POT SeptOct2023

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 44

Share Your

Preprint Research
with the World!

TechRxiv is a free preprint server for unpublished


research in electrical engineering, computer
science, and related technology. Powered by
IEEE, TechRxiv provides researchers across a
broad range of fields the opportunity to share
early results of their work ahead of formal
peer review and publication.

BENEFITS:
• Rapidly disseminate your research findings

• Gather feedback from fellow researchers

• Find potential collaborators in the


scientific community

• Establish the precedence of a discovery

• Document research results in advance


of publication

Upload your unpublished research today!

Follow @TechRxiv_org
Learn more techrxiv.org Powered by IEEE
THE MAGAZINE FOR HIGH-TECH INNOVATORS

September/October 2023
Vol. 42 No. 5

THEME: CAREERS AND


GRADUATE EDUCATION

10 
Beyond the classroom: Open Project Space
at the University of California, Irvine
Lily Johnson and Alexandra Zhang Jiang

13 
Low-cost software-defined radio
for electrical engineering education
Samer Baher Safa Hanbali
ON THE COVER:
In this 40th Anniversary issue, we go

20  How to Market to Generation Z on Social Media


Rae Yule Kim
beyond the classroom to explore open-
space learning, marketing to Gen Z,
and we remember an industry great,
Ray Floyd.
©SHUTTERSTOCK.COM/VICGMYR

FEATURES DEPARTMENTS
& COLUMNS
23 
Blockchain perspectives, mining, and types:
An introductory tutorial 4 Editorial
Anshuman Kalla 7 Obituary
8 IEEE student activities

33 
It looks like me, but it isn’t me:
On the societal implications of deepfakes
Jennifer A. Fehring and Tamara Bonaci
MISSION STATEMENT: IEEE Potentials
is the magazine dedicated to undergraduate

39 
Protect your user! and graduate students and young profes-
sionals. IEEE Potentials explores career
Raymond E. Floyd strategies, the latest in research, and impor-
tant technical developments. Through its
articles, it also relates theories to practical
applications, highlights technology’s global
impact, and generates international forums
that foster the sharing of diverse ideas about
the profession.

WWW.FACEBOOK.COM/IEEE.POTENTIALS

@IEEE.POTENTIALS

@IEEEPOTENTIALS

WWW.LINKEDIN.COM/COMPANY/IEEE-POTENTIALS/ https://students.ieee.org/potentials-magazine/


Digital Object Identifier 10.1109/MPOT.2023.3302038 I E E E P O T E N T I A LS September/October 20 2 3 ■ 1
IEEE POTENTIALS—THE MAGAZINE FOR HIGH-TECH INNOVATORS

Mary Ellen Randall, Director and Treasurer IEEE MEMBER & GEOGRAPHIC Amardeep Kaur, Region 5
EDITORIAL BOARD Rabab Ward, Director and Vice ACTIVITIES BOARD kaur.amardeep@ieee.org
Editor-in-Chief President, Educational Activities Jill Gostin, Vice President TBD, Region 6
Dario Schor, Magellan Aerospace, Jill I. Gostin, Director and Vice David Alan Koehler, Past Chair Saida Maaroufi, Region 7
Canada President, Member and Geographic Gerardo Barbosa, Treasurer Simay Akar, Region 8
Activities Cecelia Jankowski, Secretary simay@ieee.org
Student Editor Sergio Benedetto, Director and Vice Magdalena Salazar-Palma, Geographic Christian Figueroa, Region 9
Erivelton Nepomuceno, Maynooth President, Publication Services Unit Operations christian.a.f@ieee.org
University, Ireland and Products Adriaan van Wijngaarden, Information Jennifer Chua Dela Cruz, Region 10
Yu Yuan, Director and Vice President, ­Management
Associate Editors jennycdc69@gmail.com
Standards Association Mini Thomas, Member Development
Shaikh Fattah, BUET, Bangladesh John P. Verboncoeur, Director and Vice Imre Rudas, Member-at-Large Regional Student
Thanos Kakarountas, University of President, Technical Activities Murty Polavarapu, Member-at-Large Representatives
Thessaly, Greece Eduardo F. Palacio, Director and President TBD, Region 1
Mohammad Faizal Ahmad Fauzi, IEEE-USA
Multimedia University, Malaysia
ADVISORY COMMITTEE Catherine Gao, Region 2
Division Directors Dario Schor, Chair (Potentials EIC) catherinegao@ieee.org
Prashant Nair, Amrita Vishwa Franco Maloberti (I) David Koehler (MGA Past Chair) Jemima Lin, Region 3
Vidyapeetham, India Kevin L. Peterson (II) Ruben Barrera-Michel (SAC Chair) jlin972@students.bju.edu
John Benedict, Amazon, India Khaled Ben Letaief (III) Cecelia Jankowski (MGA Managing Steven Messing, Region 4
Stamatis Dragoumanos, Freelance Alistair P. Duffy (IV) Director) smessing10@gmail.com
Software Engineer, Greece Cecilia Metra (V) Amardeep Kaur, Region 5
Kamal Al-Haddad (VI)
Corresponding Editors Claudio Cañizares (VII)
MGA STUDENT ACTIVITIES kaur.amardeep@ieee.org
Syrine Ferjaoui, EURA NOVA, Tunisia Leila De Floriani (VIII) COMMITTEE TBD, Region 6
Raymond E. Floyd, IEEE Life Senior Ali H. Sayed (IX) Ruben Barrera-Michel, Chair Azfar Adib, Region 7
Member, USA Stephanie M. White (X) rub_barrera@ieee.org azfaradib@ieee.org
Greg Linton, RCAF W/C William G. Theodore W. Hissey (Director Emeritus) Prasanth Mohan, Vice Chair Theodoros Chatzinikolau, Region 8
Barker VC Aerospace College, Canada prasanthemy@ieee.org theodoros.chatzinikolaou@ieee.org
Region Directors Simay Akar, Vice Chair
Michael Salem, University of Catalina Yvonne Pezo Vergara, Region 9
Greg T Gdowski, Region 1 simayakr@gmail.com
­Balamand, Lebanon cpezov@ieee.org
Andrew D. Lowery, Region 2 Hossam Ali, Past Chair
Theresa A. Brunasso, Region 3 Warunika Hippola, Region 10
eg.hossam.ali@ieeee.org warunika3thousand@gmail.com
IEEE PERIODICALS Vickie A. Ozburn, Region 4 Vacant, Branch Chapter Representative
MAGAZINES DEPARTMENT Bob G. Becnel, Region 5 Saaveethya Sivakumar,
445 Hoes Lane, Kathy Hayashi, Region 6 Branch Chapter Student Representative, MEMBER & GEOGRAPHIC
Piscataway, NJ 08854 USA Robert L. Anderson, Region 7 saaveethya@gmail.com ACTIVITIES DEPARTMENT
AndreAnna McLean, Managing Editor II Vincenzo Piuri, Region 8 Aristotelis Farmakis, Young Professionals Cecelia Jankowski, Managing Director
Katie Sullivan, Senior Manager, Enrique A. Tejera, Region 9 Representative, Michael Kreisberg, Senior Director,
Journals Production ChunChe (Lance) Fung, Region 10 Member Experience
aristotelis.farmakis.gr@ieee.org
Jeffrey Cichocki, Associate Director, Dario Schor, Potentials EIC John Day, Director, Member Products
Editorial Services HEADQUARTERS STAFF schor@ieee.org and Programs
Janet Dudar, Senior Art Director Stephen Welby, Executive Director and COO Erivelton Nepomuceno, Potentials Lisa Delventhal, Manager, Student
Gail A. Schnitzer, Associate Art Director Steven Heffner, Managing Director, Student Editor and Young Professional Programs
Theresa L. Smith, Production Publications erivelton.nepomuceno@mu.ie Robert Sacks, Program Specialist,
Coordinator Jamie Moesch, Managing Director, Adil Usman, MGA/SAC/SPAA Chair Student Activities
Educational Activities adil_usman009@yahoo.co.in
Mark David, Director, Business Katelyn Serpe, Program Specialist,
Sophia A. Muirhead, General Counsel Prasanth M, TAB Representative,
­Development—Media & Advertising University Relations
and Chief Compliance Officer laleh@ieee.org
+1 732 465 6473 Konstantinos Karachalios, Managing
Felicia Spagnoli, Advertising Luis Fernandes, IEEEXtreme Project
Director, IEEE-Standards Association
Lead, luisfernandes@luisfernandes.org
IEEE HKN REPRESENTATIVE
Production Manager Cecelia Jankowski, Managing Director, Rakesh Kumar
Peter M. Tuohy, Production Director Member and Geographic Activities
Kevin Lisankie, Director, Editorial Services Dr. Cherif Amirat, Chief Information Officer REGIONAL STUDENT ACTIVITIES
Dawn M. Melley, Senior Director, COMMITTEE CHAIRS INDUSTRY REPRESENTATIVES
Donna Hourican, Staff Executive,
Gim Soon Wan, Region 1 Rhonda Farrell
Publishing Operations Corporate Activities
gimsoon@ieee.org farrell_rhonda@bah.com
Thomas Siegert, Chief Financial Officer
Karen L. Hawkins, Chief Marketing Bharat Rawalkshatriya, Region 2 Mansi Tripathi
IEEE BOARD OF DIRECTORS Officer rawalksh001@gannon.edu mansitri@ieee.org
Saifur Rahman, IEEE President and CEO Mary Ward-Callan, Managing Director, Bailey Heyman, Region 3 Mohammad Hossein Babee
Thomas M. Coughlin, IEEE President-Elect Technical Activities bailey.u.heyman@gmail.com ho3ein.babaee@gmail.com
K.J. Ray Liu, IEEE Past President Chris Brantley, Managing Director, Benjamin Strandskov, Region 4 John Paserba
Forrest D. Wright, Director and Secretary IEEE-USA stran1b@cmich.edu John.Paserba@meppi.com

IEEE prohibits discrimination, harassment, and bullying.


For more information, visit http://www.ieee.org/web/aboutus/whatis/policies/p9-26.html.

IEEE Potentials (ISSN 0278-6648) (IEPTDF) is published bimonthly by The Institute of by the Institute of Electrical and Electronics Engineers, Inc. Printed in U.S.A. Subscrip-
Electrical and Electronics Engineers, Inc. Headquarters address: 3 Park Avenue, 17th tions, orders, address changes: IEEE Operations Center, 445 Hoes Lane, Piscataway,
Floor, New York, NY 10016-5997. Phone: +1 212 705 7900. Change of address must be NJ 08854, Phone: +1 732 981 0060. Other publications: IEEE also publishes more than 30
received by the first of a month to be effective for the following issue. Please send to IEEE specialized publications. Advertising Representative: IEEE Potentials, 445 Hoes Lane,
Operations Center, 445 Hoes Lane, Piscataway, NJ 08854. Annual Subscription, for IEEE Piscataway, NJ 08854, Phone: +1 732 562 3946. IEEE Departments: IEEE Operations
Student members, first subscription US$5 included in dues for U.S. and Canadian Student Center (for orders, subscriptions, address changes, and Educational/Technical/ Standards/
members (optional for other Student members). Prices for members, nonmembers, and Publishing/Regional/Section/Branch Services) 445 Hoes Lane, Piscataway, NJ 08854,
additional member subscriptions are available upon request. Editorial correspondence USA. Operations Center +1 732 981 0060; Washington Office/Professional Services +1 202
should be addressed to IEEE Potentials, 445 Hoes Lane, Piscataway, NJ 08854. Respon- 785 0017. Headquarters: Telecopier +1 212 752 4929, Telex 236-411.
sibility for contents of papers published rests upon authors, and not the IEEE or its mem- Periodicals postage paid at New York, NY, and at additional mailing offices. Postmaster:
bers. Unless otherwise specified, the IEEE neither endorses or sanctions any positions Send address changes to IEEE Potentials, IEEE, 445 Hoes Lane, Piscataway, NJ 08854,
or actions espoused in IEEE Potentials. All republication rights including translations are USA. Canadian Publications Agreement Number 40030962. Return Undeliverable Cana-
reserved by the IEEE. Copyright and Reprint Permissions: Abstracting is permitted with dian Addresses to: Fort Erie, ON L2A 6C7 Canada. Canadian GTS #125634188.
credit to the source. Libraries are permitted to photocopy beyond the limits of U.S. copyright  PRINTED IN THE U.S.A.
law, for private use of patrons, articles that carry a code at the bottom of the first page, pro-
vided the per-copy fee indicated in the code is paid through the Copyright Clearance Cen-
ter, 222 Rosewood Drive, Danvers, MA 01923. For other copying, reprint, or republication
permission, write to IEEE Potentials at Piscataway, NJ. All rights reserved. Copyright © 2023 Digital Object Identifier 10.1109/MPOT.2023.3302040

2 ■ S e p t e mber /O ctober 2023 I E E E POT E NT I A LS


Harness the
publishing power
of IEEE Access. ®

IEEE Access is a multidisciplinary open


access journal offering high-quality peer
review, with an expedited, binary review
process of 4 to 6 weeks. As a journal
published by IEEE, IEEE Access offers
a trusted solution for authors like you
to gain maximum exposure for your
important research.

Explore the many benefits of IEEE Access:


• Receive high-quality, rigorous peer review • Establish yourself as an industry pioneer
in only 4 to 6 weeks by contributing to trending, interdisciplinary
topics in one of the many topical sections
• Reach millions of global users through IEEE Access hosts
the IEEE Xplore® digital library by publishing
open access • Present your research to the world quickly
since technological advancement is ever-changing
• Submit multidisciplinary articles that may not
fit in narrowly focused journals • Take advantage of features such as multimedia
integration, usage and citation tracking, and more
• Obtain detailed feedback on your research
from highly experienced editors • Publish without a page limit for $1,750
per article

Learn more at ieeeaccess.ieee.org


EDITORIAL

IEEE Potentials
40th anniversary
by John Benedict Boggala

I
EEE Potentials, the bimonthly magazine published by magazine to reach a wider audience and provide students
IEEE for undergraduate and graduate students inter- with a more diverse range of information and resources.
ested in the fields of engineering, technology, and sci- During this decade, IEEE Potentials also introduced
ence, has a rich history spanning over 40 years. In new columns such as “Student Activities,” which fea-
this column, we will explore the evolution of IEEE Poten- tured articles on student-led initiatives and IEEE-
tials, its significant milestones, and its impact on the sponsored events, and “Industry Outlook,” which pro-
field of engineering and technology education. vided insights into the latest trends and developments
in various industries. Additionally, the magazine began
1980s: The founding of IEEE Potentials to feature articles written by leading experts in the field,
The idea for IEEE Potentials was conceived in the late 1970s providing students with access to cutting-edge research
by a group of IEEE student members who saw a need for a and knowledge.
publication that would specifically
cater to the needs and interests of During its early years, 2000s: Embracing
undergraduate and graduate stu- digital media
dents in engineering, technology, IEEE Potentials focused The advent of digital media in the
and science. After extensive plan- on providing students 2000s brought about significant
ning and coordination, the first with practical and changes in the way IEEE Potentials
issue of IEEE Potentials was pub- produced and distributed its con-
lished in January 1982. applicable knowledge tent. In addition to the print maga-
During its early years, IEEE Po- that would help them zine, the publication launched its
tentials focused on providing stu- advance in their digital edition, which allowed stu-
dents with practical and applicable dents to access articles and resourc-
knowledge that would help them academic and es online. This made the magazine
advance in their academic and pro- professional careers. more accessible to students around
fessional careers. The magazine’s the world and allowed for more
content featured technical articles, career advice, and interactive and engaging content.
information on IEEE student activities, events, and pro- The magazine also began to produce multimedia con-
grams. It quickly gained popularity among students and tent such as videos, podcasts, and webinars, providing
educators alike and became an important resource for students with a more dynamic and immersive learning
students looking to expand their knowledge and network experience. The new format also allowed for more tar-
in the field of engineering and technology. geted and personalized content, with articles and re-
sources tailored to the specific interests and needs of
1990s: Expansion and growth individual readers.
In the 1990s, IEEE Potentials expanded its focus beyond
traditional engineering fields to include a broader range of 2010s: Global expansion
topics such as computer science, information technology, The 2010s saw IEEE Potentials expand its reach and
and telecommunications. This expansion allowed the impact on a global scale. The publication began to fea-
ture articles written by students and educators from
Digital Object Identifier 10.1109/MPOT.2023.3302668
around the world, providing a more diverse and inclusive
Date of current version: 6 September 2023 perspective on engineering and technology education.

4 ■ S e p t e mber /O ctober 2023 IEEE POTENTIALS


Additionally, the magazine launched several initia- Today: Continuing to innovate and inspire
tives to promote student involvement and engagement in Today, IEEE Potentials continues to innovate and
the field. These initiatives included the IEEE Potentials inspire the next generation of engineers, technologists,
Design Challenge, which challenged students to devel- and scientists. The magazine remains committed to
op innovative solutions to real-world problems, and the providing students with the latest information and
IEEE Undergraduate Scholarship Program, which pro- resources to help them succeed in their academic and
vided financial support to students pursuing degrees in professional pursuits.
engineering, technology, and science. In recent years, the publication has focused on emerg-
During this time, IEEE Potentials introduced theme ing technologies such as artificial intelligence, machine
issues to highlight particular topics, research areas, learning, and blockchain, providing students with in-
or emerging topics of interest to students. In doing so, sights into the latest developments and trends in these
the editorial board was able to plan issues in advance, fields. The magazine has also continued to expand its
solicit content through calls for papers, and therefore digital presence, with an enhanced website, social media
attract high-quality submissions from subject matter presence, and mobile app.
experts in the field. After testing this in a few issues,
the magazine converged on publishing an average of About the author
four themed issues per year, dedicating the September John Benedict Boggala (john.benedict@ieee.org) is with
issue to careers and graduate education, and having an AL logistics startup called Locus.sh, and he previously
one catch-all issue to feature other content received had stints with Amazon and ZoomInfo. He is an associate
throughout the year. editor for IEEE Potentials.

