SlideShare a Scribd company logo
1 of 19
By
                 Shishu Priya Darshi
                     2007EEC08
                   Naresh Prasad
                     2007EEC67




Department of Electronics & Communication Engineering
   Shri Mata Vaishno Devi University, Katra
                                                        1
Contents
 Introduction
 Types of Jammer
 How Jammer Works
 What inside Jammer
 Applications of Jammer
 Future scope of Jamming Technology
 Cell Phone Detector Introduction
 Block Diagram
 Application
 Conclusion

             Shri Mata Vaishno Devi University, Katra   2
Cell phone jammers are devices that create a
temporary "dead zone" to all cell phone traffic in
their immediate proximity




            Shri Mata Vaishno Devi University, Katra   3
Jamming techniques
 Type "A" Device: JAMMERS


 Type “B” Device: INTELLIGENT CELLULAR DISABLERS


 Type “C” Device: INTELLIGENT BEACON DISABLERS


 Type “D” Device: DIRECT RECEIVE & TRANSMIT JAMMERS


 Type “E” Device: EMI SHIELD - PASSIVE JAMMING




                Shri Mata Vaishno Devi University, Katra   4
How Jammer Works
 A jamming device transmits - same radio
  frequencies of greater power as the cell phone,
  disrupting the communication between the phone
  and the cell-phone base station in the tower. It's a
  called a denial-of-service attack.



                                                  .....Jamming basics....




              Shri Mata Vaishno Devi University, Katra                      5
 This causes interference with communication of
  cell phones and towers to render the phones
  unusable. On most phones, the network would be
 out of range.




 So Jammers work by either disrupting phone to
 tower freq.. or tower to phone frequencies.

             Shri Mata Vaishno Devi University, Katra   6
Design Parameters/ Specification
 The frequency bands


 Distance to be jammed (D)


                                          Pj Gjr Grj R2tr Lr Br
 Jamming–to-signal ratio {J/S}=
                                          Pt Gtr Grt R2jr Lj Bj

 Free space loss {F}= Path Loss (dB)= 32.44 + 20 log D(km) + 20log f(MHz)
 Power calculations



                 Shri Mata Vaishno Devi University, Katra                   7
Block Diagram


                                                                  Jamming
 Power supply        If section                      Rf section
                                                                   signals




                Shri Mata Vaishno Devi University, Katra                     8
Power supply



Transformer
                  Rectifier                        filter   Regulator




              Shri Mata Vaishno Devi University, Katra                  9
IF section


 Triangular wave
                                                              Mixer summer
    generator                         Noise generator
                                                               “Summer”




                   Shri Mata Vaishno Devi University, Katra                  10
Rf section



   Voltage
  Controlled                Power Amplifier               Antenna
  Oscillator




               Shri Mata Vaishno Devi University, Katra             11
Application

 To maintain the complete silence in library and lecture hall
 To avoid fraud in examination hall
 To avoid disturbance in class room
 For providing security in business conference, board of
  directors rooms, seminars, etc.,
 For providing calm and peaceful atmosphere in Hospitals
 Church/Mosques/Cathedral/Temple/Religious
  establishment



                Shri Mata Vaishno Devi University, Katra         12
Future scope of Jamming Technology

  While the law clearly prohibits using a device to
   actively disrupt a cell-phone signal, there are no
   rules against passive cell-phone blocking.
  Companies are working on devices that control a
   cell phone but do not "jam the signal.



               Shri Mata Vaishno Devi University, Katra   13
Cell phone detector

     Introduction



     Shri Mata Vaishno Devi University, Katra   14
Block Diagram

 Power       I.F                             RF
                                                     Signal
 Supply    Section                         Section




          Shri Mata Vaishno Devi University, Katra            15
Applications
 Cell-phone alerter (detector) is useful that
  indicate the presence of a cell-phone signal. These
  can be used in hospitals where cell-phone signals
  could interfere with sensitive medical equipment.
  When a signal is detected, users are asked to turn
  off their phones or Jamming can be used.
 It is useful airport.
 It is useful in class rooms and examination hall.
 It is useful wherever cell phone can disturb.

