Open Access   Article Go Back

Study of Mobile Phone Jammer Technique

Waman R. Parulekar1 , Damini D. Bhingarde2

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 1176-1179, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.11761179

Online published on Jul 31, 2018

Copyright © Waman R. Parulekar, Damini D. Bhingarde . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Waman R. Parulekar, Damini D. Bhingarde, “Study of Mobile Phone Jammer Technique,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1176-1179, 2018.

MLA Style Citation: Waman R. Parulekar, Damini D. Bhingarde "Study of Mobile Phone Jammer Technique." International Journal of Computer Sciences and Engineering 6.7 (2018): 1176-1179.

APA Style Citation: Waman R. Parulekar, Damini D. Bhingarde, (2018). Study of Mobile Phone Jammer Technique. International Journal of Computer Sciences and Engineering, 6(7), 1176-1179.

BibTex Style Citation:
@article{Parulekar_2018,
author = {Waman R. Parulekar, Damini D. Bhingarde},
title = {Study of Mobile Phone Jammer Technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1176-1179},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2578},
doi = {https://doi.org/10.26438/ijcse/v6i7.11761179}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.11761179}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2578
TI - Study of Mobile Phone Jammer Technique
T2 - International Journal of Computer Sciences and Engineering
AU - Waman R. Parulekar, Damini D. Bhingarde
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1176-1179
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
457 300 downloads 226 downloads
  
  
           

Abstract

the following research paper presents an overview of mobile phone jammer technique. It focuses on study of mobile jammer, its components, architecture and different types of jammers. With the increased use of mobile phone it has been observed that and different studies proved that mobile phone caused many accidents. Unnecessary use of mobile phone is creating disturbance in public places. Mobile phones are being used for many unethical purposes. The solution to this problem is the use of mobile jammer. This paper gives clear idea about the use of jammers and how mobile jammer works.

Key-Words / Index Term

Jammers, Mobile, Mobile Jammer, Jammer Devices

References

[1]. S. Jeong, K. Lee, H. Huh, and J. Kang, “Secure Transmission in Downlink Cellular Network with a Cooperative Jammer,” IEEE Wireless Communication Letters”, 2162-2337
[2]. Y. Yang, W.-K. Ma, J. Ge, and P. C. Ching, “Cooperative secure beam forming for AF relay networks with multiple eavesdroppers”, IEEE Signal Process. Lett., Vol. 20, Issue.1, pp. 35–38, Jan. 2013
[3]. S. Zorn, “A power saving jamming system for E-GSM900 and DCS1800 cellular phone networks for search and rescue applications.” 2011 IEEE Topical Conference on Wireless Sensors and Sensor Networks (2011): 33-36.
[4]. D.S. Madara, “Design and Testing of a Mobile-Phone-Jammer”, Innovative Systems Design and Engineering, Vol 7, No 7
[5]. S. Jeong, K. Lee, J. Kang, Y. Baek, and B. Koo, “Cooperative jammer design in cellular network with internal eavesdroppers,” in Proc. 2012IEEE Mil. Comm. Conf., pp. 1–5.