Professional Documents
Culture Documents
11 Spectrum 22MED
11 Spectrum 22MED
Transportation EVs are It’s a better way to move Metamaterials boost range TECHNOLOGY
INSIDER
just the start data around and bandwidth, too
P.28 P.34 P.40 NOVEMBER 2022
Rewiring
the Brain
to Smell
Again
Trailblazers.
Meet the Lock-in Amplifiers that
measure microwaves.
Watch now
Zurich
Instruments
VOLUME 59 / ISSUE 11 NOVEMBER 2022
A Bionic Nose
to Smell the Roses
22
Again
This neuroprosthetic could
the Job
transportation system
in its entirety.
By Heather L. MacLean,
of Coding Alexandre Milovanoff &
I. Daniel Posen
Machine-learning language models
are increasingly capable
at computer programming.
To the
InterPlanetary
34
By Craig S. Smith
File System—
and Beyond!
Peer-to-peer file sharing
on the Internet offers key
advantages.
By Yiannis Psaras, Jorge M.
Soares & David Dias
6G’s Metamaterials
Solution
40
Reconfigurable intelligent
surfaces could unlock vast
amounts of bandwidth.
By Marios Poulakis
EDITOR’S NOTE 2
NEWS 5
Quantum-“Safe” Crypto
India’s Web3 Uber
Hydrogen From Air
COVER PHOTO: TIM MACPHERSON/GETTY IMAGES
HANDS ON 16
Passive radar is just one
of the KrakenSDR’s tricks.
CAREERS 19
PAST FORWARD 48
Paean to Pong
ON THE COVER:
Photo-illustration by Gluekit
AI Helps Humans
Level Up
Chess players and programmers now
have access to tools that can improve community of some 93 million players and a central
skills and unleash creativity player in the cheating controversy.
While it is certainly true that bad actors use AI
to cheat at chess—potentially posing an existential
threat to the game, as Carlsen has suggested—it is
B
ack in the mid-1970s, IEEE Spectrum senior “Expert equally true that the chess world has openly
editor Phil Ross played one of the first chess embraced AI and has been thriving as a result. Sim-
programs capable of vanquishing humans.
programmers ilar risk/reward calculations will need to be made in
He capitulated quickly—too quickly, it will still be other domains.
turned out: Although the program that beat him was needed Take software development. On page 5 in this
good at openings and the middle game, it was terrible to make issue, the journalist Craig S. Smith looks at the pro-
at the end game. Fast forward 50 years and the high- breakthrough liferation of AI-powered code-writing assistants and
est-ranked chess players in the world are AIs, with programming how they can help programmers compose better
humans trailing far behind. innovations, programs faster and guide nonprogrammers to
As Ross points out in his online piece “AI’s Grand- like the next instantiate their ideas in software. As for the risk of
master Status Overshadows Chess Scandal,” the these AI assistants driving humans out of program-
generation
recent brouhaha involving world champion Magnus ming, the experts Smith talked to don’t believe that
Carlsen and up-and-comer Hans Niemann highlights
of AI-infused human coders are going to be replaced anytime soon.
how chess-playing AIs, referred to as “engines” by tools or Instead, programmers are learning that AI can
the cognoscenti, have overtaken humans in terms of post-AI automate routine tasks such as writing unit tests that
raw game-playing accuracy. The scandal also shows supertools.” verify discrete chunks of code, which can free up time.
how AIs are being used by players at all levels to get —Ben Amazon’s CodeWhisperer, GitHub’s Copilot, and
better faster, fostering a boom in the sport. Shneiderman Microsoft’s TiCoder are all based on large language
If you were born a few decades ago, your best shot models trained up on massive code bases. Among
comsol.com/feature/multiphysics-innovation
Innovate
smarter.
Analyze virtual prototypes and
develop a physical prototype
only from the best design.
Innovate with
multiphysics
simulation.
Base your design decisions
on accurate results with
software that lets you study
unlimited multiple physical
effects on one model.
CONTRIBUTORS
HEATHER L. MACLEAN
MacLean, a professor of chemical
engineering and applied chemistry
ACTING EDITOR IN CHIEF Harry Goldstein, h.goldstein@ieee.org IEEE BOARD OF DIRECTORS
at the University of Toronto, last PRESIDENT & CEO K.J. Ray Liu, president@ieee.org
EXECUTIVE EDITOR Jean Kumagai, j.kumagai@ieee.org
wrote for us in 2001, in an article on +1 732 562 3928 Fax: +1 732 981 9515
MANAGING EDITOR Elizabeth A. Bretz, e.bretz@ieee.org
hybrid cars. On page 28, she and PRESIDENT-ELECT Saifur Rahman
CREATIVE DIRECTOR TREASURER Mary Ellen Randall
her colleagues Alexandre Milovanoff Mark Montgomery, m.montgomery@ieee.org SECRETARY John W. Walz
and I. Daniel Posen now turn a PRODUCT MANAGER, DIGITAL Erico Guizzo, e.guizzo@ieee.org PAST PRESIDENT Susan K. “Kathy” Land
critical eye toward pure-electric EDITORIAL DIRECTOR, CONTENT DEVELOPMENT
vehicles. “We still feel that EVs VICE PRESIDENTS
Glenn Zorpette, g.zorpette@ieee.org
Stephen M. Phillips, Educational Activities; Lawrence O. Hall,
have bright promise,”says MacLean. SENIOR EDITORS Publication Services & Products; David A. Koehler, Member &
“It’s just that they aren’t enough Evan Ackerman (Digital), ackerman.e@ieee.org Geographic Activities; Bruno Meyer, Technical Activities;
Stephen Cass (Special Projects), cass.s@ieee.org
on their own.” James E. Matthews, President, Standards Association;
Samuel K. Moore, s.k.moore@ieee.org Deborah M. Cooper, President, IEEE-USA
Tekla S. Perry, t.perry@ieee.org
Philip E. Ross, p.ross@ieee.org DIVISION DIRECTORS
MARIOS POULAKIS David Schneider, d.a.schneider@ieee.org Franco Maloberti (I); Ruth A. Dyer (II); Khaled Ben Letaief (III);
Eliza Strickland, e.strickland@ieee.org Manfred “Fred” J. Schindler (IV); Cecilia Metra (V); Paul M.
After graduating from university,
ART & PRODUCTION Cunningham (VI); Claudio Cañizares (VII); Christina M. Schober
Poulakis spent a year with a team DEPUTY ART DIRECTOR Brandon Palacio, b.palacio@ieee.org (VIII); Ali H. Sayed (IX); Dalma Novak (X)
from Greek mobile operator PHOTOGRAPHY DIRECTOR Randi Klett, randi.klett@ieee.org
Cosmote, mapping wireless signal ONLINE ART DIRECTOR Erik Vrielink, e.vrielink@ieee.org REGION DIRECTORS
PRINT PRODUCTION SPECIALIST Greg T. Gdowski (1); Barry C. Tilton (2); Theresa A. Brunasso (3);
strength all over Athens. “This Sylvana Meneses, s.meneses@ieee.org Johnson A. Asumadu (4); Bob G. Becnel (5); Timothy T. Lee (6);
is what triggered my interest in MULTIMEDIA PRODUCTION SPECIALIST Robert L. Anderson (7); Antonio Luque (8); Enrique A. Tejera (9);
optimization of wireless networks,” Michael Spector, m.spector@ieee.org Deepak Mathur (10)
WEB PRODUCTION Michael Novakovic, m.novakovic@ieee.org
he explains. Today, as a senior
NEWS MANAGER Margo Anderson, m.k.anderson@ieee.org DIRECTOR EMERITUS Theodore W. Hissey
technology planning engineer at
ASSOCIATE EDITORS
Huawei Technologies in Sweden, IEEE STAFF
Willie D. Jones (Digital), w.jones@ieee.org
he is working on one of the most Michael Koziol, m.koziol@ieee.org
EXECUTIVE DIRECTOR & COO Stephen Welby
+1 732 562 5400, s.p.welby@ieee.org
advanced technologies in that field: SENIOR COPY EDITOR Joseph N. Levine, j.levine@ieee.org CHIEF INFORMATION OFFICER Cherif Amirat
reconfigurable intelligent surfaces, COPY EDITOR Michele Kogon, m.kogon@ieee.org +1 732 562 6017, c.amirat@ieee.org
which he describes on page 40. EDITORIAL RESEARCHER Alan Gardner, a.gardner@ieee.org CHIEF MARKETING OFFICER Karen L. Hawkins
EDITORIAL INTERN Dina Genkina, d.genkina@ieee.org +1 732 562 3964, k.hawkins@ieee.org
CONTRACT SPECIALIST Ramona L. Foster, r.foster@ieee.org PUBLICATIONS Steven Heffner
+1 212 705 8958, s.heffner@ieee.org
YIANNIS PSARAS CONTRIBUTING EDITORS Robert N. Charette, Steven C herry,
CORPORATE ACTIVITIES Donna Hourican
Charles Q. Choi, Peter Fairley, Edd Gent, W. Wayt Gibbs, Mark Harris,
Psaras is a research scientist at +1 732 562 6330, d.hourican@ieee.org
Allison Marsh, Prachi Patel, Julianne Pepitone, Lawrence Ulrich,
MEMBER & GEOGRAPHIC ACTIVITIES Cecelia Jankowski
Protocol Labs, in London. His Emily Waltz
+1 732 562 5504, c.jankowski@ieee.org
coauthors, Jorge M. Soares and THE INSTITUTE STANDARDS ACTIVITIES Konstantinos Karachalios
EDITOR IN CHIEF Kathy Pretz, k.pretz@ieee.org
David Dias, also work at Protocol +1 732 562 3820, constantin@ieee.org
ASSISTANT EDITOR Joanna Goodrich, j.goodrich@ieee.org EDUCATIONAL ACTIVITIES Jamie Moesch
Labs, where Soares is a technical
DIRECTOR, PERIODICALS PRODUCTION SERVICES Peter Tuohy +1 732 562 5514, j.moesch@ieee.org
program manager and Dias is ADVERTISING PRODUCTION MANAGER GENERAL COUNSEL & CHIEF COMPLIANCE OFFICER
research director. In this issue, Felicia Spagnoli, f.spagnoli@ieee.org Sophia A. Muirhead +1 212 705 8950, s.muirhead@ieee.org
they describe a system for SENIOR ADVERTISING PRODUCTION COORDINATOR CHIEF FINANCIAL OFFICER Thomas R. Siegert
Nicole Evans Gyimah, n.gyimah@ieee.org +1 732 562 6843, t.siegert@ieee.org
peer-to-peer file sharing on the TECHNICAL ACTIVITIES Mary Ward-Callan
ADVERTISING PRODUCTION +1 732 562 6334
Internet [p. 34]. It’s called the +1 732 562 3850, m.ward-callan@ieee.org
EDITOR IN CHIEF EMERITUS Susan Hassler, s.hassler@ieee.org
InterPlanetary File System because, ACTING MANAGING DIRECTOR, IEEE-USA Russell T. Harrison
EDITORIAL ADVISORY BOARD, IEEE SPECTRUM +1 202 530 8326, r.t.harrison@ieee.org
in theory, it could one day provide Susan Hassler, Chair; Ella M. Atkins, Robert N. Charette, Francis J.
