stemandleafdiagram
stemandleafdiagram
37 posts
a-levels | 17
Don't wanna be here? Send us removal request.
stemandleafdiagram · 30 days ago
Text
fuuuuck i just realized that the future idealized version of myself cant exist without current me being the catalyst for change and doing hard things. has anybody heard about this
211K notes · View notes
stemandleafdiagram · 1 month ago
Text
saving these for later
Chat I'm going to redo my personal website. Any funky little features I should add on it?
214 notes · View notes
stemandleafdiagram · 2 months ago
Text
I just found out I'm gonna have to leave the United States.
Long post incoming. You have been warned.
Hey all. You all probably have different levels of knowledge about who I am, what I do, etc, so lemme catch you all up. I'm Ryan. I'm from São Paulo, Brazil. At the age of 17, I was accepted to study biochemistry at UCLA. I left São Paulo, the only place I had ever lived in, and moved to the US in 2021 to start my biochemistry degree. After 4 years of hard work, I'm graduating this week. I always planned to stay in the US after graduation to work, get my PhD in chemistry, and just live my life.
And I was on my way to do that, until you-know-who walked into office a few months ago. That was when my entire field started being absolutely gutted. My professors were fired. PhD programs stopped existing. My hardest working friend in my major was accepted to UCLA's biochem PhD program and had her acceptance rescinded due to lack of funding. She was absolutely devastated. Like me, like the rest of us, all she wanted to do was be a scientist.
All the post-graduation jobs that I applied to stopped existing. I was hoping to get a student visa extension, which can be done if you get a job in your field post graduation. I was on my way to do that. I got some job interviews, most of which went really well. But none of that mattered, because those entire programs vanished into thin air. I checked in on applications to jobs I was more than qualified for, only to find out they had stopped existing altogether.
For the last year, I've worked in a biochemical engineering research lab, and things have been disappearing from the lab too. Reagents that we need no longer being affordable. The lyophilizer broke and was never fixed. The research we do is on drug delivery systems. I was working on self-assembling drugs that could've become active once in target cells. But my lab, like many others, suddenly became starved of resources and funding. The lab, my absolute favorite place in the world, just couldn't sustain as many experiments and students as it once did.
I slowly came to the realization that getting a job wasn't enough for me to stay in the US. Even if I did get a job, the chances of me being laid off unexpectedly were very high, and I'd have to scramble to go back to Brazil. I'd always be low on the priority list of employees to keep. I'm an entry-level scientist and an immigrant from Latin America. Once funding was cut, I'd be first to go. I'm seeing the writing on the wall and it's telling me there's nowhere left in the US for me to be.
Not to mention the constant fear of being detained by ICE for no reason, or not being able to speak up on any social issues because of constant surveillance. If you've noticed me being more silent than usual on certain world issues, it's not because I've lost my beliefs. It's because I've been living in fear of being unfairly persecuted for what I say. There have been raids at elementary school graduations for fuck's sake. I've always been in the US legally with a valid visa, but that's no longer enough to be safe. Simply existing as a Latina is dangerous. I have no family in the US, they're all back in Brazil. I'm alone in this country. If I got snatched off the street, that'd be it for me.
I did everything right. You're always told that if you work hard, go to college, and get a good degree, you'll be fine. Well, I did that. I aced my high school in São Paulo so hard that I was the first person from there to get into UCLA, the #1 public university in the US. I came to UCLA as a biochemistry major, and I stuck through it. Biochem is one of the most dropped majors at UCLA. I got into a research lab, and I'm even winning a commencement award at my graduation this week for excellence in my field. I maintained legal status. No criminal record.
I did everything right, but it wasn't enough. It wasn't enough because I was born in Latin America, and because I wanted to become a scientist in 2025. All I wanted to do was be a biochemist. I always thought that if I didn't get a job, it'd be because there was someone more qualified than me, not because my entire field was getting choked out of existence. Can't say I was expecting that!
