S.W. Shah, M. I. Babar, M. N. Arbab, K. Yahya, G. Ahmad, T. Adnan, A. Masood
{"title":"手机干扰器","authors":"S.W. Shah, M. I. Babar, M. N. Arbab, K. Yahya, G. Ahmad, T. Adnan, A. Masood","doi":"10.1109/INMIC.2008.4777805","DOIUrl":null,"url":null,"abstract":"This paper describes the design and implementation of two alternative techniques for jamming cell-phone communication, noise attack and spectrum distortion technique. Foreign leading electronic companies have already introduced the first technique of jamming through noise attack or denial of service, in market. Our aim is to come up with a new technique which is more robust and cost effective. In this research paper, we have compared the performance of old jamming technique with the new technique in various aspects like cost, power consumption, design complexity, robustness, coverage area, components availability and performance.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Cell phone jammer\",\"authors\":\"S.W. Shah, M. I. Babar, M. N. Arbab, K. Yahya, G. Ahmad, T. Adnan, A. Masood\",\"doi\":\"10.1109/INMIC.2008.4777805\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper describes the design and implementation of two alternative techniques for jamming cell-phone communication, noise attack and spectrum distortion technique. Foreign leading electronic companies have already introduced the first technique of jamming through noise attack or denial of service, in market. Our aim is to come up with a new technique which is more robust and cost effective. In this research paper, we have compared the performance of old jamming technique with the new technique in various aspects like cost, power consumption, design complexity, robustness, coverage area, components availability and performance.\",\"PeriodicalId\":112530,\"journal\":{\"name\":\"2008 IEEE International Multitopic Conference\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 IEEE International Multitopic Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INMIC.2008.4777805\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE International Multitopic Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INMIC.2008.4777805","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper describes the design and implementation of two alternative techniques for jamming cell-phone communication, noise attack and spectrum distortion technique. Foreign leading electronic companies have already introduced the first technique of jamming through noise attack or denial of service, in market. Our aim is to come up with a new technique which is more robust and cost effective. In this research paper, we have compared the performance of old jamming technique with the new technique in various aspects like cost, power consumption, design complexity, robustness, coverage area, components availability and performance.