Professional Documents
Culture Documents
POT SeptOct2023
POT SeptOct2023
POT SeptOct2023
Preprint Research
with the World!
BENEFITS:
• Rapidly disseminate your research findings
Follow @TechRxiv_org
Learn more techrxiv.org Powered by IEEE
THE MAGAZINE FOR HIGH-TECH INNOVATORS
September/October 2023
Vol. 42 No. 5
10
Beyond the classroom: Open Project Space
at the University of California, Irvine
Lily Johnson and Alexandra Zhang Jiang
13
Low-cost software-defined radio
for electrical engineering education
Samer Baher Safa Hanbali
ON THE COVER:
In this 40th Anniversary issue, we go
FEATURES DEPARTMENTS
& COLUMNS
23
Blockchain perspectives, mining, and types:
An introductory tutorial 4 Editorial
Anshuman Kalla 7 Obituary
8 IEEE student activities
33
It looks like me, but it isn’t me:
On the societal implications of deepfakes
Jennifer A. Fehring and Tamara Bonaci
MISSION STATEMENT: IEEE Potentials
is the magazine dedicated to undergraduate
39
Protect your user! and graduate students and young profes-
sionals. IEEE Potentials explores career
Raymond E. Floyd strategies, the latest in research, and impor-
tant technical developments. Through its
articles, it also relates theories to practical
applications, highlights technology’s global
impact, and generates international forums
that foster the sharing of diverse ideas about
the profession.
WWW.FACEBOOK.COM/IEEE.POTENTIALS
@IEEE.POTENTIALS
@IEEEPOTENTIALS
WWW.LINKEDIN.COM/COMPANY/IEEE-POTENTIALS/ https://students.ieee.org/potentials-magazine/
Digital Object Identifier 10.1109/MPOT.2023.3302038 I E E E P O T E N T I A LS September/October 20 2 3 ■ 1
IEEE POTENTIALS—THE MAGAZINE FOR HIGH-TECH INNOVATORS
Mary Ellen Randall, Director and Treasurer IEEE MEMBER & GEOGRAPHIC Amardeep Kaur, Region 5
EDITORIAL BOARD Rabab Ward, Director and Vice ACTIVITIES BOARD kaur.amardeep@ieee.org
Editor-in-Chief President, Educational Activities Jill Gostin, Vice President TBD, Region 6
Dario Schor, Magellan Aerospace, Jill I. Gostin, Director and Vice David Alan Koehler, Past Chair Saida Maaroufi, Region 7
Canada President, Member and Geographic Gerardo Barbosa, Treasurer Simay Akar, Region 8
Activities Cecelia Jankowski, Secretary simay@ieee.org
Student Editor Sergio Benedetto, Director and Vice Magdalena Salazar-Palma, Geographic Christian Figueroa, Region 9
Erivelton Nepomuceno, Maynooth President, Publication Services Unit Operations christian.a.f@ieee.org
University, Ireland and Products Adriaan van Wijngaarden, Information Jennifer Chua Dela Cruz, Region 10
Yu Yuan, Director and Vice President, Management
Associate Editors jennycdc69@gmail.com
Standards Association Mini Thomas, Member Development
Shaikh Fattah, BUET, Bangladesh John P. Verboncoeur, Director and Vice Imre Rudas, Member-at-Large Regional Student
Thanos Kakarountas, University of President, Technical Activities Murty Polavarapu, Member-at-Large Representatives
Thessaly, Greece Eduardo F. Palacio, Director and President TBD, Region 1
Mohammad Faizal Ahmad Fauzi, IEEE-USA
Multimedia University, Malaysia
ADVISORY COMMITTEE Catherine Gao, Region 2
Division Directors Dario Schor, Chair (Potentials EIC) catherinegao@ieee.org
Prashant Nair, Amrita Vishwa Franco Maloberti (I) David Koehler (MGA Past Chair) Jemima Lin, Region 3
Vidyapeetham, India Kevin L. Peterson (II) Ruben Barrera-Michel (SAC Chair) jlin972@students.bju.edu
John Benedict, Amazon, India Khaled Ben Letaief (III) Cecelia Jankowski (MGA Managing Steven Messing, Region 4
Stamatis Dragoumanos, Freelance Alistair P. Duffy (IV) Director) smessing10@gmail.com
Software Engineer, Greece Cecilia Metra (V) Amardeep Kaur, Region 5
Kamal Al-Haddad (VI)
Corresponding Editors Claudio Cañizares (VII)
MGA STUDENT ACTIVITIES kaur.amardeep@ieee.org
Syrine Ferjaoui, EURA NOVA, Tunisia Leila De Floriani (VIII) COMMITTEE TBD, Region 6
Raymond E. Floyd, IEEE Life Senior Ali H. Sayed (IX) Ruben Barrera-Michel, Chair Azfar Adib, Region 7
Member, USA Stephanie M. White (X) rub_barrera@ieee.org azfaradib@ieee.org
Greg Linton, RCAF W/C William G. Theodore W. Hissey (Director Emeritus) Prasanth Mohan, Vice Chair Theodoros Chatzinikolau, Region 8
Barker VC Aerospace College, Canada prasanthemy@ieee.org theodoros.chatzinikolaou@ieee.org
Region Directors Simay Akar, Vice Chair
Michael Salem, University of Catalina Yvonne Pezo Vergara, Region 9
Greg T Gdowski, Region 1 simayakr@gmail.com
Balamand, Lebanon cpezov@ieee.org
Andrew D. Lowery, Region 2 Hossam Ali, Past Chair
Theresa A. Brunasso, Region 3 Warunika Hippola, Region 10
eg.hossam.ali@ieeee.org warunika3thousand@gmail.com
IEEE PERIODICALS Vickie A. Ozburn, Region 4 Vacant, Branch Chapter Representative
MAGAZINES DEPARTMENT Bob G. Becnel, Region 5 Saaveethya Sivakumar,
445 Hoes Lane, Kathy Hayashi, Region 6 Branch Chapter Student Representative, MEMBER & GEOGRAPHIC
Piscataway, NJ 08854 USA Robert L. Anderson, Region 7 saaveethya@gmail.com ACTIVITIES DEPARTMENT
AndreAnna McLean, Managing Editor II Vincenzo Piuri, Region 8 Aristotelis Farmakis, Young Professionals Cecelia Jankowski, Managing Director
Katie Sullivan, Senior Manager, Enrique A. Tejera, Region 9 Representative, Michael Kreisberg, Senior Director,
Journals Production ChunChe (Lance) Fung, Region 10 Member Experience
aristotelis.farmakis.gr@ieee.org
Jeffrey Cichocki, Associate Director, Dario Schor, Potentials EIC John Day, Director, Member Products
Editorial Services HEADQUARTERS STAFF schor@ieee.org and Programs
Janet Dudar, Senior Art Director Stephen Welby, Executive Director and COO Erivelton Nepomuceno, Potentials Lisa Delventhal, Manager, Student
Gail A. Schnitzer, Associate Art Director Steven Heffner, Managing Director, Student Editor and Young Professional Programs
Theresa L. Smith, Production Publications erivelton.nepomuceno@mu.ie Robert Sacks, Program Specialist,
Coordinator Jamie Moesch, Managing Director, Adil Usman, MGA/SAC/SPAA Chair Student Activities
Educational Activities adil_usman009@yahoo.co.in
Mark David, Director, Business Katelyn Serpe, Program Specialist,
Sophia A. Muirhead, General Counsel Prasanth M, TAB Representative,
Development—Media & Advertising University Relations
and Chief Compliance Officer laleh@ieee.org
+1 732 465 6473 Konstantinos Karachalios, Managing
Felicia Spagnoli, Advertising Luis Fernandes, IEEEXtreme Project
Director, IEEE-Standards Association
Lead, luisfernandes@luisfernandes.org
IEEE HKN REPRESENTATIVE
Production Manager Cecelia Jankowski, Managing Director, Rakesh Kumar
Peter M. Tuohy, Production Director Member and Geographic Activities
Kevin Lisankie, Director, Editorial Services Dr. Cherif Amirat, Chief Information Officer REGIONAL STUDENT ACTIVITIES
Dawn M. Melley, Senior Director, COMMITTEE CHAIRS INDUSTRY REPRESENTATIVES
Donna Hourican, Staff Executive,
Gim Soon Wan, Region 1 Rhonda Farrell
Publishing Operations Corporate Activities
gimsoon@ieee.org farrell_rhonda@bah.com
Thomas Siegert, Chief Financial Officer
Karen L. Hawkins, Chief Marketing Bharat Rawalkshatriya, Region 2 Mansi Tripathi
IEEE BOARD OF DIRECTORS Officer rawalksh001@gannon.edu mansitri@ieee.org
Saifur Rahman, IEEE President and CEO Mary Ward-Callan, Managing Director, Bailey Heyman, Region 3 Mohammad Hossein Babee
Thomas M. Coughlin, IEEE President-Elect Technical Activities bailey.u.heyman@gmail.com ho3ein.babaee@gmail.com
K.J. Ray Liu, IEEE Past President Chris Brantley, Managing Director, Benjamin Strandskov, Region 4 John Paserba
Forrest D. Wright, Director and Secretary IEEE-USA stran1b@cmich.edu John.Paserba@meppi.com
IEEE Potentials (ISSN 0278-6648) (IEPTDF) is published bimonthly by The Institute of by the Institute of Electrical and Electronics Engineers, Inc. Printed in U.S.A. Subscrip-
Electrical and Electronics Engineers, Inc. Headquarters address: 3 Park Avenue, 17th tions, orders, address changes: IEEE Operations Center, 445 Hoes Lane, Piscataway,
Floor, New York, NY 10016-5997. Phone: +1 212 705 7900. Change of address must be NJ 08854, Phone: +1 732 981 0060. Other publications: IEEE also publishes more than 30
received by the first of a month to be effective for the following issue. Please send to IEEE specialized publications. Advertising Representative: IEEE Potentials, 445 Hoes Lane,
Operations Center, 445 Hoes Lane, Piscataway, NJ 08854. Annual Subscription, for IEEE Piscataway, NJ 08854, Phone: +1 732 562 3946. IEEE Departments: IEEE Operations
Student members, first subscription US$5 included in dues for U.S. and Canadian Student Center (for orders, subscriptions, address changes, and Educational/Technical/ Standards/
members (optional for other Student members). Prices for members, nonmembers, and Publishing/Regional/Section/Branch Services) 445 Hoes Lane, Piscataway, NJ 08854,
additional member subscriptions are available upon request. Editorial correspondence USA. Operations Center +1 732 981 0060; Washington Office/Professional Services +1 202
should be addressed to IEEE Potentials, 445 Hoes Lane, Piscataway, NJ 08854. Respon- 785 0017. Headquarters: Telecopier +1 212 752 4929, Telex 236-411.