So now I'm going to say goodbye to all my friends, sell and donate all my belongings, and go back home with nothing but the same 2 suitcases I brought with me when I left São Paulo 4 years ago. Like many of my professors, grad students, and fellow scientists, I was a casualty of the STEM mass murder of 2025. Forgive me if I'm bitter and angsty for the next few weeks or even months. I hope you can understand. Thank you for reading, if you've made it this far.
Com muito amor e raiva,
Ryan
UCLA Biochemistry B.S. , undesirable American.
323 notes · View notes
stemandleafdiagram · 2 months ago
Text
Golden rain
The reaction of potassium iodide and lead nitrate.
262 notes · View notes
stemandleafdiagram · 2 months ago
Text
Let's write a C++ program together. I'll start us off.
int main() {
900 notes · View notes
stemandleafdiagram · 2 months ago
Note
dna results came back positive
a
String identified: a
Closest match: ADENINE!!!
Tumblr media
6K notes · View notes
stemandleafdiagram · 2 months ago
Note
what are your favorite lichens in each color of the rainbow? Are there any purple lichens?
I am happy you asked:
Tumblr media
Red: Lasallia rubignosa
Orange: Teloschistes capensis
Yellow: Candelariella rosulans
Green: Sticta canariensis
Blue: Lobarina scorbiculata
Purple: Peltigera hymenina
3K notes · View notes
stemandleafdiagram · 2 months ago
Text
YO NEW HELL ANT JUST DROPPED
Tumblr media
IN THE SOUTHERN HEMISPHERE NO LESS
This is from a study just published a few days ago by Lepeco et al. (2025).
Hell ants (subfamily: Haidomyrmecinae) are super cool ants that possessed vertically closing jaws.
Below is a model of the ant's body/anatomy generated via micro-computed tomography
Tumblr media
Vulcanidris cratensis is a new species discovered in Brazil. It dates back to the lower Cretaceous, and at the time of writing, is now the oldest known ant to science!
Tumblr media
847 notes · View notes
stemandleafdiagram · 2 months ago
Text
Tumblr media
all my homies hate oganessum
4K notes · View notes
stemandleafdiagram · 2 months ago
Text
Modern Cryptography
(stemandleafdiagram long-form post!)
~ 2900 words
As you may have guessed, I love cryptography and ciphers even though I still don’t know much about them. I think classical ciphers are super interesting stuff and I love breaking them but I realised I knew nothing cipher-y after the end of World War 2, so I sought to rectify that!
(This is SO long - I got quite carried away (I do apologise), and as I wanted to cover so much here there are some concepts I don’t explain very thoroughly, but there are so many resources online if you want to learn more! When explaining how different forms of encryption work, I will often use the names commonly used by other cryptographers in my examples. Alice and Bob are two people trying to communicate, while Eve (an eavesdropper) is trying to intercept their messages.)
Symmetric Encryption
The start of modern cryptography is not a definite thing (obviously so, as the “eras” of cryptography are just labels people use to refer to them generally) but I decided to start my timeline for modern cryptography in the 1960s, as during this time, research projects at the American company IBM (International Business Machines) led to the creation of a cipher called the Lucifer cipher. 
This cipher was one of the first block ciphers to be made. A block cipher is a cipher that operates on blocks of 128 bits at a time. This is in contrast to a stream cipher, which encrypts 1 bit of data at a time. (In a way, you could consider classical ciphers stream ciphers) If the plaintext (un-encrypted data) is smaller than 128, padding schemes will add random data to it to make it up to 128. Modes of operation define how large amounts of data are encrypted. For example, the blocks of data can be encoded separately, or maybe the encryption of one block is affected by the previous encoded block of data.
The Lucifer cipher underwent a lot of alterations, and eventually the National Bureau of Standards adopted this altered version of Lucifer as the Data Encryption Standard, or DES, in 1977. Some of the alterations made that led to DES were actually quite controversial! For example, the key size in Lucifer was 128 bits, but only 56 in DES, which worried people who thought it would have been easier to brute force as it was shorter. It’s actually rumoured that the NSA (National Security Agency) did this so that the DES wasn’t too strong for them to break. Another change they added was the inclusion of something called S-boxes, which are effective at protecting against a form of attack called differential cryptanalysis. What I found really cool was that its effectiveness wasn’t talked about until much after, which suggests that the NSA knew about differential cryptanalysis 13 years before this information went public!
