Pub Date : 2023-01-01DOI: 10.1109/mpot.2018.2867240
R. Floyd
Unless you are an engineer—more specifically, a power engineer—it is doubtful that you have ever given a single thought to what is behind the switch whenever you turn on lights, televisions, radios, or other electrical devices. The normal expectation is that, when the switch is thrown, the lights come on—each and every time. Outstanding availability and reliability are expected of the system. Other than a couple of wires running from a telephone pole to the house or, perhaps, an underground cable from a box at the side of the street, just what is the power grid, and what is its history?
{"title":"AC, dc, or both? [Essay]","authors":"R. Floyd","doi":"10.1109/mpot.2018.2867240","DOIUrl":"https://doi.org/10.1109/mpot.2018.2867240","url":null,"abstract":"Unless you are an engineer—more specifically, a power engineer—it is doubtful that you have ever given a single thought to what is behind the switch whenever you turn on lights, televisions, radios, or other electrical devices. The normal expectation is that, when the switch is thrown, the lights come on—each and every time. Outstanding availability and reliability are expected of the system. Other than a couple of wires running from a telephone pole to the house or, perhaps, an underground cable from a box at the side of the street, just what is the power grid, and what is its history?","PeriodicalId":39514,"journal":{"name":"IEEE Potentials","volume":"42 1","pages":"49-51"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44244091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1109/MPOT.2021.3103155
Anna Felicia, W. Wong, F. Juwono, I. Chew
In December 2019, the world was shaken by the discovery of a novel type of pneumonia virus that had not been observed before. The disease was caused by severe acute respiratory syndrome coronavirus 2, and the disease was officially named COVID-19 by the World Health Organization (WHO) in March 2020. Also in that month, the WHO announced that COVID-19 could be categorized as a pandemic.
{"title":"The ground zero of teaching and learning evolution: A case study of Malaysian universities","authors":"Anna Felicia, W. Wong, F. Juwono, I. Chew","doi":"10.1109/MPOT.2021.3103155","DOIUrl":"https://doi.org/10.1109/MPOT.2021.3103155","url":null,"abstract":"In December 2019, the world was shaken by the discovery of a novel type of pneumonia virus that had not been observed before. The disease was caused by severe acute respiratory syndrome coronavirus 2, and the disease was officially named COVID-19 by the World Health Organization (WHO) in March 2020. Also in that month, the WHO announced that COVID-19 could be categorized as a pandemic.","PeriodicalId":39514,"journal":{"name":"IEEE Potentials","volume":"42 1","pages":"21-26"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43447036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.1109/MPOT.2022.3198928
G. Spathoulas
Blockchain technology has emerged as the means to change the structure of the Internet and build more trustful and secure services. While deploying an application to a blockchain network brings significant development overhead, the level of decentralization and security offered by permissionless blockchain systems has triggered a huge interest in the technology and a high demand for using existing networks. This increased demand has highlighted the most significant problem of public blockchain systems, scalability in terms of the transaction processing rate. The first generation of blockchain systems is characterized by very low transaction processing rates that, in combination with high usage demand, trigger high latency and high usage fees.
{"title":"Scaling up public blockchains","authors":"G. Spathoulas","doi":"10.1109/MPOT.2022.3198928","DOIUrl":"https://doi.org/10.1109/MPOT.2022.3198928","url":null,"abstract":"Blockchain technology has emerged as the means to change the structure of the Internet and build more trustful and secure services. While deploying an application to a blockchain network brings significant development overhead, the level of decentralization and security offered by permissionless blockchain systems has triggered a huge interest in the technology and a high demand for using existing networks. This increased demand has highlighted the most significant problem of public blockchain systems, scalability in terms of the transaction processing rate. The first generation of blockchain systems is characterized by very low transaction processing rates that, in combination with high usage demand, trigger high latency and high usage fees.","PeriodicalId":39514,"journal":{"name":"IEEE Potentials","volume":"41 1","pages":"26-31"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43909533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.1109/MPOT.2022.3208395
Ramesh Ramadoss
In 2009, Bitcoin was launched as peer-to-peer electronic cash. Bitcoin inspired the launch of several other cryptocurrencies. Bitcoin set the stage for a new field called blockchain, which is a special case of distributed ledger technology (DLT). In 2015, programmable blockchain/DLT projects, such as Ethereum, Hyperledger Fabric, and R3 Corda, were launched. Over the last decade, blockchain/DLT has evolved to encompass a collection of distributed computer network architectures implementing various data structures, decentralized consensus protocols, and economic incentive models. In this rapidly emerging field, some remarkable innovations, experimentations, and developments have been carried out by start-ups, enterprises, and governments. This article will highlight various current and future applications of this technology.