A journey
to discovering
your vocation
by Erivelton Nepomuceno

S
electing a career path presents unique chal- Doing so entails recognizing one’s purpose, pinpoint-
lenges, w ith indiv idua ls required to weigh ing those things that give life meaning, and discover-
options—should they follow their passion, or ing how we can best harness individual abilities fully.
should they seek the security explicitly provid- Graduate education is valuable for people seeking pro-
ed by a different job? Addressing this dilemma forces fessional growth in this career journey. By earning de-
people into finding a middle ground between the grees, people can deepen their knowledge and skills in
desire for a fulfilling work life and the achievement of areas of interest to them. This offers opportunities for
financial stability—a tough nut, considering today’s personal and intellectual growth, increases competitive-
professional environment. Discovering one’s true voca- ness, and opens doors to a wider range of career oppor-
tion represents an essential component of finding the tunities. With specialist knowledge and qualifications,
perfect fit when it comes to choosing a career route graduates with advanced degrees often have a competi-
leading toward a satisf ying professional journey. tive edge in their job. Awareness of the value of gradu-
ate studies allows people to align their passions with the
Digital Object Identifier 10.1109/MPOT.2023.3286757
practical requirements of career success, treading a path
Date of current version: 6 September 2023 that combines personal satisfaction with professional


IEEE POTENTIALS September/October 20 2 3 ■ 5
f­ ulfillment. In any case, how could one be able to choose a A final remark is related to our openness to signs. It is
career or a graduation scheme—or even to keep one that essential to be attentive to facts and feedback that we re-
he/she has already chosen? There is no easy answer, but ceive from the world. Reality is a complex network of sys-
some help could be offered if you see both choices under tems, where information can be explored in this journey.
the umbrella of vocation! These signals allow us to understand how we can best
The criteria for determining one’s vocation, as described serve a greater purpose that spans the various aspects
in Julian Carron’s “One Voice of the Ideal,” include three of our lives—social, cultural, and religious. By identify-
key elements. The first one involves studying our natural ing our unique combination of talents, experience, and
inclinations, gifts, and desires. This self-reflection will al- resources, we can recognize our true calling and use
low us to recognize abilities and dispositions that guide them effectively to serve to the common good. Through
us toward our vocation. Second, discovering one’s voca- this process of self-discovery and a careful interpretation
tion requires accepting the inevitable circumstances and of the signs, we may discover our vocation and fight—
conditions of life, without resisting or being resentful of through our job—for a more sustainable world.
them. By accepting and integrating these realities, we
can find alignment with our calling and develop a sense Read more about it
of purpose. For instance, at some point in my life, I had • J. Carron, “The one voice of the ideal,” Communion and Lib-
considered becoming a basketball player. Very soon, I ac- eration Int. Mag., Rome, Italy, May 2010, pp. 1–6. [Online]. Avail-
cepted that 1.72 m is far short of the required height for able: https://english.clonline.org/archive/julian-carron/the
that career. Finally, Carron emphasizes the importance of -one-voice-of-the-ideal
recognizing the world’s social needs and aligning our call-
ing with the improvement of society. Societal challenges About the author
are usually areas of opportunities, which could allow us Erivelton Nepomuceno (erivelton.nepomuceno@mu.ie) is
to use our talents to make a positive impact in the world. with Maynooth University, Maynooth W23 F2H6, Ireland,
These three criteria could be of some support for people and is the student editor of IEEE Potentials.
embarking on a journey to choose their work. 

We want
to hear
from you!
Do you like what you’re reading?
Your feedback is important.
Let us know—
send the editor-in-chief an e-mail!

IMAGE LICENSED BY GRAPHIC STOCK

6 ■ S e p t e mber /O ctober 2023 IEEE POTENTIALS


OBITUARY

Remembering Ray Floyd,


former IEEE Potentials
corresponding editor
by Dario Schor

D
r. Raymond Floyd passed away encounter with an advertisement
on 15 May 2023 in Cody, WY. seeking an educator brought him
He was bor n 20 February to Northwest College, where he em­
1937 in Lake Charles, LA. braced his role as an instructor
Ray’s enduring contributions to with unwavering passion.
IEEE Potentials stand out in both Ray Floyd’s legacy is one of curi­
quality and volume, and they span osity, mentorship, and a steadfast
nearly two decades, which stand pursuit in the advancement of en­
as a testament to his unwavering gineering knowledge. Remembered
commitment to engineering and edu­ as a lifelong learner, he constantly
cation. He started by writing and worked to inspire the next genera­
reviewing articles before joining the tion, leaving a lasting impact on his
editorial board as a corresponding family, friends, students, and IEEE
editor from 2015 to 2023. As one of Potentials readers.
the most active volunteers for the On behalf of IEEE Potentials and
magazine, he authored 59 articles the IEEE community at large, we wish
(one in this issue on p. 39), focus­ to thank Ray for his incredible contri­
ing on engineering management, communications, butions to this magazine and to the field of engineering.
ethics, and a variety of technical issues. He also To read more about him, visit https://www.powelltribune.
reviewed a record 266 articles, providing insightful com/stories/dr-raymond-floyd,85459 and https://www.
and constructive feedback to authors. In fact, he even codyenter pr ise.com/news/people/article_d26f8eec
wrote an article titled “Reviewing can be education­ -a13b-11eb-8248-4357cbdff162.html.
al,” explaining how to peer-review articles for IEEE
Potentials (Floyd, 2013). Read more about it
His journey was one of continuous growth and • R. E. Floyd, “Reviewing Can Be Educational,” in
transformation. Floyd enjoyed a distinguished 26-year IEEE Potentials, vol. 32, no. 3, pp. 26 –29, May-June
tenure at IBM in Armonk, NY, as a senior engineer 2013, doi: 10.1109/MPOT.2013.2240474.
contributing to NASA’s Apollo program. His relent­
less pursuit of knowledge led him to earn a Ph.D. after About the author
his retirement in 1992. Subsequently, a serendipitous Dario Schor (schor@ieee.org) is the editor in chief of
IEEE Potentials. Magellan Aerospace, Winnipeg, MB R3H
Digital Object Identifier 10.1109/MPOT.2023.3303040
0S5, Canada.
Date of current version: 6 September 2023 


IEEE POTENTIALS September/October 20 2 3 ■ 7
IEEE STUDENT ACTIVITIES

What I learned as an
engineering project
manager
by Sherwin Razmy

A
fter I graduated with a degree in engineering, I hear is, “We are over budget”; if that happens, they
worked for several years in the U.S. Navy, then will find another project manager.
returned to school for my master’s of business 2) They are organized. Organization seems like an obvi-
administration (MBA) and my doctorate in law ous characteristic of a star project manager, but it
(JD). One should separate oneself by earning a graduate manifests itself in a variety of ways, including in an
degree. An MBA goes hand in hand with an engineering ability to stay focused on the big picture and to pri-
bachelor’s for anyone who will be working for an engi- oritize competing responsibilities. In most projects,
neering corporation. More than anything, know busi- there are so many things that have to get done that it
ness management in order to be successful. Managing is hard to stay on top of everything and in control of
people is the key to success in a business. everything, Being able to prioritize work for your
Being a project manager is more than learning a team is a critical aspect of what a project manager
book of formulas. One must work well with others, and has to do. Just like in the navy, your organizational
­communication is the key to ef- skills will help separate you from
fective management. Players must Since many project team your colleagues.
come together as a team in order 3) They know how to lead. Lao Tzu
to accomplish a task. Successful members do not report once said, “The leader is best
project managers do not simply directly to the project when people are hardly aware of
delegate orders and take all of the manager, the project his existence, not so good when
credit. A good project manager ac- people praise his government,
knowledges everybody, at all levels. manager has to find ways less good when people stand in
Once a project manager has the to motivate workers over fear worse when people are con-
respect of his employees, they will whom they have no direct temptuous, fail to honor people
go the extra mile to help them out. and they fail to honor you, but
However, if a project manager does influence and who can of a good leader who speaks
not care and lays off employees at make or break a project. little, when his work is done, his
the first sign of trouble, they will aim is f­ulfilled, the people say,
not be loyal. Below are six attributes I find essential for we did it ourselves.” Project managers have to inter-
excellent project managers. act with and influence a variety of stakeholders,
1) They possess the gift of foresight. Good project man- including their project teams and project sponsors.
agers are able to anticipate and head off problems that Since many project team members do not report
can jeopardize deadlines, budgets, and user accep- directly to the project manager, the project manager
tance. An MBA will prepare you for these challenges has to find ways to motivate workers over whom they
because you will learn how to balance the books and have no direct influence and who can make or break
stay on budget. A good project manager is efficient a project. Project managers also need to be able to
and communicates with the higher ups that every- inspire the confidence of stakeholders and sponsors
thing is squared away. The last thing they want to in the event the budget or timeline needs to be rene-
gotiated or additional resources are needed to com-
plete the project.
Digital Object Identifier 10.1109/MPOT.2014.2379751
4) They are good communicators. Successful project
Date of current version: 6 September 2023 managers effectively use e-mail, meetings, and status

8 ■ S e p t e mber /O ctober 2023 IEEE POTENTIALS


reports to communicate their ideas, get decisions and learned Persian so I became a CT. While I was in the
made, and resolve problems, says Kondo. They also navy, I took classes online at Pasadena City College. My
understand that they need to discuss their project in commanding officer was so proud that I got promoted to
the context of whatever is most important to their CT2 and I got accepted to the University of California,
audience, she adds. Berkley’s mechanical engineering program, he gave me
5) They are pragmatic. Sometimes project managers can an early out chit, and I waived my fourth and final year.
be too analytical. They analyze things to death before Two years later, I went to OCS and became a crypto,
they move ahead. Good project managers focus on and after my service, I continued my academic career.
getting work done with the resources available to After receiving my MBA from Marshall School of Busin
them. Good project managers also utilize their ess at the University of Southern California, I got admit-
employees’ strengths. ted to Stanford Law School. While I was at law school, I
6) They are empathetic. “Project managers rely on others received my PE, and today I am an engineering project
to be successful.” Project managers cannot effectively manager for a big-three engineering firm based in Pasa-
influence others if they do not understand what moti- dena, CA. I remember the days when I washed dishes in
vates their stakeholders. They need to learn the stake- the scullery for twelve hours a day, seven days a week on
holders’ concerns about a project, take those concerns a U.S. destroyer (USS Pinckney DDG91), and you should
seriously, and address them. never forget where you came from, as well. That is what
No matter what field you decide to pick, remember transforms a good engineering project manager into an
that a good project manager, just like a good command- excellent engineering project manager.
ing officer, democratically involves their employees in
the process. When employees feel empowered, they will About the author
exceed expectations set by management. Above all else, Sherwin Razmy (sherwin_razmy@yahoo.com) was an
remain humble. When I was seventeen years old, I start- engineering project manager for Parsons, Pasadena,
ed out as an undesignated deck seaman. I worked hard CA USA at the time of the writing of this article.

TAP.
CONNECT.
NETWORK.
SHARE.
Connect to IEEE–no matter where you are–with the IEEE App.
Stay up-to-date Schedule, manage, or Get geo and interest-based
with the latest news join meetups virtually recommendations

Read and download Create a personalized Locate IEEE members by location,


your IEEE magazines experience interests, and affiliations


IEEE POTENTIALS September/October 20 2 3 ■ 9
©STUTTERSTOCK.COM/RFECT
Careers and Graduate Education

Beyond the classroom


Open Project Space at the University of California, Irvine

Lily Johnson and Alexandra Zhang Jiang

T
he IEEE Student Branch
f rom t he Un i ver sit y of
California, Irvine (IEEE@
UCI) launched the Open
Project Space (OPS) pro-
gram to provide engineering stu-
dents w it h t he oppor tu n it y to
practice valuable skills and theo-
ries learned in the classroom.
OPS is a year-long extracurricular
program founded at the University
of California, Los Angeles (UCLA) in
2010 by Leo Szeto. Through lectures,
workshops, and projects, OPS aims
to create an interactive environ-
ment where students learn funda-
mental embedded systems concepts,
develop troubleshooting techniques,
compare communication protocols,
and design their first printed circuit
board (PCB).

©SHUTTERSTOCK.COM/EVGDEMIDOVA
With the help of IEEE at UCLA,
the program was first piloted by
John Yu and Samuel Deans at UCI
in fall 2020, trialing four projects
with 30 students. As per pandemic
restrictions, the necessary hardware
was shipped, and lectures were given
over Zoom. However, participation pleted the program, and a couple moting in electrical engineering and
declined, and it was arduous to pro- students continued their journey in computer science (EECS) classes.
vide hardware troubleshooting help IEEE as officers. More than 200 students applied,
due to the virtual format. For exam- The next iteration, headed by of- exceeding expectations, and prov-
ple, even though a Discord channel ficers Lily Johnson and Alexandra ing the demand for the program
was created for OPS members, it was Zhang Jiang, was offered to 60 stu- within UCI.
rarely used, and students preferred dents during the 2021–2022 academ- The new OPS version from UCI
sending an e-mail. Nonetheless, the ic year. Since the program doubled (https://ieee.ics.uci.edu/ops.html) di-
pilot program raised expectations its capacity, IEEE@UCI also doubled verges from UCLA’s template program
for the full in-person version of OPS efforts to reach out to students by (https://openproject.space/projects/)
at UCI: 20 out of 30 members com- advertising at the Anteater Involve- to adjust to the tool sets of UCI stu-
ment Fair at the b ­eginning of the dents and the school’s branding.
Digital Object Identifier 10.1109/MPOT.2023.3241448
year, sending invitations through One of IEEE@UCI’s biggest limita-
Date of current version: 6 September 2023 the engineering newsletter, and pro- tions is the small workspace area, so,

10 ■ S e p t e mber /O ctober 2023 IEEE POTENTIALS 0278-6648/23©2023IEEE


unlike UCLA’s method of checking One of the favorites among the students was the
projects in person or the pilot pro-
gram’s e-mail submissions, the year- iPoduino, where students programmed an
long version at UCI hosted a Canvas Arduino to make a buzzer play different songs
page to handle collecting and grad- of their choosing.
ing student projects. The Canvas
page also provided a platform for re-
sources and recorded lectures. Ad- ment unit. Students looked forward and ask questions, creating a stress-
ditionally, the order of content was to designing their first PCB and ho- free learning environment. The pro-
cha nged to align w ith the road listically implementing the topics gram functioned purely as an extra-
map of EECS classes, lecture slides and tools they learned from previous curricular, not affecting their grade
were edited for better readability, projects (Fig. 2). point average if they were unable to
and a simple but professional theme As the program came to a close, complete projects.
was designed. students had much positive feed- However, many challenges and
The first meeting of the year back. Third-year and transfer stu- critiques came with executing the
kicked off with a lecture about elec- dents, who had two years of virtual program at full scale for the first
trical engineering basics, followed classes, were delighted to finally ap- time. Toward the middle of the sec-
by a hands-on workshop where stu- ply topics learned in the classroom ond quarter, participation declined.
dents used the IEEE lab’s soldering through hands-on projects. First- This was attributed to the rapid in-
irons (Fig. 1) to complete the first and second-year students were ex- crease in difficulty toward the end
simple project of soldering an LED cited to get a head start on their of the program, particularly with
and a resistor to a perf board. engineering path. One student com- the projects exploring communica-
Lectures and projects ranged mented, “I thought this was a great tion protocols through a red light/
from learning the basics, such as experience to have, and I learned green light game between Ardui-
the difference between a cathode some topics here . . . that were hard nos. Many students agreed with
and anode, to using microcontrollers to understand in an actual UCI lec- this feedback: “The radio version of
to implement more complex proj- ture!” Overall, students found the red light/green light gave me a lot
ects, like an infrared distance sen- program enriching and complemen- of issues that I [couldn’t] really un-
sor. One of the favorites among the tary to their classes as well as inspir- derstand compared to those from
students was the iPoduino, where ing for personal projects. Another previous projects.” The nRF24 radio
students programmed an Arduino to student stated, “Of all the projects modules and the associated library
make a buzzer play different songs I’ve participated [in], no matter the were difficult to use and required
of their choosing. The spring term difficulty, I always came out of it feel- extensive debugging. This level of
ended with the capstone project of a ing I achieved and learned something debugging was discouraging and
remote-control (RC) car, consisting of new and valuable. . . .” No matter the time-­consuming for students who
an Arduino car and a custom remote difficulty of the projects, students were newly introduced to these top-
PCB integrating an inertial measure- were incentivized to make mistakes ics. The OPS leads also found that

FIG2 OPS students soldering the PCBs


FIG1 Alexandra Zhang Jiang leading the first soldering workshop of the year. that they designed for the RC car project.


