• Neutrality is Polite Oppression: How critical librarianship and pedagogy principles counter neutral narratives and benefit the profession

      Ferretti, Jennifer A.; Maryland Institute College of Art (The University of Arizona, 2018-11-28)
      The debate about whether or not libraries and information professionals should be neutral seems perpetual. Championing neutrality over a critical perspective intentionally furthers the oppression of not only marginalized patron populations, but of marginalized colleagues. Rooted in principles of critical pedagogy and critical librarianship, this talk will illustrate how neutrality impacts the information professions and the communities we serve, as well as ways in which our expectations of our students to critically evaluate sources can be applied to our own work. We ask our students to think about what information is missing within a resource. It’s time we not only ask our profession the same (who isn’t at the table, what isn’t being discussed, etc.), but also that we take action to counter narratives of neutrality in our everyday practices, including in the classroom and our work spaces.
    • Practising Digital Pedagogy Librarianship: Building Critical and Queer Feminist Communities

      Patel, Kush; Cong-Huyen, Anne; University of Michigan (The University of Arizona, 2018-11-16)
      This workshop, led by the Digital Pedagogy Librarians at the University of Michigan Libraries, aims to address the nature and nurturing of digital pedagogy librarianship beyond its relationship to digital tools to ask: what roles do critical and queer feminist principles play in enriching our approaches to digital pedagogy and how might we constitute mutually transformative communities of practice around those principles?
    • Design Thinking in an Hour? Or, Design Thinking: A Cautionary Tale

      Arteaga, Roberto; Pacific Lutheran University (The University of Arizona, 2018-11-16)
      Design thinking (DT) is a methodology that has become popular across many sectors due to its iterability and flexibility. As its adoption spreads throughout higher education settings, DT is now starting to appear in library literature and conferences. As teaching librarians, we may be tempted to adapt popular methodologies in the hope of increasing the reach of our work, considering how undervalued and misunderstood our work can be, but we should also consider whether DT is a potentially harmful practice. By discussing DT, what it can do, and where it can be most useful, I will present a case for why librarians who teach need not engage in a practice that treats learning as something that needs a solution and appears to sideline students and their lived experiences. Those who practice critical librarianship would be better served by adopting a student-centered pedagogy that shifts power and agency to the students, while simultaneously educating others on the work they do, why they do it, and how it contributes to student learning.
    • Critical Approaches to Evaluating Student Privacy & 3rd Party Apps

      The University of Arizona, 2018-11-16
      This information literacy resource was created by participants and facilitators during a workshop titled "Student privacy & third-party apps : Examining a university’s Terms of Service" at CLAPS 2018. Through reading actual contracts between technology vendors and the University or Arizona, the group of academic librarians, library administrators, and faculty developers synthesized the steps to take and information to look for in these contracts to better understand how student and worker information is collected and used by third-party vendors.
    • Disrupting Traditional Power Structures in Academic Libraries: Saying No, How to Do it, and Why it Matters

      Cassidy, Melanie; Versluis, Ali; Menzies, Erin; University of Guelph; University of Guelph; Ontario Ministry of Health and Long-Term Care (The University of Arizona, 2018-11-16)
      Many academic libraries face austerity measures, personnel reductions, or compression; the weight of increased workloads results in diminished mental health, increased precarity, and an inability to engage in critical teaching and learning practices. These challenges sit at the intersection of resilience, precarity, and neoliberalism. Within academic libraries, resilience is endorsed as a means of negotiating precarious employment by encouraging non-permanent staff to continually prove their value to the institution or risk not being retained. The neoliberal perspective endorses an environment where individual culpability is assigned at the cost of challenging institutional practices. This session seeks to interrogate our position as library staff within this construct, both in terms of how we are influenced by this intersection and how we support it. Participants will share experiences, develop best practices, and establish a “resilience taxonomy” to provide support in resisting overwork, precarity, and other negative side-effects of the neoliberal academic library.
    • Contested Sites of Critical Library Pedagogy

      Almeida, Nora; Beilin, Ian; New York City College of Technology, CUNY, Brooklyn, NY; Columbia University, New York, NY (The University of Arizona, 2018-11-16)
      In this presentation we will explore critical library pedagogy in relation to different physical places and dialogic spaces. Using the idea of the library as a “third space” as a point of departure, we will consider whether alternative spatial contexts or modes of analysis might enable new forms of critique that are embodied, culturally grounded, and creative.

      Schultz, Aaron; Marcellin, Michael; Univ Arizona (International Foundation for Telemetering, 2018-11)
      The main problem with wired data transmission is exposure to electrical noise. In environments with extremely high noise levels, special care needs to be taken in order to accurately send data between two or more devices. In the case of motorsports, extreme noise on any critical data lines can cause engine failure, putting the driver’s safety at risk. The purpose of this paper is to explain effective construction techniques for noise reduction in a wiring harness, as well as to review how certain serial data protocols will handle errors in harsh conditions.