The DES is no longer secure enough for modern use, and in 2001 was replaced by the AES, or the Advanced Encryption Standard, which is its direct successor and is still used today. The reason that AES is more secure than DES is that the algorithm itself is more complex, but more importantly it uses longer key lengths. Using keys that are 128, 192, or 256-bit long means that the encryption is much stronger than using the 56-bit DES.
Lucifer, DES, and AES are all symmetric ciphers as well as being block ciphers. This means that the key used to encrypt the plaintext is the same key that is used to decrypt the data. Only some block ciphers are known publicly. DES and AES are the most famous of the lot, but other ones such as IDEA, Twofish, and Serpent exist too. 
As a whole, encrypting with block ciphers is slower as the entire block must be captured to encrypt or decrypt, and if just 1 mistake is made the whole block can be altered. But, they are stronger than other ciphers. Each mode of operation also has its own pros and cons. If each block is encoded by itself then they can be encrypted in parallel (which is faster), but it’s prone to cryptoanalysis as two identical blocks of plaintext would produce two identical blocks of ciphertext, therefore revealing patterns. The other ways are much more complex and take more time to encrypt but are more secure. 
For symmetric encryption to be used, both parties need to agree on the same key for the message to be shared secretly, which is a massive problem. How can the key be transferred securely?
Key Exchange
A year before the implementation of DES, in 1976, another massive breakthrough was made. Researchers Whitfield Hellman and Martin Diffie created the Diffie-Hellman key exchange, which was a method to share encryption and decryption keys safely across an unsecured network. The way it works depends on one-way functions. Typically in maths, most functions are two-way, as using a function on a number is pretty easy to undo. However, Hellman and Diffie found out that while multiplying two prime numbers was very easy, factorising the product down to its primes again was excruciatingly difficult, and the difficulty only increases as the numbers get bigger.
Say Alice and Bob are trying to share a key using the Diffie-Hellman exchange. Firstly, both of them need to execute a function in the form G^a mod P. P must be prime, and G and P are shared publicly so Alice and Bob can agree on them. The numbers are massive (usually 2048 bits) to make it harder to brute force, and they are generated randomly. Alice and Bob each choose different numbers for a, and run their functions. They will get different answers and they share their answers with each other publicly. (This is the public key) Then, Alice and Bob run another function in the form G^a mod P, but G is set to the other person’s answer. The value of a and P stay the same, and Alice and Bob arrive at the same secret answer. The secret answer can then be used to encrypt the message! (This is the private key)
Now, let’s say Eve wanted to find out what the key was. She intercepts their messages, but even though she has the exact information Alice and Bob shared with each other, she doesn’t know what the secret key is unless she solved the original equation, making this key exchange very secure! Modular arithmetic (the mod P part of the equation) is notoriously hard to reverse. If 2048-bit numbers are used, then brute forcing it requires 2^2048 numbers.
Asymmetric Encryption
The Diffie-Hellman key exchange was huge - I mean, any technology created 50 years ago that’s still in use must be pretty good, but it really only shone for sharing keys, not for encryption. For example, the issue with sending communication such as emails using Diffie-Hellman was that both parties needed to be online for a key to be generated as information needs to be mutually shared in the process, so you couldn’t just send an email using it whenever you wanted, which was a shame. However, one particular thing it did lead to was the invention of asymmetric encryption.
In 1977, the idea of public key cryptography (also invented by Diffie) came to fruition in the form of RSA. Named after its creators (Ron Rivest, Adi Shamir, and Leonard Adleman), the RSA works by all users having a public key, which is accessible by everyone, so anyone wanting to send that user a message just needed to search for it. The sender encrypts the message with the recipient’s public key, and then when the recipient comes online they are able to decrypt it with their own private key that’s not shared with anyone. It also uses an one-way function like the Diffie-Hellman exchange, albeit a more complex one. RSA is still used today for things like sending messages or visiting secure websites, and the keys tend to be 2048 or 4096 bits long so that they are hard to break. 1024-bit RSA was disallowed in 2013.