IEEE POTENTIALS September/October 20 2 3 ■ 11
FIG3 Students received their hardware kits during the first 2022–2023 OPS meeting.

managing the entire program was Arduino. Additionally, the red light/ We are excited to start the third it-
too much for two people and were green light series was replaced with a eration of OPS! IEEE@UCI would like
not always able to address student weather station project to align with to extend a huge thank you to Leo
inquiries promptly due to the sheer embedded systems interests. Students Szeto, founder of the OPS program at
volume of requests for help. will utilize the same communication UCLA; Ryeder Geyer, IEEE at UCLA’s
For the 2022–2023 year, OPS has protocols and microcontrollers used external officer; and IEEE at UCLA
enrolled 100 students. The program’s in red light/green light, but, unlike liaisons as well as any others who
curriculum and projects have been red light/green light, which relies on had a part in making this program
revamped extensively to tackle stu- software algorithms, the weather sta- a success.
dent feedback. To address the diffi- tion will focus on teaching how to use
culty spike, easier projects, such as electronics components, such as tem- About the authors
debugging a faulty perf board circuit, perature and humidity sensors, and Lily Johnson (lilyaj@uci.edu) is the
were removed, and more substantial, an LCD screen. president of t he IEEE Student
intermediate projects were added in Under the new OPS leads, the Branch at the University of Califor-
the middle of the program where stu- leadership team has expanded to nia, Irvine, Irvine, CA 92697 USA.
dents felt that the difficulty increased include OPS technicians, who will Alexandra Zhang Jiang
too quickly. One of the new projects assist with buying and distribut- (azhangji@uci.edu) is the vice presi-
includes building an H-bridge circuit ing parts, organizing lab hours, and dent of the IEEE Student Branch at
with p-channel and n-channel tran- helping students with questions and the University of California, Irvine,
sistors to drive a dc motor with an debugging (Fig. 3). Irvine, CA 92697 USA. 

12 ■ S e p t e mber /O ctober 2023 IEEE POTENTIALS


©STUTTERSTOCK.COM/RFECT
Careers and Graduate Education

Low-cost software-
defined radio for electrical
engineering education
Samer Baher Safa Hanbali

©SHUTTERSTOCK.COM/ITANA

P
rototype wireless commu- Consequently, iterating on these transmission and reception of data.
nication systems can be prototypes will increase the overall In addition, the ease of use and
designed using discrete cost, size, power consumption, and reduced expense of SDRs permit
components, e.g., a low- complexity of the system. In con- students to own the portal equipment.
noise amplifier (LNA), a trast, software-defined radios (SDRs) This increases student engage-
power amplifier (PA), mixers, filters, integrate multiple functional blocks ment through hands-on experien-
frequency synthesizers, an analog- on a single microchip to reduce the tial learning.
to-digital converter (ADC), a digital- cost, size, and power consumption.
to-analog converter (DAC), etc. Dif- Furthermore, SDRs combine both Introduction
ferent circuit boards have to be digital processing and analog radio SDR is a new trend in wireless com-
designed, fabricated, assembled, frequency (RF) to offer more flexibili- munications in which the system
tested, and connected with wires. ty to be reconfigured and controlled. parameters are mostly defined and
Therefore, SDRs achieve more fre- reconfigured by software. There are
Digital Object Identifier 10.1109/MPOT.2022.3223788
quency- and bandwidth-flexible RF two approaches for SDR. In the first
Date of current version: 6 September 2023 design, which enables the seamless approach, the computer performs


0278-6648/23©2023IEEE IEEE POTENTIALS September/October 20 2 3 ■ 13
most of the digital signal process- various software environments, ■■tunable bandwidth from 200 kHz
ing, and the field-programmable e.g., Python, GNU Radio, MATLAB, to 20 MHz (AD9363) or 200 kHz
gate array (FPGA) does few tasks. In Analog Device’s IIO Oscilloscope, to 56 MHz (AD9364)
the second, the FPGA performs and Airspy’s SDR#. The Commu- ■■12-bit ADC and DAC
most of the digital processing, and nications Toolbox from the Math- ■■ADC and DAC sampling rate of
the computer displays the results Works provides M ATLAB func- up to 61.44 million samples per
and does few tasks. It is easier to tions for transmitter and receiver second
implement advanced algorithms blocks for the ADALM-PLUTO. IIO ■■output power of up to 7 dBm.
using the first approach than when Oscilloscope is an application that Figure 1 shows a block diagram
the second one is used. On the controls the ADALM-PLUTO trans- of ADALM-PLUTO based on the
other hand, the second approach mit and receive channels. SDR# AD936x transceiver that is respon-
needs a lower data transfer rate is a freeware software package sible for receiving and transmitting
between the FPGA and the comput- that controls the ADALM-PLUTO re- the RF data. AD936x has a zero-in-
er than former. ceiver and demodulates amplitude- termediate-frequency architecture.
Many developers have used GNU modulation/frequency-modulation This results in a low component
Radio software and Universal Soft- (FM)/double-sideband/single-side- count, low cost, and low power con-
wa re R adio Per iphera l (USR P). band signals. sumption. The receive subsystem in-
GNU Radio is a free open source cludes an LNA in from the antenna,
software development tool kit. This Overview of ADALM-PLUTO a mixer, filters, and an ADC. The
tool kit has a growing list of func- ADALM-PLUTO is an easy-to-use transmit subsystem contains a DAC,
tions, and it can be used with dif- SDR module. Its core component is filters, a mixer, and a small PA out
ferent SDR hardware. The popu- RF transceiver AD9363 or AD9364, to the antenna. The external ampli-
lar RTL-SDR USB radio stick is which is based on a direct-conver- fiers, the PA and LNA, can be used
cheaper than USRP, but it oper- sion receiver/transmitter. Here are when further amplification is re-
ates only as a receiver. In contrast, the main specifications of ADALM- quired. Besides the RF transceiver,
A DA LM-PLU T O (PlutoSDR) has PLUTO: ADALM-PLUTO includes a Xilinx
full transceiver implementation at ■■tuning range from 325 MHz to Zynq-7010 FPGA with an ARM Cor-
an affordable cost. Furthermore, 3.8 GHz (AD9363) or 70 MHz to tex-A9 CPU, DDR3 random-access
ADALM-PLUTO is supported by 6 GHz (AD9364) memory, Flash memory, and USB 2.0
controller. The ADALM-PLUTO mod-
ule is connected to the laptop v i a
USB and is controlled using the
SDR software, e.g., MATLAB. The
software allows you to control the
Xilinx ADALM-PLUTO parameters, such
Mixer
Filter

Filter
DAC
FIR

PA

as the bandwidth, gain, center fre-


quency, etc. The second USB is used
Linux Kernel

Interface
USB 2.0

ADI
Drivers

to provide external power during a


DMA
libiio

AD9363 standalone mode. A Linux system


runs the onboard Flash memory of
Mixer
Filter

Filter
ADC

LNA

ADALM-PLUTO. The libiio USB class


FIR

Zynq is used for transferring in-phase and


quadrature components from/to the
RF device to the host computer.
(a) In this article, we used the Hard-
ware Support Package for ADALM-
PLUTO from MathWorks because it
provides transmitter and receiver
Simulink blocks and MATLAB func-
tions to control ADALM-PLUTO
in the Communications Toolbox
through the USB port using libiio
drivers that support both Windows
and Linux. In addition, the Com-
munications Toolbox extends the
(b) tuning range of ADALM-PLUTO
based on AD9363 from 70 MHz
FIG1 (a) A block diagram of ADALM-PLUTO (b) A photo of ADALM-PLUTO. to 6 GHz and the bandwidth from

14 ■ S e p t e mber /O ctober 2023 IEEE POTENTIALS


20 MHz to 56 MHz using the AD9364 for algorithm debugging and gen- transmitter, which generates a pulse
­configuration rather than the default eral hardware debugging. A loop- and radiates it out into free space to-
AD9363 configuration. back cable can be used instead of ward objects through an antenna.
two antennas to avoid interference The second subsystem is the receiver,
Comparison of SDR modules between students’ ADALM-PLUTOs. which receives the pulse reflected off
A comparison of SDR modules is The gain of both the LNA and PA the object through the antenna. Then,
summarized in Table 1. It is clear that should be reduced to the minimum it converts the analog waveform into
ADALM-PLUTO has the best specifi- value to prevent clipping or satura- a digital waveform so that the signal
cations at the lowest cost: it has both tion at the receiver. can be processed and translated to
transmit and receive channels, a wide During the laboratory sessions, graphical data to be shown on the ra-
frequency range, a wide bandwidth, each student uses one A DA LM- dar operator’s display.
high ADC/DAC resolution, and a low PLUTO connected to a PC/laptop System-defined radar is a new re-
noise figure. In addition, ADALM- that has MATLAB/Simulink with search trend where the radar system
PLUTO is supported by many popular the Communications Toolbox. Stu- performs waveform diversity and op-
software platforms, e.g., MATLAB, dents can experiment with radar or erates in different modes by only re-
GNU Radio, and Python. On the other wireless communication as well as configuring the radar software. This
hand, ADALM-PLUTO has several transmit and receive actual signals enables radar systems to show mul-
shortcomings as follows: by working with actual SDR hard- tifunction capabilities (i.e., synthetic
■■It has a low output power level. ware. Furthermore, ADALM-PLUTO aperture radar, weather radar, and
In addition, there is a degrada- can be used as a data source for surveillance radar), especially where
tion in the transmitted power downstream spectrum analysis be- size, power, and weight are limited,
when the center frequency is cause the radio’s frequency can be as in aerospace.
increased. changed to tune the radio to a band Some works used ADALM-PLUTO
■■The frequency accuracy of the where a signal of interest is pres- in the implementation of short-range
local oscillator is low, and it ent to make measurements on the FM continuous-waveform (FMCW)
equals 25 ppm. received signal. Therefore, ADALM- radar using two directional anten-
■■The small temperature range is PLUTO can be used as an inexpen- nas to focus the radar on a specific
from 10 to 40 °C. sive spectrum analyzer. area of interest. Other works used
■■There is no RF shielding inside ADALM-PLUTO to jam an FMCW
ADALM-PLUTO. That means that SDR for a radar lab radar. However, the transmit power
placing a strong transmitter close There are many applications for limitation was the main concern of
to it (like your cellphone) may radar systems, including aerospace using ADALM-PLUTO.
impact the results for any fre- control, self-driving cars, imaging, It is well known that high-resolu-
quency that the ADALM-PLUTO traffic monitoring, space debris tion radar systems, e.g., automotive
is tuned to. tracking, and more. This makes radar, level-measurement radar, and
■■The data transfer rate is limited them a n exciting field of study imaging radar, operate at higher fre-
by the speed of the USB. for students. quencies than those of ADALM-PLU-
A radar system consists of two TO. In addition, these radar systems
ADALM-PLUTO for laboratory subsystems that operate indepen- require a bandwidth higher than
assignments dently. The first subsystem is the that of ADALM-PLUTO to achieve
ADALM-PLUTO becomes a viable
instructional tool for digital commu-
TABLE 1. A comparison of SDR modules.
nications or radar classes because
of its portability, affordability, and DEVICE RTL-SDR ADALM-PLUTO HackRF ONE USRP B200
transceiver capabilities. For the lab-
Cost (USD) 20 149 380 777
oratory assignment, one ADALM-
Tx and Rx channels 1 Rx only 1 Tx and 1 Rx 1 Tx and 1 Rx 1 Tx and 1 Rx
PLUTO configured as a transmitter
Frequency 24–1,766 70–6,000 1–6,000 70–6,000
is placed in a prominent position in
range (MHz)
the front of the laboratory. The RF
signal transmitted from this radio ADC/DAC 8 12 8 12
Resolution (b)
serves as the source signal for the
students’ ADALM-PLUTOs config- Maximum 3.2 20–56 20 56
ured as receivers. bandwidth (MHz)
Some lab experiments require Rx noise figure (dB) 3 <3.5 <10 <8
loopback as shown in Fig. 1, where Tx power (dBm) — 7 5–10 10
the waveform is both transmitted Data interface USB 2.0 USB 2.0 USB 2.0 USB 3.0
and received by the same ADALM-
Rx; receiver; Tx: transmitter.
PLUTO, which is a common strategy


IEEE POTENTIALS September/October 20 2 3 ■ 15
The common types of radar signals are FM minimum peak sidelobe codes. Bark-
er codes have the common property
waveforms and phase-coded waveforms, which that all sidelobes have a value of 1/N.
have different properties. Unfortunately, there are only seven
known Barker codes that have a
high-range resolution. Therefore, Overview of radar waveforms maximum code length that equals
ADALM-PLUTO cannot be used to The library of GNU Radio has many 13. Frank code and P1- through P4-
simulate these radar systems, but it signal sources. Most of these sourc- coded signals are well-known codes
can be used for lab assignments that es are dedicated to communication that belong to polyphase waveforms.
include the simulation of basic radar systems. Radar waveforms are dif- Frank, P1, and P2 codes exhibit low-
signal processing, e.g., radar wave- ferent from waveforms used by er PSL than those of P3 and P4 codes
form generation, radar-matched communication systems. The MAT- by 3 dB. However, P3 and P4 codes
filter, radar detection, Doppler pro- LAB Phased-Array System Toolbox are more Doppler tolerant than the
cessing, etc. can be used to generate many radar Frank, P1, and P2 codes.
waveforms for different applications. It is worth mentioning that the
Software-defined radar advantages The common types of radar signals MATLAB Phased-Array System Tool-
■■For multipurpose radar, the pro- are FM waveforms and phase-coded box does not support the generation
cessing algorithm is implemented waveforms, which have different of some radar signals, e.g., PRN codes,
in software. It can easily be properties. FM waveforms are ob- NLFM, and Costas-coded waveforms.
changed during radar operation, tained by modulating the frequency of Therefore, these signals can be gen-
so it is possible to switch between the radar pulse. There are several FM erated based on their equations.
different operation modes or waveforms. These include linear FM
adapt the probe signal. (LFM), nonlinear FM (NLFM), Cos- Simulation results
■■There are fast development and tas-coded waveforms, and stepped In the following simulation, MAT-
flexibility in controlling different FM waveforms. The LFM waveform L A B w ith the Communications
design parameters, e.g., the fre- is commonly used in radar systems Toolbox and one ADALM-PLUTO
quency, bandwidth, and gain. due to its high Doppler tolerance. It with two antennas are used. The
■■There are reductions in cost, is well known that the peak sidelobe radar waveform is both transmitted
size, weight, and power con- level (PSL) of the compressed LFM and received by the same ADALM-
sumption. pulse equals –13.2 dB. PLUTO. Then, the received waveform
In a phase-coded waveform, the is correlated with the transmitted
Software-defined radar shortcomings long signal of duration T is divided waveform to simulate radar wave-
■■Wideband or multiband anten- into N small signals called chips, form generation and radar-matched
nas are required for multifunc- each of width tc = T ∕ N. Phase-cod- filter. Figure 2(a) and (b) shows the
tion software-defined radars. ed waveforms are characterized by real and imaginary parts of the
■■Ve r y - h i g h - s p e e d A D C s a r e the phase modulation applied to LFM waveform (bandwidth = 5 MHz,
required to digitize wide band- each chip. There are binary phase and pulse duration = 100 μs) that is
width signals. codes and polyphase codes. Com- transmitted and received by the
■■There are a high sampling rate mon types of binary phase-coded same ADALM-PLUTO, and then the
and huge data flow to be pro- waveforms are Barker codes, pseu-
­ received signal is correlated with
cessed. dorandom noise (PRN) codes, and the transmitted signal, as shown in
Fig. 3. One can figure out that the

0.5 0.5
0
Normalized Amplitude (dB)

–10
Amplitude (V)

Amplitude (V)

X 95
0 0 –20 Y –13.88

–30

–40
–0.5 –0.5
0 200 400 600 800 1,000 0 200 400 600 800 1,000 –50
Samples Samples 0 50 100 150 200
(a) (b) Samples

FIG2 (a) The real part of the received LFM waveform. (b) The imaginary part of the FIG3 The PSL of the LFM waveform at
received LFM waveform. the matched filter output.