      Wu, Zhenhua; Wang, Jianjun; Li, Xiaoya; Chinese Flight Test Establishment (International Foundation for Telemetering, 2018-11)
      In multi-bus, long-endurance flight test, the huge test data is recorded by networked airborne testing system. After the flight, to ensure that engineers can analyze engineering data immediately, the processing platform must use limited resources quickly to complete test data processing. Because the test parameters sets on different test tasks are different, we design an airborne restructurable fast data processing system: during the flight, uploading the phased data processing configuration information through telemetry uplink in real time according to the execution state of the ongoing test task, based on these task requirements, the airborne processing system restructures its processing logic and workflow, avoiding repeated calculation of parameters, and ensuring the limited onboard computing resources can meet the needs of multitasking comprehensive flight test data processing.

      Yang, Andrew; Goldsworthy, Dylan; Nakamura, Drew; Hua, Lee; Univ California Santa Barbara, Department of Electrical and Computer Engineering (International Foundation for Telemetering, 2018-11)
      Conventional geolocation techniques were developed based on time-delay estimation, followed by computation of the angle of arrival (AOA). The AOA computation is the main cause of latency, which significantly degrades the feasibility of real-time bearing-angle detection. The computation also adds to hardware complexity and power consumption, which is critical for small, light-weight and mobile devices. This paper presents a codebook based approach to geolocation. The delay profiles are mapped to a precomputed codebook to match the optimal estimation of the geolocation. This simplifies the computation procedure and makes real-time computing feasible. It utilizes limited memory capacity to reduce latency and hardware complexity. This approach also allows us to accurately assess the resolving capability. In addition, it reduces computation for joint estimation with multiple receiver units, especially in mobile format.

      Oyediran, David; Dean, Richard; Moazzami, Farzad; Morgan State University, Department of Electrical and Computer Engineering (International Foundation for Telemetering, 2018-11)
      Spectrum sharing between federal and commercial users is proposed by the FCC and NTIA to open up the 3.5 GHz band for wireless broadband use. This requires the detection and subsequent allocation of available licensed spectrum for temporary use by other users without interfering with incumbent signal transmission. The DoD has a documented requirement of 865 MHz by 2025 to support telemetry but only 445 MHz is presently available. This paper presents spectrum sharing opportunity and technology that will help reduce service interference between spectrum users. We developed protocol model for spectrum sharing and implemented cognitive radio media access sensing mechanism using cyclostationary feature detector (CFD). The paper demonstrates shared usage by secondary users with minimum interference and improvement in throughput by as 5 times compared to other protocols. This is an introductory work that shows the feasibility of the approach with the potential for many other factors to be considered. We suggest that with proper sensing mechanism and quiet period implementation by the unlicensed users, CSMA/CA RTS-CTS could be adopted for licensed user protection.
    • Spectrum Access R&D (SARD) Program: Broadband Conformal C-Band Antenna Project

      Apalboym, Maxim; Bhakta, Kamal; Chavez, Michael; Kujiraoka, Scott; NAWC-WD Point Mugu (International Foundation for Telemetering, 2018-11)
      Currently in the second year of development, Broadband Conformal C-Band Antenna (BCCA) is being transitioned and matured out of prototyping phase. This paper will discuss encountered challenges in designing, optimizing, and developing a weapon system telemetry antenna operating in C-Band spectrum.

      Thom, Gary A.; GDP Space Systems (International Foundation for Telemetering, 2018-11)
      Today’s telemetry ground stations are migrating from traditional serial PCM data distribution to Telemetry over IP architectures. The Range Commanders Council has published IRIG 218-10 TELEMETRY TRANSMISSION OVER INTERNET PROTOCOL (TMoIP) STANDARD, which attempts to standardize PCM distribution over IP networks and is currently working on a revision. Ranges have begun investigating new TMoIP systems. This paper attempts to facilitate this migration by discussing the TMoIP, networking and architectural concepts that need to be considered when deploying a TMoIP system. The paper draws on the lessons learned over the previous 10 years of designing, installing, troubleshooting and optimizing telemetry data distribution over IP networks. It discusses the critical component and architectural decisions to be made and some of the pitfalls to be avoided.

      Du, Xianyu; Zhou, Yi; Yi, Xiaoqian; Instrumentation Department, COMAC Flight Test Center (International Foundation for Telemetering, 2018-11)
      In order to cover the complete flight path of a large civil aircraft during its flight test missions, Telemetry-over-IP (TMoIP) systems have become a standard technique solution in COMAC Flight Test Center. In this paper, practical considerations in implementing the TMoIP systems using a satellite communication link will be discussed, along with the applicable satellite modem parameters. Based on the Command & Control Center located besides the Shanghai Pudong International Airport, several typical cities represent different directions and climatic conditions across the mainland of the country are analysed. Thanks to the high mobility and rapidly deployable satellite communication vehicle, and the rental of satellite time can be specified in contract at a reasonable price and scheduling can be coordinated a short time in advance, high-risk flight test subjects can be monitored and instructed at the head-quarter where more specialist can participate and better ground test and verification equipments can be arranged to support the missions.

