Call for Paper - September 2020 Edition
IJCA solicits original research papers for the September 2020 Edition. Last date of manuscript submission is August 20, 2020. Read More

A better Approach to detect the Presence of Cell Phones being used in Prohibited Areas

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Pankaj Mangal, Shubham Kumar, Rajkumar S.
10.5120/ijca2017914291

Pankaj Mangal, Shubham Kumar and Rajkumar S.. A better Approach to detect the Presence of Cell Phones being used in Prohibited Areas. International Journal of Computer Applications 168(2):12-14, June 2017. BibTeX

@article{10.5120/ijca2017914291,
	author = {Pankaj Mangal and Shubham Kumar and Rajkumar S.},
	title = {A better Approach to detect the Presence of Cell Phones being used in Prohibited Areas},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2017},
	volume = {168},
	number = {2},
	month = {Jun},
	year = {2017},
	issn = {0975-8887},
	pages = {12-14},
	numpages = {3},
	url = {http://www.ijcaonline.org/archives/volume168/number2/27846-2017914291},
	doi = {10.5120/ijca2017914291},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

This handy, pocket-size mobile transmission detector can sense the presence of an activated mobile phone from a distance of one and half meters. So it can be used to prevent the use of mobile phones in examination halls, confidential rooms, etc[2]. There are existing models for the cell phone detectors which works when some transmission occurs from the phone. In this paper, we are proposing a detector which works even when the mobile phone is just in the switched on mode but not being used for any kind of transmission. It is also useful for detecting the use of mobile phone for Spying and unauthorized video transmission[2]. The circuit can detect the incoming calls and outgoing calls, SMS and video transmission even if the mobile phone is kept in the silent mode. The moment the bug detects RF(Radio Frequency) transmission signal from an activated mobile phone, it starts sounding a beep alarm and LED blinks[1]. The alarm continues until the signal transmission ceases.

References

  1. Philipp Baumann 1, Reynold J. Cooper2 , Dorit S. Hochbaum 1, Nidhi Patel2 , Kunal Shalia 1 1 “Efficient Deployment of Mobile Detectors for Security Applications” ,Department of Industrial Engineering and Operations Research, University of California, Berkeley, USA 2Lawrence Berkeley National Laboratory, Berkeley, USA
  2. T. Carpenter, J. Cheng, F. Roberts, and M. Xie, "Sensor management problems of nuclear detection," in Safety and Risk Modeling and Its Applications, H. Pham, Ed. London: Springer Series in Reliability Engineering, 2011.
  3. V. A. Traag, A. Browet, F. Calabrese and F. Morlet, “Social Event Detection in Massive Mobile Phone Data Using Probabilistic Location Interference”, SocialCom/PASSAT, pp.625-628, October 9-11,2011
  4. J. W. Branch, C. Giannelia, B. Szymanski, R.Wolff and H. Kargupta, “In-Network Outlier Detection in Wireless Sensor Networks”, knowledge and information systems, vol 31, Springer-Verlag, 2012.
  5. M. M. Breunig, H.P. Kriegel, R.T. Ng and J. Sander, “LOF: Identifying Density Based Local Outliers,” In Proceedings of the ACM SIGMOD Conference, Dallas, TX, May 2000.
  6. B. Wang and W. Perrizo, “RDF: a density based outlier detection method using vertical data representation”, IEEE Int. Conference on Data Mining, pp. 503-506, 2004.
  7. S. Rajagopalan, R. Karwoski, B. Bartholmai, R. Robb, “Quantitative image analytics for strtified pulmonary medicine”, IEEE Int. Symposium on Biomedical Imaging (ISBI), pp. 1779-1782, 2012.
  8. V.chandola, A.Banerjee and V .kumar, ”Outlier Detection:A survey”, ACM Computing surveys,pp. 1-72,2009.
  9. J. Yang and Y. wang, ”A new outliers detection algorithms based on Markov chain”, Advance Materials Research, vol;.366, pp.456-459, 2012.
  10. D.M. Hawkins, ”Identification of outliers”, Chapman and Hall,London,1980.

Keywords

Cell phone detector; No transmission mobile detector; RF(Radio Frequency) detector; Exam malpractice detector; security; privacy; confidential