Fwd: Tuesday Nite Tech Net

Nan and Sandy Sanders radiodog77 at pobox.com
Sat Dec 20 17:05:45 CST 2014


> From WB3KDU
>
>Tech Net meets Tuesday Nights at 8:00 PM on the W4CIA echo-link 
>conference point and
>through the 81/21 repeater in Tyson's Corner Northern 
>Virginia.   Sandy, WB5MMB is
>conference point coordinator and network control.
>======================================================================== 
>
>
>Here are three questions open for discussion on this Tuesday Night Tech Net.
>
>1. (Current Experiments) Whats happening with our spread spectrum 
>experimenting?
>2. (Technology Speculation) Applying Machine Learning Ideas to Amateur Radio
>3. (FCC Rules Discussion) Should the FCC authorize encryption for ham radio?
>
>
>-----------------------------------------------------------------------------------------------------------
>1. What's happening with the spread spectrum experimenting?     Yes, 
>progress is
>being made.  Terry, Lawrence and Andre have pointed out the Part 97 
>rules for this
>mode have been greatly simplified.  There are only a few common 
>rules remaining.
>
>1. How has part 97 changed?  What do the new regs say we can or cannot do?
>
>2  Lets review what the experimenters are doing, what they care the 
>share with the
>rest of the net.
>
>3 How should a newcomer to this mode get involved?   Are there 
>simple tasks they
>can help with?   Is there yet straightforward *experimental* 
>hardware they can build?
>
>4 Discussion topic: a spread spectrum repeater.  This is a holy 
>grail of amateur spread
>spectrum and isn't going to be with us any time soon.  Its still 
>interesting to speculate on
>how such a thing would work or  the kind of signaling schemes we 
>might have to invent
>to make it work.
>
>------------------------------------------------------------------------------------------------------------------
>2. Applying machine learning ideas to amateur radio
>Machine Learning (ML) is used in many common day places that we are 
>all familiar with.
>Netflix and Amazon use one called a "recommendation system" to 
>suggest movies you
>might like or books you might want to read.  Search Engines  use ML
>to anticipate your  search preferences and increase their click 
>rates.  Closer to home
>a very simple example of ML is the common receiver AGC which is 
>basically a simple
>control system loop.  ML is a group of computer algorithms for 
>putting things into classes
>and making predictions.
>
>1. As a warm-up, I will say a (very) few words about ML applications 
>in  communications.
>  I will introduce a very few central ideas in ML and point to how 
> these might the applied.
>
>2.  How would you use ML if you were designing the next generation 
>communications box?
>Suppose your box had the ability to learn, what would you do with that?
>
>---------------------------------------------------------------------------------------------------------------------------
>If time permits we will take a look at this issues which was 
>recently before the FCC.
>
>3. Should the FCC authorize encryption for ham radio?
>Encryption is an effective method of obscuring or hiding information 
>from unintended recipients.
>By treaty and regulation encryption is general prohibited in amateur 
>radio but exceptions exist
>including remoter receiver control (satellite operations) and 
>amateur wifi (with a common published
>key).  Amateur assistance to disaster recovery and search and rescue 
>often involves handling
>sensitive information over the radio.  Professional search and 
>rescue teams employ pre-arranged
>phrases to cover the transmission of sensitive facts knowing the 
>press and others are listening
>on scanners.
>
>1. If you were designing an encryption system for amateur radio what 
>would you want it to do
>and not do?
>
>2. The ARRL argues that current practices are fully sufficient to 
>handle this problem and that
>introducing encryption would create more problems than it would 
>solve.  Do you agree or disagree
>with this position?
>
>3. A borderland exists between complicated modulation and coding 
>schemes and encrypted
>data transmissions.  These complex schemes are difficult to 
>demodulate without proper
>equipment.  As a side effect, it effectively obscures and hides 
>information except from those with
>the proper equipment.   What is complex also changes with the 
>literary of the participants;
>at one time ASCII was described as a secret code by an relatively 
>unknowledgeable
>speaker.  Is there anything to be learned from this?
>
>==========================================================================
>Tech Net meets Tuesday Nights at 8:00 PM on the W4CIA echo-link 
>conference point and
>through the 81/21 repeater in Tyson's Corner Northern 
>Virginia.   Sandy, WB5MMB is
>conference point coordinator and network control.



More information about the Tacos mailing list