16 ■ S e p t e mber /O ctober 2023 IEEE POTENTIALS


PSL equals –13.8 dB. This value is Obviously, the signal-to-noise ra- include quadrature phase-shift
approximately equal to the theoreti- tio (SNR) is high at the receiver out- keying, orthogonal frequency-divi-
cal value. We repeat the previous put of ADALM-PLUTO because the sion multiplexing, etc. Students
si mulat ion aga i n for study i ng transmit and receive antennas are can transmit and receive images
phase-coded radar signals, e.g., a about 12 mm from one another. to understand the principles of
Barker code when N = 13. Figure 4 digital communications.
shows Barker code (+1 + 1 +1 + 1 +1 SDR for a wireless ■■Low-cost spectrum monitoring
–1 –1 + 1 +1 –1 + 1 –1 + 1); as shown communications lab within the frequency range from
in Fig. 5, the PSL equals –21.4 dB. Every sector of today’s society is 70 MHz to 6 GHz: In this exper-
This value is approximately equal to entirely dependent on connectivity. iment, students will be curi-
the theoretical value. The wireless digital data revolution ous to explore the surrounding
has made our life better, e.g., radio RF signals and observe their
broadcasting, T V broadcasting, spectrum.
0.6 mobile phones, GPS, Wi-Fi, etc. Sev-
eral generations of digital mobile Simulation results
0.4 phones, e.g., 2G, 3G, 4G, etc. have In the following simulation, MAT-
appeared on the market. Wi-Fi has L A B w ith the Communications
Amplitude (V)

0.2
delivered high-speed Internet all Toolbox and one ADALM-PLUTO
0 around the world. Many smart- with two antennas are used.
phones can receive various signals FM radio signals are transmit-
–0.2 from different frequency bands, e.g., ted in a frequency range between
GSM (900 MHZ), Wi-Fi (2.4 GHz), 88 and 108 MHz, which allows
–0.4
GPS (1,575.42 MHz), etc. them to propagate miles across the
–0.6 S D R i s a r a d i o c o m m u n i c a- country. We can build an FM re-
0 20 40 60 tion system that uses software for ceiver using Simulink and ADALM-
Samples
modulating and demodulating ra- PLUTO’s receiver block, as shown
FIG4 The received Barker code.
dio signals. During the laboratory in Fig. 6. This allows you to lis-
sessions, students interact w ith ten to the radio stations through
real-world wireless signals over the laptop speakers.
air in real time to bridge the gap We can design a basic FM trans-
0
between the undergraduate com- mitter using ADALM-PLUTO’s trans-
Normalized Amplitude (dB)

–5 munication systems education and mitter block in Simulink. This


–10 the industrial demands by using an transmitter can switch the broad-
affordable ADALM-PLUTO and SDR cast from different sources, e.g., an
–15 X 43 software to simulate some examples audio file, a microphone, or a tone
–20 Y –21.4 as follows: signal, as shown in Fig. 7. The trans-
■■T ransmit and receive different mitted audio can be listened to using
–25
analog modulation schemes: the FM tuner app on a smartphone.
–30 These experiments are interesting The transmitted signal can be re-
–35 for students because they trans- ceived for a short distance because
0 20 40 60 80 100 mit and receive audio over the transmission power of ADALM-
Samples
FM radio. PLUTO is low.
FIG5 The PSL of Barker code at the ■■Transmit and receive different digi- The Wireless Local Area Net-
matched filer output. tal modulation schemes: Examples work Toolbox has an interesting

Center ADALM-PLUTO FM
1e6 99.7 Data
Frequency Receiver Broadcast

Center
Frequency (MHz)

ADALM-PLUTO Radio
Receiver

FIG6 The FM receiver using ADALM-PLUTO and Simulink.


IEEE POTENTIALS September/October 20 2 3 ■ 17
guitartune.wav Audio
A: 44,100 Hz,
Original
16 bit, Mono
Data

From Multimedia File

FM Data
Broadcast
ADALM-PLUTO
Transmitter

1e6 99.7 Center Frequency


DSP Center
Signal Source Frequency (MHz)
Selector

FIG7 FM transmitter using ADALM-PLUTO and Simulink.

example for students where im-


Transmitted Image Received Image Will Appear Here... age transmission and reception are
done by using one ADALM-PLUTO
at a carrier fr equency equal to
2.4 GHz. Of course, we can change
the carrier frequency due to the
flexibility of SDR. The baseband
signal is upconverted for RF trans-
mission over the air using ADALM-
PLUTO. Then, the received signal
is captur ed and d o w n s a m p l e d
(a) (b) to the baseband using the same
ADALM-PLUTO and is decoded to
FIG8 An example of the (a) transmitted image and (b) received image. recover the transmitted informa-
tion. Figure 8(a) and (b) shows the
transmitted image and the received
20
image, respectively. As mentioned,
0 the SNR is high at the receiver out-
(dBm)

–20 put of ADALM-PLUTO because the


–40 transmit and receive antennas are
–60 close to each other. The ADALM-
–80 PLUTO is used as a data source for
2.39 2.395 2.4 2.405 2.41 downstream spectrum analysis,
Frequency (GHz) as shown in Fig. 9 and therefore
(a) there is no need to use an expen-
sive spectrum analyzer.
–80 –60 –40 –20 0 20
Time History (ms) →

dBm ADALM-PLUTO as a low-cost


0 spectrum analyzer
To demonstrate using ADALM-PLU-
–5 TO as a low-cost spectrum analyzer
with stand-alone software instead of
2.39 2.395 2.4 2.405 2.41 using MATLAB, the spectrum of the
Frequency (GHz) previous received image will be cap-
(b) tured again by using ADALM-PLU-
TO’s receiver with SATSAGEN free-
FIG9 The (a) spectrum and (b) waterfall of the received image. ware software, as shown in Fig. 10.

18 ■ S e p t e mber /O ctober 2023 IEEE POTENTIALS


SDR,” in Proc. IEEE 13th Int. Conf.
Elect. Electron. Eng. (ELECO), 2021,
pp. 234–238, doi: 10.23919/ELE
CO54474.2021.9677650.
• G. de Peralta, “Coffee can ra-
dar: Detection and jamming,” B.Sc.
dissertation, Worcester Polytechnic
Inst., Worcester, MA, USA, 2017.
• T. Debatty, “Software defined
RADAR a state of the art,” in Proc.
IEEE 2nd Int. Workshop Cogn. Inf.
Process., 2010, pp. 253–255, doi:
10.1109/CIP.2010.5604241.
• S. B. S. Hanbali, “A review of
radar signals in terms of Doppler
tolerance, time-sidelobe level, and
immunity against jamming,” Int. J.
Microw. Wireless Technol., vol. 10,
no. 10, pp. 1134–1142, Dec. 2018,
doi: 10.1017/S1759078718001174.
FIG10 ADALM-PLUTO as a low-cost spectrum analyzer.
• “Phased array system toolbox.”
MathWorks. Accessed: Sep. 15,
Clearly, one can figure out that the Acknowledgment 2022. [Online]. Available: https://
spectrum is the same in both Figs. 9 I would like to thank the anony- w w w.mathworks.com/products/
and 10. This demonstrates using mous reviewers in IEEE Potentials phased-array.html
ADALM-PLUTO as an a f fordable for their valuable comments on this • M. Rice and M. McLernon,
and portable spectrum analyzer article. I also want to thank my fan- “Teaching communications with
for students. tastic colleague Hatem Najdi for his SDRs: Making it real for students,”
continuous support. IEEE Commun. Mag., vol. 57, no. 11,
Conclusion pp. 14–19, Nov. 2019, doi: 10.1109/
As we can see, the ADALM-PLUTO Read more about it MCOM.001.1900185.
has its pros a nd cons. It is a n • E. Grayver, Implementing Soft- • “Image transmission and re-
affordable, portable, and tunable ware Defined Radio. New York, NY, ception using 802.11 waveform
SDR t r a n s cei ver. I n add it ion, USA: Springer-Verlag, 2012. and SDR.” MathWorks. Accessed:
A DA LM-PLUTO is supported by • “Hands-on workshop: Software- Sep. 15, 2022. [Online]. Available:
many popular software platforms, defined radio.” Analog Devices. Ac- ht t p s://w w w.m at h w or k s.c o m/
e.g., M ATL A B, GNU R adio, and cessed: Sep. 15, 2022. [Online]. Avail- help//supportpkg/plutoradio/ug/
P ython. These permit transmit- able:https://wiki.analog.com/_media/ transmission-and-reception-of-an
ting and receiving various modu- richardsonmathworksseminars.pdf -image-using-wlan-system-toolbox
lation schemes. This makes such • “ADALM-PLUTO Radio Sup- -and-a-single-pluto-radio.html
hardware very attractive for elec- port from Communications Toolbox.”
trical engineering education, e.g., MathWorks. Accessed: Sep. 15, 2022. About the author
digital communications and radar [Online]. Available: https://www. Samer Baher Safa Hanbali (samer.
systems courses. However, t he mathworks.com/hardware-support/ hanbali@hiast.edu.sy) earned his
main limitations of ADALM-PLU- adalm-pluto-radio.html B.Sc. degree in electronic engineering
TO are that the center frequency • A. M. Wyglinski, R. Getz, T. from Damascus University, Syria, in
is only up to 6 GHz, the transmis- Collins, and D. Pu, Software-De- 2000; his M.Sc. degree in advanced
sion power level is low, and the fined Radio for Engineers. Norwood, electronic engineering from FH Joan-
bandwidth is only up to 56 MHz. MA, USA: Artech House, 2018. neum University, Austria, in 2011;
T hese lim itat ions do not a llow • W. L. Melvin and J. Scheer, Prin- and his Ph.D. degree in telecommu-
ADALM-PLUTO to be used for lab ciples of Modern Radar: Radar Ap- nications from the Higher Institute
assignments that include the sim- plications, vol. 3. Edison, NJ, USA: for Applied Sciences and Technology
ulation of high-resolution radar ­SciTech, 2014. (HIAST), Damascus, Syria, in 2017.
systems, e.g., automotive radar, • S. Kaya, A. C. Yapici, B. Tib- He is a researcher in the Department
le vel-me a su rement r ada r, a nd ikoglu, and S. O. Yazici, “Imple- of Communication Engineering,
imaging radar. mentation of FMCW radar by using HIAST, H837 Damascus, Syria.


IEEE POTENTIALS September/October 20 2 3 ■ 19
©STUTTERSTOCK.COM/RFECT
Careers and Graduate Education

How to Market to
Generation Z
on Social Media
Rae Yule Kim

S
ocia l med ia ca n be a n
effective medium to reach
Generation Z (Gen Z) and
advertise science, technol-
o g y, e n g i n e e r i n g , a n d
mathematics (STEM) programs.
Creating viral content on social
media is all about starting a trend
a nd at t ract i n g user-generated
content. One successful content
can nudge millions of user-gener-
ated content and generate billions
of views.
Social media has transformed
how we communicate with each oth-
er. Before social media, our commu-
nication medium was limited to only
people we knew. One viral content
on social media spreads to billions
of people. Social media can be an ef-
fective medium to reach out to Gen
Zers and inform them about the im-
portance of STEM skills.
The number of students enrolled
in STEM programs has been in de-
cline since the 1980s (Athanasia et
al., 2022). Only 11% of the U.S. popu-
lation has a STEM degree, while more
than 30% of jobs available in urban ©SHUTTERSTOCK.COM/MYPOKCIK

areas are in STEM fields (Athanasia


et al., 2022). Furthermore, STEM jobs
are projected to grow by 10.5% over global competitiveness of the technol- With Millennials, we have ob­­
the next eight years (Vaughn Col- ogy industry. In addition to student served a decline in interest in STEM
lege, 2022). Student success in STEM success, it is important that STEM education and student performance.
programs is key to maintaining the departments engage with students The U.S. ranks 52nd in the world
and spark an interest in pursuing a for science education performance
Digital Object Identifier 10.1109/MPOT.2023.3267901
STEM education as well as careers in and 27th in terms of the proportion
Date of current version: 6 September 2023 science and technology fields. of students pursuing a t­er tia r y

20 ■ S e p t e mber /O ctober 2023 IEEE POTENTIALS


­d eg ree i n S T EM f ields (Godfrey, social media also operate based on ed content and approximately 205
2015). However, student sentiment self-expression (Special and Bar- million impressions. TikTok users
toward STEM education and ca- ber, 2012). A previous study sur- best respond to relatable, fun, and
reers seems to have shifted with veyed college students and found exciting content.
Gen Z. Gen Z indicates people who that people who engaged in more YouTube has the second-highest
were born after 1997. Members of self-expression tended to receive a number of monthly users. YouTube
Gen Z, growing up during the fi- higher number of likes on Facebook is also considered the second largest
nancial crisis, tend to be more re- and reported a higher level of sat- search engine next to Google. You-
alistic compared to Millennials and isfaction from using social media. Tube offers a short video format, re-
value economic security (Francis Predictably, one reason why people ferred to as YouTube Shorts. YouTube
and Hoefel, 2018). For this reason, like and share content on social is the best channel if you seek to de-
Gen Z chooses STEM as a top career media is that they want to disclose liver informative content. Also, keep
choice (Vaughn College, 2022). This themselves. Likewise, one reason it short and touch people’s emotions
is a positive trend for STEM depart- why members of Gen Z create us- to go viral on YouTube Shorts.
ments since student sentiment on er-generated content is that they Instagram is often considered to
STEM education is improved among want to exploit the opportunity to have originated the influencer cul-
the younger generation. express themselves. ture (Markerly, 2022). Although Ins-
Social media is often the best Viral content on social media tagram provides a short video format,
marketing medium to engage this means content that triggers many Reels, it is widely a picture-based
young generation. Members of Gen reactions and user-generated con- platform. Therefore, it is important
Z are often called “digital natives.” tent from others. To trigger a viral that your image is well composed.
About 90% of Gen Zers learn about trend, it is important to align your Particularly, Instagram content
new products via social media, and content with Gen Z’s wants and tends to be more polished compared
among them, 70% use social media needs. Gen Z is attracted to content to TikTok content, which tends to
for more than 2 h on average every that helps them express themselves. be authentic and raw. To better en-
day (Novelli and CONE, 2019). For Here are some ways to appeal to Gen gage students on Instagram, appeal
this reason, response rates or con- Z and trigger user-generated content to personal stories. Instagram us-
version rates for social media mar- from them. ers tend to best react to content that
keting tend to be higher for Gen Z has a story and is personal to them.
compared to older generations (No- Choose the right platform Write about how studying until late
velli and CONE, 2019). However, The three most popula r socia l during the exam season makes peo-
there is still the question of how to media platforms for Gen Z are Tik- ple feel with a nicely edited photo of
engage Gen Z on social media. Tok, YouTube, a nd I nst a g ra m the library.
One characteristic that distin- (Markerly, 2022). Although Face-
guishes the interaction style of book is a popular platform for Support a cause
members of Gen Z from older gen- reaching tens of millions of mem- One unique characteristic of Gen Z
erations is that they not only con- bers of older generations, it is large- is that they are highly engaged
sume but cocreate content: 86% of ly seen by Gen Z as a platform for w it h socia l a nd env ironmenta l
Gen Zers seek to post sponsored their parents and grandparents causes. A Deloitte survey indicates
content for financial returns, and (Press-Reynolds, 2021). that the environment is the top
54% aspire to be social media in- Tik Tok is currently the most concer n for Gen Z, followed by
fluencers (Locke, 2019). Their mo- used socia l media plat for m by unemploy ment and health care
tive for consuming social media is young people from ages 14 to 25 ( D e l o i t t e , 2 0 2 2 ). C r e a t i n g a
different than that for traditional (Markerly, 2022). One feature that hashtag challenge and/or a Twitter
media. Gen Z utilizes social me- distinguishes TikTok from other so- thread about an environmental
dia to create content more than to cial media platforms is the hashtag initiative on the university campus
consume content. While traditional challenge. You can upload content can be a good idea to appeal to
media often works one way, and that invites other people to create Gen Z. The hashtag challenge #cli-
people mostly are just receivers of their content as a response. One matechange invites people to post
marketing communication, Gen Z well-known example of a hashtag content about globa l wa r ming.
is on social media to react, cocre- challenge is the Ice Bucket Chal- Tens of thousands of people took
ate, and galvanize a new trend. lenge, where many social media us- the challenge, and user-­generated
Interpersonal interactivity is the ers post videos of themselves pour- content created about 4.3 ­billion
characteristic that distinguishes ing buckets of ice on their heads impressions. The ­M assachusetts
social media from traditional me- to increase awareness of a disease Institute of Technology Office of
dia outlets. In interpersonal inter- called amyotrophic lateral sclero- Sustainability runs its own Twit-
actions, self-expression plays a key sis (ALS). This hashtag challenge ter account, and it is followed by
role. Interpersonal dynamics on nudged thousands of user-generat- 3,428 people.


