AN OPTIMAL DETECTION TECHNIQUE FOR MOBILE RADIO FREQENCIES

Abstract

Cellular phone technology is rapidly changing. Features like Bluetooth, USB, high resolution cameras, microphones, Internet, 802.11 wireless, and memory cards are added every year. Also, the communication technology a cellular phone uses such as CDMA, GSM, 3G, and 4G are rapidly changing. To get a good grasp on what is available today let’s take a close look at some off the shelf cellular phone detectors. Most detectors are manufactured with the intent that the cellular phone is stationary and powered on. They generally have the same features and it is questionable whether or not they actually detect a cellular phone. The two most popular cellular phone detectors available on the market today are produced by Berkeley Varitronics Systems and Mobile Security Products. These companies produce the wolfhound cellphone detector and Cellbuster respectively. This study examines detecting cellular phones when a person is entering a secure facility or cellular phone restricted area. The detection technique studied requires measuring a cell phone's electromagnetic properties and determining an identifiable signature. Measuring the RF spectrum around 240 -400MHz(outside the cellular phone band) shows the most potential. The main problem with ensuring that a cellular phone isn't in a secure facility is that an accurate method for detecting them doesn't exist. The only way to be certain is to perform full body searches on a regular basis. Most cellular phone detectors available today only alarm if there is a cellular phone or transmission device in the general area. They appear to alarm randomly and aren't very accurate. Detecting a cellular phone signal using an accurate signal detection technique is the focus of this research and can be solved by using a down converter in conjunction with a bandpass filter. The technique is more accurate and provides signal detection at a lower frequency, making it easier to work with. If this solution was implemented, it would greatly reduce the risk of cellular phones getting into secure facilities. Businesses and government would save a lot of money on security. The solution would also greatly reduce the risk of their data leaking to the general public and losing even larger amounts of money.

Authors and Affiliations

M. Sucharitha, T. Jahnavi, N. Poornima, P. Krishna Silpha and K Murali

Keywords

Related Articles

RAIN TECHNOLOGY.

The massive jumps in technology led to the expansion of internet as the most accepted medium for communication. But one of the most prominent problems with this client server based technology is that of maintaining a r...

Investment Pattern in Debt Scheme of Mutual Funds – An Analytical Study

A Mutual Fund is a trust that pools together the savings of a number of investors who share a common financial goal. All such investors buy units in a fund that best suit their needs - be it growth in capital, regular...

E-Commerce online payment security issues discussion and analysis

Nowadays electronic commerce services have risen to become more ... The handling of the payment may involve many ways, such as online banking. Computer network technology is developing fairly rapidly. With the Internet...

A STUDY OF NEWSPAPER READERSHIP PATTERNS AMONG URBAN POPULATION OF PUNJAB.

Newspapers have been a source of information to one and all from various years. However, with the proliferation of TV News Channels, Readers' choice of getting news and information has changed. The evolution of new med...

VLSI IMPLEMENTATION OF SYSTOLIC ARRAY FOR DISCRETE WAVEELET TRANSFORM

This paper presents a VLSI implementation of Systolic architecture for discrete wavelet transform (DWT).This architecture consist of Input delay unit, filter, register bank and control unit. This performs the calculati...

Download PDF file
  • EP ID EP26648
  • DOI -
  • Views 294
  • Downloads 6

How To Cite

M. Sucharitha, T. Jahnavi, N. Poornima, P. Krishna Silpha and K Murali (2012). AN OPTIMAL DETECTION TECHNIQUE FOR MOBILE RADIO FREQENCIES. International Journal of Engineering, Science and Mathematics, 2(5), -. https://europub.co.uk/articles/-A-26648