              Shri Mata Vaishno Devi University, Katra   16
Conclusion
 Every technology has good aspect as well as bad aspect the
  important thing is ,how we are using it.

 Cell phone jammers are very useful to the society from the anti-
  social elements. We can save our national leaders. we can restrict
  the communication network between the anti-social elements by
  using the cell phone jammers. Cell phone jammers prevent the
  students from carrying cell phones to the colleges. As every thing
  goes fine, it is very necessary to implement in all the colleges


References
 [1] www.HowStuffWorks.com
 [2] en.wikipedia.org/wiki/Mobile_phone_jammer
                 Shri Mata Vaishno Devi University, Katra            17
QUERIES
    QUERIES




  Shri Mata Vaishno Devi University, Katra   18
THANK YOU




Shri Mata Vaishno Devi University, Katra   19

More Related Content

Similar to Cellphonejammerppt 101216030013-phpapp01

Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt Sameer Gupta
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jammingPREMKUMAR
 
Cell Phone Jammer , Intro
Cell Phone Jammer , IntroCell Phone Jammer , Intro
Cell Phone Jammer , IntroLakshman Basnet
 
Effects of EM Radiation on Living System
Effects of EM Radiation on Living System Effects of EM Radiation on Living System
Effects of EM Radiation on Living System IOSR Journals
 
Effects of EM Radiation on Living System
Effects of EM Radiation on Living SystemEffects of EM Radiation on Living System
Effects of EM Radiation on Living SystemIOSR Journals
 
cell tower radiation hazards
cell tower radiation hazardscell tower radiation hazards
cell tower radiation hazardsSiva Sankar P G
 
Mobile phone detector pdf
Mobile phone detector pdfMobile phone detector pdf
Mobile phone detector pdfVamshi Varun
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Wavelet based double line and double line -to- ground fault discrimination i...
Wavelet based double  line and double line -to- ground fault discrimination i...Wavelet based double  line and double line -to- ground fault discrimination i...
Wavelet based double line and double line -to- ground fault discrimination i...IAEME Publication
 
Wavelet based double line and double line -to- ground fault discrimination i...
Wavelet based double  line and double line -to- ground fault discrimination i...Wavelet based double  line and double line -to- ground fault discrimination i...
Wavelet based double line and double line -to- ground fault discrimination i...IAEME Publication
 
Wavelet based double line and double line -to- ground fault discrimination i...
Wavelet based double  line and double line -to- ground fault discrimination i...Wavelet based double  line and double line -to- ground fault discrimination i...
Wavelet based double line and double line -to- ground fault discrimination i...IAEME Publication
 
Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...IJECEIAES
 
A presentation on hazards of cell phones
A presentation on hazards of cell phonesA presentation on hazards of cell phones
A presentation on hazards of cell phoneskalyanikatta
 
WAVELET- FUZZY BASED MULTI TERMINAL TRANSMISSION SYSTEM PROTECTION SCHEME IN ...
WAVELET- FUZZY BASED MULTI TERMINAL TRANSMISSION SYSTEM PROTECTION SCHEME IN ...WAVELET- FUZZY BASED MULTI TERMINAL TRANSMISSION SYSTEM PROTECTION SCHEME IN ...
WAVELET- FUZZY BASED MULTI TERMINAL TRANSMISSION SYSTEM PROTECTION SCHEME IN ...Wireilla
 
WAVELET- FUZZY BASED MULTI TERMINAL TRANSMISSION SYSTEM PROTECTION SCHEME IN ...
WAVELET- FUZZY BASED MULTI TERMINAL TRANSMISSION SYSTEM PROTECTION SCHEME IN ...WAVELET- FUZZY BASED MULTI TERMINAL TRANSMISSION SYSTEM PROTECTION SCHEME IN ...
WAVELET- FUZZY BASED MULTI TERMINAL TRANSMISSION SYSTEM PROTECTION SCHEME IN ...ijfls
 

