CFP last date
22 April 2024
Reseach Article

A better Approach to detect the Presence of Cell Phones being used in Prohibited Areas

by Pankaj Mangal, Shubham Kumar, Rajkumar S.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 168 - Number 2
Year of Publication: 2017
Authors: Pankaj Mangal, Shubham Kumar, Rajkumar S.
10.5120/ijca2017914291

Pankaj Mangal, Shubham Kumar, Rajkumar S. . A better Approach to detect the Presence of Cell Phones being used in Prohibited Areas. International Journal of Computer Applications. 168, 2 ( Jun 2017), 12-14. DOI=10.5120/ijca2017914291

@article{ 10.5120/ijca2017914291,
author = { Pankaj Mangal, Shubham Kumar, Rajkumar S. },
title = { A better Approach to detect the Presence of Cell Phones being used in Prohibited Areas },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 168 },
number = { 2 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 12-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume168/number2/27846-2017914291/ },
doi = { 10.5120/ijca2017914291 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:15:02.618739+05:30
%A Pankaj Mangal
%A Shubham Kumar
%A Rajkumar S.
%T A better Approach to detect the Presence of Cell Phones being used in Prohibited Areas
%J International Journal of Computer Applications
%@ 0975-8887
%V 168
%N 2
%P 12-14
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This handy, pocket-size mobile transmission detector can sense the presence of an activated mobile phone from a distance of one and half meters. So it can be used to prevent the use of mobile phones in examination halls, confidential rooms, etc[2]. There are existing models for the cell phone detectors which works when some transmission occurs from the phone. In this paper, we are proposing a detector which works even when the mobile phone is just in the switched on mode but not being used for any kind of transmission. It is also useful for detecting the use of mobile phone for Spying and unauthorized video transmission[2]. The circuit can detect the incoming calls and outgoing calls, SMS and video transmission even if the mobile phone is kept in the silent mode. The moment the bug detects RF(Radio Frequency) transmission signal from an activated mobile phone, it starts sounding a beep alarm and LED blinks[1]. The alarm continues until the signal transmission ceases.

References
  1. Philipp Baumann 1, Reynold J. Cooper2 , Dorit S. Hochbaum 1, Nidhi Patel2 , Kunal Shalia 1 1 “Efficient Deployment of Mobile Detectors for Security Applications” ,Department of Industrial Engineering and Operations Research, University of California, Berkeley, USA 2Lawrence Berkeley National Laboratory, Berkeley, USA
  2. T. Carpenter, J. Cheng, F. Roberts, and M. Xie, "Sensor management problems of nuclear detection," in Safety and Risk Modeling and Its Applications, H. Pham, Ed. London: Springer Series in Reliability Engineering, 2011.
  3. V. A. Traag, A. Browet, F. Calabrese and F. Morlet, “Social Event Detection in Massive Mobile Phone Data Using Probabilistic Location Interference”, SocialCom/PASSAT, pp.625-628, October 9-11,2011
  4. J. W. Branch, C. Giannelia, B. Szymanski, R.Wolff and H. Kargupta, “In-Network Outlier Detection in Wireless Sensor Networks”, knowledge and information systems, vol 31, Springer-Verlag, 2012.
  5. M. M. Breunig, H.P. Kriegel, R.T. Ng and J. Sander, “LOF: Identifying Density Based Local Outliers,” In Proceedings of the ACM SIGMOD Conference, Dallas, TX, May 2000.
  6. B. Wang and W. Perrizo, “RDF: a density based outlier detection method using vertical data representation”, IEEE Int. Conference on Data Mining, pp. 503-506, 2004.
  7. S. Rajagopalan, R. Karwoski, B. Bartholmai, R. Robb, “Quantitative image analytics for strtified pulmonary medicine”, IEEE Int. Symposium on Biomedical Imaging (ISBI), pp. 1779-1782, 2012.
  8. V.chandola, A.Banerjee and V .kumar, ”Outlier Detection:A survey”, ACM Computing surveys,pp. 1-72,2009.
  9. J. Yang and Y. wang, ”A new outliers detection algorithms based on Markov chain”, Advance Materials Research, vol;.366, pp.456-459, 2012.
  10. D.M. Hawkins, ”Identification of outliers”, Chapman and Hall,London,1980.
Index Terms

Computer Science
Information Sciences

Keywords

Cell phone detector No transmission mobile detector RF(Radio Frequency) detector Exam malpractice detector security privacy confidential