kerja penyimpanan dapat diciptakan dan penemuan warkat yang sudah disimpan dapat diketemukan dengan cepat bilamana warkat tersebut sewaktu-waktu diperlukan. Jurnal Teknologi Terpadu Vol. 4, No. 1, Juli 2018 Jurnal Teknologi Terpadu Vol. 4, No. 1, Juli 2018 benar menerapkan sistem kearsipan berbasis komputer secara optimal. Arsip dibedakan menurut fungsinya menjadi dua golongan [3], yaitu : Pemanfaatan perangkat komputer dalam PT. PLN Area Flores Bagian Barat untuk kearsipan hanya digunakan untuk mengetik surat yang dilakukan pada paket aplikasi Microsoft Office yaitu Microsoft Word dan file-file hasil kerjapun tidak tertata dengan baik yang akhirnya hilang maupun rusak 1. Arsip Dinamis Adalah arsip yang dipergunakan secara langsung dalam perencanaan, pelaksanaan, penyelenggaraan kehidupan kebangsaan pada umumnya atau dipergunakan secara langsung dalam penyelenggaraan administrasi. Oleh karena itu, dibutuhkan pengembangan dalam proses penyimpanan arsip berbasis database dengan memanfaatkan teknologi komputer dan alat scanner untuk melakukan dokumentasi terhadap arsip yang kemudian disimpan ke dalam database sehingga menjadi sistem informasi yang lebih baik. Arsip dinamis aktif dibedakan menjadi dua yaitu : a. Arsip dinamis aktif Adalah arsip dinamis yang masih sering dipergunakan bagi kelangsungan pekerjaan dilingkungan satuan kerja (unit pengolah) pada suatu organisasi. b. Arsip dinamis inaktif b. Arsip dinamis inaktif Adalah arsip dinamis yang frekuensi kegunaannya oleh unit pengolah sudah jarang dan hanya dipergunakan sebagai referensi bagi satu organisasi. g 2. Arsip Statis g 2. Arsip Statis Arsip berasal dari bahasa asing, orang Yunani mengatakan “Archivum” yang artinya tempat untuk menyimpan. Sering pula kata tersebut ditulis “Archeon” yang berarti Balai Kota (tempat untuk menyimpan dokumen) tentang masalah pemerintahan. Adalah arsip yang tidak dipergunakan secara langsung untuk perencanaan, penyelenggaraan kehidupan kebangsaan pada umumnya maupun pada penyelenggaraan sehari-hari administrasi negara. Menurut Bahasa Belanda yang dikatakan dengan “Archief” mempunyai arti [1]. Menurut Bahasa Belanda yang dikatakan dengan “Archief” mempunyai arti [1]. 2.3 Jenis Arsip Sesuai dengan perkembangan teknologi dan kemajuan peralatan data dan informasi yang sudah sampai kepada era komputerisasi, maka arsip masa kini dapat terekam pada kertas, kertas film, dan media komputer. Karena itu sekarang terdapat dua jenis arsip ditinjau dari sudut hukum dan perundang- undangan, yaitu menurut Undang Undang No 7 Tahun 1971 adalah : g f p y 1. Tempat untuk menyimpan catatan-catatan dan bukti-bukti kegiatan yang lain. 2. Kumpulan catatan atau bukti kegiatan yang berjudul tulisan, gambar, grafik dan sebagainya. 3. Bahan-bahan yang akan disimpulkan sebagai bahan pengingat. Menurut Undang Undang No 7 Tahun 1971, arsip adalah : a. Naskah-naskah yang dibuat dan diterima oleh lembaga-lembaga dan bahan-bahan pemerintahan dalam bentuk apapun, baik dalam keadaan tunggal maupun berkelompok dalam rangka pelaksanaan kegiatan pemerintah. 1. Arsip Otentik Yaitu arsip yang diantaranya terdapat tanda tangan asli dengan tinta (bukan fotokopi atau film) sebagai tanda keabsahan dari isi arsip bersangkutan. 2. Arsip Tidak Otentik 2. Arsip Tidak Otentik Yaitu arsip diatasnya tidak terdapat tanda tangan asli dengan tinta. b. Naskah-naskah yang dibuat dan diterima oleh badan-badan swasta atau perorangan, dalam bentuk corak apapun, baik dalam keadaan tunggal maupun berkelompok dalam rangka pelaksanaan kehidupan kebangsaan 1. PENDAHULUAN Seiring dengan berkembangnya teknologi yang semakin canggih di era globalisasi ini maka kegiatan administrasi saat ini juga menuntut akan sistem kearsipan yang terkomputerisasi. Salah satu kegiatan yang erat hubungannya dengan administrasi adalah pengelolaan arsip. Semua lembaga baik swasta maupun pemerintah dalam pelaksanaan kegiatannya tidak terlepas dari arsip surat. Ketepatan dalam pengelolaan arsip akan berpengaruh besar dan dapat memberikan nilai tambah bagi suatu kemajuan aktivitas kerja perusahaan di masa yang akan datang. Dengan memanfaatkan teknologi komputer untuk kelancaran aktivitas suatu organisasi karena arsip yang disimpan selain sebagai alat pengingat juga merupakan sumber data dan informasi yang berguna dalam proses pengambilan keputusan dan sebagai alat bukti dari pelaksanaan kegiatan organisasi. Kendala seperti ini bukan karena pada PT. PLN Flores Barat tidak tersedianya fasilitas listrik dan komputer tetapi pemahaman akan pentingnya sistem informasi kearsipan yang masih sangat minim dan juga kurangnya jumlah pegawai kearsipan yang benar- PT. PLN Area Flores Barat adalah salah satu Badan Usaha Milik Negara (BUMN) dengan area 1 ISSN 2477-0043 e-ISSN 2460-7908 5. Sistem tanggal Adalah sistem penyimpanan arsip menurut urut- urutan tanggal yang tertera pada tiap arsip itu. Sistem ini dapat dipakai bagi arsip yang harus memperhatikan sesutu jangka waktu tertentu, misalnya surat- surat tagihan. 1. Sistem abjad standar untuk mengakomodasi teknologi masa depan [5] standar untuk mengakomodasi teknologi masa depan [5] Adalah sistem penyimpanan arsip yang disimpan menurut abjad dari nama-nama orang/organisasi utama yang tertera dalam tiap-tiap arsip itu. Dengan sistem menurut urut-urutan abjad ini, sepucuk surat yang berhubungan dengan seseorang langsung dapat diketemukan kembali dengan lebih cepat daripada kalau semua surat dicampur adukkan. 4. Sistem nomor c. Crystal Reports sebagai dirancang untuk membuat laporan Adalah sistem penyimpanan arsip yang didasarkan pada kode nomor sebagai pengganti dari nama orang/nama badan atau pokok masalah. Pada sistem ini nomor yang diberikan akan selamanya tetap sama dan tidak pernah berubah. 2.2 Fungsi Arsip Yang dimaksud dengan arsip adalah warkat, gambar atau dalam bentuk yang lain yang disimpan sebagai bahan informasi pada saat diperlukan. Jadi warkat yang disimpan itu suatu ketika dikeluarkan dari tempat penyimpanan dan digunakan sebagai sumber informasi untuk keperluan kegiatan yang sedang dilaksanakan [2] Penyimpanan arsip merupakan aktivitas pokok dalam bidang kearsipan [4]. Sistem penyimpanan arsip dapat di bedakan menjadi lima macam yaitu : 2 ISSN 2477-0043 e-ISSN 2460-7908 Jurnal Teknologi Terpadu Vol. 4, No. 1, Juli 2018 Jurnal Teknologi Terpadu Vol. 4, No. 1, Juli 2018 3.3.1 Usecase Diagram Usecase menggambarkan interaksi yang terjadi dalam sistem, yang memberi gambaran user atau actor yang berhubungan dengan sistem dan hal-hal yang berhubungan dengan user di dalam sistem. Pengklasifikasian sistem penyimpanan ini dilakukan agar pegawai kearsipan dapat dengan mudah dan cepat dalam melakukan pekerjaan penyimpanan arsip dan juga dalam penemuan kembali arsip yang akan diperlukan. p 2. Sistem pokok soal 2. Sistem pokok soal Adalah sistem penyimpanan arsip yang disimpan menurut urutan yang dimuat, dalam tiap- tiap arsip bersangkutan. Isi arsip sering juga disebut sebagai perihal, pokok masalah, permasalahan dan pokok surat atau subjek. Misal, surat yang mengenai iklan dikumpulkan menjadi satu dibawah judul “iklan”. 3.2 Antarmuka Perangkat Lunak 3. Sistem geografis Dalam penelitian ini, adapun spesifikasi perangkat lunak yang digunakan: Adalah sistem penyimpanan arsip yang didasarkan pada pengelompokan menurut nama tempat (wilayah). Sistem ini sering disebut juga sistem lokasi. a. Microsoft Visual Basic 6.0 sebagai Bahasa pemrograman. p g b. StarUML sebagai media perancangan system 4. Sistem nomor 3.1 Jenis Penelitian Menurut penggunaannya, penelitian yang digunakan saat ini adalah penelitian terapan (applied research). Penelitian terapan ialah setiap penelitian yang bertujuan untuk meningkatkan pengetahuan ilmiah dengan suatu tujuan praktis. Hasil dari penelitian diharapkan dapat segera dipakai untuk keperluan praktis yaitu menerapkan teknologi TWAIN dalam bentuk aplikasi kearsipan secara digital pada PT. PLN Area Flores Bagian Barat. 3.3 Perancangan dan Konstruksi Sistem Tahapan dalam pembuatan perangkat lunak ini terdiri atas beberapa bagian utama sebagai berikut: 5. Sistem tanggal 2.5 Fasilitas TWAIN Usecase Diagram System Mengelola Data Bagian Mengelola Data Jabatan Mengelola Data Jenis Mengelola Data Sifat Mengelola Data Arsip Mengelola Data User Mengelola Data Scan Arsip Mengelola Data Instansi Mengelola Data Pegawai Mengelola Data Pemohon Mengelola Data Pelanggan Mengelola Data Meteran Mengelola Data Migrasi Mengelola Data Surat Masuk Petuga Mencetak Laporan Pegawai Mencetak Laporan Pemohon Mencetak Laporan Pelanggan Mencetak Laporan Meteran Mencetak Laporan Migrasi Mencetak Laporan Surat Masuk Mencetak Laporan Disposisi Surat Mencetak Laporan Surat Keluar 3.3.3 Activity Diagram Mengelola Data Jabatan Gambar 3. Activity Diagram Mengelola Data Jabatan Petugas User Interface System Database Initialize User Request Sent Request Execute Request Sent Response Accept Response Tambah Refresh Cari Data Tambah Refresh Hapus Ubah Cari Keyword Initialize ID Get ID Checking ID Sent ID Cek Validasi Data Submit Proses Execute Proses Display Data Jabatan Pilih Jabatan Request Data jabatan .3 Activity Diagram Mengelola Data Jabatan Gambar 3. Activity Diagram Mengelola Data Jabatan 3.3.4 Activity Diagram Mengelola Data Instansi Gambar 4. Activity Diagram Mengelola Data Instansi 3.3.5 Perancangan Antarmuka Bagian ini akan merupakan implementasi atau kontruksi tampilan dari program yang akan dibuat a. Perancangan Form Bagian Petugas User Interface System Database Initialize User Request Sent Request Execute Request Sent Response Accept Response Tambah Refresh Cari Data Tambah Refresh Hapus Ubah Cari Keyword Initialize ID Get ID Checking ID Sent ID Cek Validasi Data Submit Proses Execute Proses Request Data Instansi Display Data Instansi Pilih Instansi 3.3.4 Activity Diagram Mengelola Data Instansi Gambar 4. Activity Diagram Mengelola Data Instansi Petugas User Interface System Database Initialize User Request Sent Request Execute Request Sent Response Accept Response Tambah Refresh Cari Data Tambah Refresh Hapus Ubah Cari Keyword Initialize ID Get ID Checking ID Sent ID Cek Validasi Data Submit Proses Execute Proses Request Data Instansi Display Data Instansi Pilih Instansi 3.3.4 Activity Diagram Mengelola Data Instansi Gambar 1. Usecase Diagram 3.3.2 Activity Diagram Mengelola Data Bagian Gambar 2. Activity Diagram Mengelola Data Bagian Petugas User Interface System Database Initialize User Request Sent Request Execute Request Sent Response Accept Response Tambah Pilih Jabatan Refresh Cari Data Tambah Refresh Hapus Ubah Cari Keyword Initialize ID Get ID Checking ID Sent ID Cek Validasi Data Submit Proses Execute Proses Request Data Bagian Display Data Bagian 3.3.2 Activity Diagram Mengelola Data Bagian 3.2 Activity Diagram Mengelola Data Bagian Gambar 4. 2.5 Fasilitas TWAIN TWAIN (Technology Without An Interesting Name) adalah sebuah standar API (Application Programming Interface) untuk pengambilan gambar pada sistem operasi Microsoft Windows dan Machintos. Diperkenalkan pada 1992, dan saat ini diratifikasi pada versi 1.9 (per Januari 2000). Standar dikelola oleh TWAIN Working Group, sebuah organisasi nirlaba yang tidak mewakili industri pencitraan. Grup TWAIN adalah organisasi nirlaba yang mewakili industri pencitraan. Tujuan TWAIN adalah untuk menyediakan dan mengembangkan standar umum universal yang menghubungkan aplikasi dan perangkat akuisisi citra. Misi yang sedang berlangsung dari organisasi ini adalah untuk terus meningkatkan 3 ISSN 2477-0043 Jurnal Teknologi Terpadu e-ISSN 2460-7908 Vol. 4, No. 1, Juli 2018 Gambar 1. Usecase Diagram 3.3.2 Activity Diagram Mengelola Data Bagian 3.3.3 Activity Diagram Mengelola Data Jabatan Gambar 3. Activity Diagram Mengelola Data Jabatan 3.3.4 Activity Diagram Mengelola Data Instansi Gambar 4. Activity Diagram Mengelola Data Instansi 3.3.5 Perancangan Antarmuka Bagian ini akan merupakan implementasi atau kontruksi tampilan dari program yang akan dibuat a. Perancangan Form Bagian System Mengelola Data Bagian Mengelola Data Jabatan Mengelola Data Jenis Mengelola Data Sifat Mengelola Data Arsip Mengelola Data User Mengelola Data Scan Arsip Mengelola Data Instansi Mengelola Data Pegawai Mengelola Data Pemohon Mengelola Data Pelanggan Mengelola Data Meteran Mengelola Data Migrasi Mengelola Data Surat Masuk Petugas Mencetak Laporan Pegawai Mencetak Laporan Pemohon Mencetak Laporan Pelanggan Mencetak Laporan Meteran Mencetak Laporan Migrasi Mencetak Laporan Surat Masuk Mencetak Laporan Disposisi Surat Mencetak Laporan Surat Keluar Petugas User Interface System Database Initialize User Request Sent Request Execute Request Sent Response Accept Response Tambah Pilih Jabatan Refresh Cari Data Tambah Refresh Hapus Ubah Cari Keyword Initialize ID Get ID Checking ID Sent ID Cek Validasi Data Submit Proses Execute Proses Request Data Bagian Display Data Bagian Petugas User Interface System Database Initialize User Request Sent Request Execute Request Sent Response Accept Response Tambah Refresh Cari Data Tambah Refresh Hapus Ubah Cari Keyword Initialize ID Get ID Checking ID Sent ID Cek Validasi Data Submit Proses Execute Proses Display Data Jabatan Pilih Jabatan Request Data jabatan Petugas User Interface System Database Initialize User Request Sent Request Execute Request Sent Response Accept Response Tambah Refresh Cari Data Tambah Refresh Hapus Ubah Cari Keyword Initialize ID Get ID Checking ID Sent ID Cek Validasi Data Submit Proses Execute Proses Request Data Instansi Display Data Instansi Pilih Instansi ISSN 2477-0043 e-ISSN 2460-7908 Jurnal Teknologi Terpadu Vol. 4, No. 1, Juli 2018 3.3.3 Activity Diagram Mengelola Data Jabatan Gambar 3. 2.5 Fasilitas TWAIN Activity Diagram Mengelola Data Jabatan 3.3.4 Activity Diagram Mengelola Data Instansi Gambar 4. Activity Diagram Mengelola Data Instansi 3.3.5 Perancangan Antarmuka Bagian ini akan merupakan implementasi atau kontruksi tampilan dari program yang akan dibuat a. Perancangan Form Bagian Petugas User Interface System Database Initialize User Request Sent Request Execute Request Sent Response Accept Response Tambah Refresh Cari Data Tambah Refresh Hapus Ubah Cari Keyword Initialize ID Get ID Checking ID Sent ID Cek Validasi Data Submit Proses Execute Proses Display Data Jabatan Pilih Jabatan Request Data jabatan Petugas User Interface System Database Initialize User Request Sent Request Execute Request Sent Response Accept Response Tambah Refresh Cari Data Tambah Refresh Hapus Ubah Cari Keyword Initialize ID Get ID Checking ID Sent ID Cek Validasi Data Submit Proses Execute Proses Request Data Instansi Display Data Instansi Pilih Instansi Gambar 1. Usecase Diagram 3.3.2 Activity Diagram Mengelola Data Bagian Gambar 2. Activity Diagram Mengelola Data Bagian System Mengelola Data Bagian Mengelola Data Jabatan Mengelola Data Jenis Mengelola Data Sifat Mengelola Data Arsip Mengelola Data User Mengelola Data Scan Arsip Mengelola Data Instansi Mengelola Data Pegawai Mengelola Data Pemohon Mengelola Data Pelanggan Mengelola Data Meteran Mengelola Data Migrasi Mengelola Data Surat Masuk Petugas Mencetak Laporan Pegawai Mencetak Laporan Pemohon Mencetak Laporan Pelanggan Mencetak Laporan Meteran Mencetak Laporan Migrasi Mencetak Laporan Surat Masuk Mencetak Laporan Disposisi Surat Mencetak Laporan Surat Keluar Petugas User Interface System Database Initialize User Request Sent Request Execute Request Sent Response Accept Response Tambah Pilih Jabatan Refresh Cari Data Tambah Refresh Hapus Ubah Cari Keyword Initialize ID Get ID Checking ID Sent ID Cek Validasi Data Submit Proses Execute Proses Request Data Bagian Display Data Bagian Gambar 1. Usecase Diagram System Mengelola Data Bagian Mengelola Data Jabatan Mengelola Data Jenis Mengelola Data Sifat Mengelola Data Arsip Mengelola Data User Mengelola Data Scan Arsip Mengelola Data Instansi Mengelola Data Pegawai Mengelola Data Pemohon Mengelola Data Pelanggan Mengelola Data Meteran Mengelola Data Migrasi Mengelola Data Surat Masuk Petug Mencetak Laporan Pegawai Mencetak Laporan Pemohon Mencetak Laporan Pelanggan Mencetak Laporan Meteran Mencetak Laporan Migrasi Mencetak Laporan Surat Masuk Mencetak Laporan Disposisi Surat Mencetak Laporan Surat Keluar Gambar 1. 2.5 Fasilitas TWAIN Activity Diagram Mengelola Data Instansi 3.3.5 Perancangan Antarmuka Bagian ini akan merupakan implementasi atau kontruksi tampilan dari program yang akan dibuat a. Perancangan Form Bagian 3.3.5 Perancangan Antarmuka 3.3.5 Perancangan Antarmuka Bagian ini akan merupakan implementasi atau kontruksi tampilan dari program yang akan dibuat a. Perancangan Form Bagian Gambar 2. Activity Diagram Mengelola Data Bagian 4 ISSN 2477-0043 e-ISSN 2460-7908 Jurnal Teknologi Terpadu Vol. 4, No. 1, Juli 2018 d. Perancangan Form Jenis Form Jenis 1 Kode Nama Kode Nama Jenis Tambah Ubah Hapus Refresh Cari Tutup Halaman x/x Gambar 8. Perancangan Form Jenis e. Perancangan Form Scan Arsip Form Pilih Device Scan Arsip Simpan Gambar Tutup Gambar 9. Perancangan Form Scan Arsip f. Perancangan Form Pelanggan Form Pelanggan Kode Nama Pelanggan Alamat No. Telp Keterangan d. Perancangan Form Jenis d. Perancangan Form Jenis Form Bagian 1 Kode Nama Bagian Bagian Kode Nama Tambah Ubah Hapus Refresh Cari Tutup Halaman x/x Gambar 5. Perancangan Form Bagian d. Perancangan Form Jenis Form Jenis 1 Kode Nama Kode Nama Jenis Tambah Ubah Hapus Refresh Cari Tutup Halaman x/x Gambar 8. Perancangan Form Jenis Gambar 8. Perancangan Form Jenis Gambar 5. Perancangan Form Bagian Gambar 5. Perancangan Form Bagian e. Perancangan Form Scan Arsip e. Perancangan Form Scan Arsip e. Perancangan Form Scan Arsip Form Pilih Device Scan Arsip Simpan Gambar Tutup Gambar 9. Perancangan Form Scan Arsip e. e. Perancangan Form Scan Arsip Form Pilih Device Scan Arsip Simpan Gambar Tutup Gambar 9. Perancangan Form Scan Arsip b. Perancangan Form Jabatan b. Perancangan Form Jabatan b. Perancangan Form Jabatan Form Jabatan 1 Kode Nama Kode Nama Jabatan Tambah Ubah Hapus Refresh Cari Tutup Halaman x/x Gambar 6. Perancangan Form Jabatan b. Perancangan Form Jabatan Form Jabatan 1 Kode Nama Kode Nama Jabatan Tambah Ubah Hapus Refresh Cari Tutup Halaman x/x Gambar 6. Perancangan Form Jabatan Gambar 6. Perancangan Form Jabatan Gambar 6. Perancangan Form Jabatan f. Perancangan Form Pelanggan f. Perancangan Form Pelanggan Form Pelanggan 1 Kode Nama Pelanggan Kode Nama Tambah Ubah Hapus Refresh Cari Tutup Halaman x/x Alamat No. Telp Keterangan Gambar 10. Perancangan Form Pelanggan c. Perancangan Form Instansi c. Perancangan Form Instansi Form Bagian Instansi 1 Kode Nama Bagian Instansi Kode Nama Tambah Ubah Hapus Refresh Cari Tutup Halaman x/x Gambar 7. Perancangan Form Instansi Gambar 10. Perancangan Form Pelanggan Gambar 7. Perancangan Form Instansi 5 ISSN 2477-0043 e-ISSN 2460-7908 ISSN 2477-0043 e-ISSN 2460-7908 ISSN 2477-0043 e-ISSN 2460-7908 Jurnal Teknologi Terpadu Vol. 4, No. 1, Juli 2018 c. Tampilan Form Data Jenis surat Tabel 1. File pendukung implementasi program Tabel 1. File pendukung implementasi program Gambar 13. Tampilan Form Data Jenis Surat d. Tampilan Form Scan Dokumen Gambar 14 Tampilan form Scan Dokumen d. Tampilan Form Scan Dokumen d. 4.1 Implementasi Sistem 4.1 Implementasi Sistem Aplikasi dapat berjalan dengan baik apabila memiliki file-file pendukung untuk menunjang proses yang akan dijalankan. c. Tampilan Form Data Jenis surat Gambar 13. Tampilan Form Data Jenis Surat d. Tampilan Form Scan Dokumen Gambar 14 Tampilan form Scan Dokumen e. Tampilan Form Scan Dokumen Berikut adalah beberapa file pendukung dalam implementasi program ini yaitu: Berikut adalah beberapa file pendukung dalam implementasi program ini yaitu: Tabel 1. File pendukung implementasi program 4.2 Antarmuka Sistem a. Tampilan Form Utama Gambar 11. Tampilan form utama b. Tampilan Data Bagian Instansi Gambar 12. Tampilan Form Data Bagian Instansi c. Tampilan Form Data Jenis surat Gambar 13. Tampilan Form Data Jenis Surat d. Tampilan Form Scan Dokumen Gambar 14 Tampilan form Scan Dokumen e. Tampilan Form Scan Dokumen pa file pendukung dalam itu: lementasi program pilan form utama Instansi c. Tampilan Form Data Jenis surat Gambar 13. Tampilan Form Data Jenis Surat d. Tampilan Form Scan Dokumen Gambar 14 Tampilan form Scan Dokumen e. Tampilan Form Scan Dokumen c. Tampilan Form Data Jenis surat c. Tampilan Form Data Jenis surat c. Tampilan Form Data Jenis surat 5. KESIMPULAN Dari penelitian yang dilakukan dapat disimpukan bahwa aplikasi yang dibuat dapat berjalan dengan baik dan dapat diterima dengan baik. Dengan adanya aplikasi digitalisasi kearsipan pada PT. PLN Area Flores Bagian Barat berbasis client-server dengan menggunakan fasilitas TWAIN maka akan membantu dan mengolah data kearsipan yang lebih efektif dan efisien. Gambar 15. Tampilan form laporan pegawai Gambar 15. Tampilan form laporan pegawai 4.3 Deskripsi Sistem Sistem yang ditawarkan merupakan sistem baru dimana berbasis komputerisasi dalam penanganan data kearsipan berbasis clint-server. Selain itu, di dalam sistem ini juga dilengkapi dengan tool TWAIN untuk mempermudah proses scan dokumen sehingga langsung disimpan pada database dengan demikian demikian, data kearsipan selain disimpan dalam bentuk dokumen fisik juga dapat disimpan dalam bentuk data digital yaitu setiap file gambar yang discan akan tersimpan di dalam database (bukan di dalam folder tertentu) sehingga mengurangi kehilangan atau kekurangan data data Sistem yang dirancang juga menggunakan level otentifikasi untuk membedakan pengguna sistem berdasarkan bagian tertentu dan dengan level akses tertentu sehingga dilengkapi dengan password administrator yang berarti hanya user yang memiliki hak akses yang boleh menggunakan sistem yang dibuat 4.2 Antarmuka Sistem 4.2 Antarmuka Sistem a. Tampilan Form Utama Gambar 11. Tampilan form utama Gambar 11. Tampilan form utama b. Tampilan Data Bagian Instansi Gambar 12. Tampilan Form Data Bagian Instansi b. Tampilan Data Bagian Instansi Gambar 12. Tampilan Form Data Bagian Instansi b. Tampilan Data Bagian Instansi Gambar 14 Tampilan form Scan Dokumen Gambar 14 Tampilan form Scan Dokumen e. Tampilan Form Scan Dokumen e. Tampilan Form Scan Dokumen Gambar 12. Tampilan Form Data Bagian Instansi 6 ISSN 2477-0043 e-ISSN 2460-7908 ISSN 2477-0043 e-ISSN 2460-7908 Jurnal Teknologi Terpadu Vol. 4, No. 1, Juli 2018 Jurnal Teknologi Terpadu Vol. 4, No. 1, Juli 2018 Jurnal Teknologi Terpadu Vol. 4, No. 1, Juli 2018 DAFTAR PUSTAKA [1] Sedarmayanti. 2003. Tata Kearsipan dengan Memanfaatkan Teknologi Modern. Bandung : Mandar Maju j [2] Mulyono, Sularso. 2003. Manajemen Kearsipan. Semarang. UNNES [2] Mulyono, Sularso. 2003. Manajemen Kearsipan. Semarang. UNNES [3] Republik Indonesia. 1971. Undang-Undang Nomor 7 Tahun 1971 tentang Ketentuan- ketentuan Pokok Kearsipan. Lembaran Negara RI Tahun 1971 Nomor 32. Sekretariat Negara. Jakarta [4] The Liang Gie. 2000. Administrasi Perkantoran Moderen. Yogyakarta : Liberty [4] The Liang Gie. 2000. Administrasi Perkantoran Moderen. Yogyakarta : Liberty [5] TWAIN. 2017. Twain Initiative. http://www.twain.org (diakses tanggal 7 Maret 2017) [5] TWAIN. 2017. Twain Initiative. http://www.twain.org (diakses tanggal 7 Maret 2017) 7 7
https://openalex.org/W3214191682
https://scindeks-clanci.ceon.rs/data/pdf/1821-2077/2019/1821-20771902069P.pdf
Bosnian
null
The analysis of the market position and marketing potentials of crossfit
Sport - nauka i praksa
2,019
cc-by
6,453
1   nesaperic@gmail.com UDK 005.346:796.015.14 659.11:796 Nenad Perić1 Univerzitet Metropolitan i Univerzitet Union-Nikola Tesla, Beograd, Srbija Apstrakt: CrossFit je prepoznat kao jedan od najbrže rastućih programa trenin- ga na svetu. Usled svoje nezahtevnosti, širine obuhvata i suštinski jednostavne primenljivosti u prethodnih desetak godina je registrovan veliki broj vežbača i klubova koji ga praktikuju širom sveta. Njegov jednostavan i razumljiv koncept je omogućio stvaranje velikog socijalnog kapitala - velikog broja vežbača, instruk- tora i klubova koji su, takođe, vid promocije programa. Pored toga što je postao kategorija za sebe, CrossFit je izrastao i u posebnu kulturu, a temelji ovog progra- ma su funkcionalnost i potreba ljudi za vežbanjem i zdravim životom. Usled broja ljudi koji praktikuju ovaj program, petocifrenog broja CrossFit klubova širom sveta i njegove velike i kontinuirane medijske prisutnosti, može se reći da je CrossFit po- stao globalni sportski pokret koji se konstantno razvija i ima ogroman marketinški potencijal.CrossFit je jedan od najboljih primera da su jednostavne stvari i ideje obično i najdelotvornije u bilo kojoj grani, pa tako i sportskoj industriji. Ključne reči: CrossFit, vežbanje, vežbač, program, potencijal, jednostavnost Ključne reči: CrossFit, vežbanje, vežbač, program, potencijal, jednostavnost SPORT - Nauka i Praksa, Vol. 9, №2, 2019, str. 69-76. SPORT - Nauka i Praksa, Vol. 9, №2, 2019, str. 69-76. Stručni rad Stručni rad UVOD U svetu, pa i kod nas je u prethodnih desetak godina zabeležena veli- ka ekspanzija CrossFita.CrossFit je prepoznat kao jedan od najbrže rastućih programa treninga (visokog intenziteta) na svetu (Claudino i sar., 2018). Pa ipak, kod nas se ni jedan naučni rad ne bavi istim. Otuda i potiče motivacija za pisanje rada koji će predstaviti ovaj program, te analizirati njegovu tržišnu poziciju i marketinški potencijal. Pored toga, samo nekolicina naučnih radova 6  69 69  SPORT - Nauka i Praksa, Vol. 9, No 2, 2019. inostranih autora ovaj program u manjem obimu analizira kao marketinški fenomen, gotovo isključivo se radi o radovima koji izučavaju fiziološke efekte praktikovanja istog. CrossFit Inc. je kompanija koju je osnovao Greg Glassman 2000. godine. 2005. godine pod imenom CrossFit delovala je mreža od 13 teretana. Danas, ta mreža broji preko 13000 filijala u oko 150 zemalja širom sveta (https://map.cross- fit.com/?_ga=2.95823068.1142892516.1574639395-1739441689.1574639395). Godine 2007. osnovane su The CrossFit Games koje se od tada redovno održa- vaju svakog leta i iz godine u godinu privlače sve veći broj takmičara. Vreme- nom su postale toliko popularne da je nagradni fond drastično povećan, tako da prvoplasirani takmičari u muškoj i ženskoj konkurenciji osvajaju po 300.000 američkih dolara, a novčanu nagradu dobijaju (u opadajućim iznosima) svi tak- mičari na prvih dvadeset pozicija, što pokazuje finansijsku snagu ovog progra- ma i organizacije.Takođe, CrossFit svojom medijskom i internet zastupljenošću doprinosi stvaranju on-line zajednice, u kojoj se razmenjuju iskustva, stilovi, rezultati, koji unapređuju CrossFit kao veštinu vežbanja. CrossFit se bazira na dinamičnom programu vežbanja čiji je cilj pove- ćanje opšte spremnosti vežbača, njegove snage i kondicije, ali i jačanje psiho- loške strane, zajedništva i timskog rada. Trening se obično sastoji od kratkog zagrevanja, dvadesetominutnog napornog i vrlo zahtevnog treninga, i dugo- trajnog istezanja. CrossFit se bazira na 10 krucijalnih tačaka: kardiovasku- larna/respiratorna izdržljivost, snaga, kondicija, fleksibilnost, brzina, gipkost, koordinacija, agilnost, ravnoteža i preciznost (Benjamin, 2012).Obuhvatajući više olimpijskih disciplina (olimpijsko dizanje tegova, plivanje, gimnastiku, atletiku…), on teži stvaranju polivalentnih sportista. Sa visokim intenzitetom treninga i velikim brojem ponavljanja stavlja se naglasak na specifičan broj ponavljanja, specifične težine i specifične pokrete za određeno vreme. Ovim se omogućava jasno merenje rezultata u fizičkoj spremi. Takođe, CrossFit podrazumeva da vežbači mogu praviti svoje programe prema individualnim zahtevima. Ova vrsta treninga je popularna u vojsci SAD-a i koriste je policije SAD i Velike Britanije. UVOD Međutim, CrossFit zbog intenziteta i veoma eksplo- zivne akcije mišića ima mnogo pozitivnih strana i za ljude koji su prosečni kad je u pitanju vežbanje (Meyer, Morrison, Zuniga, 2017). Vežbe mogu biti raznolike (trčanje, vijača, veslanje, zgibovi, sklekovi, propadanja, mrtva di- zanja, trzaj, izbačaj…), a izvode se u bezbroj kombinacija, od kojih se jedna izabere kao VD-vežba dana (eng. WOD-workout of the day), tako da ni jedan trening nije isti. VD obično trener ispiše na tabli i onda svako na njoj upisuje svoj rezultat. Takvim načinom pristupa neguje se sportski takmičarski duh, ali i zajedništvo, međusobno pomaganje i savetovanje. Svaki trener mora po- sedovati sertifikat-licencu koju dobija pohađanjem kursa na kome obavezno učestvuje i u izvođenju vežbi, a ne samo u teoretskoj nastavi. Pored osnovnog 70  Nenad Perić: ANALIZA POZICIJE I MARKETINŠKIH POTENCIJALA CROSSFIT PROGRAMA ANALIZA POZICIJE I MARKETINŠKIH POTENCIJALA CROSSFIT PROGRAMA kursa, radi se i na kursevima koji se odnose na pripreme sportskih timova, raznih olimpijaca, trudnica, dece itd. kursa, radi se i na kursevima koji se odnose na pripreme sportskih timova, raznih olimpijaca, trudnica, dece itd. CrossFit i tržišno okruženje Kada je CrossFit u pitanju, možemo reći da je najznačajnije sagledati trendove u oblasti fitnesa i velnesa uopšte, kao i potrošače, odnosno ciljnu grupu. i i p p j g p Ako posmatramo fitnes iz tržišnog aspekta, mogli bi da ga okarakte- rišemo kao vrstu usluge iz oblasti rekreacije, a koja treba da zadovolji kori- snikovu potrebu za zdravljem, lepotom, kretanjem, zabavom i ublažavanjem negativnih efekata savremenog načina života. Iz te perspektive, fitnes (eng. fitness) predstavlja industriju koja prodaje mnoštvo usluga, proizvoda i fit- nes filozofiju življenja. Iz toga sledi da fitnes predstavlja svojevrsnu privrednu granu, pa unutar njega, važe isti principi kao i u svim ostalim delatnostima. Danas je fitnes mnogo više u odnosu na nekadašnji pristup rekreaciji i vezan je za naplative kategorije, kao što su: fitnes objekti, programi, oprema, pre- parati i stručno i specijalizovano osoblje. U fitnesu se sve više javljaju novi programi vežbanja koji se poslednjih godina jednim imenom nazivaju “grupni vođeni programi”. Pod tim imenom podrazumevaju se programi vežbanja koji su različiti po svom sadržaju, nameni, upotrebi rekvizita i sprava, ali isti po aerobnom režimu rada i grupnom vođenju treninga, najčešće uz muziku kao stimulišući medij. Praktikuju se sledeći oblici vežbanja: step aerobik, aqua aerobik, body sculpting ili body styling, body pump, kick boxing, tae-bo, spi- ning, latino, funky, hip-hop, salsa, afro, etno aerobik; jazzersize; low impact i mnogi drugi Za sve ove programe, možemo kod nas koristiti termin aerobik ili fitnes programi (Stojiljković, 2005). Trend velnesa (eng. wellness) kao načina života i razvoj velnes turi- zma u Severnoj Americi i Evropi razvija se u poslednje tri decenije, dok u našoj zemlji postaje popularan od početka tekuće. Koncept velnesa razvio je američki lekar Halbert Dun (Halbert Dunn) 1959. godine, kada prvi put piše o ,,specifičnom stanju zdravlja koje obuhvata sveopšti osećaj blagostanja, posmatrajući čoveka kao celinu sačinjenu od tela, duha i uma i koji je zavisan od okoline u kojoj se nalazi” (Dunn, 1957). Hansruedi i Kaufman pokušavaju da udruže razumevanje pojma velnesa u Severnoj Americi i Evropi, ističući da on predstavlja stanje zdravlja koje karakteriše harmonija tela, uma i duha, odgovornost prema samom sebi, fizička aktivnost, briga o lepoti, zdrava is- hrana, relaksiranje, meditacija, mentalna aktivnost, obrazovanje, osećanje za okolinu i društvene veze, kao osnovni elementi velnesa (Hansruedi, Kauf- man, 2000). CrossFit i tržišno okruženje Termin okruženje u smislu marketinga se različito koristi. Kotler, na primer, u definiciji marketinškog okruženja uključuje sve faktore izvan ak- tivnosti menadžmenta marketinga u preduzeću, što podrazumeva unutrašnje i spoljne uticaje. Razlike između kategorija okruženja ilustruje konceptom slojeva okruženja, koje se nadovezuju jedan na drugi. Za primer uzima sa- mo faktore koje smatra ključnim u odnosu na svaki pojedinačni nivo (Kotler, 1997). Interno okruženje. Pod ovim nazivom Russ i Kirpatrick podrazumeva- ju interaktivne odnose međuzavisnosti između marketinga i ostalih aktivnosti menadžmenta. Na primer, u nadmetanju oko obezbeđenja sredstava za svoje aktivnosti ili oko međusobne saradnje u donošenju odluka (Russ i Kirpatrick, 1982). Mikrosredina. Ovaj drugi nivo obuhvata faktore koji utiču na me- nadžment marketinga, a koji su izvan organizacionih granica preduzeća. Tu spadaju: konkurencija, distribucija, dobavljači, potrošači itd. i javnost. Strateg marketinga treba posebno da sagledava značaj javnosti i obezbedi efikasan odnos sa njenim važnim elementima. Makrosredina. Na faktore ovog nivoa pojedinačna organizacija gotovo da nema nikakav uticaj. To su: socio-kulturološka sredina, političko-zakon- ska, ekonomska, tehnološka i fizička. Svaki od njih utiče na strategiju marke- tinga i zato se moraju sistematski pratiti njihove promene i trendovi. Ključni problem u proceni okruženja koje obuhvata sve događaje i trendove izvan granica marketinške aktivnosti je upravo identifikovanje tren- dova koji su najznačajniji za analizu, jer ne postoje čvrsta i brza pravila za njihovo razlikovanje. Treba naglasiti da identifikovanje najvažnijih trendova zahteva znatnu kreativnost i sposobnost predviđanja. Ponekad na izgled nebi- tan trend ili promena može biti presudna u dugoročnom smislu. Najvažniji razlog zbog koga se procena okruženja i vrši je procena najverovatnijih uticaja na organizaciju. Planerima tržišne strategije, Kotler (1997) za ovu procenu sugeriše korišćenje matrice mogućnosti i opasnosti. Matrica mogućnosti služi planeru da proceni relativnu atraktivnost koju pru- ža okruženje, kao i šanse za uspeh ako se deluje u određenom pravcu. Uslov za to je procena kvaliteta i slabosti kompanije. Isto tako, planer treba da pro- ceni i mogući uticaj eventualnih opasnosti iz okruženja, kao i stepen njihove ozbiljnosti u odnosu na aktivnosti organizacije. Naravno, ovo su pojednosta- vljeni primeri. Prava analiza procene okruženja uzima u obzir nekoliko tren- dova odjednom i procenjuje njihov pojedinačni i unakrsni uticaj. Problemi u 71  SPORT - Nauka i Praksa, Vol. 9, No 2, 2019. definisanju trendova i teškoće u preciznom predviđanju posledica ne umanju- ju suštinski značaj postupaka procene za spremnije dočekivanje budućnosti. CROSSFIT I NJEGOV (TRŽIŠNI) OBUHVAT I POTENCIJAL CrossFit može da trenira svako, muškarci i žene svih uzrasta. Vežbač sam sebi određuje intenzitet treninga prevashodno uz nadzor instruktora, ia- ko to nije obavezno, CrossFit je „slobodna kategorija“. Prva faza ulaska u program je upoznavanje sa svim vežbama i gimnastičarskim elementima koje se koriste i usavršavanje izvođenja istih sa svojom telesnom težinom. Nakon uspešnog savladavanja takvih vežbi i postizanja dobre kondicije, koordina- cije, gipkosti, izdržljivosti prelazi se u drugu fazu. U njoj se unose u vežbe, bučice, tegovi i olimpijsko dizanje, ergometri. Tehnika izvođenja samih vežbi se prvo usavršava sa manjim kilažama, a većim brojem ponavljanja, nakon čega se postepeno kilaže povećavaju. Cilj drugog nivoa je povećanje snage i zadržavanje i povećavanje stečene kondicije.Treća faza je najozbiljnija jer u njoj počinje trka vežbača sa samim sobom u cilju postizanja ličnih rekorda. Ovde se ne koriste sprave na koje inače nailazite u teretanama. Koriste se girije, olimpijske šipke, tegovi, karike, vratila, traktorske gume, medicinske lopte, ergometri, mornarski kanapi, ramovi za vuču itd. Dakle, prema osnovnoj postavci, CrossFit programi su osmišljeni tako da ih može koristiti svako bez obzira na dotadašnje iskustvo i spremnost jer pružaju mogućnost prilagođavanja težine i načina treninga konkretnoj osobi i njenim ciljevima. Zahteva neznatnu investiciju kluba ili pojedinca što se tiče opreme potrebne za vežbanje. Takođe, jedan isti program može biti upotre- bljen za pripremu osoba koje se bave borilačkim veštinama kao i osoba koje imaju neke srčane probleme. Programi ostaju isti, ono što se menja jeste op- terećenje i intenzitet programa vežbanja. Stoga je potencijalni tržišni obuhvat ovog programa ogroman, kako u smislu pojedinaca koje može privući, tako i u smislu sportskih klubova koji ga mogu praktikovati i uspostaviti saradnju sa CrossFit mrežom koja je doživela ogroman rast u proteklih desetak godina. Temelji ovog sporta su, funkcionalnost i potreba svih ljudi za vežba- njem i zdravim životom. Filozofija CrossFita je jednostavna, to je da svaki prosečan vežbač treba da dostigne svoj maksimum u onim fitnes ciljevima koji su njemu najpotrebniji. Dodatna motivacija svim CrossFit vežbačima je to što je svaki trening baziran na kombinaciji različitih vežbi. Stoga i ne čudi što su CrossFit trenere zvali i karatisti i bejzbol igrači, plivači, bokseri, ne bi li usavršili neke segmente svoje forme. CrossFit koristi gimnastički izraz „progresije“ za definisanje procesa tranzicije za savladavanje svakog pokreta. Pristup progresiji osigurava samoefikasnost stvaranjem dostižnih koraka ka težim izazovima. CrossFit i tržišno okruženje Kao što vidimo, za razliku od fitnesa, velnes veći akcenat stavlja na ono što čini organizmu dobro, jer je fizička aktivnost samo jedna od stavki pobrojanih u gornjm nabrajanju. Dakle, velnes može uključivati fitnes, dok fitnes često proširuje svoje usluge onima iz oblasti fitnesa, a i jedno i drugo se, kao i CrossFit, bore za ideju dobrobiti osobe koja ih praktikuje. U tome su marketinški veoma razrađeni jer predtavljaju ozbiljne tržišne kategorije koje privlače sve više ljudi, pa samim tim i sredstava. 72  Nenad Perić: Nenad Perić: ANALIZA POZICIJE I MARKETINŠKIH POTENCIJALA CROSSFIT PROGRAMA CROSSFIT I NJEGOV (TRŽIŠNI) OBUHVAT I POTENCIJAL Posvećenost većem cilju će ojačati i potaknuti motivaciju članova tokom procesa (Meier, Becker, & Vandenberghe, 2004). Motivacija se takođe pojačava posmatranjem ostalih članova i interakcijom sa njima. Že- ljeni rezultati opažanja bili bi porast samoefikasnosti, uverenje da pojedinac 73  SPORT - Nauka i Praksa, Vol. 9, No 2, 2019. može izvršiti zadatak i očekivano trajanje ishoda, percepcija da će ispunjenje zadatka doneti pozitivan krajnji rezultat (Gibson, 2004). Članovi rade zajed- no na poboljšanju svojih veština i napretku u poteškoćama, čime se razvija kolektivan duh na zdravoj i jakoj, ali neinvazivnoj osnovi, ne postoji moranje da se trening ili određena vežba uradi do kraja, već članovi grupe podržavaju jedni druge da budu što bolji u vežbanju. Međuzavisnost je potrebna u razme- ni znanja kad god jedna strana ne može ostvariti svoj cilj bez pomoći druge (McNeish & Mann, 2010). Međutim, postoji drugi faktor koji održava grupu, jednom kada se for- mira: kako članovi napreduju, tako napreduje i njihov status unutar grupe (Holmes i Meierhoff, 1999). Ovo stvara strateški sistem nagrađivanja ugra- đen u model napredovanja. Sistemi nagrađivanja pomažu da se podstaknu članovi da zajedno rastu i razvijaju se kroz strukturu kolektivne zajednice (Martin-Perez, Martin-Cruz i Estrada-Vakuero, 2010). Kako se novi članovi razvijaju u iskusne članove, sistem nagrađivanja podstiče ih da podrže nove članove njihovim napredovanjem. Ovim se stvara odlična baza potencijalnih vežbača i imidž grupa koje vežbaju CrossFit kako u užoj javnosti (fitnes, vel- nes i sl), tako i široj javnosti, potencijalnim vežbačima. ZAKLJUČAK Svet je pun trendova u fitnesu, a novi trendovi počinju svakog dana. Većina njih, kao i novih brendova, nikada ne doživi pun razvoj. „Globaliza- cija današnjeg tržišta je široko prisutna u svim sferama društva i kao takva neizostavan je deo problematike tržišta sporta. Pozicioniranje i stvaranje pre- poznatljivog imena, odnosno dobrog imidža na globalnom tržištu, predstavlja zahtevan posao koji podrazumeva dugoročne kontinuirane napore, i to mnogo veće od onih koje definiše lokalna konkurencija“ (Ratković, Dašić, 2018). Ra- zlog ovome je prezasićenost tržišta različitim ponudama, kao i prezasićenost glava potrošača i auditorijuma tim istim ponudama i drugim marketinškim promocijama (Perić, Krasulja, Radojević, 2011). Razlika između mnogih drugih programa i CrossFita je korišćenje na- gona društvenog kapitala da utiče na promene (Durlauf i Fafchamps, 2004). CrossFit je započeo jedan čovek, sportski entuzijasta i od male grupe ljudi koja je razvila zajednički jezik, članstvo i napredovanja proširio je na sve kon- tinente. Glavni razlog uspeha ovog programa i njegova svetska popularnost se mogu naći u jednostavnosti njegovog koncepta: ispunjava potrebu mnogih vezanu za fizičko zdravlje, spremu i uzročno posledično fizički izgled; svako ga može praktikovati u meri u kojoj mu odgovara; podstiče koheziju grupa vežbača i želju za napretkom uz razvijanje zdravog takmičarskog duha, pre- vashodno na individualnom, pa potom na grupnom nivou; zahteva minimalnu 74  Nenad Perić: Nenad Perić: ANALIZA POZICIJE I MARKETINŠKIH POTENCIJALA CROSSFIT PROGRAMA ANALIZA POZICIJE I MARKETINŠKIH POTENCIJALA CROSSFIT PROGRAMA investiciju i pojedinca i kluba koji ga praktikuju; ima jednostavan i razumljiv koncept. Taj jednostavan i razumljiv koncept je omogućio stvaranje socijal- nog kapitala, velikog broja vežbača koji su, takođe, vid promocije programa (marketing od usta od usta je u većini slučajeva najdelotvorniji marketing). Pored toga, omogućio je organizaciju masovnog takmičenja koje zbog pri- rode sporta nije zahtevalo naročite tehničke preduslove za njegovo izvođe- nje, a sprovođenje organizacije istog se najvećim delom zasniva na ljudima koja praktikuju CrossFit i instruktorima istog. CrossFit je jedan od najboljih primera da su jednostavne stvari i ideje obično i najdelotvornije u bilo kojoj oblasti, pa i sportskoj industriji. Pored toga što je postao kategorija za sebe, CrossFit je izrastao i u posebnu kulturu, a temelji ovog programa su funkcionalnost i potreba svih ljudi za vežbanjem i zdravim životom. ZAKLJUČAK Usled broja ljudi koji praktikuju ovaj program, petocifrenog broja CrossFit klubova širom sveta i njegove velike i kontinuirane medijske prisutnosti, može se reći da je CrossFit postao globalni sportski pokret koji se konstantno razvija i ima ogroman marketinški poten- cijal. UDK 005.346:796.015.14 659.11:796 Nenad Perić1 Metropolitan University and University Union - Nikola Tesla, Belgrade, Serbia Nenad Perić1 Abstract: CrossFit is recognized as one of the fastest growing training programs in the World. Due to its width of scope and essentially simple applicability, it has registered a large number of practitioners and clubs practicing it worldwide in the last ten years. Its simple and understandable concept has made it possible to create a large social capital - a large number of practitioners, instructors and clubs, which are also a part of the program promotion (word-of-mouth). In addition to becoming a category in itself, CrossFit has grown into a distinct culture, and the foundations of this program are its functionality and people’s need to exercise and live a healthy life. Due to the number of people practicing this program, the 5-digit number of CrossFit clubs worldwide and its large and continuous media presence, it can be said that CrossFit has become a constantly evolving global sports movement with a huge marketing potential. CrossFit is one of the best examples that simple things and ideas are usually the most effective in any branch, including the sports industry. Key words: CrossFit, exercise, exerciser, program, potential, simplicity 1   nesaperic@gmail.com LITERATURA 1. Benjamin A. S., (2012). Using Sport Education to Implement a CrossFit Unit, Journal of Physical Education, Recreation & Dance Volume 83, 2012 - Issue 8. 2. Claudino, J.G., Gabbett, T.J., Bourgeois, F. et al. (2018). CrossFit Overvi- ew: Systematic Review and Meta-analysis, Sports Med - Open (2018) 4: 11. https://doi.org/10.1186/s40798-018-0124-5 3. Dunn, H., (1959). High level wellness for man and society, American Journal of Public Health, 49(6): 786–792. 4. Durlauf, S. N., Fafchamps, M. (2004). Social capital, NBER Working Pa- per Series, 1-89. (http://www.nber.org/papers/w10485) 5. Gibson, S. (2004). Social learning (cognitive) theory and implications for human Resource, Advances in Developing Human Resources, 6(2), 193-210.f 6. Holmes, J., Meyerhoff, M. (1999). The community of practice: Theories and methodologies in language and gender research, Language in socie- ty, 28(02), 173-183. 7. Jain, C., (1984). Environmental scanning: how the best companies do it, Journal of Long Rang Planning, Vol. 17. 8. McNeish, J., Mann, I. (2010). Knowledge sharing and trust in organizati- ons. IUP Journal of Knowledge Management, 8(1/2), 18-38. 9. Kotler, P. (1997). Marketing management: analisys, planning, implemen- tation and control, Prentice-Hall, New Jersey. 75  SPORT - Nauka i Praksa, Vol. 9, No 2, 2019. 10. Martín-Pérez, V., Martín-Cruz, N., Estrada-Vaquero, I. (2012). The in- fluence of organizational design on knowledge transfer. Journal of Kno- wledge Management, 16(3), 418-434.i 11. Meyer, J., Morrison, J. Zuniga, J. (2017). The Benefits and Risks of CrossFit: A Systematic Review, Workplace Health & Safety 2017, 612- 618. https://doi.org/10.1177/2165079916685568 12. Meyer, J., Becker, T., Vandenberghe, C. (2004). Employee commitment and motivation: a conceptual analysis and integrative model, Journal of applied psychology, 89(6).991-1007. 13. Mueller, H., Kaufmann, E. L., Wellness Tourism: Market Analysis of a special health tourism segment and implications for the hotel industry, Journal of Vacation Marketing, 2000, 2-3. 14. Perić, N., Krasulja, N., Radojević, I. (2011). Medijske, PR i brend tenden- cije, drugo, prošireno izdanje, Synopsis. 15. Ratković, M., Dašić, D. (2018). Marketing u sportu sa elementima indu- strije sporta, Visoka škola modernog biznisa 16. Russ, A., Kirkpatrick, C., Marketing, Little, Browne & Co, Boston, 1982.i 16. Russ, A., Kirkpatrick, C., Marketing, Little, Browne & Co, Boston, 1982. 17. Stojiljković, S., Fitness, Fakultet sporta i fizičkog vaspitanja, Beograd, 2005. 17. Stojiljković, S., Fitness, Fakultet sporta i fizičkog vaspitanja, Beograd, 2005. 18. https://map.crossfit.com/?_ga=2.95823068.1142892516.1574639395- 1739441689.1574639395 76  SPORT - Science & Practice, Vol. 9, №2, 2019, pp. 69-77. INTRODUCTION In the past ten years there has been a significant expansion of CrossFit. CrossFit is recognized as one of the fastest growing high-intensity functional training modes in the world (Claudino et. al., 2018). Yet, no scientific papers in Serbia deal with this topic. That served as a motivation for writing this paper, which will briefly introduce this program, analyse its marketing potential and market positioning in the field of sports and healthy living. In addition, only a 69  SPORT - Science & Practice, Vol. 9, No 2, 2019. few scientific papers analyse this program as a marketing phenomenon, to an extent; almost exclusively, papers concerning CrossFit deal with the physiolo- gical effects of practicing this program. CrossFit Inc. is a company founded by Greg Glassman in 2000. In 2005, the network of collaborating gyms under the name CrossFit numbered 13 venu- es. Today, the network counts over 13,000 branches in about 150 countries worl- dwide (https://map.crossfit.com/?_ga=2.95823068.1142892516.1574639395- 1739441689.1574639395). In 2007, The CrossFit Games was founded and since then it has been regularly held every summer and it attracts more and more competitors every year. Over time, they have become so popular that the prize pool has drastically increased, with first-place competitors in the men's and women's competitions winning $ 300,000 each, and prizes (in decreasing amounts) being awarded to all competitors in the top twenty positions, which shows the financial power of this program and organizations. Also, CrossFit contributes to the creation of an online community through its online presen- ce, in which experiences, styles, workout results are exchanged between the people participating in this programme. This enhances CrossFit as an exercise skill. CrossFit is based on a dynamic exercise program that aims at increasing the overall fitness of the body, strength and shape, as well strengthening the mental state of the exerciser, unity and teamwork. Training usually consists of short warm-ups, twenty minutes of strenuous and very demanding training, and prolonged stretching. CrossFit is based on 10 crucial points: cardiovascu- lar / respiratory endurance, strength, fitness, flexibility, speed, suppleness, coordination, agility, balance and precision (Benjamin, 2012). Encompassing multiple Olympic disciplines (Olympic weightlifting, swimming, gymnastics, athletics…), it seeks to create polyvalent athletes. This is done with high-in- tensity training, a high number of repetitions, specific weights and specific movements for a certain amount of time. This allows for a clear measurement of the results in terms of physical fitness. INTRODUCTION CrossFit also implies that exercisers can make their own programs according to individual requirements. This type of exercise is quite popular with the US military and used by the US and UK police. However, because of the intensity and very explosive action of the muscle, CrossFit has many positive effects on people of average fitness (Meyer, Morrison, Zuniga, 2017). Exercises can be varied (running, rowing, hinges, joints, decay, deadlifts, etc.), and they are performed in a myriad of combinations, one of which is selected as the WOD-workout of the day. The WOD is usually written by a trainer on a board and then everyone writes down their score. This approach fosters a competitive sporting spirit as well as fellowship, mutual assistance and counselling. Each trainer must have a certificate that he / she obtains by attending a specific course in which he / she is obliged to take practical training, and not just theoretical instruction. In 70  Nenad Perić:THE ANALYSIS OF THE MARKET POSITION AND MARKETING POTENTIALS OF CROSSFIT addition to the basic course, there are also courses related to the preparation of sports teams, various Olympic categories, pregnant women, children, etc. addition to the basic course, there are also courses related to the preparation of sports teams, various Olympic categories, pregnant women, children, etc. CROSSFIT FUNCTION AND EFFECTS A true environmental assessment analysis considers several trends at once and assesses their individual and unified impact. The problems in defi- ning trends and the difficulty in accurately predicting consequences do not diminish the essential importance of assessment procedures for better prepa- redness for the future. When it comes to CrossFit, we can say that it is crucial to look at trends in the field of fitness and wellness in general, as well as con- sumers and the target group.i If we look at fitness from a market point of view, we could characterize it as a type of service for recreation, which should satisfy the user's need for health, beauty, movement, fun and minimize the negative effects of modern lifestyle. From this perspective, fitness is an industry that sells a multitude of services, products and a fitness philosophy of living. It follows that fitness is a kind of an industry, and within it, the same principles apply as in all other activities. Today, fitness goes way beyond the former approach to recreation and is linked to payable categories, such as: fitness facilities, programs, equ- ipment, preparations and professional and specialized staff. There are more and more new fitness programs in fitness, especially group guided programs in recent years. These programs are different in content, purpose, use of props and weights, but the same in aerobic mode and group training, usually accom- panied by music as a stimulating medium. The following forms of exercise are practiced: step aerobics, aqua aerobics, body sculpting or body styling, body pumping, kick boxing, tae-bo, spinning, Latin, funky, hip-hop, salsa, afro, ethno aerobics; jazzersize; low impact and many more For all these programs, we can use the term aerobics or fitness programs (Stojiljković, 2005). The wellness trend as a lifestyle and the development of wellness tou- rism in North America and Europe has been ongoing over the last three deca- des, while it has become popular in Serbia since the beginning of the current decade. The concept of wellness was developed by an American physician Halbert Dunn in 1959, when he first wrote about „a specific state of health that encompasses a universal sense of well-being, viewing man as a whole made up of body, spirit and mind and dependent on the environment in which he/she is located” (Dunn, 1957). CROSSFIT FUNCTION AND EFFECTS The term environment is used differently in marketing terms. Kotler's definition of a marketing environment includes all factors beyond the activi- ties of marketing management within the company, including both intrinsic and extrinsic influences. The differences between environment categories are illustrated by the concept of the layers of environment, which overlap one another. He takes as an example only the factors he considers crucial in rela- tion to each individual level (Kotler, 1997). Internal environment. Russ and Kirpatrick imply interactive relations- hips of interdependence between marketing and other management activities. For example, when competing for the provision of resources for their activities or for mutual cooperation in decision making (Russ and Kirpatrick, 1982).f Microenvironment. The second level covers factors that affect marke- ting management beyond the organizational boundaries of a business. This includes: competition, distribution, suppliers, consumers, etc. and the public. A marketing strategist should especially consider the importance of the public and ensure an effective relationship with its important elements. Macro environment. Individual organization practically does not in- fluence factors at this level. These are: socio-cultural environment, political and legal, economic, technological and physical environment. Each of them influences the marketing strategy and therefore their changes and trends must be systematically monitored. The key problem in assessing the environment, which encompasses all events and trends beyond the boundaries of marketing activity is the identifi- cation of trends that are most relevant for analysis. Especially since there are no exact rules to distinguish them. It should be emphasized that identifying the most important ones requires considerable creativity and foresight. Espe- cially since sometimes a seemingly irrelevant trend or change can be crucial in the long run. The most important reason for assessing the environment is to evalu- ate the most likely impacts on an organization. For market strategy planners, Kotler (1997) suggests using an opportunity and threats matrix for this as- sessment. The opportunity matrix serves the planner to evaluate the relative attractiveness that the environment provides, as well as the chances of success if it works in a particular direction. The condition for this is to evaluate the quality and weakness of the company. The planner should also evaluate the potential impact and potential hazards of the environment, as well as their 71  SPORT - Science & Practice, Vol. 9, No 2, 2019. degree in relation to the organization's activities. Of course, this is just the basics. CROSSFIT AND ITS (MARKET) SCOPE AND POTENTIAL CrossFit can be practiced by anyone, men and women of all ages. The exerciser determines the intensity of the training primarily under the super- vision of their instructor, although this is not mandatory - CrossFit is a “free category”. The first phase of entering the program is getting acquainted with all the exercises and gymnastics elements used and perfecting their execution using one's own body weight. After successfully mastering such exercises and achieving good fitness, coordination, flexibility, endurance, the second stage comes in. It includes exercises with dumbbells, weights and Olympic lifting, ergometers. The technique of executing the exercises is first perfected with smaller weights and more repetitions, after which the weights gradually increase. The goal of the second level is to increase strength and maintain and boost the acquired fitness. The third phase is the most serious because it initi- ates a competition with oneself in order to achieve personal records. This does not imply the use of the devices you might normally find in gyms. It involves weights, Olympic bars, links, shafts, tractor tires, medical balls, ergometers, navy ropes, tow frames, etc. So, by default, CrossFit programs are designed to be practiced by anyo- ne, regardless of experience and willingness, as they provide the ability to ta- ilor the difficulty and way of training to a specific person and their goals. The equipment needed to practice CrossFit requires little investment by a club or an individual. Also, the same program with its varieties can be used to prepare martial arts practitioners as well as people with heart conditions. The basics of the program remain the same, what is changing is the workload and the intensity of the exercise programs. Therefore, the potential market coverage of this program is enormous, both in terms of the individuals it can attract and in terms of sports clubs that can implement it and establish collaboration with the CrossFit Network, which has seen a huge expansion in the past ten years. The foundations of the program are the functionality and the need of people to exercise and live a healthy life. CrossFit's philosophy is simple: eve- ry individual should reach their maximum in the fitness goals they needs the most. An additional motivation for all CrossFit workouts is that each workout is based on a combination of different exercises. CROSSFIT FUNCTION AND EFFECTS Hansruedi and Kaufman try to bring together the understanding of the wellness concept in North America and Europe, emp- hasizing that it represents a state of health characterized by harmony of body, mind and spirit, self-responsibility, physical activity, beauty care, healthy ea- ting, relaxation, meditation, mental activity, education, sense of environment and social connections, as the basic elements of wellness (Hansruedi, Kauf- man, 2000). As we can see, unlike fitness, wellness places greater emphasis on the benefits to the body, because physical activity is just one of the items listed above. So, wellness can include fitness, while fitness often extends its services to those in the fitness field, and both, like CrossFit, are struggling 72  Nenad Perić:THE ANALYSIS OF THE MARKET POSITION AND MARKETING POTENTIALS OF CROSSFIT with the idea of the well-being of the person who practices them. They are ve- ry sophisticated in terms of marketing because they represent serious market categories that are attracting more and more people, and therefore incomes. CROSSFIT AND ITS (MARKET) SCOPE AND POTENTIAL Therefore, it is not surprising that CrossFit trainers were also hired by karate practitioners, baseball players, swimmers, boxers and other athletes, in order to perfect certain segments of 73  SPORT - Science & Practice, Vol. 9, No 2, 2019. their fitness. CrossFit uses a gymnastics term progression to define the tran- sition process to master each movement. An approach to progression ensures self-efficacy by creating achievable steps toward more difficult challenges. Commitment to a larger goal will strengthen and encourage members' motiva- tion during the process (Meier, Becker, & Vandenberghe, 2004). Motivation is also reinforced through the observation of other members. The desired results of the observations would be an increase in self-efficacy, belief an individual can accomplish a task and the expected outcome, the perception that the com- pletion of the task will produce a positive end result (Gibson, 2004). Members work together to improve their skills and progress, but on a non-invasive basis - there is no need to go through with training or a specific exercise, but rather, group members are there to support each other to be as good as possible at exercising. Interdependence is needed in knowledge sharing whenever one party cannot accomplish their goal without the help of the other (McNeish & Mann, 2010). However, there is another factor that sustains the group, once formed: as members advance, so does their status within the group (Holmes and Me- ierhoff, 1999). These reward systems help encourage members to continue to grow and develop together through the collective community structure (Mar- tin-Perez, Martin-Cruz, and Estrada-Vaquero, 2010). As new members deve- lop into experienced members, the reward system encourages them to support newer members through their progression. This creates an excellent database of potential practitioners and image groups that practice CrossFit both in more narrow terms (fitness, wellness, etc.), as well as the wider public - potential exercisers. CONCLUSION The world is full of fitness trends, and new trends are starting every day. Most of them, like new brands, never fully develop. The globalization of today's market is widespread in all spheres of the society and it is an indi- spensable part of the sports market. Positioning and creating a recognizable brand, that is, a good image in the global market, is a demanding job that involves long-term continuous efforts, far greater than those defined by local competition (Ratković, Dašić, 2018). The reason for this is the overload of the market with different offers, as well as the overload of the minds of consumers and audiences with numerous offers and other marketing promotions (Perić, Krasulja, Radojević, 2011).f The difference between many other programs and CrossFit is the use of social capital to influence change (Durlauf and Fafchamps, 2004). CrossFit was started by a single man, a sports enthusiast, who spread a small group of 74  74  Nenad Perić:THE ANALYSIS OF THE MARKET POSITION AND MARKETING POTENTIALS OF CROSSFIT people that developed a common language, membership and advancements to all continents. The main reason for the success of this program and its worl- dwide popularity can be found in the simplicity of its concept: it fulfils the need of many people related to physical health, fitness and, consequently, their physical appearance; anyone can practice it to an adequate extent; it encoura- ges cohesion of training groups and a desire for progress while developing a healthy competitive spirit - primarily at the individual and then at the group level; it requires minimal investment both from exercisers and sport clubs; it has a simple and understandable concept. This simple and understandable concept made it possible to create social capital - a large number of exercisers who are also a form of program promotion (word-of-mouth marketing is in most cases the most effective marketing). In addition, it enabled the organiza- tion of a mass competition that, due to the nature of the sport, did not requi- re special technical prerequisites, and its implementation is largely based on CrossFit exercisers and instructors. CrossFit is one of the best examples that simple things and ideas are usually the most effective in any field, including the sports industry. CONCLUSION In addition to becoming a category for itself, CrossFit has grown into a distinct culture, and the foundations of this program are the functionality and need of all people to exercise and live a healthy life. Due to the number of pe- ople practicing this program, the 5-digit number of CrossFit clubs worldwide and its large and continuous media presence, it can be said that CrossFit has become a constantly evolving global sports movement with a huge marketing potential. 75  SPORT - Science & Practice, Vol. 9, No 2, 2019. 18. https://map.crossfit.com/?_ga=2.95823068.1142892516.1574639395- 1739441689.1574639395 Nenad Perić:THE ANALYSIS OF THE MARKET POSITION AND MARKETING POTENTIALS OF CROSSFIT 17. Stojiljković, S., Fitness, Fakultet sporta i fizičkog vaspitanja, Beograd, 2005. 17. Stojiljković, S., Fitness, Fakultet sporta i fizičkog vaspitanja, Beograd, 2005. 18. https://map.crossfit.com/? ga=2.95823068.1142892516.1574639395- REFERENCES 1. Benjamin A. S., (2012). Using Sport Education to Implement a CrossFit Unit, Journal of Physical Education, Recreation & Dance Volume 83, 2012 - Issue 8. 2. Claudino, J.G., Gabbett, T.J., Bourgeois, F. et al. (2018). CrossFit Overvi- ew: Systematic Review and Meta-analysis, Sports Med - Open (2018) 4: 11. https://doi.org/10.1186/s40798-018-0124-5 3. Dunn, H., (1959). High level wellness for man and society, American Journal of Public Health, 49(6): 786–792. 4. Durlauf, S. N., Fafchamps, M. (2004). Social capital, NBER Working Pa- per Series, 1-89. (http://www.nber.org/papers/w10485) 5. Gibson, S. (2004). Social learning (cognitive) theory and implications for human Resource, Advances in Developing Human Resources, 6(2), 193-210. 6. Holmes, J., Meyerhoff, M. (1999). The community of practice: Theories and methodologies in language and gender research, Language in socie- ty, 28(02), 173-183. 7. Jain, C., (1984). Environmental scanning: how the best companies do it, Journal of Long Rang Planning, Vol. 17. 8. McNeish, J., Mann, I. (2010). Knowledge sharing and trust in organizati- ons. IUP Journal of Knowledge Management, 8(1/2), 18-38. 9. Kotler, P. (1997). Marketing management: analisys, planning, implemen- tation and control, Prentice-Hall, New Jersey. 10. Martín-Pérez, V., Martín-Cruz, N., Estrada-Vaquero, I. (2012). The in- fluence of organizational design on knowledge transfer. Journal of Kno- wledge Management, 16(3), 418-434.i 11. Meyer, J., Morrison, J. Zuniga, J. (2017). The Benefits and Risks of CrossFit: A Systematic Review, Workplace Health & Safety 2017, 612- 618. https://doi.org/10.1177/2165079916685568 12. Meyer, J., Becker, T., Vandenberghe, C. (2004). Employee commitment and motivation: a conceptual analysis and integrative model, Journal of applied psychology, 89(6).991-1007. 13. Mueller, H., Kaufmann, E. L., Wellness Tourism: Market Analysis of a special health tourism segment and implications for the hotel industry, Journal of Vacation Marketing, 2000, 2-3. 14. Perić, N., Krasulja, N., Radojević, I. (2011). Medijske, PR i brend tenden- cije, drugo, prošireno izdanje, Synopsis. 15. Ratković, M., Dašić, D. (2018). Marketing u sportu sa elementima indu- strije sporta, Visoka škola modernog biznisa 16. Russ, A., Kirkpatrick, C., Marketing, Little, Browne & Co, Boston, 1982. 76  Nenad Perić:THE ANALYSIS OF THE MARKET POSITION AND MARKETING POTENTIALS OF CROSSFIT 77 
https://openalex.org/W4386479207
https://www.researchsquare.com/article/rs-3062037/latest.pdf
English
null
Determining Malware Attacks in Iot Health Care System Using Self Attention Based Depth Poly O (Optimized)-network
Research Square (Research Square)
2,023
cc-by
12,605
Research Article Keywords: Internet of Things, Healthcare, malware attacks, Min-max Hat normalization, wrapper discriminant component analysis, Hybrid cuckoo Adam optimization algorithm, self-attention based depth poly O (optimized)-Network Posted Date: September 6th, 2023 Abstract— Abstract— just some of the fields that have been affected by the Internet of Things. Patient information is typically stored and sent over an IoT-based healthcare system, making data security a top priority. All of a hospital's most critical patients are brought to the intensive care unit (ICU) to get the best care available. ICU staff are on call around the clock to care for patients who have suffered life-threatening illnesses or injuries. The life and health of the patient depend on the ICU's instruments and machinery. If a patient can't reach their doctors, it might have catastrophic effects for their health. In light of this, it is critical to develop a healthcare system based on the Internet of Things that is secure against cyberattacks. This highlights the need of ensuring secure communication between medical sensors and actuators in an IoT-based healthcare system. Many initiatives have been taken so far to automate patient monitoring and let medical practitioners remotely analyze a patient's health state using remote monitoring and analysis technologies. To prevent identifying data from leaving the hospital, several techniques employ fog computing to do certain calculations at the edge. IoT healthcare systems, however, have been a prime target for hackers in recent years. According to some estimates, hackers have successfully into 90% or more of hospital networks. Intel from the White House in 2017 suggests that the healthcare sector is increasingly being targeted by hackers. Note that cyber assaults increased dramatically during the COVID-19-time period. As of late, IoT healthcare services and infrastructure have been a prime target for hackers. Security and confidentiality of patient information are of paramount importance in IoT healthcare environments. The health of patients is seriously threatened when sensitive information is stolen or tampered with in healthcare systems. To the same extent, a patient's life might be jeopardized by unauthorized changes to his or her medical file. Furthermore, cyber-attacks on hospital IoT systems might significantly disrupt patient care. For example, a hacker may get access to a patient's infusion pump and change the settings in such a way that the pump releases an unsafe amount of insulin, putting the patient at risk of possibly fatal hypoglycemia. Now picture a similar situation in which a hacker gains access to a person's pacemaker and alters the device to cause the heart rate to decrease or increase. Abstract— A deadly bradycardia or tachycardia might arise suddenly in such a situation. In light of this, ensuring the security of healthcare networks is of critical significance. As a result of their small memory capacities, slower processors, and shorter battery lives, IoT devices have resource restrictions. For this reason, traditional security solutions fail to effectively identify malicious attacks on IoT devices. As a result, designing a The Internet of Things (IoT) is becoming more important in numerous sectors, including healthcare, industry, the military, and education. The framework successfully safeguards the privacy, authenticity, and accessibility of data in a networked setting. Health care is only one of many sectors that may benefit from the given solutions, which are essential for protecting the personal information of patients and maintaining the integrity of their medical records. The privacy, security, and reliability of the whole health care system online are still at danger owing to a broad variety of intermediary assaults and infiltration activities, despite the fact that the Internet of Things (IoT) offers trustworthy mechanisms for keeping data secure. In this research, we employ a hyper-tuned optimal classifier based on deep learning to overcome these issues. Here the real time patients sensor data are retrieved and it can be preprocessed for removing the error by using the Minmax Hat normalization. Then the features can be selected using wrapper discriminant component analysis. Then the proposed classifier can be optimized using the Hybrid CUADA (Cuckoo Adam) optimization algorithm. After classification parameter optimization, the collected features are fed into the newly- introduced self-attention based depth poly O (optimized)- Network to detect malware intrusions and monitor patient records. The system's effectiveness has been assessed based on experimental findings and subsequent discussions. Index Terms—Internet of Things, Healthcare, malware attacks, Min-max Hat normalization, wrapper discriminant component analysis, Hybrid cuckoo Adam optimization algorithm, self- attention based depth poly O (optimized)-Network DOI: https://doi.org/10.21203/rs.3.rs-3062037/v1 DOI: https://doi.org/10.21203/rs.3.rs-3062037/v1 License:   This work is licensed under a Creative Commons Attribution 4.0 International License. Read Full License License:   This work is licensed under a Creative Commons Attribution 4.0 International License. R d F ll Li ATTENTION BASED DEPTH POLY O (OPTIMIZED)-NETWORK Paul Rodrigues1 Harun Bangali2Syed Asif Basha3 T Gopalakrishnan4 Pandimurugan V5 Rajasoundaran S6,SVN Santhosh Kumar7 1 Professor, Department of Computer Engineering, College of Computer Science, King Khalid University, Al-Faraa, Saudi Arabia 2,3 Lecturer, Department of Computer Engineering, College of Computer Science, King Khalid University, Al-Faraa, Saudi Arabia 4Associate Professor, Department of Information Technology, Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education, Manipal, India g , p , 5,6 Assistant Professor, School of Computing, Networking and communications, SRMIST, Kattankulathur, Chennai, India. 7School of Information Technology and Engineering, Vellore Institute of Technology, Vellore,India nt Professor, School of Computing, Networking and communications, SRMIST, Kattankulathur, Chennai, Indi f Information Technology and Engineering, Vellore Institute of Technology, Vellore,India 5,6 Assistant Professor, School of Computing, Networking and communications, SRMIST, Kattankulathu 7School of Information Technology and Engineering, Vellore Institute of Technology, Vellore,India I. INTRODUCTION Currently, only the basic minimum in IDS technology [[6, 7]] is available for IoT systems, despite the need for more advanced options. Insufficient data storage and analysis capabilities of IoT nodes have been cited as a major cause of issues for host IDS [[8, 3]]. As different protocols raise different security risks and need for different implementations of intrusion detection systems [7], it is crucial that the communication protocols used by IoT devices (such as CoAP, MQTT, etc.) are not utilized in the traditional network. In order to effectively adapt IDS for an IoT-based critical care unit, it is important to amass a large and reliable IoT network traffic dataset. A breach in security in such a setting might potentially endanger the patient's life [9]. There are several state-of-the-art datasets accessible for the purpose of training and assessing IDS and IPS for both legacy and IoT networks. It's interesting to see how many of the older suggestions for measuring network traffic are still in use today. This data was generated either in real-time using real-time systems or in a simulated environment using simulation tools. The DARPA dataset, the KDD-99 dataset, the NSL-KDD dataset, the DEFCON dataset, the LBNL dataset, the CAIDA dataset, the UNIBS dataset, the foolproof system of protection for Internet of Things gadgets is an extremely difficult undertaking. Security mechanisms that function across the network are thus ideal for IoT devices. In this study, we show how the suggested AI-based architecture might protect IoT healthcare systems from cyberattacks. In particular, the proposed system contributes by, , ❖ “To classify IoT attacks and continuously learn to improve the accuracy of deep learning. ❖ We first use wrapper discriminant component analysis to analyze the source code and to isolate the faulty features ❖ Using the Hybrid CUADA (Cuckoo Adam) optimization technique, the suggested classifier may be fine-tuned for use in the classification phase. The retrieved characteristics are fed into the newly-introduced self-attention based depth poly O (optimal)-Network for detecting malware attacks once the classification parameters have been tuned.” The suggested architecture will aid in building context-aware IoT security solutions, notably in the sensitive healthcare setting. The remaining sections of the paper are organized as follows. Current IDS approach in an IoT setting is presented in Section 2. The suggested framework for creating context-aware security solutions for the Internet of Things is outlined in Section 3. I. INTRODUCTION "Internet of things" (IoT) refers to a possible future in which all of our ordinary objects will be internet-connected and able to communicate with one another and learn from each other. The IoT is a revolutionary transformation in how networks are constructed, allowing previously incompatible gadgets to communicate and share data. Maintaining human civilization will depend on this form of communication. Both the technological landscape and people's day-to-day lives have been profoundly altered by the advent of the Internet of Things. The number of gadgets that can connect to the Internet has exploded in recent years. New research suggests that in 2018, there were around 23.14 billion IoT devices connected online throughout the world. By 2025, it is expected that there will be 75.44 billion connected things in operation. Construction, farming, transportation, the electrical grid, and healthcare are were identified using ELM, we applied Fuzzy C-Means to fix several mislabeled instances in the dataset. See [4], which offered a feature engineering technique for efficiently identifying the irregularities, for a similar approach to boosting the performance of traditional IDSs. Health care IoT fog environment risks were also described and explored in [5]. Researchers used an online sequential ELM ensemble to prevent man-in-the-middle and distributed denial-of-service attacks on a fog-based smart home with a remote patient monitoring system. Since privacy and trust were first key concerns with the Internet of Things, security has emerged as the most pressing of those concerns. Protecting networks and devices against malicious software requires the use of firewalls and intrusion detection systems (IDS/IPS). Although this capability is available in many firewalls, static rules are often utilized to identify trusted and unsafe traffic. By contrast, AI- powered intrusion detection and prevention systems (IDS/IPS) have shown to be more reliable and successful than the static rules that came before them. In training and validating the IDS and IPS, both malicious and benign network traffic is utilized. Either real systems that create malicious and benign network traffic, or artificially generated traffic, may be used to construct such datasets. A simulated network environment may be created with the use of traffic generators. Training and testing IDS and IPS using data from live networks is essential, but it may be time-consuming and costly. Nevertheless, this may be avoided if a traffic generator were used in the creation of the dataset. I. INTRODUCTION The outcomes of the suggested framework were explored in Section 4, and the article is wrapped up in Section 5. II. RELATED WORKS They use a method of cognitively evaluating characteristics by analyzing the feature space. The first layer's input neurons were subjected to a pruning procedure to exclude those that were associated with less important properties. By the implementation of our technique, we were able to increase accuracy from 97.84% to 99.3% while decreasing the number of characteristics from 154 to only 6. Using an ensemble learning strategy, [19] proposes a system for intrusion detection in WLANs. They were able to accomplish this remarkable feat of feature reduction by excluding any characteristics that were either identical throughout the whole dataset or had more than half of their values missing. A total of 36 characteristics were generated using this method. Ensemble Learning's classification results for impersonation, flooding, injection, and normal showed an accuracy of 95.88% when all the assaults were combined into a single category. According to [20], machine learning may be used to construct an intrusion detection system tailored to the IoT with little resources and an emphasis on impersonation threats. This study categorizes Internet of Things devices into two distinct categories: semi-distributed and distributed architectures. A stacked auto encoder technique was employed for feature extraction. For each of the dataset subsets, the best 7 features were chosen from the original features using a variety of feature selection techniques. The classification was performed using a classifier called a multi-layer perceptron (MLP). The experimental findings demonstrated that the semi- distributed model outperformed the distributed models trained with 21 characteristics by a margin of 99.97%. This study [21] develops a three-stage framework for detecting impersonation attacks in wireless networks. The Mutual Information (MI) and C4.8 (C4.8) algorithms were employed to complete feature extraction and classification, respectively. They claimed a 98.22% success rate while employing only five factors. An intrusion detection system based on a deep learning model (stacked auto-encoder, or SAE) is provided in [22] to distinguish between impersonation, flooding, injection, and normal traffic. Both writers suggested adding an additional layer of complexity into their respective models. Without feature selection, two hidden layers were able to achieve greater accuracy (98.67%) than three. Several deep learning-based IDS course of seven weeks to facilitate the evaluation of IDS. Several protocols, including Simple Mail Transfer Protocol (SMTP), Internet Message Protocol (IMAP4), Internet Group Chat (ICQ), and Simple Network Management Protocol (SNMP), are used to bring the data in. II. RELATED WORKS Many simulated attacks, including DoS, R2L, and U2R, were tried on both Windows and UNIX platforms. Nevertheless, this dataset has several peculiarities, such as the absence of false positives and the exclusion of real-time traffic. [10]. New research [11] proposes using neural networks for intrusion detection, with a focus on how training might improve performance and efficiency. For WSNs, the authors of [12] recommend using an SVM classifier in conjunction with the binary grey wolf optimizer. In terms of feature count, accuracy, false alarm rate, and detection rate on the NSL KDD'99 dataset, the proposed IDS outperformed state- of-the-art approaches. The IDS system's feature extraction and selection process was given a new spin by combining the Aquila optimizer with the CNN DL (Deep Learning) technique [13]. The novel IDS approach was tested using the public datasets CIC2017, BoT-IoT, NSL KDD, and KDD99. The test results show that the devised approach works as intended. An IDS method based on Fruitfly optimization and deep Auto encoder is presented in [14]. They employed a deep Auto encoder to determine the most important aspects of the assaults, a back propagation neural network to categorize the data, and a fuzzy C-Means clustering approach to manage the gaps in the data. In addition, the Fruitfly algorithm was used to adjust the Auto encoder’s concealed layers. Testing on the NSL-KDD and UNSWNB15 datasets confirmed the efficacy of the proposed method. In light of the fact that the AWID dataset [15] was used to assess the proposed IDS system, we highlight some relevant work that was also evaluated on this dataset. The influence of feature selection on detection accuracy is a central topic of the selected research. Suitable contexts for this work may be found in the following fields linked to machine learning and deep learning. Apply Machine Learning to an Existing Issue With the goal of discovering the best efficient classifier for detecting intrusions, the AWID dataset [15] was created utilizing a wide range of traditional ML techniques (AdaBoost, OneR, J48, Naive Bayes, Random Forest, ZeroR, and Random Tree). Using all 154 features with J48 as the classifier, they got an accuracy of 96.20 percent, while using just 20 features, they got an accuracy of 96.26 percent. The feature selection strategies employed by the IDS given in [16] include information gain and Chi-squared statistics. II. RELATED WORKS The novel IDS approach was tested using the public datasets CIC2017, BoT-IoT, NSL KDD, and KDD99. The test results show that the devised approach works as intended. An IDS method based on Fruitfly optimization and deep Auto encoder is presented in [14]. They employed a deep Auto encoder to determine the most important aspects of the assaults, a back propagation neural network to categorize the data, and a fuzzy C-Means clustering approach to manage the gaps in the data. In addition, the Fruitfly algorithm was used to adjust the Auto encoder’s concealed layers. Testing on the NSL-KDD and UNSWNB15 datasets confirmed the efficacy of the proposed method. In light of the fact that the AWID dataset [15] was used to assess the proposed IDS system, we highlight some relevant work that was also evaluated on this dataset. The influence of feature selection on detection accuracy is a central topic of the selected research. Suitable contexts for this work may be found in the following fields linked to machine learning and deep learning. Apply Machine Learning to an Existing Issue With the goal of discovering the best efficient classifier for detecting intrusions, the AWID dataset [15] was created utilizing a wide range of traditional ML techniques (AdaBoost, OneR, J48, Naive Bayes, Random Forest, ZeroR, and Random Tree). Using all 154 features with J48 as the classifier, they got an accuracy of 96.20 percent, while using just 20 features, they got an accuracy of 96.26 percent. The feature selection strategies employed by the IDS given in [16] include information gain and Chi-squared statistics. Thereafter, they conducted tests using a variety of feature-size vectors (111, 41, and 10 features). The evaluation revealed that when trained with 41 features, Random Tree's classification accuracy improved from 92.17 to 95.12. In [17], a method is proposed for detecting impersonation attacks on wireless networks. There were three distinct machine learning (ML) techniques utilized for classification: an ANN, a decision tree and an SVM After extensive testing it was discovered that the SVM method, which employs 11 carefully selected features for training, had the highest overall performance (99.86%). They debated the first blow but disregarded the two that followed (injection and flooding attacks). Using a cognitive feature ranking algorithm and an ANN classifier, the authors of [18] present an intrusion detection system. They use this technique to determine whether an occurrence is benign or harmful. II. RELATED WORKS Many aspects of our everyday lives have been altered by the rapidly developing Internet of Things. With the advent of IoT, more advanced methods of health monitoring have become possible. Several proposals for IoT-based intelligent health monitoring systems have surfaced in recent years. Yet, healthcare IoT security is only getting started. Traditional network security measures are impractical for IoT-based healthcare systems because of the limited resources of IoT devices and the unpredictable security needs of these systems. [1]. Keep in mind that the types of data generated by IoT devices in an IoT ecosystem shift significantly from one use case to the next. Traditional security protocols need to be adjusted to suit the IoT's unique characteristics. [2]. In addition, there is an immediate need to secure the IoT network that links constrained medical devices. Many investigations have led to the development of several techniques for preventing cyberattacks on healthcare IoT devices. A solution is provided in [2] to help detect and prevent replay attacks on healthcare IoT devices that run on batteries. Their proposed solution looks at the device's unique identifier, timestamps, and power consumption patterns to detect and prevent replay attacks on battery-operated IoT healthcare equipment. According to [3], semi-supervised Fuzzy C-Means based on extreme learning machines may be used to identify cyberattacks in fog-based Internet of Things scenarios (ELM). As soon as cyberattacks course of seven weeks to facilitate the evaluation of IDS. Several protocols, including Simple Mail Transfer Protocol (SMTP), Internet Message Protocol (IMAP4), Internet Group Chat (ICQ), and Simple Network Management Protocol (SNMP), are used to bring the data in. Many simulated attacks, including DoS, R2L, and U2R, were tried on both Windows and UNIX platforms. Nevertheless, this dataset has several peculiarities, such as the absence of false positives and the exclusion of real-time traffic. [10]. New research [11] proposes using neural networks for intrusion detection, with a focus on how training might improve performance and efficiency. For WSNs, the authors of [12] recommend using an SVM classifier in conjunction with the binary grey wolf optimizer. In terms of feature count, accuracy, false alarm rate, and detection rate on the NSL KDD'99 dataset, the proposed IDS outperformed state- of-the-art approaches. The IDS system's feature extraction and selection process was given a new spin by combining the Aquila optimizer with the CNN DL (Deep Learning) technique [13]. II. RELATED WORKS [26] offers a framework for creating context-aware security solutions, which may be used to detect malicious communications in IoT deployment settings. Their strategy is built on the innovative new open-source IoT data producing tool IoT Flock. The IoT-Flock tool allows researchers to simulate both safe and insecure IoT environments. An open- source tool is included into the proposed architecture to centralize the IoT-Flock traffic records. They developed a healthcare IoT dataset including both safe and harmful IoT communications to evaluate their approach. Finally, they used several machine learning strategies to the newly minted data in an effort to spot assaults on the healthcare system. A real-time Improved Healthcare Monitoring System (EHMS) has been designed and deployed [33] to track patient vitals and gather data on network use. The system then employs a variety of machine learning techniques to both reinforce and weaken the dataset. They were able to construct a trustworthy intrusion detection system by gathering data in real time. They found that the SVM technique outperformed the other algorithms by a factor of 10, with a success rate of 92.44%. In [34], researchers used knowledge from many different areas to create a data fusion system for detecting intrusions. They suggest using a decision-based fusion model that makes use of steps like initialization, preprocessing, Feature Selection, and multimodal classification to effectively detect intruders. The suggested model achieves its best results with a detection rate of 99.21%, a precision of 98.93%, and an accuracy of 99.21%. Read [35] to learn about the long-term effects of intrusion detection in the Security of Things (SoT) paradigm on smart healthcare. Classifiers such as radial basis functions (RFs), neural networks (NBs), and logistic regressions were all used to the NSL-KDD dataset by the research community. Using a weighted genetic approach in conjunction with Random Forest, we were able to improve detection while simultaneously reducing false positives and negatives. They used a combination of a genetic algorithm and RF models and had a 98.81% success rate. After recognizing and assessing these assaults, the authors of [28] conducted a scoping study, where they discovered 18 solutions that may be categorized into the following three classes: intrusion detection and prevention (IDP), communication tunneling (CT), and hardware defenses (HWP). Authors at [29] suggested using wireless body area networks as part of an intrusion detection system for the IoMT (WBAN). II. RELATED WORKS Thereafter, they conducted tests using a variety of feature-size vectors (111, 41, and 10 features). The evaluation revealed that when trained with 41 features, Random Tree's classification accuracy improved from 92.17 to 95.12. In models performed far worse. Thus, a Smart E-Healthcare System might be supported by this architecture, boosting patients' online safety. Internet of Medical Things security and privacy issues continue to persist, despite ongoing technological developments aimed towards resolving them (IMoT). Hence, [31] built a trustworthy IDS using a DNN for better detection and prevention of intrusions. Some hyper parameter selection feature engineering was also included. The proposed DNN model improves on the baseline NSL-KDD results achieved using conventional machine learning approaches by 15%, reaching an overall accuracy of 99.7%. In [32], an anomaly detection approach for cardiac rhythm data is presented, focusing on the latter. A total of five techniques were used, with two being unsupervised and the other three supervised, all with the goal of spotting irregularities in the data. When used to characterize such systems, they found that random Forest and ensemble approaches achieved an accuracy of 99% or higher. removed. During the phase of classification and detection, it was recommended to use either a deep neural network with three hidden layers or a deep neural network with seven hidden layers. The 7-hidden-layer variant showed a 0.2 point increase in accuracy. Impersonation risks in wireless communications were identified by [24] using unsupervised clustering and a deep learning approach (stacked auto-encoder). The proposed method is split into two distinct phases: feature extraction using a two-layer stacked auto-encoder, and K-means-based unsupervised clustering. After calculating over all 50 characteristics, the total success rate was 94.81%. On top of that, [25] proposed a wireless IDS that using semi-supervised deep learning to classify network traffic as either benign, malicious (such as an impersonation attack), or malicious (such as a flooding assault or injection attack). They used a stacked auto-encoder, which uses a ladder network strategy by stacking a clean decoder unit on top of a noisy encoder unit and a decoder unit. The introduction of a focus loss function widened the application domain of the proposed method. Classification accuracies for "normal," "impersonation," "flooding," and "injection" were 99.77%, 89.32%, 73.41%, and 82.79%, respectively. Overall, this method had a 98.54 percent success rate. II. RELATED WORKS A hospital network architecture model was used to conduct extensive testing on many subsets of the IoMT, such as wireless body area networks and other types of connected medical equipment. Maximum intrusion detection accuracy at the network level is 99.6 percent, and maximum detection accuracy at the device level is 98.2 percent. Using a comprehensive set of criteria, the authors of [36] rate and assess several machine learning algorithms and data sources. Furthermore, they have evaluated the approaches' capabilities for avoiding false positives. In-depth research reveals obstacles to putting the algorithms into practice and suggests solutions. K-Nearest Neighbors seems to be widely used in the current literature for healthcare intrusion systems, as shown by their analysis. The authors of [30] present an intrusion detection system (IDS) that makes use of many Machine Learning methods and some complicated attack data. Bagging ensemble and Random Forest both achieved 97.67% accuracy, whereas other classifier [37] For the purpose of identifying and blocking known harmful, phishing, spammy, and malware-based domains, the K-Nearest Neighbors method for analyzing DNS traffic has been proposed. Their F1 score was 94.8 and 99.4%, respectively, using the gender- and skew-balanced (60/50) CIC Bell DNS 2021 dataset. The authors of [38] came up with a unique approach to the problem of assault identification by assessing the detection abilities of various base classifiers and then creating an ensemble to use in recognizing certain types of attack. They conducted rigorous experiments across a variety of methods on the CIC-IDS 2018 dataset, provided a thorough analysis of the class wise performance metrics, and arrived at the conclusion that neural networks reach 96.65% accuracy. Researchers [39] evaluate their ability to spot common zero-day threats by using open-source intrusion detection datasets. Their case study compares and contrasts the datasets (KDD99, NSL- KDD, and CIC-IDS-2018) utilized to develop their predictors. For the NSL-KDD datasets, an accuracy of about 99.97% was attained. On the other hand, [40] presented RCNN, a more complicated Intrusion detection system based on CNN and LSTM (Long Short Term Memory), which was evaluated on the KDD Cup 99 and CIC-IDS 2018 datasets (Recurrent Convolutional Neural Networks). Around 94% accuracy was attained using the same model across both datasets. rank's correlation. While designing our own neural network, we relied on the activation function MISH [45], also designed by the same author. When we spoke about how extensive it was, we realized this. II. RELATED WORKS The average accuracy of Mish on YOLOv4 utilizing a CSP-DarkNet-53 base is higher than that of alternative activation functions, such as Leaky ReLU. The LightGBM ensemble approach has been shown to be an effective tool for Intrusion Detection since its introduction in [46]. Results from the research demonstrated the superiority of their method over both conventional machine learning algorithms and other ensemble methodologies (98.37 percent). An auto encoder-based bi-level anomaly detector was published in [47], which achieved a maximum detection rate of 99.2 percent on the CIC IDS 2017 and 2018 datasets by training an artificial neural network to reconstitute its vectorized input. For what seems to be a problem with few variables, a complex algorithm was created. Using several datasets, the authors of propose a Convolutional auto-encoder (Conv-AE) for intrusion detection in [48]. It is shown that the Conv-AE algorithm is able to identify hostile assaults in the context of both anomaly- and misused-based ID systems by effectively integrating the benefits of conventional state-of-the-art techniques. They achieved a 98.2 percent success rate by training their algorithms with the help of a distributed and big-data-friendly processing pipeline. [49] demonstrates how combining anomaly detection with abuse detection helped overcome their respective constraints. They implemented K-Nearest Neighbors on the KDD-Cup99 dataset. They had an accuracy of over 98%, but a poor Area Under the Curve (AUC) of 0.58. In [50], we provide a concise overview of the CIC-IDS-2017 and CIC-IDS-2018 datasets, discussing how we evaluated each dataset's characteristics and iterated them over several Machine Learning and Deep Learning models. Several have stated that the more varied assaults, data collection methods, and attack infrastructure used by CIC IDS datasets make them superior to those of NSL KDD. For buildings to function at their full potential, socioeconomic differences must be taken into consideration at every stage of the design process. The authors of [41] analyzed online assaults with random undersampling ratios to investigate class balance in the context of different ensemble learning approaches. Accuracy of around 94.01% was attained using RCNN on the CIC IDS 2018 dataset, however the authors did find that undersampling at particular ratios may have a significant influence on the model's performance. An alternative perspective on the importance of network traffic and its hierarchical structure is provided by the packet byte-based convolutional neural network (PBCNN), which was initially introduced in [42]. II. RELATED WORKS For both the CIC IDS 2017 and CIC IDS 2018 datasets, PBCNN achieved an accuracy of 99.99%. In [43], a symmetrical method is used to evaluate the CIC-IDS- 2018 data set. It was also investigated whether or not there were any biases or imbalances in the classes represented in the CIC- IDS-2018 dataset. It has been shown that signature-based intrusion detection approaches are not as effective as other methods. [51] claims that an adaptive and ensemble system is superior to the anomaly-based method. Combining the KNN, DNN, and random forest algorithms, they developed an adaptive voting system for use on the KDD Cup99 dataset. Based on their findings, the Adaboost model outperformed the competition with a 99.99 percent accuracy rate. If you want to come up with creative and useful solutions, you need to master the dataset. Recurrent Neural Networks, such as Gated Recurrent Units, outperformed regular LSTM networks while trying to create a trustworthy anomaly-based intrusion detection system, as reported in [52]. It is possible that convolutions and recurrent algorithms are computationally demanding and time consuming compared to other approaches, yet they are effective for processing non-sequential tabular data. Almost 81% accuracy has been achieved in the ADFA Intrusion Detection dataset. About the drawbacks of anomaly-based detection, [53] The majority of the studies on IDS methods have been carried out in an ensemble learning framework. In order to determine the most effective basic classifiers for ensemble learning, the authors of [44] analyzed seven distinct options and compared the accuracy metrics of the evaluated architectures. They used just 23 features and yet achieved 98.8% accuracy on the CIC IDS 2018 dataset because to the excellent feature selection processes they used, including filter approaches and Spearman against network, software, and data breaches. In Figure 1, the whole process of the suggested method is shown. presented a hybrid solution that uses SVMs and decision trees. They get 97.881 and 99.982 percent accuracy on the CIC IDS 2018 and KDD Cup 99 datasets, respectively. In order to detect DoS assaults, Wenkhede and Kshirsagar created a system that makes use of ML and NN. Multi-Layer Perceptron and Random Forest are used by [54] for the CIC IDS 2017 dataset. The experimental findings showed that the Random Forest algorithm outperformed the Multi-Layer Perceptron method by a wide margin, achieving an accuracy of almost 99% on the CIC-IDS 2017 datasets. IoT security has two main objectives: Our research is based on the assumption that the setting is an indoor hospital, either an intensive or general care unit, with the patient confined to a single room. A reliable outside source is keeping tabs on the patient's vitals from a safe distance. Our IoT-based ICU use case includes two beds, each of which is outfitted with nine patient monitoring devices (sensors), and a single control unit known as the Bedx-Control-Unit. The IoT- Flock architecture serves as the basis for all of these devices. In this piece, we will discuss the transmission of ECG data, namely HRV. The suggested patch integrates with a current sensor network to get ECG data. Light-emitting diode (LED) or Bluetooth Low Energy (BLE) modifications are made to the 1.Ensuring the safety of data throughout its collection, storage, processing, and transmission 2. In order to achieve these objectives, an unique approach was created to detect vulnerabilities in IoT components. III. PROBLEM STATEMENT The Internet of Things is perhaps one of the most fascinating technological breakthroughs of recent times. IoT Insights predicts that by 2025 there will be more than 27 billion Internet- connected devices in use worldwide. Fears about software vulnerabilities and assaults are increasing, which might discourage many customers from embracing IoT devices. Companies in the healthcare, financial services, industrial, logistics, and retail sectors, among others, are particularly vulnerable to Internet of Things security threats because of their widespread use. Figure 1 Schematic representation of the suggested methodology II. RELATED WORKS Figure 1 Schematic representation of the suggested methodology We discover the foundation for an Internet of Things-based medical data preservation system in [55], where an unique block chain-based method to encryption of medical data is combined with an optimization algorithm. The Stochastic Gradient Descent with Warm Restarts method, introduced in [56], was developed using Cosine Annealing to schedule learning rates. We were able to do more precise studies as a result of this. In [57], a new method of weights initialization for neural networks is presented to improve model convergence and performance. Using Decision Trees and the KDD Cup 99 dataset, the authors of Article [58] suggest a recursive feature reduction technique for feature selection, claiming an accuracy of more than 99% when used to DOS assaults and other attacks. The authors of [59] offer a correlation-based feature selection strategy based on their findings; by using a neural network, they increase accuracy by 0.98 percentage points on the NSL-KDD dataset. [60] a. Data source IoT security has two main objectives: b. Preprocessing 𝐻(𝑘) = −∫ 𝜇𝑌(𝑘)log 𝜇𝑌(𝑘)𝑑𝑘 (5) (5) We shall describe the Min max_ Hat normalization approach we used in this section of the article. As a rule, raw data has a wider range of values than analyzed information. Data parameters with a large range of values will have a significant impact on the calculated distance. This is why it's important to normalize (or scale) all characteristics so that their values fall within the same general range. The conditional entropy of a set is the measure of the uncertainty associated with a set, such as k, for which we have indirect knowledge by virtue of our knowledge of X and j: The conditional entropy of a set is the measure of the uncertainty associated with a set, such as k, for which we have indirect knowledge by virtue of our knowledge of X and j: 𝐻(𝑘/𝑗) = −∫ 𝜇𝑋(𝑗) ∫ 𝜇𝑌(𝑘/𝑗= 𝑥)log 𝜇𝑌(𝑘/= 𝑥)𝑑𝑘𝑑𝑗(6) The joint entropy, defined as, is the collective degree of doubt about the (X,Y) pair: The simplest approach, known as min-max Hat normalization scaling, works by rescaling the range of feature values to the interval [0,1] or [-1,1]. When deciding on a target range, it's important to consider the data's context. In general, for [0,1], the formula for a min-max is: 𝐻(𝑗, 𝑘) = −∫ 𝜇𝑗,𝑘(𝑗, 𝑘)log 𝜇𝑋,𝑌(𝑗, 𝑘)𝑑𝑗𝑑𝑘 (7) (7) The degree to which j is informed by k is quantified by the mutual information between j and k. (or conversely on the amount of knowledge on j provided by k . Thus, it may be described as: 𝑙′ = 𝑙−n(𝑙) m (𝑙)−n(𝑙), (1) (1) 𝑀(𝑗; 𝑘) = 𝐻(𝑘) −𝐻(𝑘/𝑗) (8) where x is the unaltered value and x' is the new value. We may use this formula to rescale the range [a, b]: (8) (8) Which is precisely what happening to k's uncertainty when z is known and the latter is reduced. If k is the target of the prediction, then j's relevance to the model for k may be evaluated using the mutual information. Rewriting the mutual information in terms of the entropy's attributes results in: 𝑙′ = 𝑎+ (𝑙−n(𝑙))(𝑏−𝑎) n(𝑙)−n(𝑙) , (2) (2) a range of numbers between a minimum of a and a maximum of b. c. Feature selection Here, we employed discriminant component analysis to finish up the feature selection process. So, we'll pretend j and k are two independent variables (they can have real or vector values). It's how we indicate 𝜇𝑗,𝑘 the distribution of probabilities for both z and k together. The marginal density functions are, as we all know, defined by : 𝜇𝑋(𝑗) = ∫ 𝜇𝑗,𝑘(𝑗, 𝑘)𝑑𝑦 𝜇𝑌(𝑘) = ∫ 𝜇𝑗,𝑘(𝑗, 𝑘)𝑑𝑥 (4) (4) Its entropy, defined as, provides the measure of our uncertainty about k.: Its entropy, defined as, provides the measure of our uncertainty about k.: Figure 2 Process of dataset retrieval IV. PROPOSED WORK This research proposes a framework for detecting attacks on IoT devices. This research utilizes an optimized self-attention based depth poly O (optimal)-Network to safeguard IoT devices hat matrix model grows more accurate as the real value approaches 1, signal before transmission. LEDs are the source of information for stationary security cameras. At the end, data is sent to an authorized observer through an electronic healthcare gateway. 𝑙′ = 𝑎+ (𝑙−n(𝑙))(𝑏−𝑎) n(𝑙)−n(𝑙) . (3) 𝑙′ = 𝑎+ (𝑙−n(𝑙))(𝑏−𝑎) n(𝑙)−n(𝑙) . (3) Figure 2 Process of dataset retrieval When we standardized the raw data set, we got a value of 0.976. However, when we applied the normalized (scaled) data, we obtained a normalized value of 0.786. As such, we dissect the proposed algorithm as follows: The outcome of the ranking technique is a rating of the variables based on the mutual information between them. Thus, the approach multiplies each input variable by n before arriving at the final output value 𝐼(𝑗𝑖; 𝑘), 𝑖= 1 … 𝑛, Then, the variables are ranked according to this value, and the least significant ones are eliminated. Purpose of the Cuckoo Species is(𝑞); 𝑞= (𝑞1, … … 𝑞𝑣)𝑀, and the initial number of individuals inside the k host nest is shown as 𝑃𝑗(𝑧= 1,2, … , 𝑘). The following formula offers fresh information on how to help cuckoo birds. 𝑞𝑗 𝑢+2 = 𝑞𝑗 𝑢+ 𝛽⊕Levy (𝛾) (13) (13) The lowest redundancy - maximum relevance criteria consists of picking the variable 𝑗𝑖 from the features 𝑗−𝑠 that maximizes 𝑢𝑖-𝑗𝑖, where 𝑢𝑖 is a relevance term and 𝑗𝑖 is a redundancy term. 𝑗𝑖 is the mean redundancy of 𝑗𝑖 to each variable 𝑗𝑖∈z already selected. “where P(u+1) stand for the current answer, and z for the cuckoo, ⊕ represents the entry-wise multiplications, Levy 𝛾 𝛽 > 0 stands for the levy rise and for a potential increment in magnitude. “where P(u+1) stand for the current answer, and z for the cuckoo, ⊕ represents the entry-wise multiplications, Levy 𝛾 𝛽 > 0 stands for the levy rise and for a potential increment in magnitude. 𝑢𝑖= 𝐼(𝑗𝑖; 𝑘) 𝑗𝑖= 1 𝑑∑   𝑧𝑗∈𝑧𝑆 𝐼(𝑗𝑖; j) 𝑋𝑀𝑅𝑀𝑅= arg max 𝑧∈𝑧−𝑆 (𝑢𝑖−𝑧𝑖) (12) When a cuckoo's egg looks like the host egg, you know that one of those birds has set an egg there. Whatever fitness solution has the least amount of error is the best. (12) 𝑅𝑗= 1 𝑔∑   𝑔 𝑤=1 (𝑒𝑤−𝑞𝑡) (14) (14) This approach picks the variable with the optimal relevance- redundancy balance at each phase. This criterion for selection is quick and effective. At forward search step d, the search algorithm calculates n-d evaluations. where, 𝑒𝑤 𝑖𝑠 the predicted result of the classification, and the 𝑞𝑡 𝑖𝑠 𝑡ℎ𝑒 actual result of the classification. The update equation for the Adam optimization method is as follows, taking into consideration the step size 𝛽. b. Preprocessing 𝑀(𝑗; 𝑘) = 𝐻(𝑘) + 𝐻(𝑘) −𝐻(𝑗, 𝑘) (9) (9) Then, we built the Hat matrix for feature extraction, whereby xi, a matrix of features, is utilized to predict zi, a target variable, from the training data. In other words, using the previously remembered definitions, into: Through using the following formula, we were able to determine the extent to which the model was inaccurate. The 𝐼(𝑗; 𝑘) = −∫ 𝜇𝑋,𝑌(𝑗, 𝑘)log 𝜇𝑗,𝑘(𝑧,𝑘) 𝜇𝑧(𝑗)𝜇𝑘(𝑘) 𝑑𝑥𝑑𝑦 (10) (10) The definition of the conditional component data is as follows: The definition of the conditional component data is as follows: species will hatch before eggs of the host species, which is just cruel. After the first cuckoo chick hatches, the parents will shift the host eggs slightly out of the nest to make room for the new arrival and guarantee that all of the cuckoo chicks have enough to eat. It seems that most wild animals forage in a very chaotic fashion. Also, the quirks of levy flying are employed to determine the levy behavior of the animals. Below are some guidelines based on the cuckoo search paradigm that best explain the proposed approach. Each cuckoo female will deposit an egg in a nest of her own choosing. The nest's better solution is good for the progeny of the future (egg quality). When the host species discovers that alien eggs have been laid in its nest, it abandons the nest, destroys it by eating the eggs, and then starts over elsewhere. 𝐼(𝑗1; 𝑘/𝑘2) = 𝐻(𝑗1/𝑘) −𝐻(𝑗1/𝑘, 𝑧2) = 𝐼(j/𝑘, 𝑧2) −𝐼(𝑗1/𝑘) (11) (11) Calculates the proportion of 𝑗2's value that is included in j1, assuming that 𝑗1's value is known. A another way to look at it is as the difference between the amount of information needed to describe 𝑗1 given 𝑗2 and the amount of information needed to describe 𝑋1 given 𝑗2 and k. The conditional mutual information is 0 if the information contained in k and 𝑗2 regarding 𝑋1 is identical. For the contrary case, if both k and 𝑧2 provide information, and where that information is complimentary, the gap widens significantly. d. Attack detection 𝜑𝑢= 𝜑𝑢−1 −𝛽⋅ 𝑓ˆ𝑢 (√𝑠ˆ𝑢+𝐾) (15) (15) (15) In order to improve classification accuracy, the suggested method combines the hybrid cuckoo Adam algorithm with the self-attention based depth poly O (optimized)-Network. It's possible that the classifier's initial parameters would be optimized. Accuracy of classification is enhanced by using the cuckoo's nesting patterns along with the step size parameter. With a tunable learning rate parameter, one may generate a sparse gradient that provides a precise moment estimate. While adequate results may be obtained by using just one optimization technique for data classification, the accuracy of the classification performance is enhanced by combining the breeding parameter of the CS algorithm with the gradient function. This means that the suggested method not only speeds up the classification process but also increases accuracy. where, 𝑓ˆ𝑢 stands for the mean gradient over a certain time period, su for the square of the gradient, and for the increment size. Hence, for the time being, let's pretend that u=u+2 and u- 1=u. The values for u and u-1 may be found by solving the following equation. 𝛽⋅𝑓ˆ𝑢+2 √𝑠ˆ𝑢+2+𝐾 = 𝜙𝑢−𝜙𝑢+2 𝛽 = (𝜙𝑢−𝜙𝑢+2)(√𝑠ˆ𝑢+2+𝐾) 𝑓ˆ𝑢+2 (16) (16) Under the assumption that 𝜑 =P, the modified version of Eq. (16) is as follows, Levy's Flight: Some animals also have impeccable timing when it comes to laying eggs. Parasitic cuckoos choose the nest where the eggs of the host species were laid. Eggs of the cuckoo 𝑞𝑗 𝑢+2 = 𝑞𝑧 𝑢+ (𝑃𝑧𝑢−𝑃𝑧𝑢+2)(√𝑠ˆ𝑢+2+𝐾) 𝑓ˆ𝑢+2 ⊕Levy (𝛾) 𝑃𝑧 𝑢+2 = 𝑞𝑧 𝑢+ 𝑞𝑧𝑢(√𝑠ˆ𝑢+2+𝐾) 𝑓ˆ𝑢+2 − 𝑞𝑧𝑢+2(√𝑠ˆ𝑢+2+𝐾) 𝑓ˆ𝑢+2 ⊕Levy (𝛾) 𝑞𝑧 𝑢+2 + 𝑞𝑧𝑢+2(√𝑠ˆ𝑢+2+𝐾) 𝑓ˆ𝑢+2 = 𝑞𝑧 𝑢( 𝑓ˆ𝑢+2+(√𝑠ˆ𝑢+2+𝐾) 𝑓ˆ𝑢+2 ) ⊕Levy (𝛾) 𝑞𝑧 𝑢+2 ( 𝑓ˆ𝑢+2+(√𝑠ˆ𝑢+2+𝐾) 𝑓ˆ𝑢+2 ) = 𝑃𝑧 𝑢( 𝑓ˆ𝑢+2+(√𝑠ˆ𝑢+2+𝐾) 𝑓ˆ𝑢+2 ) ⊕Levy (𝛾) 𝑃𝑧 𝑢+2 = 𝑓ˆ𝑢+2 𝑓ˆ𝑢+2+(√𝑠ˆ𝑢+2+𝐾) × {𝑃𝑧 𝑢( 𝑓ˆ𝑢+2+(√𝑠ˆ𝑢+2+𝐾) 𝑓ˆ𝑢+2 ) ⊕Levy (𝛾)} (17) 𝑏1 = {𝑏1 1, 𝑏2 1, K, 𝑏𝑚 1 , K, 𝑏𝑙 1}; 1 ≤𝑚≤𝑙 𝑐1 = {𝑐1 1, 𝑐2 1, K, 𝑐𝑛 1, K, 𝑐𝑓 1}; 1 ≤𝑛≤𝑓 (19) (19) “ where f represents hidden neurons and represents the mth visible neuron in layer 1 𝑏𝑚 1 , and the nth unseen neuron in layer 1 is represented by 𝑐𝑛 1. Every single neuron in both the overt and covert levels is biased. Let x and y stand for the visible and invisible layers' biases, respectively. d. Attack detection With this, we can see the second hidden layer, which is expressed as,𝑐2 = {𝑐1 2, 𝑐2 2, … , 𝑐𝑛 2, … , 𝑐𝑓 2}; 1 ≤𝑛≤𝑓 (25) 𝑆2 = {𝑆𝑛𝑛 2 }; 1 ≤𝑛≤𝑓 (26) (26) In x2 and y2 Eq. (25) and (26) the parameters for the bias of the hidden and visible layers are the same (26). This vector form is used in layer 2 for weighting. where, 𝑆𝑛𝑛 2 is an abbreviation for the f-by-f layer 2 weight vector, where n"th" stands for the n"th" exposed neuron and n"th" concealed neuron. Hence, it is possible to determine the output of the nth secret neuron by d. Attack detection Seeing the biased behavior of the neurons in layers 1 and 2 is necessary for this purpose. 𝑞𝑧 𝑢+2 + 𝑞𝑧 (√𝑢+2 ) 𝑓ˆ𝑢+2 = 𝑞𝑧 𝑢( 𝑓ˆ𝑢+2+(√𝑠ˆ𝑢+2+𝐾) 𝑓ˆ𝑢+2 ) ⊕Levy (𝛾) 𝑞𝑧 𝑢+2 ( 𝑓ˆ𝑢+2+(√𝑠ˆ𝑢+2+𝐾) 𝑓ˆ𝑢+2 ) = 𝑃𝑧 𝑢( 𝑓ˆ𝑢+2+(√𝑠ˆ𝑢+2+𝐾) 𝑓ˆ𝑢+2 ) ⊕Levy (𝛾) 𝑃𝑢+2 (17) (17) 𝑥1 = {𝑥1 1, 𝑥2 1, K, 𝑥𝑚 1 , K, 𝑥𝑙 1} 𝑦1 = {𝑦1 1, 𝑦2 1, K, 𝑦𝑛 1, K, 𝑦𝑓 1} (20) (20) where 𝑦𝑛 1 signifies the hidden neuron bias and 𝑥𝑚 1 with the mth visible neuron. The weight for the first layer of the classifier is defined as,, = 𝑓ˆ𝑢+2 𝑓ˆ𝑢+2+(√𝑠ˆ𝑢+2+𝐾) × {𝑃𝑧 𝑢( 𝑓ˆ𝑢+2+(√𝑠ˆ𝑢+2+𝐾) 𝑓ˆ𝑢+2 ) ⊕Levy (𝛾)} 𝑆1 = {𝑆𝑚𝑛 1 }; 1 ≤𝑚≤𝑙; 1 ≤𝑛≤𝑓 (21) (21) where, 𝑆𝑚𝑛 1 provides, in units, the length of the weight vector between the mth visible and nth hidden item. To that end, the output of the first hidden layer is based on the weights and biases of the neurons included inside that layer. In this case 𝑓𝑢 and 𝑠𝑢 are calculated as, In this case 𝑓𝑢 and 𝑠𝑢 are calculated as, In this case 𝑓𝑢 and 𝑠𝑢 are calculated as, 𝑓𝑢+2 = 𝜅1𝑓𝑢+ (1 −𝜅1)ℎ𝑢 𝑠𝑢+2 = 𝜅2 ⋅𝑠𝑢−1 + (1 −𝜅2)ℎ𝑢 2 (18) (18) 𝑐𝑛 1 = 𝜆[𝑦𝑛 1 + ∑   𝑚 𝑏𝑚 1 𝑆𝑚𝑛 1 ] (22) (22) “where, 𝐾= 10−8, and 𝑓𝑢 displays the squared gradient, while s u stands for the moving average gradient.”. where, 𝜆 represents the action that activates something. Moreover, layer 1's output is shown as 𝑐1 = {𝑐𝑛 1}; 1 ≤𝑛≤𝑓 (23) “Hyper parameters Ranges various batch sizes {252,512} variety of network sizes {small, normal} Functions of activation {ReLu, Swish} Dropout layer Learning rate Inrange[0.1,0.2] Optimization method {HC Adam} {3,11}” (23) Layer 2 classifiers are also trained with the use of the hidden layer's output. The visible layer of layer 2 receives information from layer 1 per the equation (24). This proves that the layer 2 neurons' representation is identical to that of the layer 1 neurons'. 𝑏2 = {𝑏1 2, 𝑏2 2, … , 𝑏𝑓 2} = {𝑐𝑛 1}; 1 ≤𝑛≤𝑓 (24) (24) (24) where, {𝑐𝑛 1} the layer 1 output vector should be indicated. V. PERFORMANCE ANALYSIS (28) In this research, we implement and assess a new attack detection system based on optimization. In this research, we provide a hybrid cuckoo Adam algorithm-based self-attention based depth poly O (optimized)-Network. Experiments were conducted in a MATLAB environment. We have a dataset for testing with 200,960 examples from the regular class and 15,682 examples from the assault class. Here we provide the outcomes of the experiments and talk about them. Once their output is processed, the f-labeled neurons in the input layer send their data on to the classifier layer. The information is received by this layer as, In this research, we implement and assess a new attack detection system based on optimization. In this research, we provide a hybrid cuckoo Adam algorithm-based self-attention based depth poly O (optimized)-Network. Experiments were conducted in a MATLAB environment. We have a dataset for testing with 200,960 examples from the regular class and 15,682 examples from the assault class. Here we provide the outcomes of the experiments and talk about them. 𝑝= {𝑝1, 𝑝2, K, 𝑝𝑛, K, 𝑝𝑓} = {𝑐𝑛 2}; 1 ≤𝑛≤𝑓 (29) (29) Neurons in the input layer are given a f label, and their output is passed to the classifier layer. This layer takes in data in the form 0) Take here be ) es in well When are ) ffers yer's Figure 4(a)Sample input 𝑑= {𝑑1, 𝑑2, K, 𝑑𝐴, K, 𝑑𝐶}; 1 ≤𝜔≤𝑣 (30) (30) where C is the total amount of brain cells we can't see. Take into account the unobserved neuron's D A bias A, where A=1,2,, K,C. The results of using poly layers might be represented as, 𝑒= {𝑒1, 𝑒2, K, 𝑒𝜔, K, 𝑒𝑣}; 1 ≤𝜔≤𝑣 (31) (31) Here in which v refers as the total number of hidden nodes in the network. Each layer, both the input and hidden ones, as well as the hidden and output ones, has its own weight vector. When weight vectors between the input and hidden layers are multiplied together, the result is the scalar product (SE). Here in which v refers as the total number of hidden nodes in the network. Each layer, both the input and hidden ones, as well as the hidden and output ones, has its own weight vector. When weight vectors between the input and hidden layers are multiplied together, the result is the scalar product (SE). V. PERFORMANCE ANALYSIS 𝑆𝐸= {𝑆𝑛𝐴 𝐸}; 1 ≤𝑛≤𝑓; 1 ≤𝜔≤𝑣 (32) (32) “where, 𝑆𝑛𝐴 𝐸 we may deduce that the nth input neuron differs from a hidden neuron of size SE by [fC]. The hidden layer's output may be expressed as, where and are the neurons' weights and biases, respectively. indicate the difference between an n- th input neuron and a hidden n-th neuron of size SE, where SE is the size of the input neuron's hidden input neuron. The output of the hidden layer may be written as where and are the weights and biases of the individual neurons. “where, 𝑆𝑛𝐴 𝐸 we may deduce that the nth input neuron differs from a hidden neuron of size SE by [fC]. The hidden layer's output may be expressed as, where and are the neurons' weights and biases, respectively. indicate the difference between an n- th input neuron and a hidden n-th neuron of size SE, where SE is the size of the input neuron's hidden input neuron. The output of the hidden layer may be written as where and are the weights and biases of the individual neurons. Figure 4(a)Sample input 𝑑𝐴= [∑   𝑓 𝑛=1  𝑆𝑛𝐴 𝐸∗𝑝𝑛]𝐷𝐴 ∀𝑝𝑛= 𝑐𝑛 2 (33) (33) where 𝐷𝐴 is the hidden neuron's bias set to equal𝑝𝑛= 𝑐𝑛 2, Using Layer 2's Output as Layer 1's Input. Moreover, SG stands in for the mass of the covert layer, and its formula for its weight is, 𝑆𝐺= {𝑆𝐴𝜔 𝐺}; 1 ≤𝐴≤𝐶; 1 ≤𝜔≤𝑣 (34) (34) Figure 4 (b)Simulated output For the final output vector, we get by multiplying the hidden layer's output by the weight matrix SG. For the final output vector, we get by multiplying the hidden layer's output by the weight matrix SG. The amount of data from Internet of Things devices was increased to 1 GB, and the number of attack threads was raised from 1 to 50. (Bytes Per Second). Input examples and simulated results for predicting malicious traffic are shown in Figure 4. The amount of data from Internet of Things devices was increased to 1 GB, and the number of attack threads was raised from 1 to 50. (Bytes Per Second). Input examples and simulated results for predicting malicious traffic are shown in Figure 4. Figure 3 Process of hyper tuning Figure 3 Process of hyper tuning In a self-attention based depth poly O (optimized)-Network, the feature vector F is fed into the top layer, as shown in the following formula. 𝑐𝑛 2 = 𝜆[𝑦𝑛 2 + ∑   𝑚 𝑏𝑚 2 𝑆𝑛𝑛 2 ], ∀𝑏𝑚 2 = 𝑐𝑛 1 (27) (27) Finally the attack can be classified precisely. Finally the attack can be classified precisely. where, 𝑦𝑛 2 finds the nth hidden neuron's associated bias. Hence, the hidden layer's output might be phrased as, 𝑐2 = {𝑐𝑛 2}; 1 ≤𝑛≤𝑓 (28) V. PERFORMANCE ANALYSIS 𝑒𝜔= ∑   𝐶 𝐴=1 𝑆𝐴𝜔 𝐺∗𝑑𝐴 (35) (35) “where, 𝑆𝐴𝜔 𝐺 stands for the relative importance of A"th" concealed and 𝜔th neuronal output, and 𝑑𝐴 named the output of the hidden layer”. Figure 5 Validation accuracy and loss analysis The loss function, which is calculated for each data item in an epoch, may be used to quantitatively analyze the quantity of data lost over the course of an epoch. An iterative curve is Figure 6(b) True response Vs. Predicted response Figure 5 Validation accuracy and loss analysis Figure 6(b) True response Vs. Predicted response Figure 6(b) True response Vs. Predicted response Figure 5 Validation accuracy and loss analysis The loss function, which is calculated for each data item in an epoch, may be used to quantitatively analyze the quantity of data lost over the course of an epoch. An iterative curve is generated by repeatedly discarding a small percentage of the data. The produced curve shows that the training and testing losses for the suggested classifiers are closer to the bottom of the range. Figure 6(b) True response Vs. Predicted response Here, in Figure 6, we provide the confusion matrix for the multiclassification case where the optimum permutation does exist. As can be seen from this, the optimized network identifies all DDoS and DoS assaults properly, with the exception of the HTTP DoS attack, which it mistakes for a Scanning attack and an Xbash attack in two separate instances. Scanning assaults are also detected almost precisely, with just around of sample flows being incorrectly categorized, mostly as Mirai and regular traffic. About of misclassified flows include regular traffic and Xbash assaults, with errors in the categorization mostly focusing on malware attacks and normal traffic, respectively. In conclusion, misclassification occurs in 3% of situations even with the optimal hyperparameter setting for Mirai flows, with HTTP DoS assaults being the most confused type. The confusion matrix not only confirms the danger of Mirai attacks, but also shows that the vast majority of misclassifications concern either regular traffic or highly frequent types of traffic, such as HTTP flows. Here, in Figure 6, we provide the confusion matrix for the multiclassification case where the optimum permutation does exist. Figure 7 Precision rate analysis We were able to categorize the irregular data flow from the characteristics data we gathered. Figure 7 shows that the proposed technique achieves a high degree of precision (99.8%), which is exceptional in comparison to other current processes. V. PERFORMANCE ANALYSIS As before, the proposed technique had the greatest recall (99.8%) of all the approaches tested. Figure 9 Accuracy rate analysis Th SABDPON d l ll f i d i f “Rate of success in predicting instances, expressed as a fraction of the total number of cases .” “rate of Precision = 𝐶𝑂 𝐶𝑂+𝐷𝑂” “F measure or F1 score” “Only two measurements are needed to determine the F-measure (precision and recall) .” “F measure = 2∗ (𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 ∗𝑅𝑒𝑐𝑎𝑙𝑙) (𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛+𝑅𝑒𝑐𝑎𝑙𝑙)” “Rate of success in predicting instances, expressed as a fraction of the total number of cases .” “rate of Precision = 𝐶𝑂 𝐶𝑂+𝐷𝑂” “F measure or F1 score” “Only two measurements are needed to determine the F-measure (precision and recall) .” “F measure = 2∗ (𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 ∗𝑅𝑒𝑐𝑎𝑙𝑙) (𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛+𝑅𝑒𝑐𝑎𝑙𝑙)” “Rate of success in predicting instances, expressed as a fraction of the total number of cases .” “rate of Precision = 𝐶𝑂 𝐶𝑂+𝐷𝑂” “F measure or F1 score” “Only two measurements are needed to determine the F-measure (precision and recall) .” “F measure = 2∗ (𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 ∗𝑅𝑒𝑐𝑎𝑙𝑙) (𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛+𝑅𝑒𝑐𝑎𝑙𝑙)” “Rate of success in predicting instances, expressed as a fraction of the total number of cases .” “rate of Precision = 𝐶𝑂 𝐶𝑂+𝐷𝑂” “F measure or F1 score” “Only two measurements are needed to determine the F-measure (precision and recall) .” “F measure = 2∗ (𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 ∗𝑅𝑒𝑐𝑎𝑙𝑙) (𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛+𝑅𝑒𝑐𝑎𝑙𝑙)” Fig re 7 Precision rate anal sis V. PERFORMANCE ANALYSIS As can be seen from this, the optimized network identifies all DDoS and DoS assaults properly, with the exception of the HTTP DoS attack, which it mistakes for a Scanning attack and an Xbash attack in two separate instances. Scanning assaults are also detected almost precisely, with just around of sample flows being incorrectly categorized, mostly as Mirai and regular traffic. About of misclassified flows include regular traffic and Xbash assaults, with errors in the categorization mostly focusing on malware attacks and normal traffic, respectively. In conclusion, misclassification occurs in 3% of situations even with the optimal hyperparameter setting for Mirai flows, with HTTP DoS assaults being the most confused type. The confusion matrix not only confirms the danger of Mirai attacks, but also shows that the vast majority of misclassifications concern either regular traffic or highly frequent types of traffic, such as HTTP flows. Figure 6(a) Actual class Vs. Predicted class Some performance measures are shown below that may be used to compare the proposed technique with current methods [26] and demonstrate its efficacy. Table 1 Evaluation metrics “Evolution matrix” “Description” “Formula” “Accuracy” “The rate at which predictions were correct over the whole sample. .” “Accuracy = 𝐶𝑂+𝑅𝐵 𝐶𝑂+𝐶𝑂+𝑅𝐵+𝐷𝐵” “Recall” “The rate at which events are anticipated correctly as a percentage of all events.” “rate of Recall = 𝐶𝑂 𝐶𝑂+𝐷𝐵" “Precision” Figure 6(a) Actual class Vs. Predicted class Table 1 Evaluation metrics “Evolution matrix” “Description” “Formula” “Accuracy” “The rate at which predictions were correct over the whole sample. .” “Accuracy = 𝐶𝑂+𝑅𝐵 𝐶𝑂+𝐶𝑂+𝑅𝐵+𝐷𝐵” “Recall” “The rate at which events are anticipated correctly as a percentage of all events.” “rate of Recall = 𝐶𝑂 𝐶𝑂+𝐷𝐵" “Precision” Table 1 Evaluation metrics Table 1 Evaluation metrics “Rate of success in predicting instances, expressed as a fraction of the total number of cases .” “rate of Precision = 𝐶𝑂 𝐶𝑂+𝐷𝑂” “F measure or F1 score” “Only two measurements are needed to determine the F-measure (precision and recall) .” “F measure = 2∗ (𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 ∗𝑅𝑒𝑐𝑎𝑙𝑙) (𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛+𝑅𝑒𝑐𝑎𝑙𝑙)” Figure 7 Precision rate analysis We were able to categorize the irregular data flow from the characteristics data we gathered. Figure 7 shows that the proposed technique achieves a high degree of precision (99.8%), which is exceptional in comparison to other current processes. Figure 8 Recall rate analysis The recall results for identifying fraudulent data traffic in real- time datasets are shown in Figure 8. Figure 8 Recall rate analysis The recall results for identifying fraudulent data traffic in real- time datasets are shown in Figure 8. As before, the proposed technique had the greatest recall (99.8%) of all the approaches tested. Figure 7 Precision rate analysis Figure 9 Accuracy rate analysis “Reference Extracted amount of the feature corrected data discrepancy Accuracy obttained” “[27] 11.0 ☑ 99.860% [27] 111, 41,10.0 ❌ 95.120% for 41.0 features [27] 6.0 ❌ 99.30% [27] 154.0 ❌ 98.670% [27] 154, 20.0 ❌ 96.260% [27] 5.0 ☑ 98.220% [27] 95.0 ☑ 98.540% for multi-class 99.520% for binary [27] 50.0 ☑ 94.810% [27] 71.0 ☑ 92.490% [27] 36.0 ❌ 95.880% for multi-class [27] 21.0 ☑ 99.970% semi-distributed, 97.800% for distributed [27] 76,13,8.0 ☑ 990% Proposed 78500.0 ☑ 99.990%” Table 2 briefly compare and contrast the existing literature with our planned study.. catastrophic. In this research, we aimed to develop context- aware security solutions for IoT medical contexts by proposing a paradigm for identifying malicious communications. In order to implement the proposed method, identifying malicious traffic is prioritized. To get meaningful information from the generated traffic, it may be collected and then processed using a MATLAB script. To identify potentially harmful traffic in an IoT healthcare environment, we construct a dataset and use it to train and evaluate the suggested classifier. The next phase involves field-testing the trained classifier. With an F1-score of 99.8%, 99.8% precision, 99.8% recall, and 99.9% accuracy, the SABDPON classifier is the most effective. The proposed architecture has been experimentally validated, suggesting its potential application in developing innovative IoT security solutions. The resultant dataset and proposed methodology may be used by researchers to enhance the security and situational awareness of IoT healthcare systems. Quickly simulating several IoT use cases is now possible thanks to the proposed framework, opening the path for the development of AI-based security solutions for a wider variety of use cases. Further work It has been experimentally shown that the proposed architecture is successful in detecting cyberattacks, leading to a safer and more secure IoT healthcare setting. By following the provided architecture and the major steps shown in Figure 1, it is possible to swiftly create AI-based security solutions for any novel IoT use case. The results of these studies might help in the development of more effective context-aware IoT security solutions, especially in the IoT healthcare industry. The dataset generated during this study will be made publicly accessible for use in future studies if and when requested by the scientific community. Figure 9 Accuracy rate analysis The SABDPON model allows for very precise detection of the kind of attack that has occurred. The proposed approach has more accuracy than the existing best practices (99.99 percent). From the figure 10 it will be shown that the suggested methodology have high F score (99.8%) range when compared to other existing mechanisms. Figure 10 Analysis of F1 score Figure 10 Analysis of F1 score Figure 11 AUC Calculation For each given categorization threshold, the AUC remains constant. Regardless of the chosen categorization threshold, it checks how well the model predicts. A larger area under the curve indicates a more effective classifier. In addition, the curve features a single node that stands for the classifier's ideal range in operation. In this figure 11, we provide the ROC curves for all evaluated data sets. We can see that the area under each curve is extremely large, which is evidence that the categorization using the SABDPON method is effective. Figure 11 AUC Calculation in operation. In this figure 11, we provide the ROC curves for all evaluated data sets. We can see that the area under each curve is extremely large, which is evidence that the categorization using the SABDPON method is effective. For each given categorization threshold, the AUC remains constant. Regardless of the chosen categorization threshold, it checks how well the model predicts. A larger area under the curve indicates a more effective classifier. In addition, the curve features a single node that stands for the classifier's ideal range For each given categorization threshold, the AUC remains constant. Regardless of the chosen categorization threshold, it checks how well the model predicts. A larger area under the curve indicates a more effective classifier. In addition, the curve features a single node that stands for the classifier's ideal range Table 2 briefly compare and contrast the existing literature with our planned study.. REFERENCES 1. S. Pundir, M. Wazid, D. P. Singh, A. K. Das, J. J. Rodrigues, and Y. Park, "Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: Survey and future challenges," IEEE Access, vol. 8, pp. 3343-3363, 2019. 14. R. Sekhar, K. Sasirekha, P. Raja, and K. Thangavel, "A novel GPU based intrusion detection system using deep autoencoder with Fruitfly optimization," SN Applied Sciences, vol. 3, p. 594, 2021. 15. C. Kolias, G. Kambourakis, A. Stavrou, and S. Gritzalis, "Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset," IEEE Communications Surveys & Tutorials, vol. 18, pp. 184-208, 2015. 2. P. Rughoobur and L. Nagowah, "A lightweight replay attack detection framework for battery depended IoT devices designed for healthcare," in 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions)(ICTUS), 2017, pp. 811-817. 16. U. S. K. P. M. Thanthrige, J. Samarabandu, and X. Wang, "Machine learning techniques for intrusion detection on public dataset," in 2016 IEEE Canadian conference on electrical and computer engineering (CCECE), 2016, pp. 1-4. 3. S. Rathore and J. H. Park, "Semi-supervised learning based distributed attack detection framework for IoT," Applied Soft Computing, vol. 72, pp. 79-89, 2018. 4. S. Carta, A. S. Podda, D. R. Recupero, and R. Saia, "A local feature engineering strategy to improve network anomaly detection," Future Internet, vol. 12, p. 177, 2020. 17. M. E. Aminanto, H. Tanuwidjaja, P. D. Yoo, and K. Kim, "Weighted feature selection techniques for detecting impersonation attack in Wi-Fi networks," in Proc. Symp. Cryptogr. Inf. Secur.(SCIS), 2017, pp. 1- 8. 5. I. Alrashdi, A. Alqazzaz, R. Alharthi, E. Aloufi, M. A. Zohdy, and H. Ming, "FBAD: Fog-based attack detection for IoT healthcare in smart cities," in 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2019, pp. 0515-0522. 18. D. Kaleem and K. Ferens, "A cognitive multi-agent model to detect malicious threats," in Proceedings of the 2017 International Conference on Applied Cognitive Computing (ACC’17), 2017. 19. F. D. Vaca and Q. Niyaz, "An ensemble learning based wi-fi network intrusion detection system (wnids)," in 2018 IEEE 17th international symposium on network Computing and Applications (NCA), 2018, pp. 1-5. 6. L. Santos, C. Rabadao, and R. Gonçalves, "Intrusion detection systems in Internet of Things: A literature review," in 2018 13th Iberian conference on information systems and technologies (CISTI), 2018, pp. 1-7. 20. M. A. Rahman, A. VI. CONCLUSION Academics and engineers have developed an interest in the design of IoT healthcare systems as a result of the fast development of IoT technology. There have been several plans for IoT healthcare systems developed over the last few years, but they all have a common flaw: a lack of adequate security. The consequences of a security breach or cyberattack on healthcare systems connected to the Internet of Things might be 9. A. H. Seh, M. Zarour, M. Alenezi, A. K. Sarkar, A. Agrawal, R. Kumar, et al., "Healthcare data breaches: insights and implications," in Healthcare, 2020, p. 133. on our feature selection method will include undertaking extensive testing with a variety of DL network topologies and, more importantly, a focus on finding the most essential qualities themselves rather than simply their frequency. 10. I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, "Toward generating a new intrusion detection dataset and intrusion traffic characterization," ICISSp, vol. 1, pp. 108-116, 2018. Compliance with Ethical Standards Disclosure of potential conflicts of Interest : There is no potential conflicts of interest among the authors. 11. T. Batiha and P. Krömer, "Design and analysis of efficient neural intrusion detection for wireless sensor networks," Concurrency and Computation: Practice and Experience, vol. 33, p. e6152, 2021. Research involving human participants and/or animals: This article does not contain any studies with human participants or animals performed by any of the authors. Funding : This work was done under grant No 420/year 2023 of Scientific Research of King Khalid University, Al-Faraa, Saudi Arabia.Competing Interests : There is no competing interests among the authors 12. M. Safaldin, M. Otair, and L. Abualigah, "Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks," Journal of ambient intelligence and humanized computing, vol. 12, pp. 1559-1576, 2021. Author Contributions: All the authors have contributed in equal manner. Author Contributions: All the authors have contributed in equal manner. Data Availability : Data is available based on personal request 13. A. Fatani, A. Dahou, M. A. Al-Qaness, S. Lu, and M. Abd Elaziz, "Advanced feature extraction and selection approach using deep learning and Aquila optimizer for IoT intrusion detection system," Sensors, vol. 22, p. 140, 2022. REFERENCES T. Asyhari, L. Leong, G. Satrya, M. H. Tao, and M. Zolkipli, "Scalable machine learning- based intrusion detection system for IoT-enabled smart cities," Sustainable Cities and Society, vol. 61, p. 102324, 2020. 7. B. B. Zarpelão, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga, "A survey of intrusion detection in Internet of Things," Journal of Network and Computer Applications, vol. 84, pp. 25-37, 2017. 8. S. Ghazanfar, F. Hussain, A. U. Rehman, U. U. Fayyaz, F. Shahzad, and G. A. Shah, "Iot-flock: An open-source framework for iot traffic generation," in 2020 International Conference on Emerging Trends in Smart Technologies (ICETST), 2020, pp. 1-6. 21. S. J. Lee, P. D. Yoo, A. T. Asyhari, Y. Jhi, L. Chermak, C. Y. Yeun, et al., "IMPACT: Impersonation attack detection via edge computing using deep autoencoder and feature abstraction," IEEE Access, vol. 8, pp. 65520-65529, 2020. IEEE Access. (2020) 8:106576–84. doi: 10.1109/ACCESS.2020.3000421 IEEE Access. (2020) 8:106576–84. doi: 10.1109/ACCESS.2020.3000421 22. V. L. Thing, "IEEE 802.11 network anomaly detection and attack classification: A deep learning approach," in 2017 IEEE Wireless Communications and Networking Conference (WCNC), 2017, pp. 1-6. doi: 34. Nguyen PT, Huynh VD, Vo KD, Phan PT, Elhoseny M, Le DN. Deep learning based optimal multimodal fusion framework for intrusion detection systems for healthcare data. CMC. (2021) 66:2555–71. doi: 10.32604/cmc.2021.012941 23. S. Wang, B. Li, M. Yang, and Z. Yan, "Intrusion detection for WiFi network: A deep learning approach," in Wireless Internet: 11th EAI International Conference, WiCON 2018, Taipei, Taiwan, October 15-16, 2018, Proceedings, 2019, pp. 95-104. 35. Iwendi C, Anajemba JH, Biamba C, Ngabo D. Security of things intrusion detection system for smart healthcare. Electronics. (2021) 10:1375. doi: 10.3390/electronics10121375 24. K. Kim, M. E. Aminanto, and H. C. Tanuwidjaja, Network intrusion detection using deep learning: a feature learning approach: Springer, 2018. 25. J. Ran, Y. Ji, and B. Tang, "A semi-supervised learning approach to ieee 802.11 network anomaly detection," in 2019 IEEE 89th vehicular technology conference (VTC2019-Spring), 2019, pp. 1-5. 36. Yeng PK, Nweke LO, Woldaregay AZ, Yang B, Snekkenes EA. Data-driven and artificial intelligence (AI) approach for modelling and analyzing healthcare security practice: a systematic review. In: Arai K, Kapoor S, Bhatia R, editors. Intelligent Systems and Applications. Cham: Springer (2021). doi: 10.1007/978-3-030-55180-3_1 26. F. Hussain, S. G. Abbas, G. A. Shah, I. M. Pires, U. U. Fayyaz, F. REFERENCES Shahzad, et al., "A framework for malicious traffic detection in IoT healthcare environment," Sensors, vol. 21, p. 3025, 2021. 27. T. Gaber, A. El-Ghamry, and A. E. Hassanien, "Injection attack detection using machine learning for smart IoT applications," Physical Communication, vol. 52, p. 101685, 2022. 37. Mahdavifar S, Maleki N, Lashkari AH, Broda M, Razavi AH. Classifying malicious domains using DNS traffic analysis. In: The 19th IEEE International Conference on Dependable, Autonomic, and Secure Computing (DASC). Calgary, AB (2021). 28. Tervoort T, De Oliveira MT, Pieters W, Van Gelder P, Olabarriaga SD, Marquering H. Solutions for mitigating cybersecurity risks caused by legacy software in medical devices: a scoping review. IEEE Access. (2020) 8:84352–61. doi: 10.1109/ACCESS.2020.2984376 38. Seth S, Chahal KK, Singh G. A novel ensemble framework for an intelligent intrusion detection system. IEEE Access. (2021) 9:138451–67. doi: 10.1109/ACCESS.2021.3116219 39. Serinelli BM, Collen A, Nijdam NA. On the analysis of open source datasets: validating IDS implementation for well-known and zero day attack detection. Proc Comp Sci. (2021) 191:192–9. doi: 10.1016/j.procs.2021.07.024 29. Thamilarasu G, Odesile A, Hoang A. An intrusion detection system for internet of medical things. IEEE Access. (2020) 8:181560–76. doi: 10.1109/ACCESS.2020.3026260 30. Subasi A, Algebsani S, Alghamdi W, Kremic E, Almaasrani J, Abdulaziz N. Intrusion detection in smart healthcare using bagging ensemble classifier. In: International Conference on Medical and Biological Engineering. Cham: Springer (2021) p. 164–71. doi: 10.1007/978-3-030-73909-6_18 40. Thilagam T, Aruna R. Intrusion detection for network based cloud computing by custom RC-NN and optimization. ICT Express. (2021) 7:512–20. doi: 10.1016/j.icte.2021.04.006 41. Zuech R, Hancock J, Khoshgoftaar TM. Detecting web attacks using random undersampling and ensemble learners. J Big Data. (2021) 8:1–20. doi: 10.1186/s40537-021-00460-8 31. Sarna Priya RM, Maddikunta PK, Parimala M, Koppu S, Gadekallu TR, Chowdhary CL, et al. An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Comp Commun. (2020) 160:139–49. doi: 10.1016/j.comcom.2020.05.048 42. Yu L, Dong J, Chen L, Li M, Xu B, Li Z, et al. PBCNN: packet bytes-based convolutional neural network for network intrusion detection. Comp Netw. (2021) 194:108117. doi: 10.1016/j.comnet.2021.108117 32. Šabić E, Keeley D, Henderson B, Nannemann S. Healthcare and anomaly detection: using machine learning to predict anomalies in heart rate data. AI Soc. (2021) 36:149–58. doi: 10.1007/s00146-020-00985-1 43. Gopalan SS, Ravikumar D, Linekar D, Raza A, Hasib M. Balancing approaches towards ML for IDS: a survey for the CSE-CIC IDS dataset. (ICCUBEA). Pune: IEEE (2018). doi: 10.1109/ICCUBEA.2018.8697702 doi: 44. Fitni QR, Ramli K. Implementation of ensemble learning and feature selection for performance improvements in anomaly-based intrusion detection systems. In: 2020 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT). IEEE (2020) p. 118–24. doi: 10.1109/IAICT50021.2020.9172014 55. Mubashar A, Asghar K, Javed AR, Rizwan M, Srivastava G, Gadekallu TR, et al. Storage and proximity management for centralized personal health records using an ipfs-based optimization algorithm. J Circ Syst Comp. (2021) 15:2250010 56. Loshchilov I, Hutter F. Sgdr: Stochastic gradient descent with warm restarts. arXiv Preprint. (2016) arXiv:1608.03983. 45. Misra D. Mish: a self regularized non-monotonic neural activation function. arXiv Preprint. (2019) arXiv:1908.08681. 57. Glorot X, Bengio Y. Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics. Sardinia: JMLR Workshop and Conference Proceedings (2010). p. 249–56. 46. Hua Y. An efficient traffic classification scheme using embedded feature selection and lightgbm. In: 2020 Information Communication Technologies Conference (ICTC). Nanjing: IEEE (2020). doi: 10.1109/ICTC49638.2020.9123302 58. Sharma NV, Yadav NS. An optimal intrusion detection system using recursive feature elimination and ensemble of classifiers. Microproc Microsyst. (2021) 23:104293. doi: 10.1016/j.micpro.2021.104293 47. Catillo M, Rak M, Villano U. 2L-ZED-IDS: a two- level anomaly detector for multiple attack classes. In: AINA Workshops. Caserta: Springer (2020). p. 687– 96. doi: 10.1007/978-3-030-44038-1_63 48. Khan MA, Kim J. Toward developing efficient Conv- AE-based intrusion detection system using heterogeneous dataset. Electronics. (2020) 9:1771. doi: 10.3390/electronics9111771 59. Sumaiya Thaseen I, Saira Banu J, Lavanya K, Rukunuddin Ghalib M, Abhishek K. An integrated intrusion detection system using correlation-based attribute selection and artificial neural network. Trans Emerg Telecommun Technol. (2021) 32:e4014. doi: 10.1002/ett.4014 49. Meryem A, Ouahidi BE. Hybrid intrusion detection system using machine learning. Netw Sec. (2020) 2020:8–19. doi: 10.1016/S1353-4858(20)30056-8 60. He K, Zhang X, Ren S, Sun J. Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. Las Vegas, LA: IEEE (2016). p. 770–8. doi: 10.1109/CVPR.2016.90 50. Thakkar A, Lohiya R. A review of the advancement in intrusion detection datasets. Proc Comp Sci. (2020) 167:636–45. doi: 10.1016/j.procs.2020.03.330 51. Gao X, Shan C, Hu C, Niu Z, Liu Z. An adaptive ensemble machine learning model for intrusion detection. IEEE Access. (2019) 7:82512–21. doi: 10.1109/ACCESS.2019.2923640 52. Chawla A, Lee B, Fallon S, Jacob P. Host based intrusion detection system with combined CNN/RNN model. REFERENCES In: 2020 International Conference on Communications, Signal Processing, and Their Applications (ICCSPA). 33. Hady AA, Ghubaish A, Salman T, Unal D, Jain R. Intrusion detection system for healthcare systems using medical and network data: a comparison study. (ICCUBEA). Pune: IEEE (2018). doi: 10.1109/ICCUBEA.2018.8697702 Sharjah: IEEE (2021). doi: 10.1109/ICCSPA49915.2021.9385742 (ICCUBEA). Pune: IEEE (2018). doi: 10.1109/ICCUBEA.2018.8697702 (ICCUBEA). Pune: IEEE (2018). doi: 10.1109/ICCUBEA.2018.8697702 In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Cham: Springer (2018). p. 149–58. doi: 10.1007/978- 3-030-13453-2_12 53. Freas CB, Harrison RW, Long Y. High performance attack estimation in large-scale network flows. In: 2018 IEEE International Conference on Big Data (Big Data). IEEE (2018). p. 5014–20. doi: 10.1109/BigData.2018.8622125 54. Wankhede S, Kshirsagar D. DoS attack detection using machine learning and neural network. In: 2018 Fourth International Conference on Computing Communication Control and Automation
W2747337326.txt
http://www.scielo.br/pdf/bjft/v20/1981-6723-bjft-20-e2016149.pdf
pt
Morangos produzidos no semiárido de Minas Gerais: qualidade do fruto e da polpa congelados
Brazilian journal of food technology/Brazilian Journal of Food Technology
2,017
cc-by
4,678
Original Article Campinas, v. 20, e2016149, 2017 http://dx.doi.org/10.1590/1981-6723.14916 ISSN 1981-6723 on-line version Morangos produzidos no semiárido de Minas Gerais: qualidade do fruto e da polpa congelados Strawberries produced in the semi-arid region of Minas Gerais, Brazil: quality of the frozen fruit and pulp Ariane Castricini1*, Mário Sérgio Carvalho Dias1, Ramilo Nogueira Martins1, Leandra Oliveira Santos1 1 Empresa de Pesquisa Agropecuária de Minas Gerais (EPAMIG Norte), Nova Porteirinha/MG - Brasil *Corresponding Author Ariane Castricini, Empresa de Pesquisa Agropecuária de Minas Gerais (EPAMIG Norte), Campo Experimental do Gorutuba, Rodovia MGT 122, km 155, Caixa Postal: 12, CEP: 39525-000, Nova Porteirinha/MG - Brasil, e-mail: castriciniariane08@gmail.com Cite as: Strawberries produced in the semi-arid region of Minas Gerais, Brazil: quality of the frozen fruit and pulp. Braz. J. Food Technol., v. 20, e20161493, 2017. Received: Dec. 01, 2016; Approved: June 13, 2017 Resumo O congelamento de morangos inteiros ou em polpa pode fornecer matéria-prima para sua utilização em iogurtes, recheios, coberturas, sorvetes e sucos, fora da safra. Entretanto, ainda que o consumo não seja in natura, a qualidade do produto final deve ser satisfatória. Objetivou-se avaliar a qualidade de morangos produzidos no Semiárido de Minas Gerais, congelados inteiros e em polpa, durante o armazenamento. Frutos das cultivares Tudla, Oso Grande, Albion e Portola foram produzidos em Mocambinho, distrito de Jaíba-MG, após a colheita, foram lavados, embalados (inteiros ou polpa) a vácuo e congelados por até 180 dias. Os tratamentos foram constituídos por cultivares (c) e dias de armazenamento (d), constituindo fatorial duplo c × d, em que se utilizaram três repetições de 10 frutos por parcela ou três polpas embaladas, para as avaliações de frutos congelados inteiros e em polpa, respectivamente. A intensidade da cor vermelha dos morangos inteiros ou em polpa reduziu-se durante o armazenamento (redução de °hue); quando inteiros, ‘Tudla’, ‘Oso Grande’ e ‘Portola’ foram vermelhos mais claros que ‘Albion’, mas, em polpa, não ocorreu diferença entre ‘Tudla’ e ‘Albion’. Morangos ‘Oso Grande’ armazenados inteiros ou em polpa tiveram maior teor de sólidos solúveis em relação àqueles das demais cultivares, e ‘Portola’, o menor teor e a menor acidez titulável (quando inteiros). ‘Tudla’ apresentou frutos e polpa mais ácidos. Durante o armazenamento de morangos congelados inteiros ou em polpa, produzidos no Semiárido de Minas Gerais, ocorreram modificações nos parâmetros cor, sólidos solúveis e acidez titulável. Palavras-chave: Fragaria × ananassa Duch; Pós-colheita; Armazenamento. Abstract The freezing of whole strawberries or pulp can provide raw material for the out of season use of strawberries in yogurts, fillings, toppings, ice cream and juices. However, although the consumption is not in natura, the quality of the final product should be satisfactory. This study aimed to evaluate the quality of strawberries produced in the semi-arid region of Minas Gerais, Brazil, frozen either whole or in the form of pulp, during storage. Fruits of the cultivars Tudla, Oso Grande, Albion and Portola were produced in the semi-arid region of Minas Gerais, and after harvesting, were washed, vacuum packed (whole or pulp) and frozen for up to 180 days. The treatments consisted of cultivars (c) and days of storage (d), constituting a double factorial c × d design, using three repetitions of 10 fruits per batch or three pulp-packs, respectively, for the frozen whole fruit assessments. The intensity of the red colour of the whole strawberries or strawberry pulp reduced during storage (reduction of hue). When whole, the cultivars ‹Tudla›, ‹Oso Grande› and ‹Portola’ were a lighter red than› Albion ‹, but in the form of pulp, there was no difference between ‹Tudla› and ‹Albion›. The ‹Oso Grande› strawberries, stored whole or in pulp, showed higher soluble solids contents than those of the other cultivars, and ‹Portola› showed the lowest content and also the lowest titratable acidity (when whole). The fruits and pulp of the ‘Tudla’ cultivar were more acidic. During the storage of frozen whole or pulped strawberries produced in the semi-arid region of Minas Gerais, changes occurred in the colour, soluble solids and titratable acidity. Keywords: Fragaria × ananassa Duch; Postharvest; Storage. Este é um artigo publicado em acesso aberto (Open Access) sob a licença Creative Commons Attribution, que permite uso, distribuição e reprodução em qualquer meio, sem restrições desde que o trabalho original seja corretamente citado. http://bjft.ital.sp.gov.br Morangos produzidos no semiárido de Minas Gerais: qualidade do fruto e da polpa congelados Castricini, A. et al. 1 Introdução O morango (Fragaria × ananassa) pode ser usado como ingrediente em diversas preparações, tais como caldas, iogurtes, bebidas, biscoitos e sorvetes, entre outras. No entanto, além de ter uma produção sazonal, é uma fruta muito delicada, com alta taxa respiratória, sendo, por isso, altamente perecível (ROCHA et al., 2008). Segundo Cunha Junior et al. (2012), a comercialização de morangos a grandes distâncias é dificultada devido à sua perecibilidade, decorrente principalmente da suscetibilidade ao desenvolvimento de agentes patogênicos. De acordo com Brackmann et al. (2011), após a colheita, os frutos devem ser refrigerados rapidamente, a fim de minimizar a deterioração, pois morangos com a epiderme brilhante, sem sinais de desidratação ou deterioração, são desejáveis. O armazenamento congelado do morango inteiro ou em polpa é uma alternativa para seu armazenamento durante maior período, em relação ao fruto in natura ou fresco. No entanto, devido às perdas das características do fruto in natura, como formato, textura etc., a destinação do produto pós-congelamento será para preparações industriais. A qualidade de polpas de fruta no Brasil é regulamentada pela Instrução Normativa n.1, de 07 de janeiro de 2000, que determina os Padrões de Identidade e Qualidade (PIQ) (BRASIL, 2000). Estes padrões incluem características e composição às quais a polpa ou purê do determinado fruto deve atender, como cor, sabor, teores de sólidos solúveis e acidez. A polpa de morango é o produto obtido da parte comestível do fruto por meio de processo tecnológico adequado e deve obedecer às seguintes características e composição: sólidos solúveis (a 20 °C) 7,5 °Brix, pH = 3,30, acidez titulável (ácido cítrico) 0,80 g 100 g-1 e 56 mg 100 g-1 de ácido ascórbico (BRASIL, 2016). O clima mais favorável para o cultivo do morangueiro é o temperado; no entanto, no início da década de 2000, a Empresa de Pesquisa Agropecuária de Minas Gerais (Epamig) iniciou pesquisas para avaliar o comportamento da cultura no clima semiárido. Os pesquisadores partiram do pressuposto de que, em consequência do clima quente e seco predominante na região, as doenças não se desenvolveriam, sendo possível, assim, praticar uma agricultura sem a utilização de agrotóxicos (DIAS et al., 2014). Os primeiros trabalhos concluídos apresentaram resultados satisfatórios de produtividade e qualidade dos frutos. Neste sentido, objetivou-se avaliar a qualidade de morangos produzidos no Semiárido de Minas Gerais, congelados inteiros e em polpa, durante o armazenamento. 2 Material e métodos Morangos das cultivares Tudla, Oso Grande, Albion e Portola foram produzidos no Semiárido de Minas Gerais, em Mocambinho, distrito de Jaíba-MG, no Campo Braz. J. Food Technol., Campinas, v. 20, e2016149, 2017 Experimental de Mocambinho, pertencente à Epamig. Para a implantação do experimento, inicialmente retirou-se uma amostra de solo para a realização da análise em laboratório. Posteriormente, o solo foi preparado através de uma aração e uma gradagem. Em seguida, foram preparados os canteiros com dimensões de 1,20 m × 50 m, com três linhas de plantio. A adubação mineral consistiu na aplicação de Superfosfato simples, Sulfato de amônio, Cloreto de potássio, Sulfato de magnésio e FTE BR10, de acordo com o resultado da análise do solo. A adubação orgânica foi realizada com a utilização de esterco curtido de curral na proporção de 20 t ha-1. Foi adotado o sistema de irrigação por microaspersão, sendo este instalado antes do transplantio das mudas, que foi realizado quinze dias após a adubação organomineral da área. A irrigação visou atender a demanda de 5 mm dia-1, que são exigidos pela cultura, geralmente, nas condições locais. O espaçamento adotado entre plantas e entre linhas foi de 0,40 m × 0,40 m, respectivamente. As adubações de cobertura iniciaram-se aos trinta dias após o transplantio, sendo estas realizadas quinzenalmente até o final do ciclo da cultura, seguindo as recomendações de análises de solo. O mulching utilizado foi a lona plástica dupla face branco e preta, colocada sobre os canteiros trinta dias após o transplantio. O excesso de folhas e estolhos foi eliminado periodicamente, visando melhorar o arejamento entre as plantas, tornando, assim, o ambiente menos propício à manifestação de fungos secundários e favorecendo também a ação de agentes polinizadores na área, os quais contribuem para a boa formação dos frutos. Para o controle de ácaros e manchas foliares, utilizaram-se produtos biológicos, objetivando um menor impacto ambiental, com uma produção de morangos isenta de resíduos de agrotóxicos. As pulverizações eram realizadas com extrato de folhas de Nim (espécie) (10%) e aplicação de Calda Bordalesa. Os frutos foram colhidos com 75% da superfície com coloração vermelha. Após a colheita e antes do processamento, da embalagem e do congelamento, os frutos foram caracterizados quanto cor, através dos parâmetros luminosidade (L*), croma (C*) e °hue (ângulo de cor), ao teor de sólidos solúveis e à acidez titulável. Os valores obtidos nesta avaliação constituíram o tempo zero de armazenamento, sendo as demais avaliações feitas aos 30, 60, 90, 150 e 180 dias de armazenamento. A coloração do fruto foi determinada por Colorímetro Minolta, modelo Chroma meter CR 400, sistema L* C* Hue. A luminosidade (L*) varia entre zero (mais escuro) e 100 (mais claro); para a cromaticidade ou pureza da cor (C*), valores relativamente inferiores representam cores impuras (menor saturação de pigmentos) e os superiores, as cores puras (maior saturação de pigmentos). O ângulo de tonalidade ou cor verdadeira (°Hue) varia entre 0° e 360°, sendo que o ângulo 0° corresponde à cor vermelha; 90° à cor amarela; 180° ou -90°, a cor verde, e 270° ou -180°, 2 http://bjft.ital.sp.gov.br Morangos produzidos no semiárido de Minas Gerais: qualidade do fruto e da polpa congelados Castricini, A. et al. a cor azul. A avaliação de sólidos solúveis foi feita por leitura direta em refratômetro manual/digital, com resultados expressos em °Brix. A acidez titulável, determinada por titulação, foi expressa em grama de ácido cítrico. 100 g-1 de polpa (IAL, 1987). teste Scott-Knott a 5% ou análise de regressão, de acordo com a variável independente ‒ cultivar ou armazenamento, respectivamente. Após a caracterização inicial, os frutos inteiros ou na forma de polpa foram armazenados em freezer (-16 °C). Tanto para o armazenamento de frutos inteiros quanto em polpa, utilizou-se saco plástico (0,20 × 0,30 m) de polietileno de baixa densidade (70 µm), selado a vácuo, com seladora a vácuo, modelo Selovac 200. Os sacos apresentam certa permeabilidade (não informada pelo fabricante), pois, de acordo com Bauer (2009), todo material polimérico, devido à própria estrutura molecular, mesmo quando revestido com materiais de alta barreira, ainda demonstra certo grau de permeabilidade, quando comparado ao vidro ou material metálico. Para obtenção da polpa, os frutos foram processados em liquidificador industrial, sem adição de água. 3.1 Qualidade de frutos congelados O armazenamento da polpa e dos frutos inteiros deu-se até 180 dias após o processamento e a embalagem, ou seja, até seis meses. Durante este período, foram retiradas amostras do freezer e, após o descongelamento, foram feitas as avaliações de cor (*L, *C e °hue), sólidos solúveis e acidez titulável, de acordo com as metodologias descritas anteriormente. Foi utilizado o delineamento inteiramente casualizado, com três repetições de 10 frutos por parcela, para as avaliações de frutos congelados inteiros, e três polpas embaladas, para as análises da polpa. A análise de variância foi feita em esquema fatorial 4 × 6, sendo quatro cultivares (Tudla, Oso Grande, Albion e Portola) avaliadas, em seis tempos de armazenamento (0, 30, 60, 90, 150 e 180 dias), quando armazenadas em frutos inteiros, e em sete tempos (0, 30, 60, 90, 120, 150 e 180 dias), quando em polpa. Os resultados foram submetidos à análise estatística utilizando-se o Software Saeg 9.1 (SAEG, 2007). A análise de variância foi feita depois de comprovada a distribuição normal ou homogênea dos dados, através do Teste de Lilliefors e do Teste Cochran e Bartlett, respectivamente. Uma vez observada significância pelo Teste F, foi utilizado o 3 Resultados e discussão Houve interação significativa entre o tempo de armazenamento e as cultivares, para a cromaticidade da cor, os sólidos solúveis e a acidez titulável. A luminosidade da cor da casca variou em função dos efeitos isolados dos tratamentos, enquanto a tonalidade da cor (°hue), em função dos dias de armazenamento (Tabela 1). Durante o armazenamento, ocorreu intensificação da cor vermelha dos frutos, evidenciada pela redução dos valores do °hue (Figura 1A). De acordo com Borges et al. (2013), no sistema C.I.E L*a*b*, (padrão utilizado no colorímetro Minolta), o 0° corresponde à cor vermelha e o 90°, à amarela. Assim, quanto maior o valor, mais amarelo é o fruto, e, quanto menor, mais vermelho. Até 90 dias de armazenamento, verificou-se também redução de L* (Figura 1B), que expressa o grau de luminosidade da cor medida (L* = 100 = branco; L* = 0 = preto); neste caso, do vermelho. Entretanto, a partir deste dia de armazenamento, ocorreu aumento de L*, indicando que os frutos congelados tenderam ao vermelho mais claro. Segundo Ávila et al. (2012), menores valores relativos de °hue indicam coloração mais escura; no entanto, de acordo com Flores-Cantillano et al. (2008), o escurecimento acentuado da epiderme do morango durante o armazenamento é um atributo indesejável, tornando o produto pouco aceitável no mercado. Morangos ‘Tudla’, ‘Oso Grande’ e ‘Portola’ tiveram maior luminosidade da cor da epiderme que ‘Albion’ (Tabela 2), ou seja, esses cultivares tem frutos relativamente mais claros que ‘Albion’. A cromaticidade da cor dos frutos durante o armazenamento está apresentada na Tabela 3A. A cultivar Tudla apresentou redução deste componente da cor a partir de 30 dias de congelamento; para ‘Oso Grande’ e ambas as cultivares ‘Albion’ e ‘Portola’, esta redução ocorreu a partir de 60 dias e do tempo zero, respectivamente. A redução dos valores de croma indica Tabela 1. Análise de variância para luminosidade (L*), croma (C*), °hue, sólidos solúveis (ss) e acidez titulável (at) de cultivares de morangos inteiros, durante o armazenamento. Quadrado Médio Sólidos Acidez Fontes de Variação GL L* C* °hue solúveis titulável Armazenamento (A) 5 156,3* 118,6* 77,1* 2,4* 0,2* Cultivares (C) 3 23,5* 73,6* 0,9ns 4,0* 0,3* ns ns A×C 15 5,6 19,3* 8,7 1,1* 0,3* Resíduo 48 4,4 9,1 6,0 0,2 0,9 C.V. (%) 6,2 10,7 8,2 6,0 12,7 *Significativo; nsNão Significativo, a 5% de probabilidade pelo teste F. Braz. J. Food Technol., Campinas, v. 20, e2016149, 2017 3 http://bjft.ital.sp.gov.br Morangos produzidos no semiárido de Minas Gerais: qualidade do fruto e da polpa congelados Castricini, A. et al. redução da saturação de pigmentos da determinada cor; neste caso, da cor vermelha, tornando-se menos viva. Assim, verificou-se perda de brilho na epiderme dos frutos em tempos distintos para cada cultivar; esta resposta pode estar relacionada a maior ou menor resistência dos tecidos à mudança de cor (escurecimento), em função do frio. Entretanto, a diferença de cor entre cultivares é uma característica genética, influenciada por fatores climáticos e culturais (FLORES-CANTILLANO et al., 2008). A cultivar ‘Tudla’ apresentou maior valor de croma em relação às demais, em todos os dias de armazenamento, indicando frutos com coloração mais pigmentada, ou seja, vermelho mais “vivo” (Tabela 3). Menores valores para croma ocorreram para ‘Oso Grande’, em todos os dias de armazenamento, indicando que esta cultivar possui frutos mais opacos que as demais. Figura 1. Cor de morangos, durante o armazenamento. (A) Tonalidade; (B) Luminosidade. Tabela 2. Luminosidade da cor de morangos congelados inteiros. Cultivar Luminosidade da cor Tudla 34,07A Oso Grande 35,01A Albion 32,26B Portola 33,81A Médias seguidas de mesma letra não diferem estatisticamente pelo teste Scott-Knott a 5%. O teor de sólidos solúveis reduziu-se em todas as cultivares durante o armazenamento; entretanto, morangos ‘Tudla’ aos 180 dias não diferiram daqueles avaliados no dia zero (Tabela 3B). Andrade Júnior et al. (2016) observaram que, em média, houve diminuição dos sólidos solúveis do início ao fim do período de armazenamento (5,8 para 5,1°Brix). Entre as cultivares, Oso Grande apresentou maior teor de sólidos solúveis em todos os tempos de armazenamento e Portola, o menor teor relativo. Morangos de cultivares com maiores teores e manutenção destes, durante o armazenamento, são mais apreciados. Segundo Portela et al. (2012), o teor de sólidos solúveis é um dos atributos de Tabela 3. Croma da cor, sólidos solúveis e acidez titulável de morangos congelados inteiros, por 180 dias. A - Croma (C*) Armazenamento (dias) Tudla Oso Grande Albion 0 34,12Aa 21,31Da 29,05Ba Aa Ca 30 37,03 30,52 32,35Bb Ab Da 60 30,82 27,65 30,47Bb 90 31,18Ab 26,70Db 29,38Bb 150 26,45Ab 20,02Dc 24,79Bd Ab Dc 180 29,17 22,94 26,92Bc B - Sólidos Solúveis (°Brix) 0 8,70Ba 8,80Aa 8,80Aa Ca Ab 30 7,37 8,23 7,80Bb Cb Ab 60 6,70 7,63 7,07Bc 90 6,97Cb 7,60Ac 7,10Bc Cb Ab 150 6,70 8,13 6,87Bc Ca Ab 180 7,53 8,23 7,73Bb -1 C - Acidez titulável (g de ácido cítrico.100 g de polpa) 0 0,28Aa 0,21Ba 0,21Ba Aa Bb 30 0,25 0,23 0,22Cd 60 0,20Ab 0,19Bc 0,18Cd 90 0,28Aa 0,28Ba 0,27Cb Aa Bb 150 0,38 0,29 0,28Cc Aa Bb 180 0,28 0,27 0,24Cc Portola 27,19Ca 32,04Bb 29,06Cb 28,03Cb 24,11Cc 24,49Cc 6,10Ca 7,17Dc 6,70Dd 6,57De 6,40Dd 6,97Db 0,21Ca 0,21Dc 0,16Dd 0,26Db 0,27Dc 0,20Db Médias seguidas de mesma letra maiúscula na linha e minúscula na coluna não diferem estatisticamente pelo teste Scott-Knott a 5%. Braz. J. Food Technol., Campinas, v. 20, e2016149, 2017 4 http://bjft.ital.sp.gov.br Morangos produzidos no semiárido de Minas Gerais: qualidade do fruto e da polpa congelados Castricini, A. et al. qualidade quanto ao sabor, pois indica a quantidade de açúcares existentes no fruto. Antunes et al. (2014) também verificaram menor teor de sólidos solúveis em morangos ‘Portola’, em relação às cultivares Camino Real, Palomar, Albion, Monterey e San Andreas, em dois ciclos de produção. Cultivares e clones de morangos estudados por Brackmann et al. (2011) tiveram, em média, menor teor de sólidos solúveis que das cultivares estudadas neste trabalho. A acidez titulável de morangos das quatro cultivares foi menor no 60º dia de armazenamento (Tabela 3C). Para ‘Portola’, não houve diferença significativa entre os demais dias de armazenamento, sendo estatisticamente superior a acidez dos frutos no 60º dia. Morangos ‘Albion’ e ‘Portola’ tiveram redução na acidez em relação ao dia zero de armazenamento; a cultivar Oso Grande também reduziu a acidez durante o armazenamento, apesar de não ter havido diferença entre o dia zero e o 90º. Tendência semelhante de alterações na acidez titulável de morangos com o armazenamento foi observada por Andrade Júnior et al. (2016) e Ávila et al. (2012). Os valores de acidez verificados neste trabalho foram inferiores àqueles encontrados por Brackmann et al. (2011), em diferentes cultivares e clones de morangos, antes e depois do armazenamento refrigerado. A luminosidade da cor está apresentada na Figura 2, na qual se verificou ligeiro aumento durante os dias de armazenamento. O aumentou dos valores de L* indica que a cor está tendendo ao clareamento; assim, a polpa de morangos tornou-se mais clara com o armazenamento. Entre as cultivares (Tabela 5), Oso Grande e Portola tiveram polpa com maior luminosidade que Tudla e Albion. Cunha Junior et al. (2012) também verificaram tendência de aumento nos valores de L* em morangos submetidos à atmosfera controlada e ao armazenamento refrigerado. De acordo com Kader (2010), o valor de Luminosidade (L*) é um indicador de escurecimento ao longo do armazenamento, o qual pode ser ocasionado tanto por reações oxidativas quanto pelo aumento da concentração de pigmentos. A tonalidade da cor vermelha e as variações do croma estão apresentadas na Tabela 6A e B. Entre as cultivares, a polpa de morangos ‘Albion’ apresentou maiores valores de °hue, indicando tonalidade vermelha mais intensa, porém não tão “viva” quanto de ‘Tudla’, em todos os dias de armazenamento estudados. Inversamente, a polpa de ‘Oso Grande’ permaneceu vermelha menos intensa e opaca, em comparação às demais. Em relação Segundo Figueiredo et al. (2010), a acidez é importante atributo químico na definição da finalidade de uso das variedades de morango, visto que o desenvolvimento de cultivares de dupla aptidão é dificultado pelo fato de as exigências para uso industrial e para consumo in natura serem opostas, ou seja, maior e menor acidez, respectivamente. 3.2 Qualidade da polpa congelada Com exceção da luminosidade da cor, todas as variáveis de qualidade de polpa avaliadas sofreram efeito interativo dos fatores ‘cultivar’ e ‘dias de armazenamento’. A luminosidade variou em função dos efeitos isolados dos fatores estudados (Tabela 4). Figura 2. Luminosidade da polpa congelada de morangos, durante o armazenamento. Tabela 4. Análise de variância para luminosidade (L*), croma (C*), °hue, sólidos solúveis (ss) e acidez titulável (at) de polpa de morangos durante o armazenamento. Quadrado Médio Sólidos Acidez Fontes de Variação GL L* C* °hue solúveis titulável Armazenamento (A) 6 147,9* 55,6* 51,4* 0,4* 0,3* Cultivares (C) 3 18,3* 195,8* 37,3* 5,3* 0,8* ns A×C 18 2,9 20,9* 14,2* 0,7* 0,5* Resíduo 56 3,3 4,9 1,9 0,1 0,7 C.V. (%) 4,8 9,0 4,7 4,2 8,8 *Significativo; nsNão Significativo, a 5% de probabilidade pelo teste F. Braz. J. Food Technol., Campinas, v. 20, e2016149, 2017 5 http://bjft.ital.sp.gov.br Morangos produzidos no semiárido de Minas Gerais: qualidade do fruto e da polpa congelados Castricini, A. et al. aos dias de armazenamento, verificou-se que as polpas de ‘Tudla’ e ‘Portola’ permaneceram com tonalidade mais intensa até o 30º dia e ‘Oso Grande’ e ‘Albion’ tiveram maiores °hue somente no primeiro dia de avaliação. A polpa armazenada de morangos ‘Oso Grande’ foi aquela com maior teor de sólidos solúveis, em relação às demais cultivares, e o menor teor ocorreu em ‘Portola’ (Tabela 6C). Durante os dias de armazenamento, ocorreu redução dos teores de sólidos solúveis em todas as polpas. Em relação à acidez titulável (Tabela 6D) e a exemplo dos frutos congelados inteiros, a polpa de morangos ‘Tudla’ foi a mais ácida e a de ‘Oso Grande’ apresentou-se com menor acidez; os morangos ‘Portola’ congelados inteiros tiveram menos acidez. Segundo Figueiredo et al. (2010), a acidez revelada pelo pH de polpa são atributos físico-químicos importantes na definição da finalidade de uso das variedades. A acidez de todas as polpas, no presente trabalho, foi inferior àquela encontrada por Batista et al. (2013). Tabela 5. Luminosidade da polpa de morangos congelada. Cultivar Tudla Oso Grande Albion Portola Luminosidade da cor 35,31B 37,16A 35,89B 37,17A Médias seguidas de mesma letra não diferem estatisticamente pelo teste Scott-Knott a 5%. Tabela 6. Croma e tonalidade da cor, sólidos solúveis e acidez titulável da polpa de morangos congelada por 180 dias. A - Croma (C*) Armazenamento (dias) Tudla Oso Grande Albion Portola 0 30 60 90 120 150 180 34,12Aa 32,41Aa 24,77Ad 24,57Ad 27,11Ac 30,34Ab 25,33Ac 0 30 60 90 120 150 180 33,60 32,11Ba 28,99Bb 28,43Bb 31,59Bb 30,98Bb 29,69Bb 0 30 60 90 120 150 180 8,70Ba 7,57Bb 7,43Cb 7,57Cb 7,40Cb 7,20Cb 7,40Cb 21,31Da 20,22Db 19,93Db 18,36Cb 19,98Db 18,79Db 20,98Db 29,05Ba 27,93Bb 22,36Be 22,58Bd 25,90Bc 28,70Bb 25,12Bd 27,19Ca 23,90Cb 22,15Ce 22,50Be 22,26Cd 25,46Cc 24,49Ce 34,83Aa 32,59Ab 29,15Ad 29,42Ad 31,76Ac 32,80Ae 30,54Ad 32,36Ca 31,35Ca 27,77Cd 27,62Cc 29,76Cb 28,87Ce 29,65Cc 8,80Aa 7,60Bb 7,58Bc 7,63Bb 7,93Bb 7,60Bb 7,50Bc 6,10Ca 7,50Cc 7,25De 7,30Db 7,13Dd 7,17Db 7,30Dd B - Tonalidade da Cor (°Hue) 30,21Da 27,91Db 22,56Dd 22,81Dc 27,93Db 27,47Dd 25,32Dc Ba C - Sólidos solúveis (°Brix) 8,80Aa 8,37Ac 8,40Ad 8,43Ac 8,47Ac 8,07Ab 8,20Ad D - Acidez titulável (g de ácido cítrico.100 g-1 de polpa) 0 30 60 90 120 150 180 0,28Ac 0,40Aa 0,34Ac 0,32Ac 0,32Ab 0,40Aa 0,43Aa 0,21Bb 0,29Cb 0,24Dc 0,26Db 0,27Db 0,26Ca 0,34Da 0,21Bd 0,31Bc 0,26Ce 0,27Cd 0,29Cc 0,36Bb 0,37Ca 0,21Bc 0,31Bb 0,28Be 0,28Bd 0,30Bb 0,40Aa 0,39Ba Médias seguidas de mesma letra maiúscula na linha e minúscula na coluna não diferem estatisticamente pelo teste Scott-Knott a 5%. Braz. J. Food Technol., Campinas, v. 20, e2016149, 2017 6 http://bjft.ital.sp.gov.br Morangos produzidos no semiárido de Minas Gerais: qualidade do fruto e da polpa congelados Castricini, A. et al. 4 Conclusões Morangos inteiros congelados por 180 dias apresentaram escurecimento da epiderme e redução do teor de sólidos solúveis. A polpa de morangos tornou-se mais clara com o armazenamento, sendo ‘Oso Grande’ e ‘Portola’, as mais claras. A cultivar Oso Grande tem maior teor de sólidos solúveis e Portola, menor teor, armazenados inteiros ou em polpa. A polpa e os frutos armazenados de ‘Tudla’ são mais ácidos. Morangos ‘Portola’ congelados inteiros são menos ácidos, assim como ‘Oso Grande’ em polpa. Durante o armazenamento de morangos congelados inteiros ou em polpa, produzidos no Semiárido de Minas Gerais, ocorreram modificações nos parâmetros cor, sólidos solúveis e acidez titulável. Agradecimentos Ao Banco do Nordeste pelo financiamento do projeto de pesquisa. À FAPEMIG pelas Bolsas de Incentivo à Pesquisa. Referências ANDRADE JÚNIOR, V. C.; GUIMARÃES, A. G.; AZEVEDO, A. M.; PINTO, N. A. V. D. FERREIRA, M. A. M. Conservação pós-colheita de frutos de morangueiro em diferentes condições de armazenamento. Horticultura Brasileira, v. 34, n. 3, p. 405-4112016. ANTUNES, M. C.; CUQUEL, F. L.; ZAWADNEAK, M. A. C.; MOGOR, A. F.; RESENDE, J. T. V. Postharvest quality of strawberry produced during two consecutive seasons. Horticultura Brasileira, v. 32, n. 2, p. 168-173, 2014. ÁVILA, J. M. M.; TORALLES, R. P.; CANTILLANO, R. F. F.; PERALBA, M. C. R.; PIZZOLATO, T. M. Influência do sistema de produção e do armazenamento refrigerado nas características físico-químicas e no desenvolvimento de compostos voláteis em morangos. Ciência Rural, v. 42, n. 12, p. 2265-2271, 2012. BATISTA, A. G.; OLIVEIRA, B. D’Á.; OLIVEIRA, M. A.; GUEDES, T. J.; SILVA, D. F.; PINTO, N. A. V. D. Parâmetros de qualidade de polpas de frutas congeladas: uma abordagem para produção do agronegócio familiar no Alto Vale do Jequitinhonha. Revista Tecnologia & Ciência Agropecuária, v. 7, n. 4, p. 49-54, 2013. BAUER, E. J. Pharmaceutical packaging handbook. New York: Informa Healthcare; 2009. 585 p. BORGES, C. D.; MENDONÇA, C. R. B.; ZAMBIAZI, R. C.; NOGUEIRA, D.; PINTO, E. M.; PAIVA, F. F. Conservação de morangos com revestimentos à base de goma xantana e óleo Braz. J. Food Technol., Campinas, v. 20, e2016149, 2017 essencial de sálvia. Bioscience Journal, v. 29, n. 5, p. 10711083, 2013. BRACKMANN, A.; PAVANELLO, E. P.; BOTH, V.; JANISCH, D. I.; SCHMITT, O. J.; GIMÉNEZ, G. Avaliação de genótipos de morangueiro quanto à qualidade e potencial de armazenamento. Revista Ceres, v. 58, n. 5, p. 542-547, 2011. BRASIL. Ministério da Agricultura do Abastecimento. Instrução Normativa nº 01/00, de 07/01/00. Regulamento técnico geral para fixação dos padrões de identidade e qualidade para polpa de fruta. Diário Oficial [da] República Federativa do Brasil, Brasília, DF, 2000. p. 54-58. BRASIL. Ministério da Agricultura do Abastecimento. Regulamento Técnico para fixação dos padrões de identidade e qualidade para polpa de morango. Diário Oficial [da] República Federativa do Brasil, Brasília, DF, 2016. p. 6. Disponível em: <http://www. agricultura.gov.br/acesso-a-informacao/participacao-social/ consultas-publicas/documentos/01_09-secao-1-portaria-86. pdf>. Acesso em: 18 jul. 2017. CUNHA JUNIOR, L. C.; JACOMINO, A. P.; OGASSAVARA, F. O.; TREVISAN, M. J.PARISI, M. C. M. Armazenamento refrigerado de morango submetido a altas concentrações de CO2. Horticultura Brasileira, v. 30, n. 4, p. 688-694, 2012. DIAS, M. S. C.; REIS, J. B. R. S.; JESUS, A. M. Morango no semiárido. Informe Agropecuário - morango: tecnologias de produção ambientalmente corretas, v. 35, n. 279, p. 92-98, 2014. FIGUEIREDO, F. C.; BOTREL, P. P.; TEIXEIRA, C. P.; PETRAZZINI, L. L.; LOCARNO, M.; CARVALHO, J. G. Pulverização foliar e fertirrigação com silício nos atributos físico-químicos de qualidade e índices de coloração do morango. Ciência e Agrotecnologia, v. 34, n. 5, p. 1306-1311, 2010. FLORES-CANTILLANO, R. F. F.; CASTAÑEDA, L. M. F.; TREPTOW, R. O.; SCHUNEMANN, A. P. P. Qualidade físico-química e sensorial de cultivares de morango durante o armazenamento refrigerado. Embrapa Clima TemperadoBoletim de Pesquisa e Desenvolvimento, v. 75, p. 1-31, 2008. INSTITUTO ADOLFO LUTZ - IAL. Métodos químicos e físicos de análise de alimentos. 3. ed. São Paulo: IAL, 1987. KADER, A. A. Future of modified atmosphere research. Acta Horticulturae, n. 857, p. 212-217, 2010. PORTELA, I. P.; PEIL, R. N.; RODRIGUES, S.; CARINI, F. Densidade de plantio, crescimento, produtividade e qualidade das frutas de morangueiro “Camino Real” em hidroponia. Revista Brasileira de Fruticultura, v. 34, n. 3, p. 792-798, 2012. SAEG. Sistema para análises estatísticas. versão 9. Viçosa: Fundação Arthur Bernardes, 2007. 7
https://openalex.org/W4284678262
https://orca.cardiff.ac.uk/id/eprint/155932/1/engproc-19-00001%20%281%29.pdf
English
null
TLBO Tuned a Novel Robust Fuzzy Control Structure for LFC of a Hybrid Power System with Photovoltaic Source
null
2,022
cc-by
6,447
Citation: Shouran, M.; Anayi, F. TLBO Tuned a Novel Robust Fuzzy Control Structure for LFC of a Hybrid Power System with Photovoltaic Source. Eng. Proc. 2022, 19, 1. https://doi.org/10.3390/ ECP2022-12684 Citation: Shouran, M.; Anayi, F. TLBO Tuned a Novel Robust Fuzzy Control Structure for LFC of a Hybrid Power System with Photovoltaic Source. Eng. Proc. 2022, 19, 1. https://doi.org/10.3390/ ECP2022-12684 Proceeding Paper TLBO Tuned a Novel Robust Fuzzy Control Structure for LFC of a Hybrid Power System with Photovoltaic Source † Mokhtar Shouran 1,2,* and Fatih Anayi 1 Mokhtar Shouran 1,2,* and Fatih Anayi 1 1 Wolfson Centre for Magnetics, School of Engineering, Cardiff University, Cardiff CF24 3AA, UK; anayi@cardiff.ac.uk 1 Wolfson Centre for Magnetics, School of Engineering, Cardiff University, Cardiff CF24 3AA, UK; anayi@cardiff.ac.uk 2 Department of Control Engineering, College of Electronics Technology, Bani Walid 90045, Libya * Correspondence: shouranma@cardiff.ac.uk; Tel.: +44-7424491429 † Presented at the 1st International Electronic Conference on Processes: Processes System Innovation, 17–31 May 2022; Available online: https://ecp2022.sciforum.net. 2 Department of Control Engineering, College of Electronics Technology, Bani Walid 90045, Libya * Correspondence: shouranma@cardiff.ac.uk; Tel.: +44-7424491429 † Presented at the 1st International Electronic Conference on Processes: Processes System Innovation, 17–31 May 2022; Available online: https://ecp2022.sciforum.net. Correspondence: shouranma@cardiff.ac.uk; Tel.: +44 7424491429 † Presented at the 1st International Electronic Conference on Processes: Processes System Innovation, 17–31 May 2022; Available online: https://ecp2022.sciforum.net. † Presented at the 1st International Electronic Conference on Processes: Processes System Innova 17–31 May 2022; Available online: https://ecp2022.sciforum.net. Abstract: This study proposes a new fuzzy logic control (FLC) design-based I controller plus a Fuzzy Cascade FOPI-FOPD (I + F C FOPI-FOPD) for load frequency control (LFC) in power systems. The structure of this design offers a satisfactory level of reliability as well as excellent robustness performance. The proposed fuzzy design is employed in a hybrid dual area power system based on a photovoltaic renewable energy plant in area one and a thermal generation unit in area two. In order to achieve the best possible dynamic performance of the proposed structure, the teaching learning-based optimization (TLBO) algorithm is suggested to optimally tune the scaling factor gains of the proposed fuzzy configuration. The superiority of the suggested fuzzy control design is investigated by conducting a comparative study between this design and a previously applied PI-based firefly algorithm. Simulation results revealed that the fuzzy logic controller introduced in this study is reliable and superior, and appropriately handled the problem of frequency variation. Keywords: fuzzy logic control (FLC); load frequency control (LFC); dual area power system; teaching learning-based optimization (TLBO) 1. Introduction Modern power systems are becoming more reliant on renewable energy resources (RERs). The dependence on RERs is mainly due to the continuous increments in the prices of fossil fuels in addition to avoiding the emission of greenhouses gases and its obvious link to the global warming dilemma. Moreover, the fact of the increasing power demand in today’s world means there is a requirement for a huge number of different generating units to interconnect through existing transmission lines called tie-lines to meet the increasing power consumption; this also leads to the adoption of hybrid power systems where electrical networks rely on RERs along with the traditional power resources. The RERs used in interconnected power systems may be photovoltaic (PV), wind turbine (WT), energy storage system, fuel cell (FC) with electrolyser and battery. Solar and wind energy resources have been considered the most commonly used in power systems among the various RERs. However, many modern power systems remain reliant on thermal generation to meet the demands of end users. This gives an obvious idea of the vital role that thermal units play in power systems in addition to the continued increase in RERs reliance [1]. Published: 7 June 2022 Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affil- iations. Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affil- iations. g its play in power systems in addition to the continued increase in RERs reliance [1]. Copyright: © 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). From a control engineering point of view, ensuring the stable and reliable operation of modern power systems is one of the most challenging processes. This is due to the continuous increase in their size, which in turn leads to more complexity in addition to having to consider the external/internal disturbances that power systems unpredictably experience. p Furthermore, load demand in most power systems is continually changing and this change leads to consequences of a deviation in frequency and tie-line power flow and, in https://www.mdpi.com/journal/engproc Eng. Proc. 2022, 19, 1. https://doi.org/10.3390/ECP2022-12684 Eng. Proc. 2022, 19, 1 2 of 7 turn, requires a similar change in the generation side. 1. Introduction Accordingly, the mismatch between the demanded power and the generated power is the reason for the frequency and tie-line power deviations throughout the whole power system. Importantly, in stable, secure and reliable power systems, the frequency and tie-line power flow are maintained in their pre- specified limits in normal operating conditions as well as in case of a sudden disturbance occurrence, which is achieved by balancing the active power output of the generated power and the requested demand plus the possible losses. This control mechanism is called load frequency control (LFC). As a result of installing this loop-LFC in power systems, frequency and tie-line power deviations are guaranteed to be always zero or within acceptable limits. Based on this, an improper LFC system design may undermine the overall behaviour of the controlled system causing undesired fluctuations in frequency and tie-line flow, which in turn may lead to system instability [2]. Due to the above-mentioned issues, incorporating LFC in power systems based on different generating sources has become the most significant research area to focus on. To overcome this issue, many researchers presented different approaches to simulate LFC integrated into different power systems. Traditional control techniques, robust control methods, sliding mode control and artificial controllers have been applied in this field. In [3], a PI controller-based firefly optimization algorithm was designed and implemented for LFC in a dual area interconnected power system incorporating a PV system. A PI controller tuned by the Harris Hawks optimizer-based LFC in two different power systems with RERs was successfully implemented to regulate the frequency in the case of sudden load disturbance [4]. A movable damped wave algorithm tuned Fractional Order (FO) PID was equipped as an LFC system in two and four area interconnected power systems with PV and WT plants, and the FOPID-based proposed algorithm outperformed the same controller tuned by other optimization techniques [5]. Another application of a FOPID in LFC for power systems with RERs was suggested in [6]; in this study, a modified hunger games search optimizer was proposed to find the optimal values of the FOPID’s gains. An adaptive PI-based LFC system installed in two different dual area power systems was proposed in [7]; the suggested controller evidenced its superiority over the traditional PI. LFC-based sliding mode control (SMC) was proposed in [8] for a hybrid power system incorporating WT and energy storage systems. 1. Introduction A new SMC based on the disturbance observer was suggested in [9] for LFC in a hybrid power system considering the presence of WT, system parametric uncertainty and non-linear restraints. A linear matrix inequality- based particle swarm (PSO) optimization algorithm was proposed in [10] to stabilize the frequency in a power system with different energy resources. A model predictive control approach was also proposed for frequency stabilization in a hybrid power system consisting of different plants including WT [11]. Notably, in recent years, LFC-based fuzzy logic control has received considerable attention. This is due to the wide range of merits offered by this controller. Furthermore, soft computing techniques have been exploited to achieve the best possible dynamic performance of FLC. Fuzzy PID with a filtered derivative action optimized by the Bees algorithm has been successfully implemented as an LFC system in a simplified form of the Great Britain power system [12]. Different fuzzy structures were proposed in [13] to damp the frequency/tie-line power variations in a two-area power system. In this study, the proposed fuzzy PI plus Fuzzy PD illustrated a slight supremacy over the other investigated configurations. A fuzzy cascade FOPI-FOPD-based PSO for LFC purposes in a multi- area electrical system was studied in [14]. Another application of FLC-based frequency regulation was investigated in [15]; in this study the proposed controller was installed in a two-area multi-source power system with a PV unit, WT and redox flow battery, and successfully damped the frequency deviation under various operating conditions. In [16], an adaptive fuzzy FOPID was implemented for LFC in the renewable penetrated electrical power network. Notwithstanding the fact that the above-mentioned techniques have different merits and successfully solved the problem of frequency deviation to a great extent, it is note- Eng. Proc. 2022, 19, 1 3 of 7 merits worthy to mention the limitation of installing these techniques in power systems. For example, the traditional controllers are known not to provide the required response when the controlled system undergoes possible operating conditions of non-linearities or high sensitivity. However, the low cost is the main advantage of classical controllers. In terms of other controllers such as adaptive control and SMC, although they offer an effective performance as LFC systems, the complexity in their design and high computational time and burden are known as the most common limitations. 2. Power System under Study 2. Power System under Study In this study, a two-area interconnected power system is considered to demonstrate the effectiveness of the proposed fuzzy controller for LFC purposes. In this study, a two-area interconnected power system is considered to demonstrate the effectiveness of the proposed fuzzy controller for LFC purposes. As shown in Figure 1, this system consists of a PV plant equipped in area one and a thermal unit installed in area two. This system has extensively been used in the literature [3,7]. The values of the parameters of the investigated system are as follows As shown in Figure 1, this system consists of a PV plant equipped in area one and a thermal unit installed in area two. This system has extensively been used in the literature [3,7]. The values of the parameters of the investigated system are as follows C1 = −18, C2= 900, C3= 100, C4= 50 Tg= 0.08, Tt= 0.18, Kr= 3.3, Tr= 10, Kp= 120, Tp= 20 and T = 0.545. , C2 900, C3 100, C4 50 Tt = 0.18, Kr = 3.3, Tr = 10, Kp = 120, Tp = 20 and T = 0.545. 1 , 2 , 3 , 4 Tg= 0.08, Tt= 0.18, Kr= 3.3, Tr= 10, Kp= 120, Tp= 20 and T = 0.545. Tg= 0.08, Tt = 0.18, Kr = 3.3, Tr = 10, Kp = 120, Tp = 20 and T = 0.545. Figure 1. The testbed dual area power system. Figure 1. The testbed dual area power system. Figure 1. The testbed dual area power system. Figure 1. The testbed dual area power system. 1. Introduction Furthermore, some useful studies have proposed and applied different structures of fuzzy control for frequency regulation; however, most of these techniques lack the consideration of reliability in the design. worthy to mention the limitation of installing these techniques in power systems. For ex- ample, the traditional controllers are known not to provide the required response when the controlled system undergoes possible operating conditions of non-linearities or high sensitivity. However, the low cost is the main advantage of classical controllers. In terms of other controllers such as adaptive control and SMC, although they offer an effective performance as LFC systems, the complexity in their design and high computational time and burden are known as the most common limitations. Furthermore, some useful studies have proposed and applied different structures of fuzzy control for frequency regulation; however, most of these techniques lack the consideration of reliability in the design. Therefore the authors of this paper propose a no el FLC configuration that guaran Therefore, the authors of this paper propose a novel FLC configuration that guaran- tees a high level of reliability for LFC in a dual area power system incorporating a PV unit. The suggested technique is an I controller plus Fuzzy Cascade FOPI-FOPD (I + F C FOPI-FOPD). Moreover, to obtain the best performance from the suggested controller, a well-known/powerful optimization tool called the teaching learning-based optimization algorithm is used in this work to optimally set the parameters of the proposed I + F C FOPI- FOPD. Furthermore, the strong performance of this controller is evidenced by comparing the results with those based on the PI optimized by the firefly algorithm studied in [3]. Therefore, the authors of this paper propose a novel FLC configuration that guaran- tees a high level of reliability for LFC in a dual area power system incorporating a PV unit. The suggested technique is an I controller plus Fuzzy Cascade FOPI-FOPD (I + F C FOPI- FOPD). Moreover, to obtain the best performance from the suggested controller, a well- known/powerful optimization tool called the teaching learning-based optimization algo- rithm is used in this work to optimally set the parameters of the proposed I + F C FOPI- FOPD. Furthermore, the strong performance of this controller is evidenced by comparing the results with those based on the PI optimized by the firefly algorithm studied in [3]. 3.1. I Controller Plus Cascade Fuzzy FOPI-FOPD 3.1. I Controller Plus Cascade Fuzzy FOPI-FOPD q 1 I C ll Pl C d F FOPI FOPD 3.1. I Controller Plus Cascade Fuzzy FOPI-FOPD 3.1. I Controller Plus Cascade Fuzzy FOPI-FOPD q I ll l d O I O Figure 2 demonstrates the structural diagram of the proposed controller. This con- troller comprises two parts; a fuzzy cascade FOPI-FOPID enhanced with a classical I controller. As is obvious, the fuzzy part has two inputs: “the Area Control Error (ACE) and change of ACE” in addition to one output. The output signal of the fuzzy controller is connected with the input of the FOPI. However, the input signal of the latter controller “FOPD” is the output signal of the FOPI in addition to the ACE signal. Finally, the output signal of FOPD is added to the output of the classical I, which in total represent the control signal of the proposed controller. The rule bases of the fuzzy controller are given in Table 1, while the membership function of the inputs and the output are illustrated in Figure 3. Figure 2 demonstrates the structural diagram of the proposed controller. This con- troller comprises two parts; a fuzzy cascade FOPI-FOPID enhanced with a classical I con- troller. As is obvious, the fuzzy part has two inputs: “the Area Control Error (ACE) and change of ACE” in addition to one output. The output signal of the fuzzy controller is connected with the input of the FOPI. However, the input signal of the latter controller “FOPD” is the output signal of the FOPI in addition to the ACE signal. Finally, the output signal of FOPD is added to the output of the classical I, which in total represent the control signal of the proposed controller. The rule bases of the fuzzy controller are given in Table 1, while the membership function of the inputs and the output are illustrated in Figure 3. 3.1. I Controller Plus Cascade Fuzzy FOPI-FOPD Figure 2 demonstrates the structural diagram of the proposed controller. This controller comprises two parts; a fuzzy cascade FOPI-FOPID enhanced with a classical I controller. As is obvious, the fuzzy part has two inputs: “the Area Control Error (ACE) and change of ACE” in addition to one output. The output signal of the fuzzy controller is connected with the input of the FOPI. However, the input signal of the latter controller “FOPD” is the output signal of the FOPI in addition to the ACE signal. 3.1. I Controller Plus Cascade Fuzzy FOPI-FOPD 3.1. I Controller Plus Cascade Fuzzy FOPI-FOPD q 1 I C ll Pl C d F FOPI FOPD The diagram of the proposed I plus fuzzy cascade FOPI-FOPD. Figure 2. The diagram of the proposed I plus fuzzy cascade FOPI-FOPD. Table 1. Fuzzy role bases. ACE 1 ACE 1 ሶ NB NS Z PS PB NB NB NB NB NS Z NS NB NB NS Z PS Z NB NS Z PS PB PS NS Z PS PB PB PB Z PS PB PB PB Figure 3. Membership functions of inputs/output. 3.2. The Optimisation Tool-TLBO and the Objective Function In order to enhance the performance of the proposed LFC system, the values of its parameters are found by employing the TLBO by minimizing the Integral Time Absolut Table 1. Fuzzy role bases. ACE 1 ACE 1 NB NS Z PS PB NB NB NB NB NS Z NS NB NB NS Z PS Z NB NS Z PS PB PS NS Z PS PB PB PB Z PS PB PB PB Table 1. Fuzzy role bases. ACE 1 ACE 1 ̇ NB NS Z PS PB NB NB NB NB NS Z NS NB NB NS Z PS Z NB NS Z PS PB PS NS Z PS PB PB PB Z PS PB PB PB Figure 3. Membership functions of inputs/output. 3.2. The Optimisation Tool-TLBO and the Objective Function In order to enhance the performance of the proposed LFC system, the values of its Figure 3. Membership functions of inputs/output. 3.2. The Optimisation Tool-TLBO and the Objective Function In order to enhance the performance of the proposed LFC system, the values of its ACE 1 ACE 1 ሶ NB NS Z PS PB NB NB NB NB NS Z NS NB NB NS Z PS Z NB NS Z PS PB PS NS Z PS PB PB PB Z PS PB PB PB ACE 1 ACE 1 NB NS Z PS PB NB NB NB NB NS Z NS NB NB NS Z PS Z NB NS Z PS PB PS NS Z PS PB PB PB Z PS PB PB PB Table 1. Fuzzy role bases. ACE 1 ACE 1 ̇ NB NS Z PS PB NB NB NB NB NS Z NS NB NB NS Z PS Z NB NS Z PS PB PS NS Z PS PB PB PB Z PS PB PB PB Figure 3. Membership functions of inputs/output. 3.2. The Optimisation Tool-TLBO and the Objectiv Figure 3. Membership functions of inputs/output. 3. The Proposed LFC System As above-mentioned, this study develops and implements a new fuzzy configuration in order to achieve the required level of reliability. Eng. Proc. 2022, 19, 1 4 of 7 ration 3.1. I Controller Plus Cascade Fuzzy FOPI-FOPD 3.1. I Controller Plus Cascade Fuzzy FOPI-FOPD q 1 I C ll Pl C d F FOPI FOPD Finally, the output signal of FOPD is added to the output of the classical I, which in total represent the control signal of the proposed controller. The rule bases of the fuzzy controller are given in Table Figure 2. The diagram of the proposed I plus fuzzy cascade FOPI-FOPD. T bl 1 F l b Figure 2. The diagram of the proposed I plus fuzzy cascade FOPI-FOPD. T bl 1 F l b 1, while the membership function of the inputs and the output are illustrated in Figur Figure 2. The diagram of the proposed I plus fuzzy cascade FOPI-FOPD. Figure 2. The diagram of the proposed I plus fuzzy cascade FOPI-FOPD. Table 1. Fuzzy role bases. ACE 1 ACE 1 ሶ NB NS Z PS PB NB NB NB NB NS Z NS NB NB NS Z PS Z NB NS Z PS PB PS NS Z PS PB PB PB Z PS PB PB PB Figure 3. Membership functions of inputs/output. 3.2. The Optimisation Tool-TLBO and the Objective Function In order to enhance the performance of the proposed LFC system, the values of its parameters are found by employing the TLBO by minimizing the Integral Time Absolut Figure 2. The diagram of the proposed I plus fuzzy cascade FOPI-FOPD. Table 1. Fuzzy role bases. ACE 1 ACE 1 NB NS Z PS PB NB NB NB NB NS Z NS NB NB NS Z PS Z NB NS Z PS PB PS NS Z PS PB PB PB Z PS PB PB PB Figure 2. The diagram of the proposed I plus fuzzy cascade FOPI-FOPD. Table 1. Fuzzy role bases. ACE 1 ACE 1 ̇ NB NS Z PS PB NB NB NB NB NS Z NS NB NB NS Z PS Z NB NS Z PS PB PS NS Z PS PB PB PB Z PS PB PB PB Figure 3. Membership functions of inputs/output. 3.2. The Optimisation Tool-TLBO and the Objective Function In order to enhance the performance of the proposed LFC system, the values of its parameters are found by employing the TLBO by minimizing the Integral Time Absolut Figure 3. Membership functions of inputs/output. 3.2. The Optimisation Tool-TLBO and the Objective Function In order to enhance the performance of the proposed LFC system, the values of its parameters are found by employing the TLBO by minimizing the Integral Time Absolut Figure 2. 4. Results and Discussion 4. Results and Discussion 4. Results and Discussion The proposed controller is equipped in the system, with a controller in each area; then a load disturbance of 0.1 pu is applied in area two. The optimal values of the controller obtained by TLBO are given in Table 2. The frequency deviation in areas one and two and the tie-line power fluctuation are given in Figures 4–6, respectively, in addition to Table 3. Additionally, these figures provide a comparison between the results obtained via the proposed fuzzy controller and the results from the PI tuned by FA. Figures 4–6 and Table 3 reveal the effectiveness and superiority of the proposed fuzzy controller. This controller successfully met the requirements of LFC systems and provided excellent responses in all aspects. The proposed controller is equipped in the system, with a controller in each area; then a load disturbance of 0.1 pu is applied in area two. The optimal values of the control- ler obtained by TLBO are given in Table 2. The frequency deviation in areas one and two and the tie-line power fluctuation are given in Figures 4–6, respectively, in addition to Table 3. Additionally, these figures provide a comparison between the results obtained via the proposed fuzzy controller and the results from the PI tuned by FA. Figures 4–6 and Table 3 reveal the effectiveness and superiority of the proposed fuzzy controller. This controller successfully met the requirements of LFC systems and provided excellent re- sponses in all aspects. 4. Results and Discussion The proposed controller is equipped in the system, with a controller in each area; then a load disturbance of 0.1 pu is applied in area two. The optimal values of the control- ler obtained by TLBO are given in Table 2. The frequency deviation in areas one and two and the tie-line power fluctuation are given in Figures 4–6, respectively, in addition to Table 3. Additionally, these figures provide a comparison between the results obtained via the proposed fuzzy controller and the results from the PI tuned by FA. Figures 4–6 and Table 3 reveal the effectiveness and superiority of the proposed fuzzy controller. This controller successfully met the requirements of LFC systems and provided excellent re- sponses in all aspects Figure 4. Frequency drop in area one. Figure 5. Frequency drop in area two. 3.1. I Controller Plus Cascade Fuzzy FOPI-FOPD 3.1. I Controller Plus Cascade Fuzzy FOPI-FOPD q 1 I C ll Pl C d F FOPI FOPD dt t 0 (1) (1) (1) 3.1. I Controller Plus Cascade Fuzzy FOPI-FOPD 3.1. I Controller Plus Cascade Fuzzy FOPI-FOPD q 1 I C ll Pl C d F FOPI FOPD Figure 3. Membership functions of inputs/output. p j In order to enhance the performance of the proposed 3.2. The Optimisation Tool-TLBO and the Objective Function 3.2. The Optimisation Tool-TLBO and the Objective Function p j In order to enhance the performance of the propose 3.2. The Optimisation Tool-TLBO and the Objective Function 3.2. The Optimisation Tool-TLBO and the Objective Function p p p y parameters are found by employing the TLBO by minimizing the Integral Time Absolut p j In order to enhance the performance of the proposed LFC system, the values of its parameters are found by employing the TLBO by minimizing the Integral Time Absolut In order to enhance the performance of the proposed LFC system, the values of its parameters are found by employing the TLBO by minimizing the Integral Time Absolut p p p y parameters are found by employing the TLBO by minimizing the Integral Time Absolut p j In order to enhance the performance of the proposed LFC system, the values of its parameters are found by employing the TLBO by minimizing the Integral Time Absolut In order to enhance the performance of the proposed LFC system, the values of its parameters are found by employing the TLBO by minimizing the Integral Time Absolut Eng. Proc. 2022, 19, 1 5 of 7 Error (ITAE) of the frequency deviation in both areas and the tie-line power fluctuation (see Equation (1)). The mechanism and the variants of the suggested TLBO are given in [17]. (see Equation (1)). The mechanism and the variants of the suggested TLBO are given in [17]. Error (ITAE) of the frequency deviation in both areas and the tie line power fluctuation (see Equation (1)). The mechanism and the variants of the suggested TLBO are given in [17]. Error (ITAE) of the frequency deviation in both areas and the tie-line power fluctuation (see Equation (1)). The mechanism and the variants of the suggested TLBO are given in [17]. (see Equation (1)). The mechanism and the variants of the suggested TLBO are given in [17]. ( ) q y p (see Equation (1)). The mechanism and the variants of the suggested TLBO are given in [17]. Objective Function = ITAE = Z t 0 (|∆F1| + |∆F2| + |∆Ptie|).t. dt Objective Function = ITAE = නሺ|∆F1| + |∆F2| + |∆Ptie|ሻ.t. dt 0 Objective Function = ITAE = නሺ|∆F1| + |∆F2| + |∆Ptie|ሻ.t. 4. Results and Discussion 4. Results and Discussion 4. Results and Discussion Tie-line power deviation. Table 2. The optimum values of the I plus fuzzy C FOPI-FOPD. Table 2. The optimum values of the I plus fuzzy C FOPI-FOPD. Table 2. The optimum values of the I plus fuzzy C FOPI-FOPD. Table 2. The optimum values of the I plus fuzzy C FOPI-FOPD. Table 2. The optimum values of the I plus fuzzy C FOPI FOPD. Controller Parameters Area one controller K1 K2 K3 KP11 KI1 λ1 KP12 KD1 µ1 0.284 0.7304 −1.9193 0.5200 0.4816 0.6971 −1.6179 0.7885 0.1499 Area two controller K4 K5 K6 KP21 KI2 λ2 KP22 KD2 µ2 −1.28 −0.1798 −2 −2 0.0409 0.1631 −1.6188 0.0142 0.2625 Table 3. The dynamic response of the system with the proposed controller. Controller Parameters Area one controller K1 K2 K3 KP11 KI1 λ1 KP12 KD1 µ1 0.284 0.7304 −1.9193 0.5200 0.4816 0.6971 −1.6179 0.7885 0.1499 Area two controller K4 K5 K6 KP21 KI2 λ2 KP22 KD2 µ2 −1.28 −0.1798 −2 −2 0.0409 0.1631 −1.6188 0.0142 0.2625 Table 3. The dynamic response of the system with the proposed controller. Table 3. The dynamic response of the system with the proposed controller. Table 3. The dynamic response of the system with the proposed controller. Controller Frequency in Area One Frequency in Area Two Tie-line Power Deviation ITAE Ushin pu Oshin pu Ts in s Ushin pu Oshin pu Ts in s Ushin pu Oshin pu Ts in s I + F C FOPI- FOPD −0.0835 0 5.697 −0.0751 0 5.9810 −0.0015 0.0052 3.3810 0.267 PI—FA −0.281 0.106 12.283 −0.210 0.0908 13.1132 −0.0382 0.0427 9.9657 4.192 Controller Frequency in Area One Frequency in Area Two Tie-line Power Deviation ITAE Ushin pu Oshin pu Ts in s Ushin pu Oshin pu Ts in s Ushin pu Oshin pu Ts in s I + F C FOPI-FOPD −0.0835 0 5.697 −0.0751 0 5.9810 −0.0015 0.0052 3.3810 0.267 PI—FA −0.281 0.106 12.283 −0.210 0.0908 13.1132 −0.0382 0.0427 9.9657 4.192 4. Results and Discussion 4. Results and Discussion 4. Results and Discussion This controller significantly damped the fre- quency deviation in both areas and also outperformed the previously proposed PI con- troller-based FA. Author Contributions: Both authors have contributed the same in producing this work. All authors have read and agreed to the published version of the manuscript. Funding: This research received no external funding. 0 5 10 15 20 25 30 35 Time (seconds) -0.04 -0.02 0 0.02 0.04 0.06 Tie line power deviation (pu) I + Fuzzy C FOPI-FOPD - TLBO PI - FA Figure 6. Tie-line power deviation. Table 2. The optimum values of the I plus fuzzy C FOPI-FOPD. Controller Parameters Area one controller K1 K2 K3 KP11 KI1 λ1 KP12 KD1 µ1 0.284 0.7304 −1.9193 0.5200 0.4816 0.6971 −1.6179 0.7885 0.1499 Area two controller K4 K5 K6 KP21 KI2 λ2 KP22 KD2 µ2 −1.28 −0.1798 −2 −2 0.0409 0.1631 −1.6188 0.0142 0.2625 Table 3. The dynamic response of the system with the proposed controller. Controller Frequency in Area One Frequency in Area Two Tie-line Power Deviation ITAE Ushin pu Oshin pu Ts in s Ushin pu Oshin pu Ts in s Ushin pu Oshin pu Ts in s I + F C FOPI-FOPD −0.0835 0 5.697 −0.0751 0 5.9810 −0.0015 0.0052 3.3810 0.267 PI—FA −0.281 0.106 12.283 −0.210 0.0908 13.1132 −0.0382 0.0427 9.9657 4.192 5. Conclusions Concisely, this paper developed and implemented a virgin fuzzy control structure named I plus fuzzy cascade FOPI-FOPD employed as an LFC system in a dual area power system incorporating a PV unit in area one. This controller significantly damped the frequency deviation in both areas and also outperformed the previously proposed PI controller-based FA. Author Contributions: Both authors have contributed the same in producing this work. All authors have read and agreed to the published version of the manuscript. F di Thi h i d t l f di Figure 6. Tie-line power deviation. 0 5 10 15 20 25 30 35 Time (seconds) -0.04 -0.02 0 0.02 0.04 0.06 Tie line power deviation (pu) I + Fuzzy C FOPI-FOPD - TLBO PI - FA Figure 6. Tie-line power deviation. Table 2 The optimum values of the I plus fuzzy C FOPI FOPD 0 5 10 15 20 25 30 35 Time (seconds) -0.04 -0.02 0 0.02 0.04 0.06 Tie line power deviation (pu) I + Fuzzy C FOPI-FOPD - TLBO PI - FA Figure 6. Tie-line power deviation. Figure 6. 4. Results and Discussion 4. Results and Discussion 4. Results and Discussion 0 5 10 15 20 25 30 35 Time (seconds) -0.3 -0.2 -0.1 0 0.1 0.2 Frequency devaition (pu) I + Fuzzy C FOPI-FOPD - TLBO PI - FA Figure 4. Frequency drop in area one. Figure 4. Frequency drop in area one. Figure 5. Frequency drop in area two. 0 5 10 15 20 25 30 35 Time (seconds) -0.3 -0.2 -0.1 0 0.1 0.2 Frequency devaition (pu) I + Fuzzy C FOPI-FOPD - TLBO PI - FA Figure 5. Frequency drop in area two. 0 5 10 15 20 25 30 35 Time (seconds) -0.3 -0.2 -0.1 0 0.1 0.2 Frequency devaition (pu) I + Fuzzy C FOPI-FOPD - TLBO PI - FA 0 5 10 15 20 25 30 35 Time (seconds) -0.3 -0.2 -0.1 0 0.1 0.2 Frequency devaition (pu) I + Fuzzy C FOPI-FOPD - TLBO PI - FA Figure 4. Frequency drop in area one. Figure 4. Frequency drop in area one. Figure 4. Frequency drop in area one. Figure 4. Frequency drop in area one. Figure 4. Frequency drop in area one. Figure 4. Frequency drop in area one. Figure 5. Frequency drop in area two. Figure 5. Frequency drop in area two. Figure 5. Frequency drop in area two. Eng. Proc. 2022, 19, 1 Eng. Proc. 2022, 19, 1 6 of 7 6 of 7 Figure 6. Tie-line power deviation. Table 2. The optimum values of the I plus fuzzy C FOPI-FOPD. Controller Parameters Area one controller K1 K2 K3 KP11 KI1 λ1 KP12 KD1 µ1 0.284 0.7304 −1.9193 0.5200 0.4816 0.6971 −1.6179 0.7885 0.1499 Area two controller K4 K5 K6 KP21 KI2 λ2 KP22 KD2 µ2 −1.28 −0.1798 −2 −2 0.0409 0.1631 −1.6188 0.0142 0.2625 Table 3. The dynamic response of the system with the proposed controller. Controller Frequency in Area One Frequency in Area Two Tie-line Power Deviation ITAE Ushin pu Oshin pu Ts in s Ushin pu Oshin pu Ts in s Ushin pu Oshin pu Ts in s I + F C FOPI- FOPD −0.0835 0 5.697 −0.0751 0 5.9810 −0.0015 0.0052 3.3810 0.267 PI—FA −0.281 0.106 12.283 −0.210 0.0908 13.1132 −0.0382 0.0427 9.9657 4.192 5. Conclusions Concisely, this paper developed and implemented a virgin fuzzy control structure named I plus fuzzy cascade FOPI-FOPD employed as an LFC system in a dual area power system incorporating a PV unit in area one. 5. Conclusions Concisely t 5. Conclusions Concisely, this paper developed and implemented a virgin fuzzy control structure named I plus fuzzy cascade FOPI-FOPD employed as an LFC system in a dual area power system incorporating a PV unit in area one. This controller significantly damped the fre- quency deviation in both areas and also outperformed the previously proposed PI con- troller-based FA. Concisely, this paper developed and implemented a virgin fuzzy control structure named I plus fuzzy cascade FOPI-FOPD employed as an LFC system in a dual area power system incorporating a PV unit in area one. This controller significantly damped the frequency deviation in both areas and also outperformed the previously proposed PI controller-based FA. Author Contributions: Both authors have contributed the same in producing this work. All authors have read and agreed to the published version of the manuscript. F di Thi h i d l f di Author Contributions: Both authors have contributed the same in producing this work. All authors have read and agreed to the published version of the manuscript. Funding: This research received no external funding. I titutio al Re ie Boa d State e t Not a li able Funding: This research received no external funding. Funding: This research received no external funding. Institutional Review Board Statement: Not applicable Funding: This research received no external funding. Institutional Review Board Statement: Not applicable. I f d l bl Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable. C fli t f I t t Th th d l Informed Consent Statement: Not applicable. Conflicts of Interest: The authors declare no conflict of interest. Conflicts of Interest: The authors declare no conflict of interest. 7 of 7 Eng. Proc. 2022, 19, 1 References 1. Tungadio, D.H.; Sun, Y. Load frequency controllers considering renewable energy integration in power system. Energy Rep. 2019, 5, 436–453. [CrossRef] , [ ] 2. Shouran, M.; Anayi, F.; Packianather, M. A State-of-the-Art Review on LFC Strategies in Conventional and Modern Power Systems. In Proceedings of the 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India, 4–5 March 2021; pp. 268–277. [CrossRef] ( ) pp 3. Abd-Elazim, S.M.; Ali, E.S. Load frequency controller design of a two-area system composing of PV grid and thermal generator via firefly algorithm. Neural Comput. Appl. 2018, 30, 607–616. [CrossRef] y g p pp 4. Yousri, D.; Babu, T.S.; Fathy, A. Recent methodology based Harris Hawks optimizer for designing load frequency control incorporated in multi-interconnected renewable energy plants. Sustain. Energy Grids Netw. 2020, 22, 100352. [CrossRef] 5. Fathy, A.; Alharbi, A.G. Recent Approach Based Movable Damped Wave Algorithm for Designing Fr Frequency Control Installed in Multi-Interconnected Plants With Renewable Energy. IEEE Access 2021, 9 6. Fathy, A.; Yousri, D.; Rezk, H.; Thanikanti, S.B.; Hasanien, H.M. A Robust Fractional-Order PID Controller Based Load Frequency Control Using Modified Hunger Games Search Optimizer. Energies 2022, 15, 361. [CrossRef] g g p g 7. Mokhtar, M.; Marei, M.I.; Sameh, M.A.; Attia, M.A. An Adaptive Load Frequency Control for Power Systems with Renewable Energy Sources. Energies 2022, 15, 573. [CrossRef] 8. Xu, Y.; Ma, Y.; Han, Y.; Hu, T.; Lun, X.; Mi, Y. Load Frequency Control for Renewable Energy Power System Based on Sliding Mode control with Hybrid Energy Storage. In Proceedings of the 2020 Chinese Control And Decision Conference (CCDC), Hefei, China, 22–24 August 2020; pp. 1340–1345. [CrossRef] g pp 9. Mi, Y.; Fu, Y.; Li, D.; Wang, C.; Loh, P.C.; Wang, P. The sliding mode load frequency control for hybrid power system based on disturbance observer. Int. J. Electr. Power Energy Syst. 2016, 74, 446–452. [CrossRef] 10. Pandey, S.K.; Mohanty, S.R.; Kishor, N.; Catalão, J.P.S. Frequency regulation in hybrid power systems using particle swarm optimization and linear matrix inequalities based robust controller design. Int. J. Electr. Power Energy Syst. 2014, 63, 887–900. [CrossRef] 11. Loka, R.; Parimi, A.M.; Srinivas, S. Model Predictive Control Design for Fast Frequency Regulation in Hybrid Power System. In Proceedings of the 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC), Mathura, India, 21–22 January 2022; pp. 1–5. References [CrossRef] g Control (PARC), Mathura, India, 21–22 January 2022; pp. 1–5. [CrossRef] y pp F.; Packianather, M.; Habil, M. Load Frequency Control Based on the Bees Algorithm for the Great Britain gns 2021, 5, 50. [CrossRef] 12. Shouran, M.; Anayi, F.; Packianather, M.; Habil, M. Load Frequency Control Based on the Bees Alg Power System. Designs 2021, 5, 50. [CrossRef] 13. Shouran, M.; Anayi, F.; Packianather, M.; Habil, M. Different Fuzzy Control Configurations Tuned by the Bees Algorithm for LFC of Two-Area Power System. Energies 2022, 15, 657. [CrossRef] y 14. Shouran, M.; Alsseid, A. Particle Swarm Optimization Algorithm-Tuned Fuzzy Cascade Fractional Order PI-Fractional Order PD for Frequency Regulation of Dual-Area Power System. Processes 2022, 10, 477. [CrossRef] q y g y 15. Shafei, M.A.R.; Ibrahim, D.K.; Bahaa, M. Application of PSO tuned fuzzy logic controller for LFC of two-area power system with redox flow battery and PV solar park. Ain Shams Eng. J. 2022, 13, 101710. [CrossRef] 16. Annamraju, A.; Nandiraju, S. Robust frequency control in a renewable penetrated power system: An adaptive fractional order-fuzzy approach. Prot. Control Mod. Power Syst. 2019, 4, 16. [CrossRef] y pp y 17. Zou, F.; Chen, D.; Xu, Q. A survey of teaching—Learning-based optimization. Neurocomputing 2019, 33
https://openalex.org/W2766858801
https://www.epj-conferences.org/10.1051/epjconf/201715807003/pdf
English
null
U(1) gauged Q-balls and their properties
EPJ web of conferences
2,017
cc-by
4,824
U(1) gauged Q-balls and their properties Emin Nugaev1,⋆, Alexander Panin1,⋆⋆, and Mikhail Smolyakov2,1,⋆⋆⋆ 1Institute for Nuclear Research of the Russian Academy of Sciences, 60th October Anniversary prospect 7a, Moscow 117312, Russia 2Skobeltsyn Institute of Nuclear Physics, Lomonosov Moscow State University, Moscow 119991, Russia Emin Nugaev1,⋆, Alexander Panin1,⋆⋆, and Mikhail Smolyakov2,1,⋆⋆⋆ 1Institute for Nuclear Research of the Russian Academy of Sciences, 60th October Anniversary prospect 7a, Moscow 117312, Russia 2Skobeltsyn Institute of Nuclear Physics, Lomonosov Moscow State University, Moscow 119991, Russia Emin Nugaev1,⋆, Alexander Panin1,⋆⋆, and Mikhail Smolyakov2,1,⋆⋆⋆ 1Institute for Nuclear Research of the Russian Academy of Sciences, 60th October Anniversary prospect 7a, Moscow 117312, Russia 2Skobeltsyn Institute of Nuclear Physics, Lomonosov Moscow State University, Moscow 119991, Russia Abstract. In the present manuscript, we briefly discuss the differences between ordinary Q-balls and U(1) gauged Q-balls. We focus on the differences in the existence of Q-ball solutions for appropriate values of the model parameters, as well as on the differences in classical stability of such Q-balls. EPJ Web of Conferences 158, 07003 (2017) QFTHEP 2017 EPJ Web of Conferences 158, 07003 (2017) QFTHEP 2017 DOI: 10.1051/epjconf/201715807003 ⋆e-mail: emin@ms2.inr.ac.ru 1 Ordinary Q-balls For Q-balls, this piecewise scalar field potential was introduced in a more general form in [1]. The corresponding solution for the scalar field takes the 1 2 ΦΦ v 0 1 VΦΦ M2 v2 Figure 1. The scalar field potential (7). form [1] f = vRe− √ M2−ω2(r−R) r , for f < v (r > R), (8) f = vR sin(ωR) sin(ωr) r , for f > v (r < R). (9) with R = 1 ω  arctan  − ω √ M2 −ω2  + π  , 0 < ω < M. (10) The solution for ω M = 0.8 is presented in Figure 2. The Q(ω) and E(Q) dependencies for these Q-balls are presented in Figure 3 (see [3] for a more detailed discussion of Q-balls in the model with the scalar field potential (7)). 2 U(1) gauged Q-balls 1 2 ΦΦ v 0 1 VΦΦ M2 v2 Figure 1. The scalar field potential (7). Figure 1. The scalar field potential (7). form [1] f = vRe− √ M2−ω2(r−R) r , for f < v (r > R), (8) f = vR sin(ωR) sin(ωr) r , for f > v (r < R). (9) with −ω2(r−R) r , for f < v (r > R), (8) sin(ωr) r , for f > v (r < R). (9) (8) (9) with R = 1 ω  arctan  − ω √ M2 −ω2  + π  , 0 < ω < M. (10) (10) The solution for ω M = 0.8 is presented in Figure 2. The Q(ω) and E(Q) dependencies for these Q-balls are presented in Figure 3 (see [3] for a more detailed discussion of Q-balls in the model with the scalar field potential (7)). The solution for ω M = 0.8 is presented in Figure 2. The Q(ω) and E(Q) dependencies for these Q-balls are presented in Figure 3 (see [3] for a more detailed discussion of Q-balls in the model with the scalar field potential (7)). 1 Ordinary Q-balls Q-balls are localized solutions in the theory of a complex scalar field, described by the action S =  d4x  ∂µφ∗∂µφ −V(φ∗φ)  , (1) (1) such that such that φ(t, x) = eiωt f(r), f(r)|r→∞→0, ∂r f(r)|r=0 = 0, r = √ x2. (2) φ(t, x) = eiωt f(r), f(r)|r→∞→0, ∂r f(r)|r=0 = 0, r = √ x2. (2) (2) Without loss of generality one can take f(r) to be real and such that f(r) > 0. Initially, such solutions were proposed in [1] and became popular after the well-known paper [2]. The Q-ball charge is defined as Q = −i  d3x  φ∗˙φ −˙φ∗φ  = 8πω ∞  0 f 2 r2dr, (3) (3) whereas the Q-ball energy is defined as whereas the Q-ball energy is defined as whereas the Q-ball energy is defined as E =  d3x ˙φ∗˙φ + ∂iφ∗∂iφ + V(φ∗φ)  . (4) (4) It is easy to show that the relation It is easy to show that the relation dE dQ = ω (5) It is easy to show that the relation dE dQ = ω (5) dE dQ = ω (5) (5) ⋆e-mail: emin@ms2.inr.ac.ru ⋆⋆ ⋆⋆e-mail: panin@ms2.inr.ac.ru ⋆⋆⋆e-mail: smolyakov@theory.sinp.msu.ru © The Authors, published by EDP Sciences. This is an open access article distributed under the terms of the Creative Commons Attribution License 4.0 (http://creativecommons.org/licenses/by/4.0/). EPJ Web of Conferences 158, 07003 (2017) EPJ Web of Conferences 158, 07003 (2017) QFTHEP 2017 DOI: 10.1051/epjconf/201715807003 holds for Q-balls. Since there exists the symmetry holds for Q-balls. Since there exists the symmetry holds for Q-balls. Since there exists the symmetry ince there exists the symmetry ω →−ω ⇒ Q →−Q, E →E, (6) (6) without loss of generality one can examine only the case ω ≥0. A i l l f th Q b ll id d l ith th l fild t ti l without loss of generality one can examine only the case ω ≥0. without loss of generality one can examine only the case ω ≥0. A i l l f th Q b ll id d l without loss of generality one can examine only the case ω ≥0. As a simple example of the Q-ball, we can consider a model with the scalar field potential V(φ∗φ) = M2φ∗φ θ  1 −φ∗φ v2  + M2v2θ φ∗φ v2 −1  , (7) (7) where θ is the Heaviside step function (see Figure 1). 2 U(1) gauged Q-balls Now we turn to U(1) gauged Q-balls, which were initially proposed in [4], see also [5]. To describe such Q-balls, let us consider the action S =  d4x  (∂µφ∗−ieAµφ∗)(∂µφ + ieAµφ) −V(φ∗φ) −1 4FµνFµν  . (11) (11) 2 2 EPJ Web of Conferences 158, 07003 (2017) DOI: 10.1051/epjconf/201715807003 QFTHEP 2017 EPJ Web of Conferences 158, 07003 (2017) QFTHEP 2017 DOI: 10.1051/epjconf/201715807003 Ω M0.8 2 4 6 8 10 Mr 0.5 1.0 1.5 2.0 2.5 f v Figure 2. The scalar field profile for ω M = 0.8. The vertical line indicates the point r = R where f (r) = v. Figure 2. The scalar field profile for ω M = 0.8. The vertical line indicates the point r = R where f (r) = v. 400 600 800 1000 QM2 v2 400 600 800 1000 EM v2 0.2 0.4 0.6 0.8 1.0 Ω M 100 104 106 108 1010 QM2 v2 0.2 0.4 0.6 0.8 1.0 Ω M 100 104 106 108 1010 QM2 v2 400 600 800 1000 QM2 v2 400 600 800 1000 EM v2 Figure 3. The Q(ω) and E(Q) dependencies for the Q-ball defined by (8)–(10) (see [3] for details). Figure 3. The Q(ω) and E(Q) dependencies for the Q-ball defined by (8)–(10) (see [3] for details). The U(1) gauged Q-ball is a localized solution to the equations of motion for the fields, following from action (11), of the form The U(1) gauged Q-ball is a localized solution to the equations of motion for the fields, following from action (11), of the form φ(t, x) = eiωt f(r), f(r)|r→∞→0, ∂r f(r)|r=0 = 0, (12) A0(t, x) = A0(r), A0(r)|r→∞→0, ∂rA0(r)|r=0 = 0, (13) Ai(t, x) ≡ 0. (14) (12) (13) (14) (14) Again, without loss of generality we take f(r) > 0. The charge of U(1) gauged Q-ball is defined as Again, without loss of generality we take f(r) > 0. The charge of U(1) gauged Q-ball is defined as Q = 8π  (ω + eA0)f 2r2dr, (15) (15) whereas its energy is defined as whereas its energy is defined as E = 4π ∞  0  (ω + eA0)2 f 2 + ∂r f∂r f + V(f) + 1 2∂rA0∂rA0  r2dr. 2 U(1) gauged Q-balls (16) (16) It is possible to show [6] that the relation dE It is possible to show [6] that the relation dE dQ = ω (17) It is possible to show [6] that the relation It is possible to show [6] that the relation dE dQ = ω (17) dE dQ = ω dE dQ = ω (17) 3 EPJ Web of Conferences 158, 07003 (2017) QFTHEP 2017 DOI: 10.1051/epjconf/201715807003 holds for U(1) gauged Q-balls too. (1) d Q b ll h f ll i i holds for U(1) gauged Q-balls too. ( ) g g Q U(1) gauged Q-balls possess the following properties: • ω →−ω ⇒ A0 →−A0. • The sign of ω + eA0 coincides with the sign of ω [5]. • The sign of ω + eA0 coincides with the sign of ω [5]. • The sign of ω + eA0 coincides with the sign of ω [5]. • The sign of ω + eA0 coincides with the sign of ω [5]. • If A0 ≡0, then ω = 0 [4]. hen ω = 0 [4]. Thus, there exists the symmetry ω →−ω ⇒ Q →−Q, E →E, (18) (18) and without loss of generality one can examine only the case ω ≥0. and without loss of generality one can examine only the case ω ≥0. and without loss of generality one can examine only the case ω ≥0 After this brief introduction, we are ready to turn to examining the differences between ordinary Q-balls and U(1) gauged Q-balls. 3 Behavior of Q-balls at r →∞ field potential V(φ∗φ) such that Let us consider the scalar field potential V(φ∗φ) such that Let us consider the scalar field potential V(φ∗φ) such that Let us consider the scalar field potential V(φ∗φ) such that V(φ∗φ) →M2φ∗φ for φ∗φ →0. (19) (19) For f(r) →0, the equation of motion for ordinary Q-balls reduces to (ω2 −M2)f + 1 r d2 dr2 (r f) ≈0, (20) (20) leading to f(r) ∼e− √ M2−ω2r r . It is clear that there are no Q-balls with ω = M, because Q →∞(as well as E →∞) for ω →M. leading to f(r) ∼e− √ M2−ω2r r . It is clear that there are no Q-balls with ω = M, because Q →∞(as well as E →∞) for ω →M. In the case of U(1) gauged Q-balls the situation is completely different. Indeed, suppose that there exists a U(1) gauged Q-ball with the charge Q. Then, for f(r) →0 the equation of motion for the scalar field reduces to 2 2 (ω2 −M2)f −2 ωe2Q 4πr f + 1 r d2 dr2 (r f) ≈0. (21) (21) Now we have two cases: • For ω < M f(r) ∼e− √ M2−ω2 r r 1+ ωe2Q 4π √ M2−ω2 for r →∞. (22) (22) • For ω = M f(r) = C K1   2Me2Q π r  √r , (23) (23) √ where C is a constant and K1(b, z) is the modified Bessel function of the second kind, leading to where C is a constant and K1(b, z) is the modified Bessel function of the second kind, leading to f(r) ∼e−  2Me2Q π r r 3 4 for r →∞. (24) (24) We see that in the gauged case there may exist a solution possessing the finite charge and energy even for ω = M. This conclusion is supported by the results of numerical simulations (see [7] for details) for the scalar field potential (7) (Figures 4 and 5) and for the scalar field potential V(f) = M2 f 2 −λf 4 (Figures 6 and 7). We see that in the gauged case there may exist a solution possessing the finite charge and energy even for ω = M. 3 Behavior of Q-balls at r →∞ This conclusion is supported by the results of numerical simulations (see [7] for details) for the scalar field potential (7) (Figures 4 and 5) and for the scalar field potential V(f) = M2 f 2 −λf 4 (Figures 6 and 7). 4 DOI: 10.1051/epjconf/201715807003 EPJ Web of Conferences 158, 07003 (2017) QFTHEP 2017 EPJ Web of Conferences 158, 07003 (2017) QFTHEP 2017 102 104 106 108 0 0.2 0.4 0.6 0.8 1 Q~ ω/M √α2  = 0.005 102 104 106 108 0 0.2 0.4 0.6 0.8 1 Q~ ω/M √α2  = 0.02 102 104 106 108 0 0.2 0.4 0.6 0.8 1 Q~ ω/M √α2  = 0.07 102 104 106 108 0 0.2 0.4 0.6 0.8 1 Q~ ω/M √α2  = 0.1 Figure 4. ˜Q = M2 v2 Q for different values of the parameter α2 = e2v2 M2 (thick lines). The thin lines stand for the nongauged case. The figure is taken from [7]. 102 104 106 108 0 0.2 0.4 0.6 0.8 1 Q~ ω/M √α2  = 0.02 102 104 106 108 0 0.2 0.4 0.6 0.8 1 Q~ ω/M √α2  = 0.1 Figure 4. ˜Q = M2 v2 Q for different values of the parameter α2 = e2v2 M2 (thick lines). The thin lines stand for the nongauged case. The figure is taken from [7]. 0 1 2 3 4 5 6 7 8 0 10 20 30 40 50 F R ω/M = 1 ω/M ≈ 0.96 ω/M ≈ 0.46 ω/M = 1 Figure 5. Profiles of the scalar field for different values of ω M . Here √α2 = 0.02, R = Mr, F(R) = 1 v f (r). The figure is taken from [7]. 0 1 2 3 4 5 6 7 8 0 10 20 30 40 50 F R ω/M = 1 ω/M ≈ 0.96 ω/M ≈ 0.46 ω/M = 1 R Figure 5. Profiles of the scalar field for different values of ω M . Here √α2 = 0.02, R = Mr, F(R) = 1 v f (r). The figure is taken from [7]. where ∆= ∂i∂i, has only one negative eigenvalue. The proof of the classical stability criterion based on the use of the energy functional of the system can be found in [8], the proof based on the use of the linearized equations of motion along the lines of the Vakhitov-Kolokolov method proposed in [9] can be found in [10]. It should be noted that we are not aware of any explicit example of ordinary Q-ball, for which the operator L has more than one negative eigenvalues and which is classically unstable for dQ dω < 0. dω In order to examine the gauged case, we consider the perturbations above the U(1) gauged Q-ball solution in the form [10] φ(t, x) = eiωt f(r) + eiωteγt u(x) + iv(x) , (27) A0(t, x) = A0(r) + eγta0(x), (28) Ai(t, x) = eγtai(x), (29) φ(t, x) = eiωt f(r) + eiωteγt u(x) + iv(x) A0(t, x) = A0(r) + eγta0(x), Ai(t, x) = eγtai(x), (27) (28) (29) (28) (29) Ai(t, x) = eγtai(x), (29) where γ is real, which passes through the linearized equations of motion. It is possible to show (see the detailed derivation in [10]) that U(1) gauged Q-balls are classically stable if the following conditions hold: where γ is real, which passes through the linearized equations of motion. It is possible to show (see the detailed derivation in [10]) that U(1) gauged Q-balls are classically stable if the following conditions hold: 1. dQ dω < 0 (30) dQ dω < 0 (30) dQ dω < 0 (30) (30) 2. The corresponding operator ˆL has only one negative eigenvalue. Here the operator ˆL takes the form rresponding operator ˆL has only one negative eigenvalue. 2. The corresponding operator ˆL has only one negative eigenvalue. Here the operator ˆL takes the form 2. The corresponding operator ˆL has only one negative eigenvalue. Here the operator ˆL takes the form ˆL =  −∆+ W(r) −2e(ω + eA0)f 0 −2e(ω + eA0)f ∆ 2 −e2 f 2 0 0 0  ∆ 2 −e2 f 2 −γ2 2  I3×3  , (31) (31) where I3×3 is the 3 × 3 unit matrix and where I3×3 is the 3 × 3 unit matrix and W(r) = dV d(φ∗φ) φ∗φ= f 2(r) +2 d2V d(φ∗φ)2 φ∗φ= f 2(r) f 2(r) −(ω + eA0)2. 3 Behavior of Q-balls at r →∞ 5 5 EPJ Web of Conferences 158, 07003 (2017) QFTHEP 2017 DOI: 10.1051/epjconf/201715807003 0 50 100 150 200 250 300 0 0.2 0.4 0.6 0.8 1 Q~ ω/M √α1  = 0.05 0 50 100 150 200 250 300 0 0.2 0.4 0.6 0.8 1 Q~ ω/M √α1  = 0.1 0 50 100 150 200 250 300 0 0.2 0.4 0.6 0.8 1 Q~ ω/M √α1  = 0.2 0 50 100 150 200 250 300 0 0.2 0.4 0.6 0.8 1 Q~ ω/M √α1  = 0.5 Figure 6. ˜Q = λQ for different values of the parameter α1 = e2 λ (thick lines). The thin lines stand for the nongauged case. The figure is taken from [7]. Figure 6. ˜Q = λQ for different values of the parameter α1 = e2 λ (thick lines). The thin lines stand for the nongauged case. The figure is taken from [7]. 0 0.5 1 1.5 2 2.5 3 3.5 0 2 4 6 8 10 12 14 F R ω/M = 0 ω/M = 0.8 ω/M = 0.95 ω/M = 1 Figure 7. Profiles of the scalar field for different values of ω M . Here √α1 = 0.05, R = Mr, F(R) = √ λ M f (r). The figure is taken from [7]. 0 0.5 1 1.5 2 2.5 3 3.5 0 2 4 6 8 10 12 14 F R ω/M = 0 ω/M = 0.8 ω/M = 0.95 ω/M = 1 Figure 7. Profiles of the scalar field for different values of ω M . Here √α1 = 0.05, R = Mr, F(R) = √ λ M f (r). The figure is taken from [7]. 6 EPJ Web of Conferences 158, 07003 (2017) QFTHEP 2017 DOI: 10.1051/epjconf/201715807003 4 Classical stability of U(1) gauged Q-balls: theoretical considerations Now we turn to examining another difference between ordinary and U(1) gauged Q-balls — the clas sical stability, i.e., stability of the Q-ball solution with respect to small perturbations of the fields. It is known that ordinary Q-balls are stable with respect to small perturbations if the following conditions hold: 1. dQ dω < 0 (25) 2. The operator ˆL = −∆+ dV d(φ∗φ) φ∗φ= f 2(r) +2 d2V d(φ∗φ)2 φ∗φ= f 2(r) f 2(r) −ω2, (26) where ∆= ∂i∂i, has only one negative eigenvalue. dQ dω < 0 (25) (25) 2. The operator 2. The operator ˆL = −∆+ dV d(φ∗φ) φ∗φ= f 2(r) +2 d2V d(φ∗φ)2 φ∗φ= f 2(r) f 2(r) −ω2, (26) (26) where ∆= ∂i∂i, has only one negative eigenvalue. where ∆= ∂i∂i, has only one negative eigenvalue. where ∆= ∂i∂i, has only one negative eigenvalue. On the other hand, it is possible, due to the repulsive nature of the electromagnetic field, that nonspherically symmetric perturbations destroy any U(1) gauged Q-ball. It is necessary to note that the question remains open as to whether it is possible to have only one negative eigenvalue of the operator ˆL even in the case of spherically symmetric perturbations, in which the operator ˆL takes a simpler form (see the detailed discussion in [10]). where ∆= ∂i∂i, has only one negative eigenvalue. (32) (32) One can see that there always exist negative eigenvalues of the operator ˆL, corresponding to the perturbations ai (because of the elements  ∆ 2 −e2 f 2 −γ2 2  I3×3). Thus, the corresponding negative part 7 EPJ Web of Conferences 158, 07003 (2017) QFTHEP 2017 DOI: 10.1051/epjconf/201715807003 of the spectrum is defined only by the spectrum of the operator  ∆ 2 −e2 f 2 −γ2 2  . Moreover, due to the fact that f(r) rapidly tends to zero at r →∞, one expects that the operator  ∆ 2 −e2 f 2 −γ2 2  has of the spectrum is defined only by the spectrum of the operator  ∆ 2 −e2 f 2 −γ2 2  . Moreover, due to the fact that f(r) rapidly tends to zero at r →∞, one expects that the operator  ∆ 2 −e2 f 2 −γ2 2  has a negative continuous spectrum starting at −γ2 2 . Thus, fulfillment of the condition dQ dω < 0 does not provide any information about possible stability regions of the U(1) gauged Q-ball, at least within the framework of the generalized Vakhitov-Kolokolov approach used in [10]. At the moment it is not clear what is the origin of the problem described above. On the one hand, it is possible that the existence of the negative spectrum is just a technical artifact of the approach used in [10]. On the other hand, it is possible, due to the repulsive nature of the electromagnetic field, that nonspherically symmetric perturbations destroy any U(1) gauged Q-ball. It is necessary to note that the question remains open as to whether it is possible to have only one negative eigenvalue of the operator ˆL even in the case of spherically symmetric perturbations, in which the operator ˆL takes a simpler form (see the detailed discussion in [10]). a negative continuous spectrum starting at −γ2 2 . Thus, fulfillment of the condition dQ dω < 0 does not provide any information about possible stability regions of the U(1) gauged Q-ball, at least within the framework of the generalized Vakhitov-Kolokolov approach used in [10]. At the moment it is not clear what is the origin of the problem described above. On the one hand, it is possible that the existence of the negative spectrum is just a technical artifact of the approach used in [10]. The second scalar field potential has the form ar field potential has the form V(φ∗φ) = −µ2φ∗φ ln(β2φ∗φ). (33) (33) In the nongauged case this scalar field potential was proposed in [11]. An interesting feature of this model is that the linearized equations of motion for perturbations can be solved exactly in the nongauged case [12]. The dQ dω < 0 stability criterion is valid for ordinary Q-balls in this model — Q-balls with dQ dω < 0 are classically stable (and Q-balls with dQ dω > 0 are classically unstable). dω th dQ dω < 0 are classically stable (and Q-balls with dQ dω > 0 are classically unstable). dω dω The results of the numerical simulation in the gauged case can be found in dω dω The results of the numerical simulation in the gauged case can be found in Figure 9. One can easily Μ2Β2Q 0 1 2 3 4 0 20 40 60 80 100 120 ΩΜ Μ2Β2Q 0 1 2 3 4 0 20 40 60 80 100 120 ΩΜ 25 50 75 100 125 0 1 2 3 4 µ2β2Q ω/µ 80 90 100 3.4 3.5 3.6 3.7 stable unstable Figure 9. Ordinary (left plot) and U(1) gauged Q-balls for e/βµ = 1.1 (right plot) for the logarithmic scalar field potential. The solid lines stand for the classically stable Q-balls. The short-dashed lines stand for the classically unstable Q-balls. The right plot is taken from [10]. Μ2Β2Q 0 1 2 3 4 0 20 40 60 80 100 120 ΩΜ 25 50 75 100 125 0 1 2 3 4 µ2β2Q ω/µ 80 90 100 3.4 3.5 3.6 3.7 stable unstable Figure 9. Ordinary (left plot) and U(1) gauged Q-balls for e/βµ = 1.1 (right plot) for the logarithmic scalar field potential. The solid lines stand for the classically stable Q-balls. The short-dashed lines stand for the classically unstable Q-balls. The right plot is taken from [10]. see from Figure 9 that there are classically unstable U(1) gauged Q-balls with dQ dω < 0 (for example, the Q-ball marked by the dot in Figure 9). This differs considerably from the case of ordinary Q-balls. 5 Classical stability of U(1) gauged Q-balls: numerical simulations In order to examine the classical stability regions of U(1) gauged Q-balls, the numerical simulations in the spherically symmetric case were performed (see the details in [10]). Here we present the results for two different scalar field potentials. The first one is the potential (7). We see from Figure 8 102 104 106 0.4 ω0 M 0.6 0.8 ωc M 1 QM 2/v2 ω/M ev/M = 0.02 nongauged stable unstable Figure 8. The stability and instability regions of Q-balls in the model with the scalar field potential (7). The long- dashed line stands for the nongauged Q-balls. The solid line stands for the classically stable gauged Q-balls. The short-dashed line stands for the classically unstable gauged Q-balls. The figure is taken from [10]. Figure 8. The stability and instability regions of Q-balls in the model with the scalar field potential (7). The long- dashed line stands for the nongauged Q-balls. The solid line stands for the classically stable gauged Q-balls. The short-dashed line stands for the classically unstable gauged Q-balls. The figure is taken from [10]. that the inequality dQ dω > 0 holds for classically unstable solutions, which formally is in agreement with the classical stability criterion. Meanwhile, the inequality dQ dω > 0 also holds for gauged Q- balls on the upper branch of the Q(ω) dependence, which appear to be stable at least with respect to spherically symmetric perturbations. Although formally this fact does not contradict the classical stability criterion (in the case of ordinary Q-balls the classical stability criterion does not guarantee that there exist unstable modes in the case dQ dω > 0, it just states that there are no classical instabilities if dQ dω < 0), this situation differs from the case of ordinary Q-balls, for which usually there exist spherically symmetric unstable modes for Q-balls with dQ dω > 0. 8 8 DOI: 10.1051/epjconf/201715807003 EPJ Web of Conferences 158, 07003 (2017) QFTHEP 2017 The second scalar field potential has the form The second scalar field potential has the form 6 Conclusion In the present manuscript, we briefly discussed the differences between ordinary and U(1) gauged Q-balls. It is shown that U(1) gauged Q-balls may exist for the values of the parameters (ω = M), for which ordinary Q-balls do not exist. It is also shown that the classical stability criterion for ordinary Q-balls cannot be applied to U(1) gauged Q-balls. An explicit example of classically unstable U(1) gauged Q-ball with dQ dω < 0 is presented. These results demonstrate that addition of the gauge field changes drastically the properties of Q-balls. The work was supported by the Grant 16-12-10494 of the Russian Science Foundation. The second scalar field potential has the form An example of time evolution of the perturbed U(1) gauged Q-ball is shown in Figure 10, where the 0.5 1 0 2.5 5 7.5 10 12.5 |φ|/µ µr µt = 0 5 10 15 0.5 1 0 2.5 5 7.5 10 12.5 |φ|/µ µr µt = 0 5 10 15 Figure 10. The scalar field profile of the classically unstable gauged Q-ball at different moments of time. The initial solution (at µt = 0) is marked by the dot in the upper right corner of Figure 9. The figure is taken from [10]. Figure 10. The scalar field profile of the classically unstable gauged Q-ball at different moments of time. The initial solution (at µt = 0) is marked by the dot in the upper right corner of Figure 9. The figure is taken from [10]. scalar field profile is presented at different moments of time. 9 DOI: 10.1051/epjconf/201715807003 EPJ Web of Conferences 158, 07003 (2017) QFTHEP 2017 References [1] G. Rosen, J. Math. Phys. 9, 996 (1968) [1] G. Rosen, J. Math. Phys. 9, 996 (1968) [2] S. R. Coleman, Nucl. Phys. B 262, 263 (1985) [Erratum-ibid. B 269, 744 (1986)] [3] I E G l E Y N d M N S l k Ph R D 87 085043 (2013) [2] S. R. Coleman, Nucl. Phys. B 262, 263 (1985) [Erratum-ibid. B 269, 744 (1986)] [3] I. E. Gulamov, E. Y. Nugaev and M. N. Smolyakov, Phys. Rev. D 87, 085043 (2013 [3] I. E. Gulamov, E. Y. Nugaev and M. N. Smolyakov, Phys. Rev. D 87, 085043 (2013) [4] G. Rosen, J. Math. Phys. 9, 999 (1968) [3] I. E. Gulamov, E. Y. Nugaev and M. N. Smolyakov, Phys. Rev. D 87, 085043 (2013 [4] G. Rosen, J. Math. Phys. 9, 999 (1968) 5] K.-M. Lee, J. A. Stein-Schabes, R. Watkins and L. M. Widrow, Phys. Rev. D 39, 1665 [6] I. E. Gulamov, E. Y. Nugaev and M. N. Smolyakov, Phys. Rev. D 89, 085006 (2014) [7] I. E. Gulamov, E. Y. Nugaev, A. G. Panin and M. N. Smolyakov, Phys. Rev. D 92, 0 8] T. D. Lee and Y. Pang, Phys. Rept. 221, 251 (1992) [8] T. D. Lee and Y. Pang, Phys. Rept. 221, 251 (1992) [9] N. G. Vakhitov and A. A. Kolokolov, Radiophys. Quantum Electron. 16, 783 (1973 [10] A. G. Panin and M. N. Smolyakov, Phys. Rev. D 95, 065006 (2017) [11] G. Rosen, Phys. Rev. 183, 1186 (1969) [12] G.C. Marques and I.Ventura, Phys. Rev. D 14, 1056 (1976) 10
https://openalex.org/W2067360604
https://researchrepository.wvu.edu/cgi/viewcontent.cgi?article=3430&context=faculty_publications
English
null
Nobiletin suppresses cell viability through AKT Pathways in PC-3 and DU-145 prostate cancer cells
BMC pharmacology & toxicology
2,014
cc-by
7,633
Follow this and additional works at: https://researchrepository.wvu.edu/faculty_publications Follow this and additional works at: https://researchrepository.wvu.edu/faculty_publications Nobiletin suppresses cell viability through AKT Pathways in PC-3 Nobiletin suppresses cell viability through AKT Pathways in PC-3 and DU-145 prostate cancer cells and DU-145 prostate cancer cells See next page for additional authors This article is available at The Research Repository @ WVU: https://researchrepository.wvu.edu/faculty_publications/ 2482 Authors Authors Jianchu Chen, Ashley Creed, Allen Y. Chen, Haizhi Huang, Zhaoliang Li, Gary O. Rankin, Xingqian Ye, Guihua Xu, and Yi C. Chen Digital Commons Citation Digital Commons Citation Chen, Jianchu; Creed, Ashley; Chen, Allen Y.; Huang, Haizhi; Li, Zhaoliang; Rankin, Gary O.; Ye, Xingqian; Xu, Guihua; and Chen, Yi C., "Nobiletin suppresses cell viability through AKT Pathways in PC-3 and DU-145 prostate cancer cells" (2014). Faculty & Staff Scholarship. 2482. https://researchrepository.wvu.edu/faculty_publications/2482 This Article is brought to you for free and open access by The Research Repository @ WVU. It has been accepted for inclusion in Faculty & Staff Scholarship by an authorized administrator of The Research Repository @ WVU. For more information, please contact researchrepository@mail.wvu.edu. This article is available at The Research Repository @ WVU: https://researchrepository.wvu.edu/faculty_publications/ 2482 RESEARCH ARTICLE Open Access © 2014 Chen et al.; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated. Nobiletin suppresses cell viability through AKT Pathways in PC-3 and DU-145 prostate cancer cells Jianchu Chen1,2, Ashley Creed2, Allen Y Chen3, Haizhi Huang1,2, Zhaoliang Li2, Gary O Rankin4, Xingqian Ye1, Guihua Xu1 and Yi Charlie Chen2* * Correspondence: chenyc@ab.edu 2College of Science, Technology and Mathematics, Alderson Broaddus University, Philippi, WV 26416, USA Full list of author information is available at the end of the article Open Access Keywords: Nobiletin, Prostate cancer, VEGF, NF-κB, HIF-1α, cMyc Keywords: Nobiletin, Prostate cancer, VEGF, NF-κB, HIF-1α, cMyc Abstract Background: Nobiletin is a non-toxic dietary flavonoid that possesses anti-cancer properties. Nobiletin has been reported to reduce the risk of prostate cancer, but the mechanism is not well understood. In this study, we investigated the effects of nobiletin in prostate cancer cell lines PC-3 and DU-145. Methods: Nobiletin was isolated from a polymethoxy flavonoid mixture using HPLC, cell viability was analyzed with MTS-based assays. Protein expression was examined by ELISA and western blotting. Gene expression was examined by luciferase assay. And the pathways were examined by manipulating genetic components with plasmid transfection. Results: Data showed that nobiletin decreased cell viability in both prostate cell lines, with a greater reduction in viability in PC-3 cells. HIF-1α expression and AKT phosphorylation were decreased in both cell lines. The VEGF expression was inhibited in PC-3 but not DU-145 cells. cMyc expression was decreased in DU-145 cells. Nobiletin down-regulated NF-κB (p50) expression in nuclei of DU145 cells but not whole cells. It also suppressed NF-κB expression in both whole cells and nuclei of PC-3 cells. Increasing HIF-1α levels reversed nobiletin’s inhibitory effects on VEGF expression, and up-regulating AKT levels reversed its inhibitory effects on HIF-1α expression. We speculate that AKT influences cell viability probably by its effect on NF-κB in both prostate cells. The effect of nobiletin on VEGF expression in PC-3 cell lines was through the AKT/HIF-1α pathway. Conclusion: Taken together, our results show that nobiletin suppresses cell viability through AKT pathways, with a more profound effect against the more metastatic PC-3 line. Due to this enhanced action against a more malignant cell type, nobiletin may be used to improve prostate cancer survival rates. Authors Authors Chen et al. BMC Pharmacology and Toxicology 2014, 15:59 http://www.biomedcentral.com/2050-6511/15/59 Cell proliferation assay levels of sex hormones, preventing oxidation or inflam- mation, diminishing angiogenesis or cell proliferation, or stimulating apoptosis [10]. There are more than 400 flavonoids found in our food supply; however, in this research we focused our attention on nobiletin [11]. Effects of nobiletin on prostate cancer cells (PC-3 and DU-145) viability were colorimetrically determined with a “Cell Titer 96 Aqueous One Solution Cell Proliferation Assay” kit from Promega (Madison, WI). Cells (5 × 103/ well) were seeded into 96-well plates and incubated for 16 h before being treated with 0 to 160 μg/ml nobiletin in triplicates for 24 h with DMSO as solvent control. After removing the medium, cells were washed with phosphate buffered saline (PBS), and then 100μL Aqueous One Reagent dilute solution (80 μL PBS +20 μL Aqueous One Reagent) was added to each well. Cells were incubated at 37°C for 1.5 h and measured for optical density (OD) values at 490 nm. Cell viability was expressed as a percent- age of control from three independent experiments. Nobiletin is an O-methylated flavonoid found in citrus peels with an empirical formula of C21H22O8 and molecu- lar weight of 402.39 [12]. An inverse relationship has been identified between nobiletin and cancer risk, which is likely due to nobiletin’s anticancer, antiviral, and anti- inflammatory activities [13,14]. More specifically, recent findings have identified nobiletin as a cell differentiation modulator. Cell differentiation is a crucial step in angio- genesis and therefore could affect tumor growth and metastasis which both depend on angiogenesis [15]. Research has also shown that a diet high in flavonoids reduced oxidative damage to deoxyribonucleic acid (DNA), blocking a significant step in the onset of some types of cancers [16]. These findings support the proposition that nobiletin is functionally unique and could be a possible chemopreventive agent in inflammation-associated tumori- genesis [17]. ELISA for VEGF d l Secreted vascular endothelial growth factor (VEGF) protein levels were analyzed by sandwich enzyme-linked immuno- sorbent assay (ELISA) with a Quantikine Human VEGF Immunoassay Kit from R&D Systems (Minneapolis, MN) targeting VEGF in cell culture supernates. Cells (104/well) were seeded into 96-well plates and incubated for 16 h before being treated with 0 to 160 μg/ml nobiletin in tripli- cates for 24 h with DMSO as solvent control. Culture supernates were collected for VEGF assay. VEGF levels were determined following the manufacturer's instructions. A total of 3 independent experiments, each in triplicates, were assayed, and the mean VEGF protein level from each duplicate was used for statistical analysis. Currently, metastatic prostate cancer is incurable and ultimately claims the life of patients [18,19]. An import- ant factor in the relative seriousness of prostate cancer is the invasiveness of the constituent tumor cells causing metastasis [19]. Nobiletin has been reported to reduce the risk of prostate cancer, but the mechanism is not well understood. Therefore we studied the effects of nobiletin in prostate cancer cell lines PC-3 and DU-145. The pathways that affect the viability and VEGF expression of these cell lines have also been investigated in this paper. DU-145 and PC-3 are prostate cancer cell lines with moderate and high metastatic potential, respectively [20]. In the present study, we isolated nobiletin from a polymethoxy flavonoid mixture. Then we investigated the effect of nobiletin on cell viability in prostate cancer cell lines PC-3 and DU-145 and also performed western blot- ting and ELISA to identify changes in protein expression. Moreover, we examined the VEGF changes through trans- fection of AKT and HIF-1α plasmids in luciferase assays. Western blot Prostate cancer cells (106) were seeded in 60-mm dishes and incubated for 16 h before treatment with nobiletin for 24 h. After washing with PBS, cells were harvested with 100 μL Mammalian Protein Extraction Reagent including 1 μL Halt Protease, 1 μL Phosphatase Inhibitor and 2 μL EDTA (Thermo Scientific, Rockford, IL). Cells were then frozen at -80°C for 30 min, melted, centrifuged at 12,000 g at 4°C for 10 min, and collected in aqueous phase for measurement. Nuclear protein was extracted by NE-PER™ Nuclear and Cytoplasmic Extraction Reagents (Thermo Scientific, Rockford, IL). Total protein levels were assayed with a BCA Protein Assay Kit (Pierce, Rockford, IL), and lysates were separated by 10% SDS-PAGE and blotted into nitrocellulose membrane. For immune detection, antibodies against HIF-1α, NF-κB (p50), PTEN, cMyc, GAPDH, p-AKT, total AKT (Santa Cruz Biotechnology, Santa Cruz, CA) and PCNA (Cell Signaling Technology, Boston, MA) were applied and signals visualized with x-ray film (Pierce Biotechnology, Rockford, IL). Protein bands were quantitated with NIH ImageJ software, nor- malized to corresponding GAPDH, PCNA or total AKT bands, and expressed as percentages of control. A total Background risk factors, such as advancing age, African American ethnicity, and a positive family history, are associated with the likelihood of developing prostate cancer [4]. However, research has also shown that prostate cancer is not solely due to genetic factors, but is also related to lifestyle, diet, and environmental factors [4-6]. It is now believed that 90-95% of all cancers are caused by life- style [7]. This observation has encouraged researchers to identify dietary components, such as flavonoids like nobiletin, which may have anticancer properties. Prostate cancer is the second most common cancer in the United States, as well as, the second leading cause of mortality among males in the western world [1]. Approximately 25% of all newly diagnosed cancers in American men are prostate cancer [2]. Studies relating lifestyle to the risk of prostate cancer have become more prevalent in recent years due the escalating num- ber of prostate cancer cases over the past decade [1]. Nevertheless, the etiology of prostate cancer is still uncertain because no specific carcinogen is known to cause this disease [3]. Research has found that certain It has been suggested that dietary intake of natural products rich in citrus flavonoids can play an important role in chemoprevention [8,9]. Flavonoids are phyto- chemicals found in fruits, vegetables, teas, and wines. Flavonoids display anti-carcinogenic characteristics in vitro and might be able to decrease cancer risk by changing * Correspondence: chenyc@ab.edu 2College of Science, Technology and Mathematics, Alderson Broaddus University, Philippi, WV 26416, USA Full list of author information is available at the end of the article Page 2 of 10 Chen et al. BMC Pharmacology and Toxicology 2014, 15:59 http://www.biomedcentral.com/2050-6511/15/59 Page 2 of 10 Isolation and identification of nobiletin Nobiletin was prepared from a polymethoxy flavonoid mixture, which was provided by Zhejiang Quzhou Tian- sheng Plant Extraction Co. Ltd. in China, containing about 60% nobiletin and tangeretin. The polymethoxy flavonoid mixture was dissolved in methanol-dimethyl sulfoxide (1:1) to a concentration of 50 mg/mL. Then it was chromate graphed with high-performance liquid chromatography (HPLC), eluted with methanol-H2O (70:30) in 8 mL/min at room temperature, separated into two fractions (Fractions I and II), collected individually, and evaporated. Fraction I and fraction II were obtained by HPLC (Figure 1(a)). Fraction I was identified as nobiletin by HPLC-MS (Figure 1(b)), UV-vis chromatography (Figure 1(c)) and comparing peak time with that of nobiletin sample from Sigma (Figure 1(d)) and previous reports. Its purity was above 98%. Cell culture and treatment PC-3 cells were cultured in F-12K medium (ATCC, Manassas, VA) supplemented with 10% US-qualified fetal bovine serum (FBS) (Invitrogen, Grand Island, NY). DU-145 cells were cultured in Eagle’s minimum essential medium (ATCC, Manassas, VA) supplemented with 10% US-qualified fetal bovine serum. All cells were cultured in a cell culture incubator with 5% CO2 at 37°C. Nobiletin was dissolved in dimethyl sulfoxide (DMSO) to make stock solutions of 100 mM and equal amount of DMSO was included in controls for every experiment. Page 3 of 10 Page 3 of 10 Chen et al. BMC Pharmacology and Toxicology 2014, 15:59 http://www.biomedcentral.com/2050-6511/15/59 Chen et al. BMC Pharmacology and Toxicology 2014, 15:59 http://www.biomedcentral.com/2050-6511/15/59 gradually inhibited to 46% by a 160 μM nobiletin treat- ment (p < 0.01). An overall inhibitory effect on cell via- bility was observed for both cell lines, although DU-145 (IC-50 = 137 μM nobiletin) cells appear more resistant than PC-3 cells (IC-50 = 117 μM nobiletin) to the inhi- biting effect of nobiletin. It is in agreement with the cell viability determined by WST-1 assay [21]. of three independent experiments were carried out for statistical analysis. of three independent experiments were carried out for statistical analysis. Nobiletin inhibits VEGF expression in prostate cancer cell line PC-3 The levels of VEGF protein in PC-3 cell culture super- nates were down-regulated to 70% at a concentration of 10 μM nobiletin (p < 0.01) and to 18% at a concentration of 160 μM nobiletin (p < 0.01) (Figure 3). However, the levels of VEGF protein in DU-145 cells ranged from 90-110% with no consistency with respect to nobiletin concentration. Our study revealed that VEGF expression was significantly (p < 0.01) reduced in PC-3 cancer cells by nobiletin treatment. Statistical analysis Results were expressed as mean ± standard error of mean (SEM). Statistical assessment was carried out with the program system of SPSS (Version 16.0 for Windows). The results were analyzed using one-way analysis of variance (ANOVA) and post hoc test (2-sided Dunnett's t) to test both overall differences and specific differences between each treatment and control. A p value of less than 0.05 was considered significant. Nobiletin inhibits HIF-1α (Hypoxia inducible factor) protein expression in prostate cancer cell lines HIF-1α protein levels in PC-3 cells showed intense and consistent down-regulation by nobiletin treatment (Figure 4). A 20 μM nobiletin treatment led to inhibition of HIF-1α protein to 70% (p < 0.01). Higher concentra- tions of nobiletin resulted in greater inhibition, with the levels of HIF-1α protein down to 48% by a 40 μM nobiletin treatment (p < 0.05) and 10% by a 80 μM nobiletin treatment (p < 0.01). HIF-1α protein levels in DU-145 cells showed consistent but gradual down- regulation by nobiletin treatment. DU-145 cells seem to be much more resistant to nobiletin treatment with down-regulation ranging from 94% at a concentration of 20 μM nobiletin to 79% at a concentration of 80 μM nobiletin (p < 0.05). HIF-1α expression in both cells lines (PC-3 and DU-145) was inhibited by nobiletin treatment, with a greater inhibition in PC-3 cells. Transient transfection and luciferase assay PC-3 prostate cancer cells were seeded in 96-well plate at 104 cells/well and incubated overnight. The cells were then transfected with 0.05 μg VEGF (Hif-1α) luciferase reporter, 0-0.25 μg HIF-1α (AKT) or SR-α plasmids by 0.6 μL jetPRIME reagent (VWR, West Chester, PA) for 4 hours, followed by 16 hour treatment with 0 or 40 μM nobiletin. The cells were harvested and analyzed for luciferase and total protein levels, and the levels of VEGF (HIF-1α) reporter were normalized by corresponding total protein levels. Data represent Means ± SE from three independent experiments. Nobiletin inhibits phosphorylation of AKT in prostate cancer cell lines P-AKT levels were down-regulated from 65% by a 20 μM nobiletin treatment to 56% by a 80 μM nobiletin treatment (p < 0.01) in PC-3 cells (Figure 5). In DU-145 cells, p-AKT levels were down-regulated to 67% by a 20 μM nobiletin treatment (p < 0.05), to 51% by a 80 μM nobiletin treatment (p < 0.01). The percentage of down-regulation in each cell line was similar at each treatment concentration and indi- cates that nobiletin could decrease AKT phosphorylation for both PC-3 and DU-145. However, the observed down- regulation seemed to subside at 40 μM nobiletin treatment, with not much difference resulting at 80 μM nobiletin treatment for both cell lines. Therefore, higher concentra- tions may not be any more beneficial. Nobiletin inhibits cell viability in prostate cancer cell lines Cell viability steadily decreased as nobiletin concentra- tion increased in both cell lines (Figure 2). Beginning at a concentration of 10 μM nobiletin, PC-3 cell viability consistently decreased from 95% to 40% at a concentra- tion of 160 μM nobiletin (p < 0.01). Similarly, DU-145 cell viability was also inhibited with each successive doubling of concentration. At a concentration of 10 μM nobiletin cell viability was 92% (p < 0.05), which was Chen et al. BMC Pharmacology and Toxicology 2014, 15:59 http://www.biomedcentral.com/2050-6511/15/59 Page 4 of 10 a b c AU 0.00 1.00 2.00 3.00 4.00 5.00 6.00 Minutes 2.00 4.00 6.00 8.00 10.00 12.00 14.00 16.00 18.00 20.00 22.00 24.00 26.00 28.00 30.00 32.00 0.00 0.10 0.20 0.30 0.40 0.50 0.60 0.70 nm 220.00 240.00 260.00 280.00 300.00 320.00 340.00 360.00 380.00 229.7 249.8 269.9 336.5 AU d e 1 Isolation and identification of nobiletin. (a) Preparation HPLC graph of nobiletin and tangeretin. (b) HPLC-MS graph of nobiletin. V-vis chromatography of nobiletin. (d) HPLC graph of nobiletin. a AU 0.00 1.00 2.00 3.00 4.00 5.00 6.00 Minutes 2.00 4.00 6.00 8.00 10.00 12.00 14.00 16.00 18.00 20.00 22.00 24.00 26.00 28.00 30.00 32.00 b b c 0.00 0.10 0.20 0.30 0.40 0.50 0.60 0.70 nm 220.00 240.00 260.00 280.00 300.00 320.00 340.00 360.00 380.00 229.7 249.8 269.9 336.5 AU d Figure 1 Isolation and identification of nobiletin. (a) Preparation HPLC graph of nobiletin and tangeretin. (b) HPLC-MS graph of nobiletin. (c) UV-vis chromatography of nobiletin. (d) HPLC graph of nobiletin. d Figure 1 Isolation and identification of nobiletin. (a) Preparation HPLC graph of nobiletin and tangeretin. Nobiletin inhibits phosphorylation of AKT in prostate cancer cell lines (b) HPLC-MS graph of nobiletin. (c) UV-vis chromatography of nobiletin. (d) HPLC graph of nobiletin. Chen et al. BMC Pharmacology and Toxicology 2014, 15:59 http://www.biomedcentral.com/2050-6511/15/59 Page 5 of 10 DU-145 PC-3 a b Figure 2 Effect of nobiletin on viability of PC-3 and DU-145 cells. (a) DU-145 cells, (b) PC-3 cells. Cells (5.0 × 103 /well) were seeded in 96-well plates, incubated for 16 h, and treated with nobiletin for 24 h. Cell viability was colorimetrically determined by a MTS-based method and expressed as percentages of control. Data represents mean ± SE from 3 independent experiments. *P < 0.05 as compared to control. **P < 0.01 as compared to control. DU-145 PC-3 a b Figure 2 Effect of nobiletin on viability of PC-3 and DU-145 cells. (a) DU-145 cells, (b) PC-3 cells. Cells (5.0 × 103 /well) were seeded in 96-well plates, incubated for 16 h, and treated with nobiletin for 24 h. Cell viability was colorimetrically determined by a MTS-based method and expressed as percentages of control. Data represents mean ± SE from 3 independent experiments. *P < 0.05 as compared to control. **P < 0.01 as compared to control. b a Figure 2 Effect of nobiletin on viability of PC-3 and DU-145 cells. (a) DU-145 cells, (b) PC-3 cells. Cells (5.0 × 103 /well) were seeded in 96-well plates, incubated for 16 h, and treated with nobiletin for 24 h. Cell viability was colorimetrically determined by a MTS-based method and expressed as percentages of control. Data represents mean ± SE from 3 independent experiments. *P < 0.05 as compared to control. **P < 0.01 as compared to control. Effect of nobiletin on PTEN expression Nobiletin inhibits cMyc expression in prostate cancer cell line DU-145 Nobiletin inhibits cMyc expression in prostate cancer cell line DU-145 Our study found that nobiletin had no significant effect on PTEN expression in DU-145 cells (Figure 8). PTEN was not expressed in PC-3 cells. In PC-3 cells, cMyc levels were slightly down regulated to 93% by a 40 μM nobiletin treatment and to 90% by a 80 μM nobiletin treatment (Figure 6). The results were very gradual, revealing that the PC-3 cells have a high level of resistance and there was no statistical significance among treatments. The cMyc levels in DU-145 cells were down-regulated to 79-84% by nobiletin treatment. Nobiletin inhibits VEGF expression through regulating AKT and HIF-1α gene in prostate cancer cell line PC-3 AKT and HIF-1α gene in prostate cancer cell line PC-3 We used PC-3 cancer cells with low levels of AKT and HIF-1α expression to test whether nobiletin affects VEGF expression. Our study found that transfected plasmid AKT and HIF-1α concentration-dependently reversed nobiletin’s inhibitory effects (Figure 9). Our findings sug- gest that nobiletin regulates VEGF expression through down-regulating AKT and HIF-1α in prostate cancer cells. Nobiletin inhibits NF-κB (p50) expression in nucleus of prostate cancer cell NF-κb (p50) expression was down-regulated in both whole cells and nuclei of PC-3 cells when treated with nobiletin. At the concentration of 80 μM nobiletin, its expression was inhibited by 28% (p < 0.01) and 37% (p < 0.05) respectively in whole cells and nuclei. In nuclei of DU145 cells, p50 expression was inhibited to 42% (p < 0.01) by a 40 μM nobi- letin treatment and 10% (p < 0.01) by a 80 μM nobiletin treatment (Figure 7). However, its expression in whole cells was up-regulated to 103-112% with higher concentrations of nobiletin resulting in greater promotion. Nobiletin inhibits phosphorylation of AKT in prostate cancer cell lines There- fore, nobiletin reduced cMyc expression in DU-145 cells, but showed no evidence of inhibition in PC-3 cells. Discussion Approximately 25% of all newly diagnosed cancers in American men are prostate cancer [2]. The risk of devel- oping prostate cancer is associated with advancing age, African American ethnicity, and a positive family history [4]. However, research has also shown that diet and other lifestyle factors may influence prostate cancer risk [4]. Studies relating lifestyle to the risk of prostate cancer Figure 3 Effect of nobiletin on VEGF expression in PC-3 and DU-145 cells. (a) DU-145. (b) PC-3. Cells (1.0 × 104/well) were seeded into 96-well plates , incubated for 16 h, and treated with nobiletin for 24 h. Vascular endothelial growth factor (VEGF) in cellculture supernate were analyzed with a Quantikine Human VEGF Immunoassay Kit from R&D Systems (Minneapolis, MN). Data represents mean ± SE from 3 independent experiments. *P < 0.05 as compared to control. **P < 0.01 as compared to control. Figure 3 Effect of nobiletin on VEGF expression in PC-3 and DU-145 cells. (a) DU-145. (b) PC-3. Cells (1.0 × 104/well) were seeded into 96-well plates , incubated for 16 h, and treated with nobiletin for 24 h. Vascular endothelial growth factor (VEGF) in cellculture supernate were analyzed with a Quantikine Human VEGF Immunoassay Kit from R&D Systems (Minneapolis, MN). Data represents mean ± SE from 3 independent experiments. *P < 0.05 as compared to control. **P < 0.01 as compared to control. Chen et al. BMC Pharmacology and Toxicology 2014, 15:59 http://www.biomedcentral.com/2050-6511/15/59 Page 6 of 10 Nobiletin(µM) 0 20 40 80 Nobiletin(µM) 0 20 40 80 PC-3 HIF-1 DU-145 HIF-1 PC-3 GAPDH DU-145 GAPDH Figure 4 Nobiletin's effects on HIF-1α expression in PC-3 and DU-145 cells. Nobiletin's effect on HIF-1α expression. PC-3 and DU-145 cells (1.0 × 106) were seeded in 60-mm dishes, incubated overnight, and treated with nobiletin for 24 hours. Cells were harvested and analyzed by SDS-PAGE and Western Blotting. HIF-1α protein levels were normalized by GAPDH protein levels. Data represents means ± SE from 3 independent experiments. *P < 0.05 compared to control. **P < 0.01 compared to control. Nobiletin(µM) 0 20 40 80 DU-145 HIF-1 DU-145 GAPDH Figure 4 Nobiletin's effects on HIF-1α expression in PC-3 and DU-145 cells. Nobiletin's effect on HIF-1α expression. PC-3 and DU-145 cells (1.0 × 106) were seeded in 60-mm dishes, incubated overnight, and treated with nobiletin for 24 hours. Cells were harvested and analyzed by SDS-PAGE and Western Blotting. Discussion BMC Pharmacology and Toxicology 2014, 15:59 http://www.biomedcentral.com/2050-6511/15/59 Page 7 of 10 Page 7 of 10 Nobiletin(µM) 0 20 40 80 Nobiletin(µM) 0 20 40 80 PC-3 cMyc DU-145 cMyc PC-3 GAPDH DU-145 GAPDH Figure 6 Nobiletin’s effect on cMyc. PC-3 and DU-145 cells (1.0 × 106) were seeded in 60-mm dishes, incubated overnight, and treated with nobiletin for 24 hours. Cells were harvested and analyzed by SDS-PAGE and Western Blotting. cMyc levels were normalized by GAPDH protein levels and expressed as percentages of control. Data represents means ± SE from 3 independent experiments. *P < 0.05 compared to control. **P < 0.01 compared to control. Nobiletin(µM) 0 20 40 80 DU-145 cMyc DU-145 GAPDH Figure 6 Nobiletin’s effect on cMyc. PC-3 and DU-145 cells (1.0 × 106) were seeded in 60-mm dishes, incubated overnight, and treated with nobiletin for 24 hours. Cells were harvested and analyzed by SDS-PAGE and Western Blotting. cMyc levels were normalized by GAPDH protein levels and expressed as percentages of control. Data represents means ± SE from 3 independent experiments. *P < 0.05 compared to control. **P < 0.01 compared to control. Figure 6 Nobiletin’s effect on cMyc. PC-3 and DU-145 cells (1.0 × 106) were seeded in 60-mm dishes, incubated overnight, and treated with nobiletin for 24 hours. Cells were harvested and analyzed by SDS-PAGE and Western Blotting. cMyc levels were normalized by GAPDH protein levels and expressed as percentages of control. Data represents means ± SE from 3 independent experiments. *P < 0.05 compared to control. **P < 0.01 compared to control. We tested the effectiveness of the preventive and/or treatment measures that nobiletin exhibits on PC-3 and DU-145 prostate cancer cells and showed that PC-3 and DU-145 cell viability was suppressed concentration- dependently by nobiletin treatment. Several pathways including VEGF, HIF-1α, AKT phosphorylation, cMyc, and NF-κB influence cell viability inhibition. In both cell lines, nobiletin inhibited phosphorylation of AKT, which is known to be the major signal for cell survival and proliferation [22]. Nobiletin treatment also reduced NF-κB (p50) expression in nuclei of both prostate cancer cells. NF-κB activation plays many roles when it enter into Figure 7 Nobiletin's effect on NF-κB (p50) expression. (a) Effect of nobiletin on total NF-kB expression, (b) Effect of nobiletin on nuclear NF-kB expression. PC-3 and DU-145 cells (1.0 × 106) were seeded in 60 mm dishes, incubated overnight, and treated with nobiletin for 24 hours. Discussion HIF-1α protein levels were normalized by GAPDH protein levels. Data represents means ± SE from 3 independent experiments. *P < 0.05 compared to control. **P < 0.01 compared to control. Nobiletin, a citrus polymethoxy flavonoid, possesses an- ticancer, antiviral, and anti-inflammatory activities [14]. More specifically, recent findings have identified nobiletin as a cell differentiation modulator. Cell differentiation is a crucial step in angiogenesis and therefore could affect tumor growth and metastasis which both depend on angiogenesis [15]. These findings support the proposition that nobiletin is functionally unique and could be a pos- sible chemopreventive agent in inflammation-associated tumorigenesis [17]. have become more prevalent in recent years due to the escalating number of prostate cancer cases. It has been suggested that dietary intake of natural products rich in flavonoids from citrus fruits may play a role in the prevention of cancer [8]. Tangeretin, nobiletin, hesperetin, hesperidin, naringenin, and naringin are just a few examples of citrus flavonoids that have the potential to be used as chemotherapeutic agents. Research has shown that these flavonoids possess inhibition activity on certain cancer cells' growth through various mechanisms [8]. Nobiletin(µM) 0 20 40 80 Nobiletin(µM) 0 20 40 80 PC-3 p-AKT DU-145 p-AKT PC-3 t-AKT DU-145 t-AKT Figure 5 Nobiletin's effect on AKT phosphorylation in PC-3 and DU-145 cells. PC-3 and DU-145 cells (1.0 × 106) were seeded in 60-mm dishes, incubated overnight, and treated with nobiletin for 24 hours. Cells were harvested and analyzed by SDS-PAGE and Western Blotting. P-AKT protein levels were normalized by total AKT protein levels and expressed as percentages of control. Data represents means ± SE from 3 independent experiments. *P < 0.05 compared to control. **P < 0.01 compared to control. Figure 5 Nobiletin's effect on AKT phosphorylation in PC-3 and DU-145 cells. PC-3 and DU-145 cells (1.0 × 106) were seeded in 60-mm dishes, incubated overnight, and treated with nobiletin for 24 hours. Cells were harvested and analyzed by SDS-PAGE and Western Blotting. P-AKT protein levels were normalized by total AKT protein levels and expressed as percentages of control. Data represents means ± SE from 3 independent experiments. *P < 0.05 compared to control. **P < 0.01 compared to control. Chen et al. Discussion Cells were harvested and analyzed by SDS-PAGE and Western Blotting. NF-кB protein levels whole cells were normalized by GAPDH protein levels and its protein levels of nucleus were normalized by PCNA protein levels. They were expressed as percentages of control. Data represents means ± SE from 3 independent experiments. *P < 0.05 compared to control. **P < 0.01 compared to control. Figure 7 Nobiletin's effect on NF-κB (p50) expression. (a) Effect of nobiletin on total NF-kB expression, (b) Effect of nobiletin on nuclear NF-kB expression. PC-3 and DU-145 cells (1.0 × 106) were seeded in 60 mm dishes, incubated overnight, and treated with nobiletin for 24 hours. Cells were harvested and analyzed by SDS-PAGE and Western Blotting. NF-кB protein levels whole cells were normalized by GAPDH protein levels and its protein levels of nucleus were normalized by PCNA protein levels. They were expressed as percentages of control. Data represents means ± SE from 3 independent experiments. *P < 0.05 compared to control. **P < 0.01 compared to control. Chen et al. BMC Pharmacology and Toxicology 2014, 15:59 http://www.biomedcentral.com/2050-6511/15/59 Page 8 of 10 Nobiletin(µM) 0 20 40 80 Nobiletin(µM) 0 20 40 80 PC-3 PTEN DU-145 PTEN PC-3 GAPDH DU-145 GAPDH Figure 8 Nobiletin’s effect on PTEN expression. PC-3 and DU-145 cells (1.0 × 106) were seeded in 60-mm dishes, incubated overnight, and treated with nobiletin for 24 hours. Cells were harvested and analyzed by SDS-PAGE and Western Blotting. PTEN protein levels were normalized by GAPDH protein levels and expressed as percentages of control. Data represents means ± SE from 3 independent experiments. *P < 0.05 compared to control. **P < 0.01 compared to control. Figure 8 Nobiletin’s effect on PTEN expression. PC-3 and DU-145 cells (1.0 × 106) were seeded in 60-mm dishes, incubated overnight, and treated with nobiletin for 24 hours. Cells were harvested and analyzed by SDS-PAGE and Western Blotting. PTEN protein levels were normalized by GAPDH protein levels and expressed as percentages of control. Data represents means ± SE from 3 independent experiments. *P < 0.05 compared to control. **P < 0.01 compared to control. and AKT phosphorylation, indicating that AKT may influ- ence cell viability by its effect on NF-κB in both prostate cells. It was also found that HIF-1α promoter is responsive to selective NF-κB subunits, indicating that NF-κB is a direct modulator of HIF-1α expression [29]. Discussion VEGF is a signal protein produced by cells related to vasculogenesis and angiogenesis, and it is also the downstream gene of HIF-1α. Our study revealed that VEGF expression was significantly (p < 0.01) reduced in PC-3 cancer cells by nobiletin treatment. HIF-1α expression in both cells lines (PC-3 and DU-145) was also inhibited by nobiletin the nucleus, including initiating cellular transformation, mediating cellular proliferation, mediating cellular inva- sion and angiogenesis, mediating metastasis, and linking inflammation and cancer [23,24]. Suppression of NF-κB in tumor samples also inhibits proliferation, causes cell cycle arrest, and leads to apoptosis, indicating the crucial role of NF-κB in cell proliferation and survival [25]. Some researchers have found that the expression, activation and translocation of NF-κB were regulated by AKT pathways [26-28]. Our results showed that nobiletin treatment could decrease NF-κB expression in nuclei of both cells Figure 9 Nobiletin inhibits VEGF expression by regulating AKT and HIF-1α gene in PC-3 cells. (a) Nobiletin inhibits VEGF expression by regulating HIF-1 α gene, (b) Nobiletin inhibits VEGF expression by regulating AKT gene. PC-3 prostate cancer cells were seeded in 96-well plate at 10,000 cells/well and incubated overnight. The cells were then transfected with 0.05 ug VEGF (Hif-1α) luciferase reporter, 0-0.25 μg HIF-1α (AKT) or SR-α plasmids by 0.6 μL jetPRIME reagent for 4 hours, followed by 16 hour treatment with 0 or 40 μM nobiletin. The cells were harvested and analyzed for luciferase and total protein levels, and the levels of VEGF (Hif-1α) reporter were normalized by corresponding total protein levels. Data represent Means ± SE from 3 independent experiments. #p < 0.05 as compared to control. ##p <0.01 as compared to control. *p <0.05 as compared to nobiletin-treated control. **p <0.01 as compared to nobiletin-treated control. Figure 9 Nobiletin inhibits VEGF expression by regulating AKT and HIF-1α gene in PC-3 cells. (a) Nobiletin inhibits VEGF expression by regulating HIF-1 α gene, (b) Nobiletin inhibits VEGF expression by regulating AKT gene. PC-3 prostate cancer cells were seeded in 96-well plate at 10,000 cells/well and incubated overnight. The cells were then transfected with 0.05 ug VEGF (Hif-1α) luciferase reporter, 0-0.25 μg HIF-1α (AKT) or SR-α plasmids by 0.6 μL jetPRIME reagent for 4 hours, followed by 16 hour treatment with 0 or 40 μM nobiletin. Discussion The cells were harvested and analyzed for luciferase and total protein levels, and the levels of VEGF (Hif-1α) reporter were normalized by corresponding total protein levels. Data represent Means ± SE from 3 independent experiments. #p < 0.05 as compared to control. ##p <0.01 as compared to control. *p <0.05 as compared to nobiletin-treated control. **p <0.01 as compared to nobiletin-treated control. Figure 9 Nobiletin inhibits VEGF expression by regulating AKT and HIF-1α gene in PC-3 cells. (a) Nobiletin inhibits VEGF expression by regulating HIF-1 α gene, (b) Nobiletin inhibits VEGF expression by regulating AKT gene. PC-3 prostate cancer cells were seeded in 96-well plate at 10,000 cells/well and incubated overnight. The cells were then transfected with 0.05 ug VEGF (Hif-1α) luciferase reporter, 0-0.25 μg HIF-1α (AKT) or SR-α plasmids by 0.6 μL jetPRIME reagent for 4 hours, followed by 16 hour treatment with 0 or 40 μM nobiletin. The cells were harvested and analyzed for luciferase and total protein levels, and the levels of VEGF (Hif-1α) reporter were normalized by corresponding total protein levels. Data represent Means ± SE from 3 independent experiments. #p < 0.05 as compared to control. ##p <0.01 as compared to control. *p <0.05 as compared to nobiletin-treated control. **p <0.01 as compared to nobiletin-treated control. Chen et al. BMC Pharmacology and Toxicology 2014, 15:59 http://www.biomedcentral.com/2050-6511/15/59 Page 9 of 10 treatment, with a greater inhibition in PC-3 cells. Fur- thermore, it was found that nobiletin inhibited VEGF expression through regulating AKT/HIF-1α pathways in prostate cancer cell line PC-3. Increasing HIF-1α levels actually reversed nobiletin’s inhibitory effects on VEGF expression. Similarly up-regulating AKT levels reversed its inhibitory effects on HIF-1α expression. These results correspond to a previous study that HIF-1α/VEGF expression can be regulated by AKT pathways [30]. Nobi- letin reduced cMyc expression in DU-145 cells, but showed no evidence of inhibition in PC-3 cells. PTEN has been shown to play a pivotal role in apoptosis, cell cycle arrest, and possibly cell migration. PTEN is the most frequently mutated gene in prostate cancer, loss of hetero- zygosity at 10q23 can be detected in approximately 50% of human prostate cancers, whereas homozygous deletions of PTEN can be detected in approximately 10% of these cases [31]. However, nobiletin appears to lower cell viability through a mechanism independent of PTEN, as it does not seem to affect PTEN concentrations. distribution, metabolism, and excretion of nobiletin into consideration. References Meiyanto E, Hermawan A, Anindyajati: Natural products for cancer-targeted therapy: citrus flavonoids as potent chemopreventive agents. Asian Pac J Cancer Prev 2012, 13:427–436. Acknowledgments This research was supported by a West Virginia Experimental Program to Stimulate Competitive Research grant and an NIH grant (5P20RR016477 and 8P20GM104434) from the National Center for Research Resources awarded to the West Virginia IDeA Network of Biomedical Research Excellence. Authors’ contributions d h JC carried out the majority of experimental work. YC drafted the manuscript. All authors participated in experimental design and read and approved the final manuscript. References 1. Mohile SG, Shelke AR: Treating prostate cancer in elderly men: how does aging affect the outcome? Curr Treat Options Oncol 2011, 12:263–275. 1. Mohile SG, Shelke AR: Treating prostate cancer in elderly men: how does aging affect the outcome? Curr Treat Options Oncol 2011, 12:263–275. aging affect the outcome? Curr Treat Options Oncol 2011, 12:263–275. 2. Crawford E: Understanding the epidemiology, natural history, and key pathways involved in prostate cancer. Urology 2009, 73:4–10. 3. Bosland MC: The role of steroid hormones in prostate carcinogenesis. J Natl Cancer Inst Monogr 2000 27:39 66 2. Crawford E: Understanding the epidemiology, natural history, and key pathways involved in prostate cancer. Urology 2009, 73:4–10. 3. Bosland MC: The role of steroid hormones in prostate carcinogenesis. J Natl Cancer Inst Monogr 2000, 27:39–66. 4. Crawford E: Epidemiology of prostate cancer. Urology 2003, 62:3–12. 4. Crawford E: Epidemiology of prostate cancer. Urology 2003, 62:3–12. 5. Gronberg H: Prostate cancer epidemiology. Lancet 2003, 361:859–864. 4. Crawford E: Epidemiology of prostate cancer. Urology 2003, 62:3–12. 5 G b H P t t id i l L t 2003 361 859 864 4. Crawford E: Epidemiology of prostate cancer. Urology 2003, 62:3–12. 5. Gronberg H: Prostate cancer epidemiology. Lancet 2003, 361:859–864. 5. Gronberg H: Prostate cancer epidemiology. Lancet 2003, 361:859–864. 6. Whittemore AS, Kolonel LN, Wu AH, John EM, Gallagher RP, Howe GR: Prostate cancer in relation to diet, physical activity, and body size in blacks, whites, and Asians in the United States and Canada. J Natl Cancer Inst 1995, 87:652–661. 6. Whittemore AS, Kolonel LN, Wu AH, John EM, Gallagher RP, Howe GR: Prostate cancer in relation to diet, physical activity, and body size in blacks, whites, and Asians in the United States and Canada. J Natl Cance Inst 1995, 87:652–661. 7. Gupta S, Kim J, Prasad S, Aggarwal B: Regulation of survival, proliferation, invasion, angiogenesis, and metastasis of tumor cells through modulation of inflammatory pathways by nutraceuticals. Cancer and Metastasis Reviews 2010, 29:405–434. 7. Gupta S, Kim J, Prasad S, Aggarwal B: Regulation of survival, proliferation, invasion, angiogenesis, and metastasis of tumor cells through modulation of inflammatory pathways by nutraceuticals. Cancer and Metastasis Reviews 2010, 29:405–434. 8. Meiyanto E, Hermawan A, Anindyajati: Natural products for cancer-targeted therapy: citrus flavonoids as potent chemopreventive agents. Asian Pac J Cancer Prev 2012, 13:427–436. 8. Discussion Further studies in animal models and human trials are warranted to determine if physicians can promote this natural compound toward chemoprevention of prostate cancer cells. Competing interest The authors state that they have no competing interest. Author details 1 1College of Biosystems Engineering and Food Science, Fuli Institute of Food Science, Zhejiang Key Laboratory for Agro-Food Processing, Zhejiang University, Hangzhou 310058, China. 2College of Science, Technology and Mathematics, Alderson Broaddus University, Philippi, WV 26416, USA. 3Department of Pharmaceutical Science, West Virginia University, Morgantown, WV 26506, USA. 4Department of Pharmacology, Physiology and Toxicology, Joan C. Edwards School of Medicine, Marshall University, Huntington, WV 25755, USA. Our research indicated that nobiletin is a good candidate for the chemoprevention of prostate cancer in humans and could be an effective measure in inhibiting prostate cancer cell viability. Nobiletin has the apparent ability to suppress cell viability through multiple pathways, thus inhibiting tumor growth. Most encouraging is its capacity to suppress the more metastatic PC-3 cell line. Since the lethality of a tumor links directly to its ability to spread, nobiletin promises to increase the prostate cancer survival rate. However, more data needs to be obtained on nobiletin’s toxicity and tolerable dosages before it can become part of prostate cancer prevention and/or treatment. Also, as an in vitro model, cell culture cannot take absorption, distribution, metabolism, and excretion of nobiletin into consideration. Further studies in animal models and hu- man trials are warranted to determine if physicians can promote this natural compound toward chemoprevention of prostate cancer cells. Received: 6 June 2014 Accepted: 14 October 2014 Published: 24 October 2014 Chen et al. BMC Pharmacology and Toxicology 2014, 15:59 http://www.biomedcentral.com/2050-6511/15/59 Chen et al. BMC Pharmacology and Toxicology 2014, 15:59 http://www.biomedcentral.com/2050-6511/15/59 angiogenesis-related endothelial cell functions and angiogenesis in vivo. Cancer Sci 2010, 101:2462–2469. 16. Nichenametla S, Taruscio TG, Barney DL, Exon JH: A review of the effects and mechanisms of polyphenolics in cancer. Crit Rev Food Sci Nutr 2006, 46:161–183. 17. Murakami A, Nakamura Y, Torikai K, Tanaka T, Koshiba T, Koshimizu K, Kuwahara S, Takahashi Y, Ogawa K, Yano M, Tokuda H, Nishino H, Mimaki Y, Sashida Y, Kitanaka S, Ohigashi H: Inhibitory effect of citrus nobiletin on phorbol ester-induced skin inflammation, oxidative stress, and tumor promotion in mice. Cancer Res 2000, 60:5059–5066. 18. Kim SJ, Uehara H, Yazici S, Langley RR, He J, Tsan R, Fan D, Killion JJ, Fidler IJ: Simultaneous blockade of platelet-derived growth factor-receptor and epidermal growth factor-receptor signaling and systemic administration of paclitaxel as therapy for human prostate cancer metastasis in bone of nude mice. Cancer Res 2004, 64:4201–4208. 19. Kim SJ, Johnson M, Koterba K, Herynk MH, Uehara H, Gallick GE: Reduced c-Met expression by an adenovirus expressing a c-Met ribozyme inhibits tumorigenic growth and lymph node metastases of PC3-LN4 prostate tumor cells in an orthotopic nude mouse model. Clin Cancer Res 2003, 9:5161–5170. 20. Pulukuri SM, Gondi CS, Lakka SS, Jutla A, Estes N, Gujrati M, Rao JS: RNA interference-directed knockdown of urokinase plasminogen activator and urokinase plasminogen activator receptor inhibits prostate cancer cell invasion, survival, and tumorigenicity in vivo. Journal of Biological Chemisry 2005, 280:36529–36540. 21. Tang M, Ogawa K, Asamoto M, Hokaiwado N, Seeni A, Suzuki S, Takahashi S, Tanaka T, Ichikawa K, Shirai T: Protective effects of citrus nobiletin and auraptene in transgenic rats developing adenocarcinoma of the prostate (TRAP) and human prostate carcinoma cells. Cancer Sci 2007, 98:471–477. 22. Fang J, Zhou Q, Shi XL, Jiang BH: Luteolin inhibits insulin-like growth factor 1receptor signaling in prostate cancer cells. Carcinogenesis 2007, 28:713–723. 23. Aggarwal BB: Nuclear-factor-κB: The enemy within. Cancer Cell 2004, 6:203–206. 24. Gilmore TD: Introduction to NF-κB: players, pathways, perspectives. Oncogene 2006, 25:6680–6684. 25. Bharti AC, Aggarwal BB: Nuclear factor-κB and cancer: Its role in prevention and therapy. Biochem Pharmacol 2002, 64:883–888. 26. Kar S, Palit S, Ball WB, Das PK: Carnosic acid modulates Akt/IKK/NF-κB signaling by PP2A and induces intrinsic and extrinsic pathway mediated apoptosis in human prostate carcinoma PC-3 cells. Apoptosis 2012, 17:735–747. 27. Conclusion Our research indicated that nobiletin is a good candidate for the chemoprevention of prostate cancer in humans and could be an effective measure in suppressing pros- tate cancer cell viability. For these two prostate cancer cell lines, nobiletin has the apparent ability to suppress cell viability concentration-dependently through multiple pathways (VEGF, HIF-1α, AKT phosphorylation, cMyc, and NF-κB). Because nobiletin seems to work better against the more dangerous PC-3 cell line, nobiletin holds real potential in improving prostate cancer outcomes. However, more data needs to be obtained on nobiletin’s toxicity and tolerable dosages before it can become part of prostate cancer prevention and/or treatment. Also, as an in vitro model, cell culture cannot take absorption, 9. Yang C, Wang X, Lu G, Picinich S: Cancer prevention by tea: animal studies, molecular mechanisms and human relevance. Nat Rev Cancer 2009, 9:429–439. 9. Yang C, Wang X, Lu G, Picinich S: Cancer prevention by tea: animal studies, molecular mechanisms and human relevance. Nat Rev Cancer 2009, 9:429–439. 10. Gates M, Vitonis A, Tworoger S, Rosner B, Titus-Ernstoff L, Hankinson S, Cramer H: Flavonoid intake and ovarian cancer risk in a population based case-control study. Int J Cancer 2009, 124:1918–1925. 11. McCann S, Freudenheim J, Marshall J, Saxon G: Risk of human ovarian cancer is related to dietary intake of selected nutrients, phytochemicals and food groups. Journal of Nutrition 2003, 133:1937–1942. 12. Bernini R, Crisante F, Ginnasi MC: A convenient and safe O-methylation offlavonoids with dimethyl carbonate (DMC). Molecules 2011, 16:1418–1425. 13. Knekt P, Järvinen R, Seppänen R, Heliövaara M, Teppo L, Pukkala E, Aromaa A: Dietary flavonoids and the risk of lung cancer and other malignant neoplasms. Am J Epidemiol 1997, 146:223–230. 14. Li S, Yu H, Ho CT: Nobiletin: efficient and large quantity isolation from orange peel extract. Biomed Chromatogr 2006, 20:133–138. 15. Kunimasa K, Ikekita M, Sato M, Ohta T, Yamori Y, Ikeda M, Kuranuki S, Oikawa T: Nobiletin, a citrus polymethoxy flavonoid, suppresses multiple 15. Kunimasa K, Ikekita M, Sato M, Ohta T, Yamori Y, Ikeda M, Kuranuki S, Oikawa T: Nobiletin, a citrus polymethoxy flavonoid, suppresses multiple Page 10 of 10 Page 10 of 10 Chen et al. BMC Pharmacology and Toxicology 2014, 15:59 http://www.biomedcentral.com/2050-6511/15/59 Kim MO, Moon DO, Heo MS, Lee JD, Jung JH, Kim SK, Choi YH, Kim GY: Pectenotoxin-2 abolishes constitutively activated NF-κB, leading to suppression of NF-κB related gene products and potentiation of apoptosis. Cancer Letter 2008, 271:25–33. 28. Ozes ON, Mayo LD, Gustin JA, Pfeffer SR, Pfeffer LM, Donner DB: NF-κB activation by tumour necrosis factor requires the Akt serine-threonine kinase. Nature 1999, 401:82–85. 29. Uden PV, Kenneth NS, Rocha S: Regulation of hypoxia-inducible factor-1α by NF-κB. Biochemical Journal 2008, 412:477–484. 30. Shi YH, Wang YX, Bingle L, Gong LH, Heng WJ, Li Y, Fang WG: In vitro study of HIF-1 activation and VEGF release by bFGF in the T47D breast cancer cell line under normoxic conditions: involvement of PI-3K/Akt and MEK1/ERK pathways. Journal of Pathology 2005, 205:530–536. 31. Chu EC, Tarnawski AS: PTEN regulatory functions in tumor suppression and cell biology. Med Sci Monit 2004, 10:RA235–241. Submit your next manuscript to BioMed Central and take full advantage of: • Convenient online submission • Thorough peer review • No space constraints or color figure charges • Immediate publication on acceptance • Inclusion in PubMed, CAS, Scopus and Google Scholar • Research which is freely available for redistribution Submit your manuscript at www.biomedcentral.com/submit Submit your next manuscript to BioMed Central and take full advantage of: • Convenient online submission • Thorough peer review • No space constraints or color figure charges • Immediate publication on acceptance • Inclusion in PubMed, CAS, Scopus and Google Scholar • Research which is freely available for redistribution Submit your manuscript at www.biomedcentral.com/submit Submit your next manuscript to BioMed Central and take full advantage of: • Convenient online submission • Thorough peer review • No space constraints or color figure charges • Immediate publication on acceptance • Inclusion in PubMed, CAS, Scopus and Google Scholar • Research which is freely available for redistribution Submit your manuscript at www.biomedcentral.com/submit Submit your next manuscript to BioMed Central and take full advantage of: Submit your next manuscript to BioMed Central and take full advantage of: doi:10.1186/2050-6511-15-59 Cite this article as: Chen et al.: Nobiletin suppresses cell viability through AKT Pathways in PC-3 and DU-145 prostate cancer cells. BMC Pharmacology and Toxicology 2014 15:59. • Convenient online submission
https://openalex.org/W4207002079
https://link.springer.com/content/pdf/10.1007/s44192-022-00004-3.pdf
English
null
Men are the main COVID-19 transmitters: behavior or biology?