Similar to Cellphonejammerppt 101216030013-phpapp01 (20)

Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
Mobile jamming
Mobile jammingMobile jamming
Mobile jamming
 
Cell Phone Jammer , Intro
Cell Phone Jammer , IntroCell Phone Jammer , Intro
Cell Phone Jammer , Intro
 
Effects of EM Radiation on Living System
Effects of EM Radiation on Living System Effects of EM Radiation on Living System
Effects of EM Radiation on Living System
 
Effects of EM Radiation on Living System
Effects of EM Radiation on Living SystemEffects of EM Radiation on Living System
Effects of EM Radiation on Living System
 
Ceplone
CeploneCeplone
Ceplone
 
cell tower radiation hazards
cell tower radiation hazardscell tower radiation hazards
cell tower radiation hazards
 
Mobile phone detector pdf
Mobile phone detector pdfMobile phone detector pdf
Mobile phone detector pdf
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Wavelet based double line and double line -to- ground fault discrimination i...
Wavelet based double  line and double line -to- ground fault discrimination i...Wavelet based double  line and double line -to- ground fault discrimination i...
Wavelet based double line and double line -to- ground fault discrimination i...
 
Wavelet based double line and double line -to- ground fault discrimination i...
Wavelet based double  line and double line -to- ground fault discrimination i...Wavelet based double  line and double line -to- ground fault discrimination i...
Wavelet based double line and double line -to- ground fault discrimination i...
 
Wavelet based double line and double line -to- ground fault discrimination i...
Wavelet based double  line and double line -to- ground fault discrimination i...Wavelet based double  line and double line -to- ground fault discrimination i...
Wavelet based double line and double line -to- ground fault discrimination i...
 
Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...
 
A presentation on hazards of cell phones
A presentation on hazards of cell phonesA presentation on hazards of cell phones
A presentation on hazards of cell phones
 
WAVELET- FUZZY BASED MULTI TERMINAL TRANSMISSION SYSTEM PROTECTION SCHEME IN ...
WAVELET- FUZZY BASED MULTI TERMINAL TRANSMISSION SYSTEM PROTECTION SCHEME IN ...WAVELET- FUZZY BASED MULTI TERMINAL TRANSMISSION SYSTEM PROTECTION SCHEME IN ...
WAVELET- FUZZY BASED MULTI TERMINAL TRANSMISSION SYSTEM PROTECTION SCHEME IN ...
 
WAVELET- FUZZY BASED MULTI TERMINAL TRANSMISSION SYSTEM PROTECTION SCHEME IN ...
WAVELET- FUZZY BASED MULTI TERMINAL TRANSMISSION SYSTEM PROTECTION SCHEME IN ...WAVELET- FUZZY BASED MULTI TERMINAL TRANSMISSION SYSTEM PROTECTION SCHEME IN ...
WAVELET- FUZZY BASED MULTI TERMINAL TRANSMISSION SYSTEM PROTECTION SCHEME IN ...
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Intelligent jammer
Intelligent jammerIntelligent jammer
Intelligent jammer
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Cellphonejammerppt 101216030013-phpapp01