an efficient way to pass files Doyle III, Matthew Eisler, Shahin Farshchi, Alissa Fitzgerald, Jonathan IEEE PUBLICATION SERVICES & PRODUCTS BOARD
between different planets. “For now, Garibaldi, Benjamin Gross, Lawrence O. Hall, Jason K. Hui, Leah H. Lawrence O. Hall, Chair; Stefano Galli, Nazanin Bassiri Gharb,
Jamieson, Mary Lou Jepsen, M ichel M. Maharbiz, Somdeb Majumdar, James Irvine, Clem Karl, Hulya Kirkici, Yong Lian, Fabrizio Lombardi,
though, we’re focused on rolling Lisa May, Carmen S. Menoni, Ramune Nagisetty, Paul Nielsen, Sofia Peter Luh, Anna Scaglione, Gaurav Sharma, Isabel Trancoso,
it out for just Earth!” says Psaras. Olhede, Christopher Stiller, Wen Tong, Boon-Lock Yeo Peter Winzer, Bin Zhao, Weihua Zhuang
EDITORIAL ADVISORY BOARD, THE INSTITUTE
Kathy Pretz, Chair; Qusi Alqarqaz, Stamatis Dragoumanos, IEEE OPERATIONS CENTER
CRAIG S. SMITH Jonathan Garibaldi, Madeleine Glick, Lawrence O. Hall, 445 Hoes Lane, Box 1331
Susan Hassler, Francesca Iacopi, Cecilia Metra, Shashi Raj Pandey, Piscataway, NJ 08854-1331 U.S.A.
Smith is a reporter who has covered John Purvis, Chenyang Xu Tel: +1 732 981 0060 Fax: +1 732 981 1721
AI for The New York Times and MANAGING DIRECTOR, PUBLICATIONS Steven Heffner
now hosts a podcast on the topic, DIRECTOR, BUSINESS DEVELOPMENT,
IEEE SPECTRUM (ISSN 0018-9235) is published monthly by
“Eye on AI.” Reviewing the many MEDIA & ADVERTISING Mark David, m.david@ieee.org
The Institute of Electrical and Electronics Engineers, Inc. All rights
AI coding applications out there EDITORIAL CORRESPONDENCE reserved. © 2022 by The Institute of Electrical and Electronics
IEEE Spectrum, 3 Park Ave., 17th Floor, Engineers, Inc., 3 Park Avenue, New York, NY 10016-5997, U.S.A.
today [p. 5], he says he was struck New York, NY 10016-5997 TEL: +1 212 419 7555 Volume No. 59, Issue No. 11. The editorial content of IEEE Spectrum
by how quickly the field is advancing. BUREAU Palo Alto, Calif.; Tekla S. Perry +1 650 752 6661 magazine does not represent official positions of the IEEE or its
“In just three years, we’ve gone organizational units. Canadian Post International Publications Mail
ADVERTISING INQUIRIES Naylor Association Solutions,
(Canadian Distribution) Sales Agreement No. 40013087. Return
from zero to AI writing complete Erik Albin +1 352 333 3371, ealbin@naylor.com
undeliverable Canadian addresses to: Circulation Department,
programs,” he says. “Imagine REPRINT SALES +1 212 221 9595, ext. 319 IEEE Spectrum, Box 1051, Fort Erie, ON L2A 6C7. Cable address:
REPRINT PERMISSION / LIBRARIES Articles may be ITRIPLEE. Fax: +1 212 419 7570. INTERNET: spectrum@ieee.org.
what AI will be able to do in the ANNUAL SUBSCRIPTIONS: IEEE Members: $21.40 included in
photocopied for private use of patrons. A per-copy fee must
next 10 years.” be paid to the Copyright Clearance Center, 29 Congress St., dues. Libraries/institutions: $399. POSTMASTER: Please send
Salem, MA 01970. For other copying or republication, contact address changes to IEEE Spectrum, c/o Coding Department, IEEE
Managing Editor, IEEE Spectrum. Service Center, 445 Hoes Lane, Box 1331, Piscataway, NJ 08855.
Periodicals postage paid at New York, NY, and additional mailing
COPYRIGHTS AND TRADEMARKS offices. Canadian GST #125634188. Printed at 120 Donnelley Dr.,
IEEE Spectrum is a registered trademark owned by The Institute of Glasgow, KY 42141-1060, U.S.A. IEEE Spectrum circulation is audited
Electrical and Electronics Engineers Inc. Responsibility for the substance by BPA Worldwide. IEEE Spectrum is a member of the Association
of articles rests upon the authors, not IEEE, its organizational units, or its of Business Information & Media Companies, the Association of
members. Articles do not represent official positions of IEEE. Readers Magazine Media, and Association Media & Publishing. IEEE prohibits
may post comments online; comments may be excerpted for publication. discrimination, harassment, and bullying. For more information, visit
IEEE reserves the right to reject any advertising. https://www.ieee.org/about/corporate/governance/p9-26.html.
A
COMPUTER PROGRAMMING re coders doomed? That question has
been bouncing around computer-pro-
SOURCE: “INTERACTIVE CODE GENERATION VIA TEST-DRIVEN USER-INTENT FORMALIZATION,” LAHIRI ET AL., ARXIV, AUGUST 2022
TiCoder. By itself, an AI-coding app reflects the human programmer’s back to divine the programmer’s algorith-
intentions around only half the time [dark yellow line]. But with TiCoder mic intent and then generate code that is
improving the system’s capabilities [yellow line], code is generated that consistent with the expressed intentions.
accurately reflects the human programmer’s intentions between 70 and 85
percent of the time.
According to the researchers’ paper,
TiCoder improves the accuracy of auto-
matically generated code to as much as
85 percent from 48 percent, when eval-
up software development by allowing Hopper and her team at the computer uated on the Mostly Basic Programming
more code to be written in less time. company Remington Rand developed Problems benchmark. MBPP, meant to
According to these experts, if Flow-Matic, which allowed program- evaluate machine-generated code, con-
someone wants to become a software mers to use a limited English vocabulary sists of Python programming problems,
developer, it won’t always be the case to write programs. designed to be solvable by entry-level
that they’ll need to learn a program- Since then, programming has climbed programmers.
ming language. The time frame for this a ladder of increasingly efficient lan- A unit of code, which can be hun-
switchover to natural-language program- guages that allow programmers to be dreds of lines long, is the smallest part
ming is still an open-ended question. more productive. of a program that can be maintained and
But expect important developments in AI-written code is the cutting edge of executed independently. A suite of unit
this direction to be measured in years, a broader movement to allow people to tests, typically consisting of dozens of
not decades. Instead of learning C++ or write software without having to code unit tests, checks that the unit executes
Python or Ruby, these future coders will at all. Already, with platforms like Akkio, as intended, so that when you stack the
instead need to understand the seman- people can build machine-learning units together, the program works.
tics, concepts, and logical sequences of models with simple drag, drop, and but- According to a survey by Diffblue,
building a computer program. And that ton-click features. Users of Microsoft’s developers spend roughly 35 percent of
should open software development to a Power Platform, which includes a family their time writing quality-control tests
wider and more diverse population. of low-code products, can generate simple (as opposed to writing code destined for
“I don’t believe AI is anywhere near applications by just describing them. production use), so there are significant
replacing human developers,” said Vasi In June, Amazon released productivity gains to be made just by
Philomin, Amazon’s vice president and CodeWhisperer, a coding assistant for automating a part of this.
general manager for machine learning programmers, like GitHub’s Copilot, Unit tests are useful for debugging
and AI, adding that AI tools will free which was first released in limited pre- individual functions and for detecting
coders from routine tasks, but the cre- view in June 2021. Both tools are based errors when code is manually changed.
ative work of computer programming on large language models (LLMs) that But a unit test can also be used as the
will remain. have been trained on massive code specification for a unit of code and to
When the programming of electronic repositories. Both offer auto-complete guide programmers. While not many
computers began in the 1940s, program- suggestions as a programmer writes code programmers pursue true test-driven
mers wrote in numerical machine code. or suggest executable instructions from development, in which the unit tests
It wasn’t until the mid-1950s that Grace simple natural-language phrases. are written first, unit tests and units
F
natural-language instructions. tually be able to write code from uture quantum computers may
The model was first trained on natural-language instructions. rapidly break modern cryptog-
GitHub’s online code repository Hand-coding software pro- raphy. Now, researchers find that
until the model was able to pro- grams will increasingly be like a promising algorithm designed
duce reasonable-looking code. To hand-knitting sweaters. to protect computers from these
fine-tune the model, DeepMind To give natural-language advanced attacks could be broken in just
used 15,000 pairs of natural-lan- instructions to a computer, devel- 4 minutes. Surprisingly, that 4-minute
guage problem descriptions and opers will still need to understand break-in was not achieved by a cut-
successful code solutions from some concepts of logic and func- ting-edge machine but by a conventional
past coding competitions to create tions and how to structure things. 10-year-old desktop computer. This
a specialized data set of input- They will still need to study the latest, unexpected defeat highlights the
output examples. foundations of programming, many hurdles postquantum cryptogra-
The final step was to generate even if they don’t learn specific phy will need to clear before adoption,
many solutions and then use a fil- programming languages or write researchers say.