sibility for contents of papers published rests upon authors, and not the IEEE or its mem- Periodicals postage paid at New York, NY, and at additional mailing offices. Postmaster:
bers. Unless otherwise specified, the IEEE neither endorses or sanctions any positions Send address changes to IEEE Potentials, IEEE, 445 Hoes Lane, Piscataway, NJ 08854,
or actions espoused in IEEE Potentials. All republication rights including translations are USA. Canadian Publications Agreement Number 40030962. Return Undeliverable Cana-
reserved by the IEEE. Copyright and Reprint Permissions: Abstracting is permitted with dian Addresses to: Fort Erie, ON L2A 6C7 Canada. Canadian GTS #125634188.
credit to the source. Libraries are permitted to photocopy beyond the limits of U.S. copyright PRINTED IN THE U.S.A.
law, for private use of patrons, articles that carry a code at the bottom of the first page, pro-
vided the per-copy fee indicated in the code is paid through the Copyright Clearance Cen-
ter, 222 Rosewood Drive, Danvers, MA 01923. For other copying, reprint, or republication
permission, write to IEEE Potentials at Piscataway, NJ. All rights reserved. Copyright © 2023 Digital Object Identifier 10.1109/MPOT.2023.3302040
IEEE Potentials
40th anniversary
by John Benedict Boggala
I
EEE Potentials, the bimonthly magazine published by magazine to reach a wider audience and provide students
IEEE for undergraduate and graduate students inter- with a more diverse range of information and resources.
ested in the fields of engineering, technology, and sci- During this decade, IEEE Potentials also introduced
ence, has a rich history spanning over 40 years. In new columns such as “Student Activities,” which fea-
this column, we will explore the evolution of IEEE Poten- tured articles on student-led initiatives and IEEE-
tials, its significant milestones, and its impact on the sponsored events, and “Industry Outlook,” which pro-
field of engineering and technology education. vided insights into the latest trends and developments
in various industries. Additionally, the magazine began
1980s: The founding of IEEE Potentials to feature articles written by leading experts in the field,
The idea for IEEE Potentials was conceived in the late 1970s providing students with access to cutting-edge research
by a group of IEEE student members who saw a need for a and knowledge.
publication that would specifically
cater to the needs and interests of During its early years, 2000s: Embracing
undergraduate and graduate stu- digital media
dents in engineering, technology, IEEE Potentials focused The advent of digital media in the
and science. After extensive plan- on providing students 2000s brought about significant
ning and coordination, the first with practical and changes in the way IEEE Potentials
issue of IEEE Potentials was pub- produced and distributed its con-
lished in January 1982. applicable knowledge tent. In addition to the print maga-
During its early years, IEEE Po- that would help them zine, the publication launched its
tentials focused on providing stu- advance in their digital edition, which allowed stu-
dents with practical and applicable dents to access articles and resourc-
knowledge that would help them academic and es online. This made the magazine
advance in their academic and pro- professional careers. more accessible to students around
fessional careers. The magazine’s the world and allowed for more
content featured technical articles, career advice, and interactive and engaging content.
information on IEEE student activities, events, and pro- The magazine also began to produce multimedia con-
grams. It quickly gained popularity among students and tent such as videos, podcasts, and webinars, providing
educators alike and became an important resource for students with a more dynamic and immersive learning
students looking to expand their knowledge and network experience. The new format also allowed for more tar-
in the field of engineering and technology. geted and personalized content, with articles and re-
sources tailored to the specific interests and needs of
1990s: Expansion and growth individual readers.
In the 1990s, IEEE Potentials expanded its focus beyond
traditional engineering fields to include a broader range of 2010s: Global expansion
topics such as computer science, information technology, The 2010s saw IEEE Potentials expand its reach and
and telecommunications. This expansion allowed the impact on a global scale. The publication began to fea-
ture articles written by students and educators from
Digital Object Identifier 10.1109/MPOT.2023.3302668
around the world, providing a more diverse and inclusive
Date of current version: 6 September 2023 perspective on engineering and technology education.
A journey
to discovering
your vocation
by Erivelton Nepomuceno
S
electing a career path presents unique chal- Doing so entails recognizing one’s purpose, pinpoint-
lenges, w ith indiv idua ls required to weigh ing those things that give life meaning, and discover-
options—should they follow their passion, or ing how we can best harness individual abilities fully.
should they seek the security explicitly provid- Graduate education is valuable for people seeking pro-
ed by a different job? Addressing this dilemma forces fessional growth in this career journey. By earning de-
people into finding a middle ground between the grees, people can deepen their knowledge and skills in
desire for a fulfilling work life and the achievement of areas of interest to them. This offers opportunities for
financial stability—a tough nut, considering today’s personal and intellectual growth, increases competitive-
professional environment. Discovering one’s true voca- ness, and opens doors to a wider range of career oppor-
tion represents an essential component of finding the tunities. With specialist knowledge and qualifications,
perfect fit when it comes to choosing a career route graduates with advanced degrees often have a competi-
leading toward a satisf ying professional journey. tive edge in their job. Awareness of the value of gradu-
ate studies allows people to align their passions with the
Digital Object Identifier 10.1109/MPOT.2023.3286757
practical requirements of career success, treading a path
Date of current version: 6 September 2023 that combines personal satisfaction with professional
IEEE POTENTIALS September/October 20 2 3 ■ 5
f ulfillment. In any case, how could one be able to choose a A final remark is related to our openness to signs. It is
career or a graduation scheme—or even to keep one that essential to be attentive to facts and feedback that we re-
he/she has already chosen? There is no easy answer, but ceive from the world. Reality is a complex network of sys-
some help could be offered if you see both choices under tems, where information can be explored in this journey.
the umbrella of vocation! These signals allow us to understand how we can best
The criteria for determining one’s vocation, as described serve a greater purpose that spans the various aspects
in Julian Carron’s “One Voice of the Ideal,” include three of our lives—social, cultural, and religious. By identify-
key elements. The first one involves studying our natural ing our unique combination of talents, experience, and
inclinations, gifts, and desires. This self-reflection will al- resources, we can recognize our true calling and use
low us to recognize abilities and dispositions that guide them effectively to serve to the common good. Through
us toward our vocation. Second, discovering one’s voca- this process of self-discovery and a careful interpretation
tion requires accepting the inevitable circumstances and of the signs, we may discover our vocation and fight—
conditions of life, without resisting or being resentful of through our job—for a more sustainable world.
them. By accepting and integrating these realities, we
can find alignment with our calling and develop a sense Read more about it
of purpose. For instance, at some point in my life, I had • J. Carron, “The one voice of the ideal,” Communion and Lib-
considered becoming a basketball player. Very soon, I ac- eration Int. Mag., Rome, Italy, May 2010, pp. 1–6. [Online]. Avail-
cepted that 1.72 m is far short of the required height for able: https://english.clonline.org/archive/julian-carron/the
that career. Finally, Carron emphasizes the importance of -one-voice-of-the-ideal
recognizing the world’s social needs and aligning our call-
ing with the improvement of society. Societal challenges About the author
are usually areas of opportunities, which could allow us Erivelton Nepomuceno (erivelton.nepomuceno@mu.ie) is
to use our talents to make a positive impact in the world. with Maynooth University, Maynooth W23 F2H6, Ireland,
These three criteria could be of some support for people and is the student editor of IEEE Potentials.
embarking on a journey to choose their work.
We want
to hear
from you!
Do you like what you’re reading?
Your feedback is important.
Let us know—
send the editor-in-chief an e-mail!
D
r. Raymond Floyd passed away encounter with an advertisement
on 15 May 2023 in Cody, WY. seeking an educator brought him
He was bor n 20 February to Northwest College, where he em
1937 in Lake Charles, LA. braced his role as an instructor
Ray’s enduring contributions to with unwavering passion.
IEEE Potentials stand out in both Ray Floyd’s legacy is one of curi
quality and volume, and they span osity, mentorship, and a steadfast
nearly two decades, which stand pursuit in the advancement of en
as a testament to his unwavering gineering knowledge. Remembered
commitment to engineering and edu as a lifelong learner, he constantly
cation. He started by writing and worked to inspire the next genera
reviewing articles before joining the tion, leaving a lasting impact on his
editorial board as a corresponding family, friends, students, and IEEE
editor from 2015 to 2023. As one of Potentials readers.
the most active volunteers for the On behalf of IEEE Potentials and
magazine, he authored 59 articles the IEEE community at large, we wish
(one in this issue on p. 39), focus to thank Ray for his incredible contri
ing on engineering management, communications, butions to this magazine and to the field of engineering.
ethics, and a variety of technical issues. He also To read more about him, visit https://www.powelltribune.
reviewed a record 266 articles, providing insightful com/stories/dr-raymond-floyd,85459 and https://www.
and constructive feedback to authors. In fact, he even codyenter pr ise.com/news/people/article_d26f8eec
wrote an article titled “Reviewing can be education -a13b-11eb-8248-4357cbdff162.html.
al,” explaining how to peer-review articles for IEEE
Potentials (Floyd, 2013). Read more about it
His journey was one of continuous growth and • R. E. Floyd, “Reviewing Can Be Educational,” in
transformation. Floyd enjoyed a distinguished 26-year IEEE Potentials, vol. 32, no. 3, pp. 26 –29, May-June
tenure at IBM in Armonk, NY, as a senior engineer 2013, doi: 10.1109/MPOT.2013.2240474.
contributing to NASA’s Apollo program. His relent
less pursuit of knowledge led him to earn a Ph.D. after About the author
his retirement in 1992. Subsequently, a serendipitous Dario Schor (schor@ieee.org) is the editor in chief of
IEEE Potentials. Magellan Aerospace, Winnipeg, MB R3H
Digital Object Identifier 10.1109/MPOT.2023.3303040
0S5, Canada.