Encrypting via public key and decrypting via private key is great for keeping sensitive information safe, but what if you encrypted with your private key and the message was decrypted with your public key? The purpose of this encryption is to prove the sender is who they say they are - if the public key can’t decrypt the message then either the wrong key was used or the message has been meddled with in transit. To keep the message secure the sender could encrypt with their private key and also the recipient’s public key so only they could decrypt and read it. If the message is particularly long, the digital signature can be applied to a hash of the original message, rather than the whole thing. The RSA was the first to have this dual functionality.
So, there we go - the two main encryption types used today: symmetric and asymmetric. Symmetric encryption is useful for large amounts of data in particular, while asymmetric is more secure, but is slower and requires more resources and therefore can be more expensive. In practice, many secure systems will use both symmetric and asymmetric ciphers. Although, the actual security of a message comes down to the length of the key used - the longer or more complex it is, the more secure the encryption is. As the number of bits increases, the total number of arrangements for these bits increases exponentially. The IBM website states that a 56-bit key could be brute forced in around 400 seconds, a 128-bit key would take 1.872 x10^37 years, while a 256-bit key would take 3.31 x10^56 years.
Going Quantum
It goes without mention as to how important modern cryptography is. These encryption methods are used to keep confidential information such as credit card details, messages, and passwords safe for users like you and me, but also maintains government security on a national level. It’s also vital for cryptocurrency and digital signatures (as mentioned before), as well as browsing secure websites.
A big threat to current cryptographic standards is the development of quantum computing, which are computers based on principles of quantum mechanics. I won’t go into detail on how quantum computers work, but using quantum mechanics they are able to do massive numbers of calculations simultaneously. Although quantum computers already exist, they aren’t powerful or capable enough to threaten our current encryption algorithms yet. But, researchers suggest that they could be able to within a decade. People could use a technique called “store now, decrypt later”, where they keep currently encrypted messages so that they can decrypt them when quantum computers are available. This could cause many problems in the future, particularly if they involve secrets on an international level.
Quantum mechanics can also be used in cryptography as well! Quantum cryptography, originally theorised in 1984 by Charles Bennett and Gilles Brassard, can be used to exchange keys even more securely than Diffie-Hellman, and is called QKD, or Quantum Key Distribution. The reason it’s so incredible is that data that’s secured using it is immune to traditional cryptographic attacks. Now, I’m no quantum physicist (or any type of physicist!) but I will try my best to explain how it works. It works by sending photons, which are light particles, from the sender (eg. Alice) to the receiver (eg. Bob). These photons are sent at different orientations and Bob can measure the photon’s polarisation when he gets them.
Let’s say that photons can be in a vertical, horizontal, or one of the two diagonal orientations. We can pass them through a polarised filter to find out what orientation they are in. The filters are also specifically oriented. A vertical filter would let the vertical photons through, block the horizontal ones, and let the diagonal ones in 50% of the time but at the cost of the ones that pass through being reoriented. Therefore, when a particular photon successfully passes through, it’s impossible to know whether it was originally diagonal or vertical. This is important as it means that it’s possible to detect if someone else has been eavesdropping as the polarisations would have been changed.
Bob can use two measurement bases to receive the photons Alice sent. One will capture vertical and horizontal orientations, and one will capture diagonal ones. Bob has no idea what orientation Alice used for each photon, so he switches between his bases randomly, and will get it wrong some of the time. This is fine, as Alice and Bob then compare to see which ones Bob got right, and the ones he correctly guessed are used as a key (each photon representing 1 bit). The key can then be used for other encryption methods, such as AES.
The reason this works is that if Eve wanted to pry, she has to guess which base to use as well when she intercepts the photons (so she will also make mistakes), but she has no way of checking whether her records are correct or not, unlike Bob. It’s impossible for her to obtain the key as well. What’s more, when she guesses wrong she will change the photon polarisation, so Alice and Bob know that she’s eavesdropping.