tering algorithm to select the best in computer code. That will, in In theory, quantum computers can
one. “We created many different turn, enable a wider range of quickly solve problems that might take
program possibilities by essen- programmers to create more and classical computers eons to solve. That
tially sampling the language model more varied kinds of software. difference serves as the foundation upon
almost a million times,” said Oriol “I don’t believe AI is any- which much of modern cryptography
Vinyals, who leads DeepMind’s where near replacing human rests. The strength of cryptography’s
deep-learning team. developers,” Amazon’s Philomin encryption schemes comes from the
To optimize the sample- said. “It will remove the mun- extreme difficulty that classical comput-
selection process, Vinyals says, dane, boilerplate stuff that people ers face when it comes to mathematical
D eepMind uses a clustering
have to do, and they can focus on problems such as factoring huge num-
algorithm to group the working higher-value things.” bers. However, quantum computers can,
solutions together, to find can- Diffblue’s Schrammel agrees in principle, run algorithms that can rap-
didates that are likely to work as that AI-automated code genera- idly crack such encryption.
well as those written by human tion will allow software develop- To stay ahead of this quantum threat,
programmers. ers to focus on more difficult and cryptographers around the world have
To test the system, DeepMind creative tasks. But, he adds, there spent the past two decades designing
submitted 10 AlphaCode-written will need to be at least one interac- postquantum cryptography (PQC) algo-
programs to a human coding tion with a human to confirm that rithms. These are based on new math-
competition on the popular Code- what the machine has understood ematical problems that both quantum
forces platform, where its solutions is what the human intended. and classical computers find difficult
ranked among the top 54 percent. “Software developers will not to solve.
“To generate a program, will lose their jobs because an automa- For years, researchers at organiza-
you just write it in natural lan- tion tool replaces them,” he said. tions such as the National Institute of
guage, no coding required, and “There always will be more soft- Standards and Technology (NIST) have
then the solution comes out at ware that needs to be written.” been investigating which PQC algo-
rithms should become the new stan- and these systems have been widely needed to provide extra information to
dards the world should adopt. NIST deployed. However, these elliptic curve the public known as auxiliary torsion
announced it was seeking candidate cryptosystems turn out to be vulnerable points. “Attackers have tried to exploit
PQC algorithms in 2016 and received to attacks from a quantum computer.” this extra information for a while but had
82 submissions in 2017. In July 2022, Around 2010, researchers found a new not been successful in using it to break
after three rounds of review, NIST way to use elliptic curves in cryptogra- SIKE,” Moody says. “However, this new
announced four algorithms that would phy. “It was believed that this new idea paper [describes] a way to do it, using
become standards, and four more would wasn’t susceptible to attacks from quan- some pretty advanced mathematics.”
enter another round of review as possi- tum computers,” he says. To explain this new attack, Decru says
ble additional contenders. This new approach is based on how two that although elliptic curves are two-di-
Now, a new study has revealed a way to points can be added on an elliptic curve to mensional objects, in mathematics ellip-
completely break SIKE, one of these con- derive another point on the elliptic curve, tic curves can be visualized as objects of
tenders under review (which Amazon, Moody says. An “isogeny” is a map from any number of dimensions. One can also
Cloudflare, Microsoft, and others have one elliptic curve to another elliptic curve create isogenies between these general-
investigated). “The attack came from out that preserves this addition law. ized objects.
of the blue, and was a silver bullet,” says “If you make this map complex By applying a 25-year-old theorem,
Christopher Peikert, a cryptographer at enough—the conjectured hard problem, the new attack uses the extra informa-
the University of Michigan at Ann Arbor which allows encryption of data, is given tion that SIKE makes public to con-
who did not take part in this new work. two elliptic curves—it’s hard to find an struct an isogeny in two dimensions.
SIKE (supersingular isogeny key isogeny between them,” says Thomas This isogeny can then reconstruct the
encapsulation) is a family of PQC algo- Decru, a mathematical cryptographer secret key that SIKE uses to encrypt a
rithms involving elliptic curves. “Elliptic at KU Leuven in Belgium who coau- message. Decru and Wouter Castryck,
curves have long been studied in math- thored the paper describing the study the team’s lead researcher, detailed their
ematics,” says NIST mathematician that broke SIKE. findings on 5 August in the Cryptology
Dustin Moody, who was not part of the SIKE is a form of isogeny-based cryp- ePrint Archive.
study. “They are described by an equa- tography based on the s upersingular “To me what is most surprising is
tion in the form of y2 = x3 + Ax + B, where isogeny Diffie-Hellman (SIDH) key that the attack seemingly came out of
A and B are numbers. So, for example, an exchange protocol. “SIDH/SIKE was nowhere,” says cryptographer Jona-
elliptic curve could be y2 = x3 + 3x + 2.” one of the first practical isogeny-based than Katz at the University of Maryland
In 1985, Moody says, “mathema- cryptographic protocols,” Decru says. at College Park, who did not take part
ticians figured out a way to make However, one of SIKE’s vulnerabil- in this new work. “There were very few
cryptosystems involving elliptic curves, ities was that in order for it to work, it prior results showing any weaknesses
in SIKE, and then suddenly this result
appeared with a completely devastating
attack—namely, it finds the entire secret
key, and does so relatively quickly with-
out any quantum computation.”
Using an algorithm based on this new
attack, a 10-year-old Intel desktop took
4 minutes to find a secret key secured
by SIKE.
“Attacks on SIDH/SIKE went from
essentially no progress for 11 to 12 years,
since SIDH was first proposed, to a total
break,” says Peikert.
One reason SIKE’s vulnerability
had not been detected until now is that
the new attack “applies very advanced
mathematics—I can’t think of another
situation where an attack has used such
deep mathematics compared with the
system being broken,” says mathemati-
cian Steven Galbraith at the University of
Auckland, in New Zealand, who was not
part of this research. Katz agrees, saying,
“I suspect that fewer than 50 people in
the world understand both the under-
lying mathematics and the necessary
cryptography.”
T
he most sustainable way to some of the highest solar- and wind- five electrolyzers in parallel, which, pow-
make hydrogen fuel is to split power potential. ered by the sun, produced 745 L of hydro-
water using renewable electric- Tests of the prototype direct-air gen per square meter a day, enough fuel to
ity. But heretofore that has electrolyzer over 12 consecutive days heat a home. They also let the prototype
required access to freshwater—a resource showed that it could produce almost run by itself for eight months to showcase
already in limited supply. Now, research- 750 liters of hydrogen a day on average its durability.
ers have reported a way to make hydrogen per square meter of electrolyzer. Li and The prototype is only a few square
fuel from just humidity in the air. his colleagues reported the details in the centimeters in area right now. But over the
Their electrolyzer extracts moisture journal Nature Communications. next year, with funding from investors,
from air and splits it via renewably pow- Hydrogen offers the prospect of the team plans to make larger electro-
ered electrolysis to create hydrogen. It clean, emission-free energy, and the lyzers, with electrode areas of 10 square
is the first such electrolyzer to produce hydrogen economy has gathered steam meters, Li says. They are also improving
high purity (99 percent) hydrogen from in the past few years due to increases in the electrolyte recipe to further bolster
air that has as little as 4 percent humid- funding and improvements in technol- energy efficiency and output, he says.
ity, says Gang Kevin Li, a professor of ogy. But most of the hydrogen around Both efficiency and output should not
chemical engineering at the University the world today is still produced from be affected when the device is scaled up.
of Melbourne, in Australia. The Austra- natural gas or coal. Green hydrogen But the main challenge the team faces is
lian team’s breakthrough could open up from electrolysis is still a nascent tech- to find the right materials for the elec-
the possibility of producing hydrogen nology because of the need for electro- trolyzer, Li says. “How can we make it
in semi-arid regions, which also have lyzers on a large scale. cheaper and better?”
How to select
TRANSPORTATION
R
Watch this webinar for a ide-hailing in India is domi-
nated by Uber and local rival
A base fare is set based on the class of
vehicle and the distance of the trip, but
practical discussion on: Ola, but startup Drife thinks after that riders can boost the amount
blockchain technology could be they are willing to pay to attract more
Factors affecting the key to breaking up the duopoly. drivers. Drivers can also make counter-
CEO and cofounder Firdosh Sheikh offers. The rider then chooses who to go
adhesive selection: used to be a power user of Uber, racking with based either on price or driver rat-
• Type of application up more than 5,000 rides in total. But ings. This means pricing is purely market
• Service conditions after speaking to drivers, she discovered driven, and because Drife isn’t taking a
that many were unhappy with the com- cut, fares should be cheaper than alter-
• Performance properties missions the platform charged and the natives, says Sheikh.
• Processing constraints often-opaque rules that governed which The company also has its own crypto-
rides they get assigned. Riders also get a currency, called DRF. At present it can’t
raw deal, she says, with little control over be used for much, but the token will play
Adhesive chemistries what they pay for their rides or whom an important role in Drife’s expansion
they travel with. plans, says Sheikh. The company plans to
The problem, Sheikh decided, boiled operate on a franchise model, with local
Cure mechanisms down to having a middleman controlling entrepreneurs bidding to run Drife oper-
and fillers the relationship between riders and driv- ations in new cities in return for a share
ers. So she set out to build a decentralized of subscription fees. But to apply for a
ride-hailing platform that puts control franchise, they will need to purchase a
6 case studies back into the hands of users via block- large chunk of DRF tokens and lock them
chain technology. Last November, after up for the duration of their contract. So
three years of development, she and her far, the company has received about 60
cofounders launched the Drife app in franchise requests for cities across the
Scan the southern city of Bangalore. Today, globe, says Sheikh.
to watch they have more than 10,000 drivers and About 30 percent of DRF tokens
webinar 100,000 riders signed up on the platform. have also been reserved for an “ecosys-
One of the main things that differenti- tem fund,” which will be used for incen-
ates Drife from companies like Uber, says tives and rewards for drivers and riders.