Date of current version: 6 September 2023
IEEE POTENTIALS September/October 20 2 3 ■ 7
IEEE STUDENT ACTIVITIES
What I learned as an
engineering project
manager
by Sherwin Razmy
A
fter I graduated with a degree in engineering, I hear is, “We are over budget”; if that happens, they
worked for several years in the U.S. Navy, then will find another project manager.
returned to school for my master’s of business 2) They are organized. Organization seems like an obvi-
administration (MBA) and my doctorate in law ous characteristic of a star project manager, but it
(JD). One should separate oneself by earning a graduate manifests itself in a variety of ways, including in an
degree. An MBA goes hand in hand with an engineering ability to stay focused on the big picture and to pri-
bachelor’s for anyone who will be working for an engi- oritize competing responsibilities. In most projects,
neering corporation. More than anything, know busi- there are so many things that have to get done that it
ness management in order to be successful. Managing is hard to stay on top of everything and in control of
people is the key to success in a business. everything, Being able to prioritize work for your
Being a project manager is more than learning a team is a critical aspect of what a project manager
book of formulas. One must work well with others, and has to do. Just like in the navy, your organizational
communication is the key to ef- skills will help separate you from
fective management. Players must Since many project team your colleagues.
come together as a team in order 3) They know how to lead. Lao Tzu
to accomplish a task. Successful members do not report once said, “The leader is best
project managers do not simply directly to the project when people are hardly aware of
delegate orders and take all of the manager, the project his existence, not so good when
credit. A good project manager ac- people praise his government,
knowledges everybody, at all levels. manager has to find ways less good when people stand in
Once a project manager has the to motivate workers over fear worse when people are con-
respect of his employees, they will whom they have no direct temptuous, fail to honor people
go the extra mile to help them out. and they fail to honor you, but
However, if a project manager does influence and who can of a good leader who speaks
not care and lays off employees at make or break a project. little, when his work is done, his
the first sign of trouble, they will aim is fulfilled, the people say,
not be loyal. Below are six attributes I find essential for we did it ourselves.” Project managers have to inter-
excellent project managers. act with and influence a variety of stakeholders,
1) They possess the gift of foresight. Good project man- including their project teams and project sponsors.
agers are able to anticipate and head off problems that Since many project team members do not report
can jeopardize deadlines, budgets, and user accep- directly to the project manager, the project manager
tance. An MBA will prepare you for these challenges has to find ways to motivate workers over whom they
because you will learn how to balance the books and have no direct influence and who can make or break
stay on budget. A good project manager is efficient a project. Project managers also need to be able to
and communicates with the higher ups that every- inspire the confidence of stakeholders and sponsors
thing is squared away. The last thing they want to in the event the budget or timeline needs to be rene-
gotiated or additional resources are needed to com-
plete the project.
Digital Object Identifier 10.1109/MPOT.2014.2379751
4) They are good communicators. Successful project
Date of current version: 6 September 2023 managers effectively use e-mail, meetings, and status
TAP.
CONNECT.
NETWORK.
SHARE.
Connect to IEEE–no matter where you are–with the IEEE App.
Stay up-to-date Schedule, manage, or Get geo and interest-based
with the latest news join meetups virtually recommendations
IEEE POTENTIALS September/October 20 2 3 ■ 9
©STUTTERSTOCK.COM/RFECT
Careers and Graduate Education
T
he IEEE Student Branch
f rom t he Un i ver sit y of
California, Irvine (IEEE@
UCI) launched the Open
Project Space (OPS) pro-
gram to provide engineering stu-
dents w it h t he oppor tu n it y to
practice valuable skills and theo-
ries learned in the classroom.
OPS is a year-long extracurricular
program founded at the University
of California, Los Angeles (UCLA) in
2010 by Leo Szeto. Through lectures,
workshops, and projects, OPS aims
to create an interactive environ-
ment where students learn funda-
mental embedded systems concepts,
develop troubleshooting techniques,
compare communication protocols,
and design their first printed circuit
board (PCB).
©SHUTTERSTOCK.COM/EVGDEMIDOVA
With the help of IEEE at UCLA,
the program was first piloted by
John Yu and Samuel Deans at UCI
in fall 2020, trialing four projects
with 30 students. As per pandemic
restrictions, the necessary hardware
was shipped, and lectures were given
over Zoom. However, participation pleted the program, and a couple moting in electrical engineering and
declined, and it was arduous to pro- students continued their journey in computer science (EECS) classes.
vide hardware troubleshooting help IEEE as officers. More than 200 students applied,
due to the virtual format. For exam- The next iteration, headed by of- exceeding expectations, and prov-
ple, even though a Discord channel ficers Lily Johnson and Alexandra ing the demand for the program
was created for OPS members, it was Zhang Jiang, was offered to 60 stu- within UCI.
rarely used, and students preferred dents during the 2021–2022 academ- The new OPS version from UCI
sending an e-mail. Nonetheless, the ic year. Since the program doubled (https://ieee.ics.uci.edu/ops.html) di-
pilot program raised expectations its capacity, IEEE@UCI also doubled verges from UCLA’s template program
for the full in-person version of OPS efforts to reach out to students by (https://openproject.space/projects/)
at UCI: 20 out of 30 members com- advertising at the Anteater Involve- to adjust to the tool sets of UCI stu-
ment Fair at the b eginning of the dents and the school’s branding.
Digital Object Identifier 10.1109/MPOT.2023.3241448
year, sending invitations through One of IEEE@UCI’s biggest limita-
Date of current version: 6 September 2023 the engineering newsletter, and pro- tions is the small workspace area, so,
IEEE POTENTIALS September/October 20 2 3 ■ 11
FIG3 Students received their hardware kits during the first 2022–2023 OPS meeting.
managing the entire program was Arduino. Additionally, the red light/ We are excited to start the third it-
too much for two people and were green light series was replaced with a eration of OPS! IEEE@UCI would like
not always able to address student weather station project to align with to extend a huge thank you to Leo
inquiries promptly due to the sheer embedded systems interests. Students Szeto, founder of the OPS program at
volume of requests for help. will utilize the same communication UCLA; Ryeder Geyer, IEEE at UCLA’s
For the 2022–2023 year, OPS has protocols and microcontrollers used external officer; and IEEE at UCLA
enrolled 100 students. The program’s in red light/green light, but, unlike liaisons as well as any others who
curriculum and projects have been red light/green light, which relies on had a part in making this program
revamped extensively to tackle stu- software algorithms, the weather sta- a success.
dent feedback. To address the diffi- tion will focus on teaching how to use
culty spike, easier projects, such as electronics components, such as tem- About the authors
debugging a faulty perf board circuit, perature and humidity sensors, and Lily Johnson (lilyaj@uci.edu) is the
were removed, and more substantial, an LCD screen. president of t he IEEE Student
intermediate projects were added in Under the new OPS leads, the Branch at the University of Califor-
the middle of the program where stu- leadership team has expanded to nia, Irvine, Irvine, CA 92697 USA.
dents felt that the difficulty increased include OPS technicians, who will Alexandra Zhang Jiang
too quickly. One of the new projects assist with buying and distribut- (azhangji@uci.edu) is the vice presi-
includes building an H-bridge circuit ing parts, organizing lab hours, and dent of the IEEE Student Branch at
with p-channel and n-channel tran- helping students with questions and the University of California, Irvine,
sistors to drive a dc motor with an debugging (Fig. 3). Irvine, CA 92697 USA.
Low-cost software-
defined radio for electrical
engineering education
Samer Baher Safa Hanbali
©SHUTTERSTOCK.COM/ITANA
P
rototype wireless commu- Consequently, iterating on these transmission and reception of data.
nication systems can be prototypes will increase the overall In addition, the ease of use and
designed using discrete cost, size, power consumption, and reduced expense of SDRs permit
components, e.g., a low- complexity of the system. In con- students to own the portal equipment.
noise amplifier (LNA), a trast, software-defined radios (SDRs) This increases student engage-
power amplifier (PA), mixers, filters, integrate multiple functional blocks ment through hands-on experien-
frequency synthesizers, an analog- on a single microchip to reduce the tial learning.
to-digital converter (ADC), a digital- cost, size, and power consumption.
to-analog converter (DAC), etc. Dif- Furthermore, SDRs combine both Introduction
ferent circuit boards have to be digital processing and analog radio SDR is a new trend in wireless com-
designed, fabricated, assembled, frequency (RF) to offer more flexibili- munications in which the system
tested, and connected with wires. ty to be reconfigured and controlled. parameters are mostly defined and
Therefore, SDRs achieve more fre- reconfigured by software. There are
Digital Object Identifier 10.1109/MPOT.2022.3223788
quency- and bandwidth-flexible RF two approaches for SDR. In the first
Date of current version: 6 September 2023 design, which enables the seamless approach, the computer performs
0278-6648/23©2023IEEE IEEE POTENTIALS September/October 20 2 3 ■ 13
most of the digital signal process- various software environments, ■■tunable bandwidth from 200 kHz
ing, and the field-programmable e.g., Python, GNU Radio, MATLAB, to 20 MHz (AD9363) or 200 kHz
gate array (FPGA) does few tasks. In Analog Device’s IIO Oscilloscope, to 56 MHz (AD9364)
the second, the FPGA performs and Airspy’s SDR#. The Commu- ■■12-bit ADC and DAC
most of the digital processing, and nications Toolbox from the Math- ■■ADC and DAC sampling rate of
the computer displays the results Works provides M ATLAB func- up to 61.44 million samples per
and does few tasks. It is easier to tions for transmitter and receiver second
implement advanced algorithms blocks for the ADALM-PLUTO. IIO ■■output power of up to 7 dBm.
using the first approach than when Oscilloscope is an application that Figure 1 shows a block diagram
the second one is used. On the controls the ADALM-PLUTO trans- of ADALM-PLUTO based on the
other hand, the second approach mit and receive channels. SDR# AD936x transceiver that is respon-
needs a lower data transfer rate is a freeware software package sible for receiving and transmitting
between the FPGA and the comput- that controls the ADALM-PLUTO re- the RF data. AD936x has a zero-in-
er than former. ceiver and demodulates amplitude- termediate-frequency architecture.
Many developers have used GNU modulation/frequency-modulation This results in a low component
Radio software and Universal Soft- (FM)/double-sideband/single-side- count, low cost, and low power con-
wa re R adio Per iphera l (USR P). band signals. sumption. The receive subsystem in-
GNU Radio is a free open source cludes an LNA in from the antenna,
software development tool kit. This Overview of ADALM-PLUTO a mixer, filters, and an ADC. The
tool kit has a growing list of func- ADALM-PLUTO is an easy-to-use transmit subsystem contains a DAC,
tions, and it can be used with dif- SDR module. Its core component is filters, a mixer, and a small PA out
ferent SDR hardware. The popu- RF transceiver AD9363 or AD9364, to the antenna. The external ampli-
lar RTL-SDR USB radio stick is which is based on a direct-conver- fiers, the PA and LNA, can be used
cheaper than USRP, but it oper- sion receiver/transmitter. Here are when further amplification is re-
ates only as a receiver. In contrast, the main specifications of ADALM- quired. Besides the RF transceiver,
A DA LM-PLU T O (PlutoSDR) has PLUTO: ADALM-PLUTO includes a Xilinx
full transceiver implementation at ■■tuning range from 325 MHz to Zynq-7010 FPGA with an ARM Cor-
an affordable cost. Furthermore, 3.8 GHz (AD9363) or 70 MHz to tex-A9 CPU, DDR3 random-access
ADALM-PLUTO is supported by 6 GHz (AD9364) memory, Flash memory, and USB 2.0
controller. The ADALM-PLUTO mod-
ule is connected to the laptop v i a
USB and is controlled using the
SDR software, e.g., MATLAB. The
software allows you to control the
Xilinx ADALM-PLUTO parameters, such
Mixer
Filter
Filter
DAC
FIR
PA
Interface
USB 2.0
ADI
Drivers
Filter
ADC
LNA
IEEE POTENTIALS September/October 20 2 3 ■ 15
The common types of radar signals are FM minimum peak sidelobe codes. Bark-
er codes have the common property
waveforms and phase-coded waveforms, which that all sidelobes have a value of 1/N.
