digital cellular
Recently Published Documents


TOTAL DOCUMENTS

352
(FIVE YEARS 0)

H-INDEX

24
(FIVE YEARS 0)

2019 ◽  
Vol 62 (3) ◽  
pp. 1438-1447 ◽  
Author(s):  
Anil Kumar Singh ◽  
Shilpee Patil ◽  
Binod Kumar Kanaujia ◽  
Vijay Kumar Pandey

2019 ◽  
Vol 4 (3) ◽  
Author(s):  
Oluwole Arowolo ◽  
Adefemi Adekunle

This paper gives an explanation to the concept of mobile Jamming and explores jamming in the two popular mobile networks: Global system for mobile communication (GSM) and digital cellular network (DCS). The designed intelligent jamming system blocks the controller channel only, also it operates only if an active mobile is in the controlled area. The ADS - advance Design System for Agilent software package is used analyzed and simulated the mobile jamming system. The Mobile Detector Phone Jammer successfully jammed all the four operators but the radius of the range did not get as expected in the designed, this project only focuses on blocking the signal transmission between the ranges 935 to 960 MHz when tested and performed well. This can be effectively find its use in School Examination hall and religion worship centers. Keywords—Jammer, Mobile Phone, Network, Signal, Frequency


Author(s):  
S. Neeraja ◽  
G. Sasibhushana Rao

The GSM, CDMA cellular systems are most trendy 2G and 3G digital cellular telecommunications systems, which is widely used throughout the world. These systems have many advantages such as high security, higher quality of call transmission over the long distances, low transmitted power, and enhanced capacity with more efficient utilization of the frequency spectrum. With these advantages these cellular systems have attracted more subscribers with more attention in the field of mobile communications. One of the most attractive features of cellular system is handoff which is a continuation of an active call when the mobile is moving from one cell to another without disconnecting the call. Usually, continuous service is achieved by efficiently designed handoff algorithms. So, efficient handoff algorithms are necessary for enhancing the capacity and QoS of cellular system. In this paper, the handoff analysis for GSM, CDMA cellular networks are done under various propagation models. Various handoff algorithms of GSM are described and also a novel received signal strength (R<sub>SS</sub>) based GSM handoff algorithm with adaptive hysteresis is analyzed. CDMA Soft handoff algorithm is analyzed and effective soft handoff parameters are estimated for better performance. The Comparison of handoff algorithms is studied based on results.


2017 ◽  
Author(s):  
Christopher Soghoian ◽  
Stephanie K. Pell

In the early 1990s, off-the-shelf radio scanners allowed any snoop or criminal to eavesdrop on the calls of nearby cell phone users. These radio scanners could intercept calls due to a significant security vulnerability inherent in then widely used analog cellular phone networks: calls were not encrypted as they traveled over the air. In response to this problem, Congress, rather than exploring options for improving the security of cellular networks, merely outlawed the sale of new radio scanners capable of intercepting cellular signals, which did nothing to prevent the potential use of millions of existing interception-capable radio scanners. Now, nearly two decades after Congress passed legislation intended to protect analog phones from interception by radio scanners, we are rapidly approaching a future with a widespread interception threat to cellular communications very reminiscent of the one scanners posed in the 1990s, but with a much larger range of public and private actors with access to a much more powerful cellular interception technology that exploits security vulnerabilities in our digital cellular networks.This Article illustrates how cellular interception capabilities and technology have become, for better or worse, globalized and democratized, placing Americans’ cellular communications at risk of interception from foreign governments, criminals, the tabloid press and virtually anyone else with sufficient motive to capture cellular content in transmission. Notwithstanding this risk, US government agencies continue to treat practically everything about this cellular interception technology, as a closely guarded, necessarily secret “source and method,” shrouding the technical capabilities and limitations of the equipment from public discussion, even keeping its very name from public disclosure. This “source and method” argument, although questionable in its efficacy, is invoked to protect law enforcement agencies’ own use of this technology while allegedly preventing criminal suspects from learning how to evade surveillance.This Article argues that current policy makers should not follow the worn path of attempting to outlaw technology while ignoring, and thus perpetuating, the significant vulnerabilities in cellular communications networks on which it depends. Moreover, lawmakers must resist the reflexive temptation to elevate the sustainability of a particular surveillance technology over the need to curtail the general threat that technology poses to the security of cellular networks. Instead, with regard to this destabilizing, unmediated technology and its increasing general availability at decreasing prices, Congress and appropriate regulators should address these network vulnerabilities directly and thoroughly as part of the larger cyber security policy debates and solutions now under consideration. This Article concludes by offering the beginnings of a way forward for legislators to address digital cellular network vulnerabilities with a new sense of urgency appropriate to the current communications security environment.


Author(s):  
Taoufik Benyetho ◽  
Larbi El Abdellaoui ◽  
Abdelali Tajmouati ◽  
Abdelwahed Tribak ◽  
Mohamed Latrach

This chapter presents two new microstrip multiband antennas based on fractal geometry. The purpose is to study the behaviour of structures when applying a fractal aspect. The first antenna is designed and optimized by using Sierpinski triangle technique, it's validated in tne ISM “Industrial Scientific and Medical” band at 2.45 and 5.8 GHz bands which was designed to be suitable for wireless power transmission use, while the second proposed antenna structure is based on the hexagonal geometry, it's validated and tested for DCS (Digital Cellular System) at 1.8 GHz, for 2.45 GHz and for 5.8 GHz, as an example of application wireless mobile system is an application field.


Author(s):  
Daniel Cellucci ◽  
Kenneth C. Cheung

Cellular solids are a class of materials that have many interesting engineering applications, including ultralight structural materials [1]. The traditional method for analyzing these solids uses convex uniform polyhedral honeycombs to represent the geometry of the material [2], and this approach has carried over into the design of digital cellular solids [3]. However, the use of such honeycomb-derived lattices makes the problem of decomposing a three-dimensional lattice into a library of two-dimensional parts non-trivial. We introduce a method for generating periodic frameworks from Triply Periodic Minimal Surfaces (TPMS), which result in geometries that are easier to decompose into digital parts. Additionally, we perform multi-scale analysis of two cellular solids generated from two TPMS, the P- and D-Schwarz, and two cellular solids, the Kelvin and Octet honeycombs. We show that the simulated behavior of these TMPS-derived structures shows the expected modulus of the cellular solid scaling linearly with relative density, and matches the behavior of the octet truss.


Sign in / Sign up

Export Citation Format

Share Document