Sheikh, is that it doesn’t charge any com- Besides being tradable for real money,
mission. Drivers get to keep the entire these tokens will also confer the right
fare and will instead pay a monthly sub- to vote in a decentralized autonomous
scription to use the platform, although organization (DAO)—a kind of mem-
the company is currently waiving this to ber-run organization whose internal
encourage sign-ups. rules are encoded into a blockchain. Each
“We don’t charge anything from the city will have its own DAO, which will
fare that you pay as a rider,” she says. “A be responsible for choosing franchisees.
centralized entity who has a profit motive “Nothing we see today can work at the
154 Hobart St., Hackensack, NJ 07601 USA in the fare that I pay as a rider will start scale that we want to grow,” says Sheikh.
+1.201.343.8983 • main@masterbond.com manipulating the fare and exploiting it “That’s why we’ve started our own side
for their own profit motive, and that’s project where we’re working on a block-
DRIFE
www.masterbond.com where both drivers and riders struggle.” chain customized to our own needs.”
Crucially, users won’t need to take It might still be some time before that the incumbents’ financial and opera-
Drife’s word for any of this, as the entire becomes a problem. Despite a promis- tional capabilities.
system will be governed by smart con- ing number of sign-ups, the company is “Unfortunately, at this time, such
tracts. These are software programs currently doing only around 7,000 rides driver-focused startups are much too
that live inside a blockchain and auto- a week, compared with the millions done small and fragmented to make the differ-
mate transactions according to pre- by Uber and Ola every day. ence to the duopolic might of Uber and
defined rules that are visible to everyone. Mobility consultant Vinay Piparsania, Ola,” he says. It’s a David and Goliath
“Nobody’s going to trust me if I say I don’t founder of MillenStrat Advisory & situation, Piparsania adds, so for the
manipulate it unless I show them that I Research, says that blockchain tech- time being, these companies should
don’t have any power to manipulate that nology holds considerable promise for focus on “nibbling away in some key
data,” says Sheikh. “That’s only possible disrupting the ride-hailing industry and towns and categories by attracting
through blockchain.” disrupting the market positions of the and holding onto drivers, and actually
In reality, however, Drife is build- big players. The biggest challenge for demonstrating to riders that they can
ing the plane while flying it. The firm’s startups like Drife, though, is matching compete on delivery.”
smart-contract system is built on
Polygon, which is an extension of the
Ethereum blockchain. But because the
app’s creators are constantly tweaking JOURNAL WATCH
features and functionality, Sheikh admits
that most of the time, operations are This Drone Transforms Itself on the Fly
actually running on a back-end server
that mimics the processing the block- A couple of years ago, we Dragon has more degrees
chain is supposed to do. wrote about Dragon (short for of freedom than it knows what
And many of the details about how the “Dual-rotor embedded multilink to do with. In other words, the
platform will work still need to be ironed Robot with the Ability of multi- hardware necessary for it to pull
out. How to ensure the DAO voting system deGree-of-freedom aerial off an array of tricks is all there.
isn’t dominated by those who hold the transformatiON”). The aerial The hard part will be getting it to
most tokens is a work in progress, says robot consists of four pairs of use that hardware to do things
Sheikh. Most blockchains are also geared gimballed, ducted fans, with that are truly useful, and reliably
toward settling financial transactions, and each pair linked together through so. In 2018, Dragon was just
it’s not clear if they can cope with the a two-axis actuated joint. This learning how to shape-shift to fit
volume of real-world data involved in run- arrangement makes it physically through small spaces. Now it’s
ning a large-scale ride-hailing business. flexible in flight to a crazy degree. able to adapt its entire structure
+ +
+ ++
+++ +
+ + +
+ +
+ +
+ +
19-FA-032 01/20
THE BIG PICTURE
A Rich Harvest
in the Desert
By Willie D. Jones
Transmissions from a broadcast tower, such as the spire on top of the Empire State Building, can be used with cheap
TV antennas and a software-designed radio to track the movements of airplanes.
Both the KrakenRF SDR and the Raspberry Pi 4 [middle bottom] require a fair amount of power via USB C cables, so a
battery pack [top middle] is needed for mobile operation. The Pi is connected to the SDR via a data link, and in turn
the SDR is connected via coaxial cables to two directional TV antennas [left and right].
and watch for reflections. Instead, it uses could be tapped to make very cheap but bined with hardware that can automati-
ambient signals. A reference antenna effective SDR receivers. An explosion of cally do coherence synchronization
picks up a signal from, say, a cell tower, interest in SDRs followed. Building off among them.
while a surveillance antenna is tuned to the demand stimulated by this activity, What that means is that, for example,
the same frequency. The reference and a number of manufacturers have started you can arrange five omnidirectional
surveillance signals are compared. If a making premium, but still relatively antennas in a circle, and do radio direction
reflection from an object is detected, then cheap, SDRs. This includes RTLx-based finding by looking at when a transmission
the time it took to arrive at the surveil- USB sticks built with better supporting arrives at each antenna. Normally, an ama-
lance antenna gives a range. Frequency components and designs versus the teur looking to do direction finding would
shifts indicate the object’s speed via the original TV tuners, and completely new have to wave around a directional antenna,
Doppler effect. receivers such as the RSPDx. Some of something difficult to do while, for exam-
I was interested in passive radar because these new SDRs can transmit as well as ple, driving a car.
I wanted to put a new s oftware-defined receive, such as the HackRF One or But it was the KrakenSDR’s ability to
radio (SDR) through its paces. I’ve Lime Mini. do passive radar that really caught my eye
checked in with amateur SDR develop- I was researching diving back into as a new capability in lowish-cost radio
ments for IEEE Spectrum since 2006, SDR with one of these devices when I tech , so I plonked down the money. The
when SDR become something remotely spotted the CrowdSupply campaign for next step was to get suitable antennas. The
within a maker’s budget. The biggest the US $399 KrakenSDR. It’s receive radio’s manufacturer, KrakenRF, recom-
leap forward happened in 2012 when it only, but it boasts not one or two tuners, mends directional Yagi TV antennas for
was discovered that USB stick TV tuners but five! The tuners are based on the RTL two reasons. First, while the KrakenSDR
using the RTL2832U demodulator chip R820T2/R860 chip, and they are com- can work with many signals, including
Comparing the time between the arrival of a signal from a broadcast transmitter and the arrival of a reflection of
that signal lets you detect objects such as airplanes and estimate their range. Frequency shifts between the two
signals allow you to plot the speed of the object away or toward the antennas along with the range. The trace on the
right shows a plane moving away as it increases its speed.
FM radio or cell-tower transmissions, Empire State Building, giving me the abil- retreated with the surveillance antenna
digital TV signals are best to work with ity to choose as a reference signal any one behind the superstructure of my build-
because they are fairly evenly distributed of more than half a dozen TV channels ing’s stairwell. This was in a bid to
across the channel’s broadcast band, transmitted from its spire. shield the antenna from the reference
unlike the narrower and more variable I deployed my rig: a heavy-duty bat- signal and myself from the wind. Check-
signals from an FM station. (KrakenRF tery pack, the KrakenSDR, cables, and ing the feed from the antennas using the
notes that if you must use an FM signal, antennas, along with a Raspberry Pi 4 to Web interface’s built-in spectrum ana-
pick a heavy-metal station “since heavy process data from the SDR. KrakenRF lyzer, I discovered I was almost too suc-
metal is closer to white noise.”) The offers an SD card image for the Pi that cessful in choosing the Empire State’s
second reason is that pointing a direc- bundles an operating system configured transmitter tower as a source of radio
tional antenna away from the reference to work with its preinstalled open- illumination: The reference signal was
source means that it’s less likely to be source software. It also sets up the Pi as saturating the receiver with the default
swamped by the reference signal. a Wi-Fi access point with a Web inter- gain setting of 27 decibels, so I dropped
I ordered two small and light $19 TV face. I really wish more companies would it down to just 2.7 dB.
antennas. Portability was important adopt this approach, as installing open- But intense illumination means
because I needed to carry my entire setup source software is often a frustrating bright reflections. With one hand I
to and from my apartment building’s roof, exercise in trying to replicate the precise pointed the surveillance antenna at the
where my particular location in an outer system environment it was developed in. overcast skies and held my phone in the
borough of the city provided more advan- Even if you want to ultimately install the other. Gratifyingly, I almost instantly
tages. First, the sky above has a regular KrakenSDR software somewhere other started seeing a blip on the speed-ver-
supply of aircraft landing and taking off than a Pi, having a known-good setup is sus-range radar plot, matched a few
from NYC’s airports—and large metal useful as a reference, and allows you to moments later by the rumble of an
assemblies moving against an empty test the hardware. approaching jet. (The plot updates
background are perfect radar test objects. I pointed the reference antenna about once every 3 seconds.) Because
Second, my roof has a line of sight to the toward the Empire State Building and of the strength of the echoes, I was able
to raise the signal-cutoff threshold sig-
nificantly, giving me radar returns
uncluttered with noise, and often with
I was almost too successful in multiple aircraft. A win for SDR!