IEEE POTENTIALS September/October 20 2 3 ■ 21
Team up with findings/2019-gen-z-purpose-study
influencers -undivided/
About 87% of Gen • T. Locke, “86% of young people
Zers subscribe to say they want to post social media
at least one influ- content for money,” CNBC, 2019. Ac­­ces­­
encer (Mor ning sed: Jan. 23, 2023. [Online]. Available:
Consult, 2019). https://www.cnbc.com/2019/11/08/
STEM influencers study-young-people-want-to-be-paid
can motivate stu- -influencers.html
dents to think of • W. P. Special and K. T. Li-Barber,
p otent i a l S T EM “Self-disclosure and student satisfac-
career paths and tion with Facebook,” Comput. Human
provide real-world Behav., vol. 28, no. 2, pp. 624–630, Mar.
insights that help 2012, doi: 10.1016/j.chb.2011.11.008.
students prepare • “Understanding the difference in
themselves better social media platforms.” Markerly. Ac-
for the industr y. cessed: Jan. 23, 2023. [Online]. Avail-
Particularly, STEM able: https://markerly.com/blog/
i n f luencer s c a n understa nding-the-difference-in
help inspire stu- -social-media-platforms/
dent s f r om u nder r epr e s ente d Read more about it • K. Press-Reynolds, ­“ Facebook
groups in science and technology • G. Athanasia. “The U.S. should wants to attract young people, but
fields. Although Black and Hispanic strengthen STEM education to remain Gen Z teens say it’s a ‘boomer social
individuals make up 11% and 16% globally competitive.” CSIS. Ac- network’ made for old people,” Insider,
of the U.S. workforce, respectively, cessed: Jan. 23, 2023. [Online]. Avail- 2021. Accessed: Jan. 23, 2023. [On-
each accounts for 6% of the STEM able: https://www.csis.org/blogs/ line]. Available: https://www.insider.
workforce. A recent study found that perspectives-innovation/us-should com/facebook-gen-z-teens-boomer
the gender wage gap in Europe has -strengthen-stem-education-remain -social-network-leaks-2021-10
increased with the Fourth Industri- -globally-competitive • “Global 2022 gen Z and millennial
al Revolution due to the underrepre- • “Why gen Z students are choos- survey,” Deloitte, New York, NY, USA,
sentation of women in better-paying ing STEM as a top career choice.” 2022. Accessed: Jan. 23, 2023. [Online].
occupations in technology fields Vaughn College. Accessed: Jan. 23, Available: https://www2.deloitte.com/
(Bernadin, 2021). Teaming up with 2023. [Online]. Available: https:// content/dam/Deloitte/at/Documents/
STEM inf luencers and business w w w.vaughn.edu/blog/why-gen- human-capital/at-gen-z-millennial
moguls, particularly for those from z-students-are-choosing-stem-as-a-top -survey-2022.pdf
an underrepresented background in -career-choice/ • “The influencer report,” Morning
the science and technology indus- • N. Godfrey, “Millennials are Consult, Washington, DC, USA, 2019.
tries, can help students have posi- failing because we are failing them: Accessed: Jan. 23, 2023. [Online]. Avail-
tive role models and be inspired to The STEM gap,” Forbes, 2015. Access­­ able: https://morningconsult.com/
pursue education and careers in ed: Jan. 23, 2023. [Online]. Available: influencer-report-engaging-gen-z-and
STEM fields. ht t ps://w w w.forbes.com/sites/ -millennials/
nealegodfrey/2015/04/19/millennials • J. Bernadin, “Six STEM influenc-
Marketing to Gen Z -are-failing-because-we-are-failing ers helping to bridge the gap for blacks,
on social media -them-the-stem-gap/?sh=e70c4d32f62c Hispanics, and women,” Forbes, 2021.
Social media is the most effective • T. Francis and F. Hoefel, “‘True Accessed: Jan. 23, 2023. [Online]. Avail-
medium for reaching out to Gen Z gen’: Generation Z and its implications able: https://www.forbes.com/sites/
about STEM programs because for companies,” McKinsey and Com- forbestechcouncil/2021/07/30/six-stem
most Gen Zers learn about new pany, New York, NY, USA, 2018. Ac- -influencers-helping-to-bridge-the-gap
things on social media. To market cessed: Jan. 23, 2023. [Online]. Avail- -for-blacks-hispanics-and-women/?
effectively on social media, create a able: https://w w w.mckinsey.com/ sh=37cd6c461248
tr end, not an advertisement, i ndust r ies/consu mer-pack a ged
because marketing on social media - g o o d s/o u r - i n s i g h t s/t r ue - ge n About the author
is not one-way communication. To -generation-z-and-its-implications-for Rae Yule Kim (rae.yule@gmail.com)
nudge a viral trend, 1) choose the -companies earned his Ph.D. degree in market-
right platform depending on the • “2019 gen Z purpose study,” Por- ing from Rutgers University. He is
purpose of the marketing, 2) create ter Novelli, New York, NY, USA, 2019. an assistant professor of marketing
cause-related content, and 3) part- ­Accessed: Jan. 23, 2023. [Online]. Avail- at Montclair State University, Mont-
ner with influencers. able: https://www.porternovelli.com/ clair, NJ 07043 USA.

22 ■ S e p t e mber /O ctober 2023 IEEE POTENTIALS


Blockchain perspectives,
mining, and types
An introductory tutorial

Anshuman Kalla

©SHUTTERSTOCK.COM/DIRENKO KATERYNA

T
oday, the world of informa- ting decentralized, either completely the Bitcoin cryptocurrency in 2008.
tion systems and business or partly, thanks to blockchain As a matter of fact, it was after the
processes is experiencing a technology—specifically, distribut- success of Bitcoin that researchers
shift in its status quo. Sys- ed ledger technology (DLT), which is and practitioners around the globe
tems designed and operated enabling this paradigm shift. identified blockchain technology as
in a centralized manner are now get- the underlying technology driving
Introduction Bitcoin. As time passed, techno-
Digital Object Identifier 10.1109/MPOT.2023.3246230
Blockchain technology came into crats started realizing that the
Date of current version: 6 September 2023 existence through the inception of potential of blockchain technology


0278-6648/23©2023IEEE IEEE POTENTIALS September/October 20 2 3 ■ 23
To ensure the security of a distributed ledger in Nevertheless, the recent past has
revealed many issues that underlie
such a network, DLT exhaustively uses a centralized system. For instance,
cryptographic techniques. a centralized system may invoke nu-
merous third-party services to per-
form its functions. Each of these
goes beyond the fintech sector. ly. Before we dive into DLT and block- third-party intermediaries performs
Notably, blockchain can resolve chain technology, perhaps it would its dedicated set of tasks, which in-
many issues associated with the be interesting to look at the benefits creases the overall delay and the cost
use of centralized systems in vari- and, more importantly, the issues that users have to bear. Moreover,
ous sectors, such as health care, associated with centralized informa- users are generally unaware of the
manufacturing, industrial supply tion systems. involved third-party intermediaries.
chain, file sharing, identity man- Another critical issue with central-
agement, and telecommunications. Centralized systems—Benefits ized systems is the single point of
For instance, ensuring privacy and issues failure. Given the intrinsic central-
and tight access control of electronic Traditionally, the design and the ity of such systems, any accidental
health-care records (EHRs) in the modus operandi of information sys- or attack-driven failure can lead to
health-care ecosystem is of utmost tems have been centralized in a complete breakdown or compro-
importance. In other words, only au- nature—the reason being that cen- mised services. Some of the secu-
thorized entities should be enabled tralized systems offer numerous rity-related issues with centralized
to share and access EHRs. Moreover, advantages, such as ease of monitor- information systems are as follows:
irrespective of security attacks or ing and maintenance, higher con- ■■Lack of transparency and data
accidental faults, the availability of trollability, increased protection from ownership: Once users upload
health-care services should be guar- physical attacks, and no need for their data to a centralized sys-
anteed to various stakeholders, such multiple infrastructure facilities tem, they may not know what
as patients, doctors, laboratories, since all of the resources and happens with their data. They
hospitals, and medical institutes. database(s) are housed at a pre- tend to lose complete ownership
While all such stringent service re- defined and fixed location. Moreover, of their personal data in a cen-
quirements are improbable with a centralized systems have matured tralized system.
centralized health-care management over the years, and well-established ■■Data alterations: A compromised
system, blockchain-enabled decen- legal frameworks support them. Fig- system can lead to malicious
tralized and secure health care has ure 1 depicts advantages and disad- alterations to users’ data. The
the potential to fulfill them efficient- vantages of a centralized system. centralized database makes it

Pros Cons
No Need for Multiple Presence of Third-Party
Infrastructure Facilities Intermediaries
Easy Monitoring, Prone to Single Point of
Maintenance, and Failure
Controllability Loss of Data Ownership
High Physical Security Once Data are Uploaded
Since Housed at a Fixed Nontransparent System
Location Possibility of Data
Established Legal Manipulations
Frameworks for Auditing Threat to Data Privacy
and Compliance and User’s Privacy

Actor

FIG1 The centralized system—pros and cons.

24 ■ S e p t e mber /O ctober 2023 IEEE POTENTIALS


difficult to identify and track to a distributed ledger, it is crypto- among others, and it has received
such manipulations. graphically sealed. This means the all-around attention from industry
■■Access rights and privacy leaks: transactions committed to a distrib- and academia. At the core of block-
Access rights could be secretly uted ledger cannot be deleted or mod- chain lies a distributed ledger that
given to an unauthorized entity. ified. Therefore, a distributed ledger is is shared and synchronized with all
Illegitimate read access can immutable (or tamper resistant), and of the nodes in the system. It is
result in confidentiality breach- its size keeps growing with time. Fig- important to note that, although
es and (data, user, and location) ure 2 shows the fundamental compo- sometimes the two terms DLT and
privacy leaks. nents of DLT and its types. blockchain are used interchange-
ably, they are not the same. DLT is
DLT Blockchain—Different a broad class, and blockchain is
DLT aims at secure storage of a dis- perspectives one prominent member of t his
tributed ledger and decentralized gov- The last decade has witnessed sig- class. Examples of the other mem-
ernance. A ledger is a book of records nificant growth in the applicability bers are directed acyclic graphs
(i.e., a database), which, if built and of blockchain technology in various (DAG), hashgraph, holochain, and
maintained by a digital system, is domains. Despite its popularity, tangle (see Fig. 2).
called a digital ledger. Organizations there is no single standardized defi-
and businesses that provide services nition of blockchain to date. There- Technology perspective
involving (or incurring) economic val- fore, this section aims to answer the Second, from the technological per-
ues and perform transactions with fundamental question: W hat is spective, blockchain is a technology
digital assets need to maintain a digi- blockcha in? To develop a fir m that is a unique, powerful, and prof-
tal ledger. When a digital ledger is understanding, in what follows, we itable amalgamation of underlying
shared with multiple entities (also explain blockchain from three per- pr inciples a nd technologies. It
known as nodes) in a system, it is spectives (see Fig. 3). exhaustively uses cr yptographic
referred to as a shared ledger. A dis- concepts and principles, such as
tributed ledger is a type of shared DLT perspective asymmetric cryptography, hashing,
ledger. In the distributed ledger para- First a nd foremost, blockcha in digital signature, and Merkle trees.
digm, a digital ledger is shared with is the most popular type of DLT Peer-to-peer (P2P) technology is
multiple nodes such that each node
stores an identical copy of the digital
ledger. Nodes are connected to form a
network of nodes. The peculiarities of Distributed Network of Consensus
Ledger Cryptography Mechanism
Nodes
such a network of nodes are as fol-
lows: 1) any node in the network can
Underlying Components
add new transactions to the distrib-
uted ledger, and 2) the network is
expected to have malicious or com-
DLT
promised nodes.
To ensure the security of a dis-
tributed ledger in such a network, Different Types
DLT exhaustively uses cryptograph-
ic techniques. If a new transaction
added by a node is legitimate, all of Blockchain DAG Hashgraph Holochain Tangle
the other nodes in the network must
also update their local copies of the FIG2 DLT components and types.
ledger with the same transaction.
This process ensures global synchro-
nization of the distributed ledger and
decentralized governance. On the
other hand, if the new transaction is
DLT
illegal, then DLT needs a mechanism Type of
to reject this transaction from getting Mix of Technologies
updated at all of the other nodes. This Typical D
ata Stru
mechanism is called a consensus Blockchain cture
mechanism, and using it, the nodes
establish an agreement before adding
a new transaction in the distributed
ledger. Once a transaction is written FIG3 Viewing blockchain from three perspectives.


IEEE POTENTIALS September/October 20 2 3 ■ 25
Blockchain is the most popular type of DLT among Step 1
Let us assume that a user Alice
others, and it has received all-around attention wants to send x bitcoin to a user
from industry and academia. Bob. Step 1 is to create a transac-
tion that reflects Alice’s intention.
Alice performs this by using an
used to connect nodes to create a ■■How does the newly mined block appropriate wallet and logging in to
blockcha in net work. Moreover, get added to the distributed led- her account. Blockchain employs
blockchain is governed by a consen- ger in the blockchain? public key cryptography to assign
sus mechanism that allows nodes ■■How are miners incentivized to each user a pair of public and pri-
in the blockchain network to agree contribute their resources to vate keys. An account identifier (or
on the current state of the distribut- update and maintain the block- number) is usually derived from a
ed ledger. In some use cases, such chain? user’s public key. To send x bitcoin
as Bitcoin cryptocurrency, economic Note that the pertinence of these to Bob, Alice selects Bob’s account
models are used to incentivize the questions, their precise answers, and enters the value x to transfer.
participating nodes, thereby ensur- and the actual block mining pro- Alice triggers the transaction by
ing ma ximum decentralization. cess depends on numerous factors, clicking the pay or finish button,
Therefore, in essence, blockchain is such as the type of blockchain and and the transaction is digitally
a technology that is driven by a the consensus mechanism used. signed using her private key.
gamut of underlying technologies. For a first-hand understanding of
the process involving creating, min- Step 2
Data structure perspective ing, disseminating, verifying, and In this step, the transaction created
Third, from the data structure adding a new block, we consider the in step 1 is broadcasted to all of the
viewpoint, blockchain represents Bitcoin blockchain, which uses the nodes in the blockchain P2P net-
how transactions are grouped and proof-of-work (PoW ) consensus work. To do so, Alice’s wallet sends
how the overall database is struc- mechanism. A typical block struc- out the transaction to the nodes to
tured. Blockchain follows a specific ture used for the Bitcoin blockchain which it is directly connected. At
data structure to create and update is shown in Fig. 4. A block compris- any given time, a large number of
the distributed ledger. A set of es two parts: the header and body. nodes can participate in a block-
transactions appearing in a given The block header contains a set of chain network. However, any given
time w indow are validated and fields, whereas the body consists of user is directly connected to very
clubbed in a data unit called a transactions and optionally smart few nodes.
block. Each block contains a finite contract(s). Every node receiving the transac-
number of legitimate transactions. Users of a blockchain-based sys- tion performs a set of tasks. First, it
Every block is timestamped, and tem are connected to a blockchain validates the sender (i.e., Alice) by
its cr yptographic hash value is network. A blockchain network com- checking its digital signature. Sec-
computed. A newly created block is prises nodes connected in a P2P ond, it confirms the existence of the
logically chained with the most fashion. Depending on the type of recipient (i.e., Bob) by looking up his
recent block in the ledger. The blockchain, the platform used, and address. Third, it verifies the feasi-
chaining happens by inserting the the specific use case, a node may re- bility of the transaction by ensuring
hash va lue of t he most recent fer to a miner, validator, orderer, or Alice has x bitcoin with her. Fourth,
block’s header in the newly created relay node. To understand the min- it adds the verified transaction to the
block (explained in detail in the ing process, in this section, the term pool of unconfirmed transactions.
next section). As the blocks are cre- node refers to a miner. Moreover, The transaction pool or memory pool
ated, they are chronologically and both the terms node and miner are (mempool) at each node holds all of
cr yptographically connected. In used interchangeably. As the name the unconfirmed transactions that
essence, the data structure used suggests, the job of a miner is to occur in a given time window. Final-
for the ledger is a chain of blocks, mine a new block. Depending on the ly, each node sends the transaction
and so the name is blockchain. settings, miners are equipped with to all of the other connected nodes.
high-end computing and storage Eventually, the transaction is broad-
Transaction processing facilities if mining is chosen to be casted, and all of the nodes receive
and block mining computationally intensive. This typi- that transaction.
Now that we know blockchain fol- cally is the case when the consensus
lows a typical data structure to mechanism used is PoW. Step 3
build a distributed ledger, it is time The entire process of block min- The next step is the mining of the
to ponder the following questions: ing is roughly divided into six steps, new block. Mining is a process in
■■How is a new block mined in the as depicted in Fig. 5. These are ex- which miners compete to create a
blockchain? plained in the following sections. new block. The mining process

26 ■ S e p t e mber /O ctober 2023 IEEE POTENTIALS


starts with the active miners inde-
pendently selecting a set of uncon-
fir med tra nsactions from their
respective mempools. The selected

Latest Block
transactions form the body of a new
block (under creation). Moreover,
these transactions are hashed to
create a Merkle tree.
In simple words, a Merkle tree
is an inverted tree of cryptographic
hash values. The leaf nodes of the
Merkle tree are labeled with the

Ty
Timestamp (4 B)
hash values of the selected transac-

Nonce (4 B)
tions. To compute a label for a node

Ty–1

Optional State for Supporting


Previous Block Hash (32 B)
at any higher level, the hash values

Merkle Root Hash (32 B)


of the child nodes are concatenated

Smart Contracts
and again hashed. This process of

Transactions

n Block
concatenating hash values of child

T4
nodes and computing a new hash
continues until we get one hash

T3
Version (4 B)

value at the root level, called the


nbits (4 B)

Merkle root hash. The Merkle root

T2
hash forms one of the fields in the
block header (see Fig. 4). The ad-

T1
vantage of using the Merkle tree is
that it provides a compact and se-
cure representation of all of the
selected transactions.
of Header of
Hash Value

n – 1 Block

Next, the hash value of the most


recent block in the ledger is insert-
ed in the previous block hash field
of the new block under creation.
The timestamp field is provided
with the Unix epoch time when the
Tx
Timestamp (4 B)

mining starts.
Nonce (4 B)

Assuming the PoW consensus al-


Tx–1

Optional State for Supporting


Previous Block Hash (32 B)

gorithm, the competitive challenge


Merkle Root Hash (32 B)

for miners is to solve a computation-


Smart Contracts

ally intensive puzzle. The aim of this


Transactions

FIG4 The block structure. B represents size of the field in bytes.


n – 1 Block

puzzle is to find a hash for the new


T4

block’s header, provided that the


hash value is smaller than a given
Bytes)

T3
B)

value, called the target. Interestingly,


nbits (4 B)
(4(4

the value of the target is dynamically


Version

T2

determined from the current difficul-


Version

ty. The difficulty is the relative level


T1

of computation required to solve the


puzzle to mine a new block. Difficul-
ty equal to one indicates the level of
computation needed to mine the first
Header

Block Body

block (know as the genesis block). In


Genesis Block

that sense, a difficulty of five means


that the computation required to
mine a new block is five times more
than that of the genesis block.
The higher the difficulty level, the
smaller the target value. A smaller
target value means a higher n ­ umber


IEEE POTENTIALS September/October 20 2 3 ■ 27
The advantage of using the Merkle tree is that it change the nonce field—this is to say
that a miner tries a random number
provides a compact and secure representation of for the nonce field and computes the
all of the selected transactions. hash value of the block’s header. If
the computed hash value is smaller
than the target, the mining process is
of zeros for leading bits in the target active number of miners and the finished. Otherwise, the process con-
value. Furthermore, the nbits field block generation rate. The adjust- tinues with a different random num-
holds a compact representation of the ment keeps the block generation ber assigned to the nonce field. The
target value used for mining a block. time almost the same irrespective process is computationally intensive
In summary, the current dif- of the change in the collective min- because it uses brute force to search
ficulty level determines the target ing power (known as the hash rate) for a magic number for the nonce
value, which determines the value of the blockchain network. field that produces the desired block
for the nbits field. The difficulty To achieve a block hash value hash. The miner that solves this puz-
level is adjusted according to the smaller than the target value, miners zle earliest is the winning miner.