Discover Mental Health
2,022
cc-by
5,654
Monize V. R. Silva1 · Mateus V. de Castro1 · Maria Rita Passos‑Bueno1 · Paulo A. Otto2 · Michel S. Naslavsky2 · Mayana Zatz1 Received: 25 October 2021 / Accepted: 12 January 2022 © The Author(s) 2022    OPEN Abstract Background  COVID-19 has affected millions of people worldwide. Clinical manifestations range from severe cases with lethal outcome to mild or asymptomatic cases. Although the proportion of infected individuals does not differ between sexes, men are more susceptible to severe COVID-19, with a higher risk of death than women. Also, men are pointed out as more lax regarding protective measures, mask wearing and vaccination. Thus, we questioned whether sex-bias may be explained by biological pathways and/or behavioral aspects or both. Methods  Between July 2020 and July 2021, we performed an epidemiological survey including 1744 unvaccinated adult Brazilian couples, with there was at least one infected symptomatic member, who were living together during the COVID- 19 infection without protective measures. Presence or absence of infection was confirmed by RT-PCR and/or serology results. Couples were divided into two groups: (1) both partners were infected (concordant couples) and (2) one partner was infected and the spouse remained asymptomatic despite the close contact with the COVID-19 symptomatic partner (discordant couples). Statistical analysis of the collected data was performed aiming to verify a differential transmission potential between genders in couples keeping contact without protective measures. p g p p g p Results  The combination of our collected data showed that the man is the first (or the only) affected member in most cases when compared to women and that this difference may be explained by biological and behavioral factors.if Results  The combination of our collected data showed that the man is the first (or the only) affected member in most cases when compared to women and that this difference may be explained by biological and behavioral factors. Conclusions  The present study confirmed the existence of gender differences not only for susceptibility to infection and resistance to COVID-19 but also in its transmission rate. Conclusions  The present study confirmed the existence of gender differences not only for susceptibility to infection and resistance to COVID-19 but also in its transmission rate. Monize V. R. Silva and Mateus V. de Castro contributed equally for the manuscript *  Mayana Zatz, mayazatz@usp.br | 1Human Genome and Stem Cell Research Center (HUG‑CELL), Biosciences Institute, University of Sao Paulo, Sao Paulo, SP, Brazil. 2Department of Genetics and Evolutionary Biology, Biosciences Institute, University of Sao Paulo, Sao Paulo, SP, Brazil. Monize V. R. Silva and Mateus V. de Castro contributed equally for the manuscript Discover Mental Health (2022) 2:1 | https://doi.org/10.1007/s44192-022-00004-3 1  Introduction Independently of age, men are more likely to have complications by COVID-19 than women and if hospitalization is required, males are more at risk of death than females [19]. Interestingly, comparable gender differences also occur for other viral infections [20]. Furthermore, some behavioral aspects such as COVID-19 prevention and control measures vary between genders. A survey conducted in March–April 2020 indicated that men are more reluctant than women to wear protective masks and respect social distancing [21]. A recent survey conducted with almost 2000 American adults showed that the importance of masks for protection differ considerably between genders and males are more likely to consider masks as an infringement on their independ- ence and freedom [22]. Another survey with 2500 Americans showed that males are less inclined to wearing masks than females, although both genders consider masks shameful [23]. Other protective practices as handwashing and sanitizer use had been previously reported as more common among females [24] and this tendency is the same for COVID-19 pandemic [25].f Interestingly, preliminary surveys to evaluate sex-differences for COVID-19 vaccination intention showed that females intended less to be vaccinated, probably due to the fear as to side effects or even the desire to “not the first to be vac- cinated” [26–29]. Nonetheless, updated data compiled by The COVID-19 Sex-Disaggregated Data Tracker initiative by Global Health 5050 [30] has shown that more females are being vaccinated than males in many countries, including Brazil and U.S., as also shown by local media [31–33]. Considering the mental health impact due the pandemic, it was also observed that females experienced more depres- sion symptoms after lockdown while males experienced more anxiety symptoms [34], but after a few weeks the gender- differences disappeared and both groups experienced resilience feelings [35]. The mental impact of the pandemic in LMICs varied from immediate distress and discrimination experienced mainly by healthcare workers to long-term side effects such as higher prevalence of depression and other mood disorders as a result of social isolation, job insecurity, unemployment and economic distress [36]. It has been suggested that some individuals (named “superspreaders”) are able to transmit the virus to a great number of persons [37]. However, it is not known if this could be explained by behavior (men speaking louder without mask) or biologically (differences in lung capacity between sexes and ages). Highlights • There are sex differences in COVID-19 susceptibility and transmission between couples highly exposed to SARS-Cov-2 without protective measures; M ffi i t i t itt th • There are sex differences in COVID-19 susceptibility and transmission between couples highly exposed to SARS-Cov-2 without protective measures; • Men are more efficient virus transmitters than women; • Men are more efficient virus transmitters than women; • Sex-bias in COVID-19 transmission can be explained by differences in viral load in saliva, immune response and also behavioral protective differences between genders. • Sex-bias in COVID-19 transmission can be explained by differences in viral load in saliva, immune response and also behavioral protective differences between genders. Keywords  COVID-19 · Household transmission · Behavior · Adult couples · SARS-CoV-2 Monize V. R. Silva and Mateus V. de Castro contributed equally for the manuscript Monize V. R. Silva and Mateus V. de Castro contributed equally for the manuscript *  Mayana Zatz, mayazatz@usp.br | 1Human Genome and Stem Cell Research Center (HUG‑CELL), Biosciences Institute, University of Sao Paulo, Sao Paulo, SP, Brazil. 2Department of Genetics and Evolutionary Biology, Biosciences Institute, University of Sao Paulo, Sao Paulo, SP, Brazil. *  Mayana Zatz, mayazatz@usp.br | 1Human Genome and Stem Cell Research Center (HUG‑CELL), Biosciences Institute, University of Sao Paulo, Sao Paulo, SP, Brazil. 2Department of Genetics and Evolutionary Biology, Biosciences Institute, University of Sao Paulo, Sao Paulo, SP, Brazil. tal Health (2022) 2:1 | https://doi.org/10.1007/s44192-022-00004-3 1 3 1 3 3 | https://doi.org/10.1007/s44192-022-00004-3 Brief Communication Discover Mental Health Discover Mental Health Brief Communication (2022) 2:1 1  Introduction 1  Introduction Since the first reported case of COVID-19 in December 2019, some 200 million individuals have been infected by the novel coronavirus. Global epidemiological data revealed that age increases the risk of dying from COVID-19 because of the significant number of older adults with comorbidities [1–4]. Moreover, although there are no gender differences in the proportion of people infected by SARS-CoV-2, men are more susceptible to develop severe COVID-19 [5, 6]. Since the first reported case of COVID-19 in December 2019, some 200 million individuals have been infected by the novel coronavirus. Global epidemiological data revealed that age increases the risk of dying from COVID-19 because of the significant number of older adults with comorbidities [1–4]. Moreover, although there are no gender differences in the proportion of people infected by SARS-CoV-2, men are more susceptible to develop severe COVID-19 [5, 6].i COVID-19 pandemic caused a significant number of deaths worldwide, but the prevalence of comorbidities [7, 8], lower education levels, socioeconomic inequalities as the healthcare system inexperience to deal with the pandemic [9, 10] contributed to the increase of COVID-19 cases and deaths in low- and middle-income countries (LMICs) [11–13]. Most of these countries still show inadequate vaccination programs, lack of an accurate and rapid diagnosis as well as poor viral surveillance [10, 14–16], contributing for the emergence of COVID-19 waves and new SARS-CoV-2 variants [17, 18]. COVID-19 pandemic caused a significant number of deaths worldwide, but the prevalence of comorbidities [7, 8], lower education levels, socioeconomic inequalities as the healthcare system inexperience to deal with the pandemic [9, 10] contributed to the increase of COVID-19 cases and deaths in low- and middle-income countries (LMICs) [11–13]. Most of these countries still show inadequate vaccination programs, lack of an accurate and rapid diagnosis as well as poor viral surveillance [10, 14–16], contributing for the emergence of COVID-19 waves and new SARS-CoV-2 variants [17, 18]. Independently of age, men are more likely to have complications by COVID-19 than women and if hospitalization is required, males are more at risk of death than females [19]. Interestingly, comparable gender differences also occur for other viral infections [20]. Furthermore, some behavioral aspects such as COVID-19 prevention and control measures vary between genders. A survey conducted in March–April 2020 indicated that men are more reluctant than women to wear protective masks and respect social distancing [21]. 2  Methods We present an epidemiological survey (from July 2020 to July 2021) including 1744 adult Brazilian couples who were liv- ing together during the COVID-19 infection without protective measures. Their ages ranged from 20 to 70 years (overall mean age of 45 years, 44 for women and 46 for men). The positive diagnosis in symptomatic individuals was confirmed by RT-PCR and/or serology for the infected partners while negative results in both tests were confirmed in non-infected partners. These individuals presented complete information related to the infection event, sex, age, and diagnostic tests results. They were divided in two groups: (a) concordant couples where one spouse infected with confirmed COVID- 19 transmitted the infection to the partner and (b) discordant couples where one SARS-CoV-2 infected spouse was symptomatic while the partner was not, as confirmed by negative RT-PCR and serology results after viral exposure. The concordant and discordant couples were then subdivided according to which partner was infected first: men or women and women to men. Our whole data collection rationale from partners is presented in Fig. 1. Discover Mental Health (2022) 2:1 | https://doi.org/10.1007/s44192-022-00004-3 Brief Communication | https://doi.org/10.1007/s44192-022-00004-3 Brief Communication Discover Mental Health (2022) 2:1 | https://doi.org/10.1007/s44192-022-00004-3 Brief Communication Discover Mental Health 3  Results As seen in Table 1, concordant couples analysis showed that men are significantly more infectious than women, with an estimated chance of 146/230 = 0.635 (95% confidence interval: 0.569–0.697) of being the first one affected. The cor- responding female values were 84/230 = 0.365 (95% confidence interval 0.303–0.431). These differences in male/female values are statistically significant (χ2 = 16.713, P ≪ 0.0005). The analysis of the group of discordant couples showed again that men are preferentially affected, with a prob- ability estimated as 797/1367 = 0.583 (95% confidence interval: 0.557–0.609). The corresponding female values were 570/1367 = 0.417 (95% confidence interval: 0.391–0.443). The combination of data from concordant and dis- cordant couples showed that the man is preferentially affected in 146 + 797 = 943 occurrences and the woman in 84 + 576 = 660 instances (χ2 = 49.962, P ≪ 0.0005). χ Interestingly, the analysis of COVD-19 reports of the present cohort showed that some 62% among those who men- tioned keywords as “fear”, “excessive care”, “pandemic worries” and “anxiety” were sent by females. This observation is consistent with the results of a Brazilian survey with 4693 adults which showed that among 55% who declared that they were worried about the pandemic 62% were females and 45% males [39]. Such observation reporting that men were less worried about the pandemic than women could provide an explanation for their less protective behavior. 1  Introduction Biologically, viral transmission capability could be influenced by less aerosol emission by females and children [37]. These sex-based differences may be also associated with variances in biological pathways such as immune responses against SARS-CoV-2, the expression of X-chromo- some–encoded genes [20], or both. These observations led us to question whether the virus could be transmitted more frequently by men than by women, independently of protection measures, age and socio-economic status. In order to circumvent such differences, we have analyzed the virus transmission in couples who kept neither conjugal distancing during the infection period nor the use of protective measures. Moreover, the mean age did not differ significantly between spouses and both partners had a comparable socio-economic status. In a previous genetic study with 81 discordant couples for COVID-19, where one person was infected and symptomatic while the partner remained asymptomatic and serum-negative (despite remaining in close contact and sharing the same bed throughout the disease), we observed that there were significantly more women in the asymptomatic group [38]. Subsequently, there were reports of couples where the wife was infected by SARS-CoV-2 and clinically affected while the husband remained asymptomatic despite the close contact throughout the infection period. Some months later, the previously asymptomatic husbands beame infected and symptomatic after contact with male patients. Vol:1 :.(123456789 3 4  Discussion All the results obtained in the present study strongly suggest that males are not only more susceptible to COVID-19 severity, as shown in worldwide epidemiological surveys, but they are also more likely to transmit the virus to their partners when compared to females in the household transmission context. The epidemiological findings in the present survey are consistent with the results of other published studies involving couples where one of the partners was infected by their spouses [40, 41]. Female individuals aged between 17 and 65 years were also frequently found to be secondary cases [41]. Aiming to analyze a more homogeneous cohort and since age is an important predictor of severity and risk of death by COVID-19, we focused our survey on couples of comparable ages and economic status and therefore similar access to health care. It is also important to note that the survey was performed before the vaccination was started. One of the possible current biological hypotheses for such gender variable transmission rate is a differential viral load in saliva, which has been explored as an important clinical measure of disease severity due to its positive association with many COVID-19 inflammatory markers [42]. These factors, together with the higher adoption of hygiene and protective measures among females, may justify the lower transmission rates in this group. One of the possible current biological hypotheses for such gender variable transmission rate is a differential viral load in saliva, which has been explored as an important clinical measure of disease severity due to its positive association with many COVID-19 inflammatory markers [42]. These factors, together with the higher adoption of hygiene and protective measures among females, may justify the lower transmission rates in this group. Interestingly, in a recent study of our group [43] it was observed that, although there were no observed gender dif- ferences in viral load in nasopharyngeal samples, adult males showed a significantly higher viral load in saliva samples (verified by RT-LAMP viral testing) than adult women. (0123456 1 3 23456789) 3 Brief Communication Discover Mental Health (2022) 2:1 | https://doi.org/10.1007/s44192-022-00004-3 Brief Communication Discover Mental Health | https://doi.org/10.1007/s44192-022-00004-3 mmunication Discover Mental Health (2022) 2:1 | https://doi.org/10.1007/s4 Group Men Women Total Chi-square (χ2) values Discordant 797 570 1367 37.6950 Concordant 146 84 230 16.7130 Fig. 4  Discussion 1   Survey data collection rational diagram Table 1   Numerical description of couple groups composition and chi-square (χ2) values Group Men Women Total Chi-square (χ2) values Discordant 797 570 1367 37.6950 Concordant 146 84 230 16.7130 Table 1   Numerical description of couple groups composition and chi-square (χ2) values Group Men Women Total Chi-square (χ2) values Discordant 797 570 1367 37.6950 Concordant 146 84 230 16.7130 Table 1   Numerical description of couple groups composition and chi-square (χ2) values Group Men Women Total Chi-square (χ2) values Discordant 797 570 1367 37.6950 Concordant 146 84 230 16.7130 Vol:1 :.(123456789 3 | https://doi.org/10.1007/s44192-022-00004-3 Brief Communication Discover Mental Health | https://doi.org/10.1007/s44192-022-00004-3 th (2022) 2:1 (2022) 2:1 Brief Communication These observations, together with the evidence of higher aerosol emission by men which makes them more likely to be “superspreaders” than women, support the hypothesis that male individuals are more efficient virus transmitters than females, which is related to biological and behavioral aspects. These observations, together with the evidence of higher aerosol emission by men which makes them more likely to be “superspreaders” than women, support the hypothesis that male individuals are more efficient virus transmitters than females, which is related to biological and behavioral aspects. This study has some limitations regarding the relatively modest number of couples included in the present cohort when compared with other epidemiological surveys of in-house transmission [40, 41]. Additionally, the couples who responded the questionnaire are on average younger than the mean age of the population since, in Brazil, younger peo- ple have more access and familiarity with internet than older adults [44]. Nevertheless, our study brings new knowledge to the field of public health regarding SARS-CoV-2 transmission dynamics.if i In short, the present study confirmed the existence of gender differences not only for susceptibility to infection and resistance to COVID-19 but also in the transmission rate. Acknowledgements  The authors are extremely grateful to all volunteers for their participation and collaboration. This work was supported by the Sao Paulo Research Foundation (FAPESP/Brazil) [Grant Numbers 2013/08028-1, 2014/50931-3 and 2020/09702-1], the National Council for Scientific and Technological Development (CNPq) [Grant Number 465355/2014-5], JBS S.A [Grant Number 69004]. Special thanks to Brazilian senator Mara Gabrilli for financial support. Authors’ contributions  MVRS and MVC: methodology, formal analysis, investigation, data curation, writing—original draft, writing—review and editing and visualization. MRPB: conceptualization and writing—review and editing. PAO: methodology, formal analysis, investigation, data curation, writing—original draft and writing—review and editing. Declarations Ethics approval and consent to participate  This study was approved by the Committee for Ethics in Research of the Institute of Biosciences at the University of São Paulo (CAAE 34786620.2.0000.5464) in accordance with de Declaration of Helsinki principles, ICH06 Good Clinical Prac- tices and Brazilian Health Regulatory Agency (ANVISA) resolution number 466 from 2012 that regulates research with humans. An informed consent term was obtained from all participants. Competing interests  The authors declare no conflicts of interest. Open Access  This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adapta- tion, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. 4  Discussion MSN: conceptualization and writing—review and editing. MZ: super- vision, project administration, conceptualization, funding acquisition and writing—review and editing. All authors read and approved the final manuscript. Data availability  Data sharing is not applicable to this article as no datasets were generated during the current study. References 1. Chai S, Li Y, Li X, Tan J, Abdelrahim MEA, Xu X. Effect of age of COVID-19 inpatient on the severity of the disease: a meta-analysis. Int J Clin Pract. 2021;75(10): e14640.f 1. Chai S, Li Y, Li X, Tan J, Abdelrahim MEA, Xu X. Effect of age of COVID-19 inpatient on the severity of the disease: a meta-analysis. Int J Clin Pract. 2021;75(10): e14640.f 2. Thakur B, Dubey P, Benitez J, Torres JP, Reddy S, Shokar N, et al. A systematic review and meta-analysis of geographic differences in comorbidities and associated severity and mortality among individuals with COVID-19. Sci Rep. 2021;11(1):8562. 2. Thakur B, Dubey P, Benitez J, Torres JP, Reddy S, Shokar N, et al. A systematic review and meta-analysis of geographic differences in comorbidities and associated severity and mortality among individuals with COVID-19. Sci Rep. 2021;11(1):8562. 2. Thakur B, Dubey P, Benitez J, Torres JP, Reddy S, Shokar N, et al. A systematic review and meta-analysis of geographic differences in comorbidities and associated severity and mortality among individuals with COVID-19. Sci Rep. 2021;11(1):8562. 3. Zhou F, Yu T, Du R, Fan G, Liu Y, Liu Z, et al. Clinical course and risk factors for mo a retrospective cohort study. Lancet. 2020;395(10229):1054–62. 4. Mallapaty S. The coronavirus is most deadly if you are older and male new data reveal the risks. Nature. 2020;585(7823):16 7. 5. Peckham H, de Gruijter NM, Raine C, Radziszewska A, Ciurtin C, Wedderburn LR, et al. Male sex identified by global COVID-19 meta-analysis as a risk factor for death and ITU admission. Nat Commun. 2020;11(1):6317.f 5. Peckham H, de Gruijter NM, Raine C, Radziszewska A, Ciurtin C, Wedderburn LR, et al. Male sex identified by global COVID-19 meta-analysis as a risk factor for death and ITU admission. Nat Commun. 2020;11(1):6317.f 6. Dehingia N, Raj A. Sex differences in COVID-19 case fatality: do we know enough? Lancet Glob Health. 2021;9 f 7. Lam AA, Lepe A, Wild SH, Jackson C. Diabetes comorbidities in low- and middle-income countries: an umbrella review. J Glob Health. 2021;11:04040. 7. Lam AA, Lepe A, Wild SH, Jackson C. Diabetes comorbidities in low- and middle-income countries: an umbrella review. J Glob Health. 2021;11:04040. 8. Geldsetzer P, Manne-Goehler J, Marcus M-E, Ebert C, Zhumadilov Z, Wesseh CS, et al. g 9. Taylor L. Covid-19: Brazil’s hospitals close to collapse as cases reach record high. BMJ. 2021;23(372): n800. References Vahidy FS, Pan AP, Ahnstedt H, Munshi Y, Choi HA, Tiruneh Y, et al. Sex differences in susceptibility, severity disease 2019: cross-sectional analysis from a diverse US metropolitan area. PLoS ONE. 2021;16(1): e02455 y p 20. Klein SL, Flanagan KL. Sex differences in immune responses. Nat Rev Immunol. 2016;16(10):626–38.f y Klein SL, Flanagan KL. Sex differences in immune responses. Nat Rev Immunol. 2016;16(10):626–38.f gf p 21. Galasso V, Pons V, Profeta P, Becher M, Brouard S, Foucault M. Gender differences in COVID-19 attitudes and behavior: panel evidence from eight countries. Proc Natl Acad Sci. 2020;117(44):27285–91. gf 21. Galasso V, Pons V, Profeta P, Becher M, Brouard S, Foucault M. Gender differences in COVID-19 attitudes and behavior: panel evidence from eight countries. Proc Natl Acad Sci. 2020;117(44):27285–91. g 22. Howard MC. Gender, face mask perceptions, and face mask wearing: are men being dangerous during the COVID-19 pandemic? Personal Individ Differ. 2021;15(170): 110417.f g 22. Howard MC. Gender, face mask perceptions, and face mask wearing: are men being dangerous during the COVID-19 pandemic? Personal Individ Differ. 2021;15(170): 110417.f f 23. Capraro V, Barcelo H. The effect of messaging and gender on intentions to wear a face covering to slow down COVID-19 transmission. PsyArXiv; 2020. https://​psyar​xiv.​com/​tg7vz/. Accessed 24 Oct 2021. f 23. Capraro V, Barcelo H. The effect of messaging and gender on intentions to wear a face covering to slow down COVID-19 transmission. PsyArXiv; 2020. https://​psyar​xiv.​com/​tg7vz/. Accessed 24 Oct 2021. y y Suen LKP, So ZYY, Yeung SKW, Lo KYK, Lam SC. Epidemiological investigation on hand hygiene knowledge and beha study on gender disparity. BMC Public Health. 2019;11(19):401. y y 25. Kollamparambil U, Oyenubi A. Behavioural response to the Covid-19 pandemic in South Africa. PLoS ONE. 2021;16(4): e0250269. 25. Kollamparambil U, Oyenubi A. Behavioural response to the Covid-19 pandemic in South Africa. PLoS ONE. 2021;16(4): e0250269. 26 B k BN COVID 19 i ti d i t t d lt d 18 39 U it d St t M h M 2021 MMWR M b 27. Hesse, M. Women might be more skeptical of the covid vaccine. Why? The Washington Post. https://​ww style/​women-​covid-​vacci​ne-​skept​ical/​2020/​12/​15/​63551​cac-​3a61-​11eb-​9276-​ae0ca​72729​be_​story.​h y p _ y 28. Loomba S, de Figueiredo A, Piatek SJ, de Graaf K, Larson HJ. Measuring the impact of COVID-19 vaccine misinformation on vaccination intent in the UK and USA. Nat Hum Behav. 2021;5(3):337–48. 28. Loomba S, de Figueiredo A, Piatek SJ, de Graaf K, Larson HJ. References Measuring the impact of COVID-19 vaccine misinformation on vaccination intent in the UK and USA. Nat Hum Behav. 2021;5(3):337–48. 29. Solís Arce JS, Warren SS, Meriggi NF, Scacco A, McMurry N, Voors M, et al. COVID-19 vaccine acceptance and hesitancy in low- and middle- income countries. Nat Med. 2021;27(8):1385–94. 29. Solís Arce JS, Warren SS, Meriggi NF, Scacco A, McMurry N, Voors M, et al. COVID-19 vaccine acceptance and hesitancy in low- and middle- income countries. Nat Med. 2021;27(8):1385–94. 30. Global Health 50/50. The COVID-19 sex-disaggregated data tracker | global health 50/50. https://​globa​lheal​th5050.​org/​the-​sex-​gender-​ and-​covid-​19-​proje​ct/​the-​data-​track​er/. Accessed 24 Oct 2021. 30. Global Health 50/50. The COVID-19 sex-disaggregated data tracker | global health 50/50. https://​globa​lheal​th5050.​org/​the-​sex-​gender-​ and-​covid-​19-​proje​ct/​the-​data-​track​er/. Accessed 24 Oct 2021. p j M. January 14, 2021 coronavirus news. https://​editi​on.​cnn.​com/​world/​live-​news/​coron​avirus-​pande​mic-​vacci​ne-​u e7c3​84a6d​1b631​c1ed4​8cef2​87256​be. Accessed 24 Oct 2021. 31. Nedelman M. January 14, 2021 coronavirus news. https://​editi​on.​cnn.​com/​world/​live-​news/​coron​avirus-​p 14-​21/h_​4e7c3​84a6d​1b631​c1ed4​8cef2​87256​be. Accessed 24 Oct 2021. 32. Viana T. Mulheres se vacinam mais contra a Covid-19 do que homens no Ceará; 56% dos óbitos são masculinos - Metro - Diário do Nordeste. https://​diari​odono​rdeste.​verde​smares.​com.​br/​metro/​mulhe​res-​se-​vacin​am-​mais-​contra-​a-​covid-​19-​do-​que-​homens-​no-​ceara-​56-​dos-​ obitos-​sao-​mascu​linos-1.​31002​66. Accessed 24 Oct 2021. 32. Viana T. Mulheres se vacinam mais contra a Covid-19 do que homens no Ceará; 56% dos óbitos são masculinos - Metro - Diário do Nordeste. https://​diari​odono​rdeste.​verde​smares.​com.​br/​metro/​mulhe​res-​se-​vacin​am-​mais-​contra-​a-​covid-​19-​do-​que-​homens-​no-​ceara-​56-​dos-​ obitos-​sao-​mascu​linos-1.​31002​66. Accessed 24 Oct 2021. 33. Ungar L. The gender vaccine gap: more women than men are getting Covid shots | Kaiser health news. https://​khn.​org/​news/​artic​le/​ gender-​vacci​ne-​gap-​more-​women-​than-​men-​vacci​nated-​again​st-​covid/. Accessed 24 Oct 2021.f 33. Ungar L. The gender vaccine gap: more women than men are getting Covid shots | Kaiser health news. https://​khn.​org/​news/​artic​le/​ gender-​vacci​ne-​gap-​more-​women-​than-​men-​vacci​nated-​again​st-​covid/. Accessed 24 Oct 2021.f g g p g 34. Vloo A, Alessie RJM, Mierau JO, Boezen MH, Mierau JO, Franke L, et al. Gender differences in the mental health impact of the COVID-19 lockdown: longitudinal evidence from the Netherlands. SSM Popul Health. 2021;15: 100878.fi g g p g 34. Vloo A, Alessie RJM, Mierau JO, Boezen MH, Mierau JO, Franke L, et al. Gender differences in the mental health impact of the COVID-19 lockdown: longitudinal evidence from the Netherlands. SSM Popul Health. 2021;15: 100878.fi 35. Fenollar-Cortés J, Jiménez Ó, Ruiz-García A, Resurrección DM. Gender differences in psychological impact of the confinement during the COVID-19 outbreak in Spain: a longitudinal study. Front Psychol. 2021;12:2279. 35. Fenollar-Cortés J, Jiménez Ó, Ruiz-García A, Resurrección DM. Gender differences in psychological impact of the confinement during the COVID-19 outbreak in Spain: a longitudinal study. Front Psychol. 2021;12:2279. 36. References Kola L, Kohrt BA, Hanlon C, Naslund JA, Sikander S, Balaji M, et al. COVID-19 mental health impact and resp middle-income countries: reimagining global mental health. Lancet Psychiatry. 2021;8(6):535–50. middle-income countries: reimagining global mental health. Lancet Psychiatry. 2021;8(6):535–50. 37 Lewis D Superspreading drives the COVID pandemic and could help to tame it Nature 2021;590(7847):544 6 g g g y y ; ( ) 37. Lewis D. Superspreading drives the COVID pandemic—and could help to tame it. Nature. 2021;590(7847):544–6. 37. Lewis D. Superspreading drives the COVID pandemic—and could help to tame it. Nature. 2021;590(7847):544 p p g p p 38. Castelli EC, de Castro MV, Naslavsky MS, Scliar MO, Silva NSB, Andrade HS, et al. MHC variants associated with symptomatic versus asymp- tomatic SARS-CoV-2 infection in highly exposed individuals. Front Immunol. 2021;12:3898. 39. Sponchiato D. Pesquisa mostra o grau de medo e tensão dos brasileiros com o coronavírus | Veja Saúde. h mente-​sauda​vel/​medo-e-​tensao-​brasi​leiros-​coron​avirus/. Accessed 24 Oct 2021. 40. Bi Q, Lessler J, Eckerle I, Lauer SA, Kaiser L, Vuilleumier N, et al. Insights into household transmission of SARS-CoV-2 from a population- based serological survey. Nat Commun. 2021;12(1):3643. 40. Bi Q, Lessler J, Eckerle I, Lauer SA, Kaiser L, Vuilleumier N, et al. Insights into household transmission of SARS-CoV-2 from a population- based serological survey. Nat Commun. 2021;12(1):3643. g y 41. Hall J, Harris R, Zaidi A, Woodhall S, Dabrera G, Dunbar J. HOSTED—England’s household transmission evaluation dataset: preliminary findings from a novel passive surveillance system of COVID-19. Int J Epidemiol. 2021;50(3):743–52. g y 41. Hall J, Harris R, Zaidi A, Woodhall S, Dabrera G, Dunbar J. HOSTED—England’s household transmission evaluation dataset: preliminary findings from a novel passive surveillance system of COVID-19. Int J Epidemiol. 2021;50(3):743–52. i y 42. Silva J, Lucas C, Sundaram M, Israelow B, Wong P, Klein J, et al. Saliva viral load is a dynamic unifying correlate of COVID-19 severity and mortality. MedRxiv Prepr Serv Health Sci. 2021. https://​doi.​org/​10.​1101/​2021.​01.​04.​21249​236.li 42. Silva J, Lucas C, Sundaram M, Israelow B, Wong P, Klein J, et al. Saliva viral load is a dynamic unifying correlate of COVID-19 severity and mortality. MedRxiv Prepr Serv Health Sci. 2021. https://​doi.​org/​10.​1101/​2021.​01.​04.​21249​236. y p p g 43. Kobayashi GS, Brito LA, Moreira DDP, Suzuki AM, Hsia GSP, Pimentel LF, et al. A novel saliva RT-LAMP workflow COVID-19 cases and restraining viral spread. Diagnostics. 2021;11(8):1400. 44. Brazil: share of internet users by age group 2020 | Statista. References Emergence of highly infectious SARS-CoV-2 vari- ants in Bangladesh: the need for systematic genetic surveillance as a public health strategy. Trop Med Health. 2021;49(1):69.f g y g p gy p ; ( ) 15. Rocha R, Atun R, Massuda A, Rache B, Spinola P, Nunes L, et al. Effect of socioeconomic inequalities and vulnerabilities on health-system preparedness and response to COVID-19 in Brazil: a comprehensive analysis. Lancet Glob Health. 2021;9(6):e782–92. 5. Rocha R, Atun R, Massuda A, Rache B, Spinola P, Nunes L, et al. Effect of socioeconomic inequalities and vulne preparedness and response to COVID-19 in Brazil: a comprehensive analysis. Lancet Glob Health. 2021;9(6):e 15. Rocha R, Atun R, Massuda A, Rache B, Spinola P, Nunes L, et al. Effect of socioeconomic inequalities and vulnerabilities on health-system preparedness and response to COVID-19 in Brazil: a comprehensive analysis Lancet Glob Health 2021;9(6):e782–92 p p p p y 16 Guedes MBOG, de Assis SJC, Sanchis GJB, Araujo DN, Oliveira AGRDC, Lopes JM. COVID-19 in Brazilian cities: impact of social determinants, coverage and quality of primary health care. PLoS ONE. 2021;16(9): e0257347. p p p p y 16 Guedes MBOG, de Assis SJC, Sanchis GJB, Araujo DN, Oliveira AGRDC, Lopes JM. COVID-19 in Brazilian cities: impact of social determinants, coverage and quality of primary health care. PLoS ONE. 2021;16(9): e0257347. g q y p y 17. Rackimuthu S, Hasan MM, Bardhan M, Essar MY. COVID-19 vaccination strategies and polic is a pressing priority. Int J Health Plan Manag. 2021. https://​doi.​org/​10.​1002/​hpm.​3321. 18. Ghosh S, Moledina N, Hasan MM, Jain S, Ghosh A. Colossal challenges to healthcare workers combating the second wave of coronavirus disease 2019 (COVID-19) in India. Infect Control Hosp Epidemiol. 2021;2:1–2.f 18. Ghosh S, Moledina N, Hasan MM, Jain S, Ghosh A. Colossal challenges to healthcare workers combating the second wave of coronavirus disease 2019 (COVID-19) in India. Infect Control Hosp Epidemiol. 2021;2:1–2.f ( ) p p ; 19. Vahidy FS, Pan AP, Ahnstedt H, Munshi Y, Choi HA, Tiruneh Y, et al. Sex differences in susceptibility, severity, and outcomes of coronavirus disease 2019: cross-sectional analysis from a diverse US metropolitan area. PLoS ONE. 2021;16(1): e0245556.f 19. Vahidy FS, Pan AP, Ahnstedt H, Munshi Y, Choi HA, Tiruneh Y, et al. Sex differences in susceptibility, severity, and outcomes of coronavirus disease 2019: cross-sectional analysis from a diverse US metropolitan area. PLoS ONE. 2021;16(1): e0245556.f 19. References The state of hypertension care in 44 low-income and middle-income countries: a cross-sectional study of nationally representative individual-level data from 1.1 million adults. Lancet Lond Engl. 2019;394(10199):652–62. 8. Geldsetzer P, Manne-Goehler J, Marcus M-E, Ebert C, Zhumadilov Z, Wesseh CS, et al. The state of hypertension care in 44 low-income and middle-income countries: a cross-sectional study of nationally representative individual-level data from 1.1 million adults. Lancet Lond Engl. 2019;394(10199):652–62. 10. Aborode AT, Corriero AC, Fajemisin EA, Hasan MM, Kazmi SK, Olajiga O. Dengue and coronavirus disease (COVID-19) syndemic: double threat to an overburdened healthcare system in Africa. Int J Health Plan Manag. 2021. https://​doi.​org/​10.​1002/​hpm.​3334. 10. Aborode AT, Corriero AC, Fajemisin EA, Hasan MM, Kazmi SK, Olajiga O. Dengue and coronavirus disease (COVID-19) syndemic: double threat to an overburdened healthcare system in Africa. Int J Health Plan Manag. 2021. https://​doi.​org/​10.​1002/​hpm.​3334. 23456789) 1 3 (01231 Brief Communication | https://doi.org/10.1007/s44192-022-00004-3 Discover Mental Health (2022) 2:1 11. Bong C-L, Brasher C, Chikumba E, McDougall R, Mellin-Olsen J, Enright A. The COVID-19 pandemic: effects on low- and middle-income countries. Anesth Analg. 2020;131(1):86–92. 11. Bong C-L, Brasher C, Chikumba E, McDougall R, Mellin-Olsen J, Enright A. The COVID-19 pandemic: effec countries. Anesth Analg. 2020;131(1):86–92. 11. Bong C-L, Brasher C, Chikumba E, McDougall R, Mellin-Olsen J, Enright A. The COVID-19 pandemic: effects on low- and middle-income countries. Anesth Analg. 2020;131(1):86–92. g ; ( ) 12 Islam Z, Kokash DM, Babar MS, Uday U, Hasan MM, Rackimuthu S, et al. Food security, conflict, and COVID-19: perspective from Afghani- stan. Am J Trop Med Hyg. 2021. https://​doi.​org/​10.​4269/​ajtmh.​21-​1058. g 12 Islam Z, Kokash DM, Babar MS, Uday U, Hasan MM, Rackimuthu S, et al. Food security, conflict, and COVID-19: perspective from Afghani- stan. Am J Trop Med Hyg. 2021. https://​doi.​org/​10.​4269/​ajtmh.​21-​1058. p yg p g j 3. Li SL, Pereira RHM, Prete CA Jr, Zarebski AE, Emanuel L, Alves PJH, et al. Higher risk of death from COVID-19 in l populations of São Paulo, Brazil. BMJ Glob Health. 2021;6(4): e004959. p p 14. Hasan MM, Rocha ICN, Ramos KG, Cedeño TDD, dos Santos Costa AC, Tsagkaris C, et al. Emergence of highly infectious SARS-CoV-2 vari- ants in Bangladesh: the need for systematic genetic surveillance as a public health strategy. Trop Med Health. 2021;49(1):69. p p 14. Hasan MM, Rocha ICN, Ramos KG, Cedeño TDD, dos Santos Costa AC, Tsagkaris C, et al. References https://​www.​stati​sta.​com/​stati​stics/​254724/​age-​distr​ibuti​on-​of-​inter​net-​users-​ in-​brazil/. Accessed 27 Dec 2021. 44. Brazil: share of internet users by age group 2020 | Statista. https://​www.​stati​sta.​com/​stati​stics/​254724/​age-​distr​ibuti​on-​of-​inter​net-​users-​ in-​brazil/. Accessed 27 Dec 2021. Vol:1 :.(123456789 3 tal Health (2022) 2:1 | https://doi.org/10.1007/s44192-022-00004-3 Discover Mental Health (2022) 2:1 | https://doi.org/10.1007/s44192-022-00004-3 Brief Communication 2:1 | https://doi.org/10.1007/s44192-022-00004-3 Brief Communication Discover Mental Health ringer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Publisher’s Note  Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Publisher’s Note  Springer Nature remains neutral with regard to jurisdictional claims in published maps and instit :(0123456789) 1 3 0123456789) 1 3
https://openalex.org/W2599986806
https://europepmc.org/articles/pmc5364512?pdf=render
English
null
Circulating tumor cell status monitors the treatment responses in breast cancer patients: a meta-analysis
Scientific reports
2,017
cc-by
8,315
Circulating tumor cell status monitors the treatment responses in breast cancer patients: a meta- analysis 16 17 N received: 10 August 2016 accepted: 25 January 2017 Published: 24 March 2017 Wen-Ting Yan1, Xiang Cui1, Qing Chen2, Ya-Fei Li3, You-Hong Cui4, Yan Wang4 & Jun Jiang1 Whether circulating tumor cells (CTCs) can be used as an indicator of treatment response in breast cancer (BC) needs to be clarified. We addressed this issue by a meta-analysis. PubMed, EMBase and Cochrane library databases were searched in June 2016. Effect measures were estimated as pooled risk ratio (RR), odds ratio (OR) or mean difference by fixed- or random-effect models, according to heterogeneity of included studies. In total, 50 studies with 6712 patients were recruited. Overall analysis showed that there was a significant reduction of CTC-positive rate (RR = 0.68, 95% CI: 0.61–0.76, P < 0.00001) after treatment. Subgroup analyses revealed that neoadjuvant treatment, adjuvant treatment, metastatic treatment or combination therapy could reduce the CTC-positive rate, but surgery could not; moreover, the reduction was only found in HER2+ or HER2- patients but not in the triple-negative ones. Reduction of CTC-positive rate was associated with lower probability of disease progression (OR = 0.54, 95% CI: 0.33–0.89, P = 0.01) and longer overall survival period (mean difference = 11.61 months, 95% CI: 8.63–14.59, P < 0.00001) as well as longer progression-free survival period (mean difference = 5.07 months, 95% CI: 2.70–7.44, P < 0.0001). These results demonstrate that CTC status can serve as an indicator to monitor the effectiveness of treatments and guide subsequent therapies in BC. Metastasis is the major cause of cancer-related death in patients with breast cancer (BC)1. Despite the improve- ments in treatment, metastatic relapse may occur in about 30% of BC patients with lymph node-negative axilla and about 50% of BC patients with positive axilla within 5 years2. During the process of metastasis, cancer cells shed from primary tumors and migrate to distal sites through the blood or lymphatic system. Those migrating cells found in peripheral blood are known as circulating tumor cells (CTCs). CTCs are the metastatic precursors, which may have potential roles not only in predicting the risk of metastatic relapse and monitoring the treatment efficacy, but also in acting as a therapeutic target for preventing metastasis of cancers, including BC3–9. fi Up to now, CTCs have been well studied and are currently being used in the clinical setting10. However, there are controversial results about the effectiveness of different treatments to reduce CTCs. For example, Martin M. www.nature.com/scientificreports www.nature.com/scientificreports www.nature.com/scientificreports Scientific Reports | 7:43464 | DOI: 10.1038/srep43464 Results St d h Results Study characteristics. We initially retrieved 1004 articles through database searching. 846 articles were excluded based on the title and abstract. Further, 108 articles were excluded after reviewing full-texts, in which the results of CTC status before and after treatment were not completely contained, or sample size was less than 20, and or duplicated data with other studies was reported. Finally, 50 studies were eligible for meta-analysis (Fig. 1)4,5,9,11–57.h g The eligible studies were conducted between 2009 and 2016 in America (USA), Asia (China, Japan and Korea) and Europe (Belgium, Czech, Denmark, France, Germany, Greece, Italy, Norway, Russia, Slovakia, Spain, and Turkey). The sample sizes of studies ranged from 21 to 2026 patients, accumulating 8019 patients before treat- ments and 6712 patients after treatments in total. Some studies reported the results in patients with particular molecular subtype BC, such as the HER2-positve or the triple-negative ones. The treatments performed in the studies included surgery, neoadjuvant treatment, adjuvant treatment, metastatic treatment, etc., either alone or in combination. The main characteristics of these studies are listed in Table S1. The quality of the studies was also estimated (Table S2). Overall CTC-positive rate is significantly decreased after therapies. The CTC status was detected with different platforms or methods and presented with different indicators in the 50 studies with 6712 patients. The CTC-positive rate was reported in all of the studies, in which the different cut-off values of CTC count for CTC-capturing methods were used, such as ≥​5 CTCs/7.5 mL, ≥​1 CTCs/7.5 mL and so on, and the different expression thresholds of epithelial genes (EpCAM, CK18, CK19) were used for RT-PCR method. Some studies also presented the CTC status as CTC count. We first performed an overall analysis of the 50 studies with 6712 patients with CTC-positive rate by the random-effects model, and found that the CTC-positive rate was signifi- cantly decreased after treatment compared to the baseline (RR =​ 0.68, 95% CI: 0.61 to 0.76, P <​ 0.00001; I2 =​ 73%, P <​ 0.00001) (Fig. 2). We then analyzed the change of CTC counts in the 7 studies (2324 cases) that simultaneously reported CTC-positive rate and CTC count before and after treatments. No significant change of CTC counts was observed (mean difference =​ −​1.17 CTCs/7.5 mL, 95% CI: −​3.17 to 0.84, P =​ 0.25; I2 =​ 65%, P =​ 0.009) (Fig. Circulating tumor cell status monitors the treatment responses in breast cancer patients: a meta- analysis 16 17 N et al. analyzed the change of CTCs in 117 BC patients and observed a substantial decline in CTC-positive rate after chemotherapy11, but Rack B. et al. conducted a larger perspective study with 2026 BC patients and found that the detection rate of CTCs after chemotherapy (22.1%) was even a bit higher than the baseline condition (21.5%)12. In addition, it needs also to be clarified whether molecular subtypes of BC affect CTC status under same treatments13. Hence, we conducted a meta-analysis of the published researches with measurement of CTCs before and after treatment in BC patients, and estimated the CTC-reducing effect of the current anti-tumor therapies. The CTC-reducing effects by different treatments were investigated separately in subgroup analyses, so were the effects in patients with different molecular subtypes. Then we also analyzed the relationship between reduction of CTCs and disease progression probability as well as survival period. This study followed the PRISMA criterions. 1Breast Disease Center, Southwest Hospital, Third Military Medical University, Chongqing 400038, China. 2Institute of Toxicology, College of Preventive Medicine, Third Military Medical University, Chongqing 400038, China. 3Department of Epidemiology, College of Preventive Medicine, Third Military Medical University, Chongqing 400038, China. 4Institute of Pathology and Southwest Cancer Center, Southwest Hospital, Third Military Medical University Chongqing 400038, China. Correspondence and requests for materials should be addressed to J.J. (email: jcbd@ medmail.com.cn) Scientific Reports | 7:43464 | DOI: 10.1038/srep43464 1 www.nature.com/scientificreports/ Figure 1. Flowchart for article search. Figure 1. Flowchart for article search. Figure 1. Flowchart for article search. Scientific Reports | 7:43464 | DOI: 10.1038/srep43464 www.nature.com/scientificreports/ www.nature.com/scientificreports/ Figure 2. Forest plot for the comparison of CTC-positive rate before and after treatment: overall analysis. The black diamond and its extremities indicate the pooled risk ratio center and 95% confidential interval. Figure 2. Forest plot for the comparison of CTC-positive rate before and after treatment: overall analysis. The black diamond and its extremities indicate the pooled risk ratio center and 95% confidential interval. Figure 2. Forest plot for the comparison of CTC-positive rate before and after treatment: overall analysis. The black diamond and its extremities indicate the pooled risk ratio center and 95% confidential interval. Figure 2. Forest plot for the comparison of CTC-positive rate before and after treatment: overall analys The black diamond and its extremities indicate the pooled risk ratio center and 95% confidential interval. Figure 3. Forest plot for the comparison of CTC count before and after treatment: overall analysis. The black diamond indicates the difference of CTC counts (cells/7.5 mL peripheral blood; the post-therapeutic counts minus the pre-therapeutic counts). Its center indicates the mean and the extremities indicate the 95% confidential interval. Figure 3. Forest plot for the comparison of CTC count before and after treatment: overall analysis. The black diamond indicates the difference of CTC counts (cells/7.5 mL peripheral blood; the post-therapeutic counts minus the pre-therapeutic counts). Its center indicates the mean and the extremities indicate the 95% confidential interval. Figure 3. Forest plot for the comparison of CTC count before and after treatment: overall analysis. The black diamond indicates the difference of CTC counts (cells/7.5 mL peripheral blood; the post-therapeutic counts minus the pre-therapeutic counts). Its center indicates the mean and the extremities indicate the 95% confidential interval. CTC-positive rates are decreased after neoadjuvant treatment, adjuvant treatment, me static treatment and combination therapy, but not after surgery. Clinically, many therape h d l d i f BC Th h i h d i l d i h l d 50 di l CTC-positive rates are decreased after neoadjuvant treatment, adjuvant treatment, meta- static treatment and combination therapy, but not after surgery. Clinically, many therapeutic methods are employed in treatment of BC. The therapeutic methods involved in the pooled 50 studies could be roughly classified into neoadjuvant setting, adjuvant setting, metastatic setting, surgery and combination therapy. To clarify the efficacy of various therapies on decreasing CTC-positive rate, we performed a subgroup analy- sis. Results St d h 3), while a significant reduction was observed with CTC-positive rate in the 7 studies investigated after treatment (RR =​ 0.65, 95% CI: 0.48 to 0.87, P =​ 0.004; I2 =​ 85%, P <​ 0.00001) (Figure S1). This inconsistent results between CTC-positive rate and CTC count might attribute to the heterogeneity among the studies, because the CTC count, a continuous variable, could be more susceptible to the variance caused by individual study than the CTC-positive rate, a dichotomized variable. So we made a sensitivity analysis by removing each study, and found that one of them (Bidard FC 2012) substantially affected the result. Once it was excluded, the significant decrease of CTC level after treatment was observed compared to pre-treatment (mean difference =​ −​0.94, 95% CI: −​1.49 to −​0.38, P =​ 0.0010 by fixed-effects model). These results confirmed the promising application of CTCs in mon- itoring the effectiveness of treatments for BC. gf In addition, different methods as well as different cut-off values for a method were used in the studies. Hence, we also investigated the CTC-positive rate before and after treatment in the subgroups of different CTC-measuring methods. A significant reduction of CTC-positive rate after treatment was observed no matter how the CTC positivity was defined as ≥​5CTCs/7.5 mL, ≥​1CTCs/7.5 mL, or other threshold including a thresh- old for RT-PCR technique (Fig. 4). Scientific Reports | 7:43464 | DOI: 10.1038/srep43464 2 www.nature.com/scientificreports/ Compared to pre-treatment, CTC-positive rate were decreased after treatment in the neoadjuvant setting CTC-positive rates are decreased after neoadjuvant treatment, adjuvant treatment, meta- static treatment and combination therapy, but not after surgery. Clinically, many therapeutic methods are employed in treatment of BC. The therapeutic methods involved in the pooled 50 studies could be roughly classified into neoadjuvant setting, adjuvant setting, metastatic setting, surgery and combination therapy. To clarify the efficacy of various therapies on decreasing CTC-positive rate, we performed a subgroup analy- sis. Compared to pre-treatment, CTC-positive rate were decreased after treatment in the neoadjuvant setting Scientific Reports | 7:43464 | DOI: 10.1038/srep43464 3 CTC-positive rates are decreased after therapies in the HER2 -positive or -negative patients, ut not in the triple-negative patients Currently the clinical management of breast cancer mainly The disease progression of patients after treatments was available in 11 studies with 1363 patients. A significantly lower probability of disease progression was observed in the CTC-reduced patients (OR =​ 0.54, 95% CI: 0.33 to 0.89, P =​ 0.01; I2 =​ 45%, P =​ 0.05) (Fig. 7). The 11 studies could be divided into 3 subgroups, namely metastatic setting (6 studies with 244 patients), adjuvant setting (3 studies with 1095 patients), neoadjuvant set- ting (2 studies with 24 patients). Significantly lower probability of disease progression in CTC-reduced patients was observed in the metastatic setting subgroup (OR =​ 0.37, 95% CI: 0.20 to 0.66, P =​ 0.0008; I2 =​ 13%, P =​ 0.33) (Fig. 8). But there was no significant difference of probability of disease progression in patients with or without CTC reduction in the adjuvant setting subgroup (OR =​ 0.73, 95% CI: 0.44 to 1.22, P =​ 0.23; I2 =​ 54%, P =​ 0.11) and in the neoadjuvant setting subgroup (OR =​ 0.30, 95% CI: <​0.01 to 77.67, P =​ 0.67; I2 =​ 80%, P =​ 0.03) (Fig. 8). There was a significant heterogeneity in the adjuvant-setting subgroup. When a study (Rack B 2014) was excluded, the heterogeneity was relieved (P =​ 0.68, I2 =​ 0%) and the correlation of CTC status and disease progression became significant (OR =​ 0.57, 95%CI: 0.37 to 0.86, P =​ 0.008 by fixed-effect model). In the neoadju- vant setting subgroup, the sample size was extremely small, implying that did not have adequate statistic power. The results showed that the reduction of CTCs was significantly associated with decreased probability of disease progression, increased overall survival and progression-free survival period. Sensitivity Analysis and Publication Bias. Among the 50 studies included for the pooled RR estimation, no single one contributed substantial influence. When we analyzed the change of CTC counts post-treatments with 7 studies reported CTC status both in CTC-positive rate and CTC counts, the sensitivity analysis was tested by removal of each study. One of them (Bidard FC 2012) was found to substantially affect the heterogeneity and the significance of overall effect: when it was excluded, the heterogeneity was relieved (P =​ 0.69, I2 =​ 0%) and the change of CTC counts after treatment became significant (mean difference =​ −​0.94, 95%CI: −​1.49 to −​0.38, P =​ 0.0010 by fixed-effect model). In the adjuvant-setting subgroup analysis of disease progression (Fig. CTC-positive rates are decreased after therapies in the HER2 -positive or -negative patients, ut not in the triple-negative patients Currently the clinical management of breast cancer mainly CTC-positive rates are decreased after therapies in the HER2 -positive or -negative patients, but not in the triple-negative patients. Currently, the clinical management of breast cancer mainly relies on the molecular subtypes based on the expression of estrogen receptor, progesterone receptor and HER2 in primary tumors. It is well known that different molecular subtypes of BC are associated with distinct malig- nant nature and drug response. Therefore, we further assessed the effects of therapies on reduction of CTCs in different subgroups, including HER2-positive, HER2-negative and triple-negative BC. Compared to pre-therapy, CTC-positive rates were significantly decreased after treatment in HER2-positive patients (RR =​ 0.68, 95% CI: 0.57 to 0.82, P <​ 0.0001; I2 =​ 0%, P =​ 0.59) and HER2-negative patients (RR =​ 0.52, 95% CI: 0.31 to 0.86, P =​ 0.01; I2 =​ 66%, P =​ 0.01), but not in the triple-negative ones (RR =​ 0.38, 95% CI: 0.06 to 2.33, P =​ 0.29; I2 =​ 72%, P =​ 0.06) (Fig. 6). These results indicate that different molecular subtypes of BC affect the efficacy of therapeutics on reducing CTCs. The poor reduction of CTC-positive rate in triple-negative BC is consistent with clinical outcome, implying that current therapies should be further optimized and the new therapeutic methods should be developed for this specific molecular subtype. Correlation between status of CTCs after treatment and prognosis of the patients. Because CTCs are shed from the primary tumor and serve as the metastatic precursors, the changes of CTC status after therapies may associate with the risk of metastasis as well as the outcome of patients. We compared the prognosis of the CTC-reduced patients with that of the CTC-unchanged or -elevated patients after treatment. The overall survival (OS) of patients after treatment was available in 2 studies (71 cases), in both of which the patients received metastatic setting. The CTC-reduced patients had a longer overall survival period compared to the CTC-unchanged or -elevated patients (mean difference =​ 11.61 months, 95% CI: 8.63 to 14.59, P <​ 0.00001; I2 =​ 69%, P =​ 0.07) (Fig. 7). The progression-free survival (PFS) of patients after treatment were available in 3 studies (125 patients), in which all the patients received metastatic setting. The CTC-reduced patients had a longer PFS than the CTC-unchanged or -elevated patients (mean difference =​ 5.07 months, 95% CI: 2.70 to 7.44, P <​ 0.0001; I2 =​ 96%, P <​ 0.00001) (Fig. 7). CTC-positive rates are decreased after therapies in the HER2 -positive or -negative patients, ut not in the triple-negative patients Currently the clinical management of breast cancer mainly 8), one of the three recruited studies (Rack B 2014) was found to substantially affect the heterogeneity and the significance of overall effect: when it was excluded, the heterogeneity was relieved (P =​ 0.68, I2 =​ 0%) and the correlation of CTC status and disease progression became significant (OR =​ 0.57, 95%CI: 0.37 to 0.86, P =​ 0.008 by fixed-effect model). No substantial publication bias was found according to the Funnel plot (Fig. 9). Scientific Reports | 7:43464 | DOI: 10.1038/srep43464 www.nature.com/scientificreports/ www.nature.com/scientificreports/ Figure 4. Forest plot for the comparison of CTC-positive rate before and after treatment: subgroup analysis of different CTC determination methods (threshold). The results of ≥​5 CTCs/7.5 mL as positi (A) ≥​1 CTCs/7.5 mL as positive (B) other threshold as positive (C) and RT-PCR method (D) are shown, respectively. The center of black diamond and its extremities indicate the pooled risk ratio and 95% conf interval. t Figure 4. Forest plot for the comparison of CTC-positive rate before and after treatment: subgroup analysis of different CTC determination methods (threshold). The results of ≥​5 CTCs/7.5 mL as positive (A) ≥​1 CTCs/7.5 mL as positive (B) other threshold as positive (C) and RT-PCR method (D) are shown, respectively. The center of black diamond and its extremities indicate the pooled risk ratio and 95% confidential interval. Scientific Reports | 7:43464 | DOI: 10.1038/srep43464 4 www.nature.com/scientificreports/ (RR =​ 0.65, 95% CI: 0.48 to 0.88, P =​ 0.006; I2 =​ 40%, P =​ 0.08), and adjuvant setting (RR =​ 0.89, 95% CI: 0.76 to 1.02, P =​ 0.10; I2 =​ 62%, P =​ 0.007), the metastatic setting (RR =​ 0.59, 95% CI: 0.50 to 0.70, P <​ 0.00001; I2 =​ 66%, P <​ 0.0001) and the combination therapy (RR =​ 0.78, 95% CI: 0.62 to 0.97, P =​ 0.03; I2 =​ 29%, P =​ 0.20), but not in the surgery (RR =​ 1.27, 95% CI: 0.71 to 2.27, P =​ 0.42; I2 =​ 45%, P =​ 0.16) (Fig. 5). These results indicate that surgery as a local treatment can not eliminate CTCs timely, because CTCs can survive in peripheral blood for a certain amount of time58, suggesting that patients with CTC positive should be further treated with other thera- pies after surgery, in order to decrease the risk of metastasis and recurrence. Discussion The black diamond and its extremities indicate the pooled risk ratio center and 95% confidential interval. The actual application of CTCs in clinical setting relies on the progression of detection technologies. In the past decades, a number of technically diverse platforms have been developed for CTC assay60. However, for any technology to be used in the clinic, demonstration of analytic validity, clinical validity, and clinical utility is required60. Up to now, the only system approved by the Food and Drug Administration (FDA) as an aid in mon- itoring patients with metastatic breast, colorectal, or prostate cancer is CellSearch®​ (Veridex, Raritan, NJ, USA). Also, CellSearch®​ is the only semi-automated system and has contributed considerably to the development of standards for CTC enumeration. Nevertheless, there are disadvantages to be perfect for it. Its enrichment/capture technology is based on epithelial marker EpCAM, which is usually with low sensitivity and efficiency, due to the lost expression of EpCAM in CTCs by EMT process61,62. In our meta-analysis, other CTC detection methods are employed in some studies, including RT-PCR, which determined the CTC status by detecting the mRNA expression of epithelial markers, such as EpCAM or CKs. There is a probability that the CTC detection meth- ods based on different labels or rationales would find different counts of CTCs in the same individual patients. Given the CTC rarity, especially in non-metastatic breast cancer, continuous training and central image review is required in order to gain best inter-reader agreement. A recent study evaluated the inter-reader agreement in 22 readers from 15 academic laboratories and 8 readers from two Veridex laboratories with non-metastatic (M0) and metastatic (M1) breast cancer samples. For CTC definition (No CTC vs. CTC), the median agreement between academic readers and VC was 92% (range 69 to 97%) with a median κ​ of 0.83 (range: 0.37 to 0.93). The inter-reader agreement for CTC definition was high. Reduced agreement was observed in M0 patients with low CTC counts63. In addition, the inconsistence of the cut-off value to determine CTC-positive amongst studies would be a limitation for actual application of CTCs in clinical setting (Fig. 4). Standard or uniform protocol for CTC measurement would be required before this indicator could be clinically adopted.h There were several limitations in the present research. First, most of studies included in this meta-analysis were consisted of patients receiving certain therapy alone without an appropriate negative control. Discussion It has been well known that even localized tumors without clinically apparent metastasis give rise to CTCs. Because generation of CTCs is an indispensable step of the metastatic process of tumors, the promising appli- cation as a noninvasive blood biomarker in prognosis and response to therapy are very attractive. Although the actual utility of CTCs remains largely academic59, many studies have reported the detection of CTCs to facilitate early diagnosis of relapse or metastasis and improve the treatment decisions. In present meta-analysis, we ana- lyzed the changes of CTC status after therapies compared to that of before therapies in pooled 50 studies with 6712 BC patients, and demonstrated that CTC status was a useful indicator to monitor the treatment response, and predict the outcome of patients. Scientific Reports | 7:43464 | DOI: 10.1038/srep43464 5 www.nature.com/scientificreports/ Figure 5. Forest plot for the comparison of CTC-positive rate before and after treatment: subgroup analysis of different therapy strategies. The results of neoadjuvant setting (A), adjuvant setting (B), meta setting (C), surgery (D) and combination therapy (E) are shown, respectively. The center of black diamon its extremities indicate the pooled risk ratio and 95% confidential interval. Figure 5. Forest plot for the comparison of CTC-positive rate before and after treatment: subgroup analysis of different therapy strategies. The results of neoadjuvant setting (A), adjuvant setting (B), metastatic setting (C), surgery (D) and combination therapy (E) are shown, respectively. The center of black diamond and its extremities indicate the pooled risk ratio and 95% confidential interval. 6 Scientific Reports | 7:43464 | DOI: 10.1038/srep43464 www.nature.com/scientificreports/ Figure 6. Forest plot for the comparison of CTC-positive rate before and after treatment: subgroup analysis of different molecular subtypes. The results of HER2-positive subtype (A) HER2-negative subtype (B) and triple-negative subtype (C) are shown, respectively. The black diamond and its extremities indicate the pooled risk ratio center and 95% confidential interval. Figure 6. Forest plot for the comparison of CTC-positive rate before and after treatment: subgroup analysis of different molecular subtypes. The results of HER2-positive subtype (A) HER2-negative subtype (B) and triple-negative subtype (C) are shown, respectively. The black diamond and its extremities indicate the pooled risk ratio center and 95% confidential interval. Figure 6. Forest plot for the comparison of CTC-positive rate before and after treatment: subgroup analysis of different molecular subtypes. The results of HER2-positive subtype (A) HER2-negative subtype (B) and triple-negative subtype (C) are shown, respectively. Scientific Reports | 7:43464 | DOI: 10.1038/srep43464 Discussion Second, some studies with substantial sample heterogeneities, which were caused by the complexity of patient characteristics (race, age), therapeutic details (drug, dose, treatment periodicity, etc.) or other factors, were excluded in our Scientific Reports | 7:43464 | DOI: 10.1038/srep43464 7 www.nature.com/scientificreports/ Figure 7. Forest plot for the comparison of prognosis between the CTC-reduced patients and those without CTC-unchanged or -elevated. The diamond indicated the odds ratio of disease progression (A) the difference of progression-free survival (B) or overall survival period (C). The centers of the diamonds indicated the pooled odds ratio (A) or the mean difference (B,C) and the extremities indicated the 95% confidential interval. Figure 7. Forest plot for the comparison of prognosis between the CTC-reduced patients and those without CTC-unchanged or -elevated. The diamond indicated the odds ratio of disease progression (A) the difference of progression-free survival (B) or overall survival period (C). The centers of the diamonds indicated the pooled odds ratio (A) or the mean difference (B,C) and the extremities indicated the 95% confidential interval. Figure 7. Forest plot for the comparison of prognosis between the CTC-reduced patients and those without CTC-unchanged or -elevated. The diamond indicated the odds ratio of disease progression (A) the difference of progression-free survival (B) or overall survival period (C). The centers of the diamonds indicated the pooled odds ratio (A) or the mean difference (B,C) and the extremities indicated the 95% confidential interval. subgroup analyses. Third, the sample sizes of some subgroups were relatively small, which might affect the detec- tion of potential difference. Fourth, CTCs were thought to be a set of cells with different characteristics, so it would be more meaningful to investigate the correlation of change of the CTC subpopulations after treatment with patient prognosis. However, so far few data are available to perform an analysis.fi p p g p y In summary, the present meta-analysis demonstrated that the status of CTCs is a useful indicator of the effi- cacy of therapies for BC, which may help clinicians make a decision for further personalized therapy of patients. However, it is on the way for application of CTCs in clinical setting because there are still challenges presented in analytic validity, clinical validity, and clinical utility of CTCs. Methods h Forest plot for the comparison of prognosis between the CTC-reduced patients and those without CTC-unchanged or –elevated: subgroup analysis of disease progression. The diamond indicated the odds ratio of disease progression in the metastatic setting (A), the adjuvant setting (B) or the neoadjuvant setting (C). The centers of the diamonds indicated the pooled odds ratio and the extremities indicated the 95% confidential interval. Figure 9. Funnel plot for the studies included for comparison of CTC-positive rate before and after treatment. Figure 9. Funnel plot for the studies included for comparison of CTC-positive rate before and after treatment. molecular subtypes of tumor), assessment of CTCs (i.e., methods of CTC detection, blood volume, the cut-off value of CTCs, the count of CTCs and/or the positive rate of CTCs) and the type of the treatments. If CTCs at more than one phase of follow ups were reported in a study, the latest phase with follow-up rate ≥​75% was cho- sen; if no phase met the criteria, the earliest phase was chosen. The prognosis (progression-free survival, overall survival) was also extracted for assessing prognostic value of reducing CTCs. molecular subtypes of tumor), assessment of CTCs (i.e., methods of CTC detection, blood volume, the cut-off value of CTCs, the count of CTCs and/or the positive rate of CTCs) and the type of the treatments. If CTCs at more than one phase of follow ups were reported in a study, the latest phase with follow-up rate ≥​75% was cho- sen; if no phase met the criteria, the earliest phase was chosen. The prognosis (progression-free survival, overall survival) was also extracted for assessing prognostic value of reducing CTCs. Quality assessment of primary studies. The quality of each included study was evaluated by a scale based on the Newcastle–Ottawa Quality Assessment Scale. Quality assessment of primary studies. The quality of each included study was evaluated by a scale ased on the Newcastle–Ottawa Quality Assessment Scale. Statistical analysis. The pooled RR (relative risk) and mean difference were calculated to analyze the dif- ference of CTCs between pre-therapy and post-therapy by fixed model or random-effects model according to the heterogeneity of the studies, which was estimated by the Cochran’s Q test and the I2 index (P value <​ 0.10 or I2 over 50% was define as substantial heterogeneity). RR less than 1 or mean difference less than 0 indicated declined CTCs in the peripheral blood. Methods h Search strategy. A comprehensive literary search for potential studies was searched in June 2016 without time or language restrictions. The electronic databases include PubMed, EMBase and Cochrane library. The key- words and MeSH terms were variably combined: “circulating tumor cell (s)”, “breast cancer”, “therapy”. The search strategy was intended to exclude reviews, comments, letters and editorials, which have irrelevant study data, by screening the titles and abstracts of publications. Eligibility criteria. Inclusion criteria: (i) enrolled patients with BC were pathologically diagnosed; (ii) CTCs were detected by any method, including cell capture and quantitative PCR; (iii) the patients’ CTC status both pre- and post-therapy was reported. p py p Exclusion criteria: (i) cell-line experiments or animal models; (ii) a small size <​20 patients; (iii) when infor- mation of the same patients was reported in different studies, only the latest and most informative one was included; (iv) CTC status was reported pre- or post-therapy alone; (v) CTC status pre- and post-therapy was reported in different cohort of patients; (vi) Studies which reported CTCs only in continuous style were excluded, as their results could not be integrated with the majority of studies which reported the results in dichotomous pattern (positive vs. negative). Data extraction. Studies were reviewed and extracted independently by two reviewers (WT Yan and Q Chen). The primary data of the included studies were following: the general information (i.e., the first author, the year of publication, the nationality of studies), sample size, the patients’ characteristics (i.e., ages, tumor stage, Scientific Reports | 7:43464 | DOI: 10.1038/srep43464 8 www.nature.com/scientificreports/ Figure 8. Forest plot for the comparison of prognosis between the CTC-reduced patients and those without CTC-unchanged or –elevated: subgroup analysis of disease progression. The diamond indicated the odds ratio of disease progression in the metastatic setting (A), the adjuvant setting (B) or the neoadjuvant setting (C). The centers of the diamonds indicated the pooled odds ratio and the extremities indicated the 95% confidential interval. Figure 8. Forest plot for the comparison of prognosis between the CTC-reduced patients and those without CTC-unchanged or –elevated: subgroup analysis of disease progression. The diamond indicated the odds ratio of disease progression in the metastatic setting (A), the adjuvant setting (B) or the neoadjuvant setting (C). The centers of the diamonds indicated the pooled odds ratio and the extremities indicated the 95% confidential interval. Figure 8. Methods h Pooled OR (odds ratio) and mean difference were calculated to analyze Scientific Reports | 7:43464 | DOI: 10.1038/srep43464 9 www.nature.com/scientificreports/ the difference of progression between the patients with different dynamic conditions of CTCs (decreasing vs. increasing or persistent elevated). Subgroup analyses were performed for CTC determination methods, treat- ments and molecular subtypes of primary tumor as long as two or more studies were available to be included. Forest plot was used to illustrate the pooled RR mean difference. All analyses were run by Review Manager Version 5.3 (Cochrane Collaboration, Copenhagen, Denmark). the difference of progression between the patients with different dynamic conditions of CTCs (decreasing vs. increasing or persistent elevated). Subgroup analyses were performed for CTC determination methods, treat- ments and molecular subtypes of primary tumor as long as two or more studies were available to be included. Forest plot was used to illustrate the pooled RR mean difference. All analyses were run by Review Manager Version 5.3 (Cochrane Collaboration, Copenhagen, Denmark). Sensitivity analysis and estimation of publication bias. To evaluate the influence of individual study on the pooled RR or mean difference, sensitivity analysis was performed by removing each eligible study sepa- rately. Funnel plot developed by Begg was used to detect potential publication bias which might affect the validity of the results. References Circulating Tumor Cells (Ctcs) and Metronomic Oral Vinorelbine (Ov) in Advanced Breast Cancer (Abc) Patient (Pts): Exploratory Prospective Analysis. Annals of Oncology 23, 26–26, doi: 10.1093/annonc/mds040 (2012). 9. Aurilio, G. et al. Circulating Tumor Cells (Ctcs) and Metronomic Oral Vinorelbine (Ov) in Advanced Breast Cancer (Abc) Patients (Pts): Exploratory Prospective Analysis. Annals of Oncology 23, 26–26, doi: 10.1093/annonc/mds040 (2012). d l l l d b l l fi f l ll l l d 9. Aurilio, G. et al. Circulating Tumor Cells (Ctcs) and Metronomic Oral Vinorelbine (Ov) in Advanced Breast Cancer (Abc) Patients (Pts): Exploratory Prospective Analysis. Annals of Oncology 23, 26–26, doi: 10.1093/annonc/mds040 (2012).i 9. Aurilio, G. et al. Circulating Tumor Cells (Ctcs) and Metronomic Oral Vinorelbine (Ov) in Advanced Breast Cancer (Abc) Patient (Pts): Exploratory Prospective Analysis. Annals of Oncology 23, 26–26, doi: 10.1093/annonc/mds040 (2012).i y y f gy 0. Masuda, T. et al. Clinical and biological significance of circulating tumor cells in cancer. Mol Oncol 10, 408–417, doi: 10.1016/j molonc.2016.01.010 (2016).i 11. Martin, M. et al. Circulating tumor cells following first chemotherapy cycle: An early and strong predictor of outcome in patients with metastatic breast cancer. Oncologist 18, 917–923 (2013). g 2. Rack, B. et al. Circulating tumor cells predict survival in early average-to-high risk breast cancer patients. J Natl Cancer Inst 106, doi 10.1093/jnci/dju066 (2014).t j j 3. Van Dalum, G. et al. Circulating tumor cells before and during follow-up after breast cancer surgery. International Journal o Oncology 46, 407–413 (2015). gy ( ) 4. Cabinakova, M. et al. Predictive factors for the presence of tumor cells in bone marrow and peripheral blood in breast cance patients. Neoplasma 62, 259–268, doi: 10.4149/neo_2015_031 (2015). p p 5. Magbanua, M. J. et al. Circulating tumor cell analysis in metastatic triple-negative breast cancers. Clin Cancer Res 21, 1098–1105 doi: 10.1158/1078-0432.CCR-14-1948 (2015). 6. Maltoni, R. et al. Circulating tumor cells in early breast cancer: A connection with vascular invasion. Cancer Lett 367, 43–48, doi 10.1016/j.canlet.2015.06.020 (2015). j ( ) 17. Kasimir-Bauer, S. et al. Does primary neoadjuvant systemic therapy eradicate minimal residual disease? Analysis of disseminated and circulating tumor cells before and after therapy. Breast Cancer Res 18, 20, doi: 10.1186/s13058-016-0679-3 (2016).il 18. Pierga, J. Y. et al. Pathological response and circulating tumor cell count identifies treated HER2+​ inflammatory breast cancer patients with excellent prognosis: BEVERLY-2 survival data. Clin Cancer Res 21, 1298–1304, doi: 10.1158/1078-0432.CCR-14-1705 (2015).i 19. Wang, H. References Y. et al. Detection of circulating tumor cell-specific markers in breast cancer patients using the quantitative RT-PCR assay. International Journal of Clinical Oncology (2015).f f gy 0. Zhang, J. L. et al. Effects of Herceptin on circulating tumor cells in HER2 positive early breast cancer. Genet Mol Res 14, 2099–2103 doi: 10.4238/2015.March.20.20 (2015). 1. Barnadas, A. et al. Bone turnover markers as predictive indicators of outcome in patients with breast cancer and bone metastase treated with bisphosphonates: Results from a 2-year multicentre observational study (ZOMAR study). Bone 68, 32–40 (2014). 2. Bian, L. et al. Prediction value for dynamic changes of circulating tumor cell in therapeutic response and prognosis of Chinese metastatic breast cancer patients. Zhonghua Yi Xue Za Zhi 94, 265–268 (2014). p g 3. Horn, P., Jakobsen, E. H., Madsen, J. S. & Brandslund, I. New approach for interpreting changes in circulating tumour cells (CTC for evaluation of treatment effect in metastatic breast cancer. Translational Oncology 7, 694–701 (2014). f gy 24. Lavrov, A. V. et al. Analysis of Circulating Tumor Cells in Patients with Triple Negative Breast Cancer during Preoperative Chemotherapy. Bulletin of Experimental Biology and Medicine (2014). f 24. Lavrov, A. V. et al. Analysis of Circulating Tumor Cells in Patients w Chemotherapy. Bulletin of Experimental Biology and Medicine (2014). Chemotherapy. Bulletin of Experimental Biology and Medicine (2014 py f p gy 25. Mikulova, V. et al. Detection of circulating tumor cells during follow-up of patients with early breast cancer: Clinical utilit monitoring of therapy efficacy. Scand J Clin Lab Invest 74, 132–142, doi: 10.3109/00365513.2013.864784 (2014).i g pyfi y 26. Peeters, D. J. et al. Detection and prognostic significance of circulating tumour cells in patients with metastatic breast ca according to immunohistochemical subtypes. Br J Cancer 110, 375–383, doi: 10.1038/bjc.2013.743 (2014). g y j 27. Usiakova, Z. et al. Circulating tumor cells in patients with breast cancer: monitoring chemotherapy success. In Vivo 28, 605–614 (2014). 8. Azim, H. A. Jr. et al. Circulating tumor cells and response to neoadjuvant paclitaxel and HER2-targeted therapy: a sub-study from the NeoALTTO phase III trial. Breast 22, 1060–1065, doi: 10.1016/j.breast.2013.08.014 (2013). 28. Azim, H. A. Jr. et al. Circulating tumor cells and response to neoadjuvant paclitaxel and HER2-targ the NeoALTTO phase III trial. Breast 22, 1060–1065, doi: 10.1016/j.breast.2013.08.014 (2013). 9. Bidard, F. C. et al. References 1. Ursaru, M., Jari, I., Naum, A., Scripcariu, V. & Negru, D. Causes of Death in Patients with Stage 0-Ii Breast Cancer. Revista medico chirurgicala a Societatii de Medici si Naturalisti din Iasi 119, 374–378 (2015). g 2. Maltoni, R., Gallerani, G., Fici, P., Rocca, A. & Fabbri, F. CTCs in early breast cancer: A path worth taking. Cancer Lett 376, 205–210, doi: 10.1016/j.canlet.2016.03.051 (2016). g 2. Maltoni, R., Gallerani, G., Fici, P., Rocca, A. & Fabbri, F. CTCs in early breast cancer: A path worth taking. Cancer Lett 376, 205–210 doi: 10.1016/j.canlet.2016.03.051 (2016). j ( ) 3. Beije, N., Jager, A. & Sleijfer, S. Circulating tumor cell enumeration by the CellSearch system: the clinician’s guide to breast cance treatment? Cancer Treat Rev 41, 144–150, doi: 10.1016/j.ctrv.2014.12.008 (2015). j 4. Wallwiener, M. et al. Serial enumeration of circulating tumor cells predicts treatment response and prognosis in metastatic b cancer: a prospective study in 393 patients. BMC Cancer 14, 512, doi: 10.1186/1471-2407-14-512 (2014).t p p y p 5. Pierga, J. Y. et al. Circulating tumor cell detection predicts early metastatic relapse after neoadjuvant chemotherapy in large operable and locally advanced breast cancer in a phase II randomized trial. Clin Cancer Res 14, 7004–7010, doi: 10.1158/1078-0432.CCR-08- 0030 (2008). 5. Pierga, J. Y. et al. Circulating tumor cell detection predicts early metastatic relapse after neoadjuvant chemotherapy in large operable and locally advanced breast cancer in a phase II randomized trial. Clin Cancer Res 14, 7004–7010, doi: 10.1158/1078-0432.CCR-08- 0030 (2008). ( ) 6. Janni, W. et al. Pooled Analysis of the Prognostic Relevance of Circulating Tumor Cells in Primary Breast Cancer. Clin Cancer Res, doi: 10.1158/1078-0432.ccr-15-1603 (2016).i ( ) 6. Janni, W. et al. Pooled Analysis of the Prognostic Relevance of Circulating Tumor Cells in Primary Breast Cancer. Clin Cancer Res doi: 10.1158/1078-0432.ccr-15-1603 (2016).i 7. Pierga, J. Y. et al. Impact of targeted therapy on circulating tumor cells in metastatic breast cancer treated by first-line chemotherapy IC 2006-04 study. Cancer Research 71 (2011). y R ( ) 8. Smerage, J. B. et al. Circulating tumor cells and response to chemotherapy in metastatic breast cancer: SWOG S0500. J Clin Oncol 32, 3483–3489, doi: 10.1200/JCO.2014.56.2561 (2014). y 8. Smerage, J. B. et al. Circulating tumor cells and response to chemotherapy in metastatic breast cancer: SWOG S0500. J Clin Onco 32, 3483–3489, doi: 10.1200/JCO.2014.56.2561 (2014). ( ) 9. Aurilio, G. et al. www.nature.com/scientificreports/ Assessment of circulating tumor cells and serum markers for progression-free survival prediction in metastatic breast cancer: a prospective observational study. Breast Cancer Res 14, R29, doi: 10.1186/bcr3114 (2012). 43. Hayashi, N. et al. Prognostic value of HER2-positive circulating tumor cells in patients with metastatic breast cancer. Int J Clin Oncol 17, 96–104, doi: 10.1007/s10147-011-0260-0 (2012). 44. Mego, M. et al. Prognostic value of EMT-circulating tumor cells in metastatic breast can-cer patients undergoing high- chemotherapy with autologous hematopoietic stem cell transplantation. Journal of Cancer 3, 369–380 (2012). 45. Nadal, R. et al. Biomarkers characterization of circulating tumour cells in breast cancer patients. Breast Cancer Res 14, R71, doi: 10.1186/bcr3180 (2012).h 46. Serrano, M. J. et al. Dynamics of circulating tumor cells in early breast cancer under neoadjuvant therapy. Exp Ther Med 4, 43–48, doi: 10.3892/etm.2012.540 (2012).f 47. Daskalakis, M. et al. Assessment of the effect of surgery on the kinetics of circulating tumour cells in patients with operable b cancer based on cytokeratin-19 mRNA detection. Eur J Surg Oncol 37, 404–410, doi: 10.1016/j.ejso.2011.02.003 (2011). 47. Daskalakis, M. et al. Assessment of the effect of surgery on the kinetics of circulating tumour cells in patients with opera cancer based on cytokeratin-19 mRNA detection. Eur J Surg Oncol 37, 404–410, doi: 10.1016/j.ejso.2011.02.003 (2011). 48. Hartkopf, A. D., Wagner, P., Wallwiener, D., Fehm, T. & Rothmund, R. Changing levels of circulating tumor chemotherapy response in patients with metastatic breast cancer. Anticancer Res 31, 979–984 (2011). 48. Hartkopf, A. D., Wagner, P., Wallwiener, D., Fehm, T. & Rothmund, R. Changing levels of circulating tumor cells in monitoring chemotherapy response in patients with metastatic breast cancer. Anticancer Res 31, 979–984 (2011). 49. Reinholz, M. M. et al. Cytokeratin-19 and mammaglobin gene expression in circulating tumor cells from metastatic breast cancer patients enrolled in North Central Cancer Treatment Group trials, N0234/336/436/437. Clin Cancer Res 17, 7183–7193, doi: 10.1158/1078-0432.CCR-11-0981 (2011). 50. Tokudome, N. et al. Detection of circulating tumor cells in peripheral blood of heavily treated metastatic breast cancer patients. Breast Cancer 18, 195–202, doi: 10.1007/s12282-011-0259-4 (2011). 1. Bidard, F. C. et al. Clinical value of circulating endothelial cells and circulating tumor cells in metastatic breast cancer patients treated first line with bevacizumab and chemotherapy. Ann Oncol 21, 1765–1771, doi: 10.1093/annonc/mdq052 (2010). i py q 52. Cristofanilli, M. et al. Circulating tumor cells and FDG-PET/CT: Biological and functional methods for therapeutic monitoring in metastatic breast cancer. www.nature.com/scientificreports/ www.nature.com/scientificreports/ 2. Karaba, M. et al. Circulating tumor cells (CTCs) and epithelial mesenchymal transition (EMT) in primary breast cancer. Journal o Clinical Oncology 31 (2013). Clinical Oncology 31 (2013). 33. Mathiesen, R. R. et al. Detection and monitoring of circulating endothelial cells, circulating tumor cells and disseminated tumor cells during neoadjuvant breast cancer treatment including bevacizumab Cancer Research 73 (2013) gy 33. Mathiesen, R. R. et al. Detection and monitoring of circulating endothelial cells, circulating tumor cells and disseminated tu cells during neoadjuvant breast cancer treatment including bevacizumab. Cancer Research 73 (2013). 4. Nakayama, Y., Takahashi, S. & Ito, Y. A phase II clinical trial of neoadjuvant therapy with zoledronic acid for operable breast cancer Journal of Clinical Oncology 31 (2013).t f gy ( ) 5. Neugebauer, J. K. et al. Persistence of HER2 overexpression on circulating tumor cells in patients after systemic treatment for HER2 positive breast cancer: Follow-up results of the German Success B trial. Journal of Clinical Oncology 31 (2013). p p f gy 36. Pierga, J. Y. et al. Circulating tumor cells and brain metastasis outcome in patients with HER2-positive breast cancer: The LANDSCAPE trial. Annals of Oncology 24, 2999–3004 (2013).f g g LANDSCAPE trial. Annals of Oncology 24, 2999–3004 (2013). f gy 7. Roop, R. P. et al. A randomized phase II trial investigating the effect of platelet function inhibition on circulating tumor cells in patients with metastatic breast cancer. Clin Breast Cancer 13, 409–415, doi: 10.1016/j.clbc.2013.08.006 (2013). p j 8. Smerage, J. B. et al. Monitoring apoptosis and Bcl-2 on circulating tumor cells in patients with metastatic breast cancer. Molecula Oncology 7, 680–692 (2013). gy 39. Tryfonidis, K. et al. A multicenter phase I-II study of docetaxel plus epirubicin plus bevacizumab as first-line treatment in women with HER2-negative metastatic breast cancer. Breast 22, 1171–1177, doi: 10.1016/j.breast.2013.08.017 (2013). k l f l ll b d l fi l f g j 40. Turker, I. et al. Detection of circulating tumor cells in breast cancer patients: Prognostic predictive role. Asian Pacific Journal of Cancer Prevention 14, 1601–1607 (2013).ff ( ) 1. Xenidis, N. et al. Differential effect of adjuvant taxane-based and taxane-free chemotherapy regimens on the CK-19 mRNA-positive circulating tumour cells in patients with early breast cancer. Br J Cancer 108, 549–556, doi: 10.1038/bjc.2012.597 (2013). g p y j 42. Bidard, F. C. et al. www.nature.com/scientificreports/ Negative enrichment by immunomagnetic nanobeads for unbiased characterization of circulating tumor cells h l bl d f J l f l l d d / ( ) y 61. Liu, Z. et al. Negative enrichment by immunomagnetic nanobeads for unbiased characterization of circulating tumor cells from peripheral blood of cancer patients. Journal of translational medicine 9, 70, doi: 10.1186/1479-5876-9-70 (2011). y 1. Liu, Z. et al. Negative enrichment by immunomagnetic nanobeads for unbiased characterization of circulating tumor cells from peripheral blood of cancer patients Journal of translational medicine 9 70 doi: 10 1186/1479-5876-9-70 (2011) 61. Liu, Z. et al. Negative enrichment by immunomagnetic nanobeads for unbiased characterization of circulating tumor cells from peripheral blood of cancer patients. Journal of translational medicine 9, 70, doi: 10.1186/1479-5876-9-70 (2011). p p p f 2. Cen, P. T., Ni, X. L., Yang, J. X., Graham, D. Y. & Li, M. Circulating tumor cells in the diagnosis and management of pancreatic cancer. Bba-Rev Cancer 1826, 350–356, doi: 10.1016/j.bbcan.2012.05.007 (2012). j 3. Ignatiadis, M. et al. International study on inter-reader variability for circulating tumor cells in breast cancer. Breast Cancer Res 16 R43, doi: 10.1186/bcr3647 (2014). 63. Ignatiadis, M. et al. International study on inter-reader variability for circulating tumor cells in breast cancer. Breast Cancer Res 16, R43, doi: 10.1186/bcr3647 (2014). Author Contributions J.J. and C.Y.H. conceived the study, participated in drafting the final manuscript. Y.W.T., C.Q. and C.X. analyzed the data and completed the final draft of the manuscript. L.Y.F. and W.Y. prepared all the figures. All authors reviewed the manuscript. References Time-dependent prognostic impact of circulating tumor cells detection in non-metastatic breast cancer: 70-month analysis of the REMAGUS02 study. International Journal of Breast Cancer 2013 (2013). y y J f ( ) 30. Boutrus, R. R. et al. Circulating tumor cells as predictors of response and failure in breast cancer patients treated with preoperative chemotherapy. International Journal of Biological Markers 28, 17–23 (2013). py f g 31. Jiang, Z. F. et al. Circulating tumor cells predict progression-free and overall survival in Chinese patients with metastatic breast cancer, HER2-positive or triple-negative (CBCSG004): a multicenter, double-blind, prospective trial. Ann Oncol, doi: 10.1093/ annonc/mdt246 (2013). Scientific Reports | 7:43464 | DOI: 10.1038/srep43464 10 Acknowledgementsh Acknowledgementsh www.nature.com/scientificreports/ Cancer Research 69 (2009). 3. Serrano, M. J., Sanchez-Rovira, P., Delgado-Rodriguez, M. & Gaforio, J. J. Detection of circulating tumor cells in the context o treatment: prognostic value in breast cancer. Cancer Biol Ther 8, 671–675 (2009).t gh 4. Xenidis, N. et al. Cytokeratin-19 mRNA-positive circulating tumor cells after adjuvant chemotherapy in patients with early breas cancer. J Clin Oncol 27, 2177–2184, doi: 10.1200/JCO.2008.18.0497 (2009). 55. Nole, F. et al. Variation of circulating tumor cell levels during treatment of metastatic breast cancer: prognostic and therapeutic implications. Ann Oncol 19, 891–897, doi: 10.1093/annonc/mdm558 (2008). p 56. Muller, V. et al. Circulating tumor cells in breast cancer: correlation to bone marrow micrometastases, heterogeneous respon systemic therapy and low proliferative activity. Clin Cancer Res 11, 3678–3685, doi: 10.1158/1078-0432.ccr-04-2469 (2005). systemic therapy and low proliferative activity. Clin Cancer Res 11, 3678–3685, doi: 10.1158/1078-0432.ccr-04-2469 (2005). 57. Cristofanilli, M. et al. Circulating tumor cells, disease progression, and survival in metastatic breast cancer. The New England journal of medicine 351, 781–791, doi: 10.1056/NEJMoa040766 (2004). y py p y 57. Cristofanilli, M. et al. Circulating tumor cells, disease progression, and survival in metastatic breast cancer. The New England jo of medicine 351, 781–791, doi: 10.1056/NEJMoa040766 (2004). f J ( ) 58. Broersen, L. H., van Pelt, G. W., Tollenaar, R. A. & Mesker, W. E. Clinical application of circulating tumor cells in breast cancer. Cell Oncol (Dordr) 37, 9–15, doi: 10.1007/s13402-013-0160-6 (2014).i f 58. Broersen, L. H., van Pelt, G. W., Tollenaar, R. A. & Mesker, W. E. Clinical application of circulating tumor cells in breast cancer Oncol (Dordr) 37, 9–15, doi: 10.1007/s13402-013-0160-6 (2014).i dams, D. L. et al. Mitosis in circulating tumor cells stratifies highly aggressive breast carcinomas. Breast Cancer Res 18, 44, doi: 0.1186/s13058-016-0706-4 (2016).f 59. Adams, D. L. et al. Mitosis in circulating tumor cells stratifies highly aggressive breast carcinomas. Breast Cancer Res 18, 44 10.1186/s13058-016-0706-4 (2016).f ( ) 60. Ignatiadis, M., Lee, M. & Jeffrey, S. S. Circulating Tumor Cells and Circulating Tumor DNA: Challenges and Opportunities on the Path to Clinical Utility. Clinical Cancer Research 21, 4786–4800, doi: 10.1158/1078-0432.CCR-14-1190 (2015). 60. Ignatiadis, M., Lee, M. & Jeffrey, S. S. Circulating Tumor Cells and Circulating Tumor DNA: Challenges and Opportunities on the Path to Clinical Utility. Clinical Cancer Research 21, 4786–4800, doi: 10.1158/1078-0432.CCR-14-1190 (2015). y 61. Liu, Z. et al. Scientific Reports | 7:43464 | DOI: 10.1038/srep43464 This work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/ Publisher's note: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Additional Information Supplementary information accompanies this paper at http://www.nature.com/srepi Competing financial interests: The authors declare no competing financial interests. Scientific Reports | 7:43464 | DOI: 10.1038/srep43464 11 www.nature.com/scientificreports/ How to cite this article: Yan, W.-T. et al. Circulating tumor cell status monitors the treatment responses in breast cancer patients: a meta-analysis. Sci. Rep. 7, 43464; doi: 10.1038/srep43464 (2017). How to cite this article: Yan, W.-T. et al. Circulating tumor cell status monitors the treatment responses in breast cancer patients: a meta-analysis. Sci. Rep. 7, 43464; doi: 10.1038/srep43464 (2017). This work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/ This work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/ © The Author(s) 2017 Scientific Reports | 7:43464 | DOI: 10.1038/srep43464 12
https://openalex.org/W2170947739
https://eprints.soton.ac.uk/66751/1/1471-2377-9-45.pdf
English
null
Protocol for the saMS trial (supportive adjustment for multiple sclerosis): a randomized controlled trial comparing cognitive behavioral therapy to supportive listening for adjustment to multiple sclerosis
BMC neurology
2,009
cc-by
13,363
This article is available from: http://www.biomedcentral.com/1471-2377/9/45 This article is available from: http://www.biomedcentral.com/1471-2377/9/45 © 2009 Moss-Morris et al; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. BioMed Central BioMed Central BioMed Central BMC Neurology Open Access Trial registration: Current Controlled Trials ISRCTN91377356 y p Protocol for the saMS trial (supportive adjustment for multiple sclerosis): a randomized controlled trial comparing cognitive behavioral therapy to supportive listening for adjustment to multiple sclerosis p Rona Moss-Morris*1, Laura Dennison1, Lucy Yardley1, Sabin Suzanne Roche3, Paul McCrone4 and Trudie Chalder5 Address: 1School of Psychology, University of Southampton, Highfield Campus, Southampton, SO17 1BJ, UK , 2Department of Biostatistics, Institute of Psychiatry, King's College London, De Crespigny Park, London, SE5 8AF, UK , 3Chronic Fatigue Unit, Maudsley Hospital, Denmark Hill, London, SE5 9RS, UK , 4Health Service and Population Research Department, Institute of Psychiatry, King's College London, De Crespigny Park, London, SE5 8AF, UK and 5Department of Psychological Medicine, Institute of Psychiatry, King's College London, Weston Education Centre, Cutcombe Road, London, SE5 9RJ, UK Email: Rona Moss-Morris* - remm@soton.ac.uk; Laura Dennison - L.k.dennison@soton.ac.uk; Lucy Yardley - Ly3@soton.ac.uk; Sabine Landau - S.Landau@iop.kcl.ac.uk; Suzanne Roche - Suzanne.roche@slam.nhs.uk; Paul McCrone - p.mccrone@iop.kcl.ac.uk; Trudie Chalder - sphatrc@iop.kcl.ac.uk * Corresponding author Received: 15 July 2009 Accepted: 23 August 2009 Published: 23 August 2009 BMC Neurology 2009, 9:45 doi:10.1186/1471-2377-9-45 Published: 23 August 2009 Published: 23 August 2009 Published: 23 August 2009 BMC Neurology 2009, 9:45 doi:10.1186/1471-2377-9-45 BMC Neurology 2009, 9:45 doi:10.1186/1471-2377-9-45 g Psychological adjustment to Multiple Sclerosis Psychological adjustment to Multiple Sclerosis y g j p Multiple Sclerosis (MS) is an incurable, chronic and unpredictable disease of the central nervous system. The disease is characterized by the destruction of the myelin sheath surrounding the nerves resulting in the formation of plaques. These plaques disrupt the transmission of nerve impulses leading to the symptoms of the illness which include, but are not limited to, spasticity, loss of balance and co-ordination, blurred or double vision, blindness, numbness, speech distortions, bladder and bowel problems, fatigue, pain and cognitive dysfunction [1]. Plaques can occur in a variety of sites resulting in sub- stantial variation in the type and nature of the symptoms across individuals. The course of the illness is also highly variable and unpredictable [1]. The majority have either a relapsing-remitting or a relapsing-progressive course. Patients experience periods of partial or total remission where the illness is inactive, interspersed with symptom relapses. MS can also have a chronic-progressive course, in which there is a progressive worsening of symptoms and disability. Patients may be initially diagnosed with one type of MS, but over time progress to another. In the intervention literature to date targets of psycholog- ical interventions for people with MS, particularly Cogni- tive Behavioral Therapy (CBT), have been mostly centred on the alleviation of depression [27-29]. Two systematic reviews of psychological interventions for MS suggest that there is some evidence that cognitive behavioural approaches can be beneficial in the treatment of depres- sion, and in helping people to adjust to, and cope with having MS[15,30] However, both reviews also criticise the methodological quality of the intervention studies to date. Many have small sample sizes and many inade- quately report details of their intervention and trial meth- odology. This makes it hard to draw definitive conclusions about the efficacy of CBT in this area. Both reviews conclude that further, well-designed trials of CBT- based approaches are warranted. One in particular, con- cludes that existing research on adjustment and coping looks encouraging and that approaches that target the time period soon after diagnosis and see adjustment as an ongoing process would be useful [15]. This review also draws particular attention to the importance of following the CONSORT statement [31] for reporting such trials and using manuals to make replication of interventions possi- ble. g Psychological adjustment to Multiple Sclerosis MS is thought to affect more than 2.5 million people worldwide and around 400,000 people in the United States and 85,000 people in the United Kingdom cur- rently live with the disease [2,3]. The illness is more com- mon in females than males. The cause of the illness is largely unknown and there is currently no cure. Treatment focuses on the management of the patient's symptoms and reducing the number and severity of relapses. Individuals who have MS are faced with uncertainty about the future, unpleasant and unpredictable symptoms, treatment regimes and drug side effects. MS can have pro- found consequences including disruptions to life goals, employment, income, relationships, social and leisure activities and activities of daily living. Therefore it is not surprising that it poses multiple challenges for psycholog- ical adjustment. A large body of empirical literature attests to poor adjustment outcomes in MS including elevated rates of depressive symptomology or distress [4-7], increased anxiety [5,8], poor subjective well-being and quality of life [5,9], and social role and relationship diffi- culties [4,10]. On the other hand, research and clinical experience suggests that a substantial proportion of peo- ple with MS manage to adapt well to living with the illness [11,12]. Abstract Background: Multiple Sclerosis (MS) is an incurable, chronic, potentially progressive and unpredictable disease of the central nervous system. The disease produces a range of unpleasant and debilitating symptoms, which can have a profound impact including disrupting activities of daily living, employment, income, relationships, social and leisure activities, and life goals. Adjusting to the illness is therefore particularly challenging. This trial tests the effectiveness of a Cognitive Behavioural intervention compared to Supportive Listening to assist adjustment in the early stages of MS. Methods/Design: This is a two arm randomized multi-centre parallel group controlled trial. 122 consenting participants who meet eligibility criteria will be randomly allocated to receive either Cognitive Behavioral Therapy or Supportive Listening. Eight one hour sessions of therapy (delivered over a period of 10 weeks) will be delivered by general nurses trained in both treatments. Self-report questionnaire data will be collected at baseline (0 weeks), mid-therapy (week 5 of therapy), post-therapy (15 weeks) and at six months (26 weeks) and twelve months (52 weeks) follow-up. Primary outcomes are distress and MS-related social and role impairment at twelve month follow-up. Analysis will also consider predictors and mechanisms of change during therapy. In-depth interviews to examine participants' experiences of the interventions will be conducted with a purposively sampled sub-set of the trial participants. An economic analysis will also take place. Discussion: This trial is distinctive in its aims in that it aids adjustment to MS in a broad sense. It is not a treatment specifically for depression. Use of nurses as therapists makes the interventions potentially viable in terms of being rolled out in the NHS. The trial benefits from incorporating patient input in the development and evaluation stages. The trial will provide important information about the efficacy, cost-effectiveness and acceptability of the interventions as well as mechanisms of psychosocial adjustment. Trial registration: Current Controlled Trials ISRCTN91377356 Trial registration: Current Controlled Trials ISRCTN91377356 Page 1 of 17 (page number not for citation purposes) Page 1 of 17 (page number not for citation purposes) http://www.biomedcentral.com/1471-2377/9/45 BMC Neurology 2009, 9:45 Page 2 of 17 (page number not for citation purposes) Background ual differences in adjustment [14,15]. A systematic review conducted as pilot work for this trial demonstrated that a range of psychological factors were associated with adjust- ment outcomes in MS [16]. For instance, people reporting high levels of perceived social support showed better adjustment [17,18], as did individuals with high levels of optimism and hope [19,20] and those who engaged in health behaviours such as exercise [21]. Use of problem- focussed coping strategies such as planning was also con- sistently associated with more positive outcomes. On the other hand, emotion-focussed coping strategies including wishful thinking and escape/avoidance were consistently linked with worse adjustment [22,23]. High perceived lev- els of stress were also linked to worse adjustment [23]. Similarly, a tendency to interpret events, the illness and MS symptoms in an overly negative fashion has been linked to worse adjustment [24-26]. Since many of these factors are potentially modifiable through psychological intervention there is reason to conclude that a programme of therapy that addresses a number of these factors may lead to improvements in adjustment. Methods/Design Design The trial is a two arm randomized multi-centre parallel group controlled trial. Consenting participants who meet eligibility criteria are randomly allocated to receive either CBT for adjustment to MS or Supportive Listening (SL). The SL arm of the trial has been chosen over standard medical care as a comparison condition as it is an accept- able and plausible approach that will control for non-spe- cific treatment factors such as support, therapist time and attention, and patient expectations of improvement. The full trial design is summarized in Figure 1. Because most MS patients receive little structured psycho- logical support, CBT will be compared to Supportive Lis- tening therapy rather than treatment as usual. This will allow us to ascertain whether there are any particular ben- efits to CBT or whether just having the opportunity to talk to a supportive, empathetic therapist can make a differ- ence to adjustment outcomes. In line with suggestions for research in this area, general nurses will be trained and supervised to deliver the interventions [15]. Background to the project Given the evidence that CBT is helpful in improving men- tal health and psychological aspects of chronic health conditions, we wanted to investigate the efficacy of CBT in helping people with MS adjust to the psychological and social challenges of living with the disease. Although there are some differences between regional MS services in the United Kingdom in availability of information, advice Illness factors such as the extent of neurological disability, symptom severity, remission status and length of illness can influence levels of adjustment or a sense of well-being and quality of life [13,14]. However, psychological factors can be as important in predicting and explaining individ- Page 2 of 17 (page number not for citation purposes) Page 2 of 17 (page number not for citation purposes) http://www.biomedcentral.com/1471-2377/9/45 BMC Neurology 2009, 9:45 BMC Neurology 2009, 9:45 and support in the early stages of MS, formal psychologi- cal interventions are not routinely available. 6) To evaluate both interventions from the perspective of the person with MS using in-depth interviews and qualita- tive analysis methods to elicit their experiences of the ther- apy, any changes it brought, and any helpful and unhelpful aspects. The aim of this project is to assess whether CBT can enhance the adjustment of people in the relatively early years of dealing with MS. Unlike most previous studies which have evaluated the use of CBT in this group [15,30], the focus of this study is to improve broadly defined adjustment outcomes rather than restricting the scope of the intervention to reducing psychiatric morbidity in MS populations where individuals meet criteria for psychiat- ric disorder. By focusing the intervention on the earlier years of MS it is hoped that patients will learn strategies that will assist in managing the illness in the future. Primary Aim 1) To determine whether patients with early stage MS who undertake an 8 session CBT programme for adjustment to MS will demonstrate better adjustment (defined as psy- chological well-being and social and role adjustment) than those undergoing 8 sessions of Supportive Listening (SL). Sample size calculation Since there were no available MS CBT trials using either of our primary outcomes we computed a power analysis cal- culation based on a recent CBT trial for depression in peo- ple with MS, which used the Beck Depression Inventory (BDI) as the primary outcome [28]. The BDI, like the GHQ (one of our primary outcomes) is a measure of affec- tive distress. Using a conservative estimate for the within- group standard deviation the effect size from this study was .60. To achieve 80% power at alpha = 0.025 signifi- cance level (to adjust for two primary outcomes) we would need 55 patients in each group to detect an effect of this magnitude by an independent samples t-test. To allow for attrition of around 10% at follow-up we need to initially include 61 participants in each group. In our CBT for MS fatigue trial we only lost 3/72 patients to follow-up (4%). Setting The trial has two centers (Southampton and South Lon- don) and each center has one therapist who delivers both CBT and SL. Secondary Aims 2) To examine whether the CBT and SL groups differ on a range of secondary outcomes including quality of life, acceptance of illness and dysfunctional cognitions. 3) To examine whether changes in predefined psycholog- ical mechanisms act as mediators through which change/ adjustment in our primary outcomes occurs. These pro- posed mediating factors are dysfunctional or unhelpful cognitions and behaviours, and acceptance of illness. 4) To examine whether patients' responses to treatment is moderated by therapeutic alliance factors, patients' treat- ment preference, engagement in homework tasks, and perceived social support. Ethical approval pp This study has been reviewed and approved by the Thames Valley Multi-centre Research Ethics Committee (ref: 07/MRE12/6) Source of participants Participants will be recruited from two National Health Service (NHS) MS centers in the Southampton area (Southampton University Hospital Trust; SUHT) and South London (King's College Hospital Trust; KCHT). http://www.biomedcentral.com/1471-2377/9/45 BMC Neurology 2009, 9:45 - have a definite diagnosis of MS, of any type, con- firmed by a neurologist. exclusion criteria, to identify suitable patients. The nurse/ neurologist will hand over a Participant Information Sheet with a contact details reply slip, consent form, and freepost envelope to all that are potentially eligible and interested. If the participant is keen to be involved the nurse/neurologist will ask permission to write down the participant's contact details and freepost it back to the trial co-ordinator so that she can contact them about the project. Alternatively the patient can choose to initiate contact with the research team by posting the contact details form back to the trial co-ordinator, or getting in touch by telephone or email. - be diagnosed with MS within the last 10 years. - have some degree of ambulation (with assistance if needed), equivalent to an Expanded Disability Status Scale (EDSS) score [32] of 6.5 or less. - be stabilised on disease modifying or anti-depressant medication (if taking). For disease modifying drugs (e.g. interferon) patients must have been on medica- tion for a minimum of 3 months. For anti-depressants, patients must be on a stable dose for a minimum of 2 months. Once contact is made with the trial co-ordinator the patient's questions will be answered and their under- standing of what is involved in the trial verified. Consent forms will be returned to the trial co-ordinator by freepost for those who wish to take part. On the form, participants are given the choice to consent to the therapy trial and questionnaire assessments only, or to an additional in- depth telephone interview after their therapy programme has been completed. Randomization Randomization is at the patient level and will take place after the baseline questionnaire has been received. The randomization will be stratified by centre to ensure equal proportions in each treatment arm. Randomization is block stratified with varying block sizes. Randomization will be handled by an independent service at the King's College Mental Health and Neuroscience Clinical Trials Unit (CTU). On receipt of the baseline questionnaire, the trial co-ordinator will electronically submit details of each Recruitment and consent process Exclusion criteria Patients will be excluded from the study if they: - have gross cognitive impairment that would make participation in 8 one hour sessions of talking therapy problematic or distressing. This will be assessed using the Telephone Interview for Cognitive Status-Modi- fied; TICS-M [33] administered by the trial co-ordina- tor during screening. Patients with a score of less than 20 will be excluded. Eligibility screening and enrolment Eligibility screening and enrolment After obtaining written consent, participants will be screened for eligibility. Screening will be completed by the trial co-ordinator over the telephone using a screening checklist of the inclusion/exclusion criteria. - have serious psychological disorders for which treat- ment would be inappropriate (including psychotic disorders or active substance abuse problems). If potential participants do not meet the medication or current/recent psychological therapy criteria at the time of the eligibility screening they will be placed on hold and there will be the necessary delay (see inclusion/exclusion criteria) before they are enrolled into the trial. After screening, participants will be notified on the telephone by the trial co-ordinator whether they are eligible or inel- igible for the trial. - have other co-morbid serious chronic illnesses (e.g. a malignancy). - are currently participating in other psychological therapies or have participated in other therapies within the last 2 months. - are considered by their treating physician to have needs that are more appropriately addressed by a refer- ral to another psychological service (e.g. psychiatrist, clinical psychologist, MS special mental health nurse). Baseline questionnaire assessments Eligible participants will be sent the baseline question- naire and freepost return envelope together with a copy of their consent form. The schedule of assessments in the baseline questionnaire and subsequent follow-up ques- tionnaires is outlined in Table 1. Source of participants Inclusion criteria 5) To examine the cost-effectiveness of both interventions by taking into account benefits to patients, effects on health service usage and other costs to society, and cost of providing the interventions. Participants do not need to be currently experiencing dis- tress, depression or any particular coping difficulties to be included in the study. However, they must: Page 3 of 17 (page number not for citation purposes) Page 3 of 17 (page number not for citation purposes) http://www.biomedcentral.com/1471-2377/9/45 BMC Neurology 2009, 9:45 T flowchart of trial design RT flowchart of trial design. Screened for eligibility Baseline assessment (0 weeks) Excluded 1. Not meeting inclusion criteria 2. Refused to participate 3. Other reasons Not randomized 1. Not meeting eligibility criteria 2. Refused to participate 3. Other reasons Randomized (n=122) Allocation Completed therapy Dropped out of therapy Cognitive Behavior Therapy Delivered over 10 weeks Dropped out of therapy Supportive Listening Delivered over 10 weeks Assessed 5 weeks Assessed 15 weeks Assessed 5 weeks Assessed 5 weeks Assessed 5 weeks Assessed 15 weeks Assessed 15 weeks Assessed 15 weeks Assessed 26 weeks Assessed 52 weeks Assessed 26 weeks Assessed 52 weeks Assessed 26 weeks Assessed 52 weeks Mid-therapy assessment 6 month follow-up Post-therapy assessment Assessed 26 weeks Allocated to either London centre (i.e. Nurse-therapist 1) or Southampton centre (i.e. Nurse- therapist 2) Allocated to either London centre (i.e. Nurse-therapist 1) or Southampton centre (i.e. Nurse- therapist 2) Completed therapy Allocation: therapists Allocation: patients Assessed 52 weeks Enrolment 12 month follow-up Analyzed Analyzed Analyzed Analyzed Data analysis Screened for eligibility Excluded 1. Not meeting inclusion criteria 2. Refused to participate 3. Other reasons Baseline assessment (0 weeks) Not randomized 1. Not meeting eligibility criteria 2. Refused to participate 3. Other reasons Randomized (n=122) Supportive Listening Delivered over 10 weeks Cognitive Behavior Therapy Delivered over 10 weeks Analyzed Analyzed CONSORT flowchart of trial design Figure 1 CONSORT flowchart of trial design. http://www.biomedcentral.com/1471-2377/9/45 Page 5 of 17 (page number not for citation purposes) Therapist training Both therapies will be delivered in 8 sessions over a 10 week period. The first six sessions will be scheduled weekly and the last two fortnightly. The first session will be 80–90 minutes long and the remainder will be between 50 minutes to one hour. The first and fourth ses- sions will be held face-to-face and the remaining six will be telephone sessions. Telephone sessions make CBT more accessible to patients, particularly those with mobil- ity problems, and have been shown to be an effective form of therapy for people with MS [27]. The therapists in this trial are two general nurses without prior experience in delivering psychological interventions, or specialist MS experience. They were given 2 weeks of intensive classroom training in understanding MS, CBT and SL. The training included a combination of didactic teaching, homework readings, and discussion. Role play and vid- eoed therapy sessions were also used throughout the CBT and SL training sessions. A summary of the classroom training package is presented in Table 2. Both interventions will be carried out in accordance with written, structured manuals. Participants will be issued either a CBT or SL therapy manual in their first session with the nurse-therapist. The classroom training was followed by 12 weeks of closely supervised practice with 5 pilot patients. Each nurse saw 3 pilot patients for 8 weeks of CBT and 2 pilot patients for 8 weeks of Supportive Listening. These patients had a diagnosis of MS but did not necessarily meet other trial criteria. RMM supervised the SL and TC and SR supervised the CBT. Booking in participants During the pilot/training stage the nurse-therapists audio- taped every therapy session using digital recorders. The clinical supervisors rated two randomly selected record- ings (sessions 5, 6, 7 or 8) using the Therapy Competence and Fidelity Rating scale described above. The therapists were required to score at least 4 (i.e. a 'acceptable-good' level of competence demonstrated) on all the relevant items in order to be deemed competent in the therapy and ready to commence therapy with trial participants. On receiving the randomisation outcome from the CTU the nurse-therapist will contact the new participant, notify them of their group allocation and set a date for their first session. Nurse-therapists will endeavour to book patients within one week of randomisation. Participants will be consulted about special considerations needed for their visit (e.g. disabled parking) and reimbursed for their travel expenses. http://www.biomedcentral.com/1471-2377/9/45 http://www.biomedcentral.com/1471-2377/9/45 http://www.biomedcentral.com/1471-2377/9/45 BMC Neurology 2009, 9:45 http://www.biomedcentral.com/1471-2377/9/45 participant to an electronic randomization system set up and maintained by the CTU. The system then notifies the relevant nurse-therapist (i.e. London or Southampton) of the randomisation outcome by email immediately. This email will be printed and placed on the participant's ther- apy file. in the pilot phase of the training, both supervisors and nurses met to discuss pilot patients and any difficulties encountered. Difficult situations were role played and new skills or ways of managing the situations were prac- ticed. Recruitment and consent process Recruitment and consent process Patients seen or in contact with these services during the trial period will be informed about the trial if they appear to meet eligibility criteria. During routine consultations, either one of the MS nurses or one of the neurologists will use an eligibility checklist, detailing the key inclusion and Page 5 of 17 (page number not for citation purposes) Page 5 of 17 (page number not for citation purposes) rial assessment procedures Baseline (week 0) Mid-therapy (week 5) Post-therapy (week 15) 6 month follow-up (week 26) 12 month follow (week 52) X - - - - me since symptoms started, type of for depression, supplements or ganizations) X - - - - cation, interventions, recent and - - X X X X - - - - s - - X - - - - X - - - - - X X 1]) X X X X X [43]) X X X X X X X X X X X - X X X Scale (ACHC [45]) X X X X X X X X X X Q [48]) X X X X X mptoms Questionnaire (CBRSQ; in preparation) X X X X X ) X - - X X X - - X X (EDSS [50]) X - - - X Page 7 of 17 (page number not for citation purposes) CBT Development of the manual and therapy package Beck's cognitive model of emotion which incorporates a developmental perspective [35] in conjunction with a sys- tematic review of 72 studies which looked at psychologi- cal factors associated with adjustment in MS [16] was used to guide the development of the CBT model and therapy manual for this trial. Details of our CBT model of adjust- ment to MS are presented in the review [16]. Because acceptance of MS appeared to be a significant factor in adjusting to the illness, we incorporated some basic prin- ciples for facilitating acceptance into our manual from Steven Hayes' Acceptance and Commitment Therapy [36]. Supervision of pilot patients occurred once a week as soon after a session as possible. The supervisor listened to one of the recent sessions and rated the session using the Ther- apy Competence and Fidelity Rating scale modified spe- cifically for this trial [34] This scale includes 14 items, 7 of which assess SL and 7 CBT. Example items are 'Does the therapist reflect or paraphrase appropriately' (SL) and 'Does the therapist help the client to identify specific types of cognitive distortions or errors (e.g. all-or-nothing thinking, over-generalization) (CBT item). The nurse- therapist also listened to the session and completed self- ratings of competence using the same rating scale. Super- visor and nurse ratings were discussed during supervision and strengths highlighted. Areas for improvements and strategies for these were also identified. Checks were made for treatment fidelity and to assess that CBT techniques were not used in the SL sessions. Approximately midway We also conducted two qualitative studies where 30 peo- ple with early stage MS and 15 of their partners engaged in in-depth interviews about their experiences of having MS, problems they encountered, and the things they found helpful and unhelpful in adjusting to living with MS [[37]; Dennison, Yardley, Devereux and Moss-Morris, in preparation]. CBT • Emotional processing and how to facilitate it. • Psychiatric emergencies and risk assessment • Identifying MS specific cognitions • How to use thought records to link, thoughts, behaviors and emotions • Challenging unhelpful thoughts • How to deal with patients "realistic" negative thoughts • Behavioral Activation and behavioral experiments • Problem solving • Dealing with resistance • Dealing with hopelessness • Behavioral Activation and behavioral experiments • Dealing with resistance • Dealing with hopelessness • Introduction to therapist and patient manuals • Issues around housekeeping • Introduction to concepts of unconditional regard, warmth and empathy • Describing the active listening techniques • Facilitator demonstration of techniques • Nurse role play using MS case studies • Nurse role play using a personally relevant difficult or painful situation • Practice and feedback using the variety of techniques • Introduction to therapist and patient manuals • Issues around housekeeping balance between looking after your own well-being and the needs of your partner with MS. lysed using thematic analysis. Core themes were covered in the manual and verbatim quotes from the interviews were used for illustrating points. lysed using thematic analysis. Core themes were covered in the manual and verbatim quotes from the interviews were used for illustrating points. Supportive Listening (13 hours) Page 8 of 17 (page number not for citation purposes) CBT Transcripts of these interviews were ana- Page 7 of 17 (page number not for citation purposes) Page 7 of 17 (page number not for citation purposes) http://www.biomedcentral.com/1471-2377/9/45 BMC Neurology 2009, 9:45 Table 2: Details of the two week classroom training program for the nurse-therapists Pragmatics of the trial and house keeping (6 hours) • Line management and orientation to the units • Record keeping for the trial, general paperwork, keeping patient notes and writing GP letters Understanding MS: (6.5 hours) • Introduction to MS including the pathogenesis of the disease, types of MS, symptoms and medical treatment • Understanding adjustment to MS and introduction to the CBT model and manual • The role of partners and family members Cognitive Behavioral Therapy (32.5 hours) • Introduction to Beck's systems model of CBT • Introduction to CBT, psychological therapies, and psychiatric diagnosis • Process of treatment and how change takes place over time • Assessment, conceptualization and formulation in CBT • Supervision and how to use it • Exploring the nurse-therapists' personal beliefs and assumptions • Motivational Interviewing Skills • Setting homework • Overview of anxiety and depression, including prevalence and diagnostic criteria. • Emotional processing and how to facilitate it. • Psychiatric emergencies and risk assessment • Identifying MS specific cognitions • How to use thought records to link, thoughts, behaviors and emotions • Challenging unhelpful thoughts • How to deal with patients "realistic" negative thoughts • Behavioral Activation and behavioral experiments • Problem solving • Dealing with resistance • Dealing with hopelessness Supportive Listening (13 hours) • Introduction to therapist and patient manuals • Issues around housekeeping • Introduction to concepts of unconditional regard, warmth and empathy • Describing the active listening techniques • Facilitator demonstration of techniques • Nurse role play using MS case studies • Nurse role play using a personally relevant difficult or painful situation • Practice and feedback using the variety of techniques Table 2: Details of the two week classroom training program for the nurse-therapists • Introduction to Beck's systems model of CBT • Introduction to CBT, psychological therapies, and psychiatric diagnosis • Process of treatment and how change takes place over time • Assessment, conceptualization and formulation in CBT • Supervision and how to use it • Exploring the nurse-therapists' personal beliefs and assumptions • Motivational Interviewing Skills • Setting homework • Overview of anxiety and depression, including prevalence and diagnostic criteria. The CBT therapy package py p g The aim of this CBT package is to enable patients to adapt appropriately to their illness. The focus is to achieve opti- mal day-to-day functioning within the constraints of the disease, to minimize distress and manage symptoms in the short and long term. The treatment is structured but also individualized to the needs of the patient as it is clear from the literature and our qualitative interviews that the process of adjustment can vary across individuals. Once the 100 page draft manual was developed, it was reviewed by people with MS and their families, neurolo- gists, MS nurses and CBT therapists. Feedback from these sources was then used to make appropriate amendments to the manual. We also developed a short 10 page booklet for the partic- ipant to give to a partner or significant other entitled "Coping when somebody close to you has MS". This booklet covers information which closely reflects the themes from the qualitative study on spouses of people with MS [37]. These include dealing with feelings of help- lessness and difficult emotions, how to support someone with MS, dealing with other people's reactions to MS, maintaining a social life in the face of MS, and finding a In the early sessions, participants will work with their nurse-therapist in developing a formulation of their par- ticular areas of strengths and difficulties. The manual con- sists of nine chapters which can be used as appropriate depending on the formulation (see Table 3 for details of the manualized sessions). The nurse-therapist will work Page 8 of 17 (page number not for citation purposes) Page 8 of 17 (page number not for citation purposes) BMC Neurology 2009, 9:45 http://www.biomedcentral.com/1471-2377/9/45 discuss an appropriate solution. If the session can be rear- ranged to stay in line with the standard scheduling of ses- sions it should be rescheduled. together with the participant in deciding which areas to focus on and in setting tasks or homework to do in between the sessions. The nurses will record which of the nine chapters are covered in each session for each patient. Both nurses and patients will work from the same detailed manual. Inevitably there will be times when MS symptoms or relapse, other sickness, holidays, or unexpected events interfere with the standard scheduling of sessions such that therapy exceeds or alters the 10 week window (described earlier). The CBT therapy package However, generally therapy should be completed within a maximum of 12 weeks. In exceptional circumstances (e.g. the participant experiences a severe relapse of MS or has a family/personal crisis) timing of sessions can be discussed with principal investigators and rearranged. However, a participant will never have more than the 8 sessions. Therapy record keeping Therapy record keeping Deviations from the standard therapy schedule will be logged so they can be reported and analysed. Details of the date and length of each session (and for CBT partici- pants, the chapters covered and a rating on a scale of 1–10 of homework engagement) will be recorded by the nurse- therapist. The SL therapist manual is based on manuals used in pre- vious trials comparing CBT to counselling [38] and prag- matic rehabilitation to Supportive Listening therapy [39]. The manual outlines how SL is different to CBT and which interventions are prohibited such as offering explanations for symptoms, eliciting symptom information or changes, suggesting explicit coping strategies, interpreting informa- tion rather than responding reflectively, leading or direct- ing the client and giving homework assignments or tasks. All therapy sessions will be digitally recorded with permis- sion from the participant and saved in an encrypted anon- ymous format. These recordings will be used for ongoing supervision and to assess treatment fidelity and therapist effects at the end of the trial. The SL therapist manual also includes a description of the listening skills to be used in SL which are based on the the- ories and counselling techniques of Carl Rogers [40]. These core skills include asking open questions, active lis- tening skills such as minimal encouragers, paraphrasing, empathising, reflecting and summarising. The purpose is to provide the participant the opportunity to talk and express themselves in a non-judgemental, safe environ- ment. The person should experience empathy from the therapist and feel listened to. Informing the participants' health professionals regarding involvement in the trial After the first session, the nurse-therapist will write to the participant's GP and MS service to inform them of the patient's participation in the trial. For CBT patients this will also include a summary of the assessment made and the areas that are likely to be concentrated on in the remaining sessions (discussed and agreed with the partic- ipant and a copy sent to the participant for their own records). More advanced Rogerian counselling skills such as prob- lem clarification, accurate understanding and challenging are not included in the therapist training or manual. The SL was designed to control for the non-specific effects of therapy such as warmth and positive regard rather than being formal counselling therapy per se. Ongoing supervision of nurse-therapists Two experienced CBT therapists (SR and TC) will super- vise the CBT and an experienced health psychologist (RM) will supervise the SL. For the first two months of the trial each nurse-therapist will have a separate CBT and SL supervision session once per week. Supervision will be fortnightly for the rest of the trial. Sessions will be between 30 – 60 minutes long and may be either by tele- phone, or face-to-face. At least once every two months the nurse-therapists will have a face-to-face session. Tape recordings of a session will be shared with the supervisor before the sessions and discussed during supervision. Each nurse-therapist will keep a log of dates and timings of their supervision sessions. Once per month the super- The participant or client manual for SL is a short 7 page document. It provides brief information about MS and why Supportive Listening may be beneficial for people with MS. It also outlines what patients can expect from the therapy sessions and a timetable for scheduling the meet- ings. Missed or postponed sessions Supportive Listening Supportive Listening (SL) will be presented to patients as a treatment based on the idea that they will be able to help themselves if given the opportunity to talk freely, exten- sively and confidentially about their experiences, thoughts and feeling about MS and its effect on their lives. If participants prefer not to focus on their MS, they will be encouraged to choose other topics to talk about which, they feel, are currently relevant to them. Page 9 of 17 (page number not for citation purposes) Missed or postponed sessions p p In the case of cancellation or non-attendance at therapy the nurse-therapist will contact the participant by tele- phone to ascertain the problem of attendance and will Page 9 of 17 (page number not for citation purposes) Page 9 of 17 (page number not for citation purposes) http://www.biomedcentral.com/1471-2377/9/45 http://www.biomedcentral.com/1471-2377/9/45 BMC Neurology 2009, 9:45 visor will check that session documentation has been properly completed. Therapeutic fidelity ratings Fidelity rating for the interventions will occur throughout the trial in the supervision sessions. In addition, at the end f h i l l i f di f h i will be assessed by an independent experienced clinician using a modified version of the therapy rating scale [34] to ensure treatment integrity. Sessions to be rated will be selected at the end of the therapy part of the trial without input from nurses and supervisors. Approximately one third (randomly chosen) will be co-rated by a second rater i d bli h li bili f i Table 3: Summary of the content of the CBT manual for adjustment to MS Chapter 1: Introduction to adjusting to MS What is MS and what does adjusting to MS mean? Factors which have been shown to affect adjustment in MS. A CBT model of adjusting to MS which includes interactions between thoughts, behavior, biology and emotions. Assessment of current strengths and difficulties. Chapter 2: Adapting to living with MS What do we mean by acceptance? Strategies for becoming accepting. Dealing with negative emotions such as sadness, grief, loss, frustration, anger, anxiety, depression, shame and embarrassment. Chapter 3. Setting goals and problem solving Exploring values and setting treatment goals where change may be needed across different areas of life. Once problems are identified, developing a stepped approach to problem solving drawing on the patient's strengths and support network. Chapter 4. Managing symptoms Helping make the link between symptoms, thoughts and behaviors. May involve a discussion on accepting limitations. The pitfalls of becoming overly symptom focused and avoidant and strategies for managing these. Understanding MS symptoms, and which symptoms are likely to be a sign of relapse, medication side effects, or stress/distress. Diaries of patterns of rest and activity to see how these may influence symptom experience. Chapter 5. How to tackle negative and unhelpful thoughts Demonstrations of how perceptions of events can influence coping with illness. There are two primary outcomes. There are two primary outcomes. 1. Cognitive and behavioural responses to symptoms. The Cognitive and Behavioural Response to Symp- toms Questionnaire (CBRSQ) [Moss-Morris, Chalder, Skerrett & Baldwin, in preparation] is a newly devised 34 item questionnaire which was designed to measure patients' cognitive and behavioural responses to symptoms. The subscales of this questionnaire have been shown to predict a significant amount of the var- iance in MS related disability and fatigue over and above EDSS scores, remission status, and mood [47] 1. Cognitive and behavioural responses to symptoms. The Cognitive and Behavioural Response to Symp- toms Questionnaire (CBRSQ) [Moss-Morris, Chalder, Skerrett & Baldwin, in preparation] is a newly devised 34 item questionnaire which was designed to measure patients' cognitive and behavioural responses to symptoms. The subscales of this questionnaire have been shown to predict a significant amount of the var- iance in MS related disability and fatigue over and above EDSS scores, remission status, and mood [47] 1. The General Health Questionnaire (GHQ) [41] is designed to measure general levels of distress in peo- ple in the community and medical settings. The meas- ure is uncontaminated by the experience of MS related somatic symptoms and a recent study showed the GHQ was the most treatment responsive measure of psychological distress in three discrete MS samples [42]. 2. The Work and Social Adjustment Scale (WSAS) [43] is a self-report scale of functional impairment attribut- able to an identified illness, in this case MS. The scale measures how much MS interferes with a person's work, home management, social leisure activities, pri- vate leisure activities, and the ability to form and maintain close relationships. 2. Illness perceptions will be assessed using the Brief Illness Perceptions Questionnaire (BIPQ) [48]. This 8 item questionnaire assesses cognitive and emotional illness representations (e.g. its timeline, conse- quences, controllability). Across a range of illnesses, negative illness perceptions are related to worse adjustment outcomes, whilst changes to illness per- ceptions may improve adjustment. Mediators of the treatment effect In order to gain a clearer idea of the possible mechanisms and to help refine our CBT model of MS adjustment we have included a number of measures as possible media- tors of the treatment effect. These are cognitive behav- ioural factors which have been demonstrated to be associated with adjustment outcomes, and/or are addressed within either or both interventions. We hypoth- esize that the mediators of improvements in psychologi- cal well-being (GHQ) will be different to the mediators of improvements in functional impairment (WSAS). If participants are unable to complete questionnaires themselves (e.g. due to relapse) the trial co-ordinator will go through the questionnaire on the telephone and this will be logged as such on the trial database. Spouses/part- ners/friends will not be allowed to complete the question- naire on the participant's behalf or assist them with writing their answers. Completed, returned question- naires will be checked by the trial co-ordinator and partic- ipants contacted if there is a large amount of missing data. Outcome assessments Outcome assessments of mobility, self-care, usual activities, pain/discomfort and anxiety/depression. of mobility, self-care, usual activities, pain/discomfort and anxiety/depression. Questionnaires (see Table 1) will be completed at base- line (prior to randomisation), mid-therapy (session 5 of therapy sessions), post-therapy follow-up (15 weeks after randomisation), 6 month follow-up (26 weeks after ran- domisation) and 12 month follow-up (52 weeks after ran- domisation). All assessments are questionnaire-based. Data collection will be managed by the trial co-ordinator who will be blind to treatment allocation. Participants will be able to choose whether to complete online or paper-based questionnaires (returned by freepost). Dates that questionnaires are sent out and received will be recorded. A reminder phone call or reminder emails will be used if the questionnaire is not received within two weeks of send-out. After four weeks another copy of the questionnaire pack will be reissued. 2. Acceptance of illness will be measured using the Acceptance of Chronic Health Conditions Scale (ACHC) [45]. This scale assesses acceptance of and adjustment to change in one's life due to a chronic health condition (in this case MS). 2. Acceptance of illness will be measured using the Acceptance of Chronic Health Conditions Scale (ACHC) [45]. This scale assesses acceptance of and adjustment to change in one's life due to a chronic health condition (in this case MS). 3. Dysfunctional cognitions will be measured by the Psychological Vulnerability Scale (PVS) [46]. This short scale taps maladaptive cognitive responses which are proposed to promote unhelpful adjustment to stressors (e.g. perfectionism, need for approval). Missed or postponed sessions Identifying traps or 'errors' in thinking and finding alternatives can help with adjustment and levels of distress. Examples of unhelpful thoughts are covered such as fears about the illness and future, and high personal expectations. Using daily thought records of unhelpful thoughts, challenging these thoughts and coming up with alternative thoughts. Chapter 6. Improving the quality of your sleep Basic sleep hygiene including establishing a good sleep/wake routine which encourages natural sleep and addressing factors which interrupt sleep. Goal setting to improve sleep. Chapter 7. Managing stress Exploring skills to call on in times of stress such as distraction, problem solving, relaxation, prioritising, saying no and planning. Goal setting to improve stress management. Chapter 8. Managing social relationships Becoming more assertive. Managing relationships with care providers. Getting the right type of support for one's needs and sharing emotions. Chapter 9. Preparing for the future Identifying physical and emotional warning signs of relapse and normalising these. Developing a future management plan using personal strengths, newly learnt skills and support from others in difficult times. Table 3: Summary of the content of the CBT manual for adjustment to MS visor will check that session documentation has been properly completed. visor will check that session documentation has been properly completed. will be assessed by an independent experienced clinician using a modified version of the therapy rating scale [34] to ensure treatment integrity. Sessions to be rated will be selected at the end of the therapy part of the trial without input from nurses and supervisors. Approximately one third (randomly chosen) will be co-rated by a second rater in order to establish reliability of ratings. Therapeutic fidelity ratings Fidelity rating for the interventions will occur throughout the trial in the supervision sessions. In addition, at the end of the trial a selection of recordings of therapy sessions Page 10 of 17 (page number not for citation purposes) http://www.biomedcentral.com/1471-2377/9/45 BMC Neurology 2009, 9:45 1. Quality of life will be measured using the EuroQol 5 (EQ 5D) [44] which is a 5 item composite measure 1. Quality of life will be measured using the EuroQol 5 (EQ-5D) [44] which is a 5-item composite measure Blinding g The trial co-ordinator will administer all quantitative assessment procedures and will be kept blind to the treat- ment allocation of participants until final follow-up has been completed. The trial co-ordinator will not deal with paperwork that links a participant to their therapy condi- tion, or be present when any discussions revealing this information take place. However, if she becomes aware or suspicious of the treatment condition of any participant she will log this lapse of blinding on the trial database for later consideration in a sensitivity analysis. Either way, as all assessments are by self-report, rather than rated by a member of the research team, influences of observer biases are not expected. Social support is measured by the Significant Other Scale (SOS) [49]. We are using a shortened version of this scale (8 items) where the participant is asked to state one key support person and then rate desired and received support in different domains (e.g. practical help and socialising). Due to the nature of the interventions it is not possible to blind the principal investigators and nurse-therapists as they will be delivering and supervising the therapy ses- sions. It is also not possible to blind participants to treat- ment allocation. However, the trial is set up as comparison of two treatments rather than as a treatment versus control condition. The participant information presents both treatments as a way of assisting adjustment to MS with neither treatment being given preference. Dur- ing statistical analysis the treatment groups will be assigned a code rather than their name so that the statisti- cians are unaware what the treatment group code repre- sents. In addition to these measures we have included a number of questions to measure illness severity, progression and relapse (see Table 1) including the self-reported Expanded Disability Status Scale (EDSS)[50]. This will allow us to assess whether there has been any noticeable disease pro- gression. The self-reported EDSS is a relatively new instru- ment which allows MS patients to self-report their current disease status, rather than this being assessed by a neurol- ogist during a clinical examination. The questionnaire includes items which relate to mobility, strength, co-ordi- nation, sensation, bladder, vision, speech, swallowing, and cognition. Using the responses from these items, functional system scores are computed and an EDSS score is assigned to the participant ranging from 0 (no neuro- logical impairment) to 10 (death from MS). 2. Dysfunctional cognitions (PVS)[46] as described above under secondary outcomes. This will record health and social service contacts in the six months prior to baseline assessment, and the periods prior to 6- and 12-month follow-up interviews. Time lost from work because of MS-related problems will also be measured. 3. Acceptance of illness (ACHC) [45]as described above. 3. Acceptance of illness (ACHC) [45]as described above. Moderators of Treatment Improvement Data inputting Data will be input into a flat SPSS spreadsheet by the trial co-ordinator. All primary data (GHQ and WSAS) at all time points will be double entered by an administrator. This will then be checked for errors and discrepancies, which will then be corrected by consulting the raw ques- tionnaire data (paper based or online). A percentage of all other data inputting will also be double entered to ensure accuracy. Any follow-up action (e.g. double entry of more data) will be taken as necessary. Patients will also be asked to rate their treatment prefer- ence at the beginning of the trial and their feelings about treatment efficacy at the end of the trial. Blinding The trial co- ordinator will review and score each questionnaire, which is then co-scored by a neurologist specialising in MS in order to ensure reliability of scoring. Moderators of Treatment Improvement The EuroQol (EQ-5D) [44], a 5 item composite measure which considers mobility, self-care, usual activities, pain/ discomfort and anxiety/depression will be used to assess quality of life. The EQ-5D will be used to generate quality adjusted Life Years (QALYs) [52]. We will also look at two potential moderators of patients' response to treatment, the therapeutic alliance and per- ceived social support. The therapeutic alliance is measured using the Alliance subscale of the Therapy Competence and Fidelity Rating scale [34]. Independent raters blind to treatment outcome will use this scale to rate therapy tapes from each of the two therapists. The scale includes items including emo- tional expression by the patient and level of empathy expressed by the therapist. Items are rated on a 7-point Likert Rating Scale, with anchors at four points along the scale [e.g. 'not at all' (1), 'somewhat' (3), 'considerably' (5) and 'extensively']. Mediators for GHQ These include quality of life and factors which have been shown to be related to adjustment outcome in MS and are key components of our model of adjustment to MS. 1. Unhelpful beliefs about emotions are measured using the recently developed Beliefs About Emotions Scale (BES) [Rimes & Chalder; in preparation]. This 6 item questionnaire measures the extent to which the person holds unhelpful beliefs about experiencing, expressing, and controlling emotions. 1. Quality of life will be measured using the EuroQol 5 (EQ-5D) [44] which is a 5-item composite measure Page 11 of 17 (page number not for citation purposes) Page 11 of 17 (page number not for citation purposes) BMC Neurology 2009, 9:45 http://www.biomedcentral.com/1471-2377/9/45 http://www.biomedcentral.com/1471-2377/9/45 2. Dysfunctional cognitions (PVS)[46] as described above under secondary outcomes. 2. Dysfunctional cognitions (PVS)[46] as described above under secondary outcomes. Page 12 of 17 (page number not for citation purposes) Withdrawals from therapy If a participant expresses the wish to withdraw from the trial, the nurse-therapist will contact the participant to ascertain the reason for drop-out if the participant is will- ing to share this. They will be offered the option of talking to a principal investigator instead if they wish. If the par- ticipant considers that they are deteriorating a principal investigator will contact them and discuss an appropriate solution. Independent monitoring and quality control A Trial Steering Committee (TSC) including a Data Moni- toring Group has been set up to monitor the conduct of the trial. They will provide overall supervision for the trial and safeguard its integrity. Authority for continuation of the trial lies with the TSC. The committee includes an independent chairperson, the lead and principal investi- gators, the trial co-ordinator, a statistician, a representa- tive from the MS Society and a patient representative. The committee will meet at least annually during the trial period, and more frequently and/or via telephone confer- ence or email communication if pressing issues arise. The nurse-therapist (or principal investigator if they make contact) should ascertain whether consent is withdrawn from: a) further treatment only a) further treatment only b) further treatment and follow-up (questionnaires plus the in-depth telephone interview) Compliance The trial will be conducted in compliance with the Decla- ration of Helsinki, MRC Good Clinical Practice (GCP) guidance, the Data Protection Act (1998), the National Research Ethics Service (NRES) approvals, NHS Trust reg- ulations, and other regulatory requirements as appropri- ate. The final trial publication will include the items recommended under the extended CONSORT statement for randomized trials of nonpharmacologic treatment [53]. c) retaining data already collected for use in final anal- ysis. The reason for withdrawal (e.g. adverse events, relapse, ill- ness progression, inability to adhere, inability to attend) will be communicated to the principal investigator for that centre as well as the trial co-ordinator who will record and report this information as appropriate. Adverse events/reactions Adverse events (AE), adverse reactions (AR), serious adverse events (SAE) and serious adverse reactions (SAR) will be defined according to the usual clinical trial defini- tions. Where these occur they will be recorded on the trial spreadsheet and reported to the appropriate authorities and followed up in the standard manner. The interviewer will contact each participant to schedule a telephone interview and conduct the interview according to an interview schedule. Questions address expectations of therapy, experiences of therapy sessions, features of therapy liked and disliked, and the process of change (or not) as a result of therapy. Each interview will be audio- taped or digitally recorded. Interviews will be transcribed by an administrator, omitting any information that may compromise confidentiality. Completed recordings and transcripts will be stored in a locked cabinet (if printed) or in a password protected file (if digital) for analysis after the trial has concluded. Departures from the trial protocol, changes to the manu- alized treatments, and breaking of the randomization code will only occur with the advice of the TSC if it becomes apparent that a particular treatment arm is caus- ing a consistent pattern of deterioration, or if there is another obvious and significant clinical necessity. http://www.biomedcentral.com/1471-2377/9/45 http://www.biomedcentral.com/1471-2377/9/45 BMC Neurology 2009, 9:45 toral researcher who has not had any involvement in other aspects of the trial. assess the severity of the situation. If necessary, a referral will be made to ensure the patient gets the support they need. Around 15 CBT participants and 15 SL participants will be interviewed regarding their experiences of therapy. If a large enough pool of consenting participants is available, purposive sampling will be employed on the basis of questionnaire-based reports of therapy satisfaction, per- ceived improvement, and demographic and illness char- acteristics. Qualitative interviews Service use (additional to the CBT intervention or Sup- portive Listening which will both be centrally recorded) by patients in both arms of the trial will be measured using the Client Service Receipt Inventory (CSRI) [51]. On receipt of completed post-therapy questionnaires, details of those participants who have consented to take part in the in-depth interview will be passed to a post-doc- Page 12 of 17 (page number not for citation purposes) Page 12 of 17 (page number not for citation purposes) http://www.biomedcentral.com/1471-2377/9/45 Statistical analysis plan life years (QALYs), generated from the EQ-5D to assess cost-effectiveness. If the intervention has lower costs and better outcomes then it will be 'dominant'. In the event of the intervention having higher service costs and better outcomes, cost-effectiveness will be assessed using incre- mental cost-effectiveness ratios. To address uncertainty in cost and outcome differences we will use cost-effective- ness planes (CEPs) which will show the probability of the intervention being (i) cost-saving and more effective, (ii) cost-saving and less effective, (iii) cost-increasing and more effective and (iv) cost-increasing and less effective. Cost-effectiveness acceptability curves (CEACs) will be generated to show the probability that the intervention is cost-effective for different values placed on a unit improvement in the GHQ/WSAS or one extra QALY gained. CEPs will involve producing a large number of cost-outcome combinations using bootstrap methods and plotting these on a plane where one axis represents incre- mental costs and the other incremental outcome. CEACs will be generated by computing 'net benefits' for each par- ticipant (defined as the monetised value of outcome minus service costs). The value of a unit improvement in outcome is unknown and therefore a range of values will be used resulting in a number of different net benefits for each participant. Regression analyses will be used to esti- mate the difference in net benefits between the two arms for each value placed on a unit improvement in outcome. Bootstrapped regression coefficients of these differences will be saved and the proportion that are above zero will indicate the probability that one arm is more cost-effec- tive than the other. y p Statistical analysis will be carried out in SPSS and/or Stata general purpose statistical analysis packages. Mediation modeling may require use of specialist structural equation modeling software (e.g. AMOS or M-Plus). All treatment group comparisons will be carried out on an intention-to-treat basis, that is subjects will be analyzed in the group to which they were randomized irrespectively of the treatment received. The primary and secondary longi- tudinal outcomes will be analyzed using linear mixed modeling. In these models the outcome variable at the post-treatment time points will be the dependent variable and baseline values of the outcome variable, centre, time (post-treatment, 6 M follow-up or 12 M follow-up), group (CBT or Supportive Listening) and a time × group interac- tion terms will feature as explanatory variables. Qualitative analysis plan Qualitative analysis plan A thematic analysis of the participants' therapy experience interviews will be conducted based upon procedures described by Boyatzis and Joffe and Yardley [59,60]. This will involve an inductive approach whereby transcripts are coded in order to develop conceptual categories which describe salient themes in the data. Elements of grounded theory practice [61,62] will also be incorporated; constant comparison, "in vivo" coding, attention to discrepant cases and memoing. Once all transcripts are coded and a comprehensive coding manual has been developed and refined we will inspect the data for patterns and relation- ships in the themes within and between the two therapy groups. An approach similar to Baron and Kenny's mediation modeling [55]will be used to explore whether change of psychological outcomes mediates the path from therapy to change in MS adjustment. Specifically we will use instrumental variable methods advocated by Dunn and colleagues to try and adjust for unobserved confounders of the path from mediations to outcomes [56,57]. Participant safety If it is felt that a participant should be withdrawn from the trial this will be discussed with the nurse-therapist, princi- pal investigator and clinical supervisor. One of the princi- pal investigators will assess the participant clinically within a week and arrange appropriate ongoing care. The nurse-therapist will write to the participant's GP and MS service to confirm withdrawal from treatment. Both CBT and SL are expected to be of low risk to partici- pants. They are non-invasive talking therapies and similar interventions have been previously used in chronic illness populations. If the nurses are concerned about a patient's safety, particularly if they believe the person may be vul- nerable to self-harm, they immediately contact one of the therapy supervisors who will telephone the patients to Page 13 of 17 (page number not for citation purposes) Statistical analysis plan To account for correlation between measures taken on the same individual at various time points subject-varying random intercepts and slopes of time will also be included in the model. Further baseline variables might be used as explanatory variables, to provide more power- ful group comparisons if they are found to be predictive of the outcome variable. As the model fitting will by maxi- mum likelihood such analyses are valid if missing data arises at random (MAR). The effect of informative miss- ingness processes will be explored by means of a formal sensitivity analysis [54]. more effective and (iv) cost-increasing and less effective. Cost-effectiveness acceptability curves (CEACs) will be generated to show the probability that the intervention is cost-effective for different values placed on a unit improvement in the GHQ/WSAS or one extra QALY gained. CEPs will involve producing a large number of cost-outcome combinations using bootstrap methods and plotting these on a plane where one axis represents incre- mental costs and the other incremental outcome. CEACs will be generated by computing 'net benefits' for each par- ticipant (defined as the monetised value of outcome minus service costs). The value of a unit improvement in outcome is unknown and therefore a range of values will be used resulting in a number of different net benefits for each participant. Regression analyses will be used to esti- mate the difference in net benefits between the two arms for each value placed on a unit improvement in outcome. Bootstrapped regression coefficients of these differences will be saved and the proportion that are above zero will indicate the probability that one arm is more cost-effec- tive than the other. We will further investigate whether results were unduly influenced by patients who have shown marked disease progression during the trial or who have altered medica- tion during the trial period. We will also assess the sensi- tivity of the results to excluding patients who did not receive a sufficient number of treatment sessions or those who had low expectations of the therapy they received. http://www.biomedcentral.com/1471-2377/9/45 http://www.biomedcentral.com/1471-2377/9/45 BMC Neurology 2009, 9:45 Statistical analysis plan Competing interests The authors declare that they have no competing interests. Study status The trial opened to recruitment in January 2008. Enrol- ment and the therapy interventions will continue until early 2009. Throughout 2009 follow-up assessments of participants will be conducted. Results will be analyzed and reported in 2010. • Cross-sectional study of factors involved in adjustment from baseline data We expect to present the findings at various scientific forums including MS specific and neurology conferences, health and clinical psychology conferences, and behav- ioural medicine meetings. We will also report back to our funder the MS Society and patient led meetings such MS Life. A lay summary of the results will be sent to trial par- ticipants. The trial is set up to be methodologically robust and to conform to best practice for the conduct and reporting of RCTs. We have taken care to address key sources of bias; the manualized therapies are subject to ongoing supervi- sion to ensure therapy fidelity and this will also be checked post-therapy by independent raters. The assess- ments of patient outcomes are self-reported and collected by the trial co-ordinator who is blind to treatment alloca- tion and uninvolved in therapy delivery. The CBT is being exposed to a stringent test of it's efficacy since it is being compared to a potentially therapeutic intervention, SL. Although the SL is designed to control for non-specific therapeutic effects such as of the considerable time and attention from an interested and caring health profes- sional, it is based on principles of counseling which allows patients to explore and work through issues is a non-directive format. Discussion To our knowledge this is the first RCT to look specifically at assisting with broadly defined psychological adjust- ment in the early stages of the MS. The relatively inclusive eligibility criteria for this trial mean that we are offering therapy to a group of patients who would not otherwise routinely have any formal psychosocial interventions, but who nonetheless are faced with considerable adjustment challenges. The saMS trial benefits from patient user input from the early stages of therapy design and manual development, right through to the in depth evaluation of the therapy sessions. The use of qualitative methods alongside the RCT means that the voice of those who would be using the intervention has been considered during both the design and evaluation of the therapy. This qualitative data will be particularly important in guiding any changes to the ther- apy format. This trial will answer important questions about the effi- cacy of an 8 session manualized CBT treatment in reduc- ing distress and MS-related social and role impairment as well as a number of secondary outcomes. It has a relatively long follow-up period (12 months) which allows for the assessment of both short and longer-term effects of the interventions. The trial will also provide important data regarding the cost-effectiveness of both interventions and their acceptability to patients. The trial is also set up in such a way to study mediators of change during therapy and therefore shed light on the process of adjustment and the important factors involved. • Predictors of treatment outcome professionals with high-level training in clinical psychol- ogy (who are in short supply and expensive to services) to deliver adjustment interventions to those with MS. Indeed, they could potentially be offered by health profes- sionals who are already working with MS patients in the NHS (e.g. specialist MS nurses and occupational thera- pists). Furthermore, the use of telephone contact for the majority of the therapy sessions means that the interven- tion could be delivered in a flexible way that could reach more patients. Mobility difficulties and other disabling and unpredictable symptoms might be significant barriers for people with MS accessing face-to-face services. • Mechanisms of change during therapy Economic evaluation plan Service use measured with the CSRI will be combined with relevant unit costs (e.g. [58]). The cost of the inter- ventions will be calculated using information on therapist pay as well as training and supervision costs and over- heads. Cost comparisons will be made between the two groups using bootstrapping methods to account for non normality in the data distribution. Reporting and Dissemination Reporting and Dissemination A number of publications are expected from this trial including: • Main outcome paper • Economic analysis-costs/benefits Service cost data will be combined with the primary out- come measures (GHQ and WSAS) and quality-adjusted • Qualitative analysis of patient feedback and experiences • Qualitative analysis of patient feedback and experiences Page 14 of 17 (page number not for citation purposes) http://www.biomedcentral.com/1471-2377/9/45 http://www.biomedcentral.com/1471-2377/9/45 BMC Neurology 2009, 9:45 Page 15 of 17 (page number not for citation purposes) References Mohr D, Hart S, Julian L, Catledge C, Honos-Webb L, Vella L, Tasch E: Telephone-administered psychotherapy for depression. Archives of General Psychiatry 2005, 62:1007-1014. gy 9. Benito-Leon J, Morales MJ, Rivera-Navarro J, Mitchell A: A review about the impact of multiple sclerosis on health-related quality of life. Disability and Rehabilitation 2003, 25:1291-1304. y y 30. Malcomson KS, Dunwoody L, Lowe-Strong AS: Psychosocial inter- ventions in people with multiple sclerosis: a review. Journal of Neurology 2007, 254:1-13. 10. Mohr DC, Dick PP, Russo D, Pinn J, Boudewyn AC, Likosky W, Goodkin DE: The Psychosocial Impact of Multiple Scleoris: Exploring the Patient's Perspective. Health Psychology 1999, 18:376-382. Neurology 2007, 254:1 13. 31. Altman DG, Schulz KF, Moher D, Egger M, Davidoff F, Elbourne D, Gotzsche PC, Lang T, for the CONSORT Group: The revised CONSORT statement for reporting randomized trials: Explanation and elaboration. Ann Intern Med 2001, 134:663-694. 32. Kurtzke J: Rating neurological impairment in multiple sclero- sis: an expanded disability status scale (EDSS). Neurology 1983, 33:1444-1452. gy 31. Altman DG, Schulz KF, Moher D, Egger M, Davidoff F, Elbourne D, Gotzsche PC, Lang T, for the CONSORT Group: The revised CONSORT statement for reporting randomized trials: Explanation and elaboration. Ann Intern Med 2001, 134:663-694. 11. Antonak RF, Livneh H: Psychosocial adaptation to disability and its investigation among persons with multiple sclerosis. Social Science and Medicine 1995, 40:1099-1108. p 32. Kurtzke J: Rating neurological impairment in multiple sclero- sis: an expanded disability status scale (EDSS). Neurology 1983, 33:1444-1452. 12. Brooks NA, Matson RR: Social-psychological adjustment to multiple sclerosis. A longitudinal study. Social Science & Medi- cine 1982, 16:2129-2135. 33. Brandt J, Welsh K, Breitner J, Folstein M, Helms M, Christian J: Hereditary influences on cognitive functioning in older men; a study of 4000 pairs. Archives of Neurology 1993, 50:599-603. 13. Chwastiak L, Ehde DM, Gibbons LE, Sullivan M, Bowen JD, Kraft GH: Depressive symptoms and severity of illness in multiple scle- rosis: Epidemiologic study of a large community sample. Am J Psychiatry 2002, 159:1862-1868. p gy 34. Godfrey E, Chalder T, Ridsdale L, Seed P, Ogden J: Investigating the 'active ingredients' of cognitive behaviour therapy and coun- selling for patients with chronic fatigue in primary care: developing a new process measure to assess treatment fidel- ity and predict outcome. British Journal of Clinical Psychology 2007, 46:253-272. J y y 14. References p g y gy 24. Bruce JM, Polen D, Arnett PA: Pain and affective memory biases interact to predict depressive symptoms in multiple sclero- sis. Multiple Sclerosis 2007, 13:58-66. 1. Robinson I: Multiple Sclerosis London: Routledge; 1988. 1. Robinson I: Multiple Sclerosis London: Routledge; 1988. p g 2. National MS Society: Who gets MS? 2009 [http:// www.nationalmssociety.org/about-multiple-sclerosis/who-gets-ms/ index.aspx]. p g 2. National MS Society: Who gets MS? 2009 [http:// www.nationalmssociety.org/about-multiple-sclerosis/who-gets-ms/ index.aspx]. p 25. Kneebone II, Dunmore EC, Evans E: Symptoms of depression in older adults with multiple sclerosis (MS): comparison with a matched sample of younger adults. Aging & Mental Health 2003, 7:182-185. p ] 3. UK MS Society: What is MS? 2009 [http://www.mssociety.org.uk/ about_ms/what_is_ms/index.html]. 26. Shnek ZM, Foley FW, LaRocca NG, Gordon WA, DeLuca J, Schwartzman HG, Halper J, Lennox S, Irvine J: Helplessness, self- efficacy, cognitive distortions, and depression in multiple sclerosis and spinal cord injury. Annals of Behavioral Medicine 1997, 19:287-294. 4. Hakim EA, Bakheit AMO, Bryant TN, Roberts MWH, McIntosh- Michaelis SA, Spackman AJ, Martin JP, McLellan DL: The social impact of multiple sclerosis-a study of 305 patients and their relatives. Disability and Rehabilitation 2000, 22:288-293. y 5. Janssens A, van Dorn P, de Boer J, Meche F van der, Passchier J, Hintzen R: Impact of recently diagnosed multiple sclerosis on quality of life, anxiety, depression and distress of patients and partners. Acta Neurologica Scandinavica 2003, 108:389-395. 27. Mohr D, Likosky W, Bertagnolli A, Goodkin D, Wende J Van Der, Dwyer P, Dick L: Telephone-administered cognitive-behavio- ral therapy for the treatment of depressive symptoms in multiple sclerosis. Journal of Consulting and Clinical Psychology 2000, 68:356-361. p g 6. Patten SC, Metz LM: Depression in Multiple Sclerosis. Psychother- apy and Psychosomatics 1997, 66:286-292. 28. Mohr D, Boudewyn A, Goodkin D, Bostrom A, Epstein L: Compar- ative outcomes for individual cognitive-behavior therapy, supportive-expressive group psychotherapy, and Sertraline for the treatment of depression in multiple sclerosis. Journal of Consulting and Clinical Psychology 2001, 69:942-949. py y 7. Siegert RJ, Abernethy DA: Depression in multiple sclerosis: a review. Journal of Neurology, Neurosurgery and Psychiatry 2005, 76:469-475. 8. Zorzon M, de Masi R, Nasuelli D, Ukmar M, Pozzi Mucelli R, Cazzato G, Bratina A, Zivadinov R: Depression and anxiety in Multiple Sclerosis: a clinical and MRI study in 95 subjects. Journal of Neu- rology 2001, 248:1432-1459. 29. http://www.biomedcentral.com/1471-2377/9/45 http://www.biomedcentral.com/1471-2377/9/45 BMC Neurology 2009, 9:45 uted to the training and competency assessment of the therapists, conducts ongoing supervision of the CBT ther- apy and contributed to these sections of the manuscript .SL developed the statistical analysis plan. PM developed the economic analysis plan. All authors read and approved the final version of the manuscript. 16. Dennison L, Moss-Morris R, Chalder T: A review of psychological correlates of adjustment in patients with multiple sclerosis. Clinical Psychology Review 2009, 29:141-153. y gy 17. McCabe MP, McKern S, McDonald E: Coping and psychological adjustment among people with multiple sclerosis. Journal of Psychosomatic Research 2004, 56:355-361. 18. 18. Schwartz C, Frohner R: Contribution of demographic, medical, and social support variables in predicting the mental health dimension of quality of life among people with multiple scle- rosis. Health Soc Work 2005, 30:203-212. Acknowledgements 19. de Ridder D, Schreurs K, Bensing J: The relative benefits of being optimistic: Optimism as a coping resource in multiple scle- rosis and Parkinson's disease. British Journal of Health Psychology 2000, 5:141-155. g This project was funded by a grant from the UK MS Society. Thank you to the nurse-therapists Sarah Morton and Sally Baynes. 20. 20. Patten SB, Metz LM: Hopelessness ratings in relapsing-remit- ting and secondary progressive multiple sclerosis. International Journal of Psychiatry in Medicine 2002, 32:155-165. Thank you also to our colleagues at the NHS MS Services at Southampton University Hospital Trust and King's College Hospital Trust: Alan Turner, Chris Halfpenny, Ian Galea, Sheila Chartres, Jane Ware, Jane Cameron, Hazel Daniel, Stephanie Heath, Eli Silber, Joan Regan, Pauline Shaw, Fiona Barnes and Sally Jones. 21. Stuifbergen AK, Blozis SA, Harrison TC, Becker HA: Exercise, func- tional limitations, and quality of life: A longitudinal study of persons with multiple sclerosis. Archives of Physical Medicine & Rehabilitation 2006, 87:935-943. 22. Aikens JE, Fischer JS, Namey M, Rudick RA: A replicated prospec- tive investigation of life stress, coping, and depressive symp- toms in multiple sclerosis. Journal of Behavioral Medicine 1997, 20:433-445. Thank you to the independent members of our Trial Steering Committee: Alison Wearden, Charlie Bloom, Rebecca Walwyn and Ed Holloway. Thank you to the independent members of our Trial Steering Committee: Alison Wearden, Charlie Bloom, Rebecca Walwyn and Ed Holloway. 23. Pakenham KI: Adjustment to multiple sclerosis: application of a stress and coping model. Health Psychology 1999, 18:383-392. 36. Hayes SC, Follette VM, Lineham M: Mindfulness and acceptance: Expanding the cognitive behavioral tradition New York: The Guilford Press; 2004. Authors' contributions RM and TC were involved in the conception and design of the study and applied for funding. RM wrote the initial grant, is the lead investigator and the Principal Investiga- tor for the Southampton site, supervises the SL therapy and led the write up of the protocol. TC is the Principal Investigator for the London site. LY developed the idea for and supervised the qualitative studies and assisted in the initial grant application. LD helped develop and refine the study protocol, co-ordinates the trial, and has had signifi- cant input into the write-up of the protocol. SR contrib- If the CBT (or indeed the SL) is an efficacious and cost- effective intervention for assisting with adjustment to MS, the fact that it has been manualized and the details of training, supervision and therapy delivery are intricately described means that it should be straightforward to rep- licate on a larger scale. The use of general nurses as thera- pists in this trial is a significant advantage. If therapy can be successfully learned and delivered by general nurses with no prior experience of psychological interventions, it suggests that it would not be necessary to employ health Page 15 of 17 (page number not for citation purposes) 35. Beck AT: Cognitive therapy and the emotional disorders New York: Pen- guin Books; 1976. Pre-publication history p The pre-publication history for this paper can be accessed here: The pre-publication history for this paper can be accessed here: 39. Wearden AJ, Riste L, Dowrick C, Chew-Graham C, Bentall RP, Mor- riss RK, Peters S, Dunn G, Richardson G, Lovell K, et al.: Fatigue Intervention by Nurses Evaluation – The FINE Trial. A ran- domised controlled trial of nurse led self-help treatment for patients in primary care with chronic fatigue syndrome: study protocol. [ISRCTN74156610]. BMC Medicine 2006, 4:9. http://www.biomedcentral.com/1471-2377/9/45/prepub y p [ ] , 40. Rogers C: Client-centered therapy: its current practice, implications and theory London: Constable; 1951. y 41. Goldberg D: General Health Questionnaire (GHQ-12). Wind- sor, NFER-NELSON; 1992. 42. Hobart J, Riazi A, Lamping D, Fitzpatrick R, Thompson A: How responsive is the Multiple Sclerosis Impact Scale (MSIS-29)? A comparison with some other self report scales. Journal of Neurology Neurosurgery and Psychiatry 2006, 76:1539. 43. Mundt J, Marks I, Shear K, Greist J: The Work and Social Adjust- ment Scale: a simple measure of impairment in functioning. British Journal of Psychiatry 2002, 180:461-464. J f y y 44. Curtis L, Netten A: Unit costs of health and social care Canterbury: PSSRU; 2006. 45. Stuifbergen A: Conceptualization and development of the Acceptance of Chronic Health Conditions Scale. Issues in Men- tal Health Nursing 2008, 29:101-114. g 46. Sinclair VG, Wallston KA: The development and validation of the Psychological Vulnerability Scale. Cognitive Therapy and Research 1999, 23:119-129. 47. Jopson NM, Moss-Morris R: The role of illness severity and ill- ness representations in adjusting to multiple sclerosis. Journal of Psychosomatic Research 2003, 54:503-511. 48. Broadbent E, Petrie KJ, Main J, Weinman J: The Brief Illness Per- ception Questionnaire. Journal of Psychosomatic Research 2006, 60:631-637. 49. Power M, Champion LA, Aris SJ: The development of a measure of social support: The Significant Others (SOS) Scale. Br J Clin Psychol 1988, 27:349-358. y 50. Bowen J, Gibbons L, Gianas A, Kraft G: Self-administered Expanded Disability Status Scale with functional system scores correlates well with physician-administered test. Mul- tiple Sclerosis 2001, 7:201-206. p 51. Beecham J, Knapp M: Costing psychiatric interventions. In Meas- uring mental health needs Edited by: Thornicroft G. London: Gaskell; 2001. 52. Williams A: The role of the EuroQol instrument in QALY cal- culations. University of York, Centre for Health Economics; 1995. 53. http://www.biomedcentral.com/1471-2377/9/45 http://www.biomedcentral.com/1471-2377/9/45 http://www.biomedcentral.com/1471-2377/9/45 BMC Neurology 2009, 9:45 61. Charmaz K: Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis London: Sage; 2006. 37. Bogosian A, Moss-Morris R, Yardley L, Dennison L: Experiences of partners of people in the early stages of multiple sclerosis. Multiple Sclerosis 2009, 15:876-884. y g 62. Glaser BG, Strauss SA: Discovery of Grounded Theory. Strategies for Qual- itative Resarch New York: Aldine; 1967. p 38. Risdale L, Godfrey E, Chalder T, Seed P, King M, Wallace P, Wessely p 38. Risdale L, Godfrey E, Chalder T, Seed P, King M, Wallace P, Wessely S: Chronic fatigue in general practice: is counselling as good as cognitive behaviour therapy? A UK randomised trial. Brit- ish Journal of General Practice 2001, 51:19-24. References McIvor G, Rikland M, Reznikoff M: Depression in multiple sclero- sis as a function of length and severity of illness, age, remis- sions, and perceived social support. Journal of Clinical Psychology 1984, 40:1028-1033. 35. Beck AT: Cognitive therapy and the emotional disorders New York: Pen- guin Books; 1976. 35. Beck AT: Cognitive therapy and the emotional disorders New York: Pen- guin Books; 1976. 15. Thomas PW, Thomas S, Hiller C, Galvin K, Baker R: Psychological interventions for multiple sclerosis. Cochrane Database of Sys- tematic Reviews 2006, 1:CD004431. 36. Hayes SC, Follette VM, Lineham M: Mindfulness and acceptance: Expanding the cognitive behavioral tradition New York: The Guilford Press; 2004. Page 16 of 17 (page number not for citation purposes) 61. Charmaz K: Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis London: Sage; 2006. y g 62. Glaser BG, Strauss SA: Discovery of Grounded Theory. Strategies for Qual- itative Resarch New York: Aldine; 1967. Pre-publication history Boutron I, Moher D, Altman D, Schulz K, Ravaud P: Extending the CONSORT statement to randomized trials of nonpharma- cologic treatment: Explanation and Elaboration. Ann Intern Med 2008, 148:295-310. 54. Carpenter J, Kenward MG, White IR: Sensitivity analysis after multiple imputation under missing at random: a weighting approach. Statistical Methods in Medical Research 2007, 16:259-275. ' pp 55. Baron R, Kenny D': The moderator-mediator variable distinc- tion in social psychological research: conceptual, strategic and statistical considerations. Journal of Personality and Social Psy- chology 1986, 51:1173-1182. Publish with BioMed Central and every scientist can read your work free of charge "BioMed Central will be the most significant development for disseminating the results of biomedical research in our lifetime." Sir Paul Nurse, Cancer Research UK Your research papers will be: available free of charge to the entire biomedical community peer reviewed and published immediately upon acceptance cited in PubMed and archived on PubMed Central yours — you keep the copyright Submit your manuscript here: http://www.biomedcentral.com/info/publishing_adv.asp BioMedcentral Page 17 of 17 (page number not for citation purposes) Publish with BioMed Central and every scientist can read your work free of charge "BioMed Central will be the most significant development for disseminating the results of biomedical research in our lifetime." Sir Paul Nurse, Cancer Research UK Your research papers will be: available free of charge to the entire biomedical community peer reviewed and published immediately upon acceptance cited in PubMed and archived on PubMed Central yours — you keep the copyright Submit your manuscript here: http://www.biomedcentral.com/info/publishing_adv.asp BioMedcentral Publish with BioMed Central and every scientist can read your work free of charge gy 56. Dunn G, Bentall R: Modelling treatment effect heterogeneity in randomised controlled trials of complex interventions (psy- chological treatments). Statistics in Medicine 2007, 26:4709-4745. g ) 57. Emsley R, White I, Dunn G: Mediation and moderation of treat- ment effects in randomised controlled trials of complex interventions. Statistical Methods in Medical Reserach 2009 in press. 58. Williams P: The psychopathology of self-assessed health: a cognitive approach to health anxiety and hypochondriasis. Cognitive Therapy and Research 2004, 28:629-644. g py 59. Boyatzis RE: Transforming Qualitative Information Thousand Oaks, CA: Sage Publications; 1998. g 60. Joffe H, Yardley L: Content and Thematic Analysis. In Research Methods for Clinical and Health Psychology Edited by: Marks D, Yardley L. London: Sage; 2000.
https://openalex.org/W2888171838
https://europepmc.org/articles/pmc6102935?pdf=render
English
null
Age dependency of risk factors for cognitive decline
BMC geriatrics
2,018
cc-by
8,489
Open Access © The Author(s). 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated. Abstract Background: Risk factors for cognitive decline might depend on chronological age. The aim of the study was to explore the age dependency of risk factors for cognitive decline in cognitively healthy subjects aged 55–85 years at baseline. Methods: We included 2527 cognitively healthy subjects from the Longitudinal Aging Study Amsterdam (LASA). Median follow-up was 9.1 (IQR: 3.2–19.0) years. The association of genetic and cardiovascular risk factors, depressive symptoms, inflammation markers and lifestyle risk factors with decline in MMSE and memory function was tested using spline regression analyses. Results: Subjects were on average 70.1 (SD 8.8) years old at baseline. Based on a spline regression model, we divided our sample in three age groups: ≤70 years (young-old), > 70–80 years (old) and > 80 years (oldest-old). The association of LDL cholesterol, homocysteine, hypertension, history of stroke, depressive symptoms, interleukin-6, a1-antichymotrypsin, alcohol use and smoking with cognitive decline significantly differed between the age groups. In general, the presence of these risk factors was associated with less cognitive decline in the oldest-old group compared to the young-old and old group. Conclusions: The negative effect of various risk factors on cognitive decline decreases with higher age. A combination of epidemiological factors, such as the selection towards healthier subjects during follow-up, but also risk factor specific features, for example ensuring the cerebral blood flow in case of hypertension, explain this diminished association at higher age. It is important to take these age differences into account when applying preventive strategies to avert cognitive decline. Keywords: Cognitive decline, Risk factors, Aging, Oldest-old lifestyle factors [2–8]. However, whether the effect of risk factors on cognitive decline in cognitively healthy subjects is dependent on age is not clear, as the majority of the pre- vious studies did not discriminate between younger and older subjects and the number of subjects aged 80 years and older in these studies was generally low [8, 9]. Still, there is increasing evidence that the association of risk factors with cognitive decline becomes less strong at higher age and may even have a protective effect [10]. For example, the risk of the APOE ε4 allele on Alzheimer’s dementia (AD) decreases after the age of 70 years [11]. In addition, the association of cardiovascular risk factors with cognitive decline might decrease with increasing age [10, 12–14]. N. Legdeur1* , M. W. Heymans2, H. C. Comijs3, M. Huisman2,4, A. B. Maier5,6 and P. J. Visser1,7 N. Legdeur1* , M. W. Heymans2, H. C. Comijs3, M. Huisman2,4, A. B. Maier5,6 and P. J. Visser1,7 Background Dementia is a growing health problem with an expected number of 115 million cases worldwide in 2050 [1]. The prevalence of dementia increases steeply with age from a prevalence of 2.6% in subjects aged 65–69 years and a prevalence of 43.1% in subjects aged 90 years and older [1]. Insight in the risk factors for cognitive decline is essential in the search for preventive strategies for cogni- tive impairment and dementia. Former studies identified a range of potential risk factors including the APOE (apolipoprotein E) ε4 allele, cardiovascular risk factors, depressive symptoms, inflammation markers and * Correspondence: n.legdeur@vumc.nl 1Alzheimer Center Amsterdam, Department of Neurology, Amsterdam Neuroscience, Vrije Universiteit Amsterdam, Amsterdam UMC, PO Box 7057, 1007, MB, Amsterdam, the Netherlands Full list of author information is available at the end of the article The aim of the present study was to explore whether the association of risk factors with cognitive decline in * Correspondence: n.legdeur@vumc.nl 1Alzheimer Center Amsterdam, Department of Neurology, Amsterdam Neuroscience, Vrije Universiteit Amsterdam, Amsterdam UMC, PO Box 7057, 1007, MB, Amsterdam, the Netherlands Full list of author information is available at the end of the article Legdeur et al. BMC Geriatrics (2018) 18:187 https://doi.org/10.1186/s12877-018-0876-2 Legdeur et al. BMC Geriatrics (2018) 18:187 https://doi.org/10.1186/s12877-018-0876-2 Legdeur et al. BMC Geriatrics (2018) 18:187 Legdeur et al. BMC Geriatrics (2018) 18:187 Page 2 of 10 Page 2 of 10 Cholesterol levels (total cholesterol, High-Density Lipoprotein (HDL) cholesterol and Low-Density Lipo- protein (LDL) cholesterol) and homocysteine (in com- bination with vitamin B12) were determined in morning blood samples collected in 1995–1996 (second LASA cycle). Subjects were allowed to eat toast and drink tea, but no dairy products. The EDTA plasma samples were stored at -80 °C and analyzed by the Department of Clinical Chemistry of the VUmc in 2001/2002 (homo- cysteine) and 2005 (cholesterol). For determination of total cholesterol and HDL cholesterol enzymatic colori- metric tests were used. LDL cholesterol was calculated as total cholesterol minus HDL-cholesterol minus VLDL-cholesterol; VLDL-cholesterol was calculated as total triglyceride concentration expressed in mmol/L multiplied by 0.456 [18]. This method is less reliable when the triglyceride level is ≥5.0 mmol/L. Therefore, this analysis was only done for triglyceride levels of < 5.0 mmol/L. Total homocysteine was determined with the Abbott IMx analyser which uses fluorescence polarization immunoassay (FPIA) technology. Serum levels of vitamin B12 were determined at the Endocrine Laboratory of the VUmc with a competitive immuno- assay luminescence on the automated ACS 180 System (Bayer Diagnostics, Mijdrecht, The Netherlands). cognitively healthy subjects across the age range of 55 to 85 years was dependent on age. We hypothesized that predictive accuracy would change with age for APOE ε4 allele and cardiovascular risk factors based on previous studies and we performed exploratory ana- lyses to test whether age effects were also present for other established risk factors including depressive symptoms, inflammation markers, alcohol use, smoking and physical activity. Study sample y p Data were derived from the on-going Longitudinal Aging Study Amsterdam (LASA) [15]. This is a longitudinal, population-based study in the Netherlands focusing on trajectories of physical, psychological, social and cognitive functioning in subjects aged 55 years and older. In 1992– 1993 a random sample of men and women aged 55– 85 years, stratified for age and sex, from three geographic areas of the Netherlands (Amsterdam, Zwolle and Oss) was included. Follow-up measurements were conducted about every 3 years. Data collection included a main and medical interview conducted in the homes of the subjects. The main interview was done by trained and supervised interviewers and the medical interview was performed by trained nurses. All subjects gave informed consent and the study was approved by the Ethical Review Board of the VU University Medical Center (VUmc), Amsterdam, the Netherlands and conducted according to the principles of the Helsinki declaration. ( y g j ) For determination of the inflammation markers (interleukin-6 (IL-6), C-reactive protein (CRP) and a1-antichymotrypsin (ACT)) serum collected in 1992– 1993 (only in Amsterdam and Zwolle) was stored at -80 °C until determination in 2002–2004. Sensitive regular immunoassays (ELISA) were used at Sanquin Research (Amsterdam) to determine IL-6, CRP and ACT. CRP was expressed in ug/ml, IL-6 in pg/ml and ACT in % of normal plasma. The normal human plasma pool (% NHP) used as a standard for ACT contained ~ 300 mg ACT per L. For part of the sub- jects, CRP levels were determined directly after blood sampling. At the start of the study in 1992–1993, 3107 subjects were enrolled. To select cognitively healthy subjects at baseline, subjects with an age and education corrected MMSE lower than 27 points were excluded (this cut-off is based on the lowest 10th percentile of the MMSE in the Maastricht Aging Study (MAAS) [16], leaving 2527 subjects at baseline. In 1995–1996, 2545 subjects were re-examined. See for further details about the following cycles of this LASA cohort and for the sample size per risk factor Additional file 1: Table S1 and S2. Both the cholesterol as the inflammation markers, were added to the analyses as continuous variables. Comorbidity The ApoE phenotyping was done either in 1992–1993 or 1995–1996 at the Immunochemisch Laboratorium of the VUmc. The blood samples were frozen at -80 °C until determination in 1997–1998. The method used is described by Havekes et al. (1987) and consisted of iso- electric focusing of delipidated serum samples, followed by immunoblotting [17]. In the analyses, we used the presence of an ApoE ε4 isoform (phenotypes ε2/4, ε3/4, ε4/4) as a dichotomous variable [17]. The ApoE ε4 iso- form was used as proxy for the presence of an APOE ε4 allele. Hypertension was defined as a blood pressure > 140/ 90 mmHg measured at the upper arm or the use of anti- hypertensive medication collected in the first follow-up measurement in 1995–1996 (at baseline blood pressure was measured only at the finger). Post-hoc we also ana- lyzed the association of a measured high blood pressure and the use of antihypertensive medication with cogni- tive decline separately. The presence of a history of myocardial infarction (MI), DM or stroke was assessed by self-report. The as- sessment of comorbidity by self-report was found to be Legdeur et al. BMC Geriatrics (2018) 18:187 Page 3 of 10 Page 3 of 10 comparable with the medical information reported by the general practitioner [19]. determined which of these two types of splines showed a better fit with our data. We examined the positions where the splines join smoothly together, referred to as knots in spline regression analyses. We identified the op- timal position of the knots by testing both a model with one and two knots and moving those 5 years up and down. The ages that corresponded to the position of the knots were used to separate our sample into different age groups, to facilitate interpretation of results. Lastly, for all the different risk factors and outcome measures we compared our final model with a linear regression model without splines to test whether the model with splines showed a better fit (based on the LR test). Depressive symptoms were assessed using the Center for Epidemiologic Studies Depression scale (CES-D) [20]. The CES-D is a self-report scale containing 20 items describing depressive symptoms. The maximum score is 60 with higher scores indicating more depressive symptoms. In the analyses, the CES-D was used as a continuous variable. Spline regression analyses Former studies, have shown that the association between age and cognition is nonlinear [24]. Linear regression techniques are therefore not sufficient enough to esti- mate this association and spline regression analyses are indicated to fit the nonlinear longitudinal associations between age and the cognitive outcome measures more precisely (Additional file 2: Spline regression analyses) [25]. To achieve the best fit of the data with a spline re- gression model, either linear or cubic splines can be used. Based on the likelihood-ratio (LR) test we Differences between age groups at baseline Statistically significant differences in baseline character- istics between the age groups were determined by using ANOVA for continuous variables, chi-square for cat- egorical variables and Kruskal-Wallis test for skewed variables. Mixed model analysis was used to determine the difference in cognitive test score change per year in the age groups. For the assessment of physical activity, the LASA Physical Activity Questionnaire (LAPAQ) was used ad- dressing walking outdoors, bicycling, light household, heavy household, and two sports activities [21]. The sub- jects are asked how often and how long they carried out these activities in the past 2 weeks. In the analyses, total physical activity in minutes per day was used as a con- tinuous variable. Association of risk factors with cognitive outcome measures We performed three different analyses to determine the association of the risk factors (measured at baseline or, for hypertension and some biomaterial measurements, in the second cycle) with the cognitive outcome mea- sures. In all these analyses, splines (determined as de- scribed in 2.3.1) were added to the model to estimate the association between age and the cognitive outcome measure. First, we determined the association of the risk factors with the three cognitive outcome measures in the total sample by using a linear mixed model (includ- ing a random intercept and fixed slopes). Secondly, we added the interaction of the risk factors with the splines to the analyses to assess the age dependency of the risk factors. Because the splines represent different age groups, a significant interaction means that the associ- ation of that risk factor with the cognitive outcome measure is different between age groups. If this inter- action was statistically significant for a categorized risk factor, we visualized the association in a figure. Lastly, we determined the association coefficient per age group of the risk factors with the cognitive outcome measures. This last step helps us to interpret the results we found with the interaction analyses (we also performed these analyses for the risk factors that did not show a signifi- cant interaction). All the analyses were adjusted for sex and education (in years). Lifestyle The number of alcohol consumptions was categorized into three categories: 0 alcoholic drinks per day (‘none’ group), 1–2 alcoholic drinks for men and 1 alcoholic drink for women per day (‘minimal’ group) or > 2 alcohol drinks for men and > 1 alcohol drink for women per day (‘moderate’ group) [8]. Smoking was dichotomized in ‘yes (or stopped within one year)’ or ‘no’. Cognitive outcome measures Two different neuropsychological tests were used as out- come measures: The Mini-Mental State Examination (MMSE) and 15 Words Test (15WT). The MMSE is the most used screening instrument for global cognitive dys- function [22]. The score ranges from 0 to 30 points, with higher scores indicating better cognitive functioning. The 15WT is the Dutch version of the Auditory Verbal Learning Test [23]. Fifteen words have to be learned over five trials. In LASA the 15WT is restricted to three trials due to a limitation in time. In this study we used the maximum immediate recall score and delayed recall score, both ranging from 0 to 15 words. The delayed re- call was assessed after 20 minutes of distraction. Differences between age groups at baseline Most characteristics differed between age groups (Table 1). Years of education, follow-up time, scores on the cognitive tests, total and LDL cholesterol levels, alcohol use, smoking and physical activity all decreased with age. The level of homocysteine and inflammation markers and the presence of cardiovascular comorbidities and depressive symptoms increased with age. Age dependency of risk factors The association of LDL cholesterol, homocysteine, hypertension, history of stroke, depressive symptoms, IL-6, ACT, alcohol use and smoking with cognitive de- cline differed between the age groups (Table 3 and Fig. 2). The presence of APOE ε4, total and HDL choles- terol level, a history of DM or MI, CRP level and phys- ical activity did not show an age effect. In general, the regression coefficient changed from a negative associ- ation in the young-old and old subjects to a positive as- sociation in the oldest-old subjects. This means that on top of the decline in MMSE and 15WT as visualized in Fig. 1, the presence of these risk factors was associated with more decline in MMSE or 15WT in the young-old and old subjects and less decline in MMSE or 15WT in the oldest-old subjects. If we determined the association of the age-dependent risk factors with cognitive decline per age group, we found that hypertension, high IL-6 levels, and alcohol use were significantly associated with less cognitive decline in the oldest-old subjects (Table 3 and Additional file 1: Tables S5–S6). Smoking was sig- nificantly associated with more memory decline in the young-old subjects and high LDL cholesterol with more MMSE decline in the young-old subjects (Table 3 and Additional file 1: Table S6). Statistical software The spline regression analyses were performed with the stat- istical software R version 3.2.5 (http://www.r-project.org). The statistical significance of the association of the risk factor with cognitive decline per age group was determined with Stata version 15. The differences in baseline charac- teristics between the three age groups were analyzed with SPSS Statistics version 22. The level of significance was set to p = 0.05. Selection during follow-up To determine whether there was a selection towards healthier subjects during follow-up, we determined the Page 4 of 10 Legdeur et al. BMC Geriatrics (2018) 18:187 smoking and physical activity were not associated with cognitive decline. baseline values of the risk factors and cognitive outcome measures of the subjects that were present in the sample during each LASA cycle. Decreasing baseline values dur- ing follow-up would be indicative of selection towards healthier subjects. baseline values of the risk factors and cognitive outcome measures of the subjects that were present in the sample during each LASA cycle. Decreasing baseline values dur- ing follow-up would be indicative of selection towards healthier subjects. Determination of the best-fitted spline regression model Determination of the best-fitted spline regression model For the longitudinal associations between the cognitive outcome measures and age in the total group, a linear spline regression model showed a better fit then a cubic spline regression model. A model with two knots placed at the ages 70 and 80 years showed the best fit for the three outcome measures, dividing the sample in three age groups: ≤70 years (young-old subjects), > 70–80 years (old subjects) and > 80 years (oldest-old subjects) (Fig. 1). The spline regression model showed a better fit then a linear regression model without splines for all the different associations. Post-hoc analyses with hypertension defined by the measured high blood pressure only or the use of anti- hypertensive medication only, yielded similar results (Additional file 1: Table S3). Selection during follow-up Subjects who were retained in the later LASA cycles had a lower age, higher level of education, higher scores on the cognitive outcome measures, higher cholesterol levels, less comorbidities, lower levels of inflammation markers, higher alcohol use, lower levels of smoking and had a higher level of physical activity at baseline com- pared to subjects who dropped out during follow-up (Additional file 1: Table S4). Results We included 2527 subjects (51.2% women) who were on average 70.1 (SD: 8.8, range: 54.8–85.6) years at baseline and had 9.1 (SD: 3.4) years of education (Table 1). Me- dian follow-up was 9.1 (IQR: 3.2–19.0) years. Association of risk factors with cognitive decline in the total sample This study showed that the association of LDL choles- terol, homocysteine, hypertension, history of stroke, de- pressive symptoms, IL-6, ACT, alcohol use and smoking with cognitive decline was age-dependent. In general, these risk factors were associated with more cognitive decline in the young-old and old subjects and less cogni- tive decline in the oldest-old subjects. APOE ε4 geno- type and DM were negatively associated with cognitive decline regardless of age. In the total sample, the presence of high homocysteine levels, history of stroke and depressive symptoms were associated with more decline in MMSE and the 15WT (Table 2). Alcohol use was associated with less decline in MMSE and the 15WT. The presence of APOE ε4 was associated with more decline in MMSE and a history of DM with more decline in the 15WT. Cholesterol levels, hypertension, history of MI, inflammation markers, Legdeur et al. Association of risk factors with cognitive decline in the total sample BMC Geriatrics (2018) 18:187 Page 5 of 10 Table 1 Baseline characteristics of subjects in the total sample Characteristic Total sample ≤70 years > 70–80 years > 80 years P-valueb Sample sizea 2527 1292 794 441 Age, y 70.1 (8.8) 62.6 (4.2) 75.5 (2.9) 82.6 (1.5) Female, % 51.2 52.3 50.0 50.3 0.48 Education, y 9.1 (3.4) 9.5 (3.3) 8.7 (3.2) 8.6 (3.7) < 0.01 Follow-up, y (median, IQR) 9.1 (3.2–19.0) 13.3 (8.9–19.2) 6.2 (3.0–13.0) 4.9 (3.3–8.9) < 0.01 MMSE, points (median, IQR) 28 (27–29) 29 (26–30) 28 (24–30) 27 (24–30) < 0.01 Change in MMSE per year (SE) −0.11 (0.00) −0.06 (0.00) −0.18 (0.01) −0.25 (0.02) < 0.01 15WT immediate recall, words 8.1 (2.5) 8.9 (2.3) 7.6 (2.4) 6.3 (2.1) < 0.01 Change in 15WT immediate recall per year (SE) −0.11 (0.00) −0.07 (0.00) −0.11 (0.01) −0.07 (0.02) < 0.01 15WT delayed recall, words 5.3 (2.7) 6.2 (2.6) 4.7 (2.5) 3.5 (2.2) < 0.01 Change in 15WT delayed recall per year (SE) −0.11 (0.00) −0.05 (0.01) −0.10 (0.01) −0.06 (0.02) < 0.01 APOE ε4, %c 26.3 27.8 25.2 23.6 0.29 Total cholesterol, mmol/L 5.7 (1.0) 5.9 (1.0) 5.6 (1.0) 5.3 (1.1) < 0.01 LDL cholesterol, mmol/L 3.7 (1.0) 3.8 (0.9) 3.6 (0.9) 3.4 (1.1) < 0.01 HDL cholesterol, mmol/L 1.3 (0.4) 1.3 (0.4) 1.4 (0.4) 1.3 (0.4) 0.48 Homocysteine, mmol/L 14.5 (6.1) 13.5 (5.2) 14.7 (5.0) 17.2 (9.2) < 0.01 Vitamin B12, pMol/L (median, IR) 266 (212–333) 268 (219–335) 264 (213–331) 249 (196–333) 0.12 Hypertension, % 76.7 72.9 82.2 73.7 < 0.01 Myocardial infarction, % 8.8 6.4 11.1 11.7 < 0.01 Diabetes mellitus, % 7.0 4.3 8.6 12.3 < 0.01 Stroke, % 4.4 1.6 6.7 8.7 < 0.01 CES-D total score (median, IQR) 5 (2–11) 5 (2–9) 6 (3–11) 7 (3–12) < 0.01 IL-6, pg/ml (median, IQR) 1.4 (0.6–2.5) 1.3 (0.6–2.4) 1.6 (0.7–2.7) 1.8 (1.0–3.1) < 0.01 CRP, ug/ml (median, IQR) 2.2 (1.0–4.7) 2.0 (0.9–3.9) 2.5 (1.3–5.6) 2.8 (1.4–5.7) < 0.01 ACT, % of NHP 173.6 (57.6) 169.6 (53.0) 179.3 (66.1) 177.2 (54.1) 0.01 Alcohol consumption, % None 20.1 15.6 25.3 24.7 < 0.01 Minimald 20.6 17.8 23.6 23.6 Moderatee 59.4 66.6 51.1 51.7 Smokers, % 24.6 30.4 23.1 19.8 < 0.01 Total physical activity, min per day 169.2 (114.2) 188.4 (121.3) 160.0 (103.7) 126.8 (95.3) < 0.01 15WT 15 Words Test, ACT a1-antichymotrypsin, APOE apolipoprotein E, CES-D Center for Epidemiologic Studies Depression scale, CRP C-reactive protein, HDL High- Density Lipoprotein, IL-6 interleukin-6, IQR interquartile range, LASA Longitudinal Aging Study Amsterdam, LDL Low-Density Lipoprotein, MMSE Mini-Mental State Examination, NHP normal human plasma, SE standard error aSample size varies per characteristic (Additional file 1: Table S2). Association of risk factors with cognitive decline in the total sample bDifferences between the three age groups tested with ANOVA for continuous variables, chi- square for categorical variables, Kruskal-Wallis test for non-parametric variables and mixed model analysis for the change in cognitive test scores per year. cPercentage of subjects with an apolipoprotein E ε4 isoform as proxy for an APOE ε4 allele. dWomen:1 drink/day, men: 1–2 drinks/day. eWomen: > 1 drink/day, men: > 2 drinks/day. Values are means (SD) unless stated otherwise Total physical activity, min per day Before we discuss these findings in more detail, it should be noted that the baseline age of the subjects with follow-up was lower than that of the subjects who were lost to follow up. The subjects with follow-up also showed a better overall health with less comorbidity. The selection towards younger and healthier subjects at follow-up may explain why the negative impact of the risk factors was strongest in younger subjects. However, it does not explain why these risk factors became protective at higher age. We reduced the potential selec- tion bias by combining baseline data and follow-up data across the age span in the spline regression model. In this way follow-up data of the selected younger, healthier subjects (Additional file 1: Table S4) were combined with baseline data of the older, less healthy subjects (Table 1). In addition, most subjects dropped out of the study because of mortality [15]. A comparison of one-year Legdeur et al. BMC Geriatrics (2018) 18:187 Page 6 of 10 Fig. 1 Association between age and Mini-Mental State Examination (MMSE, figure a) and 15 Words Test (15WT, figure b and c). The grey dots represent all the longitudinal data points. The lines represent the splines with the two knots (black dots) at the ages 70 and 80 years Fig. 1 Association between age and Mini-Mental State Examination (MMSE, figure a) and 15 Words Test (15WT, figure b and c). The grey dots represent all the longitudinal data points. The lines represent the splines with the two knots (black dots) at the ages 70 and 80 years explained by differences in selection of subjects (normal cognition or MCI) and outcome measure (progression to dementia or cognitive decline). mortality rates of LASA subjects with those in the gen- eral Dutch population showed that mortality in the LASA subjects was slightly higher than in the general population, but that this difference exceeded 1% only in women aged 80–85 years (unpublished data). Cardiovascular factors Most cardiovascular factors were associated with less de- cline at higher age than at younger age, which is in line with previous studies [12, 28]. High cholesterol in late-life can be an indicator of a better nutritional status and a better overall health and therefore associated with less cognitive decline [28, 29]. Additionally, cholesterol synthesis is thought to decrease with aging, but only in AD patients and not in subjects with a normal cognition [30]. The association of low cholesterol with more Association of risk factors with cognitive decline in the total sample There- fore, it may not necessarily affect the generalizability of our findings. , y p p , y , aNo alcohol use is reference group. bWomen:1 drink/day, men: 1–2 drinks/day. cWomen: > 1 drink/day, men: > 2 drinks/day 15WT 15 Words Test, ACT a1-antichymotrypsin, APOE apolipoprotein E, CRP C-reactive protein, DM Diabetes mellitus, HDL High-De interleukin-6, LDL Low-Density Lipoprotein, MI Myocardial infarction, MMSE Mini-Mental State Examination B’s are determined by linear mixed models in combination with splines and adjusted for sex and education B’s are determined by linear mixed models in combination with splines and adjusted for sex and education 15WT 15 Words Test ACT a1-antichymotrypsin APOE apolipoprotein E CRP C-reactive protein DM Diabetes mellitus APOE genotype Our finding that the APOE ε4 genotype increases the risk for cognitive decline regardless of age is at odds with some earlier studies that reported a decrease of risk for dementia with age [11, 26] but is consistent with others [27]. Differences between studies may be Table 2 The association of risk factors with cognitive decline in the total sample Table 2 The association of risk factors with cognitive decline in the total sample Risk factor MMSE 15WT immediate recall 15WT delayed recall B SE P-value B SE P-value B SE P-value APOE ε4 −0.25 0.24 < 0.01 −0.07 1.27 0.49 −0.09 1.44 0.42 Total cholesterol 0.05 0.17 0.34 0.09 1.22 0.11 0.08 1.39 0.21 LDL cholesterol 0.05 0.17 0.41 0.08 1.24 0.20 0.08 1.41 0.25 HDL cholesterol 0.16 0.16 0.20 0.23 1.21 0.08 0.07 1.42 0.67 Homocysteine −0.05 0.12 < 0.01 −0.05 1.16 < 0.01 −0.06 1.33 < 0.01 Hypertension 0.13 0.28 0.26 −0.02 1.26 0.88 −0.03 1.43 0.85 DM −0.16 0.29 0.25 −0.42 1.28 0.01 −0.42 1.45 0.04 MI 0.05 0.29 0.69 0.08 1.28 0.58 0.22 1.48 0.21 Stroke −0.40 0.28 0.02 −0.55 1.27 0.01 −0.58 1.44 0.02 Depressive symptoms −0.01 0.33 < 0.01 −0.02 1.33 < 0.01 −0.02 1.50 < 0.01 CRP 0.00 0.27 0.57 −0.01 1.27 0.15 −0.01 1.45 0.47 IL-6 0.01 0.26 0.46 0.01 1.27 0.72 0.02 1.44 0.42 ACT 0.00 0.27 0.68 0.00 1.27 0.74 0.00 1.45 0.87 Alcohola: minimalb 0.27 0.10 < 0.01 0.35 0.12 < 0.01 0.35 0.14 0.01 Alcohola: moderatec 0.24 0.08 < 0.01 0.41 0.10 < 0.01 0.42 0.12 < 0.01 Smoking −0.09 0.25 0.26 −0.16 1.27 0.09 −0.03 1.46 0.77 Physical activity 0.00 0.30 0.78 0.00 1.28 0.59 0.00 1.45 0.24 B’s are determined by linear mixed models in combination with splines and adjusted for sex and education 15WT 15 Words Test, ACT a1-antichymotrypsin, APOE apolipoprotein E, CRP C-reactive protein, DM Diabetes mellitus, HDL High-Density Lipoprotein, IL-6 interleukin-6 LDL Low-Density Lipoprotein MI Myocardial infarction MMSE Mini-Mental State Examination Legdeur et al. APOE genotype BMC Geriatrics (2018) 18:187 Page 7 of 10 Table 3 The association of risk factors with cognitive decline per age group Risk factor MMSE 15WT immediate recall 15WT delayed recall ≤70 > 70–80 > 80 ≤70 > 70–80 > 80 ≤70 > 70–80 > 80 APOE ε4 0.72 −4.24 −10.17 −0.65 −3.85 −5.32 0.18 −4.15 −8.52 Total cholesterol −3.37 −0.10 1.26 −1.08 −1.09 1.53 0.97 −1.53 1.27 LDL cholesterol −5.40* 0.66 1.83* −0.18 −1.92* 1.96* 0.68 −2.62 1.41 HDL cholesterol 7.35 −2.17 −1.07 −1.84 2.64 0.50 6.21 1.45 2.97 Homocysteine 0.39 −0.40 −0.92 −0.39 −0.21 0.13 −0.76* −0.08 0.13* Hypertension 0.04 −2.14* 6.52* −5.65* −0.22 5.06* −4.04 3.54 0.43 DM −0.95 −0.46 −9.32 −0.11 −3.49 −0.29 −1.68 −5.44 4.90 MI 2.42 −1.59 2.23 0.41 1.93 5.64 4.90 0.62 10.14 Stroke 1.25 −9.16* 9.16* 2.60 −0.34 6.70 0.79 −1.58 −4.30 Depressive symptoms −0.07 0.02 −0.06 −0.21 0.00 0.07 −0.11* −0.23 0.21* CRP −0.18 0.18 0.19 −0.21 0.03 0.19 −0.19 −0.11 0.16 IL-6 0.02* −0.10* 1.31* 0.27 −0.11 0.64 0.31 −0.03 0.88 ACT 0.00 0.01 0.06 −0.01 −0.01 0.03 −0.01* −0.04 0.03* Alcohola: minimalb 2.82* −0.26 7.93* 3.19 −3.09 −0.31 5.91 −3.03 0.25 Alcohola: moderatec 0.78 −0.95 3.48 2.85 −3.51 1.42 3.19 −0.47 −0.69 Smoking −0.30 −1.05 −5.15 −5.84* 0.53* −1.13 −4.52 −2.88 −0.61 Physical activity 0.00 0.00 0.02 −0.01 0.01 0.00 0.01 0.01 0.00 Shown are beta’s (multiplied by 100) of the associations of a risk factor with cognitive decline within each age group. They show the extra cognitive decline (next to the overall cognitive decline as visualized in Fig. 1) per age group in the presence of a risk factor. A negative beta indicates that a unit increase in the risk factor is associated with more cognitive decline. Bold beta’s indicate a significant (p < 0.05) association with cognitive decline in that age group (in Additional file 1: Tables S5–S7 we present the standard errors and p-values corresponding to the beta’s in this table per age group) 15WT 15 Words Test, ACT a1-antichymotrypsin, IL-6 interleukin-6, LDL Low-Density Lipoprotein, MMSE Mini-Mental State Examination *Association of risk factor with MMSE or 15WT decline is significantly different between these two age groups. In case of three *: difference is significant between ≤70 and > 80 years old group and between > 70–80 and > 80 years old group. APOE genotype Beta’s are determined by linear mixed models in combination with splines and adjusted for sex and education aNo alcohol use is reference group. bWomen:1 drink/day, men: 1–2 drinks/day. cWomen: > 1 drink/day, men: > 2 drink/day Table 3 The association of risk factors with cognitive decline per age group djusted for sex and education No alcohol use is reference group. bWomen:1 drink/day, men: 1–2 drinks/day. cWomen: > 1 drink/day, men: > 2 drink/day adjusted for sex and education aNo alcohol use is reference group. bWomen:1 drink/day, men: 1–2 drinks/day. cWomen: > 1 drink/day, men: > 2 drink/day Fig. 2 Association of risk factors with Mini-Mental State Examination (MMSE, figure a, c and d) or 15 Words Test (15WT) immediate recall (figure b and e). Shown are the categorized risk factors (hypertension, stroke, alcohol use (‘minimal’: 1 drink/day for women and 1–2 drinks/day for men, ‘moderate’: > 1 drink/day for women and > 2 drinks/day for men) and smoking) which have a significant age-dependent association with the outcome measure (MMSE or 15WT immediate recall). B’s can be found in Table 3 Fig. 2 Association of risk factors with Mini-Mental State Examination (MMSE, figure a, c and d) or 15 Words Test (15WT) immediate recall (figure b and e). Shown are the categorized risk factors (hypertension, stroke, alcohol use (‘minimal’: 1 drink/day for women and 1–2 drinks/day for men, ‘moderate’: > 1 drink/day for women and > 2 drinks/day for men) and smoking) which have a significant age-dependent association with the outcome measure (MMSE or 15WT immediate recall). B’s can be found in Table 3 Legdeur et al. BMC Geriatrics (2018) 18:187 Page 8 of 10 Page 8 of 10 cognitive decline in the oldest-old subjects might there- fore be an expression of underlying AD pathology. Hypertension may prevent cognitive decline at old age by ensuring the cerebral blood flow [31, 32]. On the other hand, low blood pressure can be a consequence of neurodegenerative disease and therefore an early sign of dementia onset, although this is an aspect which one can also expect in the young-old subjects [33, 34]. probably the most important phenomena to explain this finding [40–42]. cognitive decline in the oldest-old subjects might there- fore be an expression of underlying AD pathology. Hypertension may prevent cognitive decline at old age by ensuring the cerebral blood flow [31, 32]. Strengths and limitations This is the first study that analyzes the influence of age on the association of different types of risk factors with cognitive decline in one prospective cohort study. Earlier studies have indicated age differences but never studied the various risk factors in one cohort. Additionally, the use of a nonlinear analyze technique, is an important added value of this study to earlier literature. A limita- tion of this study is that we did not have data about the presence of cardiovascular risk factors, such as hyperten- sion and high cholesterol, before age 55 years. Therefore, we could not discriminate between a high blood pres- sure and cholesterol emerging at high age or already present at younger ages. While we tested many risk fac- tors with different outcomes at the same time, this also increased the risk of false-positive findings. However, we decided not to correct for multiple testing given the ex- ploratory nature of the study and the increased risk of missing important findings when applying Bonferroni adjustments (type II errors) [46, 47]. For simplification purposes, we describe our results in relation to cognitive decline, although we only used the MMSE and 15WT to assess cognition. It therefore needs to be noted that these results cannot automatically be extrapolated to other forms of cognition. In addition, the 15WT is a test for verbal episodic memory and does not assess other types of memory such as visual and semantic memory. Depressive symptoms Earlier studies have shown that depressive symptoms are an important risk factor for cognitive decline and de- mentia, also among the oldest-old subjects [7, 35]. We replicated this finding for the total sample but also found that the association of depressive symptoms with memory decline was less in the oldest-old group than in the young-old group. This may be explained by the fact that older subjects score higher on the CES-D question- naire for reasons other than depression, such as somatic morbidity [36]. In line with this explanation, earlier cross-domain latent growth models on LASA data dem- onstrated that delayed recall was associated with increas- ing levels of depressed affect, but not with depressive somatic symptoms [37]. APOE genotype On the other hand, low blood pressure can be a consequence of neurodegenerative disease and therefore an early sign of dementia onset, although this is an aspect which one can also expect in the young-old subjects [33, 34]. In contrast to a meta-analysis of observational studies, we did not find an association between physical activity and cognitive decline [43]. However, a meta-analysis of intervention studies on the effect of aerobic exercise on cognitive decline in cognitively normal subjects did not find an effect [44]. We found that in the oldest age group less physical activity was associated with more cognitive decline, but because the over age interaction effect was not statistically significant, this finding should be interpreted cautiously. Cognitive outcome measures We used different cognitive tests as outcome measure (MMSE, 15WT total and delayed recall) and in the total sample, most variables showed similar findings for the different outcome measures and the course of the tests was very similar with age (Table 2 and Fig. 1). However, we also found different results for the different out- comes, which may be explained by the fact that the tests measure different disease processes; memory decline is presumed to be an early marker of Alzheimer’s disease and decline in MMSE can be caused by a broader range of diseases [45]. Inflammation markers Inflammation has been described as an important mech- anism underlying cognitive decline but most of these studies were performed in younger subjects [38]. We did not find an association of inflammation markers with cognitive decline in the total sample but noted differ- ences between age groups showing that higher IL-6 and ACT levels were associated with less cognitive decline in subjects aged 80 years and older compared to younger subjects. Potentially, higher inflammation markers in older subjects are a sign of a better inflammatory re- sponse and therefore related to better overall health and cognitive functioning. Conclusions The associations of LDL cholesterol, homocysteine, hyper- tension, history of stroke, depressive symptoms, IL-6, ACT, alcohol use and smoking with cognitive decline were different per age group. They were all less strongly associ- ated with cognitive decline in the older subjects compared to younger subjects. Selection towards healthier subjects during follow-up need to be considered as possible explanation but also risk factor specific considerations, such as ensuring the cerebral blood flow in case of hyper- tension, need to be taken into account. These age differ- ences are important when applying preventive strategies to avert cognitive decline. Funding 6. Cheng G, Huang C, Deng H, Wang H. Diabetes as a risk factor for dementia and mild cognitive impairment: a meta-analysis of longitudinal studies. Intern Med J. 2012;42:484–91. https://doi.org/10.1111/j.1445-5994.2012.02758.x. 6. Cheng G, Huang C, Deng H, Wang H. Diabetes as a risk factor for dementia and mild cognitive impairment: a meta-analysis of longitudinal studies. Intern Med J. 2012;42:484–91. https://doi.org/10.1111/j.1445-5994.2012.02758.x. g This work has received support from the EU/EFPIA Innovative Medicines Initiative Joint Undertaking EMIF grant agreement no. 115372. The Longitudinal Aging Study Amsterdam (LASA) is primarily funded by the Dutch Ministry of Health, Welfare and Sports and the VU University Amsterdam. 7. Van Den Kommer TN, Comijs HC, Aartsen MJ, Huisman M, Deeg DJH, Beekman ATF. Depression and cognition: how do they interrelate in old age? Am J Geriatr Psychiatry. 2013;21:398–410. https://doi.org/10.1016/j.jagp.2012.12.015. 7. Van Den Kommer TN, Comijs HC, Aartsen MJ, Huisman M, Deeg DJH, Beekman ATF. Depression and cognition: how do they interrelate in old age? Am J Geriatr Psychiatry. 2013;21:398–410. https://doi.org/10.1016/j.jagp.2012.12.015. 8. Anstey KJ, Mack HA, Cherbuin N. Alcohol consumption as a risk factor for dementia and cognitive decline: Meta-analysis of prospective studies. Am J Geriatr Psychiatry. 2009;17:542–55. https://doi.org/10.1097/JGP.0b013e3181 a2fd07. 8. Anstey KJ, Mack HA, Cherbuin N. Alcohol consumption as a risk factor for dementia and cognitive decline: Meta-analysis of prospective studies. Am J Geriatr Psychiatry. 2009;17:542–55. https://doi.org/10.1097/JGP.0b013e3181 a2fd07. Author details 1 1Alzheimer Center Amsterdam, Department of Neurology, Amsterdam Neuroscience, Vrije Universiteit Amsterdam, Amsterdam UMC, PO Box 7057, 1007, MB, Amsterdam, the Netherlands. 2Department of Epidemiology and Biostatistics, Amsterdam Public Health Research Institute, Vrije Universiteit Amsterdam, Amsterdam, the Netherlands. 3GGZ inGeest / Department of Psychiatry, Amsterdam Public Health Research Institute, Vrije Universiteit Amsterdam, Amsterdam, the Netherlands. 4Department of Sociology, Vrije Universiteit Amsterdam, Amsterdam, the Netherlands. 5Department of Medicine and Aged Care, @AgeMelbourne, Royal Melbourne Hospital, University of Melbourne, Melbourne, Australia. 6Department of Human Movement Sciences, @AgeAmsterdam, Faculty of Behavioural and Movement Sciences, Vrije Universiteit Amsterdam, Amsterdam, the Netherlands. 7Department of Psychiatry & Neuropsychology, School for Mental Health and Neuroscience, Maastricht University, Maastricht, the Netherlands. Lifestyle factors Minimal and moderate alcohol use were positively asso- ciated with decline in MMSE and memory functioning compared to no alcohol use, which is in line with earlier studies [3, 8]. We found that the positive association of alcohol use with cognition was strongest in subjects aged 80 years and older. In this age group, no alcohol use is frequently related to poor physical functioning. There- fore, the negative association of no alcohol use with cog- nitive decline is potentially an indirect effect [39]. In accordance with our findings, a meta-analysis in 2015 showed that the negative association of smoking with cognitive decline is decreasing with age [40]. Survival bias and the presence of competing risks are Legdeur et al. BMC Geriatrics (2018) 18:187 Page 9 of 10 Page 9 of 10 Competing interests PJV i l i PJV is currently acting as a Section Editor for BMC Geriatrics. The other authors declare that they have no competing interests. Authors’ contributions With this study we showed that age needs to be taken into consideration when studying risk factors for cogni- tive decline. It is not only needed to add age as a con- founder but especially as an effect modifier to analyses as it changes the relation between a risk factor and cognitive decline. From a clinical perspective, these re- sults suggest that different preventive strategies might be effective in young-old versus oldest-old subjects. Antihypertensive and cholesterol lowering medication might not be appropriate for the oldest-old subjects who develop hypertension and hypercholesterolemia at a high age. MH and HCC are both involved in the design of the Longitudinal Aging Study Amsterdam and are responsible for the data collection. PJV created the concept for this manuscript. MWH and NL performed the statistical analyses. NL wrote the first and final drafts of the manuscript. MWH, HCC, MH, ABM and PJV contributed to and approved the final version. Publisher’s Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Additional files Additional file 1: Additional tables about sample sizes, the association of hypertension with cognitive decline separately for use of antihypertensive medication and blood pressure, baseline characteristics per LASA cycle and the associations of the risk factors with the three cognitive tests in the three age groups. (DOCX 72 kb) Received: 4 May 2018 Accepted: 7 August 2018 Received: 4 May 2018 Accepted: 7 August 2018 References Additional file 2: Additional explanation about the spline regression analyses. (DOCX 375 kb) 1. World Health Organization and Alzheimer’s Disease International. Dementia - A public health priority. 2012. 1. World Health Organization and Alzheimer’s Disease International. Dementia - A public health priority. 2012. 2. Kramer AF, Colcombe SJ, McAuley E, Scalf PE, Erickson KI. Fitness, aging and neurocognitive function. Neurobiol Aging. 2005;26:124–7. https://doi.org/10. 1016/j.neurobiolaging.2005.09.009. 2. Kramer AF, Colcombe SJ, McAuley E, Scalf PE, Erickson KI. Fitness, aging and neurocognitive function. Neurobiol Aging. 2005;26:124–7. https://doi.org/10. 1016/j.neurobiolaging.2005.09.009. Consent for publication Not applicable. Consent for publication Not applicable. Abbreviations 15WT: 15 Words Test; ACT: A1-antichymotrypsin; AD: Alzheimer’s dementia; APOE: Apolipoprotein E; CES-D: Center for Epidemiologic Studies Depression scale; CRP: C-reactive protein; DM: Diabetes mellitus; HDL cholesterol: High-Density Lipoprotein cholesterol; IL-6: Interleukin-6; IQR: Interquartile range; LAPAQ: LASA Physical Activity Questionnaire; LASA: Longitudinal Aging Study Amsterdam; LDL cholesterol: Low-Density Lipoprotein cholesterol; LR: Likelihood-ratio; MAAS: Maastricht Aging Study; MI: Myocardial infarction; MMSE: Mini-Mental State Examination; NHP: Normal human plasma; SD: Standard deviation; SE: Standard error; VLDL cholesterol: Very-low-density lipoprotein cholesterol; VUmc: VU University Medical Center 3. Baumgart M, Snyder HM, Carrillo MC, Fazio S, Kim H, Johns H. Summary of the evidence on modifiable risk factors for cognitive decline and dementia: a population-based perspective. Alzheimers Dement. 2015;11:1–9. https://doi.org/10.1016/j.jalz.2015.05.016. 3. Baumgart M, Snyder HM, Carrillo MC, Fazio S, Kim H, Johns H. Summary of the evidence on modifiable risk factors for cognitive decline and dementia: a population-based perspective. Alzheimers Dement. 2015;11:1–9. https://doi.org/10.1016/j.jalz.2015.05.016. 4. Smith RG, Todd S, Passmore PA. Chronic medical disease and cognitive aging: toward a healthy body and brain. Inflammation and Cognitive Decline. Edited by Kristine Yaffe. Can Geriatr J. 2013;16(3):143–44. 4. Smith RG, Todd S, Passmore PA. Chronic medical disease and cognitive aging: toward a healthy body and brain. Inflammation and Cognitive Decline. Edited by Kristine Yaffe. Can Geriatr J. 2013;16(3):143–44. 5. Bretsky P, Guralnik JM, Launer L, Albert M, Seeman TE. The role of APOE- epsilon4 in longitudinal cognitive decline: MacArthur studies of successful aging. Neurology. 2003;60:1077–81. https://doi.org/10.1212/01.WNL.00000 55875.26908.24. 5. Bretsky P, Guralnik JM, Launer L, Albert M, Seeman TE. The role of APOE- epsilon4 in longitudinal cognitive decline: MacArthur studies of successful aging. Neurology. 2003;60:1077–81. https://doi.org/10.1212/01.WNL.00000 55875.26908.24. Ethics approval and consent to participate All subjects gave written informed consent and the study was approved by the Ethical Review Board of the VU University Medical Center (VUmc) and conducted according to the principles of the Helsinki declaration. Availability of data and materials The datasets used and/or analyzed during the current study can be requested through http://www.lasa-vu.nl/data/availability_data/availability_data.htm. Page 10 of 10 Page 10 of 10 Legdeur et al. BMC Geriatrics (2018) 18:187 9. Anstey KJ, Lipnicki DM, Low L-F. Cholesterol as a risk factor for dementia and cognitive decline: a systematic review of prospective studies with Meta-analysis. Am J Geriatr Psychiatry. 2008;16:343–54. https://doi.org/10. 1097/01.JGP.0000310778.20870.ae. 30. van den Kommer TN, Dik MG, Comijs HC, Lutjohann D, Lips P, Jonker C, et al. The role of extracerebral cholesterol homeostasis and ApoE e4 in cognitive decline. Neurobiol Aging. 2012;33:622.e17–28. https://doi.org/10.1016/j. neurobiolaging.2011.02.019. 10. Bullain SS, Corrada MM. Dementia in the oldest old. Continuum (Minneap Minn). 2013;19:457–69. https://doi.org/10.1212/01.CON.0000429172.27815.3f. 31. Corrada MM, Hayden KM, Paganini-Hill A, Bullain SS, DeMoss J, Aguirre C, et al. Age of onset of hypertension and risk of dementia in the oldest-old: the 90+ study. Alzheimers Dement. 2017;13:103–10. https://doi.org/10.1016/j.jalz.2016. 09.007. 11. Farrer LA, Cupples LA, Haines JL, Hyman B, Kukull WA, Mayeux R, et al. Effects of age, sex, and ethnicity on the association between apolipoprotein E genotype and Alzheimer disease. A meta-analysis. APOE and Alzheimer disease Meta analysis consortium. JAMA. 1997;278:1349–56. https://doi.org/ 10.1001/jama.1997.03550160069041. 32. Kennelly SP, Lawlor BA, Kenny RA. Blood pressure and the risk for dementia- a double edged sword. Ageing Res Rev. 2009;8:61–70. https://doi.org/10. 1016/j.arr.2008.11.001. 33. Ruitenberg A, Skoog I, Ott A, Aevarsson O. Blood pressure and risk of dementia: results from the Rotterdam study and the Gothenburg H-70 study. Blood Press. 2001:33–9. https://doi.org/10.1159/000051233. 12. Qiu C, Winblad B, Fratiglioni L. The age-dependent relation of blood pressure to cognitive function and dementia. Lancet Neurol. 2005;4:487–99. https://doi.org/10.1016/S1474-4422(05)70141-1. 34. Skoog I, Lernfelt B, Landahl S, Palmertz B, Andreasson LA, Nilsson L, et al. 15-year longitudinal study of blood pressure and dementia. Lancet (London, England). 1996;347:1141–5. https://doi.org/10.1016/S0140-6736(96)90608-X. 13. Harrison SL, Stephan BCM, Siervo M, Granic A, Davies K, Wesnes KA, et al. Is there an association between metabolic syndrome and cognitive function in very old adults? The Newcastle 85+ study. J Am Geriatr Soc. 2015;63:667– 75. https://doi.org/10.1111/jgs.13358. 35. Spira AP, Rebok GW, Stone KL, Kramer JH, Yaffe K. Depressive symptoms in oldest-old women: risk of mild cognitive impairment and dementia. Am J Geriatr Psychiatry. 2011;19:S56–7. 14. van den Berg E, Biessels GJ, de Craen a J, Gussekloo J, RGJ W. The metabolic syndrome is associated with decelerated cognitive decline in the oldest old. Neurology. 2007;69:979–85. https://doi.org/10.1212/01.wnl.0000271381.30143.75. 36. Availability of data and materials Berkman LF, Berkman CS, Kasl S, Freeman DHJ, Leo L, Ostfeld AM, et al. Depressive symptoms in relation to physical health and functioning in the elderly. Am J Epidemiol. 1986;124:372–88. https://doi.org/10.1093/ oxfordjournals.aje.a114408. 15. Huisman M, Poppelaars J, van der Horst M, Beekman ATF, Brug J, van Tilburg TG, et al. Cohort profile: the longitudinal aging study Amsterdam. Int J Epidemiol. 2011;40:868–76. https://doi.org/10.1093/ije/dyq219. 37. Brailean A, Aartsen MJ, Muniz-Terrera G, Prince M, Prina AM, Comijs HC, et al. Longitudinal associations between late-life depression dimensions and cognitive functioning: a cross-domain latent growth curve analysis. Psychol Med. 2017;47:690–702. https://doi.org/10.1017/S003329171600297X. 16. Reijs BLR, Ramakers IHGB, Elias-Sonnenschein L, Teunissen CE, Koel-Simmelink M, Tsolaki M, et al. Relation of odor identification with Alzheimer’s disease markers in cerebrospinal fluid and cognition. J Alzheimers Dis. 2017;60:1025–34. https://doi.org/10.3233/JAD-170564. 38. Gorelick PB. Role of inflammation in cognitive impairment: results of observational epidemiological studies and clinical trials. Ann N Y Acad Sci. 2010;1207:155–62. https://doi.org/10.1111/j.1749-6632.2010.05726.x. 17. Havekes LM, De Knijff P, Beisiegel U. A rapid micromethod for apolipoprotein E phenotyping directly in serum. J Lipid Res. 1987;28:455–63. 18. Friedewald WT, Levy RI, Fredrickson DS. Estimation of the concentration of low-density lipoprotein cholesterol in plasma, without use of the preparative ultracentrifuge. Clin Chem. 1972;18:499–502. 39. Anstey KJ, Windsor TD, Rodgers B, Jorm AF, Christensen H. Lower cognitive test scores observed in alcohol abstainers are associated with demographic, personality, and biological factors: the PATH through life project. Addiction. 2005;100:1291–301. https://doi.org/10.1111/j.1360-0443.2005.01159.x. 19. Kriegsman DM, Penninx BW, van Eijk JT, Boeke AJ, Deeg DJ. Self-reports and general practitioner information on the presence of chronic diseases in community dwelling elderly. A study on the accuracy of patients’ self-reports and on determinants of inaccuracy. J Clin Epidemiol. 1996;49:1407–17. https://doi.org/10.1016/S0895-4356(96)00274-0. 40. Zhong G, Wang Y, Zhang Y, Guo JJ, Zhao Y. Smoking is associated with an increased risk of dementia: a meta-analysis of prospective cohort studies with investigation of potential effect modifiers. PLoS One. 2015;10 https://doi.org/10.1371/journal.pone.0118333. p g 20. Radloff LS, Teri L. Use of the Center for Epidemiological Studies-Depression Scale with older adults. Clin Gerontol. 1986;5:119–36. https://doi.org/10. 1007/BF01537606. 41. Chang C-CH, Zhao Y, Lee C-W, Ganguli M. Smoking, death, and Alzheimer’s disease: a case of competing risks. Alzheimer Dis Assoc Disord. 2012;26: 300–6. https://doi.org/10.1097/WAD.0b013e3182420b6e. 21. Stel VS, Smit JH, Pluijm SMF, Visser M, Deeg DJH, Lips P. Comparison of the LASA physical activity questionnaire with a 7-day diary and pedometer. J Clin Epidemiol. 2004;57:252–8. https://doi.org/10.1016/j.jclinepi.2003.07.008. 42. Availability of data and materials Hernán MA, Alonso ALG. Cigarette smoking and dementia: potential selection bias in the elderly. Epidemiol (Cambridge, Mass). 2008;19:242–6. https://doi. org/10.1097/EDE.0b013e31816bbe14. 22. Folstein MF, Folstein SE, McHugh PR. “Mini-mental state”. A practical method for grading the cognitive state of patients for the clinician. J Psychiatr Res. 1975;12:189–98. https://doi.org/10.1016/0022-3956(75)90026-6. 43. Blondell SJ, Hammersley-Mather R, Veerman J. Does physical activity prevent cognitive decline and dementia?: a systematic review and meta- analysis of longitudinal studies. BMC Public Health. 2014;14:1–12. https://doi. org/10.1186/1471-2458-14-510. 23. Rey A. L’examen clinique en psychologie. Paris: Presses Universitaires de France; 1964. 44. Young J, Angevaren M, Rusted J, Tabet N. Aerobic exercise to improve cognitive function in older people without known cognitive impairment (review). Cochrane Database Syst Rev. 2015:1–141. https://doi.org/10.1002/ 14651858.CD005381.pub4. www.cochranelibrary.com 24. Verhaeghen P, Salthouse TA. Meta-analyses of age-cognition relations in adulthood: estimates of linear and nonlinear age effects and structural models. Psychol Bull. 1997;122:231–49. https://doi.org/10.1037//0033-2909. 122.3.231. 45. Jansen WJ, Ossenkoppele R, Tijms BM, Fagan AM, Hansson O, Klunk WE, et al. Association of cerebral amyloid-β aggregation with cognitive functioning in persons without dementia. JAMA Psychiatry. 2018;75:84–95. https://doi.org/10. 1001/jamapsychiatry.2017.3391. 25. Chen H, Zhao B, Cao G, Proges EC, O’Shea A, Woods AJ, et al. Statistical approaches for the study of cognitive and brain aging. Front Aging Neurosci. 2016;8:1–10. https://doi.org/10.3389/fnagi.2016.00176. 26. Corrada MM, Paganini-Hill A, Berlau DJ, Kawas CH. Apolipoprotein e genotype, dementia, and mortality in the oldest old: the 90+ study. Alzheimers Dement. 2013;9:12–8. https://doi.org/10.1016/j.jalz.2011.12.004. 46. Bender R, Lange S. Adjusting for multiple testing - when and how? J Clin Epidemiol. 2001;54:343–9. https://doi.org/10.1016/S0895-4356(00)00314-0. 47. Perneger TV. What’s wrong with Bonferroni adjustments. BMJ. 1998;316 https://doi.org/10.1136/bmj.316.7139.1236. 27. Elias-Sonnenschein LS, Viechtbauer W, Ramakers IHGB, Verhey FRJ, Visser PJ. Predictive value of APOE-ε4 allele for progression from MCI to AD-type dementia: a meta-analysis. J Neurol Neurosurg Psychiatry. 2011;82:1149–56. https://doi.org/10.1136/jnnp.2010.231555. 28. Mielke MM, Zandi PP, Sjögren M, Gustafson D, Ostling S, Steen B, et al. High total cholesterol levels in late life associated with a reduced risk of dementia. Neurology. 2005;64:1689–95. https://doi.org/10.1212/01.WNL. 0000161870.78572.A5. 29. Weverling-Rijnsburger AW, Blauw GJ, Lagaay AM, Knook DL, Meinders AE, Westendorp RG. Total cholesterol and risk of mortality in the oldest old. Lancet (London, England). 1997;350:1119–23. https://doi.org/10.1016/S0140- 6736(97)04430-9. 29. Weverling-Rijnsburger AW, Blauw GJ, Lagaay AM, Knook DL, Meinders AE, Westendorp RG. Total cholesterol and risk of mortality in the oldest old. Lancet (London, England). 1997;350:1119–23. https://doi.org/10.1016/S0140- 6736(97)04430-9.