F
or computer pioneer Craig Par- Internet pioneering firm Bolt Beranek & research, which he finds very different
tridge, pushing the envelope on Newman (BBN), now Raytheon BBN Tech- from how he did research at BBN.
interesting challenges has been nologies. And he holds a master’s and Ph.D. “You are trying to do research while
his modus operandi. It’s what led in computer science, also from Harvard. trying to teach the students,” he says.
him to make key contributions to the “It was 1983, and BBN needed an “You could often do the research faster
early Internet. additional person who could write TCP/ yourself, but then the student wouldn’t
The IEEE Fellow worked with TCP/ IP code for the BSD [Berkeley Software learn. By comparison, in industry I knew
IP developer and advocate Phil Karn on Distribution] Unix operating system,” I had a team I could give a broad descrip-
TCP message round-trip time estima- Partridge says. “BBN had folks who tion to and get the right thing the first
tion. Partridge also led the team that wrote most of the original code, and they time. With students, by the time they get
designed and built the world’s first high- taught me what networking and TCP/IP good at it, they are graduating.”
speed router. Today, he’s working on was. That was something no grad school Partridge would like today’s engineers
getting a better understanding of traffic at the time could teach me. to pay more attention to edge computing,
flows in VPNs. In addition, he is trying to “A lot of the Internet tech used today smart home infrastructure, vehicle safety
figure out what causes high rates of is entirely or almost entirely recogniz- systems, and walled-garden social net-
packet errors, which often result in bad able from what was created back then,” works. He says walled gardens are “social
COLORADO STATE UNIVERSITY
file transfers, and how to fix them. he says. networks where people don’t want to
Although his bachelor’s degree from By 2018 Partridge was chief scientist connect to people who don’t want to con-
Harvard was in history, the computer elec- for networking research at BBN, but he nect with those who think differently.”
tives he took convinced him he had both decided he didn’t want his tenure there One challenge in preparing students for
the aptitude and interest for a career in to be the last chapter of his career. Later the world they will be working in, he says,
computing. And he was right. He devel- that year he joined Colorado State Uni- “is getting them to understand that just
oped networking concepts and technolo- versity in Fort Collins, as chair of its because you can create something new
gies while working at the ARPAnet and department of computer science. doesn’t mean that society wants it.”
BAITHETAN (China)
XILUODU (China)
GURI (Venezuela)
WUDONGDE (China)
TUCURUI (Brazil)
TASANG (Myanmar)
XIANGJIABA (China)
LONGTAN (China)
SAYANO-SHUSHENSKAYA (Russia)
KRASNOYARSK (Russia)
NUOZHADU (China)
ROBERT-BVOURASSA (Canada)
the Forgotten
You would think this would be lauded for being
about as “green” as it could get, but in 2022 that
would be a mistake. There is no end of gushing about
Renewable
China’s cheap solar panels—but when was the last
time you saw a paean to hydroelectricity?
Construction of large dams began before World
War II. The United States got the Grand Coulee on
This still-mighty source of electricity has been the Columbia River, the Hoover Dam on the Colo-
unfairly relegated to the scrap heap rado, and the dams of the Tennessee Valley Authority.
DATA SOURCES: WIKIPEDIA, HYDROPOWER.ORG
I
live in Manitoba, a province of Canada where all Itaipu, at its completion in 1984 the world’s largest
but a tiny fraction of electricity is generated from dam, with 14 gigawatts capacity), and Asia, where it
the potential energy of water. Unlike in British culminated in China’s unprecedented effort. China
Columbia and Quebec, where generation relies on now has three of the world’s six largest hydroelectric
huge dams, our dams on the Nelson River are low, stations: Three Gorges, 22.5 GW (the world’s largest);
with hydraulic heads of no more than 30 meters, Xiluodu, 13.86 GW; and Wudongde, 10.2 GW.
which creates only small reservoirs. Of course, the Baihetan on the Jinsha River should soon become
potential is the product of mass, the gravitational the world’s second-largest station (16 GW).
constant, and height, but the dams’ modest height is But China’s outsize drive for hydroelectricity is
readily compensated for by a large mass, as the unique. By the 1990s, large hydro stations had lost
INSTALLED
CAPACITY,
MEGAWATTS
their green halo in the West and come to be seen as In 2020, in Canada and 97 percent in Manitoba. And some
environmentally undesirable. They are blamed for the world’s less affluent countries in Africa and Asia are still
displacing populations, disrupting the flow of sedi- hydro determined to build more such stations. The largest
ments and the migration of fish, destroying natural projects now under construction outside China are
stations
habitat and biodiversity, degrading water quality, and the Grand Ethiopian Renaissance Dam on the White
for the decay of submerged vegetation and the con-
produced Nile (6.45 GW) and Pakistan’s Diamer-Bhasha
sequent release of methane, a greenhouse gas. There 75 percent (4.5 GW) and Dasu (4.3 GW) on the Indus.
is thus no longer a place for Big Hydro in the pan- more I never understood why dams have suffered such
theon of electric greenery. Instead, that pure status electricity a reversal of fortune. There is no need to build mega-
is now reserved above all for wind and solar. This than wind structures, with their inevitable undesirable effects.
ennoblement is strange, given that wind projects and solar And everywhere in the world there are still plenty of
require enormous quantities of embodied energy in combined opportunities to develop modest projects whose
the form of steel for towers, plastics for blades, and and combined capacities could provide not only excellent
concrete for foundations. The manufacture of solar sources of clean electricity but also serve as long-
panels involves the environmental costs from
accounted term stores of energy, as reservoirs for drinking water
mining, waste disposal, and carbon emissions.
for 16 and irrigation, and for recreation and aquaculture.
And hydro still matters more than any other form percent of I am glad to live in a place that is reliably supplied
of renewable generation. In 2020, the world’s hydro all global by electricity generated by low-head turbines pow-
stations produced 75 percent more electricity than generation. ered by flowing water. Manitoba’s six stations on the
wind and solar combined (4,297 versus 2,447 Nelson River have a combined capacity slightly above
terawatt-hours) and accounted for 16 percent of all 4 GW. Just try to get the equivalent here from solar
global generation (compared with nuclear electric- in January, when the snow is falling and the sun
ity’s 10 percent). The share rises to about 60 percent barely rises above the horizon!
4. The electrode
array creates
a pattern of
brain stimulation
corresponding
to the original
odor.
1. The external
sensor detects
an odor and
sends a signal
to the external
processor.
3. The receiver sends
the signal through a
wire to a stimulating
electrode array near
the olfactory bulb.
2. The processor
gives the odor a code
and sends the signal
to an implanted
receiver.
SCENT
For people who have lost
their sense of smell, a
neuroprosthetic could replace
biology with technology. An
e-nose sensor would detect
odors, a processor would
send signals to an implanted
receiver, and an implanted
electrode array would
stimulate the olfactory bulb
with patterns corresponding
to specific odors.
THALAMUS
(relay station for
sensory signals)
ORBITOFRONTAL CORTEX
(decision-making
and emotional
processing)
OLFACTORY
BULB
OLFACTORY
NERVES
ENTORHINAL
SCENT
CORTEX AND
HIPPOCAMPUS
(memory)
AMYGDALA
(basic
emotions)
In the lab’s back room, another model shows the second of research on olfactory loss and investigations into the pos-
half of the concept: There, the e-nose sensor transmits its signal sibility of biological regeneration, he began working on a hard-
to a small array of electrodes taken from a cochlear implant. ware solution in the 1990s.
For people with hearing loss, such implants feed information A self-described electronics buff, Costanzo enjoyed his exper-
DEAUDREA ‘SHA’ AGUADO
about sound to the inner ear and then to the brain. The implant iments with sensors and electrodes. But the project really took
is also about the right size for the olfactory bulb on the edge of off in 2011 when he began talking with his colleague Daniel
the brain. Why not use it to convey information about odor? Coelho, a professor of otolaryngology at VCU and an expert in
This project could be a career-capping achievement for cochlear implants. They recognized at once that a smell pros-
Costanzo, a professor emeritus of physiology and biophysics thetic could be similar to a cochlear implant: “It’s taking some-
who in the 1980s cofounded VCU’s Smell and Taste Disorders thing from the physical world and translating it into electrical
Center, one of the first such clinics in the country. After years signals that strategically target the brain,” Coelho says. In 2016
S
the only solution for people with total loss of smell. “When the
c o t t M o o r e h e a d just wanted to teach his pathways are really out of commission, you have to replace
6-year-old son how to skateboard. On a Sunday in them with technology,” he says.
2012 he was demonstrating some moves in the drive- Unlike most anosmics, Scott Moorehead didn’t give up when
way of his Indiana home when the skateboard hit a his doctors told him there was nothing he could do to recover
crack and flipped him off. “The back of my skull bore his sense of smell. As the CEO of a cellphone retail company
the brunt of the fall,” he says. He spent three days in the intensive with stores in 43 states, he had the resources to invest in long-
care unit, where doctors treated him for multiple skull fractures, shot research. And when a colleague told him about the work
massive internal bleeding, and damage to his brain’s frontal lobe. at VCU, he got in touch and offered to help. Since 2015, Moore-
Over weeks and months his hearing came back, his head- head has put almost US $1 million into the research. He also
aches went away, and his irritability and confusion faded. But licensed the technology from VCU and launched a startup
he never regained his sense of smell. called Sensory Restoration Technologies.
Moorehead’s accident permanently disconnected the nerves When COVID struck, Moorehead saw an opportunity.
that run from the nose to the olfactory bulb at the base of the Although they were far from having a product to advertise, he
brain. Along with his sense of smell, he lost all but a rudimen- scrambled to put up a website for the startup. He remembers
tary sense of taste. “Flavor comes mostly from smell,” he saying: “People are losing their sense of smell. People need to
explains. “My tongue on its own can only do sweet, salty, spicy, know we exist!”