have different properties. Unfortunately, there are only seven
known Barker codes that have a
high-range resolution. Therefore, Overview of radar waveforms maximum code length that equals
ADALM-PLUTO cannot be used to The library of GNU Radio has many 13. Frank code and P1- through P4-
simulate these radar systems, but it signal sources. Most of these sourc- coded signals are well-known codes
can be used for lab assignments that es are dedicated to communication that belong to polyphase waveforms.
include the simulation of basic radar systems. Radar waveforms are dif- Frank, P1, and P2 codes exhibit low-
signal processing, e.g., radar wave- ferent from waveforms used by er PSL than those of P3 and P4 codes
form generation, radar-matched communication systems. The MAT- by 3 dB. However, P3 and P4 codes
filter, radar detection, Doppler pro- LAB Phased-Array System Toolbox are more Doppler tolerant than the
cessing, etc. can be used to generate many radar Frank, P1, and P2 codes.
waveforms for different applications. It is worth mentioning that the
Software-defined radar advantages The common types of radar signals MATLAB Phased-Array System Tool-
■■For multipurpose radar, the pro- are FM waveforms and phase-coded box does not support the generation
cessing algorithm is implemented waveforms, which have different of some radar signals, e.g., PRN codes,
in software. It can easily be properties. FM waveforms are ob- NLFM, and Costas-coded waveforms.
changed during radar operation, tained by modulating the frequency of Therefore, these signals can be gen-
so it is possible to switch between the radar pulse. There are several FM erated based on their equations.
different operation modes or waveforms. These include linear FM
adapt the probe signal. (LFM), nonlinear FM (NLFM), Cos- Simulation results
■■There are fast development and tas-coded waveforms, and stepped In the following simulation, MAT-
flexibility in controlling different FM waveforms. The LFM waveform L A B w ith the Communications
design parameters, e.g., the fre- is commonly used in radar systems Toolbox and one ADALM-PLUTO
quency, bandwidth, and gain. due to its high Doppler tolerance. It with two antennas are used. The
■■There are reductions in cost, is well known that the peak sidelobe radar waveform is both transmitted
size, weight, and power con- level (PSL) of the compressed LFM and received by the same ADALM-
sumption. pulse equals –13.2 dB. PLUTO. Then, the received waveform
In a phase-coded waveform, the is correlated with the transmitted
Software-defined radar shortcomings long signal of duration T is divided waveform to simulate radar wave-
■■Wideband or multiband anten- into N small signals called chips, form generation and radar-matched
nas are required for multifunc- each of width tc = T ∕ N. Phase-cod- filter. Figure 2(a) and (b) shows the
tion software-defined radars. ed waveforms are characterized by real and imaginary parts of the
■■Ve r y - h i g h - s p e e d A D C s a r e the phase modulation applied to LFM waveform (bandwidth = 5 MHz,
required to digitize wide band- each chip. There are binary phase and pulse duration = 100 μs) that is
width signals. codes and polyphase codes. Com- transmitted and received by the
■■There are a high sampling rate mon types of binary phase-coded same ADALM-PLUTO, and then the
and huge data flow to be pro- waveforms are Barker codes, pseu-
received signal is correlated with
cessed. dorandom noise (PRN) codes, and the transmitted signal, as shown in
Fig. 3. One can figure out that the
0.5 0.5
0
Normalized Amplitude (dB)
–10
Amplitude (V)
Amplitude (V)
X 95
0 0 –20 Y –13.88
–30
–40
–0.5 –0.5
0 200 400 600 800 1,000 0 200 400 600 800 1,000 –50
Samples Samples 0 50 100 150 200
(a) (b) Samples
FIG2 (a) The real part of the received LFM waveform. (b) The imaginary part of the FIG3 The PSL of the LFM waveform at
received LFM waveform. the matched filter output.
0.2
delivered high-speed Internet all Toolbox and one ADALM-PLUTO
0 around the world. Many smart- with two antennas are used.
phones can receive various signals FM radio signals are transmit-
–0.2 from different frequency bands, e.g., ted in a frequency range between
GSM (900 MHZ), Wi-Fi (2.4 GHz), 88 and 108 MHz, which allows
–0.4
GPS (1,575.42 MHz), etc. them to propagate miles across the
–0.6 S D R i s a r a d i o c o m m u n i c a- country. We can build an FM re-
0 20 40 60 tion system that uses software for ceiver using Simulink and ADALM-
Samples
modulating and demodulating ra- PLUTO’s receiver block, as shown
FIG4 The received Barker code.
dio signals. During the laboratory in Fig. 6. This allows you to lis-
sessions, students interact w ith ten to the radio stations through
real-world wireless signals over the laptop speakers.
air in real time to bridge the gap We can design a basic FM trans-
0
between the undergraduate com- mitter using ADALM-PLUTO’s trans-
Normalized Amplitude (dB)
Center ADALM-PLUTO FM
1e6 99.7 Data
Frequency Receiver Broadcast
Center
Frequency (MHz)
ADALM-PLUTO Radio
Receiver
IEEE POTENTIALS September/October 20 2 3 ■ 17
guitartune.wav Audio
A: 44,100 Hz,
Original
16 bit, Mono
Data
FM Data
Broadcast
ADALM-PLUTO
Transmitter
IEEE POTENTIALS September/October 20 2 3 ■ 19
©STUTTERSTOCK.COM/RFECT
Careers and Graduate Education
How to Market to
Generation Z
on Social Media
Rae Yule Kim
S
ocia l med ia ca n be a n
effective medium to reach
Generation Z (Gen Z) and
advertise science, technol-
o g y, e n g i n e e r i n g , a n d
mathematics (STEM) programs.
Creating viral content on social
media is all about starting a trend
a nd at t ract i n g user-generated
content. One successful content
can nudge millions of user-gener-
ated content and generate billions
of views.
Social media has transformed
how we communicate with each oth-
er. Before social media, our commu-
nication medium was limited to only
people we knew. One viral content
on social media spreads to billions
of people. Social media can be an ef-
fective medium to reach out to Gen
Zers and inform them about the im-
portance of STEM skills.
The number of students enrolled
in STEM programs has been in de-
cline since the 1980s (Athanasia et
al., 2022). Only 11% of the U.S. popu-
lation has a STEM degree, while more
than 30% of jobs available in urban ©SHUTTERSTOCK.COM/MYPOKCIK
IEEE POTENTIALS September/October 20 2 3 ■ 21
Team up with findings/2019-gen-z-purpose-study
influencers -undivided/
About 87% of Gen • T. Locke, “86% of young people
Zers subscribe to say they want to post social media
at least one influ- content for money,” CNBC, 2019. Acces
encer (Mor ning sed: Jan. 23, 2023. [Online]. Available:
Consult, 2019). https://www.cnbc.com/2019/11/08/
STEM influencers study-young-people-want-to-be-paid
can motivate stu- -influencers.html
dents to think of • W. P. Special and K. T. Li-Barber,
p otent i a l S T EM “Self-disclosure and student satisfac-
career paths and tion with Facebook,” Comput. Human
provide real-world Behav., vol. 28, no. 2, pp. 624–630, Mar.
insights that help 2012, doi: 10.1016/j.chb.2011.11.008.
students prepare • “Understanding the difference in
themselves better social media platforms.” Markerly. Ac-
for the industr y. cessed: Jan. 23, 2023. [Online]. Avail-
Particularly, STEM able: https://markerly.com/blog/
i n f luencer s c a n understa nding-the-difference-in
help inspire stu- -social-media-platforms/
dent s f r om u nder r epr e s ente d Read more about it • K. Press-Reynolds, “ Facebook
groups in science and technology • G. Athanasia. “The U.S. should wants to attract young people, but
fields. Although Black and Hispanic strengthen STEM education to remain Gen Z teens say it’s a ‘boomer social
individuals make up 11% and 16% globally competitive.” CSIS. Ac- network’ made for old people,” Insider,
of the U.S. workforce, respectively, cessed: Jan. 23, 2023. [Online]. Avail- 2021. Accessed: Jan. 23, 2023. [On-
each accounts for 6% of the STEM able: https://www.csis.org/blogs/ line]. Available: https://www.insider.
workforce. A recent study found that perspectives-innovation/us-should com/facebook-gen-z-teens-boomer
the gender wage gap in Europe has -strengthen-stem-education-remain -social-network-leaks-2021-10
increased with the Fourth Industri- -globally-competitive • “Global 2022 gen Z and millennial
al Revolution due to the underrepre- • “Why gen Z students are choos- survey,” Deloitte, New York, NY, USA,
sentation of women in better-paying ing STEM as a top career choice.” 2022. Accessed: Jan. 23, 2023. [Online].
occupations in technology fields Vaughn College. Accessed: Jan. 23, Available: https://www2.deloitte.com/
(Bernadin, 2021). Teaming up with 2023. [Online]. Available: https:// content/dam/Deloitte/at/Documents/
STEM inf luencers and business w w w.vaughn.edu/blog/why-gen- human-capital/at-gen-z-millennial
moguls, particularly for those from z-students-are-choosing-stem-as-a-top -survey-2022.pdf
an underrepresented background in -career-choice/ • “The influencer report,” Morning
the science and technology indus- • N. Godfrey, “Millennials are Consult, Washington, DC, USA, 2019.
tries, can help students have posi- failing because we are failing them: Accessed: Jan. 23, 2023. [Online]. Avail-
tive role models and be inspired to The STEM gap,” Forbes, 2015. Access able: https://morningconsult.com/
pursue education and careers in ed: Jan. 23, 2023. [Online]. Available: influencer-report-engaging-gen-z-and
STEM fields. ht t ps://w w w.forbes.com/sites/ -millennials/
nealegodfrey/2015/04/19/millennials • J. Bernadin, “Six STEM influenc-
Marketing to Gen Z -are-failing-because-we-are-failing ers helping to bridge the gap for blacks,
on social media -them-the-stem-gap/?sh=e70c4d32f62c Hispanics, and women,” Forbes, 2021.