https://openalex.org/W2964552444
https://europepmc.org/articles/pmc6720615?pdf=render
English
null
Regulation of Wound Healing by the NRF2 Transcription Factor—More Than Cytoprotection
International journal of molecular sciences
2,019
cc-by
9,770
Regulation of Wound Healing by the NRF2 Transcription Factor—More Than Cytoprotection * Correspondence: paul.hiebert@biol.ethz.ch (P.H.); sabine.werner@biol.ethz.ch (S.W.) Received: 17 July 2019; Accepted: 7 August 2019; Published: 8 August 2019 Abstract: The nuclear factor-erythroid 2-related factor 2 (NRF2) transcription factor plays a central role in mediating the cellular stress response. Due to their antioxidant properties, compounds activating NRF2 have received much attention as potential medications for disease prevention, or even for therapy. Accumulating evidence suggests that activation of the NRF2 pathway also has a major impact on wound healing and may be beneficial in the treatment of chronic wounds, which remain a considerable health and economic burden. While NRF2 activation indeed shows promise, important considerations need to be made in light of corresponding evidence that also points towards pro-tumorigenic effects of NRF2. In this review, we discuss the evidence to date, highlighting recent advances using gain- and loss-of-function animal models and how these data fit with observations in humans. Keywords: NRF2; wound healing; keratinocyte; fibroblast; inflammation International Journal of Molecular Sciences International Journal of Molecular Sciences Review Regulation of Wound Healing by the NRF2 Transcription Factor—More Than Cytoprotection Paul Hiebert * and Sabine Werner * Institute for Molecular Health Sciences, Department of Biology, Swiss Federal Institute of Technology Zürich, 8093 Zurich, Switzerland * Correspondence: paul.hiebert@biol.ethz.ch (P.H.); sabine.werner@biol.ethz.ch (S.W.) Int. J. Mol. Sci. 2019, 20, 3856; doi:10.3390/ijms20163856 www.mdpi.com/journal/ijms 1. The Wound Healing Process As the organ continuously exposed to the outside world, the skin is charged with many important functions, including maintaining body temperature, hydration, and sensing the environment. Among its most important functions is to provide a barrier to an external environment rich in pathogens and toxins. Furthermore, it is frequently exposed to harmful ultraviolet (UV) radiation. Given the importance of maintaining the integrity of the skin, mammals have evolved a complex and sophisticated wound healing response, whereby damaged tissue is efficiently repaired following injury. While the complex nature of this response contributes to its effectiveness, it also leads to challenges when attempting to remedy pathological scenarios where wound healing goes wrong, such as in chronic, non-healing wounds/ulcers and in hypertrophic scars and keloids [1,2]. The normal wound healing response involves a series of overlapping phases beginning with haemostasis and the formation of a fibrin clot. Haemostasis is initiated by platelets immediately after injury and functions critically to reduce blood loss from damaged vessels. It results in the deposition of a provisional matrix made primarily of fibrin that provides a rapid seal of the wound. This temporary fibrin mesh also functions as a scaffold for cells to migrate into the wound and as a reservoir of cytokines and growth factors. The inflammatory phase follows soon after, with neutrophils being the first immune cells to arrive at the wound site due to their abundance in circulation. They function as an innate response to invading pathogens through their production of proteinases and reactive oxygen species (ROS), which, however, can also damage the cells at the wound site. In addition, neutrophils assist in the recruitment of other immune cell types, such as macrophages and lymphocytes, which accumulate in the following days. Inflammatory cells also function critically to produce cytokines and growth factors, which serve to attract fibroblasts, stimulate keratinocyte migration and proliferation, and initiate the formation of new blood vessels [3,4]. This provides a ‘kick-start’ for the tissue formation Int. J. Mol. Sci. 2019, 20, 3856; doi:10.3390/ijms20163856 www.mdpi.com/journal/ijms 2 of 13 Int. J. Mol. Sci. 2019, 20, 3856 phase of wound healing, where keratinocytes at the wound edge begin to migrate into the wound along the injured dermis and then across the provisional wound matrix. Keratinocytes behind the migrating tongue accelerate their proliferation rate to produce a pool of new keratinocytes that replenish those that are lost by the wound [5]. 1. The Wound Healing Process Slightly after the onset of re-epithelialization, dermal fibroblasts at the wound edge migrate into the wound bed, where they proliferate and produce large amounts of extracellular matrix (ECM). A large percentage of the wound fibroblasts differentiate into myofibroblasts, which strongly contribute to wound contraction [6]. Additional sources of wound (myo) fibroblasts are bone marrow-derived cells and adipocyte precursors, which differentiate into (myo) fibroblasts at the wound site [7–9]. In parallel, endothelial sprouting occurs at the wound edge, and massive angiogenesis leads to the formation of a new vasculature in the newly forming stromal part of the wound, which is called granulation tissue [1,2]. Once keratinocytes have fully covered and closed the wound, fibroblasts and immune cells continue to remodel the underlying tissue, replacing the provisional matrix with one composed primarily of collagen type I. This remodeling phase also features increased apoptosis of immune cells, fibroblasts and endothelial cells of vessels that do not contribute to the vasculature of the mature scar tissue. Fibroblasts that remain in the scar tissue can continue to remodel the healed skin for up to several years. While the resulting scar lacks the full mechanical strength and elasticity of the original skin and also all appendages, it functions effectively as a restored skin barrier that once again offers protection to environmental dangers [1,2,10,11]. The wound healing response, therefore, involves many carefully orchestrated events that need to provide the right signals to the right cells at the right time. Defects in any one of these wound healing phases can have disastrous consequences and lead to chronic, non-healing wounds followed by infection, hospitalization, or even death [12,13]. Alternatively, healing can be excessive, resulting in the formation of hypertrophic scars and keloids, which can cause severe functional and cosmetic impairments [14,15]. The complex gene expression pattern during wound healing is controlled by various key transcription factors, which orchestrate different processes at the wound site [16,17]. One such transcription factor, mainly known for its cytoprotective activities, is NRF2, which will be introduced below. 2. The Transcription Factor NRF2 Nuclear factor-erythroid 2-related factor 2 (NRF2; NFE2L2) is a member of the cap‘n‘collar family of transcription factors, which also includes NFE2, NRF1 (NFE2L1), NRF3 (NFE2L3), BACH1, and BACH2 [18]. NRF2 is particularly famous for its central role in regulating the transcription of cytoprotective genes, including genes encoding various ROS-detoxifying enzymes, antioxidant proteins, and drug transporters [18–20]. Over the last three decades, research has demonstrated the remarkable importance of NRF2 in maintaining the cellular redox status in virtually all organs and tissues. Under homeostatic conditions, when only low amounts of the cytoprotective target proteins are needed, NRF2-mediated transcription is restricted to baseline levels by the NRF2 antagonist Kelch-like ECH-associated protein 1 (KEAP1). Binding of NRF2 to KEAP1 sequesters it in the cytoplasm and leads to its rapid proteasomal degradation. The presence of ROS and/or electrophilic compounds weakens the NRF2-KEAP1 interaction, allowing NRF2 to become stabilized. This results in accumulation of newly produced NRF2 in the nucleus. NRF2 acts by dimerizing with small musculoaponeurotic fibrosarcoma (MAF) proteins and binding to specific regions of DNA called antioxidant response elements (AREs), where it initiates the transcription of its target genes [18,21] (Figure 1). In this way, the NRF2 antioxidant pathway serves to protect cells from dangerous levels of ROS that are generated in response to environmental stressors (e.g., UV irradiation, pathogens, and toxins) and during excessive inflammation. However, multiple studies identified additional NRF2 targets that are not directly involved in the antioxidant response and many of them are expressed in a tissue-specific and situation-dependent manner [22–25]. This is also relevant for wound healing and will be described in detail below. 3 of 13 Int. J. Mol. Sci. 2019, 20, 3856 Figure 1. The nuclear factor-erythroid 2-related factor 2 (NRF2) signaling pathway. NRF2 strongly binds to its cytoplasmic inhibitor Kelch-like ECH-associated protein 1 (KEAP1) under homeostatic conditions and only low levels of NRF2 are present in the nucleus. In response to reactive oxygen species (ROS) and/or electrophiles, the NRF2-KEAP1 interaction is weakened and newly formed NRF2 accumulates in the nucleus. Here, NRF2 dimerizes with small musculoaponeurotic fibrosarcoma (MAF) proteins and binds to antioxidant response elements (AREs) in the promoters or enhancers of its target genes, of which many encode ROS detoxifying enzymes and other antioxidant proteins, thereby initiating a cytoprotective response. Figure 1. The nuclear factor-erythroid 2-related factor 2 (NRF2) signaling pathway. 2. The Transcription Factor NRF2 NRF2 strongly binds to its cytoplasmic inhibitor Kelch-like ECH-associated protein 1 (KEAP1) under homeostatic conditions and only low levels of NRF2 are present in the nucleus. In response to reactive oxygen species (ROS) and/or electrophiles, the NRF2-KEAP1 interaction is weakened and newly formed NRF2 accumulates in the nucleus. Here, NRF2 dimerizes with small musculoaponeurotic fibrosarcoma (MAF) proteins and binds to antioxidant response elements (AREs) in the promoters or enhancers of its target genes, of which many encode ROS detoxifying enzymes and other antioxidant proteins, thereby initiating a cytoprotective response. The benefits of activating the NRF2 pathway have generated intense interest in recent years, and NRF2 activating compounds continue to be tested for their health benefits and prevention of disease [26–28]. However, the cytoprotective benefits of NRF2 have been met with increased caution as evidence continues to accumulate suggesting a detrimental role in cancer, where NRF2-mediated protection of cancer cells can contribute to accelerated tumor growth and to chemo- and radio- resistance. Examples like these point to both a good and bad side of NRF2 in health and disease The benefits of activating the NRF2 pathway have generated intense interest in recent years, and NRF2 activating compounds continue to be tested for their health benefits and prevention of disease [26–28]. However, the cytoprotective benefits of NRF2 have been met with increased caution as evidence continues to accumulate suggesting a detrimental role in cancer, where NRF2-mediated protection of cancer cells can contribute to accelerated tumor growth and to chemo- and radio-resistance. Examples like these point to both a good and bad side of NRF2 in health and disease [27,28]. 2. The Transcription Factor NRF2 NRF2 strongly binds to its cytoplasmic inhibitor Kelch-like ECH-associated protein 1 (KEAP1) under homeostatic conditions and only low levels of NRF2 are present in the nucleus. In response to reactive oxygen species (ROS) and/or electrophiles, the NRF2-KEAP1 interaction is weakened and newly formed NRF2 accumulates in the nucleus. Here, NRF2 dimerizes with small musculoaponeurotic fibrosarcoma (MAF) proteins and binds to antioxidant response elements (AREs) in the promoters or enhancers of its target genes, of which many encode ROS detoxifying enzymes and other antioxidant proteins, thereby initiating a cytoprotective response. Figure 1. The nuclear factor-erythroid 2-related factor 2 (NRF2) signaling pathway. NRF2 strongly binds to its cytoplasmic inhibitor Kelch-like ECH-associated protein 1 (KEAP1) under homeostatic conditions and only low levels of NRF2 are present in the nucleus. In response to reactive oxygen species (ROS) and/or electrophiles, the NRF2-KEAP1 interaction is weakened and newly formed NRF2 accumulates in the nucleus. Here, NRF2 dimerizes with small musculoaponeurotic fibrosarcoma (MAF) proteins and binds to antioxidant response elements (AREs) in the promoters or enhancers of its target genes, of which many encode ROS detoxifying enzymes and other antioxidant proteins, thereby initiating a cytoprotective response. Figure 1. The nuclear factor-erythroid 2-related factor 2 (NRF2) signaling pathway. NRF2 strongly binds to its cytoplasmic inhibitor Kelch-like ECH-associated protein 1 (KEAP1) under homeostatic conditions and only low levels of NRF2 are present in the nucleus. In response to reactive oxygen species (ROS) and/or electrophiles, the NRF2-KEAP1 interaction is weakened and newly formed NRF2 accumulates in the nucleus. Here, NRF2 dimerizes with small musculoaponeurotic fibrosarcoma (MAF) proteins and binds to antioxidant response elements (AREs) in the promoters or enhancers of its target genes, of which many encode ROS detoxifying enzymes and other antioxidant proteins, thereby initiating a cytoprotective response. Figure 1. The nuclear factor-erythroid 2-related factor 2 (NRF2) signaling pathway. NRF2 strongly binds to its cytoplasmic inhibitor Kelch-like ECH-associated protein 1 (KEAP1) under homeostatic conditions and only low levels of NRF2 are present in the nucleus. In response to reactive oxygen species (ROS) and/or electrophiles, the NRF2-KEAP1 interaction is weakened and newly formed NRF2 accumulates in the nucleus. Here, NRF2 dimerizes with small musculoaponeurotic fibrosarcoma (MAF) proteins and binds to antioxidant response elements (AREs) in the promoters or enhancers of its target genes, of which many encode ROS detoxifying enzymes and other antioxidant proteins, thereby initiating a cytoprotective response. Figure 1. The nuclear factor-erythroid 2-related factor 2 (NRF2) signaling pathway. [27,28]. 3. Expression and Activity of NRF2 in Healing Wounds 3. Expression and Activity of NRF2 in Healing Wounds Wounds produce large amounts of ROS to combat invading pathogens [16], to attract immune cells, and to regulate different cell signaling events [29]. As such, the role of NRF2 during the wound healing process has been of interest to many researchers. Several lines of evidence suggest an important role for NRF2 during tissue repair. This includes the observation that Nrf2 gene expression increases early after full-thickness wounding of mice along with ROS production, followed by a gradual reduction as wound healing progresses [30]. Keratinocytes of the hyperproliferative epithelium of skin wounds were shown to strongly express Nrf2, but expression of this gene was also seen in cells of the granulation tissue [30]. NRF2 has also been shown to become activated after tissue Wounds produce large amounts of ROS to combat invading pathogens [16], to attract immune cells, and to regulate different cell signaling events [29]. As such, the role of NRF2 during the wound healing process has been of interest to many researchers. Several lines of evidence suggest an important role for NRF2 during tissue repair. This includes the observation that Nrf2 gene expression increases early after full-thickness wounding of mice along with ROS production, followed by a gradual reduction as wound healing progresses [30]. Keratinocytes of the hyperproliferative epithelium of skin wounds were shown to strongly express Nrf2, but expression of this gene was also seen in cells of the granulation tissue [30]. NRF2 has also been shown to become activated after tissue damage and possibly synergizes with other transcription factors to promote wound repair [31]. g [ ] damage and possibly synergizes with other transcription factors to promote wound repair [31]. A number of studies have tested NRF2-activating compounds for their impact on wound healing and have shown interesting results. These include purified molecules (including nitric oxide (NO) or NO donors), as well as bee venom, olive oil, and various plant extracts that include these compounds A number of studies have tested NRF2-activating compounds for their impact on wound healing and have shown interesting results. These include purified molecules (including nitric oxide (NO) or NO donors), as well as bee venom, olive oil, and various plant extracts that include these compounds [32–38]. However, it is important to note that these chemicals often have multiple effects and modes of action, Int. J. Mol. Sci. 4. Consequences of NRF2 Loss-of-Function during Wound Healing Global NRF2 knockout (KO) mice have no obvious skin phenotype under normal conditions and were first used in wound healing studies nearly two decades ago. Surprisingly, NRF2 KO mice healed wounds at normal rates and displayed no obvious histological differences compared to control animals [30]. Similar rates of cell proliferation and apoptosis between NRF2 KO and wild-type control mice were also observed in this study. Loss of NRF2 did, however, lead to a delayed induction, but prolonged overexpression of pro-inflammatory cytokines at the wound site and persistence of macrophages, even after closure of the wounds. Among the affected cytokines was transforming growth factor β 1 (TGF-β1), whose delay at the beginning of wound healing may also lead to the reduced collagen production observed in wounds of NRF2 KO mice [30]. Despite the observed differences in cytokine production, the lack of a difference in wound healing kinetics in NRF2 KO vs. control mice may be due, at least in part, to compensatory actions of other transcription factors (e.g., NRF1 or NRF3) [30]. To address the issue of compensation, mice were generated that express a dominant-negative NRF2 mutant (dnNRF2) in keratinocytes [39]. The dnNRF2 mutant lacks the KEAP1 binding domain and the transactivation domains, leading to the nuclear accumulation of dnNRF2 that binds to AREs without facilitating transcription. In doing so, other cap‘n‘collar transcription factors are prevented from binding to these AREs, thereby avoiding potential compensatory effects caused by a loss of NRF2. Similar to global NRF2 KO mice, however, keratinocyte-specific dnNRF2 mice showed no differences either in normal skin morphology or during wound healing [39]. Furthermore, mice lacking either NRF2 in keratinocytes or NRF3 in all cells healed normally [40,41]. This was surprising given previous findings showing NRF2 and NRF3 predominantly and highly expressed in the hyperproliferative wound epithelium [30]. However, keratinocytes possess multiple, and partially redundant antioxidant defense pathways [40,42], and loss of NRF2 activity may be compensated by other cytoprotective factors and pathways, allowing the epithelium to properly regenerate. It is likely that certain actions of NRF2 differ substantially depending on cell type, as cells located in different organs and tissues have diverse functions, specific NRF2 targets [22,23], and are exposed to varying degrees of environmental stressors. Skin fibroblasts for example, are located within the dermis and are shielded from many of the environmental dangers faced by keratinocytes. [27,28]. 3. Expression and Activity of NRF2 in Healing Wounds 2019, 20, 3856 4 of 13 making the precise role of NRF2 in these studies unclear. Genetic approaches in mice using NRF2 gain- and loss-of-function models offer an alternative strategy to investigating NRF2 function during tissue repair. Recent studies employing this strategy have added to the evidence for NRF2 as a key player in the wound healing process, with actions extending beyond its antioxidant effects. However, as is typical for NRF2, this evidence occasionally offers a mixed view of both the benefits and possible detriments of activating the NRF2 pathway. In this review, we will discuss the accumulating evidence suggesting an important role for NRF2 during cutaneous wound healing, focusing on findings from genetic animal models, but extending to the potential use of chemical activators of the NRF2 pathway for the promotion of wound healing in humans. 4. Consequences of NRF2 Loss-of-Function during Wound Healing In vitro, skin fibroblasts deficient in NRF2 showed slightly increased levels of ROS, however, proliferation was similar to control cells [43]. In line with other NRF2 loss-of-function studies, mice with fibroblast-specific deletion of NRF2 also showed no differences in wound healing kinetics compared to control animals [43]. These mice did feature an altered immune cell content in unwounded skin, but these differences disappeared upon wounding [43]. Similar to global NRF2 KO mice, this suggests that NRF2 may have some influence over immune cell recruitment, however, the effect may be diluted in the context of a healing wound, where many other immune-regulatory mechanisms are at play. The prolonged wound inflammation in NRF2-deficient mice suggested a possible role for NRF2 in immune cells. Immune cells of the myeloid lineage have important functions during wound healing in fighting offinvading bacteria through the production of ROS and in the production of healing-promoting factors [3]. In light of these observations, mice lacking NRF2 in myeloid cells 5 of 13 Int. J. Mol. Sci. 2019, 20, 3856 were generated and subjected to full-thickness excisional wounding [44]. In wounds of wild-type mice, macrophages, and to an even greater extent neutrophils, were shown to strongly express Nrf2 and cytoprotective NRF2 target genes (e.g., Nqo1). Nevertheless, and similar to other cell types, myeloid-specific NRF2 KO mice showed no difference in wound healing as revealed by morphometric analysis of histological wound sections and analysis of the wound immune cell content [44]. One caveat to consider is that wound healing studies conducted on laboratory mice are typically performed in very clean conditions. In situations that feature greater exposure to an abundant variety of bacterial or other environmental challenges, it is possible that NRF2 deficiency would prove to be more detrimental. Furthermore, the majority of these studies have focused primarily on examination of wound closure with, to date, less attention given to the effect of NRF2 deficiency on scarring. Future work will likely address these open questions further, however the bulk of the evidence thus far strongly suggests that, while NRF2 may have important roles to play, its function is often redundant, making it dispensable for wound healing in healthy mice that do not face additional challenges. g y g In contrast to normal wound healing, pathological wound healing represents a situation where the normal wound healing process has failed, leading to both chronic wounds, ulcers, or hypertrophic scars and keloids. 4. Consequences of NRF2 Loss-of-Function during Wound Healing Due to the increased challenge faced by the skin in these scenarios [1,2], it is possible that the loss of NRF2 would have a more important impact. This hypothesis is supported by experiments performed using a diabetic mouse model of delayed wound healing [45]. Mice injected with streptozotocin develop type I diabetes and exhibit significantly delayed wound closure compared to control mice. Interestingly, wound closure was delayed even further in streptozotocin-induced diabetic NRF2 KO mice [45], suggesting that unlike normal wound healing, NRF2 may indeed have a more crucial role in facilitating wound closure in pathological situations, such as diabetes. This hypothesis is further supported by the finding that the NRF2 pathway is functionally insufficient in bone marrow-derived multipotent stromal cells from diabetic mice [46]. The consequences of NRF2 loss- or gain-of-function on the wound healing process are summarized in Table 1. Table 1. NRF2 gain- or loss-of-function phenotypes during wound healing. Cell Type Loss-of-Function Phenotype Gain-of-Function Phenotype Global No change in wound closure rates [30] Delayed induction of cytokines [30] Prolonged wound inflammation [30] Reduced collagen deposition [30] Delayed diabetic wound healing [45] Improved diabetic wound healing [45] Increased keratinocyte proliferation [45] Restoration of normal transforming growth factor β 1 (TGF-β1) and matrix metalloproteinase (MMP)9 levels [45] Keratinocytes No change in wound closure rates [39] Accelerated wound closure/re-epithelialization [47] Increased expansion of pilosebaceous cells [47] No change in keratinocyte proliferation within the wound [47] Fibroblasts No change in wound closure rates [43] Possible alterations in immune cell profile [43] Accelerated wound closure/re-epithelialization [43] Increased onset of fibroblast senescence/senescence-associated secretory phenotype (SASP) [43] Increased keratinocyte proliferation [43] Myeloid cells No changes in wound closure rates [44] No changes in wound closure rates [44] Table 1. NRF2 gain- or loss-of-function phenotypes during wound healing. 5. Consequences of NRF2 Activation during Wound Healing 5. Consequences of NRF2 Activation during Wound Healing Typically, it is in pathological scenarios where NRF2 activators continue to gain attention as possible therapeutics due to their antioxidant properties. As shown in diabetic mice, NRF2 activity appears to be insufficient during impaired wound healing, resulting in excessive ROS levels, which can lead to severe tissue damage and uncontrolled inflammation. Consistent with this assumption, delayed wound healing observed in mice that are diabetic as a consequence of a mutation in the leptin receptor (Leprdb/db mice) and in streptozotocin-induced diabetic mice was significantly improved through the use of NRF2 activating compounds when applied either systemically or topically [32,45]. Administration of such compounds also led to the restoration of normal TGF-β1 and matrix metalloproteinase (MMP)9 6 of 13 Int. J. Mol. Sci. 2019, 20, 3856 levels in the skin and reduced the oxidative burden [32,45]. Furthermore, NRF2 activating compounds promoted proliferation and migration of the immortalized HaCaT keratinocyte cell line in vitro under hyperglycaemic conditions [45]. It has also been shown that drugs used to treat diabetes can activate the NRF2 pathway [48]. Interestingly, these same drugs have shown efficacy in promoting diabetic wound healing, although in this instance, activation of the NRF2 pathway may not be the principle mechanism of action [49]. Taken together, these data point to activation of the NRF2 pathway as a promising strategy to promote wound healing under stress conditions (Figure 2). Int. J. Mol. Sci. 2019, 20, x FOR PEER REVIEW 6 of 13 used to treat diabetes can activate the NRF2 pathway [48]. Interestingly, these same drugs have shown efficacy in promoting diabetic wound healing, although in this instance, activation of the NRF2 pathway may not be the principle mechanism of action [49]. Taken together, these data point to activation of the NRF2 pathway as a promising strategy to promote wound healing under stress conditions (Figure 2). Figure 2. Characteristic features of chronic wounds, which may be improved by treatment with NRF2 activating compounds. NRF2 activation reduces oxidative stress, thereby enhancing production of TGF-β1, which is important for granulation tissue formation and matrix production. Reduction of ROS also suppresses the chronic inflammation and the excessive production of MMP9. Expansion of pilosebaceous cells by activated NRF2 may promote re-epithelialization of the wound. Activation of NRF2 in fibroblasts may promote senescence and associated production of a SASP, which can further promote wound re-epithelialization. 5. Consequences of NRF2 Activation during Wound Healing Arrows pointing to the top indicate upregulation and arrows pointing to the bottom indicate downregulation. Figure 2. Characteristic features of chronic wounds, which may be improved by treatment with NRF2 activating compounds. NRF2 activation reduces oxidative stress, thereby enhancing production of TGF-β1, which is important for granulation tissue formation and matrix production. Reduction of ROS also suppresses the chronic inflammation and the excessive production of MMP9. Expansion of pilosebaceous cells by activated NRF2 may promote re-epithelialization of the wound. Activation of NRF2 in fibroblasts may promote senescence and associated production of a SASP, which can further promote wound re-epithelialization. Arrows pointing to the top indicate upregulation and arrows pointing to the bottom indicate downregulation. Figure 2. Characteristic features of chronic wounds, which may be improved by treatment with NRF2 activating compounds. NRF2 activation reduces oxidative stress, thereby enhancing production of TGF-β1, which is important for granulation tissue formation and matrix production. Reduction of ROS also suppresses the chronic inflammation and the excessive production of MMP9. Expansion of pilosebaceous cells by activated NRF2 may promote re-epithelialization of the wound. Activation of NRF2 in fibroblasts may promote senescence and associated production of a SASP, which can further promote wound re-epithelialization. Arrows pointing to the top indicate upregulation and arrows pointing to the bottom indicate downregulation. Figure 2. Characteristic features of chronic wounds, which may be improved by treatment with NRF2 activating compounds. NRF2 activation reduces oxidative stress, thereby enhancing production of TGF-β1, which is important for granulation tissue formation and matrix production. Reduction of ROS also suppresses the chronic inflammation and the excessive production of MMP9. Expansion of pilosebaceous cells by activated NRF2 may promote re-epithelialization of the wound. Activation of NRF2 in fibroblasts may promote senescence and associated production of a SASP, which can further promote wound re-epithelialization. Arrows pointing to the top indicate upregulation and arrows pointing to the bottom indicate downregulation. As mentioned, one downside of using NRF2 activators to elucidate the role of NRF2 in vivo is their likely multiple modes of action, which make the precise role of NRF2 difficult to determine. Alternatively, genetic approaches in rodents have been used to study the consequences of NRF2 activation. In one study, exosomes produced by adipose-derived stem cells overexpressing NRF2 were shown to improve the ulceration of foot wounds in diabetic rats [50]. 5. Consequences of NRF2 Activation during Wound Healing 2019, 20, 3856 7 of 13 in bone marrow-derived multipotent stromal cells of diabetic mice through knock-down of KEAP1 restored their multipotent cell properties and promoted wound healing in diabetic mice [46]. Due to the early lethality of KEAP1 KO mice, and because KEAP1 also targets other factors in the cell besides NRF2 [55–57], an alternative approach for achieving constitutive NRF2 activation is cell-specific expression of a constitutively active NRF2 (caNRF2) mutant [58,59]. The caNRF2 mutant lacks the KEAP1 binding domain and therefore remains constitutively active in the nucleus without affecting interactions between KEAP1 and other proteins. g p Mice expressing low levels of caNRF2 in keratinocytes only exhibit mild hyperkeratosis in the tail skin, but they are protected from UVB-induced cell death [58]. However, stronger expression of caNRF2 that reflects the activation level achieved after activation of endogenous NRF2 by chemical activators, caused obvious skin abnormalities, including mild inflammation, hyperkeratosis, sebaceous gland hypertrophy, and defects in epidermal barrier function [60]. Interestingly, these mice showed enhanced re-epithelialization during wound healing, leading to significantly faster wound closure [47]. While improved wound healing in these mice is in agreement with results observed in diabetic mice treated with NRF2 activating compounds, caNRF2 expression did not lead to differences in keratinocyte migration, and resulted in no change in keratinocyte proliferation in the wound epidermis. Instead, caNRF2 increased proliferation of cells within hair follicles and sebaceous glands at the wound periphery that expressed keratinocyte stem cell markers [47]. Stem cell subpopulations in the hair follicle bulge, the junctional zone and the upper isthmus were previously shown to contribute to wound re-epithelialization [61] and caNRF2 specifically stimulated the proliferation of cells with markers of junctional zone and upper isthmus stem cells [47]. Therefore, the additional pool of cells that are generated at the wound edge most likely via stem cell expansion seems to function as an increased reservoir of cells available to migrate into and re-populate the wound. The expansion of these stem cell populations is plausibly driven by NRF2-mediated expression of epigen in these cells. This epidermal growth factor family member, which is encoded by a direct target gene of NRF2 [60], has been identified as a strong promoter of hair follicle stem cell proliferation in vivo [62]. 5. Consequences of NRF2 Activation during Wound Healing Furthermore, closure of ear holes was accelerated in mice with a gain of function mutation in the gene encoding rhomboid family protein RHBDF2, and this was associated with activation of the NRF2 pathway [51]. However, the specific contribution of NRF2 in the beneficial effect of RHBDF2 is not fully clear. To more specifically address the effect of activated NRF2 in vivo, KEAP1 KO mice were generated [52]. As the principle NRF2 antagonist, KEAP1 deletion results in constitutive activation of NRF2 in the cell without the need for any additional stimulus. However, global KEAP1 KO mice do not survive longer than 2 to 3 weeks, most likely due to irregular cornification and hyperkeratosis in the esophagus, resulting in gastric obstruction [52]. When diabetic mice were wounded and treated with KEAP1 siRNA, wound healing was significantly improved, featuring faster wound closure, elevated granulation tissue formation, and reduced ROS-mediated formation of 8-oxo-2’-deoxyguanosine As mentioned, one downside of using NRF2 activators to elucidate the role of NRF2 in vivo is their likely multiple modes of action, which make the precise role of NRF2 difficult to determine. Alternatively, genetic approaches in rodents have been used to study the consequences of NRF2 activation. In one study, exosomes produced by adipose-derived stem cells overexpressing NRF2 were shown to improve the ulceration of foot wounds in diabetic rats [50]. Furthermore, closure of ear holes was accelerated in mice with a gain of function mutation in the gene encoding rhomboid family protein RHBDF2, and this was associated with activation of the NRF2 pathway [51]. However, the specific contribution of NRF2 in the beneficial effect of RHBDF2 is not fully clear. To more specifically address the effect of activated NRF2 in vivo, KEAP1 KO mice were generated [52]. As the principle NRF2 antagonist, KEAP1 deletion results in constitutive activation of NRF2 in the cell without the need for any additional stimulus. However, global KEAP1 KO mice do not survive longer than 2 to 3 weeks, most likely due to irregular cornification and hyperkeratosis in the esophagus, resulting in gastric obstruction [52]. When diabetic mice were wounded and treated with KEAP1 siRNA, wound healing was significantly improved, featuring faster wound closure, elevated granulation tissue formation, and reduced ROS-mediated formation of 8-oxo-2’-deoxyguanosine [53,54]. Furthermore, NRF2 activation Int. J. Mol. Sci. 5. Consequences of NRF2 Activation during Wound Healing Interestingly, faster wound closure in caNRF2-transgenic mice required a sufficient degree of NRF2 activation, as mice expressing lower levels of the caNRF2 transgene failed to show differences in wound closure, despite a slight elevation in the expression of NRF2 target genes [47]. These data reinforce the idea that NRF2 activation can have benefits for wound healing and that the degree of NRF2 activation may be important to consider when evaluating its effectiveness. The consequences of NRF2 activation in fibroblasts have also been investigated. Fibroblasts in the skin play critical roles during wound healing, including the release of cytokines and growth factors, deposition of ECM, and wound contraction [2,63]. Remarkably, activating NRF2 in fibroblasts lead to fibroblast senescence both in vitro and during wound healing in vivo [43]. This was shown to be driven largely by the NRF2-mediated deposition of an altered matrisome featuring elevated levels of the senescence-promoting factor plasminogen activator inhibitor-1 (PAI-1, serpine1). Accelerated senescence was observed both in caNRF2-expressing fibroblasts and in wild-type fibroblasts treated with the NRF2 activator tert-butyl-hydroquinone, and occurred despite reduced levels of intracellular ROS and reduced DNA damage [43]. This is of relevance during tissue repair as senescent cells provide important molecular cues to neighboring cells via a growth-promoting secretome referred to as the senescence-associated secretory phenotype (SASP). Furthermore, senescent cells have been shown to be important for normal wound healing [64]. caNRF2 fibroblasts do indeed display a SASP and release factors capable of directly promoting keratinocyte proliferation [43]. Accordingly, mice expressing caNRF2 in fibroblasts showed significantly faster wound closure, featuring enhanced re-epithelialization as a result of increased keratinocyte proliferation in the wound epidermis. Unlike keratinocytes and fibroblasts, the impact of NRF2 activation in myeloid cells on wound healing has proven to be relatively little by comparison. Mice expressing caNRF2 in myeloid cells showed no significant difference in wound closure rates and even failed to show increased expression of NRF2 target genes to a significant degree [44]. A likely explanation for this is that these cells, Int. J. Mol. Sci. 2019, 20, 3856 8 of 13 particularly neutrophils, display very high levels of NRF2 expression and activation even during homeostasis and in the circulation, thereby dwarfing any additional effect of the caNRF2 transgene. 6. Cancer and the Dark Side of NRF2 For many years, researchers have observed important parallels between the wound healing process and cancer [67]. This is also evident when considering the potential benefits of NRF2 on wound healing, actions which may prove unwelcome during tumorigenesis [27,68]. This stands to reason given that activating cellular defense pathways tend to promote cell survival, which is undesirable in tumor cells and in conflict with the actions of chemotherapeutic drugs and with radiotherapy [68]. In humans, multiple lines of evidence support both pro- and anti-tumorigenic roles for NRF2 including during skin cancer development and progression [69], a phenomenon that can also be observed in gain- and loss-of-function animal models. For example, hyperactivation of NRF2 as a result of KEAP1 loss-of-function protected from UV-induced skin carcinogenesis [70,71], while mice expressing low levels of caNRF2 in keratinocytes showed increased tumor incidence and multiplicity in a genetic model of Human Papilloma Virus 8-induced skin cancer, resulting primarily from increased survival of keratinocytes during the early stages of the transformation process [72]. In contrast, these same mice expressing caNRF2 in keratinocytes showed mildly reduced tumor incidence and multiplicity in a chemically-induced model of skin cancer, where NRF2-mediated detoxification of the mutagen and of ROS induced during the treatment overruled the pro-tumorigenic activity of NRF2 [72]. A beneficial aspect of a basal activity of NRF2 in cancer development is supported by experiments performed in mice with NRF2 loss-of-function in keratinocytes. Here, the same chemically-induced skin carcinogenesis protocol lead to significantly greater tumor multiplicity in mice lacking a functional NRF2, suggesting an important role for NRF2 in cancer prevention [39,73]. This speaks to the importance of context, as NRF2 activation in healthy cells will indeed lead to reduced cellular stress, preventing DNA damage and cancer-causing mutations, an action that becomes detrimental, however, once malignant transformation has occurred and once NRF2 becomes hyperactivated. Separate from its classical role in detoxification of ROS, NRF2 can also influence PI3K signaling, and has been shown to activate transcription of the gene coding for mechanistic Target of Rapamycin (mTOR), a common promoter of tumor growth [74]. Interestingly, mTOR signaling may also have important implications for wound healing [75–77], however the role of NRF2-mediated mTOR activation in this context remains to be determined. The pro-tumorigenic actions of NRF2 can also be extended beyond the cancer cells. 5. Consequences of NRF2 Activation during Wound Healing This stands in contrast to NRF2 activation in myeloid cells in other organs, where genetic deletion of KEAP1 resulted in protective effects in mouse models of sepsis and ischemia/reperfusion injury in the liver [65,66]. Nevertheless, activation of NRF2 in the wound tissue seems to predominantly affect non-immune cells. Taken together, the bulk of the evidence supports activation of NRF2 as a promising strategy to promote wound repair, particularly in situations where healing is negatively affected by enhanced ROS levels (Figure 2). 6. Cancer and the Dark Side of NRF2 Mice expressing caNRF2 in fibroblasts have been shown to express a cancer-associated fibroblast (CAF) gene expression signature, capable of promoting tumor growth in vivo in a xenograft model of squamous cell carcinoma (SCC) [43]. Here, SCC cells were co-injected with caNRF2-expressing fibroblasts into the skin of immunocompromised mice. The activated NRF2 induced a CAF phenotype in these cells and led to the SCC cells forming significantly larger tumors compared to those co-injected with control fibroblasts [43]. This suggests that in addition to promoting cancer cell survival, NRF2 activation in other cell types (e.g., CAFs or others) may have additional impacts on cancer development, and that NRF2 activation can have multiple consequences beyond cytoprotection. 7. Summary and Future Perspectives The last three decades have seen an explosion of interest in NRF2 and its antioxidant role, cementing its importance in maintaining the cellular redox status. During this time, many researchers 9 of 13 Int. J. Mol. Sci. 2019, 20, 3856 have investigated the use of NRF2 activating compounds as a means of cancer prevention and for preventing, or even treating, chronic inflammatory and degenerative diseases [26–28]. However, the antioxidant activity also results in survival of cancer cells under stress conditions and, together with NRF2’s important function in drug detoxification, makes them chemo- and radioresistant [27]. Furthermore, recent advances using genetic animal models have uncovered additional and unexpected consequences of NRF2 activation beyond cytoprotection. In the skin, this included promotion of keratinocyte stem cell proliferation and of fibroblast senescence, impairment of epidermal barrier function, induction of sebaceous gland hyperplasia, and deposition of an abnormal ECM [43,47]. Interestingly, most of these activities are controlled by cell type-specific NRF2 target genes that are not conventional NRF2 targets under homeostatic conditions. In addition to the promising effects on wound healing observed in mice, many of these findings may be translated to humans (Figure 2). NRF2 and its target genes were shown to be activated in the hyperthickened epidermis of human diabetic ulcers, likely as a consequence of elevated ROS levels and reflective of the severe oxidative stress that occurs in these wounds [45]. This may well protect keratinocytes from oxidative stress to a certain extent and this protection may be further promoted by application of NRF2 activating compounds. Indeed, and as mentioned above, human keratinocytes (HaCaT cell line) are stimulated to proliferate when treated with NRF2 activators under hyperglycaemic conditions, similar to observations in diabetic mice treated with these same compounds [45]. In the future it will be important to determine if NRF2 is also activated in fibroblasts of chronic human wounds, which could contribute to the fibroblast senescence that is frequently seen in skin ulcers [78]. Indeed, human fibroblasts treated with NRF2 activating compounds, or with CRISPR/Cas-mediated deletion of KEAP1, also undergo senescence at an accelerated rate compared to untreated cells [43]. However, it remains to be determined if these cells are still able to produce a healing promoting SASP in chronic wounds/ulcers as seen in acute mouse wounds [43]. 7. Summary and Future Perspectives For other effects of NRF2 activation in mouse wounds, such as expansion of stem cells within hair follicles [47], the impact on human wounds is unclear, as human skin typically contains far fewer hair follicles than mouse skin. As such, these effects may be more relevant to specific areas of the skin with a higher hair follicle density. Together, these findings demonstrate the multifaceted actions of NRF2 during tissue repair, and have helped uncover important mechanisms that may benefit humans suffering from chronic wounds. However, it is also evident from multiple studies that pro-tumorigenic actions and other potentially detrimental activities should remain an important consideration prior to employing NRF2 activating compounds to wounds in the clinic. Therefore, application of such compounds should be limited to short treatment periods and restricted to patients in which malignancy at the wound site is excluded. Future work aimed at unravelling beneficial vs. deleterious actions of NRF2 and identification of the relevant target genes and their regulation will be of particular importance. A better understanding of these matters will potentially lead to the development of more potent and safer NRF2 activators that may reliably be used to promote wound healing in patients. Funding: Research on NRF2 in our laboratory was/is supported by grants from the Swiss National Science Foundation (grant 31003A_169204 to S.W.), the Wilhelm-Sander Stiftung (grant No. 2-70941-18 to S.W.) and a Banting postdoctoral fellowship (to P.H.). Conflicts of Interest: The authors declare no conflict of interest. 1. Gurtner, G.C.; Werner, S.; Barrandon, Y.; Longaker, M.T. Wound repair and regeneration. Nature 2008, 453, 314–321. [CrossRef] [PubMed] 2. Eming, S.A.; Martin, P.; Tomic-Canic, M. Wound repair and regeneration: Mechanisms, signaling, and translation. Sci. Transl. Med. 2014, 6, 265–266. [CrossRef] [PubMed] 3. Martin, P.; Leibovich, S.J. Inflammatory cells during wound repair: The good, the bad and the ugly. Trends Cell Biol. 2005, 15, 599–607. [CrossRef] [PubMed] References 1. Gurtner, G.C.; Werner, S.; Barrandon, Y.; Longaker, M.T. Wound repair and regeneration. Nature 2008, 453, 314–321. [CrossRef] [PubMed] 3. Martin, P.; Leibovich, S.J. Inflammatory cells during wound repair: The good, the bad and the ugly. Trends Cell Biol. 2005, 15, 599–607. [CrossRef] [PubMed] 10 of 13 Int. J. Mol. Sci. 2019, 20, 3856 4. Eming, S.A.; Krieg, T.; Davidson, J.M. Inflammation in wound repair: Molecular and cellular mechanisms. J. Investig. Dermatol. 2007, 127, 514–525. [CrossRef] [PubMed] 5. Park, S.; Gonzalez, D.G.; Guirao, B.; Boucher, J.D.; Cockburn, K.; Marsh, E.D.; Mesa, K.R.; Brown, S.; Rompolas, P.; Haberman, A.M.; et al. Tissue-scale coordination of cellular behaviour promotes epidermal wound repair in live mice. Nat. Cell Biol. 2017, 19, 155–163. [CrossRef] [PubMed] p 6. Hinz, B. The role of myofibroblasts in wound healing. Curr. Res. Transl. Med. 2016, 64, 171–177. [CrossRef] 6. Hinz, B. The role of myofibroblasts in wound healing. Curr. Res. Transl. Med. 2016, 64, 171–177. [CrossRef] 7. Opalenik, S.R.; Davidson, J.M. Fibroblast differentiation of bone marrow-derived cells during wound repair. FASEB J. 2005, 19, 1561–1563. [CrossRef] y g 7. Opalenik, S.R.; Davidson, J.M. Fibroblast differentiation of bone marrow-derived cells during wound repair. FASEB J. 2005, 19, 1561–1563. [CrossRef] 8. Guerrero-Juarez, C.F.; Dedhia, P.H.; Jin, S.; Ruiz-Vega, R.; Ma, D.; Liu, Y.; Yamaga, K.; Shestova, O.; Gay, D.L.; Yang, Z.; et al. Single-cell analysis reveals fibroblast heterogeneity and myeloid-derived adipocyte progenitors in murine skin wounds. Nat. Commun. 2019, 10, 650. [CrossRef] 9. Shook, B.A.; Wasko, R.R.; Rivera-Gonzalez, G.C.; Salazar-Gatzimas, E.; Lopez-Giraldez, F.; Dash, B.C.; Munoz-Rojas, A.R.; Aultman, K.D.; Zwick, R.K.; Lei, V.; et al. Myofibroblast proliferation and heterogeneity are supported by macrophages during skin repair. Science 2018, 362. [CrossRef] 10. Martin, P. Wound healing–aiming for perfect skin regeneration. Science 1997, 276, 75–81. [CrossRef 11. Grose, R.; Werner, S. Wound healing studies in transgenic and knockout mice. A review. Methods Mol. Med. 2003, 78, 191–216. [CrossRef] 12. Sen, C.K.; Gordillo, G.M.; Roy, S.; Kirsner, R.; Lambert, L.; Hunt, T.K.; Gottrup, F.; Gurtner, G.C.; Longaker, M.T. Human skin wounds: A major and snowballing threat to public health and the economy. Wound Repair Regen. 2009, 17, 763–771. [CrossRef] 13. Darwin, E.; Tomic-Canic, M. Healing Chronic Wounds: Current Challenges and Potential Solutions. Curr. Dermatol. Rep. 2018, 7, 296–302. [CrossRef] p 14. Berman, B.; Maderal, A.; Raphael, B. Keloids and Hypertrophic Scars: Pathophysiology, Classification, and Treatment. Dermatol. Surg. 2017, 43 (Suppl. 1), S3–S18. [CrossRef] 15. References [CrossRef] 28. Cuadrado, A.; Rojo, A.I.; Wells, G.; Hayes, J.D.; Cousin, S.P.; Rumsey, W.L.; Attucks, O.C.; Franklin, S.; Levonen, A.L.; Kensler, T.W.; et al. Therapeutic targeting of the NRF2 and KEAP1 partnership in chronic diseases. Nat. Rev. Drug Discov. 2019, 18, 295–317. [CrossRef] g 29. Niethammer, P. Wound redox gradients revisited. Semin. Cell Dev. Biol. 2018, 80, 13–16. [CrossRef] 30. Braun, S.; Hanselmann, C.; Gassmann, M.G.; auf dem Keller, U.; Born-Berclaz, C.; Chan, K.; Kan, Y.W.; Werner, S. Nrf2 Transcription Factor, a Novel Target of Keratinocyte Growth Factor Action Which Regulates Gene Expression and Inflammation in the Healing Skin Wound. Mol. Cell. Biol. 2002, 22, 5492–5505. [CrossRef] 31. Eichenfield, D.Z.; Troutman, T.D.; Link, V.M.; Lam, M.T.; Cho, H.; Gosselin, D.; Spann, N.J.; Lesch, H.P.; Tao, J.; Muto, J.; et al. Tissue damage drives co-localization of NF-kappaB, Smad3, and Nrf2 to direct Rev-erb sensitive wound repair in mouse macrophages. Elife 2016, 5. [CrossRef] 32. Rabbani, P.S.; Ellison, T.; Waqas, B.; Sultan, D.; Abdou, S.; David, J.A.; Cohen, J.M.; Gomez-Viso, A.; Lam, G.; Kim, C.; et al. Targeted Nrf2 activation therapy with RTA 408 enhances regenerative capacity of diabetic wounds. Diabetes Res. Clin. Pract. 2018, 139, 11–23. [CrossRef] 33. Hozzein, W.N.; Badr, G.; Badr, B.M.; Allam, A.; Ghamdi, A.A.; Al-Wadaan, M.A.; Al-Waili, N.S. Bee venom improves diabetic wound healing by protecting functional macrophages from apoptosis and enhancing Nrf2, Ang-1 and Tie-2 signaling. Mol. Immunol. 2018, 103, 322–335. [CrossRef] 34. Schanuel, F.S.; Saguie, B.O.; Monte-Alto-Costa, A. Olive oil promotes wound healing of mice pressure injuries through NOS-2 and Nrf2. Appl. Physiol. Nutr. Metab. 2019. [CrossRef] 35. Weller, R.; Finnen, M.J. The effects of topical treatment with acidified nitrite on wound healing in normal and diabetic mice. Nitric Oxide 2006, 15, 395–399. [CrossRef] 36. Masters, K.S.; Leibovich, S.J.; Belem, P.; West, J.L.; Poole-Warren, L.A. Effects of nitric oxide releasing poly (vinyl alcohol) hydrogel dressings on dermal wound healing in diabetic mice. Wound Repair Regen. 2002, 10, 286–294. [CrossRef] 37. Edmonds, M.E.; Bodansky, H.J.; Boulton, A.J.M.; Chadwick, P.J.; Dang, C.N.; D’Costa, R.; Johnston, A.; Kennon, B.; Leese, G.; Rajbhandari, S.M.; et al. Multicenter, randomized controlled, observer-blinded study of a nitric oxide generating treatment in foot ulcers of patients with diabetes-ProNOx1 study. Wound Repair Regen. 2018, 26, 228–237. [CrossRef] 38. Senger, D.R.; Cao, S. Diabetic Wound Healing and Activation of Nrf2 by Herbal Medicine. J. Nat. Sci. 2016, 2, e247. 39. References Trace, A.P.; Enos, C.W.; Mantel, A.; Harvey, V.M. Keloids and Hypertrophic Scars: A Spectrum of Clinical Challenges. Am. J. Clin. Dermatol. 2016, 17, 201–223. [CrossRef] 16. Schafer, M.; Werner, S. Oxidative stress in normal and impaired wound repair. Pharmacol. Res. 2008, 58, 165–171. [CrossRef] 17. Haertel, E.; Werner, S.; Schafer, M. Transcriptional regulation of wound inflammation. Semin. Immunol. 2014, 26, 321–328. [CrossRef] 18. Sykiotis, G.P.; Bohmann, D. Stress-activated cap’n’collar transcription factors in aging and human disease. Sci. Signal. 2010, 3, re3. [CrossRef] 19. Kansanen, E.; Kuosmanen, S.M.; Leinonen, H.; Levonen, A.L. The Keap1-Nrf2 pathway: Mechanisms of activation and dysregulation in cancer. Redox. Biol. 2013, 1, 45–49. [CrossRef] 20. Taguchi, K.; Motohashi, H.; Yamamoto, M. Molecular mechanisms of the Keap1-Nrf2 pathway in stress response and cancer evolution. Genes Cells 2011, 16, 123–140. [CrossRef] 21. Suzuki, T.; Yamamoto, M. Stress-sensing mechanisms and th during cellular stress. J. Biol. Chem. 2017. [CrossRef] 21. Suzuki, T.; Yamamoto, M. Stress-sensing mechanisms and the physiological roles of the Keap1-Nrf2 system during cellular stress. J. Biol. Chem. 2017. [CrossRef] 22. Malhotra, D.; Portales-Casamar, E.; Singh, A.; Srivastava, S.; Arenillas, D.; Happel, C.; Shyr, C.; Wakabayashi, N.; Kensler, T.W.; Wasserman, W.W.; et al. Global mapping of binding sites for Nrf2 identifies novel targets in cell survival response through ChIP-Seq profiling and network analysis. Nucleic Acids Res. 2010, 38, 5718–5734. [CrossRef] 23. Chorley, B.N.; Campbell, M.R.; Wang, X.; Karaca, M.; Sambandan, D.; Bangura, F.; Xue, P.; Pi, J.; Kleeberger, S.R.; Bell, D.A. Identification of novel NRF2-regulated genes by ChIP-Seq: Influence on retinoid X receptor alpha. Nucleic Acids Res. 2012, 40, 7416–7429. [CrossRef] 24. Nault, R.; Doskey, C.M.; Fader, K.A.; Rockwell, C.E.; Zacharewski, T. Comparison of Hepatic NRF2 and Aryl Hydrocarbon Receptor Binding in 2,3,7,8-Tetrachlorodibenzo-p-dioxin-Treated Mice Demonstrates NRF2-Independent PKM2 Induction. Mol. Pharmacol. 2018, 94, 876–884. [CrossRef] 25. Kobayashi, E.H.; Suzuki, T.; Funayama, R.; Nagashima, T.; Hayashi, M.; Sekine, H.; Tanaka, N.; Moriguchi, T.; Motohashi, H.; Nakayama, K.; et al. Nrf2 suppresses macrophage inflammatory response by blocking proinflammatory cytokine transcription. Nat. Commun. 2016, 7, 11624. [CrossRef] 26. Liby, K.T.; Sporn, M.B. Synthetic oleanane triterpenoids: Multifunctional drugs with a broad range of applications for prevention and treatment of chronic disease. Pharmacol. Rev. 2012, 64, 972–1003. [CrossRef] Int. J. Mol. Sci. 2019, 20, 3856 11 of 13 11 of 13 27. Sporn, M.B.; Liby, K.T. NRF2 and cancer: The good, the bad and the importance of context. Nat. Rev. Cancer 2012, 12, 564–571. References NRF2 activation by antioxidant antidiabetic agents accelerates tumor metastasis. Sci. Transl. Med. 2016, 8, 334ra351. [CrossRef] 49. Long, M.; Cai, L.; Li, W.; Zhang, L.; Guo, S.; Zhang, R.; Zheng, Y.; Liu, X.; Wang, M.; Zhou, X.; et al. DPP-4 Inhibitors Improve Diabetic Wound Healing via Direct and Indirect Promotion of Epithelial-Mesenchymal Transition and Reduction of Scarring. Diabetes 2018, 67, 518–531. [CrossRef] 50. Li, X.; Xie, X.; Lian, W.; Shi, R.; Han, S.; Zhang, H.; Lu, L.; Li, M. Exosomes from adipose-derived stem cells overexpressing Nrf2 accelerate cutaneous wound healing by promoting vascularization in a diabetic foot ulcer rat model. Exp. Mol. Med. 2018, 50, 29. [CrossRef] 51. Hosur, V.; Burzenski, L.M.; Stearns, T.M.; Farley, M.L.; Sundberg, J.P.; Wiles, M.V.; Shultz, L.D. Early induction of NRF2 antioxidant pathway by RHBDF2 mediates rapid cutaneous wound healing. Exp. Mol. Pathol. 2017, 102, 337–346. [CrossRef] 52. Wakabayashi, N.; Itoh, K.; Wakabayashi, J.; Motohashi, H.; Noda, S.; Takahashi, S.; Imakado, S.; Kotsuji, T.; Otsuka, F.; Roop, D.R.; et al. Keap1-null mutation leads to postnatal lethality due to constitutive Nrf2 activation. Nat. Genet. 2003, 35, 238–245. [CrossRef] 53. Soares, M.A.; Cohen, O.D.; Low, Y.C.; Sartor, R.A.; Ellison, T.; Anil, U.; Anzai, L.; Chang, J.B.; Saadeh, P.B.; Rabbani, P.S.; et al. Restoration of Nrf2 Signaling Normalizes the Regenerative Niche. Diabetes 2016, 65, 633–646. [CrossRef] 54. Rabbani, P.S.; Zhou, A.; Borab, Z.M.; Frezzo, J.A.; Srivastava, N.; More, H.T.; Rifkin, W.J.; David, J.A.; Berens, S.J.; Chen, R.; et al. Novel lipoproteoplex delivers Keap1 siRNA based gene therapy to accelerate diabetic wound healing. Biomaterials 2017, 132, 1–15. [CrossRef] 55. Lee, D.F.; Kuo, H.P.; Liu, M.; Chou, C.K.; Xia, W.; Du, Y.; Shen, J.; Chen, C.T.; Huo, L.; Hsu, M.C.; et al. KEAP1 E3 ligase-mediated downregulation of NF-kappaB signaling by targeting IKKbeta. Mol. Cell 2009, 36, 131–140. [CrossRef] 56. Mulvaney, K.M.; Matson, J.P.; Siesser, P.F.; Tamir, T.Y.; Goldfarb, D.; Jacobs, T.M.; Cloer, E.W.; Harrison, J.S.; Vaziri, C.; Cook, J.G.; et al. Identification and Characterization of MCM3 as a Kelch-like ECH-associated Protein 1 (KEAP1) Substrate. J. Biol. Chem. 2016, 291, 23719–23733. [CrossRef] 57. Orthwein, A.; Noordermeer, S.M.; Wilson, M.D.; Landry, S.; Enchev, R.I.; Sherker, A.; Munro, M.; Pinder, J.; Salsman, J.; Dellaire, G.; et al. A mechanism for the suppression of homologous recombination in G1 cells. Nature 2015, 528, 422–426. [CrossRef] 58. Schafer, M.; Dutsch, S.; auf dem Keller, U.; Navid, F.; Schwarz, A.; Johnson, D.A.; Johnson, J.A.; Werner, S. References Auf dem Keller, U.; Huber, M.; Beyer, T.A.; Kumin, A.; Siemes, C.; Braun, S.; Bugnon, P.; Mitropoulos, V.; Johnson, D.A.; Johnson, J.A.; et al. Nrf transcription factors in keratinocytes are essential for skin tumor prevention but not for wound healing. Mol. Cell. Biol. 2006, 26, 3773–3784. [CrossRef] 40. Telorack, M.; Meyer, M.; Ingold, I.; Conrad, M.; Bloch, W.; Werner, S.A. Glutathione-Nrf2-Thioredoxin Cross-Talk Ensures Keratinocyte Survival and Efficient Wound Repair. PLoS Genet. 2016, 12, e1005800. [CrossRef] 41. Siegenthaler, B.; Defila, C.; Muzumdar, S.; Beer, H.D.; Meyer, M.; Tanner, S.; Bloch, W.; Blank, V.; Schafer, M.; Werner, S. Nrf3 promotes UV-induced keratinocyte apoptosis through suppression of cell adhesion. Cell Death Differ. 2018, 25, 1749–1765. [CrossRef] 42. Steiling, H.; Munz, B.; Werner, S.; Brauchle, M. Different types of ROS-scavenging enzymes are expressed during cutaneous wound repair. Exp. Cell Res. 1999, 247, 484–494. [CrossRef] 43. Hiebert, P.; Wietecha, M.S.; Cangkrama, M.; Haertel, E.; Mavrogonatou, E.; Stumpe, M.; Steenbock, H.; Grossi, S.; Beer, H.D.; Angel, P.; et al. Nrf2-Mediated Fibroblast Reprogramming Drives Cellular Senescence by Targeting the Matrisome. Dev. Cell 2018, 46, 145–161. [CrossRef] 44. Joshi, N.; Werner, S. Nrf2 is highly expressed in neutrophils, but myeloid cell-derived Nrf2 is dispensable for wound healing in mice. PLoS ONE 2017, 12, e0187162. [CrossRef] g 45. Long, M.; Rojo de la Vega, M.; Wen, Q.; Bharara, M.; Jiang, T.; Zhang, R.; Zhou, S.; Wong, P.K.; Wondrak, G.T.; Zh H t l A E ti l R l f NRF2 i Di b ti W d H li Di b t 2016 65 780 793 [C R f] 45. Long, M.; Rojo de la Vega, M.; Wen, Q.; Bharara, M.; Jiang, T.; Zhang, R.; Zhou, S.; Wong, P.K.; Wondrak, G.T.; Zheng, H.; et al. An Essential Role of NRF2 in Diabetic Wound Healing. Diabetes 2016, 65, 780–793. [CrossRef] 46. Rabbani, P.S.; Soares, M.A.; Hameedi, S.G.; Kadle, R.L.; Mubasher, A.; Kowzun, M.; Ceradini, D.J. Dysregulation of Nrf2/Keap1 Redox Pathway in Diabetes Affects Multipotency of Stromal Cells. Diabetes 2019, 68, 141–155. [CrossRef] 12 of 13 Int. J. Mol. Sci. 2019, 20, 3856 12 of 13 47. Muzumdar, S.; Hiebert, H.; Haertel, E.; Ben-Yehuda Greenwald, M.; Bloch, W.; Werner, S.; Schafer, M. Nrf2-Mediated Expansion of Pilosebaceous Cells Accelerates Cutaneous Wound Healing. Am. J. Pathol. 2019, 189, 568–579. [CrossRef] 48. Wang, H.; Liu, X.; Long, M.; Huang, Y.; Zhang, L.; Zhang, R.; Zheng, Y.; Liao, X.; Wang, Y.; Liao, Q.; et al. References Rojo de la Vega, M.; Chapman, E.; Zhang, D.D. NRF2 and the Hallmarks of Cancer. Cancer Cell 2018, 34, 21–43. [CrossRef] 70. Knatko, E.V.; Ibbotson, S.H.; Zhang, Y.; Higgins, M.; Fahey, J.W.; Talalay, P.; Dawe, R.S.; Ferguson, J.; Huang, J.T.; Clarke, R.; et al. Nrf2 Activation Protects against Solar-Simulated Ultraviolet Radiation in Mice and Humans. Cancer Prev. Res. 2015, 8, 475–486. [CrossRef] 71. Knatko, E.V.; Higgins, M.; Fahey, J.W.; Dinkova-Kostova, A.T. Loss of Nrf2 abrogates the protective effect of Keap1 downregulation in a preclinical model of cutaneous squamous cell carcinoma. Sci. Rep. 2016, 6, 25804. [CrossRef] 72. Rolfs, F.; Huber, M.; Kuehne, A.; Kramer, S.; Haertel, E.; Muzumdar, S.; Wagner, J.; Tanner, Y.; Bohm, F.; Smola, S.; et al. Nrf2 Activation Promotes Keratinocyte Survival during Early Skin Carcinogenesis via Metabolic Alterations. Cancer Res. 2015, 75, 4817–4829. [CrossRef] 73. Xu, C.; Huang, M.T.; Shen, G.; Yuan, X.; Lin, W.; Khor, T.O.; Conney, A.H.; Kong, A.N. Inhibition of 7,12-dimethylbenz(a)anthracene-induced skin tumorigenesis in C57BL/6 mice by sulforaphane is mediated by nuclear factor E2-related factor 2. Cancer Res. 2006, 66, 8293–8296. [CrossRef] 74. Bendavit, G.; Aboulkassim, T.; Hilmi, K.; Shah, S.; Batist, G. Nrf2 Transcription Factor Can Directly Regulate mTOR: Linking cytoprotective gene expression to a major metabolic regulator that generates redox activity. J. Biol. Chem. 2016, 291, 25476–25488. [CrossRef] 75. Squarize, C.H.; Castilho, R.M.; Bugge, T.H.; Gutkind, J.S. Accelerated wound healing by mTOR activation in genetically defined mouse models. PLoS ONE 2010, 5, e10643. [CrossRef] 76. Feldmeyer, L.; Hofbauer, G.F.; Boni, T.; French, L.E.; Hafner, J. Mammalian target of rapamycin (mTOR) inhibitors slow skin carcinogenesis, but impair wound healing. Br. J. Dermatol. 2012, 166, 422–424. [CrossRef] 77. Huang, H.; Cui, W.; Qiu, W.; Zhu, M.; Zhao, R.; Zeng, D.; Dong, C.; Wang, X.; Guo, W.; Xing, W.; et al. 76. Feldmeyer, L.; Hofbauer, G.F.; Boni, T.; French, L.E.; Hafner, J. Mammalian target of rapamycin (mTOR) inhibitors slow skin carcinogenesis, but impair wound healing. Br. J. Dermatol. 2012, 166, 422–424. [CrossRef] 77. Huang, H.; Cui, W.; Qiu, W.; Zhu, M.; Zhao, R.; Zeng, D.; Dong, C.; Wang, X.; Guo, W.; Xing, W.; et al. Impaired wound healing results from the dysfunction of the Akt/mTOR pathway in diabetic rats. J. Dermatol. Sci. 2015, 79, 241–251. [CrossRef] 78. Sindrilaru, A.; Peters, T.; Wieschalka, S.; Baican, C.; Baican, A.; Peter, H.; Hainzl, A.; Schatz, S.; Qi, Y.; Schlecht, A.; et al. References Nrf2 establishes a glutathione-mediated gradient of UVB cytoprotection in the epidermis. Genes Dev. 2010, 24, 1045–1058. [CrossRef] 59. Schafer, M.; Farwanah, H.; Willrodt, A.H.; Huebner, A.J.; Sandhoff, K.; Roop, D.; Hohl, D.; Bloch, W.; Werner, S. Nrf2 links epidermal barrier function with antioxidant defense. EMBO Mol. Med. 2012, 4, 364–379. [CrossRef] 60. Schafer, M.; Willrodt, A.H.; Kurinna, S.; Link, A.S.; Farwanah, H.; Geusau, A.; Gruber, F.; Sorg, O.; Huebner, A.J.; Roop, D.R.; et al. Activation of Nrf2 in keratinocytes causes chloracne (MADISH)-like skin disease in mice. EMBO Mol. Med. 2014, 6, 442–457. [CrossRef] 61. Ito, M.; Liu, Y.; Yang, Z.; Nguyen, J.; Liang, F.; Morris, R.J.; Cotsarelis, G. Stem cells in the hair follicle bulge contribute to wound repair but not to homeostasis of the epidermis. Nat. Med. 2005, 11, 1351–1354. [CrossRef] 62. Dahlhoff, M.; Frances, D.; Kloepper, J.E.; Paus, R.; Schafer, M.; Niemann, C.; Schneider, M.R. Overexpression of epigen during embryonic development induces reversible, epidermal growth factor receptor-dependent sebaceous gland hyperplasia. Mol. Cell. Biol. 2014, 34, 3086–3095. [CrossRef] 63. Werner, S.; Grose, R. Regulation of wound healing by growth factors and cytokines. Physiol. Rev. 2003, 83, 835–870. [CrossRef] 64. Demaria, M.; Ohtani, N.; Youssef, S.A.; Rodier, F.; Toussaint, W.; Mitchell, J.R.; Laberge, R.-M.; Vijg, J.; Van Steeg, H.; Dollé, M.E.; et al. An Essential Role for Senescent Cells in Optimal Wound Healing through Secretion of PDGF-AA. Dev. Cell 2014, 31, 722–733. [CrossRef] 13 of 13 Int. J. Mol. Sci. 2019, 20, 3856 65. Lee, L.Y.; Harberg, C.; Matkowskyj, K.A.; Cook, S.; Roenneburg, D.; Werner, S.; Johnson, D.A.; Johnson, J.A.; Foley, D.P. Cell-specific overactivation of nuclear erythroid 2 p45-related factor 2-mediated gene expression in myeloid cells decreases hepatic ischemia/reperfusion injury. Liver Transpl. 2016, 22, 1115–1128. [CrossRef] 66. Kong, X.; Thimmulappa, R.; Craciun, F.; Harvey, C.; Singh, A.; Kombairaju, P.; Reddy, S.P.; Remick, D.; Biswal, S. Enhancing Nrf2 pathway by disruption of Keap1 in myeloid leukocytes protects against sepsis. Am. J. Respir. Crit. Care Med. 2011, 184, 928–938. [CrossRef] 67. Schafer, M.; Werner, S. Cancer as an overhealing wound: An old hypothesis revisited. Nat. Rev. Mol. Cell Biol. 2008, 9, 628–638. [CrossRef] 68. Wang, X.J.; Sun, Z.; Villeneuve, N.F.; Zhang, S.; Zhao, F.; Li, Y.; Chen, W.; Yi, X.; Zheng, W.; Wondrak, G.T.; et al. Nrf2 enhances resistance of cancer cells to chemotherapeutic drugs, the dark side of Nrf2. Carcinogenesis 2008, 29, 1235–1243. [CrossRef] 69. References An unrestrained proinflammatory M1 macrophage population induced by iron impairs wound healing in humans and mice. J. Clin. Investig. 2011, 121, 985–997. [CrossRef] © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
https://openalex.org/W4295786918
https://www.researchsquare.com/article/rs-2053542/latest.pdf
English
null
Synthesis and Biological Evaluation of Novel Uracil Derivatives as Thymidylate Synthase Inhibitors
Research Square (Research Square)
2,022
cc-by
9,390
Synthesis and Biological Evaluation of Novel Uracil Derivatives as Thymidylate Synthase Inhibitors Manzoor Ahmad Mir  (  drmanzoor@kashmiruniversity.ac.in ) University of Kashmir https://orcid.org/0000-0003-3297-1402 Research Article Keywords: Breast cancer, drug discovery, thymidylate synthase, uracil derivatives, one-pot synthesis, Cell cycle Posted Date: September 14th, 2022 DOI: https://doi.org/10.21203/rs.3.rs-2053542/v1 License:   This work is licensed under a Creative Commons Attribution 4.0 International License.   Read Full License Synthesis and Biological Evaluation of Novel Uracil Derivatives as Thymidylate Synthase Inhibitors Manzoor Ahmad Mir  (  drmanzoor@kashmiruniversity.ac.in ) University of Kashmir https://orcid.org/0000-0003-3297-1402 Research Article Keywords: Breast cancer, drug discovery, thymidylate synthase, uracil derivatives, one-pot synthesis, Cell cycle Posted Date: September 14th, 2022 DOI: https://doi.org/10.21203/rs.3.rs-2053542/v1 License:   This work is licensed under a Creative Commons Attribution 4.0 International License. Read Full License Abstract To synthesize novel uracil derivatives targeting thymidylate synthase for the treatment of high-grade malignancies such as breast cancer. Results BC patients showed high levels of TYMS, and high expression of TYMS was found associated with poor prognosis. In silico studies indicated that synthesized uracil derivatives have a high affinity for TYMS. Notably, the uracil derivatives dramatically inhibited the proliferation and colonization potential of BC cells in vitro. Background Cell division is driven by nucleic acid metabolism, and thymidylate synthase (TYMS) catalyses a rate- limiting step in nucleotide synthesis. As a result, TYMS has emerged as a critical target in chemotherapy. 5-fluorouracil (5-FU) is currently being used to treat a wide range of cancers, including breast, pancreatic, head and neck, colorectal, ovarian, and gastric cancers. Methods One-pot organic synthesis processes using a single solvent were used for the synthesis of drug analogues of Uracil. Integrated bioinformatics using GEPIA2, UALCAN and KM plotter were utilized to study the expression pattern and prognostic significance of TYMS, the key target gene of 5-fluorouracil in breast cancer patients. Cell viability, cell proliferation, and colony formation assays were used as in-vitro methods to validate the in-silico lead obtained. Objectives The objective of this study was to establish a new methodology for the low-cost, one-pot synthesis of uracil derivatives (UD-1 to UD-5) and to evaluate their therapeutic potential in BC cells. Research Article Keywords: Breast cancer, drug discovery, thymidylate synthase, uracil derivatives, one-pot synthesis, Cell cycle Posted Date: September 14th, 2022 DOI: https://doi.org/10.21203/rs.3.rs-2053542/v1 License:   This work is licensed under a Creative Commons Attribution 4.0 International License. Read Full License Page 1/25 1. Introduction Due to the long-standing anticancer potency of 5-Fluorouracil, uracil have been a top priority for many researchers, notably in the field of drug discovery and synthetic accessibility (23, 31). Uracil derivatives exhibit bactericidal, herbicidal, and insecticidal activity, with antiviral and anticancer activity being particularly notable (33, 14). Their antiviral activity is based on inhibiting a critical stage in the viral replication pathway, which results in robust effectiveness against HIV, hepatitis B and C, and herpes viruses, among others (40, 32). 5-Fluorouracil and 5-Chlorouracil were the first uracil derivatives to exhibit pharmacological activity and approved for use in the treatment of several ailments (43, 3). Recently, scientists have focused increasing attention on uracil derivatives; several of the most clinically significant compounds are illustrated in Figure. S1 (Supplementary Information) (29). Numerous changes to uracil have been made to address toxicity concerns in the synthesis of derivatives with improved pharmacological and pharmacokinetic features (increased bioactivity, selectivity, metabolic stability, absorption, and decreased toxicity) (29, 23, 14). The development of novel uracil derivatives and fused uracil derivatives as bioactive agents is dependent on substituent changes at various places on the pyrimidine ring. One-pot organic synthesis processes using a single solvent have sparked considerable attention among researchers due to their low cost, environmental friendliness, the potential for high yield products, and insights into green chemistry (8). Green chemistry techniques are crucial because they minimize waste, byproducts, energy use, and expense (8). The capacity to execute multistep reactions in a single pot could significantly increase their efficiency, both economically and environmentally. Due to its immense range of applications in synthetic chemistry, the synthesis of novel heterocyclic molecules has always been a subject of significant interest. Because heterocyclic compounds are abundant in nature and are required for life to exist. Among them, heterocyclic compounds containing the uracil moiety are of interest because they exhibit a variety of pharmacological and biological properties. Uracil and its derivatives are critical starting materials for the synthesis of a wide variety of chemical compounds, pharmaceutical drugs, and intermediates (7, 15, 16). For example, Tegafur-uracil, a pyrimidine derivative is a chemotherapeutic agent used in cancer treatment, most commonly colon cancer (1). Thus, developing novel uracil derivatives is a critical and essential endeavor in organic chemistry. In addition to the aspects discussed in the literature, attempts were made to establish a new methodology for the low-cost, one-pot synthesis of uracil derivatives. Conclusion In conclusion, our study identified novel uracil derivatives as promising therapeutic options for breast cancer patients expressing the augmented levels of TYMS. Page 2/25 Page 2/25 2. Results And Discussion 2..1 Chemistry 1. Introduction Globally, breast cancer (BC) is currently the most prevalent malignancy among women and the second leading cause of cancer-related death (36, 35, 21). Current treatment methods include breast ectomy, radiation therapy (RT), chemotherapy therapy (CT), hormone therapy (HT), and immunological therapy (11, 42, 25, 22, 17). Treatments are decided by each patient's clinicopathologic and tumor grade features (25, 28). Despite advances in diagnostics and therapy, BC mortalities are highest owing to metastatic tumors, tumor relapse, and the development of chemoresistance resulting in poor prognosis (20). Thus, there is an urgent need to develop and explore novel therapeutic regimens for BC patients, particularly for triple-negative breast cancer (TNBC) patients, as chemotherapy is the mainstay of therapeutic protocol Page 3/25 Page 3/25 for these patients (18, 19). Due to the high proliferative nature of tumor cells, raw material for the synthesis of macromolecules viz proteins and DNA and vastly required (34). The rate-limiting step in DNA synthesis is catalyzed by thymidylate synthase (TS), which is the only de novo cellular source of dTTP (9). As a result, TYMS has emerged as a critical target in cancer chemotherapy, especially breast cancer (30). 5-fluorouracil (5-FU) targeting TYMS is presently used in the treatment of several malignancies including breast, pancreatic, head, and neck, colorectal, ovarian, and gastric cancers (37, 44, 26). Despite a favorable initial response to 5-FU, BC patients frequently develop chemoresistance due to the inherent nature of tumor cells to mutate, highlighting an urgent need to investigate new therapeutic options targeting TYMS (45, 24). In the present study, we synthesized novel uracil derivatives and evaluated their anticancer activity using in silico and in vitro approaches. We further explored the expression pattern and prognostic significance of TYMS in BC patients, key target gene of 5-fluorouracil. In silico analysis showed high affinity of uracil derivatives in contrast to 5-FU. Additionally, in vitro studies demonstrated that synthesized derivatives exhibited substantial cytotoxic activity and the potential to impede colonization of breast tumor cells. Taken together, the findings suggest that new uracil analogues may be promising therapeutics for breast cancer in combination with current treatment regimens. Heptyl-4-(1-methyl-3-(4-nitrobenzyl)-2,6-dioxohexahydropyrimidin-4-yl)piperazine-1 carboxylate (UD-3) Yield: 59%, mp; 197–198˚C; White solid powder; 1H-NMR: δ = 0.86–0.88 ( t, 3 H, -CH3), 1.21–1.24 (broad, 10 H, -CH2), 1.45–1.57 (m, 3 H, -CH2), 2.80 (broad, 4H, -CH2), 3.23 (s, 3 H, -N-CH3), 3.47–3.56 (broad, 4 H, - CH2), 3.99–4.03 (t, 2 H, -O-CH2), 5.13 ( s, 2 H, Ar-CH2), 5.33 (s, 1 H, -CH), 7.25–7.34 (d, 2 H, ArH) 8.11– 8.13(d, 2 H, ArH) ppm. Mass: (C24H33N5O6) m/z = 487.24, M + H = 488. 1-(4-Fluorobenzyl)-3-methyl-6-(piperidin-1-yl)dihydropyrimidine-2,4(1H,3H)-dione (UD-4) One-Pot Synthesis of Uracil derivatives (UD-1 to UD-5) One-Pot Synthesis of Uracil derivatives (UD-1 to UD-5) Initially, charged 6-chlorouracil (7.75 g, 0.05 M) and potassium carbonate (9.14 g, 0.06 M) were mixed in 50 mL DMF in 250 mL RBF, followed by halogenated of 1-(bromomethyl) benzene (10 g, 0.05 M), the reaction mixture was stirred for 8 h at RT. Then, with further addition of potassium carbonate (7.31 g, 0.0529 M) and methyl iodide (15.02 g, 0.10 M) the reaction mixture was further stirred overnight at room temperature. After that, the charged piperazine (4.52 g, 0.05 M) or piperidine or 3-aminopiperidine (9.10 g, 0.05 M) was added to the reaction mixture and heated at 80 ˚C for 8 h to get compounds 3, UD-4, and 5 respectively. Finally, the reaction mixture of compound 3 was separately treated with acetone, water, and potassium carbonate with different chloroformates to give UD-1, UD-2, and UD-3. In another reaction, the Moc-L-Valine (9.22g, 0.05 M) was added to the reaction mixture (5) in presence of coupling reagent HATU (40.23 g, 0.10 M) and triethylamine (10.71 g, 0.10M) and stirred the mixture at RT for 25 min. After the completion of the reaction, water was added and the product was extracted in ethyl acetate, the organic layer was dried over sodium sulfate, and the solvent was removed under reduced pressure. The desired product was purified by column chromatography to get the title compound (UD-5). The steps for the synthesis of the uracil derivatives are displayed in Fig. 1 and the chemical structures of the final products are given in Fig. 2. Heptyl-4-(3-(4-fluorobenzyl)-1-methyl-2,6-dioxohexahydropyrimidin-4-yl)piperazine-1-carboxylate (UD-1) Page 4/25 Page 4/25 Yield: 55%, mp; 194–195˚C; White solid powder;1H-NMR: δ = 0.85–0.88 ( t, 3 H, -CH3), 1.27–1.31 (broad, 8 H, -CH2), 1.55–1.63 (m, 2 H, -CH2), 2.80 (broad, 4H, -CH2), 3.32 (s, 3 H, -N-CH3), 3.49–3.63 (broad, 3 H, - CH2), 4.05–4.08 (t, 2 H, -O-CH2), 5.16 ( s, 2 H, Ar-CH2-), 5.33 (s, 1 H, -CH), 7.02–7.07 (t, 1 H, ArH) 7.09– 7.13(m, 2 H, ArH), 7.23–7.28 (m, 1 H, ArH) ppm. Mass: (C24H33FN4O4) m/z = 460.25, M + H = 461.1. One-Pot Synthesis of Uracil derivatives (UD-1 to UD-5) Yield: 55%, mp; 194–195˚C; White solid powder;1H-NMR: δ = 0.85–0.88 ( t, 3 H, -CH3), 1.27–1.31 (broad, 8 H, -CH2), 1.55–1.63 (m, 2 H, -CH2), 2.80 (broad, 4H, -CH2), 3.32 (s, 3 H, -N-CH3), 3.49–3.63 (broad, 3 H, - CH2), 4.05–4.08 (t, 2 H, -O-CH2), 5.16 ( s, 2 H, Ar-CH2-), 5.33 (s, 1 H, -CH), 7.02–7.07 (t, 1 H, ArH) 7.09– 7.13(m, 2 H, ArH), 7.23–7.28 (m, 1 H, ArH) ppm. Mass: (C24H33FN4O4) m/z = 460.25, M + H = 461.1. Octyl-4-(3-(4-fluorobenzyl)-1-methyl-2,6-dioxohexahydropyrimidin-4-yl)piperazine-1-carboxylate (UD2) Yield: 57%, mp; 180–191˚C; White solid powder; 1H-NMR: δ = 0.85–0.88 ( t, 3 H, -CH3), 1.02–1.40 (m, 12 H, -CH2), 1.59–1.80 (t, 3 H, -CH2), 2.82 (broad, 4H, -CH2), 3.31 (s, 3 H, -N-CH3), 3.42–3.52(broad, 4 H, -CH2), 4.05–4.09 (t, 2 H, -O-CH2), 5.08 ( s, 2 H, Ar-CH2-), 5.34 (s, 1 H, -CH), 6.89–6.94 (q, 1 H, ArH) 6.96–6.98 (d, 2 H, ArH), 7.26–7.31(q, 1 H, ArH) ppm. Mass: (C25H35FN4O4) m/z = 474.26, M + H = 475.1. Heptyl-4-(1-methyl-3-(4-nitrobenzyl)-2,6-dioxohexahydropyrimidin-4-yl)piperazine-1 carboxylate (UD-3) 1-(4-Fluorobenzyl)-3-methyl-6-(piperidin-1-yl)dihydropyrimidine-2,4(1H,3H)-dione (UD-4) Yield: 57%, mp; 175–176˚C; White solid powder;1H-NMR: δ = 1.63 (m, 6 H,-CH2), 2.86 (s; 4 H, -CH2), 5.02 (s, 2 H, -CH2), 5.32 (s, 1 H, -CH), 6.98 (t, 2 H, Ar-H), 7.22 (m, 3 H, Ar-H) ppm. 13C NMR δ = 23.77, (-CH2), 25.33 (-CH2), 27.84 (-CH3), 47.22 (-CH2), 52.44 (-CH2), 89.78 (-CH), 115 (Ar-C), 128.95 (Ar-C), 132.17 (Ar-C), 152 (-N-CO-N-), 160.37 (-C-), 163.36 (-N-CO-C-) ppm. Mass (C17H22FN3O2) m/z = 319.17 Methyl-1-1-(3-(2-cyanobenzyl)-1-methyl-2,6-dioxo-1,2,3,6-tetrahydropyrimidin-4-yl)piperidin-3-ylamino)-3- methyl-1-oxobutan-2-ylcarbamate (UD-5) Yield: 57%, mp; 184–185˚C; White solid powder;1H-NMR: δ = 0.71 (dd, 6 H,-CH3), 1.29 (m; 2 H, -CH2), 1.74– 1.79 (m, 3 H, -CH2), 2.3 (m, 1 H, -CH2), 2.46 (s, 3 H, CH2), 2.59 (m, 1 H, -CH2), 2.8 (d, 1 H, -CH2), 3.08 (s, 3 H, - N-CH3), 3.48 (s, 3 H, -O-CH3), 3.71 (t, 2 H, -CH2), 4.92 (q, 2 H, -CH2), 5.25 ( s, 1 H, -CH), 6.97 (m, 3 H, Ar-H), 7.09 (d, 1 H, Ar-H), 7.29 (d, 1 H, Ar-H), 7.95 (d, 1 H, -NH). Mass (C25H32N6O5) m/z = 496.56, M + H =  497.2481. It is highly noted that in the available literature, generally in benzylation and methylation reactions base like sodium hydride in dimethylformamide have been used which is highly dangerous in the context of safety, environment pollutant and it also results in poor yield, impure compounds. In our simple protocol, we used low-cost, ecofriendly, and safe inorganic base potassium carbonate in dimethylformamide solvent in one pot during four steps which is one of the major advantages of our protocol. In addition, we got higher percentage yields of products. Initially, we have synthesized N-substituted uracil analogs in It is highly noted that in the available literature, generally in benzylation and methylation reactions base like sodium hydride in dimethylformamide have been used which is highly dangerous in the context of safety, environment pollutant and it also results in poor yield, impure compounds. In our simple protocol, we used low-cost, ecofriendly, and safe inorganic base potassium carbonate in dimethylformamide solvent in one pot during four steps which is one of the major advantages of our protocol. In addition, we got higher percentage yields of products. Initially, we have synthesized N-substituted uracil analogs in Page 5/25 Page 5/25 high yields by simple N-benzylation of 6-chlorouracil with different halogenated benzyl halides and N- methylation by methyl iodide respectively, under catalyst-free conditions in DMF solvent. 1-(4-Fluorobenzyl)-3-methyl-6-(piperidin-1-yl)dihydropyrimidine-2,4(1H,3H)-dione (UD-4) Then the chlorine atoms of N-substituted uracil derivatives were substituted with piperazine, piperidine, and 3- aminopiperidine, respectively. In the final step, the N-substitution of the piperazine ring was carried out by treating it with different alkyl containing chloroformates in the same pot under similar conditions for the formation of compounds UD-1-UD-4. Simultaneously, under similar conditions in the same solvent amino acid coupling reaction was done in presence of coupling reagent HATU (1-bis(dimethylamino)methylene- 1H-1,2,3-triazolo[4,5-b]pyridinium-3-oxid hexafluorophosphate) for the formation of target compounds UD-5. The whole synthesis has been done in one solvent in one pot that results in the reduction of industrial waste, affluent generation, and overall good yields (55–59%) of final products. A reasonable mechanism for the formation of uracil derivatives is shown in Fig. 3. The reaction conditions were optimized using various solvents, bases. The yields ranged from 55 to 59%. A perusal of these indicates that the DMF and inorganic base was the best one; resulting in higher yield and best conversion. During the optimization of organic and inorganic bases were used. It was observed that during organic bases, the reaction was completed at a faster rate, but less conversion was observed. The percentage of yield was increased while using inorganic bases under DMF solvent. Hence, throughout the reaction, potassium carbonate as base and DMF as solvent were used. The proposed structures of uracil derivatives (UD-1 to UD-5) were well supported by analytical and spectroscopic data. All the derivatives were found as solids, stable to air, had good yields, and quite soluble in ethyl acetate, methanol, ethanol, chloroform, DMSO, DMF. The characteristic signal from the CH3N- group in the 1H NMR spectrum was observed as a singlet at ~ 2.90–3.10 ppm, methine proton of uracil ring CH- was observed at 5.00 -5.35 ppm, benzylic proton -CH at 4.86–5.37 ppm, aromatic protons Ar-H appeared in the range of 7.00–8.10 ppm, piperazine protons resonates at 1.50–3.80 ppm, methyl protons appeared in the range of 2.90–3.40 ppm, and methoxy protons -OCH3 appeared in the range of 3.40–3.75 ppm. The 1H NMR spectra of uracil derivatives (UD-1 to UD-5) are shown in Figure S2-S6 (Supplementary Information). Elemental analyses and ESI-MS spectra illustrated the compositions of synthesized compounds. The mass spectra of UD-1 to UD-5 showed the peaks at m/z values of 460.25, 474.26, 487.24, 319.17 and 496.56 corresponding to UD- 1, UD-2, UD-3, UD-4 and UD-5. Drug-likeness Page 6/25 Oral bioavailability (a measure of drug-likeness) is one of the major parameters for developing bioactive molecules as effective pharmaceutical agents. Parameters like good intestinal absorption, reduced molecular flexibility, low polar surface area, or total hydrogen bond count, are essential factors for the prediction of good oral bioavailability (41). Drug properties like membrane permeability and bioavailability are associated with some basic molecular descriptors: molecular mass, hydrogen bond acceptor and donor count, and log P (partition coefficient) in a molecule (12). These properties were originally used by Lipinski (12) to formulate his well-known “Rule of five”. The rule stands, most molecules with good membrane permeability have molecular mass < 500 Da, number of hydrogen bond acceptors < 10, number of hydrogen bond donors < 5, and log P < 5. This rule is commonly used to Page 6/25 evaluate the suitability of a drug for oral administration. This rule is widely used as a filter for the screening of molecules with drug-like properties. Generally, a compound that fulfills at least three points out of five is said to follow Lipinski’s rule. A poor permeation or absorption is more likely to occur when there are more than 5 H-bond donors and 10 H-bond acceptors. Therefore, all these molecular properties of the mentioned uracil derivatives were calculated using MarvinSketch and are displayed in Table 1, showing all uracil derivatives have molecular masses lower than 500, contain hydrogen bond acceptors <  10 and number of hydrogen bond donors < 5. Moreover, the uracil derivatives have lower log P, molar refractivity, and polar surface areas than the values recommended by Lipinski’s rule. Thus, the synthesized uracil derivatives fully meet all the five criteria of Lipinski’s rule, hence having good oral bioavailability. Table 1 Molecular properties of uracil derivatives show their oral bioavailability and drug-likeness. Derivative Molecular mass/u Log P Hydrogen bond acceptors Hydrogen bond donors Molar refractivity/ (m3 M− 1) Polar surface area/ ˚A2 UD1 462.56 -3.80 4 0 122.75 73.40 UD2 476.5 -4.24 4 0 127.35 73.40 UD3 487.4 -4.04 6 0 133.45 116.54 UD4 319.38 -2.30 3 0 85.27 43.86 UD5 498.5 -1.62 6 2 131.15 135.08 Table 1 erivatives show their oral bioavailability and drug-likeness. 2.2 Molecular Docking Studies Uracil derivatives show a high docking affinity for thymidylate synthase CB-Dock by default predicts five binding cavities and based on experimental information of the binding site of the co-crystallized substrate of thymidylate synthase, we proved that the correct binding site is among the predicted cavities (Fig. 4A). Pyrimidine analog namely 5-Fluorouracil (5-FU) has been approved by FDA for a variety of cancers including gastric adenocarcinoma and breast cancer (13). Metabolite of 5-FU by name fluorodeoxyuridine monophosphate (FdUMP) competes with normal CB-Dock by default predicts five binding cavities and based on experimental information of the binding site of the co-crystallized substrate of thymidylate synthase, we proved that the correct binding site is among the predicted cavities (Fig. 4A). Pyrimidine analog namely 5-Fluorouracil (5-FU) has been approved by FDA for a variety of cancers including gastric adenocarcinoma and breast cancer (13). Metabolite of 5-FU by name fluorodeoxyuridine monophosphate (FdUMP) competes with normal substrate dUMP and thus prevents its binding with thymidylate synthase (13). As it is clear that FdUMP but not 5-FU binds with thymidylate synthase thus we used the former rather than the latter as a positive control in the docking study and compared the binding affinity of six novel molecules with FdUMP. All the newly tested molecules showed higher binding affinity than FdUMP (− 6.7 kcal/mol). However, two molecules namely UD4 and UD5 exhibited the highest inclination towards the predefined site of thymidylate synthase. While UD- showed a binding affinity value of − 8.3 kcal/mol, UD4 showed a binding affinity of − 8.0 kcal/mol (Fig. 4B). The ligand-receptor interaction is more favorable when the binding Page 7/25 Page 7/25 affinity values are more negative. Thus, the binding affinity value is more negative for UD5 and UD4 suggests its more inclination towards thymidylate synthase compared to FdUMP. The interaction profile of the five UDs in the docked state with thymidylate synthase was generated. Expectedly, the two most potent molecules showed relatively more interactions than the third strong binder against thymidylate synthase. UD4 formed four hydrophobic interactions (ILE 108, TRP 109, LEU 192, PHE 225) and two hydrogen bonds with amino acid residues GLN 214 and ASP 218 of binding groove. UD5 which was predicted by flexible docking as the most powerful molecule against the binding groove of thymidylate synthase also showed an extensive interaction profile. It displayed three hydrophobic interactions, two with LEU 192 and one with ASP 218. TYMS is upregulated in BC Patients. Using the TCGA BrCa dataset of the Gepia2 online portal, the expression of TYMS was analyzed, and it was revealed that TYMS is highly overexpressed in breast cancer patients in contrast to normal women. TYMS was found to be upregulated with a log2 FC of 2.223, (p-value of 1.58e-179) Fig. 5A. Also, we analyzed the TYMS expression within BC subclasses and women with different ethnicities using the UALCAN portal and it was found that among different subclasses of BC, TYMS was highly upregulated in TNBC and women with African-American ethnicity Fig. 5B, C, and D. High expression of TYMS affects the prognosis of BC patients. The prognostic significance of the TYMS expression was analyzed using the online open database, the Kaplan-Meier Plotter. The KM plots demonstrated that BC patients with high expression of TYMS had worse relapse-free survival and overall survival (p < 0.05) Fig. 5E, F. Also, BC patients with reduced levels of TYMS had better relapse-free survival and overall survival. These results indicate that targeting TYMS may prolong the survival of breast cancer patients, in particular the TNBC patients who solely rely on chemotherapeutic regimens. 2.2 Molecular Docking Studies Furthermore, three hydrogen bonds were seen between ligand 5 and three residues (ARG 50, ASP 218, and TYR 258) of thymidylate synthase (Fig. 4A). Our results align well with the study where enhanced ligand efficiency has been attributed to hydrophobic interactions (8). All the novel molecules and the known binder FdUMP bind at the experimentally certified binding site of dUMP, the substrate of thymidylate synthase, which further authenticates the reliability of our findings Figure S7 (Supplementary Information). 2.3. Expression pattern & prognostic significance of TYMS in BC patients 2.3. Expression pattern & prognostic significance of TYMS in BC patients TYMS is upregulated in BC Patients. 2.4. In vitro anti-cancer activity Uracil derivatives possess potent anti-proliferative activity To examine whether UDs, possessed anti-cancer activity, we performed a preliminary assay of cell viability on MDA-MB-231 cells. UD-1, UD-2, UD-3, UD-4 and UD-5 were given at 50 µM conc. and cells were Page 8/25 Page 8/25 incubated with drugs for 72 h. MTT assay analysis revealed that UD-1, UD-2, and UD-4 possessed high anti-cancer activity compared to UD-3, and UD-5 Fig. 6A. The three derivatives UD-1, UD-2, and UD-4 were selected for further analysis in a panel of breast cancer cell lines. incubated with drugs for 72 h. MTT assay analysis revealed that UD-1, UD-2, and UD-4 possessed high anti-cancer activity compared to UD-3, and UD-5 Fig. 6A. The three derivatives UD-1, UD-2, and UD-4 were selected for further analysis in a panel of breast cancer cell lines. To investigate the effect of UD-1, UD-2, and UD-4, BC cell lines were treated with different concentrations of the selected UDs. The effects of UDs on the survival of BC cells were assessed by MTT assay. As shown in Fig. 6B, C, D & Fig. 7, UDs inhibited cell proliferation in a time- and concentration-dependent manner. UD1 exhibited a log IC50 value of 1.86 µM, 1.89 µM, 2.0 µM, and 1.89 µM in MDA-MB-231, MDA- MB-468, MCF-7, and 4T1 cells respectively. UD2 exhibited a log IC50 value of 1.51 µM, 1.85 µM, 1.86 µM, and 1.83 µM in MDA-MB-231, MDA-MB-468, MCF-7, and 4T1 cells respectively. UD4 exhibited a log IC50 value of 1.3 µM, 1.7 µM, 1.8 µM, and 1.6 µM in MDA-MB-231, MDA-MB-468, MCF-7, and 4T1 cells respectively Table S8 (Supplementary Information). Among the three potent UDs, UD-4 demonstrated high anti-proliferative activity in vitro, with the lowest IC50 compared to UD-1 & UD-2. Among different BC cell lines, the TNBC cell lines showed more sensitivity towards UDs and had lower IC50 compared to ER + cell line MCF-7. Effect of Uracil derivatives on colony formation potential of MDA-MB-231 cells To further validate the anti-cancer activity of UDs, a colony formation assay was performed in BC cell line MDA-MB-231 Fig. 8. Treatment with UDs showed dose-dependent inhibition of colony formation potential of breast tumor cells. Among the UDs, UD-4 showed the highest reduction in colony formation potential of tumor cells. 2.4. In vitro anti-cancer activity UD-1 and UD-2 had less effect on colony formation in MDA-MB-231 cells, however, the small size of colonies in the treated wells of UD1 and UD2 demonstrates that UD1 and UD2 restrict the growth of tumor cells. These results demonstrate that UDs can limit the growth of breast tumor metastases and may be a promising approach in reducing the colonization of tumor cells at metastatic niches. 3. Conclusion In summary, we presented a new efficient, low-cost, eco-friendly highly scalable, and one-pot method for the synthesis of five uracil derivatives from readily available 6-chlorouracil and their biological activity in TNBC. The key steps of our synthetic efforts rely on 1) N-benzylation, 2) N-methylation, 3) substitution and 4) amino acid coupling. The target compounds were obtained in overall good yields (55–57%). Spectroscopic and analytical techniques fully characterized the target compounds. 5-FU is an FDA- approved drug for the treatment of several malignancies including BC. Our study identified UD4, the most potent derivative with micromolar potency against TYMS. Also, UD4 showed a good drug-like profile (e.g., aqueous solubility and ligand efficiency metric), along with an in vitro pharmacokinetic profile. Further exploration of the potency of UD4 in mouse mammary TNBC models is required. Overall, the study identified novel uracil derivatives as potent drug candidates for BC patients with high expression of TYMS which indicates their quite bright future in the field of drug discovery. Page 9/25 4. Materials And Methods All the reagents and chemicals used are of analytical and molecular biology grade and were obtained from the highest grade available from Sigma Aldrich, Acros organics, Spectrochem, Loba Chem, Survival Technology, and Rankem Laboratories, and were used without purification. TLC was performed on Merck All the reagents and chemicals used are of analytical and molecular biology grade and were obtained from the highest grade available from Sigma Aldrich, Acros organics, Spectrochem, Loba Chem, Survival Technology, and Rankem Laboratories, and were used without purification. TLC was performed on Merck TLC Silica gel 60 F254 plates eluting with specific solvents and samples were made visual with a UV lamp, Silica gel (60–120 mesh) was used for column chromatography. Melting points were measured on an Electrothermal 9100 apparatus. High-resolution mass spectra were measured were Bruker. The measurement was run in positive ion mode. 1H NMR was obtained using Bruker (400 MHz) spectrometer in DMSO and CDCl3 with tetramethylsilane as an internal standard. All NMR spectra at room temperature (RT) were determined in DMSO-d6 and CDCl3. Chemical shifts are reported in parts per million (δ) downfield from an internal tetramethylsilane reference. Coupling constants (J values) are reported in hertz (Hz), and spin multiplicities are indicated by the following symbols: s (singlet), d (doublet), t (triplet), q (quartet), m (multiplet). *Signals related to DMSO and residual ethanol, are indicated on the spectra. 4.1.5. Synthesis of Uracil Derivative (UD-4) Charged 6-Chloro-1-(4-fluorobenzyl)-3-methyldihydropyrimidine-2,4(1H,3H)-dione (9.0 g, 0.0334 moles) followed by 45 ml DMF and potassium carbonate (9.25 g, 0.0669 moles) was added then piperidine ( 3.60 g, 0.0417 moles) then the reaction mass was heated to 70–80°C, then the reaction mass stirred until completion of reaction then cooled to RT water was added into it then MDC was added, the organic layer was separated, the organic layer dried with sodium sulfate solvents was removed under reduced pressure to gives the title compound. Weight: 7.50 g (79.0%). g p g g ( ) 4.1.6. Synthesis of 2-((6-(3-aminopiperidin-1-yl)-3-methyl- 2,4-dioxotetrahydropyrimidin-1(2H)-yl)methyl)benzonitrile (5) (5) Charged 2 (9.0 g, 0.03 M) was dissolved in 45 mL DMF followed by the addition of potassium carbonate (9.25 g, 0.06 M). Then piperidin-3-amine (6.83 g, 0.039 M) was added, and the reaction mixture was heated at 80°C, until the completion of the reaction. Then the reaction mixture was cooled to RT and water was added to it and extracted with dichloromethane. The organic layer was separated and was dried over sodium sulfate. Finally, the solvent was removed under reduced pressure for the formation of compound 5 (9.81 g, 87%). 4.1 Chemistry Charged 6-Chlorouracil (10 g, 0.06824 moles) and diisopropylethylamine (18.52 g, 0.1432 moles) followed by addition of 50 ml DMF this mixture was stirred 10 min. at RT then 1-(bromomethyl)-4- fluorobenzene (12.90 g, 0.06824 moles) was added to it, this reaction mass stirred 8 h at room temperature, after completion of reaction 150 ml water was added into it, the title product was isolated b filtration. Weight: 15.65g (90%). Page 10/25 Page 10/25 completion of reaction then cooled to RT water was added into it then MDC was added, the organic layer was separated, the organic layer dried with sodium sulfate solvents was removed under reduced pressure to give the title compound. Weight: 9.50 g (89.0%). 4.1.4. Synthesis of Uracil Derivatives (UD-1 to UD-3) 4.1.4. Synthesis of Uracil Derivatives (UD-1 to UD-3) To the solution of 1-(4-fluorobenzyl)-3-methyl-6-(piperazin-1-yl)dihydropyrimidine-2,4(1H,3H)-dione ( 10.0 g, 0.0314 moles) in 100 ml acetone and 5 ml water, (8.68 g, 0.0628 moles) of potassium carbonate was added and the reaction mass was stirred for 10 min. at room temperature followed by the addition of 1.20 mole equivalents of chloroformates separately. After that, the reaction mixture was again stirred for 2 h at RT followed by the addition of water, product was extracted with ethyl acetate, purified by column chromatography to afford the UD-1 & UD-2. For the preparation of UD-3, 1-(4-nitrobenzyl)-3-methyl-6- (piperazin-1-yl) dihydropyrimidine-2,4(1H,3H)-dione was used instead of 1-(4-fluorobenzyl)-3-methyl-6- (piperazin-1-yl)dihydropyrimidine-2,4(1H,3H)-dione. 4.1.7. Synthesis of Uracil Derivative (UD-5) Charged 5 (9.0 g, 0.028 M) was initially dissolved in 90 mL dichloromethane, then HATU (16.12 g, 0.042 moles) was added to the solution followed by Moc-L-Valine (5.20 g, 0.029 moles) then TEA (5.72 g, 0.056 moles), the resulting solution was stirred RT till completion of the reaction. Finally, 20 mL of water was added into it an organic layer was separated and dried over sodium sulfate and the left solvent was removed under reduced pressure to give derivative UD-5. Page 11/25 4.2. Molecular docking and Integrated Bioinformatic Analysis 4.2.1 In silico evaluation of Uracil derivatives with Thymidylate Synthase (TYMS) Human thymidylate synthase crystal structure was fetched from Protein Data Bank (PDB ID: 5X66) (2). Chimera software (version 1.11.2) was used to expunge the useless items from the PDB file (27). Following this, the structure was checked for any missing residues using the free Maestro 11.2 (5). Coordinates of 2'-deoxyuridine 5'-monophosphate (dUMP) and 5-fluoro-2'-deoxyuridine-5'- monophosphate (FdUMP) were retrieved from ChemSpider with ChemSpider ID: 58574 and 26330107 respectively ( http://www.chemspider.com/Chemical-Structure.1906.html). Structures of other ligands were drawn in ChemSketch and were exported in the desired format for future use. A web server namely CB-Dock was used for performing molecular docking. CB-Dock first identifies the putative binding sites automatically and then performs cavity sorting (38). According to the ligand to be docked it customizes the size of the docking (grid) box and finally performs molecular docking using AutoDock Vina (flexible docking tool) (6). The ligand poses are re-ranked as per docking score and the best binding pose is ascribed to the first confirmation. We used the knowledge from biology to select the most appropriate conformation. Further, before performing molecular docking we validated CB-Dock for its ability to detect active sites correctly through the self-docking protocol. Once it was assured that CB- Dock can reproduce the experimental binding site of the ligand we did our docking experiments using this web-based tool only. During docking of newly synthesized molecules against the 2'-deoxyuridine-5'- monophosphate (dUMP) binding site of thymidylate synthase, FdUMP was used as control. Ligands interact with protein receptors through various interactions comprising hydrophobic interactions, hydrogen bonds, salt bridges, and so on. For generating the interaction profile of biologically meaningful poses of various ligands individually in the docked state with thymidylate synthase, the respective files were prepared according to the desired format. A protein-ligand interaction profiler (PLIP) was used for exploring ligand-thymidylate synthase interactions. This web service has the potential to detect seven types of interactions existing between the ligand and receptor in docked state. These interactions encompass hydrophobic contacts, hydrogen bonds, pi-cation interactions, halogen bonds, salt bridges, pi- stacking, and water bridges. 4.2.3 Kaplan Meier Analysis. The Kaplan-Meier plotter (https://kmplot.com/), is a web resource with gene expression data and information regarding the survival of BC patients (10). The mRNA gene chip BC dataset of the KM Plotter has RFS data for 4929 and OS data for 1879 patients. The patients were grouped into two cohorts based on the median expression of the gene. The effect of the TYMS on OS and RFS of the two defined groups was analyzed by KM- survival curves and the hazard ratio intervals and log-rank P-value was calculated using the KM plotter. 4.3 Cell Culture MCF-7, MDA-MB-231, and MDA-MB-468 human breast cancer cell lines were obtained from the National Centre for Cell Science (NCCS) in Pune. Prof Annapoorni Rangarajan, IISC, Bangalore, kindly supplied the murine cell line 4T1. Cell morphology was used to confirm the identification of these cells regularly. Dulbecco's Modified Eagle's Medium (DMEM; Thermo Fisher Scientific, Waltham, MA, United States) was used to culture MCF-7, MDA-MB-231, and MDA-MB-468 cells. 4T1 cells were cultured in RPMI1640 (Thermo Fisher Scientific, Waltham, MA, United States). The media was supplemented with 10% fetal bovine serum (FBS; Thermo Fisher Scientific, Waltham, MA, United States) and 1% penicillin-streptomycin (Thermo Fisher Scientific, Waltham, MA, United States). The cells were cultured in a CO2 incubator (5%) at 37°C. 4.2.2. Gene expression analysis of Thymidylate Synthase in breast cancer. 4.2.2. Gene expression analysis of Thymidylate Synthase in breast cancer. The Gepia2 database (http://gepia2.cancer-pku.cn/) is a web-based online data mining platform for exploring the gene expression data of normal samples and tumors (39). The database has 1085 breast tumor samples and 291 GTEx samples. The GEPIA2 was used to study the expression of TYMS in breast Page 12/25 tumor tissues. The UALCAN database (4), a comprehensive web resource for analyzing cancer OMICS data was further used to analyze the expression of TYMS in BC subclasses, age groups and ethnicities. 4.3.1. Cell Viability Assay MCF-7, MDA-MB-231, MDA-MB-468, and murine 4T1 human breast cancer cell lines were seeded in 96- well plates at 3x103 cells/well. Following seeding, the cells were treated with uracil derivatives, which demonstrated substantial anticancer activity in early testing. The cells were treated with uracil derivatives in a dose - and time-dependent manner. The medium was replaced with MTT solution after 72 h of incubation, and the absorption of each well was then assessed at 490 nm. The inhibition of the production of formazan crystals was used as a cytotoxicity activity indicator. Non-linear regression analysis with Graph Pad software (v8) was performed to estimate the IC50 values on the cancer cells. Declarations Funding: The work was supported by Research Grant sanctioned to Manzoor Ahmad Mir by Jammu Kashmir Science Technology and Innovation Council (JKST&IC), Department of Science and Technology, Govt of J&K vide Grant NO. JKST&IC/SRE/885-87 and Ramalinga Swami Fellowship, Grant No. BT/HRD/35/02/2006, sanctioned to Nissar Ahmad Wani from the Department of Biotechnology (DBT), Ministry of Science & Technology, New Delhi. Acknowledgments: Umar Mehraj is a recipient of a junior research fellowship (JRF) from UGC-CSIR, Govt. of India. Nissar Ahmad Wani is the recipient of the Ramanujan Fellowship from the Science & Engineering Research Board (SERB), Department of Science and Technology, Govt. of India, New Delhi. Conflict of Interest: All the authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. Author contributions: Conceived and designed the experiments: MAM, MAZ, & NAW. In silico analysis: SAG, MAM & UM. Performed the experiments: MNL, & UM. Analyzed the data: MNL, MAM, SG, &, UM. Wrote the manuscript. MNL, MAM & UM. Revived and edited the manuscript NAW, SS, MAZ & MAM. Author contributions: Conceived and designed the experiments: MAM, MAZ, & NAW. In silico analysis: SAG, MAM & UM. Performed the experiments: MNL, & UM. Analyzed the data: MNL, MAM, SG, &, UM. Wrote the manuscript. MNL, MAM & UM. Revived and edited the manuscript NAW, SS, MAZ & MAM. 4.3.2. Colony Formation Assay Cells were seeded onto six-well plates at a density of 1,000 cells per well and left to adhere for 24 hours. Cells were subsequently treated for 12 to 15 days with a continuous dosage of medicines in DMSO (final concentration 1%). The media was replaced after every 3 days and the wells were observed for colonies using an inverted microscope. After the colonies had grown large enough, the cells were fixed using 3.7 percent paraformaldehyde (in PBS). After that, cells were stained with a 0.05 percent crystal violet solution and photographed and analyzed with ImageJ software. For each cell type and therapeutic concentration, the experiment was carried out in biological triplicates. Page 13/25 Page 13/25 Page 13/25 References (2019) Design, synthesis and biological evaluation of novel uracil derivatives bearing 1, 2, 3-triazole moiety as thymidylate synthase (TS) inhibitors and as potential antitumor drugs. Eur. J. Med. Chem., 171, 282–296. 15. Ma, H., Jiang, W.-R., Robledo, N., Leveque, V., Ali, S., Lara-Jaime, T., Masjedizadeh, M., Smith, D. B., Cammack, N. and Klumpp, K. (2007) Characterization of the metabolic activation of hepatitis C virus nucleoside inhibitor β-d-2′-deoxy-2′-fluoro-2′-C-methylcytidine (PSI-6130) and identification of a novel active 5′-triphosphate species. J. Biol. Chem., 282, 29812–29820. Jiang, W.-R., Robledo, N., Leveque, V., Ali, S., Lara-Jaime, T., Masjedizadeh, M., Smith, D. B., Cammack, N. and Klumpp, K. (2007) Characterization of the metabolic activation of hepatitis C virus nucleoside inhibitor β-d-2′-deoxy-2′-fluoro-2′-C-methylcytidine (PSI-6130) and identification of a novel active 5′-triphosphate species. J. Biol. Chem., 282, 29812–29820. cKeage, K. (2015) Trelagliptin: first global approval. Drugs, 75, 1161–1164. 16. McKeage, K. (2015) Trelagliptin: first global approval. Drugs, 75, 1161–1164. 17. Mehraj, U., Aisha, S., Sofi, S. and Mir, M. A. (2022) Expression pattern and prognostic significance of baculoviral inhibitor of apoptosis repeat-containing 5 (BIRC5) in breast cancer: A comprehensive analysis. Advances in Cancer Biology-Metastasis, 100037. 17. Mehraj, U., Aisha, S., Sofi, S. and Mir, M. A. (2022) Expression pattern and prognostic significance of baculoviral inhibitor of apoptosis repeat-containing 5 (BIRC5) in breast cancer: A comprehensive analysis. Advances in Cancer Biology-Metastasis, 100037. 18. Mehraj, U., Dar, A. H., Wani, N. A. and Mir, M. A. (2021) Tumor microenvironment promotes breast cancer chemoresistance. Cancer chemotherapy and pharmacology, 1–12. 18. Mehraj, U., Dar, A. H., Wani, N. A. and Mir, M. A. (2021) Tumor microenvironment promotes breast cancer chemoresistance. Cancer chemotherapy and pharmacology, 1–12. 19. Mehraj, U., Ganai, R. A., Macha, M. A., Hamid, A., Zargar, M. A., Bhat, A. A., Nasser, M. W., Haris, M., Batra, S. K. and Alshehri, B. (2021) The tumor microenvironment as driver of stemness and therapeutic resistance in breast cancer: New challenges and therapeutic opportunities. Cell. Oncol., 1–21. 20. Mehraj, U., Qayoom, H. and Mir, M. A. (2021) Prognostic significance and targeting tumor-associated macrophages in cancer: new insights and future perspectives. Breast Cancer, 1–17. 20. Mehraj, U., Qayoom, H. and Mir, M. A. (2021) Prognostic significance and targeting tumor-associated macrophages in cancer: new insights and future perspectives. Breast Cancer, 1–17. 21. Mehraj, U., Wani, N. A., Hamid, A., Alkhanani, M., Almilaibary, A. and Mir, M. A. References 1. Bergstrom, D. E. (1982) Organometallic intermediates in the synthesis of nucleoside analogs. Nucleosides Nucleotides, 1, 1–34. 1. Bergstrom, D. E. (1982) Organometallic intermediates in the synthesis of nucleoside analogs. Nucleosides Nucleotides, 1, 1–34. 2. Berman, H., Henrick, K. and Nakamura, H. (2003) Announcing the worldwide protein data bank. Nat. Struct. Mol. Biol., 10, 980–980. 3. Brown, D. J. (2009) The pyrimidines. ed. John Wiley & Sons. 4. Chandrashekar, D. S., Bashel, B., Balasubramanya, S. A. H., Creighton, C. J., Ponce-Rodriguez, I., Chakravarthi, B. V. S. K. and Varambally, S. (2017) UALCAN: a portal for facilitating tumor subgroup gene expression and survival analyses. Neoplasia, 19, 649–658. 5. Duan, J., Dixon, S. L., Lowrie, J. F. and Sherman, W. (2010) Analysis and comparison of 2D fingerprints: insights into database screening performance using eight fingerprint methods. J. Mol. Graph. Model., 29, 157–170. 6. Eberhardt, J., Santos-Martins, D., Tillack, A. and Forli, S. (2021) AutoDock Vina 1.2. 0: new docking methods, expanded force field, and Python bindings. 7. Feng, J., Zhang, Z., Wallace, M. B., Stafford, J. A., Kaldor, S. W., Kassel, D. B., Navre, M., Shi, L., Skene, R. J. and Asakawa, T. (2007) Discovery of alogliptin: a potent, selective, bioavailable, and efficacious inhibitor of dipeptidyl peptidase IV. J. Med. Chem., 50, 2297–2300. 8. Hayashi, Y. (2016) Pot economy and one-pot synthesis. Chemical science, 7, 866–880. 9. Huang, M. and Graves, L. M. (2003) De novo synthesis of pyrimidine nucleotides; emerging interfaces with signal transduction pathways. Cellular and Molecular Life Sciences CMLS, 60, 321– Page 14/25 336. 10. Lánczky, A. and Győrffy, B. (2021) Web-based survival analysis tool tailored for medical research (KMplot): development and implementation. J. Med. Internet Res., 23, e27633. 11. Lebert, J. M., Lester, R., Powell, E., Seal, M. and McCarthy, J. (2018) Advances in the systemic treatment of triple-negative breast cancer. Current oncology, 25, 142–150. 12. Lipinski, C. A., Lombardo, F., Dominy, B. W. and Feeney, P. J. (1997) Experimental and computational approaches to estimate solubility and permeability in drug discovery and development settings. Advanced drug delivery reviews, 23, 3–25. 13. Longley, D. B., Harkin, D. P. and Johnston, P. G. (2003) 5-fluorouracil: mechanisms of action and clinical strategies. Nature reviews cancer, 3, 330–338. 14. Lu, G.-q., Li, X.-y., Wang, D. and Meng, F.-h. References (2022) Adapalene inhibits the growth of triple-negative breast cancer cells by S-phase arrest and potentiates the antitumor efficacy of GDC-0941. Frontiers in Pharmacology, 13, 958443. 22. Mir, M. A., Qayoom, H., Mehraj, U., Nisar, S., Bhat, B. and Wani, N. A. (2020) Targeting different pathways using novel combination therapy in triple negative breast Cancer. Curr. Cancer Drug Targets, 20, 586–602. 23. Pałasz, A. and Cież, D. (2015) In search of uracil derivatives as bioactive agents. Uracils and fused uracils: Synthesis, biological activity and applications. Eur. J. Med. Chem., 97, 582–611. 23. Pałasz, A. and Cież, D. (2015) In search of uracil derivatives as bioactive agents. Uracils and fused uracils: Synthesis, biological activity and applications. Eur. J. Med. Chem., 97, 582–611. 23. Pałasz, A. and Cież, D. (2015) In search of uracil derivatives as bioactive agents. Uracils and fused uracils: Synthesis, biological activity and applications. Eur. J. Med. Chem., 97, 582–611. Page 15/25 Page 15/25 24. Paschall, A. V., Yang, D., Lu, C., Choi, J.-H., Li, X., Liu, F., Figueroa, M., Oberlies, N. H., Pearce, C. and Bollag, W. B. (2015) H3K9 trimethylation silences Fas expression to confer colon carcinoma immune escape and 5-fluorouracil chemoresistance. The Journal of Immunology, 195, 1868–1882. 25. Pasha, N. and Turner, N. C. (2021) Understanding and overcoming tumor heterogeneity in metastatic breast cancer treatment. Nature Cancer, 1–13. 26. Pereira, M. A., Ramos, M. F. K. P., Dias, A. R., Faraj, S. F., dos Santos Cirqueira, C., de Mello, E. S., Zilberstein, B., Alves, V. A. F. and Ribeiro Jr, U. (2018) Immunohistochemical expression of thymidylate synthase and prognosis in gastric cancer patients submitted to fluoropyrimidine-based chemotherapy. Chinese Journal of Cancer Research, 30, 526. 27. Pettersen, E. F., Goddard, T. D., Huang, C. C., Couch, G. S., Greenblatt, D. M., Meng, E. C. and Ferrin, T. E. (2004) UCSF Chimera—a visualization system for exploratory research and analysis. J. Comput. Chem., 25, 1605–1612. 28. Qayoom, H., Wani, N. A., Alshehri, B. and Mir, M. A. (2021) An insight into the cancer stem cell survival pathways involved in chemoresistance in triple-negative breast cancer. Future Oncol. 29. Ramesh, D., Vijayakumar, B. G. and Kannan, T. (2020) Therapeutic potential of uracil and its derivatives in countering pathogenic and physiological disorders. Eur. J. Med. Chem., 112801. 30. Rose, M. G., Farrell, M. P. and Schmitz, J. C. (2002) Thymidylate synthase: a critical target for cancer chemotherapy. Clin. Colorectal Cancer, 1, 220–229. 31. References Shah, A., Nosheen, E., Zafar, F., Dionysiou, D. D., Badshah, A. and Khan, G. S. (2012) Photochemistry and electrochemistry of anticancer uracils. Journal of Photochemistry and Photobiology B: Biology, 117, 269–277. 32. Shi, H., Han, Z., Liu, J., Xue, J., Zhang, S., Zhu, Z., Xia, J. and Huang, M. (2017) Comparing efficacy of lamivudine, adefovir dipivoxil, telbivudine, and entecavir in treating nucleoside analogues naive for HBeAg-negative hepatitis B with medium hepatitis B virus (HBV) DNA levels. Medical science monitor: international medical journal of experimental and clinical research, 23, 5230. 33. Singh, A., Biot, C., Viljoen, A., Dupont, C., Kremer, L., Kumar, K. and Kumar, V. (2017) 1H-1, 2, 3‐triazole‐ tethered uracil‐ferrocene and uracil‐ferrocenylchalcone conjugates: Synthesis and antitubercular evaluation. Chem. Biol. Drug Des., 89, 856–861. 34. Sofi, S., Mehraj, U., Qayoom, H., Aisha, S., Almilaibary, A., Alkhanani, M. and Mir, M. A. (2022) Targeting cyclin-dependent kinase 1 (CDK1) in cancer: molecular docking and dynamic simulations of potential CDK1 inhibitors. Medical Oncology, 39, 1–15. 35. Sofi, S., Mehraj, U., Qayoom, H., Aisha, S., Asdaq, S. M. B., Almilaibary, A. and Mir, M. A. (2022) Cyclin- dependent kinases in breast cancer: expression pattern and therapeutic implications. Medical Oncology, 39, 1–16. 36. Sung, H., Ferlay, J., Siegel, R. L., Laversanne, M., Soerjomataram, I., Jemal, A. and Bray, F. (2021) Global cancer statistics 2020: GLOBOCAN estimates of incidence and mortality worldwide for 36 cancers in 185 countries. CA Cancer J. Clin., 71, 209–249. Page 16/25 Page 16/25 37. Takemura, Y. and Jackman, A. L. (1997) Folate-based thymidylate synthase inhibitors in cancer chemotherapy. Anticancer Drugs, 8, 3–16. 38. Tan, H.-X., Gong, W.-Z., Zhou, K., Xiao, Z.-G., Hou, F.-T., Huang, T., Zhang, L., Dong, H.-Y., Zhang, W.-L. and Liu, Y. (2020) CXCR4/TGF-β1 mediated hepatic stellate cells differentiation into carcinoma- associated fibroblasts and promoted liver metastasis of colon cancer. Cancer Biology & Therapy, 21, 258–268. 39. Tang, Z., Li, C., Kang, B., Gao, G., Li, C. and Zhang, Z. (2017) GEPIA: a web server for cancer and normal gene expression profiling and interactive analyses. Nucleic Acids Res., 45, W98-W102. 40. Thomson, J. M. and Lamont, I. L. (2019) Nucleoside analogues as antibacterial agents. Front. Microbiol., 10, 952. 41. Veber, D. F., Johnson, S. R., Cheng, H.-Y., Smith, B. R., Ward, K. W. and Kopple, K. D. (2002) Molecular properties that influence the oral bioavailability of drug candidates. J. Med. Chem., 45, 2615–2623. 42. Wahba, H. A. References and El-Hadaad, H. A. (2015) Current approaches in treatment of triple-negative breast cancer. Cancer biology & medicine, 12, 106. 43. Wu, C.-H., Wu, C.-C. and Ho, Y.-S. (2007) Antitumor activity of combination treatment of Lentinus edodes mycelium extracts with 5-fluorouracil against human colon cancer cells xenografted in nude mice. J Cancer Mol, 3, 15–22. 44. Xie, P., Mo, J.-L., Liu, J.-H., Li, X., Tan, L.-M., Zhang, W., Zhou, H.-H. and Liu, Z.-Q. (2020) Pharmacogenomics of 5-fluorouracil in colorectal cancer: review and update. Cell. Oncol., 43, 989– 1001. 45. Zhang, W., Feng, M., Zheng, G., Chen, Y., Wang, X., Pen, B., Yin, J., Yu, Y. and He, Z. (2012) Chemoresistance to 5-fluorouracil induces epithelial–mesenchymal transition via up-regulation of Snail in MCF7 human breast cancer cells. Biochem. Biophys. Res. Commun., 417, 679–685. 45. Zhang, W., Feng, M., Zheng, G., Chen, Y., Wang, X., Pen, B., Yin, J., Yu, Y. and He, Z. (2012) Chemoresistance to 5-fluorouracil induces epithelial–mesenchymal transition via up-regulation of Snail in MCF7 human breast cancer cells. Biochem. Biophys. Res. Commun., 417, 679–685. Figures Page 17/25 Page 17/25 Page 17/25 Figure 1 Schematic for the synthesis of novel uracil derivatives. Schematic for the synthesis of novel uracil derivatives. Schematic for the synthesis of novel uracil derivatives. Page 18/25 Figure 2 Figure 2 The chemical structures of synthesized uracil derivatives. Page 19/25 Figure 3 Scheme for the proposed mechanism for the synthesis of uracil derivatives. Figure 3 Figure 3 Figure 3 Scheme for the proposed mechanism for the synthesis of uracil derivatives. Page 20/25 Figure 4 In silico evaluation of the binding affinity of novel UDs with thymidylate synthase, A. CB-Dock serve predict active site correctly. The green region shows the thymidylate synthase enzyme and the yellow Figure 4 Page 21/25 In silico evaluation of the binding affinity of novel UDs with thymidylate synthase, A. CB-Dock server can predict active site correctly. The green region shows the thymidylate synthase enzyme and the yellow- colored molecule (ball and stick) indicates its co-crystallized ligand. We separated this co-crystallized ligand from thymidylate synthase and then redocked it with this synthase using the CB-Dock server. The redocked ligand (red-colored) and co-crystallized ligand (yellow) colocalized at the same place. This Page 21/25 shows that the docking algorithm can predict the binding site correctly. We also analyzed the interaction profile of UDs with thymidylate synthase in 2D view. While 6 interactions were observed both in the case of UD4 and UD6. Relatively more interactions were observed with UD4 and UD5 in contrast to other UDs. B. Binding affinity values of newly synthesized five molecules against human thymidylate synthase. 5- FdUMP (FdUMP) (5-FU metabolite), the known binder of thymidylate synthase was put as control. The more negative value of binding affinity signifies stronger binding. Among the tested molecules, UD5 followed by UD4 and UD2 proved to be strong binders of thymidylate synthase as indicated by the binding affinity values. Further, all the novel molecules proved to be relatively more effective binders than the known metabolite of 5FU namely FdUMP. Figure 5 Expression pattern and prognostic significance of thymidylate synthase (TYMS) in breast cancer. A. TYMS was found high upregulated in BC patients compared to normal control or solid normal samples. B. Among breast cancer subtypes, TYMS showed high expression in aggressive subtypes viz TNBC followed by luminal and HER2 enriched. C. Enhanced expression of TYMS was observed among women under the age group of 21-40 yrs and, D.African-American women. E. High expression of TYMS was found associated with worse relapse-free survival (RFS) and F. overall survival (OS). Figure 5 Expression pattern and prognostic significance of thymidylate synthase (T prognostic significance of thymidylate synthase (TYMS) in breast cancer. A Expression pattern and prognostic significance of thymidylate synthase (TYMS) in breast cancer. A. TYMS was found high upregulated in BC patients compared to normal control or solid normal samples. B. Among breast cancer subtypes, TYMS showed high expression in aggressive subtypes viz TNBC followed by luminal and HER2 enriched. C. Enhanced expression of TYMS was observed among women under the age group of 21-40 yrs and, D.African-American women. E. Figure 4 High expression of TYMS was found associated with worse relapse-free survival (RFS) and F. overall survival (OS). Expression pattern and prognostic significance of thymidylate synthase (TYMS) in breast cancer. A. TYMS was found high upregulated in BC patients compared to normal control or solid normal samples. B. Among breast cancer subtypes, TYMS showed high expression in aggressive subtypes viz TNBC followed by luminal and HER2 enriched. C. Enhanced expression of TYMS was observed among women under the age group of 21-40 yrs and, D.African-American women. E. High expression of TYMS was found associated with worse relapse-free survival (RFS) and F. overall survival (OS). Page 22/25 Figure 6 Uracil derivatives reduce the cell viability of breast cancer cell lines in a dose-dependent manner. A. Reduced cell viability of MDA-MB-231 cells treated with 50 µM of UDs for 72 hrs. Among the screened UDs, UD1, UD2 and UD4 showed high potency in reducing cell viability at 50 µM conc. One-way Annova was used for statistical analysis. p < 0.0001 (**, significantly different from DMSO treated controls. B, UD1, C, UD2, and D. UD4 were analyzed for potency in a panel of BC cell lines and showed an enhanced reduction in cell viability in a dose-dependent manner. The IC50 values were calculated using non-linear regression (curve fit) in Graphpad Prism V8. Among the three potent UDs, UD4 showed the highest reduction in cell viability and lowest IC50 value. Figure 6 Figure 6 Uracil derivatives reduce the cell viability of breast cancer cell lines in a dose-dependent manner. A. Reduced cell viability of MDA-MB-231 cells treated with 50 µM of UDs for 72 hrs Among the screened Uracil derivatives reduce the cell viability of breast cancer cell lines in a dose-dependent manner. A. Reduced cell viability of MDA-MB-231 cells treated with 50 µM of UDs for 72 hrs. Among the screened UDs, UD1, UD2 and UD4 showed high potency in reducing cell viability at 50 µM conc. One-way Annova was used for statistical analysis p < 0 0001 (** significantly different from DMSO treated controls B Uracil derivatives reduce the cell viability of breast cancer cell lines in a dos U ac de at es educe t e ce ab ty o b east ca ce ce es a dose depe de t a e . . Reduced cell viability of MDA-MB-231 cells treated with 50 µM of UDs for 72 hrs. Among the screened UDs, UD1, UD2 and UD4 showed high potency in reducing cell viability at 50 µM conc. One-way Annova was used for statistical analysis. p < 0.0001 (**, significantly different from DMSO treated controls. B, UD1, C, UD2, and D. UD4 were analyzed for potency in a panel of BC cell lines and showed an enhanced reduction in cell viability in a dose-dependent manner. The IC50 values were calculated using non-linear regression (curve fit) in Graphpad Prism V8. Among the three potent UDs, UD4 showed the highest reduction in cell viability and lowest IC50 value. A-MB-231 cells treated with 50 µM of UDs for 72 hrs. Among the screened wed high potency in reducing cell viability at 50 µM conc. One-way Annova Page 23/25 Page 23/25 Page 23/25 Figure 7 Uracil derivatives reduced the proliferation of breast cancer cell lines in a time-dependent manner. We next evaluated the effect of potent UDs, viz UD1, UD2, and UD2 on BC cell lines in a time-dependent manner, and the statistical significance increased with time. A. MDA-MB-231 cells, B. MCF-7 cells, C. MDA-MB-468 cells, and D. 4T1 cells demonstrated a reduction in cell viability with time upon treatment with UDs. Two-way annova was used for statistical analysis followed by Dunnett's multiple comparisons test. p > 0.01 (ns), p < 0.01 (*), p < 0.001 (**), p < 0.005 (***), p < 0.0001 (****). Figure 6 Figure 7 Uracil derivatives reduced the proliferation of breast cancer cell lines in a time-dependent manner. We next evaluated the effect of potent UDs, viz UD1, UD2, and UD2 on BC cell lines in a time-dependent manner, and the statistical significance increased with time. A. MDA-MB-231 cells, B. MCF-7 cells, C. MDA-MB-468 cells, and D. 4T1 cells demonstrated a reduction in cell viability with time upon treatment with UDs. Two-way annova was used for statistical analysis followed by Dunnett's multiple comparisons test. p > 0.01 (ns), p < 0.01 (*), p < 0.001 (**), p < 0.005 (***), p < 0.0001 (****). Page 24/25 Page 24/25 Page 24/25 Figure 8 Uracil derivatives reduced colony formation potential of MDA-MB-231 cells. The effect of UDs on colony formation was evaluated and a significant reduction in colony formation was observed at conc lower than IC50 values. Among UDs, UD4 showed an enhanced reduction in cell colonies at 17 µM conc. One- way annova was used for statistical analysis followed by Dunnett's multiple comparisons test. p < 0.01 (*), p < 0.001 (**), p < 0.005 (***), p < 0.0001 (****). Figure 8 Uracil derivatives reduced colony formation potential of MDA-MB-231 cells. The effect of UDs on colony formation was evaluated and a significant reduction in colony formation was observed at conc lower than IC50 values. Among UDs, UD4 showed an enhanced reduction in cell colonies at 17 µM conc. One- way annova was used for statistical analysis followed by Dunnett's multiple comparisons test. p < 0.01 (*), p < 0.001 (**), p < 0.005 (***), p < 0.0001 (****). Uracil derivatives reduced colony formation potential of MDA-MB-231 cells. The effect of UDs on colony formation was evaluated and a significant reduction in colony formation was observed at conc lower than IC50 values. Among UDs, UD4 showed an enhanced reduction in cell colonies at 17 µM conc. One- way annova was used for statistical analysis followed by Dunnett's multiple comparisons test. p < 0.01 (*), p < 0.001 (**), p < 0.005 (***), p < 0.0001 (****). Supplementary Files This is a list of supplementary files associated with this preprint. Click to download. GraphicalAbstract.jpg SupplementaryData.pdf CompoundCharacterizationChecklist.pdf Page 25/25
https://openalex.org/W2141223520
https://zenodo.org/records/1262953/files/article.pdf
English
null
Computation of LFT uncertainty bounds with repeated parametric uncertainties
null
1,998
public-domain
4,472
elphia, Pennsylvanla June 1998 COMPUTATION OF LFT UNCERTAINTY BOUNDS WITH REPEATED PARAMETRIC UNCERTAINTIES K. B. Lim: D. P. Giesyt NASA Langley Research Center, MS 161, Hampton, Virginia, 29681-0001 K. B. Lim: D. P. Giesyt K. B. Lim: D. P. Giesyt y NASA Langley Research Center, MS 161, Hampton, Virginia, 29681-0001 y NASA Langley Research Center, MS 161, Hampton, Virginia, 29681-0001 y+----u plant measurement noise Figure 1: Block diagram for uncertainty identification Abstract A new methodology in which linear fractional transfor- mation uncertainty bounds are directly constructed for use in robust control design and analysis is proposed. Existence conditions for model validating solutions with or without repeated scalar uncertainty are given. The approach is based on minimax formulation to deal with multiple non-repeated structured uncertainty components subject to fixed levels of repeated scalar uncertainties. Input directional dependence and variations with different experiments are addressed by maximizing uncertainty levels over multiple experimental data sets. Preliminary results show that reasonable uncertainty bounds on structured non-repeated uncertainties can be iden- tified directly from measurement data by assuming reasonable levels of repeated scalar uncertainties. Figure 1: Block diagram for uncertainty identification Proceedings of the American Control Conference Philadelphia, Pennsylvanla * June 1998 Proceedings of the American Control Conference Philadelphia, Pennsylvanla * June 1998 (1) A = blk-diag(A1,. . .,AT); Aj E CmaXn’, i E TT (1) where TT := (1, . . . , T ) . Consider a set of measurements from ne independent experiments whose inputs and outputs are denoted by ( ~ ( j ) , for the j t h experiment. Define the set where TT := (1, . . . , T ) . Consider a set of measurements from ne independent experiments whose inputs and outputs are denoted by ( ~ ( j ) , for the j t h experiment. Define the set T ne := { u(j 1, y(j) : j = 1, . , . , ne} (2) (2) Henceforth, consider input and output pairs that satisfy (U, y) E Tn,. At each frequency, the signals and 17 depend on input vector U and in particular its direction so that a ratio of their norms will also be dependent on the particular input direction. To account for this dependence, consider satisfying model validating conditions [l] - [5] for all available experiments: where @ := blk-diag(SIIn,, . . .,&In,.) and 6j E F and Ai are defined in equation (1). Given a model validating set, consider choosing a “small- est” size uncertainty in terms of I = AV (3) 17 = P l l t + P l Z U (4) ey = !/ - P215 - PZZU = 0, V(% y) E Tne ( 5 ) ey = !/ - P215 - PZZU = 0, V(% y) E Tne ( 5 ) i.e., minimum over maximum over all components. A po- tential hazard with this viewpoint is the numerical values of the component uncertainties may not be of equal physical relevance. This is particularly true for more complex systems where there is usually a mixture of parametric (repeated or not) and nonparametric uncertainties including unmodeled dynamics. In practice, more uncertainty parameters are used (as compared to the “true” set of uncertain parameters) to sufficiently satisfy existence of model validating solutions. This means that robust identification problems generally lead to underdetermined problems, which appears to require the selection of physically significant uncertainty configurations and levels from all model validating sets. For the above reasons, we treat the parametric scalar uncertainties which i.e., minimum over maximum over all components. A po- tential hazard with this viewpoint is the numerical values of the component uncertainties may not be of equal physical relevance. ‘Research Engineer, Guidance & Control Branch, Flight Dy- namics & Control Division, k . b . limelarc .nasa. gov U.S. Government Work Not Protected by U.S. Copyright 1 Problem Definition Of course fictitious signals e and 17 cannot be measured so it is necessary to look at their dependence on real signals U and y and their transmission through the system P. We consider a constant matrix problem; i.e., the supremum is taken at each frequency and is due to the directional dependence of ratio of 2-norms. IT) T) Figure 1 shows measured input, U E CnU and output, y E C”., across a true plant. These inputs and outputs are assumed to be discrete Fourier transforms obtained from discrete time records. The corresponding output, @, from an upper linear fractional transformation model, F,(P, A), depends on a given augmented plant, P, and an assumed structured uncertainty of the form Let col(E1, . . . , IT) and col(q1, . . . , vT) be the partition- ing of the vectors I and 7 which conform to the block diagonal partition of A in equation (1). For convenience, assume that all repeated scalar blocks are grouped into the first r blocks in A. Then, equation (3) becomes: (1) A = blk-diag(A1,. . .,AT); Aj E CmaXn’, i E TT (1) A = blk-diag(A1,. . .,AT); Aj E CmaXn’, i E TT (1) A = blk-diag(A1,. . .,AT); Aj E CmaXn’, i E TT This is particularly true for more complex systems where there is usually a mixture of parametric (repeated or not) and nonparametric uncertainties including unmodeled dynamics. In practice, more uncertainty parameters are used (as compared to the “true” set of uncertain parameters) to sufficiently satisfy existence of model validating solutions. This means that robust identification problems generally lead to underdetermined problems, which appears to require the selection of physically significant uncertainty configurations and levels from all model validating sets. For the above reasons, we treat the parametric scalar uncertainties which The basic problem we address is to determine smallest bounds among all uncertainties which are model validating with re- spect to available input/output measurements. From equation (3), the uncertainty bound can be written as a ratio of %norms The basic problem we address is to determine smallest bounds among all uncertainties which are model validating with re- spect to available input/output measurements. From equation (3), the uncertainty bound can be written as a ratio of %norms ‘Research Engineer, Guidance & Control Branch, Flight Dy- namics & Control Division, k . b . limelarc .nasa. gov ‘Research Engineer, Guidance & Control Branch, Flight Dy- namics & Control Division, k . b . limelarc .nasa. gov t Mathematician, Guidance & Control Branch, Flight Dynamics & Control Division, d . p . giesyalarc . nasa .gov 1018 Th 2 ( i h d l bl k) are often repeated separately from component unstructured uncertainties. are often repeated separately from component unstructured uncertainties. Theorem 2 (with repeated scalar block) Suppose the condition in Theorem 1 holds. Let (U, y) E Tn,. Then, a model validating set <, Q, and A exists if and only if there exists 61,. . .,&, and $ such that Theorem 2 (with repeated scalar block) Suppose the condition in Theorem 1 holds. Let (U, y) E Tn,. Then, a model validating set <, Q, and A exists if and only if there exists 61,. . .,&, and $ such that Theorem 1 (no repeated scalar block) Notice that si, in equation (20) is the smallest 6i making equation (21) true for all $. A violation of inequality (21) implies that 6i is not an upper bound on the ratio of signal norms, i.e., it fails as an uncertainty bound. For large 6a, equation (21) is more likely to be satisfied, which makes intu- itive sense. Finally, notice that in equation (20), $ generally influences all components ti, vi, i E T,. This motivates the minimax formulation. Let ( U , y) E Tne. Then a corresponding model validating uncertainty set, (, r ] , and A, satisfying equations (3) to (5) exists if and only if e; E Im(P21). 0 If A contains repeated scalar blocks, then the condition in Theorem 1 becomes only a necessary condition for model validation. So, with repeated scalar blocks we ask, “Among all pairs (‘, q), satisfying equation (12), does a pair exist that also satisfies equation (3)?” Given any pair (c, v), A,,,, . . ., A, always exist, so we need to consider only the existence of the first r blocks, ~ I I ~ ~ , . . ., &In7. Let us denote 6 := ni = m := ET=1 mi and define 2 Existencle of [, q For each experiment, consider the existence of ( which is an unconstrained by the structure in the uncertainty block and satisfying equation (5) which is rewritten as Theorem 2 is a constraint on 4 to limit 5 and 17 that satisfy the repeated scalar structure implicit in equation (7). Note that 2 has full row rank independent of the set 61,. . .,6,, so that Lemma 1: For each ( u , ~ ) E Tne, a E exists which satisfies equation (5) if and only if dim(Ker(2)) = n + m - 6 (17) (17) Note that although the rank of 2 does not change as long as 6 j # 0, V i E T,, the bases changes with Si, i E T,, due to the repeated scalar uncertainty structure. Theorem 2 results in either a yes or no answer to the existence question. However, as a test, it is complicated because Z is dependent on the values of the set 61,. . .,fir, which is as yet undetermined. cy” E Im(P2i) 0 (10) cy” E Im(P2i) 0 cy” E Im(P2i) 0 (10) Lemma 1 is a test which gives a yes or no answer. If the test indicates that a solution exists, then all ( satisfying equation (5) can be written as (11) = + Nzid (11) = + Nzid 3.1 Uncertainty Bound Inequality From equation (8), it is of interest to note that Consequently we state the following result which was also obtained earlier in [4] in a more general context. The asterisk in equation 20 refers to the minimum 2-norm ratio with respect to $. To avoid a ratio of square root of quadratics in I ) , consider the condition Theorem 1 (no repeated scalar block) 3.1 Uncertainty Bound Inequality From equation (8), it is of interest to note that < sup - I I<: I I 2 = s;? /2 I I Aid I I2 := @(Ai), i E T, (18) llrlilla - 7: 11171112 1117.11 Lemma 1 defines the conditions under which the output nominal error e; can be cancelled by the fictitious signals (4). Lemma 1 defines the conditions under which the output nominal error e; can be cancelled by the fictitious signals Pz1( from the uncert,ainty block. The Lemma presupposes that the fictitious signal ( is unconstrained by the structure in the uncertainty block. Note that the null freedom $ is an independent variable. In fact, any choice of $ for a given experiment gives a corresponding pair of‘ and r] which satisfy equations (4) and (5). (4). With physical signals, the best we can expect to do is to estimate the supremum by a maximum over all available experiments, i.e., With physical signals, the best we can expect to do is to estimate the supremum by a maximum over all available experiments, i.e., q ( ) ( ) If the condition in Lemma 1 holds, the fictitious signals satisfying equations (4) and (5) can be written as For each experiment, the free null parameter 4 (and therefore ( and 11) can be chosen that minimizes the ratio of 2-norms in equation (19). The maximum over all experiments in equation (19) can be determined after solving for minimum ratio with respect to $ for each experiment, independently. Hence, consider first the following minimization problem for each experiment: For each experiment, the free null parameter 4 (and therefore ( and 11) can be chosen that minimizes the ratio of 2-norms in equation (19). The maximum over all experiments in equation (19) can be determined after solving for minimum ratio with respect to $ for each experiment, independently. Hence, consider first the following minimization problem for each experiment: {;I>={ :}+[ p;1]N21* where It turns out that for general complex block diagonal uncer- tainty structure with no repeated scalar blocks, for given [ and r], a A satisfying equation (3) always exists [I]. Consequently we state the following result which was also obtained earlier in [4] in a more general context. It turns out that for general complex block diagonal uncer- tainty structure with no repeated scalar blocks, for given [ and r], a A satisfying equation (3) always exists [I]. 3 Uncertainty Bound where e; is determined by the particular experiment using equation (9), N21 is chosen so that its columns span Ker(Pzl), and 4 E Cn* is arbitrary. Given any E from equation (ll), the complementary signal r] can be computed from equation (4) 3.1 Uncertainty Bound Inequality From equation (8), it is of interest to note that 3.2 Minimax problem With the remaining freedom in the restricted model validating set, we seek a smallest uncertainty bound for the remaining nonre- peated uncertainty components (i = T + 1,. . . , T ) . 4 Illustrative Example The dimensions of the equations are as follows: equation (22) consists of fi complex equalities, equation (23) consists of T real inequalities, equation (25) consists of T - T real inequalities, and equation (26) consists of T - T real inequal- ities. Equation (22) defines the admissible set of fictitious signals parameterized by ?I, that satisfies the repeated scalar uncertainty structure. Equation (25) defines the dependence of nonrepeated uncertainty bounds on the above admissible set of fictitious signals. Finally, condition (23) specifies the bound on repeated scalar uncertainties while condition (26) is used to define a bound on the maximum nonrepeated uncertainty component for minimax optimization purpose. Consider a simple dyamical system given in [5] but with two force inputs and two outputs. The system consists of two structural modes resulting in four state variables. The system is discretized at 50 Hertz assuming a zero order hold at both has the form inputs. The fourth order discrete A matrix for this system A = blk-diag(A1, A2) (30) A = blk-diag(A1, A2) (30) where Ai is a 2 by 2 matrix of the form Re(zi) -Im(zj) 1 Ai := [ Im(zi) Re(za) For numerical solutions, we suggest the following steps: , f -&?Ii"llha, + ~ 1 1 , , ~ 2 1 4 I I ; + Il%7l, + N21*,4ll; 50, i = T + l , . . . , T (25) (25) 6; -y 5 0, i = T + I,. . . , f 3.2 Minimax problem The problem for cash experiment then becomes: find the smallest bound set, Si*, i E T,, such that inequality (21) is satisfied and subject to model validation constraints on ‘ j and 9 s s 1019 1019 Note from condition (25) that for any fixed $, the smallest 8: holds when condition (25) becomes an equality, i.e., 77;. The signal $ is a free parameter from excess uncertainty degrees of freedom that can be judiciously chosen for each experiment to minimize Jj for all i. The multiple objective nature is addressed by formulating it as a particular type of minimax problem. p Using Theorem 2, we can parameterize the set of all signal pairs, ( E , 7) that satisfies model validation for each experiment. This set corresponds to all $, and 61,. . .,& that satisfies equation (16) which can be rewritten as The OP2 problem for each experiment reduces to the follow- ing: The OP2 problem for each experiment reduces to the follow- ing: op3 miny (28) dJ ,T op3 miny dJ ,T (28) subject to and (.)A denotes the first fi rows of (.). Notice from equation (22) that it depends only on the repeated scalar uncertainties. and (.)A denotes the first fi rows of (.). Notice from equation (22) that it depends only on the repeated scalar uncertainties. In our approach, we choose to restrict a model validating set parameterized by the set $, and 51,. . .,6, that is also bounded by and (.)A denotes the first fi rows of (.). Notice from equation (22) that it depends only on the repeated scalar uncertainties. In our approach, we choose to restrict a model validating set parameterized by the set $, and 51,. . .,6, that is also bounded by ( ) p y p In our approach, we choose to restrict a model validating set parameterized by the set $, and 51,. . .,6, that is also bounded by In OP3, the null freedom vector $ is used to minimize the maximum uncertainty bound. Note that for each experiment (or ne = 1 case), OP3 is equivalent to the earlier results using a minimum norm model validating (MNMV) formulation as given in [1]-[2]. where E R which denotes the ith repeated scalar uncer- tainty bound as chosen a priori by an engineer. For numerical solutions, we suggest the following steps: For numerical solutions, we suggest the following steps: Step 1: Choose repeated scalar bounds 6i, i = 1, . . . , T. Step 2: Solve optimization problem OP2 for each exper- Step 1: Choose repeated scalar bounds 6i, i = 1, . . . , T. Step 2: Solve optimization problem OP2 for each exper- If OP2 results in an infeasible domain, increase appro- priate &. Redo Step 2 until solution exists. Step 3: Compute worst bounds for nonrepeated uncer- iment. tainty components over all experiments. subject to equations (22), (B), and subject to equations (22), (B), and If OP2 results in an infeasible domain, increase appro- & iment. -@;i211bn, + P1ln,N21$11; + I l ~ m , 4- N21,,41E I O 1 i = T + l , ..., T pp priate &. Redo Step 2 until solution exists. b d f d p p Step 3: Compute worst bounds for nonrepeated uncer- tainty components over all experiments. where (.)n, and refers to the ith block of rows associated with Ai E Cmzxna of dimensions nj and mi respectively for matrix (.). The possible non-smoothness in the minimax problem in OP1 can be avoided by recasting the problem for each experiment as where (.)n, and refers to the ith block of rows associated with Ai E Cmzxna of dimensions nj and mi respectively for matrix (.). The possible non-smoothness in the minimax problem in OP1 can be avoided by recasting the problem for each experiment as - - Sa = maxSj*, i = T + 1,. . . , T T n c Fit uncertainty components using stable low Step 4: order rational functions over all frequencies. subject to equations 22 23 and Note that in Step 4, an interactive utility program such as drawmag, a p-Tools command [6] can be used. Analytical sensitivities for all constraint functions are derived. and used but not shown due to lack of space. All complex variables and equations are expanded out in real variable form to obtain the derivatives. subject to equations 22,23, and -&?Ii"llha, + ~ 1 1 , , ~ 2 1 4 I I ; + Il%7l, + N21*,4ll; 50, 6; -y 5 0, i = T + l , . . . , T (25) (26) i = T + I,. . . 3.4 Compuational Algorithm p y p ( , , ) We summarize the problem for each experiment as For numerical solutions, we suggest the following steps: min y subject to conditions (25) and (26). at 1. ..,sa ,dj 3 7 I . . 61 62 True .005 .01 Case 1 .001 .001 Case 2 .01 .01 Case 3 .1 .1 02x2, and E2 = [0, -1; l , O ] . 61 62 True .005 .01 Case 1 .001 .001 Case 2 .01 .01 Case 3 .1 .1 [ , ; , ] Figure 3 shows ithe interconnection structure of the parametric uncertainty with an additive uncertainty from two inputs to two outputs. Figure 4 shows the frequency 5 1 5, 4.1 Nominal aind Uncertainty Structure 2 E % 2 -1 00 a --zoo 2 -400 a -200 -600 1 oo 1 o2 1 oo 1 o2 with parametric pertuicbations set to 61 = 62 = 0. Hence, the Consider a nominal model consisting of only the first mode nominal model contains both parametric error (in the first mode) and unmodeled dynamics (truncated second mode). Figure 2 shows the poles of the true plant corresponding to the two structural modes and an approximation of the first pole by the nominal model. This parametric error is represented 3.3 No repeated scalar block To establish a truth model which is then used to simulate measurements, we perturb the first structural mode by the following ] To establish a truth model which is then used to simulate measurements, we perturb the first structural mode by the following ] For the case when there are no repeated scalar blocks (T = O), OP2 reduces to A 1 = A ; + 6 1 [ ; ; ] + 6 2 [ 0 1 -1 ] 0 min y subject to conditions (25) and (26). at 1. ..,sa ,dj 3 7 I . . min y subject to conditions (25) and (26). at 1. ..,sa ,dj 3 7 I . . 1020 1020 The first error peak is due to parametric error in the first mode and the second due to truncated second mode. where 61 and 62 corresponds to the perturbations in the real and imaginary components of the first discrete eigenvalue, respectively. The perturbation matrices for this choice of parametric uncertainties are of rank two, i.e., repeated mul- tiplicity of order 2 for each scalar parameter. Of course in order to preserve the (complex conjugate pair property of the set of perturbed plantar, both 61 and 62 must be real numbers. For the simulated measurements, a small level of independent Gaussian white noise was included at both outputs. A single time record was divided into two segments for use as two independent experiments (ne = 2). where 61 and 62 corresponds to the perturbations in the real and imaginary components of the first discrete eigenvalue, respectively. The perturbation matrices for this choice of parametric uncertainties are of rank two, i.e., repeated mul- tiplicity of order 2 for each scalar parameter. Of course in order to preserve the (complex conjugate pair property of the set of perturbed plantar, both 61 and 62 must be real numbers. For the simulated measurements, a small level of independent Gaussian white noise was included at both outputs. A single time record was divided into two segments for use as two independent experiments (ne = 2). loo - ,- - .s io-' (II 2 E % 2 -1 00 a --zoo 2 -400 a -200 -600 1 oo 1 o2 1 oo 1 o2 loo - ,- - .s io-' (II loo - ,- - .s io-' (II Figures 5 to 7 show the identified uncertainty bounds for un- modeled dynamics ( 0 ) while figure 8 shows the corresponding curved-fitted stable low order rational functions for additive uncertainties in all three cases. It appears that when the assumed parametric uncertainty bound is very small relative to true values (Case 1, figure 5 ) , the additive uncertainty tries to capture a large error incurred by the optimistic level of as- 2 J IO’ Frequency (radlsec) 1 o2 Figure 7: Case 3: Additive unc bounds (0) and SV frequency responses - True( -), Nominal( --), True- Nominal(. . .) is consistent with the expectation that in general, parametric changes for a structural mode do not significantly affect other structural modes. 2 J IO’ Frequency (radlsec) 1 o2 structural modes. Finally, note that from a more detailed parametric study, a smaller level of parametric uncertainty level could be de- duced. This “minimal” parametric uncertainty level corre- sponds to a threshold level whereby a further decrease in the parametric uncertainty level will give a large increase in unmodeled dynamics uncertainty level. Of course, a priori physical knowledge of the system under investigation will generally help in determining this optimal tradeoff point. T O 1 m 2 10-~1 1 o1 1 o2 Frequency (rad/sec) Figure 5: Case 1: Additive unc bounds (0) and SV frequency responses - True( -), Nominal( --), True- Nominal(. . .) T O 1 m 2 10-~1 1 o1 1 o2 Frequency (rad/sec) Frequency (radlsec) Figure 7: Case 3: Additive unc bounds (0) and SV frequency responses - True( -), Nominal( --), True- Nominal(. . .) ’ I 0 - ~ 1 I 1 o1 1 0‘ Frequency (rawsec) Figure 8: Fitted additive weighting function for Case 1 (. . .), Case 2(--), Case 3(-.) ’ Frequency (rad/sec) Figure 5: Case 1: Additive unc bounds (0) and SV frequency responses - True( -), Nominal( --), True- Nominal(. . .) m $Io1 2 10-~1 I 1 o1 1 0’ Frequency (radlsec) Figure 6: Case 2: Additive unc bounds ( 0 ) and SV frequency responses - True( -), Nominal( --), True- Nominal(. . .) m $Io1 2 10-~1 I 1 o1 1 0’ Frequency (radlsec) Figure 8: Fitted additive weighting function for Case 1 (. . .), Case 2(--), Case 3(-.) References Lim, K.B., Balas, G. J., and Anthony, T.C., “Minimum- norm model validating identification for robust control,” AIAA Paper No. 96-3717. Lim, K.B., “Closed form solution for minimum norm model validating uncertainty,” 1997 American Control Con feren ce, Albuquerque, NM . Frequency (radlsec) Frequency (radlsec) Lim, K.B., Cox, D.E., Balas, G.J., and Juang, J-N., “Val- idation of an experimentally derived uncertainty model,” AIAA Journal of Guidance, Control, and Dynamics, v.21, no.2, 1998. Figure 6: Case 2: Additive unc bounds ( 0 ) and SV frequency responses - True( -), Nominal( --), True- Nominal(. . .) Smith, R.S., Doyle, J.C., “Model Validation: A connec- tion between robust control and identification,” IEEE Transactions on Automatic Control, vol37, No 7, July 1992, pp.942-952. Kumar, A., and Balas, G.J., “A scaling approach to model validation in the /I framework,” 1995 American Control Conference, pp.693-697. 5 Conclusion Balas, G.J., Doyle, J.C., Glover, K., Packard, A., and Smith, R., p-Analysis and Synthesis Toolbox, MUSYN Inc., Minneapolis, MN, 1994. A new algorithm is presented for identifying both non para- metric uncertainties and repeated scalar uncertainties. The algorithm uses a minimax search which is constrained to all fictitious input/output uncertainty signal sets that zero out output errors for a nominal model. This development extends an earlier method involving a minimum norm model validating approach. Morton, B., and McAfoos, R., “A Mu-test for real param- eter variations,” 1985 American Control Conference, Boston, MA. Branch, M.A., and A. Grace, Optimization Toolbox, The Mathworks, Inc., Natick, MA, December 1996. 2 1022
https://openalex.org/W2948057274
https://europepmc.org/articles/pmc6600244?pdf=render
English
null
Improved Carotenoid Processing with Sustainable Solvents Utilizing Z-Isomerization-Induced Alteration in Physicochemical Properties: A Review and Future Directions
Molecules/Molecules online/Molecules annual
2,019
cc-by
13,288
Improved Carotenoid Processing with Sustainable Solvents Utilizing Z-Isomerization-Induced Alteration in Physicochemical Properties: A Review and Future Directions Masaki Honda 1,* , Hakuto Kageyama 1 , Takashi Hibino 1, Yelin Zhang 2, Wahyu Diono 2 , Hideki Kanda 2 , Ryusei Yamaguchi 3, Ryota Takemura 4, Tetsuya Fukaya 4,5,* and Motonobu Goto 2,* 1 Faculty of Science & Technology, Meijo University, Shiogamaguchi, Tempaku-ku, Nagoya 468-8502, Japan; kageyama@meijo-u.ac.jp (H.K.); hibino@meijo-u.ac.jp (T.H.) 1 Faculty of Science & Technology, Meijo University, Shiogamaguchi, Tempaku-ku, Nagoya 468-8502 k @ ij j (H K ) hibi @ ij j (T H ) 1 Faculty of Science & Technology, Meijo University, Shiogamaguchi, Tempaku-ku, Nagoya 468-8502, Japan; kageyama@meijo-u.ac.jp (H.K.); hibino@meijo-u.ac.jp (T.H.) 2 Department of Materials Process Engineering, Nagoya University, Furo-cho, Chikusa-ku, Nagoya 464-8603, Japan; zhang.yelin@c.mbox.nagoya-u.ac.jp (Y.Z.); wahyudiono@b.mbox.nagoya-u.ac.jp (W.D.); kanda.hideki@material.nagoya-u.ac.jp (H.K.) 3 Technical Center, Nagoya University, Furo-cho, Chikusa-ku, Nagoya 464-8603, Japan; yamaguchi.ryusei@i.mbox.nagoya-u.ac.jp 4 Innovation Division, Kagome Company, Limited, Nishitomiyama, Nasushiobara 329-2762, Japan; Ryota_Takemura@kagome.co.jp 5 Institutes of Innovation for Future Society, Nagoya University, Furo-cho, Chikusa-ku, N 464 8603 J 5 Institutes of Innovation for Future Society, Nagoya University, Furo-cho, Chikusa-ku Nagoya 464-8603, Japan * Correspondence: honda@meijo-u.ac.jp (M.H.); Tetsuya_Fukaya@kagome.co.jp (T.F.); goto.motonobu@material.nagoya-u.ac.jp (M.G.); Tel.: +81-52-838-2284 (M.H.); +81-287-36-2935 (T.F.); +81-52-789-3392 (M.G.)   Academic Editor: Monica Nardi Academic Editor: Monica Nardi Received: 8 April 2019; Accepted: 5 June 2019; Published: 7 June 2019 ved: 8 April 2019; Accepted: 5 June 2019; Published: 7 Abstract: Carotenoids—natural fat-soluble pigments—have attracted considerable attention because of their potential to prevent of various diseases, such as cancer and arteriosclerosis, and their strong antioxidant capacity. They have many geometric isomers due to the presence of numerous conjugated double bonds in the molecule. However, in plants, most carotenoids are present in the all-E-configuration. (all-E)-Carotenoids are characterized by high crystallinity as well as low solubility in safe and sustainable solvents, such as ethanol and supercritical CO2 (SC-CO2). Thus, these properties result in the decreased efficiency of carotenoid processing, such as extraction and emulsification, using such sustainable solvents. On the other hand, Z-isomerization of carotenoids induces alteration in physicochemical properties, i.e., the solubility of carotenoids dramatically improves and they change from a “crystalline state” to an “oily (amorphous) state”. For example, the solubility in ethanol of lycopene Z-isomers is more than 4000 times higher than the all-E-isomer. Recently, improvement of carotenoid processing efficiency utilizing these changes has attracted attention. Namely, it is possible to markedly improve carotenoid processing using safe and sustainable solvents, which had previously been difficult to put into practical use due to the low efficiency. molecules molecules 1. Introduction 1. Introduction Chemical structures of (A) (all-E)-lycopene, (B) (all-E)-β-carotene, (C) (all-E)-lutein, (D) (all- E)-astaxanthin, (E) (13Z)-astaxanthin, and (F) (9Z)-astaxanthin. Figure 1. Chemical structures of (A) (all-E)-lycopene, (B) (all-E)-β-carotene, (C) (all-E)-lutein, (D) (all-E)-astaxanthin, (E) (13Z)-astaxanthin, and (F) (9Z)-astaxanthin. Commercially available carotenoids are obtained by chemical syntheses or extraction from plants, photosynthetic bacteria, and microalgae. Generally, these carotenoids are in the all-E- configuration and the isomers are characterized by high crystallinity and low solubility in solvents [13,14]. Most carotenoid processing, such as extraction, micronization, and emulsification, employs a mediator—an organic solvent—to increase the processing efficiency. However, because of the physicochemical properties of (all-E)-carotenoids, processing efficiencies are low. Moreover, in recent years, there has been increased demand for the use of safe and sustainable solvents such as ethanol and supercritical CO2 (SC-CO2) for the processing of food components including carotenoids, i.e., environmentally benign processing using sustainable solvents is a topic of growing interest in both the research community and the food industry because of the growing awareness of the impact of solvents on energy usage, pollution, and their contribution to climate change and air quality [15–17]. However, since (all-E)-carotenoids have very low solubility in ethanol and SC-CO2 [18–21], toxic organic solvents are used in many cases. Very recently, several studies demonstrated that Z- isomerization of carotenoids induces alteration in physicochemical properties, such as crystallinity and solubility. Namely, solubility in solvents including SC-CO2 was dramatically improved and crystallinity was reduced by Z-isomerization. In addition, application of these alterations in Commercially available carotenoids are obtained by chemical syntheses or extraction from plants, photosynthetic bacteria, and microalgae. Generally, these carotenoids are in the all-E-configuration and the isomers are characterized by high crystallinity and low solubility in solvents [13,14]. Most carotenoid processing, such as extraction, micronization, and emulsification, employs a mediator—an organic solvent—to increase the processing efficiency. However, because of the physicochemical properties of (all-E)-carotenoids, processing efficiencies are low. Moreover, in recent years, there has been increased demand for the use of safe and sustainable solvents such as ethanol and supercritical CO2 (SC-CO2) for the processing of food components including carotenoids, i.e., environmentally benign processing using sustainable solvents is a topic of growing interest in both the research community and the food industry because of the growing awareness of the impact of solvents on energy usage, pollution, and their contribution to climate change and air quality [15–17]. 1. Introduction 1. Introduction Carotenoids are a class of lipid-soluble pigments responsible for the colors of plants, animals, and microorganisms [1–4]. Since the first structural elucidation of β-carotene by Kuhn and Karrer in the 1930s, approximately 1100 natural carotenoids have been reported so far [5]. Carotenoids can be classified into the following two groups based on their chemical composition: (1) carotenes, nonoxygenated molecules such as lycopene and β-carotene and (2) xanthophylls, molecules containing oxygen such as lutein and astaxanthin. (Figure 1) [4,6]. The daily consumption of carotenoid-rich foods, such as fruits and vegetables, is considered to be beneficial for human health because of their high antioxidant, anticancer, and antiatherosclerotic activities [7–9]. As carotenoids contain multiple conjugated double bonds, numerous geometric isomers are theoretically possible. While carotenoids in plants are accumulated predominantly as the all-E-configuration (Figure 1A–D), Z-isomers of carotenoids (Figure 1E,F) exist in abundance in the human body and in processed foods. For example, more than 50 and 30% of total lycopene are present as Z-isomers in human blood plasma and processed tomato products such as tomato sauce and tomato soup, respectively [10–12]. Carotenoids are a class of lipid-soluble pigments responsible for the colors of plants, animals, and microorganisms [1–4]. Since the first structural elucidation of β-carotene by Kuhn and Karrer in the 1930s, approximately 1100 natural carotenoids have been reported so far [5]. Carotenoids can be classified into the following two groups based on their chemical composition: (1) carotenes, nonoxygenated molecules such as lycopene and β-carotene and (2) xanthophylls, molecules containing oxygen such as lutein and astaxanthin. (Figure 1) [4,6]. The daily consumption of carotenoid-rich foods, such as fruits and vegetables, is considered to be beneficial for human health because of their high antioxidant, anticancer, and antiatherosclerotic activities [7–9]. As carotenoids contain multiple conjugated double bonds, numerous geometric isomers are theoretically possible. While carotenoids in plants are accumulated predominantly as the all-E-configuration (Figure 1A– D), Z-isomers of carotenoids (Figure 1E,F) exist in abundance in the human body and in processed foods. For example, more than 50 and 30% of total lycopene are present as Z-isomers in human blood plasma and processed tomato products such as tomato sauce and tomato soup, respectively [10–12]. Figure 1. Chemical structures of (A) (all-E)-lycopene, (B) (all-E)-β-carotene, (C) (all-E)-lutein, (D) (all- E)-astaxanthin, (E) (13Z)-astaxanthin, and (F) (9Z)-astaxanthin. Figure 1. Chemical structures of (A) (all-E)-lycopene, (B) (all-E)-β-carotene, (C) (all-E)-lutein, (D) (all-E)-astaxanthin, (E) (13Z)-astaxanthin, and (F) (9Z)-astaxanthin. Figure 1. Improved Carotenoid Processing with Sustainable Solvents Utilizing Z-Isomerization-Induced Alteration in Physicochemical Properties: A Review and Future Directions The objective of this paper is to review the effect of Z-isomerization on the physicochemical properties of carotenoids and its application to carotenoid processing, such as extraction, micronization, and emulsification, using sustainable solvents. Moreover, aspects of Z-isomerization methods for carotenoids and functional difference, such as bioavailability and antioxidant capacity, between isomers are also included in this review. Keywords: lycopene; β-carotene; astaxanthin; E/Z-isomerization; solubility; crystallinity; extraction; emulsification; micronization; supercritical CO2 Molecules 2019, 24, 2149; doi:10.3390/molecules24112149 www.mdpi.com/journal/molecules Molecules 2019, 24, 2149 M l l 2019 24 2 of 19 2 of 19 2. Typical Methods for Z-Isomerization of Carotenoids As the method for Z-isomerization of carotenoids, heat treatment, microwave treatment, light irradiation, electrolysis treatment, and catalytic treatment have been well documented to date (Table 1). (all-E)-Carotenoids, e.g., lycopene and astaxanthin, were efficiently isomerized to the Z-isomers by heating in organic solvents, especially alkyl halides such as dichloromethane (CH2Cl2) and dibromomethane (CH2Br2) [26–28]. The all-E-isomers were also thermally Z-isomerized in the presence of vegetable oils, animal fats, and SC-CO2 [12,21]. These results indicate that for Z-isomerization of (all-E)-carotenoids, it is important that the carotenoid is in a dissolved state. Microwave heating also promoted Z-isomerization [29–32], and several studies indicated the increased efficiency compared to conventional heating [29,30]. In the microwave treatment of (all-E)-lycopene-rich tomato oleoresin, the total Z-isomer content reached 65.9 ± 2.7% with 4-min irradiation at 2450 MHz frequency and 500 W power, and the temperature of the oleoresin reached 136.7 ± 6.6 ◦C at that time, while the total Z-isomer content with conventional oil bath heating at 140 ◦C for 5 min was 50.8 ± 3.2% [29]. Light irradiation also caused E/Z-isomerization of carotenoids. When carotenoids were directly exposed to light, Z-isomers of carotenoids isomerized to the all-E-isomers [33,34]. On the other hand, when light irradiation was carried out with photosensitizers, such as chlorophyll a and erythrosine, Z-isomerization of (all-E)-carotenoids was promoted [35,36]. For example, when purified (all-E)-lycopene dissolved in hexane in the presence of erythrosine was irradiated at 480–600 nm for 1 h, the proportion of lycopene Z-isomers reached over 80% [36]. A few studies have demonstrated that electrolysis treatment promoted Z-isomerization of (all-E)-carotenoids such as β-carotene and canthaxanthin [37,38]. This electrochemical method shows very high efficiency and can prevent thermal degradation of carotenoids, e.g., approximately 50% of (all-E)-canthaxanthin was converted to the Z-isomers during 4–6 min of bulk electrolysis at 4 ◦C [37]. Catalytic Z-isomerization of (all-E)-carotenoids have been traditionally conducted using iodine [39–41]. More recently, it was reported that disulfide compounds [29,42,43], isothiocyanates, carbon disulfide [42], iron(III) chloride [44], titanium tetrachloride [45], and iodine-doped titanium dioxide [46] induced Z-isomerization of carotenoids. For example, when iron(III) chloride, which is usually used as a food additive for iron fortification, was used, greater isomerization (79.9%) could be attained by a 3-h reaction at 60 ◦C, with almost no degradation of lycopene [44]. 1. Introduction 1. Introduction However, since (all-E)-carotenoids have very low solubility in ethanol and SC-CO2 [18–21], toxic organic solvents are used in many cases. Very recently, several studies demonstrated that Z-isomerization of carotenoids induces alteration in physicochemical properties, such as crystallinity and solubility. Namely, solubility in solvents including SC-CO2 was dramatically improved and crystallinity was reduced by Z-isomerization. In addition, application of these alterations in carotenoid processing using the above safe and sustainable solvents has attracted Molecules 2019, 24, 2149 3 of 19 attention. For example, Z-isomerization pretreatment significantly improved the extraction efficiency of lycopene contained in tomatoes and gac (Momordica cochinchinensis Spreng.) aril using organic solvents and SC-CO2 [18,19]. In this review, the effect of Z-isomerization on the physicochemical properties of carotenoids and recent researches on carotenoid processing technology exploiting these characteristics are summarized and discussed. In addition, we also outline the typical methods for Z-isomerization of carotenoids and alterations in the bioavailability and functionality of carotenoids by Z-isomerization. Ample studies have demonstrated that Z-isomerization of carotenoids results in changes to bioavailability and antioxidant capacity, e.g., Z-isomers of lycopene and astaxanthin have greater bioavailability and show a higher antioxidant capacity than the all-E-isomers [22–25]. Thus, it is important to have a thorough understanding of the impact of E/Z-isomerization on functional changes of carotenoids. 2. Typical Methods for Z-Isomerization of Carotenoids Although catalyst utilization for carotenoid isomerization is a very efficient method, most catalysts, such as iodine and heavy metals, exert a negative impact on the human body and the environment. Hence, in industrial view, the discovery and use of low toxicity and environmentally sustainable catalysts, e.g., plant-derived natural catalysts such as disulfide compounds and isothiocyanates, will be of great importance [29,42,43,47–49]. As shown in Table 1, each Z-isomerization method has several advantages and disadvantages; consequently, it is necessary to select the appropriate Z-isomerization method according to the circumstances. 4 of 19 Molecules 2019, 24, 2149 Table 1. Summary of representative methods for Z-isomerization of carotenoids and their advantages and disadvantages. Method Reported Carotenoid Advantage Disadvantage Reference Heat treatment Lycopene, β-carotene, astaxanthin, lutein, etc. • Simple and conventional method • Requires minimal amount of additive • Can cause thermal degradation [12,21,26–28] Microwave treatment Lycopene, β-carotene, astaxanthin, lutein, etc. • Simple and fast (few minutes) method • Requires minimal amount of additive • Can cause thermal degradation • Difficult to control final product quality • High cost of instrumentation [29–32] Light irradiation Lycopene, β-carotene, lutein, etc. • Rapid method • Non-thermal process • Low energy usage • Can cause light degradation • Need to add photosensitizers • Need to remove photosensitizers if toxic ones used • High cost of some photosensitizers [26,33–36] Electrolysis treatment β-Carotene, 8′-apo-β-caroten-8′-al, canthaxanthin • Simple and highly efficient method • Non-thermal process • Can prevent degradation during processing • High cost of instrumentation • Need to remove electrolyte substances if toxic ones used [37,38] Catalytic treatment Lycopene, β-carotene, astaxanthin, zeaxanthin, etc. • Simple and highly efficient method • Can prevent degradation during the processing • Low energy usage • Need to remove catalysts if toxic ones used • Can promote degradation in some catalysts • High cost of some catalysts [29,39–46] . Effect of Z-Isomerization on Bioavailability and Functionality of Carotenoids Table 1. Summary of representative methods for Z-isomerization of carotenoids and their advantages and disadvantages. 3. Effect of Z-Isomerization on Bioavailability and Functionality of Carotenoids ffect of Z-Isomerization on Bioavailability and Functionality of Carotenoids . Effect of Z-Isomerization on Bioavailability and Functionality of Carotenoids Ample studies have addressed the alterations in bioavailability and functionality, such as antioxidant, anticancer, and antiatherosclerotic activities, of carotenoids by Z-isomerization (Table 2). Further, the alterations differed among carotenoids. Z-Isomers of lycopene and astaxanthin showed greater bioavailability than the all-E-isomers [22,23,25,50–53]. For example, investigation of the effect of red tomato juice (90% all-E-isomer lycopene) and tangerine tomato juice (94% Z-isomer lycopene) ingestion on plasma lycopene concentrations revealed that lycopene from tangerine tomato juice showed approximately 8.5-fold greater bioavailability than lycopene from red tomato juice [22]. On the other hand, some carotenoid Z-isomers, such as β-carotene and lutein, may be less bioavailable than the all-E-isomers [54–62]. In general, the bioavailability of carotenoids is very low because they are strongly bound to the food matrix and because of their physicochemical characteristics, such as low solubility, high crystallinity, and lipophilicity [4,13,14]. Thus, to improve the bioavailability of carotenoids contained in fruits and vegetables, physical treatments, such as high-pressure homogenization and ultrasound treatment, have been traditionally studied [63]. In some carotenoids, such as lycopene and astaxanthin, by combining chemical approaches such as Z-isomerization treatment and the above physical approaches, it may be possible to further improve the bioavailability. Depending on the assay method, many studies have reported that Z-isomers of carotenoids have equal or higher antioxidant capacity compared with the all-E-isomers [24,25,46,63–70]. Böhm et al. (2002) [64] reported that Z-isomers of lycopene exhibited approximately 1.2 times higher antioxidant capacities than the all-E-isomer in the Trolox equivalent antioxidant capacity (TEAC) assay. In heme-induced peroxidation of linoleic acid in mildly acidic emulsions, which mimics postprandial lipid oxidation in the gastric compartment (MbFeIII-LP) assay, (5Z)-lycopene showed approximately 3 times higher antioxidant capacity than the all-E-isomer [24]. In contrast, when antioxidant capacity 5 of 19 Molecules 2019, 24, 2149 was evaluated by the TEAC assay, (9Z)-zeaxanthin exhibited lower capacity than the all-E-isomer [64]. The degree of antioxidant capacity varied among Z-isomers, e.g., that of lutein isomers was higher in the order of 13Z-isomer > 9Z-isomer > all-E-isomer with the ferric reducing antioxidant power (FRAP) assay [62]. Carotenoid Z-isomers are likely to be superior to the all-E-isomers in preventative effects on atherosclerosis, cancer, and inflammatory [71–76]. For example, (9Z)-β-carotene contained in the microalgae Dunaliella sp. showed higher antiatherogenic [71] and antiatherosclerotic [72,73] activities than the all-E-isomer in mouse experiments. 3. Effect of Z-Isomerization on Bioavailability and Functionality of Carotenoids (9Z)-Canthaxanthin isolated from Dietzia sp. exhibited higher proapoptotic activity than the all-E-isomer in THP-1 macrophages [74]. Nakazawa et al. (2009) [75] reported that Z-isomers of fucoxanthin had greater anticancer activity than the all-E-isomer in human promyelocytic leukemia (HL-60) and colon cancer (Caco-2) cells. Very recently, Yang et al. (2019) [76] showed that Z-isomers of astaxanthin, especially the 9Z-isomer, exhibited greater antiinflammatory effect than the all-E-isomer by downregulating proinflammatory cytokines COX-2 and TNF-α gene expression, which was evaluated in a Caco-2 cell monolayer model. As another notable functional change by carotenoid Z-isomerization, Z-isomers of β-carotene, which is a very important retinol precursor with a high conversion rate, showed lower conversion efficiencies to retinol than the all-E-isomer [77,78]. The antiaging activity would also differ among astaxanthin isomers. Namely, the median lifespan of Caenorhabditis elegans fed with 9-Z-, 13-Z-, and all-E-isomers was observed to increase by 59.39%, 24.99%, and 30.43%, respectively [79]. Moreover, Fenni et al. (2019) [80] reported that lycopene isomers exert similar biological functions in adipocytes, linked to their ability to transactivate PPARγ. Since Z-isomerization had “positive” or “negative” effects on the bioavailability and functionality of carotenoids (Table 2), it is important to have a detailed understanding of the impact of E/Z-isomerization on corresponding functional changes. 6 of 19 Molecules 2019, 24, 2149 Table 2. Comparison of the bioavailability and functionality of all-E- and Z-isomers of carotenoids. 3. Effect of Z-Isomerization on Bioavailability and Functionality of Carotenoids Carotenoid Bioavailability Antioxidant Capacity Other Functionality Lycopene • E a < Z b (Oral study in humans) [22,50] • E < Z (Oral study in ferrets) [51] • E < Z (Caco-2 cell model) [52] • E < Z (Diffusion model) [53] • E ≤Z (TEAC assay) [24,64] • E < Z (LPSC assay) [24] • E ≤Z (MbFeIII-LP assay) [24] • E ≈Z (FRAP assay) [24] Antiobesity activity: • E ≈5Z (Adipocyte model) [80] α-Carotene – • 13′Z > E ≈9′Z > 9Z ≈13Z (TEAC assay) [64] – β-Carotene • E > 9Z (Oral study in humans) [54–58] • E > Z (Oral study in ferrets) [59] • E > Z (Oral study in gerbils) [60] • E > Z (Caco-2 cell model) [61] • E < Z (Digestion model) [81] • E < Z (Oral study in rats) [65] • E ≈Z (TEAC assay) [64] • E ≈9Z ≈13Z > 15Z (TEAC assay) [66] • E ≈Z (FRAP assay) [66] • E ≈9Z ≈13Z > 15Z (CL assay) [66] Antiatherogenesis activity: • E < 9Z (Oral study in mice) [71] Antiatherosclerosis activity: • E < 9Z (Oral study in mice) [72,73] Astaxanthin • E ≤Z (Oral study in humans) [23] • E < Z (Caco-2 cell model) [25] • E < Z (Digestion model) [25] • E < Z (DPPH assay) [46,67] • E < Z (ORAC assay) [46] • E < Z (PLC assay) [46] • E < Z (Enzyme activity assay) [25] • E < Z (Lipid- peroxidation assay) [67] Antiinflammatory activity: • E < Z (Caco-2 cell model) [76] Antiaging activity: • 9Z > E > 13Z (Caenorhabditis elegans model) [79] Canthaxanthin – • E < 9Z (DPPH assay) [68] • E < 9Z (Fluorescence assay) [68] Proapoptotic activity: • E < 9Z (THP-1 macrophage model) [74] Fucoxanthin – • E < Z (DPPH assay) [69] • 13Z and 13′Z > E > 9′Z (DPPH assay) [70] • 13Z and 13′Z > E > 9′Z (Superoxide-detection assay) [70] • 9′Z > E > 13Z and 13′Z (ABTS assay) [70] • 9′Z > E > 13Z and 13′Z (Hydroxyl radical-scavenging assay) [70] Anticancer activity: • E < Z (Caco-2 cell model) [75] • E < Z (HL-60 cell model) [75] Lutein • E > Z (Caco-2 cell model) [62] • E < Z (Digestion model) [62] • E < Z (FRAP assay) [62] • 13′Z > E ≈9Z (DPPH assay) [62] • 13′Z > E ≈9Z (ORAC assay) [62] • E ≈Z (CAA assay) [62] – Zeaxanthin – • E ≈13Z > 9Z (TEAC assay) [64] – a all-E-isomer of carotenoid. 4. Effect of Z-Isomerization on Physicochemical Properties of Carotenoids The Z-isomerization of (all-E)-carotenoids induces change in physicochemical properties such as color, solubility, crystallinity, melting point, and stability. Z-Isomerization of carotenoids resulted in a shift in absorption to a shorter wavelength and a reduction in the molar extinction coefficient and color value [27,46,82,83]. For example, Jing et al. (2012) [83] reported that maximum absorption wavelengths of (all-E)-, (9Z)-, and (13Z)-β-carotene were 451.4, 446.4, and 439.1 nm, respectively. The molar extinction coefficients of (all-E)-, (9Z)-, and (13Z)-lycopene at the maximum absorption wavelengths were 182 × 103, 164 × 103, and 137 × 103 M−1 cm−1, respectively [27]. In fact, tomatoes rich in (all-E)-lycopene show a red color, whereas tomatoes rich in the Z-isomers, known as tangerine tomatoes, show an orange color [22]. Several studies reported that Z-isomers of carotenoids had much higher solubility than the all-E-isomers in organic solvents, oils, and SC-CO2 [13,14,18–21,84,85]. Although the solubility of (all-E)-lycopene in ethanol, acetone, ethyl acetate, and hexane was 0.6, 42.7, 145.3, and 25.6 mg/mL, respectively, that of lycopene containing 75.6% Z-isomers was 2401.7, 3702.9, 3961.1, and 3765.2 mg/mL, respectively [13]. Namely, in the case of ethanol, which is frequently used for food processing such as extraction and purification, the solubility of lycopene Z-isomers was over 4000 times higher than that of the all-E-isomer. Also, in SC-CO2, the solubility of (9Z)-β-carotene was nearly four times higher than that of the all-E-isomer [84], and lycopene Z-isomers also showed higher solubility than the all-E-isomer [19,21]. The increased solubility of carotenoids by Z-isomerization is likely to be associated with changes in bioavailability. Generally, carotenoids are absorbed from the duodenum and prior to the absorption they are incorporated into bile acid micelles [86]. Thus, since carotenoid Z-isomers may have higher solubility in bile acid than all-E-isomers, they are preferentially incorporated into enterocytes and show higher bioavailability [51,87]. On the other hand, Z-isomers of β-carotene exhibit lower bioavailability in humans than the all-E-isomer [54–58]. Several proteins, which are temporarily present at the apical membrane of the duodenum, mediate selective carotenoid uptake [86]. Therefore, β-carotene Z-isomers may be efficiently incorporated into bile acid micelles due to their high solubility, but may have lower transport efficiency in the duodenum than the all-E-isomer. In vitro experiments using Caco-2 cells strongly support the above hypothesis. Namely, Z-isomers of lycopene and astaxanthin showed higher cellular uptake efficiency than the all-E-isomers [25,52], while the opposite result was obtained for β-carotene [61]. Similarly, Yang et al. 3. Effect of Z-Isomerization on Bioavailability and Functionality of Carotenoids b Z-isomer of carotenoid. able 2. Comparison of the bioavailability and functionality of all-E- and Z-isomers of carotenoids. Molecules 2019, 24, 2149 7 of 19 4. Effect of Z-Isomerization on Physicochemical Properties of Carotenoids (2018) [62] reported that in vitro experiments using a digestion model shown higher bioaccessibility of lutein Z-isomers than the all-E-isomer, while a Caco-2 cell monolayer model revealed lower bioavailability. y y Z-Isomerization of carotenoids affects the crystallinity. Murakami et al. (2017) [13] and Honda et al. (2018) [14] experimentally revealed that increases in the Z-isomer content of lycopene, β-carotene, and astaxanthin was related to a reduction in crystallinity, i.e., scanning electron microscopy (SEM), differential scanning calorimetry (DSC), and powder X-ray diffraction (XRD) analyses clearly demonstrated that (all-E)-carotenoids were present in a crystal state, while Z-isomers were present in an amorphous state. Carotenoids have multiple conjugated double bonds in the molecule, resulting in strong π–π stacking interactions between molecules. For this reason, carotenoids have high crystallinity. However, the presence of Z-isomers is suggested to lead to enormous steric hindrance and decrease the potential attractive π–π forces, thus affecting the crystallinity [13,88]. Generally, carotenoids in fresh plants occur predominantly in the (all-E)-configuration, and (all-E)-carotenoids are present in the crystal state. On the other hand, some plants, such as tangerine tomato and peach palm (Bactris gasipaes Kunth), contain high amounts of carotenoid Z-isomers that are present in an oily aggregate form [22,89]. Similarly, 9Z-isomer-rich β-carotene contained in Dunaliella was in the oily form [90]. The melting point of carotenoids was altered by Z-isomerization, i.e., increases in the Z-isomer content were associated with a lower melting point [13,14,85,91]. For example, the melting point of (all-E)-lycopene and lycopene containing 23.8, 46.9, and 75.6% Z-isomers was 174.4, 173.7, 170.0, and 162.3 ◦C, respectively, as measured by DSC [13]. Molecules 2019, 24, 2149 8 of 19 The stability of carotenoids varies among isomers, i.e., (all-E)-carotenoids had higher stability than the Z-isomers. Several studies investigated the stability of carotenoid isomers using a Gaussian program and revealed that Gibbs free energy differed among the isomers [82,92–94]. For example, Takehara et al. (2015) [93] reported that the relative stability of lycopene isomers was in the following order; all-E-isomer ≈5Z-isomer > 9Z-isomer > 13Z-isomer > 15Z-isomer, and Guo et al. (2008) [94] reported that the relative stability of β-carotene isomers was in the following order; all-E-isomer > 9Z-isomer > 13Z-isomer > 15Z-isomer > 7Z-isomer ≈11Z-isomer. Murakami et al. (2018) [33] experimentally confirmed the above for lycopene. 5. Improvement of Carotenoid Processing Efficiency by Z-Isomerization In recent years, due to the discovery of altered physicochemical properties of carotenoids by Z-isomerization, efforts to improve the efficiency of carotenoid processing by exploiting these alterations has attracted attention. In particular, carotenoid processing using a safe and sustainable solvent—SC-SO2—as a mediator is being actively studied. Since natural carotenoids, the all-E-isomer, exhibit very low solubility in SC-SO2, there is a high hurdle for its industrial use in carotenoid processing. However, utilizing alterations in the physical properties by Z-isomerization represents a breakthrough. In this section, we introduce recent studies of carotenoid processing (extraction, micronization, and emulsification) utilizing alterations in solubility and crystallinity of carotenoids by Z-isomerization. 4. Effect of Z-Isomerization on Physicochemical Properties of Carotenoids Furthermore, they investigated the stability of lycopene isomers against light irradiation, and the stability was in the following order; all-E-isomer ≈ 5Z-isomer > 9Z-isomer > 13Z-isomer > multi-Z-isomers. As for lycopene Z-isomers, the 5Z-isomer showed the highest stability against heat and light. In addition, (5Z)-lycopene would have higher antioxidant capacity [24] and bioavailability [95] compared with the all-E-isomer and possibly the 9Z- and 13Z-isomers. Therefore, it is important to develop a facile procedure for lycopene isomerization from the all-E-isomer to the 5Z-isomer. The differences in physicochemical properties between (all-E)-carotenoids and Z-isomers are summarized in Table 3. A systematic understanding of these carotenoid properties is likely to be important in the analysis, processing, and so on. Table 3. Differences in physicochemical properties between (all-E)-carotenoids and Z-isomers. Color Value Solubility Crystallinity Melting Point Stability E a > Z b E < Z E > Z E > Z E > Z a all-E-isomer of carotenoid. b Z-isomer of carotenoid. Table 3. Differences in physicochemical properties between (all-E)-carotenoids and Z-isomers. Color Value Solubility Crystallinity Melting Point Stability E a > Z b E < Z E > Z E > Z E > Z a all-E-isomer of carotenoid. b Z-isomer of carotenoid. Table 3. Differences in physicochemical properties between (all-E)-carotenoids and Z-isomers. 5.1. Improvement of Carotenoid Extraction Generally, commercially available natural carotenoids, which are obtained from plants and microorganisms by solvent extraction and utilized for supplements, food colorants, and cosmetics, are very expensive [96–99]. This is because carotenoids in plants and microorganisms accumulate predominantly in the all-E-configuration, whose isomers have low solubility in solvents, resulting in very low extraction efficiencies. For example, extraction of lycopene from tomato pulp with ethanol and SC-CO2 showed a recovery of only 6.3 and 6.5%, respectively [19]. However, when the extractions were conducted after Z-isomerization treatment, the recovery was notably improved to 75.9 and 27.6%, respectively [19]. More specifically, the total Z-isomer content of lycopene in tomato pulp was 8.8%, whereas it increased to 75.7% by heating at 150 ◦C for 1 h with a small amount (1 wt%) of olive oil. After ethanol extraction of lycopene from the Z-isomer-rich tomato pulp, the obtained extract had a very high Z-isomer content (93.5%), while almost all lycopene in the extraction residue was the all-E-isomer. These results strongly indicated that lycopene Z-isomers have higher solubility in solvents than the all-E-isomer; thus, the extraction efficiency was improved. In addition, since the Z-isomer content of carotenoids in the obtained extract was improved by Z-isomerization pretreatment, 9 of 19 Molecules 2019, 24, 2149 the treatment is effective not only for the production of carotenoid concentrates but also for increasing the bioavailability and functionality of carotenoids (Figure 2). The improved extraction efficiency was also confirmed in gac (M. cochinchinensis Spreng.) aril [18]. Gac is a tropical vine originating from South and South-East Asia and belongs to the Cucurbitaceae family, and the aril (seed membrane) contains a very high amount of lycopene [100,101]. Since gac aril contains a large amount of oil (18–34% of dry weight) rich in lycopene, lycopene is often obtained by press extraction with the oil [102]. Although more than 90% of lycopene exists as the all-E-isomer in gac aril, the total Z-isomer content increased by 58.5% with microwave irradiation at 1050 W for 60 s. When lycopene was obtained by press extraction with gac oil from non-microwave pretreated and treated gac aril, lycopene contents in the obtained oils were 160.6 and 1365.9 mg/100 g, respectively. Thus, Z-isomers of carotenoids show higher solubility in oils than the all-E-isomer. Moreover, Z-isomerization pretreatment of gac aril was also effective for lycopene extraction using ethanol and SC-CO2. 5.1. Improvement of Carotenoid Extraction For example, when lycopene was extracted using SC-CO2 from the non-treated gac aril, the lycopene content in the extract was only 76.6 mg/100 g, whereas Z-isomerization pretreatment by microwave irradiation resulted in a lycopene content of 342.0 mg/100 g. As the extraction efficiency of carotenoids is improved by Z-isomerization pretreatment, the development of efficient Z-isomerization methods for carotenoids in plants is very important in the future. On the other hand, several plants and microalgae such as tangerine tomato and Dunaliella contain a high amount of carotenoid Z-isomers [22,71,72]. Thus, carotenoids should be efficiently extracted using these raw materials. In fact, Gamlieli-Bonshtein et al. (2002) [84] reported that (9Z)-β-carotene in Dunaliella exhibited nearly 4 times higher extraction efficiency by SC-CO2 than the all-E-isomer. Pretreatments of samples by physical and chemical approaches such as grinding, osmotic shock, bead-beating, high-pressure homogenization, and enzymatic treatment are effective in releasing carotenoids from complex matrices, and have been performed in basic and applied studies [103,104]. On the other hand, Z-isomerization pretreatment is a new technology reported very recently. By combing traditional physical and chemical pretreatments and Z-isomerization pretreatment, further improvement of carotenoid extraction can be expected. In addition, when the Z-isomerization pretreatment is used in combination with several extraction technique, such as pulsed electric field-assisted extraction, microwave-assisted extraction, and ultrasonic-assisted extraction, synergistic effects are expected [105–109]. Molecules 2019, 24, x 9 of 19 contains a very high amount of lycopene [100,101]. Since gac aril contains a large amount of oil (18– 34% of dry weight) rich in lycopene, lycopene is often obtained by press extraction with the oil [102]. Although more than 90% of lycopene exists as the all-E-isomer in gac aril, the total Z-isomer content increased by 58.5% with microwave irradiation at 1050 W for 60 s. When lycopene was obtained by press extraction with gac oil from non-microwave pretreated and treated gac aril, lycopene contents in the obtained oils were 160.6 and 1365.9 mg/100 g, respectively. Thus, Z-isomers of carotenoids show higher solubility in oils than the all-E-isomer. Moreover, Z-isomerization pretreatment of gac aril was also effective for lycopene extraction using ethanol and SC-CO2. For example, when lycopene was extracted using SC-CO2 from the non-treated gac aril, the lycopene content in the extract was only 76.6 mg/100 g, whereas Z-isomerization pretreatment by microwave irradiation resulted in a lycopene content of 342.0 mg/100 g. 5.1. Improvement of Carotenoid Extraction As the extraction efficiency of carotenoids is improved by Z- isomerization pretreatment, the development of efficient Z-isomerization methods for carotenoids in plants is very important in the future. On the other hand, several plants and microalgae such as tangerine tomato and Dunaliella contain a high amount of carotenoid Z-isomers [22,71,72]. Thus, carotenoids should be efficiently extracted using these raw materials. In fact, Gamlieli-Bonshtein et al. (2002) [84] reported that (9Z)-β-carotene in Dunaliella exhibited nearly 4 times higher extraction efficiency by SC-CO2 than the all-E-isomer. Pretreatments of samples by physical and chemical approaches such as grinding, osmotic shock, bead-beating, high-pressure homogenization, and enzymatic treatment are effective in releasing carotenoids from complex matrices, and have been performed in basic and applied studies [103,104]. On the other hand, Z-isomerization pretreatment is a new technology reported very recently. By combing traditional physical and chemical pretreatments and Z-isomerization pretreatment, further improvement of carotenoid extraction can be expected. In addition, when the Z-isomerization pretreatment is used in combination with several extraction technique, such as pulsed electric field-assisted extraction, microwave-assisted extraction, and ultrasonic-assisted extraction, synergistic effects are expected [105–109] y g p Figure 2. Schematic chart showing extraction of lycopene from plant material by solvents in the case of using (all-E)-lycopene and lycopene Z-isomers as the raw materials [18,19]. Figure 2. Schematic chart showing extraction of lycopene from plant material by solvents in the case of using (all-E)-lycopene and lycopene Z-isomers as the raw materials [18,19]. Figure 2. Schematic chart showing extraction of lycopene from plant material by solvents in the case of using (all-E)-lycopene and lycopene Z-isomers as the raw materials [18,19]. Figure 2. Schematic chart showing extraction of lycopene from plant material by solvents in the case of using (all-E)-lycopene and lycopene Z-isomers as the raw materials [18,19]. 5.2. Improvement of Carotenoid Micronization 5.2. Improvement of Carotenoid Micronization Ample studies have reported that micronization of carotenoids results in their increased bioavailability [110,111]. Generally, carotenoid micronization is conducted by milling, grinding, and chemical precipitation [112–114]. However, there are some concerns regarding the above conventional methods, as carotenoids are easily decomposed by friction heat and oxygen contact. In addition, when using chemical processes, toxic organic solvents may remain. Thus, in recent years, micronization of carotenoids using SC-CO2 has attracted increasing attention. Since CO2 is nontoxic Ample studies have reported that micronization of carotenoids results in their increased bioavailability [110,111]. Generally, carotenoid micronization is conducted by milling, grinding, and chemical precipitation [112–114]. However, there are some concerns regarding the above conventional methods, as carotenoids are easily decomposed by friction heat and oxygen contact. In addition, when using chemical processes, toxic organic solvents may remain. Thus, in recent years, micronization of carotenoids using SC-CO2 has attracted increasing attention. Since CO2 is 10 of 19 Molecules 2019, 24, 2149 nontoxic and has a low critical temperature (Tc = 31.1 ◦C), it is suitable for heat-sensitive materials such as carotenoids, and SC-CO2 is easily separated from the products along with the toxic organic solvent [115,116]. To the best of our knowledge, improved micronization efficiency of carotenoids utilizing alterations in the physicochemical properties by Z-isomerization has been reported only for the method using SC-CO2 [117]. Particle micronization techniques using SC-CO2, supercritical antisolvent (SAS), solution-enhanced dispersion by supercritical fluids (SEDS), rapid expansion of supercritical solutions (RESS), gas antisolvent (GAS), supercritical fluid extraction of emulsions (SFEE), and particles from gas saturated solutions (PGSS) have been well-documented [118–122]. Several studies have examined the micronization of carotenoids using the above techniques; however, there was difficulty in obtaining nano-sized carotenoid particles [123–125]. For example, Tavares-Cardoso et al. (2009) [125] conducted micronization of (all-E)-β-carotene using a SAS process under various conditions; however, nano-sized β-carotene particles could not be obtained. This is likely because of the high crystallinity of carotenoids. On the other hand, Kodama et al. (2018) [117] successfully prepared nano-sized lycopene by SEDS precipitation using lycopene Z-isomers as the raw material. Namely, when using (all-E)-lycopene as the raw material, particles having an average size of 3.6 µm were obtained, whereas when using lycopene containing 97.8% Z-isomers, uniformly sized particles of an average size of 75 nm were obtained (Figure 3). The reason why nanoparticles were successfully formed from Z-isomers is due to the low crystallinity compared with the all-E-isomer. 5.2. Improvement of Carotenoid Micronization 5.2. Improvement of Carotenoid Micronization In addition, little has been reported on carotenoid micronization using RESS precipitation: the substance, which must be reduced in size, is dissolved in pure SC-CO2 and then the solution is suddenly depressurized through a nozzle and expands inside a chamber under lower pressure. This would be because carotenoids have extremely low solubility in pure SC-CO2. However, as Z-isomers of carotenoids have relatively high solubility in SC-CO2 [18,19,21,84], the Z-isomers would successfully form nano-sized particles by RESS precipitation, representing a micronization method without the use of organic solvents. Molecules 2019, 24, x 10 of 19 supercritical solutions (RESS), gas antisolvent (GAS), supercritical fluid extraction of emulsions (SFEE), and particles from gas saturated solutions (PGSS) have been well-documented [118−122]. Several studies have examined the micronization of carotenoids using the above techniques; however, there was difficulty in obtaining nano-sized carotenoid particles [123−125]. For example, Tavares-Cardoso et al. (2009) [125] conducted micronization of (all-E)-β-carotene using a SAS process under various conditions; however, nano-sized β-carotene particles could not be obtained. This is likely because of the high crystallinity of carotenoids. On the other hand, Kodama et al. (2018) [117] successfully prepared nano-sized lycopene by SEDS precipitation using lycopene Z-isomers as the raw material. Namely, when using (all-E)-lycopene as the raw material, particles having an average size of 3.6 μm were obtained, whereas when using lycopene containing 97.8% Z-isomers, uniformly sized particles of an average size of 75 nm were obtained (Figure 3). The reason why nanoparticles were successfully formed from Z-isomers is due to the low crystallinity compared with the all-E- isomer. In addition, little has been reported on carotenoid micronization using RESS precipitation: the substance, which must be reduced in size, is dissolved in pure SC-CO2 and then the solution is suddenly depressurized through a nozzle and expands inside a chamber under lower pressure. This would be because carotenoids have extremely low solubility in pure SC-CO2. However, as Z-isomers of carotenoids have relatively high solubility in SC-CO2 [18,19,21,84], the Z-isomers would successfully form nano-sized particles by RESS precipitation, representing a micronization method without the use of organic solvents. Figure 3. Schematic chart showing preparation of lycopene particles with supercritical CO2 (solution-enhanced dispersion by supercritical fluids), using (all-E)-lycopene and lycopene Z-isomers as the raw materials [117]. 5 3 I f C id E l ifi i Figure 3. 5.2. Improvement of Carotenoid Micronization 5.2. Improvement of Carotenoid Micronization Schematic chart showing preparation of lycopene particles with supercritical CO2 (solution-enhanced dispersion by supercritical fluids), using (all-E)-lycopene and lycopene Z-isomers as the raw materials [117]. ure 3. Schematic chart showing preparation of lycopene particles with supercritical CO2 (solution-enhan ersion by supercritical fluids), using (all-E)-lycopene and lycopene Z-isomers as the raw materials [117 I t f C t id E l ifi ti Figure 3. Schematic chart showing preparation of lycopene particles with supercritical CO2 (solution-enhanced dispersion by supercritical fluids), using (all-E)-lycopene and lycopene Z-isomers as the raw materials [117]. 5.3. Improvement of Carotenoid Emulsification I t t id f 5.3. Improvement of Carotenoid Emulsification 5.3. Improvement of Carotenoid Emulsification I t t id f 5.3. Improvement of Carotenoid Emulsification In recent years, as carotenoids are safe natural pigments that have health enhancing effects, their demand by the food industry is continuously increasing [126,127]. However, the low water solubility of carotenoids has made their use problematic for food formulations, limiting the favorable effects of carotenoids. Furthermore, the low water solubility of carotenoids reduces their bioavailability [128,129]. Therefore, improved dispersibility in water by emulsification is very important for the food industry and acts to increase their bioavailability. It is preferred that the suspended preparation contains nano-sized particles for higher dispersibility and bioavailability [111,130]. To obtain nanosuspensions of carotenoids, the following emulsification–evaporation technique is frequently used [131−133]: (1) Dissolution of carotenoids in an organic phase; (2) Distribution processing of the solution with water containing an emulsifier; (3) Solvent evaporation under reduced pressure. In this In recent years, as carotenoids are safe natural pigments that have health enhancing effects, their demand by the food industry is continuously increasing [126,127]. However, the low water solubility of carotenoids has made their use problematic for food formulations, limiting the favorable effects of carotenoids. Furthermore, the low water solubility of carotenoids reduces their bioavailability [128,129]. Therefore, improved dispersibility in water by emulsification is very important for the food industry and acts to increase their bioavailability. It is preferred that the suspended preparation contains nano-sized particles for higher dispersibility and bioavailability [111,130]. To obtain nanosuspensions of carotenoids, the following emulsification–evaporation technique is frequently used [131–133]: (1) Dissolution of carotenoids in an organic phase; (2) Distribution processing of the solution with 11 of 19 Molecules 2019, 24, 2149 water containing an emulsifier; (3) Solvent evaporation under reduced pressure. In this technique, it is important to select an appropriate distribution processing method, e.g., ultrasound treatment, high-speed homogenization, high-pressure homogenization, and microfluidizer treatment [131–136]. In addition, the selection of a solvent that can dissolve the target carotenoid is also a very important factor to efficiently produce carotenoid emulsions. However, since the degree of carotenoid solubility in safe and sustainable solvents, such as ethanol and supercritical SC-CO2, is very low [14,18,19,21,84], toxic solvents are used in many cases. To improve the emulsification efficiency of carotenoids using the sustainable solvent SC-CO2, Ono et al. (2018) [20] focused on increased carotenoid solubility in solvents by Z-isomerization. Namely, they investigated the impact of Z-isomer content on the production of β-carotene suspensions by the emulsification–evaporation technique. As the organic phase, they used SC-CO2 (Figure 4). 5.3. Improvement of Carotenoid Emulsification I t t id f 5.3. Improvement of Carotenoid Emulsification When β-carotene rich in Z-isomers (79.1% of total β-carotene) was used as the raw material, the encapsulated β-carotene content was notably increased compared with the all-E-isomer. For example, the encapsulated β-carotene content was 21.2 times higher after emulsification treatment by ultrasound at 45 kHz for 60 min. In addition, when (all-E)-β-carotene was used as the raw material, the mean particle size of the obtained suspension was approximately 700 nm, whereas that of β-carotene rich in Z-isomers was approximately 100 nm. Thus, Z-isomerization treatment before distributed processing is effective for the preparation of carotenoid suspensions by the emulsification–evaporation technique. However, the storage stability of a Z-isomer-rich β-carotene suspension was lower than that of all-E-isomer-rich one, possibly due to increases in the contact area with oxygen as the particle size decreased [20]. For practical application of this suspension preparation technique, establishment of a method to increase the storage stability of carotenoid Z-isomers is essential. Molecules 2019, 24, x 11 of 19 efficiency of carotenoids using the sustainable solvent SC-CO2, Ono et al. (2018) [20] focused on increased carotenoid solubility in solvents by Z-isomerization. Namely, they investigated the impact of Z-isomer content on the production of β-carotene suspensions by the emulsification–evaporation technique. As the organic phase, they used SC-CO2 (Figure 4). When β-carotene rich in Z-isomers (79.1% of total β-carotene) was used as the raw material, the encapsulated β-carotene content was notably increased compared with the all-E-isomer. For example, the encapsulated β-carotene content was 21.2 times higher after emulsification treatment by ultrasound at 45 kHz for 60 min. In addition, when (all-E)-β-carotene was used as the raw material, the mean particle size of the obtained suspension was approximately 700 nm, whereas that of β-carotene rich in Z-isomers was approximately 100 nm. Thus, Z-isomerization treatment before distributed processing is effective for the preparation of carotenoid suspensions by the emulsification–evaporation technique. However, the storage stability of a Z-isomer-rich β-carotene suspension was lower than that of all-E-isomer- rich one, possibly due to increases in the contact area with oxygen as the particle size decreased [20]. For practical application of this suspension preparation technique, establishment of a method to increase the storage stability of carotenoid Z-isomers is essential. igure 4. Schematic chart showing preparation of β-carotene suspensions by emulsification–evaporation echnique with SC-CO2, using (all-E)-β-carotene and β-carotene Z-isomers as the raw materials [20]. Figure 4. 5.3. Improvement of Carotenoid Emulsification I t t id f 5.3. Improvement of Carotenoid Emulsification Schematic chart showing preparation of β-carotene suspensions by emulsification–evaporation technique with SC-CO2, using (all-E)-β-carotene and β-carotene Z-isomers as the raw materials [20]. re 4. Schematic chart showing preparation of β-carotene suspensions by emulsification–evaporation nique with SC-CO2, using (all-E)-β-carotene and β-carotene Z-isomers as the raw materials [20]. Figure 4. Schematic chart showing preparation of β-carotene suspensions by emulsification–evaporation technique with SC-CO2, using (all-E)-β-carotene and β-carotene Z-isomers as the raw materials [20]. 6 Conclusion and Future Perspectives 6. Conclusions and Future Perspectives p This review summarizes alterations in the physicochemical properties (color value, solubility, crystallinity, melting point, and stability) of carotenoids by Z-isomerization and their application for carotenoid processing (extraction, micronization, and emulsification), specifically using a green and sustainable solvent—SC-CO2—and presents typical Z-isomerization methods and the effect of Z- isomerization on the bioavailability and functionality of carotenoids. As the method for Z- isomerization of carotenoids, heat treatment, microwave treatment, light irradiation, electrolysis treatment, and catalytic treatment have been well reported. Since these Z-isomerization methods have several advantages and disadvantages, it is necessary to select the appropriate Z-isomerization method according to the circumstances. Ample studies have demonstrated that Z-isomerization of This review summarizes alterations in the physicochemical properties (color value, solubility, crystallinity, melting point, and stability) of carotenoids by Z-isomerization and their application for carotenoid processing (extraction, micronization, and emulsification), specifically using a green and sustainable solvent—SC-CO2—and presents typical Z-isomerization methods and the effect of Z-isomerization on the bioavailability and functionality of carotenoids. As the method for Z-isomerization of carotenoids, heat treatment, microwave treatment, light irradiation, electrolysis treatment, and catalytic treatment have been well reported. Since these Z-isomerization methods have several advantages and disadvantages, it is necessary to select the appropriate Z-isomerization method according to the circumstances. Ample studies have demonstrated that Z-isomerization of carotenoid 12 of 19 Molecules 2019, 24, 2149 affected the bioavailability, antioxidant capacity, and functionalities such as anticancer activity and antiinflammatory activity and often offered positive impacts on human. The Z-isomerization also induces changes in the physicochemical properties of carotenoids, such as solubility and crystallinity. Namely, the solubility in organic solvents, SC-CO2, and oils dramatically is enhanced and crystallinity is reduced by Z-isomerization. Since the (all-E)-carotenoid, which is a predominant isomer in plants and synthetic ingredients, has very low solubility in SC-CO2, its industrial use in carotenoid processing faces a very high hurdle. However, it is highly expected that this impediment could be improved by utilizing the alterations in physicochemical properties of carotenoids by Z-isomerization. Carotenoid processing utilizing Z-isomerization and the expected application of Z-isomer-rich carotenoid materials are summarized in Figure 5. Plants and microalgae rich in carotenoid Z-isomers would be applicable as raw materials for the efficient extraction of carotenoids using solvents such as SC-CO2, for use in health foods, food colorants, and animal feed. 6 Conclusion and Future Perspectives 6. Conclusions and Future Perspectives The obtained extract rich in carotenoid Z-isomers is expected to be applied to the production of supplements and food colorants with high carotenoid bioavailability and functionality. When safe and sustainable extraction solvents, such as ethanol and supercritical CO2, are employed, the value of the extract is anticipated to increase. Furthermore, utilization of carotenoid Z-isomer-rich extracts as the raw material is expected to increase the production and quality of nano-sized carotenoids and carotenoid emulsions. The obtained nano-sized carotenoids and carotenoid emulsions rich in Z-isomers are expected to be utilized as supplements, food colorants, and cosmetics. In addition, alterations in the physicochemical properties of carotenoids by Z-isomerization may be beneficial for the production of microcapsules prepared using carotenoid-containing liposomes. The studies on increasing efficiency of carotenoid processing by Z-isomerization pretreatment has just started in recent years. Thus, there is still considerable room for the development of this research field. Fundamental study of this technology will be actively conducted in the future and practical applications are expected. Molecules 2019, 24, x 12 of 19 this impediment could be improved by utilizing the alterations in physicochemical properties of carotenoids by Z-isomerization. Carotenoid processing utilizing Z-isomerization and the expected application of Z-isomer-rich carotenoid materials are summarized in Figure 5. Plants and microalgae rich in carotenoid Z-isomers would be applicable as raw materials for the efficient extraction of carotenoids using solvents such as SC-CO2, for use in health foods, food colorants, and animal feed. The obtained extract rich in carotenoid Z-isomers is expected to be applied to the production of supplements and food colorants with high carotenoid bioavailability and functionality. When safe and sustainable extraction solvents, such as ethanol and supercritical CO2, are employed, the value of the extract is anticipated to increase. Furthermore, utilization of carotenoid Z-isomer-rich extracts as the raw material is expected to increase the production and quality of nano-sized carotenoids and carotenoid emulsions. The obtained nano-sized carotenoids and carotenoid emulsions rich in Z- isomers are expected to be utilized as supplements, food colorants, and cosmetics. In addition, alterations in the physicochemical properties of carotenoids by Z-isomerization may be beneficial for the production of microcapsules prepared using carotenoid-containing liposomes. The studies on increasing efficiency of carotenoid processing by Z-isomerization pretreatment has just started in recent years. Thus, there is still considerable room for the development of this research field. Acknowledgments: The authors are grateful to Dr. Tsutomu Kumagai, Dr. Chitoshi Kitamura, Dr. Yoshinori Inoue, and Dr. Munenori Takehara (Department of Materials Science, The University of Shiga Prefecture), and Mr. Hiroyuki Ueda, Mr. Takuma Higashiura, and Mr. Kohei Ichihashi (Innovation Division, Kagome Co., Ltd.) f th i ki d h l d t ti ti Acknowledgments: The authors are grateful to Tsutomu Kumagai, Chitoshi Kitamura, Yoshinori Inoue, and Munenori Takehara (Department of Materials Science, The University of Shiga Prefecture), and Hiroyuki Ueda, Takuma Higashiura, and Kohei Ichihashi (Innovation Division, Kagome Co., Ltd.) for their kind help and constructive suggestions. References 1. Maoka, T. Recent progress in structural studies of carotenoids in animals and plants. Arch. Biochem. Biophys. 2009, 483, 191–195. [CrossRef] [PubMed] 1. Maoka, T. Recent progress in structural studies of carotenoids in animals and plants. Arch. Biochem. Biophys. 2009, 483, 191–195. [CrossRef] [PubMed] 2. Maoka, T. Carotenoids in marine animals. Mar. Drugs 2011, 9, 278–293. [CrossRef] [PubMed] 2. Maoka, T. Carotenoids in marine animals. Mar. Drugs 2011, 9, 278–293. [CrossRef] [PubMed] 3. Pods˛edek, A. Natural antioxidants and antioxidant capacity of Brassica vegetables: A review. LWT-Food Sci. Technol. 2007, 40, 1–11. [CrossRef] 3. Pods˛edek, A. Natural antioxidants and antioxidant capacity of Brassica vegetables: A review. LWT-Food Sci. Technol. 2007, 40, 1–11. [CrossRef] 3. Pods˛edek, A. Natural antioxidants and antioxidant capacity of Brassica vegetables: A review. LWT-Food Sci. Technol. 2007, 40, 1–11. [CrossRef] 4. Rodriguez-Concepcion, M.; Avalos, J.; Bonet, M.L.; Boronat, A.; Gomez-Gomez, L.; Hornero-Mendez, D.; Limon, M.C.; Meléndez-Martínez, A.J.; Olmedilla-Alonso, B.; Palou, A.; et al. A global perspective on carotenoids: Metabolism, biotechnology, and benefits for nutrition and health. Prog. Lipid Res. 2018, 70, 62–93. [CrossRef] [PubMed] 5. Yabuzaki, J. Carotenoids database: Structures, chemical fingerprints and distribution among organisms. Database 2017, 2017, bax004. [CrossRef] [PubMed] 6. Amorim-Carrilho, K.T.; Cepeda, A.; Fente, C.; Regal, P. Review of methods for analysis of carotenoids. TrAC Trends Anal. Chem. 2014, 56, 49–73. [CrossRef] 7. Krinsky, N.I.; Johnson, E.J. Carotenoid actions and their relation to health and disease. Mol. Asp. Med. 2005, 26, 459–516. [CrossRef] 8. Ouchi, A.; Aizawa, K.; Iwasaki, Y.; Inakuma, T.; Terao, J.; Nagaoka, S.; Mukai, K. Kinetic study of the quenching reaction of singlet oxygen by carotenoids and food extracts in solution. Development of a singlet oxygen absorption capacity (SOAC) assay method. J. Agric. Food Chem. 2010, 58, 9967–9978. [CrossRef] 9. Xu, X.R.; Zou, Z.Y.; Huang, Y.M.; Xiao, X.; Ma, L.; Lin, X.M. Serum carotenoids in relation to risk factors for development of atherosclerosis. Clin. Biochem. 2012, 45, 1357–1361. [CrossRef] 10. Schierle, J.; Bretzel, W.; Bühler, I.; Faccin, N.; Hess, D.; Steiner, K.; Schüep, W. Content and isomeric ratio of lycopene in food and human blood plasma. Food Chem. 1997, 59, 459–465. [CrossRef] 11. Van Breemen, R.B.; Xu, X.; Viana, M.A.; Chen, L.; Stacewicz-Sapuntzakis, M.; Duncan, C.; Bowen, P.E.; Sharifi, R. Liquid chromatography-mass spectrometry of cis-and all-trans-lycopene in human serum and prostate tissue after dietary supplementation with tomato sauce. J. Agric. Food Chem. 2002, 50, 2214–2219. [CrossRef] 12. 6 Conclusion and Future Perspectives 6. Conclusions and Future Perspectives Fundamental study of this technology will be actively conducted in the future and practical applications are expected. Figure 5. Increased efficiency of carotenoids processing by Z-isomerization and applications of Z- isomer-rich carotenoids materials. Figure 5. Increased efficiency of carotenoids processing by Z-isomerization and applications of Z-isomer-rich carotenoids materials. Figure 5. Increased efficiency of carotenoids processing by Z-isomerization and applications of Z- isomer-rich carotenoids materials. Figure 5. Increased efficiency of carotenoids processing by Z-isomerization and applications of Z-isomer-rich carotenoids materials. Author Contributions: Conceptualization, M.H., T.F., and M.G.; Writing—Original Draft Preparation, M.H.; Writing—Review & Editing, M.H., H.K., T.H., T.F., and M.G.; Revisions & Final editing, M.H., H.K., T.H., Y.Z., W., H.K., R.Y., R.T. T.F., and M.G. Author Contributions: Conceptualization, M.H., T.F., and M.G.; Writing—Original Draft Preparation, M.H.; Writing—Review & Editing, M.H., H.K., T.H., T.F., and M.G.; Revisions & Final editing, M.H., H.K., T.H., Y.Z., W.D., H.K., R.Y., R.T., T.F., and M.G. Author Contributions: Conceptualization, M.H., T.F., and M.G.; Writing Original Draft Preparation, M.H.; Writing—Review & Editing, M.H., H.K., T.H., T.F., and M.G.; Revisions & Final editing, M.H., H.K., T.H., Y.Z., W., H.K., R.Y., R.T. T.F., and M.G. Author Contributions: Conceptualization, M.H., T.F., and M.G.; Writing—Original Draft Preparation, M.H.; Writing—Review & Editing, M.H., H.K., T.H., T.F., and M.G.; Revisions & Final editing, M.H., H.K., T.H., Y.Z., W.D., H.K., R.Y., R.T., T.F., and M.G. Acknowledgments: The authors are grateful to Dr. Tsutomu Kumagai, Dr. Chitoshi Kitamura, Dr. Yoshinori Inoue, and Dr. Munenori Takehara (Department of Materials Science, The University of Shiga Prefecture), and Mr. Hiroyuki Ueda, Mr. Takuma Higashiura, and Mr. Kohei Ichihashi (Innovation Division, Kagome Co., Ltd.) f th i ki d h l d t ti ti Acknowledgments: The authors are grateful to Tsutomu Kumagai, Chitoshi Kitamura, Yoshinori Inoue, and Munenori Takehara (Department of Materials Science, The University of Shiga Prefecture), and Hiroyuki Ueda, Takuma Higashiura, and Kohei Ichihashi (Innovation Division, Kagome Co., Ltd.) for their kind help and constructive suggestions. 13 of 19 Molecules 2019, 24, 2149 Conflicts of Interest: The authors declare no conflicts of interest. References Honda, M.; Murakami, K.; Watanabe, Y.; Higashiura, T.; Fukaya, T.; Wahyudiono; Kanda, H.; Goto, M. The E/Z isomer ratio of lycopene in foods and effect of heating with edible oils and fats on isomerization of (all-E)-lycopene. Eur. J. Lipid Sci. Technol. 2017, 119, 1600389. [CrossRef] 13. Murakami, K.; Honda, M.; Takemura, R.; Fukaya, T.; Kubota, M.; Wahyudiono; Kanda, H.; Goto, M. The thermal Z-isomerization-induced change in solubility and physical properties of (all-E)-lycopene. Biochem. Biophys. Res. Commun. 2017, 491, 317–322. [CrossRef] 14. Honda, M.; Kodama, T.; Kageyama, H.; Hibino, T.; Wahyudiono; Kanda, H.; Goto, M. Enhanced solubility and reduced crystallinity of carotenoids, β-carotene and astaxanthin, by Z-Isomerization. Eur. J. Lipid Sci. Technol. 2018, 120, 1800191. [CrossRef] 15. Clarke, C.J.; Tu, W.C.; Levers, O.; Bröhl, A.; Hallett, J.P. Green and sustainable solvents in chemical processes. Chem. Rev. 2018, 118, 747–800. [CrossRef] 16. Procopio, A.; Alcaro, S.; Nardi, M.; Oliverio, M.; Ortuso, F.; Sacchetta, P.; Pieragostino, D.; Sindona, G. Synthesis, biological evaluation, and molecular modeling of oleuropein and its semisynthetic derivatives as cyclooxygenase inhibitors. J. Agric. Food Chem. 2009, 57, 11161–11167. [CrossRef] 17. Nardi, M.; Sindona, G.; Costanzo, P.; Oliverio, M.; Procopio, A. Eco-friendly stereoselective reduction of α,β-unsaturated carbonyl compounds by Er(OTf)3/NaBH4 in 2-MeTHF. Tetrahedron 2015, 71, 1132–1135. [CrossRef] 18. Honda, M.; Watanabe, Y.; Murakami, K.; Hoang, N.N.; Wahyudiono; Kanda, H.; Goto, M. Enhanced lycopene extraction from gac (Momordica cochinchinensis Spreng.) by the Z-isomerization induced with microwave irradiation pre-treatment. Eur. J. Lipid Sci. Technol. 2018, 120, 1700293. [CrossRef] 19. Honda, M.; Watanabe, Y.; Murakami, K.; Takemura, R.; Fukaya, T.; Wahyudiono; Kanda, H.; Goto, M. Thermal isomerization pre-treatment to improve lycopene extraction from tomato pulp. LWT-Food Sci. Technol. 2017, 86, 69–75. [CrossRef] Molecules 2019, 24, 2149 14 of 19 20. Ono, M.; Honda, M.; Wahyudiono; Yasuda, K.; Kanda, H.; Goto, M. Production of β-carotene nanosuspensions using supercritical CO2 and improvement of its efficiency by Z-isomerization pre-treatment. J. Supercrit. Fluids 2018, 138, 124–131. [CrossRef] 21. Watanabe, Y.; Honda, M.; Higashiura, T.; Fukaya, T.; Machmudah, S.; Wahyudiono; Kanda, H.; Goto, M. Rapid and selective concentration of lycopene Z-isomers from tomato pulp by supercritical CO2 with co-solvents. Solvent Extr. Res. Dev. 2018, 25, 47–57. [CrossRef] 22. Cooperstone, J.L.; Ralston, R.A.; Riedl, K.M.; Haufe, T.C.; Schweiggert, R.M.; King, S.A.; Timmers, C.D.; Francis, D.M.; Lesinski, G.B.; Clinton, S.K.; et al. References Enhanced bioavailability of lycopene when consumed as cis-isomers from tangerine compared to red tomato juice, a randomized, cross-over clinical trial. Mol. Nutr. Food Res. 2015, 59, 658–669. [CrossRef] 23. Østerlie, M.; Bjerkeng, B.; Liaaen-Jensen, S. Plasma appearance and distribution of astaxanthin E/Z and R/S isomers in plasma lipoproteins of men after single dose administration of astaxanthin. J. Nutr. Biochem. 2000, 11, 482–490. [CrossRef] 24. Müller, L.; Goupy, P.; Fröhlich, K.; Dangles, O.; Caris-Veyrat, C.; Böhm, V. Comparative study on antioxidant activity of lycopene (Z)-isomers in different assays. J. Agric. Food Chem. 2011, 59, 4504–4511. [CrossRef] 25. Yang, C.; Zhang, H.; Liu, R.; Zhu, H.; Zhang, L.; Tsao, R. Bioaccessibility, cellular uptake, and transport of astaxanthin isomers and their antioxidative effects in human intestinal epithelial Caco-2 cells. J. Agric. Food Chem. 2017, 65, 10223–10232. [CrossRef] 26. Aman, R.; Schieber, A.; Carle, R. Effects of heating and illumination on trans-cis isomerization and degradation of β-carotene and lutein in isolated spinach chloroplasts. J. Agric. Food Chem. 2005, 53, 9512–9518. [CrossRef] 27. Honda, M.; Takahashi, N.; Kuwa, T.; Takehara, M.; Inoue, Y.; Kumagai, T. Spectral characterisation of Z-isomers of lycopene formed during heat treatment and solvent effects on the E/Z isomerisation process. Food Chem. 2015, 17, 323–329. [CrossRef] 28. Yuan, J.P.; Chen, F. Isomerization of trans-astaxanthin to cis-isomers in organic solvents. J. Agric. Food Chem. 1999, 47, 3656–3660. [CrossRef] 29. Honda, M.; Sato, H.; Takehara, M.; Inoue, Y.; Kitamura, C.; Takemura, R.; Fukaya, T.; Wahyudiono; Kanda, H.; Goto, M. Microwave-accelerated Z-isomerization of (all-E)-lycopene in tomato oleoresin and enhancement of the conversion by vegetable oils containing disulfide compounds. Eur. J. Lipid Sci. Technol. 2018, 120, 180060. [CrossRef] 30. Kessy, H.N.; Zhang, L.; Zhang, H. Lycopene (Z)-isomers enrichment and separation. Int. J. Food Sci. Technol. 2013, 48, 2050–2056. [CrossRef] 31. Zhao, L.; Zhao, G.; Chen, F.; Wang, Z.; Wu, J.; Hu, X. Different effects of microwave and ultrasound on the stability of (all-E)-astaxanthin. J. Agric. Food Chem. 2006, 54, 8346–8351. [CrossRef] 32. Chen, B.H.; Chen, Y.Y. Stability of chlorophylls and carotenoids in sweet potato leaves during microwave cooking. J. Agric. Food Chem. 1993, 41, 1315–1320. [CrossRef] 33. Murakami, K.; Honda, M.; Takemura, R.; Fukaya, T.; Wahyudiono; Kanda, H.; Goto, M. Effect of thermal treatment and light irradiation on the stability of lycopene with high Z-isomers content. Food Chem. 2018, 250, 253–258. [CrossRef] 34. Kuki, M.; Koyama, Y.; Nagae, H. References Triplet-sensitized and thermal isomerization of all-trans, 7-cis, 9-cis, 13-cis and 15-cis isomers of β-carotene: Configurational dependence of the quantum yield of isomerization via the T1 state. J. Phys. Chem. 1991, 95, 7171–7180. [CrossRef] 35. Jensen, N.H.; Nielsen, A.B.; Wilbrandt, R. Chlorophyll a-sensitized trans-cis photoisomerization of all-trans-β-carotene. J. Am. Chem. Soc. 1982, 104, 6117–6119. [CrossRef] 36. Honda, M.; Igami, H.; Kawana, T.; Hayashi, K.; Takehara, M.; Inoue, Y.; Kitamura, C. Photosensitized E/Z isomerization of (all-E)-lycopene aiming at practical applications. J. Agric. Food Chem. 2014, 62, 11353–11356. [CrossRef] 37. Wei, C.C.; Gao, G.; Kispert, L.D. Selected cis/trans isomers of carotenoids formed by bulk electrolysis and iron(III) chloride oxidation. J. Chem. Soc. Perkin Trans. 1997, 2, 783–786. [CrossRef] 38. Gao, G.; Wei, C.C.; Jeevarajan, A.S.; Kispert, L.D. Geometrical isomerization of carotenoids mediated by cation radical/dication formation. J. Phys. Chem. 1996, 100, 5362–5366. [CrossRef] 39. Wyman, G.M. The cis-trans isomerization of conjugated compounds. Chem. Rev. 1955, 55, 625–657. [CrossRef] 40 Zechmeister, L Cis-trans isomerization and stereochemistry of carotenoids and diphenyl-polyenes Chem. Rev. 39. Wyman, G.M. The cis-trans isomerization of conjugated compounds. Chem. Rev. 1955, 55, 625–657. [CrossRef] 39. Wyman, G.M. The cis-trans isomerization of conjugated compounds. Chem. Rev. 1955, 55, 625–657. [CrossRef] 40. Zechmeister, L. Cis-trans isomerization and stereochemistry of carotenoids and diphenyl-polyenes. Chem. Rev. 1944, 34, 267–344. [CrossRef] 40. Zechmeister, L. Cis-trans isomerization and stereochemistry of carotenoids and diphenyl-polyenes. Chem. Rev. 1944, 34, 267–344. [CrossRef] 15 of 19 Molecules 2019, 24, 2149 15 of 19 41. Molnár, P. Research of the (E/Z)-isomerization of carotenoids in Pécs since the 1970s. Arch. Biochem. Biophys. 2009, 483, 156–164. [CrossRef] 42. Honda, M.; Kageyama, H.; Hibino, T.; Takemura, R.; Goto, M.; Fukaya, T. Enhanced Z-isomerization of tomato lycopene through the optimal combination of food ingredients. Sci. Rep. 2019, 9, 7979. [CrossRef] 43. Yu, J.; Gleize, B.; Zhang, L.; Caris-Veyrat, C.; Renard, C.M.G.C. Heating tomato puree in the presence of lipids and onion: The impact of onion on lycopene isomerization. Food Chem. 2019, 296, 9–16. [CrossRef] 44. Honda, M.; Kawana, T.; Takehara, M.; Inoue, Y. Enhanced E/Z isomerization of (all-E)-lycopene by employing iron(III) chloride as a catalyst. J. Food Sci. 2015, 80, C1453–C1459. [CrossRef] 45. Rajendran, V.; Chen, B.H. Isomerization of β-carotene by titanium tetrachloride catalyst. J. Chem. Sci. 2007, 119, 253–258. [CrossRef] 46. Yang, C.; Zhang, L.; Zhang, H.; Sun, Q.; Liu, R.; Li, J.; Wu, L.; Tsao, R. References Rapid and efficient conversion of all-E-astaxanthin to 9Z-and 13Z-isomers and assessment of their stability and antioxidant activities. J. Agric. Food Chem. 2017, 65, 818–826. [CrossRef] 47. Hechelski, M.; Ghinet, A.; Louvel, B.; Dufrénoy, P.; Rigo, B.; Daïch, A.; Waterlot, C. From conventional Lewis acids to heterogeneous montmorillonite K10: Eco-friendly plant-based catalysts used as green Lewis acids. ChemSusChem 2018, 11, 1249–1277. [CrossRef] 48. Nardi, M.; Bonacci, S.; Cariati, L.; Costanzo, P.; Oliverio, M.; Sindona, G.; Procopio, A. Synthesis and antioxidant evaluation of lipophilic oleuropein aglycone derivatives. Food Funct. 2017, 8, 4684–4692. [CrossRef] 49. Oliverio, M.; Nardi, M.; Costanzo, P.; Di Gioia, M.; Procopio, A. Erbium salts as non-toxic catalysts compatible with alternative reaction media. Sustainability 2018, 10, 721. [CrossRef] 50. Unlu, N.Z.; Bohn, T.; Francis, D.M.; Nagaraja, H.N.; Clinton, S.K.; Schwartz, S.J. Lycopene from heat-induced cis-isomer-rich tomato sauce is more bioavailable than from all-trans-rich tomato sauce in human subjects. Br. J. Nutr. 2007, 98, 140–146. [CrossRef] 51. Boileau, A.C.; Merchen, N.R.; Wasson, K.; Atkinson, C.A.; Erdman, J.W., Jr. Cis-lycopene is more bioavailable than trans-lycopene in vitro and in vivo in lymph-cannulated ferrets. J. Nutr. 1999, 129, 1176–1181. [CrossRef] 52. Failla, M.L.; Chitchumroonchokchai, C.; Ishida, B.K. In vitro micellarization and intestinal cell uptake of cis isomers of lycopene exceed those of all-trans lycopene. J. Nutr. 2008, 138, 482–486. [CrossRef] 53. Sun, Q.; Yang, C.; Li, J.; Raza, H.; Zhang, L. Lycopene: Heterogeneous catalytic E/Z isomerization and in vitro bioaccessibility assessment using a diffusion model. J. Food Sci. 2016, 81, C2381–C2389. [CrossRef] 54. Gaziano, J.M.; Johnson, E.J.; Russell, R.M.; Manson, J.E.; Stampfer, M.J.; Ridker, P.M.; Frei, B.; Hennekens, C.H.; Krinsky, N.I. Discrimination in absorption or transport of β-carotene isomers after oral supplementation with either all-trans- or 9-cis-β-carotene. Am. J. Clin. Nutr. 1995, 61, 1248–1252. [CrossRef] 55. Johnson, E.J.; Krinsky, N.I.; Russell, R.M. Serum response of all-trans and 9-cis isomers of β-carotene in humans. J. Am. Coll. Nutr. 1996, 15, 620–624. [CrossRef] 56. Stahl, W.; Schwarz, W.; von Laar, J.; Sies, H. All-trans β-carotene preferentially accumulates in human chylomicrons and very low density lipoproteins compared with the 9-cis geometrical isomer. J. Nutr. 1995, 125, 2128–2133. [CrossRef] 57. Stahl, W.; Schwarz, W.; Sies, H. Human serum concentrations of all-trans β- and α-carotene but not 9-cis β-carotene increase upon ingestion of a natural isomer mixture obtained from Dunaliella salina (Betatene). J. Nutr. 1993, 123, 847–851. [CrossRef] 58. References Anticholinesterase and antioxidant activities of fucoxanthin purified from the microalga Phaeodactylum tricornutum. Nat. Prod. Commun. 2013, 8, 1381–1386. [CrossRef] 70. Zhang, Y.; Fang, H.; Xie, Q.; Sun, J.; Liu, R.; Hong, Z.; Yi, R.; Wu, H. Comparative evaluation of the radical-scavenging activities of fucoxanthin and its stereoisomers. Molecules 2014, 19, 2100–2113. [CrossRef] 71. Harari, A.; Harats, D.; Marko, D.; Cohen, H.; Barshack, I.; Kamari, Y.; Gonen, A.; Gerber, Y.; Ben-Amotz, A.; Shaish, A. A 9-cis β-carotene–enriched diet inhibits atherogenesis and fatty liver formation in LDL receptor knockout mice. J. Nutr. 2008, 138, 1923–1930. [CrossRef] [PubMed] 72. Harari, A.; Abecassis, R.; Relevi, N.; Levi, Z.; Ben-Amotz, A.; Kamari, Y.; Harats, A.; Shaish, A. Prevention of atherosclerosis progression by 9-cis-β-carotene rich alga Dunaliella in apoE-deficient mice. Biomed. Res. Int. 2013, 2013, 169517. [CrossRef] [PubMed] 73. Relevy, N.Z.; Rühl, R.; Harari, A.; Grosskopf, I.; Barshack, I.; Ben-Amotz, A.; Nir, U.; Gottlieb, H.; Kamari, Y.; Harats, D.; et al. 9-cis β-Carotene inhibits atherosclerosis development in female LDLR-/- mice. Funct. Foods Health Dis. 2015, 5, 67–79. 74. Venugopalan, V.; Verma, N.; Gautam, H.K.; Saradhi, P.P.; Das, R.H. 9-cis-Canthaxanthin exhibits higher pro-apoptotic activity than all-trans-canthaxanthin isomer in THP-1 macrophage cells. Free Radic. Res. 2009, 43, 100–105. [CrossRef] [PubMed] 75. Nakazawa, Y.; Sashima, T.; Hosokawa, M.; Miyashita, K. Comparative evaluation of growth inhibitory effect of stereoisomers of fucoxanthin in human cancer cell lines. J Funct. Foods 2009, 1, 88–97. [CrossRef] 76. Yang, C.; Hassan, Y.I.; Liu, R.; Zhang, H.; Chen, Y.; Zhang, L.; Tsao, R. Anti-inflammatory effects of different astaxanthin isomers and the roles of lipid transporters in the cellular transport of astaxanthin isomers in Caco-2 cell monolayers. J. Agric. Food Chem. 2019, 67, 6222–6231. [CrossRef] y g 77. Nagao, A.; Olson, J.A. Enzymatic formation of 9-cis, 13-cis, and all-trans retinals from isomers of β-carotene. FASEB J. 1994, 8, 968–973. [CrossRef] 78. Schieber, A.; Carle, R. Occurrence of carotenoid cis-isomers in food: Technological, analytical, and nutritional implications. Trends Food Sci. Technol. 2005, 16, 416–422. [CrossRef] 79. Liu, X.; Chen, X.; Liu, H.; Cao, Y. Antioxidation and anti-aging activities of astaxanthin geometrical isomers and molecular mechanism involved in Caenorhabditis elegans. J. Funct. Foods 2018, 44, 127–136. [CrossRef] 80. Fenni, S.; Astier, J.; Bonnet, L.; Karkeni, E.; Gouranton, E.; Mounien, L.; Couturier, C.; Tourniaire, F.; Böhm, V.; Hammou, H.; et al. (all-E)-and (5Z)-Lycopene display similar biological effects on adipocytes. Mol. Nutr. Food Res. 2019, 63, 1800788. [CrossRef] 81. References Tamai, H.; Morinobu, T.; Murata, T.; Manago, M.; Mino, M. 9-cis β-Carotene in human plasma and blood cells after ingestion of β-carotene. Lipids 1995, 30, 493–498. [CrossRef] 59. Erdman Jr, J.W.; Thatcher, A.J.; Hofmann, N.E.; Lederman, J.D.; Block, S.S.; Lee, C.M.; Mokady, S. All-trans β-carotene is absorbed preferentially to 9-cis β-carotene, but the latter accumulates in the tissues of domestic ferrets (Mustela putorius puro). J. Nutr. 1998, 128, 2009–2013. [CrossRef] 60. Deming, D.M.; Teixeira, S.R.; Erdman Jr, J.W. All-trans β-carotene appears to be more bioavailable than 9-cis or 13-cis β-carotene in gerbils given single oral doses of each isomer. J. Nutr. 2002, 132, 2700–2708. [CrossRef] 61. During, A.; Hussain, M.M.; Morel, D.W.; Harrison, E.H. Carotenoid uptake and secretion by CaCo-2 cells: β-carotene isomer selectivity and carotenoid interactions. J. Lipid Res. 2002, 43, 1086–1095. [CrossRef] [PubMed] 61. During, A.; Hussain, M.M.; Morel, D.W.; Harrison, E.H. Carotenoid uptake and secretion by CaCo-2 cells: β-carotene isomer selectivity and carotenoid interactions. J. Lipid Res. 2002, 43, 1086–1095. [CrossRef] [PubMed] 16 of 19 Molecules 2019, 24, 2149 16 of 19 62. Yang, C.; Fischer, M.; Kirby, C.; Liu, R.; Zhu, H.; Zhang, H.; Chen, Y.; Sun, Y.; Zhang, L.; Tsao, R. Bioaccessibility, cellular uptake and transport of luteins and assessment of their antioxidant activities. Food Chem. 2018, 249, 66–76. [CrossRef] 3. Kopec, R.E.; Failla, M.L. Recent advances in the bioaccessibility and bioavailability of carotenoids and eff of other dietary lipophiles. J. Food Compos. Anal. 2018, 68, 16–30. [CrossRef] 64. Böhm, V.; Puspitasari-Nienaber, N.L.; Ferruzzi, M.G.; Schwartz, S.J. Trolox equivalent antioxidant capacity of different geometrical isomers of α-carotene, β-carotene, lycopene, and zeaxanthin. J. Agric. Food Chem. 2002, 50, 221–226. [CrossRef] [PubMed] 65. Levin, G.; Yeshurun, M.; Mokady, S. In vivo antiperoxidative effect of 9-cis β-carotene compared with that of the all-trans isomer. Nutr. Cancer 1997, 27, 293–297. [CrossRef] [PubMed] 66. Mueller, L.; Boehm, V. Antioxidant activity of β-carotene compounds in different in vitro assays. Molecules 2011, 16, 1055–1069. [CrossRef] [PubMed] 67. Liu, X.; Osawa, T. Cis astaxanthin and especially 9-cis astaxanthin exhibits a higher antioxidant activity in vitro compared to the all-trans isomer. Biochem. Biophys. Res. Commun. 2007, 357, 187–193. [CrossRef] [PubMed] 68. Venugopalan, V.; Tripathi, S.K.; Nahar, P.; Saradhi, P.P.; Das, R.H.; Gautam, H.K. Characterization of canthaxanthin isomers isolated from a new soil Dietzia sp. and their antioxidant activities. J. Microbiol. Biotechnol. 2013, 23, 237–245. [CrossRef] [PubMed] 69. Kawee-ai, A.; Kuntiya, A.; Kim, S.M. References Ferruzzi, M.G.; Lumpkin, J.L.; Schwartz, S.J.; Failla, M. Digestive stability, micellarization, and uptake of β-carotene isomers by Caco-2 human intestinal cells. J. Agric. Food Chem. 2006, 54, 2780–2785. [CrossRef] [PubMed] 17 of 19 Molecules 2019, 24, 2149 82. Honda, M.; Kudo, T.; Kuwa, T.; Higashiura, T.; Fukaya, T.; Inoue, Y.; Kitamura, C.; Takehara, M. Isolation and spectral characterization of thermally generated multi-Z-isomers of lycopene and the theoretically preferred pathway to di-Z-isomers. Biosci. Biotechnol. Biochem. 2017, 81, 365–371. [CrossRef] [PubMed] 3. Jing, C.; Qun, X.; Rohrer, J. HPLC separation of all-trans-β-carotene and its iodine-induced isomers usi C30 column. Thermo Sci. 2012, 187, 1–5. 84. Gamlieli-Bonshtein, I.; Korin, E.; Cohen, S. Selective separation of cis-trans geometrical isomers of β-carotene via CO2 supercritical fluid extraction. Biotechnol. Bioeng. 2002, 80, 169–174. [CrossRef] [PubMed] 85. Murakami, K.; Honda, M.; Wahyudiono; Kanda, H.; Goto, M. Thermal isomerization of (all-E)-lycopene and separation of the Z-isomers by using a low boiling solvent: Dimethyl ether. Sep. Sci. Technol. 2017, 52, 2573–2582. [CrossRef] 86. Desmarchelier, C.; Borel, P. Overview of carotenoid bioavailability determinants: From dietary factors to host genetic variations. Trends Food Sci. Technol. 2017, 69, 270–280. [CrossRef] 87. Boileau, T.W.M.; Boileau, A.C.; Erdman, J.W., Jr. Bioavailability of all-trans and cis-isomers of lycopene. Exp. Biol. Med. 2002, 227, 914–919. [CrossRef] 88. Hempel, J.; Schädle, C.N.; Leptihn, S.; Carle, R.; Schweiggert, R.M. Structure related aggregation behavior of carotenoids and carotenoid esters. J. Photochem. Photobiol. A Chem. 2016, 317, 161–174. [CrossRef] 89. Hempel, J.; Amrehn, E.; Quesada, S.; Esquivel, P.; Jiménez, V.M.; Heller, A.; Carle, R.; Schweiggert, R.M. Lipid-dissolved γ-carotene, β-carotene, and lycopene in globular chromoplasts of peach palm (Bactris gasipaes Kunth) fruits. Planta 2014, 240, 1037–1050. [CrossRef] 90. Ben-Amotz, A.; Lers, A.; Avron, M. Stereoisomers of β-carotene and phytoene in the alga Dunaliella bardawil. Plant Physiol. 1988, 86, 1286–1291. [CrossRef] 91. Takehara, M.; Nishimura, M.; Kuwa, T.; Inoue, Y.; Kitamura, C.; Kumagai, T.; Honda, M. Characterization and thermal isomerization of (all-E)-lycopene. J. Agric. Food Chem. 2014, 62, 264–269. [CrossRef] [PubMed] 91. Takehara, M.; Nishimura, M.; Kuwa, T.; Inoue, Y.; Kitamura, C.; Kumagai, T.; Honda, M. Characterization and thermal isomerization of (all-E)-lycopene. J. Agric. Food Chem. 2014, 62, 264–269. [CrossRef] [PubMed] 92. Chasse, G.A.; Mak, M.L.; Deretey, E.; Farkas, I.; Torday, L.L.; Papp, J.G.; Sarma, D.S.R.; Agarwal, A.; 92. Chasse, G.A.; Mak, M.L.; Deretey, E.; Farkas, I.; Torday, L.L.; Papp, J.G.; Sarma, D.S.R.; Agarwal, A.; Chakravarthi, S.; Agarwal, S.; et al. References An ab initio computational study on selected lycopene isomers. J. Mol. Struct. THEOCHEM 2001, 571, 27–37. [CrossRef] 93. Takehara, M.; Kuwa, T.; Inoue, Y.; Kitamura, C.; Honda, M. Isolation and characterization of (15Z)-lycopene thermally generated from a natural source. Biochem. Biophys. Res. Commun. 2015, 467, 58–62. [CrossRef] [PubMed] 94. Guo, W.H.; Tu, C.Y.; Hu, C.H. Cis-trans isomerizations of β-carotene and lycopene: A theoretical study. J. Phys. Chem. B 2008, 112, 12158–12167. [CrossRef] [PubMed] 95. Richelle, M.; Lambelet, P.; Rytz, A.; Tavazzi, I.; Mermoud, A.F.; Juhel, C.; Borel, P.; Bortlik, K. The proportion of lycopene isomers in human plasma is modulated by lycopene isomer profile in the meal but not by lycopene preparation. Br. J. Nutr. 2012, 107, 1482–1488. [CrossRef] [PubMed] 96. Mohan, S.; Rao, P.R.; Hemachandran, H.; Pullela, P.K.; Tayubi, I.A.; Subramanian, B.; Gothandam, K.M.; Singh, P.; Ramamoorthy, S. Prospects and progress in the production of valuable carotenoids: Insights from metabolic engineering, synthetic biology, and computational approaches. J. Biotechnol. 2018, 266, 89–101. 97. Mussagy, C.U.; Winterburn, J.; Santos-Ebinuma, V.C.; Pereira, J.F.B. Production and extraction of carotenoids produced by microorganisms. Appl. Microbiol. Biotechnol. 2019, 103, 1095–1114. [CrossRef] 98. Rammuni, M.N.; Ariyadasa, T.U.; Nimarshana, P.H.V.; Attalage, R.A. Comparative assessment on the extraction of carotenoids from microalgal sources: Astaxanthin from H. pluvialis and β-carotene from D. salina. Food Chem. 2019, 277, 128–134. [CrossRef] 99. Sathasivam, R.; Ki, J.S. A review of the biological activities of microalgal carotenoids and their potential use in healthcare and cosmetic industries. Mar. Drugs 2018, 16, 26. [CrossRef] 100. Chuyen, H.V.; Nguyen, M.H.; Roach, P.D.; Golding, J.B.; Parks, S.E. Gac fruit (Momordica cochinchinensis Spreng.): A rich source of bioactive compounds and its potential health benefits. Int. J. Food Sci. Technol. 2015, 50, 567–577. [CrossRef] 101. Vuong, L.T.; Franke, A.A.; Custer, L.J.; Murphy, S.P. Momordica cochinchinensis Spreng. (gac) fruit carotenoids reevaluated. J. Food Compos. Anal. 2006, 19, 664–668. [CrossRef] 102. Kha, T.C.; Nguyen, M.H.; Roach, P.D.; Stathopoulos, C.E. Effects of Gac aril microwave processing conditions on oil extraction efficiency, and β-carotene and lycopene contents. J. Food Eng. 2013, 117, 486–491. [CrossRef] 102. Kha, T.C.; Nguyen, M.H.; Roach, P.D.; Stathopoulos, C.E. Effects of Gac aril microwave processing conditions on oil extraction efficiency, and β-carotene and lycopene contents. J. Food Eng. 2013, 117, 486–491. [CrossRef] 103. Martins, N.; Ferreira, I.C. Wastes and by-products: Upcoming sources of carotenoids for biotechnological 103. Martins, N.; Ferreira, I.C. References Wastes and by-products: Upcoming sources of carotenoids for biotechnological purposes and health-related applications. Trends Food Sci. Technol. 2017, 62, 33–48. [CrossRef] 18 of 19 Molecules 2019, 24, 2149 18 of 19 104. Saini, R.K.; Keum, Y.S. Carotenoid extraction methods: A review of recent developments. Food Chem. 2018, 240, 90–103. [CrossRef] [PubMed] 105. Luengo, E.; Álvarez, I.; Raso, J. Improving carotenoid extraction from tomato waste by pulsed electric fields. Front. Nutr. 2014, 1, 12. [CrossRef] [PubMed] 106. Jaeschke, D.P.; Menegol, T.; Rech, R.; Mercali, G.D.; Marczak, L.D.F. Carotenoid and lipid extraction from Heterochlorella luteoviridis using moderate electric field and ethanol. Proc. Biochem. 2016, 51, 1636–1643. [CrossRef] 107. Altemimi, A.; Lakhssassi, N.; Baharlouei, A.; Watson, D.; Lightfoot, D. Phytochemicals: Extraction, isolation, and identification of bioactive compounds from plant extracts. Plants 2017, 6, 42. [CrossRef] [PubMed] 108. Chuyen, H.V.; Nguyen, M.H.; Roach, P.D.; Golding, J.B.; Parks, S.E. Microwave-assisted extraction and ultrasound-assisted extraction for recovering carotenoids from Gac peel and their effects on antioxidant capacity of the extracts. Food Sci. Nutr. 2018, 6, 189–196. [CrossRef] [PubMed] 109. Song, J.; Yang, Q.; Huang, W.; Xiao, Y.; Li, D.; Liu, C. Optimization of trans lutein from pumpkin (Cucurbita moschata) peel by ultrasound-assisted extraction. Food Bioprod. Proc. 2018, 107, 104–112. [CrossRef] 110. Affandi, M.M.M.; Julianto, T.; Majeed, A.B.A. Enhanced oral bioavailability of astaxanthin with droplet size reduction. Food Sci. Technol. Res. 2012, 18, 549–554. [CrossRef] 111 Vishwanathan R ; Wilson T A ; Nicolosi R J Bioavailability of a nanoemulsion of lutein is greater than a 110. Affandi, M.M.M.; Julianto, T.; Majeed, A.B.A. Enhanced oral bioavailability of astaxanthin with drop reduction. Food Sci. Technol. Res. 2012, 18, 549–554. [CrossRef] 11. Vishwanathan, R.; Wilson, T.A.; Nicolosi, R.J. Bioavailability of a nanoemulsion of lutein is greater th lutein supplement. Nano Biomed. Eng. 2009, 1, 57–73. [CrossRef] 112. Karam, M.C.; Petit, J.; Zimmer, D.; Djantou, E.B.; Scher, J. Effects of drying and grinding in production of fruit and vegetable powders: A review. J. Food Eng. 2016, 188, 32–49. [CrossRef] 113. De Paz, E.; Martín, Á.; Estrella, A.; Rodríguez-Rojo, S.; Matias, A.A.; Duarte, C.M.; Cocero, M.J. Formulation of β-carotene by precipitation from pressurized ethyl acetate-on-water emulsions for application as natural colorant. Food Hydrocoll. 2012, 26, 17–27. [CrossRef] 114. An, Y.; Sun, Y.; Zhang, M.; Adhikari, B.; Li, Z. Effect of ball milling time on physicochemical properties of Cordyceps militaris ultrafine particles. J. Food Proc. Eng. 2019, e13065. [CrossRef] 115. References Sahena, F.; Zaidul, I.S.M.; Jinap, S.; Karim, A.A.; Abbas, K.A.; Norulaini, N.A.N.; Omar, A.K.M. Application of supercritical CO2 in lipid extraction—A review. J. Food Eng. 2009, 95, 240–253. [CrossRef] 116. Zuknik, M.H.; Norulaini, N.N.; Omar, A.M. Supercritical carbon dioxide extraction of lycopene: A J. Food Eng. 2012, 112, 253–262. [CrossRef] 117. Kodama, T.; Honda, M.; Takemura, R.; Fukaya, T.; Uemori, C.; Wahyudiono; Kanda, H.; Goto, M. Effect of the Z-isomer content on nanoparticle production of lycopene using solution-enhanced dispersion by supercritical fluids (SEDS). J. Supercrit. Fluids 2018, 133, 291–296. [CrossRef] 118. Martín, A.; Cocero, M.J. Micronization processes with supercritical fluids: Fundamentals and mechanisms. Adv. Drug Del. Rev. 2008, 60, 339–350. 119. Mattea, F.; Martín, Á.; Cocero, M.J. Carotenoid processing with supercritical fluids. J. Food Eng. 2009, 93, 255–265. [CrossRef] 120. Kodama, T.; Honda, M.; Machmudah, S.; Wahyudiono; Kanda, H.; Goto, M. Crystallization of all trans-β-carotene by supercritical carbon dioxide antisolvent via co-axial nozzle. Eng. J. 2018, 22, 25–38. [CrossRef] 121. Kaga, K.; Honda, M.; Adachi, T.; Honjo, M.; Wahyudiono; Kanda, H.; Goto, M. Nanoparticle formation of PVP/astaxanthin inclusion complex by solution-enhanced dispersion by supercritical fluids (SEDS): Effect of PVP and astaxanthin Z-isomer content. J. Supercrit. Fluids 2018, 136, 44–51. [CrossRef] 122. Nerome, H.; Machmudah, S.; Wahyudiono; Fukuzato, R.; Higashiura, T.; Youn, Y.S.; Lee, Y.W.; Goto, M. Nanoparticle formation of lycopene/β-cyclodextrin inclusion complex using supercritical antisolvent precipitation. J. Supercrit. Fluids 2013, 83, 97–103. [CrossRef] 123. Boonnoun, P.; Nerome, H.; Machmudah, S.; Goto, M.; Shotipruk, A. Supercritical anti-solvent micronization of chromatography purified marigold lutein using hexane and ethyl acetate solvent mixture. J. Supercrit. Fluids 2013, 80, 15–22. [CrossRef] 124. Miguel, F.; Martin, A.; Gamse, T.; Cocero, M.J. Supercritical anti solvent precipitation of lycopene: Effect of the operating parameters. J. Supercrit. Fluids 2006, 36, 225–235. [CrossRef] 125. Tavares-Cardoso, M.A.; Antunes, S.; van Keulen, F.; Ferreira, B.S.; Geraldes, A.; Cabral, J.; Palavra, A.M. Supercritical antisolvent micronisation of synthetic all-trans-β-carotene with tetrahydrofuran as solvent and carbon dioxide as antisolvent. J. Chem. Technol. Biotechnol. 2009, 84, 215–222. [CrossRef] 19 of 19 Molecules 2019, 24, 2149 126. Leong, H.Y.; Show, P.L.; Lim, M.H.; Ooi, C.W.; Ling, T.C. Natural red pigments from plants and their health benefits: A review. Food Rev. Int. 2018, 34, 463–482. [CrossRef] 127. Coultate, T.; Blackburn, R.S. Food colorants: Their past, present and future. Color. Technol. 2018, 134, 165–186. [CrossRef] 128. Anarjan, N.; Tan, C.P. © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). References Effects of selected polysorbate and sucrose ester emulsifiers on the physicochemical properties of astaxanthin nanodispersions. Molecules 2013, 18, 768–777. [CrossRef] 129. Spernath, A.; Aserin, A. Microemulsions as carriers for drugs and nutraceuticals. Adv. Colloid Interface Sci. 2006, 128, 47–64. [CrossRef] 130. Salvia-Trujillo, L.; Qian, C.; Martín-Belloso, O.; McClements, D.J. Influence of particle size on lipid digestion and β-carotene bioaccessibility in emulsions and nanoemulsions. Food Chem. 2013, 141, 1472–1480. [CrossRef] 131. Chu, B.S.; Ichikawa, S.; Kanafusa, S.; Nakajima, M. Preparation of protein-stabilized β-carotene nanodispersions by emulsification–evaporation method. J. Am. Oil Chem. Soc. 2007, 84, 1053–1062. [CrossRef] 132. De Paz, E.; Martín, Á.; Mateos, E.; Cocero, M.J. Production of water-soluble β-carotene micellar formulations by novel emulsion techniques. Chem. Eng. Process. Process Intensif. 2013, 74, 90–96. [CrossRef] 133. Tan, C.P.; Nakajima, M. β-Carotene nanodispersions: Preparation, characterization and stability evaluation. Food Chem. 2005, 92, 661–671. [CrossRef] 134. Lakshmi, P.; Kumar, G.A. Nanosuspension technology: A review. Int. J. Pharm. Sci 2010, 2, 35–40. 134. Lakshmi, P.; Kumar, G.A. Nanosuspension technology: A review. Int. J. Pharm. Sci 2010, 2, 35–40. 135. Ezhilarasi, P.N.; Karthik, P.; Chhanwal, N.; Anandharamakrishnan, C. Nanoencapsulation techniques for food bioactive components: A review. Food Bioprocess. Technol. 2013, 6, 628–647. [CrossRef] 135. Ezhilarasi, P.N.; Karthik, P.; Chhanwal, N.; Anandharamakrishnan, C. Nanoencapsulation techniques for food bioactive components: A review. Food Bioprocess. Technol. 2013, 6, 628–647. [CrossRef] 136. Silva, H.D.; Cerqueira, M.A.; Souza, B.W.S.; Ribeiro, C.; Avides, M.C.; Quintas, M.A.C.; Coimbra, J.S.R.; Carneiro-da-Cunha, M.G.; Vicente, A.A. Nanoemulsions of β-carotene using a high-energy emulsification–evaporation technique. J. Food Eng. 2011, 102, 130–135. [CrossRef] © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
https://openalex.org/W2123119133
https://bmcgastroenterol.biomedcentral.com/counter/pdf/10.1186/1471-230X-14-75
English
null
Antibiotic exposure in pregnancy and risk of coeliac disease in offspring: a cohort study
BMC gastroenterology
2,014
cc-by
6,616
Karl Mårild1,2*, Johnny Ludvigsson3, Yolanda Sanz4 and Jonas F Ludvigsson1,5 Karl Mårild1,2*, Johnny Ludvigsson3, Yolanda Sanz4 and Jonas F Ludvigsson1,5 * Correspondence: karlmarild@gmail.com 1Dept. Medical Epidemiology and Biostatistics, Karolinska Institutet, Stockholm, Sweden 2Astrid Lindgren Children’s Hospital, Karolinska University Hospital, Solna, Sweden Full list of author information is available at the end of the article © 2014 Mårild et al.; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated. Mårild et al. BMC Gastroenterology 2014, 14:75 http://www.biomedcentral.com/1471-230X/14/75 Mårild et al. BMC Gastroenterology 2014, 14:75 http://www.biomedcentral.com/1471-230X/14/75 Open Access Abstract Background: The infant microbiota may play a pathogenic role in coeliac disease (CD). Antibiotic treatment in pregnancy is common and could significantly impact the infant microbiota. In this study, we aimed to investigate the association between antibiotic exposure during pregnancy and CD in offspring. Methods: Prospective questionnaire data on antibiotic exposure in pregnancy were available in 8729 children participating in the All Babies in Southeast Sweden (ABIS) cohort study, and of these 46 developed CD until December 2006. Cox regression estimated hazard ratios (HRs) for CD in the offspring among mothers exposed to antibiotics during pregnancy, with adjustment for parent-reported diary data on breastfeeding, age at gluten introduction and number of infections in the child’s first year of life. Results: Of the 1836 children exposed to antibiotics during pregnancy, 12 (0.7%) children developed CD as compared with 34/6893 (0.5%) unexposed children (HR = 1.33; 95% CI = 0.69-2.56). Risk estimates remained unchanged after adjustment for breastfeeding, age at gluten introduction and infection load in the child’s first year of life (HR = 1.28; 95% CI = 0.66-2.48). Conclusions: We found no statistically significant association between antibiotic exposure during pregnancy and CD in offspring. This lack of association may either be true or the result of limited statistical power. Keywords: Antibiotics, Celiac disease, Microbiota, Pregnancy Background of the intestinal immune system, the establishment of oral tolerance and the mucosal barrier function [8]. Likewise, imbalances in the intestinal microbiota (dysbiosis) are frequently related to immune dysregulation and development of immune-mediated diseases and vice versa. Several studies have found dysbiosis in individuals with CD as compared with healthy controls, suggesting that the gut microbiota may play a pathogenic role in CD [9]. The infant gut colonization begins perinatally and is strongly influenced by the maternal microbiota, the mode of delivery and subsequently by the infant feeding practice [10]. Some data also indicate that maternal antibiotic intake in pregnancy influences the gut microbiota in the offspring, [11] and that perturbations caused by antibiotics in the infant [12] and adult microbiota [13,14] may persist for several years. Antibiotics are in fact one of the main environmental stressors that lead to the replacement of symbiotic bacteria by otherwise under-represented potentially pathogenic bacteria [13,15]. Coeliac disease (CD) is a life-long autoimmune disease occurring in 1-2% of children and adults living in Western countries [1,2]. In CD, genetically predisposed individuals develop small-intestinal villous atrophy in response to dietary gluten intake [3]. In the last decades the prevalence of CD has more than doubled, [4] suggesting that environmental factors other than gluten-exposure may have a significant influence on CD development [5]. Earlier research has in particular emphasized the importance of environmental factors early in life, including pregnancy and the perinatal period, [6,7] for the development of CD. The microbial colonization of the infant’s gut is considered to be critical for the appropriate development * Correspondence: karlmarild@gmail.com 1Dept. Medical Epidemiology and Biostatistics, Karolinska Institutet, Stockholm, Sweden 2Astrid Lindgren Children’s Hospital, Karolinska University Hospital, Solna, Sweden Full list of author information is available at the end of the article Mårild et al. BMC Gastroenterology 2014, 14:75 http://www.biomedcentral.com/1471-230X/14/75 Mårild et al. BMC Gastroenterology 2014, 14:75 http://www.biomedcentral.com/1471-230X/14/75 Page 2 of 7 Page 2 of 7 Today, some 10-25% [16,17] of pregnant women use antibiotics. Recent data have shown a positive association between antibiotic use during pregnancy and offspring asthma, [18] a disease that shares potential etiological and epidemiological traits with CD [19-21]. We have recently shown a positive association between antibiotic use in early childhood and subsequent CD [22]. However, there are few data whether antibiotic exposure in pregnancy influences the risk of CD in offspring. Methods Data on CD were collected through contact with all paediatric departments (n = 8) in the ABIS study area. The majority of children with CD were identified through a study published in 2004 [24]. In 2007–2008, we again contacted the same paediatric departments and asked them to report additional ABIS children with a biopsy-verified CD (villous atrophy) diagnosed until December 1st 2006. In addition to a biopsy suggestive of CD (Marsh grade III), children with CD were required either to have CD-specific antibody markers or CD-consistent symptoms that resolved after introduction of gluten-free diet [24]. In the current study, date of CD diagnosis equals date of first positive small-intestinal biopsy. The ABIS population was not actively screened for CD and therefore the children with CD were investigated due to clinical manifestations of possible CD. In this prospective population-based cohort study we used data from the ABIS cohort (All Babies in Southeast Sweden) in order to examine the association between antibiotic exposure in pregnancy and CD in the offspring. Background main analysis we included 8729 individuals with data on use of systemic antibiotics during pregnancy and with complete diary data for duration of breastfeeding and time of gluten introduction (see flow chart, Figure 1). The parents of the study participants were slightly more often born in Sweden and with a higher level of education, as compared with the source population of southeast Sweden [23]. Additional background data of the ABIS cohort have been described elsewhere [24,25]. Study population Between October 1997 and October 1999, all parents to babies born in southeast Sweden were invited to participate in the ABIS cohort. Of the 21,700 babies born during the study period, the parents of 17,055 children (78.6%) gave their informed consent to participate. In the maternity ward (at childbirth), parents to 16,285 children completed a questionnaire that included questions on antibiotics use in pregnancy, maternal education level, heath status and first-degree heredity for CD, type 1 diabetes mellitus and other autoimmune diseases. Parents were asked to complete a structured study diary during the child’s first year of life reporting infectious diseases and feeding practice, including duration of breastfeeding and age at gluten introduction. The diaries were completed prospectively at home and collected when the child was one year of age. In our Statistical analyses We used Cox regression to estimate Hazard Ratios (HRs) and 95% confidence intervals (CIs) for the risk of childhood CD according to maternal antibiotic exposure in pregnancy. To increase the statistical power of the study, we performed a post-hoc analysis including all 14,942 ABIS children with available data on antibiotic exposure in pregnancy. In this post-hoc analysis we used multiple imputation to replace missing values for infant nutrition data. However, since the statistics software SPSS cannot handle survival analyses with imputed data (the command "selection variable: rule: imputation > =1" only runs in linear regression and logistic regression), we first examined the odds ratio (OR) for future CD in our original dataset adjusting for infant nutrition (according to the covariates in Model A) before using multiple imputation to adjust infant feeding. In our main analysis (Model A, n = 8729) we used diary data to adjust for duration of breastfeeding (0–2; 3–4; 5–6; 7–8; 9–10 and ≥11 months) and age at gluten introduction (0–2; 3–4; 5–6; 7–8; 9–10 and 11–12 months of age) as potential confounders for CD development [25-27]. In a second analysis (Model B, n = 8698) we also adjusted for maternal education level (≤12 vs. >12 years) and number of any parent-reported infectious disease in the child’s first year of life, categorized into the following months of age: 0–2; 3–4; 5–6; 7–8; 9–10 and 11–12 months of age. Education level has been associated with antibiotic use [28] and may influence the risk of CD diagnosis [29]. Also infectious load in early childhood may be associated with subsequent CD [30]. Follow-up began at child’s birth and ended at time of CD diagnosis or December 1st 2006 (end of follow-up). However, because CD only develop after gluten introduction, which often occurs during the first year of life, we also performed a Cox regression in which the time scale began at one year of age until CD diagnosis or December 1st 2006 (end of follow-up). In a final post-hoc analysis we adjusted for the children’s use of antibiotics during their first year of life. Data on anti- biotic use was collected through a questionnaire when the child was one year old. The number of antibiotic courses used during the child’s first year of life was classified into the following categories: no use; 1–2; 3–5; ≥6 courses of antibiotics. Ethics This study was as part of the ABIS study approved by the Research Ethics Committees of Linköping University (Li 287–96) and Lund University (Lu 83–97). Mothers gave their written informed consent after careful written as well as oral information and information via videotape. Statistical significance was defined as 95% CIs not including 1.0. We used SPSS version 20.0 (SPSS, Inc, Chicago, IL) for the statistical analyses. Statistical analyses Regrettably, we largely lacked data on type of antibiotic agent used by the children. Maternal antibiotic exposure in pregnancy p p g y We collected questionnaire data on use of any systemic antibiotics during pregnancy. The mothers exposed to antibiotics were asked to specify the name on the type of antibiotics. Mothers who were uncertain of their antibiotic n=21,700 Babies born in southeast Sweden October 1997- October 1999 n=16,285 participants with completed at-birth questionnaire INCLUDED n=8729 Available data on use of systemic antibiotics during pregnancy and data on duration of breastfeeding and age at gluten introduction EXCLUDED n=7556 NO data on use of systemic antibiotics during pregnancy or data on duration of breastfeeding and age at gluten introduction n=4645 declined n=770 participants without questionnaire data Figure 1 Flow chart study participants. n=21,700 Babies born in southeast Sweden October 1997- October 1999 n=4645 declined Figure 1 Flow chart study participants. Page 3 of 7 Mårild et al. BMC Gastroenterology 2014, 14:75 http://www.biomedcentral.com/1471-230X/14/75 use in pregnancy (n = 27) or who had only used non-systemic antibiotics (n = 2) were excluded from the study. questionnaire we defined heredity for an autoimmune disease as presence of at least one first-degree relative with any of the following conditions: Goitre with hypothyroidism or hyperthyroidism, Grave `s disease, per- nicious anaemia, systemic lupus erythematosus, Addison’s disease, any diabetes mellitus, gestational diabetes, CD, inflammatory bowel disease or rheumatoid arthritis. Power calculation At a significance level of 0.05 we had an 80% power to detect a relative risk of 2.45 for CD in offspring to mothers treated with antibiotics during pregnancy. Mode of delivery and gestational age pertain a great impact on the infant gut colonization [10,31-33] and have been associated with an increased risk of CD in offspring [6,34]. In two subanalyses we therefore restricted our data to term deliveries and children born through vaginal delivery, respectively. We also performed stratified analyses by infant sex and heredity for CD or type 1 diabetes mellitus. Post-hoc analyses Out of the 8729 children included in the study, 1836 (21%) had been exposed to antibiotics during pregnancy (unexposed: 6893; Table 1). Type of antibiotics was only listed in a minority of children (n = 235), with penicillin V being the most common type of antibiotic (n = 147). The children were followed up to December 1st 2006, corresponding to an average age of eight years. At end of follow-up, 46 out of 8729 children were diagnosed with CD, yielding a baseline CD prevalence of 0.5%. Girls made up half of the children, and the average maternal age at delivery was close to 30 years (Table 1). As opposed to short duration of breastfeeding, no breastfeeding at all can have a different effect on gut colonization. In a post-hoc analysis we therefore chose to adjust for duration of breastfeeding splitting the first time category (0–2 months) into: 0–6 days and 7 days-2 months (keeping 3–4 months; 5–6 months etc.). In a second post-hoc analysis we estimated the risk of CD in offspring according to antibiotic exposure in pregnancy excluding children with a first-degree relative with autoimmune disease. According to data from the at-birth Mårild et al. BMC Gastroenterology 2014, 14:75 http://www.biomedcentral.com/1471-230X/14/75 Page 4 of 7 Table 1 Descriptive characteristics of individuals according to antibiotic exposure in pregnancy Antibiotics No antibiotics TotalA (%) 1836 (21.0) 6893 (79.0) Infant sex Girls, n (%) 904 (49.2) 3342 (48.5) Boys, n (%) 932 (50.8) 3551 (51.5) HeredityB Coeliac disease, n (%) 30 (1.6) 84 (1.2) Type 1 diabetes mellitus, n (%) 56 (3.1) 155 (2.2) Maternal characteristics Age at delivery; mean +/−SD (years) 30.3 +/−4.4 29.7 +/−4.5 Maternal university educationC, n (%) 715 (39.1) 2272 (33.1) AIndividuals with complete data on breastfeeding and gluten introduction. BFirst-degree relative with coeliac disease/type 1 diabetes mellitus. C>12 years of education at time of delivery. Table 1 Descriptive characteristics of individuals according to antibiotic exposure in pregnancy Some 316 children had a first-degree relative with either CD (n = 105) or type 1 diabetes mellitus (n = 202) or with both CD and type 1 diabetes (n = 9). Restricting our data to children without heredity for CD and type 1 diabetes did not change our risk estimates (adjusted HR = 1.22; 95% CI = 0.58-2.59). Post-hoc analyses Neither did the risk estimates change appreciably when we restricted our data to children born full-term (n = 8270 [94.7%]) or with a vaginal delivery (n = 7647 [87,6%]) (Table 2). Because CD only develops after gluten introduction (typically occurring within the first year of life), we also performed a number of pre-planned Cox regression analyses in which the time scale began at one year of age, thereby excluding six children diagnosed with CD before that age. Antibiotic exposure during pregnancy was not significantly associated with CD in offspring diagnosed after age one year (adjusted HR = 1.42; 95% CI = 0.71-2.83). The risk estimates for CD diagnosed after age one year stratified by sex and restricted to children with no heredity for CD and type 1 diabetes are presented in Table 3. AIndividuals with complete data on breastfeeding and gluten introduction. BFirst-degree relative with coeliac disease/type 1 diabetes mellitus. C>12 years of education at time of delivery. AIndividuals with complete data on breastfeeding and gluten introduction. BFirst-degree relative with coeliac disease/type 1 diabetes mellitus. C>12 years of education at time of delivery. Twelve (0.7%) exposed and 34 (0.5%) unexposed children developed CD, corresponding to a HR of 1.33 (95% CI = 0.69-2.56). Risk estimates did not change more than marginally after adjustment for duration of breastfeeding and age at gluten introduction (Model A: adjusted HR = 1.32, 95% CI = 0.69-2.56) or when adding first-year childhood infections and maternal education level (Model B: adjusted HR = 1.28, 95% CI = 0.66-2.48). We found unchanged HR:s with follow-up time starting at time of gluten introduction (data not shown). The relative risk estimates for CD after antibiotic exposure during pregnancy were similar in boys and girls (Boys: adjusted HR = 1.28; 95% CI = 0.41-3.96; Girls: adjusted HR = 1.36; 95% CI = 0.60-3.05). Moreover, antibiotic exposure during pregnancy did not seem to favour an earlier appearance of CD (median age at CD diagnosis was some 2 years and 9 months among both children exposed and unexposed to antibiotics during pregnancy). th a first-degree relative with celiac disease (n = 105), type 1 diabetes mellitus (n = 202) or both celiac disease and type 1 diabetes (n = al weeks. Post-hoc analyses I i l In our main analysis we identified 64 children with less than 7 days of breastfeeding. In a post-hoc analysis adjust- ing for no breastfeeding (duration <7 days), age at gluten introduction, infectious load in the first year of life and maternal education level we found largely unchanged risk estimates (adjusted HR = 1.29; 95% CI = 0.66-2.49). Finally, we excluded children with first-degree relatives with any autoimmune disease (remaining n = 7785 [89,2%]; HR = 1.40; 95% CI = 0.65-2.99). To address the issue of low statistical power we per- formed a post-hoc analysis including all 14,942 children with available data on antibiotic exposure in pregnancy. We used multiple imputation to replace missing values for infant nutrition data. However, since the statistics software coeliac disease in offspring (follow-up from birth) according to antibiotic exposure in pregnancy Table 2 Risk of coeliac disease in offspring (follow-up from birth) according to antibiotic exposure Table 2 Risk of coeliac disease in offspring (follow-up from birth) according to antibiotic exposure in pregnancy Antibiotics (%) No Antibiotics (%) Crude HR; 95% CI Adjusted HR; 95% CIA Adjusted HR; 95% CIB All 12/1836 (0.7) 34/6893 (0.5) 1.33; 0.69-2.56 1.32; 0.69-2.56 1.28; 0.66-2.48 Sex Boys 4/932 (0.4) 12/3551 (0.3) 1.27; 0.41-3.94 1.28; 0.41-3.96 1.37; 0.44-4.27 Girls 8/904 (0.9) 22/3342 (0.7) 1.35; 0.60-3.02 1.36; 0.60-3.05 1.21; 0.53-2.73 Subgroups No heredityC 9/1753 (0.5) 28/6660 (0.4) 1.22; 0.58-2.59 1.22; 0.58-2.59 1.16; 0.55-2.47 Term deliveriesD 12/1739 (0.7) 32/6531 (0.5) 1.41; 0.73-2.74 1.41; 0.73-2.74 1.37; 0.70-2.66 Vaginal delivery 10/1584 (0.6) 30/6063 (0.5) 1.28; 0.63-2.61 1.28; 0.63-2.62 1.25; 0.61-2.56 AIn Model A we adjusted for duration of breastfeeding and age at gluten introduction. Children with complete data on breastfeeding and gluten introduction were included in the analyses (n varied between 7647 and 8729). BIn Model B we adjusted for any parent-reported infection during the child’s first year of life, maternal education level as well as duration of breastfeeding and age at gluten introduction. Children with complete data on breastfeeding, gluten introduction as well as education level were included in the analyses (n varied between 7622 and 8698). CExcluding individuals with a first-degree relative with celiac disease (n = 105), type 1 diabetes mellitus (n = 202) or both celiac disease and type 1 diabetes (n = 9). DFull-term, ≥37 gestational weeks. Hazard ratios (HR) estimated through Cox regression. Follow-up from birth. Mårild et al. Post-hoc analyses I i l BMC Gastroenterology 2014, 14:75 http://www.biomedcentral.com/1471-230X/14/75 Page 5 of 7 Table 3 Risk of coeliac disease in offspring (follow-up from one year of age) according to antibiotic exposure in pregnancy Antibiotics (%) No Antibiotics (%) Crude HR; 95% CI Adjusted HR; 95% CIA Adjusted HR; 95% CIB All 11/1835 (0.6) 29/6888 (0.4) 1.43; 0.71-2.86 1.42; 0.71-2.83 1.37; 0.68-2.76 Sex Boys 4/932 (0.4) 8/3547 (0.2) 1.90; 0.57-6.32 1.91; 0.58-6.35 2.00; 0.60-6.66 Girls 7/903 (0.8) 21/3341 (0.6) 1.24; 0.53-2.91 1.24; 0.53-2.92 1.13; 0.48-2.67 Subgroups No heredityC 8/1752 (0.5) 24/6656 (0.4) 1.27; 0.57-2.82 1.26; 0.57-2.81 1.21;0.54-2.70 Term deliveriesD 11/1738 (0.6) 27/6526 (0.4) 1.53; 0.76-3.09 1.52; 0.76-3.07 1.48; 0.73-2.99 Vaginal delivery 9/1583 (0.6) 25/6058 (0.4) 1.38; 0.64-2.96 1.37; 0.64-2.94 1.34; 0.62-2.88 AIn Model A we adjusted for duration of breastfeeding and age at gluten introduction. Children with complete data on breastfeeding and gluten introduction were included in the analyses (n varied between 7641 and 8723). BIn Model B we adjusted for any parent-reported infection during the child’s first year of life, education level as well as duration of breastfeeding and age at gluten introduction. Children with complete data on breastfeeding, gluten introduction as well as education level were included in the analyses (n varied between 7616 and 8692). CExcluding individuals with a first-degree relative with celiac disease (n = 105), type 1 diabetes mellitus (n = 202) or both celiac disease and type 1 diabetes (n = 9). DFull-term, ≥37 gestational weeks. Hazard ratios (HR) estimated through Cox regression. Follow-up from one year of age. Table 3 Risk of coeliac disease in offspring (follow-up from one year of age) according to antibiotic exposure in Table 3 Risk of coeliac disease in offspring (follow-up from one year of age) according to a pregnancy n offspring (follow-up from one year of age) according to antibiotic exposure in Swedish infants with minor infections do not seek medical advice. Although, the infections were not recorded using standardized self-reporting criteria we do not suspect this potential risk of misclassification to be differential between children exposed/unexposed to antibiotics in pregnancy. SPSS cannot handle survival analyses with imputed data, we first examined the OR for future CD in our original dataset adjusting for infant nutrition (maternal antibiotics: OR for offspring CD = 1.32; 95% CI = 0.68-2.56). Using multiple imputation when adjusting for infant feeding did not change the risk estimate more than marginally (OR = 1.10; 95% CI = 0.64-1.89). Post-hoc analyses I i l Similar to other birth-cohort studies [36,37], the current study suffers from attrition. Half of the population entering at birth completed the 1-year-diaries, and there was a slight underrepresentation of parents with foreign origin and low education [38]. However, this should not influence the risk estimates if the association between maternal antibiotic exposure and risk of offspring CD is independent of education status. We are not aware of any study indicating that education modifies the risk factors of CD, even if socioeconomic status per se may be linked to the risk of CD [39,40]. In a post-hoc analysis, including 6773 children with complete diary data and available data on use of antibiotics during the first year of life, we found only marginally changed risk estimates for CD (adjusted HR = 1.65; 95% CI = 0.83-3.28). The association between CD and use of antibiotics during the child’s first year of life has been presented in Additional file 1, Table A1. Discussion In this cohort study, we examined the association between maternal use of antibiotics in pregnancy and risk of CD in the offspring. The rationale for this study was the increasing amount of data indicating that the maternal intestinal microbiota in pregnancy influences the foetal and infant immune system development [35]. However, we found no statistically significant association between antibiotic exposure in pregnancy and CD in the offspring. Although this may be reassuring, our study does not rule out a modestly excess risk of CD in children to mothers who were treated with antibiotics during pregnancy. Of greater concern is the limited statistical power of this study and the correspondingly increased risk of type 2 error (i.e. to erroneously accept a false null hypothesis). Additionally, we have not been able to screen the ABIS cohort for CD, and our patients consist of children with clinically diagnosed CD. The baseline CD preva- lence of 0.5% (46 out of 8729 children) is therefore considerably lower than the estimated 2% prevalence of screening-detected CD in Swedish children [41] (in our study corresponding to 175 children). However, false-negative CD in our control group (<2% [41]) should not affect our risk estimates. Further, we do not expect risk factors to differ between children with or without symptoms (meriting investigation for CD). Unfortunately we lack data on clinical phenotype and were unable to examine if intrauterine antibiotic exposure is linked to a certain type of CD. A strength of this study is its prospective design, where data on antibiotic exposure in pregnancy were collected before CD diagnosis, eliminating the risk of recall bias. We also used prospectively collected data on infant feeding and infectious diseases during the child’s first year of life. Infections were measured through concurrent parent- reporting, and not through patient charts, because most Page 6 of 7 Mårild et al. BMC Gastroenterology 2014, 14:75 http://www.biomedcentral.com/1471-230X/14/75 Data on antibiotics during pregnancy were collected retrospectively (at childbirth) and we did not have data on the specific date of the antibiotic treatment or on intrapar- tum antibiotics. Speculatively, antibiotic treatment during the perinatal period may have a more profound impact on infant gut colonization, as compared with antibiotic treat- ment early in pregnancy [11]. References 1. Walker MM, Murray JA, Ronkainen J, Aro P, Storskrubb T, D'Amato M, Lahr B, Talley NJ, Agreus L: Detection of celiac disease and lymphocytic enteropathy by parallel serology and histopathology in a population-based study. Gastroenterology 2010, 139:112–119. Gastroenterology 2010, 139:112 119. 2. Dube C, Rostom A, Sy R, Cranney A, Saloojee N, Garritty C, Sampson M, Zhang L, Yazdi F, Mamaladze V, Pan I, Macneil J, Mack D, Patel D, Moher D: The prevalence of celiac disease in average-risk and at-risk Western European populations: a systematic review. Gastroenterology 2005, 128:S57–S67. 3. Di Sabatino A, Corazza GR: Coeliac disease. Lancet 2009, 373:1480–1493. 4. Rubio-Tapia A, Kyle RA, Kaplan EL, Johnson DR, Page W, Erdtmann F, Brantner TL, Kim WR, Phelps TK, Lahr BD, Zinsmeister AR, Melton LJ 3rd, Murray JA: Increased prevalence and mortality in undiagnosed celiac disease. Gastroenterology 2009, 137:88–93 gy , 2. Dube C, Rostom A, Sy R, Cranney A, Saloojee N, Garritty C, Sampson M, Zhang L, Yazdi F, Mamaladze V, Pan I, Macneil J, Mack D, Patel D, Moher D: The prevalence of celiac disease in average-risk and at-risk Western European populations: a systematic review. Gastroenterology 2005, 128:S57–S67. 3. Di Sabatino A, Corazza GR: Coeliac disease. Lancet 2009, 373:1480–1493. 4. Rubio-Tapia A, Kyle RA, Kaplan EL, Johnson DR, Page W, Erdtmann F, Brantner TL, Kim WR, Phelps TK, Lahr BD, Zinsmeister AR, Melton LJ 3rd, Murray JA: Increased prevalence and mortality in undiagnosed celiac disease Gastroenterology 2009 137:88–93 gy 2. Dube C, Rostom A, Sy R, Cranney A, Saloojee N, Garritty C, Sampson M, Zhang L, Yazdi F, Mamaladze V, Pan I, Macneil J, Mack D, Patel D, Moher D: The prevalence of celiac disease in average-risk and at-risk Western European populations: a systematic review. Gastroenterology 2005, 128:S57–S67. 3 Di S b ti A C GR C li di L t 2009 373 1480 1493 3. Di Sabatino A, Corazza GR: Coeliac disease. Lancet 2009, 373:1480 1493. 4. Rubio-Tapia A, Kyle RA, Kaplan EL, Johnson DR, Page W, Erdtmann F, Brantner TL, Kim WR, Phelps TK, Lahr BD, Zinsmeister AR, Melton LJ 3rd, Murray JA: Increased prevalence and mortality in undiagnosed celiac disease. Gastroenterology 2009, 137:88–93. Authors’ contributions ICMJE criteria for authorship read and met: KM, JFL, YS, JL. Agree with the manuscript’s results and conclusions: KM, JFL, YS, JL. Designed the experiments/the study: KM, JFL, JL. Collected data: JFL, JL. Analyzed the data: KM. Wrote the first draft of the paper: KM. Contributed to the writing of the paper: JFL, YS, JL. Contributed to design of study and interpretation of the data analyses: KM, JFL, YS, JL. Interpretation of data; approved the final version of the manuscript: KM, JFL, YS, JL. Responsible for data integrity: KM, JFL. Supervised the project including data analyses: JFL.Obtained funding: JFL, JL. All authors read and approved the final manuscript. Conclusions This study found no statistically significant association between maternal use of antibiotics during pregnancy and CD in the offspring. This lack of association may either be true or due to limited statistical power. 5. Lohi S, Mustalahti K, Kaukinen K, Laurila K, Collin P, Rissanen H, Lohi O, Bravi E, Gasparin M, Reunanen A, Maki M: Increasing prevalence of coeliac disease over time. Aliment Pharmacol Ther 2007, 26:1217–1225. 5. Lohi S, Mustalahti K, Kaukinen K, Laurila K, Collin P, Rissanen H, Lohi O, Bravi E, Gasparin M, Reunanen A, Maki M: Increasing prevalence of coeliac disease over time. Aliment Pharmacol Ther 2007, 26:1217–1225. 6. Marild K, Stephansson O, Montgomery S, Murray JA, Ludvigsson JF: Pregnancy outcome and risk of celiac disease in offspring: a nationwide case–control study. Gastroenterology 2012, 142:39–45. e33. y gy 7. Sandberg-Bennich S, Dahlquist G, Kallen B: Coeliac disease is associated with intrauterine growth and neonatal infections. Acta Paediatr 2002, 91:30–33. Author details 1 1Dept. Medical Epidemiology and Biostatistics, Karolinska Institutet, Stockholm, Sweden. 2Astrid Lindgren Children’s Hospital, Karolinska University Hospital, Solna, Sweden. 3Div. of Paediatrics, Department of Clinical and Experimental Medicine, Linköping University, and Östergötland County Council, Linköping, Sweden. 4Microbial Ecology and Nutrition Research Group, Institute of Agrochemistry and Food Technology, National Research Council (IATA-CSIC), Valencia, Spain. 5Department of Paediatrics, Örebro University Hospital, Örebro, Sweden. Postnatal microbial exposure is likely to play a greater role in immune maturation and thereby CD development as compared with prenatal microbial exposure [35]. Still, vast amount of data suggest that pregnancy is a critical time for immune development and epigenetic models of allergic outcomes suggest that foetal immune development may be influenced by epigenetic modifications from microbial products [35]. In addition, several epidemiological studies have shown that prenatal exposures to antibiotics are asso- ciated with the development of childhood asthma, a disease that shares potential etiological traits with CD [19-21]. Received: 10 December 2013 Accepted: 9 April 2014 Published: 14 April 2014 Received: 10 December 2013 Accepted: 9 April 2014 Published: 14 April 2014 Competing interests The authors declare that they have no competing interests. Competing interests The authors declare that they have no competing interests. Discussion Additionally, we largely lack data on type of antibiotic agent, its dosage, duration of treatment as well as the indication for treatment, which all influence the mother’s microbiota, and that of the offspring [42]. The lacking specificity regarding type of antibiotic exposure may also have contributed to an increased risk of a type 2 error. The type of antibiotic used by the mother should also be linked to the type of infections she experi- enced during pregnacy and her inflammatory status that per se may also influence fetal immune programming and risk of autoimmune disease in the offspring. Acknowledgements This work was supported by; KM: The Swedish Society of Medicine, Karolinska Institutet; JL: Swedish Child Diabetes Foundation (Barndiabetesfonden), Research Council for Southeast Sweden, ALF (Swedish Government), Canadian Research Council, Östgöta Brandstodsbolag, Östergötland County Council, EU Research Grants. YS: grants AGL2011-25169 and Consolider Fun-C-Food CSD2007-00063 from the Spanish Ministry of Economy and Competitiveness; JFL: The Swedish Society of Medicine, the Swedish Research Council, the Örebro Society of Medicine, the Karolinska Institutet, and the Swedish Celiac Society. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. It is well-established that the postnatal intestinal micro- biota influences the maturation of the intestinal immune system and that individuals with CD, or with an increased genetic risk of developing CD, have an imbalanced intestinal microbiota, which may potentially enhance the inflammatory response elicited by gluten [9,43-45]. Animal studies suggest that the intestinal dysbiosis associated with CD may, in the presence of gliadin, increase the permeability of the small-intestine [9] and enable epithelial translocation of gliadin that may trigger CD [9,46]. Although the current study lacks evidence for a prenatal association between antibiotics and CD, our results do not refute the hypothesis that the early intestinal microbiota affects CD development. Abbreviations ABIS: All Babies in Southeast Sweden; CD: Celiac disease; CI: Confidence interval; HR: Hazard ratio; OR: Odds ratio. Additional file 1: Table A1. Risk of coeliac disease according to the child’s use of antibiotics in the first year of life. Hazard ratios (HR) estimated through Cox regression. Competing interests Competing interests The authors declare that they have no competing interests. Additional file Decker E, Engelmann G, Findeisen A, Gerner P, Laass M, Ney D, Posovszky C, Hoy L, Hornef MW: Cesarean delivery is associated with celiac disease but not inflammatory bowel disease in children. Pediatrics 2010, 125:e1433–e1440. 13. Dethlefsen L, Relman DA: Incomplete recovery and individualized responses of the human distal gut microbiota to repeated antibiotic perturbation. Proc Natl Acad Sci U S A 2011, 108(Suppl 1):4554–4561. 35. Prescott SL, Clifton V: Asthma and pregnancy: emerging evidence of epigenetic interactions in utero. Curr Opin Allergy Clin Immunol 2009, 9:417–426. 14. Jakobsson HE, Jernberg C, Andersson AF, Sjolund-Karlsson M, Jansson JK, Engstrand L: Short-term antibiotic treatment has differing long-term impacts on the human throat and gut microbiome. PLoS One 2010, 5:e9836. 36. Magnus MC, Haberg SE, Stigum H, Nafstad P, London SJ, Vangen S, Nystad W: Delivery by Cesarean section and early childhood respiratory symptoms and disorders: the Norwegian mother and child cohort study. Am J Epidemiol 2011, 174:1275–1285. 15. Johnson CL, Versalovic J: The human microbiome and its potential importance to pediatrics. Pediatrics 2012, 129:950–960. 37. Andersen AM, Olsen J: The Danish National Birth Cohort: selected scientific contributions within perinatal epidemiology and future perspectives. Scand J Public Health 2011, 39:115–120. 16. Stephansson O, Granath F, Svensson T, Haglund B, Ekbom A, Kieler H: Drug use during pregnancy in Sweden - assessed by the Prescribed Drug Register and the Medical Birth Register. Clin Epidemiol 2011, 3:43–50. 38. Sepa A, Frodi A, Ludvigsson J: Mothers' experiences of serious life events increase the risk of diabetes-related autoimmunity in their children. Diabetes Care 2005, 28:2394–2399. g g p 17. Stalberg K, Haglund B, Stromberg B, Kieler H: Prenatal exposure to medicines and the risk of childhood brain tumor. Cancer Epidemiol 2010, 34:400–404. 18. Stensballe LG, Simonsen J, Jensen SM, Bonnelykke K, Bisgaard H: Use of antibiotics during pregnancy increases the risk of asthma in early childhood. J Pediatr 2013, 162:832–838. e833. 39. Olen O, Bihagen E, Rasmussen F, Ludvigsson JF: Socioeconomic position and education in patients with coeliac disease. Dig Liver Dis 2012, 44:471–476. 40. Wingren CJ, Bjorck S, Lynch KF, Ohlsson H, Agardh D, Merlo J: Coeliac disease in children: a social epidemiological study in Sweden. Acta Paediatr 2012, 101:185–191. 19. Kero J, Gissler M, Hemminki E, Isolauri E: Could TH1 and TH2 diseases coexist? Evaluation of asthma incidence in children with coeliac disease, type 1 diabetes, or rheumatoid arthritis: a register study. Additional file 8. Round JL, Mazmanian SK: The gut microbiota shapes intestinal immune responses during health and disease. Nat Rev Immunol 2009, 9:313–323. 9 S Y D P G L M U li h i b li di 8. Round JL, Mazmanian SK: The gut microbiota shapes intestinal immune responses during health and disease. Nat Rev Immunol 2009, 9:313–323. 9. Sanz Y, De Pama G, Laparra M: Unraveling the ties between celiac disease and intestinal microbiota. Int Rev Immunol 2011, 30:207–218. Additional file 1: Table A1. Risk of coeliac disease according to the child’s use of antibiotics in the first year of life. Hazard ratios (HR) estimated through Cox regression. 9. Sanz Y, De Pama G, Laparra M: Unraveling the ties between celiac disease and intestinal microbiota. Int Rev Immunol 2011, 30:207–218. Page 7 of 7 Mårild et al. BMC Gastroenterology 2014, 14:75 http://www.biomedcentral.com/1471-230X/14/75 Mårild et al. BMC Gastroenterology 2014, 14:75 http://www.biomedcentral.com/1471-230X/14/75 Mårild et al. BMC Gastroenterology 2014, 14:75 http://www.biomedcentral.com/1471-230X/14/75 10. Penders J, Thijs C, Vink C, Stelma FF, Snijders B, Kummeling I, van den Brandt PA, Stobberingh EE: Factors influencing the composition of the intestinal microbiota in early infancy. Pediatrics 2006, 118:511–521. infancy: a prospective follow up study of healthy infants aged 0–6 months. Arch Dis Child Fetal Neonatal Ed 2000, 83:F186–F192. infancy: a prospective follow up study of healthy infants aged 0–6 months. Arch Dis Child Fetal Neonatal Ed 2000, 83:F186–F192. 32. 32. Adlerberth I, Lindberg E, Aberg N, Hesselmar B, Saalman R, Strannegard IL, Wold AE: Reduced enterobacterial and increased staphylococcal colonization of the infantile bowel: an effect of hygienic lifestyle? Pediatr Res 2006, 59:96–101. 11. Fallani M, Young D, Scott J, Norin E, Amarri S, Adam R, Aguilera M, Khanna S, Gil A, Edwards CA, Dore J: Intestinal microbiota of 6-week-old infants across Europe: geographic influence beyond delivery mode, breast-feeding, and antibiotics. J Pediatr Gastroenterol Nutr 2010, 51:77–84. 33. Dominguez-Bello MG, Costello EK, Contreras M, Magris M, Hidalgo G, Fierer N, Knight R: Delivery mode shapes the acquisition and structure of the initial microbiota across multiple body habitats in newborns. Proc Natl Acad Sci U S A 2010, 107:11971–11975. 12. Fouhy F, Guinane CM, Hussey S, Wall R, Ryan CA, Dempsey EM, Murphy B, Ross RP, Fitzgerald GF, Stanton C, Cotter PD: High-throughput sequencing reveals the incomplete, short-term recovery of infant gut microbiota following parenteral antibiotic treatment with ampicillin and gentamicin. Antimicrob Agents Chemother 2012, 56:5811–5820. 34. Additional file J Allergy Clin Immunol 2001, 108:781–783. 41. Ivarsson A, Myleus A, Norstrom F, van der Pals M, Rosen A, Hogberg L, Danielsson L, Halvarsson B, Hammarroth S, Hernell O, Karlsson E, Stenhammar L, Webb C, Sandstrom O, Carlsson A: Prevalence of childhood celiac disease and changes in infant feeding. Pediatrics 2013, 131:e687–e694. 20. Ludvigsson JF, Hemminki K, Wahlstrom J, Almqvist C: Celiac disease confers a 1.6-fold increased risk of asthma: a nationwide population-based cohort study. J Allergy Clin Immunol 2011, 127:1071–1073. 42. Jernberg C, Lofmark S, Edlund C, Jansson JK: Long-term impacts of antibiotic exposure on the human intestinal microbiota. Microbiology 2010, 156:3216–3223. 21. Cho CE, Norman M: Cesarean section and development of the immune system in the offspring. Am J Obstet Gynecol 2013, 208:249–254. 22. Marild K, Ye W, Lebwohl B, Green PH, Blaser MJ, Card T, Ludvigsson JF: Antibiotic exposure and the development of coeliac disease: a nationwide case–control study. BMC Gastroenterol 2013, 13:109. 43. Guarner F, Malagelada JR: Gut flora in health and disease. Lancet 2003, 361:512–519. 44. De Palma G, Cinova J, Stepankova R, Tuckova L, Sanz Y: Pivotal Advance: Bifidobacteria and Gram-negative bacteria differentially influence immune responses in the proinflammatory milieu of celiac disease. J Leukoc Biol 2010, 87:765–778. 23. Sepa A, Wahlberg J, Vaarala O, Frodi A, Ludvigsson J: Psychological stress may induce diabetes-related autoimmunity in infancy. Diabetes Care 2005, 28:290–295. 24. Ludvigsson JF, Ansved P, Falth-Magnusson K, Hammersjo JA, Johansson C, Edvardsson S, Ljungkrantz M, Stenhammar L, Ludvigsson J: Symptoms and signs have changed in Swedish children with coeliac disease. J Pediatr Gastroenterol Nutr 2004, 38:181–186. 45. Palma GD, Capilla A, Nova E, Castillejo G, Varea V, Pozo T, Garrote JA, Polanco I, Lopez A, Ribes-Koninckx C, Marcos A, Garcia-Novo MD, Calvo C, Ortigosa L, Pena-Quintana L, Palau F, Sanz Y: Influence of milk-feeding type and genetic risk of developing coeliac disease on intestinal microbiota of infants: the PROFICEL study. PLoS One 2012, 7:e30791. 25. Welander A, Tjernberg AR, Montgomery SM, Ludvigsson J, Ludvigsson JF: Infectious disease and risk of later celiac disease in childhood. Pediatrics 2010, 125:e530–e536. 46. Cinova J, De Palma G, Stepankova R, Kofronova O, Kverka M, Sanz Y, Tuckova L: Role of intestinal bacteria in gliadin-induced changes in intestinal mucosa: study in germ-free rats. PLoS One 2011, 6:e16169. 26. Additional file Akobeng AK, Ramanan AV, Buchan I, Heller RF: Effect of breast feeding on risk of coeliac disease: a systematic review and meta-analysis of observational studies. Arch Dis Child 2006, 91:39–43. doi:10.1186/1471-230X-14-75 Cite this article as: Mårild et al.: Antibiotic exposure in pregnancy and risk of coeliac disease in offspring: a cohort study. BMC Gastroenterology 2014 14:75. 27. Norris JM, Barriga K, Hoffenberg EJ, Taki I, Miao D, Haas JE, Emery LM, Sokol RJ, Erlich HA, Eisenbarth GS, Rewers M: Risk of celiac disease autoimmunity and timing of gluten introduction in the diet of infants at increased risk of disease. Jama 2005, 293:2343–2351. 28. Huether CA, Ivanovich J, Goodwin BS, Krivchenia EL, Hertzberg VS, Edmonds LD, May DS, Priest JH: Maternal age specific risk rate estimates for Down syndrome among live births in whites and other races from Ohio and metropolitan Atlanta, 1970–1989. J Med Genet 1998, 35:482–490. 29. Kondrashova A, Mustalahti K, Kaukinen K, Viskari H, Volodicheva V, Haapala AM, Ilonen J, Knip M, Maki M, Hyoty H: Lower economic status and inferior hygienic environment may protect against celiac disease. Ann Med 2008, 40:223–231. 30. Stene LC, Honeyman MC, Hoffenberg EJ, Haas JE, Sokol RJ, Emery L, Taki I, Norris JM, Erlich HA, Eisenbarth GS, Rewers M: Rotavirus infection frequency and risk of celiac disease autoimmunity in early childhood: a longitudinal study. Am J Gastroenterol 2006, 101:2333–2340. 31. Gronlund MM, Arvilommi H, Kero P, Lehtonen OP, Isolauri E: Importance of intestinal colonisation in the maturation of humoral immunity in early
https://openalex.org/W3105757594
https://www.epj-conferences.org/articles/epjconf/pdf/2020/21/epjconf_chep2020_02025.pdf
English
null
GTS – Garfield-based Triple-GEM Simulator
EPJ web of conferences
2,020
cc-by
3,698
∗e-mail: rfarinelli@fe.infn.it Riccardo Farinelli1,∗on behalf of the CGEM-IT BESIII working group 1INFN, Sezione di Ferrara, via G. Saragat 1, 44122 Ferrara, Italy Abstract. Triple-GEM detectors are gaseous devices used in high energy physics to measure the path of the particles which cross them. The charac- terisation of triple GEM detectors and the estimation of the performance for real data experiments require a complete comprehension of the mechanisms which transform the passage of one particle in the detector into electric signals, and dedicated MonteCarlo simulations are needed. In this work we will de- scribe GTS (Garfield-based Triple-gem Simulator), a MonteCarlo code which has been developed to simulate the detector response to the passage of parti- cles inside triple GEMs. The software takes into account the processes from the primary ionization up to the signal formation, e.g. avalanche multiplication and the effects of the diffusion in the gas volume. It uses a parametrization of the variables of interest meant to reproduce the same detector response (i.e. the charge distribution at the anode) as provided by Garfield++, a well known soft- ware that already performs this kind of simulation more detailed and therefore with a high CPU time consumption. In addition to the detector response, the simulation of the APV-25 electronics is implemented and the output is used to reconstruct the particle position with the Charge Centroid (CC) and the micro- Time Projection Chamber (µTPC) methods. A comparison of the simulated performance and the one collected in testbeams is used to tune the parameters used in GTS. Results in different conditions of incident angle will be shown. © The Authors, published by EDP Sciences. This is an open access article distributed under the terms of the Creative Commons Attribution License 4.0 (http://creativecommons.org/licenses/by/4.0/). EPJ Web of Conferences 245, 02025 (2020) CHEP 2019 EPJ Web of Conferences 245, 02025 (2020) CHEP 2019 https://doi.org/10.1051/epjconf/202024502025 GTS - Garfield-based Triple-GEM Simulator Riccardo Farinelli1,∗on behalf of the CGEM-IT BESIII working group 1INFN, Sezione di Ferrara, via G. Saragat 1, 44122 Ferrara, Italy 1 Introduction Gaseous Electron Multiplier (GEM) is a well know technology introduced by F. Sauli in 1997 [1] used to amplify the signal generated by ionizing particles interacting with the gas volume of the detector. The GEM foil considered in this paper consists of a copper coated (5 µm) on a 50 µm kapton foil, with holes of 50 µm diameter and 140 µm of pitch. Electrons entering these holes are accelerated and generate an electron cascade. Multiple stages of GEM foils allow to reach gain of about 104 with a very low discharge probability. The full design of a triple-GEM detector is given by a cathode, three GEM foils and an anode readout. Simulation of this technology is useful to understand the processes that play the main role in this detection technique. An existing software Garfield++ [2], a toolkit for the detailed simulation of particle de- tectors based on ionisation measurement in gases and semiconductors, can perform a detailed simulation of a triple-GEM detector. It simulates step by step all the interactions of the ion- izing particle, the interaction between the electrons and the gas mixture, as a function of the electric field. Since the simulation steps are small (about few µm) compared to the size of a EPJ Web of Conferences 245, 02025 (2020) CHEP 2019 https://doi.org/10.1051/epjconf/202024502025 triple-GEM (about 1 cm) and the number of electrons involved is large (about 105-106) then the simulation of the space and time distributions of the signal at the anode can become quite expensive in terms of CPU time (10-20 hours per event). Examples of triple-GEM simula- tions performed with Garfield++ can be found in literature [3–5]. triple-GEM (about 1 cm) and the number of electrons involved is large (about 105-106) then the simulation of the space and time distributions of the signal at the anode can become quite expensive in terms of CPU time (10-20 hours per event). Examples of triple-GEM simula- tions performed with Garfield++ can be found in literature [3–5]. A fully parametrized simulation, GTS, is described in this work: it takes into account the primary ionization process, the generation of the avalanche in the GEM holes and the electron drift to the readout plane where the induction takes place. The description of the electronics is also taken into account. The results obtained from the simulation are compared with the experimental ones collected in a testbeam. 1 Introduction GTS is not a Garfield++ competitor but a complementary tool to measure the triple-GEM performance, i.e. the spatial resolution, in a faster way than the one proposed by Garfield++ through the parametrization of the main processes (multiplication and diffusion) in order to avoid the step by step simulation performed by Garfield++. 3 Computation of inputs to GTS using the Garfield++ simulation The simulation described in this work, is based on the idea described by Bonivento et al. [9], where the generation of the triple-GEM signal is divided into independent parts: ioniza- tion, GEM amplification, electron drift in each gap, induction and electronics readout. These processes have been simulated with Garfield++ and their output have been parametrized and used as input to the GTS simulation. The geometry description of the detector and its electric field map were performed with Ansys software [10]. Every process is considered indepen- dent. The Garfield++ results are shown in the following subsections. 2 Setup description The triple-GEM detector under study is defined by five electrodes (cathode, three GEM foils, and the anode) and four gaps used to define the drift properties of the electrons: a drift gap between the cathode and the first GEM of 5 mm, two transfer gaps between the GEM foils of 2 mm and an induction gap between the third GEM and the anode. A scheme of the detector is shown in Fig. 2 left. g A gas mixture of Ar+10%iC4H10 fills the detector volume and defines its primary ion- ization properties, the electron drift and the gain of a GEM foil. The high voltage used on each GEM is 275 V, while the electric field in the different gaps is 1.5/2.75/2.75/5 kV/cm. The ionizing particles used in the simulation and in the testbeam are 150 GeV/c momentum muons with variable incident angle with respect to the detector surface. The used readout electronics is the APV-25 ASIC [6], a chip that samples the signal every 25 ns with a shaping time of 50 ns. The experimental data [7] were collected in several testbeams at CERN North Area within the RD51 collaboration [8]. 3.1 Ionization Charged particles crossing a gas mixture lose their kinetic energy and generate primary elec- trons. These electrons constitute the signal that a triple-GEM detector measures. The ioniza- tion process is determined by two factors: the kinetic energy of the particle and the gas mix- ture used. The ionization was simulated separately from the subsequent processes. Several muons were shot in a volume with 5 mm gap to extract the following variables: the number of electrons clusters and the number of electrons inside each cluster. The distributions of those 2 EPJ Web of Conferences 245, 02025 (2020) CHEP 2019 https://doi.org/10.1051/epjconf/202024502025 two quantities are shown in Fig. 1. The primary ionization follows a Poissonian statistic and the most probable value was parametrized to be used in GTS. The number of primary electrons inside each electron cluster was tabulated up to 100 electrons per cluster. Figure 1: Left: distribution of the number of primary electrons (i.e. clusters) generated in the ionization created by 150 GeV/c muons in 5 mm Ar + 10%iC4H10; the histogram is fitted with a Poissonian distribution. Right: distribution of the number of electrons per cluster; the histogram is tabulated to be implemented in the simulation. Figure 1: Left: distribution of the number of primary electrons (i.e. clusters) generated in the ionization created by 150 GeV/c muons in 5 mm Ar + 10%iC4H10; the histogram is fitted with a Poissonian distribution. Right: distribution of the number of electrons per cluster; the histogram is tabulated to be implemented in the simulation. Figure 2: Left: effective gain for a triple-GEM. The histogram is the result of the full chain of simulations of the gain, collection and extraction efficiencies for the three GEMs. The contribution of zero effective gain is removed from the histogram. Right: sketch of a triple- GEM detector with the cathode, three amplification stages and the anode. Each strip measures time and charge and continuous strips are used for CC and µTPC reconstruction methods. Figure 2: Left: effective gain for a triple-GEM. The histogram is the result of the full chain of simulations of the gain, collection and extraction efficiencies for the three GEMs. The contribution of zero effective gain is removed from the histogram. Right: sketch of a triple- GEM detector with the cathode, three amplification stages and the anode. Each strip measures time and charge and continuous strips are used for CC and µTPC reconstruction methods. 3.2 GEM amplification A simulation of a GEM foil was performed in an independent framework to measure the products of the interaction of the electron in the electric field inside the hole: here the elec- trons are accelerated so much that they can ionize several times the gas. It is important to measure the number of electrons generated inside each hole but also the number of electrons that can be collected and extracted by a GEM. Some of the electrons drifting inside a GEM do not enter the hole and another fraction of the electrons generated inside the hole do not reach the next gap. The simulation of this portion of detector is used to extract the intrin- sic gain of the GEM and its transparency. This simulation studied the drift of the electrons from 150 µm before the foil up to 150 µm after the amplification stage; this has been used 3 EPJ Web of Conferences 245, 02025 (2020) EPJ Web of Conferences 245, 02025 (2020) CHEP 2019 https://doi.org/10.1051/epjconf/202024502025 Figure 3: Left: distribution of the position shift, once an electron drifts in the transfer gap, is shown. Superimposed is the Gaussian fit used to measure the mean value and the sigma. Center and right: the motion of the electrons in the drift gap has been evaluated in these figures. The position distribution on the first GEM has been evaluated for electrons generated at several distances from the cathode. The drift gap has been divided in ten slices and each one of them a distribution has been fitted with a Gaussian. The mean value of the Gaussian functions as a function of the position in the drift gap is shown in the center; while the sigma of these distributions is shown in the right figure. The three plots have been evaluated with 1 T magnetic field. Figure 3: Left: distribution of the position shift, once an electron drifts in the transfer gap, is shown. Superimposed is the Gaussian fit used to measure the mean value and the sigma. Center and right: the motion of the electrons in the drift gap has been evaluated in these figures. The position distribution on the first GEM has been evaluated for electrons generated at several distances from the cathode. The drift gap has been divided in ten slices and each one of them a distribution has been fitted with a Gaussian. 3.2 GEM amplification The mean value of the Gaussian functions as a function of the position in the drift gap is shown in the center; while the sigma of these distributions is shown in the right figure. The three plots have been evaluated with 1 T magnetic field. to extract the GEM transparency, as the product of the collection efficiency (the probability to enter the hole) and the extraction efficiency (the probability to leave it). Together with the transparency, the number of secondary electrons generated by one electron entering the hole was extracted and fitted with a Polya distribution that well describes the fluctuations of the gain of a single GEM. The GEM transparency depends on the electric fields involved: the one between the previous electrode and the GEM and the one between the GEM and the next electrode. For this reason the transparency of each GEM foil has been measured separately. The product of the transparency and the intrinsic gain gives the extrinsic gain. The full de- tector gain can not be evaluated by the product of the three Polya distribution. Therefore a detailed simulation of the three GEM amplification stages was used to generate a distribu- tion that fully describes the multiplication in a triple-GEM detector: one million of electrons have been simulated and for each amplification stage an intrinsic gain was sampled from the corresponding Polya distribution and transparency value, as shown in Fig. 2 right. 4 GTS simulation and position reconstruction The processes described in Sec. 3 define the details of a triple-GEM signal amplification and their parametrization from Garfield simulation. These were studied separately because they do not interfere at present setup conditions. Now the description of the GTS simulation is presented together with a simulation of the electronics and the position reconstruction. The simulation of an ionizing particle interacting with a triple-GEM starts from the ion- ization that generates the primary electrons in the drift gap. The inter-primary distance is randomized from an exponential function since the number of primary electrons follows a Poissonian statistics, see Fig. 1 left. For each primary, a certain number of secondary elec- trons are generated according to the distribution shown in Fig. 1 right. The transparency value is used to determine how many electrons survive to the first GEM and the effective gain distribution, shown in Fig. 2 left, to calculate the number of secondary electrons generated by each primary. The secondary electrons are randomly smeared in space and time in agreement with a Gaussian distribution whose mean value and sigma are those shown in Fig. 3. At the end, the final position of the electrons is used to determine the strip position for the readout and the signal generated by the electronics. Each electron reaching the anode is associated to the proper strip; its arrival time together with its charge is used to define the induced cur- rent. This is an approximation of the real induction process described by the Ramo [11] and Riegler [12] theorems. The induced current, shown in Fig. 4 top left, was used to determine the signal exiting the ASIC with the simulation of a pre-amplifier that integrates the charge and a shaper with integration time of 50 ns to determine the fraction of charge readout, see Fig. 4 mid-left and mid-right. A Gaussian noise was included for each channel, as well as threshold levels compatible with the testbeam condition. Once the readout signal was generated strip by strip, the charge and time information were used to apply two reconstruction algorithms on clusters of contiguous strips: the charge centroid (CC) and the micro-Time Projection Chamber (µTPC). 3.3 Electron drift Drift properties such as transverse and longitudinal diffusion strongly depend on the gas mixture and the electromagnetic field. These values are well known in literature and a parametrization was performed based on the results of the Garfield++ simulation. A sim- ulation of the electron drift was run for each gap and the distribution of the space shift was evaluated: i.e. ten thousand electrons were drifted from 150 µm below the first GEM up to 150 µm before the second GEM. A Gaussian fit was used to extract the mean value and the sigma of the distribution, see Fig. 3 left. The same procedure was followed for the other transfer gap and the induction gap. The drift in these gaps is performed by each electron gen- erated before the first GEM. This method can not be used in the drift gap, where the primary ionization can take place in different positions and the path of each electron is different from the other one. Here a simulation of the electron drift was performed for different distances from the first GEM. A Gaussian fit has been used for each point to extract the mean value and the sigma as a function of the distance from the first GEM: Fig. 3 center and right show these results. The same studies have been performed for the time information. 4 https://doi.org/10.1051/epjconf/202024502025 EPJ Web of Conferences 245, 02025 (2020) CHEP 2019 4 GTS simulation and position reconstruction The CC performs a weighted average of the strips position with their charge as weight, while the µTPC uses the time information to measure the distance between the particle path and the anode: a bi-dimensional point is associated to each strip and a straight line fit is used to measure the particle position. A sketch of the two methods is shown in Fig. 2 right, while the formulas are described in Eq. 1: xCC = Pcl.size i=0 xhit,i qhit,i Pcl.size i=0 qhit,i ; xµTPC = gap/2−b a (1) (1) where a is the slope of the fitting line, b is the constant and gap is the drift gap thickness. where a is the slope of the fitting line, b is the constant and gap is the drift gap thickness. 5 Tuning with experimental data Despite the detailed simulation performed with Garfield++ used to implement the parameter in GTS, the simulated results differ from the ones measured in the experimental setup. The reason is due to some approximation applied in the GTS simulation and some known prob- lem in the Garfield++ simulations [13, 14]. Four sentinel variables were used to tune the simulations: strip-cluster charge, strip-cluster size, CC and µTPC spatial resolution. A com- parison of these values from the experimental results and the simulation has been performed for different incident angles. A χ2 evaluation was used to measure the matching of the values. A set of configurations was evaluated to minimize the χ2 and the best results were ob- tained using a tuning factor on the gain and on the electron diffusion. The results of the tuning are shown in Fig. 5. 5 5 5 EPJ Web of Conferences 245, 02025 (2020) EPJ Web of Conferences 245, 02025 (2020) CHEP 2019 https://doi.org/10.1051/epjconf/202024502025 Figure 4: Top left: induced current on a single strip in a single particle simulation. Top right: shape of the current after the pre-amplifier simulation on a single strip. Bottom left: shape of the current after a shaper simulation with a RC-CR circuit having an integration time of 50 ns. Bottom right: example of the signal measured by a real event from an experimental setup to be compared with the previous picture. Figure 4: Top left: induced current on a single strip in a single particle simulation. Top right: shape of the current after the pre-amplifier simulation on a single strip. Bottom left: shape of the current after a shaper simulation with a RC-CR circuit having an integration time of 50 ns. Bottom right: example of the signal measured by a real event from an experimental setup to be compared with the previous picture. 6 Conclusion A detailed parametrized simulation of a triple-GEM detector has been performed starting from Garfield++ simulation. The simulation takes into account also the effects of the elec- tronics and a tuning procedure of the data. This new approach exploits a parametrization of the Garfield++ output to reduce significantly the computational time up to few seconds to generate the charge and time distribution of the electron at the anode. With this parametriza- tion of the distributions obtained with the Garfield++ simulation, tuned to better reproduce the real test beam data, we are able to describe satisfactorily the GEM detector response. Therefore, this tool can be used to quickly emulate the response of other possible detector configurations. Acknowledgments This work is supported by the Italian Institute of Nuclear Physics (INFN). The research leading to these results has been performed within the FEST Project, funded by the European Commission in the call RISE-MSCA-H2020-2020. 6 6 https://doi.org/10.1051/epjconf/202024502025 EPJ Web of Conferences 245, 02025 (2020) CHEP 2019 Figure 5: Experimental and simulated results for the four sentinel variables as a function of the incident angle: cluster charge (top left), cluster size (top right), CC resolution (bottom left) and µTPC (bottom right). The tuning values have been already applied in the shown set of results. Figure 5: Experimental and simulated results for the four sentinel variables as a function of the incident angle: cluster charge (top left), cluster size (top right), CC resolution (bottom left) and µTPC (bottom right). The tuning values have been already applied in the shown set of results. [12] W. Riegler, Extended theorems for signal induction in particle detectors VCI 2004, Nucl. Instr. and Meth. A 535, 287-293, DOI:10.1016/j.nima.2004.07.129 (2004). [14] A. Sharma, A How-to Approach for a 3d Simulation of Charge Transfer Characteristics in a Gas Electron Multiplier, ICFA Instrum.Bull. 19 (1999) 2 [11] S. Ramo, Currents Induced by Electron Motion, Proc. of the IRE 27(9), 584–585, DOI:10.1109/JRPROC.1939.228757 (1939). References [1] F. Sauli, GEM: A new concept for electron amplification in gas detectors, Nucl. Instr. and Meth. A 386, 531–534, DOI:10.1016/S0168-9002(96)01172-2 (1997) [2] R. Veenhof, GARFIELD, recent developments, Nucl. Instr. and Meth. A 419, 726-730, DOI:10.1016/S0168-9002(98)00851-1 (1998) [3] S. Swain et al., A Simulation Model for Triple GEM Detector, ADNHEAP 2017, 223- 229 (2017) [4] D. Baranov et al., Simulation of the GEM detector for BM@N experiment, EPJ Web of Conferences 138, 11004 (2017) [5] V. Brio et al., Simulations of Triple-GEM tracker’s response for experiments at Jefferson Lab, Radiation Effects and Defects in Solids, 174:11-12, 1031-1046 (2019) [6] L. L. Jones et al., The APV25 Deep Submicron Readout Chip for CMS Detectors, Conf. Proc. C 9909201 162-166, DOI:10.5170/CERN-1999-009.162 (1999) [7] M. Alexeev et al., Triple GEM performance in magnetic field, 2019 JINST 14 P08018, DOI:10.1088/1748-0221/14/08/P08018 (2019) [7] M. Alexeev et al., Triple GEM performance in ma DOI:10.1088/1748-0221/14/08/P08018 (2019) [8] http://rd51-public.web.cern.ch/rd51-public/ [9] W. Bonivento et al., A Complete Simulation of a Triple-GEM Detector, IEEE Trans. Nucl. Sci. 49(4), DOI:10.1109/TNS.2002.805170 (2002) 7 https://doi.org/10.1051/epjconf/202024502025 EPJ Web of Conferences 245, 02025 (2020) CHEP 2019 [13] Rob Veenhof, private communication [13] Rob Veenhof, private communication [14] A. Sharma, A How-to Approach for a 3d Simulation of Charge Transfer Characteristics in a Gas Electron Multiplier, ICFA Instrum.Bull. 19 (1999) 2 8 8
https://openalex.org/W2032140135
https://www.scielo.br/j/rbh/a/886ZsW8YGYsjtFdqJJ7bCsb/?lang=pt&format=pdf
Portuguese
null
Estratégias populares de sobrevivência: o mutualismo no Rio de Janeiro republicano
Revista brasileira de história
2,009
cc-by
10,588
* Professora Associada do Programa de Pós-Graduação em História da UFJF. Doutora em História Social pela UFRJ. Bolsista de produtividade do CNPq. Laboratório de História Política e Social (LAHPS), Departamento de História/ICH, salas 26 e 27. Campus Universitário (UFJF), Bairro Martelos. 36036-330 Juiz de Fora – MG – Brasil. claudia.viscardi@ufjf.edu.br Estratégias populares de sobrevivência: o mutualismo no Rio de Janeiro republicano1 Popular strategies of survival: mutualism in the republican Rio de Janeiro Popular strategies of survival: mutualism in the republican Rio de Janeiro Cláudia Maria Ribeiro Viscardi* Abstract Como narra a historiografia sobre o tema, especialmente relacio- nada à Europa Ocidental, no período medieval a pobreza era vista como vir- tude daqueles que por ela optavam com o fim de expurgar pressupostos peca- dos. Mais tarde, constituiu-se em indício da presença de vícios, como a preguiça, o desânimo, a imprudência, ou da ausência de caráter. Ao final do século XIX, passou a ser vista como um mal derivado das circunstâncias his- tóricas, e responsabilizaram-se agentes econômicos impessoais, como o mer- cado, os mecanismos desiguais de distribuição de renda, o desemprego e tan- tos outros.2 Tais diferentes olhares sobre a pobreza foram acompanhados de estratégias construídas para a sua superação ou amenização, as quais igualmente variaram no tempo e no espaço. As elites políticas e econômicas, os religiosos, os filan- tropos laicos, os intelectuais e os cientistas, entre outros setores sociais, não se eximiram de opinar sobre o problema ou de agir sobre ele. Tão logo a pobreza foi estigmatizada, deixando de ser uma virtude responsável pela salvação de suas vítimas, os filantropos (laicos ou religiosos) empenharam-se para minorá- la mediante inúmeras ações, que incluíam a doação de alimentos, roupas, re- médios e dinheiro, entre outros itens. Como o pauperismo não regredia, a solução foi investir na construção de abrigos, que assumiram o formato de hospitais, hospícios, albergues, orfanatos ou asilos. Em todo o mundo ociden- tal tais soluções se repetiram, de forma minimamente diferenciada. Em geral, quando se aborda o tema da pobreza, as preocupações se voltam para os não pobres, que lutam por dirimi-la. Pouca atenção é conferida para as estratégias que os próprios pobres engendravam, em sua luta cotidiana pe- la sobrevivência. Quando o tema é assistência ou seguridade social, pouco se fala sobre os incontáveis momentos em que os próprios pobres se ajudavam mutuamente. Mesmo vitimados por mazelas comuns, encontravam meios de expandir laços de solidariedade entre si, responsáveis pelo fortalecimento de elos comunitários, sem os quais dificilmente se manteriam vivos. Ações simples como o cuidado com as crianças dos vizinhos, os pequenos emprésti- mos e o abrigo voluntário a quem dele não dispusesse, entre outras colaborações, são fartamente encontradas nas mais diversas comunidades carentes, desde tempos imemoriais. Por essa razão, Robert Castel chamou-nos a atenção para o personagem que adveio no novo roteiro inaugurado com a implantação do capitalismo no campo: o “desfiliado”. Abstract Trata-se de um estudo sobre o mutualis- mo na cidade do Rio de Janeiro, visto como uma das estratégias escolhidas pe- los trabalhadores para escapar às condi- ções de pobreza em que viviam ou, pelo menos, amenizá-las. O artigo busca ofe- recer um quadro geral do fenômeno na então capital brasileira, levando em con- ta sua dimensão, duração, trajetória e principais características. Ao mesmo tempo, procura realçar quais setores eram excluídos do movimento, enten- dendo que sua identidade era definida com base no estabelecimento de algumas fronteiras delimitadoras entre setores sociais distintos. Busca-se estabelecer um diálogo com os trabalhos produzidos sobre o mutualismo, no Brasil e, sobre- tudo, no exterior. Foram utilizados, co- mo fontes primárias, dois levantamentos inéditos produzidos sobre o fenômeno no Rio de Janeiro, além de informações anteriormente referenciadas por outros autores, às quais tivemos acesso. This article is about friendly societies movement in the city of Rio de Janeiro, seen as one of the strategies chosen by the workers to face poverty and to im- prove life conditions. The article intends to offer a general overview about the mutual movement in the Brazilian capi- tal at that moment, considering differ- ent aspects as its dimensions, lifetime, trajectory, and main characteristics. At the same time, it aims to stress sectors excluded from the movement, whose identity was based on the established frontiers that separated distinct social sectors. The article intents, as well, to promote a dialogue with other research- es about friendly societies in Brazil, and especially the ones produced abroad. We used, as the main sources, two sta- tistic series never studied before, about the phenomenon in Rio de Janeiro, be- sides other group of sources. Keywords: friendly societies; workers; poverty. Palavras-chave: sociedades de auxílio mútuo; trabalhadores; pobreza. * Professora Associada do Programa de Pós-Graduação em História da UFJF. Doutora em História Social pela UFRJ. Bolsista de produtividade do CNPq. Laboratório de História Política e Social (LAHPS), Departamento de História/ICH, salas 26 e 27. Campus Universitário (UFJF), Bairro Martelos. 36036-330 Juiz de Fora – MG – Brasil. claudia.viscardi@ufjf.edu.br Revista Brasileira de História. São Paulo, v. 29, nº 58, p. 291-315 - 2009 Revista Brasileira de História. São Paulo, v. 29, nº 58, p. 291-315 - 2009 Cláudia Maria Ribeiro Viscardi Historicamente, o olhar sobre a pobreza permitiu diferentes abordagens em relação a suas causas, sua contingência real ou ilusória e alternativas de sua superação. Revista Brasileira de História, vol. 29, nº 58 Abstract Para o autor, esse personagem se definia como o trabalhador que, ao não encontrar mais condições de ocupação no Revista Brasileira de História, vol. 29, nº 58 292 Estratégias populares de sobrevivência... campo, em razão das mudanças lá introduzidas, abandonava a sua comunida- de de origem e se lançava numa aventura nova em busca de sobrevivência, normalmente migrando das áreas rurais para as cidades. Tal movimento mi- gratório rompia com os laços de proteção comunitária em que esse personagem se enredava, tornando-o um desfiliado (Castel, 1998, p.43). Os pobres possuem à sua disposição algumas estratégias de superação da pobreza. Mas elas podem ser agrupadas em duas modalidades de escolha, ra- ramente excludentes: o apelo por proteção de alguém que dispõe de bens dis- poníveis a serem doados, e o recurso à ajuda mútua, na qual o próprio grupo se apoia, estabelecendo redes de colaboração entre seus membros. Daí decorrem dois tipos de relação social. No primeiro caso, o outro a quem se recorre pode assumir a face de uma Igreja, do Estado, do cidadão benemérito ou do coronel, e outras tantas variações que se encaixam bem no conceito de paternalismo. Tal relação tende a ter um trajeto verticalizado, no qual o doador estabelece com o receptor uma hierarquia cujo tom, à revelia das intenções ou motivações, será o do poder de quem doa sobre quem recebe. Nessa situação, o receptor se encontrará submetido ao doador, mesmo que este último não se utilize da relação em seu próprio proveito. No segundo caso, o outro é um igual, aquele que compartilha das mesmas necessidades e potencialidades. Juntos, desenvolvem relações de reciprocidade que tendem a ser mais balanceadas. Todos contribuem e todos recebem a contribuição. Re- alçam o ethos da obrigação mútua e a responsabilidade coletiva pelo bem-estar dos outros. Nesse contexto as relações tendem a ser mais horizontalizadas, e as hierarquias, menos definidas. A dependência persiste, mas assume um ca- ráter mútuo. A definição e a mensuração da pobreza sempre se constituíram em pro- blema para os cientistas sociais e, sobretudo, para os historiadores, na medida em que o conceito variou no tempo e no espaço. Para os fins desta pesquisa, optou-se por adotar um conceito mais geral, por ser mais adequado à realidade brasileira nas primeiras décadas do século XX, foco do presente artigo. Abstract Udaya Wagle sugere a junção de três referenciais para que se possa con- ceituar melhor a pobreza: o referencial econômico, o capacitário e o da exclu- são social. Dessa forma, a autora entende a pobreza como a ausência de renda e riqueza (econômico); de educação e saúde, condições que capacitam os in- divíduos a adquirirem renda ou riqueza (capacitário); e a presença da exclusão étnica ou de gênero, o que impede que os indivíduos participem politicamen- te da vida cívica e cultural de uma sociedade (referencial da exclusão social).3 Nesse sentido, os recursos à filantropia e ao mutualismo podem ser lidos 293 Dezembro de 2009 Cláudia Maria Ribeiro Viscardi como duas das inúmeras alternativas disponíveis aos pobres para a superação de determinadas carências, resultantes da situação de pobreza. Graças à filan- tropia era possível obter, em parte, condições para complementar a renda, manter ou melhorar a saúde ou ter acesso à educação. No que tange à estraté- gia mutualista, os trabalhadores poderiam garantir por meio dela uma renda complementar, o acesso ao atendimento médico, ou diminuir os efeitos da exclusão social, na medida em que tais sociedades ofereciam espaços de for- mação de uma cultura cívica e, eventualmente, de participação política. É sobre uma dessas alternativas de enfrentamento da pobreza que preten- demos refletir neste artigo. Para tal, escolhemos o recurso à ajuda mútua, atra- vés da participação dos trabalhadores em associações mutualistas, muito em- bora a filiação a uma mutual estivesse longe de garantir imunidade contra o empobrecimento. Além disso, recorrer à autoajuda ou submeter-se à caridade muitas vezes não derivavam de escolhas racionais dos agentes vitimados pela pobreza, mas de inúmeros outros fatores que os levavam à condição ou de sujeitos de sua própria sobrevivência, ou de objetos da boa vontade alheia, ou mesmo de ambos. Fazem parte do debate sobre o mutualismo as teses que alegam ter sido o movimento composto não por trabalhadores pobres, mas pela “aristocracia operária”.4 Ademais, sabe-se que alguns indivíduos bem aquinhoados poderiam compor uma mutual, embora não se constituíssem na maioria de seus sócios. A despeito de tais ponderações, é inegável que o movimento associativo mu- tualista foi composto, sobretudo, por trabalhadores – assalariados ou não – que por não serem ricos, precisavam garantir a sua sobrevivência e a de seus fami- liares em momentos de infortúnio. Abstract Dessa forma, as mutuais recrutaram seus sócios preferencialmente entre os trabalhadores humildes, que não fossem totalmente destituídos ou marginalizados, mas que delas necessitassem, por não disporem nem da proteção do Estado nem de riquezas acumuladas. Na ausência das mutuais, só lhes restaria a caridade alheia. A proximidade entre tais estratégias de sobrevivência levou grande parte de seus agentes a ter dificuldade no estabelecimento das fronteiras entre mu- tualismo e filantropia. Tanto no ocidente europeu como no Brasil, várias ­mutuais praticavam caridade, e os legisladores tiveram problemas em definir as sociedades como de socorro mútuo, beneficentes, filantrópicas, seguradoras privadas com fins lucrativos, ou mesmo sindicais. Simon Cordery afirma que no Reino Unido, só a partir de 1860 se estabeleceu uma melhor distinção entre caridade e ajuda mútua, após a ocorrência de mudanças culturais e políticas. 294 Revista Brasileira de História, vol. 29, nº 58 Estratégias populares de sobrevivência... No Brasil, em trabalho anterior, tivemos a oportunidade de refletir sobre a ausência de distinções entre as duas práticas, ao final do século XIX.5 Com o fim de fundamentar as reflexões aqui propostas, escolhemos a cidade do Rio de Janeiro, nas primeiras décadas do século XX. Pretendemos acompanhar de que forma os pobres se ampararam mutuamente, em um pe- ríodo marcado pelo intenso processo de modernização. Em definição mais clássica, a modernização pode ser entendida como um conjunto de mudanças sociais e políticas que acompanharam a industrialização. Ao longo desse processo, ocorreu a expansão da autoridade pública e da cida- dania. Para Bendix, esse intenso movimento de mudança implicou a coexis- tência entre o tradicional e o moderno nos países onde ocorreu, na medida em que a modernidade implantada foi necessariamente pautada pela tradição acu- mulada ao longo dos anos anteriores.6 No Brasil, as primeiras décadas do século XX soaram sob o tom da mo- dernização. A abolição havia retirado as amarras que freavam a expansão da cidadania. E o fim da Monarquia, ao descentralizar as estruturas governamen- tais, permitira maior expansão da autoridade pública. No que diz respeito à coexistência entre o tradicional e o moderno, típica desse período de transição, pode-se afiançar que o recurso à filantropia deno- tava a permanência de relações paternalistas tradicionais, que sedimentavam a cultura política brasileira desde o período colonial. Dezembro de 2009 Abstract Porém, o recurso à ajuda mútua pode ser lido como uma estratégia típica dos contextos nos quais o processo de modernização entrava em curso, na medida em que era capaz de conferir a seus agentes valores muito difundidos pelo discurso liberal dos con- temporâneos, tais como os da respeitabilidade, da autonomia e da liberdade. Não pretendemos com tais relações afiançar que a modernidade, tão logo implantada, teria posto fim às relações de caridade que interligavam pobres e ricos, receptores e doadores de ajuda. Mas pode-se afirmar que o seu avanço, sobretudo nos locais onde ocorreu significativa expansão da cidadania, reduziu as estratégias populares de recorrer-se à filantropia. Abram de Swaan destaca que nos países onde inexistia seguridade social, o apelo para a generosidade das pessoas era muito grande. Após ser instituído o sistema de contribuição compulsória, que garantiu aos pobres a proteção social necessária, retirou-se um pouco da tragédia e também um pouco da magia relativa à religiosidade do homem ocidental.7 Na Europa, o advento do Welfare State foi responsável pela redução sig- nificativa do recurso à caridade, embora não tenha posto um fim definitivo às ações filantrópicas, mesmo em seu território. Mas é incontestável admitir que 295 Cláudia Maria Ribeiro Viscardi tais ações voltaram-se majoritariamente para outros países e internacionaliza- ram as relações de caridade, que se tornaram mais impessoais. Atualmente, as Ongs vêm cumprindo um papel cada vez mais efetivo na institucionalização desse tipo de ajuda. Referindo-se a esse contexto, Godelier afirma que as dá- divas tornaram-se institucionalizadas, e o dom passou a ser um ato a ligar sujeitos abstratos.8 Tendo por alvo a análise de uma das mais frequentes estratégias escolhidas pelos pobres, como meio de suprir suas necessidades mais imediatas – o recur- so à ajuda mútua –, voltaremos agora nosso olhar para o Rio de Janeiro repu- blicano, enfocando esse conjunto de experiências na então capital do Brasil. O mutualismo no Rio de Janeiro sob as lentes dos historiadores Do que temos conhecimento, o mutualismo carioca foi estudado pionei- ramente por Michael Conniff, em 1975.9 O autor teve como objetivo mapear o comportamento associativo do município entre 1870 e 1945. Com esse fim, lançou mão de alguns levantamentos produzidos por encomenda dos governos Imperial e Republicano. Ao analisar as várias modalidades de associações, levou em conta as de caráter mutualista, por ele qualificadas como entidades laicas, inicialmente compostas por trabalhadores qualificados e de renda estável. Mais tarde, o fenômeno teria se tornado mais difuso, ampliando o espectro de as- sociados. O autor confere destaque especial às associações dos funcionários públicos e às associações de trabalhadores por categoria ou empresa. Porém, não trata essas sociedades como mutualistas, embora o fossem em sua maioria. Talvez por essa razão, tenha encontrado tão poucas mutuais no Rio de Janeiro republicano. Em que pese o pouco relevo conferido ao fenômeno, enquanto espaço de representação de interesses, para ele o movimento contribuiu com a explicitação de uma série de conflitos sociais, responsáveis por trazer à tona a chamada ‘questão social’. Mais de dez anos depois, Beatriz Kushnir 10 abordou o tema, embora sua pesquisa não tenha tido como objetivo precípuo estudar o fenômeno mutua- lista de forma global. Seu trabalho, acerca da prostituição e da sexualidade das chamadas ‘polacas’ identificou a existência de cinco sociedades mutualistas nas cidades do Rio de Janeiro, Santos, São Paulo, Buenos Aires e Nova York. Tais sociedades atuavam como mecanismos de proteção das mulheres – em sua maioria judias – em meio às situações adversas em que viviam. Cada uma das 296 Revista Brasileira de História, vol. 29, nº 58 Estratégias populares de sobrevivência... associações tinha uma sede social própria, um cemitério e uma sinagoga, além de todo um aparato administrativo eficiente. Graças às mutuais, aquelas mu- lheres em situação de risco conseguiam reforçar uma identidade afirmativa, amenizando em parte os inconvenientes resultantes de sua marginalidade so- cial. Muito embora o conhecimento sobre a existência de tais sociedades seja relevante para o entendimento do fenômeno mutualista, sabe-se que se cons- tituíram em exceções, na medida em que as mutuais, em sua maioria, eram espaços masculinos. Cláudio Batalha, ao analisar um conjunto variado de fontes, identificou que a maior parte das sociedades de trabalhadores formadas na cidade do Rio de Janeiro entre 1835 e 1899 era de caráter mutualista. Dezembro de 2009 O mutualismo no Rio de Janeiro sob as lentes dos historiadores Em seu trabalho abor- da as relações dessas sociedades com a escravidão, com o republicanismo e com o movimento sindical. Levanta a hipótese de que as mutuais eram os únicos espaços legalmente disponíveis aos trabalhadores manuais que quises- sem se organizar após 1824. Por essa razão, muitas mutuais se utilizavam des- se precedente para atender ao seu objetivo primordial, que era o da defesa profissional. Batalha leva em conta também as relações existentes entre as mu- tuais, irmandades e corporações de ofícios, modalidades diferentes de organi- zação da sociedade civil, mas que compartilhavam uma série de valores, rituais e práticas comuns.11 Mais tarde, o trabalho de Ronaldo de Jesus,12 focado nas relações entre o povo e o monarca, tal como Batalha, utilizou igualmente do conjunto docu- mental disponível no Conselho de Estado. Em sua análise destacou que algumas mutuais recorriam ao Império para requisitar algum tipo de apoio que lhes garantisse a subsistência. Quando conseguiam, podiam usar o prefixo “Impe- rial” em seus nomes. O autor destaca a existência de mutuais compostas ex- clusivamente por escravos, algumas delas formadas para financiar a compra de alforrias. Encontrou outras, de caráter menos popular, que recebiam o apoio de setores da elite, levando-as a travar compromissos políticos que resultaram, na maioria das vezes, em restrição de sua autonomia. Em levantamento posterior realizado sobre a mesma documentação, o mesmo autor encontrou 239 associações funcionando no Rio de Janeiro, entre 1860 e 1889. Delas realçou as compostas por trabalhadores: ourives, tipógrafos, artistas da construção naval, maquinistas, alfaiates e operários fabris, entre outros. Ronaldo de Jesus identificou tais sociedades como espaços de constru- ção de relações de solidariedade horizontais e levantou a hipótese de que, a despeito de as sociedades terem sido marcadas pelos mecanismos tradicionais de dominação política, próprios da sociedade escravista monárquica, suas ex- 297 Dezembro de 2009 Cláudia Maria Ribeiro Viscardi periências contribuíram para a formação de uma cultura emergente, específi- ca dos subordinados.13 Recentemente, Vitor Fonseca14 voltou seu olhar sobre o fenômeno asso- ciativista da cidade do Rio de Janeiro, de forma mais ampla, incluindo em suas análises as mutuais, as associações filantrópicas, recreativas, religiosas, de lazer etc. Revista Brasileira de História, vol. 29, nº 58 O mutualismo no Rio de Janeiro sob as lentes dos historiadores Para a produção de um levantamento inédito do fenômeno associativo na cidade, no período compreendido entre 1903 e 1916, o autor se utilizou prio- ritariamente dos estatutos depositados no Registro Especial de Títulos e Do- cumentos do Rio de Janeiro, bem como de dados referentes a associações en- contrados no Almanaque Laemmert. No trabalho produzido consta um acompanhamento minucioso de todo o processo de regulamentação jurídica do fenômeno associativo no Brasil, realizado tanto no Império como na Re- pública. Destaca-se, igualmente, a análise empreendida pelo autor sobre as sedes e os diplomas de várias associações. Para os fins deste artigo, procuramos acessar uma documentação alterna- tiva e complementar às que foram pesquisadas, muito embora, em projeto anterior, tenhamos trabalhado também com a documentação depositada no Conselho de Estado, da qual igualmente lançaremos mão. Assim, utilizaremos dois levantamentos das associações da cidade do Rio de Janeiro, os quais foram produzidos no início do século XX. O primeiro levantamento foi feito por Ferreira da Rosa, a pedido de Pe- reira Passos.15 O autor publicou um livro ilustrado sobre a cidade do Rio de Janeiro, do qual constam um breve histórico sobre o município e inúmeras informações sobre seu sistema viário, seus serviços de instrução pública, polí- cia, abastecimento de água, sua economia e os serviços de assistência. Ao final da obra há um anexo com 181 associações por ele conhecidas, no ano de 1902. Os dados foram recolhidos de 1815 a 1904 (e o livro foi publicado no ano se- guinte). Por trabalhar com um pequeno número de associações e com critérios mais homogêneos, os dados de Rosa são muito úteis. Na gestão do prefeito Bento Ribeiro (1910-1914), o advogado, escritor e jornalista Ataulfo de Paiva foi incumbido de realizar um segundo levantamen- to estatístico geral de todos os estabelecimentos de assistência pública e priva- da, existentes na capital. Esse levantamento – no qual foram incluídas as asso- ciações mutualistas – buscava produzir um diagnóstico que orientasse o combate à crescente pobreza que avassalava o Rio de Janeiro. A encomenda, iniciada em 1903, só pôde ser concluída em 1922, quando foi publicada em edição comemorativa do centenário de “nascimento” do Brasil.16 Para esse fim, Paiva organizou três tipos diferentes de questionários, que Revista Brasileira de História, vol. 29, nº 58 298 Estratégias populares de sobrevivência... foram enviados às associações de auxílio mútuo, aos asilos e recolhimentos e a hospitais. O mutualismo no Rio de Janeiro sob as lentes dos historiadores Ademais, visitou quase todas as instituições sobre as quais obteve informações através do questionário. Foram recenseadas 624 instituições, que se encontravam em funcionamento entre os anos de 1912 e 1920 no Rio de Janeiro. Com base nessa importante documentação, discutiremos o fenômeno na cidade do Rio de Janeiro sobre três eixos: a composição do movimento, sua dimensão e sua trajetória. Dezembro de 2009 Os incluídos e os excluídos Raramente as mutuais se construíram em bases igualitárias. Muito embo- ra definissem sua identidade a partir da isonomia e da ajuda mútua, eram es- truturas hierarquizadas e excludentes. Para integrar uma mutual era preciso, em primeiro lugar, possuir renda regular, que possibilitasse o pagamento das mensalidades, embora elas fossem baixas. Desse critério já estavam excluídos os desempregados, os miseráveis e os trabalhadores sazonais, entre outros. Mas não era essa a única fronteira que afastava do movimento boa parcela da so- ciedade civil. Havia outros critérios excludentes como os etários, raciais, de gênero, de status ou de região. Tal fenômeno não foi exclusivamente brasilei- ro, mas se repetiu em diversos locais do mundo, com ênfase em um ou outro critério, dependendo do país. Ao se constituírem em espaços de ajuda solidária, tentavam obscurecer as diferenças sociais entre seus membros. Em contraposição, realçavam outras diversidades, tais como as de cor, de gênero e de nacionalidade. Nesse sentido, as mutuais esforçaram-se em negar a importância das diferenças de classe, oferecendo idade, gênero e raça como categorias apropriadas para a organiza- ção de identidades coletivas. Mas enquanto a importância social da instituição mutual é reconhecida, há pouco consenso e menos clareza teórica sobre o seu papel na construção da identidade de classe nesse período. Sua composição multiclassista pode ter facilitado mais uma solidariedade interclassista do que intraclassista. Por essa e por outras razões, alguns historiadores questionam a contribuição dada pelo mutualismo ao processo de formação de uma classe trabalhadora homogênea e igualitária.17 No Brasil percebem-se, ao menos, quatro modalidades de exclusão: por renda ou profissão, por gênero, por idade e por nacionalidade. A de gênero era a mais visível. Mary Clawson afirma que organizações como as corporações de ofício, irmandades, maçonaria, sociedades de socorros mútuos e demais fra- 299 Dezembro de 2009 Cláudia Maria Ribeiro Viscardi ternidades tinham em comum o fato de se constituírem em espaços de reforço de alguns valores. Entre eles destacava-se o da masculinidade, e a identidade masculina era lida como autoridade patriarcal. O fraternalismo servia, entre outras coisas, para delimitar fronteiras de exclusão daqueles que não tivessem o status de homens e adultos (Clawson, 1989, p.45-52). Num contexto em que a maioria das mulheres não se encontrava no mercado de trabalho, a interação social era dificultada pela sua permanência no lar. Revista Brasileira de História, vol. 29, nº 58 Os incluídos e os excluídos Daí sua pouca participação nos espaços de sociabilidade que se multiplicavam nas cidades, a partir do final do século XIX. Em relação à cidade do Rio de Janeiro, o levantamento de Paiva nos oferece dados referentes a mulheres e estrangeiros. Como tais dados não foram obtidos de maneira uniforme, Paiva só apresenta o número deles para o ano de 1912. Não obstante, os resultados são ilustrativos, e é interessante reproduzi-los. Tabela 1 – Composição dos Sócios do Rio de Janeiro em 1912 Tabela 1 – Composição dos Sócios do Rio de Janeiro em 1912 Nacionalidade Homens Mulheres Total Brasileira 98.752 20.888 119.640 Estrangeira 98.108 4.334 102.442 Ignorada 55.213 5.642 60.855 Total 252.073 30.864 282.937 Fonte: Dados obtidos em Prefeitura do Distrito Federal, 1922, p.745. Os dados mostram que as associações eram compostas em sua grande maioria por homens (89%), e, entre eles, 38,92% eram estrangeiros. Tendo sido a cidade um polo assaz atrativo para os imigrantes, e sendo o mutualismo já uma tradição em seus países de origem, era normal que os estrangeiros se associassem em grande número. Ademais, as mutuais funcionavam para eles como espaços de sociabilidade, fortalecimento e conservação de suas identi- dades nacionais, na medida em que reproduziam as divisões de seus respecti- vos países na Europa. Nos Estados Unidos os negros eram proibidos de se filiar a mutuais de brancos. Por essa razão criaram as suas próprias mutuais, que, por sua vez, excluíam os brancos.18 No Brasil havia algumas mutuais de ex-escravos ou de negros, mas em muito menor número. Nos estatutos aos quais tivemos acesso, que compunham a documentação já citada do Conselho de Estado, não en- 300 Revista Brasileira de História, vol. 29, nº 58 Estratégias populares de sobrevivência... contramos muitas restrições à cor. Mas a maior parte das mutuais de imigran- tes impunha restrições a sócios de outras nacionalidades. Em levantamento feito sobre essa documentação, encontramos 21 mutu- ais reconhecidamente de imigrantes num universo de 123 sociedades, no pe- ríodo entre 1860 e 1882. Para compor uma amostra mais homogênea, retiramos do levantamento as associações patronais, filantrópicas, religiosas, recreativas e de lazer, científicas ou literárias, os montepios, as cooperativas e seguradoras, cujos processos também integravam o conjunto documental. Entre elas havia: cinco portuguesas, três francesas, três alemãs, três italianas, duas suíças e cin- co de outras nacionalidades variadas. Tal como no Brasil, no Reino Unido a principal discriminação era de gênero. Os incluídos e os excluídos Embora as mutuais masculinas fossem mais numerosas, havia socie- dades que aceitavam mulheres ou eram compostas só por elas, especialmente do final do século XVIII às primeiras décadas do XIX. Em geral, tinham pou- ca duração e não sobreviviam mais que trinta anos. Em boa parte dessas mu- tuais, as funções administrativas, que demandavam maior conhecimento téc- nico, eram entregues a homens.19 Retomando os dados de Paiva, percebe-se pelo quadro que as mulheres, brasileiras ou estrangeiras, compunham aproximadamente 11% do número total de sócios, e o número de brasileiras era cinco vezes maior que o de es- trangeiras. Ou seja, independentemente da nacionalidade, as mulheres que moravam no Rio foram majoritariamente excluídas do associativismo. Esses números referem-se a todos os tipos de sociedades, não somente as mutuais. Como as mulheres tinham maior participação nas associações de caráter reli- gioso ou filantrópico incluídas na amostra, o percentual de participação femi- nina nas mutuais deve ter sido ainda mais baixo. Dezembro de 2009 As mutuais e seus sócios em números A quantificação das mutuais e de seus sócios é sempre um desafio para os estudiosos. Na maior parte das vezes não se encontra disponível, para um conjunto expressivo de mutuais, a sua documentação específica, como atas, correspondências, relatórios e livros contábeis, entre outras fontes, as quais poderiam garantir acesso ao cotidiano de seu funcionamento. Os trabalhos produzidos têm recorrido à análise de estatutos ou às notícias publicadas na imprensa, documentos que, quando muito, podem apenas fornecer algumas pistas sobre como funcionavam tais instituições. Em geral, os estatutos seguiam 301 Dezembro de 2009 Cláudia Maria Ribeiro Viscardi um padrão minimamente diferenciado entre si, e as notícias, além de esparsas, acabavam por apenas atestar que a sociedade tinha existido. No Brasil tal situação foi agravada em razão das contínuas mudanças da legislação sobre as mutuais. Entre 1860 e 1882 as mutuais da capital registravam- se no Conselho de Estado. No início da República, passaram a registrar-se nas juntas comerciais ou em cartórios das comarcas. Algumas sociedades, sobre- tudo as esportivas e de lazer, eram registradas nas delegacias de polícia. A ausência de um registro único ou mesmo a não obrigatoriedade de registro são fatores que, certamente, levaram a que incontáveis sociedades não deixassem pistas de sua existência. Mesmo em países como a Inglaterra, a existência de um registro único a partir de 1846 não garantiu aos pesquisadores o acesso ao número real de mutuais e de sócios, uma vez que muitas associações não se registravam.20 Diante de tantas incertezas, os levantamentos feitos pelos contemporâneos podem ser ferramentas muito úteis no dimensionamento do fenômeno. Mas apresentam problemas para os quais devemos estar atentos. Ataulfo de Paiva fez seu primeiro levantamento em 1912 e depois o completou com dados co- lhidos entre 1913 e 1920. Mas os critérios utilizados no momento de sistema- tização dos dados não foram uniformes. No primeiro levantamento, relativo ao ano de 1912, o autor listou 421 associações, com 282.937 sócios. No segun- do levantamento (1913-1920), trabalhou com um universo de 319 instituições, com um número total de sócios que variou entre 204.008 (1918) e 205.707 (1915). O gráfico anexo ilustra o “movimento social” do Rio de Janeiro obser- vado nos dois levantamentos. Número de sócios, Rio de Janeiro (1912-1920) 0 50.000 100.000 150.000 200.000 250.000 300.000 1912 1913 1914 1915 1916 1917 1918 1919 1920 302 Revista Brasileira de História, vol. As mutuais e seus sócios em números 29, nº 58 Número de sócios, Rio de Janeiro (1912-1920) Gráfico da Evolução Patrimonial 0 50.000 100.000 150.000 200.000 250.000 300.000 1912 1913 1914 1915 1916 1917 1918 1919 1920 Fonte: Construído com dados obtidos em Prefeitura do Distrito Federal, 1922, p.745, 741. Número de sócios, Rio de Janeiro (1912-1920) Fonte: Construído com dados obtidos em Prefeitura do Distrito Federal, 1922, p.745, 741. Revista Brasileira de História, vol. 29, nº 58 Revista Brasileira de História, vol. 29, nº 58 302 Estratégias populares de sobrevivência... O gráfico nos mostra que houve pouca variação do número de sócios no decorrer da segunda década republicana, o que indica que o fenômeno asso- ciativo manteve-se constante, ao longo do período. O que chama mais a aten- ção é o alto número de sócios, de 645 a 715 por instituição, aproximadamente. (Para a obtenção deste número, calculamos a média entre o primeiro e o se- gundo levantamentos, ano a ano.) No entanto, estudos anteriores já haviam revelado que o Distrito Federal possuía o maior número mutuais do Brasil.21 Se levarmos em conta que o total de homens em 1910, no Distrito Federal, era de 496.284, incluindo-se entre eles as crianças, o número de sócios em 1912 parece, de fato, superestimado (282.937 sócios, 57%), embora não impossível. O número se torna alto apenas quando comparado com outras realidades an- teriormente estudadas no Brasil.22 Além do levantamento de Paiva, o trabalho de Ferreira da Rosa pode nos ajudar a entender melhor a dimensão do fenômeno. Segundo consta em sua obra, havia na cidade do Rio de Janeiro, no ano de 1902, 170 mutuais (retiraram‑se da listagem as associações que não se configuravam como tais). Elas possuíam, no conjunto, 86.241 sócios (incluídos os remidos), o que produz uma média de aproximadamente 510 sócios por instituição. Essa média é um pouco menor que a obtida por Paiva, mas ainda alta em relação à população masculina adulta da cidade. Havia, em 1902, 727.919 habitantes no Distrito ­Fede­ral, entre homens, mulheres e crianças. Considerando-se que aproximadamente 57% desse total era de homens (incluídos entre eles as crianças), o percentual de associados encontrado por Rosa correspondia a 20,78% desse universo, número que acre- ditamos ser mais próximo da realidade, por sua amostra ser mais homogênea e por coincidir com levantamentos feitos posteriormente. Se compararmos os dados do Rio de Janeiro com os de outras capitais, os números parecerão bastante razoáveis. As mutuais e seus sócios em números Para Buenos Aires, estima-se que em 1914 metade dos trabalhadores encontrava-se filiada a algum tipo de socieda- de de socorro mútuo. Para o caso inglês, estima-se que 60% dos homens adul- tos eram associados a uma mutual que incorporava trabalhadores e setores médios. Os dados para os Estados Unidos, levantados mais recentemente por David Beito, apontam que em 1920, para cada três homens adultos, um per- tencia a mutuais, compostas sobretudo por negros e imigrantes. No Canadá, 30% dos homens trabalhadores eram mutualizados. Na cidade do México, em 1873, havia mais de cem mutuais, e cerca de um quinto de sua população par- ticipava das associações.23 O levantamento de Ferreira da Rosa nos possibilitou uma explicação pa- 303 Dezembro de 2009 Cláudia Maria Ribeiro Viscardi ra o alto número de sócios encontrados no Distrito Federal, quando compa- rado com outras cidades brasileiras. Pudemos perceber que algumas mutuais tinham um número muito grande de membros – tais como as dos comerciários,24 dos ferroviários, dos trabalhadores navais e as de portugueses –, e elas foram responsáveis pela elevação da média. O levantamento de Vitor Fonseca, feito com base no Registro Especial de Títulos e Documentos do Rio de Janeiro, entre os anos de 1815 e 1914, encon- trou 346 mutuais (Fonseca, 2008, p.120). Mas a documentação por ele utiliza- da não lhe fornecia o número de sócios. A despeito desse problema, o seu le- vantamento atesta que o número de mutuais era maior do que o encontrado por Paiva e por Rosa. No ano de 1912, Paiva listou 220 mutuais, e, nos levan- tamentos feitos para o período posterior (1913-1920), trabalhou com um uni- verso de 216 mutuais.25 Como o método utilizado por Paiva foi o envio de questionários, muitas associações podem ter se eximido de lhe responder, o que torna os números encontrados por Fonseca mais próximos da realidade, muito embora devamos admitir a hipótese de que algumas mutuais podem igualmente ter deixado de se registrar. Em que pesem as incertezas em relação aos números, podem-se afiançar algumas conclusões em relação ao tema. A primeira é que a cidade do Rio de Janeiro teve, a partir da segunda metade do século XIX, um número expressi- vo de mutuais, certamente, o maior do país. Esse número se ampliou conside- ravelmente ao longo das duas primeiras décadas do século XX, atingindo o mínimo de 170 e o máximo de 346. Revista Brasileira de História, vol. 29, nº 58 As mutuais e seus sócios em números As mutuais possuíam em média de 510 a 715 sócios, número elevado em relação aos padrões encontrados para outras cidades brasileiras, mas proporcionalmente próximo de algumas capitais no exterior. Esses indicadores apontam para um dinamismo muito grande da sociedade civil, que não se limitava às mutuais. Tal dinamismo é compreensível em razão das especificidades da então capital nacional. Era a maior cidade do país e tornou-se polo atrativo de um grande número de imigrantes. Seu desenvolvimento comercial, industrial e do setor de serviços propiciava a ocupação de diferentes setores de mão de obra qualificada, sócios em potencial das mutuais. Como centro político do país, tinha condições mais propícias à emergência e consolidação de uma cultura associativa. Esse conjunto de características fez que o Rio de Janeiro atingisse níveis expressivos de organização de sua sociedade civil. 304 Revista Brasileira de História, vol. 29, nº 58 Estratégias populares de sobrevivência... Dezembro de 2009 Trajetórias O levantamento de Ferreira da Rosa permitiu que aferíssemos o período de fundação das mutuais por ele listadas. Como seus dados e critérios são mais homogêneos que os de Paiva – o qual também nos indica a data de fundação das sociedades –, são mais confiáveis. Tabela 2 – Período de Fundação das Mutuais do Rio de Janeiro (1815-1904) Fundação Quantidade Percentual Sem data 10 5,89 1815-1824 1 0,60 1825-1834 0 0 1835-1844 2 1,19 1845-1854 4 2,35 1855-1864 12 7,05 1865-1874 8 4,70 1875-1884 38 22,35 1885-1894 29 17,05 1895-1904 66 38,82 Total: 170 100 Fonte: Rosa, 1905, p.194 ss. la 2 – Período de Fundação das Mutuais do Rio de Janeiro (1815-1904) Tabela 2 – Período de Fundação das Mutuais do Rio de Janeiro ( Como se percebe, o número das mutuais teve grande crescimento a partir de 1875, tendência que não foi interrompida nas décadas seguintes, conforme nos aponta o levantamento de Paiva, observado anteriormente. O período de maior crescimento foi ao longo da década de 1890 e até as primeiras décadas do século XX. Os dados obtidos na documentação reunida no Conselho de Estado apon- tam para a mesma realidade. Das 123 mutuais, fundadas entre 1860 e 1882, mais de 70% haviam sido fundadas após 1870. O levantamento de Vitor Fonseca traz resultados muito próximos dos outros citados. Entre as 346 mutuais listadas por ele, quase 76% haviam sido fundadas entre 1875 e 1914. (Em sua listagem só incluímos as definidas por 305 Dezembro de 2009 Cláudia Maria Ribeiro Viscardi ele como entidades de socorros mútuos.) Como os dados avançam até a se- gunda década do século XX, foi possível perceber que o maior crescimento se deu entre 1905 e 1914. Nos Estados Unidos, elas proliferaram igualmente na segunda metade do século XIX, sobretudo após a Guerra de Secessão. No período da depressão, a falência das seguradoras contribuiu para a ampliação do número de mutuais, as quais gozavam de melhor reputação (Cordery, 2003, p.89-90). Na Itália, o maior crescimento também se deu na segunda metade do século XIX. A partir de 1898, o país possuía quase um milhão de associados. Trajetórias Pelo período de emergência e crescimento do mutualismo italiano, percebe-se que foi tardio em relação aos seus congêneres europeus, e próximo cronologi- camente ao mutualismo das Américas.26 Tomando por base os diversos levantamentos anteriormente expostos, perceberemos que as mutuais da cidade do Rio de Janeiro, embora tenham sido criadas na primeira metade do século XIX, conheceram grande expansão nas últimas décadas do século, expansão esta que vigorou até o final da pri- meira década republicana, quando houve uma estabilização do número de sócios, seguida pela desaceleração do fenômeno nas décadas de 1930 e 1940, após a implantação de medidas de proteção social. À medida que as leis pro- tetoras iam surgindo, os socorros oferecidos pelas mutuais tornavam-se dis- pensáveis. Destacam-se, sobretudo, o impacto proporcionado pela Lei de Aci- dentes de Trabalho (1919), as Caixas de Aposentadorias e Pensões (1923 em diante), a Lei de Férias (1925) e o Código de Menores (1927), que muito em- bora não tenham sido iniciativas extensivas a todos os trabalhadores, atingiam boa parte da clientela das mutuais.27 Revista Brasileira de História, vol. 29, nº 58 As modalidades associativas e os socorros oferecidos Com base ainda nos levantamentos de Paiva, separamos as associações listadas por modalidade, para identificarmos o número de mutuais no conjun- to do associativismo do Rio de Janeiro. A Tabela 3 sintetiza os resultados ob- tidos: 306 Revista Brasileira de História, vol. 29, nº 58 Estratégias populares de sobrevivência... Tabela 3 – O Associativismo do Rio de Janeiro por Modalidade (1912-1920) 1912 1913-1920 Modalidade Número Percentual Número Percentual Mutuais 220 52,25 216 67,71 Religiosas 131 31,11 63 19,76 Maçônicas 28 6,65 1 0,31 Filantrópicas 23 5,47 24 7,52 Patronais e Sindicais 13 3,09 9 2,82 Saúde ou hospitalares 2 0,48 2 0,63 Artísticas e Científicas 4 0,95 4 1,25 Total 421 100 319 100 Fonte: Tabela montada a partir de cálculos retirados de Prefeitura do Distrito Federal, 1922, p.765-771, 820-831. la 3 – O Associativismo do Rio de Janeiro por Modalidade (1912-1920) Como se observa, do movimento associativo pesquisado pelo autor para a cidade do Rio de Janeiro, na segunda década republicana, as mutuais repre- sentavam a grande maioria, entre 50 e 70% do geral. É difícil afirmar que a diferença entre os números de mutuais e de sindicatos tenha sido assim tão grande. Entre as associações listadas por Paiva como “beneficentes” estavam incluídos alguns poucos sindicatos que, além de atuarem como organismos de resistência, prestavam também algum tipo de assistência a seus associados e, por essa razão, foram qualificados pelo autor como “sociedades beneficentes”. Os demais sindicatos não foram incluídos em seu levantamento, daí seu pe- queno número. No que diz respeito aos benefícios pagos pelas mutuais aos sócios, constam do levantamento de Ataulfo de Paiva as relações das despesas efetuadas pelas associações ao longo dos anos, bem como o volume de seu patrimônio. Muito embora os dados para 1912 não obedeçam ao mesmo critério utilizado para os anos posteriores, percebe-se que a maior parte dos gastos das associações – retirando-se o item “despesas gerais”, que sempre foi o maior – era realizada com o pagamento de pecúlios ou pensões. Em terceiro lugar, os maiores gastos referiam-se às despesas médicas; por último, constavam as despesas com fu- nerais. Estes representavam, em geral, de um terço à metade dos valores gastos com pecúlios ou pensões. Entre as mutuais dos Estados Unidos predominavam aquelas que ofereciam 307 Dezembro de 2009 Cláudia Maria Ribeiro Viscardi socorros em caso de doenças ou funerais. As modalidades associativas e os socorros oferecidos Em segundo lugar, e com mais ca- pital, constavam as que ofereciam seguros de vida (Beito, 2000, p.1, 14). Já o mutualismo inglês era mais próximo do modelo brasileiro do que o estadunidense. A maior parte dos pecúlios pagos aos sócios era composta por auxílios a funerais – as mutuais mais populares – e, depois, por auxílios a doen- tes. O pagamento de seguros de vida – raros no Brasil e comuns nos Estados Unidos – era propiciado somente pelas grandes mutuais – conhecidas como Ordens –, que se espalhavam por todo o território britânico e também sobre suas colônias e ex-colônias e eram compostas por uma série de sociedades afiliadas (Neave, 1996, p.55). Tais coberturas não resolviam o problema da pobreza, mas garantiam àqueles que pudessem ser incluídos ao menos um recurso adicional, em caso de necessidade. Ter um funeral digno, garantir um seguro para os familiares após a morte ou eximir-se de recorrer à caridade eram motivações suficientes para que um grande número de trabalhadores, em diversas regiões do globo, se empenhasse na edificação e manutenção dessas organizações sociais. Revista Brasileira de História, vol. 29, nº 58 As Insolvências Em vários lugares do mundo onde o mutualismo se desenvolveu, os re- sultados das pesquisas apontam que grande parte das mutuais faliram após alguns anos de existência. As razões para a insolvência de tais sociedades esti- veram ligadas a fatores como a incapacidade ou a impossibilidade de calcular os riscos. Para que tal cálculo fosse feito era indispensável ter acesso às taxas de expectativa média de vida da região onde a mutual se inseria e conhecer as principais causas que levavam a doenças e falecimentos. Com base em tais informações era possível às mutuais calcular devidamente o valor de suas men- salidades e dos benefícios pagos, garantindo seu equilíbrio financeiro. Tais dados raramente estiveram disponíveis para os contemporâneos, o que os levou a agir de forma mais intuitiva do que racionalmente calculada. Ademais, Swaan destaca que muitos sócios pertenciam a grupos homo- gêneos, formados por trabalhadores de uma mesma cidade ou até de uma mesma empresa. Tal conjuntura poderia levá-los a adoecer em um mesmo momento, ou serem vítimas de um mesmo acidente de trabalho ou epidemia, o que levava a mutual a cobrir um custo volumoso de uma só vez, fato que a conduziria inevitavelmente à insolvência. O levantamento de Paiva incluiu análise do patrimônio, das receitas e 308 Revista Brasileira de História, vol. 29, nº 58 Estratégias populares de sobrevivência... Estratégias populares de so despesas de todas as sociedades – não somente as mutuais –, e revela uma constante oscilação. O gráfico anexo ilustra melhor nossas afirmações. Gráfico da Evolução Patrimonial das Associações (1913-1920) 0 20.000 40.000 60.000 80.000 100.000 1913 1914 1915 1916 1917 1918 1919 1920 Fonte: Para a elaboração deste gráfico e do seguinte, utilizamos os dados de Prefeitura do Distrito Federal, 1922, p.881-882. Retiramos os dados relativos a 1912, porque se vinculam a um maior número de associações, o que poderia levar a distorções. Gráfico da Evolução Patrimonial das Associações (1913-1920) 0 20.000 40.000 60.000 80.000 100.000 1913 1914 1915 1916 1917 1918 1919 1920 Fonte: Para a elaboração deste gráfico e do seguinte, utilizamos os dados de Prefeitura do Distrito Federal, 1922, p.881-882. Retiramos os dados relativos a 1912, porque se vinculam a um maior número de associações, o que poderia levar a distorções. Gráfico da Evolução Patrimonial das Associações (1913-1920) Fonte: Para a elaboração deste gráfico e do seguinte, utilizamos os dados de Prefeitura do Distrito Federal, 1922, p.881-882. As Insolvências Retiramos os dados relativos a 1912, porque se vinculam a um maior número de associações, o que poderia levar a distorções. Receitas Despesas Gráfico da relação entre receitas e despesas das associações (1913-1920) 0 5.000 10.000 15.000 20.000 1913 1914 1915 1916 1917 1918 1919 1920 A leitura do gráfico aponta para uma ligeira evolução patrimonial das sociedades até 1915, com abrupta redução nos anos seguintes. A queda se es- tabiliza a partir de 1916 e apresenta leve tendência de crescimento até 1920, mas nunca atinge o nível em que se encontrava antes, o que indica que ao longo do período houve perda patrimonial. Acredita-se que a queda vincula-se ao impacto da Primeira Guerra Mundial sobre a economia brasileira, inicial- mente levando à carestia, ao desemprego e à desaceleração econômica, proble- mas amenizados a posteriori. Pode ser, também, que essa queda fizesse parte da trajetória de insolvência que se anunciava para grande parte das mutuais. Como foram criadas, em sua maioria, ao final do século XIX, no contexto de crise possuíam, em média, de vinte a trinta anos de existência, tempo suficien- te para o envelhecimento de seus primeiros sócios. Esse tempo de vida de uma mutual levava sempre ao aumento de seus gastos, nem sempre compensados pela adesão de novos sócios jovens. Como o levantamento não prossegue nos anos seguintes, não se pode saber se, de fato, tais sociedades tiveram seu patri- mônio totalmente depreciado ao final da década de 1920, como ocorreu em outros lugares no Brasil. A análise das relações entre as receitas e despesas ajuda a explicar as osci- lações do gráfico anterior. Dezembro de 2009 309 Cláudia Maria Ribeiro Viscardi Receitas Despesas Gráfico da relação entre receitas e despesas das associações (1913-1920) 0 5.000 10.000 15.000 20.000 1913 1914 1915 1916 1917 1918 1919 1920 Receitas Despesas Gráfico da relação entre receitas e despesas das associações (1913-1920) 0 5.000 10.000 15.000 20.000 1913 1914 1915 1916 1917 1918 1919 1920 Nas relações entre receita e despesa percebe-se que, pelos levantamentos de Ataulfo de Paiva, no conjunto, as sociedades não foram deficitárias em suas contas correntes ao longo do período, muito embora o gráfico anterior nos mostre que elas abriram mão de seu patrimônio para manter tal situação, em períodos de crise. Pelo gráfico nota-se, igualmente, que os anos mais difíceis foram os de 1916, 1917 e 1918, por indicarem uma descapitalização das sociedades. As Insolvências Há queda na arrecadação nos anos de 1915 e 1916. Essa situação só começa a se alterar a partir de 1919, apontando para uma tendência de crescimento que se refletiu, também, na evolução patrimonial das associações, conforme apon- tou o gráfico. A situação financeira das mutuais era agravada pelo hábito de não cobra- rem mensalidades mais altas para os idosos, que naturalmente apresentavam maior possibilidade de adoecer. Ao mesmo tempo, as mutuais não se esforça- vam muito em atrair sócios mais jovens. Tal situação foi destacada por um estudioso do mutualismo irlandês, o qual alegou que muitas mutuais preferiam filiar os mais idosos, porque acreditavam que o momento da morte dependia menos da idade e mais da vontade de Deus (Campbell, 1996, p.69). Dessa forma, não se pode caracterizar tais comportamentos como economicamente irracionais, pois encontravam suas justificativas no ambiente cultural que os principais agentes compartilhavam. No que tange a modalidades dos Estados Unidos, as primeiras a falir foram as afro-americanas. As étnicas não conseguiram atrair a segunda e terceira gerações, já nascidas no país, o que levou a seu esvaziamento progressivo. Na década de 1920 houve considerável queda no número de mutuais, e em 1930 o movimento perdeu 378 mil membros. Porém, no Rio Grande do Sul e em Minas Gerais as entidades de imigrantes foram as mais duradouras.28 310 Revista Brasileira de História, vol. 29, nº 58 Estratégias populares de sobrevivência... Com o tempo, o equilíbrio entre sociabilidade e seguridade – dois prin- cípios que expressavam a identidade das mutuais – foi se tornando um pro- blema para elas. Tão logo a falência se anunciava, os gastos com a sociabilida- de iam sendo diminuídos, muito a contragosto dos gestores, para que a seguridade pudesse ser mantida. Tais decisões sempre representavam conflitos para os pares, os quais muitas vezes sentiam que os valores que haviam origi- nado a associação estavam sendo postos em segundo plano, em prol de outros como os do lucro e da competição. Tais conflitos expressavam bem as contra- dições de um período de modernização. Dezembro de 2009 Do privado ao público Em vários países da Europa ocidental a desaceleração do mutualismo coin- cidiu com a expansão das companhias de seguros, mais capazes de calcular ris- cos e gerenciar seus lucros. Em que pesem tantas habilidades, elas igualmente faliram diante da enorme demanda por socorros e os baixos valores das contri- buições pagas, assim mantidas para que novos sócios fossem conquistados. Segundo análises existentes para a Inglaterra, os trabalhadores, que antes apostavam nas mutuais como a melhor estratégia para escapar da pobreza, perceberam que após a falência do mutualismo e das iniciativas privadas re- presentadas pelas seguradoras só lhes restava recorrer ao Estado. Tal decisão não foi fácil, já que tinham de abrir mão de valores que deram origem à cria­ ção das mutuais, tais como os de voluntarismo, autonomia e respeitabilidade. Mas no contexto de adversidade o cálculo racional levou-os a aderir a propos- tas de inúmeros ‘reformadores’ que defendiam que o Estado assumisse o ônus pela proteção social.29 Na França, tal como na Inglaterra, as mutuais rejeitaram inicialmente a contribuição compulsória, pois viam com desconfiança a intervenção do Es- tado sobre os princípios da livre escolha. Essa realidade foi alterada após o repentino aumento das demandas por proteção social, em razão da Primeira Guerra Mundial. A mudança de conjuntura levou as mutuais a apoiarem a intervenção do Estado, desde que fossem envolvidas no processo de implan- tação das políticas sociais.30 No Brasil, pouco se sabe acerca do papel que as mutuais tiveram na pro- posição das políticas de amparo social. Pesquisas nesse campo apontam para o estabelecimento de alguns benefícios para os trabalhadores, sobretudo a par- tir da década de 1920, e, muito mais tarde, da Previdência Social. Se tais ini- ciativas resultaram da ação dos reformadores, das conquistas dos trabalhado- 311 Cláudia Maria Ribeiro Viscardi res organizados ou das concessões do Estado, a historiografia brasileira tem discutido. Mas o papel das mutuais nesse processo ainda requer investigação. Coloca-se aí uma nova pergunta, que ainda aguarda por resposta, entre tantas outras referentes ao tema. A opção pelo mutualismo pode ter significado, para aqueles que a fizeram, uma estratégia fundamental de manutenção de um importante valor compar- tilhado pelos trabalhadores, o da respeitabilidade. Os benefícios recebidos nos momentos de necessidade eram tidos como direitos e não como favores. O mesmo não acontecia com aqueles que dependiam da caridade alheia. Do privado ao público É pra- ticamente impossível identificar se os pobres recorreram mais às mutuais do que à caridade, pois se os números são incertos para a primeira opção, são ainda mais fluidos em relação à segunda. O que é patente, no entanto, é que antes do estabelecimento das políticas protecionistas, os pobres recorreram a diferentes estratégias de sobrevivência, mais ou menos dignas. Além disso, a permanência da filantropia no Brasil, em larga escala até os dias de hoje, nos remete à distância em que nos encontramos em relação às experiências mais igualitárias de outras nações, uma vez que a extensão da cidadania não acom- panhou a expansão de nossa autoridade pública. NOTAS 1 Este artigo é parte dos resultados de pesquisas que contaram com financiamento das agências de fomento Capes, CNPq e Fapemig. 1 Este artigo é parte dos resultados de pesquisas que contaram com financiamento das agências de fomento Capes, CNPq e Fapemig. 1 Este artigo é parte dos resultados de pesquisas que contaram com financiamento das agências de fomento Capes, CNPq e Fapemig. 1 Este artigo é parte dos resultados de pesquisas que contaram com financiamento das agências de fomento Capes, CNPq e Fapemig. 2 Entre as inúmeras análises sobre o tema, destacamos: GEREMECK, Bronislaw. Os filhos de Caim. Trad. Henryk Siewierski. São Paulo: Companhia das Letras, 1995; ROBERTS, S. Contexts of charity in the Middle Ages: religious, social, and civics. In: SCHNEEWIND, J. B. (Ed.) Giving: western ideas of philanthropy. Indiana: Indiana University Press, 1996; CASTEL, Robert. As metamorfoses da questão social: uma crônica do salário. Trad. Iraci D. Poleti. 3.ed. Petrópolis: Vozes, 1998. 3 WAGLE, Udaya. Rethinking poverty: definition and measurement. International Social Science Journal, London: Blackwell, v.54, n.171, 2002. p.163. 4 Ver a respeito: Hobsbawm, Eric J. Artisan or labour aristocrat? The Economic History Review, New Series, Blackwell Publishing on behalf of the Economic History Society, v.37, n.3, p.355-372, Aug. 1984; KIRK, Neville. The growth of working-class reformism in mid- Victorian England. Champaign: University of Illinois Press, 1985. 5 CORDERY, Simon. British friendly societies, 1750-1914. New York: Palgrave Macmillan, 2003, p.108; VISCARDI, Cláudia M. R. Experiências da prática associativa no Brasil (1860- 312 Revista Brasileira de História vol 29 nº 58 5 CORDERY, Simon. British friendly societies, 1750-1914. New York: Palgrave Macmillan, 2003, p.108; VISCARDI, Cláudia M. R. Experiências da prática associativa no Brasil (1860- 312 Revista Brasileira de História, vol. 29, nº 58 Estratégias populares de sobrevivência... 1880). Topoi, Revista de História, Rio de Janeiro: PPGHIS-UFRJ; 7 Letras, v.9, n.16, p.117- 136, 2008. 6 BENDIX, Reinhard. Construção nacional e cidadania. Trad. Mary Amazonas Leite de Barros. São Paulo: Edusp, 1996, p.39. 7 SWAAN, Abram de. In care of the state: health care, education and welfare in Europe and the USA in the modern era. Cambridge: Polity Press, 1988. p.10. 8 GODELIER, Maurice. O enigma do dom. Trad. Eliana Aguiar. Rio de Janeiro: Civilização Brasileira, 2001. p.25. 9 CONNIFF, Michael. Voluntary associations in Rio, 1870-1945. A new approach to urban social dynamics. Journal of Interamerican Studies and World Affairs, v.17, n.1, 1975. 10 KUSHNIR, Beatriz. NOTAS Baile de máscaras: mulheres judias e prostituição. As polacas e suas associações de ajuda mútua. Rio de Janeiro: Imago, 1996. 11 Batalha baseou-se em documentos disponíveis na Secretaria de Negócios do Conselho de Estado, compostos de estatutos e algumas atas que para lá eram endereçados pelas mutu- ais, com o fim de obterem permissão para o seu funcionamento, em obediência à lei n. 1083 e ao decreto 2.711, ambos de 1860. Além desses, utilizou dados de almanaques e de- mais levantamentos estatísticos feitos por contemporâneos do fenômeno. BATALHA, Cláudio H. M. Sociedades de trabalhadores do Rio de Janeiro do século XIX: algumas re- flexões em torno da formação da classe operária. Cadernos do AEL: Sociedades operárias e mutualismo, Campinas: Unicamp/IFCH, v.6, n.10/11, 1999. 12 JESUS, Ronaldo P. de. O povo e a monarquia: a apropriação da imagem do imperador e do regime monárquico entre a gente comum da corte (1870-1889). Tese (Doutorado em História) – USP. São Paulo, 2001. Cap. 3. 13 JESUS, Ronaldo P. de. História e historiografia do fenômeno associativo no Brasil mo- nárquico (1860-1887). In: ALMEIDA, Carla M. C. de; OLIVEIRA, Mônica R. de. Nomes e números: alternativas metodológicas para a história econômica e social. Juiz de Fora: Ed. UFJF, 2006. 14 FONSECA, Vítor M. M. da. No gozo dos direitos civis: associativismo no Rio de Janeiro, 1903-1916. Rio de Janeiro: Faperj-Muiraquitã, 2008. 15 ROSA, Ferreira da. Rio de Janeiro. Rio de Janeiro: Edição Oficial da Prefeitura, 1905. 16 PREFEITURA DO DISTRITO FEDERAL. Assistência pública e privada no Rio de Janei- ro: história e estatística. Rio de Janeiro: Typografia do Annuario do Brasil, 1922. 17 Esse debate pode ser acompanhado em CLAWSON, Mary. Constructing brotherhood: class, gender, and fraternalism. New Jersey: Princeton University Press, 1989. Parte 2, cap. 3. 18 CORDERY, Simon. Fraternal orders in the United States: a question for protection and identity. In: LINDEN, Marcel V. D. (Ed.). Social security mutualism: the comparative his- tory of mutual benefit societies. Bern, Berlin: Peter Lang, 1996. p.87. 313 Dezembro de 2009 Cláudia Maria Ribeiro Viscardi 19 NEAVE, David. Friendly societies in Great Britain. In: LINDEN, 1996, p.45. 20 GOSDEN, P. H. J. H. Self-help: voluntary associations in XIX century Britain. London: B. T. Batsford, 1973, p.66-67. 21 SILVA JR., Adhemar L. da. As sociedades de socorros mútuos: estratégias privadas e públicas. Estudo centrado no Rio Grande do Sul – Brasil, 1854-1940. Tese (Doutorado em História) – PUC/RS. NOTAS Porto Alegre, 2005. p.53. Segundo os dados apresentados, em 1882 o DF possuía 56,07% das mutuais do país e, em 1917, 23,28%. Em ambas as ocasiões, esse foi o maior percentual do país. 21 SILVA JR., Adhemar L. da. As sociedades de socorros mútuos: estratégias privadas e públicas. Estudo centrado no Rio Grande do Sul – Brasil, 1854-1940. Tese (Doutorado em História) – PUC/RS. Porto Alegre, 2005. p.53. Segundo os dados apresentados, em 1882 o DF possuía 56,07% das mutuais do país e, em 1917, 23,28%. Em ambas as ocasiões, esse foi o maior percentual do país. 22 Os dados populacionais foram obtidos em: MINISTÉRIO da Indústria e Comércio. Di- retoria Geral de Estatística, Anuário Estatístico do Brasil, 1908-1912, Território e Popula- ção. Rio de Janeiro: Tipografia da Estatística, 1916. v.1, p.310. Para o Rio Grande do Sul, Silva Junior afirma que nos anos de 1917 e 1924 havia 148 mutuais no estado. SILVA JR., 2005, p.83. Os dados que encontramos para Minas, em 1923, apontam para a existência de 178 sociedades mutuais e sindicais, com uma filiação de 2,4% dos homens adultos do esta- do e com uma média de 202 sócios por associação. VISCARDI, Cláudia M. R.; JESUS, Ronaldo P. de. A experiência mutualista e a formação da classe trabalhadora no Brasil. In: FERREIRA, Jorge; REIS, Daniel A. (Org.). As esquerdas no Brasil: a formação das tradições (1889-1945). Rio de Janeiro: Civilização Brasileira, 2008. v.1, cap. 1, p.41-42. Tânia de Lu- ca, em seu estudo sobre o mutualismo paulista, afirma que na cidade de São Paulo, no início do século XX, 8% da população da cidade era associada, número nunca igualado depois. LUCA, Tânia R. de. Mutualism in Brazil (São Paulo). In: LINDEN, 1996, p.617. 22 Os dados populacionais foram obtidos em: MINISTÉRIO da Indústria e Comércio. Di- retoria Geral de Estatística, Anuário Estatístico do Brasil, 1908-1912, Território e Popula- ção. Rio de Janeiro: Tipografia da Estatística, 1916. v.1, p.310. Para o Rio Grande do Sul, Silva Junior afirma que nos anos de 1917 e 1924 havia 148 mutuais no estado. SILVA JR., 2005, p.83. Os dados que encontramos para Minas, em 1923, apontam para a existência de 178 sociedades mutuais e sindicais, com uma filiação de 2,4% dos homens adultos do esta- do e com uma média de 202 sócios por associação. VISCARDI, Cláudia M. R.; JESUS, Ronaldo P. de. NOTAS A experiência mutualista e a formação da classe trabalhadora no Brasil. In: FERREIRA, Jorge; REIS, Daniel A. (Org.). As esquerdas no Brasil: a formação das tradições (1889-1945). Rio de Janeiro: Civilização Brasileira, 2008. v.1, cap. 1, p.41-42. Tânia de Lu- ca, em seu estudo sobre o mutualismo paulista, afirma que na cidade de São Paulo, no início do século XX, 8% da população da cidade era associada, número nunca igualado depois. LUCA, Tânia R. de. Mutualism in Brazil (São Paulo). In: LINDEN, 1996, p.617. 23 Argentina: MUNCK, Ronaldo. Mutual Benefit Societies in Argentina: workers, nationa- lity, social security and trade-unionism. Journal of Latin-American Studies, v.30, p.573, 1998; Reino Unido: KIDD, Alan. State, society and the poor in 19th Century England. Lon- don: Macmillan Press, 1999. p.120-121; CORDERY, 2003, p.68. Estados Unidos: BEITO, David. From mutual aid to the welfare state: fraternal societies and social services, 1890- 1967. The University of North Caroline Press, 2000. p.2. Canadá: PALMER, Bryan. Mutu- ality and the masking/making of difference: mutual benefit societies in Canadá – 1850- 1950. In: LINDEN, 1996, p.112. México: HART, John M. Mexican mutualism in historical perspective. In: LINDEN, 1996, p.595. 24 Na relação de Rosa havia três mutuais que reuniam os comerciários: a Sociedade dos Empregados do Comércio do Rio de Janeiro, fundada em 1880, tinha 13.542 sócios; a So- ciedade Protetora dos Empregados no Comércio, fundada em 1902, tinha 2.569 sócios; a Sociedade Beneficente dos Empregados do Comércio, fundada em 1903, tinha 510 sócios no ano de sua fundação (os demais dados referem-se ao ano de 1902). ROSA, 1905, p.194. 24 Na relação de Rosa havia três mutuais que reuniam os comerciários: a Sociedade dos Empregados do Comércio do Rio de Janeiro, fundada em 1880, tinha 13.542 sócios; a So- ciedade Protetora dos Empregados no Comércio, fundada em 1902, tinha 2.569 sócios; a Sociedade Beneficente dos Empregados do Comércio, fundada em 1903, tinha 510 sócios no ano de sua fundação (os demais dados referem-se ao ano de 1902). ROSA, 1905, p.194. 25 Dados retirados de PREFEITURA DO DISTRITO FEDERAL, 1922, p.765-771 e 820- 831. 25 Dados retirados de PREFEITURA DO DISTRITO FEDERAL, 1922, p.765-771 e 820- 831. 25 Dados retirados de PREFEITURA DO DISTRITO FEDERAL, 1922, p.765-771 e 820- 831. 26 Para o caso italiano ver: TOMASSINI, Luigi. Mutual benefit societies in Italy, 1861-1922. In: LINDEN, 1996, p.228-231. Revista Brasileira de História, vol. 29, nº 58 NOTAS A contribuição do mutualismo italiano para o processo de formação de uma cultura cívica no país pode ser observado em: PUTNAM, Robert D. Co- munidade e democracia: a experiência da Itália Moderna. 3.ed. Rio de Janeiro: FGV, 2002. 314 Revista Brasileira de História, vol. 29, nº 58 Estratégias populares de sobrevivência... 27 Tânia de Luca destaca o declínio das sociedades paulistas a partir da Lei Elói Chaves (1923), que originou os primeiros fundos de aposentadoria e pensões no Brasil. A partir dessa lei, as mutuais passaram a agir de forma complementar, preenchendo as lacunas deixadas pela ausência do seu cumprimento integral (LUCA, 1996, p.620). Silva Jr. de- monstra a desaceleração do fenômeno no Rio Grande do Sul a partir da década de 1940, mas considera essa informação uma provável distorção de registros (SILVA JR., 2005, p.81). Para o fenômeno brasileiro geral ver VISCARDI; JESUS, 2008, p.40-43. 29 SWAAN, 1988, p.150; CORDERY, 2003, p.154-173; GILBERT, Bentley B. The decay of Nineteenth-century provident institutions and the coming of old age pensions in Great Britain. The Economic History Review, New series, v.17, n.3, p.551-563, 1965. 29 SWAAN, 1988, p.150; CORDERY, 2003, p.154-173; GILBERT, Bentley B. The decay of Nineteenth-century provident institutions and the coming of old age pensions in Great Britain. The Economic History Review, New series, v.17, n.3, p.551-563, 1965. 30 Para o caso francês ver: DREYFUS, Michel. Mutual benefit societies in France. In: ­LINDEN, 1996, p.214-216. Artigo recebido em agosto de 2009. Aprovado em outubro de 2009. Artigo recebido em agosto de 2009. Aprovado em outubro de 2009. Artigo recebido em agosto de 2009. Aprovado em outubro de 2009. 315 Dezembro de 2009 Dezembro de 2009