Quantum cryptography would have huge security benefits if implemented on a wide scale due to its ability to prevent eavesdroppers, and the fact that it would be resistant to quantum computers. However, it is still in development. One key drawback is the specific infrastructure that is needed, and fiber optic cables have a limited range. This means that the number of destinations the data could be sent to is limited, and the signal cannot be sent to more than 1 recipient at any time.
As well as quantum cryptography, the NIST (The National Institute of Standards and Technology) and other cryptographers are working on other cryptographic algorithms that would stay secure even in the face of quantum computers. Ideas include lattice-based cryptography, hash-based cryptography, and code-based cryptography among others but none of them are at a point where they can actually be implemented yet.
However, one new idea that isn’t post-quantum but is gaining traction is Elliptic Curve Cryptography. Elliptic curve cryptography (ECC) is a form of asymmetric encryption that uses different points on an elliptic curve graph to generate keys in a more efficient manner than traditional methods. It creates shorter encryption keys, which means that less resources are needed while making the keys harder to break simultaneously. Improving the security of current systems just involves lengthening the keys, which slows down the encryption/decryption process, so the fact that ECC doesn’t need to do this gives it a big advantage. It is already used by the US government, iMessage, and Bitcoin, among others. 
Sidenotes
With the maths of these encryption methods being so strong, one key vulnerability is the people that utilise these methods, which is no surprise. Side channel attacks are a way to break cryptography by using information physically leaked from it. One attack, called a TEMPEST attack, is a technique that can pick up electromagnetic transmissions from a device as far as 300m away. These are often done by the FBI, but honestly can be done quite easily by some nerd who has some money to spare and can sit in a car outside your window. By monitoring the radiation emitted from your computer screen, the attacker can spy on you and your data. Another thing that can be monitored is your power consumption. Cryptography is energy intensive, and this attack has been able to recover RSA private keys in testing. Other forms of attacks include measuring amount of time required to encrypt data, which can perhaps be used to find factors or exponents. To combat this, encryption methods can add timing noise as a countermeasure. Or, an attacker can listen to someone type to find out their passwords, but to distinguish different key presses a sophisticated machine learning model is needed. Side channel attacks have actually been around for ages but its use has been severely limited in that the attacker needs to be physically close to the victim. They could get easier with time, however, as smartphones and drones can act as microphones remotely.
Another cool thing I haven’t covered yet are hash functions, which can take in an input and map it to a string of characters that’s random but unique to the original data. The output is called a hash digest or hash value. A good hash function will mean that no two different inputs will have the same hash value, and all outputs are the same length, making it hard to guess original text length. It’s vital for digital signatures and storing passwords securely.
Finally, if anyone managed to get to the end, then thank you! I really love cryptography and I find it astounding that we’ve been able to develop it into such a complex yet intrinsic part of daily life. Honestly, I had so much fun researching for this post! Encryption and cybersecurity and the future of computing is so interesting and I’m really glad I decided to write this :)
Final final note you should totally go and read the Code Book by Simon Singh! Trust me trust me it’s so good...
4 notes · View notes
stemandleafdiagram · 2 months ago
Text
this is me btw
BJ has a very clear understanding of Objectives unfortunately he lacks that level of comprehension when it comes to tactics methods procedures etc. Thus: his Behaviors.
67K notes · View notes
stemandleafdiagram · 2 months ago
Text
Prostheses
(stemandleafdiagram long-form post!)
~2300 words
Recently, my friends and I have been having vigorous debates with everyone we talk to about whether they would rather lose an arm or a leg. We are all lucky enough for this to be a hypothetical, and as the debate went on we decided that prosthetics would be available for whichever limb we chose to lose. This made me realise that I did not know much about artificial limbs and how far they have developed at all, as in my head it was just a blur of vague science-y magic, so I started doing a bit of reading!