  • 1. By Shishu Priya Darshi 2007EEC08 Naresh Prasad 2007EEC67 Department of Electronics & Communication Engineering Shri Mata Vaishno Devi University, Katra 1
  • 2. Contents  Introduction  Types of Jammer  How Jammer Works  What inside Jammer  Applications of Jammer  Future scope of Jamming Technology  Cell Phone Detector Introduction  Block Diagram  Application  Conclusion Shri Mata Vaishno Devi University, Katra 2
  • 3. Cell phone jammers are devices that create a temporary "dead zone" to all cell phone traffic in their immediate proximity Shri Mata Vaishno Devi University, Katra 3
  • 4. Jamming techniques  Type "A" Device: JAMMERS  Type “B” Device: INTELLIGENT CELLULAR DISABLERS  Type “C” Device: INTELLIGENT BEACON DISABLERS  Type “D” Device: DIRECT RECEIVE & TRANSMIT JAMMERS  Type “E” Device: EMI SHIELD - PASSIVE JAMMING Shri Mata Vaishno Devi University, Katra 4
  • 5. How Jammer Works  A jamming device transmits - same radio frequencies of greater power as the cell phone, disrupting the communication between the phone and the cell-phone base station in the tower. It's a called a denial-of-service attack. .....Jamming basics.... Shri Mata Vaishno Devi University, Katra 5
  • 6.  This causes interference with communication of cell phones and towers to render the phones unusable. On most phones, the network would be out of range.  So Jammers work by either disrupting phone to tower freq.. or tower to phone frequencies. Shri Mata Vaishno Devi University, Katra 6
  • 7. Design Parameters/ Specification The frequency bands Distance to be jammed (D) Pj Gjr Grj R2tr Lr Br Jamming–to-signal ratio {J/S}= Pt Gtr Grt R2jr Lj Bj Free space loss {F}= Path Loss (dB)= 32.44 + 20 log D(km) + 20log f(MHz) Power calculations Shri Mata Vaishno Devi University, Katra 7
  • 8. Block Diagram Jamming Power supply If section Rf section signals Shri Mata Vaishno Devi University, Katra 8
  • 9. Power supply Transformer Rectifier filter Regulator Shri Mata Vaishno Devi University, Katra 9
  • 10. IF section Triangular wave Mixer summer generator Noise generator “Summer” Shri Mata Vaishno Devi University, Katra 10
  • 11. Rf section Voltage Controlled Power Amplifier Antenna Oscillator Shri Mata Vaishno Devi University, Katra 11
  • 12. Application  To maintain the complete silence in library and lecture hall  To avoid fraud in examination hall  To avoid disturbance in class room  For providing security in business conference, board of directors rooms, seminars, etc.,  For providing calm and peaceful atmosphere in Hospitals  Church/Mosques/Cathedral/Temple/Religious establishment  Shri Mata Vaishno Devi University, Katra 12
  • 13. Future scope of Jamming Technology  While the law clearly prohibits using a device to actively disrupt a cell-phone signal, there are no rules against passive cell-phone blocking.  Companies are working on devices that control a cell phone but do not "jam the signal. Shri Mata Vaishno Devi University, Katra 13
  • 14. Cell phone detector Introduction Shri Mata Vaishno Devi University, Katra 14
  • 15. Block Diagram Power I.F RF Signal Supply Section Section Shri Mata Vaishno Devi University, Katra 15
  • 16. Applications  Cell-phone alerter (detector) is useful that indicate the presence of a cell-phone signal. These can be used in hospitals where cell-phone signals could interfere with sensitive medical equipment. When a signal is detected, users are asked to turn off their phones or Jamming can be used.  It is useful airport.  It is useful in class rooms and examination hall.  It is useful wherever cell phone can disturb. Shri Mata Vaishno Devi University, Katra 16
  • 17. Conclusion  Every technology has good aspect as well as bad aspect the important thing is ,how we are using it.  Cell phone jammers are very useful to the society from the anti- social elements. We can save our national leaders. we can restrict the communication network between the anti-social elements by using the cell phone jammers. Cell phone jammers prevent the students from carrying cell phones to the colleges. As every thing goes fine, it is very necessary to implement in all the colleges References  [1] www.HowStuffWorks.com  [2] en.wikipedia.org/wiki/Mobile_phone_jammer Shri Mata Vaishno Devi University, Katra 17
  • 18. QUERIES QUERIES Shri Mata Vaishno Devi University, Katra 18
  • 19. THANK YOU Shri Mata Vaishno Devi University, Katra 19