https://openalex.org/W2889883155
https://europepmc.org/articles/pmc6125288?pdf=render
English
null
A novel prognostic marker and immunogenic membrane antigen: prohibitin (PHB) in pancreatic cancer
Clinical and translational gastroenterology
2,018
cc-by
7,439
© The Author(s) 2018 OpenAccessThisarticleislicensedunderaCreativeCommonsAttribution4.0InternationalLicense,whichpermitsuse,sharing,adaptation,distributionandreproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. A R T I C L E O p e n A c c e s s O p e n A c c e s s Abstract Background: Previous study, using immunoblotting with IgG and membrane proteins, identified prohibitin (PHB) as a potential immunogenic membrane antigen. Now, investigate PHB expression and biological functions in pancreatic cancer. Methods: PHB expression was analysed in PDAC cell lines, normal pancreas tissues, cancer tissues, PDAC patient sera and healthy volunteer sera using QRT-PCR, Western blotting, IHC, and ELISA, and a survival analysis and a COX regression analysis were performed. Low and high PHB expression levels were accomplished using RNA interference technology and gene transfer techniques. Cell proliferation, migration, and invasion, apoptosis-related proteins were assessed 48 h after transfection. Results: PHB was generally expressed in the 8 tested PDAC cell lines. PHB was significantly increased in PDAC tissues and negatively correlated with overall survival (p < 0.01). PHB was an independent prognostic factor in PDAC (p < 0.01). PHB was increased in PDAC patient sera (p < 0.01). siRNA-PHB decreased cell growth, migration and invasion. However, PHB overexpression resulted in the opposite effects. Western blotting and Flow cytometric analysis revealed apoptosis inhibition in siRNA-PHB PDAC cells. Conclusions: PHB plays a key role in modulating the malignant phenotype and apoptosis induction, which may be a novel prognostic predictor and a candidate for targeted therapy against PDAC. Weibin Wang, MD1, Lai Xu, MD1, Yu Yang, MD2, LiangBo Dong, MD1, BangBo Zhao, MD1, Jun Lu, MD1, Taiping Zhang, MD1 and Yupei Zhao, MD1 Weibin Wang, MD1, Lai Xu, MD1, Yu Yang, MD2, LiangBo Dong, MD1, BangBo Zhao, MD1, Jun Lu, MD1, Taiping Zhang, MD1 and Yupei Zhao, MD1 Weibin Wang, MD1, Lai Xu, MD1, Yu Yang, MD2, LiangBo Dong, MD1, BangBo Zhao, MD1, Jun Lu, MD1, Taiping Zhang, MD1 and Yupei Zhao, MD1 Wang et al. Clinical and Translational Gastroenterology (2018) 9:178 DOI 10.1038/s41424-018-0044-1 Wang et al. Clinical and Translational Gastroenterology (2018) 9:178 DOI 10.1038/s41424-018-0044-1 Clinical and Translational Gastroenterology Official journal of the American College of Gastroenterology Introduction occur because more than one-half of cases are diagnosed at a distant stage1. Chemotherapy, such as Gemcitabine, also does not contribute a significant survival benefit2–4. Therefore, there is strong demand for novel specific markers in pancreatic cancer patients for early diagnosis, targeted therapy and prognosis. Pancreatic cancer is one of the most aggressive clinical malignancies, and it remains the fourth leading cause of cancer-related deaths. In contrast to the steady increase in survival for most cancers, advances have been slow for pancreatic cancers, and the 5-year relative survival is currently 8%. These low survival rates partially Autoimmunity was demonstrated against several pro- teins, including MUC1, p53, and Rad51, in pancreatic cancer. MUC1 autoantibodies were observed in sera from patients with a variety of different tumours and have been associated with a favourable prognosis in pancreatic cancer5. The presence of p53 autoantibodies has been observed in 18.2% of patients with pancreatic Correspondence: Yupei Zhao (zhao8028@263.net) 1Department of General Surgery, Peking Union Medical College Hospital, Chinese Academy of Medical Science & Peking Union Medical College, 1 Shuai Fu Yuan Hu Tong, Beijing 100730, China 2Department of General Surgery, Beijing Tsinghua Chang Gung Hospital, Tsinghua University, 168 soup road, Changping District, Beijing 102218, China Correspondence: Yupei Zhao (zhao8028@263.net) 1Department of General Surgery, Peking Union Medical College Hospital, Chinese Academy of Medical Science & Peking Union Medical College, 1 Shuai Fu Yuan Hu Tong, Beijing 100730, China 2Department of General Surgery, Beijing Tsinghua Chang Gung Hospital, Tsinghua University, 168 soup road, Changping District, Beijing 102218, China © The Author(s) 2018 OpenAccessThisarticleislicensedunderaCreativeCommonsAttribution4.0InternationalLicense,whichpermitsuse,sharing,adaptation,distributionandreproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. Official journal of the American College of Gastroenterology Page 2 of 12 Wang et al. Clinical and Translational Gastroenterology (2018) 9:178 (See legend on next page ) Fig. 1 (See legend on next page.) Fig. Western blot analysis Proteins were extracted from the cells and subjected to SDS-PAGE. The proteins were transferred to poly- vinylidene difluoride (PVDF) membranes (Millipore, USA). A polyclone rabbit anti-prohibitin antibody was purchased from Abcam (ab70672). Polyclonal rabbit anti- human PARP antibody, polyclonal rabbit anti-human caspase-3 antibody, polyclonal rabbit anti-human cleaved caspase-3 antibody, polyclonal rabbit anti-human cas- pase-9 antibody, polyclonal rabbit anti-human Bcl-2 antibody and polyclone rabbit anti-β-actin antibody were obtained from Cell Signaling Technology. The mem- branes were probed with all primary antibodies at a dilution of 1:1000, and secondary peroxidase-conjugated antibodies were used at a dilution of 1:2000. Bands were imaged using a chemiluminescence method (Amersham Biosciences, Sweden). Anti-β-actin antibody was used as an internal control. Specific siRNA and transfection cancer but was not specific to malignancy6,7. The recombination factor Rad51 is highly expressed in pan- creatic adenocarcinoma, and Rad51 autoantibodies have been observed in 7% of patients with pancreatic cancer8. Membrane proteins associated with pancreatic cancer perform many essential cellular functions, and hopefully these proteins become more valuable molecular markers. A previous study identified autoantibodies of membrane proteins in pancreatic cancer using membrane biology, cellular component proteomic, immuno-proteomic, and membrane proteomic approaches, and prohibitin was noted as a potential immunogenic membrane antigen9. The targeting sequences of a 25-nucleotide siRNA were designed and chemically synthesised (Invitrogen American): 5′-AGCACACGCUCAUCAUAGUCCUCUC-3′ (sense), and 3′-GAGAGGACUAUGAUGAGCGUGUGCU- 5′ (antisense). Negative control siRNA (Invitrogen American) was used as a scrambled siRNA control. A total of 5 × 105 cells were plated in a 6-well plate for 48 h, and siRNA transfection (120 pmol) was performed using the Lipofecta- mine 2000 (6 μl) (Invitrogen) according to the manufacturer’s instructions. Plasmid construction Prohibitin (PHB), including PHB1 (BAP32), PHB2 (BAP37, REA), PHB3 and PHB4, is ubiquitously expressed in multiple cellular compartments, including the mito- chondria, the nucleus and the plasma membrane, and PHB is shuttled between the mitochondria, the cytosol and the nucleus10–12. PHB contains an N-terminal transmembrane domain that is an evolutionarily con- served PHB domain similar to that in lipid raft-associated proteins and a C-terminal coiled-coil domain that is involved in the regulation of protein-protein interac- tions13–15. However, the role of PHB in different cancers is controversial, and the biological functions of PHB in pancreatic cancer is not clear. The current study investi- gated the differential expression of PHB in normal and pancreatic cancer patient sera, tissues and cancer cells; examined the relationship between PHB expression and clinicopathological variables; and explored the biological functions of PHB in cancer cell proliferation, migration, invasion and apoptosis. The pMD18-T-PHB plasmid was digested with BamHI and EcoRI and ligated into the pIRES2-EGFP vector (Novagen, Madison, US). E. coli DH5α cells were trans- formed using the ligation mixture, and colonies were obtained. Presence of the PHB gene was examined using PCR amplification, and the products were stored for subsequent analysis. Materials and methods Cell culture Human pancreatic cell lines, including AsPC-1, Capan-1, T3M4, SW1990, SU86.86, Panc-1, Colo-357, BxPC-3, and MiaPaCa-2, were kindly donated by Professor Helmut Freiss from the Technical University Munich of Germany. The MiaPaCa-2 human pancreatic cancer cell line was maintained in Dulbecco’s modified Eagle’s medium (DMEM), and AsPC-1 was maintained in RPMI 1640 medium. Both media were supplemented with 10% foetal bovine serum (FBS), and the cells were maintained at 37 °C in a humidified atmosphere of 5% CO2. Introduction 1 (See legend on next page.) Official journal of the American College of Gastroenterology Official journal of the American College of Gastroenterology Page 3 of 12 Wang et al. Clinical and Translational Gastroenterology (2018) 9:178 (see figure on previous page) Fig. 1 Prohibitin expression in pancreatic cancer cell lines, proliferative, migratory and invasive ability was significant reduced after siRNA- Phb transfection in AsPC-1 and MiaPaCa-2 cells. a Prohibitin mRNA and protein expression were generally expressed in 8 pancreatic cancer cell lines with Real-Time PCR and western blot. AsPC-1 and MiaPaCa-2 cells were selected for further functional experiments due to their various PHB expression. β-actin was used as housekeeping. GAPDH was used as a loading control. b AsPC-1 and MiaPaCa-2 cells were transfected with control siRNA or PHB siRNA for 48 h, total proteins were extracted and western blotting analysis was performed, 59.6% and 87.1% PHB proteins were reduced, respectively. c The effects of siRNA-PHB on pancreatic cancer cells AsPC-1 and MiaPaCa-2, the growth after 24 h, 48 h and 72 h were assessed using CCK-8 assay (mean ± SD; *p < 0.05). d The migration of AsPC-1 and MiaPaCa-2 cells were assessed after siRNA-PHB transfection and compared with negative control transfected cells (mean ± SD; **p < 0.01). e The invasiveness of AsPC-1 and MiaPaCa-2 cells were assessed after siRNA-PHB transfection and compared with negative control transfected cells (mean ± SD; **p < 0.01) Immunohistochemical analysis h h ( The migratory abilities of cells were evaluated using Transwell assays. Cell culture inserts with 8-μm micro- porous filters without extracellular matrix coating (Bec- ton Dickinson Labware, Bedford, MA) were loaded with 200 μl of serum-free DMEM/RPMI 1640 containing 4.0 × 105 pancreatic cancer cells. The bottom chambers were loaded with 500 μl of DMEM/RPMI 1640 contain- ing 10% FBS. The cells on the lower surface of the filter after a 24-h incubation were fixed and stained. Five random optical fields (×100 magnifications) from tripli- cate filters were selected for quantification of migrated cells. The invasive abilities of the cells were also evaluated using Transwell assays but with extracellular matrix coating (Sigma). Immunohistochemistry (IHC) was performed to localise PHB expression in 10 normal and 66 pancreatic ductal adenocarcinoma (PDAC) samples. The PHB antibody was diluted 1:3000. Two pathologists who spe- cialised in pancreatic cancer independently rated the staining intensity and percentage of stained cells. Briefly, scores were used to rate the staining intensity of cancer cells (no staining: 0; weak: 1; moderate: 2; and strong: 3) and determine the percentage of stained cells (<5%: (0); 5–25%: (1); >25–50%: (2); >50–75%: (3); and >75%: (4)). The final intensity score was equal to the staining intensity score multiplied by the cell percentage score. Staining was stratified accordingly into low levels of expression (scores <4) or high levels of expression (score ≥4). RNA extraction and quantitative real-time PCR (q-PCR) Total RNA was extracted from the cells and tissues using TRIzol reagent (Invitrogen, CA, USA) according to the manufacturer’s instructions. cDNA was synthesised Official journal of the American College of Gastroenterology Page 4 of 12 Wang et al. Clinical and Translational Gastroenterology (2018) 9:178 g. 2 (See legend on next page.) Fig. 2 (See legend on next page.) Official journal of the American College of Gastroenterology Official journal of the American College of Gastroenterology Page 5 of 12 Wang et al. Clinical and Translational Gastroenterology (2018) 9:178 g p p g Fig. 2 Effects of overexpressed PHB on pancreatic cancer cells AsPC-1 and MiaPaCa-2 proliferation, migration and invasion. a Overexpressed PHB plasmids were transfected into AsPC-1 and MiaPaCa-2 cells for 48 h, total proteins were extracted and Western Blotting analysis was performed, 81.3 and 90.6% PHB prtoteins were overexpressed, respectively. b The effects of PHB overexpressed on pancreatic cancer cells AsPC-1 and MiaPaCa-2, the growth after 24, 48 and 72 h were assessed using CCK-8 assay (mean ± SD; *p < 0.05, **p < 0.01). c The migration of AsPC-1 and MiaPaCa-2 cells were assessed after overexpressed PHB plasmid transfection and compared with negative control transfected cells (mean ± SD; *p < 0.05). d The invasiveness of AsPC-1 and MiaPaCa-2 cells were assessed after overexpressed PHB transfection and compared with negative control transfected cells (mean ± SD; *p < 0.05) instructions 48 h after transfection, washed with cold PBS, and suspended in binding buffer. The cells were incubated for 10 min in the dark at room temperature with Annexin V-FITC and PI in phosphate buffer and analysed using a flow cytometer (FACS CantoII, BD Bioscience, USA) within 1 h of staining. using M-MLV reverse transcriptase (Invitrogen) from 5 μg of total RNA. Quantitative RT-PCR was performed using a Bio-Rad CFX96 real-time PCR system (Bio-Rad, Foster City, CA, USA), KAPA PROBE FAST qPCR kits (Kapa Biosystems, MA, USA) and TaqMan probes (Invitrogen) with the following cycling conditions: 95 °C for 10 min (initial denature); 40 cycles of 95 °C for 15 s; and 60 °C for 60 s. The following sequences were used as PHB primers: 5′-GGGCACAGAGCTGTCATCTT-3′ and 5′-TGACTGGCACATTACGTGT-3′. Caspase-3 activity assay The effect of PHB on caspase-3 activity in AsPC-1 and MiaPaCa-2 cells was determined using a commer- cially available caspase-3 (active) ELISA kit (Applygen Technologies, China). An ELISA for caspase-3 activity was performed according to manufacturer’s instructions. Enzyme-linked immunosorbent assay (ELISA) Sera from 31 pancreatic cancer patients and 31 healthy volunteers were obtained with the consent of patients and donors after approval from the Institutional Human Ethical Committee of the Peking Union Medical College Hospital, China. The human prohibitin ELISA kit (Life Sciences Advanced Technologies, China) was used to determine prohibitin levels according to manufacturer’s instruction. Cell proliferation assay The impact of PHB silencing on the proliferation of pancreatic cancer cells was measured using a Cell Counting Kit-8 (CCK-8) (Dojindo, Japan), according to the manufacturer’s instruction. A total of 1.0 × 103 pan- creatic cancer cells were added to each well of 96-well culture plates 24 h after transfection. Cell proliferation was assessed 0, 24, 48 and 72 h. CCK-8 reagent (10 μl) was added to each well, and the absorbance was measured at 450 nm after a 1.5-h incubation at 37 °C. All experiments were performed in 5 wells per experiment and repeated at least three times. Official journal of the American College of Gastroenterology Statistical analysis The rate of cell apoptosis was quantified by annexin- V–FITC and propidium iodide double staining using an Annexin-V/FITC kit (Neobiscience, China). Cells were collected according to the manufacturer’s Statistical analysis was performed using SPSS23 software (SPSS, Inc., Chicago, IL). Median values were taken as cutoff limits when two groups were compared. Official journal of the American College of Gastroenterology Wang et al. Clinical and Translational Gastroenterology (2018) 9:178 Page 6 of 12 Fig. 3 siRNA-PHB inhibited apoptosis in pancreatic cancer cells. a After siRNA-PHB transfection 48h, the cells were harvested and double stained with Annexin-V and PI. The early, later and total apoptosis rate of siRNA-PHB cells was obviously lower than the control cells in AsPC-1 and MiaPaCa-2. (*p < 0.05, **p < 0.01). b After siRNA-PHB transfection 48h, the protease activity of Caspase-3 notably decreased in AsPC-1 cells and in MiaPaCa-2 cells compared with the control, respectively. (*p < 0.05). c Knockdown PHB resulted in a statistically significant decrease in the expression of PARP, caspase-3, cleaved caspase-3 and caspase-9 protein in AsPC-1 (p < 0.05) and MiaPaCa-2 (p < 0.05) cells, compared to the control group, respectively. However, the expression of Bcl-2 was significantly increased in the AsPC-1 (p < 0.05) and MiaPaCa-2 (p < 0.01) cells after siRNA-PHB transfection 48 h Fig. 3 siRNA-PHB inhibited apoptosis in pancreatic cancer cells. a After siRNA-PHB transfection 48h, the cells were harvested and double stained with Annexin-V and PI. The early, later and total apoptosis rate of siRNA-PHB cells was obviously lower than the control cells in AsPC-1 and MiaPaCa-2. (*p < 0.05, **p < 0.01). b After siRNA-PHB transfection 48h, the protease activity of Caspase-3 notably decreased in AsPC-1 cells and in MiaPaCa-2 cells compared with the control, respectively. (*p < 0.05). c Knockdown PHB resulted in a statistically significant decrease in the expression of PARP, caspase-3, cleaved caspase-3 and caspase-9 protein in AsPC-1 (p < 0.05) and MiaPaCa-2 (p < 0.05) cells, compared to the control group, respectively. However, the expression of Bcl-2 was significantly increased in the AsPC-1 (p < 0.05) and MiaPaCa-2 (p < 0.01) cells after siRNA-PHB transfection 48 h Fig. 3 siRNA-PHB inhibited apoptosis in pancreatic cancer cells. a After siRNA-PHB transfection 48h, the cells were harvested and double stained with Annexin-V and PI. The early, later and total apoptosis rate of siRNA-PHB cells was obviously lower than the control cells in AsPC-1 and MiaPaCa-2. Prohibitin was expressed in PDAC cell lines, and prohibitin silencing inhibited the proliferation, migration and invasion of AsPC-1 and MiaPaCa-2 cells We investigated PHB expression in 8 pancreatic cancer cell lines, and PHB mRNA and protein were detectable in the cell lines. The AsPC-1 and MiaPaCa-2 cell lines were chosen for further functional experi- ments because of their high and low levels of PHB expression, respectively (Fig. 1a). We performed tran- sient silencing of PHB in AsPC-1 and MiaPaCa-2 cells. Specific PHB RNA interference (siRNA-PHB) molecules resulted in 71.6 and 87.1% reductions of PHB expression in AsPC-1 and MiaPaCa-2 cells at 48 h, respectively (Fig. 1b). CCK-8 assays were performed to assess the effects of PHB silencing on the proliferation of AsPC-1 and MiaPaCa-2 cells. We observed a sig- nificant decrease in growth rate after effective reduction of endogenous PHB at 24, 48 and 72 h (P < 0.05) com- pared to the control cells (Fig. 1c). Transwell assays were performed to examine the potential role of PHB on cell migration and invasion. Knockdown of PHB expression significantly suppressed the migra- tion of AsPC-1 (P < 0.01) and MiaPaCa-2 (P < 0.01) cells (Fig. 1d). The invasive abilities of siRNA-PHB AsPC-1 (P < 0.001) and MiaPaCa-2 (P < 0.001) cells were dramatically decreased compared to the control cells (Fig. 1e). Fig. 4 PHB higher expression in pancreatic cancer patients tissues and sera. a PHB mRNA expression was detected in 8 paired human Fig. 4 PHB higher expression in pancreatic cancer patients tissues and sera. a PHB mRNA expression was detected in 8 paired human pancreatic cancer tissues and normal pancreas with q-PCR analysis, the results were presented as the magnitude of relative expression (means ± SEM). β-actin was used as a housekeeping gene. b PHB protein expression was analysed in 8 paired human pancreatic cancer tissues and normal pancreas. Immunoblot analysis was performed using anti-rabbit antibodies (1:1000), GAPDH was used as a loading control. c The ELISA assay results showed that the level of serum PHB in the 31 PDAC patients was significant higher than that of 31 healthy volunteer (5.71 ± 1.85 ng/ml vs. 3.02 ± 0.59 ng/ml, p < 0.01) and sera. a PHB mRNA expression was detected in 8 paired human pancreatic cancer tissues and normal pancreas with q-PCR analysis, the results were presented as the magnitude of relative expression (means ± SEM). β-actin was used as a housekeeping gene. b PHB protein expression was analysed in 8 paired human pancreatic cancer tissues and normal pancreas. Statistical analysis (*p < 0.05, **p < 0.01). b After siRNA-PHB transfection 48h, the protease activity of Caspase-3 notably decreased in AsPC-1 cells and in MiaPaCa-2 cells compared with the control, respectively. (*p < 0.05). c Knockdown PHB resulted in a statistically significant decrease in the expression of PARP, caspase-3, cleaved caspase-3 and caspase-9 protein in AsPC-1 (p < 0.05) and MiaPaCa-2 (p < 0.05) cells, compared to the control group, respectively. However, the expression of Bcl-2 was significantly increased in the AsPC-1 (p < 0.05) and MiaPaCa-2 (p < 0.01) cells after siRNA-PHB transfection 48 h Official journal of the American College of Gastroenterology Wang et al. Clinical and Translational Gastroenterology (2018) 9:178 Page 7 of 12 Fig. 4 PHB higher expression in pancreatic cancer patients tissues and sera. a PHB mRNA expression was detected in 8 paired human pancreatic cancer tissues and normal pancreas with q-PCR analysis, the results were presented as the magnitude of relative expression (means ± SEM). β-actin was used as a housekeeping gene. b PHB protein expression was analysed in 8 paired human pancreatic cancer tissues and normal pancreas. Immunoblot analysis was performed using anti-rabbit antibodies (1:1000), GAPDH was used as a loading control. c The ELISA assay results showed that the level of serum PHB in the 31 PDAC patients was significant higher than that of 31 healthy volunteer (5.71 ± 1.85 ng/ml vs. 3.02 ± 0.59 ng/ml, p < 0.01) 8 Page 7 of 12 Survival analyses were performed using the Kaplan–Meier method log-rank test. Multivariable analysis was per- formed using a Cox proportional hazards model. The median survival and estimations of hazard ratios were reported with 95% confidence intervals. Comparisons of demographic and clinicopathological data between groups were performed using a Χ2 test. The measurement data are presented as means ± SD and compared using Student’s t test or the Mann–Whitney U test. Statistical significance was set at a P value less than 0.05. GraphPad Prism 5 (GraphPad, San Diego, CA) software was used to create graphs. Prohibitin was expressed in PDAC cell lines, and prohibitin silencing inhibited the proliferation, migration and invasion of AsPC-1 and MiaPaCa-2 cells Immunoblot analysis was performed using anti-rabbit antibodies (1:1000), GAPDH was used as a loading control. c The ELISA assay results showed that the level of serum PHB in the 31 PDAC patients was significant higher than that of 31 healthy volunteer (5.71 ± 1.85 ng/ml vs. 3.02 ± 0.59 ng/ml, p < 0.01) Results Prohibitin was expressed in PDAC cell lines, and prohibitin silencing inhibited the proliferation, migration and invasion of AsPC-1 and MiaPaCa-2 cells Prohibitin was expressed in PDAC cell lines, and prohibitin silencing inhibited the proliferation, migration and invasion of AsPC-1 and MiaPaCa-2 cells Overexpression of the PHB gene in AsPC-1 and MiaPaCa-2 cells increased proliferation, migration and invasion AsPC-1 and MiaPaCa-2 cells were transfected with PHB to confirm the effect of siRNA-PHB on cells pro- liferation, migration and invasion. Specific pIERS2-EGFP- PHB transfection resulted in 81.3% and 90.6% over- expression of PHB in AsPC-1 and MiaPaCa-2 cells at 48 h, respectively, according to Western blotting analysis (Fig. 2a). CCK-8 assays were performed to assess the effects of PHB overexpression on proliferation. An obvious increase in growth rate was observed after effective PHB transfection at 24, 48 and 72 h in AsPC-1 (P < 0.05) and MiaPaCa-2 (P < 0.05) cells compared to the control cells (Fig. 2b). Transwell assays were performed to examine the impact of PHB overexpression on cell migration and invasion abilities. PHB overexpression Official journal of the American College of Gastroenterology Page 8 of 12 Wang et al. Clinical and Translational Gastroenterology (2018) 9:178 Fig. 5 Location and expression of PHB in normal and cancerous pancreatic tissues. Immunohistochemistry was performed with PHB (1:5000) anti- rabbit antibodies. (magnitude ×200) a Localisation of PHB in normal pancreatic tissues, acinar cells and some ductal cells showed very weak cytoplasmic staining. b Very weak positive staining of PHB in cancer cells. c Weak expression of PHB shown by cytoplasmic staining. d Mild expression of PHB shown by plasma membrane and cytoplasm of cancer cells. e Strong expression of PHB shown by plasma membrane and cytoplasm of cancer cells. f PHB was also strong expressed in pancreatic islet cells Fig. 5 Location and expression of PHB in normal and cancerous pancreatic tissues. Immunohistochemistry was performed with PHB (1:5000) anti- rabbit antibodies. (magnitude ×200) a Localisation of PHB in normal pancreatic tissues, acinar cells and some ductal cells showed very weak cytoplasmic staining. b Very weak positive staining of PHB in cancer cells. c Weak expression of PHB shown by cytoplasmic staining. d Mild expression of PHB shown by plasma membrane and cytoplasm of cancer cells. e Strong expression of PHB shown by plasma membrane and cytoplasm of cancer cells. f PHB was also strong expressed in pancreatic islet cells significantly increased the migration ability of AsPC-1 (P < 0.05) and MiaPaCa-2 (P < 0.05) cells (Fig. 2c). PHB overexpression distinctly increased the invasive abilities of AsPC-1 (P < 0.05) and MiaPaCa-2 (P < 0.05) cells compared to controls (Fig. 1d). Ablation of PHB expression reduced apoptosis in PDAC cells Annexin-V and PI staining assays were used with flow cytometry to quantify the effect of siRNA-PHB on apoptosis in human pancreatic cancer cells. Cells were stained with Annexin V-FITC/PI and gated into the lower right (LR) and upper right (UR) quadrants (Fig. 3). Cells in the LR and UR quadrants were considered early apoptotic (Annexin+/PI−−) and late apoptotic (Annexin+/PI+), respectively. Cells in the LL (lower left) and UL (upper left) quadrants were considered alive and necrotic, respectively. The extent of apoptosis is expressed as the sum of the percentages in the LR and UR quadrants. Cells treated with siRNA-PHB exhibited a decrease in apoptosis of 22.8% (siRNA-PHB) to 34.3% (negative control) in AsPC-1 cells (p < 0.01) and from 26.37% (siRNA-PHB) to 29.87% (negative control) in MiaPaCa-2 cells (p < 0.05) (Fig. 3a). The caspase cascade and several closely related mitochon- drial apoptosis proteins were analysed in AsPC-1 and MiaPaCa-2 cells to elucidate the possible pathway of PHB-induced apoptosis. The protease activity of Overexpression of the PHB gene in AsPC-1 and MiaPaCa-2 cells increased proliferation, migration and invasion caspase-3 48 h after PHB RNA interference decreased notably in AsPC-1 cells (p < 0.01) and MiaPaCa-2 cells (p < 0.01) compared to the controls cells (Fig. 3b). PHB knockdown significantly decreased the expression of PARP, caspase-3, cleaved caspase-3 and caspase-9 proteins in AsPC-1 (p < 0.05) and MiaPaCa-2 (p < 0.05) cells compared to the control cells. However, Bcl-2 expression increased significantly in AsPC-1 (p < 0.05) and MiaPaCa-2 (p < 0.01) cells after siRNA-PHB trans- fection (Fig. 3c). These data further support that the silencing of PHB expression reduces apoptosis in human pancreatic cancer cells via the mitochondrial pathway. Location, expression and clinicopathological relationship analyses of Prohibitin in pancreatic cancer tissues using IHC Table 1 Correlation of PHB expression with clinicopathologic parameters g Immunohistochemistry was performed in 10 normal and 66 PDAC tissues. Acinar cells and some ductal cells in normal tissues exhibited very weak cytoplasmic stain- ing (Fig. 5a). Strong PHB expression was observed in the plasma membrane and cytoplasm of cancer cells and degenerating acinar cells. Various intensities of PHB positivity were observed in cancer cells from the PDAC tissue samples (Fig. 5b–e). PHB was also strongly expressed in pancreatic islet cells (Fig. 5f). IHC revealed that 29 (43.9%) of 66 cases exhibited high PHB expression in the PDAC specimens, and the strong expression rate for para-pancreatic cancer tissues was only 14/66 (21.2%). These results suggest that PHB expression was significantly higher in PDAC tissues (P < 0.05). We further divided the PDAC patients into PHB-weak and PHB-strong expression groups based on the differential expression levels of PHB in PDAC tissues. Table 1 shows the demographics and correlations between PHB expression and clinicopathological features. The rate of distant metastasis in follow-up was significant higher in the high PHB expression group than the low PHB expression group (79.3 vs. 35.1%) (P < 0.001), which indicates that the overexpression of PHB was associated with the progression of pancreatic cancer. Obviously increased prohibitin expression in pancreatic cancer patient tissues and sera PHB mRNA and protein were detected in 8 paired human pancreatic cancer tissues and normal pancreatic tissues using q-PCR and Western blot (clinical char- acteristics in Supplement Table 1). PHB mRNA and protein expression levels in the pancreatic cancer tissues were significantly increased compared to that in the normal pancreas samples (Fig. 4a, b). ELISAs demonstrated that the level of serum PHB in the 31 PDAC patients was significantly higher than that in the 31 healthy volunteers (5.71 ± 1.85 ng/ml vs. 3.02 ± 0.59 ng/ml, P < 0.001) (Fig. 4c) (Clinicopathological para- meters in Supplement Table 2). Official journal of the American College of Gastroenterology Page 9 of 12 Wang et al. Clinical and Translational Gastroenterology (2018) 9:178 Table 1 Correlation of PHB expression with clinicopathologic parameters clinicopathologic Characteristics No. of patients Prohibitin expression P value High Low Overall frequency 0.009** PC tissure 66 29 37 Normal tissure 66 14 52 Age 1 <65 43 19 24 ≥65 23 10 13 Gender 0.153 Male 35 12 23 Female 31 17 14 Tumour location 0.314 Head 42 16 26 Body/tail 24 13 11 Histological gradea 0.705 Grade 1/2 37 15 22 Grade 3 29 14 15 Pathological T stage 0.375 T1/T2 11 3 8 T3/T4 55 29 37 Lymph node involvement 0.402 − 30 11 19 + 36 18 18 TNM stage 0.443 I 5 1 4 II 48 23 25 III/IV 13 5 8 Distant metastasis in follow-up <0.001** − 30 6 24 + 36 23 13 ** P < 0.01 aGrade 1, well differentiated; Grade 2, moderately differentiated; Grade 3, poorly differentiated Survival analysis and univariate/multivariate analyses of the prognostic value of Prohibitin expression in pancreatic cancer Patients with lower levels of PHB expression [n = 37, median survival = 27.4 (21.9–33.1) months] exhibited significantly longer survival times compared to patients with higher PHB expression [n = 29, median survival = 11.1 (9.4–12.9) months, p < 0.01] (Fig. 6a). The prognostic value of PHB expression was assessed using a Cox proportional hazards model, and the results revealed that PHB expression (HR = 4.25, 95% CI: 2.09–4.26, P < 0.01) and histological grade (HR = 1.67, 95% CI: 1.07–2.16, P < 0.05) were independent prognostic factors (Fig. 6b). Other known prognostic factors (e.g., TNM stage and lymph node involvement) did not impact the prognosis independently because of the scarcity of early and less aggressive tumours in our cohort of 66 patients (Table 2). ** P < 0.01 aGrade 1, well differentiated; Grade 2, moderately differentiated; Grade 3, poorly differentiated poor prognosis and promotes cell proliferation and invasion20. Our study detected PHB mRNA and protein expression in 8 paired pancreatic cancer and normal pancreas tissues, and the expression of both entities were obviously higher in pancreatic cancer tissues than normal pancreas. The IHC results demonstrated higher PHB expression in 66 pancreatic cancer tissues compare to para-cancer tissues. We also found Official journal of the American College of Gastroenterology Discussion Recent studies reported that PHB was overexpressed in several tumour types, and it plays crucial roles in cancer development and progression, including hepato- cellular carcinoma, mammary cancer, squamous cell carcinoma of the lung and gastric cancer16–19. PHB is also overexpressed in gallbladder cancer, and it predicts Official journal of the American College of Gastroenterology Wang et al. Clinical and Translational Gastroenterology (2018) 9:178 Page 10 of 12 Fig. 6 Kaplan–Meier and log-rank analyses of prognostic factors assessed in multivariable analysis using a COX proportional hazards model. Median values were taken as cutoff limits when the two groups were compared. Survival analyses were performed using the Kaplan–Meier method for the estimation of event rates, and a log-rank test was used for survival comparisons between patient groups. The P value was 5%. PHB expression level (p < 0.01) and histological G stage (p < 0.05) both were independent prognostic factors, but the others risk factors, although showing the classical tendencies, did not appear to impact on the prognosis independency. (figures not showed) Fig. 6 Kaplan–Meier and log-rank analyses of prognostic factors assessed in multivariable analysis using a COX proportional hazards model. Median values were taken as cutoff limits when the two groups were compared. Survival analyses were performed using the Kaplan–Meier method for the estimation of event rates, and a log-rank test was used for survival comparisons between patient groups. The P value was 5%. PHB expression level (p < 0.01) and histological G stage (p < 0.05) both were independent prognostic factors, but the others risk factors, although showing the classical tendencies, did not appear to impact on the prognosis independency. (figures not showed) and invasion via ERK pathway activation in gallbladder cancer20. Zhou Luan et al. reported that blockade of the PHB scaffold-CRAF kinase interaction, which is distinct from direct kinase inhibition, may be a new therapeutic strategy to target oncogenic ERK-driven pancreatic cancers25. Our study verified that the pro- liferation, migration and invasion abilities were sig- nificantly inhibited in PHB under-expressing pancreatic cancer cells. In contrast, the proliferation, migration and invasion abilities were up-regulated in PHB over- expressing pancreatic cancer cells. that higher PHB expression predicted a shorter overall survival time based on survival analysis. PHB and pathological stage G were independent risk factors in multivariate analyses using a Cox proportional hazards model, which suggests that PHB may be used as a potential factor for survival. Mengwasser et al. Official journal of the American College of Gastroenterology Discussion reported obviously higher PHB expression levels in colorectal cancer patient sera than normal sera21. PHB levels in our study were significantly higher in pancreatic cancer patient sera than in healthy volunteer sera according to ELISA. Certainly, in our study, the sample size was small, and we only compared healthy volunteer and pancreatic cancer patients, this result had its own limitations. Next step, we will enlarge sample size and include more category of pancreatic and other digestive system diseases to identify this reselt deeply, but now, which means that PHB may be a new biomarker in pancreatic cancer patients in some extent. PHB is a small conserved protein that is implicated in numerous functions in mitochondria26. PHB appears indispensable for mitochondrial translation, and its abla- tion leads to a decrease in mitochondrial membrane potential27,28. Long Zhang et al. reported increased BAX and Cyt.c expression in PHB over-expressing gastric cancer BGC823 cells and decreased Bcl-2 expression. The activation levels of caspase-3 and caspase-9 were increased, but the activation level of caspase-8 was not changed, which suggests that PHB-induced apoptosis via the mitochondrial pathway29. Consistent with our study results, the expression of PARP, cleaved caspase-3, and caspase-9 was obviously decreased in PHB under- expressing pancreatic cancer cell lines AsPC-1 and MiaPaCa-2, but Bcl-2 was apparently increased. The activation level of caspase-3 was also decreased, which indicates that siRNA-PHB was an inhibitor of apoptosis in pancreatic cancer cells. Bcl-2 family proteins play an important role in regulating mitochondrial function and apoptosis. Bcl-2 family proteins form pore PHB is a hub for many signalling pathways triggered by growth factors, the immune response, steroid hor- mones that regulate metabolism, and mitochondrial biogenesis. PHB is involved in growth, resistance to chemotherapy, and metastasis via several mechanisms, including activation of the Ras-C-Raf-MEK-ERK pathway, modulation of TGF-β signalling, and regulation of tran- scription22. Many studies have demonstrated that PHB played an important role in the activation of the PI3K/Akt and Ras-C-Raf-MEK-ERK signalling pathways, in the modulation of epithelial cell adhesion and migration, and in the promotion of cancer metastasis23,24. Yang Cao et al. reported that PHB promoted cell proliferation Official journal of the American College of Gastroenterology Page 11 of 12 Page 11 of 12 Wang et al. 1. WHAT IS CURRENT KNOWLEDGE More than one-half of pancreatic cancer cases are diagnosed at a distant stage. Novel specific markers in pancreatic cancer patients are strong demanded. 2. WHAT IS NEW HERE PHB is significantly increased in PDAC tissues and patients sera. PHB is an independent prognostic factor in PDAC patients. PHB plays a key role in modulating the malignant phenotype and apoptosis induction. PHB is significantly increased in PDAC tissues and patients sera. PHB is an independent prognostic factor in PDAC patients. PHB plays a key role in modulating the malignant phenotype and apoptosis induction. PHB may be a novel prognostic predictor and a candidate for targeted therapy against PDAC. Conflict of Interest: Guarantor of the article: Wang Weibin. Specific author contributions: Z.Y.P. and Z.T.P. conceived and designed the study. W.W.B., X.L. and Y.Y. performed, collected and interpreted the data. W.W. B. and D.L.B. drafted the manuscript. W.W.B., Z.B.B. and LJ reviewed and edited the manuscript. All authors have read and approved the final manuscript submitted. Financial support: The study was supported by grants from the 2016 PUMCH Science Found for Junior Faculty (no. pumch-2016-2.6), and National Natural Science Foundation of China (no. 81773215). Potential competing interests: None. Publisher's note: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Discussion Clinical and Translational Gastroenterology (2018) 9:178 Table 2 Univariable and multivariable analysis of prognostic factors Univariable analysis Multivariable analysis Comparator N Median survival (95% CI) in months Log-rank p value HR 95% CI p value Median age (years) ≥65.5 vs. <65.5 23/43 18.2 (12.8–23.7) vs. 21.6 (16.6–26.6) 0.291 0.508 1.811 0 0.307–0.791 0.325 Gender M/F 35/31 18.9 (13.7–24.1) vs. 22.1 (16.8–27.4) 0.575 0.239 1.158 0.297–1.463 0.589 Tumour location Head vs. body/tail 42/24 22.5 (17.4–27.5) vs. 17.5 (11.7–23.4) 0.436 0.174 0.976 0.398–1.324 0.435 T-status T1/T2 vs. T3/T4 11/55 29.2 (19.8–38.7) vs. 18.9 (14.8–23.1) 0.194 0.097 1.576 0.12–2.312 0.292 N-status N0 vs. N1 30/36 25.6 (19.5–31.8) vs.16.2 (12.0–20.5) 0.163 0.016 1.18 0.63–2.21 0.61 TNM-stage I/II/III/IV 5/48/6/7 30.1 (22.4–37.6) vs.19.3 (15.3–23.3) vs.26.7 (13.5–39.8) vs.10.4 (2.7–18.2) 0.114 0.025 1.12 0.53–2.36 0.76 Grade G1 vs. G2 vs. G3 9/28/29 37.2 (26.4–48.1) vs. 18.1 (13.4–22.9) vs.17.6 (12.4–22.7) 0.51 0.021 1.67 1.07–2.61 0.026* PHB score ≤4 vs. >4 37/29 27.4 (9.4–12.9) vs. 11.1 (21.9–33.0) 1.446 0.001 4.25 2.09–4.26 0.001** compounds in the mitochondrial inter membrane and release apoptotic factors into the cytoplasm to cause apoptosis30. The exact mechanism of PHB in apoptosis in different cancer cells is not clear. Yingjie Xu et al. reported that PHB1 regulates tumour cell apoptosis via interaction with X-linked inhibitor of apoptosis protein31. Sanchez-Quiles V et al. reported that PHB regulates apoptosis in a mechanism dependent on NFκB signalling in human hepatoma cells32. In summary, we demonstrated that high PHB expres- sion in pancreatic cancer tissues and pancreatic cancer patient sera was associated with poor prognosis in pancreatic cancer patients. Furthermore, down-regulation of PHB expression reduced the proliferation, migra- tion and invasion of pancreatic cancer cells, and the opposite results were obtained in PHB over-expressing cells. Therefore, PHB may be a novel prognosis marker and candidate for targeted therapy against pancreatic cancer. Conflict of Interest: Specific author contributions: Z.Y.P. and Z.T.P. conceived and designed the study. W.W.B., X.L. and Y.Y. performed, collected and interpreted the data. W.W. B. and D.L.B. drafted the manuscript. W.W.B., Z.B.B. and LJ reviewed and edited the manuscript. All authors have read and approved the final manuscript submitted. Publisher's note: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Page 12 of 12 Page 12 of 12 Page 12 of 12 Wang et al. Clinical and Translational Gastroenterology (2018) 9:178 Wang et al. Clinical and Translational Gastroenterology (2018) 9:178 The online version of this article (https://doi.org/10.1038/s41424-018-0044-1) contains supplementary material, which is available to authorized users. The online version of this article (https://doi.org/10.1038/s41424-018-0044-1) contains supplementary material, which is available to authorized users. 16. Cheng, J. et al. Prohibitin-2 promotes hepatocellular carcinoma malignancy progression in hypoxia based on a label-free quantitative proteomics strategy. Mol. Carcinog. 53, 820–832 (2014). 17. Guo, F. et al. Prohibitin in squamous cell carcinoma of the lung: its expression and possible clinical significance. Human. Pathol. 43, 1282–1288 (2012). Received: 25 December 2017 Revised: 4 June 2018 Accepted: 5 June 2018 Received: 25 December 2017 Revised: 4 June 2018 Accepted: 5 June 2018 18. Ko, K. S. et al. Liver-specifc deletion of prohibitin 1 results spontaneous liver injury, fibrosis, hepatocellular carcinoma in mice. Hepatology 52, 2096–2108 (2010). References 19. Kang, X. et al. Prohibitin: a potential biomarker for tissue-based detection of gastric cancer. J. Gastroenterol. 43, 618–625 (2008). 1. Siegel, R. L., Miller, K. D. & Jemal, A. Cancer Statistics, 2017. CA Cancer J. Clin. 67, 7–30 (2017). 20. Cao, Y. et al. Prohibitin overexpression predicts poor prognosis and promotes cell proliferation and invasion through ERK pathway activation in gallbladder cancer. J. Exp. Clin. Cancer Res 35, 68 (2016). 2. Paulson, A. S., Tran Cao, H. S., Tempero, M. A. & Lowy, A. M. Therapeutic advances in pancreatic cancer. Gastroenterology 144, 1316–1326 (2013). 3. Conroy, T. et al. FOLFIRINOX versus gemcitabine for metastatic pancreatic cancer. N Engl. J. Med. 364, 1817–1825 (2011). 21. Mengwasser, J., Piau, A., Schlag, P. & Sleeman, J. P. Differential immunization identifies PHB1/PHB2 as blood-borne tumor antigens. Oncogene 23, 7430–7435 (2004). cancer. N Engl. J. Med. 364, 1817–1825 (2011). 4. Cid-Arregui, A. & Juarez, V. Perspectives in the treatment of pancreatic ade- nocarcinoma. World J. Gastroenterol. 21, 9297–9316 (2015). 22. Thuaud, F., Ribeiro, N., Nebigil, C. G. & Desaubry, L. Prohibitin ligands in cell death and survival: mode of action and therapeutic potential. Chem. Biol. 20, 316–331 (2013). 5. Kotera, Y., Fontenot, J. D., Pecher, G., Metzgar, R. S. & Finn, O. J. Humoral immunity against a tandem repeat epitope of human mucin MUC-1 in sera from breast, pancreatic, and colon cancer patients. Cancer Res. 54, 2856–2860 (1994). 23. Rajalingam, K., & Rudel, T. Ras-Raf signaling eeds prohibitin. Cell Cycle 4, 1503–1505 (2005). 6. Gansauge, S. et al. The role of anti-p53-autoantibodies in pancreatic disorders. Int. J. Pancreatol. 19, 171–178 (1996). 24. Rajalingam, K. et al. Prohibitin is required for Ras-induced Raf-MEK-ERK acti- vation and epithelial cell migration. Nat. Cell Biol. 7, 837–843 (2005). 7. Raedle, J. et al. p53 autoantibodies in patien carcinoma. Pancreas 13, 241–246 (1996). 7. Raedle, J. et al. p53 autoantibodies in patients with pancreatitis and pancreatic carcinoma. Pancreas 13, 241–246 (1996). 25. Luan, Z., He, Y., Alattar, M., Chen, Z. & He, F. Targeting the prohibitin scaffold- CRAF kinase interaction in RAS-ERK-driven pancreatic ductal adenocarcinoma. Mol. Cancer 13, 38 (2014). carcinoma. Pancreas 13, 241–246 (1996). 8. Maacke, H. et al. Autoantibodies in sera of pancreatic cancer patients identify recombination factor Rad51 as a tumour-associated antigen. J. Cancer Res. Clin. Oncol. 128, 219–222 (2002). 8. Maacke, H. et al. Official journal of the American College of Gastroenterology References Autoantibodies in sera of pancreatic cancer patients identify recombination factor Rad51 as a tumour-associated antigen. J. Cancer Res. Clin. Oncol. 128, 219–222 (2002). 26. Tyc, J. et al. Probing for primary functions of prohibitin in Trypanosoma brucei. Int. J. Parasitol. 40, 73–83 (2010). 9. Wang, W. et al. Immunogenic membrane antigen and novel prognostic predictor: voltage-dependent anion channel 1 (VDAC1) in pancreatic cancer. Sci. Rep. 6, 33648 (2016). 27. Ross, J. A., Nagy, Z. S. & Kirken, R. A. The PHB1/2 phosphocomplex is required for mitochondrial homeostasis and survival of human T cells. J. Biol. Chem. 283, 4699–4713 (2008). 10. Nadimpalli, R., Yalpani, N., Johal, G. S. & Simmons, C. R. Prohibitins, stomatins, and plant disease response genes compose a protein superfamily that con- trols cell proliferation, ion channel regulation, and death. J. Biol. Chem. 275, 29579–29586 (2000). 28. Sun, Q. et al. Subproteomic analysis of the mitochondrial proteins in rats 24 h after partial hepatectomy. J. Cell. Biochem. 105, 176–184 (2008). 29. Zhang, L., Ji, Q., Ni, Z.-H. & Sun, J. Prohibitin induces apoptosis in BGC823 gastric cancer cells through the mitochondrial pathway. Asian Pac. J. Cancer Prev. 13, 3803–3807 (2012). 11. Mishra, S., Murphy, L. C. & Murphy, L. J. The Prohibitins: emerging roles in diverse functions. J. Cell. Mol. Med. 10, 353–363 (2006). 30. Korsmeyer, S. J. et al. Pro-apoptotic cascade activates BID, which oligomerizes BAK or BAX into pores that result in the release of cytochrome c. Cell death Differ. 7, 1166–1173 (2000). 12. Chowdhury, I. et al. The emerging roles of prohibitins in folliculogenesis. Front. Biosci. 4, 690–699 (2012). 13. Back, J. W. et al. A structure for the yeast prohibitin complex: Structure pre- diction and evidence from chemical crosslinking and mass spectrometry. Protein Sci. 11, 2471–2478 (2002). 31. Xu, Y., Yang, W., Shi, J. & Zetter, B. R. Prohibitin 1 regulates tumor cell apoptosis via the interaction with X-linked inhibitor of apoptosis protein. J. Mol. Cell Biol. 8, 282–285 (2016). 14. Kuwahara, Y. et al. Unusual thermal disassembly of the SPFH domain oligomer from Pyrococcus horikoshii. Biophys. J. 97, 2034–2043 (2009). 32. Sanchez-Quiles, V. et al. Prohibitin deficiency blocks proliferation and induces apoptosis in human hepatoma cells: molecular mechanisms and functional implications. Proteomics 10, 1609–1620 (2010). 15. Winter, A., Kamarainen, O. & Hofmann, A. Molecular modeling of prohibitin domains. Proteins 68, 353–362 (2007). Official journal of the American College of Gastroenterology
https://openalex.org/W3119013845
https://cdm21054.contentdm.oclc.org/digital/api/collection/IR/id/9324/download
English
null
Inhibition of Nonfunctional Ras
Cell chemical biology
2,021
cc-by
13,194
SUMMARY Intuitively, functional states should be targeted; not nonfunctional ones. So why could drugging the inactive K-Ras4BG12C work—but drugging the inactive kinase will likely not? The reason is the distinct oncogenic mechanisms. Kinase driver mutations work by stabilizing the active state and/or destabilizing the inactive state. Either way, oncogenic kinases are mostly in the active state. Ras driver mutations work by quelling its deactivation mechanisms, GTP hydrolysis, and nucleotide exchange. Covalent inhibitors that bind to the inactive GDP-bound K-Ras4BG12C conformation can thus work. By contrast, in kinases, allosteric inhib- itors work by altering the active-site conformation to favor orthosteric drugs. From the translational stand- point this distinction is vital: it expedites effective pharmaceutical development and extends the drug clas- sification based on the mechanism of action. Collectively, here we postulate that drug action relates to blocking the mechanism of activation, not to whether the protein is in the active or inactive state. Inhibition of Nonfunctional Ras Ruth Nussinov,1,2,* Hyunbum Jang,1 Attila Gursoy,3 Ozlem Keskin,4 and Vadim Gaponenko5,* 1Computational Structural Biology Section, Frederick National Laboratory for Cancer Research in the Laboratory of Cancer Immunometabolism, National Cancer Institute, Frederick, MD 21702, USA 2Department of Human Molecular Genetics and Biochemistry, Sackler School of Medicine, Tel Aviv University, Tel Aviv 69978, Israel 3Department of Computer Engineering, Koc University, Istanbul 34450, Turkey 4Department of Chemical and Biological Engineering, Koc University, Istanbul 34450, Turkey 5Department of Biochemistry and Molecular Genetics, University of Illinois at Chicago, Chicago, IL 60607, USA *Correspondence: nussinor@mail.nih.gov (R.N.), vadimg@uic.edu (V.G.) https://doi.org/10.1016/j.chembiol.2020.12.012 Ruth Nussinov,1,2,* Hyunbum Jang,1 Attila Gursoy,3 Ozlem Keskin,4 and Vadim Gaponenko5,* 1Computational Structural Biology Section, Frederick National Laboratory for Cancer Research in the Laboratory of Cancer Immunometabolism, National Cancer Institute, Frederick, MD 21702, USA 2Department of Human Molecular Genetics and Biochemistry, Sackler School of Medicine, Tel Aviv University, Tel Aviv 69978, Israel 3Department of Computer Engineering, Koc University, Istanbul 34450, Turkey 4Department of Chemical and Biological Engineering, Koc University, Istanbul 34450, Turkey 5Department of Biochemistry and Molecular Genetics, University of Illinois at Chicago, Chicago, IL 60607, USA *Correspondence: nussinor@mail.nih.gov (R.N.), vadimg@uic.edu (V.G.) https://doi.org/10.1016/j.chembiol.2020.12.012 BACKGROUND However, the location of the drug-binding site matters (Guar- nera and Berezovsky, 2019, 2020), and in kinases the inactive state may also be targeted. For example, Raf’s activation is through homo- or heterodimerization. If a drug binds at the dimer interface to prevent activation via dimerization, it is a successful inhibitor of a nonfunctional kinase conformation. On the other hand, an inhibitor of active guanosine triphosphate (GTP)-bound Ras, binding at the interface of the effector binding site, still pre- vents the signal transduction of active Ras. That is, the drug ac- tion is related to blocking the protein mechanism of activation, not to whether the protein is in the active or inactive state. That is, we suggest drug classification based on its mechanism of ac- tion as it would help guide its design. Why can targeting inactive Ras conformations inhibit active ones, but targeting inactive kinase conformations likely will not? There are already examples of inhibition of inactive (nonfunctional) mutant K-Ras4BG12C (Goody et al., 2019; Janes et al., 2018; Ket- tle et al., 2020; Lou et al., 2019; McCarthy et al., 2019; Nagasaka et al., 2020; Nussinov and Tsai, 2015; Ostrem et al., 2013; Zeng et al., 2017), among them some with promising drugs undergoing clinical trials, and ongoing attempts to tame K-Ras dimers (Kess- ler et al., 2020). However, inhibition of nonfunctional kinases was not taken up. This is vastly important to understand, as allosteric inhibitors are increasingly becoming a major drug-discovery route (Gross et al., 2020; Khan et al., 2020b; Kostaras et al., 2020; Lu et al., 2018, 2020; Nussinov and Tsai, 2012, 2013, 2015; Ward et al., 2020). Here, we first briefly review Ras biology, highlighting key attributes in Ras activation, some of which have been pursued in Ras pharmacology attempts. We follow with allosteric mutations and inhibitors aimed at nonfunctional Ras states, successes, failures, and considerations. We distinguish these from oncogenic activation of kinases and consequent allo- steric inhibitor strategies. In Ras, activating mutations work by interfering with deactivation; in kinases, they work by increasing the relative stability of the active versus the inactive state, thus vastly increasing the number of molecules in the active state. It is exceedingly challenging to design a high-affinity drug that would bind the inactive state and shift the ensemble back to this state while still at nontoxic dosage. Allosteric drugs that alter the active site appear more tractable. Perspective Inhibition of Nonfunctional Ras Ruth Nussinov,1,2,* Hyunbum Jang,1 Attila Gursoy,3 Ozlem Keskin,4 and Vadim Gaponenko5,* 1Computational Structural Biology Section, Frederick National Laboratory for Cancer Research in the Laboratory of Cancer Immunometabolism, National Cancer Institute, Frederick, MD 21702, USA 2Department of Human Molecular Genetics and Biochemistry, Sackler School of Medicine, Tel Aviv University, Tel Aviv 69978, Israel 3Department of Computer Engineering, Koc University, Istanbul 34450, Turkey 4Department of Chemical and Biological Engineering, Koc University, Istanbul 34450, Turkey 5Department of Biochemistry and Molecular Genetics, University of Illinois at Chicago, Chicago, IL 60607, USA *Correspondence: nussinor@mail.nih.gov (R.N.), vadimg@uic.edu (V.G.) https://doi.org/10.1016/j.chembiol.2020.12.012 ll OPEN ACCESS ll OPEN ACCESS Cell Chemical Biology 28, February 18, 2021 ª 2021 The Authors. Published by Elsevier Ltd. 121 This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/). RAS: AN OVERVIEW It also influences Ras orientation at the membrane, accessibility, and selective interaction with its effectors (Ahearn et al., 2011; Cao et al., 2019; Chavan et al., 2015; Jang et al., 2016a, 2020; Neale and Garcia, 2020; Nussinov et al., 2018a; Prakash and Gorfe, 2019; Prakash et al., 2020). Membrane attachment can also be regulated by ubiquitination (Baietti et al., 2016; Steklov et al., 2018; Thurman et al., 2020), phosphorylation of the C terminus as well as other post-transla- tional modifications, such as acetylation, and calmodulin (Jang et al., 2017, 2019; Nussinov et al., 2017b). ) As members of the small GTPase family, Ras proteins function as molecular switches between their two states (Bourne et al., 1991; Cherfils and Zeghouf, 2013; Downward, 1990; Geyer and Wittinghofer, 1997; Grand and Owen, 1991; Lamontanara et al., 2014; Lowy et al., 1991; Sprang, 1997; Takai et al., 2001; Vetter and Wittinghofer, 2001; Wittinghofer and Pai, 1991; Wit- tinghofer and Vetter, 2011). Inactivation is mediated by GTPase-activating proteins (GAPs) that hydrolyze the GTP to GDP (Wittinghofer et al., 1997). Strong oncogenic mutations block GAP catalytic activity, retaining the active GTP-bound state, thus promoting downstream signaling and cell prolifera- tion as in the case of G12D K-Ras4B mutant (Adjei, 2001; Schub- bert et al., 2007; Smith and Ikura, 2014; Smith et al., 2013; Vigil et al., 2010). Weaker driver mutations can be associated with promoting a high rate of intrinsic and guanine nucleotide ex- change factor-induced nucleotide exchange, as in the case of A146T K-Ras4B mutant (Poulin et al., 2019). The second major pathway activated by Ras at the membrane is Ras/PI3K/AKT/mTOR (Downward, 2008; Sheridan and Down- ward, 2013). RTK interacts with the nSH2 domain in the p85a regulatory domain of phosphatidylinositol 3-kinase (PI3Ka), re- cruiting the lipid kinase to the membrane and releasing its autoinhibition (Zhang et al., 2019a, 2019b). Subsequent confor- mational changes expose the active site (Zhang et al., 2019a). Ras-GTP assists in the recruitment, acting to enhance the cata- lytically favored PI3K population at the membrane where signaling lipid substrate phosphatidylinositol-3,4-bisphosphate (PIP2) is located. PI3K phosphorylates PIP2 to produce phospha- tidylinositol-3,4,5-bisphosphate (PIP3). PIP3 recruits AKT (also known as protein kinase B [PKB]) and 3-phosphoinositide- dependent protein kinase 1 (PDK1) to the plasma membrane. PDK1 phosphorylates and activates AKT, with the signaling propagating downstream to activate transcription factors whose transcription products also enter the cell cycle at the G1 phase. RAS: AN OVERVIEW Together with the MAPK products, they act in cell growth and di- vision, accelerating proliferation (Gul et al., 2018; Lien et al., 2017; Nussinov et al., 2019a, 2020; Pokrass et al., 2020; Zhang et al., 2020). Countering PIP2 to PIP3 phosphorylation by PI3K is PTEN (phosphatase and tensin homolog), a phosphatase (Hosford et al., 2017; Ijuin, 2019; Yehia et al., 2020). Below, we first distinguish between allosteric mutations in ki- nases and in Ras. In Ras, they work by quenching deactivation mechanisms, GTP hydrolysis, and nucleotide exchange; inhibi- tors that bind to the inactive conformation block reactivation. By contrast, in kinases they act by shifting the equilibrium toward the active state; accordingly, their allosteric drugs aim to modu- late the active-site conformation. The distinct mutation scenarios are the key to their inhibition strategy, and these considerations are general. RAS: AN OVERVIEW Wild-type Ras regulates cell growth and division (Bryant et al., 2014; Cox and Der, 2010; Crespo and Leon, 2000; Drosten et al., 2010; Lu et al., 2016b; Pylayeva-Gupta et al., 2011; Wies- muller and Wittinghofer, 1994). An activated receptor tyrosine ki- nase (RTK), such as epidermal growth factor receptor (EGFR) (Moran et al., 1991; Nussinov et al., 2020), recruits the Son of Sevenless (SOS), a Ras-specific guanine nucleotide exchange factor (GEF). Mediated by adaptor proteins SHC (Src homology 2 domain containing) and Grb2 (growth factor receptor-binding protein 2), RTK activates SOS, which acts to substitute guano- sine diphosphate (GDP) by GTP at the membrane to activate Ras (Bandaru et al., 2019; Huang et al., 2019; Liao et al., 2018, 2020). Membrane-anchored Ras dimers or nanoclusters bind ll OPEN ACCESS Perspective and activate Raf kinase (Nussinov et al., 2019b, 2019c, 2020; Solman et al., 2015; Sutton et al., 2019; Zhou et al., 2018). In the absence of Ras, Raf is autoinhibited. Its Ras-binding domain (RBD) and cysteine-rich domain (CRD) loosely interact and occlude the kinase domain (KD) dimerization surface (Nussinov et al., 2018b). This conformation is stabilized by 14-3-3 (Kondo et al., 2019; Park et al., 2019; Rezaei Adariani et al., 2018). The high-affinity Ras-Raf’s RBD interaction, enhanced by CRD mem- brane attachment (Fang et al., 2020; Li et al., 2018a, 2018b; Okada et al., 1999; Sarkar and Garcia, 2020; Travers et al., 2018), shifts Raf’s equilibrium toward the open state and interac- tion with Ras (Nussinov et al., 2019a). RBDs’ interactions with spatially proximal Ras catalytic domains in Ras dimers or nano- clusters promote Raf’s KD dimerization and activation (Holder- field et al., 2014; Lavoie et al., 2013; Lee et al., 2019; Muratcioglu et al., 2015, 2020). Active Raf phosphorylates MEK1/2 (MAPK ki- nase 1/2) (De Luca et al., 2012; Young et al., 2013), with signaling propagating down the mitogen-activated protein kinase (MAPK) pathway to activate extracellular signal-regulated kinase (ERK) and transcription factors, such as Elk-1 (Gao et al., 2019; Nussi- nov et al., 2014), with the resulting expressed proteins entering the G1 phase of the cell cycle, thereby linking the cellular environ- ment to cell-cycle progression. At the G1 phase, cyclin-depen- dent kinases promote passage to the S (synthesis) phase. membrane properties and, thus, segregation into homogeneous nanoclusters and dimers (Fujiwara et al., 2002; Murase et al., 2004; Simons and Vaz, 2004). 122 Cell Chemical Biology 28, February 18, 2021 ALLOSTERIC MUTATIONS IN RAS AND KINASES WORK DIFFERENTLY; THUS, THEIR INHIBITION STRATEGIES SHOULD DIFFER TOO Protein function hinges on the extent to which it populates its active conformation (Lu et al., 2014a, 2014b; Nussinov and Tsai, 2013). Molecular ensembles exist in a conformational equi- librium of active and inactive states (Henley et al., 2020; Nussi- nov, 2016; Nussinov and Wolynes, 2014). Aside from repressors, under physiological conditions most enzymes and receptors are in their inactive states. When stimulated, either by an incoming signal or oncogenic mutations, the ensemble shifts to populate the active state (Tsai and Nussinov, 2014). The relative popula- tions of the states reflect their relative stabilities. Allosteric inhib- itors whose shapes and chemistry fit a certain patch of surface of the enzyme or receptor in the inactive (or for repressors, active) state are conformationally selected. The ensemble is equili- brated by a shift toward the stabilized inactive state. Ras anchors in the plasma membrane through its prenylated hypervariable region (HVR) at the C terminus (Barklis et al., 2019; Nussinov et al., 2018a). Whereas the sequences and struc- tures of the catalytic domains of H-Ras and N-Ras, and splice iso- forms K-Ras4A and K-Ras4B, are highly similar, this is not the case for their HVRs (Lu et al., 2016b; Nussinov et al., 2017a; Py- layeva-Gupta et al., 2011) and the distinct combinations of their lipid post-translational modifications—farnesyl (or geranylger- anyl) and palmitoyl. K-Ras4B is farnesylated, K-Ras4A can be far- nesylated or farnesylated and palmitoylated; N-Ras is also farne- sylated and palmitoylated, and H-Ras is farnesylated and double- palmitoylated. Their distinct chemistry makes them favor different Kinases fit into this description (Figure 1). They switch from the inactive aC-helix-out to the active aC-helix-in conformation 122 Cell Chemical Biology 28, February 18, 2021 ll OPEN ACCESS Perspective Figure 1. The Free Energy Landscape DDG of a Kinase Conformation (here EGFR), the Effect of Mutations, and an Allosteric Inhibitor Oncogenic driver mutations (L858R and T790M) destabilize the inactive state (left plot in the middle panel) and stabilize the active state (center plot), or both (right plot). The outcome is a shift of the ensemble toward the constitutively active EGFR conformation. In the bottom panel, an allosteric drug binding EGFR’s mutant surface stabilizes this conformation, with a population shift toward this conformation. The drug modulates the active-site shape. Perspective the release of the autoinhibition. In the wild type it is triggered by nSH2 domain interacting with RTK’s pYXXM motif in the C ter- minus. ALLOSTERIC MUTATIONS IN RAS AND KINASES WORK DIFFERENTLY; THUS, THEIR INHIBITION STRATEGIES SHOULD DIFFER TOO The outcome is exposure of the active site at the mem- brane. Other mutations, e.g., Glu81, Gly106, Arg108, Lys111, and Gly118, in the adaptor-binding domain, contribute to the exposure as well. These mutations reduce the transition-state barrier (ka). Another common driver, H1047R, enhances the pop- ulation time of the lipid substrate at the active site (km). In TRK tyrosine kinases, xDFG mutations confer resistance to type I in- hibitors but sensitize them to type II by stabilizing the inactive (DFG-out) conformations (Cocco et al., 2020). Not all mutations can, however, be described by the free en- ergy landscape. Ras’s major mutations, e.g., Gly12, Gly13, and Gln61, which block hydrolysis, cannot be described by the free energy landscape (Fernandez-Medarde and Santos, 2011; Nus- sinov et al., 2013; Tsai and Nussinov, 2014). Neither can muta- tions that block nucleotide exchange, such as K-Ras4BA146T. GTP hydrolysis involves proton transfer from an attacking water molecule to another, followed by transfer of a different proton from this water molecule to the GTP. Gln61 can stabilize the tran- sient OH and H3O+ molecules lowering the transition-state bar- rier, which the Leu61 cannot (Martin-Garcia et al., 2012). As to the Gly12 mutants, their longer side chains interfere with GAP’s argi- nine finger insertion and hydrolysis (Krengel et al., 1990). Despite the different mechanisms, both kinases and Ras GTPases are dynamic molecules, with multiple, not only two discrete, active and inactive states. Both types of proteins can be considered from the mechanistic free energy landscape standpoint, which epitomizes the ‘‘second molecular biological revolution’’ (Nussinov and Wolynes, 2014). The paradigm fo- mented by this revolution postulated that the energy landscape (Frauenfelder et al., 1991) and the laws of quantum mechanics and structural chemistry apply to all biological systems and that biomolecules always interconvert between conformations with varying energies. This view inspired the dynamical statistical description of the molecules (Kumar et al., 2000; Ma et al., 2002; Tsai et al., 1999a, 1999b), whereby the ensembles describe the relative conformational stabilities of the states, their transitions, and their population shifts to retain their equilibrium (Arora and Brooks, 2007; Boehr et al., 2009; Huang et al., 2015; Kar et al., 2010; Mackereth et al., 2011; Motlagh et al., 2014; Nussinov and Ma, 2012; Okazaki and Takada, 2008). GDP-bound Ras can exist in inactive and active conformations. Similarly, Ras- GTP exists in active and inactive states, although the popula- tions vary. ALLOSTERIC MUTATIONS IN RAS AND KINASES WORK DIFFERENTLY; THUS, THEIR INHIBITION STRATEGIES SHOULD DIFFER TOO Indeed, molecular dynamics (MD) simulations and crystallography (Shima et al., 2010) suggest that the inactive state of Ras-GTP may exist in at least three substates. Notably, in reality, there are many inactive protein states and there is also an ensemble at the transition state. Classically, catalysis involves tight binding of the substrate to the transition-state structure to lower the activation energy. However, the transition state is a surface, not a single saddle point on the potential energy surface, and the activated conformations in the transition-state ensemble can catalyze multiple reaction steps (Ma et al., 2000). Nuclear magnetic resonance of GppNHp-bound wild-type H-Ras cata- lytic domain identified two conformational states that intercon- vert on a millisecond timescale, inactive state 1 and active state 2 (Geyer et al., 1996; Liao et al., 2008). The perturbations induced by the oncogenic mutations promote a redistribution of the Figure 1. The Free Energy Landscape DDG of a Kinase Conformation (here EGFR), the Effect of Mutations, and an Allosteric Inhibitor Oncogenic driver mutations (L858R and T790M) destabilize the inactive state (left plot in the middle panel) and stabilize the active state (center plot), or both (right plot). The outcome is a shift of the ensemble toward the constitutively active EGFR conformation. In the bottom panel, an allosteric drug binding EGFR’s mutant surface stabilizes this conformation, with a population shift toward this conformation. The drug modulates the active-site shape. through a rotation and shift movement, with a salt bridge be- tween the b3-Lys and the aC-Glu, and R-spine formation (Nussi- nov and Tsai, 2013). The triggers for the conformational change vary among the kinase families. Oncogenic mutations stabilize the active aC-helix-in conformation or disrupt interactions that stabilize the aC-helix-out, as in the case of the L858R in EGFR. There, the mutation stabilizes the aC-helix-in conformation by heterodimerization. The mutation is in the middle of a hydropho- bic core. Thus, the change to Arg also disrupts stabilizing hydro- phobic interactions in the aC-helix-out conformation. The T790M mutation in EGFR, T315I in Bcr-Abl, T334I in c-Abl, T341I in Src, T670I in Kit, and T674I in PDGFRa (platelet-derived growth factor receptor A) work by stabilizing the hydrophobic R-spine, pro- moting enzymatically active conformation (Nussinov and Tsai, 2013). ALLOSTERIC MUTATIONS IN RAS AND KINASES WORK DIFFERENTLY; THUS, THEIR INHIBITION STRATEGIES SHOULD DIFFER TOO Early on, a small-molecule compound Kobe0065 and cyclen-metal complexes that bound to the inactive state were developed (Shima et al., 2013). A cova- lent allosteric inhibitor for oncogenic K-RasG12C obtained by a di- sulfide fragment-based screening approach (Ostrem et al., 2013) as well as inhibitors that target nonfunctional dimers (Kessler et al., 2019, 2020; Tran et al., 2020) exploit the same rationale. ensemble. Crystal structures reveal allosteric effects on confor- mational states induced by mutations, and mutants display distinct outcomes in effector binding and in oncogenicity, as in the cases of G12V versus G12D. Furthermore, K-Ras populates conformational states differently from its isoform H-Ras and oncogenic mutant K-Ras4BG12D (Parker and Mattos, 2018; Parker et al., 2018). ) The free energy landscape describes the ensemble around the native state as populating the active and inactive states, with the states separated by kinetic barriers. The more stable the confor- mation, the larger its population. Due to functional requirements, the barriers between states are not too high, which allows conformations to switch between them. In kinases, oncogenic mutations work by creating new interactions and/or abolishing existing ones, resulting in higher stability (population) of the active state. In the case of Ras, these free energy considerations do not apply to the mutation actions. GTP binds the active state. With the high-millimolar-range concentration of the guanine nucleotide in the cell and its picomolar affinity, ~75% of K- RasG12C is GTP bound in the steady state. Intrinsic hydrolysis, which is high for this mutant (Hunter et al., 2015), cycles K- Ras4BG12C into its GDP-bound state while allosteric drugs block the nucleotide exchange. Thus, not all mutations can be described by the free energy landscape; only those working via a population shift can (Tsai and Nussinov, 2014). Accordingly, the nature of the drugs should be different. The nonfunctional states of Ras can be targeted; however, for kinases, shifting the ensemble away from the constitutively active state, by for example stabilizing the inactive autoinhibited state, is challenging. Imatinib (STI-571/Gleevec), the first synthetic kinase inhibitor to target an oncogene (Bcr-Abl), can serve as a classical example to illustrate our point (Nagar et al., 2003). The physiolog- ical state of Abl is autoinhibited via intradomain interactions be- tween the SH3-linker-SH2 and the KD. The fused Bcr abolishes the autoinhibition to constitutively activate it. ALLOSTERIC MUTATIONS IN RAS AND KINASES WORK DIFFERENTLY; THUS, THEIR INHIBITION STRATEGIES SHOULD DIFFER TOO The landmark crys- tal structure of the KD described by Kuriyan and colleagues with imatinib bound at the ATP-binding site reveals a collapsed acti- vation loop blocking substrate binding, which is open and extended in all active KDs. This binding indicates that imatinib only can bind to the less populated, inactive kinase conformation of Bcr-Abl. The drug-resistant mutations observed by Daley and colleagues (Azam et al., 2003) either directly participate in imati- nib binding or act allosterically to destabilize the autoinhibited Abl kinase conformation to which STI-571 preferentially binds. That is, they reduce drug-binding affinity or increase the popula- tion of the active state by destabilizing the inactive conformation, counteracting the inhibiting action of imatinib. However, as the inhibition of Raf (homo- or hetero-) dimeriza- tion shows, the location of the drug binding matters: if the drug is bound at the dimer interface to prevent activation via dimeriza- tion, it is a successful inhibitor bound to an inactive kinase conformation. ALLOSTERIC MUTATIONS IN RAS AND KINASES WORK DIFFERENTLY; THUS, THEIR INHIBITION STRATEGIES SHOULD DIFFER TOO In another example, in PI3Ka lipid kinase (Zhang et al., 2019a) oncogenic mutations E542K and E545K in the helical domain, with charge reversal (Leontiadou et al., 2018), mimic through a rotation and shift movement, with a salt bridge be- tween the b3-Lys and the aC-Glu, and R-spine formation (Nussi- nov and Tsai, 2013). The triggers for the conformational change vary among the kinase families. Oncogenic mutations stabilize the active aC-helix-in conformation or disrupt interactions that stabilize the aC-helix-out, as in the case of the L858R in EGFR. There, the mutation stabilizes the aC-helix-in conformation by heterodimerization. The mutation is in the middle of a hydropho- bic core. Thus, the change to Arg also disrupts stabilizing hydro- phobic interactions in the aC-helix-out conformation. The T790M mutation in EGFR, T315I in Bcr-Abl, T334I in c-Abl, T341I in Src, T670I in Kit, and T674I in PDGFRa (platelet-derived growth factor receptor A) work by stabilizing the hydrophobic R-spine, pro- moting enzymatically active conformation (Nussinov and Tsai, 2013). In another example, in PI3Ka lipid kinase (Zhang et al., 2019a) oncogenic mutations E542K and E545K in the helical domain, with charge reversal (Leontiadou et al., 2018), mimic Cell Chemical Biology 28, February 18, 2021 123 ll OPEN ACCESS Perspective massive community efforts to identify effective inhibitors have proved to be challenging (Cox et al., 2014; Ledford, 2015; Lu et al., 2016c; Milroy and Ottmann, 2014; Samatar and Poulika- kos, 2014; Shao et al., 2014; Spiegel et al., 2014; Stites and Rav- ichandran, 2009; Wang et al., 2013; Zimmermann et al., 2013). There are many reasons for the difficulty, including Ras’s picomolar affinity for guanine nucleotide whose cellular concen- tration is in the millimolar range, making binding of nucleotide an- alogs disfavored (Khan et al., 2020a; Waters and Der, 2018). In addition, despite searches, deep pockets for small-molecule binding have not been identified (Spiegel et al., 2014). ALLOSTERIC MUTATIONS IN RAS AND KINASES WORK DIFFERENTLY; THUS, THEIR INHIBITION STRATEGIES SHOULD DIFFER TOO The diverse strategies of potential Ras inhibitors have been reviewed extensively in the literature (Chatani and Yang, 2020; Cox et al., 2014, 2015; Dang et al., 2017; Gentile et al., 2017; Gorfe and Cho, 2019; Gupta et al., 2019; Khan et al., 2020a; Liu et al., 2010, 2019; Lu et al., 2016a, 2016c; Mattingly, 2013; McCor- mick, 2018; Mullard, 2019; O’Bryan, 2019; Papke and Der, 2017; Papke et al., 2016; Patricelli et al., 2016; Sakamoto et al., 2017; Sheridan, 2020; Singh et al., 2015; Spencer-Smith and O’Bryan, 2019; Spiegel et al., 2014; Zhang and Shokat, 2019; Zimmermann et al., 2013). Among those that have been explored are agents blocking Ras dimerization (e.g., NS1 and K13) (Spencer-Smith et al., 2017) and inhibition of farnesyl trans- ferase (FTase), thus blocking cysteine farnesylation at the C ter- minus, translocation from the ER to the plasma membrane, and anchorage (e.g., tipifarnib, deltasonamide) (Baranyi et al., 2020; Cheng et al., 2020; Martin-Gago et al., 2017; Reid and Beese, 2004). Blocking Ras-GEF interaction (e.g., DCAI, HBS3) (Maurer et al., 2012; Patgiri et al., 2011), and Ras-Raf (e.g., Abd-7, com- pound 3344) (Bery et al., 2018; Quevedo et al., 2018) (Figure 2) have also been explored. In another strategy, an unbiased approach using synthetic single-domain monobodies (Spencer-Smith et al., 2017) was employed. An NS1 monobody for Ras isoforms selectively inhibited oncogenic H-Ras and K- Ras, but not N-Ras, proliferation (Khan et al., 2020a). Additional strategies for preventing Ras-plasma membrane anchorage include enhancing K-Ras phosphorylation, inhibiting K-Ras interaction with its chaperone protein, and more (Cheng et al., 2020; Gorfe and Cho, 2019). With the aim of identifying function- ally productive states with the effector interacting surface exposed, Ras orientation at the membrane has also been considered (Cao et al., 2019; Chavan et al., 2015; Jang et al., 2016a, 2020; Neale and Garcia, 2020; Nussinov et al., 2018a; Prakash and Gorfe, 2019; Prakash et al., 2020). These ap- proaches are hindered, however, by membrane dynamics and fluidity, toxicity, specificity, and thus altogether effectiveness. SML-8-73-1 (Hunter et al., 2014; Lim et al., 2014; Xiong et al., 2017) and SML-10-70-1 (Lim et al., 2014) are covalent small- molecule inhibitors binding at the active site of oncogenic G12C K-Ras mutant. Direct approaches of targeting Ras appear more promising but still face hurdles. 124 Cell Chemical Biology 28, February 18, 2021 ALLOSTERIC DRUGS TARGETING NONFUNCTIONAL RAS The pocket it binds differs from that of covalent K-RasG12C inhibitors, which bind to the SII-P pocket in the Switch II region and is present in both the active (GTP- bound) and inactive (GDP-bound) forms of Ras proteins. It mod- ulates MAPK signaling (pERK phosphorylation) and PI3K/AKT (pAKT) and inhibits KRAS mutant cell proliferation, suggesting that this pocket can be druggable. Tran et al. (2020) proposed an alternative interpretation to the observation by Kessler et al. (2019) of BI-2852 inhibition at nano- molar affinity. Their analysis of the crystal structure of K-Ras4B with BI-2852, which included the neighboring unit cell, observed that BI-2852 induces a K-Ras4B dimer consisting of four mole- cules (two of BI-2852 and two of K-Ras4B) with rotational sym- metry (Figure 3, right panel). This was confirmed experimentally by size-exclusion column chromatography at a concentration 1,000 times higher (3 mM) than those in which the cellular effects of BI-2852 were observed (Kessler et al., 2020), mass spectrom- etry, measurement of binding affinity (isothermal titration calo- rimetry), and surface plasmon resonance. Analysis of the crystal structure (PDB: 6GJ8) indicated that the pocket is formed by two K-Ras4B molecules where one copy of BI-2852 binds, suggest- ing an asymmetry, with one K-Ras4B presenting a larger pocket (Switch I/II pocket) and the other a smaller one. The second BI- 2852 indicates symmetric formation. The complex is stabilized by four salt bridges altogether, pointing to the discovery by Kess- ler et al. (2019) of formation of a nonfunctional dimer stabilized by two molecules of BI-2852. The covalent attachment first designed by Shokat and col- leagues involved disulfide tethering to the Cys, exploiting the Cys thiol reactivity (Ostrem et al., 2013). Exploiting this method, they obtained compounds that bound in an unknown pocket in the Switch II region near the nucleotide binding pocket (SW2 binding pocket). The pocket exists in the GDP-bound but not in the GTP-bound conformation; thus, these compounds bound only the GDP-bound state. Their binding resulted in conforma- tional changes in the Switch I and Switch II regions, inhibiting in- teractions with Ras effectors and activators. The impact of this work resulted from its significant and novel components: it was the first to exploit covalent allosteric drug on Ras and it exploited its inactive state. It provided hope that this concept can finally produce the highly coveted drug against a mutant Ras. ALLOSTERIC DRUGS TARGETING NONFUNCTIONAL RAS Using a fragment-based screening approach, Shokat and co- workers pioneered the first compounds that covalently link to the cysteine in GDP-bound K-RasG12C, blocking SOS-catalyzed nucleotide exchange (Ostrem et al., 2013). Their initial leads had only millimolar affinity, although subsequent work by several groups led to other high-affinity drugs with some undergoing clinical trials (Sheridan, 2020). Among the more potent com- pounds are AMG510 (Sotorasib) by Amgen (phase I trial), MRTX849 (phase I/II) (Canon et al., 2019; Hallin et al., 2020; Mir- ati Therapeutics, 2020), JNJ-74699157 (formerly ARS-3248) (phase I, Johnson & Johnson, Wellspring Biosciences; earlier ARS-1620 [Janes et al., 2018]), and LY3499446 (phase I/II clinical trials, Eli Lilly). Illustrating the hardships in developing a drug against K-Ras, Eli Lilly exited the K-Ras race due to toxicity in its phase I effort, and Johnson & Johnson stopped recruiting (Adams, 2020). Initial results in patients with K-RasG12C mutation indicated that MRTX849 is a promising clinical candidate (Fell et al., 2020; Gabizon and London, 2020). Both AMG510 and MRTX seem to be moving at equal pace in the clinic. Phase I data for AMG510 in advanced colorectal cancer suggested that monotherapy provided prolonged disease control. Anti- tumor activity was also observed across multiple solid tumors (Hong et al., 2020). A phase II monotherapy study in advanced colorectal cancer is getting under way. A targeted degradation strategy for oncogenic K-RasG12C by construction of a library of C12-directed covalent degrader molecules (PROTACs) was also explored; however, initially the lead degrader was unable to effectively polyubiquitinate cellular K-RasG12C (Zeng et al., 2020). More recently, LC-2, a PROTAC capable of degrading endogenous K-RasG12C via E3 ligase VHL, was developed. It too covalently binds K-RasG12C with an MRTX849 warhead, re- sulting in MAPK suppression (Bond et al., 2020). These allosteric compounds bind to nonfunctional K-RasG12C. Kessler et al. (2019) have targeted a pocket in K-Ras4B previ- ously considered ‘‘undruggable’’ due to its comparative shallow- ness and polarity, rather than hydrophobic, between Switch I and Switch II (SI/II pocket) (Cruz-Migoni et al., 2019; Maurer et al., 2012; Quevedo et al., 2018; Sun et al., 2012). Starting from very weakly binding fragments and structure-based drug design, they discovered BI-2852 (compound 1) (Figure 3, upper left panel), a nanomolar inhibitor to this pocket distinct from co- valent K-RasG12C inhibitors. APPROACHES TO RAS INHIBITION Driver mutations in K-Ras are common in cancers (Chen et al., 2015; Eser et al., 2014; Holderfield et al., 2014; Krens et al., 2010; Prior et al., 2012; Stephen et al., 2014); however, the Allosteric compounds that target inactive monomers and di- mers may hold the key for future successes. Nonetheless, 124 Cell Chemical Biology 28, February 18, 2021 ll OPEN ACCESS Perspective targeting dimers may also face additional hurdles: spatially prox- imal Ras nanoclusters can play a major role in MAPK activation; however, PI3K activation does not require Ras dimers, so its activation can still go through (Nussinov et al., 2018a, 2019b). Raf and, consequently, MAPK signaling. It resulted in several lead compounds by pharmaceutical companies with subse- quent clinical trials as described above. Covalent drugs, especially allosteric ones, are powerful. How- ever, to date their applicability has been limited to few cancers, particularly small cell lung cancer where the G12C mutation is abundant (Gorfe and Cho, 2019; Stephen et al., 2014). The ac- count and promise shown by the impressive optimization of MRTX849 (Figure 2) that targets K-RasG12C emphasizes, however, the challenges in the development of covalent drugs in structure-based design to improve drug potency and pharma- cological properties, reaching nanomolar potency and selectivity in vivo (Fell et al., 2020; Gabizon and London, 2020). ALLOSTERIC DRUGS TARGETING NONFUNCTIONAL RAS ALLOSTERIC DRUGS TARGETING NONFUNCTIONAL RAS Further- more, it showed that a drug that interacts with the inactive Ras state can work (Khan et al., 2020a). Continued efforts led to ARS-1620 (Janes et al., 2018) (Figure 2), with higher reaction ki- netics and more potent drug action, inhibiting interaction with To further explore stabilization of nonfunctional K-Ras4B di- mers for KRAS-driven cancers, Kessler et al. (2020) synthesized other possible dimeric Switch I/II-pocket binders. They discov- ered compound 2, which dimerizes K-Ras4B with a KD of 3.8 mM. Soaking active K-Ras4BG12D (Bergner et al., 2019), they obtained K-Ras4B crystal structures of dimers with this compound at 1.9-A˚ resolution. Subsequent co-crystallization with compound 2 obtained a dimeric structure (at 1.57-A˚ resolution), a similar b-sandwich interface as with BI-2852, that resembles the one previously postulated by modeling and MD simulations of K-Ras4B molecules (Jang et al., 2016b). The Cell Chemical Biology 28, February 18, 2021 125 ll OPEN ACCESS ll OPEN ACCESS Perspective Figure 2. Examples of Ras Inhibitors The first row shows crystal structures of the GDP-bound H-Ras in complex with NS1 monobody (PDB: 5E95), farnesyltransferase (FTase) containing the a and b subunits in complex with farnesyl diphosphate (FPP) and the inhibitor tipifarnib (R115777) (PDB: 1SA4), and phosphodiesterase d subunit (PDEd) inhibited by deltasonamide (PDB: 5ML3). Covalent drugs to the G12C mutation are shown in the second row; crystal structures of the GDP-bound K-Ras4BG12C with MRTX849 (PDB: 6UT0), the GDP-bound K-Ras4BG12C with ARS-1620 (PDB: 5V9U), and K-Ras4BG12C with the covalent GTP-competitive inhibitor SML-8-73-1 (PDB: 5KYK). The third row shows crystal structures of active Ras inhibited by noncovalent, small molecular drugs for the GCP-bound K-Ras4BG12D with DCAI (PDB: 4DST), the GNP-bound K-Ras4BQ61H with Abd-7 (PDB: 6FA4), and the GNP-bound K-Ras4BQ61H with 3344 (Abd-8) (PDB: 6F76). Figure 2. Examples of Ras Inhibitors The first row shows crystal structures of the GDP-bound H-Ras in complex with NS1 monobody (PDB: 5E95), farnesyltransferase (FTase) containing the a and b subunits in complex with farnesyl diphosphate (FPP) and the inhibitor tipifarnib (R115777) (PDB: 1SA4), and phosphodiesterase d subunit (PDEd) inhibited by deltasonamide (PDB: 5ML3). Covalent drugs to the G12C mutation are shown in the second row; crystal structures of the GDP-bound K-Ras4BG12C with MRTX849 (PDB: 6UT0), the GDP-bound K-Ras4BG12C with ARS-1620 (PDB: 5V9U), and K-Ras4BG12C with the covalent GTP-competitive inhibitor SML-8-73-1 (PDB: 5KYK). 126 Cell Chemical Biology 28, February 18, 2021 ALLOSTERIC DRUGS TARGETING NONFUNCTIONAL RAS Ras Inhibitor with Nanomolar Affinity Figure 3. Ras Inhibitor with Nanomolar Affinity Crystal structure of the GCP-bound K-Ras4BG12D with BI-2852 (PDB: 6GJ8) (upper left panel). The compound 1 drug, BI-2852, exhibits nanomolar affinity to a pocket between Switch I and Switch II. The BI-2852-induced Ras dimerization (right panel). Symmetric rotation of the K-Ras4B crystal structure reveals a b-sandwich dimer aligning its b1, b2, and b3 strands by two BI-2852 molecules. The first BI-2852 (ligand-1) binds the Switch I and II pocket, the deep pocket formed by Lys5, Val7, Asp54, and Leu56 on the first Ras (Ras-1). The second BI-2852 (ligand-2), a copy of the first, binds the shallow pocket formed by Glu3, Leu52, and Asp54 on Ras-1. The complex is stabilized by several salt bridges. The molecular dynamics (MD) simulations of Ras molecules at the anionic membrane (Jang et al., 2016b) previously reported the nonfunctional b-sandwich dimer for K-Ras4B-GTP and H-Ras-GTP (lower left panel). Small molecules have also been developed to inhibit Ral GTPases, which are Ras GTPases identical in structure to K- Ras. The innovative strategy employed there similarly proposed to target GDP- rather than GTP-bound Ral, exploiting a new pocket (Yan et al., 2014). This pocket, which was not targeted before, harbors the K-RasG12C mutation. This work also led to a follow-up discovery in Meroueh’s lab of a covalent inhibitor that forms a bond with a tyrosine on Ral and Ras GTPases (Bum-Erdene et al., 2020), raising the possibility that covalent tyrosine linkage can open another venue in targeting of the Ras superfamily. Allosteric drugs are highly specific with fewer side effects and can tune the inhibition. Nonetheless, they still need to stably bind the protein, requiring some pockets. Covalent drugs also require a sufficiently reactive warhead, though not too reactive so as to avoid toxicity. The pocket should permit specific interactions that allow such reduction in warhead strength. Finally, K-RasG12C inhibitors target a somatic cysteine muta- tion. Since all cells are targeted, concerns about their likely toxicity persist (Sheridan, 2020). Selectivity against the wild type (therapeutic index) also depends upon the oncogene spec- ificity in addition to the selectivity. Drugging small GTPase Rheb is similarly challenging. Rheb activates the mechanistic target of rapamycin complex 1 (mTORC1), a master regulator of cellular growth and metabolism in the Ras/PI3K/AKT/mTOR pathway. ALLOSTERIC DRUGS TARGETING NONFUNCTIONAL RAS Small molecule NR1 binds Rheb in the Switch II domain and selectively blocks mTORC1 signaling, but not mTORC2 (Mahoney et al., 2018). ALLOSTERIC DRUGS TARGETING NONFUNCTIONAL RAS The third row shows crystal structures of active Ras inhibited by noncovalent, small molecular drugs for the GCP-bound K-Ras4BG12D with DCAI (PDB: 4DST), the GNP-bound K-Ras4BQ61H with Abd-7 (PDB: 6FA4), and the GNP-bound K-Ras4BQ61H with 3344 (Abd-8) (PDB: 6F76). modeled structure dimerizes through the effector lobe b-sand- wich interface involving side-chain interactions of b1, b2, and b3 strands (Jang et al., 2016b) (Figure 3, lower left panel). The b-sandwich interface emerged from the exact b-sheet alignment due to hydrogen bond (H-bond) mismatch be- tween the b2 strands. Especially noteworthy is that this dimeric interface was a minor dimeric form in the simulations, that is, with a smaller population, suggesting that compound 2 selects a minor species and stabilizes it. state. Interestingly, the inactive K-Ras4B dimer that dimerizes through the effector lobe interface favors a shifted b-sheet extension through intermolecular H-bonds between the b2 strands formed by Glu37, Ser39, and Arg41 (Jang et al., 2016b). However, Raf easily competes with Ras molecules assembled through the effector lobe dimer interface due to the high-affinity interaction of RBD with the Ras effector binding site. The active K-Ras4B dimer, where the monomers interact through their allosteric lobes, favors an interaction through the a3-a4 helices, while H-Ras allosteric lobe dimerization favors the a4-a5 helical interface (Jang et al., 2016b, 2020). Thus, whether monomers or dimers, allosteric interaction with a nonfunctional state will shift the ensemble away from the active 126 Cell Chemical Biology 28, February 18, 2021 ll OPEN ACCESS Perspective Perspective Figure 3. Ras Inhibitor with Nanomolar Affinity Crystal structure of the GCP-bound K-Ras4BG12D with BI-2852 (PDB: 6GJ8) (upper left panel). The compound 1 drug, BI-2852, exhibits nanomolar affinity to a pocket between Switch I and Switch II. The BI-2852-induced Ras dimerization (right panel). Symmetric rotation of the K-Ras4B crystal structure reveals a b-sandwich dimer aligning its b1, b2, and b3 strands by two BI-2852 molecules. The first BI-2852 (ligand-1) binds the Switch I and II pocket, the deep pocket formed by Lys5, Val7, Asp54, and Leu56 on the first Ras (Ras-1). The second BI-2852 (ligand-2), a copy of the first, binds the shallow pocket formed by Glu3, Leu52, and Asp54 on Ras-1. The complex is stabilized by several salt bridges. The molecular dynamics (MD) simulations of Ras molecules at the anionic membrane (Jang et al., 2016b) previously reported the nonfunctional b-sandwich dimer for K-Ras4B-GTP and H-Ras-GTP (lower left panel). Perspective Figure 3. Cell Chemical Biology 28, February 18, 2021 127 SIGNIFICANCE The mechanism of action of many drugs is known. Prior knowledge in the development stage of the mechanism of action—at the molecular level—of effective drugs for the Cell Chemical Biology 28, February 18, 2021 127 ll OPEN ACCESS Perspective targeted protein is enormously advantageous and reduces late-stage failures. Here we interrogate distinct mecha- nisms embodied by allosteric drugs for two classes of major drug targets: Ras superfamily and kinases. Among the emerging allosteric strategies for Ras is targeting its nonfunctional state—which differs from the allosteric drug strategies for kinases. In kinases, allosteric drugs mostly target the active, functional state. We ask why drugging the inactive K-Ras4BG12C can work but drugging the inactive kinase will likely not work. We propose that the reason is their distinct oncogenic mechanisms. In kinases, the mech- anism of oncogenic kinase mutations involves increasing the population of the active conformations as compared with the inactive conformations. By contrast, Ras oncogenic mutations work by quenching the deactivation mechanisms, GTP hydrolysis, and nucleotide exchange. Thus, covalent allosteric inhibitors that bind to the inactive GDP-bound K- Ras4BG12C conformation can work—which is not the case in kinases, whose allosteric inhibitors work by altering the active-site conformation. Arora, K., and Brooks, C.L., 3rd. (2007). Large-scale allosteric conformational transitions of adenylate kinase appear to involve a population-shift mecha- nism. Proc. Natl. Acad. Sci. U S A 104, 18496–18501. Arora, K., and Brooks, C.L., 3rd. (2007). Large-scale allosteric conformational transitions of adenylate kinase appear to involve a population-shift mecha- nism. Proc. Natl. Acad. Sci. U S A 104, 18496–18501. Azam, M., Latek, R.R., and Daley, G.Q. (2003). Mechanisms of autoinhibition and STI-571/imatinib resistance revealed by mutagenesis of BCR-ABL. Cell 112, 831–843. Baietti, M.F., Simicek, M., Abbasi Asbagh, L., Radaelli, E., Lievens, S., Crowther, J., Steklov, M., Aushev, V.N., Martinez Garcia, D., Tavernier, J., et al. (2016). OTUB1 triggers lung cancer development by inhibiting RAS monoubiquitination. EMBO Mol. Med. 8, 288–303. Bandaru, P., Kondo, Y., and Kuriyan, J. (2019). The interdependent activation of son-of-sevenless and ras. Cold Spring Harb. Perspect. Med. 9, a031534. Baranyi, M., Buday, L., and Hegedus, B. (2020). K-Ras prenylation as a poten- tial anticancer target. Cancer Metastasis Rev. 39, 1127–1141. Barklis, E., Stephen, A.G., Staubus, A.O., Barklis, R.L., and Alfadhli, A. (2019). Organization of farnesylated, carboxymethylated KRAS4B on membranes. J. Mol. Biol. 431, 3706–3717. SIGNIFICANCE Bergner, A., Cockcroft, X., Fischer, G., Gollner, A., Hela, W., Kousek, R., Man- toulidis, A., Martin, L.J., Mayer, M., Mullauer, B., et al. (2019). KRAS binders hidden in nature. Chemistry 25, 12037–12041. Bery, N., Cruz-Migoni, A., Bataille, C.J., Quevedo, C.E., Tulmin, H., Miller, A., Russell, A., Phillips, S.E., Carr, S.B., and Rabbitts, T.H. (2018). BRET-based RAS biosensors that show a novel small molecule is an inhibitor of RAS- effector protein-protein interactions. eLife 7, e37122. Drug discovery-wise the significance of our premise here is 3-fold: (1) it postulates that the mechanism of drug action relates to the mechanism of the oncogenic driver mutations; not to whether the protein is in the active or inactive state. (2) However, if drug binding allosterically blocks the target functional site, as in the case of Raf dimerization, it will work also for the inactive kinase states, and the GTP-bound Ras. That is, the location of the drug-binding site matters. (3) From the translational standpoint, this mechanism of action classification accelerates pharmaceutical development. It postulates that drug action is related to blocking the mech- anism of activation—not to the active or inactive state, ex- tending drug classification charts. Boehr, D.D., Nussinov, R., and Wright, P.E. (2009). The role of dynamic confor- mational ensembles in biomolecular recognition. Nat. Chem. Biol. 5, 789–796. Bond, M.J., Chu, L., Nalawansha, D.A., Li, K., and Crews, C.M. (2020). Tar- geted degradation of oncogenic KRAS(G12C) by VHL-recruiting PROTACs. ACS Cent. Sci. 6, 1367–1375. Bourne, H.R., Sanders, D.A., and McCormick, F. (1991). The GTPase super- family: conserved structure and molecular mechanism. Nature 349, 117–127. Bryant, K.L., Mancias, J.D., Kimmelman, A.C., and Der, C.J. (2014). KRAS: feeding pancreatic cancer proliferation. Trends Biochem. Sci. 39, 91–100. Bum-Erdene, K., Liu, D., Gonzalez-Gutierrez, G., Ghozayel, M.K., Xu, D., and Meroueh, S.O. (2020). Small-molecule covalent bond formation at tyrosine creates a binding site and inhibits activation of Ral GTPases. Proc. Natl. Acad. Sci. U S A 117, 7131–7139. ACKNOWLEDGMENTS This project has been funded in whole or in part with federal funds from the Na- tional Cancer Institute, National Institutes of Health, under contract HHSN261200800001E. The content of this publication does not necessarily reflect the views or policies of the Department of Health and Human Services, nor does mention of trade names, commercial products or organizations imply endorsement by the US Government. This Research was supported (in part) by the Intramural Research Program of the NIH, National Cancer Institute, Center for Cancer Research, and the Intramural Research Program of the NIH Clinical Center. Canon, J., Rex, K., Saiki, A.Y., Mohr, C., Cooke, K., Bagal, D., Gaida, K., Holt, T., Knutson, C.G., Koppada, N., et al. (2019). The clinical KRAS(G12C) inhibitor AMG 510 drives anti-tumour immunity. Nature 575, 217–223. Cao, S., Chung, S., Kim, S., Li, Z., Manor, D., and Buck, M. (2019). K-Ras G- domain binding with signaling lipid phosphatidylinositol (4,5)-phosphate (PIP2): membrane association, protein orientation, and function. J. Biol. Chem. 294, 7068–7084. Chatani, P.D., and Yang, J.C. (2020). Mutated RAS: targeting the "untarget- able" with T cells. Clin. Cancer Res. 26, 537–544. AUTHOR CONTRIBUTIONS Chavan, T.S., Muratcioglu, S., Marszalek, R., Jang, H., Keskin, O., Gursoy, A., Nussinov, R., and Gaponenko, V. (2015). Plasma membrane regulates Ras signaling networks. Cell. Logist. 5, e1136374. R.N. and H.J. designed research. R.N. performed research and prepared the initial draft. H.J. generated the figures. R.N. and H.J. wrote and edited the pa- per. R.N., H.J., A.G., O.K., and V.G. have given approval to the final version of the manuscript. Chen, L., Tao, Y., and Jiang, Y. (2015). Apelin activates the expression of in- flammatory cytokines in microglial BV2 cells via PI-3K/Akt and MEK/Erk path- ways. Sci. China Life Sci. 58, 531–540. Perspective (1990). The ras superfamily of small GTP-binding proteins. Trends Biochem. Sci. 15, 469–472. Hallin, J., Engstrom, L.D., Hargis, L., Calinisan, A., Aranda, R., Briere, D.M., Sudhakar, N., Bowcut, V., Baer, B.R., Ballard, J.A., et al. (2020). The KRAS(G12C) inhibitor MRTX849 provides insight toward therapeutic suscep- tibility of KRAS-mutant cancers in mouse models and patients. Cancer Discov. 10, 54–71. Downward, J. (2008). Targeting RAS and PI3K in lung cancer. Nat. Med. 14, 1315–1316. Drosten, M., Dhawahir, A., Sum, E.Y., Urosevic, J., Lechuga, C.G., Esteban, L.M., Castellano, E., Guerra, C., Santos, E., and Barbacid, M. (2010). Genetic analysis of Ras signalling pathways in cell proliferation, migration and survival. EMBO J. 29, 1091–1104. Henley, M.J., Linhares, B.M., Morgan, B.S., Cierpicki, T., Fierke, C.A., and Mapp, A.K. (2020). Unexpected specificity within dynamic transcriptional pro- tein-protein complexes. Proc. Natl. Acad. Sci. U S A 117, 27346–27353. Eser, S., Schnieke, A., Schneider, G., and Saur, D. (2014). Oncogenic KRAS signalling in pancreatic cancer. Br. J. Cancer 111, 817–822. Holderfield, M., Deuker, M.M., McCormick, F., and McMahon, M. (2014). Tar- geting RAF kinases for cancer therapy: BRAF-mutated melanoma and beyond. Nat. Rev. Cancer 14, 455–467. Fang, Z., Lee, K.Y., Huo, K.G., Gasmi-Seabrook, G., Zheng, L., Moghal, N., Tsao, M.S., Ikura, M., and Marshall, C.B. (2020). Multivalent assembly of KRAS with the RAS-binding and cysteine-rich domains of CRAF on the mem- brane. Proc. Natl. Acad. Sci. U S A 117, 12101–12108. Hong, D.S., Fakih, M.G., Strickler, J.H., Desai, J., Durm, G.A., Shapiro, G.I., Falchook, G.S., Price, T.J., Sacher, A., Denlinger, C.S., et al. (2020). KRAS(G12C) inhibition with sotorasib in advanced solid tumors. N. Engl. J. Med. 383, 1207–1217. Fell, J.B., Fischer, J.P., Baer, B.R., Blake, J.F., Bouhana, K., Briere, D.M., Brown, K.D., Burgess, L.E., Burns, A.C., Burkard, M.R., et al. (2020). Identifica- tion of the clinical development candidate MRTX849, a covalent KRAS(G12C) inhibitor for the treatment of cancer. J. Med. Chem. 63, 6679–6693. Hosford, S.R., Dillon, L.M., Bouley, S.J., Rosati, R., Yang, W., Chen, V.S., Demidenko, E., Morra, R.P., Jr., and Miller, T.W. (2017). Combined inhibition of both p110alpha and p110beta isoforms of phosphatidylinositol 3-kinase is required for sustained therapeutic effect in PTEN-deficient, ER(+) breast can- cer. Clin. Cancer Res. 23, 2795–2805. Fernandez-Medarde, A., and Santos, E. (2011). Ras in cancer and develop- mental diseases. Genes Cancer 2, 344–358. Frauenfelder, H., Sligar, S.G., and Wolynes, P.G. (1991). The energy land- scapes and motions of proteins. Science 254, 1598–1603. Perspective Perspective Goody, R.S., Muller, M.P., and Rauh, D. (2019). Mutant-specific targeting of ras G12C activity by covalently reacting small molecules. Cell Chem. Biol. 26, 1338–1348. Cox, A.D., and Der, C.J. (2010). Ras history: the saga continues. Small GTPases 1, 2–27. Cox, A.D., Der, C.J., and Philips, M.R. (2015). Targeting RAS membrane asso- ciation: back to the future for anti-RAS drug discovery? Clin. Cancer Res. 21, 1819–1827. Gorfe, A.A., and Cho, K.J. (2019). Approaches to inhibiting oncogenic K-Ras. Small GTPases, 1–10. Grand, R.J., and Owen, D. (1991). The biochemistry of ras p21. Biochem. J. 279, 609–631. Cox, A.D., Fesik, S.W., Kimmelman, A.C., Luo, J., and Der, C.J. (2014). Drug- ging the undruggable RAS: mission possible? Nat. Rev. Drug Discov. 13, 828–851. Gross, L.Z.F., Sacerdoti, M., Piiper, A., Zeuzem, S., Leroux, A.E., and Biondi, R.M. (2020). ACE2, the receptor that enables infection by SARS-CoV-2: biochemistry, structure, allostery and evaluation of the potential development of ACE2 modulators. ChemMedChem 15, 1682–1690. Crespo, P., and Leon, J. (2000). Ras proteins in the control of the cell cycle and cell differentiation. Cell Mol Life Sci 57, 1613–1636. Cruz-Migoni, A., Canning, P., Quevedo, C.E., Bataille, C.J.R., Bery, N., Miller, A., Russell, A.J., Phillips, S.E.V., Carr, S.B., and Rabbitts, T.H. (2019). Struc- ture-based development of new RAS-effector inhibitors from a combination of active and inactive RAS-binding compounds. Proc. Natl. Acad. Sci. U S A 116, 2545–2550. Guarnera, E., and Berezovsky, I.N. (2019). Toward comprehensive allosteric control over protein activity. Structure 27, 866–878 e861. Guarnera, E., and Berezovsky, I.N. (2020). Allosteric drugs and mutations: chances, challenges, and necessity. Curr. Opin. Struct. Biol. 62, 149–157. Dang, C.V., Reddy, E.P., Shokat, K.M., and Soucek, L. (2017). Drugging the ‘undruggable’ cancer targets. Nat. Rev. Cancer 17, 502–508. Gul, A., Leyland-Jones, B., Dey, N., and De, P. (2018). A combination of the PI3K pathway inhibitor plus cell cycle pathway inhibitor to combat endocrine resistance in hormone receptor-positive breast cancer: a genomic algo- rithm-based treatment approach. Am. J. Cancer Res. 8, 2359–2376. De Luca, A., Maiello, M.R., D’Alessio, A., Pergameno, M., and Normanno, N. (2012). The RAS/RAF/MEK/ERK and the PI3K/AKT signalling pathways: role in cancer pathogenesis and implications for therapeutic approaches. Expert Opin. Ther. Targets 16, S17–S27. Gupta, A.K., Wang, X., Pagba, C.V., Prakash, P., Sarkar-Banerjee, S., Putkey, J., and Gorfe, A.A. (2019). Multi-target, ensemble-based virtual screening yields novel allosteric KRAS inhibitors at high success rate. Chem. Biol. Drug Des. 94, 1441–1456. Downward, J. REFERENCES Cheng, J., Li, Y., Wang, X., Dong, G., and Sheng, C. (2020). Discovery of novel PDEd degraders for the treatment of KRAS mutant colorectal cancer. J. Med. Chem. 63, 7892–7905. Adams, B. (2020). Eli Lilly crashes out of KRAS race as toxicity sees it ditch phase 1 effort. https://www.fiercebiotech.com/biotech/eli-lilly-crashes-out- kras-race-as-it-ditches-phase-1-effort. Adams, B. (2020). Eli Lilly crashes out of KRAS race as toxicity sees it ditch phase 1 effort. https://www.fiercebiotech.com/biotech/eli-lilly-crashes-out- kras-race-as-it-ditches-phase-1-effort. Cherfils, J., and Zeghouf, M. (2013). Regulation of small GTPases by GEFs, GAPs, and GDIs. Physiol. Rev. 93, 269–309. Adjei, A.A. (2001). Blocking oncogenic Ras signaling for cancer therapy. J. Natl. Cancer Inst. 93, 1062–1074. Adjei, A.A. (2001). Blocking oncogenic Ras signaling for cancer therapy. J. Natl. Cancer Inst. 93, 1062–1074. Cocco, E., Lee, J.E., Kannan, S., Schram, A.M., Won, H.H., Shifman, S., Kulick, A., Baldino, L., Toska, E., Arruabarrena-Aristorena, A., et al. (2020). TRK xDFG mutations trigger a sensitivity switch from type I to II kinase inhibitors. Cancer Discov. https://doi.org/10.1158/2159-8290.CD-1120-0571. Ahearn, I.M., Haigis, K., Bar-Sagi, D., and Philips, M.R. (2011). Regulating the regulator: post-translational modification of RAS. Nat. Rev. Mol. Cell. Biol. 13, 39–51. Ahearn, I.M., Haigis, K., Bar-Sagi, D., and Philips, M.R. (2011). Regulating the regulator: post-translational modification of RAS. Nat. Rev. Mol. Cell. Biol. 13, 39–51. 128 Cell Chemical Biology 28, February 18, 2021 ll OPEN ACCESS Perspective Huang, W., Wang, G., Shen, Q., Liu, X., Lu, S., Geng, L., Huang, Z., and Zhang, J. (2015). ASBench: benchmarking sets for allosteric discovery. Bioinformatics 31, 2598–2600. Fujiwara, T., Ritchie, K., Murakoshi, H., Jacobson, K., and Kusumi, A. (2002). Phospholipids undergo hop diffusion in compartmentalized cell membrane. J. Cell Biol. 157, 1071–1081. Huang, W.Y.C., Alvarez, S., Kondo, Y., Lee, Y.K., Chung, J.K., Lam, H.Y.M., Biswas, K.H., Kuriyan, J., and Groves, J.T. (2019). A molecular assembly phase transition and kinetic proofreading modulate Ras activation by SOS. Science 363, 1098–1103. Gabizon, R., and London, N. (2020). Hitting KRAS when it’s down. J. Med. Chem. 63, 6677–6678. Hunter, J.C., Gurbani, D., Ficarro, S.B., Carrasco, M.A., Lim, S.M., Choi, H.G., Xie, T., Marto, J.A., Chen, Z., Gray, N.S., et al. (2014). In situ selectivity profiling and crystal structure of SML-8-73-1, an active site inhibitor of oncogenic K- Ras G12C. Proc. Natl. Acad. Sci. U S A 111, 8895–8900. Gao, Y., Zhou, J., Xie, Z., Wang, J., Ho, C.K., Zhang, Y., and Li, Q. (2019). Me- chanical strain promotes skin fibrosis through LRG-1 induction mediated by ELK1 and ERK signalling. Commun. Biol. 2, 359. Gentile, D.R., Rathinaswamy, M.K., Jenkins, M.L., Moss, S.M., Siempelkamp, B.D., Renslo, A.R., Burke, J.E., and Shokat, K.M. (2017). Ras binder induces a modified switch-II pocket in GTP and GDP states. Cell Chem. Biol. 24, 1455– 1466 e1414. Hunter, J.C., Manandhar, A., Carrasco, M.A., Gurbani, D., Gondi, S., and Westover, K.D. (2015). Biochemical and structural analysis of common can- cer-associated KRAS mutations. Mol. Cancer Res. 13, 1325–1335. Ijuin, T. (2019). Phosphoinositide phosphatases in cancer cell dynamics- Beyond PI3K and PTEN. Semin. Cancer Biol. 59, 50–65. Geyer, M., Schweins, T., Herrmann, C., Prisner, T., Wittinghofer, A., and Kal- bitzer, H.R. (1996). Conformational transitions in p21ras and in its complexes with the effector protein Raf-RBD and the GTPase activating protein GAP. Biochemistry 35, 10308–10320. Janes, M.R., Zhang, J., Li, L.S., Hansen, R., Peters, U., Guo, X., Chen, Y., Bab- bar, A., Firdaus, S.J., Darjania, L., et al. (2018). Targeting KRAS mutant cancers with a covalent G12C-specific inhibitor. Cell 172, 578–589 e517. Geyer, M., and Wittinghofer, A. (1997). GEFs, GAPs, GDIs and effectors: taking a closer (3D) look at the regulation of Ras-related GTP-binding proteins. Curr. Opin. Struct. Biol. 7, 786–792. Jang, H., Banerjee, A., Chavan, T., Gaponenko, V., and Nussinov, R. (2017). yield a high-affinity interaction enabling K-Ras4B membrane extraction. J. Biol. Chem. 292, 12544–12559. Leontiadou, H., Galdadas, I., Athanasiou, C., and Cournia, Z. (2018). Insights into the mechanism of the PIK3CA E545K activating mutation using MD simu- lations. Sci. Rep. 8, 15544. Jang, H., Banerjee, A., Chavan, T.S., Lu, S., Zhang, J., Gaponenko, V., and Nussinov, R. (2016a). The higher level of complexity of K-Ras4B activation at the membrane. FASEB J. 30, 1643–1655. Li, S., Jang, H., Zhang, J., and Nussinov, R. (2018a). Raf-1 cysteine-rich domain increases the affinity of K-Ras/Raf at the membrane, promoting MAPK signaling. Structure 26, 513–525 e512. Jang, H., Banerjee, A., Marcus, K., Makowski, L., Mattos, C., Gaponenko, V., and Nussinov, R. (2019). The structural basis of the farnesylated and methyl- ated KRas4B interaction with calmodulin. Structure 27, 1647–1659 e1644. Li, Z.L., Prakash, P., and Buck, M. (2018b). A "tug of war" maintains a dynamic protein-membrane complex: molecular dynamics simulations of C-Raf RBD- CRD bound to K-Ras4B at an anionic membrane. ACS Cent. Sci. 4, 298–305. Jang, H., Muratcioglu, S., Gursoy, A., Keskin, O., and Nussinov, R. (2016b). Membrane-associated Ras dimers are isoform-specific: K-Ras dimers differ from H-Ras dimers. Biochem. J. 473, 1719–1732. Liao, J., Shima, F., Araki, M., Ye, M., Muraoka, S., Sugimoto, T., Kawamura, M., Yamamoto, N., Tamura, A., and Kataoka, T. (2008). Two conformational states of Ras GTPase exhibit differential GTP-binding kinetics. Biochem. Bio- phys. Res. Commun. 369, 327–332. Jang, H., Zhang, M., and Nussinov, R. (2020). The quaternary assembly of KRas4B with Raf-1 at the membrane. Comput. Struct. Biotechnol. J. 18, 737–748. Liao, T.J., Jang, H., Fushman, D., and Nussinov, R. (2018). Allosteric KRas4B can modulate SOS1 fast and slow ras activation cycles. Biophys. J. 115, 629–641. Kar, G., Keskin, O., Gursoy, A., and Nussinov, R. (2010). Allostery and popula- tion shift in drug discovery. Curr. Opin. Pharmacol. 10, 715–722. Liao, T.J., Jang, H., Nussinov, R., and Fushman, D. (2020). High-affinity inter- actions of the nSH3/cSH3 domains of Grb2 with the C-terminal proline-rich domain of SOS1. J. Am. Chem. Soc. 142, 3401–3411. Kessler, D., Gmachl, M., Mantoulidis, A., Martin, L.J., Zoephel, A., Mayer, M., Gollner, A., Covini, D., Fischer, S., Gerstberger, T., et al. (2019). Drugging an undruggable pocket on KRAS. Proc. Natl. Acad. Sci. U S A 116, 15823–15829. Lien, E.C., Dibble, C.C., and Toker, A. (2017). PI3K signaling in cancer: beyond AKT. Curr. Opin. Cell Biol. 45, 62–71. Lu, S., Huang, W., and Zhang, J. (2014a). Recent computational advances in the identification of allosteric sites in proteins. Drug Discov. Today 19, 1595–1600. Lu, S., Jang, H., Gu, S., Zhang, J., and Nussinov, R. (2016a). Drugging Ras GTPase: a comprehensive mechanistic and signaling structural view. Chem. Soc. Rev. 45, 4929–4952. Krengel, U., Schlichting, I., Scherer, A., Schumann, R., Frech, M., John, J., Kabsch, W., Pai, E.F., and Wittinghofer, A. (1990). Three-dimensional struc- tures of H-ras p21 mutants: molecular basis for their inability to function as signal switch molecules. Cell 62, 539–548. Lu, S., Jang, H., Muratcioglu, S., Gursoy, A., Keskin, O., Nussinov, R., and Zhang, J. (2016b). Ras conformational ensembles, allostery, and signaling. Chem. Rev. 116, 6607–6665. Krens, L.L., Baas, J.M., Gelderblom, H., and Guchelaar, H.J. (2010). Therapeu- tic modulation of k-ras signaling in colorectal cancer. Drug Discov. Today 15, 502–516. Lu, S., Jang, H., Zhang, J., and Nussinov, R. (2016c). Inhibitors of ras-SOS in- teractions. ChemMedChem 11, 814–821. Kumar, S., Ma, B., Tsai, C.J., Sinha, N., and Nussinov, R. (2000). Folding and binding cascades: dynamic landscapes and population shifts. Protein Sci. 9, 10–19. Lu, S., Ji, M., Ni, D., and Zhang, J. (2018). Discovery of hidden allosteric sites as novel targets for allosteric drug design. Drug Discov. Today 23, 359–365. Lamontanara, A.J., Georgeon, S., Tria, G., Svergun, D.I., and Hantschel, O. (2014). The SH2 domain of Abl kinases regulates kinase autophosphorylation by controlling activation loop accessibility. Nat. Commun. 5, 5470. Lu, S., Li, S., and Zhang, J. (2014b). Harnessing allostery: a novel approach to drug discovery. Med. Res. Rev. 34, 1242–1285. Lu, S., Qiu, Y., Ni, D., He, X., Pu, J., and Zhang, J. (2020). Emergence of allo- steric drug-resistance mutations: new challenges for allosteric drug discovery. Drug Discov. Today 25, 177–184. Lavoie, H., Thevakumaran, N., Gavory, G., Li, J.J., Padeganeh, A., Guiral, S., Duchaine, J., Mao, D.Y., Bouvier, M., Sicheri, F., et al. (2013). Inhibitors that stabilize a closed RAF kinase domain conformation induce dimerization. Nat. Chem. Biol. 9, 428–436. Ma, B., Kumar, S., Tsai, C.J., Hu, Z., and Nussinov, R. (2000). Transition-state ensemble in enzyme catalysis: possibility, reality, or necessity? J. Theor. Biol. 203, 383–397. Ledford, H. (2015). Cancer: the ras renaissance. Nature 520, 278–280. Lee, Y., Phelps, C., Huang, T., Mostofian, B., Wu, L., Zhang, Y., Tao, K., Chang, Y.H., Stork, P.J., Gray, J.W., et al. (2019). Kessler, D., Gollner, A., Gmachl, M., Mantoulidis, A., Martin, L.J., Zoephel, A., Mayer, M., Covini, D., Fischer, S., Gerstberger, T., et al. (2020). Reply to Tran et al.: dimeric KRAS protein-protein interaction stabilizers. Proc. Natl. Acad. Sci. U S A 117, 3365–3367. Lim, S.M., Westover, K.D., Ficarro, S.B., Harrison, R.A., Choi, H.G., Pacold, M.E., Carrasco, M., Hunter, J., Kim, N.D., Xie, T., et al. (2014). Therapeutic tar- geting of oncogenic K-Ras by a covalent catalytic site inhibitor. Angew. Chem. Int. Ed. Engl. 53, 199–204. Kettle, J.G., Bagal, S.K., Bickerton, S., Bodnarchuk, M.S., Breed, J., Carbajo, R.J., Cassar, D.J., Chakraborty, A., Cosulich, S., Cumming, I., et al. (2020). Structure-based design and pharmacokinetic optimization of covalent allo- steric inhibitors of the mutant GTPase KRAS(G12C). J. Med. Chem. 63, 4468–4483. Liu, M., Sjogren, A.K., Karlsson, C., Ibrahim, M.X., Andersson, K.M., Olofsson, F.J., Wahlstrom, A.M., Dalin, M., Yu, H., Chen, Z., et al. (2010). Targeting the protein prenyltransferases efficiently reduces tumor development in mice with K-RAS-induced lung cancer. Proc. Natl. Acad. Sci. U S A 107, 6471–6476. Khan, I., Rhett, J.M., and O’Bryan, J.P. (2020a). Therapeutic targeting of RAS: new hope for drugging the "undruggable. Biochim. Biophys. Acta Mol. Cell Res. 1867, 118570. Liu, P., Wang, Y., and Li, X. (2019). Targeting the untargetable KRAS in cancer therapy. Acta Pharm. Sin B 9, 871–879. Khan, Z.M., Real, A.M., Marsiglia, W.M., Chow, A., Duffy, M.E., Yerabolu, J.R., Scopton, A.P., and Dar, A.C. (2020b). Structural basis for the action of the drug trametinib at KSR-bound MEK. Nature 588, 509–514. Lou, K., Steri, V., Ge, A.Y., Hwang, Y.C., Yogodzinski, C.H., Shkedi, A.R., Choi, A.L.M., Mitchell, D.C., Swaney, D.L., Hann, B., et al. (2019). KRAS(G12C) inhi- bition produces a driver-limited state revealing collateral dependencies. Sci. Signal. 12, eaaw9450. Kondo, Y., Ognjenovic, J., Banerjee, S., Karandur, D., Merk, A., Kulhanek, K., Wong, K., Roose, J.P., Subramaniam, S., and Kuriyan, J. (2019). Cryo-EM structure of a dimeric B-Raf:14-3-3 complex reveals asymmetry in the active sites of B-Raf kinases. Science 366, 109–115. Lowy, D.R., Zhang, K., DeClue, J.E., and Willumsen, B.M. (1991). Regulation of p21ras activity. Trends Genet. 7, 346–351. Kostaras, E., Kaserer, T., Lazaro, G., Heuss, S.F., Hussain, A., Casado, P., Hayes, A., Yandim, C., Palaskas, N., Yu, Y., et al. (2020). A systematic molec- ular and pharmacologic evaluation of AKT inhibitors reveals new insight into their biological activity. Br. J. Cancer 123, 542–555. Perspective Flexible-body motions of calmodulin and the farnesylated hypervariable region Cell Chemical Biology 28, February 18, 2021 129 Cell Chemical Biology 28, February 18, 2021 129 ll OPEN ACCESS Perspective Nussinov, R., Jang, H., Tsai, C.J., Liao, T.J., Li, S., Fushman, D., and Zhang, J. (2017a). Intrinsic protein disorder in oncogenic KRAS signaling. Cell. Mol. Life Sci. 74, 3245–3261. Mackereth, C.D., Madl, T., Bonnal, S., Simon, B., Zanier, K., Gasch, A., Rybin, V., Valcarcel, J., and Sattler, M. (2011). Multi-domain conformational selection underlies pre-mRNA splicing regulation by U2AF. Nature 475, 408–411. Nussinov, R., and Ma, B. (2012). Protein dynamics and conformational selec- tion in bidirectional signal transduction. BMC Biol. 10, 2. Mahoney, S.J., Narayan, S., Molz, L., Berstler, L.A., Kang, S.A., Vlasuk, G.P., and Saiah, E. (2018). A small molecule inhibitor of Rheb selectively targets mTORC1 signaling. Nat. Commun. 9, 548. Nussinov, R., and Tsai, C.J. (2012). The different ways through which speci- ficity works in orthosteric and allosteric drugs. Curr. Pharm. Des. 18, 1311–1316. Martin-Gago, P., Fansa, E.K., Klein, C.H., Murarka, S., Janning, P., Schur- mann, M., Metz, M., Ismail, S., Schultz-Fademrecht, C., Baumann, M., et al. (2017). A PDE6delta-KRas inhibitor chemotype with up to seven H-bonds and picomolar affinity that prevents efficient inhibitor release by Arl2. Angew. Chem. Int. Ed. Engl. 56, 2423–2428. Nussinov, R., and Tsai, C.J. (2013). Allostery in disease and in drug discovery. Cell 153, 293–305. Martin-Garcia, F., Mendieta-Moreno, J.I., Lopez-Vinas, E., Gomez-Puertas, P., and Mendieta, J. (2012). The Role of Gln61 in HRas GTP hydrolysis: a quan- tum mechanics/molecular mechanics study. Biophys. J. 102, 152–157. Nussinov, R., and Tsai, C.J. (2015). The design of covalent allosteric drugs. Annu. Rev. Pharmacol. Toxicol. 55, 249–267. Nussinov, R., Tsai, C.J., and Jang, H. (2018a). Oncogenic ras isoforms signaling specificity at the membrane. Cancer Res. 78, 593–602. Mattingly, R.R. (2013). Activated ras as a therapeutic target: constraints on directly targeting ras isoforms and wild-type versus mutated proteins. ISRN Oncol. 2013, 536529. Nussinov, R., Tsai, C.J., and Jang, H. (2019a). Does ras activate Raf and PI3K allosterically? Front. Oncol. 9, 1231. Maurer, T., Garrenton, L.S., Oh, A., Pitts, K., Anderson, D.J., Skelton, N.J., Fauber, B.P., Pan, B., Malek, S., Stokoe, D., et al. (2012). Small-molecule li- gands bind to a distinct pocket in Ras and inhibit SOS-mediated nucleotide ex- change activity. Proc. Natl. Acad. Sci. U S A 109, 5299–5304. Nussinov, R., Tsai, C.J., and Jang, H. (2019b). Is nanoclustering essential for all oncogenic KRas pathways? Can it explain why wild-type KRas can inhibit its oncogenic variant? Semin. Cancer Biol. 54, 114–120. Perspective McCarthy, M.J., Pagba, C.V., Prakash, P., Naji, A.K., van der Hoeven, D., Liang, H., Gupta, A.K., Zhou, Y., Cho, K.J., Hancock, J.F., et al. (2019). Discov- ery of high-affinity noncovalent allosteric KRAS inhibitors that disrupt effector binding. ACS Omega 4, 2921–2930. Nussinov, R., Tsai, C.J., and Jang, H. (2019c). Oncogenic KRas mobility in the membrane and signaling response. Semin. Cancer Biol. 54, 109–113. Nussinov, R., Tsai, C.J., and Jang, H. (2020). Ras assemblies and signaling at the membrane. Curr. Opin. Struct. Biol. 62, 140–148. McCormick, F. (2018). Targeting KRAS directly. In Annual Review of Cancer Biology, T. Jacks and C.L. Sawyers, eds. (Annual Reviews), pp. 81–90. Nussinov, R., Tsai, C.J., and Mattos, C. (2013). Pathway drug cocktail’: target- ing Ras signaling based on structural pathways. Trends Mol. Med. 19, 695–704. Milroy, L.G., and Ottmann, C. (2014). The renaissance of Ras. ACS Chem. Biol. 9, 2447–2458. Nussinov, R., Wang, G., Tsai, C.J., Jang, H., Lu, S., Banerjee, A., Zhang, J., and Gaponenko, V. (2017b). Calmodulin and PI3K signaling in KRAS cancers. Trends Cancer 3, 214–224. Mirati Therapeutics (2020). KRAS G12C inhibitor. https://www.mirati.com/ pipeline/kras-g12c/. Moran, M.F., Polakis, P., McCormick, F., Pawson, T., and Ellis, C. (1991). Pro- tein-tyrosine kinases regulate the phosphorylation, protein interactions, sub- cellular distribution, and activity of p21ras GTPase-activating protein. Mol. Cell Biol. 11, 1804–1812. Nussinov, R., and Wolynes, P.G. (2014). A second molecular biology revolu- tion? The energy landscapes of biomolecular function. Phys. Chem. Chem. Phys. 16, 6321–6322. Nussinov, R., Zhang, M., Tsai, C.J., Liao, T.J., Fushman, D., and Jang, H. (2018b). Autoinhibition in Ras effectors Raf, PI3Kalpha, and RASSF5: a comprehensive review underscoring the challenges in pharmacological inter- vention. Biophys. Rev. 10, 1263–1282. Motlagh, H.N., Wrabl, J.O., Li, J., and Hilser, V.J. (2014). The ensemble nature of allostery. Nature 508, 331–339. Mullard, A. (2019). Cracking KRAS. Nat. Rev. Drug Discov. 18, 887–891. O’Bryan, J.P. (2019). Pharmacological targeting of RAS: recent success with direct inhibitors. Pharmacol. Res. 139, 503–511. Murase, K., Fujiwara, T., Umemura, Y., Suzuki, K., Iino, R., Yamashita, H., Saito, M., Murakoshi, H., Ritchie, K., and Kusumi, A. (2004). Ultrafine mem- brane compartments for molecular diffusion as revealed by single molecule techniques. Biophys. J. 86, 4075–4093. Okada, T., Hu, C.D., Jin, T.G., Kariya, K., Yamawaki-Kataoka, Y., and Kataoka, T. (1999). The strength of interaction at the Raf cysteine-rich domain is a critical determinant of response of Raf to Ras family small GTPases. Mol. Cell Biol. High-throughput, single-particle tracking reveals nested membrane domains that dictate KRas(G12D) diffusion and trafficking. eLife 8, e46393. Ma, B., Shatsky, M., Wolfson, H.J., and Nussinov, R. (2002). Multiple diverse ligands binding at a single protein site: a matter of pre-existing populations. Protein Sci. 11, 184–197. 130 Cell Chemical Biology 28, February 18, 2021 130 Cell Chemical Biology 28, February 18, 2021 ll OPEN ACCESS Perspective Perspective Structure 26, 810–820.e4. cule Ras inhibitors that display antitumor activity by blocking the Ras-effector interaction. Proc. Natl. Acad. Sci. U S A 110, 8182–8187. Simons, K., and Vaz, W.L. (2004). Model systems, lipid rafts, and cell mem- branes. Annu. Rev. Biophys. Biomol. Struct. 33, 269–295. Patgiri, A., Yadav, K.K., Arora, P.S., and Bar-Sagi, D. (2011). An orthosteric in- hibitor of the Ras-Sos interaction. Nat. Chem. Biol. 7, 585–587. Singh, H., Longo, D.L., and Chabner, B.A. (2015). Improving prospects for tar- geting RAS. J. Clin. Oncol. 33, 3650–3659. Patricelli, M.P., Janes, M.R., Li, L.S., Hansen, R., Peters, U., Kessler, L.V., Chen, Y., Kucharski, J.M., Feng, J., Ely, T., et al. (2016). Selective inhibition of oncogenic KRAS output with small molecules targeting the inactive state. Cancer Discov. 6, 316–329. Smith, M.J., and Ikura, M. (2014). Integrated RAS signaling defined by parallel NMR detection of effectors and regulators. Nat. Chem. Biol. 10, 223–230. Smith, M.J., Neel, B.G., and Ikura, M. (2013). NMR-based functional profiling of RASopathies and oncogenic RAS mutations. Proc. Natl. Acad. Sci. U S A 110, 4574–4579. Pokrass, M.J., Ryan, K.A., Xin, T., Pielstick, B., Timp, W., Greco, V., and Regot, S. (2020). Cell-cycle-dependent ERK signaling dynamics direct fate specifica- tion in the mammalian preimplantation embryo. Dev. Cell 55, 328–340.e5. Solman, M., Ligabue, A., Blazevits, O., Jaiswal, A., Zhou, Y., Liang, H., Lectez, B., Kopra, K., Guzman, C., Harma, H., et al. (2015). Specific cancer-associated mutations in the switch III region of Ras increase tumorigenicity by nanocluster augmentation. eLife 4, e08905. Poulin, E.J., Bera, A.K., Lu, J., Lin, Y.J., Strasser, S.D., Paulo, J.A., Huang, T.Q., Morales, C., Yan, W., Cook, J., et al. (2019). Tissue-specific oncogenic activity of KRAS(A146T). Cancer Discov. 9, 738–755. Prakash, P., and Gorfe, A.A. (2019). Probing the conformational and energy landscapes of KRAS membrane orientation. J. Phys. Chem. B 123, 8644–8652. Spencer-Smith, R., Koide, A., Zhou, Y., Eguchi, R.R., Sha, F., Gajwani, P., San- tana, D., Gupta, A., Jacobs, M., Herrero-Garcia, E., et al. (2017). Inhibition of RAS function through targeting an allosteric regulatory site. Nat. Chem. Biol. 13, 62–68. Prakash, P., Litwin, D., Liang, H., Sarkar-Banerjee, S., Dolino, D., Zhou, Y., Hancock, J.F., Jayaraman, V., and Gorfe, A.A. (2020). Dynamics of mem- brane-bound G12V-KRAS from simulations and single-molecule FRET in native nanodiscs. Biophys. J. 118, 532. Spencer-Smith, R., and O’Bryan, J.P. (2019). Direct inhibition of RAS: quest for the holy grail? Semin. Cancer Biol. 54, 138–148. Perspective 19, 6057–6064. Muratcioglu, S., Aydin, C., Odabasi, E., Ozdemir, E.S., Firat-Karalar, E.N., Jang, H., Tsai, C.J., Nussinov, R., Kavakli, I.H., Gursoy, A., et al. (2020). Onco- genic K-Ras4B dimerization enhances downstream mitogen-activated protein kinase signaling. J. Mol. Biol. 432, 1199–1215. Okazaki, K., and Takada, S. (2008). Dynamic energy landscape view of coupled binding and protein conformational change: induced-fit versus popu- lation-shift mechanisms. Proc. Natl. Acad. Sci. U S A 105, 11182–11187. Muratcioglu, S., Chavan, T.S., Freed, B.C., Jang, H., Khavrutskii, L., Freed, R.N., Dyba, M.A., Stefanisko, K., Tarasov, S.G., Gursoy, A., et al. (2015). GTP-dependent K-ras dimerization. Structure 23, 1325–1335. Ostrem, J.M., Peters, U., Sos, M.L., Wells, J.A., and Shokat, K.M. (2013). K- Ras(G12C) inhibitors allosterically control GTP affinity and effector interac- tions. Nature 503, 548–551. Nagar, B., Hantschel, O., Young, M.A., Scheffzek, K., Veach, D., Bornmann, W., Clarkson, B., Superti-Furga, G., and Kuriyan, J. (2003). Structural basis for the autoinhibition of c-Abl tyrosine kinase. Cell 112, 859–871. Papke, B., and Der, C.J. (2017). Drugging RAS: know the enemy. Science 355, 1158–1163. Nagasaka, M., Li, Y., Sukari, A., Ou, S.I., Al-Hallak, M.N., and Azmi, A.S. (2020). KRAS G12C Game of Thrones, which direct KRAS inhibitor will claim the iron throne? Cancer Treat. Rev. 84, 101974. Papke, B., Murarka, S., Vogel, H.A., Martin-Gago, P., Kovacevic, M., Truxius, D.C., Fansa, E.K., Ismail, S., Zimmermann, G., Heinelt, K., et al. (2016). Iden- tification of pyrazolopyridazinones as PDEdelta inhibitors. Nat. Commun. 7, 11360. Neale, C., and Garcia, A.E. (2020). The plasma membrane as a competitive in- hibitor and positive allosteric modulator of KRas4B signaling. Biophys. J. 118, 1129–1141. Park, E., Rawson, S., Li, K., Kim, B.W., Ficarro, S.B., Pino, G.G., Sharif, H., Marto, J.A., Jeon, H., and Eck, M.J. (2019). Architecture of autoinhibited and active BRAF-MEK1-14-3-3 complexes. Nature 575, 545–550. Nussinov, R. (2016). Introduction to protein ensembles and allostery. Chem. Rev. 116, 6263–6266. Parker, J.A., and Mattos, C. (2018). The K-ras, N-ras, and H-ras isoforms: unique conformational preferences and implications for targeting oncogenic mutants. Cold Spring Harb Perspect. Med. 8, a031427. Nussinov, R., Jang, H., and Tsai, C.J. (2014). The structural basis for cancer treatment decisions. Oncotarget 5, 7285–7302. Cell Chemical Biology 28, February 18, 2021 131 Cell Chemical Biology 28, February 18, 2021 131 ll OPEN ACCESS Parker, J.A., Volmar, A.Y., Pavlopoulos, S., and Mattos, C. (2018). K-ras pop- ulates conformational states differently from its isoform H-ras and oncogenic mutant K-RasG12D. Perspective Spiegel, J., Cromm, P.M., Zimmermann, G., Grossmann, T.N., and Waldmann, H. (2014). Small-molecule modulation of Ras signaling. Nat. Chem. Biol. 10, 613–622. Prior, I.A., Lewis, P.D., and Mattos, C. (2012). A comprehensive survey of Ras mutations in cancer. Cancer Res. 72, 2457–2467. Pylayeva-Gupta, Y., Grabocka, E., and Bar-Sagi, D. (2011). RAS oncogenes: weaving a tumorigenic web. Nat. Rev. Cancer 11, 761–774. Sprang, S.R. (1997). G proteins, effectors and GAPs: structure and mecha- nism. Curr. Opin. Struct. Biol. 7, 849–856. Quevedo, C.E., Cruz-Migoni, A., Bery, N., Miller, A., Tanaka, T., Petch, D., Ba- taille, C.J.R., Lee, L.Y.W., Fallon, P.S., Tulmin, H., et al. (2018). Small molecule inhibitors of RAS-effector protein interactions derived using an intracellular antibody fragment. Nat. Commun. 9, 3169. Steklov, M., Pandolfi, S., Baietti, M.F., Batiuk, A., Carai, P., Najm, P., Zhang, M., Jang, H., Renzi, F., Cai, Y., et al. (2018). Mutations in LZTR1 drive human disease by dysregulating RAS ubiquitination. Science 362, 1177–1182. Stephen, A.G., Esposito, D., Bagni, R.K., and McCormick, F. (2014). Dragging ras back in the ring. Cancer Cell 25, 272–281. Reid, T.S., and Beese, L.S. (2004). Crystal structures of the anticancer clinical candidates R115777 (Tipifarnib) and BMS-214662 complexed with protein far- nesyltransferase suggest a mechanism of FTI selectivity. Biochemistry 43, 6877–6884. Stites, E.C., and Ravichandran, K.S. (2009). A systems perspective of ras signaling in cancer. Clin. Cancer Res. 15, 1510–1513. Rezaei Adariani, S., Buchholzer, M., Akbarzadeh, M., Nakhaei-Rad, S., Dvor- sky, R., and Ahmadian, M.R. (2018). Structural snapshots of RAF kinase inter- actions. Biochem. Soc. Trans. 46, 1393–1406. Sun, Q., Burke, J.P., Phan, J., Burns, M.C., Olejniczak, E.T., Waterson, A.G., Lee, T., Rossanese, O.W., and Fesik, S.W. (2012). Discovery of small mole- cules that bind to K-Ras and inhibit Sos-mediated activation. Angew. Chem. Int. Ed. Engl. 51, 6140–6143. Sakamoto, K., Kamada, Y., Sameshima, T., Yaguchi, M., Niida, A., Sasaki, S., Miwa, M., Ohkubo, S., Sakamoto, J.I., Kamaura, M., et al. (2017). K- Ras(G12D)-selective inhibitory peptides generated by random peptide T7 phage display technology. Biochem. Biophys. Res. Commun. 484, 605–611. Sutton, M.N., Lu, Z., Li, Y.C., Zhou, Y., Huang, T., Reger, A.S., Hurwitz, A.M., Palzkill, T., Logsdon, C., Liang, X., et al. (2019). DIRAS3 (ARHI) blocks RAS/ MAPK signaling by binding directly to RAS and disrupting RAS clusters. Cell Rep. 29, 3448–3459.e6. Samatar, A.A., and Poulikakos, P.I. (2014). Targeting RAS-ERK signalling in cancer: promises and challenges. Nat. Rev. Drug Discov. 13, 928–942. Perspective Perspective Vigil, D., Cherfils, J., Rossman, K.L., and Der, C.J. (2010). Ras superfamily GEFs and GAPs: validated and tractable targets for cancer therapy? Nat. Rev. Cancer 10, 842–857. Young, A., Lou, D., and McCormick, F. (2013). Oncogenic and wild-type Ras play divergent roles in the regulation of mitogen-activated protein kinase signaling. Cancer Discov. 3, 112–123. Wang, Y., Kaiser, C.E., Frett, B., and Li, H.Y. (2013). Targeting mutant KRAS for anticancer therapeutics: a review of novel small molecule modulators. J. Med. Chem. 56, 5219–5230. Zeng, M., Lu, J., Li, L., Feru, F., Quan, C., Gero, T.W., Ficarro, S.B., Xiong, Y., Ambrogio, C., Paranal, R.M., et al. (2017). Potent and selective covalent quina- zoline inhibitors of KRAS G12C. Cell Chem. Biol. 24, 1005–1016.e3. Ward, R.A., Fawell, S., Floc’h, N., Flemington, V., McKerrecher, D., and Smith, P.D. (2020). Challenges and opportunities in cancer drug resistance. Chem. Rev. https://doi.org/10.1021/acs.chemrev.1020c00383. Zeng, M., Xiong, Y., Safaee, N., Nowak, R.P., Donovan, K.A., Yuan, C.J., Na- bet, B., Gero, T.W., Feru, F., Li, L., et al. (2020). Exploring targeted degradation strategy for oncogenic KRAS(G12C). Cell Chem. Biol. 27, 19–31.e6. Waters, A.M., and Der, C.J. (2018). KRAS: the critical driver and therapeutic target for pancreatic cancer. Cold Spring Harb. Perspect. Med. 8, a031435. Zhang, M., Jang, H., and Nussinov, R. (2019a). The mechanism of PI3Kalpha activation at the atomic level. Chem. Sci. 10, 3671–3680. Wiesmuller, L., and Wittinghofer, F. (1994). Signal transduction pathways involving Ras. Mini review. Cell. Signal. 6, 247–267. Zhang, M., Jang, H., and Nussinov, R. (2019b). The structural basis for Ras activation of PI3Kalpha lipid kinase. Phys. Chem. Chem. Phys. 21, 12021–12028. Wittinghofer, A., and Pai, E.F. (1991). The structure of Ras protein: a model for a universal molecular switch. Trends Biochem. Sci. 16, 382–387. Zhang, M., Jang, H., and Nussinov, R. (2020). PI3K inhibitors: review and new strategies. Chem. Sci. 11, 5855–5865. Wittinghofer, A., Scheffzek, K., and Ahmadian, M.R. (1997). The interaction of Ras with GTPase-activating proteins. FEBS Lett. 410, 63–67. Wittinghofer, A., and Vetter, I.R. (2011). Structure-function relationships of the G domain, a canonical switch motif. Annu. Rev. Biochem. 80, 943–971. Zhang, Z., and Shokat, K.M. (2019). Bifunctional small-molecule ligands of K- ras induce its association with immunophilin proteins. Angew. Chem. Int. Ed. Engl. 58, 16314–16319. Xiong, Y., Lu, J., Hunter, J., Li, L., Scott, D., Choi, H.G., Lim, S.M., Manandhar, A., Gondi, S., Sim, T., et al. (2017). Zimmermann, G., Papke, B., Ismail, S., Vartak, N., Chandra, A., Hoffmann, M., Hahn, S.A., Triola, G., Wittinghofer, A., Bastiaens, P.I., et al. (2013). Small molecule inhibition of the KRAS-PDEdelta interaction impairs oncogenic KRAS signalling. Nature 497, 638–642. Cell Chemical Biology 28, February 18, 2021 133 Perspective Takai, Y., Sasaki, T., and Matozaki, T. (2001). Small GTP-binding proteins. Physiol. Rev. 81, 153–208. Sarkar, S., and Garcia, A.E. (2020). Presence or absence of ras dimerization shows distinct kinetic signature in ras-raf interaction. Biophys. J. 118, 1799–1810. Thurman, R., Siraliev-Perez, E., and Campbell, S.L. (2020). RAS ubiquitylation modulates effector interactions. Small GTPases 11, 180–185. Schubbert, S., Shannon, K., and Bollag, G. (2007). Hyperactive Ras in devel- opmental disorders and cancer. Nat. Rev. Cancer 7, 295–308. Tran, T.H., Alexander, P., Dharmaiah, S., Agamasu, C., Nissley, D.V., McCor- mick, F., Esposito, D., Simanshu, D.K., Stephen, A.G., and Balius, T.E. (2020). The small molecule BI-2852 induces a nonfunctional dimer of KRAS. Proc. Natl. Acad. Sci. U S A 117, 3363–3364. Shao, T., Zheng, Y., Zhao, B., Li, T., Cheng, K., and Cai, W. (2014). Recombi- nant expression of different mutant K-ras gene in pancreatic cancer Bxpc-3 cells and its effects on chemotherapy sensitivity. Sci. China Life Sci. 57, 1011–1017. Travers, T., Lopez, C.A., Van, Q.N., Neale, C., Tonelli, M., Stephen, A.G., and Gnanakaran, S. (2018). Molecular recognition of RAS/RAF complex at the membrane: role of RAF cysteine-rich domain. Sci. Rep. 8, 8461. Sheridan, C. (2020). Grail of RAS cancer drugs within reach. Nat. Biotechnol. 38, 6–8. Tsai, C.J., Kumar, S., Ma, B., and Nussinov, R. (1999a). Folding funnels, bind- ing funnels, and protein function. Protein Sci. 8, 1181–1190. Sheridan, C., and Downward, J. (2013). Inhibiting the RAS-PI3K pathway in cancer therapy. Enzymes 34 Pt. B, 107–136. Tsai, C.J., Ma, B., and Nussinov, R. (1999b). Folding and binding cascades: shifts in energy landscapes. Proc. Natl. Acad. Sci. U S A 96, 9970–9972. Shima, F., Ijiri, Y., Muraoka, S., Liao, J., Ye, M., Araki, M., Matsumoto, K., Ya- mamoto, N., Sugimoto, T., Yoshikawa, Y., et al. (2010). Structural basis for conformational dynamics of GTP-bound Ras protein. J. Biol. Chem. 285, 22696–22705. Tsai, C.J., and Nussinov, R. (2014). The free energy landscape in translational science: how can somatic mutations result in constitutive oncogenic activa- tion? Phys. Chem. Chem. Phys. 16, 6332–6341. Shima, F., Yoshikawa, Y., Ye, M., Araki, M., Matsumoto, S., Liao, J., Hu, L., Su- gimoto, T., Ijiri, Y., Takeda, A., et al. (2013). In silico discovery of small-mole- Vetter, I.R., and Wittinghofer, A. (2001). The guanine nucleotide-binding switch in three dimensions. Science 294, 1299–1304. 132 Cell Chemical Biology 28, February 18, 2021 ll OPEN ACCESS ll OPEN ACCESS Perspective Covalent guanosine mimetic inhibitors of G12C KRAS. ACS Med. Chem. Lett. 8, 61–66. Zhou, Y., Prakash, P., Gorfe, A.A., and Hancock, J.F. (2018). Ras and the plasma membrane: a complicated relationship. Cold Spring Harb. Perspect. Med. 8, a031831. Yan, C., Liu, D., Li, L., Wempe, M.F., Guin, S., Khanna, M., Meier, J., Hoffman, B., Owens, C., Wysoczynski, C.L., et al. (2014). Discovery and characterization of small molecules that target the GTPase Ral. Nature 515, 443–447. Zimmermann, G., Papke, B., Ismail, S., Vartak, N., Chandra, A., Hoffmann, M., Hahn, S.A., Triola, G., Wittinghofer, A., Bastiaens, P.I., et al. (2013). Small molecule inhibition of the KRAS-PDEdelta interaction impairs oncogenic KRAS signalling. Nature 497, 638–642. Yehia, L., Keel, E., and Eng, C. (2020). The clinical spectrum of PTEN muta- tions. Annu. Rev. Med. 71, 103–116.
https://openalex.org/W2950156458
https://zenodo.org/records/3639596/files/THE%20ANALYSIS%20OF%20EXISTING%20EXPERIENCE%20FOR%20THE%20ETHNOBOTANICAL%20INFORMATION%20SYSTEM.pdf
English
null
THE ANALYSIS OF EXISTING EXPERIENCE FOR THE ETHNOBOTANICAL INFORMATION SYSTEM
Eureka, Life Sciences/Eureka, Life Sciences.
2,019
cc-by
5,950
Reports on research projects Reports on research projects Reports on research projects (2019), «EUREKA: Life Sciences» Number 3 Abstract Keywords: ethnobotanical biodiversity, herbal medicine, medicinal plants, ethnobotanical database, key components, struc- ture, main tables of the ethnobotanical database. THE ANALYSIS OF EXISTING EXPERIENCE FOR THE ETHNOBOTANICAL INFORMATION SYSTEM Laman Faig Hamidova Department of System analysis, control and information processing Institute of Information Technology of ANAS 9A B.Vahabzade str., Baku, Azerbaijan, AZ1141 leman.hemidova92@gmail.com DOI: 10.21303/2504-5695.2019.00897 © Laman Faig Hamidova Abstract Ethnobotanical researches reflect the conventional learning of a region. Over the previous decade, medical plants which used for healing indigenous people has become a significant notion among the people and impacted improvement of scientific and ethnobotanical knowledge and investigations of eliminating health problems. A public database has been based on data assembled from various verifiable sources, including journals, travel records, and treatises on therapeutic plants, composed by explorers, botanists, doctors, researchers who went to the nations during the most recent three centuries. In addition, ethnobotanical data depicted in chronicled natural accumulations and in Ancient and Medieval writings from the inquired district have been incorpo- rated into the database. The databases have to be sufficiently adaptable to illustrate a valuable tool for analysts who need to store and analyze present and past ethnobotanical data from the researched location. The ethnobotanical researches are improved in Azerbaijan day by day. The database is used for informing people about some national plants which are growing in the different region of Azerbaijan. The ethnobotanical databases from different countries are analyzed in this article. There are used some special methods for comparing the differences among these databases as data mining and text min- ing. As a first step the suitable databases are gathered for our investigation, then are defined the best information systems that are used in many countries’ biologists and scientists and the end is observed advantages and disadvantages of all existing ethno- botanical databases which we researched. The features of information systems are evaluated. The results demonstrated each of databases has its very own quality, but none has turned a standard form for universal research. The reason is very basic: none of these databases enable specialists to include their own information. There is also illustrated sample structure, main tables and key components of the ethnobotanical database. The obtained results, while a few ethnobotanical databases existing, none are satisfactory answers for worldwide work, and none enable analysts to include their very own information. There is a need brought together all essential properties of exist- ing databases, and creating a free database that encourages ethnobotanical research. Due to the rise and quick improvement in the field of data advances, it has now turned out to be conceivable to digitize, oversee and make ethnobotanical information accessible to a more extensive gathering of people. 1. Introduction Besides, alongside the loss of biodiversity, social assorted variety related with important therapeutic learning is additionally vanishing at a disturbing rate, because of cultural assimilation and urbanization. Therefore, scientists perceive that the answer of the protection of biodiversity lies in a multi-disciplinary and coordinated methodology alongside the fundamental contribution of indigenous. Furthermore, there is additionally a worldwide accord that simple and productive access to data on medical plants information and practices are basic for proficient pro- tection methodologies and the economical utilization of biodiversity [6]. Associations including the United Nations (UN) are scanning for approaches to protect customary learning and find a use for it to help both indigenous and non-indigenous individuals.i ganization (WHO), 80 % of the populace from various nations relies upon customarily used thera- peutic plants for their essential medicinal services [3]. It is evaluated that there are 300,000 plants on the planet of which 75,000 plant species are used as customary medication [4]. As indicated by the writing information, the flora of Azerbaijan comprises of about 5000 plant species, having a place with 1142 genera of 186 families, including 200 endemics of Azerbaijan and 950 endemics of the Caucasus. The types of the flora of Azerbaijan are circulated in 20 phytogeographical lo- cales. Among them, the hilly piece of Nakhchivan emerges as far as species decent variety, with about 60 % of all plant types of the country occurring there, trailed by Greater Caucasus and the Lankaran-Mughan plain [5]. Be that as it may, proceeding natural surroundings annihilation and human-incited ecological changes have prompted the loss of vital therapeutic plants used custom- arily by indigenous. Besides, alongside the loss of biodiversity, social assorted variety related with important therapeutic learning is additionally vanishing at a disturbing rate, because of cultural assimilation and urbanization. Therefore, scientists perceive that the answer of the protection of biodiversity lies in a multi-disciplinary and coordinated methodology alongside the fundamental contribution of indigenous. Furthermore, there is additionally a worldwide accord that simple and productive access to data on medical plants information and practices are basic for proficient pro- tection methodologies and the economical utilization of biodiversity [6]. Associations including the United Nations (UN) are scanning for approaches to protect customary learning and find a use for it to help both indigenous and non-indigenous individuals. 1. Introduction Over a time of four billion years, development has brought about overwhelming biodiversity on earth and has remained the essential power for the advancement of assorted life shapes over the globe [1]. It is assessed that of the aggregate number of life forms going from 7–20 million, just 1.8 million species are logically named. Overwhelmingly, the world’s biodiversity alluded to as “biodiversity storage facilities” with remarkable taxon and species assorted variety [1]. Environ- mental change and human impacts have brought about a phenomenal loss of biodiversity, with an expected 100–1000 overlap speeding up in the annihilation rate of botanical and faunal species contrasted with their normal rate. Shockingly, moderates are looked with a scarcity of information as just 1 % of every single recognized species has been considered past essential classification [2]. Truly, people have depended on biodiversity as an essential wellspring of sustenance, pro- tect and for profound and mental prosperity. Medical plants involve a noteworthy piece of the biodiversity and shape an inseparable connection between natural and social variety. Their co-ad- vancement has delivered neighborhood conventional restorative plant learning and practices. This wide knowledgebase is passed on from age to age, moves as orally like stories, melodies and frames for the manageable misuse and preservation of biodiversity. As indicated by the World Health Or- 15 Agricultural and Biological Scienсes (2019), «EUREKA: Life Sciences» (2019), «EUREKA: Life Sciences» Number 3 Reports on research projects Number 3 ganization (WHO), 80 % of the populace from various nations relies upon customarily used thera- peutic plants for their essential medicinal services [3]. It is evaluated that there are 300,000 plants on the planet of which 75,000 plant species are used as customary medication [4]. As indicated by the writing information, the flora of Azerbaijan comprises of about 5000 plant species, having a place with 1142 genera of 186 families, including 200 endemics of Azerbaijan and 950 endemics of the Caucasus. The types of the flora of Azerbaijan are circulated in 20 phytogeographical lo- cales. Among them, the hilly piece of Nakhchivan emerges as far as species decent variety, with about 60 % of all plant types of the country occurring there, trailed by Greater Caucasus and the Lankaran-Mughan plain [5]. Be that as it may, proceeding natural surroundings annihilation and human-incited ecological changes have prompted the loss of vital therapeutic plants used custom- arily by indigenous. Agricultural and Biological Scienсes 2. 1. Using Innovative Systems for Ethnobotanical Information Ethnobotany has advanced to address complex human-plant interrelation compare to ba- sic classifying of customarily used plants by people. Ethnobotanical information is urgent for an assortment of logical investigations, for example, pharmacology, veterinary science, biology, and customary learning protection. The obstructions for achieving ethnobotanical data restrict the ca- pacity of analysts and decision-makers producers to address issues in the regions of the investiga- tion, protection, manageable use, and basic leadership. The different idea of accessible ethnobotan- ical information has presented difficulties for information access, administration, and joining the different ethnobotanical resources. At present, the best way is to use informatics tools to digitize both unpublished and distributed ethnobotanical information (recorded and contemporary) held in different configurations for straightforward entry. A second way is encouraging promotion and consistent mix of information from various areas, for example, scientific classification, environ- ment, phytochemistry, pharmacology, microbiology, and atomic science. Such a coordinated data framework can conceivably corresponding ethnobotanical information with datasets from differ- ent controls, along these lines encouraging better comprehension for taking educated choices. For instance, incorporating ethnobotanical data with ordered datasets, for example, the International Plant Name Index will resolve the logical name and related issues concerning ethnobotanical plant types of essentialness [7]. In the ongoing past, there has been an expansion in the accessibility of ethnobotanical in- formation over the web. In spite of an expansion in the number of activities giving information in advanced configurations, for example, public databases and HTML site pages, the aggregate ac- cessible online information are divided and just a little part of what is known. In addition, these endeavors do not equivalent to the measure of gathered ethnobotanical information throughout the hundreds of years and the rate at which it is produced in electronic systems. Further, be- cause of the absence of informatics foundation encouraging simple access and confinements in information administration programming, huge measures of information could not be coordi- nated, prompting excess and wasteful use. For instance, a database, for example, NAPRALERT, with overall inclusion, gives ethnobotanical data on 20,000 medical plants including some In- dian species. In correlation, the Encyclopedia of Indian Medicinal Plants gives ethnobotanical data on 6,198 restorative Indian plant species, yet not these are incorporated into NAPRALERT. Since these datasets are not connected there is no simple method for checking the cover between them. 2. 1. Using Innovative Systems for Ethnobotanical Information Hence, similarly as with entries, for example, the Global Biodiversity Information Facility (GBIF) information entryway, Species 2000 and ITIS Catalog of Life, the Consortium for the Barcode of Life (CBOL), Australia’s Virtual Herbarium (AVH) and the Universal Biological In- dexer and Organizer (uBio), a bound together or combined information gateway is required for getting to ethnobotanical data all around [8]. (2019), «EUREKA: Life Sciences» Number 3 (2019), «EUREKA: Life Sciences» Number 3 other common items got from nature, for example, nourishment, plants used in ceremonies, fiber plants, harms, building materials for houses, and so on. other common items got from nature, for example, nourishment, plants used in ceremonies, fiber plants, harms, building materials for houses, and so on. 1. Introduction Ethnobotany, as the extensive number of educational and medical fields, sites, courses, workshops scholarly projects and media consideration propose, has encountered an unparalleled time of development in the previous twenty years. To be sure, inside this period, “ethnobotany” has been moved out of them to some degree elusive edges of science into the open standard. This re- newal of ethnobotany is apparent in post-modern, industrializing and non-industrialized countries, recommending it connect to more extensive auxiliary procedures. The improvement and make use of databases incorporated with conventional learning is ex- tending. While there’s an expected 40 years history of using databases in ethnoscientific subfields (e. g. ethnobotany, ethnobotanics, ethnozoology, ethnopharmacology and so on.) we know nearly nothing of their potential hugeness to indigenous people group. People need to keep up control of a database will probably require self-ruling advancement or community accomplices focused on strategies that stick to social conventions and the insurance of customary learning. While thinking about the significance and potential advancement of a database it is basic to survey its incentive as a computerized innovation. Ethnobotany is recently improved field of the request which is getting more consideration from the academic network in Azerbaijan as of late. There are some distributed works in this field (Fig. 1). Fig. 1. Fields of related to ethnobotany Ethnobotany •Chemistry •Genetics •Microbiology •Pharmacology •Anthroplogy •Ethnobiography •Indegenous law •Economics •Linguistics •Geography •Folklore •Ecology Fig. 1. Fields of related to ethnobotany The order of ethnobotany has extensive control what is keen on all investigations about the connection among people and plants. Ethnobotany bases around medicinal plants as well as on 16 Reports on research projects 2. 2. The Analysis of some of the Existing Ethnobotanical Databases There are a few well-known ethnobotanical databases in our time. While each of these stores has its very own quality, but none has turned a standard form for universal research. The reason is very basic: none of these databases enable specialists to include their own information. Let’s use two methods for comparing ethnobotanical databases. Text mining or content mining is the way toward investigating and examining a lot of un- structured content information supported by programming that can distinguish ideas, designs, subjects, and different traits in the data. Text mining has turned out to be increasingly viable for information researchers and different users because of the improvement of huge information stag- es [9]. One of the initial phases in the content mining process is composing and structuring the information in some material so it very well may be exposed to both subjective and quantitative analysis. The forthright work incorporates ordering, grouping, condensing informational collec- 17 Agricultural and Biological Scienсes (2019), «EUREKA: Life Sciences» (2019), «EUREKA: Life Sciences» Number 3 Reports on research projects tions, making scientific classifications, and extricating data about things like word frequencies and connections between information substances (Fig. 2). tions, making scientific classifications, and extricating data about things like word frequencies and connections between information substances (Fig. 2). Fig. 2. Text mining steps Fig. 2. Text mining steps Data mining is the way toward dealing with expansive informational collections to dis- tinguish designs and set up connections to take care of issues through information examination. Information mining devices enable institutes or any companies to anticipate future patterns. In information mining, affiliation rules are made by breaking down information for successive on the off chance that designs, utilizing the help and certainty criteria to find the most essential connec- tions inside the information. Support is the means the information show up in the database now and after amending process, while certainty is the occasions if proclamations are accurate. Other data mining parameters incorporate Sequence or Path Analysis, Classification, Clustering and Fore- casting. Grouping or Path Analysis parameters search for examples where one occasion prompts another later occasion. A Sequence is an arranged rundown of sets of things, and it is a typical sort of information structure found in numerous databases. A Classification parameter searches new examples, and as a result information is sorted out. Grouping calculations anticipate factors depen- dent on different factors inside the database [10], (Fig. Agricultural and Biological Scienсes 2. 2. The Analysis of some of the Existing Ethnobotanical Databases Additionally, it was noted the using qualities of the plants: disease or indication treated, recurrence of use, sort of drug (human or veterinary). There were illustrated 251 different species in Africa [12]. ethnobotanical data, vernacular names of the plant. Additionally, it was noted the using qualities of the plants: disease or indication treated, recurrence of use, sort of drug (human or veterinary). There were illustrated 251 different species in Africa [12]. FRLHT Encyclopedia of Indian Medicinal Plants, a database that was prepared on In- dian Medicinal Plants is currently accessible for analysts, academicians, students, ethnobotanists, preservationists, nature friends. Thus, FRLHT has been creating in recent years a thorough data- base on Indian Medicinal Plants. It covers different subject connected to normal assets used by the Indian System of Medicine, for example, natural and common names relationship, geo-dissemina- tion information, maps, exchange data and so on. This is an all-around referenced unique database. This restrictive and creative pursuit based database stores 7,637 herbal names (6,198 restorative plants species) with 119183 vernacular names from 12 dialects crosswise over India. Almost 2688 plant pictures are additionally accessible in the database [13]. TradiMed database, in view of different Chinese and Korean therapeutic plants, is the con- solidating aftereffect of the conventional drug and the advanced science, which advances compre- hension of customary therapeutic medicines from the perspective of the cutting-edge science, and supplements for new improvements of items. Herbal Taxonomy and Miscellaneous: Aggregate of 3,199 natural data with images, symp- toms, adequacy, target organs, property, and well-being measure can be sought by names. What’s more, there are 2,944 orders on creatures and herbs. Formulae: Aggregate of 11,810 medications from 17 works with points of interest, for ex- ample, target organs, symptoms, adequacy, readiness, use, alert, reference, and measurement can be recovered. Constituents (chemical data with range investigation information): Aggregate of around 20,012 constituents from crude materials can be seen with synthetic data, investigative spectrum (UV, NMR, IR, Mass), and conceivable cross-reference. Manifestation/Disease (cross-reference between the Eastern and the Western medications): Aggregate of 4,080 customary infections are referenced into the cutting edge malady arrangement with titles and side effects. Preparing: It is the customary technique to plan crude herbs previously use. The aggregate of 95 general processing and 502 herbs are recorded [14]. Dr. Duke’s Phytochemical and Ethnobotanical databases’ parameters look into accu- mulated by Dr. 2. 2. The Analysis of some of the Existing Ethnobotanical Databases 3). Fig. 3. Data mining steps There are additionally a few different shortcomings and qualities of every one of these ap- plications. There are additionally a few different shortcomings and qualities of every one of these ap- plications. There are additionally a few different shortcomings and qualities of every one of these ap- plications. International Ethnobotany Database is completely multilingual and underpins interpreta- tion, information section, and survey for any dialect. In particular, the database is available to any scientist to include new information, datasets, and dialects. The ebDB is overseen by the Founda- tion for Open EthnoBotany Research (FOER), an association devoted exclusively to dealing with the database and giving a worldwide store to ethnobotanical information. Therefore, it is protected from institutional political strife and business interests and gives a reliable environment for differ- ent information. The biologists have been worked more than four years, and look into the fields of Peru, the ebDB contains an expansive list of capabilities and is structured particularly for ethno- botanical explore [11]. It is completely multilingual, has a glossary, in excess of 20 classes of infor- mation, effective searching process, and information send out highlights. Right now, the database preserves information from Ecuador, Peru, Kenya, and Hawai’i. It is the expectation of this venture the ebDB turns into a worldwide standard for putting away ethnobotanical information [11].i Prelude Medicinal Plants Database, this specialized database is identified with the uses of a few plants in customary veterinary and human prescription in Africa. It is helpful for analysts, specialists, veterinary specialists to have documentation available to them that gives access to con- solidated data from an assortment of sources in regards to the make use of customary therapeutic plants in various areas of Africa. The point of this database is to address this issue. The data put away in the database is gathered from articles, books, papers given to congresses or straightfor- wardly to the Prelude Sub-Network on “Well-being, creature preparations, condition”. The information has relegated a data for each plant under the accompanying headings in this database: name of the plant, name of a sort, bibliographical reference, people who were gathered 18 (2019), «EUREKA: Life Sciences» (2019), «EUREKA: Life Sciences» Number 3 Reports on research projects Number 3 ethnobotanical data, vernacular names of the plant. Agricultural and Biological Scienсes 2. 2. The Analysis of some of the Existing Ethnobotanical Databases Jim Duke of the Green Pharmacy Garden and the United States Department of Agriculture (USDA). The USDA’s Agricultural Research Service offers help for the database. Dr. Duke’s database has a few key qualities: countless, last information on most database sections, and to reveal concoction data on an assortment of plants. There are 49,788 entities such as phytochemi- cal (biological activity, chemicals, plant, syndrome) and ethnobotanical (ethnobotanical plants and ethnobotanical uses). It is possible to see 13,010 different ethnobotanical plants on this database and their growing place, for what using, common names of some plants. Researchers can also be downloaded data which is necessary for them as pdf or spreadsheet form. Ethnobotanists can find some useful information for pharmaceutical, nutritional, and biomedical research, as well as alter- native therapies and herbal products. It additionally has a few basic shortcomings, most strikingly the absence of open information, and restricted help for an assortment of ethnobotany information. The “EthnobotDB” itself just has fields for natural portrayal and use. While this makes the data- base a successful tool for spreading Dr. Duke’s work, it does nothing to help different specialists to viably detail the products of their exploration [15]. A Modern HerbalDatabase was composed in England with an atmosphere like the Pacific Northwest in America, and keeps a top priority. For Medicinal Use – a primary concern of this database was composed that indigenous people used a plant with true way of thinking of the mid-1900s. This ought to be considered as a portion of the data may now be viewed as erroneous, or not as per the current drug [16]. Plant and Herb Index: More than 800 assortments of herbs and plants. Record of Recipes: A posting of 29 plants that incorporate formulas. Record of Poisons: A posting of 44 plants that are recorded as harmful. 19 Agricultural and Biological Scienсes Agricultural and Biological Scienсes (2019), «EUREKA: Life Sciences» (2019), «EUREKA: Life Sciences» Number 3 Reports on research projects Number 3 NAPRALERT contains data on a wide assortment of plants and their uses, but its use to sci- entists start and closure there. In contrast to alternate databases, NAPRALERT is compensation for every framework, with an expense at composing of 8.90 USD per search. While the University of Illinois at Chicago is qualified for reserve its examination, obviously this is no summed up a storage facility for ethnobotanical information. 2. 2. The Analysis of some of the Existing Ethnobotanical Databases It’s essential to likewise take note of that NAPRALERT centers around the phytochemical data for the plants in its database. While phytochemistry is an essential science, with the worries of bio-prospecting it is more dependable to keep phytochemical information separate from unadulterated ethnobotanical information. At last, similar to the previ- ously mentioned two databases, NAPRALERT is monolingual framework [17]. Native American Ethnobotany, a database of plants used medications, sustenance, colors by local Peoples of North America. The online database was a great extent finished in the late 1990s. The database currently contains 44,691 things. This form included nourishments, drugs, colors, strands and different employments of plants (an aggregate of more than 44,000 things). This information was assembled by 291 Native American gatherings of 4,029 species from 243 distinc- tive plant families. A portion of them is therapeutic. This development of the database was upheld by allowing from the National Science Foundation [18]. The second form of the database was distributed in 1986 by the Museum of Anthropology of the University of Michigan with the title Medicinal Plants of Native America. That database – which contained 17,634 things illustrating to the therapeutic employment of 2,147 species from 760 genera and 142 families by 123 diverse local American gatherings – was worked overtime of around 10 years with help from the National Endowment for the Humanities, the National Science Foundation, and the University of Michigan-Dearborn. The information was entered utilizing an intricate plan checking for information uprightness which electronically settled numerous organic equivalent words (which happen when the “same” plant gets diverse logical names, something that frequently occurs over significant lots of time) [18]. A few databases for plant optional metabolic pathways, organic exercises, synthetic struc- tures, ethnobotanical uses, content in nourishments, and pharmacology are open source. A couple of valuable databases are recorded beneath and may keep on filling in as refreshed bases of data. Table 1 The ethnobotanical databases spreading throughout the world 20 Table 1 The ethnobotanical databases spreading throughout the world Ethnobotanical Databases Links Languages 1 2 3 Dictionary of Natural Compounds http://dnp.chemnetbase.com English PubChem http://pubchem.ncbi.nlm.nih.gov English NAPRALERT http://www.napralert.org/about.aspx English Dr. Agricultural and Biological Scienсes Reports on research projects 2. 2. The Analysis of some of the Existing Ethnobotanical Databases Dukes’s Phytochemical and Ethnobotanical DB https://phytochem.nal.usda.gov/phytochem/search English Plant Metabolic Network http://www.plantcyc.org USDA databases http://fnic.nal.usda.gov/food-composition /phytonutrients English MetaCYC http://metacyc.org/ English Phenol-Explorer http://phenol-explorer.eu English Prelude Medicinal Plants Database www.metafro.be/prelude English, French FRLHT Encyclopedia of Indian Medicinal Plants http://www.frlht.org/newenvis/ indian-medicinalplants-database.php English Modern Herbal Database http://www.botanical.com/botanical/mgmh/ mgmh.html English International Ethnobotany Database https://olorien.org/ebDB English Native American Ethnobotany http://naeb.brit.org English Agricultural and Biological Scienсes 5. 1. The Determination of Structure and Schematic Illustration of the Ethnobotanical Database The database model has been executed as a local database. Distinctive execution arrange- ments were tried, as indicated by the prerequisites and find a use for cases. Present and old ethnobo- tanical information was composed in a similar table structure, permitting a few expenses of excess for the homogenization of information and inquiries. Since adaptability was a noteworthy issue for our file, the questions were situated center of ideas which were actualized, for example, boundless various leveled structures, especially for classified tables and scientific species categorization, and legacy ideas, being a reference to data sources, a person, a natural or an archeological remain. Those procedures enabled individuals to build up an insignificant information structure fitting diverse sort of data and to perform questions at various levels of detail (Fig. 5). Fig. 5. A schematic illustration of the key components of the ethnobotanical database Fig. 5. A schematic illustration of the key components of the ethnobotanical database The document presently permits the capacity and administration of ethnobotanical data from sources, recorded herbarium examples and archives, as indicated by a various leveled inven- tory of plant uses and arrangements (therapeutic, nutritious, stylized, veterinary, local, medical, food). It is additionally conceivable to incorporate ethnobotanical data from archeological remains, in spite of the fact that the connections to the relative databases have not yet been executed. Plants’ names data: plant prevalent names (local, botanical, ancient), and their relationship with species scientific classification. i Ethnobotanical information was composed in a social structure: an identified table can gath- er data on various plants, which can be used for various degrees. Conventional learning can’t be effectively ordered and remedial utilizations are regularly intermixed with formal and representa- tive ones. Be that as it may, to permit a more compelling hunt inside the database, convictions, and works on managing people employments of an animal varieties were assembled being used clas- sifications, going over restorative (counting warmth and method of organization of the plant), for- mal (representative, custom, religious including any conviction concerning the plant), wholesome, local, veterinary employment. These classifications have been sorted out in a various leveled struc- ture and might be relegated by the detail level of the data accumulated. A dependability level of those utilization assignments is given, especially for information from the antiquated treatises and from archeological remains. Agricultural and Biological Scienсes 5. Results 5. 1. The Determination of Structure and Schematic Illustration of the Ethnobotanical Database 5. Results 5. 1. The Determination of Structure and Schematic Illustration of the Ethnobotanical Database Table 1 20 Reports on research projects (2019), «EUREKA: Life Sciences» Number 3 Source: https://www.wipo.int/edocs/mdocs/tk/en/wipo_grtkf _ic_3/wipo_grtkf _ic_3_6-main1.pdf It i ill t t d th di th t i t f th t f th b t i l d t b i t 1 2 3 TradiMed http://www.tradimed.com English AGRICOLA http://www.nal.usda.gov/ag98 English The Arctic Science and Technology Information System database http://www.aina.ucalgary.ca/astis English, French Alaska Traditional Knowledge and Native Foods Database http://www.nativeknowledge.org/start.htm English American Folk Medicine http://www.folkmed.ucla.edu/index.html English Ayurveda http://www.pharm.uu.nl/home/smit English BIOSIS http://www.biosis.org/products_services/ba.html English CAB HEALTH Database http://www.cabi-publishing.org/Products/ Database/Health/Index.asp English CHIMERA http://www.rosenthal.hs.columbia.edu/databases/ TradMed_CMMRC.html English Crane Herb Company http://www.craneherb.com English Economic Botany Bibliographic Database http://www.kew.org/data/ecbot-biblio.html English GRIN http://www.ars-grin.gov/npgs/tax/index.html English, Portuguese, Spanish Gernot Katzer’s Spice Pages http://www-ang.kfunigraz.ac.at/ ~katzer/engl/index.html English, German HerbMed http://www.herbmed.org English Herbal Medicine Databases http://www.holisticmed.com/www/herbdb.html English MAROWINA Database http://www.tropilab.com/medsupp.html English Medicinal Herbs On-line http://www.egregore.com/misc/herbindx.htm English Medicinal Plants Catalogue http://www.ayuherbal.com/ medplantcatalogue.htm English, French, Ger- man, Spanish Rainforest Tropical Plant Database http://www.rain-tree.com/plants.htm English, French, Ger- man, Italian, Norwegian, Portuguese, Spanish TRAMIL Medicinal Plant Database http://www.funredes.org/tramil English, French, Spanish (2019), «EUREKA: Life Sciences» Number 3 It is illustrated the diagram that consist of the percentage of ethnobotanical databases exist- ing in the different countries according to their using more by experts and users (Fig. 4). 21 Fig. 4. The percentages of using ehnobotanical databases according to countries Source: https://www.wipo.int/edocs/mdocs/tk/en/wipo_grtkf _ic_3/wipo_grtkf _ic_3_6-main1.pdf 33 % 29 % 10 % 10 % 6 % 6 % 6 % USA China UK India Canada Australia France 21 Fig. 4. The percentages of using ehnobotanical databases according to countries Source: https://www.wipo.int/edocs/mdocs/tk/en/wipo_grtkf _ic_3/wipo_grtkf _ic_3_6-main1.pdf Fig. 4. The percentages of using ehnobotanical databases according to countries Source: https://www.wipo.int/edocs/mdocs/tk/en/wipo_grtkf _ic_3/wipo_grtkf _ic_3_6-main1.pdf 21 Agricultural and Biological Scienсes (2019), «EUREKA: Life Sciences» Number 3 Reports on research projects Reports on research projects 5. 1. The Determination of Structure and Schematic Illustration of the Ethnobotanical Database The guideline of putting away data with various levels of exactness has been executed additionally for the arrangement steps and for the plant parts included (Fig. 6). Data sources can be numerous sorts, in particular, bibliographic references, gatherers, herb- als or archeological remains. All or subsets of these sorts can be referenced, as indicated by the tables where a source data is required. 22 22 (2019), «EUREKA: Life Scien Number 3 Fig. 6. The structure and main tables of the ethnobotanical database rts on research ects (2019), «EUREKA: Life Sciences» Number 3 Fig. 6. The structure and main tables of the ethnobotanical database Reports on research projects Fig. 6. The structure and main tables of the ethnobotanical database The database of medicinal plants for plant biodiversity conservation was prepared for Azer- baijan nature. The database consists of 178 families, 740 genera, 1547 species which grow in Azer- baijan. It was observed when analyzing this database that 34.3 % plants are medicinal plant among 4500 plant species. Each species has 24 parameters which reflect the whole taxonomic characteris- tics, ecology, the territory of distribution, contents of the biologically active compounds, applica- tion forms, therapeutic properties, the status of plant species as endemics, relicts, rarity, references, their photographs in natural ecosystems. Among these medicinal plants, 77 herbal plants species are Caucasian endemics, 5 species are national endemics, 44 species are relicts, 112 medicinal spe- cies are rare and endangered. The collected information on different herbs gives valid data on its high assorted variety and endemism, and also information on scarce and endangered plant species in the certain districts of the nation. It permits to effectively make an oversee framework to charac- terize the conveyance and centralization of biodiversity spots of herbs and to apportion the regions, particularly critical for conservation [19]. It is planned to create a new information system for Azerbaijani ethnobotanical plants which used OLAP (Online Analytical Processing) technology for illustrating ethnobotanical data about plants. As a result, it will be possible to find plant information according to years, medical and chemical properties, also to evaluate various components of multidimensional information. (2019), «EUREKA: Life Sciences» Number 3 (2019), «EUREKA: Life Sciences» Number 3 Reports on research projects Acknowledgements g I would like to thank my advisor, DScTech Rasim Mahammad Alguliyev, PhD Farhad Firu- din Yusifov and Phd Naiba Pirverdi Mehtiyeva for lots of great inspiration, ideas, comments, and feedbacks. I certainly could not have completed this article without their expertise and advice. Agricultural and Biological Scienсes 6. Conclusions Massive ethnobotanical information having social hugeness and financial esteem is con- veyed among various indigenous peoples and research associations. Licensed innovation rights are vital for tending to worldwide issues, for example, decreasing biodiversity, sustenance security, lessening conventional learning and the requirement for new prescriptions to battle expanding drug obstruction. While a few ethnobotanical databases exist, none are satisfactory answers for worldwide work, and none enable analysts to include their very own information. There is a need brought together all essential properties of existing databases, and creating a free database that encourages ethnobotanical research. Due to the rise and quick improvement in the field of data advances, it has now turned out to be conceivable to digitize, oversee and make ethnobotanical information acces- sible to a more extensive gathering of people. By grasping the intensity of innovation data, ethnobotanists and decision-makers can con- nect the substantial gap between the created databases. The way to accomplishing these objectives would be the inception of communitarian associations and familiarity with the centrality of IT among ethnobotanists, indigenous peoples and decision-makers from different nations. It is vital to guarantee protection and reasonable find a use for this data for human prosperity. 23 Agricultural and Biological Scienсes (2019), «EUREKA: Life Sciences» Number 3 References [1] Ahmed, H. M. (2016). Ethnopharmacobotanical study on the medicinal plants used by herbalists in Sulaymaniyah Province, Kurdistan, Iraq. Journal of Ethnobiology and Ethnomedicine, 12 (1). doi: https:// doi.org/10.1186/s13002-016-0081-3 [1] Ahmed, H. M. (2016). Ethnopharmacobotanical study on the medicinal plants used by herbalists in Sulaymaniyah Province, Kurdistan, Iraq. Journal of Ethnobiology and Ethnomedicine, 12 (1). doi: https:// doi.org/10.1186/s13002-016-0081-3 [2] Baydoun, S., Chalak, L., Dalleh, H., Arnold, N. (2015). Ethnopharmacological survey of medic- inal plants used in traditional medicine by the communities of Mount Hermon, Lebanon. Journal of Ethno- pharmacology, 173, 139–156. doi: https://doi.org/10.1016/j.jep.2015.06.052 [2] Baydoun, S., Chalak, L., Dalleh, H., Arnold, N. (2015). Ethnopharmacological survey of medic- inal plants used in traditional medicine by the communities of Mount Hermon, Lebanon. Journal of Ethno- pharmacology, 173, 139–156. doi: https://doi.org/10.1016/j.jep.2015.06.052 [3] WHO Traditional Medicine Strategy: 2014–2023 (2013). Geneva: World Health Organiza- tion, 76. [4] Sarkar, I. N. (2007). Biodiversity informatics: organizing and linking information across the spectrum of life. Briefings in Bioinformatics, 8 (5), 347–357. doi: https://doi.org/10.1093/bib/bbm037 [5] Mehdiyeva, N. P., Guliyev, I. S., Alizade, V. M., Alirzayeva, E. H., Bussmann, R. W. (2017). Eth- nobotany of the Caucasus – Azerbaijan. Ethnobotany of the Caucasus, 37–46. doi: https://doi.org/10.1007/978- 3-319-49412-8_16 [6] Maryo, M., Nemomissa. S., Bekele, T. (2015). An ethnobotanical study of medicinal plants of the Kembatta ethnic group in Enset-based agricultural landscape of Kembatta Tembaro (KT) Zone, Southern Ethiopia. Asian Journal of Plant Science and Research, 5 (7), 42–61. [7] Buenz, E., Schnepple, D., Bauer, B., Elkin, P., Riddle, J., Motley, T. (2004). Techniques: Bio- prospecting historical herbal texts by hunting for new leads in old tomes. Trends in Pharmacological Scienc- es, 25 (9), 494–498. doi: https://doi.org/10.1016/j.tips.2004.07.003 [8] Buneman, P. (2005). What the Web Has Done for Scientific Data – and What It Hasn’t. Lecture Notes in Computer Science, 1–7. doi: https://doi.org/10.1007/11563952_1 [9] Shinde, P., Govilkar, S. (2015). A Systematic study of Text Mining Techniques. International Journal on Natural Language Computing, 4 (4), 54–62. doi: https://doi.org/10.5121/ijnlc.2015.4405 [10] Haripriya, P., Porkodi, R. (2016). A Survey Paper on Data mining Techniques and Challenges in Distributed DICOM. International Journal of Advanced Research in Computer and Communication Engi- neering, 5 (3), 741–747. [11] International Ethnobotany Database. Available at: https://olorien.org/ebDB [12] Prelude Medicinal Plants Database. Available at: https://www.africamuseum.be/research/col- lections_libraries/biology/prelude [13] FRLHT Encyclopedia of Indian Medicinal Plants. Available at: http://www.frlht.org/newenvis/ indian-medicinalplants-database.php [14] TradiMed. References Available at: http://www.tradimed.com/ [15] Dr Duke’s Phytochemical and Ethnobotanical Databases Available at: https://phytochem nal 14] TradiMed. Available at: http://www.tradimed.com/ [14] TradiMed. Available at: http://www.tradimed.com/ [15] Dr. Duke’s Phytochemical and Ethnobotanical Databases. Available at: https://phytochem.nal. usda.gov/phytochem/search [15] Dr. Duke’s Phytochemical and Ethnobotanical Databases. Available at: https://phytochem.nal. usda.gov/phytochem/search [16] A Modern Herbal Database. Available at: http://www.botanical.com/botanical/mgmh/mgmh.html [17] NAPRALERT. Available at: https://napralert.org/ [17] NAPRALERT. Available at: https://napralert.org/ [18] Native American Ethnobotany. Available at: http://naeb.brit.org/ [18] Native American Ethnobotany. Available at: http://naeb.brit.org/ [19] Mehtiyeva, N. (2013). Importance database of medicinal plants for plant biodiversity conserva- tion in Azerbaijan. International conference, Environmental changes conservation of plant diversity. 24 24
https://openalex.org/W3108253228
https://www.emerald.com/insight/content/doi/10.1108/IJOPM-09-2020-832/full/pdf?title=operations-adding-value-to-society
English
null
Operations adding value to society
International journal of operations & production management
2,020
cc-by
5,141
Operations adding value to society Operations adding value to society Markku Kuula Department of Information and Service Management, School of Business, Aalto University, Espoo, Finland Stefan Seuring Department of Supply Chain Management, University of Kassel, Kassel, German, and Constantin Blome Revised 4 November 2020 23 November 2020 Accepted 23 November 2020 Stefan Seuring Department of Supply Chain Management, University of Kassel, Kassel, German, and Constantin Blome Revised 4 November 2020 23 November 2020 Accepted 23 November 2020 School of Business, Management and Economics, University of Sussex, Falmer, UK Operations adding value to society Gy€ongyi Kovacs Humanitarian Logistics and Supply Chain Research Institute (HUMLOG Institute), Hanken School of Economics, Helsinki, Finland Markku Kuula Department of Information and Service Management, School of Business, Aalto University, Espoo, Finland Stefan Seuring Department of Supply Chain Management, University of Kassel, Kassel, German, and Constantin Blome School of Business Management and Economics University of Sussex Falmer UK Operations adding value to society 1293 Received 29 October 2020 Revised 4 November 2020 23 November 2020 Accepted 23 November 2020 The current issue and full text archive of this journal is available on Emerald Insight at: https://www.emerald.com/insight/0144-3577.htm Operations adding value to society Gy€ongyi Kovacs Humanitarian Logistics and Supply Chain Research Institute (HUMLOG Institute), Hanken School of Economics, Helsinki, Finland Markku Kuula Department of Information and Service Management, School of Business, Aalto University, Espoo, Finland Stefan Seuring Department of Supply Chain Management, University of Kassel, Kassel, German, and Constantin Blome School of Business Management and Economics University of Sussex Falmer UK Operations adding value to society 1293 Received 29 October 2020 Revised 4 November 2020 23 November 2020 Accepted 23 November 2020 The current issue and full text archive of this journal is available on Emerald Insight at: https://www.emerald.com/insight/0144-3577.htm The current issue and full text archive of this journal is available on Emerald Insight at: https://www.emerald.com/insight/0144-3577.htm © Gy€ongyi Kovacs, Markku Kuula, Stefan Seuring and Constantin Blome. Published by Emerald Publishing Limited. This article is published under the Creative Commons Attribution (CC BY 4.0) licence. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this licence may be seen at http://creativecommons.org/licences/by/4.0/legalcode Publishers note: The publisher would like to inform readers that the editorial article, ‘Kovacs, G., Kuula, M., Seuring, S. and Blome, C. (2020), “Guest editorial”, International Journal of Operations & Production Management, Vol. 40 No. 9, pp. 1293-1299. https://doi.org/10.1108/IJOPM-09-2020-832’ was mistakenly published as non-article content. This error was introduced as part of the production process, and the publisher sincerely apologizes for this error.The article should be cited as Kovacs, G., Kuula, M., Seuring,S. and Blome, C. (2020), “Operations Adding Value to Society”, International Journal of Operations & Production Management, Vol. 40 No. 9, pp. 1293-1300. https://doi.org/10.1108/IJOPM-09-2020-832. Abstract Purpose – The purpose of this article is to discuss the role of operations management in society. The article detects trends, raises critical questions to operations management research and articulates a research agenda to increase the value of such research in addressing societal problems. Design/methodology/approach – This paper evaluates the papers presented at the EurOMA 2019 conference to detect trends and discuss the contributions of operations management research to society. It further goes to identify gaps in the research agenda. Findings – The article finds several important streams of research in operations management: sustainable operations and supply chains, health care and humanitarian operations, innovation, digitalisation and 4.0, risk and resilience. It highlights new trends such as circular economy research and problematises when to stop implementing innovation and how to address and report their potential failure. Importantly, it shows how it is not just a question of offshoring vs reshoring but of constant change in manufacturing that operations management addresses. Originality/value – The article highlights not just novel research areas but also gaps in the research agenda where operations management seeks to add value to society. Paper type Research paper Paper type Research paper “Operations Adding Value to Society” was the theme of the 26th conference of the European Operations Management Association (EurOMA). The idea behind the theme was to extend previous conference themes beyond manufacturing and services to wider societal and community implications and impact. The conference theme highlighted a move beyond goods manufacturing to considerations of the shared economy, the circular economy, and also, to critical infrastructure and supply chains. EurOMA has had a tradition of tracks in © Gy€ongyi Kovacs, Markku Kuula, Stefan Seuring and Constantin Blome. Published by Emerald Publishing Limited. This article is published under the Creative Commons Attribution (CC BY 4.0) licence. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this licence may be seen at http://creativecommons.org/licences/by/4.0/legalcode Publishers note: The publisher would like to inform readers that the editorial article, ‘Kovacs, G., Kuula, M., Seuring, S. and Blome, C. (2020), “Guest editorial”, International Journal of Operations & Production Management, Vol. 40 No. 9, pp. 1293-1299. https://doi.org/10.1108/IJOPM-09-2020-832’ was mistakenly published as non-article content. International Journal of Operations & Production Management Vol. 40 No. 9, 2020 pp. 1293-1300 Emerald Publishing Limited 0144-3577 DOI 10.1108/IJOPM-09-2020-832 Abstract This error was introduced as part of the production process, and the publisher sincerely apologizes for this error.The article should be cited as Kovacs, G., Kuula, M., Seuring,S. and Blome, C. (2020), “Operations Adding Value to Society”, International Journal of Operations & Production Management, Vol. 40 No. 9, pp. 1293-1300. https://doi.org/10.1108/IJOPM-09-2020-832. International Journal of Operations & Production Management Vol. 40 No. 9, 2020 pp. 1293-1300 Emerald Publishing Limited 0144-3577 DOI 10.1108/IJOPM-09-2020-832 various industries, and this theme specifically welcomed also health care operations, humanitarian operations and public sector management. Notwithstanding the more outspoken humanitarian operations topic, who would have thought this to be one of the last face-to-face events of the association for such a while? While it was wonderful to see the full auditorium that even had to be streamed to another room for people to follow, our congratulations go to the conference organisers in 2020 who managed such a lively online conference during the current pandemic! 1294 The 26th conference of the EurOMA was jointly hosted by the Aalto University Business School, Hanken School of Economics and the HUMLOG Institute, in Helsinki, Finland, 15–20 June 2019. “Operations adding value to society” strongly relates to the research at our universities, but also to the mandate of universities, and of research, to impact on society. This was the more emphasised by the rector of the Hanken School of Economics, Karen Spens, herself a professor in supply chain management, who gave the opening keynote at the conference on how to use operations management principles when leading a university. After all, service operations, but also total quality management, come together in the continuous improvement efforts of universities as well. The dissemination of knowledge at conferences, the outreach to society and the interaction with society are key to operations management. As for us organisers, we considered organising EurOMA as a way to pay back our debts to the EurOMA community and taking a more active role. We are still incredibly proud of all the reviewers of the conference who supported us in getting the review process done ahead of time! Operations management seeks to have an impact on business and is crucial to the economic bottom line of companies but also plays an important role in making operations sustainable, in relating to the environment and to society. The very impact of research is something the next keynote, Prof. Informing the operations management research agenda The conference theme of “Operations Adding Value to Society” was well represented in the tracks with most submissions, which were the sustainability track (50 papers), SCM (46 papers), health care operations (33), innovation, product and service development (21), and risk and resilience (19). Interestingly, sustainability papers even outnumbered the traditionally strong supply chain management track. A somewhat different picture emerges if analysing paper titles for keywords: according to this, 25 papers focussed on digitalisation, with another 16 on industry 4.0, compared to 14 papers on various food-related operations, 12 on blockchain, 8 on big data as well as 8 on the circular economy. Digitalisation and technology were also embraced by the teaching operations track where one could for example visit a French warehouse virtually from the conference in Finland. This is arguably even more important now in the age of distance education. Let us analyse the track as well as prominent cross-cutting keywords for some highlights for the current and future operations management research agenda. Abstract Janet Godsell, underscored when talking about engaged scholarship and the “time for a rethink” in operations and supply chain management through storytelling, videos, art and social media. Societal impact was even at the heart of the reception at the Helsinki city, where the deputy mayor emphasises the importance of operations to the city’s mantra of making Helsinki the “most functional” city. Yet another angle to it came through the practitioner keynote, with Kalle L€o€ovi, the head of international operations of the Finnish Red Cross, sharing his stories and perspective on humanitarian operations, according to which, occasionally, Finnish midsummer can cause supply chain disruptions in Yemen. But EurOMA 2019 was not just about talking about societal impact but about making one. Minimising the ecological footprint, there were no prints nor conference bags but an app, no buses but walking around the city, no bottled water but vegetarian and vegan meals with flowers on dessert. New rules were applied to all panels and special sessions, which required people to come together from various countries, and have representatives of both genders. Some of the new sessions truly embraced the conference theme, with there being one on increasing the relevance and reach of O&SCM research; and another hands-on workshop on the bottom-up nurturing of an inclusive operations management community. It is high time for our discipline to embrace scholars of diverse backgrounds, in the veins of Black Lives Matter. Being in Europe, EurOMA itself has made quite an effort to include scholars from the “Danube” section, building bridges rather than walls. Where else is that better placed than in Helsinki, the neutral city where East meets West? The story does not end there. The programme finished with industry visits to the Science Centre Heureka, and the new cargo terminal of Finnair Cargo. At the conference, the outgoing EurOMA president Giovanni Perrone also passed the baton the incoming president Taco van der Vaart. Besides embracing Finnish oddities from bird karaoke to playing air guitar at the conference dinner, let us have a more serious look at the implications of the 26th EurOMA conference for the operations management research agenda. Operations adding value to society Operations adding value to society implications of the 26th EurOMA conference for the operations management research agenda. Sustainable operations and supply chains Two streams of sustainable operations research were particularly prominently represented at the conference: (1) the sustainability of agri-food supply chains and (2) circular economy research. The interest in agri-food supply chains spans both a variety of types of food (especially cocoa, coffee, but also whitefish) but also the entire supply chain. Interestingly, it was not only the sustainable performance of these supply chains and especially of food retail that was in the limelight, but more in detail, questions of fairness in retailer-led greening, or incentive alignment for collaborative carbon reduction. Research has also moved on to more concrete questions such as shelf-life-based inventory management, household food waste flows and how to enhance the last mile in grocery e-commerce. Overall, it can be stated that sustainability questions in this industry have gone beyond mere mission statements and have started to be addressed more seriously also empirically, and in detail. This is no surprise, as food and food supply chains affect every single person on the planet. The aspect of value to society starts to emerge by including performance measures that also capture environmental and social impacts. This gives hope for the potential impact of this research as well, where the impacts such supply chain have in emerging economies and at the base-of-the-pyramid still offers many research opportunities y pp The same applies to circular economy research. Conceptual papers notwithstanding, the circular economy has evolved from being a buzzword to research on its implementation. Conference papers reported on specific applications, from manufacturing in Norway, to the offshore wind energy sector. Beyond the use of the circular economy concept as yet another way to describe reverse logistics and closed loop supply chains, by now, research has moved on to embracing its novel aspects of the sharing economy (from truck sharing and bike sharing to new product-service systems), upcycling and product development overall, and the new business models the concept gives rise to. Even more to the point were the specifics of loop flows and networks in the circular economy, the purchasing of remanufactured materials, and the mitigation of intertemporal tensions in the circular economy. Relating again to the topic of “Operations adding Value to Society” the circular supply chains have to take all aspects of value into account, thereby moving beyond narrowly defined operational measures. Sustainable operations and supply chains Health care and humanitarian operations Following a long tradition, lean health care and health supply chain integration were rather prominent at the conference. Health care operations are often characterised by their complexity, and by multiple organisations being involved in the care of a single patient. Thus, there is a general strong focus on patient flows, care pathways, as well as process improvements across these myriads of organisations, and the modules of care they provide. Digitalisation in health, and the operational adoption and scalability of medical technology have also become rather classic topics by now. This was interspersed with a few new topics, from applying sharing economy principles to health care, to mapping the hospital supply chain of medical consumables, and even calculating the CO2 emissions of mobile health care units. Given the current global pandemic, such research is particularly relevant and impactful. Not understanding the operation and supply chain logic puts many lives at risk. Health care and humanitarian operations 1296 The humanitarian operations section of the conference on the other hand is still less established; which shows in the abundance of conceptual rather than empirical papers. The focus drifts from the big picture looking at hunger, gender (in)equality, GDP and the environment; to climate science in humanitarian supply chains. The section has started to embrace more theoretical approaches, such as the social capital lens on humanitarian supply chains. These topics certainly set the agenda for research to come; but the devil is in the detail and the data. Few papers at the conference stand out with empirical studies, though the relevance and impact of research also in this sector will come with that. Hence, collecting data in such settings, often taking place in emerging and developing countries are encouraged. Innovation, digitalisation and Industry 4.0 As innovation literature goes, we cannot be but fascinated with novel fashion styles and trends, and novel concepts, of course. It was about time to investigate the value of social media to the supply chain, or how to split team rewards in supply chain innovation. One would expect the innovation section of the conference to be the most innovative, of course. That may be the case conceptually, but the overwhelming majority of systematic literature reviews rather highlight the still outstanding gaps and rarely go beyond mission statements. Blockchain as well as drones are still searching for their potential application. As one paper title amply puts it, if blockchain is the answer, what is the question? It is not much a surprise, that again a lack of empirical data can be observed. Here, we hope that companies implementingsuch solutionswouldbenefitfromtheresearch athand, butalsobe willing toallow us insights into their operations, so to learn and abstract from single cases. Given the huge potential and impact of digital technologies on many people’s lives, this could be of great societal impact. Digitalisation is perhaps too broad a term for the variety of operations management research that it covers. Papers referring to digitalisation investigated the traceability of pharmaceuticals; the performance of manufacturing networks, the use of 3D models in the workplace or the supply chain of satellite imagery. What stays quite open seems to be the link to some of the already mentioned tracks, such as the impact digitalisation has on sustainability, on health care operations or on humanitarian supply chains, but also into risk and resilience issue addressed in the next section. This seems to be a field warranting future research. Other earlier buzzwords have come a long way. Additive manufacturing has now been studied in its application. Industry 4.0, often combined with leanness, has been evaluated in various countries and industries. There are case studies from Central and Eastern Europe, Operations adding value to society impact measurements on buyer–supplier relationships and even board games to teach Industry 4.0 to enable the next industrial revolution. We cannot wait to see these results published in good journals. impact measurements on buyer–supplier relationships and even board games to teach Industry 4.0 to enable the next industrial revolution. We cannot wait to see these results published in good journals. Operations adding value to society 1297 1297 Risk and resilience Risk and resilience Studies in risk and resilience tackle operational glitches to larger risks. From an operational perspective, studies were presented on the risk and resilience in export, contingencies in emerging economies, risks in food and vegetable transportation, food loss and waste, to the procedural integration of spare parts in material flows. Different approaches are also highlighted in managing these, from predictive analytics, to buffering vs bridging, to the use of relational capital in the supply chain. p pp y Some larger risks were either predictable or have already occurred, with studies addressing their aftermath. These include the imminence of Brexit, or the evolution of the Egyptian tourism industry after the Arab spring. The bigger picture further extends to resilience with regards to natural disasters, environmental risk management, food safety risks and more novel to this year, the focus on modern slavery in the supply chain. Others question the tensions between sustainability and resilience, or address the very risks of Industry 4.0 applications. An interesting common theme could be observed in the focus on changes in operations, whether form public to private, or from own to outsourced. An increasing number of papers were focussing on reshoring rather than offshoring from a risk management perspective. This is to stress that reshoring has been on the (research) agenda for a while and is not in fact just a consequence of the current pandemic. Perhaps most interesting is the approach from one of the papers focussing on how to manage the continuous migration of manufacturing locations in the supply chain. The actual change of out- vs insourcing, off- vs reshoring may be different over time, what is constant is change itself and that is worth focussing on in operations management research. Innovation, digitalisation and Industry 4.0 With the maturing of innovation, one of the more interesting questions becomes when to stop the implementation of an innovation, and how to evaluate supplier development initiatives that have failed. This is a research area that would deserve more interest. Finally, the selected few – the papers in this special issue Finally, the selected few the papers in this special issue A total of 561 presenters came from 44 countries to the conference, with presentations of 409 papers taking place in 20 parallel tracks. It is always difficult to summarise a conference in a few words or to select the creme de la creme of papers for a special issue. Luckily there are the award nominations that guide the selection, apart from journal editors attending the conference and spotting interesting papers and results. In 2019, 231 papers wanted to be considered for the Chris Voss Award, 79 of which had received the highest ratings by both reviewers. A further 170 papers wanted to be considered for the Harry Boer Award, with 61 receiving highest rates and 15 for the Nigel Slack Award, with five receiving highest ratings. The tremendous work of the award committees in their selections of further shortlists and winners was then combined with further readings of the proceedings to shortlist 35 papers, of which 15 were finally selected for further review for the special issue. It is of course based on this review that we can now present the final few that have also survived the rigour of the review process. At the end, they now give quite an interesting snapshot of both established and novel topics at the pulse of time. Silvestre et al.’s (2020) article on “Supply chain sustainability trajectories: learning through sustainability initiatives” studies five supply chains from quite different industries, and the evolution of their sustainability considerations over time. Based on contingency theory, they develop a framework that categorises these trajectories in terms of path dependence between sustainability orientation and the implementation of sustainability initiatives and the capabilities of supply chain members to embrace and learn from these. The framework helps in singling out the triggers that have led these supply chains to embark on their sustainability trajectory, as well as the supply chain partnerships that were required for their implementation. Rather than merely categorising the supply chains in the end, the framework is also used to illustrate different elements of these trajectories within these supply chains and contrast differing viewpoints in the supply chain that may distort the outcomes of sustainability initiatives. 1298 Fracarolli Nunes, Lee Park and Paiva (2020) ask the important question of “Can we have it all?” when examining “Sustainability trade-offs and cross-insurance mechanisms in supply chains”. Finally, the selected few – the papers in this special issue The focus on insurance and cross-insurance mechanisms in corporate social responsibility is certainly novel and adds to the estimation of corporate credibility and reputation. Through their study in the food industry, they show how sustainability trade-offs impact on different supply chain members differently. This further leads to hierarchies amongst sustainability objectives in the supply chain as a move away from the triple bottom line. It seems we cannot have our cake and eat it, too. Liu et al. (2020) posit a different question in “When do 3PLs initiate low-carbon supply chain integration?”. They discover a paradox of the social network in this regard, where 3PLs that were more embedded in their network, and more integrated with their customers, had less room to lead and implement their own decarbonisation initiatives. On the other hand, low carbon supply chain integration has a positive effect on the 3PL’s firm performance, but also, 3PLs have a critical role to play as the orchestrators of such integration regardless of their degree of embeddedness in the network. Peters et al. (2020) present the findings from the Chris Voss award-winning paper when “Elaborating on modular interfaces in multi-provider contexts” in health care operations. They look at the various closed vs open interfaces between health care providers and customers and across health care providers and investigate cases where the delivery of integrated patient care was jeopardised. Service modularity is used to understand the types of interfaces in multi-provider contexts. Stefanini et al. (2020) embraced Finnish silence in their article “Silence is golden: The role of team coordination in health operations”. They report the findings from a study of routine surgeries where health care professionals wear devices monitoring every of their moves The study focusses on implicit, non-verbal, vs explicit, verbal communication and finds that the lower the use of explicit communication, the higher a surgical team performs. That said, implicit communication occurs where team members can anticipate the behaviour of one another. Thus, team cohesion and soft skills decrease the risk for glitches. The study by Schiffling et al. (2020) on the “Coopetition in temporary contexts: examining swift trust and swift distrust in humanitarian operations” was one of the few empirical studies in humanitarian operations at the conference. Operations adding value to society Cotta, D. and Salvador, F. (2020), “Exploring the antecedents of organizational resilience practices – a transactive memory systems approach”, International Journal of Operations and Production Management, Vol. 40 No. 9, pp. 1531-1559. Famous last words Combined, the conference papers and their topics are a good reflection of the current research interests of the operations management community. Albeit conference abstract reviews are not quite the same as is then the peer review process of a journal – also the one for this special issue – a conference still provides a quick glimpse of what is current, topical and which insights are to come, quite a long time ahead of the articles being published. Attending scientific conferences such as EurOMA will continue to be of importance, whether we need to continue doing so virtually or can do so in person. At the end, when it comes to the final papers selected for this special issue, they embrace International Journal of Operations & Production Management’s new mantra of being bold or italic in operations management research – but to stand out in quality, rigour and relevance. The latter is the more important for leaving our mark in society. Operations management may sound mechanic and technical at times, but at the end of the day, it is what makes our world work, albeit from the backstage. Let us end with a quote from Kalle L€o€ovi’s keynote at EurOMA 2019: “Supply chains are solidarity chains”. Now more than ever. Fabbe-Costes, N., Lechaptois, L. and Spring, M. (2020), “The map is not the territory’: a boundary objects perspective on supply chain mapping”, International Journal of Operations and Production Management, Vol. 40 No. 9, pp. 1475-1497. 1299 Cotta and Salvador (2020) on the other hand, focus on more operational aspects of organisational resilience in their article “Exploring the antecedents of organizational resilience practices – a transactive memory systems approach”. Apart from investigating the antecedents of resilience practices, they further combine these with the individual characteristics of managers (heads of manufacturing) to understand their decisions when faced with operational disruptions. In the end, transactive memory systems are a combination of individual and firm capabilities. p Sousa and da Silveira’s (2020) “Advanced services and differentiation advantage: An empirical investigation” investigate a rather classical operations management topic. The servitisation of manufacturing industries supposedly brings great potential for market differentiation; which is corroborated here as well. Interestingly, servitisation itself is influenced by market complexity, however; indicating that it is more of a strategic move rather than a reaction to the market. On a further important note, the article also addresses the shortcomings of the IMSS data it uses as a basis of the study, which are important to bear in mind when using it. Finally, the selected few – the papers in this special issue In this study, they expand on a previous study on swift trust by including also swift distrust in their scope and find evidence for the development of both in situations with a limited set of co-operation partners. The same operations are characterised by high uncertainty and interdependence, which is why it is the more interesting that swift distrust can in fact aid in managing uncertainty, enable co-opetitive relationships and contribute to risk management. Fabbe-Costes et al. (2020) put supply chain mapping back on the agenda in their article on “‘The map is not the territory’: a boundary objects perspective on supply chain mapping”. There are so many different approaches to supply chain mapping that even in the same company, no two maps look alike. Boundary objects are used to overcome differences and align the understanding of a map and its purpose, in order to be able to increase its usefulness. Operations adding value to society The study by Roscoe et al. (2020) puts the spotlight on the imminent event that was most discussed in the corridors of the conference: Brexit. “Managing supply chain uncertainty arising from geopolitical disruptions: Evidence from the pharmaceutical industry and Brexit” follows a particular industry in its journey to manage the already foreseeable supply chain disruptions. The study contrasts the approaches and possibilities of MNEs and SMEs in this regard, finding, perhaps less surprisingly, that approaches vary across company size, with larger companies having more resources at their availability to cope with a disruption. Apart from the use of tangible resources such as additional inventory, capacity and assets; the study highlights the importance of intangible ones such as the investment of management time and knowledge acquisition to reduce uncertainties related to the disruption. 1299 References Cotta, D. and Salvador, F. (2020), “Exploring the antecedents of organizational resilience practices – a transactive memory systems approach”, International Journal of Operations and Production Management, Vol. 40 No. 9, pp. 1531-1559. Fabbe-Costes, N., Lechaptois, L. and Spring, M. (2020), “The map is not the territory’: a boundary objects perspective on supply chain mapping”, International Journal of Operations and Production Management, Vol. 40 No. 9, pp. 1475-1497. Fracarolli Nunes, M., Lee Park, C. and Paiva, E.L. (2020), “Can we have it all? Sustainability trade-offs and cross-insurance mechanisms in supply chains”, International Journal of Operations and Production Management, Vol. 40 No. 9, pp. 1339-1366. Liu, X., Xian, C. and Wang, S. (2020), “When do 3PLs initiate low-carbon supply chain integration?”, International Journal of Operations and Production Management, Vol. 40 No. 9, pp. 1367-1395. Peters, V., V€ah€atalo, M., Meijboom, B., Barendregt, A., Bok, L. and de Vries, E. (2020), “Elaborating on modular interfaces in multi-provider contexts”, International Journal of Operations and Production Management, Vol. 40 No. 9, pp. 1397-1419. 1300 Roscoe, S., Skipworth, H., Aktas, E. and Habib, F. (2020), “Managing supply chain uncertainty arising from geopolitical disruptions: evidence from the pharmaceutical industry and Brexit”, International Journal of Operations and Production Management, Vol. 40 No. 9, pp. 1499-1529. Schiffling, S., Hannibal, C., Fan, Y. and Tickle, M. (2020), “Coopetition in temporary contexts: examining swift trust and swift distrust in humanitarian operations”, International Journal of Operations and Production Management, Vol. 40 No. 9, pp. 1449-1473. Silvestre, B., Silva, M.E., Cormack, A. and Tavares Thome, A.M. (2020), “Supply chain sustainability trajectories: learning through sustainability initiatives”, International Journal of Operations and Production Management, Vol. 40 No. 9, pp. 1301-1337. Sousa, R. and da Silveira, G. (2020), “Advanced services and differentiation advantage: an empirical investigation”, International Journal of Operations and Production Management, Vol. 40 No. 9, pp. 1561-1587. Stefanini, A., Aloini, D. and Gloor, P. (2020), “Silence is golden: the role of team coordination in health operations”, International Journal of Operations and Production Management, Vol. 40 No. 9, pp. 1421-1447. Corresponding author G i  b Gy€ongyi Kovacs can be contacted at: kovacs@hanken.fi For instructions on how to order reprints of this article, please visit our w www.emeraldgrouppublishing.com/licensing/reprints.htm Or contact us for further details: permissions@emeraldinsight.com
https://openalex.org/W3131547510
https://publications.goettingen-research-online.de/bitstream/2/84914/1/1-s2.0-S1535947621000347-main.pdf
English
null
Protein Phosphorylation in Depolarized Synaptosomes: Dissecting Primary Effects of Calcium from Synaptic Vesicle Cycling
Molecular & cellular proteomics
2,021
cc-by
21,567
In Brief Analysis of protein phosphorylation in isolated nerve terminals (synaptosomes) treated with C. botulinum neurotoxins (BoNT) to inhibit synaptic vesicle (SV) cycling reveals phosphorylation events that are primarily dependent on depolarization-induced Ca2+ influx and those that also require active SV-cycling machinery. In particular, SV-cycling-dependent phosphorylation sites on synaptobrevin (Vamp2), syntaxin-1 (Stx1a), and cannabinoid receptor-1 (Cnr1) are capable of changing the rate of exo- and endocytosis in cultured hippocampal neurons. Depolarized Synaptosomes SV-cycling-dependent Phosphorylation Sites Primary Ca2+-dependent Phosphorylation Sites LC-MS/MS Protein Phosphorylation in Depolarized Synaptosomes: Dissecting Primary Effects of Calcium from Synaptic Vesicle Cycling Authors Ivan Silbern, Kuan-Ting Pan, Maksims Fiosins, Stefan Bonn, Silvio O. Rizzoli, Eugenio F. Fornasiero, Henning Urlaub, and Reinhard Jahn Graphical Abstract Correspondence efornas@gwdg.de; henning. urlaub@mpibpc.mpg.de; rjahn@gwdg.de Ca2+ K+ Ca2+ K+ BoNT TiO2 P P P PP SV-cycling-dependent Phosphorylation Sites Primary Ca2+-dependent Phosphorylation Sites LC-MS/MS Depolarized Synaptosomes rjahn@gwdg.de In Brief Analysis of protein phosphorylation in isolated nerve terminals (synaptosomes) treated with C. botulinum neurotoxins (BoNT) to inhibit synaptic vesicle (SV) cycling reveals phosphorylation events that are primarily dependent on depolarization-induced Ca2+ influx and those that also require active SV-cycling machinery. In particular, SV-cycling-dependent phosphorylation sites on synaptobrevin (Vamp2), syntaxin-1 (Stx1a), and cannabinoid receptor-1 (Cnr1) are capable of changing the rate of exo- and endocytosis in cultured hippocampal neurons. Ca2+ K+ Ca2+ K+ BoNT TiO2 P P P PP SV-cycling-dependent Phosphorylation Sites Primary Ca2+-dependent Phosphorylation Sites LC-MS/MS Depolarized Synaptosomes Ca2+ K+ Ca2+ K+ BoNT TiO2 P P P PP SV-cycling-dependent Phosphorylation Sites Primary Ca2+-dependent Phosphorylation Sites LC-MS/MS Depolarized Synaptosomes RESEARCH RESEARCH 2021, Mol Cell Proteomics 20, 100061 © 2021 THE AUTHORS. Published by Elsevier Inc on behalf of American Society for Biochemistry and Molecular Biology. This is an open access article under the CC BY license (http://creativecommons.org/ licenses/by/4.0/). https://doi.org/10.1016/j.mcpro.2021.100061 Ivan Silbern1,2 , Kuan-Ting Pan2 , Maksims Fiosins3,4, Stefan Bonn3,4 , Silvio O. Rizzoli5,6 , Eugenio F. Fornasiero5,* , Henning Urlaub1,2,* , and Reinhard Jahn7,* Ivan Silbern1,2 , Kuan-Ting Pan2 , Maksims Fiosins3,4, Stefan Bonn Silvio O. Rizzoli5,6 , Eugenio F. Fornasiero5,* , Henning Urlaub1,2,* , a Synaptic transmission is mediated by the regulated exocytosis of synaptic vesicles. When the presynaptic membrane is depolarized by an incoming action potential, voltage-gated calcium channels open, resulting in the influx of calcium ions that triggers the fusion of synaptic vesicles (SVs) with the plasma membrane. SVs are recy- cled by endocytosis. Phosphorylation of synaptic proteins plays a major role in these processes, and several studies have shown that the synaptic phosphoproteome changes rapidly in response to depolarization. However, it is un- clear which of these changes are directly linked to SV cycling and which might regulate other presynaptic func- tions that are also controlled by calcium-dependent ki- nases and phosphatases. To address this question, we analyzed changes in the phosphoproteome using rat synaptosomes in which exocytosis was blocked with botulinum neurotoxins (BoNTs) while depolarization- induced calcium influx remained unchanged. BoNT- treatment significantly alters the response of the synap- tic phoshoproteome to depolarization and results in reduced phosphorylation levels when compared with stimulation of synaptosomes by depolarization with KCl alone. We dissect the primary Ca2+-dependent phos- phorylation from SV-cycling-dependent phosphorylation and confirm an effect of such SV-cycling-dependent phosphorylation events on syntaxin-1a-T21/T23, synapto- brevin-S75, and cannabinoid receptor-1-S314/T322 on exo- and endocytosis in cultured hippocampal neurons. the presynaptic compartment (1). When an action potential arrives in the nerve terminal, the presynaptic membrane de- polarizes, which elicits a rapid influx of calcium ions through voltage-dependent calcium channels clustered around the active zone, an electron-dense protein complex connecting the presynaptic release site with the neurotransmitter re- ceptors in the postsynaptic membrane (2). Major protein constituents of the active zone include RIM proteins, RIM- binding protein, and Munc13, as well as bassoon, piccolo, and liprins. Among other functions, these proteins are required for the clustering of calcium channels and govern the priming and docking of SVs. The calcium ions entering the presynapse are recognized by the calcium-sensor synaptotagmin 1 that triggers exocytosis by lowering the energy barrier for fusion. Exocytotic fusion itself is accomplished by soluble N-ethyl- maleimide-sensitive factor-attachment protein receptors (SNARE) (3–6). This process requires additional cytoplasmic proteins, such as Munc18 and complexins, which modulate the efficiency of SNARE zippering (7, 8). Highlights • KCl-depolarization induces phosphoproteome changes in isolated nerve terminals (synaptosomes). • KCl-depolarization induces phosphoproteome changes in isolated nerve term • KCl-depolarization induces phosphoproteome changes in isolated nerve terminals (synaptosomes). • Botulinum neurotoxin affects protein phosphorylation in depolarized synaptosomes. • Botulinum neurotoxin affects protein phosphorylation in depolarized synaptosomes. ulinum neurotoxin affects protein phosphorylation in depolarized synaptosomes. • BoNT treatment reveals phosphorylation sites that depend on SV-cycling activity. • BoNT treatment reveals phosphorylation sites that depend on SV-cycling • BoNT treatment reveals phosphorylation sites that depend on SV-cycling activity. • SV-cycling-dependent sites on Vamp2, Stx1a, and Cnr1 affect exo- and endocytosis. • SV-cycling-dependent sites on Vamp2, Stx1a, and Cnr1 affect exo- and endocytosis. • SV-cycling-dependent sites on Vamp2, Stx1a, and Cnr1 affect exo- and endocytosis. RESEARCH From the 1Institute of Clinical Chemistry, University Medical Center Goettingen, Goettingen, Germany; 2Bioanalytical Mass Spectrometry Group, Max Planck Institute for Biophysical Chemistry, Goettingen, Germany; 3German Center for Neurodegenerative Diseases, Tübingen, Germany; 4Institute for Medical Systems Biology, University Medical Center Hamburg-Eppendorf, Hamburg, Germany; 5Department of Neuro- and Sensory Physiology, University Medical Center Göttingen, Göttingen, Germany; 6Cluster of Excellence “Multiscale Bioimaging: from Molecular Machines to Networks of Excitable Cells” (MBExC), University of Goettingen, Göttingen, Germany; and 7Laboratory of Neurobiology, Max Planck Institute for Biophysical Chemistry, Göttingen, Germany *For correspondence: Eugenio F Fornasiero efornas@gwdg de; Henning Urlaub henning urlaub@mpibpc mpg de; Reinhard Jahn Ivan Silbern1,2 , Kuan-Ting Pan2 , Maksims Fiosins3,4, Stefan Bonn3,4 , Silvio O. Rizzoli5,6 , Eugenio F. Fornasiero5,* , Henning Urlaub1,2,* , and Reinhard Jahn7,* In order to sustain continuous neurotransmitter release and to maintain the structure and composition of the plasma membrane, fused SVs are retrieved by endocytosis, followed by rapid regeneration of SV precursors that are filled with neurotransmitters and prepared for the next round of neuro- transmitter release. It is still debated which mechanisms are primarily responsible for endocytosis and recycling, with several occurring in parallel (9–16). The classical pathway of clathrin-mediated endocytosis requires coordinated actions of a protein machinery responsible for coat formation, invagina- tion, and formation of a coated pit, followed by scission, removal of the vesicle from the plasma membrane, and In the nervous system, synapses represent specialized cellular junctions that are able to transmit signals from the presynaptic to the postsynaptic neuron. Signaling is mediated by the release of neurotransmitter molecules that are stored in j g g Present address for Kuan-Ting Pan: Frankfurt Cancer Institute, Goethe University, D-60596, Frankfurt am Main, Germany; Hematology/ Oncology, Department of Medicine II, Johann Wolfgang Goethe University, D-60590 Frankfurt am Main, Germany. Mol Cell Proteomics (2021) 20 100061 1 © 2021 THE AUTHORS. Published by Elsevier Inc on behalf of American Society for Biochemistry and Molecular Biology. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/). https://doi.org/10.1016/j.mcpro.2021.100061 From the 1Institute of Clinical Chemistry, University Medical Center Goettingen, Goettingen, Germany; 2Bioanalytical Mass Spectrometry Group, Max Planck Institute for Biophysical Chemistry, Goettingen, Germany; 3German Center for Neurodegenerative Diseases, Tübingen, Germany; 4Institute for Medical Systems Biology, University Medical Center Hamburg-Eppendorf, Hamburg, Germany; 5Department of Neuro- and Sensory Physiology, University Medical Center Göttingen, Göttingen, Germany; 6Cluster of Excellence “Multiscale Bioimaging: from Molecular Machines to Networks of Excitable Cells” (MBExC), University of Goettingen, Göttingen, Germany; and 7Laboratory of Neurobiology, Max Planck Institute for Biophysical Chemistry, Göttingen, Germany *For correspondence: Eugenio F. Fornasiero, efornas@gwdg.de; Henning Urlaub, henning.urlaub@mpibpc.mpg.de; Reinhard Jahn, rjahn@gwdg.de. Present address for Kuan-Ting Pan: Frankfurt Cancer Institute, Goethe University, D-60596, Frankfurt am Main, Germany; Hematology/ Oncology, Department of Medicine II, Johann Wolfgang Goethe University, D-60590 Frankfurt am Main, Germany. j g g Present address for Kuan-Ting Pan: Frankfurt Cancer Institute, Goethe University, D-60596, Frankfurt am Main, Germany; Hematology/ Oncology, Department of Medicine II, Johann Wolfgang Goethe University, D-60590 Frankfurt am Main, Germany. We stimulated mock- and BoNT-treated synapto- somes with potassium chloride, which is known to elicit dose- dependent Ca2+ influx and neurotransmitter release (56, 57). By quantitatively monitoring changes of phosphorylation sites of synaptosomal proteins, we found that BoNT treatment af- fects almost 1500 phosphorylation sites implying that they are directly dependent on SV cycling. Strikingly, most of the sites show reduced phosphorylation intensity in depolarized syn- aptosomes following BoNT treatment. We further identified SV-cycling-dependent phosphorylation sites on syntaxin-1a (Stx1a-T21, T23), synaptobrevin (Vamp2-S75), and cannabi- noid receptor-1 (Cnr1-T314, T322). Finally, we demonstrated that phosphorylation of these sites elicits a pronounced effect on exo- and endocytosis in cultured hippocampal neurons by expressing phosphomimetic and nonphosphorylatable vari- ants of these proteins. An increasing body of data suggests that the basic exo– endocytotic machinery is fine-tuned by regulatory control mechanisms that mainly operate by phosphorylations and dephosphorylations of proteins involved in the SV cycle. In particular, calcium plays an important role not only as a trigger of exocytosis, but also as a modulator of kinase and phosphatase activity in the presynapse (19). Calcium/ calmodulin-dependent kinase 2 (CaMKII) residing in synap- ses is one of the major targets activated by calcium influx (20–23). Its first known substrate was the SV resident protein synapsin-1, and it is now established that its phosphoryla- tion influences the available pool of SVs for exocytosis (24–26). Other kinases such as protein kinase C (PKC) and cyclin-dependent kinase 5 (CDK5) have been shown to be important for SV endocytosis and control, together with the calcium-dependent protein phosphatase calcineurin, the phosphorylation status of many endocytosis-associated proteins such as dynamin-1, amphiphysin, and AP180 (27–36). Mitogen-activated protein kinases (MAPK) appear to operate on parallel pathways as these can regulate syn- aptic plasticity either by directly modifying synaptic proteins (37, 38) or by affecting gene expression (39, 40), thereby contributing to both rapid and long-lasting modulatory effects. Earlier phosphoproteomics studies have shown system- atic changes in phosphorylation of synaptic proteins caused by depolarization-evoked calcium influx, and they have pointed to involvement of CaMKII and MAP kinases in this process (41, 42). However, it remains elusive which of the observed phosphorylation changes caused by calcium influx have a direct functional impact on SV cycling. Indeed, following the initial discovery of synapsin-1 phosphorylation, many studies have demonstrated that phosphorylation of specific synaptic proteins at specific sites does have an impact on exo- or endocytosis. © 2021 THE AUTHORS. Published by Elsevier Inc on behalf of American Society for Biochemistry and Molecular Biology. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/). Protein Phosphorylation in Depolarized Synaptosomes exocytosis (43–48). Munc18 phosphorylation can further be a result of the MAP kinase activation due to cannabinoid receptor-1 signaling (37); the latter was also shown to bear a phosphorylation site (Cnr1-S317) that is controlled by PKC (49). disassembly of the clathrin coat. Key proteins involved in these steps include, among others, clathrin adaptor proteins (AP2, AP180), clathrin itself, the GTPase dynamin-1, the phosphatase synaptojanin-1, endophilins, and related pro- teins, as well as the clathrin uncoating ATPase Hsc70 and its cofactor auxilin (17). Finally, re-endocytosed SVs are filled with the respective neurotransmitter by specific vesicular neuro- transmitter transporters that are fueled by the activity of a vacuolar proton pump (18). In this article, we refer to SV cycling as a multistep process, which includes SV fusion with the plasma membrane mediated by the exocytotic machinery (exocytosis) and SV recycling through available endocytotic mechanisms (endocytosis), followed by the steps in which SVs become ready for the next round of SV cycle (i.e., refilling of the neurotransmitter, SV priming, and docking). However, it remains to be established which of the vast amount of phosphosite changes observed in recent phos- phoproteomic studies are dependent on the membrane traf- ficking steps of the SV cycle and which are, while being targeted by the activated network of kinases and phospha- tases, not directly related to exo–endocytotic cycling. Changes in the protein conformation that accompany as- sembly and disassembly of multimolecular protein complexes during SV cycling may alter the accessibility of phosphoryla- tion sites as well as the availability of docking sites for kinases and phosphatases. To address this issue, we conducted a quantitative phosphoproteome analysis using synaptosomes as a functional model of the synapse. Synaptosomes contain the complete SV-cycling machinery, can maintain the mem- brane potential and ATP at physiological levels, and respond to depolarization by Ca2+-dependent neurotransmitter release (50–53). To differentiate between calcium-induced changes and phosphorylation events that are directly connected to SV cycling, we utilized botulinum neurotoxins (BoNT). These bacterial protein toxins represent a group of endoproteinases that selectively cleave individual SNARE proteins and thus block exocytosis and, consequently, SV recycling without compromising Ca2+ influx or synaptosomal ATP levels (54, 55). For instance, phosphoryla- tion of SNARE proteins (Snap25-S187, Stx1a-S14, S188, Vamp2-T35, S75), as well as of the SNARE-interacting pro- tein Munc18 (Stxbp1-S313), can indeed interfere with the formation of the SNARE complex, which results in altered EXPERIMENTAL PROCEDURES Ethical Statement All experiments involving animals complied with the regulations as designated in the section 4 of the Animal Welfare Law of the Federal Republic of Germany (section 4 Tierschutzgesetz der Bundesrepublik Deutschland, TierSchG). All experiments were conducted in the animal facility at the Max-Planck-Institute for Biophysical Chemistry, Göttin- gen, Germany, and registered accordingly to the section 11 Abs. 1 2 Mol Cell Proteomics (2021) 20 100061 Protein Phosphorylation in Depolarized Synaptosomes 1 mg of estimated synaptosomal protein (the final BoNT concentration of 100–200 nM was estimated on the basis of the total protein content of the semipurified BoNT, which amounted to approximately 10 μg/μl). The following combinations of C. botulinum cell culture supernatants were used: (i) C. botulinum A and D or (ii) C. botulinum C1 and B. Alternatively, synaptosomes were treated with the same amount of respective cell culture supernatants inactivated by heating at 95 ◦C for 1 h (mock control). BoNT- and mock-treated synaptosomes were incubated at 37 ◦C for 90 min and then directly subjected to the glutamate release assay. In brief, synaptosomal suspension was transferred into a quartz glass cuvette (Hellma, Müllheim, Germany) and kept stirred at 37 ◦C during the measurements. In total, 1 mM NADP and 50 U per 1 mg of synaptosomal protein of GluDH were stepwise added to the suspension. Synaptosomes were depolarized by adding KCl to a final concentration of 50 mM. NADPH-fluorescence at 440 nm was monitored at each step using Fluorolog-3 fluorometer (Horiba Jobin Yvon, Bensheim, Germany). After 2 min of stimulation, the reaction was quenched with an equal volume of lysis buffer (6 M Guanidine hydrochloride, 200 mM HEPES, 20 mM TCEP, 80 mM CAA, 1 × Halt Protease, and phosphatase inhibitor cocktail). The synapto- somal sample was incubated for 5 min at 95 ◦C, chilled on ice, and then sonicated for 10 min using 30 s on/30 s off cycles at the maximum output of Bioruptor ultrasonication device (Diagenode, Seraing, Belgium). The sample was repeatedly incubated for 5 min at 95 ◦C, and proteins were precipitated following methanol/chloroform protein precipitation method (60). TierSchG as documented by 39 20 00_2a Si/rö, dated Dec 11, 2013 (“Erlaubnis, Wirbeltiere zu Versuchszwecken zu züchten und zu hal- ten”) by the Veterinär-und Verbraucherschutzamt für den Landkreis und die Stadt Göttingen and examined regularly by the supervisory veterinary authority of the Landkreis Göttingen. EXPERIMENTAL PROCEDURES Ethical Statement All procedures were supervised by the animal welfare officer and the animal welfare committee of the Max-Planck-Institute for Biophysical Chemistry, Göttingen, Germany, established in accordance with the TierSchG and the regulation of animal experiments, dated Aug 31, 2015 (Tier- schutz-Versuchstier-Verordung, TierSchVersV). Phosphopeptide Enrichment and TMT Labeling Precipitated synaptosomal proteins (1–2 mg per condition) were redissolved in a digestion buffer (100 mM TEAB, 10% TFE, 0.1% Rapigest) and sonicated in the Bioruptor for 10 min at maximum in- tensity using 30 s on/30 s off cycles. Trypsin was added at 1:40 trypsin-to-protein ratio (wt/wt), and proteins were digested overnight at 37 ◦C. Next day, the sample was treated with 2.5 U of PNGase F per 1 mg of the initial protein amount for 1 h. Afterward, ACN was added to a final concentration of 45% (v/v), and the sample was incubated with a second portion of trypsin (1:100 trypsin-to-protein ratio, wt/wt) for 1 h. The sample was centrifuged for 15 min at 17,000×g in a table- top centrifuge, and the cleared supernatant was subjected to phos- phopeptide enrichment as previously described with modifications (61). Briefly, equal input peptide amounts were assured by measuring peptide concentration in Nanodrop-1000 (Thermo Fisher Scientific, Waltham, USA) using an A280 method. KCl, KH2PO4, and TFA were added to the peptide sample to reach final concentrations of 228 mM, 3.9 mM, and 38% (v/v), respectively. Peptides were incubated with TiO2 beads (GL Sciences, Tokyo, Japan) at 1:10 protein-to-beads ratio for 20 min at 40 ◦C. Unbound peptide fraction (nonphosphorylated peptides) was collected, and TiO2 beads were subjected to four washing steps using washing buffer (60% (v/v) ACN, 1% (v/v) TFA in water). Bound phosphopeptides were eluted using 3.75% (v/v) NH4OH 40% (v/v) ACN in water, snap-frozen in liquid nitrogen, and dried in a centrifugal Savant SpeedVac vacuum concentrator (Thermo Fisher Scientific, Waltham, USA). Dried phosphopeptides and pep- tides in the unbound fraction were subjected to desalting using pre- packed C18 spin columns (Harvard Apparatus, Holliston, USA). Desalted and dried peptides were redissolved in 50 mM TEAB 50% (v/ v) ACN in water, and TMT6-labeling reaction was conducted ac- cording to manufacturer’s instructions. After the labeling, peptide samples were accordingly combined, cleaned using the prepacked C18 spin columns, and concentrated in a SpeedVac. Isolated Nerve Terminals Isolated nerve terminals were prepared from brains of 5–6 weeks old Wistar rats as described previously (58). Briefly, brains were quickly homogenized in ice-cold homogenization buffer (320 mM sucrose, 5 mM HEPES is water) using a Teflon/glass homogenizer. The homogenate was cleared by centrifugation for 2 min at 2988×g in an SS-34 fixed angle rotor (Thermo Fisher Scientific, Waltham, USA). The supernatant was collected and recentrifuged for 12 min at 14,462×g. The synaptosomal pellet was resuspended in the homogenization buffer and loaded onto discontinuous Ficoll gradient (6%/9%/13% (wt/v) Ficoll in the homoge- nization buffer) and centrifuged for 35 min at 86,575×g in an SW-41 swinging bucket rotor (Beckman Coulter, Krefeld, Germany). The syn- aptosomal band at the interface between 9% and 13% Ficoll was collected and washed with the homogenization buffer. Synaptosomal protein concentration was estimated using Pierce 660 nm protein assay according to manufacturer’s instructions. The viability of synaptosomes was confirmed by glutamate release assay (59). Chemicals LC/MS-grade water, methanol, and acetonitrile (ACN) were used in this study if not otherwise stated and were purchased together with chloroform, 25% (v/v) NH4OH, CaCl2, KCl, KH2PO4, MgCl2, NaCl, NaHCO3, NaHPO4, sucrose, and glucose from Merck, Darmstadt, Germany. Trifluoroethanol (TFE), triethylammonium bicarbonate buffer (TEAB), formic acid (FA), EGTA, PM400-Ficoll (Ficoll), NADP, L-Glu- tamic dehydrogenase from bovine liver (GluDH), guanidine hydro- chloride, tris(2-carboxyethyl)phosphine (TCEP), chloroacetamide (CAA), Triton-X100, and MS-grade trypsin were obtained from Sigma- Aldrich, Taufkirchen, Germany. HEPES was purchased from VWR Chemicals, Darmstadt, Germany. SDS was purchased from Serva Electrophoresis GmbH, Heidelberg, Germany. TFA was obtained from Roth, Karlsruhe, Germany. Peptide-N(4)-(N-acetyl-beta-glucosaminyl) asparagine amidase (PNGase F) was obtained from Roche, Man- nheim, Germany. Rapigest was obtained from Waters, Milford, USA. Pierce 660 nm protein assay, Halt Protease and phosphatase inhibitor cocktail, and TMTsixplex isobaric labeling reagents (TMT6) were purchased from Thermo Fisher Scientific, Bleiswijk, Netherlands. C. botulinum strain A–D cell culture supernatants (BoNT A, B, C1, D) were obtained from Miprolab, Göttingen, Germany. BoNT Treatment and Glutamate Release Assay In total, 1–1.5 ml of synaptosomal suspension was centrifuged at 6900×g for 3 min in a table-top centrifuge, and synaptosomal pellet was resuspended in the sodium-containing buffer (10 mM glucose, 5 mM KCl, 140 mM NaCl, 5 mM NaHCO3, 1 mM MgCl2, 1.2 mM NaHPO4, 20 mM HEPES in water) to achieve a final concentration of 1 mg/ml of synaptosomal proteins. CaCl2 was added to a final con- centration of 1.3 mM, and synaptosomes were incubated for 5 min at 37 ◦C before adding BoNT. For Ca versus EGTA experiments, syn- aptosomes were preincubated with 1.3 mM CaCl2 or 0.5 mM EGTA for 15 min at 37 ◦C before stimulation with KCl (50 mM). To block SNARE- assisted neurotransmitter release, 20 μl of each BoNT was added per Basic Reversed-Phase (bRP) Chromatography Basic Reversed-Phase (bRP) Chromatography TMT6-labeled peptides were fractionated using Agilent 1100 series HPLC system (Agilent, Santa Clara, USA) equipped with a Mol Cell Proteomics (2021) 20 100061 3 Protein Phosphorylation in Depolarized Synaptosomes (February 2019, 29,951 entries). Reference proteome of C. botulinum (strain Hall/ATCC 3502/NCTC 13319/Type A) containing canonical protein sequences (Uniprot, January 2020, 3590 entries) was sup- plemented with sequences of BoNT B-D (strain Okra/Type B1, C. botulinum C phage, C. botulinum D phage, respectively). Peptide- spectrum matches (PSM) and protein FDR threshold were kept at 0.01. Following steps in data analysis were conducted in R statistical programming language using custom scripts. The scripts are available at GitHub (https://github.com/IvanSilbern/2021_Silbern_etal_Synapt_ BoNT_KCl). For each phosphorylation site, a leading protein was selected based on the list of potential candidate proteins for this site reported by MaxQuant. Proteins were ranked based on (listed from the most to the least significant) (i) the number of the unique phosphor- ylation sites assigned to the protein in the data set; (ii) the number of all phosphorylation sites per protein in the data set; (iii) “reviewed” status and Uniprot-annotation score of the protein sequence; (iv) isoform status of the protein sequence. The official gene name and Uniprot accession of the leading protein were used in the subsequent analyses. Impurity-corrected reporter ion intensities for each phos- phorylation site identified at one of the three multiplicity levels were extracted from MaxQuant “Phospho(S, T, Y).txt” output table. Po- tential contaminants, reversed sequences, and phosphorylation sites identified with localization probability <0.75 as determined by Max- Quant (63, 64) were excluded from further analysis. Phosphorylation sites quantified at different multiplicity levels (“1” means that the phosphorylation site was quantified on singly, “2” on doubly, and “3” on multiply phosphorylated peptides) were considered as separate entities or phosphorylation events. If a phosphorylation event con- tained <3 nonzero intensity values for a given labeling experiment, the event was considered as not quantified in this labeling experiment. Otherwise, missing values were imputed for each TMT channel/ experiment pair individually by random sampling from a Gauss dis- tribution with a mean at the 5% quantile and a double-standard de- viation of the log-transformed intensities. Only a minor proportion of phosphorylation events required imputation (<1% per channel). Log2- transformed reporter ion intensities were then normalized using Tukey median polishing individually for each labeling experiment and sub- jected to statistical testing using limma package (66). Basic Reversed-Phase (bRP) Chromatography C18-X-Bridge column (3.5 μm particles, 1.0 mm inner diameter, 150 mm length; Waters, Milford, USA). The HPLC was operated at the flow rate of 60 μl/min under basic pH (buffer A: 10 mM NH4OH in water, pH ~10; buffer B: 10 mM NH4OH and 80% (v/v) ACN in water, pH ~10). The column was equilibrated with the 95% buffer A and 5% buffer B mixture. Peptides were resolved using a linear gradient ranging from 10% to 35% buffer B for 35 min followed by a linear increase to 60% over 5 min and a washing step at 90% buffer B for 5 min. One-minute fractions were collected and concatenated into 24 (for Mock/BoNT phosphorylated peptides) or 12 (for Mock/BoNT nonphosphorylated peptides and Ca/EGTA phosphorylated peptides) final fractions as suggested elsewhere (62). BRP fractions were snap- frozen in liquid nitrogen and dried in the SpeedVac. Experimental Design and Statistical Rationale In total, 216 .raw files were analyzed in order to quantify changes in phosphorylation site intensities in BoNT- or mock-treated synapto- somes or synaptosomes stimulated in the presence of calcium or EGTA. Out of the 216 .raw files, 144 .raw files were obtained from two TMT6-labeling sets of mock- versus BoNT-treated synaptosomes. These files correspond to 24 concatenated BRP-fractions and three injection replicates per fraction. Remaining 72 .raw files were obtained from another two TMT6-labeling experiments of synaptosomes stim- ulated in the presence of Ca2+ or EGTA. The files correspond to 12 concatenated bRP-fractions and three injection replicates per fraction. Each set of TMT6-labeled samples contained three independent replicates for each of the two treatment conditions, resulting in six independent replicates for each treatment regime (Mock, BoNT, Ca, or EGTA). The choice for this number of replicates was dictated by the constraints of the TMT6 labeling and the previous study (41). The phosphorylation site intensities resulting from the three technical replicates were summed in order to obtain a single value reported by MaxQuant (64). We used log2-transformed and normalized reporter ion intensities to assess changes in the phosphorylation site intensities. Specifically, we used the limma package (66) to test the difference in phosphorylation site intensities between mock- and BoNT-treated synaptosomes and synaptosomes stimulated in the presence of cal- cium or EGTA. Linear models were specified to account for treatment differences (Mock, BoNT, Ca, EGTA) and batch effects between TMT6 LC-MS/MS Dried peptides were redissolved in 2% (v/v) ACN 0.1% (v/v) TFA in water. Each concatenated BRP fraction was analyzed in triplicates (phosphorylated peptides) or as a single injection (nonphosphorylated peptides). Dissolved peptides were injected onto a C18 PepMap100- trapping column (0.3 x 5 mm, 5 μm, Thermo Fisher Scientific, Wal- tham, USA) connected to an in-house packed C18 analytical column (75 μm x 300 mm; Reprosil-Pur 120C18-AQ, 1.9 μm, Dr Maisch GmbH, Ammerbuch, Germany). The columns were pre-equilibrated using a mixture of 98% buffer A (0.1% (v/v) FA in water), 2% buffer B (80% (v/v) ACN, 0.1% (v/v) FA in water), or 95% buffer A, 5% buffer B (nonphosphorylated peptides). Liquid chromatography was oper- ated on an UltiMate-3000 RSLC nanosystem (Thermo Fisher Scien- tific, Waltham, USA). Phosphopeptides were eluted using a 60 min- linear gradient ranging from 10% to 25% buffer B (80% (v/v) ACN, 0.1% (v/v) FA in water) followed by a linear increase to 45% buffer B over 10 min and a washing step at 90% of buffer B for 5 min. For nonphosphorylated peptides, a steeper gradient was applied ranging from 10% to 45% buffer B followed by an increase to 60% buffer B and a washing step at 90% buffer B. Eluting peptides were sprayed into a QExactive HF-X or Orbitrap Exploris 480 (Thermo Fisher Sci- entific, Bremen, Germany). For the analysis of phosphorylated pep- tides, MS1 scans (350–1600 m/z) were acquired with a resolution of 120,000 at 200 m/z, 3e6 automatic gain control (AGC) target, and 50 ms maximum injection time. Precursor ions were isolated using a 0.8 m/z isolation window, and a normalized collision energy of 33% was applied to obtain fragment spectra. Only charge states from 2+ to 6+ were considered, and the dynamic exclusion was set to 25 s. The fragment spectra were acquired with a resolution of 30,000, 1e5 AGC target, and 130 ms maximum injection time. For the analysis of non- phosphorylated peptides, following parameters were set differently: MS1 scans were acquired with a resolution of 60,000 at 200 m/z, 300% normalized AGC target. Fragment spectra were acquired with the resolution of 15,000 at 200 m/z, 50% of the normalized AGC target and 54 ms maximum injection time. Data Analysis The kinase prediction with the highest NetworKIN score was selected for each phosphorylation site. Predicted kinases were orga- nized in the kinase groups introduced by NetPhorest classification (73). The second-level and top-level kinase groups in the kinase hi- erarchy were used for enrichment analyses and visualizations. The overrepresentation analysis of predicted kinase–substrate interactions for phosphorylation sites significantly regulated in Ca/EGTA or Mock/ BoNT experiments was conducted in comparision with NetworKIN kinase–substrate predictions for human proteome. To assess the disbalance in the number of up/downregulated phosphorylation events, the number of up/downregulated phosphorylation events controlled by each kinase group was compared with the total number of up/down phosphorylation events among significantly regulated phosphorylated sites. All tests of differential term or kinase enrichment between two groups were done using Fisher’s exact test. Benjamini– Hochberg adjusted p-values are reported throughout the study if not specified otherwise. The anticipated phosphatase–substrate in- teractions rely upon described protein phosphatase-1(PP1) and Cal- cineurin docking motifs (76). To demonstrate possible phosphatase– substrate connections, interaction maps were extracted from protein–protein interactions annotated for R. norvegicus (STRING (75) database version 10.5). Shortest paths from phosphatase to target proteins (phosphoproteins involved in endo/exocytosis and containing PP1 or Calcineurin docking motif) were computed using shortest_path function from igraph package (77) (version 1.4.6). Only proteins pre- viously identified in synaptosomes and interactions with experimental evidence or annotated in curated databases were included in the analysis. Phosphorylation site occupancy was calculated using a 3D model presented by Hoegrebe et al (78). In brief, a linear model of the form Ph = m1∙Prot – m2∙NPh, where Ph is the normalized (by median polishing) intensity of the phosphorylated peptide; Prot is the normalized protein intensity, and NPh is the normalized intensity of nonphosphorylated peptide. The model was fit by using intensity data from Mock/BoNT experiments. Phosphorylation occupancy was then calculated using the following formula: Occupancy = a/(1+a), where a = m2∙Ph/NPh. “Illegal” stoichiometry values, i.e., values outside the interval [0;1] were excluded from the analysis. Only m2 values with a p value below 0.1 were considered. Defining Primary Ca2+-Dependent and SV-Cycling-Dependent Phosphorylation Sites Defining Primary Ca2+-Dependent and SV-Cycling-Dependent Phosphorylation Sites Phophorylation events were defined as “primary Ca2+-dependent” if they show absolute log2 (Ca/EGTA) > 0.263 and absolute log2 (Mock/ BoNT) < 0.263 or were not quantified in the Mock/BoNT experiment. Data Analysis Raw files were processed using MaxQuant version 1.6.10.2 (63, 64) under default settings with some exceptions. Specifically, cysteine carbamidomethylation was selected as a fixed modification, whereas methionine oxidation, acetylation of protein N termini, and phos- phorylation of serine, threonine, and tyrosine (only for phosphorylated peptides) were set as variable modifications. Up to five variable modifications were allowed per peptide. Specific trypsin digestion was selected with up to two missed cleavage sites allowed per peptide. Maximal peptide mass was increased to 6000. Quantification using reporter ions in MS2 (TMT6plex) and minimal parent ion fraction of 0.75 were selected. MS1 and MS2 mass tolerances were kept at 4.5 ppm and 20 ppm, respectively. Canonical amino acid sequences of Rattus norvegicus proteins were retrieved from Uniprot (65) 4 Mol Cell Proteomics (2021) 20 100061 Protein Phosphorylation in Depolarized Synaptosomes sets. Differences in the peptide intensities between mock- and BoNT- treated synaptosomes and synaptosomes stimulated in the presence/ absence of calcium were tested. Empirical-Bayes moderated p-values (66) were subjected to multiple testing correction using q-value approach (67). Phosphorylation events (phosphorylation site at a given multiplicity) were considered as significantly regulated when showing at least 1.2 intensity fold change (FC, corresponds to absolute log2 FC > 0.263) and q-value < 0.01 (corresponds to false discovery rate (FDR) < 1%). sets. Differences in the peptide intensities between mock- and BoNT- treated synaptosomes and synaptosomes stimulated in the presence/ absence of calcium were tested. Empirical-Bayes moderated p-values (66) were subjected to multiple testing correction using q-value approach (67). Phosphorylation events (phosphorylation site at a given multiplicity) were considered as significantly regulated when showing at least 1.2 intensity fold change (FC, corresponds to absolute log2 FC > 0.263) and q-value < 0.01 (corresponds to false discovery rate (FDR) < 1%). Phosphorylation sites with no assignment were subjected to Net- worKIN kinase–substrate prediction tool (73, 74). Specifically, rat protein sequences were aligned against the reference set of human protein sequences (STRING (75) database version 9.05) by using BLAST+ (additional command line parameters: -max_target_seqs 40 -word_size 6 -gapopen 12 -gapextend 1). The best alignment for each rat protein sequence was selected based on the rat protein sequence coverage, number of amino acid positions considered identical, alignment bitscore, number of open sequence gaps (listed with decreasing importance). Positions of phosphorylation sites in the best matching human protein sequences were subjected to NerworKIN tool. Data Analysis Conversely, events showing absolute log2 (Mock/BoNT) > 0.263 were termed as “SV-cycling-dependent.” Phosphorylation events that exhibited only small changes in both experiments (absolute log2 (Ca/ EGTA) < 0.263 and absolute log2 (Mock/BoNT) < 0.263) were considered as being “not-affected.” In the following analyses, only phosphorylation events that surpassed an FDR-threshold of <1% were considered. Specifically, “primary Ca2+-dependent” phosphory- lation events had to satisfy a q-value threshold of <0.01 in the Ca/ EGTA experiment, whereas “SV-cycling-dependent” sites had to meet a q-value threshold of <0.01 in Mock/BoNT experiment or a q-value- threshold of <0.01 and an absolute log2 FC threshold of >0.263 in Ca/ EGTA experiment. Phosphorylation events that did not match these criteria were considered as being “not-affected” as well. If a phos- phorylation site was quantified at different multiplicities (phosphory- lation events), whereby one of which was classified as being “SV- cycling-dependent,” the site was considered as being “SV-cycling- dependent.” To define regulation groups at protein level, number of significantly regulated phosphorylation sites were counted per protein (gene). Proteins were distributed in the following groups (i) “mostly primary Ca2+-dependent” (>60% of sites being categorized as “pri- mary Ca2+-dependent”); (ii) “mostly SV-cycling-dependent” (>60% of sites being categorized as “SV-cycling-dependent”); (iii) “mixed” (none of the groups was dominating). Bioinformatic Analysis Gene enrichment analyses were conducted using gene names of proteins carrying significantly regulated phosphorylation sites in Ca/ EGTA or Mock/BoNT experiments. Gene ontology enrichment anal- ysis was performed using David web interface and whole R. norvegicus proteome as a background (68). Direct GO term cate- gories surpassing Benjamini–Hochberg-adjusted p-value threshold of 0.001 were considered for further analysis. For reactome pathway analysis, only enriched (Benjamini–Hochberg-adjusted p-value < 0.1) “neuronal system” categories were selected (69). Synapse-specific SynGO database was used to retrieve significantly enriched (GSEA “gene cluster” FDR corrected p-value < 0.001) GO-biological function terms (70). Experimentally validated kinase–substrate interactions were derived from PhosphoSitePlus database (“Kinase_ Substrate_Dataset.txt”, version of 10.04.2018) (71). In order to ac- count for possible differences in phosphorylation site annotation, sequence windows of the phosphorylation sites in the data set were aligned against sequence windows reported in the PhosphoSitePlus database using BLAST+ software (version: 2.7.1, additional command line parameters: -max_target_seqs 20) (72). Only exact alignments of the phosphorylation sites showing the minimum bitscore of 20 were considered. The best match was selected from filtered alignments ranked based on the alignment bitscore, number of amino acid po- sitions considered identical (nident), number of open sequence gaps, kinase, and substrate species (rat > mouse > human > rabbit). C. botulinum Cell Culture Supernatants Profiling For protein profiling, supernatants of C. botulinum cell culture were digested overnight using trypsin. Digested peptides were desalted using prepacked C18 spin columns. Samples were analyzed on QExactive HF-X and liquid chromatography setup as described above. To test for unspecific phosphatase activity, C. botulinum cell culture supernatants were incubated with the nuclear extract of HeLa cells. The nuclear extract was prepared as previously described (79) in Roeder D buffer (20 mM Hepes-KOH pH 7.9, 100 mM KCl, 1.5 mM MgCl2, 10% (v/v) glycerol, 0.5 mM DTT, 0.5 mM PMSF, 0.2 mM EDTA) and was a generous gift of Prof. Dr Lührmann laboratory. The extract was supplemented with 1.3 mM CaCl2 and 20 μl of each C. botulinum cell culture supernatant (A and D or C1 and B), heat-inactivated cell Mol Cell Proteomics (2021) 20 100061 5 Protein Phosphorylation in Depolarized Synaptosomes (previously described, (83)) allowing neuron-specific expression under the human synapsin-1 promoter. For all the following subcloning steps, we relied on commercial chemically competent SURE bacteria from Agilent, to avoid the loss of ITR sequences. Positive clones were confirmed by sequencing, and before transfection in the packaging HEK293 T cells, the presence of ITRs and the correct length of all plasmids were checked by restriction enzyme analysis. Syntaxin-1a (Stx1a; P32851) and cannabinoid receptor 1 (Cnr1; P20272) and their mutants (respectively T21E-T23 E pseudo-phosphorylated Stx1a, T21A-T23 A nonphosphorylatable Stx1a, T314E-T322 E pseudo- phosphorylated Cnr1 and T314A-T322 A nonphosphorylatable Cnr1) were inserted in the WT Vamp2-pHluorin viral vector by cutting with the enzymes SgsI (AscI) and SbfI (SdaI). Their expression was driven by mean of a second human synapsin-1 promoter from the same viral plasmid to allow consistent coexpression. To distinguish these pro- teins from the endogenous, an ALFA-tag was added (84). Also in this case, positive clones were confirmed by sequencing, and before transfection in the packaging HEK293 T cells, the presence of ITRs and the correct length of all plasmids were checked by restriction enzyme analysis. All synthetic plasmids and their respective se- quences are available from the authors upon request. culture supernatants, or 40 μl of the sodium buffer per 1 mg of nuclear proteins. Each treatment condition was performed in triplicate, resulting in a total of nine samples. The samples were incubated for 1.5 h at 37 ◦C. Synaptic Vesicle Exo-/Endocytosis Measurements SV exo/endocytosis assays were performed analogously to what previously described (81, 85). Briefly, neurons were field-stimulated with platinum electrodes in custom-made chambers housing 18 mm coverslips (8 mm distance between electrodes). We used a Stimulus Isolator combined with an A310 Accupulser Stimulator (both from World Precision Instruments, Sarasota, USA) with a nominal output of 100 mA for stimulation. In the case of Stx1a and Cnr1 coexpression was confirmed by imaging. Live experiments were performed in Tyrode’s solution (124 mM NaCl, 5 mM KCl, 30 mM glucose, 25 mM HEPES, 2 mM CaCl2, 1 mM MgCl2, pH 7.4) supplemented with 10 μM 6-cyano-7-nitroquinoxaline-2,3-dione (CNQX; Tocris Bioscience, Cambridge, UK) and 50 μM 2-amino-5-phosphonopentanoic acid (D- AP5; Tocris Bioscience, Cambridge, UK) to avoid spontaneous network activation. At the end of the imaging, 50 mM NH4Cl was Adeno-Associated Virus Preparation Recombinant AAV particles were prepared as previously described (83). Briefly, vectors were packaged in HEK293 T cells using the pDP6 helper plasmid (avoiding adenoviral contamination). Packaging cells were lysed in Tyrode’s solution (124 mM NaCl, 5 mM KCl, 30 mM glucose, 25 mM HEPES, 2 mM CaCl2, 1 mM MgCl2, pH 7.4), passed through 0.22 μm syringe filters, and viral titer was adjusted by serial dilution on primary hippocampal neurons monitoring pHluorin levels (always expressed under the neurospecific human synapsin-1 promoter). C. botulinum Cell Culture Supernatants Profiling Afterward, urea in 100 mM HEPES pH 8 was added to the final concentration of 1 M and proteins were digested overnight at 30 ◦C using MS-grade trypsin at a trypsin-to-protein ration (wt/wt) of 1:50. Next day, peptides were subjected to phosphopeptide enrich- ment as described above excluding the deglycosylation and second endoproteinase digestion steps. Enriched phosphopeptides were cleaned using the prepacked C18 spin columns, redissolved in 2% (v/ v) ACN, 0.1% (v/v) TFA in water, and analyzed on UltiMate 3000 RSLC nanosystem connected to Orbitrap Exploris 480 mass spectrometer. Raw phosphorylation site intensities as reported by MaxQuant were analyzed as described before using R scripts and the limma package for data normalization, visualization, and statistical testing. Calcium Influx in Synaptosomes Following BoNT Treatment and KCl Stimulation Calcium Influx in Synaptosomes Following BoNT Treatment and KCl Stimulation Synaptosome suspensions containing 1 mg of synaptosomal pro- teins were prepared as described for glutamate release assay. Sus- pensions were supplemented with 1.3 mM CaCl2 and additional 40 μl of the sodium-containing buffer or 1.3 mM CaCl2 and 20 μl of each C. botulinum cell culture supernatants in two combinations (A and D or C1 and B). Synaptosomes were then incubated for 1 h at 37 ◦C under mild agitation. Afterward, synaptosome suspensions were supple- mented with 5 μM of Fura-2AM dye (Molecular probes, Eugene, USA) and incubated for additional 30 min at 37 ◦C. Following steps were conducted as previously described (80). Briefly, synaptosomes were resuspended in 1 ml of fresh sodium-containing buffer and loaded into the quartz glass cuvette. The synaptosomal suspension was stirred and kept at 37 ◦C during the measurements. The fluorescence was continuously measured using Fluorolog-3 at excitation wavelengths of 340 and 380 nm and emission at 505 nm, for 2 s at each wavelength. In total, 1.3 mM CaCl2, 50 mM KCl, 0.4% (wt/v) SDS, 1 mM EGTA were added stepwise and the signal was acquired for 3 min at each step. Fluorescence intensity at 340 nm excitation was divided by the intensity at 380 nm excitation and then by the maximum fluorescence ratio following SDS lysis. Median fluorescence ratio before stimulation with KCl was subtracted to obtain proportional changes in fluores- cence intensity relatively to its maximum. Immuno Staining with NbALFA The expression of Stx1a and Cnr1 in all viruses and mutants was confirmed by staining with the NbALFA (84). Briefly, neurons were fixed with 4% paraformaldehyde (PFA; w/v) for 30 min at room tem- perature (RT). Cells were quenched in 100 mM NH4Cl and per- meabilized in PBS containing 4% bovine serum albumin (BSA; wt/v) and 0.1% (v/v) Triton-X 100 for 15 min at RT. Fluorescently labeled NbALFA (FluoTag-X2 anti-ALFA AbberiorStar635P, NanoTag Bio- technologies #N1502-Ab635P-L, Germany) was diluted 1:200 in blocking solution for 1 h at RT and subsequently washed three times for 5 min with PBS. Coverslips were mounted on glass slides using Mowiol solution, dried, and imaged. Note that superecliptic GFP (pHluorin) keeps its fluorescence in Mowiol solution since its pH is ~7.5 and can thus be imaged with no additional staining. Cell Cultures and Transfections Primary hippocampal neuronal cultures were prepared from P2 rats as previously described (81). HEK293 T cells were obtained by a commercial supplier (Sirion Biotech GmbH; Germany). HEK293 T cells were grown in DMEM supplemented with 10% FBS, 4 mM L-glutamine, and 600 U/ml penicillin-streptomycin (Lonza). For transfection Lipofectamine 2000 transfection reagent was used following the guidelines of the manufacturer (Thermo Fisher Scientific, Invitrogen, USA). All plasmids for transfection were produced in bacteria and purified with the NucleoBond Xtra Midi endotoxin-free plasmid DNA kit (Macherey-Nagel, Germany). RESULTS applied to evaluate total SV content. Live imaging was performed with an inverted Nikon Ti epifluorescence microscope (Nikon, Tokyo, Japan) equipped with a Plan Apochromat 60x 1.4 NA oil-immersion objective, an HBO-100W Lamp, an IXON X3897 Andor camera (Northern Ireland, UK), and an OKOLab cage incubator system (OKOLab, Ottaviano, Italy) to maintain a constant temperature of 37 ◦C. ND2 Images were imported using the Bio-Formats (OME) plug-in. For quantifications, the fluorescence intensity was measured with custom-made Matlab (USA) code that can be provided on an indi- vidual basis if requested. Briefly, multiple regions containing synaptic boutons were manually selected, in 5–8 independent experiments. Between 140 and 345 regions were selected for each condition, over all independent experiments. The Vamp2-pHluorin signal was then measured in the respective regions, and the background intensity (obtained in identically sized regions from the neuron-free adjoining regions) was subtracted. The Vamp2-pHluorin signal curves were then normalized to the maximum intensity obtained during the addi- tion of NH4Cl. To compare easily different conditions and mutant variants, all curves were furthermore normalized to their initial (pres- timulus) baselines. Statistical differences were tested in Matlab, relying on Kruskal–Wallis tests, followed by Tukey–Kramer post-hoc tests. applied to evaluate total SV content. Live imaging was performed with an inverted Nikon Ti epifluorescence microscope (Nikon, Tokyo, Japan) equipped with a Plan Apochromat 60x 1.4 NA oil-immersion objective, an HBO-100W Lamp, an IXON X3897 Andor camera (Northern Ireland, UK), and an OKOLab cage incubator system (OKOLab, Ottaviano, Italy) to maintain a constant temperature of 37 ◦C. ND2 Images were imported using the Bio-Formats (OME) plug-in. For quantifications, the fluorescence intensity was measured with custom-made Matlab (USA) code that can be provided on an indi- vidual basis if requested. Briefly, multiple regions containing synaptic boutons were manually selected, in 5–8 independent experiments. Between 140 and 345 regions were selected for each condition, over all independent experiments. The Vamp2-pHluorin signal was then measured in the respective regions, and the background intensity (obtained in identically sized regions from the neuron-free adjoining regions) was subtracted. The Vamp2-pHluorin signal curves were then normalized to the maximum intensity obtained during the addi- tion of NH4Cl. To compare easily different conditions and mutant variants, all curves were furthermore normalized to their initial (pres- timulus) baselines. Statistical differences were tested in Matlab, relying on Kruskal–Wallis tests, followed by Tukey–Kramer post-hoc tests. DNA Cloning of Wild-Type Proteins and Respective Phosphomimetic Mutants Replicates within one experiment were labeled with a set of TMT6 isobaric labeling reagents. A pooled peptide sample was fractionated by reversed-phased chromatography at basic pH and measured in a high-resolution quadrupole-orbitrap mass spectrometer. Reporter ion intensities were utilized to infer relative abundances of phosphorylated peptides. FIG. 1. Workflow for the phosphoproteome analyses of synaptosomes under different stimuli. Brains of 5–6 week-old Wistar rats were homogenized and the synaptosomal fraction was enriched by differential centrifugation in discontinuous Ficoll gradient. Two sets of experiments were performed that compared a) stimulation of synaptosomes in the presence of Ca2+ (1.3 mM) or Ca2+-chelator (EGTA, 0.5 mM), or b) stimulation of synaptosomes pretreated with inactivated toxins (Mock), or a combination of two botulinum toxins (BoNT, A + D or C1+B). Synaptosomes were depolarized by 50 mM KCl for 2 min. Each experiment included three independent control stimulations (EGTA or Mock- treated) and three independent test stimulations (Ca or BoNT). Samples were processed in a conventional bottom-up proteomics workflow and phosphorylated peptides were enriched by metal-oxide chromatography (TiO2). Replicates within one experiment were labeled with a set of TMT6 isobaric labeling reagents. A pooled peptide sample was fractionated by reversed-phased chromatography at basic pH and measured in a high-resolution quadrupole-orbitrap mass spectrometer. Reporter ion intensities were utilized to infer relative abundances of phosphorylated peptides. DNA Cloning of Wild-Type Proteins and Respective Phosphomimetic Mutants All the sequences (including mutants) were designed in silico based on rat genes with the appropriate restriction enzymes for viral cloning and ordered at GenScript (USA). The synaptobrevin (Vamp2) mutants were based on rat Vamp2 (Uniprot: P63045) fused to the optimized version of superecliptic GFP (pHluorin) (82) by mean of a short peptide linker. We used AgeI and SdaI (SbfI) restriction sites for inserting Vamp2-pHluorin and the respective mutants (S75D pseudo- phosphorylated and S75A non-phosphorylatable) in the viral vector 6 Mol Cell Proteomics (2021) 20 100061 Protein Phosphorylation in Depolarized Synaptosomes FIG. 1. Workflow for the phosphoproteome analyses of synaptosomes under different stimuli. Brains of 5–6 week-old Wistar rats were homogenized and the synaptosomal fraction was enriched by differential centrifugation in discontinuous Ficoll gradient. Two sets of experiments were performed that compared a) stimulation of synaptosomes in the presence of Ca2+ (1.3 mM) or Ca2+-chelator (EGTA, 0.5 mM), or b) stimulation of synaptosomes pretreated with inactivated toxins (Mock), or a combination of two botulinum toxins (BoNT, A + D or C1+B). Synaptosomes were depolarized by 50 mM KCl for 2 min. Each experiment included three independent control stimulations (EGTA or Mock- treated) and three independent test stimulations (Ca or BoNT). Samples were processed in a conventional bottom-up proteomics workflow and phosphorylated peptides were enriched by metal-oxide chromatography (TiO2). Replicates within one experiment were labeled with a set of TMT6 isobaric labeling reagents. A pooled peptide sample was fractionated by reversed-phased chromatography at basic pH and measured in a high-resolution quadrupole-orbitrap mass spectrometer. Reporter ion intensities were utilized to infer relative abundances of phosphorylated peptides. FIG. 1. Workflow for the phosphoproteome analyses of synaptosomes under different stimuli. Brains of 5–6 week-old Wistar rats were homogenized and the synaptosomal fraction was enriched by differential centrifugation in discontinuous Ficoll gradient. Two sets of experiments were performed that compared a) stimulation of synaptosomes in the presence of Ca2+ (1.3 mM) or Ca2+-chelator (EGTA, 0.5 mM), or b) stimulation of synaptosomes pretreated with inactivated toxins (Mock), or a combination of two botulinum toxins (BoNT, A + D or C1+B). Synaptosomes were depolarized by 50 mM KCl for 2 min. Each experiment included three independent control stimulations (EGTA or Mock- treated) and three independent test stimulations (Ca or BoNT). Samples were processed in a conventional bottom-up proteomics workflow and phosphorylated peptides were enriched by metal-oxide chromatography (TiO2). Synaptosome Depolarization by KCl in the Presence of Ca2+ Results in Substantial Changes in Protein Phosphorylation A, Number of quantified phosphorylation sites in Ca versus EGTA and Mock versus BoNT experiments (panel 1), Ca versus EGTA experiments only (panel 2) and recently published data set (Engholm-Keller (42), panel 3). B and C, volcano plots depicting -log10 (q-value) versus log2 (intensity fold change) of phosphorylation sites quantified within Ca versus EGTA and Mock versus BoNT experiments, respectively. D, Comparison of log2 fold changes between our and Engholm-Keller et al (42) data sets. Selected phosphorylation sites are marked as official gene symbol with phosphorylated amino acid and position. E and F, The stacked bar graphs show the total number of significantly regulated phosphorylation events in Ca versus EGTA (E) or Mock versus BoNT (F) experiments that can be a result of known (PhosphositePlus database (71)) or predicted (NetworKIN (73, 74)) kinase–substrate interactions. Orange bars depict the number of phosphorylation events that show significant intensity increase in Ca2+ or Mock-treated synaptosomes versus respective control (EGTA or BoNT). Blue bars correspond to downregulated events, respectively. The kinase classification (NetPhorest Groups) follows one introduced by NetPhorest (73) and uses its second-level group anno- tation. Colored vertical bars delineate the highest-level group in the kinase classification. Asterisks mark kinase groups that are predicted to control significantly more phosphorylation sites than expected as based on predicted kinase–substrate interactions in human proteome (p < 0.01). AGC, protein kinase A, G, C kinase group; CaMKII, calcium-calmodulin kinase 2; CDK, cyclin-dependent kinase; CK, casein kinase; CK1, casein kinase 1; CK2, casein kinase 2; CLK, SRPK1 and Clk/Sty protein kinase; CMGC, CDK, MAP, GSK, CDKL kinase group; DAPK, death- associated protein kinase; GSK3, glycogen synthase kinase 3; MAPK, mitogen-activated protein kinase; PAK, p21-activated kinase; PKC, protein kinase C; STE, “sterile” serine/threonine protein kinases. FIG. 2. Substantial changes in synaptic phosphoproteome following depolarization and responsible kinase groups. A, Number of quantified phosphorylation sites in Ca versus EGTA and Mock versus BoNT experiments (panel 1), Ca versus EGTA experiments only (panel 2) and recently published data set (Engholm-Keller (42), panel 3). B and C, volcano plots depicting -log10 (q-value) versus log2 (intensity fold change) of phosphorylation sites quantified within Ca versus EGTA and Mock versus BoNT experiments, respectively. D, Comparison of log2 fold changes between our and Engholm-Keller et al (42) data sets. Selected phosphorylation sites are marked as official gene symbol with phosphorylated amino acid and position. Synaptosome Depolarization by KCl in the Presence of Ca2+ Results in Substantial Changes in Protein Phosphorylation Our analysis shows that phosphorylation is a prominent modification of synaptosomal proteins. Specifically, we iden- tified and quantified phosphorylation under stimulated and nonstimulated conditions on 12,021 sites belonging to more When analyzing synaptosomes depolarized in the pres- ence of calcium ions in comparison with those depolarized in FIG. 2. Substantial changes in synaptic phosphoproteome following depolarization and responsible kinase groups. A, Number of quantified phosphorylation sites in Ca versus EGTA and Mock versus BoNT experiments (panel 1), Ca versus EGTA experiments only (panel 2) and recently published data set (Engholm-Keller (42), panel 3). B and C, volcano plots depicting -log10 (q-value) versus log2 (intensity fold change) of phosphorylation sites quantified within Ca versus EGTA and Mock versus BoNT experiments, respectively. D, Comparison of log2 fold changes between our and Engholm-Keller et al (42) data sets. Selected phosphorylation sites are marked as official gene symbol with phosphorylated amino acid and position. E and F, The stacked bar graphs show the total number of significantly regulated phosphorylation events in Ca versus EGTA (E) or Mock versus BoNT (F) experiments that can be a result of known (PhosphositePlus database (71)) or predicted (NetworKIN (73, 74)) kinase–substrate interactions. Orange bars depict the number of phosphorylation events that show significant intensity increase in Ca2+ or Mock-treated synaptosomes versus respective control (EGTA or BoNT). Blue bars correspond to downregulated events, respectively. The kinase classification (NetPhorest Groups) follows one introduced by NetPhorest (73) and uses its second-level group anno- tation. Colored vertical bars delineate the highest-level group in the kinase classification. Asterisks mark kinase groups that are predicted to control significantly more phosphorylation sites than expected as based on predicted kinase–substrate interactions in human proteome (p < 0.01). AGC, protein kinase A, G, C kinase group; CaMKII, calcium-calmodulin kinase 2; CDK, cyclin-dependent kinase; CK, casein kinase; CK1, casein kinase 1; CK2, casein kinase 2; CLK, SRPK1 and Clk/Sty protein kinase; CMGC, CDK, MAP, GSK, CDKL kinase group; DAPK, death- associated protein kinase; GSK3, glycogen synthase kinase 3; MAPK, mitogen-activated protein kinase; PAK, p21-activated kinase; PKC, protein kinase C; STE, “sterile” serine/threonine protein kinases. FIG. 2. Substantial changes in synaptic phosphoproteome following depolarization and responsible FIG. 2. Substantial changes in synaptic phosphoproteome following depolarization and responsible kinase groups. RESULTS We performed a quantitative in-depth analysis of changes in protein phosphorylation events in active synaptosomes. We first quantitatively compared the phosphorylation status of proteins in chemically stimulated synaptosomes under Ca2+- deprived and free Ca2+ conditions; for the latter, depolariza- tion of the plasma membrane of synaptosomes was induced by KCl in buffer containing EGTA or CaCl2 (Fig. 1). The viability of the synaptosomes was confirmed by monitoring release of the neurotransmitter (glutamate) (59) (supplemental Fig. S1A). We applied depolarization for 2 min; this duration was chosen in order (i) to achieve comparability with our previous studies (41) and (ii) to allow the capture of short- and medium-term changes in phosphorylation. Proteins from stimulated and nonstimulated synaptosomes were extracted, digested, and enriched for phosphopeptides in parallel; thereafter, the (phospho)peptides were labeled with unique isotopically labeled TMT6 reagents. Peptides were then pooled, Mol Cell Proteomics (2021) 20 100061 7 Protein Phosphorylation in Depolarized Synaptosomes than 2600 proteins (unique gene names) with a localization probability of >75% as determined by MaxQuant (63, 64). This coverage greatly exceeds our earlier one (41) and is compa- rable to a recent study from another laboratory (42). When the phosphosites quantified from BoNT-treated synaptosomes are included, the number of sites quantified in this study in- creases to 18,981 sites belonging to 3840 proteins (Fig. 2A, left panel). prefractionated by basic reverse-phase chromatography, and finally analyzed by LC-MS/MS (Fig. 1). In the second approach, we inhibited SV cycling using BoNT and monitored quantitatively the changes in the phosphoproteome after K+- mediated depolarization, comparing synaptosomes that were treated with active or, respectively, with inactive BoNT (Fig. 1). Phosphopeptides were enriched and analyzed as described above. This second approach should differentiate phosphor- ylation events that are dependent on SV exo–endocytotic cycling. Synaptosome Depolarization by KCl in the Presence of Ca2+ Results in Substantial Changes in Protein Phosphorylation Synaptosome Depolarization by KCl in the Presence of Ca2+ Results in Substantial Changes in Protein Phosphorylation E and F, The stacked bar graphs show the total number of significantly regulated phosphorylation events in Ca versus EGTA (E) or Mock versus BoNT (F) experiments that can be a result of known (PhosphositePlus database (71)) or predicted (NetworKIN (73, 74)) kinase–substrate interactions. Orange bars depict the number of phosphorylation events that show significant intensity increase in Ca2+ or Mock-treated synaptosomes versus respective control (EGTA or BoNT). Blue bars correspond to downregulated events, respectively. The kinase classification (NetPhorest Groups) follows one introduced by NetPhorest (73) and uses its second-level group anno- tation. Colored vertical bars delineate the highest-level group in the kinase classification. Asterisks mark kinase groups that are predicted to control significantly more phosphorylation sites than expected as based on predicted kinase–substrate interactions in human proteome (p < 0.01). AGC, protein kinase A, G, C kinase group; CaMKII, calcium-calmodulin kinase 2; CDK, cyclin-dependent kinase; CK, casein kinase; CK1, casein kinase 1; CK2, casein kinase 2; CLK, SRPK1 and Clk/Sty protein kinase; CMGC, CDK, MAP, GSK, CDKL kinase group; DAPK, death- associated protein kinase; GSK3, glycogen synthase kinase 3; MAPK, mitogen-activated protein kinase; PAK, p21-activated kinase; PKC, protein kinase C; STE, “sterile” serine/threonine protein kinases. 8 Mol Cell Proteomics (2021) 20 100061 Protein Phosphorylation in Depolarized Synaptosomes the absence of calcium (EGTA control), we detected sub- stantial changes in protein phosphorylation. Specifically, there are 1363 phosphorylated sites mapped to approxi- mately 470 proteins that show intensity changes of at least 20% at an FDR of 1% (Fig. 2B). Using the PhosphositePlus database (71) to annotate known kinase–substrate relations and the NetworKIN tool (73, 74) to predict possible kinase– substrate pairs, we observed that certain kinase families were overrepresented including the CaMKII, MAPK, and GSK3 kinase groups (supplemental Table S1). Importantly, the distribution of up- or downregulated sites between ki- nase groups is not random: CaMKII and PKC kinase groups are responsible for phosphorylation sites that appear upre- gulated, while the majority of sites controlled by MAPK, CDK, and CK1 show reduced intensity in the presence of Ca2+ as compared with EGTA controls (Fig. 2E and supplemental Fig. S2). The latter observation is in line with previous studies that demonstrated upregulation of putative CaMKII substrates and downregulation of predicted MAPK substrates following potassium-triggered depolarization of synaptosomes (41, 42). Synaptosome Depolarization by KCl in the Presence of Ca2+ Results in Substantial Changes in Protein Phosphorylation We also observed changes of phosphorylated sites in response to KCl treatment that were similar to changes re- ported in earlier studies (42) for bassoon (Bsn), piccolo (Pclo), synapsin-1 (Syn1), and dynamin-1 (Dnm1), as well as the microtubule-associated protein Tau (Mapt) and the dihydropyrimidinase-related proteins 2 and 5 (Dpysl2 and Dpysl5), and others (Fig. 2D). Overall, the overlap of identified and quantified sites with the results of previous studies is approximately 60% as determined by the overlap in protein sequences flanking phosphorylation sites (sequence windows). Enrichment analysis of the biological function of proteins carrying regulated phosphorylation sites (DAVID (68)) revealed gene ontology (GO) terms tightly connected with synaptic functioning, cytoskeleton organization, regulation of synaptic functions, and neuronal projections development (Fig. 3A). A similar picture (Fig. 3B) was obtained when using the synapse- specific SynGo database in which a large set of synaptic proteins was annotated by experts (70). It shows that the significantly enriched terms describe biological functions connected with SV cycling, regulation of neurotransmitter FIG. 3. Functional annotation of proteins carrying regulated phosphorylation sites based on Ca versus EGTA experiments. A, Asso- ciation between significantly enriched GO terms and kinase groups. The enriched biological function-GO terms (background: Rattus norvegicus, p < 0.001) were derived using DAVID web service (68) for proteins carrying regulated phosphorylation sites. Overrepresentation of putative kinase–substrates relationships was tested for proteins annotated by each GO term. Frequencies of putative kinase–substrate relationships across all regulated sites for Ca versus EGTA experiments were taken as a background. The color encodes raw p-values (Fisher’s exact test). B, Sunburst diagram showing enriched biological function terms based on the synapse-specific SynGo database annotation (70). The color en- codes the significance of the enrichment (-log10 (q-value)). Full list of enriched biological functions can be found in supplemental Table S2. FIG. 3. Functional annotation of proteins carrying regulated phosphorylation sites based on Ca versus EGTA experiments. A, Asso- ciation between significantly enriched GO terms and kinase groups. The enriched biological function-GO terms (background: Rattus norvegicus, p < 0.001) were derived using DAVID web service (68) for proteins carrying regulated phosphorylation sites. Overrepresentation of putative kinase–substrates relationships was tested for proteins annotated by each GO term. Frequencies of putative kinase–substrate relationships across all regulated sites for Ca versus EGTA experiments were taken as a background. The color encodes raw p-values (Fisher’s exact test). Synaptosome Depolarization by KCl in the Presence of Ca2+ Results in Substantial Changes in Protein Phosphorylation B, Sunburst diagram showing enriched biological function terms based on the synapse-specific SynGo database annotation (70). The color en- codes the significance of the enrichment (-log10 (q-value)). Full list of enriched biological functions can be found in supplemental Table S2. FIG. 3. Functional annotation of proteins carrying regulated phosphorylation sites based on Ca versus EGTA experiments. A, Asso- ciation between significantly enriched GO terms and kinase groups. The enriched biological function-GO terms (background: Rattus norvegicus, p < 0.001) were derived using DAVID web service (68) for proteins carrying regulated phosphorylation sites. Overrepresentation of putative kinase–substrates relationships was tested for proteins annotated by each GO term. Frequencies of putative kinase–substrate relationships across all regulated sites for Ca versus EGTA experiments were taken as a background. The color encodes raw p-values (Fisher’s exact test). B, Sunburst diagram showing enriched biological function terms based on the synapse-specific SynGo database annotation (70). The color en- codes the significance of the enrichment (-log10 (q-value)). Full list of enriched biological functions can be found in supplemental Table S2. Mol Cell Proteomics (2021) 20 100061 9 Protein Phosphorylation in Depolarized Synaptosomes MAPK, PKC, and GSK3 kinase groups (supplemental Table S3). When comparing the quantitative Ca versus EGTA phosphorylation data, significantly fewer (P ≅1.0 × 10-5) regulated phosphorylation sites could be ascribed to being CaMKII substrates, whereas putative sites for MAPK (1), CLK (2), and PAK (3) were slightly over- (1, 2) or under- (3) repre- sented, respectively (Fig. 2F, supplemental Table S4). There- fore, the crucial point in this analysis is the distribution of up- or downregulated phosphorylation sites for the different ki- nase groups. While depolarization of synaptosomes by KCl in the presence of Ca2+ leads to significantly reduced intensities of phosphorylation sites presumably regulated by MAPK and CDK kinases, the intensities of the putative MAPK, CDK, and GSK3 substrates appear higher when comparing mock- treated with BoNT-treated synaptosomes (compare Fig. 2, E and F). The balance of up- and downregulated phosphoryla- tion sites was also significantly altered (p < 0.01) for CLK, CK1, and PAK kinases. release, and synapse organization (for a complete list of enriched terms, see supplemental Table S2). Interestingly, regulation of some functions might be linked to the activity of certain kinase groups (Fig. 3A). Synaptosome Depolarization by KCl in the Presence of Ca2+ Results in Substantial Changes in Protein Phosphorylation For example, the number of sites predicted to be substrates for GSK3 and CDK is pro- portionally higher among proteins involved into the GO term “axonogenesis” as compared with other GO terms. Similarly, many phosphorylated sites on proteins that are involved in the “calcium-dependent regulation of synaptic functions” were also predicted as CaMKII substrates. The proportion of pu- tative MAPK substrates is higher for proteins associated with “synapse assembly” and “cytoskeleton organization” as compared with other GO terms. This analysis reflects, in accordance with recent studies (41, 42), the overall changes of phosphorylation in isolated nerve terminals upon stimulation—including the phosphosites that are important for exocytosis and endocytosis, i.e., for SV cycling. However, the observed effects can be a result of both Ca2+ influx and active SV cycling. Dissecting Primary Ca2+-Driven Phosphorylation Events from Events Linked to SV Cycling Block of SV Cycling with Botulinum Neurotoxins Induces Changes in Protein Phosphorylation Assuming that the comparison of mock-treated synapto- somes with the BoNT-treated ones reveals the phosphoryla- tion changes caused by Ca2+-induced SV cycling, we were able to identify phosphorylation events that are primarily dependent on Ca2+ influx and are not affected if SV cycling is inhibited (Figs. 4A and S3, orange dots). In the following, we refer to these sites as “primary Ca2+-dependent” sites. They are presumably directly (de)phosphorylated by Ca2+-depen- dent protein kinases and phosphatases upon Ca2+ influx. Conversely, a large group of phosphorylation events has shown changes when comparing mock- and BoNT-treated synaptosomes. Hence, we termed these sites “SV-cycling- dependent.” We noted with interest that the majority of “SV- cycling-dependent” sites did not show significant intensity changes in the Ca/EGTA experiment. We also noted that many proteins tend to carry regulated phosphorylation sites of one of the two groups introduced above, e.g., mostly “primary Ca2+-dependent” or “SV-cycling-dependent” sites, while only a few contain sites of various categories (Fig. 4B). Interest- ingly, the number of proteins that carry mostly “primarily Ca2+- dependent” sites is lower than the number of proteins that carry mostly “SV-cycling-dependent” sites (Fig. 4B). It in- dicates the tendency that “primarily Ca2+-dependent” phos- phorylation sites appear clustered on a few proteins, whereas “SV-cycling-dependent” sites are often found as the only significantly regulated phosphorylation site in a single protein. The site occupancy assessment (based on the model of Hoegrebe et al. Synaptosome Depolarization by KCl in the Presence of Ca2+ Results in Substantial Changes in Protein Phosphorylation A, Categorization of phosphorylation events based on the magnitude of the log2 fold changes in Mock versus BoNT experiment (x-axis) and log2 fold changes in Ca versus EGTA experiment (y-axis). Only events quantified in both experiments and satisfying a q-value threshold of <0.01 are shown. The events are classified into two regulation groups: (i) “primary Ca2+-dependent” (sites with no significant or not-quantified SV cycling effect, i.e., absolute log2 (Mock/BoNT) < 0.263 and absolute log2 (Ca/EGTA) > 0.263), shown as orange dots; and (ii) “SV-cycling-dependent” (absolute log2 (Mock/BoNT) > 0.263). B, Proportion of proteins that can be organized in one of the regulation groups based on the categorization of phosphorylation sites they carry. Only sites that surpassed the FDR-threshold of <1% were considered. If > 60% of the significantly regulated sites on a protein belong to one of the two regulation groups (“primary Ca2+-dependent” or “SV-cycling-dependent”), the protein is categorized in “mostly primary Ca2+-dependent” or “mostly SV-cycling-dependent,” respectively. C, Enrichment of predicted kinase–substrate interactions for “primary Ca2+-dependent” and “SV- cycling-dependent” regulation groups. The left panel shows the percentage and the absolute number of sites in each category (x-axis) that can be regulated by a particular kinase group (y-axis). The number under the black line provides the total number of sites with predicted kinase– substrate relationship in each category. The right panel shows Benjamini–Hochberg adjusted p-values after a Fisher’s exact test. An equal distribution of kinase–substrates relationships between the “primary Ca2+-dependent” and “SV-cycling-dependent” categories was set as a null hypothesis. D, Reactome pathway terms of neuronal origin (69). Reactome pathway terms of neuronal origin were selected based on their enrichment (Benjamini–Hochberg adjusted p-value < 0.1) for all proteins carrying significantly regulated phosphorylation sites. Proportion of “primary Ca2+-dependent” and “SV-cycling-dependent” sites of all “primary Ca2+-dependent” or “SV-cycling-dependent” sites per functional term is shown as color code (magenta). Fisher’s exact test was applied to test equal distribution of “primary Ca2+-dependent” and “SV-cycling- dependent” sites for each term. Benjamini–Hochberg adjusted p-values are represented as a color code (green). Abbreviations: AMPAR stays for α-amino-3-hydroxy-5-methyl-4-isoxazolepropionic acid receptor; CREB1 ~ CAMP-responsive element binding protein 1; GABA ~ γ-ammino- butyric acid; NMDAR ~ N-methyl-d-aspartate receptor; RAS ~ rat sarcoma gene. FIG. 4. Dependence of regulated phosphorylation sites on calcium influx and SV cycling. Synaptosome Depolarization by KCl in the Presence of Ca2+ Results in Substantial Changes in Protein Phosphorylation A, Categorization of phosphorylation events based on the magnitude of the log2 fold changes in Mock versus BoNT experiment (x-axis) and log2 fold changes in Ca versus EGTA experiment (y-axis). Only events quantified in both experiments and satisfying a q-value threshold of <0.01 are shown. The events are classified into two regulation groups: (i) “primary Ca2+-dependent” (sites with no significant or not-quantified SV cycling effect, i.e., absolute log2 (Mock/BoNT) < 0.263 and absolute log2 (Ca/EGTA) > 0.263), shown as orange dots; and (ii) “SV-cycling-dependent” (absolute log2 (Mock/BoNT) > 0.263). B, Proportion of proteins that can be organized in one of the regulation groups based on the categorization of phosphorylation sites they carry. Only sites that surpassed the FDR-threshold of <1% were considered. If > 60% of the significantly regulated sites on a protein belong to one of the two regulation groups (“primary Ca2+-dependent” or “SV-cycling-dependent”), the protein is categorized in “mostly primary Ca2+-dependent” or “mostly SV-cycling-dependent,” respectively. C, Enrichment of predicted kinase–substrate interactions for “primary Ca2+-dependent” and “SV- cycling-dependent” regulation groups. The left panel shows the percentage and the absolute number of sites in each category (x-axis) that can be regulated by a particular kinase group (y-axis). The number under the black line provides the total number of sites with predicted kinase– substrate relationship in each category. The right panel shows Benjamini–Hochberg adjusted p-values after a Fisher’s exact test. An equal distribution of kinase–substrates relationships between the “primary Ca2+-dependent” and “SV-cycling-dependent” categories was set as a null hypothesis. D, Reactome pathway terms of neuronal origin (69). Reactome pathway terms of neuronal origin were selected based on their enrichment (Benjamini–Hochberg adjusted p-value < 0.1) for all proteins carrying significantly regulated phosphorylation sites. Proportion of “primary Ca2+-dependent” and “SV-cycling-dependent” sites of all “primary Ca2+-dependent” or “SV-cycling-dependent” sites per functional term is shown as color code (magenta). Fisher’s exact test was applied to test equal distribution of “primary Ca2+-dependent” and “SV-cycling- dependent” sites for each term. Benjamini–Hochberg adjusted p-values are represented as a color code (green). Abbreviations: AMPAR stays for α-amino-3-hydroxy-5-methyl-4-isoxazolepropionic acid receptor; CREB1 ~ CAMP-responsive element binding protein 1; GABA ~ γ-ammino- butyric acid; NMDAR ~ N-methyl-d-aspartate receptor; RAS ~ rat sarcoma gene. FIG. 4. Dependence of regulated phosphorylation sites on calcium influx and SV cycling. Synaptosome Depolarization by KCl in the Presence of Ca2+ Results in Substantial Changes in Protein Phosphorylation (78)) suggests high phosphorylation levels (>60%) for a number of phosphoproteins, including Bsn, Pclo, Dnm1, Camk2a, Mapt, and Dplysl5, underlining the impor- tance of the observed phosphorylation events (supplemental Fig. S4). It should be noted that the estimated phosphoryla- tion levels represent only a rough estimate, as the ratio As indicated above, our first quantitative analysis does not allow for differentiating phosphorylation changes that are directly dependent on active membrane trafficking in the synapse rather than being caused by the activation of calcium-dependent kinases and phosphatases such as CaMKII (23), calcineurin (86), etc. Of course, these processes are intertwined since these enzymes are known to regulate the phosphorylation status of proteins closely associated with the process of SV cycling (87, 88). We suppressed SV cycling by incubating synaptosomes with BoNT that block exocytosis by cleaving SNARE proteins. Toxin-treated synaptosomes and (as controls) synaptosomes incubated with inactivated toxins were stimulated with the high-potassium buffer in the presence of Ca2+ ions (Fig. 1). The toxin treatment greatly inhibited neurotransmitter release (supplemental Fig. S1B) but did not compromise Ca2+ influx (supplemental Fig. S1C). It led to significant changes in the phosphoproteome of the synaptosomes: 1497 sites showed significant difference with a minimum of 20% intensity changes at 1% FDR that can be mapped to approximately 700 proteins. Strikingly, BoNT treatment reduced the intensity of many phosphorylation sites (Fig. 2C). The phosphorylation status of these sites and their corresponding proteins is apparently dependent on the Ca2+-induced SV cycling activity in the presynapse. The enrichment analyses for GO terms did not show sub- stantial differences when compared with proteins carrying regulated sites in Ca versus EGTA experiments (not shown). The impact of BoNT treatment became apparent when we investigated possible substrate–kinase relationships. The enrichment analysis showed significant overrepresentation (p < 0.01) of phosphorylation sites that can be attributed to 10 Mol Cell Proteomics (2021) 20 100061 Protein Phosphorylation in Depolarized Synaptosomes FIG. 4. Dependence of regulated phosphorylation sites on calcium influx and SV cycling. A, Categorization of phosphorylation events based on the magnitude of the log2 fold changes in Mock versus BoNT experiment (x-axis) and log2 fold changes in Ca versus EGTA experiment (y-axis). Only events quantified in both experiments and satisfying a q-value threshold of <0.01 are shown. The events are classified into two FIG. 4. Dependence of regulated phosphorylation sites on calcium influx and SV cycling. Synaptosome Depolarization by KCl in the Presence of Ca2+ Results in Substantial Changes in Protein Phosphorylation In contrast, terms associated with “Neurotransmitter release cycle”, e.g., glutamate, acetylcholine, etc., release, are barely enriched in phosphorylated proteins that carry “SV- cycling-dependent” sites (Fig. 4D, top). Reactome pathway annotation aligned well with the manual annotation of key- words describing protein function or location according to in- formation available in the literature (supplemental Fig. S8). On the basis of our annotation, we noted that 234 out of 301 phosphorylation sites on proteins directly involved in the pro- cesses of exo- and endocytosis belong to the “primary Ca2+- dependent” group. For example, phosphorylation of RIM, RIM- binding protein, synapsin-1, and “dephosphins” such as dynamin-1 (Dnm1), amphiphysin (Amph), and AP180 (Snap91) showed a clear Ca2+-dependent character (supplemental Figs. S9 and S10). Importantly, phosphorylation sites on synapsin-1 followed the previously described pattern of phosphorylation changes when comparing Ca with the EGTA condition: increased phosphorylation of S9 and S603 and dephosphorylation of S62, S67, S549, and S551 (90–95) (supplemental Fig. S11). In contrast, the “SV-cycling-depen- dent” phosphorylation sites tended to be present on proteins that are described as being associated with cytoskeleton ele- ments and channels, for example, spectrin beta (Sptb, Sptan1, Sptbn1, Sptbn2, Sptbn4) and spectrin-binding proteins addu- cin alpha (Add1) and beta (Add2), as well as potassium channel subunits that are known constituents or modulators of Kv1 (Kcna2, Kcna4, Kcnab2), Kv2 (Kcnb1, Kcnb2), Kv4.3 (Kcnd2), Kv7.2 (Kcnq2), K2p10.1 (Kcnk10), Hcn (Hcn1, Hcn2, Kctd3) potassium channels (96) (supplemental Figs. S12–S15). As mentioned above, the observed SV cycling effect on several potassium channels seems to be very specific for the particular proteins and results in increased phosphorylation of the ma- jority of those proteins except Add1 and Kcnma2 (supplemental Fig. S16). Conversely, the Ca2+-activated po- tassium channel subunit alpha-1 (Kcnma1) and several other potassium channel subunits and modulators (Kcnc3, Kcnh1, Kcnip2, Kcnq5) have shown the “primary Ca2+-dependent” character of phosphorylation (supplemental Fig. S17). We summarize changes in phosphorylation site intensities for protein sequences that contain phosphorylation sites signifi- cantly regulated in one of the experiments and provide them as graphics in supplemental Data 5 and 6 (log2(Ca/EGTA) and log2(Mock/BoNT), respectively). These can be also visualized using a shiny app accessible at https://s1608-shiny.mpibpc. mpg.de. Figure 5 summarizes our results according to the schematic representation of proteins at the presynapse (97). compression, which is a known issue for the TMT-based quantification, might severely affect the occupancy calcula- tion. In terms of probable kinase regulation (Fig. Synaptosome Depolarization by KCl in the Presence of Ca2+ Results in Substantial Changes in Protein Phosphorylation As mentioned above, the observed SV cycling effect on several potassium channels seems to be very specific for the particular proteins and results in increased phosphorylation of the ma- jority of those proteins except Add1 and Kcnma2 (supplemental Fig. S16). Conversely, the Ca2+-activated po- tassium channel subunit alpha-1 (Kcnma1) and several other potassium channel subunits and modulators (Kcnc3, Kcnh1, Kcnip2, Kcnq5) have shown the “primary Ca2+-dependent” character of phosphorylation (supplemental Fig. S17). We summarize changes in phosphorylation site intensities for protein sequences that contain phosphorylation sites signifi- cantly regulated in one of the experiments and provide them as graphics in supplemental Data 5 and 6 (log2(Ca/EGTA) and log2(Mock/BoNT), respectively). These can be also visualized using a shiny app accessible at https://s1608-shiny.mpibpc. mpg.de. Figure 5 summarizes our results according to the schematic representation of proteins at the presynapse (97). Importantly, the proteins of the core exocytotic machinery including synaptobrevin, SNAP-25, syntaxin-1a, and Munc18 exhibit SV-cycling-dependent sites, while Munc13 reveals one SV-cycling-dependent site, which is close to the significance cutoff. y ( pp g ) We noticed that numerous phosphorylation events on phosphatases and phosphatase regulators were significantly regulated in our study (supplemental Fig. S7A). Particularly, Neurabin-1 (Ppp1r9a), a PP1 regulator, showed increased phosphorylation in the Mock/BoNT experiment, suggesting the involvement of PP1 in regulating SV cycling. Although phosphatase–substrate interactions are more difficult to analyze due to the degenerated nature of phosphatase docking motifs, previous studies led to the proposal of docking motifs of PP1 and the Ca2+-calmodulin-dependent phosphatase calcineurin (76). We therefore examined possible interactions between exo- and endocytosis-related proteins containing PP1 or Calcineurin docking motifs and the respective phosphatase (supplemental Fig. S7, B and C). Available interactome data suggest a partially overlapping set of proteins that can be regulated by the phosphatases (e.g., Rims2, Bsn, Bin1, Stxbp1), which does not allow confident assignment of a phosphatase to a particular phosphorylation event. When considering all potential targets, our results show a minor increase in the percentage of “SV-cycling-dependent” sites over “primary Ca2+-dependent” sites on proteins that can be regulated by PP1 (Fisher’s exact test, p = 0.075, supplemental Fig. S7D). Because of the tendency of proteins to carry preferentially one of the two groups of significantly regulated phosphoryla- tion sites, we set out to investigate the putative biological functions of these proteins in order to delineate processes that can be controlled by “primary Ca2+-dependent” or “SV-cycling dependent” phosphorylations. Synaptosome Depolarization by KCl in the Presence of Ca2+ Results in Substantial Changes in Protein Phosphorylation A, Categorization of phosphorylation events based on the magnitude of the log2 fold changes in Mock versus BoNT experiment (x-axis) and log2 fold changes in Ca versus EGTA experiment (y-axis). Only events quantified in both experiments and satisfying a q-value threshold of <0.01 are shown. The events are classified into two regulation groups: (i) “primary Ca2+-dependent” (sites with no significant or not-quantified SV cycling effect, i.e., absolute log2 (Mock/BoNT) < 0.263 and absolute log2 (Ca/EGTA) > 0.263), shown as orange dots; and (ii) “SV-cycling-dependent” (absolute log2 (Mock/BoNT) > 0.263). B, Proportion of proteins that can be organized in one of the regulation groups based on the categorization of phosphorylation sites they carry. Only sites that surpassed the FDR-threshold of <1% were considered. If > 60% of the significantly regulated sites on a protein belong to one of the two regulation groups (“primary Ca2+-dependent” or “SV-cycling-dependent”), the protein is categorized in “mostly primary Ca2+-dependent” or “mostly SV-cycling-dependent,” respectively. C, Enrichment of predicted kinase–substrate interactions for “primary Ca2+-dependent” and “SV- cycling-dependent” regulation groups. The left panel shows the percentage and the absolute number of sites in each category (x-axis) that can be regulated by a particular kinase group (y-axis). The number under the black line provides the total number of sites with predicted kinase– substrate relationship in each category. The right panel shows Benjamini–Hochberg adjusted p-values after a Fisher’s exact test. An equal distribution of kinase–substrates relationships between the “primary Ca2+-dependent” and “SV-cycling-dependent” categories was set as a null hypothesis. D, Reactome pathway terms of neuronal origin (69). Reactome pathway terms of neuronal origin were selected based on their enrichment (Benjamini–Hochberg adjusted p-value < 0.1) for all proteins carrying significantly regulated phosphorylation sites. Proportion of “primary Ca2+-dependent” and “SV-cycling-dependent” sites of all “primary Ca2+-dependent” or “SV-cycling-dependent” sites per functional term is shown as color code (magenta). Fisher’s exact test was applied to test equal distribution of “primary Ca2+-dependent” and “SV-cycling- dependent” sites for each term. Benjamini–Hochberg adjusted p-values are represented as a color code (green). Abbreviations: AMPAR stays for α-amino-3-hydroxy-5-methyl-4-isoxazolepropionic acid receptor; CREB1 ~ CAMP-responsive element binding protein 1; GABA ~ γ-ammino- butyric acid; NMDAR ~ N-methyl-d-aspartate receptor; RAS ~ rat sarcoma gene. Mol Cell Proteomics (2021) 20 100061 11 Protein Phosphorylation in Depolarized Synaptosomes Another striking difference is that phosphorylated proteins termed with “Synaptic adhesion-like molecules” and “Neurex- ins and neuroligins” are enriched in SV-cycling-dependent group. Synaptosome Depolarization by KCl in the Presence of Ca2+ Results in Substantial Changes in Protein Phosphorylation 4C), sites predicted to be CaMKII substrates include significantly more “primary Ca2+-dependent” sites than sites classified as “SV- cycling dependent.” This harmonizes well with the strict Ca2+ dependence of CaMKII activity (89). Conversely, the MAPK group controls significantly more “SV-cycling dependent” sites than “primary Ca2+-dependent” sites. Similarly, predicted PAK substrates are overrepresented among “primary Ca2+- dependent” sites, whereas predicted PKC, CDK, and CLK- substrates appear more often among “SV-cycling-depen- dent” sites (Fig. 4C). The majority of phosphorylation sites on CAMKII, MAPK1, MAPK3, and PRKCB themselves show dependence on calcium ions. Increased phosphorylation of the regulatory sites of CaMKII, MAPK1, MAPK3, and PRKCB (Camk2a-T286, Camk2b-T287, Camk2d-T287, Mapk1-T183, Y185, Mapk3-T203, Y205, Prkcb-T640) points to the activa- tion of those kinases following depolarization of synaptosmes by KCl (supplemental Figs. S5 and S6). Another striking difference is that phosphorylated proteins termed with “Synaptic adhesion-like molecules” and “Neurex- ins and neuroligins” are enriched in SV-cycling-dependent group. In contrast, terms associated with “Neurotransmitter release cycle”, e.g., glutamate, acetylcholine, etc., release, are barely enriched in phosphorylated proteins that carry “SV- cycling-dependent” sites (Fig. 4D, top). Reactome pathway annotation aligned well with the manual annotation of key- words describing protein function or location according to in- formation available in the literature (supplemental Fig. S8). On the basis of our annotation, we noted that 234 out of 301 phosphorylation sites on proteins directly involved in the pro- cesses of exo- and endocytosis belong to the “primary Ca2+- dependent” group. For example, phosphorylation of RIM, RIM- binding protein, synapsin-1, and “dephosphins” such as dynamin-1 (Dnm1), amphiphysin (Amph), and AP180 (Snap91) showed a clear Ca2+-dependent character (supplemental Figs. S9 and S10). Importantly, phosphorylation sites on synapsin-1 followed the previously described pattern of phosphorylation changes when comparing Ca with the EGTA condition: increased phosphorylation of S9 and S603 and dephosphorylation of S62, S67, S549, and S551 (90–95) (supplemental Fig. S11). In contrast, the “SV-cycling-depen- dent” phosphorylation sites tended to be present on proteins that are described as being associated with cytoskeleton ele- ments and channels, for example, spectrin beta (Sptb, Sptan1, Sptbn1, Sptbn2, Sptbn4) and spectrin-binding proteins addu- cin alpha (Add1) and beta (Add2), as well as potassium channel subunits that are known constituents or modulators of Kv1 (Kcna2, Kcna4, Kcnab2), Kv2 (Kcnb1, Kcnb2), Kv4.3 (Kcnd2), Kv7.2 (Kcnq2), K2p10.1 (Kcnk10), Hcn (Hcn1, Hcn2, Kctd3) potassium channels (96) (supplemental Figs. S12–S15). Synaptosome Depolarization by KCl in the Presence of Ca2+ Results in Substantial Changes in Protein Phosphorylation In most cases, an official gene symbol was used to name proteins, except: Bassoon stays for Bsn; Ca2+-ATPase ~ Atp2b1, Atp2b2, Atp2b3; Camsap ~ Camsap1, Camsap3; CatininA ~ Cttna2; CatininD ~ Ctnnd1, Ctnnd2; Dystrobrevin ~ Dtnb; Dystrophin-related ~ Drp2; Liprin ~ Ppfia1, Ppfia2, Ppfia3, Ppfia4; Map ~ Map1a, Map1b, Map1s, Map2, Map4, Map6, Map7d1, Map7d2; Mapk ~ Mapk1, Mapk3; Na+/K+ ATPase ~ Atp1a1, Atp1a2, Atp1a3; Na+-Channel ~ Scn1a, Scn1b, Scn2b, Scn3a; Neurexins ~ Nrxn1; Piccolo ~ Pcl; RIM-BPs ~ Rimbp1, Rimbp2; RIMs ~ Rim1, Rim2; Spectrin ~ Sptan1, Sptb, Sptbn1, Sptbn2, Sptbn4; Stathmin ~ Stmn1; Synaptotagmin ~ Syt1, Syt6, Syt9, Syt10, Syt17, Styl5, Esyt2; Syntaxin ~ Stx1a, Stx1b, Stx12; Syntrophin ~ Sntb2; Tomosyn ~ Stxbp5; VAMP ~ Vamp2; V-ATPase ~ Atp6v1d; VELI ~ Lin7a, Lin7b, Lin7c. Asterisks mark sites that do not meet significance criteria of q-value < 0.01: Unc13a- pS389 (q-value = 0.013), Rab3a-pS188 (q-value = 0.012). Synaptosome Depolarization by KCl in the Presence of Ca2+ Results in Substantial Changes in Protein Phosphorylation Reactome pathway analysis (69) sheds light on the putative different function of the involved phosphorylated proteins (Fig. 4D). One obvious difference regarding the two groups is that proteins are connected to potassium channels (“Voltage-gated potassium channels”), which are more enriched in the “SV-cycling-dependent” group. 12 Mol Cell Proteomics (2021) 20 100061 Protein Phosphorylation in Depolarized Synaptosomes FIG. 5. Schematic representation of presynaptic compartment with a single docked synaptic vesicle, plasma membrane, and cyto- skeleton elements, based on Chua et al (97). The represented proteins are categorized in “mostly primary Ca2+-dependent” (yellow), “mostly SV-cycling-dependent” (blue), “Mixed” (brown) based on the regulation type of the phosphorylation sites they carry. Proteins with no signifi- cantly regulated phosphorylation sites are represented in gray; proteins for which no first-class phosphorylation sites (MaxQuant localization probability <0.75) were identified are represented in white. In most cases, an official gene symbol was used to name proteins, except: Bassoon stays for Bsn; Ca2+-ATPase ~ Atp2b1, Atp2b2, Atp2b3; Camsap ~ Camsap1, Camsap3; CatininA ~ Cttna2; CatininD ~ Ctnnd1, Ctnnd2; Dystrobrevin ~ Dtnb; Dystrophin-related ~ Drp2; Liprin ~ Ppfia1, Ppfia2, Ppfia3, Ppfia4; Map ~ Map1a, Map1b, Map1s, Map2, Map4, Map6, Map7d1, Map7d2; Mapk ~ Mapk1, Mapk3; Na+/K+ ATPase ~ Atp1a1, Atp1a2, Atp1a3; Na+-Channel ~ Scn1a, Scn1b, Scn2b, Scn3a; Neurexins ~ Nrxn1; Piccolo ~ Pcl; RIM-BPs ~ Rimbp1, Rimbp2; RIMs ~ Rim1, Rim2; Spectrin ~ Sptan1, Sptb, Sptbn1, Sptbn2, Sptbn4; Stathmin ~ Stmn1; Synaptotagmin ~ Syt1, Syt6, Syt9, Syt10, Syt17, Styl5, Esyt2; Syntaxin ~ Stx1a, Stx1b, Stx12; Syntrophin ~ Sntb2; Tomosyn ~ Stxbp5; VAMP ~ Vamp2; V-ATPase ~ Atp6v1d; VELI ~ Lin7a, Lin7b, Lin7c. Asterisks mark sites that do not meet significance criteria of q-value < 0.01: Unc13a- pS389 (q-value = 0.013), Rab3a-pS188 (q-value = 0.012). FIG. 5. Schematic representation of presynaptic compartment with a single docked synaptic vesicle, plasma membrane, and cyto- skeleton elements, based on Chua et al (97). The represented proteins are categorized in “mostly primary Ca2+-dependent” (yellow), “mostly SV-cycling-dependent” (blue), “Mixed” (brown) based on the regulation type of the phosphorylation sites they carry. Proteins with no signifi- cantly regulated phosphorylation sites are represented in gray; proteins for which no first-class phosphorylation sites (MaxQuant localization probability <0.75) were identified are represented in white. Phosphomimetic Sites on SNARE Proteins and Cannabinoid Receptor-1 Modulate Neurotransmitter Release Surprisingly, we found that inhibition of exocytosis by BoNT had a profound effect on the phosphoproteome despite unchanged calcium influx. These findings reveal complex signaling cascades during which regulatory changes in protein phosphorylation are not only dependent on the activation of kinase/phospha- tase networks but also on the progression of vesicular trafficking. By using isobaric tandem-mass tags for labeling of phosphorylated peptides, we were able to substantially in- crease the phosphoproteome coverage and to achieve reli- able quantification for thousands of phosphorylation sites. Despite differences in the synaptosome preparation (Ficoll- purified synaptosomes versus crude synaptosomal pellet) and stimulation (50 mM KCl for 2 min versus 75 mM KCl for 10 s), many of the regulated phosphorylation sites observed by us are in excellent agreement with earlier results from another laboratory (Fig. 2D) (42). Our data show higher magnitudes of changes, which are probably a consequence of the prolonged stimulation time used in our study. The most drastic changes were observed for pacsin (Pacs1- S517, log2 fold change of 3.98), thymosin beta (Tmsb4x-T23, 2.63), ADP-ribosylation factor GTPase activating protein 1 (Arfgap1-S247 2.57), calcium/calmodulin-dependent protein kinase type II subunit delta (Camk2d-S315/S319, 2.49), protein bassoon (Bsn-S1354, –2.06), septin 5 (Sept5-S17, –1.93), and RIM-binding protein 2 (Rimbp2-S554, –1.86). We also confirm phosphorylation changes in response to stimulation that were reported earlier for synapsin-1, dyna- min-1, Tau protein, as well as the multisite phosphorylations of the giant active zone proteins bassoon and piccolo (26, 31, 36, 101). The cannabinoid receptor-1 is known for modulation of the neurotransmitter release (49, 99, 100), and its activation can also be linked, through the activation of MAP kinases, to the phosphorylation of Munc-18 (37). Our experiments show that the pseudo-phosphorylated variant Cnr1-T314E/T322E reduced exocytosis (most evident during short stimulation), while the nonphosphorylatable variant Cnr1-T314A/T322A increased exocytosis in response to long or short stimulation. The effect on endocytosis was observed only for the pseudo- phosphorylatable Cnr1 variant after long stimulation (Fig. 6, H and I). These experiments tested only three of the synaptic phos- phorylation sites that we found differentially phosphorylated in this work. Nevertheless, even if these experiments are based on overexpression in a background containing normal levels of WT proteins, all tested candidates resulted in significant modulations of exo- or endocytosis. Phosphomimetic Sites on SNARE Proteins and Cannabinoid Receptor-1 Modulate Neurotransmitter Release expressed the respective wild-type (WT) proteins, their phos- phomimetic mutants, and phosphorylation-null mutants in cultured hippocampal neurons (Fig. 6A). With this strategy, we addressed Vamp2-S75, Stx1-S21/ S23, Cnr1-T314/T322, and their respective mutants (Vamp2- S75D; Vamp2-S75A; Stx1-S21E/S23E; Stx1-S21A/S23A; Cnr1-T314E/T322E, and Cnr1-T314A/T322A). For these pro- teins we created adeno-associated viruses (AAVs) that allowed us to mimic the effects of phosphorylation, and we expressed them in neurons together with Vamp2-pHluorin, as a sensor for exo-/endocytosis (Fig. 6, B and C). Since protein phosphorylation can be an epiphenomenon of intracellular signaling, we selected a few of the changing phosphosites for determining directly whether they indeed have a modulatory effect on synaptic transmission. We noted with interest that certain phosphorylation sites on SNARE proteins, including synaptobrevin (Vamp2) and syntaxin-1a (Stx1a), have a phenotype, which belongs to the “SV-cycling-dependent” group (supplemental Fig. S18). More intriguing, some of those sites (such as Vamp2-S75) were previously described as being important for the interaction with Munc18-1, a protein that can exhibit a stimulatory effect on trans-SNARE zippering (46). Similarly, we noted that two sites on the cannabinoid receptor-1 (Cnr1), T314 and T322, belong to the “SV-cycling-dependent” group as well. In order to test the effects of phosphorylation at these sites, we Our stimulation experiments demonstrated that both phosphomimetic and nonphosphorylatable amino-acid sub- stitutions, in both proteins, influence exo- and endocytosis in the cultured neurons. Specifically, we stimulated neurons with either 60 action potentials (AP) at 20 Hz (short stimulation) targeting the readily releasable pool of SVs and thus reflecting the immediate exocytotic response, or using 600 AP at 20 Hz Mol Cell Proteomics (2021) 20 100061 13 Protein Phosphorylation in Depolarized Synaptosomes (long stimulation) to mobilize the more inert recycling SV pools, reaching a state in which the entire vesicle cycle is fully activated (98). The expression of phosphomimetic Vamp2- S75D reduced exocytosis following short and long stimula- tion; it also reduced endocytosis in response to long stimulation. Expression of nonphosphorylatable Vamp2-S75A reduced exo- and endocytosis following both long and short stimulations (Fig. 6, D and E). Conversely, pseudo- phosphorylated Stx1a-T21E/T23E enhances exocytosis efficiency during short stimulation, while the non- phosphorylatable variant does the opposite (Fig. 6F). The effects on exocytosis become negligible during long stimula- tion, but both mutant variants result in an enhancement of endocytosis under these conditions (Fig. 6G). require active endo–exocytotic SV cycling. Phosphomimetic Sites on SNARE Proteins and Cannabinoid Receptor-1 Modulate Neurotransmitter Release Although in the case of Vamp2 both mutants led to a substantial reduction in exocy- tosis rates, its pseudo-phosphorylated form (Vamp2-S75D) showed a greater effect on exocytosis than the non- phosphorylatable form (Vamp2-S75A). Presumably, the absence of a charged residue did not fully compensate the steric effect caused by the amino acid substitution at position 75 of Vamp2, which has apparently a stronger impact on protein function than the double mutant at positions 21/23 of Stx1a. The S75 phosphorylation site is located within the R-SNARE motif required for forming a coiled-coil complex with Stx1a and Snap25 during exocytosis. In contrast, the T21/T23 positions of Stx1a are located in the regulatory N-terminal helical bundle, explaining why mutations show different effects on exocytosis. Overall, these findings support the concept that protein phosphorylation is a key regulatory mechanism in neurotransmitter release that modulates different steps in the SV cycle. It seems that several proteins known to function at the postsynapse respond to potassium chloride stimulation and BoNT treatment in synaptosomes (e.g., Shank1, 2, 3; com- ponents of NMDAR, Grin1, Grin2a, Grin2b). It would be of interest to investigate whether these proteins are also present at measurable levels in the presynapse and whether they are affected by synaptic activity. Although synaptosomal prepa- rations are known to contain fragments of the postsynaptic membrane (102), they usually do not retain metabolic activity, in contrast to functionally active membrane-enclosed nerve terminals that can maintain the ATP levels needed for phos- phorylation (50–53). Clearly, the primary trigger for the phosphorylation changes is calcium that enters synaptosomes following potassium- induced depolarization. Calcium directly regulates the activ- ity of kinases and phosphatases, including CaMKII, PKC, calcineurin, PP1, etc. (23, 89, 103, 104). Accordingly, we observe increased phosphorylation of specific sites on CaM- KII and MAP kinases that are known to result in activation of the kinases as well as enrichment of possible substrates for CaMKII, MAPK, and GSK3 kinases among regulated phos- phorylation sites. 14 Mol Cell Proteomics (2021) 20 100061 Protein Phosphorylation in Depolarized Synaptosomes dephosphorylation of many substrates, the observed effect can be explained either by activation of phosphatase or by suppression of kinase activities that are not caused directly by calcium but by changes in proteins that are themselves regulated by the activity of the SV cycle and in turn control kinases or phosphatases. Moreover, it is conceivable that the availability of phosphorylation sites on substrate proteins is coupled to its “activity cycle.” Trafficking steps such as SV docking, priming, fusion, coat formation, fission, and SV movement are associated with numerous changes in protein conformation and the dynamic assembly and disassembly of multimolecular complexes. Thus, it is to be expected that phosphorylation site accessibility is dependent on these dy- namic changes, many of which are likely to be arrested following inhibition of the SV cycle. However, the fact that selective inhibition of calcium- activated SV cycling results in major changes of the phos- phoproteome documents that the activation status of the ki- nase/phosphatase networks is directly dependent on the progression of the exo–endocytotic cycle. In most cases, BoNT treatment inhibited phosphorylation, and these results are in line with a very early study that used BoNT-treated synaptosomes from the electric organ of Torpedo marmor- ata and radioactive phosphate for protein labeling (105). Interestingly, phosphorylation events known to be directly regulated by some of the major calcium-dependent kinases and phosphatases such as those on synapsin-1 and dynamin- 1, as well as on many of the predicted CaMKII- phosphorylation sites, were almost unaffected by the BoNT treatment. Conversely, predicted sites of MAPK, PKC, and CDK were affected more strongly by the BoNT treatment. These observations support the view that the activity of MAPK is dependent on active SV cycling, resulting in the phos- phorylation of delta catenin, metabotropic glutamate receptor, and other proteins in the synapse (106–109). Indeed, we observe SV-cycling-dependent phosphorylation changes not only in catenin-delta (Cttnd2) but also in other proteins that might take part in the Wnt pathway such as Apc, Amotl1, and Tnik. Given the connection between the Wnt pathway and the regulation of cell–cell contacts and cytoskeletal elements, it is not surprising that many cytoskeleton- and cell-adhesion- related proteins contain BoNT-responsive phosphorylation sites (e.g., spectrin beta, adducin alpha and beta, neurofascin, neuronal cell adhesion molecule). neurons and exo-/endocytosis was measured 4 days post infection (d.p.i.). In order to evaluate exo-/endocytosis, neurons were field-stimulated and changes in fluorescence were measured (82). B, Immunofluorescence of infected neurons. The high efficiency of infection and the coex- pression of the POIs (Stx1a; Cnr1) is confirmed by immunofluorescence using a nanobody directed against the ALFA tag (NbALFA; (84)). Scale bar 10 μm (C) The basal fluorescence of Vamp2-pHluorin (left image) allows to identify single synaptic boutons (inset on the right). Following a defined number of action potentials (AP), SVs fuse with the plasma membrane (middle insets on the right). Upon fusion, the intravesicular pH increases, resulting in higher pHluorin fluorescence intensity. Ammonium chloride (NH4Cl) is used at the end of each experiment to reveal the localization of SVs. Scale bars: 10 μm (left image) and 5 μm (right insets). D and E, Both the phosphomimetic and the phosphorylation-null mutants of Vamp2 showed decreased exocytosis, for both short and long train of stimuli, respectively 60 and 600 action potentials (APs). The maximum peak intensity was significantly lower in both stimuli (p < 0.001). The fraction of endocytosed Vamp2 (measured at 30 s after the stimulation, as % of the exocytosed Vamp2) was also decreased, especially for the longer stimulus. F and G, The phosphomimetic mutant of Stx1a (T21-T23) enhanced exocytosis for short stimuli, while the phosphorylation-null mutant left exocytosis unaffected, while enhancing endocytosis. Under long stimuli the enhancement of exocytosis was no longer significant, but the increase in endocytosis was, for both phosphomimetic and phosphorylation-null mutants. H and I, The phosphomimetic mutants of Cnr1 (T314E-T322 E) reduced exocytosis during short stimuli, while the nonphosphorylatable variant increased exocytosis. The latter effect was also observed during long stimuli. Neither of the Cnr1 variants had a substantial effect on endocytosis. In all panels statistical differences were tested relying on Kruskal–Wallis tests, followed by Tukey–Kramer post-hoc tests (* p < 0.05, ** p < 0.01 and *** p < 0.001). DISCUSSION In this study, we have used isolated nerve terminals as a model to differentiate phosphorylation changes that are induced by calcium influx alone from those that in addition 14 Mol Cell Proteomics (2021) 20 100061 Protein Phosphorylation in Depolarized Synaptosomes FIG. 6. Phosphomimetic modulation of phosphorylation sites found differentially regulated in synaptobrevin (Vamp2), syntaxin-1, and cannabinoid receptor-1 affects SV recycling properties. A, Experimental scheme. Two versions of the adeno-associated viral (AAV) con- structs were prepared (V1 and V2). V1 contained Vamp2 wild-type or the respective Vamp2 mutants (Vamp2-S75D and Vamp2-S75A) fused to the superecliptic (pH-dependent) green fluorescence protein (pHluorin; (82)). The expression of recombinant proteins is driven by the neuron- specific synapsin-1 promoter. In these experiments the Vamp2-pHluorin is used both as the test protein and as a sensor for exo- and endo- cytosis. V2 contained both WT Vamp2-pHluorin (used as an exo-/endocytosis sensor) and the proteins of interest (POI; respectively Stx1a-WT, Stx1a-T21E-T23E; Stx1a-T21A-T23A; Cnr1-WT; Cnr1-T314E-T322E, and Cnr1-T314A-T322A); see methods for details.To distinguish these proteins from the endogenous versions, an ALFA-tag sequence has been added (84). Mutants were expressed in rat primary hippocampal Protein Phosphorylation in Depolarized Synaptosomes FIG. 6. Phosphomimetic modulation of phosphorylation sites found differentially regulated in synaptobrevin (Vamp2), syntaxin-1, and cannabinoid receptor-1 affects SV recycling properties. A, Experimental scheme. Two versions of the adeno-associated viral (AAV) con- structs were prepared (V1 and V2). V1 contained Vamp2 wild-type or the respective Vamp2 mutants (Vamp2-S75D and Vamp2-S75A) fused to the superecliptic (pH-dependent) green fluorescence protein (pHluorin; (82)). The expression of recombinant proteins is driven by the neuron- specific synapsin-1 promoter. In these experiments the Vamp2-pHluorin is used both as the test protein and as a sensor for exo- and endo- cytosis. V2 contained both WT Vamp2-pHluorin (used as an exo-/endocytosis sensor) and the proteins of interest (POI; respectively Stx1a-WT, Stx1a-T21E-T23E; Stx1a-T21A-T23A; Cnr1-WT; Cnr1-T314E-T322E, and Cnr1-T314A-T322A); see methods for details.To distinguish these proteins from the endogenous versions, an ALFA-tag sequence has been added (84). Mutants were expressed in rat primary hippocampal Mol Cell Proteomics (2021) 20 100061 15 DATA AVAILABILITY under stimulation. One possible mechanism is the impaired interaction with Munc18-1, which can facilitate SNARE zip- pering and thereby promote SV fusion with the plasma membrane (46). The changes of endocytosis are possibly a consequence of altered exocytosis. In contrast to many other BoNT-responsive phosphorylation sites, the phosphorylation sites on Vamp2 and Stx1a that we examined showed increased phosphorylation following toxin treatment, sug- gesting that the phosphorylation is due to adaptive changes in the synapse rather than a result of SNARE cleavage by BoNT. under stimulation. One possible mechanism is the impaired interaction with Munc18-1, which can facilitate SNARE zip- pering and thereby promote SV fusion with the plasma membrane (46). The changes of endocytosis are possibly a consequence of altered exocytosis. In contrast to many other BoNT-responsive phosphorylation sites, the phosphorylation sites on Vamp2 and Stx1a that we examined showed increased phosphorylation following toxin treatment, sug- gesting that the phosphorylation is due to adaptive changes in the synapse rather than a result of SNARE cleavage by BoNT. In contrast to the phosphomimetic and non- phosphorylatable variants of the SNARE proteins, the corre- sponding variants of cannabinoid recepor-1 (Cnr1) had an effect only on exocytosis in cultured hippocampal neurons. The effect can be also linked through the activation of MAPK to Munc-18 phosphorylation and regulation of SNARE as- sembly (99). Similarly, the intensity of phosphorylation of T314/T321 sites was increased following toxin treatment. Although Vamp2-S75, Stx1a-S21/S23, Cnr1-T314/T321 phosphorylation sites were identified in previous studies (46, 47, 117, 118), it is the first time, to the best of our knowledge, that phosphorylation of these sites has been shown to have an impact on the exo- and endocytosis in the context of stimulation experiments. The mass spectrometry data have been deposited to the ProteomeXchange Consortium via the PRIDE (121) partner repository with the data set identifier PXD020564. R scripts used for data analysis are available at GitHub: https://github.com/IvanSilbern/2021_Silbern_etal_Synapt_ BoNT_KCl. We also provide a visualization tool in a shiny-app (https:// cran.r-project.org/web/packages/shiny/index.html) format. The source data and code are available at GitHub: https:// github.com/IvanSilbern/2021_Silbern_etal_ShinyApp. The app is deployed and accessible at: https://s1608-shiny. mpibpc.mpg.de. Supplemental data —This article contains supplemental data (59, 65, 66, 70, 71, 73–76, 78, 122, 123). DATA AVAILABILITY Acknowledgments —We sincerely thank Thomas Gundlach and Sascha Krause for assistance in animal experiments; Sofia Ainatzi and Dr Momchil Ninov for help in synaptosome preparations; Monika Raabe, Uwe Plessmann, Dr Sabine König, and Dr Ralf Pflanz for technical support; Heiko Ludwig for launching of the shiny-server. Interestingly, we also found phosphorylation sites on Munc18 that are regulated in SV-cycling-dependent manner, namely Stxbp1-S313 and Stxbp1-S506. Both sites were significantly downregulated in the BoNT-treated samples. Although not much known about S506, S313 site was previ- ously described as a possible target of PKC and that its phosphorylation can negatively affect interaction of Munc18 with syntaxin-1 (48, 119). Funding and additional information —S. B., S. O. R., H. U., and R. J. are funded by the Deutsche For- schungsgemeinschaft through collaborative research center SFB1286, projects A08, A03, Z02, and Z03. Funding and additional information —S. B., S. O. R., H. U., and R. J. are funded by the Deutsche For- schungsgemeinschaft through collaborative research center SFB1286, projects A08, A03, Z02, and Z03. Author contributions —R. J., H. U., and I. S. conceptualized the study; E. F. conceptualized and performed phosphomi- metic studies in neurons; I. S. performed synaptosomal experiments under the supervision of K. T. P., H. U., and R. J.; I. S. analyzed the data; M. F. and S. B. contributed to the bioinformatics analysis; initial draft was written by I. S. and H. U., reviewed and edited by H. U, R. J., E. F., S. O. R., and K. T. P. Author contributions —R. J., H. U., and I. S. conceptualized the study; E. F. conceptualized and performed phosphomi- metic studies in neurons; I. S. performed synaptosomal experiments under the supervision of K. T. P., H. U., and R. J.; I. S. analyzed the data; M. F. and S. B. contributed to the bioinformatics analysis; initial draft was written by I. S. and H. U., reviewed and edited by H. U, R. J., E. F., S. O. R., and K. T. P. A remarkable aspect of the synapse phosphoproteome regulation has recently been addressed by F. Brüning, et al. (120). Their analysis shows that phosphorylation sites on many synaptic proteins undergo oscillations during the course of the day. Protein Phosphorylation in Depolarized Synaptosomes It is tempting to speculate that these phosphorylation changes represent the activation of pathways directed at increasing synaptic strength (most importantly LTP) by mechanisms such as size increase of the synaptic contact zone, enlargement of the presynaptic bou- ton, and adaptations of the presynaptic cytoskeleton to in- crease the efficiency of SV cycling (110–113). An interesting example is given by the PP1 whose post- synaptic activation appears to be dependent on synaptic ac- tivity (114). Neurabin-1 (Ppp1r9a) can play a crucial role in this, by recruiting PP1 to the synapse by regulating its binding to actin filaments, which impacts PP1 activity (115, 116). Our observations suggest that PP1 undergoes similar activity- dependent regulation also in the presynapse as we observe “SV-cycling-dependent” sites within the actin-binding region of Neurabin-1. It is tempting to speculate whether SV-cycling- dependent activity of PP1 or other phosphatases can be opposed by Ca2+-activated kinases such as CaMKII, MAPK1, MAPK3. This would explain reduced intensities of predicted MAPK substrates in Ca/EGTA experiments despite apparent activation of MAPK following K+-induced depolarization and Ca2+ influx. Furthermore, it would explain why many phos- phosites appear significantly regulated when comparing mock-with BoNT-treated synaptosomes, but do not show significant changes in Ca/EGTA experiments, since compari- son of Ca2+ with EGTA conditions reveals a composite effect of Ca2+ influx and SV cycling on protein phosphorylation. Experiments involving BoNT also led us to the discovery of phosphorylation sites on the core SNARE proteins, sites that otherwise did not appear significant. We showed that these sites can affect exo- and endocytosis in hippocampal neurons How can the wide-ranging neurotoxin effects be explained when considering the extraordinary specificity of the SNARE proteases, which should have no direct effect on kinases or phosphatases? Given that toxin treatment causes 16 Mol Cell Proteomics (2021) 20 100061 Protein Phosphorylation in Depolarized Synaptosomes Protein Phosphorylation in Depolarized Synaptosomes REFERENCES 26. De Camilli, P., Benfenati, F., Valtorta, F., and Greengard, P. (1990) The synapsins. Annu. Rev. Cel. Biol. 6, 433–460 1. Del Castillo, J., and Katz, B. (1956) Biophysical aspects of neuromuscular transmission. Prog. Biophys. Biophys. Chem. 6, 121–170 1. Del Castillo, J., and Katz, B. (1956) Biophysical aspects of neuromuscular transmission. Prog. Biophys. Biophys. Chem. 6, 121–170 27. Robinson, P. J. (1992) Differential stimulation of protein kinase C activity by phorbol ester or calcium/phosphatidylserine in vitro and in intact synaptosomes. J. Biol. Chem. 267, 21637–21644 2. Schneggenburger, R., and Neher, E. (2005) Presynaptic calcium and control of vesicle fusion. Curr. Opin. Neurobiol. 15, 266–274 28. Robinson, P. J., Sontag, J.-M., Liu, J.-P., Fykse, E. M., Slaughter, C., McMahontt, H., and Südhof, T. C. (1993) Dynamin GTPase regulated by protein kinase C phosphorylation in nerve terminals. Nature 365, 163– 166 3. Geppert, M., Goda, Y., Hammer, R. E., Li, C., Rosahl, T. W., Stevens, C. F., and Südhof, T. C. (1994) Synaptotagmin I: A major Ca2+ sensor for transmitter release at a central synapse. Cell 79, 717–727 2 4. Chapman, E. R. (2002) Synaptotagmin: A Ca2+ sensor that triggers exocytosis? Nat. Rev. Mol. Cell Biol. 3, 498–508 29. Tan, T. C., Valova, V. A., Malladi, C. S., Graham, M. E., Berven, L. A., Jupp, O. J., Hansra, G., McClure, S. J., Sarcevic, B., and Boadle, R. A. (2003) Cdk5 is essential for synaptic vesicle endocytosis. Nat. Cel. Biol. 5, 701–710 5. Söllner, T., Whiteheart, S. W., Brunner, M., Erdjument-Bromage, H., Ger- omanos, S., Tempst, P., and Rothman, J. E. (1993) SNAP receptors implicated in vesicle targeting and fusion. Nature 362, 318–324 30. Floyd, S. R., Porro, E. B., Slepnev, V. I., Ochoa, G.-C., Tsai, L.-H., and De Camilli, P. (2001) Amphiphysin 1 binds the cyclin-dependent kinase (cdk) 5 regulatory subunit p35 and is phosphorylated by cdk5 and cdc2. J. Biol. Chem. 276, 8104–8110 2 6. Chapman, E. R., An, S., Barton, N., and Jahn, R. (1994) SNAP-25, a t- SNARE which binds to both syntaxin and synaptobrevin via domains that may form coiled coils. J. Biol. Chem. 269, 27427–27432 31. Sihra, T., Bogonez, E., and Nicholls, D. (1992) Localized Ca2+ entry pref- erentially effects protein dephosphorylation, phosphorylation, and glutamate release. J. Biol. Chem. 267, 1983–1989 7. Toonen, R. F., and Verhage, M. (2007) Munc18-1 in secretion: Lonely Munc joins SNARE team and takes control. Trends Neurosci. 30, 564– 572 32. DATA AVAILABILITY Interestingly, a few of these sites are shown to be regulated upon depolarization by potassium chloride and treatment with botulinum neurotoxins, including phosphory- lation sites on proteins previously discussed: Cnr1, Vamp2, Stx1a, Cttnd2, Add1, Add2, Sptbn1, Sptbn4, Kcnb1, Kcnd2, Hcn2, Kcnma1, Tnik, Apc, Camk2a, etc. This also suggests that, despite the caveat that potassium-induced depolariza- tion is nonphysiological (42), it allows for identifying regulated phosphorylation sites that are of high functional relevance for normal synapse physiology. Conflict of interest—The authors declare that they have no conflicts of interest with the contents of this article. Abbreviations —The abbreviations used are: AAV, adeno- associated virus; ACN, acetonitrile; AGC, protein kinase A, G, C kinase group; AGC, automatic gain control; AMPAR, α-amino-3-hydroxy-5-methyl-4-isoxazolepropionic acid re- ceptor; AP, action potential; BoNT, botulinum neurotoxin; bRP, basic reversed-phase chromatography; CAA, chlor- oacetamide; CaMKII, calcium-calmodulin kinase 2; CDK, cyclin-dependent kinase; CK1, casein kinase 1; CK2, casein kinase 2; CLK, SRPK1 and Clk/Sty protein kinase; CMGC, CDK, MAP, GSK, CDKL kinase group; CREB1, CAMP- responsive element binding protein 1; DAPK, death-associ- ated protein kinase; FA, formic acid; GABA, γ-aminobutyric acid; GluDH, glutamate dehydrogenase; GO, gene ontology; GRK, G-protein-coupled receptor kinase; GSK3, glycogen Despite major progress, many aspects of synapse regula- tion remain to be uncovered. Our study has added another layer of complexity by showing how intricately the phosphorylation–dephosphorylation cascade in the synapse is linked to SV cycling. We believe that the results presented here provide a firm basis for future investigations about how synaptic activity and synaptic plasticity are regulated at the molecular level. Mol Cell Proteomics (2021) 20 100061 17 Protein Phosphorylation in Depolarized Synaptosomes synthase kinase 3; ITR, inverted terminal repeat (sequence); MAPK, mitogen-activated protein kinase; NMDAR, N-methyl- d-aspartate receptor; PAK, p21-activated kinase; PKC, protein kinase C; PNGase F, peptide-N(4)-(N-acetyl-beta- glucosaminyl)asparagine amidase; POI, protein of interest; PP1, protein phosphatase 1; RAS, rat sarcoma gene; RT, room temperature; SNAP-25, synaptosomal-associated pro- tein, 25kDa; SNARE, N-ethylmaleimide-sensitive factor- attachment protein receptors; STE, “sterile” serine/threonine protein kinases; SV, synaptic vesicle; TCEP, tris(2- carboxyethyl)phosphine; TEAB, triethylammonium bicarbon- ate buffer; TFE, trifluoroethanol. 20. Gorelick, F., Wang, J., Lai, Y., Nairn, A., and Greengard, P. (1988) Auto- phosphorylation and activation of Ca2+/calmodulin-dependent protein kinase II in intact nerve terminals. J. Biol. Chem. 263, 17209–17212 21. Walaas, S. I., Gorelick, F. S., and Greengard, P. (1989) Presence of cal- cium/calmodulin-dependent protein Kinase II in Nerve terminals of rat brain. Synapse 3, 356–362 22. REFERENCES Liu, J.-P., Sim, A., and Robinson, P. J. (1994) Calcineurin inhibition of dynamin I GTPase activity coupled to nerve terminal depolarization. Science 265, 970–973 8. Brose, N. (2008) Altered complexin expression in psychiatric and neuro- logical disorders: Cause or consequence? Mol. Cell. 25, 7–19 9. Ceccarelli, B., Hurlbut, W., and Mauro, A. (1973) Turnover of transmitter and synaptic vesicles at the frog neuromuscular junction. J. Cel. Biol. 57, 499–524 33. Nichols, R. A., Suplick, G. R., and Brown, J. M. (1994) Calcineurin-medi- ated protein dephosphorylation in brain nerve terminals regulates the release of glutamate. J. Biol. Chem. 269, 23817–23823 10. Fesce, R., Grohovaz, F., Valtorta, F., and Meldolesi, J. (1994) Neuro- transmitter release: Fusion or ‘kiss-and-run’? Trends Cell Biol. 4, 1–4 34. Bauerfeind, R., Takei, K., and De Camilli, P. (1997) Amphiphysin I is associated with coated endocytic intermediates and undergoes stimulation-dependent dephosphorylation in nerve terminals. J. Biol. Chem. 272, 30984–30992 11. Heuser, J., and Reese, T. (1973) Evidence for recycling of synaptic vesicle membrane during transmitter release at the frog neuromuscular junction. J. Cel. Biol. 57, 315–344 35. Marks, B., and McMahon, H. T. (1998) Calcium triggers calcineurin- dependent synaptic vesicle recycling in mammalian nerve terminals. Curr. Biol. 8, 740–749 12. Von Gersdorff, H., and Mathews, G. (1994) Dynamics of synaptic vesicle fusion and membrane retrieval in synaptic terminals. Nature 367, 735– 739 36. Cousin, M. A., Tan, T. C., and Robinson, P. J. (2001) Protein phosphory- lation is required for endocytosis in nerve terminals: Potential role for the dephosphins dynamin I and synaptojanin, but not AP180 or amphi- physin. J. Neurochem. 76, 105–116 13. Boucrot, E., Ferreira, A. P., Almeida-Souza, L., Debard, S., Vallis, Y., Howard, G., Bertot, L., Sauvonnet, N., and McMahon, H. T. (2015) Endophilin marks and controls a clathrin-independent endocytic pathway. Nature 517, 460–465 37. Schmitz, S. K., King, C., Kortleven, C., Huson, V., Kroon, T., Kevenaar, J. T., Schut, D., Saarloos, I., Hoetjes, J. P., and de Wit, H. (2016) Pre- synaptic inhibition upon CB 1 or mG lu2/3 receptor activation requires ERK/MAPK phosphorylation of Munc18-1. EMBO J. 35, 1236–1250 14. Clayton, E. L., Evans, G. J., and Cousin, M. A. (2008) Bulk synaptic vesicle endocytosis is rapidly triggered during strong stimulation. J. Neurosci. 28, 6627–6632 15. Watanabe, S., Rost, B. R., Camacho-P ´erez, M., Davis, M. W., Söhl- Kielczynski, B., Rosenmund, C., and Jorgensen, E. M. (2013) Ultrafast endocytosis at mouse hippocampal synapses. DATA AVAILABILITY Ninan, I., and Arancio, O. (2004) Presynaptic CaMKII is necessary for synaptic plasticity in cultured hippocampal neurons. Neuron 42, 129– 141 23. Lisman, J., Schulman, H., and Cline, H. (2002) The molecular basis of CaMKII function in synaptic and behavioural memory. Nat. Rev. Neu- rosci. 3, 175–190 24. Greengard, P., Benfenati, F., and Valtorta, F. (1994) Synapsin I, an actin- binding protein regulating synaptic vesicle traffic in the nerve terminal. Adv. second messenger phosphoprotein Res. 29, 31–45 25. Ceccaldi, P.-E., Grohovaz, F., Benfenati, F., Chieregatti, E., Greengard, P., and Valtorta, F. (1995) Dephosphorylated synapsin I anchors synaptic vesicles to actin cytoskeleton: An analysis by videomicroscopy. J. Cell Biol. 128, 905–912 Received January 15, 2021 Published, MCPRO Papers in Press, February 12, 2021, https://doi.org/10.1016/j.mcpro.2021.100061 Received January 15, 2021 Published, MCPRO Papers in Press, February 12, 2021, https://doi.org/10.1016/j.mcpro.2021.100061 Protein Phosphorylation in Depolarized Synaptosomes Jassal, B., Matthews, L., Viteri, G., Gong, C., Lorente, P., Fabregat, A., Sidiropoulos, K., Cook, J., Gillespie, M., and Haw, R. (2020) The reac- tome pathway knowledgebase. Nucleic Acids Res. 48, D498–D503 0 K F Ni P A d Al M B A Cij T 47. Li, J., Han, Y. R., Plummer, M. R., and Herrup, K. (2009) Cytoplasmic ATM in neurons modulates synaptic function. Curr. Biol. 19, 2091–2096 48 C i T J E G J d M A (2003) Ph i l i l l i f 70. Koopmans, F., van Nierop, P., Andres-Alonso, M., Byrnes, A., Cijsouw, T., Coba, M. P., Cornelisse, L. N., Farrell, R. J., Goldschmidt, H. L., and Howrigan, D. P. (2019) SynGO: An evidence-based, expert-curated knowledge base for the synapse. Neuron 103, 217–234.e214 48. Craig, T. J., Evans, G. J., and Morgan, A. (2003) Physiological regulation of Munc18/nSec1 phosphorylation on serine-313. J. Neurochem. 86, 1450–1457 71. Hornbeck, P. V., Zhang, B., Murray, B., Kornhauser, J. M., Latham, V., and Skrzypek, E. (2015) PhosphoSitePlus, 2014: Mutations, PTMs and recalibrations. Nucleic Acids Res. 43, D512–D520 49. Garcia, D., Brown, S., Hille, B., and Mackie, K. (1998) Protein kinase C disrupts cannabinoid actions by phosphorylation of the CB1 cannabi- noid receptor. J. Neurosci. 18, 2834–2841 72. Altschul, S. F., Gish, W., Miller, W., Myers, E. W., and Lipman, D. J. (1990) Basic local alignment search tool. J. Mol. Biol. 215, 403–410 50. Scott, I., and Nicholls, D. (1980) Energy transduction in intact synapto- somes. Influence of plasma-membrane depolarization on the respiration and membrane potential of internal mitochondria determined in situ. Biochem. J. 186, 21–33 73. Miller, M. L., Jensen, L. J., Diella, F., Jørgensen, C., Tinti, M., Li, L., Hsiung, M., Parker, S. A., Bordeaux, J., and Sicheritz-Ponten, T. (2008) Linear motif atlas for phosphorylation-dependent signaling. Sci. signaling 1, ra2 51. Kauppinen, R. A., and Nicholls, D. G. (1986) Synaptosomal bioenergetics. Eur. J. Biochem. 158, 159–165 74. Horn, H., Schoof, E. M., Kim, J., Robin, X., Miller, M. L., Diella, F., Palma, A., Cesareni, G., Jensen, L. J., and Linding, R. (2014) KinomeXplorer: An integrated platform for kinome biology studies. Nat. Methods 11, 603– 604 52. Nicholls, D. G. (2003) Bioenergetics and transmitter release in the isolated nerve terminal. Neurochem. Res. 28, 1433–1441 75. Szklarczyk, D., Gable, A. L., Lyon, D., Junge, A., Wyder, S., Huerta-Cepas, J., Simonovic, M., Doncheva, N. T., Morris, J. Protein Phosphorylation in Depolarized Synaptosomes phase chromatography with multiple fraction concatenation strategy for proteome profiling of human MCF10A cells. Proteomics 11, 2019–2026 phase chromatography with multiple fraction concatenation strategy for proteome profiling of human MCF10A cells. Proteomics 11, 2019–2026 41. Kohansal-Nodehi, M., Chua, J. J., Urlaub, H., Jahn, R., and Czernik, D. (2016) Analysis of protein phosphorylation in nerve terminal reveals extensive changes in active zone proteins upon exocytosis. Elife 5, e14530 63. Cox, J., Neuhauser, N., Michalski, A., Scheltema, R. A., Olsen, J. V., and Mann, M. (2011) Andromeda: A peptide search engine integrated into the MaxQuant environment. J. proteome Res. 10, 1794–1805 42. Engholm-Keller, K., Waardenberg, A. J., Müller, J. A., Wark, J. R., Fer- nando, R. N., Arthur, J. W., Robinson, P. J., Dietrich, D., Schoch, S., and Graham, M. E. (2019) The temporal profile of activity-dependent pre- synaptic phospho-signalling reveals long-lasting patterns of post- stimulus regulation. PLoS Biol. 17, e3000170 64. Tyanova, S., Temu, T., and Cox, J. (2016) The MaxQuant computational platform for mass spectrometry-based shotgun proteomics. Nat. Pro- toc. 11, 2301 65. Consortium, U. (2019) UniProt: A worldwide hub of protein knowledge. Nucleic Acids Res. 47, D506–D515 43. Gao, J., Hirata, M., Mizokami, A., Zhao, J., Takahashi, I., Takeuchi, H., and Hirata, M. (2016) Differential role of SNAP-25 phosphorylation by protein kinases A and C in the regulation of SNARE complex formation and exocytosis in PC12 cells. Cell Signal. 28, 425–437 66. Smyth, G. K. (2005) Limma: Linear models for microarray data. Bioinfor- matics Computational Biology Solutions Using R. Bioconductor, 397– 420. Springer 44. Tian, J.-H., Das, S., and Sheng, Z.-H. (2003) Ca2+-dependent phosphor- ylation of syntaxin-1A by the death-associated protein (DAP) kinase regulates its interaction with Munc18. J. Biol. Chem. 278, 26265–26274 67. Storey, J. D., and Tibshirani, R. (2003) Statistical significance for genomewide studies. Proc. Natl. Acad. Sci. 100, 9440–9445 45. Rickman, C., and Duncan, R. R. (2010) Munc18/Syntaxin interaction ki- netics control secretory vesicle dynamics. J. Biol. Chem. 285, 3965– 3972 68. Jiao, X., Sherman, B. T., Huang, D. W., Stephens, R., Baseler, M. W., Lane, H. C., and Lempicki, R. A. (2012) DAVID-WS: A stateful web service to facilitate gene/protein list analysis. Bioinformatics 28, 1805– 1806 46. Shen, C., Rathore, S. S., Yu, H., Gulbranson, D. R., Hua, R., Zhang, C., Schoppa, N. E., and Shen, J. (2015) The trans-SNARE-regulating function of Munc18-1 is essential to synaptic exocytosis. Nat. Com- mun. 6, 1–10 69. Protein Phosphorylation in Depolarized Synaptosomes H., and Bork, P. (2019) STRING v11: Protein–protein association networks with increased coverage, supporting functional discovery in genome-wide experimental datasets. Nucleic Acids Res. 47, D607–D613 53. Choi, S. W., Gerencser, A. A., Lee, D. W., Rajagopalan, S., Nicholls, D. G., Andersen, J. K., and Brand, M. D. (2011) Intrinsic bioenergetic properties and stress sensitivity of dopaminergic synaptosomes. J. Neurosci. 31, 4524–4534 54. Sanchez-Prieto, J., Sihra, T. S., Evans, D., Ashton, A., Dolly, J. O., and Nicholls, D. G. (1987) Botulinum toxin A blocks glutamate exocytosis from Guinea-pig cerebral cortical synaptosomes. Eur. J. Biochem. 165, 675–681 76. Roy, J., and Cyert, M. S. (2009) Cracking the phosphatase code: Docking interactions determine substrate specificity. Sci. Signaling 2, re9 77. Csardi, G., and Nepusz, T. (2006) The igraph software package for com- plex network research. Inter J Complex Syst. 1695, 1–9 55. McMahon, H., Foran, P., Dolly, J., Verhage, M., Wiegant, V. M., and Nicholls, D. (1992) Tetanus toxin and botulinum toxins type A and B inhibit glutamate, gamma-aminobutyric acid, aspartate, and met- enkephalin release from synaptosomes. Clues to the locus of action. J. Biol. Chem. 267, 21338–21343 78. Hogrebe, A., von Stechow, L., Bekker-Jensen, D. B., Weinert, B. T., Kelstrup, C. D., and Olsen, J. V. (2018) Benchmarking common quan- tification strategies for large-scale phosphoproteomics. Nat. Commun. 9, 1–13 79. Dignam, J. D., Lebovitz, R. M., and Roeder, R. G. (1983) Accurate tran- scription initiation by RNA polymerase II in a soluble extract from iso- lated mammalian nuclei. Nucleic Acids Res. 11, 1475–1489 56. Blaustein, M. (1975) Effects of potassium, veratridine, and scorpion venom on calcium accumulation and transmitter release by nerve terminals in vitro. J. Physiol. 247, 617–655 57. McMahon, H. T., and Nicholls, D. G. (1991) Transmitter glutamate release from isolated nerve terminals: Evidence for biphasic release and trig- gering by localized Ca2+. J. Neurochem. 56, 86–94 80. Komulainen, H., and Bondy, S. (1987) The estimation of free calcium within synaptosomes and mitochondria with fura-2; comparison to quin-2. Neurochem. Int. 10, 55–64 g g y 58. von Mollard, G. F., Südhof, T. C., and Jahn, R. (1991) A small GTP-binding protein dissociates from synaptic vesicles during exocytosis. Nature 349, 79–81 81. Truckenbrodt, S., Viplav, A., Jähne, S., Vogts, A., Denker, A., Wildhagen, H., Fornasiero, E. F., and Rizzoli, S. O. (2018) Newly produced synaptic vesicle proteins are preferentially used in synaptic transmission. EMBO J. 37, e98044 59. Nicholls, D. REFERENCES Nature 504, 242–247 38. Jovanovic, J. N., Benfenati, F., Siow, Y., Sihra, T. S., Sanghera, J. S., Pelech, S. L., Greengard, P., and Czernik, A. J. (1996) Neurotrophins stimulate phosphorylation of synapsin I by MAP kinase and regulate synapsin I-actin interactions. Proc. Natl. Acad. Sci. 93, 3679–3683 16. Gan, Q., and Watanabe, S. (2018) Synaptic vesicle endocytosis in different model systems. Front. Cell. Neurosci. 12, 171 39. Impey, S., Obrietan, K., Wong, S. T., Poser, S., Yano, S., Wayman, G., Deloulme, J. C., Chan, G., and Storm, D. R. (1998) Cross talk between ERK and PKA is required for Ca2+ stimulation of CREB-dependent transcription and ERK nuclear translocation. Neuron 21, 869–883 17. Chanaday, N. L., Cousin, M. A., Milosevic, I., Watanabe, S., and Morgan, J. R. (2019) The synaptic vesicle cycle revisited: New insights into the modes and mechanisms. J. Neurosci. 39, 8209–8216 18. Edwards, R. H. (2007) The neurotransmitter cycle and quantal size. Neuron 55, 835–858 40. Levenson, J. M., O'Riordan, K. J., Brown, K. D., Trinh, M. A., Molfese, D. L., and Sweatt, J. D. (2004) Regulation of histone acetylation during memory formation in the hippocampus. J. Biol. Chem. 279, 40545– 40559 19. Sihra, T. S. (1997) Protein phosphorylation and dephosphorylation in iso- lated nerve terminals (synaptosomes). Regul. Protein Modification, 67– 119. Springer 18 Mol Cell Proteomics (2021) 20 100061 Protein Phosphorylation in Depolarized Synaptosomes Protein Phosphorylation in Depolarized Synaptosomes Protein Phosphorylation in Depolarized Synaptosomes Opazo, F. (2019) The ALFA-tag is a highly versatile tool for nanobody- based bioscience applications. Nat. Commun. 10, 1–12 Opazo, F. (2019) The ALFA-tag is a highly versatile tool for nanobody- based bioscience applications. Nat. Commun. 10, 1–12 105. Guitart, X., Egea, G., Solsona, C., and Marsal, J. (1987) Botulinum neurotoxin inhibits depolarization-stimulated protein phosphorylation in pure cholinergic synaptosomes. FEBS Lett. 219, 219–223 85. Fornasiero, E. F., Raimondi, A., Guarnieri, F. C., Orlando, M., Fesce, R., Benfenati, F., and Valtorta, F. (2012) Synapsins contribute to the dy- namic spatial organization of synaptic vesicles in an activity-dependent manner. J. Neurosci. 32, 12214–12227 106. Boggio, E. M., Putignano, E., Sassoe-Pognetto, M., Pizzorusso, T., and Giustetto, M. (2007) Visual stimulation activates ERK in synaptic and somatic compartments of rat cortical neurons with parallel kinetics. PLoS One 2, e604 86. Klee, C., Crouch, T., and Krinks, M. (1979) Calcineurin: A calcium-and calmodulin-binding protein of the nervous system. Proc. Natl. Acad. Sci. 76, 6270–6273 107. Edbauer, D., Cheng, D., Batterton, M. N., Wang, C.-F., Duong, D. M., Yaffe, M. B., Peng, J., and Sheng, M. (2009) Identification and charac- terization of neuronal mitogen-activated protein kinase substrates using a specific phosphomotif antibody. Mol. Cell Proteomics 8, 681–695 87. Wang, Z.-W. (2008) Regulation of synaptic transmission by presynaptic CaMKII and BK channels. Mol. Neurobiol. 38, 153–166 88. Cousin, M. A., and Robinson, P. J. (2001) The dephosphins: Dephos- phorylation by calcineurin triggers synaptic vesicle endocytosis. Trends Neurosci. 24, 659–665 108. Park, J. M., Hu, J.-H., Milshteyn, A., Zhang, P.-W., Moore, C. G., Park, S., Datko, M. C., Domingo, R. D., Reyes, C. M., and Wang, X. J. (2013) A prolyl-isomerase mediates dopamine-dependent plasticity and cocaine motor sensitization. Cell 154, 637–650 89. Rosenberg, O. S., Deindl, S., Sung, R.-J., Nairn, A. C., and Kuriyan, J. (2005) Structure of the autoinhibited kinase domain of CaMKII and SAXS analysis of the holoenzyme. Cell 123, 849–860 109. Mao, L.-M., and Wang, J. Q. (2016) Synaptically localized mitogen- activated protein kinases: Local substrates and regulation. Mol. Neu- robiol. 53, 6309–6315 90. Huttner, W., DeGennaro, L., and Greengard, P. (1981) Differential phos- phorylation of multiple sites in purified protein I by cyclic AMP- dependent and calcium-dependent protein kinases. J. Biol. Chem. 256, 1482–1488 110. Ataman, B., Ashley, J., Gorczyca, M., Ramachandran, P., Fouquet, W., Sigrist, S. J., and Budnik, V. Protein Phosphorylation in Depolarized Synaptosomes Mol. Cell. Biol. 22, 4690–4701 96. Gonz ´alez, C., Baez-Nieto, D., Valencia, I., Oyarzún, I., Rojas, P., Naranjo, D., and Latorre, R. (2012) K+ channels: Function-structural overview. Compr. Physiol. 2, 2087–2149 97. Chua, J. J., Kindler, S., Boyken, J., and Jahn, R. (2010) The architecture of an excitatory synapse. J. Cel. Sci. 123, 819–823 117. Dubois, T., Kerai, P., Learmonth, M., Cronshaw, A., and Aitken, A. (2002) Identification of syntaxin-1A sites of phosphorylation by casein kinase I and casein kinase II. Eur. J. Biochem. 269, 909–914 98. Rizzoli, S. O., and Betz, W. J. (2005) Synaptic vesicle pools. Nat. Rev. Neurosci. 6, 57–69 118. Trinidad, J. C., Barkan, D. T., Gulledge, B. F., Thalhammer, A., Sali, A., Schoepfer, R., and Burlingame, A. L. (2012) Global identification and characterization of both O-GlcNAcylation and phosphorylation at the murine synapse. Mol. Cell Proteomics 11, 215–229 99. Marsicano, G., Goodenough, S., Monory, K., Hermann, H., Eder, M., Cannich, A., Azad, S. C., Cascio, M. G., Guti ´errez, S. O., and Van der Stelt, M. (2003) CB1 cannabinoid receptors and on-demand defense against excitotoxicity. Science 302, 84–88 119. Barclay, J. W., Craig, T. J., Fisher, R. J., Ciufo, L. F., Evans, G. J., Morgan, A., and Burgoyne, R. D. (2003) Phosphorylation of Munc18 by protein kinase C regulates the kinetics of exocytosis. J. Biol. Chem. 278, 10538– 10545 100. Kellogg, R., Mackie, K., and Straiker, A. (2009) Cannabinoid CB1 receptor- dependent long-term depression in autaptic excitatory neurons. J. Neurophysiol. 102, 1160–1171 101. Hsieh-Wilson, L. C., Benfenati, F., Snyder, G. L., Allen, P. B., Nairn, A. C., and Greengard, P. (2003) Phosphorylation of spinophilin modulates its interaction with actin filaments. J. Biol. Chem. 278, 1186–1194 120. Brüning, F., Noya, S. B., Bange, T., Koutsouli, S., Rudolph, J. D., Tya- garajan, S. K., Cox, J., Mann, M., Brown, S. A., and Robles, M. S. (2019) Sleep-wake cycles drive daily dynamics of synaptic phosphorylation. Science 366, eaav3617 102. Dunkley, P. R., Heath, J. W., Harrison, S. M., Jarvie, P. E., Glenfield, P. J., and Rostas, J. A. (1988) A rapid Percoll gradient procedure for isolation of synaptosomes directly from an S1 fraction: Homogeneity and morphology of subcellular fractions. Brain Res. 441, 59–71 121. Perez-Riverol, Y.,Csordas,A.,Bai, J.,Bernal-Llinares,M.,Hewapathirana, S., Kundu, D. J., Inuganti, A., Griss, J., Mayer, G., and Eisenacher, M. (2019) The PRIDE database and related tools and resources in 2019: Improving support for quantification data. Nucleic Acids Res. Protein Phosphorylation in Depolarized Synaptosomes (2008) Rapid activity-dependent modifica- tions in synaptic structure and function require bidirectional Wnt signaling. Neuron 57, 705–718 91. Czernik, A. J., Pang, D. T., and Greengard, P. (1987) Amino acid se- quences surrounding the cAMP-dependent and calcium/calmodulin- dependent phosphorylation sites in rat and bovine synapsin I. Proc. Natl. Acad. Sci. 84, 7518–7522 111. Cerpa, W., Godoy, J. A., Alfaro, I., Farías, G. G., Metcalfe, M. J., Fuen- tealba, R., Bonansco, C., and Inestrosa, N. C. (2008) Wnt-7a modulates the synaptic vesicle cycle and synaptic transmission in hippocampal neurons. J. Biol. Chem. 283, 5918–5927 92. Wang, J., Walaas, S., and Greengard, P. (1988) Protein phosphorylation in nerve terminals: Comparison of calcium/calmodulin-dependent and calcium/diacylglycerol-dependent systems. J. Neurosci. 8, 281–288 112. Budnik, V., and Salinas, P. C. (2011) Wnt signaling during synaptic development and plasticity. Curr. Opin. Neurobiol. 21, 151–159 93. Matsubara, M., Kusubata, M., Ishiguro, K., Uchida, T., Titani, K., and Taniguchi, H. (1996) Site-specific phosphorylation of synapsin I by mitogen-activated protein kinase and Cdk5 and its effects on physio- logical functions. J. Biol. Chem. 271, 21108–21113 113. Ciani, L., Marzo, A., Boyle, K., Stamatakou, E., Lopes, D. M., Anane, D., McLeod, F., Rosso, S. B., Gibb, A., and Salinas, P. C. (2015) Wnt sig- nalling tunes neurotransmitter release by directly targeting Synapto- tagmin-1. Nat. Commun. 6, 1–13 114. Woolfrey, K. M., and Dell'Acqua, M. L. (2015) Coordination of protein phosphorylation and dephosphorylation in synaptic plasticity. J. Biol. Chem. 290, 28604–28612 94. Menegon, A., Dunlap, D. D., Castano, F., Benfenati, F., Czernik, A. J., Greengard, P., and Valtorta, F. (2000) Use of phosphosynapsin I-specific antibodies for image analysis of signal transduction in single nerve terminals. J. Cel. Sci. 113, 3573–3582 115. Allen, P. B., Greenfield, A. T., Svenningsson, P., Haspeslagh, D. C., and Greengard, P. (2004) Phactrs 1–4: A family of protein phosphatase 1 and actin regulatory proteins. Proc. Natl. Acad. Sci. 101, 7187–7192 95. Cesca, F., Baldelli, P., Valtorta, F., and Benfenati, F. (2010) The synapsins: Key actors of synapse function and plasticity. Prog. Neurobiol. 91, 313– 348 actin regulatory proteins. Proc. Natl. Acad. Sci. 101, 718 16 Oli C J T L R T Elli E Bl W 116. Oliver, C. J., Terry-Lorenzo, R. T., Elliott, E., Bloomer, W. A. C., Li, S., Brautigan, D. L., Colbran, R. J., and Shenolikar, S. (2002) Targeting protein phosphatase 1 (PP1) to the actin cytoskeleton: The neurabin I/ PP1 complex regulates cell morphology. Protein Phosphorylation in Depolarized Synaptosomes G., Sihra, T. S., and Sanchez-Prieto, J. (1987) Calcium- dependent and-independent release of glutamate from synaptosomes monitored by continuous fluorometry. J. Neurochem. 49, 50–57 82. Sankaranarayanan, S., De Angelis, D., Rothman, J. E., and Ryan, T. A. (2000) The use of pHluorins for optical measurements of presynaptic activity. Biophysical J. 79, 2199–2208 60. Wessel, D.m., and Flügge, U. (1984) A method for the quantitative recovery of protein in dilute solution in the presence of detergents and lipids. Anal. Biochem. 138, 141–143 83. Keihani, S., Kluever, V., Mandad, S., Bansal, V., Rahman, R., Fritsch, E., Gomes, L. C., Gärtner, A., Kügler, S., and Urlaub, H. (2019) The long noncoding RNA neuroLNC regulates presynaptic activity by interacting with the neurodegeneration-associated protein TDP-43. Sci. Adv. 5, eaay2670 61. Humphrey, S. J., Azimifar, S. B., and Mann, M. (2015) High-throughput phosphoproteomics reveals in vivo insulin signaling dynamics. Nat. Biotechnol. 33, 990–995 62. Wang, Y., Yang, F., Gritsenko, M. A., Wang, Y., Clauss, T., Liu, T., Shen, Y., Monroe, M. E., Lopez-Ferrer, D., and Reno, T. (2011) Reversed- 84. Götzke, H., Kilisch, M., Martínez-Carranza, M., Sograte-Idrissi, S., Rajavel, A., Schlichthaerle, T., Engels, N., Jungmann, R., Stenmark, P., and Mol Cell Proteomics (2021) 20 100061 19 19 Protein Phosphorylation in Depolarized Synaptosomes 47, D442–D450 103. Grossman, S. D., Futter, M., Snyder, G. L., Allen, P. B., Nairn, A. C., Greengard, P., and Hsieh-Wilson, L. C. (2004) Spinophilin is phos- phorylated by Ca2+/calmodulin-dependent protein kinase II resulting in regulation of its binding to F-actin. J. Neurochem. 90, 317–324 122. Popoff, M. R., and Poulain, B. (2010) Bacterial toxins and the nervous system: Neurotoxins and multipotential toxins interacting with neuronal cells. Toxins 2, 683–737 123. Schwanhäusser, B., Busse, D., Li, N., Dittmar, G., Schuchhardt, J., Wolf, J., Chen, W., and Selbach, M. (2011) Global quantification of mammalian gene expression control. Nature 473, 337–342 104. Turner, K. M., Burgoyne, R. D., and Morgan, A. (1999) Protein phosphor- ylation and the regulation of synaptic membrane traffic. Trends Neuro- sciences 22, 459–464 20 Mol Cell Proteomics (2021) 20 100061