E
and bitter. You can blindfold me and put 10 flavors of ice cream
in front of me, and I won’t know the difference: They’ll all taste quivalent neuroprosthetics exist for
slightly sweet, except chocolate that’s a bit bitter.” other senses. Cochlear implants are the most suc-
Moorehead grew depressed: Even more than the flavors of cessful neurotechnology to date, with more than
food, he missed the unique smells of the people he loved. And 700,000 devices implanted in ears around the
on one occasion he was oblivious to a gas leak, only realizing world. Retina implants have been developed for
the danger when his wife came home and raised the alarm. blind people (though some bionic-vision systems have had
Anosmia, or the inability to smell, can be caused not only commercial trouble), and researchers are even working on
by head injuries but also by exposure to certain toxins and by restoring the sense of touch to people with prosthetic limbs
a variety of medical problems—including tumors, Alzheimer’s, and paralysis. But smell and taste have long been considered
and viral diseases, such as COVID. The sense of smell also too hard a challenge.
commonly atrophies with age; in a 2012 study in which more To understand why, you need to understand the marvelous
than 1,200 adults were given olfactory exams, 39 percent of complexity of the human olfactory system. When the smell of a
participants age 80 and above had olfactory dysfunction. rose wafts up into your nasal cavity, the odor molecules bind to
7.5% O F PEO PL E W H O W ER E D I AG N O S ED W I T H C OV ID - 1 9 M O R E T H A N T WO
Y E A R S AG O H AV E N OT R EC OV ER ED T H EIR S EN S E O F S M EL L .
E
ufacture, low power, and can be grouped together in an array
-noses are already used today in a variety to provide sensitivity to dozens of odors. For the neuropros-
of industrial, office, and residential settings—if you thetic, “in principle, several hundred [sensors] could be feasi-
have a typical carbon-monoxide detector in your ble,” Persaud says.
home, you have a very simple e-nose. A first-generation product wouldn’t allow users to smell
“Traditional gas sensors are based on semi hundreds of different odors. Instead, the VCU team imagines
conductors like metal oxides,” explains Krishna Persaud, a initially including receptors for a few safety-related smells, such
leading e-nose researcher and a professor of chemoreception as smoke and natural gas, as well as a few pleasurable ones.
at the University of Manchester, in England. He’s also an advisor They could even customize the prosthetic to give users smells
to Costanzo and Coelho. In the most typical e-nose setup, he that are meaningful to them: the smell of bread for a home
says, “when a molecule interacts with the semiconductor baker, for example, or the smell of a pine forest for an avid hiker.
material, a change in resistance occurs that you can measure.” Pairing this e-nose technology with the latest neurotech-
Such sensors have been shrinking over the last two decades, nology is Costanzo and Coelho’s current challenge. While
Persaud says, and they’re now the size of a microchip. “That working with Persaud to test new sensors, they’re also part-
makes them very convenient to put in a small package,” he says. nering with clinicians in Boston to investigate the best method
In the VCU team’s early experiments, they used an off-the-shelf of sending signals to the brain.
sensor from a Japanese company called Figaro. The VCU team laid the groundwork with animal experi-
The problem with such commercially available sensors, ments. In experiments with rats in 2016 and 2018, the team
Persaud says, is that they can’t distinguish between very many showed that using electrodes to directly stimulate spots on the
surface of the olfactory bulb generated patterns of neural activ- Once the researchers know where the brain lights up with
ity deep in the bulb, in the neurons that passed messages on to activity in response to, say, the smell of peppermint, they can
other parts of the brain. The researchers called these patterns try stimulating those areas with electricity alone in hopes of
odor maps. But while the neural activity indicated that the rats creating the same sensation. “With the existing technology, I
were perceiving something, the rats couldn’t tell the researchers think we’re closer to inducing the [smell perceptions] with
what they smelled. brain stimulation than with olfactory-bulb stimulation,” Rich-
Their next step was to recruit collaborators who could per- ardson says. He notes that there are already approved implants
form similar trials with human volunteers. They started with for brain stimulation and says using such a device would make
one of Costanzo’s former students, Eric Holbrook, an associate the regulatory path easier. However, the distributed nature of
professor of otolaryngology at Harvard Medical School and smell perception within the brain poses a new complication:
director of rhinology at Massachusetts Eye and Ear. Holbrook A user would likely need multiple implants to stimulate different
spends much of his time operating on people’s sinus cavities, areas. “We might need to hit different sites in quick succession
including the ethmoid sinus cavities, which are positioned just or all at once,” he says.
A
below the cribriform plate, a bony structure that separates the
olfactory receptors from the olfactory bulb. cross the Atl antic, the European Union
Holbrook discovered, in 2018, that placing electrodes on is funding its own olfactory-implant project,
the bone transmitted an electrical pulse to the olfactory bulb. called ROSE (Restoring Odorant detection and
In a trial with awake patients, three of the five volunteers recognition in Smell dEficits). It launched in 2021
reported smell perception during this stimulation, with the and involves seven institutions across Europe.
reported odors including “an onionlike smell,” “antiseptic-like Thomas Hummel, head of the Smell & Taste Clinic at the
and sour,” and “fruity but bad.” While Holbrook sees the trial Technical University of Dresden and a member of the consor-
as a good proof of concept for an olfactory-implant system, he tium, says the ROSE researchers are partnering with Aryballe,
says that poor conductance through the bone was an important a French company that makes a tiny sensor for odor analytics.
limiting factor. “If we are to provide discrete, separate areas of The partners are currently experimenting with stimulating
stimulation,” he says, “it can’t be through bone and will need both the olfactory bulb and the prefrontal cortex. “All the parts
to be on the olfactory bulb itself.” that are needed for the device, they already exist,” he says. “The
Placing electrodes on the olfactory bulb would be new ter- difficulty is to bring them together.” Hummel estimates that
ritory. “Theoretically,” says Coelho, “there are many different the consortium’s research could lead to a commercial product
ways to get there.” Surgeons could go down through the brain, in 5 to 10 years. “It’s a question of effort and a question of
sideways through the eye socket, or up through the nasal cavity, funding,” he says.
breaking through the cribriform plate to reach the bulb. Coelho Persaud, the e-nose expert, says the jury is out on whether
explains that rhinology surgeons often perform low-risk sur- a neuroprosthetic could be commercially viable. “Some people
geries that involve breaking through the cribriform plate. with anosmia would do anything to have that sense back to
“What’s new isn’t how to get there or clean up afterward,” he them,” he says. “It’s a question of whether there are enough of
says, “it’s how do you keep an indwelling foreign body in there those people out there to make a market for this device,” he
without causing problems.” says, given that surgery and implants always carry some
Another tactic entirely would be to skip over the olfactory amount of risk.
bulb and instead stimulate “downstream” parts of the brain The VCU researchers have already had an informal meeting
that receive signals from the olfactory bulb. Championing that with regulators from the U.S. Food and Drug Administration,
approach is another of Costanzo’s former students, Mark Rich- and they’ve started the early steps of the process for approving
ardson, director of functional neurosurgery at Massachusetts an implanted medical device. But Moorehead, the investor who
General Hospital. Richardson often has epilepsy patients spend tends to focus on practical matters, says this dream team might
several days in the hospital with electrodes in their brains, so not take the technology all the way to the finish line of an
that doctors can determine which brain regions are involved FDA-approved commercial system. He notes that there are
in their seizures and plan surgical treatments. While such plenty of existing medical-implant companies that have that
patients are waiting around, however, they’re often recruited expertise, such as the Australian company Cochlear, which
for neuroscience studies. dominates the cochlear-implant market. “If I can get [the
To contribute to Costanzo and Coelho’s research, Richard- project] to the stage where it’s attractive to one of those com-
son’s team asked epilepsy patients in the monitoring unit to panies, if I can take some of the risk out of it for them, that will
take a sniff of a wand imbued with a smell such as peppermint, be my best effort,” Moorehead says.
fish, or banana. The electrodes in their brains showed the pat- Restoring people’s ability to smell and taste is the ultimate
tern of resulting neural activity “in areas where we expected, goal, Costanzo says. But until then, there’s something else he
but also in areas where we didn’t expect,” Richardson says. To can give them. He often gets calls from desperate people with
better understand the brain responses, his team has just begun anosmia who have found out about his work. “They’re so appre-
another round of experiments with a tool called an olfactometer ciative that someone is working on a solution,” Costanzo says.
that will release more precisely timed bursts of smell. “My goal is to provide hope for these people.”
THE
ELECTRIC
VEHICLE
IS NOT
ENOUGH BY HEATHER L. MACLEAN,
ALEXANDRE MILOVANOFF
& I. DANIEL POSEN
EVS HAVE FINALLY COME OF AGE. The total cost of pur- environmental outcomes. But EVs come with important
chasing and driving one—the cost of ownership—has fallen weaknesses, and so people shouldn’t count on them alone to
nearly to parity with a typical gasoline-fueled car. Scientists do the job, even for the transportation sector.
and engineers have extended the range of EVs by cramming Why not? EVs lack tailpipe emissions, sure, but producing,
ever more energy into their batteries, and vehicle charging operating, and disposing of these vehicles creates green-
networks have expanded in many countries. In the United house-gas emissions and other environmental burdens. Driv-
States, for example, there are more than 49,000 public ing an EV pushes these problems upstream, to the factory
charging stations, and it is now possible to drive an EV from where the vehicle is made and beyond, as well as to the power
New York to California using public charging networks. plant where the electricity is generated. The entire life cycle
With all this, consumers and policymakers alike are hope- of the vehicle must be considered, from cradle to grave. When
ful that society will soon greatly reduce its carbon emissions you do that, the promise of electric vehicles doesn’t shine
by replacing today’s cars with electric vehicles. Indeed, adopt- quite as brightly. Here we’ll show you in greater detail why
ing electric vehicles will go a long way in helping to improve that is.
60 PERCENT
before the world surpasses the 2 °C goal:
This amount constitutes the global
carbon budget.
We then used results from a model of
LESS.
the global economy to allocate a portion
of this global budget specifically to the
U.S. passenger-vehicle fleet over the
period between 2015 and 2050. This por-
tion came out to around 45 billion tonnes
of carbon dioxide, roughly equivalent to among new vehicle sales until the cumu- that pledge, and the United States has
a single year of global greenhouse-gas lative fleet emissions fell within the already missed the 10 percent sales share
emissions. budget. The result: EVs had to make up for 2020 that our study recommended.
