Cell Phone Jamming for Safe Driving to Avoid Accidents
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 8
Abstract
Cell phones cannot be used in all the areas where it may result disturbing others or creating a serious disaster. Hence a Wireless jammer is designed which is used to avoid the usage of cell phones in such areas. The main significance of this model is that the system is flexible and does not interfere or collapse the signal received from the base station so that the calls or messages intended for the mobile is received but cannot be attended. That is, the system disables the microphone, loud speaker and keypad in the mobile. The jammer effectively disables cellular phones. When the ignition in the jammer unit goes ON, an RF signal is encoded and passed through RF transmitter to the RF receivers in the mobile unit and the message is decoded. As soon as Mobile unit receives the Signal it locks the Microphone, Speaker and the keypad of the smart phone. The user is still notified about the calls and the messages are received.
Authors and Affiliations
Rubiya Yasmin
DESIGN AND ANALYSIS OF GO-KART CHASSIS
A Go-Kart is a small four wheeled vehicles without suspension or differential. It is a light powered vehicle which is generally used for racing. This paper is aimed to model and perform the dynamic analysis of the...
Analysis of Hyper Spectral Image and Compression Algorithm Parameters
Hyper Spectral imaging is similar to spectral imaging where information is collected and processed across the electromagnetic spectrum. Information’s are retrieved in the form of images/bands. Since images are col...
THE PREDICTION OF WATER CUTTING AND DENSITY OF OILWATERCONDENSAT MIXES
This article is devoted to studying of problems, existence of a significant amount of gas-condensate deposits of Azerbaijan causes high prospects of use of condensate also as a thinner at pipeline transport hi...
Trust Aware Routing Framework
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or...
EVOLUTIONARY METHODS FOR IMAGE CLASSIFICATION: A REVIEW
Image classification has earned enormous attention due to the advent of modern day applications involving image base information and now an extensive research has been carried out in this field. It is important to...