{"title":"Blockchain technology: An overview","authors":"Ramesh Ramadoss","doi":"10.1109/MPOT.2022.3208395","DOIUrl":"https://doi.org/10.1109/MPOT.2022.3208395","url":null,"abstract":"In 2009, Bitcoin was launched as peer-to-peer electronic cash. Bitcoin inspired the launch of several other cryptocurrencies. Bitcoin set the stage for a new field called blockchain, which is a special case of distributed ledger technology (DLT). In 2015, programmable blockchain/DLT projects, such as Ethereum, Hyperledger Fabric, and R3 Corda, were launched. Over the last decade, blockchain/DLT has evolved to encompass a collection of distributed computer network architectures implementing various data structures, decentralized consensus protocols, and economic incentive models. In this rapidly emerging field, some remarkable innovations, experimentations, and developments have been carried out by start-ups, enterprises, and governments. This article will highlight various current and future applications of this technology.","PeriodicalId":39514,"journal":{"name":"IEEE Potentials","volume":"41 1","pages":"6-12"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42032425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.1109/MPOT.2022.3204849
Safiullah Khan, W. Lee, Abdul Majeed, Seong Oun Hwang
The Internet of Things (IoT) typically comprises sensors that have inadequate computational resources. On the contrary, blockchain technology is thought to be expensive in terms of resource consumption due to the consensus procedures involved. As a result, the application of blockchain to the IoT environment is a challenging task. The most appropriate solution lies in replacing the computationally heavy consensus algorithms with lightweight counterparts. Proof of authentication (PoAh) is the most suited replacement for such an environment. Several modifications have been proposed for PoAh during the last few years, and they are reviewed here.
{"title":"Blockchain meets lightweight cryptography","authors":"Safiullah Khan, W. Lee, Abdul Majeed, Seong Oun Hwang","doi":"10.1109/MPOT.2022.3204849","DOIUrl":"https://doi.org/10.1109/MPOT.2022.3204849","url":null,"abstract":"The Internet of Things (IoT) typically comprises sensors that have inadequate computational resources. On the contrary, blockchain technology is thought to be expensive in terms of resource consumption due to the consensus procedures involved. As a result, the application of blockchain to the IoT environment is a challenging task. The most appropriate solution lies in replacing the computationally heavy consensus algorithms with lightweight counterparts. Proof of authentication (PoAh) is the most suited replacement for such an environment. Several modifications have been proposed for PoAh during the last few years, and they are reviewed here.","PeriodicalId":39514,"journal":{"name":"IEEE Potentials","volume":"41 1","pages":"38-42"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43635938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.1109/MPOT.2022.3198929
Yebo Feng, Jiahua Xu, L. Weymouth
Since its conceptualization, blockchain technology has witnessed continuous and rapid development, bringing profound changes to computer science, law, and economics. In 2008, the initial blockchain system was merely a growing list of records linked together using cryptography. Today, however, blockchains have become the foundation of most digital currencies, robust cloud computing platforms, and dependable databases for tracking supply chain information. Despite challenges and controversies, blockchain technology has the potential to help build a trustworthy and efficient digital world.
{"title":"University Blockchain Research Initiative (UBRI): Boosting blockchain education and research","authors":"Yebo Feng, Jiahua Xu, L. Weymouth","doi":"10.1109/MPOT.2022.3198929","DOIUrl":"https://doi.org/10.1109/MPOT.2022.3198929","url":null,"abstract":"Since its conceptualization, blockchain technology has witnessed continuous and rapid development, bringing profound changes to computer science, law, and economics. In 2008, the initial blockchain system was merely a growing list of records linked together using cryptography. Today, however, blockchains have become the foundation of most digital currencies, robust cloud computing platforms, and dependable databases for tracking supply chain information. Despite challenges and controversies, blockchain technology has the potential to help build a trustworthy and efficient digital world.","PeriodicalId":39514,"journal":{"name":"IEEE Potentials","volume":"41 1","pages":"19-25"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46178967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.1109/MPOT.2022.3206563
Devang Jain, Sharad Sinha
SolSec Labs is a web-based application that provides interactive training labs for blockchain developers, especially students eager to learn more about smart contract security to gain practical knowledge (Fig. 1). It teaches solidity and smart contract security skills through hands-on experience. The easy-to-understand environment enables students and early developers to immediately apply newly learned secure coding practices to their ongoing projects. Currently, it consists of a total of 10 labs crafted using examples taken from the most severe real-world vulnerabilities. Every lab teaches developers about the related vulnerability; exploitation methods; preventive and remediation measures; and, finally, a step-by-step list of lab tasks to perform to secure the presented vulnerable code.
{"title":"SolSec Labs: Virtual labs for learning smart contract security","authors":"Devang Jain, Sharad Sinha","doi":"10.1109/MPOT.2022.3206563","DOIUrl":"https://doi.org/10.1109/MPOT.2022.3206563","url":null,"abstract":"SolSec Labs is a web-based application that provides interactive training labs for blockchain developers, especially students eager to learn more about smart contract security to gain practical knowledge (Fig. 1). It teaches solidity and smart contract security skills through hands-on experience. The easy-to-understand environment enables students and early developers to immediately apply newly learned secure coding practices to their ongoing projects. Currently, it consists of a total of 10 labs crafted using examples taken from the most severe real-world vulnerabilities. Every lab teaches developers about the related vulnerability; exploitation methods; preventive and remediation measures; and, finally, a step-by-step list of lab tasks to perform to secure the presented vulnerable code.","PeriodicalId":39514,"journal":{"name":"IEEE Potentials","volume":"41 1","pages":"13-18"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43975173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}