This is a generous allowance, but that’s the vast majority of vehicles on the road Of course, meeting the more ambitious
reasonable because transportation is by 2050, which means they must make 1.5 °C climate target would require even
harder to decarbonize than many other up the vast majority of vehicle sales a larger-scale deployment of EVs and
sectors. Even so, working within that decade or more earlier. therefore earlier deadlines for meeting
budget would require a 30 percent reduc- That would require a dramatic these targets.
tion in the projected cumulative emissions increase in EV sales: In the United States
from 2015 to 2050 and a 70 percent reduc- in 2021, just over 1 million vehicles—less IT’S A TALL order, and
tion in annual emissions in 2050, com- than 1 percent of those on the road— a costly one, to make
pared with the business-as-usual
emissions expected in a world without EVs.
were fully electric. And only 3 percent of
the new vehicles sold were fully electric. I and sell so many EVs so
soon. Even if that were
Next, we turned to our model of the Considering the long lifetime of a vehicle, possible, there would
U.S fleet of light vehicles. Our model sim- about 12 years in the United States, we also have to be an enor-
ulates for each year from 2015 to 2050 would need to ramp up sales of EVs dra- mous increase in charging infrastruc-
how many new vehicles are manufactured matically starting now to meet the 2 °C ture and in material supply chains. And
and sold, how many are scrapped, and the target. In our model, over 10 percent of that much more vehicle charging would
associated greenhouse-gas emissions. all new vehicles sold by 2020 would have then put great pressure on our electric-
We also keep track of how many vehicles had to be electric, rising above half by ity grids.
are on the road, when they were made, 2030, and essentially all by 2035. Studies Charging matters because one of the
SEBASTIAN MEYER/CORBIS/GETTY IMAGES
and how far they are likely to drive. We conducted in other countries, such as commonly cited obstacles to EV adop-
used this information to estimate annual China and Singapore, have arrived at tion is range anxiety. Shorter-range EVs,
greenhouse-gas emissions from the fuel similar results. like the Nissan Leaf, have a manufactur-
cycle, which depend partly on the average The good news is that 2035 is the year er’s reported range of just 240 km,
vehicle size and partly on how much vehi- suggested at the COP26 for all new car although a 360-km model is also avail-
cle efficiency improves over time. and vans in leading markets to be able. Longer-range EVs, like the Tesla
Finally, we compared the carbon zero-emissions vehicles, and many man- Model 3 Long Range, have a manufactur-
budget with our model of total cumula- ufacturers and governments have com- er’s reported range of 600 km. The
tive emissions (that is, both vehicle-cycle mitted to it. The bad news is that some shorter driving ranges of most EVs are
and fuel-cycle emissions). We then sys- major automotive markets, such as China no problem for daily commutes, but
tematically increased the share of EVs and the United States, have not yet made range anxiety is real for longer trips, espe-
AFP/GETTY IMAGES
The manufacture of lithium batteries for EVs, like those shown here, is energy intensive, as is the mining and refining of the raw materials.
the form of vehicle-to-grid technologies than a neighborhood that are designed that addressing the climate crisis requires
that exploit the installed base of EV bat- to be hospitable to walking and cycling. more than just technology fixes. It also
teries. Varying the price of electricity Congestion charges have been levied in demands individual and collective action.
throughout the day could also help to Stockholm and London to limit car traf- EVs will be a huge help, but we shouldn’t
flatten the demand curve. fic. Paris has gone further, with a forth- expect them to do the job alone.
→ Yiannis Psaras
Beyond!
→ Jorge M. Soares
→ David Dias
Illustrations by Carl De Torres
statement or a letter from a loved one. This approach there. IPFS can also improve security with content-
made sense when the Internet was used mainly to integrity checking so that data cannot be tampered
deliver different content to different people. But this with by intermediary actors. And with IPFS, the net-
design is not well suited for the mass consumption work can continue operating even if the connection
of static content, such as movies or TV shows. to the originating server is cut or if the service that
The reality today is that the Internet is more often
used to send exactly the same thing to many people,
and it’s doing a huge amount of that now, much of
Node 5
which is in the form of video. The demands grow even Who has file C?
higher as our screens obtain ever-increasing resolu-
tions, with 4K video already in widespread use and
8K on the horizon. Database
The content delivery networks (CDNs) used by
streaming services such as Netflix help address the Node Content
problem by temporarily storing content close to, or
even inside, many ISPs. But this strategy relies on Node 3
Who has file A?
ISPs and CDNs being able to make deals and deploy
the required infrastructure. And it can still leave the
edges of the network having to handle more traffic
than actually needs to flow.
Who has file F?
A
s mentioned above, with today’s Internet the system, which would then break things for many
architecture, you request content based on of the people using it. It’s often very hard even to
a server’s address. This comes from the implement incremental improvements. A good exam-
protocol that underlies the Internet and ple of the difficulty encountered when introducing
governs how data flows from point to point, a scheme change is IPv6, which expands the number of possible
first described by Vint Cerf and Bob Kahn in a 1974 IP addresses. Today, almost 25 years after its intro-
paper in the IEEE Transactions on Communications duction, it still hasn’t reached 50 percent adoption.
and now known as the Internet Protocol. The World A way around this inertia is to implement changes
Wide Web is built on top of the Internet Protocol. at a higher layer of abstraction, on top of existing
Browsing the Web consists of asking a specific Internet protocols, requiring no modification to the
machine, identified by an IP address, for a given piece Another approach underlying networking software stacks or interme-
of data. to finding a file diate devices.
The process starts when a user types a URL into in a peer-to-peer Other peer-to-peer systems besides IPFS, such as
network is called
the address bar of the browser, which takes the query flooding.
BitTorrent and Freenet, have tried to do this by intro-
hostname portion and sends it to a Domain Name The node seeking ducing systems that can operate in parallel with the
System (DNS) server. That DNS server returns a cor- a file broadcasts World Wide Web, albeit often with Web interfaces.
responding numerical IP address. The user’s browser a request for For example, you can click on a Web link for the
will then connect to the IP address and ask for the it to all nodes BitTorrent tracker associated with a file, but this pro-
to which it is
Web page located at that URL. attached. If the
cess typically requires that the tracker data be passed
In other words, even if a computer in the same node receiving off to a separate application from your Web browser
building has a copy of the desired data, it will neither the request to handle the transfers. And if you can’t find a tracker
see the request, nor would it be able to match it to the does not have link, you can’t find the data.
copy it holds because the content does not have an the file [red], Freenet also uses a distributed peer-to-peer
it forwards
intrinsic identifier—it is not content-addressed. the request to
system to store content, which can be requested via
A content-addressing model for the Internet all the nodes an identifier and can even be accessed using the Web’s
would give data, not devices, the leading role. to which it is HTTP protocol. But Freenet and IPFS have different
Requesters would ask for the content explicitly, using attached until aims: Freenet has a strong focus on anonymity and
a unique identifier (akin to the DOI number of a jour- finally a node manages the replication of data in ways that serve
with the file
nal article or the ISBN of a book), and the Internet that goal but lessen performance and user control.
passes a copy
back to the IPFS provides flexible, high-performance
requester [blue]. sharing and retrieval mechanisms but keeps
The Gnutella control over data in the hands of the users.
Node peer-to-peer We designed IPFS as a protocol to
Do you have file A? network used
upgrade the Web and not to create an alter-
this protocol.
native version. It is designed to make the
Web better, to allow people to work offline,
to make links permanent, to be faster and
more secure, and to make it as easy as pos-
sible to use.
I
PFS started in 2013 as an open-
source project supported by Pro-
tocol Labs and built by a vibrant
community and ecosystem with
hundreds of organizations and thousands
of developers. IPFS is built on a strong
foundation of previous work in peer-to-
peer (P2P) networking and content-based
addressing.
The core tenet of all P2P systems is that
users simultaneously participate as clients
Y
ou may have noticed that we haven’t yet whose freedom of speech is under threat. Lawful
provided an example of an IPFS address. requests to take down content are still possible, but
That’s because hash-based addressing Reducing they need to be addressed to the users actually storing
results in URLs that aren’t easy to spell the it, avoiding commonplace abuses (like illegitimate
out or type. duplication DMCA takedown requests) against which large plat-
For instance, you can find the Wikipedia logo on forms have difficulties defending.
of data
IPFS by using the following address in a suitable Ultimately, IPFS is an open network, governed
browser: ipfs://QmRW3V9znzFW9M5FYbitSEvd-
moving by community rules, and open to everyone. And
5dQrPWGvPvgQD6LM22Tv8D/. That long string through the you can become a part of it today! The Brave
can be thought of as a digital fingerprint for the file network and browser ships with built-in IPFS support, as does
holding that logo. procuring it Opera for Android. There are browser extensions
There are other content-addressing schemes that from nearby available for Chrome and Firefox, and IPFS Desk-
use human-readable naming, or hierarchical, URL- sources top makes it easy to run a local node. Several orga-
style naming, but each comes with its own set of will let ISPs nizations provide IPFS-based hosting services,
trade-offs. Finding practical ways to use human- provide while others operate public gateways that allow
readable names with IPFS would go a long way you to fetch data from IPFS through the browser
toward improving user-friendliness. It’s a goal, but
faster without any special software.
we’re not there yet. service at These gateways act as entries to the P2P network
Protocol Labs, where we work, has been tackling lower cost. and are important to bootstrap adoption. Through
these and other technical, usability, and societal some simple DNS magic, a domain can be configured
issues for most of the last decade. Over this time, we so that a user’s access request will result in the cor-
have been seeing rapidly increasing adoption of IPFS, responding content being retrieved and served by a
with its network size doubling year over year. Scaling gateway, in a way that is completely transparent to
up at such speeds brings many challenges. But that’s the user.
par for the course when your intent is changing the So far, IPFS has been used to build varied appli-
Internet as we know it. cations, including systems for e-commerce, secure
Widespread adoption of content addressing and distribution of scientific data sets, mirroring Wiki-
IPFS should help the whole Internet ecosystem. By pedia, creating new social networks, sharing cancer
empowering users to request exact content and verify data, blockchain creation, secure and encrypted per-
that they received it unaltered, IPFS will improve sonal-file storage and sharing, developer tools, and
trust and security. Reducing the duplication of data data analytics.
moving through the network and procuring it from You may have used this network already: If you’ve
nearby sources will let ISPs provide faster service at ever visited the Protocol Labs site (Protocol.ai),
lower cost. Enabling the network to continue provid- you’ve retrieved pages of a website from IPFS without
ing service even when it becomes partitioned will even realizing it!
or all the tumultuous mined by a host of factors, many of them time in response to changes in the wire-
revolution in wireless technology over the random and therefore unpredictable? less channel. As the waves fall on such a
past several decades, there have been a Perhaps the most promising solution, surface, it can respond in real time, alter-
couple of constants. One is the over- right now, is to use reconfigurable intel- ing the incident waves’ direction so as to
crowding of radio bands, and the other is ligent surfaces. These are planar struc- strengthen the channel. Think of recon-
the move to escape that congestion by tures typically ranging in size from about figurable intelligent surfaces as the next
exploiting higher and higher frequencies. 100 square centimeters to about 5 square evolution of the repeater concept.
