gsm phones
Recently Published Documents


TOTAL DOCUMENTS

17
(FIVE YEARS 0)

H-INDEX

6
(FIVE YEARS 0)

2016 ◽  
Vol 32 (2) ◽  
pp. 125-135 ◽  
Author(s):  
O. Zubko ◽  
R. L. Gould ◽  
H. C. Gay ◽  
H. J. Cox ◽  
M. C. Coulson ◽  
...  

2015 ◽  
Vol 10 (3) ◽  
pp. 2784-2794
Author(s):  
Dr. Esmail Ali

Human exposure to electromagnetic field (EMF) comes from many different sources and occurs in various situations in everyday life. Man-made static fields are mainly found in occupational settings, such as close to magnetic resonance imaging (MRI) scanners, although DC high-voltage overhead transmission lines are being constructed, which are expected to expose larger parts of the population to static electric and magnetic fields.Today, for power regulation most modern electrical equipment uses electronics instead of transformers. Examples include the switched power supplies to laptops, drilling tools, chargers of mobile phones and similar devices. As a consequence, the frequency content of the daily magnetic field exposure has changed mainly by adding odd harmonics (150 Hz, 250 Hz, 750 Hz, etc.). In particular, the third harmonic (150 Hz) has become another dominating frequency in our environment.In particular for brain tissues, the mobile phone used at the ear remains the main source of exposure. However, since the first generation of mobile telephony, the technology aimed at reducing the emitted power of mobile handsets. In particular, for Global System for Mobile communication (GSM) already the introduction of dynamic power control reduced the average output power to about 50% of its rated value during calls, whereas the use of discontinuous transmission during voice calls gave a further 30% reduction in average emitted power. Adaptive power control became faster and more effective in the third-generation (3G) of mobile telephony systems leading to a further reduction (by about two orders of magnitude) in the specific absorption Specific energy Absorption Rate (SAR) compared to GSM phones. In addition, hands-free kits reduce the energy absorbed by the head drastically. Digital Enhanced Cordless Telecommunications (DECT) phones are another source of everyday exposure.


2015 ◽  
Vol 29 (4) ◽  
pp. 377-389 ◽  
Author(s):  
Andrej Zwitter

From November 26 to 29, 2008, ten heavily armed members of Lashkar-e-Taiba (LeT), a Kashmiri separatist group, attacked several public sites in Mumbai, India, with automatic weapons and grenades, killing 164 people and wounding three hundred. This was one of the first known instances of terrorists employing powerful search algorithms such as Twitter's or the link analysis used in Google's PageRank system, which allowed LeT members to access information from massive data pools in real-time. During the attacks, an LeT operations center based in Pakistan communicated with the terrorists via sattelite and GSM phones to provide them with open-source intelligence. From the operations center, LeT members data mined the Internet and social media, tapping into the power of Big Data to provide the attackers with an intelligence advantage over Indian law enforcement agencies. The attackers were thereby kept up to date on the status of the Indian government's response and even received personal profiles of the hostages they took in the Taj Mahal Palace hotel.


Author(s):  
Halim M. Khelalfa

First, the author reviews the currently used guidelines and procedures in digital forensic investigations, and then presents their current adaptations to mobile phone forensics, including criteria for the selection of forensics tool for mobile phone. Due to the world popularity of GSM phones, a detailed description of the SIM file system is presented. The forensic strength and weaknesses of the classes of physical and logical forensic tools are discussed .Current approaches to overcome the impediments of both classes are reviewed in terms of usability and forensic soundness. Then, the newest challenge to the digital forensic community, anti-forensics (AF) is raised, including the risks faced by mobile phone forensics investigation. Finally, the author addresses the issue of current research as well as trends on mobile phone forensics.


Author(s):  
Christian Kranz ◽  
Markus Hammes ◽  
Jens Kissing ◽  
Dietolf Seippel ◽  
Vincent Rezard ◽  
...  
Keyword(s):  
Low Cost ◽  

Author(s):  
A. Varshavsky ◽  
Mike Y. Chen ◽  
E. de Lara ◽  
J. Froehlich ◽  
D. Haehnel ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document