Validate and Authentic Add to Flood to


Verify Transaction Transaction Mempool Other Nodes

Alice Wallet Wallet Bob

Encryption Using Wallet Bob


Bob Hashing
{}
Private Key Alice’s
Bob Wallet
Transaction
Digitally Signed
Transaction

Step 1 Step 2

The node that finds


func( )
Selects Set of Find Merkle Root Hash Keep Changing Nonce to the block hash
Transactions Taking Hash Values of Find Block Header’s Hash earliest is the winner.
From Mempool Transactions as Leaf Nodes Value Smaller than Target

Node Miner

New
Coins
Reward for
Wallet Bob
Alice Wallet Mining
New Block

The Newly Mined Block by


the Winning Miner Transaction
Step 3 Fees

Check the Append the Valid New Flood the New


Validity of the Block to the Local Copy Valid Block to
New Block of Distributed Ledger Other Nodes

Bob
Wallet Bob Alice Wallet Wallet
Alice Wallet

Steps 4 and 5 Step 6

FIG5 Various steps for creating, mining, verifying, and appending a new block.

28 ■ S e p t e mber /O ctober 2023 IEEE POTENTIALS


It is worth noting that heavy com- It is a myth that all of the consensus algorithms
putation and huge energy consump-
tion are specific requirements of the in blockchain are always computation
Bitcoin blockchain because it uses intensive and energy hungry.
the PoW consensus mechanism.
Examples of some of the lightweight
consensus algorithms that are ener- several consensus algorithms other of blockchain? What are the distinc-
gy efficient are proof of stake (PoS), than PoW, such as PoS, delegated tive characteristics of different
proof of authority, and practical Byz- PoS (dPoS), proof of activity, proof of blockchains? Blockchains have
antine fault tolerance (PBFT). elapsed time, PBFT, federated Byz- been classified in different ways
antine fault tolerance, stellar con- depending on numerous factors,
Step 4 sensus protocol, Reliable, Replicat- such as read, write, and commit
This step is about broadcasting the ed, Redundant, and Fault-Tolerant permission settings; server hosting;
newly mined block to all of the (RAFT), and ripple. conditions to join a blockchain net-
other nodes in the network. Every Moreover, various classifications work; and storing data (on or off
node performs a set of validations have been proposed to categorize the blockchain).
upon receiving a new block. These these consensus algorithms. One Blockchains are classified into
va l idat ions i nclude va l idat i ng of the classifications is proof-based four basic types: public, private,
transactions in the block; correct- and voting-based consensus algo- permissionless, and permissioned.
ness of the header fields, such the rithms. Proof-based consensus is These are distinguished based on the
as prev ious block hash; nbits; (generally) used when a large num- permissions to perform read, write,
Merkle root hash; and recomputa- ber of nodes participate in the block- and commit operations as well as the
tion of the block header’s hash chain P2P network, and one of the type of servers used. An entity with
value with the provided nonce value nodes has to prove itself worthy of read permission can see all of the
(to ensure that it meets the current adding a new block. Such consen- transactions stored in the distrib-
difficulty level). sus algorithms are better suited for uted ledger. Write permission allows
public blockchains, and PoW, PoS, an entity to create and broadcast
Step 5 DPoS, and proof of activity. transactions to the other nodes in
Once all (or at least the majority of) Voting-based consensus requires the blockchain network. The commit
the nodes validate and append the nodes to communicate to cast their right allows a node to append a new
newly received block to their local votes (i.e., opinions about a proposed block and confirm all of the transac-
copy of the ledger, the blockchain is new block and transactions within tions within that block. Commit and
said to have reached a consensus. it), and then a majority of nodes write are often used interchangeably
At this point, the transactions in should collectively decide to add the because the write operation includes
t he newly appended block a re new block. Such a consensus is vi- the sense of commit.
declared to be confirmed. able when a limited number of nodes
participate. It is therefore suitable for Public and private blockchains
Step 6 private or consortium types of block- Any entity can join the network in a
Logically, the last step is minting chains. Examples of voting-based al- public blockchain and perform the
ne w bit c oi n s a nd d i sbu r si n g gorithms are PBFT, RAFT, and ripple. read operations. Moreover, public
rewards to the winning miner. As Furthermore, it is a myth that all servers are usually used for hosting
soon as a new block is committed, of the consensus algorithms in block- public blockchains. On the con-
the blockchain system experiences chain are always computation inten- trary, entities in private blockchains
a supply of new bitcoins. These sive and energy hungry. Authentica- need permission to join and perform
coins and the transaction fees tion-based consensus is yet another read operations. Accordingly, pri-
(received from the users of the class of consensus algorithms that are vate servers are used to host private
confirmed transactions in the new lightweight and suitable for resource- blockchains and to enforce restric-
block) get credited to the account of constrained devices like the Internet tions. An entity could be a user or
the winning miner. Currently (i.e., of Things. PUFchain and AEchain miner willing to join a network. In
in 2022), the Bitcoin system creates are examples of such a type of con- essence, the read permission and
6.25 new bitcoins when a new block sensus algorithm. (For more details, the type of server hosting govern
is mined. check the “Read More About It” list at the difference between public and
Although this explanation is based the end). private blockchains.
on the Bitcoin blockchain, the step-
wise illustration gives a decent un- Types of blockchain Permissionless and
derstanding of how transactions In this section, some of the ques- permissioned blockchains
are generally processed and block tions that will be answered are as T h e d i s t i n c t i o n b e t w e e n p e r-
mining happens. Today, there exist follows: What are the different types m i s sion less a nd per m issioned


IEEE POTENTIALS September/October 20 2 3 ■ 29
Blockchains have been classified in different ways possible operations. In other
words, an approved node does not
depending on numerous factors such as read, write require any additional permission
and commit permission settings, server hosting, to write and commit new trans-
conditions to join a blockchain network, and actions. It is worth noting that, if
multiple organizations or compa-
storing data (on or off-blockchain). nies work together to set up a
private permissionless block-
­ lockchains is based on the write
b implies minimum data privacy. chain, it is referred to as consor-
and commit permissions. Permis- Thanks to pseudonymity, the tium blockchain. Only the mem-
sionless blockchain denotes a set- loss of privacy is somewhat cov- ber entities of a consortium are
ting where all of the participating ered. Cryptocurrencies like Bit- allowed to join and operate. A
entities (by default) can perform coin and Ethereum fall under gover nmental land registry
write and commit operations. How- this category. (cadastral) service is an intrigu-
ever, write and commit permissions ■■Public permissioned blockchain, ing scenario in which this type of
are granted to only a few of the by default, grants access to any blockchain applies.
total nodes participating in a per- entity to join and read the dis- ■■Private permissioned blockchain
missioned blockchain. tributed ledger. However, only a is where entities need exclusive
few selected nodes can write and permission to join the network
Four different combinations commit new transactions, which and perform any operations (i.e.,
of blockchains brings in the element of centrali- read, write, and commit). Usual-
Blockchains can be further classi- ty. Supply chain management is ly, write and commit operations
fied by combining these four basic a suitable use case scenario for are exclusively retained by the
types of blockchain. These types are this type of blockchain. In the vetted node(s) of a single enter-
depicted in Fig. 6 and discussed as supply chain, only a few autho- prise or organization. Such
follows: rized entities can update the led- blockchains are appropriate for
■■Public permissionless blockchain ger, and others are allowed to scenarios where privacy is of par-
is a completely open and unre- read the updates. amount importance. However,
stricted paradigm. Any entity can ■■Private permissionless block- privacy is achieved at the cost of
freely join the network and chain exercises an approval- centralized control.
requires no permission to read, based entry mechanism for an
write, and commit operations. entity to join the network. Once Conclusion and discussion
Such blockchains provide maxi- an entity becomes a part of the Blockchain has emerged as a prom-
mum transparency, which system, it can perform all of the ising technology. It is ­envisioned to

Blockchain
Based on Type of Server Hosting, Based on Write and
Joining Restrictions, and Reading Rights Commit Permissions

Public Private Permissionless Permissioned

Public Permissionless Public Permissioned Private Permissionless Private Permissioned

Decentrality in Increasing Order


Transparency in Increasing Order
Privacy in Increasing Order
Element of Centrality in Increasing Order
From Open to Closed System
From Public Servers to Private Server Hosting

FIG6 Types of blockchains and their characteristics.

30 ■ S e p t e mber /O ctober 2023 IEEE POTENTIALS


Futuristic Blockchain- and Smart Contract-Enabled Use Cases and Applications Existing Blockchain- and Smart Contract-Enabled Use Cases and Applications

Decentralized and Secure Network Decentralized and Secure


Slice Broker and Slice Management Electronic Medical Records

Secure Physical and Virtual Replica P2P Energy Trading in


Dynamic Spectrum Sharing and Tracking and Auditing of Counterfeit Trustless Environment
for Health Care, Aviation, and More Incentive Mechanisms Medical Equipment
6G
Decentralized Maintenance and Decentralized and Dynamic
Secure and Privacy-Compliant Mobile Smart Health Care
Repairing Using Digital Twins Transparent and Resilient Energy Management
Roaming and Load Sharing Networks
Digital Twins Pharmaceutical Supply Chain
Energy Democratic Generation and
Strict Access Control, Proof of Digital Open and Trustless Ecosystem for Privacy-Protected Patient Markets
IDs, and Compliance With Policies Infrastructure Sharing Distribution of Renewable Energy
Monitoring and Health Care Analytics

Traceability and Tracking of Cargo


Trustless and Distributed Decision
and Marine Transportation
Making for Cobots Trustless and
Auditable Consensus-
Enabling Secure Federated Based Validation Auditing and Compliance of
Learning For Cloud Manufacturing Imports and Exports
func( ) Miner func( )
Industry 5.0
Pseudonymity Miner Miner Food and
Privacy-Protected and Tight Access- Resilient Food Supply Chain and
func( )
Shipping
Controlled Data Sharing Resolving Bycatch Issues
func( ) BaaS MaaS
Consensus Blockchain
Public/Private
Algorithm Ecosystem
Mining Pools func( )
Miner Cloud Mining
Decentralized
func( )
Nonrepudiation
Miner func( )

Connected, Privacy-Compliant and Miner Automatic and Transparent


Resilient Public Services and Utilities Immutability Insurance and Claim Management
Miner

Secure and Privacy-Protected Chronological Fast and Secure Cross-Broder


Advanced Health Care and Telesurgery Automation Payments and Remittance
and Append Only
Smart Cities
Finance Trustworthy and Auditable Asset
Decentralized and Privacy-Compliant
Public Data Collection and Access and Fund Management

Automated, Secure, and Decentralized Land Registry


Privacy-Intact Parking System Management System

Provable Product Quality, Green NEWS


Authentic and Provenance-
$ Smart Contract-Based Insurance Transparent and Auditable
Production, and Manufacturing Ensured News Dissemination
Renewal and Claim Settlement E-Voting System

Seamless Integration of Distributed Educational Certificate and Decentralized and Traceable


Secure AI for Accident Avoidance Intelligent Governance
Processes With Access Control Degree Management Social Networking
Circular and Fault Tracing Autonomous
Economy Vehicles
Media and
Trackable Cyclic Processes and Ride Sharing, Energy Trading, and Privacy-Protected and Secure Verified Advertising and Trustless
Advertisement
Sustainable Supply Chain Secure Profiling of Drivers Data Management and Digital ID Trading of Ad Space

Challenges Related To Blockchain


and Smart Contracts Based System

Security
Interoperability of Legal Frameworks
Throughput Storage Vulnerabilities of Selection of Which
Different Blockchain and Standardization
Scalability Scalability Blockchain and Type of Blockchain
Platforms of Blockchains
Smart Contracts

IEEE POTENTIALS September/October 20 2 3 ■ 31


FIG7 Blockchain- and smart contract-enabled existing and futuristic use cases and challenges. AI: artificial intelligence; BaaS: blockchain as a service; ID: identification; Maas: mining as a service.


Continuous growth in the blockchain landscape has directions,” IEEE Access, vol. 10,
pp. 69,160–69,199, Jun. 2022, doi:
proven to be beneficial for many existing use cases 10.1109/ACCESS.2022.3186892.
and applications, such as smart health care, • A. Upadhyay, S. Mukhuty, V.
education, public governance, and banking. Kumar, and Y. Kazancoglu, “Block-
chain technology and the circular
economy: Implications for sustain-
lead the future world of decentral- centralized Bus. Rev., p. 21,260, Oct. ability and social responsibility,”
ization and disintermediation. Its 2008. [Online]. Available: https:// J. Cleaner Prod., vol. 293, Apr. 2021,
salient features are immutability, assets.pubpub.org/d8wct41f/31611 Art. no. 126130, doi: 10.1016/j.jclepro.
disintermediation of third parties, 263538139.pdf 2021.126130.
enhanced security with nonrepu- • G. Hileman and M. Rauchs, • G. d S. R. Rocha, L. de Olivei-
diation, transparency with pseud- “Global cryptocurrency benchmark- ra, and E. Talamini, “Blockchain
onymity, provenance, and audit- ing study,” Cambridge Centre Alter- applications in agribusiness: A sys-
ability (Fig. 7). In recent years, native Finance, vol. 33, pp. 33–113, tematic review,” Future Internet, vol.
blockcha i n ha s been e volv i n g Sep. 2017. 13, no. 4, Apr. 2021, Art. no. 95, doi:
toward an extensive ecosystem. • B. Carson, G. Romanelli, P. 10.3390/fi13040095.
Some of the exciting roles offered Walsh, and A. Zhumaev, “Block- • A. Kalla, C. De Alwis, P. Po-
by such a n ecosystem a re t he chain beyond the hype: What is the rambage, G. Gür, and M. Liyanage,
blockchain infrastructure provid- strategic business value,” McKinsey “A survey on the use of blockchain
er, platform provider (i.e., Block- Company, vol. 1, pp. 1–13, Jun. for future 6G: Technical aspects,
chain as a service), decentralized 2018. [Online]. Available: https:// use cases, challenges and research
application provider, and mining w w w. m c k i n s e y.c o m/~/m e d i a/ directions,” J. Ind. Inf. Integr., vol.
solutions like cloud mining and M c K i n s e y/ B u s i n e s s % 2 0 F u n c - 30, Nov. 2022, Art. no. 100404, doi:
mining as a service. Continuous t i o n s/ M c K i n s e y % 2 0 D i g i t a l / 10.1016/j.jii.2022.100404.
grow th in the blockchain land- Our%20Insights/Blockchain%20 • S. P. Mohanty, V. P. Yanam-
scape has proven to be beneficial beyond%20the%20hype%20 baka, E. Kougianos, and D. Puthal,
for many existing use cases and What%20is%20the%20strategic% “PUFchain: A hardware-assisted
applications, such as smart health 2 0 b u s i n e s s % 2 0 v a l u e/ B l o c k blockchain for sustainable simul-
care, education, public governance, c h a i n - b e y o n d - t h e - h y p e -W h a t taneous device and data security
and banking. Figure 7 provides a -is-the-strategic-business-value.pdf in the internet of everything (IoE),”
panoramic v iew of the ex isting • T. Riasanow, F. Burckhardt, IEEE Consum. Electron. Mag., vol.
real-life use cases and futuristic D. Soto Setzke, M. Böhm, and H. 9, no. 2, pp. 8–16, Mar. 2020, doi:
intriguing applications. Krcmar, “The generic blockchain 10.1109/MCE.2019.2953758.
Nevertheless, as with any other ecosystem and its strategic impli- • S. Khan, W.-K. Lee, and S. O.
evolving technology, blockchain also cations,” 2018. [Online]. Available: Hwang, “AEchain: A lightweight
suffers from various issues. These ht t ps://w w w.resea rchgate.net/ blockchain for IoT applications,”
include low scalability in terms of prof i le/Tobias-R iasa now/publi- IEEE Consum. Electron. Mag., vol.
throughput (transactions per unit cat ion/325677489_T he_Gener ic 11, no. 2, pp. 64–76, Mar. 2022, doi:
time) and storage capacity; the pos- _ Blockcha in _ Ecosystem _ a nd 10.1109/MCE.2021.3060373.
sibility of privacy leakage; the non- _its_Strategic_Implications/​l inks/
existence of legal frameworks and 5b1d66350f7e9b68b42bfd60/The About the author
standard bodies; interoperability -Gener ic-Blockcha in-Ecosystem​ Anshuman Kalla (a nshuma n.
among disparate blockchains; and -and-its-Strategic-Implications.pdf kalla@ieee.org) is a professor in the
vulnerability to security attacks • H. Vranken, “Sustainability of Department of Computer Engineer-
targeting different aspects, like the bitcoin and blockchains,” Current ing, Chhotubhai Gopalbhai Patel
consensus mechanism, P2P net- Opinion Environmental Sustainabil- Institute of Technology, Uka Tarsa-
work, and smart contracts (espe- ity, vol. 28, pp. 1–9, Oct. 2017, doi: dia University, Gujarat 394350,
cially given the rise of quantum 10.1016/j.cosust.2017.04.011. India. He is a Senior Member of
computing). Use case-specific ef- • N. E. Ioini and C. Pahl, “A re- IEEE. For more information, please
forts are required to effectively miti- view of distributed ledger technolo- visit https://sites.google.com/site/
gate these challenges to leverage the gies,” in Proc. OTM Confederated kallanshuman/. 
maximum potential of blockchain Int. Conf. ‘Move Meaningful Internet
technology. Syst.’, Cham: Springer, 2018, pp.
277–288.
Read more about it • A. Verma et al., “Blockchain
• S. Nakamoto, “Bitcoin: A peer- for Industry 5.0: Vision, opportu-
to-peer electronic cash system,” De- nities, key enablers, a nd future