https://openalex.org/W1605817811
https://europepmc.org/articles/pmc2614187?pdf=render
English
null
Electrostatic and Functional Analysis of the Seven-Bladed WD β-Propellers
Evolutionary bioinformatics online
2,008
cc-by
8,839
Introduction WD40 repeat-like proteins form a structurally conserved superfamily and are part of the β-propeller fold. The WD repeat was fi rst characterized by Van der Voorn and Ploegh (van der Voorn and Ploegh, 1992). It is a motif containing about 40–60 amino acids ending in a tryptophan and aspartic acid (WD). Multiple X-ray structures of this repeat revealed that it represents a blade formed from a four-stranded antiparallel β sheet. These blades are arranged radially forming a β-propeller structure and this propeller is structurally conserved despite high divergence in sequence amongst β-propeller proteins (Paoli, 2001) (Fig. 1). Perhaps surprisingly, in general a single WD repeat forms parts of two blades within a propeller. p g y g g p p p p The inner strand α of each blade is situated in the centre of the propeller and strand d (Fig. 1A) forms the “outer” side of the propeller. Superimposition and analysis of the structures by various authors sug- gested that strands a–c are generally conserved and most variability is observed in strand d and in the connecting segments between blades (Murzin, 1992). The innermost strands form a channel which has a conical shape. In most of the propeller proteins the joining of the N- and C-termini to enclose the propeller circle is achieved by the pairing of strand d from the N-terminus with three strands (a–c) from the C-terminus in the same blade (Fig. 1A). g Murzin (Murzin, 1992) developed a model for the propeller assembly of β-sheets and carried out an analysis on the multi-sheet packing of the blades into propeller structures. His calculations showed that four is the only possible number of strands in a blade and that any additional strands would generate unacceptably close packing of the strands. This geometrical model also predicted that an ideal seven- bladed β-propeller satisfi es average β-geometry best. He found that the seven-fold symmetry has no strong sequence constraints and is preferable to six- or eight-fold blades for assembly. g q p g y The seven-bladed β-propellers in SCOP (Murzin et al. 1995) are classifi ed into several superfamilies, the one of interest to this work is the WD40-repeat like superfamily. This superfamily is further split into two families: the WD40-repeat, the family we shall study further, and the cell cycle arrest protein BUB3. Correspondence: Najl V. Valeyev. Tel: +44 (0) 7817 068953; Email: nv28@le.ac.uk Copyright in this article, its metadata, and any supplementary data is held by its author or authors. It is published under the Creative Commons Attribution By licence. For further information go to: http://creativecommons.org/licenses/by/3.0/. ORIGINAL RESEARCH ORIGINAL RESEARCH Electrostatic and Functional Analysis of the Seven-Bladed WD β-Propellers Najl V. Valeyev1,4, A. Kristina Downing1, John Sondek2 and Charlott 1Department of Biochemistry, University of Oxford, South Parks Road, Oxford, OX1 3QU, U.K. 2Department of Pharmacology, University of North Carolina, 27599-7365, U.S.A. 3Department of Statistics, University of Oxford, 1 South Parks Road, Oxford, OX1 3TG, U.K. 4Current address: Systems Biology Lab, Department of Engineering, University of Leicester, University Road, Leicester, LE1 7RH, U.K. Abstract: β-propeller domains composed of WD repeats are highly ubiquitous and typically used as multi-site docking platforms to coordinate and integrate the activities of groups of proteins. Here, we have used extensive homology modelling of the WD40-repeat family of seven-bladed β-propellers coupled with subsequent structural classifi cation and clustering of these models to defi ne subfamilies of β-propellers with common structural, and probable, functional characteristics. We show that it is possible to assign seven-bladed WD β-propeller proteins into functionally different groups based on the information gained from homology modelling. We examine general structural diversity within the WD40-repeat family of seven-bladed β-propellers and demonstrate that seven-bladed β-propellers composed of WD-repeats are structurally distinct from other seven-bladed β-propellers. We further provide some insights into the multifunctional diversity of the seven-bladed WD β-propeller surfaces. This report once again reinforces the importance of structural data and the usefulness of homology models in functional classifi cation. Keywords: β-propeller, electrostatics, evolutionary trace, protein clustering, WD protein Introduction A superposition of the protein domains for the seven-bladed WD40-repeat β-propeller family is shown in Figure 1B. In this report we use structural rather than just sequence information to classify seven-bladed WD β-propellers. While the sequence data certainly gives some information, 3D structures are usually required to gain detailed biological and functional characterization (Chakravarty and Sanchez, 2004). The value gained from the comparative modelling of proteins over sequence alone has been demon- strated previously (Chakravarty and Sanchez, 2004; Chakravarty et al. 2005). Here we carried out large-scale modelling of the seven-bladed WD β-propellers followed by comparative structural analyses using the evolutionary trace (ET) method (Lichtarge et al. 1996), examination of surface cavities (Tsodikov et al. 2002) and electrostatics analyses (Blomberg et al. 1999). g The WD motif has been extensively studied in sequence space, over 900 repeats have been aligned in order to refi ne the pattern (Smith et al. 1999). The relationship between amino acid sequence and function for WD repeat containing proteins has been addressed by Yu et al. (Yu et al. 2000). This analysis relies entirely on sequence similarity and does not use information from the 3D (three- dimensional) structures of the proteins. The out- come of the Yu et al. (Yu et al. 2000) study was the separation of 278 protein sequences into different groups, with each group possessing potentially unique functions. Sequences with unassigned func- tions were predicted to have the same function as other proteins in the same group. A second study on functional annotation of WD proteins by Yu et al. (Yu et al. 2000) defi ned 32 functional groups amongst the WD proteins with various numbers of blades. This result was based on the assumption that surface similarity defi nes a common function for WD repeat proteins (Smith et al. 1999). Only three seven-bladed β-propeller families G protein, ET uses a phylogenetic tree of a protein family and identifi es evolutionary conserved residues in branches of the tree. Many studies report that resi- dues predicted by ET to be evolutionary privileged signifi cantly overlap with functional sites (Lichtarge et al. 1996; Lichtarge et al. 1996; Lichtarge et al. 1997; Lichtarge and Sowa, 2002; Lichtarge et al. 2002; Lichtarge et al. 2003). It has also been shown that such positions form statistically signifi cant clusters (Madabushi et al. 2002). Introduction This second family is thought by the SCOP authors to be possibly related to the WD-repeat family, but both sequence similarity between the blades and the WD40 repeat signature are very weak. 203 Evolutionary Bioinformatics 2008:4 203–216 Valeyev et al Top View Side View Top Bottom A C B a b c d N- C- 1 7 6 5 4 3 2 Figure 1. Seven-bladed β-propeller proteins. A. Seven-bladed β-propeller (1got) coloured according to the WD repeats. B. Backbone representation of the superimposed WD repeat template structures (1erj—red, 1got—green, 1gxr—blue, 1k8k—yellow, 1pgu—magenta, 1p22—cyan, 1sq9—grey). C. A cartoon representation of a β-propeller. The structure is different in radius on the “top” and “bottom”. The narrower side is defi ned as the “top” region in this report. Both A and B show the top surface. The strands a-d form seven blades of the propeller structure. Top View Side View Top Bottom C B A a b c d N- C- 1 7 6 5 4 3 2 B C A Figure 1. Seven-bladed β-propeller proteins. A. Seven-bladed β-propeller (1got) coloured according to the WD repeats. B. Backbone representation of the superimposed WD repeat template structures (1erj—red, 1got—green, 1gxr—blue, 1k8k—yellow, 1pgu—magenta, 1p22—cyan, 1sq9—grey). C. A cartoon representation of a β-propeller. The structure is different in radius on the “top” and “bottom”. The narrower side is defi ned as the “top” region in this report. Both A and B show the top surface. The strands a-d form seven blades of the propeller structure. Groucho, and Tup1 were identifi ed amongst those functional clusters. The seven-bladed protein domains found in the WD40-repeat family are listed in Table 1 with annotated functions and available PDB (1got (Lambright et al. 1996), 1erj (Sprague et al. 2000), 1gxr (Pickles et al. 2002), 1k8k (Robinson et al. 2001), 1p22 (Wu et al. 2003), 1pgu (Voegtli et al. 2003), 1sq9 (Madrona and Wilson, 2004)) struc- tures. A superposition of the protein domains for the seven-bladed WD40-repeat β-propeller family is shown in Figure 1B. The seven-bladed protein domains found in the WD40-repeat family are listed in Table 1 with annotated functions and available PDB (1got (Lambright et al. 1996), 1erj (Sprague et al. 2000), 1gxr (Pickles et al. 2002), 1k8k (Robinson et al. 2001), 1p22 (Wu et al. 2003), 1pgu (Voegtli et al. 2003), 1sq9 (Madrona and Wilson, 2004)) struc- tures. Introduction We have applied this technique to explore the functional surface interface in combination with experimentally deter- mined key surface residues found to be important for some seven-bladed WD β-propeller families. Evolutionary Bioinformatics 2008:4 204 Electrostatics and Functions of Seven-Bladed WD β-Propellers Another important factor determining how proteins function is their surface cavities or clefts. It has been reported that small surface cavities could be important for binding of allosteric effec- tors (DesJarlais et al. 1988). It has also been pro- posed (Kuntz et al. 1982; DesJarlais et al. 1988) that enzymatic active sites are usually situated in large surface clefts. Rigorous analysis of the impor- tance of the cleft size for protein-protein interac- tions has been carried out previously (Laskowski et al. 1996). modules. In the work described here, we carry out functional protein characterization on a larger scale. We have created a large set of unique homology models (∼700) from which the smaller subset of models (∼170) was used to carry out the functional classifi cation of β-propellers containing seven WD repeats. We have performed large-scale modelling of seven bladed WD β-propeller proteins. The models were electrostatically characterized by the PIPSA program (Blomberg et al. 1999) with default parameters, and then analysed using the statistical package R (http://www.r-project.org/). We show that by using the surface electrostatics as a criterion, the members of the seven-bladed β-propeller WD40-repeat family can be classified into functional clusters. This classifi cation is possible given high accuracy homology models. If the sequence identity between the template and the modelled sequence is too low, the classifi cation becomes less reliable due to the increasing error. We argue that this method can predict biological role or function of uncharacterized protein sequences. The electrostatics-based classifi cation differs from clusters based on sequence similarity. This result may suggest an important role of protein surface charge distribution for functional interactions. We also calculated the evolutionary trace (Lichtarge et al. 1996), and surface cavities (Tsodikov et al. 2002) of the seven-bladed WD40- repeat β-propeller proteins. The combination of residues predicted by these methods together with experimentally identifi ed residues are given in Table 1. These residues are possibly important in the WD40 interactions with binding partners. It is clear from experimental data (Table 1) that seven- bladed WD β-propeller proteins have a wide variety of functions. Introduction This diversity is clearly shown to arise from multiple functional sites on the surface rather that adoption of a single site. Furthermore, in those subfamilies not yet experimentally characterized, these techniques also predict a multifunctional interface. Electrostatic potential is a protein property which can only be examined with structural knowledge. Recently, several studies have used electrostatic surface potential as a tool for predict- ing protein functions and for predicting function- ally similar groups in protein families. Livesay et al. looked at the electrostatics near the active site of 54 experimentally determined structures of four enzyme families and one superfamily (Livesay et al. 2003). In another example, Botti et al. studied cholinesterases and neural cell-adhe- sion proteins (12 experimentally determined structures in total) (Botti et al. 1998). The authors showed that in the absence of any sequence simi- larity these protein families have a common elec- trostatic motif at the catalytic site. Homology modelling of 104 Pleckstrin Homology (PH) domains (Blomberg and Nilges 1997) followed by electrostatic analysis (Blomberg et al. 1999) revealed a high degree of functional conservation across the superfamily. Electrostatic calculations have also been used to analyze RNAs recognition and stabilization properties (Chin et al. 1999). Chin et al. have calculated electrostatic properties of some structures of RNA molecules from Protein Data Bank and Nucleic Acid Database (Chin et al. 1999). The authors found that the sites with unusual electrostatic features correspond to the function- ally important regions. Large scale homology modelling work has also been done on comple- ment control protein (CCP) modules (Soares et al. 2005). In total, 136 models of CCP domains were generated and subjected to multiple methods of surface characterization. In particular, it was found that assignments to clusters based on the surface properties differed from assignments based on sequence similarity. This result was suggested to refl ect a particular role of surface exposed residues crucial for protein-protein interactions. The applied surface characterization methods were indeed able to pinpoint functional sites within CCP Evolutionary Bioinformatics 2008:4 Alternative characterization methods Alternative characterization methods The ET method was used to identify residues con- served throughout evolution in each seven-bladed WD40-repeat β-propeller subfamily. ET identifi es conserved residues in sets of sequences which are in a specifi c region of the phylogenetic tree. If these residues are in statistically signifi cant structural clusters, they are identifi ed by ET and can be used for functional sites prediction. The sets of sequences are identifi ed using “cut-off” lines. These are drawn on the phylogenetic tree and called “partitions”. For the ET analysis presented here, ten partitions were used with the 10th partition encompassing the most class-specific residues. Residues, predicted to be conserved within each partition are divided into four categories. Exposed class specifi c residues (from partition 10) predicted by the method were mapped onto the surface of the representative experimental structures (1got (Lambright et al. 1996); 1erj (Sprague et al. 2000); 1gxr (Pickles et al. 2002); 1k8k (Robinson et al. PSI-PLAST search and modelling procedures A set of template structures for the seven-bladed WD40 family were extracted from the SCOP v1.69 database (Murzin et al. 1995). A BLAST (basic 205 Valeyev et al local alignment search tool) (http://www.ncbi.nlm. nih.gov) (Lipman et al. 1989; Altschul et al. 1997) search using each template as a query gave a rep- resentative sequence subset for each subfamily defi ned in SCOP under WD40-repeat family sec- tion. BLAST was run with an E-value inclusion threshold equal to 0.005. Since the object of this study was to analyse the structure-function rela- tionship of seven-bladed WD β-propellers, all BLAST searches were performed using only pro- peller domains and extraneous protein sequence was not included. The sequences collected by BLAST were aligned against the experimental structures using ClustalW (Thompson et al. 1994). All unique hits from BLAST searches with greater than 20% sequence identity to the queries, were used to produce homology models with Modeller (Sali and Blundell, 1993), resulting in about ∼1400 unique models. This entire process was fully auto- mated. Each model was then inspected in order to identify those which were poorly built resulting from incorrect automated alignment or other errors. Incorrect models (structures with severe distortions from the propeller shape) were excluded from further analysis. In total 688 correctly built models were analysed. A smaller subset of models (166) with sequence identity cut-offs at 90% for 1got, 1gxr, 1k8k, 1pgu, 1p22 families, at 70% for the 1erj family, and at 40% for the 1sq9 family was used for testing in this study. The models of sequences meeting the cut-off criteria to the experimental structures from WD40-repeat family as defi ned in SCOP v1.69 database were built using Modeller program. To carry out the electrostatic analysis, the models were superimposed using a script written in Perl and the CE program (Shindyalov and Bourne, 1998). simple C program. This program uses the coordinates of a given point on the outer blade of the superim- posed β-propellers as an input. These points (the middle of the outer strand) were chosen by visual inspection of each representative structure. Vectors are calculated from the centre of mass to the chosen points. These vectors are characteristic for each structure. (Fig. 2 in Supplementary Material). Electrostatics El The structurally superimposed WD propellers were used as input for PIPSA. This program computes the similarity indexes between pairs of proteins based on the monopole and dipole terms of the molecule’s electrostatics. The Hodgkin index is calculated to measure the similarity between two molecular potentials. This parameter encompasses the differences in sign, magnitude, and spatial behaviour of the potentials. The program calculates pairwise electrostatic indexes of multiple structures allowing comparisons of large datasets and subse- quent clustering analysis. The calculated electro- static indexes can range from −1 to 1. If the Hodgkin index equals 1, the two potentials are identical, if it equals 0 the potentials are fully uncorrelated, and −1, the potentials are anticorre- lated. These 3D electrostatic descriptions of the proteins were clustered using Agnes (Struyf et al. 1997) as coded in the R statistical package. WD proteins are a structurally conserved subfamily y In order to investigate the WD40-repeat family which is a part of the seven-bladed β-propeller fold we focused on the ‘global’ geometry of the fold and have examined the arrangement of blades within the ‘plane’ of the β-propeller. There are potentially two geometrical “regions” that one could analyse in the β-propeller type structures. One geometrically distinct part is the relatively rigid protein core composed of strands arranged into blades. The question to ask is whether or not these strands are arranged differently in different subfamilies within the WD40-repeat family. Another potentially interesting question is whether there is any difference between subfamilies in the inherently fl exible regions of the β-propellers, such as loops connecting the blades. There are of course a variety of geometrical parameters that one can use to characterize symmetrical β-propeller struc- tures. For example, one could look at the charac- teristic distances between corresponding strands in the neighbouring blades to see if they are con- served or varied between subfamilies. Another potential option is to measure radius and height of the β-propellers. We calculated vectors (for representative experimental structures 1got (Lambright et al. 1996); 1erj (Sprague et al. 2000); 1gxr (Pickles et al. 2002); 1k8k (Robinson et al. 2001); 1p22 (Wu et al. 2003); 1pgu (Voegtli et al. 2003); 1sq9 (Madrona and Wilson, 2004)) from the centre of mass to a defi ned point on the outer side of each blade, this simple parameter contains information about the radius and implicitly describes the height of the structures as well as angular distribution of the individual blades. Given that the blades are composed of four anti-parallel We next examined more general structural diversity within the WD40-repeat family of seven- bladed β-propellers. For example, it has not been previously established that seven-bladed β-propellers composed of WD-repeats are structur- ally distinct from other seven-bladed β-propellers and we addressed this point by determining the structurally similarity between the two sets of domains. High structural similarity was found within the WD40-repeat protein family which was not found in any other seven-bladed β-propeller superfamily. Figure 2 shows a comparison of per- centage sequence identity (A) and sequence similarity (B) with the corresponding RMSDs, for all experimentally determined seven-bladed β-propeller domains (some representative structures are shown in Figure 1 of the Supplementary Material). Structural comparison The β-propeller parts of all seven-bladed β-propel- ler containing structures defined in the SCOP database were extracted. Structural comparison of all seven-bladed β-propellers was performed automatically by pairwise superimposition using the CE program based on the Cα atom positions. The RMSD and sequence identity and the sequence similarity (using the BLOSUM62 matrix (Henikoff and Henikoff, 1992)) were calculated for each superimposition. The geometrical characterization of the seven- bladed β-propeller domains was performed using a Evolutionary Bioinformatics 2008:4 206 Electrostatics and Functions of Seven-Bladed WD β-Propellers 2001); 1p22 (Wu et al. 2003); 1pgu (Voegtli et al. 2003); 1sq9 (Madrona and Wilson, 2004)). 2001); 1p22 (Wu et al. 2003); 1pgu (Voegtli et al. 2003); 1sq9 (Madrona and Wilson, 2004)). beta strands, we used the middle of the outer strand as the characteristic measure of each blade. This approach allows analysis of how symmetrically the blades are arranged within each subfamily. The spatial distribution of the ‘middle point’ coordi- nates was mapped on the superimposed seven- bladed β-propeller, representative for different subfamilies (representative experimental structures listed in Material and Methods) (Fig. 2 in Supplemental Material). This analysis demonstrated that the spatial organization of the blades (the actual propeller) appears quite conserved across all the seven-bladed subfamilies within WD40- repeat family. This result distinguishes the core part of the β-propellers from the fl exible loops, in which some variability has been observed between different subfamilies. The program Surface Racer (Tsodikov et al. 2002) was used to perform protein surface curva- ture analysis and to identify potential cavities, which serve as additional hints for functional regions. The probe radius was chosen to be slightly larger than a water molecule radius and was equal to 1.5 Ǻ. The experimentally determined functional residues were compared with the ET and the sur- face curvature program predictions. Evolutionary Bioinformatics 2008:4 WD proteins are a structurally conserved subfamily Overall, the pairwise comparison of WD-repeat containing domains produces signifi cantly lower RMSDs relative to identical comparisons of pairs of domains from other β-propeller classes or between these classes and WD-repeat containing domains. This observation is rather intriguing, because there are no obvious factors explaining why the WD sequence motif would have such a high impact on the structure. In fact, the sequence identity (and the sequence similarity) amongst many of the WD proteins is as low as the sequence identity across non-WD pro- teins. Homology models of WD β-propellers To characterize the WD40-repeat protein family in more detail, we built models of sequences with Evolutionary Bioinformatics 2008:4 207 Valeyev et al 0 20 40 60 80 100 0 1 2 3 4 5 6 WD protein structures non WD propellers RMSD sequence identity, % B A 20 40 60 80 100 0 1 2 3 4 5 6 WD protein structures non WD propellers RMSD sequence similarity, % Figure 2. The variation of RMSDs and sequence identity between seven-bladed β-propeller proteins. The data points for the com- parison between WD-WD proteins are coloured as red, and the green circles represent superimpositions between two non-WD proteins as well as between WD and non-WD proteins. The data shows clear structural conservation of the WD40 superfamily amongst all other seven- bladed β-propellers. RMSD has been calculated based on Cα atom positions. 0 20 40 60 80 100 0 1 2 3 4 5 6 WD protein structures non WD propellers RMSD sequence identity, % A B 20 40 60 80 100 0 1 2 3 4 5 6 WD protein structures non WD propellers RMSD sequence similarity, % B A RMSD Figure 2. The variation of RMSDs and sequence identity between seven-bladed β-propeller proteins. The data points for the com- parison between WD-WD proteins are coloured as red, and the green circles represent superimpositions between two non-WD proteins as well as between WD and non-WD proteins. The data shows clear structural conservation of the WD40 superfamily amongst all other seven- bladed β-propellers. RMSD has been calculated based on Cα atom positions. on proteins affect the specifi city of protein-ligand or protein-protein interactions (Honig and Nich- olls, 1995). Electrostatic potentials generated by molecules have a variety of different characteris- tic surface features that can only be calculated when a structure is known. WD proteins are a structurally conserved subfamily The surface electro- static pattern of any charged protein creates either attractive or repulsive forces. These, inevitably, make certain protein-protein interactions more or less favourable. We have used our models of the seven-bladed β-propeller subfamilies to assess whether electrostatics is applicable in this par- ticular case. As we use protein models rather than experimental structures, one can possibly expect some inaccuracy. 20% or greater sequence identity to the representa- tive structures. The models were inspected for any modelling artefacts and well built models were used in the later analysis. It was clear that with decreasing sequence identity to the template, the quality of modelling performance decreased. A set of highly similar models (166) were used to fully explore the potential of the value gained from homology modelling. 20% or greater sequence identity to the representa- tive structures. The models were inspected for any modelling artefacts and well built models were used in the later analysis. It was clear that with decreasing sequence identity to the template, the quality of modelling performance decreased. A set of highly similar models (166) were used to fully explore the potential of the value gained from homology modelling. Surface electrostatics of seven bladed WD structures is conserved The high structural conservation of the WD propel- lers despite their low sequence identity allows the building of homologous models of reasonable quality in an automated manner. The WD pattern observed in this family also improves the homol- ogy model building by allowing a high degree of confi dence in the alignment of sequence with the template structure. y A random subset of WD protein homology models (ten from each subfamily) were selected and used initially to analyse surface electrostat- ics. From this we identifi ed that surface electro- statics were highly conserved within a subfamily and different between WD40-repeat subfamilies. Figure 3 shows the surface electrostatics of the homology models in the G-beta protein subfam- ily. The surface pattern remains similar even though the sequence identity to the experimental template (1GOT) decreases to around 30%. This fi nding indicates that it may be possible to clas- sify protein function based on the value gained from modelling and using electrostatics as a criterion. The difference in surface between the subfamilies of the WD domains can be seen in Figure 4. We studied which β-propeller protein structure properties might reveal differences in function between structurally similar subfamilies. Amongst various protein surface properties important for protein-protein interactions, such as cavities, hydrophobic residues, specifi c interaction residue pockets, electrostatics is the one we identifi ed to have high potential for functional protein classi- fi cation. It is known that electrostatics plays an important role in molecular interactions (Honig and Nicholls, 1995). Surface electrostatic patches Evolutionary Bioinformatics 2008:4 208 Electrostatics and Functions of Seven-Bladed WD β-Propellers 90.4% 1GOT 98% 88% 29.6% 28.9% 72.2% 56.4% Figure 3. The surface of G-beta protein and its homology models coloured by their electrostatic potential. The percentages given below each structure are the sequence identity between the homology model and the structural template (1GOT). The negative charge is shown as red, positive charge is coloured blue. The conservation of the electrostatic surface in the models even those with relatively low sequence identity, is striking. All structures show the propeller’s top surfaces. 1GOT 98% 90.4% 88% 1GOT 90.4% 88% 88% 98% 29.6% 72.2% 56.4% 28.9% 29.6% 28.9% 56.4% 72.2% Figure 3. The surface of G-beta protein and its homology models coloured by their electrostatic potential. The percentages given below each structure are the sequence identity between the homology model and the structural template (1GOT). Surface electrostatics of seven bladed WD structures is conserved The negative charge is shown as red, positive charge is coloured blue. The conservation of the electrostatic surface in the models even those with relatively low sequence identity, is striking. All structures show the propeller’s top surfaces. 1K8K Arp2/3 protein 1GXR Groucho protein 1SQ9 Antiviral protein Ski8p 1ERJ Tup1 protein 1P22 F-box/WD-repeat protein 1K8K Arp2/3 protein 1PGU Actin interacting Protein I 1GOT G-beta protein Figure 4. Electrostatic based grouping of the seven bladed WD repeat β-propellers. Two dimensional plot of three dimentional data is shown for PIPSA calculated electrostatic indexes of seven experimentally determined WD repeat proteins from different families and homol- ogy models. The squares represent experimentally defi ned structures (1erj—magenta, 1got—green, 1gxr—red, 1k8k—yellow, 1pgu—blue, 1p22—cyan, 1sq9 – grey). Electrostatics are shown for the top surfaces of proteins. 1GXR Groucho protein 1SQ9 Antiviral protein Ski8p 1ERJ Tup1 protein 1P22 F-box/WD-repeat protein 1K8K Arp2/3 protein 1PGU Actin interacting Protein I 1GOT G-beta protein Figure 4. Electrostatic based grouping of the seven bladed WD repeat β-propellers. Two dimensional plot of three dimentional data shown for PIPSA calculated electrostatic indexes of seven experimentally determined WD repeat proteins from different families and homo ogy models. The squares represent experimentally defi ned structures (1erj—magenta, 1got—green, 1gxr—red, 1k8k—yellow, 1pgu—blu 1P22 F-box/WD-repeat protein 1GXR Groucho protein 1PGU Actin interacting Protein I 1PGU Actin interacting Protein I 1SQ9 Antiviral protein Ski8p Actin interacting Protein I Figure 4. Electrostatic based grouping of the seven bladed WD repeat β-propellers. Two dimensional plot of three dimentional data is shown for PIPSA calculated electrostatic indexes of seven experimentally determined WD repeat proteins from different families and homol- ogy models. The squares represent experimentally defi ned structures (1erj—magenta, 1got—green, 1gxr—red, 1k8k—yellow, 1pgu—blue, 1p22—cyan, 1sq9 – grey). Electrostatics are shown for the top surfaces of proteins. 209 Evolutionary Bioinformatics 2008:4 Valeyev et al From the visual inspection of the electrostatic potentials it is evident that each WD subfamily has a unique isopotential surface (Fig. 4). To measure quantitatively the degree of similarity of electrostatic properties between the subfamilies, we calculated similarity indexes between all the models using the PIPSA program. Figure 4 shows the electrostat- ics-based grouping for the smaller set of 166 models. It follows from this picture that WD sub- families differ from each other despite the striking structural similarity within the WD40-repeat fam- ily. Surface electrostatics of seven bladed WD structures is conserved Based on these results one may argue that it is possible to predict functions of uncharacterized protein sequences (with no defi ned function or solved structure) based on electrostatic clustering. For example, sequences that cluster with Tup1 are transcription factors, the ones clustering with Gβ can be involved in signal transduction. However, these predictions are prone to some potential errors due to: i) homology models represent protein structures with limited accuracy; ii) electrostatic analysis is still a new approach for protein function classifi cation. While one can clearly observe certain electro- statics based clustering on Figure 4, it is important to be able to quantify this result using a formal criterion. The observed electrostatic grouping was clustered in the R statistical package. All 166 models were clustered but in order to visualize electrostatics-based separation, we also performed this analysis on a representative subset, of up to 10 randomly picked models from each subfamily (Fig. 5). The degree of clustering shown in Figure 5 is very similar to that shown by all 166 models. 1GXR g g ( ) 1GOT 1ERJ 1PGU 1K8K 1P22 1SQ9 1ERJ 1GOT 1K8K 1P22 1GXR 1PGU 1SQ9 Dendrogram of agnes (X=X,dist) Figure 5. Electrostatic based clustering of the seven bladed WD repeat β-propellers. The different seven-bladed WD β-propeller sub- familes are clearly in separate clusters. Five (1GOT, 1SQ9, 1ERJ, 1K8K, 1P22) out of seven subfamilies appear to have good clustering in electrostatic space. The partial overlap of 1GXR and 1PGU families indicates that their electrostatic potentials are similar. Electrostatics are shown for the top surfaces of proteins. g g ( ) Dendrogram of agnes (X=X,dist) g g ( ) Dendrogram of agnes (X=X,dist) 1P22 1GOT 1ERJ 1P22 1K8K Figure 5. Electrostatic based clustering of the seven bladed WD repeat β-propellers. The different seven-bladed WD β-propeller sub- familes are clearly in separate clusters. Five (1GOT, 1SQ9, 1ERJ, 1K8K, 1P22) out of seven subfamilies appear to have good clustering in electrostatic space. The partial overlap of 1GXR and 1PGU families indicates that their electrostatic potentials are similar. Electrostatics are shown for the top surfaces of proteins. Evolutionary Bioinformatics 2008:4 210 Electrostatics and Functions of Seven-Bladed WD β-Propellers the experimentally determined functionally important residues on to the protein structures. The clustering shows separate branches that reasonably distinguish models from different subfamilies. Surface electrostatics of seven bladed WD structures is conserved Homology models of fi ve out of the seven subfamilies are clustered on the same branch as their representative experimental structure, whereas models of two subfamilies (1GXR and 1PGU) do not cluster as tightly. This might be due to the limited accuracy of comparative models as well as similar electrostatics of different subfami- lies which leads to the ‘mixing’ of subfamilies in the electrostatic space. These data suggest that electrostatics provides sufficient functional distinction and can potentially have predictive power. The applied method can suggest whether or not a structure built from an uncharacterized sequence belongs to a particular functional group. It, therefore, appears possible to classify protein sequences based on the information gained from homology modelling and electrostatics. Table 1 in supplementary material shows. ET is a powerful tool for prediction of protein functional sites. The method uses a set of aligned sequences and the corresponding phylogenetic tree. Here the evolutionary privileged residues predicted as exposed class-specifi c in the 10th partition (see Methods) are highlighted on the surface (Fig. 6). These residues may be functionally important, but in order to identify others or confi rm these we have additionally applied a program developed by Tsodikov et al. (Tsodikov et al. 2002) to search for regions forming cavities on the surface, because these may also suggest possible binding sockets. It has not been suggested that any of the seven- bladed WD β-propeller families have an enzymatic activity, we therefore analyse the small cavities on the surface as these may suggest possible allosteric interaction sites. The surface residues, creating small cavities that are shown on the representative structures (Fig. 6), suggest potential binding pock- ets. One of the best ways to characterize the bind- ing areas is obviously experimental. We have done a literature search to fi nd surface residues reported to be involved in interactions in seven-bladed WD β-propellers. The residues experimentally deter- mined to be functionally important in each seven- bladed WD β-propeller subfamily (Table 1), were mapped onto the corresponding structures. Figure 6 shows the continuum of potential functional sites for all seven subfamilies. Although the predictions reveal wide distribution, it appears there is a higher probability for functional interaction sites on the “top” side of the WD β-propeller subfamilies. Previous experimental studies also report that functional residues are located mainly on the “top” interface (Pfl ugrad et al. 1997; Ford et al. 1998). Surface electrostatics of seven bladed WD structures is conserved pp y The observed electrostatic differences between the seven-bladed WD β-propeller protein subfamilies may imply that the surface electrostatic pattern diverged with the protein function during evolution while the β-propeller fold remained conserved throughout the WD40-repeat family. The RMSD and sequence identity as well as sequence similar- ity comparisons (Fig. 2) show that the sequence identity between seven-bladed WD β-propeller representative structures is as low as 10%. This is an interesting observation because RMSD between different WD β-propellers is low, in the range from 1 to 3 Å (Fig. 2). While high sequence identity may suggest similarity of function, very low sequence identity or similarity does not rule out similar func- tion, especially if the fold is very conserved. Here our results show that protein function can be dis- tinguished based on the electrostatic properties of protein subfamilies with very low sequence identity, but strikingly similar fold. ( g ) The ET method, surface cavities mapping and even the experimental mutations by no means per- fectly indicate interaction sites. However, the regions of residues overlap or predicted neighbour- ing patches are strong indicators of functional importance. The two theoretical techniques in combination with experimental mutagenesis data (where available) suggest that all seven-bladed WD β-propeller subfamilies have multifunctional inter- faces, a property also observed in PH domains (Shaw, 1996). Based on our results, we suggest that these residues are likely to be important for protein function: i) G-beta protein subfamily: K89, S98, W99, L117, N119, D186, D228 are experimentally determined functional residues that are also pre- WD propellers exhibit a continuum of functional sites Unfor- tunately this overlap is incomplete as can be seen from Table 1. There are experimentally determined functionally important residues not found by evo- lutionary trace. This trend is seen in most of the subfamilies. S97, D118, G141, T164, G185, A206 are predicted by the ET and surface curvature pro- grams and located next to the residues identifi ed by both experimental mutations and ET ii) Tup1 pro- tein subfamily: Y489, N673 are the experimentally determined functional residues that are also pre- dicted to be functionally important by ET; R652, H671 are predicted by the surface curvature pro- gram and located next to residues identifi ed by experimental mutations and ET; Q486, R465, D464, V346, L547 are predicted by the ET and surface curvature programs and located next to residues identifi ed by both experimental mutations and ET; iii) Groucho protein subfamily: H646 is the only residue (of the three possible ones) identifi ed by experimental mutations and ET; iv) F-box/WD- repeat protein subfamily: R285, S325, R474 are identifi ed by experimental mutations and ET; T266, K268, N287, T307, S327 are predicted by the ET dicted to be functionally important by ET. Unfor- tunately this overlap is incomplete as can be seen from Table 1. There are experimentally determined functionally important residues not found by evo- lutionary trace. This trend is seen in most of the subfamilies. WD propellers exhibit a continuum of functional sites Studies of the WD40-repeat family reveal that it has multiple binding partners and it has also been suggested that it serves as a scaffold for protein-protein interactions (Paoli, 2001). To investigate this functional divergence further we have analyzed the spatial distribution of the functionally important amino acids by a combina- tion of ET, surface curvature analysis and mapping 211 Evolutionary Bioinformatics 2008:4 Valeyev et al C R X G 1 B J R E 1 Figure 6. The seven-bladed WD protein families reveal a continuum of functional sites. The residues proposed to be functionally important are mapped on to experimental structures. Blue—residues identifi ed by mutational experiments, Yellow – exposed class-specifi c residues classifi ed by ET in the trace 10, Red shows the overlap between ET and experimental mutations, Cyan – residues proposed to form cavities on the surface. (A) shows the WD part of G-beta protein (1GOT), (B) Transcriptional repressor Tup1 (1ERJ), (C) Transcriptional repressor Groucho (1GXR), (D) F-box/WD-repeat protein 1 (1P22), (E) Arp2/3 complex (1K8K), (F) Actin interacting protein 1 (1PGU), (G) Ski8p, mRNA degradation regulating protein (1SQ9). All proteins are oriented in an identical fashion. A B C D 2 2 P 1 R X G 1 J R E 1 T O G 1 E F G 1K8K 9 Q S 1 U G P 1 A T O G 1 D 2 2 P 1 C B D T O G 1 2 2 P 1 J R E 1 F U G P 1 E 1K8K G 9 Q S 1 E G F U G P 1 U G P 1 9 Q S 1 9 Q S 1 1K8K Figure 6. The seven-bladed WD protein families reveal a continuum of functional sites. The residues proposed to be functionally important are mapped on to experimental structures. Blue—residues identifi ed by mutational experiments, Yellow – exposed class-specifi c residues classifi ed by ET in the trace 10, Red shows the overlap between ET and experimental mutations, Cyan – residues proposed to form cavities on the surface. (A) shows the WD part of G-beta protein (1GOT), (B) Transcriptional repressor Tup1 (1ERJ), (C) Transcriptional repressor Groucho (1GXR), (D) F-box/WD-repeat protein 1 (1P22), (E) Arp2/3 complex (1K8K), (F) Actin interacting protein 1 (1PGU), (G) Ski8p, mRNA degradation regulating protein (1SQ9). All proteins are oriented in an identical fashion. dicted to be functionally important by ET. Conclusions In this study we have analysed the seven-bladed WD40-repeat protein family a member of the seven-bladed β-propeller fold. We have investi- gated a variety of characteristics of the experimen- tal structures and the set of homologous models representing seven different seven-bladed WD β- propeller subfamilies that form the family. The models were built in a fully automated manner, to investigate the functional similarities and differ- ences of the seven-bladed WD β-propeller proteins. We have shown that it is possible to classify WD β-propeller protein subfamilies based on the value gained from large scale homology modelling. Blomberg, N. and Nilges, M. 1997. Functional diversity of PH domains: an exhaustive modelling study. Fold Des., 2:343–55. Botti, S.A., Felder, C.E. et al. 1998. Electrotactins: a class of adhesion proteins with conserved electrostatic and structural motifs. Protein Eng., 11:415–20. Chakravarty, S. and Sanchez, R. 2004. Systematic analysis of added-value in simple comparative models of protein structure. Structure, 12:1461–70. Chakravarty, S., Wang, L. et al. 2005. Accuracy of structure-derived properties in simple comparative models of protein structures. Nucleic Acids Res., 33:244–59. Chin, K., Sharp, K.A. et al. 1999. Calculating the electrostatic properties of RNA provides new insights into molecular interactions and Nat. Struct Biol., 6:1055–61. DesJarlais, R.L., Sheridan, R.P. et al. 1988. Using shape complementa- rity as an initial screen in designing ligands for a receptor binding site of known three-dimensional structure. J. Med. Chem., 31:722–9. g g gy g We found that the WD40-repeat family is struc- turally distinct from all other superfamilies form- ing the seven-bladed β-propeller fold. This difference we believe is due to the specifi c WD sequence motif, which must lead to distinct struc- tural differences. In fact the sequence identity amongst the WD subfamilies is as low as sequence identity between non WD and other families form- ing the fold. Our fi nding allows us to suggest that the WD motif translates into the higher structural similarity and makes the WD40-repeat family distinct in structural as well as sequence terms from other superfamilies of the fold. Ford, C.E., Skiba, N.P. et al. 1998. Molecular basis for interactions of G protein betagamma subunits with effectors. Science, 280:1271–4. Henikoff, S. and Henikoff, J.G. 1992. Amino acid substitution matrices from protein blocks. Proc. Natl. Acad. Sci., U.S.A., 89:10915–9. Honig, B. and Nicholls, A. 1995. Classical electrostatics in biology and chemistry. Science, 268:1144–9. Kuntz, I.D., Blaney, J.M. et al. 1982. Funding Funding NVV is supported by ORS, The Hill Foundation, and The Wellcome Trust funded Prize Studentship (070417), AKD (057725) is supported by The Wellcome Trust. Funding NVV is supported by ORS, The Hill Foundation, and The Wellcome Trust funded Prize Studentship (070417), AKD (057725) is supported by The Wellcome Trust. p It has already been suggested earlier that the WD fold can serve as a scaffold for other protein- protein interactions. Here we support that hypothesis by demonstrating the continuum of potential binding sites on the surface of all analyzed seven-bladed WD subfamilies. References Altschul, S.F., Madden, T.L. et al. 1997. Gapped BLAST and PSI-BLAST: a new generation of protein database search programs. Nucleic Acids Res., 25:3389–402. Blomberg, N., Gabdoulline, R.R. et al. 1999. Classifi cation of protein sequences by homology modeling and quantitative analysis of electrostatic similarity. Proteins, 37:379–87. WD propellers exhibit a continuum of functional sites S97, D118, G141, T164, G185, A206 are predicted by the ET and surface curvature pro- grams and located next to the residues identifi ed by both experimental mutations and ET ii) Tup1 pro- tein subfamily: Y489, N673 are the experimentally determined functional residues that are also pre- dicted to be functionally important by ET; R652, H671 are predicted by the surface curvature pro- gram and located next to residues identifi ed by experimental mutations and ET; Q486, R465, D464, V346, L547 are predicted by the ET and surface curvature programs and located next to residues identifi ed by both experimental mutations and ET; iii) Groucho protein subfamily: H646 is the only residue (of the three possible ones) identifi ed by experimental mutations and ET; iv) F-box/WD- repeat protein subfamily: R285, S325, R474 are identifi ed by experimental mutations and ET; T266, K268, N287, T307, S327 are predicted by the ET and surface curvature programs and located next to residues identifi ed by experimental mutations and ET; G408, R410, N450, E471 are predicted by the ET and surface curvature programs and located next to residues identifi ed by experimental mutations; v) Ski8p, mRNA degradation regulating protein superfamily: F89, R237 are identified by both experimental mutations and ET. p The residues predicted by the ET do not appear to signifi cantly overlap with the experimentally determined functional residues, suggesting that the method may not be as robust as would be hoped. However, this might be due to the fact that WD proteins have a diverse interaction interface and only a limited number of residues important for functional interactions are reported in the literature. This also demonstrates the signifi cance of the results with regards to electrostatic clustering, on a family as functionally diverse as the WD proteins. It is clear that sequence based methods (even those using some structure) such as ET are not able to capture the complexity of the family. We believe, that additional experimental studies of the functional interaction sites might reveal better Evolutionary Bioinformatics 2008:4 Evolutionary Bioinformatics 2008:4 212 Electrostatics and Functions of Seven-Bladed WD β-Propellers correspondence between the ET predictions and the experimental data. Evolutionary Bioinformatics 2008:4 Conclusions A geometric approach to macromolecule-ligand interactions. J. Mol. Biol., 161:269–88. Lambright, D.G., Sondek, J. et al. 1996. The 2.0 A crystal structure of a heterotrimeric G protein. Nature (London), 379:311–9. Laskowski, R.A., Luscombe, N.M. et al. 1996. Protein clefts in molecular recognition and function. Protein Sci., 5:2438–52. Lichtarge, O., Bourne, H.R. et al. 1996. Evolutionarily conserved Galphabetagamma binding surfaces support a model of the G protein- receptor complex. Proc. Natl. Acad. Sci., U.S.A., 93:7507–11. We have analysed the surface electrostatics of the seven-bladed WD β-propeller subfamilies and found that it is highly conserved within each sub- family, but differs between subfamilies. The analysis of the surface electrostatics of homology models with sequence identity to the template structure as low as 30% reveals a high degree of electrostatics conservation. The comparison of 166 homology models showed that it is possible to discriminate between the seven-bladed WD β-propeller subfamilies using electrostatics, if the homology models are reasonable. Clustering analysis of the electrostatic results allowed quan- tifi cation of the differences and similarities between the seven-bladed WD β-propeller subfamiles. Lichtarge, O., Bourne, H.R. et al. 1996. An evolutionary trace method defi nes binding surfaces common to protein families. J. Mol. Biol., 257:342–58. Lichtarge, O. and Sowa, M.E. 2002. Evolutionary predictions of binding surfaces and interactions. Curr. Opin. Struct Biol., 12:21–7. Lichtarge, O., Sowa, M.E. et al. 2002. Evolutionary traces of functional surfaces along G protein signaling pathway. Methods Enzymol, 344:536–56. Lichtarge, O., Yamamoto, K.R. et al. 1997. Identifi cation of functional surfaces of the zinc binding domains of intracellular receptors. J. Mol. Biol., 274:325–37. Lichtarge, O., Yao, H. et al. 2003. Accurate and scalable identifi cation of functional sites by evolutionary tracing. J. Struct Funct Genomics, 4:159–66. Lipman, D.J., Altschul, S.F. et al. 1989. A tool for multiple sequence alignment. Proc. Natl. Acad. Sci., U.S.A., 86:4412–5. Livesay, D.R., Jambeck, P. et al. 2003. Conservation of electrostatic properties within enzyme families and superfamilies. Biochemistry, 42:3464–73. 213 Valeyev et al Madabushi, S., Yao, H. et al. 2002. Structural clusters of evolutionary trace residues are statistically signifi cant and common in proteins. J. Mol. Biol., 316:139–54. Smith, T.F., Gaitatzes, C. et al. 1999. The WD repeat: a common architecture for diverse functions. Trends Biochem. Sci., 24:181–5. Soares, D.C., Gerloff, D.L. et al. 2005. Large-scale modelling as a route to multiple surface comparisons of the CCP module family. Protein Eng. Des. Sel., 18:379–88. Madrona, A.Y. Evolutionary Bioinformatics 2008:4 Conclusions and Wilson, D.K. 2004. The structure of Ski8p, a protein regulating mRNA degradation: Implications for WD protein structure. Protein Sci., 13:1557–65. Sprague, E.R., Redd, M.J. et al. 2000. Structure of the C-terminal domain of Tup1, a corepressor of transcription in yeast. Embo. J., 19:3016–27. Murzin, A.G. 1992. Structural principles for the propeller assembly of beta-sheets: the preference for seven-fold symmetry. Proteins, 14:191–201. Struyf, A., Hubert, M. et al. 1997. Integrating Robust Clustering Techniques in S-PLUS. Computational Statistics and Data Analysis, 24:17–37. Murzin, A.G., Brenner, S.E. et al. 1995. SCOP: a structural classifi cation of proteins database for the investigation of sequences and structures. J. Mol. Biol., 247:536–40. Thompson, J.D., Higgins, D.G. et al. 1994. CLUSTAL W: improving the sensitivity of progressive multiple sequence alignment through sequence weighting, position-specifi c gap penalties and weight matrix choice. Nucleic Acids Res., 22:4673–80. Paoli, M. 2001. Protein folds propelled by diversity. Prog Biophys. Mol. Biol., 76:103–30. Tsodikov, O.V., Record Jr, M.T. et al. 2002. Novel computer program for fast exact calculation of accessible and molecular surface areas and average surface curvature. J. Comput. Chem., 23:600–9. Pfl ugrad, A., Meir, J.Y. et al. 1997. The Groucho-like transcription factor UNC-37 functions with the neural specifi city gene unc-4 to govern motor neuron identity in C. elegans. Development, 124:1699–709. van der Voorn, L. and Ploegh, H.L. 1992. The WD-40 repeat. FEBS Lett., 307:131–4. y g Pickles, L.M., Roe, S.M. et al. 2002. Crystal structure of the C-terminal WD40 repeat domain of the human Groucho/TLE1 transcriptional corepressor. Structure, 10:751–61. Voegtli, W.C., Madrona, A.Y. et al. 2003. The structure of Aip1p, a WD repeat protein that regulates Cofi lin-mediated actin depolymerization. J. Biol. Chem., 278:34373–9. Robinson, R.C., Turbedsky, K. et al. 2001. Crystal structure of Arp2/3 complex. Science, 294:1679–84. Wu, G., Xu, G. et al. 2003. Structure of a beta-TrCP1-Skp1-beta-catenin complex: destruction motif binding and lysine specifi city of the SCF(beta-TrCP1) ubiquitin ligase. Mol. Cell., 11:1445–56. Sali, A. and Blundell, T.L. 1993. Comparative protein modelling by satisfaction of spatial restraints. J. Mol. Biol., 234:779–815. Yu, L., Gaitatzes, C. et al. 2000. Thirty-plus functional families from a single motif. Protein Sci., 9:2470–6. Shaw, G. 1996. The pleckstrin homology domain: an intriguing multifunctional protein module. Bioessays, 18:35–46. Shindyalov, I.N. and Bourne, P.E. 1998. Protein structure alignment by incremental combinatorial extension (CE) of the optimal path. Protein Eng., 11:739–47. 214 Evolutionary Bioinformatics 2008:4 Electrostatics and Functions of Seven-Bladed WD β-Propellers Electrostatic and Functional Analysis of the Seven-Bladed WD β-Propellers Najl V Valeyev1,4, A Kristina Downing1, John Sondek2 and Charlotte Deane3 Najl V Valeyev1,4, A Kristina Downing1, John Sondek2 and Charlot Evolutionary Bioinformatics 2008:4 Supplementary Material Supplementary Material 1L0Q 1GOT A B C D 1GOF 1QNI E F G H 1A12 1C9L 1M1X 1QFM 1JOF 1RI6 1OLZ L I K J 1K32 Figure S1. Representative experimental structures for all seven-bladed WD β-propeller superfamilies. The structures shown reveal some variability mostly observed in loops. (A) Galactose Oxidase, (B) Surface layer protein, (C) Nitrous oxide reductase, (D) G-beta protein, (E) Regulator of chromosome condensation RCC1, (F) Clathrin, (G) Integrin, (H) Prolyl oligopeptidase, (I) Tricorn protease, (J) 3-carboxy-cis, cis-mucoante lactonizing enzyme, (K) Putative isomerase YbhE, (L) Sema domain (found in proteins involved in development, tissue regeneration and cancer), (M) Backbone representation of the G-beta protein. A 1GOF 1L0Q B 1GOT D C 1QNI A B D C 1GOF 1L0Q 1GOT G 1M1X H 1QFM F 1C9L F 1C9L 1JOF J E 1A12 F E G 1A12 1QFM 1C9L 1M1X 1M1X 1C9L 1JOF J 1RI6 K I 1K32 1OLZ L I J 1OLZ 1RI6 1JOF 1K32 Figure S1. Representative experimental structures for all seven-bladed WD β-propeller superfamilies. The structures shown reveal some variability mostly observed in loops. (A) Galactose Oxidase, (B) Surface layer protein, (C) Nitrous oxide reductase, (D) G-beta protein, (E) Regulator of chromosome condensation RCC1, (F) Clathrin, (G) Integrin, (H) Prolyl oligopeptidase, (I) Tricorn protease, (J) 3-carboxy-cis, cis-mucoante lactonizing enzyme, (K) Putative isomerase YbhE, (L) Sema domain (found in proteins involved in development, tissue regeneration and cancer), (M) Backbone representation of the G-beta protein. 215 Evolutionary Bioinformatics 2008:4 Valeyev et al Figure S2. Geometrical characterization of the experimental seven-bladed β-propeller structures. Each sphere represents the middle position on the outer strand of the β-propeller blades. The representative experimental structures from Figure 1 B were superimposed and are each shown in a different colour. Despite some degree of structural variability observed across seven-bladed β-propellers (Fig. 1 in Supplementary Material), these data suggest that the β-propeller blades are spatially conserved across the superfamily. Figure S2. Geometrical characterization of the experimental seven-bladed β-propeller structures. Each sphere represents the middle position on the outer strand of the β-propeller blades. The representative experimental structures from Figure 1 B were superimposed and are each shown in a different colour. Despite some degree of structural variability observed across seven-bladed β-propellers (Fig. 1 in Supplementary Material), these data suggest that the β-propeller blades are spatially conserved across the superfamily. Figure S2. Geometrical characterization of the experimental seven-bladed β-propeller structures. Supplementary Material Each sphere represents the middle position on the outer strand of the β-propeller blades. The representative experimental structures from Figure 1 B were superimposed and are each shown in a different colour. Despite some degree of structural variability observed across seven-bladed β-propellers (Fig. 1 in Supplementary Material), these data suggest that the β-propeller blades are spatially conserved across the superfamily. e experimental seven-bladed β-propeller structures. Table SI. Protein sequences used for the electrostatics analysis 216 Evolutionary Bioinformatics 2008:4
https://openalex.org/W2011382435
https://link.springer.com/content/pdf/10.1140/epjc/s10052-015-3411-z.pdf
English
null
The effective Planck mass and the scale of inflation
European physical journal. C, Particles and fields
2,015
cc-by
11,748
The effective Planck mass and the scale of inflation Ignatios Antoniadis1,2,a, Subodh P. Patil3,b 1 Albert Einstein Center for Fundamental Physics, Institute for Theoretical Physics, Bern University, Sidlerstrasse 5, 3012 Bern, Switzerland 2 Ecole Polytechnique, 91128 Palaiseau, France 3 Theory Division, PH-TH Case C01600, CERN, 1211 Geneva, Switzerland Ignatios Antoniadis1,2,a, Subodh P. Patil3,b 1 Albert Einstein Center for Fundamental Physics, Institute for Theoretical Physics, Bern University, Sidlerstrasse 5, 3012 Bern, Switzerland 2 Ecole Polytechnique, 91128 Palaiseau, France 3 Theory Division, PH-TH Case C01600, CERN, 1211 Geneva, Switzerland Received: 12 March 2015 / Accepted: 14 April 2015 / Published online: 1 May 2015 © The Author(s) 2015. This article is published with open access at Springerlink.com Abstract Observable quantities in cosmology are dimen- sionless, and therefore independent of the units in which they are measured. This is true of all physical quantities associ- ated with the primordial perturbations that source cosmic microwave background anisotropies such as their amplitude and spectral properties. However, if one were to try and infer an absolute energy scale for inflation—a priori, one of the more immediate corollaries of detecting primordial tensor modes—one necessarily makes reference to a partic- ular choice of units, the natural choice for which is Planck units. In this note, we discuss various aspects of how infer- ring the energy scale of inflation is complicated by the fact that the effective strength of gravity as seen by inflation- ary quanta necessarily differs from that seen by gravitational experiments at presently accessible scales. The uncertainty in the former relative to the latter has to do with the unknown spectrum of universally coupled particles between laboratory scales and the putative scale of inflation. These intermediate particles could be in hidden as well as visible sectors or could also be associated with Kaluza–Klein resonances associated with a compactification scale below the scale of inflation. We discuss various implications for cosmological observables. quantum corrections effect the effective strength of gravity depending on the characteristic energy of the process probing it.2 Massive particles are particularly interesting for the threshold effects they impart once we start to probe energies above their mass M, i.e. at distances below M−1. This can be understood via a simple thought experiment [5]: consider scattering a test particle off a very heavy point mass. The inverse Fourier transform of the scattering amplitude yields the gravitational potential generated by the source. The effective Planck mass and the scale of inflation Once the inter-particle separation approaches x ∼M−1, M being the mass of some heavy particle, virtual pairs of these parti- cles are created, the positive/ negative energy virtual quanta of which are attracted/ repelled by the source, creating a grav- itational dipole distribution that effectively anti-screens the source, strengthening its gravitational field. Therefore, the strength of gravity is increased by this effective ‘vacuum polarization’ far enough away from the threshold induced by a particle of mass M j that couples to gravity,3 i.e. as we probe increasingly shorter distances x ≪M−1 j . j One can quantitatively understand this effective strength- ening through the computation of the graviton propagator with loops of the massive fields contributing to the gravi- ton self-energy insertions. We trace through the details of this computation in Appendix A following the treatment of [6]; however, a quick understanding of this can be arrived at through the argument presented in [7]. Consider the correc- tion to the graviton propagator induced by loops of various particles—suppressing all index structure, we find that the leading correction will have the form Eur. Phys. J. C (2015) 75:182 DOI 10.1140/epjc/s10052-015-3411-z Regular Article - Theoretical Physics Regular Article - Theoretical Physics 2 See [1,2] for reviews of treating gravity as an effective theory. In the following discussion, we steer clear of potentially problematic aspects of the notion of running gravitational couplings [3,4] by focusing only on physically observable quantities such as amplitudes and cross sec- tions. b e-mail: subodh.patil@cern.ch a e-mail: Ignatios.Antoniadis@cpht.polytechnique.fr b 3 This is true regardless of whether these massive particles couple directly to the sector that contains the probe particle (e.g. the Standard Model) or not. 2 See [1,2] for reviews of treating gravity as an effective theory. In the following discussion, we steer clear of potentially problematic aspects of the notion of running gravitational couplings [3,4] by focusing only on physically observable quantities such as amplitudes and cross sec- tions. 3 This is true regardless of whether these massive particles couple directly to the sector that contains the probe particle (e.g. the Standard Model) or not. a e-mail: Ignatios.Antoniadis@cpht.polytechnique.fr b e-mail: subodh.patil@cern.ch 4 And is thus unitarized by the appearance of new degrees of freedom at M∗∗from some UV completion, such as string theory. 5 We are grateful to Sergey Sibiryakov for discussions concerning this point. 1 Preliminaries However, when one tries to infer an absolute energy scale for inflation, one finds that it is undetermined commensurate with (5) up to the unknown spectrum of uni- versally coupled species between laboratory scales and the inflationary scale, the details of which we elaborate upon in the following. In what follows, we work out the consequences of this scale dependence of the strength of gravity for inferring various quantities during inflation, which we take to be driven by a single field for economy of discussion and because the data does not compel us to consider otherwise [11,12].6 As is to be expected, all dimensionless observables, such as the amplitude and spectral properties of the perturbations, are unaffected by the changing strength of gravity at inflation- ary energies. However, when one tries to infer an absolute energy scale for inflation, one finds that it is undetermined commensurate with (5) up to the unknown spectrum of uni- versally coupled species between laboratory scales and the inflationary scale, the details of which we elaborate upon in the following. ⟨T (−p)T (p)⟩∼ c 16π2 p4 log p2 μ2 (2) (2) where μ is some arbitrary renormalization scale, and where c is the central charge of the theory that effectively counts the number of degrees of freedom running through the loop, i.e. where μ is some arbitrary renormalization scale, and where c is the central charge of the theory that effectively counts the number of degrees of freedom running through the loop, i.e. c ≈N [7]. As an illustrative example, in four-dimensional Minkowski space, the central charge of a non-interacting the- ory containing Nφ scalars, Nψ Dirac fermions and NV vector bosons is given by [8–10]: c ≈N [7]. As an illustrative example, in four-dimensional Minkowski space, the central charge of a non-interacting the- ory containing Nφ scalars, Nψ Dirac fermions and NV vector bosons is given by [8–10]: c := N = 4 3 Nφ + 8Nψ + 16NV . (3) (3) Comparison with the free propagator 1/(p2M2 pl) implies that the perturbative expansion fails at the scale p = M∗∗, where M∗∗∼Mpl  N , (4) (4) 8 The comoving (or unitary) gauge is defined as the foliation where inflaton field fluctuations have been locally gauged away. In words, it is the time slicing where the inflaton itself is the clock. 7 In what follows, we assume that all of the extra species have suffi- ciently suppressed couplings to the inflaton during inflation (e.g. either through derivative couplings or as Planck suppressed interactions), so that isocurvature perturbations are not significantly generated. This is trivially true for hidden sector fields. 2 The scale of inflation According to the inflationary paradigm, the primordial per- turbations observed in the CMB were created at horizon crossing during the quasi-de Sitter phase of early acceler- ated expansion sourced by the inflaton field. Therefore, all quantities that enter calculations of primordial correlation functions (which we subsequently relate to observables in the CMB) refer to quantities at the scale at which inflation occurred. We denote all quantities measured at the scale of inflation with a starred subscript. The dominant contribution to the temperature anisotropies comes from adiabatic pertur- bations7 sourced by the comoving curvature perturbation R, defined as the conformal factor of the 3-metric hi j in comov- ing gauge8: which is when gravity becomes strongly coupled. That is, M∗∗is the effective cut-off of gravity at short distances. How- ever, one must take care to distinguish between the scale of strong gravity M∗∗from the strength of gravity at a particu- lar energy scale, which we denote M∗. Whereas the former sets the scale at which unitarity starts to break down in the effective theory,4 the latter determines the strength of grav- itationally mediated processes at any particular scale below M∗∗. As detailed in Appendix B, although every massive speciescontributestoloweringthescaleatwhichstronggrav- ity effects become important, one has to distinguish between species that universally couple directly to the matter energy- momentum tensor at tree level [such as massive Kaluza– Klein (KK) gravitons, non-minimally coupled scalars, and U(1) gauge fields] from ordinary four-dimensional fields that couple at one loop, in terms of their effects on the strength of gravity as one crosses the threshold set by the mass M of the species, but are still far below the scale M∗∗. Whereas the former immediately affect the strength of gravity, the latter do not make their effects known until very close to M∗∗.5 Therefore, for the rest of our discussion we denote use N as hi j(t, x) = a2(t)e2R(t,x) ˆhi j; ˆhi j := exp[γi j] (6) (6) 6 See also the related studies [13,14], which explore how additional fields and non-adiabaticity further complicates inferring the scale of inflation from the detection of primordial tensors. 6 See also the related studies [13,14], which explore how additional fields and non-adiabaticity further complicates inferring the scale of inflation from the detection of primordial tensors. 7 In what follows, we assume that all of the extra species have suffi- ciently suppressed couplings to the inflaton during inflation (e.g. 6 See also the related studies [13,14], which explore how additional fields and non-adiabaticity further complicates inferring the scale of inflation from the detection of primordial tensors. 1 Preliminaries The strength of the gravitational force depends on the scale at which it is measured.1 At laboratory scales, the strength of gravity is characterized by the reduced Planck mass Mpl = 2.435 × 1018 GeV which determines Newton’s con- stant G N = M−2 pl . However, like all other interactions, 1 E.g. via Cavendish type experiments where we have precise knowl- edge of two masses (one of which could be a test mass), or equivalently in principle through gravitational scattering experiments. 3 This is true regardless of whether these massive particles couple directly to the sector that contains the probe particle (e.g. the Standard Model) or not. 12 3 182 Page 2 of 12 182 Page 2 of 12 Eur. Phys. J. C (2015) 75 :182 1 M4 pl 1 p2 ⟨T (−p)T (p)⟩1 p2 , (1) a shorthand for the weighted index that effectively counts the number of universally coupled degrees of freedom below the energyscaleof interest correspondingtothegeneralizationof (3), such that the strength of gravity at that scale, henceforth taken to be the scale of inflation, is given by (1) where T (p)schematicallyrepresentsthetotal energymomen- tum tensor of the theory. We further consider the limit where the external momentum satisfies p2 ≫M2 where M2 is the mass of the heaviest particle that can run through the loops. In this limit, the theory becomes conformal, which fixes the finite part of the loop integral to be where T (p)schematicallyrepresentsthetotal energymomen- tum tensor of the theory. We further consider the limit where the external momentum satisfies p2 ≫M2 where M2 is the mass of the heaviest particle that can run through the loops. In this limit, the theory becomes conformal, which fixes the finite part of the loop integral to be M∗∼Mpl √ N . (5) (5) In what follows, we work out the consequences of this scale dependence of the strength of gravity for inferring various quantities during inflation, which we take to be driven by a single field for economy of discussion and because the data does not compel us to consider otherwise [11,12].6 As is to be expected, all dimensionless observables, such as the amplitude and spectral properties of the perturbations, are unaffected by the changing strength of gravity at inflation- ary energies. fields and non-adiabaticity further complicates inferring the scale of inflation from the detection of primordial tensors. 7 In what follows, we assume that all of the extra species have suffi- ciently suppressed couplings to the inflaton during inflation (e.g. either through derivative couplings or as Planck suppressed interactions), so that isocurvature perturbations are not significantly generated. This is trivially true for hidden sector fields. 8 The comoving (or unitary) gauge is defined as the foliation where inflaton field fluctuations have been locally gauged away. In words, it is the time slicing where the inflaton itself is the clock. 2 The scale of inflation (8) (8) Taking the ratio of the above with (7), we find the tensor to scalar ratio Taking the ratio of the above with (7), we find the tensor to scalar ratio V 1/4 ∗ ∼r1/4 ∗ √ N 3.28 × 1016 GeV. (13) (13) r∗:= Pγ PR = 16ϵ∗. (9) (9) Presuming a range for r∗such that 0.001 ≲r∗≲0.1, it is amusing to infer that in order to have an energy scale of inflation around 10 TeV, one requires N ∼1026 univer- sally coupled species directly to the matter stress-tensor with masses less than that energy. Presumably any such particles in the visible sector would have started to appear in collider events accessed at the LHC. Note that as one lowers the scale of strong gravity, the maximum reheating temperature Ti is necessarily lowered as well, since it cannot be higher than (13). Conservatively, Ti cannot be too far below the TeV scale without spoiling the standard scenarios of big bang cosmology—in particular, mechanisms for leptogenesis and baryogenesis which can occur no lower than the electroweak scale [18,19]. Therefore any determination of r∗, either through direct mea- surements of the stochastic background of primordial gravi- tational waves or through their secondary effects on the polar- ization of the CMB [15–17] allows us in principle to fix the scale of inflation. Specifically, by re-expressing (7) as Presuming a range for r∗such that 0.001 ≲r∗≲0.1, it is amusing to infer that in order to have an energy scale of inflation around 10 TeV, one requires N ∼1026 univer- sally coupled species directly to the matter stress-tensor with masses less than that energy. Presumably any such particles in the visible sector would have started to appear in collider events accessed at the LHC. Note that as one lowers the scale of strong gravity, the maximum reheating temperature Ti is necessarily lowered as well, since it cannot be higher than (13). Conservatively, Ti cannot be too far below the TeV scale without spoiling the standard scenarios of big bang cosmology—in particular, mechanisms for leptogenesis and baryogenesis which can occur no lower than the electroweak scale [18,19]. Therefore any determination of r∗, either through direct mea- surements of the stochastic background of primordial gravi- tational waves or through their secondary effects on the polar- ization of the CMB [15–17] allows us in principle to fix the scale of inflation. 9 So that (12) denotes a tree level relation. 10 In addition to quantum corrections to the effective action itself being set by the ratio H2 ∗/M2 ∗. 11 Note that this would require a desert not only in the sector in which the standard model resides, but in all other hidden sectors as well. 2 The scale of inflation either through derivative couplings or as Planck suppressed interactions), so that isocurvature perturbations are not significantly generated. This is trivially true for hidden sector fields. 8 The comoving (or unitary) gauge is defined as the foliation where inflaton field fluctuations have been locally gauged away. In words, it is the time slicing where the inflaton itself is the clock. 12 3 Page 3 of 12 182 Eur. Phys. J. C (2015) 75 :182 Page 3 of 12 182 182 the energy scale of inflation, defined as V 1/4 ∗ . The reason for this distinction is that H∗defines (among other things) the scale above or below which massive particles respond to the background expansion irrespective of any direct couplings to the inflaton10 whereas V 1/4 ∗ defines the physical energy density in the inflaton field as seen by particles that couple to it, such as all decay products produced in (p)reheating. We take this distinction for granted in what follows. with ∂iγi j = γii = 0 defining transverse traceless gravi- ton perturbations. The temperature anisotropies are charac- terized by the dimensionless power spectrum for R, whose amplitude is given by PR := H2 ∗ 8π2M2∗ϵ∗ = A × 10−10, (7) (7) where ϵ∗:= −˙H∗/H2 ∗, H∗being the Hubble factor during inflation. Given that R is conserved on super-horizon scales (in the absence of entropy perturbations), this immediately relates to the amplitude of the late time CMB anisotropies, which fixes A ∼22.15 [11]. The tensor anisotropies are characterized by the tensor power spectrum where ϵ∗:= −˙H∗/H2 ∗, H∗being the Hubble factor during inflation. Given that R is conserved on super-horizon scales (in the absence of entropy perturbations), this immediately relates to the amplitude of the late time CMB anisotropies, which fixes A ∼22.15 [11]. The tensor anisotropies are characterized by the tensor power spectrum In a universe where there is a true desert between labo- ratory scales and the onset of inflation,11 M∗= Mpl. How- ever, given our ignorance of particle physics between collider scales and the scale of inflation in addition to all hidden sec- tor physics, M∗is in general lower than Mpl according to (12), where N represents a model dependent parameter that obscures our ability to infer the actual energy scale of infla- tion from observations of CMB temperature and polarization anisotropies. That is, Pγ := 2 H2 ∗ π2M2∗ . 11 Note that this would require a desert not only in the sector in which the standard model resides, but in all other hidden sectors as well. 10 In addition to quantum corrections to the effective action itself being set by the ratio H2 ∗/M2 ∗. 12 We presume for simplicity that there are no further hierarchies between the extra dimensions. Note that μc can be in general (hier- archically) different from the actual compactification scale associated to their inverse size. 13 This will remain true for more general compactifications (up to fac- tors of order unity) provided again that there are no further hierarchies among the extra dimensions. 2 The scale of inflation Specifically, by re-expressing (7) as H∗= M∗  π2Ar∗ 2 · 1010 1/2 , (10) (10) one can determine the value of the potential during inflation in the slow roll approximation: V 1/4 ∗ = M∗ 3π2Ar∗ 2 · 1010 1/4 . (11) (11) We see that any measurements of r∗and A determines the scale of inflation up to our ignorance of the effective strength of gravity at the scale H∗, given by We see that any measurements of r∗and A determines the scale of inflation up to our ignorance of the effective strength of gravity at the scale H∗, given by We note, as a consistency check on the above considera- tions, that although additional species increase the strength of gravity, the ratio H2 ∗/M2 ∗is independent of N and is fixed by observable quantities as M∗∼Mpl √ N (12) (12) H∗ M∗ =  π2Ar∗ 2 · 1010 1/2 := ϒ = 1.05 √r∗× 10−4. ( where Mpl = 2.435 × 1018 GeV is the reduced Planck mass that defines the strength of gravitational interactions at labo- ratory scale wavelengths and longer. As noted above, N is a weighted index that effectively counts the number of all uni- versally coupled9 species up to the scale H∗—whether they exist in the visible sector or in any hidden sector. Presuming r∗= 0.1, Eq. (11) implies an energy scale for inflation of V 1/4 ∗ = 7.6 × 10−3M∗. (14) where Mpl = 2.435 × 1018 GeV is the reduced Planck mass that defines the strength of gravitational interactions at labo- ratory scale wavelengths and longer. As noted above, N is a weighted index that effectively counts the number of all uni- versally coupled9 species up to the scale H∗—whether they exist in the visible sector or in any hidden sector. Presuming r∗= 0.1, Eq. (11) implies an energy scale for inflation of V 1/4 ∗ = 7.6 × 10−3M∗. Therefore the effects of strong gravity are evidently neg- ligible during inflation even if M∗is much smaller than the macroscopic strength of gravity Mpl. Hence inflationary dynamics,inparticularthedynamicsofadiabaticfluctuations remain weakly coupled independent of N and the usual com- putation of adiabatic correlators can be implemented [20]. In order to keep track of concepts in the discussion to follow, we distinguish between what we henceforth refer to as the scale of inflation—defined as H∗during inflation—and 12 3 182 Page 4 of 12 Eur. 2 The scale of inflation Phys. J. C (2015) 75 :182 3 Extra species as Kaluza–Klein states number of extra massive species is now given by (neglecting factors of order unity): It is an interesting exercise to work out the consequences of extra species associated with the Kaluza–Klein (KK) states of a particular compactification. One of two scenarios are possible—that inflation occurs below (H∗< μc), or above (H∗> μc) the effective compactification scale μc defined as the mass scale associated with the moduli that fix the size of the extra dimensions.12 In the former case, the moduli corre- sponding to the extra dimensions remain fixed at their min- ima during inflation and we have available the usual relation between the fundamental gravity scale M∗∗below the effec- tive compactification scale and the long wavelength strength of gravity (the Planck mass): N = (M∗∗/M)n ≡V∗∗, (18) (18) which corresponds to the number or lattice sites such that the condition  i l2 i M2 ≤M2 ∗∗is satisfied. We note that one could also have inflation happening above the effective com- pactification scale (H∗> μc). In general, this would involve having to track the full dynamics of the moduli fields on their way to stabilization, which does not permit any straightfor- ward generalizations. However, there are certain limits for which the moduli are effectively frozen in spite of not being fixed at the minima of their effective potentials. As discussed in Appendix C, this occurs in the limit where the sum of the inflationary and moduli potentials satisfy an analog of the slow roll conditions. We will presume this to be the case when H∗> μc. Although the discussion to follow presumes H∗< μc, the results generalize straightforwardly were we to replace M∗∗with ¯M∗∗defined as the effective cut-off when the compact dimensions have the (effectively frozen) volume ¯V∗∗during inflation. which corresponds to the number or lattice sites such that the condition  i l2 i M2 ≤M2 ∗∗is satisfied. We note that one could also have inflation happening above the effective com- pactification scale (H∗> μc). In general, this would involve having to track the full dynamics of the moduli fields on their way to stabilization, which does not permit any straightfor- ward generalizations. However, there are certain limits for which the moduli are effectively frozen in spite of not being fixed at the minima of their effective potentials. 3 Extra species as Kaluza–Klein states As discussed in Appendix C, this occurs in the limit where the sum of the inflationary and moduli potentials satisfy an analog of the slow roll conditions. We will presume this to be the case when H∗> μc. Although the discussion to follow presumes H∗< μc, the results generalize straightforwardly were we to replace M∗∗with ¯M∗∗defined as the effective cut-off when the compact dimensions have the (effectively frozen) volume ¯V∗∗during inflation. M D−2 ∗∗ Vn = M2 pl , where Vn is the volume of the compactified sub-manifold [21, 22]. Again, the double asterisked subscript is to differentiate M∗∗from M∗, the strength of gravity at the inflationary scale H∗. In D = 4 + n, this relation becomes M2+n ∗∗Vn = M2 pl. For the example of toroidal compactifications,13 Vn = M−n, so that 3.1 Extra KK species and the scale of inflation M2 ∗∗ Mn ∗∗ Mn := M2 ∗∗V∗∗= M2 pl , (15) (15) During inflation, all masses much lighter than H∗correct the graviton propagator and will contribute towards lowering the effective gravitational cut-off. If furthermore, these states are universally coupled (as are KK gravitons), they will also increase the effective strength of gravity now set by M∗. All heavier KK states do not correct the short range interactions (i.e. they decouple) and can safely be ignored. Therefore N, the number of massive species that correct the strength of gravity, is bounded by n2M2 = m2 n ≪H2 ∗in the case of one extra dimension. Hence where we have defined V∗∗as the volume in units of M∗∗. Comparison with (4) implies where we have defined V∗∗as the volume in units of M∗∗. Comparison with (4) implies N = V∗∗, (16) (16) 4 (P)reheating which depending on the number of extra particles between H∗and M∗∗implies that V 1/4 ∗ can be greater than14 M∗∗(of the same order or an order of magnitude higher for 2 ≤n ≤ 6), even though it is always less than the effective cut-off M∗at the scale H∗through (11). We note that this is never problematic, even though M∗∗is the cut-off induced by the underlying UV completion. This is because we remain in the perturbative regime with respect to corrections from the heavy states that UV complete the theory, which relies on derivatives being suppressed relative to this scale i.e. by the ratio H∗/M∗∗, guaranteed to be less than unity by (26). which depending on the number of extra particles between H∗and M∗∗implies that V 1/4 ∗ can be greater than14 M∗∗(of the same order or an order of magnitude higher for 2 ≤n ≤ 6), even though it is always less than the effective cut-off M∗at the scale H∗through (11). We note that this is never problematic, even though M∗∗is the cut-off induced by the underlying UV completion. This is because we remain in the perturbative regime with respect to corrections from the heavy states that UV complete the theory, which relies on derivatives being suppressed relative to this scale i.e. by the ratio H∗/M∗∗, guaranteed to be less than unity by (26). The big bang begins shortly after inflation ends. The mech- anism through which the inflaton dumps its energy density into the material content of the universe is known as reheating if this process occurs in thermal equilibrium, and preheating otherwise. During preheating, parametric resonance during the inflaton’s final oscillations about its minimum results in bursts of particle production for any massive fields coupled to it (see [28] and references therein for details as regards the points discussed here). The latter is a very out of equi- librium process and requires a subsequent period of ther- malization. Since the primary mechanisms for generating parametric resonance have a purely particle physics origin, gravitational effects do not play any significant role and the mechanisms for preheating proceed as they do in the stan- dard context regardless of the value of M∗. The exception being the special case of ‘geometric preheating’, wherein the inflaton φ couples very weakly or has no direct couplings to a non-minimally coupled field χ with a non-minimal cou- pling parameter ξ. 14 For a large enough ratio N/N—guaranteed for n ≥2 through the hierarchy implied by (26). 3.2 Large number of species in string theory (24) (24) Now using (10), (11), and (14), we have Now using (10), (11), and (14), we have V 1/4 ∗ ≃31/4 ϒ−1/2 H∗, (25) (25) so that equivalently Apart from the possibility of having light KK modes of large extra dimensions, the fundamental gravity scale can be lowered due to a large number of species from hidden sectors (even coupled gravitationally to the Standard Model), or even from string excitations whose number increase exponentially with their mass. In the later case, the effective number of particle species which are not broad resonances, with width less than their mass is N ≃1/g2 s [23–27]. H∗≃M∗∗ϒ2/(n+2) . (26) (26) It follows that H∗is one to three orders of magnitude below the fundamental gravity scale M∗∗for the range 0.001 ≲ r∗≲0.1. The ratio H∗/M∗is of course fixed by (14). Fur- thermore, we note that from (25) the energy scale of inflation is related to the scale M∗∗by It follows that H∗is one to three orders of magnitude below the fundamental gravity scale M∗∗for the range 0.001 ≲ r∗≲0.1. The ratio H∗/M∗is of course fixed by (14). Fur- thermore, we note that from (25) the energy scale of inflation is related to the scale M∗∗by V 1/4 ∗ ≃31/4ϒ2/(n+2)−1/2M∗∗, (27) (27) (16) N = V∗∗, where we again distinguish N from N, the former of course being the total number of species up to the effective cut-off whereas the latter is the total number of species up to the scale H∗. To see this another way, we note that we could also have arrived at (16) through more direct reasoning. Consider first for simplicity a tower of KK states on a single flat, compact dimension of radius R = M−1. The KK modes are character- ized by their quantized momenta along the extra dimension, resulting in a tower of masses: N ≲H∗ M . (19) N ≲H∗ M . (19) Imagine we were to saturate this bound, m2 l = l2M2 l = 0, ±1, . . . (17) N ≈H∗ M∗ M∗ M ≈ϒ M∗ M ≈1.05 √r∗× 10−4 M∗ M (20) (17) (20) Clearly, the maximum number of resonances there can be before one hits the scale of strong gravity is set by the highest permissible momentum quantum number l2 maxM2 = M2 ∗∗. Hence with one extra dimension, the number of extra massive species is given by N = M∗∗/M. With n extra dimensions, we have m2 {li} =  i l2 i M2 with i running from 1 to n. The Clearly, the maximum number of resonances there can be before one hits the scale of strong gravity is set by the highest permissible momentum quantum number l2 maxM2 = M2 ∗∗. Hence with one extra dimension, the number of extra massive species is given by N = M∗∗/M. With n extra dimensions, we have m2 {li} =  i l2 i M2 with i running from 1 to n. The where the latter follows from the observationally determined quantity (14). For n extra dimensions, the number of massive species with masses less than Hubble will be given by N ≈  H∗ M n ≈  H∗ M∗ n  M∗ M n ≈ϒn  M∗ M n . (21) Furthermore, given that N = (M∗∗/M)n = (M∗∗/H∗)n (H∗/M)n, we arrive at the relation between the number of species that lower the effective cut-off during inflation N with N: N = N  H∗ M∗∗ n ≡V∗∗  H∗ M∗∗ n . (22) (22) 3 Eur. Phys. J. C (2015) 75 :182 Page 5 of 12 182 182 3.2 Large number of species in string theory 3.2 Large number of species in string theory As we shall see shortly, since H∗/M∗∗< 1 we have N < N, implying that in general we must also have M∗∗< M∗as one can only cross additional mass thresholds from the scale of inflation to the scale of strong gravity. We note that (21) immediately translates the uncertainty in the energy scale of inflation in terms of an intermediate compactification scale M in units of M∗through (13) and (14): In the framework of string theory, the effective higher- dimensional Planck mass M∗∗is proportional to the funda- mental string scale Ms, and Eq. (B18) becomes M2 pl = 1 g2s M2 s V∗∗, (28) (28) V 1/4 ∗ ≃31/4M∗γ 1/2 = 31/4  M ϒ M∗ n/2 ϒ1/2Mpl, (23) (23) where gs is the string coupling and the internal volume V∗∗ is now given in string units. The corresponding number of species is then N = V∗∗/g2 s , which is fixed by the number of KK modes with mass lower than Ms for gs ≃O(1), as is the case of D-branes where gs is given by the gauge coupling. Again, we distinguish N, the number of KK modes below the effective cut-off around the compactification scale from N, the number of states with masses less than H∗. Note that the lower bound for the string scale of few TeV is consistent with a reheating temperature around above the electroweak scale (see discussion at the end of the previous section). where gs is the string coupling and the internal volume V∗∗ is now given in string units. The corresponding number of species is then N = V∗∗/g2 s , which is fixed by the number of KK modes with mass lower than Ms for gs ≃O(1), as is the case of D-branes where gs is given by the gauge coupling. Again, we distinguish N, the number of KK modes below the effective cut-off around the compactification scale from N, the number of states with masses less than H∗. Note that the lower bound for the string scale of few TeV is consistent with a reheating temperature around above the electroweak scale (see discussion at the end of the previous section). or equivalently or equivalently V 1/4 ∗ ≃31/4 M∗∗ Mpl  M∗∗ H∗ n/2 ϒ1/2 Mpl. 15 Also in the multi-field context are the references [30–32]. In these studies, no species below the scale of inflation were considered, and so the strength of gravity at H∗was taken to be the usual Mpl. 5 Discussion (29) It is commonlypresumedthat detectionof aprimordial tensor mode background would allow us to determine the (energy) scale of inflation in the context of single field inflation. The purpose of this note was to highlight the fact that, instead, one can only infer the (energy) scale of inflation from obser- vations up to our ignorance of the scale M∗= Mpl/ √ N, the precise value for which depends on the spectrum of all uni- versally coupled species with masses up to H∗, and for which field content of the standard model alone suggests an N dif- ferentfromonethoughstilloforderunity.Theseobservations raise the possibility that the energy scale for inflation can be significantly lowered by the presence of many gravitation- ally coupled species, an observation that has a particularly natural realization in extra-dimensional scenarios, although is equally pertinent in a four-dimensional context. As the inflaton oscillates around its minimum, the scalar cur- vature R = 12H2 + 2 ˙H oscillates as well. Upon time aver- aging we have the relation ⟨m2 φφ2⟩= ⟨˙φ2⟩, which implies R ∼m2 φφ2/M2 ∗, inducing an effective coupling to φ and which can produce parametric resonance for large enough ξ. By enhancing the strength of gravity, one enhances the effects of the geometric coupling term and thus widening the bands in which the Floquet index [28] is positive, assisting parametric resonance non-linearly the more M∗is reduced. Reheating on the other hand is an equilibrium process that produces quanta of matter fields through one body decays such as φ →χχ or φ →¯ψψ where χ, ψ are scalar and fermionic quanta, respectively. The interactions that can gen- erate such decays are Lφχχ = μφχ2 or Lφ ¯ψψ = yφ ¯ψψ, where μ has dimensions of mass and y is dimensionless. In the limit m2 φ ≫m2 ψ, m2 χ the decay rates can be estimated as [28]: Acknowledgments We wish to thank Robert Brandenberger, Cliff Burgess, Sergey Sibiryakov, and Michael Trott for many informative discussions and comments on the draft. During an earlier portion of this collaboration, SP was supported by a Marie Curie Intra-European Fel- lowship of the European Community’s 7th Framework Program under Contract No. PIEF-GA-2011-302817. φ→χχ = μ2 8πmφ , (30) φ→¯ψψ = y2mφ 8π . 5 Discussion (31) (30) Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecomm ons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. Funded by SCOAP3. (31) Thermal equilibrium requires interactions to be efficient enough to equipartition all available states in phase space. In an expanding universe this necessitates tot > H∗. Hence, the maximum temperature reheating can occur at is implied by the condition tot = H∗=  ρ/(3M2∗). Assuming g∗rel- ativistic species in thermal equilibrium after reheating, we have Thermal equilibrium requires interactions to be efficient enough to equipartition all available states in phase space. In an expanding universe this necessitates tot > H∗. Hence, the maximum temperature reheating can occur at is implied by the condition tot = H∗=  ρ/(3M2∗). Assuming g∗rel- ativistic species in thermal equilibrium after reheating, we have 16 As we shall see shortly, the bare cosmological constant term is neces- sitated to ensure the satisfaction of the Slavnov–Taylor identities when expanding around flat space. 4 (P)reheating For this scenario, we first observe that on a background sourced by φ at the end of inflation, the mode functions for χ satisfy Furthermore, we stress that although extra dimensions (compactified at a scale below that of inflation) provide a natural context for the appearance of extra massive species, the relation (13) is also valid in a strictly four-dimensional context and illustrates an irreducible uncertainty in our abil- ity to infer a scale for inflation given our lack of knowledge of particle physics from collider energies up to the energy scale of inflation. 12 3 3 Eur. Phys. J. C (2015) 75 :182 182 Page 6 of 12 182 Page 6 of 1 ¨χk + 3H ˙χk + k2 a2 + ξ R  χk = 0. (29) 17 Furthermore, the addition of the bare cosmological term in (A1) was necessitated by the non-vanishing tadpole in Fig. 1, which we have to cancel in order to consistently expand around flat space—the remaining diagrams thus resulting in (A11)–(A13). Appendix A: Loop corrections to the graviton propagator C (2015) 75 :182 and to define the graviton ϕμν (note the departure from the which evaluates to and to define the graviton ϕμν (note the departure from the which evaluates to the departure from the which evaluates to and to define the graviton ϕμν (note the departure from the which evaluates to which evaluates to and to define the graviton ϕμν (note the departure from the usual definition) as and to define the graviton ϕμν (note the departure from the usual definition) as g ϕ ( p sual definition) as κ2   Qνσμλ = κ2 p4  T1  pν pσ pμ pλ −p2δμλ pν pσ −p2δνσ pμ pλ + p4δνσδμλ  +T3  p4δμνδσλ + p4δνλδσμ −2p4δνσδμλ + 2p2δμλ pν pσ + 2p2δνσ pμ pλ −4p2 p(νδσ)(μ pλ)  (A11) usual definition) as ˜gμν = δμν + κϕμν (A3) so that √g = det[gμν]1/(d−2) = exp 1 d −2Tr ln δμν + κϕμν  . (A4) Qνσμλ = κ2 p4  T1  pν pσ pμ pλ −p2δμλ pν pσ −p2δνσ pμ pλ + p4δνσδμλ  +T3  p4δμνδσλ + p4δνλδσμ −2p4δνσδμλ + 2p2δμλ pν pσ + 2p2δνσ pμ pλ −4p2 p(νδσ)(μ pλ)  (A11) ˜gμν = δμν + κϕμν (A3) so that ˜gμν = δμν + κϕμν so that so that √g = det[gμν]1/(d−2) = exp 1 d −2Tr ln δμν + κϕμν  . Appendix A: Loop corrections to the graviton propagator As a concrete example to illustrate how gravity can become more strongly coupled at lower energies due to loops of mat- terfields,wereproducetheoneloopcorrectiontothegraviton propagator on a flat Euclidean spacetime due to loops of a massive scalar field, as calculated by Capper [6] (see also ref- erences therein). Beginning with the matter sector action16 ρ = g∗π2 30 T 4, (32) (32) and therefore Ti =  90 g∗π2 1/4  totM∗∼  90 g∗π2 1/4  totMpl N 1/4 . (33) (33) S = −2 κ2  d4x√g (R −2) −1 2  d4x√g gμν∂μϕ∂νϕ + m2ϕ2 . (A1) That is, the maximum temperature that can reheat is corre- spondingly reduced, consistent with our discussion in Sect. 3. We mention in closing that there are rich phenomenologi- cal possibilities in considering hidden sector fields produced in reheating as possible dark matter candidates in scenarios with many extra species, certain aspects of which have been studied in the multi-field inflationary context in [29].15 That is, the maximum temperature that can reheat is corre- spondingly reduced, consistent with our discussion in Sect. That is, the maximum temperature that can reheat is corre- spondingly reduced, consistent with our discussion in Sect. 3. We mention in closing that there are rich phenomenologi- cal possibilities in considering hidden sector fields produced in reheating as possible dark matter candidates in scenarios with many extra species, certain aspects of which have been studied in the multi-field inflationary context in [29].15 (A1) It is particularly handy to define the tensor density ˜gμν = √ggμν, (A2) (A2) ˜gμν = √ggμν, 16 As we shall see shortly, the bare cosmological constant term is neces- sitated to ensure the satisfaction of the Slavnov–Taylor identities when expanding around flat space. 12 3 Page 7 of 12 182 Eur. Phys. J. Appendix A: Loop corrections to the graviton propagator (A4) (A11) The matter Lagrangian can be expanded in powers of κ as The matter Lagrangian can be expanded in powers of κ as where 2ω = d is the parameter through which we implement dimensional regularization, μ is an arbitrary renormalization scale, and where L =  k=2 κk−2Lk (A5) with L =  k=2 κk−2Lk (A5) (A5) T1 = m2(ω−2) μ2(2−ω) 2(4π)ω (2 −ω) × 1 3 3F2  2 −ω, 1, 3; 2, 5/2; −p2 4m2  −1 2 3F2  2 −ω, 4, 1; 5/2, 3, −p2 4m2  +1 5 3F2  2 −ω, 5, 1; 3, 7/2, −p2 4m2  , (A12) with L3 = −1 2ϕμν∂μϕ∂νϕ + m2 2 ϕ2ϕμ μ d −2 (A6) and (A6) and L4 = m2ϕ2 d −2 −ϕμνϕμν + ϕμ μϕν ν d −2  , (A7) (A12) (A7) which implies the cubic and quartic interaction vertices Vαβ and Uαβ δγ : T3 = m2ω μ2(2−ω) 8(4π)ω (2 −ω) p4(ω −1) 1 1 −ω + 1 ω 2F1 ×  −ω, 1; 3/2; −p2 4m2  . (A13) Vα,β(p, k1, k2) = −k1(μk2ν) + m2δμν n −2 ; Uαβ γ δ(p1, p2, k1, k2) = m2 n−2 −δα(γ δβ(δ)+ δαβδγ δ n−2  . (A8) Vα,β(p, k1, k2) = −k1(μk2ν) + m2δμν n −2 ; Uαβ γ δ(p1, p2, k1, k2) = m2 n−2 −δα(γ δβ(δ)+ δαβδγ δ n−2  . (A8) Supplemented with the massive scalar and graviton propa- t (th l tt bt i d i th d D d [6]) Vα,β(p, k1, k2) = −k1(μk2ν) + m2δμν n −2 ; Uαβ γ δ(p1, p2, k1, k2) = m2 n−2 −δα(γ δβ(δ)+ δαβδγ δ n−2  . (A8) Supplemented with the massive scalar and graviton propa- gators (the latter obtained in the de Donder gauge [6]), (A13) Some remarks are in order at this stage. There are five possi- ble terms with the right tensor structure that could contribute to Tαβθτ, three of whose coefficients can be eliminated by repeated applications of the Ward identities. Doing so results in (A11),17 for which it is easily verified that pν Qνσμλ = 0. Having dimensionally regularized the loop integrals, we find the usual 1/(2 −ω) poles which require appropriate coun- terterms to subtract the divergences. Appendix B: Note on universally coupled massive species so that We wish to demonstrate that, although all massive species contribute to lowering the effective scale of strong gravity, the threshold effects imparted by universally coupled species (e.g. massive KK gravitons) differs qualitatively from that of massive, non-universally coupled species. Whereas the for- mer changes the strength of gravity by an order one effect as you cross the threshold M, the latter only changes the strength of gravity by a factor of M2/M2 pl, even as both con- tribute equally to lowering the scale at which strong gravity effects become important. This can be seen by considering the correction to the graviton propagator from loops of N ordinary massive fields in the limit of high momentum trans- fer p2 ≫M2: ϕμν(x) = 2πm  dD−1 p (2π)D ei ⃗p·⃗x ×  D 00 μν (p) + Q 00 μν (p)  |p0=0. (B5) (B5) One can revert to the traditional dimensionless metric per- turbation hμν via the relation (A2), hμν = −1 Mpl  ϕμν − ϕλ λ D −2δμν  . (B6) (B6) Ignoring the second term and using the expression for the propagator in the de Donder gauge Dαβ μν = 1 2p2 δαμδβν + δανδβμ −δαβδμν 1 M2 pl p2 + 1 M4 pl p4 Np4 16π2 log p2/μ2 + · · · (B1) (B1) we find ϕi j = −m 8πr δi j, ϕ00 = m 8πr , (B7) (B7) Repeated insertions of self-energy diagrams would result in a geometric series in the above of which we can compute the (leading log) resummed propagator: whichthrough(B6)impliestheusualNewtonpotential.From (A11) to (A13) the one loop correction results in three pos- sible finite contributions to the integrand (suppressing tensor structure and factors of order unity), 1 M2 pl p2 1 −Np2 M2 pl log p2/μ2 . (B2) (B2) 16π2∥Q∥∼ 1 M2 pl log M2/μ2 + 1 ⃗p2 M2 M2 pl log M2/μ2 + M2 ⃗p4 M2 M2 pl log M2/μ2 . (B8) Clearly from (B1) we can infer the usual scale of strong grav- ity M∗∗= Mpl/ √ N, however, if we wanted to interpret (B2) as a strengthening of gravity as you cross the mass threshold M, we see that the effect is not significant until you come very close to M∗∗. That is, in the regime M2 ≪p2 ≪M2 pl/N, the usual Newton’s force would result with G N = M−2 pl . Appendix A: Loop corrections to the graviton propagator These are given (in Lorentzian signature) as Supplemented with the massive scalar and graviton propa- gators (the latter obtained in the de Donder gauge [6]), Lc.t. = − √−g 16π2 1 (2 −ω) m4 4 + m2 12 R + 1 120 R2 2 + Rμν Rμν  . (A14) Supplemented with the massive scalar and graviton propa- gators (the latter obtained in the de Donder gauge [6]), D(p) = −1 p2 + m2 ; Dαβ μν = 1 2p2 δαμδβν + δανδβμ −δαβδμν , (A9) (A14) Given the asymptotic behavior of the hypergeometric and Gamma functions, it is straightforward to evaluate the remaining (finite) part of Qνσμλ(p) in the limit p2 ≫m2, where we find (suppressing tensor structure), the expected (A9) one can sum up all the self-energy diagrams that contribute to the one loop corrected graviton propagator up to order κ2: Formally,theloopcorrectedpropagator Qνσμλ isobtained by inserting the sum of all self-energy diagrams: Qνσμλ = κ2D αβ νσ Tαβθτ Dθτ μλ, (A10) (A10) 12 3 Eur. Phys. J. C (2015) 75 :182 182 Page 8 of 12 Fig. 1 Diagrams contributing to the one loop correction to the graviton propagator Fig. 1 Diagrams contributing to the one loop correction to the graviton propagator ϕμν(x)=  dD p (2π)D/2 eip·x  D λβ μν (p)+Q λβ μν (p)  Tλβ(p). (B3) conformal limit for N minimally coupled massive scalars [cf. the result of (2) plugged into (A10) and recalling that the usual definition of the metric perturbation hμν := κϕμν] (B3) Consider the energy-momentum tensor of a point mass at rest, given by Consider the energy-momentum tensor of a point mass at rest, given by (A15) Tλβ(x) = mδD−1(⃗x)δ0 λδ0 β; Tλβ(p) = 2πm (2π)D/2 δ(p0)δ0 λδ0 β, (B4) (B4) Appendix B: Note on universally coupled massive species 3 Correction to the gravitational interaction between conserved sources from crossing a massive KK graviton ϕαβ so that above the effective Higgs mass m H, in addition to the usual massless graviton exchange, one mediates an extra gravitational strength force, 1 M2 pl p2 → 1 M2 pl p2 + g2 i M2 pl(p2 + m2 H), (B13) with g2 i := c2 i v2/M2 pl. (B14) 1 M2 pl p2 → 1 M2 pl p2 + g2 i M2 pl(p2 + m2 H), (B13) with (B13) Fig. 3 Correction to the gravitational interaction between conserved sources from crossing a massive KK graviton ϕαβ g2 i := c2 i v2/M2 pl. g2 i := c2 i v2/M2 pl. g2 i := c2 i v2/M2 pl. (B14) (B14) diagrams of massive particles vanish in the long wavelength limit). Clearly the latter two terms have contributions that are M2/M2 pl suppressed as per the usual expectation [1,2]. Therefore crossing any particular threshold scale M does not result in a significant strengthening of gravity around that scale, whose summed effects accumulate only close to the scale M∗∗as per our discussion around (B2). Just as in the case for massive KK gravitons, one finds that in the regime m2 H ≪p2 ≪M2 pl the effective strength of gravity is enhanced as Just as in the case for massive KK gravitons, one finds that in the regime m2 H ≪p2 ≪M2 pl the effective strength of gravity is enhanced as M2 pl → M2 pl 1 +  i g2 i . (B15) (B15) The situation for massive KK gravitons is markedly dif- ferent, however, as these resonances couple universally to all conserved sources and can therefore correct their grav- itational interactions at tree level through the diagrams in Fig. 3. We realize that perhaps this should not be too surprising, as one can always field redefine the operators (B11) via the trace of the (two derivative) background equations of motion [33] R = −T μ μ /M2 pl so that the effective interactions are equivalent to Let us say there were n KK resonances with mass M, then it is straightforward to calculate the correction to the gravitational interaction, Leff ∼c{1,2}H†H R. Appendix B: Note on universally coupled massive species This can also be appreciated by directly computing the one loop corrected Newton’s potential between two conserved sources. Using (A11)–(A13), we can compute the gravita- tional field generated by the source Tλβ given by (in the notation of Appendix A) Clearly from (B1) we can infer the usual scale of strong grav- ity M∗∗= Mpl/ √ N, however, if we wanted to interpret (B2) as a strengthening of gravity as you cross the mass threshold M, we see that the effect is not significant until you come very close to M∗∗. That is, in the regime M2 ≪p2 ≪M2 pl/N, 2 (B8) The first two terms contribute a contact (delta function) term and a correction to the usual Newton potential, respectively. the usual Newton’s force would result with G N = M−2 pl . This can also be appreciated by directly computing the one loop corrected Newton’s potential between two conserved sources. Using (A11)–(A13), we can compute the gravita- tional field generated by the source Tλβ given by (in the notation of Appendix A) The third term contributes linear and logarithmic corrections that depend on r M, which are only to be understood in the regime where they are small corrections that get completed by higher order terms in the perturbative expansion such that the total amplitude satisfies the usual decoupling require- ments (i.e. that the corrections from insertion of self-energy 123 Eur. Phys. J. C (2015) 75 :182 Page 9 of 12 182 Page 9 of 12 182 tational strength can also be generated from universally cou- pled species such as the Higgs through higher-dimensional operators of the form tational strength can also be generated from universally cou- pled species such as the Higgs through higher-dimensional operators of the form Leff ∼c1 H†H M2 pl ∂μϕ∂μϕ+c2 H†H M2 pl ¯ψ /∂ψ ∼c{1,2} H†H M2 pl T μ μ , (B11) (B11) where the ci are generic Wilson coefficients. Expanding the singlet operator H†H around some vev v as H†H = v2 + 2vh generates a vertex that contributes another channel to the diagram Fig. 3, Fig. 2 Correction to the gravitational interaction between conserved sources (denoted by a double line) from crossing the mass threshold of a massive particle Leff ∼ci v h M2 pl T μ μ , (B12) (B12) Fig. 18 Order unity non-minimal couplings will generically be generated through renormalization group (RG) flow for the singlet component of the Higgs and any other massive scalars present in the early universe [34]. 19 In full generality we allow for the generation of a non-trivial the adiabatic sound speed cs < 1 as well as higher spatial derivative terms from the curvature squared corrections. Appendix B: Note on universally coupled massive species (B16) (B16) Therefore we see that it is not just the Higgs, but any non- minimally coupled massive scalar18 that can enhance the effective strength of gravity as (B15), where the Wilson coef- ficients ci are now replaced with non-minimal couplings ξi. We stress that such additional effective interactions gener- ate extra gravitational strength scalar forces that violate the equivalence principle at very high energies; but this is not in conflict with any presently accessible observations. To brieflyrecap,thephysicalbasisofthedifferingeffectsofnon- universallycoupledcomparedtouniversallycoupledmassive species on the strength of gravity as you cross each threshold 1 M2 pl p2 → 1 M2 pl p2 + n M2 pl(p2 + M2). (B9) (B9) Unlike the case for (B2), we see that the regime M2 ≪p2 ≪ M2 pl/n the strength of gravity is modified immediately above p = M as 1 M2 pl p2 + n M2 pl p2 1 + M2/p2 →n + 1 M2 pl p2 , (B10) (B10) that is, as each threshold corresponding to a massive KK res- onance is crossed, the effective strength of gravity increases immediately as M2 pl/n →M2 pl/(n + 1), where n counts the numberofmassivespeciesthatcontributetothetreeleveldia- gram Fig. 3. We also note that effective interactions of gravi- 18 Order unity non-minimal couplings will generically be generated through renormalization group (RG) flow for the singlet component of the Higgs and any other massive scalars present in the early universe [34]. 12 3 182 Page 10 of 12 Eur. Phys. J. C (2015) 75 :182 particles can only additively renormalize Newton’s constant such that at the scale of inflation, M2 R(μ) = M2(μref) +  i dim2 i log(μ2/μ2 ref) where the di are spin dependent weights each suppressed by a factor of 1/(16π2). Impos- ing the renormalization conditions at macroscopic scales, M2(μref) = M2 pl so that can be readily understood through the former being a loop effect and the latter being a tree level effect; cf. Figs. 2 and 3. One can complement this understanding of how regular massivespeciesdonotaffectthestrengthofgravityasseenby curvature quanta during inflation through the simple exercise ofcomputingtheactionforR,giventhefactthattheeffectsof massive particles in Fig. 2 can be reproduced by the effective action M2 R(μ)= M2 pl  1+  i di m2 i M2 pl log(μ2/μ2 ref)  ≈M2 pl (B22) S = M2 R 2  d4x√−g R+  d4x√−g  c1R2+c2Rμν Rμν  +  d4x√−gL [φ0] (B17) within the domain of validity of our approximation. (B17) where the last term in the above is the action for the back- ground that sources the quasi-de Sitter phase, and the sub- script on φ0 anticipates that we will work in a gauge where all inflaton fluctuations have been gauged away. The dimen- sionful prefactor M2 R emphasizes that the above is the net result of having subtracted the usual divergences that result after integrating out the fields in question and that are fixed by renormalization conditions at some particular scale, necessi- tating the introduction of a bare cosmological constant term that is canceled by tadpole contributions. One can straight- forwardly deduce that the effect of the higher curvature terms will be to modify the usual action for the comoving curvature perturbation from where the last term in the above is the action for the back- ground that sources the quasi-de Sitter phase, and the sub- script on φ0 anticipates that we will work in a gauge where all inflaton fluctuations have been gauged away. The dimen- sionful prefactor M2 R emphasizes that the above is the net result of having subtracted the usual divergences that result after integrating out the fields in question and that are fixed by renormalization conditions at some particular scale, necessi- tating the introduction of a bare cosmological constant term that is canceled by tadpole contributions. One can straight- forwardly deduce that the effect of the higher curvature terms will be to modify the usual action for the comoving curvature perturbation from Appendix C: Moduli dynamics during inflation In this appendix, we consider the dynamics of moduli fields during inflation in the case where H∗> μc, where μc is the characteristic mass of the moduli. We wish to show that are regimes where the moduli are effectively frozen, even if they are dynamically displaced off their minima, allowing us to treat the extra-dimensional volume as effectively constant during inflation. We begin by considering the following D- dimensional action: S2 = M2 pl  d4x a3ϵ ˙R2 −(∂R)2 a2  (B18) to S2 = M2 ∗  d4x a3ϵ  ˙R2 c2s −(∂R)2 a2 + λ M2∗ (∂R)4 a4 + ...  (B19) S2 = M2 pl  d4x a3ϵ ˙R2 −(∂R)2 a2  (B18) (B18) (B18) S = M D−2 ∗ 2  dDx √ −G R(D) −  dDx √ −G 1 2(∂φ)2 + V (φ)  (C1) to S2 = M2 ∗  d4x a3ϵ  ˙R2 c2s −(∂R)2 a2 + λ M2∗ (∂R)4 a4 + ...  (B19) (C1) where R(D) isthe D-dimensionalRicciscalarconstructedout of the metric G AB. We now consider a D = 4 +n decompo- sition with Greek indices denoting four non-compact coordi- nates and lower case Latin indices denoting n periodic extra- dimensional coordinates that range from 0 ≤ya ≤2π R and where we furthermore presume the metric tensor G AB to be defined through the block diagonal form, where R(D) isthe D-dimensionalRicciscalarconstructedout of the metric G AB. We now consider a D = 4 +n decompo- sition with Greek indices denoting four non-compact coordi- nates and lower case Latin indices denoting n periodic extra- dimensional coordinates that range from 0 ≤ya ≤2π R and where we furthermore presume the metric tensor G AB to be defined through the block diagonal form, where we see from (B17) that the corrections from the cur- vature squared terms to the quadratic action for R must have twoderivativesactingonbackgroundquantities,19 sothat,for example, the operator (∂R)2 gets a correction of the form where we see from (B17) that the corrections from the cur- vature squared terms to the quadratic action for R must have twoderivativesactingonbackgroundquantities,19 sothat,for example, the operator (∂R)2 gets a correction of the form L2 ∼c1,2M2 R (∂R)2 a2 H2 M2 R (B20) (B20) ds2 = gμν(x)dxμdxν + e2ω(x)γabdyadyb. Appendix B: Note on universally coupled massive species There- fore in the context of (B21), we see that unless H2 ∼ M2 pl/ √ N, the correction to the effective strength of grav- ity as seen by the curvature perturbations is negligible and M∗∼Mpl for curvature quanta above the scale of any mas- sive (non-universally coupled) species. (B17) 21 With six extra dimensions for example, this factor equals 1/12. One may be tempted to redefine ω in (C7) to absorb the factor of n(n + 2), however, this appropriately rescales the arguments of the potential energy contributions such that (C17) also results for the rede- fined variables. Appendix C: Moduli dynamics during inflation (C2) where c1, c2 ∼O(N) so that the overall dimensionful coef- ficient of the quadratic action (B19) becomes (C2) If we assume γab = δab, and if no other quantity depends on the ya, then If we assume γab = δab, and if no other quantity depends on the ya, then M2 ∗= M2 R  1 − ˜cN H2 16π2M2 R  (B21) (B21) √ −G = √−g enω (C3) (C3) where ˜c is some positive number (by unitarity) of order unity. Furthermore, we note that integrating out massive and R(D)[G] = R(4)[g] −2ne−ωgμν∇μ∇νeω −n(n −1)gμν∇μω∇νω. (C4) (C4) 12 3 3 Eur. Phys. J. C (2015) 75 :182 Page 11 of 12 182 Substituting into the above, integrating over the compact dimensions and doing a few integrations by part result in where the denominator on the rhs is given by (C9). Defining the total kinetic and potential energies where the denominator on the rhs is given by (C9). Defining the total kinetic and potential energies S = M D−2 ∗ 2 Vn  d4x√−g enω  R(D) + n(n −1)(∂ω)2 −Vn  d4x√−g enω 1 2(∂φ)2 + V (φ)  , (C5) KT := M2 pl n(n + 2) 4 ˙ω2 + ˙φ2 2 ; VT := M2 pl U(ω) 2 + e−2ωV (φ), (C14) (C5) (C14) where Vn :=  dny. To bring the action above into the usual Einstein Hilbert form, we further make the conformal trans- formation we find that in general we find that in general ϵ = − ˙H H2 = 3KT KT + VT , (C15) (C15) gμν = e−nωgμν, (C6) gμν = e−nωgμν, (C6) so that ϵ ≪1 consistently if KT /VT ≪1, i.e. we require the potential terms to dominate the kinetic terms in the energy density, as usual. This can be re-expressed using (C10) and (C12) as a condition on the potential if one neglects the ¨φ and ¨ω terms, which is only possible if so that ϵ ≪1 consistently if KT /VT ≪1, i.e. we require the potential terms to dominate the kinetic terms in the energy density, as usual. 20 For a review of mechanisms to stabilize Kähler moduli in the context of type II and heterotic string theory, see [35,36]. See also [37,38] for complementary approaches utilizing the energetics of the string free energy around enhanced symmetry points. Appendix C: Moduli dynamics during inflation This can be re-expressed using (C10) and (C12) as a condition on the potential if one neglects the ¨φ and ¨ω terms, which is only possible if so that, finally, the action becomes so that, finally, the action becomes S = M2 pl 2  d4x  −g  R(D)[g]−n 2(n+2)(∂ω)2−U(ω)  −  d4x  −g 1 2(∂φ)2 + e−2ωV (φ)  (C7 (C7) 1 n(n + 2) V 2 T,ω V 2 T + M2 pl 2 V 2 T,φ V 2 T ≪1, (C16) (C16) where M2 pl := M(D−2) ∗ Vn and φ := √ V nφ, and where we where M2 pl := M(D−2) ∗ Vn and φ := √ V nφ, and where we have explicitly introduced by hand the Einstein frame poten- tial U, which is responsible for stabilizing the ω modulus.20 Restricting ourselves to spatially homogeneous solutions, we make the metric ansatz pl have explicitly introduced by hand the Einstein frame poten- tial U, which is responsible for stabilizing the ω modulus.20 Restricting ourselves to spatially homogeneous solutions, we make the metric ansatz wherethesecondtermaboveistheusualϵ parameter.Wenote from the definition (C14) that requiring U(ω)e2ω/V (φ) ≪ 1 (which is consistent with requiring inflation being above the effective compactification scale H∗≫μc over a broad regime) results in ds2 = −dt2 + e2λδi jdxidx j (C8) (C8) and find the Einstein constraint equation (dropping the tildes on φ in what follows), 4 n(n + 2) + M2 pl 2 V ′(φ)2 V (φ)2 ≪1, (C17) (C17) 3˙λ2 = n(n + 2) 4 ˙ω2 + U(ω) 2 + ˙φ2 2M2 pl + e−2ω M2 pl V, (C9) (C9) so that in addition we also need a sufficient number of extra dimensions in order that the second numerical factor can also be neglected.21 One can understand why this is so— we see from (C7) that, for the canonically normalized vari- able ω = √n(n + 2)ω, the inflationary potential becomes e−2ω/√n(n+2)V (φ), and it therefore one flattens the ω depen- dence of this contribution to the total potential more and more the greater n is, eventually allowing for the ‘slow-roll’ con- dition on the moduli field to be satisfied. 20 For a review of mechanisms to stabilize Kähler moduli in the context of type II and heterotic string theory, see [35,36]. See also [37,38] for complementary approaches utilizing the energetics of the string free energy around enhanced symmetry points. References 19. S. Davidson, E. Nardi, Y. Nir, Leptogenesis. Phys. Rep. 466, 105 (2008). arXiv:0802.2962 [hep-ph] 20. C. Cheung, P. Creminelli, A.L. Fitzpatrick, J. Kaplan, L. Senatore, The effective field theory of inflation. JHEP 0803, 014 (2008). arXiv:0709.0293 [hep-th] 1. J.F. Donoghue, General relativity as an effective field theory: the leading quantum corrections. Phys. Rev. D 50, 3874 (1994). arXiv:gr-qc/9405057 21. N. Arkani-Hamed, S. Dimopoulos, G.R. Dvali, The hierarchy prob- lem and new dimensions at a millimeter. Phys. Lett. B 429, 263 (1998). arXiv:hep-ph/9803315 g q 2. C.P. Burgess, Quantum gravity in everyday life: general relativ- ity as an effective field theory. Living Rev. Relativ. 7, 5 (2004). arXiv:gr-qc/0311082 22. I. Antoniadis, N. Arkani-Hamed, S. Dimopoulos, G.R. Dvali, New dimensions at a millimeter to a Fermi and superstrings at a TeV. Phys. Lett. B 436, 257 (1998). arXiv:hep-ph/9804398 3. M.M. Anber, J.F. Donoghue, M. El-Houssieny, Running couplings and operator mixing in the gravitational corrections to coupling constants. Phys. Rev. D 83, 124003 (2011). arXiv:1011.3229 [hep- th] 23. I. Antoniadis, B. Pioline, Low scale closed strings and their duals. Nucl. Phys. B 550, 41 (1999). arXiv:hep-th/9902055 4. M.M. Anber, J.F. Donoghue, On the running of the gravitational constant. Phys. Rev. D 85, 104016 (2012). arXiv:1111.2875 [hep- th] 24. I. Antoniadis, S. Dimopoulos, A. Giveon, Little string theory at a TeV. JHEP 0105, 055 (2001). arXiv:hep-th/0103033 25. I. Antoniadis, A. Arvanitaki, S. Dimopoulos, A. Giveon, Phe- nomenology of TeV little string theory from holography. Phys. Rev. Lett. 108, 081602 (2012). arXiv:1102.4043 5. G.R. Dvali, G. Gabadadze, M. Kolanovic, F. Nitti, Scales of gravity. Phys. Rev. D 65, 024031 (2002). arXiv:hep-th/0106058 6. D.M. Capper, On quantum corrections to the graviton propagator. Nuovo Cim. A 25, 29 (1975) 26. G. Dvali, D. Lust. arXiv:0912.3167 [hep-th] 27. G. Dvali, C. Gomez. arXiv:1004.3744 [hep-th] 7. G. Dvali, M. Redi, Black hole bound on the number of species and quantum gravity at LHC. Phys. Rev. D 77, 045027 (2008). arXiv:0710.4344 [hep-th] 28. B.A. Bassett, S. Tsujikawa, D. Wands, Inflation dynam- ics and reheating. Rev. Mod. Phys. 78, 537 (2006). arXiv:astro-ph/0507632 8. M.J. Duff, Observations on conformal anomalies. Nucl. Phys. B 125, 334 (1977) 29. G. Dvali, I. Sawicki, A. Vikman, Dark matter via many copies of the standard model. JCAP 0908, 009 (2009). arXiv:0903.0660 [hep-th] 9. H. Osborn, A.C. Petkou, Implications of conformal invariance in field theories for general dimensions. Ann. Phys. 231, 311 (1994). arXiv:hep-th/9307010 30. A.R. Appendix C: Moduli dynamics during inflation the equation of motion ¨φ + 3˙λ ˙φ + e−2ωV,φ = 0, (C10) ¨φ + 3˙λ ˙φ + e−2ωV,φ = 0, (C10) and the Friedmann equations and the Friedmann equations ¨λ + n(n + 2) 4 ˙ω2 + ˙φ2 2M2 pl = 0, (C11) ¨ω + 3˙λ ˙ω + U,ω n(n + 2) − 4e−2ω n(n + 2)M2 pl V = 0. (C12) ¨λ + n(n + 2) 4 ˙ω2 + ˙φ2 2M2 pl = 0, (C11) (C11) Therefore although it is not generally true that we can have inflation without the moduli undergoing non-trivial excur- sions, we see that in certain limits, this can indeed be accom- plished consistently allowing us to treat them as effectively fixed even though they are displaced from their minima. In this situation, the characteristic masses of the associated KK states remain almost constant during inflation and the usual analysis can be implemented. ¨ω + 3˙λ ˙ω + U,ω n(n + 2) − 4e−2ω n(n + 2)M2 pl V = 0. (C12) (C12) We now ask: is there a solution such that the background inflates, i.e. −˙H/H2 ≪1? From (C11), this clearly requires − ˙H H2 = −¨λ/˙λ2 = 3 3˙λ2  n(n + 2) 4 ˙ω2 + ˙φ2 2M2 pl  ≪1 (C13) (C13) 12 3 182 Page 12 of 12 Eur. Phys. J. C (2015) 75 :182 References Liddle, A. Mazumdar, F.E. Schunck, Assisted inflation. Phys. Rev. D 58, 061301 (1998). arXiv:astro-ph/9804177 10. R. Rattazzi, S. Rychkov, A. Vichi, Central charge bounds in 4D conformal field theory. Phys. Rev. D 83, 046011 (2011). arXiv:1009.2725 [hep-th] 31. S. Dimopoulos, S. Kachru, J. McGreevy, J.G. Wacker, N-flation. JCAP 0808, 003 (2008). arXiv:hep-th/0507205 32. A. Ashoorioon, M.M. Sheikh-Jabbari, Gauged M-flation, its UV sensitivity and spectator species. JCAP 1106, 014 (2011). arXiv:1101.0048 [hep-th] 11. P.A.R. Ade et al. [Planck Collaboration], Planck 2013 results. XVI. Cosmological parameters. Astron. Astrophys. (2014). arXiv:1303.5076 [astro-ph.CO] 33. S. Weinberg, Effective field theory for inflation. Phys. Rev. D 77, 123541 (2008). arXiv:0804.4291 [hep-th] 12. P.A.R.Adeetal.[PlanckCollaboration],Planck2013results.XXII. Constraints on inflation. arXiv:1303.5082 [astro-ph.CO] 34. N.D. Birrell, P.C.W. Davies, Quantum Fields in Curved Space. Cambridge Monographs Mathematical Physics (Cambridge Uni- versity Press, Cambridge, 1982) 13. O. Zsoy, K. Sinha, S. Watson, How well can we really determine the scale of inflation? arXiv:1410.0016 [hep-th] 14. M. Mirbabayi, L. Senatore, E. Silverstein, M. Zaldarriaga, Gravi- tational waves and the scale of inflation. arXiv:1412.0665 [hep-th] 35. M. Grana, Flux compactifications in string theory: a comprehensive review. Phys. Rep. 423, 91 (2006). arXiv:hep-th/0509003 15. A.G. Polnarev, Polarization and anisotropy induced in the microwave background by cosmological gravitational waves. Sov. Astron. 29, 607 (1985) 36. B. de Carlos, S. Gurrieri, A. Lukas, A. Micu, Moduli stabilisa- tion in heterotic string compactifications. JHEP 0603, 005 (2006). arXiv:hep-th/0507173 16. M. Kamionkowski, A. Kosowsky, A. Stebbins, A probe of primor- dial gravity waves and vorticity. Phys. Rev. Lett. 78, 2058 (1997). arXiv:astro-ph/9609132 p 37. T. Catelin-Jullien, C. Kounnas, H. Partouche, N. Toumbas, Induced superstring cosmologies and moduli stabilization. Nucl. Phys. B 820, 290 (2009). arXiv:0901.0259 [hep-th] 17. U. Seljak, M. Zaldarriaga, Signature of gravity waves in polar- ization of the microwave background. Phys. Rev. Lett. 78, 2054 (1997). arXiv:astro-ph/9609169 38. S.P. Patil, R. Brandenberger, Radion stabilization by stringy effects in general relativity. Phys. Rev. D 71, 103522 (2005). arXiv:hep-th/0401037 18. M. Trodden, Electroweak baryogenesis. Rev. Mod. Phys. 71, 1463 (1999). arXiv:hep-ph/9803479 123 123
https://openalex.org/W2555158337
http://ejournal-balitbang.kkp.go.id/index.php/jra/article/download/1998/1615
Indonesian
null
KONDISI METEOROLOGI, KLIMATOLOGI, DAN PERIKANAN DI KAWASAN WADUK CIRATA, JAWA BARAT: Analisis Awal Kemungkinan Dampak Pemanasan Global terhadap Perikanan Budidaya
Jurnal riset akuakultur/Jurnal Riset Akuakultur
2,011
cc-by-sa
5,885
I Nyoman Radiarta*), Anang Hari Kristanto*), dan Adang Saputra**) *) Pusat Penelitian dan Pengembangan Perikanan Budidaya Jl. Ragunan 20, Pasar Minggu, Jakarta Selatan 12540 E-mail: radiarta@yahoo.com I Nyoman Radiarta*), Anang Hari Kristanto*), dan Adang Saputra**) *) Pusat Penelitian dan Pengembangan Perikanan Budidaya Jl. Ragunan 20, Pasar Minggu, Jakarta Selatan 12540 E-mail: radiarta@yahoo.com **) Balai Penelitian dan Pengembangan Perikanan Budidaya Air Tawar Jl. Sempur No. 1, Bogor 16154 **) Balai Penelitian dan Pengembangan Perikanan Budidaya Air Tawar Jl. Sempur No. 1, Bogor 16154 (Naskah diterima: 5 Mei 2011; Disetujui publikasi: 5 September 2011) (Naskah diterima: 5 Mei 2011; Disetujui publikasi: 5 September 2011) Kondisi meteorologi, klimatologi, dan perikanan ..... (I Nyoman Radiarta) Kondisi meteorologi, klimatologi, dan perikanan ..... (I Nyoman Radiarta) ABSTRAK Pemanasan global adalah perubahan iklim yang dapat teridentifikasi melalui perubahan rata-rata yang terjadi pada jangka waktu yang relatif panjang. Perubahan ini disebabkan baik karena variasi kondisi alam maupun akibat dari aktivitas manusia (antropogenic). Pemanasan global diproyeksikan akan berpengaruh terhadap kondisi ekosistem, kondisi sosial dan ekonomi, dan meningkatnya tekanan terhadap sumber mata pencaharian yang berimplikasi pada penyediaan pangan. Bagi perikanan budidaya, pemanasan global dapat berpengaruh pada perubahan tingkat produktivitas, distribusi, komposisi spesies, dan lingkungan perairan sehingga dapat menyebabkan perubahan dalam operasional perikanan budidaya. Berdasarkan perkembangan isu tentang pemanasan global ini, penelitian dampak pemanasan global terhadap perikanan budidaya dirasakan sangat penting. Tujuan dari penelitian ini adalah untuk melihat kemungkinan adanya dampak pemanasan global terhadap aktivitas perikanan budidaya (ikan air tawar) di kawasan Waduk Cirata, Jawa Barat. Data utama yang dikumpulkan dalam penelitian ini diperoleh dari berbagai sumber meliputi data klimatologi, meteorologi, tutupan lahan dan karakteristik waduk. Analisis data yang ditampilkan dalam tulisan ini masih merupakan analisis awal yang lebih banyak diuraikan secara deskriptif melalui tampilan grafik. Hasil dari penelitian ini diharapkan dapat memberikan gambaran umum mengenai kemungkinan adanya dampak pemanasan global bagi perikanan budidaya air tawar khususnya di Waduk Cirata, sehingga nantinya dapat membantu dalam pengelolaan waduk yang lebih baik. KATA KUNCI: meteorologi, klimatologi, budidaya ikan air tawar, pemanasan global, Waduk Cirata ABSTRACT: PENDAHULUAN fluktuasi iklim setiap tahunnya (Blenckner, 2005). Sehubungan dengan pemanasan global yang terjadi, masih adanya ketidak- pastian mengenai berapa besar, seberapa cepat dan di mana saja iklim akan berubah secara signifikan. Untuk melihat perubahan iklim yang terjadi, para ahli telah melakukan berbagai cara untuk mengkarakterisasi perubahan yang terjadi baik regional maupun global. Satu pendekatan yang umum di- gunakan adalah melalui zone indek. El Niño Southern Oscillation (ENSO) indek merupakan satu zone indeks yang sangat populer di wilayah Pasifik tropis, yang dapat berdampak pada perubahan lingkungan perairan dan daratan. Pendekatan menggunakan zone indeks ini secara umum sangat bermanfaat untuk melihat dampak perubahan lingkungan terhadap perubahan iklim. Hal ini disebabkan indek ini mengintegrasikan berbagai variabel iklim (misalnya suhu, curah hujan, dan tutupan awan) dan memungkinkan melihat variasinya secara tahunan untuk iklim regional. Intergovernmental Panel on Climate Change (IPCC, 2007) mendefinisikan pemanasan global adalah perubahan iklim yang terjadi pada jangka waktu yang panjang misalnya satu dekade ataupun lebih panjang lagi, dan dapat teridentifikasi dengan baik (misalnya menggunakan uji statistik). Perubahan ini dapat diakibatkan oleh variasi kondisi alam atau aktivitas manusia. IPCC dalam buku laporannya yang keempat telah memprediksi terjadinya perubahan suhu udara sampai pada akhir abad 21 (2009-2099), perubahan yang terjadi berkisar antara 1,8oC (estimasi untuk prediksi terendah-B1) sampai 4oC (estimasi untuk prediksi tertinggi-A1FI) (IPCC, 2007). Pemanasan global yang terjadi dapat mempengaruhi variasi suhu udara/air, cuaca, dan ketersediaan pasokan air (kualitas dan kuantitas). Dampak dari perubahan suhu dapat mempengaruhi tingkat produktivitas dari suatu ekosistem yang pada akhirnya dapat berdampak pada variasi waktu dan keberhasilan pola migrasi, pemijahan, dan kelimpahan (Walther et al., 2002; Beukema & Dekker, 2005; Saitoh et al., 2011). Pemanasan global diproyeksikan akan berpengaruh terhadap kondisi ekosistem, kondisi sosial dan ekonomi, dan meningkatnya tekanan terhadap sumber mata pencaharian yang berimplikasi pada penyediaan bahan pangan. Penelitian dampak pemanasan global terhadap perikanan budidaya masih sangat terbatas. Beberapa pustaka yang ada umumnya masih bersifat review tentang kemungkinan dampak yang ditimbulkan baik dampak secara langsung maupun tidak langsung (Bardach, 1989; Meisner & Shuter, 1992; Harley et al., 2006; Cochrane et al., 2009). Secara global, Handisyde et al. (2006) telah melakukan analisis kemungkinan dampak dari perubahan iklim global terhadap perikanan budidaya. Parameter utama yang digunakan dalam analisis tersebut meliputi kondisi klimatologi dan perairan (suhu udara, presipitasi, penaikan muka air (sea level rise), kondisi ekstrim, variasi iklim, dan arus laut), Kondisi iklim akan selalu bervariasi ber- dasarkan waktu dan tempat. meteorology, climatology, freshwater fish aquaculture, climate change, Cirata Reservoir KEYWORDS: ABSTRACT: ABSTRACT: Meteorology, climatology, and fisheries conditions in Cirata Reservoir, West Java: A preliminary analysis on possible impact of climate change to aquaculture. By: I Nyoman Radiarta, Anang Hari Kristanto, and Adang Saputra ABSTRACT: Meteorology, climatology, and fisheries conditions in Cirata Reservoir, West Java: A preliminary analysis on possible impact of climate change to aquaculture. By: I Nyoman Radiarta, Anang Hari Kristanto, and Adang Saputra ABSTRACT: Meteorology, climatology, and fisheries conditions in Cirata Reservoir, West Java: A preliminary analysis on possible impact of climate change to aquaculture. By: I Nyoman Radiarta, Anang Hari Kristanto, and Adang Saputra Global warming is the change of climate condition that can be identified through long term average of its variability. The change could be caused by either natural condition or antropogenic activities. Climate change will influence the surrouding natural ecosystem, socio-economic of afffected communities, and inflict to the availability of livelihood related with food security. In term of aquaculture, climate change could 495 J. Ris. Akuakultur Vol.6 No.3 Tahun 2011: 495-506 impact the system to level of productivity, species distribution and composition, and environmental condition, and finally change the practices of aquaculture activities. Taking to the account of issues on climate change, research on possible impact of climate change to aquaculture has become an important discussion topic. The aim of this study was to investigate the possible impacts of climate change to freshwater aquaculture in Cirata Reservoir, West Java. The main data used in this study was collected from different sources including climatology, meteorology, land cover, characteristic of the reservoir. All data were then analyzed in order to observe the conectivity among them in relation with the climate condition. The result from this study was a preliminary analysis based on the availability of secondary data. The finding from this study could give a general overview on the possible impact of climate change to freshwater aquaculture especially in Cirata Reservoir. PENDAHULUAN Sangat jelas perbedaannya antara perubahan iklim dan variasi iklim. Perubahan iklim adalah tren (fluktuasi) iklim selama kurun waktu yang cukup panjang, paling sedikit sekitar 20 tahun, sedangkan variasi iklim mengacu kepada 496 Kondisi meteorologi, klimatologi, dan perikanan ..... (I Nyoman Radiarta) dan kondisi perikanan budidaya (produksi, mata pencaharian, dan ketersediaan minyak ikan dan makanan ikan). Meskipun dilengkapi dengan contoh kasus di Bangladesh, penelitian ini hanya memberikan gambaran secara global kemungkinan dampak yang ditimbulkan dari perubahan iklim terhadap perikanan budidaya. Dari penelitian ini, di- sarankan agar melakukan kajian yang lebih spesifik, sehingga nantinya dapat memberikan kontribusi yang nyata terhadap pemahaman kita mengenai bagaimana pemanasan global berdampak terhadap sumberdaya perikanan budidaya. Dampak dari perubahan iklim khususnya pengaruh langsung dari zone indeks: El Niño dan La Niña terhadap budidaya kekerangan (Japanese scallop) telah di- demontrasikan oleh Baba et al. (2009). Mereka menyimpulkan bahwa, terjadinya El Niño dapat mempengaruhi rendahnya kelimpahan spat yang tersedia, sedangkan La Niña menunjukkan pengaruh yang sangat signifi- kan terhadap reproduksi dan pertumbuhan dari scallop. Hal ini menunjukkan bahwa penelitian lebih lanjut dari dampak pemanasan global terhadap perikanan budidaya merupakan suatu tantangan dan perlu dikaji lebih mendalam. Hasil kajian tersebut tentunya akan bermanfaat guna dapat diambil tindakan adaptasi terhadap aktivitas perikanan budi- daya yang pada akhirnya dapat berkontribusi pada usaha perikanan budidaya yang berkelanjutan. melihat keterkaitannya dengan kondisi iklim secara global. dan kondisi perikanan budidaya (produksi, mata pencaharian, dan ketersediaan minyak ikan dan makanan ikan). Meskipun dilengkapi dengan contoh kasus di Bangladesh, penelitian ini hanya memberikan gambaran secara global kemungkinan dampak yang ditimbulkan dari perubahan iklim terhadap perikanan budidaya. Dari penelitian ini, di- sarankan agar melakukan kajian yang lebih spesifik, sehingga nantinya dapat memberikan kontribusi yang nyata terhadap pemahaman kita mengenai bagaimana pemanasan global berdampak terhadap sumberdaya perikanan budidaya. Dampak dari perubahan iklim khususnya pengaruh langsung dari zone indeks: El Niño dan La Niña terhadap budidaya kekerangan (Japanese scallop) telah di- demontrasikan oleh Baba et al. (2009). Mereka menyimpulkan bahwa, terjadinya El Niño dapat mempengaruhi rendahnya kelimpahan spat yang tersedia, sedangkan La Niña menunjukkan pengaruh yang sangat signifi- kan terhadap reproduksi dan pertumbuhan dari scallop. Hal ini menunjukkan bahwa penelitian lebih lanjut dari dampak pemanasan global terhadap perikanan budidaya merupakan suatu tantangan dan perlu dikaji lebih mendalam. Hasil kajian tersebut tentunya akan bermanfaat guna dapat diambil tindakan adaptasi terhadap aktivitas perikanan budi- daya yang pada akhirnya dapat berkontribusi pada usaha perikanan budidaya yang berkelanjutan. PENDAHULUAN Secara umum dampak secara langsung yang mungkin ditimbulkan dengan perubahan suhu (udara/air) adalah kelayakan dari suatu jenis ikan untuk dibudidayakan di lokasi tertentu, sedangkan dampak tidak langsung berupa pengaruh terhadap kandungan oksigen, penyakit, dan terjadinya kelimpahan alga beracun (De Silva & Soto, 2009). Pemanasan global juga dapat berpengaruh terhadap fluktuasi muka air kawasan waduk/ danau disebabkan karena perubahan curah hujan, yang tentunya sangat berpengaruh bagi keberlangsungan kegiatan perikanan di kawasan waduk/danau. Melihat isu-isu yang ada tersebut, penelitian spesifik dampak pemanasan global terhadap perikanan budidaya (misalnya dampaknya terhadap timbulnya penyakit, produktivitas perikanan air tawar ataupun budidaya laut) sangat diperlukan guna dapat memberikan dukungan data dan informasi yang relevan mengenai dampak pemanasan global terhadap perikanan budidaya. Tujuan dari penelitian ini adalah untuk melakukan analisis kemungkinan adanya dampak pemanasan global terhadap aktivitas perikanan budidaya ikan air tawar di Waduk Cirata, Jawa Barat. Analisis dilakukan ber- dasarkan data sekunder yang dikumpulkan dengan melihat dua aspek (filter) yang dapat mempengaruhi besarnya dampak pemanasan global terhadap ekosistem waduk. Analisis yang disajikan dalam tulisan ini adalah analisis awal yang dibahas dengan melihat keterkaitan antara beberapa kondisi baik di dalam maupun luar waduk terhadap kemungkinan adanya dampak pemanasan global. Data klimatologi dan meteorologi (iklim) sangat berperan bagi kegiatan perikanan. Lama penyinaran dan suhu udara sangat mempengaruhi kondisi suhu perairan dan secara langsung akan berdampak terhadap tingkat produktivitas dari suatu perairan dan tingkat pertumbuhan dari biota yang di- budidayakan. Data iklim telah dimanfaatkan dibidang perikanan budidaya (Kapetsky, 2000). Namun, belum banyak upaya yang dilakukan sehubungan dengan akuisisi dan pem- bentukan aplikasi data iklim sebagai satu media untuk perikanan budidaya. Munculnya isu pemanasan global belakangan ini membuat perspektif yang cukup menarik dalam hal pemanfaatan data iklim. Data tersebut jika dikaji secara komprehensif dan dihubungkan dengan kondisi perairan tentunya akan memberikan gambaran yang lebih baik. Sebagai contoh terjadinya kematian ikan di Waduk Cirata, umumnya kajian yang ada bersifat parsial dari aspek kondisi kualitas perairan saja (Abery et al., 2005; Hayami et al., 2008), belum BAHAN DAN METODE Penelitian ini telah dilakukan di Waduk Cirata, Jawa Barat (Gambar 1). Lokasi penelitian terletak pada posisi 6o44’ LS; 107o18’ BT. Waduk ini merupakan deretan tiga waduk besar yang terletak di daerah aliran sungai (DAS) Citarum. Dua waduk lainnya adalah Waduk Jatiluhur dan Sanguling. Sejak pertama kali dioperasikan yaitu tahun 1988, aktivitas perikanan budidaya dengan menggunakan keramba jaring apung (KJA) telah berkembang di waduk ini (Soemarwoto et al., 1990). Data utama yang digunakan dalam penelitian ini adalah data sekunder. Data ini 497 J. Ris. Akuakultur Vol.6 No.3 Tahun 2011: 495-506 Gambar 1. Lokasi penelitian di Waduk Cirata, Jawa Barat Figure 1. Study area at Cirata Reservoir, West Java Gambar 1. Lokasi penelitian di Waduk Cirata, Jawa Barat Figure 1. Study area at Cirata Reservoir, West Java dikumpulkan dari instansi terkait, studi pustaka (publikasi ilmiah), dan sumber dari internet. Instansi terkait yang berhubungan dengan dengan pengelolaan waduk Cirata di antaranya Dinas Kelautan dan Perikanan (DKP), Badan Pengelola Waduk Cirata (BPWC), dan Unit Pembangkit Jawa-Bali (UPJB). Data yang dikumpulkan dalam penelitian ini meliputi: kondisi iklim (suhu udara minimum, suhu udara maksimum, suhu udara rata-rata, dan curah hujan), kondisi lahan waduk, dan kondisi aktivitas budidaya ikan. Data spasial klimatologi untuk kawasan DAS Citarum diperoleh dari World Climatology (Hijmans et al., 2005; http://www.worldclim.org/). waduk. Kombinasi aspek dari luar dan dalam waduk (Blenckner, 2005) akan memberikan perspektif yang komprehensif mengenai respons dari ekosistem waduk. Hasil yang ditampilkan dalam penelitian hanya merupakan suatu kajian awal dengan memperhatikan trend perkembangan lingkungan dan kondisi waduk yang kiranya dapat dikaitan dengan ber- kembangnya isu mengenai pemanasan global yang terjadi sekarang ini (IPCC, 2007). Karakteristik Lokasi (Kondisi Luar Waduk) Waduk Cirata merupakan waduk yang terletak di DAS Citarum, berlokasi sekitar 40 km dari arah Barat Laut Kota Bandung. Waduk ini berada pada ketinggian sekitar 221 m dari permukaan laut (dpl). Maksimum kedalaman waduk adalah 125 m (rata-rata kedalaman 35 m) dengan volume air sekitar 2.2 km3 (Hayami et al., 2008). Lokasi ketinggian waduk dari permukaan laut tentunya akan mempengaruhi volume air yang masuk. Waduk yang berlokasi cukup tinggi hanya memperoleh sumber air berasal dari curah hujan (precipitation) sedangkan waduk yang terletak di dataran rendah memperoleh air dari aliran sungai dan air tanah. Blenckner (2005) mengemukakan bahwa danau yang berlokasi di ketinggian umumnya berukuran kecil, memiliki kecerahan yang tinggi, jumlah spesies ikan terbatas, dan Analisis data dalam penelitian ini meng- adopsi metode yang dikemukakan oleh Blenckner (2005). Menurut Blenckner (2005), konsepsual model kemungkinan dampak perubahan/variasi iklim terhadap ekosistem waduk dapat dianalisis dari dua aspek (filter) penting yaitu aspek karakteristik lokasi dan karakteristik waduk (Gambar 2). Berdasarkan kedua aspek ini, data yang telah dikumpulkan kemudian dilihat hubungannya dan dibahas secara deskriptif yang disertai dengan gambar. Respon ekosistem danau/waduk Lake/reservoir ecosystem respond Respon ekosistem danau/waduk Lake/reservoir ecosystem respond Gambar 2. Model analisis data kemungkinan dampak perubahan/variasi iklim terhadap ekosistem waduk. Gambar 2. Model analisis data kemungkinan dampak perubahan/variasi iklim terhadap ekosistem waduk. Figure 2. Modeling approach of possible impact of climate variability on reservoir ecosystem. dari suatu kawasan waduk sangat terbatas ketersediaannya. Variasi suhu udara ini dapat dijadikan data proxy untuk menduga fluktuasi suhu air waduk. Seperti yang dilaporkan oleh Boyd & Pine (2006), bahwa fluktuasi rata-rata suhu udara bulanan identik dengan fluktuasi rata-rata suhu air. Hal ini berimplikasi bahwa perubahan yang terjadi pada suhu udara setiap musimnya akan mempengaruhi suhu air dan pertumbuhan dari biota air. Suhu udara bulanan di Waduk Cirata cukup berfluktuasi (Gambar 5a). Kisaran suhu udara hasil pemantauan stasiun klimatologi UPJB adalah antara 20oC- 30oC. Dari data histori yang ada (tahun 2003-2009), menunjukkan bahwa terjadi kondisi yang cukup ekstrim di tahun 2004 dan 2007. Pada tahun 2004, suhu udara meningkat secara signifikan mencapai lebih dari 35oC. Kondisi ini sangat berhubungan dengan terjadinya El Niño di kawasan tropis (http:// w w w . c p c . n o a a . g o v / p r o d u c t s / analysis_monitoring/ensostuff/ens). Sebaliknya tahun 2007 suhu udara menurun drastis mencapai sekitar 17oC. Kondisi ini jika dikaitkan dengan zone indek di kawasan tropis adalah bersamaan dengan terjadinya La Niña. Kedua contoh kondisi ekstrim ini, merupakan dari suatu kawasan waduk sangat terbatas ketersediaannya. Variasi suhu udara ini dapat dijadikan data proxy untuk menduga fluktuasi suhu air waduk. Seperti yang dilaporkan oleh Boyd & Pine (2006), bahwa fluktuasi rata-rata suhu udara bulanan identik dengan fluktuasi rata-rata suhu air. Hal ini berimplikasi bahwa perubahan yang terjadi pada suhu udara setiap musimnya akan mempengaruhi suhu air dan pertumbuhan dari biota air. Suhu udara bulanan di Waduk Cirata cukup berfluktuasi (Gambar 5a). Kisaran suhu udara hasil pemantauan stasiun klimatologi UPJB adalah antara 20oC- 30oC. Dari data histori yang ada (tahun 2003-2009), menunjukkan bahwa terjadi kondisi yang cukup ekstrim di tahun 2004 dan 2007. Pada tahun 2004, suhu udara meningkat secara signifikan mencapai lebih dari 35oC. Kondisi ini sangat berhubungan dengan terjadinya El Niño di kawasan tropis (http:// w w w . c p c . n o a a . g o v / p r o d u c t s / analysis_monitoring/ensostuff/ens). Sebaliknya tahun 2007 suhu udara menurun drastis mencapai sekitar 17oC. HASIL DAN BAHASAN Respons ekosistem waduk terhadap dampak pemanasan global akan berbeda-beda sesuai dengan karakteristik dari DAS dan 498 Kondisi meteorologi, klimatologi, dan perikanan ..... (I Nyoman Radiarta) Perubahan iklim (Climate change) Variasi iklim (Climate variability) Respon ekosistem danau/waduk Filter 1 (luar waduk): Karakteristik lokasi Filter 1 (outside reservoir): Location characteristic Filter 2 (kondisi dalam): Karakteristik waduk Filter 2 (inside reservoir): Characteristic reservoir Posisi geografis Geographic position Karakteristik DAS Cathment characteristic Meteorologi/klimatologi Climate condition Histori danau/waduk Lake/reservoir history Kondisi kualitas perairan Water quality condition Interaksi abiotik/biotik Biotic/abiotic interaction Perubahan iklim (Climate change) Variasi iklim (Climate variability) Perubahan iklim (Climate change) Variasi iklim (Climate variability) Posisi geografis Geographic position Karakteristik DAS Cathment characteristic Meteorologi/klimatologi Climate condition Filter 1 (luar waduk): Karakteristik lokasi Filter 1 (outside reservoir): Location characteristic Filter 1 (luar waduk): Karakteristik lokasi Histori danau/waduk Lake/reservoir history Filter 2 (kondisi dalam): Karakteristik waduk Filter 2 (inside reservoir): Characteristic reservoir Kondisi kualitas perairan Water quality condition Interaksi abiotik/biotik Biotic/abiotic interaction Respon ekosistem danau/waduk Lake/reservoir ecosystem respond Kondisi ini jika dikaitkan dengan zone indek di kawasan tropis adalah bersamaan dengan terjadinya La Niña. Kedua contoh kondisi ekstrim ini, merupakan rendahnya dampak dari aktivitas manusia dibandingkan dengan danau yang berlokasi di daratan rendah. Dilihat dari sisi ketinggian, Waduk Cirata dapat dikategorikan berada pada daratan yang tidak terlalu tinggi. Sumber air waduk ini umumnya berasal dari aliran Sungai Citarum, yang merupakan aliran sungai terbesar di Jawa Barat. Hasil analisis data curah hujan di kawasan DAS Citarum menunjukkan bahwa terdapat dua musim di kawasan ini yaitu musim kering pada bulan Mei-September dan musim penghujan pada bulan Oktober-April (Gambar 3). Rata-rata presipitasi bulanan adalah 67-155 mm pada musim kering dan 169-328 mm pada musim penghujan (Hayami et al., 2008). Dampak langsung dari adanya pemanasan global adalah terjadinya perubahan suhu udara. Perubahan suhu udara secara spasial di kawasan DAS Citarum cukup bervariasi (Gambar 4). Suhu udara terendah terjadi sekitar bulan Juli, sedangkan suhu udara maksimum terjadi bulan Agustus-September. Data suhu udara dari stasiun Badan Meteorologi Klimatologi dan Geofisik (BMKG) dan UPJB umumnya dapat diperoleh secara berkelan- jutan (time series), sedangkan data suhu air 499 Gambar 3. Kondisi presipitasi (mm) di kawasan DAS Citarum Figure 3. Precipitation (mm) condition in Citarum Watershed Rendah (Low) Tinggi (High) Presipitasi (Precipitation) (mm) 107o15’E 107o30’E 6o30’S 6o45’S 7o0’S Gambar 4. Kondisi suhu udara (oC) di kawasan DAS Citarum: (a) suhu minimum, (b) suhu maksimum, dan (c) suhu rata-rata Figure 4. Water temperature (oC) condition in Citarum Watershed: (a) minimum temperature, (b) maximum temperature, and (c) average temperature Rendah (Low) 6o30’S 107o15’E 107o30’E 6o45’S 7o0’S Tinggi (High) Suhu udara (Air temperature) (oC) Ris. Akuakultur Vol.6 No.3 Tahun 2011: 495-506 00 J. Ris. Akuakultur Vol.6 No.3 Tahun 2011: 495-506 Gambar 3. Kondisi presipitasi (mm) di kawasan DAS Citarum Figure 3. Precipitation (mm) condition in Citarum Watershed Rendah (Low) Tinggi (High) Presipitasi (Precipitation) (mm) 107o15’E 107o30’E 6o30’S 6o45’S 7o0’S Gambar 3. Kondisi presipitasi (mm) di kawasan DAS Citarum Figure 3. Precipitation (mm) condition in Citarum Watershed Gambar 4. Kondisi suhu udara (oC) di kawasan DAS Citarum: (a) suhu minimum, (b) suhu maksimum, dan (c) suhu rata-rata Figure 4. Water temperature (oC) condition in Citarum Watershed: (a) minimum temperature, (b) maximum temperature, and (c) average temperature Rendah (Low) 6o30’S 107o15’E 107o30’E 6o45’S 7o0’S Tinggi (High) Suhu udara (Air temperature) (oC) Gambar 4. Respon ekosistem danau/waduk Lake/reservoir ecosystem respond Kondisi suhu udara (oC) di kawasan DAS Citarum: (a) suhu minimum, (b) suhu maksimum, dan (c) suhu rata-rata Figure 4. Water temperature (oC) condition in Citarum Watershed: (a) minimum temperature, (b) maximum temperature, and (c) average temperature Rendah (Low) 6o30’S 107o15’E 107o30’E 6o45’S 7o0’S Tinggi (High) Suhu udara (Air temperature) (oC) Gambar 4. Kondisi suhu udara (oC) di kawasan DAS Citarum: (a) suhu minimum, (b) suhu maksimum, dan (c) suhu rata-rata Figure 4. Water temperature (oC) condition in Citarum Watershed: (a) minimum temperature, (b) maximum temperature, and (c) average temperature 500 Kondisi meteorologi, klimatologi, dan perikanan ..... (I Nyoman Radiarta) Gambar 5. Kondisi suhu udara (a) dan curah hujan (b) di Waduk Cirata dari tahun 2003-2009 Figure 5. Air temperature condition (a) and rain fall (b) in Cirata Reservoir from 2003-2009 Suhu udara Air temperature 40 (a) (b) 30 20 10 25 15 10 5 0 curah hujan Rain fall Bulan (Months) 2003 2004 2005 2006 2007 2008 2009 1 5 9 1 5 9 1 5 9 1 5 9 1 5 9 1 5 9 1 5 9 Maksimun (Maximum) Minimum (Minimum) Rataan (Average) 20 (a) (b) Gambar 5. Kondisi suhu udara (a) dan curah hujan (b) di Waduk Cirata dari tahun 2003-2009 Figure 5. Air temperature condition (a) and rain fall (b) in Cirata Reservoir from 2003-2009 Maksimun (Maximum) Minimum (Minimum) Rataan (Average) Gambar 5. Kondisi suhu udara (a) dan curah hujan (b) di Waduk Cirata dari tahun 2003 Figure 5. Air temperature condition (a) and rain fall (b) in Cirata Reservoir from 20 indikasi penting yang dapat dikaitkan dengan adanya dampak dari pemansan global yang terjadi di kawasan Waduk Cirata. Kondisi ini jika dikaitkan dengan kondisi perikanan budidaya tentunya akan memberikan prespektif yang berbeda. diakibatkan karena pasokan limbah aktivitas rumah tangga, industri, dan pertanian yang terbawa dari aliran sungai masuk ke dalam waduk. Indeks kesesuaian kualitas perairan di Waduk Cirata menunjukkan kondisi yang lebih baik dibandingkan dengan Waduk Saguling (Soemarwoto et al., 1990). Hal ini disebabkan karena pasokan limbah yang berasal dari Kota Bandung, Cimahi, dan Padalarang masuk di Waduk Saguling melalui Sungai Citarum sangat besar. Kondisi curah hujan yang terjadi di kawasan Waduk Cirata hasil pemantauan stasiun UPJB menunjukkan fluktuasi yang cukup tinggi (Gambar 5b). Secara umum, curah hujan yang tinggi terjadi sekitar bulan Oktober- April setiap tahunnya, dengan curah hujan maksimum ditemukan pada tahun 2003. Respon ekosistem danau/waduk Lake/reservoir ecosystem respond Tingginya curah hujan yang terjadi dapat mempengaruhi terjadinya penurunan suhu air yang jika dibarengi dengan terjadinya hembusan angin yang kencang akan memicu terjadinya pengadukan kolom air (terjadinya umbalan, upwelling) yang sering berimplikasi pada terjadinya kematian ikan (Krismono et al., 2001). Karakteristik Waduk (Kondisi Dalam Waduk) Aktivitas yang terdapat dalam kawasan waduk juga akan memberikan respons yang cukup signifikan terhadap kemungkinan dampak pemanasan global terhadap ekosistem waduk. Waduk Cirata yang di- bangun pada tahun 1988 bertujuan untuk memenuhi tenaga listrik dan pengendalian banjir. Namun sejalan dengan perkembangan waktu, aktivitas penunjang semakin berkembang di antaranya perikanan dan pariwisata. Kegiatan perikanan budidaya di waduk ini telah dilakukan dengan meng- gunakan KJA (Costa-Pierce, 1998). Ikan yang umumnya dibudidayakan adalah ikan mas (Cyprinus carpio) dan nila (Oreochromis niloticus) (Abery et al., 2005). Pengelolaan waduk untuk kegiatan perikanan ditujukan Kondisi tutupan lahan di sekitar area resapan (catchmen area) merupakan aspek luar waduk yang berperan penting bagi kondisi lingkungan perairan dalam waduk (Gambar 6). Masing-masing jenis tutupan lahan akan memberikan pengaruh berbeda terhadap kondisi perairan waduk (Xiaoyan et al., 2002). Padatnya pemukiman dan aktivitas pertanian yang ada di sekitar Waduk Cirata dapat memicu terjadinya peningkatan polusi perairan yang 501 J. Ris. Akuakultur Vol.6 No.3 Tahun 2011: 495-506 Gambar 6. Tutupan lahan di kawasan Waduk Cirata (Sumber: Radiarta & Ardi, 2009) Figure 6. Land cover condition around Cirata Reservoir area (Source: Radiarta & Ardi, 2009) 6o42’S Pertanian (Agriculture field) 6o44’S 6o46’S 107o15’E 107o18’E 107o21’E 107o15’E 107o18’E 107o21’E Tutupan lahan (Land cover) Perkebunan (Plantation) Pemukiman (Settlement) Hutan (Forest) Tanah kosong (Land) Waduk (Reservoir) Sungai (River) 6o46’S 107o18’E 107o18’E 107o15’E 107o21’E Gambar 6. Tutupan lahan di kawasan Waduk Cirata (Sumber: Radiarta & Ardi, 2009) Figure 6. Land cover condition around Cirata Reservoir area (Source: Radiarta & A Gambar 6. Tutupan lahan di kawasan Waduk Cirata (Sumber: Radiarta & Ardi, 2009) Gambar 7. Distribusi KJA di Waduk Cirata pada waktu pemantauan yang berbeda: (a) Landsat ETM+ akuisisi tanggal 29 April 2002 dan (b) ALOS AVNIR-2 akuisisi tanggal 27 September 2008 (Sumber: Radiarta et al., 2005; Radiarta & Ardi 2009) Figure 7. Cage culture distribution in Cirata Reservoir at different observation time: (a) Landsat ETM+ aquired on April 29, 2002 and (b) ALOS AVNIR-2 aquired on September 27, 2008 (Source: Radiarta et al., 2005; Radiarta & Ardi 2009) (a) LANDSAT ETM+ 29 April 2002 (b) ALOS AVNIR-2 27 September 2008 (b) ALOS AVNIR-2 27 September 2008 (a) LANDSAT ETM+ 29 April 2002 Gambar 7. Distribusi KJA di Waduk Cirata pada waktu pemantauan yang berbeda: (a) Landsat ETM+ akuisisi tanggal 29 April 2002 dan (b) ALOS AVNIR-2 akuisisi tanggal 27 September 2008 (Sumber: Radiarta et al., 2005; Radiarta & Ardi 2009) Figure 7. Karakteristik Waduk (Kondisi Dalam Waduk) Cage culture distribution in Cirata Reservoir at different observation time: (a) Landsat ETM+ aquired on April 29, 2002 and (b) ALOS AVNIR-2 aquired on September 27, 2008 (Source: Radiarta et al., 2005; Radiarta & Ardi 2009) 502 Kondisi meteorologi, klimatologi, dan perikanan ..... (I Nyoman Radiarta) untuk mengoptimalkan produksi ikan dan menjaga kelestarian sumberdaya perikanan serta lingkungan sehingga dapat dimanfaatkan secara berkelanjutan oleh masyarakat sekitar kawasan waduk. Perkembangan jumlah KJA yang ada di Waduk Cirata menunjukkan jumlah yang telah melebihi daya dukung waduk tersebut (Gambar 7). Hasil analisis citra satelit menunjukkan peningkatan tutupan KJA yang sangat signifikan (Radiarta & Ardi, 2009). Penempatan KJA yang ada sekarang ini juga sudah tidak sesuai lagi dengan zonasi pemanfaatan lahan yang telah ditetapkan sebelumnya (Radiarta et al., 2005). Kondisi ini dapat disebabkan karena lemahnya managemen pengelolaan waduk yang ada (Krismono & Wahyudi, 2002). variasi jumlah KJA, produksi ikan secara total dan per KJA dan frekuensi terjadinya kematian ikan dari tahun 1988-2002. Produksi total maksimum tercatat tahun 1997, sedangkan produksi maksimum per KJA tercatat tahun 1994. Peningkatan KJA setiap tahunnya tidak mendorong peningkatan produksi namun sebaliknya, produksi ikan semakin menurun (Gambar 8). Hal ini dapat disebabkan karena kondisi lingkungan dalam waduk sudah tidak dapat mendukung secara maksimal untuk kegiatan perikanan budidaya dengan KJA. Frekwensi kejadian kematian ikan selalu ditemukan setiap tahunnya dengan tingkat kematian tersebar ditemukan tahun 1995. Tahun tersebut merupakan periode La Niña. Tantangan Penelitian Ke Depan Peningkatan jumlah KJA ini dapat menyebabkan penurunan mutu lingkungan di dalam waduk. Beberapa hasil penelitian menunjukkan bahwa kandungan oksigen yang masih layak untuk aktivitas budidaya ikan di Waduk Cirata hanya tersedia sampai pada kedalaman maksimum sekitar 7 m sedangkan perubahan suhu secara drastis (thermocline) ditemukan sekitar kedalaman 5-7 m (Hayami et al., 2008). Kondisi ini menunjukkan jika terjadi perubahan iklim yang ekstrim akan cepat memacu terjadinya pengadukan yang mem- bawa gas-gas beracun dari dasar waduk kepermukaan sehingga dapat menyebabkan kematian ikan. Gambar 8 menyajikan data Dengan memperhatikan dua aspek (dari luar dan dalam) yang dapat memicu respon ekosistem waduk terhadap dampak pema- nasan global yang terjadi, masih terbuka peluang yang sangat besar untuk melakukan kajian-kajian yang lebih spesifik dan ber- kelanjutan. Sehingga nantinya ketersediaan data kondisi lingkungan perairan dapat dipadukan dengan data iklim yang tersedia. Kajian lingkungan perairan sehubungan dengan kondisi iklim global ini telah pula dilakukan oleh Balai Penelitian dan Pengembangan Perikanan Air Tawar mulai tahun 2010 (Adang Saputra, komunikasi Gambar 8. Variasi perubahan jumlah KJA, produksi per KJA, produksi total dan frekuensi kematian ikan di Waduk Cirata, Jawa Barat (Sumber: Abery et al., 2005) Figure 8. Variation on number of cage culture, cage culture production, total production, and fish kill frequency in Cirata Reservoir, West Java (Source: Abery et al., 2005) Jumlah KJA (Number of cages) Produksi (Production) (ton) Produksi per KJA (Production per cages) (kg) Kematian ikan (Fish kill ) (ton) Jumlah KJA/produksi Number of cages/production (ton) 60000 0 Produksi per KJA (kg)/kematian ikan (ton) Production per cages (kg)/fish kill (ton) 2500 50000 40000 30000 20000 10000 2000 1500 1000 500 0 Jumlah KJA (Number of cages) Produksi (Production) (ton) Produksi per KJA (Production per cages) (kg) Kematian ikan (Fish kill ) (ton) Jumlah KJA/produksi Number of cages/production (ton) 60000 0 Produksi per KJA (kg)/kematian ikan (ton) Production per cages (kg)/fish kill (ton) 2500 50000 40000 30000 20000 10000 2000 1500 1000 500 0 Variasi perubahan jumlah KJA, produksi per KJA, produksi total dan frekuensi kematian ikan di Waduk Cirata, Jawa Barat (Sumber: Abery et al., 2005) Figure 8. Variation on number of cage culture, cage culture production, total production, and fish kill frequency in Cirata Reservoir, West Java (Source: Abery et al., 2005) 503 J. Ris. Akuakultur Vol.6 No.3 Tahun 2011: 495-506 pribadi). UCAPAN TERIMA KASIH Penulis mengucapkan terima kasih kepada tim survei pemanasan global Pusat Penelitian dan Pengembangan Perikanan Budidaya yang telah membantu kelancaran pengumpulan data. Penelitian ini merupakan bagian dari penelitian “dampak pemanasan global ter- hadap perikanan budidaya” Pusat Penelitian dan Pengembangan Perikanan Budidaya T.A. 2010. (1) Ketersediaan data yang berkelanjutan (time series) yang kadang kala sulit diperoleh terutama data kondisi lingkungan perairan. Kalaupun data perikanan tersedia, umumnya masih bersifat parsial. (2) Koordinasi lintas sektoral antar berbagai bidang ilmu masih terhambat dalam pelaksanaannya. DAFTAR ACUAN Abery, N.W., Sukadi, F., Budhiman, A.A., Kartamihardja, E.S., Koeshendrajana, S., Buddhiman, & De Silva, S.S. 2005. Fisher- ies and cage culture of three reservoirs in West Java, Indonesia: a case study of ambi- tious development and resulting interac- tions. Fisheries Management and Ecology, 12: 315–330. (3) Hasil-hasil penelitian yang kurang signifikan kadangkala susah untuk ditemukan, yang kemungkinan hasil tersebut dapat dikaitkan dengan kondisi iklim yang terjadi. (4) Kombinasi pemanfataan model ekosistem dengan data histori masih belum banyak dianalisis. Baba, K., Sugawara, R., Nitta, H., Endou, K., & Miyazono, A. 2009. Relationship between spat density, food availability, and growth of spawners in cultured Mizuhopecten yessoensis in Funka Bay: concurrence with ENSO. Canadian Journal of Fisheries and Aquactic Sciences, 12: 6-17. Selain keempat hambatan tersebut, tentunya masih terdapat hambatan yang lebih spesifik, namun kondisi ini menjadikan tantangan tersendiri dan membuka peluang penelitian pemanasan global. Metode yang sangat mungkin dilakukan untuk bidang budidaya perikanan yaitu dengan pemodelan, seperti yang telah berkembang dibidang lainnya (pertanian, perikanan tangkap, dll) Bardach, J.E. 1989. Global warming and the coastal zone. Climatic Change, 15: 117- 150. Tantangan Penelitian Ke Depan Kegiatan ini mengumpulkan data kondisi kualitas perairan secara vertikal dan horizontal yang direncanakan selama 5 kali pengambilan data lapangan dalam satu tahun dan direncanakan selama 4 tahun berjalan, sampai tahun 2014. Ketersediaan data ini tentunya akan sangat membantu dalam memberikan gambaran secara nyata kondisi Waduk Cirata guna mendukung pengelolaan waduk yang lebih baik. dampak pemanasan global. Analisis awal ini memberikan gambaran yang cukup menarik terhadap isu pemanasan global yang terjadi. Namun untuk dapat memberikan hasil analisis yang lebih spesifik masih diperlukan tambahan histori data baik dari aspek iklim dan perikanan. Hasil dari penelitian ini diharapkan dapat menambah wawasan sehingga nantinya dapat diimplementasi dilapangan guna mencegah akibat yang lebih buruk dari adanya dampak pemanasan global. Untuk memperoleh hasil kajian yang komprehensif tentang kemungkinan dampak pemanasan global terhadap ekosistem waduk masih dirasakan sangat kurang dalam pelaksanaannya, hal ini disebabkan karena beberapa alasan yaitu (Blenckner, 2005): KESIMPULAN Beukema, J.J. & Dekker, R. 2005. Decline of re- cruitment success in cockles and other bivalve in the Wadden Sea: possible role of climate change, predation on postlarvae and fisheries. Marine Ecology Progress Se- ries, 287: 149-167. Kajian kemungkinan dampak pemanasan global terhadap ekosistem waduk tidak hanya dipengaruhi oleh kondisi luar ekosistem, namun juga harus memperhatikan interaksi dalam waduk itu sendiri. Dengan memperhati- kan kedua aspek tersebut tentunya akan memberikan analisis yang lebih komprehensif mengenai respon waduk terhadap pemanasan global. Penelitian ini dilakukan untuk men- sintesis kondisi Waduk Cirata dilihat baik aspek dari luar dan dalam terhadap kemungkinan Blenckner, T. 2005. A cenceptual model of cli- mate-related effects on lake ecosystems. Hydrobioilogia, 533: 1-14. Byod, C.E. & Pine, H. 2006. Application of agrometeorology to aquaculture and fish- eries. WMO/CAgM Guide to Agricultural 504 Kondisi meteorologi, klimatologi, dan perikanan ..... (I Nyoman Radiarta) Cambridge, United Kingkom and New York, NY, USA. Meteorological Practices (GAMP) Chapter 14. Didownload tanggal28 Juli 2011: http:/ /www.agrometeorology.org/files-folder/ repository/gamp_chapt14final.pdf. Kapetsky, J.M. 2000. Present applications and future needs of meteorology and climatol- ogy data in inland fisheries and aquacul- ture. Agricultural and Forest Meteorology, 103: 109-117. Cochrane, K., De Young, C., Soto, D., & Bahri, T. (eds). 2009. Climate change implication for fisheries and aquaculture: overview of cur- rent scientific knowledge. FAO Fisheries and Aquaculture Technical Paper. No. 530. Rome, FAO, 212 pp. Krismono & Wahyudi, N.A. 2002. Analisis kebijakan pengelolaan KJA sebagai salah satu kegiatan pengelolaan danau dan waduk. Dalam Heruwati et al. (eds.). Analisis Kebijakan pembangunan perikanan 2001. Pusat Riset Pengolahan Produk dan Sosial Ekonomi Kelautan dan Perikanan, hlm. 75- 85. Costa-Pierce, B.A. 1998. Constraints to the sustainability of cage aquaculture for re- settlement from hydropower dams in Asia: an Indonesian case study. J. of Environ- ment and Development, 7: 333-363. Krismono, A.S.N., Krismono, & Kartamihardja, E.S. 2001. Dampak budidaya ikan dalam keramba jaring apung terhadap pening- katan unsur N dan P di perairan Waduk Saguling, Cirata dan Jatilihur. J. Penelitian Perikanan Indonesia, 7: 22-30. De Silva, S.S. & Soto, D. 2009. Climate change and aquaculture: potential impact, adapta- tion and mitigation. In Cochrane, K., De Young, C., Soto, D., & Bahri, T. (eds). Cli- mate change implication for fisheries and aquaculture: overview of current scientific knowledge. FAO Fisheries and Aquaculture Technical Paper. No. 530. Rome, FAO, p. 151-212. Meisner, J.D. & Shuter, B.J. 1992. Assessing potential effect of global climate change on tropical freshwater fishes. tics of non-point source pollution in the Watershed of Miyun Reservoir, Bejing, China. Chinese Journal of Geochemistry, 21: 89-95. Xiaoyan, W., Yixun, W., Tingfang, L., Wei, H., Qiuju, H., & Hongfen, Z. 2002. Characteris- Ecological responses to recent climate change, Nature, 416: 389-395. Xiaoyan, W., Yixun, W., Tingfang, L., Wei, H., Qiuju, H., & Hongfen, Z. 2002. Characteris- J. Ris. Akuakultur Vol.6 No.3 Tahun 2011: 495-506 KESIMPULAN Geo Journal, 28(1): 21-27. Harley, C.D.G., Hughes, A.R., Hultgren, K.M., Miner, B.G., Sorte, C.J.B., Thornber, C.S., Rodriguez, L.F., Tomanek, L., & Williams, A.L., 2006. The impact of climate change in coastal marine systems. Ecology Letters, 9: 228-241. Radiarta, I N. & Ardi, I. 2009. Pemetaan distribusi keramba jaring apung ikan air tawar di Waduk Cirata, Jawa Barat dengan multi tem- poral data ALOS AVNIR-2. J. Ris. Akuakultur, 4: 439-446. Radiarta, I N., Prihadi, T.H., & Sunarno, T. 2005. Pemantauan perikanan budi daya berbasis KJA di Waduk Cirata dengan menggunakan multi-temporal data landsat 7. Warta Penelitian Perikanan Indonesia, 11: 2-8. Handisyde, N.T., Ross, L.G., Badjeck, M-C., & Allison, E.H. 2006. The effects of climate change on world aquaculture: a global per- spective. Available online at www. aquacultur.stir.ac.uk/GISAP/gis-group/ climate.php. Saitoh, S-I., Mugo, R., Radiarta, I N., Asaga, S., Takahashi, F.,Hirawake, T., Ishikawa, Y., Awaji, T., & Shima, S. 2011. Some opera- tional uses of satellite remote sensing and marine GIS for sustainable fisheries and aquaculture. ICES Journal of Marine Science, 68: 687-695. Hayami, Y., Ohmori, K., Yoshino, K., & Garno, Y.S., 2008. Observation of anoxic water mass in a tropical reservoir: the Cirata Res- ervoir in Java, Indonesia. Limnology, 9: 81- 87. Hijmans, R.J., Cameron, S.E., Parra, J.L., Jones, P.G., & Jarvis, A. 2005. Very high resolution interpolated climate surfaces for global land areas. International Journal of Clima- tology, 25: 1965-1978. Soemarwoto, O., Roem, C.M., Herawati, T., & Costa-Pierce, B.A. 1990. Water quality suit- ability of Saguling and Cirata reservoirs for development of floating net cage aquac- ulture. In: B.A. Costa-Pierce, O. Soemarwoto (eds) Reservoir Fisheries and Aquaculture Development for Resettlement in Indone- sia. Manila, Philippines: ICLARM, Technical Report, 23: 18–111. IPCC. 2007. Summary for policymakers. In: Cli- mate change 2007: the physical science basis. Contribution of working group I to the fourth assessment report of the inter- governmental panel of climate change [Solomon, S., D. Qin, M. Manning, Z. Chen, M. Marquis, K.B. Averyt, M. Tignor and H.L. Miller (eds.)]. Cambridge University Press, Walther, G-R., Post, E., Convey, P., Menzel, A., Parmesan, C., Beebee, T.J.C., Fromentin, J- M., Hoegh-Guldberg, O., & Barlein, F. 2002. 505 J. Ris. Akuakultur Vol.6 No.3 Tahun 2011: 495-506 Ecological responses to recent climate change, Nature, 416: 389-395. tics of non-point source pollution in the Watershed of Miyun Reservoir, Bejing, China. Chinese Journal of Geochemistry, 21: 89-95. 506
https://openalex.org/W2537071554
https://cityterritoryarchitecture.springeropen.com/track/pdf/10.1186/s40410-016-0048-7
English
null
Urban disorder and vitality
City, territory and architecture
2,016
cc-by
5,852
Abstract The concepts of order and disorder applied to urban and territorial issues involve complex definitions. Why do cities, in spite of the effort made to give them order, even though from time to time this order has been codified in different ways, end up being untidy? In the context in which the two concepts will be used in this paper it is not possible to imagine them as alternatives, but they are taken as dialectically constituting territorial reality. “Order” and “disorder” oppose each other but do not clash with each other. In the hectic organisation of urban and territorial reality one stimulates the other and each, in opposing, determines change. The inclination towards order (or tendency towards order) tends, on the one hand, to “repair” the disorder but, on the other, brings out the conditions for disorder to show itself again and materialise with its problems but with the vitality implicit in change. Change brings disorder but public commit- ment through institutions cannot but aspire to recover a level of order, hopefully, more advanced. Order and disorder are closely linked with each other, one producing the other in a circular process. The urban, precisely because of its constituent construction (social, productive and economic variability; clash between powers and options of models of society) cannot be stable, but the continuous recovery of “order” responds not only to functional needs, but also to ethical options: we should not consider all urban “order” as positive, compared with negative disorder; there are experiences of oppressive and coercive urban order. It is always disorder that determines better levels and quality of order. Though it may be the dynamic factor of every urban condition, we must remember that it always requires new order from which to start out again. Disorder, however it is identified, constitutes a permanent fact, inherent in the urban condition; it is neither the result of wrong planning (sometimes also this), nor of a perverse will, but rather of the dynamic mechanisms of the city itself. Keywords:  Alternation between order and disorder, Urban space organisation, Vitality Urban development, the work of planning and organising the city and territory, is characterised by a strong voca- tion to impose order. © The Author(s) 2016. This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. Urban disorder and vitality Francesco Indovina* Indovina City Territ Archit (2016) 3:18 DOI 10.1186/s40410-016-0048-7 *Correspondence: indovina@iuav.it Department of Architecture, Design & Urban Planning, University of Sassari, Palazzo del Pou Salit, Piazza Duomo 6 Alghero, 07041 Sassari, Italy Abstract When an urban planning instru- ment defines what, where, when and how it is possible to “realise” some change in the organisation of space it ends up modifying what exists and imposing a new kind of “order”. We tend to think of “physical” order but actually, it is a case of order that has a variety of aspects, includ- ing the indications of “meaning” space organisation produces. from an activity without a code that responded to social, economic and life requirements and ones based on func- tionality and representation, to a discipline often based on self-determination. In the cultural history of the discipline certain traits can be picked out in which an interest for functional order seemed to prevail, though in fact the attention for the city and territory that this activity has adopted is the overall one involving functionality but also social struc- ture, co-habiting, power, culture, and sacred and profane rites. Each kind of urban order, in its divisions and con- struction, may have been the source of conflicts, oppres- sion, liberation, marginalisation and exaltation (Indovina 2016).hl Urban development, giving order to settlement, is extremely ancient and arose with the first settlements, even though the discipline was codified in modern times: The question that forces us to reflect is very simple: why do cities, in spite of the effort made to give them order, even though from time to time this order has been codified in different ways, end up being untidy? Indovina City Territ Archit (2016) 3:18 Page 2 of 7 social, cultural, political, institutional, etc.) able to leave a footprint on urban organisation. The concepts of order and disorder applied to urban and territorial issues involve complex definitions, and to understand them it is worth referring to some facts. If each function were free to leave its own “footprint” on the urban territory, it is clear that the result could not but be a sort of marsh where footprints overlapped and depended on the weight of the bodies (the interested par- ties) creating them. Presumably, however, footprints have to follow rules (we might say the “plans” or any other instrument managing the territory), but it is only an assumption that rules can accurately steer the bodies and therefore the respective footprints. Abstract Spatial order in the country, often admired, is the result of a need; it satisfies that expressed by production which presents very limited alternatives. Change is not excluded (crop variation, agrarian science achievements, use of new technologies, etc.); the point may even be reached of building a new agrarian landscape with order that is dif- ferent. Cultural movements linked with tradition some- times oppose these changes, harming the intrinsic nature of the agrarian landscape, which is destined to change. Needs and reduced alternatives may be considered key categories in determining the agrarian landscape, but we are not dealing with two categories that could be imag- ined to be playing the same role in determining the urban landscape. Contemplation that is not always consistent, not always progressive, and not always attentive to the general interest.h In the city it is not possible to pick out such a bind- ing, decisive need, or, rather, there is a great number of highly diversified needs and they express inhomogene- ous content and justification; not only, but they are needs that are not compelling like in the country, as each one is compatible with various alternatives, therefore with dif- ferent models of urban organisation. The urban condition is characterised not by the absence of production but, rather, by the organisation of this production, by a greater presence of functions, greater unnaturalness of the con- text, the existence of functions integrated with each other and, at the same time, of functions that are antagonistic or incompatible, but above all by the high concentration of people with characteristics, projects, needs and desires that are different from each other. Differences that are also manifested as an expression of power (economic, The history of the city teaches how changeable it can be, in its shape and organisation, and how the change is the fruit, mainly, of change in social structure, produc- tion organisation and power organisation itself. Urban space organisation appears as a “passive” outcome of these changes, not as being determined by a factor that imposes change. The dynamics (the change) of the city and its organisation have to take into account its “hard” part: the built city, its history and its works: each new order does not wipe out the past but fits into an exist- ing context (hopefully, respecting it), perhaps giving it a purpose (from various points of view, including social) in the new reality. Abstract The doubt is not sug- gesting the fact that rules can be slack (this, too), or that bodies move deliberately opposing the rules (this, too), but the fact that the “needs” of the single bodies change over time in a process of interrelation between them, and that the possibilities offered account for the needs of the single body and the encounter of various bodies. Cultivated land shows us a tidy territory, and it is immediately understood that this comes directly down from the organisation of agricultural production, from the techniques used and the social relations character- ising farming work. The orography of the territory, too, with the crops compatible with the different heights above sea-level, serves the purpose of spatial design; its appearance, colours and scents change with the change of seasons or the change in production and technology adopted. Basically, there is a “strength”, agricultural pro- duction, with very limited alternatives, giving particular spatial solutions. “Dry walls”, which surround fields or enclosures and which we marvel at, are also a rational and reasonable solution for the use of stones unearthed by the plough; land reclamation gives substance to spatial construction. Just as canals and ditches serve the purpose of taking water where needed, while rows of trees con- solidate their banks, and lanes and farm-roads aim at the movement of men, animals and machinery, depending on the need. It should be pointed out once more that while for the country order is imposed by production, for the city, as well as production, the multiplicity of social subjects are important, as is the prominence of the service functions, events, needs, etc. that are projected onto the organisa- tion of space. Urban space organisation requires a spon- taneous directive; agricultural order, we might say, is given, while urban order has to be constructed. Urban order contemplates: the need to guarantee hygiene and the best exposition as regards the climatic situations of the place; the possibility of carrying out and developing productive and economic activities; “power” representa- tion; the citizens’ life needs; the intention to differentiate places by the presence of different social strata; the devel- opment and localisation of services; the need to avoid mixing functions little or not at all compatible with each other, and so on. Abstract On the one hand, imposed order presupposes within itself a principle of stability; we could say that the enforcement of order does not have aims that are just immediate but also future ones, but, as has been seen, this claim appears to be contradicted by the character of the territorial processes that are by nature dynamic, featuring changes and movements not always predict- able. The economic, social, demographic, cultural, tech- nological and power mechanisms involving the city and territory are of such an innovative impact that they can- not but cause change, i.e. a challenge to the pre-existing order. But there is more, the irruption of change, namely disorder, should be taken as positive or at least inevitable. If we were to assume that the enforcement of order were aimed at improving the organisation of the city and territory and ultimately at improving the living condi- tions of those inhabiting and “using” that territory, we would need to consider any challenge to order as a pro- spective worsening of those living conditions. But it does not seem to be like this, not only because disorder arises round those who have settled in the city or territory and use it, with the prospect of improving their condition, but On the one hand, imposed order presupposes within itself a principle of stability; we could say that the enforcement of order does not have aims that are just immediate but also future ones, but, as has been seen, this claim appears to be contradicted by the character of the territorial processes that are by nature dynamic, featuring changes and movements not always predict- able. The economic, social, demographic, cultural, tech- nological and power mechanisms involving the city and territory are of such an innovative impact that they can- not but cause change, i.e. a challenge to the pre-existing order. But there is more, the irruption of change, namely disorder, should be taken as positive or at least inevitable. Each change, however, rapid or slow, does not wipe out the past organisation of space, but there are phenom- ena of continuous transformation and adaptability. The organisation of space is a continuous task of conserva- tion-destruction-innovation-construction: what is pre- served is not always appreciated; often what is destroyed produces criticism, regret and the quest for revival; inno- vation, though real, is presented not rarely as an illusion; what is built seldom gains general approval. Abstract Change is at the same time destructive and protective; the present also has elements of the past and, fortunately, elements of the future (which we are not perhaps able to recognise). Indovina City Territ Archit (2016) 3:18 Page 3 of 7 Urban organisation actually undergoes the effects of continuous alternation between order and disorder. In the context in which the two concepts will be used in this paper it is not possible to imagine them as alternatives, but they are taken as dialectically constituting territo- rial reality. “Order” and “disorder” oppose each other but do not clash with each other. In the hectic organisation of urban and territorial reality one stimulates the other and each, in opposing, determines change. What we mean to say is that the inclination towards order (or ten- dency towards order) tends, on the one hand, to “repair” the disorder but, on the other, brings out the conditions for disorder to show itself again and materialise with its problems but with the vitality implicit in change. above all because the inevitable innovation, may, in gen- eral, be considered ameliorative. Highly complex economic, social, political and cultural designs are projected onto the city and its transforma- tions. It is impossible that the city be domesticated and dominated by a single interest, even when this appears as strong, and when it avails itself of the strength of eco- nomic and political power. The overall design always seems incoherent or, rather, is the outcome of compro- mises between different interests and strong points. But from these strengths, their compromise, their agree- ment or disagreement, from the conflicts, the city takes shape and gives itself organisation, a type of order. Order that seconds evolution but, at the same time, creates contradictions. Order and disorder are closely linked with each other, one producing the other in a circular process. They are like Siamese twins: one takes pains to find the most comfortable position for itself, but this does not mean it is comfortable for the other, too; the latter reacts and achieves a more comfortable position for itself but uncomfortable for the other. Abstract This metaphor might make clear how the dynamic relation between order and disor- der is continuous, not linear and may never find a point of stability.h Fundamentally, urban order is not independent from the requirements of various kinds (economic, social, cul- tural and of life) that the city produces; but none of these needs tends to fully prevail, precisely due to the opposing dialectics of the various requirements; urban order is not the outcome of mediation between the various require- ments but, rather, gives rise to a solution that includes spaces for the interests of each to be realised, whilst simultaneously leaving antagonistic spaces. Whatever meaning we wish to give to these statements, we cannot ignore the fact that men and women occupy “space” and organise it according to material and intel- lectual needs. The reality that springs from it is neither fortuitous or spontaneous; its content is different in pro- portion to the growth of knowledge and the type of co- existence chosen (or imposed), to the regime regulating production relations, but also the phase of culture. What is seen around us, from the cities to the country, repre- sents what has come down to our times from thousands of years of work on constructing, adapting, destroying, reconstructing, modifying and enlarging, to which the species has applied itself so as to overcome all obstacles that, on the one hand, “stepmother nature” has placed against the achievement of the welfare of the species and, on the other, power (economic, but not only) that has continued to hinder the achievement of freedom. The dialectic of the Siamese twins applied to the rela- tion order/disorder is easy to share, but in fact presents a large number of aporias and many consequences. A com- fortable position for one of the children, as we said, risks being uncomfortable for the other, and when the former achieves a better position, it affects that of the other child. No position exists that meets the demands of both. child. No position exists that meets the demands of both. Abstract In modernity the instruments for giving order to space, apart from being refined, are a way of reducing discre- tion, namely the will to overcome, or more simply the achievement of the interests of one party to the detri- ment of those of the collectivity or of other single indi- viduals. It is obvious that discretion is founded on power, and also in advanced democracies power (especially economic power) is not eliminated, but the “rules” that dictate space organisation, which should be valid for eve- ryone, certainly put ties on or at least hinder the success of single powers. At least, this is their intention (doubts and criticisms may be put forward on the respective realisation, but everything depends on political will or weakness). By this we do not mean to ignore the strength and importance of the individual and along this path the pos- sibility of partial processes of self-organisation (well-tem- pered individualism can be good for space organisation, too), but just to emphasise once more that space organi- sation responds to requirements of a collective, social, functional and cultural nature, and that as such, space cannot but be organised according to collective (planned) political processes. And that if self-organisation pro- cesses go beyond aspects of little importance they deter- mine, even if not intended for this purpose, breakdowns in the collective organisation of space. We mean to maintain that in order to achieve urban order (however defined) the existence of a set of rules is taken for granted, which indicate the ways in which the city is organised so as to enable its efficient and effective functioning, with the satisfaction of everyone or prefer- ring some (this is a variable of politics). While it is obvi- ous that these rules vary over time and in space, it should be emphasised that their application is a manifestation of politics or, if preferred, a way of governing. It seems mis- leading, in effect, to believe that the existence of “good rules” can guarantee space organisation coherent with the (abstract) aims of the said rules. The rules relating to space organisation have ambiguous features, they are both perceptive and programmatic, and this ambigu- ity can in no way be eliminated given the way they are applied. Abstract It is certain, however, that a static state does not exist; were this mani- fest it would be the sign of a remoteness from the con- tinuous flow of evolution and innovation. If we were to assume that the enforcement of order were aimed at improving the organisation of the city and territory and ultimately at improving the living condi- tions of those inhabiting and “using” that territory, we would need to consider any challenge to order as a pro- spective worsening of those living conditions. But it does not seem to be like this, not only because disorder arises round those who have settled in the city or territory and use it, with the prospect of improving their condition, but Indovina City Territ Archit (2016) 3:18 Page 4 of 7 The field of spatial order is not one of “rational” choices (depending on epochs) but rather of “political” choices. The city and territory are a field of tensions and conflicts; however much the species is civilised it remains divided by interests, often contrasting, that aspire to “appropriat- ing” space, and spatial organisation that bears witness to their power (or absence of power). This is social “typol- ogy” that is projected onto the space: its conflictive- democratic or rather pacified-authoritarian features (or, more to the point, where the conflicts are repressed) find their configuration in space organisation (Fregolent and Savino 2013). time is a very important feature; density, also understood as the concentration of change phenomena. In recent times, with the establishment of liberalism also at the level of organisation of the territory, so that organised spaces may seem like a conflict between indi- viduals (the other side of the coin is collaboration), it has not been possible to deny the existence of processes of exchange, integration, collaboration and competition, and conflicts between individual interests. At the same time, it must be acknowledged that stakeholders (very powerful groups) exist and that the struggle for space appropriation is not only interpretable as the result of “competition” between individuals but, rather, as a politi- cal clash between more or less codified interested parties, while social conflicts appear as the initiative of the social forces (economically the weakest) to defend the general interests (Belli 2016). Abstract The city (and the territory) are no more than an exer- cise field for various options maintained by different forces, often with alternative objectives; it is indeed due to the presence of opposed forces that the city, in gen- eral, and up to now, has never completely responded to the interests of one party. Just as the Siamese twins seek but do not find a position that is comfortable for both, the city moves continuously between order and disorder, between ruptures and recomposition. It is possible to return to the dialectic of the Siamese twins: the movement of one of the two children stimu- lates the other to change its place; the intervention of a “third” party (in the case of the city, politics) may arrange the two children in such a way that each achieves a com- fortable situation, even if it is known that it will be of brief duration as very soon they will move. Perception of order and its advantages and of disor- der and its disadvantages is not only not immediately clear, but can only be the outcome of a reflective pro- cess, which cannot but bypass individuals to take on the complete, complex urban society and its values. If it were true, as we have mentioned more than once previously, that (functional, aesthetic, social) order did not, in the past evolution of the human species, constitute a sponta- neous event but the outcome of a project, then we would need to devote some thought to this. If urban dynam- ics, however defined, are on one side a challenge (partial and/or total) for this project, then, on the other side, they actually expect a new project at the same time. Planning is an instrument that in a “coercive” way defines urban order; generally, in its application it has to overcome obstacles of meaning that end up limiting its action, or to contrast the work of power groups that attempt to make it ineffective, or, again, keep account of the behaviour of citizens who evade its rules.h The statement that planning is the suitable instrument to give answers to the problems of the city and territory nowadays does not meet with much support. The prev- alent cultural, ideological and professional tendencies assert the need for a drastic review of it, or even its effec- tive elimination. Abstract The guarantee of the results proves closely linked with the expression of a specific political will (an inten- tion) and the management of transformation processes (another aspect of political will). But the ordered condi- tion is only temporary; disorder tends to emerge from the tidy mesh. As we have already said, disorder, as considered here, can take on different aspects but is nevertheless charac- terised by the “rupture” of an order that corresponds to a society’s systems. It cannot be picked out as an exclu- sively negative element, for it actually represents positive distortions, too, of the systems set up, and can introduce elements of dynamism and innovation and translate social transformations into spatial terms also; in a cer- tain sense it corresponds to the vitality of a specific urban condition. From this point of view it should not only be considered the establishment (against the collectivity) of specific, easily identified individual interests (often spec- ulative on the economic plane, “degrading” on the social plane, and frustrating from a cultural standpoint) but, rather, a “composition” of many things, the expressions of the (precarious) equilibrium that society has achieved in a particular phase. We thus need to think that the phenomena that encourage disorder belong both to the exogenous and the endogenous categories: new technology may require changes in the organisation of the city (namely: new order), but “requests” may be seen to emerge directly from the citizens and the organised social forces that require changes in urban order to improve their specific When the variation (the urban dynamics) is complex, of considerable size and speed, this cannot but cause dis- order (with respect to the previous order). In short, the characteristics of urban transformations that determine disorder are: quantity, i.e. the size of the changes com- pared with the size of the city; speed, i.e. transformation Indovina City Territ Archit (2016) 3:18 Page 5 of 7 (wherever located) who would like to “subject” order to their own interests or points of view, to assert, on the contrary, principles of freedom, coexistence, solidarity and equality, though still leaving space for change (Nel. lo 2012). urban life condition. The political nature of this demand places it on the terrain of the comparison and strength relations. Abstract On one side, it does not seem possible to oppose the request for a review and modernisation of planning systems to take changes in society into account while, on the other, we forget that attention to the changes in society and, therefore, the respective adapta- tion of the instrument of intervention, is a constituent element of planning itself (even though in practice this attention has not always been shown). One might ask what drives a collectivity to a sort of Sisyphean torment, namely to the continuous repetition of an action that is useless: to set up, work for, commit oneself to the achievement of urban order that is not last- ing. One might maintain that this need is the only one compatible with the possibility of survival of the spe- cies, which has on the one hand to oppose the forces of nature that would like to blow it away, but must, on the other, fight the stimulus towards the disintegration of coexistence with a counter-stimulus consisting of rules, of norms and values that are not stable but continuously renewed, though ever present. We are referring to good planning, which we would define as that which pays great attention to the collec- tive interest and an improvement in the quality of life of inhabitants, and is organised using suitable instruments, having tackled the democratic encounter in its approach, taken into account processes underway and qualified and quantified the (negative and positive) effects of its action.ihi To design and achieve urban order is fundamentally an option in favour of coexistence. A project that consti- tutes an attempt, not always perfect, to respond both to demand expressed or implicit, not just of functions but also meaning. As can be observed, even though ideas and specific situations may drive us towards individual- ist exaltation that tends to be unbridled, the species has an imprinting that urges it towards coexistence; contem- porary life, increasingly complex, effectively imposes greater and better regulation (in spite of different appear- ances), entrusting each individual or social group once more with full freedom in belonging to spheres previ- ously regulated and taking on the need to regulate new, different spheres not considered before. if But good planning also finds obstacles ahead. The first is a certain “doubling” that characterises the attitude of the “citizen” and his “common sense” as regards the city. Abstract This “common sense” is loaded with positive expecta- tions and requests: the territory is to be safeguarded, land consumption reduced, the landscape protected, hydro- geological reclamation to be carried out, the city must function, suburban decay must be eliminated, limits and rules for growth need to be introduced, and the environ- ment must be healthy, etc. Any plan seeking to realise these expectations and meet the requests expressed, would assert the “val- ues” contained in them and should be welcomed with great approval and enthusiasm. But things are not like this. For every public decision on urban organisation f We have thus reached a crucial knot: urban order design. Design that will resist pressure from the “powers” Indovina City Territ Archit (2016) 3:18 Page 6 of 7 Page 6 of 7 predefined objectives (an adjustment able to take into account environmental dynamics). and reorganisation, for all regulatory action, each tie or limit imposed, opposition and differentiation with vary- ing degrees of importance arise. These refusals do not have their origin in the defence of private and individual interests, which would be understandable, but are justi- fied by collective action to protect the general interest. Considerable distrust has matured over time in any pub- lic decision or choice that may also generate “apathy” or indifference; the notable errors, programmatic inconsist- ency, not to mention the spread of corruption of public workers, explain this attitude, but it also originates in the prevalence of a political culture that denies public action true consistency and utility. It should also not be forgotten that at the moment in which the great options in principles turn into specific decisions, private interests tend to emerge. Subjects do not contest the great options, they would happily see them achieved, but possibly with- out harming their own interests. Political decision-mak- ing, and therefore planning, finds itself in the situation of being appealed to, but at the same time rejected. It may be stated that planning finds it enjoys generic consensus, but also equally strong opposition. It is my personal experience that each action that is accomplished, even if well targeted, may determine unforeseen outcomes, some of which can assume a nega- tive value, “perverse effects”, not only negative in them- selves but also contrary to all expectations and forecasts. Abstract Unforeseen effects, also when perverse, suggest a careful analysis of the mechanisms activated and the responses of the interested parties involved, and not the impossibil- ity of public action. Unforeseen effects, moreover, can in some cases determine innovations.l It has been maintained that the conflict represents a positive element in that it expresses at the same time uneasiness and a request, provided actions exist and are put in place to solve such conflicts.l l However, in the present historic phase the conflict appears also to show a selfish effect: Not In My Back Yard (or NIMBY). A work (an oil pipeline, a landfill, wind power station, street, refugee camp, etc.) deemed in some way necessary is not wanted on one’s own territory, but preferred on “another” territory. What seems to prevail in these attitudes, very often justified, but not always, by the effects these structures could cause in the local situation, is a sort of local egoism, the child of a prevailing identity attitude that is extremely mean and utterly short-sighted. What has previously been observed as regards urban dynamics, the speed of change, and the increased com- plexity of the city and territory, challenges planning in itself, according to some (interest groups and scholars), or at least the current form of planning; what is criticised is the compulsory nature of the choice of plan.h Obstacles to improving and renewing means and pro- cesses of territorial planning are not thought to exist, provided improvements and renovation are able to increase the efficiency and public effectiveness on the management of urban and territorial transformations. It is not a case of stating an ideological position, but of the awareness that the organisation of the city and territory cannot but have a public/collective guide, able to improve the inhabitants’ living conditions.i The idea that society’s dynamism is much more rapid and does not easily endure the ties of the plan does not justify denying the need for the plan; greater and better planning is actually required. Abstract The request put forward by various parties to respond to the dynamism of society is to develop a flexible plan; this request only apparently seems to side with the need for planning; it is actually the complete denial of any form of planning.lf Disorder, however it is identified, constitutes a perma- nent fact, inherent in the urban condition; it is neither the result of wrong planning (sometimes also this), nor of a perverse will, but rather of the dynamic mechanisms of the city itself. Change brings disorder but public commit- ment through institutions cannot but aspire to recover a level of order, hopefully, more advanced. The urban, pre- cisely because of its constituent construction (social, pro- ductive and economic variability; clash between powers and options of models of society) cannot be stable, but the continuous recovery of “order” responds not only to func- tional needs, but also to ethical options: only the “strong- est” (from all points of view) know how to take advantage of disorder; the weakest usually pay a high price. But at the same time we should not consider all urban “order” as positive, compared with negative disorder; there are expe- riences of oppressive and coercive urban order. A flexible planis effectively an antithesis, for it presup- poses objectives that have not been defined or that may be continuously redefined according to needs; but plan- ning, obviously, is such because it defines objectives and a strategy to achieve them. If we were to consider the plan process as formed of defined objectives and “poli- cies” (specific public actions) suitable to enable these objectives to be achieved, in a highly dynamic situation with unforeseen changes, continuous reconsideration or updating of these policies—namely the means to achieve the objectives—would be necessary and useful. These are policies that could be considered flexible and modified, according to needs, to achieve defined and unchanged objectives. What is suggested, and would seem adequate to respond to many specific situations is, therefore, not a flexible plan but, rather, flexible instruments to achieve Indovina City Territ Archit (2016) 3:18 Page 7 of 7 Indovina City Territ Archit (2016) 3:18 Indovina City Territ Archit (2016) 3:18 It is disorder that breaks up all oppressive order, and it is always disorder that determines better levels and quality of order. References Belli G (2016) A colloquio con l’urbanistica Italiana. Interviste a B. Secchi, F. Indovina, L. Mazza e PL. Crosta. Clean, Napoli Fregolent L, Savino M (eds) (2013) Economia, società, territorio. Riflettendo con Francesco Indovina. FrancoAngeli, Milano Indovina F (2016) Ordine e disordine (in press) Nel.lo O (2012) Francesco Indovina Del analisi del territorio al gobierno de la ciudad. Icaria Editorial, Barcellona Abstract Though it may be the dynamic factor of every urban condition, we must remember that it always requires new order from which to start out again. Received: 27 September 2016 Accepted: 12 October 2016 Competing interests Competing interests The author declares that he has no competing interests. p g The author declares that he has no competing interests. Received: 27 September 2016 Accepted: 12 October 2016 Received: 27 September 2016 Accepted: 12 October 2016
https://openalex.org/W4238630295
https://journals.unisba.ac.id/index.php/JRA/article/download/54/30
Indonesian
null
Pengaruh Akuntansi Dana Desa dan Partisipasi Masyarakat terhadap Pengelolaan Dana Desa
Jurnal Riset Akuntansi
2,021
cc-by
2,678
ERROR: type should be string, got "https://doi.org/10.29313/jra.v1i1.54 https://doi.org/10.29313/jra.v1i1.54 Journal Riset Akuntansi Yustin Novia Pratiwi* \nProdi Akuntansi, Fakultas Ilmu Ekonomi dan Bisnis, Universitas Islam \nBandung, Indonesia. *yustinnoviapratiwi@gmail.com Corresponding Author \nEmail: yustinnoviapratiwi@gmail.com Pengaruh Akuntansi Dana Desa dan Partisipasi Masyarakat terhadap \nPengelolaan Dana Desa Yustin Novia Pratiwi* \nProdi Akuntansi, Fakultas Ilmu Ekonomi dan Bisnis, Universitas Islam \nBandung, Indonesia. Yustin Novia Pratiwi* Yustin Novia Pratiwi* \nProdi Akuntansi, Fakultas Ilmu Ekonomi dan Bisnis, Universitas Islam \nBandung, Indonesia. *yustinnoviapratiwi@gmail.com Abstract. Today village funds are one of the topics being discussed hotly, in their implementation of the many \ndeviations of priority development funds carried out because they increase understanding of village funds and \nincrease community participation in village fund management. This research was made with the aim to study \nthe effect of village funds and community participation on village fund management. The test tool in this study \nis a simple and multiple linear regression analysis using SPSS software. This research uses quantitative \nmethods using surveys. In this study, the technique used in collecting data consisted of 62 questionnaires \ndistributed by 62 people to villages and village communities in the area of West Bandung Regency. The results \nshow that the village financial statements have gone well against the system, community participation has gone \nwell and involves accounting of village funds and community participation in the management of village funds. Keywords: Accounting, Contribution , Management , Village Fund Keywords: Accounting, Contribution , Management , Village Fund Abstrak. Dewasa ini dana desa adalah salah satu topik yang sedang hangat dibicarakan, pada pelaksanaanya \nseringkali banyak penyimpangan dana maupun prioritas pelaksanaan pembangunan yang terjadi karena \nkurangnya pemahaman atas akuntansi dana desa dan kurangnya partisipasi masyarkat dalam pengelolaan dana \ndesa. Penelitian ini dibuat dengan tujuan untuk mengetahui pengaruh akuntansi dana desa dan partisipasi \nmasyarakat terhadap pengelolaan dana desa . Alat uji dalam penelitian ini ialah analisis regresi linier sederhana \ndan berganda dengan menggunakan software SPSS. Penelitian ini menggunakan metode kuantitatif dengan \npendekatan survey . Dalam penelitian ini, teknik yang digunakan dalam pengumpulan data berupa kuisioner \nyang disebarkan sebanyak 62 kepada para aparatur desa dan masyarakat desa di wilayah Kabupaten Bandung \nBarat . Hasil penelitian menunjukan bahwa pada umumnya akuntansi dana desa sudah berjalan dengan baik \ndisertai dengan sistemnya, partisipasi masyarakat sudah berjalan dengan baik dan terdapat pengaruh akuntansi \ndana desa dan partisipasi masyarakat terhadap pengelolaan dana desa. Kata Kunci: Akuntansi, Partisipasi ,Pengelolaan, Dana Desa. Kata Kunci: Akuntansi, Partisipasi ,Pengelolaan, Dana Desa. Corresponding Author \nEmail: yustinnoviapratiwi@gmail.com Corresponding Author \nEmail: yustinnoviapratiwi@gmail.com 24 24 25 Pengaruh Akuntansi Dana Desa dan Partisipasi Masyarakat ...| 25 A. \nPendahuluan Indonesia pernah berada pada sistem perekonomian sentralistik yaitu pada zaman rezim \nSoeharto (1967-1998). Kemudian seiring perkembangan waktu indonesia beralih pada sistem \ndesentralisasi. Desentralisasi sendiri menurut Undang-Undang No 32 Tahun 2004 adalah \npenyerahan wewenang dari pmerintah pusat kepada daerah otonom untuk mengatur dan \nmengurus urusan pemerintahan dalam sistem Negara Kesatuan Republik Indonesia. Seiring \nberjalannya waktu perekonomian di indonesia semakin gencar melakukan langkah-langkah \nperubahan dalam rangka mencapai tingkat kesejahteraan terutama dalam program kabinet kerja \nPresiden Joko Widodo yang berkaitan dengan representasi unit terkecil tonggak pembangunan \nInsfrastuktur Indonesia. Salah satu langkahnya adalah dengan dibentuknya Undang-Undang \nRepublik Indonesia Nomor 6 Tahun 2014 Dan Peraturan Mentri Dalam Negri Republik \nIndonesia Nomor 113 pasal 1 ayat 6 Tahun 2014 yang berkaitan dengan pengelolaan dana desa \nmenyatakan bahwa Pengelolaan Keuangan Desa adalah seluruh kegiatan yang meliputi \nperencanaan, pelaksanaan, penatausahaan, pelaporan, dan pertanggungjawaban keuangan desa. Peraturan tersebut menjadi angin segar bagi desa-desa di Indonesia sekaligus memberikan bukti \nketegasan dan keseriusan pemerintah dalam membangun ekonomi Indonesia serta sebagai \nsarana perlindungan secara yuridis dan pemberdayaan desa agar menjadi lebih mandiri, \nsejahtera dan demokratis . Dana desa di kucurkan dengan jumlah yang fantantis disetiap \ntriwulannya dengan tujuan untuk memeratakan kesejahteraan dan kualitas sumber daya manusia \ndi Indonesia. Pengelolaan dana desa diharapkan dapat berjalan secara optimal namun, tak jarang \ndana desa dikelola dengan sistem tidak baik. Dana desa nampaknya menjadi kesempatan atau \nlahan bagi para oknum desa untuk melakukan penyimpangan salah satunya dilansir dari \nKompas.com. Kabul santoso terkena operasi tangkap tangan KPK yang bahkan merugikan \nnegara sebesar 137.9 juta rupiah. Kemudian , dilansir dari Liputan6.com mentri keuangan Sri \nmulyani menyebutkan karena adanya transfer tetap dari anggaran pendapatan dan belanja \nnegara. Sekarang banyak muncul desa-desa fiktif yang bahkan tidak ada penduduk didalamnya. Berdasarkan latar belakang tersebut maka peneliti tertarik untuk meneliti lebih lanjut prihal dana \ndesa dengan rumusan masalah sebagai berikut: (1) Bagaimana pengaruh akuntansi dana desa \nterhadap pengelolaan dana desa? (2) Bagaimana pengaruh partisipasi masyarakat terhadap \npengelolaan dana desa? Rumusan masalah tersebut , ditujukan untuk mengetahui (1) tujuan akuntansi dana desa \nterhadap pengelolaan dana desa (2)tujuan partisipasi masyarakat terhadap pengelelolaan dana \ndesa. JRA is licensed under Creative Commons Attribution- \nNonCommercial-ShareAlike 4.0 International License B. \nLandasan Teori Teori Keagenan Menurut Jansen dan Meckling (1976) dalam Syarifudin (2014:30) dapat di \ndefinisikan sebagai suatu hubungan yang terdapat pada sebuah kontrak dimana satu orang atau \nlebih (Principal) memerintah orang lain (Agent) untuk membuat keputusan yang terbaik bagi \nPrincipal. Dalam hal ini aparatur desa menjadi agen danmendapatkan mandat untuk mengelola \ndana desa bagi masyarakat yang berperan sebagai pricipal atau sasaran adanya dana desa. Dalam \nmengelola dana desa tentunya sangat dibutuhkan laporan keuangan sebagai bentuk tanggung \njawab aparatur desa kepada masyarakat dan pemerintah pusat. Laporan keuangan dibentuk dari \nproses akuntansi atau pencatan dari setiap kegiatan selama dana desa. Akuntansi dana desa \nmenurut Sujarweni (2015:17) adalah pencatatan dari proses transaksi yang terjadi di desa, \ndibuktikan dengan nota-nota kemudian dilakukan pencatatan dan pelaporan keuangan sehingga \nakan menghasilkan informasi dalam bentuk laporan keuangan yang digunkan pihak-pihak yang \nberhubungan dengan desa. Dalam hal ini pengelolaan bukan hanya dilakukan oleh aparatur desa \nsaja tetapi seharusnya dilakukan oleh masyarakat juga. Partisipasi masyarakat sangat \ndibutuhkan untuk memastikan bahwa dana desa dilaksanakan sesuai dengan prioritas atau \nkebutuhan desa dan masyarakatnya serta untuk mengawasi jalannya dana desa . karakteristik \nlaporan keuangan menurut Ratmono dan Solihin (2015:15) sebagai berikut: Riset Akuntansi Riset Akuntansi 26 | Yustin Novia Pratiwi. 1. Relevan 1. Relevan 2. Andal 3. Dapat Dibandingkan 4. Dapat Dipahami 4. Dapat Dipahami Partisipasi masyarakat diartikan oleh Adi (2007:27) sebagai keikutsertaan masyarakat \ndalam proses mengidentifikasi masalah dan potensi yang ada di masyarakat, pemilihan dan \npengambilan keputusan tentang alternatif solusi untuk menangani masalah, pelaksanaan upaya \nmengatasi masalah, dan keterlibatan masyarakat dalam proses mengevaluasi perubahan yang \nterjadi”. prinsip partisipasi sendiri menurut Bastian (2015:119) adalah: 1. Ketepatan waktu 2. Akuntabilitas 3. Inklusif 4. Metodologi yang Tanggap dan Sesuai 5. Keberlanjutan Proses Partisipasi 6. Sumber Daya yang Memadai Dengan demikian , Teori agensi memberikan gambaran bahwa seharunya aparatur desa \n(agent) dan masyarakat sebagai (principal) saling bekerja sama dalam pengelolaan dana desa. Aparatur desa memberikan yang terbaik bagi masyarakat lewat pemahamannya terhadap \nakuntansi dana desa dan masyarakat membantu mewujudkan pengoptimalaan dana desa lewat \npartisipasinya. Agar dana desa dapat dijalan kan sesuai dengan prosedur seharusnya. C. \nHasil Penelitian dan Pembahasan Berikut ini pengaruh antara akuntansi dana desa terhadap pengelolaan dana desa yang diuji \nmenggunakan analisis regresi sederhana Tabel 1. Uji pengaruh antara akuntansi dana desa terhadap pengelolaan dana desa Tabel 1. Uji pengaruh antara akuntansi dana desa terhadap pengelolaan dana desa Variabel \nKoefesien \nregresi \nT \nhitung \nSig \nKonstanta 17.318 \n4.526 \n0.000 \nADD-\nPDD \n0.563 \n4.472 \n0.000 \nR \n0.563 \n \nr2 \n0.317 \n \nSumber : data yang diolah 2020 Hasil dari pengolahan data diatas dapat diketahui besarnya koefisien korelasi adalah \n0.563. dan Nilai r2. atau koefisien determinasi Sebesar 0.317 berarti sebesar pengelolaan dana \ndesa dipengaruhi sebesar 31,7% oleh akuntansi dana desa dengan signifikansi sebesar 0.000. Maka dapat disimpulkan bahwa terdapat pengaruh akuntansi dana desa terhadap pengelolaan \ndana desa. Hasil tersebut juga didapatkan dari beberapa faktor yang mempengaruhi salah \nsatunya Laporan keuangan desa yang lahir dari pemahaman aparatur desa terkait Akuntansi dana \ndesa. Pemahaman aparatur desa dapat menghasilkan laporan keuangan yang bukan hanya sesuai \nstandar saja tapi informasi yang dihasilkan nya juga akan mudah dipahami. Dalam hal ini \naparatur desa dituntut untuk patuh dan paham . karena sebagai agent aparatur desa juga \nberkewajibkan menghasilkan output atau keputusan yang terbaik bagi principal (masyarakat). Jalannya akuntansi dana desa juga dipengaruhi oleh tingkat pengawasan . Semakin baiknnya \npengawasan jalannya proses akuntansi dana desa , maka akan baik juga pengelolaan dana desa \nyg dihasilkan. Pengawasan dana desa dilakukan oleh pihak internal(Badan Permusyawaratan \nDesa) dan eksternal (Inspektorat Kabupaten dan Badann Pengawas Keuangan). Berdasarkan \nuraian diatas maka hipotesis dari penelitian ini sejalan atau diterima sesuai dengan penelitian ISSN: 2798-6438 Volume 1, No. 1, Tahun 2021, Hal: 24-29 27 Pengaruh Akuntansi Dana Desa dan Partisipasi Masyarakat ...| 2 yang dilakukan oleh Sri fadilah dkk (2019:1) yang berjudul pengaruh penerapan sistem \npengendalian intern pemerintahan (SPIP) dan kompetensi sumber daya manusia terhadap \nlaporan keuangan pemerintah daerah (survey pada pemerintah daerah bandung raya) \nbahwa laporan keuangan pemerintah di bandung raya pada umunya sudah berkualitas . hal tersebut berarti bahwa pemahaman akuntansi dana desa juga sudah baik . JRA is licensed under Creative Commons Attribution- \nNonCommercial-ShareAlike 4.0 International License C. \nHasil Penelitian dan Pembahasan Selain itu, \npada saat wawancara salah satu aparatur desa Dadi mengungkapkan bahwa: ”Pelaporan dana desa diusahkan selalu tepat waktu, namun terkadang informasi prihal \npembangunan sulit didapat, ada kendala seperti hilang bon dan macam-macam karena kan ketka \npembangunan masyarakat yang membuat tim untuk itu” Hal tersebut bermakna bahwa bukan hanya aparatur desa saja yang sangat \nmembutuhkan pelatihan dana desa tetapi juga masyarakat karena masyarakat juga sudah mulai \nterlibat dalam pelaksanaan dana desa dan menentukan seberapa besar ketepatan waktu dalam \npenyampaian laporan keuangan desa. p\ny\np\np\ng\nBerikut ini pengaruh antara partisipasi masyarakat terhadap pengelolaan dana desa: Tabel 2. Uji pengaruh antara partisipasi masyarakat terhadap pengelolaan dana desa Tabel 2. Uji pengaruh antara partisipasi masyarakat terhadap pengelolaan dana desa Variabel \nKoefesien \nregresi \nT \nhitung \nSig \nKonstanta 4.768 \n0.940 \n0.000 \nPM-PDD \n0.665 \n5.833 \n0.000 \nR \n0.665 \n \nr2 \n0.442 \n \nSumber data : data yang telah diolah Hasil dari pengolahan data partisipasi masyarakat ialah partisipasi masyarakat \nberpengaruh positif terhadap pengelolaan dana desa kemudian r2 yang dihasilkan adalah 0.442 \nberarti sebesar 44,2 % perubahan yang terjadi pada pengelolaan dana desa disebabkan oleh \npartisipasi masyarakat dengan segnifikansi sebesar 0.000. para aparatur desa bersama-sama \ndengan masyarakat memutuskan apa yang harus diprioritaskan dalam musyawarah dusun , \nmusyawarah desa hingga musyawarah perencanaan pembangunan desa (musrenbang des). Masyarakat dilibatkan bukan hanya pada saat rapat saja , tapi pada pelaksanaanya masyarakat \ndilibatkan dengan cara membuat tim untuk proyek pembangunan desa . Antusiasme masyarakat \nterhadap pengelolaan dana desa bahkan semakin meningkat dari tahun ketahun . Masyarakat \nbukan hanya ikut berperan didalamnya tapi mereka juga ikut mencari tahu bagaimana distribusi \ndana desa, apakah sudah turun atau belum. Berdasarkan uraian diatas maka hipotesis dari \npenelitian ini sejalan atau diterima sesuai dengan penelitian yang dilakukan oleh Julianto \n(2019:35) yang menyatakan bahwa partisipasi berpengaruh secara positif dan signifikan \nterhadap keberhasilan pengelolaan dana desa dengan nilai signifikansi sebesar 0.048 . Berikut ini pengaruh akuntansi dana desa dan partisipasi masyarakat terhadap \npengelolaan dana desa : Riset Akuntansi Riset Akuntansi 28 | Yustin Novia Pratiwi. Tabel 3. E. \nSaran Berdasarkan hasil kesimpulan diatas , maka dapat dierikan saran mengenai Pengaruh akuntansi \ndana desa dan partisipasi masyarakat terhadap pengelolaan dana desa di Kabupaten Bandung \nBarat yaitu: Saran Teoritis Sebaiknya untuk penelitian selanjutnya dianjurkan untuk menambahkan jumlah kabupaten yang \ndiambil untuk memperdalam lagi penelitian. Saran Praktis \nSebaiknya aparatur desa lebih terbuka pada masyarakat dengan mengadakan sosialisasi lebih C. \nHasil Penelitian dan Pembahasan Uji pengaruh akuntansi dana desa dan partisipasi masyarakat terhadap pengelolaan\ndana desa \nCoefficientsa \nModel \nUnstandardized \nCoefficients \nStandardized \nCoefficients \n \n \nB \nBeta \nT \nSig \n1 \n(Constant) \n1.139 \n \n0.235 \n0.815 \nTOTAL_ADD \n0.333 \n0.339 \n2.908 \n0.006 \nTOTAL_PM \n0.617 \n0.518 \n4.437 \n0.000 \n \nR \n0.732 \n \n \n \n \n \nR2 \n0.535 Berdasarkan r hitung pada variabel X1 sebesar 0.333 maka setiap penambahan nilai 1 \npada variabel X1 akan meningkatkan variabel Y sebesar 0.333 (33.3 %) kemudian sisanya \ndijelaskan atau dipengaruhi oleh variabel lain sebesar 66.7 %. Sedangkan r hitung pada variabel \nX2 sebesar 0.617 yang berarti setiap penambahan 1 poin pada variabel X2 akan meningkatkan \nvariabel Y sebesar 0.617 (61.7 %) dan sisanya dipengaruhi oleh variabel lain sebesar 38.3 %. Sejalan dengan itu, ultafiah (2017:145) yang menyatakan bahwa akuntabilitas dan \npartisipasi masyarakat berpengaruh secara positif dan signifikan terhadap pengelolaan \ndana desa dengan Sig. sebesar 0.000. Maka dapat disimpulkan bahwa pengaruh akuntansi dana desa dan partisipasi \nmasyarakat terhadap pengelolaan dana desa di sebabkan oleh berbagai faktor selain dari laporan \nkeuangan nya pengelolaan dana desa juga dipengaruhi oleh partisipasi masyarakat baik lewat \naspirasi fikirannya maupun sumbangan tenaga dalam pelaksanaan programnya . hal tersebut \nsejalan dengan teori agensi yang menyatakan bahwa aparatur desa sebagai agen penerima \nmandat dari pihak masyarakat mempunyai tugas untuk melaksanakan program dana desa secara \noptimal dan mengkomunikasikan dengan masyarakat lewat melibatkannya dengan rapat yang \ndi adakan oleh dasa. D. \nKesimpulan Berdasarkan hasil penelitian yang telah disampaikan pada bab sebelumnya ,yaitu tentan\nPengaruh Akuntansi Dana Desa dan Partisipasi Masyarakat terhadap pengelolaan dana desa d\nK b\nB\nd\nB\nk d\ndi\nik k\ni\nl\nb\ni b ik Berdasarkan hasil penelitian yang telah disampaikan pada bab sebelumnya ,yaitu tentang \nPengaruh Akuntansi Dana Desa dan Partisipasi Masyarakat terhadap pengelolaan dana desa di \nKabupaten Bandung Barat maka dapat ditarik kesimpulan sebagai berikut: Pengaruh Akuntansi Dana Desa dan Partisipasi Masyarakat terhadap pengelolaan dana desa di \nKabupaten Bandung Barat maka dapat ditarik kesimpulan sebagai berikut: 1. Terdapat pengaruh Akuntansi dana desa terhadap pengelolaan dana desa. Dengan adanya \nlaporan keuangan maka para aparatur desa harus memahami peristiwa akuntansi yang \nterjadi didalamnya sebagai bentuk tanggung jawab dan pembuktian bahwa aparatur desa \nakan memberikan yang terbaik bagi pihak prinsipal (masyarakat). 2. Terdapat pengaruh partisipasi masyarakat terhadap pengelolaan dana desa \nDengan adanya musyawarah dusun dan desa maka terjadi komunikasi yang baik dan \nprogram-program yang dihasilkan sesuai dengan prioritas desa. Saran Praktis Saran Praktis \nSebaiknya aparatur desa lebih terbuka pada masyarakat dengan mengadakan sosialisasi lebih Volume 1, No. 1, Tahun 2021, Hal: 24-29 ISSN: 2798-6438 29 Pengaruh Akuntansi Dana Desa dan Partisipasi Masyarakat ...| 2 lanjut terkait dana desa. Kemudian sebaiknya informasi desa juga dapat diakses oleh pihak \neksternal lainnya . Aparatur desa juga sebaiknya mengadakan kerjasama dengan instansi yang \nterkait agar mendapatkan binaan teknologi maupun yang terkait dengan pencatatan laporan \nkeuangan hingga pelaporan pengelolaan dana desa . Agar mendapatkan pembinaan secara \nmenyeluruh. Pemberdayaan sumber daya manusia juga sebaiknya bekerja sama dengan instansi \nyang lain agar tidak selalu bergantung pada dana desa JRA is licensed under Creative Commons Attribution- \nNonCommercial-ShareAlike 4.0 International License Daftar Pustaka [1] Bastian, indra. 2015, Akuntansi untuk Kecamatan dan Desa. Jakarta: Erlangga [2] Headline : misteri desa siluman salah data \natau modu sedot dana desa, Tersedia di:\n https://www.liputan6.com/news/re \nd/4108390/headline-misteri-desa\n siluman-salah-data-atau-modus sedot-dana-desa [2] Headline : misteri desa siluman salah data \natau modu sedot dana desa, Tersedia di:\n https://www.liputan6.com/news/re \nd/4108390/headline-misteri-desa\n siluman-salah-data-atau-modus sedot-dana-desa [3] Jensen and Meckling. 1976. Theory of the \nFirm: Managerial Behavior, \nAgency Cos\nand Ownership Structure. Journal of Financial Economics . Vol. 3 Iss 4 pp 308 [4] Julianto, dewi, 2019 . Pengaruh partisipasi \nmasyarakat , penggunaan sistem keuangan \ndaerah , kompetensi \npendamping desa terhadap \nkeberhasilan pengelolaan dana\n desa . Bali : Jurnal ilmiah akuntansi \nVol 4 No 1 [5] Korupsi Dana Desa Rp 137,9 Juta, \nSeorang Kades Ditahan, tersedia \nhttps://regional.kompas.com/read/017/05/23/11545871/korupsi.dana \ndesa.rp.137.9.juta.seorang.kades.diahan [5] Korupsi Dana Desa Rp 137,9 Juta, \nSeorang Kades Ditahan, tersedia \nhttps://regional.kompas.com/read/017/05/23/11545871/korupsi.dana \ndesa.rp.137.9.juta.seorang.kades.diahan di: [6]Peraturan Menteri Dalam Negri No.113 pasal 1 ayat 6 Tahun 2014 tentan\nPengelolaan Keuangan Desa [6]Peraturan Menteri Dalam Negri No.113 pasal 1 ayat 6 Tahun 2014 tentang \nPengelolaan Keuangan Desa [7] Putri, Rahma., Fadilah, Sri dan Nurhayati. 2016. Pengaruh Penerapan Sistem Pengendalian \nIntern Pemerintah (SPIP) dan Kompetensi Sumber Daya Manusia terhadap Kualitas \nPelaporan Keuangan Daerah (Survey pada Pemerintah Daerah di Wilayah Bandung \nRaya). Prosiding Akuntansi. Vol. 2., No. 2 [8] Ratmono, Dwi & Solihin , Mahfud.. 2015. Akuntansi Keuangan Daerah Berbasis Akrual \n.Yogyakarta. UPP STIM YKPN. [8] Ratmono, Dwi & Solihin , Mahfud.. 2015. Akuntansi Keuangan Daerah Berbasis Akrual \n.Yogyakarta. UPP STIM YKPN. [9] Ultafiah weny, 2017. Pengaruh akuntabilitas, transparansi, partisipasi terhadap\n pengelolaan dana desa untuk mewujudkan Good corporate \ngovernance. Palembang: \nUMP [10] Undang-Undang No 32 Tahun 2004 tentang Desentralisasi [10] Undang-Undang No 32 Tahun 2004 tentang Desentralisasi [11] Undang-Undang No.6 Tahun 2014 tentang Desa. [12] Undang-Undang No.32 Tahun 2004 tentang Pemerintahan Daerah. [13] V Wiratna, Sujarweni 2015. Akuntansi Desa: Panduan Tata Kelola Keuangan Desa. Wonosari: Pustaka Baru Pers [14] V Wiratna, Sujarweni . 2014 . Akuntansi Dana Desa : Panduan Tata Kelola Keuangan Desa. Wonosari: Pustaka Baru Pers JRA is licensed under Creative Commons Attribution- \nNonCommercial-ShareAlike 4.0 International License Riset Akuntansi Riset Akuntansi"
https://openalex.org/W3097210587
https://hal.science/hal-02948210/document
English
null
Alleviation of an arctic sea ice bias in a coupled model through modifications of the subgrid scale orographic parameterization
null
2,020
cc-by
12,955
To cite this version: Guillaume Gastineau, François Lott, Juliette Mignot, Frédéric Hourdin. Alleviation of an Arctic Sea Ice Bias in a Coupled Model Through Modifications in the Subgrid-Scale Orographic Parame- terization. Journal of Advances in Modeling Earth Systems, 2020, 12 (9), ￿10.1029/2020MS002111￿. ￿hal-02948210￿ Distributed under a Creative Commons Attribution 4.0 International License HAL Id: hal-02948210 https://hal.science/hal-02948210v1 Submitted on 19 Apr 2021 L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés. HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci- entific research documents, whether they are pub- lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. Distributed under a Creative Commons Attribution 4.0 International License Citation: Gastineau, G., Lott, F., Mignot, J., & Hourdin, F. (2020). Alleviation of an Arctic sea ice bias in a coupled model through modifications in the subgrid‐scale orographic parameterization. Journal of Advances in Modeling Earth Systems, 12, e2020MS002111. https://doi.org/ 10.1029/2020MS002111 Plain Language Summary Some of the processes responsible for the impacts of orography on the mean flow, such as low‐level flow blocking, or mountain waves, are unresolved in climate models at standard horizontal resolution. Such processes are accounted for using subgrid‐scale orography parameterization in climate models. Adjusting such parameterization is well known to improve the simulation of the mean climate in midlatitudes and to increase the skill of operational forecasts. In this study, the impact on the Arctic climate is studied in a climate model. It is found that adjusting the subgrid‐scale orography parameterization modulates both the atmospheric variability and mean state, with a large impact on the atmospheric momentum, heat, and moisture transport from the midlatitude to the Arctic. In particular, increasing the low‐level flow blocking leads to decreased atmospheric transport to the Arctic. Such impacts are found in both atmosphere‐only and coupled ocean‐atmosphere sensitivity simulations designed to investigate the influence of the parametrized orography. The coupled climate simulations further illustrate the impact of the subgrid‐scale orography adjustment for the sea ice and oceanic circulation. Increasing low‐level flow blocking is found to increase substantially the winter sea ice growth, while it reduces the Atlantic meridional overturning circulation. Received 21 MAR 2020 Accepted 29 JUL 2020 Accepted article online 7 AUG 2020 ©2020. The Authors. This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited. Key Points: • The adjustment of the parametrized orography in climate models can alleviate the near‐surface winter biases over the Arctic Abstract In climate models, the subgrid‐scale orography (SSO) parameterization imposes a blocked flow drag at low levels that is opposed to the local flow. In IPSL‐CM6A‐LR, an SSO lift force is also applied perpendicular to the local flow to account for the effect of locally blocked air in narrow valleys. Using IPSL‐CM6A‐LR sensitivity experiments, it is found that the tuning of both effects strongly impacts the atmospheric circulation. Increasing the blocking and reducing the lift lead to an equatorward shift of the Northern Hemisphere subtropical jet and a reduction of the midlatitude eddy‐driven jet speed. It also improves the simulated synoptic variability, with a reduced storm‐track intensity and increased blocking frequency over Greenland and Scandinavia. Additionally, it cools the polar lower troposphere in boreal winter. Transformed Eulerian Mean diagnostics also show that the low‐level eddy‐driven subsidence over the polar region is reduced consistent with the simulated cooling. The changes are amplified in coupled experiments when compared to atmosphere‐only experiments, as the low‐troposphere polar cooling is further amplified by the temperature and albedo feedbacks resulting from the Arctic sea ice growth. In IPSL‐CM6A‐LR, this corrects the warm winter bias and the lack of sea ice that were present over the Arctic before adjusting the SSO parameters. Our results, therefore, suggest that the adjustment of SSO parameterization alleviates the Arctic sea ice bias in this case. However, the atmospheric changes induced by the parametrized SSO also impact the ocean, with an equatorward shift of the Northern Hemisphere oceanic gyres and a weaker Atlantic meridional overturning circulation. • Increasing low‐level drag reduces Northern Hemisphere stationary wave amplitudes and shifts the subtropical jet equatorward • Increasing low‐level drag increases the Arctic sea ice coverage and reduces the Atlantic meridional overturning circulation • Increasing low‐level drag increases the Arctic sea ice coverage and reduces the Atlantic meridional overturning circulation Supporting Information: • Supporting Information S1 Supporting Information: i f i • Supporting Information S1 Correspondence to: G. Gastineau, guillaume.gastineau@locean-ipsl. upmc.fr Correspondence to: G. Gastineau, guillaume.gastineau@locean-ipsl. upmc.fr Alleviation of an Arctic Sea Ice Bias in a Coup Through Modifications in the Subgrid‐Scale Orographic Parameterization Special Section: The IPSL Climate Model Used in CMIP6** Special Section: The IPSL Climate Model Used in CMIP6** Guillaume Gastineau1 , François Lott2 , Juliette Mignot1 , and Frederic Hourdin2 1UMR LOCEAN, Sorbonne Université/IRD/MNHN/CNRS, IPSL, Paris, France, 2UMR LMD, ENS/Sorbonne Université/CNRS/Ecole Polytechnique, IPSL, Paris, France Journal of Advances in Modeling Earth Systems 10.1029/2020MS002111 only included mountain wave drags at upper levels that are oriented against the low‐level flow, more recent schemes start to take into account directional effects (Bacmeister, 1993; Baines & Palmer, 1985; Garner, 2005). In such schemes, the gravity wave drag is in an intermediate direction between the low‐level winds and the minor axis of the SSO ridges, depending on the degree of anisotropy. Progress was also made in the late 1990s, with the inclusion of low‐level blocked flow drag. In most schemes, its inten- sity is also a function of anisotropy, but its direction is often assumed to be opposed to the low‐level winds (Lott & Miller, 1997). Although the inclusion of directional effects was never thoroughly tested for the grav- ity waves in the aforementioned studies, it soon appeared that applying low‐level drag alone was not suffi- cient to improve the simulated stationary planetary waves (Lott, 1999). Lott (1999) then proposed to implement additionally the effect of lift forces perpendicular to the local flow. Based on an analogy with the effect of the envelope orography (Wallace et al., 1983), the lift force represents the dynamical separation of the air in narrow valleys from the large‐scale flow. To some extent, it demonstrates that direction matters: The component of the forces perpendicular to the winds does not decelerate the flow directly, but it still dis- torts it efficiently when applied regionally. The lift force mimics the vortex stretching effect over large‐scale mountains and yields a realistic planetary wave with little zonal‐mean flow deceleration (Lott, 1999). As model resolution increases, one could have expected that these issues become less critical. Yet it happens not to be the case. The spectrum of unresolved and resolved processes is currently still not well understood, and much care is needed to evaluate the influence of parameterized orography (van Niekerk et al., 2016). For instance, Zadra (2015) found that the parametrized surface stress is highly model dependent, with impacts at all time scales. Furthermore, how the ocean is impacted by SSO parameterizations remains not well understood. Based on the similarity between Climate Model Intercomparison Project Phase 5 (CMIP5) model midlatitude biases and changes simulated while suppressing SSO effects, Pithan et al. (2016) suggested that much of the CMIP5 climate model biases could be alleviated by increasing the parametrized drag. van Niekerk et al. Journal of Advances in Modeling Earth Systems (2017) also found that the CMIP5 model biases in the position of the North Atlantic and North Pacific jets found can be linked to the parametrized low‐level drag. Another relevant example of the impact of SSO parametrizations concerns the tuning of the GFDL model where different SSO schemes were tested (Zhao et al., 2018). It was noted that increasing orographic drag was associated with a cooling of Arctic surface air temperature. However, the physics and feedbacks related to air‐sea cou- pling behind these corrections need to be analyzed according to Held et al. (2019). Such analysis is indeed essential: since mountain wave drags are often introduced to reduce cold biases (Palmer et al., 1986) through downward control, we have to understand how low‐level parametrized drag can result in opposite effects. Following on from these studies, we investigate here the effect of SSO parameterization in the Arctic region. The intention is also to reduce a warm winter bias in the lower troposphere over the Arctic sea ice. Such bias, previously linked to the poor simulation of the planetary boundary layer (Tjernström & Graversen, 2009) or clouds (Walsh et al., 2009), is indeed present in many models (Graham et al., 2019). The present study addresses these issues with the IPSL‐CM6A‐LR model (Boucher et al., 2020), with a focus on its atmospheric component, LMDZ6A (Hourdin et al., 2020). The IPSL‐CM6A‐LR model was used to perform the Coupled Model Intercomparison Project Phase 6 (CMIP6; Eyring et al., 2016) simu- lations. The study was motivated by a difficulty encountered during the tuning of this model configura- tion, namely, a systematic underestimation of the Arctic sea ice at the end of winter. This deficiency was in part attributed to a bad representation of the stationary planetary waves. In our case, this produces an overestimation of warm air advection from low latitudes to the Arctic in winter, thereby inhibiting win- ter sea ice growth. This motivated a tuning of the SSO parameterization, which indeed appeared to play a crucial role in the representation of Arctic sea ice. The simulations presented in this paper reassess this particular tuning step through sensitivity experiments starting from the final version of the model, using the atmospheric model component LMDZ6A both in stand‐alone atmospheric mode and coupled to the ocean. 1. Introduction The representation of subgrid‐scale orography (SSO) in global climate models is still considered to be a major challenge (Sandu et al., 2019). Although the large‐scale orography influence is partly resolved in standard resolution models (~100 km), processes like gravity waves, the blocking effect of small‐scale mountains and hills, and the associated turbulence indeed require the use of very high resolution models (<1 km). Most global climate models use SSO parameterizations to capture the missing effect of orographic gravity waves and low‐level blocking (Lott & Miller, 1997; Palmer et al., 1986). Although early parameterizations ©2020. The Authors. This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited. 1 of 19 GASTINEAU ET AL. GASTINEAU ET AL. 2.1. Atmosphere‐Only Experiments This study uses the land‐atmosphere components of the IPSL‐CM6A‐LR model used for CMIP6, called LMDZOR6, in stand‐alone mode, forced by sea surface temperature (SST) and sea ice concentration. LMDZOR6 is based on the atmospheric model LMDZ version 6, which is described in a companion paper of the same Special Collection (Hourdin et al., 2020). It has a resolution of 2.5° × 1.25° and 79 vertical levels that extend up to 80 km (~1.5 Pa). It is coupled to the ORCHIDEE (Boucher et al., 2020) land surface model. In LMDZ6, the convective and planetary boundary layer scheme was revisited (Hourdin et al., 2020). A refinement of the vertical grid and a new adjustment of the thresholds of stability functions were implemented for a better representation of the very stable atmo- spheric boundary layer (Vignon et al., 2017). The scheme producing SSO gravity waves drag is also used to produce a shear production term in the prognostic turbulent kinetic equation of the planetary boundary layer scheme. This produces a turbulent orographic form drag, which was carefully validated over the Antarctica ice sheet (see details in the appendix of Cheruy et al., 2020). In LMDZ, the SSO parameterization applies gravity wave drag at upper levels and low‐level drag and lift forces at the model levels that intersect the SSO. The low‐level drag force represents the blocking effect of orography. It is opposed to the local wind (Lott & Miller, 1997). The lift represents the effect of blocked air in narrow valleys intensifying the vortex compression (Lott, 1999). Among others, the low‐level drag and lift effects depend on Cd and Cl, respectively, which are two dimensionless scaling parameters that need to be carefully adjusted. Cd directly controls the blocked flow component of the drag, while Cl controls the amplitude of the lift force. 1 30 0.2 0.1 1 30 0.6 0.0 1 30 0.6 1.0 1 200 0.6 0.1 5 80 0.2 0.25 We integrate several LMDZOR6 simulations (see Table 1) using a repeated annual cycle of SST and sea ice concentration as boundary conditions, calculated from a climatology of the 1979–2008 forcings designed for the CMIP6 Atmospheric Model Intercomparison Project (AMIP; Durack & Taylor, 2018). The simulations are performed over 30 yr, with fixed present‐day external forcings, using the CMIP6 (Eyring et al., 2016) plant functional type maps, greenhouse gases, ozone, aerosols, and solar forcing of the year 2000. 2.1. Atmosphere‐Only Experiments The control simulation, referred to as Atm‐6A, uses the standard value for Cd and Cl from the IPSL‐CM6A‐LR CMIP6 configuration. We also use the ensemble of 10 AMIP simulations produced for CMIP6 with the same atmo- spheric model (Boucher et al., 2020). These simulations are identical to Atm‐6A, but they used interannual SST, sea ice, and external forcings. We also focus on the 1979–2008 period in this ensemble. We also integrate simulations identical to Atm‐6A, but using increased (decreased) values of Cd in Atm‐6A‐ Drg+ (Atm‐6A‐Drg−) and similarly for Cl in Atm‐6A‐Lft+ (Atm‐6A‐Lft−). The exact values are given in Table 1. In case Cl is reduced to 0, the orographic lift parametrization is deactivated. Lastly, a simulation combining these two changes with an increased Cd and a decreased Cl is referred to as Atm‐5DL. This cor- responds to the setup of the previous version of the atmospheric model, named LMDZ5A (Hourdin et al., 2006) and used for CMIP5. Hereafter, the significance level for the difference of any variable between two simulations is given by the p‐value of a Student's t test assuming equal variances. The number of degrees of freedom used in the t tests is n −2, with n the number of years or seasons considered for computing the average value. Journal of Advances in Modeling Earth Systems Another goal of this study is to assess the performance of IPSL‐CM6A‐LR regarding Northern Hemisphere climate characteristics, as the CMIP6 simulations produced by IPSL‐CM6A‐LR will be used next in many studies. We will explore the sensitivity of this model to the SSO drag and lift effect, and we will illustrate why and how the Arctic and midlatitude climate is modified by adjusting both effects. 2 of 19 2 of 19 GASTINEAU ET AL. GASTINEAU ET AL. Journal of Advances in Modeling Earth Systems GASTINEAU ET AL. Journal of Advances in Modeling Earth Systems 10.1029/2020MS002111 Table 1 Presentation of the Main Simulation Discussed in This Study Name Model Members Length (in yr) Parameters Cd Cl Atm‐6A LMDZOR‐6A 1 30 0.6 0.1 Atm‐5DL LMDZOR‐6A 1 30 0.2 0.25 Atm‐6A‐Drg+ LMDZOR‐6A 1 30 1.2 0.1 Atm‐6A‐Drg− LMDZOR‐6A 1 30 0.2 0.1 Atm‐6A‐Lft− LMDZOR‐6A 1 30 0.6 0.0 Atm‐6A‐Lft+ LMDZOR‐6A 1 30 0.6 1.0 AO‐6A IPSL‐CM6A‐LR 1 200 0.6 0.1 AO‐5DL IPSL‐CM6A‐LR 5 80 0.2 0.25 This manuscript is organized as follows: The model and the methodology are presented in section 2. Sensitivity atmosphere‐only experiments are analyzed in section 3, and coupled ones in section 4. Conclusions are given in section 5. 3.1. Mean State The influence of the SSO parameters on the Arctic climate is first assessed in atmosphere‐only experiments. Although the atmospheric component of LMDZOR6 includes a series of physical updates as compared to previous versions (see the previous section), stationary planetary wave errors over Northern America and Northern Atlantic remain when using the SSO parameters of the CMIP5 version. More specifically, the sta- tionary planetary wave is much more pronounced than in reanalysis, with the three troughs visible in the 700‐hPa geopotential height, located over North America, western Europe, and eastern Asia being deeper than in ERA‐Interim (Figure 1c). This can result in meridional exchanges, for instance, from enhanced (reduced) advection of warm air from the midlatitudes to the polar regions where most of the Arctic sea ice forms in winter. The zonally asymmetric changes (Figure 1d) also show that the stationary wave is shifted west when compared to ERA‐Interim over eastern Asia, North Pacific, and North America. The overestimated stationary wave amplitude might be corrected by imposing more orographic drag and, therefore, decelerating the flow (Sandu et al., 2016). For instance, such an effect of increasing low‐level drag was found by van Niekerk et al. (2017), although opposed changes were found north of 60°N. Furthermore, as the lift force leads to more vortex stretching over large‐scale mountains, reducing the lift effect may also reduce the planetary wave with little impacts on the zonal flow, as discussed in Lott (1999). We, therefore, chose to reduce Cl (from 0.25 to 0.1) and increase Cd (from 0.2 to 0.6) between Atm‐5DL and Atm‐6A (see Table 1). Figures 1e and 1f show that doing so, the errors on both the planetary waves and the zonally sym- metric part of the low‐level jet are reduced. The improvement is quantified in Figure 1 by the root mean square error (RMSE) in the 20–90°N latitude band, which is reduced for both the 700‐hPa geopotential height (from 48.8 to 36.3 m) and its asymmetric component (from 29.4 to 23.2 m). Journal of Advances in Modeling Earth Systems 10.1029/2020MS002111 simulations. This motivates the use of a 200‐yr period of the preindustrial simulation as a control for our sen- sitivity study, to ensure that this variability does not affect our results. We arbitrarily chose to focus here on the 1990–2189 model years. This simulation is referred to as AO‐6A. Although preindustrial external for- cings are quite different from present‐day ones, the results presented next are likely unchanged in present‐day conditions. simulations. This motivates the use of a 200‐yr period of the preindustrial simulation as a control for our sen- sitivity study, to ensure that this variability does not affect our results. We arbitrarily chose to focus here on the 1990–2189 model years. This simulation is referred to as AO‐6A. Although preindustrial external for- cings are quite different from present‐day ones, the results presented next are likely unchanged in present‐day conditions. Starting from this preindustrial configuration, we integrate a five‐member ensemble, called AO‐5DL, using the values of Cd and Cl from the previous CMIP5 IPSL model version (increased Cd and decreased Cl, as pre- viously described, see Table 1). The setup is otherwise identical to AO‐6A. The members last 80 yr and start at dates sampled every 40 yr in the given 200‐yr period. The first 30‐yr period of each ensemble is discarded. The integration of such ensemble ensures an accurate estimation of the SSO influence so that the important centennial variability present in IPSL‐CM6A‐LR does not affect too much the results. 2.3. Observations Monthly and/or daily sea ice concentration, sea level pressure (SLP), geopotential height, air temperature, and zonal and meridional wind are retrieved from the ERA‐Interim reanalysis interpolated onto a 2° grid (Dee et al., 2011) over the 1979–2014 period. 2.2. Coupled Experiments We also use the IPSL‐CM6A‐LR (Boucher et al., 2020) atmosphere‐ocean general circulation model (AOGCM), which consists of LMDZOR6 coupled to the NEMO ocean model using a nominal horizontal resolution of about 1° with refinement at the equator and poles (eORCA1 grid), 75 vertical levels, and the LIM3 sea ice module. The Northern Hemisphere climate of the preindustrial CMIP6 control simulation of this model shows a marked centennial variability linked to Atlantic meridional overturning circulation (AMOC) fluctuations (Boucher et al., 2020). This variability is also visible in CMIP6 historical GASTINEAU ET AL. GASTINEAU ET AL. 3 of 19 GASTINEAU ET AL. 3.1. Mean State (e) and (f) are the same as (a) and (b), but for the difference Atm‐6A minus ERA‐Interim. In (c)–(f) panels, the root mean square (RMS) of the difference over 20–90°N is also given on top of each panel; only grid points with statistical significance lower than 10% are colored. Lastly, we note that the influence of varying SST does not change the overall standing planetary wave pat- tern. Indeed, the ensemble mean of AMIP CMIP6 experiments using interannual forcings shows 700‐hPa geopotential height asymmetries largely similar to the simulation Atm‐6A using climatological surface boundary conditions (see Supporting Information Figure S1). Lastly, we note that the influence of varying SST does not change the overall standing planetary wave pat- tern. Indeed, the ensemble mean of AMIP CMIP6 experiments using interannual forcings shows 700‐hPa geopotential height asymmetries largely similar to the simulation Atm‐6A using climatological surface boundary conditions (see Supporting Information Figure S1). 3.1. Mean State To illustrate how the lift and drag can be combined to modify the planetary wave and the zonal‐mean flow, Figure 2 shows the differences between Atm‐6A and Atm‐5DL (Figures 2a and 2b) as well as the difference between runs where the drag is enhanced by a factor of 6 (Cd increased from 0.2 to 1.2; Figures 2c and 2d) and differences between a run with strong lift and a run with no lift (Cl parameter decreased from 1.0 to 0.0; Figures 2e and 2f). In these sensitivity simulations, we see that the drag alone can well decelerate the global flow (cf. Figures 2a and 2c), with a weakening of the tropospheric polar jet. This effect of the SSO on the zonal‐mean flow is consistent with the effect expected from mountain drags onto the zonal‐mean atmospheric mass distribution (Lott & D'andrea, 2005; Lott et al., 2004) and is consistent with the results of previous studies (Sandu et al., 2016; Zadra et al., 2003). The meridional pressure gradient produced is con- sistent with an anomalous geostrophic westward zonal flow due to the low‐level blocking. The drag also reduces the trough over north‐eastern America and tends to produce a strong ridge to the west of the Alaska peninsula. The lift force is less efficient in producing an axisymmetric response (cf. Figures 2c and 2e) but much more efficient in producing a planetary wave (Figures 2d and 2f). 4 of 19 GASTINEAU ET AL. GASTINEAU ET AL. 10.1029/2020MS002111 f Advances in Modeling Earth Systems 10.1029/20 Journal of Advances in Modeling Earth Systems 10.1029/2020MS002111 Journal of Advances in Modeling Earth Systems Figure 1. (a) Geopotential height at 700 hPa averaged over the winter months (DJFM) in ERA‐Interim (1979–2014) and (b) its zonally asymmetric component. (c) and (d) are the same as (a) and (b), but for the difference Atm‐5DL minus ERA‐Interim. (e) and (f) are the same as (a) and (b), but for the difference Atm‐6A minus ERA‐Interim. In (c)–(f) panels, the root mean square (RMS) of the difference over 20–90°N is also given on top of each panel; only grid points with statistical significance lower than 10% are colored. Figure 1. (a) Geopotential height at 700 hPa averaged over the winter months (DJFM) in ERA‐Interim (1979–2014) and (b) its zonally asymmetric component. (c) and (d) are the same as (a) and (b), but for the difference Atm‐5DL minus ERA‐Interim. GASTINEAU ET AL. 3.2. Atmospheric Variability Although changes in the direction and intensity of the climatological westerlies can have a large influence on the Arctic climate, a large fraction of the low‐troposphere transport of heat and moisture toward the Arctic is also related to the transient eddies. To measure how they are modified, we next evaluate the winter daily 500‐hPa geopotential height standard deviation, band‐pass filtered at 2.5–6 days (Blackmon, 1976). The GASTINEAU ET AL. GASTINEAU ET AL. Journal of Advances in Modeling Earth Systems 10.1029/2020 ournal of Advances in Modeling Earth Systems 10.1029/2020MS002111 Figure 2. Difference of the simulated DJFM (a) 700‐hPa geopotential height and (b) its zonally asymmetric component, in Atm‐6A minus Atm‐5DL. (c) and (d) are the same as (a) and (b), but for Atm‐6A‐Drg+ minus Atm‐6A‐Drg−. (e) and (f) are the same as (a) and (b), but for Atm‐6A‐Lft−minus Atm‐6A‐Lft+. Only grid points with statistical significance lower than 10% are colored. Figure 2. Difference of the simulated DJFM (a) 700‐hPa geopotential height and (b) its zonally asymmetric component, in Atm‐6A minus Atm‐5DL. (c) and (d) are the same as (a) and (b), but for Atm‐6A‐Drg+ minus Atm‐6A‐Drg−. (e) and (f) are the same as (a) and (b), but for Atm‐6A‐Lft−minus Atm‐6A‐Lft+. Only grid points with statistical significance lower than 10% are colored. geopotential height standard deviation of the model is quite realistic (Figures 3a–3c), with the Pacific and Atlantic storm tracks located at 50°N over both basins. Nevertheless, Atm‐6A and Atm‐5DL tend to slightly underestimate the variance over both storm tracks, while the variance is overestimated over land (Figures 3e and 3f), especially over northwestern America. In Atm‐6A, the variance is reduced almost every- where around the globe in the polar and midlatitudes compared to Atm‐5DL (Figure 3d). The reduction of the overestimated variance over land explains the overall reduction of the 20–90°N RMSE from 4.72 m in Atm‐5DL to 3.81 m in Atm‐6A. The decreased variance in Atm‐6A is consistent with the weaker polar vortex described in Figure 2a if we assume that a weaker amplitude vortex is more stable. To understand the impact on the midlatitude synoptic variability, we also investigate the blocking character- istics. The blockings are closely linked to the main mode of atmospheric variability (Davini et al., 2012; Woollings et al., 2008) and are usually not well represented in climate models, with underestimated GASTINEAU ET AL. GASTINEAU ET AL. 6 of 19 6 of 19 Journal of Advances in Modeling Earth Systems Figure 3. Daily band‐pass (2.5–6 days) DJFM 500‐hPa geopotential height standard deviation, in m, for (a) ERA‐Interim, (b) Atm‐5DL, (c) Atm‐6A, (d) Atm‐6A minus Atm‐5DL, (e) Atm‐5DL minus ERA‐Interim, and (f) Atm‐6A minus ERA‐Interim. In (e) and (f), the mean root mean square (RMS) 20–90°N difference with ERA‐Interim is given on top right. In (d), the change of the root mean square difference with ERA‐Interim (ΔRMS) is indicated. Journal of Advances in Modeling Earth Systems In (d), the red contours provide the Atm‐5DL daily band‐pass DJFM 500‐hPa geopotential height standard deviation, in m. In (e) and (f), the red contours provide the ERA‐Interim daily band‐pass DJFM 500‐hPa geopotential height standard deviation, in m. Only grid points with statistical significance lower than 10% are colored. Figure 3. Daily band‐pass (2.5–6 days) DJFM 500‐hPa geopotential height standard deviation, in m, for (a) ERA‐Interim, (b) Atm‐5DL, (c) Atm‐6A, (d) Atm‐6A minus Atm‐5DL, (e) Atm‐5DL minus ERA‐Interim, and (f) Atm‐6A minus ERA‐Interim. In (e) and (f), the mean root mean square (RMS) 20–90°N difference with ERA‐Interim is given on top right. In (d), the change of the root mean square difference with ERA‐Interim (ΔRMS) is indicated. In (d), the red contours provide the Atm‐5DL daily band‐pass DJFM 500‐hPa geopotential height standard deviation, in m. In (e) and (f), the red contours provide the ERA‐Interim daily band‐pass DJFM 500‐hPa geopotential height standard deviation, in m. Only grid points with statistical significance lower than 10% are colored. blocking frequencies over Northern Europe (Davini & Cagnazzo, 2014). Pithan et al. (2016) attributed this underestimation to a lack of SSO drag in most models. A blocking index is defined following Scherrer et al. (2006), using the meridional gradient of daily geopotential height at 500 hPa and considering only blocking events lasting more than five consecutive days. When comparing with ERA‐Interim, the blocking frequency simulated by Atm‐6A is overestimated over the Urals and far eastern Siberia, while it is underes- timated over the British Isles (see Figure 4). The SSO adjustment in Atm‐6A has however contributed to increasing the frequency of blocking over Greenland and Scandinavia that was largely underestimated in Atm‐5DL. From Atm‐5DL to Atm‐6A, the blocking frequency RMSE is reduced by 0.44% over the North Atlantic section (Figure 4). However, the blocking frequency has been degraded in far eastern Siberia, with an increased RMSE of 0.22%. Journal of Advances in Modeling Earth Systems 10.1029/2020MS002111 Journal of Advances in Modeling Earth Systems Figure 4. DJFM blocking frequency, in %, for (a) ERA‐Interim 1979–2014, (b) Atm‐6A, and (c) Atm‐6A minus Atm‐5DL. The contour interval is 1% for all panels. In (b), the mean root mean square (RMS) difference of ATM‐6A minus ERA‐Interim is given on top in three boxes (global 35–75°N/North Atlantic 100°E–40°W, 35–75°N/North Pacific‐Eurasia 60°W–120°E, 35–75°N). In (c), only grid points with statistical significance lower than 10% are colored. The change of the root mean square difference with ERA‐Interim (ΔRMS) for the same boxes as (b) is given on top. Fi 4 DJFM bl ki f i % f ( ) ERA I t i 1979 2014 (b) At 6A d ( ) At 6A i At 5 Figure 4. DJFM blocking frequency, in %, for (a) ERA‐Interim 1979–2014, (b) Atm‐6A, and (c) Atm‐6A minus Atm‐5DL. The contour interval is 1% for all panels. In (b), the mean root mean square (RMS) difference of ATM‐6A minus ERA‐Interim is given on top in three boxes (global 35–75°N/North Atlantic 100°E–40°W, 35–75°N/North Pacific‐Eurasia 60°W–120°E, 35–75°N). In (c), only grid points with statistical significance lower than 10% are colored. The change of the root mean square difference with ERA‐Interim (ΔRMS) for the same boxes as (b) is given on top. frictions can easily adapt to enforce quasi‐steady states. In the case of the SSO modifications tested here, the surface drags are imposed in the lower troposphere, and the “downward control” argument is not easy to adapt. Seminal papers like Eliassen (1951) show that in principle, a drag applied near the surface can cause direct cells above where the drag is applied, which is a northward low‐level flow yielding by mass conservation an upward flow north and hence adiabatic cooling. According to past literature, one nevertheless needs to be extremely careful with such conclusions and test the changes in surface friction and upper‐level forcing by the resolved waves. Although the momentum budget equation can be used to interpret directly the changes of the mean meridio- nal circulation resulting from changes in momentum fluxes, TEM quantities provide a more complete description of the atmospheric changes. To disentangle the feedbacks, Figure 5 presents zonal‐mean diagnos- tics of TEM quantities derived following Andrews et al. (1987). 3.3. Zonal‐Mean Changes Increasing orographic drag to cool the polar regions poses a challenge since, in the past, orographic gravity wave drags were often introduced to warm the upper troposphere and low stratosphere (Palmer et al., 1986). The arguments involve downward control principles (Haynes et al., 1991), where an upper‐level drag is balanced via the Coriolis torque by a poleward Transformed Eulerian Mean (TEM) meridional velocity (called v*) that corresponds to the upper branch of an indirect circulation cell. In the poleward branch of the cell and below where the drag is applied, the TEM vertical velocity (called w*) is downward (w* < 0) caus- ing adiabatic warming. A key aspect of the downward control argument is that the vertical integration used to predict the meridional circulations starts at z ¼ ∞to use the boundary condition ρw* ¼ 0. Integration from the surface is systematically disregarded (“upward control”) based on the argument that the surface GASTINEAU ET AL. 7 of 19 GASTINEAU ET AL. Journal of Advances in Modeling Earth Systems GASTINEAU ET AL. Journal of Advances in Modeling Earth Systems First in Figure 5a, one sees that the SSO drags in Atm‐6A and difference in SSO drags from Atm‐6A to Atm‐5DL are both negative at low levels in the Northern Hemisphere midlatitudes and polar regions as expected. The tendencies due to SSO lift are much weaker for the zonal flow (not shown). The zonal‐mean zonal wind in Figure 5b presents a subtropical jet with center around (28°N, 12 km) that is in agreement with observations. It is tilted poleward when altitude decreases, and the lower‐troposphere jet maximum (i.e., the eddy driven jet) is around 35–40°N. The impact of the changes in the zonal‐mean winds is consistent with Lott (1999), as the jet decreases above where the drag is applied, reducing the intensity of the eddy‐driven jet. Besides, the zonal wind increases in the subtro- pical regions shifting the subtropical jet equatorward. Importantly, the response to the changes in SSO drag is almost barotropic, consistent with the fact that the low‐level mountain drag is balanced by northward mass fluxes where it is applied, increasing the surface pressure northward and decreasing it southward. This is consistent with the changes in mass distribution due to mountains (Lott & D'andrea, 2005; Lott et al., 2004). The reduction in the baroclinic part of the jet, as indicated by the difference of zonal‐mean zonal wind between 300 hPa and 850 Pa at 35°N, is not significant at the 10% level (−0.46 m s−1). 8 of 19 GASTINEAU ET AL. GASTINEAU ET AL. Journal of Advances in Modeling Earth Systems 10.1029/2020MS002111 The jet changes strongly impact the total drag in return. This is because above where the jet is decelera turbulent friction drag calculated by the boundary layer scheme is weaker (less negative) and vice ve Figure 5. DJFM zonal‐mean circulation illustrated by (contour) the climatological fields in Atm‐6A and difference of Atm‐6A minus Atm‐5DL (contour interval [CI] provided on top of each panel): (a) zonal‐mean zo wind tendency due to orographic drag, in m s−1 day−1; (b) zonal‐mean zonal wind, in m s−1; (c) zonal‐mean zon tendency due to atmospheric physics, in m s−1 day−1; (d) residual vertical velocity, in mm s−1; (e) eddy zonal flux, in m2 s−2; (f) eddy temperature meridional flux, in K m s−1; (g) zonal wind tendency implied by the Eliasse flux divergence, in 102 m s−1 day−1; and (h) zonal‐mean temperature, in K. Journal of Advances in Modeling Earth Systems 10.1029/2020MS002111 balanced as much as elsewhere, and we suggest two reasons for this. The first is that the changes in the near‐surface winds are not as large as at lower latitudes; the second is that in these regions the near‐surface air is so stratified that the boundary layer does not develop well enough to efficiently balance the SSO drag. balanced as much as elsewhere, and we suggest two reasons for this. The first is that the changes in the near‐surface winds are not as large as at lower latitudes; the second is that in these regions the near‐surface air is so stratified that the boundary layer does not develop well enough to efficiently balance the SSO drag. To a certain extent, the TEM vertical velocity in Figure 5d responds to the near‐surface force in Figure 5c consistent with the case of Eliassen (1951) where drag is applied at the surface: North of 70°N, the residual vertical velocity is upward (w* > 0) above the surface and in the troposphere, consistent with the fact that the negative anomaly in low‐level drag is almost centered at 70°N and drives a direct cell aloft. Nevertheless, as this interpretation challenges downward control principles, it is important to investigate the associated upper‐level changes in eddy forcing. In the classical “downward control” description of the mer- idional circulations, the meridional wind response to eddy‐driven forces is “supposedly” equilibrated by an opposing response due to the adjustment of the boundary layer. Such an equilibration is needed when one does long temporal average because the absence of equilibration yields a meridional transfer of mass and then a non‐stationary change in the zonal‐mean surface pressure field. As we adopt a more “upward con- trolled” view, one should test if our surface forces are in part compensated by changes in upper‐level eddy forces. To some extent, we have begun to address this in Figure 3, where we found that the eddy activity was reduced in Atm‐6A. To evaluate this more precisely, Figures 5e and 5f show the zonal wind and temperature meridional fluxes due to the eddies, v0u0 and v0T0, respectively. We see that both decay in Atm‐6A compared to Atm‐5DL and also that near the surface between 50°N and 75°N, v0T0 is smaller in Atm‐6A than in Atm‐5DL. This could well explain the polar cooling, with smaller meridional poleward heat flux decreasing the near‐surface temperature directly. Journal of Advances in Modeling Earth Systems What is also important, nevertheless, is the eddy forcing, which is the zonal wind tendency due to the divergence of the Eliassen‐Palm (EP) flux in Figure 5g. Note that in the upper troposphere, the EP fluxes converge and decelerate the zonal wind (Figure 5g, contours and vectors), while the EP fluxes diverge in the lower troposphere inducing the formation of the eddy‐driven jet. The difference in eddy forcing between Atm‐6A and Atm‐5DL is positive in the midtroposphere north of 50°N (Figure 5h, colors), so that the zonal wind is accelerated by eddies in this zone in Atm‐6A. If we equilibrate this positive difference in forcing by a negative difference in TEM meridional wind v*, according to downward control, it is associated with a direct anomaly in meridional circulation below, with reduced polar subsidence in Atm‐6A, and decreased near‐surface temperature north of 60°N. Journal of Advances in Modeling Earth Systems In (g), the vectors show the climat Eliassen‐Palm flux (vector, with a typical magnitude of 150 m2 s−1 day−1), using the scaling of Edmon et al. (1 Figure 5. DJFM zonal‐mean circulation illustrated by (contour) the climatological fields in Atm‐6A and (color) difference of Atm‐6A minus Atm‐5DL (contour interval [CI] provided on top of each panel): (a) zonal‐mean zonal wind tendency due to orographic drag, in m s−1 day−1; (b) zonal‐mean zonal wind, in m s−1; (c) zonal‐mean zonal wind tendency due to atmospheric physics, in m s−1 day−1; (d) residual vertical velocity, in mm s−1; (e) eddy zonal wind flux, in m2 s−2; (f) eddy temperature meridional flux, in K m s−1; (g) zonal wind tendency implied by the Eliassen‐Palm flux divergence, in 102 m s−1 day−1; and (h) zonal‐mean temperature, in K. In (g), the vectors show the climatological Eliassen‐Palm flux (vector, with a typical magnitude of 150 m2 s−1 day−1), using the scaling of Edmon et al. (1980). The jet changes strongly impact the total drag in return. This is because above where the jet is decelerated the turbulent friction drag calculated by the boundary layer scheme is weaker (less negative) and vice versa. In our model, this more than balances the extra SSO drag between 30°N and 60°N where the total drag in Atm‐6A is weaker than in Atm‐5DL (Figure 5c). Interestingly, north of 65°N, the SSO drag is not The jet changes strongly impact the total drag in return. This is because above where the jet is decelerated the turbulent friction drag calculated by the boundary layer scheme is weaker (less negative) and vice versa. In our model, this more than balances the extra SSO drag between 30°N and 60°N where the total drag in Atm‐6A is weaker than in Atm‐5DL (Figure 5c). Interestingly, north of 65°N, the SSO drag is not 9 of 19 GASTINEAU ET AL. 9 of 19 GASTINEAU ET AL. 3.4. Air Temperature Changes To evaluate how the upper air diagnostics translate in the boundary layer, Figure 6b shows the 2‐m tempera- ture difference between Atm‐6A and Atm‐5DL. In Atm‐6A, North America is warmer, but most of the other regions are cooler, that is, Eurasia, and most importantly for sea ice, a large part of the Arctic. In the other sensitivity experiments, a similar warming, but with larger amplitude over North America, is reproduced for a large decrease of the lift (Figure 6c), as well as a cooling in western Eurasia. These surface temperature changes are consistent with the modified standing wave pattern (Figure 2f), with the anomalous southerly flow over North America and anomalous easterly flow in western Eurasia. However, as the lift is only slightly decreased in Atm‐5DL when compared to Atm‐6A (see Table 1), the effect of the lift is likely not dominant in Atm‐6A minus Atm‐5DL over Eurasia and the Arctic. The cooling simulated in Atm‐6A over the Arctic and Eurasia is somewhat similar to the one simulated when increasing the drag (Figure 6a, also given in Cheruy et al., 2020, their Figure 9). The standing wave pattern is only modified over America by the increasing drag, with the anomalous southerly (northerly) flow in eastern (western) America, thereby pro- ducing surface warming (cooling). The cooling produced over Eurasia and the Arctic is likely dominant in the zonal‐mean temperature changes illustrated previously (Figure 5h). As discussed in Cheruy et al. (2020), as the atmospheric model has a warm winter bias over the Northern Hemisphere midlatitude, the SSO changes in Atm‐6A partly reduce the bias over Eurasia but increase it over North America. The Arctic cooling is occurring only during the winter in Atm‐6A (from November to March; Figure 6d, bot- tom, black curve) and is consistent with a dominant effect of the increasing drag (red curve), while little air temperature changes are simulated during the other seasons. Although in the TEM diagnostics we insisted on the role of the increased drag, the decreased lift (green curve) may also attenuate the dominant GASTINEAU ET AL. GASTINEAU ET AL. 10 of 19 10.1029/2020MS002111 Journal of Advances in Modeling Earth Systems Journal of Advances in Modeling Earth Systems Figure 6. (a) DJFM 2‐m air temperature difference, in K, of Atm‐6A‐D+ minus Atm‐6A‐D−. Only grid points with statistical significance lower than 10% colored. The latitude 60°N is shown with a dashed circle. 3.4. Air Temperature Changes (b) Same as (a), but for Atm‐6A minus Atm‐5DL. (c) Same as (a), but for Atm‐6A‐L−minus Atm‐6A‐L+. (d) Mean 2‐m air temperature changes over the polar cap (60–90°N) induced by SSO modifications; black: Atm‐6A minus Atm‐5DL; red: Atm‐6A‐ + minus Atm‐6A‐Drg−; green: Atm‐6A‐Lft−minus Atm‐6A‐Lft+; blue: AO‐6A minus AO‐5DL. The error bars indicate the standard errors of the mean. Figure 6. (a) DJFM 2‐m air temperature difference, in K, of Atm‐6A‐D+ minus Atm‐6A‐D−. Only grid points with statistical significance lower than 10% are colored. The latitude 60°N is shown with a dashed circle. (b) Same as (a), but for Atm‐6A minus Atm‐5DL. (c) Same as (a), but for Atm‐6A‐L−minus Atm‐6A‐L+. (d) Mean 2‐m air temperature changes over the polar cap (60–90°N) induced by SSO modifications; black: Atm‐6A minus Atm‐5DL; red: Atm‐6A‐Drg + minus Atm‐6A‐Drg−; green: Atm‐6A‐Lft−minus Atm‐6A‐Lft+; blue: AO‐6A minus AO‐5DL. The error bars indicate the standard errors of the mean. drag‐induced near‐surface cooling in March or in November. This again demonstrates the importance of the eddy forcing, the lift being important for the planetary waves. 4.1. Atmospheric Circulation Changes The planetary standing wave of the ocean‐atmosphere coupled experiments based on the atmospheric model component studied previously is shown in Figure 7. The overall biases of the 700‐hPa geopotential height in AO‐5DL resemble the biases illustrated previously in the atmosphere‐only experiments: a too deep polar depression and three anomalous troughs over north‐eastern America, northern Europe, and eastern Asia (see Figure 7c). The 700‐hPa geopotential height biases are larger in the coupled model (cf. Figures 1c and 7c), with a maximum bias of ~100 m in AO‐5DL and ~80 m in Atm‐5DL. The 700‐hPa height changes (Figures 7e and 7f) in AO‐6A relative to AO‐5DL are qualitatively similar to that illustrated previously in the atmosphere‐only experiments (Figures 2a and 2b), with a strengthening of the geopotential height over the Arctic in AO‐6A when compared to AO‐5DL and a weakening over the 20–40°N latitude band, especially over the North Atlantic. When compared to AO‐5DL, two dominant 11 of 19 GASTINEAU ET AL. GASTINEAU ET AL. 10.1029/2020M ournal of Advances in Modeling Earth Systems 10.1029/2020MS002111 Figure 7. (a) Geopotential height at 700 hPa averaged over the winter months (DJFM) for AO‐6A minus ERA‐Interim and (b) its zonally asymmetric component. (c) and (d) are the same as (a) and (b), but for AO‐5DL minus ERA‐Interim. (e) and (f) are the same as (a) and (b), but for AO‐6A minus AO‐5DL. In (a)–(d), the root mean square (RMS) 20–90°N difference with ERA‐Interim is indicated on top. In all panels, only grid points with statistical significance lower than 10% are colored. Figure 7. (a) Geopotential height at 700 hPa averaged over the winter months (DJFM) for AO‐6A minus ERA‐Interim and (b) its zonally asymmetric component. (c) and (d) are the same as (a) and (b), but for AO‐5DL minus ERA‐Interim. (e) and (f) are the same as (a) and (b), but for AO‐6A minus AO‐5DL. In (a)–(d), the root mean square (RMS) 20–90°N difference with ERA‐Interim is indicated on top. In all panels, only grid points with statistical significance lower than 10% are colored. Figure 7. (a) Geopotential height at 700 hPa averaged over the winter months (DJFM) for AO‐6A minus ERA‐Interim and (b) its zonally asymmetric component. (c) and (d) are the same as (a) and (b), but for AO‐5DL minus ERA‐Interim. (e) and (f) are the same as (a) and (b), but for AO‐6A minus AO‐5DL. 4.1. Atmospheric Circulation Changes In (a)–(d), the root mean square (RMS) 20–90°N difference with ERA‐Interim is indicated on top. In all panels, only grid points with statistical significance lower than 10% are colored. ridges are simulated, one downstream of the Rockies over north‐eastern America and another one over northern Europe. A smaller ridge is also simulated in eastern Asia, downstream of the Tibetan Plateau. Furthermore, two troughs are simulated upstream of the two major Northern Hemisphere mountain ranges. As in stand‐alone atmospheric simulations, the SSO modification in AO‐6A alleviates the atmospheric cir- culation biases for the asymmetric component as compared to AO‐5DL (Figures 7c and 7d, RMSE from ridges are simulated, one downstream of the Rockies over north‐eastern America and another one over northern Europe. A smaller ridge is also simulated in eastern Asia, downstream of the Tibetan Plateau. Furthermore, two troughs are simulated upstream of the two major Northern Hemisphere mountain ranges. As in stand‐alone atmospheric simulations, the SSO modification in AO‐6A alleviates the atmospheric cir- culation biases for the asymmetric component as compared to AO‐5DL (Figures 7c and 7d, RMSE from 12 of 19 GASTINEAU ET AL. GASTINEAU ET AL. Journal of Advances in Modeling Earth Systems 10.1029/2020MS002111 atmosphere‐only case (Figures Figure 8. (a) DJFM difference of zonal‐mean zonal wind (in m s−1) o AO‐6A minus AO‐5DL. (b) Same as (a), but for the zonal‐mean temperature (in K). (c) DJFM 2‐m air temperature difference, in K, of AO‐6A minus AO‐5DL. In all panels, only grid points with statistical significance lower than 10% are colored. 24.7 to 20.6 m), but the response is weaker in the coupled model case, except over Northern Europe. For example, the same SSO modification (i.e., 6A minus 5DL) in the atmospheric experiment led to changes of up to 50 m over north‐eastern America (Figure 2a), while the changes are of the order of 30 m in the same region in the AOGCM experiments (Figure 7e). The resulting geopotential height in AO‐6A (Figure 7a) remains too strong over the Arctic compared to ERA‐Interim (Figure 1a) and too weak over the midlatitudes, yet less than in AO‐5DL (Figure 7e). The biases of the 700‐hPa geopotential height are nevertheless larger than AO‐5DL in AO‐6A (RMSE increase from 49.3 to 50.5 m) as the geopotential height decreases in the latitudinal band 20–40°N. 4.1. Atmospheric Circulation Changes The difference in duration between the coupled and atmospheric experi- ments might explain the larger changes simulated in the 30‐yr atmosphere‐only experiments, as the internal variability is presumably better removed in the coupled experiment (duration ≥200 yr). Nevertheless, a comparison of the pairwise differences reveals that the changes are indeed significantly weaker in the coupled model experi- ments (Figure S2). The zonal‐mean zonal wind anomalies in AO‐6A relative to AO‐5DL, in the coupled simulations (Figure 8a), are also similar to that shown in the analogous atmosphere‐only simulations (Figure 5b). Both show a bar- otropic enhancement of the subtropical jet in its equatorward flank and a weakening of the eddy‐driven jet at 50°N. Nevertheless, consistently with the geopotential height response, the changes of AO‐6A minus AO‐5DL are about half of Atm‐6A minus Atm‐5DL. The associated zonal‐mean temperature changes are much larger in the coupled model (Figure 8b). Indeed, the lower‐troposphere cooling is quite intense, with a cooling of more than 2 K north of 60°N. A clear cooling is also simulated elsewhere in the troposphere, with values of −0.2 to −0.4 K in the tropics, and ampli- fied values in the upper troposphere, as expected from the adjustment of the moist adiabat. On the other hand, warming is simulated in the polar stratosphere, and the stratospheric polar vortex weakens. The surface air temperature (Figure 8c) is about 3 K cooler over the whole Arctic, with a maximum cooling up to 8 K occurring over the Barents and Okhotsk Seas where the sea ice cover is thin and particularly sensitive to climate fluctuations. The cooling also extends over the Eurasian continent and, to a lesser extent, into the North Pacific and Atlantic. The atmospheric variability in the coupled model also shows a decreasing 500‐hPa geopotential height variance similar to that of the atmosphere‐only simulations, but with weaker amplitude (Figure S3a). The blocking frequency also increases over Scandinavia (Figure S3b). Such an increase is larger than the one simulated in the atmospheric experiments (Figure 4), with a blocking frequency RMSE reduced by 0.77% over the North Atlantic. Over northern Siberia, the RMSE is almost unchanged. In the upper troposphere, the meridional zonal wind and temperature transports are also similar in the coupled model and the atmosphere‐only case (Figures S3c and S3d). 4.1. Atmospheric Circulation Changes However, the lower‐troposphere meridional temperature trans- port at 30–60°N increases in the coupled experiments as a result of the larger meridional temperature gradi- ent. Nevertheless, the anomalous residual vertical velocity is still found to be ascending (negative) north of 60°N for the AOGCM case (Figure S3f), as the lower‐tropospheric lapse rate increases. nal‐mean zonal wind (in m s−1) of a), but for the zonal‐mean temperature difference, in K, of only grid points with statistical ed. Figure 8. (a) DJFM difference of zonal‐mean zonal wind (in m s−1) of AO‐6A minus AO‐5DL. (b) Same as (a), but for the zonal‐mean temperature (in K). (c) DJFM 2‐m air temperature difference, in K, of AO‐6A minus AO‐5DL. In all panels, only grid points with statistical significance lower than 10% are colored. We conclude that in the coupled model the overall dynamical changes due to the SSO modification are simi- lar to the ones inferred from the atmospheric model but weaker. However, these changes in the coupled GASTINEAU ET AL. GASTINEAU ET AL. GASTINEAU ET AL. 13 of 19 10.1029/2020MS002111 l of Advances in Modeling Earth Systems Journal of Advances in Modeling Earth Systems Figure 9. Arctic sea ice concentration, in %, in (a) March and (b) September. The black contour provides the observed sea ice concentration of 50% from 1979 to 2014. The blue contour illustrates the same contour for AO‐6A (dashed line) and AO‐5DL (full line). Arctic sea ice thickness, in m, in (c) March and (d) September. The gray contours give the mean value in AO‐5DL. In all panels, the color illustrates AO‐6A minus AO‐5DL. Figure 9. Arctic sea ice concentration, in %, in (a) March and (b) September. The black contour provides the observed sea ice concentration of 50% from 1979 to 2014. The blue contour illustrates the same contour for AO‐6A (dashed line) and AO‐5DL (full line). Arctic sea ice thickness, in m, in (c) March and (d) September. The gray contours give the mean value in AO‐5DL. In all panels, the color illustrates AO‐6A minus AO‐5DL. model are superimposed onto a lower‐tropospheric cooling over the polar cap. The next subsection focuses on the associated sea ice extension and thickness. 4.2. Ocean and Arctic Sea Ice The Arctic sea ice extent is increased in AO‐6A as compared to AO‐5DL in both summer and winter. In win- ter, the increase is mostly located over the Northern Pacific and the Barents Sea (Figure 9a), while the sea ice concentration decreases locally over the Labrador Sea. The Arctic sea ice thickness also shows a large increase of ~0.8 m in the central Arctic (Figure 9c): It is ~3 m in AO‐5DL, and it raises up to ~3.8 m in AO‐6A. In summer, the sea ice extent increases especially along the coast of Russia in the eastern Arctic (Figure 9b). The multiyear ice thickness also increases by about 1 m off Greenland (Figure 9d). Our interpre- tation is that the colder winter temperature induced by the modified SSO (see Figure 6a) has led to enhanced Arctic sea ice growth in the coupled model. The resulting larger sea ice volume can favor a colder Arctic with a larger summer sea ice extent, as found, for example, in model experiments designed to study the influence of sea ice initialization (Blanchard‐Wrigglesworth et al., 2011; Holland et al., 2011), or when assimilating sea ice thickness in models (Blockley & Peterson, 2018). Besides, the summer sea ice changes may be amplified by the sea ice‐albedo feedback. In summary, the impact of SSO modifications over the Arctic is largely mod- ified by the ocean‐atmosphere coupling, leading to a larger thermodynamic response when compared to the atmosphere‐only model. As the sea ice insulates the ocean from the atmosphere, the more extended sea ice inhibits the heat release from the ocean to the atmosphere in winter, thereby reinforcing the winter cooling. This feedback explains the maximum cooling in November and December (see Figure 6d, blue line). The ice‐albedo feedback may contribute to the smaller summer cooling. Lastly, we note that the SSO 14 of 19 GASTINEAU ET AL. GASTINEAU ET AL. 10.1029/2020MS002111 Journal of Advances in Modeling Earth Systems Journal of Advances in Modeling Earth Systems 10.1029/2020MS002111 modification has corrected the underestimated summer sea ice extent simulated present in AO Annual mean wind stress difference between (a) AO‐6A and ERA‐Interim and (b) AO‐5DL and ERA‐Interim. The color indicates the magnit n 10−2 Pa−1, while the vectors indicate the difference in Pa. (c) Annual mean SST (contour interval ¼ 0.2 K) difference of AO‐6A minus (c), but for the SSH (contour interval ¼ 2 cm). 4.2. Ocean and Arctic Sea Ice The mean SSH (in cm) in AO‐6A is indicated in black contour. (e) Same as (c), but for the erval ¼ 0.1 psu). (f) Yearly Atlantic meridional overturning stream function (in Sv) changes for AO‐6A minus AO‐5DL. The mean Atlantic m stream function (in Sv) in AO‐6A is indicated in gray contour. In (c)–(e), only grid points with statistical significance lower than 10% are Figure 10. Annual mean wind stress difference between (a) AO‐6A and ERA‐Interim and (b) AO‐5DL and ERA‐Interim. The color indicates the magnitude of the difference, in 10−2 Pa−1, while the vectors indicate the difference in Pa. (c) Annual mean SST (contour interval ¼ 0.2 K) difference of AO‐6A minus AO‐5DL. (d) Same as (c), but for the SSH (contour interval ¼ 2 cm). The mean SSH (in cm) in AO‐6A is indicated in black contour. (e) Same as (c), but for the SSS (contour interval ¼ 0.1 psu). (f) Yearly Atlantic meridional overturning stream function (in Sv) changes for AO‐6A minus AO‐5DL. The mean Atlantic meridional overturning stream function (in Sv) in AO‐6A is indicated in gray contour. In (c)–(e), only grid points with statistical significance lower than 10% are colored. modification has corrected the underestimated summer sea ice extent simulated present in AO‐5DL, illustrated in Figures 9a and 9b by the observed and simulated 50% contour for the sea ice concentration The oceanic changes are not restricted to the Arctic. The lower‐tropospheric westerlies are overestimated in AO‐5DL over the eastern North Atlantic and the Kuroshio extension in the Pacific (Figure 10a). The simula- tion AO‐6A (Figure 10b) shows a reduction of these two biases, even if the underestimation of the wind stress in the eastern Pacific becomes more pronounced. This reduction of the westerlies is associated with a south- ward shift of the Northern Hemisphere western boundary oceanic currents, namely, the Gulf Stream and Kuroshio. This can be seen through the maximum cooling located in the western Pacific and Atlantic at Journal of Advances in Modeling Earth Systems Journal of Advances in Modeling Earth Systems 10.1029/2020MS002111 Figure 11. Total (black line), atmospheric (red line), and oceanic (blue line) annual mean meridional energy transport difference, in 1015 W, for AO‐6A minus AO‐5DL. Figure 11. Total (black line), atmospheric (red line), and oceanic (blue line) annual mean meridional energy transp difference, in 1015 W, for AO‐6A minus AO‐5DL. 40–45°N (Figure 10c). This is also consistent with the sea surface height (SSH) reduction at the same locations (Figure 10d). In AO‐6A minus AO‐5DL, the sea surface salinity is also reduced in the subpolar North Atlantic (Figure 10e), which is consistent with a decreasing northward salt transport related to the southward shift of the North Atlantic current. As discussed in Boucher et al. (2020), IPSL‐CM6A‐LR (identical to AO‐6A here) has an important cold (~3°C) and fresh (~1 psu) bias in the North Atlantic. It also shows a cold (~1°C) bias off Japan. As the anomalies indicated by AO‐6A minus AO‐5DL are smaller but consistent with such biases, SSO changes have contributed to amplify these biases. We also note that the warm bias in the Bering sea has been reduced by the SSO modification. 40–45°N (Figure 10c). This is also consistent with the sea surface height (SSH) reduction at the same locations (Figure 10d). In AO‐6A minus AO‐5DL, the sea surface salinity is also reduced in the subpolar North Atlantic (Figure 10e), which is consistent with a decreasing northward salt transport related to the southward shift of the North Atlantic current. As discussed in Boucher et al. (2020), IPSL‐CM6A‐LR (identical to AO‐6A here) has an important cold (~3°C) and fresh (~1 psu) bias in the North Atlantic. It also shows a cold (~1°C) bias off Japan. As the anomalies indicated by AO‐6A minus AO‐5DL are smaller but consistent with such biases, SSO changes have contributed to amplify these biases. We also note that the warm bias in the Bering sea has been reduced by the SSO modification. Cooling is also simulated in the equatorial Pacific and the Indian Ocean in AO‐6A as compared to AO‐5DL. It might be explained by the global response to increased sea ice cover. Many previous studies indeed found that sea ice loss causes a tropical warming in coupled models, called “a mini‐global warming” (Blackport & Kushner, 2017; Deser et al., 2014), by analogy with the warming induced by increasing greenhouse gases. 4.3. Meridional Energy Transport In the coupled simulations, the atmospheric and oceanic meridional energy transports change as a response to the new surface and top‐of‐atmosphere energy budgets. The atmospheric and oceanic energy transports are calculated using the top of the atmosphere radiative budget and the net surface heat flux integrated from 90°S. As the energy non‐conservation is stationary (not shown), we remove the mean non‐conservation term before calculation. In the coupled experiments, the extension of Arctic sea ice in AO‐6A relative to AO‐5DL leads to a decrease of incoming shortwave radiation over the Arctic, caused by the increased surface albedo. This implies an increase of the total northward meridional energy transport, as illustrated in Figure 11 (black line). The atmospheric meridional energy transport (AMET; red line) accounts for most of this increase. The AMET increase is consistent with the lower‐tropospheric meridional temperature transport in midlatitudes (Figure S3c). In the tropics, the AMET changes are consistent with the Hadley cells modifications expected from the Arctic cooling (Yoshimori et al., 2018), with a direct anomalous cross‐equatorial cell. The anoma- lous cell leads to northward meridional geopotential transport in its upper branch and increasing southward heat and moisture transport in its lower branch (Figure S4). However, the northward oceanic meridional energy transport (OMET; blue line) is reduced, which damps the influence of the AMET increase. The OMET reduction is consistent with the weaker Atlantic meridional overturning stream function (Figure 10f). In AO‐6A minus AO‐5DL, the decreasing subpolar North Atlantic salinity (Figure 10e) weakens the seawater density in the subpolar gyre, which likely leads in turn to the AMOC weakening. Journal of Advances in Modeling Earth Systems Such a tropical impact is explained by the water vapor feedback and ocean circulation changes (Deser et al., 2016). The tropical cooling produced by the sea ice increase in our experiments is very comparable to the results in these previous studies, but with an opposite sign. We will illustrate next the changes in the meridional energy transports. 4.3. Meridional Energy Transport GASTINEAU ET AL. GASTINEAU ET AL. 15 of 19 GASTINEAU ET AL. Journal of Advances in Modeling Earth Systems 10.1029/2020MS002111 to the local flow. The lift was designed to represent the dynamical separation from the large‐scale flow of the air in narrow valleys (Lott, 1999). The SSO changes implemented cause a reduced polar depression, as well as a better simulation of the Northern Hemisphere stationary wave pattern. Furthermore, we noticed a lower‐tropospheric cooling at 60–90°N over the Arctic. These changes are mainly due to the increased lower‐tropospheric drag. This effect is counter‐intuitive, as previous works found that enhanced drag gener- ally warms the midlatitudes and polar regions (Palmer et al., 1986). Using TEM diagnostics in atmosphere‐only experiments, we showed that the cooling is driven by the weaker eddy activity, which decreases the northward heat and momentum transport. In the coupled model, the same SSO modification is found to have a large impact on Arctic sea ice, as the lower‐tropospheric atmospheric cooling is amplified by the winter sea ice growth and a reduced oceanic heat loss. Nevertheless, the changes in the standing wave or zonal winds are weaker than in the atmosphere‐only experiments. The adjustment of the SSO parameterization in IPSL‐CM6A‐LR has therefore contributed to restoring the Arctic sea ice cover, which was initially too sparse. In our case, the Arctic sea ice bias was associated with a warm winter air temperature bias, which was thus also reduced. Nevertheless, several other negative impacts are also found, so that caution is needed before applying such SSO modifications. In particular, increasing the SSO drag and decreasing the lift have led to a reduction of the AMOC, which is rather weak in this model (about 13 Sv; Boucher et al., 2020). We suggest that the AMOC changes are here induced by the weaker westerlies in the Eastern Atlantic, shifting southward the North Atlantic current, and decreasing the salinity transport toward the subpolar gyre. The wind‐induced southward shift of the North Atlantic current has also degraded the cold and fresh bias present in the central Atlantic (Boucher et al., 2020). This bias is a common feature in many models using a low‐resolution ocean. The surface air temperature impact was also specifically investigated outside the Arctic. In the atmospheric simulations, the SSO modification is found to modulate the contrast of air temperature between North America and Eurasia. This reflects the influence of SSO drag on the planetary stationary wave. Acknowledgments Acknowledgments This research was supported by the Blue‐Action project (European Union's Horizon 2020 research and innovation program, Grant Number 727852) and by the ARCHANGE project of the “Make our planet great again” program (ANR‐18‐MPGA‐0001, France). F. L. acknowledges funding from the JPI‐ Climate/Belmont Forum project GOTHAM (ANR‐15‐JCLI‐0004‐01). This work used the HPC resources of TGCC under the allocations 2016‐ A0030107732, 2017‐R0040110492, and 2018‐1293R0040110492 (project gen- cmip6) provided by Grand Équipement National de Calcul Intensif (GENCI). This study benefited from the Ensemble de Services Pour la Recherche à l'IPSL (ESPRI) computing and data center (https://mesocentre.ipsl.fr) which is supported by CNRS, Sorbonne Université, Ecole Polytechnique, and CNES and through national and inter- national grants. Data Availability Statement The data of the sensitivity experiments supporting the conclusions of the study can be obtained online (https://doi.org/10.5281/zenodo.3714902). Andrews, D. G., Leovy, C. B., & Holton, J. R. (1987). Middle atmosphere dynamics (Vol. 40). New York: Academic Press. Bacmeister, J. T. (1993). Mountain‐wave drag in the stratosphere and mesosphere inferred from observed winds and a simple mountain‐wave parameterization scheme. Journal of the Atmospheric Sciences, 50(3), 377–399. Baines, P. G., & Palmer, T. N. (1985). Rationale for a new physically‐based parametrization of subgrid‐scale orographic effects, ECMWF Technical Memoranda, 169, 11. https://doi.org/10.21957/h4h36b3u Blackmon, M. L. (1976). A climatological spectral study of the 500 mb geopotential height of the Northern Hemisphere. Journal of the Atmospheric Sciences, 33(8), 1607–1623. https://doi.org/10.1175/1520-0469(1976)033<1607:ACSSOT>2.0.CO;2 Blackport, R., & Kushner, P. J. (2017). Isolating the atmospheric circulation response to Arctic sea ice loss in the coupled climate system. Journal of Climate, 30(6), 2163–2185. https://doi.org/10.1175/JCLI-D-16-0257.1 Blanchard‐Wrigglesworth, E., Bitz, C. M., & Holland, M. M. (2011). Influence of initial conditions and climate forcing on predicting Arctic sea ice. Geophysical Research Letters, 38, L18503. https://doi.org/10.1029/2011GL048807 Blockley, E. W., & Peterson, K. A. (2018). Improving Met Office seasonal predictions of Arctic sea ice using assimilation of CryoSat‐2 thickness. The Cryosphere, 12, 3419–3438. https://doi.org/10.5194/tc-12-3419-2018 Boucher, O., Servonnat, J., Albright, A. L., Aumont, O., Balkanski, Y., Bastrikov, V., et al. (2020). Presentation and evaluation of the IPSL‐ CM6A‐LR climate model. Journal of Advances in Modeling Earth Systems, 12, e2019MS002010. https://doi.org/10.1029/2019MS002010 Journal of Advances in Modeling Earth Systems The SSO drag also cools Eurasia, as it weakens the air advection from the warm Atlantic toward the land. The air tempera- ture modification is also partly caused by the lift, which directly modifies the Northern Hemisphere standing wave pattern. The results shown are likely sensitive to the model. However, the CMIP5 models all have biases of the North Atlantic storm track and European blockings. These biases were found to be quite similar to those produced in a simulation with a deactivated low‐level orographic blocking effect (Pithan et al., 2016). Furthermore, the low‐level winter warm biases over Arctic sea ice are also common to many other models (Graham et al., 2019). This suggests that a deficit of low‐level drag is also present in other climate models, and more work might therefore be needed to understand the implications for Arctic sea ice and the oceanic circulation biases in the other AOGCMs. 5. Discussions and Conclusion During the tuning of the IPSL‐CM6A‐LR model, the parametrized orography was modified to alleviate the biases of the atmospheric circulation resulting from the updated model physics. We increased the orographic lower‐tropospheric blocking effect (so‐called drag). We also decreased the lift, which is a force perpendicular GASTINEAU ET AL. GASTINEAU ET AL. 16 of 19 Journal of Advances in Modeling Earth Systems Slow thermally or frictionally controlled meridional circulation in a circular vortex. Astrophysica Norvegica, 5, 19 Eyring, V., Bony, S., Meehl, G. A., Senior, C. A., Stevens, B., Stouffer, R. J., & Taylor, K. E. (2016). Overview of the Coupled Model Intercomparison Project Phase 6 (CMIP6) experimental design and organization. Geoscientific Model Development, 9(5), 1937–1958. https://doi.org/10.5194/gmd-9-1937-2016 Garner, S. T. (2005). A topographic drag closure built on an analytical base flux. Journal of the Atmospheric Sciences, 62(7), 2302–231 https://doi.org/10.1175/JAS3496.1 p g Graham, R. M., Cohen, L., Ritzhaupt, N., Segger, B., Graversen, R. G., Rinke, A., et al. (2019). Evaluation of six atmospheric reanalyses o Arctic sea ice from winter to early summer. Journal of Climate, 32(14), 4121–4143. https://doi.org/10.1175/JCLI-D-18-0643.1 Haynes, P. H., McIntyre, M. E., Shepherd, T. G., Marks, C. J., & Shine, K. P. (1991). On the “downward control” of extratropical diabatic circulations by eddy‐induced mean zonal forces. Journal of the Atmospheric Sciences, 48(4), 651–678. https://doi.org/10.1175/1520- 0469(1991)048<0651:OTCOED>2.0.CO;2 ( ) ; Held, I. M., Guo, H., Adcroft, A., Dunne, J. P., Horowitz, L. W., Krasting, J., et al. (2019). Structure and performance of GFDL's CM4.0 climate model. Journal of Advances in Modeling Earth Systems, 11, 3691–3727. https://doi.org/10.1029/2019MS001829 Holland, M. M., Bailey, D. A., & Vavrus, S. (2011). Inherent sea ice predictability in the rapidly changing Arctic environment of the Community Climate System Model version 3 Climate Dynamics 36(7 8) 1239 1253 https://doi org/10 1007/s00382 010 0792 4 Holland, M. M., Bailey, D. A., & Vavrus, S. (2011). Inherent sea ice predictability in the rapidly changing Arctic environment of the Community Climate System Model, version 3. Climate Dynamics, 36(7–8), 1239–1253. https://doi.org/10.1007/s00382-010-0792-4 Hourdin, F., Musat, I., Bony, S., Braconnot, P., Codron, F., Dufresne, J.‐L., et al. (2006). The LMDZ4 general circulation model: Climate performance and sensitivity to parametrized physics with emphasis on tropical convection. Climate Dynamics, 27(7–8), 787–813. https:// doi.org/10.1007/s00382-006-0158-0 g Hourdin, F., Rio, C., Grandpeix, J.‐Y., Madeleine, J.‐B., Cheruy, F., Rochetin, N., et al. (2020). LMDZ6A: The atmospheric component of the IPSL climate model with improved and better tuned physics. Journal of Advances in Modeling Earth Systems, 12, e2019MS001892. https://doi.org/10.1029/2019MS001892 Lott, F. (1999). Alleviation of stationary biases in a GCM through a mountain drag parameterization scheme and a simple repre- sentation of mountain lift forces. Monthly Weather Review, 127(5), 788–801. https://doi.org/10.1175/1520-0493(1999)127<0788: AOSBIA>2.0.CO;2 Lott, F., & D'andrea, F. (2005). References Boucher, O., Servonnat, J., Albright, A. L., Aumont, O., Balkanski, Y., Bastrikov, V., et al. (2020). Presentation and evaluation of the IPSL‐ CM6A‐LR climate model. Journal of Advances in Modeling Earth Systems, 12, e2019MS002010. https://doi.org/10.1029/2019MS002010 GASTINEAU ET AL. 17 of 19 Journal of Advances in Modeling Earth Systems Mass and wind axial angular‐momentum responses to mountain torques in the 1–25 day band: Links with the Arctic Oscillation. Quarterly Journal of the Royal Meteorological Society, 131(608), 1483–1500. https://doi.org/10.1256/ qj.03.168 Lott, F., & Miller, M. J. (1997). A new subgrid‐scale orographic drag parametrization: Its formulation and testing. Quarterly Journal of the Royal Meteorological Society, 123(537), 101–127. https://doi.org/10.1002/qj.49712353704 Lott, F., Robertson, A. W., & Ghil, M. (2004). Mountain torques and Northern Hemisphere low‐frequency variability. Part II: Region aspects. Journal of the Atmospheric Sciences, 61(11), 1272–1283. https://doi.org/10.1175/1520-0469(2004)061<1272:MTANHL>2.0.C tt, F., Robertson, A. W., & Ghil, M. (2004). Mountain torques and Northern Hemisphere low‐frequency variability. Part II: Regional t J l f th At h i S i 61(11) 1272 1283 htt //d i /10 1175/1520 0469(2004)061 1272 MTANHL 2 0 CO 2 Lott, F., Robertson, A. W., & Ghil, M. (2004). Mountain torques and Northern Hemisphere lo aspects. Journal of the Atmospheric Sciences, 61(11), 1272–1283. https://doi.org/10.1175/152 Lott, F., Robertson, A. W., & Ghil, M. (2004). Mountain torques and Northern Hemisphere low‐frequency variability. Part II: Regional aspects. Journal of the Atmospheric Sciences, 61(11), 1272–1283. https://doi.org/10.1175/1520-0469(2004)061<1272:MTANHL>2.0.CO;2 Palmer, T. N., Shutts, G. J., & Swinbank, R. (1986). Alleviation of a systematic westerly bias in general circulation and numerical weather prediction models through an orographic gravity wave drag parametrization. Quarterly Journal of the Royal Meteorological Society, 112(474), 1001–1039. https://doi.org/10.1002/qj.49711247406 Palmer, T. N., Shutts, G. J., & Swinbank, R. (1986). Alleviation of a systematic westerly bias in general circulation and numerical weather prediction models through an orographic gravity wave drag parametrization. Quarterly Journal of the Royal Meteorological Society, 112(474), 1001–1039. https://doi.org/10.1002/qj.49711247406 ( ) p g qj Pithan, F., Shepherd, T. G., Zappa, G., & Sandu, I. (2016). Climate model biases in jet streams, blocking and storm tracks resulting fr missing orographic drag. Geophysical Research Letters, 43, 7231–7240. https://doi.org/10.1002/2016GL069551 Sandu, I., Bechtold, P., Beljaars, A., Bozzo, A., Pithan, F., Shepherd, T. G., & Zadra, A. (2016). Impacts of parameterized orographic drag on the Northern Hemisphere winter circulation. Journal of Advances in Modeling Earth Systems, 8, 196–211. https://doi.org/10.1002/ 2015MS000564 Sandu, I., van Niekerk, A., Shepherd, T. G., Vosper, S. B., Zadra, A., Bacmeister, J., et al. (2019). Impacts of orography on large‐scale atmospheric circulation. Climate and Atmospheric Science, 2(1), 10. https://doi.org/10.1038/s41612-019-0065-9 Scherrer, S. C., Croci‐Maspoli, M., Schwierz, C., & Appenzeller, C. (2006). Two‐dimensional indices of atmospheric blocking and their statistical relationship with winter climate patterns in the Euro‐Atlantic region. Journal of Advances in Modeling Earth Systems 10.1029/2020MS002111 Cheruy, F., Ducharne, A., Hourdin, F., Musat, I., Vignon, E., Gastineau, G., et al. (2020). Improved near surface continental climate in IPSL‐CM6 by combined evolutions of atmospheric and land surface physics. Journal of Advances in Modeling Earth Systems, 12, e2019MS002005. https://doi.org/10.1029/2019MS002005 y, , , , , , , , g , , , , ( ) p IPSL‐CM6 by combined evolutions of atmospheric and land surface physics. Journal of Advances in Modeling Earth Systems, 12, e2019MS002005. https://doi.org/10.1029/2019MS002005 Davini P & Cagnazzo C (2014) On the misinterpretation of the North Atlantic Oscillation in CMIP5 models Climate Dynamics 43(56) e2019MS002005. https://doi.org/10.1029/2019MS002005 Davini, P., & Cagnazzo, C. (2014). On the misinterpretation of the North Atlantic Oscillation in CMIP5 models. Climate Dynamics, 43(5–6), 1497 1511 https://doi org/10 1007/s00382 013 1970 y p g Davini, P., & Cagnazzo, C. (2014). On the misinterpretation of the North Atlantic Oscillation in CMIP5 models. Climate Dynamics, 43(5 1497–1511. https://doi.org/10.1007/s00382-013-1970-y g Davini, P., Cagnazzo, C., Neale, R., & Tribbia, J. (2012). Coupling between Greenland blocking and the North Atlantic Oscillation patt Geophysical Research Letters, 39, L14701. https://doi.org/10.1029/2012GL052315 Dee, D. P., Uppala, S. M., Simmons, A. J., Berrisford, P., Poli, P., Kobayashi, S., et al. (2011). The ERA‐Interim reanalysis: Configuration and performance of the data assimilation system. Quarterly Journal of the Royal Meteorological Society, 137(656), 553–597. https://doi.org/ 10.1002/qj.828 qj Deser, C., Sun, L., Tomas, R. A., & Screen, J. (2016). Does ocean coupling matter for the northern extratropical response to projected Arctic sea ice loss? Geophysical Research Letters, 43, 2149–2157. https://doi.org/10.1002/2016GL067792 Deser, C., Tomas, R. A., & Sun, L. (2014). The role of ocean–atmosphere coupling in the zonal‐mean atmospheric response to Arctic sea loss. Journal of Climate, 28(6), 2168–2186. https://doi.org/10.1175/JCLI-D-14-00325.1 Deser, C., Tomas, R. A., & Sun, L. (2014). The role of ocean–atmosphere coupling in the zonal‐ loss. Journal of Climate, 28(6), 2168–2186. https://doi.org/10.1175/JCLI-D-14-00325.1 Durack, P. J., & Taylor, K. E. (2018). PCMDI AMIP SST and sea‐ice boundary conditions version 1.1.4. Version 20180427. Earth System G Federation. http://doi.org/10.22033/ESGF/input4MIPs.2204 Durack, P. J., & Taylor, K. E. (2018). PCMDI AMIP SST and sea‐ic Federation. http://doi.org/10.22033/ESGF/input4MIPs.2204 Durack, P. J., & Taylor, K. E. (2018). PCMDI AMIP SST and sea‐ice Federation. http://doi.org/10.22033/ESGF/input4MIPs.2204 p g p Edmon, H. J. Jr., Hoskins, B. J., & McIntyre, M. E. (1980). Eliassen‐Palm cross sections for the troposphere. Journal of the Atmospheric Sciences, 37(12), 2600–2616. https://doi.org/10.1175/1520-0469(1980)037<2600:EPCSFT>2.0.CO;2 Eliassen, A. (1951). Journal of Advances in Modeling Earth Systems International Journal of Climatology: A Journal of the Royal Meteorological Society, 26(2), 233–249. https://doi.org/10.1002/joc.1250 Tjernström, M., & Graversen, R. G. (2009). The vertical structure of the lower Arctic troposphere analysed from observations and the ERA‐40 reanalysis. Quarterly Journal of the Royal Meteorological Society, 135(639), 431–443. https://doi.org/10.1002/qj.380 van Niekerk, A., Scinocca, J. F., & Shepherd, T. G. (2017). The modulation of stationary waves, and their response to climate change Tjernström, M., & Graversen, R. G. (2009). The vertical structure of the lower Arctic troposphere analysed from observations and the ERA‐40 reanalysis. Quarterly Journal of the Royal Meteorological Society, 135(639), 431–443. https://doi.org/10.1002/qj.380 van Niekerk, A., Scinocca, J. F., & Shepherd, T. G. (2017). The modulation of stationary waves, and their response to climate change, by parameterized orographic drag. Journal of the Atmospheric Sciences, 74(8), 2557–2574. https://doi.org/10.1175/JAS-D-17-0085.1 p ( ) y p g parameterized orographic drag. Journal of the Atmospheric Sciences, 74(8), 2557–2574. https://doi.org/10.1175/JAS-D-17-0085.1 van Niekerk, A., Shepherd, T. G., Vosper, S. B., & Webster, S. (2016). Sensitivity of resolved and parametrized surface drag to changes in resolution and parametrization. Quarterly Journal of the Royal Meteorological Society, 142(699), 2300–2313. https://doi.org/10.1002/ qj.2821 qj Vignon, E., Hourdin, F., Genthon, C., Gallée, H., Bazile, E., Lefebvre, M.‐P., et al. (2017). Antarctic boundary layer parametrization in a general circulation model: 1‐D simulations facing summer observations at Dome C. Journal of Geophysical Research: Atmospheres, 122, 6818–6843. https://doi.org/10.1002/2017JD026802 Vignon, E., Hourdin, F., Genthon, C., Gallée, H., Bazile, E., Lefebvre, M.‐P., et al. (2017). Antarctic boundary layer parametrization in a general circulation model: 1‐D simulations facing summer observations at Dome C. Journal of Geophysical Research: Atmospheres, 122, 6818–6843. https://doi.org/10.1002/2017JD026802 18 of 19 GASTINEAU ET AL. Journal of Advances in Modeling Earth Systems 10.1029/2020MS002111 Wallace, J. M., Tibaldi, S., & Simmons, A. J. (1983). Reduction of systematic forecast errors in the ECMWF model through the introduction of an envelope orography. Quarterly Journal of the Royal Meteorological Society, 109(462), 683–717. https://doi.org/10.1002/ qj.49710946202 Wallace, J. M., Tibaldi, S., & Simmons, A. J. (1983). Reduction of systematic forecast errors in the ECMWF model through the introduction of an envelope orography. Quarterly Journal of the Royal Meteorological Society, 109(462), 683–717. https://doi.org/10.1002/ qj.49710946202 Walsh, J. E., Chapman, W. L., & Portis, D. H. (2009). Arctic cloud fraction and radiative fluxes in atmospheric reanalyses. Journal of Climate, 22(9), 2316–2334. https://doi.org/10.1175/2008JCLI2213.1 ( ) p g oollings, T., Hoskins, B., Blackburn, M., & Berrisford, P. (2008). A new Rossby wave–breaking interpretation of the North Atlantic Oscillation. Journal of the Atmospheric Sciences, 65(2), 609–626. https://doi.org/10.1175/2007JAS2347.1 Yoshimori, M., Abe‐Ouchi, A., Tatebe, H., Nozawa, T., & Oka, A. (2018). The importance of ocean dynamical feedback for understanding the impact of mid–high‐latitude warming on tropical precipitation change. Journal of Climate, 31(6), 2417–2434. https://doi.org/ 10.1175/JCLI-D-17-0402.1 Zadra, A. (2015). WGNE drag project: An inter‐model comparison of surface stresses, technical report [Available at http://collaboration. cmc.ec.gc.ca/science/rpn/drag_project/documents/ wgne_drag_project_report01.pdf] Zadra, A. (2015). WGNE drag project: An inter‐model comparison of surface stresses, technical report [Available at http://collaboration. cmc.ec.gc.ca/science/rpn/drag_project/documents/ wgne_drag_project_report01.pdf] Zadra, A., Roch, M., Laroche, S., & Charron, M. (2003). The subgrid‐scale orographic blocking parametrization of the GEM model. Atmosphere‐Ocean, 41(2), 155–170. https://doi.org/10.3137/ao.410204 Zadra, A., Roch, M., Laroche, S., & Charron, M. (2003). The subgrid‐scale Atmosphere‐Ocean, 41(2), 155–170. https://doi.org/10.3137/ao.410204 Atmosphere‐Ocean, 41(2), 155–170. https://doi.org/10.3137/ao.410204 p p g Zhao, M., Golaz, J.‐C., Held, I. M., Guo, H., Balaji, V., Benson, R., et al. (2018). The GFDL global atmosphere and land model AM4.0/LM4.0: 2. Model description, sensitivity studies, and tuning strategies. Journal of Advances in Modeling Earth Systems, 10, 735–769. https://doi. org/10.1002/2017MS001209 g Zhao, M., Golaz, J.‐C., Held, I. M., Guo, H., Balaji, V., Benson, R., et al. (2018). The GFDL global atmosphere and land model AM4.0/LM4.0: 2. Model description, sensitivity studies, and tuning strategies. Journal of Advances in Modeling Earth Systems, 10, 735–769. https://doi. org/10.1002/2017MS001209 Zhao, M., Golaz, J.‐C., Held, I. M., Guo, H., Balaji, V., Benson, R., et al. (2018). The GFDL global atmosphere and land model AM4.0/LM4.0: 2. Model description, sensitivity studies, and tuning strategies. Journal of Advances in Modeling Earth Systems, 10, 735–769. https://doi. org/10.1002/2017MS001209 19 of 19 GASTINEAU ET AL.
