AN OPTIMAL DETECTION TECHNIQUE FOR MOBILE RADIO FREQENCIES
Journal Title: International Journal of Engineering, Science and Mathematics - Year 2012, Vol 2, Issue 5
Abstract
Cellular phone technology is rapidly changing. Features like Bluetooth, USB, high resolution cameras, microphones, Internet, 802.11 wireless, and memory cards are added every year. Also, the communication technology a cellular phone uses such as CDMA, GSM, 3G, and 4G are rapidly changing. To get a good grasp on what is available today let’s take a close look at some off the shelf cellular phone detectors. Most detectors are manufactured with the intent that the cellular phone is stationary and powered on. They generally have the same features and it is questionable whether or not they actually detect a cellular phone. The two most popular cellular phone detectors available on the market today are produced by Berkeley Varitronics Systems and Mobile Security Products. These companies produce the wolfhound cellphone detector and Cellbuster respectively. This study examines detecting cellular phones when a person is entering a secure facility or cellular phone restricted area. The detection technique studied requires measuring a cell phone's electromagnetic properties and determining an identifiable signature. Measuring the RF spectrum around 240 -400MHz(outside the cellular phone band) shows the most potential. The main problem with ensuring that a cellular phone isn't in a secure facility is that an accurate method for detecting them doesn't exist. The only way to be certain is to perform full body searches on a regular basis. Most cellular phone detectors available today only alarm if there is a cellular phone or transmission device in the general area. They appear to alarm randomly and aren't very accurate. Detecting a cellular phone signal using an accurate signal detection technique is the focus of this research and can be solved by using a down converter in conjunction with a bandpass filter. The technique is more accurate and provides signal detection at a lower frequency, making it easier to work with. If this solution was implemented, it would greatly reduce the risk of cellular phones getting into secure facilities. Businesses and government would save a lot of money on security. The solution would also greatly reduce the risk of their data leaking to the general public and losing even larger amounts of money.
Authors and Affiliations
M. Sucharitha, T. Jahnavi, N. Poornima, P. Krishna Silpha and K Murali
AN EFFICIENT ROUTING SCHEME FOR ICMN
In this paper, intermittently connected mobile networks are sparse wireless networks where most of the time there does not exist a complete path from the source to the destination. These networks fall into the general...
HOMOGENEOUS MARKOV PROCESSES ON DISCRETE TIME QUEUES TO CONTINUOUS TIME
Discrete time analysis queues have always been popular with engineers who are very keen on obtaining numerical values out of their analyses for the sake of experimentation and design. As telecommunication systems are b...
Analytical Study on PNG image transfer on Bluetooth piconet with respect to Nodes and Time taken
The PNG image is the another one basic image format in digital world that is a enhance version of GIF, the limitation of GIF is, it is support only 256 colors and the PNG support true color, here we are going to presen...
Incorporating security into Web Applications - An Aspect oriented approach
In this era of collaborative computing and networked and shared web applications, ensuring the safety and privacy of data stored in computers and transmitted over the internet has become critically important. Web appli...
4G WIRELESS NETWORKS: BENEFITS AND CHALLENGES.
The era of new wireless communications is upon us. Eventually it will penetrate into our daily life and change the way we live just like many technological innovations whose original research came from the military nee...