Social media is the most effective • T. Francis and F. Hoefel, “‘True Accessed: Jan. 23, 2023. [Online]. Avail-
medium for reaching out to Gen Z gen’: Generation Z and its implications able: https://www.forbes.com/sites/
about STEM programs because for companies,” McKinsey and Com- forbestechcouncil/2021/07/30/six-stem
most Gen Zers learn about new pany, New York, NY, USA, 2018. Ac- -influencers-helping-to-bridge-the-gap
things on social media. To market cessed: Jan. 23, 2023. [Online]. Avail- -for-blacks-hispanics-and-women/?
effectively on social media, create a able: https://w w w.mckinsey.com/ sh=37cd6c461248
tr end, not an advertisement, i ndust r ies/consu mer-pack a ged
because marketing on social media - g o o d s/o u r - i n s i g h t s/t r ue - ge n About the author
is not one-way communication. To -generation-z-and-its-implications-for Rae Yule Kim (rae.yule@gmail.com)
nudge a viral trend, 1) choose the -companies earned his Ph.D. degree in market-
right platform depending on the • “2019 gen Z purpose study,” Por- ing from Rutgers University. He is
purpose of the marketing, 2) create ter Novelli, New York, NY, USA, 2019. an assistant professor of marketing
cause-related content, and 3) part- Accessed: Jan. 23, 2023. [Online]. Avail- at Montclair State University, Mont-
ner with influencers. able: https://www.porternovelli.com/ clair, NJ 07043 USA.
Anshuman Kalla
©SHUTTERSTOCK.COM/DIRENKO KATERYNA
T
oday, the world of informa- ting decentralized, either completely the Bitcoin cryptocurrency in 2008.
tion systems and business or partly, thanks to blockchain As a matter of fact, it was after the
processes is experiencing a technology—specifically, distribut- success of Bitcoin that researchers
shift in its status quo. Sys- ed ledger technology (DLT), which is and practitioners around the globe
tems designed and operated enabling this paradigm shift. identified blockchain technology as
in a centralized manner are now get- the underlying technology driving
Introduction Bitcoin. As time passed, techno-
Digital Object Identifier 10.1109/MPOT.2023.3246230
Blockchain technology came into crats started realizing that the
Date of current version: 6 September 2023 existence through the inception of potential of blockchain technology
0278-6648/23©2023IEEE IEEE POTENTIALS September/October 20 2 3 ■ 23
To ensure the security of a distributed ledger in Nevertheless, the recent past has
revealed many issues that underlie
such a network, DLT exhaustively uses a centralized system. For instance,
cryptographic techniques. a centralized system may invoke nu-
merous third-party services to per-
form its functions. Each of these
goes beyond the fintech sector. ly. Before we dive into DLT and block- third-party intermediaries performs
Notably, blockchain can resolve chain technology, perhaps it would its dedicated set of tasks, which in-
many issues associated with the be interesting to look at the benefits creases the overall delay and the cost
use of centralized systems in vari- and, more importantly, the issues that users have to bear. Moreover,
ous sectors, such as health care, associated with centralized informa- users are generally unaware of the
manufacturing, industrial supply tion systems. involved third-party intermediaries.
chain, file sharing, identity man- Another critical issue with central-
agement, and telecommunications. Centralized systems—Benefits ized systems is the single point of
For instance, ensuring privacy and issues failure. Given the intrinsic central-
and tight access control of electronic Traditionally, the design and the ity of such systems, any accidental
health-care records (EHRs) in the modus operandi of information sys- or attack-driven failure can lead to
health-care ecosystem is of utmost tems have been centralized in a complete breakdown or compro-
importance. In other words, only au- nature—the reason being that cen- mised services. Some of the secu-
thorized entities should be enabled tralized systems offer numerous rity-related issues with centralized
to share and access EHRs. Moreover, advantages, such as ease of monitor- information systems are as follows:
irrespective of security attacks or ing and maintenance, higher con- ■■Lack of transparency and data
accidental faults, the availability of trollability, increased protection from ownership: Once users upload
health-care services should be guar- physical attacks, and no need for their data to a centralized sys-
anteed to various stakeholders, such multiple infrastructure facilities tem, they may not know what
as patients, doctors, laboratories, since all of the resources and happens with their data. They
hospitals, and medical institutes. database(s) are housed at a pre- tend to lose complete ownership
While all such stringent service re- defined and fixed location. Moreover, of their personal data in a cen-
quirements are improbable with a centralized systems have matured tralized system.
centralized health-care management over the years, and well-established ■■Data alterations: A compromised
system, blockchain-enabled decen- legal frameworks support them. Fig- system can lead to malicious
tralized and secure health care has ure 1 depicts advantages and disad- alterations to users’ data. The
the potential to fulfill them efficient- vantages of a centralized system. centralized database makes it
Pros Cons
No Need for Multiple Presence of Third-Party
Infrastructure Facilities Intermediaries
Easy Monitoring, Prone to Single Point of
Maintenance, and Failure
Controllability Loss of Data Ownership
High Physical Security Once Data are Uploaded
Since Housed at a Fixed Nontransparent System
Location Possibility of Data
Established Legal Manipulations
Frameworks for Auditing Threat to Data Privacy
and Compliance and User’s Privacy
Actor
IEEE POTENTIALS September/October 20 2 3 ■ 25
Blockchain is the most popular type of DLT among Step 1
Let us assume that a user Alice
others, and it has received all-around attention wants to send x bitcoin to a user
from industry and academia. Bob. Step 1 is to create a transac-
tion that reflects Alice’s intention.
Alice performs this by using an
used to connect nodes to create a ■■How does the newly mined block appropriate wallet and logging in to
blockcha in net work. Moreover, get added to the distributed led- her account. Blockchain employs
blockchain is governed by a consen- ger in the blockchain? public key cryptography to assign
sus mechanism that allows nodes ■■How are miners incentivized to each user a pair of public and pri-
in the blockchain network to agree contribute their resources to vate keys. An account identifier (or
on the current state of the distribut- update and maintain the block- number) is usually derived from a
ed ledger. In some use cases, such chain? user’s public key. To send x bitcoin
as Bitcoin cryptocurrency, economic Note that the pertinence of these to Bob, Alice selects Bob’s account
models are used to incentivize the questions, their precise answers, and enters the value x to transfer.
participating nodes, thereby ensur- and the actual block mining pro- Alice triggers the transaction by
ing ma ximum decentralization. cess depends on numerous factors, clicking the pay or finish button,
Therefore, in essence, blockchain is such as the type of blockchain and and the transaction is digitally
a technology that is driven by a the consensus mechanism used. signed using her private key.
gamut of underlying technologies. For a first-hand understanding of
the process involving creating, min- Step 2
Data structure perspective ing, disseminating, verifying, and In this step, the transaction created
Third, from the data structure adding a new block, we consider the in step 1 is broadcasted to all of the
viewpoint, blockchain represents Bitcoin blockchain, which uses the nodes in the blockchain P2P net-
how transactions are grouped and proof-of-work (PoW ) consensus work. To do so, Alice’s wallet sends
how the overall database is struc- mechanism. A typical block struc- out the transaction to the nodes to
tured. Blockchain follows a specific ture used for the Bitcoin blockchain which it is directly connected. At
data structure to create and update is shown in Fig. 4. A block compris- any given time, a large number of
the distributed ledger. A set of es two parts: the header and body. nodes can participate in a block-
transactions appearing in a given The block header contains a set of chain network. However, any given
time w indow are validated and fields, whereas the body consists of user is directly connected to very
clubbed in a data unit called a transactions and optionally smart few nodes.
block. Each block contains a finite contract(s). Every node receiving the transac-
number of legitimate transactions. Users of a blockchain-based sys- tion performs a set of tasks. First, it
Every block is timestamped, and tem are connected to a blockchain validates the sender (i.e., Alice) by
its cr yptographic hash value is network. A blockchain network com- checking its digital signature. Sec-
computed. A newly created block is prises nodes connected in a P2P ond, it confirms the existence of the
logically chained with the most fashion. Depending on the type of recipient (i.e., Bob) by looking up his
recent block in the ledger. The blockchain, the platform used, and address. Third, it verifies the feasi-
chaining happens by inserting the the specific use case, a node may re- bility of the transaction by ensuring
hash va lue of t he most recent fer to a miner, validator, orderer, or Alice has x bitcoin with her. Fourth,
block’s header in the newly created relay node. To understand the min- it adds the verified transaction to the
block (explained in detail in the ing process, in this section, the term pool of unconfirmed transactions.
next section). As the blocks are cre- node refers to a miner. Moreover, The transaction pool or memory pool
ated, they are chronologically and both the terms node and miner are (mempool) at each node holds all of
cr yptographically connected. In used interchangeably. As the name the unconfirmed transactions that
essence, the data structure used suggests, the job of a miner is to occur in a given time window. Final-
for the ledger is a chain of blocks, mine a new block. Depending on the ly, each node sends the transaction
and so the name is blockchain. settings, miners are equipped with to all of the other connected nodes.
high-end computing and storage Eventually, the transaction is broad-
Transaction processing facilities if mining is chosen to be casted, and all of the nodes receive
and block mining computationally intensive. This typi- that transaction.
Now that we know blockchain fol- cally is the case when the consensus
lows a typical data structure to mechanism used is PoW. Step 3
build a distributed ledger, it is time The entire process of block min- The next step is the mining of the
to ponder the following questions: ing is roughly divided into six steps, new block. Mining is a process in
■■How is a new block mined in the as depicted in Fig. 5. These are ex- which miners compete to create a
blockchain? plained in the following sections. new block. The mining process
Latest Block
transactions form the body of a new
block (under creation). Moreover,
these transactions are hashed to
create a Merkle tree.
In simple words, a Merkle tree
is an inverted tree of cryptographic
hash values. The leaf nodes of the
Merkle tree are labeled with the
Ty
Timestamp (4 B)
hash values of the selected transac-
Nonce (4 B)
tions. To compute a label for a node
Ty–1
Smart Contracts
and again hashed. This process of
Transactions
n Block
concatenating hash values of child
T4
nodes and computing a new hash
continues until we get one hash
T3
Version (4 B)
T2
hash forms one of the fields in the
block header (see Fig. 4). The ad-
T1
vantage of using the Merkle tree is
that it provides a compact and se-
cure representation of all of the
selected transactions.
of Header of
Hash Value
n – 1 Block
mining starts.
Nonce (4 B)
T3
B)
T2
Block Body
IEEE POTENTIALS September/October 20 2 3 ■ 27
The advantage of using the Merkle tree is that it change the nonce field—this is to say
that a miner tries a random number
provides a compact and secure representation of for the nonce field and computes the
all of the selected transactions. hash value of the block’s header. If
the computed hash value is smaller
than the target, the mining process is
of zeros for leading bits in the target active number of miners and the finished. Otherwise, the process con-
value. Furthermore, the nbits field block generation rate. The adjust- tinues with a different random num-
holds a compact representation of the ment keeps the block generation ber assigned to the nonce field. The
target value used for mining a block. time almost the same irrespective process is computationally intensive
In summary, the current dif- of the change in the collective min- because it uses brute force to search
ficulty level determines the target ing power (known as the hash rate) for a magic number for the nonce
value, which determines the value of the blockchain network. field that produces the desired block
for the nbits field. The difficulty To achieve a block hash value hash. The miner that solves this puz-
level is adjusted according to the smaller than the target value, miners zle earliest is the winning miner.