First off, a prothesis or prosthetic implant is an artificial device that replaces a missing body part.  They are either created by hand or with a CAD. There is a wide range of prostheses types nowadays, but the story of the development of the first artificial limbs starts in Ancient Egypt, with two artificial toes dating to before 600BC. The first one, known as the “Greville Chester toe”, was made out of cartonnage, and is about 2600-3400 years old! Cartonnage is a type of papier-mâché with glue, linen, and plaster. Different cultures have different ideas about what makes a person “whole”, so it can be uncertain as to whether these early prosthetics were for appearances or for functionality. As it does not bend, however, historians reckon that the Greville Chester toe was probably cosmetic. The second toe, the “Cairo toe”, was the more advanced of the two. Likely to be a practical cosmetic due to its flexibility, this toe was refitted for the wearer multiple times.
Tumblr media
(Credit: Dr Jacky Finch, BBC)
Toes were not the only early prosthetics! Another early prosthetic was the “Capua Leg” from Italy, dating back to 300BC. It was made for a Roman nobleman, and was made out of bronze and hollowed-out wood. The leg was held up with leather straps. Sadly, it was destroyed in WW2 but there is a replica of it at the Science Museum in London. Another famous prosthetic was Götz von Berlichingen’s iron hand. He was a German mercenary who lost his right arm in battle, and had two mechanical iron hands made. The second one in the image below allowed him to hold objects.
Tumblr media
Early artificial limbs were made out of heavy materials, such as wood and metal. They remained rather basic during the Middle Ages, and people who could afford them could have basic hand hooks or peg leg equipped. Knights were often fitted with simple prosthetics that allowed them to hold up a shield or grasp a sword to let them continue a career in fighting, and prosthetics were crafted by tradesmen.
In the 1400s to 1700s, prostheses from countries such as France and Switzerland started to incorporate mobility using hinges, cables, gears, cranks, and springs, allowing hands to have articulated fingers and limbs to rotate or bend. 
The development of artificial limbs really got rolling after the American Civil War in 1860. The huge number of casualties caused the demand for artificial limbs to quadruple, and many veterans started designing their own prosthetics. For example, James Hanger was one of the many soldiers that lost a leg in the fighting, and found it understandably difficult both physically and mentally to resume daily life with a peg leg. As an engineering student, he designed a limb that was able to bend at the knee and the ankle and patented it. It is called the “Hanger Limb”: 
Tumblr media
It was also the first leg to use rubber in the ankle and cushioning in the heel to make wearing it less painful. 
Moving along, the development of artificial limbs was again accelerated by war. A couple years before World War 1, in 1912, David W. Dorrance patented the split-hook design for upper limb prostheses.
Tumblr media
This invention allowed users to continue their labouring jobs as they could now grip and manipulate objects. Additionally, during the war, mass-production of prostheses started to happen for the enormous number of casualties. Towards the end of the war, people started to experiment with materials other than just wood, with metal being used in particular. Using metal instead of wood would mean that repairs (extremely time consuming) were needed less often. The production of limbs was also standardised, meaning that less time was needed to make and repair them, but fitting processes were still done so that each war veteran still got a personalised limb.
In World War 2 there was about half as many amputees from the war. This was due to advances in surgical techniques, improvement in treating infections, and increased availability of blood transfusions after WW1 reduced the need for amputation. However, this doesn’t mean that there wasn’t still a huge demand for artificial limbs. In the UK, Queen Mary’s Hospital in Roehampton became the centre for manufacturing, where tens of thousands of war pensioners were able to get their own prosthesis.
On the topic of prosthetics made for special activities I have to give a special mention to this prosthetic: 
Tumblr media
(Credit: Wellcome Images CC BY 2.0/Wikimedia)
This arm prosthetic limb has widespread fingers, a padded thumb and little finger, and the middle 3 fingers are smaller than normal. If you haven’t guessed, this hand was used for playing piano! The special modifications allowed the user to span 1 octave. The idea of specialised artificial limbs gained traction around 1900, leading to prosthetics like these. Unfortunately, the owner of this hand is unknown, but as a piano player I think this hand is absolutely fantastic!
In the 1970s-1990s, lighter, more durable, and more flexible materials began to be introduced to replace wood and leather in limbs, such as plastics, resins, and carbon fiber. These materials are also able to make the limb mimic the look and feel of natural skin better as well as being light and easy to clean.
