Study of Mobile Phone Jammer Technique
Waman R. Parulekar1 , Damini D. Bhingarde2
Section:Review Paper, Product Type: Journal Paper
Volume-6 ,
Issue-7 , Page no. 1176-1179, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.11761179
Online published on Jul 31, 2018
Copyright © Waman R. Parulekar, Damini D. Bhingarde . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Waman R. Parulekar, Damini D. Bhingarde, “Study of Mobile Phone Jammer Technique,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1176-1179, 2018.
MLA Style Citation: Waman R. Parulekar, Damini D. Bhingarde "Study of Mobile Phone Jammer Technique." International Journal of Computer Sciences and Engineering 6.7 (2018): 1176-1179.
APA Style Citation: Waman R. Parulekar, Damini D. Bhingarde, (2018). Study of Mobile Phone Jammer Technique. International Journal of Computer Sciences and Engineering, 6(7), 1176-1179.
BibTex Style Citation:
@article{Parulekar_2018,
author = {Waman R. Parulekar, Damini D. Bhingarde},
title = {Study of Mobile Phone Jammer Technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1176-1179},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2578},
doi = {https://doi.org/10.26438/ijcse/v6i7.11761179}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.11761179}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2578
TI - Study of Mobile Phone Jammer Technique
T2 - International Journal of Computer Sciences and Engineering
AU - Waman R. Parulekar, Damini D. Bhingarde
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1176-1179
IS - 7
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
515 | 351 downloads | 259 downloads |
Abstract
the following research paper presents an overview of mobile phone jammer technique. It focuses on study of mobile jammer, its components, architecture and different types of jammers. With the increased use of mobile phone it has been observed that and different studies proved that mobile phone caused many accidents. Unnecessary use of mobile phone is creating disturbance in public places. Mobile phones are being used for many unethical purposes. The solution to this problem is the use of mobile jammer. This paper gives clear idea about the use of jammers and how mobile jammer works.
Key-Words / Index Term
Jammers, Mobile, Mobile Jammer, Jammer Devices
References
[1]. S. Jeong, K. Lee, H. Huh, and J. Kang, “Secure Transmission in Downlink Cellular Network with a Cooperative Jammer,” IEEE Wireless Communication Letters”, 2162-2337
[2]. Y. Yang, W.-K. Ma, J. Ge, and P. C. Ching, “Cooperative secure beam forming for AF relay networks with multiple eavesdroppers”, IEEE Signal Process. Lett., Vol. 20, Issue.1, pp. 35–38, Jan. 2013
[3]. S. Zorn, “A power saving jamming system for E-GSM900 and DCS1800 cellular phone networks for search and rescue applications.” 2011 IEEE Topical Conference on Wireless Sensors and Sensor Networks (2011): 33-36.
[4]. D.S. Madara, “Design and Testing of a Mobile-Phone-Jammer”, Innovative Systems Design and Engineering, Vol 7, No 7
[5]. S. Jeong, K. Lee, J. Kang, Y. Baek, and B. Koo, “Cooperative jammer design in cellular network with internal eavesdroppers,” in Proc. 2012IEEE Mil. Comm. Conf., pp. 1–5.