Step 1 Step 2
Node Miner
New
Coins
Reward for
Wallet Bob
Alice Wallet Mining
New Block
Bob
Wallet Bob Alice Wallet Wallet
Alice Wallet
FIG5 Various steps for creating, mining, verifying, and appending a new block.
IEEE POTENTIALS September/October 20 2 3 ■ 29
Blockchains have been classified in different ways possible operations. In other
words, an approved node does not
depending on numerous factors such as read, write require any additional permission
and commit permission settings, server hosting, to write and commit new trans-
conditions to join a blockchain network, and actions. It is worth noting that, if
multiple organizations or compa-
storing data (on or off-blockchain). nies work together to set up a
private permissionless block-
lockchains is based on the write
b implies minimum data privacy. chain, it is referred to as consor-
and commit permissions. Permis- Thanks to pseudonymity, the tium blockchain. Only the mem-
sionless blockchain denotes a set- loss of privacy is somewhat cov- ber entities of a consortium are
ting where all of the participating ered. Cryptocurrencies like Bit- allowed to join and operate. A
entities (by default) can perform coin and Ethereum fall under gover nmental land registry
write and commit operations. How- this category. (cadastral) service is an intrigu-
ever, write and commit permissions ■■Public permissioned blockchain, ing scenario in which this type of
are granted to only a few of the by default, grants access to any blockchain applies.
total nodes participating in a per- entity to join and read the dis- ■■Private permissioned blockchain
missioned blockchain. tributed ledger. However, only a is where entities need exclusive
few selected nodes can write and permission to join the network
Four different combinations commit new transactions, which and perform any operations (i.e.,
of blockchains brings in the element of centrali- read, write, and commit). Usual-
Blockchains can be further classi- ty. Supply chain management is ly, write and commit operations
fied by combining these four basic a suitable use case scenario for are exclusively retained by the
types of blockchain. These types are this type of blockchain. In the vetted node(s) of a single enter-
depicted in Fig. 6 and discussed as supply chain, only a few autho- prise or organization. Such
follows: rized entities can update the led- blockchains are appropriate for
■■Public permissionless blockchain ger, and others are allowed to scenarios where privacy is of par-
is a completely open and unre- read the updates. amount importance. However,
stricted paradigm. Any entity can ■■Private permissionless block- privacy is achieved at the cost of
freely join the network and chain exercises an approval- centralized control.
requires no permission to read, based entry mechanism for an
write, and commit operations. entity to join the network. Once Conclusion and discussion
Such blockchains provide maxi- an entity becomes a part of the Blockchain has emerged as a prom-
mum transparency, which system, it can perform all of the ising technology. It is envisioned to
Blockchain
Based on Type of Server Hosting, Based on Write and
Joining Restrictions, and Reading Rights Commit Permissions
Security
Interoperability of Legal Frameworks
Throughput Storage Vulnerabilities of Selection of Which
Different Blockchain and Standardization
Scalability Scalability Blockchain and Type of Blockchain
Platforms of Blockchains
Smart Contracts
Continuous growth in the blockchain landscape has directions,” IEEE Access, vol. 10,
pp. 69,160–69,199, Jun. 2022, doi:
proven to be beneficial for many existing use cases 10.1109/ACCESS.2022.3186892.
and applications, such as smart health care, • A. Upadhyay, S. Mukhuty, V.
education, public governance, and banking. Kumar, and Y. Kazancoglu, “Block-
chain technology and the circular
economy: Implications for sustain-
lead the future world of decentral- centralized Bus. Rev., p. 21,260, Oct. ability and social responsibility,”
ization and disintermediation. Its 2008. [Online]. Available: https:// J. Cleaner Prod., vol. 293, Apr. 2021,
salient features are immutability, assets.pubpub.org/d8wct41f/31611 Art. no. 126130, doi: 10.1016/j.jclepro.
disintermediation of third parties, 263538139.pdf 2021.126130.
enhanced security with nonrepu- • G. Hileman and M. Rauchs, • G. d S. R. Rocha, L. de Olivei-
diation, transparency with pseud- “Global cryptocurrency benchmark- ra, and E. Talamini, “Blockchain
onymity, provenance, and audit- ing study,” Cambridge Centre Alter- applications in agribusiness: A sys-
ability (Fig. 7). In recent years, native Finance, vol. 33, pp. 33–113, tematic review,” Future Internet, vol.
blockcha i n ha s been e volv i n g Sep. 2017. 13, no. 4, Apr. 2021, Art. no. 95, doi:
toward an extensive ecosystem. • B. Carson, G. Romanelli, P. 10.3390/fi13040095.
Some of the exciting roles offered Walsh, and A. Zhumaev, “Block- • A. Kalla, C. De Alwis, P. Po-
by such a n ecosystem a re t he chain beyond the hype: What is the rambage, G. Gür, and M. Liyanage,
blockchain infrastructure provid- strategic business value,” McKinsey “A survey on the use of blockchain
er, platform provider (i.e., Block- Company, vol. 1, pp. 1–13, Jun. for future 6G: Technical aspects,
chain as a service), decentralized 2018. [Online]. Available: https:// use cases, challenges and research
application provider, and mining w w w. m c k i n s e y.c o m/~/m e d i a/ directions,” J. Ind. Inf. Integr., vol.
solutions like cloud mining and M c K i n s e y/ B u s i n e s s % 2 0 F u n c - 30, Nov. 2022, Art. no. 100404, doi:
mining as a service. Continuous t i o n s/ M c K i n s e y % 2 0 D i g i t a l / 10.1016/j.jii.2022.100404.
grow th in the blockchain land- Our%20Insights/Blockchain%20 • S. P. Mohanty, V. P. Yanam-
scape has proven to be beneficial beyond%20the%20hype%20 baka, E. Kougianos, and D. Puthal,
for many existing use cases and What%20is%20the%20strategic% “PUFchain: A hardware-assisted
applications, such as smart health 2 0 b u s i n e s s % 2 0 v a l u e/ B l o c k blockchain for sustainable simul-
care, education, public governance, c h a i n - b e y o n d - t h e - h y p e -W h a t taneous device and data security
and banking. Figure 7 provides a -is-the-strategic-business-value.pdf in the internet of everything (IoE),”
panoramic v iew of the ex isting • T. Riasanow, F. Burckhardt, IEEE Consum. Electron. Mag., vol.
real-life use cases and futuristic D. Soto Setzke, M. Böhm, and H. 9, no. 2, pp. 8–16, Mar. 2020, doi:
intriguing applications. Krcmar, “The generic blockchain 10.1109/MCE.2019.2953758.
Nevertheless, as with any other ecosystem and its strategic impli- • S. Khan, W.-K. Lee, and S. O.
evolving technology, blockchain also cations,” 2018. [Online]. Available: Hwang, “AEchain: A lightweight
suffers from various issues. These ht t ps://w w w.resea rchgate.net/ blockchain for IoT applications,”
include low scalability in terms of prof i le/Tobias-R iasa now/publi- IEEE Consum. Electron. Mag., vol.
throughput (transactions per unit cat ion/325677489_T he_Gener ic 11, no. 2, pp. 64–76, Mar. 2022, doi:
time) and storage capacity; the pos- _ Blockcha in _ Ecosystem _ a nd 10.1109/MCE.2021.3060373.
sibility of privacy leakage; the non- _its_Strategic_Implications/l inks/
existence of legal frameworks and 5b1d66350f7e9b68b42bfd60/The About the author
standard bodies; interoperability -Gener ic-Blockcha in-Ecosystem Anshuman Kalla (a nshuma n.
among disparate blockchains; and -and-its-Strategic-Implications.pdf kalla@ieee.org) is a professor in the
vulnerability to security attacks • H. Vranken, “Sustainability of Department of Computer Engineer-
targeting different aspects, like the bitcoin and blockchains,” Current ing, Chhotubhai Gopalbhai Patel
consensus mechanism, P2P net- Opinion Environmental Sustainabil- Institute of Technology, Uka Tarsa-
work, and smart contracts (espe- ity, vol. 28, pp. 1–9, Oct. 2017, doi: dia University, Gujarat 394350,
cially given the rise of quantum 10.1016/j.cosust.2017.04.011. India. He is a Senior Member of
computing). Use case-specific ef- • N. E. Ioini and C. Pahl, “A re- IEEE. For more information, please
forts are required to effectively miti- view of distributed ledger technolo- visit https://sites.google.com/site/
gate these challenges to leverage the gies,” in Proc. OTM Confederated kallanshuman/.
maximum potential of blockchain Int. Conf. ‘Move Meaningful Internet
technology. Syst.’, Cham: Springer, 2018, pp.
277–288.
Read more about it • A. Verma et al., “Blockchain
• S. Nakamoto, “Bitcoin: A peer- for Industry 5.0: Vision, opportu-
to-peer electronic cash system,” De- nities, key enablers, a nd future
D
eepfakes are images or technique that swaps the face,
v ideos generated using speech, or actions (further referred
deep learning technology to as the likeness) of the original
to change the original subject w ith the likeness of
conditions of a piece of another. Popular examples of
media. Potential uses of this deepfakes include a 2019 video
technology range from satirical of P resident Oba ma swea r
content, depicting public figures i n g during a public ser vice
in comical scenarios; to generat announcement, a TikTok ac
ing audio to mimic a specific voice; count named deeptomcruise
to inserting the face of an unknow with more than 1.7 million
ing indiv idua l into potent ia lly followers created to specifical
embarrassing content, for example, ly publish deepfake videos,
a pornographic scene. As deepfake and a video of Mark Zuckerberg
technologies, such as autoencod announcing the deletion of Face
er s a nd generative adver sa r ia l book that garnered 72 million
net works (GA Ns), become more v iews. The ter m deepfake first
advanced and accessible, deepfakes appeared in 2017, when a Reddit
become easier to create and more user named deepfakes began
believable. This poses some serious publishing content to the
threats to individual and institu site depicting unknowing
tional safety, as scenes can be celebr it ies in por no
modified to alter public per graphic movies using
ception. Although technol a machine learning
ogy to identify deepfakes algorithm they had
does exist, it is essential c r e ate d ( ht t p s://
that these methods pro w w w.b b c .c o.u k/
gress as rapidly as bitesize/articles/
deepfake technology z f k wc qt). O t her
so that they remain potent ia lly ha r m
accurate. Additional ful deepfake content
ly, legal consequenc includes hoaxes, fake
es for deepfakes are news, and financial fraud.
limited, so continued ©SHUTTERSTOCK.COM/RROSELAVY As a r e su lt , i nc r e a si n g
advocacy for increased attention in general media
protection against false content Introduction forensics has been dedicated to
is crucial. detecting facial manipulation in
What are deepfakes? images and videos. Deepfake detec
The term deepfake refers to an t ion is becom i ng i ncreasi ng ly
Digital Object Identifier 10.1109/MPOT.2022.3229823
image or an audio or a video signal important as deepfakes become eas
Date of current version: 6 September 2023 generated by a deep learning-based ier to create and more believable.