As you can imagine, the actual manufacturing of an artificial limb is rather extensive. This is done by a prosthetist, who is responsible for the prescription, design, and management of a prosthetic. Firstly, the residual limb is measured, and so is the user’s body to determine what size limb is needed. Most modern artificial limbs are attached with a belt, cuff, or suction, so a silicone liner is fitted. Next, the socket and plastic parts of the limb are formed, followed by the metal parts.
Although prosthetic limbs can be extremely useful in allowing a person to navigate daily life with much more ease after an amputation, not everyone will benefit from one. For example, whether a prosthetic leg would be beneficial can depend on the person’s health and condition. There needs to be enough soft tissue to cushion the remaining bone, the skin on the residual limb needs to be healthy, and if the amputation was done below the knee it can make the prosthetic easier to use as the knee joint is still intact, require less effort to move. Having a prosthetic leg isn’t easy either. Users may suffer from excessive sweating, or hyperhidrosis, which can lead to skin issues and affect the fit of the prosthesis. The fit of the socket can be affected if the residual limb changes shape after amputation, and weakness in the limb can mean it’s difficult to use the prosthetic for long periods of time.
New technology is constantly improving and developing, and as time goes on prostheses will become much more advanced, allowing users to use their prosthetics with more ease and comfort. Nowadays, prosthetics are advanced, increasingly specialised, and are becoming easier and intuitive to use. We have come a long way!
In particular, bionic and myoelectric limbs are gaining traction. First developed in the USSR in 1958, a myoelectric limb is controlled by contractions of the actual muscle. This is done using electrodes that sit on the skin inside the limb socket that detect electrical signals given off when muscles are contracted. These signals are sent to a controller to be converted into motions. This allows the user to control the limb with their own muscle contractions! They are powered by motors and batteries. These prosthetics have many advantages - they could look more natural, and could be better for people experiencing phantom limb pain (when you feel pain in a limb that has been amputated), and mean that users don’t need to use their other limb to complete tasks, but they may not be as durable. As well as that, myoelectric limbs cannot get wet, which can be a pain, so advancements have been recently made to integrate waterproof materials into the devices.
Tumblr media
(Credit: Open Bionics)
This is the Hero Arm, an example of a myoelectric prosthetic made by Open Bionics. As evident, these new limbs can be designed to look really cool and robotic! If someone had an amputation above their elbow or at shoulder level, they can undergo targeted muscle reinnervation surgery (TMR) which can reroute the nerves that controlled the arm or hand muscles so that they can still control the myoelectric. 
Of course, artificial limbs are not the only prostheses available. Craniofacial protheses are ones for the ears, nose, eyes, teeth or neck, for example. Passive devices can be made for upper limbs, which are mainly for cosmetic purposes or specific activities. Myoelectric technology is also available for prosthetic fingers, hands, and elbows. 
The advancement in 3D printing also mean plenty of good things for artificial limbs, as it allows the rapid production of customised prosthetics so that each one is tailored to the user and their needs. The parts that are 3D printed can be more lightweight as well. The manufacturing process is sped up and costs are reduced, letting a wider range of people have access to more advanced prosthetics. 3D scanners let prosthetists create digital models of amputees’ residual limb to make it easier and quicker to create their prosthesis. 
Microprocessors that adjust the limb’s response based on terrain and activity can also be used. These are used in particular in knee joints, allowing the prosthesis to fit into the wearer’s natural gait, walk down stairs in an easier way, and even letting them run in some cases.
Although the development of these are still in early stages, the use of neural interfaces and AI could improve prostheses greatly. Neural interfaces can establish a connection between the nervous system and the prosthetic, which could mean that wearers will be able to feel sensations through their prosthetics using their own nervous systems! On the other hand, AI and machine learning can adapt to the user’s habits and preferences over time, such as their gait, grip, and other movements in order to improve the limb’s behaviour. One such example of this is Atom Limbs’ prosthetic arm, which is still in development, but allows the user to control it completely with just their muscle contractions. 