W4393278549.txt
https://journals.wlb-stuttgart.de/ojs/index.php/zh/article/download/11156/11027
de
Hofkapellmeister Thomas Täglichsbeck
Zollerheimat
2,024
cc-by
3,113
ZOIERHEIMAT UrG DER HONEN« BLATTER ZUR FORD ZOLLERESCMED HEIMAT« HMD •OLUUNOE NUMMER 9 Hechingen, 15. September 1937 6. JAHRGANG Hhofkapellmetfter Thomas Cägltthsbeck 1828_ 1857 Dirigent der Hofkapelle des Fürsten Konstantin von Hohenzollern-Hechingen Von S. F l a d (Schluß) Als Fürst Konstantin 1836 persönlich die Leitung der Regierung übernahm, stellte er zur Förderung des Kunst­ lebens an seinem Hofe größere Mittel zur Verfügung. In verstärktem Maße wurden nunmehr hervorragende Virtuosen und Komponisten zur Mitwirkung bei den Konzerten herangezogen. Unter der stattlichen Zahl der Gäste rechnen wohl die Aufenthalte von Hektor Berlioz und Franz Liszt zu den bedeutendsten. In seinen Reisebriefen schreibt Berlioz über den Fürsten folgendermaßen: „Der Herr dieser malerischen Land­ schaft ist ein geistreicher, lebhafter junger Herr, den auf der Welt nur zweierlei zu beseelen scheint: der Wunsch, seine Untergebenen so glücklich wie möglich zu machen und die Liebe zur Musik. Gibt es wohl ein schöneres Da­ sein als das seine? Rings um sich her erblickt er nur Zu­ friedenheit, seine Untertanen vergöttern ihn, und die Tonkunst, die er als Dichter und Musiker durchdringt, hat ihn zu ihrem Liebling erkoren. Er selbst komponiert reizende Lieder, von denen zwei: „Der Fischerknabe“ und „Schiffers Abendlied“ mich wahrhaft ergriffen haben.“ Am Neujahrstage 1842 war Berlioz auf eine Ein­ ladung der Fürstin hier in Hechingen eingetroffen. In Eile wurde innerhalb von drei Tagen ein Konzert mit Werken von Berlioz vorbereitet. Schon nach 5 Tagen waren die Ouvertüre zu „König Lear“, der Pilgermarsch aus der „Harold-Symphonie“, die Ballszene aus der „Phantastischen Symphonie“ und Bruchstücke aus an­ deren, bisher ganz unbekannten Kompositionen einstu­ diert. In dem großen Konzert zu Ehren Berlioz spielte Täglichsbeck auf dem Flügel die Harfenstimme und in der Haroldsymphonie das große Bratschensolo. Die be­ achtlichen Leistungen der Kapelle stellten den an sehr hohe Anforderungen gewöhnten Komponisten zufrieden, vor allem fanden die ersten Kräfte des Orchesters die größte Anerkennung. Nach der Veranstaltung hatte der Fürst in der Villa Eugenia aus Anlaß des hohen Künst­ lerbesuches zu einem Essen gebeten. In zwangslosem Bei­ sammensein wurde hier noch am Abend musiziert, wobei Berlioz als Solocellist, Täglichsbeck am Flügel und der stimmbegabte Fürst mit seinen eigenen Kompositionen aufwarteten. Im Dezember 1843 und wiederholt im folgenden Jahre weilte auch Franz Liszt in Hechingen. Verschiedene Kon­ zerte fanden während seines vierwöchigen Aufenthaltes statt, in denen der große Meister von den Einheimischen und zahlreichen Fremden immer mit außerordentlicher Begeisterung gefeiert wurde. Durch die häufigen Be­ suche bahnten sich zwischen dem Fürsten und Liszt freundschaftliche Beziehungen an, die später in Löwen­ berg zu einem noch engeren persönlichen Zusammen­ schlusse führen sollten. Trotz der anspruchsvollen Dienstverpflichtungen wid­ mete sich Täglichsbeck mit Eifer seinen eigenen künst­ lerischen Neigungen. Schon im ersten Jahre seiner Anstellung in Hechingen (1828) unternahm er in den Herbstmonaten eine größere Konzertreise, die ihn mit allerbestem Erfolge nach Oesterreich und in die bedeu­ tendsten Städte Deutschlands führte. Neben seinem Auf­ treten in München, Wien und Berlin ist vor allen Dingen sein Aufenthalt in Leipzig hervorzuheben, wo ihm bei seinem Konzerte im Gewandhaus besonders begeisterte Aufnahme zuteil wurde. Leider konnte Täglichsbeck in den nächsten Jahren seine Reisen als konzertierender Künstler nicht wieder­ holen. Die vielseitigen Berufsgeschäfte erforderten seinen ganzen Kräfteeinsatz. 1833 nahm er aber mit neuer Be­ geisterung seine kompositorische und solistische Tätigkeit wieder auf. Neben einer Anzahl kleinerer Violin- und Klavierwerke beschäftigte er sich vorwiegend mit der Komposition seiner ersten Symphonie, durch deren 65 Aufführung in den Pariser Konservatoriumskonzerten er sich höchste Ehrungen erwerben sollte. Das Musikleben in Paris, das sich zur tonangebenden Hegemoniestellung emporgeschwungeri hatte, stand zu jener Zeit in seiner höchsten Blüte. Alle Meister von Ruf und Rang strebten nach dieser Metropole, um hier vor dem strengsten Gerichte einer Weltpresse das Siegel der Bestätigung ihrer künstlerischen Qualität zu erringen. Als vortrefflicher Violinist hatte er sich dort bereits einen beifälligen Eingang erringen können. Mit besonderem Interesse sahen die Pariser Kunstrichter seinem ersten Auftreten als Komponist entgegen. Ein überraschend starker und nachhaltiger Erfolg war denn auch der ersten Aufführung seiner Es-dur Symphonie op 10 beschieden, die darauf mehrfach noch in den Konzerten des Konservatoriums erklang. Als Ausdruck für die überaus herzliche Aufnahme, die seine erste Symphonie gefunden hatte, schrieb er eine zweite in e-moll. Er wurde von der Kon­ zertgesellschaft zum ersten Januar 1837 zur Aufführung beider Werke nach der französischen Hauptstadt ein­ geladen. Leider blieb es diesmal nur bei der Einladung. Auch seine zweite Symphonie wurde gut ausgenommen und erklang darnach in vielen deutschen Konzertsälen, besonders in Leipzig. • Nach den Erfolgen mit seinem symphonischen Erst­ lingswerke eröffneten sich weitere Möglichkeiten zu aus­ wärtigen Konzertreisen. So errang er sich noch ähnlich große Erfolge in Belgien, Holland, Böhmen, Schweden und Dänemark. Nicht ohne Bedeutung für sein Schaffen war seine Vermählung (1838) mit Therese Landauer, der Tochter einer angesehenen Stuttgarter Familie. Mehrere Konzert­ stücke für Violine und Blasinstrumente, eine S y m p h o nie, das große Oratorium „Salomos Thron­ besteigun g“, sowie einige Streichquartette und Duette wurden von ihm damals komponiert. Auch meh­ rere Lieder verdanken dieser Zeit ihre Entstehung. Im Herbst 1839 konzertierte er wieder in den Nieder­ landen und in Belgien. In Amsterdam, Rotterdam. Haag, Fürst Friedrich Wilhelm Konstantin von Hohenzollern Hechingen nach einem alten Stich 66 Middelburg, Vlissingen, Antwerpen und Brüssel fand Täglichsbeck begeisterte Aufnahme. Große Verehrung erregte sein Spiel in Utrecht. Im nächsten Jahre, 1840, unternahm er eine längere Konzertreise, die ihn nach Schweden und Dänemark führte. Ueber Brandenburg, Rostock, Wismar, Lübeck, wo er überall „brillante Kon­ zerte“ gegeben hatte, fuhr er nach Stockholm. Sowohl hier wie auch am Hofe zu Kopenhagen erhielt er den ehrenvollen Auftrag, vor der Königsfamilie zu spielen. Nachdem er noch in Hamburg und Kassel großen Bei­ fall errungen hatte, kehrte er nach seinem Wohnsitz zurück. Erst im Herbst 1843 verließ er wieder für längere Zeit den fürstlichen Hof, um in Böhmen seine bisherigen Aus­ landserfolge fortzusetzen. Auf seiner Hinreise verweilte er auch einige Tage in seiner Heimatstadt Hof und wurde dort herzlich gefeiert. Ueber Eger und Karlsbad reiste er dann nach Prag, wo er sich mehrere Wochen aushielt. Ueberall fanden seine Konzerte lebhaftesten Beifall. Auch seine Messe wurde in Prag aufgeführt, und mit der Annahme einer Oper schienen sich günstige Aus­ sichten zu eröffnen. Selbst eine Berufung an das dortige Konservatorium wurde ihm angetragen, was er jedoch ablehnte. Auf direktem Wege kehrte er von Prag wieder nach Hechingen zurück. Die Verdienste, die sich Täglichsbeck durch seine großen künstlerischen Leistungen erworben hatte, be­ zeugte der Fürst mit der Verleihung des Hausordens, als einem sichtbaren Beweis seines persönlichen Wohl­ wollens. Nach den fehlgeschlagenen Bemühungen um die An­ nahme einer Oper am Prager Theater unternahm er 1844 eine Reise nach München. Anscheinend bemühte er sich dort erneut um das Aufführungsangebot seiner beiden großen Opern „Enzio“ und „Kaiser Heinrich IV.“ Erstere hatte bereits in Karlsruhe eine beifällige Uraufführung erlebt. Leider sind seine Bemühungen an der Münchener Bühne nicht von Erfolg gekrönt gewesen. In das folgende Jahr (1845) fällt das große Musikfest der Stadt Bonn, an dem auch Täglichsbeck teilnahm. Mit zahlreichen ihm bekannten Musikgrößen des In- und Auslandes traf er dort zusammen, so z. B. Spohr, Fetis aus Brüssel, Bacher aus Wien u. a. m. Dieses bedeutungs­ volle Bonner Musikfest war das letzte große Ereignis, das er von Hechingen aus miterleben durfte. Eine ehren­ volle Aufforderung zur tätigen Mitwirkung bei einer Ver­ anstaltung des Salzburger Dom-Musik-Vereins 1846 — des Gründers des Mozarteum — wäre aus dieser Zeit noch nennenswert. In Löwenberg Nach der Februarrevolution 1848 war ein gedeihliches Weiterbestehen der Hechinger Hofkapelle unmöglich ge­ worden. Täglichsbeck und die Orchestermitglieder wur­ den deshalb auf unbestimmte Zeit und mit vollem Ge­ halte beurlaubt. Nach Abtretung des Landes an den König von Preußen siedelte der Fürst auf seine schlesi­ schen Besitzungen über, um nach Rückkehr ruhigerer Verhältnisse wieder seinen eigenen musikalischen Nei­ gungen nachgehen zu können. Bevor Löwenberg durch die Uebersiedelung der Hof­ kapelle des Fürsten Konstantin sich zu dem hervorragen­ den künstlerischen Mittelpunkte entwickelte, hatte hier in Schlesien die Tonkunst schon liebevolle Pflege gefun­ den. In Plagwitz, unweit von Löwenberg, unterhielt der Baron v o n H ohberg eine ansehnliche Kapelle. Als Pianistin pflegte die Baronin von Hohberg selbst in der Kapelle mitzuwirken. Gneisenau, der berühmte Feld­ marschall der Freiheitskriege, gehörte zu jener Zeit einem Löwenberger Regiment als Leutnant an und war damals ein ständiger Gast dieser Konzerte. Auf Schloß Hohlstein hatte Graf Röder durch großzügige künstlerische Veranstaltungen wiederum eine Stätte ech­ ter Musikpflege geschaffen. Haydn und Mozart erfreuten sich bei der Kapelle besonderer Pflege. Aus unbekannten Gründen wurde sie einst aufgelöst, bald darauf aber unter der nächsten Schloßbesitzerin, der Fürstin Pauline von Hohenzollern-Hechingen, geborenen Prinzessin von Kurland, wieder übernommen. Persön­ lichkeiten wie der Berliner Kapellmeister Himmel, der schon bejahrte Z e 11 e r und der Freiheitsdichter Theo­ dor Körner zählten zu ihren ständigen Gästen. Auf dem gleichen Schlosse sollte durch den Sohn dieser kunstsinnigen Fürstin, eben den Fürsten Fr. W. Konstantin, wieder eine musikalische Blütezeit an­ brechen, die in ihrer überragenden Bedeutung diesen Ort zu einem Stützpunkte deutscher Kultur und neuer musikalischer Kunstbestre­ bungen werden ließ. Fast 4 Jahre lang war in­ zwischen die Kapelle in Hechingen untätig zurückgeblie­ ben. Im Dezember 1852 konnte das gesamte Orchester nach Schloß Hohlstein bei Löwenberg einberufen werden. Bereits vorher hatte der Fürst einige ausgezeichnete Kam­ mermusiker seiner ehemaligen Kapelle zu privaten Hausmusiken herangezogen. Unter der Leitung „des in der musikalischen Welt wohlbekannten Kapellmeisters Täglichsbeck" begannen dann im folgenden Jahre wieder die öffentlichen Kon­ zerte. Zu dem bewährten Stamm der bisherigen Orchestermitglieder waren weitere 9 ausgezeichnete Kräfte verpflichtet worden. Noch im Dezember 1852 fand das erste Konzert am fürstlichen Hofe in Löwenberg statt. Durch das 1851 erfolgte morganatische Ehebündnis mit Amalie Schenk von Geyern zu Syburg erfuhr das Hof­ leben durch das vergnügungsfrohe Wesen seiner Gemah­ lin einen besonders regen Auftrieb. Für die großen Fest­ lichkeiten genügten die beschränkten Schloßverhältnisse auf Hohlstein nicht mehr. Der Fürst ließ daher ein neues geräumiges Schloß in Löwenberg erbauen. An der Gartenseite dieses Gebäudes wurde ein großer Saal errichtet, der vorwiegend für die wöchentlichen musika­ lischen Abendveranstaltungen bestimmt war. Durch den Fürsten, der den militärischen Rang eines preußischen Generals innehatte, und die heimatliche Garnison man­ gelte es den Konzerten auch an äußerem prächtigen Glanze nicht. Am 7. Dezember 1853 wurde der neue Konzertsaal mit einer Wiedergabe der C-dur Symphonie von L. von Beethoven feierlichst geweiht. Die Konzerte nahmen in der Regel im November ihren Anfang und Fürstin Eugenie von Hohenzollern-Hechingen geb. Prinzessin von Leuchtenberg-Beauharnais Zum 90. Todestag am 1. September 1937 Mach einem Stich in Hechinger Privatbesitj. der die Fürstin in Florentiner Tracht zeigt dauerten bis Ende April. Bei freiem Eintritt wurden gegen Lösung einer Einlaßkarte, die jedem musi­ kalisch Interessierten ohne jeglichen Standesunterschied verabreicht wurde, diese wahren Volkskonzerte all­ wöchentlich gegeben. Als Beschützer und Vermittler ech­ ter und hochstehender Kunst zeigte sich hier der Fürst von größter Uneigennützigkeit und weitherziger Opfer­ freudigkeit. In den historischen Forschungsergebnissen des Lehrers Gondolatsch in Görlitz lesen wir in einem Aufsatze über „Fürst Konstantin von Hohenzollein und die Löwenberger Hofkapelle*: „Ich habe selbst, als ich am Anfang meiner Berufstätigkeit in der Nähe von Löwenberg angestellt war, alte Kantoren mit leuchten­ den Augen und beredten Worten von jener köstlichen Zeit erzählen hören. Bei dem Mangel anderer Verkehrs­ mittel pilgerten die begeisterten Kunstfreunde im schwar­ zen Anzug, der für die Herren vorgeschrieben war, stun­ denweit von ihren entlegenen Dörfern nach Löwenberg, vertauschten in einem Gasthause ihre festen Wander­ stiefel gegen ein Paar mitgebrachte salonfähige Schuhe, reinigten sich vom Schnee und Schmus der Straße und genossen ein paar Stunden die herrlichen Gaben der Kunst, die damals vollendeter und moderner an wenigen Orten des weiten Vaterlandes geboten wurden, um dann 67 in der Nacht, voll der erhabensten Eindrücke, an ihre stillen Wirkungsstätten zurückzuwandern. Dankbarere Zuhörer wird selten eine Kapelle gehabt haben, und noch nach einem Menschenalter mußte jedem empfänglichen Menschen das Herz warm werden, wenn er von der „fürstlichen Zeit“ erzählen hörte.“ Mit stiller Wehmut und verhaltenem Neid liest man die Berichte über die Feiern und Konzerte, die in Löwen­ berg veranstaltet wurden. Wieviel an Kulturgut und musikalischer Erziehung und Beeinflussung ist unserem Zollerstädtchen durch den Wegzug des Fürsten nach Schlesien verloren gegangen! Unter der Leitung Täglichsbeck’s hatte sich die fürst­ liche Kapelle zu einer ungeahnten hohen künstlerischen Leistungsfähigkeit erhoben. Der äußerst kritisch veran­ lagte Hans von Bülow schrieb seinerzeit, daß „die Löwenberger Kapelle getrost mit den renommiertesten Hoforchestern, wenn auch nicht quantitativ, doch was mehr sagen will, qualitativ zu rivalisieren vermöge“. Berlioz, der die berühmtesten europäischen Orchester­ vereinigungen persönlich geleitet hatte, schrieb nach einer Aufführung seiner Harold-Symphonie in Löwenberg nieder: „Ich kann wahrhaftig sagen, daß ich den Harold nie in unwiderstehlicherer Weise habe spielen hören.“ Leider wurden der Hofkapelle diese höchsten Lob­ sprüche und Anerkennungen erst nach Täglichsbecks Fort­ gang zuteil, als sie unter der Leitung seines Schülers Max S e i f r i z stand, allergrößtenteils waren sie aber dem großen erzieherischen Verdienste des jahrelangen und steten Arbeitseifers Täglichsbecks zu verdanken. Mit UJßilheim 68 einer 30 Mann starken Kapelle war sie im Laufe der Zeit auf 45 Künstler vergrößert worden. Werke der Klassik und der Gegenwart wurden gepflegt. Ein ge­ mischter Chor und die Verpflichtung namhafter Solisten trugen zu einer abwechslungsreichen Programmgestal­ tung bei. Eine ganz besondere künstlerische Note wiesen die Konzerte auf, die zum Namens- und Geburtstag des Fürsten, des Königs und zur Neujahrsfeier veranstaltet wurden. Auch wurde jährlich zum Besten der Löwen­ berger Wohltätigkeitsvereine gegen ein Eintrittsgeld von 712 Sgr. ein Konzert gegeben. Infolge der großen dienstlichen Verpflichtungen durch die Hofkapelle konnte Täglichsbeck kaum an seine eigene musikalische Schaffenstätigkeit mehr denken. Trotz der Gewährung vollkommener Ungebundenheit in den Som­ mermonaten fühlte er sich allmählich als strebender Künstler innerlich eingeengt und unzufrieden. Was Täglichsbeck als Leiter der Kapelle geleistet hat, das sprechen die noch vorhandenen ca. 400 Konzertpro­ gramme aus. Die zahlreichen Symphonien Haydns, das umfangreiche Schaffen Mozarts, die genialen Schöpfun­ gen Beethovens, dessen Erika und Pastoral-Symphonie in keiner Spielzeit fehlten, bildeten das Rückgrat seines musikalischen Wollens. Auch den Werken fortschritt­ licher Elemente brachte er Unterstützung entgegen. Karl Maria von Weber, Felix Mendelssohn-Bartholdi, Franz Schubert, Meyerbeer, Spohr, Lachner, Kalliwoda, Spontini, Kreuder, Bellini, Auber und noch andere bedeu­ tende Meister spielten eine wichtige und einflußreiche Rolle. Daß auch die Kompositionen der leitenden Persön­ Foto: Heinz Holzinger, Hechingen lichkeiten und der Kapellmitglieder, wie von Täglichsbeck, Seifrit, dem Fürsten, Wichtl und anderer zur Auf­ führung gelangten,zeugt von dem guten Kameradschafts­ geiste, der in dieser Künstlergemeinschaft herrschte. Abdankung und Nachfolge Leider scheint das innige Freundschaftsverhältnis zwi­ schen dem Fürsten und seinem Hofkapellmeister durch irgendwelche persönlichen Verhältnisse getrübt worden zu sein, sodaß er im Juni 1857 um seine Versetzung in den Ruhestand bat. Als Hauptgrund seines Entlassungs­ gesuches gab Täglichsbeck neben dem auffallend ver­ änderten Verhalten des Fürsten seine durch das klein­ städtische Leben allzusehr gehemmte künstlerische Frei­ heit an. Mit schwerem Herzen mußte er nun dieses Kon­ zertinstitut verlassen, das unter ihm entstanden war. Nach Täglichsbecks Abdankung wurde sein ehemaliger Schüler Max Seifriz zum Intendanten und Dirigen­ ten der fürstlichen Hofmusik berufen. Die engen Bezie­ hungen dieses Künstlers zu Wagner und Liszt ließen dieses Hoforchester zu einem Stützpunkt der neudeutschen Kunstbestrebungen werden. Die zahlreich vorhandenen Konzertzettel zeigen, wie stark jetzt die Kompositionen von Liszt, sowie die von Richard Wagner und Hektor Berlioz in den Vordergrund traten. Bereits vor ihrer Ur­ aufführung gelangten von „Tristan und Isolde“ das Vor­ spiel, der Schlußsatz dieses Musikdramas und das „Meistersinger“-Vorspiel in den Konzerten zu Löwenberg zu Gehör. Berlioz und Wagner weilten sogar persönlich dort und bildeten den künstlerischen Höhepunkt der Saison; auch fehlten die berühmtesten Solisten und Sänger nicht unter den Gästen. Im Ruhestand Nachdem Täglichsbeck mit dem dekretmäßig zukom­ menden lebenslänglichen Gehalte in den Ruhestand ver­ setzt worden war, verließ er Löwenberg und suchte in Dresden die Verwirklichung seiner Wünsche und Hoffnungen. Aussichten auf Anstellung in Magdeburg und Aachen eröffneten sich ihm, doch schlug er die An­ gebote aus. Da ihm die Möglichkeiten auf zufriedenstel­ lende Beschäftigung fehlten und seine Bemühungen um die Aufführungen seiner Opernwerke am dortigen Thea­ ter fehlschlugen, wandte er sich bereits nach einem Jahre wieder seinem geliebten München zu, der Stadt seiner ersten Erfolge. In ruhiger Zurückgezogenheit lebte er ganz seiner Familie und leitete die geistige und künst­ lerische Ausbildung seiner geliebten Tochter. Zum größ­ ten Weh der Eltern wurde sie ihnen im Alter von 20 Jahren durch den Tod entrissen. Das war für Täglichs­ beck der härteste Schlag und erst nach Jahren fand er in der Kunst wieder erhebenden Trost. Innere Genugtuung sollte ihm durch seinen Fürsten widerfahren, der ihn zum Frühjahr 1862 zu sich nach Löwenberg einlud. In überaus herzlicher Weise wurde er vom Fürsten empfangen und gleich groß war auch die Freude des Wiedersehens bei den Mitgliedern der Hof­ kapelle. Hochgeehrt als Mensch und Künstler schied Täg­ lichsbeck nach mehrwöchentlichem Aufenthalte in seeli­ scher Harmonie vom Fürsten und der Stätte seiner einsti­ gen Wirksamkeit. Ausklang in Löwenberg Der Glanz, der die kleine schlesische Stadt Löwenberg zu einem Mittelpunkte musikalisch bedeutungsvollster Ereignisse werden ließ, sollte nach Täglichsbecks Fort­ ganz nicht mehr allzulange bestehen. Nachdem durch die modernen Bestrebungen der Neudeutschen das dortige Musikleben noch einen besonderen Auftrieb und Zuzug namhafter Künstler erfahren hatte, versank mit dem Hinscheiden des Fürsten plötzlich das ganze künstlerische Leben. „Mit ihm verlor die Menschheit eine Persönlich­ keit, die in ihrer edlen und großen Gesinnung während ihrer segensreichen Tätigkeit sich als Diener, Förderer und Kämpfer der Kunst unermeßliche Verdienste erwor­ ben hat.“ Die letzten Lebenstage Täglichsbeck unternahm nach seiner Rückkehr aus Lö­ wenberg von München aus mit seiner Gattin noch einige Reisen nach Italien und der Schweiz. Aus klimatischen Rücksichten siedelte er 1866 nach Baden-Baden über, wo er am 5. Oktober 1867 an Typhus und einer hinzugetretenen Lungenlähmung verschied. Der Leichnam wurde dem Wunsch des Verstorbenen entsprechend nach München überführt und auf dem Südfriedhof an der Seite seines Kindes zur ewigen Ruhe bestattet. Literaturangabe: „Thomas Täglichsbeck und seine Instrumental­ kompositionen.“ Ein Beitrag zur Geschichte der Instrumentalmusik des 19. Jahrhunderts von Dr. Edgar Burmester, Inaugural-Dissertation zur Erlangung der Doktorwürde der Universität zu München. Aus her Seichichte der Waldungen der früheren Sraffchaft Sollern Von F. G ä ß 1 e r - Thanheim 2. Fortsetzung. Waldgeschichte ist zunächst Bestandsgeschichte. Die Feststellung und Kennzeichnung der Reihenfolge der Holzarten, die Vorläufer unseres heutigen Waldes waren, führt weiter zurück, als alle menschliche Kultur reicht. Durch die pollenanalytischen Untersuchungen der Hochmoore des Albgebietes sind wir über die Wachs­ tumsvorgänge der Hochfläche unterrichtet, durch die natürlich auch die Hanglagen entscheidend beeinflußt wurden. Ueber diese Vorgänge schreibt Dr. K u h n - Hechingen in seinem Werk: „Die Pflanzengesellschaften im Neckargebiet der Schwäbischen Alb“ Seite 233 folgen­ des: In der Eiszeit waren von der Alb-Hochfläche sämtliche Bäume verschwunden, während sich in den tie­ feren Lagen am Fuße der Alb Bergkiefer, Birke und Weide gehalten haben. Die einzigen Holzarten, die in der Eiszeit sicher noch auf der Albhochfläche standen, sind Zwergbirken und Heidekrautgewächse. Nach der Eiszeit wanderten zuerst die Bergkiefer, später die Weiß­ 69
https://openalex.org/W4391677705
https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0297954&type=printable
English
null
How previous experience shapes future affective subjective ratings: A follow-up study investigating implicit learning and cue ambiguity
PloS one
2,024
cc-by
14,245
PLOS ONE PLOS ONE RESEARCH ARTICLE Introduction Funding: The study was supported by a grant from Ministero dell’Istruzione Università e Ricerca (MIUR) (Dipartimenti di Eccellenza DM 11/05/2017 n. 262) to the Department of General Psychology. The funders had no role in study design, data How previous experience shapes future affective subjective ratings: A follow-up study investigating implicit learning and cue ambiguity Fiorella Del Popolo CristaldiID1*, Giulia Buodo1, Filippo Gambarota2, Suzanne OosterwijkID3,4, Giovanni Mento1,5 1 Department of General Psychology, University of Padua, Padua, Italy, 2 Department of Developmental Psychology and Socialization, University of Padua, Padua, Italy, 3 Department of Social Psychology, University of Amsterdam, Amsterdam, The Netherlands, 4 Amsterdam Brain and Cognition Centre (ABC), Amsterdam, The Netherlands, 5 Scientific Institute, IRCCS E. Medea, Conegliano, Treviso, Italy a1111111111 a1111111111 a1111111111 a1111111111 a1111111111 * fiorella.delpopolocristaldi@unipd.it Editor: Fang Wang, Wilfrid Laurier University, CANADA Received: April 19, 2023 Accepted: January 11, 2024 Published: February 9, 2024 Received: April 19, 2023 Accepted: January 11, 2024 Published: February 9, 2024 Copyright: © 2024 Del Popolo Cristaldi et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Data Availability Statement: All materials, data and analysis code reported in this manuscript have been made publicly available on OSF and can be accessed at the links https://osf.io/gdr3b/ and https://osf.io/z5esb/. OPEN ACCESS People use their previous experience to predict future affective events. Since we live in ever- changing environments, affective predictions must generalize from past contexts (from which they may be implicitly learned) to new, potentially ambiguous contexts. This study investi- gated how past (un)certain relationships influence subjective experience following new ambiguous cues, and whether past relationships can be learned implicitly. Two S1-S2 para- digms were employed as learning and test phases in two experiments. S1s were colored cir- cles, S2s negative or neutral affective pictures. Participants (Experiment 1 N = 121, Experiment 2 N = 116) were assigned to the certain (CG) or uncertain group (UG), and they were presented with 100% (CG) or 50% (UG) S1-S2 congruency during an uninstructed (Experiment 1) or implicit (Experiment 2) learning phase. During the test phase both groups were presented with a new 75% S1-S2 paradigm, and ambiguous (Experiment 1) or unam- biguous (Experiment 2) S1s. Participants were asked to rate the expected valence of upcom- ing S2s (expectancy ratings), or their experienced valence and arousal (valence and arousal ratings). In Experiment 1 ambiguous cues elicited less negative expectancy ratings, and less unpleasant valence ratings, independently of prior experience. In Experiment 2, both groups showed similar expectancies, predicting upcoming pictures’ valence according to the 75% contingencies of the test phase. Overall, we found that in the presence of ambiguous cues subjective affective experience is dampened, and that implicit previous experience does not emerge at the subjective level by significantly shaping reported affective experience. People use their previous experience to predict future affective events. Since we live in ever- changing environments, affective predictions must generalize from past contexts (from which they may be implicitly learned) to new, potentially ambiguous contexts. This study investi- gated how past (un)certain relationships influence subjective experience following new ambiguous cues, and whether past relationships can be learned implicitly. Two S1-S2 para- digms were employed as learning and test phases in two experiments. S1s were colored cir- cles, S2s negative or neutral affective pictures. Participants (Experiment 1 N = 121, Citation: Del Popolo Cristaldi F, Buodo G, Gambarota F, Oosterwijk S, Mento G (2024) How previous experience shapes future affective subjective ratings: A follow-up study investigating implicit learning and cue ambiguity. PLoS ONE 19(2): e0297954. https://doi.org/10.1371/journal. pone.0297954 Editor: Fang Wang, Wilfrid Laurier University, CANADA Editor: Fang Wang, Wilfrid Laurier University, CANADA * fiorella.delpopolocristaldi@unipd.it Emotions as predictions People use previous experience to predict future affective events. For example, imagine that your neighbor has a medium-sized dog with brown spotted fur that always snarls at you, PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 1 / 24 PLOS ONE Implicit learning, cue ambiguity and affective predictions causing you fear and annoyment. Imagine now that you are having lunch with your best friend, who is introducing you to their recently adopted little dog. As the dog enters the room running briskly, you seem to see that his fur is brownish, and perhaps spotted. Does your past annoying experience with your neighbor’s dog make you think that your best friend’s new dog is extremely unfriendly, just because the two dogs look alike? When situations like this happen in real life, predictions play a crucial role. Based on your past experiences your brain general- izes the concept of unfriendliness, developed on your neighbor’s dog, also to new, perceptually similar dogs, predisposing you to feel fear and annoyment. All these computations occur quickly and without conscious awareness. In other words, affective predictions (and the associ- ated subjective experience) must generalize from the specific features of past contexts (from which they are implicitly learned) to new and potentially ambiguous contexts (i.e., contexts that look alike past ones, but have different perceptual features), to be effective in promoting survival and allostatic balance with the environment [1,2]. However, the specific mechanisms by which this process occurs remain unclear. collection and analysis, decision to publish, or preparation of the manuscript. Competing interests: The authors have declared that no competing interests exist. According to predictive models of emotion [3,4], affective predictions are constructed along three distinct neurocomputational stages: prediction generation, in which prior experi- ence is combined with present information to construct affective predictions; prediction implementation, in which predictions are used to pre-arrange the best action plans to deal with the expected situation; and prediction updating, in which current environmental inputs are compared with predictions, and in case of mismatch the unexpected information (encoded as a prediction error) acts as a feedback to adjust subsequent predictions. PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 Emotions as predictions Predictive models are assumed to be (i) probabilistic, since they encode the statistical regularities within the observed inputs [1,2,5]; (ii) generative, because they generalize across sensory modalities, contexts, and time [1,2]; and (iii) implicit, since they act mostly outside of awareness, potentially emerging into it only in case of a prediction violation [6]. It follows that human brains do not merely react to affective stimuli at the time of their occurrence, but rather, as a spontaneous activity, they are constantly busy in generating-implementing-updating predictions in the service of allostasis [7,8]. Prediction construction is assumed to represent the core mechanism on which the brain relies, in order to provide the body with optimal resources for growth, adaptation to the envi- ronment, and survival [1,5,7–9]. Previous experience (i.e., knowledge derived from the extrac- tion of statistical regularities of stimuli occurrence in the past) plays a pivotal role in the construction of new affective predictions: it interacts with momentary information (e.g., physi- cal properties of the environment, contingencies experienced between present stimuli) in con- straining and refining the pool of information used to generate predictions [1,3,5,6]. However, predictive processing’s assumptions about (i) whether contingency learning (i.e., extracting statistical regularities of stimuli co-occurrence) may develop implicitly and (ii) whether these learnings generalize to new, and potentially ambiguous contexts are to date mainly based on empirical evidence related to cognitive domains such as visual perception [10–12] or motor control [13,14]. Little experimental evidence about the application of these assumptions to the affective domain has been collected so far. To better understand how affective predictions are related to subjectively experienced affec- tive states, predictive models of emotion [3,4] have reconceptualized subjective affective expe- rience within their framework. Subjectively experienced affective states have been defined as the representation of valence (i.e., pleasantness/unpleasantness), arousal (i.e., activation/calm) or even discrete emotions (e.g., anger, fear) in subjective awareness, on which an individual can verbally self-report [15]. Predictive models of emotion [3,4] assume that affective experi- ence derives from the brain’s spontaneous predictive activity, and have redefined it as the active process of making meaning of present stimuli by predicting and categorizing them on PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 2 / 24 PLOS ONE Implicit learning, cue ambiguity and affective predictions the basis of past experiences [3]. Emotions as predictions When this process draws on conceptual emotion knowledge, the resulting predictive models and their associated affective responses can be subjectively experienced as emotions [3,16,17]. It follows that subjective affective experience may be sensi- tive to statistical regularities experienced in the past. For example, the more reliable the regu- larities, the more expectancies about the valence of upcoming stimuli will draw on them to predict upcoming stimuli [18]. However, it is still unknown whether previously learned proba- bilities may influence subjective affective experience when facing new, potentially ambiguous cues (i.e., ambiguous signals preceding the occurrence of an affective stimulus). Also, it is not clear if affective environmental contingencies might be inferred from past experience at an implicit level (i.e., without explicit awareness, and without focusing attention on contingencies themselves at the time of their occurrence), and if this may ultimately shape subjective affective experience during future predictions. The present research aimed to test whether these two crucial assumptions of predictive processing models apply to the affective domain by employ- ing a methodological replication approach. We draw on our previous work [18] to investigate (i) if being exposed to past (un)certain contingencies might influence future subjective affec- tive ratings to new and potentially ambiguous cues (i.e., cues with different perceptual proper- ties from the ones previously experienced); and (ii) if people are able to implicitly extract (un) certain probabilistic information, and use it later to subjectively predict new affective events. PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 A novel experimental paradigm To study the effects of previous experience on affective predictions we recently developed a novel experimental paradigm [18], which integrates the logic of traditional emotional S1-S2 paradigms (see [19] for a review) with an uninstructed learning component. In this novel para- digm two separate emotional S1-S2 paradigms are employed as a learning and test phase, respectively. As in typical emotional S1-S2 paradigms, a sequential presentation of two stimuli is implemented (both in the learning and test phases): the S1 (or cue) is a symbolic stimulus (manipulated at two levels, i.e., red or blue circles) preceding the occurrence of an affective stimulus, while the S2 (or target) is an emotional stimulus (manipulated at two levels, i.e., neg- ative or neutral affective pictures). The sequence of events in the S1-S2 paradigm allows to tar- get the three stages of affective prediction construction: the S1 reflects the generation stage, the inter-stimulus interval (ISI) between S1 and S2 the implementation stage, and the S2 the updat- ing stage [20]. The contribution of our new paradigm is that it manipulates actual previous experience through uninstructed certain vs. uncertain probabilistic contingencies between S1 and S2, experienced during a separate learning phase. This approach is markedly different from extant S1-S2 paradigms that manipulate explicitly labeled probabilistic information while participants perform the task. During the learning phase of this paradigm, previous experience is manipulated between subjects by dividing participants into two experimental groups: the certain group (CG) and the uncertain group (UG). According to the group, they are presented with a 100% (CG) or 50% (UG) S1-S2 congruency, namely the probabilistic ratio between S1 color and S2 valence they are exposed to. During the test phase, all participants are then presented with a new S1-S2 par- adigm with a fixed 75% S1-S2 congruency (see [18] and below for a detailed explanation of the choice to use the 75% S1-S2 ratio in the learning phase). In the test phase, they are asked to rate their subjective affective experience in terms of either the expected valence of upcoming S2s (expectancy ratings), or the experienced valence and arousal to S2s (valence and arousal ratings). Participants are left uninstructed about the probabilistic ratios they are exposed to during the whole paradigm. 3 / 24 PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 PLOS ONE Implicit learning, cue ambiguity and affective predictions Inconsistent evidence on subjective affective experience Extant literature has collected inconsistent evidence with regard to the effect of (un)certain stimulus predictability on subjective affective ratings. As for expectancy measures related to the generation-implementation stages, our previous study [18] showed that experiencing cer- tain contingencies (100%) during the learning phase subsequently elicited more extreme expectancy ratings (i.e., participants predicted the valence of future stimuli according to previ- ously learned contingencies), and this effect generalized from the visual to the auditory sensory modality. Other studies implementing typical S1-S2 paradigms found negatively-biased expec- tancies (i.e., an overestimation of negative S2s occurrence) in the uncertain (50%) condition [21–25]; and that ambiguous cues (i.e., cues with uninstructed 50% predictive value) elicited less negative expectancy ratings than unambiguous cues [26]. Regarding valence and arousal ratings measured during the updating stage, we did not find any effect of previous experience [18], consistently with some studies implementing typical S1-S2 paradigms that found no effect of current (un)certainty on valence ratings [21– 24,27,28]. Other traditional S1-S2 studies, instead, showed a more intense subjective experi- ence either in the certain (100%) [27,29–32] or in the uncertain (50%) condition [33], and also that ambiguous cues elicited more unpleasant mood ratings [26]. Another study [23] com- pared an explicit anticipation condition (in which participants were asked for expectancy rat- ings) with an implicit anticipation condition (in which participants were asked for a target detection task): no effects of cue predictive meaning (100% vs. 50%) emerged on accuracy to the target detection task, faster reaction times (RTs) were found in the certain condition, and no significant results were found on S2-valence ratings. PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 Method Experiment 1 investigated whether (un)certain past experience might influence future subjec- tive affective ratings as a function of cue ambiguity. We pre-registered the study on Open Sci- ence Framework (OSF) (https://osf.io/gdr3b/). According to predictive models of emotion [3,4], we can formulate the hypothesis (H1) that participants exposed to reliable contingencies in the learning phase (i.e., the CG) would generalize the learned information to the ambiguous cues of the test phase, thus showing more negative expectancy ratings after the cues that are more perceptually similar to those previ- ously paired with negative pictures. As no extant study directly investigated the interaction between past (un)certainty and cue ambiguity, we tested whether cue predictive meaning modulated expectancies as an exploratory analysis. Moreover, according to previous literature [26] and to what specified in the pre-registration, we expected that ambiguous cues would elicit (H2) less strong generalization effects on expectancy ratings as compared to unambigu- ous cues and (H3) more unpleasant valence ratings. We also tested (H4) whether cue ambigu- ity modulates arousal ratings as a function of previous experience. Participants. We used the provider platform Prolific (Prolific, Oxford, UK; www.prolific. co) to recruit 125 adult participants in August 2021. Participants were screened for vision diffi- culties, including color blindness. Researchers had access only to the following participant’s personal information: Prolific IDs, age, gender, country of birth, country of residence, nation- ality, employment status and languages spoken. Thus, no identifying information was pro- vided and collected. We estimated the required sample size through an a priori pre-registered (https://osf.io/gdr3b/) simulation-based power analysis for generalized linear mixed-effects models (GLMMs) (R package: simr; [34]). We estimated parameters from data of our previous study (Experiment 1, N = 185 [17]). Pre-registered exclusion criteria were the following: scor- ing lower than 75% accuracy on attention check items (see below) (N of discarded partici- pants = 0), reporting experienced technical issues in more than 25% of the experimental trials (N = 1). We also excluded data from 3 participants because of data collection failure. The final sample included 121 participants (58 males, age: M = 25.03, SD = 7.67, range = 18–58; CG N = 57, UG N = 52). All participants gave their written informed consent before starting the experiment, and were paid £1.93 for their participation. All experimental procedures were conducted in accordance with the Declaration of Helsinki, and approved by the local Ethical Committee (protocol no. 4177). A follow-up research Overall, evidence on the effects of past knowledge on subjective affective experience remains fragmentary, with our previous work [18] suggesting that a reliable (i.e., certain) previous experience affects future expectancies, and S1-S2 studies suggesting that either certain [27,29– 32] or uncertain [21–26,30,33] contingencies can lead to an intensification of the related affec- tive experience. Besides, little is known yet about the potential effects of cue ambiguity on new affective predictions, nor on the actual possibility to infer affective environmental contingen- cies implicitly. Both these factors are nonetheless crucial to construct efficient affective predic- tions. In fact, since our environments are characterized by frequent changes, affective predictions must be flexible in adapting to new, and potentially ambiguous, contextual features [3,6,8]. Moreover, in daily life people should be able to spontaneously learn contingencies from the environment, and to use them as priors for subsequent affective predictions, even in absence of explicit instructions and/or awareness of the contingencies themselves [6]. How- ever, despite the importance of both of these aspects for constructing efficient predictions, it still lacks solid experimental evidence on how they may influence subjective affective experience. Based on this, in the present research we implemented two follow-up experiments (pre-reg- istered on the Open Science Framework—OSF; Experiment 1: https://osf.io/gdr3b/, Experi- ment 2: https://osf.io/z5esb/), in which we modified some features of our former paradigm [18]. In particular, in order to investigate the construction of new affective predictions as a function of cue ambiguity, in Experiment 1 we introduced ambiguous cues in the test phase. Here, unbeknownst to participants, we presented two new reddish and bluish S1 colors (i.e., coral and turquoise, here defined as ambiguous) in addition to those already presented during the learning phase (i.e., red and blue, here defined as unambiguous). Further, to test if the probabilistic information available in the environment can be extracted and learned at an 4 / 24 PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 PLOS ONE Implicit learning, cue ambiguity and affective predictions implicit level (i.e., not explicitly focusing attention on the probabilistic relationships between stimuli), in Experiment 2 we engaged participants in a distracting task (i.e., a parity judgment task) during the learning phase. A follow-up research According to predictive models of emotion [3,4], we hypothesized that participants would generalize previously learned contingencies to new ambiguous cues in Experiment 1, and that they would infer affective environmental contingencies without explicitly focusing attention (and use them later to predict future stimuli) in Experiment 2. PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 Method Stimulus material and procedure. We employed two emotional S1-S2 paradigms as learning and test phase, respectively (as in [18]). In both phases, unambiguous S1s were red and blue 1-cm-diameter circles. In the test phase only, new ambiguous S1s were introduced unbeknownst to participants: same-sized reddish and bluish (i.e., coral- and turquoise-col- ored) circles. In both learning and test phases, S2s were colored 800 × 600 px pictures from Nencki Affective Picture System (NAPS) [35], whose valence was manipulated at two levels: negative (Neg; e.g., dead animals, injured people, human threat/war scenes) vs. neutral (Neu; 5 / 24 PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 PLOS ONE Implicit learning, cue ambiguity and affective predictions e.g., urban or natural landscapes, people jogging or sitting, animals standing still) (see S1 Table for a list of NAPS pictures employed as S2s). Negative and neutral pictures did not differ in luminance, contrast, complexity and color space indices (see S2 Table), and each picture con- tent (i.e., animals, faces, landscapes, objects, people) was equally represented within each valence level. In attention check trials, a 1-cm yellow circle was used as S1, while a 800 × 600 px picture of a black stripes pattern displayed on a transparent background was used as S2. The expected valence of upcoming S2s (expectancy ratings) and subjective affective responses to S2s (valence and arousal ratings) were assessed through three distinct Visual Analogue Scales (VASs) ranging from 0% to 100%. In the expectancy VAS 0% corresponded to “I defi- nitely expect to see a neutral picture”, 50% represented not knowing what to expect, and 100% corresponded to “I definitely expect to see a negative picture”. In the valence VAS 0% repre- sented “very negative” valence, 50% “neutral” valence, and 100% “very positive” valence. In the arousal VAS 0% meant “relaxed”, 50% represented an intermediate level of activation, and 100% meant “aroused”. We ran the experiment online, through OpenSesame [36] and the JATOS hosting server [37]. Participants were asked to run the study on a computer, to sit alone in a silent and private room, and to avoid distractions and interruptions, in order to ensure optimal conditions for participation. They were also asked to avoid that someone else could view their screen during the experiment, due to the involvement of emotionally salient material. Before the learning phase, participants were randomly assigned to the certain group (CG) or the uncertain group (UG). Method At the beginning of the learning phase, participants received the following instructions: they were asked to look at the screen and pay attention to the relation- ship between S1 color and S2 valence, and they were asked to press the ‘spacebar’ as fast as they could each time they saw a yellow circle (attention check trials). A practice session of 4 tri- als followed the instructions: here, participants received feedback on their performance to one attention check trial. After the practice, the learning session started. In each trial S1 was pre- sented first for 250 msec, and it was displayed on a gray background. This was followed by a fixed interstimulus interval (ISI) of 1000 msec, in which the screen remained gray. Then, the S2 was presented for 1000 msec. A white fixation cross was displayed in the center of the screen during the inter-trial interval (ITI), whose length randomly varied between 800 and 1200 msec. The total number of learning trials was 40, presented in random sequence. During this phase, CG participants were exposed to a certain predictive relationship between S1 and S2: each S1 color (i.e., red and blue) was paired with the same S2 valence in 100% of the trials (100% S1-S2 congruency). UG participants, instead, were presented with an uncertain rela- tionship: each S1 color was paired with negative S2s in 50% of the trials, and with neutral S2s in the other 50% (50% S1-S2 congruency). Color-valence pairings were counterbalanced between subjects, and participants were left uninstructed about the S1-S2 predictive ratios. After the learning phase, a 1-minute interval followed in which participants were asked to wait and relax. Then, both groups were introduced to the same test phase. Instructions of the test phase were to look at the screen and try to predict S2 valence based on S1 color. Partici- pants were told that in some trials they would be asked their expectancy (i.e., to rate how much they expected to see a negative picture after the S1) on a 0–100% scale; while in other trials they would be asked their subjective valence and arousal to the S2, on a 0–100% scale for each dimension. They were asked to give either their expectancy ratings during the ISI, or their valence and arousal ratings right after the S2. PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 Method VASs response times were self-paced, and the two rating conditions were balanced for the number of trials (50%:50%) and randomly deliv- ered. We presented the expectancy and the valence/arousal ratings in different trials to prevent the two kinds of ratings from influencing each other. Participants were lastly reminded to press the ‘spacebar’ as fast as they could each time they saw the yellow circle (attention check). 6 / 24 PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 PLOS ONE Implicit learning, cue ambiguity and affective predictions After the instructions, participants performed a practice session of 4 trials, in which they were trained to give their ratings, and received performance feedback on a single attention check. Then the test session started, with the same trial structure and timing as the learning phase, and a total number of 80 trials. The order of the trials was randomized. Cue color was manipu- lated within participants at four levels: red, blue, coral, and turquoise. Test trials in which we employed the same S1 colors as the learning phase were considered unambiguous (N = 40), whereas test trials in which we employed the new reddish and bluish colors were considered ambiguous (N = 40). Cue ambiguity, thus, included two levels: unambiguous (red and blue S1s) vs. ambiguous (coral and turquoise S1s). Participants were not warned about the exposure to new colors. In the test phase, S1 color was moderately predictive of S2 valence, since S1-S2 congruency was fixed at 75% (same S1 color-S2 valence pairings in 75% of the trials). Color- valence pairings were counterbalanced between subjects, and participants were left unin- structed about the S1-S2 predictive ratio. Notably, the new 75% ratio implied that CG partici- pants moved from a reliable predictive relationship (100%, experienced during the learning phase), to a new, more uncertain context (in which the previously learned predictive models were sometimes violated). UG participants, instead, moved from an unreliable predictive rela- tionship (50%), to a more predictive context. Moreover, the 75% is equidistant from the pre- dictive ratios experienced by the CG and the UG (it lies in the middle between 100% and 50%; see [18] for further details on this choice). Fig 1A shows a schematic representation of the experimental paradigm. After the test phase, participants were redirected to a Qualtrics survey (Qualtrics, Provo, UT; www.qualtrics.com), in which they were asked demographic information (age, gender) and some mood and trait measures. Method In particular, participants completed the Intolerance of Uncertainty Scale (IUS-12) [38] and the Depression, Anxiety and Stress Scale (DASS-21) [39], as intolerance of uncertainty as well as negative affectivity are known to be potential moderat- ing factors impacting affective predictions [40–44]. Also, participants were asked a forced- choice question about whether and in how many trials they had experienced any technical issues with the Internet connection and/or with pictures uploading (response options: “No, everything worked fine!”, “Yes, in less than 25% of the trials”, “Yes, between 25% and 50% of the trials”, “Yes, between 50% and 75% of the trials”, “Yes, in more than 75% of the trials”). At the end of the survey, participants were thanked, and redirected to Prolific to receive their pay- ment. The experiment lasted about 30 minutes. PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 Data analysis The study had a 2 (group, between-subjects: CG vs. UG) × 2 (cue ambiguity, within-subjects: ambiguous vs. unambiguous) × 2 (S2 valence, within-subjects: Neg vs. Neu) mixed design. The analysis plan was pre-registered on OSF (https://osf.io/gdr3b/). As pre-registered, univariate outliers (i.e., expectancy ratings) were detected through Median Absolute Deviation values (MAD > 3), and multivariate outliers (i.e., valence and arousal ratings) through the Mahalanobis-Minimum Covariance Determinant (MMCD, breakdown point 0.25) (R package: Routliers; [45]). We identified 12 univariate outliers, and we removed them from data analysis. We also identified 21 multivariate outliers. However, from the visual inspection of their ratings, they emerged as “potentially interesting outliers” (see [45]), since they showed only a slightly different relationship between valence and arousal ratings as compared to other participants. Thus, for this reason and given that none of them significantly impacted the models’ estimates (as assessed through Cook’s distance, see below), we chose to keep their data into the analysis. Overall, data from 109 participants were included in the analyses. 7 / 24 PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 PLOS ONE Implicit learning, cue ambiguity and affective predictions Fig 1. a) Example sequence of events and their duration for a trial of Experiment 1, according to the phase (learning, test), and the group (CG, UG). During the learning phase participants experienced a 100% (CG) vs. 50% (UG) affective contingency between S1 color (red or blue) and S2 valence (Neg or Neu), according to group assignment. During the test phase all participants were presented with unambiguous (i.e., red or blue) and ambiguous (i.e., coral or turquoise) S1s, and the S1-S2 affective contingency was fixed at 75%. Participants were asked to answer the VASs either during the ISI for ournal.pone.0297954 February 9, 2024 8 / 24 Fig 1. a) Example sequence of events and their duration for a trial of Experiment 1, according to the phase (learning, test), and the group (CG, UG). During the learning phase participants experienced a 100% (CG) vs. 50% (UG) affective contingency between S1 color (red or blue) and S2 valence (Neg or Neu), according to group assignment. During the test phase all participants were presented with unambiguous (i.e., red or blue) and ambiguous (i.e., coral or turquoise) S1s, and the S1-S2 affective contingency was fixed at 75%. Participants were asked to answer the VASs either during the ISI for Fig 1. PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 https://doi.org/10.1371/journal.pone.0297954.g001 To test our hypotheses (H1, H2, H3, H4), we fitted the following linear mixed-effects mod- els (LMMs) for each dependent variable (DV) (R package: lme4; [46]): 1. expectancy ratings (H1): group, cue color and their interaction as fixed factors, and random slopes for cue color within participants; 1. expectancy ratings (H1): group, cue color and their interaction as fixed factors, and random slopes for cue color within participants; 2. expectancy ratings (H2): group, cue ambiguity and their interaction as fixed factors, random slopes for cue ambiguity within participant; 3. valence ratings (H3): group, cue ambiguity, S2 valence and their interaction as fixed factors, random slopes for S2 valence within participant; 4. arousal ratings (H4): group, cue ambiguity, S2 valence and their interaction as fixed factors, random slopes for S2 valence within participant. The factor “cue ambiguity” codes for the ambiguity of the cue (within-subjects: ambiguous —that is, coral or turquoise S1 color vs. unambiguous—that is, red or blue S1 color). In the analysis script (shared in OSF https://osf.io/gdr3b/) this factor was called “cue”. Here, for the sake of clarity, we renamed it as “cue ambiguity”. The factor “cue color” codes for the predic- tive meaning of the cue according to the specific color-valence pairings presented to partici- pants in the test phase (within-subjects: red and coral—that is, a cue that preceded negative stimuli in the test phase vs. blue and turquoise—that is, a cue that preceded neutral stimuli in the test phase). In the analysis script (shared in OSF https://osf.io/gdr3b/) this factor was called “S1 color”. Here, for the sake of clarity, we renamed it as “cue color”. Please note that to com- pensate for the counterbalancing of S1 color–S2 valence pairings, in the analysis we re-coded as red all the unambiguous cues preceding negative pictures, as coral all the ambiguous cues preceding negative pictures, as blue all the unambiguous cues preceding neutral pictures, and as turquoise all the ambiguous cues preceding neutral pictures, irrespective of the actual color of the cue (see [18] for further details on the cue factor). The other pre-registered exploratory analyses regarding the effects of time, S2 congruency (expected vs. unexpected S2s), IUS, and DASS-21 questionnaires are reported in S7–S8 Tables. https://doi.org/10.1371/journal.pone.0297954.g001 Since the results of these analyses are mainly null, or redundant with respect to both the confir- matory models and the results of our previous work [18], these analyses will not be discussed further in the present manuscript. As pre-registered, for each model we evaluated influential cases through Cook’s distance (>1). No influential cases emerged. As pre-registered, models effects were tested by means of F-test and p-values, calculated via Satterthwaite’s degrees of freedom method (α = .05, R package: lmerTest; [47]). For each model we reported the esti- mated parameters with 95% confidence intervals (CI), marginal and conditional R2 (estimated as in [48]). Data analysis a) Example sequence of events and their duration for a trial of Experiment 1, according to the phase (learning, test), and the group (CG, UG). During the learning phase participants experienced a 100% (CG) vs. 50% (UG) affective contingency between S1 color (red or blue) and S2 valence (Neg or Neu), according to group assignment. During the test phase all participants were presented with unambiguous (i.e., red or blue) and ambiguous (i.e., coral or turquoise) S1s, and the S1-S2 affective contingency was fixed at 75%. Participants were asked to answer the VASs either during the ISI fo PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 8 / 24 PLOS ONE Implicit learning, cue ambiguity and affective predictions half of the trials (expectancy ratings), or right after the S2 for the other half of the trials (valence and arousal ratings). Response times were self-paced. b) Example sequence of events and their duration for a trial of Experiment 2, according to the phase (learning, test), and the group (CG, UG). During the learning phase participants experienced a 100% (CG) vs 50% (UG) affective contingency between S1 color (red or blue) and S2 valence (Neg or Neu), according to group assignment. Then, after the S2, they were presented with the parity judgment task. During the test phase the S1-S2 affective contingency was fixed at 75%. Participants were asked to answer the VASs either during the ISI for half of the trials (expectancy ratings), or right after the S2 for the other half of the trials (valence and arousal ratings). Response times were self-paced. ISI = inter-stimulus interval, ITI = inter-trial interval, VAS = visual analogue scale. The text and the pictures are not drawn to scale. half of the trials (expectancy ratings), or right after the S2 for the other half of the trials (valence and arousal ratings). Response times were self-paced. b) Example sequence of events and their duration for a trial of Experiment 2, according to the phase (learning, test), and the group (CG, UG). During the learning phase participants experienced a 100% (CG) vs 50% (UG) affective contingency between S1 color (red or blue) and S2 valence (Neg or Neu), according to group assignment. Then, after the S2, they were presented with the parity judgment task. During the test phase the S1-S2 affective contingency was fixed at 75%. Data analysis Participants were asked to answer the VASs either during the ISI for half of the trials (expectancy ratings), or right after the S2 for the other half of the trials (valence and arousal ratings). Response times were self-paced. ISI = inter-stimulus interval, ITI = inter-trial interval, VAS = visual analogue scale. The text and the pictures are not drawn to scale. Descriptive statistics are provided in Table 1. PLOS ONE Table 1. Descriptive statistics of Experiment 1. Group Cue ambiguity S2 valence Expectancy ratings Valence ratings Arousal ratings M SD M SD M SD CG Ambiguous Neg 52.59 28.74 35.51 29.41 54.98 25.63 Neu 48.23 28.64 56.31 29.9 42.1 26.49 Unambiguous Neg 57.18 30.62 31.62 27.36 58.01 25.07 Neu 48.95 30.5 56.36 28.47 41.17 26.12 UG Ambiguous Neg 52.74 25.38 35.56 27.26 55.08 23.16 Neu 48.76 26.4 54.07 26.47 44.89 23.64 Unambiguous Neg 54.03 26 32.96 25.96 57.99 22.84 Neu 50.13 25.88 55.73 24.99 43.16 22.74 For each group (CG, UG) and experimental condition (ambiguous/unambiguous cue, negative/neutral S2 valence) we report the mean (M) and standard deviation (SD) of expectancy, valence and arousal ratings. Table 1. Descriptive statistics of Experiment 1. For each group (CG, UG) and experimental condition (ambiguous/unambiguous cue, negative/neutral S2 valence) we repor of expectancy, valence and arousal ratings. For each group (CG, UG) and experimental condition (ambiguous/unambiguous cue, negative/neutral S2 valence) we report the mean (M) and standard deviation (SD) of expectancy, valence and arousal ratings. All the models are summarized in Table 2 and Fig 2. For the expectancy model testing H1 (R2 marginal = 0.190, R2 conditional = 0.452), we found a main effect of cue color (F(3, 107) = 33.24, p < .001), better specified by a significant interaction between group and cue color (F(3, 107) = 4.05, p = .009). Post-hoc contrasts confirmed our previous results [18], showing that participants in the CG reported significantly more extreme expectancy ratings as compared with participants in the UG, but only in the case of unambiguous cues. Indeed, the CG showed more negative expectancy ratings than the UG after red cues (i.e., unambiguous cues preced- ing negative pictures; CG—UG = 6.78, SE = 3.05, t(107) = 2.22, p = .028), but not after coral cues (i.e., ambiguous cues preceding negative pictures; CG—UG = 5.19, SE = 2.68, t(107) = 1.93, p = .056); and it showed less negative expectancy ratings than the UG after blue cues (i.e., unambiguous cues preceding neutral pictures; CG—UG = -10.07, SE = 3.10, t(107) = -3.25, p = .002), but not after turquoise cues (i.e., ambiguous cues preceding neutral pictures; CG—UG = -3.46, SE = 3.31, t(107) = -1.05, p = .297). Thus, contrary to H1, we did not find evidence for a strong generalization of the learned predictive meaning of cues to new, ambiguous ones. Results Descriptive statistics are provided in Table 1. 9 / 24 PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 Implicit learning, cue ambiguity and affective predictions PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 For each model, we reported the unstandardized regression coefficients, standard errors (SE), 95% confidence intervals (CI), and the associated t-test. For each model, we reported the unstandardized regression coefficients, standard errors (SE), 95% confidence intervals (CI) PLOS ONE For the expectancy model testing H2 (R2 marginal = 0.006, R2 conditional = 0.056), we found a main effect of cue ambiguity (F(1, 107) = 13.19, p < .001): ambiguous cues elicited less nega- tive expectancy ratings than unambiguous ones (ambiguous—unambiguous = -4.08, t(107) = -3.63, p < .001, 95% CI = [-6.31, -1.85]). Thus, the expectancy model supports H2, suggesting a reduced generalization on expectancy ratings to ambiguous cues within both groups. 2 2 For the valence model testing H3 (R2 marginal = 0.621, R2 conditional = 0.704), we found a main effect of cue ambiguity (F(1, 4138) = 8.26, p = .004), and a main effect of S2 valence (F(1, 107) = 997.35, p < .001), better specified by a significant interaction between cue ambiguity and S2 valence (F(1, 4138) = 7.45, p = .006). In particular, we found evidence for less unpleas- ant valence ratings to neutral pictures presented after ambiguous cues as compared to unam- biguous ones (Neu: ambiguous vs. unambiguous = 2.74, t(4138) = 3.96, p < .001, 95% CI = [1.38, 4.09]), while valence ratings to negative pictures were not affected by cue ambiguity (Neg: ambiguous–unambiguous = 0.071, t(4138) = 0.103, p = .918, 95% CI = [-1.28, 1.43]). Thus, cue ambiguity actually modulated valence ratings in both groups, but in the opposite direction as H3, with ambiguous cues leading subsequent neutral pictures to elicit less unpleas- ant subjective ratings. For the arousal model testing H4 (R2 marginal = 0.325, R2 conditional = 0.566), we found a main effect of S2 valence (F(1, 107) = 245.75, p < .001), with negative pictures eliciting higher arousal ratings than neutral pictures (Neg-Neu = 28.7, SE = 1.83, t(107) = 15.68, p < .001). We 10 / 24 PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 https://doi.org/10.1371/journal.pone.0297954.t002 https://doi.org/10.1371/journal.pone.0297954.t002 PLOS ONE Implicit learning, cue ambiguity and affective predictions PLOS ONE Table 2. Results of LMMs on expectancy, valence and arousal ratings in Experiment 1. Model Parameter Estimate SE Statistic df p 95% CI Expectancy (H1) Intercept 52.17 0.61 85.91 107.01 < 0.001 50.97 53.38 UG–CG 0.39 1.21 0.32 107.01 0.746 -2.01 2.80 Coral–Blue 19.00 2.39 7.96 107.00 < 0.001 14.27 23.72 Red–Blue 25.91 2.76 9.38 107.21 < 0.001 20.43 31.38 Turquoise–Blue -1.25 1.50 -0.83 107.05 0.407 -4.23 1.73 UG–CG x Coral–Blue -15.26 4.77 -3.20 107.00 0.002 -24.72 -5.80 UG–CG x Red–Blue -16.85 5.53 -3.05 107.21 0.003 -27.81 -5.90 UG–CG x Turquoise–Blue -6.61 3.01 -2.20 107.05 0.03 -12.58 -0.65 σ ID 5.40 σ Coral–Blue 23.06 σ Red–Blue 27.09 σ Turquoise–Blue 12.59 σ residual 20.82 Expectancy (H2) Intercept 52.17 0.61 85.91 107.00 < 0.001 50.97 53.38 UG–CG -0.39 1.21 -0.32 107.00 0.746 -2.80 2.01 Amb–Unamb -4.08 1.12 -3.63 107.00 < 0.001 -6.31 -1.85 group x cue 2.51 2.25 1.12 107.00 0.266 -1.94 6.97 σ ID 4.62 σ cue 7.89 σ residual 27.27 Valence (H3) Intercept 44.67 0.49 90.57 107.53 < 0.001 43.70 45.65 UG–CG 0.98 0.99 0.99 107.53 0.322 -0.97 2.94 Amb–Unamb 1.40 0.49 2.87 4,138.00 0.004 0.45 2.36 neg–neu -46.35 1.47 -31.58 107.23 < 0.001 -49.26 -43.44 group x cue 0.85 0.98 0.87 4,138.00 0.383 -1.06 2.77 valence x group -5.50 2.94 -1.87 107.23 0.064 -11.32 0.32 cue x valence -2.67 0.98 -2.73 4,138.00 0.006 -4.58 -0.75 group x cue x valence -2.40 1.95 -1.23 4,138.00 0.219 -6.23 1.43 σ ID 4.47 σ valence 14.43 σ residual 16.03 Arousal (H4) Intercept 49.59 0.86 57.89 107.19 < 0.001 47.89 51.29 UG–CG -1.62 1.71 -0.95 107.19 0.346 -5.02 1.78 Amb–Unamb -1.52 0.51 -2.97 4,138.00 0.003 -2.53 -0.52 neg–neu 28.71 1.83 15.68 107.17 < 0.001 25.08 32.34 group x cue -0.35 1.02 -0.34 4,138.00 0.733 -2.36 1.66 valence x group 4.67 3.66 1.27 107.17 0.205 -2.59 11.93 cue x valence -1.66 1.02 -1.62 4,138.00 0.105 -3.67 0.35 group x cue x valence 1.69 2.05 0.83 4,138.00 0.409 -2.32 5.70 σ ID 8.53 σ valence 18.34 σ residual 16.80 For each model, we reported the unstandardized regression coefficients, standard errors (SE), 95% confidence intervals (CI), and the associated t-test. Table 2. Results of LMMs on expectancy, valence and arousal ratings in Experiment 1. PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 11 / 24 PLOS ONE Implicit learning, cue ambiguity and affective predictions Fig 2. PLOS ONE Box-plot of expectancy, valence and arousal ratings in Experiment 1 according to the group (CG vs. UG), cue ambiguity (Amb-ambiguous vs. Unamb-unambiguous), and S2 valence (Neg vs. Neu, for valence and arousal ratings only). Points represent the mean estimated value for each participant and condition. ancy, valence and arousal ratings in Experiment 1 according to the group (CG vs. UG), cue ambiguity (Amb-ambiguous vs and S2 valence (Neg vs. Neu, for valence and arousal ratings only). Points represent the mean estimated value for each partic Fig 2. Box-plot of expectancy, valence and arousal ratings in Experiment 1 according to the group (CG vs. UG), cue ambiguity (Amb-ambiguous vs. Unamb-unambiguous), and S2 valence (Neg vs. Neu, for valence and arousal ratings only). Points represent the mean estimated value for each participant and condition. https://doi.org/10.1371/journal.pone.0297954.g002 https://doi.org/10.1371/journal.pone.0297954.g002 also found a main effect of cue ambiguity (F(1, 4138) = 8.85, p = .003): ambiguous cues elicited lower arousal ratings than unambiguous cues (ambiguous–unambiguous = -1.52, SE = 0.51, t (4138) = -2.98, p = .003). PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 Discussion The findings obtained in Experiment 1 suggest that no strong generalization of subjective expectancies from the specific features of the learning phase to the new ambiguous features of the test phase emerged. Indeed, when testing the effects of cue predictive meaning (i.e., cue color) on expectancy ratings, we replicated our previous results [18] showing that participants in the CG reported more extreme expectancies than the UG, but only for unambiguous cues. This may seem in contrast with predictive models of emotion [3,4] (see H1), since one may think that an efficient predictive model must be generalizable across different contexts. How- ever, recent contributions [49–51] have highlighted how affective predictions are inherently and indissolubly context-sensitive, being tight to the specific situation in which they develop. Thus, as an alternative explanation consistent with previous literature [26], it may be that the novelty of the stimuli employed as ambiguous cues in the testing phase (namely, current infor- mation) prevails over past information in shaping subjective affective ratings. Moreover, cue ambiguity per se (regardless of cue predictive meaning) did not interact with uncertainty of previous experience in shaping subjective affective ratings. In fact, no significant group by cue interaction was found in any of the models. We found instead that ambiguous cues elicited PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 12 / 24 PLOS ONE Implicit learning, cue ambiguity and affective predictions less negative expectancy ratings in the generation-implementation stage, less unpleasant valence to neutral stimuli and overall lower arousal in the updating stage, independently from previous learning. Thus, cue ambiguity appears to elicit a dampened subjective affective expe- rience at all stages. With regards to subjective expectancy (i.e., expectancy ratings) these results are consistent with our hypothesis (see H2, [26]), with regards to subjective reactions to new stimuli (i.e., valence and arousal ratings) they are instead partially in contrast (see H3, [26]). It must be noted, however, that in our paradigm we manipulated previous experience in a separate learn- ing phase and we asked for a trial-by-trial rating of experienced valence (and arousal) to S2s, whereas Chen and Lovibond [26] did not employ a learning paradigm and asked for a post- experiment mood rating. Thus, the different nature of the paradigm and the ratings requested to participants may be accountable for the opposing effects found. Discussion Moreover, another S1-S2 study [52] manipulating ambiguity of the target affective pictures, found that ambiguous pic- tures were rated as less unpleasant and less arousing than unambiguous pictures, coherently with what we found following ambiguous cues. These effects can be explained in light of the time-related distinction between ambiguity and uncertainty (as proposed in [53]). Ambiguity, on the one hand, refers to a static feature of the here and now, embedded in the present moment: an ambiguous situation or stimulus is characterized by novelty, unpredictability and also uncertainty [53]. Uncertainty, on the other hand, refers to a future-oriented feature, char- acterized by unpredictability but not necessarily also by ambiguity [53,54]. In Experiment 1, we manipulated uncertainty during the learning phase (where participants were not asked for any rating), and ambiguity during the test phase (where we asked for subjective affective rat- ings). As a consequence, and in line with the results of our previous research [18], it might be that current (i.e., ambiguous vs. unambiguous) information prevailed over past information (i.e., certain vs. uncertain) in shaping subjective affective experience. Moreover, it is interesting to note that the role of cue ambiguity in dampening subjective valence was exclusively expressed with regards to neutral stimuli. This may be due to a ceiling effect in valence ratings elicited by negative pictures, that may have covered any modulating contribution of cue ambi- guity. Neutral pictures, instead, elicited more variable valence ratings, allowing more subtle modulations of cue ambiguity to statistically emerge. PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 Participants We computed the required sample size through an a priori pre-registered (https://osf.io/z5esb/ ) power analysis for GLMMs (see 2.1.1), estimating parameters from pilot data (N = 18). We recruited 125 adult participants through the provider platform Prolific (Prolific, Oxford, UK; www.prolific.co) in August 2021. Participants were screened for vision difficulties, including color blindness. Researchers had access only to the following participant’s personal informa- tion: Prolific IDs, age, gender, country of birth, country of residence, nationality, employment status and languages spoken. Thus, no identifying information was provided and collected. In order to be included in Experiment 2, participants should not have participated in Experiment 1. Data from 9 participants were discarded according to the pre-registered exclusion criteria: scoring lower than -2 SD from the mean accuracy in the parity judgment task (N = 7), report- ing internet/uploading issues in more than 25% of the experimental trials (N = 2), reporting to have caught the exact probabilistic relationship between S1 color and S2 valence during the learning phase (N = 0). The final sample included 116 participants (58 males, age: M = 25.06, SD = 7.63, range = 18–55; CG N = 55, UG N = 54). All participants gave their written informed consent before starting the experiment, and were paid £2.13 for their participation. All experi- mental procedures were conducted in accordance with the Declaration of Helsinki, and approved by the local Ethical Committee (protocol no. 4177). Method Experiment 2 investigated whether experiencing implicit certain vs. uncertain probabilistic relationships between stimuli might influence subjective ratings to future affective predictions. More specifically, to ensure an implicit exposure to the probabilistic relationship between S1 and S2, during the learning phase we engaged participants in a distracting task (a parity judg- ment task, see Stimulus material and procedure below for details). Then, we tested if partici- pants were able to implicitly extract the (un)certain probabilistic information available during the learning phase, and to use it in the test phase to rate the expected valence of new affective events, or the subjective valence and arousal to new affective stimuli. We pre-registered the study on OSF (https://osf.io/z5esb/). We performed confirmatory analyses to test seven pre-registered hypotheses. The first two hypotheses concerned the behav- ioral performance to the parity judgment task. We hypothesized to find (H1a) faster RTs in the CG as compared to the UG, and (H1b) no differences in accuracy between the groups [22]. This would be in line with the predictive models’ assumption that the two contingencies (100% and 50%) can be experienced implicitly without any significant difference between them [6]. The remaining hypotheses regarded the test phase. As a third hypothesis (H2a), we PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 13 / 24 PLOS ONE Implicit learning, cue ambiguity and affective predictions expected to find more negative expectancy ratings in the UG as compared to the CG [21,22,24,55,56]. The fourth hypothesis (H2b), opposed to H2a, was that participants in the CG would show more negative expectancy ratings after the cues which were previously paired with a negative picture during the learning phase [18]. This hypothesis is coherent with predic- tive models of emotion [3,4], according to which we can expect that contingencies of the learn- ing phase would be implicitly inferred. The fifth hypothesis (H3a) was that participants in the UG would show higher arousal and more unpleasant valence ratings to S2s than participants in the CG [33]. The sixth hypothesis (H3b), opposed to H3a, was that participants in the CG would show higher arousal and more unpleasant valence ratings to S2s, as compared to partici- pants in the UG [27,29–32]. The last hypothesis (H3c), opposed to both H3a and H3b, was to find only a main effect of S2 valence, with significantly higher arousal and more unpleasant valence ratings to negative S2s independently from the experimental group [18,23]. PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 Data analysis The study had a 2 (group, between-subjects: CG vs. UG) × 2 (S2 valence, within-subjects: Neg vs. Neu) mixed design. The analysis plan was pre-registered on OSF (https://osf.io/z5esb/). During data pre-processing, participants’ verbatim responses to the manipulation check question (see Stimulus Material and Procedure above) were qualitatively analyzed by the experimenter, and coded as “yes” or “no” according to their content. No response was coded as “yes”, suggesting that no participants reported to have caught the probabilistic relationship between S1 and S2. Following the pre-registered procedures for outliers detection and management, we detected 5 univariate outliers (MAD > 3) that were excluded from data analysis. We also detected 36 multivariate outliers (MMCD, breakdown point 0.25). From the visual inspection of their ratings it emerged that 2 of them had reversed the scales’ poles (“error outliers”, see [45]), and they were therefore removed from data analysis. The remaining multivariate outliers showed only a slightly different relationship between valence and arousal ratings as compared to other participants, thus we chose to keep them into data analysis (“potentially interesting outliers”, see [45]), since none of them impacted the models’ estimates (as assessed through Cook’s distance). Overall, data from 109 participants were included in the analyses. Before performing the analyses, we pre-processed RTs to the parity judgment task accord- ing to the following pre-registered steps: (i) trimming RTs between 100 and 1500 msec [57]; (ii) discarding RTs of incorrect trials; (iii) adjusting RTs for the speed-accuracy trade off by means of Inverse Efficiency Score (IES) transformation [58]; (iv) log-transforming IES to account for their skewed distribution [57,59]. In order to test our a-priori hypotheses (H1a and H1b on parity judgment task; H2a, H2b, H3a, H3b and H3c on test phase ratings), for each DV we fitted the following (G)LMMs (R package: lme4; [46]): 1. log-transformed IES (H1a): group as fixed factor, random intercept for participant; 2. accuracy (H1b): logistic regression with group as fixed factor, random intercept for participant; 3. expectancy ratings (H2a, H2b): group, cue (within-subjects: cueneg vs. cueneu) and their interaction as fixed factors, random slopes for cue within participant; 4. valence and arousal ratings (H3a, H3b, H3c): group, S2 valence and their interaction as fixed factors, random slopes for S2 valence within participant. Stimulus material and procedure Materials and procedures were the same as in Experiment 1 (see Stimulus Material and Proce- dure above), but in Experiment 2 we employed only unambiguous (i.e., red and blue) cues. Dur- ing the learning phase a parity judgment task was introduced. Single digits from 1 to 9 were employed as stimuli. Participants were informed that they would see a sequence of stimuli on the screen: a colored circle, followed by a picture, and then a number. They were instructed to look at the screen and judge if the number was odd or even, by pressing the ‘Z’ or ‘M’ keys. Response keys were counterbalanced between subjects. Instructions were followed by a practice session of 3 trials, in which participants were trained to give their parity judgments, and they received feedback on their performance. Then, the learning session started, with the same trials’ structure, timing and number as in Experiment 1. In each trial, after the S2, a second ISI with a random duration between 500 and 800 msec followed, in which the screen remained gray. Then, a random digit between 1 and 9 was presented in the center of the screen for 200 msec, and participants had up to 1500 msec to judge the digit’s parity by pressing the ‘Z’ or ‘M’ keys. Participants were left uninstructed about the S1-S2 ratios (100% for the CG, 50% for the UG). Fig 1B shows a schematic representation of the experimental paradigm. PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 14 / 24 PLOS ONE Implicit learning, cue ambiguity and affective predictions At the end of the test phase, participants were directed to the Qualtrics survey (see Stimulus Material and Procedure above). Here, we added an open question as a manipulation check: participants were asked whether they caught any relationship between the color of the circle and the affective valence of the pictures during the learning phase. Participants were then redi- rected back to Prolific to receive their payment. The experiment lasted about 30 minutes. PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 Data analysis The factor “cue” codes for the predictive meaning of the cue according to the specific color- valence pairings experienced by participants in the test phase (within-subjects: cueneg−that is, a cue that preceded negative stimuli in the test phase vs. cueneu−that is, a cue that preceded neu- tral stimuli in the test phase). In the analysis script (shared on OSF https://osf.io/z5esb/) this factor was called “S1 color”. Here, for the sake of clarity, we renamed it as “cue” (see [18] and above for further details on the cue factor, and on how we compensated for the counterbalanc- ing of S1 color–S2 valence pairings in the analysis). 15 / 24 PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 PLOS ONE Implicit learning, cue ambiguity and affective predictions The pre-registered exploratory analyses regarding the effects of time, S2 congruency (expected vs. unexpected S2s), IUS, and DASS-21 questionnaires are reported in S3–S6 Tables. Since the results of these analyses are mainly null, or redundant with respect to both the confir- matory models reported below and the results of our previous work [18], these analyses will not be discussed further in the present manuscript. Influential cases for each model, as well as the methods to test model’s effects were pre-reg- istered. For each model no influential cases emerged, as evaluated through Cook’s distance (>1). LMMs effects were tested by means of F-test and p-values, calculated via Satterthwaite’s degrees of freedom method (α = .05, R package: lmerTest; [47]), GLMMs effects were evalu- ated through Type II Analysis of Deviance (R package: car; [60]). For each model we reported the estimated parameters with 95% CI, marginal and conditional R2 (estimated as in [48]). For each group (CG, UG) and experimental condition (cueneg/cueneu, negative/neutral S2 valence) we report the mean (M) and standard deviation (SD) of expectancy, valence and arousal ratings. Results Descriptive statistics are provided in Table 3. All the models are summarized in Table 4 and Fig 3. For the IES model testing H1a (R2 marginal = 0.003, R2 conditional = 0.968), we did not find any effect of group (F(1, 105) = 0.33, p = .565). Thus, the IES model does not support the hypothesis of faster RTs in the CG as com- pared to the UG (H1a). We found the same result for the accuracy model testing H1b (R2 mar- ginal = 0.009, R2 conditional = 0.486), with no significant effect of group (χ2 = 1.71, p = .191). Therefore, we confirmed our hypothesis (H1b) of not finding group differences in accuracy scores to the parity judgment task. For the expectancy model testing H2a vs. H2b (R2 marginal = 0.068, R2 conditional = 0.267), we only found a main effect of cue (F(1, 107) = 54.98, p < .001): in both groups, participants showed significantly more negative expectancy ratings after the cueneg (i.e., cues preceding negative pictures in the test phase) than after the cueneu (i.e., cues preceding neutral pictures in the test phase) (cueneg vs. cueneu = 14.5, SE = 1.96, t(107) = 7.42, p < .001). Thus, the expec- tancy model does not support either of our two hypotheses (H2a, H2b). For both valence (R2 marginal = 0.596, R2 conditional = 0.673) and arousal (R2 mar- ginal = 0.352, R2 conditional = 0.52) models testing H3a vs. H3b vs. H3c, we found a main effect of S2 valence, with both groups reporting significantly greater unpleasantness (F(1, 107) = 1101.78, p < .001; Neg vs. Neu = -47.1, SE = 1.42, t(107) = -33.19, p < .001) and higher arousal (F(1, 107) = 384.03, p < .001; Neg vs. Neu = 30.9, SE = 1.57, t(107) = 19.6, p < .001) Table 3. Descriptive statistics of Experiment 2. Table 3. Descriptive statistics of Experiment 2. https://doi.org/10.1371/journal.pone.0297954.t003 For each group (CG, UG) and experimental condition (cueneg/cueneu, negative/neutral S2 valence) we report the mean (M) and standard deviation (SD) of expectancy, l d l ti https://doi.org/10.1371/journal.pone.0297954.t003 towards negative pictures. Thus, valence and arousal models support the hypothesis of no group differences in S2-ratings (H3c). towards negative pictures. Thus, valence and arousal models support the hypothesis of no group differences in S2-ratings (H3c). Results Group Cue S2 valence Expectancy ratings Valence ratings Arousal ratings M SD M SD M SD CG cueneg Neg 56.78 25.98 32.56 28.44 56.64 25.02 Neu 57.93 25.2 58.51 28.48 39.35 25.95 cueneu Neg 48.65 26.38 36.21 28.24 55.4 24.91 Neu 49.34 25.73 56.28 28.23 41.3 24.76 UG cueneg Neg 57.1 29 33.23 28.84 56.16 25.89 Neu 58.08 28.8 59.38 29.49 39.89 25.55 cueneu Neg 48.44 30.67 35.87 28.22 54.2 25.53 Neu 49.8 29.35 58.3 28.4 40.65 25.02 PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 16 / 24 Implicit learning, cue ambiguity and affective predictions PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 PLOS ONE PLOS ONE Table 4. Results of confirmatory (G)LMMs on IES, accuracy, expectancy, valence and arousal ratings in Experiment 2. Model Parameter Estimate SE Statistic df p 95% CI IES (H1a) Intercept 6.61 0.08 84.06 105.24 < 0.001 6.46 6.77 UG—CG -0.09 0.16 -0.58 105.24 0.565 -0.40 0.22 σ ID 0.82 σ residual 0.15 Accuracy (H1b) Intercept 2.35 0.18 12.95 < 0.001 2.00 2.71 UG—CG 0.47 0.36 1.31 0.191 -0.23 1.18 σ ID 1.75 Expectancy (H2a, H2b) Intercept 53.36 0.85 62.75 107.01 < 0.001 51.68 55.05 UG—CG -0.17 1.70 -0.10 107.01 0.922 -3.54 3.20 cueneg—cueneu 14.55 1.96 7.42 107.00 < 0.001 10.66 18.44 cue x group -0.24 3.92 -0.06 107.00 0.952 -8.02 7.54 σ ID 8.03 σ cue 19.04 σ residual 23.92 Valence (H3a, H3b, H3c) Intercept 44.99 0.55 82.53 107.02 < 0.001 43.91 46.07 UG—CG 0.24 1.09 0.22 107.02 0.83 -1.93 2.40 Neg—Neu -47.10 1.42 -33.19 107.02 < 0.001 -49.91 -44.28 valence x group 0.79 2.84 0.28 107.02 0.782 -4.84 6.41 σ ID 4.98 σ valence 13.75 σ residual 17.45 Arousal (H3a, H3b, H3c) Intercept 48.95 0.76 64.77 106.96 < 0.001 47.45 50.45 UG—CG -0.49 1.51 -0.33 106.96 0.745 -3.49 2.50 Neg—Neu 30.86 1.57 19.60 107.01 < 0.001 27.74 33.98 valence x group 1.47 3.15 0.47 107.01 0.641 -4.77 7.72 σ ID 7.36 σ valence 15.42 σ residual 18.03 For each model we reported the estimates (unstandardized regression coefficients for LMMs, odds ratio for GLMMs), SE, 95% CI, and the associated statistics (t-test for LMMs, χ2 for GLMMs). atory (G)LMMs on IES, accuracy, expectancy, valence and arousal ratings in Experiment 2. Table 4. Results of confirmatory (G)LMMs on IES, accuracy, expectancy, valence and arousal ratings in Experiment 2. For each model we reported the estimates (unstandardized regression coefficients for LMMs, odds ratio for GLMMs), SE, 95% CI, and the associated statistics (t-test for LMMs, χ2 for GLMMs). https://doi.org/10.1371/journal.pone.0297954.t004 Discussion Experiment 2 replicated our previous findings [18] for valence and arousal, but not for expec- tancy ratings. Indeed, both groups showed similar expectancies, predicting upcoming pictures’ valence according to the 75% contingencies of the test phase rather than to previously (and implicitly) experienced contingencies. Thus, the results did not support the hypothesis that probabilistic information can be implicitly extracted and subsequently used to modulate sub- jective affective ratings, as it can be expected according to predictive models of emotion [3,4,6]. They are however consistent with alternative explanations derived from some recent evidence [61], according to which awareness seems to be a necessary precursor for learning, especially in the case of repetition learning. Remarkably, we can reasonably exclude any potential difference in the way the two groups experienced the implicit contingencies during the learning phase. In fact, no significant group 17 / 24 PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 PLOS ONE Implicit learning, cue ambiguity and affective predictions Fig 3. Box-plot of expectancy, valence and arousal ratings in Experiment 2 according to the group (CG vs. UG), and the cue (CueNeg vs. CueNeu, for expectancy ratings) or the S2 valence (Neg vs. Neu, for valence and arousal ratings). Points represent the mean estimated value for each participant and condition. Fig 3. Box-plot of expectancy, valence and arousal ratings in Experiment 2 according to the group (CG vs. UG), and the cue (CueNeg vs. CueNeu, for expectancy ratings) or the S2 valence (Neg vs. Neu, for valence and arousal ratings). Points represent the mean estimated value for each participant and condition. https://doi.org/10.1371/journal.pone.0297954.g003 https://doi.org/10.1371/journal.pone.0297954.g003 https://doi.org/10.1371/journal.pone.0297954.g003 differences emerged on the parity judgment task, as measured by RTs (see H1a) and accuracy (see H1b), suggesting that the distracting task acted similarly in the two groups. Demonstrat- ing this is crucial, as judgments among low levels of contingency (e.g., 50%) are more difficult than judgments among high levels of contingency (e.g., 100%) [62], and this could have (but did not) exert confounding effects on how contingency learning occurred in the two groups. PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 General discussion In spite of this, our result rea- sonably suggests that, without any explicit focus of attention on previous experience, the effect of the latter does not emerge at the subjective level significantly shaping the reported affective experience. Future investigations should clarify whether implicit learning can shape affective prediction construction at other levels. Overall, our results advance the understanding of the mechanisms underlying subjective affective experience as constructed from prior knowledge. Crucially, we fully replicated our previous results [18], collecting additional evidence that subjective expectancies are sensitive to uninstructed (but not implicit) statistical regularities experienced in the past. With this, we further supported predictive models of emotion [3,4]: certain past learning experiences are used to construct highly reliable predictions, thus leading to a coherent pre-activation of the associated subjective experience. However, our results suggest some caution when applying predictive processing theoretical principles to the affective domain, especially with regards to the updating stage. Indeed, we did not find evidence for a generalization effect to new and potentially ambiguous stimuli, nor evidence of implicitness. Predictive processing theories, instead, assume that prediction updating should be modulated by stimuli predictability [11,13,20,65]. Nonetheless, in recent studies it was consistently found that affective processing during the updating stage is not (or is only weakly) influenced by stimulus predictability both at the subjective [18] and at the neural levels [20,41]. Thus, when it comes to updating, more weight seems to be attributed to the affective nature of stimuli themselves and to the contextual information available in the current moment, rather than to top-down predictions based on past experiences. This may be due to the evolutionary relevance of affective stimuli, in that a quick bottom-up evaluation of present inputs may cover a more efficient role in promoting survival (and thus, it must be prioritized). As a selected broader implication of our study, consistent with predictive models of emo- tion [3,4], we argue that a paradigm shift is needed in the study of emotions, in the sense that we further supported the idea that emotions cannot be studied independently from the specific context in which they are constructed [3,49,66]. We found, indeed, that previous experience failed to generalize to new contexts in an experimental setting which is rather artificial as com- pared to everyday life and which implies the use of symbolic and simple stimuli. General discussion The studies reported in the present paper attempted to shed further light on the construction of subjective affective experience as conceived within the predictive framework [3,4]. Indeed, little is known about how subjective experience is shaped by new and potentially ambiguous environmental cues, or whether it can be influenced by implicit previous learnings, despite both being considered crucial factors for constructing efficient predictions [1,2]. Regarding cue ambiguity (Experiment 1), we found that ambiguous cues elicited a damp- ened subjective affective experience in all the prediction stages, independently from previous learnings. Interestingly, when presented with unambiguous cues, participants formerly exposed to certain contingencies (i.e., the CG, that constructed a reliable prediction) showed more extreme expectancy ratings than participants exposed to uncertainty (i.e., the UG). This fully replicates our previous results [18], and may be due to a pre-activation of the expected affective experience, as suggested by predictive models of emotion [3,4]. When faced with PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 18 / 24 PLOS ONE Implicit learning, cue ambiguity and affective predictions ambiguous cues, instead, participants were unable to implement a reliable prediction and coherently pre-activate the associated subjective experience, and thus the latter was dampened. ambiguous cues, instead, participants were unable to implement a reliable prediction and coherently pre-activate the associated subjective experience, and thus the latter was dampened. Concerning previous implicit experience (Experiment 2), we did not find any evidence that subjective affective ratings are shaped by (un)certainty of previous implicit learning. Indeed, all participants reported similar subjective experience. This is consistent with some recent evi- dence about repetition learning, providing strong evidence that awareness is a necessary pre- cursor for learning [61], and suggests that affective stimuli require a prompt response primarily driven by a quick bottom-up evaluation of present inputs rather than by top-down predictions based on past information. However, this does not necessarily exclude that an implicit extraction of statistical regularities from task stimuli contingencies occurred in some ways (e.g., at a covert level, measured as patterns of neural/psychophysiological activity). There is a bunch of evidence, indeed, suggesting that implicit learning may potentially occur across all the statistical learning paradigms, and that these two learning processes are associated with the activation of partially overlapping neural networks [63,64]. PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 General discussion This high- lights the importance of taking context into careful account when studying affective processes in complex situations and/or beyond each specific experimental setup. Notwithstanding, some limitations of our research are worth mentioning. First, we did not assess individual differences in cognitive processes that may influence affective predictions (e.g., attention, memory, etc.), so we cannot exclude that these processes may have exerted influencing effects. However, we can exclude that mood and personality traits modulating PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 19 / 24 PLOS ONE Implicit learning, cue ambiguity and affective predictions affective predictions (i.e., intolerance of uncertainty and negative affectivity, that we measured and controlled for in our analyses; see S5–S6, S9 and S10 Tables) exerted confounding effects. Also, there are some constraints on the generality of our findings [67] since our sample only included WEIRD participants. The lack of participants from other cultural groups precludes our ability to ascertain whether our findings have a broader generalizability. Second, our para- digm remains quite artificial with respect to real-life situations, in which people often experi- ence multimodal and dynamic affective stimuli. Third, previous experience is manipulated only in terms of (un)certain probabilistic relationships between stimuli (i.e., S1-S2 congru- ency). However, other characteristics of previous experience, such as the frequency of expo- sure, or the familiarity with the physical environment in which the stimuli are embedded, may be of interest, too. Fourth, we have only manipulated ambiguity with respect to cues, but also ambiguity of targets can have a great impact on subjective affective experience. Last, in our study we only focused on subjective experience as overtly rated by participants (since we were not able to collect covert -e.g., psychophysiological- measures due to COVID-19 pandemic restrictions), but more subtle modulations may be experimentally captured by measuring also covert processing indices. We thus encourage future studies to complement our results, by integrating both subjective and objective measures of affective processing. Supporting information S1 Table. List of NAPS picture names used as S2s in Experiment 1 and 2, sorted by valence (Neg = negative, Neu = neutral). (PDF) S1 Table. List of NAPS picture names used as S2s in Experiment 1 and 2, sorted by valenc (Neg = negative, Neu = neutral). (PDF) S2 Table. Means (M), standard deviations (SD), and results of two-tailed t-tests assuming unequal variance in luminance, contrast, complexity indices (i.e., JPEG size, entropy), an color space indices (i.e., LABL, LABA, LABB), referred to negative (Neg) and neutral (Neu) NAPS pictures employed as S2s in Experiment 1 and 2. (PDF) S3 Table. Pre-registered exploratory models on Block effect in Experiment 1. (PDF) S4 Table. Pre-registered exploratory models on S2 Congruency effect in Experiment 1. (PDF) S5 Table. Pre-registered exploratory models on Intolerance of Uncertainty Scale (IUS) effect in Experiment 1. (PDF) S6 Table. Pre-registered exploratory models on Depression, Anxiety and Stress Scale (DASS-21) effect in Experiment 1. (PDF) S7 Table. Pre-registered exploratory models on Block effect in Experiment 2. (PDF) S8 Table. Pre-registered exploratory models on S2 Congruency effect in Experiment 2. (PDF) S9 Table. Pre-registered exploratory models on Intolerance of Uncertainty Scale (IUS) effect in Experiment 2. (PDF) S2 Table. Means (M), standard deviations (SD), and results of two-tailed t-tests assuming unequal variance in luminance, contrast, complexity indices (i.e., JPEG size, entropy), and color space indices (i.e., LABL, LABA, LABB), referred to negative (Neg) and neutral (Neu) NAPS pictures employed as S2s in Experiment 1 and 2. (PDF) Acknowledgments We kindly thank Filippo Carnovalini for his valuable help on the experiment programming. Author Contributions Author Contributions Conceptualization: Fiorella Del Popolo Cristaldi, Giulia Buodo, Suzanne Oosterwijk, Gio- vanni Mento. Conceptualization: Fiorella Del Popolo Cristaldi, Giulia Buodo, Suzanne Oosterwijk, Gio- vanni Mento. Data curation: Fiorella Del Popolo Cristaldi, Filippo Gambarota. Formal analysis: Fiorella Del Popolo Cristaldi, Filippo Gambarota. Funding acquisition: Fiorella Del Popolo Cristaldi. Investigation: Fiorella Del Popolo Cristaldi. Methodology: Fiorella Del Popolo Cristaldi, Suzanne Oosterwijk, Giovanni Mento. Project administration: Fiorella Del Popolo Cristaldi, Suzanne Oosterwijk. Resources: Fiorella Del Popolo Cristaldi. Software: Fiorella Del Popolo Cristaldi. Software: Fiorella Del Popolo Cristaldi. Supervision: Suzanne Oosterwijk. Visualization: Fiorella Del Popolo Cristaldi, Filippo Gambarota. Writing – original draft: Fiorella Del Popolo Cristaldi, Filippo Gambarota. Writing – review & editing: Fiorella Del Popolo Cristaldi, Giulia Buodo, Filippo Gambarota, Suzanne Oosterwijk, Giovanni Mento. S4 Table. Pre-registered exploratory models on S2 Congruency effect in Experiment 1. (PDF) S5 Table. Pre-registered exploratory models on Intolerance of Uncertainty Scale (IUS) effect in Experiment 1. (PDF) S6 Table. Pre-registered exploratory models on Depression, Anxiety and Stress Scale (DASS-21) effect in Experiment 1. (PDF) S7 Table. Pre-registered exploratory models on Block effect in Experiment 2. (PDF) S8 Table. Pre-registered exploratory models on S2 Congruency effect in Experiment 2. (PDF) S9 Table. Pre-registered exploratory models on Intolerance of Uncertainty Scale (IUS) effect in Experiment 2. (PDF) 20 / 24 PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 PLOS ONE Implicit learning, cue ambiguity and affective predictions S10 Table. Pre-registered exploratory models on Depression, Anxiety and Stress Scale (DASS-21) effect in Experiment 2. (PDF) S10 Table. Pre-registered exploratory models on Depression, Anxiety and Stress Scale (DASS-21) effect in Experiment 2. (PDF) References Current Opinion in Behavioral Sciences. 2018 Feb 1; 19:67–72. 16. Barrett LF, Wilson-Mendenhall CD, Barsalou LW. The conceptual act theory: A roadmap. In: Barrett LF, Russell JA, editors. The psychological construction of emotion. New York, NY: Guilford Press; 2014. p. 83–110. 17. Seth AK. Interoceptive inference, emotion, and the embodied self. Trends in Cognitive Sciences. 2013; 17(11):565–73. https://doi.org/10.1016/j.tics.2013.09.007 PMID: 24126130 18. Del Popolo Cristaldi F, Gambarota F, Oosterwijk S. Does your past define you? The role of previous visual experience in subjective reactions to new affective pictures and sounds. Emotion. 2023 Aug; 23 (5):1317–33. https://doi.org/10.1037/emo0001168 PMID: 36074619 19. Mercado F, Hinojosa JA, Peñacoba C, Carretie´ L. The emotional S1-S2 paradigm for exploring brain mechanisms underlying affective modulation of expectancy. In: Brain Mapping Research Develop- ments. Hauppauge, NY: Nova Science Publishers; 2008. p. 197–209. 20. Del Popolo Cristaldi F, Mento G, Buodo G, Sarlo M. What’s next? Neural correlates of emotional predic- tions: A high-density EEG investigation. Brain and Cognition. 2021; 150:105708. https://doi.org/10. 1016/j.bandc.2021.105708 PMID: 33714004 21. Dieterich R, Endrass T, Kathmann N. Uncertainty is associated with increased selective attention and sustained stimulus processing. Cognitive, Affective, & Behavioral Neuroscience. 2016; 16(3):447–56. https://doi.org/10.3758/s13415-016-0405-8 PMID: 26810702 22. Grupe DW, Nitschke JB. Uncertainty is associated with biased expectancies and heightened responses to aversion. Emotion. 2011; 11(2):413–24. https://doi.org/10.1037/a0022583 PMID: 21500909 23. Lin H, Liang J, Jin H, Zhao D. Differential effects of uncertainty on LPP responses to emotional events during explicit and implicit anticipation. International Journal of Psychophysiology. 2018; 129:41–51. https://doi.org/10.1016/j.ijpsycho.2018.04.012 PMID: 29704580 24. Qiao Z, Geng H, Wang Y, Li X. Anticipation of uncertain threat modulates subsequent affective responses and covariation bias. Frontiers in Psychology. 2018; 9:2547. https://doi.org/10.3389/fpsyg. 2018.02547 PMID: 30618968 25. Sarinopoulos I, Grupe DW, Mackiewicz KL, Herrington JD, Lor M, Steege EE, et al. Uncertainty during anticipation modulates neural responses to aversion in human insula and amygdala. Cerebral Cortex. 2010; 20(4):929–40. https://doi.org/10.1093/cercor/bhp155 PMID: 19679543 26. Chen JTH, Lovibond PF. Intolerance of Uncertainty Is Associated With Increased Threat Appraisal and Negative Affect Under Ambiguity but Not Uncertainty. Behavior Therapy. 2016; 47(1):42–53. https://doi. org/10.1016/j.beth.2015.09.004 PMID: 26763496 27. Bermpohl F, Pascual-Leone A, Amedi A, Merabet LB, Fregni F, Gaab N, et al. Attentional modulation of emotional stimulus processing: An fMRI study using emotional expectancy. Human Brain Mapping. 2006; 27(8):662–77. https://doi.org/10.1002/hbm.20209 PMID: 16317710 28. Greenberg T, Carlson JM, Rubin D, Cha J, Mujica-Parodi L. References 1. Friston K. The free-energy principle: A unified brain theory? Nature Reviews Neuroscience. 2010; 11 (2):127–38. https://doi.org/10.1038/nrn2787 PMID: 20068583 2. Shipp S. Neural elements for predictive coding. Frontiers in Psychology. 2016; 7:1792. https://doi.org/ 10.3389/fpsyg.2016.01792 PMID: 27917138 3. Barrett LF. The theory of constructed emotion: an active inference account of interoception and catego- rization. Social Cognitive and Affective Neuroscience. 2017; 12(1):1–23. https://doi.org/10.1093/scan/ nsw154 PMID: 27798257 4. Seth AK, Friston KJ. Active interoceptive inference and the emotional brain. Philosophical Transactions of the Royal Society B: Biological Sciences. 2016; 371(1708):20160007. https://doi.org/10.1098/rstb. 2016.0007 PMID: 28080966 5. Clark A. Whatever next? Predictive brains, situated agents, and the future of cognitive science. Behav- ioral and Brain Sciences. 2013; 36(3):181–204. https://doi.org/10.1017/S0140525X12000477 PMID: 23663408 6. Bar M. The proactive brain: memory for predictions. Philosophical Transactions of the Royal Society B: Biological Sciences. 2009; 364(1521):1235–43. https://doi.org/10.1098/rstb.2008.0310 PMID: 19528004 7. Pezzulo G, Zorzi M, Corbetta M. The secret life of predictive brains: what’s spontaneous activity for? Trends in Cognitive Sciences [Internet]. 2021 Jun 16 [cited 2021 Jul 6];0(0). Available from: https:// www.cell.com/trends/cognitive-sciences/abstract/S1364-6613(21)00128-5 PMID: 34144895 8. Sterling P. Allostasis: A model of predictive regulation. Physiology & Behavior. 2012 Apr 12; 106(1):5– 15. 21 / 24 PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 PLOS ONE Implicit learning, cue ambiguity and affective predictions 9. Sterling P, Laughlin S. Principles of neural design. MIT press; 2015. 9. Sterling P, Laughlin S. Principles of neural design. MIT press; 2015. 10. Alink A, Schwiedrzik CM, Kohler A, Singer W, Muckli L. Stimulus predictability reduces responses in pri- mary visual cortex. Journal of Neuroscience. 2010; 30(8):2960–6. https://doi.org/10.1523/ JNEUROSCI.3730-10.2010 PMID: 20181593 11. Kok P, Rahnev D, Jehee JFM, Lau HC, de Lange FP. Attention reverses the effect of prediction in silencing sensory signals. Cerebral cortex. 2019; 22(9):2197–206. 12. Stefanics G, Heinzle J, Horva´th AA, Stephan KE. Visual mismatch and predictive coding: A computa- tional single-trial ERP study. Journal of Neuroscience. 2018; 38(16):4020–30. https://doi.org/10.1523/ JNEUROSCI.3365-17.2018 PMID: 29581379 13. Duma GM, Granziol U, Mento G. Should I stay or should I go? How local-global implicit temporal expec- tancy shapes proactive motor control: An hdEEG study. NeuroImage. 2020; 220:117071. https://doi. org/10.1016/j.neuroimage.2020.117071 PMID: 32574807 14. Mento G, Vallesi A. Spatiotemporally dissociable neural signatures for generating and updating expec- tation over time in children: A High Density-ERP study. Developmental Cognitive Neuroscience. 2016; 19:98–106. https://doi.org/10.1016/j.dcn.2016.02.008 PMID: 26946428 15. LeDoux JE, Hofmann SG. The subjective experience of emotion: a fearful view. PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 References Anticipation of high arousal aversive and positive movie clips engages common and distinct neural substrates. Social Cognitive and Affective Neuroscience. 2015; 10(4):605–11. https://doi.org/10.1093/scan/nsu091 PMID: 24984958 29. Johnen AK, Harrison NR. The effects of valid and invalid expectations about stimulus valence on beha- vioural and electrophysiological responses to emotional pictures. International Journal of Psychophysi- ology. 2019; 144:47–55. https://doi.org/10.1016/j.ijpsycho.2019.08.002 PMID: 31398378 22 / 24 PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 PLOS ONE Implicit learning, cue ambiguity and affective predictions 30. Lin H, Liang J, Liu T, Liang Z, Jin H. Cue Valence Influences the Effects of Cue Uncertainty on ERP Responses to Emotional Events. Frontiers in Human Neuroscience. 2020; 14:140. https://doi.org/10. 3389/fnhum.2020.00140 PMID: 32351374 31. Lin H, Jin H, Liang J, Yin R, Liu T, Wang Y. Effects of Uncertainty on ERPs to Emotional Pictures Depend on Emotional Valence. Frontiers in Psychology. 2015; 6(1927). https://doi.org/10.3389/fpsyg. 2015.01927 PMID: 26733916 32. Lin H, Xiang J, Li S, Liang J, Jin H. Anticipation of negative pictures enhances the P2 and P3 in their later recognition. Frontiers in Human Neuroscience. 2015; 9:646. https://doi.org/10.3389/fnhum.2015. 00646 PMID: 26648860 33. Lin H, Xiang J, Li S, Liang J, Zhao D, Yin D, et al. Cued uncertainty modulates later recognition of emo- tional pictures: An ERP study. International Journal of Psychophysiology. 2017; 116:68–76. https://doi. org/10.1016/j.ijpsycho.2017.03.004 PMID: 28323026 34. Green P, MacLeod CJ. SIMR: an R package for power analysis of generalized linear mixed models by simulation. Methods in Ecology and Evolution. 2016; 7(4):493–8. 35. Marchewka A, \.Zurawski Lukasz, Jednoro´g K, Grabowska A. The Nencki Affective Picture System (NAPS): Introduction to a novel, standardized, wide-range, high-quality, realistic picture database. Behavior Research Methods. 2014; 46(2):596–610. https://doi.org/10.3758/s13428-013-0379-1 PMID: 23996831 36. Mathoˆt S, Schreij D, Theeuwes J. OpenSesame: An open-source, graphical experiment builder for the social sciences. Behavior Research Methods. 2012; 44(2):314–24. https://doi.org/10.3758/s13428- 011-0168-7 PMID: 22083660 37. Lange K, Ku¨hn S, Filevich E. "Just Another Tool for Online Studies” (JATOS): An Easy Solution for Setup and Management of Web Servers Supporting Online Studies. PLOS ONE. 2015 Jun 26; 10(6): e0130834. 38. Carleton RN, Norton MAPJ, Asmundson GJG. Fearing the unknown: A short version of the Intolerance of Uncertainty Scale. Journal of Anxiety Disorders. 2007; 21(1):105–17. https://doi.org/10.1016/j. janxdis.2006.03.014 PMID: 16647833 39. Lovibond PF, Lovibond SH. The structure of negative emotional states: Comparison of the Depression Anxiety Stress Scales (DASS) with the Beck Depression and Anxiety Inventories. Behaviour Research and Therapy. 1995 Mar 1; 33(3):335–43. References https://doi.org/10.1016/0005-7967(94)00075-u PMID: 7726811 40. Del Popolo Cristaldi F, Buodo G, Duma GM, Sarlo M, Mento G. Unbalanced functional connectivity at rest affects the ERP correlates of affective prediction in high intolerance of uncertainty individuals: A high density EEG investigation. International Journal of Psychophysiology. 2022 Aug 1; 178:22–33. https://doi.org/10.1016/j.ijpsycho.2022.06.006 PMID: 35709946 41. Del Popolo Cristaldi F, Mento G, Sarlo M, Buodo G. Dealing with uncertainty: A high-density EEG inves- tigation on how intolerance of uncertainty affects emotional predictions. PLOS ONE. 2021 Jul 1; 16(7): e0254045. https://doi.org/10.1371/journal.pone.0254045 PMID: 34197554 42. Gole M, Scha¨fer A, Schienle A. Event-related potentials during exposure to aversion and its anticipa- tion: The moderating effect of intolerance of uncertainty. Neuroscience Letters. 2012; 507(2):112–7. https://doi.org/10.1016/j.neulet.2011.11.054 PMID: 22172930 43. Buehler R, McFarland C, Spyropoulos V, Lam KCH. Motivated Prediction of Future Feelings: Effects of Negative Mood and Mood Orientation on Affective Forecasts. Pers Soc Psychol Bull. 2007 Sep 1; 33 (9):1265–78. https://doi.org/10.1177/0146167207303014 PMID: 17586732 44. Bru¨hl AB, Viebke MC, Baumgartner T, Kaffenberger T, Herwig U. Neural correlates of personality dimensions and affective measures during the anticipation of emotional stimuli. Brain Imaging and Behavior. 2011; 5:86–96. https://doi.org/10.1007/s11682-011-9114-7 PMID: 21264550 45. Leys C, Delacre M, Mora YL, Lakens D, Ley C. How to Classify, Detect, and Manage Univariate and Multivariate Outliers, With Emphasis on Pre-Registration. International Review of Social Psychology [Internet]. 2019 [cited 2021 May 11]; 32(1). Available from: http://www.rips-irsp.com/articles/10.5334/ irsp.289/ 46. Bates D, Ma¨chler M, Bolker BM, Walker SC. Fitting linear mixed-effects models using lme4. Journal of Statistical Software. 2015; 67(1). 47. Kuznetsova A, Brockhoff PB, Christensen RHB. lmerTest Package: Tests in Linear Mixed Effects Mod- els. Journal of Statistical Software. 2017; 82(13):1–26. 48. Nakagawa S, Johnson PCD, Schielzeth H. The coefficient of determination R2 and intra-class correla- tion coefficient from generalized linear mixed-effects models revisited and expanded. Journal of The Royal Society Interface. 2017 Sep 30; 14(134):20170213. https://doi.org/10.1098/rsif.2017.0213 PMID: 28904005 23 / 24 PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 PLOS ONE Implicit learning, cue ambiguity and affective predictions 49. Barrett LF. Context reconsidered: Complex signal ensembles, relational meaning, and population think- ing in psychological science. American Psychologist. 2022; 77(8):894. https://doi.org/10.1037/ amp0001054 PMID: 36409120 50. Barrett LF, Satpute AB. Historical pitfalls and new directions in the neuroscience of emotion. Neurosci- ence Letters. 2019; 693:9–18. https://doi.org/10.1016/j.neulet.2017.07.045 PMID: 28756189 51. Oosterwijk S, Mackey S, Wilson-Mendenhall C, Winkielman P, Paulus MP. References Concepts in context: Pro- cessing mental state concepts with internal or external focus involves different neural systems. Social Neuroscience. 2015; 10(3):294–307. https://doi.org/10.1080/17470919.2014.998840 PMID: 25748274 52. Kirschner H, Hilbert K, Hoyer J, Lueken U, Beesdo-Baum K. Psychophsyiological reactivity during uncertainty and ambiguity processing in high and low worriers. Journal of Behavior Therapy and Experi- mental Psychiatry. 2016; 50:97–105. https://doi.org/10.1016/j.jbtep.2015.06.001 PMID: 26143445 53. Grenier S, Barrette AM, Ladouceur R. Intolerance of Uncertainty and Intolerance of Ambiguity: Similari- ties and differences. Personality and Individual Differences. 2005 Aug 1; 39(3):593–600. 54. Carleton RN. The intolerance of uncertainty construct in the context of anxiety disorders: theoretical and practical perspectives. Expert Review of Neurotherapeutics. 2012 Aug 1; 12(8):937–47. https://doi.org/ 10.1586/ern.12.82 PMID: 23002938 55. Herwig U, Kaffenberger T, Baumgartner T, Ja¨ncke L. Neural correlates of a “pessimistic” attitude when anticipating events of unknown emotional valence. NeuroImage. 2007 Jan; 34(2):848–58. https://doi. org/10.1016/j.neuroimage.2006.09.035 PMID: 17112750 56. Schumacher S, Herwig U, Baur V, Mueller-Pfeiffer C, Martin-Soelch C, Rufer M, et al. Psychophysiolog- ical responses during the anticipation of emotional pictures. Journal of Psychophysiology. 2015; 29 (1):13–9. 57. Ratcliff R. Methods for dealing with reaction time outliers. Psychological bulletin. 1993; 114(3):510. https://doi.org/10.1037/0033-2909.114.3.510 PMID: 8272468 58. Vandierendonck A. A comparison of methods to combine speed and accuracy measures of perfor- mance: A rejoinder on the binning procedure. Behav Res. 2017 Apr 1; 49(2):653–73. https://doi.org/10. 3758/s13428-016-0721-5 PMID: 26944576 59. Wilcox R, Peterson TJ, McNitt-Gray JL. Data Analyses When Sample Sizes Are Small: Modern Advances for Dealing With Outliers, Skewed Distributions, and Heteroscedasticity. Journal of Applied Biomechanics. 2018 Aug 1; 34(4):258–61. https://doi.org/10.1123/jab.2017-0269 PMID: 30045651 60. Fox J, Weisberg S. An R companion to applied regression. Third edition. Thousand Oaks, CA: Sage; 2019. 61. Musfeld P, Souza AS, Oberauer K. Repetition learning is neither a continuous nor an implicit process. Proceedings of the National Academy of Sciences. 2023 Apr 18; 120(16):e2218042120. 62. Clark SC, Benassi VA. Judgment of Contingency: Contrast and Assimilation, Displacement of Judg- ments, and Self-Efficacy. Social Behavior & Personality: an international journal. 1997 May; 25(2):183. 63. Batterink LJ, Paller KA, Reber PJ. Understanding the Neural Bases of Implicit and Statistical Learning. Topics in Cognitive Science. 2019; 11(3):482–503. https://doi.org/10.1111/tops.12420 PMID: 30942536 64. Kim R, Seitz A, Feenstra H, Shams L. Testing assumptions of statistical learning: Is it long-term and implicit? Neuroscience Letters. 2009 Sep 11; 461(2):145–9. https://doi.org/10.1016/j.neulet.2009.06. 030 PMID: 19539701 65. PLOS ONE | https://doi.org/10.1371/journal.pone.0297954 February 9, 2024 References Chennu S, Noreika V, Gueorguiev D, Blenkmann A, Kochen S, Iba´ñez A, et al. Expectation and atten- tion in hierarchical auditory prediction. Journal of Neuroscience. 2013; 33(27):11194–205. https://doi. org/10.1523/JNEUROSCI.0114-13.2013 PMID: 23825422 66. Barrett LF, Mesquita B, Gendron M. Context in Emotion Perception. Current Directions in Psychological Science. 2011; 20(5):286–90. 67. Simons DJ, Shoda Y, Lindsay DS. Constraints on Generality (COG): A Proposed Addition to All Empiri- cal Papers. Perspect Psychol Sci. 2017 Nov 1; 12(6):1123–8. https://doi.org/10.1177/ 1745691617708630 PMID: 28853993 24 / 24
https://openalex.org/W4319160799
https://www.frontiersin.org/articles/10.3389/fnint.2023.898215/pdf
English
null
Neuropsychiatric feature-based subgrouping reveals neural sensory processing spectrum in female FMR1 premutation carriers: A pilot study
Frontiers in integrative neuroscience
2,023
cc-by
10,544
OPEN ACCESS OPEN ACCESS EDITED BY Elena V. Mnatsakanian, Institute of Higher Nervous Activity and Neurophysiology (RAS), Russia REVIEWED BY Carol Lee Wilkinson, Boston Children’s Hospital and Harvard Medical School, United States Emily G. Allen, Emory University, United States *CORRESPONDENCE Lauren E. Ethridge ethri@ou.edu EDITED BY Elena V. Mnatsakanian, Institute of Higher Nervous Activity and Neurophysiology (RAS), Russia REVIEWED BY Carol Lee Wilkinson, Boston Children’s Hospital and Harvard Medical School, United States Emily G. Allen, Emory University, United States *CORRESPONDENCE Lauren E. Ethridge ethri@ou.edu Jordan E. Norris1, Lauren M. Schmitt2,3, Lisa A. De Stefano2, Ernest V. Pedapati4,5,6, Craig A. Erickson4,6, John A. Sweeney6 and Lauren E. Ethridge1,7* Jordan E. Norris1, Lauren M. Schmitt2,3, Lisa A. De Stefano2, Ernest V. Pedapati4,5,6, Craig A. Erickson4,6, John A. Sweeney6 and Lauren E. Ethridge1,7* RECEIVED 17 March 2022 ACCEPTED 18 January 2023 PUBLISHED 03 February 2023 CITATION Norris JE, Schmitt LM, De Stefano LA, Pedapati EV, Erickson CA, Sweeney JA and Ethridge LE (2023) Neuropsychiatric feature-based subgrouping reveals neural sensory processing spectrum in female FMR1 premutation carriers: A pilot study. Front. Integr. Neurosci. 17:898215. doi: 10.3389/fnint.2023.898215 1Department of Psychology, The University of Oklahoma, Norman, OK, United States, 2Behavioral Medicine and Clinical Psychology, Cincinnati Children’s Hospital Medical Center, Cincinnati, OH, United States, 3Department of Pediatrics, University of Cincinnati, Cincinnati, OH, United States, 4Division of Child and Adolescent Psychiatry, Cincinnati Children’s Hospital Medical Center, Cincinnati, OH, United States, 5Division of Child Neurology, Cincinnati Children’s Hospital Medical Center, Cincinnati, OH, United States, 6Department of Psychiatry and Behavioral Neuroscience, University of Cincinnati, Cincinnati, OH, United States, 7Department of Pediatrics, Section on Developmental and Behavioral Pediatrics, The University of Oklahoma Health Sciences Center, Oklahoma City, OK, United States CITATION Norris JE, Schmitt LM, De Stefano LA, Pedapati EV, Erickson CA, Sweeney JA and Ethridge LE (2023) Neuropsychiatric feature-based subgrouping reveals neural sensory processing spectrum in female FMR1 premutation carriers: A pilot study. Front. Integr. Neurosci. 17:898215. doi: 10.3389/fnint.2023.898215 Introduction: Fragile X Syndrome (FXS) is rare genetic condition characterized by a repeat expansion (CGG) in the Fragile X messenger ribonucleoprotein 1 (FMR1) gene where individuals with greater than 200 repeats are defined as full mutation. FXS clinical presentation often includes intellectual disability, and autism- like symptoms, including anxiety and sensory hypersensitivities. TYPE Original Research PUBLISHED 03 February 2023 DOI 10.3389/fnint.2023.898215 TYPE Original Research PUBLISHED 03 February 2023 DOI 10.3389/fnint.2023.898215 TYPE Original Research PUBLISHED 03 February 2023 DOI 10.3389/fnint.2023.898215 Neuropsychiatric feature-based subgrouping reveals neural sensory processing spectrum in female FMR1 premutation carriers: A pilot study OPEN ACCESS EDITED BY Elena V. Mnatsakanian, Institute of Higher Nervous Activity and Neurophysiology (RAS), Russia REVIEWED BY Carol Lee Wilkinson, Boston Children’s Hospital and Harvard Medical School, United States Emily G. Allen, Emory University, United States *CORRESPONDENCE Lauren E. Ethridge ethri@ou.edu RECEIVED 17 March 2022 ACCEPTED 18 January 2023 PUBLISHED 03 February 2023 CITATION Norris JE, Schmitt LM, De Stefano LA, Pedapati EV, Erickson CA, Sweeney JA and Ethridge LE (2023) Neuropsychiatric feature-based subgrouping reveals neural sensory processing spectrum in female FMR1 premutation carriers: A pilot study. Front. Integr. Neurosci. 17:898215. doi: 10.3389/fnint.2023.898215 COPYRIGHT 1. Background neuropsychiatric risk (Schmitt et al., 2022). Executive dysfunction and social processing difficulties were previously noted in child PMCs, in addition to the developmental differences between PMCs and TD infants centered around abnormal sensory experiences and non-verbal communication (Wheeler et al., 2016). Fragile X Syndrome (FXS) is a trinucleotide repeat disorder affecting the X chromosome characterized by a cytosine-guanine- guanine (CGG) expansion of the FMR1 gene (Verkerk et al., 1991; Yu et al., 1991; Ciaccio et al., 2017). FXS is the most common monogenic cause of intellectual disability and autism. Repeat expansions > 200 CGG repeats are referred to as full mutations. These expansions result in extensive methylation of the gene, large reductions in Fragile X protein (FXP or Fragile X Messenger Ribonucleoprotein (FMRP), and symptoms of FXS. Repeat expansions falling between a typical CGG repeat count and 200 repeats (i.e., 55 – 200 CGG repeats) on the FMR1 gene result in a premutation, which is associated with increased FMR1 mRNA accompanied by minor reduction in protein levels, but which is not associated with the full cognitive and behavioral presentation of FXS (Fu et al., 1991; Wheeler et al., 2014). While individuals with FXS typically presents with varying levels of sensory processing difficulties (i.e., sensory hypersensitivities), individuals with the FMR1 premutation are less affected and demonstrate a different pattern of behavioral symptoms than the full mutation (Schmitt et al., 2019). Abnormal sensory processing is a common phenotypical feature of the FXS full mutation manifesting typically as sensory hyperreactivity (Ethridge et al., 2019). Few studies have addressed sensory sensitivity in PMCs and also fail to utilize measures of neural responses such as electroencephalography (EEG) to sensory stimulation (Hunter et al., 2008; Allen et al., 2020; Schmitt et al., 2022). Most prior evaluations focused on child PMCs from a developmental perspective, limiting commentary on how moderate FMR1 expansions impact sensory processing capacity later in the lifespan. Previous studies in child PMCs have documented co- occurring sensory hyper- and hypo-responsivity that vary based on age (Wheeler et al., 2016; Raspa et al., 2018). Most studies of sensory processing abnormalities in adult PMCs focused on their relation to mood and anxiety (Allen et al., 2020; Schmitt et al., 2022). The neural basis of sensory processing alterations remain unclear, as is the mechanism by which alterations at the neural level are related to clinical presentation of neuropsychiatric symptoms in adult PMCs. 1. Background Individuals with the FMR1 premutation (premutation carrier – PMC) exhibit considerable variability in the type and severity of their clinical profiles (Budimirovic et al., 2020). PMCs exhibit complex health profiles including two known conditions associated with aging: Fragile X Tremor Ataxia Syndrome (FXTAS) and Fragile X Primary Ovarian Insufficiency (FXPOI) (Berry-Kravis et al., 2007). Beyond FXTAS and FXPOI, PMCs present with increased rates of psychopathology risk that change across the lifespan. Children with the premutation present with more frequent diagnoses of Attention Deficient Hyperactivity Disorder (ADHD), autism spectrum disorder (ASD), anxiety, and social difficulties, whereas adult PMCs primarily present with increased rates of anxiety and depression, particularly in females, who are twice as likely to have a premutation status than males due to the location of the FMR1 gene on the X chromosome (Hunter et al., 2014; Cordeiro et al., 2015; Hagerman et al., 2018). Neuropsychiatric features of the premutation based on patterns of psychiatric, health, and behavioral symptoms were recently classified as Fragile X Associated Neuropsychiatric Disorder (FXAND) signifying the prevalence of psychiatric symptoms among PMCs. Further, PMCs are at higher risk for exacerbation of underlying psychopathology by comorbidities associated with the premutation and external experiences (e.g., close relative with the full mutation) resulting in greater impact of the premutation on quality of life (Hall et al., 2016; Wheeler et al., 2017; Hagerman et al., 2018; Allen et al., 2020; Klusek et al., 2020). Female adult PMCs may experience impaired executive function and social processing difficulties in addition to increased We recently addressed clinical profile variability in the neuropsychiatric, executive function, eye tracking, and resting EEG features of PMCs using cluster-based methods. Clustering successfully categorized PMCs into three distinct subgroups based on affective, cognitive, and behavioral features. A three-cluster solution neatly identified one group with increased neuropsychiatric features (cluster 1) including increased depression and anxiety, but relatively typical resting EEG features. The second cluster (cluster 2) was characterized by increased executive dysfunction and higher resting gamma power suggesting a group more comparable to full mutation FXS. Finally, the third cluster (cluster 3) was comprised of members who were relatively unaffected by psychiatric or cognitive symptoms (Schmitt et al., 2022). However, this initial study did not examine or utilize sensory self-report or sensory EEG (such as sensory evoked potentials) measures or EEG measures directly related to mood and anxiety (e.g., frontal asymmetry) in deriving the cluster solution. OPEN ACCESS Individuals with 55 to <200 CGG repeats are said to have the FMR1 premutation, which is not associated with primary characteristics of the full mutation, but with an increased risk for anxiety, depression, and other affective conditions, as well as and impaired cognitive processing differences that vary in severity. Defining subgroups of premutation carriers based on distinct biological features may identify subgroups with varying levels of psychiatric, cognitive, and behavioral alterations. © 2023 Norris, Schmitt, De Stefano, Pedapati, Erickson, Sweeney and Ethridge. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms. Methods: The current pilot study utilized 3 cluster subgroupings defined by previous k means cluster analysis on neuropsychiatric, cognitive, and resting EEG variables in order to examine basic sensory auditory chirp task-based EEG parameters from 33 females with the FMR1 premutation (ages 17–78). Results: Based on the predefined, neuropsychiatric three-cluster solution, premutation carriers with increased neuropsychiatric features and higher CGG repeat counts (cluster 1) showed decreased stimulus onset response, similar to previous ERP findings across a number of psychiatric disorders but opposite to findings in individuals with full mutation FXS. Premutation carriers with increased executive dysfunction and resting gamma power (cluster 2) exhibited decreased gamma phase locking to a chirp stimulus, similar to individuals with full mutation FXS. Cluster 3 members, who were relatively unaffected by psychiatric or cognitive symptoms, showed the most normative task-based EEG metrics. Discussion: Our findings suggest a spectrum of sensory processing characteristics present in subgroups of premutation carriers that have been previously understudied due to lack of overall group differences. Our findings also further validate the pre-defined clinical subgroups by supporting links between Frontiers in Integrative Neuroscience Frontiers in Integrative Neuroscience 01 frontiersin.org Norris et al. 10.3389/fnint.2023.898215 10.3389/fnint.2023.898215 disturbances in well-defined neural pathways and behavioral alterations that may be informative for identifying the mechanisms supporting specific risk factors and divergent therapeutic needs in individuals with the FMR1 premutation. sensory processing, neural oscillations and entrainment, FMR1 premutation carrier, clustering analysis, EEG Frontiers in Integrative Neuroscience 2.3. EEG recording and data reduction EEG recordings were collected using 128 channel hydrocel nets (Electrical Geodesics, Eugene, Oregon). EEG was recorded continuously and digitized at 1000 Hz, filtered from 0.01 to 200 Hz, referenced to Cz, and amplified 10,000x. Sensors were placed with landmark sensors according to the International 10/10 system (Chatrian et al., 1985; Luu and Ferree, 2005). Raw data were visually inspected offline. Bad sensors were interpolated using spherical spline interpolation (no more than 5% per subject for a total of 6 electrodes, no more than two adjacent, 96.97% of participants had no sensors interpolated within the 23 channels used to calculate general EEG variables for final analyses, 100% did not have F3 or F4 interpolated) implemented in BESA 6.1 (MEGIS Software, Grafelfing, Germany). Data were digitally filtered from 0.5 to 120 Hz (12 and 24 db/octave roll-off, respectively; zero-phase; 60 Hz notch) and data segments with large amounts of artifact were removed prior to individual component removal to facilitate algorithm convergence while running independent component analysis (ICA; Infomax). Lastly, large muscle artifacts (e.g., eye movement, cardiac, and muscle movement artifacts) were removed blind to participant group using ICA implemented in EEGLAB through Matlab 2018b software (Delorme and Makeig, 2004; The Mathworks, Natick, MA, United States). Data were transformed to average reference and epoched into 3,250 ms trials (-500 to 2,750 ms). Chirp task data were averaged across trials. Any trial with post-ICA amplitude exceeding 120 µV was considered residual artifact and removed prior to averaging (i.e., trials containing large quantities of movement artifact post-ICA were rejected). The same 23 electrodes were selected a priori for general level analysis from prior work with the FXS full mutation based on a fronto-central spatial distribution of the scalp best poised to capture auditory cortex activity (Luck, 2014; Ethridge et al., 2019). Intertrial coherence (ITC) and single trial power were calculated with un-baseline-corrected epoched single- trial data according to wavelet methods used previously for Ethridge et al. (2019) and using the same power bands across the entire epoch and ITC time-frequency clusters: low gamma ITC (30-55 Hz) during the chirp, high gamma ITC (65-80 Hz) during the chirp, chirp stimulus onset, and offset theta/alpha ITC (corresponding to time windows encompassing approximately 50-400 ms after chirp stimulus onset and again post- chirp stimulus offset (2,050-2,400 ms in Figure 1), and a 4-13 Hz frequency range from previous work. 1. Background As changes in sensory function measured both by self/caregiver report and sensory EEG are highly prevalent in full mutation FXS (Ethridge et al., 2019), it is of interest to examine these features, their distribution, and relevance to more commonly reported neuropsychiatric features in the FXS premutation. Frontal asymmetry measures have previously been linked to variations in mood and anxiety (Allen et al., 2004; Coan and Allen, 2004; Thibodeau et al., 2006; Stewart et al., 2010; Smith et al., 2017; van der Vinne et al., 2017), relevant to individuals with the FXS premutation. Changes in frontal asymmetry have also been reported in full 02 Frontiers in Integrative Neuroscience frontiersin.org Norris et al. 10.3389/fnint.2023.898215 10.3389/fnint.2023.898215 10.3389/fnint.2023.898215 2.3. EEG recording and data reduction Single trial power evaluates the amplitude of the neural response whereas ITC evaluates consistency of phase of the neural response frequency at any given timepoint across trials (Delorme and Makeig, 2004). 2.2. Procedure mutation FXS, related to sensory processing and adaptive behavior (Norris et al., 2022). Use of predefined clustering may provide insight into the neural basis of sensory, mood, and anxiety processing in adult PMCs specific to the features that defined each cluster and provide defined neural pathways and behavioral alterations associated with varying clinical profiles. In this sense, any differences in sensory or asymmetry EEG measures between clusters serves as an external validation of cluster results, in that these measures were not used to define initial clusters but rather support additional sources of variation linked to cluster-defining features of PMCs. Participants underwent dense-array EEG while listening passively to a chirp stimulus. The chirp stimulus was an amplitude modulated white noise burst carrier stimulus increasing in frequency from 0- 100 Hz over the course of 2,000 ms. Chirp stimuli were presented 200 times with each trial separated by an intertrial period that alternated between 1,500 ms and 2,000 ms. Stimuli were delivered via headphones at 65 db SPL while the participants watched a silent movie, consistent with prior studies using individuals with FXS (Ethridge et al., 2016, 2017, 2019; Smith et al., 2021; Pedapati et al., 2022). The current pilot study aimed to extend the work detailed in Schmitt et al. (2022) by evaluating cluster membership in relation to task-based EEG parameters obtained during an auditory task, considering dynamic evaluations of oscillatory frequency bands in order to test the hypothesis that neuropsychiatric features are present in PMC populations supported by similar neural processes observed in full mutation FXS. Although the current study should be considered a pilot study and hypothesis generating due to the relatively small sample size and sparse literature on EEG in PMCs, we opted to also evaluate cluster differences across clinical measures as they related to variations in task-related frontal hemispheric asymmetry during the auditory task, as frontal asymmetry measures have previously been linked to variations in mood and anxiety hypothesized to map onto similar characteristics in PMCs (Allen et al., 2004; Coan and Allen, 2004; Thibodeau et al., 2006; Stewart et al., 2010; Smith et al., 2017; van der Vinne et al., 2017). Frontiers in Integrative Neuroscience 2.1. Participants Premutation carriers (N = 33) Cluster 1 (N = 8) Cluster 2 (N = 10) Cluster 3 (N = 11) General M SD M SD M SD Age 46.73 17.19 50.47 14.54 51.79 8.92 CGG repeat count 107.33 11.61 93.11 14.63 96.11 20.84 Clinical mood measures ASI 24.38 6.32 18.29 9.88 11.22 7.66 BDI 22.25 5.95 10.56 10.11 5.80 4.16 Demographic variables for PMCs by cluster. (A) Intertrial coherence for Clusters 1, 2, and 3 for the chirp task. (B) Difference plots for cluster 3 minus cluster 1, cluster 2 minus cluster 1, and cluster 3 minus cluster 2. Red boxes on difference maps indicate areas with significant group differences. Warmer colors in difference maps indicate higher phase-locking values for the first cluster and the cooler colors indicate higher values for the second cluster. 2.4. Frontal asymmetry EEG analysis (4-7 Hz), alpha (8-13 Hz), and low gamma (30-55 Hz) ranges for all recordings. All variables calculated using F3 and F4 are referenced as F3/F4 frontal EEG variables (e.g., F3/F4 frontal hemispheric power) to differentiate from power measures calculated using the initial 23 electrodes from previous work, referenced as general frontal power. Data were transformed to current source density (CSD)- Laplacian in BESA 6.1 for frontal asymmetry analyses and hemisphere specific power analyses. CSD computation reduces volume conduction effects (i.e., signal smearing) and improves both temporal and spatial resolution (Stewart et al., 2010; Burle et al., 2015; Smith et al., 2017). Data from one electrode in each hemisphere were used to calculate frontal asymmetry scores according to conventional frontal asymmetry analysis methods (Allen et al., 2004; Stewart et al., 2010). Electrode F3 (left hemisphere) and electrode F4 (right hemisphere) were selected for data extraction and asymmetry was operationalized as (R – L)/(R + L) to compute a normalized difference score (NDS) that normalizes for overall power. The correlation between NDS and the natural log difference scores [i.e., ln(R)- ln(L)] was checked to confirm linearity with NDSs and found to correlate highly (rho > 0.9, p < 0.001) with the natural log calculation, as expected (Allen et al., 2004). Single trial power was extracted from each electrode to compute asymmetry in the theta 2.1. Participants Participants were 33 adult females with the FMR1 premutation [Mean (M) age = 48.36, SD = 13.17; age range 19.61 – 78.36] (Table 1). Only female PMCs were recruited to control for biological sex and ensure feasible ascertainment. The PMC sample was a convenience sample recruited from primary relatives (i.e., parent, grandparent, or sibling) of individuals with FXS through the Cincinnati Fragile X Research and Treatment Center, to pilot test for differences in individuals with the FMR1 premutation on measures that show significant differences in individuals with the FMR1 full mutation. PMC status was confirmed via medical record review or by a previously completed PCR quantification of allele specific CGG repeat length. Eleven PMC were currently taking antidepressant (AD) medications, consistent with reported rates of AD use and recommendations for treating PMCs experiencing mood disorders (Cordeiro et al., 2015; Hagerman et al., 2018). Exclusion criteria included history of seizures and current use of anticonvulsant and benzodiazepine medications due to known EEG effects of both medications. Clinical self-report assessments included the Adolescent/Adult Sensory Profile (Brown et al., 2001), Anxiety Depression and Mood Scale (ADAMS, Esbensen et al., 2003), Becks’ Depression Inventory (BDI, Beck et al., 1961), and the Anxiety Sensitivity Index (ASI, Reiss et al., 1986). All participants provided written informed consent prior to participation, as approved by the Cincinnati Children’s Hospital Institutional Review Board. 03 frontiersin.org 10.3389/fnint.2023.898215 Norris et al. TABLE 1 Participant demographics. Premutation carriers (N = 33) Cluster 1 (N = 8) Cluster 2 (N = 10) Cluster 3 (N = 11) General M SD M SD M SD Age 46.73 17.19 50.47 14.54 51.79 8.92 CGG repeat count 107.33 11.61 93.11 14.63 96.11 20.84 Clinical mood measures ASI 24.38 6.32 18.29 9.88 11.22 7.66 BDI 22.25 5.95 10.56 10.11 5.80 4.16 Demographic variables for PMCs by cluster. FIGURE 1 (A) Intertrial coherence for Clusters 1, 2, and 3 for the chirp task. (B) Difference plots for cluster 3 minus cluster 1, cluster 2 minus cluster 1, and cluster 3 minus cluster 2. Red boxes on difference maps indicate areas with significant group differences. Warmer colors in difference maps indicate higher phase-locking values for the first cluster and the cooler colors indicate higher values for the second cluster. Frontiers in Integrative Neuroscience 3.3. Correlations across the PMC sample Correlation analyses reflected an exploratory evaluation of EEG variables and clinical measures. Significant correlations for PMCs between general frontal EEG, F3/F4 frontal EEG, and clinical variables are shown in Table 4. General physiological correlations are presented in Table 5 to provide a broad assessment of the PMC neural phenotype across relationships generated from full mutation EEG findings. General frontal gamma power was correlated with all F3/F4 EEG measures across the alpha, theta, and low gamma frequency bands demonstrating unilateral use of high and low frequency bands. Power measures at the hemisphere level also demonstrated a pattern suggesting right hemisphere gamma was more strongly correlated with general frontal gamma, but this pattern was not significant, z(32) = −0.79, p = 0.21. Correlations between BDI scores and neural responses to the onset of the chirp stimulus adds support to the conclusion that hypo-responsivity shares a significant relationship with increased symptoms of depression. Increased general anxiety on the ADAMs also was associated with decreased responses to the onset of the chirp stimulus, but not decreased mood scores. Only one correlation was retained as significant between F3/F4 frontal EEG variables and clinical variables (not shown in Table 4): right alpha power was inversely correlated with manic/hyperactive behavior scores on the ADAMs (rho = −0.77, p = 0.015). TABLE 2 Univariate results for EEG data by cluster MANCOVA. TABLE 2 Univariate results for EEG data by cluster MANCOVA. EEG variable F(2,24) P value Effect size (Partial eta squared) ITC stimulus onset 3.61 0.043 0.231 ITC stimulus offset 1.69 0.206 0.123 ITC low gamma 3.76 0.038 0.239 ITC high gamma 2.07 0.148 0.147 Theta power 1.33 0.283 0.100 Gamma power 0.256 0.776 0.021 Theta power asymmetry 1.56 0.231 0.115 Alpha power asymmetry 1.56 0.229 0.116 Gamma power asymmetry 3.01 0.068 0.200 See section “3.1. Cluster differences on EEG measures” of the text for Bonferroni-corrected individual cluster comparisons for significant univariate tests. 2.5. Statistical analysis All statistical analyses were conducted in SPSS 27. Multivariate general linear models were utilized to assess hypothesis driven differences across clusters on EEG variables and clinical measures assessing sensory processing. Cluster membership was obtained from Schmitt et al. (2022), based on a k-means cluster analysis of the same participants using neuropsychiatric, executive functioning, social attention, eye-tracking measures, and resting EEG features. Effect sizes are reported as partial eta squared. All analyses included age as a covariate, retained where significant. All cluster comparisons were hypothesis driven. Clinical correlations were examined with all 04 frontiersin.org Norris et al. 10.3389/fnint.2023.898215 3.2. Cluster differences on clinical measures EEG variables. Exploratory correlations were also evaluated between power in frequency bands of interest (i.e., theta, alpha, and gamma) and hypothesis-driven associations with gamma ITC from FXS findings (Ethridge et al., 2019). All correlations were bivariate and conducted using Spearman’s rho. Clinical correlations and power band correlations were considered to be exploratory and hypothesis generating due to the current limited scope of neuropsychiatric research with PMC populations, and thus not corrected for multiple comparisons. EEG variables. Exploratory correlations were also evaluated between power in frequency bands of interest (i.e., theta, alpha, and gamma) and hypothesis-driven associations with gamma ITC from FXS findings (Ethridge et al., 2019). All correlations were bivariate and conducted using Spearman’s rho. Clinical correlations and power band correlations were considered to be exploratory and hypothesis generating due to the current limited scope of neuropsychiatric research with PMC populations, and thus not corrected for multiple comparisons. Results for anxiety and depression scale scores by cluster are reported in Schmitt et al. (2022). A MANCOVA was conducted examining cluster differences across Adolescent/Adult Sensory Profile sub-scores to evaluate self- reported sensory experiences across clusters with differing clinical profiles. A significant difference was found on low registration (F(2,17) = 4.30, p = 0.031, ES = 0.34) and sensation sensitivity scores (F(2,17) = 5.06, p = 0.019, ES = 0.37) with differences on touch processing trending toward significance (F(2,17) = 3.43, p = 0.056, ES = 0.29). After Bonferroni correction, low registration differences between clusters were trending with Cluster 3 (M = 25.38, SD = 6.46) exhibiting lower scores compared to Cluster 1 (M = 35.00, SD = 2.94) and Cluster 2 (M = 32.56, SD = 6.73). Sensory sensitivity scores were significantly different between Cluster 2 (M = 37.00, SD = 5.52) and Cluster 3 (M = 27.25, SD = 7.01), with Cluster 2 exhibiting increased scores compared to Cluster 3. Cluster 1 showed intermediate sensory sensitivity scores (M = 34.50, SD = 6.14) and did not differ from either Cluster 2 or 3. Touch processing scores trended toward increases in Cluster 2 (M = 39.22, SD = 7.82) compared to Cluster 3 (M = 31.75, SD = 3.28), which Cluster 1 again showing an intermediate score (M = 33.50, SD = 4.51). (See Table 3 for full univariate results including non-significant comparisons, and Figure 3). 3.1.1. ITC and power differences between clusters 3.1.1. ITC and power differences between clusters A MANCOVA was conducted to evaluate both general EEG variables (i.e., ITC to stimulus onset, ITC to stimulus offset, low gamma ITC to chirp, high gamma ITC to chirp, theta power, alpha power, gamma power) and F3/F4 frontal asymmetry variables across frequency bands (i.e., alpha, theta, and gamma) by PMC cluster membership. Age was a significant covariate for ITC in the low gamma range, only. ITC to the onset of the chirp stimulus was significantly different between clusters, F(2, 24) = 3.61, p = 0.043, ES = 0.23. Post hoc Bonferroni corrected comparisons identified trending differences on ITC onset between Cluster 3 (M = 0.15, SE = 0.02) and Cluster 1 (M = 0.05, SE = 0.02). ITC in the low gamma range was also significantly different between clusters with cluster 2 (M = 0.07, SE = 0.05) exhibiting reduced ITC compared to cluster 3 (M = 0.15, SE = 0.07), F(2, 24) = 3.76, p = 0.038, ES = 0.24. Lastly, there was a trending difference between clusters on frontal low gamma asymmetry with cluster 2 (M = 0.06, SE = 0.09) exhibiting trending increases in frontal low gamma asymmetry compared to cluster 1 (M = –0.03, SE = 0.09) F(2, 24) = 3.01, p = 0.068, ES = 0.20. None of the comparisons between clusters on power variables were significant; cluster differences were primarily in ITC. ITC reflects the ability to reliably reproduce neural oscillations across multiple trials, and in the case of the chirp stimulus, to reliably reproduce the oscillatory properties of the stimulus in time. (See Table 2 for univariate results including non-significant comparisons, Figure 1 for ITC plots and Figure 2 for box plots with individual data points). See section “3.1. Cluster differences on EEG measures” of the text for Bonferroni-corrected individual cluster comparisons for significant univariate tests. Frontiers in Integrative Neuroscience frontiersin.org 4. Discussion Cluster differences on clinical measures” of the text for Bonferroni-corrected individual cluster comparisons for significant univariate tests. such as withdrawal, lethargy, and disinterest (i.e., low registration). Cluster 1 exhibiting higher low registration scores further supports this conclusion. Sensory hyposensitivity may mirror symptoms of depression or possibly render PMCs vulnerable to heightened self- reflection and internalizing behaviors (Kotsiris et al., 2020). Previous findings in individuals with depression have indicated a complex relationship between depressive symptoms and sensory processing, with individuals endorsing higher levels of sensory hypersensitivity and hyposensitivity (low registration) than controls (Engel-Yeger et al., 2016). Correlations between the neural response to onset and offset of the stimulus and BDI scores is consistent with the interpretation that sensory hypo-responsivity may contribute to risk or onset of affective disturbances (i.e., Cluster 1). Interestingly, individuals with full mutation FXS show increased neural response and hyperresponsivity to sensory stimuli, the opposite of these PMC findings, highlighting the differences in underlying pathophysiology between the two conditions (Ethridge et al., 2017, 2019). 4. Discussion The current study aimed to extend the understanding of FMR1 PMC subgroupings established in a recent exploratory, data- driven approach that identified discrete clinical subgroups of PMC Frontiers in Integrative Neuroscience 05 frontiersin.org Norris et al. 10.3389/fnint.2023.898215 FIGURE 2 Significance markers reflect non-corrected MANCOVA results. N.S. = not significant, ∗p < 0.05. (A) Boxplot depicting group comparison across clusters for ITC to the onset of the chirp stimulus showed overall significance (p = 0.04) where cluster 1 showed a trend toward significantly lower ITC than cluster 3 (p = 0.05). (B) Boxplot depicting group comparison across clusters for low gamma ITC with significant overall (p = 0.04) where cluster 2 showed significantly lower ITC than cluster 3 (p = 0.03). FIGURE 2 Significance markers reflect non-corrected MANCOVA results. N.S. = not significant, ∗p < 0.05. (A) Boxplot depicting group comparison across clusters for ITC to the onset of the chirp stimulus showed overall significance (p = 0.04) where cluster 1 showed a trend toward significantly lower ITC than cluster 3 (p = 0.05). (B) Boxplot depicting group comparison across clusters for low gamma ITC with significant overall (p = 0.04) where cluster 2 showed significantly lower ITC than cluster 3 (p = 0.03). individuals (Schmitt et al., 2022) that varied in protein levels (FXP), CGG repeat length, environmental factors, and aging-associated outcomes (e.g., increased mRNA toxicity). We found that PMC with increased neuropsychiatric features and higher CGG repeat counts (Cluster (1) showed decreased stimulus onset response, similar to previous ERP findings across a number of psychiatric disorders (Drake et al., 1991; Ford et al., 2001; Ethridge et al., 2015) but opposite to findings in individuals with full mutation FXS (Ethridge et al., 2016, 2019). Premutation carriers with increased executive dysfunction and resting gamma power (Cluster 2) exhibited decreased gamma phase locking to a chirp stimulus, similar to individuals with full mutation FXS. Cluster 3 members, who were relatively unaffected by psychiatric or cognitive symptoms, showed the most normative task-based EEG metrics. Sensory variable F(2,17) P value Effect size (Partial eta squared) Auditory processing 2.02 0.163 0.192 Low registration 4.30 0.031 0.336 Sensation seeking 0.352 0.708 0.040 Sensation sensitivity 5.06 0.019 0.373 Sensation avoiding 1.562 0.238 0.155 Touch processing 3.43 0.056 0.287 See section “3.2. Cluster differences on clinical measures” of the text for Bonferroni-corrected individual cluster comparisons for significant univariate tests. See section “3.2. Frontiers in Integrative Neuroscience 4.1. Neurophysiological differences by cluster Differences among PMC subgroups suggest relevant sensory processing outcomes. Female PMCs in Cluster 1 (the “psychiatric” subgroup) showed the greatest reduction in neural response to stimulus onset relative to other clusters. The simplest interpretation of reduced stimulus onset response is sensory hyposensitivity, which may be linked to general neural hypo-responsivity and/or perceptual disturbances (Donkers et al., 2015). Clinically, Cluster 1 is comprised of individuals with affective disturbances (i.e., elevated depression and anxiety symptoms or the presence of symptoms related to affective disorders like depression or anxiety), suggesting that sensory hypo-responsivity may contribute to and/or co-occur with neuropsychiatric features for these individuals. This is a clinically relevant finding in that sensory systems present a novel target for therapy in PMC that may also have broader-ranging effects on mood and anxiety. Significant correlations between neural response to stimulus onset and clinical variables indicate PMCs may have increased sensory detection thresholds, which may lead to symptoms Cluster 2 (the “executive dysfunction and atypical resting electrophysiology” subgroup) also showed reduced neural response to stimulus onset, and additionally showed reduced ITC to the chirp stimulus in the low gamma range. Cluster 2 also exhibited increased sensory sensitivity compared to other subgroups suggesting 06 frontiersin.org Norris et al. 10.3389/fnint.2023.898215 FIGURE 3 Significance markers reflect non-corrected MANCOVA results. N.S. = not significant, ∗p < 0.05. (A) Box plots depicting group comparison across clusters for ASP sensory sensitivity with overall significance (p = 0.02) where cluster 2 showed significantly higher sensitivity scores than cluster 3 (p = 0.02). (B) Box plots depicting group comparison across clusters for ASP low registration with overall significance (p = 0.03) where cluster 1 showed a trend toward significantly higher low registration scores than cluster 3 (p = 0.07). Significance markers reflect non-corrected MANCOVA results. N.S. = not significant, ∗p < 0.05. (A) Box plots depicting group comparison across clusters for ASP sensory sensitivity with overall significance (p = 0.02) where cluster 2 showed significantly higher sensitivity scores than cluster 3 (p = 0.02). (B) Box plots depicting group comparison across clusters for ASP low registration with overall significance (p = 0.03) where cluster 1 showed a trend toward significantly higher low registration scores than cluster 3 (p = 0.07). full mutation FXS (Norris et al., 2022). 4.1. Neurophysiological differences by cluster Cluster 2 may exhibit reduced ability to mobilize compensatory activity in the theta range (Wang et al., 2017; Schmitt et al., 2022), which in this case may exacerbate sensory sensitivity symptoms. Indeed, the combination of reduced response to the onset of the chirp but comparably typical low gamma ITC in Cluster 1 suggests recovery in subsequent sustained high frequency sensory processing capacity, which is notably absent in Cluster 2, and which may differentiate neural pathways contributing to neural compensation and resilience in PMC. Individuals with FXS also show reductions in low gamma ITC to the chirp, which has been consistently correlated with increased autistic features (Ethridge et al., 2017, 2019), consistent with its potential contribution to alterations in sensory processing, and social and executive function deficits. By subdividing the heterogenous PMC group into more homogenous clusters, we hoped to recover a more direct relationship between frontal asymmetry abnormalities and depression and anxiety symptoms, particularly in Cluster 1 individuals who show increased BDI and ASI scores. We did not however find any significant differences among clusters for theta and alpha frontal asymmetry, and only a trending difference between clusters for gamma asymmetry. We also did not find any correlations between frontal asymmetry measures and BDI or ASI scores across clusters, suggesting that these relationships identified in other patient populations with affective illness may not hold or be less robust in PMCs. The lack of relationship between frontal asymmetry and measures of mood dysregulation in PMCs may even reflect differential contributions of pathophysiology and environment to depression risk in PMC, who are typically identified for research studies due to their relationship to individuals in their household with FXS and who may experience additional stressors related to caring for a relative with a complex neurodevelopmental disorder (e.g., maternal stress; Hunter et al., 2019). Coupled with recent findings linking FMR1 CGG repeat count to abnormal cortisol responses to stress in female PMC who were also mothers to a child with FXS (Hong et al., 2021), the absence of frontal Consistent with our previous study (Schmitt et al., 2022), Cluster 3 consisted of individuals who were largely unaffected with the exception of notable resting state differences. Resting EEG differences in this subgroup may represent compensatory responses that reduce risk for psychiatric, executive function, and sensory processing deficits, although further research will be necessary to confirm a causative role. 4.1. Neurophysiological differences by cluster Frontal alpha asymmetry has shown high internal consistency and moderate test-retest reliability in populations with depression, particularly greater right hemisphere frontal activity (Allen et al., 2004; Coan and Allen, 2004; Thibodeau et al., 2006; Stewart et al., 2010; van der Vinne et al., 2017). The relationship between frontal asymmetry and anxiety is similarly characterized by greater right hemisphere frontal activity (Thibodeau et al., 2006; Mathersul et al., 2008). However, individual differences in frontal alpha asymmetry may be related to underlying pathophysiology contributing to depression symptoms (Smith et al., 2017; van der Vinne et al., 2017). Rather than reflecting stable physiological alteration, measures of asymmetry may index more dynamic utilization of oscillatory frequency bands between hemispheres uniquely impacted by the FMR1 premutation, which appear to be related to affective disturbances (Schmitt et al., 2022). heightened sensory detection. Based on previous clustering results (Schmitt et al., 2022), Cluster 2 was comprised of individuals with symptoms of executive dysfunction and some resting EEG abnormalities. In particular, Cluster 2 showed reduced theta band resting power compared to typically developing controls, and theta power within Cluster 2 was associated with social processing in the opposite direction to the less affected Cluster 3, who showed increased theta power. Cluster 2 may exhibit reduced ability to mobilize compensatory activity in the theta range (Wang et al., 2017; Schmitt et al., 2022), which in this case may exacerbate sensory sensitivity symptoms. Indeed, the combination of reduced response to the onset of the chirp but comparably typical low gamma ITC in Cluster 1 suggests recovery in subsequent sustained high frequency sensory processing capacity, which is notably absent in Cluster 2, and which may differentiate neural pathways contributing to neural compensation and resilience in PMC. Individuals with FXS also show reductions in low gamma ITC to the chirp, which has been consistently correlated with increased autistic features (Ethridge et al., 2017, 2019), consistent with its potential contribution to alterations in sensory processing, and social and executive function deficits. heightened sensory detection. Based on previous clustering results (Schmitt et al., 2022), Cluster 2 was comprised of individuals with symptoms of executive dysfunction and some resting EEG abnormalities. In particular, Cluster 2 showed reduced theta band resting power compared to typically developing controls, and theta power within Cluster 2 was associated with social processing in the opposite direction to the less affected Cluster 3, who showed increased theta power. Frontiers in Integrative Neuroscience 4.2. Links between frontal asymmetry, depression, and anxiety Previous evidence in the psychiatric literature links changes in frontal asymmetry to anxiety and depression (Smith et al., 2017), and frontal asymmetry differences have been described in 07 frontiersin.org Norris et al. 10.3389/fnint.2023.898215 TABLE 4 Correlations between general frontal EEG variables, F3/F4 frontal EEG variables, and clinical variables for PMCs. BLE 4 Correlations between general frontal EEG variables, F3/F4 frontal EEG variables, and clinical variables for PMCs. General frontal EEG variables F3/F4 frontal EEG variables (N = 32) Gamma power Theta power ITC stimulus onset ITC stimulus offset ITC low gamma ITC high gamma Left alpha power 0.41* 0.62** −0.22 −0.15 0.03 −0.24 Right alpha power 0.62** 0.63** −0.13 −0.15 −0.05 −0.38* Left theta power 0.41* 0.59** −0.25 −0.09 0.04 −0.21 Right theta power 0.57** 0.50** −0.09 −0.08 −0.04 −0.31 Left low gamma power 0.67** 0.41* 0.03 0.18 −0.05 −0.22 Right low gamma power 0.75** 0.21 0.06 −0.01 −0.08 −0.31 Frontal alpha power asymmetry 0.05 −0.10 0.09 0.03 −0.12 −0.15 Frontal theta power asymmetry 0.004 −0.09 0.17 0.08 0.01 −0.05 Frontal low gamma power asymmetry 0.06 −0.12 0.23 0.03 −0.01 −0.005 Clinical variables BDI (N = 30) −0.08 0.16 −0.46* −0.41* −0.19 −0.09 ASI (N = 27) −0.05 0.15 −0.26 −0.21 −0.21 −0.19 ADAMs (N = 9) Manic/Hyperactive behavior −0.10 −0.92** −0.31 −0.35 −0.44 0.08 Depressed mood 0.19 −0.68* −0.39 −0.18 −0.35 −0.30 Social avoidance −0.07 −0.60 −0.24 −0.26 −0.24 0.18 General anxiety 0.08 −0.90** −0.44 −0.31 −0.42 −0.11 Obsessive/Compulsive behavior 0.24 −0.67* −0.71* −0.44 −0.84** −0.30 ASP (N = 27) Auditory processing −0.03 −0.27 0.14 0.03 0.04 0.19 Taste/Smell processing 0.01 0.03 0.11 0.39 0.29 −0.02 Low registration −0.33 −0.07 −0.37 (p = 0.058) −0.25 −0.02 −0.03 Movement processing 0.20 −0.16 0.02 −0.25 −0.46* −0.39 Visual processing −0.05 0.11 −0.25 0.21 −0.04 −0.02 Touch processing −0.03 −0.18 0.23 0.14 −0.15 0.11 Activity level 0.35 −0.11 0.08 0.35 −0.05 −0.07 Sensation seeking −0.31 −0.19 −0.12 0.03 0.13 0.11 Sensation sensitivity −0.24 −0.19 −0.02 0.19 −0.05 −0.11 Sensation avoiding 0.09 −0.08 −0.06 0.22 −0.19 −0.33 All l ti S ’ h d fl t ll PMC l t N t i k N S * 0 05 ** 0 01 TABLE 5 Correlations between General EEG Variables for PMCs. All correlations are Spearman’s rho and reflect all PMC across clusters. No asterisk = N.S. *p < 0.05, **p < 0.01. 4.2. Links between frontal asymmetry, depression, and anxiety Conclusions of reduced theta reflecting an underlying mechanism for depression and anxiety specific to PMCs is complicated by non-significant correlations between EEG measures and both BDI and ASI scores suggesting that reduced theta may reflect more lifetime risk than current depression symptoms. Current use of mood stabilizing medication may also explain EEG outcomes with BDI and ASI scores, as PMCs that reported current use of antidepressant medications (N = 11) likely exhibited reduced symptoms of mood dysregulation at the time of evaluation (Iosifescu, 2011). Our data does suggest however that the FMR1 premutation, coupled with potential differences in life stressors, may create unique contributions to depression and anxiety outcomes; further evaluation of underlying mechanisms is necessary to provide more specific therapeutic interventions (Hagerman et al., 2018; Maltman et al., 2021; Schmitt et al., 2022). y In contrast to our frontal asymmetry data, we did find significant correlations between decreased theta/alpha ITC to stimulus onset and increased scores on the BDI across the entire PMC group, suggesting that for PMC there is a relationship between sensory processing hypo-responsivity and mood. Reduced ERP amplitude and reduced ITC to sensory stimuli have been found in other psychiatric and neurodevelopmental groups, namely individuals with bipolar disorder (Isomura et al., 2016), autism (De Stefano et al., 2019; Hornung et al., 2019; Seymour et al., 2020; Roberts et al., 2021), and psychosis (Krishnan et al., 2009; Sugiyama et al., 2021), consistent with the psychiatric implications of these specific ERP features in PMCs. Reductions in theta power also were associated with increased symptoms of anxiety and depression in individuals who completed the ADAMS, including obsessive compulsive symptoms, suggesting a potential broader contribution for theta power to limbic regulation. Although these findings must be verified with a larger sample, the strong correlations do suggest a clinically meaningful association between reduced theta power, a universal feature of the PMC group rather than unique to one cluster, and overall risk for mood symptoms. Indeed, individuals in Cluster 3, who showed the smallest reductions in task-related theta power, and enhanced theta power at rest (Schmitt et al., 2022), also showed the fewest psychiatric and behavioral symptoms. While theta power typically decreases with healthy cognitive aging, age was not a significant correlate in any analyses regarding theta power, suggesting decreases in theta may reflect a typical neural presentation of the FMR1 premutation (Cummins and Finnigan, 2007; Cellier et al., 2021). 4.2. Links between frontal asymmetry, depression, and anxiety Theta power findings may be related to known anatomical shifts to limbic circuitry mediated by FMRP/elevated FMR1 mRNA thought to heighten risk for psychopathology (Cordeiro et al., 2015). In conjunction with clinical correlations, these findings raise questions about the mechanistic underpinnings of psychiatric symptoms. We interpret the correlation results between clinical measures of mood dysregulation and EEG measures as reflective of underlying neural processes related to depression and anxiety but acknowledge the inability to attribute causality. Correlations between theta and mood dysregulation are potentially reflective of (1) the effect of depression on EEG measures, or (2) antecedent/causal of depression. Theta power may therefore be a clinically relevant measure for evaluating mood and anxiety in PMC, as well as a target for assessing effect of therapeutics in advance of clinically meaningful behavioral changes. The PMC sample was limited due to (1) the nature of the FMR1 premutation, and (2). the convenience nature of the sample. Primarily, PMCs were asked to participate if their child, sibling, or grandchild was participating in on-going FXS-specific research or were at the clinic for regular clinical care. Limited participant numbers per cluster impacted the capacity to attribute correlations strictly to individual clusters and correlations may reflect population parameters confounded by heterogenous premutation presentation. More research is required to parse the extent that EEG measures of decreased theta reflect a unique mechanism of depressed mood in PMC. This study was initially conducted as a pilot to determine whether task-based EEG features related to clinical variation could be identified in PMCs. The preliminary findings suggest that future studies are warranted, particularly in delineating whether these EEG features that differed between clusters simply reflect a spectrum of variation that, while potentially informative regarding mechanism, still entirely falls within normative values, or whether, for example, the reductions in stimulus onset and chirp processing responses in Clusters 1 and 2 are significantly decreased relative to non-PMC controls. Future studies with larger samples, enabling medication use and psychiatric comorbidities to be better disentangled, are also necessary to confirm these findings. Lastly, due to the focus on mood and anxiety, the sample was limited to female PMCs and lacks applicability to males with the premutation. Future work should aim to evaluate males only or include equal numbers to assess clinical profiles. 4.5. Limitations and future research Twelve participants reported current AD use (36.4%) suggesting a clinically relevant level of mood disturbance within the sample, though many clinical reports did not report a diagnostic history of depression. Use of AD medication was consistent across all clusters indicating successful treatment potentially impacted cluster membership (Schmitt et al., 2022). Standard measures of depression and anxiety, including the BDI and ASI, are self- report measures that potentially prompt participants to respond according to their current mood state (Beck et al., 1961). The ADAMS is another self-report measure of broad spectrum psychiatric conditions, including depressed mood and anxiety, that also potentially prompted current mood states rather than lifetime Frontiers in Integrative Neuroscience 4.2. Links between frontal asymmetry, depression, and anxiety General EEG variables EEG variables Gamma power Theta power ITC Stimulus onset ITC Stimulus offset ITC low gamma ITC high gamma Gamma Power − 0.48** −0.18 −0.07 −0.17 −0.49** Theta Power − −0.12 0.001 0.19 −0.10 ITC Stimulus Onset − 0.52** 0.49** 0.47** ITC Stimulus Offset − 0.27 0.24 ITC Low Gamma − 0.64** ITC High Gamma − All correlations are Spearman’s rho and reflect all PMCs across clusters. No asterisk = N.S. *p < 0.05, **p < 0.01. 08 Frontiers in Integrative Neuroscience frontiersin.org Norris et al. 10.3389/fnint.2023.898215 10.3389/fnint.2023.898215 asymmetry findings may indicate differential pathways to depression and anxiety risk in PMCs. symptom experiences. Further, the ADAMs has not been used in PMC samples, and was only completed by a subset of the sample (n = 9), thus additional caution was taken with data interpretation. PMCs with a medical history of current AD use may also report fewer symptoms on the BDI due to response items on the BDI prompting reports of current mood disturbance (as reflective of their AD use) compared to their life history reports (Marques et al., 2013). Conclusions of reduced theta reflecting an underlying mechanism for depression and anxiety specific to PMCs is complicated by non-significant correlations between EEG measures and both BDI and ASI scores suggesting that reduced theta may reflect more lifetime risk than current depression symptoms. Current use of mood stabilizing medication may also explain EEG outcomes with BDI and ASI scores, as PMCs that reported current use of antidepressant medications (N = 11) likely exhibited reduced symptoms of mood dysregulation at the time of evaluation (Iosifescu, 2011). Our data does suggest however that the FMR1 premutation, coupled with potential differences in life stressors, may create unique contributions to depression and anxiety outcomes; further evaluation of underlying mechanisms is necessary to provide more specific therapeutic interventions (Hagerman et al., 2018; Maltman et al., 2021; Schmitt et al., 2022). symptom experiences. Further, the ADAMs has not been used in PMC samples, and was only completed by a subset of the sample (n = 9), thus additional caution was taken with data interpretation. PMCs with a medical history of current AD use may also report fewer symptoms on the BDI due to response items on the BDI prompting reports of current mood disturbance (as reflective of their AD use) compared to their life history reports (Marques et al., 2013). frontiersin.org References Allen, E. G., Charen, K., Hipp, H. S., Shubeck, L., Amin, A., He, W., et al. (2020). Clustering of comorbid conditions among women who carry an FMR1 premutation. Genet. Med. 22, 758–766. doi: 10.1038/s41436-019-0733-5 Chatrian, G. E., Lettich, E., and Nelson, P. L. (1985). Ten percent electrode system for topographic studies of spontaneous and evoked EEG activities. Am. J. EEG Technol. 25, 83–92. doi: 10.1080/00029238.1985.11080163 Ciaccio, C., Fontana, L., Milani, D., Tabano, S., Miozzo, M., and Esposito, S. (2017). Fragile X syndrome: A review of clinical and molecular diagnoses. Ital. J. Pediatr. 43:39. doi: 10.1186/s13052-017-0355-y Allen, J. J., Urry, H. L., Hitt, S. K., and Coan, J. A. (2004). The stability of resting frontal electroencephalographic asymmetry in depression. Psychophysiology 41, 269–280. doi: 10.1111/j.1469-8986.2003.00149.x Coan, J. A., and Allen, J. J. (2004). Frontal EEG asymmetry as a moderator and mediator of emotion. Biol. Psychol. 67, 7–49. doi: 10.1016/j.biopsycho.2004.03.002 Beck, A. T., Ward, C. H., Mendelson, M., Mock, J., and Erbaugh, J. (1961). An inventory for measuring depression. Arch. Gen. Psychiatry 4, 561–571. doi: 10.1001/ archpsyc.1961.01710120031004 Cordeiro, L., Abucayan, F., Hagerman, R., Tassone, F., and Hessl, D. (2015). Anxiety disorders in fragile X premutation carriers: Preliminary characterization of probands and non-probands. Intractable Rare Dis. Res. 4, 123–130. doi: 10.5582/irdr.2015.01029 Berry-Kravis, E., Goetz, C. G., Leehey, M. A., Hagerman, R. J., Zhang, L., Li, L., et al. (2007). Neuropathic features in fragile X premutation carriers. Am. J. Med. Genet. A 143A, 19–26. doi: 10.1002/ajmg.a.31559 Cummins, T. D., and Finnigan, S. (2007). Theta power is reduced in healthy cognitive aging. Int. J. Psychophysiol. 66, 10–17. doi: 10.1016/j.ijpsycho.2007.0 5.008 Brown, C., Tollefson, N., Dunn, W., Cromwell, R., and Filion, D. (2001). The adult sensory profile: Measuring patterns of sensory processing. Am. J. Occup. Ther. 55, 75–82. doi: 10.5014/ajot.55.1.75 Delorme, A., and Makeig, S. (2004). EEGLAB: An open source toolbox for analysis of single-trial EEG dynamics including independent component analysis. J. Neurosci. Methods 134, 9–21. doi: 10.1016/j.jneumeth.2003.10.009 Budimirovic, D. B., Schlageter, A., Filipovic-Sadic, S., Protic, D. D., Bram, E., Mahone, E. M., et al. (2020). A genotype-phenotype study of high-resolution FMR1 nucleic acid and protein analyses in fragile X patients with neurobehavioral assessments. Brain Sci. 10:694. doi: 10.3390/brainsci10100694 De Stefano, L. A., Schmitt, L. M., White, S. P., Mosconi, M. W., Sweeney, J. A., and Ethridge, L. E. (2019). Developmental effects on auditory neural oscillatory synchronization abnormalities in autism spectrum disorder. Front. Integr. Neurosci. 13:34. Data availability statement We would like to acknowledge the families of individuals with FXS and the typically developing controls who participated in this study. We also want to thank the clinical research coordinators for their assistance with data collection and data entry. The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation. Funding symptom presentations reflect underlying spectrum characteristics forming unique subgroupings. Importantly, these neuropsychiatric groupings also reflect differences in basic neural sensory processing characteristics, suggesting a tie between basic synaptic function, sensory systems, and risk for specific neuropsychiatric phenotypes within individuals with the FMR1 premutation. This research study was supported by the U54 Fragile X Center (U54HD082008, JS and U54HD104461, CE) and the University of Oklahoma Libraries’ Open Access Fund. Publisher’s note JN led all EEG data preprocessing, management, data analyses, and wrote the full manuscript. LS led all clinical data collection and analyses. LD consulted on data preprocessing and analyses. EP led all EEG data collection. CE and JS supervised all aspects of study design, funding, and participant recruitment. LE supervised all aspects of EEG experimental design, data analysis, and manuscript preparation. All authors contributed significantly to manuscript preparation. All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher. All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher. Conflict of interest The studies involving human participants were reviewed and approved by Cincinnati Children’s Hospital Medical Center. Written informed consent to participate in this study was provided by the participants’ legal guardian/next of kin. The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. The reviewer EA declared a past co-authorship with the authors CE and JS to the handling editor at the time of review. 5. Conclusion Overall, PMCs exhibited relatively typical electrophysiological measures at the group level. However, congruent with Schmitt et al. (2022), we find differences notable by cluster membership supporting initial cluster characterizations and conclusions that heterogenous 09 frontiersin.org Norris et al. 10.3389/fnint.2023.898215 References doi: 10.3389/fnint.2019.00034 Burle, B., Spieser, L., Roger, C., Casini, L., Hasbroucq, T., and Vidal, F. (2015). Spatial and temporal resolutions of EEG: Is it really black and white? A scalp current density view. Int. J. Psychophysiol. 97, 210–220. doi: 10.1016/j.ijpsycho.2015.05.004 Donkers, F. C., Schipul, S. E., Baranek, G. T., Cleary, K. M., Willoughby, M. T., Evans, A. M., et al. (2015). Attenuated auditory event-related potentials and associations with atypical sensory response patterns in children with autism. J. Autism Dev. Disord. 45, 506–523. doi: 10.1007/s10803-013-1948-y Cellier, D., Riddle, J., Petersen, I., and Hwang, K. (2021). The development of theta and alpha neural oscillations from ages 3 to 24 years. Dev. Cogn. Neurosci. 50:100969. doi: 10.1016/j.dcn.2021.100969 Frontiers in Integrative Neuroscience 10 frontiersin.org Norris et al. Norris et al. 10.3389/fnint.2023.898215 Drake, M. E. Jr., Pakalnis, A., Phillips, B., Padamadan, H., and Hietter, S. A. (1991). Auditory evoked potentials in anxiety disorder. Clin. Electroencephalogr. 22, 97–101. doi: 10.1177/155005949102200209 Luu, P., and Ferree, T. (2005). Determination of the hydrocel geodesic sensory nets’ average electrode positiions and their 10-10 international equivalents. Technical document. Eugene, OR: Electrical Geodesics, Inc. Maltman, N., Guilfoyle, J., Nayar, K., Martin, G. E., Winston, M., Lau, J. C. Y., et al. (2021). The phenotypic profile associated with the FMR1 premutation in women: An investigation of clinical-behavioral, social-cognitive, and executive abilities. Front. Psychiatry 12:718485. doi: 10.3389/fpsyt.2021.718485 Engel-Yeger, B., Muzio, C., Rinosi, G., Solano, P., Geoffroy, P. A., Pompili, M., et al. (2016). Extreme sensory processing patterns and their relation with clinical conditions among individuals with major affective disorders. Psychiatry Res. 236, 112–118. doi: 10.1016/j.psychres.2015.12.022 Esbensen, A. J., Rojahn, J., Aman, M. G., and Ruedrich, S. (2003). Reliability and validity of an assessment instrument for anxiety, depression, and mood among individuals with mental retardation. J. Autism Dev. Disord. 33, 617–629. doi: 10.1023/b: jadd.0000005999.27178.55 Marques, L. A., Galduroz, J. C., Fernandes, M. R., Oliveira, C. C., Beijo, L. A., and Noto, A. R. (2013). Assessment of the effectiveness of pharmacotherapy follow-up in patients treated for depression. J. Manag. Care Pharm. 19, 218–227. doi: 10.18553/jmcp.2013.19. 3.218 Mathersul, D., Williams, L. M., Hopkinson, P. J., and Kemp, A. H. (2008). Investigating models of affect: Relationships among EEG alpha asymmetry, depression, and anxiety. Emotion 8, 560–572. doi: 10.1037/a0012811 Ethridge, L. E., Hamm, J. P., Pearlson, G. D., Tamminga, C. A., Sweeney, J. A., Keshavan, M. S., et al. (2015). References Event-related potential and time-frequency endophenotypes for schizophrenia and psychotic bipolar disorder. Biol. Psychiatry 77, 127–136. doi: 10.1016/j.biopsych.2014.03.032 Norris, J. E., De Stefano, L. A., Schmitt, L. M., Pedapati, E. V., Erickson, C. A., Sweeney, J. A., et al. (2022). Hemisphreic utilization of alpha oscillatory dynamics as a unique biomarker of neural compensation in females with Fragile X Syndrome. ACS Chem. Neurosci. 13, 3389–3402. doi: 10.1021/acschemneuro.2c 00404 Ethridge, L. E., De Stefano, L. A., Schmitt, L. M., Woodruff, N. E., Brown, K. L., Tran, M., et al. (2019). Auditory EEG biomarkers in fragile X syndrome: Clinical relevance. Front. Integr. Neurosci. 13:60. doi: 10.3389/fnint.2019.00060 Ethridge, L. E., White, S. P., Mosconi, M. W., Wang, J., Byerly, M. J., and Sweeney, J. A. (2016). Reduced habituation of auditory evoked potentials indicate cortical hyper- excitability in fragile X syndrome. Transl. Psychiatry 6:e787. doi: 10.1038/tp.2016.48 Pedapati, E. V., Schmitt, L. M., Ethridge, L. E., Miyakoshi, M., Sweeney, J. A., Liu, R., et al. (2022). Neocortical localization and thalamocortical modulation of neuronal hyperexcitability contribute to Fragile X Syndrome. Commun. Biol. 5:442. doi: 10.1038/ s42003-022-03395-9 Ethridge, L. E., White, S. P., Mosconi, M. W., Wang, J., Pedapati, E. V., Erickson, C. A., et al. (2017). Neural synchronization deficits linked to cortical hyper-excitability and auditory hypersensitivity in fragile X syndrome. Mol. Autism 8:22. doi: 10.1186/s13229- 017-0140-1 Raspa, M., Wylie, A., Wheeler, A. C., Kolacz, J., Edwards, A., Heilman, K., et al. (2018). Sensory difficulties in children with an FMR1 premutation. Front. Genet. 9:351. doi: 10.3389/fgene.2018.00351 Ford, J. M., Mathalon, D. H., Kalba, S., Marsh, L., and Pfefferbaum, A. (2001). N1 and P300 abnormalities in patients with schizophrenia, epilepsy, and epilepsy with schizophrenialike features. Biol. Psychiatry 49, 848–860. doi: 10.1016/s0006-3223(00) 01051-9 Reiss, S., Peterson, R. A., Gursky, D. M., and McNally, R. J. (1986). Anxiety sensitivity, anxiety frequency and the prediction of fearfulness. Behav. Res. Ther. 24, 1–8. doi: 10.1016/0005-7967(86)901 Fu, Y. H., Kuhl, D. P., Pizzuti, A., Pieretti, M., Sutcliffe, J. S., Richards, S., et al. (1991). Variation of the CGG repeat at the fragile X site results in genetic instability: Resolution of the sherman paradox. Cell 67, 1047–1058. doi: 10.1016/0092-8674(91)9 0283-5 Roberts, T. P. L., Bloy, L., Liu, S., Ku, M., Blaskey, L., and Jackel, C. (2021). Magnetoencephalography studies of the envelope following response during amplitude- modulated sweeps: Diminished phase synchrony in autism spectrum disorder. Front. Hum. Neurosci. 15:787229. doi: 10.3389/fnhum.2021.787229 Hagerman, R. References J., Protic, D., Rajaratnam, A., Salcedo-Arellano, M. J., Aydin, E. Y., and Schneider, A. (2018). Fragile X-associated neuropsychiatric disorders (FXAND). Front. Psychiatry 9:564. doi: 10.3389/fpsyt.2018.00564 Schmitt, L. M., Shaffer, R. C., Hessl, D., and Erickson, C. (2019). Executive function in fragile X syndrome: A systematic review. Brain Sci. 9:15. doi: 10.3390/brainsci9010015 Schmitt, L. M., Dominick, K. C., Liu, R., Pedapati, E. V., Ethridge, L. E., Smith, E., et al. (2022). Evidence for three subgroups of female FMR1 premutation carriers defined by distinct neuropsychiatric features: A pilot study. Front. Int. Neuro. 15:48. doi: 10.3389/fnint.2021.797546 Hall, D. A., Robertson-Dick, E. E., O’Keefe, J. A., Hadd, A. G., Zhou, L., and Berry- Kravis, E. (2016). X-inactivation in the clinical phenotype of fragile X premutation carrier sisters. Neurol. Genet. 2:e45. doi: 10.1212/NXG.0000000000000045 Seymour, R. A., Rippon, G., Gooding-Williams, G., Sowman, P. F., and Kessler, K. (2020). Reduced auditory steady state responses in autism spectrum disorder. Mol. Autism 11:56. doi: 10.1186/s13229-020-00357-y Hong, J., Kapoor, A., DaWalt, L. S., Maltman, N., Kim, B., Berry-Kravis, E. M., et al. (2021). Stress and genetics influence hair cortisol in FMR1 premutation carrier mothers of children with fragile X syndrome. Psychoneuroendocrinology 129:105266. doi: 10.1016/j.psyneuen.2021.105266 Smith, E. G., Pedapati, E. V., Liu, R., Schmitt, L. M., Dominick, K. C., Shaffer, R. C., et al. (2021). Sex differences in resting EEG power in fragile X syndrome. J. Psychiatr. Res. 138, 89–95. doi: 10.1016/j.jpsychires.2021.03.057 Hornung, T., Chan, W. H., Muller, R. A., Townsend, J., and Keehn, B. (2019). Dopaminergic hypo-activity and reduced theta-band power in autism spectrum disorder: A resting-state EEG study. Int. J. Psychophysiol. 146, 101–106. doi: 10.1016/j.ijpsycho. 2019.08.012 Smith, E. E., Reznik, S. J., Stewart, J. L., and Allen, J. J. (2017). Assessing and conceptualizing frontal EEG asymmetry: An updated primer on recording, processing, analyzing, and interpreting frontal alpha asymmetry. Int. J. Psychophysiol. 111, 98–114. doi: 10.1016/j.ijpsycho.2016.11.005 Hunter, J. E., Jenkins, C. L., Grim, V., Leung, S., Charen, K. H., Hamilton, D. R., et al. (2019). Feasibility of an app-based mindfulness intervention among women with an FMR1 premutation experiencing maternal stress. Res. Dev. Disabil. 89, 76–82. doi: 10.1016/j.ridd.2019.03.008 Stewart, J. L., Bismark, A. W., Towers, D. N., Coan, J. A., and Allen, J. J. (2010). Resting frontal EEG asymmetry as an endophenotype for depression risk: Sex-specific patterns of frontal brain asymmetry. J. Abnorm. Psychol. 119, 502–512. References doi: 10.1037/a00 19196 Hunter, J., Rivero-Arias, O., Angelov, A., Kim, E., Fotheringham, I., and Leal, J. (2014). Epidemiology of fragile X syndrome: A systematic review and meta-analysis. Am. J. Med. Genet. A 164A, 1648–1658. doi: 10.1002/ajmg.a.36511 Sugiyama, S., Ohi, K., Kuramitsu, A., Takai, K., Muto, Y., Taniguchi, T., et al. (2021). The auditory steady-state response: Electrophysiological index for sensory processing dysfunction in psychiatric disorders. Front. Psychiatry. 12:644541. doi: 10.3389/fpsyt. 2021.644541 Hunter, J. E., Allen, E. G., Abramowitz, A., Rusin, M., Leslie, M., Novak, G., et al. (2008). No evidence for a difference in neuropsychological profile among carriers and noncarriers of the FMR1 premutation in adults under the age of 50. Am. J. Hum. Genet. 83, 692–702. doi: 10.1016/j.ajhg.2008.10.021 Thibodeau, R., Jorgensen, R. S., and Kim, S. (2006). Depression, anxiety, and resting frontal EEG asymmetry: A meta-analytic review. J. Abnorm. Psychol. 115, 715–729. doi: 10.1037/0021-843X.115.4.715 Iosifescu, D. V. (2011). Electroencephalography-derived biomarkers of antidepressant response. Harv. Rev. Psychiatry 19, 144–154. doi: 10.3109/10673229.2011.586549 van der Vinne, N., Vollebregt, M. A., van Putten, M., and Arns, M. (2017). Frontal alpha asymmetry as a diagnostic marker in depression: Fact or fiction? A meta-analysis. Neuroimage Clin. 16, 79–87. doi: 10.1016/j.nicl.2017.07.006 Isomura, S., Onitsuka, T., Tsuchimoto, R., Nakamura, I., Hirano, S., Oda, Y., et al. (2016). Differentiation between major depressive disorder and bipolar disorder by auditory steady-state responses. J. Affect Disord. 190, 800–806. doi: 10.1016/j.jad.2015. 11.034 Verkerk, A. J., Pieretti, M., Sutcliffe, J. S., Fu, Y. H., Kuhl, D. P., Pizzuti, A., et al. (1991). Identification of a gene (FMR-1) containing a CGG repeat coincident with a breakpoint cluster region exhibiting length variation in fragile X syndrome. Cell 65, 905–914. doi: 10.1016/0092-8674(91)90397-h Klusek, J., Hong, J., Sterling, A., Berry-Kravis, E., and Mailick, M. R. (2020). Inhibition deficits are modulated by age and CGG repeat length in carriers of the FMR1 premutation allele who are mothers of children with fragile X syndrome. Brain Cogn. 139:105511. doi: 10.1016/j.bandc.2019.105511 Wang, J., Ethridge, L. E., Mosconi, M. W., White, S. P., Binder, D. K., Pedapati, E. V., et al. (2017). A resting EEG study of neocortical hyperexcitability and altered functional connectivity in fragile X syndrome. J. Neurodev. Disord. 9:11. doi: 10.1186/s11689-017- 9191-z Kotsiris, K., Westrick, J., and Little, L. (2020). Sensory processing patterns and internalizing behaviors in the pediatric and young adult general population: A scoping review. Open J. Occup. Ther. 8, 1–13. doi: 10.15453/2168-6408.1624 Krishnan, G. P., Hetrick, W. Frontiers in Integrative Neuroscience Yu, S., Pritchard, M., Kremer, E., Lynch, M., Nancarrow, J., Baker, E., et al. (1991). Fragile X genotype characterized by an unstable region of DNA. Science 252, 1179–1181. doi: 10.1126/science.252.5009.1179 Wheeler, A. C., Sideris, J., Hagerman, R., Berry-Kravis, E., Tassone, F., and Bailey, D. B. Jr. (2016). Developmental profiles of infants with an FMR1 premutation. J. Neurodev. Disord. 8:40. doi: 10.1186/s11689-016-9171-8 10.3389/fnint.2023.898215 References P., Brenner, C. A., Shekhar, A., Steffen, A. N., and ODonnell, B. F. (2009). Steady state and induced auditory gamma deficits in schizophrenia. Neuroimage. 47, 1711–1719. doi: 10.1016/j.neuroimage.2009. 03.085 Wheeler, A., Raspa, M., Hagerman, R., Mailick, M., and Riley, C. (2017). Implications of the FMR1 premutation for children, adolescents, adults, and their families. Pediatrics 139, S172–S182. doi: 10.1542/peds.2016-1159D Wheeler, A. C., Bailey, D. B. Jr., Berry-Kravis, E., Greenberg, J., Losh, M., Mailick, M., et al. (2014). Associated features in females with an FMR1 premutation. J. Neurodev. Disord. 6:30. doi: 10.1186/1866-1955-6-30 Luck, S. J. (2014). An Introduction to the event-related potential technique. Cambridge, MA: The MIT Press. Frontiers in Integrative Neuroscience 11 frontiersin.org Norris et al. 10.3389/fnint.2023.898215 12 frontiersin.org Frontiers in Integrative Neuroscience
https://openalex.org/W2144489030
https://aacr.figshare.com/articles/journal_contribution/Supplementary_Figure_and_Table_Legends_from_ETV6-NTRK3_Mediated_Breast_Epithelial_Cell_Transformation_Is_Blocked_by_Targeting_the_IGF1R_Signaling_Pathway/22389704/1/files/39835223.pdf
English
null
ETV6-NTRK3–Mediated Breast Epithelial Cell Transformation Is Blocked by Targeting the IGF1R Signaling Pathway
Cancer research
2,011
cc-by
452
Blocking IGF1R signaling in ETV6-NTRK3 breast cancer Blocking IGF1R signaling in ETV6-NTRK3 breast cancer SUPPLEMENTARY FIGURE LEGENDS Supplementary Figure S1. Expression of EN in EpH4 cells has no effect on morphology or signaling in monolayer cultures. A. Western blot analysis of serum starved control and EpH4-EN cells grown in monolayer. B. Morphology of control (MSCV) and two independent EN-expressing EpH4 cells lines (EN1 and EN2). Scale: 50μm. Supplementary Figure S2. Movement of EpH4-MSCV and EpH4-EN cells in serum free conditions. Each colored line represents the track or movement of one cell followed by time lapse microscopy over a 24 hr period. Supplementary Figure S3. Insulin stimulation results in IGF1R activation. A. IGF1R positive murine embryo fibroblast (R+) cells engineered to express EN were serum starved overnight and then stimulated with 100ng/ml IGF-1 or 100ng/ml of insulin for 30 minutes. B. Various concentrations of IGF-1 and insulin were used to stimulate serum starved MCF10A cells for 30 minutes. Anti-phosphotyrosine immunoprecipitations followed by IGF1R or INSR immunoblotting was performed. Supplementary Figure S4. siRNA knock down of INSR in MCF10A-EN cells decreases spheroid size and cyclin D1 levels. A. Cells were grown in Matrigel cultures for 10 days. Pictures=Day 7. Size bar: 100μM. B. The effects of 4 independent siRNAs were assessed for their effects on the levels of INSR and cyclin D1 by Western blotting. 1 1 Blocking IGF1R signaling in ETV6-NTRK3 breast cancer Blocking IGF1R signaling in ETV6-NTRK3 breast cancer Supplementary Figure S5. Comparing effects of BMS-536924 and BMS-754807 on 3T3-EN soft agar colony formation. Control and EN expressing NIH 3T3 cells were plated in soft agar in the absence or presence of increasing concentrations of BMS- 536924 and BMS-754807. Average and standard deviation of three independent experiments is depicted in the graph. Supplementary Figure S6. EN requires activation of the PI3K-Akt pathway to transform EpH4 cells in 3D Matrigel cultures. A. Photomicrographs of spheroids formed in 3D Matrigel cultures. Cells were cultured in IGF-1 (100ng/ml)-containing media with either vehicle control (DMSO), PI3K inhibitor LY294002 (25μM), or MEK inhibitor U0126 (25μM). Spheroid morphology (Top panels; Scale:200μm), immunofluorescence microscopy for E-cadherin and Ki67 (Middle panels; Scale: 100μm), and BrdU staining (Bottom panels; Scale: 400μm). B. Western blots of EpH4-EN stimulated with Insulin or IGF-1 +/- the PI3K inhibitor LY294002 (25μM). Supplementary Table S1. Quantification of the effects of LY294002 and U0126 on EN mediated transformation of EpH4 cells grown in 3D culture. Each cell line was grown in 3D Matrigel cultures for 3 days and analyzed by immunofluorescence for BrDU staining. Spheroids were considered positive if they possessed >4 stained nuclei. Diameters were measured by confocal microscopy. Table represents the measurements of 100 random spheroids grown under each condition for each parameter. 2 2
https://openalex.org/W4304146326
https://eurjmedres.biomedcentral.com/counter/pdf/10.1186/s40001-022-00828-3
English
null
Biomarkers of interstitial lung disease associated with primary Sjögren's syndrome
European journal of medical research
2,022
cc-by
8,291
© The Author(s) 2022. Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://​creat​iveco​mmons.​org/​licen​ses/​by/4.​0/. The Creative Commons Public Domain Dedication waiver (http://​creat​iveco​ mmons.​org/​publi​cdoma​in/​zero/1.​0/) applies to the data made available in this article, unless otherwise stated in a credit line to the data. Clinical trial registration:  None. Keywords:  Interstitial lung disease (ILD), Serum biomarkers, Predictive factor, Primary Sjögren’s syndrome (pSS) Abstract Objectives:  The aim of this study was to investigate serum biomarkers linked to primary Sjögren’s syndrome (pSS)- associated interstitial lung disease (ILD). Methods:  69 pSS patients were consecutively enrolled and evaluated via quantitative ILD scoring based on high- resolution computed tomography (HRCT). Biomarkers of interest were assessed by multiplex enzyme-linked immuno- sorbent assays (ELISAs). Results:  Among consecutively enrolled patients with pSS, the presence of pSS–ILD was 50% based on the presence of radiographically defined interstitial lung abnormalities (ILA) meeting specified criteria for mild/moderate (ILA 2) or severe (ILA 3) disease. Age, immunoglobulin M (IgM), C-reactive protein (CRP), and serum levels of eotaxin/CCL11, Krebs von den Lungen-6 (KL-6), TNFα, and TGFα were significantly higher in the combined pSS–ILD group (ILA 2 + ILA 3) than in the pSS–no-ILD and pSS–indeterminate ILD groups (ILA 0 and ILA 1, respectively) in unadjusted analyses (p < 0.05 for all variables). A binary logistic regression model revealed that disease duration and KL-6 levels were associ- ated with the presence of pSS–ILD (p < 0.05). Complementary least absolute shrinkage and selection operator (LASSO) modeling showed that age, KL-6, and TNF-α effectively differentiated pSS–ILD (ILA 2 + ILA3) from pSS without ILD (ILA 0 + ILA 1), with an area under the curve (AUC) of 0.883 (p value < 0.0001). Conclusions:  Patient age, disease duration, and serum levels of both KL-6 and TNFα were the most discriminating factors associated with the presence of ILD in our pSS patients. Higher levels of CRP, IgM, eotaxin, TGFα, and TNFα should also prompt the search for occult as well as clinically evident lung involvement based on statistically significant univariate associations with pSS–ILD. Clinical trial registration:  None. Weng et al. European Journal of Medical Research (2022) 27:199 https://doi.org/10.1186/s40001-022-00828-3 Weng et al. European Journal of Medical Research (2022) 27:199 https://doi.org/10.1186/s40001-022-00828-3 Weng et al. European Journal of Medical Research (2022) 27:199 https://doi.org/10.1186/s40001-022-00828-3 European Journal of Medical Research *Correspondence: DASCHER@pitt.edu; juchen@xmu.edu.cn 1 Department of Rheumatology, The First Affiliated Hospital of Xiamen University, School of Medicine, Xiamen University, Xiamen 361003, China 9 Division of Rheumatology and Clinical Immunology, University of Pittsburgh School of Medicine, Pittsburgh, PA 15261, USA Full list of author information is available at the end of the article Biomarkers of interstitial lung disease associated with primary Sjögren’s syndrome Lin Weng1†, Yaqiong Chen1†, Tao Liang2†, Yihua Lin3, Dehao Liu4, Ciyong Yu1, Yudi Hu5, Wei Lui6, Yongliang Liu6, Xiangfang Chen7, Qiyuan Li8, Shengxiang Ge6, Dana P. Ascherman9* and Juan Chen1* Abstract  Objectives:  The aim of this study was to investigate serum biomarkers linked to primary Sjögren’s syndrome (pSS)- associated interstitial lung disease (ILD). Methods:  69 pSS patients were consecutively enrolled and evaluated via quantitative ILD scoring based on high- resolution computed tomography (HRCT). Biomarkers of interest were assessed by multiplex enzyme-linked immun sorbent assays (ELISAs). Results:  Among consecutively enrolled patients with pSS, the presence of pSS–ILD was 50% based on the presence of radiographically defined interstitial lung abnormalities (ILA) meeting specified criteria for mild/moderate (ILA 2) or severe (ILA 3) disease. Age, immunoglobulin M (IgM), C-reactive protein (CRP), and serum levels of eotaxin/CCL11, Krebs von den Lungen-6 (KL-6), TNFα, and TGFα were significantly higher in the combined pSS–ILD group (ILA 2 + ILA 3) than in the pSS–no-ILD and pSS–indeterminate ILD groups (ILA 0 and ILA 1, respectively) in unadjusted analyses (p < 0.05 for all variables). A binary logistic regression model revealed that disease duration and KL-6 levels were assoc ated with the presence of pSS–ILD (p < 0.05). Complementary least absolute shrinkage and selection operator (LASSO modeling showed that age, KL-6, and TNF-α effectively differentiated pSS–ILD (ILA 2 + ILA3) from pSS without ILD (IL 0 + ILA 1), with an area under the curve (AUC) of 0.883 (p value < 0.0001). Conclusions:  Patient age, disease duration, and serum levels of both KL-6 and TNFα were the most discriminating factors associated with the presence of ILD in our pSS patients. Higher levels of CRP, IgM, eotaxin, TGFα, and TNFα should also prompt the search for occult as well as clinically evident lung involvement based on statistically significa univariate associations with pSS–ILD. Clinical trial registration:  None. Keywords:  Interstitial lung disease (ILD), Serum biomarkers, Predictive factor, Primary Sjögren’s syndrome (pSS) Background Interstitial lung diseases (ILD) consist of a heterogeneous group of parenchymal lung disorders that are character- ized by variable degrees of inflammation and fibrosis [1, 2]. Although different subsets of ILD may share com- mon radiologic, pathologic, and clinical manifestations, they are associated with quite different etiologies and co-morbidities [3]. In primary Sjögren’s syndrome (pSS), the annual incidence of respiratory manifestations is estimated at 10% 1 year after diagnosis and increases to †Lin Weng, Yaqiong Chen, and Tao Liang have contributed equally to this manuscript *Correspondence: DASCHER@pitt.edu; juchen@xmu.edu.cn © The Author(s) 2022. Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://​creat​iveco​mmons.​org/​licen​ses/​by/4.​0/. The Creative Commons Public Domain Dedication waiver (http://​creat​iveco​ mmons.​org/​publi​cdoma​in/​zero/1.​0/) applies to the data made available in this article, unless otherwise stated in a credit line to the data. Weng et al. European Journal of Medical Research (2022) 27:199 Page 2 of 10 Page 2 of 10 20% after 5 years [4]. In a recent report from China, the prevalence of ILD in pSS among those undergoing HRCT examination is as high as 39.1% [5]. Importantly, patients with pSS and lung involvement have an increased risk of death in comparison with those without lung involve- ment [6], with an estimated 5-year survival rate ranging from 84% [7] to 87.3% [8]. arthritis, systemic lupus erythematosus, mixed connec- tive tissue disease, polymyositis, and dermatomyositis were excluded. Other illnesses producing clinical mani- festations of xerophthalmia and/or xerostomia—such as past history of head and neck irradiation, pre-existing lymphoma, hepatitis B or C infection, acquired immu- nodeficiency, sarcoidosis, or graft vs. host disease—were also excluded. For eligible participants, patient-specific variables, including age, sex, and disease duration, were recorded. HRCT images were obtained from all patients at enrollment (see below for details). Serum samples were obtained at the time of clinical data collection for all of the consecutively enrolled patients and stored at – 80 ℃. While 10–51% of patients develop ILD years before the onset of pSS [9], pSS–ILD begins at the same time as other systemic manifestations in approximately 10% of cases. In the remainder of cases, ILD develops late in the course of disease [10]. Laboratory testing A t i Laboratory testing Autoimmune serology, serum immunoglobulin lev- els (including IgG, IgA and IgM), C3, C4, and C-reac- tive protein (CRP) were assessed in all patients. Antinuclear antibody (ANA) testing was performed using indirect immunofluorescence and qualitatively graded based on the serum dilution yielding positive staining (ANA+ = ANA 1:80  −  1:160; ANA++ = ANA 1:320  −  1:640; ANA+++ = ANA ≥ 1:1280). Anti-SSA/ Ro60, anti-Ro52, and anti-SSB/La antibodies were assessed via immunoblotting. Previous studies have shown that prognostic factors associated with the occurrence of pSS–ILD include older age, male sex, disease duration, smoking, an increase in anti-nuclear antibodies or rheumatoid factor, the pres- ence of anti-SSA/Ro52 antibodies [11], low levels of circulating C3, and increased C-reactive protein levels [12–14]. However, there are few reports on other serum protein biomarkers in pSS–ILD that potentially shed light on underlying disease mechanisms. In this study, we, therefore, focused on clinical risk factors and alterna- tive serum protein biomarkers capable of discriminating pSS–ILD from pSS–no-ILD. High resolution computed tomog- raphy (HRCT) of the chest represents the main imaging tool for evaluating pSS-related pulmonary abnormali- ties, because HRCT is very sensitive in detecting mild pSS-related pulmonary abnormalities, even in asymp- tomatic patients [10]. However, screening pSS patients with HRCT is not currently standard of care, despite the relatively high prevalence of ILD in this disease and the potential for significant morbidity. Therefore, identifying clinical risk factors and other serum protein biomark- ers associated with the development of pSS–ILD will be critically important in facilitating non-invasive detection of lung involvement at earlier, more treatable stages of disease. Ethics approval for the study was obtained from the Ethics Committee of the first affiliated Hospital of Xia- men University, School of Medicine, Xiamen Univer- sity, China (Approval number: KY2017-026). Written informed consent was obtained from each participant before enrollment. HRCT and ILD scoring HRCT (Aquilion 16; Toshiba Medical Systems) of the chest without contrast was performed for all patients during end inspiration using 1–2-mm collimation at 1–2- mm intervals in the supine position. HRCT classification was based on readings from at least two independent pulmonologists/radiologists blinded to the disease char- acteristics of the patients. Although the intra- and inter- observer correlations exceeded 90% for the HRCT image readers in previous studies, discrepancies in the cur- rent study were resolved by consensus agreement with one additional reader. Radiographic features indicative of ILD included ground-glass opacities, septal thicken- ing, reticulation, traction bronchiectasis, and/or honey- combing. Additional characterization utilized a scale of interstitial lung abnormalities (ILAs) ranging from 0 to 3 [17], where ILA 0 = no ILD, ILA 1 = indeterminate ILD (focal or unilateral ground-glass attenuation, focal or unilateral reticulation, or patchy ground-glass abnor- mality involving < 5% of the lung), ILA 2 = mild/moder- ate ILD (changes affecting > 5% of any lobar region with Materials and methods Patients Sixty-nine patients with pSS who met the 2016 Ameri- can College of Rheumatology (ACR)–European League Against Rheumatism (EULAR) classification criteria for primary Sjögren’s syndrome [15, 16] were consecutively enrolled between September 2013 and June 2017 through the Department of Rheumatology at the first affiliated Hospital of Xiamen University, School of Medicine, Xia- men University and Fuqing City Hospital affiliated with Fujian Medical University, China. Recruited patients in this observational study were from different provinces, mainly in the south of China. Patients with Sjogren’s features occurring in the context of other well-defined connective tissue diseases (CTD) such as rheumatoid Weng et al. European Journal of Medical Research (2022) 27:199 Weng et al. European Journal of Medical Research (2022) 27:199 Weng et al. European Journal of Medical Research (2022) 27:199 Weng et al. European Journal of Medical Research (2022) 27:199 Page 3 of 10 Finally, least absolute shrinkage and selection operator (LASSO) modeling was used as a penalized regression tool to develop a clinical prediction algorithm for detect- ing the presence of pSS–ILD. We determined the lowest shrinkage parameter (λ) with which to select final clini- cal risk factors and protein biomarkers (and their coeffi- cients) for predicting the probability of being diagnosed as having pSS–ILD. ROC curves were then generated to assess the ability of algorithm-based predictions to dis- criminate between the presence vs. absence of pSS–ILD (as measured by AUC). non-dependent ground-glass or reticular abnormalities, diffuse centrilobular nodularity, non-emphysematous cysts, honeycombing, or traction bronchiectasis), ILA 3 = advanced ILD (bilateral fibrosis in multiple lobes associated with honeycombing and traction bronchiec- tasis in a subpleural distribution) [18, 19]. In this study, ILA scores ≥ 2 identified patients with pSS–ILD, while ILA scores of 0 and 1 encompassed pSS patients without definite ILD. Detection of pSS–ILD‑related serum biomarkers by multiplex ELISA All statistical analyses were performed using IBM SPSS Statistics, version 20.0. Two-sided p values ≤ 0.05 were considered statistically significant. To adjust for multiple comparisons, p values were corrected by the false discov- ery rate (FDR). Multiplex enzyme-linked immunosorbent assays (Mul- tiplex ELISAs) were performed using Luminex xMAP technology according to the manufacturer’s instructions (EMD Millipore Corporation, Billerica, MA, USA) [20]. A combined 42-plex assay was used to determine serum levels of a range of cytokines, chemokines and MMPs (listed in Additional file  1) potentially related to the mechanism of pSS–ILD. Detection of KL‑6 by CLEIAh The concentration of Krebs von den Lungen-6 (KL-6) was measured using a commercial chemiluminescent enzyme immunoassay (CLEIA) according to the experimental procedure specified by the manufacturer (Fujirebio Inc., Tokyo, Japan). Patient‑specific variables and pSS–ILD Demographic characteristics of our pSS cohort are sum- marized in Table  1. Most patients were female (84%, n = 58), and the mean age at the time of diagnosis of pSS was 55.04 ± 12.90 years (Table 1). Among the 69 patients with pSS, 19 (28%) had advanced pSS–ILD (ILA score 3), 15 (22%) had mild/moderate pSS–ILD (ILA score 2), 25 (36%) had indeterminate pSS–ILD (ILA score 1), and 10 (14%) had pSS–no ILD (ILA score 0) based on HRCT criteria (Table 1). After combining individuals with ILA score 2 + 3, the prevalence of pSS–ILD in our cohort was 50%. Statistical analysis Age was significantly different between mild/moder- ate ILD (ILA score 2) and no-ILD (ILA score 0) (p < 0.05), and between advanced ILD (ILA score 3) and pSS no-ILD (ILA score 0) (p < 0.001) (Table 1). Overall, the mean age at diagnosis in the combined pSS–ILD group (ILA score 2 + 3) was significantly higher than in individuals who did not meet criteria for pSS–ILD (ILA score 0 + 1) (61 vs. 52, p = 0.003) (Table 2). Area under the curve (AUC) derived from ROC analysis was 0.706 (95% confidence interval: 0.582–0.830, p = 0.003) for age of pSS diagnosis as a discriminating factor for pSS–ILD (Table 3). In con- trast to age at diagnosis, there were no statistically signif- icant differences in gender or disease duration between those meeting criteria for pSS–ILD and those who did not (p > 0.05) (Table 2). All continuous variables were evaluated for normality to ensure uniformity in concentration and dispersion. Median and interquartile range (IQR) were presented for variables that did not follow a normal distribution. Bivariate analyses were conducted using Chi-square or Fisher’s exact test for categorical variables and outcomes (pSS–ILD and pSS no/indeterminate-ILD). Alternatively, Mann–Whitney U tests were used for non-parametric continuous variables (e.g., serum biomarker levels, risk scores) and outcomes. To determine correlations among continuous variables and identify potential confound- ing factors, Spearman correlation coefficients were calculated. Additional analyses were conducted to determine which demographic variables, clinical risk factors, and/ or serum proteins were associated with pSS–ILD. These variables were included in the final logistic regression model as candidate covariates to assess associations with pSS–ILD. Risk scores were derived for each patient based on the final logistic regression model. We further evalu- ated the performance of our model using receiver operat- ing characteristic (ROC) analysis to calculate area under the curve (AUC) values. Laboratory findings (%) 7 (70) 16 (64) 9 (60) 12 (60) Table 1  Clinical, demographic, and laboratory characteristics of pSS patients with different stages of ILD Table 1  Clinical, demographic, and laboratory characteristics of pSS patients with different stages of ILD pSS primary Sjogren’s syndrome, ILA interstitial lung abnormalities, IQR interquartile range, ANA Antinuclear antibody, IgA IgM, IgG Immunoglobulin AM and G, C3 and C4 complement 3 and complement 4, CRP C-reactive protein. Mann–Whitney U test and Fisher’s exact test were used to determine p values * p < 0.05, **p < 0.01, ***p < 0.001 when comparing different subcategories of pSS-ILD with pSS-no ILD remodeling proteins (MMPs) previously examined in IPF and other cohorts of CTD–ILD. We then assessed the relationship between the serum levels of these biomark- ers and pSS–ILD disease severity based on HRCT. This analysis revealed that eotaxin/CCL11, KL-6, TGFα and TNFα showed significant associations with ILD severity in selected subgroups of pSS–ILD (Tables 2, 3), whereas no statistically significant differences were found for the other biomarkers. of 0.653 (95% confidence interval: 0.521–0.785, p = 0.029) (Table 3).if CRP was also significantly different between severe ILD and no-ILD in pSS patients (p < 0.001) (Table 1). Further- more, higher levels of CRP distinguished the combined pSS–ILD group (ILA score 2 + 3) from those without definite ILD (p = 0.002) (Table  2), yielding an AUC of 0.713 (95% confidence interval: 0.590–0.836, p = 0.002 (Table 3). Conversely, there were no statistically signifi- cant differences in circulating levels of IgG, IgA, C3, or C4 between the two groups (Table 2). Autoantibodiesh Significant differences were found between the pSS mod- erate/advanced-ILD group (ILA score 2 + 3) and the pSS no-/indeterminate-ILD group (ILA score 0 + 1) based on age, IgM, CRP, eotaxin, KL-6, TGFα and TNFα levels (p < 0.05, Table 2 and Fig. 1). Other variables did not show statistically significant differences in univariate analyses. Corrected by FDR, age, CRP, eotaxin, and KL-6 remained statistically significant (p = 0.017, 0.017, 0.021, < 0.0001, respectively) (Table 2). In ROC analyses, serum levels of eotaxin, KL-6 and TNFα distinguished combined sub- groups of pSS–ILD (ILA score 2 + 3) from subgroups without definite ILD, with respective AUCs of 0.695 (95% confidence interval: 0.571–0.818, p = 0.006), 0.883 (95% confidence interval: 0.798–0.969, p < 0.0001), and The percentage of pSS patients with anti-SSA/Ro60 anti- bodies was significantly higher in the pSS-advanced ILD patients (ILA score 3) than in the pSS no-ILD subgroup (ILA score 0) (p < 0.01) (Table 1). However, the percent- ages of anti-Ro52, anti-SSB/La, and ANA antibody posi- tivity were not significantly different between different pSS subgroups (p > 0.05) (Table 2). Laboratory findings As shown in Table  1, IgM was significantly different between advanced ILD (ILA score 3) and no-ILD (ILA score 0) in pSS patients (p < 0.05). The combined pSS– ILD group (ILA 2 + ILA 3) had higher circulating levels of IgM than the group consisting of pSS–indeterminate and pSS–no ILD (p = 0.029) (Table 2), yielding an AUC Weng et al. European Journal of Medical Research (2022) 27:199 Page 4 of 10 Table 1  Clinical, demographic, and laboratory characteristics of pSS patients with different stages of ILD pSS primary Sjogren’s syndrome, ILA interstitial lung abnormalities, IQR interquartile range, ANA Antinuclear antibody, IgA IgM, IgG Immunoglobulin AM and G, C3 and C4 complement 3 and complement 4, CRP C-reactive protein. Mann–Whitney U test and Fisher’s exact test were used to determine p values * p < 0.05, **p < 0.01, ***p < 0.001 when comparing different subcategories of pSS-ILD with pSS-no ILD pSS-no ILD pSS-indeterminate ILD pSS-mild/moderate ILD pSS-advanced ILD (ILA score 0) (ILA score 1) (ILA score 2) (ILA score 3) Demographic parameters  Number, no. (%) 10 (14) 25 (36) 15 (22) 19 (28)  Female, no. (%) 9 (90) 21 (84) 13 (87) 15 (79)  Male, no. (%) 1 (10) 4 (16) 2 (13) 4 (21)  Age at diagnosis of pSS, median (IQR), years 49.00 (33.25–53.25) 53.00 (46.50–61.50) 60.00 (48.00–64.00)* 62.00 (55.00– 70.00)***  Disease duration, median (IQR), years 1.00 (0.25–5.00) 1.00 (0.75–4.00) 3.00 (1.00–10.00) 2.00 (0.50–5.00) Laboratory findings  IgG, g/l 16.85 (13.75–19.23) 18.30 (14.25–21.50) 21.20 (13.50–26.10) 14.00 (10.04–19.20)  IgM, g/l 1.16 (0.77–1.47) 1.00 (0.62–2.39) 1.37 (1.06–2.44) 1.58 (1.38–2.98)*  IgA, g/l 2.75 (2.19–3.92) 3.36 (2.67–4.60) 2.88 (1.67–4.50) 2.60 (2.49–3.82)  C3, g/l 1.01 (0.80–1.25) 0.86 (0.67–1.08) 1.02 (0.98–1.11) 0.93 (0.92–1.12)  C4, g/l 0.22 (0.17–0.31) 0.18 (0.11–0.22) 0.15 (0.12–0.22) 0.28 (0.20–0.31)  CRP, mg/l 0.66 (0.33–5.45) 2.20 (0.40–6.76) 4.9 (1.41–30.00) 9.95 (4.80–22.60)***  ANA positive, no. (%) 7 (70) 20 (80) 12 (80) 10 (50)  Anti-SSA/Ro60 positive, no. (%) 6 (60) 14 (56) 8 (53) 4 (20)**  Anti-SSB/La positive, no. (%) 3 (30) 10 (40) 3 (20) 3 (15)  Anti-Ro-52 positive, no. Clinical prediction model 0.656 (95% confidence interval: 0.527–0.785, p = 0.086) (Table 3). To develop complementary clinical prediction tools capable of distinguishing pSS–ILD from pSS–no ILD, we applied LASSO modeling—a machine learning- based, penalized regression method designed to mini- mize data complexity and maximize precision. This analysis demonstrated that the clinical and serum bio- marker signature consisting of age, KL-6, and TNFα effectively differentiated pSS–ILD from pSS–no ILD with high sensitivity and specificity, yielding an AUC of 0.883 (95% CI = 0.7987–0.9677, p value < 0.0001) (Fig. 3). We next used the Spearman coefficient to assess corre- lations between continuous variables, and then selected only one member of each pair of correlated variables (r > 0.3, p < 0.05) to avoid multicollinearity in prediction models. Based on these criteria, disease duration and KL-6 levels were the two variables retained in the final logistic regression model to assess their association with the occurrence of pSS–ILD (p < 0.0001, Table 4). After KL-6 and disease duration were fit into this logistic regression model, we calculated risk scores based on the equation: risk for pSS– ILD = 3.824 + 0.006*KL-6 + 0.150*disease duration. This analysis demonstrated that risk scores were significantly different between different ILA subcategories, as p values for comparisons of ILA score 0 vs. ILA score 1, ILA score 0 vs. ILA score 2 and ILA score 0 vs. ILA score 3 were 0.4558, 0.004 and < 0.0001, respectively (Fig. 2). Overall, these data indicated that the model incorporating disease duration and KL-6 levels effectively distinguished pSS– ILD from pSS no-ILD. Serum protein biomarkers To address whether serum protein biomarkers are asso- ciated with the presence of pSS–ILD, we measured the serum levels of KL-6 as well as 42 proteins that encompass cytokines, chemokines, growth factors, and Weng et al. European Journal of Medical Research (2022) 27:199 Page 5 of 10 Table 2  Clinical, demographic, and laboratory characteristics of pSS patients segregated by ILD subcategory Eotaxin/CCL11 C–C motif chemokine ligand 11, KL-6 Krebs vonden Lungen-6, TGFa growth factor alpha, TNFa tumor necrosis factor-alpha The continuous variables were presented as median (interquartile range). The significance of differences in demographic variables, clinical features, and serum biomarkers were determined by univariate analyses using Fisher’s exact test for categorical variables and Mann–Whitney U test for continuous variables. IQR interquartile range * p < 0.05, **p < 0.01, ***p < 0.001 when the pSS moderate/advanced-ILD group (ILA score 2 + 3) was compared with the pSS no/indeterminate-ILD group (ILA score 0 + 1) 1. The lower limit of detection for TGF-α was 1.07 pg/ml Bold values represent the statistic significances p<0 05 Variable no/indeterminate ILD moderate/advanced ILD p value (ILA score 0 + 1) (ILA score 2 + 3) (n = 35) (n = 34) Female, no. (%) 30 (86) 28 (82) 0.703 Age at diagnosis of pSS, years 52.00 (44.00–58.00) 61.00 (52.50–66.50) 0.003 Disease duration, years 1.00 (0.50–4.00) 2.50 (1.00–5.00) 0.229 IgG, g/l 17.60 (14.10–21.50) 18.50 (10.09–21.58) 0.792 IgM, g/l 1.09 (0.62–1.86) 1.44 (1.19–2.88) 0.029 IgA, g/l 3.21 (2.53–4.37) 2.74 (2.26–3.83) 0.203 C3, g/l 0.89 (0.72–1.19) 0.98 (0.92–1.11) 0.138 C4, g/l 0.20 (0.14–0.24) 0.21 (0.15–0.30) 0.201 CRP, mg/l 2.09 (0.40–6.23) 7.97 (1.85–23.20) 0.002 ANA positive, no. (%) 31 (89) 28 (82) 0.695 Anti-SSA/Ro60 positive, no. (%) 23 (66) 15 (44) 0.071 Anti-SSB/La positive, no. (%) 13 (37) 6 (18) 0.07 Anti-Ro-52 positive, no. (%) 26 (74) 28 (82) 0.417 eotaxin/CCL11, pg/ml 278.00 (167.00–391.00) 1130.00 (549.25–1538.25) 0.005 KL-6, U/ml 146.00 (119.00–208.00) 202.00 (164.25–300.75)  < 0.0001 TGF-α, pg/ml 1.07 (1.07–1.07)1 1.07 (1.07–4.19) 0.044 TNF-α, pg/ml 7.17 (1.83–12.07) 11.60 (5.88–26.86) 0.026 Discussion Based on HRCT criteria, the prevalence of pSS–ILD (ILA 2 + ILA 3) in this cohort of consecutively enrolled pSS patents from our center was 50%. Because patients were enrolled consecutively without respect to underly- ing lung disease, this statistic likely reflects the true fre- quency of this complication that may go undetected in unscreened populations (note that in another study of 527 patients with pSS, 206 (39.1%) had evidence of ILD Weng et al. European Journal of Medical Research (2022) 27:199 Page 6 of 10 Table 3  Factors discriminating pSS–moderate/advanced ILD from pSS–no/indeterminate ILD AUC​ area under the curve * p < 0.05, **p < 0.01, ***p < 0.001 when the pSS moderate/advanced-ILD group (ILA score 2 + 3) was compared with the pSS no/indeterminate-ILD group (ILA score 0 + 1) Bold values represent the statistic significances p < 0.05 Variable Mild/moderate and severe ILD Disease (ILA score 2 + 3) AUC​ 95% CI p value Age at diagnosis of pSS 0.706 0.582–0.830 0.003** Disease duration 0.584 0.448–0.719 0.232 IgG 0.518 0.377–0.660 0.792 IgM 0.653 0.521–0.785 0.029* IgA 0.589 0.453–0.725 0.203 C3 0.604 0.467–0.741 0.138 C4 0.590 0.453–0.726 0.201 CRP 0.713 0.590–0.836 0.002** ANA positive 0.531 0.394–0.668 0.657 Anti-SSA/RO-60 positive 0.608 0.474–0.742 0.123 Anti-SSB/La positive 0.597 0.463–0.732 0.164 Anti-Ro-52 positive 0.540 0.404–0.677 0.565 eotaxin/CCL11 0.695 0.571–0.818 0.006** KL-6 0.883 0.798–0.969  < 0.0001*** TGF-α 0.618 0.484–0.753 0.091 TNF-a 0.656 0.527–0.785 0.026* Table 3  Factors discriminating pSS–moderate/advanced ILD from pSS–no/indeterminate ILD [5]). Subgroup comparisons indicated that the occur- rence of pSS–ILD was associated with older age and higher serum levels of CRP, immunoglobulin M, eotaxin, KL-6, TGFα and TNFα. Our final binary logistic regres- sion model revealed that KL-6 level and disease duration were key parameters associated with pulmonary involve- ment in Sjögren’s syndrome patients. LASSO modeling complemented these findings, demonstrating that age, KL-6, and TNFα effectively differentiated pSS–ILD from pSS–no ILD with high sensitivity and specificity. [5]). Subgroup comparisons indicated that the occur- rence of pSS–ILD was associated with older age and higher serum levels of CRP, immunoglobulin M, eotaxin, KL-6, TGFα and TNFα. Our final binary logistic regres- sion model revealed that KL-6 level and disease duration were key parameters associated with pulmonary involve- ment in Sjögren’s syndrome patients. LASSO modeling complemented these findings, demonstrating that age, KL-6, and TNFα effectively differentiated pSS–ILD from pSS–no ILD with high sensitivity and specificity. Discussion ILA score 2 + 3) by HRCT in pSS. Panels a–c demonstrate the relationship between the natural log of serum a) KL-6, b eotaxin/CCL11, and c TNFα levels and ILD severity (p = 0.0002, 0006, and 0.0182, respectively). Each symbol represents an individual patient; horizontal lines show the mean value (natural log) of serum levels for specified cytokines. P values were determined by Mann–Whitney U test Fig. 1  Relationship between serum levels of cytokines and the severity of ILD (ILA score 0 vs. ILA score 2 + 3) by HRCT in pSS. Panels a–c demonstrate the relationship between the natural log of serum a) KL-6, b eotaxin/CCL11, and c TNFα levels and ILD severity (p = 0.0002, 0006, and 0.0182, respectively). Each symbol represents an individual patient; horizontal lines show the mean value (natural log) of serum levels for specified cytokines. P values were determined by Mann–Whitney U test Fig. 1  Relationship between serum levels of cytokines and the severity of ILD (ILA score 0 vs. ILA score 2 + 3) by HRCT in pSS. Panels a–c demonstrate the relationship between the natural log of serum a) KL-6, b eotaxin/CCL11, and c TNFα levels and ILD severity (p = 0.0002, 0006, and 0.0182, respectively). Each symbol represents an individual patient; horizontal lines show the mean value (natural log) of serum levels for specified cytokines. P values were determined by Mann–Whitney U test epithelial cell damage or is playing a direct role in aber- rant signaling pathways remains unclear, however. Table 4  Relationship between selected risk factors and pSS-ILD Relationship between selected risk factors and pSS–ILD Descriptive analyses showed differences in risk of pSS–ILD for seventeen indices mentioned above. We conducted Spearman correlation analyses for continuous variables and selected one member of each pair of correlated variables (r > 0.3 and p < 0.05) to include into the logistic regression model to avoid multicollinearity. With those steps, disease duration and KL-6 were selected to include in the final model. Beta coefficient p value Disease duration 0.150 0.032 KL-6 0.006 0.000 Constant − 3.824 0.000 Our study does have several limitations. First, even though we enrolled patients from different provinces Fig. 2  Distribution of risk scores between different ILA subcategories. KL-6 and disease duration were fit into a logistic regression model, yielding an equation for calculation of a combined risk score = − 3.824 + 0.006*KL-6 + 0.150*disease duration. Discussion SSB positivity as well as high levels of IgG and IgA were shown in a separate study to be independently associated with lung involvement in pSS [23]. Unlike these studies, however, we did not find statistically significant associa- tions between anti-Ro52/La or anti-La/SSB antibodies and pSS–ILD. Serum levels of eotaxin were higher in the pSS–ILD subgroup of our cohort, distinguishing these pSS patients from those without definite ILD. Eotaxin may be involved in the pathogenesis of ILD in pSS—possibly due to acti- vation of fibroblasts, eosinophils, and neutrophils, each of which bears receptors for this chemokine. Although there have been no reports on eotaxin in the context of pSS–ILD, other studies have shown that eotaxin directly affects lung fibroblasts by upregulating procollagen type I gene expression and collagen protein production in lung fibroblasts—suggesting a potential contribution of this CC chemokine to deposition of extracellular matrix (ECM) and the early phase of tissue remodeling in the lung [24]. Interestingly, a recent RA-ILD study found significant associations between eotaxin and the sever- ity of RA-ILD [25], again consistent with a role for this chemokine in lung fibrosis [24–26].h i Advancing age was also strongly associated with the development of pSS–ILD in other studies. A recent sys- tematic review of 6157 pSS patients showed that older age, male sex, and higher CRP levels were risk factors for pSS–ILD [13, 14]. In addition, late age of onset and long duration of disease have also been linked to pSS–ILD [21], consistent with our logistic regression model show- ing that disease duration of pSS plays a critical role in the development of pSS–ILD. Regarding relationships between the presence of autoantibodies and the occurrence of pSS–ILD, the per- centage of anti-SSA/Ro60 antibody in pSS-advanced ILD patients (ILA score 3) was significantly higher than in pSS–no ILD patients in our study as well as in oth- ers [21]. Other studies have also shown that anti-Ro52/ La antibodies are an independent risk factor associated with the occurrence of ILD in pSS [11, 21, 22]. Anti-La/ i The present study showed that the serum level of KL-6 was the most discriminating biomarker for pSS–ILD in our cohort. Indeed, levels of KL-6 significantly correlated Weng et al. European Journal of Medical Research (2022) 27:199 Page 7 of 10 Fig. 1  Relationship between serum levels of cytokines and the severity of ILD (ILA score 0 vs. Discussion P values for ILA score 0 vs. ILA score 1, ILA score 0 vs. ILA score 2 and ILA score 0 vs. ILA score 3 were 0.4558, 0.004 and < 0.0001, respectively. The presented p values were determined by the non-parametric Mann– Whitney U test with the severity of ILD measured by HRCT to a greater degree than other biomarkers associated with pSS–ILD in this study (eotaxin, TGFα and TNFα), as shown in Fig. 1. KL-6 has been classified as a human mucin-like glycoprotein (in the MUC1 family) secreted predomi- nantly by type II pneumocytes in the affected lungs of patients with ILD [27, 28]. Although previous studies have investigated the relationship between serum KL-6 levels and disease activity/severity as well as prognosis in SSc–ILD [29–31], RA-ILD [30, 32, 33], and PM/DM- ILD [30, 32], we found that KL-6 also related to sever- ity of pSS–ILD. Consistent with our findings, Kamiya et al. showed that pSS–ILD patients with higher levels of serum KL-6 (> 800U/mL) had a higher pulmonary mor- tality rate compared to those without elevated serum KL-6 levels [34]. Overall, the ability of serum levels of KL-6 to distinguish CTD–ILD from CTD–no ILD in multiple subsets of early as well as established disease groups demonstrates its value as a biomarker for these disorders. Whether KL-6 is simply serving as a marker of with the severity of ILD measured by HRCT to a greater degree than other biomarkers associated with pSS–ILD in this study (eotaxin, TGFα and TNFα), as shown in Fig. 1. KL-6 has been classified as a human mucin-like glycoprotein (in the MUC1 family) secreted predomi- nantly by type II pneumocytes in the affected lungs of patients with ILD [27, 28]. Although previous studies have investigated the relationship between serum KL-6 levels and disease activity/severity as well as prognosis in SSc–ILD [29–31], RA-ILD [30, 32, 33], and PM/DM- ILD [30, 32], we found that KL-6 also related to sever- ity of pSS–ILD. Consistent with our findings, Kamiya et al. showed that pSS–ILD patients with higher levels of serum KL-6 (> 800U/mL) had a higher pulmonary mor- tality rate compared to those without elevated serum KL-6 levels [34]. Overall, the ability of serum levels of KL-6 to distinguish CTD–ILD from CTD–no ILD in multiple subsets of early as well as established disease groups demonstrates its value as a biomarker for these disorders. pSS: Sjögren’s syndrome; ILD: Interstitial lung disease; HRCT​: High-resolution computed tomography; ILA: Interstitial lung abnormalities; CTD: Connective tissue diseases; CRP: C-reactive protein; ANA: Antinuclear antibody; KL-6: Krebs von den Lungen-6; ROC: Receiver operating characteristic; AUC​: Area under the curve; FDR: False discovery rate; LASSO: Least absolute shrinkage and selection operator modeling. Conclusions and different hospitals of China, there were small num- bers of patients in each subgroup of pSS–ILD, limit- ing study power. Second, pulmonary function was only tested in 20 patients in this study (data not shown) and, therefore, could not be incorporated into any of our analyses. Of note, however, our findings support the associations between pSS–ILD and serum protein biomarkers, such as eotaxin, KL-6, TGFα, and TNFα. While future cross-sectional studies in larger cohorts will be critical in validating findings from this study, prospective studies will also be important to inves- tigate a wider range of biomarkers and their ability to correlate with disease activity over time. In turn, these corroborative studies will provide greater insight to the underlying pathogenesis of pSS–ILD and elucidate therapeutically targetable pathways. Patient age, disease duration, and serum levels of both KL-6 and TNFα were the most discriminating factors associated with the presence of ILD in our cohort of pSS patients. In addition to these parameters, higher levels of CRP, IgM, eotaxin, TGFα, and TNFα should also prompt the search for occult as well as clinically evident lung involvement based on statistically signifi- cant univariate associations with pSS–ILD in this study. Discussion The corresponding ROC curve reflects performance characteristics of this model, as indicated by area under the curve (AUC). The accompanying table shows regression coefficients for clinical risk factors and specific serum proteins and different hospitals of China, there were small num- bers of patients in each subgroup of pSS–ILD, limit- ing study power. Second, pulmonary function was only tested in 20 patients in this study (data not shown) and, therefore, could not be incorporated into any of our analyses. Of note, however, our findings support the associations between pSS–ILD and serum protein biomarkers, such as eotaxin, KL-6, TGFα, and TNFα. While future cross-sectional studies in larger cohorts will be critical in validating findings from this study, prospective studies will also be important to inves- tigate a wider range of biomarkers and their ability to correlate with disease activity over time. In turn, these corroborative studies will provide greater insight to the underlying pathogenesis of pSS–ILD and elucidate therapeutically targetable pathways. Discussion Whether KL-6 is simply serving as a marker of Fig. 2  Distribution of risk scores between different ILA subcategories. KL-6 and disease duration were fit into a logistic regression model, yielding an equation for calculation of a combined risk score = − 3.824 + 0.006*KL-6 + 0.150*disease duration. P values for ILA score 0 vs. ILA score 1, ILA score 0 vs. ILA score 2 and ILA score 0 vs. ILA score 3 were 0.4558, 0.004 and < 0.0001, respectively. The presented p values were determined by the non-parametric Mann– Whitney U test Weng et al. European Journal of Medical Research (2022) 27:199 Page 8 of 10 Fig. 3  Least absolute shrinkage and selection operator (LASSO) modeling in the identification of pSS–ILD. Application of LASSO regression modeling that is based on machine learning revealed clinical risk factors and serum protein biomarkers capable of distinguishing pSS–ILD patients with moderate/advanced-ILD from those with no-/indeterminate-ILD. The corresponding ROC curve reflects performance characteristics of this model, as indicated by area under the curve (AUC). The accompanying table shows regression coefficients for clinical risk factors and specific serum proteins Fig. 3  Least absolute shrinkage and selection operator (LASSO) modeling in the identification of pSS–ILD. Application of LASSO regression modeling that is based on machine learning revealed clinical risk factors and serum protein biomarkers capable of distinguishing pSS–ILD patients with moderate/advanced-ILD from those with no-/indeterminate-ILD. The corresponding ROC curve reflects performance characteristics of this model, as indicated by area under the curve (AUC). The accompanying table shows regression coefficients for clinical risk factors and specific serum proteins Fig. 3  Least absolute shrinkage and selection operator (LASSO) modeling in the identification of pSS–ILD. Application of LASSO regression modeling that is based on machine learning revealed clinical risk factors and serum protein biomarkers capable of distinguishing pSS–ILD patients with moderate/advanced-ILD from those with no-/indeterminate-ILD. The corresponding ROC curve reflects performance characteristics of this model, as indicated by area under the curve (AUC). The accompanying table shows regression coefficients for clinical risk factors and specific serum proteins Fig. 3  Least absolute shrinkage and selection operator (LASSO) modeling in the identification of pSS–ILD. Application of LASSO regression modeling that is based on machine learning revealed clinical risk factors and serum protein biomarkers capable of distinguishing pSS–ILD patients with moderate/advanced-ILD from those with no-/indeterminate-ILD. Consent for publication Consent for publication Not applicable. Not applicable. 15. Shiboski CH, Shiboski SC, Seror R, et al. 2016 American college of rheu- matology/European league against rheumatism classification criteria for primary Sjögren’s syndrome. Ann Rheum Dis. 2017;76:9–16. Funding 9. Palm O, Garen T, Berge Enger T, et al. Clinical pulmonary involvement in primary Sjogren’s syndrome: prevalence, quality of life and mortality–a retrospective study based on registry data. Rheumatology (Oxford). 2013;52:173–9. This study was funded by the National Natural Science Foundation of China (Grant No. 81771751) and Fujian Provincial Department of Science and Tech- nology (Grant No. 2018J01383). 10. Luppi F, Sebastiani M, Silva M, et al. Interstitial lung disease in Sjogren’s syndrome: a clinical review. Clin Exp Rheumatol. 2020;38(Suppl 126):291–300. 10. Luppi F, Sebastiani M, Silva M, et al. Interstitial lung disease in Sjogren’s syndrome: a clinical review. Clin Exp Rheumatol. 2020;38(Suppl 126):291–300. Declarations 12. Flament T, Bigot A, Chaigne B, Henique H, Diot E, Marchand-Adam S. Pulmonary manifestations of Sjögren’s syndrome. Eur Respir Rev. 2016;25(140):110–23. Availability of data and materials y The outputs are available from the authors upon request. 11. Buvry C, Cassagnes L, Tekath M, et al. Anti-Ro52 antibodies are a risk fac- tor for interstitial lung disease in primary Sjögren syndrome. Respir Med. 2020;163: 105895. The authors declare no conflicts of interest. 16. Shiboski CH, Shiboski SC, Seror R, et al. 2016 American College of Rheu- matology/European League Against Rheumatism Classification Criteria for Primary Sjögren’s Syndrome: a consensus and data-driven methodol- ogy involving three international patient cohorts. Arthritis Rheumatol (Hoboken, NJ). 2017;69:35–45. Author details 1 1 Department of Rheumatology, The First Affiliated Hospital of Xiamen Univer- sity, School of Medicine, Xiamen University, Xiamen 361003, China. 2 School of Life Sciences, Xiamen University, Xiamen, China. 3 Department of Respira- tory Medicine, The First Affiliated Hospital of Xiamen University, School of Medicine, Xiamen University, Xiamen, China. 4 Department of Radiology, The First Affiliated Hospital of Xiamen University, School of Medicine, Xiamen University, Xiamen, China. 5 School of Medicine, Xiamen University, Xiamen, China. 6 State Key Laboratory of Molecular Vaccinology and Molecular Diag- nostics, School of Public Health, Xiamen University, Xiamen, China. 7 Fuqing City Hospital affiliated to Fujian Medical University, Fuzhou, China. 8 Depart- ment of Pediatrics, School of Medicine, The First Affiliated Hospital of Xiamen University National Institute of Data Science in Health and Medicine, Xiamen University, Xiamen, China. 9 Division of Rheumatology and Clinical Immunol- ogy, University of Pittsburgh School of Medicine, Pittsburgh, PA 15261, USA. 17. Chen J, Doyle TJ, Liu Y, et al. Biomarkers of rheumatoid arthritis- associated interstitial lung disease. Arthritis Rheumatol (Hoboken, NJ). 2015;67:28–38. 18. Washko GR, Hunninghake GM, Fernandez IE, et al. Lung volumes and emphysema in smokers with interstitial lung abnormalities. N Engl J Med. 2011;364:897–906. 19. Washko GR, Lynch DA, Matsuoka S, et al. Identification of early interstitial lung disease in smokers from the COPDGene Study. Acad Radiol. 2010;17:48–53. 20. Gorelik E, Landsittel DP, Marrangoni AM, et al. Multiplexed immunobead- based cytokine profiling for early detection of ovarian cancer. Cancer Epidemiol Biomarkers Prev. 2005;14:981–7. 21. Buvry C, Cassagnes L, Tekath M, et al. Anti-Ro52 antibodies are a risk factor for interstitial lung disease in primary Sjogren € syndrome. Respir Med. 2020;2020(163):105895. Received: 4 July 2022 Accepted: 17 September 2022 Received: 4 July 2022 Accepted: 17 September 2022 22. Dong X, Zhou JF, Guo XJ, et al. A retrospective analysis of distinguishing features of chest HRCT and clinical manifestation in primary Sjögren’s syndrome-related interstitial lung disease in a Chinese population. Clin Rheumatol. 2018;37(2981–2988):2018. Acknowledgements Not applicable 6. Parambil JG, Myers JL, Lindell RM, Matteson EL, Ryu JH. Interstitial lung disease in primary Sjögren syndrome. Chest. 2006;130:1489–95. 6. Parambil JG, Myers JL, Lindell RM, Matteson EL, Ryu JH. Interstitial lung disease in primary Sjögren syndrome. Chest. 2006;130:1489–95. Author contributions 7. Ito I, Nagai S, Kitaichi M, et al. Pulmonary manifestations of primary Sjogren’s syndrome: a clinical, radiologic, and pathologic study. Am J Respir Crit Care Med. 2005;171:632–8. 7. Ito I, Nagai S, Kitaichi M, et al. Pulmonary manifestations of primary Sjogren’s syndrome: a clinical, radiologic, and pathologic study. Am J Respir Crit Care Med. 2005;171:632–8. Study conception or design: JC and DA; acquisition of the data: YHL, DHL, CYY, YLL, LW, WL, and SXG.; analysis and interpretation of the data: QYL, LW, YQC, DA, YDH, and TL; drafting and revising the article: JC and DA. All authors read and approved the final manuscript. p 8. Schildgen O, Enomoto Y, Takemura T, et al. Prognostic factors in interstitial lung disease associated with primary Sjögren’s syndrome: a retrospective analysis of 33 pathologically–proven cases. PLoS ONE. 2013;8: e73774. 8. Schildgen O, Enomoto Y, Takemura T, et al. Prognostic factors in interstitial lung disease associated with primary Sjögren’s syndrome: a retrospective analysis of 33 pathologically–proven cases. PLoS ONE. 2013;8: e73774. Received: 4 July 2022 Accepted: 17 September 2022 2. Castelino FV, Varga J. Interstitial lung disease in connective tissue dis- eases: evolving concepts of pathogenesis and management. Arthritis Res Ther. 2010;12:213. 1. Rubio-Rivas M, Royo C, Simeón CP, Corbella X, Fonollosa V. Mortality and survival in systemic sclerosis: systematic review and meta-analysis. Semin Arthritis Rheum. 2014;44:208–19. Abbreviations SS Sjö ’ Page 9 of 10 Weng et al. European Journal of Medical Research (2022) 27:199 Supplementary Information 3. Bagnato G, Harari S. Cellular interactions in the pathogenesis of interstitial lung diseases. Eur Respir Rev. 2015;24:102–14. Competing interests The authors declare no conflicts of interest. Ethics approval and consent to participate Ethical approval for the study was obtained by the Ethical Committee of The first affiliated Hospital of Xiamen University, School of Medicine, Xiamen University, China (Approval number KY2017-026). Written informed consents were obtained from all participants. 13. Wang Y, Hou Z, Qiu M, Ye Q. Risk factors for primary Sjogren syndrome- associated interstitial lung disease. J Thorac Dis. 2018;10:2108–17. 14. He C, Chen Z, Liu S, Chen H, Zhang F. Prevalence and risk factors of interstitial lung disease in patients with primary Sjogren’s syndrome: a systematic review and meta-analysis. Int J Rheum Dis. 2020;23:1009–18. Consent for publication Not applicable. 1. Rubio-Rivas M, Royo C, Simeón CP, Corbella X, Fonollosa V. Mortality and survival in systemic sclerosis: systematic review and meta-analysis. Semin Arthritis Rheum. 2014;44:208–19. 2. Castelino FV, Varga J. Interstitial lung disease in connective tissue dis- eases: evolving concepts of pathogenesis and management. Arthritis Res Ther. 2010;12:213. Supplementary Information 4. Nannini C, Jebakumar AJ, Crowson CS, Ryu JH, Matteson EL. Primary Sjögren’s syndrome 1976–2005 and associated interstitial lung disease: a population-based study of incidence and mortality. BMJ Open. 2013;3: e003569. Additional file 1: Table. CTD–ILD-related biomarkers assessed by Multi- plex ELISA. 5. Dong X, Zhou J, Guo X, et al. A retrospective analysis of distinguishing features of chest HRCT and clinical manifestation in primary Sjögren’s syndrome-related interstitial lung disease in a Chinese population. Clin Rheumatol. 2018;37:2981–8. References Sarcoidosis Vasc Diffuse Lung Dis. 2016;33:216–23. f 34. Kamiya Y, Fujisawa T, Kono M, et al. Prognostic factors for primary Sjogren’s syndrome-associated interstitial lung diseases. Respir Med. 2019;159: 105811. 34. Kamiya Y, Fujisawa T, Kono M, et al. Prognostic factors for primary Sjogren’s syndrome-associated interstitial lung diseases. Respir Med. 2019;159: 105811. References 1. Rubio-Rivas M, Royo C, Simeón CP, Corbella X, Fonollosa V. Mortality and survival in systemic sclerosis: systematic review and meta-analysis. Semin Arthritis Rheum. 2014;44:208–19. 23. Zhao Y, Li Y, Wang L, et al. Primary Sjogren syndrome in Han Chinese: clinical and immunological characteristics of 483 patients. Medicine (Baltimore). 2015;94: e667. 24. Puxeddu I, Bader R, Piliponsky AM, Reich R, Levi-Schaffer F, Berkman N. The CC chemokine eotaxin/CCL11 has a selective profibrogenic effect on human lung fibroblasts. J Allergy Clin Immunol. 2006;117:103–10. 25. Kass DJ, Nouraie M, Glassberg MK, et al. Comparative profiling of serum protein biomarkers in rheumatoid arthritis-associated interstitial lung Page 10 of 10 Weng et al. European Journal of Medical Research (2022) 27:199 disease and idiopathic pulmonary fibrosis. Arthritis Rheumatol (Hoboken, NJ). 2020;72:409–19. disease and idiopathic pulmonary fibrosis. Arthritis Rheumatol (Hoboken, NJ). 2020;72:409–19. 26. Huaux F, Gharaee-Kermani M, Liu T, et al. Role of Eotaxin-1 (CCL11) and CC chemokine receptor 3 (CCR3) in bleomycin-induced lung injury and fibrosis. Am J Pathol. 2005;167:1485–96. i 27. Ishikawa N, Hattori N, Yokoyama A, Kohno N. Utility of KL-6/MUC1 in the clinical management of interstitial lung diseases. Respir Investig. 2012;50:3–13. 28. Xu L, Yang D, Zhu S, et al. Bleomycin-induced pulmonary fibrosis is attenuated by an antibody against KL-6. Exp Lung Res. 2013;39:241–8. 29. Kuwana M, Shirai Y, Takeuchi T. Elevated Serum Krebs von den lungen-6 in early disease predicts subsequent deterioration of pulmonary function in patients with systemic sclerosis and interstitial lung disease. J Rheumatol. 2016;43:1825–31. 30. Oguz EO, Kucuksahin O, Turgay M, et al. Association of serum KL-6 levels with interstitial lung disease in patients with connective tissue disease: a cross-sectional study. Clin Rheumatol. 2016;35:663–6. 30. Oguz EO, Kucuksahin O, Turgay M, et al. Association of serum KL-6 levels with interstitial lung disease in patients with connective tissue disease: a cross-sectional study. Clin Rheumatol. 2016;35:663–6. 31. Yamakawa H, Hagiwara E, Kitamura H, et al. Serum KL-6 and surfactant protein-D as monitoring and predictive markers of interstitial lung disease in patients with systemic sclerosis and mixed connective tissue disease. J Thorac Dis. 2017;9:362–71. 32. Lee JS, Lee EY, Ha Y-J, Kang EH, Lee YJ, Song YW. Serum KL-6 levels reflect the severity of interstitial lung disease associated with connective tissue disease. Arthritis Res Ther. 2019;21:58. 33. Lee YS, Kim HC, Lee BY, et al. The value of biomarkers as predictors of outcome in patients with rheumatoid arthritis-associated usual interstitial pneumonia. Publisher’s Note Springer Nature remains neutral with regard to jurisdictional claims in pub- lished maps and institutional affiliations. Springer Nature remains neutral with regard to jurisdictional claims in pub- lished maps and institutional affiliations. • fast, convenient online submission • thorough peer review by experienced researchers in your field • rapid publication on acceptance • support for research data, including large and complex data types • gold Open Access which fosters wider collaboration and increased citations maximum visibility for your research: over 100M website views per year • At BMC, research is always in progress. Learn more biomedcentral.com/submissions Ready to submit your research Ready to submit your research ? Choose BMC and benefit from: ? Choose BMC and benefit from: • fast, convenient online submission • thorough peer review by experienced researchers in your field • rapid publication on acceptance • support for research data, including large and complex data types • gold Open Access which fosters wider collaboration and increased citations maximum visibility for your research: over 100M website views per year • At BMC, research is always in progress. Learn more biomedcentral.com/submissions Ready to submit your research Ready to submit your research ? Choose BMC and benefit from: ? Choose BMC and benefit from: • fast, convenient online submission • thorough peer review by experienced researchers in your field • rapid publication on acceptance • support for research data, including large and complex data types • gold Open Access which fosters wider collaboration and increased citations maximum visibility for your research: over 100M website views per year • At BMC, research is always in progress. Learn more biomedcentral.com/submissions Ready to submit your research Ready to submit your research ? Choose BMC and benefit from: ? Choose BMC and benefit from:
https://openalex.org/W4321480207
https://www.researchsquare.com/article/rs-1242933/latest.pdf
English
null
Ageing threatens sustainability of smallholder farming in China
Nature
2,023
cc-by
17,654
Aging threatens sustainability of smallholder farming in China Physical Sciences - Article Keywords: Posted Date: January 17th, 2022 Posted Date: January 17th, 2022 DOI: https://doi.org/10.21203/rs.3.rs-1242933/v1 License:   This work is licensed under a Creative Commons Attribution 4.0 International License. License:   This work is licensed under a Creative Commons Attribution 4.0 International License. Read Full License Aging threatens sustainability of smallholder farming in China 1 2 2 Chenchen Ren a,b, Xinyue Zhou c, Chen Wang b,d, Yaolin Guo d, Yu Diao d, Sisi Shen d, 3 Stefan Reis e,f, Wanyue Li c, Jianming Xu d, Baojing Gu d,g,* 4 5 a Department of Land Management, Zhejiang University, Hangzhou 310058, China; 6 b Policy Simulation Laboratory, Zhejiang University, Hangzhou, 310058, China 7 c School of Management, Zhejiang University, Hangzhou 310058, China; 8 d College of Environmental & Resource Sciences, Zhejiang University, Hangzhou 9 310058, China 10 e UK Centre for Ecology & Hydrology, Penicuik, EH26 0QB, United Kingdom 11 f University of Exeter Medical School, Knowledge Spa, Truro, TR1 3HD, United 12 Kingdom 13 g Zhejiang Provincial Key Laboratory of Agricultural Resources and Environment, 14 Zhejiang University, Hangzhou 310058, China 15 16 *Corresponding Author: 17 College of Environmental & Resource Sciences, Zhejiang University, Zijingang 18 Campus, 866 Yuhangtang Road, Hangzhou 310058, PR China. Tel & Fax: +86 571 19 8820 6926. E-mail: bjgu@zju.edu.cn 20 21 Rapidly demographic aging substantially affects socioeconomic development 1-4, 22 presents grand challenges for food security and agricultural sustainability 5-8, 23 which have so far not been well understood. Here, by using over 30,000 households 24 survey across China, we show that rural population aging lowers average 25 education level of farmers by 3% (0-11% across different provinces) and reduces 26 farm size by 4% (2-11%) due to land transfer-out and abandonment in 2019. These 27 changes further led to a reduction of agricultural inputs, including fertilizers and 28 machinery, which decrease agricultural output by 4% and labor productivity by 29 9%. Meanwhile, fertilizer use efficiency is reduced by 3%, while increasing 30 fertilizer-related pollutants emission to the environment. New farming models, 31 such as cooperative farming, tend to have larger farm sizes and being operated by 32 younger farmers, who have a higher average education level, hence reducing total 33 labor requirement. Without policy interventions, agricultural output, labor 34 productivity and fertilizer use efficiency would decrease by 3-16% as a 35 consequence of population aging by 2100, compared to 2019 levels. With policy 36 measures, such as new farming models, this decrease could be reversed and in fact 37 an increase by approximately one-third achieved in the same time period. Aging threatens sustainability of smallholder farming in China 1 2 Our 38 analyses suggest that population aging effects on agriculture could be effectively 39 addressed through labor saving in large-scale new farming models, further 40 contributing to a widespread transformation of smallholder farming to 41 sustainable agriculture in China. 42 43 As life expectancy increases and population fertility rates decline, populations are aging 44 at an accelerating rate globally 9. Population aging brings grand challenges on multiple 45 global sustainable development goals (SDGs), mainly in relation to no poverty, zero 46 hunger, education, gender equality, decent work and economic growth, responsible 47 consumption and production, etc 1-4, 10, 11. Labor shortage and innovation constraints 48 may become severe in a society with an aging population, especially in labor-intense 49 economic sectors 3. Policy interventions to increase birth rates seems to be largely 50 2 Chenchen Ren a,b, Xinyue Zhou c, Chen Wang b,d, Yaolin Guo d, Yu Diao d, Sisi Shen d, 3 Stefan Reis e,f, Wanyue Li c, Jianming Xu d, Baojing Gu d,g,* 4 a Department of Land Management, Zhejiang University, Hangzhou 310058, China; 6 b Polic Sim lation Laborator Zhejiang Uni ersit Hang ho 310058 China 7 a Department of Land Management, Zhejiang University, Hangzhou 310058, China; b Policy Simulation Laboratory, Zhejiang University, Hangzhou, 310058, China School of Management, Zhejiang University, Hangzhou 310058, China; College of Environmental & Resource Sciences, Zhejiang University, Hangzhou 10058, China Zhejiang Provincial Key Laboratory of Agricultural Resources and Environment, Zhejiang University, Hangzhou 310058, China Rapidly demographic aging substantially affects socioeconomic development 1-4, Rapidly demographic aging substantially affects socioeconomic development 1-4, 22 presents grand challenges for food security and agricultural sustainability 5-8, 23 which have so far not been well understood. Here, by using over 30,000 households 24 survey across China, we show that rural population aging lowers average 25 education level of farmers by 3% (0-11% across different provinces) and reduces 26 farm size by 4% (2-11%) due to land transfer-out and abandonment in 2019. These 27 changes further led to a reduction of agricultural inputs, including fertilizers and 28 machinery, which decrease agricultural output by 4% and labor productivity by 29 9%. Meanwhile, fertilizer use efficiency is reduced by 3%, while increasing 30 fertilizer-related pollutants emission to the environment. Aging threatens sustainability of smallholder farming in China 1 2 New farming models, 31 such as cooperative farming, tend to have larger farm sizes and being operated by 32 younger farmers, who have a higher average education level, hence reducing total 33 labor requirement. Without policy interventions, agricultural output, labor 34 productivity and fertilizer use efficiency would decrease by 3-16% as a 35 consequence of population aging by 2100, compared to 2019 levels. With policy 36 measures, such as new farming models, this decrease could be reversed and in fact 37 an increase by approximately one-third achieved in the same time period. Our 38 analyses suggest that population aging effects on agriculture could be effectively 39 addressed through labor saving in large-scale new farming models, further 40 contributing to a widespread transformation of smallholder farming to 41 sustainable agriculture in China. 42 As life expectancy increases and population fertility rates decline, populations are aging 44 at an accelerating rate globally 9. Population aging brings grand challenges on multiple 45 global sustainable development goals (SDGs), mainly in relation to no poverty, zero 46 hunger, education, gender equality, decent work and economic growth, responsible 47 consumption and production, etc 1-4, 10, 11. Labor shortage and innovation constraints 48 may become severe in a society with an aging population, especially in labor-intense 49 economic sectors 3. Policy interventions to increase birth rates seems to be largely 50 1 ineffective in many countries where aging issues have been considered serious 12, 13. 51 Alternative strategies urgently need to be developed to achieve and maintain sustainable 52 development paths for human society. Agriculture as a typical labor-intensive industry 53 could be one of the sectors substantially affected by population aging, especially in 54 countries where smallholder farming is prevalent 8, 14. However, how aging affects 55 agriculture and rural livelihoods has not been well researched or understood to date. 56 This sector is facing substantial challenges in squaring the circle between maintaining 57 food security and improving environmental protection through sustainable 58 intensification at many levels. However, it is indispensable to identify integrated, 59 comprehensive measures to ensure global food security, while protecting the 60 environment and achieving rural revitalization to achieve common prosperity. 61 62 Older age groups of farmers typically have a lower education levels, are less likely to 63 keep their agricultural skills up-to-date and embrace novel, cutting-edge methods 14-16. Aging threatens sustainability of smallholder farming in China 1 2 64 Due to a consistent labor supply shortage, they can only operate small-scale farms, 65 which leads to an increase in cropland abandonment as rural populations age 17, 18. 66 Meanwhile, the typical agricultural input mix and crop types (labor-intensive crops or 67 not) are likely to shift with rural aging, reducing agricultural productivity and efficiency 68 5-7, 19. These effects are usually worse in smallholder-farming-dominated countries such 69 as China 8. An aging society is defined as one in which more than 7% of the population 70 is over 65 years old 20, and this ratio has doubled in rural China (Fig. 1a) in the period 71 from 2000 to 2019. In the coming decades, China's population aging rate is predicted 72 to accelerate 20, 21. Thus, it is urgent and timely to address the threats of aging on 73 agricultural production in China and also other countries and regions globally, which 74 are facing similar issues. 75 76 Here, we explored the relationship between rural population aging (the proportion of 77 individuals over 65 years old at household-level) and agricultural sustainability based 78 on a panel model, using survey data from more than 30,000 rural households in China. 79 Nine indicators overall were selected to illustrate agricultural sustainability, including 80 farm size, farmer’s education, labor productivity, agricultural total input and output, 81 profit-cost ratio, machine input, fertilizer input and fertilizer use efficiency (FUE). To 82 understand the full range of effects of aging on agriculture, other variables such as 83 transferred and abandoned cropland, pesticide and manure inputs, and technology 84 adoption were also incorporated into the analysis. In addition, the analysis quantified 85 the potential of new farming models, such as industrial, family and cooperative farming 86 for contributing to addressing the threats posed by aging on a predominantly traditional 87 smallholder farming sector. Finally, Shared Socioeconomic Pathways (SSP) scenarios 88 of future development were used to explore options for achieving sustainable 89 intensification of agriculture under conditions of aging rural populations. 90 91 Results and discussion 92 How aging threatens agriculture? 93 Population aging trends have been observed since the 1990s, in both urban and rural 94 areas in China (Fig. 1). However, rural aging is more severe and happening at a more 95 rapidly accelerating rate than that that of urban areas (Fig. 1a). Aging threatens sustainability of smallholder farming in China 1 2 75 ineffective in many countries where aging issues have been considered serious 12, 13. 51 Alternative strategies urgently need to be developed to achieve and maintain sustainable 52 development paths for human society. Agriculture as a typical labor-intensive industry 53 could be one of the sectors substantially affected by population aging, especially in 54 countries where smallholder farming is prevalent 8, 14. However, how aging affects 55 agriculture and rural livelihoods has not been well researched or understood to date. 56 This sector is facing substantial challenges in squaring the circle between maintaining 57 food security and improving environmental protection through sustainable 58 intensification at many levels. However, it is indispensable to identify integrated, 59 comprehensive measures to ensure global food security, while protecting the 60 environment and achieving rural revitalization to achieve common prosperity. 61 62 Older age groups of farmers typically have a lower education levels, are less likely to 63 keep their agricultural skills up-to-date and embrace novel, cutting-edge methods 14-16. 64 Due to a consistent labor supply shortage, they can only operate small-scale farms, 65 which leads to an increase in cropland abandonment as rural populations age 17, 18. 66 Meanwhile, the typical agricultural input mix and crop types (labor-intensive crops or 67 not) are likely to shift with rural aging, reducing agricultural productivity and efficiency 68 5-7, 19. These effects are usually worse in smallholder-farming-dominated countries such 69 as China 8. An aging society is defined as one in which more than 7% of the population 70 is over 65 years old 20, and this ratio has doubled in rural China (Fig. 1a) in the period 71 from 2000 to 2019. In the coming decades, China's population aging rate is predicted 72 to accelerate 20, 21. Thus, it is urgent and timely to address the threats of aging on 73 agricultural production in China and also other countries and regions globally, which 74 are facing similar issues. 75 76 Here, we explored the relationship between rural population aging (the proportion of 77 individuals over 65 years old at household-level) and agricultural sustainability based 78 on a panel model, using survey data from more than 30,000 rural households in China. 79 Nine indicators overall were selected to illustrate agricultural sustainability, including 80 farm size, farmer’s education, labor productivity, agricultural total input and output, 81 profit-cost ratio, machine input, fertilizer input and fertilizer use efficiency (FUE). Aging threatens sustainability of smallholder farming in China 1 2 To 82 understand the full range of effects of aging on agriculture, other variables such as 83 transferred and abandoned cropland, pesticide and manure inputs, and technology 84 adoption were also incorporated into the analysis. In addition, the analysis quantified 85 the potential of new farming models, such as industrial, family and cooperative farming 86 for contributing to addressing the threats posed by aging on a predominantly traditional 87 smallholder farming sector. Finally, Shared Socioeconomic Pathways (SSP) scenarios 88 of future development were used to explore options for achieving sustainable 89 intensification of agriculture under conditions of aging rural populations. 90 Aging threatens sustainability of smallholder farming in China 1 2 The urban rate of aging 96 increased from 6% to 11% during the period between 2000 and 2019, rural aging from 97 7% to 15% over the same period. The rapid aging in rural area has resulted in a 98 substantial decline in the labor force available in the agricultural sector (Fig. 1b). Young 99 rural laborers are attracted to non agricultural jobs in urban areas resulting in an 100 ineffective in many countries where aging issues have been considered serious 12, 13. 51 Alternative strategies urgently need to be developed to achieve and maintain sustainable 52 development paths for human society. Agriculture as a typical labor-intensive industry 53 could be one of the sectors substantially affected by population aging, especially in 54 countries where smallholder farming is prevalent 8, 14. However, how aging affects 55 agriculture and rural livelihoods has not been well researched or understood to date. 56 This sector is facing substantial challenges in squaring the circle between maintaining 57 food security and improving environmental protection through sustainable 58 intensification at many levels. However, it is indispensable to identify integrated, 59 comprehensive measures to ensure global food security, while protecting the 60 environment and achieving rural revitalization to achieve common prosperity. 61 62 Older age groups of farmers typically have a lower education levels, are less likely to 63 keep their agricultural skills up-to-date and embrace novel, cutting-edge methods 14-16. 64 Due to a consistent labor supply shortage, they can only operate small-scale farms, 65 which leads to an increase in cropland abandonment as rural populations age 17, 18. 66 Meanwhile, the typical agricultural input mix and crop types (labor-intensive crops or 67 not) are likely to shift with rural aging, reducing agricultural productivity and efficiency 68 5-7, 19. These effects are usually worse in smallholder-farming-dominated countries such 69 as China 8. An aging society is defined as one in which more than 7% of the population 70 is over 65 years old 20, and this ratio has doubled in rural China (Fig. 1a) in the period 71 from 2000 to 2019. In the coming decades, China's population aging rate is predicted 72 to accelerate 20, 21. Thus, it is urgent and timely to address the threats of aging on 73 agricultural production in China and also other countries and regions globally, which 74 are facing similar issues. Results and discussion Population aging trends have been observed since the 1990s, in both urban and rural 94 areas in China (Fig. 1). However, rural aging is more severe and happening at a more 95 rapidly accelerating rate than that that of urban areas (Fig. 1a). The urban rate of aging 96 increased from 6% to 11% during the period between 2000 and 2019, rural aging from 97 7% to 15% over the same period. The rapid aging in rural area has resulted in a 98 substantial decline in the labor force available in the agricultural sector (Fig. 1b). Young 99 rural laborers are attracted to non-agricultural jobs in urban areas, resulting in an 100 2 imbalance of about 10% more workers in the age group from 15 to 64 being available 101 in urban compared to rural areas. Agriculture has been the sector primarily affected by 102 migration to urban centers as well as rural aging, with young workers becoming an 103 increasingly scarce commodity in rural areas 6. 104 105 Using a fixed effect panel model, we found that for every one unit increase in the 106 proportion of rural aging ratio, there is on average a 1.5-year reduction in education 107 level of farmers (Table 1). In China, the effect of lower education levels is amplified by 108 the rapid socioeconomic development, with more and younger people typically 109 obtaining substantially higher education levels. Thus, regions with above-average 110 numbers of aging households are affected by overall lower education levels compared 111 to other regions. Meanwhile, we observe a correlation between aging and reduction in 112 farm size with a coefficient of -0.27, demonstrating that aging farmers tend to only 113 operate small-scale farms, and croplands are more likely to be abandoned or 114 transferred-out to others (Table 1). Smallholder farming is currently most prevalent in 115 regions of Central and South China, where rural aging is seen to be substantial (Fig. 1c, 116 d). 117 118 Aging is correlated with a decrease in agricultural inputs, mainly including chemicals 119 such as fertilizers and pesticides, and machinery and technology adoption (Table 1 and 120 S1). This typically reduces mechanization and intensification of agriculture. Moreover, 121 aging substantially lowers FUE by -0.13% for every one unit increase in aging. A lower 122 FUE indicates a higher rate of fertilizer-related losses to the environment and, 123 consequently, higher pollution. Impacts on agricultural sustainability 151 Total agricultural inputs 179 are reduced by about 3% (1-9%). The decrease in agricultural inputs reduces 180 agricultural output per area and labor productivity by 4% (2-10%) and 9% (4-22%), 181 respectively. Even though the correlation between aging and profit-cost ratio is not 182 significant, the reduction in farm size and education levels due to aging ultimately 183 reduces profit-cost ratio by about 2% (1-4%). The reduction in fertilizer use did not 184 contribute to an improvement in FUE, with aging reducing FUE by 3% (1-7%) and 185 leading to a 3% (1-12%) increase in fertilizer-related losses to the environment (Fig. 186 S3). 187 188 Aging in China’s rural areas is likely to accelerate in the coming decades, especially in 189 the context of urbanization due to the migration of young, working-age populations 190 from rural to urban areas 20, 21. This will further impact on the viability of agricultural 191 production in areas subjected to accelerated aging 27. The negative effects on 192 agricultural outputs could threaten the food security of 1.4 billion people in China, and 193 the loss in labor productivity would result in a decline in rural per capita income, 194 compromising the attainment of the SDGs focusing on ‘no poverty’ and ‘zero hunger’. 195 The decline in FUE and the increase in fertilizer-related losses to the environment have 196 the potential to further exacerbate environmental pollution and present a threat to both 197 environmental and human health. China is already under pressure to ensure food 198 security while also protecting the environment, so it is critical to address the negative 199 effects of aging on agriculture. 200 p g y We quantified the impact of aging on agricultural sustainability in 2019 at provincial 152 level in China to account for the large spatial variability of aging and other related 153 factors 24, 25. Average education levels of farmers are lower by around 3% in rural areas 154 (0-11% across different provinces) as a result of rural different rates of aging in 155 predominantly urban vs. rural areas (Fig. 3 and S2). The Chongqing-Sichuan area, 156 where aging has been accelerating since the 1990s, is the one of the most affected 157 regions, with an education level decline of 9% (0.6 years) (Fig. 3 and S2). Impacts on agricultural sustainability 151 Impacts on agricultural sustainability 151 We quantified the impact of aging on agricultural sustainability in 2019 at provincial 152 level in China to account for the large spatial variability of aging and other related 153 factors 24, 25. Average education levels of farmers are lower by around 3% in rural areas 154 (0-11% across different provinces) as a result of rural different rates of aging in 155 predominantly urban vs. rural areas (Fig. 3 and S2). The Chongqing-Sichuan area, 156 where aging has been accelerating since the 1990s, is the one of the most affected 157 regions, with an education level decline of 9% (0.6 years) (Fig. 3 and S2). Provinces 158 such as Zhejiang, Anhui, and Fujian are also affected, with a level of education 6% 159 lower (0.4 years) on average. Lower levels in farmers' education is associated with less 160 knowledge and adoption of technologies and scientific methods in agricultural practice, 161 inhibiting agricultural performance and modernization. Due to a lack of knowledge and 162 skills, aging farmers typically operate small-scale farms with outdated farming methods. 163 As a result, aging populations are associated with average farm size reduction by 4% 164 (2-11%) in 2019 nationally. Aging farmers tend to reduce farm size by cropland 165 abandonment or transferring increasing amounts of farmland out to others. 166 Approximately an additional 1 million hectares of cropland area would be expected to 167 be abandoned in 2019 as a result of aging (Fig. S3, Table S3). The abandonment ratio 168 is higher in hilly areas and comparatively lower in plain areas as a result of aging 18, 169 however, the abandonment increasing rate is markedly higher in plain areas such as 170 Shandong and Jiangsu provinces (Fig. S3). This poses a severe threat to the preservation 171 of croplands as a key contributor to safeguarding food security. 172 173 The decline in farm size further leads to a reduction in the use of agricultural fixed 174 inputs such as machinery 26. We found that machinery inputs decreased by about 5% on 175 average with aging, and the largest decrease was estimated at 25% found in Chongqing. 176 In addition, aging also leads to a reduction in the use of non-fixed inputs such as 177 chemical fertilizers, pesticide, and manure fertilizer (Table 1 and S1). Chemical 178 fertilizer use is reduced by an average of 2% (0-8%) (Fig. 3). Results and discussion In addition, aging reduces the amount of manure input 124 (Table S1), inhibiting the recycling of manure and aggravating environmental pollution. 125 Consequently, agricultural output per area and labor productivity decrease substantially 126 with aging, despite the fact that the profit-cost ratio does not vary significantly (Fig. 127 S1). This decline in labor productivity reduces farmers’ per capita income, further 128 discouraging young people from engaging in agriculture, and in turn further exacerbates 129 aging effects in the sector. 130 131 Aging affects agriculture both directly and indirectly as shown by a structural equation 132 model (Fig. 2). The standardized path coefficients for the direct effects of aging on labor 133 productivity and yield are both -0.05. This means that each standard deviation increase 134 in aging would lead to 0.05 standard deviations of decrease in labor productivity and 135 yield. Similarly, the direct effects of aging on fertilizer use and the FUE are -0.08 and - 136 0.02, respectively. These direct effects are only a small share of the total effect of aging 137 on agriculture. 138 139 More effects are factored in indirectly through farm size and education. For example, 140 the direct effect of aging on labor productivity has a standardized path coefficient of - 141 0.05, but the indirect effect through farm size and education is -0.08 and -0.02, 142 respectively. It results in a net effect of -0.15 of aging on labor productivity, of which 143 the direct effect accounts for one-third, while the indirect effect through farm size and 144 education accounts for two-thirds (Table S2). Similarly, 29%, 33%, and 67% of the net 145 effect of yield, fertilizer, and the FUE stem from indirect effects, respectively. This 146 implies that multiple initiatives are needed to mitigate the consequences of rural aging, 147 such as attracting young people to consider work in the agriculture sector, better 148 imbalance of about 10% more workers in the age group from 15 to 64 being available 101 in urban compared to rural areas. Agriculture has been the sector primarily affected by 102 migration to urban centers as well as rural aging, with young workers becoming an 103 increasingly scarce commodity in rural areas 6. 104 3 Impacts on agricultural sustainability 151 231 232 The reason why new farming models have better agricultural performance than 233 traditional smallholder farming is mainly because it has younger farmers with higher 234 education level. These younger farmers also have the opportunities to realize higher 235 incomes by working in non-agricultural sectors in cities, which means they face 236 substantial opportunity costs if they decide to engage in farming. To offset the 237 opportunity cost, these farmers have to increase their income by increasing farm size 238 and improving farm management. In contrast, older farmers in traditional farming do 239 not have such opportunities and are thus not prone to respond to incentives. Thus, we 240 can see a shift in agricultural input mix as well as an increase in output and labor 241 productivity under new farming models. Furthermore, as these new farming farmers are 242 younger and well educated, they are more likely to have scientific knowledge and 243 embrace new technologies 15, resulting in increased mechanization and FUE, 244 contributing to agricultural modernization and long-term sustainability. 245 246 Mitigation pathways 247 To quantitatively assess future trends of aging and its impacts we accounted for 248 New farming models matter 202 Chinese agriculture is currently dominated by smallholder farms 28. Traditional 203 smallholder farming emerged in the 1980s as a consequence of the introduction of the 204 Household Contract Responsibility System (HCRS) in China 23. The HCRS allocated 205 cropland equally to each rural household based on family size and the quality of 206 croplands. This resulted in small farm sizes as a status-quo across China, with a high 207 degree of cropland fragmentation 23. New agricultural farming models have been 208 encouraged by Chinese government and increasingly emerging since 2010s, mainly 209 including family, cooperative and industrial farming, to improve overall agricultural 210 performance 29, 30. Family farming is still by rural households, but with larger farm size, 211 compared to traditional smallholders’ farming. Cooperative farming is characterized by 212 shared agricultural equipment, such as machinery, across several families with much 213 larger farm size. Industrial farms are large-scale agricultural enterprises targeting 214 marketing and sales with large scales and professional production to maximize profits. 215 Also, young farmers with higher education levels are drawn to these new farming 216 models. Here, we considered these three models together as new farming models. Impacts on agricultural sustainability 151 Provinces 158 such as Zhejiang, Anhui, and Fujian are also affected, with a level of education 6% 159 lower (0.4 years) on average. Lower levels in farmers' education is associated with less 160 knowledge and adoption of technologies and scientific methods in agricultural practice, 161 inhibiting agricultural performance and modernization. Due to a lack of knowledge and 162 skills, aging farmers typically operate small-scale farms with outdated farming methods. 163 As a result, aging populations are associated with average farm size reduction by 4% 164 (2-11%) in 2019 nationally. Aging farmers tend to reduce farm size by cropland 165 abandonment or transferring increasing amounts of farmland out to others. 166 Approximately an additional 1 million hectares of cropland area would be expected to 167 be abandoned in 2019 as a result of aging (Fig. S3, Table S3). The abandonment ratio 168 is higher in hilly areas and comparatively lower in plain areas as a result of aging 18, 169 however, the abandonment increasing rate is markedly higher in plain areas such as 170 Shandong and Jiangsu provinces (Fig. S3). This poses a severe threat to the preservation 171 of croplands as a key contributor to safeguarding food security. 172 The decline in farm size further leads to a reduction in the use of agricultural fixed 174 inputs such as machinery 26. We found that machinery inputs decreased by about 5% on 175 average with aging, and the largest decrease was estimated at 25% found in Chongqing. 176 In addition, aging also leads to a reduction in the use of non-fixed inputs such as 177 chemical fertilizers, pesticide, and manure fertilizer (Table 1 and S1). Chemical 178 fertilizer use is reduced by an average of 2% (0-8%) (Fig. 3). Total agricultural inputs 179 are reduced by about 3% (1-9%). The decrease in agricultural inputs reduces 180 agricultural output per area and labor productivity by 4% (2-10%) and 9% (4-22%), 181 respectively. Even though the correlation between aging and profit-cost ratio is not 182 significant, the reduction in farm size and education levels due to aging ultimately 183 reduces profit-cost ratio by about 2% (1-4%). The reduction in fertilizer use did not 184 contribute to an improvement in FUE, with aging reducing FUE by 3% (1-7%) and 185 leading to a 3% (1-12%) increase in fertilizer-related losses to the environment (Fig. 186 S3). Impacts on agricultural sustainability 151 187 4 201 New farming models matter 202 Chinese agriculture is currently dominated by smallholder farms 28. Traditional 203 smallholder farming emerged in the 1980s as a consequence of the introduction of the 204 Household Contract Responsibility System (HCRS) in China 23. The HCRS allocated 205 cropland equally to each rural household based on family size and the quality of 206 croplands. This resulted in small farm sizes as a status-quo across China, with a high 207 degree of cropland fragmentation 23. New agricultural farming models have been 208 encouraged by Chinese government and increasingly emerging since 2010s, mainly 209 including family, cooperative and industrial farming, to improve overall agricultural 210 performance 29, 30. Family farming is still by rural households, but with larger farm size, 211 compared to traditional smallholders’ farming. Cooperative farming is characterized by 212 shared agricultural equipment, such as machinery, across several families with much 213 larger farm size. Industrial farms are large-scale agricultural enterprises targeting 214 marketing and sales with large scales and professional production to maximize profits. 215 Also, young farmers with higher education levels are drawn to these new farming 216 models. Here, we considered these three models together as new farming models. 217 218 New farming models was observed to have better performance than that of traditional 219 smallholder farming in several aspects in 2019 (Fig. 4). Compared to traditional 220 farming, aging ratio in new farming was 33% lower, with 64% higher in education level 221 and 20% larger in farm size. In other words, new farming models attract younger 222 farmers to participate in agricultural practices who have a higher education level and 223 capability to operate large-scale farming. The total input and machinery input were 41% 224 and 68% higher in the new farming, respectively, therefore, the output per area and 225 labor productivity increased by 24% and 29% in the new farming, respectively, 226 although the profit-cost ratio was slightly changed. Furthermore, despite fertilizer input 227 was slightly higher in new farming, there is no statistically significant difference 228 compared to the traditional smallholder farming (Fig. 4, Table S4). On the contrary, 229 new farming had a 4% higher FUE than smallholder farmers in 2019, suggesting less 230 environmental pollution in new farming. Impacts on agricultural sustainability 151 217 New farming models was observed to have better performance than that of traditional 219 smallholder farming in several aspects in 2019 (Fig. 4). Compared to traditional 220 farming, aging ratio in new farming was 33% lower, with 64% higher in education level 221 and 20% larger in farm size. In other words, new farming models attract younger 222 farmers to participate in agricultural practices who have a higher education level and 223 capability to operate large-scale farming. The total input and machinery input were 41% 224 and 68% higher in the new farming, respectively, therefore, the output per area and 225 labor productivity increased by 24% and 29% in the new farming, respectively, 226 although the profit-cost ratio was slightly changed. Furthermore, despite fertilizer input 227 was slightly higher in new farming, there is no statistically significant difference 228 compared to the traditional smallholder farming (Fig. 4, Table S4). On the contrary, 229 new farming had a 4% higher FUE than smallholder farmers in 2019, suggesting less 230 environmental pollution in new farming. 231 The reason why new farming models have better agricultural performance than 233 traditional smallholder farming is mainly because it has younger farmers with higher 234 education level. These younger farmers also have the opportunities to realize higher 235 incomes by working in non-agricultural sectors in cities, which means they face 236 substantial opportunity costs if they decide to engage in farming. To offset the 237 opportunity cost, these farmers have to increase their income by increasing farm size 238 and improving farm management. In contrast, older farmers in traditional farming do 239 not have such opportunities and are thus not prone to respond to incentives. Thus, we 240 can see a shift in agricultural input mix as well as an increase in output and labor 241 productivity under new farming models. Furthermore, as these new farming farmers are 242 younger and well educated, they are more likely to have scientific knowledge and 243 embrace new technologies 15, resulting in increased mechanization and FUE, 244 contributing to agricultural modernization and long-term sustainability. 245 g p y To quantitatively assess future trends of aging and its impacts, we accounted for 248 demographic change in Shared Socioeconomic Pathways (SSPs) scenarios 31. SSP1 249 (Taking the green road), SSP2 (Middle of Road), SSP3 (A rocky road) and SSP4 (A 250 5 road divided) are included in this analysis 32. Impacts on agricultural sustainability 151 SSP5 (Taking the highway) is excluded 251 due to having a similar population structure to SSP1. Among these scenarios, SSP1 252 includes the world's most pronounced population aging, with more than 60% of the 253 world's population over the age of 65 by 2100 (Fig. S4). Total population first increases 254 in the coming decades and then starts to decrease by the 2060s. Even with high 255 urbanization rates and economic growth under the green development path, high levels 256 of aging would exert substantial negative impacts on socioeconomic development and 257 agricultural production. SSP4 comprises the smallest rate of aging, with only 24% of 258 over 65s in 2100. However, in this scenario, the global population rises to 12.7 billion 259 by 2100, with an urbanization rate of under 60% and a severe slowdown in economic 260 growth. 261 262 Despite the different assumptions for future development paths, the aging trend 263 continues to rise in all scenarios (Fig. S4). We found that for China, the abandonment 264 ratio of croplands would increase from 5% in 2020 to 15-47% by 2100 nationally due 265 to aging, while average farm size would decrease by 5-16% (0.04-0.11 ha), and 266 education levels would fall by 8-28% (0.6-2 years) (Fig. 5, S5 and S6). Meanwhile, 267 agricultural performance would decline, with machinery and fertilizer inputs decreasing 268 by 3-5% and 1-5% by 2100, respectively. The overall input per area would reduce by 269 1-2% as well, leading to a decrease in output and profit-cost ratio by 3-5% and 3-13%, 270 respectively. Labor productivity is projected to decrease by about 7-14%, from an $7.2 271 per labor hour in 2020 to $5.2-6.6 in 2100. In addition, FUE would decrease by 5-16%, 272 and fertilizer loss increase by 3-5%. Without interventions, food security challenges 273 and environmental degradation would pose substantial threats to ecosystem and human 274 health and well-being. 275 276 Fortunately, the decline in agricultural performance caused by aging can be reversed by 277 promoting an increasing uptake of new farming models. With new farming models, 278 average farm size would increase by 11-22% from 2020 to 2100, accompanied by an 279 improvement in the average education level. This would lead to a 14-15% increase in 280 total inputs, a 13-46% increase in mechanization and a 4-5% decrease in fertilizer use. Impacts on agricultural sustainability 151 281 As a result, output and labor productivity would increase by 12-14% and 57-72%, 282 respectively, FUE improve by 12-25% and fertilizer loss be reduced by 4-7%. New 283 farming models could mitigate impacts of aging on agriculture, resulting in a substantial 284 improvement in agricultural sustainability for China. In addition, new farming models 285 would accelerate the transformation of the agricultural sector from traditional 286 smallholder farming to large-scale sustainable agriculture. 287 288 Social co-benefits 289 The implementation of new farming may present a cost-effective solution for China, 290 especially considering the dual challenges of maintaining food security and protecting 291 the environment 24. This strategy would also lead to additional social co-benefits, not 292 limited to agriculture. 293 294 The proportion of the population engaged in agricultural production has continued to 295 fall over time, while the proportion of people employed in non-agricultural sectors has 296 continued to rise (Fig. S7). In China, young people tend to move to cities, leaving older 297 people in rural areas maintaining an involvement in agriculture. But most rural young 298 people do not settle in city, continue to support rural families and eventually return to 299 the countryside. As a result, agriculture is no longer the primary source of income for 300 road divided) are included in this analysis 32. SSP5 (Taking the highway) is excluded 251 due to having a similar population structure to SSP1. Among these scenarios, SSP1 252 includes the world's most pronounced population aging, with more than 60% of the 253 world's population over the age of 65 by 2100 (Fig. S4). Total population first increases 254 in the coming decades and then starts to decrease by the 2060s. Even with high 255 urbanization rates and economic growth under the green development path, high levels 256 of aging would exert substantial negative impacts on socioeconomic development and 257 agricultural production. SSP4 comprises the smallest rate of aging, with only 24% of 258 over 65s in 2100. However, in this scenario, the global population rises to 12.7 billion 259 by 2100, with an urbanization rate of under 60% and a severe slowdown in economic 260 growth. 261 Despite the different assumptions for future development paths, the aging trend 263 continues to rise in all scenarios (Fig. S4). Impacts on agricultural sustainability 151 We found that for China, the abandonment 264 ratio of croplands would increase from 5% in 2020 to 15-47% by 2100 nationally due 265 to aging, while average farm size would decrease by 5-16% (0.04-0.11 ha), and 266 education levels would fall by 8-28% (0.6-2 years) (Fig. 5, S5 and S6). Meanwhile, 267 agricultural performance would decline, with machinery and fertilizer inputs decreasing 268 by 3-5% and 1-5% by 2100, respectively. The overall input per area would reduce by 269 1-2% as well, leading to a decrease in output and profit-cost ratio by 3-5% and 3-13%, 270 respectively. Labor productivity is projected to decrease by about 7-14%, from an $7.2 271 per labor hour in 2020 to $5.2-6.6 in 2100. In addition, FUE would decrease by 5-16%, 272 and fertilizer loss increase by 3-5%. Without interventions, food security challenges 273 and environmental degradation would pose substantial threats to ecosystem and human 274 health and well-being. 275 Fortunately, the decline in agricultural performance caused by aging can be reversed by 277 promoting an increasing uptake of new farming models. With new farming models, 278 average farm size would increase by 11-22% from 2020 to 2100, accompanied by an 279 improvement in the average education level. This would lead to a 14-15% increase in 280 total inputs, a 13-46% increase in mechanization and a 4-5% decrease in fertilizer use. 281 As a result, output and labor productivity would increase by 12-14% and 57-72%, 282 respectively, FUE improve by 12-25% and fertilizer loss be reduced by 4-7%. New 283 farming models could mitigate impacts of aging on agriculture, resulting in a substantial 284 improvement in agricultural sustainability for China. In addition, new farming models 285 would accelerate the transformation of the agricultural sector from traditional 286 smallholder farming to large-scale sustainable agriculture. 287 6 7 rural households. In 2019, income derived from agricultural activities accounted for 301 just 23% of rural household income (Fig. S7). This essentially implies that farmers do 302 not rely on agriculture any more and agricultural vitality is diminishing. 303 304 The increasing number of young people leaving to seek employment in cities may have 305 additional socio-economic impacts, e.g. contributing to a rising mortality rate of rural 306 elderlies and children in recent years 33, 34. Impacts on agricultural sustainability 151 The mortality rate of the elderly over 65 307 years old in rural areas due to accidents, mental illness and suicide is much higher than 308 that in urban areas (Fig. S8). That is mainly because elderly who are left behind in rural 309 areas face additional risks of living alone 33. Furthermore, the mortality rate of children 310 less than 14 years old in rural areas are often greater than for urban locations (Fig. S9). 311 Aside from variations in medical care provision, the greater prevalence of accidental 312 mortality among rural compared to urban children can also be attributed to the neglect 313 of children left behind due to their young parents moving to cities 35, 36. 314 315 However, new farming models can reinvigorate agriculture and improve rural income 316 levels, promoting rural revitalization and common prosperity. Meanwhile, it contributes 317 to the return of young people to their rural villages and hometowns, resolving the issue 318 of elderly and children being left behind on their own and sustaining rural communities. 319 These additional benefits are intertwined with agricultural sustainability, contributing 320 to attaining multiple SDGs. 321 322 Policy changes and feasibility 323 Adverse impacts of population aging would – without policy interventions - be 324 unavoidable in the future, and in particular the impacts on agriculture and rural 325 communities require urgent attention 37. Mitigating these adverse impacts is a great 326 challenge, but also presents a tremendous opportunity, which requires multiple 327 stakeholders’ efforts. Increasing fertility policy is an important measure with long-term 328 benefits to address aging issues despite it may bring challenges on feeding more people. 329 It can directly stimulate childbirth, reduce demographic aging and mitigate its adverse 330 impacts. Under the family planning strategy in China, a couple was restricted to have 331 only one child on average before 2016 13. In recent years, the government has 332 authorized the second and third children to each couple to increase birthrate. Meanwhile, 333 social security measures including maternity subsidies, insurance and maternity leave 334 have been improved gradually. However, changes of fertility policy may not 335 substantially reverse the population aging according to the experiences in other 336 developed countries/regions such as Japan and European Union. Other policies and 337 measures are still required to complement the interventions on aging. Impacts on agricultural sustainability 151 338 339 Policy changes on Hukou and land tenure systems would make the implementation of 340 new farming models feasible, benefiting the controls on adverse impacts of population 341 aging. The smallholder aging issues are mainly due to the unique Chinese household 342 registration system that divides the Chinese population into two categories: rural and 343 urban, allocating lands and other public resources based on the Hukou status of 344 residents 28. The growing urbanization in recent years has resulted in young rural people 345 migrating to cities to engage in non-agricultural sectors, leaving the elderly in rural 346 areas. Rural elders are unable to move to cities because they are unable to access urban 347 social services such as pension and medical care under the restriction of Hukou system. 348 The large rural aging population inhibits the extension of new farming models. Thus, 349 new policies are needed to move rural aging population to urban areas and exchange 350 rural households. In 2019, income derived from agricultural activities accounted for 301 just 23% of rural household income (Fig. S7). This essentially implies that farmers do 302 not rely on agriculture any more and agricultural vitality is diminishing. 303 rural households. In 2019, income derived from agricultural activities accounted for 301 just 23% of rural household income (Fig. S7). This essentially implies that farmers do 302 not rely on agriculture any more and agricultural vitality is diminishing. 303 y g y Adverse impacts of population aging would – without policy interventions - be 324 unavoidable in the future, and in particular the impacts on agriculture and rural 325 communities require urgent attention 37. Mitigating these adverse impacts is a great 326 challenge, but also presents a tremendous opportunity, which requires multiple 327 stakeholders’ efforts. Increasing fertility policy is an important measure with long-term 328 benefits to address aging issues despite it may bring challenges on feeding more people. 329 It can directly stimulate childbirth, reduce demographic aging and mitigate its adverse 330 impacts. Under the family planning strategy in China, a couple was restricted to have 331 only one child on average before 2016 13. In recent years, the government has 332 authorized the second and third children to each couple to increase birthrate. Meanwhile, 333 social security measures including maternity subsidies, insurance and maternity leave 334 have been improved gradually. Impacts on agricultural sustainability 151 However, changes of fertility policy may not 335 substantially reverse the population aging according to the experiences in other 336 developed countries/regions such as Japan and European Union. Other policies and 337 measures are still required to complement the interventions on aging. 338 7 their rural resources (mainly croplands and homesteads) for urban social services, 351 especially the elderly whose children have moved to urban areas. It has been reported 352 that the Jiangsu governments have compensated farmers who give up croplands and 353 migrate to cities with a cash transfer equal to five times their annual income as social 354 security 29. This effectively encourages rural-to-urban migration of aging people. 355 Meanwhile, croplands of these migrating aging farmers can be integrated for large-scale 356 farming and their homesteads can also be reclaimed for farming 38. It is estimated that 357 the reclaimed lands due to rural-to-urban migration under urbanization could increase 358 the cropland area by 4.1% by 2050 nationally, approximately 5.8 million hectares 39. 359 And average farm size can increase from less 0.6 ha to over 16 ha through land 360 consolidation in some regions 40, benefiting the implementation of new farming models. 361 Reforming Hukou and land tenure systems to achieve such changes is an effective 362 pathway for the new farming models 30. 363 their rural resources (mainly croplands and homesteads) for urban social services, 351 especially the elderly whose children have moved to urban areas. It has been reported 352 that the Jiangsu governments have compensated farmers who give up croplands and 353 migrate to cities with a cash transfer equal to five times their annual income as social 354 security 29. This effectively encourages rural-to-urban migration of aging people. 355 Meanwhile, croplands of these migrating aging farmers can be integrated for large-scale 356 farming and their homesteads can also be reclaimed for farming 38. It is estimated that 357 the reclaimed lands due to rural-to-urban migration under urbanization could increase 358 the cropland area by 4.1% by 2050 nationally, approximately 5.8 million hectares 39. 359 And average farm size can increase from less 0.6 ha to over 16 ha through land 360 consolidation in some regions 40, benefiting the implementation of new farming models. 361 Reforming Hukou and land tenure systems to achieve such changes is an effective 362 pathway for the new farming models 30. Impacts on agricultural sustainability 151 363 364 Given the experiences in Jiangsu Providence, it should be feasible for the reform of 365 rural communities through reallocation of lands and other public resources to increase 366 their use efficiencies. Over 40,000 hectares of homesteads have been reclaimed during 367 past decade, suggests that it is not only feasible but also happening in practice 39. These 368 released croplands could be integrated for large-scale new farming, which normally 369 have much higher cost-efficiencies than that in smallholders (Fig. 4). Similarly, urban 370 areas have higher efficiency on the supply of non-agricultural services such as health 371 care and education, and the rural-to-urban migration would benefit the increase of labor 372 productivity through training and better health care. Therefore, it should be cost- 373 effective to compensate rural-to-urban migrated farmers 29. This strategy would bring 374 in multiple social benefits that far outweigh its cost. Increasing cropland area through 375 both homesteads reclamation and decreasing the abandonment benefit food security 376 that is the top priority of national strategy. Improving rural income under new farming 377 models encourages return of young people, promoting rural revitalization and 378 sustainable rural communities. The cost of land consolidation can also be recovered in 379 the following decades, despite a large number of one-time inputs 40. When the 380 environmental and human health benefits are considered, the reforming cost should be 381 much lower than the benefits. Chinese central government has already issued a policy 382 of giving 'Priority to Development of Agriculture, Rural Areas and Farmers' in early 383 2019 to accelerate the construction of large-scale high-standard croplands. These 384 ongoing changes suggest that reforming Chinese agriculture to address the threats of 385 rural population aging on the sustainability of smallholder farming is not only important 386 but also feasible. 387 388 Methods 389 Given the experiences in Jiangsu Providence, it should be feasible for the reform of 365 rural communities through reallocation of lands and other public resources to increase 366 their use efficiencies. Over 40,000 hectares of homesteads have been reclaimed during 367 past decade, suggests that it is not only feasible but also happening in practice 39. These 368 released croplands could be integrated for large-scale new farming, which normally 369 have much higher cost-efficiencies than that in smallholders (Fig. 4). Impacts on agricultural sustainability 151 Similarly, urban 370 areas have higher efficiency on the supply of non-agricultural services such as health 371 care and education, and the rural-to-urban migration would benefit the increase of labor 372 productivity through training and better health care. Therefore, it should be cost- 373 effective to compensate rural-to-urban migrated farmers 29. This strategy would bring 374 in multiple social benefits that far outweigh its cost. Increasing cropland area through 375 both homesteads reclamation and decreasing the abandonment benefit food security 376 that is the top priority of national strategy. Improving rural income under new farming 377 models encourages return of young people, promoting rural revitalization and 378 sustainable rural communities. The cost of land consolidation can also be recovered in 379 the following decades, despite a large number of one-time inputs 40. When the 380 environmental and human health benefits are considered, the reforming cost should be 381 much lower than the benefits. Chinese central government has already issued a policy 382 of giving 'Priority to Development of Agriculture, Rural Areas and Farmers' in early 383 2019 to accelerate the construction of large-scale high-standard croplands. These 384 ongoing changes suggest that reforming Chinese agriculture to address the threats of 385 rural population aging on the sustainability of smallholder farming is not only important 386 but also feasible. 387 The province and country-level population aging and rural aging data was derived ovince and country-level population aging and rural aging data was derived 8 from the China Population & Employment Statistics Yearbook (available at 401 https://data.cnki.net/yearbook/Single/N2021020056). County-level population aging 402 data in 2020 shown in Fig.1c is taken from the Sixth National Census in 2010 403 (available at http://www.stats.gov.cn/tjsj/pcsj/rkpc/6rp/indexch.htm) and weighted by 404 province-level aging data for the year 2020 from the Seventh National Census 405 (available at http://www.stats.gov.cn/tjsj/tjgb/rkpcgb/qgrkpcgb/). County-level farm 406 size data in Fig.1d is from the statistics of the Second National Pollution Census (non- 407 public database), which is averaged by investigated household farm size. 408 409 from the China Population & Employment Statistics Yearbook (available at 401 https://data.cnki.net/yearbook/Single/N2021020056). County-level population aging 402 data in 2020 shown in Fig.1c is taken from the Sixth National Census in 2010 403 (available at http://www.stats.gov.cn/tjsj/pcsj/rkpc/6rp/indexch.htm) and weighted by 404 province-level aging data for the year 2020 from the Seventh National Census 405 (available at http://www.stats.gov.cn/tjsj/tjgb/rkpcgb/qgrkpcgb/). Impacts on agricultural sustainability 151 County-level farm 406 size data in Fig.1d is from the statistics of the Second National Pollution Census (non- 407 public database), which is averaged by investigated household farm size. 408 409 409 We obtained future population data across all age groups based on the Shared 410 Socioeconomic Pathways (SSP) database hosted by the IIASA Energy Program 411 (https://tntcat.iiasa.ac.at/SspDb). In this paper, scenario SSP5 was not considered as 412 its population change is in line with that of scenario SSP1. 