0278-6648/23©2023IEEE IEEE POTENTIALS September/October 20 2 3 ■ 33
Although technology to identify deepfakes does Sebastien, 2020). These same vid
eos were also evaluated for fakeness
exist, it is essential that these methods progress using two different state-of-the-art
as rapidly as deepfake technology so that they deepfake-detection algorithms based
remain accurate. on the Xception (https://keras.io/
api/applications/xception/) a nd
EfficientNet (https://ai.googleblog.
Deepfake accessibility decade. Where once it was neces com/2019/05/efficientnet-improv
In years prior, creating content sary to possess a highly specialized ing-accuracy-a nd.html) models,
that believably replaced features set of technological skills, signifi which were pretrained separately
or components of a n image or cant financial resources, and spe on Google and Celeb-DF (https://
video with other features was pos cialized hardware and software, it github.com/yuezunli/celeb-deep
sible, but it was labor intensive, is now possible for an unskilled in fakeforensics) deepfake databases.
and it required special resources. dividual to create deepfakes on de When presented with high-quality
Computer-generated imagery (CGI) vices as basic as a cellphone, using deepfakes, 75.5% of participants
has seen great use in media and apps like FakeApp and Zao, with as were confused and could not con
dates back as far as the 1960s. little source material as a few self fidently determine whether the
One of the first publicly available ies in different head positions and video was fake or real. Obviously
examples of CGI used in popular facial expressions. (FakeApp “is a fake deepfakes proved easy for par
me d i a w a s a 49 - s a n i m at ion program that lets you create masks ticipants to detect; however, as the
c a l led Rendering of a Planned capable of swapping faces on videos deepfake quality increased, partici
Highway, wherein a car was dis by means of the artificial intelligence pants were more likely to incorrect
played t ravel i ng up a pla n ned developed by a Reddit user.” It can be ly assess the video as real, even in
highway at 110 km/h, created by accessed using the following link: situations where they felt certain of
t he Swedish Roya l Inst itute of https://www.malavida.com/en/soft/ their decision.
Technology on the BESK comput fakeapp/. Zao “is a free deepfake It is notable that these partici
er. This animation was broadcast face-swapping app that lets you re pants were primed to be looking for
on national television on 9 Novem place the face of popular characters fakes, and, even then, only 24.5%
ber 1961 (Du Rietz, 2016). in a video clip of a scene with your of participants were able to confi
Since then, CGI has made ap own face.” It can be accessed us dently identify high-quality deep
pearances in many feature films, ing the following link: https://zao. fakes as fake. In this study, the two
including Avatar, which was the first en.softonic.com/android.) algorithms tested were not as accu
full-length movie made using perfor This type of accessibility will, no rate in assessing deepfakes as fake
mance capture to create photorealis doubt, lead to a rise in deepfake cre when compared to human subjects;
tic characters and worlds. Work for ation and distribution, as more and however, the algorithms were better
Avatar started in 2006, and the film more people gain access to easy and at identifying fake videos that hu
was released in 2009; during this pe believable deepfake generators. This mans had confidently assessed as
riod, replacing real-life scenes with problem is only amplified by the rise being real.
nonoriginal content was extremely of social media, which makes the In reality, most people are not on
labor intensive. Nine hundred people dissemination of fake content easier the lookout for fake videos and may
were employed to work on the film; than it has ever been. be even more susceptible to believ
Microsoft created a new cloud com ing fake content. In recent years,
puting and digital asset manage Deepfake believability humans have become more appre
ment system called Gaia to permit Currently, there exists limited re hensive of photos, as photo editing
the crew to keep track of and coordi search on the believability of deep has become the norm, and humans
nate all stages of digital processing. fakes, especially the believability of are more wary of trusting photo
A 10,000-ft2 server farm with 35,000 earlier deepfakes from the late graphs. Despite this increasing dis
processor cores, and 3 PB of network 2010s, making it difficult to quanti trust, overall, people do still place a
area storage was used to render the fy how believability has increased. great deal of trust in photographic
data; this was considered one of the However, a recent studies have evidence and even more trust in
top 500 supercomputers in the world sought to determine how easy or videos displaying known faces and
at the time. difficult it is to detect deepfakes. voices. As deepfakes become more
Although a short deepfake may One 2020 study asked 60 par believable and humans continue to
not require the same amount of at ticipants to subjectively e valuate place trust in content that they can
tention and detail as a full-feature videos from a pool of 120 videos see, hear, and easily associate with
film like Avatar, technology for cre that ranged from being a clear fake known figures, deepfakes promise to
ating fake but believable content has to having a fakeness that was very be a great source of misinformation.
progressed very rapidly in the past difficult to discern (Korshunovf and This has had and will continue to
IEEE POTENTIALS September/October 20 2 3 ■ 35
Public trust in the news across the world is imagery of themselves could be put
into the same situation. Deepfakes
declining, and the continued distribution of fake of nonconsenting individuals could
news via deepfakes may potentially lead to greater also be used as a means of coercion,
public distrust. intimidation, or defamation. Legal
action against deepfake porn has
been taken in some states, such as
learning techniques, such as auto anyone poses a significant threat to Virginia, which has prohibited ha
encoders and GANs, that have made individual and societal security and rassment via the sharing of sexual
deepfakes easier to create through privacy. One extremely troubling images (Brown, 2019); however, this
the elimination of many manual ed fact about deepfakes is that most does not protect against all fake con
iting steps (Ajder et al., 2019). Huge tend to be pornographic in nature. tent, and Virginia is one of very few
amounts of publicly available foot According to a study in 2019 that states to enact such laws.
age of actors, politicians, and public assessed the content of 14,678 Additional concerns regarding
figures provide ample data for these deepfake videos available on the the potentially negative effects of
models to work from and generate Internet, 96% of those were porno deepfakes arise in the form of fake
high-quality deepfakes. Additional graphic (Ajder et al., 2019). Of the news and public deception. Public
work in artificial intelligence can be 96% of deepfakes available depict trust in the news across the world
used to synthesize high-quality audio, ing nonconsenting individuals in is declining, and the continued dis
mimicking the sound of human voices, pornographic situations, 90% of tribution of fake news via deepfakes
which, when paired with video results, those individuals were women. may potentially lead to greater pub
has the potential to create highly be The potential for harm in this lic distrust. As false news is shared
lievable clips of anyone who has pub scenario is obvious and can be at an alarming rate online, a shared
lished a significant amount of publicly evidenced by the struggles of one
mentality that anything is accept
available content. This rapidly evolving then-18-year-old woman, who was able online has become increasingly
technology has led to a variety of pos nonconsensually placed into hun prevalent, and people have become
sible photo and video manipulations. dreds of explicit images and videos of wary enough of news online that
a porn actress (Melville, 2019). This they have started to avoid it alto
Societal and individual type of content being publicly avail gether to avoid uncertainty.
threats of deepfakes able has put her reputation, career, However, uncertainty does not
For many reasons, fake and believ and personal safety at risk, and any necessarily imply distrust, and many
able content that can be created by one with enough publicly available have argued that some skepticism
when it comes to news may reduce
susceptibility to misinformation. One
TABLE 1. Harmful uses for deepfakes and their impact at the
societal, organizational, and individual levels. study from 2020 sought to examine
whether a group of individuals would
POTENTIAL AREAS OF IMPACT express greater distrust in news
REPUTATIONAL FINANCIAL shared on social media after expo
LEVEL DAMAGE REPERCUSSIONS MANIPULATION sure to a deepfake news clip when
compared to a group not exposed
Individuals • Defamation • Phishing-style • Targeted attacks to a deepfake. It was found that the
• Intimidation scams against politicians
deepfake group did exhibit signifi
• Abuse • Extortion
cantly more distrust in news on so
• Identity theft
cial media (Vaccari and Chadwick,
Organizations • Deteriorate trust • Insurance fraud • Fake educational
2020). If the public begins to feel they
• Damage brand • Stock-price materials
cannot trust the news, it will become
manipulation • Media
manipulation
increasingly difficult to acquire what
• Political attacks is considered real and meaningful
against a party or information on political and social
interest group events, leading to a poorly informed
• Fabricated court public. Other harmful uses for deep
evidence fakes and their impact on society are
Society • Potential for electoral manipulation/influence on political party listed in Table 1.
impressions by domestic or foreign bodies
• Deterioration of public trust in media and/or societal cohesion Benefits of deepfakes
and norms While there clearly are many mali
• Deliberate fear mongering, inciting public tension/panic/ cious uses for deepfakes, they do
conflict
not come without some benefits.
IEEE POTENTIALS September/October 20 2 3 ■ 37
To combat the various negative consequences, a 2020, Art. no. 2056305120903408,
doi: 10.1177/2056305120903408.
proactive legal and computational approach • A. Jaiman, “Positive use cases
to detecting and exposing deepfakes of synthetic media (aka deepfakes),”
should be employed. Medium, Aug. 2020. [Online]. Avail
able: https://towardsdatascience.
com/positive-use-cases-of-deep
Conclusion • P. Korshunovf and M. Sebastien, fakes-49f510056387#:~:text=A I%
Deepfakes pose a serious threat to “Deepfake detection: Humans vs. ma 2DGenerated % 20 Sy nt het ic%20
individual safety, public opinion, chines,” 2020, arXiv:2009.03155. Media%2C%20a ka,cr imina l%20
and political attitudes. A relatively • A. Zucconi. (2019). An introduc forensics%2C%20and%20artistic
nascent technology, deepfakes only tion to neural networks and autoen %20expression
first appeared in 2017 on the plat coders. [Online]. Available: https:// • S. Tariq, S. Lee, and S. Woo,
form Reddit, and, since then, this www.alanzucconi.com/2018/03/14/ “One detector to rule them all:
technology has rapidly advanced, an-introduction-to-autoencoders/ Towards a general deepfake attack
leading to more realistic deepfakes • I. Goodfellow et al., “Genera detection framework,” in Proc. Web
and more accessible means to cre tive adversarial networks,” Commun. Conf., Apr. 2021, pp. 3625–3637,
ate them. Through the use of pub ACM, vol. 63, no. 11, pp. 139–144, doi: 10.1145/3442381.3449809.
licly available algorithmic strate Nov. 2020, doi: 10.1145/3422622. • R . P o r t m a n . 117 t h C O N
gies, such as autoencoders and • M. S. Rana and A. H. Sung, GR ESS (2021-2022). (2021, Aug.