32 ■ S e p t e mber /O ctober 2023 IEEE POTENTIALS


It looks like me,
but it isn’t me
On the societal implications of deepfakes

Jennifer A. Fehring and Tamara Bonaci

D
eepfakes are images or technique that swaps the face,
v ideos generated using speech, or actions (further referred
deep learning technology to as the likeness) of the original
to change the original subject w ith the likeness of
conditions of a piece of another. Popular examples of
media. Potential uses of this deepfakes include a 2019 video
technology range from satirical of P resident Oba ma swea r­
content, depicting public figures i n g during a public ser vice
in comical scenarios; to generat­ announcement, a TikTok ac­­
ing audio to mimic a specific voice; count named deeptomcruise
to inserting the face of an unknow­ with more than 1.7 million
ing indiv idua l into potent ia lly followers created to specifical­
embarrassing content, for example, ly publish deepfake videos,
a pornographic scene. As deepfake and a video of Mark Zuckerberg
technologies, such as autoencod­ announcing the deletion of Face­
er s a nd generative adver sa r ia l book that garnered 72 million
net works (GA Ns), become more v iews. The ter m deepfake first
advanced and accessible, deepfakes appeared in 2017, when a Reddit
become easier to create and more user named deepfakes began
believable. This poses some serious publishing content to the
threats to individual and institu­ site depicting unknowing
tional safety, as scenes can be celebr it ies in por no­
modified to alter public per­ graphic movies using
ception. Although technol­ a machine learning
ogy to identify deepfakes algorithm they had
does exist, it is essential c r e ate d ( ht t p s://
that these methods pro­­ w w w.b b c .c o.u k/
gress as rapidly as bitesize/articles/
deepfake technology z f k wc qt). O t her
so that they remain potent ia lly ha r m­
accurate. Additional­ ful deepfake content
ly, legal consequenc­ includes hoaxes, fake
es for deepfakes are news, and financial fraud.
limited, so continued ©SHUTTERSTOCK.COM/RROSELAVY As a r e su lt , i nc r e a si n g
advocacy for increased attention in general media
protection against false content Introduction forensics has been dedicated to
is crucial. detecting facial manipulation in
What are deepfakes? images and videos. Deepfake detec­
The term deepfake refers to an t ion is becom i ng i ncreasi ng ly
Digital Object Identifier 10.1109/MPOT.2022.3229823
image or an audio or a video signal important as deepfakes become eas­
Date of current version: 6 September 2023 generated by a deep learning-based ier to create and more believable.


0278-6648/23©2023IEEE IEEE POTENTIALS September/October 20 2 3 ■ 33
Although technology to identify deepfakes does Sebastien, 2020). These same vid­
eos were also evaluated for fakeness
exist, it is essential that these methods progress using two different state-of-the-art
as rapidly as deepfake technology so that they deepfake-detection algorithms based
remain accurate. on the Xception (https://keras.io/
api/applications/xception/) a nd
EfficientNet (https://ai.googleblog.
Deepfake accessibility decade. Where once it was neces­ com/2019/05/efficientnet-improv­
In years prior, creating content sary to possess a highly specialized ing-accuracy-a nd.html) models,
that believably replaced features set of technological skills, signifi­ which were pretrained separately
or components of a n image or cant financial resources, and spe­ on Google and Celeb-DF (https://
video with other features was pos­ cialized hardware and software, it github.com/yuezunli/celeb-deep­
sible, but it was labor intensive, is now possible for an unskilled in­ fakeforensics) deepfake databases.
and it re­­quired special resources. dividual to create deepfakes on de­ When presented with high-quality
Computer-­generated imagery (CGI) vices as basic as a cellphone, using deepfakes, 75.5% of participants
has seen great use in media and apps like FakeApp and Zao, with as were confused and could not con­
dates back as far as the 1960s. little source material as a few self­ fidently determine whether the
One of the first publicly available ies in different head positions and video was fake or real. Obviously
examples of CGI used in popular facial expressions. (FakeApp “is a fake deepfakes proved easy for par­
me d i a w a s a 49 - s a n i m at ion program that lets you create masks ticipants to detect; however, as the
c a l led Rendering of a Planned capable of swapping faces on videos deepfake quality increased, partici­
Highway, wherein a car was dis­ by means of the artificial intelligence pants were more likely to incorrect­
played t ravel i ng up a pla n ned developed by a Reddit user.” It can be ly assess the video as real, even in
highway at 110 km/h, created by accessed using the following link: situations where they felt certain of
t he Swedish Roya l Inst itute of https://www.malavida.com/en/soft/ their decision.
Technology on the BESK comput­ fakeapp/. Zao “is a free deepfake It is notable that these partici­
er. This animation was broadcast face-swapping app that lets you re­ pants were primed to be looking for
on national television on 9 Novem­ place the face of popular characters fakes, and, even then, only 24.5%
ber 1961 (Du Rietz, 2016). in a video clip of a scene with your of participants were able to confi­
Since then, CGI has made ap­ own face.” It can be accessed us­ dently identify high-quality deep­
pearances in many feature films, ing the following link: https://zao. fakes as fake. In this study, the two
­including Avatar, which was the first en.softonic.com/android.) algorithms tested were not as accu­
full-length movie made using perfor­ This type of accessibility will, no rate in assessing deepfakes as fake
mance capture to create photorealis­ doubt, lead to a rise in deepfake cre­ when compared to human subjects;
tic characters and worlds. Work for ation and distribution, as more and however, the algorithms were better
Avatar started in 2006, and the film more people gain access to easy and at identifying fake videos that hu­
was released in 2009; during this pe­ believable deepfake generators. This mans had confidently assessed as
riod, replacing real-life scenes with problem is only amplified by the rise being real.
nonoriginal content was extremely of social media, which makes the In reality, most people are not on
labor intensive. Nine hundred people dissemination of fake content easier the lookout for fake videos and may
were employed to work on the film; than it has ever been. be even more susceptible to believ­
Microsoft created a new cloud com­ ing fake content. In recent years,
puting and digital asset manage­ Deepfake believability humans have become more appre­
ment system called Gaia to permit Currently, there exists limited re­­ hensive of photos, as photo editing
the crew to keep track of and coordi­ search on the believability of deep­ has become the norm, and humans
nate all stages of digital processing. fakes, especially the believability of are more wary of trusting photo­
A 10,000-ft2 server farm with 35,000 earlier deepfakes from the late graphs. Despite this increasing dis­
processor cores, and 3 PB of network 2010s, making it difficult to quanti­ trust, overall, people do still place a
area storage was used to render the fy how believability has increased. great deal of trust in photographic
data; this was considered one of the However, a recent studies have evidence and even more trust in
top 500 supercomputers in the world sought to determine how easy or videos displaying known faces and
at the time. difficult it is to detect deepfakes. voices. As deepfakes become more
Although a short deepfake may One 2020 study asked 60 par­ believable and humans continue to
not require the same amount of at­ ticipants to subjectively ­ e valuate place trust in content that they can
tention and detail as a full-feature videos from a pool of 120 videos see, hear, and easily associate with
film like Avatar, technology for cre­ that ranged from being a clear fake known figures, deepfakes promise to
ating fake but believable content has to having a fakeness that was very be a great source of misinformation.
progressed very rapidly in the past difficult to discern (Korshunovf and This has had and will continue to

34 ■ S e p t e mber /O ctober 2023 IEEE POTENTIALS


have serious ramifications for indi­ Deep learning is a branch of machine learning that
vidual safety and public perceptions.
focuses on deep neural networks—a computational
How are deepfakes made? counterpart of the network of neurons used
The term deepfakes derives from the to deliver and decipher information in the
technique employed to create them:
deep learning. Deep learning is a human brain.
branch of machine learning that
focuses on deep neural networks—a space of measurements requires a range of lip, jaw, and head move­
computational counterpart of the tiny fraction of the memory needed ments corresponding to the sounds
network of neurons used to deliver to store the original input image. made to generate words. A GAN
and decipher information in the From this latent space, a reconstruc­ takes original footage to train both
human brain. A neural network in tion is generated through the de­ models and sets up a competition
computer science uses nodes coder. If a network can generalize a between the two neural networks
instead of neurons, and each node face well enough, the face from one wherein each improves based on the
shares specific connections to thou­ network can pass a latent face to the output of the other. Continuous im­­
sands of other nodes. Typically, they decoder of another network, result­ provement to GANs has resulted in
are arranged in layers, and the way ing in the replacement of the second gradually more impressive feats,
in which the nodes are connected network’s face with the features and such as videos synthesized that real­
determines the type of network it is expressions of the face from the first istically depict humans speaking,
and its ultimate ability to perform (Zucconi, 2019). software that enables anyone with a
certain tasks. When the input or webcam to generate replicas of other
output of a neural network is an GANs people’s facial expressions, and “self-
image, typically, three nodes will Another popular and effective means re-enactment” videos ­ r ending a
exist for each pixel, each containing of creating deepfakes arises from speaker’s facial expressions in real
information on the amount of color GA Ns (Goodfellow et al., 2020), time (Rana and Sung, 2020).
(typically, the amount of red, blue, or which consist of two neural net­ The recent rise in deepfake qual­
green colors) contained in that pixel. works, one used to generate data ity and prevalence can be attributed
and the other used to distinguish to two factors: 1) publicly acces­
Autoencoders fake data from real data, thereby sible large-scale data sets, providing
An autoencoder is a special type of making it adversarial in nature. In source material from which deep­
neural network that aims to create video footage of humans speaking, fake algorithms can be trained, and
an output image matching the the subject will make a predictable 2) the continued advancement of deep
input. To avoid simply matching an
input node to an output node, which
would imply there has been no Input Data Encoded Data Reconstructed Data
learning, the autoencoder com­
presses image information prior to
reconstruction. Ultimately, this will
result in loss of some finer details in
the output. The recreation of an
image using an autoencoder occurs
in three steps: the 1) encoding
step, 2) latent space step, and
3) decoding step (Fig. 1). In the
encoding step, an image is taken in
with many thousands of pixels, and
they are compressed to a much
smaller measurement space (e.g.,
300 measurements), w ith each
relating to a particular facial char­
acteristic. This compressed version
of the original image is considered
an information bottleneck.
Encoder Latent Decoder
All possible combinations of mea­
Space
surements of facial characteristics
occupy space known as latent space. FIG1 An autoencoder takes in an input layer, which is compressed before the data are
Latent space consisting of a smaller decoded, to generate a reconstructed image.


IEEE POTENTIALS September/October 20 2 3 ■ 35
Public trust in the news across the world is imagery of themselves could be put
into the same situation. Deepfakes
declining, and the continued distribution of fake of nonconsenting individuals could
news via deepfakes may potentially lead to greater also be used as a means of coercion,
public distrust. intimidation, or defamation. Legal
action against deepfake porn has
been taken in some states, such as
learning techniques, such as auto­ anyone poses a significant threat to Virginia, which has prohibited ha­
encoders and GANs, that have made individual and societal security and rassment via the sharing of sexual
deepfakes easier to create through privacy. One extremely troubling images (Brown, 2019); however, this
the elimination of many manual ed­ fact about deepfakes is that most does not protect against all fake con­
iting steps (Ajder et al., 2019). Huge tend to be pornographic in nature. tent, and Virginia is one of very few
amounts of publicly available foot­ According to a study in 2019 that states to enact such laws.
age of actors, politicians, and public assessed the content of 14,678 Additional concerns regarding
figures provide ample data for these deepfake videos available on the the potentially negative effects of
models to work from and generate Internet, 96% of those were porno­ deepfakes arise in the form of fake
high-quality deepfakes. Additional graphic (Ajder et al., 2019). Of the news and public deception. Public
work in artificial intelligence can be 96% of deepfakes available depict­ trust in the news across the world
used to synthesize high-quality audio, ing nonconsenting individuals in is declining, and the continued dis­
mimicking the sound of human voices, pornographic situations, 90% of tribution of fake news via deepfakes
which, when paired with video results, those individuals were women. may potentially lead to greater pub­
has the potential to create highly be­ The potential for harm in this lic distrust. As false news is shared
lievable clips of anyone who has pub­ scenario is obvious and can be at an alarming rate online, a shared
lished a significant amount of publicly evidenced by the struggles of one
­ mentality that anything is accept­
available content. This rapidly evolving then-18-year-old woman, who was able online has become increasingly
technology has led to a variety of pos­ nonconsensually placed into hun­ prevalent, and people have become
sible photo and video manipulations. dreds of explicit images and videos of wary enough of news online that
a porn actress (Melville, 2019). This they have started to avoid it alto­
Societal and individual type of content being publicly avail­ gether to avoid uncertainty.
threats of deepfakes able has put her reputation, career, However, uncertainty does not
For many reasons, fake and believ­ and personal safety at risk, and any­ necessarily imply distrust, and many
able content that can be created by one with enough publicly available have argued that some skepticism
when it comes to news may reduce
susceptibility to misinformation. One
TABLE 1. Harmful uses for deepfakes and their impact at the
societal, organizational, and individual levels. study from 2020 sought to examine
whether a group of individuals would
POTENTIAL AREAS OF IMPACT express greater distrust in news
REPUTATIONAL FINANCIAL shared on social media after expo­
LEVEL DAMAGE ­REPERCUSSIONS MANIPULATION sure to a deepfake news clip when
compared to a group not exposed
Individuals • Defamation • Phishing-style • Targeted attacks to a deepfake. It was found that the
• Intimidation scams against politicians
deepfake group did exhibit signifi­
• Abuse • Extortion
cantly more distrust in news on so­
• Identity theft
cial media (Vaccari and Chadwick,
Organizations • Deteriorate trust • Insurance fraud • Fake educational
2020). If the public begins to feel they
• Damage brand • Stock-price materials
cannot trust the news, it will become
manipulation • Media
manipulation
increasingly difficult to acquire what
• Political attacks is considered real and meaningful
against a party or information on political and social
interest group events, leading to a poorly informed
• Fabricated court public. Other harmful uses for deep­
evidence fakes and their impact on society are
Society • Potential for electoral manipulation/influence on political party listed in Table 1.
impressions by domestic or foreign bodies
• Deterioration of public trust in media and/or societal cohesion Benefits of deepfakes
and norms While there clearly are many mali­
• Deliberate fear mongering, inciting public tension/panic/­ cious uses for deepfakes, they do
conflict
not come without some benefits.

