FPGA Based Wireless Jamming Networks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 9
Abstract
A mobile jammeris a device which is used to jam signals of cell phone from receiving signals from base stations. Mobile jammer is used majorly where the disturbances that are occurred with the cell phones. So, in this paper we are designing a new Mobile Jammer unit which is capable of blocking the cell phone working not the signal receiving from Base Station, which make effective use of the situation where jammers actually used. This was implemented using FPGA by interfacing Mobile Device, RF Transmitter and RF Receiver and LCD Unit.
Authors and Affiliations
Anne Yasaswini Chowdary| PG scholar (VLSI) Department of electronics and communication engineering, M. Suneetha| Assistant Professor Gokaraju Rangaraju Institute of Engineering &Technology,JNTUH
Design And Analysis Of Machining (Hydraulic) Fixture For AVTEC Transmission Case Component
In order to have interchangeable parts in mass production, jigs and fixtures play a vital role in manufacturing process. A fixture is a special tool designed for specific purpose and for specific component for operat...
FPGA Implementation of Floating Point Reciprocator Using Binomial Expansion Method
Floating-point support has become a mandatory feature of new micro processors due to the prevalence of business, technical, and recreational applications that use these operations. In these operations Floating-point...
Measuring and improving service quality in Automobile dealership center: SERVQUAL
SERVQUAL which is a service quality measurement scale is now been extensively used in research in order to measure the quality of various services being provided to the customers. The objective of the paper is to mea...
Fault Localization Scheme Constructed Using The Header Space Framework
ATPG utilizes the header space structure—a geometric model of how bundles are prepared. In header space, convention particular implications connected with headers are overlooked: A header is seen as a level groupin...
Utilization Of Ring Signatures To Construct Homomorphic Authenticators In ORUTA To Verify The Integrity of Shared Data
It is practiced for users to influence cloud storage services to contribute to data with others in a group as data sharing develop into a standard feature in most cloud storage offerings including Drop box, iCloud an...