GA Ns, deepfake technology has “DeepfakeStack: A deep ensemble- 4 ). S.2559 - Deepfake Task Force
progressed at staggering rates, and based learning technique for deep Act. Congress.gov. [Online]. Avail
t hese te ch nolog ies h ave be en fake detection,” in Proc. 7th IEEE Int. able: https://w w w.congress.gov/
employed in various deepfake gen Conf. Cyber Secur. Cloud Comput. bill/117th-congress/senate-bill/
erators. Wit h t h is tech nolog y, (CSCloud)/6th IEEE Int. Conf. Edge 2559?q=%7B%22search%22%3A
unknowing victims can be depicted Comput. Scalable Cloud (EdgeCom), %5B%22S.2559%22%5D%7D&s=1
in potentially harmful situations, 2020, pp. 70–75, doi: 10.1109/CSC &r=1
such as pornography; politicians loud-EdgeCom49738.2020.00021.
can be made to appear in scenes or • H. Ajder, G. Patrini, F. Cavalli, About the authors
saying things that will have serious and L. Cullen, The State of Deep- Jennifer A. Fehring ( j.fehring@
consequences for the society at fakes: Landscape, Threats, and Im- northeastern.edu) earned her B.S.
large; and fake news can be created pact, vol. 27. Amsterdam, The Neth degree from Carleton College in
and distributed to sway the public. erlands: Deeptrace, Sep. 2019. Northfield Minnesota. She is cur
Conversely, various benefits arise • K . Melv i l le, “ T he i nsidious rently a master’s degree student at
from deepfake technology, such as rise of deepfake porn videos and Khoury College of Computer Scienc
advances in art, film, and medi one woman who won’t be silenced,” es, Northeastern University, Boston,
cine. Overall, we should strive to ABC News Aust., Aug. 2019. [On MA USA. Her research interests are
maximize the benefits and mini line]. Available: https://www.abc. primarily in privacy and security.
mize the harm posed by deepfakes net.au/news/2019-08-30/deepfake Tamara Bonaci (t.bonaci@
by taking a proactive approach to -revenge-porn-noelle-martin-story northeastern.edu) earned her B.S.
identifying false content, verifying -of-image-based-abuse/11437774 degree from the University of Zagreb
the origins of online information, • N. I. Brow n, “Congress wants and her M.S. and Ph.D. degrees
and advocating for increased legal to solve deepfakes by 2020. That from the University of Washington.
measures to hold individuals and should worry us,” Slate Mag., Jul. She is an assistant teaching profes
platforms accountable for the cre 2019. Accessed: Oct. 16, 2019. sor at Khoury College of Computer
ation and distribution of harmful [Online]. Available: https://slate. Sciences, Northeastern University,
deepfake content. com/technology/2019/07/congress Boston, MA USA, and an affiliate
-deepfa ke-regulat ion-230-2020. assistant professor in the Depart
Read more about it html ment of Electrical and Computer
• P. D. Rietz, “Svensk datorhisto • C. Vaccari and A. Chadwick, Engineering, University of Washing
ria – 1960-talet,” Tekniska museet, “Deepfakes and disinformation: ton, Seattle, WA, USA. Her research
Stockholm, Sweden, Dec. 2016. [On Exploring the impact of synthetic interests include security, privacy,
line]. Available: https://www.teknis political video on deception, uncer and the societal impact of emerging
kamuseet.se/lar-dig-mer/datorhisto tainty, and trust in news,” Social technologies, with a special interest
ria/svensk-datorhistoria-1960-talet/ Media Soc., vol. 6, no. 1, Jan./Mar. in biomedical technologies.
Raymond E. Floyd
I
n t he electronic environ- interesting challenge to the devel-
ment of today, the sophis- opers of the many software
tication of a user can- applications offered to the
not be anticipated to user community today.
be at any particu- For example, the owner
lar advanced level. As of a Brand X smartphone
a m at t er of f act , wishes to change some-
users ra nge from one’s home telephone
f i r st g r ader s, t o number but not the
i nd i v idua ls w it h mobile number in the
adva nced k nowl- contact list. Selecting
edge, to elders with the CONTACT icon
little or no technical brings the user to the
background. As a contact list. He or she
result, a much great- then pages to the par-
er burden is placed on ticular person’s number
software developers to to be changed. Selecting
ensure the product they that picture, or icon, pres-
release operates correctly ents the user with a page of
under any conceivable key contact information, including
entry from a user. Anything less the home and mobile telephone
can be a disaster for a product, or numbers as well as email and mail-
©SHUTTERSTOCK.COM/OLEKSANDRSHNURYK
set of products, due to customer ing addresses.
dissatisfaction and complaints. At the top of the display, the
Whether one is wandering a they need and ignore all of the oth- user can see two options: EDIT and
street in a city, sitting and enjoy- er things their device is capable of. MORE. From the user’s perspec-
ing a meal in a restaurant, or walk- In that respect, they don’t know if tive, neither fits—he or she wants to
ing the halls of a high school or their device performs correctly or CHANGE the home phone number.
college, there will be people intent not, as long as what they wish to do If the user selects EDIT, the screen
on some subject matter on their is done properly. looks the same, except now there is
smartphones, iPads, or other mod- the option to EXIT or SAVE, but the
ern devices. In many cases, they are The user’s perspective user hasn’t done anything. He or
oblivious to the world around them. B e yond t h at v a st nu mb er of she then selects the GO BACK but-
While the majority of these indi- advanced users is an equally large ton, returning to the first screen.
viduals understand the technology group of those who may have little or Now, the user taps MORE and
they are using, at the user level, it no technical knowledge. They are not arrives at a set of options ranging
is doubtful that their knowledge sophisticated to the point that they from DELETE to ???. He or she may
goes much deeper. They use what can use current products as their reason that the number must be
predecessors did, e.g., the dial tele- deleted before it can be changed.
Digital Object Identifier 10.1109/MPOT.2019.2910303
phone versus the smartphone. This Unfortunately, if the user selects
Date of current version: 6 September 2023 lack of understanding presents an DELETE, he or she is on the verge
0278-6648/23©2023IEEE IEEE POTENTIALS September/October 20 2 3 ■ 39
of deleting the contact. Even the application could output a message The success or acceptance of a
warning message “Do you want to similar to this: particular application depends heav-
delete this contact?” may not reg- ily on the knowledge and skills of the
ister with the user. If the user does E nt e r t e mp e r at u r e t o b e developer. While many developers get
choose the DELETE option, he or converted: wrapped up in the nuances and ele-
she now finds that the process of gance of an application, the develop-
entering that contact needs to be Does the developer expect a scale er who will most often be successful
restarted, hopefully with the new identifier (“F,” “C,” “K,” or “R”), or is is the one who can take a step back
telephone number as well as all the user to input the value to be and view the product from the user’s
of the other information that had converted? It would be better to out- perspective. That does not limit the
been included. put a message such as this: developer to elegant solutions, as
Of course, the developer may say long as he or she remembers that the
that the user should have read the Enter temperature scale being user does not see the elegance, only
manual before attempting this ac- converted from: the results. Testing new products for
tion. The Brand X manual is about the complete and proper operation
300 pages in length and written to a Of course, then the user may input can be time-consuming and boring,
high school graduate level of under- “F,” “C,” “K,” or “R,” or he or she but, when it is done completely and
standing and language—not a par- might enter “f,” “c,” “k,” or “r,” not correctly, the user benefits from a
ticularly good combination for the knowing the developer is expecting truly operational application and the
casual user. uppercase letters, not lowercase— developer from a successful product.
Perhaps the most fundamental and the program does not function
problem rests with the developer, who as expected. Either the message to About the author
understands what he or she is trying the user must be explicit, or the Raymond E. Floyd (r.f loyd@ieee
to do and the method programmed program should be flexible enough .org) earned his B.S.E.E. degree
to achieve a particular goal. Unfortu- to accept either (and ignore any from the Florida Institute of Tech-
nately, users most often will not have other entry from the user). nology, Melbourne, Florida, USA, in
that level of understanding—they If the developer does not under- 1970; his M.S.E.E. degree from
bring only an anticipation of suc- stand the relationships between the Florida Atlantic University, Boca
cess in using the particular tech- various scales, this could also pro- Raton, Florida, USA, in 1977; and
nology. There is also some level of duce invalid results. For example, his Ph.D. degree in engineering man-
confidence that all possible entries when converting from °F to K, the agement from California Coast Uni-
have been tested during the devel- formula is given as versity, Santa Ana, California, USA,
opment phase of the product, and, in 2009. He spent 26 years with IBM,
K = cF + 459.67.
therefore, the product cannot per- Armonk, New York, USA, retiring in
form incorrectly. That is an assump- If a user were to enter –460 °F, the 1992 as a senior engineer. He was
tion for most products, which is more result might be displayed as programmer for more than 40 years,
often not true. It is a difficult task to programming in a wide variety of
cK = - 0.33.
ensure that “every possible” selection languages. He was an adjunct pro-
has been tested. Even when the nor- Such a result provides two incorrect fessor for three years at Florida
mal developer testing has been com- identities. First, since the late 1960s, Atlantic University and was a visit-
pleted and some user testing done, the Kelvin temperature has been ing lecturer at Northwest College in
there will be various combinations of designated as an absolute number, Powell, Wyoming, 82435, USA. He
inputs that have not been included not degrees. The answer should was a Life Senior Member of IEEE,
but will often happen in the world of appear as life senior member of the Society
the using community. of Manufacturing Engineers, and
K = - 0.33.
member of the Society of Petroleum
The developer’s knowledge The second problem is that the Kelvin Engineers and the American Soci-
A second cha llenge, less often scale is also known as absolute zero; ety for Engineering Education. He
encountered, is a lack of under- therefore, K may never be a negative most recently coauthored a text,
standing on the part of the develop- number (at least in current physics Perspectives on Engineering (2011);
er regarding the problem being definitions). This is something the an IEEE e-book, Shaping an Engi-
solved. A simple example is in the developer must know and guard neering Career: Book 2: Dual Career
conversion of temperatures from against, outputting a message to the Ladders (2013); and another text,
one scale to another, say degrees user that the temperature entered in So You Want To Be an Engineer?
Celsius (°C) to degrees Fahrenheit °F is not valid and cannot be lower (2015). He passed away in May,
(°F) or °F to kelvin (K). [Typically, than –459.67 (K = 0). As an aside, the 2023, after a lifetime of contribu-
temperatures will be in °F, °C, K, or Rankin scale also has this same lower tions to the field.
degrees Rankin (°R)]. A typical limit but is expressed in degrees.
1-800-493-IEEE (4333)
To learn more*, visit IEEEinsurance.com/10Year LIFE INSURANCE