413 409 We obtained future population data across all age groups based on the Shared 410 Socioeconomic Pathways (SSP) database hosted by the IIASA Energy Program 411 (https://tntcat.iiasa.ac.at/SspDb). In this paper, scenario SSP5 was not considered as 412 its population change is in line with that of scenario SSP1. 413 We obtained future population data across all age groups based on the Shared 410 Socioeconomic Pathways (SSP) database hosted by the IIASA Energy Program 411 (https://tntcat.iiasa.ac.at/SspDb). In this paper, scenario SSP5 was not considered as 412 its population change is in line with that of scenario SSP1. 413 Statistical analysis. CRHPS data allowed estimating the relationships between 415 population aging and agricultural performance. Aging ratio, the proportion of people 416 65 years and older in rural households, was adopted as an indicator to demonstrate 417 population aging at household-level. Adult farmer’s ratio, defined as the proportion of 418 people over 15 but less 64 years old in rural households, was also considered to 419 demonstrate age groups. Nine different indicators were determined to illustrate 420 agricultural sustainability, including farm size (ha), education (yr), labor productivity 421 ($ hr-1), total agricultural input ($ ha-1), output ($ ha-1), profit-cost ratio, machine input 422 ($ ha-1), fertilizer input ($ ha-1) and fertilizer use efficiency (FUE). Other variables 423 concerning transferred-out cropland, abandoned cropland, pesticide, pesticide use 424 efficiency, manure and technology adoption were also incorporated to demonstrate 425 agricultural performance changes under population aging. The detailed interpretation 426 of these indicators is documented in Supplementary Information. 427 428 To explore the relationships between population aging and agricultural sustainability, 429 we first used a fixed effect panel (FEP) regression model to conduct the longitudinal 430 analysis, while controlling for confounding factors such as crop type, plot numbers, 431 regional and year effect. Impacts on agricultural sustainability 151 We estimated the following equation using data on 432 households from 2015, 2017 and 2019: 433 𝐴𝑔𝑟𝑖𝑐𝑢𝑙𝑡𝑢𝑟𝑒𝑖𝑡= 𝛼+ 𝛽∙𝐴𝑔𝑖𝑛𝑔𝑖𝑡+ 𝛾∙𝐸𝑑𝑢𝑐𝑎𝑡𝑖𝑜𝑛𝑖𝑡+ 𝛿∙𝐹𝑎𝑟𝑚𝑠𝑖𝑧𝑒𝑖𝑡+ 434 ∑ 𝜃𝑚∙𝑝𝑚𝑖𝑡 𝑚 + 𝜀𝑖𝑡+ 𝜎𝑘 (1) 435 𝐴𝑔𝑟𝑖𝑐𝑢𝑙𝑡𝑢𝑟𝑒𝑖𝑡= 𝛼+ 𝛽∙𝐴𝑔𝑖𝑛𝑔𝑖𝑡+ 𝛾∙𝐸𝑑𝑢𝑐𝑎𝑡𝑖𝑜𝑛𝑖𝑡+ 𝛿∙𝐹𝑎𝑟𝑚𝑠𝑖𝑧𝑒𝑖𝑡+ 434 ∑ 𝜃𝑚∙𝑝𝑚𝑖𝑡 𝑚 + 𝜀𝑖𝑡+ 𝜎𝑘 (1) 435 𝑖𝑡+ (1) ∑ 𝜃𝑚∙𝑝𝑚𝑖𝑡 𝑚 + 𝜀𝑖𝑡+ 𝜎𝑘 where subscript i, k and t denote household, county and time, respectively. 436 𝐴𝑔𝑟𝑖𝑐𝑢𝑙𝑡𝑢𝑟𝑒𝑖𝑡 refers to the agricultural sustainability indicators and other inputs and 437 outputs on household level. 𝐴𝑔𝑖𝑛𝑔 refers to the proportion of people ≥ 65 years in 438 rural households. 𝐸𝑑𝑢𝑐𝑎𝑡𝑖𝑜𝑛 refers to average years of education of family 439 members aged 15 and over. 𝐹𝑎𝑟𝑚𝑠𝑖𝑧𝑒 is the logarithm of total cultivated area 440 covering all crops. 𝑝𝑚 is control variable including adult farmer’s ratio, income ratio 441 from non-agricultural sectors, crop type, plot numbers, county-level regional effect 442 and year effect. 𝛼 is a constant, 𝜀𝑖𝑡 and 𝜎𝑘 are error items. 𝛽, 𝛾, 𝛿 𝑎𝑛𝑑 𝜃 are 443 coefficients that need to be estimated. The detailed results are listed in Table 1 and S1. 444 445 Given too many zeros in variables of variables of transfer-out cropland, abandoned 446 cropland, machine input and owned, and manure fertilizer input, we also used a Tobit 447 regression model to validate the relationship between these variables and aging. We 448 estimated the following equation using data on households in 2015, 2017 and 2019: 449 9 𝑦𝑖𝑡 ∗= 𝛼+ 𝛽∙𝐴𝑔𝑖𝑛𝑔𝑖𝑡+ 𝛾∙𝐸𝑑𝑢𝑐𝑎𝑡𝑖𝑜𝑛𝑖𝑡+ 𝛿∙𝐹𝑎𝑟𝑚𝑠𝑖𝑧𝑒𝑖𝑡+ ∑𝜑𝑛𝑞𝑛,𝑖𝑡 𝑛 + 𝜀𝑖𝑡 450 (2) 451 where subscript i and t denote household and time, respectively. 𝑦𝑗𝑡 ∗ refers to latent 452 variables including transfer-out cropland, abandoned cropland, machine input and 453 owned, and manure fertilizer input in each household. Latent variables can be 454 observed when over 0, truncated at 0 when the value is equal to 0 or less 0. 𝐴𝑔𝑖𝑛𝑔 455 refers to the proportion of people over 65 years old in rural households. 𝐸𝑑𝑢𝑐𝑎𝑡𝑖𝑜𝑛 456 refers to average years of education of family members aged 15 and over. 𝐹𝑎𝑟𝑚𝑠𝑖𝑧𝑒 457 is the logarithm of total cultivated area covering all crops. 𝑞𝑛 is control variable 458 including adult farmer’s ratio, income ratio from non-agricultural sectors, crop type, 459 plot numbers, city-level regional effect and year effect. 𝛼 is a constant and 𝜀𝑖𝑡 is the 460 error item. 𝛽, 𝛾, 𝛿 𝑎𝑛𝑑 𝜑 are coefficients that need to be estimated. Impacts on agricultural sustainability 151 Farm size was 461 removed in explaining variables in the equation with explained variable of transfer- 462 out and abandoned cropland considering multi-collinearity. The results are listed in 463 Table 1 and S1. 464 The latent variable is expressed in terms of the observed variable 𝑦𝑖𝑡 ∗ in the following 465 form: 466 {𝑦𝑖𝑡= 𝑦𝑖𝑡 ∗ 𝑖𝑓 𝑦𝑖𝑡 ∗> 0 𝑦𝑖𝑡= 0 𝑖𝑓 𝑦𝑖𝑡 ∗≤0 (3) 467 468 Besides, a Logit regression model was adopted as technology adoption (Tech) is a 469 binary variable. This model is formulated as follows based on household-level data 470 from 2015, 2017 and 2019: 471 𝐿𝑜𝑔𝑖𝑡{𝑃𝑖𝑡(Tech𝑖𝑡= 1)} = 𝛼+ 𝛽1 ∙𝐴𝑔𝑒𝑖𝑡+ 𝛽2 ∙𝐴𝑔𝑒𝑖𝑡 2 + 𝛾∙𝐸𝑑𝑢𝑐𝑎𝑡𝑖𝑜𝑛𝑖𝑡+ 𝛿∙ 472 𝐹𝑎𝑟𝑚𝑠𝑖𝑧𝑒𝑖𝑡+ ∑𝜑𝑛𝑞𝑛,𝑖𝑡 𝑛 + 𝜀𝑖𝑡 (4) 473 where subscript i and t denotes household and time, respectively. 𝑃𝑖𝑡 is the probability 474 of the occurrence of Tech (Tech𝑖𝑡=1: event occurs; Tech𝑖𝑡=0: event does not occur). 475 𝐴𝑔𝑒 refers to the log-transformed age of the head of the investigated household. 476 𝐸𝑑𝑢𝑐𝑎𝑡𝑖𝑜𝑛 refers to education years of the head of the investigated household. 477 𝐹𝑎𝑟𝑚𝑠𝑖𝑧𝑒 is the logarithm of total cultivated area covering all crops. 𝑞𝑛 is control 478 variable including income ratio from non-agricultural sectors, crop type, plot 479 numbers, city-level regional effect and year effect. 𝛼 is a constant and 𝜀𝑖𝑡 is the 480 error item. 𝛽, 𝛾, 𝛿 𝑎𝑛𝑑 𝜑 are coefficients that need to be estimated. The results are 481 listed in Table S1. 482 483 To test the difference of agricultural performance of traditional and new farming 484 model under aging, a binary variable indicating the occurrence of new farming (NF𝑖𝑡) 485 (NF𝑖𝑡=1: event occurs; NF=0: event does not occur) was introduced based on Eq. (1) 486 and (2). The equations are expressed in the following forms: 487 𝐴𝑔𝑟𝑖𝑐𝑢𝑙𝑡𝑢𝑟𝑒𝑖𝑡= 𝛼+ 𝜔∙NF𝑖𝑡+ 𝛽∙𝐴𝑔𝑖𝑛𝑔𝑖𝑡+ 𝛾∙𝐸𝑑𝑢𝑐𝑎𝑡𝑖𝑜𝑛𝑖𝑡+ 𝛿∙𝐹𝑎𝑟𝑚𝑠𝑖𝑧𝑒𝑖𝑡+ 488 ∑ 𝜃𝑚∙𝑝𝑚𝑖𝑡 𝑚 + 𝜀𝑖𝑡 + 𝜎𝑘 (5) 489 𝑦𝑖𝑡 ∗= 𝛼+ 𝜔∙NF𝑖𝑡+ 𝛽∙𝐴𝑔𝑖𝑛𝑔𝑖𝑡+ 𝛾∙𝐸𝑑𝑢𝑐𝑎𝑡𝑖𝑜𝑛𝑖𝑡+ 𝛿∙𝐹𝑎𝑟𝑚𝑠𝑖𝑧𝑒𝑖𝑡+ 490 ∑𝜑𝑛𝑞𝑛,𝑖𝑡 𝑛 + 𝜀𝑖𝑡 (6) 491 𝜔, 𝛽, 𝛾, 𝛿, 𝜃 𝑎𝑛𝑑 𝜑 are coefficients that need to be estimated. Related results are listed 492 in Table S4. Note that as new farming is not widely prompted in China, new farming 493 data is limited. Thus, we consider that when the variable NF with p<0.05 in Table S4, 494 there is a significant difference. Impacts on agricultural sustainability 151 495 496 𝑦𝑖𝑡 ∗= 𝛼+ 𝛽∙𝐴𝑔𝑖𝑛𝑔𝑖𝑡+ 𝛾∙𝐸𝑑𝑢𝑐𝑎𝑡𝑖𝑜𝑛𝑖𝑡+ 𝛿∙𝐹𝑎𝑟𝑚𝑠𝑖𝑧𝑒𝑖𝑡+ ∑𝜑𝑛𝑞𝑛,𝑖𝑡 𝑛 + 𝜀𝑖𝑡 450 (2) 451 𝑦𝑖𝑡 ∗= 𝛼+ 𝛽∙𝐴𝑔𝑖𝑛𝑔𝑖𝑡+ 𝛾∙𝐸𝑑𝑢𝑐𝑎𝑡𝑖𝑜𝑛𝑖𝑡+ 𝛿∙𝐹𝑎𝑟𝑚𝑠𝑖𝑧𝑒𝑖𝑡+ ∑𝜑𝑛𝑞𝑛,𝑖𝑡 𝑛 + 𝜀𝑖𝑡 (2) (2) (2) 451 where subscript i and t denote household and time, respectively. 𝑦𝑗𝑡 ∗ refers to latent 452 variables including transfer-out cropland, abandoned cropland, machine input and 453 owned, and manure fertilizer input in each household. Latent variables can be 454 observed when over 0, truncated at 0 when the value is equal to 0 or less 0. 𝐴𝑔𝑖𝑛𝑔 455 refers to the proportion of people over 65 years old in rural households. 𝐸𝑑𝑢𝑐𝑎𝑡𝑖𝑜𝑛 456 refers to average years of education of family members aged 15 and over. 𝐹𝑎𝑟𝑚𝑠𝑖𝑧𝑒 457 is the logarithm of total cultivated area covering all crops. 𝑞𝑛 is control variable 458 including adult farmer’s ratio, income ratio from non-agricultural sectors, crop type, 459 plot numbers, city-level regional effect and year effect. 𝛼 is a constant and 𝜀𝑖𝑡 is the 460 error item. 𝛽, 𝛾, 𝛿 𝑎𝑛𝑑 𝜑 are coefficients that need to be estimated. Farm size was 461 removed in explaining variables in the equation with explained variable of transfer- 462 out and abandoned cropland considering multi-collinearity. The results are listed in 463 Table 1 and S1. 464 The latent variable is expressed in terms of the observed variable 𝑦𝑖𝑡 ∗ in the following 465 form: 466 {𝑦𝑖𝑡= 𝑦𝑖𝑡 ∗ 𝑖𝑓 𝑦𝑖𝑡 ∗> 0 𝑦𝑖𝑡= 0 𝑖𝑓 𝑦𝑖𝑡 ∗≤0 (3) {𝑦𝑖𝑡= 𝑦𝑖𝑡 ∗ 𝑖𝑓 𝑦𝑖𝑡 ∗> 0 𝑦𝑖𝑡= 0 𝑖𝑓 𝑦𝑖𝑡 ∗≤0 (3) (3) Besides, a Logit regression model was adopted as technology adoption (Tech) is a 469 binary variable. This model is formulated as follows based on household-level data 470 from 2015, 2017 and 2019: 471 𝐿𝑜𝑔𝑖𝑡{𝑃𝑖𝑡(Tech𝑖𝑡= 1)} = 𝛼+ 𝛽1 ∙𝐴𝑔𝑒𝑖𝑡+ 𝛽2 ∙𝐴𝑔𝑒𝑖𝑡 2 + 𝛾∙𝐸𝑑𝑢𝑐𝑎𝑡𝑖𝑜𝑛𝑖𝑡+ 𝛿∙ 𝐹𝑎𝑟𝑚𝑠𝑖𝑧𝑒𝑖𝑡+ ∑𝜑𝑛𝑞𝑛,𝑖𝑡 𝑛 + 𝜀𝑖𝑡 (4) 𝑖𝑡 𝐹𝑎𝑟𝑚𝑠𝑖𝑧𝑒𝑖𝑡+ ∑𝜑𝑛𝑞𝑛,𝑖𝑡 𝑛 + 𝜀𝑖𝑡 where subscript i and t denotes household and time, respectively. 𝑃𝑖𝑡 is the probability p , p y 𝑖𝑡 p y of the occurrence of Tech (Tech𝑖𝑡=1: event occurs; Tech𝑖𝑡=0: event does not occur). q p g 𝑢𝑟𝑒𝑖𝑡= 𝛼+ 𝜔∙NF𝑖𝑡+ 𝛽∙𝐴𝑔𝑖𝑛𝑔𝑖𝑡+ 𝛾∙𝐸𝑑𝑢𝑐𝑎𝑡𝑖𝑜𝑛𝑖𝑡+ 𝛿∙𝐹𝑎𝑟𝑚𝑠𝑖𝑧𝑒𝑖𝑡+ ∑ 𝜃𝑚∙𝑝𝑚𝑖𝑡 𝑚 + 𝜀𝑖𝑡 + 𝜎𝑘 (5) 𝑦𝑖𝑡 ∗= 𝛼+ 𝜔∙NF𝑖𝑡+ 𝛽∙𝐴𝑔𝑖𝑛𝑔𝑖𝑡+ 𝛾∙𝐸𝑑𝑢𝑐𝑎𝑡𝑖𝑜𝑛𝑖𝑡+ 𝛿∙𝐹𝑎𝑟𝑚𝑠𝑖𝑧𝑒𝑖𝑡+ ∑𝜑𝑛𝑞𝑛,𝑖𝑡 𝑛 + 𝜀𝑖𝑡 (6) 𝜔, 𝛽, 𝛾, 𝛿, 𝜃 𝑎𝑛𝑑 𝜑 are coefficients that need to be estimated. Related results are listed 492 in Table S4. Impacts on agricultural sustainability 151 Note that as new farming is not widely prompted in China, new farming 493 data is limited. Thus, we consider that when the variable NF with p<0.05 in Table S4, 494 there is a significant difference. 495 10 Meanwhile, we replaced aging ratio with the age of the head of the investigated 497 household and average education years with the head’s education for a robustness 498 check. The results of this robustness check are detailed in Table S1 and S5. 499 500 We then used a structural equation model (SEM) to understand the direct and 501 indirect effects of aging on agriculture 41. Considering the multi-collinearity of 502 agricultural indicators, such as output with labor productivity, fertilizer input with 503 total input, only some of typical indicators were selected. Also, we excluded 504 variables with nonlinear relationships with aging (e.g. machine input) to deduce 505 comparable standardized path coefficients. Income ratio from non-agricultural 506 sectors and the ratio of cash crops area to total cultivated area were controlled when 507 doing SEM analysis. In this model, the goodness-of-fit statistics are reasonable 508 based on CRHPS data in 2019: non-normed fit index (NNFI) > 0.90, comparative 509 fit index (CFI) > 0.90, root mean square error (RMSE) < 0.05, and standardized 510 root mean square residual (SRMR) < 0.05. Using the results from the SEM, the 511 direct and indirect effects of aging with standardized path coefficients are shown in 512 Fig.2. 513 514 Summary statistics for main variables used in statistical regression analysis are 515 listed in Table S7. We did all statistical analysis in Stata12.0 software. 516 517 Impact of aging on agricultural sustainability. We assume that the population age 518 distribution remains at the 1990 level to represent no aging. Province-level population 519 data for 1990 from the China Population & Employment Statistics Yearbook was 520 introduced after weighting by the difference between this data and CRHPS to reduce 521 the error caused by variations in data stemming from different databases. Then 522 province-level population data was downscaled to household-level proportionally. 523 Finally, aging and adult farmer’s ratio without aging are deduced. We assume that other 524 variables remain the same and calculated the predicted value of agriculture without 525 aging on each household based on coefficients estimated in Eq. (1). Impacts on agricultural sustainability 151 For household i, 526 the predicted without aging is calculated as follows: 527 𝑌𝑖𝑗𝑡 𝑃𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑊𝑖𝑡ℎ𝑜𝑢𝑡 𝐴𝑔𝑖𝑛𝑔= exp(𝐿𝑛 𝑌𝑖𝑗𝑡 𝑂𝑏𝑠𝑒𝑟𝑣𝑒𝑑 + 𝐿𝑛 𝑌𝑖𝑗𝑡 𝑊𝑖𝑡ℎ𝑜𝑢𝑡 𝐴𝑔𝑖𝑛𝑔−𝐿𝑛 𝑌𝑖𝑗𝑡 𝑊𝑖𝑡ℎ 𝐴𝑔𝑖𝑛𝑔) 528 (7) 529 where the subscript i, j and t denote household, explained variable and year, respectively. 530 𝑌𝑗 includes farm size, output, input, labor productivity, fertilization and 531 FUE. 𝑌𝑖𝑗𝑡 𝑂𝑏𝑠𝑒𝑟𝑣𝑒𝑑 refers to the observed value of each household. 𝑌𝑖𝑗𝑡 𝑊𝑖𝑡ℎ𝑜𝑢𝑡 𝐴𝑔𝑖𝑛𝑔 is the 532 deduced value based on estimated coefficients in Eq. (1) using the aging and adult 533 farmer’s ratio data in 1990. 𝑌𝑖𝑗𝑡 𝑊𝑖𝑡ℎ 𝐴𝑔𝑖𝑛𝑔 is the deduced value using the observed aging 534 and adult farmer’s ratio (age over 15 but less than 64) data from CRHPS. For explained 535 variables without log-transformed such as education and profit-cost ratio, the predicted 536 is calculated as follows: 537 𝑌𝑖𝑗𝑡 𝑃𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑊𝑖𝑡ℎ𝑜𝑢𝑡 𝐴𝑔𝑖𝑛𝑔= 𝑌𝑖𝑗𝑡 𝑂𝑏𝑠𝑒𝑟𝑣𝑒𝑑+ 𝑌𝑖𝑗𝑡 𝑊𝑖𝑡ℎ𝑜𝑢𝑡 𝐴𝑔𝑖𝑛𝑔−𝑌𝑖𝑗𝑡 𝑊𝑖𝑡ℎ 𝐴𝑔𝑖𝑛𝑔 538 (8) 539 𝑌𝑗 includes education and profit-cost ratio. 540 For some variables with nonlinear relationship with aging, the following equation was 541 adopted to calculate the impact of aging based on Eq. (2): 542 Meanwhile, we replaced aging ratio with the age of the head of the investigated 497 household and average education years with the head’s education for a robustness 498 check. The results of this robustness check are detailed in Table S1 and S5. 499 11 g y check. The results of this robustness check are detailed in Table S1 and S5. 499 500 We then used a structural equation model (SEM) to understand the direct and 501 indirect effects of aging on agriculture 41. Considering the multi-collinearity of 502 agricultural indicators, such as output with labor productivity, fertilizer input with 503 total input, only some of typical indicators were selected. Also, we excluded 504 variables with nonlinear relationships with aging (e.g. machine input) to deduce 505 comparable standardized path coefficients. Income ratio from non-agricultural 506 sectors and the ratio of cash crops area to total cultivated area were controlled when 507 doing SEM analysis. In this model, the goodness-of-fit statistics are reasonable 508 based on CRHPS data in 2019: non-normed fit index (NNFI) > 0.90, comparative 509 fit index (CFI) > 0.90, root mean square error (RMSE) < 0.05, and standardized 510 root mean square residual (SRMR) < 0.05. Impacts on agricultural sustainability 151 Using the results from the SEM, the 511 direct and indirect effects of aging with standardized path coefficients are shown in 512 Fig.2. 513 514 Summary statistics for main variables used in statistical regression analysis are 515 listed in Table S7. We did all statistical analysis in Stata12.0 software. 516 517 Impact of aging on agricultural sustainability. We assume that the population age 518 distribution remains at the 1990 level to represent no aging. Province-level population 519 data for 1990 from the China Population & Employment Statistics Yearbook was 520 introduced after weighting by the difference between this data and CRHPS to reduce 521 the error caused by variations in data stemming from different databases. Then 522 province-level population data was downscaled to household-level proportionally. 523 Finally, aging and adult farmer’s ratio without aging are deduced. We assume that other 524 variables remain the same and calculated the predicted value of agriculture without 525 aging on each household based on coefficients estimated in Eq. (1). For household i, 526 the predicted without aging is calculated as follows: 527 𝑌𝑖𝑗𝑡 𝑃𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑊𝑖𝑡ℎ𝑜𝑢𝑡 𝐴𝑔𝑖𝑛𝑔= exp(𝐿𝑛 𝑌𝑖𝑗𝑡 𝑂𝑏𝑠𝑒𝑟𝑣𝑒𝑑 + 𝐿𝑛 𝑌𝑖𝑗𝑡 𝑊𝑖𝑡ℎ𝑜𝑢𝑡 𝐴𝑔𝑖𝑛𝑔−𝐿𝑛 𝑌𝑖𝑗𝑡 𝑊𝑖𝑡ℎ 𝐴𝑔𝑖𝑛𝑔) 528 (7) 529 where the subscript i, j and t denote household, explained variable and year, respectively. 530 𝑌𝑗 includes farm size, output, input, labor productivity, fertilization and 531 FUE. 𝑌𝑖𝑗𝑡 𝑂𝑏𝑠𝑒𝑟𝑣𝑒𝑑 refers to the observed value of each household. 𝑌𝑖𝑗𝑡 𝑊𝑖𝑡ℎ𝑜𝑢𝑡 𝐴𝑔𝑖𝑛𝑔 is the 532 deduced value based on estimated coefficients in Eq. (1) using the aging and adult 533 farmer’s ratio data in 1990. 𝑌𝑖𝑗𝑡 𝑊𝑖𝑡ℎ 𝐴𝑔𝑖𝑛𝑔 is the deduced value using the observed aging 534 and adult farmer’s ratio (age over 15 but less than 64) data from CRHPS. For explained 535 variables without log-transformed such as education and profit-cost ratio, the predicted 536 is calculated as follows: 537 𝑌𝑖𝑗𝑡 𝑃𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑊𝑖𝑡ℎ𝑜𝑢𝑡 𝐴𝑔𝑖𝑛𝑔= 𝑌𝑖𝑗𝑡 𝑂𝑏𝑠𝑒𝑟𝑣𝑒𝑑+ 𝑌𝑖𝑗𝑡 𝑊𝑖𝑡ℎ𝑜𝑢𝑡 𝐴𝑔𝑖𝑛𝑔−𝑌𝑖𝑗𝑡 𝑊𝑖𝑡ℎ 𝐴𝑔𝑖𝑛𝑔 538 (8) 539 𝑌𝑗 includes education and profit-cost ratio. 540 For some variables with nonlinear relationship with aging, the following equation was 541 adopted to calculate the impact of aging based on Eq. (2): 542 𝐼𝑚𝑝𝑎𝑐𝑡𝑖𝑗𝑡= 𝛽∙∆𝐴𝑔𝑖𝑛𝑔𝑖𝑗𝑡+ 𝛾∙∆𝐸𝑑𝑢𝑐𝑎𝑡𝑖𝑜𝑛𝑖𝑗𝑡+ 𝛿∙∆𝐹𝑎𝑟𝑚𝑠𝑖𝑧𝑒𝑖𝑗𝑡+ 𝜑1 ∙ 543 ∆𝐴𝑑𝑢𝑙𝑡𝑖𝑗𝑡 (9) 544 We then used a structural equation model (SEM) to understand the direct and 501 indirect effects of aging on agriculture 41. Impacts on agricultural sustainability 151 Considering the multi-collinearity of 502 agricultural indicators, such as output with labor productivity, fertilizer input with 503 total input, only some of typical indicators were selected. Also, we excluded 504 variables with nonlinear relationships with aging (e.g. machine input) to deduce 505 comparable standardized path coefficients. Income ratio from non-agricultural 506 sectors and the ratio of cash crops area to total cultivated area were controlled when 507 doing SEM analysis. In this model, the goodness-of-fit statistics are reasonable 508 based on CRHPS data in 2019: non-normed fit index (NNFI) > 0.90, comparative 509 fit index (CFI) > 0.90, root mean square error (RMSE) < 0.05, and standardized 510 root mean square residual (SRMR) < 0.05. Using the results from the SEM, the 511 direct and indirect effects of aging with standardized path coefficients are shown in 512 Fig.2. 513 Summary statistics for main variables used in statistical regression analysis are listed in Table S7. We did all statistical analysis in Stata12.0 software. g g 𝑜𝑢𝑡 𝐴𝑔𝑖𝑛𝑔= exp(𝐿𝑛 𝑌𝑖𝑗𝑡 𝑂𝑏𝑠𝑒𝑟𝑣𝑒𝑑 + 𝐿𝑛 𝑌𝑖𝑗𝑡 𝑊𝑖𝑡ℎ𝑜𝑢𝑡 𝐴𝑔𝑖𝑛𝑔−𝐿𝑛 𝑌𝑖𝑗𝑡 𝑊𝑖𝑡ℎ 𝐴𝑔𝑖𝑛𝑔) (7) (8) (9) 11 where the subscript i, j and t denote household, explained variable and year, respectively. 545 ∆ refers to the value difference with and without aging. 𝑌𝑗 includes abandoned 546 cropland and machine input. 𝐴𝑑𝑢𝑙𝑡𝑖𝑗𝑡 refers to adult farmer’s ratio in rural household. 547 Then the predicted value on each household without aging was calculated: 548 𝑌𝑖𝑗𝑡 𝑃𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑊𝑖𝑡ℎ𝑜𝑢𝑡 𝐴𝑔𝑖𝑛𝑔= 𝑌𝑖𝑗𝑡 𝑂𝑏𝑠𝑒𝑟𝑣𝑒𝑑−𝐼𝑚𝑝𝑎𝑐𝑡𝑖𝑗𝑡 (10) 549 Note that we first derived the predicted education without aging. Then abandoned 550 cropland area was derived based on predicted education as it is one of the explanatory 551 variables. Farm size was derived based on predicted education and considering 552 abandoned cropland changes. The remaining variables were finally calculated based on 553 predicted education and farm size. 554 555 When the household-level predicted value in 2019 was calculated, the provincial 556 predicted means including input, output, machine and fertilization were averaged after 557 weighted by the total cultivated area on province-level. The rest were arithmetic 558 averages. 559 560 Scenario analysis. We based our analysis of future socio-economic development on 561 the SSP scenarios to determine the impact of population aging on agricultural 562 sustainability. We obtained population age data (2015-2100) from the SSP database. Impacts on agricultural sustainability 151 547 Then the predicted value on each household without aging was calculated: 548 𝑌𝑖𝑗𝑡 𝑃𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑊𝑖𝑡ℎ𝑜𝑢𝑡 𝐴𝑔𝑖𝑛𝑔= 𝑌𝑖𝑗𝑡 𝑂𝑏𝑠𝑒𝑟𝑣𝑒𝑑−𝐼𝑚𝑝𝑎𝑐𝑡𝑖𝑗𝑡 (10) 549 g g 𝑌𝑖𝑗𝑡 𝑃𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑊𝑖𝑡ℎ𝑜𝑢𝑡 𝐴𝑔𝑖𝑛𝑔= 𝑌𝑖𝑗𝑡 𝑂𝑏𝑠𝑒𝑟𝑣𝑒𝑑−𝐼𝑚𝑝𝑎𝑐𝑡𝑖𝑗𝑡 (10) (10) Note that we first derived the predicted education without aging. Then abandoned 550 cropland area was derived based on predicted education as it is one of the explanatory 551 variables. Farm size was derived based on predicted education and considering 552 abandoned cropland changes. The remaining variables were finally calculated based on 553 predicted education and farm size. 554 When the household-level predicted value in 2019 was calculated, the provincial 556 predicted means including input, output, machine and fertilization were averaged after 557 weighted by the total cultivated area on province-level. The rest were arithmetic 558 averages. 559 Scenario analysis. We based our analysis of future socio-economic development on 561 the SSP scenarios to determine the impact of population aging on agricultural 562 sustainability. We obtained population age data (2015-2100) from the SSP database. We 563 undertook a comparison between the population age data for 2015 in the SSP and 564 CRHPS databases, and weighted aging and adult farmer’s ratio by their difference to 565 reduce the error. Then country-level population data was downscaled to household level 566 proportionally. Then the aging and adult farmer’s ratio data of the SSP scenarios for the 567 period between 2020 and 2100 were calculated for each household. Finally, the 568 predicted values (𝑌𝑖𝑗𝑡 𝑃𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑆𝑆𝑃 ) of nine agricultural sustainability indicators and 569 abandoned cropland under future aging were calculated based on Eqns. (7), (8), (9) and 570 (10) under the hypothesis that other variables remain stable at 2019 levels. The 571 equations are expressed in the following forms: 572 q p g 𝑌𝑖𝑗𝑡 𝑃𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑆𝑆𝑃= exp(𝐿𝑛 𝑌𝑖𝑗,2019 𝑂𝑏𝑠𝑒𝑟𝑣𝑒𝑑 + 𝐿𝑛 𝑌𝑖𝑗𝑡 𝑆𝑆𝑃−𝐿𝑛 𝑌𝑖𝑗,2019 𝑊𝑖𝑡ℎ 𝐴𝑔𝑖𝑛𝑔) (11) 573 𝑌𝑖𝑗𝑡 𝑃𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑆𝑆𝑃= 𝑌𝑖𝑗,2019 𝑂𝑏𝑠𝑒𝑟𝑣𝑒𝑑+ 𝑌𝑖𝑗𝑡 𝑆𝑆𝑃−𝑌𝑖𝑗,2019 𝑊𝑖𝑡ℎ 𝐴𝑔𝑖𝑛𝑔 (12) 574 𝐼𝑚𝑝𝑎𝑐𝑡𝑖𝑗𝑡= 𝛽∙∆𝐴𝑔𝑖𝑛𝑔𝑖𝑗𝑡+ 𝛾∙∆𝐸𝑑𝑢𝑐𝑎𝑡𝑖𝑜𝑛𝑖𝑗𝑡+ 𝛿∙∆𝐹𝑎𝑟𝑚𝑠𝑖𝑧𝑒𝑖𝑗𝑡+ 𝜑1 ∙ 575 ∆𝐴𝑑𝑢𝑙𝑡𝑖𝑗𝑡 (13) 576 𝑌𝑖𝑗𝑡 𝑃𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑆𝑆𝑃= 𝑌𝑖𝑗𝑡 𝑂𝑏𝑠𝑒𝑟𝑣𝑒𝑑−𝐼𝑚𝑝𝑎𝑐𝑡𝑖𝑗𝑡 (14) 577 ∆ in Eq. (13) refers to the value difference between year 2019 and year t. 578 (11) (11) (12) (12) (14) To improve agricultural performance and estimate the effectiveness of mitigating 580 negative impacts of future population aging, we assume that new farming models will 581 be promoted as a key element of future agricultural sector development. Impacts on agricultural sustainability 151 We 563 undertook a comparison between the population age data for 2015 in the SSP and 564 CRHPS databases, and weighted aging and adult farmer’s ratio by their difference to 565 reduce the error. Then country-level population data was downscaled to household level 566 proportionally. Then the aging and adult farmer’s ratio data of the SSP scenarios for the 567 period between 2020 and 2100 were calculated for each household. Finally, the 568 predicted values (𝑌𝑖𝑗𝑡 𝑃𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑆𝑆𝑃 ) of nine agricultural sustainability indicators and 569 abandoned cropland under future aging were calculated based on Eqns. (7), (8), (9) and 570 (10) under the hypothesis that other variables remain stable at 2019 levels. The 571 equations are expressed in the following forms: 572 𝑌𝑖𝑗𝑡 𝑃𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑆𝑆𝑃= exp(𝐿𝑛 𝑌𝑖𝑗,2019 𝑂𝑏𝑠𝑒𝑟𝑣𝑒𝑑 + 𝐿𝑛 𝑌𝑖𝑗𝑡 𝑆𝑆𝑃−𝐿𝑛 𝑌𝑖𝑗,2019 𝑊𝑖𝑡ℎ 𝐴𝑔𝑖𝑛𝑔) (11) 573 𝑌𝑖𝑗𝑡 𝑃𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑆𝑆𝑃= 𝑌𝑖𝑗,2019 𝑂𝑏𝑠𝑒𝑟𝑣𝑒𝑑+ 𝑌𝑖𝑗𝑡 𝑆𝑆𝑃−𝑌𝑖𝑗,2019 𝑊𝑖𝑡ℎ 𝐴𝑔𝑖𝑛𝑔 (12) 574 𝐼𝑚𝑝𝑎𝑐𝑡𝑖𝑗𝑡= 𝛽∙∆𝐴𝑔𝑖𝑛𝑔𝑖𝑗𝑡+ 𝛾∙∆𝐸𝑑𝑢𝑐𝑎𝑡𝑖𝑜𝑛𝑖𝑗𝑡+ 𝛿∙∆𝐹𝑎𝑟𝑚𝑠𝑖𝑧𝑒𝑖𝑗𝑡+ 𝜑1 ∙ 575 ∆𝐴𝑑𝑢𝑙𝑡𝑖𝑗𝑡 (13) 576 𝑌𝑖𝑗𝑡 𝑃𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑆𝑆𝑃= 𝑌𝑖𝑗𝑡 𝑂𝑏𝑠𝑒𝑟𝑣𝑒𝑑−𝐼𝑚𝑝𝑎𝑐𝑡𝑖𝑗𝑡 (14) 577 ∆ in Eq. (13) refers to the value difference between year 2019 and year t. 578 579 To improve agricultural performance and estimate the effectiveness of mitigating 580 negative impacts of future population aging, we assume that new farming models will 581 be promoted as a key element of future agricultural sector development. Based on the 582 relative sector share of the new farming models, which is 2% in 2019, we hypothesize 583 that its coverage will increase by about 1.2% annually, reaching 100% by 2100. For 584 household i, the predicted value of nine agricultural sustainability indicators and 585 abandoned cropland under new farming is calculated as follows: 586 𝑌𝑖𝑗𝑡 𝑃𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑁𝐹= exp(𝐿𝑛 𝑌𝑖𝑗𝑡 𝑃𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑆𝑆𝑃+ 𝜌𝑗∙𝐶𝑜𝑣𝑒𝑟𝑎𝑔𝑒𝑡) 587 (15) 588 where the subscript i, j and t denote household, explained variable and year, respectively. 589 𝑌 i l d f i t t i t l b d ti it f tili ti d FUE 590 where the subscript i, j and t denote household, explained variable and year, respectively. 545 ∆ refers to the value difference with and without aging. 𝑌𝑗 includes abandoned 546 cropland and machine input. 𝐴𝑑𝑢𝑙𝑡𝑖𝑗𝑡 refers to adult farmer’s ratio in rural household. Impacts on agricultural sustainability 151 Based on the 582 relative sector share of the new farming models, which is 2% in 2019, we hypothesize 583 that its coverage will increase by about 1.2% annually, reaching 100% by 2100. For 584 household i, the predicted value of nine agricultural sustainability indicators and 585 abandoned cropland under new farming is calculated as follows: 586 (15) ( ) where the subscript i, j and t denote household, explained variable and year, respectively. 589 𝑌𝑗 includes farm size, output, input, labor productivity, fertilization and FUE. 590 𝑌𝑖𝑗𝑡 𝑃𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑁𝐹 is the predicted value new farming (NF) models. 𝑌𝑖𝑗𝑡 𝑃𝑟𝑒𝑑𝑖𝑐𝑡𝑒𝑑 𝑆𝑆𝑃 is the 591 12 predicted value under SSP scenarios. 𝜌𝑗 refers to estimated coefficients of new 592 farming responding to explained variable j. The results of these estimated coefficients 593 are detailed in Table S4. 𝐶𝑜𝑣𝑒𝑟𝑎𝑔𝑒𝑡 means the assuming coverage of new farming in 594 year t. 595 predicted value under SSP scenarios. 𝜌𝑗 refers to estimated coefficients of new 592 farming responding to explained variable j. The results of these estimated coefficients 593 are detailed in Table S4. 𝐶𝑜𝑣𝑒𝑟𝑎𝑔𝑒𝑡 means the assuming coverage of new farming in 594 year t. 595 596 (16) Country-level mean values of each year including input, output, machine and 608 fertilization were averaged after weighting by the total cultivated area across the 609 whole country. The rest were arithmetic averages. 610 References: 612 1. Harper, S. Economic and social implications of aging societies. Science 346, 587- 595 (2014). 1. Harper, S. Economic and social implications of aging societies. Science 346, 587- 595 (2014). 2. Chen, C., Goldman, D.P., Zissimopoulos, J. & Rowe, J.W. Multidimensional comparison of countries’ adaptation to societal aging. Proc. Natl. Acad. Sci. U. S. A. 115, 9169-9174 (2018). 2. Chen, C., Goldman, D.P., Zissimopoulos, J. & Rowe, J.W. Multidimensional comparison of countries’ adaptation to societal aging. Proc. Natl. Acad. Sci. U. S. A. 115, 9169-9174 (2018). 3. Bloom, D.E., et al. Macroeconomic implications of population ageing and selected policy responses. Lancet 385, 649-657 (2015). 3. Bloom, D.E., et al. Macroeconomic implications of population ageing and selected policy responses. Lancet 385, 649-657 (2015). 4. Yu, B., Wei, Y., Kei, G. & Matsuoka, Y. Future scenarios for energy consumption and carbon emissions due to demographic transitions in Chinese households. Nat. Energy 3, 109-118 (2018). 5. Li, M. & Sicular, T. Aging of the labor force and technical efficiency in crop production: Evidence from Liaoning province, China. China Agric. Econ. Rev. 5, 342-359 (2013). 6. Ji, Y., Hu, X., Zhu, J. & Zhong, F. Demographic change and its impact on farmers' field production decisions. China Econ. Rev. 43, 64-71 (2017). 7. Apipoonyanon, C., et al. Socio-economic and environmental barriers to increased agricultural production: New evidence from central Thailand. Outlook Agric. 50, 178-187 (2021). 8. Rigg, J., Phongsiri, M., Promphakping, B., Salamanca, A. & Sripun, M. Who will tend the farm? Interrogating the ageing Asian farmer. The Journal of peasant studies 47, 306-325 (2020). 9. Lutz, W., Sanderson, W. & Scherbov, S. The coming acceleration of global population ageing. Nature 451, 716-719 (2008). 10. Yang, J., et al. Projecting heat-related excess mortality under climate change scenarios in China. Nat. Commun. 12, 1039 (2021). 11. Chen, X., Huang, B. & Li, S. Population ageing and inequality: Evidence from 638 China. World Econ. 41, 1976-2000 (2018). 639 12. Zhang, X., Guo, F. & Zhai, Z. China's Demographic Future Under the New Two- 640 13 Child Policy. Popul. Res. Policy Rev. 38, 537-563 (2019). 641 y 13. Zeng, Y. & Hesketh, T. The effects of China's universal two-child policy. Lancet 642 388, 1930-1938 (2016). 643 14. Satola, L. Problems of the aging of the farmers' population in small farms in 644 Poland. Scientific Papers Series Management, Economic Engineering in 645 Agriculture and Rural Development 19, 305-310 (2019). References: 612 646 15. Cutler, J., et al. Ageing is associated with disrupted reinforcement learning whilst 647 learning to help others is preserved. Nat. Commun. 12, 4440 (2021). 648 16. Huang, X., Lu, Q., Wang, L., Cui, M. & Yang, F. Does aging and off-farm 649 employment hinder farmers' adoption behavior of soil and water conservation 650 technology in the Loess Plateau? Int. J. Clim. Chang. Strateg. Manag. 12, 92-107 651 (2020). 652 17. Min, S., Waibel, H. & Huang, J. Smallholder participation in the land rental market 653 in a mountainous region of Southern China: Impact of population aging, land 654 tenure security and ethnicity. Land Use Pol. 68, 625-637 (2017). 655 18. Li, S., et al. An estimation of the extent of cropland abandonment in mountainous regions of China. Land Degrad. Dev. 29, 1327-1342 (2018). 19. Jansuwan, P. & Zander, K.K. What to do with the farmland? Coping with ageing in rural Thailand. J. Rural Stud. 81, 37-46 (2021). 20. Peng, X. China's demographic history and future challenges. Science 333, 581- 660 587 (2011). 661 21. Chen, R., Xu, P., Song, P., Wang, M. & He, J. China has faster pace than Japan in 662 population aging in next 25 years. Biosci Trends 13, 287-291 (2019). 663 22. Usman, M., Sawaya, A., Igarashi, M., Gayman, J.J. & Dixit, R. Strained 664 agricultural farming under the stress of youths’ career selection tendencies: a case 665 study from Hokkaido (Japan). Hum. Soc. Sci. Commun. 8, 19 (2021). 666 23. Ren, C., et al. The impact of farm size on agricultural sustainability. J. Clean Prod 220, 357-367 (2019). 24. Liao, L., Long, H., Gao, X. & Ma, E. Effects of land use transitions and rural aging on agricultural production in China's farming area: A perspective from changing labor employing quantity in the planting industry. Land Use Pol. 88, 104152 (2019). 25. Wu, Song & Yu. Spatial Differences in China’s Population Aging and Influencing Factors: The Perspectives of Spatial Dependence and Spatial Heterogeneity. Sustainability (Basel, Switzerland) 11, 5959 (2019). y 26. Ren, C., et al. Fertilizer overuse in Chinese smallholders due to lack of fixed inputs. J. Environ. Manage. 293, 112913 (2021). 27. Liu, X., et al. The impact of urbanization and aging on food security in developing 678 countries: The view from Northwest China. J. Clean Prod. 292, 126067 (2021). 679 28. Wu, Y., et al. References: 612 pathways describing world futures in the 21st century. Glob. Environ. Change 42, 691 169-180 (2017). 692 33. Zhou, L., Wang, G., Jia, C. & Ma, Z. Being left-behind, mental disorder, and 693 elderly suicide in rural China: a case–control psychological autopsy study. Psychol. 694 Med. 49, 458-464 (2019). 695 34. Steptoe, A., Shankar, A., Demakakos, P. & Wardle, J. Social isolation, loneliness, 696 and all-cause mortality in older men and women. Proc. Natl. Acad. Sci. U. S. A. 697 110, 5797-5801 (2013). 698 35. Zhao, F. & Yu, G. Parental Migration and Rural Left-Behind Children’s Mental 699 Health in China: A Meta-Analysis Based on Mental Health Test. J. Child Fam. 700 Stud. 25, 3462-3472 (2016). 701 36. Li, Q., Liu, G. & Zang, W. The health of left-behind children in rural China. China 702 Econ. Rev 36, 367-376 (2015). 703 37. O'Meara, P. The ageing farming workforce and the health and sustainability of 704 agricultural communities: A narrative review. Aust. J. Rural Health 27, 281-289 705 (2019). 706 38. Gu, B., Zhang, X., Bai, X., Fu, B. & Chen, D. Four steps to food security for 707 swelling cities. Nature 566, 31-33 (2019). 708 39. Wang, S., et al. Urbanization can benefit agricultural production with large-scale 709 farming in China. Nat. Food 2, 183-191 (2021). 710 40. Duan, J., et al. Consolidation of agricultural land can contribute to agricultural 711 sustainability in China. Nat. Food (2021). 712 41. Garland, G., et al. Crop cover is more important than rotational diversity for soil 713 multifunctionality and cereal yields in European cropping systems. Nat. Food 2, 714 28-37 (2021). 715 716 717 Data availability 718 Data supporting the findings of this study are available within the article and its 719 supplementary information files. 720 721 Acknowledgements 722 This study was supported by the National Natural Science Foundation of China 723 (42061124001, 41822701 and 41773068). 724 725 Author contributions 726 B.G. designed the study. C.R. conducted the research. B.G. and C.R. wrote the first 727 draft of the paper, S.R. revised the paper. C.W., Y.G., Y.D., S.S., and W.L. processed 728 the raw data. X.Z. and J.X. contributed to the discussion of the paper. 729 730 Declaration of competing interest 731 All authors have no conflicts of interest to report. 732 33. Zhou, L., Wang, G., Jia, C. & Ma, Z. References: 612 Policy distortions, farm size, and the overuse of agricultural 680 chemicals in China. Proc. Natl. Acad. Sci. U. S. A. 115, 7010-7015 (2018). 681 29. Yu, Y., Hu, Y., Gu, B., Reis, S. & Yang, L. Reforming smallholder farms to 682 mitigate agricultural pollution. Environ. Sci. Pollut. Res. (2021). 683 30. Fang, D. & Guo, Y. Induced Agricultural Production Organizations under the 684 Transition of Rural Land Market: Evidence from China. Agriculture 11, 881 685 (2021). 686 31. Guo, Ding, Zhong, Cheng & Huang. Predicting the Future Chinese Population 687 using Shared Socioeconomic Pathways, the Sixth National Population Census, and 688 a PDE Model. Sustainability (Basel, Switzerland) 11, 3686 (2019). 689 y ( ) ( ) 32. O Neill, B.C., et al. The roads ahead: Narratives for shared socioeconomic 14 pathways describing world futures in the 21st century. Glob. Environ. Change 42, 691 169-180 (2017). 692 33. Zhou, L., Wang, G., Jia, C. & Ma, Z. Being left-behind, mental disorder, and 693 elderly suicide in rural China: a case–control psychological autopsy study. Psychol. 694 Med. 49, 458-464 (2019). 695 34. Steptoe, A., Shankar, A., Demakakos, P. & Wardle, J. Social isolation, loneliness, 696 and all-cause mortality in older men and women. Proc. Natl. Acad. Sci. U. S. A. 697 110, 5797-5801 (2013). 698 35. Zhao, F. & Yu, G. Parental Migration and Rural Left-Behind Children’s Mental 699 Health in China: A Meta-Analysis Based on Mental Health Test. J. Child Fam. 700 Stud. 25, 3462-3472 (2016). 701 36. Li, Q., Liu, G. & Zang, W. The health of left-behind children in rural China. China 702 Econ. Rev 36, 367-376 (2015). 703 37. O'Meara, P. The ageing farming workforce and the health and sustainability of 704 agricultural communities: A narrative review. Aust. J. Rural Health 27, 281-289 705 (2019). 706 38. Gu, B., Zhang, X., Bai, X., Fu, B. & Chen, D. Four steps to food security for 707 swelling cities. Nature 566, 31-33 (2019). 708 39. Wang, S., et al. Urbanization can benefit agricultural production with large-scale 709 farming in China. Nat. Food 2, 183-191 (2021). 710 40. Duan, J., et al. Consolidation of agricultural land can contribute to agricultural 711 sustainability in China. Nat. Food (2021). 712 41. Garland, G., et al. Crop cover is more important than rotational diversity for soil 713 multifunctionality and cereal yields in European cropping systems. Nat. Food 2, 714 28-37 (2021). References: 612 715 716 717 Data availability 718 Data supporting the findings of this study are available within the article and its 719 supplementary information files. 720 721 Acknowledgements 722 This study was supported by the National Natural Science Foundation of China 723 (42061124001, 41822701 and 41773068). 724 725 Author contributions 726 B.G. designed the study. C.R. conducted the research. B.G. and C.R. wrote the first 727 draft of the paper, S.R. revised the paper. C.W., Y.G., Y.D., S.S., and W.L. processed 728 the raw data. X.Z. and J.X. contributed to the discussion of the paper. 729 730 Declaration of competing interest 731 All authors have no conflicts of interest to report. 732 pathways describing world futures in the 2 691 169-180 (2017). 692 33. Zhou, L., Wang, G., Jia, C. & Ma, Z. B 693 elderly suicide in rural China: a case–contr 694 Med. 49, 458-464 (2019). 695 34. Steptoe, A., Shankar, A., Demakakos, P. & 696 and all-cause mortality in older men and 697 110, 5797-5801 (2013). 698 35. Zhao, F. & Yu, G. Parental Migration an 699 Health in China: A Meta-Analysis Based 700 Stud. 25, 3462-3472 (2016). 701 36. Li, Q., Liu, G. & Zang, W. The health of le 702 Econ. Rev 36, 367-376 (2015). 703 37. O'Meara, P. The ageing farming workfor 704 agricultural communities: A narrative rev 705 (2019). 706 38. Gu, B., Zhang, X., Bai, X., Fu, B. & Ch 707 swelling cities. Nature 566, 31-33 (2019). 708 39. Wang, S., et al. Urbanization can benefit 709 farming in China. Nat. Food 2, 183-191 (2 710 40. Duan, J., et al. Consolidation of agricult 711 sustainability in China. Nat. Food (2021). 712 41. Garland, G., et al. Crop cover is more im 713 multifunctionality and cereal yields in Eu 714 28-37 (2021). 715 716 717 Data availability 718 Data supporting the findings of this study are a 719 supplementary information files. 720 721 Acknowledgements 722 This study was supported by the National 723 (42061124001, 41822701 and 41773068). 724 725 Author contributions 726 B.G. designed the study. C.R. conducted the 727 draft of the paper, S.R. revised the paper. C.W 728 the raw data. X.Z. and J.X. contributed to the d 729 730 Declaration of competing interest 731 All authors have no conflicts of interest to repo 732 pathways describing world futures in the 21st century. Glob. Environ. Change 42, 169-180 (2017). References: 612 Being left-behind, mental disorder, and elderly suicide in rural China: a case–control psychological autopsy study. Psychol. Med. 49, 458-464 (2019). 34. Steptoe, A., Shankar, A., Demakakos, P. & Wardle, J. Social isolation, loneliness, and all-cause mortality in older men and women. Proc. Natl. Acad. Sci. U. S. A. 110, 5797-5801 (2013). 35. Zhao, F. & Yu, G. Parental Migration and Rural Left-Behind Children’s Mental Health in China: A Meta-Analysis Based on Mental Health Test. J. Child Fam. Stud. 25, 3462-3472 (2016). 36. Li, Q., Liu, G. & Zang, W. The health of left-behind children in rural China. China 02 Econ. Rev 36, 367-376 (2015). 03 37. O'Meara, P. The ageing farming workforce and the health and sustainability of 704 agricultural communities: A narrative review. Aust. J. Rural Health 27, 281-289 705 (2019). 706 38. Gu, B., Zhang, X., Bai, X., Fu, B. & Chen, D. Four steps to food security for swelling cities. Nature 566, 31-33 (2019). 39. Wang, S., et al. Urbanization can benefit agricultural production with large-scale farming in China. Nat. Food 2, 183-191 (2021). 40. Duan, J., et al. Consolidation of agricultural land can contribute to agricultura sustainability in China. Nat. Food (2021). 41. Garland, G., et al. Crop cover is more important than rotational diversity for soil 713 multifunctionality and cereal yields in European cropping systems. Nat. Food 2, 714 28-37 (2021). 715 multifunctionality and cereal yields in European cropping systems. Nat. Food 2, 714 28-37 (2021). 715 716 717 Data availability 718 Data supporting the findings of this study are available within the article and its 719 supplementary information files. 720 721 Acknowledgements 722 This study was supported by the National Natural Science Foundation of China 723 (42061124001, 41822701 and 41773068). 724 725 Author contributions 726 B.G. designed the study. C.R. conducted the research. B.G. and C.R. wrote the first 727 draft of the paper, S.R. revised the paper. C.W., Y.G., Y.D., S.S., and W.L. processed 728 the raw data. X.Z. and J.X. contributed to the discussion of the paper. 729 730 Declaration of competing interest 731 All authors have no conflicts of interest to report. 732 Data supporting the findings of this study are available within the article and its 719 supplementary information files. 720 All authors have no conflicts of interest to report. References: 612 732 15 Table 1 Fixed effect panel models determining the effect of aging on agricultural sustainability 33 Farm size and Education Cost and Benefit Fertilizer and Machinery Ln Farm size (ha) Education (yr) Transfer -out Abando ned (ha) Ln Output ($ ha-1) Ln Input ($ ha-1) Profit- cost ratio Ln LP ($ hr-1) Ln Fertilization ($ ha-1) Ln FUE Machine input ($ ha-1) Machine owned ($ ha-1) g -0.27*** -1.54*** 0.76*** 0.19** -0.32*** -0.30*** -0.03 -0.37*** -0.23*** -0.13*** -112*** -919*** arm size (ha) -0.14*** -0.20*** 0.13*** 0.61*** -0.28*** 0.10*** -25.2*** 464*** ation (yr) 0.01*** 0.04 -0.01 0.03*** 0.01*** 0.03*** 0.03*** -0.003 0.04*** 12.8*** 55.0*** nty Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes 16767 16767 16137 12304 16767 15602 15460 16247 15447 15292 16542 16593 st R2 0.51 0.29 0.26 0.20 0.08 0.41 0.21 0.13 el FEP FEP Tobit Tobit FEP FEP FEP FEP FEP FEP Tobit Tobit *p < 0.05, **p < 0.01, and ***p< 0.005. LP, Labor productivity. FUE, Fertilizer use efficiency. FEP, Fixed effect panel. Farm size is the total 34 cultivated area covering all crops. Education refers to average years of education of family members aged 15 and over. Transfer-out are the ratio 35 of transferred-out cropland area to the current total cropland area. Abandoned indicates the area of abandoned cropland by farmers. Profit-cost 36 ratio means the ratio of difference between agricultural income and input to the input. Labor productivity (LP) indicates agricultural output per 37 working hour of labor. Fertilizer use efficiency (FUE) is the ratio of agricultural output to fertilizer input, measuring fertilizer contribution and 38 reflecting its loss. Machine input is total machine cost including machinery rent and depreciation to total cultivated area. Machine owned means 39 original value of agricultural machinery the household owned per area. Aging refers to the proportion of people over 65 years old in rural 40 households. County and city mean county-level or city-level regional effect is controlled, respectively. Adult farmer’s ratio, income ratio from 41 non-agricultural sectors, crop type, plot numbers and year effect have been controlled in all regression equations. 42 effect panel models determining the effect of aging on agricultural sustainability Farm size and Education Cost and Benefit Fertilizer and Machinery Model FEP FEP Tobit Tobit FEP FEP FEP FEP FEP FEP Tobit Tob *p < 0.05, **p < 0.01, and ***p< 0.005. LP, Labor productivity. FUE, Fertilizer use efficiency. References: 612 FEP, Fixed effect panel. Farm size is the total 734 cultivated area covering all crops. Education refers to average years of education of family members aged 15 and over. Transfer-out are the ratio 735 of transferred-out cropland area to the current total cropland area. Abandoned indicates the area of abandoned cropland by farmers. Profit-cost 736 ratio means the ratio of difference between agricultural income and input to the input. Labor productivity (LP) indicates agricultural output per 737 working hour of labor. Fertilizer use efficiency (FUE) is the ratio of agricultural output to fertilizer input, measuring fertilizer contribution and 738 reflecting its loss. Machine input is total machine cost including machinery rent and depreciation to total cultivated area. Machine owned means 739 original value of agricultural machinery the household owned per area. Aging refers to the proportion of people over 65 years old in rural 740 households. County and city mean county-level or city-level regional effect is controlled, respectively. Adult farmer’s ratio, income ratio from 741 non-agricultural sectors, crop type, plot numbers and year effect have been controlled in all regression equations. 742 cultivated area covering all crops. Education refers to average years of education of family members aged 15 and over. Transfer-out are the ratio 735 of transferred-out cropland area to the current total cropland area. Abandoned indicates the area of abandoned cropland by farmers. Profit-cost 736 ratio means the ratio of difference between agricultural income and input to the input. Labor productivity (LP) indicates agricultural output per 737 working hour of labor. Fertilizer use efficiency (FUE) is the ratio of agricultural output to fertilizer input, measuring fertilizer contribution and 738 reflecting its loss. Machine input is total machine cost including machinery rent and depreciation to total cultivated area. Machine owned means 739 original value of agricultural machinery the household owned per area. Aging refers to the proportion of people over 65 years old in rural 740 households. County and city mean county-level or city-level regional effect is controlled, respectively. Adult farmer’s ratio, income ratio from 741 non-agricultural sectors, crop type, plot numbers and year effect have been controlled in all regression equations. 742 16 743 Fig. 1 Population aging and farm size in China. (a) Aging trend in rural and urban 744 China from 2000 to 2019; (b) Age stages in rural and urban China in 2019; (c) County- 745 level aging in 2020; (d) Farm size in 2017. References: 612 Aging in (a) and (c) refers to the proportion 746 of people over 65 years old on country and county-level, respectively. It is calculated 747 by the number of people over 65 years old to the total population. 748 743 Fig. 1 Population aging and farm size in China. (a) Aging trend in rural and urban 744 China from 2000 to 2019; (b) Age stages in rural and urban China in 2019; (c) County- 745 level aging in 2020; (d) Farm size in 2017. Aging in (a) and (c) refers to the proportion 746 of people over 65 years old on country and county-level, respectively. It is calculated 747 by the number of people over 65 years old to the total population. 748 17 17 749 Fig. 2 Structural equation model of aging impacts on agricultural sustainability. 750 *p < 0.05, **p < 0.01, and ***p< 0.005. The numbers adjacent to the lines are the 751 standardized path coefficients, which means how much standard deviation changes in 752 dependent variable if each of the independent variable changes by one standard 753 deviation. The blue and red lines represent positive and negative effects, respectively. 754 Dark and light red indicate the direct and indirect negative effects of aging on 755 agriculture, respectively. The line width is proportional to the strength of the 756 standardized path coefficient. Variables in this figure except aging, abandoned cropland 757 and education have been log-transformed. It is worth noting that the path coefficient 758 between aging and abandoned cropland was not incorporated in this structural equation 759 model considering the nonlinear relationship between these two variables. The 760 coefficient of “0.01” between aging and abandoned cropland means the abandoned 761 cropland area increase when aging ratio increase by one unit averagely. Then the 762 abandoned cropland squarely decreases household-level farm size. 763 764 749 Fig. 2 Structural equation model of aging impacts on agricultural sustainability. 750 *p < 0.05, **p < 0.01, and ***p< 0.005. The numbers adjacent to the lines are the 751 standardized path coefficients, which means how much standard deviation changes in 752 dependent variable if each of the independent variable changes by one standard 753 deviation. The blue and red lines represent positive and negative effects, respectively. 754 Dark and light red indicate the direct and indirect negative effects of aging on 755 agriculture, respectively. References: 612 The line width is proportional to the strength of the 756 standardized path coefficient. Variables in this figure except aging, abandoned cropland 757 and education have been log-transformed. It is worth noting that the path coefficient 758 between aging and abandoned cropland was not incorporated in this structural equation 759 model considering the nonlinear relationship between these two variables. The 760 coefficient of “0.01” between aging and abandoned cropland means the abandoned 761 cropland area increase when aging ratio increase by one unit averagely. Then the 762 abandoned cropland squarely decreases household-level farm size. 763 764 749 Fig. 2 Structural equation model of aging impacts on agricultural sustainability. 750 *p < 0.05, **p < 0.01, and ***p< 0.005. The numbers adjacent to the lines are the 751 standardized path coefficients, which means how much standard deviation changes in 752 dependent variable if each of the independent variable changes by one standard 753 deviation. The blue and red lines represent positive and negative effects, respectively. 754 Dark and light red indicate the direct and indirect negative effects of aging on 755 agriculture, respectively. The line width is proportional to the strength of the 756 standardized path coefficient. Variables in this figure except aging, abandoned cropland 757 and education have been log-transformed. It is worth noting that the path coefficient 758 between aging and abandoned cropland was not incorporated in this structural equation 759 model considering the nonlinear relationship between these two variables. The 760 coefficient of “0.01” between aging and abandoned cropland means the abandoned 761 cropland area increase when aging ratio increase by one unit averagely. Then the 762 abandoned cropland squarely decreases household-level farm size. 763 764 18 65 Fig. 3 Impact of aging on agricultural sustainability across China’s provinces in 66 2019. (a) Farm size; (b) Education; (c) Labor productivity; (d) Total agricultural input; 67 (e) Agricultural output; (f) Profit-cost ratio; (g) Machine input; (h) Fertilization; (i) 68 Fertilizer use efficiency. It is calculated by determining the difference between the 69 predicted values without aging and the observed values with aging divided by the 70 observed value on province-level, and the result is carried out in percentage terms. 71 Acronyms for 31 provinces, autonomous regions, and municipalities directly under the 72 Central Government are listed in Table S6. Shanghai, Tibet and Xinjiang aren’t depicted 73 due to data limitation. 74 Fig. References: 612 3 Impact of aging on agricultural sustainability across China’s provinces in 765 Fig. 3 Impact of aging on agricultural sustainability across China’s provinces in 766 2019. (a) Farm size; (b) Education; (c) Labor productivity; (d) Total agricultural input; 767 (e) Agricultural output; (f) Profit-cost ratio; (g) Machine input; (h) Fertilization; (i) 768 Fertilizer use efficiency. It is calculated by determining the difference between the 769 predicted values without aging and the observed values with aging divided by the 770 observed value on province-level, and the result is carried out in percentage terms. 771 Acronyms for 31 provinces, autonomous regions, and municipalities directly under the 772 Central Government are listed in Table S6. Shanghai, Tibet and Xinjiang aren’t depicted 773 due to data limitation. 774 19 775 Fig. 4 Comparison of smallholder and new farming models on agricultural 776 sustainability in 2019. (a) Aging farmer’s ratio; (b) Education; (c) Farm size; (d) Labor 777 productivity; (e) Agricultural output; (f) Total agricultural input; (g) Fertilization; (h) 778 Fertilizer use efficiency (FUE); (i) Machine input. *p < 0.05, **p < 0.01, and ***p< 0.005, 779 which indicates the significant difference level between smallholder and new farming 780 responding to indicators of agricultural sustainability. Error bars refer to standard errors. 781 The statistical results are in Table S4. 782 783 10% 16% 22% 28% Aging** (a) 0.0 0.6 1.2 1.8 Farm size** (ha) (c) 6 7 8 9 10 Education*** (yr) (b) 0.0 0.8 1.6 2.4 Input* (103 $ ha-1) (f) 0 2 4 6 Smallholder New farming Fertilization (102 $ ha-1) (g) 0 5 10 15 Smallholder New farming FUE* (h) 1.5 2.0 2.5 3.0 Output* (103 $ ha-1) (e) 0 2 4 6 Smallholder New farming Machine* (102 $ ha-1) (i) 0.3 1.1 1.9 2.7 Labor productivity* ($ hr-1) (d) 15 0 5 10 15 Smallholder New farming FUE* (h) 0 2 4 6 Smallholder New farming Machine* (102 $ ha-1) (i) 775 Fig. 4 Comparison of smallholder and new farming models on agricultural 776 sustainability in 2019. (a) Aging farmer’s ratio; (b) Education; (c) Farm size; (d) Labor 777 productivity; (e) Agricultural output; (f) Total agricultural input; (g) Fertilization; (h) 778 Fertilizer use efficiency (FUE); (i) Machine input. *p < 0.05, **p < 0.01, and ***p< 0.005, 779 which indicates the significant difference level between smallholder and new farming 780 responding to indicators of agricultural sustainability. References: 612 Error bars refer to standard errors. 781 The statistical results are in Table S4. 782 783 20 784 Fig. 5 Future agricultural sustainability changes due to aging under SSP 785 scenarios by 2100. (a) Farm size; (b) Education; (c) Labor productivity; (d) Total 786 agricultural input; (e) Agricultural output; (f) Profit-cost ratio; (g) Machine input; (h) 787 Fertilization; (i) Fertilizer use efficiency. The Baseline assumed no changes in the 788 future. SSP1-4 refers to Shared Socioeconomic Pathways (SSPs) scenarios. NF, New 789 farming. The changes of input, output, machine and fertilization are all weighted with 790 the total cultivated area. 791 1.15 1.25 1.35 1.45 Input (103 $ ha-1) (d) 5.0 5.7 6.4 7.1 7.8 Education (yr) (b) 0.7 0.8 0.9 1.0 1.1 Farm size (ha) (a) 16 17 18 19 20 21 Output (102 $ ha-1) (e) 0.9 1.4 1.9 2.4 Labor productivity ($ hr-1) (c) 2.0 2.4 2.8 3.2 3.6 2020 2040 2060 2080 2100 Machine (102 $ ha-1) Year (g) SSP1 SSP2 SSP3 SSP4 Baseline SSP1 with NF SSP2 with NF SSP3 with NF SSP4 with NF 0.5 0.7 0.9 1.1 Profit/cost (f) 2.9 3.0 3.1 3.2 2020 2040 2060 2080 2100 Fertilization (102 $ ha-1) Year (h) 6 7 8 9 10 2020 2040 2060 2080 2100 Fertilizer use efficiency Year (i) Labor productivity ($ hr-1) 5.0 16 17 18 19 20 21 Output (102 $ ha-1) (e) 0 2.9 3.0 3.1 3.2 2020 2040 2060 2080 2100 Fertilization (102 $ ha-1) Year (h) Fertilizer use efficiency Year Fig. 5 Future agricultural sustainability changes due to aging under SSP 784 Fig. 5 Future agricultural sustainability changes due to aging under SSP 785 scenarios by 2100. (a) Farm size; (b) Education; (c) Labor productivity; (d) Total 786 scenarios by 2100. (a) Farm size; (b) Education; (c) Labor productivity; (d) Total 786 agricultural input; (e) Agricultural output; (f) Profit-cost ratio; (g) Machine input; (h) 787 Fertilization; (i) Fertilizer use efficiency. The Baseline assumed no changes in the 788 future. SSP1-4 refers to Shared Socioeconomic Pathways (SSPs) scenarios. NF, New 789 farming. The changes of input, output, machine and fertilization are all weighted with 790 the total cultivated area. 791 21 Supplementary Files This is a list of supplementary ¦les associated with this preprint. Click to download. SupplementaryInformation.docx
https://openalex.org/W4385618040
https://zenodo.org/records/8220992/files/IJISRT23JUL1538.pdf
English
null
Self-Efficacy and Motivation as Predictors to Mathematics Performance in Online Learning
Zenodo (CERN European Organization for Nuclear Research)
2,023
cc-by
21,737
Volume 8, Issue 7, July – 2023 Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Self-Efficacy and Motivation as Predictors to Mathematics Performance in Online Learning A thesis Presented to The Faculty of the Graduate school Assumption College of Nabunturan Nabunturan, Davao De Oro In partial fulfillment of the Requirments for the Degree of Master of Arts in Education Major in Mathematics In partial fulfillment of the Requirments for the Degree of Master of Arts in Education Major in Mathematics In partial fulfillment of the Requirments for the Degree of Master of Arts in Education Major in Mathematics 2Romulo G. Doronio Adviser IJISRT23JUL1538 IJISRT23JUL1538 2202 www.ijisrt.com Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 ISSN No:-2456-2165 Keywords:- Online Learning Education, Motivation, Self-Efficacy, Mathematics Performance, Descriptive-Correlational Study ABSTRACT This study wants to determine if motivation and self-efficacy can be a predictor of students’ Mathematics performance in an online learning context. A descriptive-correlational design was conducted to explore the study. The participants were selected from 4 campuses of Davao De Oro State College. All students who are enrolled in the Mathematics of Investment subject were included in the study using a universal sampling technique. This study used adapted 4 points Likert scale questionnaires for motivation and self-efficacy and self-tailored summative assessment for Mathematics performance. The study concluded that the students had a moderate level of self-efficacy and motivation in an online learning context. The result showed that both motivation and self-efficacy have a negligible relationship and were not statistically significant. The study also found that motivation and self-efficacy were not significant predictors of students’ Mathematics performance. The study recommends that students develop personal strategies to enhance self-efficacy and motivation, while teachers should design and implement effective instructional strategies to cater to varied learning styles. Furthermore, school administrators should develop policies and programs that promote effective online learning practices in Mathematics education. Keywords:- Online Learning Education, Motivation, Self-Efficacy, Mathematics Performance, Descriptive-Correlational Study IJISRT23JUL1538 IJISRT23JUL1538 www.ijisrt.com 2203 Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 TABLE OF CONTENT TITLE PAGE CHAPTER ONE INTRODUCTION 2205 CHAPTER TWO METHODOLOGY 2212 CHAPTER THREE RESULTS 2215 CHAPTER FOUR DISCUSSION AND CONCLUSION 2219 REFERENCES 2220 APPENDICES 2224 IJISRT23JUL1538 IJISRT23JUL1538 www.ijisrt.com 2204 International Journal of Innovative Science and Research Technology Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 ISSN No:-2456-2165 A. The Problem and its Background g Mathematics is considered a fundamental subject as it develops students’ logical reasoning. Though the mathematics performance of the students is heavily influenced by the cognitive domain as they mostly use their cognitive faculties, affective factors are equally significant. Affective factors such as motivation and self-efficacy play an important role in order for students to achieve academic success (Sikhwari, 2007; Hiller et. al, 2022). Self-efficacy refers to the level of learners’ confidence in their ability to complete a certain task. On the other hand, motivation refers to a psychological state that drives an individual to engage in an activity. The environment also influences the learning process (Chukwuemeka, 2013). Most countries all over the world such as the USA, Pakistan, India, South Africa, and China transitioned to online learning due to the COVID-19 pandemic. Some educators and learners were caught off-guard by the sudden change which caused some issues in the students’ motivation and self-efficacy. Changes in the environment can interfere with self-efficacy and motivation. Self-efficacy and motivation are different in every context (Hodges, 2008; Brachtl et al., 2023). As a result, students’ self-efficacy and motivation in online learning settings differ from their self-efficacy and motivation in face-to-face learning settings, and it is regarded as a critical component for successful online learning (Shen et al., 2013). Consequently, the changes in students’ level of motivation and self-efficacy significantly influence the students’ performance (Mijares III, 2022). In the Philippines, as the Department of Education (DepEd) and Commission on Higher Education (CHED) implemented an online learning mode of instruction, it brought challenges to educators and especially students as they experienced poor internet connection, outdated devices, lack of resources, and many more (Cabansag, 2020). It resulted in low motivation to continue education amidst the pandemic. In addition, as the nation faces the COVID-19 pandemic, the Philippine Association of State Universities and Colleges (PASUC) (2020) estimates that a total of 44, 069 college students won't enroll for the academic year 2020–2021. Many believe that motivation and self-efficacy are predictors of students’ performance (Sartawi et al., 2012; Ugwuanyi et al., 2020; Kim et al., 2014). Interestingly, the study of Mijares III (2022) was contrary to the previous statement, it showed that motivation and self-efficacy are not significant predictors of students’ mathematics performance. A. The Problem and its Background In Davao De Oro State College – Maragusan Branch, where the researcher is presently teaching, the researcher and his colleagues noticed that some students lack the motivation to participate in any online class. In addition, students who have been recognized as having poor engagement have expressed a lack of confidence in their ability to do the task properly. With the mentioned context, this led the researcher to determine if motivation and self-efficacy can be a predictor of students’ performance in an online learning context. In addition, the researcher aims to determine if motivation and self-efficacy can be predictors of students’ mathematics performance and identify any factors that may influence it. By examining this topic, students can better understand the importance of motivation and self-efficacy in their academic performance. CHAPTER ONE INTRODUCTION A. The Problem and its Background B. Review of Related Literature and Studies Various related literature and related studies are presented to provide direction and a frame of reference for this study. It includes literature as well as studies, which are directly or indirectly related to this study. International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Rifandi (2013) suggests that achieving success in mathematics has a significant impact on one's motivation to succeed. Several findings from the survey imply that factors contributing to the drop in favorable attitudes toward mathematics include a lack of teacher support as well as the environment in which students are taught. Students' motivation can be aided by rationales that induce two effects: students must recognize the importance and personal value of the assignment, and students must sense a high degree of autonomy while working on the task (Jang, 2008). Furthermore, it has been noted in the literature that students' belief in mathematics can be influenced by their views in the following aspects: the nature of mathematics, the method of teaching and three learning, and their beliefs in their instructors (Lazim et al., 2004). In addition, students' perceptions of their own achievement in mathematics learning are substantially correlated with their own motivational attitudes. Teachers' behaviors, attitudes, and the quality of instructional design for mathematics sessions have all had a significant impact on students' motivation (Rifandi, 2013). Paas et al. (2005) asserted that meaningful learning can only occur when it is combined with motivation, which they believe is the case. Using a motivational perspective in the classroom, they claimed, would help discover the task qualities that drove students to put out more mental effort and achieve higher levels of performance. In addition, It is the belief of Keller (2008) that only when the motivating features of students are discovered and, consequently, techniques for addressing their areas of weakness are determined that the learning environment is optimized. Many people believe that mathematics is only necessary for those working in industries such as engineering, science, and finance. This is a frequent mistake. Some people even believe that mathematics is solely concerned with computations. In reality, mathematics is a subject that may be applied to a variety of situations in everyday life. Students learn how to discern between the suitable use of mathematical information for different scenarios through the study of mathematics, which is to say, they learn how to determine which mathematical knowledge is appropriate for which reasons. The value of mathematics can be infused through the process of problem-solving. They can be word problems, non-routine problems, or real-life situations that require a variety of methodologies to be applied in order to be solved (Taplin, 1998, cited by Albay, 2020). International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Student involvement in learning is predicated on their level of motivation to study (Saeed & Zyngier, 2012). According to research, a motivated learner possesses the inner strength necessary for learning and adapting to the demands of the school environment (Ferreira et al., 2011). A motivated learner is more likely to be actively engaged and exhibits improved performance, persistence, and creativity (Schunk et al., 2008). It is not viable to substitute online learning for students who are not sufficiently motivated (Aduayi-Akue et al., 2017), as a lack of motivation is a major cause of student attrition in distant education (Aduayi- Akue et al., 2017; Smith et al., 2005; Visser et al., 2002, cited by Murphy & Rodriguez-Manzanares, 2009). Students' motivation in the classroom has lately been investigated using five frameworks of social–cognitive dimensions, as described by Pintrich (2003). In accordance with the concept of self-beliefs (e.g., self-efficacy), when students believe that they can do well in educational environments, they feel confident, are more likely to try their hardest, persevere longer, and perform better overall (Bandura, 1997). It is anticipated that students who have a stronger sense of personal control over their learning will perform better academically and achieve higher levels of success than those who don't. For a more sophisticated differentiation of extrinsic motivation in higher education, two theories have been developed to complement the traditional distinction between students' intrinsic and extrinsic motivation: students' interest and intrinsic motivation. It has been discovered that pupils' diverse types of interests lead to a variety of different learning outcomes (Ryan & Deci, 2000). There are a number of factors that have a substantial impact on student motivation and achievement as a result of creating effective and efficient learning-teaching processes in educational systems. Among the many psychological, social, and cultural motivational factors are intrinsic and extrinsic directions, parental influence and participation, family history, peer pressure, self- efficacy expectations, effort, value attributed to a relative, anxiety, self-regulation and goal determination, talent perceptions, learning strategies, teaching style, and school environment (Yilmaz et al., 2017). Osborne et al. (2003) also note that one of the elements that influence students' attitudes toward science is the high quality of the teaching process, which encourages interest and involvement in the subject. As a result, this article will provide an explanation of motivation as well as the use of an appropriate environment to boost students' motivation in mathematics learning.  Motivation Motivation is a Psychology term that refers to the desire for something and the fuel that serves as a driving force to continue pursuing that desire (Motevalli et al., 2020). Motivation is an essential component of learning and plays a critical role in assisting students to become involved in academic activities. Motivation is defined as a situation that provides energy to, directs, and sustains behavior. This includes goals and activities that require the objectives to provide motivation to move and act. To operate for an extended period of time, action necessitates effort and persistence. Motivation entails a collection of beliefs, perceptions, values, information, and actions that are all interconnected. Motivation can lead to a variety of behaviors, and it is critical to comprehend the significance of motivation in the educational setting (Suhag et al., 2016). Due to the fact that motivation speeds up cognitive processing, it affects how information is processed. As a result, motivated students are more likely to comprehend and carefully consider the subject at hand as opposed to merely superficially monitoring other people's learning activities (Yilmaz et al., 2017). And in relation to the psychological perspective, motivation refers to an internal process that stimulates individuals' conduct, guides them, and helps them to maintain their behavior through time (Anderman et al., 2013; Pintrich, 2003; Zimmerman & Schunk, 2011. In addition, motivation can be thought of as "the motor that keeps us moving," the desire to accomplish tasks that are important to people in one way or another, and the drive to succeed in these endeavors. (Nyman & Sumpter, 2019). IJISRT23JUL1538 www.ijisrt.com 2205 Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165  Self Efficacy f ff y Bandura (1997) defined self-efficacy as an individual’s belief in their ability to complete a task in a different situation. Since the covid-19 pandemic, the popularity of online learning dramatically increase. According to him, mastery experience, vicarious experience, verbal persuasion, and physiological affective states are the four main sources of knowledge that influence or develop self-efficacy. Students’ learning might be affected by their self-efficacy (Wang et al., 2017). It has an impact on how students conduct investigations, as seen by their actions, efforts, perseverance, adaptability in differences, and achievement of goals. Strong self- efficacy beliefs improve cognitive processes and performance in various settings, including academic contexts (Zulkosky, 2009). Similar research shows that students who have a high sense of self-efficacy are committed to completing difficult assignments and going the extra mile when facing challenges (Hong et al., 2017). The learning process is intrinsically tied to the learning environment. Changes in the environment can interfere with self- efficacy. Self-efficacy is different in every context (Hodges, 2008). Students' self-efficacy differs from their self-efficacy in face- to-face learning environments as a result, and it is seen to be a crucial element for successful online learning (Shen et al., 2013). Moreover, online learning self-efficacy is further defined by Zimmerman and Kulikowich (2016) as learners' assurance in their capacity to successfully complete the learning criteria for online courses. Bandura (1997) defines self-efficacy as a characteristic that influences how well-aware an individual is of himself or herself and how his or her behavior develops, specifically in terms of the ability to plan the essential actions to successfully carry out a certain performance. Zimmerman and Kulikowich (2016) designed an instrument called Online Learning Self-Efficacy Scale (OLSES) to measure students’ self-efficacy in online learning. In Turkey, Yavuzalp and Bahcivan (2019) tested the validity and reliability of OLSES. The original form of scale is in English and consists of 22 items that have three factors: learning in the online environment, time management, and technology used. After factor analysis, the second item, “find course syllabus online,” was removed from the scale because it scored below 0.40, indicating exclusion from the scale. Gender and school-type variables were not statistically significant, according to the findings of the investigation. International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Students are more appreciative and motivated to master mathematics when they can apply what they have learned in class to their daily lives. As a result, we should provide students with a comprehensive set of abilities that will enable them to meet the challenges of their lives. IJISRT23JUL1538 2206 www.ijisrt.com Volume 8, Issue 7, July – 2023 Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 ISSN No:-2456-2165 ISSN No:-2456-2165 Teachers serve as role models and a mentor for students who want to pursue higher education. An investigation carried out by Zhang (2014) also revealed that the teacher's enthusiasm was an efficient predictor of students' intrinsic motivation, according to the findings. The teacher's passion acted as a beneficial external catalyst in fostering students' interest, curiosity, and willingness to study by igniting their internal motivation. Effective instructors put out the effort necessary to build meaningful relationships with their pupils. Teachers communicate with their students in an empathic and caring manner, and they make every effort to assist students who are experiencing course-related or personal difficulties. In order for pupils to be motivated to learn, teachers' supportive relationships are essential (Wang, 2014). Teachers are more eager, motivated, and equipped to teach and evaluate when the students have a greater capacity to increase their desire to learn (Williams & Williams, 2011). Moreover, according to Bayraktar (2015), in order to create an effective teaching and learning environment in a classroom, teachers' effective use of methods, techniques, tools, and materials in the relevant teaching field has a significant effect on student motivation. The importance of motivation in mathematics instruction cannot be overstated. Mathematical educators are asked to adapt their instructional practices in order to promote and improve students' motivation to learn Math (Wong & Wong, 2017). An emotion-controlling system is equipped with the ability to direct behavior, and this is what motivates people. This potential can present itself in several ways, including intellect, emotion, and conduct (Hannula, 2004). They are present as part of one's goal structures, as well as one's views about what is essential, and they influence one's decision to engage in a certain endeavor. The importance of good teachers in encouraging student motivation and accomplishment cannot be overemphasized. International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Those dispositions, which are repeating patterns of thoughts, feelings, or actions that result in better levels of performance as a teacher, are described as effective teachers' dispositions (Hutajulu et al., 2019; McCune & Entwistle, 2011). International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 However, there was no significant relationship between Internet self-efficacy and students’ performance on the written test. In a survey of 219 distance learners, Tang and Tseng (2013) discovered that individuals with higher self-efficacy for information searching and the ability to apply information also had better self-efficacy for online learning and had more awareness of online resources. Martin and Tutty (2008) and Martin et al. (2010) found that the self-efficacy of online learners was significantly higher than hybrid learners. However, LMS self-efficacy does not significantly affect course performance for online learners, but it positively influences the course performance for the hybrid learners. More research into the role of self-efficacy in online learning environments is still needed (Alquarashi, 2016). In addition, Tanius et al. (2020) studied the correlation between learners’ motivation, computer anxiety, and social support with self-efficacy on online learning technology due to the COVID-19 pandemic. The result indicated that online learning technology experience, learners’ attitudes, learners’ motivation, computer anxiety, and social support correlate with self-efficacy in online learning technology. Furthermore, the finding revealed that male and female respondents and different ages have similar opinions on the factors that contribute to online learning technology. This study’s most significant finding reveals that students have self-efficacy on online learning technology, even though this is the first time they use it as mandatory learning. The study also highlighted that social support in online learning. Yantraprakorn and colleagues (2018) conducted a study on why some highly efficacious learners failed in an online foreign language course based on Bandura’s theory of self-efficacy. The learning performance of six very effective distant language learners was examined at a reputable English language tutoring school in Bangkok, Thailand. Goal setting, attribution shifts, and insufficient feedback were found to be factors that may reduce online learners’ efficacy and influence their decision to drop out of a program. The implications of this study provide recommendations on support to help online learners succeed. In Mathematics, it is not enough to know how to perform the given task; self-efficacy in the appropriateness of its concepts and procedures is also required (Garfield & Ben-Zvi, 2009). For example, when doing calculations manually or by using a calculator, the element of self-efficacy is in it (Negara, et al., 2021). When people have low self-efficacy for a task, they are less likely to put forth an effort and finish it. International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 ISSN No:-2456-2165 Meanwhile, according to Alquarashi (2016), three categories of self-efficacy in online learning environments were discovered between 1997 and 2015: computer self-efficacy, internet and information-seeking self-efficacy, and LMS (Learning Management System) self-efficacy. The study of self-efficacy and computers is primarily concerned with learners’ confidence in their ability to use computers and other types of technology (Alquarashi, 2016). Additionally, the findings of Jan's (2015) study revealed a positive and significant relationship between computer self-efficacy and prior online learning experience, academic self-efficacy and prior online learning experience, and academic self-efficacy and student satisfaction. Lim (2001) discovered that computer self-efficacy is a statistically significant predictor of student satisfaction and that there is a positive relationship between student satisfaction and future intention to take online courses. Lim (2001) aims to create a model that predicts adult learners’ satisfaction with a Web-based distance education course and their intention to engage in future Web-based distance education courses. Computer self-efficacy, academic self-concept, age, gender, academic position, years of computer use, frequency of computer use, computer training, Internet experience in a class, and participation in a Web-based course workshop were among the variables investigated. The only statistically significant predictor variable was computer self- efficacy. Lee and Hwang (2007) proposed a model for measuring online learning effectiveness, claiming that computer self-efficacy is critical in student satisfaction with e-learning. Research on self-efficacy and the Internet, learners’ confidence in their ability to use the Internet to seek information is related; this is similar to information-seeking self-efficacy in online learning (Alquarashi, 2016). In web-based instruction, Joo et al. (2000) looked into the relationship between Internet self-efficacy and students’ success on written and search assessments. In addition, the study of Kou et al. (2020) also shows that student performance was significantly associated with Internet self-efficacy. Adult students’ Internet self-efficacy, self-regulation, and performance in online learning environments were investigated. The effect of student characteristics on Internet self-efficacy and self-regulation was determined using a quantitative approach to find the correlations between the variables. The participants of this study were African American students from a university in the United States. They participated in two web-based research courses offered in summer. An online survey was used to gather information. Student achievement was connected with Internet self-efficacy but not with self-regulation. Gender and age differences had no significant effect on Internet self-efficacy and self-regulation. Their Internet self-efficacy predicted students’ performance on the search exam.  Self Efficacy Moreover, Bates and Khasawneh (2007) discovered that four factors influence self-efficacy in the context of online learning: (1) previous success with online learning, (2) pre-course training, (3) instructor feedback, and (4) online learning technology anxiety. Though in a different context, we can see that it is closely related to or derived from Bandura’s self-efficacy theory. Their research proposed a mediated model in which a group of antecedent factors influenced students' self-efficacy for online learning, which in turn affected their expectations for their learning outcomes, their perceptions of their mastery, and the number of hours they allocated each week to using online learning technology to complete their university course assignments. The results are consistent with a partially mediated model in which the block of antecedents had an indirect effect on the outcomes via their influence on self-efficacy, a direct impact on the outcome measures, and a direct impact on the outcome measures. The data suggest that the relationships between self-efficacy, its precursors, and a number of outcomes of online learning are more nuanced than has previously been thought in studies. www.ijisrt.com IJISRT23JUL1538 2207 Volume 8, Issue 7, July – 2023 Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Understanding self-efficacy in online learning is essential to improving online education, which can be a key component of academic success in distance education (Hodges, 2008). Negara et al., (2021) investigated the mathematics performance score on trigonometry and the Mathematics self-efficacy score of 75 students from one of Mataram’s institutions. The findings revealed that the majority of respondents had a high level of mathematical self-efficacy when it came to online learning. Further research reveals a link between mathematics self-efficacy and math performance. IJISRT23JUL1538 2208 www.ijisrt.com Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 ISSN No:-2456-2165 The previously unfamiliar new normal has become standard at almost all schools and universities where classes are held entirely online, requiring us to learn essential abilities and attitudes that will enable us to adapt and succeed in an uncertain future. Understanding the contributing factors of the student’s learning process is a necessary part of improving their skills and academic performance. In determining the level of self-efficacy and academic performance of 183 out of 366 students, the study of Flores (2020) in Batangas City, Philippines, shows that increased self-efficacy also increases academic performance. According to the literature, studies in the field show that self-efficacy has a significant and positive impact on math achievement (Aksu & Guzeller, 2016; Duran & Bekdemir, 2013; Ozcal, 2019; Özcan & Kültür, 2021). Moreover, Dullas (2010) implied that self-efficacy is a good predictor of academic performance in Mathematics. Also, Hasan et al. (2014), who found a positive relationship between self-efficacy and academic performance. Kuo et al. (2014) present a case study on using a web-based videoconferencing tool (Interwise) for synchronous learning sessions in an industrial technology course offered by a university in northern Taiwan. Undergraduate students from two semesters of the same course were among those who participated in the study. They examined into students’ perceptions of interactions with the instructor and other students, their confidence in using the Internet (Internet self-efficacy), and their overall satisfaction with Interwise’s learning process. They also looked at how interactions and Internet self-efficacy affected student satisfaction. Overall, learners thought Interwise was a reasonably easy tool to use for synchronous learning, according to the findings. Interwise features like emotion icons, conversation, and raising a hand were preferred by students when interacting with their instructors.  Mathematics Performance Collins and O’Brien (2011) define mathematics performance as a student’s level of achievement in mathematics or on examinations meant to measure mastery of a subject matter. This refers to how well a person has completed specific educational goals in a school, college, or university. Examinations are frequently used to define and measure it (Cambridge University Reporter, 2003). It is critical to identify the elements that influence student performance because institutions and instructors must develop ways to improve student performance and motivate students to do better (Uyan & Gungormus, 2011). As the usage of online education grows, there is a pressing need to understand better how students learn in this new environment (Picciano, 2002). In the traditional classroom, research has shown the relevance of learning methods, but it has yet to look into what tactics are relevant and beneficial in the online learning classroom (Weinstein et al., 2000). Research shows a significant relationship between learning strategies, motivation, self-efficacy, and student’s performance in an online context (Wadsworth, L et al., 2007). The study of Uyan and Gungormus (2011) on determining the impact of eight variables, namely: gender, score in the university entrance examination, high school GPA, age, GPA, Math grade, Accounting Grade, and Attendance to students’ mathematics performance in an accounting course, shows that gender and score in mathematics university examination are not significantly correlated. Additionally, the student’s age has a statistically negative significant impact on their performance. Students’ performance in the financial accounting course is influenced by their high school grade point average, prior understanding of accounting, grade point average, attendance, and math grade. In a public national high school in Cebu, Philippines, Peteros et al. (2019) conducted descriptive correlational research between gender and self-concept on their students’ mathematics performance. Results revealed that they had a moderate level of self-concept toward learning Mathematics. There was no gender difference in the respondents’ self-concept. However, there was a strong association between self-concept and academic achievement in Mathematics. As a result, adopting and evaluating a Math performance improvement plan is strongly advised. A cluster analysis approach in Zambia by Mulinga and Marban (2020) investigated the prospective online learning mathematics activities in the age of the COVID-19 pandemic. Cluster analysis results revealed that online learning mathematics activities have significant mean differences in clustering. International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Learners expressed high confidence in gathering data and obtaining assistance via the Internet, but low confidence in resolving Internet-related issues. Learner-learner and learner-instructor interactions were both significant predictors of student satisfaction, although Internet self-efficacy had little bearing on satisfaction. According to Bandura’s four sources of self-efficacy information, Huang and Mayer (2018) investigated the effectiveness of adding four features of self-efficacy to an online statistics course. Results of analyses of variance showed that the treatment group performed better on practice (d = 0.36), retention (d = 0.39), and transfer (d = 0.42) tests as well as reporting higher self- efficacy (d = 0.44) and lower task anxiety (d = −0.45). In addition, mediation analyses revealed that task anxiety and self-efficacy fully mediated the effect of the treatment group on their performance. The findings justify the inclusion of self-efficacy features in online mathematics sessions when the goal is to improve learning outcomes by lowering anxiety and improving self-efficacy. International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 ISSN No:-2456-2165 ISSN No:-2456-2165 ISSN No:-2456-2165 Obtaining information on a student’s self-efficacy can offer the educator with more information about the student’s subsequent performance. Nuruddin et al. (2020) investigated the link between self-efficacy and mathematics performance among university students studying Applied Science. The sample consisted of first-year Applied Science university students with matriculation and diploma backgrounds. Students were given two sets of survey questionnaires created by the researchers to assess their self-efficacy and competence to solve integral calculus problems. The questions were divided into four domains: the concept of calculus, translation from concept to formula, integration techniques, and recognition of functions. This study’s findings did not provide sufficient evidence to support the view that positive self-efficacy beliefs in mathematics improve mathematics performance because there was no significant difference between what students perceived and what they actually scored. The study also showed that self–efficacy is correlated with all of the aspects of performance. C. Theoretical Framework This study draws on Social Cognitive Theory (SCT) to provide a comprehensive understanding of the relationship between students’ self-efficacy, motivation and Mathematics performance in online learning. This theory emphasizes the role of self- efficacy in predicting behavior (Bandura, 1997). SCT suggests that learners’ motivation and performance are influenced by their beliefs about their ability to perform well (self-efficacy) and the support they receive from their peers and instructors (Bandura, 1986). This theory will be used to investigate the level of students’ self-efficacy and its relationship with mathematics performance. In the context of online learning, where technology and digital resources have transformed educational practices, SCT provides a relevant framework for understanding the factors influencing students’ Mathematics performance. SCT acknowledges the interplay between cognitive, behavioral, and environmental factors in shaping behavior. The role of self-efficacy in students’ mathematics performance is very important, it reflects their confidence in understanding and solving mathematical problems, significantly impacting their engagement and persistence. It means that having greater confidence in your skills will lead to a good mathematics performance. Motivation plays a crucial role in driving students’ active participation and investment in Mathematics learning online. Moreover, observational learning and social support mechanisms are particularly relevant in the online context, where the students can learn from the success and experience of their peers and instructors. This study aims to explore the interplay between self- efficacy, motivation and Mathematics performance in this educational setting. The conceptual framework of the study in figure 1 presents the interplay of the variables in the study. It shows that motivation and self-efficacy would be measured and used to determine if those are significant predictors to students Mathematics performance in online learning mode. Fig 1 Conceptual Framework Fig 1 Conceptual Framework  Mathematics Performance Cluster 2 recorded the best performance, implying that students in this cluster exhibited excellent online learning skills for mathematics in technology-rich environments in which they will be forced to study and work in the future. www.ijisrt.com IJISRT23JUL1538 2209 Volume 8, Issue 7, July – 2023 Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 D. Statement of the Problem f The purpose of this study is to determine the relationship between students’ mathematics performance and self-efficacy and motivation in the online learning mode of the first-year mathematics major students at Davao De Oro State College, and it would seek to answer the following questions:  What is the level of student’s self-efficacy?  What is the level of student’s motivation?  what is the level of mathematics performance of the students?  is there a significant relationship between:  What is the level of student’s self-efficacy?  What is the level of student’s motivation?  4.1. self-efficacy and mathematics performance?   4.2. motivation and mathematics performance?  5. Can motivation and self-efficacy predict the mathematics performance of the student? 2210 www.ijisrt.com IJISRT23JUL1538 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Volume 8, Issue 7, July – 2023 E. Null Hypotheses  𝐻𝑜: There is no significant relationship between motivation and self-efficacy and the mathematics performance of the students.  𝐻𝑜: There is no significant relationship between motivation and self-efficacy and the mathematics performance of the students.  𝐻𝑜: There is no significant influence between motivation and self-efficacy on the mathematics performance of the students.  𝐻𝑜: There is no significant influence between motivation and self-efficacy on the mathematics performance of the students.  Teachers The study results would inform the teachers about the design and implementation of effective instructional strategies that promote student motivation and self-efficacy in mathematics, especially in the context of online learning. Teachers can use the findings of this study to create learning materials that cater to different learning styles and preferences of their students, to incorporate motivational and self-efficacy enhancing techniques into their teaching practices.  School Administrators The study results would inform the development of policies and programs that promote effective online learning practices in mathematics education. The findings of this study may be used to evaluate and improve existing online learning programs and to design new ones that are tailored to the needs of students and teachers.  Students The finding of this study would help the students to better understand the importance of motivation and self-efficacy in mathematics learning, and how these factors can affect their performance in the subject. By knowing their own level of motivation and self-efficacy, students can develop strategies to improve their learning and achieve better outcomes in their mathematics courses. F. Scope and Delimitation of the Study This study focused on determining the relationship between motivation, self-efficacy, and mathematics performance of the selected students using universal sampling technique. It includes 104 first-year mathematics major students in all campuses of Davao De Oro State College who are currently enrolled in Mathematics of Investment subject for the first semester of 2022-2023. Moreover, the researcher wants to determine if motivation and self-efficacy can predict students’ mathematics performance, specifically in the context of online learning. G. Significance of the study The findings of the study will benefit the following; The findings of the study will benefit the following;  Students  Future Researchers. The study would serve as a basis for further investigations into the relationship between motivation, self-efficacy, and mathematics performance in different contexts and populations. The findings of this study may also provide insights into the factors that contribute to successful online learning experiences in mathematics education, which can be further explored and developed. H. Definition of terms For the purpose of understanding how they are used in the study, the following words are defined operationally of terms urpose of understanding how they are used in the study, the following words are defined operationally;  Motivation – It refers to a psychological state that drives an individual to engage in a particular behavior or activity.  Motivation – It refers to a psychological state that drives an individual to engage in a particular behavior or activity.  Self-Efficacy –  Self-Efficacy – It refers to the level of learners’ confidence in their ability to complete the learning requirements for online courses successfully.  Self Efficacy It refers to the level of learners’ confidence in their ability to complete the learning requirements for online courses successfully.  Mathematics Performance – It refers to the summative test scores obtained by the students. 2211 IJISRT23JUL1538 www.ijisrt.com Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 A. Research Design. A. Research Design. This is a quantitative study. The research design employed was a descriptive correlational desi gathers information to assess whether there is a relationship or difference between or among specific v This study used a descriptive correlational research design since the researcher seeks to determine the student’s level of motivation, self-efficacy, and performance. Also, to determine if motivation and self-efficacy have a significant relationship and will be able to predict students’ mathematics performance in online learning. CHAPTER TWO METHODOLOGY This chapter presents the research design, locale, population and respondents of the study, research instruments, validation of the research instruments, data gathering procedure, scoring quantification of data, and the statistical treatment of the data. B. Research Locale This study was conducted in Davao De Oro where the four campuses of Davao de Oro State College (DDOSC) are located. Davao De Oro historacally known as Compostela Valley is located in the Davao region. It comprises 11 municipalities with stunning natural features such as rivers, lakes, waterfalls, caves, hot and cold springs, and mountain ranges. Davao De Oro State College (DDOSC) formerly known as Compostela Valley State College (CVSC) by RA 11575. DDOSC is a public institution of higher learning located in the southern part of the Philippines. The college has four campuses, namely: Compostela (Main), New Bataan, Montevista, and Maragusan. All of these are offering Bachelor of Secondary Education major in Mathematics program where the researcher had gathered his data from. The Compostela campus is located in the Municipality of Compostela, where the main administration building and the majority of the college’s academic program are located, it is situated in a town that boasts of its natural attractions such as the famous Aliwagwag Falls, one of the highest waterfalls in the country. The New Bataan Campus is located in the Municipality of New Bataan is described as an ecological paradise, and is home to diverse flora and fauna species. The town is also famous for having Mount Pandadagsaan which is the 3rd highest peak in the Davao region and one of the best hiking destinations of Davo de Oro. The Montevista Campus is situated in the Municipality of Montevista that features a one-stop adventure destination which is Jorge Town. A person can enjoy various activities such as a mini zoo, swan boat, zip line, and many more in just one destination. The Maragusan campus is located in the Municipality of Maragusan and is often referred to as the “Summer Capital of Davao” due to its cool climate and natural attractions such as the Tagbibinta Falls, Marangig Falls, and the Mainit hot Spring. The town is also known for its eco-tourism sites, including the Mount Candalaga Range, which is a popular hiking destination, and the many sea of clouds observation decks that bring breathtaking sceneries. Figure 2 presents the location of the study: Compostela (Main), New Bataan, Montevista, and Maragusan campus. 2212 Figure 2 presents the location of the study: Compostela (Main), New Bataan, Montevista, and Maragusan campus. IJISRT23JUL1538 www.ijisrt.com Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 olume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Fig 2 The Map of Davao De Oro Showing Location of Four Municipalities Namely Compostela, New Bataan, Montivista, and Maragusan where Each of the Campuses Of Davao De Oro State College are Located. ISSN No:-2456-2165 ISSN No:-2456-2165 ao De Oro Showing Location of Four Municipalities Namely Compostela, New Bataan, Montivista, and aragusan where Each of the Campuses Of Davao De Oro State College are Located. Fig 2 The Map of Davao De Oro Showing Location of Four Municipalities Namely Compostela, New B Maragusan where Each of the Campuses Of Davao De Oro State College are Locate C. Research Respondents The respondents of this study were the 1st year Mathematics major students who are currently taking the subject Mathematics of Investment in the 2nd semester of the Academic Year 2022-2023 in the selected school Davao De Oro State College. There are a total of 104 enrolled students of the target respondents. The samples are all the 1st year Mathematics major students using the universal sampling technique. Table 1 Subjects of the Study Campus TOTAL N % Davao De Oro State College-Compostela 30 29 Davao De Oro State College-New Bataan 26 25 Davao De Oro State College-Montevista 21 20 Davao De Oro State College-Maragusan 27 26 TOTAL 104 100 F. Research Procedures The researcher will write a formal request letter to the School research office outlining the study's purpose, objectives, and methodology. The letter will be accompanied by a copy of the research proposal, content forms, and any relevant documents required by the school. The researcher will seek ethical clearance from the school’s Research Ethics Committee. The committee will review the proposal and ensure that the study complies with ethical guidelines for research involving human participants. The research will address any concerns raised by the committee and obtain the necessary approvals before proceeding. Once permission has been granted, the researcher will set a schedule for data collection. The researcher will inform the selected schools and obtain permission from the school administrators and teachers to conduct the study. A brief orientation will be conducted with the class advisers on the nature and scope of the study, emphasizing the importance of maintaining confidentiality and the voluntary participation of the students. The participants will be informed that their participation is completely voluntary and that they may withdraw from the study at any time without consequence. The participants will also be assured that their anonymity and confidentiality will be protected throughout the study. The data collection activity will take place on the scheduled date. The class advisers will administer the research questionnaire to the students via Google Forms. The respondents will answer the research questionnaire within 1 hr and 30 minutes. After administering the said activity the researcher will ensure the privacy of the participants is protected. The data will be tabulated and analyzed statistically. The researcher will ensure that the data is anonymous and that the privacy and confidentiality of the participants are maintained throughout the data analysis and reporting stage. Finally, the researcher will prepare a report detailing the findings of the study and present it to the School Research Office. The researcher will acknowledge the contributions of the school and the participants in the study. E. Validation of the Instrument The research instrument such as Motivation, Self-efficacy, and Summative tests were presented to the researcher’s validators and research adviser for comments and suggestions. After validation, the researcher revised the instruments based on the given comments and suggestions. The summative test was syllabus based and with a Table of Specifications (TOS). The summative test was meticulously crafted and organized, it included the presentation of a TOS to ensure that the test items were distributed properly. Pilot testing of the said test questionnaire to the 2nd year mathematics students was conducted to test the reliability of the questionnaire. The sample respondents are selected who are not connected but with the same characteristics as the identified respondents. Using a suitable statistical tool, the result showed a reliability index of 0.710. D. Research Instruments The instruments used in this study were a researcher-made test and an adapted instrument. The researcher used the Academic Motivation Scale (AMS) adapted from Valerland et al. (1993) questionnaire consisting of 16 items. Each item is measured using a Likert scale of four points, ranging from strongly disagree (1) to strongly agree (4). The researcher also used the Online www.ijisrt.com 2213 IJISRT23JUL1538 2213 www.ijisrt.com Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology Learning Self-Efficacy Scale (OLSES) adopted from Zimmerman and Kulikowich’s (2016) questionnaire consisting of 17 items. Each item is measured using a Likert scale consisting of four points, ranging from strongly disagree (1) to strongly agree (4). The researcher-made summative test was used consisting of 45 items.  Mean  Mean This statistical tool will determine the level of students’ self-efficacy, motivation, and Mathematics Performance.  Mean This statistical tool will determine the level of students’ self-efficacy, motivation, and Mathematics Performance.  Standard deviation This will be used to measure how dispersed the data is in relation to the mean.  Standard deviation This will be used to measure how dispersed the data is in relation to the mean. G. Statistical Treatment of Data After collecting quantifiable information, the researcher will use the mean, standard deviation, and frequency distribution table to analyze the levels of measurement of motivation, self-efficacy, and mathematics performance of the students. The Pearson product-moment correlation will be employed to determine the correlation between motivation, self-efficacy, and mathematics performance. Multiple regression analysis will be applied to determine if motivation and self-efficacy can predict mathematics performance. The significance level will be set at p<0.05. All statistical analysis will be performed using the Statistical Package for the Social Sciences (SPSS).  Correlation  Correlation This statistical tool will determine the significant relationship between self-efficacy and Mathematics performance, and motivation and Mathematics performance.  Multiple Regression This is used to analyze the predictive power of self-efficacy and motivation to the students’ Mathematics performance.  Multiple Regression This is used to analyze the predictive power of self-efficacy and motivation to the students’ Mathematics performance.  Multiple Regression This is used to analyze the predictive power of self-efficacy and motivation to the students’ Mathematics performance. IJISRT23JUL1538 CHAPTER THREE RESULTS The data that were acquired using the study’s research instruments are presented in this chapter. It also provides the statistical analysis and the interpretation of data to answer the problems stated in the problems of the study. A. The Level of Students’ Self-efficacy The table below shows the level of self-efficacy of the students. A. The Level of Students Self efficacy The table below shows the level of self-efficacy of the students. Table 2 Level of Students’ Self-efficacy Items Weighted Mean Descriptive Rating I am confident in my ability to navigate online course materials efficiently 2.64 Agree I believe that I can communicate effectively with technical support via e-mail, telephone, or live online chat. 2.75 Agree I am confident that I can submit assignments to an online Dropbox. (i.e., google drive) 2.94 Agree I am confident in my ability to overcome technical difficulties on my own. 2.71 Agree I believe that I can navigate the online grade book. (i.e., scores or grades in google forms quizzes) 2.66 Agree I am confident that I can manage time effectively. 2.68 Agree I believe that I can complete all assignments on time. 2.86 Agree I am confident in my ability to learn to use a new type of technology efficiently 2.86 Agree I believe that I can learn without being in the same room as the instructor 2.55 Agree 0. I am confident that I can learn without being in the same room as other students. 2.63 Agree 1. I believe that I can search the Internet to find the answer to a course-related question. 2.77 Agree 2. I am confident that I can meet deadlines with very few reminders. 2.72 Agree 3. I believe that I can complete a group project entirely online. 2.58 Agree 4. I am confident that I can use synchronous technology to communicate with others (i.e., messenger, google meet, zoom). 2.86 Agree 5. I believe that I can focus on schoolwork when faced with distractions. 2.47 Agree 6. I am confident that I can develop and follow a plan for completing all required work on time. 2.72 Agree 7. I believe that I can promptly ask questions in the appropriate forum (e-mail, google classroom, discussion board, etc.) when a problem arises. 2.65 Agree Overall Weighted Responses 2.71 Agree Items Table 2 shows the level of students’ self-efficacy in online learning. www.ijisrt.com 2214 Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 CHAPTER THREE RESULTS “I am confident that I can submit assignments to an online Dropbox. (i.e., google drive)” has the highest mean of 2.94 and has a descriptive rating of “Agree”. This means that the students are familiar with and have sufficient knowledge of using this platform when submitting tasks online. On the other hand, the “I believe that I can focus on schoolwork when faced with distractions” has the lowest mean of 2.47 and has a descriptive rating of “Agree”. This shows that only some students are confident that they can focus on their school works online due to the many distractions that online learning may bring such as social media, online games, and many more. The overall mean is 2.71 which has a descriptive rating of “Agree”. This mean score suggests that the students have a moderate level of self-efficacy in online learning. Based on the result, the majority of the students have a moderate level of self- efficacy. It means that they have some confidence in their abilities related to the various situations and feel moderately capable in online learning tasks. In addition, It implies that they require occasional support and guidance. Also, it entails that there is a need to increase their level of self-efficacy. Similar results from the study on the level of self-efficacy in online learning have been reported by Ali (2021). In the study, it is said that online learners had a moderate level of self-efficacy and suggested that to improve students’ self-efficacy a course in ICT may be offered to all online learners as a prerequisite for any online course. As online learning is student-centered and self-directed, it is necessary for students to improve their self-efficacy to perform well in online learning. There are studies for measuring self-efficacy in online learning. The study of Lai et al (2021) shows that students with a higher level of self-efficacy are more likely to experience learning satisfaction. IJISRT23JUL1538 2215 www.ijisrt.com International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Volume 8, Issue 7, July – 2023 Volume 8, Issue 7, July – 2023 B. The Level of Students’ Motivation Data on the level of students’ motivation are presented in the Table below. Table 3 Level of Students’ Motivation Items Weighted Mean Descriptive Rating . CHAPTER THREE RESULTS I really feel that I am wasting my time in school 3.54 Strongly Disagree . I once had good reasons for going to school; however, now I wonder whether I should continue 3.17 Agree . I cannot see why I go to school and frankly, I could not care less. 3.38 Agree . I cannot understand what I am doing in school 3.46 Agree . I believe that without good grades in Mathematics, I will not be able to find a high-paying job. 2.71 Agree . In order to obtain a more prestigious job later on. 2.73 Agree . I want to have “the good life” later on. 3.40 Agree . I want to prove to myself that I am capable of completing my college degree. 3.39 Agree . I feel important when I succeed in school. 3.29 Agree 0. It is to show myself that I am an intelligent person. 2.66 Agree 1. I want to show myself that I can succeed in my studies. 3.35 Agree 2. This will help me make a better choice regarding my career orientation. 3.13 Agree 3. Eventually, it will enable me to enter the job market in a field that I like. 3.02 Agree 4. I believe that my college education will improve my competence as a worker. 3.28 Agree 5. I experience pleasure and satisfaction while learning new things. 3.13 Agree 6. I experience pleasure and satisfaction in broadening my knowledge about Mathematics. 3.10 Agree Overall Weighted Responses 3.17 Agree As presented in Table 3, “I really feel that I am wasting my time in school” has the highest mean of 3.54 which has descriptive of “Strong Disagree”. It implies that students think that attending school is a worthwhile and beneficial thing to do. The statement “I believe that without good grades in Mathematics, I will not be able to find a high-paying job” has the lowest mean and has a descriptive rating of “Agree”. It means that some of the students believe that it is necessary to have good grades to find high-paying jobs in the future. The responses gave an overall mean of 3.17 which has a descriptive rating of “Agree”. This suggests that the students possess a moderate level of motivation in their academic pursuits. In addition, this means that the students generally display an average level of interest and engagement. CHAPTER THREE RESULTS Almost the same result was found by Basar et al. (2021) that students motivation in online learning was low. This shows that students require additional support or strategies to enhance their motivation. According to Ozer & Badem (2022) who exclaimed that students who have high motivation tend to have higher grades. This is because they are more engaged in the learning process, especially in an online platform. Hence, they were also able to grasp the content of the subject matter, regardless of the challenges of online learning. Moreover, the study of Aduayi-Akue et al., (2017) also supports this claim stating that motivation has a significant effect on students’ performance in online learning. Motivation plays a significant role in education, especially in increasing the performance of the learners. C. The Level of Students’ Mathematics Performance The table below shows the level of students’ Mathematics performance in a summative test. Table 4 Level of Students’ Mathematics Performance Mean Standard Deviation Proficiency Descriptive rating Summative test 24.43 10.51 54.29% Did Not Meet Expectations C. The Level of Students’ Mathematics Performance The table below shows the level of students’ Mathematics performance in a summative test. C. The Level of Students’ Mathematics Performance The table below shows the level of students’ Mat Table 4 Level of Students’ Mathematics Performance Mean Standard Deviation Proficiency Descriptive rating Summative test 24.43 10.51 54.29% Did Not Meet Expectations Table 4 describes the students’ average score of 24.3 and proficiency level of 54.29% this implies that, on average, the students attained half of the total possible score. It suggests that the students did not meet the expected level of proficiency in the Mathematics subject. This shows that students may have faced various challenges in learning mathematics in online learning. Bringula and colleagues (2021) found that internet connectivity and power outages are the most problematic aspects of online learning. Furthermore, Mamolo (2022) said that students are struggling to learn in this online learning context because they lack the motivation to do self-study and have a lot of household activities and chores. These issues make it tough for students to learn. IJISRT23JUL1538 2216 www.ijisrt.com Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Nevertheless, Gürsul and Keser (2009) found that students perform better in online learning when compared to face-to-face. CHAPTER THREE RESULTS As online learning will be permanently integrated into the education system it is necessary to address the challenges to help improve the teaching-learning process in this type of learning modality. D. The Significant Relationship between Motivation and Mathematics Performance  The Significant Relationship between Self-Efficacy and Mathematics Performance Th bl b l h h l i l i f S lf Effi d M h i P  The Significant Relationship between Self-Efficacy and Mathematics Performance The table below shows the correlation analysis of Self-Efficacy and Mathematics Performance. The table below shows the correlation analysis of Self-Efficacy and Mathematics Performance. Table 5 Significant Relationship between Self-Efficacy and Mathematics Performance Variables Correlation Coefficient P-value Remarks Self-efficacy .020 .838 Not Significant Mathematics Performance Table 5 revealed a negligible positive relationship between self-efficacy and Mathematics performance (r = .020, p =.838 ). The magnitude of the r suggests a negligible relationship between these variables. Furthermore, the p-value of .838 indicates that the observed correlation is not statistically significant. Contrary to the initial hypothesis, the results of the correlation analysis did not support a significant relationship between self-efficacy and Mathematics performance. The weak and non-significant correlation suggests that the level of self-efficacy among the students’ had minimal influence on their Mathematics performance in online learning. These findings align with some previous studies that reported weak or inconsistent associations between self-efficacy and Mathematics performance. According to Mijares III (2022), students’ mathematics performance is not significantly affected by self-efficacy. The same result with the correlation between motivation and mathematics performance, it is fascinating since it contradicts the vast majority of academic research that asserts motivation has a significant relationship on students’ mathematics performance (Wang et al., 2017; Kou et al., 2020; Flores, 2020; Aksu & Guzeller, 2016; Delioglu, 2017; Duran & Bekdemir, 2013). Whatever the outcome, it is also necessary to improve students’ self-efficacy during online learning, as supported by much literary evidence. According to Watsons (2015), students with higher self-efficacy are more successful in mathematics because they can perform better cognitively, have more motivation to continue in the face of difficulties, have less math anxiety, and are more likely to study mathematics. The table below shows the correlation analysis of Motivation and Mathematics Performance. The table below shows the correlation analysis of Motivation and Mathematics Performance. CHAPTER THREE RESULTS Table 6 Significant Relationship between Motivation and Mathematics Performance Variables Correlation Coefficient P-value Remarks Motivation .074 .454 Not Significant Mathematics Performance Table 6 revealed a negligible positive relationship between motivation and Mathematics performance (r = .074, p=.454). The magnitude of the r suggests a negligible relationship between these variables. Furthermore, the p-value of .454 indicates that the observed correlation is not statistically significant. In contrast to the first hypothesis, the results of the correlation analysis did not support a significant relationship between motivation and mathematics performance. The weak and non-significant correlation suggests that the level of motivation among the students had minimal influence on their Mathematics performance in online learning. These findings align with some previous studies that reported weak or inconsistent associations between motivation and mathematics performance. Mijares III (2022) asserts that motivation does not significantly affect students’ mathematics performance. It is intriguing since it goes against the great majority of academic studies that claim motivation has a big influence on students’ performance (Schunk et al., 2008; Paas et al., 2005; Ugwuanyi et al., 2020). Regardless of the result, it is still necessary to improve learners’ motivation to help students engage in the online classroom. Also, the importance of good teachers in encouraging student motivation is one of the key factors to having a successful academic performance. E. The Self-efficacy and Motivation as Predictors of Students’ Mathematics Performance E. The Self-efficacy and Motivation as Predictors of Students’ Mathematics Performanc f ff y f f The table below shows the Multiple regression analysis results to determine the predictive power of self-efficacy and motivation to the students’ Mathematics performance. The table below shows the Multiple regression analysis results to determine the predictive pow motivation to the students’ Mathematics performance. IJISRT23JUL1538 www.ijisrt.com 2217 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Volume 8, Issue 7, July – 2023 Table 7 Self-Efficacy and Motivation as Predictors of Students’ Mathematics Performance Model R R Square Adjusted R square F Sig. 1 .080 .006 -.013 .329 .720 Note: 𝛼= 0.05 The above table revealed a negligible positive correlation (R=.080) between self-efficacy, motivation, and Mathematics performance. The coefficient of determination (R Square) indicated that .6% of the variance in Mathematics performance could be explained by the predictors. However, after adjusting for the number of predictors, the variance in Mathematics performance was not meaningful. Furthermore, the F-test results showed that the model as a whole was not statistically significant (F=.329, p=.720) at the alpha level of .05. le below was the result of multiple regression analysis it provides information about the individual nd their relationship with the dependent variable. The coefficient table below was the result of multiple regression analysis it provides information about the individual predictors in the model and their relationship with the dependent variable. Table 8 Self-Efficacy and Motivation as Predictors of Students’ Mathematics Performance Coefficient Table Model Unstandardized Coefficients Standardized Coefficients t Sig. B Std. Error Beta 1 constant 19.547 7.791 2.509 .014 Motivation 2.308 2.938 .098 .786 .434 Self-efficacy -.900 2.873 -.039 -.313 .755 Dependent Variable: Mathematics Performance Regarding the predictor variables presented in the table above, it showed that motivation had a non-significant relationship with Mathematics performance (B=2.308, t=.786, p=.434). Similarly, self-efficacy also exhibited a non-significant relationship with Mathematics performance (B=-.900, t=-.313, p=.755). The result shows that while self-efficacy and motivation have a negligible relationship with Mathematics performance, they may not be strong predictors in online learning. The low adjusted R square value indicates the addition of self-efficacy and motivation to the model did not significantly contribute to explaining the variance in Mathematics performance. However, this still shows that self-efficacy and motivation contribute to online learning lowly. E. The Self-efficacy and Motivation as Predictors of Students’ Mathematics Performanc Özcan and Gümüş (2019) show that mathematics motivation predicts mathematics self-efficacy which in turn predicts retrospective metacognitive experience i.e,., students' narrative of their metacognitive activities after solving a mathematics task. Understanding self-efficacy in online learning is essential to improving online education, which can be a key component of academic success in distance education (Hodges, 2008). 2218 IJISRT23JUL1538 www.ijisrt.com Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 CHAPTER FOUR DISCUSSION AND CONCLUSION This chapter presents the summary of findings of the study, conclusions and recommendations of the conducted study. A. Summary of Findings The results of the data analysis and interpretation were as follows: A. Summary of Findings The results of the data analysis and interpretation were as follows:  The students’ self-efficacy was at a moderate level.  The students’ self-efficacy was at a moderate level.  The students’ motivation was at a moderate level.  The students’ mathematics performance did not meet the level of expected proficiency level.  The students’ mathematics performance did not meet the level of expected proficiency level.  There is a negligible relationship between the level of students’ self-efficacy and mathematics performance.  There is a negligible relationship between the level of students’ self-efficacy and mathematics performance.  There is a negligible relationship between the level of students’ self-efficacy and mathematics perform  There is a negligible relationship between the level of students’ motivation and mathematics performan  The level of students’ self-efficacy and motivation were not significant predictors of students’ mathematics performance  The level of students’ self-efficacy and motivation were not significant predictors of students’ mathematics performance.  The level of students’ self-efficacy and motivation were not significant predictors of students’ mathematics performance. C. Recommendations C. Recommendations C. Recommendations Based on the conclusions derived from the study, the following recommendations are hereby presented: Based on the conclusions derived from the study, the following recommendations are hereby presented:  There is a need to improve students’ self-efficacy and motivation. Students should develop their own personal strategies t improve self-efficacy and motivation in learning Mathematics in an online learning mode.  There is a need to improve students’ self-efficacy and motivation. Students should develop their own personal strategies to improve self-efficacy and motivation in learning Mathematics in an online learning mode.  Teachers should design and implement an effective strategy that can improve students’ motivation and self-efficacy in Mathematics, especially in the context of online learning. Teachers should create learning materials that can cater to different learning styles and preferences of the students, to incorporate motivational and self-efficacy-enhancing techniques into their teaching practices.  Teachers should design and implement an effective strategy that can improve students’ motivation and self-efficacy in Mathematics, especially in the context of online learning. Teachers should create learning materials that can cater to different learning styles and preferences of the students, to incorporate motivational and self-efficacy-enhancing techniques into their teaching practices.  The school administrator should develop policies and programs that promote effective online learning practices in Mathematics education. Based on the results, they should revisit the existing online learning programs to cater the needs of students and teachers.  The school administrator should develop policies and programs that promote effective online learning practices in Mathematics education. Based on the results, they should revisit the existing online learning programs to cater the needs of students and teachers.  This study is recommended for future researchers as a basis to investigate further the relationship between motivation and self- efficacy toward Mathematics performance in different contexts and populations. This study also provides insights into the factors that contribute to successful online learning experiences in Mathematics, which can be further explored and developed.  This study is recommended for future researchers as a basis to investigate further the relationship between motivation and self- efficacy toward Mathematics performance in different contexts and populations. This study also provides insights into the factors that contribute to successful online learning experiences in Mathematics, which can be further explored and developed. 2219 B. Conclusion World Health Organization chief declares the end to Covid-19 as a global health emergency, this virus changes the education system globally. To continue education one of the learning modes in education is online learning during the time of pandemic. Though in the present time, most schools transitioned back to face-to-face classes, still online learning is the new alternative way of delivering instructions. In fact, some of the schools also remained in a full online learning mode. Thus, the findings of this study are very important. This will be an essential help for the school administrators to revisit their curriculum and course syllabi in adjusting to the new normal. Through this, students may be able to adapt whenever there is an urgent need to switch back to online learning vis-à-vis. In summary, the student’s level of self-efficacy and motivation was at a moderate level. Students had moderate levels of self- efficacy and motivation to perform academic tasks in an online learning environment. The study concluded that both motivation and self-efficacy have a negligible relationship and are not statistically significant. Also, motivation and self-efficacy were not significant predictors of students’ Mathematics performance. C. Recommendations Based on the conclusions derived from the study, the following recommendations are hereby presented: IJISRT23JUL1538 www.ijisrt.com International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 REFERENCES Bringula, R., Reguyal, J., Tan, D., & Ulfa, S. (2021). Mathematics self-concept and challenges of learners in an online learning environment during COVID-19 pandemic. Smart Learning Environments. [14]. Cabansag, P. D., Cabansag, V. C., & Soriano, R. B. (2020). Students' Motivation toward Onlin Making. Asian Society of Teachers for Research, Inc. [15]. Çalışkan, H., & Kılınç, G. (2002). The Relationship Between the Learning Styles of Students a Social Studies Course. Elsevier Ltd. Selection. doi: 10.1016/j.sbspro.2012.09.476 . j p [16]. Capinding, A. T. (2022). Impact of Modular Distance Learning on High School Students Mathematics Motivation, I t t/Attit d A i t d A hi t d i th COVID 19 P d i E J l f Ed ti R h j p [16]. Capinding, A. T. (2022). Impact of Modular Distance Learning on High School Students Mathematics Motivation, Interest/Attitude, Anxiety and Achievement during the COVID-19 Pandemic. European Journal of Education Research. [17]. Cepada, C. M., & Grepon, B. G. (2020). ABSENTEEISM AND PARENTAL INVOLVEMENT IN HOME AND SCHOOL AMONG MIDDLE SCHOOL STUDENTS OF PUBLIC SCHOOLIN NORTHERN MINDANAO, PHILIPPINES: BASIS FOR INTERVENTION. Asian Journal of Education. https://doi.org/10.5281/zenodo.4459797. p g [18]. Chukwuemeka, O. (2013). Environmental Influence on Academic Performance of Secondary School Students in Port Harcourt Local Government Area of Rivers State. Journal of Economics and Sustainable Development. p [19]. Collins III, J. W., & O'Brien, N. P. (2003). The Greenwood Dictionary of Education. Santa Barbara, California: Greenwood Press. [20]. Dullas, A. (2010). Academic Performance and Self-Efficacy of Filipino Science High School Students on Mathematics and English Subjects. Available at SSRN: https://ssrn.com/abstract=2152791. [21]. Duran, M., & Bekdemir, M. (2013). Evaluation of visual math literacy self efficacy perception with visual mathematics accomplishment. Pegem Eğitim ve Öğretim Dergisi. 5). In the mind of the actor: The structure of adolescents’ achievement task values and expectancy-related y and Social Psychology Bulletin, 260–267. [22]. Eccles, J. &. (1995). In the mind of the actor: The structure of adolescents’ achievement task value beliefs. Personality and Social Psychology Bulletin, 260–267. y y gy , [23]. Elliot, Α. H. (2005). Achievement goals, performance contingencies, and performance attainment: An experimental test. Journal of Educal Psychology, 630–640. y gy [24]. Ercan Yilmaz, M. S. (2017). Variables Affecting Student Motivation Based on Academic. Journal of Education and Practice , 112-120. [25]. Ferreira, M., Cardoso, A. P., & Abrantes, J. L. (2011). REFERENCES [1]. Aduayi-Akue, J., Lotchi, K., Parveen, S., Onatsu, T., & Pehkonen-Elmi, T. (2017). Motivation of Online Learners. Pedagogy in practice. g gy p [2]. Aksu, G., & Güzeller, C. O. (2016). Classification of PISA 2012 mathematical literacy scores using Decision-Tree Method: Turkey sampling. Egitim ve Bilim. y p g g [3]. Albay, E. M. (2020). Towards a 21st Century Mathematics Classroom: Investigating the Effects of the Problem-Solving Approach Among Tertiary Education Students. Asia-Pacific Social Science Review. Albay, E. M. (2020). Towards a 21st Century Mathematics Classroom: Investigating the Effects of the A h A T i Ed i S d A i P ifi S i l S i R i E. M. (2020). Towards a 21st Century Mathematics Classroom: Investigating the Effects of the Proble ch Among Tertiary Education Students Asia-Pacific Social Science Review Albay, E. M. (2020). Towards a 21st Century Mathematics Classroom: Investigating the Effects of the Approach Among Tertiary Education Students. Asia-Pacific Social Science Review. [4]. Ali, S. (2021). E-Learners’ Self-efficacy for Online Courses: Self-efficacy for IT Use as a Predictor for Academic Self- efficacy. Pakistan Journal of Distance & Online Learning . [5]. Alquarashi, E. (2016). Self-Efficacy In Online Learning Environments: A Literature Review. USA: Contemporary Issues in Education Research. [6]. Anderman, E. G. (2013). Motivation and classroom learning. Handbook of psychology, 99–116. [7]. Bandura, A. (1997). Self-efficacy: The exercise of control. New York: Freeman. [8]. Basar, Z. M., Mansor, A. N., Jamaludin, K. A., & Alias, B. S. (2021). The Effectiveness and Challenges of Online Learning for Secondary School Students - A Case Study. Asian Journal of University Education. [9]. Bates, R., & Khasawneh, S. (2007). Self-efficacy and college students' perceptions and use of online learning systems. United Kingdom: Elsevier Science, Oxford. http://dx.doi.org/10.1016/j.chb.2004.04.004. [10]. Bayraktar, H. V. (2015). Student Motivatıon In Classroom Management And Factors That Affect Motivation. Turkish Studies International Periodical For The Languages, Literature and History of Turkish or Turkic, 1079-1100. [11]. Brachtl, S., Ipser, C., Aschenberger, F., Oppl, S., Oppl, S., Pakoy, E., & Radinger, G. (2023). Physical home-learning environments of traditional and non-traditional students during the COVID pandemic: exploring the impact of learning space on students’ motivation, stress and well-being. Smart Learning Environments. p , g g [12]. Brennan. (2019). Diversity of Online Behaviours Associated with Physical Attendance in Lectures. Journal of Learning Analytics. http://learning-analytics.info/journals/index.php/JLA/. y p g y j p p [13]. REFERENCES Kuo, Y.-C., Tseng, H., & Kuo, Y.-T. (2020). Internet Self-Efficacy, Self-Regulation, and Student Performance: African- American Adult Students in Online Learning. Waynesville, NC USA: Association for the Advancement of Computing in Education (AACE). https://www.learntechlib.org/primary/p/181355/. [44]. Kuo, Y.-C., Tseng, H., & Kuo, Y.-T. (2020). Internet Self-Efficacy, Self-Regulation, and Student Performance: African- American Adult Students in Online Learning. Waynesville, NC USA: Association for the Advancement of Computing in Education (AACE). https://www.learntechlib.org/primary/p/181355/. [45]. Kuo, Y.-C., Walker, A. E., Belland, B. R., Schroder, K. E., & Kuo, Y.-T. (2014). A Case Study of Integrating Interwise: Interaction, Internet Self-Efficacy, and Satisfaction in Synchronous Online Learning Environments. Taiwan: THE INTERNATIONAL REVIEW OF RESEARCH IN OPEN AND DISTANCE LEARNING. http://www.irrodl.org/index.php/irrodl/article/view/1664. p g p p [46]. Lai, C. S., Au, K. M., & Low, C. S. (2021). Beyond conventional classroom learning: Linking emotions and self-efficacy to academic achievement and satisfaction with online learning during the COVID-19 pandemic. Journal of Education and e-Learning Research. g [47]. Lazim, M. A. (2004). The Statistical Efidence in Describing the Students' Beliefs about Mathematics. Int. J. Math. Teach. Learn. [48]. Lee, J.-K., & Hwang, C.-Y. (2007). The effects of computer self-efficacy and learning management system quality on e- Learner's satisfaction. Proceedings of the 2007 European LAMS Conference: designing the future of learning. [49]. Lim, C. K. (2001). Computer self-efficacy, academic self-concept, and other predictors of satisfaction and future participation of adult distance learners. American Journal of Distance Education. . doi:10.1080/08923640109527083. [50]. Mamolo, L. A. (2022). Online Learning and Students' Mathematics Motivation, Self-Efficacy, and Anxiety in the "new Normal". Education Research International. [51]. Martin, F., & Tutty, J. I. (2008). Learning Management System Self-Efficacy of online and hybrid learners: Using LMSES Scale. Paper presented at the Proceeding of the UNC Teaching and Learning with Technology Conference, Raleigh, NC. [52]. Martin, F., Tutty, J. I., & Su, Y. (2010). Influence of Learning Management Systems Self-Efficacy on E-Learning Performance. Journal on School Educational Technology. [53]. McCune, V. &. (2011). Cultivating the disposition to understand in 21st century university education. Learning and Individual Differences, 303-310. 5 ij [54]. Mijares III, B. (2022). SCHOOL HEADS' INSTRUCTIONAL SUPERVISIONS AND ITS IMPACT ON TEACHERS' JOB SATISFACTION View project Research Ouput View project. Phsychology and Education: A Multidisciplinary Journal. [55]. Motevalli, S. P. (2020). Motivating Students to Learn: An Overview of Literature in Educational Psychology. International Journal of Academic Research in Progressive Education & Development, 63–74. [56]. REFERENCES Motivation and relationship of the student with the school as factors involved in the perceived learning. Procedia - Social and Behavioral Sciences. [26]. Flores, I. M. (2020). Self-Efficacy and Mathematics Performance of Students’ in the New Normal in Education. Batangas City, Philippines: World Journal of Educational Research: www.scholink.org/ojs/index.php/wjer. [27]. Flores, I. M. (2020). Self-Efficacy and Mathematics Performance of Students’ in the New Normal in Education. World Journal of Educational Research. n-Zvi, D. (2009). Helping Students Develop Statistical Reasoning: Implementing a Statistical Reasoning ment. Teaching Statistics. [28]. Garfield, J., & Ben-Zvi, D. (2009). Helping Students Develop Statistical Reasoning: Implementin Learning Environment. Teaching Statistics. g g [29]. Gürsul, F., & Kesser, H. (2009). The effects of online and face to face problem based learning environments in mathematics education on student's academic achievement. Procedia - Social and Behavioral Sciences. [30]. Hannula, M. S. (2004). Regulation motivation in mathematics. 10th International Congress on Mathematical Education. IJISRT23JUL1538 2220 www.ijisrt.com Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology [31]. Hasan, M. Z., Hasan, B., Tareq, M., Hossain, B., & Islam, M. A. (2014). Factors Affecting Self-Efficacy Towards Academic Performance: A Study on Polytechnic Students in Malaysia. Advances in Environmental Biology. y y y gy [32]. Hiller, S. E., Kitsantas, A., Cheema, J. E., & Poulou, M. (2022). Mathematics anxiety and self-efficacy as predictors of mathematics literacy. International Journal of Mathematical Education in Science and Technology. [32]. Hiller, S. E., Kitsantas, A., Cheema, J. E., & Poulou, M. (2022). Mathematics anxiety and self-efficacy as predictors of mathematics literacy. International Journal of Mathematical Education in Science and Technology. y gy [33]. Hodges, C. B. (2008). Self-efficacy in the context of online learning environments: A review of the literature and directions for research. Performance Improvement Quarterly, 20(3-4), 7-25. doi:10.1002/piq.20001. [33]. Hodges, C. B. (2008). Self-efficacy in the context of online learning environments: A review of the literature and directions for research. Performance Improvement Quarterly, 20(3-4), 7-25. doi:10.1002/piq.20001. [34]. Huang, X., & Mayer, R. E. (2018). Adding Self-Efficacy Features to an Online Statistics Lesson. Journal of Educational Computing Research. https://doi.org/10.1177/0735633118771085. [34]. Huang, X., & Mayer, R. E. (2018). Adding Self-Efficacy Features to an Online Statistics Lesson. Journal of Educational Computing Research. https://doi.org/10.1177/0735633118771085. p g p g [35]. Hutajulu, M. W. (2019). REFERENCES The effect of mathematical disposition and learning motivation on problem solving: an analysis. Infinity Journal, 229-238. y [36]. Aduayi-Akue, K. L.-E. (2017). Motivation of online learners evolving pedagogy. y g p g gy [37]. Jan, S. K. (2015). The Relationships Between Academic Self-Efficacy, Computer Self-Efficacy, Prior Experience, and Satisfaction With Online Learning. American Journal of Distance Education. doi:10.1080/08923647.2015.994366. [38]. Jang, H. (2008). Supporting Students’ Motivation, Engagement, and Learning During an Uninteresting Activity. Journal of Educational Psychology, 798–811. [39]. Joo, Y. J., Bong, M., & Choi, H. J. (2000). Self-efficacy, self-regulation and performance in web-based instruction. Educational Technology Research and Development. doi:10.1007/BF02313398. [39]. Joo, Y. J., Bong, M., & Choi, H. J. (2000). Self-efficacy, self-regulation and performance in web-based instruction. Educational Technology Research and Development. doi:10.1007/BF02313398. [40]. K.C. Williams, C. W. (2011). Five Key Ingredients for Improving Student Motivation. es Journal, 1-23. . Williams, C. W. (2011). Five Key Ingredients for Improving Student Motivation. esearch in High rnal, 1-23. [41]. Keller, J. (2008). An integrative theory of motivation, volition, and performance. Cognition and Learning, 175–185. [41]. Keller, J. (2008). An integrative theory of motivation, volition, and performance. Cognition and Learning, 175–185. [42]. Kim, C., Park, S., & Cozart, J. (2014). Affective and motivational factors of learning in online mathematics courses. British [41]. Keller, J. (2008). An integrative theory of motivation, volition, and performance. Cognition and Learning, 175–185. [42]. Kim, C., Park, S., & Cozart, J. (2014). Affective and motivational factors of learning in online mathematics courses. British J l f Ed i l T h l ( ) g y p g g [42]. Kim, C., Park, S., & Cozart, J. (2014). Affective and motivational factors of learning in online mathematics courses. British Journal of Educational Technology. [43] KOON A N (2016) CASE STUDY FACTORS INFLUENCING STUDENT’S MOTIVATION IN LEARNING MUFY [42]. Kim, C., Park, S., & Cozart, J. (2014 Journal of Educational Technology. [42]. Kim, C., Park, S., & Cozart, J. (2014). Affective and motivational factors of learning in online mathematics courses. British Journal of Educational Technology. [43]. KOON, A. N. (2016). CASE STUDY: FACTORS INFLUENCING STUDENT’S MOTIVATION IN LEARNING MUFY J l f Ed ti d S i l S i 72 82 Journal of Educational Technology. Journal of Educational Technology. [43]. KOON, A. N. (2016). CASE STUDY: FACTORS INFLUENCING STUDENT’S MOTIVATION IN LEARNING MUFY . Journal of Education and Social Sciences, 72-82. [44]. REFERENCES Motevalli, S., Perveen, A., & Tresa Anak Michael, M. (2020). Motivating Students to Learn: An Overview of Literature in Educational Psychology. International Journal of Academic Research in Progressive Education and Development. [57]. Mulenga, E. M., & Marban, J. M. (2020). Prospective Teachers' Online Learning Mathematics Activities in the Age of COVID-19: A Cluster Analysis Approach. EURASIA J Math Sci Tech Ed, 2020 - Volume 16 Issue 9. https://doi.org/10.29333/ejmste/8345. [58]. Mun, Y. S., & Sam, T. L. (2022). ONLINE LEARNING MOTIVATION DURING COVID-19 PANDEMIC: THE ROLE OF LEARNING ENVIRONMENT, STUDENT SELF-EFFICACY AND LEARNER-INSTRUCTOR INTERACTION. Malaysian Journal of Learning and Instruction. IJISRT23JUL1538 2221 www.ijisrt.com Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology [59]. Murphy, E., & Rudriguez-Manzanares, M. (2009). Teachers’ Perspectives on Motivation in High School Distance Education. Journal of Distance Education. [60]. Negara, H. R., Nurlaelah, E., Wahyudin, Herman, T., & Tamur, M. (2021). Mathematics self-efficacy and mathematics performance in online learning. Indonesia: Journal of Physics: Conference Series:Conf. Ser. 1882 012050. [61]. Nieuwoudt, J. E. (2020). Investigating synchronous and asynchronous classattendance as predictors of academic success in online. Australia: Australasian Journal of Educational Technology. https://doi.org/10.14742/ajet.5137. [62]. Nurrudin, M., Noor, C. N., & Abidin, A. W. (2020). Exploring the Relationship between Self-efficacy and Mathematics Performance in Integral Calculus among Applied Science University Students. Shah Alam, Malaysia: Journal of Physics: Conference Ser. 1496 012018. [63]. Nyman, M. S. (2019). The issue of ‘proudliness’: Primary students’ motivation towards mathematics. LUMAT: International Journal on Math, Science and Technology Education, 81-96. [64]. Osborne, J., Simon, S., & Collins, S. (2003). Attitude towards science: a review of the literature and its implications. International Journal Science Education. [65]. Özcan, B., & Kültür, Y. Z. (2021). The Relationship Between Sources of Mathematics Self-Efficacy and Mathematics Test and Course Achievement in High School Seniors. SAGE Open. [66]. Özcan, Z. Ç., & Gümüş, A. E. (2019). A modeling study to explain mathematical problem-solving performance through metacognition, self-efficacy, motivation, and anxiety. Australian Journal of Education. [67]. Ozer, O., & Badem, N. (2022). Student Motivation and Academic Achievement in Online EFL Level. Language Education and Acquisition Research Network . [68]. Ozkal, N. (2019). Relationships between self-efficacy beliefs, engagement and academic performance in math lessons. Cypriot Journal of Educational Sciences. yp [69]. Paas, F. T. (2005). REFERENCES A motivational perspective on the relation between mental effort and performance: Optimizing learner involvement in instruction. ETR&D, 25–34. [70]. Peteros, E., Gamboa, A., Etcuban, J. O., Dianauanao, A., Sitoy, R., & Arcadio, R. (2019). Factors Affecting Mathematics Performance of Junior High School. Cebu City, Philippines: INTERNATIONAL ELECTRONIC JOURNAL OF MATHEMATICS EDUCATION. https://doi.org/10.29333/iejme/5938. p g j [71]. Picciano, A. G. (2002). Beyond Student Perceptions: Issues of Interaction, Presence, and Performance in an Online Course. Journal of Asynchronous Learning Network. [72]. Pintrich, P. (2003). A motivational science perspective on the role of student motivation in learning and teaching contexts. Journal of Educational Psychology, 667–686. y gy [73]. Rapposelli, J. A. (2014). The Correlation between Attendance and Participation with respect to student Achievement in an Online Learning. United States: ProQuest LLC. g [74]. Reporter, C. U. (2013). Indicators of academic performance. p p [75]. Rifandi, R. (2013). Improving Students’ Motivation in Learning Mathematics By Using Contextual Teaching Strategies. 1- 10. [76]. Rodr´ıguez-Manzanares, E. M. (2009). Teachers’ perspectives on motivation in high school distance education. The Journal of Distance Education, 1-24. [77]. Ryan, R. M. (2000). Self-determination theory and the facilitation of intrinsic motivation, social development, and well- being. American Psychologist, 68-78. [77]. Ryan, R. M. (2000). Self-determination theory and the facilitation of intrinsic motivation, social development, and well- being. American Psychologist, 68-78. [78] Saeed S & Zyngier D (2012) How Motivation Influences Student Engagement: A Qualitative Case Study Journal of y g Zyngier, D. (2012). How Motivation Influences Student Engagement: A Qualitative Case Study. Journa Learning. g y g [78]. Saeed, S., & Zyngier, D. (2012). How Motivation Influences Student Engagement: A Qualitative Education and Learning. g [79]. Santibañez, L., & Guarino, C. (2020). The Effects of Absenteeism on Academic and Social-Emotional Outcomes: Lessons for COVID-19. Policy Analysis for California Education. https://doi.org/10.3102%2F0013189X21994488. [80]. Sartawi, A., Alsawaie, O. N., Dodeen, H., Tibi, S., & Alghazo, I. M. (2012). Predicting Mathematics Achievement by Motivation and Self-Efficacy Across Gender and Achievement Levels. Interdisciplinary Journal of Teaching and Learning. [80]. Sartawi, A., Alsawaie, O. N., Dodeen, H., Tibi, S., & Alghazo, I. M. (2012). Predicting Mathematics Achievement by Motivation and Self-Efficacy Across Gender and Achievement Levels. Interdisciplinary Journal of Teaching and Learning. [81]. Schunk, D. H., Pintrich, P. R., & Meece, J. L. (2008). Motivation in education: theory, research, and applications. Upper Saddle River, N.J.: PearsonMerrill Prentice Hall. y p y g g [81]. Schunk, D. REFERENCES H., Pintrich, P. R., & Meece, J. L. (2008). Motivation in education: theory, research, and applications. Upper Saddle River, N.J.: PearsonMerrill Prentice Hall. [82]. Shen, D., Cho, M. H., Tsai, C. L., & Marra, R. (2013). Unpacking online learning experiences: Online learning self- efficacy and learning satisfaction. Internet and Higher Education. [83]. Sikhwari, T. (2007). The relationship between affective factors and the academic achievement at t South African Journal of Higher Edcuation. 7). The relationship between affective factors and the academic achievement at the University of Venda. rnal of Higher Edcuation. g [84]. Smith, R., Clark, T., & Blomeyer, R. L. (2005). A synthesis of New Research on K-12 Online Learning. Learnin Point Associates. [85]. Suhag, A. K. (2016). Student ACademic Motivation Of Secondary Schools Of Khaırpur Mır’s. Academic Research International , 100-109. [86]. Tang, Y., & Tseng, H. W. (2013). Distance learners’ self-efficacy and information literacy skills. Journal of Academic Librarianship. [87]. Tanius, E. (2020). Correlation between Learners' Motivation, Computer Anxiety and Social Support with Self-efficacy on Online Learning Technology due to COVID-19 pandemic. IJIRMPS. http://dx.doi.org/10.37082/IJIRMPS.2020.v08i06.011. 2222 IJISRT23JUL1538 www.ijisrt.com International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Volume 8, Issue 7, July – 2023 [88]. Taplin, M. (1998). Education in human values through mathematics: Mathematics through education in human values. Hong Kong: Sathya Sai Baba Center of Hong Kong. [89]. Ugwuanyi, C. S. (2020). Motivation and Self-efficacy as Predictors of Learners’ Academic Achievement. JOURNAL OF SOCIOLOGY AND SOCIAL ANTHROPOLOGY. [90]. Uyar, A., & Güngörmüş, A. H. (2011). Factors Associated with Student Performance in Financial Accounting Course. Turkey: European Journal of Economic and Political Studies. [91]. Uyar, A., & Güngörmüş, A. H. (2011). Factors Associated with Student Performance in Financial Accounting Course. European Journal of Economic and Political Studies . p [92]. Vallerland, R. J., Pelletier, L. G., Blais, M. R., Brière, N. M., Senécal, C., & Vallières, E. F. (1993). On the assessment of intrinsic, extrinsic, and amotivation in education: Evidence on the concurrent and construct validity of the Academic Motivation Scale. Educational and Psychological Measurement. y g [93]. Visser, L., Plomp, T., Amirault, R., & Kuiper, W. (2002). Motivating students at a distance: The case of an international audience. Education Technology Research and Development. [94]. Wadsworth, L. M., Husman, J., Duggan, M. A., & Pennington, M. N. (2007). Online Mathematics Achievement: Effects of Learning Strategies and Self-Efficacy. Arizona: JOURNAL of DEVELOPMENTAL EDUCATION. [95]. Wang, T. R. REFERENCES Online Learning Self-Efficacy With and Without Online Learning. American Journal of Distance Education. http://dx.doi.org/10.1080/08923647.2016.1193801. p g [105]. Zulkosky, K. (2009). Self-Efficacy: A Concept Analysis. Nursing Forum. ]. Zulkosky, K. (2009). Self-Efficacy: A Concept An [106]. Zyngier, S. S. (2012). How motivation influences student engagement: a qualitative case study. Journal of Education and Learning, 252–267. 2223 REFERENCES (2014). Assessing the effects of instructor enthusiasm on classroom engagement, learning goal orientation, [94]. Wadsworth, L. M., Husman, J., Duggan, M. A., & Pennington, M. N. (2007). Online Mathematics Achievement: Effects of Learning Strategies and Self-Efficacy. Arizona: JOURNAL of DEVELOPMENTAL EDUCATION. Learning Strategies and Self-Efficacy. Arizona: JOURNAL of DEVELOPMENTAL EDUCATION. [95]. Wang, T. R. (2014). Assessing the effects of instructor enthusiasm on classroom engagement, learning goal orientation, and academic self-efficacy. . Communication Teacher, 44-56. g g y [95]. Wang, T. R. (2014). Assessing the effects of instructor enthusiasm on classroom engagement, le and academic self-efficacy. . Communication Teacher, 44-56. [96]. Wang, Y.-L., Liang, J.-C., Lin, C.-Y., & Tsai, C.-C. (2017). Identifying Taiwanese junior-high school students' mathematics learning profiles and their roles in mathematics learning self-efficacy and academic performance. Elsevier Ltd. Selection. https://doi.org/10.1016/j.lindif.2017.01.008. p g j [97]. Watson, K. L. (2015). Examining the Effects of College Algebra on Students' Mathematical Dispositions. (Publication No. 5601) [Master of arts]. Brigham Young University. 17). Motivation towards Mathematics Learning in the Technology-enhanced Environment. Asia-Pacific uters in Education, 109-115. [98]. Wong, S. W. (2017). Motivation towards Mathematics Learning in the Technology-enhanced En Society for Computers in Education, 109-115. y p , [99]. Yantraprakorn, P., Darasawang, P., & Wiriyakarun, P. (2018). Self-efficacy and Online Language Learning: Causes of Failure. Thailand: Academy Publication. http://dx.doi.org/10.17507/jltr.0906.22. y p g j [100]. Yavuzalp, N., & Bahcivan, E. (2020). The Online Learning Self-Efficacy Scale: Its Adaptation into Turkish and Interpretation According to Various Variables. Turkish Online Journal of Distance Education. [101]. Yilmaz, E., Şahin, M., & Turgut, M. (2017). Variables Affecting Student Motivation Based on Academic Publications. Journal of Education and Practice. [102]. Zhang, Q. (2014). Assessing the effects of instructor enthusiasm on classroom engagement, learning goal orientation, and academic self-efficacy. Communication Teacher, 44-56. y [103]. Zhu, L., Liugen, E., Defazio, J., & Hook, S. A. (2019). Impact of the Stringency of Attend Attendance/Participation and Course Grades. Indiana: Journal of the Scholarship of Teaching and L E., Defazio, J., & Hook, S. A. (2019). Impact of the Stringency of Attendance Policies on Class ipation and Course Grades. Indiana: Journal of the Scholarship of Teaching and Learning. Attendance/Participation and Course Grades. Indiana: Journal of the Scholarship of Teaching and Learning. [104]. Zimmerman, & Kulikowich. (2016). Online Learning Self-Efficacy With and Without Online Learning. American Journal of Distance Education http://dx doi org/10 1080/08923647 2016 1193801 p p g g [104]. Zimmerman, & Kulikowich. (2016). IJISRT23JUL1538 www.ijisrt.com Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 2225 2224 IJISRT23JUL1538 IJISRT23JUL1538 www.ijisrt.com Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Appendix A Endorsement letter Appendix A Endorsement letter IJISRT23JUL1538 Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Appendix B Certificate of Approval of Davao De Oro State Research Ethics Committee www.ijisrt.com 2226 www.ijisrt.com Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 IJISRT23JUL1538 2227 www.ijisrt.com Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Appendix D: Research Questionnaire Appendix D: Research Questionnaire Research Questionnaire IJISRT23JUL1538 www.ijisrt.com 2228 IJISRT23JUL1538 2228 www.ijisrt.com International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Volume 8, Issue 7, July – 2023 Volume 8, Issue 7, July – 2023 ISSN No:-2456-2165  Motivation Academic Motivation Scale (AMS) adopted from Vallerland et al. (1993) The instrument uses the 4-points Likert Scale with a categorical response; 4-Strongly Agree 3-Agree 2-Disagree 1-Strongly Disagree Table 9 Why do you spend time studying Mathematics? Items Strongly Disagree (1) Disagree (2) Agree (3) Strongly Agree (4) . I really feel that I am wasting my time in school . I once had good reasons for going to school; however, now I wonder whether I should continue . I cannot see why I go to school and frankly, I could not care less. . I cannot understand what I am doing in school . I believe that without good grades in Mathematics, I will not be able to find a high-paying job. . In order to obtain a more prestigious job later on. . I want to have “the good life” later on. . I want to prove to myself that I am capable of completing my college degree. . I feel important when I succeed in school. 0. It is to show myself that I am an intelligent person. 1. I want to show myself that I can succeed in my studies. 2. This will help me make a better choice regarding my career orientation. 3. Eventually, it will enable me to enter the job market in a field that I like. 4. I believe that my college education will improve my competence as a worker. 5. I experience pleasure and satisfaction while learning new things. 6. I experience pleasure and satisfaction in broadening my knowledge about Mathematics. Table 10 Level of Motivation Point Scale Range Description Interpretation 4 3.50 – 4.00 Strongly Agree The respondent strongly agrees that the statement or item accurately represents their academic motivation. They fully identify with and endorse the motivation described. 3 2.50 – 3.49 Agree The respondent agrees to some extent with the statement or item. They identify with  Motivation The instrument uses the 4-points Likert Scale with a categorical response; g y g Table 9 Why do you spend time studying Mathematics? Items Strongly Disagree (1) Disagree (2) Agree (3) Strongly Agree (4) . I really feel that I am wasting my time in school . I once had good reasons for going to school; however, now I wonder whether I should continue . I cannot see why I go to school and frankly, I could not care less. . I cannot understand what I am doing in school . I believe that without good grades in Mathematics, I will not be able to find a high-paying job. . In order to obtain a more prestigious job later on. . I want to have “the good life” later on. . I want to prove to myself that I am capable of completing my college degree. . I feel important when I succeed in school. 0. It is to show myself that I am an intelligent person. 1. I want to show myself that I can succeed in my studies. 2. This will help me make a better choice regarding my career orientation. 3. Eventually, it will enable me to enter the job market in a field that I like. 4. I believe that my college education will improve my competence as a worker. 5. I experience pleasure and satisfaction while learning new things. 6. I experience pleasure and satisfaction in broadening my knowledge about Mathematics. Table 10 Level of Motivation Point Scale Range Description Interpretation 4 3.50 – 4.00 Strongly Agree The respondent strongly agrees that the statement or item accurately represents their academic motivation. They fully identify with and endorse the motivation described. 3 2.50 – 3.49 Agree The respondent agrees to some extent with the statement or item. They identify with and endorse certain aspects of motivation described, but there may be room for improvement or further alignment. 2 1.50 – 2.49 Disagree The respondent disagrees to some extent with the statement or item. While they may acknowledge certain aspects of the motivation described, they do not fully agree with it. 1 1.00 – 1.49 Strongly Disagree The respondent strongly disagrees that the statement or item accurately represents their academic motivation.  Self-Efficacy Online Learning Self-Efficacy Scale (OLSES) adapted from Zimmerman and Kulikowich (2016) The instrument uses the 4-point Likert Scale with a categorical response; nline Learning Self-Efficacy Scale (OLSES) adapted from Zimmerman and Kulikowich (2016) Online Learning Self-Efficacy Scale (OLSES) adapted from Zimmerman and Kulikowich (2016) he instrument uses the 4-point Likert Scale with a categorical response; The instrument uses the 4-point Likert Scale with a categorical response; Table 11 The Instrument uses the 4-Point Likert Scale with a Categorical Response Items Strongly Disagree (1) Disagree (2) Agree (3) Strongly Agree (4) . I am confident in my ability to navigate online course materials efficiently . I believe that I can communicate effectively with technical support via e-mail, telephone, or live online chat. . I am confident that I can submit assignments to an online Dropbox. (i.e., google drive) . I am confident in my ability to overcome technical difficulties on my own. . I believe that I can navigate the online grade book. (i.e., scores or grades in google forms quizzes) . I am confident that I can manage time effectively. . I believe that I can complete all assignments on time. . I am confident in my ability to learn to use a new type of technology efficiently . I believe that I can learn without being in the same room as the instructor 0. I am confident that I can learn without being in the same room as other students. 1. I believe that I can search the Internet to find the answer to a course-related question. 2. I am confident that I can meet deadlines with very few reminders. 3. I believe that I can complete a group project entirely online. 4. I am confident that I can use synchronous technology to communicate with others (i.e., messenger, google meet, zoom). 5. I believe that I can focus on schoolwork when faced with distractions. 6. I am confident that I can develop and follow a plan for completing all required work on time. 7. I believe that I can promptly ask questions in the appropriate forum (e-mail, google classroom, discussion board, etc.) when a problem arises. Table 12 Level of Self-Efficacy Point Scale Range Description Interpretation 4 3.50 – 4.00 Strongly Agree The respondent strongly agrees that the statement or item accurately represents their level of self-efficacy. They fully identify with and endorse the level of self-efficacy described.  Motivation They do not identify with the motivation described in the item Table 10 Level of Motivation Point Scale Range Description Interpretation 4 3.50 – 4.00 Strongly Agree The respondent strongly agrees that the statement or item accurately represents their academic motivation. They fully identify with and endorse the motivation described. 3 2.50 – 3.49 Agree The respondent agrees to some extent with the statement or item. They identify with and endorse certain aspects of motivation described, but there may be room for improvement or further alignment. 2 1.50 – 2.49 Disagree The respondent disagrees to some extent with the statement or item. While they may acknowledge certain aspects of the motivation described, they do not fully agree with it. 1 1.00 – 1.49 Strongly Disagree The respondent strongly disagrees that the statement or item accurately represents their academic motivation. They do not identify with the motivation described in the item 2229 IJISRT23JUL1538 www.ijisrt.com International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Volume 8, Issue 7, July – 2023 Volume 8, Issue 7, July – 2023 ISSN No:-2456-2165  Self-Efficacy Online Learning Self-Efficacy Scale (OLSES) adapted from Zimmerman and Kulikowich (2016) The instrument uses the 4-point Likert Scale with a categorical response; 4-Strongly Agree 3-Agree 2--Disagree 1-Strongly Disagree Table 11 The Instrument uses the 4-Point Likert Scale with a Categorical Response Items Strongly Disagree (1) Disagree (2) Agree (3) Strongly Agree (4) . I am confident in my ability to navigate online course materials efficiently . I believe that I can communicate effectively with technical support via e-mail, telephone, or live online chat. . I am confident that I can submit assignments to an online Dropbox. (i.e., google drive) . I am confident in my ability to overcome technical difficulties on my own. . I believe that I can navigate the online grade book. (i.e., scores or grades in google forms quizzes) . I am confident that I can manage time effectively. . I believe that I can complete all assignments on time. . I am confident in my ability to learn to use a new type of technology efficiently . I believe that I can learn without being in the same room as the instructor 0. I am confident that I can learn without being in the same room as other students. 1.  Motivation I believe that I can search the Internet to find the answer to a course-related question. 2. I am confident that I can meet deadlines with very few reminders. 3. I believe that I can complete a group project entirely online. 4. I am confident that I can use synchronous technology to communicate with others (i.e., messenger, google meet, zoom). 5. I believe that I can focus on schoolwork when faced with distractions. 6. I am confident that I can develop and follow a plan for completing all required work on time. 7. I believe that I can promptly ask questions in the appropriate forum (e-mail, google classroom, discussion board, etc.) when a problem arises. Table 12 Level of Self-Efficacy Point Scale Range Description Interpretation 4 3.50 – 4.00 Strongly Agree The respondent strongly agrees that the statement or item accurately represents their level of self-efficacy. They fully identify with and endorse the level of self-efficacy described. 3 2.50 – 3.49 Agree The respondent agrees to some extent with the statement or item. They identify with and  Self-Efficacy The simple interest on a principal is inversely proportional to the time principal the principal is inv IV. Simple interest does not compound. a. I, II, & IV b. I & IV only II III & IV  Self-Efficacy 3 2.50 – 3.49 Agree The respondent agrees to some extent with the statement or item. They identify with and endorse certain aspects of the level of self-efficacy described, but there may be room for improvement or further alignment. 2 1.50 – 2.49 Disagree The respondent disagrees to some extent with the statement or item. While they may acknowledge certain aspects of the level of self-efficacy described, they do not fully agree with it. 1 1.00 – 1.49 Strongly Disagree The respondent strongly disagrees that the statement or item accurately represents their level of self-efficacy. They do not identify with the level of self-efficacy described in the item. www.ijisrt.com 2230 Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Volume 8, Issue 7, July – 2023 International Journal of Innovative Science an SUMMATIVE TEST TEST QUESTIONNAIRE I. Multiple Choice GENERAL INSTRUCTION: Read the directions carefully before answering. Direction: Read the following items carefully. Encircle the letter of the correct answer. 1. What is the correct formula for time if we use Banker’s Rule? a. 𝑡𝑜 𝐼𝑜; approximate time divided by ordinary interest b. 𝑡𝑜 𝐼𝑒; approximate time divided by exact interest c. 𝑡𝑒 𝐼𝑜; exact time divided by ordinary interest d. 𝑡𝑒 𝐼𝑒; exact time divided by exact interest 2. It refers to a method in remembering the number of days in every months. a. Banker’s Rule b. Knuckle Mnemonic c. Approximate Time d. Exact Interest 3. What is the number of exact days of the year 2020? a. 365 b. 360 c. 366 d. 361 4. Which of the following simple interest formula gives more Interest (I)? a. 𝐼= Pr( 𝑎𝑝𝑝𝑟𝑜𝑥𝑖𝑚𝑎𝑡𝑒 𝑡𝑖𝑚𝑒 𝑜𝑟𝑑𝑖𝑛𝑎𝑟𝑦 𝑖𝑛𝑡𝑒𝑟𝑒𝑠𝑡) b. 𝐼= Pr( 𝑒𝑥𝑎𝑐𝑡 𝑡𝑖𝑚𝑒 𝑜𝑟𝑑𝑖𝑛𝑎𝑟𝑦 𝑖𝑛𝑡𝑒𝑟𝑒𝑠𝑡) c. 𝐼= Pr( 𝑎𝑝𝑝𝑟𝑜𝑥𝑖𝑚𝑎𝑡𝑒 𝑡𝑖𝑚𝑒 𝑒𝑥𝑎𝑐𝑡 𝑖𝑛𝑡𝑒𝑟𝑒𝑠𝑡) d. 𝐼= Pr( 𝑒𝑥𝑎𝑐𝑡 𝑡𝑖𝑚𝑒 𝑒𝑥𝑎𝑐𝑡 𝑖𝑛𝑡𝑒𝑟𝑒𝑠𝑡) 5. Which of the following value of time is NOT equal with 2 2 3 years? a. 2 8 12 years b. 8 3 years c. 2.666666667 years d. 1.333333333 years 6. Compare the following statement. Which of the following best describes simple interest? I. The simple interest can be found by subtracting the Future value from the Principal value. II. Simple interest is interest calculated on the original principal of a loan or on the amount of an acco III. SUMMATIVE TEST TEST QUESTIONNAIRE What sum will accumulate an interest of ₱ 35,000 in 5 years at 16% simple interest? a. ₱ 630,000.00 b. ₱ 63,000.00 c. ₱ 28,000.00 d. ₱ 19,444.44 10. Sandra needs ₱ 750,000.00 to buy her dream car after 4 years. How much should she invest in a company with a 12% simple interest rate? What is given and asked in the problem? a. Given: Principal amount, interest rate, and maturity date Required: Future amount b. Given: Principal amount, interest rate, and maturity date Required: Interest c. Given: Future amount, interest rate, and maturity date Required: Principal amount d. Given: Principal amount, interest rate, and issue date Required: Future amount 11. What formula should be applied if the given situation is that Racquel wants to buy a computer, so she borrowed Php 20,000.00 at 5% interest rate for 5 years, how much money should she pay back? a. 𝐼= 𝑃𝑟𝑡 b. 𝑃= 𝐹−𝐼 c. 𝑃= 𝐹 1+𝑟𝑡 d. 𝐹= 𝑃(1 + 𝑟𝑡) 7. Find the principal (P) if: F = Php 20,000.00 r = 9 % t = 5 years a. P = Php 434.78 b. P = Php 29,000.00 c. P = Php 13,793.10 d. P = Php 9,000.00 10. Sandra needs ₱ 750,000.00 to buy her dream car after 4 years. How much should she invest in a company with a 12% simple interest rate? What is given and asked in the problem? a. Given: Principal amount, interest rate, and maturity date Required: Future amount b. Given: Principal amount, interest rate, and maturity date Required: Interest c. Given: Future amount, interest rate, and maturity date Required: Principal amount d. Given: Principal amount, interest rate, and issue date Required: Future amount 11. What formula should be applied if the given situation is that Racquel wants to buy a computer, so she borrowed Php 20,000.00 at 5% interest rate for 5 years, how much money should she pay back? a. 𝐼= 𝑃𝑟𝑡 b. 𝑃= 𝐹−𝐼 c. 𝑃= 𝐹 1+𝑟𝑡 d. 𝐹= 𝑃(1 + 𝑟𝑡) 12. Let the accumulated money be ₱ 76,600 when ₱ 50,000 is invested at 11% simple interest. How long should we wait for our invested money to accumulate that much? a. 4.7 𝑦𝑒𝑎𝑟𝑠 b. 52 11 𝑦𝑒𝑎𝑟𝑠 c. 152 11 𝑦𝑒𝑎𝑟𝑠 d. 266 55 𝑦𝑒𝑎𝑟𝑠 a. 4.7 𝑦𝑒𝑎𝑟𝑠 b. 52 11 𝑦𝑒𝑎𝑟𝑠 c. 152 11 𝑦𝑒𝑎𝑟𝑠 d. 266 55 𝑦𝑒𝑎𝑟𝑠 13. SUMMATIVE TEST TEST QUESTIONNAIRE SUMMATIVE TEST TEST QUESTIONNAIRE I. Multiple Choice 4. Which of the following simple interest formula gives more Interest (I)? a. 𝐼= Pr( 𝑎𝑝𝑝𝑟𝑜𝑥𝑖𝑚𝑎𝑡𝑒 𝑡𝑖𝑚𝑒 𝑜𝑟𝑑𝑖𝑛𝑎𝑟𝑦 𝑖𝑛𝑡𝑒𝑟𝑒𝑠𝑡) b. 𝐼= Pr( 𝑒𝑥𝑎𝑐𝑡 𝑡𝑖𝑚𝑒 𝑜𝑟𝑑𝑖𝑛𝑎𝑟𝑦 𝑖𝑛𝑡𝑒𝑟𝑒𝑠𝑡) c. 𝐼= Pr( 𝑎𝑝𝑝𝑟𝑜𝑥𝑖𝑚𝑎𝑡𝑒 𝑡𝑖𝑚𝑒 𝑒𝑥𝑎𝑐𝑡 𝑖𝑛𝑡𝑒𝑟𝑒𝑠𝑡) d. 𝐼= Pr( 𝑒𝑥𝑎𝑐𝑡 𝑡𝑖𝑚𝑒 𝑒𝑥𝑎𝑐𝑡 𝑖𝑛𝑡𝑒𝑟𝑒𝑠𝑡) 5. Which of the following value of time is NOT equal with 2 2 3 years? 5. Which of the following value of time is NOT equal with 2 2 3 years? a. 2 8 12 years b. 8 3 years c. 2.666666667 years d. 1.333333333 years 6. Compare the following statement. Which of the following best describes simple interest? I. The simple interest can be found by subtracting the Future value from the Principal value. II. Simple interest is interest calculated on the original principal of a loan or on the amount of an account. III. The simple interest on a principal is inversely proportional to the time principal the principal is invested or loaned. IV. Simple interest does not compound. a. I, II, & IV b. I & IV only c. II, III & IV d. All of the above 6. Compare the following statement. Which of the following best describes simple interest? I. The simple interest can be found by subtracting the Future value from the Principal value. Si l i i i l l d h i i l i i l f l h f II. Simple interest is interest calculated on the original principal of a loan or on the amount of an account. 2231 IJISRT23JUL1538 www.ijisrt.com Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Volume 8, Issue 7, July – 2023 7. Find the principal (P) if: F = Php 20,000.00 r = 9 % t = 5 years a. P = Php 434.78 b. P = Php 29,000.00 c. P = Php 13,793.10 d. P = Php 9,000.00 8. Joana borrowed money from the bank on January 2, 2016, and paid it on April 6, 2016. Find the exact time of the given situation. a. 71 days b. 72 days c. 94 days d. 95 days 9. SUMMATIVE TEST TEST QUESTIONNAIRE Assess which of the following values of r or simple interest rate is correct if F = ₱ 110,000 and P = ₱ 100,000 during 36 months. 1 a. 𝑟= 1 360 b. 𝑟= 1 360 % c. 𝑟= 1 30 d. 𝑟= 0.33 2232 IJISRT23JUL1538 www.ijisrt.com International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Volume 8, Issue 7, July – 2023 14. Evaluate and identify which of the following statement is TRUE. 14. Evaluate and identify which of the following statement is TRUE. 14. Evaluate and identify which of the following statement is TRUE. a. The interest is ₱ 874.27 on ₱ 15,800 at 12 % from January 9, 2017, to June 24 of the same year, using actual time and ordinary interest. b. The interest is ₱ 862.29 on ₱ 15,800 at 12 % from January 9, 2017, to June 24 of the same year, using actual time and ordinary interest. c. The interest is ₱ 900.60 on ₱ 15,800 at 12 % from January 9, 2017, to June 24 of the same year, using actual time and ordinary interest. d. The interest is ₱ 830.00 on ₱ 15,800 at 12 % from January 9, 2017, to June 24 of the same year, using actual time and ordinary interest. a. The interest is ₱ 874.27 on ₱ 15,800 at 12 % from January 9, 2017, to June 24 of the same year, using actual time and ordinary interest. c. The interest is ₱ 900.60 on ₱ 15,800 at 12 % from January 9, 2017, to June 24 of the same year, using actual time and ordinary interest. d. The interest is ₱ 830.00 on ₱ 15,800 at 12 % from January 9, 2017, to June 24 of the same year, using actual time and ordinary interest. 15. Which values of Interest value (𝐼), Principal (𝑃), and time (𝑡) suffice to prove that the value of interest rate (𝑟) is 10%. 𝐼 233 750 𝑃 85 000 𝑑 99 15. Which values of Interest value (𝐼), Principal (𝑃), and time (𝑡) suffice to prove that the value of interest 99 a. 𝐼= 233,750;𝑃= 85,000;𝑎𝑛𝑑 𝑡= 99 360 𝑦𝑒𝑎𝑟𝑠 a. 𝐼= 233,750;𝑃= 85,000;𝑎𝑛𝑑 𝑡= 99 360 𝑦𝑒𝑎𝑟𝑠 a. 𝐼= 233,750;𝑃= 85,000;𝑎𝑛𝑑 𝑡= 360 𝑦𝑒𝑎𝑟𝑠 b. 𝐼= 2,125;𝑃= 85,000;𝑎𝑛𝑑 𝑡= 99 360 𝑦𝑒𝑎𝑟𝑠 c. SUMMATIVE TEST TEST QUESTIONNAIRE 𝐼= 318,750;𝑃= 85,000;𝑎𝑛𝑑 𝑡= 99 360 𝑦𝑒𝑎𝑟𝑠 d. 𝐼= 2,125;𝑃= 85,000;𝑎𝑛𝑑 𝑡= 90 𝑚𝑜𝑛𝑡ℎ𝑠 16. If the interest that is deducted is a discount, what is the actual amount that is given to the borrower? a Principal 17. It is the addition of the discount and proceed. 17. It is the addition of the discount and proceed. 17. It is the addition of the discount and proceed. a. Face value b. Bank discount c. Rate of discount d. Time period 18. What is the correct formula for getting the time in a simple discount? 𝑑 a. t = 𝑑 𝐹𝐷 b. t = I Pr c. t = 𝐷 𝐹𝑑 d. t = r PI 19. Compare the following statements and determine which is NOT TRUE. 19. Compare the following statements and determine which is NOT TRUE. I. For a simple discount, the face value and the maturity are not the same. II. For simple interest, the face value and the maturity are not the same. III. The formula for calculating the discount is similar to the interest formula a. I & II b. I only c. II & III d. All of the statements are not true. 20. Simon decides to continue schooling, but for him to go to school, he needs to have at least a motorcycle worth Php 73,000.00. And to have that amount, he decides to borrow the money at a local savings bank, for 14 months, at a 12% discount rate. How much does he need to apply for? What does this underlined question mean? Th Di t 20. Simon decides to continue schooling, but for him to go to school, he needs to have at least a motorcycle worth Php 73,000.00. And to have that amount, he decides to borrow the money at a local savings bank, for 14 months, at a 12% discount rate. How much does he need to apply for? What does this underlined question mean? Th Di a. The Discount b. The Proceeds c. The Face Value 2233 IJISRT23JUL1538 www.ijisrt.com International Journal of Innovative Science and Research Technology International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Volume 8, Issue 7, July – 2023 21. Douglas signed a Php 20,500 discount note on April 3, 2019. The bank charges an 18% discount rate, and the proceeds are Php 15,500. When will the note mature? SUMMATIVE TEST TEST QUESTIONNAIRE In this problem, what does the underlined phrase means? Th Di t 22. Soledad borrowed Php 18,000 for 8 months from a rural bank so that she could buy an oven for baking. The banker discounts the note at 9%. Find the amount of the discount. 22. Soledad borrowed Php 18,000 for 8 months from a rural bank so that she could buy an oven for baking. The banker discounts the note at 9%. Find the amount of the discount. 23. Sasha decides to go back to school. To get to school, she buys a small car, Php 180,000. She decides to borrow the money at the local savings bank for 14 months at a 12% discount rate. Find the face value of the loan so she will have Php 180,000. a Php 154 800 00 24. Marlon signed a Php 41,000 note at a discount rate of 8%. He was told it would have Php 3,200 interest. Find the length of the loan. a. 0.95 years b. 40 41 years c. 160.16 years d. 5125 32 years 24. Marlon signed a Php 41,000 note at a discount rate of 8%. He was told it would have Php 3,200 interest. Find the length of the loan. a 0 95 years 25. Which could be the correct value of the discount rate (𝑑) if the Php 1,200 note will mature in 90 days and the proceeds were Php 1,179. a. 𝑑= 7 25. Which could be the correct value of the discount rate (𝑑) if the Php 1,200 note will mature in 90 days and the proceeds were Php 1,179. a 𝑑= 7 26. Which of the following shows the correct formula for getting the maturity value in a simple discount? 𝐷 26. Which of the following shows the correct formula for getting the maturity value in a sim 𝐷 26. Which of the following shows the correct formula for getting the maturity value in a simple discount? I. F = 𝐷 𝐹𝑡 II. F = P + D III. F = 𝑃 1−𝑑𝑡 IV. F = P - D a. I,II,& III b. II & IV c. II & III d. I & II 27. Nico received Php 25,756.50 after applying for a loan last Jan 23. He will pay his loan after 2 years. If the bank charges a 13% simple discount, how much did Bistro apply for? SUMMATIVE TEST TEST QUESTIONNAIRE Face value (𝐹) = Php 210,000; discount rate (𝑑) = 9%; and time (𝑡) = 2.5 years ( ) p ( ) ( ) y d. Face value (𝐹) = Php 162,325.11; discount rate (𝑑) = 9%; and time (𝑡) = 2.5 years 30. Assess which of the following values of 𝑑 or discount rate is CORRECT if F = ₱ 13,500, P = ₱ 9,450 and will mature in 2.5 years 30. Assess which of the following values of 𝑑 or discount rate is CORRECT if F = ₱ 13,500, P = ₱ 9,450 and will mature in 2.5 a. 𝑑= 12 b. 𝑑= 0.12 c. 𝑑= − 6 35 d. 𝑑= 0.12% 31. It is the procedure in which interest is periodically calculated and added to the principal. Si l i t t 31. It is the procedure in which interest is periodically calculated and added to the principal. Si l i 32. Which of the following is the stated annual interest rate based on the compound interest calculation? Si l i 34. Virgilio Secundo borrows P47,400 with interest at 18% compounded quarterly. How much should he pay to the creditor after 3 years to pay off his debt? What do these underlined words refer to? 36. Which of the following statement is CORRECT in compounding frequencies and periods? a. The conversion per year of quarterly is 3 because it is every 4 months b. The conversion per year of bimonthly is 2 because it is every 6 months c. The conversion per year of quarterly is 4 because it is every 3 months d. The conversion per year of bimonthly is 6 because it is every 3 months 36. Which of the following statement is CORRECT in compounding frequencies and periods? a. The conversion per year of quarterly is 3 because it is every 4 months b. The conversion per year of bimonthly is 2 because it is every 6 months c. The conversion per year of quarterly is 4 because it is every 3 months d. The conversion per year of bimonthly is 6 because it is every 3 months IJISRT23JUL1538 www.ijisrt.com 2235 SUMMATIVE TEST TEST QUESTIONNAIRE In this problem, what is/are the given and unknown value/s. Gi P d i t t t d t it d t 27. Nico received Php 25,756.50 after applying for a loan last Jan 23. He will pay his loan after 2 years. If the bank charges a 13% simple discount, how much did Bistro apply for? In this problem, what is/are the given and unknown value/s. 27. Nico received Php 25,756.50 after applying for a loan last Jan 23. He will pay his loan after simple discount, how much did Bistro apply for? In this problem, what is/are the given and u a. Given: Proceed, interest rate, and maturity date b. Given: Proceed, discount rate, and maturity date Required: Face Value c. Given: Principal amount, interest rate, and maturity date Required: Face Value 2234 IJISRT23JUL1538 www.ijisrt.com Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 28. Evaluate and identify which of the following statement is TRUE. 28. Evaluate and identify which of the following statement is TRUE. 28. Evaluate and identify which of the following statement is TRUE. y g a. The face value is Php 28,703.70 if the proceeds is Php 15,500 at 18% discount rate for 3 years. b. The face value is Php 7,130.00 if the proceeds is Php 15,500 at 18% discount rate for 3 years. c. The face value is Php 20,500.00 if the proceeds is Php 15,500 at 18% discount rate for 3 years. d. The face value is Php 33,695.65 if the proceeds is Php 15,500 at 18% discount rate for 3 years. ich values of Face value (𝐹), discount rate (𝑑), and time (𝑡) suffice to prove that the value of Proceeds (𝑃) 29. Which values of Face value (𝐹), discount rate (𝑑), and time (𝑡) suffice to prove that the value of Procee a. Face value (𝐹) = Php 126,131.25; discount rate (𝑑) = 9%; and time (𝑡) = 2.5 years a. Face value (𝐹) = Php 126,131.25; discount rate (𝑑) = 9%; and time (𝑡) = 2.5 years a. Face value (𝐹) = Php 126,131.25; discount rate (𝑑) = 9%; and time (𝑡) = 2.5 years b. Face value (𝐹) = Php 36,618.75; discount rate (𝑑) = 9%; and time (𝑡) = 2.5 years c. www.ijisrt.com IJISRT23JUL1538 Given: Principal amount, equivalent interest rate, maturity date, and number of conversions per year Required: Future amount b. Given: Principal amount, equivalent interest rate, maturity date, and number of conversions per year Required: Face value c. Given: Principal amount, nominal interest rate, and number of conversions per year Required: Future amount d. Given: Principal amount, nominal interest rate, maturity date, and number of conversions per year Required: Future amount 41. How long will it take for Php 11,250.50 to become Php 15,119.73 at 12 % compounded quarterly? a. t = 2.5 b. t = 2 years and 5 months c. t = 2.5 months d. t = 2.5 years 42. The maturity value of an 8 year, Php 60,000 compound-interest investment certificate was Php 80,000. What quarterl compounded rate did the investment certificate earn? a) 3.6 % b) 6.3 % c) 3.3 % d) 3.9 % 43. Evaluate and identify which of the following statement is TRUE. a. The future value of a principal amount of Php 27,000 invested for 2 years at 9% compounded monthly is Php 31,960.00. b. The future value of a principal amount of Php 27,000 invested for 2 years at 9% compounded monthly is Php 32,303.17. c. The future value of a principal amount of Php 27,000 invested for 2 years at 9% compounded monthly is Php 33,203.17. d. The future value of a principal amount of Php 27,000 invested for 2 years at 9% compounded monthly is Php 153,167.60. 44. Which values of Future amount (𝐹), nominal rate (𝑗),number of conversion per year (𝑚), and time (𝑡) suffice to prove that th 40. A note with a maturity value of Php 42,560 is due in 4 years and 9 months. What is the principal amount at 5.6% compounded semiannually? In this problem, what is/are the given and unknown value/s a. Given: Principal amount, equivalent interest rate, maturity date, and number of conversions per year Required: Future amount b. Given: Principal amount, equivalent interest rate, maturity date, and number of conversions per year Required: Face value c. Given: Principal amount, nominal interest rate, and number of conversions per year Required: Future amount d. Given: Principal amount, nominal interest rate, maturity date, and number of conversions per year Required: Future amount 42. The maturity value of an 8 year, Php 60,000 compound-interest investment certificate was Php 80,000. What quarterly compounded rate did the investment certificate earn? IJISRT23JUL1538 www.ijisrt.com Volume 8, Issue 7, July – 2023 ISSN No:-2456-2165 37. If you deposit ₱10,000 into an account paying 2.5% annual interest compounded quarterly, how much money will be in the account after 5 years? a. 𝑃= ₱2,974.55 b. 𝐹= ₱33,618.53 c. 𝑃= ₱8,828.40 d. 𝐹= ₱11,327.08 38. Doggy invested in a company with an interest rate of 6.2% compounded monthly. If, after 10 years, the account balance is ₱ 37,839.45, how much was the beginning investment? a. 𝑃=₱20,150.43 b. 𝑃=₱40,259.11 c. 𝑃=₱20,388.04 d. 𝑃=₱77,228.63 39. Find the interest earned of a Php 100,000.00 at the end of 6 months at 13% compounded semiannually. a. Php 106,500.00 b. Php 212,909.62 c. Php 6,500.00 d. Php 112,909.62 40. A note with a maturity value of Php 42,560 is due in 4 years and 9 months. What is the principal amount at 5.6% compounded semiannually? In this problem, what is/are the given and unknown value/s a. Given: Principal amount, equivalent interest rate, maturity date, and number of conversions per year Required: Future amount b. Given: Principal amount, equivalent interest rate, maturity date, and number of conversions per year Required: Face value c. Given: Principal amount, nominal interest rate, and number of conversions per year Required: Future amount d. Given: Principal amount, nominal interest rate, maturity date, and number of conversions per year Required: Future amount 41 How long will it take for Php 11 250 50 to become Php 15 119 73 at 12 % compounded quarterly? 37. If you deposit ₱10,000 into an account paying 2.5% annual interest compounded quarterly, how much money will be i the account after 5 years? a. 𝑃= ₱2,974.55 b. 𝐹= ₱33,618.53 c. 𝑃= ₱8,828.40 d. 𝐹= ₱11,327.08 38. Doggy invested in a company with an interest rate of 6.2% compounded monthly. If, after 10 years, the account balance i ₱ 37,839.45, how much was the beginning investment? a. 𝑃=₱20,150.43 b. 𝑃=₱40,259.11 c. 𝑃=₱20,388.04 d. 𝑃=₱77,228.63 39. Find the interest earned of a Php 100,000.00 at the end of 6 months at 13% compounded semiannually. a. Php 106,500.00 b. Php 212,909.62 c. Php 6,500.00 d. Php 112,909.62 40. A note with a maturity value of Php 42,560 is due in 4 years and 9 months. What is the principal amount at 5.6% compounded semiannually? In this problem, what is/are the given and unknown value/s a. IJISRT23JUL1538 a) 3 6 % y g a. The future value of a principal amount of Php 27,000 invested for 2 years at 9% compounded monthly is Php 31,960.00. b. The future value of a principal amount of Php 27,000 invested for 2 years at 9% compounded monthly is Php 32,303.17. c. The future value of a principal amount of Php 27,000 invested for 2 years at 9% compounded monthly is Php 33,203.17. d. The future value of a principal amount of Php 27,000 invested for 2 years at 9% compounded monthly is Php 153,167.60. 44. Which values of Future amount (𝐹), nominal rate (𝑗),number of conversion per year (𝑚), and time (𝑡) suffice to prove that the value of Principal amount (𝑃) is Php 73,516.46 a. 𝐹 = Php 63,392.62; 𝑗 = 5%; 𝑚 = 2; and time (𝑡) = 3 years b. 𝐹 = Php 11,740.02; 𝑗 = 5%; 𝑚 = 2; and time (𝑡) = 3 years c. 𝐹 = Php 85,526.55; 𝑗 = 5%; 𝑚 = 2; and time (𝑡) = 3 years d. 𝐹 = Php 85,256.55; 𝑗 = 5%; 𝑚 = 2; and time (𝑡) = 3 years 45. Assess which of the following values of 𝐹 or Future value is CORRECT if Principal (𝑃) = Php 25,324.00 ; nominal rat (𝑗) = 3.5%;number of conversion per year ( 𝑚 )= 4; and time (𝑡) = 5 years 45. Assess which of the following values of 𝐹 or Future value is CORRECT if Principal (𝑃) = Php 25,324.00 ; nominal rat (𝑗) = 3.5%;number of conversion per year ( 𝑚 )= 4; and time (𝑡) = 5 years 45. Assess which of the following values of 𝐹 or Future value is CORRECT if Principal (𝑃) = Php 25,324.00 ; nominal rat (𝑗) = 3.5%;number of conversion per year ( 𝑚 )= 4; and time (𝑡) = 5 years a. 𝐹 = 21,274.60 b. 𝐹 = 30,144.17 c. 𝐹 = 4,820.17 d. 𝐹 = 135,555.65 2236 www.ijisrt.com Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 ISSN No:-2456-2165 IJISRT23JUL1538 www ijisrt com 2237 Appendix E Summary of Validation Results Name of Researcher: JAYSON KITTS C. IJISRT23JUL1538 POQUITA Degree Enrolled: MAED-Math Title of Research: MOTIVATION AND SELF EFFICACY AS PREDICTORS TO MATHEMATICS PERFORMANCE IN ONLINE LEARNING Motivation Items Expert 1 Expert 2 Expert 3 Expert 4 Expert 5 Descriptive Rating 1 3 3 1 4 4 Good 2 3 4 1 4 1 Fair 3 3 3 1 4 1 Fair 4 3 3 1 4 4 Good 5 3 4 1 4 4 Good 6 3 4 1 4 4 Good 7 3 3 1 4 1 Fair 8 3 3 1 4 1 Fair 9 3 4 1 4 1 Fair 10 3 3 1 4 4 Good 11 3 3 1 4 1 Fair 12 3 4 1 4 4 Good 13 3 4 1 4 1 Fair 14 3 4 1 4 4 Good 15 3 4 1 4 1 Fair 16 3 4 1 4 4 Good 17 3 4 1 4 4 Good 18 3 4 1 4 1 Fair 19 3 3 1 4 4 Good 20 3 4 1 4 1 Fair Self-efficacy Items Expert 1 Expert 2 Expert 3 Expert 4 Expert 5 Descriptive Rating 1 3 4 1 4 4 Good 2 3 3 1 4 1 Fair 3 3 3 1 4 4 Good 4 4 4 1 4 4 Good 5 3 3 1 4 4 Good 6 3 3 1 4 4 Good 7 4 4 1 4 4 Good 8 4 4 1 4 4 Good 9 3 4 1 4 4 Good 10 3 4 1 4 4 Good 11 3 3 1 4 4 Good 12 4 4 1 4 4 Good 13 4 3 1 4 1 Fair 14 3 4 1 4 1 Fair 15 4 3 1 4 4 Good 16 3 3 1 4 4 Good 17 4 4 1 4 4 Good 18 4 3 1 4 4 Good 19 4 4 1 4 4 Good 20 3 3 1 4 1 Fair 21 4 4 1 4 4 Good Appendix E Summary of Validation Results www.ijisrt.com 2237 Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Panel of Validators: 5 experts rated 3 or 4-Excellent 4 experts rated 3 or 4-Good 3 experts rated 3 or 4-Fair 2 experts rated 3 or 4-Discard International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Volume 8, Issue 7, July – 2023 IJISRT23JUL1538 www.ijisrt.com 2 Panel of Validators: 5 experts rated 3 or 4-Excellent 4 experts rated 3 or 4-Good 3 experts rated 3 or 4-Fair 2 experts rated 3 or 4-Discard 5 experts rated 3 or 4-Excellent 4 experts rated 3 or 4-Good 3 experts rated 3 or 4-Fair 2 experts rated 3 or 4-Discard Panel of Validators: Panel of Validators: 5 experts rated 3 or 4-Excellent 4 experts rated 3 or 4-Good 3 experts rated 3 or 4-Fair 2 experts rated 3 or 4-Discard IJISRT23JUL1538 www.ijisrt.com 2238 Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 ISSN No:-245 Appendix F Summative Test TOS Appendix F Summative Test TOS 2239 IJISRT23JUL1538 IJISRT23JUL1538 Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Appendix G Survey and Test Results Survey and Test Results www.ijisrt.com IJISRT23JUL1538 2240 Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 IJISRT23JUL1538 www.ijisrt.com 2241 Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 ISSN No:-2456-2165 www.ijisrt.com IJISRT23JUL1538 2242 Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 IJISRT23JUL1538 2243 www.ijisrt.com Volume 8, Issue 7, July – 2023 International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Appendix H Photo Documentation International Journal of Innovative Science and Research Technology ISSN No:-2456-2165 Volume 8, Issue 7, July – 2023 2244 IJISRT23JUL1538 www.ijisrt.com
https://openalex.org/W3108450240
https://revistavista.pt/index.php/vista/article/download/3049/2945
Portuguese
null
As pessoas nos não-lugares ou as não-pessoas precisam de lugares
Vista
2,019
cc-by
1,062
1 Estas imagens não são profissionais, não as fiz para publicar, a qualidade técnica é reduzida, porque são ficheiros já antigos, cópias dos originais. Todas as fotografias usadas para as montagens são originais meus. Sara Machado da Graça Sou cenógrafa e figurinista. Como tal, gosto de apreciar todas as ricas personagens que se cruzam comigo diariamente no “cenário” de Maputo, cidade em constante bulício colorido, confuso, fluído apesar de caótico e misto de toda a panóplia de emoções. Para quem anda a pé, para quem conduz, para quem anda de chapa, de my love… para cada um há visões diferentes e os ritmos são muitos e muito diversos a coexistir, mas o movimento é constante. É uma cidade que cresceu exponencialmente durante a guerra civil, resultado do êxodo rural, sem ter estrutura para suportar esse excesso demográfico. À cidade “de cimento”, colonial, acrescentaram-se os bairros suburbanos que cresceram desordenadamente, sem plano nem condições sanitárias, onde vive a maioria da população residindo em casas construídas em blocos de cimento e chapa de zinco. Uma grande parte das famílias subsistem através do mercado informal, vendendo os produtos das suas pequenas machambas (hortas) ou itens de toda a espécie, importados da África da Sul. As figuras desumanizadas Quando fotografei estas personagens de Maputo, não sabia que ia depois trabalhá-las, apenas colecionava imagens dos vendedores de rua como atores-marioneta nos diferentes cenários que ia descobrindo. Estas personagens fundem-se com a paisagem, fazem parte dela, mesclam-se numa coreografia cenográfica, urbana e identitária da cidade. 1 Estas imagens não são profissionais, não as fiz para publicar, a qualidade técnica é reduzida, porque são ficheiros já antigos, cópias dos originais. Todas as fotografias usadas para as montagens são originais meus. 229 vista nº 5  2019  Vistas Imperiais: Visualidades coloniais e processos de descolonização  pp. 229-234 Estas pessoas-signo eram uma presença fortíssima nas imagens que fazem parte do meu dia-a-dia - o homem água, o homem almofadas, o homem zips, o homem das tomadas elétricas, o dos óculos, as mulheres carregadas com carga à cabeça... agentes do dumba nengue (mercado informal) geral que circulam, cada um a seu passo, etéreos, estátuas da identidade urbana moçambicana - recolectores, “homem-anúncio”, sucateiros, recicladores dos seus produtos - que tomam formas dignas dos bailarinos triádicos de Oscar Schlemmer, numa espécie de dança sobre um itinerário infinito de ícones pop do espaço africano do consumo. Marc Augé define “não-lugares” como “lugares transitórios que não possuem significado suficiente para serem definidos como um lugar” (1994, p. 10). Segundo o autor, estes espaços são representativos da afirmação da existência da sobremodernidade, participando na antropologia urbana como associados aos viajantes “o espaço do viajante seria assim, o arquétipo do não-lugar”. O movimento acrescenta à coexistência dos mundos e à experiência combinada do lugar antropológico e daquele que não o é mais (pela qual Starobinski define, em suma, a modernidade) a experiência particular de uma forma de solidão, e, em sentido literal, de uma “tomada de posição” – a experiência daquele que, diante da paisagem que é obrigado a contemplar, “toma a posse” e tira da consciência dessa atitude um prazer raro e, às vezes, melancólico. Portanto, não é de espantar que seja, entre os “viajantes” solitários do século passado, (...) viajantes acidentais, que estejam aptos a encontrar a evocação profética de espaço, onde nem a identidade, nem a relação, nem a história fazem realmente sentido, onde a solidão é sentida como superação ou esvaziamento da individualidade, onde só o movimento das imagens deixa entrever, por instantes, àquele que as olha a fugir, a hipótese de um passado e a possibilidade de um futuro” (1994, p.80-81). Sara Machado da Graça  As pessoas nos não-lugares ou as não-pessoas precisam de lugares As não-pessoas precisam de lugares Num segundo momento senti que estas personagens tinham alma, eram pessoas, únicas, solitárias, resilientes e presas ao quotidiano da sobrevivência. Lembravam o Acendedor de Lampiões do Pequeno Príncipe de St Exupéry ou as personagens do universo absurdo de Samuel Beckett, entidades poéticas e simbólicas enredadas num ciclo semelhante aos tormentos de Sísifo. “Pediam” para estar noutro sítio, longe dali, num espaço feito só para eles. Tentei dar-lhes espaços aparentemente transitórios, mas onde a viagem pudesse tornar-se o destino, e que esse fosse o espaço identitário de conforto para que as negativas (não-lugar, não-pessoa) se anulassem e para que pudéssemos ter uma pessoa no seu lugar. vista nº 5  2019  Vistas Imperiais: Visualidades coloniais e processos de descolonização  pp. 229-234 230 Sara Machado da Graça  As pessoas nos não-lugares ou as não-pessoas precisam de lugares Mediterranean; taken and transplanted by early Spanish colonialists from the Canary Islands to the Americas, and distributed by European botanists to and from colonies in Asia, Africa and the Antipodes, and back to Europe, palms have become the symbol of successful uprooted-ness: synonymous with tropical views, pre-lapsarian lands, and exotic holidays. Mediterranean; taken and transplanted by early Spanish colonialists from the Canary Islands to the Americas, and distributed by European botanists to and from colonies in Asia, Africa and the Antipodes, and back to Europe, palms have become the symbol of successful uprooted-ness: synonymous with tropical views, pre-lapsarian lands, and exotic holidays. Mamã das frutas, Sara Machado da Graça, 2019 Mamã das frutas, Sara Machado da Graça, 2019 231 sta nº 5  2019  Vistas Imperiais: Visualidades coloniais e processos de descolonização  pp. 229-234 Man on the moon, Sara Machado da Graça, 2019 Man on the moon, Sara Machado da Graça, 2019 vista nº 5  2019  Vistas Imperiais: Visualidades coloniais e processos de descolonização  pp. 229-234 232 Falta de material, Sara Machado da Graça, 2019 Falta de material, Sara Machado da Graça, 2019 233 sta nº 5  2019  Vistas Imperiais: Visualidades coloniais e processos de descolonização  pp. 229-234 Funâmbulo com balão de almofadas, Sara Machado da Graça, 2019 Funâmbulo com balão de almofadas, Sara Machado da Graça, 2019 Referência bibliográfica Augé, Marc. (1994). Não-lugares, para uma introdução da antropologia da sobremodernidade. Papirus, Campinas. Sara Machado da Graça reside atualmente em Maputo, Moçambique, onde leciona as disciplinas de Cenografia e Figurinos no Curso de Teatro da Escola de Comunicação e Artes da Universidade Eduardo Mondlane, trabalha também como programadora artística da Galeria/Associação Kulungwana. Continua a fazer trabalhos como cenógrafa e figurinista para teatro, cinema, dança e ópera, assim como curadoria para exposições.  sagadexam@gmail.com 234
https://openalex.org/W2996033363
https://digitalcommons.uri.edu/cgi/viewcontent.cgi?article=1192&context=bps_facpubs
English
null
Pectic Oligosaccharides from Cranberry Prevent Quiescence and Persistence in the Uropathogenic Escherichia coli CFT073
Scientific reports
2,019
cc-by
7,054
Follow this and additional works at: https://digitalcommons.uri.edu/bps_facpubs Follow this and additional works at: https://digitalcommons.uri.edu/bps_facpubs Pectic Oligosaccharides from Cranberry Prevent Quiescence and Pectic Oligosaccharides from Cranberry Prevent Quiescence and Persistence in the Uropathogenic Escherichia coli CFT073 Persistence in the Uropathogenic Escherichia coli CFT073 Jiadong Sun Robert W. Deering Zhiyuan Peng Laila Najia Christina Khoo See next page for additional authors University of Rhode Island University of Rhode Island DigitalCommons@URI DigitalCommons@URI University of Rhode Island University of Rhode Island DigitalCommons@URI DigitalCommons@URI Biomedical and Pharmaceutical Sciences Creative Commons License Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 License. This work is licensed under a Creative Commons Attribution 4.0 License. Citation/Publisher Attribution Citation/Publisher Attribution Citation/Publisher Attribution Citation/Publisher Attribution Sun, J., Deering, R.W., Peng, Z. et al. Pectic Oligosaccharides from Cranberry Prevent Quiescence and Persistence in the Uropathogenic Escherichia coli CFT073. Sci Rep 9, 19590 (2019). https://doi.org/ 10.1038/s41598-019-56005-w This Article is brought to you by the University of Rhode Island. It has been accepted for inclusion in Biomedical and Pharmaceutical Sciences Faculty Publications by an authorized administrator of DigitalCommons@URI. For more information, please contact digitalcommons-group@uri.edu. For permission to reuse copyrighted content, contact the author directly. Pectic Oligosaccharides from Cranberry Prevent Quiescence and Persistence in Pectic Oligosaccharides from Cranberry Prevent Quiescence and Persistence in the Uropathogenic Escherichia coli CFT073 the Uropathogenic Escherichia coli CFT073 Creative Commons License Creative Commons License Pectic Oligosaccharides from Cranberry Prevent Quiescence and Persistence in the Uropathogenic Escherichia coli CFT073 EN Jiadong Sun1,2,5, Robert W. Deering1,5, Zhiyuan Peng1, Laila Najia1, Christina Khoo3, Paul S. Cohen4, Navindra P. Seeram1 & David C. Rowley1* Urinary tract infections (UTIs) caused by Escherichia coli create a large burden on healthcare and frequently lead to recurrent infections. Part of the success of E. coli as an uropathogenic bacterium can be attributed to its ability to form quiescent intracellular reservoirs in bladder cells and its persistence after antibiotic treatment. Cranberry juice and related products have been used for the prevention of UTIs with varying degrees of success. In this study, a group of cranberry pectic oligosaccharides (cPOS) were found to both inhibit quiescence and reduce the population of persister cells formed by the uropathogenic strain, CFT073. This is the first report detailing constituents of cranberry with the ability to modulate these important physiological aspects of uropathogenic E. coli. Further studies investigating cranberry should be keen to include oligosaccharides as part of the ‘active’ cocktail of chemical compounds. Bacterial urinary tract infections (UTIs) affect up to 150 million people each year and are among the most com- mon infections worldwide1. It is estimated that the total societal cost burden of UTIs is $3.5 billion each year in the US alone2. Over 50% of women will experience a UTI, with an estimated recurrence rate of about 25%3. While UTIs are typically curable, recurrent infections can require continuous antibiotic prophylaxis for prevention. Frequent use of antibiotics, however, can lead to adverse events such as colitis, the development of antibiotic resistant UTIs, or the development of complicated UTIs2–4. p p Uropathogenic Escherichia coli (UPEC) is responsible for 65–90% of UTI cases2,4–6. For recurrent UTIs, the original infecting UPEC strain is responsible 77% of the time7. While the mechanism of recurrence is not fully understood, it is thought that intracellular, biofilm-like communities (IBCs) and quiescent intracellular reservoirs (QIRs) are contributing factors8–10. IBCs form when UPEC from urine invade and replicate inside of superficial bladder cells6,10. As the infection progresses, subsequent UPEC invasion of urothelial transitional cells can lead to establishment of QIRs. Cells residing in QIRs can remain viable for months6,8,9. Upon exfoliation of bladder epithelial cells, UPEC from QIRs would be able to re-colonize urine and cause a recurrent infection6. Since antibi- otics generally target actively dividing bacteria, quiescent UPEC cells are unlikely to be eradicated by antibiotics, thus contributing to treatment failures and recurrence8,10. Authors Authors Jiadong Sun, Robert W. Deering, Zhiyuan Peng, Laila Najia, Christina Khoo, Paul S. Cohen, Navindra P. Seeram, and David C. Rowley This article is available at DigitalCommons@URI: https://digitalcommons.uri.edu/bps_facpubs/190 www.nature.com/scientificreports Results h The UPEC strain CFT073 demonstrates in vitro quiescence on glucose minimal media agar plates and resumes growth in response to cranberry constituents. We previously reported that the UPEC strain CFT073 grows normally in liquid glucose minimal media but exhibits in vitro quiescence on glucose minimal media agar plates when plated at low density (≤106 CFU)16. It was found that cells exhibiting quiescence under these conditions could be stimulated to grow by transferring a colony of E. coli MG1655 onto the plate or by applying an amino acid cocktail comprising various combinations of lysine, methionine, and tyrosine. Following addition of the stimulus to the agar surface and 24 hour incubation at 37 °C, growing CFT073 cells appear as visible colonies radiating out from the site of the stimulus (see Fig. 1 as an example). The diameter of the zone of growing CFT073 continues to expand with additional incubation time. This experiment is a qualitative test for stimuli that reverse in vitro quiescence of UPEC strains. q Because cranberry has been traditionally used for preventing UTI, we hypothesized that certain cranberry constituents might reverse UPEC quiescence. The above quiescence assay was used to test cranberry phytochem- icals and guide the separation of the active components (Fig. S1). A pectinase degraded cranberry hull extract was separated using C18 reversed phase chromatography to afford an oligosaccharide-enriched fraction, Cranf1b, that induced bacteria colony formation when added (100 µg in 10 µL water) to the surface of an agar plate contain- ing quiescent CFT073 (data not shown). Cranf1b was further separated using porous graphitized carbon (PGC) cartridges. Only a sub-fraction that eluted with 10% ACN/H2O/0.1%TFA showed reversal of E. coli CFT073 qui- escence (Fig. 1). This sub-fraction (cPOS) was further separated using HPLC chromatography and characterized using a combination of NMR, HR-MS and LC-MS/MS. Chemical characterization of cranberry constituents that reverse quiescence. The 1H and HSQC NMR spectra of the active cranberry fraction revealed proton and carbon resonances with chemical shifts charac- teristic for poly-uronic acids. Additional structural features included a methoxy group at δ 3.70/52.8 and a vinylic methine at δ 6.00/111.8 (Figs. S2 and S3). Monosaccharide composition analysis of cPOS determined that the oligosaccharides were comprised of galacturonic acid units (Fig. S4).h g g g The active fraction was further analyzed by hydrophilic interaction liquid chromatography (HILIC) HPLC (Fig. 2). Pectic Oligosaccharides from Cranberry Prevent Quiescence and Persistence in the Uropathogenic Escherichia coli CFT073 EN g Persistence is a physiologic state similar to quiescence for UPEC11–14. Persister cells are a small subpopulation of bacteria that exist in a dormant, non-dividing state characterized by high antibiotic tolerance11,12,14. Persister cells can be isolated and regrown following initial antibiotic treatment, and these populations retain sensitivity to the initial antibiotic and can consistently form another persister cell fraction15. Similar to QIR cells, persister cells are strongly implicated in the pathogenesis of chronic infections, including recurrent UTIs16–20. While proven to be metabolically distinct, the quiescent and persistent physiological states of UPEC are both likely to cause 1Department of Biomedical and Pharmaceutical Sciences, College of Pharmacy, University of Rhode Island, Kingston, RI, 02881, USA. 2Laboratory of Bioorganic Chemistry, National Institute of Diabetes and Digestive and Kidney Diseases, National Institutes of Health, Bethesda, MD, 20814, USA. 3Ocean Spray Cranberries, Inc., One Ocean Spray Drive, Lakeville-Middleboro, MA, 02349, USA. 4Department of Cell and Molecular Biology, University of Rhode Island, Kingston, RI, 02881, USA. 5These authors contributed equally: Jiadong Sun and Robert W. Deering. *email: drowley@uri.edu www.nature.com/scientificreports/ Figure 1. CFT073 in vitro quiescence assay. The location of spotting a sample is designated by the white ‘x’. (A)- tyrosine, lysine, and methionine positive control (Top) and M9 medium negative control (Bottom), (B)- uG3m2, (C)- Clockwise from bottom: cPOS, uG4m3 and HDP-cPOS. Figure 1. CFT073 in vitro quiescence assay. The location of spotting a sample is designated by the white ‘x’. (A)- tyrosine, lysine, and methionine positive control (Top) and M9 medium negative control (Bottom), (B)- uG3m2, (C)- Clockwise from bottom: cPOS, uG4m3 and HDP-cPOS. recurrent UTIs and treatment failures16. Therapies aimed at preventing or reversing quiescence and persistence could significantly reduce the burden of UPEC recurrent UTIs. C b (V i i p ) d t h b t i l h d f th i bilit t t gi y Cranberry (Vaccinium macrocarpon) products have been extensively researched for their ability to prevent UTIs, especially those caused by UPEC21–26. Past studies have focused on cranberry proanthocyanidins (PACs) with A-type linkages24,27 and fructose28 since these have been shown to interfere with UPEC adherence to bladder cells. Organic acids present in cranberry, including quinic, shikimic, malic and citric acids, were recently demon- strated to help reduce E. coli populations in an experimental mouse model of UTI29. Other recent studies have suggested that cranberry complex carbohydrates might also contribute to the prevention of UTIs. Pectic Oligosaccharides from Cranberry Prevent Quiescence and Persistence in the Uropathogenic Escherichia coli CFT073 EN For example, xyloglucan oligosaccharides from cranberry have been shown to interfere with cell adhesion and biofilm forma- tion by uropathogenic E. coli30–32. We hypothesized that certain cranberry constituents might interfere with quies- cent and persister cells since these are implicated in UTI recurrence. Herein, we report the isolation and chemical characterization of cranberry pectic oligosaccharides (cPOS) that prevent quiescence in the prototypical UPEC strain CFT073 and significantly reduce the population of UPEC persister cells in the presence of ampicillin. Scientific Reports | (2019) 9:19590 | https://doi.org/10.1038/s41598-019-56005-w Results h HILIC LC-MS data showed that the predominate ions were consistent with poly-galacturonic acid methyl esters with various degrees of polymerization (DP) (Fig. 3). Each oligosaccharide was present as a pair of α- and β- anomers in equilibrium. These results were in agreement with HR-ESI-MS and HR-ESI-MS/MS data obtained for collected fractions (Figs. S5 and S6). The most abundant ions indicated the presence of fragments with one or two free carboxylic acids and one additional degree of unsaturation. UV absorption maxima at 235 nm was consistent with the presence of an α, β-unsaturated carboxylic acid, which is in agreement of the vinylic methine observed in NMR, and accounting for the additional unsaturation. The major components were therefore deter- mined to be unsaturated pectic oligosaccharides, referred to as uGXmY (uG: unsaturated poly-Galacturonic acid; X: degree of polymerization; Y: number of methyl esters). Saturated poly-galacturonic acid methyl esters were unexpectedly found to be present only trace amounts in cPOS (data not shown). Scientific Reports | (2019) 9:19590 | https://doi.org/10.1038/s41598-019-56005-w www.nature.com/scientificreports/ Figure 2. HILIC HPLC chromatogram of cPOS (Top) and cPOS-t (Bottom) at 235 nm. 6,7-dihydromonotropein (a), deacetylasperulsidic acid (b) and monotropein (c). Figure 2. HILIC HPLC chromatogram of cPOS (Top) and cPOS-t (Bottom) at 235 nm. 6,7-dihydromonotropein (a), deacetylasperulsidic acid (b) and monotropein (c). We next isolated two unsaturated poly-galacturonic acid methyl esters, uG3m2 (HRMS (m/z): [M−H]−, C20H27O18, 555.1205, calcd. 555.1197) and uG4m3 (1, HRMS (m/z): [M−H]−, C27H37O24, 745.1692, calcd.745.1674) from the cPOS mixture. Compounds eluting after 1 were pooled into a single fraction containing cPOS with higher DPs (HDP-cPOS). Purified 1 was characterized using 1D and 2D NMR spectra (Figs. S7–S12) and compared to previously reported poly-galacturonic acids33–36. Superimposition of HSQC spectra for both 1 and cPOS showed that both contained similar correlation signals (Fig. S3), confirming 1 as a representative constituent of cPOS. The 1H and 13C NMR chemical shifts of 1 are listed in Table S1. Briefly, five spin systems were identified and were assigned to the four subunits (A-α/A-β, B, C, D) of 1 (Fig. 4). Key HMBC and NOE correlations are shown in Fig. 4. HMBC correlations between the methoxy protons and the C-6 carbonyls were observed for subunits A, B and D, indicating that the free carboxylic acid was located on subunit C. The C-6 of subunit C also has a higher NMR chemical shift (δ 175.0 ppm), consistent with a carboxylic acid at this position. Results h The MS/MS fragmentation patterns indicated sequential neutral losses of 190 Da for 1 (Fig. 5), further supporting the structure. Three previously reported iridoid glucosides were isolated from the cPOS fraction as minor impurities and identified as 6,7-dihydromonotropein, deacetylasperulsidic acid and monotropein37–40. These iridoid glucosides were inactive in the in vitro quiescence inhibition assay (data not shown). We found that these could be removed from the cPOS fraction by exploiting their differential solubility in ethanol. Cranf1b was triturated with 95% aqueous ethanol prior to PGC separation, producing a cPOS fraction (cPOS-t) devoid of iridoid glycosides as determined by HPLC analysis (Fig. 2) and LC-MS ion extraction (data not shown). Purified oligosaccharides uG3m2 and uG4m3 inhibit E. coli CFT073 quiescence. The isolated oli- gosaccharides uG4m3 and uG3m2 were tested alongside cPOS and HDP-cPOS for reversal of E. coli CFT073 qui- escence (Fig. 1). All four samples, applied as 100 μg/10μL aqueous solutions to the agar surface, stimulated the growth of quiescent bacteria, indicating an inhibition of quiescence. The quiescence assay was repeated using glucose-free plates to test if bacteria growth was simply due to bacteria using the added oligosaccharides as a carbon source. The addition of uG3m2 (100 μg/10μL) onto glucose-free plates containing quiescent CFT073 did not result in visible growth of bacteria colonies (Fig. 6). However, co-spotting 100 μg uG3m2 and 2 mg glucose onto agar containing quiescent CFT073 stimulated bacteria growth. This result is consistent with the cranberry oligosaccharides stimulating the quiescent UPEC to grow on glucose. Scientific Reports | (2019) 9:19590 | https://doi.org/10.1038/s41598-019-56005-w www.nature.com/scientificreports/ p p Figure 3. Extracted ion chromatograms of cPOS. Select ions of unsaturated poly-galacturonic acid methyl esters were color coded for DP 3–8 with one (Top) and two (Bottom) free carboxylic acids. Figure 3. Extracted ion chromatograms of cPOS. Select ions of unsaturated poly-galacturonic acid methyl esters were color coded for DP 3–8 with one (Top) and two (Bottom) free carboxylic acids. Figure 4. Structure of 1 with labeled subunits (A–D). Key HMBC correlations are designated with single- headed arrows and key NOE correlations are designated by double-headed, dotted arrows. Figure 4. Structure of 1 with labeled subunits (A–D). Key HMBC correlations are designated with single- headed arrows and key NOE correlations are designated by double-headed, dotted arrows. E. coli CFT073 generates a low level of persister cells in liquid glucose M9 minimal medium containing cranberry pectic oligosaccharides. www.nature.com/scientificreports/ www.nature.com/scientificreports/ Figure 5. ESI-TOF-MS/MS of 1. Structure fragments are designated with the corresponding fragment ions. Figure 5. ESI-TOF-MS/MS of 1. Structure fragments are designated with the corresponding fragment ions. Figure 6. CFT073 quiescence assay using glucose-free M9 plates. The location of spotting each sample is designated by the white ‘x’. (A)- glucose control (Top), M9 media control (Bottom). (B)- uG3m2 spotted alone. (C)- uG3m2 co-spot with glucose. Figure 6. CFT073 quiescence assay using glucose-free M9 plates. The location of spotting each sample is designated by the white ‘x’. (A)- glucose control (Top), M9 media control (Bottom). (B)- uG3m2 spotted alone. (C)- uG3m2 co-spot with glucose. Figure 7. E. coli CFT073 persistence in the presence of cPOS. Cultures were grown in 0.4% glucose M9 minimal medium as described in Methods and diluted 20-fold into 0.2% glucose M9 minimal medium either containing or lacking 1 mg/mL cPOS, and containing or lacking ampicillin (100 µg/mL). At 4 h and 24 h, the differences between E. coli CFT073 persisters in the presence of cPOS + ampicillin is significantly different than with ampicillin only (**P ≤ 0.01 and ***P ≤ 0.001, respectively). CFT073 cell viability with and without cPOS treatment were evaluated as controls. Figure 7. E. coli CFT073 persistence in the presence of cPOS. Cultures were grown in 0.4% glucose M9 minimal medium as described in Methods and diluted 20-fold into 0.2% glucose M9 minimal medium either containing or lacking 1 mg/mL cPOS, and containing or lacking ampicillin (100 µg/mL). At 4 h and 24 h, the differences between E. coli CFT073 persisters in the presence of cPOS + ampicillin is significantly different than with ampicillin only (**P ≤ 0.01 and ***P ≤ 0.001, respectively). CFT073 cell viability with and without cPOS treatment were evaluated as controls. previously observed16, the viable cell counts in the E. coli CFT073 cultures decreased slightly during the first 4 h of incubation in both the presence and absence of ampicillin. By 24 h, E. coli CFT073 had grown to just over 109 CFU/mL in the absence of ampicillin (Fig. 7). In contrast, the presence of ampicillin reduced the viable counts an additional ~1000-fold over the next 20 h, to about 106 CFU/mL. As shown by the results in Fig. 7, in the presence of 1 mg/mL cPOS and absence of ampicillin, E. coli CFT073 viable counts increased rapidly, reaching stationary phase within 4 h. Results h Normal microbial populations contain persister cells as small subpopulations (10−3 to 10−4%) of dormant cells that are tolerant to antibiotics. Upon regrowth in the absence of the drug, persister cells produce cultures that regain full sensitivity to the antibiotic. Persister cells likely play a role in chronic infections13. We previously found that E. coli CFT073 generates high levels of persister cells in liquid glucose M9 minimal medium in the presence of ampicillin (100 µg/mL), and the addition of a mixture of the 20 standard L-amino acids (100 µg/mL each) reduced persister cell populations by 100-fold during ampicillin treatment16. p Since cPOS reversed E. coli CFT073 quiescence on glucose plates, we were interested in determining whether cPOS addition to cultures of E. coli CFT073 grown in glucose M9 minimal medium in the presence of ampicillin would generate fewer persister cells. Overnight cultures of E. coli CFT073 grown on 0.4% glucose M9 minimal medium were diluted 20-fold into fresh 0.2% glucose M9 minimal medium (A600 of 0.1, ~108 CFU/mL) contain- ing or lacking ampicillin (100 µg/mL), and viable counts were measured after 4 h and 24 h at 37 °C (Fig. 7). As Scientific Reports | (2019) 9:19590 | https://doi.org/10.1038/s41598-019-56005-w Discussion Th l h The oligosaccharides discussed in this manuscript suggest previously undiscovered benefits of cranberry con- stituents for mitigating UPEC infections. Other than specific amino acid cocktails, cPOS represents the first molecules shown to reverse a quiescent phenotype and reduce a persister cell fraction in the UPEC strain CFT073. Inhibition of UPEC quiescence is intriguing since this phenotype has been linked with recurrent UTIs6. Persistence and quiescence are both phenotypes involving dormant bacteria cells; however, it remains to be deter- mined if the physiologic change(s) induced in UPEC by cPOS is shared between the two cell types. Prevention of UPEC dormancy may allow host defense mechanisms and common treatment approaches to be more effective. y y ppf CFT073 is a prototypic UPEC strain belonging to the phylogenetic group B2 multilocus sequence type 73 strains (ST73). ST73 is a major UPEC lineage, accounting for 11% and 16.6% of UPEC isolated from patients in recent studies41,42. It was previously shown that CFT073 enters a quiescent state when plated onto M9 minimal medium agar plates containing glucose at concentrations ≤106 CFU16. A recent study found that 30 of 38 ST73 strains (78.9%) entered the quiescent state on M9 glucose plates, demonstrating that quiescence is a common phenotype for this UPEC lineage. UPEC strains belonging to other sequence types (ST141, ST104, ST394, and ST998) have also demonstrated the same in vitro quiescent phenotype16. Additional studies are underway to determine if cPOS reverses quiescence in UPEC strains other than CFT073. We have shown that cranberry pectic oligosaccharides reduce a persister cell fraction of the UPEC strain CFT073 formed in the presence of ampicillin. Ampicillin belongs to the beta-lactam class of antibiotics and inhib- its enzymes critical for cell wall biosynthesis. Further studies are needed to determine if cPOS similarly reduces persister cell fractions when used with other antibacterial agents, especially those that inhibit bacteria via other mechanisms of action such as the fluoroquinolones.h l The dehydration on subunit D is likely due to the enzymatic treatment used to break down insoluble pectic polysaccharides during cranberry juice manufacturing33. Some pectinases can selectively hydrolyze glycosidic bonds by eliminative cleavage and cause oxygen-aglycone bond breakage43–45. www.nature.com/scientificreports/ Importantly, in the presence of both the cPOS and ampicillin, E. coli CFT073 viable Scientific Reports | (2019) 9:19590 | https://doi.org/10.1038/s41598-019-56005-w www.nature.com/scientificreports/ counts decreased rapidly within 4 h, and reached a level of about 3 × 102 CFU/mL after 24 h (Fig. 7). Therefore, treating CFT073 with both cPOS and ampicillin resulted in >1000-fold fewer persister cells versus treatment with ampicillin alone. Similar reduction of persisters was obtained when conducting the assay with cPOS-t (Fig. S13). counts decreased rapidly within 4 h, and reached a level of about 3 × 102 CFU/mL after 24 h (Fig. 7). Therefore, treating CFT073 with both cPOS and ampicillin resulted in >1000-fold fewer persister cells versus treatment with ampicillin alone. Similar reduction of persisters was obtained when conducting the assay with cPOS-t (Fig. S13). Discussion Th l h For example, a mechanistic study on a pectin lyase A (PLA) derived from Aspergillus niger, of the same origin as the Klerzyme 150 in this study, showed specific cleavage of a glycosidic bond adjacent to a methyl-esterified galacturonic acid residue, leaving a 4,5-unsaturated galacturonic acid methyl ester at the non-reducing end46. Interestingly, it was also pointed out that free carboxylic acids generally occurred second from the non-reducing end, which is in agreement with our assignment of 146.i Previous studies of cranberry oligosaccharides have focused on xyloglucans and their antibiofilm and antiad- hesion properties30–32. A recent report showed that xyloglucans can be found in pig urine following oral adminis- tration31. In the study presented here, xyloglucans were separated from cPOS by PGC chromatography and were inactive when tested in the quiescence and persister cells assays. Hence, there may be distinct health benefits from the structurally different oligosaccharide fractions found in cranberry.h f The results presented here encourage further investigation of cPOS as agents to combat recurrent E. coli UTIs and support current drug treatment options. Our findings complement those concerning other cranberry con- stituents (e.g. PACs, organic acids and xyloglucans) and their possible benefits in preventing UTI infections. It is rational to speculate that the full benefit of cranberry may not be realized with one chemical class, but rather that multiple classes act in concert. Reviews of the published clinical data show inconsistencies in chemical character- ization and preparation of cranberry products tested for UTI prevention22. The optimal formulation and use of cranberry products for UTI prevention will require further knowledge of the active constituents and mechanisms of action. Until then, cranberry juice or whole berry products might be best used until more is known regarding how and why cranberry may aid in preventing UTIs. Methods G l The collected solids were then dissolved in d.i. H2O and lyophilized. The trituration step was repeated twice prior to further separation by PGC chromatography to provide sample cPOS-t (91.7%, w/w dry). Uronic acid identification of cPOS. The composition of the poly-galacturonic acid backbone of cPOS was determined by acid hydrolysis of cPOS followed by derivatization with 1-phenyl-3-methyl-5-pyrazolone (PMP)47. Briefly, 10 mg cPOS was hydrolyzed in 1 mL 2 M TFA at 90 °C for 5 h. After cooling to room temperature, the reaction mixture was centrifuged at 3000 rpm for 5 min. The supernatant was evaporated in vacuo to remove residual TFA. The hydrolysate mixture was dissolved in 1 mL distilled water and treated with 30 µL NaOH (0.3 M) and 20 µL PMP solution (0.5 M in methanol) for derivatization. The mixture was incubated at 70 °C for 60 min, cooled to room temperature and neutralized with 30 µL of HCl (0.3 M). The mixture was then extracted with 1 mL chloroform. The aqueous layer was filtered by passing through a 0.45 µm syringe filter. Glucuronic acid (2.0 mM), galacturonic acid (2.0 mM) and a distilled water blank were derivatized the same as described above. HPLC anal- yses of PMP-labeled samples were conducted on a Prominence i-series system (Shimadzu) using a C18 column (4.6 mm × 250 mm, 5 𝜇m, J.T. Baker Inc., Phillipsburg, NJ, USA). The injection volume was 20 µL with a flow rate of 1.0 mL/min at 35 °C. Mobile phase A was 10% ACN/water with 0.045% KH2 PO4–0.05% triethylamine buffer (pH 7.5) and mobile phase B was 100% ACN. The column was eluted with 6% B for 4 min, 6–12% for 1 min and then 12% B for 20 min. The UV detection wavelength was 254 nm. Bacterial strains and cultivation. E. coli CFT073 was obtained from a cryogenically frozen stock at the laboratory of P.S.C. and stored at −80 °C in a 1:1 mixture of LB broth and 50% glycerol by volume. LB broth and LB agar were used for routine cultivation. Liquid M9 minimal medium was prepared as described previously16, and M9 minimal medium agar plates were prepared with 1.5% noble agar to avoid impurities present in bacteri- ological agar. In vitro quiescence inhibition assay. The procedure for this assay closely follows a published protocol16. In general, overnight cultures of E. Methods G l coli CFT073 were prepared in 0.4% glucose M9 minimal medium as aforemen- tioned. Bacteria from this culture were diluted to a final concentration of 105 CFU in 4 mL of liquid overlay media (0.2% glucose M9 minimal medium with 0.9% noble agar at 45 °C). Each 4 mL overlay inoculum was poured over a pre-warmed (37 °C) 0.2% glucose M9 minimal media agar plate immediately after inoculation. These plates were allowed to solidify at room temperature with lids slightly ajar. Once solidified, test spots were added to the overlay media and allowed to dry before incubating the plate upside down at 37 °C for 24 h. Test spots were 10 μL of each test solution at 10 mg/mL in M9 minimal media unless indicated otherwise. Non-growing E. coli in the overlay were considered to be quiescent if growth could be induced with the positive control (3 co-spots; 5 μL each of tyrosine, lysine, and methionine solutions at 0.1 mg/mL; co-spots added sequentially to the identical location on the agar). To test the effects in glucose-free conditions, glucose was not added to any of the media components prior to completing the assay. When adding glucose back to the glucose-free plates, a 10 μL spot of 20% glucose in water (2 mg; sufficient to support bacteria growth) was added directly following and to the iden- tical location as the dried test spot. For all quiescence assays, a positive result was defined as observable bacteria growth at the site of a test sample following 24 h incubation. A negative result was defined as no observable bac- teria growth at the site of a test sample. Images of agar plates were made after 24 h using a Molecular imager Gel Doc XR+ (Bio-rad, Hercules, CA, USA) system with Image Lab Software. Persister cell viability assay. The procedure for this assay closely followed a published protocol16. E. coli CFT073 was streaked from cryogenically frozen stocks onto LB agar plates and incubated overnight at 37 °C. A loopful of cells from the plate was added to 10 mL 0.4% glucose M9 minimal media in a 125 mL culture flask and incubated overnight at 37 °C and 200 rpm. Methods G l General experimental procedures. NMR experiments were conducted using an Agilent Inova NMR 500 MHz spectrometer in D2O (99.99%, Sigma-Aldrich, St. Louis, MO, USA) at 25 °C. LC-MS analysis was per- formed on a Prominence UFLC system (Shimadzu, Kyoto, Japan) coupled to a QTRAP 4500 mass spectrom- eter (AB Sciex, Framingham, MA, USA) with electrospray ionization source on negative ion mode with scans from m/z 200 to m/z 2000. High Resolution Electrospray Ionization mass spectra and tandem mass spectra (HR-ESI-MS and HR-ESI-MS/MS) were acquired using a TripleTOF 4600 spectrometer (AB Sciex) operating in negative ion mode. Flash chromatography was completed using an Agilent 971-FP flash purification sys- tem (Agilent Technologies, Santa Clara, CA, USA) with Biotage SNAP KP-C18-HS 120 g cartridges (Biotage, Charlotte, NC, USA). HPLC separations were performed on a Shimadzu Prominence i-series HPLC (Shimadzu). Separation of cranberry pectic oligosaccharides. Cranberry hulls were degraded with pectinase (Klerzyme 150, DSM Food Specialties, Heerlen, Netherlands) and fractionated as previously described with mod- ifications30. Briefly, cranberry pectinase treated hull extract was fractionated using a C18 flash column sequen- tially eluted with 500 mL 100% deionized (d.i.) water, 500 mL 15% methanol/H2O and 500 mL 100% methanol. Fractions from each step-gradient were individually pooled into three major fractions, Cranf1W (38.1%, w/w, dry), Cranf1b (23.8%, w/w, dry) and Cranf1M (28.1%, w/w, dry). Cranf1b was then subjected to separation using a PGC HyperSep Hypercarb SPE cartridge (1 gram, Thermofisher Scientific, Waltham, MA, USA). The PGC car- tridge was firstly conditioned by 50% ACN/water and then equilibrated with 100% d.i. water. Two mL of 20 mg/ mL Cranf1b aqueous solution was then loaded onto the PGC cartridge and eluted sequentially with d.i. water, 10% ACN/H2O/0.1% TFA and 30% ACN/H2O/0.1% TFA. The 10% ACN/H2O/0.1% TFA PGC eluent (cPOS, Scientific Reports | (2019) 9:19590 | https://doi.org/10.1038/s41598-019-56005-w www.nature.com/scientificreports/ 15% w/w, dry) was then separated using a TSKgel Amide-80 HR HILIC column (4.6 × 250 mm, 5 μm, TOSOH Bioscience, Tokyo, Japan) at 1 mL/min and 35 °C. The column was eluted with a linear gradient from 80% ACN/ H2O/0.1% formic acid to 40% ACN/H2O/0.1% formic acid over 30 min. uG3m2 and 1 were collected at 10 min and 12.5 min, respectively (Fig. 2). Trituration of Cranf1b to remove iridoid terpenes was accomplished by sonicating 200 mg Cranf1b in 30 mL 95% ethanol/water and then centrifuging the solids at 17,000x g for 8 min. Methods G l Cultures were diluted in fresh 0.2% glucose M9 minimal media supplemented with test samples (1 mg/mL) to an optical density (OD600) of 0.1 (~108 CFU/mL) and grown in the presence of ampicillin sodium at 10x MIC (0.1 mg/mL) to generate persister fractions. Cultures were grown in the absence of ampicillin and/or cranberry constituents as controls. The cultures were incubated shaking (200 rpm) at 37 °C and viable counts were measured at 0, 4, and 24 hours by plating on LB media. The persister cell viability assays were completed in triplicate and analyzed for statistical significance. Statistics. Persister cell viability assays were compared using a two-tailed student’s t test. P-values ≤ 0.05 were considered statistically significant. Received: 6 March 2019; Accepted: 4 December 2019; Published: xx xx xxxx Scientific Reports | (2019) 9:19590 | https://doi.org/10.1038/s41598-019-56005-w ( ) 4. Foxman, B. Urinary tract infection syndromes: occurrence, recurrence, bacteriology, risk factors, and disease burden. Infect. Dis Clin. North Am. 28, 1–13 (2014). and treatment options. Nat. Rev. Microbiol. 13, 269–284 (2015). 3. Aydin, A., Ahmed, K., Zaman, I., Khan, M. S. & Dasgupta, P. Recurrent urinary tract infections in women. Int. Urogynecol. J. 26, 795–804 (2015). 1. Stamm, W. E. & Norrby, S. R. Urinary tract infections: disease panorama and challenges. J. Infect. Dis. 183, S1–4 (2001). References 1. Stamm, W. E. & Norrby, S. R. Urinary tract infections: disease panorama and challenges. J. Infect. Dis. 183, S1–4 (2001). 2. Flores-Mireles, A. L., Walker, J. N., Caparon, M. & Hultgren, S. J. Urinary tract infections: epidemiology, mechanisms of infection and treatment options. Nat. Rev. Microbiol. 13, 269–284 (2015). 3. Aydin, A., Ahmed, K., Zaman, I., Khan, M. S. & Dasgupta, P. Recurrent urinary tract infections in women. Int. Urogynecol. J. 26, 795–804 (2015). 4. Foxman, B. Urinary tract infection syndromes: occurrence, recurrence, bacteriology, risk factors, and disease burden. Infect. Dis. Clin. North Am. 28, 1–13 (2014). References Sun, J. et al. Cranberry (Vaccinium macrocarpon) oligosaccharides decrease biofilm formation by uropathogenic Escherichia coli. J Funct. Foods 17, 235–242 (2015).t 1. Coleman, C. M. et al. Arabinoxyloglucan oligosaccharides may contribute to the antiadhesive properties of porcine urine after cranberry consumption. J. Nat. Prod. 82, 589–605 (2019). y p 32. Hotchkiss, A. T. Jr. et al. Cranberry xyloglucan structure and inhibition of Escherichia coli adhesion to epithelial cells. J. Agric. Food Chem. 63, 5622–5633 (2015).it 3. Spiro, M. D. et al. Purification and characterization of biologically active 1, 4-linked α-d-oligogalacturonides after partial digestion of polygalacturonic acid with endopolygalacturonase. Carbohydr. Res. 247, 9–20 (1993). yg yg y 4. Cipriani, T. R. et al. Polygalacturonic acid: Another anti-ulcer polysaccharide from the medicinal plant Maytenus ilicifolia Carbohydr. Polym. 78, 361–363 (2009). 35. Marcon, M. V., Carneiro, P. I. B., Wosiacki, G., Beleski-Carneiro, E. & Petkowicz, C. L. O. Pectins from apple pomace–characterization by 13C and 1H NMR spectroscopy. Ann. Magn. Reson. 4, 56–63 (2005). h l f f d l h d l ( ) y p py g ( ) 36. Cheng, H. N. & Neiss, T. G. Solution NMR spectroscopy of food polysaccharides. Polymer Reviews 52, 81–114 (2012). 37. Jensen, H. D., Krogfelt, K. A., Cornett, C., Hansen, S. H. & Christensen, S. B. Hydrophilic carboxylic acids and iridoid glycosides in the juice of American and European cranberries (Vaccinium macrocarpon and V. oxycoccos), lingonberries (V. vitisidaea), and blueberries (V. myrtillus). J. Agric. Food Chem. 50, 6871–6874 (2002). y g 38. Dinda, B., Debnath, S. & Harigaya, Y. Naturally occurring iridoids. A review, part 1. Chem. Pharm. Bull. 55, 159–222 (2007). Ch dh Afifi Ü S h O kl T 13 f ll d d l d d 38. Dinda, B., Debnath, S. & Harigaya, Y. Naturally occurring irido 39. Chaudhuri, R. K., Afifi-Yazar, F. Ü., Sticher, O. & Winkler, T. 13C their acylated derivatives. Tetrahedron 36, 2317–2326 (1980). 39. Chaudhuri, R. K., Afifi-Yazar, F. Ü., Sticher, O. & Winkler, T. 13C NMR spectroscopy of naturally occurring iridoid glucoside their acylated derivatives. Tetrahedron 36, 2317–2326 (1980).l ii their acylated derivatives. Tetrahedron 36, 2317–2326 (1980) 40. Demi̇rezer, L. Ö., Gürbüz, F., Güvenalp, Z., STRÖCH, K. & Zeeck, A. Iridoids, flavonoids and monoterpene glycosides from Galium verum subsp. verum. Turk. J. Chem. 30, 525–534 (2006). 41. Croxall, G. et al. References mSphere 1, e00055–00015 (2016). g y p 7. Putrinš, M. et al. Phenotypic heterogeneity enables uropathogenic Escherichia coli to evade killing by antibiotics and serum complement. Infect. Immun. 83, 1056–1067 (2015).i f 18. Niu, H. et al. Identification of anti-persister activity against uropathogenic Escherichia coli from a clinical drug library. Antibiotics 4, 179–187 (2015). 19. Orman, M. A. & Brynildsen, M. P. Inhibition of stationary phase respiration impairs persister formation in E. coli. Nat. Commun. 6, 7983 (2015). 20. Kim, J. S. et al. Fumarate-mediated persistence of Escherichia coli against antibiotics. Antimicrob. Agents. Chemother. 60, 2232– (2016).hf 1. Vasileiou, I., Katsargyris, A., Theocharis, S. & Giaginis, C. Current clinical status on the preventive effects of cranberry consumption against urinary tract infections. Nutr. Res. 33, 595–607 (2013). 22. Jepson, R. G., Williams, G. & Craig, J. C. Cranberries for preventing urinary tract infections. Cochrane Database Syst. Rev. 10, Cd001321 (2012). 3. Sobota, A. E. Inhibition of bacterial adherence by cranberry juice: potential use for the treatment of urinary tract infections. J. Urol 131, 1013–1016 (1984).i 131, 1013 1016 (1984). 4. Gupta, K. et al. Cranberry products inhibit adherence of p-fimbriated Escherichia coli to primary cultured bladder and vagina ith li l ll J U l 177 2357 2360 (2007) 4. Gupta, K. et al. Cranberry products inhibit adherence of p-fimbriated Escherichia coli to primary cultured bladder and vagina epithelial cells. J. Urol. 177, 2357–2360 (2007).f p 25. Caljouw, M. A. et al. Effectiveness of cranberry capsules to prevent urinary tract infections in vulnerable older persons: a double- blind randomized placebo-controlled trial in long-term care facilities. J. Am. Geriatr. Soc. 62, 103–110 (2014). 6. Maisuria, V. B., Los Santos, Y. L.-d, Tufenkji, N. & Déziel, E. Cranberry-derived proanthocyanidins impair virulence and inhibi quorum sensing of Pseudomonas aeruginosa. Sci. Rep. 6, 30169 (2016). q g g p 27. Howell, A. B. et al. A-type cranberry proanthocyanidins and uropathogenic bacterial anti-adhesion activity. Phytochemistry 66, 2281–2291 (2005). ( ) 8. Zafriri, D., Ofek, I., Adar, R., Pocino, M. & Sharon, N. Inhibitory activity of cranberry juice on adherence of type 1 and type P fimbriated Escherichia coli to eucaryotic cells. Antimicrob. Agents Chemother. 33, 92–98 (1989).f i 9. Jensen, H. D., Struve, C., Christensen, S. B. & Krogfelt, K. A. Cranberry juice and combinations of its organic acids are effective against experimental urinary tract infection. Front. Microbiol. 8, 542 (2017).i g p y 0. References Scientific Reports | (2019) 9:19590 | https://doi.org/10.1038/s41598-019-56005-w www.nature.com/scientificreports/ 5. Foxman, B. & Brown, P. Epidemiology of urinary tract infections: Transmission and risk factors, incidence, and costs. Infect. Dis Clin. North. Am. 17, 227–241 (2003). 6. Hunstad, D. A. & Justice, S. S. Intracellular lifestyles and immune evasion strategies of uropathogenic Escherichia coli. Annu. Rev Microbiol. 64, 203–221 (2010). , ( ) 7. Ejrnaes, K. et al. Pulsed-field gel electrophoresis typing of Escherichia coli strains from samples collected before and after pivmecillinam or placebo treatment of uncomplicated community-acquired urinary tract infection in women. J. Clin. Microbiol. 44, 1776–1781 (2006). 8. Kerrn, M. B., Struve, C., Blom, J., Frimodt-Moller, N. & Krogfelt, K. A. Intracellular persistence of Escherichia coli in urinary bladder from mecillinam-treated mice. J. Antimicrob. Chemother. 55, 383–386 (2005). 9. Rosen, D. A., Hooton, T. M., Stamm, W. E., Humphrey, P. A. & Hultgren, S. J. Detection of intracellular bacterial communities in human urinary tract infection. PLOS Med. 4, e329 (2007). 9. Rosen, D. A., Hooton, T. M., Stamm, W. E., Humphrey, P. A. & Hultgren, S. J. Detection o human urinary tract infection. PLOS Med. 4, e329 (2007). y ( ) 10. Silverman, J. A., Schreiber, H. L., Hooton, T. M. & Hultgren, S. J. From physiology to pharmacy: Developments in the pathoge and treatment of recurrent urinary tract infections Curr Urol Rep 14 448 456 (2013) y 10. Silverman, J. A., Schreiber, H. L., Hooton, T. M. & Hultgren, S. J. From physiology to pharmacy: Developments in the pathogenesis and treatment of recurrent urinary tract infections. Curr. Urol. Rep. 14, 448–456 (2013). y p 11. Shah, D. et al. Persisters: a distinct physiological state of E. coli. BMC Microbiol. 6, 53 (2006). wis, K. Persister cells: molecular mechanisms related to antibiotic to 12. Lewis, K. Persister cells: molecular mechanisms related to antibiotic tolerance. Handb. Exp. Pharmacol., 121–133, (2012). L i K P i ll A R Mi bi l 6 ( ) 13. Lewis, K. Persister cells. Annu. Rev. Microbiol. 64, 357–372 (201 14. Lewis, K. Multidrug tolerance of biofilms and persister cells. Curr. Top. Microbiol. Immunol. 322, 107–131 (2008).hl 15. Joers, A., Kaldalu, N. & Tenson, T. The frequency of persisters in Escherichia coli reflects the kinetics of awakening from dormancy. J. Bacteriol. 192, 3379–3384 (2010). 6. Leatham-Jensen, M. P. et al. Uropathogenic Escherichia coli metabolite-dependent quiescence and persistence may explain antibiotic tolerance during urinary tract infection. Scientific Reports | (2019) 9:19590 | https://doi.org/10.1038/s41598-019-56005-w References Molecular epidemiology of extraintestinal pathogenic Escherichia coli isolates from a regional cohort of elderly patients highlights the prevalence of ST131 strains with increased antimicrobial resistance in both community and hospital care settings. J Antimicrob Chemother 66, 2501–2508 (2011). 42. Gibreel, T. M. et al. Population structure, virulence potential and antibiotic susceptibility of uropathogenic Escherichia coli from Northwest England. J Antimicrob Chemother 67, 346–356 (2012). Northwest England. J Antimicrob Chemother 67, 346–356 (201 g 43. Pedrolli, D. B., Monteiro, A. C., Gomes, E. & Carmona, E. C. Pectin and pectinases: production, characterization and indu application of microbial pectinolytic enzymes. Open Biotechnol. J. 3, 9–18 (2009).h 43. Pedrolli, D. B., Monteiro, A. C., Gomes, E. & Carmona, E. C. Pectin and pectinases: production, characterization application of microbial pectinolytic enzymes. Open Biotechnol. J. 3, 9–18 (2009).h pp p y y p 44. Hasegawa, S. & Nagel, C. W. The characterization of an α, β-unsaturated digalacturonic acid. J. Biol. Chem. 237, 619–621 (1962). 44. Hasegawa, S. & Nagel, C. W. The characterization of an α, β-un S. & Nagel, C. W. The characterization of an α, β-unsaturated digala g gh g 45. Linhardt, R., Galliher, P. & Cooney, C. Polysaccharide lyases. Applied Biochem. Biotechnol. 12, 135–176 (1987). y y y pp 46. van Alebeek, G. J., Christensen, T. M., Schols, H. A., Mikkelsen, J. D. & Voragen, A. G. Mode of action of pectin lyase A of Aspergillus niger on differently C(6)-substituted oligogalacturonides. J. Biol. Chem. 277, 25929–25936 (2002).ii f 47. Ruhaak, L. R. et al. Glycan labeling strategies and their use in identification and quantification. Anal. Bioanal. Chem. 397, 3457– (2010). www.nature.com/scientificreports/ Acknowledgementsh g This work was supported, in part, by Ocean Spray Cranberries, Inc. (Lakeville-Middleboro, MA, USA). RD was financially supported by the Omar Magnate Foundation Fellowship. Research reported in this publication was made possible by the use of equipment and services available through the RI-INBRE Centralized Research Core Facility, which is supported by the Institutional Development Award (IDeA) Network for Biomedical Research Excellence from the National Institute of General Medical Sciences of the National Institutes of Health under grant number P20GM103430, and by the National Science Foundation EPSCoR Cooperative Agreement #EPS- 1004057. Competing interestsh p g The authors declare no competing interests. Author contributions D.C.R., J.S., R.W.D. and P.S.C. conceived and designed the experiments. J.S. and R.W.D. prepared the manuscript and contributed equally to this work. J.S. and R.W.D. performed chemical purification and characterization of cranberry materials. R.W.D and L.N. performed in vitro quiescence and persister cell assays. Z.P. contributed to Figures 2 and S3. L.N. contributed to Figure 8. C.K., P.S.C., N.P.S and D.C.R edited and approved the final version of the manuscript. Additional information Supplementary information is available for this paper at https://doi.org/10.1038/s41598-019-56005-w. Supplementary information is available for this paper at https://doi.org/10.10 Correspondence and requests for materials should be addressed to D.C.R. Reprints and permissions information is available at www.nature.com/reprints. Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Cre- ative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not per- mitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. © The Author(s) 2019 Scientific Reports | (2019) 9:19590 | https://doi.org/10.1038/s41598-019-56005-w
W4385525647.txt
https://rur.oekom.de/index.php/rur/article/download/2203/3394
de
Von der Raumordnung zur Umweltordnung
Raumforschung und Raumordnung
1,994
cc-by
4,160
Ulrich Hodapp: Von der Raumordnung zur Umweltordnung Ulrich Hodapp Von der Raumordnung zur Umweltordnung Planerische Konsequenzen eines ökosystemaren Denkansatzes* Kurzfassung Die Einführung eines ökosystemaren Planungsansatzes und die Bildung von Ökosystemtypen in der Umweltplanung haben gravierende Auswirkungen auf Planungsziele, Planungskonzepte und Planelemente. Als Indikatoren zur Beurteilung der Funktionsfähigkeit von einzelnen Ökosystemen und der Landschaft insgesamt eignen sich stofflich-energetische und biotische Stabilitätskriterien. Ein Einbeziehen anthropogener Ökosysteme und damit letztendlich die Einflußnahme auf das menschliche Wirtschaften ist unverzichtbar. Die Bestimmung eines "ökologischen Nutzbarkeitsrahmens", nur innerhalb dessen der Mensch Ökosysteme und Umweltmedien in Anspruch nehmen kann, und das Konzept einer "naturnahen Kulturlandschaft" sind zwei mögliche Konzeptansätze einer ökosystemar ausgerichteten Umweltplanung. Die Ausgestaltung als Umweltleitplanung ist ein wesentlicher Baustein auf dem Weg von der bestehenden Raumordnung zu einer Umweltordnung. 1 Konzeptionelle Grundlagen 1.1 Die Stellung des Naturund Umweltschutzes Die derzeit vorherrschende Sichtweise in der Umweltpolitik und Umweltplanung betrachtet den Natur- und Umweltschutz als ein eigenständiges Interesse neben vielen anderen (z.B. Industrie, Landwirtschaft). Diese Interessen kämpfen alle gleichermaßen gegeneinander um ihre Durchsetzung. Aus dieser Sichtweise ergeben sich die "unsinnigen" Konfrontationen z.B. um Arbeitsplätze oder Umweltschutz. Notwendig ist aber eine Sichtweise, die den Natur- und Umweltschutz und dam,it die Sicherung der natürlichen Lebensgrundlagen nicht als Konkurrenz, sondern als Basis und elementare Grundlage jeder wirtschaftlichen und gesellschaftlichen Entwicklung betrachtet. "Denn wenn es richtig ist, daß über ökologische Qualitäten unserer Umwelt bereits entschieden wird, indem festgelegt wird, mit welchen Stof- RuR4/5.1994 fen, Energien und Verfahren welche Güter hergestellt werden - und dies ist augenscheinlich der Fall -, dann muß es Aufgabe der Umweltpolitik sein, für die Produktions- und Konsumtionsprozesse der Gesellschaft Rahmen mit dem Ziel zu setzen, daß dabei auch die gewünschten Naturqualitäten erhalten bzw. erzeugt werden" (1). 1.2 Die Einführung von Ökosystemtypen als Planungskategorie Ein ökosystemarer Konzeptansatz muß die getrennte Betrachtung der Umweltmedien Wasser, Boden, Luft/Klima und Flora/Fauna überwinden. Dies ist möglich durch die Abgrenzung einzelner Ökosysteme, innerhalb derer die einzelnen Umweltmedien im jeweiligen Wirkungsgefüge zu berücksichtigen sind. Anthropogene Ökosysteme sind dabei mit einzuschließen. Damit rückt neben dem Wirkungsgefüge der Naturfaktoren untereinander das Wirkungsgefüge zwischen dem Menschen und der Natur in den Mittelpunkt. Das Gesamtsystem unserer Umwelt muß als ein miteinander verflochtenes ökologisch-ökonomisches System betrachtet werden, in dem ein Schutz der Umwelt nicht gegen den Menschen, sondern nur durch umweltverträgliches Wirtschaften des Menschen erreicht wird. Dazu ist sowohl eine flächendeckende wie eine verursacherbezogene Betrachtungsweise notwendig. Die Gliederung der gesamten Landschaft in Ökosystemtypen stellt dafür eine planerisch handhabbare Möglichkeit dar. Die Restbestände der natürlichen/ naturnahen Ökosysteme bilden das ökologische Rückgrat einer jeden Landschaft (Ökosystemkomplex). Sie überlappen sich in mehr oder weniger kleinen Teilbereichen mit den anthropogen geprägten Bioökosystemen (Wald- und Agrarökosysteme) sowie den anthropogenen Techno-Ökosystemen (Urban-industrielle Ökosysteme). Limnische Ökosysteme bleiben außer Betracht. 287 Ulrich Hodapp: Von der Raumordnung zur Umweltordnung Ökosystemkomplex / Landschaft 1.3 Indikatoren einer funktionsfähigen Landschaft: Stofflichenergetische und biotische Stabilität Bei der näheren Betrachtung der in Ökosystemen ablaufenden Prozesse zeigt sich, daß Stoff- und Energieflüsse die zentralen Komponenten innerhalb einzelner Ökosysteme und zwischen verschiedenen Ökosystemen sind. Diesen Komponenten wurde planerisch bisher keinerlei Beachtung geschenkt. Dabei greift der Mensch auf allen Ebenen in die natürlichen, dynamischen Energie- und Stoffflüsse ein und schafft neue (z.B. Abbau von Rohstoffen, Produktion von Gütern, Energieerzeugung). Über die Ausbreitungspfade Luft, Boden und Wasser kommt es, vor allem durch das Einbringen von Stoffen, zu Veränderungen der natürlichen Kreisläufe. Diese Stoffe sind Abbildung 1 Gliederung der Landschaft (Ökosystemkomplex) in Ökosystemtypen nichts anderes als Abfälle der mensch- lieh-energetische und biotische Instalichen Tätigkeiten und Ausdruck der bilitäten in allen Ökosystsemen sind Funktionsunfähigkeit bestehender an- die Folge. thropogener Ökosysteme. Für diese Abfälle fehlen sowohl in den anthropo- Die Lösung der ökologischen Frage genen wie den natürlichen Ökosyste- steht und fällt mit der Schaffung von men die entsprechenden Abbaumög- ökologisch funktionsfähigen anthropolichkeiten in der notwendigen Größen- genen Systemen, d.h. der Ökologisieordnung. Die vielfältigen Mechanis- rung der menschlichen Nutzungs- und men natürlicher Ökosysteme zur Bewirtschaftungsmuster. Aufgabe Selbstregulierung werden überfordert, einer zukünftigen Umweltplanung überlagert oder ausgeschaltet und da- bzw. Umweltordnung muß es daher mit die Funktionsfähigkeit dieser Öko- sein, auf der Grundlage von flächensysteme beeinträchtigt. Die Beseiti- deckend ökosystemar funktionsfähigung und Isolierung natürlicher/natur- gen Ökosystemen für den Menschen naher Ökosysteme durch die Zunahme stabile Wirtschafts- und Produktionsmenschlicher Landnutzungen führt zu bedingungen zu schaffen. Aus der Anaeiner zunehmenden biotischen Insta- lyse natürlicher Funktionsprinzipien in bilität aufgrund der Beseitigung der Ökosystemen ergibt sich, daß zur Beurnatürlichen Diversität. Aus ökosyste- teilung der Funktionsfähigkeit von marer Sicht führt die weitreichende Ökosystemen die stofflich-energetiFunktionsunfähigkeit anthropogener . sche und die biotische Stabilität (im Ökosysteme zwangsläufig auch zu Sinne einer dynamischen Stabilität) funktionsunfähigen natürlichen/natur- herangezogen werden können (vgl. nahen Ökosystemen. Weltweite stoff- Übersicht 1). Übersicht 1 Stofflich-energetische und biotische Stabilität Stofflich-energetische Stabilität • ein Nichtgleichgewichtszustand, bei dem jedoch der systeminteme Zustand (Vorräte an Energie und Stoffen) durch äußere Einflüsse zeitlich konstant gehalten wird; In- und Output sowie Auf- und Abbauprozesse sind ausgewogen; Kreislaufprinzip • ein selbstgeregelter, mehr oder weniger gleichmäßiger Energiedurchsatz und Stoff~msatz mit einem Minimum an Neben- und Wechselwirkungen zwischen den einzelnen Ökosystemen • die stoffliche und energetische Grundlage liegt im Ökosystem selbst Biotische Stabilität • Einhalten der biotischen Mindestanforderungen (Flächen, Populationen, Lebensbedingungen) • kleinteilige, mosaikhafte Vielfalt in den Ökosystemen bzw. im Ökosystemkomplex • Vorhandensein der ganzen biotischen Bandbreite an Biozönosen einschließlich den Lebensräumen und Lebensbedingungen • flächendeckend stabile Ökosystemstrukturen 288 RuR4/5 . l994 Ulrich Hodapp: Von der Raumordnung zur Umweltordnung 2 Konsequenzen für die Planung 2.1 Konsequenzen für die Planungsziele Die zukünftigen Aufgaben und Zielsetzungen einer nach ökosystemaren Gesichtspunkten aufgebauten Umweltleitplanung können folgendermaßen formuliert werden: Umweltleitpläne weisen auf der Grundlage einer Bewertung der bestehenden Umweltsituation, einer Risikoabschätzung, einer als funktion~fähig zu bezeichnenden Vergleichssituation und einer Bewertung der zukünftigen Entwicklungsmöglichkeiten ökologische Leitbilder aus. Diese Leitbilder bilden die Grundlage einer Umweltvorsorgeplanung (im Sinne einer Risikovermeidung und Bewirtschaftung) mit dem Ziel der Sicherung bzw. Wiederherstellung der Funktionsfähigkeit der Ökosysteme und der Ökosystemkomplexe. Dazu sind die notwendigen Schutz-, Entwicklungs- und Sanierungsräume auszuweisen, einschließlich der dazu notwendigen Ziele, Maßnahmen und Prioritäten (fachlich und zeitlich). Im Rahmen dieser Zielsetzungen gilt es vorrangig eine grundlegende Definition der Funktionsfähigkeit der einzelnen Ökosysteme und der Ökosystemkomplexe festzulegen. Im nachfolgenden werden für natürliche/naturnahe und urban-industrielle Ökosysteme beispielhaft Definitionen vorgestellt, die als ein erster Beitrag für eine zukünftige Diskussion zu verstehen sind. herzustellen. Während natürliche Ökosysteme vom Menschen unbeeinflußt bleiben, sind naturnahe Ökosysteme durch direkte menschliche Pflege- und Bewirtschaftungsmaßnahem so zu steuern, daß ihre ökologischen Funktionen optimal und nachhaltig gesichert werden. Mit der Funktionsfähigkeit verbindet sich der Anspruch, daß die in diesen Ökosystemen ablaufenden natürlichen Prozesse durch indirekte Einflüsse anthropogener Ökosysteme nicht beeinträchtigt werden dürfen, so daß eine stofflich-energetische und biotische Stabilität vorliegt. RuR4/5 .1994 (1) die Bestimmung der ökologischen Nutzbarkeitspotentiale von Ökosystemen und einzelnen Umweltmedien (ökologisch verträglicher Nutzbarkeitsrahmen) im Sinne einer Risikovermeidung und Ressourcenbewirtschaftung sowie die Bestimmung der anthropogenen Nutzungsnotwendigkeit für Umweltentlastungspotentiale (Alternativ-, Spar- und Reduktionspotentiale); (2) Urban-industrielle Ökosysteme Urban-industrielle Ökosysteme setzen sich zusammen aus dem kleinräumigen Nebeneinander von natürlichen, naturnahen und umweltverträglich bewirtschafteten bzw. umweltverträglich wirtschaftenden Ökosystemen. Diese Ökosysteme erfüllen im Rahmen ihrer Funktionsfähigkeit festzulegende natürliche ökologische Teilfunktionen im Landschaftshaushalt. Mit der Funktionsfähigkeit verbindet sich der Anspruch, daß im Rahmen umweltverträglichen Wirtschaftens die in diesen Ökosystemen ablaufenden technischen Stoff- und Energieflüsse soweit optimiert bzw. minimiert sind, daß sowohl eine Beeinträchtigung der Funktionsfähigkeit der Bio-Ökosysteme als auch der menschlichen Gesundheit ausgeschlossen werden kann (Einhalten eines ökologisch verträglichen Nutzungsrahmens). 2.2 Konsequenzen für die Planungskonzepte Natürliche/naturnahe Ökosysteme Unter den natürlichen Ökosystemen sind Lebensräume zu verstehen, die den Charakter von Urlandschaften aufweisen und keinerlei menschlicher Nutzung unterliegen. Naturnahe Ökosysteme sind aus der menschlichen Nutzung hervorgegangene Lebensräume, die regelmäßigen menschlichen Eingriffen geringer Intensität unterliegen. Diese Lebensräume sind zur Erfüllung ihrer Funktionen im Landschaftshaushalt in ausreichender Vielfalt, Größe, Zusammensetzung und Verbindung zu erhalten bzw. wieder- grundlegende Anforderungen an zukünftige Planungskonzepte: 2.2.1 Zu berücksichtigende Belange Für die zu berücksichtigenden Belange ergibt sich die Notwendigkeit veränderter und erweiterter Anforderungen. Die Zielsetzung der Schaffung funktionsfähiger Ökosysteme beeinhaltet eine Berücksichtigung sowohl des Wirkungsgefüges der natürlichen Landschaftsfaktoren als auch des Wirkungsgefüges zwischen diesen Landschaftsfaktoren und der menschlichen Gesellschaft (v.a. auch der Stoff- und Energieflüsse). Aus einer solchen Zielsetzung entstehen gleichzeitig zwei die Bestimmung eines ökologisch verträglichen Landnutzungskonzepts. 2.2.2 Bestimmung eines ökologischen Nutzbarkeitsrahmens Die Nutzungserfordernisse des Menschen an die Umweltmedien und die Ökosysteme und die sich daraus ergebenden Beeinträchtigungen sind im wesentlichen zurückzuführen auf die fehlende Selbstregulation der anthropogenen Ökosysteme, den hohen Stoff- und Energieeinsatz in diesen Systemen, die fehlenden Kreisläufe und die völlige Abhängigkeit der urban-industriellen Ökosysteme von den BioÖkosystemen und einzelnen Naturfaktoren als Stoff- und Energieeinfuhrbzw. -austragsräume. Die Schaffung funktionsfähiger anthropogener Ökosysteme macht die Bestimmung eines ökologischen Nutzbarkeitsrahmens, nur innerhalb dessen eine Nutzung ökologischer Potentiale durch den Menschen verträglich ist, zwingend notwendig (vgl. Abb. 2). Unter der übergeordneten Zielsetzung des Erhalts bzw. der Schaffung einer funktionsfähigen Landschaft bildet nicht der menschliche Bedarf, sondern die Empfindlichkeit der einzelnen Ökosysteme den Ausgangspunkt, d.h. die Nutzungsmöglichkeiten orientieren sich an den ökologischen Notwendigkeiten. Ein anthropogenes Potentialnutzungskonzept innerhalb eines solchen ökologischen Nutzbarkeitsrahmens wird an umfassenden Bewirtschaftungskonzepten für die einzelnen Umweltmedien nicht vorbeikommen. 289 Ulrich Hodapp: Von der Raumordnung zur Umweltordnung Abbildung 2 Ökologischer Nutzbarkeitsrahmen IST -Zustand 1 Planerische Aufgabe 1 1 1 Ökologische Zielsetzung Funktionsunfähigkeit der Techno-Ökosysteme Funktionsfähigkeit der Landschaft 1 1 1 Funktionsfähigkeit der Bio -Ökosysteme Funktionsfähigkeit der Techno -Ökosysteme Bestehende Nutzungsansprüche 1 Empfindlichkeit und ökologische Anforderungen von Bio- Ökosystemen Umweltmedien Umweltmedien Luft/ Klima Boden Wasser Flora/ Fauna Luft/ Klima Boden Wasser Flora/ Fauna Diskrepanz SOLL/IST Beeinträchtigungen ökologische Nutzungspotentiale ökologische Nutzungspotentiale Überschreitungen des Nutzungsrahmens - ökologischer Nutzungsrahmen ~ Kollisionen / Konkurrenzen Stoff- und Energieeintrag; Ver- und Gebrauch von Potentialen 1 anthropogen-technische Umweltentlastungspotentiale anthropogene Nutzungsmöglichkeiten Alternativ-, Reduktions- und Sparpotentiale 1 ökologischer Potentialnutzungskonzept Bewirtschaftungskonzepte für Luft/ Klima, Boden, Wasser, Flora/ Fauna Nutzbarkeitsrahmen Maßnahmen zur stufenweisen Umsetzung 1 290 1 RuR4/5.1994 Ulrich Hodapp: Von der Raumordnung zur Umweltordnung 2.2.3 Das Konzept einer "naturnahen Kulturlandschaft" Abbildung3 Naturnahe Kulturlandschaft Funktionsfähiger Ökosystemkomplex naturnahe Kulturlandschaft stofflich-energetische und biotische Stabilität 1 1 funktionsfähige Bio - Ökosysteme 1 1 1 H 1 1 1 1 funktionsfähige urban-industrielle Ökosysteme 1 1 1 Agrarökosysteme Waldökosysteme 1 1 1 1 urban-industrielle Ökosysteme 1 1 umweltverträglich bewirtschaftete Ökosysteme umweltverträglich bewirtschaftete Ökosysteme umweltverträglich bewirtschaftete Ökosysteme 1 1 1 naturnahe Ökosysteme naturnahe Ökosysteme naturnahe Ökosysteme I· 1 1 1 natürliche Ökosysteme 1 natürliche Ökosysteme natürliche Ökosysteme 1 1 1 1 1 1 1 1 ökologischer Potentialnutzungskonzept 1 1 Nutzbarkeitsrahmen Der hier verwendete Begriff der "naturnahen Kulturlandschaft" definiert ein ökologisch verträgliches Landnutzungskonzept. Dessen zentrale Inhalte liegen in einer Veränderung der Flächenverhältnisse zugunsten natürlicher/ naturnaher und zu Lasten anthropogener Ökosysteme (biotische Stabilität), in einer Orientierung von direkten menschlichen Bewirtschaftungsweisen an ökosystemaren Funktionsund Regelungsmechanismen natürlicher Ökosysteme im Sinne einer umweltverträglichen Bewirtschaftung (stofflich-energetische Stabilität) und damit in dem kleinräumigen Nebeneinander von natürlichen, naturnahen und umweltverträglich bewirtschafteten Ökosystemen sowie dem Aus- RuR4/5.1994 schluß von Beeinträchtigungen durch indirekte anthropogene Einflüsse aus den urban-industriellen Ökosystemen (Einhalten des Potentialnutzungsrahmens). 2.3 Konsequenzen für die Planungsinstrumente/Planungselemente 2.3.J Verändertes Raum-, Umweltund Planungsverständnis Der Raum ist in Zukunft als ein zusammenhängendes, komplexes ökosystemares Gefüge zu verstehen. Die sektorale und m_ediale Trennung in einzelne Umweltmedien ist zugunsten einer integrierten Betrachtung dieser Umweltmedien als Bestandteile einzelner Öko- systeme zu überwinden. Dabei müssen die stofflich-energetischen und biotischen Komponenten gleichermaßen und parallel Berücksichtigung finden. Die Berücksichtigung der stofflichenergetischen Komponente wird in einer zukünftigen Raum- und Umweltplanung eine zentrale Bedeutung erlangen. Ohne eine Bilanzierung der Stoffund Energieflüsse der Techno-Ökosysteme und ihre Einbindung in eine Gesamtbilanzierung ist weder eine verursacherbezogene Planung noch eine Wiederherstellung der Funktionsfähigkeit der Landschaften möglich. Das Verständnis der Umwelt als ein dynamisches, sich ständig veränderndes System bedingt die Erkenntnis, daß Planung nur noch als ein sich dauernd ver- 291 Ulrich Hodapp: Von der Raumordnung zur Umweltordnung ändernder Prozeß aufgefaßt werden kann, bei dem einer Berücksichtigung der zeitlichen Komponente eine entscheidende Bedeutung zukommt. 2.3.2 ökologische Leitbilder In der gegenwärtigen Planung ist das Fehlen von konkreten und positiven ökologischen Leitbildern augenscheinlich ein gravierendes Defizit. Die gegenwärtige Planung hat die Funktion eines defensiven Reparaturbetriebs und bestimmt höchstens die ökologischen Rückzugslinien und Mindeststandards. Die Funktion positiver ökologischer Leitbilder kann folgendermaßen beschrieben werden: ökologische Leitbilder haben die Aufgabe, auf den unterschiedlichen Planungsebenen Aussagen zu treffen, wie die jeweiligen Planungsräume ökologisch "optimal" bzw. im Sinne der Funktionsfähigkeit der Öksysternkomplexe "normal" aussehen sollen. 2.3.3 Umweltqualitätsziele Die beschriebenen neuen und erweiterten Aufgaben und Zielsetzungen führen zu völlig veränderten Anforderungen an die qualitativen und quantitativen Aussagen von Planelementen. Neben einer neuen Form räumlicher Ausweisungen kommt vor allem Umweltqualitätszielen als neuer Form qualitativer Planelemente eine entscheidende Bedeutung zu. Für die verschiedenen Planungsschritte und Planungsebenen sind Umweltqualitätsziele unterschiedlichen Konkretheitsgrads zu entwickeln und einzusetzen. An dieser Stelle können inhaltliche Aspekte solcher Planelemente nur grob umrissen werden. Nachfolgend sind beispielhaft einige als notwendig erachtete Bereiche für die Festlegung von Umweltqualitätszielen benannt: Stofjl,ich-energetische Umweltqualitätsziele: Leit- und Zielwerte - zur Bestimmung der Empfindlichkeit einzelner Ökosysteme, - zur Reduktion/Begrenzung von regionalen Stoffumsätzen, - zur Begrenzung von Teil- bzw. Gesamtemissionen, - zur Festlegung des ökologischen Nutzbarkeitsrahmens, - zur Nutzungsintensität von Umweltentlastungspotentialen Biotische Umweltqualitätsziele: Leitund Zielwerte - zur Bestimmung von Arten und Biotopqualitäten, - zur Flächenaufteilung in Ökosystemtypen und zur Festlegung des Flächenbedarfs einzelner Ökosysteme, Vernetzungserfordernisse, - für ökologische Ausstattungsmerkmale der Landschaftsstruktur, - für Extensivierungskonzepte in Agrarökosystemen 2.3.4 Raumbezagene Planelemente Räumliche Ausweisungen auf der Konzept- und Maßnahmenebene sind untrennbar mit auf diese Ausweisungen bezogenen, konkreten qualitativen Festsetzungen bzw. Handlungsanweisungen verbunden. Insoweit haben diese Planelemente die Aussagen von Umweltqualitätszielen räumlich zu verorten. Dabei besteht auch die Notwendigkeit, für die Landschaft als Gan- zes Planelemente festzusetzen. Auf der Ebene eines Maßnahmenplans erscheinen Planelemente, die ein Verschlechterungsverbot bzw. ein ökologisches Verbesserungsgebot der Umweltqualität bzw. einzelner Teilqualitäten festschreiben, zwingend notwendig. Die Grundstruktur zukünftiger räumlicher Ausweisungen eines Konzeptbzw. Maßnahmenplans wird an einem Agrarökosystem beispielhaft dargestellt (vgl. Übersicht 2). 2.3.5 Umweltordnung statt Raumordnung Das Abstecken des ökologisch verträglichen Nutzbarkeitsrahmens der Landschaft bedingt die Erkenntnis in den Vorrang ökologischer Belange vor wirtschaftlichen und gesellschaftlichen Belangen. Eine Gleichrangigkeit der Belange ist nur innerhalb dieses Nutzbarkeitsrahmens möglich. Wird von dieser Erkenntnis ausgegangen, ergibt sich in konsequenter Anwendung, daß festgesetzte Umweltqualitätsziele zur Definition der Funktionsfähigkeit einzelner Ökosysteme sowie der Landschaft insgesamt nicht mehr mit anderen Belangen abwägbar sind. Dies bedingt die Notwendigkeit, daß eine zukünftige Umweltleitplanung - ausgehend vom bestehenden Planungssystem - die Stellung der Raumordnung einnimmt. Dies ist zu verstehen im Sinne einer "Umweltordnung", die verbindliche ökologische Rahmenziele setzt. Damit ist die Frage nach der zukünftigen Stellung und den Aufgaben einer Raumordnung (z.B . Abwägung aller Belange innerhalb des ökologischen Nutzbarkeitsrahmens) zu stellen. Übersicht 2 Konzeptplan Planelement Agrarökosystem mit der ökologischen Hauptfunktion "Landschaftspflege" Ökosystemqualitäten Anteile natürlicher/naturnaher Ökosysteme 35 %; folgende Biotoptypen sollen vorhanden sein: ... ; Anteile an Sukzessionsflächen 7,5 %; Minderung der Bewirtschaftsintensität um 25 % Maßnahmenplan Planelement agrarwirtschaftliches Maßnahmengebiet "Landschaftspflege" Maßnahmen höchste Priorität für die Durchführung eines Extensivierungsprogramms; Flächenstillegung innerhalb von 5 Jahren 20 %; ökologischer Maßnahmenschwerpunkt: Wiederherstellung natürlicher Grundwasserverhältnisse und der entsprechenden natürlichen Lebensräume 292 RuR 4/5.1994 Ulrich Hodapp: Von der Raumordnung zur Umweltordnung Diese Forderung nach einer "Umweltordnung" zieht, neben ihrer tiefgreifenden gesellschaftspolitischen Bedeutung, weitreichende umwelt- und planungsrechtliche Konsequenzen nach sich und ist mit den derzeitigen Rechtsund Verwaltungsstrukturen nicht vereinbar. Die entscheidende Frage bei der Installierung einer Umweltordnung wird sein, welche Institution mit welcher gesellschaftspolitischen und rechtlichen Legitimation in welchem Verfahren die verbindlichen Ziele festlegt. 2.4 Methodischer Konzeptansatz seits getrennt und andererseits im Gesamtzusammenhang des Ökosystemkomplexes zu betrachten. Ausgehend von der Zielsetzung der Funktionsfähigkeit des planerisch abzugrenzenden Ökosystemkomplexes (Landschaft) und der Funktionsfähigkeit der einzelnen, darin enthaltenen Ökosystemtypen, erfolgt im Rahmen der Analyse und Bewertung der Umweltsituation eine planerische Unterscheidung der Ökosystemtypen: - Natürliche/naturnahe Ökosysteme, - Waldökosysteme, - Agrarökosysteme, - Urban-industrielle Ökosysteme, 2.4.1 Gesamtkonzept - Ökosystemkomplex. Im Rahmen eines Gesamtkonzepts stellt sich während der einzelnen Planungsschritte vor allem die Aufgabe, die einzelnen Ökosystemtypen einer- Ausgehend von dieser Analyse und Bewertung wird für den gesamten Ökosystemkomplex durch die Festlegung von "allgemeinen" Umweltqualitätszielen ein Leitbild formuliert, welches durch die Aufstellung von einzelnen Leitbildern für die Wald-, Agrar- und Urbanindustriellen Ökosysteme seine Ausformung erfährt. Ab diesem Planungsschritt werden die natürlichen/naturnahen Ökosysteme nicht mehr als eigenständige Kategorie betrachtet, sondern als integraler Bestandteil der Wald-, Agrar- und urbanindustriellen Ökosysteme, da diese zukünftig aus dem kleinräumigen Nebeneinander von natürlichen, naturnahen und um~eltverträglich wirtschaftenden Ökosystemen gebildet werden. Die räumliche Verortung und die Konkretisierung der Umweltqualitätsziele erfolgt im Rahmen eines Konzeptplanes, der den SOLL-Zustand im Sinne eines funktionsfähigen Ökosystemkomplexes darstellt. Dem Erreichen dieses SOLL-Zustands dient die Erstellung eines Maßnahmensplans. Abbildung4 Methodischer Konzeptansatz einer ökosystembezogenen Umweltleitplanung Analyse, Bewertung Ökosystemkomplex natürliche / naturnahe Ökosysteme Waldökosysteme Agrarökosysteme urban-industrielle Ökosysteme 1 1 Leitbild Ökosystemkomplex Waldkökosystem urban-industrielles Ökosystem Agrarökosystem 1 1 natürliche, naturnahe, umweltverträglich wirtschaftende Ökosysteme 1 1 Konzeptplan Maßnahmen plan RuR4/5 .l994 293 Ulrich Hodapp: Von der Raumordnung zur Umweltordnung Abbildung 5 Methodisches Ablaufschema einer ökosystembezogenen Umweltleitplanung Zielsetzung Funktionsfähigkeit der Landschaft ökosystemare Erkenntnisse 1 Zielsetzung Funktionsfähigkeit der einzelnen Ökosystemtypen 1 1 - 1 1 Ökosystemmodell Waldökosysteme natürliche / naturnahe Ökosysteme Agrarökosysteme urban-industrielle Ökosysteme ÖSIS-Agrar ÖSIS-Urban 1 ÖSIS-Natur ÖSIS-Wald Stoffbilanzen Energiebilanzen Biozönesebilanzen Funktionsbilanzen WAR - Situation IST - Situation KANN - Situation Potential - Situation ö s Ökosystem als Ursache von Beeinträchtigungen - anderer Ökosysteme - des eigenen Ökosystems I - s u - Beeinträchtigungen des Ökosystems durch andere Ökosysteme 1 Wechselwirkungen : 1 M w E L T Analyse stofflich - energetisch biotisch Trendszenario 1 ~ Bewertung Funktionen in der Landschaft H ökosystemarer Bedarf Leitbild Leitbild SOLL-Werte ökologischer Nutzbarkeitsrahmen KONZEPTPLAN KONZEPTPLAN Potentialnutzungskonzept stofflich-energetischer und biotischer SOLL- Zustand MASSNAHMENPLAN MASSNAHMENPLAN Maßnahmenziele, -räume und Vorgaben zeitliche und fachliche Prioritäten 1 - Maßnahmen der Fachbehörden - Maßnahmenplanungen der Fachplanungen ERFOLGS KONTROLLE 294 RuR 4/5.1994 Ulrich Hodapp: Von der Raumordnung zur Umweltordnung 2.4.2 Methodisches Ablaufschema Das in Abbildung 5 dargestellte Ablaufschema basiert im wesentlichen auf dem Ansatz eines Ökosystemmodells. Dessen unverzichtbare Grundlage bildet das Bestehen eines EDV-gestützten "ökosystemaren Informationssystems Umwelt" (ÖSIS-Umwelt) mit den Teilkomponenten ÖSIS-Natur, ÖSISWald, ÖSIS-Agrar und ÖSIS-Urbanindustriell. Gleichermaßen unverzichtbar erscheint die Einbeziehung von entscheidungsunterstützenden Systemen bzw. Expertensystemen auf der Ebene der bewertenden und planenden Teilschritte. Die wesentlichen inhaltlichen Komponenten des Ökosystemmodells sind die Stoff-, Energie-, Biozönose- und Funktionsbilanzen. Stoff- und Energiebilanzen dienen der Erfassung des stofflichenergetischen Zustandes und damit von fehlgesteuerten Stoff- und Energieflüssen, vor allem urban-industrieller Ökosysteme (Verursacherseite) sowie deren Auswirkungen auf die BioÖkosysteme (Wirkungsseite). Im Rahmen der Biozönosebilanzen sind die mit dem Begriff der "biotischen Stabilität" zu beschreibenden Aspekte zu erfassen (z.B . Artenzusammenstellung, Artenvielfalt) und im Rahmen von Funktionsbilanzen die von den Ökosystemen erbrachten ökologischen Funktionen im Ökosystemkomplex. In bezug auf diese inhaltlichen Komponenten bestehen derzeit unbestreitbar vielfältige inhaltliche und methodische Defizite und Probleme, und es steht derzeit kein ausgereifter, planungspraktisch anwendbarer Ansatz zur Verfügung. Zur Erfassung der notwendigen Datengrundlagen ist von der Berücksichtigung einer WAR-, der IST- und der KANN-Situation auszugehen. Die WAR-Situation ist zu verstehen im Sinne einer historischen Vergleichssituation, bei der, insgesamt bzw. hinsichtlich der zu vergleichenden Teilaspekte, von einer Funktionsfähigkeit des Ökosystemkomplexes ausgegangen werden kann. Aus der Diskrepanz zwischen WAR- und IST-Situation lassen sich die ökologischen Verluste und RuR 4/5.1994 Defizite ermitteln (und ggf. durch eine Risikoprognose fortschreiben). Die WAR-Situation liefert gleichzeitig quantitative und qualitative Grundlagendaten für die Bestimmung der SOLL-Werte auf der Leitbildebene. Unter der KANN-Situation sind die quantitativen und qualitativen Entwicklungsmöglichkeiten der Ökosysteme zu verstehen. Durch die Verknüpfung der so erhaltenen Daten einzelner Ökosysteme zu einem Ganzen lassen sich vielfältige Ursache-Wirkungsbeziehungen nicht nur innerhalb einzelner Ökosysteme (Ökosystem als Ursache von Beeinträchtigungen des eigenen Ökosystems), sondern auch zwischen Ökosystemen innerhalb des untersuchten Ökosystemkomplexes und zwischen Ökosystemkomplexen (Beeinträchtigung eines Ökosystems durch andere Ökosysteme) abbilden. Die Zusammenführung der einzelnen Komponenten mündet in der Bewertung der IST/ KANN-Situation einschließlich der IST/KANN-Potentialnutzung. Die Darstellung von Trendszenarien dient einerseits der Risikoabschätzung und stellt andererseits ein wesentliches Element einer möglichen Öffentlichkeitsbeteiligung bzw. Öffentlichkeitsinformation dar. Dies ist notwendig, um den für eine Durchsetzung der ökologischen Zielsetzungen notwendigen breiten gesellschaftlichen Konsens herzustellen. Auf der Leitbildebene werden im wesentlichen die zukünftigen ökologischen Funktionen des Ökosystemkomplexes und der einzelnen Ökosysteme bestimmt und die Funktionsfähigkeit durch Umweltqualitätsziele im Sinne von SOLL-Werten (insbesondere des ökologischen Nutzbarkeitsrahmens) festgelegt. Über die Bewertung von Alternativen erfolgt die Erstellung eines Konzeptplans, der den räumlich verorteten und mit konkreten inhaltlichen Qualitätsangaben ausgefüllten funktionsfähigen SOLL-Zustand darstellt. Die Maßnahmen zum Erreichen dieses SOLL-Zustands sind in einem gesonderten Maßnahmenplan auszuweisen. Durch seine Funktion als "LEIT"-Plan stellt er nicht die vielen Einzelmaßnahmen dar, sondern beschränkt sich darauf, wichtige Maß- nahmengebiete, die darin nötigen wichtigen Maßnahmenziele und die sachlichen und zeitlichen Prioritäten festzulegen. Damit gibt der Maßnahmenplan vor allem Vorgaben an die einzelnen (Fach-)Behörden, denen die Um- und Durchsetzung der Maßnahmen obliegt. 2.5 Ansätze für planerische Umsetzungsmöglichkeiten 2.5.1 Die Bestimmung des ökologischen Nutzbarkeitsrahmens von Grundwasserpotentialen Auf der Grundlage des methodischen Ansatzes zur Bestimmung des ökologischen Nutzbarkeitsrahmens von Potentialen stellt Abbildung 6 eine planerische Umsetzungsmöglichkeit für die Bestimmung von Grundwasserpotentialen dar. Die zentralen Elemente sind dabei die dynamische landschaftsökologische Risikoanalyse und die dynamische Bewertung der qualitativen Eignung. Die dynamische landschaftsökologische Risikoanalyse bezieht nicht nur die Empfindlichkeit der bestehenden Ökosysteme gegen Grundwasserentnahmen ein, sondern berücksichtigt auch die zukünftigen Anforderungen von Ökosystemen im Hinblick auf den angestrebten funktionsfähigen SOLLZustand. So kann die Zielsetzung der Wiederherstellung natürlicher Grundwasserverhältnisse derzeitige Nutzungspotentiale zukünftig von einer Grundwasserentnahme ausschließen. Veränderungen der Grundwassereignungen aufgrund der zeitlichen Dynamik werden planerisch bisher kaum berücksichtigt. Derzeit bestehende qualitative Beeinträchtigungen führen zu einem Ausscheiden dieser Gebiete bzw. Potentiale aus den planerischen Überlegungen. Dies betrifft sowohl Beeinträchtigungen aufgrund atmogenen Stoffeintrags (Versauerung) als auch Beeinträchtigungen aus der landwirtschaftlichen (z.B. Nitrate) und industriellen Nutzung (z.B. Schwermetalle). Eine Beseitigung solcher Beeinträchtigungen ist derzeit noch kein planerisches Ziel. 295 Ulrich Hodapp: Von der Raumordnung zur Umweltordnung Abbildung 6 Vorgehensweise zur Bestimmung von Grundwasserpotentialen Funktionsfiihigkeit der Landschaft 1 IST-Situation natürliche Eignung SOLL-Situation Leitbild / Konzept 1 1 des Grundwassers (Quantität/Qualität) zur Trink- und Brauchwassemutzung 1 landschaftsökologlsche Risikoanalyse Empfindlichkeit der Ökosysteme gegenüber bestehenden und zukünftigen Wasserentnahmen SOLL-Situation IST-Situation 1 Negativräume 1 Positivräume 1 ~ 1 Negativräume 1 1 1 ökologisch geeignete Gebiete zur Entnahme 1 1 bestehende qualitative Beeinträchtigung derzeit qualitativ bestehende Eignung 1 1 atmogener Stoffeintrag unmittelbare Raumnutzung Sanierungsmodelle Risikoanalyse 1 1 1 1 Negativräume 1 Negativräume 1 1 1 Positivräume 1 zukünftig ökologisch und qualitativ geeignete Gebiete und Mengen für eine Grundwasserentnahme 1 ökologischer Potentialnutzungskonzept bestehende Nachfrage Spar- und Reduktionspotentiale J Nutzbarkeitsrahmen 1 Maßnahmen 1 1 • Verbrauchreduzierung Änderung Entnehmeorte und -mengen • Sanierung durch Nutzungsänderung • 296 RuR4/5.1994 Ulrich Hodapp: Von der Raumordnung zur Umweltordnung Der in dieser Arbeit entwickelte ökosystemare Planungsansatz ist verursacherbezogen und sieht damit eine wesentliche Zielsetzung in der Beseitigung von Beeinträchtigungen. Dadurch werden derzeit ungeeignete Potentiale langfristig wieder geeignet. So kann die Schaffung natürlicher/naturnaher Ökosysteme zu einer Extensivierung bzw. Einstellung der landwirtschaftlichen Produktion führen , wodurch langfristig eine "Sanierung" des Grundwassers möglich ist. Diese zeitliche Dynamik wird durch die Einbeziehung von Sanierungsmodellen in die Eignungsbewertung berücksichtigt. 2.5.2 Methodisches Vorgehen zur Einbeziehung der Waldschadensproblematik Für die in dieser Arbeit konzipierte Umweltleitplanung muß der Anspruch formuliert werden, den Problembereich der Waldschäden planerisch anzugehen. Dazu ist die Erstellung eines Waldökosystemmodells notwendig, in welchem die wesentlichen relevanten Ökosystemkomponenten, Biozönosebilanzen, Stoffhaushalts- und Energiehaushaltsbilanzen sowie Funktionsbilanzen im Landschaftshaushalt zusammengeführt werden. Die Grundlage bildet dabei das von ULRJCH (2) im Rahmen eines "forstwirtschaftlichen Informationssystems" entwickelte Konzept von Stoffhaushaltsbilanzen (vgl. Abb. 7). Die im Rahmen eines solchen Ökosystemmodells zur Verfügung stehenden Daten scheinen geeignet, detailliertere Erkenntnisse über den Ursachenkomplex von Waldschäden zu gewinnen und gleichzeitig verursacherbezogene planerische Handlungsmög- Abbildung7 Differenzierung eines Waldökosystemmodells lichkeiten aufzuzeigen. Abbildung 8 stellt in groben Zügen einen Ansatz dar, wie eine planerische Umsetzbarkeit aussehen könnte. Auf der Analyseebene stellt sich die Notwendigkeit der Bildung von Raumkategorien zur Beschreibung des Grads der Funktions(un)fähigkeit sowie die Benennung der wesentlichen Ursachefaktoren. Auf der Ebene des Leitbilds und des Konzeptplans müssen die, auf der Grundlage eines Modellszenarios, ermittelten und die Funktionsfähigkeit beschreibenden Immissionsleitwerte dargestellt werden. Diese stellen gleichzeitig die Voraussetzung dar, um über Modellrechnungen den ökologischen Nutzbarkeitsrahmen im Sinne einer Luftbewirtschaftung festzulegen . Ök\)systemmodell faunistische Typen Biozönose~pen L c._________.1 IST WAR floristische Typen Waldschadenstypen Beeinträchtigungstypen faunistische Modelle IST Biozönosebilanzen >- KANN SOLL floristische Modelle Waldschadensmodelle Beeinträchtigungsmodelle Wasserhaushaltstypen IST WAR Stoffhaushaltstypen Energiehaushalt Stoffeintragstypen Bodenzustandstypen Stoffaustragstypen Wachstumsmodelle Nährstofmodelle IST Stoff- und Energiebilanzen KANN SOLL Niederschlags- und Depositionsmodelle Wasserhaushaltsmodelle Stoffaustragsmodelle ökophysiolog. Parameter Funktionsbilanzen im Landschaftshaushalt '-- RuR4/5 .1994 Funktionstypen IST WAR Landschaftshaushalt KANN SOLL Landschaftshaushalt Funktionstypen 297 Ulrich Hodapp: Von der Raumordnung zur Umweltordnung Abbildung8 Methodisches Vorgehen zur Einbeziehung der Waldschadensproblematik ÖSIS-Wald wesentliche Ökosystemkomponenten 1 / • Wasserhaushaltstypen • Stoffeintragstypen • Bodenzustandstypen • Waldschadenstypen • Bestandswachstumsmodelle • Depositionsmodelle • Wasserhaushaltsmodelle Modell • faunistisches • floristisches Modell • ökophysiologische Parameter 1 Bewertung Ist-Situation - Trendszenario Risikoanalyse >-- ökologischer Bedarf 1 Modellszenario Funktionsfähigkeit 1 Planelemente funktionsfähige Räume Risikoräume akute Gefährdungsräume Verlusträume Planelemente funktionsfähige Räume Risikoräume akute Gefährdungsräume Verlusträume Leitbild Immissionsleitwerte Modellrechnungen Ursache-Wirkung 1 ökologischer Nutzbarkeitsrahmen Luftbewirtschaftung 1 Konzeptplan Maßnahmenkonzept 1 Planelemente räumlich konkretisierte Immissionsleitwerte Planelemente Maßnahmengebiet "stoffliche Sanierung"; mit den Sanierungszielen, zeitlichen Zielen, Prioritäten Flächen zur Heraus• nahme aus der Bewirtschaftung zur • Maßnahmen Luftbewirtschaftung 298 RuR4/5 .1994 Ulrich Hodapp: Von der Raumordnung zur Umweltordnung Anmerkungen *) Dieser Beitrag ist die vom Autor überarbeitete Version eines durch den Förderkreis für Raum- und Umweltforschung - Vereinigung von Freunden der Akademie für Raumforschung und Landesplanung e.V. (FRU) ausgezeichneten Beitrags, einer kurzen Darstellung wichtiger Teilergebnisse einer Diplomarbeit an der Universität Kaiserslautern mit dem Titel "Beitrag zur Diskussion um eine Umweltleitplanung - Ansätze für eine Binnendifferenzierung nach ökosytemaren Gesichtspunkten", vorgelegt im Juni 1992 am Fachgebiet Siedlungswasserwirtschaft bei Herrn Prof. Dr.-Ing. JACOBITZ unter Betreuung von Herrn Dr.-Ing. BURDE. (1) HOFMEISTER, S.; HOBLER. H.-H.: Stoff- und Energiebilanzen als Instrument der räumlichen Planung. Hrsg.: Akademie für Raumforschung und Landesplanung. - Hannover 1990. = Beiträge 118, S. 14 (2) ULRICH, B.: Grundzüge eines Forstökologischen Informationssytems FIS-Ö. - Göttingen 1991. = Schreiben an die Forstbehörden Dipl.-Ing. Ulrich Hodapp Mozartstraße 37 67 655 Kaiserslautern RuR4/5.1994 299
https://openalex.org/W1967795498
https://europepmc.org/articles/pmc4254922?pdf=render
English
null
The Myocardial Ischemia Evaluated by Real-Time Contrast Echocardiography May Predict the Response to Cardiac Resynchronization Therapy: A Large Animal Study
PloS one
2,014
cc-by
6,162
RESEARCH ARTICLE Yongle Chen, Leilei Cheng*, Haohua Yao, Haiyan Chen, Yongshi Wang, Weipeng Zhao, Cuizhen Pan, Xianhong Shu* Department of Echocardiography, Zhongshan Hospital, Fudan University, Shanghai Institute of Cardiovascular Diseases, Shanghai Institute of Medical Imaging, Shanghai, PR China *shu.xianhong@zs-hospital.sh.cn (XS); cheng.leilei@zs-hospital.sh.cn (LC) *shu.xianhong@zs-hospital.sh.cn (XS); cheng.leilei@zs-hospital.sh.cn (LC) The Myocardial Ischemia Evaluated by Real-Time Contrast Echocardiography May Predict the Response to Cardiac Resynchronization Therapy: A Large Animal Study Yongle Chen, Leilei Cheng*, Haohua Yao, Haiyan Chen, Yongshi Wang, Weipeng Zhao, Cuizhen Pan, Xianhong Shu* Echocardiography and CRT compared with the control group after 4 weeks of pacing (49.8¡15.5 dB/s vs. compared with the control group after 4 weeks of pacing (49.8¡15.5 dB/s vs. 28.5¡4.6 dB/s, p,0.05). Therefore, we considered that myocardial perfusion may be superior to standard metrics of LV synchrony in selecting appropriate candidates for CRT. In addition, CRT can improve myocardial perfusion in addition to cardiac synchrony, especially in the setting of ischemic cardiomyopathy. 28.5¡4.6 dB/s, p,0.05). Therefore, we considered that myocardial perfusion may be superior to standard metrics of LV synchrony in selecting appropriate candidates for CRT. In addition, CRT can improve myocardial perfusion in addition to cardiac synchrony, especially in the setting of ischemic cardiomyopathy. Introduction Heart failure, a complex clinical syndrome that encompasses a host of abnormalities in cardiac structure and function, is a major public health epidemic that accounts for a high degree of mortality and morbidity worldwide [1]. Beyond routine oral medication, cardiac resynchronization therapy (CRT) is a viable treatment strategy for patients with refractory heart failure [2]. CRT by means of bi-ventricular pacing can support ventricular contraction, increase cardiac output, relieve heart failure symptoms, improve quality of life of patients, and reduce their overall mortality. Despite these highly encouraging effects, the overall efficacy of CRT is hampered by the fact that approximately 30% of patients who are administered the therapy do not benefit from bi-ventricular pacing and in some cases may exhibit worsening of their heart failure symptoms [3–5]. Although ischemic cardiomyopathy is clearly one of the most common heart failure etiologies, evidence-based criteria for applying CRT in patients with ischemic cardiomyopathy are still scarce. Two-dimensional speckle tracking imaging (2D-STI) is a novel technique for evaluating cardiac motion after CRT [6]. Real-time myocardial contrast echocardiography (RT-MCE) has been used in vivo for decades to quantitatively assess myocardial perfusion by calculating myocardial blood flow (MBF). Accordingly, the aim of the present animal study was twofold: (1) to validate that changes in myocardial perfusion may be key factors in predicting the outcome of CRT in the setting of ischemic cardiomyopathy and (2) to explore that CRT can improve myocardial perfusion in this common disease etiology. OPEN ACCESS Evidence-based criteria for applying cardiac resynchronization therapy (CRT) in patients with ischemic cardiomyopathy are still scarce. The aim of the present study was to evaluate the predictive value of real-time myocardial contrast echocardiography (RT-MCE) in a preclinical canine model of ischemic cardiomyopathy who received CRT. Ischemic cardiomyopathy was produced by ligating the first diagonal branch in 20 beagles. Dogs were subsequently divided into two groups that were either treated with bi-ventricular pacing (CRT group) or left untreated (control group). RT-MCE was performed at baseline, before CRT, and 4 weeks after CRT. Two-dimensional speckle tracking imaging was used to evaluate the standard deviation of circumferential (Cir12SD), radial (R12SD), and longitudinal (L12SD) strains of left ventricular segments at basal as well as middle levels. Four weeks later, the Cir12SD, R12SD, and myocardial blood flow (MBF) of the treated group were significantly improved compared to their non-CRT counterparts. Furthermore, MBF values measured before CRT were significantly higher in responders than in non-responders to bi-ventricular pacing. Meanwhile, no significant differences were observed between the responder and non- responder groups in terms of Cir12SD, R12SD, and L12SD. A high degree of correlation was found between MBF values before CRTand LVEF after CRT. When MBF value.24.9 dB/s was defined as a cut-off point before CRT, the sensitivity and specificity of RT-MCE in predicting the response to CRT were 83.3% and 100%, respectively. Besides, MBF values increased significantly in the CRT group Citation: Chen Y, Cheng L, Yao H, Chen H, Wang Y, et al. (2014) The Myocardial Ischemia Evaluated by Real-Time Contrast Echocardiography May Predict the Response to Cardiac Resynchronization Therapy: A Large Animal Study. PLoS ONE 9(12): e113992. doi:10.1371/ journal.pone.0113992 Copyright:  2014 Chen et al. This is an open- access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and repro- duction in any medium, provided the original author and source are credited. Data Availability: The authors confirm that all data underlying the findings are fully available without restriction. All relevant data are within the paper. Funding: The work was supported by Chinese National Scientific Fund (No. 81371576 and No. 81201095) http://www.nsfc.gov.cn/. The funder had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. Competing Interests: The authors have declared that no competing interests exist. 1 / 12 PLOS ONE | DOI:10.1371/journal.pone.0113992 December 3, 2014 Echocardiography and CRT branch, resulting in myocardial infarction (MI). An epicardial lead (CAPSURE EPI 4965, Medtronic, USA) was sutured to the surface of the marginal area of the MI. All beagles were followed for 2 weeks to document the presence and severity of heart failure after the MI procedure. Right atrial (MEMBRANE EX 1474K, Medtronic, USA) and ventricular leads (CAPSURE SENSE 4074, Medtronic, USA) were subsequently implanted along with the pacemaker unit (INSYNC III 8042, Medtronic, USA); meanwhile, the epicardial lead was connected to the pacemaker. Pacing was initiated in the CRT group only. After 4 weeks of pacing, animals receiving CRT were further divided into two subgroups on the basis of their response to CRT. The left ventricular ejection fraction (LVEF) of dogs in the control group was spontaneously improved after MI and peaked at 45% by 4 weeks after the intervention. Thus, LVEF >45% was considered a positive response to CRT after 4 weeks of resynchronization therapy in the CRT group. Animals in CRT group were then classified as ‘‘responders’’ or ‘‘non-responders’’ to the bi-ventricular treatment depending on their hemodynamic function after 4 weeks. branch, resulting in myocardial infarction (MI). An epicardial lead (CAPSURE EPI 4965, Medtronic, USA) was sutured to the surface of the marginal area of the MI. All beagles were followed for 2 weeks to document the presence and severity of heart failure after the MI procedure. Right atrial (MEMBRANE EX 1474K, Medtronic, USA) and ventricular leads (CAPSURE SENSE 4074, Medtronic, USA) were subsequently implanted along with the pacemaker unit (INSYNC III 8042, Medtronic, USA); meanwhile, the epicardial lead was connected to the pacemaker. Pacing was initiated in the CRT group only. After 4 weeks of pacing, animals receiving CRT were further divided into two subgroups on the basis of their response to CRT. The left ventricular ejection fraction (LVEF) of dogs in the control group was spontaneously improved after MI and peaked at 45% by 4 weeks after the intervention. Thus, LVEF >45% was considered a positive response to CRT after 4 weeks of resynchronization therapy in the CRT group. Animals in CRT group were then classified as ‘‘responders’’ or ‘‘non-responders’’ to the bi-ventricular treatment depending on their hemodynamic function after 4 weeks. Canine model of ischemic cardiomyopathy Canine model of ischemic cardiomyopathy All protocols were approved by the Animal Care and Use Committee of Zhongshan Hospital of Fudan University. All surgery was performed under sodium pentobarbital anesthesia, and all efforts were made to minimize suffering. Totally 20 adult female beagles were divided into two groups that either underwent bi-ventricular pacing (CRT group, n510) or did not (control group, n510). All the animals were anesthetized (3% sodium pentobarbital, 30 mg/kg) and intubated. Their chests were opened allowing ligation of their first diagonal All protocols were approved by the Animal Care and Use Committee of Zhongshan Hospital of Fudan University. All surgery was performed under sodium pentobarbital anesthesia, and all efforts were made to minimize suffering. Totally 20 adult female beagles were divided into two groups that either underwent bi-ventricular pacing (CRT group, n510) or did not (control group, n510). All the animals were anesthetized (3% sodium pentobarbital, 30 mg/kg) and intubated. Their chests were opened allowing ligation of their first diagonal 2 / 12 PLOS ONE | DOI:10.1371/journal.pone.0113992 December 3, 2014 Statistical analysis All results were summarized as mean ¡ SD. The independent Student’s t test was used for comparing results of the CRT and control groups. The paired Student’s t test was used for comparing changes within each group. A Pearson correlation coefficient was used in testing the relationship between MBF and LVEF after CRT. Results were considered statistically significant for two-sided p,0.05. All data were analyzed using SPSS 16.0 software (SPSS Inc, Chicago, IL, USA). Echocardiography and CRT sequence of basal and middle views at short-axis of left ventricle were captured in disc for subsequent off-line analysis. The MBF value, a reliable measure of myocardial perfusion, was calculated from the product of the plateau video intensity (A) and the rate constant rise of the plateau video intensity (b), as previously reported [7]. Baseline characters of the canine model Two dogs of CRT group and one dog of control group died for ventricular fibrillation following the surgical procedure. All other canine successfully completed the study (CRT group, 8 dogs; control group, 9 dogs). Since the LVEF of dogs in the control group was spontaneously improved after MI and peaked at 45% by 4 weeks after the intervention, we defined LVEF >45% was a positive response to CRT for the beagles in the bi-ventricular pacing group. Then, animals in CRT group were classified as ‘‘responders’’ or ‘‘non-responders’’ depending on their hemodynamic function after 4 weeks of resynchronization treatment. Accordingly, 2 of 8 dogs in the CRT group showed no significant response to CRT and were therefore classified as non-responders, whereas the other 6 dogs exhibited significant benefits. As compared, there was no significant difference in LVEF, LVEDV, LVESV, MBF, Cir12SD, R12SD, or L12SD between the CRT and control groups at baseline and following MI (i.e., before CRT treatment; Table 1). Comparison of LVEF, LVEDV, and LVESV between the two groups after CRT Echocardiography protocol The commercially available echocardiographic systems (Philips IE 33, Philips Medical Systems Corporation, MA, USA) was used, equipped with a 1–5 MHz transducer (S5-1) and a 1–3 MHz transducer (X3-1), by two experienced cardiologists. At baseline, 2 weeks after MI (before CRT), and 4 weeks after CRT was initiated, all beagles underwent two-dimensional, three-dimensional echo- cardiography as well as RT-MCE measurements. The data were stored in DICOM format. Furthermore, all the images were analyzed using Philips Q-Lab 8.1 work station (Philips Medical Systems Corporation, MA, USA). The LVEF, left ventricular end diastolic volume (LVEDV), and left ventricular end systolic volume (LVESV) were obtained from three-dimensional images of apical four-chamber views. Left ventricular synchrony was quantified with 2D- STI, which were traced and analyzed automatically from apical 4-, 3-, and 2- chamber views (longitudinal strain), as well as the parasternal short axis views (radial and circumferential strain). The standard deviations of the time-to-peak of the transmural regional circumferential strain (Cir12SD), radial strain (R12SD), and longitudinal strain (L12SD) for 12 segments of basal as well as middle level of left ventricle were determined. For RT-MCE, the contrast agent applied was the commercially available SonoVue (Brocco, Milan, Italy). The contrast agent 59 mg SonoVue was diluted in 5 ml saline and injected via anterior auricular veins slowly (2.5 mL per 1 mL/ min). When imaging performed, the focus was initially set at two-thirds of the depth of the image and then moved at the level of myocardial segment to be examined. Mechanical index was set at 1.7 for flash images and 0.1 for real-time images. The definitive setting of the echocardiographic images was optimized after initial infusion, kept constant throughout the study, and matched at follow-up MCE study. At least 15 consecutive heart beats of every destruction-replenishment 3 / 12 PLOS ONE | DOI:10.1371/journal.pone.0113992 December 3, 2014 Echocardiography and CRT Comparison of left ventricular synchrony index between the two groups after CRT No significant differences in L12SD were observed between the groups before or after the intervention. In contrast, significant differences in Cir12SD and R12SD were found in the CRT group before and after bi-ventricular pacing (40.8 vs. 31.2 ms and 78.1 vs. 43.9 ms, respectively, all p,0.05). Furthermore, both Cir12SD and R12SD were more significantly improved in the CRT group compared to the control group (31.2 vs. 41.7 ms and 43.9 vs. 65.7 ms, respectively, all p,0.05; Table 1, Figure 1). Comparison of MBF between the two groups The MBF value in normal beagles was 73.5¡10.5 dB/s. No difference was observed between the two groups at baseline (70.2¡11.3 dB/s vs. 76.4¡9.3 dB/s, p.0.05) or at 2 weeks after MI and before CRT (25.9¡5.9 dB/s vs. 23.6¡5.7 dB/ s). However, MBF values increased significantly in the CRT group compared with the control group after 4 weeks of pacing (49.8¡15.5 dB/s vs. 28.5¡4.6 dB/s, p,0.05; Table 1). These results are consistent with CRT-mediated effect of myocardial perfusion in ischemic heart failure (Figure 2). Comparisons between responders and non-responders in the CRT group Since the LVEF of dogs in the control group was spontaneously improved after MI and peaked at 45% by 4 weeks after the intervention, we defined LVEF >45% as the cut-off point for distinguishing the responders or non-responders to CRT. Six dogs (75%) in the CRT group were found to be effectively treated by the therapy, the other 2 canine were sorted to as unsuccessful models. Obviously, LVESV and Table 1. The echocardiographic parameters of the two groups at baseline, before, and after CRT. control group (n59) CRT group (n58) Baseline Before CRT 4 w after CRT Baseline Before CRT 4 w after CRT LVEF (%) 71.9¡6.1 30.0¡3.0 39.0¡5.9 73.0¡5.9 31.9¡4.4 53.3¡12.6*{ LVEDV (ml) 26.8¡3.5 34.6¡2.7 34.0¡2.1 27.1¡3.8 35.3¡2.1 30.0¡4.1*{ LVESV (ml) 9.6¡2.6 22.0¡4.0 22.8¡4.3 9.5¡3.7 18.2¡3.8 14.3¡2.5*{ Cir12SD (ms) 19.7¡3.5 44.2¡9.7 41.7¡10.8 18.8¡3.3 40.8¡5.4 31.2¡6.9*{ R12SD (ms) 25.9¡5.0 70.3¡12.6 65.7¡9.7 29.3¡4.9 78.1¡15.1 43.9¡17.1*{ L12SD (ms) 31.3¡9.9 55.3¡18.0 55.9¡15.0 35.6¡7.6 59.4¡16.1 55.4¡9.7 MBF (dB/s) 76.4¡9.3 23.6¡5.7 28.5¡4.6 70.2¡11.3 25.9¡5.9 49.8¡15.5*{ *p,0.05 compared to that before CRT; {p,0.05 compared to control group. doi:10.1371/journal.pone.0113992.t001 Table 1. The echocardiographic parameters of the two groups at baseline, before, and after CRT. Comparison of LVEF, LVEDV, and LVESV between the two groups after CRT LVEF showed a greater significant increase in the CRT group (from 31.9% to 53.3%) than in the control group by 4 weeks after the initiation of bi-ventricular pacing in the CRT group (p,0.05). Similarly, animals in the CRT group exhibited a significantly greater reduction in LVEDV than those in the control group (p,0.05). As shown in Table 1, changes in LVESV were also consistent with greater improvement in the CRT group (p,0.05), thereby explaining the selective improvement in LVEF. 4 / 12 PLOS ONE | DOI:10.1371/journal.pone.0113992 December 3, 2014 Comparison of MBF between the two groups The MBF value in normal beagles was 73.5¡10.5 dB/s. No difference was observed between the two groups at baseline (70.2¡11.3 dB/s vs. 76.4¡9.3 dB/s, p.0.05) or at 2 weeks after MI and before CRT (25.9¡5.9 dB/s vs. 23.6¡5.7 dB/ s). However, MBF values increased significantly in the CRT group compared with the control group after 4 weeks of pacing (49.8¡15.5 dB/s vs. 28.5¡4.6 dB/s, p,0.05; Table 1). These results are consistent with CRT-mediated effect of myocardial perfusion in ischemic heart failure (Figure 2). Comparison of left ventricular synchrony index between the two groups after CRT No significant differences in L12SD were observed between the groups before or after the intervention. In contrast, significant differences in Cir12SD and R12SD were found in the CRT group before and after bi-ventricular pacing (40.8 vs. 31.2 ms and 78.1 vs. 43.9 ms, respectively, all p,0.05). Furthermore, both Cir12SD and R12SD were more significantly improved in the CRT group compared to the control group (31.2 vs. 41.7 ms and 43.9 vs. 65.7 ms, respectively, all p,0.05; Table 1, Figure 1). doi:10.1371/journal.pone.0113992.t001 Comparisons between responders and non-responders in the CRT group Since the LVEF of dogs in the control group was spontaneously improved after MI and peaked at 45% by 4 weeks after the intervention, we defined LVEF >45% as the cut-off point for distinguishing the responders or non-responders to CRT. Six dogs (75%) in the CRT group were found to be effectively treated by the therapy, the other 2 canine were sorted to as unsuccessful models. Obviously, LVESV and MBF differed significantly between the responders and non-responders before CRT (LVESV: 19.5¡3.4 ml vs. 14.4¡1.3 ml; MBF: 28.4¡4.9 dB/s vs. 5 / 12 PLOS ONE | DOI:10.1371/journal.pone.0113992 December 3, 2014 Echocardiography and CRT Figure 1. An illustration of LVEF, LVEDV, LVESV, Cir12SD, R12SD, L12SD, and MBF between control group and CRT group at 4 weeks after CRT. The LVEF, LVESV, Cir12SD, R12SD, and MBF were improved in CRT group. LVEF5left ventricular ejection fraction; LVEDV5left ventricular end diastolic volume; LVESV5left ventricular end systolic volume; Cir12SD5standard deviation of the time-to-peak of the transmural regional circumferential strain; R12SD5standard deviation of the time-to-peak of the transmural regional radial strain; L12SD5standard deviation of the time-to-peak of the transmural regional longitudinal strain; MBF5myocardial blood flow. Figure 1. An illustration of LVEF, LVEDV, LVESV, Cir12SD, R12SD, L12SD, and MBF between control group and CRT group at 4 weeks after CRT. The LVEF, LVESV, Cir12SD, R12SD, and MBF were improved in CRT group. LVEF5left ventricular ejection fraction; LVEDV5left ventricular end diastolic volume; LVESV5left ventricular end systolic volume; Cir12SD5standard deviation of the time-to-peak of the transmural regional circumferential strain; R12SD5standard deviation of the time-to-peak of the transmural regional radial strain; L12SD5standard deviation of the time-to-peak of the transmural regional longitudinal strain; MBF5myocardial blood flow. doi:10.1371/journal.pone.0113992.g001 Figure 2. An illustration of RT-MCE between the CRT and control groups. The arrows indicate the ischemic areas. The images in A and B show the improvement of myocardial perfusion before and after bi- ventricular pacing in the CRT group (MBF: 23 dB/S vs. 58 dB/s). The images in C and D show no significant improvement of myocardial perfusion in the ischemic area of the control group (MBF: 19 dB/S vs. 23 dB/s). doi:10.1371/journal.pone.0113992.g001 doi:10.1371/journal.pone.0113992.g001 Figure 2. An illustration of RT-MCE between the CRT and control groups. The arrows indicate the ischemic areas. The images in A and B show the improvement of myocardial perfusion before and after bi- ventricular pacing in the CRT group (MBF: 23 dB/S vs. 58 dB/s). Comparisons between responders and non-responders in the CRT group The images in C and D show no significant improvement of myocardial perfusion in the ischemic area of the control group (MBF: 19 dB/S vs. 23 dB/s). doi:10.1371/journal.pone.0113992.g002 6 / 12 PLOS ONE | DOI:10.1371/journal.pone.0113992 December 3, 2014 19.4¡4.3 dB/s, all p,0.05), whereas no significant differences in LVEDV, Cir12SD, R12SD, or L12SD were observed (Table 2, Figure 3). On the other hand, while the myocardial perfusion was analyzed, the correlation coefficient between MBF before CRT and LVEF in responders after 4 weeks of CRT was 0.917 (p,0.05). When MBF.24.9 dB/s was defined as a cut-off value before CRT, the sensitivity and the specificity of predicting the response to CRT were found to be 83.3% and 100%, respectively. Echocardiography and CRT 19.4¡4.3 dB/s, all p,0.05), whereas no significant differences in LVEDV, Cir12SD, R12SD, or L12SD were observed (Table 2, Figure 3). On the other hand, while the myocardial perfusion was analyzed, the correlation coefficient between MBF before CRT and LVEF in responders after 4 weeks of CRT was 0.917 (p,0.05). When MBF.24.9 dB/s was defined as a cut-off value before CRT, the sensitivity and the specificity of predicting the response to CRT were found to be 83.3% and 100%, respectively. Table 2. The echocardiographic parameters between responders and non-responders. Response group (n56) Non-response group (n52) Baseline Before CRT 4 w after CRT Baseline Before CRT 4 w after CRT LVEF (%) 71.7¡4.2 32.2¡4.8 58.8¡8.2*{ 72.0¡2.8 31.0¡4.2 36.5¡4.9 LVEDV (ml) 26.8¡4.4 34.9¡2.1 28.2¡2.9*{ 27.1¡0.5 36.7¡1.8 35.4¡0.9 LVESV (ml) 9.1¡5.3 19.5¡3.4 { 13.9¡2.6* 9.4¡2.5 14.4¡1.3 15.6¡2.4 Cir12SD (ms) 18.4¡3.8 40.8¡5.8 29.1¡6.6* 20.1¡0.6 40.6¡6.2 37.3¡3.1 R12SD (ms) 28.5¡5.3 79.9¡17.5 36.1¡10.7*{ 32.0¡3.2 72.7¡1.7 67.4¡0.1 L12SD (ms) 36.2¡7.6 56.8¡17.9 54.3¡10.8 33.8¡10.4 67.3¡7.4 58.7¡7.4 MBF (dB/s) 67.6¡12.1 28.4¡4.9 { 57.2¡8.6*{ 77.8¡4.0 19.4¡4.3 27.6¡0.4 *p,0.05 compared to that before CRT; {p,0.05 compared to non-response group. doi:10.1371/journal.pone.0113992.t002 Table 2. The echocardiographic parameters between responders and non-responders. Response group (n56) Non-response group (n52) Baseline Before CRT 4 w after CRT Baseline Before CRT 4 w after CRT LVEF (%) 71.7¡4.2 32.2¡4.8 58.8¡8.2*{ 72.0¡2.8 31.0¡4.2 36.5¡4.9 LVEDV (ml) 26.8¡4.4 34.9¡2.1 28.2¡2.9*{ 27.1¡0.5 36.7¡1.8 35.4¡0.9 LVESV (ml) 9.1¡5.3 19.5¡3.4 { 13.9¡2.6* 9.4¡2.5 14.4¡1.3 15.6¡2.4 Cir12SD (ms) 18.4¡3.8 40.8¡5.8 29.1¡6.6* 20.1¡0.6 40.6¡6.2 37.3¡3.1 R12SD (ms) 28.5¡5.3 79.9¡17.5 36.1¡10.7*{ 32.0¡3.2 72.7¡1.7 67.4¡0.1 L12SD (ms) 36.2¡7.6 56.8¡17.9 54.3¡10.8 33.8¡10.4 67.3¡7.4 58.7¡7.4 MBF (dB/s) 67.6¡12.1 28.4¡4.9 { 57.2¡8.6*{ 77.8¡4.0 19.4¡4.3 27.6¡0.4 *p,0.05 compared to that before CRT; {p,0.05 compared to non-response group. doi:10.1371/journal.pone.0113992.t002 Table 2. The echocardiographic parameters between responders and non-responders 19.4¡4.3 dB/s, all p,0.05), whereas no significant differences in LVEDV, Cir12SD, R12SD, or L12SD were observed (Table 2, Figure 3). On the other hand, while the myocardial perfusion was analyzed, the correlation coefficient between MBF before CRT and LVEF in responders after 4 weeks of CRT was 0.917 (p,0.05). When MBF.24.9 dB/s was defined as a cut-off value before CRT, the sensitivity and the specificity of predicting the response to CRT were found to be 83.3% and 100%, respectively. 19.4¡4.3 dB/s, all p,0.05), whereas no significant differences in LVEDV, Cir12SD, R12SD, or L12SD were observed (Table 2, Figure 3). PLOS ONE | DOI:10.1371/journal.pone.0113992 December 3, 2014 doi:10.1371/journal.pone.0113992.t002 Discussion Bi-ventricular pacing has been shown to improve cardiac function, and CRT is an efficient therapeutic choice for patients with heart failure [8]. Most previous studies have focused on the positioning of the pacing electrode, the optimization of the A–V delay, the QRS duration, and the evaluation of LV synchrony [9–12]. Meanwhile, effective myocardial perfusion may play an important role in this procedure. To our knowledge, this is the first large animal study which has determined the relationship between myocardial blood circulation evaluated by RT-MCE and the outcome of CRT, in addition, considered the impact of bi- ventricular pacing on myocardial perfusion. In the first place, our present finding of improved LVEDV in CRT responders after 4 weeks of bi-ventricular pacing, which is consistent with some [13] but not all previous observations [14]. Specifically, Chung et al. recently reported that chronic bi-ventricular pacing in the infarct region fails to improve LVEDV in patients after 1 year follow-up. Interestingly, the LV leads in that particular study were placed in the peri-infarct or infarct area. Indeed, pacing in this region, which is known to exhibit reduced excitability, impaired contractile function, excessive scar formation, and gap junction remodeling, may be suboptimal, potentially explaining the lack of improvement that they observed [15]. Another possible explanation for the divergent outcomes between our present study and those of Chung et al may be related to important differences in the measurements of 7 / 12 Echocardiography and CRT Figure 3. An illustration of LVEF, LVEDV, LVESV, Cir12SD, R12SD, L12SD, and MBF between response group and non-response group. The MBF was significantly improved in response group. LVEF5left ventricular ejection fraction; LVEDV5left ventricular end diastolic volume; LVESV5left ventricular end systolic volume; Cir12SD5standard deviation of the time-to-peak of the transmural regional circumferential strain; R12SD5standard deviation of the time-to-peak of the transmural regional radial strain; L12SD5standard deviation of the time-to-peak of the transmural regional longitudinal strain; MBF5myocardial blood flow. doi:10.1371/journal.pone.0113992.g003 Figure 3. An illustration of LVEF, LVEDV, LVESV, Cir12SD, R12SD, L12SD, and MBF between response group and non-response group. The MBF was significantly improved in response group. LVEF5left ventricular ejection fraction; LVEDV5left ventricular end diastolic volume; LVESV5left ventricular end systolic volume; Cir12SD5standard deviation of the time-to-peak of the transmural regional circumferential strain; R12SD5standard deviation of the time-to-peak of the transmural regional radial strain; L12SD5standard deviation of the time-to-peak of the transmural regional longitudinal strain; MBF5myocardial blood flow. doi:10.1371/journal.pone.0113992.g003 doi:10.1371/journal.pone.0113992.g003 doi:10.1371/journal.pone.0113992.g003 LVEDV. Echocardiography and CRT [21], only the first diagonal branch was affected in our present study. For all we know, there are few studies addressing the relationship between coronary artery distribution and longitudinal, circumferential, or radial strain. We do believe that further studies are needed to clarify these relationships. Thirdly, it has been widely accepted that RT-MCE is a non-invasive technique that can be performed at the bedside to assess LV function and coronary flow reserve (CFR) in patients with heart failure [22]. MCE is considered to be a powerful predictor of functional recovery after acute MI [23–24]. Recently, Anantharam et al. reported that CFR, calculated as the ratio of MBF during stress to that at rest, is a powerful predictor of mortality in patients with heart failure [22]. Moreover, previous studies indicated that CRT not only improves microcirculatory function [25–26] but also increases the left anterior descending coronary artery flow, which is associated with an improvement in regional myocardial contraction [27]. In our study, our findings are clear that MBF at baseline were highly correlated with the efficacy of bi-ventricular treatment and were consistent with CRT induced amendment on myocardial microcirculation. Therefore, as an easy and repeatable means, the evaluation of myocardial perfusion by RT-MCE may be vital to the implementation and optimization of CRT. In brief, we established an in vivo canine model of ischemic cardiomyopathy, in which we demonstrated significant improvement of MBF by CRT. We uncovered important differences in basal (pre-CRT) MBF values between responders and non-responders. The significance of MBF as a predictor of CRT outcome is further highlighted by the fact that no significant differences were observed for the other measured indices of cardiac function, including LVEF, LVEDV, Cir12SD, R12SD, and L12SD. The high degree of correlation between MBF measured before CRT and LVEF measured in the responder subgroup after 4 weeks of CRT is agreed with the notion that MBF may be mechanistically related to CRT success in ischemic cardiomyopathy. In other words, our findings indicate that assessment of myocardial perfusion may be more important than LV dyssynchrony (Cir12SD, R12SD, and L12SD) in selecting appropriate individuals for CRT. Besides, our findings may also explain the high sensitivity of MBF in detecting hibernating myocardium which has been reported by Fernandes et al. already [28], as well as Hickman et al. The latter concluded that resting MBF could distinguish hibernating myocardium from non-viable myocardium [29]. Discussion Chung and colleagues used Biplane, A4C, and A2C to determine LVEDV, whereas we relied on a robust 3D imaging approach acquired from a full volume set of apical four-chamber views which would be more accuracy. y Secondly, 2D-STI is a relatively new technique for the evaluation of prognosis for bi-ventricular pacing. The impact of CRT on longitudinal, radial, and circumferential strains has been documented in multiple studies [16–17]. However, the predictive value of these metrics remains controversial. In fact, up to the present, studies addressing the predictive value of LV synchrony in ischemic cardiomyopathy are scarce. Previously, Parsai et al found that CRT response is dictated by normalization of multiple independent mechanisms, of which LV dyssynchrony is only one. They found that long axis dyssynchrony alone failed to detect 40% of responders [18]. And, Gorcsan et al endeavored themselves to combine longitudinal and radial dyssynchrony detection to evaluate the effect of resynchronization therapy [19]. A more recent study showed that CRT resulted in a significant improvement in both LV dyssynchrony and contractile function as measured by global longitudinal strain [20]. In the present study, a significant improvement of radial dyssynchrony after CRT was observed. One potential reason for the divergent outcomes across various studies may be related to key anatomical differences in the occluded coronary arteries, which may have led to differences in the location and size of the MI. For example, whereas the left main and three vessel coronary artery disease were involved in the study by Choi et al 8 / 12 PLOS ONE | DOI:10.1371/journal.pone.0113992 December 3, 2014 Conclusions The MBF value is positively correlated with the responsiveness to CRT and, therefore, should be considered an important predictor of CRT outcome in the setting of ischemic cardiomyopathy. Meanwhile, we’re pretty sure that CRT can improve both cardiac synchrony and myocardial perfusion in this clinically relevant large animal model of ischemic cardiomyopathy. Acknowledgments We are grateful for the support of the entire staff of the echocardiography and cardiology of Zhongshan Hospital, Fudan University, Shanghai Institute of Cardiovascular Diseases and Shanghai Institute of Medical Imaging. Limitations The present study has some important limitations that require mention. First of all, we relied on a clinically relevant large animal model. Therefore, the number of subjects per group (especially the non-responder subgroup in CRT group) was by necessity limited when compared to rodent studies. In the next place, our study focused on the global dyssynchrony of the left ventricle, was not designed to uncover potentially important differences in intraventricular properties between various segments within the LV. Thirdly, despite its clinical relevance, our model of MI involved ligation of the first diagonal branch, and therefore, future studies in which the severity of MI can be modulated by ligating additional coronary arteries are warranted. Fourthly, as we mentioned, the pathophysiological process of CRT remains unclear. Varies studies are required to determine the cellular and molecular mechanisms that underlie the observations of the present study. Finally, as with any other animal study, our preclinical findings will require validation in humans before they can be appropriately translated to clinical applications. Echocardiography and CRT that neurohumoral activation, including free fatty acid and glucose metabolism as well as insulin resistance, may be involved in the beneficial effects of CRT [32]. Indeed, all of these factors may be mechanistically related to the improvement in MBF by CRT. But, further studies are required to determine the individual contributions of these mechanisms to CRT-mediated changes in MBF. In our study, MBF after CRT was significantly improved in the responder subgroup, implying that CRT may play a key role in reversing the pathophysiological processes associated with ischemic HF. For example as evidence, Aiba et al. investigated that CRT partially restores ion channel remodeling, abnormal Ca2+ homeostasis, and regional heterogeneity of action potential duration induced by the dyssynchronous mechanical activation of the failing LV in a canine model of left bundle branch block coupled with tachypacing induced heart failure [30]. Additionally, Chakir et al. revealed that CRT reverses regional and global molecular remodeling, generating more homogeneous activation of stress kinases and reducing apoptosis in the same model [31]. Moreover, Ashrafian illustrated PLOS ONE | DOI:10.1371/journal.pone.0113992 December 3, 2014 9 / 12 References 1. Shah AM, Mann DL (2011) In search of new therapeutic targets and strategies for heart failure: recent advances in basic science. Lancet 378: 704–712. 2. Holzmeister J, Leclercq C (2011) Implantable cardioverter defibrillators and cardiac resynchronisation therapy. Lancet 378: 722–730. 3. Cleland JG, Daubert JC, Erdmann E, Freemantle N, Kappenberger L, et al. (2005) The effect of cardiac resynchronization on morbidity and mortality in heart failure. N Engl J Med 352: 1539–1549. 4. Kydd AC, Khan FZ, Watson WD, Pugh PJ, Virdee MS, et al. (2014) Prognostic Benefit of Optimum Left Ventricular Lead Position in Cardiac Resynchronization Therapy: Follow-Up of the TARGET Study Cohort (Targeted Left Ventricular Lead Placement to guide Cardiac Resynchronization Therapy). JACC Heart Fail 2: 205–212. 5. Chen Y, Duan C, Liu F, Shen S, Chen P, et al. (2014) Impact of etiology on the outcomes in heart failure patients treated with cardiac resynchronization therapy: a meta-analysis. PLoS One 9: e94614. 6. Biswas M, Sudhakar S, Nanda NC, Buckberg G, Pradhan M, et al. (2013) Two- and Three- dimensional speckle tracking echocardiography: clinical and future directions. Echocardiography 30: 88– 105. 7. Wei K, Jayaweera AR, Firoozan S, Linka A, Skyba DM, et al. (1998) Quantification of myocardial blood flow with ultrasound-induced destruction of microbubbles administered as a constant venous infusion. Circulation 97: 473–483. 8. Shanks M, Bertini M, Delgado V, Ng AC, Nucifora G, et al. (2010) Effect of biventricular pacing on diastolic dyssynchrony. J Am Coll Cardiol 56: 1567–1575. 9. Kass DA (2003) Predicting cardiac resynchronization response by QRS duration: The long and short of it. J Am Coll Cardiol 42: 2125–2127. 10. Bleeker GB, Holman ER, Steendijk P, Boersma E, van der Wall EE, et al. (2006) Cardiac resynchronization therapy in patients with a narrow QRS complex. J Am Coll Cardiol 48: 2243–2250. 11. Beshai JF, Grimm RA, Nagueh SF, Baker JH 2nd, Beau SL, et al. (2007) Cardiac-resynchronization therapy in heart failure with narrow QRS complexes. N Engl J Med 357: 2461–2471. 12. Bax JJ, Bleeker GB, Marwick TH, Molhoek SG, Boersma E, et al. (2004) Left ventricular dyssynchrony predicts response and prognosis after cardiac resynchronization therapy. J Am Coll Cardiol 44: 1834–1840. 13. Chung ES, Menon SG, Weiss R, Schloss EJ, Chow T, et al. (2007) Feasibility of biventricular pacing in patients with recent myocardial infarction: impact on ventricular remodeling. Congest Heart Fail 13: 9– 15. 14. Author Contributions Conceived and designed the experiments: XHS LLC. Performed the experiments: YLC HYC. Analyzed the data: HHY YSW. Contributed reagents/materials/analysis tools: WPZ CZP. Wrote the paper: YLC LLC. 10 / 12 PLOS ONE | DOI:10.1371/journal.pone.0113992 December 3, 2014 Echocardiography and CRT Echocardiography and CRT 20. Pouleur AC, Knappe D, Shah AM, Uno H, Bourgoun M, et al. (2011) Relationship between improvement in left ventricular dyssynchrony and contractile function and clinical outcome with cardiac resynchronization therapy: the MADIT-CRT trial. Eur Heart J 32: 1720–1729. 21. Choi JO, Cho SW, Song YB, Cho SJ, Song BG, et al. (2009) Longitudinal 2D strain at rest predicts the presence of left main and three vessel coronary artery disease in patients without regional wall motion abnormality. Eur J Echocardiogr 10: 695–701. 22. Anantharam B, Janardhanan R, Hayat S, Hickman M, Chahal N, et al. (2011) Coronary flow reserve assessed by myocardial contrast echocardiography predicts mortality in patients with heart failure. Eur J Echocardiogr 12: 69–75. 23. Hillis GS, Mulvagh SL, Gunda M, Hagen ME, Reeder GS, et al. (2003) Contrast echocardiography using intravenous octafluoropropane and real-time perfusion imaging predicts functional recovery after acute myocardial infarction. J Am Soc Echocardiogr 16: 638–645. 24. Olszowska M, Kostkiewicz M, Podolec P, Rubis P, Tracz W. (2010) Myocardial viability detected by myocardial contrast echocardiography-prognostic value in patients after myocardial infarction. Echocardiography 27: 430–434. 25. Erol-Yilmaz A, Atasever B, Mathura K, Lindeboom J, Wilde A, et al. (2007) Cardiac resynchronization improves microcirculation. J Card Fail 13: 95–99. 26. Flevari P, Theodorakis G, Paraskevaidis I, Kolokathis F, Kostopoulou A, et al. (2006) Coronary and peripheral blood flow changes following biventricular pacing and their relation to heart failure improvement. Europace 8: 44–50. 27. Valzania C, Gadler F, Winter R, Braunschweig F, Brodin LA, et al. (2008) Effects of cardiac resynchronization therapy on coronary blood flow: Evaluation by transthoracic Doppler echocardiography. Eur J Heart Fail 10: 514–520. 28. Fernandes DR, Tsutsui JM, Bocchi EA, Cesar LA, Sbano JC, et al. (2011) Qualitative and quantitative real time myocardial contrast echocardiography for detecting hibernating myocardium. Echocardiography 28: 342–349. 29. Hickman M, Chelliah R, Burden L, Senior R (2010) Resting myocardial blood flow, coronary flow reserve, and contractile reserve in hibernating myocardium: implications for using resting myocardial contrast echocardiography vs. dobutamine echocardiography for the detection of hibernating myocardium. Eur J Echocardiogr 11: 756–762. 30. Aiba T, Hesketh GG, Barth AS, Liu T, Daya S, et al. (2009) Electrophysiological Consequences of Dyssynchronous Heart Failure and Its Restoration by Resynchronization Therapy. Circulation 119: 1220–1230. 31. Chakir K, Daya SK, Tunin RS, Helm RH, Byrne MJ, et al. PLOS ONE | DOI:10.1371/journal.pone.0113992 December 3, 2014 References Chung ES, Dan D, Solomn SD, Bank AJ, Pastore J, et al. (2007) Effect of peri-infarct pacing early after myocardial infarction: results of the prevention of myocardial enlargement and dilatation post myocardial infarction study. Circ Heart Fail 3: 650–658. 15. Pfeffer MA, Braunwald E. (1990) Ventricular remodeling after myocardial infarction. Experimental observations and clinical implications. Circulation 81: 1161–1172. 16. Helm RH, Leclercq C, Faris OP, Ozturk C, McVeigh E, et al. (2005) Cardiac dyssynchrony analysis using circumferential versus longitudinal strain: Implications for assessing cardiac resynchronization. Circulation 111: 2760–2767. 17. Dohi K, Suffoletto MS, Schwartzman D, Ganz L, Pinsky MR, et al. (2005) Utility of echocardiographic radial strain imaging to quantify left ventricular dyssynchrony and predict acute response to cardiac resynchronization therapy. Am J Cardiol 96: 112–116. 18. Parsai C, Bijnens B, Sutherland GR, Baltabaeva A, Claus P, et al. (2009) Toward understanding response to cardiac resynchronization therapy: left ventricular dyssynchrony is only one of multiple mechanisms. Eur Heart J 30: 940–949. 19. Gorcsan J 3rd, Tanabe M, Bleeker GB, Suffoletto MS, Thomas NC, et al. (2007) Combined Longitudinal and Radial dyssynchrony predicts ventricular response after resynchronization therapy. J Am Coll Cardiol 50: 1476–1483. 11 / 12 PLOS ONE | DOI:10.1371/journal.pone.0113992 December 3, 2014 (2008) Reversal of global apoptosis and regional stress kinase activation by cardiac resynchronization. Circulation 117: 1369–1377. 32. Ashrafian H, Frenneaux MP, Opie LH (2007) Metabolic mechanisms in heart failure. Circulation 116: 434–448. 12 / 12