The major issue with these modern prosthetic limbs is that they are extremely expensive. Atom Limbs estimated that their product would be priced at around £15,000, which is still considered fairly cheap compared to other bionic arms. The average person would not be able to afford one easily despite how innovative these new designs are.
Finally, what about artificial tissue and organ prostheses - how far are we with those? Well, artificial organs are bioengineered devices or tissues that are added into the human body to replace or augment existing organs, and there have been advancements in the development of many different organs. To help with sight, retinal prostheses can used - tiny microchip devices that allow information to still be obtained even if the original retinal cones and rods have been lost. They are now approved for use, but can only restore a limited amount of eyesight. For those who struggle with hearing, cochlear implants such as bone-anchored hearing aids (BAHA) can be implanted. They are able to carry the sound through the middle ear by sending the vibrations from the skull straight into the cochlea. 
Continuing on, work has also been done for artificial nerves. As you may know, nerve cells in the central nervous system usually don’t regenerate, but nerves in the peripheral nervous system do, albeit slowly. One treatment for injured/lost peripheral nerves uses a nerve connection tube which connects two severed nerves and guides regeneration of the nerve. The development of artificial nerves is very promising for treating diseases such as Alzheimer’s. Next, to treat kidney disease, many people use external filtration systems such as dialysis, which are expensive and inconvenient. Research is being done into bioartificial kidneys instead. This is a device with two components: the haemofilter, which processes incoming blood to create ultrafiltrate, and the bioreactor, which uses kidney cells to process the ultrafiltrate. It can be implanted into the body and is about the size of a coffee cup.
The last artificial organ I wanted to take a look at was the heart. Currently, artificial hearts fall under two main types: the mechanical heart and the heart-lung machine. The mechanical heart is a device that acts as a pump for your blood and replaces the ventricles in your heart. Unfortunately, these are not permanent solutions, and are usually used temporarily by people with severe heart failure or during the wait for a heart transplant. On the other hand, the heart-lung machine (or the cardiopulmonary bypass) is used during open heart surgeries to remove blood from a person’s body, oxygenate it, then pump it back round the body. 
Tumblr media
A mechanical heart! (Credit: Abiomed) 
In conclusion I think it is astounding how cool science and technology is! I love how humanity is able to use so many innovative ideas to help people throughout history and I really hope that this sentiment continues, as although our societies aren’t always made with disabled people in mind, everyone has the right to live in one equally.
1 note · View note
stemandleafdiagram · 2 months ago
Text
K I’m teaching so this isn’t Dino related but it is science related
Tumblr media
1K notes · View notes
stemandleafdiagram · 3 months ago
Text
dear professor i cant seem to lock in. its so over
44K notes · View notes
stemandleafdiagram · 3 months ago
Text
things that happened to me when i was a woman in STEM:
an advisor humiliated me in front of an entire lab group because of a call I made in his place when he wouldn't reply to my e-mails for months
he later delegated part of my master's thesis work to a 19-year old male undergrad without my approval
a male scientist at a NASA conference looked me up and down and asked when i was graduating and if i was open to a job at his company. right before inquiring what my ethnicity was because i "looked exotic"
a random male member of the public began talking over me and my female advisor, an oceanographer with a pHD and decades of experience, saying he knew more about oceanography than us
things that have happened to me since becoming a man in STEM:
being asked consistently for advice on projects despite being completely new to a position
male colleagues approaching me to drop candid information regarding our partners / higher ups that I was not privy to before
lenience toward my work in a way I haven't experienced before. incredible understanding when I need to take time off to care for my family.
conference rooms go silent when I start talking. no side chatter. I get a baseline level of attention and focus from people that's very unfamiliar and genuinely difficult for me to wrap my head around.
like. yes some PI's will still be assholes regardless of the gender of their subordinates but, I've lived this transition. misogyny in STEM is killing women's careers, and trans men can and do experience male privilege.
82K notes · View notes
stemandleafdiagram · 3 months ago
Text
Tumblr media
dog toys that make you stop dead in the middle of the store and figure out their IUPAC names
449 notes · View notes
stemandleafdiagram · 4 months ago
Text
im just not convinced humans were ever meant to be this busy
24K notes · View notes