And today, as engineers roll out 5G and meters or more, depending on the fre- That’s important, because as we move
plan for 6G wireless, they find themselves quency and other factors. These surfaces to higher frequencies, the propagation
at a crossroads: After years of designing use advanced substances called metama� - characteristics become more “hostile” to
superefficient transmitters and receivers, terials to reflect and refract electromag�- the signal. The wireless channel varies
and of compensating for the signal losses netic waves. Thin two-dimensional constantly depending on surrounding
at the end points of a radio channel, metamaterials, known as metasurfaces, objects. At 5G and 6G frequencies, the
they’re beginning to realize that they are can be designed to sense the local elec- wavelength is vanishingly small com-
approaching the practical limits of trans- tromagnetic environment and tune the pared to the size of buildings, vehicles,
mitter and receiver efficiency. From now wave’s key properties, such as its ampli�- hills, trees, and rain. Lower-frequency
on, to get high performance as we go to tude, phase, and polarization, as the wave waves diffract around or through such
higher frequencies, we will need to engi- is reflected or refracted by the surface. In obstacles, but higher-frequency signals
neer the wireless channel itself. But how fact, these metasurfaces can be pro- are absorbed, reflected, or scattered. Basi-
can we possibly engineer and control a grammed to make these changes dynam- cally, at these frequencies, the line-of-
wireless environment, which is deter- ically, reconfiguring the signal in real sight signal is about all you can count on.
T
o deploy RIS nodes in a real- deployment. We’re partnering with Not surprisingly, our simulations con-
world network, researchers CNRS Research and CentraleSupélec, firmed that both larger RIS surfaces and
must first answer three ques- both in France, among others. larger numbers of them improved overall
tions: How many RIS nodes In a recent project, we used simulations performance. But which is preferable?
are needed? Where should they be to quantify the performance improvement When we factored in the costs of the RIS
placed? And how big should the surfaces gained when multiple RIS were deployed nodes and the base stations, we found
be? As you might expect, there are com- in a typical urban 5G network. As far as we that in general a smaller number of larger
plicated calculations and trade-offs. know, this was the first large-scale, RIS nodes, deployed further from a base
Engineers can identify the best RIS system-level attempt to gauge RIS perfor- station and its users to provide coverage
positions by planning for them when the mance in that setting. We optimized the to a larger area, was a particularly
base station is designed. Or it can be done RIS-augmented wireless coverage through cost-effective solution.
afterward by identifying, in the coverage the use of efficient deployment algorithms The size and dimensions of the RIS
map, the areas of poor signal strength. that we developed. Given the locations of depend on the operating frequency. We
As for the size of the surfaces, that will the base stations and the users, the algo- found that a small number of rectangular
Reconfigurable intelligent surfaces FREQUENCY BAND NUMBER OF RIS RIS SIZE IN RIS ANTENNA GAIN IN
size vs. frequency ELEMENTS SQUARE METERS DECIBELS RELATIVE
TO ISOTROPIC
The sizes of typical reconfigurable intelligent surfaces vary from a few square centimeters to several square meters.
For a given wavelength, larger area means higher gain. SOURCE: MARIOS POULAKIS
M A S S I V E M I M O B A S E S TATION Essential component Very high Very high Very Very Medium/high:
( M A C R O C E L L B A S E S T A TION) allowing denser (1,000– high high • Medium/high space
RF signal transceiving (full deployment of base 2,000 W) • Power supply
base-station capabilities) stations and system • Backhaul
improvement
Communication or Control/Robotics. Applicants must have a Ph.D. in Electrical Engineering or NYU Tandon has nationally renowned research
centers that ECE faculty lead and participate in,
a closely related field. The candidate’s research must specialize in Communication or Control/ including the Center for Cybersecurity, NYU Wire-
Robotics, with a record of refereed journal & conference publications in the relevant area. less, the Center for Advanced Technology in Tele-
communications (CATT), and the Center for Urban
Candidates must have a strong aptitude and interest in undergraduate and graduate Science + Progress (CUSP). ECE faculty are also
teaching. Candidates must have, a strong potential for establishing and conducting highly engaged in several school-wide research
initiatives (including communications, cybersecu-
sponsored research, excellent written and oral communication skills, and an ability to rity, data science/AI/robotics, and sustainability).
contribute in meaningful ways to the university’s continuing commitment to cultural diversity, We are looking to hire in the broad areas of
Computer Engineering (including architecture,
pluralism, and individual differences. Highly qualified candidates will be considered for an circuits, hardware devices, and systems), Control
endowed chair. Faculty responsibilities include teaching at both the undergraduate and Systems, Energy/Power, and Wireless Commu-
nications (including antennas/radio propagation,
graduate levels, conducting sponsored research programs, and providing service to the circuits, networking, and theory). The applicant
university and professional community. should have a Ph.D. degree in Electrical Engineer-
ing, Computer Engineering, or a closely related
discipline. The individual should have the po-
Apply online at https://apptrkr.com/3474406 tential to develop a strong record of scholarship,
leadership, curricular innovation, and an excellent
Keyword Search: 7166BR or 7167BR. funding record. The applicant should demonstrate
Inquiries may be sent to Dr. Sohail Dianat (sadeee@rit.edu). excellence in research, teaching and mentoring.
For application instructions and more information
about NYU Tandon, see: https://apply.interfolio.
RIT does not discriminate. RIT is an equal opportunity employer that promotes and values com/112470.
diversity, pluralism, and inclusion. For more information or inquiries, please visit RIT/TitleIX or the Applications should be submitted by December
U.S. Department of Education at ED.Gov. 15, 2022 for full consideration.
The EE Department has 41 tenured/tenure-track faculty members, To receive full consideration, please submit a cover letter detailing leadership
with average annual research expenditures of $15 million. The experience and skills along with the following:
undergraduate (juniors and seniors) and graduate programs enroll
over 400 and 240 students, respectively. The Department is 1) Curriculum vitae,
committed to advancing diversity, equity, and inclusion in all of its 2) A statement describing the applicant’s views on Christian leadership and vision,
forms. We embrace individual uniqueness, foster a culture of 3) An individualized statement of teaching and research interests related to
inclusion that supports both broad and specific diversity initiatives, Baylor's programs,
and leverage the educational and institutional benefits of diversity. 4) A statement describing personal and active Christian faith, and
We value inclusion as a core strength and an essential element of our 5) Contact information for at least three professional references.
public service mission. In welcoming every candidate, we strive to
meet the needs of professional families by actively assisting with
partner placement needs. Application review begins on December 1, 2022 and will continue until the
position is filled. Expected start date is August 1, 2023. Please submit mate-
Information about the Department and School can be found at rials to http://apply.interfolio.com/109432.
http://www.eecs.psu.edu.
Located in Waco, Texas, Baylor University is the oldest college in Texas. With
Applications will be considered until the position is filled. Applicants a population of around 21,000 students, Baylor is one of the top universities in
should submit the following: curriculum vita, statement of research,
the nation, having just been named an R1 institution by the Carnegie Classifi-
statement of teaching, and the names and addresses of four
references. If you have any questions regarding the application cation in 2022. Baylor is also on the honor roll of the "Great Colleges to Work
process, please contact Taylor Doksa (tce5018@psu.edu) or For" from The Chronicle of Higher Education, Baylor offers competitive salaries
814-863-2788. and benefits while giving faculty and staff the chance to live in one of the fast-
est-growing parts of the state. Our strategic plan, Illuminate, guides the Univer-
Apply Online at: https://apptrkr.com/3500667
sity as we continue to live up to Baylor's mission of educating men and women
CAMPUS SECURITY CRIME STATISTICS: For more about safety at Penn for worldwide leadership and service by integrating academic excellence and
State, and to review the Annual Security Report which contains Christian commitment within a caring community.
information about crime statistics and other safety and security
matters, please go to http://www.police.psu.edu/clery/, which will Baylor University is a private not-for-profit university affiliated with the Baptist Gener-
also provide you with detail on how to request a hard copy of the Annual
al Convention of Texas. As an Affirmative Action/Equal Opportunity employer, Baylor is
Security Report.
committed to compliance with all applicable anti-discrimination laws, including those
Penn State is an equal opportunity, affirmative action employer, and regarding age, race, color, sex, national origin, pregnancy status, military service, genetic
is committed to providing employment opportunities to all qualified information, and disability. As a religious educational institution, Baylor is lawfully permit-
applicants without regard to race, color, religion, age, sex, sexual ted to consider an applicant’s religion as a selection criterion. Baylor encourages women,
orientation, gender identity, national origin, disability or protected
minorities, veterans, and individuals with disabilities to apply.
veteran status.
This coin-operated
Pong prototype proved
wildly popular when
it debuted in
November 1972.
1-800-493-IEEE (4333)
To learn more*, visit IEEEinsurance.com/live LIFE INSURANCE
mathworks.com/machinelearning