https://openalex.org/W2891704156
https://research.chalmers.se/publication/505234/file/505234_Fulltext.pdf
English
null
Leaching and Recovery of Rare-Earth Elements from Neodymium Magnet Waste Using Organic Acids
Metals
2,018
cc-by
14,574
Leaching and recovery of rare-earth elements from neodymium magnet waste using organic acids Downloaded from: https://research.chalmers.se, 2024-10-24 05:54 UTC Citation for the original published paper (version of record): Gergoric, M., Ravaux, C., Steenari, B. et al (2018). Leaching and recovery of rare-earth elements from neodymium magnet waste using organic acids. Metals, 8(9). http://dx.doi.org/10.3390/met8090721 N.B. When citing this work, cite the original published paper. research.chalmers.se offers the possibility of retrieving research publications produced at Chalmers University of Technology. It covers all kind of research output: articles, dissertations, conference papers, reports etc. since 2004. research.chalmers.se is administrated and maintained by Chalmers Library research.chalmers.se offers the possibility of retrieving research publications produced at Chalmers University of Technology. It covers all kind of research output: articles, dissertations, conference papers, reports etc. since 2004. research.chalmers.se is administrated and maintained by Chalmers Library Leaching and recovery of rare-earth elements from neodymium magnet waste using organic acids Received: 20 August 2018; Accepted: 11 September 2018; Published: 13 September 2018 Abstract: Over the last decade, rare-earth elements (REEs) have become critical in the European Union (EU) in terms of supply risk, and they remain critical to this day. End-of-life electronic scrap (e-scrap) recycling can provide a partial solution to the supply of REEs in the EU. One such product is end-of-life neodymium (NdFeB) magnets, which can be a feasible source of Nd, Dy, and Pr. REEs are normally leached out of NdFeB magnet waste using strong mineral acids, which can have an adverse impact on the environment in case of accidental release. Organic acids can be a solution to this problem due to easier handling, degradability, and less poisonous gas evolution during leaching. However, the literature on leaching NdFeB magnets waste with organic acids is very scarce and poorly investigated. This paper investigates the recovery of Nd, Pr, and Dy from NdFeB magnets waste powder using leaching and solvent extraction. The goal was to determine potential selectivity between the recovery of REEs and other impurities in the material. Citric acid and acetic acid were used as leaching agents, while di-(2-ethylhexyl) phosphoric acid (D2EHPA) was used for preliminary solvent extraction tests. The highest leaching efficiencies were achieved with 1 mol/L citric acid (where almost 100% of the REEs were leached after 24 h) and 1 mol/L acetic acid (where >95% of the REEs were leached). Fe and Co—two major impurities—were co-leached into the solution, and no leaching selectivity was achieved between the impurities and the REEs. The solvent extraction experiments with D2EHPA in Solvent 70 on 1 mol/L leachates of both acetic acid and citric acid showed much higher affinity for Nd than Fe, with better extraction properties observed in acetic acid leachate. The results showed that acetic acid and citric acid are feasible for the recovery of REEs out of NdFeB waste under certain conditions. Keywords: rare earths; neodymium magnets; solvent extraction; leaching; citric acid; acetic acid Leaching and Recovery of Rare-Earth Elements fro Neodymium Magnet Waste Using Organic Acids Marino Gergoric 1,* , Christophe Ravaux 2, Britt-Marie Steenari 1, Fredrik Espegren 1 and Teodora Retegan 1 1 Nuclear Chemistry and Industrial Materials Recycling, Chemistry and Chemical Engineering, Chalmers University of Technology, 412 96 Göteborg, Sweden; bms@chalmers.se (B.-M.S.); espegren@chalmers.se (F.E.); tretegan@chalmers.se (T.R.) 1 Nuclear Chemistry and Industrial Materials Recycling, Chemistry and Chemical Engineering, Chalmers University of Technology, 412 96 Göteborg, Sweden; bms@chalmers.se (B.-M.S.); espegren@chalmers.se (F.E.); tretegan@chalmers.se (T.R.) p g ( ); g ( ) 2 Decontamination and Environmental Management, National School of Chemistry Montpellier, 34090 Montpellier, France; christophe.ravaux@enscm.fr * Correspondence: marino@chalmers.se; Tel.: +46-(0)31-772-28-42 34090 Montpellier, France; christophe.ravaux@enscm.fr * Correspondence: marino@chalmers.se; Tel.: +46-(0)31-772-28-42 * Correspondence: marino@chalmers.se; Tel.: +46-(0)31-772-28-42 Received: 20 August 2018; Accepted: 11 September 2018; Published: 13 September 2018 (article starts on next page) metals 1. Introduction Furthermore, according to predicted growth [8], REE magnets and dysprosium are expected to be the most in-demand materials (in tons) due to the development of green technologies, with an average annual growth of 5.3% between 2010 and 2035 [7]. Electronic devices, such as speakers, mobile devices, and hard disk drives, are available as waste today and can be readily recycled unlike large magnets found in wind turbines and electric cars that have a long life span [3]. Hydrometallurgical methods, such as leaching, solvent extraction, and precipitation, are attractive and efficient methods for recovery of REEs out of NdFeB magnets [3]. The elements contained in the magnet are normally dissolved/leached into an aqueous solution, followed by solvent extraction (occasionally ion-exchange) from the leachate and back-extraction into a new aqueous solution for further reprocessing. Various leaching processes for recovery of REEs out of NdFeB magnets have been developed. In 2016, Önal et al. [9] developed a selective leaching process for REEs by leaching Fe in the solid residue. The NdFeB magnet powder sample was turned into a sulfate mixture by mixing with concentrated H2SO4 (12–16 mol/L) in crucibles. After drying and high-temperature treatment, the powder was leached in demineralized water for 15 min to 24 h, which led to >95% recovery of REEs while Fe remained in the solid residue in the form of a sulfate. In 2014, Yoon et al. [10] studied the leaching of NdFeB magnet scrap using H2SO4 at different temperatures and concentrations. The optimal leaching conditions were determined to be 70 ◦C and 3 mol/L H2SO4 with a leaching time of 4 h. In 2013, Lee et al. [11] carried out an investigation on leaching of NdFeB magnets using H2SO4, HCl, HNO3, and NaOH. Out of the four leaching agents, HCl and H2SO4 showed the best leaching performance. Optimum conditions for this process were S:L (solid-to-liquid ratio) ratio of 20 g/L, leaching time of 15 min, and concentrations of 3 mol/L HCl and 1.5 mol/L H2SO4. The vast majority of research so far has been conducted using strong mineral acids for leaching [12–15]. 1. Introduction Rare-earth elements (REEs) possess excellent physical and chemical properties, which is why they are used on a large scale in permanent magnets, lamp phosphors, NiMH batteries, catalysts, various mechanical and electric devices as well as electric motors and generators, which are important for transition to a greener economy. Their demand in industry is thus growing rapidly today [1]. Mined mostly in China (over 95% of global supply), REEs are still considered the most critical raw materials in the European Union (EU) in terms of supply risk [2–4]. Due to the geopolitical situation, even the most optimistic predictions cannot rule out a REE market crisis on a global level, similar to the one that occurred in 2011 [5]. However, an imminent crisis in REEs supply in the EU is not expected. Metals 2018, 8, 721; doi:10.3390/met8090721 www.mdpi.com/journal/metals 2 of 17 Metals 2018, 8, 721 Metals 2018, 8, 721 The processes for the production of pure REEs out of ores use highly concentrated mineral acids, which take a toll on the environment, including acids leakage and release of toxic gasses generated during leaching [6]. Furthermore, large amounts of solvents are used for the recovery of REEs out of the obtained leachates. Despite the environmental issues, there are very few ongoing large-scale processes for recycling REEs from end-of-life products, mainly due to price stabilization since the crisis in 2011 and due to varying environmental legislation across the globe [7]. Development of a sustainable and economically feasible recycling process for the recovery of the REEs out of secondary sources is needed in order to decrease the dependence of the industry on mining. As of today, the recycling of REEs in the EU is still in its early stages, with only 7% of the light REEs and 6% of the heavy REEs recovered from secondary sources to meet the EU’s demand for REEs [2]. NdFeB scrap magnets are a viable source of some REEs. They consist mainly of Nd (around 30%) and Fe (around 64%), with trace amounts of B (around 0.5%) [6]. Small admixtures of Pr and Dy are also often present [3], with Dy being especially important because it is added to increase the temperature stability against demagnetization. 1. Introduction It is largely produced by methanol carbonylation [27], and the price is comparable with that of mineral acids, making it attractive for usage as a leaching agent. In the work of Zanonato et al. [28], it was shown that Nd3+ forms at least successive mononuclear complexes according to the following equilibrium: ssociation constants being pKa1 = 3.13, pKa2 = 4.76, and pKa3 = 6.40 at 25 C [23]. It is naturally und in citrus fruits but is usually produced through a cheaper process by fermentation of sugars sing Aspergilus niger bacteria [24]. As citric acid is in high demand both in chemical and food dustry, the price is comparable to that of mineral acids. Two possible mechanisms of dissolution ith citric acid include metal ion displacement with hydronium ions and formation of soluble metal– gand complexes by metal chelation [25]. In a study by Brown et al. [26], it was shown that Nd3+ omplex with citrate counterion is formed according to the following equilibrium: Nd3+ + jCH3COO ⇆ Nd (OOCCH3)j(3 j) +, j = 1, 2, 3 (2) that acetic acid could be used for the recovery of Nd and possibly other REEs fro Nd3+ + jCH3COO− nNd3+ + jH+ + kCit3− ⇆ NdkHjCitk(3n+j−3k) (1) Nd (OOCCH3)j(3−j)+, j = 1, 2, 3 (2) ( ) Es fro (2) electronic waste. Carboxylic acids have been previously used for actinide and lanthanide separations [29,30] a The existence of NdCit, NdHCit, NdHCit2, and NdCit2 was confirmed by the solution in the pH nge 2–5, which proved that citric acid could be used for the leaching of Nd and other REEs out of A d d b l h I l l This indicates that acetic acid could be used for the recovery of Nd and possibly other REEs from electronic waste. electronic waste. Carboxylic acids have been previously used for actinide and lanthanide separations [29,30] a The existence of NdCit, NdHCit, NdHCit2, and NdCit2 was confirmed by the solution in the pH nge 2–5, which proved that citric acid could be used for the leaching of Nd and other REEs out of a A eti a id i a o a i a id o tai i o e a bo yli ou ith Ka 4 76 It i la ely This indicates that acetic acid could be used for the recovery of Nd and possibly other REEs from electronic waste. 1. Introduction could be suitable for the recovery of REEs out of NdFeB magnet waste as they can form solu complexes with REEs. However, the leaching of neodymium magnets with organic acids is ve scarcely investigated. In 2016, Behera et al. [6] investigated in detail the kinetics of extraction of N out of NdFeB waste using acetic acid. The study showed that acetic acid in concentrations higher th 0.4 mol/L at 800 rpm, 1% (w/v) and 308 K was effective at leaching Nd and Fe out of the was However, in this study—as well as in other works—little attention was paid to the recovery of oth REEs, meaning no detailed kinetic or temperature gradient study was performed for vital REEs l Dy and Pr in the waste; the behavior of other impurities such as Fe, B and Co during the leachi process was not completely addressed either. The feasibility of further extraction of REEs out leachates of organic acids was also not addressed. In this study, leaching of a high‐temperature‐treated neodymium magnet powder w i ti t d i dil t d it i id d ti id Th l hi ti i d i d scrap. Acetic acid is an organic acid containing one carboxylic group with pKa = 4.76. It is largely roduced by methanol carbonylation [27], and the price is comparable with that of mineral acids, aking it attractive for usage as a leaching agent. In the work of Zanonato et al. [28], it was shown at Nd3+ forms at least successive mononuclear complexes according to the following equilibrium: Nd3+ + jCH3COO− ⇆ Nd (OOCCH3)j(3−j) +, j = 1, 2, 3 (2) This indicates that acetic acid could be used for the recovery of Nd and possibly other REEs from ectronic waste. Carboxylic acids have been previously used for actinide and lanthanide separations [29,30] and ould be suitable for the recovery of REEs out of NdFeB magnet waste as they can form soluble omplexes with REEs. However, the leaching of neodymium magnets with organic acids is very arcely investigated In 2016 Behera et al [6] investigated in detail the kinetics of extraction of Nd Carboxylic acids have been previously used for actinide and lanthanide separations [29,30] and could be suitable for the recovery of REEs out of NdFeB magnet waste as they can form soluble complexes with REEs. 1. Introduction However, the leaching of neodymium magnets with organic acids is very scarcely investigated. In 2016, Behera et al. [6] investigated in detail the kinetics of extraction of Nd out of NdFeB waste using acetic acid. The study showed that acetic acid in concentrations higher than 0.4 mol/L at 800 rpm, 1% (w/v) and 308 K was effective at leaching Nd and Fe out of the waste. However, in this study—as well as in other works—little attention was paid to the recovery of other REEs, meaning no detailed kinetic or temperature gradient study was performed for vital REEs like Dy and Pr in the waste; the behavior of other impurities such as Fe, B and Co during the leaching process was not completely addressed either. The feasibility of further extraction of REEs out of leachates of organic acids was also not addressed. investigated using diluted citric acid and acetic acid. The leaching process was optimized in order achieve the maximum REEs recovery by varying leaching time, acids concentration, and S:L rat Before the leaching experiments, the powder before and after roasting treatment was analyzed usi scanning electron microscopy coupled with energy dispersive X‐ray spectroscopy (SEM/ED analysis, x‐ray diffraction (XRD) , and total dissolution using aqua regia. Solvent extraction w D2EHPA was performed on the obtained leachates to test the feasibility of REEs recovery from su leachates using conventional methods. 2 Materials and Methods arcely investigated. In 2016, Behera et al. [6] investigated in detail the kinetics of extraction of Nd ut of NdFeB waste using acetic acid. The study showed that acetic acid in concentrations higher than 4 mol/L at 800 rpm, 1% (w/v) and 308 K was effective at leaching Nd and Fe out of the waste. owever, in this study—as well as in other works—little attention was paid to the recovery of other EEs, meaning no detailed kinetic or temperature gradient study was performed for vital REEs like y and Pr in the waste; the behavior of other impurities such as Fe, B and Co during the leaching rocess was not completely addressed either. The feasibility of further extraction of REEs out of achates of organic acids was also not addressed. In this study, leaching of a high‐temperature‐treated neodymium magnet powder was In this study, leaching of a high-temperature-treated neodymium magnet powder was investigated using diluted citric acid and acetic acid. 1. Introduction The extraction of the metals of interest after leaching is most commonly done using solvent extraction agents like di-(2-ethylhexyl) phosphoric acid (D2EHPA), tributyl phosphate (TBP) and 2-ethylhexyl phosphonic acid (HEHEHP) [16], although a lot of research in recent years has been focused on the investigation of solvent extraction using ionic liquids as promising new, environmentally friendly extractants [3,17]. Even though efficient, hydrometallurgical methods have drawbacks. As already mentioned, large amount of waste is generated during the processes and toxic chemicals are often used. This has to be mitigated using more environmentally friendly chemicals and decreasing the quantities of both the aqueous and the organic waste produced. Despite possessing excellent properties for leaching REEs out of NdFeB magnets, strong mineral acids such as HCl, HNO3 and H2SO4 pose the risk of adverse impact on the environment [6,18,19] because of issues with regeneration of the used acids, while handling can also pose a great challenge in some situations. In cases where highly concentrated acids are released to the environment, they could acidify the soil and would require further soil treatment to neutralize the acidified soil [20]. Moreover, when using strong mineral acids, evolution of poisonous gasses is often a problem. Using organic acids or significantly more diluted mineral acids [21] could have advantages in this regard because of Metals 2018, 8, 721 3 of 17 easier handling, less poisonous gas evolution due to lower acidities, and much easier degradability. Some researchers even claim that a more sustainable REE-leaching process could be achieved using some bacteria like Shewanella putrefaciens [22]. Metals 2018, 8, x FOR PEER REVIEW 3 o achieved using some bacteria like Shewanella putrefaciens [22] Citric acid is an organic acid that contains three carboxylic groups, with the three hydrogen dissociation constants being pKa1 = 3.13, pKa2 = 4.76, and pKa3 = 6.40 at 25 ◦C [23]. It is naturally found in citrus fruits but is usually produced through a cheaper process by fermentation of sugars using Aspergilus niger bacteria [24]. As citric acid is in high demand both in chemical and food industry, the price is comparable to that of mineral acids. Two possible mechanisms of dissolution with citric acid include metal ion displacement with hydronium ions and formation of soluble metal–ligand complexes by metal chelation [25]. In a study by Brown et al. 1. Introduction [26], it was shown that Nd3+ complex with citrate counterion is formed according to the following equilibrium: achieved using some bacteria like Shewanella putrefaciens [22]. Citric acid is an organic acid that contains three carboxylic groups, with the three hydrog dissociation constants being pKa1 = 3.13, pKa2 = 4.76, and pKa3 = 6.40 at 25 °C [23]. It is natura found in citrus fruits but is usually produced through a cheaper process by fermentation of sug using Aspergilus niger bacteria [24]. As citric acid is in high demand both in chemical and fo industry, the price is comparable to that of mineral acids. Two possible mechanisms of dissoluti with citric acid include metal ion displacement with hydronium ions and formation of soluble met ligand complexes by metal chelation [25]. In a study by Brown et al. [26], it was shown that N complex with citrate counterion is formed according to the following equilibrium: etals 2018, 8, x FOR PEER REVIEW 3 of 17 nNd3+ + jH+ + kCit3− nNd3+ + jH+ + kCit3− ⇆ NdkHjCitk(3n+j−3k) (1) NdkHjCitk (3n+j−3k) (1) like Shewanella putrefaciens [22]. acid that contains three carboxylic groups, with the three hydrogen K 1 3 13 K 2 4 76 d K 3 6 40 t 25 °C [23] It i t ll nNd3+ + jH+ + kCit3− nNd3+ + jH+ + kCit3− ⇆ NdkHjCitk(3n+j−3k) NdkHjCitk (3n+j−3k) ike Shewanella putrefaciens [22]. acid that contains three carboxylic groups, w (1) (1) n The existence of NdCit, NdHCit, NdHCit2, and NdCit2 was confirmed by the solution in the p range 2–5, which proved that citric acid could be used for the leaching of Nd and other REEs out e‐scrap. Acetic acid is an organic acid containing one carboxylic group with pKa = 4.76. It is larg produced by methanol carbonylation [27], and the price is comparable with that of mineral aci making it attractive for usage as a leaching agent. In the work of Zanonato et al. [28], it was show that Nd3+ forms at least successive mononuclear complexes according to the following equilibriu The existence of NdCit, NdHCit, NdHCit2, and NdCit2 was confirmed by the solution in the pH range 2–5, which proved that citric acid could be used for the leaching of Nd and other REEs out of e-scrap. Acetic acid is an organic acid containing one carboxylic group with pKa = 4.76. 1. Introduction The leaching process was optimized in order to achieve the maximum REEs recovery by varying leaching time, acids concentration, and S:L ratio. Before the leaching experiments, the powder before and after roasting treatment was analyzed using scanning electron microscopy coupled with energy dispersive X-ray spectroscopy (SEM/EDX) analysis, X-ray diffraction (XRD), and total dissolution using aqua regia. Solvent extraction with D2EHPA was performed on the obtained leachates to test the feasibility of REEs recovery from such leachates using conventional methods. The hydrogen decre efore the leaching experiments i l t i 2.1. Material Characterization y g p ( ) p g p Pretreating was done by roasting at 400 °C for 1.5 h in an Entech muffle furnace (LF2) in a cera crucible. After roasting, the powder was sieved to a particle size of <355 µm using a Retsch AS 2 (Retsch, Haan, Germany) vibratory sieve shaker. Throughout this research, these two form d d ill b f d t HD Ndf B d d t d NdF B d T d t i t anning electron microscopy coupled with energy dispersive X‐ray spectroscopy (SEM/EDX) nalysis, x‐ray diffraction (XRD) , and total dissolution using aqua regia. Solvent extraction with 2EHPA was performed on the obtained leachates to test the feasibility of REEs recovery from such achates using conventional methods. The hydrogen decrepitated (HD) NdFeB powder was used in both original and pretreated form. Pretreating was done by roasting at 400 ◦C for 1.5 h in an Entech muffle furnace (LF2) in a ceramic crucible. After roasting, the powder was sieved to a particle size of <355 µm using a Retsch AS 4 of 17 Metals 2018, 8, 721 200 (Retsch, Haan, Germany) vibratory sieve shaker. Throughout this research, these two forms of powder used will be referred to as HD NdfeB powder and roasted NdFeB powder. To determine the elemental composition, 0.5 g of the powder was dissolved in 25 mL aqua regia (V (conc. HCl): V (conc. HNO3) = 3:1) at 23 ± 1 ◦C for 6 hours and filtered with Whatman microfiber filters (GF/A 125 and 65 mm diameter). After filtration, the solution was diluted using 0.5 mol/L HNO3 (suprapur® 65%, Merck, Kenilworth, NJ, USA). No residues were observed on the filter paper after filtration. The composition of the prepared solution was measured using ICP-OES (inductively coupled plasma optical emission spectroscopy, Thermo Scientific iCAP 600 Series ICP Spectrometer, Thermo Fisher, Cambridge, UK) and recalculated into weight percentages of the elements in the roasted powder. The same procedure was performed on the nonroasted HD NdFeB powder. The same measuring method was used throughout this paper. All experiments were done in triplicate to ensure statistical reliability of the results. The hydrogen decre efore the leaching experiments i l t i 2.1. Material Characterization SEM/EDX analysis was carried out on the HD NdFeB before and after roasting using a Phenom ProX (Thermo Fisher Scientific, Phenom-World B.V., Eindhoven, The Netherlands) scanning electron microscope with Phenom ProSuite (Thermo Fisher Scientific, Phenom-World B.V., Eindhoven, The Netherlands) software and Element Identification module in order to determine whether any surface modifications might have occurred during roasting or if there was any elemental redistribution in the particles. The chemical composition of both the HD and roasted NdFeB powders were further ascertained using XRD Bruker D8 Advance (Bruker Corporation, Billerica, MA, USA) with Cu Kα used to examine the phase content. The 2θ range was 20–80◦and step size 0.04◦/s. 2.2. Leaching Kinetics Acetic acid (Sigma-Aldrich, ≥99.5%) and citric acid (Sigma-Aldrich, ≥99.5%) were used as leaching agents, prepared by diluting the concentrated acids with MiliQ water (Merck Millipore Q-POD) to a desired concentration. In order to choose the optimal leaching conditions, the first variables investigated were time and concentration. Each sample was reacting in a closed 100 mL PP plastic cup. Solid to liquid ratio was kept at 0.5 g of magnet powder per 25 mL of acid, the temperature at 23 ± 1 ◦C, and stirring speed at 400 rpm. The samples were leached for 100, 200, 300 min, and 24 h. The starting concentrations of the organic acids used were 0.1, 0.2, 0.4, 0.8, and 1 mol/L. Each experiment was done in triplicate. The heating and stirring plate used was an IKA® RT15. Powder was weighed on a Fisher MH-214 Analytical scale before the reaction and was used in leaching efficiency calculation. The sampled leachates were diluted in 1 mol/L HNO3 (suprapur® 65%, Merck, Kenilworth, NJ, USA), and the metal concentrations were measured using ICP-OES. The pH values of the acids before leaching and leachates after 24 h leaching time was measured using MeterLab™PHM 240 pH/ion Meter pH electrode (Radiometer, Copenhagen, Denmark). 2.3. Solid to Liquid Ratio Study After the determination of the optimal leaching time and acid concentration, the solid to liquid ratio for leaching was investigated. For this study 1/30, 1/50, and 1/80 g/mL S:L ratio was chosen. The volume of the leaching agent was kept at 25 mL in all cases, and the mass of the NdFeB powder was varied. The samples were reacted with 1 mol/L citric and 1 mol/L acetic acid for 300 min in PP plastic cups. The rotation speed was kept constant at 400 rpm, and the temperature was kept at 23 ± 1 ◦C. After the reaction, the leachates were sampled, diluted in 1 mol/L nitric acid, and the metal concentrations were measured using ICP-OES. p p y leachates of organic acids wa 3.1. Material Characterization In this study, leaching of a high‐temperature‐treated neodymium magnet powder was investigated using diluted citric acid and acetic acid. The leaching process was optimized in order to achieve the maximum REEs recovery by varying leaching time, acids concentration, and S:L ratio. Before the leaching experiments, the powder before and after roasting treatment was analyzed using scanning electron microscopy coupled with energy dispersive X‐ray spectroscopy (SEM/EDX) analysis, x‐ray diffraction (XRD) , and total dissolution using aqua regia. Solvent extraction with D2EHPA was performed on the obtained leachates to test the feasibility of REEs recovery from such leachates using conventional methods. 2. Materials and Methods 2.1. Material Characterization The composition of the HD NdFeB powder used in this research was determined in a previous work performed by our group [13], where HNO3 was used to leach the HD NdFeB and TODGA (N, N, N′, N′-tetraoctyl diglycolamide) was used to extract the REEs from the acquired leachate. The results were in accordance with the composition of neodymium magnets found on the market [3,7,32]. Preliminary leaching tests were performed on the HD NdFeB powder using 0.4–1.6 mol/L citric acid and acetic acid at S:L ratio 1/50 g/mL and 25 ± 1 ◦C. REEs exhibited very slow leaching kinetics (less than 20% REEs leached after 8 hours, even at concentrations above 1.2 mol/L, while it took roughly five days to leach 80% of Nd and 60% of Pr and a mere 20% of Dy). Thus, the HD NdFeB powder was roasted and demagnetized to potentially increase its leaching properties. Roasting was used to change the powder chemically and demagnetization to minimize the amount of powder clinging to the stirring magnet. After roasting, the composition of the roasted powder was determined by dissolving it in aqua regia (results shown in Table 1). y g p ( ) p g p etreating was done by roasting at 400 °C for 1.5 h in an Entech muffle furnace (LF2) in a cer ucible. After roasting, the powder was sieved to a particle size of <355 µm using a Retsch AS etsch, Haan, Germany) vibratory sieve shaker. Throughout this research, these two form wder used will be referred to as HD NdfeB powder and roasted NdFeB powder To determine Table 1. 2.4. Solvent Extraction Carboxylic acids have been previously used for actinide and lanthanide separations [29,30] and could be suitable for the recovery of REEs out of NdFeB magnet waste as they can form soluble complexes with REEs However, the leaching of neodymium magnets with organic acids is very where [A]org and [A]aq are the equilibrium concentration of the metal of interest in all its existing species in the organic and aqueous phase, respectively. Separation factor represents the degree of separation between species A and B in the extraction system and is calculated according to the following equation. electronic waste. Carboxylic acids have been previously used for actinide and lanthanide separations [29,30] and could be suitable for the recovery of REEs out of NdFeB magnet waste as they can form soluble complexes with REEs However the leaching of neodymium magnets with organic acids is very where [A]org and [A]aq are the equilibrium concentration of the metal of interest in all its existing species in the organic and aqueous phase, respectively. Separation factor represents the degree of separation between species A and B in the extraction system and is calculated according to the following equation. g y g g y [6] investigated in detail the kinetics of extraction of Nd tudy showed that acetic acid in concentrations higher than SF = DA DB (5) f Nd than (5) 0.4 mol/L at 800 rpm, 1% (w/v) and 308 K was effective at leaching Nd and Fe out of the waste. However, in this study—as well as in other works—little attention was paid to the recovery of other REEs meaning no detailed kinetic or temperature gradient study was performed for vital REEs like The equilibrium pH values in the aqueous phase were measured using MeterLab™PHM 240 pH/ion Meter pH electrode. 2.4. Solvent Extraction To extract metals from the aqueous leachate, D2EHPA (Sigma-Aldrich 97%) in Solvent 70 was used. D2EHPA is a widely used industrial extracting agent, which was used in the case of 1 mol/L citric acid and acetic acid leachates to determine the possible use for the recovery of REEs and other 5 of 17 nd food olution Metals 2018, 8, 721 using Aspergilu elements out of organic acids leachates using solvent extraction. The usual extraction reaction of lanthanides using acidic extractants like D2EHPA [31] is of ion-exchange character: with citric acid include metal ion displacement with hydronium ions and formation of soluble metal– ligand complexes by metal chelation [25]. In a study by Brown et al. [26], it was shown that Nd3+ complex with citrate counterion is formed according to the following equilibrium: Ln3+ + 3(HX)2 Nd3+ + jH+ + kCit3− ⇆ NdkHjCitk(3n+j−3k) (1) LnX3(HX)3 + 3H+ (3) Ln3+ + 3(HX)2 Nd3+ + jH+ + kCit3− ⇆ NdkHjCitk(3n+j−3k) LnX3(HX)3 + 3H+ ) (3) The existence of NdCit, NdHCit, NdHCit2, and NdCit2 was confirmed by the solution in the pH range 2–5, which proved that citric acid could be used for the leaching of Nd and other REEs out of e‐scrap. Acetic acid is an organic acid containing one carboxylic group with pKa = 4.76. It is largely produced by methanol carbonylation [27], and the price is comparable with that of mineral acids, making it attractive for usage as a leaching agent. In the work of Zanonato et al. [28], it was shown that Nd3+ forms at least successive mononuclear complexes according to the following equilibrium: where Ln represents the lanthanide ion and HX represents a molecule of D2EHPA. The experiments were performed on the Ika Vibrax Vxr basic shaking machine in 3.5 mL glass shaking vials, for 1 h and the Vorg: Vaq = 1. After the extraction, the aqueous phase was sampled, diluted in 1 mol/L HNO3, and measured using the ICP-OES. The distribution ratios (D) were calculated as the mass balance in the aqueous phase before and after the extraction. Distribution ratios were calculated according to the following equation: O− ⇆ Nd (OOCCH3)j(3−j) +, j = 1, 2, 3 (2) e used for the recovery of Nd and possibly other REEs from DA = [A]org [A]aq (4) ) f (4) electronic waste. p p y leachates of organic acids wa 3.1. Material Characterization The protective coating is not, however, of interest here from a recycling standpoint as it does not contain REEs. Lastly, the difference from 100% can be attributed to the experimental errors while performing the experiments. Metals 2018, 8, x FOR PEER REVIEW 6 of 17 that are similar to the ones in the HD NdFeB powder. Some impurities present in the NdFeB magnet structure, such as Co and B, were also present, but in percentages lower than 2%. Fe and Nd were represented in slightly lower percentages than expected, which can be attributed to the reaction of oxygen and other atmospheric gases with the original powder during roasting as the oven did not have a controlled atmosphere. Due to the inability to measure the content of oxygen and other air components using the ICP‐OES, the composition of these could not be reported by aqua regia dissolution. Some percentages of Fe and Ni (normally present in the magnet coating) might have been lost during the sieving of the roasted powder as larger chunk‐like chips from the protective coating of the original magnet were removed. The protective coating is not, however, of interest here from a recycling standpoint as it does not contain REEs. Lastly, the difference from 100% can be To further characterize the waste, SEM/EDX analysis was performed. This was done in order to determine the surface changes that occurred in the HD NdFeB powder during roasting and to examine possible redistributions of elements during roasting and sieving. Figure 1 shows the SEM and EDX of the HD NdFeB powder (a and b) and the roasted NdFeB powder (c and d). attributed to the experimental errors while performing the experiments. To further characterize the waste, SEM/EDX analysis was performed. This was done in order to determine the surface changes that occurred in the HD NdFeB powder during roasting and to examine possible redistributions of elements during roasting and sieving. Figure 1 shows the SEM and EDX of the HD NdFeB powder (a and b) and the roasted NdFeB powder (c and d) . (a) (b) (c) (d) Figure 1. Four different SEM magnifications (4100×, 10 kV‐Map) HD NdFeB powder in two different locations (a,b) and roasted neodymium magnet powder sample in two locations (c,d) . The crosses and lines on the SEM pictures show the locations where the EDX analysis was performed. p p y leachates of organic acids wa 3.1. Material Characterization Elemental composition, in wt %, of the (a) hydrogen decrepitated (HD) NdFeB totally dissolved in aqua regia for 1 h at 80 ± 1 ◦C and S:L = 1/10 g/mL and (b) roasted NdFeB powder dissolved in aqua regia for approximately six hours at temperature 23 ± 1 ◦C and S:L = 0.1/5 g/mL. No residues were left after filtration. ntal composition, 0.5 g of the powder was dissolved in 25 mL aqua regia (V (conc. HNO3) = 3:1) at 23 ± 1 °C for 6 hours and filtered with Whatman microfiber filters (G 5 mm diameter) . After filtration, the solution was diluted using 0.5 mol/L HNO3 (su Element (a) Mass Fraction in HD NdFeB Magnet Powder/wt % [13] (b) Mass Fraction in Roasted NdFeB Magnet Powder/wt % Fe 61.1 ± 1.0 56.4 ± 0.3 Nd 25.3 ± 0.7 22.7 ± 0.0 Pr 2.62 ± 0.17 2.73 ± 0.05 Dy 1.08 ± 0.27 0.77 ± 0.01 Co 1.42 ± 0.07 1.25 ± 0.03 B 1.00 ± 0.02 0.74 ± 0.01 Metals 2018, 8, 721 6 of 17 Over one quarter of the roasted NdFeB powder weight fraction consists of REEs, which makes it a feasible source for REEs recovery. As expected, the two major components of the roasted neodymium magnet powder were Fe and Nd, making up 56.4 ± 0.3% and 22.7 ± 0.0% of the powder, respectively. Pr made up 2.73 ± 0.05% and Dy 0.77 ± 0.01% of the overall composition—percentages that are similar to the ones in the HD NdFeB powder. Some impurities present in the NdFeB magnet structure, such as Co and B, were also present, but in percentages lower than 2%. Fe and Nd were represented in slightly lower percentages than expected, which can be attributed to the reaction of oxygen and other atmospheric gases with the original powder during roasting as the oven did not have a controlled atmosphere. Due to the inability to measure the content of oxygen and other air components using the ICP-OES, the composition of these could not be reported by aqua regia dissolution. Some percentages of Fe and Ni (normally present in the magnet coating) might have been lost during the sieving of the roasted powder as larger chunk-like chips from the protective coating of the original magnet were removed. p p y leachates of organic acids wa 3.1. Material Characterization In Figure 1a,b, it can be observed that the morphology of the powder looked even except for the Figure 1. Four different SEM magnifications (4100×, 10 kV-Map) HD NdFeB powder in two different locations (a,b) and roasted neodymium magnet powder sample in two locations (c,d). The crosses and lines on the SEM pictures show the locations where the EDX analysis was performed. (b) (a) (b) (a) (a) (a) (c) (b) (d) (d) (c) Figure 1. Four different SEM magnifications (4100×, 10 kV‐Map) HD NdFeB powder in two different locations (a,b) and roasted neodymium magnet powder sample in two locations (c,d) . The crosses and lines on the SEM pictures show the locations where the EDX analysis was performed. Figure 1. Four different SEM magnifications (4100×, 10 kV-Map) HD NdFeB powder in two different locations (a,b) and roasted neodymium magnet powder sample in two locations (c,d). The crosses and lines on the SEM pictures show the locations where the EDX analysis was performed. 7 of 17 Metals 2018, 8, 721 In Figure 1a,b, it can be observed that the morphology of the powder looked even except for the particle size, which varied and ranged from 2–20 µm. EDX analysis was also performed on the same powder shown in Figure 1. The EDX results suggested that the HD NdFeB powder elemental composition correlated to the composition of NdFeB magnets found in the market [7]. No clusters with higher concentration of certain elements than in the bulk material were found. Some locations on the powder—like the one represented by Line 1 in Figure 1a and point 2 in Figure 1b—showed higher amounts of oxygen, which can be attributed to the fact that the REE-rich grain boundary phase oxidizes fast when exposed to air during the HD process [33]. The results of the SEM/EDX analysis of the roasted NdFeB powder showed different results. In Figure 1c,d, it can be observed that the morphology of the powder was significantly more diverse now than it was before the roasting treatment. Three types of particles could be observed: the flat surface particles sized around 10 µm in diameter, the bulkier particles with a distinct rugged morphology with the diameter size of around 10–20 µm, and the small white specs less than 5 µm in diameter. EDX was performed in order to determine the elemental composition of the various particle types. p p y leachates of organic acids wa 3.1. Material Characterization The flat surface particles were largely composed of iron and oxygen (spots 1 and 2 in Figure 1d). EDX analysis of the white specs showed that these consisted mainly of Nd, Pr, and O, pointing to the creation of clusters of REE oxides during the roasting treatment. The large particles with the rugged surface consisted mostly of Fe and O and smaller amounts of REEs. The weight percentage fluctuations were probably due to variations in the penetration depth of the electrons during the EDX analysis, which can vary depending on the surface topography and composition. Because the electrons penetrate at an approximately constant mass, spatial resolution is a function of density. From the SEM images, it can be observed that the morphology of the hydrogen decrepitated and roasted powder differed significantly, which was expected. In the case of the HD NdFeB powder, the surfaces of the particles were relatively similar, with most of the particles looking homogeneous and having sharp edges. On the other hand, the roasted powder was heterogeneous. It was confirmed using the EDX analysis that the heterogeneity was also present from a particle composition point of view as it was shown that the composition varied significantly across the particle size and shape in the roasted NdFeB powder. To determine the chemical species that can be found in the powder before and after treatment, as well as the changes that occurred in the HD NdFeB power during the roasting process, both powders were analyzed using XRD. The XRD pattern of the HD NdFeB powder (Figure 2a) showed the presence of Nd2Fe14BH3, a hydride formed during the hydrogen decrepitation process. Apart from the main Nd2Fe14BH3, the presence of Fe2B and NdFe1.14Co0.76 was observed. The XRD pattern also showed the presence of traces of Ni. The XRD pattern of the roasted NdFeB powder (Figure 2b) showed the presence of Fe2O3 and Nd2O3, which were formed during the roasting process in the presence of air atmosphere. Ni was also present in higher amounts in elemental form. Apart from these main components there were also present traces of Pr2O3 and Fe in elemental form. The results of the XRD correlated with the results of the SEM-EDX analysis. 8 of 17 Metals 2018, 8, 721 (a) (b) Figure 2. XRD pattern of the (a) hydrogen decrepitated NdFeB powder and (b) roasted NdFeB powder. Figure 2. p p y leachates of organic acids wa 3.1. Material Characterization XRD pattern of the (a) hydrogen decrepitated NdFeB powder and (b) roasted NdFeB powder. 2 L hi Ki ti (a) (b) Figure 2. XRD pattern of the (a) hydrogen decrepitated NdFeB powder and (b) roasted NdFeB powder. (a) ( ) (a) (b) (a) (b) (b) (b) Figure 2. XRD pattern of the (a) hydrogen decrepitated NdFeB powder and (b) roasted NdFeB powder Figure 2. XRD pattern of the (a) hydrogen decrepitated NdFeB powder and (b) roasted NdFeB powder. Figure 2. XRD pattern of the (a) hydrogen decrepitated NdFeB powder and (b) roasted NdFeB d Figure 2. XRD pattern of the (a) hydrogen decrepitated NdFeB powder and (b) roasted NdFeB powder. 3 2 L hi Ki i Figure 2. XRD pattern of the (a) hydrogen decrepitated NdFeB powder and (b) roasted NdFeB powder. 2. Leaching Kinetics Figure 2. XRD pattern of the (a) hydrogen decrepitated NdFeB powder and (b) roasted NdFeB powder. p 3 2 Leaching Kinetic 3.2. Leaching Kinetics powder. 3 2 L hi Ki ti p 3 2 Leaching Kinetic 3.2. Leaching Kinetics po e 3 2 L hi Ki ti 3.2. Leaching Kinetics Apart from the REEs, Fe and Co leaching efficiencies were also monitored as they make up a sufficient percentage of the material to compromise the leaching process. Citric acid and acetic acid showed good leaching properties for REEs out of the roasted magnet powder waste. The results from leaching of roasted neodymium magnet powder with acetic acid and citric acid are shown in Figures 3 and 4, respectively. The leaching kinetics of the REEs, Fe, and Co are represented as an average of a triplicate experiment. Apart from the REEs, Fe and Co leaching efficiencies were also monitored as they make up a sufficient percentage of the material to compromise the leaching process. Citric acid and acetic acid showed good leaching properties for REEs out of the roasted magnet powder waste. The results from leaching of roasted neodymium magnet powder with acetic acid and citric acid are shown in Figures 3 and 4, respectively. The leaching kinetics of the REEs, Fe, and Co are represented as an average of a triplicate experiment. 3.2. Leaching Kinetics Apart from the REEs, Fe and Co leaching efficiencies were also monitored as they make up a sufficient percentage of the material to compromise the leaching process. Citric acid and acetic acid showed good leaching properties for REEs out of the roasted magnet powder waste. The results from leaching of roasted neodymium magnet powder with acetic acid and citric acid are shown in Figures 3 and 4, respectively. The leaching kinetics of the REEs, Fe, and Co are represented as an average of a triplicate experiment. (a) (a) Figure 3. Cont. 9 of 17 Metals 2018, 8, 721 , , (b) (c) (d) (e) Figure 3. Effect of the concentration of acetic acid (0.1, 0.2, 0.4, 0.8 and 1 mol/L) and leaching time (100 min, 200 min, 300 min and 24 h) on the leaching efficiency of (a) Nd, (b) Pr, (c) Dy, (d) Fe, and (e) Co. The temperature was kept at 25 ± 1 ◦C, magnetic stirring at 400 rpm, and S:L ratio at 1/50 g/mL. (b) (e) Figure 3. Effect of the concentration of acetic acid (0.1, 0.2, 0.4, 0.8 and 1 mol/L) and leaching time (100 min, 200 min, 300 min and 24 h) on the leaching efficiency of (a) Nd, (b) Pr, (c) Dy, (d) Fe, and (e) Co. Metals 2018, 8, 721 Figure 3. Metals 2018, 8, 721 Figure 3. 10 of 17 Leaching of Nd, Pr, Dy, Fe, Co, and B at varying concentrations of acetic acid were studied. Leaching time varied from 0–24 h, while the temperature and S:L ratio were kept constant. The leaching efficiency was found to be significantly dependent on the acetic acid concentration as well as the leaching time. It can be observed that changing the acetic acid concentration from 0.05 to 1 mol/L and using a 24 h leaching time increased the leaching efficiency from <20% to >95% for all REEs. Thus, acetic acid in concentrations higher than 1 mol/L is recommended for the efficient recovery of REEs from roasted neodymium magnet powder. After 24 h of leaching with 1 mol/L acetic acid, almost all of Dy, Pr, Fe, Co, and B were leached into the solution, while over 95% of Nd was recovered. Diluting acetic acid from 1 mol/L to 0.1 mol/L decreased the pH value from 2.2 to 2.8. The pH values of the leachates after 24 h leaching were 4.1, 4.2, 4.6, 5.2, 5.6, and 5.9 for 1 mol/L, 0.8 mol/L, 0.6 mol/L, 0.4 mol/L, 0.2 mol/L, and 0.1 mol/L leachates, respectively, pointing at proton starvation during leaching. Co. The temperature was kept at 25 ± 1 °C, magnetic stirring at 400 rpm, and S:L ratio at 1/50 g/mL. Leaching of Nd, Pr, Dy, Fe, Co, and B at varying concentrations of acetic acid were studied. Leaching time varied from 0–24 h, while the temperature and S:L ratio were kept constant. The leaching efficiency was found to be significantly dependent on the acetic acid concentration as well as the leaching time. It can be observed that changing the acetic acid concentration from 0.05 to 1 mol/L and using a 24 h leaching time increased the leaching efficiency from <20% to >95% for all REEs. Thus, acetic acid in concentrations higher than 1 mol/L is recommended for the efficient recovery of REEs from roasted neodymium magnet powder. After 24 h of leaching with 1 mol/L acetic acid, almost all of Dy, Pr, Fe, Co, and B were leached into the solution, while over 95% of Nd was recovered. Diluting acetic acid from 1 mol/L to 0.1 mol/L decreased the pH value from 2.2 to 2.8. p 3 2 Leaching Kinetic 3.2. Leaching Kinetics po e 3 2 L hi Ki ti The temperature was kept at 25 ± 1 ◦C, magnetic stirring at 400 rpm, and S:L ratio at 1/50 g/mL. Metals 2018, 8, 721 Figure 3. The pH values of the leachates after 24 h leaching were 4.1, 4.2, 4.6, 5.2, 5.6, and 5.9 for 1 mol/L, 0.8 mol/L, 0.6 mol/L, 0.4 mol/L, 0.2 mol/L, and 0.1 mol/L leachates, respectively, pointing at proton starvation during leaching. Fe, B, and Co showed similar trends and no selectivity for REEs was observed, meaning that the increase in leaching of the REEs was also followed by the co-leaching of Fe, B, and Co into the solution. As 1 mol/L acetic acid was needed for quantitative leaching of REEs, this concentration was used for further experiments. g g Fe, B, and Co showed similar trends and no selectivity for REEs was observed, meaning that the increase in leaching of the REEs was also followed by the co‐leaching of Fe, B, and Co into the solution. As 1 mol/L acetic acid was needed for quantitative leaching of REEs, this concentration was used for further experiments. (a) (b) Figure 4. Cont. Figure 4. Cont. 11 of 17 17 11 of 17 17 Metals 2018, 8, 721 M t l 2018 8 F (c) (d) (e) Figure 4. Effect of the concentration of citric acid (0.1, 0.2, 0.4, 0.8 and 1 mol/L) and leaching time (100 min, 200 min, 300 min and 24 h) on the leaching efficiency of (a) Nd, (b) Pr, (c) Dy, (d) Fe, and (e) Co. The temperature was kept at 25 ± 1 °C by, magnetic stirring at 400 rpm, and S:L ratio at 1/50 g/mL. As in the case of acetic acid, the effect of variation in the concentration of citric acid was observed to influence the leaching efficiency of the components of the roasted neodymium powder (Figure 4) . Increasing the concentration of citric acid from 0.1 mol/L to 1 mol/L increased the leaching efficiency for the REEs from <20% to >95%, reaching the highest leaching efficiency after 24 h. The increase in Figure 4. Effect of the concentration of citric acid (0.1, 0.2, 0.4, 0.8 and 1 mol/L) and leaching time (100 min, 200 min, 300 min and 24 h) on the leaching efficiency of (a) Nd, (b) Pr, (c) Dy, (d) Fe, and (e) Co. The temperature was kept at 25 ± 1 ◦C by, magnetic stirring at 400 rpm, and S:L ratio at 1/50 g/mL. Metals 2018, 8, 721 Figure 3. As in the case of acetic acid, the effect of variation in the concentration of citric acid was observ o influence the leaching efficiency of the components of the roasted neodymium powder (Figure ncreasing the concentration of citric acid from 0.1 mol/L to 1 mol/L increased the leaching efficien or the REEs from <20% to >95%, reaching the highest leaching efficiency after 24 h. The increase he leaching efficiency of REEs was accompanied by the co-leaching of Fe, B, and Co into the solutio (e) Figure 4. Effect of the concentration of citric acid (0.1, 0.2, 0.4, 0.8 and 1 mol/L) and leaching time (100 min, 200 min, 300 min and 24 h) on the leaching efficiency of (a) Nd, (b) Pr, (c) Dy, (d) Fe, and (e) Co. The temperature was kept at 25 ± 1 °C by, magnetic stirring at 400 rpm, and S:L ratio at 1/50 g/mL. Figure 4. Effect of the concentration of citric acid (0.1, 0.2, 0.4, 0.8 and 1 mol/L) and leaching time (100 min, 200 min, 300 min and 24 h) on the leaching efficiency of (a) Nd, (b) Pr, (c) Dy, (d) Fe, and (e) Co. The temperature was kept at 25 ± 1 ◦C by, magnetic stirring at 400 rpm, and S:L ratio at 1/50 g/mL. As in the case of acetic acid, the effect of variation in the concentration of citric acid was observed to influence the leaching efficiency of the components of the roasted neodymium powder (Figure 4) . Increasing the concentration of citric acid from 0.1 mol/L to 1 mol/L increased the leaching efficiency for the REEs from <20% to >95%, reaching the highest leaching efficiency after 24 h. The increase in As in the case of acetic acid, the effect of variation in the concentration of citric acid was observed to influence the leaching efficiency of the components of the roasted neodymium powder (Figure 4). Increasing the concentration of citric acid from 0.1 mol/L to 1 mol/L increased the leaching efficiency for the REEs from <20% to >95%, reaching the highest leaching efficiency after 24 h. The increase in the leaching efficiency of REEs was accompanied by the co-leaching of Fe, B, and Co into the solution. 3.3. Solid to Liquid Ratio Study The leaching efficiencies The leaching efficiencies of Nr, Pr, Dy, Fe, and Co in 1 mol/L citric acid and acetic acid as a function of solid to liquid ratio are shown in Figure 5a,b. The S:L ratios used were 1/30, 1/50, and 1/80 g/mL. In the case of 1 mol/L citric acid, changing the S:L ratio from 1/30 to 1/80 g/mL had negligible effects on the leaching efficiencies of all the elements present. Dy showed slightly higher leaching efficiency at 1/80 S:L ratio, but all within the statistical error. On the other hand, in the case of 1 mol/L acetic acid, the change of S:L ratio from 1/30 to 1/80 g/mL had a significant effect on the leaching of Fe, which was leached at 61.69 ± 6.58% at 1/30 g/mL and 79.30 ± 2.28% at 1/80 g/mL. This can be attributed to the strength of the acids. Acetic acid is a monoprotic acid with pKa = 4.76, while citric acid is a triprotic acid with pKa1 = 3.13, pKa2 = 4.76 and pKa3 = 6.39, which can explain why the leaching efficiency of Fe was lower due to proton starvation in the leachate. Exact amounts of H+ were not recalculated from the pKa values as activity coefficients would need to be determined in that case. The leaching efficiency of Co was also slightly affected by increasing the S:L ratio; it increased from 86.11 ± 0.38% at 1/30 g/mL to 93.92 ± 1.70% at 1/80 g/mL. For industrial purposes, it can be extracted from the leachate using Cyanex 272 (di-(2,4,4-trimethylpentyl) phosphinic acid) at equilibrium pH 4–5 [34]. Changing the S:L ratio from 1/30 to 1/80 g/mL did not, however, affect the leaching efficiency of Nd, Pr, and Dy, which stayed the same across the S:L ratio. B was found to be leached quantitatively at all S/L ratios investigated. For complete extraction of B from the leachate, aliphatic 1,3-diols can be used [35]. function of solid to liquid ratio are shown in Figure 5a,b. The S:L ratios used were 1/30, 1/50, and 1/80 g/mL. In the case of 1 mol/L citric acid, changing the S:L ratio from 1/30 to 1/80 g/mL had negligible effects on the leaching efficiencies of all the elements present. Dy showed slightly higher leaching efficiency at 1/80 S:L ratio, but all within the statistical error. Metals 2018, 8, 721 Figure 3. The pH value of the leaching acid measured increased from 1.23 to 2.5 from 1 mol/L to 0.1 mol/L, while the values after 24 h leaching were 2.3, 2.6, 3.4, 4.5, and 5.3 for 1 mol/L, 0.8 mol/L, 0.6 mol/L, As in the case of acetic acid, the effect of variation in the concentration of citric acid was observed to influence the leaching efficiency of the components of the roasted neodymium powder (Figure 4) . Increasing the concentration of citric acid from 0.1 mol/L to 1 mol/L increased the leaching efficiency for the REEs from <20% to >95%, reaching the highest leaching efficiency after 24 h. The increase in As in the case of acetic acid, the effect of variation in the concentration of citric acid was observed to influence the leaching efficiency of the components of the roasted neodymium powder (Figure 4). Increasing the concentration of citric acid from 0.1 mol/L to 1 mol/L increased the leaching efficiency for the REEs from <20% to >95%, reaching the highest leaching efficiency after 24 h. The increase in the leaching efficiency of REEs was accompanied by the co-leaching of Fe, B, and Co into the solution. The pH value of the leaching acid measured increased from 1.23 to 2.5 from 1 mol/L to 0.1 mol/L, while the values after 24 h leaching were 2.3, 2.6, 3.4, 4.5, and 5.3 for 1 mol/L, 0.8 mol/L, 0.6 mol/L, 12 of 17 / , ol/L, 0.4 i th Metals 2018, 8, 721 p while the value 0.4 mol/L, 0.2 mol/L, and 0.1 mol/L of citric acid, respectively. An interesting observation here is the decrease in leaching efficiency of the Nd, Pr, and Dy that occurred after 24 h leaching with 0.1 mol/L citric acid. Fe and Co did not exhibit the same behavior—the leaching efficiency reached equilibrium after 300 min for Fe, while the leaching efficiency for Co increased another 10% after 24 h. This can be explained by the pH increase up to 5.3 in the 0.1 mol/L, which led to the precipitation of the REEs, most likely as citrates as citrates of REEs are known to be soluble in aqueous solutions around pH 2–5 [26]. decrease in leaching efficiency of the Nd, Pr, and Dy that occurred after 24 h leaching with 0.1 mol/L citric acid. Metals 2018, 8, 721 Figure 3. Fe and Co did not exhibit the same behavior—the leaching efficiency reached equilibrium after 300 min for Fe, while the leaching efficiency for Co increased another 10% after 24 h. This can be explained by the pH increase up to 5.3 in the 0.1 mol/L, which led to the precipitation of the REEs, most likely as citrates as citrates of REEs are known to be soluble in aqueous solutions around pH 2– 5 [26]. Both acetic acid and citric acid showed much better leaching properties when the roasted and sieved NdFeB powder was used than was the case for the HD NdFeB magnet It was shown that p Both acetic acid and citric acid showed much better leaching properties when the roasted and sieved NdFeB powder was used than was the case for the HD NdFeB magnet. It was shown that roasting and the elemental redistributions that occurred during the process (molar volume changes during the oxidation and pore formation that make the inner surfaces of the powder more available for leaching) benefited the leaching properties. Sieving the powder into smaller particles also improved the leaching process, which was also shown in a previous work by Behera et al. [6]. The ideal conditions for the leaching of Nd were determined to be 1 mol/L of either citric or acetic acid, and further experiments were conducted with these concentrations. sieved NdFeB powder was used than was the case for the HD NdFeB magnet. It was shown that roasting and the elemental redistributions that occurred during the process (molar volume changes during the oxidation and pore formation that make the inner surfaces of the powder more available for leaching) benefited the leaching properties. Sieving the powder into smaller particles also improved the leaching process, which was also shown in a previous work by Behera et al. [6]. The ideal conditions for the leaching of Nd were determined to be 1 mol/L of either citric or acetic acid, and further experiments were conducted with these concentrations. 3.3. Solid to Liquid Ratio Study 3 4 Solvent Extraction 3.4. Solvent Extraction 3.4. Solvent Extraction A screening investigation regarding the possible separation of the leached metal ions by solvent extraction was made on the leachates obtained after 24 h leaching of the roasted magnet powder using 1 mol/L citric acid and acetic acid. D2EHPA dissolved in Solvent 70 in concentrations of 0.2, 0.4, 0.6, 0.8, and 1 mol/L was used as the organic phase for the extraction of the REEs out of the leachates. Figure 6 represents the D values for Fe and Nd as they are the major components of the leachate. The distribution ratios of other REEs were shown to behave very similarly to the distribution ratios of Nd, and these metals were completely extracted at higher D2EHPA concentrations. The distribution ratios of REEs increased with increasing D2EHPA concentration in the organic phase, as expected. The distribution ratios of Fe were much lower compared to Nd, so high separation factors were expected to be found, the highest being the ones at 0.2 acetic acid extraction with 1 mol/L D2EHPA, which reached the value of 161.9 ± 21.0. The distribution ratios were one order of magnitude higher in the acetic acid media than in the citric acid solutions. This can be attributed to the equilibrium pH values, which were around 3.5 after the extraction from 1 mol/L acetic acid leachate and slowly increased with the decreasing D2EHPA concentration but stayed around 1.5 after the extraction from 1 mol/L citric acid leachate. As shown in a previous study [36], higher equilibrium pH values gave higher distribution ratios for REEs due to REE–D2EHPA complex formation, which is favored in higher equilibrium pH media as D2EHPA is an acidic extractant that exhibits the ion‐ exchange mechanism, with release of H+ ions after the complex has been formed (Equation (3) ) . The behavior of B and Co was also monitored in the extraction process. It was found that at investigated conditions (0.2–1 M D2EHPA in Solvent 70) , less than 1% of both the B and Co were extracted from the leachates, which makes this system even more attractive in terms of selective REEs recovery. 3 4 Solvent Extraction 3.4. Solvent Extraction According to Table 2, separation factors between Nd and Fe were generally higher in the case of 1 M acetic acid leachate but had reached a value of 129 ± 55 in extraction from 1 M citric acid leachate, ki th t i i i ti l bl l t lik Nd f l t f F A screening investigation regarding the possible separation of the leached metal ions by solvent extraction was made on the leachates obtained after 24 h leaching of the roasted magnet powder using 1 mol/L citric acid and acetic acid. D2EHPA dissolved in Solvent 70 in concentrations of 0.2, 0.4, 0.6, 0.8, and 1 mol/L was used as the organic phase for the extraction of the REEs out of the leachates. Figure 6 represents the D values for Fe and Nd as they are the major components of the leachate. The distribution ratios of other REEs were shown to behave very similarly to the distribution ratios of Nd, and these metals were completely extracted at higher D2EHPA concentrations. The distribution ratios of REEs increased with increasing D2EHPA concentration in the organic phase, as expected. The distribution ratios of Fe were much lower compared to Nd, so high separation factors were expected to be found, the highest being the ones at 0.2 acetic acid extraction with 1 mol/L D2EHPA, which reached the value of 161.9 ± 21.0. The distribution ratios were one order of magnitude higher in the acetic acid media than in the citric acid solutions. This can be attributed to the equilibrium pH values, which were around 3.5 after the extraction from 1 mol/L acetic acid leachate and slowly increased with the decreasing D2EHPA concentration but stayed around 1.5 after the extraction from 1 mol/L citric acid leachate. As shown in a previous study [36], higher equilibrium pH values gave higher distribution ratios for REEs due to REE–D2EHPA complex formation, which is favored in higher equilibrium pH media as D2EHPA is an acidic extractant that exhibits the ion-exchange mechanism, with release of H+ ions after the complex has been formed (Equation (3)). The behavior of B and Co was also monitored in the extraction process. 3.3. Solid to Liquid Ratio Study The leaching efficiencies On the other hand, in the case of 1 mol/L acetic acid, the change of S:L ratio from 1/30 to 1/80 g/mL had a significant effect on the leaching of Fe, which was leached at 61.69 ± 6.58% at 1/30 g/mL and 79.30 ± 2.28% at 1/80 g/mL. This can be attributed to the strength of the acids. Acetic acid is a monoprotic acid with pKa = 4.76, while citric acid is a triprotic acid with pKa1 = 3.13, pKa2 = 4.76 and pKa3 = 6.39, which can explain why the leaching efficiency of Fe was lower due to proton starvation in the leachate. Exact amounts of H+ were not recalculated from the pKa values as activity coefficients would need to be determined in that case. The leaching efficiency of Co was also slightly affected by increasing the S:L ratio; it increased from 86.11 ± 0.38% at 1/30 g/mL to 93.92 ± 1.70% at 1/80 g/mL. For industrial purposes, it can be extracted from the leachate using Cyanex 272 (di‐(2,4,4‐trimethylpentyl) phosphinic acid) at equilibrium pH 4– 5 [34]. Changing the S:L ratio from 1/30 to 1/80 g/mL did not, however, affect the leaching efficiency of Nd, Pr, and Dy, which stayed the same across the S:L ratio. B was found to be leached quantitatively at all S/L ratios investigated. For complete extraction of B from the leachate, aliphatic 1,3‐diols can be used [35]. (a) Figure 5. Cont. Figure 5. Cont. 13 of 17 13 of 17 Metals 2018, 8, 721 Metals 2018 8 x FO (b) Figure 5. The dependence of the amount of Nd leached on the S:L ratio at 25 ± 1 °C using (a) 1 mol/L citric acid and (b) 1 mol/L acetic acid with 400 rpm stirring for 24 h in both cases. Figure 5. The dependence of the amount of Nd leached on the S:L ratio at 25 ± 1 ◦C using (a) 1 mol/L citric acid and (b) 1 mol/L acetic acid with 400 rpm stirring for 24 h in both cases. (b) Figure 5. The dependence of the amount of Nd leached on the S:L ratio at 25 ± 1 °C using (a) 1 mol/L citric acid and (b) 1 mol/L acetic acid with 400 rpm stirring for 24 h in both cases. Figure 5. 3.3. Solid to Liquid Ratio Study The leaching efficiencies The dependence of the amount of Nd leached on the S:L ratio at 25 ± 1 ◦C using (a) 1 mol/L citric acid and (b) 1 mol/L acetic acid with 400 rpm stirring for 24 h in both cases. 4. Conclusions 4. Conclusions In the present work, the leaching of REEs, Fe, and Co from roasted NdFeB magnet powder was studied using citric acid and acetic acid. The treated NdFeB powder was characterized prior to the leaching experiments by total dissolution with aqua regia and SEM/EDX analysis. Kinetics of the leaching process at different concentrations of acids and S:L ratios were studied. After the leaching experiments, solvent extraction was performed using D2EHPA in Solvent 70 as the organic phase and the leachates of citric acid and acetic acid to determine the feasibility of the extraction of REEs from such leachates as well as possible further developments of the process. In the present work, the leaching of REEs, Fe, and Co from roasted NdFeB magnet powder was studied using citric acid and acetic acid. The treated NdFeB powder was characterized prior to the leaching experiments by total dissolution with aqua regia and SEM/EDX analysis. Kinetics of the leaching process at different concentrations of acids and S:L ratios were studied. After the leaching experiments, solvent extraction was performed using D2EHPA in Solvent 70 as the organic phase and the leachates of citric acid and acetic acid to determine the feasibility of the extraction of REEs from such leachates as well as possible further developments of the process. from such leachates as well as possible further developments of the process. By total dissolution of the roasted NdFeB magnet powder in aqua regia, the composition of the magnet was determined to be consistent with that found in the market. Lower percentages of some elements, such as Fe, pointed towards the presence of oxygen due to air contact during roasting. SEM analysis of the neodymium magnet powder before and after roasting showed significant changes in the morphology of the powder. EDX showed the composition of the powder was composed of NdFeB matrix and further confirmed the redistribution of the elemental composition that ensued after roasting. In the HD NdFeB magnet powder, the elemental composition was even throughout the particles observed before roasting. By contrast, in the roasted NdFeB magnet powder, elemental composition was significantly more uneven, with some parts containing significantly higher amounts of REEs, while others contained higher amounts of Fe. 3 4 Solvent Extraction 3.4. Solvent Extraction Separation factors between Nd and Fe after extraction with 0.2, 0.4, 0.6, 0.8, and 1 mol/L D2EHPA in Solvent 70. The aqueous phases used were 1 mol/L citric acid and acetic acid leachates previously obtained. Phase ratios were kept at Vorg/Vaq = 1 during 30 min shaking at 1500 rpm on the custom made shaking machine Temperature was thermostatically kept at 25 ± 1 °C Table 2. Separation factors between Nd and Fe after extraction with 0.2, 0.4, 0.6, 0.8, and 1 mol/L D2EHPA in Solvent 70. The aqueous phases used were 1 mol/L citric acid and acetic acid leachates previously obtained. Phase ratios were kept at Vorg/Vaq = 1 during 30 min shaking at 1500 rpm on the custom-made shaking machine. Temperature was thermostatically kept at 25 ± 1 ◦C. usto ade s aki g ac i e. e pe atu e was t e ostatica y kept at 25 C. c (D2EHPA)/mol/L SFNd/Fe (1 mol/L Acetic Acid) SFNd/Fe (1 mol/L Citric Acid) 0.2 161.9 ± 21.0 0.39 ± 0.10 0.4 94.9 ± 9.4 2.07 ± 0.86 0.6 64.5 ± 13.4 17.0 ± 2.4 0.8 64.1 ± 16.0 76.7 ± 5.9 1 82.2 ± 21.0 129 ± 55 c (D2EHPA)/mol/L SFNd/Fe (1 mol/L Acetic Acid) SFNd/Fe (1 mol/L Citric Acid) 0.2 161.9 ± 21.0 0.39 ± 0.10 0.4 94.9 ± 9.4 2.07 ± 0.86 0.6 64.5 ± 13.4 17.0 ± 2.4 0.8 64.1 ± 16.0 76.7 ± 5.9 1 82.2 ± 21.0 129 ± 55 g p y p c (D2EHPA)/mol/L SFNd/Fe (1 mol/L Acetic Acid) SFNd/Fe (1 mol/L Citric Acid) c (D2EHPA)/mol/L SFNd/Fe (1 mol/L Acetic Acid) SFNd/Fe (1 mol/L Citric Acid) 3 4 Solvent Extraction 3.4. Solvent Extraction Distribution ratio of Nd and Fe as a function of the concentration of D2EHPA in a small-scale solvent extraction set-up (Vorg/Vaq = 1; 1 h shaking at 1500 rpm on an adaptable vortex mixer). The aqueous phase was a leachate (citric acid and acetic acid 1 M; S:L 1g /50 mL; 25 ◦C; 24 h; 400 rpm stirring) using D2EHPA in Solvent 70 solutions as extracting agents, while temperature was thermostatically kept at 25 ± 1 ◦C. Figure 6. Distribution ratio of Nd and Fe as a function of the concentration of D2EHPA in a small‐ Figure 6. Distribution ratio of Nd and Fe as a function of the concentration of D2EHPA in a small-scale Figure 6. Distribution ratio of Nd and Fe as a function of the concentration of D2EHPA in a small‐ scale solvent extraction set‐up (Vorg/Vaq = 1; 1 h shaking at 1500 rpm on an adaptable vortex mixer) . The aqueous phase was a leachate (citric acid and acetic acid 1 M; S:L 1g /50 mL; 25 °C; 24 h; 400 rpm stirring) using D2EHPA in Solvent 70 solutions as extracting agents, while temperature was thermostatically kept at 25 ± 1 °C. Figure 6. Distribution ratio of Nd and Fe as a function of the concentration of D2EHPA in a small-scale solvent extraction set-up (Vorg/Vaq = 1; 1 h shaking at 1500 rpm on an adaptable vortex mixer). The aqueous phase was a leachate (citric acid and acetic acid 1 M; S:L 1g /50 mL; 25 ◦C; 24 h; 400 rpm stirring) using D2EHPA in Solvent 70 solutions as extracting agents, while temperature was thermostatically kept at 25 ± 1 ◦C. g scale solvent extraction set‐up (Vorg/Vaq = 1; 1 h shaking at 1500 rpm on an adaptable vortex mixer) . The aqueous phase was a leachate (citric acid and acetic acid 1 M; S:L 1g /50 mL; 25 °C; 24 h; 400 rpm stirring) using D2EHPA in Solvent 70 solutions as extracting agents, while temperature was thermostatically kept at 25 ± 1 °C. solvent extraction set-up (Vorg/Vaq = 1; 1 h shaking at 1500 rpm on an adaptable vortex mixer). The aqueous phase was a leachate (citric acid and acetic acid 1 M; S:L 1g /50 mL; 25 ◦C; 24 h; 400 rpm stirring) using D2EHPA in Solvent 70 solutions as extracting agents, while temperature was thermostatically kept at 25 ± 1 ◦C. Table 2. 3 4 Solvent Extraction 3.4. Solvent Extraction It was found that at investigated conditions (0.2–1 M D2EHPA in Solvent 70), less than 1% of both the B and Co were extracted from the leachates, which makes this system even more attractive in terms of selective REEs recovery. According to Table 2, separation factors between Nd and Fe were generally higher in the case of 1 M acetic acid leachate but had reached a value of 129 ± 55 in extraction from 1 M citric acid leachate, making these systems promising in separating valuable elements like Nd from large amounts of Fe usually contained in NdFeB magnets. tals 2018, 8, 721 14 o tals 2018, 8, x FOR PEER REVIEW 14 o Figure 6. Distribution ratio of Nd and Fe as a function of the concentration of D2EHPA in a small‐ scale solvent extraction set‐up (Vorg/Vaq = 1; 1 h shaking at 1500 rpm on an adaptable vortex mixer) . The aqueous phase was a leachate (citric acid and acetic acid 1 M; S:L 1g /50 mL; 25 °C; 24 h; 400 rpm stirring) using D2EHPA in Solvent 70 solutions as extracting agents, while temperature was thermostatically kept at 25 ± 1 °C. Figure 6. Distribution ratio of Nd and Fe as a function of the concentration of D2EHPA in a small-scale solvent extraction set-up (Vorg/Vaq = 1; 1 h shaking at 1500 rpm on an adaptable vortex mixer). The aqueous phase was a leachate (citric acid and acetic acid 1 M; S:L 1g /50 mL; 25 ◦C; 24 h; 400 rpm stirring) using D2EHPA in Solvent 70 solutions as extracting agents, while temperature was thermostatically kept at 25 ± 1 ◦C. 14 of 17 14 of 17 Metals 2018, 8, 721 Metals 2018 8 x FO etals 2018, 8, 721 14 of etals 2018, 8, x FOR PEER REVIEW 14 o Figure 6. Distribution ratio of Nd and Fe as a function of the concentration of D2EHPA in a small‐ scale solvent extraction set‐up (Vorg/Vaq = 1; 1 h shaking at 1500 rpm on an adaptable vortex mixer) . The aqueous phase was a leachate (citric acid and acetic acid 1 M; S:L 1g /50 mL; 25 °C; 24 h; 400 rpm stirring) using D2EHPA in Solvent 70 solutions as extracting agents, while temperature was thermostatically kept at 25 ± 1 °C. Figure 6. 4. Conclusions 4. Conclusions Faster leaching kinetics observed in the case of acetic acid and citric acid can be attributed to the elemental redistribution during roasting and By total dissolution of the roasted NdFeB magnet powder in aqua regia, the composition of the magnet was determined to be consistent with that found in the market. Lower percentages of some elements, such as Fe, pointed towards the presence of oxygen due to air contact during roasting. SEM analysis of the neodymium magnet powder before and after roasting showed significant changes in the morphology of the powder. EDX showed the composition of the powder was composed of NdFeB matrix and further confirmed the redistribution of the elemental composition that ensued after roasting. In the HD NdFeB magnet powder, the elemental composition was even throughout the particles observed before roasting. By contrast, in the roasted NdFeB magnet powder, elemental composition was significantly more uneven, with some parts containing significantly higher amounts of REEs, while others contained higher amounts of Fe. Faster leaching kinetics observed in the case of acetic acid and citric acid can be attributed to the elemental redistribution during roasting and sieving. of acetic acid and citric acid can be attributed to the elemental redistribution during roasting and sieving. Acetic acid and citric acid showed good leaching properties for REEs, Fe, and Co. Of all the Acetic acid and citric acid showed good leaching properties for REEs, Fe, and Co. Of all the concentrations studied, 1 mol/L citric acid and 1 mol/L acetic acid exhibited the best leaching Metals 2018, 8, 721 15 of 17 properties. Over 95% of REEs were leached after 24 h with 1 mol/L acetic acid, while REEs were leached almost quantitatively after 24 h with 1 mol/L citric acid. Co-leaching of Fe and Co into the solution could not be avoided due to similar dissolution properties as the REEs, and both were leached >95% in both 1 mol/L citric acid and 1 mol/L acetic acid after 24 h. Changing the S:L ratio from 1/30 to 1/80 g/mL in 1 mol/L citric acid after 24 h showed no difference in leaching efficiency, while 1 mol/L acetic acid after 24 h showed significantly less Fe leached with a S:L ratio 1/30 g/mL. 4. Conclusions 4. Conclusions When making preliminary solvent extraction tests with 1 mol/L D2EHPA in Solvent 70 on the leachates in 1 mol/L citric acid and acetic acid, the REEs distribution ratios increased with increasing D2EHPA concentration from 0.2 mol/L to 1 mol/L. Higher distribution ratios were achieved in acetic acid with higher SF between Nd and Fe, but good separation between Nd and Fe was achieved in extraction from 1 M citric acid leachate. The study showed significant results with respect to organic acids leaching and further extraction of REEs from the leachate using D2EHPA. A further development in this direction would be beneficial, especially using mixer-settler bench scale systems, to further determine the process parameters for efficient separation of REEs from Fe. Author Contributions: Conceptualization: M.G., C.R.; Methodology: M.G., C.R.; Software: F.E., B.-M.S.; Validation: M.G., T.R.; Formal analysis: M.G., C.R., F.E.; Investigation: M.G., C.R.; Resources: T.R., B.-M.S.; Data curation: M.G., C.R., F.E.; Writing—original draft preparation: M.G.; Writing—review and editing: M.G., B.-M.S., T.R.; Visualization: M.G., C.R.; Supervision: T.R.; Project administration: B.-M.S.; Funding acquisition: T.R., B.-M.S. Funding: The research leading to these results has received funding from the European Community’s Seventh Framework Programme ([FP7/2007–2013]) under grant number No. 607411 (MC-ITN EREAN: European Rare Earth Magnet Recycling Network). This publication reflects only the authors’ views, exempting the Community from any liability. Project website: http://www.erean.eu. The authors would like to extend special thanks to the ENVIREE project (Environmentally friendly and efficient methods for extraction of rare-earth elements (REE) from secondary sources-ERA-MIN project 2015–2017) contribution with additional funding. Acknowledgments: The authors would like to extend special thanks to Burçak Ebin for the help w XRD measurements. Conflicts of Interest: The authors declare no conflict of interest. Author Contributions: Conceptualization: M.G., C.R.; Methodology: M.G., C.R.; Software: F.E., B.-M.S.; Validation: M.G., T.R.; Formal analysis: M.G., C.R., F.E.; Investigation: M.G., C.R.; Resources: T.R., B.-M.S.; Data curation: M.G., C.R., F.E.; Writing—original draft preparation: M.G.; Writing—review and editing: M.G., B.-M.S., T.R.; Visualization: M.G., C.R.; Supervision: T.R.; Project administration: B.-M.S.; Funding acquisition: T.R., B.-M.S. References 1. Firdaus, M.; Rhamdhani, M.A.; Durandet, Y.; Rankin, W.J.; McGregor, K. Review of High-Temperature Recovery of Rare Earth (Nd/Dy) from Magnet Waste. J. Sustain. Metall. 2016, 2, 276–295. [CrossRef] 1. Firdaus, M.; Rhamdhani, M.A.; Durandet, Y.; Rankin, W.J.; McGregor, K. Review of High-Temperature Recovery of Rare Earth (Nd/Dy) from Magnet Waste. J. Sustain. Metall. 2016, 2, 276–295. [CrossRef] Firdaus, M.; Rhamdhani, M.A.; Durandet, Y.; Rankin, W.J.; McGregor, K. Review of High-Temperature Firdaus, M.; Rhamdhani, M.A.; Durandet, Y.; Rankin, W.J.; McGregor, K. Review of High-Temperature Recovery of Rare Earth (Nd/Dy) from Magnet Waste. J. Sustain. Metall. 2016, 2, 276–295. [CrossRef] g g p Recovery of Rare Earth (Nd/Dy) from Magnet Waste. J. Sustain. Metall. 2016, 2, 276–295. [CrossRef 2. European Commission. Critical Raw Materials for the EU; Report of the Ad-hoc Working Group on Defining Critical Raw Materials: Brussels, Belgium, 2018. 2. European Commission. Critical Raw Materials for the EU; Report of the Ad-hoc Working Group on Defining Critical Raw Materials: Brussels, Belgium, 2018. g 3. Binnemans, K.; Jones, P.T.; Blanpain, B.; Van Gerven, T.; Yang, Y.; Walton, A.; Buchert, M. Recycling of rare earths: A critical review. J. Clean. Prod. 2013, 51, 1–22. [CrossRef] 3. Binnemans, K.; Jones, P.T.; Blanpain, B.; Van Gerven, T.; Yang, Y.; Walton, A.; Buchert, M. Recycling of rare earths: A critical review. J. Clean. Prod. 2013, 51, 1–22. [CrossRef] 4. Guyonnet, D.; Planchon, M.; Rollat, A.; Escalon, V.; Tuduri, J.; Charles, N.; Vaxelaire, S.; Dubois, D.; Fargier, H. Material flow analysis applied to rare earth elements in Europe. J. Clean. Prod. 2015, 107, 215–228. [CrossRef] 4. Guyonnet, D.; Planchon, M.; Rollat, A.; Escalon, V.; Tuduri, J.; Charles, N.; Vaxelaire, S.; Dubois, D.; Fargier, H. Material flow analysis applied to rare earth elements in Europe. J. Clean. Prod. 2015, 107, 215–228. [CrossRef] 5. Rollat, A.; Guyonnet, D.; Planchon, M.; Tuduri, J. Prospective analysis of the flows of certain rare earths in 4. Guyonnet, D.; Planchon, M.; Rollat, A.; Escalon, V.; Tuduri, J.; Charles, N.; Vaxelaire, S.; Dubois, D.; Fargier, H. Material flow analysis applied to rare earth elements in Europe. J. Clean. Prod. 2015, 107, 215–228. [CrossRef] 5. Rollat, A.; Guyonnet, D.; Planchon, M.; Tuduri, J. Prospective analysis of the flows of certain rare earths in Europe at the 2020 horizon. Waste Manag. 2016, 49, 427–436. [CrossRef] [PubMed] 5. Rollat, A.; Guyonnet, D.; Planchon, M.; Tuduri, J. References Önal, M.A.R.; Chenna, E.A.; Borra, R.; Blanpain, B.; Gerven, T.V.; Guo, M. Recycling of NdFeB magnets using nitration, calcination and water leaching for REE recovery. Hydrometallurgy 2017, 167, 115–123. [CrossRef] nitration, calcination and water leaching for REE recovery. Hydrometallurgy 2017, 167, 115–123. [CrossRef] 16. Xie, F.; Zhang, T.A.; Dreisinger, D.; Doyle, F. A critical review on solvent extraction of rare earths from aqueous solutions. Miner. Eng. 2014, 56, 10–28. [CrossRef] 16. Xie, F.; Zhang, T.A.; Dreisinger, D.; Doyle, F. A critical review on solvent extraction of rare earths from aqueous solutions. Miner. Eng. 2014, 56, 10–28. [CrossRef] 17. Riano, S.; Binnemans, K. Extration and separation of neodymium and dysprosium from used NdFeB magnets: an application of ionic liquids in solvent extraction towards the recycling of magnets. Green Chem. 2015, 17, 2931–2942. [CrossRef] 18. Shabani, M.A.; Irannajad, M.; Azadmehr, A.R. Investigation on leaching of malachite by citric acid. Int. J. Miner. Metall. Mater. 2012, 19, 782–786. [CrossRef] 19. Astuti, W.; Hirajima, T.H.; Sasaki, K.; Okibe, N. Comparison of effectiveness of citric acid and other acids in leaching of low-grade Indonesian saprolitic ores. Miner. Eng. 2016, 85, 1–16. [CrossRef] 20. Park, H.; Jung, K.; Alorro, R.D.; Yoo, K. Leaching Behavior of Copper, Zinc and Lead from Contaminated Soil with Citric Acid. Mater. Trans. 2013, 54, 1220–1223. [CrossRef] 21. Josso, P.; Roberts, S.; Teagle, D.A.H.; Pourret, O.; Herrington, R.; Albarran, P.L. Extraction and separation of rare earth elements from hydrothermal metalliferous sediments. Miner. Eng. 2018, 118, 106–121. [CrossRef] 22. Fujimoto, J.; Tanaka, K.; Watanabe, N.; Takahashi, Y. Simultaneous recovery and separation of rare earth elements in ferromanganese nodules by using Shewanella putrefaciens. Hydrometallurgy 2016, 166, 80–86. [CrossRef] 23. Astuti, W.; Hriajima, T.; Sasaki, K.; Okibe, N. Comparison of atmospheric citric acid leaching kinetics of nickel from different Indonesian saprolitic ores. Hydrometallurgy 2016, 161, 138–151. [CrossRef] 24. Vandenberghe, L.P.S.; Soccol, S.R.; Pandey, A.; Lebeault, J.M. Microbial production of citric acid. Braz. Arch. Biol. Technol. 1999, 42, 263–276. [CrossRef] 25. McDonald, R.G.; Whittington, B.I. Atmospheric acid leaching of nickel laterites review: Part I. Sulphuric acid technologies. Hydrometallurgy 2008, 91, 35–55. [CrossRef] 26. Brown, M.A.; Kropf, A.J.; Paulenova, A.; Gelis, A.V. Aqueous complexation of citrate with neodymium(iii) and americium(iii): A study by potentiometry, absorption spectrophotometry, microcalorimetry, and XAFS. Dalton Trans. 2014, 43, 6446–6454. [CrossRef] [PubMed] 27. Nam, J.S.; Kim, A.R.; Kim, D.M.; Chang, T.S.; Kim, B.S.; Bae, J.W. References Prospective analysis of the flows of certain rare earths in Europe at the 2020 horizon. Waste Manag. 2016, 49, 427–436. [CrossRef] [PubMed] 6. Behera, S.S.; Parhi, P.K. Leaching kinetics study of neodymium from the scrap magnet using acetic acid. Sep. Purif. Technol. 2016, 160, 59–66. [CrossRef] 6. Behera, S.S.; Parhi, P.K. Leaching kinetics study of neodymium from the scrap magnet using acetic acid. Sep. Purif. Technol. 2016, 160, 59–66. [CrossRef] 7. Yang, Y.; Walton, A.; Sheridan, R.; Güth, K.; Gauß, R.; Gutfleisch, O.; Buchert, M.; Steenari, B.M.; Gerven, T.V.; Jones, P.T.; et al. REE Recovery from End-of-Life NdFeB Permanent Magnet Scrap: A Critical Review. J. Sustain. Metall. 2017, 3, 122–149. [CrossRef] 8. Alonso, E.; Sherman, A.M.; Wallington, T.J.; Everson, M.P.; Field, F.R.; Roth, R.; Kirchain, R.E. Evaluating Rare Earth Element Availability: A Case with Revolutionary Demand from Clean Technologies. Environ. Sci. Technol. 2012, 46, 3406–3414. [CrossRef] [PubMed] 9. Önal, M.A.R.; Borra, C.R.; Guo, M.; Blanpain, B.; Van Gerven, T. Recycling of NdFeB Magnets Using Sulfation, Selective Roasting, and Water Leaching. J. Sustain. Metall. 2015, 1, 199–215. [CrossRef] 16 of 17 16 of 17 Metals 2018, 8, 721 10. Yoon, H.-S.; Kim, C.; Chung, K.W.; Lee, S.-J.; Joe, A.-R.; Shin, Y.-H.; Lee, S.; Yoo, S.-J.; Kim, J.-G. Leaching kinetics of neodymium in sulfuric acid from E-scrap of NdFeB permanent magnet. Korean J. Chem. Eng. 2014, 31, 706–711. [CrossRef] 1. Lee, C.; Chen, Y.; Liao, C.; Popuri, S.R.; Tsai, S.; Hung, C. Selective Leaching Process for Neodym Recovery from Scrap Nd-Fe-B Magnet. Metall. Mater. Trans. 2013, 44, 5825–5833. [CrossRef] 12. Lyman, J.W.; Palmer, G.R. Scrap Treatment Method for Rare Earth Transition Metal Alloys. U.S. Patent 5,129,945, 14 July 1992. 13. Gergoric, M.; Ekberg, C.; Foreman, M.R.J.; Steenari, B.M.; Retegan, T. Characterization and Leaching of Neodymium Magnet Waste and Solvent Extraction of the Rare-Earth Elements Using TODGA. J. Sustain. Metall. 2017, 3, 638–645. [CrossRef] 14. Parhi, P.K.; Sethy, T.R.; Rout, P.C.; Saranji, K. Separation and recovery of neodymium and praseodymium from permanent magnet scrap through the hydrometallurgical route. Sep. Sci. Technol. 2016, 51, 2232–2241. [CrossRef] 15. Önal, M.A.R.; Chenna, E.A.; Borra, R.; Blanpain, B.; Gerven, T.V.; Guo, M. Recycling of NdFeB magnets using nitration, calcination and water leaching for REE recovery. Hydrometallurgy 2017, 167, 115–123. [CrossRef] 16. Xie, F.; Zhang, T.A.; Dreisinger, D.; Doyle, F. A critical review on solvent extraction of rare earths from 15. References Novel heterogeneous Rh-incorporated graphitic-carbon nitride for liquid-phase carbonylation of methanol to acetic acid. Catal. Commun. 2017, 99, 141–145. [CrossRef] 28. Zanonato, P.L.; Bernardo, P.; Bismondo, A.; Rao, L.; Choppin, G.R. Thermodynamic Studies of the Complexation between Neodymium and Acetate at Elevated Temperatures. J. Solut. Chem. 2001, 30, 1–18. [CrossRef] 29. Cotton, S. Lanthanide and Actinide Chemistry; John Wiley & Sons: Chichester, UK, 2006; ISBN 9780470010082. 30. Nash, K.L.; Jensen, M.P. Analytical-scale separations of the lanthanides: A review of techniques and fundamentals. Separ. Sci. Technol. 2001, 36, 1257–1282. [CrossRef] 31. Geist, A.; Nitsch, W.; Kim, J. On the kinetics of rare-earth extraction into D2EHPA. Chem. Eng. Sci. 1999, 54, 1903–1907. [CrossRef] Metals 2018, 8, 721 17 of 17 32. Tunsu, C.; Petranikova, M.; Gergori´c, M.; Ekberg, C.; Retegan, T. Reclaiming rare earth elements from end-of-life products: A review of the perspectives for urban mining using hydrometallurgical unit operations. Hydrometallurgy 2015, 156, 239–258. [CrossRef] 33. Awais, M.; Coelho, F.; Degri, M.; Herraiz, E.; Walton, A.; Rowson, N. Hydrocyclone Separation of Hy Decrepitated NdFeB. Recycling 2017, 2, 22. [CrossRef] 34. Swain, B.; Cho, S.S.; Lee, G.H.; Lee, C.G.; Uhm, S. Extraction/Separation of Cobalt by Solvent Extraction: A Review. Korean Soc. Ind. Eng. Chem. 2015, 26, 631–639. 35. Karakaplan, M.; Tural, S.; Tural, B.; Turgut, Y.; Hosgoren, H. The Solvent Extraction of Boron with Synthesized Aliphatic 1,3-Diols: Stripping and Extraction Behavior of Boron by 2,2,5-Trimethyl-1,3-hexanediol. Solvent Extr. Ion Exch. 2004, 22, 897–911. [CrossRef] 36. Gergoric, M.; Ekberg, C.; Steenari, B.M.; Retegan, T. Separation of Heavy Rare-Earth Elements from Light Rare-Earth Elements Via Solvent Extraction from a Neodymium Magnet Leachate and the Effects of Diluents. J. Sustain. Metall. 2017, 3, 601–610. [CrossRef] © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
https://openalex.org/W2091086070
https://zenodo.org/records/2490933/files/article.pdf
English
null
Unique Equipment for the Unwateringg of New York City's Great Aqueduct, The Problem of Mexico, and more
Scientific American
1,916
public-domain
6,966
By Robert G. Skerrett M DCH has been written about the vari­ ous phases of the great aqueduct which is to .carry water from the Catskill mountains to New York city, a hundred and more miles away. General interest has beeD aroused in this engineering project which, in some particulars, is a more difficult undertaking than the Pan­ ama Canal; but the public has been largely absorbed in the structural details, pure and simple. The technical task, however, is not that alone of providing a conduit for the water and then expecting that beneficent flood to flow on through stone-hewn arteries for generations to come without further consideration. Within this boat is installed the electric pumping plant with a capacity of some­ thing like 5,500,000 gallons daily. It con­ tains two 4-stage vertical, centrifugal pumps, each provided with a direct-con­ nected electric motor. These pumps dis­ charge into a 10-inch pipe which rises vertically from the center of the boat. The discharge pipe is connected, by means of a special gooseneck pipe, to a small chamber from which the water flows away into a nearby stream or sewer. The manner of operating the pumps and the boat. arranging the exhaust conduit is interest­ ing. When everything is ready, and the operator or operators in charge of the boat are at their stations, the pumps are started, and at once they begin the task of removing the water beneath the boat and thus promoting its gradual descent into the shaft. Power plant of the Hudson River siphon Note the reel of cable supplying energy for the pumps and I1ghts carried by the boat. Power plant of the Hudson River siphon ble supplying energy for the pumps and I1ghts c As a matter of fact, the aqueduct must be available for inspection throughout every part of it, and this is the engineer's defense against deterioration, breakdown, and the menace to health if not the denial of sufficient water to the ceaselessly increasing millions of the na­ tion's Metropolis.. So, too, from time to time various sections of the aqueduct must be subjected' to one test or another, and the.;;e should properly simulate the cir­ cumstances or stresses of maximum service. By Robert G. Skerrett Because of these requirements it· will be necessary at intervals to unwater or drain great stretches of the aqueduct and to withdraw from its tunnels and shafts and pipe lines millions upon millions of gallons of water, and to do this with all reasonable dispatch. The pumping boat at the bottom of the drainage shaft of the Hudson River siphon. It carries four two-stage vertical centrifugal pumps In this fashion, the water is lowered about 20 feet. Then, the discharge pipe Is disconnected from the gooseneck pipe which has followed it down, and another 20-foot length of discharge pipe is interposed in the line, the gooseneck joined to tbe upper end of the new section, and pumping resumed. Again, when the boat has gone down a score more feet, then the joint with the gooseneck is broken and an additional link in the discharge pipe inserted. The making and breaking of the joints is effected quickly, and the pumping operations are continued day and night until the water is removed in this way from the shafts and tunnels. The engineers of the Board of Water Supply of the city of New York have made preparation for just such contingencies, and the drainage equipment for the Rondout pressure tunnel and the Hudson River siphon are distinctly unique. 'l'hey are this because of the conditions imposed and the facilities devised to meet successfully these unusual circumstances. The Rondout pressure tunnel contains 30,000,000 gallons of water, and to drain that portion of the aqueduct the greater part of that water must be lifted 500 feet! Again, in dealing with the Hudson River siphon, the pumping out in that case finally imposes the unparalleled task of raising the water from a depth of 1,114 feet below tide level. It called for some study upon the part of Mr. J. Waldo Smith, the Chief Engineer, and his able asso­ ciates before the plan ultimately adopted was decided upon. f One of our illustrations shows the pumping equip­ ment at the bottom of the Hudson River shaft, nearly 1,150 feet below the top of the chamber, and supporting the pipe column which is absolutely watertight. In working against this great head, the pumps have been operated in series after reaching a depth of 650 feet, i. Unique Equipment for the Unwatering of New York City's Great Aqueduct a cylindrical boat or float. This carries the pumping outfit. It is 12 feet 9 inches in diameter. with it total depth of 30 feet, and when bearing its final load will have a freeboard of a little short of 2% feet above the surface of the water. Power plant of the Hudson River siphon Note the reel of cable supplying energy for the pumps and I1ghts carried by the boat. By Robert G. Skerrett By Robert G. Skerrett e., one pump exhausts into the other, and by this step·up process the water is finally raised to the ground level. Some idea of the service required can be gath­ ered from the fact that the discharge end of one of the pumps reaches a pressure of about 525 pounds to the square inch. To prevent excessive leakage due to this high pressure the engineers of the Water Supply Board were obliged to devise a special form of metal packing for the stuffing-boxes on the shafts of the pumps. Noth­ ing suitable for the work was available in the market. Th f th l t i d th t f The pumping boat at the bottom of the drainage shaft of the Hudson River siphon. It carries four two-stage vertical centrifugal pumps The gooseneck secured to the drainage pipe leading up from the boat in the shaft. Note the crane and counterweight of the gooseneck There were many different schemes suggested, and these eventually narrowed down to the following: (1) Use of compressed air. (2) Automatic bailing device, such as commonly used in mines. (3) Artesian well pumps in separate shafts. (3) Artesian well pumps in separate shafts. (4) Mine sinking pumps (4) Mine sinking pumps. (5) Pumping equipment to be located on a float and follow the water down. Of these the last method 'was chosen because it promised to be the most suitable for the problem, both on account of the minimum amount of machinery needed and the cost of masonry work involved. The drainage shaft in the case of the Hudson River siphon is the exploratory shaft on the east side of the river which was originally driven in order to determine how deep it would be necessary to go in order to get thoroughly sound rock for the tunnel running from shore to shore beneath the river. This shaft really forms an integral part in the water supply system. At a depth of 192 feet below tide level there is a connecting tunnel reaching back into the mountain for 800 feet and there linked up with the aqueduct extending southward to the city. Of these the last method 'was chosen because it promised to be the most suitable for the problem, both on account of the minimum amount of machinery needed and the cost of masonry work involved. The Problem of Mexico Our national history has proved ' that the militia, as at present organized, is a force of ,doubtful utility; and to spend an additional $75,000,000 a year upon an experiment which has proved to be a failure is the supremest folly. Furthermore, as we noted in our issue of April 15, throughout all this at­ tempted army legislation there has been maintained a powerful lobby of militiamen in Washington. Hence the House and the Senate now stand committed to a paid militia with all the political abuses which will inevitably arise, should this element in the bills be jammed'through the House and Senate Conference Committee. The military propaganda in Washington, emboldened by its success, would now seek to ,consolidate itself preparatory to a fresh advance. This has ever been the history of pernicious political movements of this character. We repeat that, unless the country wakes up to the sinister meaning of what has hap­ pened, representative government itself will' be threat­ ened, and the only militarism which we have to fear, namely, a military force using political influence to gain for its members special consideration under the law, will not only be found in our midst, but will soon set itself to the task of becoming the dominant political power. On the other hand there are certain purposes for which it is essential that the record of time shall fur­ nish some indication of the local hour·angle of the sun. Suppose, for example, it is a question of drawing a curve to show the daily march of temperature. The time coordinates of such a curve would be meaningless for both practical and scientific purposes if labeled in Greenwich hours; unless, of course, the place to which the data referred happened to lie on the meridian of Greenwich. It should be noted that the standard time now' in vogue is also, though in a less degree, inappro­ priate for such uses, except in reference to events that occur on one of the standard meridians. Indeed, for refined observations we need not only local time, but "apparent" (or sundial) time. Our record in the Philippines stands as a proof of our good faith, which we commend to the con­ sideration of the Mexicans and the smaller American republics. A Federalization that W outd Be Fatal Charles Allen Munn. President. Frederick C. Beach, Secretary, Orson D. Munn. Treasurer. all at 233 Broadway T , r T HE Hay bill and the Chamberlain bill have been , passed respectively by the House and the Senate. In the Senate, where the present diplomatic con· troversy with Germany undoubtedly had its effect, the Chamberlain bill was carried with scarcely a dozen Senators opposed to it, and it went through without a roll call. This bill authorizes a regular army of 250,000 men as against the 140,000 provided in the Hay bill; 261,000 volunteers, and 275,000 state militia sub­ ject to federal call. The bill also provides a system of military training for students in schools and colleges, application for the training to be purely voluntary, with the understanding that all students over eighteen years of age, by volunteering, obligate themselves to answer any fe,deral call to the colors which may be issueq. by the President during their training period. Entered at the Post Ot'l!ce ot New York, N. Y .. as Second Class Ma,tter Entered as Second Class Matter at the Post Ot'l!ce Department, Cauada Trade Mark Registered in the United States Patent Ot'l!ce Copyright 1916 by [lunn & Co., Inc. Great Britain rights reserved a a g Illustrated articles must not be reproduced without permission y The answer is easy. We have inherited from our remote ancestors their primitive conceptions of the time 0' day, just as we have inherited many other primitive conceptions which, but for the mental inertia of our species, would have passed into oblivion long ago. Early man found himself provided with a ready-made timepiece in the shape of the sun. Sunrise, high noon, and sunset were the events that marked off the progress of the day. The daylight period, or "natural day," which circumscribed most human activities, was the all-important time-interval. Even when the ancients divided their day into hours, it was the natural and not the civil day that was so divided. In Greece and Rome there were 12 hours between sunrise and sunset -hours that were long in summer and short in winter. The Problem of Mexico T T HE drift of events during the past few years, and particularly during the past few weeks, has forced the conviction that some day, sooner or later, and rather sooner than later, the United St!!tes will be driven to the necessity of bringing order out ,of the universal chaos which prevails in Mexico; anq In this connection we direct special attention to tɀe article in the present issue on that country, written by ,one wJ?o has made a special study of the complicated problems of that sorely distracted land. The fact that the author of the article is a military man lends particular significance to his conviction that the restoration of Mexico is as much, if not more, a question of civil reform than of military force. As a matter of fact it calls for the exe .. ·cise of both, military force being employed only in such sufficiency as would provide for the introduction and permanent operation of civil reforms. Under the suggested arrangement the amount appro­ priated annually for the militia would have to be increased from the present sum of $6,000,000 to a total for the proposed militia of 275,000 of $75,000,000. Now $75,000,000 would build, equip and maintain three battle-cruisers a year, and we ask those members of the Senate who have voted for this section of the bill, whether a steady addition of three battle-cruisers a year to our fieet would not be a far more powerful deterrent to any possible enemy than the existence of a body of what any European army would call com­ paratively raw ,and untrained troops; for such the militia always has been and in the very nature of things must ever be. Let us, for example, take the case of Germany, whose troops undergo two years. qf continuous intensive training. To her military mind, our militia, who ' receive only forty-eight drills at night in armories and not to ,exceed ten days a year in camp, are not trained soldiers and under existing conditions never can be regarded as first-line effectives. This is not the fault of the militia, but of the system upon which it has been planned and under which it exists. We have the greatest regard for the militiaman as such, and if he is not. The Problem of Mexico Our success in the pacification of the Philippines constitutes a high tribute to the character and ability of our officials. The dishonest white found himself in Bilibed prison as quickly as did the dishonest native; the self·seeking American office holder was soon given his papers; the inefficients were sidetracked. The insular government, acting as would a great sieve con­ tinually shaken with violence, retained only the men of large caliber and broad outlook; a few years of that strenuous administration left only the big men in office. The Philippine occupation forms one of the brightest chapters in the history of our civil and military admin­ istration. There was evidence of unselfish devotion to a high ideal-as witness the case of one Governor-General who turned his salary back into public works. It is a fact that, in all our years of occupation, not a single American official down there has accumulated even a small competence. One might hazard the prediction that the day will come when only one kind of standard time will be used throughout the world-viz., that of the meridian of Greenwich-but this does not mean that we can do without local time. Probably the present system of time zones, with their very irregular boundaries (de­ termined in America by the exigencies of the railways and in Europe by political frontiers), could be aban­ doned altogether. The clocks in railway stations and telegraph offices might keep identical time in England, India, China and America. The curious fictIon of the In­ ternational Date Line could be given up. We might even apply the nomenclature of the Greenwich clock to our office hours and our meal hours. It would, at first, seem strange to the New Yorker to begin work at 4 A. M. instead of 9 A.M., and dine at 2 P.M. instead of 7 P.M., but as these changes would be merely nom­ inal and involve no dislocation of his habits with re­ spect to daylight and darkness, he would soon become accustomed to them. , In the present defenseless condition of the country every dollar that is spent for defense should be spent to the best possible advantage. The Problem of Mexico as he cannot in the nature of things be, a first-class soldier, since he lacks the soldier's training and experience, it is not the militia- man's fault. , It has been predicted that the complete conquest of Mexico would need the employment of five hun­ dred thousand troops. Probably it would take that number ' to Belgiumize Mexico, but the United States has neither the heart, nor the wish, nor the peculiar form of genius for a task of that kind. When we take hold of the Mexican problem with a firm hand and a definite purpose, we must act in the same spirit in which we entered Cuba and the Philippines. Our policy and its results in those once unhappy islands are of record. The motives were humanitarian, and the splen­ did results, as given in the article above referred to, stand as a proof of our altruistic attitude to the Philip- pine peopie. , But only ·the astronomer and the mariner have com­ pletely broken away from the parochial time-keeping system of antiquity, and then only for certain purposes. Greenwich time prevails in the observatory, but must frequently be translated into local time. Ships' chron­ ometers keep Greenwich time, but ships' bells a make­ shift local time. The idea of making Greenwich mean time universal is not a new one. When standard time was adopted in America there were many advocates of the plan of using one kind of time instead of five. The International Time Conference which met in Paris in 1912 declared that" the universal time shall be that of Greenwich," and the wireless time signals of the world are now based upon this decision. All humanity is actuated 1;ly the same basic impulses, and of all the emotions the love of offspring is the strongest and most nearly universal. Hence the se­ curity of the home is the only assured foundation of government. Our success in the Philippines was directly due to the recognition of these fundamental conditions by those who had charge of our affairs out there. It took but a few years for the United States government to bring peace after a long period of alien domination. Compare thi/! with the situation in Formosa, where the natives are still resisting Japan after all her lopg years of occupation. A Federalization that W outd Be Fatal The advantages of using hours of uniform length were so little appreciated, that the more elaborate forms of water-clock, or clepsydra, were, with great ingenuity, constructed so as to vary their pace with the season; an expedient comparable in its naivetll with the at­ tempts made in comparatively modern times to con­ struct mechanical clocks that should take account of the equation of time and keep pace with the sun·dial. One can imagine the perplexity in which an ancient Greek or Roman horologist would have found himself involved if he had traveled to circumpolar ,latitudes, where the "natural" day, at its maximum, lasts for weeks or months, and each of its "hours" (according to the classical conception of this time-unit) would be several modern days in length. l'he object of this jO!wnal is to record accurately and lucidly the latest scientific, mechanical and industrial news of the day. As a weekly journal, it is in a post­ tion to announce interesting developments before they are published elsewhere. The Editor is glad to have submitted to him timely articles suitable for these columns, especially when such articles are accompanied by photographs. We shuld feel more inclined to congratulate the Sena'te on the passage of this bill, were it not that it contains the same serious defect that mars the Hay bill, as passed by the House. In both cases, the so­ called federalization of the militia, which includes among other provisions the payment of that body, is distinctly unconstitutional. The Judge Advocate Gen­ eral of the army has given it as his opinion that dis­ obedience on the part of a member of such a federalized ilitia would not constitute an act for which the man ,could be tried by federal court-martial, and this because of the inevitable clash between the proposed federal and the existing state authority. By Robert G. Skerrett The drainage shaft in the case of the Hudson River siphon is the exploratory shaft on the east side of the river which was originally driven in order to determine how deep it would be necessary to go in order to get thoroughly sound rock for the tunnel running from shore to shore beneath the river. This shaft really forms an integral part in the water supply system. At a depth of 192 feet below tide level there is a connecting tunnel reaching back into the mountain for 800 feet and there linked up with the aqueduct extending southward to the city. The boat is steadied vertically by means of concrete guides formed upon the surface of the shaft. This prevents any rotary motion. The boat with its equip­ ment can be brought to the' surface again when the siphon is refilled or it can be hoisted out. When this is done the equipment is dismantled at the bottom of the shaft and raised piece by piece. The final step con­ sists in bringing up the float itself, which weighs about 14 tons. The pumping machinery can be used else­ where, and is designed to be taken from place to place and reinstalled in other floats for the same service. The gooseneck secured to the drainage pipe leading up from the boat in the shaft. Note the crane and counterweight of the gooseneck Ordinarily this shaft on the eastern shore of the Hudson is entirely filled with water, and the top of it is under a " head" of a little Qver 400 feet, because of the height of the water in the aqueduct passing through the mountains east and west of the river. Therefore, it is necessary to cap and seal this shaft by a huge dome of steel cast in one piece. This is removed when the shaft is to be drained. But before this is done the water in the system above this point is allowed to escape through blow-outs until the level is brought down to that of the tide. Then, something like 40,000,000 gal­ lons remain to be pumped out in order to drain the siphon and the tributary parts of the aqueduct lying below the tide level. The drainage shaft has a diameter of 14 feet. In a chamber just above tide level is stored © 1916 SCIENTIFIC AMERICAN, INC SCIENTIFIC AMERICAN curious is the result of telegraphing in the opposite direction. A message is wired from Greenwich at noon, and it reaches New York at seven o'clock in the morn­ ing of the same day-five hours earlier than it was sent! elsewhere in this issue, there is not a branch of the government )vhich these men, rich in their Philippine experience, could not direct with a minimum of friction and administer with supreme honesty and with a single eye to the ultimate benefit of Mexico. These statements involve contradictions in terms with which we have become so familiar that they have lost their strangeness. Nevertheless the contradictions re­ main. When it is natO in London it is neither more nor less than now in Calcutta and New York. Call it what you like, the time remains identical. But why this bewildering diversity of "times, ': when there is really only one time? The Problem of Mexico Should the course of events (or Destiny if you will) necessitate our pacification of Mexico, we have not only the power to take over and administer the country but we have the men, I,tll well known, most of them available, and few of whom would not be willing to undertake any personal sacrifice if called upon by the President. There are men who have lived for years among Spanish speaking and Spanish thinking people; men who have made the trial, partially failed, profited by their failures and tried again. Should we under­ take such a limited military occupation as is suggested SCIENTIFIC AMERICAN April 29, 1916 444 Aeronautics Noel Pemberton-Billing, lately elected on the air preparedness issue, stated that a series of casualties with a total of 150 dead, 150 wounded and 105 missing was due to the sending of British aviators to the front in aeroplanes which were outclassed hope­ lessly by German machines. Harold J. Tennant, Parlia­ mentary Secretary ,of the War Office, made conciliatory answers to these charges and assured Mr. Pemberton­ Billing that he was wholly misinformed, although ad­ mitting that at present a majority of German machines were probably faster than the bulk of the British ma­ chines. He added, however, that the disadvantage was only a temporary one, and the near future would wit­ ness the British aviators on superior mounts. A Divided Exhaust Manifold.-What appears to be an excellent idea is the divided exhaust manifold that l':\s been adopted by one manufacturer. It has been more than suspected that the ordinary type of exhaust manifold is not conducive to a free escape of the gases, as the violent discharge of cylinder nearest the outlet of the manifold is likely to back up the previously dis­ charged gases from cylinders nearer the dead end of the manifold. In the design in question, which is for a four-cylinder engine, the manifold is composed of two separate passages contained in a single casting, which combine in a single outlet. Cylinders 1 and 4 connect with one of these passages, and cylinders 3 and 2 with the other, which would appear to give the gases an ample opportunity to establish a· flow in the right direc­ tion before they are broken up by an opposing discharge. Heart Action at Great Altitudes.- Dr. G. Ferry, a Frenchman enjoying the rank of Aide-Major de 2e classe au Pare d'Aviation, brings forth some interesting facts regarding blood pressure at- various heights in a recent issue of La Presse Medical, which are based on careful records made during a number of flights. His conclusions are: The pulse becomes more and more rapid from the ground up to a height of 750 meters. From this height to 1,250 meters it still augments, but less rapidly. Above this height it again accelerates more rapidly. The period of slower acceleration seems to be explained by the fact that between 750 meters and 1,250 meters the air is usually calmer than at lower altitudes, and the wind more regular. Aeronautics "Fat Sparks."-A great deal is written about the efficacy of a "big, hot spark" in producing increased motor efficiency and speed; but reduced to actual facts the increasingly hot spark from a magneto, resulting from higher motor speed, is only of advantage in as far as it tends to clear the soot from the plugs. This hotter spark is the rȾsult of higher motor speed, and not the cause. The Gilbert and Ellice Islands, in the Pacillc Ocean, which were proclaimed a British protectorate in 1892, have now been annexed to the British Empire as a crown colony. The population of these islands was reported in 1911 to be 26,417 natives and 446 for­ eigners. An Aerial Ambulance, it is reported, is being built by a California manufacturer, and army aviators at San Diego, Cal., have been permitted to see it. Under the body of the aeroplane is slung a small cot, which is so fastened and constructed that it will be impossiJle for the occupant to fall out or even be shaken when the aeroplane volplanes to earth. It is understood that while the craft is en route to the hospital a trained at­ tendant will be enabled to give first aid to the patient. The Ecological SOCiety of America, which was or­ ganized at the time of the Columbus meeting of the American Association for the Advancement of Science, last December, has already enrolled more than 200 members. Dr. Victor E. Shelford, of the University of Illinois, is president; Prof. W. M. Wheeler, of Harvard University, vice-president; and Dr. Forrest Shreve, of the Carnegie Desert Laboratory, Tucson, Ariz., secre­ tary-treasurer. The SOCiety will hold an annual meet­ ing for the reading of papers, and will also organize field meetings from time to time in various parts of the country. During the present year field meetings will be held in the neighborhood of Chicago in June and at San Diego in August. Simplified Lubrication.-In view of comments re­ cently made in this column in regard to the innumerable little spots around controlling levers, brake rigging, etc. Aeronautics Above this height the cold becomes a great factor in acceleration. Each time a gust strikes the aeroplane the pulse accelerates. During a flight at a particular altitude the pulse re­ mains constant. When descent begins there is again for a very short period a quickening of the pulse, due, it is thought, to the thrill of excitement experienced when the engine is shut off. After this the frequency falls in a regular manner during a slow descent. Each " event" in the descent causes an acceleration, short, but definite. The pulse at the end of the flight is always more rapid than at the beginning. The Growing Love of Wild Birds among the people or this country is commented upon in the last annual report of the U. S. Biological Survey. Everywhere efforts are being made to increase the number of birds and attract them to the vicinity of homes. This move· ment is said to be partly !esthetic, but also partly due to a growing appreciation of the usefulness of birds as insect destroyers. The report declares that "the increase of interest in wild birds throughout the United States during the past decade has been phe­ nomenal; and organizations having for their chief ob­ ject the care and protection of birds are numbered by hundreds, if not thousands." Efforts to attract birds to city parks and suburbs have been made by many civic leagues and women's clubs. In order to aid this interesting movement the Department of Agriculture issued last year two publications, entitled "Bird Houses and How to Build Them " and "How to Attract Birds in the .Northeastern United States." The latter is the first of a series planned to cover all parts pf the country. ,These publications devote speCial attention to the kinds of fruit-bearing shrubs and trees that are important as furnishing food for birds. Ignorant Drivers.-The number of furiously steam­ ing radiators to be noticed, even on the coldest days, calls attention to the fact that the average driver of a motor vehicle has very vague ideas about operating his engine-and this is only one point in which he is lacking. The prevailing error seems to be in running with full throttle and retarded spark, a sure method of overheating the engine, and one whicli would soon result in disaster if the cooling apparatus was ·not ex­ tremely efficient. Aeronautics , which ordinarily depend for their lubrication on a varied assortment of oil and grease cups, carefully tlicked away in unsuspected corners where many of them are never found after the machine leaves the shop, H is interesting to note that an oil-less bearing has been d!:.veloped which, it is claimed, takes care of these small, but important points, and relieves the owner of much trouble and worry. A German Anti-Aircraft Gun.-The Germans are using at the present time a 104 mm. anti-aircraft Krupp gun, 45 calibers long, which sends a projectile weighing 15% kilogrammes, with a muzzle velocity of 800 meters, to a height of 4,000 meters. It can be fired at the rate of 15 rounds per minute. The shrapnel shell which it fires is said to burst into 625 fragments. Guns of this type, as well as those of 120 mm.. are the ordnance which defends Ostend. German Aviatik of New Type.-A new type of A viatik biplane was recently brought down behind the French lines. Its wings, which no longer sweep back as in the earlier types, measure 41 feet in span, with a chord of 6.4 feet. The structure is of oval steel tubing throughout. The engine is a 170 horse-poweI' Mercedes driving a Garuda tractor. The weight, empty, works out at 1,600 pounds, and the useful load, includ­ ing armament, amounts to approximately 1,300 pound3. The machine is exceptionally fast and has a Climbing speed of 4,000 to 4,500 feet in fifteen minutes. A Suggestion in Preparedness.-In the discussions .aL;out preparedness it has been prominently suggested tbat a belt line road be built around the United States, Hear the sea coast. Such a road would be of undoubted value; but enthusiasts in this direction apparently lose sight of the fundamental fact that, either for war or peace, we need good roads everywhere. Another lesson that can be drawn from the experience of Europe of late is to so build the roads that they will stand up in time of need. If our special war roads were built by the average county official they would probably not l;Iurvive actual war conditions over a week. War Changes in Geographic Names.-It is an­ nounced in La Geographie that the French admiralty has replaced the numerous German geographic names in the French subantarctic island of Kerguelen by names of French origin. Aeronautics 40-Cent Gasoline.- It is freely predicted, and with every possibility of coming true, that the price of gasoline will go to 40 cents within a short time, and this can hardly be regarded as less than a catastrophe, especially at this time when business men are just beginning to appreCiate the value of motor trucks for commercial purposes. This situation raises a point on which makers of motor vehicles have been noticeably silent, and that is the use of heavier fuels, which seel)1S to be vastly more important than some of the improve­ ments that have been occupying attention of late. An engine operating on distillate, kerosene or some other cheap fuel would be the salvation of the commercial vehicle business, and would appear to be absolutely vital where the much talked of farm tractors are con­ cerned. Zoological Station in British Guiana.- A new un­ dertaking of the New York ZoOlogical Society is the establishment of a tropical station in British Guiana, for the study of the evolution and life histories of the local fauna, especially birds. Funds for the first year's work of the station were furnished by Messrs. Cleve­ land H. Dodge, Mortimer L. Schiff, C. Ledyard Blair, James J. Hill, and George J. Gould; while the govern­ ment of British Guiana has offered the use of its botanical gardens and wild government land. The officers of the new station, who sailed from New York January 22d, comprise C. William Beebe, curator of birds in the New York ZoOlogical Park, in charge; C. Inness Hartley, P. G. Howes, and Donald Carter. It is proposed to build a bungalow at the edge of the jungle and equip it as a laboratory. One of the first birds to be studied will be the hoazin (Opisthocomus cris­ tatus), of which there are no specimens in captivity, and concerning which there has been much contro­ versy. One function of the station will be to collect and forward regular supplies of living animals for the New York" Zoo." The Causes of British Casualties among aviators was a topic of keen discussion in the House of Com­ mons recently. Aeronautics We join heartily in the wish expressed by our British contemporary Nature that similar practices may not be carried too far. Any change of this sort is a potential cause of confusion, not to mention the expense entailed upon the publishers of geographical and other reference books. We have already noted in these columns several previous changes in names due to the war. In this connection it is in­ teresting to record that German writers and publishers have almost unanimously ignored the change in the name of the Russian capital to "Petrograd." Fifteen-Ton Flying Boats for British Admiralty.­ The British Admiralty has ordered 20 triplanes similar to the 15-ton Curtis flying yacht which is now being completed at a plant near Buffalo, according to a recent statement of Henry Woodhouse, governor of the Aero Club of America. The spread of the planes of these machines will be 133 feet, and the propulsion will be supplied by four 12-cylinder, 250 horse-power motors. An auxiliary motor will be provided to drive a screw propeller, so that the craft can be navigated at slow speeds on the surface of the water. Motor Vehicles in War.- It has been quite generally recognized that France was saved, in the early days of the war, by the aid of motor vehicles, which enabled rapid mobilization of troops and supplies to be effected; and since that time, in this mechanical war, the uses, and the necessity for motor vehicles have grown to such an extent that it is fully recognized that the army that is best supplied with transportation facilities, both for men and supplies, easily dominates one of equal strength that is not so equipped. It is humiliating that our government is so oblivious to the world's progress, but some of our motor associat10ns and our National Guards, in some states, are agitating the matter of organizing military motor transportation squadrons for the purpose of study and experiment. The Dangers of Wood Alcohol are just now attract­ ing much attention, not only on the part of the public but also, fortunately, of legislative bodies. A note in Public Health Reports records the progress of the cam­ paign against this substance during the year 1915. Universal'.Time H H AVING annihilated space by means of the electric telegraph, man found himself face to face with a daily and hourly paradox. A cablegram leaves England at noon, and in the prov­ erbial "twinkling of an eye" arrives at its destination in India. The Indian operator looks at the clock. Does it mark the noon hour? Not at all. Notwithstanding practically instantaneous transmission, the deepatch does not reach India until 5 :30 P. M. Even more Two corollaries suggest themselves. First, universal time has no use for," A.M." and " P.M." The hours should be numbered from 1 to 24 (as they are already in many countries). Second, the phraseology employed in naming the time of day should indicate whether universal or local time is meant by some briefer method than is now available. © 1916 SCIENTIFIC AMERICAN, INC April 29, 1916 April 29, 1916 SCIENTIFIC AMERICAN 445 Aeronautics The National Association of Retail Druggists adopted a resolution opposing "the use of wood alcohol in medic­ inal preparations to be used by human beings," and in favor of such labeling as would protect the public against its harmful use. Two states, New Hampshire and South Dakota, each enacted a law restricting the sale of wood alcohol and prescribing a form of label to be used. The South Dakota law debars its use in any food, drink, medicine or toilet preparation intended for human use, internally or externally. The cities of New York, Chicago and Montclair, N. J., have adopted regulations or ordinances restricting its use. Transatlantic Flight by Aeroplane.- It is reported that Rodman Wanamaker is preparing again for a flight across the Atlantic Ocean in an aeroplane. A ma­ chine for the purpose is now building; it is said to be a giant triplane of larger proportions than anything hitherto attempted, mounting motors capable of develop­ ing 1,800 horse-power. The present understanding is that the flight is contemplated for the early part of thQ coming summer, and that the piȿot for the trip has not yet been decided upon. The course, too, is still unde. cided, although it will probably be laid from St. Johns, N. F. The fact that details concerning both the aircraft being built and the contemplated journey are being withheld from the public, renders impossible any com­ ment on the undertaking, for the present at least. Transatlantic Flight by Aeroplane.- It is reported that Rodman Wanamaker is preparing again for a flight across the Atlantic Ocean in an aeroplane. A ma­ chine for the purpose is now building; it is said to be a giant triplane of larger proportions than anything hitherto attempted, mounting motors capable of develop­ ing 1,800 horse-power. The present understanding is that the flight is contemplated for the early part of thQ coming summer, and that the piȿot for the trip has not yet been decided upon. The course, too, is still unde. cided, although it will probably be laid from St. Johns, N. F. The fact that details concerning both the aircraft being built and the contemplated journey are being withheld from the public, renders impossible any com­ ment on the undertaking, for the present at least. Aeronautics Even as it is such practice does the engine no good. When speed is to be reduced the first operation is to check the throttle until there are signs of knocking, when the spark may be gradually re­ tarded; and when increasing speed the operation is reversed, the spark being first advanced, followed by opening the throttle. Many a lowly motorcyclist, with his air cooled motor, could give points to the superior automobilist on efficient and economical driving. © 1916 SCIENTIFIC AMERICAN, INC
https://openalex.org/W2750387695
https://jps.library.utoronto.ca/index.php/bsc/article/download/17182/14122
English
null
&lt;i&gt;Index to Douglas Library Notes&lt;/i&gt;: Volume 1(1951)-Volume 21 (1971), compiled by A.R. Hazelgrove
Papers of the Bibliographical Society of Canada
1,977
cc-by
760
This massive volume is printed on good paper, and strongly bound in buckram; and for what one gets, it is indeed moderately priced. This massive volume is printed on good paper, and strongly bound in buckram; and for what one gets, it is indeed moderately priced. have provided a more useful solution. It should be noted that the entries are filed letter-by-letter (an indexer's introduction would have been most welcome) and that 'Mc' and Mac' are separately filed. l h h Reviw Edtor p y Although further editing of the DLN index would have been welcome, Mr. Hazel- grove's work will prove useful to researchers, librarians, and the DLN's former readers. WVhile the style and format of the publication is compatible with other works issued in the Douglas Library Occasional Papers series, it is unfortunate that the index could not have been produced to match the size and e cslsofe ta rinl o h rsn odtoso faca stringency'? Index to Douglas Library Notes: Volume 1 (1951) - Vrolume 21 (1971), compiled by A.R. Hazelgrove. Kingston, Ont.: Special Collections, Douglas Library, Queen's Uni- versity, 1976. 26 p. (Douglas Library Occa- sional Papers: no. 4), paper, free. Th emise of the Douglassibry nNoo e not only "one of the first signs of the present régime of financial stringency" for the Douglas Library and many other Canadian libraries, but also a sad occasion for the journal's loyal readers. Throughout its twenty year history DLN was a consistant model, one of the few in Canada then or now, of what a scholarly library house organ should be. DLN's four successive editors provided its readers with reviews and short erudite studies on literary, historical and bibliogra- phical matters connected with the library, its acquisitions, and its collection. Peter E. Greig (Mr. Greig- is Secretary of the National Library Adi'sory Board's Committee on Bibliographical Services for Canada, Indexer to the Bibli'ograh~ical Society of Canada, and Chairman of the Society's Standzing Committee on "Bibli'ography of Canadian Bibli'ograpihies. ") (Mr. Greig- is Secretary of the National Library Adi'sory Board's Committee on Bibliographical Services for Canada, Indexer to the Bibli'ograh~ical Society of Canada, and Chairman of the Society's Standzing Committee on "Bibli'ography of Canadian Bibli'ograpihies. ") q , Mr. A.R. Hazelgrove has published other indexes on Kingston materials through the Kingston Historical Society (Agnes Maule Machar: The Story of Old Kingston: Index, 1971; and Hi'stori'c Kzingston: Vrolumes 1-20, 1952-19 72: Index, 1973, for example). This massive volume is printed on good paper, and strongly bound in buckram; and for what one gets, it is indeed moderately priced. While the DLN index adequately reflects the diversity of subject matter in the parent journal, it does not do full justice to the compiler's experience and skill. The addition of birth and death dates in the personal name entries is occasionally inconsistent and incomplete. The practice of using a surname as the access point for a string of forenames is to be deprecated, and may even serve to confuse future researchers. Cross references for personal names are also a possible source of puzzlement for future users; the preferred entry is given in natural order and not in the inverted order in which it will actually be found. Capitalization is unreliable (MacPhail) and inconsistent (Dalhousie Library vs. Dalhousie library). Ti·tle entries, surprisingly, are the least successful, perhaps because the indexer has attempted to use them in a key-word fashion. The recall value of finding Li~fe in America under 'America' and LzIfe in Reu ters, A under 'Life' is dubious. Proper subject entries in either case would A Lithuanuan Bibliography. Adam and Filomena Kantautas. Edmonton: University of Alberta Press, 1975. xxxix, 725 p., cloth, $10.00. ISBN 0-88864-010-2 The magnitude and scope of this checklist of books and articles held by the major libraries of Canada and the United States is very impressive. If one wants to play the numbers game there are game, there are 10168 entries, arranged in double columns 536 pages of subject entries 149 pages of Author and Title index 38 pages of periodicals consulted 39 pages of an analytic table of contents with notes plus a list of 43 locations in Canada; 457 in the US and 11 libraries in other countries other countries 3587 different authors This work, which was prepared to foster interest in the heritage, history, and tradition of Lithuania, will be of interest and of value to serious researchers as well as to casual brow- sers. A glance at the broad subject headings will quickly reveal the close relationships and interaction with neighbouring countries - 69
https://openalex.org/W2591766135
https://www.frontiersin.org/articles/10.3389/fphys.2017.00134/pdf
English
null
Alteration in Taste Perception in Cancer: Causes and Strategies of Treatment
Frontiers in physiology
2,017
cc-by
9,514
Edited by: Ghanshyam Upadhyay, City College of New York-City University of New York, USA Keywords: taste modalities, cancer, inflammation, metabolism, treatment Reviewed by: Giamila Fantuzzi, University of Illinois at Chicago, USA Muheeb Beg, Weill Cornell Medical College, USA Reviewed by: Giamila Fantuzzi, University of Illinois at Chicago, USA Muheeb Beg, Weill Cornell Medical College, USA *Correspondence: Naim A. Khan naim.khan@u-bourgogne.fr Alteration in Taste Perception in Cancer: Causes and Strategies of Treatment Babar Murtaza 1, Aziz Hichami 2, Amira S. Khan 3, François Ghiringhelli 2 and Naim A. Khan 1* 1 Physiologie de la Nutrition and Toxicologie, UMR U866 Institut National de la Santé et de la Recherche Médicale/Université de Bourgogne-Franche Compté/Agro-Sup, Dijon, France, 2 UMR U866 Institut National de la Santé et de la Recherche Médicale/Université de Bourgogne-Franche Compté, Chimiothérapie et Réponse Anti-tumorale, Dijon, France, 3 Département de Biochimie, Biologie Cellulaire & Moléculaire, Université de Constantine 1, Constantine, Alegria The sense of taste is responsible for the detection and ingestion of food to cover energetic requirements in health and disease. The change in taste perception might lead to malnutrition that is usually one of the frequent causes of morbidity and mortality in patients with cancer. In this review, we summarize the mechanisms of taste perception and how they are altered in cancer. We also address the question of the implication of inflammation, responsible for the alterations in taste modalities. We highlight the role of radio- and chemotherapy in the modulation of taste physiology. Other several factors like damage to taste progenitor cells and disruption of gut microbiota are also dealt with relation to taste perception in cancer. We further shed light on how to restore taste acuity, by using different preventive methods, dietary modifications and pharmacotherapy in subjects with advanced cancer state. REVIEW published: 08 March 2017 doi: 10.3389/fphys.2017.00134 REVIEW published: 08 March 2017 doi: 10.3389/fphys.2017.00134 *Correspondence: Naim A. Khan Specialty section: This article was submitted to Gastrointestinal Sciences, a section of the journal Frontiers in Physiology Received: 24 October 2016 Accepted: 22 February 2017 Published: 08 March 2017 Changes in taste perception are especially important in diseases like cancer, which is one of the main causes of morbidity and mortality throughout the world. Altered taste perception in cancer subjects is usually ignored by clinicians as this aspect does not represent the life-threatening events. There are some indications that taste alteration might be an alarming early sign of tumor cell invasion in cancer patients (Sherry, 2001). Indeed, the most distressing symptom in patients with advanced cancer is gastrointestinal abnormalities, whereas the change in taste is the fourth most common symptom after dry mouth, weight loss, and early satiety (Komurcu et al., 2002). Some Keywords: taste modalities, cancer, inflammation, metabolism, treatment INTRODUCTION Weill Cornell Medical College, USA The dietary habits are governed, in part, by oro-sensory detection of taste. In fact, the taste of nutrients leads human beings to decide quickly to accept or reject a food. Basically, there are five taste modalities, i.e., sweet, sour, bitter, salty, umami and perhaps, a sixth fat taste (Heinze et al. (2015). Beside the fact that taste is essential for life because it regulates food intake, taste also provides hedonic pleasure from eating. The taste perception also activates neuronal pathways, leading to the preparation for digestion, absorption, and storage of nutrients (Brondel et al., 2013). A dysfunction of taste perception (dysgeusia) may impair the quality of life by affecting appetite, body weight, and psychological well-being (Deems et al., 1991). There are several factors that may affect taste perception, including medication, nutrition, lesions in the oral mucosa, prolonged exposure to radiations and chemotherapy, smoking, chronic hepatitis, renal dysfunction, aging, and perturbation in hormonal secretions (Maffeis and Silva-Netto, 1989). *Correspondence: Naim A. Khan naim.khan@u-bourgogne.fr MECHANISM OF TASTE PERCEPTION The TRCs or type II cells are sensitive to sweet, bitter and umami substances via the receptor activation of T1R and T2R family. These cells secrete ATP in the interstitial medium through pannexin channel (Romanov et al., 2008). The ATP binds to the P2Y receptors on the presynaptic or type III cells. This mechanism results in the release of serotonin, thus activating the postsynaptic receptors which are involved in the transmission of the taste information to brain. The type III cells are sensitive to acidic substances (Yang et al., 2000; Brondel et al., 2013; Roland and and Rémi, 2013). The fourth type of taste cells are termed as type IV cells which are basal, non-polarized, presumably undifferentiated cells and serve as progenitor cells for other three types of taste cells (Miura et al., 2006). The comprehensive reviews on different taste modalities and the activation of different brain areas can be consulted elsewhere (Bermúdez-Rattoni, 2004; Chaudhari and Roper, 2010; Roper, 2013; Besnard et al., 2016). However, in brief, we would like to outline the implication of TRCs in different taste perception. Salt activates sodium channels, while the acidic compounds induce the depolarization via by blocking potassium channels (Kinnamon et al., 1988). Sweet, bitter, fat, and umami Citation: studies suggests that 15 to 100 percent of cancer patients may suffer from a taste change (Lockhart and Clark, 1989; Ripamonti et al., 1998). Citation: Murtaza B, Hichami A, Khan AS, Ghiringhelli F and Khan NA (2017) Alteration in Taste Perception in Cancer: Causes and Strategies of Treatment. Front. Physiol. 8:134. doi: 10.3389/fphys.2017.00134 March 2017 | Volume 8 | Article 134 Frontiers in Physiology | www.frontiersin.org 1 Taste and Cancer Murtaza et al. taste involve metabotropic receptors (Medler, 2011). CD36 and GPR120 play non-overlapping roles during orosensory detection of dietary fats (Ozdener et al., 2014). Two large families of receptors have been identified: T1R and T2R. The T2R receptors are involved in the perception of bitter taste (Chandrashekar et al., 2000). The heterodimeric T1R2/T1R3 detects the sweet taste (Montmayeur et al., 2001), whereas the heterodimeric T1R1/T1R3 is sensitive to umami taste (Chaudhari et al., 2000). The binding of sapid molecules to these taste receptors activates a G-protein, called Gustducin (Wong et al., 1996). The alpha- subunit of gustducin activates the PLCβ2and generates inositol- trisphosphate (IP3) and diacylglycerol. All these intracellular mechanisms lead to an increase in intracellular calcium and neurotransmitter release. A diagrammatical representation of various types of taste cells and receptors involved in taste perception are presented in Figure 2. The neurotransmitters released by the TRC activate the afferent nerve fibers that carry taste information to the CNS. These afferent nerves are: (i) the cord of the eardrum (gustatory branch of the facial nerve) which connects the fungiform papillae of the anterior two thirds of the tongue, (ii) the glossopharyngeal nerve (IX) that connects the goblet buds in the posterior third, and (iii) the superior laryngeal vagus nerve (nerve X) that transmits oropharyngeal sensitivity. Other nerves, such as the trigeminal nerve, are also incidentally involved in taste perception. Neurons conduct a first relay in the solitary nucleus, located in the dorsolateral part of the bulb, and then make a second relay in the ventromedial nucleus of the thalamus before they project into the cortical or other area, involved in identifying taste (type and intensity). The nucleus accumbens and the ventral tegmental area are also activated following food ingestion. They are involved in hedonic responses (pleasure) and the reward circuit (Kettaneh et al., 2002; Brondel et al., 2013; Roland and and Rémi, 2013). studies suggests that 15 to 100 percent of cancer patients may suffer from a taste change (Lockhart and Clark, 1989; Ripamonti et al., 1998). MECHANISM OF TASTE PERCEPTION Before discussing the relationship between cancer and taste changes, we must have an idea of oro-sensory perception of taste. Taste is a complex entity that interacts with other senses: Hearing, touch, smell, and vision. All the information from the sensory organs is finally analyzed by the central nervous system (CNS). During mastication, foods is mixed with saliva which is secreted by mandibular, sublingual, and parotid salivary glands. Saliva dilutes and disseminates palatable molecules to the taste receptors on the tongue, palate, larynx, pharynx, and the upper third of the esophagus (Matsuo, 2000). Taste receptors or taste receptor cells (TRCs) have been identified on tongue epithelium and throughout the digestive tract (Rozengurt and Sternini, 2007), but we will not discuss the latter part in this review article. Human beings have around 5,000 taste buds. Of these, 30% are in the fungiform papillae, 30% in foliate papillae and 40% in circumvallate papilla (Suzuki, 2007). The filiform papillae contain no taste buds. Goblet or circumvallate buds are located in the posterior position of the tongue forming an inverted "V" which are nine in humans. The foliate papillae are located in posterior lateral position of the tongue. The fungiform and filiform papillae are present on the apical surface of the tongue. Each taste bud contains 50–100 taste cells, surrounded by supporting cells which are renewed after every 10 days (Wakisaka, 2005). The localization of taste buds and TRCs on human tongue are shown in Figure 1. Three cell types have been identified, based on morphological criteria (Takeda and Hoshino, 1975). Glial or Type I cells that assure homeostasis in the taste bud, are sensitive to salty substances and possess ATPase activity (Bartel et al., 2006), which is crucial to degrade high concentrations of extracellular ATP. The TRCs or type II cells are sensitive to sweet, bitter and umami substances via the receptor activation of T1R and T2R family. These cells secrete ATP in the interstitial medium through pannexin channel (Romanov et al., 2008). The ATP binds to the P2Y receptors on the presynaptic or type III cells. This mechanism results in the release of serotonin, thus activating the postsynaptic receptors which are involved in the transmission of the taste information to brain. The type III cells are sensitive to acidic substances (Yang et al., 2000; Brondel et al., 2013; Roland and and Rémi, 2013). Frontiers in Physiology | www.frontiersin.org MECHANISM OF TASTE PERCEPTION The fourth type of taste cells are termed as type IV cells which are basal, non-polarized, presumably undifferentiated cells and serve as progenitor cells for other three types of taste cells (Miura et al., 2006). The comprehensive reviews on different taste modalities and the activation of different brain areas can be consulted elsewhere (Bermúdez-Rattoni, 2004; Chaudhari and Roper, 2010; Roper, 2013; Besnard et al., 2016). However, in brief, we would like to outline the implication of TRCs in different taste perception. Salt activates sodium channels, while the acidic compounds induce the depolarization via by blocking potassium Before discussing the relationship between cancer and taste changes, we must have an idea of oro-sensory perception of taste. Taste is a complex entity that interacts with other senses: Hearing, touch, smell, and vision. All the information from the sensory organs is finally analyzed by the central nervous system (CNS). During mastication, foods is mixed with saliva which is secreted by mandibular, sublingual, and parotid salivary glands. Saliva dilutes and disseminates palatable molecules to the taste receptors on the tongue, palate, larynx, pharynx, and the upper third of the esophagus (Matsuo, 2000). Taste receptors or taste receptor cells (TRCs) have been identified on tongue epithelium and throughout the digestive tract (Rozengurt and Sternini, 2007), but we will not discuss the latter part in this review article. Human beings have around 5,000 taste buds. Of these, 30% are in the fungiform papillae, 30% in foliate papillae and 40% in circumvallate papilla (Suzuki, 2007). The filiform papillae contain no taste buds. Goblet or circumvallate buds are located in the posterior position of the tongue forming an inverted "V" which are nine in humans. The foliate papillae are located in posterior lateral position of the tongue. The fungiform and filiform papillae are present on the apical surface of the tongue. Each taste bud contains 50–100 taste cells, surrounded by supporting cells which are renewed after every 10 days (Wakisaka, 2005). The localization of taste buds and TRCs on human tongue are shown in Figure 1. Three cell types have been identified, based on morphological criteria (Takeda and Hoshino, 1975). Glial or Type I cells that assure homeostasis in the taste bud, are sensitive to salty substances and possess ATPase activity (Bartel et al., 2006), which is crucial to degrade high concentrations of extracellular ATP. CANCER: INFLAMMATION AND TASTE ALTERATIONS As regards the association between inflammation and taste bud dysfunction that might result into altered taste perception, we can cite the study of Wang et al. (2009). These investigators have reported the expression of Toll-like receptors (TLRs), type I and II interferon (IFN) receptors, and their downstream signaling components in taste tissue. Some TLRs appear to be selectively or more abundantly expressed in taste buds than in non-gustatory lingual epithelium. Immunohistochemical observations have confirmed the presence of these receptor proteins in taste bud cells, of which TLRs 2, 3, and 4 are expressed in type II cells. Administration of TLR ligands and lipopolysaccharides activated IFN-g signaling pathways, up- regulated the expression of IFN-g-inducible genes, and down- regulated the expression of c-fos in taste buds. Interestingly, systemic administration of IFNs triggered apoptosis of taste bud cells in mice and, consequently, contributed to the development of taste disorders. It has been shown that MRL/lpr mice have a high concentration of IFNγ and TNF-a, and INFγ would There also seems a relationship between inflammation and hyperglycemia in cancer since carbohydrate metabolism is altered in cancer patients (Duan et al., 2014), as is the case of type 2 diabetes. The high glucose metabolism in cancer cells might be due to high expression of glucose transporters (Walenta et al., 2000; Hauptmann et al., 2005). Gondivkar et al. (2009) have reported that the subjects with type 2 diabetes may also suffer from alterations in taste thresholds for different taste modalities. Hence, it is possible that the alteration in carbohydrate metabolism and taste perception may be a common mechanism between type 2 diabetes and cancer. However, this statement requires further studies in future. CANCER: INFLAMMATION AND TASTE ALTERATIONS One of the striking features of advanced cancer is the inflammatory state that is generally associated with an infection (Coussens and Werb, 2002). Rapidly proliferating cancer cells release a number of cytokines/chemokines which favor the recruitment of macrophages and neutrophils, which, in turn, produce a series of cytokines and cytotoxic mediators including prostaglandins (Kuper et al., 2000). It is mention worthy that 15% of cancer are associated with an infection that might trigger a sustained inflammatory state (Kuper et al., 2000). In neck cancer, the level of pro-inflammatory cytokines, i.e., IL-1α, RANTES, MIG, G-CSF, GM-CSF, INF-γ, TNF-a, IL-17, IL-4, IL-6, and IL-10, in the body is increased by several fold (Johnson et al., 2014). The cytokines like IL-12 and IFNγ have an anti-tumor role, while the cytokines like IL-6, IL-17, and IL-23 are pro- tumor (Lin and Karin, 2007). The cytokines IL-6 and IL-10 are associated with poor prognosis in all types of cancer (Lippitz, 2013). Inflammation plays a crucial role in cachexia (Epstein and Barasch, 2010). Conversely, cancer cachexia is associated with an increase in blood levels of C-reactive protein, cytokines March 2017 | Volume 8 | Article 134 Frontiers in Physiology | www.frontiersin.org 2 Murtaza et al. Taste and Cancer FIGURE 1 | Human taste system: (A) Localization of different types of gustatory papillae onto the human tongue. (B) Enlarged section of circumvallate papillae showing taste bud cells. FIGURE 1 | Human taste system: (A) Localization of different types of gustatory papillae onto the human tongue. (B) Enlarged section of circumvallate papillae showing taste bud cells. (interleukin 1b, interleukin-6, TNF-α, and leukemia inhibitor factor, LIF) and other tumor derived factors like lipid mobilizing factor (LMF) and protein mobilizing factor (PMF). The LMF and PMF can directly mobilize fatty acids and amino acids, respectively, from adipose tissue and skeletal muscle. Ming-Hua et al. (2016) have recently confirmed that high concentrations of IL-1b, IL-6, TNF-α, and LMF are directly involved in cancer cachexia. Indeed, LMF initiates ubiquitin-dependent catabolic pathway and contributes to weight loss during cancer cachexia (Dimitriu et al., 2005) which is, somehow, associated with loss of taste perception as demonstrated by Maschke et al. (2017). The inflammatory markers via blood circulation may also exert their action in the brain and modulate the areas involved in the control of feeding behavior including smell and taste perception (Argilés et al., 2014). CANCER: INFLAMMATION AND TASTE ALTERATIONS These observations suggest that alteration in taste in cancer patients might be controlled both at taste bud and brain levels. As regards the association between inflammation and taste bud dysfunction that might result into altered taste perception, we can cite the study of Wang et al. (2009). These investigators have reported the expression of Toll-like receptors (TLRs), type I and II interferon (IFN) receptors, and their downstream signaling components in taste tissue. Some TLRs appear to be selectively or more abundantly expressed in taste buds than in non-gustatory lingual epithelium. Immunohistochemical observations have confirmed the presence of these receptor proteins in taste bud cells, of which TLRs 2, 3, and 4 are expressed in type II cells. Administration of TLR ligands and lipopolysaccharides activated IFN-g signaling pathways, up- regulated the expression of IFN-g-inducible genes, and down- regulated the expression of c-fos in taste buds. Interestingly, systemic administration of IFNs triggered apoptosis of taste bud cells in mice and, consequently, contributed to the development of taste disorders. It has been shown that MRL/lpr mice have a high concentration of IFNγ and TNF-a, and INFγ would induce the apoptosis of TRCs. The perception of bitter, sweet and umami taste is also reduced in these mice. This alteration of taste perception is associated with a decrease in the number of gustducin positive cells and renewal of TRCs (Kim et al., 2012). (interleukin 1b, interleukin-6, TNF-α, and leukemia inhibitor factor, LIF) and other tumor derived factors like lipid mobilizing factor (LMF) and protein mobilizing factor (PMF). The LMF and PMF can directly mobilize fatty acids and amino acids, respectively, from adipose tissue and skeletal muscle. Ming-Hua et al. (2016) have recently confirmed that high concentrations of IL-1b, IL-6, TNF-α, and LMF are directly involved in cancer cachexia. Indeed, LMF initiates ubiquitin-dependent catabolic pathway and contributes to weight loss during cancer cachexia (Dimitriu et al., 2005) which is, somehow, associated with loss of taste perception as demonstrated by Maschke et al. (2017). The inflammatory markers via blood circulation may also exert their action in the brain and modulate the areas involved in the control of feeding behavior including smell and taste perception (Argilés et al., 2014). These observations suggest that alteration in taste in cancer patients might be controlled both at taste bud and brain levels. Frontiers in Physiology | www.frontiersin.org MODIFICATION OF MICROBIOTA AND TASTE ALTERATIONS IN CANCER Roughly, there are ∼1014 microbes residing in human intestine with genetic content almost 100 times higher than that of the human genome (Ley et al., 2006). These microbiota are present throughout the gastrointestinal tract, starting from mouth till the terminal part of large intestine (Rozengurt and Sternini, 2007). Schmidt et al. (2014) have shown that the abundance of oral microbiota was varied in individuals during oral cancer. In another study, it was observed that some bacterial species in the buccal cavity of patients with oral squamous cell carcinoma differed from that of normal volunteers (Mager et al., 2005). Interestingly, the chnages in gut microbiota are closely related with alterations in taste preference in mice (Duca et al., 2012; Swartz et al., 2012). March 2017 | Volume 8 | Article 134 Frontiers in Physiology | www.frontiersin.org 3 Murtaza et al. Taste and Cancer FIGURE 2 | Intercellular communications involved in taste perception. Receptors for sweet, umami, fat, and bitter taste are expressed on type-II cells while type III cells express receptors for sour taste and type-I cells are believed to be involved in salt taste perception. Binding of tastants (1) on type-II and type-III cells ultimately leads to an increase in intracellular calcium levels (2). ATP is excreted by type-II(3) cells which binds with P2Y receptors on type-III cells (4) and causes the release of 5-HT (5). 5-HT causes afferent nerve endings to carry taste message to specific brain areas on one side (5), and other the other side, causes feedback inhibition of ATP release (6). Excess ATP is also degrades by ATPase present on type-I cells (not shown). Type IV cells are progenitor cells that differentiate into other three types of cells. (ATP, adenosine triphosphate; 5-HT, 5-hydroxytryptamine or serotonin). FIGURE 2 | Intercellular communications involved in taste perception. Receptors for sweet, umami, fat, and bitter taste are expressed on type-II cells while type III cells express receptors for sour taste and type-I cells are believed to be involved in salt taste perception. Binding of tastants (1) on type-II and type-III cells ultimately leads to an increase in intracellular calcium levels (2). ATP is excreted by type-II(3) cells which binds with P2Y receptors on type-III cells (4) and causes the release of 5-HT (5). MODIFICATION OF MICROBIOTA AND TASTE ALTERATIONS IN CANCER 5-HT causes afferent nerve endings to carry taste message to specific brain areas on one side (5), and other the other side, causes feedback inhibition of ATP release (6). Excess ATP is also degrades by ATPase present on type-I cells (not shown). Type IV cells are progenitor cells that differentiate into other three types of cells. (ATP, adenosine triphosphate; 5-HT, 5-hydroxytryptamine or serotonin). CANCER THERAPY AND CHANGES IN TASTE One possible mechanism might be that the modifications of gut microbiota might influence the expression of gut G-protein coupled receptors (Rousseaux et al., 2007), beside manipulating host feeding behavior through hormonal and neural mechanisms (Alcock et al., 2014). Oral mucositis, which is closely related with alterations in taste, is frequently reported in cancer patients undergoing chemotherapy (Knox et al., 2000). Wang et al. (2015) have proposed that disruption of oral microbiota could result in chemotherapy-induced inflammation through toll- like receptors (TLRs) and nucleotide oligomerization domain (NOD)-like receptors (NLRs). Ligands for these receptors like peptidoglycan, lipopolysaccharide, bacterial DNA, and protein flagellin are frequently provided by disrupted microbiota, which results in induction of inflammatory process. As cancer therapy is frequently associated with disrupted microbiota, while alterations of microbiota leads to inflammation and changes is taste perception, it would be natural to assume that disruption of gut microbiota might result in taste changes in cancer patients. However, this argument needs to be studied in future. Frontiers in Physiology | www.frontiersin.org Chemotherapy Chemotherapy may affect the taste perception (Berteretche et al., 2004; Rehwaldt et al., 2009). In a study conducted on cancer patients undergoing chemotherapy, the prevalence of taste alterations was reported to be as high as 69.9%, and a significant association was found between taste alterations and a change in patient’s quality of life such as appetite and fatigue (Zabernigg et al., 2010). In a study, performed on pediatric patients, undergoing chemotherapy, the altered taste perception caused problems in feeding behavior (Skolin et al., 2006). It was suggested that changes had occurred both in the primary gustatory sense as well as in food perception in these patients. Taste-test showed that these patients had increased thresholds for bitter taste (Skolin et al., 2006). Such changes in taste may be resolved within several months after the completion of chemotherapy (Bernhardson et al., 2007). Zinc is an important March 2017 | Volume 8 | Article 134 4 Murtaza et al. Taste and Cancer 1978) by damaging salivary glands. A brief summary of the factors that result in taste change has been shown in Figure 3. micronutrient which also plays a role in the perception of taste. Studies suggest that Zinc depletion is closely related to a change of taste in cancer patients (Heyneman, 1996; Yamagata et al., 2003). A possible mechanism by which the drugs treating cancer could cause Zinc deficiency may involve the binding and chelation of Zinc and other heavy metals by sulfhydryl group in their structures, leading to Zinc depletion and loss of taste (Comeau et al., 2001). Plausible Effect of Radio- and Chemotherapy on Taste Progenitor Cells Radiation or chemotherapy might target both taste progenitor as well as already existing taste cells. How these treatments affect differentiation or reduce the cell number by targeting apoptotic or particular pathways are poorly understood. There are pathways known for differentiation of taste bud cells such as sonic hedgehog (SHH) and notch pathways (Kapsimali and Barlow, 2013) which are modulated during cancer (Merchant and Matsui, 2010). In particular, SHH is exclusively expressed in type IV taste cells, which are undifferentiated basal cells and the precursors of the other three types of taste cells (Miura et al., 2006). Use of SHH pathway inhibitor, Vismodegib, in cancer patients is often associated with profound alterations in taste sensation (Von Hoffet al., 2009; Sekulic et al., 2012; Tang et al., 2012). Yang et al. (2015) have shown that Vismodegib treatment in mice resulted in an altered taste perception. Significant reductions in taste bud size, numbers of taste cells per taste bud, and numbers of SHH-expressing cells in taste bud were also observed in these mice. Furthermore, the numbers of phospholipase Cβ2- and α-gustducin- T1R3, glucagon-like peptide-1, and glucagon-expressing cells were also reduced in the taste bud of these mice. Similar findings were observed by Kumari et al. (2015), who reported that the blockade of hedgehog pathway by cancer drug LDE225 resulted in the disruption of taste cells and taste perception in mice. All these findings suggest that modulation of SHH by cancer therapy might also be implicated in taste alterations in cancer patients. Radiation Therapy Taste disorders are quite frequent in patients undergoing radiation therapy for head and neck cancers (Zheng et al., 2002). In a study, it was reported that bitter taste was the most affected taste, while sweet taste was affected to a lesser extent (Zheng et al., 2002). Another study showed that bitter and salty taste were the earliest and the most affected taste modalities, while sweet taste was the least affected as a result of radiation therapy (Mossman and Henkin, 1978). Taste impairment may start a few weeks after the beginning of radiation treatment, while it may recover to its previous levels 6 months to 1 year after the treatment has been stopped but some patients may suffer from permanent loss of taste (Ruo Redda and Allis, 2006). Impairment of ummami taste as a result of radiation therapy in cancer patients has also been reported (Shi et al., 2004). Changes in taste are mainly due to the damage caused by radiation field to taste cells and the pattern of the taste disorder is heavily influenced by the distribution of the taste buds damaged during the radiation therapy (Yamashita et al., 2006). Also, radiation and chemotherapy induce apoptosis of TRCs and inhibit taste progenitor/stem cell proliferation. Role of dry mouth (xerostomia) has also been implicated as a factor contributing to taste change, as radiation therapy frequently affects saliva quantity and composition (Mossman and Henkin, Miura and Barlow (2010) have proposed that in head and neck cancer patients, taste bud progenitors are more vulnerable to FIGURE 3 | Factors contributing to alterations in taste perception in cancer. (TRCs, taste receptor cells; TBCs, taste bud cells). GURE 3 | Factors contributing to alterations in taste perception in cancer. (TRCs, taste receptor cells; TBCs, taste bud cells Frontiers in Physiology | www.frontiersin.org March 2017 | Volume 8 | Article 134 Taste and Cancer Murtaza et al. paclitaxel chemotherapy, included a number of strategies like changing food habits by adding new recipes (Speck et al., 2013). Wickham et al. (1999) proposed to increase food palatability by adding artificial falvours. Rehwaldt et al. (2009) have reported that each patient should have its own particular strategy to adapt taste alterations. PREVENTION AND TREATMENT OF TASTE ALTERATIONS Patient counseling can be started in advance to prepare patient mentally before time. Rhodes et al. (1994) have demonstarted if the patients are prepared psychologically for taste alterations, they can tolerate taste changes easily. Ravasco et al. (2003) have stressed on counseling the cancer patients to face the altered changes in taste perception. Before chemotherapy, the patients can be encouraged to try new food products or supplements (Capra et al., 2001). Lemon juice and chewing gum could be used prior to meals to make the meals more pleasant. Small but frequent meals should be encouraged as they are better tolerated by the patients (Ravasco, 2005). Patients can also be asked to maintain good oral hygiene as it may also contribute to changes in taste. To assess whether changes in taste perception in cancer patients are causing taste aversion and, consequently, to malnutrition, the clinicians may use different approaches, like Malnutrition Screening Tool (Ferguson et al., 1999), Interdisciplinary Nutrition Care Plan (Capra et al., 2001), or the Patient-Generated Subjective Global Assessment (Ferguson, 2003). A close contact and relationship between health care professionals and patients is highly desirable in order to assess the nutritional status and improve the quality of life of the patients. Zinc supplementation can be valuable for patients undergoing cancer chemotherapy. The results of a pilot study suggested that after 2 weeks of chemotherapy, the intake of Zinc protected the cancer patients against taste disorders (Yamagata et al., 2003). In another study, a Zinc containing formulation known as Polaprezinc was able to improve the taste alterations in 70 percent of the patients, though an early administration has been suggested (Mizukami et al., 2016). Furthermore, the results of a randomized and controlled clinical trial on the effects of Zinc sulfate have clearly demonstrated that exogenous Zinc improved taste acuity (Ripamonti et al., 1998). Similar findings were observed in a randomized placebo-controlled trial where Zinc sulfate prevented the radiation-induced taste changes in head/neck cancer patients (Najafizade et al., 2013). Halyard et al. (2007) conducted a clinical study on Zinc sulfate vs. placebo and concluded that intake of Zinc offered protection against Radiation Therapy Hence, more than 50% of the patients reported that they tried selected one of the following strategies: More fats and sauces, eating smaller and more frequent meals, using more condiments, eating blander foods, adding something sweet to meats, sucking on hard candy, eating more boiled foods, and avoiding beef. These strategies were helpful for the majority (74–87%) of patients who tried them. Nonetheless, self- care strategies are difficult to be practized due to psychological constraints. the effect of fractionated radiotherapy as compared to terminally differentiated taste cells. They have compared this model with irradiated skin epithelium, where proliferating skin cells are more prone to radiation induced DNA damage than the post-mitotic cells. Following irradiation, the progenitor cells try to repair damaged DNA, and if they fail, they start apoptosis. Repeated irradiation causes increased loss of progenitor cells (Dörr et al., 2000; Potten et al., 2002). As chemotherapy also targets rapidly dividing cells, consequently, taste alterations are observed in patients undergoing chemotherapy for non-head/neck cancers as well. MEASUREMENT OF TASTE IMPAIRMENT AND DETECTION THRESHOLD IN CANCER Different methods have been used for the measurement of taste impairment and detection thresholds in cancer patients. A detailed account of the methods will be out of scope of this article; hence, only a brief summary has been given. An electro- gustometer can be used for the detection of taste thresholds (Williams and Cohen, 1978). One electrode is the tongue electrode, while the other reference electrode is placed on dorsal side or the wrist. Electrical current is applied in different steps and the lowest current intensity, perceived by the subject, is taken as the detection threshold (Berteretche et al., 2004). Chemical detection involves using tastant solution with suprathreshold concentrations for each of the basic taste modalities (Trant et al., 1982; Bossola et al., 2007). The subject’s mouth is rinsed with a sip of distilled water prior to testing each sample (Sánchez- Lara et al., 2010). The lowest concentration of solute at which the individual consistently recognizes the taste is considered as taste threshold (Gallagher and Tweedle, 1983; Steinbach et al., 2009). A 3-armed forced choice (3-AFC) method can be applied to monitor the subject’s response for detection and reorganization of taste (Mossman and Henkin, 1978). Subjects can be asked to place a cross-hatch on a 10-cm line labeled at each end (0 = dislike extremely, no sweetness, sourness, saltiness, or bitterness, and 10 = like extremely, extremely sweet, sour, salty, or bitter) to indicate degree of liking and intensity of each sample (Trant et al., 1982). Alternatively, a scale ranging from 0 (total taste loss) to 3 (no taste loss) can be employed to classify the subjects, depending upon if they recognize no or all concentrations of a particular taste (Maes et al., 2002). Questionnaires have also been used by different researchers to determine the patient’s self- reported taste changes and their effects on their quality of life (Chencharick and Mossman, 1983; Huldij et al., 1986; Bjordal et al., 1994; Bernhardson et al., 2008). The choice of a particular test depends on the practitioner. REFERENCES Besnard, P., Passilly-Degrace, P., and Khan, N. A. (2016). Taste of fat: a sixth taste modality? Physiol. Rev. 96, 151–176. doi: 10.1152/physrev.00002.2015 Alcock, J., Maley, C. C., and Aktipis, C. (2014). Is eating behavior manipulated by the gastrointestinal microbiota? Evolutionary pressures and potential mechanisms. Bioessays 36, 940–949. doi: 10.1002/bies.201400071 Bjordal, K., Ahlner-Elmqvist, M., Tollesson, E., Jensen, A. B., Razavi, D., Maher, E. J., et al. (1994). Development of a European Organization for Research and Treatment of Cancer (EORTC) questionnaire module to be used in quality of life assessments in head and neck cancer patients. Acta Oncol. 33, 879–885. doi: 10.3109/02841869409098450 Argilés, J. M., Busquets, S., Stemmler, B., and López-Soriano, F. J. (2014). Cancer cachexia: understanding the molecular basis. Nat. Rev. Cancer 14, 754–762. doi: 10.1038/nrc3829 Bohuslavizki, K. H., Klutmann, S., Brenner, W., Mester, J., Henze, E., and Clausen, M. (1998). Salivary gland protection by amifostine in high-dose radioiodine treatment: results of a double-blind placebo-controlled study. J. Clin. Oncol. 16, 3542–3549. doi: 10.1200/JCO.1998.16.11.3542 Bartel, D. L., Sullivan, S. L., Lavoie, É. G., Sévigny, J., and Finger, T. E. (2006). Nucleoside triphosphate diphosphohydrolase-2 is the ecto-ATPase of type I cells in taste buds. J. Comp. Neurol. 497, 1–12. doi: 10.1002/cne. 20954 Bossola, M., Cadoni, G., Bellantone, R., Carriero, C., Carriero, E., Ottaviani, F., et al. (2007). Taste intensity and hedonic responses to simple beverages in gastrointestinal cancer patients. J. Pain Symptom Manage. 34, 505–512. doi: 10.1016/j.jpainsymman.2006.12.013 Bermúdez-Rattoni, F. (2004). Molecular mechanisms of taste-recognition memory. Nat. Rev. Neurosci. 5, 209–217. doi: 10.1038/nrn1344 Bernhardson, B.-M., Tishelman, C., and Rutqvist, L. E. (2007). Chemosensory changes experienced by patients undergoing cancer chemotherapy: a qualitative interview study. J. Pain Symptom Manage. 34, 403–412. doi: 10.1016/j.jpainsymman.2006.12.010 Brondel, L., Jacquin, A., Meillon, S., and Pénicaud, L. (2013). Le goût: physiologie, rôles et dysfonctionnements. Nutr. Clin. Métabol. 27, 123–133. doi: 10.1016/j.nupar.2013.06.002 Bernhardson, B.-M., Tishelman, C., and Rutqvist, L. E. (2008). Self-reported taste and smell changes during cancer chemotherapy. Support. Care Cancer 16, 275–283. doi: 10.1007/s00520-007-0319-7 Capra, S., Ferguson, M., and Ried, K. (2001). Cancer: impact of nutrition intervention outcome—nutrition issues for patients. Nutrition 17, 769–772. doi: 10.1016/S0899-9007(01)00632-3 Chandrashekar, J., Mueller, K. L., Hoon, M. A., Adler, E., Feng, L., Guo, W., et al. (2000). T2Rs function as bitter taste receptors. Cell 100, 703–711. doi: 10.1016/S0092-8674(00)80706-0 Berteretche, M., Dalix, A., d’ornano, A. C., Bellisle, F., Khayat, D., and Faurion, A. (2004). Decreased taste sensitivity in cancer patients under chemotherapy. Support. AUTHOR CONTRIBUTIONS NK and FG proposed the topic, supervised and finally reviewed. BM, AH, and AK participated equally in searching the data and writing of the review. FUTURE PROSPECTS The pathophysiology of taste alterations differs with relation to the phase of the disease and specific treatment. Unfortunately, this aspect has been ignored in most of the publications. Researchers should take into account the therapy and stages of disease while collecting the data so that more specific patient care protocols can be devised in order to minimize the effect of a change in taste on patient’s quality of life. Manufacturers must take into account the taste alterations that frequently accompany cancer and should design and provide food supplements accordingly to make them more palatable. An interesting idea can be to develop “taste enhancers” which, once added to food, could enhance its palatability by acting as agonist at specific taste receptor. Such agonists can be developed for each taste modality. After identification of particular taste impairment, the enhancers for that taste can be added to make food more pleasurable for patients. The efficacy of two drugs, i.e., pilocarpine and bethanechol, that increase production of saliva was tested upon saliva secretion in cancer patients with hypo-salivation following radiation therapy (Gorsky et al., 2004). Though the patients reported improvement in saliva secretion by both the agents, only bethanechol improved taste perception. A pilot investigation was conducted to assess the role of serotonergic blockade by using ondansetron, an antagonist of serotonin type-3 receptor (Edelman et al., 1999). This study included metastatic cancer patients who were not undergoing chemotherapy or radiotherapy. Utilizing an “extensive battery of taste tests,” it was concluded that ondansetron brought about significant improvements in patients to enjoy food. A major drawback in this study was that it was not a blinded trial, and, hence, placebo effects could not be fully excluded (Edelman et al., 1999). Moreover, it was not clear whether the enhanced enjoyment from eating was due to improvements in taste. In rodent model, it seems that 5-HT acts as a paracrine inhibitory feedback signal manifested by the inhibition of ATP secretion from TRCs. Taste buds express 5-HT1A receptor and the use of its specific agonist, 8-OH-DPAT, inhibited taste- evoked Ca2+ release in TRCs and also curtailed ATP release. Servier medical art was used as a part of some of the figures. Servier medical art was used as a part of some of the figures. Servier medical art was used as a part of some of the figures. SELF-CARE STRATEGIES BY PATIENTS TO MINIMIZE ALTERATIONS IN TASTE The patients themselves can assess the changes in thresholds for different taste modalities. Consequently, they may change either their feeding habits or adopt appropriate palatable strategies. For example, breast cancer patients, undergoing docetaxel or March 2017 | Volume 8 | Article 134 Frontiers in Physiology | www.frontiersin.org 6 Taste and Cancer Murtaza et al. alterations in taste modalities. Hence, the routine use of Zinc sulfate may be suggested for patients undergoing cancer therapy. Conversely, blocking the action of endogenous 5-HT in taste bud cells by using WAY100635, a selective 5-HT1A receptor antagonist, increased taste-evoked ATP release (Huang et al., 2009). However, in-depth studies aiming to reproduce the afore- mentioned observations in humans are awaited. Amifostine, an organic thiophosphate, has been shown to protect normal tissues from damage caused by radiation and chemotherapy (Kouvaris et al., 2007). Amifostine may also play a role in the protection of salivary glands and, thus leading to improvement of xerostomia. In a phase II randomized trial, amifostine has been used to assess protection against the toxic effects of carboplatin (Bohuslavizki et al., 1998). Münter et al. (2007) also came to the similar conclusion that amifostine may prevent reduced salivary gland function in patients, subjected to radiotherapy. REFERENCES Clin. Invest. 117, 1175–1183. doi: 10.1172/JCI31537 Gallagher, P., and Tweedle, D. E. (1983). Taste threshold and acceptability of commercial diets in cancer patients. J. Parenter. Enteral Nutr. 7, 361–363. doi: 10.1177/0148607183007004361 Lippitz, B. E. (2013). Cytokine patterns in patients with cancer: a systematic review. Lancet Oncol. 14, e218–e228. doi: 10.1016/S1470-2045(12)70582-X Lockhart, P. B., and Clark, J. R. (1989). Oral complications following neoadjuvant chemotherapy in patients with head and neck cancer. NCI monogr. 9, 99–101. Gondivkar, S. M., Indurkar, A., Degwekar, S., and Bhowate, R. (2009). Evaluation of gustatory function in patients with diabetes mellitus type 2. Oral Surg. Oral Med. Oral Pathol. Oral Radiol. Endodontol. 108, 876–880. doi: 10.1016/j.tripleo.2009.08.015 Maes, A., Huygh, I., Weltens, C., Vandevelde, G., Delaere, P., Evers, G., et al. (2002). De Gustibus: time scale of loss and recovery of tastes caused by radiotherapy. Radiother. Oncol. 63, 195–201. doi: 10.1016/S0167-8140(02)00025-7 Gorsky, M., Epstein, J. B., Parry, J., Epstein, M. S., Le, N. D., and Silverman, S. (2004). The efficacy of pilocarpine and bethanechol upon saliva production in cancer patients with hyposalivation following radiation therapy. Oral Surg. Oral Med. Oral Pathol. Oral Radiol. Endodontol. 97, 190–195. doi: 10.1016/j.tripleo.2003.08.031 Maffeis, E. R., and Silva-Netto, C. R. (1989). Factors that alter taste perception. Rev. Faculdade Odontol. Lins 3, 28–32. Mager, D. L., Haffajee, A. D., Devlin, P. M., Norris, C. M., Posner, M. R., and Goodson, J. M. (2005). The salivary microbiota as a diagnostic indicator of oral cancer: a descriptive, non-randomized study of cancer-free and oral squamous cell carcinoma subjects. J. Transl. Med. 3:27. doi: 10.1186/1479-5876-3-27 Halyard, M. Y., Jatoi, A., Sloan, J. A., Bearden, J. D. III, Vora, S. A., Atherton, P. J., et al. (2007). Does zinc sulfate prevent therapy-induced taste alterations in head and neck cancer patients? Results of phase III double-blind, placebo-controlled trial from the North Central Cancer Treatment Group (N01C4). Int. J. Radiat. Oncol 67, 1318–1322. doi: 10.1016/j.ijrobp.2006.10.046 Maschke, J., Kruk, U., Kastrati, K., Kleeberg, J., Buchholz, D., Erickson, N., et al. (2017). Nutritional care of cancer patients: a survey on patients’ needs and medical care in reality. Int. J. Clin. Oncol. 22, 200–206. doi: 10.1007/s10147-016-1025-6 Matsuo, R. (2000). Role of saliva in the maintenance of taste sensitivity. Crit. Rev. Oral Biol. Med. 11, 216–229. doi: 10.1177/10454411000110020501 Hauptmann, S., Grünewald, V., Molls, D., Schmitt, W. D., Köbel, M., Kriese, K., et al. (2005). REFERENCES Care ancer 12, 571–576. doi: 10.1007/s00520-004-0589-2 March 2017 | Volume 8 | Article 134 Frontiers in Physiology | www.frontiersin.org 7 Murtaza et al. Taste and Cancer Chaudhari, N., and Roper, S. D. (2010). The cell biology of taste. J. Cell Biol. 190, 285–296. doi: 10.1083/jcb.201003144 Huang, Y. A., Dando, R., and Roper, S. D. (2009). Autocrine and paracrine roles for ATP and Serotonin in mouse taste buds. J. Neurosci. 29:13909. doi: 10.1523/JNEUROSCI.2351-09.2009 Chaudhari, N., Landin, A. M., and Roper, S. D. (2000). A metabotropic glutamate receptor variant functions as a taste receptor. Nat. Neurosci. 3, 113–119. doi: 10.1038/72053 Huldij, A., Giesbers, A., Poelhuis, E. H., Hart, A. A., Hulshof, K. F., and Bruning, P. F. (1986). Alterations in taste appreciation in cancer patients during treatment. Cancer Nurs. 9, 38–42. doi: 10.1097/00002820-198602000-00006 Chencharick, J. D., and Mossman, K. L. (1983). Nutritional consequences of the radiotherapy of head and neck cancer. Cancer 51, 811–815. doi: 10.1002/1097- 0142(19830301)51:5&lt;811::AID-CNCR2820510511&gt;3.0.CO;2-M Johnson, S. D., De Costa, A.-M., and Young, M. R. (2014). Effect of the premalignant and tumor microenvironment on immune cell cytokine production in head and neck cancer. Cancers 6, 756–770. doi: 10.3390/cancers6020756 Comeau, T. B., Epstein, J. B., and Migas, C. (2001). Taste and smell dysfunction in patients receiving chemotherapy: a review of current knowledge. Support. Care Cancer 9, 575–580. doi: 10.1007/s005200100279 Kapsimali, M., and Barlow, L. A. (2013). Developing a sense of taste. Semin. Cell Dev. Biol. 24, 200–209. doi: 10.1016/j.semcdb.2012.11.002 Coussens, L. M., and Werb, Z. (2002). Inflammation and cancer. Nature 420, 860–867. doi: 10.1038/nature01322 Kettaneh, A., Fain, O., Stirnemann, J., and Thomas, M. (2002). Les troubles du goût. La Revue Méd. Interne 23, 622–631. doi: 10.1016/S0248-8663(02) 00623-9 Deems, D. A., Doty, R. L., Settle, R. G., Moore-Gillon, V., Shaman, P., Mester, A. F., et al. (1991). Smell and taste disorders, a study of 750 patients from the University of Pennsylvania Smell and Taste Center. Arch. Otol. Head Neck Surg. 117, 519–528. doi: 10.1001/archotol.1991.01870170065015 Kim, A., Feng, P., Ohkuri, T., Sauers, D., Cohn, Z. J., Chai, J., et al. (2012). Defects in the peripheral taste structure and function in the MRL/lpr mouse model of autoimmune disease. PLoS ONE 7:e35588. doi: 10.1371/journal.pone.0035588 117, 519–528. doi: 10.1001/archotol.1991.01870170065015 Dimitriu, C., Martignoni, M. E., Bachmann, J., Fröhlich, B., Tintarescu, G., Buliga, T., et al. (2005). Clinical impact of cachexia on survival and outcome of cancer patients. Rom. J. Int. Med. 43, 173–185. Kinnamon, S. REFERENCES C., Dionne, V. E., and Beam, K. G. (1988). Apical localization of K+ channels in taste cells provides the basis for sour taste transduction. Proc. Nat. Acad. Sci.U.S.A. 85, 7023–7027. doi: 10.1073/pnas.85.18.7023 Dörr, K. B., Brankovic, K., and Hartmann, W (2000). Repopulation in mouse oral mucosa: changes in the effect of dose fractionation. Int. J. Radiat. Biol. 76, 383–390. doi: 10.1080/095530000138727 Knox, J. J., Puodziunas, A. L., and Feld, R. (2000). Chemotherapy-induced oral mucositis. Drugs Aging 17, 257–267. doi: 10.2165/00002512-200017040-00002 Duan, W., Shen, X., Lei, J., Xu, Q., Yu, Y., Li, R., et al. (2014). Hyperglycemia, a neglected factor during cancer progression. Biomed Res. Int. 2014:461917. doi: 10.1155/2014/461917 Komurcu, S., Nelson, K. A., Walsh, D., Ford, R. B., and Rybicki, L. A. (2002). Gastrointestinal symptoms among inpatients with advanced cancer. Am. J. Hospice Palliat. Med. 19, 351–355. doi: 10.1177/104990910201900513 Duca, F. A., Swartz, T. D., Sakar, Y., and Covasa, M. (2012). Increased oral detection, but decreased intestinal signaling for fats in mice lacking gut microbiota. PLoS ONE 7:e39748. doi: 10.1371/journal.pone.00 39748 Kouvaris, J. R., Kouloulias, V. E., and Vlahos, L. J. (2007). Amifostine: the first selective-target and broad-spectrum radioprotector. Oncologist 12, 738–747. doi: 10.1634/theoncologist.12-6-738 Kumari, A., Ermilov, A. N., Allen, B. L., Bradley, R. M., Dlugosz, A. A., and Mistretta, C. M. (2015). Hedgehog pathway blockade with the cancer drug LDE225 disrupts taste organs and taste sensation. J. Neurophysiol. 113, 1034–1040. doi: 10.1152/jn.00822.2014 Edelman, M. J., Gandara, D. R., Meyers, F. J., Ishii, R., O’mahony, M., Uhrich, M., et al. (1999). Serotonergic blockade in the treatment of the cancer anorexia-cachexia syndrome. Cancer 86, 684–688.doi: 10.1002/(SICI)1097- 0142(19990815)86:4&lt;684::AID-CNCR18&gt;3.0.CO;2-6 Kuper, H., Adami, H. O., and Trichopoulos, D. (2000). Infections as a major preventable cause of human cancer. J. Intern. Med. 248, 171–183. doi: 10.1046/j.1365-2796.2000.00742.x Epstein, J. B., and Barasch, A. (2010). Taste disorders in cancer patients: pathogenesis, and approach to assessment and management. Oral Oncol. 46, 77–81. doi: 10.1016/j.oraloncology.2009.11.008 Ley, R. E., Peterson, D. A., and Gordon, J. I. (2006). Ecological and evolutionary forces shaping microbial diversity in the human intestine. Cell 124, 837–848. doi: 10.1016/j.cell.2006.02.017 Ferguson, M. (2003). Patient-generated subjective global assessment. Oncology 17, 13–14; discussion 14–16. Ferguson, M., Capra, S., Bauer, J., and Banks, M. (1999). Development of a valid and reliable malnutrition screening tool for adult acute hospital patients. Nutrition 15, 458–464. doi: 10.1016/S0899-9007(99)00084-2 Lin, W.-W., and Karin, M. (2007). A cytokine-mediated link between innate immunity, inflammation, and cancer. J. REFERENCES 05.002 Mossman, K. L., and Henkin, R. I. (1978). Radiation-induced changes in taste acuity in cancer patients. Int. J. Radiat. Oncol. 4, 663–670. doi: 10.1016/0360-3016(78)90190-6 Skolin, I., Wahlin, Y. B., Broman, D. A., Koivisto Hursti, U.-K., Larsson, M. V., and Hernell, O. (2006). Altered food intake and taste perception in children with cancer after start of chemotherapy: perspectives of children, parents and nurses. Support. Care Cancer 14, 369–378. doi: 10.1007/s00520-005-0904-6 Münter, M. W., Hoffner, S., Hof, H., Herfarth, K. K., Haberkorn, U., Rudat, V., et al. (2007). Changes in salivary gland function after radiotherapy of head and neck tumors measured by quantitative pertechnetate scintigraphy: comparison of intensity-modulated radiotherapy and conventional radiation therapy with and without Amifostine. Int. J. Radiat. Oncol. 67, 651–659. doi: 10.1016/j.ijrobp.2006.09.035 Speck, R. M., Demichele, A., Farrar, J. T., Hennessy, S., Mao, J. J., Stineman, M. G., et al. (2013). Taste alteration in breast cancer patients treated with taxane chemotherapy: experience, effect, and coping strategies. Support. Care Cancer 21, 549–555. doi: 10.1007/s00520-012-1551-3 Najafizade, N., Hemati, S., Gookizade, A., Berjis, N., Hashemi, M., Vejdani, S., et al. (2013). Preventive effects of zinc sulfate on taste alterations in patients under irradiation for head and neck cancers: a randomized placebo-controlled trial. J. Res. Med. Sci. 18, 123–126. Steinbach, S., Hummel, T., Böhner, C., Berktold, S., Hundt, W., Kriner, M., et al. (2009). Qualitative and quantitative assessment of taste and smell changes in patients undergoing chemotherapy for breast cancer or gynecologic malignancies. J. Clin. Oncol. 27, 1899–1905. doi: 10.1200/JCO.2008.19.2690 Ozdener, M. H., Subramaniam, S., Sundaresan, S., Sery, O., Hashimoto, T., Asakawa, Y., et al. (2014). CD36- and GPR120-mediated Ca(2)(+) signaling in human taste bud cells mediates differential responses to fatty acids and is altered in obese mice. Gastroenterology 146, 995–1005. doi: 10.1053/j.gastro.2014.01.006 Suzuki, T. (2007). Cellular mechanisms in taste buds. Bull. Tokyo Dent. Coll. 48, 151–161. doi: 10.2209/tdcpublication.48.151 Swartz, T. D., Duca, F. A., de Wouters, T., Sakar, Y., and Covasa, M. (2012). Up- regulation of intestinal type 1 taste receptor 3 and sodium glucose luminal transporter-1 expression and increased sucrose intake in mice lacking gut microbiota. Br. J. Nutr. 107, 621–630. doi: 10.1017/S0007114511003412 Potten, C. S., Booth, D., Cragg, N. J., Tudor, G. L., O’shea, J. A., Booth, C., et al. (2002). Cell kinetic studies in the murine ventral tongue epithelium: mucositis induced by radiation and its protection by pretreatment with keratinocyte growth factor (KGF). Cell Prolif. 35, 32–47. REFERENCES Glucose transporter GLUT1 in colorectal adenocarcinoma cell lines is inversely correlated with tumour cell proliferation. Anticancer Res. 25, 3431–3436. Medler, K. F. (2011). Multiple roles for TRPs in the taste system: not your typical TRPs. Adv. Exp. Med. Biol. 704, 831–846. doi: 10.1007/978-94-007-0265-3_43 Heinze, J. M., Preissl, H., Fritsche, A., and Frank, S. (2015). Controversies in fat perception. Physiol. Behav. 152, 479–493. doi: 10.1016/j.physbeh.2015. 08.033 Merchant, A. A., and Matsui, W. (2010). Targeting Hedgehog— a cancer stem cell pathway. Clin. Cancer Res. 16, 3130–3140. doi: 10.1158/1078-0432.CCR-09-2846 Ming-Hua, C., Bao-Hua, Z., and Lei, Y. (2016). Mechanisms of anorexia cancer cachexia syndrome and potential benefits of traditional Heyneman, C. A. (1996). Zinc deficiency and taste disorders. Ann. Pharmacother. 30, 186–187. doi: 10.1177/106002809603000215 March 2017 | Volume 8 | Article 134 Frontiers in Physiology | www.frontiersin.org 8 Murtaza et al. Taste and Cancer dietary behaviors in cancer patients under chemotherapy. Nutr. J. 9:15. doi: 10.1186/1475-2891-9-15 medicine and natural herbs. Curr. Pharm. Biotechnol. 17, 1147–1152. doi: 10.2174/1389201017666161018123311 medicine and natural herbs. Curr. Pharm. Biotechnol. 17, 1147–1152. doi: 10.2174/1389201017666161018123311 Schmidt, B. L., Kuczynski, J., Bhattacharya, A., Huey, B., Corby, P. M., Queiroz, E. L., et al. (2014). Changes in abundance of oral microbiota associated with oral cancer. PLoS ONE 9:e98741. doi: 10.1371/journal.pone.0098741 Miura, H., and Barlow, L. A. (2010). Taste bud regeneration and the search for taste progenitor cells. Arch. Ital. Biol. 148, 107. Miura, H., Kusakabe, Y., and Harada, S. (2006). Cell lineage and differentiation in taste buds. Arch. Histol. Cytol. 69, 209–225. doi: 10.1679/aohc.69.209 Sekulic, A., Migden, M. R., Oro, A. E., Dirix, L., Lewis, K. D., Hainsworth, J. D., et al. (2012). Efficacy and safety of vismodegib in advanced basal- cell carcinoma. N. Engl. J. Med. 366, 2171–2179. doi: 10.1056/NEJMoa11 13713 Mizukami, Y., Sato, J., Nihei, S., Kashiwaba, M., Kudo, K., Okuyama, H., et al. (2016). The effectiveness of polaprezinc preparation for taste alteration in cancer chemotherapy. Gan To Kagaku Ryoho 43, 979–983. Sherry, V. (2001). Taste alterations among patients with cancer. Clin. J. Oncol. Nurs. 6, 73–77. doi: 10.1188/02.CJON.73-77 Montmayeur, J.-P., Liberles, S. D., Matsunami, H., and Buck, L. B. (2001). A candidate taste receptor gene near a sweet taste locus. Nat. Neurosci. 4, 492–498. doi: 10.1038/87440 Shi, H.-B., Masuda, M., Umezaki, T., Kuratomi, Y., Kumamoto, Y., Yamamoto, T., et al. (2004). Irradiation impairment of umami taste in patients with head and neck cancer. Auris Nasus Larynx 31, 401–406. doi: 10.1016/j.anl.2004. REFERENCES doi: 10.1046/j.1365-2184.35. s1.4.x Takeda, M., and Hoshino, T. (1975). Fine structure of taste buds in the rat. Arch. Histol. Japonicum 37, 395–413. doi: 10.1679/aohc1950.37.395 Ravasco, P. (2005). Aspects of taste and compliance in patients with cancer. Eur. J. Oncol. Nurs. 9, S84–S91. doi: 10.1016/j.ejon.2005.09.003 Tang, J. Y., Mackay-Wiggan, J. M., Aszterbaum, M., Yauch, R. L., Lindgren, J., Chang, K., et al. (2012). Inhibiting the hedgehog pathway in patients with the basal-cell nevus syndrome. N. Engl. J. Med. 366, 2180–2188. doi: 10.1056/NEJMoa1113538 Ravasco, P., Monteiro-Grillo, I., and Camilo, M. E. (2003). Does nutrition influence quality of life in cancer patients undergoing radiotherapy? Radiother. Oncol. 67, 213–220. doi: 10.1016/S0167-8140(03)00040-9 Trant, A. S., Serin, J., and Douglass, H. O. (1982). Is taste related to anorexia in cancer patients? Am. J. Clin. Nutr. 36, 45–58. Rehwaldt, M., Wickham, R., Purl, S., Tariman, J., Blendowski, C., Shott, S., et al. (2009). Self-care strategies to cope with taste changes after chemotherapy. Oncol. Nurs. Forum 36, E47–E56. doi: 10.1188/09.ONF.E47-E56 Von Hoff, D. D., Lorusso, P. M., Rudin, C. M., Reddy, J. C., Yauch, R. L., Tibes, R., et al. (2009). Inhibition of the hedgehog pathway in advanced basal-cell carcinoma. N. Engl. J. Med. 361, 1164–1172. doi: 10.1056/NEJMoa0905360 Von Hoff, D. D., Lorusso, P. M., Rudin, C. M., Reddy, J. C., Yauch, R. L., Tibes, R., et al. (2009). Inhibition of the hedgehog pathway in advanced basal-cell g g p y carcinoma. N. Engl. J. Med. 361, 1164–1172. doi: 10.1056/NEJMoa0905360 Rhodes, V. A., Mcdaniel, R. W., Hanson, B., Markway, E., and Johnson, M. (1994). Sensory perception of patients on selected antineoplastic chemotherapy protocols. Cancer Nurs. 17, 45–51. Wakisaka, S. (2005). Lectin histochemistry of taste buds in the circumvallate papilla of the rat. Chem. Senses 30, i46–i47. doi: 10.1093/chemse/bjh106 Ripamonti, C., Zecca, E., Brunelli, C., Fulfaro, F., Villa, S., Balzarini, A., et al. (1998). A randomized, controlled clinical trial to evaluate the effects of zinc sulfate on cancer patients with taste alterations caused by head and neck irradiation. Cancer 82, 1938–1945. doi: 10.1002/(SICI)1097- 0142(19980515)82:10&lt;1938::AID-CNCR18&gt;3.0.CO;2-U Walenta, S., Wetterling, M., Lehrke, M., Schwickert, G., Sundfør, K., Rofstad, E. K., et al. (2000). High lactate levels predict likelihood of metastases, tumor recurrence, and restricted patient survival in human cervical cancers. Cancer Res. 60, 916–921. Wang, H., Zhou, M., Brand, J., and Huang, L. (2009). Inflammation and taste disorders: mechanisms in taste buds. Ann. N. Y. Acad. Sci. 1170, 596–603. REFERENCES doi: 10.1111/j.1749-6632.2009.04480.x Roland, S., and Rémi, G. (2013). Odorat et Goût: De la Neurobiologie des Sens Chimiques Aux Applications. Versailles: Editions Quae. Wang, Y., Zhou, X., and Xu, X. (2015). Oral microbiota: an overlooked etiology for chemotherapy-induced oral mucositis? J. Formosan Med. Assoc. 114, 297–299. doi: 10.1016/j.jfma.2013.10.014 Romanov, R. A., Rogachevskaja, O. A., Khokhlov, A. A., and Kolesnikov, S. S. (2008). Voltage dependence of ATP secretion in mammalian taste cells. J. Gen. Physiol. 132, 731–744. doi: 10.1085/jgp.200810108 Roper, S. D. (2013). Taste buds as peripheral chemosensory processors. Semin. Cell Dev. Biol. 24, 71–79. doi: 10.1016/j.semcdb.2012.12.002 Wickham, R. S., Rehwaldt, M., Kefer, C., Shott, S., Abbas, K., Glynn-Tucker, E., et al. (1999). Taste changes experienced by patients receiving chemotherapy. Oncol. Nurs. Forum 26, 697–706. Rousseaux, C., Thuru, X., Gelot, A., Barnich, N., Neut, C., Dubuquoy, L., et al. (2007). Lactobacillus acidophilus modulates intestinal pain and induces opioid and cannabinoid receptors. Nat. Med. 13, 35–37. doi: 10.1038/nm1521 Williams, L. R., and Cohen, M. H. (1978). Altered taste thresholds in lung cancer. Am. J. Clin. Nutr. 31, 122–125. Rozengurt, E., and Sternini, C. (2007). Taste receptor signaling in the mammalian gut. Curr. Opin. Pharmacol. 7, 557–562. doi: 10.1016/j.coph.2007. 10.002 Wong, G. T., Gannon, K. S., and Margolskee, R. F. (1996). Transduction of bitter and sweet taste by gustducin. Nature 381, 796–800. doi: 10.1038/381796a0 Yamagata, T., Nakamura, Y., Yamagata, Y., Nakanishi, M., Matsunaga, K., Nakanishi, H., et al. (2003). The pilot trial of the prevention of the increase in electrical taste thresholds by zinc containing fluid infusion during chemotherapy to treat primary lung cancer. J. Exp. Clin. Cancer Res. 22, 557–563. Ruo Redda, M. G., and Allis, S. (2006). Radiotherapy-induced taste impairment. Cancer Treat. Rev. 32, 541–547. doi: 10.1016/j.ctrv.2006.06.003 Sánchez-Lara, K., Sosa-Sánchez, R., Green-Renner, D., Rodríguez, C., Laviano, Sánchez-Lara, K., Sosa-Sánchez, R., Green-Renner, D., Rodríguez, C., Laviano, A., Motola-Kuba, D., et al. (2010). Influence of taste disorders on Sánchez Lara, K., Sosa Sánchez, R., Green Renner, D., Rodríguez, C., Laviano, A., Motola-Kuba, D., et al. (2010). Influence of taste disorders on March 2017 | Volume 8 | Article 134 Frontiers in Physiology | www.frontiersin.org 9 Murtaza et al. Taste and Cancer Zheng, W. K., Inokuchi, A., Yamamoto, T., and Komiyama, S. (2002). Taste dysfunction in irradiated patients with head and neck cancer. Hukuoka Acta Med. 93, 64–76. Yamashita, H., Nakagawa, K., Tago, M., Nakamura, N., Shiraishi, K., Eda, M., et al. (2006). Frontiers in Physiology | www.frontiersin.org REFERENCES Taste dysfunction in patients receiving radiotherapy. Head Neck 28, 508–516. doi: 10.1002/hed.20347 Yang, H., Cong, W. N., Yoon, J. S., and Egan, J. M. (2015). Vismodegib, an antagonist of hedgehog signaling, directly alters taste molecular signaling in taste buds. Cancer Med. 4, 245–252. doi: 10.1002/ cam4.350 Conflict of Interest Statement: The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. Yang, R., Crowley, H. H., Rock, M. E., and Kinnamon, J. C. (2000). Taste cells with synapses in rat circumvallate papillae display SNAP-25-like immunoreactivity. J. Comp. Neurol. 424, 205–215. doi: 10.1002/1096-9861(20000821)424:2<205::AID-CNE2>3.0.CO;2-F Copyright © 2017 Murtaza, Hichami, Khan, Ghiringhelli and Khan. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms. Zabernigg, A., Gamper, E.-M., Giesinger, J. M., Rumpold, G., Kemmler, G., Gattringer, K., et al. (2010). Taste alterations in cancer patients receiving chemotherapy: a neglected side effect? Oncologist 15, 913–920. doi: 10.1634/theoncologist.2009-0333 March 2017 | Volume 8 | Article 134 Frontiers in Physiology | www.frontiersin.org 10
https://openalex.org/W2148520888
https://escholarship.org/content/qt8xb8462c/qt8xb8462c.pdf?t=ppugo0
English
null
Laminar specific attachment and neurite outgrowth of thalamic neurons on cultured slices of developing cerebral neocortex
Development
1,994
cc-by
13,715
UC Irvine UC Irvine Previously Published Works Title Laminar specific attachment and neurite outgrowth of thalamic neurons on cultured slices of developing cerebral neocortex. Permalink Permalink https://escholarship.org/uc/item/8xb8462c Journal Development (Cambridge, England), 120(10) Journal Copyright Information This work is made available under the terms of a Creative Commons Attribution License, availalbe at https://creativecommons.org/licenses/by/4.0/ Peer reviewed INTRODUCTION cortical layers 2-6, which form in an ‘inside-out’ fashion (reviewed by DeCarlos and O’Leary, 1992; Erzurumlu and Jhaveri, 1992; Kageyama and Robertson, 1993). After entering the cortical plate, thalamic growth cones migrate toward the pial surface, passing through the infragranular laminae (5/6), to the granular layer (4) or the lower portion of layer 3 where most axons terminate and arborize (Miller et al., 1993; Kageyama and Robertson, 1993; Agmon et al., 1993). During brain development, the growth cones of advancing axons often travel relatively long distances to reach their targets. Evidently, this process involves specific decisions made by growth cones as they navigate (reviewed by Dodd and Jessell, 1988; Hynes and Lander, 1992). The formation of con- nections between the thalamus and the cerebral cortex is an attractive model for studying axonal development within the mammalian brain because the anatomy and timing of the growth of this pathway is relatively well characterized (reviewed by O’Leary and Koester, 1993). g y g There is both in vivo and in vitro evidence suggesting that the pathway decisions made by thalamocortical afferents are controlled by cues residing in specific cortical layers. For example, Ghosh et al. (1990) have shown that ablating subplate neurons in developing animals prevents the innervation of the cortical plate by thalamic afferents. Studies of long-term, thal- amocortical co-cultures (Yamamoto et al., 1989, 1992; Molnár and Blakemore, 1991; Bolz et al., 1992; Götz et al., 1992) have demonstrated that axons extending from thalamic explants onto postnatal cortical slices generally stop growth in or near layer 4, the major target of these axons in vivo. In rodents, thalamic growth cones leave the thalamus and travel through the ganglionic eminence (anlage of the basal forebrain), to enter the developing cerebral cortex well before most of their target cells are born. The growth cones then travel mostly within the intermediate zone and subplate in a pathway that runs tangential to the cortical surface (the pia) and opposite in direction to the simultaneous growth of cortical efferents. Concurrently, the overlying cortical plate thickens as postmi- totic neurons, including the target cells of thalamic axons, arrive from their birthplace in the ventricular zone. SUMMARY In nervous system development, the growth cones of advancing axons are thought to navigate to their targets by recognizing cell-surface and extracellular matrix molecules that act as specific guidance cues. To identify and map cues that guide the growth of a particular axonal system, the thalamocortical afferents, an assay was devised to examine short-term interactions of dissociated embryonic thalamic cells with living, ~150 µm slices of developing mouse forebrain. Thalamic cells rapidly (<3 hours) and efficiently attached to and extended neurites on pre- and postnatal slices, but a broad zone throughout the neocortex was generally non-permissive for both thalamic cell attachment and the ingrowth of neurites. This zone coincided with the cortical plate at early stages (embryonic day 15), but later became restricted, in rostral-to-caudal fashion, to cortical laminae 2/3. Thus, at each stage, thalamic cells in vitro avoided just that area that thalamic axons confront, but generally do not enter, in vivo. In addition, neurites that extended on some layers were found to be significantly oriented in directions that coincide with the pathways that thalamic axons follow in vivo. These results imply that local adhesive cues and signals that affect process outgrowth are distributed among developing cortical laminae in a manner that could underlie much of the temporal and spatial pat- terning of thalamocortical innervation. Key words: cortical development, thalamic innervation, adhesion, slice culture, neurite outgrowth, axonal development, axon guidance Laminar specific attachment and neurite outgrowth of thalamic neurons on cultured slices of developing cerebral neocortex Daniel E. Emerling1 and Arthur D. Lander1,2,* 1Department of Brain and Cognitive Sciences and 2Department of Biology, Massachusetts Institute of Technology, Cambridge, MA 02139, USA Daniel E. Emerling1 and Arthur D. Lander1,2,* 1Department of Brain and Cognitive Sciences and 2Department of Biology, Massachusetts Institute of Technology, Cambridge, MA 02139, USA *Author for correspondence at address1 *Author for correspondence at address1 *Author for correspondence at address1 Powered by the California Digital Library University of California eScholarship.org eScholarship.org 2811 Development 120, 2811-2822 (1994) Development 120, 2811-2822 (1994) Printed in Great Britain © The Company of Biologists Limited 1994 p ( ) Printed in Great Britain © The Company of Biologists Limited 1994 Key words: cortical development, thalamic innervation, adhesion, slice culture, neurite outgrowth, axonal development, axon guidance INTRODUCTION Thalamic growth cones project into the cell dense cortical plate only after the latter has begun to differentiate into distinguishable laminae (Lund and Mustari, 1977), eventually becoming We wished to exploit the simplicity of the in vitro approach to look for some of the cues that guide thalamocortical afferents, especially those that might only be present tran- siently and would therefore be difficult to identify in long-term explant co-cultures. Consequently, embryonic thalamic cells were dissociated, fluorescently labeled and plated directly onto 2812 D. E. Emerling and A. D. Lander living, vibratome slices of mouse forebrain taken from different developmental stages. Cells were examined both for attachment and neurite outgrowth during one day in culture. centration was increased to 0.19 mg/ml and the suspension was incubated for another 5 minutes at 37°C. Tissue was triturated gently five times with a flame-polished pasteur pipette that was coated with a solution of 4% BSA in CMF-HBSS (brought to pH of 7.3 with 1 N NaOH). The suspension was brought to a final volume of approx. 10 ml with HHBSS, undissociated tissue was allowed to settle (approx. 5 minutes) and the supernatant was transferred to a new tube. The cell suspension was centrifuged at 100 g for 10 minutes and the pellet gently resuspended in Labeling Medium which consisted of 30 µM Cell Tracker™CMTMR (Molecular Probes, Eugene, OR) in CM; prepared, centrifuged to remove undissolved dye and filter sterilized just before use. Cells were incubated at 37°C for 30-50 minutes. Two volumes of 37°C CM were added to the suspension along with DNAse (0.12 mg/ml) and incubation continued for 5-15 minutes. Several volumes of HHBSS were added and the suspension was underlayed with a 2 ml cushion of 4% BSA (crystalline BSA in CMF-HBSS; brought to pH 7.3 with 1 N NaOH). Cells were then centrifuged at 150 g for 10 minutes. The pellet was resuspended in CM and cells were checked for viability using Trypan Blue. Routinely, >95% of cells excluded Trypan Blue. The cell suspension was diluted with CM to a concentration of ≈2.5×106 cells/ml. Within 1 hour of coculture, cells were observed to attach well to all embryonic (E15) cortical layers except for the cortical plate, which supported poor attachment. Neurite outgrowth was observed within 3 hours and, on some laminae, exhibited a significant tangential orientation. However, no neurites were observed to enter the cortical plate. INTRODUCTION As slices from older animals were used, the non-permissiveness of the cortical plate gradually changed, in a manner that correlated both spatially and temporally with ongoing events in thalamo- cortical development. These results indicate that lamina- specific signals that affect thalamic neuron behavior can be detected in as little as 3 hours in vitro. Moreover, they suggest that as simple a mechanism as local differences in cell adhesion could play a major role in dictating the timing and location of thalamocortical innervation. Dissection of tissue Random-bred Swiss mice (CD-1, Charles River Laboratories) were naturally mated. Day of identification of vaginal plug was considered E0 and day of birth P0. For embryonic tissue, pregnant animals were killed by cervical dislocation and embryos removed. For postnatal tissue, animals were anesthetized by cooling on ice and brains were immediately removed. Brains were dissected in ice-cold phosphate- buffered saline (PBS: 137 mM NaCl, 2.68 mM KCl, 7.83 mM Na2HPO4, 1.47 mM KH2PO4) and prepared for sectioning (see below) or used to obtain tissue for dissociated cell preparations. In the latter case, further dissection of brains into regions (e.g. thalamus) was performed in ice-cold PBS supplemented with 4% calf serum (HyClone Laboratories), 5.6 mg/ml glucose, 25 i.u./ml penicillin, 25 µg/ml streptomycin and 0.001% phenol red, and the Atlas of the Prenatal Mouse Brain (Schambra et al., 1992) was used as a guide. The boundaries used in dissecting the thalamus were, in the rostro- caudal direction, the habenular recess and the dorsal diencephalic sulcus of the third ventricle while, in the dorsoventral direction, the boundaries were the epithalamus and a point just dorsal to the ventral diencephalic (hypothalamic) sulcus. Careful attention was paid to the removal of tissue from the mammillary, preoptic and tegmental nuclei as well of from the epi- and hypothalamus. Dissected tissue was immediately rinsed in multiple volumes of ice-cold HHBSS: calcium- magnesium free, Hank’s Balanced Salt Solution (CMF-HBSS) sup- plemented with 10 mM Hepes, pH 7.2. Preparation and fixation of living slice cultures p g Brains were placed in 37°C, molten, low melting point agarose solution (Gibco BRL; 2% in PBS supplemented with 3 g/L glucose) which was immediately placed on ice to harden. Agarose blocks con- taining brains were cut to size (approx. 1.5 cm3), glued to a vibratome tray (Technical Products International, Inc., St. Louis), immersed in ice-cold PBS (supplemented with 0.45% glucose and 1 mM sodium pyruvate) and the tray was subsequently surrounded by an ice bath. Under the PBS bath, brains were vibratome-sectioned (150-200 µm thick) and slices were placed on nitrocellulose (0.45 µm; Sartorius, Bohemia, NY) filter disks (12 mm diameter) that had previously been sterilized, incubated in a sterile solution of concanavalin A (1.3 mg/ml in glutamine free DMEM) for 4-18 hours at 4°C and rinsed several times in HHBSS before use. Disks with mounted slices were removed from the bath, placed on sterilized parafilm in plastic Petri dishes and 100 µl of ice-cold CM was added, forming a bubble over the slices. Slices were kept on ice until all had been cut, medium was removed, 45 µl of fresh CM added and then slices were moved to a 37°C humid- ified incubator with a 8% CO2 atmosphere. Cells were plated onto slices by carefully pipetting 45 µl of cells into the medium already on slices (≈105 cells/filter disk; ≈1000-2000 cells/mm2). Cells were allowed to settle at 37°C and incubated for various periods. Cultures were transferred to a large volume of 37°C HHBSS and gently rinsed to remove unattached cells (for some experiments, cells were visual- ized by fluorescence microscopy before the transfer and rinse procedure). Cultures were then added to warm (37°C) fixative: 4% paraformaldehyde (J. T. Baker, Phillipsburg, NJ) in 0.2 M sodium phosphate buffer (pH 7.5). After 15-30 minutes, the fixed tissue was rinsed in PBS and counterstained (using 10 µg/ml bisbenzimide [Hoechst 33258] in PBS). Cultures were mounted on glass slides in a saturated sucrose solution containing 0.1% sodium azide (Fluka AG) and coverslipped. All salts, sucrose and glucose were purchased from Mallinckrodt. Tissue culture media, sodium pyruvate, penicillin and streptomycin were purchased from Mediatech. All other reagents were purchased from Sigma unless otherwise indicated. 281 Thalamic cell behavior on cortical slices 2813 Thalamic cell behavior on cortical slices jugated, goat anti-mouse IgM, µ-chain specific (TAGO, Burlingame, CA), diluted 1:80 in wash solution. Cultures were washed several times, rinsed in PBS, counterstained with bisbenzamide, rinsed in 0.1 M NaHCO3 (pH 9.2) and mounted in a saturated sucrose solution con- taining 0.1 M NaHCO3 (pH 8.5) and 0.1% sodium azide. jugated, goat anti-mouse IgM, µ-chain specific (TAGO, Burlingame, CA), diluted 1:80 in wash solution. Cultures were washed several times, rinsed in PBS, counterstained with bisbenzamide, rinsed in 0.1 M NaHCO3 (pH 9.2) and mounted in a saturated sucrose solution con- taining 0.1 M NaHCO3 (pH 8.5) and 0.1% sodium azide. was superimposed over the fluorescence image of the culture within the microscope objectives, was drawn using the hardware and software of the Neuron Tracing System (Eutectics Electronics Inc., Raleigh, NC). Cortical layers and their borders were identified and traced under UV fluorescence while labeled and attached thalamic cells were individu- ally traced under rhodamine fluorescence. Using an automated, cali- brated microscope stage and both fluorescence channels, a composite image of slice anatomy, attached cells and neurite morphology was drawn to scale across several microscope fields. For staining of dissociated cells, the following methods were used. Cells were plated onto acid-washed glass coverslips (12 mm diameter) that had been treated with polylysine (100 µg/ml in PBS) overnight at 4°C, washed several times with PBS, incubated with concanavalin A (400 µg/ml in HHBSS) for 4 hours at 37°C and rinsed several times in HHBSS. Plated cells were left for 3.5 hours at 37°C in a humidi- fied incubator (8% CO2 atmosphere), fixed for 22 minutes with 4% paraformaldehyde in 5% sucrose/PBS and rinsed with PBS. For staining with antibodies to intracellular epitopes, cells were treated at this point with 0.5% Triton X-100 in PBS for 5 minutes at room tem- perature and, for all experiments, cells were blocked with a solution of 5% goat serum, 5% calf serum and 0.1% sodium azide in PBS. This solution was used for all subsequent washes and antibody dilutions. Anti-neurofilament (monoclonal antibody RT97, 1:666 dilution of ascites fluid [Wood and Anderton 1981]); anti-neuron specific β-tubulin (monoclonal antibody TUJ1, 1:200 dilution of con- centration culture supernatant [Easter et al., 1993]) and anti-mouse NCAM (monoclonal antibody H28, 1:1 dilution of culture supernatant [Gennarini et al., 1984]) were applied at 4°C overnight. 281 Thalamic cell behavior on cortical slices FITC- (Anti- bodies Inc., Davis, CA) and rhodamine-conjugated (Kirkegaard & Perry Labs Inc., Gaithersburg, MD) secondary antibodies were used for visualization. Cell nuclei were counterstained with bisbenzamide and coverslips mounted in 80% glycerol in PBS or 0.1 M NaHCO3. Neurite data were collected from experiments using sagittal slices. Neurites were traced only if their growth cones and soma of origin could be clearly demarcated and if they were at least one soma diameter in length (approx. 10 µm). Since neurites often projected downward, into the slice tissue, they were traced in three dimensions (automated and calibrated control of the focus knob allowed for images to be traced through focal planes). Some cells had two neurites longer than a cell diameter; in these cases, both processes were traced. No neurites had branches which themselves met the length criterion. Neurite data analysis Neurite lengths were calculated by the system software as the 3-D contour distance between a neurite’s origin (point of connection to the soma) and its endpoint (center of the growth cone). Orientations for marginal zone, subplate/intermediate zone and ventricular zone neurites were calculated with respect to the marginal zone/cortical plate, cortical plate/subplate and intermediate zone/ventricular zone borders respectively. Values consisted of the angle between the reference border (or, if curved, a tangent to the border) closest to the neurite’s origin and a line defined by the neurite’s origin and its end point. Only coordinates along the rostral-caudal and pial-to-ventricu- lar axes were used for this calculation. A neurite projecting rostrally, parallel with its reference border, defined 0°. Projections directed toward the pia, perpendicular to the reference border, were assigned 90° and those directed toward the ventricle were assigned −90°. Preparation and fixation of cryostat section cultures Dissected brains were snap frozen in isopentane kept in a dry- ice/ethanol bath. Frozen brains were equilibrated to −20°C and mounted in OCT compound (Miles, Inc., Elkhart, IN). 20 µm slices were cut on a Reichert-Jung 2800 Frigocut-E cryostat. Slices were warmed onto ProbeOn Plus™glass slides (FisherBiotech) and air dried. OCT was peeled off and a well was created (approx. 12 mm diameter) around the tissue slice with rubber cement (Dennison Sta- tionary, Framingham, MA). Slices were then rehydrated with PBS, rinsed with CM and 45 µl of fresh medium was added to the well. Slices were kept at 37°C for 30 minutes before 45 µl of cell suspen- sion was added to the medium on each slice (approx. 105 cells/well) and cultures were incubated at 37°C for 3 hours. Unattached cells were gently rinsed off with 37°C HHBSS. The rubber cement was removed and warm (37°C) fixative was added for 10-20 minutes. After rinsing with PBS and counterstaining (10 µg/ml bisbenzimide in PBS), cultures were visualized by fluorescence microscopy. Attachment data analysis The surface area of and the number of cells on each layer were computed based on stored digital images and attachment densities were calculated from these values. Distances from the cortical plate/subplate border of cells attached to the subplate and intermedi- ate zone were calculated by the system software as the distance, within a plane parallel to the plane of the slice, between the center of each attached cell and the closest point on the cortical plate/subplate border to that cell. Attachment data for different cortical layers were compared by a single factor analysis of variance (ANOV) to obtain reported P values. A Newman-Keuls test was used to verify the outlier values (Zar, 1974). Data collection The selection of fixed slice cultures for quantification was based solely on the integrity of slice anatomy, as visualized by bisbenza- mide staining of cell nuclei. Cultures were chosen only if the laminar borders could be clearly discerned and the identity of individual laminae unambiguously determined. Borders were delineated by dif- ferences in the density of cell nuclei and laminae were identified in some cases by specific landmarks, such as barrels within the granular layer of the P7 somatosensory cortex. Slices that had been folded or torn while being placed onto the nitrocellulose substrata, or had otherwise become distorted due to stretching or flattening, were not quantified. Importantly, slice selection was carried out under UV (bis- benzamide) fluorescence only. Since Cell Tracker™CMTMR-fluo- rescence is not observed in this channel, it was possible to be confident that the selection of slices was carried out blind to patterns of thalamic cell attachment. g For polar plots, neurites were separated according to their angle into twelve 30° interval bins. Neurites that fell on the border between two bins were split with a value of 0.5 assigned to each bin. Each plot contains twelve points which consist of the angle of the center of the bin (θ=−30°, 0°, 30, 60°, ...) and the number of neurites in that bin (r). A chi-square analysis was used to test whether neurite data fit a uniform (random) circular distribution by comparing binned, neurite samples to a hypothetical sample consisting of the same number of neurites evenly distributed among all 12 bins (Zar, 1974). For polar plots, neurites were separated according to their angle into twelve 30° interval bins. Neurites that fell on the border between two bins were split with a value of 0.5 assigned to each bin. Each plot contains twelve points which consist of the angle of the center of the bin (θ=−30°, 0°, 30, 60°, ...) and the number of neurites in that bin (r). A chi-square analysis was used to test whether neurite data fit a uniform (random) circular distribution by comparing binned, neurite samples to a hypothetical sample consisting of the same number of neurites evenly distributed among all 12 bins (Zar, 1974). Immunohistochemistry Thalami were incubated in HHBSS with trypsin (0.18 mg/ml) and DNAse (0.08 mg/ml) in a 15 ml polypropylene, conical tube for approx. 10 minutes at 37°C with occasional, gentle mixing. The tissue suspension was then diluted with 1/3 volume of 37°C Complete Medium (CM): Dulbecco’s modified Eagle’s medium (DMEM: glutamine free, 4.5 g/L glucose) supplemented with 10 µg/ml trans- ferrin, 5 mg/ml crystalline grade bovine serum albumin (BSA; ICN Biochemicals), 20 nM progesterone, 30 nM sodium selenite, 100 µM putrescine, 10 µg/ml bovine insulin, 1 mM sodium pyruvate, 50 i.u./ml penicillin, 50 µg/ml streptomycin and 25 mM Hepes (pH 7.2). Soybean trypsin inhibitor (0.28 mg/ml) was added, the DNAse con- Slice cultures were prepared, rinsed and fixed as above except that fixation was limited to 18 minutes. Cultures were then washed several times in PBS and treated with 1% Triton X-100 in PBS for 7 minutes at room temperature. The following incubations were done at 4°C. Tissue was blocked (40% goat serum, 40% calf serum, 0.1% Triton X-100, 0.1% sodium azide in PBS; filtered) for 19 hours, washed (5% goat serum, 5% calf serum, 0.1% sodium azide in PBS; filtered) for 3 hours and first antibody was added: CS-56 monoclonal mouse anti- chondroitin sulfate (Sigma), ascites fluid diluted in wash solution, 1:500. After 48 hours, cultures were washed several times over 20 hours and then incubated with second antibody for 4 hours: FITC-con- 2814 D. E. Emerling and A. D. Lander (E14-15) mouse thalamic cells were dissociated, labeled with a vital fluorescent dye, washed into serum-free culture medium and allowed to settle onto freshly cut vibratome slices (150-200 µm) of developing mouse forebrain. After 3 hours at 37°C, the slices were gently rinsed to remove unattached cells and then fixed, counterstained with bisbenzimide (Hoechst 33258) and visualized by fluorescence microscopy (see Methods). To avoid the possibility of dye-transfer from thalamic cells to intrinsic cells of the slice, thalamic cells were labeled with a thiol-reactive fluorescent dye, CellTracker™CMTMR, which diffuses into cells, becomes covalently coupled to intracellular components (e.g. glutathione) and is fixable by cross-linking agents. Immunocytochemical evaluation of dissociated thalamic cells prior to plating onto slices indicated that 91% (±3.3%, n=904) expressed neuron-specific class III β-tubulin and 70% (±3.5%, n=828) contained neurofilament protein. Thus, the vast majority of the cells were neurons. In addition, 83% (±4.0%, n=616) were immunoreactive for NCAM. found on each of the other cortical layers – the marginal, inter- mediate and ventricular zones. On most subcortical regions (e.g. caudoputamen, globus pallidus, preoptic and supraoptic areas, hypothalamus, thalamus), there was also a high density of thalamic cells, although on some (the anterior commissure, the claustrum, the amygdaloid area and olfactory nuclei of the ventral forebrain and parts of the septum) few cells were seen (data not shown). ( ) In some experiments, slices were examined just prior to rinsing and fixation. In these cases, thalamic cells appeared to be uniformly distributed over each slice. Thus, the differences in fluorescent cell density that were seen with rinsed, fixed slices apparently reflected region-specific cell attachment, rather than non-uniform plating of cells or migration of cells from some regions to others during the 3 hour culture period. In other experiments, thalamic cells were plated and cultured on forebrain slices for different periods of time before rinsing and fixation. Patterns of cell attachment similar to that in Fig. 1 were obtained whether rinsing and fixation were carried out as early as 1 hour, or as late as 24 hours, after plating (data not shown). We also found that the preincubation of slices for up to 5 hours at 37°C prior to the plating of cells produced the same pattern of cell attachment as seen in the previous exper- iments (data not shown). Region-specific attachment of thalamic cells to living slices of E15 forebrain Measurements of cell attachment, neurite length and neurite orienta- tion were obtained from digitized images of fixed cultures. Images were collected using a Zeiss fluorescence microscope fitted with camera lucida optics that were set to view a video monitor. A video trace, which To examine how thalamic neurons behave when confronted in vitro with different brain environments, embryonic day 14 or 15 2814 D. E. Emerling and A. D. Lander When thalamic cells were prepared and plated in this manner onto E15 forebrain slices, large differences were evident in the numbers of fluorescent cells that were found on different parts of the slice. The most striking differences were in the cerebral cortex, the anatomical layers of which could be identified by nuclear density (Fig. 1). Specifically, very few thalamic cells were found on the cortical plate, whereas numerous cells were To quantify thalamic cell attachment to the different layers Fig. 1. Laminar specific attachment of dissociated thalamic cells to slices of embryonic cortex. (A) Laminae of an E15 cortex can be seen under UV fluorescence as differences in nuclear density after a sagittal slice is cultured with thalamic cells (3 hours), fixed and stained with bisbenzamide (see methods). Rostral is to the right, caudal to the left. (B) The same slice viewed under rhodamine optics shows the distribution of attached thalamic cells. Some attached cells are in clusters, which appear as larger, bright dots. The pial and ventricular edges of the cortex are demarcated by dotted white lines at the top and bottom of each figure. Lines are also positioned in the two photos to reference the same points in the two views of the slice. Very few thalamic cells attach to the cortical plate (CP) while more attach to the intermediate zone (IZ), marginal zone (MZ) and ventricular zone (VZ) as well as to the substratum off the slice (seen at the edges of the photos). Density of attached cells is greatest on the intermediate zone just subjacent to the cortical plate. Scale bar, 500 µm. Fig. 1. Laminar specific attachment of dissociated thalamic cells to slices of embryonic cortex. (A) Laminae of an E15 cortex can be seen under UV fluorescence as differences in nuclear density after a sagittal slice is cultured with thalamic cells (3 hours), fixed and stained with bisbenzamide (see methods). Rostral is to the right, caudal to the left. (B) The same slice viewed under rhodamine optics shows the distribution of attached thalamic cells. Some attached cells are in clusters, which appear as larger, bright dots. The pial and ventricular edges of the cortex are demarcated by dotted white lines at the top and bottom of each figure. Lines are also positioned in the two photos to reference the same points in the two views of the slice. Neurite outgrowth by thalamic neurons on living slices of E15 neocortex In photographs such as Fig. 1, the contrast in thalamic cell density between the cortical plate and intermediate zone is par- ticularly noticeable because thalamic cells on the intermediate zone are especially concentrated near the border with the cortical plate (also see Fig. 3). This can also be illustrated by plotting cell density in the intermediate zone as a function of distance from the cortical plate (Fig. 2, inset). These data suggest that thalamic cell attachment is especially high in the subplate, the region of the intermediate zone subjacent to the cortical plate (Kostovic and Molliver, 1974; Luskin and Shatz, Even though thalamic cells were typically plated onto forebrain slices for only 3 hours, substantial neurite outgrowth occurred on all forebrain regions where thalamic cells attached, including the marginal, intermediate and ven- tricular zones of the developing cortex (too few cells attached to the cortical plate to permit conclusions to be drawn about neurite outgrowth on this layer). There were no significant differences in the lengths of neurites on cortical layers (marginal zone: 16.1 µm [s.d.=5.7; n=85]; intermediate zone: 16.1 µm [s.d.=6.5; n=114]; ventricular zone 15.8 µm [s.d.=6.8; n=52]). Interestingly, the orientation of neurites on the intermediate zone appeared non-random. On this layer, most neurites projected parallel to the cortical laminae (i.e. along the rostrocaudal axis), while few neurites projected radially (Fig. 3). Fig. 2. Densities of thalamic cells attached to embryonic cortical layers. The densities of cells attached to each of the major embryonic cortical layers – the marginal zone (MZ), cortical plate (CP), intermediate zone (IZ) and ventricular zone (VZ) – were determined for three coronal (light bars) and five sagittal (darker bars) slices. Black bars represent the means (± standard error) from the 8 samples. Data were collected from the portion of sagittal slices indicated by dotted lines in Fig. 1 or from the dorsolateral part of coronal slices because laminae could be unambiguously distinguished within these regions (total number of cells counted from the 8 slices: nmz=1818, ncp=316, niz=2001, nvz=1647, noff slice=2583). ‘Off Slice’ data were collected from the culture substratum, adjacent to the pial surface. Mean values are significantly different among the four layers (Analysis of Variance test: P<0.0005). A Newman-Keuls analysis verified the value of the mean density on the cortical plate as a significant outlier (µiz = µmz ≠ µvz ≠µcp). 2814 D. E. Emerling and A. D. Lander Very few thalamic cells attach to the cortical plate (CP) while more attach to the intermediate zone (IZ), marginal zone (MZ) and ventricular zone (VZ) as well as to the substratum off the slice (seen at the edges of the photos). Density of attached cells is greatest on the intermediate zone just subjacent to the cortical plate. Scale bar, 500 µm. 2815 Thalamic cell behavior on cortical slices 2815 Thalamic cell behavior on cortical slices of the E15 neocortex, measurements of the density of labeled cells on each layer were made for 8 slices and are shown in Fig. 2. Mean thalamic cell attachment to the marginal, inter- mediate and ventricular zones was in the range of 1300-2300 cells/mm2 and was close to the density of cells that was initially plated onto the slices (~1000-2000 cells/mm2; see methods). In contrast, thalamic cell attachment to the cortical plate was substantially lower (243 ± 60 cells/mm2). This result was obtained regardless of whether coronal or sagittal forebrain slices were used (Fig. 2) and was qualitatively similar through- out the rostrocaudal and dorsoventral extent of the neocortex. 1985). Because the rodent subplate is only a few cell layers thick (Valverde et al., 1989; Bayer and Altman, 1990), its boundaries cannot be accurately determined in our thick slices by nuclear staining alone. In some experiments, the subplate was visualized by chondroitin sulfate immunohistochemistry (Sheppard et al., 1991) and was found to correspond to the part of the intermediate zone extending up to ~25 µm from the cortical plate border (data not shown), i.e., containing that region which supports the highest density of attached cells (Fig. 2, inset). Neurite outgrowth by thalamic neurons on living slices of E15 neocortex INSET shows that cells attached to the intermediate zone are not uniformly distributed on this layer. Cells that attached to the intermediate zone were binned according to their distance from the cortical plate border and the data, averaged from the 8 slices, were plotted as the proportion of total cells attached to this layer. On average, over half of the cells that attached to the intermediate zone are located within 25 µm of the cortical plate border. Fig. 2. Densities of thalamic cells attached to embryonic cortical layers. The densities of cells attached to each of the major embryonic cortical layers – the marginal zone (MZ), cortical plate (CP), Fig. 4 shows the ranges of neurite angles (as measured with respect to nearby cortical layer borders; see Methods) that were observed for thalamic cells attached to marginal, intermediate and ventricular zones. The data confirm that a disproportion- ate number of intermediate zone neurites are rostrocaudally oriented (P<0.001), with no significant bias toward the rostral or caudal direction (52% and 48% of sample, respectively; n=114). In contrast, neurites extended by thalamic cells on the marginal and ventricular zones followed a much more uniform distribution, not significantly different from random (see Fig. 4, legend). g ) Since the subplate was included as part of the intermediate zone in the above analysis, an attempt was made to analyze subplate and non-subplate neurites separately. Neurites seen on the intermediate zone were therefore divided into two popula- tions – those originating within one average neurite length (16.1 µm) of the cortical plate (probable subplate neurites) and those originating in the rest of the intermediate zone. As shown in Fig. 5, both sets of neurites exhibited orientations that were significantly biased toward the horizontal, i.e. along the ros- trocaudal axis. Interestingly, among the putative subplate neurites (Fig. 5A), extremely few were oriented superficially (i.e., toward the cortical plate). Consistent with this observa- tion, in no case were neurites observed that crossed from the subplate onto the cortical plate. Indeed, subplate neurites were occasionally seen that extended a short distance superficially, then turned sharply at the cortical plate border (not shown). In contrast, neurites were often seen that crossed the border between the intermediate and ventricular zones, without evidence of turning behaviors. Although these data raise the possibility that thalamic neurites actively avoid the cortical plate, time-lapse cinematographic observations will be required to establish such a conclusion. Behavior of thalamic cells on frozen sections of E15 forebrain it has become too thin to distinguish clearly). Moving toward the rostral end of the slice, however, one sees increasing numbers of labeled cells attached to the cortical plate, espe- cially the deeper regions of the cortical plate. Since the matu- ration of the neocortex is known to follow a rostral-to-caudal gradient (Smart, 1983; Bayer and Altman, 1991), these results suggest that the cortical plate may become permissive for thalamic cell attachment as the cortex matures. Others have found that neurons can exhibit region-selective attachment and/or neurite outgrowth on frozen (cryostat) sections of brain, nerve or muscle (Carbonetto et al., 1987; Sandrock and Matthew, 1987; Covault et al., 1987; Watanabe and Murakami, 1989; Savio and Schwab, 1989; Crutcher, 1989; Geisert, 1991; Tuttle and Matthew, 1991). To determine whether this method would reveal thalamic cell behaviors similar to those observed using living slices, E15 thalamic cells were prepared and labeled as before, but plated onto air-dried 20 µm cryostat sections of fresh-frozen E15 forebrain. After 3 hours at 37°C, non-attached cells were rinsed off and cultures were fixed and counterstained. Compared to previous experi- ments with living sections, the absolute density of attached cells was much lower (Fig. 6). Moreover, attachment appeared to be fairly uniform across all cortical layers. In addition, little neurite outgrowth from cells attached to the cryostat sections was seen. The fact that frozen sections could not substitute for living slices in revealing cortical layer-specific behaviors of thalamic neurons raises the possibility that those behaviors require living cortical cells. However, when vibratome slices were lightly fixed with formaldehyde before thalamic neurons were plated onto them, thalamic cells displayed layer-specific attachment much like that which was seen when they were plated onto living slices (data not shown). Thus, it appears that cortical cell viability is not required to obtain cortical layer-specific thalamic cell attach- ment. It seems more likely that critical molecules or structures that are preserved in vibratome sections are lost or disrupted in frozen sections. In support of this idea, when E14-15 thalamic cells were plated onto P7 sagittal slices, cell attachment to the cortical plate was observed throughout the rostrocaudal extent of the slices (Fig. 8). As was seen on E15 and P1 slices, thalamic cells also attached well to cortical layer I and the developing white matter. Neurite outgrowth by thalamic neurons on living slices of E15 neocortex Fig. 2. Densities of thalamic cells attached to embryonic cortical layers. The densities of cells attached to each of the major embryonic cortical layers – the marginal zone (MZ), cortical plate (CP), intermediate zone (IZ) and ventricular zone (VZ) – were determined for three coronal (light bars) and five sagittal (darker bars) slices. Black bars represent the means (± standard error) from the 8 samples. Data were collected from the portion of sagittal slices indicated by dotted lines in Fig. 1 or from the dorsolateral part of coronal slices because laminae could be unambiguously distinguished within these regions (total number of cells counted from the 8 slices: nmz=1818, ncp=316, niz=2001, nvz=1647, noff slice=2583). ‘Off Slice’ data were collected from the culture substratum, adjacent to the pial surface. Mean values are significantly different among the four layers (Analysis of Variance test: P<0.0005). A Newman-Keuls analysis verified the value of the mean density on the cortical plate as a significant outlier (µiz = µmz ≠ µvz ≠µcp). INSET shows that cells attached to the intermediate zone are not uniformly distributed on this layer. Cells that attached to the intermediate zone were binned according to their distance from the cortical plate border and the data, averaged from the 8 slices, were plotted as the proportion of total cells attached to this layer. On average, over half of the cells that attached to the intermediate zone are located within 25 µm of the cortical plate border. Fig. 2. Densities of thalamic cells attached to embryonic cortical layers. The densities of cells attached to each of the major embryonic cortical layers – the marginal zone (MZ), cortical plate (CP), 2816 D. E. Emerling and A. D. Lander Behavior of thalamic cells on frozen sections of E15 forebrain Unlike what was observed using E15 slices, labeled cells on the developing white matter (former intermediate zone) were not concentrated near the cortical plate border (site of the embryonic subplate). The data on thalamic cell attachment to P7 slices are presented quantitatively in Fig. 9. When these data are compared with Fig. 2, the most striking difference is the increase in the level of thalamic cell attachment to the P7 cortical plate relative to other cortical layers. Closer inspection of the sections revealed, however, that it is not the entire P7 cortical plate that supports thalamic cell attachment, but only its deeper layers. Using nuclear staining alone, it was possible to divide the P7 cortical plate into supragranular (laminae 2/3), Fig. 3. Neurite extension on E15 cortex. (A) High-magnification, UV fluorescence micrograph of the bisbenzamide-stained cortex, from an experiment similar to that in Fig. 1, shows the cortical plate (CP), the cell poor intermediate zone (IZ) and the ventricular zone (VZ) as indicated at left. (B) The same field seen under rhodamine optics reveals attached thalamic cells and their neurites. Fluorescent cells (filled arrows) attached to the intermediate zone extend three neurites in directions parallel to the CP/IZ border. On the ventricular zone, neurites (open arrows) project both parallel to the cortical layers and along the radial axis (perpendicular to the lamina). Growth cones of those neurites projecting radially cannot be seen because the neurites extend into the slice and out of the plane of focus. Filled arrows and arrowheads in A point to nuclei whose corresponding cells are marked by the same labels in B. These nuclei are out of focus because attached cells lie in a focal plane slightly above that of the cells of the slice. Scale bar, 10 µm. 2817 Thalamic cell behavior on cortical slices Fig. 5. Neurites on the E15 intermediate zone and subplate do not cross onto the cortical plate. The intermediate zone neurite sample shown in Fig. 4B was subdivided into two samples and replotted using the same graphing procedure. (A) The upper sample consists of those intermediate zone neurites (n=37) that originate within 16 µm (one mean neurite length) of the cortical plate. This sample approximates the neurites that are generated on the subplate region of the embryonic cortex. (B) The lower sample represents the rest of the intermediate zone neurites (n=77). Both samples are rostrocaudally oriented (parallel to the cortical lamina) and are significantly different from uniform circular distributions (Pupper<0.001, Plower<0.01). Although both samples contain some radially directed projections (along vertical axis), there are almost no neurites on the upper intermediate zone that project superficially, toward the cortical plate. Neurites projecting on the lower intermediate zone are not biased toward either direction along the radial (vertical) axis. Axis tick marks represent a count of 5 neurites. Fig. 4. Distribution of thalamic neurite angles on the different embryonic cortical layers. Polar plots show the angular distribution of neurites projected by thalamic cells on the marginal (A), intermediate (B) and ventricular (C) zones of E15 cortical slices. Neurite angles were calculated with respect to laminar borders and then segregated into twelve, 30° interval bins (see methods). Plotted points represent the center angle of each bin (θ) and the number of neurites (r) in the sample with angles that are within that bin interval. Axis tick marks represent a count of 5 neurites in A, 5 in B and 2 in C. The shapes of the plots reflect the predominant directions in which neurites project on a given layer. Plot frames indicate the angle of each bin’s center except for the bins centered on the axes, which are marked with cardinal directions based on cortical anatomy (90° and −90° represent projections toward the overlying and subjacent layers or tissue edges). Marginal (A) and ventricular (C) zone neurites project both rostrocaudally and radially (toward the pia and ventricle) and are not significantly different from a uniform circular distribution (chi-square to uniform sample: Pmz>0.1, Pvz>0.5). Intermediate zone neurites mostly project rostrocaudally and are different from a uniform distribution (Piz<0.001). Data were taken from 4 sagittal slices (total number of neurites counted: nmz=85, niz=114, nvz=52) Fig. 5. 2817 Thalamic cell behavior on cortical slices Neurites on the E15 intermediate zone and subplate do not cross onto the cortical plate. The intermediate zone neurite sample shown in Fig. 4B was subdivided into two samples and replotted using the same graphing procedure. (A) The upper sample consists of those intermediate zone neurites (n=37) that originate within 16 µm (one mean neurite length) of the cortical plate. This sample approximates the neurites that are generated on the subplate region of the embryonic cortex. (B) The lower sample represents the rest of the intermediate zone neurites (n=77). Both samples are rostrocaudally oriented (parallel to the cortical lamina) and are significantly different from uniform circular distributions (Pupper<0.001, Plower<0.01). Although both samples contain some radially directed projections (along vertical axis), there are almost no neurites on the upper intermediate zone that project superficially, toward the cortical plate. Neurites projecting on the lower intermediate zone are not biased toward either direction along the radial (vertical) axis. Axis tick marks represent a count of 5 neurites. Fig. 4. Distribution of thalamic neurite angles on the different embryonic cortical layers. Polar plots show the angular distribution of neurites projected by thalamic cells on the marginal (A), intermediate (B) and ventricular (C) zones of E15 cortical slices. Neurite angles were calculated with respect to laminar borders and then segregated into twelve, 30° interval bins (see methods). Plotted points represent the center angle of each bin (θ) and the number of neurites (r) in the sample with angles that are within that bin interval. Axis tick marks represent a count of 5 neurites in A, 5 in B and 2 in C. The shapes of the plots reflect the predominant directions in which neurites project on a given layer. Plot frames indicate the angle of each bin’s center except for the bins centered on the axes, which are marked with cardinal directions based on cortical anatomy (90° and −90° represent projections toward the overlying and subjacent layers or tissue edges). Marginal (A) and ventricular (C) zone neurites project both rostrocaudally and radially (toward the pia and ventricle) and are not significantly different from a uniform circular distribution (chi-square to uniform sample: Pmz>0.1, Pvz>0.5). Intermediate zone neurites mostly project rostrocaudally and are different from a uniform distribution (Piz<0.001). Data were taken from 4 sagittal slices (total number of neurites counted: nmz=85, niz=114, nvz=52). Fig. 4. Distribution of thalamic neurite angles on the different embryonic cortical layers. Developmental changes in the attachment and neurite outgrowth activities of neocortex At E15, the cerebral cortex is at a relatively early stage in its development. To determine whether the laminar-specific differences in the behavior of embryonic thalamic neurons change as the cortex matures, embryonic (E14-15) thalamic neurons, prepared as before, were plated onto living slices cut from older brains. Postnatal days 1 and 7 (P1 and P7) were chosen to represent intermedi- ate and late stages in cortical histogenesis (reviewed by Bayer and Altman, 1991) and thalamocortical innervation (reviewed by Erzurumlu and Jhaveri, 1992; Kageyama and Robertson, 1993). Fig. 3. Neurite extension on E15 cortex. (A) High-magnification, UV fluorescence micrograph of the bisbenzamide-stained cortex, from an experiment similar to that in Fig. 1, shows the cortical plate (CP), the cell poor intermediate zone (IZ) and the ventricular zone (VZ) as indicated at left. (B) The same field seen under rhodamine optics reveals attached thalamic cells and their neurites. Fluorescent cells (filled arrows) attached to the intermediate zone extend three neurites in directions parallel to the CP/IZ border. On the ventricular zone, neurites (open arrows) project both parallel to the cortical layers and along the radial axis (perpendicular to the lamina). Growth cones of those neurites projecting radially cannot be seen because the neurites extend into the slice and out of the plane of focus. Filled arrows and arrowheads in A point to nuclei whose corresponding cells are marked by the same labels in B. These nuclei are out of focus because attached cells lie in a focal plane slightly above that of the cells of the slice. Scale bar, 10 µm. Fig. 7 shows the results of a typical exper- iment involving a sagittal slice from a P1 animal. At the caudal end of the slice, the pattern of thalamic cell attachment is similar to that observed with E15 slices: cells attached to the marginal zone (i.e., cortical layer I) and the intermediate zone (i.e., the developing white matter), but not to the cortical plate, which at this age consists of developing layers 2-6 (the ventricular zone is not indicated in Fig. 7 because at this age 2817 Thalamic cell behavior on cortical slices 2817 Thalamic cell behavior on cortical slices Are thalamic cells detecting axon guidance cues? It is striking that regions of cortex that thalamic axons confront, but into which they do not normally grow, are readily detected in culture as regions to which dissociated thalamic cells do not attach. This observation raises the possibility that the adhesive behavior of neuronal cell bodies can, in some cases at least, reveal the locations of axonal guidance cues. Such a view has also been suggested by investigators studying the developing chick retinotectal system (Barbera et al., 1973; Gottlieb et al., 1976). 2817 Thalamic cell behavior on cortical slices Markings on the two sides of the photo are of different scales due to the thinning of the telencephalon that occurs along the ventrodorsal axis of coronal sections. Scale bar, 100 µm. Fig. 6. Cryostat sections of E15 forebrain support only a low density of thalamic cell attachment which is uniform across embryonic cortical layers. Both the laminar structure of the E15 cortex and attached thalamic cells can be visualized in this photo taken under both phase-contrast transmittance and rhodamine fluorescence microscopy. The larger, fluorescent dots are clusters of 2-4 cells. Cells can be seen to attach to all embryonic cortical layers, i.e. the marginal zone (MZ), cortical plate (CP), intermediate zone (IZ) and ventricular zone (VZ). At the top of the photo, adjacent to the marginal zone, fluorescently labeled cells can be seen that are attached to the substratum of the slide. The photo is taken from the lateral cortex of a coronal section. Ventral is to the left, dorsal to the right. Markings on the two sides of the photo are of different scales due to the thinning of the telencephalon that occurs along the ventrodorsal axis of coronal sections. Scale bar, 100 µm. Finally, by P7 in vivo, thalamocortical axons have invaded the cortical plate throughout the rostrocaudal extent of the cortex, with most axons terminating in layer 4 and the deepest aspect of layer 3 (Naegele et al., 1988; Miller et al., 1993; Kageyama and Robertson, 1993; Agmon et al., 1993). In vitro, thalamic cells also attached to and extended neurites on the cortical plate throughout the rostrocaudal extent of the cortex, but attachment and neurite outgrowth within the cortical plate was limited to layers 4-6 (Figs 8, 9), i.e. the layers through which thalamic axons grow in vivo. DISCUSSION At each of these stages, thalamic cells in vitro also attached to and extended neurites on the marginal zone (layer I) and non-cortical areas (Figs 1, 2, 8, 9 and data not shown). Thus, territories not occupied by thalamic axons in vivo can be per- missive for thalamic cell attachment and neurite outgrowth in vitro. In contrast, territories that mark the boundaries of thala- mocortical axon growth in vivo (i.e. the entire cortical plate at early stages; layers 2 and 3 at later stages) were consistently non-permissive for thalamic cell attachment and neurite outgrowth in vitro. These experiments demonstrate that living, but not cryostat, sections of cerebral cortex support selective attachment of and neurite outgrowth from embryonic thalamic neurons in a manner that depends upon the developmental state of the cortex. Embryonic cortical plate and postnatal supragranular layers act as in vitro substrata which, compared to all other cortical laminae, support little neuronal attachment. Neurites of cells attached to the embryonic subplate and intermediate zone project mostly parallel to the cortical layers and neurites on the subplate do not cross onto the cortical plate. These results can be obtained in serum-free medium and are apparent after very short periods in culture (3 hours). 2817 Thalamic cell behavior on cortical slices Cells can be seen to attach to all embryonic cortical layers, i.e. the marginal zone (MZ), cortical plate (CP), intermediate zone (IZ) and ventricular zone (VZ). At the top of the photo, adjacent to the marginal zone, fluorescently labeled cells can be seen that are attached to the substratum of the slide. The photo is taken from the lateral cortex of a coronal section. Ventral is to the left, dorsal to the right. Markings on the two sides of the photo are of different scales due to the thinning of the telencephalon that occurs along the ventrodorsal axis of coronal sections. Scale bar, 100 µm. For example, at the earliest stage examined in this study (mouse E15, which is roughly equivalent to rat E17), tangen- tially oriented thalamic axons normally occur abundantly in the cortical subplate, but are absent from the adjacent cortical plate. Thalamic axons are also present in the deeper interme- diate zone and are occasionally seen in the ventricular zone, (Crandall and Caviness, 1984; Reinoso and O’Leary, 1988; Catalano et al., 1991; Erzurumlu and Jhaveri, 1992; Kageyama and Robertson, 1993). In vitro, embryonic thalamic cells seeded onto E15 cortical slices attached especially well to the superficial intermediate zone (the presumptive subplate), as well as throughout the intermediate zone and, to a lesser extent, the ventricular zone, but they attached very poorly to the cortical plate (Figs 1, 2). Neurites of thalamic cells that attached to the intermediate zone (including the subplate) tended to be oriented tangentially and, like thalamocortical axons in vivo, failed to enter the cortical plate (Figs 3, 4B, 5). For example, at the earliest stage examined in this study (mouse E15, which is roughly equivalent to rat E17), tangen- tially oriented thalamic axons normally occur abundantly in the cortical subplate, but are absent from the adjacent cortical plate. Thalamic axons are also present in the deeper interme- diate zone and are occasionally seen in the ventricular zone, (Crandall and Caviness, 1984; Reinoso and O’Leary, 1988; Catalano et al., 1991; Erzurumlu and Jhaveri, 1992; Kageyama and Robertson, 1993). In vitro, embryonic thalamic cells seeded onto E15 cortical slices attached especially well to the superficial intermediate zone (the presumptive subplate), as well as throughout the intermediate zone and, to a lesser extent, the ventricular zone, but they attached very poorly to the cortical plate (Figs 1, 2). 2817 Thalamic cell behavior on cortical slices Neurites of thalamic cells that attached to the intermediate zone (including the subplate) tended to be oriented tangentially and, like thalamocortical axons in vivo, failed to enter the cortical plate (Figs 3, 4B, 5). At P1 in vivo, thalamocortical axons from the subplate have begun to invade the cortical plate in at least parts of the cortex (Agmon et al., 1993). In vitro, thalamic cells attached to much the same areas of the P1 cortex as observed with E15-E16 slices, except that, at this stage, the cortical plate in the rostral, but not caudal, cortex also supported thalamic cell attachment (Fig. 7). This rostral-to-caudal gradient of attachment to the P1 cortical plate in vitro parallels the general rostral-to-caudal gradient by which cortical histogenesis (Smart, 1983; Bayer and Altman, 1991) and innervation of the cortical plate (cf. Reinoso and O’Leary, 1988) occur in vivo. At P1 in vivo, thalamocortical axons from the subplate have begun to invade the cortical plate in at least parts of the cortex (Agmon et al., 1993). In vitro, thalamic cells attached to much the same areas of the P1 cortex as observed with E15-E16 slices, except that, at this stage, the cortical plate in the rostral, but not caudal, cortex also supported thalamic cell attachment (Fig. 7). This rostral-to-caudal gradient of attachment to the P1 cortical plate in vitro parallels the general rostral-to-caudal gradient by which cortical histogenesis (Smart, 1983; Bayer and Altman, 1991) and innervation of the cortical plate (cf. Reinoso and O’Leary, 1988) occur in vivo. Fig. 6. Cryostat sections of E15 forebrain support only a low density of thalamic cell attachment which is uniform across embryonic cortical layers. Both the laminar structure of the E15 cortex and attached thalamic cells can be visualized in this photo taken under both phase-contrast transmittance and rhodamine fluorescence microscopy. The larger, fluorescent dots are clusters of 2-4 cells. Cells can be seen to attach to all embryonic cortical layers, i.e. the marginal zone (MZ), cortical plate (CP), intermediate zone (IZ) and ventricular zone (VZ). At the top of the photo, adjacent to the marginal zone, fluorescently labeled cells can be seen that are attached to the substratum of the slide. The photo is taken from the lateral cortex of a coronal section. Ventral is to the left, dorsal to the right. 2817 Thalamic cell behavior on cortical slices Polar plots show the angular distribution of neurites projected by thalamic cells on the marginal (A), intermediate (B) and ventricular (C) zones of E15 cortical slices. Neurite angles were calculated with respect to laminar borders and then segregated into twelve, 30° interval bins (see methods). Plotted points represent the center angle of each bin (θ) and the number of neurites (r) in the sample with angles that are within that bin interval. Axis tick marks represent a count of 5 neurites in A, 5 in B and 2 in C. The shapes of the plots reflect the predominant directions in which neurites project on a given layer. Plot frames indicate the angle of each bin’s center except for the bins centered on the axes, which are marked with cardinal directions based on cortical anatomy (90° and −90° represent projections toward the overlying and subjacent layers or tissue edges). Marginal (A) and ventricular (C) zone neurites project both rostrocaudally and radially (toward the pia and ventricle) and are not significantly different from a uniform circular distribution (chi-square to uniform sample: Pmz>0.1, Pvz>0.5). Intermediate zone neurites mostly project rostrocaudally and are different from a uniform distribution (Piz<0.001). Data were taken from 4 sagittal slices (total number of neurites counted: nmz=85, niz=114, nvz=52). granular (lamina 4) and infragranular (laminae 5/6) layers and to measure cell attachment separately for each layer. As shown in Fig. 9 (inset), thalamic cell attachment to the P7 cortical plate was largely restricted to the granular and infragranular layers (laminae 4-6). As with E15 slices, thalamic cells plated onto P7 slices were observed to extend neurites on all cortical layers to which they attached (including, in this case the cortical plate). Although measurements of neurite angles were not made, no obvious ori- entation of neurites on any layer was observed. Significantly, neurites were found that extended between the developing white matter and layer 6 of the cortical plate, without evidence of turning at this border (data not shown). 2818 D. E. Emerling and A. D. Lander Fig. 6. Cryostat sections of E15 forebrain support only a low density of thalamic cell attachment which is uniform across embryonic cortical layers. Both the laminar structure of the E15 cortex and attached thalamic cells can be visualized in this photo taken under both phase-contrast transmittance and rhodamine fluorescence microscopy. The larger, fluorescent dots are clusters of 2-4 cells. The correlations between in vitro behavior of thalamic neurons and in vivo development Dotted white lines indicate the edges of the cortex (pia at the top) and reference the same points of the slice in both photos. Scale bar, 500 µm. Fig. 7. Thalamic cell attachment to P1 cortex. (A) Laminae of a P1 cortex can be seen under UV fluorescence after a sagittal slice is cultured with thalamic cells (3 hours), fixed and stained with bisbenzamide. By this age, the cortical plate (CP) has matured and some differentiated laminae can be distinguished within it. (B) The same slice viewed under rhodamine optics shows the distribution of fluorescently labeled and attached thalamic cells. Many cells attached to the developing white matter (WM, formerly the intermediate zone) and layer 1 (‘1’, formerly the marginal zone). Cells also attach to the cortical plate (not seen on E15 sections), but in a non-uniform manner. The rostral portion (left) supports the greatest level of attachment while the caudal portion (right) is almost devoid of fluorescent cells. Dotted white lines indicate the edges of the cortex (pia at the top) and reference the same points of the slice in both photos. Scale bar, 500 µm. siveness of the cortical plate (and subsequently layers 2/3) is a property that only thalamic neurons can recognize, or whether other classes of neurons might be able to detect the same cues. Although extensive studies have not been carried out, preliminary experiments support the latter view. To date, dissociated cells from E15 cerebral cortex, E14 ganglionic eminence and P4 cerebellum have been labeled and plated onto E15 forebrain slices, and all showed markedly poorer attach- ment to the cortical plate than to other layers (data not shown; for cerebellar cells, the difference between attachment to the cortical plate and to other layers was apparently not as great as for thalamic cells, but was still noticeable). These results suggest that the non-adhesive properties of the cortical plate are quite general and even extend to cell types that never contact the cortex. Such results are perhaps not surprising, given that many axon guidance cues are known to act on cells that normally never see those cues. The correlations between in vitro behavior of thalamic neurons and in vivo development Both the patterns and timing of thalamic cell attachment and neurite outgrowth in this in vitro assay correlate well with in vivo patterns and timing of thalamocortical development: At each developmental stage examined, thalamic cells failed to attach well to, and failed to extend neurites onto, essentially those territories that thalamic axons encounter, but avoid, in vivo. It is interesting in this regard to compare the conclusions of the present study with observations by other investigators on 2819 Thalamic cell behavior on cortical slices 2819 Thalamic cell behavior on cortical slices Fig. 7. Thalamic cell attachment to P1 cortex. (A) Laminae of a P1 cortex can be seen under UV fluorescence after a sagittal slice is cultured with thalamic cells (3 hours), fixed and stained with bisbenzamide. By this age, the cortical plate (CP) has matured and some differentiated laminae can be distinguished within it. (B) The same slice viewed under rhodamine optics shows the distribution of fluorescently labeled and attached thalamic cells. Many cells attached to the developing white matter (WM, formerly the intermediate zone) and layer 1 (‘1’, formerly the marginal zone). Cells also attach to the cortical plate (not seen on E15 sections), but in a non-uniform manner. The rostral portion (left) supports the greatest level of attachment while the caudal portion (right) is almost devoid of fluorescent cells. Dotted white lines indicate the edges of the cortex (pia at the top) and reference the same points of the slice in both photos. Scale bar, 500 µm. Fig. 7. Thalamic cell attachment to P1 cortex. (A) Laminae of a P1 cortex can be seen under UV fluorescence after a sagittal slice is cultured with thalamic cells (3 hours), fixed and stained with bisbenzamide. By this age, the cortical plate (CP) has matured and some differentiated laminae can be distinguished within it. (B) The same slice viewed under rhodamine optics shows the distribution of fluorescently labeled and attached thalamic cells. Many cells attached to the developing white matter (WM, formerly the intermediate zone) and layer 1 (‘1’, formerly the marginal zone). Cells also attach to the cortical plate (not seen on E15 sections), but in a non-uniform manner. The rostral portion (left) supports the greatest level of attachment while the caudal portion (right) is almost devoid of fluorescent cells. D. E. Emerling and A. D. Lander Fig. 8. Thalamic cell attachment to P7 cortex. (A) Laminae of a P7 cortex can be seen under UV fluorescence after a sagittal slice is cultured with thalamic cells (3 hours), fixed and stained with bisbenzamide. The cell-dense, barrel walls of the somatosensory cortex can be seen and used to identify the granular layer 4 (Woolsey and Van Der Loos, 1970; Rice and Van Der Loos, 1977). Rostral is to the left, caudal to the right. (B) The same slice viewed under rhodamine optics shows the distribution of fluorescently labeled and attached thalamic cells. As in the E15 and P1 experiments, cells attached well to layer 1 (‘1’, formerly the marginal zone) and the white matter (WM, formerly the intermediate zone). Attachment to the cortical plate (laminae ‘2-6’) can be seen throughout the rostrocaudal extent of the slice; however, it is limited to layers 4-6, i.e. the granular (‘4’) and infragranular (‘5/6’) layers. Attachment to the supragranular layers (‘2/3’) is relatively low. Dotted white lines indicate the edges of the cortex (pia at the top) and reference the same points of the slice in both photos. Scale bar, 1 mm. Fig. 9. Densities of thalamic cells attached to postnatal (P7) cortical layers. The densities of cells attached to layer 1, the cortical plate (CP, laminae 2-6) and the white matter (WM) were determined from 7 sagittal slices (light bars). Black bars represent the mean (± standard error) from the 7 samples. Data were collected from the presumed somatosensory cortex, the extent of which is indicated by the dotted lines in Fig. 8, because the laminae could be unambiguously distinguished within this region (total number of cells counted from the 7 slices: n1=891, n2-3=330, n4=1379, n5-6=7042, nwm=2400, noff slice=1874). ‘Off Slice’ data were collected from the culture substratum adjacent to the pial surface. INSET shows the density of cells attached to the laminae within the cortical plate. Cell density on supragranular layers (2/3) was much lower than on granular (4) and infragranular (5/6) layers (analysis of variance test: P<0.0005). A Newman-Keuls analysis verified the mean density on laminae 2/3 as an outlier (µ5/6 ≠µ4 ≠µ2/3). the central myelin-derived inhibitor of neurite outgrowth (Caroni and Schwab, 1988). The correlations between in vitro behavior of thalamic neurons and in vivo development Data were collected from the presumed somatosensory cortex, the extent of which is indicated by the dotted lines in Fig. 8, because the laminae could be unambiguously distinguished within this region (total number of cells counted from the 7 slices: n1=891, n2-3=330, n4=1379, n5-6=7042, nwm=2400, noff slice=1874). ‘Off Slice’ data were collected from the culture substratum adjacent to the pial surface. INSET shows the density of cells attached to the laminae within the cortical plate. Cell density on supragranular layers (2/3) was much 2820 The correlations between in vitro behavior of thalamic neurons and in vivo development Examples include the fact that most classes of neurons extend neurites in response to laminin, even though laminin is present in only a few parts of the developing brain (reviewed by Lander and Calof, 1993); that retinal axons will regenerate through peripheral nerve grafts and terminate specifically within structures that are not normal targets (Zwimpfer et al., 1992; Carter et al., 1994); and that even fibroblasts – which are not found in the central nervous system – respond to the motility-inhibiting effects of the in vitro growth of thalamic axons on substrata of isolated cortical membranes: Götz et al. (1992) found that embryonic (E16), rat cortical membranes were relatively non-permissive for axon outgrowth, but postnatal (P7) membranes were not. More recently, Tuttle et al. (1993) showed that the change in the outgrowth-promoting properties of cortical membranes – from non-permissive at embryonic stages, to permissive at postnatal stages – could also be observed with membranes prepared from only the superficial cortex (i.e. the cortical plate and marginal zone – of which the cortical plate is the major component). Thus, both these and the present study point to the cortical plate as the site of transient non-permissiveness, both for neuronal attachment and axon growth. It is not unreasonable to suppose that the cause is the same for both the lack of adhesion and the lack of axon growth, especially given that many of the molecules that promote axon growth also mediate cell adhesion (cf. Lander, 1989; Hynes and Lander, 1992). Indeed, while there are certainly cases in which the guidance of neurons by their substratum is not controlled by differential adhesion (cf. Gundersen, 1987; Calof and Lander, 1991; Lemmon et al., 1992), the development of the thalamocortical system may be a case where adhesion does play a dominant role. One issue not discussed above is whether the non-permis- 820 e central myelin-derived inhibitor of neurite outgrowth Caroni and Schwab, 1988). What molecules are thalamic neurons detecting in tro? he general non-permissiveness of the embryonic cortical ate and postnatal layers 2/3 for cell attachment and neurite utgrowth in vitro suggests that these regions either lack olecules that promote neuron adhesion and outgrowth, or ossess molecules that inhibit adhesion and outgrowth. The correlations between in vitro behavior of thalamic neurons and in vivo development lthough the data presented here cannot distinguish between ese possibilities, at least one major mediator of neural cell dhesion, NCAM, is clearly expressed in the embryonic ortical plate and postnatal supragranular layers (Fushiki and chachner, 1986; Chung et al., 1991; and unpublished obser- ations). In addition, no dramatic differences have been seen the relative isoform composition or polysialic acid content the NCAM in these, versus other layers, of the develop- g cortex (Chung et al., 1991; and unpublished observa- ons). Considering that NCAM can act as a homophilic adhesion olecule and that the majority of thalamic cells plated in the esent study were NCAM-immunoreactive, the possibility at the embryonic cortical plate and postnatal layers 2/3 ntain molecules that inhibit cell adhesion and axon growth worth considering seriously. Recently, several molecules, articularly certain components of the extracellular matrix, ave been claimed to have ‘anti-adhesive’ (reviewed by Sage d i d i l i l D. E. Emerling and A. D. Lander g. 8. Thalamic cell attachment to P7 rtex. (A) Laminae of a P7 cortex can seen under UV fluorescence after a gittal slice is cultured with thalamic lls (3 hours), fixed and stained with sbenzamide. The cell-dense, barrel alls of the somatosensory cortex can seen and used to identify the anular layer 4 (Woolsey and Van Der oos, 1970; Rice and Van Der Loos, 77). Rostral is to the left, caudal to e right. (B) The same slice viewed der rhodamine optics shows the stribution of fluorescently labeled and ached thalamic cells. As in the E15 d P1 experiments, cells attached well layer 1 (‘1’, formerly the marginal ne) and the white matter (WM, rmerly the intermediate zone). tachment to the cortical plate aminae ‘2-6’) can be seen throughout e rostrocaudal extent of the slice; wever, it is limited to layers 4-6, i.e. e granular (‘4’) and infragranular 5/6’) layers. Attachment to the pragranular layers (‘2/3’) is relatively w. Dotted white lines indicate the ges of the cortex (pia at the top) and ference the same points of the slice in th photos. Scale bar, 1 mm. Fig. 9. Densities of thalamic cells attached to postnatal (P7) cortical layers. The densities of cells attached to layer 1, the cortical plate (CP, laminae 2-6) and the white matter (WM) were determined from 7 sagittal slices (light bars). Black bars represent the mean (± standard error) from the 7 samples. 2821 Thalamic cell behavior on cortical slices g De Carlos, J. A. and O’Leary, D. D. M. (1992). Growth and targeting of subplate axons and the establishment of major cortical pathways J. Neurosci. 12, 1194-1211. Dodd, J. and Jessell, T. M. (1988). Axon guidance and the patterning of neuronal projections in vertebrates. Science 242, 692-699. Easter, S. S., Jr., Ross, L. S. and Frankfurter, A. (1993). Initial tract formation in the mouse brain. J. Neurosci. 13, 285-299. Erzurumlu, R. S. and Jhaveri, S. (1992). Emergence of connectivity in the embryonic rat parietal cortex. Cereb. Cortex 2, 336-352. Faissner, A. and Kruse, J. (1990). J1/Tenascin is a repulsive substrate for central nervous system neurons. Neuron 5, 627-637. Overall, the results presented in this paper suggest that molecules that influence neuronal cell adhesion may, through their patterns and timing of expression, provide important cues for the growth of thalamic axons along the radial axis of the cortex. The continued use of rapid in vitro assays, such as the one described here, should aid in determining whether and how known adhesion molecules participate in this process. Fushiki, S. and Schachner, M. (1986). Immunocytological localization of cell adhesion molecules L1 and N-CAM and the shared carbohydrate epitope L2 during development of the mouse neocortex. Dev. Brain Res. 24, 153-167. Geisert, E. E. (1991). Characterization of the growth of cultured cortical neurons on sections of adult cortex. Cereb. Cortex 1, 134-142. Gennarini, G., Rougon, G., Deagostini-Bazin, H., Hirn, M. and Goridis, C. (1984). Studies on the transmembrane disposition of the neural cell adhesion molecule N-CAM. Eur. J. Biochem. 142, 57-64. Ghosh, A., Antonella, A., McConnell, S. K. and Shatz, C. J. (1990). Requirement for subplate neurons in the formation of thalamocortical connections. Nature 347, 179-181. We would like to thank Mary Herndon, Jon Ivins and Chris Stipp for helpful comments on the manuscript; Todd Grinnel, John Shavel and Dave Smith for technical assistance; Reha Erzurumlu and Sonal Jhaveri for assistance with anatomy; Anthony Frankfurter for the TUJ1 antibody; and Rebecca Tuttle and Dennis O’Leary for sharing unpublished data. This work was supported by a fellowship to A. D. L. from the David and Lucile Packard Foundation. Gottlieb, D. I., Rock, K. and Glaser, L. (1976). A gradient of adhesive specificity in developing avian retina. Proc. Natl. Acad. Sci. USA 73, 410- 414. Götz, M., Novak, N., Bastmeyer, M. and Bolz, J. (1992). Membrane-bound molecules in rat cerebral cortex regulate thalamic innervation. 2821 Thalamic cell behavior on cortical slices such molecule has been suggested to play a crucial role in guiding axons towards the optic fissure (Brittis et al., 1992). Carter, D. A., Bray, G. M. and Aguayo, A. J. (1994). Long-term growth and remodeling of regenerated retino-collicular connections in adult hamsters. J. Neurosci. 14, 590-598. Whatever the molecules are that account for the different adhesive and neurite outgrowth-promoting properties of different cortical layers, it should not be assumed that their source is the intrinsic cells of the cortex. Thalamic axons them- selves, growing within certain cortical layers, could contribute some of the cues that thalamic cells detect when they are plated onto cortical slices (present study) or cortical membranes (Götz et al., 1992; Tuttle et al., 1993). For example, some or all of the attachment of thalamic cells to the embryonic subplate and intermediate zone (Figs 1, 2), the tangential orientation of neurites growing on those zones (Figs 3, 4B, 5), and the thalamic cell attachment to postnatal layers 4-6 (Figs 8, 9), could reflect the binding of thalamic neurons to thalamic axon membranes. Such homotypic interactions could play just as important a role in guiding the majority of thalamic axons in vivo as interactions of thalamic axons with intrinsic cortical cells. The assay described in the present study, performed following the selective ablation of appropriate cells or fibers in vivo (cf. Ghosh et al., 1990), should prove useful in determin- ing the sources of the cues that are responsible for the layer- specific behavior of thalamic cells and their axons. , Catalano, S. M., Robertson, R. T. and Killackey, H. P. (1991). Early ingrowth of thalamocortical afferents to the neocortex of the prenatal rat. Proc. Natl. Acad. Sci. USA 88, 2999-3003. Chung, W. W., Lagenaur, C. F., Yan, Y. and Lund, J. S. (1991). Developmental expression of neural cell adhesion molecules in the mouse neocortex and olfactory bulb. J. Comp. Neurol. 314, 290-305. y Covault J., Cunningham, J. M. and Sanes, J. R. (1987). Neurite outgrowth on cryostat sections of innervated and denervated skeletal muscle. J. Cell Biol. 105, 2479-2488. Crandall, J. E. and Caviness, V. S. (1984). Axon strata of the cerebral wall in embryonic mice. Dev. Brain Res. 14, 185-195. Crutcher, K. A. (1989). Tissue sections from mature rat brain and spinal cord as substrates for neurite outgrowth in vitro: extensive growth on fray matter but little growth on white matter. Exp. Neurol. 104, 39-54. REFERENCES Hynes, R. O. and Lander, A. D. (1992). Contact and adhesive specificities in the associations, migrations, and targeting of cells and axons. Cell 68, 303- 322. Agmon, A., Yang, L. T., O’Dowd, D. K. and Jones, E. G. (1993). Organized growth of thalamocortical axons from the deep tier of terminations into layer IV of developing mouse barrel cortex. J. Neurosci. 13, 5365-5382. Kageyama, G. H. and Robertson, R. T. (1993). Development of geniculocortical projections to visual cortex in rat: evidence for early ingrowth and synaptogenesis. J. Comp. Neurol. 335, 123-148. Barbera, A. J., Marchase, R. B. and Roth, S. (1973). Adhesive recognition and retinotectal specificity. Proc. Natl. Acad. Sci. USA 70, 2482-2486. Kostovic, I. and Molliver, M. E. (1974). A new interpretation of the laminar development of the cerebral cortex: synaptogenesis in different layers of neopallium in the human fetus. Anat. Rec. 178, 395. Bayer, S. A. and Altman, J. (1990). Development of layer I and the subplate in the rat neocortex. J. Comp. Neurol. 107, 48-62. p Lander, A. D. (1989). Understanding the molecules of neural cell contacts: emerging patterns of structure and function. TINS 12, 189-195. Bayer, S. A. and Altman, J. (1991). Neocortical Development, pp. 33-36 and 65-82. New York: Raven Press. Lander, A. D. and Calof, A. L. (1993). Extracellular matrix in the developing nervous system. In Molecular Genetics of Nervous System Tumors, (eds. A. J. Levine and H. H. Schmidek), pp. 341-355. New York: Wiley-Liss. Bolz, J., Novak, N. and Staiger, V. (1992). Formation of specific afferent connections in organotypic slice cultures from rat visual cortex cocultured with lateral geniculate nucleus. J. Neurosci. 12, 3054-3070. Brittis, P. A., Canning, D. R. and Silver, J. (1992). Chondroitin sulfate as a regulator of neuronal patterning in the retina. Science 255, 733-736. Lemmon, V., Burden, S. M., Payne, H. R., Elmslie, G. J. and Hlavin, M. L. (1992). Neurite growth on different substrates: permissive versus instructive influences and the role of adhesive strength. J. Neurosci. 12, 818-826. Calof, A. L. and Lander, A. D. (1991). Relationship between neuronal migration and cell-substratum adhesion: laminin and merosin promote olfactory neuronal migration but are anti-adhesive. J. Cell Biol. 115, 779- 794. Lund, R. D. and Mustari, M. J. (1977). Development of the geniculocortical pathway in rats. J. Comp. Neurol. 173, 289-306. Luskin, M. L. and Shatz, C. J. (1985). 2821 Thalamic cell behavior on cortical slices Development 116, 507-519. Gundersen, R. W. (1987). Response of sensory neurites and growth cones to patterned substrata of laminin and fibronectin in vitro. Dev. Biol. 121, 423- 431. What molecules are thalamic neurons detecting in vitro? The general non-permissiveness of the embryonic cortical plate and postnatal layers 2/3 for cell attachment and neurite outgrowth in vitro suggests that these regions either lack molecules that promote neuron adhesion and outgrowth, or possess molecules that inhibit adhesion and outgrowth. Although the data presented here cannot distinguish between these possibilities, at least one major mediator of neural cell adhesion, NCAM, is clearly expressed in the embryonic cortical plate and postnatal supragranular layers (Fushiki and Schachner, 1986; Chung et al., 1991; and unpublished obser- vations). In addition, no dramatic differences have been seen in the relative isoform composition or polysialic acid content of the NCAM in these, versus other layers, of the develop- ing cortex (Chung et al., 1991; and unpublished observa- tions). Fig. 9. Densities of thalamic cells attached to postnatal (P7) cortical layers. The densities of cells attached to layer 1, the cortical plate (CP, laminae 2-6) and the white matter (WM) were determined from 7 sagittal slices (light bars). Black bars represent the mean (± standard error) from the 7 samples. Data were collected from the presumed somatosensory cortex, the extent of which is indicated by the dotted lines in Fig. 8, because the laminae could be unambiguously distinguished within this region (total number of cells counted from the 7 slices: n1=891, n2-3=330, n4=1379, n5-6=7042, nwm=2400, noff slice=1874). ‘Off Slice’ data were collected from the culture substratum adjacent to the pial surface. INSET shows the density of cells attached to the laminae within the cortical plate. Cell density on supragranular layers (2/3) was much lower than on granular (4) and infragranular (5/6) layers (analysis of variance test: P<0.0005). A Newman-Keuls analysis verified the mean density on laminae 2/3 as an outlier (µ5/6 ≠µ4 ≠µ2/3). Considering that NCAM can act as a homophilic adhesion molecule and that the majority of thalamic cells plated in the present study were NCAM-immunoreactive, the possibility that the embryonic cortical plate and postnatal layers 2/3 contain molecules that inhibit cell adhesion and axon growth is worth considering seriously. Recently, several molecules, particularly certain components of the extracellular matrix, have been claimed to have ‘anti-adhesive’ (reviewed by Sage and Bornstein, 1991) and ‘neurite-repulsive’ (e.g. Snow et al., 1990; Faissner and Kruse, 1990) properties. Indeed, in the retina, the gradual central-to-peripheral disappearance of one 2822 D. E. Emerling and A. D. Lander connections formed between thalamus and cortex in coculture. Nature 351, 475-477. outgrowth using cryostat sections of nervous tissues as a substratum. J. Neurosci. Meth. 39, 193-201. connections formed between thalamus and cortex in coculture. Nature 351, 475-477. Naegele, J. R., Jhaveri, S. and Schneider, G. E. (1988). Sharpening of topographical projections and maturation of geniculocortical axon arbors in the hamster. J. Comp. Neurol. 277, 593-607. Tuttle, R., Schlaggar, B. L. and O’Leary, D. D. M. (1993). Maturational changes in membrane associated molecules in the cortical plate may control development of thalamocortical and intracortical connections. Soc. Neurosci. Abstr. 19, 1088. O’Leary, D. D. M. and Koester, S. E. (1993). Development of projection neuron types, axon pathways, and patterned connections of the mammalian cortex. Neuron 10, 991-1006. Valverde, F., Facal-Valverde, V., Santacana, M. and Heredia, M. (1989). Development and differentiation of early generated cells of sublayer VIb in the somatosensory cortex of the rat: a correlated golgi and autoradiographic study. J. Comp. Neurol. 290, 118-140. Reinoso, B. S. and O’Leary, D. D. M. (1988). Development of visual thalamocortical projections in the fetal rat. Soc. Neurosci. Abstr. 14, 1113. study. J. Comp. Neurol. 290, 118-140. y p Watanabe, E. and Murakami, F. (1989). Preferential adhesion of chick central neurons to the grey matter of the central nervous system. Neurosci. Lett. 97, 69-74. Rice, F. L. and Van Der Loos, H. (1977). Development of the barrels and barrel field in the somatosensory cortex of the mouse. J. Comp. Neurol. 171, 545-560. Sage, E. H. and Bornstein, P. (1991). Extracellular proteins that modulate cell-matrix interactions. J. Biol. Chem. 266, 14831-14834. Woolsey, T. A. and Van Der Loos, H. (1970). The structural organization of Layer IV in the somatosensory region (SI) of mouse cerebral cortex. Brain Res. 17, 205-242. Sandrock, A. W. and Matthew, W. D. (1987). Identification of a peripheral nerve neurite growth-promoting activity by development and use of an in vitro bioassay. Proc. Natl. Acad. Sci. USA 84, 6934-6938. Wood, J. N. and Anderton, B. H. (1981). Monoclonal antibodies to mammalian neurofilaments. Biosci. Rep. 1, 263-268. Savio, T. and Schwab, M. E. (1989). Rat CNS white matter, but not grey matter, is nonpermissive for neuronal cell adhesion and fiber outgrowth. J. Neurosci. 9, 1126-1133. Yamamoto, N., Kurotani, T. and Toyama, K. (1989). Neural connections between the lateral geniculate nucleus and visual cortex in vitro. Science 245, 192-194. Schambra, U. B., Lauder, J. M. REFERENCES Studies of the earliest generated cells of the cat’s visual cortex: cogeneration of subplate and marginal zones. J. Neurosci. 5, 1062-1075. Carbonetto, S., Evans, D. and Cochard, P. (1987). Nerve fiber growth in culture on tissue substrata from central and peripheral nervous systems. J. Neurosci. 7, 610-620. Miller, B., Chou, L. and Finlay, B. L. (1993). The early development of thalamocortical and corticothalamic projections J. Comp. Neurol. 335, 16- 41. Caroni, P. and Schwab, M. E. (1988). Two membrane protein fractions from rat central myelin with inhibitory properties for neurite outgrowth and fibroblast spreading. J. Cell Biol. 106, 1281-1288. Molnár, Z. and Blakemore, C. (1991). Lack of regional specificity for 2822 D. E. Emerling and A. D. Lander and Silver, J. (1992). Atlas of the Prenatal Mouse Brain. San Diego: Academic Press, Inc. Yamamoto, N., Yamada, K., Kurotani, T. and Toyama, K. (1992). Laminar specificity of extrinsic cortical connections studied in coculture preparations. Neuron 9, 217-228. Shepard, A. M., Hamilton, S. K. and Pearlman, A. L. (1991). Changes in the distribution of extracellular matrix components accompany early morphogenic events of mammalian cortical development. J. Neurosci. 11, 3928-3942. Zar, J. H. (1974). Biostatistical Analysis, pp. 133-139, pp. 151-155 and pp. 316-317. Englewood Cliffs, NJ: Prentice-Hall Inc. Zwimpfer, T. J., Aguayo, A. J. and Bray, G. M. (1992). Synapse formation and preferential distribution in the granule cell layer by regenerating retinal ganglion cell axons guided to the cerebellum of adult hamsters. J. Neurosci. 12, 1144-1159. Smart, I. H. M. (1983). Three dimensional growth of the mouse isocortex. J. Anat. 137, 683-694. Snow, D. M., Lemmon, V., Carrino, D. A., Caplan, A. I. and Silver, J. (1990). Sulfated proteoglycans in astroglial barriers inhibit neurite outgrowth in vitro. Exp. Neurol. 109, 111-130. (Accepted 29 June1994) (Accepted 29 June1994) g p , Tuttle, R. and Matthew, W. P. (1991). An in vitro bioassay for neurite