36 ■ S e p t e mber /O ctober 2023 IEEE POTENTIALS


Medically, deepfakes have been Although deepfakes do come with various risks, the
recognized as an up-and-coming
technology with a high therapeutic technology already exists and is publicly available,
a nd biomed ic a l i mpact. S ome and it offers some serious benefits to society.
examples include (Jaiman, 2020)
the following:
■■Canetroller, a haptic cane con­ Deepfake detection many U.S. states and under many
troller that assists the visually As previously discussed, high-quality conditions, there currently exist no
impaired by simulating cane deepfakes can easily deceive the legal consequences for the creation
interactions in a virtual environ­ naked eye (Korshunovf and Sebas­ a nd dist r ibut ion of deepfa kes.
ment tien, 2020). As such, effort has been Social media only amplifies this
■■generating an individual’s vocal dedicated both to developing algo­ problem. As it stands, platforms,
likeness for individuals who have rithms to detect deepfakes and to such as Facebook and YouTube, are
lost their ability to speak, such increasing the availability of datasets not held liable for the content on
as those afflicted with amyo­ to researchers, so as to assist in cre­ their sites, including deepfakes.
trophic lateral sclerosis ating these mechanisms. This issue has been of great recent
■■simulations for those who are too The FaceForensics++ dataset, interest, as currently existing legis­
ill to leave their bed or home partly developed by Google, contains lation dictates that institutions,
■■technologies such as VOCALiD, real and deepfake datasets to aid re­ such as bookstores, that knowingly
which can be used to generate searchers, and it is one of the stan­ distribute books containing libelous
text to voice for those with dard datasets in the development of content but fail to act can be held
speech and hearing difficulties. deepfake-detection mechanisms. legally responsible, but distributor
These are all in addition to the Current approaches to deepfake liability for technology platforms
various uses that deepfakes have detection can broadly be categorized does not apply. To make matters
in media and art, such as im­ as 1) deep learning-based approach­ worse, the creation and distribution
provements to computer-generated es and 2) analytical approaches. of deepfakes is currently only
scenes in film, reaching a broader Facebook recently launched legally prohibited under
audience by placing different people a deepfake-detection chal­ specific circumstances,
in various scenes in video clips, lenge with prize money such as nonconsensual
creating deepfakes for humorous of US$1 million to en­ pornography, and in
or satirical purposes, and various courage research in the certain states, includ­
art installments (Jaiman, 2020). Al­ field. Despite these ef­ ing Virginia, Texas,
though deepfakes do come with var­ forts, generally, deep­ California, and New
ious risks, the technology already fake-detection methods York (Brown, 2019).
exists and is publicly available, and achieve high accuracy de­ Ta ken toget her, t h is
it offers some serious benefits to so­ tecting deepfakes in a single information is extremely
ciety. To fully take advantage of this dataset but show significantly concerning, as there exists
rapidly evolving technology, it is es­ lower accuracy on deepfakes utilizing potential for anyone to create deep­
sential that we learn to live safely newer methods not introduced dur­ fakes of another individual without
with deepfakes. ing the training phase (Shahroz et al., their consent and distribute deep­
2021). While existing algorithms are fake content on technology plat­
Managing the risks not perfect at detecting deepfakes, forms that do not face any legal
of deepfakes a study from April 2021 was able to consequences for permitting such
Given t he ser ious de s t r uc t i v e achieve 93.86% accuracy at detect­ material. Some additional measures
potential of deepfakes, measures ing deepfakes on a set of videos from are currently being taken by the
should be—and have been—taken which the model was not trained U.S. government in the form of
to mitigate the risks associated (Shahroz et al., 2021). With contin­ advancing legislation to create a
with them. Significant effort has ued improvements in technology like task force to identify fake content
been dedicated to designing algo­ this, it will be possible to detect deep­ and verify its origins called the
rithms with the capability to detect fakes with greater confidence. It is, Deepfake Task Force Act (Portman,
deepfakes. Additionally, legal mea­ however, important that deepfake de­ 2021). Hopefully, as public aware­
sures have been taken to protect tectors evolve with the newly emerg­ ness of this issue grows, people
people from the harm of deepfakes. ing methods of creating deepfakes. w ill become more war y of what
To combat the various negative they trust online, verify the origins
consequences, a proactive legal and Advocating for increased of online content, and advocate
computational approach to detect­ legal measures for increased legal measures to
ing and exposing deepfakes should One of the potentially most frighten­ protect against deepfake creation
be employed. ing aspects of deepfakes is that, in and distribution.


IEEE POTENTIALS September/October 20 2 3 ■ 37
To combat the various negative consequences, a 2020, Art. no. 2056305120903408,
doi: 10.1177/2056305120903408.
proactive legal and computational approach • A. Jaiman, “Positive use cases
to detecting and exposing deepfakes of synthetic media (aka deepfakes),”
should be employed. Medium, Aug. 2020. [Online]. Avail­
able: https://towardsdatascience.
com/positive-use-cases-of-deep­
Conclusion • P. Korshunovf and M. Sebastien, fakes-49f510056387#:~:text=A I%
Deepfakes pose a serious threat to “Deepfake detection: Humans vs. ma­ 2DGenerated ​ % 20 Sy nt het ic%20
individual safety, public opinion, chines,” 2020, arXiv:2009.03155. Media%2C%20a ka,cr imina l%20
and political attitudes. A relatively • A. Zucconi. (2019). An introduc­ forensics%2C%20and%20artistic
nascent technology, deepfakes only tion to neural networks and autoen­ %20expression
first appeared in 2017 on the plat­ coders. [Online]. Available: https:// • S. Tariq, S. Lee, and S. Woo,
form Reddit, and, since then, this www.alanzucconi.com/2018/03/14/ “One detector to rule them all:
technology has rapidly advanced, an-introduction-to-autoencoders/ Towards a general deepfake attack
leading to more realistic deepfakes • I. Goodfellow et al., “Genera­ detection framework,” in Proc. Web
and more accessible means to cre­ tive adversarial networks,” Commun. Conf., Apr. 2021, pp. 3625–3637,
ate them. Through the use of pub­ ACM, vol. 63, no. 11, pp. 139–144, doi: 10.1145/3442381.3449809.
licly available algorithmic strate­ Nov. 2020, doi: 10.1145/3422622. • R . P o r t m a n . 117 t h C O N ­
gies, such as autoencoders and • M. S. Rana and A. H. Sung, GR ESS (2021-2022). (2021, Aug.
GA Ns, deepfake technology has “DeepfakeStack: A deep ensemble- 4 ). S.2559 - Deepfake Task Force
progressed at staggering rates, and based learning technique for deep­ Act. Congress.gov. [Online]. Avail­
t hese te ch nolog ies h ave be en fake detection,” in Proc. 7th IEEE Int. able: https://w w w.congress.gov/
employed in various deepfake gen­ Conf. Cyber Secur. Cloud Comput. bill/117th-congress/senate-bill/
erators. Wit h t h is tech nolog y, (CSCloud)/6th IEEE Int. Conf. Edge 2559?q=%7B%22search%22%3A
unknowing victims can be depicted Comput. Scalable Cloud (EdgeCom), %5B%22S.2559%22%5D%7D&s=1
in potentially harmful situations, 2020, pp. 70–75, doi: 10.1109/­CSC &r=1
such as pornography; politicians loud-EdgeCom49738.2020.00021.
can be made to appear in scenes or • H. Ajder, G. Patrini, F. Cavalli, About the authors
saying things that will have serious and L. Cullen, The State of Deep- Jennifer A. Fehring ( j.fehring@
consequences for the society at fakes: Landscape, Threats, and Im- northeastern.edu) earned her B.S.
large; and fake news can be created pact, vol. 27. Amsterdam, The Neth­ degree from Carleton College in
and distributed to sway the public. erlands: Deeptrace, Sep. 2019. Northfield Minnesota. She is cur­
Conversely, various benefits arise • K . Melv i l le, “ T he i nsidious rently a master’s degree student at
from deepfake technology, such as rise of deepfake porn videos and Khoury College of Computer Scienc­
advances in art, film, and medi­ one woman who won’t be silenced,” es, Northeastern University, Boston,
cine. Overall, we should strive to ABC News Aust., Aug. 2019. [On­ MA USA. Her research interests are
maximize the benefits and mini­ line]. Available: https://www.abc. primarily in privacy and security.
mize the harm posed by deepfakes net.au/news/2019-08-30/deepfake Tamara Bonaci (t.bonaci@
by taking a proactive approach to -revenge-porn-noelle-martin-story northeastern.edu) earned her B.S.
identifying false content, verifying -of-image-based-abuse/11437774 degree from the University of Zagreb
the origins of online information, • N. I. Brow n, “Congress wants and her M.S. and Ph.D. degrees
and advocating for increased legal to solve deepfakes by 2020. That from the University of Washington.
measures to hold individuals and should worry us,” Slate Mag., Jul. She is an assistant teaching profes­
platforms accountable for the cre­ 2019. Accessed: Oct. 16, 2019. sor at Khoury College of Computer
ation and distribution of harmful [Online]. Available: https://slate. Sciences, Northeastern University,
deepfake content. com/technology/2019/07/congress Boston, MA USA, and an affiliate
-deepfa ke-regulat ion-230-2020. assistant professor in the Depart­
Read more about it html ment of Electrical and Computer
• P. D. Rietz, “Svensk datorhisto­ • C. Vaccari and A. Chadwick, Engineering, University of Washing­
ria – 1960-talet,” Tekniska museet, “Deepfakes and disinformation: ton, Seattle, WA, USA. Her research
Stockholm, Sweden, Dec. 2016. [On­ Exploring the impact of synthetic interests include security, privacy,
line]. Available: https://www.teknis­ political video on deception, uncer­ and the societal impact of emerging
kamuseet.se/lar-dig-mer/datorhisto­ tainty, and trust in news,” Social technologies, with a special interest
ria/svensk-datorhistoria-1960-talet/ Media Soc., vol. 6, no. 1, Jan./Mar. in biomedical technologies.

38 ■ S e p t e mber /O ctober 2023 IEEE POTENTIALS


Protect your user!

Raymond E. Floyd

I
n t he electronic environ- interesting challenge to the devel-
ment of today, the sophis- opers of the many software
tication of a user can- applications offered to the
not be anticipated to user community today.
be at any particu- For example, the owner
lar advanced level. As of a Brand X smartphone
a m at t er of f act , wishes to change some-
users ra nge from one’s home telephone
f i r st g r ader s, t o number but not the
i nd i v idua ls w it h mobile number in the
adva nced k nowl- contact list. Selecting
edge, to elders with the CONTACT icon
little or no technical brings the user to the
background. As a contact list. He or she
result, a much great- then pages to the par-
er burden is placed on ticular person’s number
software developers to to be changed. Selecting
ensure the product they that picture, or icon, pres-
release operates correctly ents the user with a page of
under any conceivable key contact information, including
entry from a user. Anything less the home and mobile telephone
can be a disaster for a product, or numbers as well as email and mail-
©SHUTTERSTOCK.COM/OLEKSANDRSHNURYK
set of products, due to customer ing addresses.
dissatisfaction and complaints. At the top of the display, the
Whether one is wandering a they need and ignore all of the oth- user can see two options: EDIT and
street in a city, sitting and enjoy- er things their device is capable of. MORE. From the user’s perspec-
ing a meal in a restaurant, or walk- In that respect, they don’t know if tive, neither fits—he or she wants to
ing the halls of a high school or their device performs correctly or CHANGE the home phone number.
college, there will be people intent not, as long as what they wish to do If the user selects EDIT, the screen
on some subject matter on their is done properly. looks the same, except now there is
smartphones, iPads, or other mod- the option to EXIT or SAVE, but the
ern devices. In many cases, they are The user’s perspective user hasn’t done anything. He or
oblivious to the world around them. B e yond t h at v a st nu mb er of she then selects the GO BACK but-
While the majority of these indi- advanced users is an equally large ton, returning to the first screen.
viduals understand the technology group of those who may have little or Now, the user taps MORE and
they are using, at the user level, it no technical knowledge. They are not arrives at a set of options ranging
is doubtful that their knowledge sophisticated to the point that they from DELETE to ???. He or she may
goes much deeper. They use what can use current products as their reason that the number must be
predecessors did, e.g., the dial tele- deleted before it can be changed.
Digital Object Identifier 10.1109/MPOT.2019.2910303
phone versus the smartphone. This Unfortunately, if the user selects
Date of current version: 6 September 2023 lack of understanding presents an DELETE, he or she is on the verge


0278-6648/23©2023IEEE IEEE POTENTIALS September/October 20 2 3 ■ 39
of deleting the contact. Even the application could output a message The success or acceptance of a
warning message “Do you want to similar to this: particular application depends heav-
delete this contact?” may not reg- ily on the knowledge and skills of the
ister with the user. If the user does E nt e r t e mp e r at u r e t o b e developer. While many developers get
choose the DELETE option, he or converted: wrapped up in the nuances and ele-
she now finds that the process of gance of an application, the develop-
entering that contact needs to be Does the developer expect a scale er who will most often be successful
restarted, hopefully with the new identifier (“F,” “C,” “K,” or “R”), or is is the one who can take a step back
telephone number as well as all the user to input the value to be and view the product from the user’s
of the other information that had converted? It would be better to out- perspective. That does not limit the
been included. put a message such as this: developer to elegant solutions, as
Of course, the developer may say long as he or she remembers that the
that the user should have read the Enter temperature scale being user does not see the elegance, only
manual before attempting this ac- converted from: the results. Testing new products for
tion. The Brand X manual is about the complete and proper operation
300 pages in length and written to a Of course, then the user may input can be time-consuming and boring,
high school graduate level of under- “F,” “C,” “K,” or “R,” or he or she but, when it is done completely and
standing and language—not a par- might enter “f,” “c,” “k,” or “r,” not correctly, the user benefits from a
ticularly good combination for the knowing the developer is expecting truly operational application and the
casual user. uppercase letters, not lowercase— developer from a successful product.
Perhaps the most fundamental and the program does not function
problem rests with the developer, who as expected. Either the message to About the author
understands what he or she is trying the user must be explicit, or the Raymond E. Floyd (r.f loyd@ieee
to do and the method programmed program should be flexible enough .org) earned his B.S.E.E. degree
to achieve a particular goal. Unfortu- to accept either (and ignore any from the Florida Institute of Tech-
nately, users most often will not have other entry from the user). nology, Melbourne, Florida, USA, in
that level of understanding—they If the developer does not under- 1970; his M.S.E.E. degree from
bring only an anticipation of suc- stand the relationships between the Florida Atlantic University, Boca
cess in using the particular tech- various scales, this could also pro- Raton, Florida, USA, in 1977; and
nology. There is also some level of duce invalid results. For example, his Ph.D. degree in engineering man-
confidence that all possible entries when converting from °F to K, the agement from California Coast Uni-
have been tested during the devel- formula is given as versity, Santa Ana, California, USA,
opment phase of the product, and, in 2009. He spent 26 years with IBM,
K = cF + 459.67.
therefore, the product cannot per- Armonk, New York, USA, retiring in
form incorrectly. That is an assump- If a user were to enter –460 °F, the 1992 as a senior engineer. He was
tion for most products, which is more result might be displayed as programmer for more than 40 years,
often not true. It is a difficult task to programming in a wide variety of
cK = - 0.33.
ensure that “every possible” selection languages. He was an adjunct pro-
has been tested. Even when the nor- Such a result provides two incorrect fessor for three years at Florida
mal developer testing has been com- identities. First, since the late 1960s, Atlantic University and was a visit-
pleted and some user testing done, the Kelvin temperature has been ing lecturer at Northwest College in
there will be various combinations of designated as an absolute number, Powell, Wyoming, 82435, USA. He
inputs that have not been included not degrees. The answer should was a Life Senior Member of IEEE,
but will often happen in the world of appear as life senior member of the Society
the using community. of Manufacturing Engineers, and
K = - 0.33.
member of the Society of Petroleum
The developer’s knowledge The second problem is that the Kelvin Engineers and the American Soci-
A second cha llenge, less often scale is also known as absolute zero; ety for Engineering Education. He
encountered, is a lack of under- therefore, K may never be a negative most recently coauthored a text,
standing on the part of the develop- number (at least in current physics Perspectives on Engineering (2011);
er regarding the problem being definitions). This is something the an IEEE e-book, Shaping an Engi-
solved. A simple example is in the developer must know and guard neering Career: Book 2: Dual Career
conversion of temperatures from against, outputting a message to the Ladders (2013); and another text,
one scale to another, say degrees user that the temperature entered in So You Want To Be an Engineer?
Celsius (°C) to degrees Fahrenheit °F is not valid and cannot be lower (2015). He passed away in May,
(°F) or °F to kelvin (K). [Typically, than –459.67 (K = 0). As an aside, the 2023, after a lifetime of contribu-
temperatures will be in °F, °C, K, or Rankin scale also has this same lower tions to the field.
degrees Rankin (°R)]. A typical limit but is expressed in degrees. 

40 ■ S e p t e mber /O ctober 2023 IEEE POTENTIALS


One of the most influential
reference resources for
engineers around the world.
For over 100 years, Proceedings of the IEEE has been the leading journal for engineers
looking for in-depth tutorial, survey, and review coverage of the technical developments
that shape our world. Offering practical, fully referenced articles, Proceedings of the IEEE
serves as a bridge to help readers understand important technologies in the areas of
electrical engineering and computer science.

To learn more and start your subscription today, visit


ieee.org/proceedings-subscribe
LIVE
LIFE ON
YOUR
TERMS.
INSURANCE
THAT FITS
YOU.
Group Term Life Insurance
engineered for you.

1-800-493-IEEE (4333)
To learn more*, visit IEEEinsurance.com/10Year LIFE INSURANCE

*For information on features, costs, eligibility, renewability, limitations and exclusions.


Group Term Life Insurance is available only for residents of the U.S. (except territories), Puerto Rico and Canada (except Quebec). This is
underwritten by New York Life Insurance Company, 51 Madison Ave., New York, NY 10010 on Policy Form GMR. AMBA does not act as broker
with respect to Canadian residents and acts solely as an Administrator on behalf of New York Life.
Association Member Benefits Advisors, LLC.
In CA d/b/a Association Member Benefits & Insurance Agency
CA License #0I96562 • AR License #100114462
Program Administered by AMBA Administrators, Inc.
100585 (9/23) Copyright 2023 AMBA. All rights reserved

100585 (9/23) IEEE TL ad


Size: 7.875 x 10.5
Prints: 4/C Bleeds: Yes

You might also like