      Baxter, Jason; Perrins, Erik; DePardo, Dan; University of Kansas, Electrical Engineering & Computer Science Department (International Foundation for Telemetering, 2018-11)
      Due to the economic importance of spectrum allocation, modulation schemes traditionally used in telemetry are being replaced with more spectrally efficient schemes. Amplitude and Phase Shift Keying (APSK) is one modulation scheme being considered for implementation in aeronautical telemetry. However, an APSK modulated signal is vulnerable to nonlinearities of a transmitter’s RF power amplifier (PA). Driving a PA into saturation produces two undesired nonlinearities: amplitude-to-amplitude modulation (AM-AM) and amplitude-to-phase modulation (AMPM). This paper characterizes the PA in a C-Band transmitter using a 16-APSK test signal in terms of these nonlinearities.

      Graham, Richard A. Jr. (International Foundation for Telemetering, 2018-11)
      Several telemeters output RNRZ-L. This paper examines how to use software to decode the RNRZ-L to NRZ-L.

      Hegde, Vinayak; Nokia Corporation of America (International Foundation for Telemetering, 2018-11)

      Madon, Phiroz; Fecko, Mariusz; Ziegler, Robert; Samtani, Sunil; Harasty, Daniel; Shen, John; Painter, Mike; Jones, Charles; Young, Tom; O’Brien, Thomas; et al. (International Foundation for Telemetering, 2018-11)
      DoD flight test ranges need to track telemetry spectrum usage to defend against future sell-offs, as well as operate with high spectral efficiency. The Spectrum Usage Measurement System (SUMS) characterizes spectrum usage and requirements at test ranges, and assesses operational impacts and costs on Test and Evaluation. The system relies on mission planning and scheduling data acquired from test range planning systems, as well as measurements obtained from telemetry receivers and frequency scanning sensors. SUMS key capabilities include: (1) collecting over-the-air evidence of actual assigned frequency usage; (2) combining this data with mission plans to produce an accurate representation of telemetry spectrum usage through the space, time, and frequency dimensions; (3) providing users with a data warehouse of spectrum usage, potentially spanning multiple years, with test ranges across CONUS, and (4) providing data analytics and visualization techniques that combine 3-D terrain-based heat maps with usage metrics charts.
    • Spectrum Supply and Demand Prediction Models

      Jones, Charles H.; Painter, Michael K.; C. H. Jones Consulting, LLC; Knowledge Based Systems, Inc. (International Foundation for Telemetering, 2018-11)
      There is a general belief that there is not enough spectrum available to meet T&E needs. How do we know this is true? The very few studies that have analyzed this have done so with limited data and limited modeling. Spectrum is a natural resource. An analogy to gold mining can be useful. A certain amount of gold exists in the ground, but it takes equipment to extract it. It is only the extracted quantity that is available as supply. Transmitters and receivers are the mining equipment that extract spectrum. Demand is different from requirements. A quagmire of debate surrounds requirements. Whereas, what testers want is their choice. There is evidence that not all demand is input into spectrum scheduling systems due to a combined perception by some testers of low priority and a lack of spectrum. Thus, use and request data do not even capture demand. This paper provides models and techniques that can aid analyses trying to predict the gap between spectrum supply and demand.

      Painter, Michael K.; Madanagopal, Karthic; Swaminathan, Kannan; Jones, Charles H.; Knowledge Based Systems, Inc.; C. H. Jones Consulting, LLC (International Foundation for Telemetering, 2018-11)
      There continues to be growing pressure to sell off spectrum currently allocated for defense purposes in favor of private sector applications, prompting concerns that we will soon reach a point where Department of Defense (DoD) needs can no longer be met. In response, the Range Commanders Council (RCC) Frequency Management Group (FMG) developed a baseline set of standard metrics to measure spectrum utilization, demand, efficiency, and operational effectiveness. Using this standard (RCC 707-14) as a foundation, a Spectrum Management Metrics Toolkit (SMMT) has been developed to calculate, plot, and display these metrics. The challenge now is leveraging these metrics to inform and construct the arguments needed to maintain access to needed spectrum. The purpose of this paper is to describe progress toward the development of a methodology and a set of analytics based on the RCC standard to build such a compelling narrative. The methodology is based on a data analytics and communication concept, called “Story Points,” which seeks to guide users in the discovery, composition, and delivery of targeted narratives and supporting graphics derived through mining available data sources.

      Harrison, Willie K.; Nelson, Kaela; Dye, Scott; BYU, Department of Electrical and Computer Engineering (International Foundation for Telemetering, 2018-11)
      In this paper, we investigate the application of physical-layer security coding for next generation aeronautical telemetry communication systems. The coding we refer to is similar to error-control coding, but the codes are deployed for two purposes: to achieve reliable communications, and to achieve secure communications. We consider a single eavesdropper on an air-to-ground aeronautical telemetry link, and show how the overhead measured by the rate of the code can be used to keep secrets from eavesdroppers over noisy channels, rather than recover from channel errors. We show simple examples that work over erasure channels to achieve a security constraint, and then consider approaches to more practical coding constructions for Gaussian channels that satisfies both reliability and security constraints on the network.